20#if COAP_WITH_LIBTINYDTLS
23#undef PACKAGE_BUGREPORT
31#include <tinydtls/tinydtls.h>
32#include <tinydtls/dtls.h>
33#include <tinydtls/dtls_debug.h>
34#include <tinydtls/dtls_time.h>
38#include <dtls_debug.h>
42typedef struct coap_tiny_context_t {
43 struct dtls_context_t *dtls_context;
50#if (DTLS_MAX_CID_LENGTH > 0)
55#if ! defined(DTLS_PSK) && ! defined(DTLS_ECC)
56#error Neither DTLS_PSK or DTLS_ECC defined
59static dtls_tick_t dtls_tick_0 = 0;
117#if (DTLS_MAX_CID_LENGTH > 0)
124#if COAP_CLIENT_SUPPORT
131#if (DTLS_MAX_CID_LENGTH > 0)
132 c_context->testing_cids = every;
143dtls_map_logging(log_t d_level) {
158 case DTLS_LOG_NOTICE:
171#ifdef HAVE_DTLS_SET_LOG_HANDLER
174dtls_logging(log_t d_level,
const char *message) {
175 coap_log_t c_level = dtls_map_logging(d_level);
184 dtls_ticks(&dtls_tick_0);
186#ifdef HAVE_DTLS_SET_LOG_HANDLER
188 dtls_set_log_handler(dtls_logging);
208 const coap_tiny_context_t *t_context =
211 return t_context->dtls_context;
223 d_level = DTLS_LOG_EMERG;
226 d_level = DTLS_LOG_ALERT;
230 d_level = DTLS_LOG_CRIT;
233 d_level = DTLS_LOG_WARN;
236 d_level = DTLS_LOG_NOTICE;
239 d_level = DTLS_LOG_INFO;
245 d_level = DTLS_LOG_DEBUG;
248 dtls_set_log_level(d_level);
253 log_t d_level = dtls_get_log_level();
255 return dtls_map_logging(d_level);
261#if defined(WITH_CONTIKI) || defined(WITH_LWIP)
263 switch (s->addr.sa.sa_family) {
266 memcpy(&a->
addr, &s->
addr.
sin.sin_addr,
sizeof(s->addr.sin.sin_addr));
267 a->port = s->
addr.
sin.sin_port;
272 memcpy(&a->
addr, &s->
addr.
sin6.sin6_addr,
sizeof(s->addr.sin6.sin6_addr));
283#elif defined(WITH_RIOT_SOCK)
284 if (s->addr.family == AF_INET6) {
285 a->riot.family = s->
addr.family;
286 memcpy(&a->riot.
addr.ipv6, &s->
addr.ipv6,
287 sizeof(a->riot.
addr.ipv6));
288 a->riot.port = ntohs(s->addr.port);
291 }
else if (s->addr.family == AF_INET) {
292 a->riot.family = s->
addr.family;
293 memcpy(&a->riot.
addr.ipv4, &s->
addr.ipv4,
sizeof(a->riot.
addr.ipv4));
294 a->riot.port = ntohs(s->addr.port);
299 if (s->addr.sa.sa_family == AF_INET6) {
302 }
else if (s->addr.sa.sa_family == AF_INET) {
305#if COAP_AF_UNIX_SUPPORT
306 }
else if (s->addr.sa.sa_family == AF_UNIX) {
313 a->
size = (socklen_t)s->size;
321#if defined(WITH_CONTIKI) || defined(WITH_LWIP)
323#if LWIP_IPV6 && LWIP_IPV4
324 if (a->
addr.type == IPADDR_TYPE_V6) {
325 s->addr.sa.sa_family = AF_INET6;
326 s->size = (socklen_t)
sizeof(s->addr.sin6);
327 memcpy(&s->addr.sin6.sin6_addr, &a->
addr,
sizeof(s->addr.sin6.sin6_addr));
328 s->addr.sin6.sin6_port = a->port;
329 }
else if (a->
addr.type == IPADDR_TYPE_V4) {
330 s->
addr.
sa.sa_family = AF_INET;
331 s->size = (socklen_t)
sizeof(s->addr.sin);
332 memcpy(&s->addr.sin.sin_addr, &a->
addr,
sizeof(s->addr.sin.sin_addr));
333 s->addr.sin.sin_port = a->port;
336 s->
addr.
sa.sa_family = AF_INET;
337 s->size = (socklen_t)
sizeof(s->addr.sin);
338 memcpy(&s->addr.sin.sin_addr, &a->
addr,
sizeof(s->addr.sin.sin_addr));
339 s->addr.sin.sin_port = a->port;
341 s->
addr.
sa.sa_family = AF_INET6;
342 s->size = (socklen_t)
sizeof(s->addr.sin6);
343 memcpy(&s->addr.sin6.sin6_addr, &a->
addr,
sizeof(s->addr.sin6.sin6_addr));
344 s->addr.sin6.sin6_port = a->port;
348 s->
size = (
unsigned char)
sizeof(s->addr);
352#elif defined(WITH_RIOT_SOCK)
353 if (a->riot.family == AF_INET6) {
354 s->
size =
sizeof(s->addr.ipv6);
355 s->addr.family = a->riot.family;
356 memcpy(&s->addr.ipv6, &a->riot.
