21#if COAP_WITH_LIBWOLFSSL
78#include <wolfssl/options.h>
79#include <wolfssl/ssl.h>
80#include <wolfssl/wolfcrypt/settings.h>
81#include <wolfssl/openssl/ssl.h>
82#include <wolfssl/openssl/x509v3.h>
84#ifdef COAP_EPOLL_SUPPORT
85# include <sys/epoll.h>
88#if LIBWOLFSSL_VERSION_HEX < 0x05002000
89#error Must be compiled against wolfSSL 5.2.0 or later
93#define strcasecmp _stricmp
94#define strncasecmp _strnicmp
98#define WOLFSSL3_AL_FATAL 2
99#define WOLFSSL_TLSEXT_ERR_OK 0
102typedef struct coap_dtls_context_t {
104 WOLFSSL_HMAC_CTX *cookie_hmac;
105} coap_dtls_context_t;
107typedef struct coap_tls_context_t {
114typedef struct coap_wolfssl_context_t {
115 coap_dtls_context_t dtls;
117 coap_tls_context_t tls;
123 int trust_store_defined;
124} coap_wolfssl_context_t;
126typedef struct coap_ssl_data_t {
133typedef struct coap_wolfssl_env_t {
136 unsigned int retry_scalar;
137 coap_ssl_data_t data;
142typedef enum coap_enc_method_t {
148wolfssl_malloc(
size_t size) {
149 void *ret = XMALLOC(size, NULL, DYNAMIC_TYPE_TMP_BUFFER);
155wolfssl_free(
void *ptr) {
157 XFREE(ptr, NULL, DYNAMIC_TYPE_TMP_BUFFER);
161wolfssl_strdup(
const char *str) {
162 char *ret = (
char *)wolfssl_malloc(strlen(str) + 1);
171wolfssl_strndup(
const char *str,
size_t n) {
173 char *ret = (
char *)wolfssl_malloc(len + 1);
176 strncpy(ret, str, len);
182static coap_wolfssl_env_t *
184 coap_wolfssl_env_t *w_env = (coap_wolfssl_env_t *)c_session->
tls;
189 w_env = (coap_wolfssl_env_t *)wolfssl_malloc(
sizeof(coap_wolfssl_env_t));
193 memset(w_env, 0,
sizeof(coap_wolfssl_env_t));
199coap_dtls_free_wolfssl_env(coap_wolfssl_env_t *w_env) {
205#if COAP_CLIENT_SUPPORT
206#ifndef WOLFSSL_CIPHER_LIST_MAX_SIZE
207#define WOLFSSL_CIPHER_LIST_MAX_SIZE 4096
210#ifdef COAP_WOLFSSL_PSK_CIPHERS
211static char psk_ciphers[] = COAP_WOLFSSL_PSK_CIPHERS;
213static char psk_ciphers[WOLFSSL_CIPHER_LIST_MAX_SIZE];
216#ifdef COAP_WOLFSSL_PKI_CIPHERS
217static char pki_ciphers[] = COAP_WOLFSSL_PKI_CIPHERS;
219static char pki_ciphers[WOLFSSL_CIPHER_LIST_MAX_SIZE];
223set_ciphersuites(WOLFSSL *ssl, coap_enc_method_t method) {
224#if ! defined(COAP_WOLFSSL_PSK_CIPHERS) || ! defined(COAP_WOLFSSL_PKI_CIPHERS)
225 static int processed_ciphers = 0;
227 if (!processed_ciphers) {
228 static char ciphers[WOLFSSL_CIPHER_LIST_MAX_SIZE];
229 char *ciphers_ofs = ciphers;
231#if ! defined(COAP_WOLFSSL_PSK_CIPHERS)
232 char *psk_ofs = psk_ciphers;
234#if ! defined(COAP_WOLFSSL_PKI_CIPHERS)
235 char *pki_ofs = pki_ciphers;
238 if (wolfSSL_get_ciphers(ciphers, (
int)
sizeof(ciphers)) != WOLFSSL_SUCCESS) {
243 while (ciphers_ofs) {
244 cp = strchr(ciphers_ofs,
':');
247 if (strstr(ciphers_ofs,
"NULL")) {
251 if (strcmp(ciphers_ofs,
"RENEGOTIATION-INFO") == 0) {
254 }
else if (strstr(ciphers_ofs,
"PSK")) {
255#if ! defined(COAP_WOLFSSL_PSK_CIPHERS)
256 if (psk_ofs != psk_ciphers) {
260 strcpy(psk_ofs, ciphers_ofs);
261 psk_ofs += strlen(ciphers_ofs);
265#if ! defined(COAP_WOLFSSL_PKI_CIPHERS)
266 if (pki_ofs != pki_ciphers) {
270 strcpy(pki_ofs, ciphers_ofs);
