20#if COAP_WITH_LIBOPENSSL
71#include <openssl/ssl.h>
72#include <openssl/engine.h>
73#include <openssl/err.h>
74#include <openssl/rand.h>
75#include <openssl/hmac.h>
76#include <openssl/x509v3.h>
78#if OPENSSL_VERSION_NUMBER >= 0x30000000L
81#pragma GCC diagnostic ignored "-Wdeprecated-declarations"
84#if !defined(__MINGW32__)
85#pragma warning(disable : 4996)
90#ifdef COAP_EPOLL_SUPPORT
91# include <sys/epoll.h>
94#if OPENSSL_VERSION_NUMBER < 0x10100000L
95#error Must be compiled against OpenSSL 1.1.0 or later
99#define strcasecmp _stricmp
100#define strncasecmp _strnicmp
104#ifndef TLSEXT_TYPE_client_certificate_type
105#define TLSEXT_TYPE_client_certificate_type 19
107#ifndef TLSEXT_TYPE_server_certificate_type
108#define TLSEXT_TYPE_server_certificate_type 20
111#ifndef COAP_OPENSSL_CIPHERS
112#if OPENSSL_VERSION_NUMBER >= 0x10101000L
113#define COAP_OPENSSL_CIPHERS "TLSv1.3:TLSv1.2:!NULL"
115#define COAP_OPENSSL_CIPHERS "TLSv1.2:!NULL"
119#ifndef COAP_OPENSSL_PSK_CIPHERS
120#define COAP_OPENSSL_PSK_CIPHERS "PSK:!NULL"
123#ifndef COAP_OPENSSL_PKCS11_ENGINE_ID
124#define COAP_OPENSSL_PKCS11_ENGINE_ID "pkcs11"
128typedef struct coap_dtls_context_t {
131 HMAC_CTX *cookie_hmac;
134} coap_dtls_context_t;
136typedef struct coap_tls_context_t {
144typedef struct sni_entry {
146#if OPENSSL_VERSION_NUMBER < 0x10101000L
153typedef struct psk_sni_entry {
155#if OPENSSL_VERSION_NUMBER < 0x10101000L
161typedef struct coap_openssl_context_t {
162 coap_dtls_context_t dtls;
164 coap_tls_context_t tls;
169 sni_entry *sni_entry_list;
170#if OPENSSL_VERSION_NUMBER < 0x10101000L
171 size_t psk_sni_count;
172 psk_sni_entry *psk_sni_entry_list;
174} coap_openssl_context_t;
176#if COAP_SERVER_SUPPORT
177#if OPENSSL_VERSION_NUMBER < 0x10101000L
178static int psk_tls_server_name_call_back(SSL *ssl,
int *sd,
void *arg);
180static int psk_tls_client_hello_call_back(SSL *ssl,
int *al,
void *arg);
186 if (SSLeay() < 0x10100000L) {
187 coap_log_warn(
"OpenSSL version 1.1.0 or later is required\n");
190#if OPENSSL_VERSION_NUMBER >= 0x10101000L
198 if (SSLeay() < 0x10101000L) {
199 coap_log_warn(
"OpenSSL version 1.1.1 or later is required\n");
209 if (SSLeay() < 0x10100000L) {
210 coap_log_warn(
"OpenSSL version 1.1.0 or later is required\n");
213#if OPENSSL_VERSION_NUMBER >= 0x10101000L
214 if (SSLeay() < 0x10101000L) {
215 coap_log_warn(
"OpenSSL version 1.1.1 or later is required\n");
270#if COAP_CLIENT_SUPPORT
288static ENGINE *pkcs11_engine = NULL;
289static ENGINE *defined_engine = NULL;
293 SSL_load_error_strings();
295 ENGINE_load_dynamic();
302 ENGINE_finish(pkcs11_engine);
303 pkcs11_engine = NULL;
305 if (defined_engine) {
307 ENGINE_finish(defined_engine);
308 defined_engine = NULL;
320 return c_session->
tls;
326get_split_conf_entry(
const uint8_t **start,
size_t size,
const char *get_keyword,
328 const uint8_t *begin = *start;
331 const uint8_t *split;
337 kend = end = memchr(begin,
'\n', size);
343 if (end > begin && end[-1] ==
'\r')
346 if (begin[0] ==
'#' || (end - begin) == 0) {
348 size -= kend - begin + 1;
354 split = memchr(begin,
':', end - begin);
358 if ((
size_t)(split - begin) != strlen(get_keyword)) {
359 size -= kend - begin + 1;
363 if (memcmp(begin, get_keyword, split - begin)) {
364 size -= kend - begin + 1;
372 if ((end - begin) == 0)
375 split = memchr(begin,
':', end - begin);
387 if ((end - split) > 0) {
422 const uint8_t *start;
427 unsigned int defaults = 0;
428 int done_engine_id = 0;
429 int done_engine_init = 0;
435 end = start + conf_mem->
length;
437 if (defined_engine) {
438 coap_log_warn(
"coap_tls_engine_configure: Freeing off previous engine definition\n");
439 ENGINE_finish(defined_engine);
440 defined_engine = NULL;
444 if (!get_split_conf_entry(&start, end - start,
"engine", &engine_id, &p2)) {
445 coap_log_warn(
"coap_tls_engine_configure: engine not defined\n");
448 defined_engine = ENGINE_by_id((
const char *)engine_id->
s);
449 if (!defined_engine) {
450 coap_log_warn(
"coap_tls_engine_configure: engine '%s' not known\n", engine_id->
s);
460 while (get_split_conf_entry(&start, end - start,
"pre-cmd", &p1, &p2)) {
461 if (!ENGINE_ctrl_cmd_string(defined_engine, (
const char *)p1->
s, p2 ? (
const char *)p2->
s : NULL,
463 coap_log_warn(
"coap_tls_engine_configure: engine %s pre-cmd '%s:%s' failed\n",
464 (
const char *)engine_id->
s,
465 (
const char *)p1->
s, p2 ? (
const char *)p2->
s :
"(NULL)");
469 engine_id->
s, p1->
s, p2 ? (
const char *)p2->
s :
"(NULL)");
478 if (!ENGINE_init(defined_engine)) {
479 coap_log_warn(
"coap_tls_engine_configure: %s failed initialization\n", (
const char *)engine_id->
s);
482 done_engine_init = 1;
484 (
const char *)engine_id->
s);
489 while (get_split_conf_entry(&start, end - start,
"post-cmd", &p1, &p2)) {
490 if (!ENGINE_ctrl_cmd_string(defined_engine, (
const char *)p1->
s, p2 ? (
const char *)p2->
s : NULL,
492 coap_log_warn(
"coap_tls_engine_configure: %s post-cmd '%s:%s' failed\n", (
const char *)engine_id->
s,
493 (
const char *)p1->
s, p2 ? (
const char *)p2->
s :
"(NULL)");
497 (
const char *)engine_id->
s,
498 (
const char *)p1->
s, p2 ? (
const char *)p2->
s :
"(NULL)");
506 if (!get_split_conf_entry(&start, end - start,
"enable-methods", &p1, &p2)) {
507 coap_log_warn(
"coap_tls_engine_configure: enable-methods not found\n");
510 defaults = strtoul((
const char *)p1->
s, NULL, 0);
511 if (!ENGINE_set_default(defined_engine, defaults)) {
512 coap_log_warn(
"coap_tls_engine_configure: enable-methods 0x%x invalid\n", defaults);
527 ENGINE_free(defined_engine);
528 if (done_engine_init)
529 ENGINE_finish(defined_engine);
530 defined_engine = NULL;
539 if (defined_engine) {
540 ENGINE_finish(defined_engine);
541 defined_engine = NULL;
562typedef struct coap_ssl_data {
571coap_dgram_create(BIO *a) {
572 coap_ssl_data *data = NULL;
573 data = malloc(
sizeof(coap_ssl_data));
577 BIO_set_data(a, data);
578 memset(data, 0x00,
sizeof(coap_ssl_data));
583coap_dgram_destroy(BIO *a) {
587 data = (coap_ssl_data *)BIO_get_data(a);
594coap_dgram_read(BIO *a,
char *out,
int outl) {
596 coap_ssl_data *data = (coap_ssl_data *)BIO_get_data(a);
599 if (data != NULL && data->pdu_len > 0) {
600 if (outl < (
int)data->pdu_len) {
601 memcpy(out, data->pdu, outl);
604 memcpy(out, data->pdu, data->pdu_len);
605 ret = (int)data->pdu_len;
607 if (!data->peekmode) {
614 BIO_clear_retry_flags(a);
616 BIO_set_retry_read(a);
622coap_dgram_write(BIO *a,
const char *in,
int inl) {
624 coap_ssl_data *data = (coap_ssl_data *)BIO_get_data(a);
626 if (data && data->session) {
628#if COAP_SERVER_SUPPORT
629 && data->session->endpoint == NULL
633 BIO_clear_retry_flags(a);
637 ret = (int)data->session->sock.lfunc[
COAP_LAYER_TLS].l_write(data->session,
640 BIO_clear_retry_flags(a);
642 if (ret < 0 && (errno == ENOTCONN || errno == ECONNREFUSED))
644 BIO_set_retry_write(a);
647 BIO_clear_retry_flags(a);
654coap_dgram_puts(BIO *a,
const char *pstr) {
655 return coap_dgram_write(a, pstr, (
int)strlen(pstr));
659coap_dgram_ctrl(BIO *a,
int cmd,
long num,
void *ptr) {
661 coap_ssl_data *data = BIO_get_data(a);
666 case BIO_CTRL_GET_CLOSE:
667 ret = BIO_get_shutdown(a);
669 case BIO_CTRL_SET_CLOSE:
670 BIO_set_shutdown(a, (
int)num);
672 case BIO_CTRL_DGRAM_SET_PEEK_MODE:
674 data->peekmode = (unsigned)num;
678 case BIO_CTRL_DGRAM_CONNECT:
681 case BIO_CTRL_DGRAM_SET_DONT_FRAG:
682 case BIO_CTRL_DGRAM_GET_MTU:
683 case BIO_CTRL_DGRAM_SET_MTU:
684 case BIO_CTRL_DGRAM_QUERY_MTU:
685 case BIO_CTRL_DGRAM_GET_FALLBACK_MTU:
690 case BIO_CTRL_DGRAM_MTU_DISCOVER:
691 case BIO_CTRL_DGRAM_SET_CONNECTED:
693 case BIO_CTRL_DGRAM_SET_NEXT_TIMEOUT:
696 ((
struct timeval *)ptr)->tv_usec);
701 case BIO_C_FILE_SEEK:
702 case BIO_C_FILE_TELL:
704 case BIO_CTRL_PENDING:
705 case BIO_CTRL_WPENDING:
706 case BIO_CTRL_DGRAM_GET_PEER:
707 case BIO_CTRL_DGRAM_SET_PEER:
708 case BIO_CTRL_DGRAM_SET_RECV_TIMEOUT:
709 case BIO_CTRL_DGRAM_GET_RECV_TIMEOUT:
710 case BIO_CTRL_DGRAM_SET_SEND_TIMEOUT:
711 case BIO_CTRL_DGRAM_GET_SEND_TIMEOUT:
712 case BIO_CTRL_DGRAM_GET_SEND_TIMER_EXP:
713 case BIO_CTRL_DGRAM_GET_RECV_TIMER_EXP:
714 case BIO_CTRL_DGRAM_MTU_EXCEEDED:
715 case BIO_CTRL_DGRAM_GET_MTU_OVERHEAD:
724coap_dtls_generate_cookie(SSL *ssl,
725 unsigned char *cookie,
726 unsigned int *cookie_len) {
727 SSL_CTX *ctx = SSL_get_SSL_CTX(ssl);
728 coap_dtls_context_t *dtls = ctx ? (coap_dtls_context_t *)SSL_CTX_get_app_data(ctx) : NULL;
729 coap_ssl_data *data = (coap_ssl_data *)BIO_get_data(SSL_get_rbio(ssl));
732 int r = HMAC_Init_ex(dtls->cookie_hmac, NULL, 0, NULL, NULL);
733 r &= HMAC_Update(dtls->cookie_hmac,
734 (
const uint8_t *)&data->session->addr_info.local.addr,
735 (
size_t)data->session->addr_info.local.size);
736 r &= HMAC_Update(dtls->cookie_hmac,
737 (
const uint8_t *)&data->session->addr_info.remote.addr,
738 (
size_t)data->session->addr_info.remote.size);
739 r &= HMAC_Final(dtls->cookie_hmac, cookie, cookie_len);
746coap_dtls_verify_cookie(SSL *ssl,
747 const uint8_t *cookie,
748 unsigned int cookie_len) {
751 if (coap_dtls_generate_cookie(ssl, hmac, &len) &&
752 cookie_len == len && memcmp(cookie, hmac, len) == 0)
758#if COAP_CLIENT_SUPPORT
760coap_dtls_psk_client_callback(SSL *ssl,
763 unsigned int max_identity_len,
765 unsigned int max_psk_len) {
767 coap_openssl_context_t *o_context;
775 if (c_session == NULL || c_session->
context == NULL)
778 if (o_context == NULL)
782 temp.