addr.ipv6,
357 sizeof(s->addr.ipv6));
358 s->addr.port = htons(a->riot.port);
360 }
else if (a->r.family == AF_INET) {
361 s->size =
sizeof(s->addr.ipv4);
362 s->addr.family = a->r.family;
363 memcpy(&a->
addr.ipv4, &s->r.
addr.ipv4,
sizeof(a->
addr.ipv4));
364 s->addr.port = htons(a->r.port);
368 if (a->
addr.
sa.sa_family == AF_INET6) {
369 s->size = (socklen_t)
sizeof(s->addr.sin6);
371 }
else if (a->
addr.
sa.sa_family == AF_INET) {
372 s->size = (socklen_t)
sizeof(s->addr.sin);
374#if COAP_AF_UNIX_SUPPORT
375 }
else if (a->
addr.
sa.sa_family == AF_UNIX) {
381 s->size = (socklen_t)a->
size;
388dtls_send_to_peer(
struct dtls_context_t *dtls_context,
389 session_t *dtls_session, uint8 *data,
size_t len) {
390 coap_tiny_context_t *t_context =
391 (coap_tiny_context_t *)dtls_get_app_data(dtls_context);
397 assert(coap_context);
398 get_session_addr(dtls_session, &remote_addr);
401 coap_log_warn(
"dtls_send_to_peer: cannot find local interface\n");
405 if (ret == -1 && (errno == ENOTCONN || errno == ECONNREFUSED))
411dtls_application_data(
struct dtls_context_t *dtls_context,
412 session_t *dtls_session, uint8 *data,
size_t len) {
413 coap_tiny_context_t *t_context =
414 (coap_tiny_context_t *)dtls_get_app_data(dtls_context);
419 assert(coap_context);
420 get_session_addr(dtls_session, &remote_addr);
423 coap_log_debug(
"dropped message that was received on invalid interface\n");
432static int coap_event_dtls = 0;
435dtls_event(
struct dtls_context_t *dtls_context,
436 session_t *dtls_session,
437 dtls_alert_level_t level,
438 unsigned short code) {
442 if (level == DTLS_ALERT_LEVEL_FATAL)
447 case DTLS_ALERT_CLOSE_NOTIFY: {
451 case DTLS_EVENT_CONNECTED: {
455#ifdef DTLS_EVENT_RENEGOTIATE
456 case DTLS_EVENT_RENEGOTIATE: {
473get_psk_info(
struct dtls_context_t *dtls_context,
474 const session_t *dtls_session,
475 dtls_credentials_type_t type,
476 const uint8_t *
id,
size_t id_len,
477 unsigned char *result,
size_t result_length) {
479 coap_tiny_context_t *t_context =
480 (coap_tiny_context_t *)dtls_get_app_data(dtls_context);
483 int fatal_error = DTLS_ALERT_INTERNAL_ERROR;
485#if COAP_CLIENT_SUPPORT
491#if COAP_SERVER_SUPPORT
496 assert(coap_context);
497 get_session_addr(dtls_session, &remote_addr);
505 case DTLS_PSK_IDENTITY:
507#if COAP_CLIENT_SUPPORT
519 id ? (
const char *)
id :
"");
531 psk_identity = &cpsk_info->
identity;
540 if (psk_identity ==
NULL) {
542 fatal_error = DTLS_ALERT_CLOSE_NOTIFY;
545 if (psk_identity->
length > result_length) {
550 result_length = psk_identity->
length;
552 memcpy(result, psk_identity->
s, result_length);
553 return result_length;
559#if COAP_CLIENT_SUPPORT
562 if (psk_key ==
NULL) {
564 fatal_error = DTLS_ALERT_CLOSE_NOTIFY;
567 if (psk_key->
length > result_length) {
572 result_length = psk_key->
length;
574 memcpy(result, psk_key->
s, result_length);
575 return result_length;
578#if COAP_SERVER_SUPPORT
582 lidentity.
length =
id ? id_len : 0;
583 lidentity.
s =
id ? (
const uint8_t *)
id : (const uint8_t *)
"";
584 setup_sdata = &coap_session->
context->spsk_setup_data;
590 (
int)lidentity.
length, lidentity.