271 pki_ofs += strlen(ciphers_ofs);
277 ciphers_ofs = cp + 1;
281#ifndef HAVE_SECURE_RENEGOTIATION
287#if ! defined(COAP_WOLFSSL_PSK_CIPHERS)
288 if (psk_ofs != psk_ciphers) {
292 strcpy(psk_ofs,
"RENEGOTIATION-INFO");
293 psk_ofs += strlen(
"RENEGOTIATION-INFO");
296#if ! defined(COAP_WOLFSSL_PKI_CIPHERS)
297 if (pki_ofs != pki_ciphers) {
301 strcpy(pki_ofs,
"RENEGOTIATION-INFO");
302 pki_ofs += strlen(
"RENEGOTIATION-INFO");
307 processed_ciphers = 1;
311 if (method == COAP_ENC_PSK) {
312 wolfSSL_set_cipher_list(ssl, psk_ciphers);
314 wolfSSL_set_cipher_list(ssl, pki_ciphers);
319#if COAP_SERVER_SUPPORT
320static int psk_tls_server_name_call_back(WOLFSSL *ssl,
int *sd,
void *arg);
322static int tls_verify_call_back(
int preverify_ok, WOLFSSL_X509_STORE_CTX *ctx);
326 if (wolfSSL_lib_version_hex() < 0x05002000) {
327 coap_log_warn(
"wolfSSL version 5.2.0 or later is required\n");
336 if (wolfSSL_lib_version_hex() < 0x05002000) {
337 coap_log_warn(
"wolfSSL version 5.2.0 or later is required\n");
388#if defined(HAVE_RPK) && LIBWOLFSSL_VERSION_HEX >= 0x05006004
395#if COAP_CLIENT_SUPPORT
398#if defined(WOLFSSL_DTLS_CID)
412 version.
version = wolfSSL_lib_version_hex();
420coap_wolfssl_log_func(
int level,
const char *text) {
423 switch ((
int)level) {
448 if (wolfSSL_library_init() != WOLFSSL_SUCCESS) {
452 wolfSSL_load_error_strings();
453 wolfSSL_SetLoggingCb(coap_wolfssl_log_func);
454 wolfSSL_Debugging_ON();
459 wolfSSL_ERR_free_strings();
461 wolfSSL_Debugging_OFF();
470 coap_wolfssl_env_t *w_env;
473 memcpy(&w_env, &c_session->
tls,
sizeof(w_env));
475 return (
void *)&w_env->ssl;
496coap_dgram_read(WOLFSSL *ssl,
char *out,
int outl,
void *ctx) {
498 coap_wolfssl_env_t *w_env = (coap_wolfssl_env_t *)ctx;
499 coap_ssl_data_t *data = w_env ? &w_env->data : NULL;
503 if (w_env && !w_env->done_psk_check && w_env->ssl) {
504 if (wolfSSL_SSL_in_init(w_env->ssl)) {
505 const char *name = wolfSSL_get_cipher_name(w_env->ssl);
511 wolfSSL_set_verify(w_env->ssl, WOLFSSL_VERIFY_NONE, tls_verify_call_back);
512 w_env->done_psk_check = 1;
518 if (data != NULL && data->pdu_len > 0) {
519 if (outl < (
int)data->pdu_len) {
520 memcpy(out, data->pdu, outl);
523 memcpy(out, data->pdu, data->pdu_len);
524 ret = (int)data->pdu_len;
526 if (!data->peekmode) {
531 w_env->last_timeout = now;
540coap_dgram_write(WOLFSSL *ssl,
char *in,
int inl,
void *ctx) {
542 coap_wolfssl_env_t *w_env = (coap_wolfssl_env_t *)ctx;
543 coap_ssl_data_t *data = w_env ? &w_env->data : NULL;
547 if (data && data->session) {
549#if COAP_SERVER_SUPPORT
550 && data->session->endpoint == NULL
557 ret = (int)data->session->sock.lfunc[
COAP_LAYER_TLS].l_write(data->session,
562 w_env->last_timeout = now;
563 }
else if (ret < 0) {
564 if (errno == ENOTCONN || errno == ECONNREFUSED)
573#if COAP_CLIENT_SUPPORT
575coap_dtls_psk_client_callback(WOLFSSL *ssl,
578 unsigned int max_identity_len,
580 unsigned int max_psk_len) {
582 coap_wolfssl_context_t *w_context;
589 if (c_session == NULL || c_session->
context == NULL)
592 if (w_context == NULL)
600 temp.