s = hint ? (
const uint8_t *)hint : (const uint8_t *)
"";
783 temp.
length = strlen((
const char *)temp.
s);
787 (
const char *)temp.
s);
799 if (cpsk_info == NULL)
804 psk_identity = &cpsk_info->
identity;
805 psk_key = &cpsk_info->
key;
811 if (psk_identity == NULL || psk_key == NULL) {
817 if (!max_identity_len)
820 if (psk_identity->
length > max_identity_len) {
821 coap_log_warn(
"psk_identity too large, truncated to %d bytes\n",
825 max_identity_len = (
unsigned int)psk_identity->
length;
827 memcpy(identity, psk_identity->
s, max_identity_len);
828 identity[max_identity_len] =
'\000';
830 if (psk_key->
length > max_psk_len) {
835 max_psk_len = (
unsigned int)psk_key->
length;
837 memcpy(psk, psk_key->
s, max_psk_len);
842#if COAP_SERVER_SUPPORT
844coap_dtls_psk_server_callback(
846 const char *identity,
848 unsigned int max_psk_len
856 if (c_session == NULL || c_session->
context == NULL)
862 lidentity.
s = identity ? (
const uint8_t *)identity : (const uint8_t *)
"";
863 lidentity.
length = strlen((
const char *)lidentity.
s);
867 (
int)lidentity.
length, (
const char *)lidentity.
s);
882 if (psk_key->
length > max_psk_len) {
887 max_psk_len = (
unsigned int)psk_key->
length;
889 memcpy(psk, psk_key->
s, max_psk_len);
895ssl_function_definition(
unsigned long e) {
896#if OPENSSL_VERSION_NUMBER >= 0x30000000L
900 static char buff[80];
902 snprintf(buff,
sizeof(buff),
" at %s:%s",
903 ERR_lib_error_string(e), ERR_func_error_string(e));
909coap_dtls_info_callback(
const SSL *ssl,
int where,
int ret) {
912 int w = where &~SSL_ST_MASK;
916 "coap_dtls_info_callback: session not determined, where 0x%0x and ret 0x%0x\n", where, ret);
919 if (w & SSL_ST_CONNECT)
920 pstr =
"SSL_connect";
921 else if (w & SSL_ST_ACCEPT)
926 if (where & SSL_CB_LOOP) {
929 }
else if (where & SSL_CB_ALERT) {
931 pstr = (where & SSL_CB_READ) ?
"read" :
"write";
932 if ((where & (SSL_CB_WRITE|SSL_CB_READ)) && (ret >> 8) == SSL3_AL_FATAL) {
934 if ((ret & 0xff) != SSL3_AD_CLOSE_NOTIFY)
938 coap_log(log_level,
"* %s: SSL3 alert %s:%s:%s\n",
941 SSL_alert_type_string_long(ret),
942 SSL_alert_desc_string_long(ret));
943 }
else if (where & SSL_CB_EXIT) {
949 while ((e = ERR_get_error()))
952 ssl_function_definition(e));
954 }
else if (ret < 0) {
956 int err = SSL_get_error(ssl, ret);
957 if (err != SSL_ERROR_WANT_READ && err != SSL_ERROR_WANT_WRITE &&
958 err != SSL_ERROR_WANT_CONNECT && err != SSL_ERROR_WANT_ACCEPT &&
959 err != SSL_ERROR_WANT_X509_LOOKUP) {
963 while ((e = ERR_get_error()))
966 ssl_function_definition(e));
972 if (where == SSL_CB_HANDSHAKE_START && SSL_get_state(ssl) == TLS_ST_OK)
978coap_sock_create(BIO *a) {
984coap_sock_destroy(BIO *a) {
996coap_sock_read(BIO *a,
char *out,
int outl) {
1000 if (session && out != NULL) {
1005 BIO_set_retry_read(a);
1008 BIO_clear_retry_flags(a);
1021coap_sock_write(BIO *a,
const char *in,
int inl) {
1030 (
const uint8_t *)in,
1034 BIO_clear_retry_flags(a);
1036 BIO_set_retry_read(a);
1039 BIO_clear_retry_flags(a);
1043 (errno == EPIPE || errno == ECONNRESET)) {
1063coap_sock_puts(BIO *a,
const char *pstr) {
1064 return coap_sock_write(a, pstr, (
int)strlen(pstr));
1068coap_sock_ctrl(BIO *a,
int cmd,
long num,
void *ptr) {
1079 case BIO_CTRL_SET_CLOSE:
1081 case BIO_CTRL_FLUSH:
1085 case BIO_CTRL_GET_CLOSE:
1094coap_set_user_prefs(SSL_CTX *ctx) {
1095 SSL_CTX_set_cipher_list(ctx, COAP_OPENSSL_CIPHERS);
1097#ifdef COAP_OPENSSL_SIGALGS
1098 SSL_CTX_set1_sigalgs_list(ctx, COAP_OPENSSL_SIGALGS);
1099 SSL_CTX_set1_client_sigalgs_list(ctx, COAP_OPENSSL_SIGALGS);
1102#if OPENSSL_VERSION_NUMBER >= 0x10101000L && defined(COAP_OPENSSL_GROUPS)
1103 SSL_CTX_set1_groups_list(ctx, COAP_OPENSSL_GROUPS);
1107#if COAP_DTLS_RETRANSMIT_MS != 1000
1108#if OPENSSL_VERSION_NUMBER >= 0x10101000L
1110timer_cb(SSL *s,
unsigned int timer_us) {
1113 return COAP_DTLS_RETRANSMIT_MS * 1000;
1115 return 2 * timer_us;
1122 coap_openssl_context_t *context;
1127 uint8_t cookie_secret[32];
1129 memset(context, 0,
sizeof(coap_openssl_context_t));
1132 context->dtls.ctx = SSL_CTX_new(DTLS_method());
1133 if (!context->dtls.ctx)
1135 SSL_CTX_set_min_proto_version(context->dtls.ctx, DTLS1_2_VERSION);
1136 SSL_CTX_set_app_data(context->dtls.ctx, &context->dtls);
1137 SSL_CTX_set_read_ahead(context->dtls.ctx, 1);
1138 coap_set_user_prefs(context->dtls.ctx);
1139 memset(cookie_secret, 0,
sizeof(cookie_secret));
1140 if (!RAND_bytes(cookie_secret, (
int)
sizeof(cookie_secret))) {
1142 "Insufficient entropy for random cookie generation");
1145 context->dtls.cookie_hmac = HMAC_CTX_new();
1146 if (!context->dtls.cookie_hmac)
1148 if (!HMAC_Init_ex(context->dtls.cookie_hmac, cookie_secret, (
int)
sizeof(cookie_secret),
1149 EVP_sha256(), NULL))
1151 SSL_CTX_set_cookie_generate_cb(context->dtls.ctx, coap_dtls_generate_cookie);
1152 SSL_CTX_set_cookie_verify_cb(context->dtls.ctx, coap_dtls_verify_cookie);
1153 SSL_CTX_set_info_callback(context->dtls.ctx, coap_dtls_info_callback);
1154 SSL_CTX_set_options(context->dtls.ctx, SSL_OP_NO_QUERY_MTU);
1155#if OPENSSL_VERSION_NUMBER >= 0x30000000L
1156 SSL_CTX_set_options(context->dtls.ctx, SSL_OP_LEGACY_SERVER_CONNECT);
1158 context->dtls.meth = BIO_meth_new(BIO_TYPE_DGRAM,
"coapdgram");
1159 if (!context->dtls.meth)
1161 context->dtls.bio_addr = BIO_ADDR_new();
1162 if (!context->dtls.bio_addr)
1164 BIO_meth_set_write(context->dtls.meth, coap_dgram_write);
1165 BIO_meth_set_read(context->dtls.meth, coap_dgram_read);
1166 BIO_meth_set_puts(context->dtls.meth, coap_dgram_puts);
1167 BIO_meth_set_ctrl(context->dtls.meth, coap_dgram_ctrl);
1168 BIO_meth_set_create(context->dtls.meth, coap_dgram_create);
1169 BIO_meth_set_destroy(context->dtls.meth, coap_dgram_destroy);
1171#if !COAP_DISABLE_TCP
1173 context->tls.ctx = SSL_CTX_new(TLS_method());
1174 if (!context->tls.ctx)
1176 SSL_CTX_set_app_data(context->tls.ctx, &context->tls);
1177 SSL_CTX_set_min_proto_version(context->tls.ctx, TLS1_VERSION);
1178 coap_set_user_prefs(context->tls.ctx);
1179 SSL_CTX_set_info_callback(context->tls.ctx, coap_dtls_info_callback);
1180 context->tls.meth = BIO_meth_new(BIO_TYPE_SOCKET,
"coapsock");
1181 if (!context->tls.meth)
1183 BIO_meth_set_write(context->tls.meth, coap_sock_write);
1184 BIO_meth_set_read(context->tls.meth, coap_sock_read);
1185 BIO_meth_set_puts(context->tls.meth, coap_sock_puts);
1186 BIO_meth_set_ctrl(context->tls.meth, coap_sock_ctrl);
1187 BIO_meth_set_create(context->tls.meth, coap_sock_create);
1188 BIO_meth_set_destroy(context->tls.meth, coap_sock_destroy);
1199#if COAP_SERVER_SUPPORT
1204 coap_openssl_context_t *o_context =
1208 if (!setup_data || !o_context)
1211 SSL_CTX_set_psk_server_callback(o_context->dtls.ctx,
1212 coap_dtls_psk_server_callback);
1213#if !COAP_DISABLE_TCP
1214 SSL_CTX_set_psk_server_callback(o_context->tls.ctx,
1215 coap_dtls_psk_server_callback);
1221 SSL_CTX_use_psk_identity_hint(o_context->dtls.ctx, hint);
1222#if !COAP_DISABLE_TCP
1223 SSL_CTX_use_psk_identity_hint(o_context->tls.ctx, hint);
1227#if OPENSSL_VERSION_NUMBER < 0x10101000L
1228 SSL_CTX_set_tlsext_servername_arg(o_context->dtls.ctx,
1230 SSL_CTX_set_tlsext_servername_callback(o_context->dtls.ctx,
1231 psk_tls_server_name_call_back);
1232#if !COAP_DISABLE_TCP
1233 SSL_CTX_set_tlsext_servername_arg(o_context->tls.ctx,
1235 SSL_CTX_set_tlsext_servername_callback(o_context->tls.ctx,
1236 psk_tls_server_name_call_back);
1239 SSL_CTX_set_client_hello_cb(o_context->dtls.ctx,
1240 psk_tls_client_hello_call_back,
1242#if !COAP_DISABLE_TCP
1243 SSL_CTX_set_client_hello_cb(o_context->tls.ctx,
1244 psk_tls_client_hello_call_back,
1250 if (!o_context->dtls.ssl) {
1252 o_context->dtls.ssl = SSL_new(o_context->dtls.ctx);
1253 if (!o_context->dtls.ssl)
1255 bio = BIO_new(o_context->dtls.meth);
1257 SSL_free(o_context->dtls.ssl);
1258 o_context->dtls.ssl = NULL;
1261 SSL_set_bio(o_context->dtls.ssl, bio, bio);
1262 SSL_set_app_data(o_context->dtls.ssl, NULL);
1263 SSL_set_options(o_context->dtls.ssl, SSL_OP_COOKIE_EXCHANGE);
1269 o_context->psk_pki_enabled |= IS_PSK;
1274#if COAP_CLIENT_SUPPORT
1279 coap_openssl_context_t *o_context =
1283 if (!setup_data || !o_context)
1286 if (!o_context->dtls.ssl) {
1288 o_context->dtls.ssl = SSL_new(o_context->dtls.ctx);
1289 if (!o_context->dtls.ssl)
1291 bio = BIO_new(o_context->dtls.meth);
1293 SSL_free(o_context->dtls.ssl);
1294 o_context->dtls.ssl = NULL;
1297 SSL_set_bio(o_context->dtls.ssl, bio, bio);
1298 SSL_set_app_data(o_context->dtls.ssl, NULL);
1299 SSL_set_options(o_context->dtls.ssl, SSL_OP_COOKIE_EXCHANGE);
1308 o_context->psk_pki_enabled |= IS_PSK;
1314map_key_type(
int asn1_private_key_type
1316 switch (asn1_private_key_type) {
1318 return EVP_PKEY_NONE;
1320 return EVP_PKEY_RSA;
1322 return EVP_PKEY_RSA2;
1324 return EVP_PKEY_DSA;
1326 return EVP_PKEY_DSA1;
1328 return EVP_PKEY_DSA2;
1330 return EVP_PKEY_DSA3;
1332 return EVP_PKEY_DSA4;
1336 return EVP_PKEY_DHX;
1340 return EVP_PKEY_HMAC;
1342 return EVP_PKEY_CMAC;
1344 return EVP_PKEY_TLS1_PRF;
1346 return EVP_PKEY_HKDF;
1348 coap_log_warn(
"*** setup_pki: DTLS: Unknown Private Key type %d for ASN1\n",
1349 asn1_private_key_type);
1354#if !COAP_DISABLE_TCP
1355static uint8_t coap_alpn[] = { 4,
'c',
'o',
'a',
'p' };
1357#if COAP_SERVER_SUPPORT
1360 const unsigned char **out,
1361 unsigned char *outlen,