s);
601 if (psk_key ==
NULL) {
607 if (psk_key->
length > result_length) {
612 result_length = psk_key->
length;
614 memcpy(result, psk_key->
s, result_length);
615 return result_length;
621#if COAP_SERVER_SUPPORT
623 if (psk_hint ==
NULL)
625 if (psk_hint->
length > result_length) {
630 result_length = psk_hint->
length;
632 memcpy(result, psk_hint->
s, result_length);
633 return result_length;
643 return dtls_alert_fatal_create(fatal_error);
648dtls_update_user_parameters(
struct dtls_context_t *ctx,
649 session_t *session, dtls_user_parameters_t *user_parameters) {
652#if (DTLS_MAX_CID_LENGTH > 0)
653 coap_tiny_context_t *t_context =
654 (coap_tiny_context_t *)dtls_get_app_data(ctx);
655 user_parameters->support_cid = t_context ? t_context->use_cid : 0;
657 (void)user_parameters;
663get_ecdsa_key(
struct dtls_context_t *dtls_context,
665 const dtls_ecdsa_key_t **result) {
666 static dtls_ecdsa_key_t ecdsa_key;
667 coap_tiny_context_t *t_context =
668 (coap_tiny_context_t *)dtls_get_app_data(dtls_context);
670 ecdsa_key.curve = DTLS_ECDH_CURVE_SECP256R1;
671 ecdsa_key.priv_key = t_context->priv_key->s;
672 ecdsa_key.pub_key_x = t_context->pub_key->s;
673 ecdsa_key.pub_key_y = &t_context->pub_key->s[DTLS_EC_KEY_SIZE];
675 *result = &ecdsa_key;
680static const unsigned char cert_asn1_header[] = {
684 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x02, 0x01,
686 0x2A, 0x86, 0x48, 0xCE, 0x3D, 0x03, 0x01, 0x07,
690#define DTLS_CE_LENGTH (sizeof(cert_asn1_header) + key_size + key_size)
693verify_ecdsa_key(
struct dtls_context_t *dtls_context
COAP_UNUSED,
695 const uint8_t *other_pub_x,
696 const uint8_t *other_pub_y,
698 coap_tiny_context_t *t_context =
699 (coap_tiny_context_t *)dtls_get_app_data(dtls_context);
702 if (t_context && t_context->setup_data.validate_cn_call_back) {
704 get_session_addr(dtls_session, &remote_addr);
706 &remote_addr, dtls_session->ifindex);
719 memcpy(p, &cert_asn1_header,
sizeof(cert_asn1_header));
720 p +=
sizeof(cert_asn1_header);
722 memcpy(p, other_pub_x, key_size);
725 memcpy(p, other_pub_y, key_size);
730 buf, p-buf, c_session, 0, 1, t_context->setup_data.cn_call_back_arg));
739static dtls_handler_t ec_cb = {
740 .write = dtls_send_to_peer,
741 .read = dtls_application_data,
742 .get_user_parameters = dtls_update_user_parameters,
745 .get_psk_info =
NULL,
747 .get_ecdsa_key = get_ecdsa_key,
748 .verify_ecdsa_key = verify_ecdsa_key
752static dtls_handler_t psk_cb = {
753 .write = dtls_send_to_peer,
754 .read = dtls_application_data,
755 .get_user_parameters = dtls_update_user_parameters,
758 .get_psk_info = get_psk_info,
761 .get_ecdsa_key =
NULL,
762 .verify_ecdsa_key =
NULL
769 struct dtls_context_t *dtls_context = t_context ? dtls_new_context(t_context) :
NULL;
772 memset(t_context, 0,
sizeof(coap_tiny_context_t));
773 t_context->coap_context = coap_context;
774 t_context->dtls_context = dtls_context;
775 dtls_set_handler(dtls_context, &psk_cb);
788 coap_tiny_context_t *t_context = (coap_tiny_context_t *)handle;
790 if (t_context->priv_key) {
792 t_context->priv_key =
NULL;
794 if (t_context->pub_key) {
796 t_context->pub_key =
NULL;
799 if (t_context->dtls_context)
800 dtls_free_context(t_context->dtls_context);
812 dtls_session_init(dtls_session);
814 dtls_session->ifindex = session->
ifindex;
821#if COAP_SERVER_SUPPORT
824 return coap_dtls_new_session(session);
828#if COAP_CLIENT_SUPPORT
833 dtls_context_t *dtls_context = t_context ? t_context->dtls_context :
NULL;
835 session_t *dtls_session = dtls_context ? !is_af_unix ? coap_dtls_new_session(session) :
NULL :
NULL;
840 dtls_get_peer(dtls_context, dtls_session);
846 if (dtls_connect(dtls_context, dtls_session) >= 0) {
848 dtls_get_peer(dtls_context, dtls_session);
869 coap_tiny_context_t *t_context =
871 dtls_context_t *dtls_context = t_context ? t_context->dtls_context :
NULL;
873 if (dtls_context ==
NULL)
875 if (coap_session->
tls && dtls_context) {
876 dtls_peer_t *peer = dtls_get_peer(dtls_context, (session_t *)coap_session->
tls);
878 dtls_reset_peer(dtls_context, peer);
880 dtls_close(dtls_context, (session_t *)coap_session->
tls);
895 dtls_context_t *dtls_context = t_context ? t_context->dtls_context :
NULL;
897 assert(dtls_context);
899 coap_event_dtls = -1;
903 memcpy(&data_rw, &data,
sizeof(data_rw));
904 res = dtls_write(dtls_context,
905 (session_t *)session->
tls, data_rw, data_len);
910 if (coap_event_dtls >= 0) {
915#if (DTLS_MAX_CID_LENGTH > 0) && COAP_CLIENT_SUPPORT
917 dtls_peer_t *peer = dtls_get_peer(dtls_context, (session_t *)session->
tls);
918 dtls_security_parameters_t *security = dtls_security_params(peer);
920 if (security->write_cid_length > 0) {
921 session->negotiated_cid = 1;
924 session->negotiated_cid = 0;
944 clock_time_t next = 0;
945 coap_tiny_context_t *t_context = (coap_tiny_context_t *)tiny_context;
946 dtls_context_t *dtls_context = t_context ? t_context->dtls_context :
NULL;
948 dtls_check_retransmit(dtls_context, &next);
977 session_t *dtls_session = (session_t *)session->
tls;
981 dtls_context_t *dtls_context = t_context ? t_context->dtls_context :
NULL;
983 assert(dtls_context);
984 coap_event_dtls = -1;
986 memcpy(&data_rw, &data,
sizeof(data_rw));
987 err = dtls_handle_message(dtls_context, dtls_session, data_rw, (
int)data_len);
993 if (coap_event_dtls >= 0) {
999#if (DTLS_MAX_CID_LENGTH > 0) && COAP_CLIENT_SUPPORT
1001 dtls_peer_t *peer = dtls_get_peer(dtls_context, (session_t *)session->
tls);
1002 dtls_security_parameters_t *security = dtls_security_params(peer);
1004 if (security->write_cid_length > 0) {
1005 session->negotiated_cid = 1;
1007 session->negotiated_cid = 0;
1020#if COAP_SERVER_SUPPORT
1023 const uint8_t *data,
1026 session_t dtls_session;
1028 dtls_context_t *dtls_context = t_context ? t_context->dtls_context :
NULL;
1031 assert(dtls_context);
1032 dtls_session_init(&dtls_session);
1034 dtls_session.ifindex = session->
ifindex;
1036 memcpy(&data_rw, &data,
sizeof(data_rw));
1037 int res = dtls_handle_message(dtls_context, &dtls_session,
1038 data_rw, (
int)data_len);
1040 if (dtls_get_peer(dtls_context, &dtls_session))
1063 const char *vers = dtls_package_version();
1067 long int p1, p2 = 0, p3 = 0;
1070 p1 = strtol(vers, &endptr, 10);
1071 if (*endptr ==
'.') {
1072 p2 = strtol(endptr+1, &endptr, 10);
1073 if (*endptr ==
'.') {
1074 p3 = strtol(endptr+1, &endptr, 10);
1077 version.