s = hint ? (
const uint8_t *)hint : (const uint8_t *)
"";
601 temp.
length = strlen((
const char *)temp.
s);
605 (
const char *)temp.
s);
615 if (cpsk_info == NULL)
620 psk_identity = &cpsk_info->
identity;
621 psk_key = &cpsk_info->
key;
627 if (psk_identity == NULL || psk_key == NULL) {
633 if (!max_identity_len)
636 if (psk_identity->
length > max_identity_len) {
637 coap_log_warn(
"psk_identity too large, truncated to %d bytes\n",
641 max_identity_len = (
unsigned int)psk_identity->
length;
643 memcpy(identity, psk_identity->
s, max_identity_len);
644 identity[max_identity_len] =
'\000';
646 if (psk_key->
length > max_psk_len) {
651 max_psk_len = (
unsigned int)psk_key->
length;
653 memcpy(psk, psk_key->
s, max_psk_len);
659coap_dtls_psk_client_cs_callback(WOLFSSL *ssl,
const char *hint,
660 char *identity,
unsigned int max_identity_len,
661 unsigned char *psk,
unsigned int max_psk_len,
662 const char *ciphersuite) {
663 int key_len = coap_dtls_psk_client_callback(ssl,
677#if COAP_SERVER_SUPPORT
679coap_dtls_psk_server_callback(
681 const char *identity,
683 unsigned int max_psk_len) {
690 if (c_session == NULL || c_session->
context == NULL)
696 lidentity.
s = identity ? (
const uint8_t *)identity : (const uint8_t *)
"";
697 lidentity.
length = strlen((
const char *)lidentity.
s);
701 (
int)lidentity.
length, (
const char *)lidentity.
s);
716 if (psk_key->
length > max_psk_len) {
721 max_psk_len = (
unsigned int)psk_key->
length;
723 memcpy(psk, psk_key->
s, max_psk_len);
729ssl_function_definition(
unsigned long e) {
730 static char buff[80];
732 snprintf(buff,
sizeof(buff),
" at %s:%s",
733 wolfSSL_ERR_lib_error_string(e), wolfSSL_ERR_func_error_string(e));
738coap_dtls_info_callback(
const WOLFSSL *ssl,
int where,
int ret) {
741 int w = where &~SSL_ST_MASK;
745 "coap_dtls_info_callback: session not determined, where 0x%0x and ret 0x%0x\n", where, ret);
749 if (w & SSL_ST_CONNECT)
750 pstr =
"wolfSSL_connect";
751 else if (w & SSL_ST_ACCEPT)
752 pstr =
"wolfSSL_accept";
756 if (where & SSL_CB_LOOP) {
759 }
else if (where & SSL_CB_ALERT) {
761 pstr = (where & SSL_CB_READ) ?
"read" :
"write";
762 if ((where & (SSL_CB_WRITE|SSL_CB_READ)) && (ret >> 8) == WOLFSSL3_AL_FATAL) {
764 if ((ret & 0xff) != close_notify)
769 coap_log(log_level,
"* %s: SSL3 alert %s:%s:%s\n",
772 wolfSSL_alert_type_string_long(ret),
773 wolfSSL_alert_desc_string_long(ret));
774 }
else if (where & SSL_CB_EXIT) {
780 while ((e = wolfSSL_ERR_get_error()))
783 ssl_function_definition(e));
785 }
else if (ret < 0) {
790 memcpy(&rw_ssl, &ssl,
sizeof(rw_ssl));
791 int err = wolfSSL_get_error(rw_ssl, ret);
792 if (err != WOLFSSL_ERROR_WANT_READ && err != WOLFSSL_ERROR_WANT_WRITE &&
793 err != WOLFSSL_ERROR_WANT_CONNECT && err != WOLFSSL_ERROR_WANT_ACCEPT &&
794 err != WOLFSSL_ERROR_WANT_X509_LOOKUP) {
798 while ((e = wolfSSL_ERR_get_error()))
801 ssl_function_definition(e));
807 if (where == SSL_CB_HANDSHAKE_START) {
811 memcpy(&rw_ssl, &ssl,
sizeof(rw_ssl));
812 if (wolfSSL_is_init_finished(rw_ssl))
825coap_sock_read(WOLFSSL *ssl,
char *out,
int outl,
void *ctx) {
826 coap_wolfssl_env_t *w_env = (coap_wolfssl_env_t *)ctx;
831 if (w_env && !w_env->done_psk_check && w_env->ssl &&
833 if (wolfSSL_SSL_in_init(w_env->ssl)) {
834 const char *name = wolfSSL_get_cipher_name(w_env->ssl);
839 if (strstr(name,
"PSK")) {
840 wolfSSL_set_verify(w_env->ssl, WOLFSSL_VERIFY_NONE, tls_verify_call_back);
841 w_env->done_psk_check = 1;