1362 const unsigned char *in,
1366 unsigned char *tout = NULL;
1369 return SSL_TLSEXT_ERR_NOACK;
1370 ret = SSL_select_next_proto(&tout,
1377 return (ret != OPENSSL_NPN_NEGOTIATED) ? SSL_TLSEXT_ERR_NOACK : SSL_TLSEXT_ERR_OK;
1383add_ca_to_cert_store(X509_STORE *st, X509 *x509) {
1387 while (ERR_get_error() != 0) {
1390 if (!X509_STORE_add_cert(st, x509)) {
1391 while ((e = ERR_get_error()) != 0) {
1392 int r = ERR_GET_REASON(e);
1393 if (r != X509_R_CERT_ALREADY_IN_HASH_TABLE) {
1396 ERR_reason_error_string(e),
1397 ssl_function_definition(e));
1404missing_ENGINE_load_cert(ENGINE *engine,
const char *cert_id) {
1406 const char *cert_id;
1410 params.cert_id = cert_id;
1414 if (!ENGINE_ctrl_cmd(engine,
"LOAD_CERT_CTRL", 0, ¶ms, NULL, 1)) {
1421check_pkcs11_engine(
void) {
1422 static int already_tried = 0;
1427 if (!pkcs11_engine) {
1428 pkcs11_engine = ENGINE_by_id(COAP_OPENSSL_PKCS11_ENGINE_ID);
1429 if (!pkcs11_engine) {
1430 coap_log_err(
"*** setup_pki: (D)TLS: No PKCS11 support - need OpenSSL %s engine\n",
1431 COAP_OPENSSL_PKCS11_ENGINE_ID);
1435 if (!ENGINE_init(pkcs11_engine)) {
1437 ENGINE_free(pkcs11_engine);
1438 pkcs11_engine = NULL;
1439 coap_log_err(
"*** setup_pki: (D)TLS: PKCS11 engine initialize failed\n");
1447 ENGINE_free(pkcs11_engine);
1452#if OPENSSL_VERSION_NUMBER < 0x10101000L && COAP_SERVER_SUPPORT
1455install_engine_public_cert_ctx(ENGINE *engine, SSL_CTX *ctx,
1456 const char *public_cert) {
1459 x509 = missing_ENGINE_load_cert(engine, public_cert);
1467 if (!SSL_CTX_use_certificate(ctx, x509)) {
1468 coap_log_warn(
"*** setup_pki: (D)TLS: %s: Unable to configure "
1480install_engine_private_key_ctx(ENGINE *engine, SSL_CTX *ctx,
1481 const char *private_key) {
1482 EVP_PKEY *pkey = ENGINE_load_private_key(engine,
1493 if (!SSL_CTX_use_PrivateKey(ctx, pkey)) {
1494 coap_log_warn(
"*** setup_pki: (D)TLS: %s: Unable to configure "
1498 EVP_PKEY_free(pkey);
1501 EVP_PKEY_free(pkey);
1506install_engine_ca_ctx(ENGINE *engine, SSL_CTX *ctx,
const char *ca) {
1510 x509 = missing_ENGINE_load_cert(engine,
1514 "%s CA Certificate\n",
1519 if (!SSL_CTX_add_client_CA(ctx, x509)) {
1520 coap_log_warn(
"*** setup_pki: (D)TLS: %s: Unable to configure "
1521 "%s CA Certificate\n",
1527 st = SSL_CTX_get_cert_store(ctx);
1528 add_ca_to_cert_store(st, x509);
1534load_in_cas_ctx(SSL_CTX *ctx,
1535 const char *ca_file) {
1536 STACK_OF(X509_NAME) *cert_names;
1540 char *rw_var = NULL;
1541 cert_names = SSL_load_client_CA_file(ca_file);
1542 if (cert_names != NULL)
1543 SSL_CTX_set_client_CA_list(ctx, cert_names);
1545 coap_log_warn(
"*** setup_pki: (D)TLS: %s: Unable to configure "
1552 st = SSL_CTX_get_cert_store(ctx);
1553 in = BIO_new(BIO_s_file());
1557 memcpy(&rw_var, &ca_file,
sizeof(rw_var));
1558 if (!BIO_read_filename(in, rw_var)) {
1564 if ((x = PEM_read_bio_X509(in, NULL, NULL, NULL)) == NULL)
1566 add_ca_to_cert_store(st, x);
1574setup_pki_server(SSL_CTX *ctx,
1590 if (!(SSL_CTX_use_PrivateKey_file(ctx,
1592 SSL_FILETYPE_PEM))) {
1602 EVP_PKEY *pkey = bp ? PEM_read_bio_PrivateKey(bp, NULL, 0, NULL) : NULL;
1604 if (!pkey || !SSL_CTX_use_PrivateKey(ctx, pkey)) {
1608 EVP_PKEY_free(pkey);
1616 EVP_PKEY_free(pkey);
1628 if (!(SSL_CTX_use_PrivateKey_file(ctx,
1630 SSL_FILETYPE_ASN1))) {
1648 if (!check_pkcs11_engine()) {
1653 if (ENGINE_ctrl_cmd_string(pkcs11_engine,
1656 coap_log_warn(
"*** setup_pki: (D)TLS: PKCS11: %s: Unable to set pin\n",
1661 if (!install_engine_private_key_ctx(pkcs11_engine, ctx,
1669 if (!defined_engine ||
1670 !install_engine_private_key_ctx(defined_engine, ctx,
1699 if (!(SSL_CTX_use_certificate_file(ctx,
1701 SSL_FILETYPE_PEM))) {
1707 if (!SSL_CTX_use_certificate_chain_file(ctx,
1719 X509 *cert = bp ? PEM_read_bio_X509(bp, NULL, 0, NULL) : NULL;
1721 if (!cert || !SSL_CTX_use_certificate(ctx, cert)) {
1745 if (!(SSL_CTX_use_certificate_file(ctx,
1747 SSL_FILETYPE_ASN1))) {
1755 !(SSL_CTX_use_certificate_ASN1(ctx,
1764 if (!check_pkcs11_engine()) {
1767 if (!install_engine_public_cert_ctx(pkcs11_engine, ctx,
1775 if (!defined_engine ||
1776 !install_engine_public_cert_ctx(defined_engine, ctx,
1814 X509_STORE *st = SSL_CTX_get_cert_store(ctx);
1818 if ((x = PEM_read_bio_X509(bp, NULL, NULL, NULL)) == NULL)
1820 add_ca_to_cert_store(st, x);
1821 SSL_CTX_add_client_CA(ctx, x);
1837 if (!(SSL_CTX_use_certificate_file(ctx,
1839 SSL_FILETYPE_ASN1))) {
1852 if (!x509 || !SSL_CTX_add_client_CA(ctx, x509)) {
1860 st = SSL_CTX_get_cert_store(ctx);
1861 add_ca_to_cert_store(st, x509);
1866 if (!check_pkcs11_engine()) {
1869 if (!install_engine_ca_ctx(pkcs11_engine, ctx,
1877 if (!defined_engine ||
1878 !install_engine_ca_ctx(defined_engine, ctx,
1897#if OPENSSL_VERSION_NUMBER >= 0x10101000L || COAP_CLIENT_SUPPORT
1900install_engine_public_cert(ENGINE *engine, SSL *ssl,
const char *public_cert,
1904 x509 = missing_ENGINE_load_cert(engine, public_cert);
1912 if (!SSL_use_certificate(ssl, x509)) {
1913 coap_log_warn(
"*** setup_pki: (D)TLS: %s: Unable to configure "
1925install_engine_private_key(ENGINE *engine, SSL *ssl,
const char *private_key,
1927 EVP_PKEY *pkey = ENGINE_load_private_key(engine,
1938 if (!SSL_use_PrivateKey(ssl, pkey)) {
1939 coap_log_warn(
"*** setup_pki: (D)TLS: %s: Unable to configure "
1943 EVP_PKEY_free(pkey);
1946 EVP_PKEY_free(pkey);
1951install_engine_ca(ENGINE *engine, SSL *ssl,
const char *ca,
1954 SSL_CTX *ctx = SSL_get_SSL_CTX(ssl);
1959 "%s CA Certificate (no ctx)\n",
1964 x509 = missing_ENGINE_load_cert(engine,
1968 "%s CA Certificate\n",
1973 if (!SSL_add_client_CA(ssl, x509)) {
1974 coap_log_warn(
"*** setup_pki: (D)TLS: %s: Unable to configure "
1975 "%s CA Certificate\n",
1981 st = SSL_CTX_get_cert_store(ctx);
1982 add_ca_to_cert_store(st, x509);
1988load_in_cas(SSL *ssl,
1993 char *rw_var = NULL;
1994 SSL_CTX *ctx = SSL_get_SSL_CTX(ssl);
1997 STACK_OF(X509_NAME) *cert_names = SSL_load_client_CA_file(ca_file);
1999 if (cert_names != NULL)
2000 SSL_set_client_CA_list(ssl, cert_names);
2010 in = BIO_new(BIO_s_file());
2014 memcpy(&rw_var, &ca_file,
sizeof(rw_var));
2015 if (!BIO_read_filename(in, rw_var)) {
2019 st = SSL_CTX_get_cert_store(ctx);
2021 if ((x = PEM_read_bio_X509(in, NULL, NULL, NULL)) == NULL)
2023 add_ca_to_cert_store(st, x);
2031setup_pki_ssl(SSL *ssl,
2047 if (!(SSL_use_PrivateKey_file(ssl,
2049 SSL_FILETYPE_PEM))) {
2059 EVP_PKEY *pkey = bp ? PEM_read_bio_PrivateKey(bp, NULL, 0, NULL) : NULL;
2061 if (!pkey || !SSL_use_PrivateKey(ssl, pkey)) {
2065 EVP_PKEY_free(pkey);
2073 EVP_PKEY_free(pkey);
2085 if (!(SSL_use_PrivateKey_file(ssl,
2087 SSL_FILETYPE_ASN1))) {
2105 if (!check_pkcs11_engine()) {
2110 if (ENGINE_ctrl_cmd_string(pkcs11_engine,
2113 coap_log_warn(
"*** setup_pki: (D)TLS: PKCS11: %s: Unable to set pin\n",
2118 if (!install_engine_private_key(pkcs11_engine, ssl,
2127 if (!defined_engine ||
2128 !install_engine_private_key(defined_engine, ssl,
2160 if (!(SSL_use_certificate_file(ssl,
2162 SSL_FILETYPE_PEM))) {
2168 if (!SSL_use_certificate_chain_file(ssl,
2180 X509 *cert = bp ? PEM_read_bio_X509(bp, NULL, 0, NULL) : NULL;
2182 if (!cert || !SSL_use_certificate(ssl, cert)) {
2206 if (!(SSL_use_certificate_file(ssl,
2208 SSL_FILETYPE_ASN1))) {
2216 !(SSL_use_certificate_ASN1(ssl,
2225 if (!check_pkcs11_engine()) {
2228 if (!install_engine_public_cert(pkcs11_engine, ssl,
2237 if (!defined_engine ||
2238 !install_engine_public_cert(defined_engine, ssl,
2277 SSL_CTX *ctx = SSL_get_SSL_CTX(ssl);
2279 X509_STORE *st = ctx? SSL_CTX_get_cert_store(ctx) : NULL;
2283 if ((x = PEM_read_bio_X509(bp, NULL, 0, NULL)) == NULL)
2286 add_ca_to_cert_store(st, x);
2287 SSL_add_client_CA(ssl, x);
2303 if (!(SSL_use_certificate_file(ssl,
2305 SSL_FILETYPE_ASN1))) {
2317 SSL_CTX *ctx = SSL_get_SSL_CTX(ssl);
2320 if (!x509 || !SSL_add_client_CA(ssl, x509)) {
2329 st = ctx ? SSL_CTX_get_cert_store(ctx) : NULL;
2331 add_ca_to_cert_store(st, x509);
2336 if (!check_pkcs11_engine()) {
2339 if (!install_engine_ca(pkcs11_engine, ssl,
2348 if (!defined_engine ||
2349 !install_engine_ca(defined_engine, ssl,
2370get_san_or_cn_from_cert(X509 *x509) {
2374 STACK_OF(GENERAL_NAME) *san_list;
2377 san_list = X509_get_ext_d2i(x509, NID_subject_alt_name, NULL, NULL);
2379 int san_count = sk_GENERAL_NAME_num(san_list);
2381 for (n = 0; n < san_count; n++) {
2382 const GENERAL_NAME *name = sk_GENERAL_NAME_value(san_list, n);
2384 if (name && name->type == GEN_DNS) {
2385 const char *dns_name = (
const char *)ASN1_STRING_get0_data(name->d.dNSName);
2388 if (ASN1_STRING_length(name->d.dNSName) != (int)strlen(dns_name))
2390 cn = OPENSSL_strdup(dns_name);
2391 sk_GENERAL_NAME_pop_free(san_list, GENERAL_NAME_free);
2395 sk_GENERAL_NAME_pop_free(san_list, GENERAL_NAME_free);
2398 X509_NAME_oneline(X509_get_subject_name(x509), buffer,
sizeof(buffer));
2401 n = (int)strlen(buffer) - 3;
2404 if (((cn[0] ==
'C') || (cn[0] ==
'c')) &&
2405 ((cn[1] ==
'N') || (cn[1] ==
'n')) &&
2414 char *ecn = strchr(cn,
'/');
2416 return OPENSSL_strndup(cn, ecn-cn);
2418 return OPENSSL_strdup(cn);
2426tls_verify_call_back(
int preverify_ok, X509_STORE_CTX *ctx) {
2427 int index = SSL_get_ex_data_X509_STORE_CTX_idx();
2428 SSL *ssl = index >= 0 ? X509_STORE_CTX_get_ex_data(ctx, index) : NULL;
2430 coap_openssl_context_t *context = (session && session->
context) ?