version = (p1 << 16) | (p2 << 8) | p3;
1085static const uint8_t b64_6[256] = {
1086 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,
1087 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,
1089 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 62, 64, 64, 64, 63,
1091 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 64, 64, 64, 64, 64, 64,
1093 64, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14,
1095 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 64, 64, 64, 64, 64,
1097 64, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40,
1099 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 64, 64, 64, 64, 64,
1100 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,
1101 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,
1102 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,
1103 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,
1104 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,
1105 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,
1106 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64,
1107 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64, 64
1112pem_base64_decode(
const uint8_t *data,
size_t size) {
1114 size_t nbytesdecoded;
1119 size_t nb64bytes = 0;
1121 for (i = 0; i < size; i++) {
1129 if (b64_6[data[i]] == 64)
1131 tbuf[nb64bytes++] = data[i];
1137 nbytesdecoded = ((nb64bytes + 3) / 4) * 3;
1145 while (nb64bytes > 4) {
1146 *(out++) = b64_6[ptr[0]] << 2 | b64_6[ptr[1]] >> 4;
1147 *(out++) = b64_6[ptr[1]] << 4 | b64_6[ptr[2]] >> 2;
1148 *(out++) = b64_6[ptr[2]] << 6 | b64_6[ptr[3]];
1154 if (nb64bytes > 1) {
1155 *(out++) = b64_6[ptr[0]] << 2 | b64_6[ptr[1]] >> 4;
1157 if (nb64bytes > 2) {
1158 *(out++) = b64_6[ptr[1]] << 4 | b64_6[ptr[2]] >> 2;
1160 if (nb64bytes > 3) {
1161 *(out++) = b64_6[ptr[2]] << 6 | b64_6[ptr[3]];
1164 decoded->
length = nbytesdecoded - ((4 - nb64bytes) & 3);
1169typedef coap_binary_t *(*asn1_callback)(
const uint8_t *data,
size_t size);
1172asn1_verify_privkey(
const uint8_t *data,
size_t size) {
1175 if (size - 1 == DTLS_EC_KEY_SIZE && *data ==
'\000') {
1181 if (size != DTLS_EC_KEY_SIZE)
1188asn1_verify_pubkey(
const uint8_t *data,
size_t size) {
1193 if (size - 2 != 2 * DTLS_EC_KEY_SIZE)
1200asn1_verify_curve(
const uint8_t *data,
size_t size) {
1201 static uint8_t prime256v1_oid[] =
1203 { 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x03, 0x01, 0x07 };
1206 if (size !=
sizeof(prime256v1_oid) ||
1207 memcmp(data, prime256v1_oid, size) != 0)
1214asn1_verify_pkcs8_version(
const uint8_t *data,
size_t size) {
1216 if (size != 1 || *data != 0)
1223asn1_verify_ec_identifier(
const uint8_t *data,
size_t size) {
1224 static uint8_t ec_public_key_oid[] =
1226 { 0x2a, 0x86, 0x48, 0xce, 0x3d, 0x02, 0x01 };
1229 if (size !=
sizeof(ec_public_key_oid) ||
1230 memcmp(data, ec_public_key_oid, size) != 0)
1237asn1_verify_ec_key(
const uint8_t *data,
size_t size) {
1247asn1_derive_keys(coap_tiny_context_t *t_context,
1248 const uint8_t *priv_data,
size_t priv_len,
1249 const uint8_t *pub_data,
size_t pub_len,
1254 priv_len, asn1_verify_privkey);
1255 if (!t_context->priv_key) {
1260 if (t_context->priv_key->length - 1 == DTLS_EC_KEY_SIZE &&
1261 t_context->priv_key->s[0] ==
'\000') {
1262 t_context->priv_key->length--;
1263 t_context->priv_key->s++;
1271 coap_log_info(
"EC Private Key (RPK) invalid elliptic curve\n");
1273 t_context->priv_key =
NULL;
1280 asn1_verify_pubkey);
1281 if (!t_context->pub_key) {
1284 t_context->priv_key =
NULL;
1288 t_context->pub_key->s += 2;
1289 t_context->pub_key->length -= 2;
1290 dtls_set_handler(t_context->dtls_context, &ec_cb);
1295ec_abstract_pkcs8_asn1(
const uint8_t *asn1_ptr,
size_t asn1_length) {