846 if (session && out != NULL) {
863coap_sock_write(WOLFSSL *ssl,
char *in,
int inl,
void *ctx) {
864 coap_wolfssl_env_t *w_env = (coap_wolfssl_env_t *)ctx;
884 (errno == EPIPE || errno == ECONNRESET)) {
905coap_set_user_prefs(WOLFSSL_CTX *ctx) {
908#ifdef COAP_WOLFSSL_SIGALGS
909 wolfSSL_CTX_set1_sigalgs_list(ctx, COAP_WOLFSSL_SIGALGS);
911#ifdef COAP_WOLFSSL_GROUPS
913 ret = wolfSSL_CTX_set1_groups_list(ctx,
914 (
char *) COAP_WOLFSSL_GROUPS);
915 if (ret != WOLFSSL_SUCCESS) {
923setup_dtls_context(coap_wolfssl_context_t *w_context) {
924 if (!w_context->dtls.ctx) {
925 uint8_t cookie_secret[32];
928 w_context->dtls.ctx = wolfSSL_CTX_new(wolfDTLS_method());
929 if (!w_context->dtls.ctx)
931 wolfSSL_CTX_set_min_proto_version(w_context->dtls.ctx,
933 wolfSSL_CTX_set_ex_data(w_context->dtls.ctx, 0, &w_context->dtls);
934 coap_set_user_prefs(w_context->dtls.ctx);
935 memset(cookie_secret, 0,
sizeof(cookie_secret));
936 if (!wolfSSL_RAND_bytes(cookie_secret, (
int)
sizeof(cookie_secret))) {
938 "Insufficient entropy for random cookie generation");
941 w_context->dtls.cookie_hmac = wolfSSL_HMAC_CTX_new();
942 if (!wolfSSL_HMAC_Init_ex(w_context->dtls.cookie_hmac, cookie_secret, (
int)
sizeof(cookie_secret),
943 wolfSSL_EVP_sha256(), NULL))
946 wolfSSL_CTX_set_info_callback(w_context->dtls.ctx, coap_dtls_info_callback);
947 wolfSSL_CTX_set_options(w_context->dtls.ctx, SSL_OP_NO_QUERY_MTU);
948 wolfSSL_SetIORecv(w_context->dtls.ctx, coap_dgram_read);
949 wolfSSL_SetIOSend(w_context->dtls.ctx, coap_dgram_write);
950#ifdef WOLFSSL_DTLS_MTU
953#ifdef WOLFSSL_SYS_CA_CERTS
954 if (w_context->trust_store_defined) {
955 if (!wolfSSL_CTX_load_system_CA_certs(w_context->dtls.ctx)) {
961 if (w_context->root_ca_file || w_context->root_ca_dir) {
962 if (!wolfSSL_CTX_load_verify_locations_ex(w_context->dtls.ctx,
963 w_context->root_ca_file,
964 w_context->root_ca_dir,
965 w_context->setup_data.allow_expired_certs ?
966 WOLFSSL_LOAD_FLAG_DATE_ERR_OKAY : 0)) {
968 w_context->root_ca_file ? w_context->root_ca_file :
"NULL",
969 w_context->root_ca_dir ? w_context->root_ca_dir :
"NULL");
974 if (w_context->setup_data.verify_peer_cert)
975 wolfSSL_CTX_set_verify(w_context->dtls.ctx,
976 WOLFSSL_VERIFY_PEER |
977 WOLFSSL_VERIFY_CLIENT_ONCE |
978 WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT,
979 tls_verify_call_back);
981 wolfSSL_CTX_set_verify(w_context->dtls.ctx, WOLFSSL_VERIFY_NONE, tls_verify_call_back);
994setup_tls_context(coap_wolfssl_context_t *w_context) {
995 if (!w_context->tls.ctx) {
997 w_context->tls.ctx = wolfSSL_CTX_new(wolfSSLv23_method());
998 if (!w_context->tls.ctx)
1000 wolfSSL_CTX_set_ex_data(w_context->tls.ctx, 0, &w_context->tls);
1001 wolfSSL_CTX_set_min_proto_version(w_context->tls.ctx, TLS1_VERSION);
1002 coap_set_user_prefs(w_context->tls.ctx);
1003 wolfSSL_CTX_set_info_callback(w_context->tls.ctx, coap_dtls_info_callback);
1004 wolfSSL_SetIORecv(w_context->tls.ctx, coap_sock_read);
1005 wolfSSL_SetIOSend(w_context->tls.ctx, coap_sock_write);
1006#if COAP_CLIENT_SUPPORT
1007 if (w_context->psk_pki_enabled & IS_PSK) {
1008 wolfSSL_CTX_set_psk_client_cs_callback(w_context->tls.ctx,
1009 coap_dtls_psk_client_cs_callback);
1012 if (w_context->root_ca_file || w_context->root_ca_dir) {
1013 if (!wolfSSL_CTX_load_verify_locations_ex(w_context->tls.ctx,
1014 w_context->root_ca_file,
1015 w_context->root_ca_dir,
1016 w_context->setup_data.allow_expired_certs ?