2433 int depth = X509_STORE_CTX_get_error_depth(ctx);
2434 int err = X509_STORE_CTX_get_error(ctx);
2435 X509 *x509 = X509_STORE_CTX_get_current_cert(ctx);
2436 char *cn = x509 ? get_san_or_cn_from_cert(x509) : NULL;
2437 int keep_preverify_ok = preverify_ok;
2440 depth, err, preverify_ok, cn);
2442 X509_STORE_CTX_set_error(ctx, X509_V_ERR_UNSPECIFIED);
2446 if (!preverify_ok) {
2448 case X509_V_ERR_CERT_NOT_YET_VALID:
2449 case X509_V_ERR_CERT_HAS_EXPIRED:
2453 case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT:
2457 case X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN:
2461 case X509_V_ERR_UNABLE_TO_GET_CRL:
2465 case X509_V_ERR_CRL_NOT_YET_VALID:
2466 case X509_V_ERR_CRL_HAS_EXPIRED:
2470 case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY:
2471 case X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE:
2472 case X509_V_ERR_AKID_SKID_MISMATCH:
2482 err = X509_V_ERR_CERT_CHAIN_TOO_LONG;
2483 X509_STORE_CTX_set_error(ctx, err);
2485 if (!preverify_ok) {
2486 if (err == X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN) {
2489 "Unknown CA", cn ? cn :
"?", depth);
2493 X509_verify_cert_error_string(err), cn ? cn :
"?", depth);
2498 X509_verify_cert_error_string(err), cn ? cn :
"?", depth);
2503 int length = i2d_X509(x509, NULL);
2505 uint8_t *base_buf2 = base_buf = length > 0 ? OPENSSL_malloc(length) : NULL;
2510 assert(i2d_X509(x509, &base_buf2) > 0);
2514 depth, preverify_ok,
2518 X509_STORE_CTX_set_error(ctx, X509_V_ERR_CERT_REJECTED);
2520 X509_STORE_CTX_set_error(ctx, X509_V_ERR_INVALID_CA);
2524 OPENSSL_free(base_buf);
2526 X509_STORE_CTX_set_error(ctx, X509_V_ERR_UNSPECIFIED);
2531 return preverify_ok;
2534#if COAP_SERVER_SUPPORT
2535#if OPENSSL_VERSION_NUMBER < 0x10101000L
2545tls_secret_call_back(SSL *ssl,
2548 STACK_OF(SSL_CIPHER) *peer_ciphers,
2552 int psk_requested = 0;
2557 assert(session != NULL);
2558 assert(session->
context != NULL);
2559 if (session == NULL ||
2567 for (ii = 0; ii < sk_SSL_CIPHER_num(peer_ciphers); ii++) {
2568 const SSL_CIPHER *peer_cipher = sk_SSL_CIPHER_value(peer_ciphers, ii);
2571 SSL_CIPHER_get_name(peer_cipher));
2572 if (strstr(SSL_CIPHER_get_name(peer_cipher),
"PSK")) {
2578 if (!psk_requested) {
2585 SSL_VERIFY_CLIENT_ONCE |
2586 SSL_VERIFY_FAIL_IF_NO_PEER_CERT,
2587 tls_verify_call_back);
2589 SSL_set_verify(ssl, SSL_VERIFY_NONE, tls_verify_call_back);
2598 X509_VERIFY_PARAM *param;
2600 param = X509_VERIFY_PARAM_new();
2602 X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_CRL_CHECK);
2603 SSL_set1_param(ssl, param);
2604 X509_VERIFY_PARAM_free(param);
2627 SSL_set_cipher_list(ssl, COAP_OPENSSL_PSK_CIPHERS);
2628 SSL_set_psk_server_callback(ssl, coap_dtls_psk_server_callback);
2643tls_server_name_call_back(SSL *ssl,
2649 return SSL_TLSEXT_ERR_NOACK;
2655 coap_openssl_context_t *context = (session && session->
context) ?
2657 const char *sni = SSL_get_servername(ssl, TLSEXT_NAMETYPE_host_name);
2661 return SSL_TLSEXT_ERR_NOACK;
2663 if (!sni || !sni[0]) {
2666 for (i = 0; i < context->sni_count; i++) {
2667 if (!strcasecmp(sni, context->sni_entry_list[i].sni)) {
2671 if (i == context->sni_count) {
2680 return SSL_TLSEXT_ERR_ALERT_FATAL;
2685 ctx = SSL_CTX_new(DTLS_method());
2688 SSL_CTX_set_min_proto_version(ctx, DTLS1_2_VERSION);
2689 SSL_CTX_set_app_data(ctx, &context->dtls);
2690 SSL_CTX_set_read_ahead(ctx, 1);
2691 coap_set_user_prefs(ctx);
2692 SSL_CTX_set_cookie_generate_cb(ctx, coap_dtls_generate_cookie);
2693 SSL_CTX_set_cookie_verify_cb(ctx, coap_dtls_verify_cookie);
2694 SSL_CTX_set_info_callback(ctx, coap_dtls_info_callback);
2695 SSL_CTX_set_options(ctx, SSL_OP_NO_QUERY_MTU);
2697#if !COAP_DISABLE_TCP
2700 ctx = SSL_CTX_new(TLS_method());
2703 SSL_CTX_set_app_data(ctx, &context->tls);
2704 SSL_CTX_set_min_proto_version(ctx, TLS1_VERSION);
2705 coap_set_user_prefs(ctx);
2706 SSL_CTX_set_info_callback(ctx, coap_dtls_info_callback);
2707 SSL_CTX_set_alpn_select_cb(ctx, server_alpn_callback, NULL);
2710 sni_setup_data = *setup_data;
2711 sni_setup_data.
pki_key = *new_entry;
2712 setup_pki_server(ctx, &sni_setup_data);
2714 context->sni_entry_list = OPENSSL_realloc(context->sni_entry_list,
2715 (context->sni_count+1)*
sizeof(sni_entry));
2716 context->sni_entry_list[context->sni_count].sni = OPENSSL_strdup(sni);
2717 context->sni_entry_list[context->sni_count].ctx = ctx;
2718 context->sni_count++;
2720 SSL_set_SSL_CTX(ssl, context->sni_entry_list[i].ctx);
2721 SSL_clear_options(ssl, 0xFFFFFFFFL);
2722 SSL_set_options(ssl, SSL_CTX_get_options(context->sni_entry_list[i].ctx));
2729 SSL_set_session_secret_cb(ssl, tls_secret_call_back, arg);
2730 return SSL_TLSEXT_ERR_OK;
2733 return SSL_TLSEXT_ERR_ALERT_WARNING;
2745psk_tls_server_name_call_back(SSL *ssl,
2752 return SSL_TLSEXT_ERR_NOACK;
2758 coap_openssl_context_t *o_context = (c_session && c_session->
context) ?
2760 const char *sni = SSL_get_servername(ssl, TLSEXT_NAMETYPE_host_name);
2765 return SSL_TLSEXT_ERR_ALERT_FATAL;
2767 if (!sni || !sni[0]) {
2770 for (i = 0; i < o_context->psk_sni_count; i++) {
2771 if (!strcasecmp(sni, (
char *)o_context->psk_sni_entry_list[i].sni)) {
2775 if (i == o_context->psk_sni_count) {
2784 return SSL_TLSEXT_ERR_ALERT_FATAL;
2789 ctx = SSL_CTX_new(DTLS_method());
2792 SSL_CTX_set_min_proto_version(ctx, DTLS1_2_VERSION);
2793 SSL_CTX_set_app_data(ctx, &o_context->dtls);
2794 SSL_CTX_set_read_ahead(ctx, 1);
2795 SSL_CTX_set_cipher_list(ctx, COAP_OPENSSL_CIPHERS);
2796 SSL_CTX_set_cookie_generate_cb(ctx, coap_dtls_generate_cookie);
2797 SSL_CTX_set_cookie_verify_cb(ctx, coap_dtls_verify_cookie);
2798 SSL_CTX_set_info_callback(ctx, coap_dtls_info_callback);
2799 SSL_CTX_set_options(ctx, SSL_OP_NO_QUERY_MTU);
2801#if !COAP_DISABLE_TCP
2804 ctx = SSL_CTX_new(TLS_method());
2807 SSL_CTX_set_app_data(ctx, &o_context->tls);
2808 SSL_CTX_set_min_proto_version(ctx, TLS1_VERSION);
2809 SSL_CTX_set_cipher_list(ctx, COAP_OPENSSL_CIPHERS);
2810 SSL_CTX_set_info_callback(ctx, coap_dtls_info_callback);
2811 SSL_CTX_set_alpn_select_cb(ctx, server_alpn_callback, NULL);
2815 o_context->psk_sni_entry_list =
2816 OPENSSL_realloc(o_context->psk_sni_entry_list,
2817 (o_context->psk_sni_count+1)*
sizeof(psk_sni_entry));
2818 o_context->psk_sni_entry_list[o_context->psk_sni_count].sni =
2819 OPENSSL_strdup(sni);
2820 o_context->psk_sni_entry_list[o_context->psk_sni_count].psk_info =
2822 o_context->psk_sni_entry_list[o_context->psk_sni_count].ctx =
2824 o_context->psk_sni_count++;
2826 SSL_set_SSL_CTX(ssl, o_context->psk_sni_entry_list[i].ctx);
2827 SSL_clear_options(ssl, 0xFFFFFFFFL);
2828 SSL_set_options(ssl,
2829 SSL_CTX_get_options(o_context->psk_sni_entry_list[i].ctx));
2831 &o_context->psk_sni_entry_list[i].psk_info.key);
2832 snprintf(lhint,
sizeof(lhint),
"%.*s",
2833 (
int)o_context->psk_sni_entry_list[i].psk_info.hint.length,
2834 o_context->psk_sni_entry_list[i].psk_info.hint.s);
2835 SSL_use_psk_identity_hint(ssl, lhint);
2842 SSL_set_session_secret_cb(ssl, tls_secret_call_back, arg);
2843 return SSL_TLSEXT_ERR_OK;
2846 return SSL_TLSEXT_ERR_ALERT_WARNING;
2859tls_client_hello_call_back(SSL *ssl,
2864 coap_openssl_context_t *dtls_context;
2866 int psk_requested = 0;
2867 const unsigned char *out;
2871 *al = SSL_AD_INTERNAL_ERROR;
2872 return SSL_CLIENT_HELLO_ERROR;
2875 assert(session != NULL);
2876 assert(session->
context != NULL);
2878 if (session == NULL ||
2881 *al = SSL_AD_INTERNAL_ERROR;
2882 return SSL_CLIENT_HELLO_ERROR;
2885 setup_data = &dtls_context->setup_data;
2893 size_t len = SSL_client_hello_get0_ciphers(ssl, &out);
2894 STACK_OF(SSL_CIPHER) *peer_ciphers = NULL;
2895 STACK_OF(SSL_CIPHER) *scsvc = NULL;
2897 if (len && SSL_bytes_to_cipher_list(ssl, out, len,
2898 SSL_client_hello_isv2(ssl),
2899 &peer_ciphers, &scsvc)) {
2901 for (ii = 0; ii < sk_SSL_CIPHER_num(peer_ciphers); ii++) {
2902 const SSL_CIPHER *peer_cipher = sk_SSL_CIPHER_value(peer_ciphers, ii);
2905 "Client cipher: %s (%04x)\n",
2906 SSL_CIPHER_get_name(peer_cipher),
2907 SSL_CIPHER_get_protocol_id(peer_cipher));
2908 if (strstr(SSL_CIPHER_get_name(peer_cipher),
"PSK")) {
2914 sk_SSL_CIPHER_free(peer_ciphers);
2915 sk_SSL_CIPHER_free(scsvc);
2918 if (psk_requested) {
2924 SSL_set_psk_server_callback(ssl, coap_dtls_psk_server_callback);
2930 return SSL_CLIENT_HELLO_SUCCESS;
2940 if (SSL_client_hello_get0_ext(ssl, TLSEXT_TYPE_client_certificate_type,
2943 for (ii = 0; ii < outlen; ii++) {
2959 *al = SSL_AD_UNSUPPORTED_EXTENSION;
2960 return SSL_CLIENT_HELLO_ERROR;
2969 coap_openssl_context_t *context =
2971 const char *sni =
"";
2972 char *sni_tmp = NULL;
2975 if (SSL_client_hello_get0_ext(ssl, TLSEXT_TYPE_server_name, &out, &outlen) &&
2977 (((out[0]<<8) + out[1] +2) == (int)outlen) &&
2978 out[2] == TLSEXT_NAMETYPE_host_name &&
2979 (((out[3]<<8) + out[4] +2 +3) == (int)outlen)) {
2983 sni_tmp = OPENSSL_malloc(outlen+1);
2984 sni_tmp[outlen] =
'\000';
2985 memcpy(sni_tmp, out, outlen);
2989 for (i = 0; i < context->sni_count; i++) {
2990 if (!strcasecmp(sni, context->sni_entry_list[i].sni)) {
2994 if (i == context->sni_count) {
3004 *al = SSL_AD_UNRECOGNIZED_NAME;
3005 return SSL_CLIENT_HELLO_ERROR;
3009 context->sni_entry_list = OPENSSL_realloc(context->sni_entry_list,
3010 (context->sni_count+1)*
sizeof(sni_entry));
3011 context->sni_entry_list[context->sni_count].sni = OPENSSL_strdup(sni);
3012 context->sni_entry_list[context->sni_count].pki_key = *new_entry;
3013 context->sni_count++;
3016 OPENSSL_free(sni_tmp);
3018 sni_setup_data = *setup_data;
3019 sni_setup_data.