1299 asn1_verify_pkcs8_version);
1306 asn1_verify_ec_identifier);
1314 coap_log_info(
"EC Private Key (RPK) invalid elliptic curve\n");
1320 asn1_verify_ec_key);
1325pem_decode_mem_asn1(
const char *begstr,
const uint8_t *str) {
1326 char *bcp = str ? strstr((
const char *)str, begstr) :
NULL;
1327 char *tcp = bcp ? strstr(bcp,
"-----END ") :
NULL;
1330 bcp += strlen(begstr);
1331 return pem_base64_decode((
const uint8_t *)bcp, tcp - bcp);
1343 coap_tiny_context_t *t_context;
1360 if (t_context->priv_key) {
1362 t_context->priv_key =
NULL;
1364 if (t_context->pub_key) {
1366 t_context->pub_key =
NULL;
1368 t_context->setup_data = *setup_data;
1383 asn1_priv = pem_decode_mem_asn1(
"-----BEGIN EC PRIVATE KEY-----",
1386 asn1_priv = pem_decode_mem_asn1(
"-----BEGIN PRIVATE KEY-----",
1393 asn1_temp = ec_abstract_pkcs8_asn1(asn1_priv->
s, asn1_priv->
length);
1395 coap_log_info(
"*** setup_pki: (D)TLS: PKCS#8 Private Key (RPK) invalid\n");
1402 asn1_priv = asn1_temp;
1405 asn1_pub = pem_decode_mem_asn1(
"-----BEGIN PUBLIC KEY-----",
1408 asn1_pub = pem_decode_mem_asn1(
"-----BEGIN EC PRIVATE KEY-----",
1411 asn1_pub = pem_decode_mem_asn1(
"-----BEGIN PRIVATE KEY-----",
1414 coap_log_info(
"*** setup_pki: (D)TLS: Public Key (RPK) invalid\n");
1420 asn1_temp = ec_abstract_pkcs8_asn1(asn1_pub->
s, asn1_pub->
length);
1422 coap_log_info(
"*** setup_pki: (D)TLS: PKCS#8 Private Key (RPK) invalid\n");
1430 asn1_pub = asn1_temp;
1434 if (!asn1_derive_keys(t_context, asn1_priv->
s, asn1_priv->
length,
1435 asn1_pub->
s, asn1_pub->
length, is_pkcs8)) {
1436 coap_log_info(
"*** setup_pki: (D)TLS: Unable to derive Public/Private Keys\n");
1455 private_key = asn1_temp->
s;
1456 private_key_len = asn1_temp->
length;
1462 if (!asn1_derive_keys(t_context,
1468 coap_log_info(
"*** setup_pki: (D)TLS: Unable to derive Public/Private Keys\n");
1473 if (!asn1_derive_keys(t_context,
1479 coap_log_info(
"*** setup_pki: (D)TLS: Unable to derive Public/Private Keys\n");
1556#if (DTLS_MAX_CID_LENGTH == 0)
1560#if (DTLS_MAX_CID_LENGTH > 0)
1561 t_context->use_cid = setup_data->
use_cid;
1587#if COAP_CLIENT_SUPPORT
1591 coap_tiny_context_t *t_context;
1596 t_context = (coap_tiny_context_t *)coap_context->
dtls_context;
1601#if (DTLS_MAX_CID_LENGTH == 0)
1605#if (DTLS_MAX_CID_LENGTH > 0)
1606 t_context->use_cid = setup_data->
use_cid;
1620#if COAP_SERVER_SUPPORT
1630 coap_log_warn(
"CoAP Server with TinyDTLS does not support SNI selection\n");
1649#if !COAP_DISABLE_TCP
1650#if COAP_CLIENT_SUPPORT
1657#if COAP_SERVER_SUPPORT
1695#if COAP_SERVER_SUPPORT
1697coap_digest_setup(
void) {
1701 dtls_sha256_init(digest_ctx);
1708coap_digest_free(coap_digest_ctx_t *digest_ctx) {
1713coap_digest_update(coap_digest_ctx_t *digest_ctx,
1714 const uint8_t *data,
1716 dtls_sha256_update(digest_ctx, data, data_len);
1722coap_digest_final(coap_digest_ctx_t *digest_ctx,
1723 coap_digest_t *digest_buffer) {
1724 dtls_sha256_final((uint8_t *)digest_buffer, digest_ctx);
1726 coap_digest_free(digest_ctx);
1756#if COAP_OSCORE_SUPPORT
1768static struct cipher_algs {
1770 uint32_t cipher_type;
1779 for (idx = 0; idx <
sizeof(ciphers)/
sizeof(
struct cipher_algs); idx++) {
1780 if (ciphers[idx].alg == alg)
1781 return ciphers[idx].cipher_type;
1783 coap_log_debug(
"get_cipher_alg: COSE cipher %d not supported\n", alg);
1792static struct hmac_algs {
1803 for (idx = 0; idx <
sizeof(hmacs)/
sizeof(
struct hmac_algs); idx++) {
1804 if (hmacs[idx].hmac_alg == hmac_alg)
1805 return hmacs[idx].hmac_type;
1807 coap_log_debug(
"get_hmac_alg: COSE HMAC %d not supported\n", hmac_alg);
1813 return get_cipher_alg(alg);
1822 return get_hmac_alg(hmac_alg);
1829 uint8_t *result,
size_t *max_result_len) {
1832 dtls_ccm_params_t dtls_params;