1017 WOLFSSL_LOAD_FLAG_DATE_ERR_OKAY : 0)) {
1019 w_context->root_ca_file ? w_context->root_ca_file :
"NULL",
1020 w_context->root_ca_dir ? w_context->root_ca_dir :
"NULL");
1025#ifdef WOLFSSL_SYS_CA_CERTS
1026 if (w_context->trust_store_defined) {
1027 if (!wolfSSL_CTX_load_system_CA_certs(w_context->tls.ctx)) {
1033 if (w_context->setup_data.verify_peer_cert)
1034 wolfSSL_CTX_set_verify(w_context->tls.ctx,
1035 WOLFSSL_VERIFY_PEER |
1036 WOLFSSL_VERIFY_CLIENT_ONCE |
1037 WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT,
1038 tls_verify_call_back);
1040 wolfSSL_CTX_set_verify(w_context->tls.ctx, WOLFSSL_VERIFY_NONE, tls_verify_call_back);
1052 coap_wolfssl_context_t *w_context;
1055 w_context = (coap_wolfssl_context_t *)wolfssl_malloc(
sizeof(coap_wolfssl_context_t));
1057 memset(w_context, 0,
sizeof(coap_wolfssl_context_t));
1063#if COAP_SERVER_SUPPORT
1068 coap_wolfssl_context_t *w_context =
1071 if (!setup_data || !w_context)
1074 if (!setup_dtls_context(w_context))
1076#if !COAP_DISABLE_TCP
1077 if (!setup_tls_context(w_context))
1081 wolfSSL_CTX_set_psk_server_callback(w_context->dtls.ctx,
1082 coap_dtls_psk_server_callback);
1084#if !COAP_DISABLE_TCP
1085 wolfSSL_CTX_set_psk_server_callback(w_context->tls.ctx,
1086 coap_dtls_psk_server_callback);
1092 wolfSSL_CTX_use_psk_identity_hint(w_context->dtls.ctx, hint);
1093#if !COAP_DISABLE_TCP
1094 wolfSSL_CTX_use_psk_identity_hint(w_context->tls.ctx, hint);
1098 wolfSSL_CTX_set_servername_arg(w_context->dtls.ctx,
1100 wolfSSL_CTX_set_tlsext_servername_callback(w_context->dtls.ctx,
1101 psk_tls_server_name_call_back);
1102#if !COAP_DISABLE_TCP
1103 wolfSSL_CTX_set_servername_arg(w_context->tls.ctx,
1105 wolfSSL_CTX_set_tlsext_servername_callback(w_context->tls.ctx,
1106 psk_tls_server_name_call_back);
1112 w_context->psk_pki_enabled |= IS_PSK;
1117#if COAP_CLIENT_SUPPORT
1122 coap_wolfssl_context_t *w_context =
1125 if (!setup_data || !w_context)
1132#if ! defined(WOLFSSL_DTLS_CID)
1136 w_context->psk_pki_enabled |= IS_PSK;
1141#if !COAP_DISABLE_TCP
1142static uint8_t coap_alpn[] = { 4,
'c',
'o',
'a',
'p' };
1144#if COAP_SERVER_SUPPORT
1147 const unsigned char **out,
1148 unsigned char *outlen,
1149 const unsigned char *in,
1153 unsigned char *tout = NULL;
1156 return SSL_TLSEXT_ERR_NOACK;
1157 ret = wolfSSL_select_next_proto(&tout,
1164 return (ret != OPENSSL_NPN_NEGOTIATED) ? noack_return : WOLFSSL_TLSEXT_ERR_OK;
1170setup_pki_ssl(WOLFSSL *ssl,
1173 WOLFSSL_CTX *ctx = wolfSSL_get_SSL_CTX(ssl);
1187 if (!(wolfSSL_use_PrivateKey_file(ssl,
1189 WOLFSSL_FILETYPE_PEM))) {
1196 if (!(wolfSSL_use_PrivateKey_buffer(ssl,
1199 WOLFSSL_FILETYPE_PEM))) {
1206#if defined(HAVE_RPK) && LIBWOLFSSL_VERSION_HEX >= 0x05006004
1207 if (!(wolfSSL_use_PrivateKey_buffer(ssl,
1210 WOLFSSL_FILETYPE_PEM))) {
1222 if (!(wolfSSL_use_PrivateKey_file(ssl,
1224 WOLFSSL_FILETYPE_ASN1))) {
1231 if (!(wolfSSL_use_PrivateKey_buffer(ssl,
1234 WOLFSSL_FILETYPE_ASN1))) {
1263 if (!(wolfSSL_use_certificate_chain_file(ssl,