pki_key = context->sni_entry_list[i].pki_key;
3031 SSL_VERIFY_CLIENT_ONCE |
3032 SSL_VERIFY_FAIL_IF_NO_PEER_CERT,
3033 tls_verify_call_back);
3035 SSL_set_verify(ssl, SSL_VERIFY_NONE, tls_verify_call_back);
3044 X509_VERIFY_PARAM *param;
3046 param = X509_VERIFY_PARAM_new();
3048 X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_CRL_CHECK);
3049 SSL_set1_param(ssl, param);
3050 X509_VERIFY_PARAM_free(param);
3058 return SSL_CLIENT_HELLO_SUCCESS;
3070psk_tls_client_hello_call_back(SSL *ssl,
3075 coap_openssl_context_t *o_context;
3077 const unsigned char *out;
3083 if (!c_session || !c_session->
context) {
3096 const char *sni =
"";
3097 char *sni_tmp = NULL;
3100 if (SSL_client_hello_get0_ext(ssl, TLSEXT_TYPE_server_name, &out, &outlen) &&
3102 (((out[0]<<8) + out[1] +2) == (
int)outlen) &&
3103 out[2] == TLSEXT_NAMETYPE_host_name &&
3104 (((out[3]<<8) + out[4] +2 +3) == (
int)outlen)) {
3108 sni_tmp = OPENSSL_malloc(outlen+1);
3110 sni_tmp[outlen] =
'\000';
3111 memcpy(sni_tmp, out, outlen);
3116#if OPENSSL_VERSION_NUMBER < 0x10101000L
3119 for (i = 0; i < o_context->psk_sni_count; i++) {
3120 if (strcasecmp(sni, o_context->psk_sni_entry_list[i].sni) == 0) {
3124 if (i == o_context->psk_sni_count) {
3137 *al = SSL_AD_UNRECOGNIZED_NAME;
3138 return SSL_CLIENT_HELLO_ERROR;
3141#if OPENSSL_VERSION_NUMBER < 0x10101000L
3142 psk_sni_entry *tmp_entry;
3144 OPENSSL_realloc(o_context->psk_sni_entry_list,
3145 (o_context->psk_sni_count+1)*
sizeof(sni_entry));
3147 o_context->psk_sni_entry_list = tmp_entry;
3148 o_context->psk_sni_entry_list[o_context->psk_sni_count]
3150 OPENSSL_strdup(sni);
3151 if (o_context->psk_sni_entry_list[o_context->psk_sni_count].sni) {
3152 o_context->psk_sni_entry_list[o_context->psk_sni_count].psk_info =
3154 o_context->psk_sni_count++;
3158 new_entry = &o_context->psk_sni_entry_list[i].psk_info;
3163 OPENSSL_free(sni_tmp);
3175 if (new_entry->
hint.
s) {
3176 snprintf(lhint,
sizeof(lhint),
"%.*s",
3179 SSL_use_psk_identity_hint(ssl, lhint);
3182 return SSL_CLIENT_HELLO_SUCCESS;
3185 *al = SSL_AD_INTERNAL_ERROR;
3186 return SSL_CLIENT_HELLO_ERROR;
3195 coap_openssl_context_t *context =
3200 context->setup_data = *setup_data;
3206 if (!defined_engine) {
3207 coap_log_warn(
"setup_pki: OpenSSL Engine not configured, PKI not set up\n");
3213 if (!context->setup_data.verify_peer_cert) {
3215 context->setup_data.check_common_ca = 0;
3217 context->setup_data.allow_self_signed = 1;
3218 context->setup_data.allow_expired_certs = 1;
3219 context->setup_data.cert_chain_validation = 1;
3220 context->setup_data.cert_chain_verify_depth = 10;
3221 context->setup_data.check_cert_revocation = 1;
3222 context->setup_data.allow_no_crl = 1;
3223 context->setup_data.allow_expired_crl = 1;
3224 context->setup_data.allow_bad_md_hash = 1;
3225 context->setup_data.allow_short_rsa_length = 1;
3227#if COAP_SERVER_SUPPORT
3229 if (context->dtls.ctx) {
3231#if OPENSSL_VERSION_NUMBER < 0x10101000L
3232 if (!setup_pki_server(context->dtls.ctx, setup_data))
3241#if OPENSSL_VERSION_NUMBER < 0x10101000L
3242 if (SSLeay() >= 0x10101000L) {
3243 coap_log_warn(
"OpenSSL compiled with %lux, linked with %lux, so "
3244 "no certificate checking\n",
3245 OPENSSL_VERSION_NUMBER, SSLeay());
3247 SSL_CTX_set_tlsext_servername_arg(context->dtls.ctx, &context->setup_data);
3248 SSL_CTX_set_tlsext_servername_callback(context->dtls.ctx,
3249 tls_server_name_call_back);
3251 SSL_CTX_set_client_hello_cb(context->dtls.ctx,
3252 tls_client_hello_call_back,
3256#if !COAP_DISABLE_TCP
3257 if (context->tls.ctx) {
3259#if OPENSSL_VERSION_NUMBER < 0x10101000L
3260 if (!setup_pki_server(context->tls.ctx, setup_data))
3269#if OPENSSL_VERSION_NUMBER < 0x10101000L
3270 if (SSLeay() >= 0x10101000L) {
3271 coap_log_warn(
"OpenSSL compiled with %lux, linked with %lux, so "
3272 "no certificate checking\n",
3273 OPENSSL_VERSION_NUMBER, SSLeay());
3275 SSL_CTX_set_tlsext_servername_arg(context->tls.ctx, &context->setup_data);
3276 SSL_CTX_set_tlsext_servername_callback(context->tls.ctx,
3277 tls_server_name_call_back);
3279 SSL_CTX_set_client_hello_cb(context->tls.ctx,
3280 tls_client_hello_call_back,
3284 SSL_CTX_set_alpn_select_cb(context->tls.ctx, server_alpn_callback, NULL);
3292 if (!context->dtls.ssl) {
3294 context->dtls.ssl = SSL_new(context->dtls.ctx);
3295 if (!context->dtls.ssl)
3297 bio = BIO_new(context->dtls.meth);
3299 SSL_free(context->dtls.ssl);
3300 context->dtls.ssl = NULL;
3303 SSL_set_bio(context->dtls.ssl, bio, bio);
3304 SSL_set_app_data(context->dtls.ssl, NULL);
3305 SSL_set_options(context->dtls.ssl, SSL_OP_COOKIE_EXCHANGE);
3308 context->psk_pki_enabled |= IS_PKI;
3317 const char *ca_file,
3320 coap_openssl_context_t *context =
3322 if (context->dtls.ctx) {
3323 if (!SSL_CTX_load_verify_locations(context->dtls.ctx, ca_file, ca_dir)) {
3325 ca_file ? ca_file :
"NULL", ca_dir ? ca_dir :
"NULL");
3329#if !COAP_DISABLE_TCP
3330 if (context->tls.ctx) {
3331 if (!SSL_CTX_load_verify_locations(context->tls.ctx, ca_file, ca_dir)) {
3333 ca_file ? ca_file :
"NULL", ca_dir ? ca_dir :
"NULL");
3343#if OPENSSL_VERSION_NUMBER >= 0x30000000L
3344 coap_openssl_context_t *context =
3346 if (context->dtls.ctx) {
3347 if (!SSL_CTX_set_default_verify_store(context->dtls.ctx)) {
3352#if !COAP_DISABLE_TCP
3353 if (context->tls.ctx) {
3354 if (!SSL_CTX_set_default_verify_store(context->tls.ctx)) {
3363 coap_log_warn(
"coap_context_set_pki_trust_store: (D)TLS environment "
3364 "not supported for OpenSSL < v3.0.0\n");
3371 coap_openssl_context_t *context =
3373 return context->psk_pki_enabled ? 1 : 0;
3380 coap_openssl_context_t *context = (coap_openssl_context_t *)handle;
3382 if (context->dtls.ssl)
3383 SSL_free(context->dtls.ssl);
3384 if (context->dtls.ctx)
3385 SSL_CTX_free(context->dtls.ctx);
3386 if (context->dtls.cookie_hmac)
3387 HMAC_CTX_free(context->dtls.cookie_hmac);
3388 if (context->dtls.meth)
3389 BIO_meth_free(context->dtls.meth);
3390 if (context->dtls.bio_addr)
3391 BIO_ADDR_free(context->dtls.bio_addr);
3392#if !COAP_DISABLE_TCP
3393 if (context->tls.ctx)
3394 SSL_CTX_free(context->tls.ctx);
3395 if (context->tls.meth)
3396 BIO_meth_free(context->tls.meth);
3398 for (i = 0; i < context->sni_count; i++) {
3399 OPENSSL_free(context->sni_entry_list[i].sni);
3400#if OPENSSL_VERSION_NUMBER < 0x10101000L
3401 SSL_CTX_free(context->sni_entry_list[i].ctx);
3404 if (context->sni_count)
3405 OPENSSL_free(context->sni_entry_list);
3406#if OPENSSL_VERSION_NUMBER < 0x10101000L
3407 for (i = 0; i < context->psk_sni_count; i++) {
3408 OPENSSL_free((
char *)context->psk_sni_entry_list[i].sni);
3409 SSL_CTX_free(context->psk_sni_entry_list[i].ctx);
3411 if (context->psk_sni_count)
3412 OPENSSL_free(context->psk_sni_entry_list);
3417#if COAP_SERVER_SUPPORT
3421 SSL *nssl = NULL, *ssl = NULL;
3422 coap_ssl_data *data;
3423 coap_dtls_context_t *dtls = &((coap_openssl_context_t *)session->
context->
dtls_context)->dtls;
3428 nssl = SSL_new(dtls->ctx);
3431 nbio = BIO_new(dtls->meth);
3434 SSL_set_bio(nssl, nbio, nbio);
3435 SSL_set_app_data(nssl, NULL);
3436 SSL_set_options(nssl, SSL_OP_COOKIE_EXCHANGE);
3437 SSL_set_mtu(nssl, (
long)session->
mtu);
3441 SSL_set_app_data(ssl, session);
3443 rbio = SSL_get_rbio(ssl);
3444 data = rbio ? (coap_ssl_data *)BIO_get_data(rbio) : NULL;
3447 data->session = session;
3451 if (psk_hint != NULL && psk_hint->
length) {
3452 char *hint = OPENSSL_malloc(psk_hint->
length + 1);
3455 memcpy(hint, psk_hint->
s, psk_hint->
length);
3456 hint[psk_hint->
length] =
'\000';
3457 SSL_use_psk_identity_hint(ssl, hint);
3464 r = SSL_accept(ssl);
3466 int err = SSL_get_error(ssl, r);
3467 if (err != SSL_ERROR_WANT_READ && err != SSL_ERROR_WANT_WRITE)
3485#if COAP_CLIENT_SUPPORT
3489 coap_openssl_context_t *context =
3492 if (context->psk_pki_enabled & IS_PSK) {
3497 SSL_set_tlsext_host_name(ssl, setup_data->
client_sni) != 1) {
3501 SSL_set_psk_client_callback(ssl, coap_dtls_psk_client_callback);
3502#if COAP_SERVER_SUPPORT
3503 SSL_set_psk_server_callback(ssl, coap_dtls_psk_server_callback);
3505 SSL_set_cipher_list(ssl, COAP_OPENSSL_PSK_CIPHERS);
3508 SSL_set_max_proto_version(ssl, DTLS1_2_VERSION);
3510#if !COAP_DISABLE_TCP
3512 SSL_set_max_proto_version(ssl, TLS1_2_VERSION);
3515 coap_log_debug(
"CoAP Client restricted to (D)TLS1.2 with Identity Hint callback\n");
3518 if ((context->psk_pki_enabled & IS_PKI) ||
3519 (context->psk_pki_enabled & (IS_PSK | IS_PKI)) == 0) {
3526 if (!(context->psk_pki_enabled & IS_PKI)) {
3543#if !COAP_DISABLE_TCP
3545 SSL_set_alpn_protos(ssl, coap_alpn,
sizeof(coap_alpn));
3550 SSL_set_tlsext_host_name(ssl, setup_data->
client_sni) != 1) {
3556 X509_VERIFY_PARAM *param;
3558 param = X509_VERIFY_PARAM_new();
3560 X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_CRL_CHECK);
3561 SSL_set1_param(ssl, param);
3562 X509_VERIFY_PARAM_free(param);
3570 SSL_VERIFY_CLIENT_ONCE |
3571 SSL_VERIFY_FAIL_IF_NO_PEER_CERT,
3572 tls_verify_call_back);
3574 SSL_set_verify(ssl, SSL_VERIFY_NONE, tls_verify_call_back);
3581#if COAP_DTLS_RETRANSMIT_MS != 1000
3582#if OPENSSL_VERSION_NUMBER >= 0x10101000L
3584 DTLS_set_timer_cb(ssl, timer_cb);
3595 coap_ssl_data *data;
3597 coap_openssl_context_t *context = ((coap_openssl_context_t *)session->
context->
dtls_context);
3598 coap_dtls_context_t *dtls = &context->dtls;
3600 ssl = SSL_new(dtls->ctx);
3603 bio = BIO_new(dtls->meth);
3606 data = (coap_ssl_data *)BIO_get_data(bio);
3609 data->session = session;
3610 SSL_set_bio(ssl, bio, bio);
3611 SSL_set_app_data(ssl, session);
3612 SSL_set_options(ssl, SSL_OP_COOKIE_EXCHANGE);
3613 SSL_set_mtu(ssl, (
long)session->
mtu);
3615 if (!setup_client_ssl_session(session, ssl))
3620 r = SSL_connect(ssl);