1840 if (get_cipher_alg(params->
alg) == 0) {
1841 coap_log_debug(
"coap_crypto_encrypt: algorithm %d not supported\n",
1852 dtls_params.nonce = ccm->
nonce;
1853 dtls_params.tag_length = ccm->
tag_len;
1854 dtls_params.l = ccm->
l;
1863 num_bytes = dtls_encrypt_params(&dtls_params,
1868 if (num_bytes < 0) {
1871 *max_result_len = num_bytes;
1879 uint8_t *result,
size_t *max_result_len) {
1882 dtls_ccm_params_t dtls_params;
1890 if (get_cipher_alg(params->
alg) == 0) {
1891 coap_log_debug(
"coap_crypto_decrypt: algorithm %d not supported\n",
1903 dtls_params.nonce = ccm->
nonce;
1904 dtls_params.tag_length = ccm->
tag_len;
1905 dtls_params.l = ccm->
l;
1914 num_bytes = dtls_decrypt_params(&dtls_params,
1919 if (num_bytes < 0) {
1922 *max_result_len = num_bytes;
1929 dtls_hmac_context_t hmac_context;
1936 if (get_hmac_alg(hmac_alg) == 0) {
1937 coap_log_debug(
"coap_crypto_hmac: algorithm %d not supported\n", hmac_alg);
1945 dtls_hmac_init(&hmac_context, key->
s, key->
length);
1946 dtls_hmac_update(&hmac_context, data->
s, data->
length);
1947 num_bytes = dtls_hmac_finalize(&hmac_context,
dummy->s);
1949 if (num_bytes != DTLS_SHA256_DIGEST_LENGTH) {
1965#pragma GCC diagnostic ignored "-Wunused-function"
int coap_is_af_unix(const coap_address_t *a)
Checks if given address a denotes a AF_UNIX address.
void coap_address_init(coap_address_t *addr)
Resets the given coap_address_t object addr to its default values.
Library specific build wrapper for coap_internal.h.
void * coap_malloc_type(coap_memory_tag_t type, size_t size)
Allocates a chunk of size bytes and returns a pointer to the newly allocated memory.
void coap_free_type(coap_memory_tag_t type, void *p)
Releases the memory that was allocated by coap_malloc_type().
int coap_dtls_context_set_pki(coap_context_t *ctx COAP_UNUSED, const coap_dtls_pki_t *setup_data COAP_UNUSED, const coap_dtls_role_t role COAP_UNUSED)
coap_tick_t coap_dtls_get_timeout(coap_session_t *session COAP_UNUSED, coap_tick_t now COAP_UNUSED)
ssize_t coap_tls_read(coap_session_t *session COAP_UNUSED, uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
coap_tick_t coap_dtls_get_context_timeout(void *dtls_context COAP_UNUSED)
int coap_dtls_receive(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
void * coap_dtls_get_tls(const coap_session_t *c_session COAP_UNUSED, coap_tls_library_t *tls_lib)
unsigned int coap_dtls_get_overhead(coap_session_t *session COAP_UNUSED)
int coap_dtls_context_load_pki_trust_store(coap_context_t *ctx COAP_UNUSED)
int coap_dtls_context_check_keys_enabled(coap_context_t *ctx COAP_UNUSED)
ssize_t coap_dtls_send(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
ssize_t coap_tls_write(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
void coap_dtls_session_update_mtu(coap_session_t *session COAP_UNUSED)
int coap_dtls_context_set_pki_root_cas(coap_context_t *ctx COAP_UNUSED, const char *ca_file COAP_UNUSED, const char *ca_path COAP_UNUSED)
int coap_dtls_handle_timeout(coap_session_t *session COAP_UNUSED)
void coap_dtls_free_context(void *handle COAP_UNUSED)
void coap_dtls_free_session(coap_session_t *coap_session COAP_UNUSED)
void * coap_dtls_new_context(coap_context_t *coap_context COAP_UNUSED)
void coap_tls_free_session(coap_session_t *coap_session COAP_UNUSED)
int SHA1Result(SHA1Context *, uint8_t Message_Digest[SHA1HashSize])
int SHA1Reset(SHA1Context *)
int SHA1Input(SHA1Context *, const uint8_t *, unsigned int)
coap_binary_t * get_asn1_tag(coap_asn1_tag_t ltag, const uint8_t *ptr, size_t tlen, asn1_validate validate)
Get the asn1 tag and data from the current ptr.
uint64_t coap_tick_t
This data type represents internal timer ticks with COAP_TICKS_PER_SECOND resolution.