1271 if (!(wolfSSL_use_certificate_chain_buffer(ssl,
1280#if defined(HAVE_RPK) && LIBWOLFSSL_VERSION_HEX >= 0x05006004
1282 unsigned char der_buff[512];
1284 char ctype[] = {WOLFSSL_CERT_TYPE_RPK};
1285 char stype[] = {WOLFSSL_CERT_TYPE_RPK};
1287 wolfSSL_set_client_cert_type(ssl, ctype,
sizeof(ctype)/
sizeof(ctype[0]));
1288 wolfSSL_set_server_cert_type(ssl, stype,
sizeof(stype)/
sizeof(stype[0]));
1292 der_buff, (
int)
sizeof(der_buff));
1296 der_buff, (
int)
sizeof(der_buff), NULL);
1305 if (!wolfSSL_use_PrivateKey_buffer(ssl, der_buff, ret, WOLFSSL_FILETYPE_ASN1)) {
1310 if (!wolfSSL_use_certificate_buffer(ssl, spki->
s, spki->
length, WOLFSSL_FILETYPE_ASN1)) {
1325 if (!wolfSSL_use_certificate_buffer(ssl, der_buff, ret, WOLFSSL_FILETYPE_ASN1)) {
1338 if (!(wolfSSL_use_certificate_file(ssl,
1340 WOLFSSL_FILETYPE_ASN1))) {
1347 if (!(wolfSSL_use_certificate_buffer(ssl,
1350 WOLFSSL_FILETYPE_ASN1))) {
1371#if defined(HAVE_RPK) && LIBWOLFSSL_VERSION_HEX >= 0x05006004
1373 char stype[] = {WOLFSSL_CERT_TYPE_X509, WOLFSSL_CERT_TYPE_RPK};
1374 wolfSSL_set_server_cert_type(ssl, stype,
sizeof(stype)/
sizeof(stype[0]));
1385 if (!wolfSSL_CTX_load_verify_locations_ex(ctx,
1389 WOLFSSL_LOAD_FLAG_DATE_ERR_OKAY : 0)) {
1396 if (!wolfSSL_CTX_load_verify_buffer_ex(ctx,
1402 WOLFSSL_LOAD_FLAG_DATE_ERR_OKAY : 0)) {
1412 if (!wolfSSL_CTX_load_verify_locations_ex(ctx,
1416 WOLFSSL_LOAD_FLAG_DATE_ERR_OKAY : 0)) {
1423 if (!wolfSSL_CTX_load_verify_buffer_ex(ctx,
1429 WOLFSSL_LOAD_FLAG_DATE_ERR_OKAY : 0)) {
1448get_san_or_cn_from_cert(WOLFSSL_X509 *x509) {
1452 WOLF_STACK_OF(WOLFSSL_GENERAL_NAME) *san_list;
1456 san_list = wolfSSL_X509_get_ext_d2i(x509, NID_subject_alt_name, NULL, NULL);
1458 int san_count = wolfSSL_sk_GENERAL_NAME_num(san_list);
1460 for (n = 0; n < san_count; n++) {
1461 const WOLFSSL_GENERAL_NAME *name = wolfSSL_sk_GENERAL_NAME_value(san_list, n);
1463 if (name && name->type == GEN_DNS) {
1464 const char *dns_name = (
const char *)wolfSSL_ASN1_STRING_get0_data(name->d.dNSName);
1467 if (wolfSSL_ASN1_STRING_length(name->d.dNSName) != (int)strlen(dns_name))
1469 cn = wolfssl_strdup(dns_name);
1470 wolfSSL_sk_GENERAL_NAME_pop_free(san_list, wolfSSL_GENERAL_NAME_free);
1474 wolfSSL_sk_GENERAL_NAME_pop_free(san_list, wolfSSL_GENERAL_NAME_free);
1477 wolfSSL_X509_NAME_oneline(wolfSSL_X509_get_subject_name((WOLFSSL_X509 *)(x509)), buffer,
1481 n = (int)strlen(buffer) - 3;
1484 if (((cn[0] ==
'C') || (cn[0] ==
'c')) &&
1485 ((cn[1] ==
'N') || (cn[1] ==
'n')) &&
1494 char *ecn = strchr(cn,
'/');
1496 return wolfssl_strndup(cn, ecn-cn);
1498 return wolfssl_strdup(cn);
1506tls_verify_call_back(
int preverify_ok, WOLFSSL_X509_STORE_CTX *ctx) {
1507 int index = wolfSSL_get_ex_data_X509_STORE_CTX_idx();
1508 WOLFSSL *ssl = index >= 0 ? wolfSSL_X509_STORE_CTX_get_ex_data(ctx, index) : NULL;
1509 coap_session_t *session = ssl ? wolfSSL_get_app_data(ssl) : NULL;
1510 coap_wolfssl_context_t *w_context = (session && session->
context) ?