3622 int ret = SSL_get_error(ssl, r);
3623 if (ret != SSL_ERROR_WANT_READ && ret != SSL_ERROR_WANT_WRITE)
3641 SSL *ssl = (SSL *)session->
tls;
3643 SSL_set_mtu(ssl, (
long)session->
mtu);
3649 SSL *ssl = (SSL *)session->
tls;
3651 if (!SSL_in_init(ssl) && !(SSL_get_shutdown(ssl) & SSL_SENT_SHUTDOWN)) {
3652 int r = SSL_shutdown(ssl);
3657 session->
tls = NULL;
3665 const uint8_t *data,
size_t data_len) {
3667 SSL *ssl = (SSL *)session->
tls;
3676 r = SSL_write(ssl, data, (
int)data_len);
3679 int err = SSL_get_error(ssl, r);
3680 if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) {
3683 if (err == SSL_ERROR_ZERO_RETURN)
3685 else if (err == SSL_ERROR_SSL) {
3686 unsigned long e = ERR_get_error();
3688 coap_log_info(
"***%s: coap_dtls_send: cannot send PDU: %d: %s\n",
3690 ERR_GET_REASON(e), ERR_reason_error_string(e));
3693 coap_log_info(
"***%s: coap_dtls_send: cannot send PDU: %d\n",
3712 if (r == (ssize_t)data_len)
3735 SSL *ssl = (SSL *)session->
tls;
3736 coap_ssl_data *ssl_data;
3740 rbio = ssl ? SSL_get_rbio(ssl) : NULL;
3741 ssl_data = rbio ? (coap_ssl_data *)BIO_get_data(rbio) : NULL;
3742 return ssl_data ? ssl_data->timeout : 1000;
3751 SSL *ssl = (SSL *)session->
tls;
3755 (DTLSv1_handle_timeout(ssl) < 0)) {
3765#if COAP_SERVER_SUPPORT
3768 const uint8_t *data,
size_t data_len) {
3769 coap_dtls_context_t *dtls = &((coap_openssl_context_t *)session->
context->
dtls_context)->dtls;
3770 coap_ssl_data *ssl_data;
3774 SSL_set_mtu(dtls->ssl, (
long)session->
mtu);
3775 rbio = dtls->ssl ? SSL_get_rbio(dtls->ssl) : NULL;
3776 ssl_data = rbio ? (coap_ssl_data *)BIO_get_data(rbio) : NULL;
3777 assert(ssl_data != NULL);
3782 if (ssl_data->pdu_len) {
3783 coap_log_err(
"** %s: Previous data not read %u bytes\n",
3786 ssl_data->session = session;
3787 ssl_data->pdu = data;
3788 ssl_data->pdu_len = (unsigned)data_len;
3789 r = DTLSv1_listen(dtls->ssl, dtls->bio_addr);
3791 int err = SSL_get_error(dtls->ssl, r);
3792 if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) {
3812 coap_ssl_data *ssl_data;
3813 SSL *ssl = (SSL *)session->
tls;
3816#if OPENSSL_VERSION_NUMBER >= 0x30000000L
3820 assert(ssl != NULL);
3822 int in_init = SSL_in_init(ssl);
3824 rbio = ssl ? SSL_get_rbio(ssl) : NULL;
3825 ssl_data = rbio ? (coap_ssl_data *)BIO_get_data(rbio) : NULL;
3826 assert(ssl_data != NULL);
3832 if (ssl_data->pdu_len) {
3833 coap_log_err(
"** %s: Previous data not read %u bytes\n",
3836 ssl_data->pdu = data;
3837 ssl_data->pdu_len = (unsigned)data_len;
3840#if OPENSSL_VERSION_NUMBER >= 0x30000000L
3844 r = SSL_read(ssl, pdu, (
int)
sizeof(pdu));
3851 int err = SSL_get_error(ssl, r);
3852 if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) {
3853 if (in_init && SSL_is_init_finished(ssl)) {
3861 if (err == SSL_ERROR_ZERO_RETURN)
3863 else if (err == SSL_ERROR_SSL) {
3864 unsigned long e = ERR_get_error();
3866#if OPENSSL_VERSION_NUMBER >= 0x30000000L
3867#include <openssl/proverr.h>
3868 if (ERR_GET_REASON(e) == PROV_R_SEARCH_ONLY_SUPPORTED_FOR_DIRECTORIES && !retry) {
3874 coap_log_info(
"***%s: coap_dtls_receive: cannot recv PDU: %d: %s\n",
3876 ERR_GET_REASON(e), ERR_reason_error_string(e));
3879 coap_log_info(
"***%s: coap_dtls_receive: cannot send PDU %d\n",
3898 if (ssl_data && ssl_data->pdu_len) {
3900 coap_log_debug(
"coap_dtls_receive: ret %d: remaining data %u\n", r, ssl_data->pdu_len);
3901 ssl_data->pdu_len = 0;
3902 ssl_data->pdu = NULL;
3909 unsigned int overhead = 37;
3910 const SSL_CIPHER *s_ciph = NULL;
3911 if (session->
tls != NULL)
3912 s_ciph = SSL_get_current_cipher(session->
tls);
3914 unsigned int ivlen, maclen, blocksize = 1, pad = 0;
3916 const EVP_CIPHER *e_ciph;
3920 e_ciph = EVP_get_cipherbynid(SSL_CIPHER_get_cipher_nid(s_ciph));
3922 switch (EVP_CIPHER_mode(e_ciph)) {
3923 case EVP_CIPH_GCM_MODE:
3924 ivlen = EVP_GCM_TLS_EXPLICIT_IV_LEN;
3925 maclen = EVP_GCM_TLS_TAG_LEN;
3928 case EVP_CIPH_CCM_MODE:
3929 ivlen = EVP_CCM_TLS_EXPLICIT_IV_LEN;
3930 SSL_CIPHER_description(s_ciph, cipher,
sizeof(cipher));
3931 if (strstr(cipher,
"CCM8"))
3937 case EVP_CIPH_CBC_MODE:
3938 e_md = EVP_get_digestbynid(SSL_CIPHER_get_digest_nid(s_ciph));
3939 blocksize = EVP_CIPHER_block_size(e_ciph);
3940 ivlen = EVP_CIPHER_iv_length(e_ciph);
3942 maclen = EVP_MD_size(e_md);
3945 case EVP_CIPH_STREAM_CIPHER:
3952 SSL_CIPHER_description(s_ciph, cipher,
sizeof(cipher));
3959 overhead = DTLS1_RT_HEADER_LENGTH + ivlen + maclen + blocksize - 1 + pad;
3964#if !COAP_DISABLE_TCP
3965#if COAP_CLIENT_SUPPORT
3971 coap_openssl_context_t *context = ((coap_openssl_context_t *)session->
context->
dtls_context);
3972 coap_tls_context_t *tls = &context->tls;
3974 ssl = SSL_new(tls->ctx);
3977 bio = BIO_new(tls->meth);
3980 BIO_set_data(bio, session);
3981 SSL_set_bio(ssl, bio, bio);
3982 SSL_set_app_data(ssl, session);
3984 if (!setup_client_ssl_session(session, ssl))
3987 r = SSL_connect(ssl);
3989 int ret = SSL_get_error(ssl, r);
3990 if (ret != SSL_ERROR_WANT_READ && ret != SSL_ERROR_WANT_WRITE)
3992 if (ret == SSL_ERROR_WANT_READ)
3994 if (ret == SSL_ERROR_WANT_WRITE) {
3996#ifdef COAP_EPOLL_SUPPORT
4010 if (SSL_is_init_finished(ssl)) {
4024#if COAP_SERVER_SUPPORT
4029 coap_tls_context_t *tls = &((coap_openssl_context_t *)session->
context->
dtls_context)->tls;
4033 ssl = SSL_new(tls->ctx);
4036 bio = BIO_new(tls->meth);
4039 BIO_set_data(bio, session);
4040 SSL_set_bio(ssl, bio, bio);
4041 SSL_set_app_data(ssl, session);
4044 if (psk_hint != NULL && psk_hint->
length) {
4045 char *hint = OPENSSL_malloc(psk_hint->
length + 1);
4048 memcpy(hint, psk_hint->
s, psk_hint->
length);
4049 hint[psk_hint->
length] =
'\000';
4050 SSL_use_psk_identity_hint(ssl, hint);
4057 r = SSL_accept(ssl);
4059 int err = SSL_get_error(ssl, r);
4060 if (err != SSL_ERROR_WANT_READ && err != SSL_ERROR_WANT_WRITE)
4062 if (err == SSL_ERROR_WANT_READ)
4064 if (err == SSL_ERROR_WANT_WRITE) {
4066#ifdef COAP_EPOLL_SUPPORT
4080 if (SSL_is_init_finished(ssl)) {
4085#if COAP_DTLS_RETRANSMIT_MS != 1000
4086#if OPENSSL_VERSION_NUMBER >= 0x10101000L
4088 DTLS_set_timer_cb(ssl, timer_cb);
4104 SSL *ssl = (SSL *)session->
tls;
4106 if (!SSL_in_init(ssl) && !(SSL_get_shutdown(ssl) & SSL_SENT_SHUTDOWN)) {
4107 int r = SSL_shutdown(ssl);
4112 session->
tls = NULL;
4125 SSL *ssl = (SSL *)session->
tls;
4131 in_init = !SSL_is_init_finished(ssl);
4134 r = SSL_write(ssl, data, (
int)data_len);
4137 int err = SSL_get_error(ssl, r);
4138 if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) {
4139 if (in_init && SSL_is_init_finished(ssl)) {
4145 if (err == SSL_ERROR_WANT_READ)
4147 else if (err == SSL_ERROR_WANT_WRITE) {
4149#ifdef COAP_EPOLL_SUPPORT
4159 if (err == SSL_ERROR_ZERO_RETURN)
4161 else if (err == SSL_ERROR_SSL) {
4162 unsigned long e = ERR_get_error();
4164 coap_log_info(
"***%s: coap_tls_write: cannot send PDU: %d: %s\n",
4166 ERR_GET_REASON(e), ERR_reason_error_string(e));
4169 coap_log_info(
"***%s: coap_tls_send: cannot send PDU: %d\n",
4174 }
else if (in_init && SSL_is_init_finished(ssl)) {
4193 if (r == (ssize_t)data_len)
4210 SSL *ssl = (SSL *)session->
tls;
4218 in_init = !SSL_is_init_finished(ssl);
4221 r = SSL_read(ssl, data, (
int)data_len);
4223 int err = SSL_get_error(ssl, r);
4224 if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) {
4225 if (in_init && SSL_is_init_finished(ssl)) {
4231 if (err == SSL_ERROR_WANT_READ)
4233 if (err == SSL_ERROR_WANT_WRITE) {
4235#ifdef COAP_EPOLL_SUPPORT
4245 if (err == SSL_ERROR_ZERO_RETURN)
4247 else if (err == SSL_ERROR_SSL) {
4248 unsigned long e = ERR_get_error();
4250 coap_log_info(
"***%s: coap_tls_read: cannot recv PDU: %d: %s\n",
4252 ERR_GET_REASON(e), ERR_reason_error_string(e));
4260 }
else if (in_init && SSL_is_init_finished(ssl)) {
4286#if COAP_SERVER_SUPPORT
4289 EVP_MD_CTX *digest_ctx = EVP_MD_CTX_new();
4292 EVP_DigestInit_ex(digest_ctx, EVP_sha256(), NULL);
4300 EVP_MD_CTX_free(digest_ctx);
4305 const uint8_t *data,
4307 return EVP_DigestUpdate(digest_ctx, data, data_len);
4314 int ret = EVP_DigestFinal_ex(digest_ctx, (uint8_t *)digest_buffer, &size);
4321#if COAP_WS_SUPPORT || COAP_OSCORE_SUPPORT
4323coap_crypto_output_errors(
const char *prefix) {
4324#if COAP_MAX_LOGGING_LEVEL < _COAP_LOG_WARN
4329 while ((e = ERR_get_error()))
4332 ERR_reason_error_string(e),
4333 ssl_function_definition(e));
4343static struct hash_algs {
4345 const EVP_MD *(*get_hash)(void);
4354static const EVP_MD *
4355get_hash_alg(
cose_alg_t alg,
size_t *length) {
4358 for (idx = 0; idx <
sizeof(hashs) /
sizeof(
struct hash_algs); idx++) {
4359 if (hashs[idx].alg == alg) {
4360 *length = hashs[idx].length;
4361 return hashs[idx].get_hash();
4364 coap_log_debug(
"get_hash_alg: COSE hash %d not supported\n", alg);
4372 unsigned int length;
4373 const EVP_MD *evp_md;
4374 EVP_MD_CTX *evp_ctx = NULL;
4378 if ((evp_md = get_hash_alg(alg, &hash_length)) == NULL) {
4379 coap_log_debug(
"coap_crypto_hash: algorithm %d not supported\n", alg);
4382 evp_ctx = EVP_MD_CTX_new();
4383 if (evp_ctx == NULL)
4385 if (EVP_DigestInit_ex(evp_ctx, evp_md, NULL) == 0)
4388 if (EVP_DigestUpdate(evp_ctx, data->
s, data->
length) == 0)
4394 if (EVP_DigestFinal_ex(evp_ctx,
dummy->s, &length) == 0)
4396 dummy->length = length;
4397 if (hash_length < dummy->length)
4398 dummy->length = hash_length;
4400 EVP_MD_CTX_free(evp_ctx);
4404 coap_crypto_output_errors(
"coap_crypto_hash");
4407 EVP_MD_CTX_free(evp_ctx);
4412#if COAP_OSCORE_SUPPORT
4418#include <openssl/evp.h>
4419#include <openssl/hmac.h>
4426static struct cipher_algs {
4428 const EVP_CIPHER *(*get_cipher)(void);
4433static const EVP_CIPHER *
4437 for (idx = 0; idx <
sizeof(ciphers) /
sizeof(
struct cipher_algs); idx++) {
4438 if (ciphers[idx].alg == alg)