#define COAP_TICKS_PER_SECOND
Use ms resolution on POSIX systems.
int coap_handle_event_lkd(coap_context_t *context, coap_event_t event, coap_session_t *session)
Invokes the event handler of context for the given event and data.
int coap_handle_dgram(coap_context_t *ctx, coap_session_t *session, uint8_t *msg, size_t msg_len)
Parses and interprets a CoAP datagram with context ctx.
void coap_ticks(coap_tick_t *t)
Returns the current value of an internal tick counter.
int coap_crypto_hmac(cose_hmac_alg_t hmac_alg, coap_bin_const_t *key, coap_bin_const_t *data, coap_bin_const_t **hmac)
Create a HMAC hash of the provided data.
int coap_crypto_aead_decrypt(const coap_crypto_param_t *params, coap_bin_const_t *data, coap_bin_const_t *aad, uint8_t *result, size_t *max_result_len)
Decrypt the provided encrypted data into plaintext.
int coap_crypto_aead_encrypt(const coap_crypto_param_t *params, coap_bin_const_t *data, coap_bin_const_t *aad, uint8_t *result, size_t *max_result_len)
Encrypt the provided plaintext data.
int coap_crypto_hash(cose_alg_t alg, const coap_bin_const_t *data, coap_bin_const_t **hash)
Create a hash of the provided data.
int coap_crypto_check_hkdf_alg(cose_hkdf_alg_t hkdf_alg)
Check whether the defined hkdf algorithm is supported by the underlying crypto library.
int coap_crypto_check_cipher_alg(cose_alg_t alg)
Check whether the defined cipher algorithm is supported by the underlying crypto library.
const coap_bin_const_t * coap_get_session_client_psk_identity(const coap_session_t *coap_session)
Get the current client's PSK identity.
void coap_dtls_startup(void)
Initialize the underlying (D)TLS Library layer.
int coap_dtls_define_issue(coap_define_issue_key_t type, coap_define_issue_fail_t fail, coap_dtls_key_t *key, const coap_dtls_role_t role, int ret)
Report PKI DEFINE type issue.
void coap_dtls_thread_shutdown(void)
Close down the underlying (D)TLS Library layer.
int coap_dtls_set_cid_tuple_change(coap_context_t *context, uint8_t every)
Set the Connection ID client tuple frequency change for testing CIDs.
int coap_dtls_is_context_timeout(void)
Check if timeout is handled per CoAP session or per CoAP context.
void coap_dtls_shutdown(void)
Close down the underlying (D)TLS Library layer.
const coap_bin_const_t * coap_get_session_client_psk_key(const coap_session_t *coap_session)
Get the current client's PSK key.
void coap_dtls_map_key_type_to_define(const coap_dtls_pki_t *setup_data, coap_dtls_key_t *key)
Map the PKI key definitions to the new DEFINE format.
const coap_bin_const_t * coap_get_session_server_psk_key(const coap_session_t *coap_session)
Get the current server's PSK key.
const coap_bin_const_t * coap_get_session_server_psk_hint(const coap_session_t *coap_session)
Get the current server's PSK identity hint.
@ COAP_DEFINE_KEY_PRIVATE
@ COAP_DEFINE_FAIL_NOT_SUPPORTED
coap_tls_version_t * coap_get_tls_library_version(void)
Determine the type and version of the underlying (D)TLS library.
#define COAP_DTLS_RPK_CERT_CN
@ COAP_PKI_KEY_DEF_PKCS11
The PKI key type is PKCS11 (pkcs11:...).
@ COAP_PKI_KEY_DEF_DER_BUF
The PKI key type is DER buffer (ASN.1).
@ COAP_PKI_KEY_DEF_PEM_BUF
The PKI key type is PEM buffer.
@ COAP_PKI_KEY_DEF_PEM
The PKI key type is PEM file.
@ COAP_PKI_KEY_DEF_ENGINE
The PKI key type is to be passed to ENGINE.
@ COAP_PKI_KEY_DEF_RPK_BUF
The PKI key type is RPK in buffer.
@ COAP_PKI_KEY_DEF_DER
The PKI key type is DER file.
@ COAP_PKI_KEY_DEF_PKCS11_RPK
The PKI key type is PKCS11 w/ RPK (pkcs11:...).
@ COAP_PKI_KEY_DEFINE
The individual PKI key types are Definable.
@ COAP_ASN1_PKEY_EC
EC type.
@ COAP_TLS_LIBRARY_TINYDTLS
Using TinyDTLS library.
@ COAP_EVENT_DTLS_CLOSED
Triggerred when (D)TLS session closed.
@ COAP_EVENT_DTLS_CONNECTED
Triggered when (D)TLS session connected.
@ COAP_EVENT_DTLS_RENEGOTIATE
Triggered when (D)TLS session renegotiated.
@ COAP_EVENT_DTLS_ERROR
Triggered when (D)TLS error occurs.
#define coap_lock_callback_ret(r, func)
Dummy for no thread-safe code.
#define coap_log_debug(...)
coap_log_t coap_dtls_get_log_level(void)
Get the current (D)TLS logging.
#define coap_dtls_log(level,...)
Logging function.
void coap_dtls_set_log_level(coap_log_t level)
Sets the (D)TLS logging level to the specified level.
const char * coap_session_str(const coap_session_t *session)
Get session description.
#define coap_log_info(...)