1512 coap_dtls_pki_t *setup_data = w_context ? &w_context->setup_data : NULL;
1513 int depth = wolfSSL_X509_STORE_CTX_get_error_depth(ctx);
1514 int err = wolfSSL_X509_STORE_CTX_get_error(ctx);
1515 WOLFSSL_X509 *x509 = wolfSSL_X509_STORE_CTX_get_current_cert(ctx);
1517 int keep_preverify_ok = preverify_ok;
1520 wolfSSL_X509_STORE_CTX_set_error(ctx, X509_V_ERR_UNSPECIFIED);
1525 cn = wolfssl_strdup(
"RPK");
1527 cn = x509 ? get_san_or_cn_from_cert(x509) : NULL;
1530 depth, err, preverify_ok, cn ? cn :
"");
1531 if (!preverify_ok) {
1533 case X509_V_ERR_CERT_NOT_YET_VALID:
1534 case X509_V_ERR_CERT_HAS_EXPIRED:
1535 case ASN_NO_SIGNER_E:
1536 case ASN_AFTER_DATE_E:
1540 case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT:
1544 case X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN:
1548 case X509_V_ERR_UNABLE_TO_GET_CRL:
1552 case X509_V_ERR_CRL_NOT_YET_VALID:
1553 case X509_V_ERR_CRL_HAS_EXPIRED:
1557 case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY:
1558 case X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE:
1559 case X509_V_ERR_AKID_SKID_MISMATCH:
1569 err = X509_V_ERR_CERT_CHAIN_TOO_LONG;
1570 wolfSSL_X509_STORE_CTX_set_error(ctx, err);
1572 if (!preverify_ok) {
1573 if (err == X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN) {
1576 "Unknown CA", cn ? cn :
"?", depth);
1580 wolfSSL_X509_verify_cert_error_string(err), cn ? cn :
"?", depth);
1585 wolfSSL_X509_verify_cert_error_string(err), cn ? cn :
"?", depth);
1590 int length = wolfSSL_i2d_X509(x509, NULL);
1594 uint8_t *base_buf2 = base_buf = wolfssl_malloc(length);
1599 wolfSSL_i2d_X509(x509, &base_buf2);
1602 depth, preverify_ok,
1606 wolfSSL_X509_STORE_CTX_set_error(ctx, X509_V_ERR_CERT_REJECTED);
1608 wolfSSL_X509_STORE_CTX_set_error(ctx, X509_V_ERR_INVALID_CA);
1612 wolfssl_free(base_buf);
1614 wolfSSL_X509_STORE_CTX_set_error(ctx, X509_V_ERR_UNSPECIFIED);
1620 return preverify_ok;
1623#if COAP_SERVER_SUPPORT
1634tls_server_name_call_back(WOLFSSL *ssl,
1639 coap_wolfssl_context_t *w_context = (session && session->
context) ?
1643 return noack_return;
1648 const char *sni = wolfSSL_get_servername(ssl, WOLFSSL_SNI_HOST_NAME);
1652 if (!sni || !sni[0]) {
1659 return fatal_return;
1661 sni_setup_data = *setup_data;
1662 sni_setup_data.
pki_key = *new_entry;
1666 if (w_context->psk_pki_enabled & IS_PSK) {
1667 wolfSSL_set_psk_server_callback(ssl, coap_dtls_psk_server_callback);
1669 return SSL_TLSEXT_ERR_OK;
1680psk_tls_server_name_call_back(WOLFSSL *ssl,
1686 coap_wolfssl_context_t *w_context = (c_session && c_session->
context) ?