4439 return ciphers[idx].get_cipher();
4441 coap_log_debug(
"get_cipher_alg: COSE cipher %d not supported\n", alg);
4450static struct hmac_algs {
4452 const EVP_MD *(*get_hmac)(void);
4459static const EVP_MD *
4463 for (idx = 0; idx <
sizeof(hmacs) /
sizeof(
struct hmac_algs); idx++) {
4464 if (hmacs[idx].hmac_alg == hmac_alg)
4465 return hmacs[idx].get_hmac();
4467 coap_log_debug(
"get_hmac_alg: COSE HMAC %d not supported\n", hmac_alg);
4473 return get_cipher_alg(alg) != NULL;
4482 return get_hmac_alg(hmac_alg) != NULL;
4486 if (1 != (Func)) { \
4495 size_t *max_result_len) {
4496 const EVP_CIPHER *cipher;
4499 int result_len = (int)(*max_result_len & INT_MAX);
4500 EVP_CIPHER_CTX *ctx;
4505 assert(params != NULL);
4506 if (!params || ((cipher = get_cipher_alg(params->
alg)) == NULL)) {
4513 ctx = EVP_CIPHER_CTX_new();
4518 C(EVP_EncryptInit_ex(ctx, cipher, NULL, NULL, NULL));
4519 C(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_CCM_SET_L, (
int)ccm->
l, NULL));
4520 C(EVP_CIPHER_CTX_ctrl(ctx,
4521 EVP_CTRL_AEAD_SET_IVLEN,
4524 C(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, (
int)ccm->
tag_len, NULL));
4525 C(EVP_EncryptInit_ex(ctx, NULL, NULL, ccm->
key.
s, ccm->
nonce));
4528 C(EVP_EncryptUpdate(ctx, NULL, &result_len, NULL, (
int)data->
length));
4529 if (aad && aad->
s && (aad->
length > 0)) {
4530 C(EVP_EncryptUpdate(ctx, NULL, &result_len, aad->
s, (
int)aad->
length));
4532 C(EVP_EncryptUpdate(ctx, result, &result_len, data->
s, (
int)data->
length));
4535 C(EVP_EncryptFinal_ex(ctx, result + result_len, &tmp));
4539 C(EVP_CIPHER_CTX_ctrl(ctx,
4540 EVP_CTRL_CCM_GET_TAG,
4542 result + result_len));
4544 *max_result_len = result_len + ccm->
tag_len;
4545 EVP_CIPHER_CTX_free(ctx);
4549 coap_crypto_output_errors(
"coap_crypto_aead_encrypt");
4558 size_t *max_result_len) {
4559 const EVP_CIPHER *cipher;
4565 EVP_CIPHER_CTX *ctx;
4570 assert(params != NULL);
4571 if (!params || ((cipher = get_cipher_alg(params->
alg)) == NULL)) {
4583 memcpy(&rwtag, &tag,
sizeof(rwtag));
4586 ctx = EVP_CIPHER_CTX_new();
4590 C(EVP_DecryptInit_ex(ctx, cipher, NULL, NULL, NULL));
4591 C(EVP_CIPHER_CTX_ctrl(ctx,
4592 EVP_CTRL_AEAD_SET_IVLEN,
4595 C(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, (
int)ccm->
tag_len, rwtag));
4596 C(EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_CCM_SET_L, (
int)ccm->
l, NULL));
4598 C(EVP_DecryptInit_ex(ctx, NULL, NULL, ccm->
key.
s, ccm->
nonce));
4600 C(EVP_DecryptUpdate(ctx, NULL, &len, NULL, (
int)data->
length));
4601 if (aad && aad->
s && (aad->
length > 0)) {
4602 C(EVP_DecryptUpdate(ctx, NULL, &len, aad->
s, (
int)aad->
length));
4604 tmp = EVP_DecryptUpdate(ctx, result, &len, data->
s, (
int)data->
length);
4605 EVP_CIPHER_CTX_free(ctx);
4607 *max_result_len = 0;
4610 *max_result_len = len;
4614 coap_crypto_output_errors(
"coap_crypto_aead_decrypt");
4623 unsigned int result_len;
4624 const EVP_MD *evp_md;
4631 if ((evp_md = get_hmac_alg(hmac_alg)) == 0) {
4632 coap_log_debug(
"coap_crypto_hmac: algorithm %d not supported\n", hmac_alg);
4638 result_len = (
unsigned int)
dummy->length;
4646 dummy->length = result_len;
4652 coap_crypto_output_errors(
"coap_crypto_hmac");
4664#pragma GCC diagnostic ignored "-Wunused-function"
#define COAP_RXBUFFER_SIZE
#define COAP_SOCKET_WANT_READ
non blocking socket is waiting for reading
#define COAP_SOCKET_WANT_WRITE
non blocking socket is waiting for writing
void coap_epoll_ctl_mod(coap_socket_t *sock, uint32_t events, const char *func)
Epoll specific function to modify the state of events that epoll is tracking on the appropriate file ...
Library specific build wrapper for coap_internal.h.
void * coap_malloc_type(coap_memory_tag_t type, size_t size)
Allocates a chunk of size bytes and returns a pointer to the newly allocated memory.
void coap_free_type(coap_memory_tag_t type, void *p)
Releases the memory that was allocated by coap_malloc_type().
int coap_dtls_context_set_pki(coap_context_t *ctx COAP_UNUSED, const coap_dtls_pki_t *setup_data COAP_UNUSED, const coap_dtls_role_t role COAP_UNUSED)
coap_tick_t coap_dtls_get_timeout(coap_session_t *session COAP_UNUSED, coap_tick_t now COAP_UNUSED)
ssize_t coap_tls_read(coap_session_t *session COAP_UNUSED, uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
coap_tick_t coap_dtls_get_context_timeout(void *dtls_context COAP_UNUSED)
int coap_dtls_receive(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
void * coap_dtls_get_tls(const coap_session_t *c_session COAP_UNUSED, coap_tls_library_t *tls_lib)
unsigned int coap_dtls_get_overhead(coap_session_t *session COAP_UNUSED)
int coap_dtls_context_load_pki_trust_store(coap_context_t *ctx COAP_UNUSED)
static coap_log_t dtls_log_level
int coap_dtls_context_check_keys_enabled(coap_context_t *ctx COAP_UNUSED)
ssize_t coap_dtls_send(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
ssize_t coap_tls_write(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
void coap_dtls_session_update_mtu(coap_session_t *session COAP_UNUSED)
int coap_dtls_context_set_pki_root_cas(coap_context_t *ctx COAP_UNUSED, const char *ca_file COAP_UNUSED, const char *ca_path COAP_UNUSED)
int coap_dtls_handle_timeout(coap_session_t *session COAP_UNUSED)
void coap_dtls_free_context(void *handle COAP_UNUSED)
void coap_dtls_free_session(coap_session_t *coap_session COAP_UNUSED)
void * coap_dtls_new_context(coap_context_t *coap_context COAP_UNUSED)
void coap_tls_free_session(coap_session_t *coap_session COAP_UNUSED)
void coap_digest_free(coap_digest_ctx_t *digest_ctx)
Free off coap_digest_ctx_t.
int coap_digest_final(coap_digest_ctx_t *digest_ctx, coap_digest_t *digest_buffer)
Finalize the coap_digest information into the provided digest_buffer.
int coap_digest_update(coap_digest_ctx_t *digest_ctx, const uint8_t *data, size_t data_len)
Update the coap_digest information with the next chunk of data.
coap_digest_ctx_t * coap_digest_setup(void)
Initialize a coap_digest.
coap_tick_t coap_ticks_from_rt_us(uint64_t t)
Helper function that converts POSIX wallclock time in us to coap ticks.
uint64_t coap_tick_t
This data type represents internal timer ticks with COAP_TICKS_PER_SECOND resolution.
int coap_prng_lkd(void *buf, size_t len)
Fills buf with len random bytes using the default pseudo random number generator.
int coap_handle_event_lkd(coap_context_t *context, coap_event_t event, coap_session_t *session)
Invokes the event handler of context for the given event and data.
int coap_handle_dgram(coap_context_t *ctx, coap_session_t *session, uint8_t *msg, size_t msg_len)
Parses and interprets a CoAP datagram with context ctx.
int coap_crypto_hmac(cose_hmac_alg_t hmac_alg, coap_bin_const_t *key, coap_bin_const_t *data, coap_bin_const_t **hmac)
Create a HMAC hash of the provided data.
int coap_crypto_aead_decrypt(const coap_crypto_param_t *params, coap_bin_const_t *data, coap_bin_const_t *aad, uint8_t *result, size_t *max_result_len)
Decrypt the provided encrypted data into plaintext.
int coap_crypto_aead_encrypt(const coap_crypto_param_t *params, coap_bin_const_t *data, coap_bin_const_t *aad, uint8_t *result, size_t *max_result_len)
Encrypt the provided plaintext data.
int coap_crypto_hash(cose_alg_t alg, const coap_bin_const_t *data, coap_bin_const_t **hash)
Create a hash of the provided data.
int coap_crypto_check_hkdf_alg(cose_hkdf_alg_t hkdf_alg)
Check whether the defined hkdf algorithm is supported by the underlying crypto library.
int coap_crypto_check_cipher_alg(cose_alg_t alg)
Check whether the defined cipher algorithm is supported by the underlying crypto library.
void * coap_tls_new_server_session(coap_session_t *coap_session)
Create a TLS new server-side session.
const coap_bin_const_t * coap_get_session_client_psk_identity(const coap_session_t *coap_session)
Get the current client's PSK identity.
void coap_dtls_startup(void)
Initialize the underlying (D)TLS Library layer.
int coap_dtls_define_issue(coap_define_issue_key_t type, coap_define_issue_fail_t fail, coap_dtls_key_t *key, const coap_dtls_role_t role, int ret)
Report PKI DEFINE type issue.
void * coap_dtls_new_client_session(coap_session_t *coap_session)
Create a new client-side session.
void * coap_dtls_new_server_session(coap_session_t *coap_session)
Create a new DTLS server-side session.
int coap_dtls_hello(coap_session_t *coap_session, const uint8_t *data, size_t data_len)
Handling client HELLO messages from a new candiate peer.
int coap_dtls_set_cid_tuple_change(coap_context_t *context, uint8_t every)
Set the Connection ID client tuple frequency change for testing CIDs.
int coap_dtls_is_context_timeout(void)
Check if timeout is handled per CoAP session or per CoAP context.
int coap_dtls_context_set_cpsk(coap_context_t *coap_context, coap_dtls_cpsk_t *setup_data)
Set the DTLS context's default client PSK information.
int coap_dtls_context_set_spsk(coap_context_t *coap_context, coap_dtls_spsk_t *setup_data)
Set the DTLS context's default server PSK information.
void coap_dtls_shutdown(void)
Close down the underlying (D)TLS Library layer.
const coap_bin_const_t * coap_get_session_client_psk_key(const coap_session_t *coap_session)
Get the current client's PSK key.
void * coap_tls_new_client_session(coap_session_t *coap_session)
Create a new TLS client-side session.
void coap_dtls_map_key_type_to_define(const coap_dtls_pki_t *setup_data, coap_dtls_key_t *key)
Map the PKI key definitions to the new DEFINE format.
const coap_bin_const_t * coap_get_session_server_psk_key(const coap_session_t *coap_session)
Get the current server's PSK key.
const coap_bin_const_t * coap_get_session_server_psk_hint(const coap_session_t *coap_session)
Get the current server's PSK identity hint.