#define coap_log_warn(...)
int cose_get_hmac_alg_for_hkdf(cose_hkdf_alg_t hkdf_alg, cose_hmac_alg_t *hmac_alg)
@ COSE_HMAC_ALG_HMAC256_256
@ COSE_ALGORITHM_AES_CCM_16_64_128
int coap_session_refresh_psk_hint(coap_session_t *session, const coap_bin_const_t *psk_hint)
Refresh the session's current Identity Hint (PSK).
int coap_session_refresh_psk_key(coap_session_t *session, const coap_bin_const_t *psk_key)
Refresh the session's current pre-shared key (PSK).
void coap_session_connected(coap_session_t *session)
Notify session that it has just connected or reconnected.
int coap_session_refresh_psk_identity(coap_session_t *session, const coap_bin_const_t *psk_identity)
Refresh the session's current pre-shared identity (PSK).
void coap_session_disconnected_lkd(coap_session_t *session, coap_nack_reason_t reason)
Notify session that it has failed.
coap_session_t * coap_session_get_by_peer(const coap_context_t *ctx, const coap_address_t *remote_addr, int ifindex)
Get the session associated with the specified remote_addr and index.
@ COAP_SESSION_TYPE_CLIENT
client-side
coap_binary_t * coap_new_binary(size_t size)
Returns a new binary object with at least size bytes storage allocated.
void coap_delete_binary(coap_binary_t *s)
Deletes the given coap_binary_t object and releases any memory allocated.
int coap_dtls_cid_is_supported(void)
Check whether (D)TLS CID is available.
int coap_dtls_psk_is_supported(void)
Check whether (D)TLS PSK is available.
int coap_tls_is_supported(void)
Check whether TLS is available.
int coap_oscore_is_supported(void)
Check whether OSCORE is available.
int coap_dtls_is_supported(void)
Check whether DTLS is available.
int coap_dtls_pki_is_supported(void)
Check whether (D)TLS PKI is available.
int coap_dtls_rpk_is_supported(void)
Check whether (D)TLS RPK is available.
int coap_dtls_pkcs11_is_supported(void)
Check whether (D)TLS PKCS11 is available.
coap_address_t remote
remote address and port
Multi-purpose address abstraction.
socklen_t size
size of addr
union coap_address_t::@0 addr
CoAP binary data definition with const data.
size_t length
length of binary data
const uint8_t * s
read-only binary data
CoAP binary data definition.
size_t length
length of binary data
The CoAP stack's global state is stored in a coap_context_t object.
The structure that holds the AES Crypto information.
size_t l
The number of bytes in the length field.
const uint8_t * nonce
must be exactly 15 - l bytes
coap_crypto_key_t key
The Key to use.
size_t tag_len
The size of the Tag.
The common structure that holds the Crypto information.
union coap_crypto_param_t::@2 params
coap_crypto_aes_ccm_t aes
Used if AES type encryption.
cose_alg_t alg
The COSE algorith to use.
The structure that holds the Client PSK information.
coap_bin_const_t identity
The structure used for defining the Client PSK setup data to be used.
uint8_t use_cid
Set to 1 if DTLS Connection ID is to be used.
void * ih_call_back_arg
Passed in to the Identity Hint callback function.
coap_dtls_ih_callback_t validate_ih_call_back
Identity Hint check callback function.
uint8_t ec_jpake
Set to COAP_DTLS_CPSK_SETUP_VERSION to support this version of the struct.
The structure that holds the PKI key information.
coap_pki_key_define_t define
for definable type keys
union coap_dtls_key_t::@3 key
coap_pki_key_t key_type
key format type
The structure used for defining the PKI setup data to be used.
uint8_t use_cid
1 if DTLS Connection ID is to be used (Client only, server always enabled) if supported
uint8_t is_rpk_not_cert
1 is RPK instead of Public Certificate.
The structure used for defining the Server PSK setup data to be used.
coap_dtls_psk_sni_callback_t validate_sni_call_back
SNI check callback function.
coap_dtls_id_callback_t validate_id_call_back
Identity check callback function.
void * id_call_back_arg
Passed in to the Identity callback function.
uint8_t ec_jpake
Set to COAP_DTLS_SPSK_SETUP_VERSION to support this version of the struct.
coap_layer_write_t l_write
coap_const_char_ptr_t public_cert
define: Public Cert
coap_asn1_privatekey_type_t private_key_type
define: ASN1 Private Key Type (if needed)
coap_const_char_ptr_t private_key
define: Private Key
coap_const_char_ptr_t ca
define: Common CA Certificate
size_t public_cert_len
define Public Cert length (if needed)
coap_pki_define_t private_key_def
define: Private Key type definition
size_t private_key_len
define Private Key length (if needed)
coap_pki_define_t ca_def
define: Common CA type definition
coap_pki_define_t public_cert_def
define: Public Cert type definition
Abstraction of virtual session that can be attached to coap_context_t (client) or coap_endpoint_t (se...
coap_socket_t sock
socket object for the session, if any
coap_addr_tuple_t addr_info
remote/local address info
coap_dtls_cpsk_t cpsk_setup_data
client provided PSK initial setup data
int dtls_event
Tracking any (D)TLS events on this session.
void * tls
security parameters
coap_session_type_t type
client or server side socket
coap_context_t * context
session's context
int ifindex
interface index
coap_layer_func_t lfunc[COAP_LAYER_LAST]
Layer functions to use.
CoAP string data definition with const data.
const uint8_t * s
read-only string data
size_t length
length of string
The structure used for returning the underlying (D)TLS library information.
uint64_t built_version
(D)TLS Built against Library Version
coap_tls_library_t type
Library type.
uint64_t version
(D)TLS runtime Library Version
const uint8_t * u_byte
unsigned char ptr