@ COAP_DEFINE_KEY_PRIVATE
@ COAP_DEFINE_FAIL_NOT_SUPPORTED
#define COAP_DTLS_HINT_LENGTH
int coap_tls_engine_configure(coap_str_const_t *conf_mem)
Configure an ENGINE for a TLS library.
coap_tls_version_t * coap_get_tls_library_version(void)
Determine the type and version of the underlying (D)TLS library.
int coap_tls_engine_remove(void)
Remove a previously configured ENGINE from a TLS library.
@ COAP_PKI_KEY_DEF_PKCS11
The PKI key type is PKCS11 (pkcs11:...).
@ COAP_PKI_KEY_DEF_DER_BUF
The PKI key type is DER buffer (ASN.1).
@ COAP_PKI_KEY_DEF_PEM_BUF
The PKI key type is PEM buffer.
@ COAP_PKI_KEY_DEF_PEM
The PKI key type is PEM file.
@ COAP_PKI_KEY_DEF_ENGINE
The PKI key type is to be passed to ENGINE.
@ COAP_PKI_KEY_DEF_RPK_BUF
The PKI key type is RPK in buffer.
@ COAP_PKI_KEY_DEF_DER
The PKI key type is DER file.
@ COAP_PKI_KEY_DEF_PKCS11_RPK
The PKI key type is PKCS11 w/ RPK (pkcs11:...).
@ COAP_DTLS_ROLE_SERVER
Internal function invoked for server.
@ COAP_DTLS_ROLE_CLIENT
Internal function invoked for client.
@ COAP_PKI_KEY_DEFINE
The individual PKI key types are Definable.
@ COAP_ASN1_PKEY_DH
DH type.
@ COAP_ASN1_PKEY_NONE
NONE.
@ COAP_ASN1_PKEY_TLS1_PRF
TLS1_PRF type.
@ COAP_ASN1_PKEY_RSA2
RSA2 type.
@ COAP_ASN1_PKEY_DSA
DSA type.
@ COAP_ASN1_PKEY_DHX
DHX type.
@ COAP_ASN1_PKEY_DSA4
DSA4 type.
@ COAP_ASN1_PKEY_DSA2
DSA2 type.
@ COAP_ASN1_PKEY_RSA
RSA type.
@ COAP_ASN1_PKEY_DSA1
DSA1 type.
@ COAP_ASN1_PKEY_HKDF
HKDF type.
@ COAP_ASN1_PKEY_EC
EC type.
@ COAP_ASN1_PKEY_DSA3
DSA3 type.
@ COAP_ASN1_PKEY_HMAC
HMAC type.
@ COAP_ASN1_PKEY_CMAC
CMAC type.
@ COAP_TLS_LIBRARY_OPENSSL
Using OpenSSL library.
@ COAP_EVENT_DTLS_CLOSED
Triggerred when (D)TLS session closed.
@ COAP_EVENT_DTLS_CONNECTED
Triggered when (D)TLS session connected.
@ COAP_EVENT_DTLS_RENEGOTIATE
Triggered when (D)TLS session renegotiated.
@ COAP_EVENT_DTLS_ERROR
Triggered when (D)TLS error occurs.
#define coap_lock_callback_ret(r, func)
Dummy for no thread-safe code.
#define coap_log_debug(...)
coap_log_t coap_dtls_get_log_level(void)
Get the current (D)TLS logging.
#define coap_dtls_log(level,...)
Logging function.
void coap_dtls_set_log_level(coap_log_t level)
Sets the (D)TLS logging level to the specified level.
const char * coap_session_str(const coap_session_t *session)
Get session description.
#define coap_log_info(...)
#define coap_log_warn(...)
#define coap_log_err(...)
#define coap_log(level,...)
Logging function.
int coap_netif_available(coap_session_t *session)
Function interface to check whether netif for session is still available.
int cose_get_hmac_alg_for_hkdf(cose_hkdf_alg_t hkdf_alg, cose_hmac_alg_t *hmac_alg)
@ COSE_HMAC_ALG_HMAC384_384
@ COSE_HMAC_ALG_HMAC256_256
@ COSE_HMAC_ALG_HMAC512_512
@ COSE_ALGORITHM_SHA_256_64
@ COSE_ALGORITHM_SHA_256_256
@ COSE_ALGORITHM_AES_CCM_16_64_128
@ COSE_ALGORITHM_AES_CCM_16_64_256
int coap_session_refresh_psk_hint(coap_session_t *session, const coap_bin_const_t *psk_hint)
Refresh the session's current Identity Hint (PSK).
int coap_session_refresh_psk_key(coap_session_t *session, const coap_bin_const_t *psk_key)
Refresh the session's current pre-shared key (PSK).
int coap_session_refresh_psk_identity(coap_session_t *session, const coap_bin_const_t *psk_identity)
Refresh the session's current pre-shared identity (PSK).
void coap_session_disconnected_lkd(coap_session_t *session, coap_nack_reason_t reason)
Notify session that it has failed.
@ COAP_SESSION_STATE_HANDSHAKE
void coap_delete_str_const(coap_str_const_t *s)
Deletes the given const string and releases any memory allocated.
coap_binary_t * coap_new_binary(size_t size)
Returns a new binary object with at least size bytes storage allocated.
void coap_delete_binary(coap_binary_t *s)
Deletes the given coap_binary_t object and releases any memory allocated.
coap_str_const_t * coap_new_str_const(const uint8_t *data, size_t size)
Returns a new const string object with at least size+1 bytes storage allocated, and the provided data...
int coap_dtls_cid_is_supported(void)
Check whether (D)TLS CID is available.
int coap_dtls_psk_is_supported(void)
Check whether (D)TLS PSK is available.
int coap_tls_is_supported(void)
Check whether TLS is available.
int coap_oscore_is_supported(void)
Check whether OSCORE is available.
int coap_dtls_is_supported(void)
Check whether DTLS is available.
int coap_dtls_pki_is_supported(void)
Check whether (D)TLS PKI is available.
int coap_dtls_rpk_is_supported(void)
Check whether (D)TLS RPK is available.
int coap_dtls_pkcs11_is_supported(void)
Check whether (D)TLS PKCS11 is available.
CoAP binary data definition with const data.
size_t length
length of binary data
const uint8_t * s
read-only binary data
CoAP binary data definition.
The CoAP stack's global state is stored in a coap_context_t object.
coap_dtls_spsk_t spsk_setup_data
Contains the initial PSK server setup data.
The structure that holds the AES Crypto information.
size_t l
The number of bytes in the length field.
const uint8_t * nonce
must be exactly 15 - l bytes
coap_crypto_key_t key
The Key to use.
size_t tag_len
The size of the Tag.
The common structure that holds the Crypto information.
union coap_crypto_param_t::@2 params
coap_crypto_aes_ccm_t aes
Used if AES type encryption.
cose_alg_t alg
The COSE algorith to use.
The structure that holds the Client PSK information.
coap_bin_const_t identity
The structure used for defining the Client PSK setup data to be used.
uint8_t use_cid
Set to 1 if DTLS Connection ID is to be used.
void * ih_call_back_arg
Passed in to the Identity Hint callback function.
char * client_sni
If not NULL, SNI to use in client TLS setup.
coap_dtls_ih_callback_t validate_ih_call_back
Identity Hint check callback function.
uint8_t ec_jpake
Set to COAP_DTLS_CPSK_SETUP_VERSION to support this version of the struct.
The structure that holds the PKI key information.
coap_pki_key_define_t define
for definable type keys
union coap_dtls_key_t::@3 key
coap_pki_key_t key_type
key format type
The structure used for defining the PKI setup data to be used.
uint8_t allow_no_crl
1 ignore if CRL not there
void * cn_call_back_arg
Passed in to the CN callback function.
uint8_t cert_chain_validation
1 if to check cert_chain_verify_depth
uint8_t use_cid
1 if DTLS Connection ID is to be used (Client only, server always enabled) if supported
uint8_t check_cert_revocation
1 if revocation checks wanted
coap_dtls_pki_sni_callback_t validate_sni_call_back
SNI check callback function.
uint8_t cert_chain_verify_depth
recommended depth is 3
coap_dtls_security_setup_t additional_tls_setup_call_back
Additional Security callback handler that is invoked when libcoap has done the standard,...
uint8_t allow_expired_certs
1 if expired certs are allowed
uint8_t verify_peer_cert
Set to COAP_DTLS_PKI_SETUP_VERSION to support this version of the struct.
char * client_sni
If not NULL, SNI to use in client TLS setup.
uint8_t allow_self_signed
1 if self-signed certs are allowed.
void * sni_call_back_arg
Passed in to the sni callback function.
coap_dtls_cn_callback_t validate_cn_call_back
CN check callback function.
uint8_t allow_expired_crl
1 if expired crl is allowed
uint8_t is_rpk_not_cert
1 is RPK instead of Public Certificate.
uint8_t check_common_ca
1 if peer cert is to be signed by the same CA as the local cert
coap_dtls_key_t pki_key
PKI key definition.
The structure that holds the Server Pre-Shared Key and Identity Hint information.
The structure used for defining the Server PSK setup data to be used.
coap_dtls_psk_sni_callback_t validate_sni_call_back
SNI check callback function.
coap_dtls_id_callback_t validate_id_call_back
Identity check callback function.
void * id_call_back_arg
Passed in to the Identity callback function.
uint8_t ec_jpake
Set to COAP_DTLS_SPSK_SETUP_VERSION to support this version of the struct.
void * sni_call_back_arg
Passed in to the SNI callback function.
coap_dtls_spsk_info_t psk_info
Server PSK definition.
coap_layer_write_t l_write
coap_layer_establish_t l_establish
coap_const_char_ptr_t public_cert
define: Public Cert
coap_asn1_privatekey_type_t private_key_type
define: ASN1 Private Key Type (if needed)
const char * user_pin
define: User pin to access type PKCS11.
coap_const_char_ptr_t private_key
define: Private Key
coap_const_char_ptr_t ca
define: Common CA Certificate
size_t public_cert_len
define Public Cert length (if needed)
size_t ca_len
define CA Cert length (if needed)
coap_pki_define_t private_key_def
define: Private Key type definition
size_t private_key_len
define Private Key length (if needed)
coap_pki_define_t ca_def
define: Common CA type definition
coap_pki_define_t public_cert_def
define: Public Cert type definition
Abstraction of virtual session that can be attached to coap_context_t (client) or coap_endpoint_t (se...
unsigned int dtls_timeout_count
dtls setup retry counter
coap_bin_const_t * psk_key
If client, this field contains the current pre-shared key for server; When this field is NULL,...
coap_socket_t sock
socket object for the session, if any
coap_session_state_t state
current state of relationship with peer
coap_proto_t proto
protocol used
coap_dtls_cpsk_t cpsk_setup_data
client provided PSK initial setup data
size_t mtu
path or CSM mtu (xmt)
int dtls_event
Tracking any (D)TLS events on this session.
void * tls
security parameters
uint16_t max_retransmit
maximum re-transmit count (default 4)
coap_context_t * context
session's context
coap_layer_func_t lfunc[COAP_LAYER_LAST]
Layer functions to use.
coap_socket_flags_t flags
1 or more of COAP_SOCKET* flag values
CoAP string data definition with const data.
const uint8_t * s
read-only string data
size_t length
length of string
The structure used for returning the underlying (D)TLS library information.
uint64_t built_version
(D)TLS Built against Library Version
coap_tls_library_t type
Library type.
uint64_t version
(D)TLS runtime Library Version
const char * s_byte
signed char ptr
const uint8_t * u_byte
unsigned char ptr