1690 return noack_return;
1695 const char *sni = wolfSSL_get_servername(ssl, WOLFSSL_SNI_HOST_NAME);
1699 if (!sni || !sni[0]) {
1708 snprintf(lhint,
sizeof(lhint),
"%.*s",
1711 wolfSSL_use_psk_identity_hint(ssl, lhint);
1715 if (w_context->psk_pki_enabled & IS_PSK) {
1716 wolfSSL_set_psk_server_callback(ssl, coap_dtls_psk_server_callback);
1718 return SSL_TLSEXT_ERR_OK;
1726 coap_wolfssl_context_t *w_context =
1732 w_context->setup_data = *setup_data;
1733 if (!w_context->setup_data.verify_peer_cert) {
1735 w_context->setup_data.check_common_ca = 0;
1736 if (w_context->setup_data.is_rpk_not_cert) {
1738 w_context->setup_data.allow_self_signed = 0;
1739 w_context->setup_data.allow_expired_certs = 0;
1740 w_context->setup_data.cert_chain_validation = 0;
1741 w_context->setup_data.cert_chain_verify_depth = 0;
1742 w_context->setup_data.check_cert_revocation = 0;
1743 w_context->setup_data.allow_no_crl = 0;
1744 w_context->setup_data.allow_expired_crl = 0;
1745 w_context->setup_data.allow_bad_md_hash = 0;
1746 w_context->setup_data.allow_short_rsa_length = 0;
1749 w_context->setup_data.allow_self_signed = 1;
1750 w_context->setup_data.allow_expired_certs = 1;
1751 w_context->setup_data.cert_chain_validation = 1;
1752 w_context->setup_data.cert_chain_verify_depth = 10;
1753 w_context->setup_data.check_cert_revocation = 1;
1754 w_context->setup_data.allow_no_crl = 1;
1755 w_context->setup_data.allow_expired_crl = 1;
1756 w_context->setup_data.allow_bad_md_hash = 1;
1757 w_context->setup_data.allow_short_rsa_length = 1;
1760#if COAP_SERVER_SUPPORT
1762 if (!setup_dtls_context(w_context))
1764 if (w_context->dtls.ctx) {
1765#if defined(HAVE_RPK) && LIBWOLFSSL_VERSION_HEX >= 0x05006004
1766 char ctype[] = {WOLFSSL_CERT_TYPE_RPK};
1767 char stype[] = {WOLFSSL_CERT_TYPE_RPK};
1770 wolfSSL_CTX_set_servername_arg(w_context->dtls.ctx,
1771 &w_context->setup_data);
1772 wolfSSL_CTX_set_tlsext_servername_callback(w_context->dtls.ctx,
1773 tls_server_name_call_back);
1775#if defined(HAVE_RPK) && LIBWOLFSSL_VERSION_HEX >= 0x05006004
1776 if (w_context->setup_data.is_rpk_not_cert) {
1777 wolfSSL_CTX_set_client_cert_type(w_context->dtls.ctx, ctype,
sizeof(ctype)/
sizeof(ctype[0]));
1778 wolfSSL_CTX_set_server_cert_type(w_context->dtls.ctx, stype,
sizeof(stype)/
sizeof(stype[0]));
1782#if !COAP_DISABLE_TCP
1783 if (!setup_tls_context(w_context))
1785 if (w_context->tls.ctx) {
1786 wolfSSL_CTX_set_servername_arg(w_context->tls.ctx,
1787 &w_context->setup_data);
1788 wolfSSL_CTX_set_tlsext_servername_callback(w_context->tls.ctx,
1789 tls_server_name_call_back);
1792 wolfSSL_CTX_set_alpn_select_cb(w_context->tls.ctx,
1793 server_alpn_callback, NULL);
1797 if (w_context->setup_data.check_cert_revocation) {
1798 WOLFSSL_X509_VERIFY_PARAM *param;
1800 param = wolfSSL_X509_VERIFY_PARAM_new();
1801 wolfSSL_X509_VERIFY_PARAM_set_flags(param, WOLFSSL_CRL_CHECK);
1802 wolfSSL_CTX_set1_param(w_context->dtls.ctx, param);
1803#if !COAP_DISABLE_TCP
1804 wolfSSL_CTX_set1_param(w_context->tls.ctx, param);
1806 wolfSSL_X509_VERIFY_PARAM_free(param);
1809 if (w_context->setup_data.verify_peer_cert) {
1810 wolfSSL_CTX_set_verify(w_context->dtls.ctx,
1811 WOLFSSL_VERIFY_PEER |
1812 WOLFSSL_VERIFY_CLIENT_ONCE |
1813 WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT,
1814 tls_verify_call_back);
1815#if !COAP_DISABLE_TCP
1816 wolfSSL_CTX_set_verify(w_context->tls.ctx,
1817 WOLFSSL_VERIFY_PEER |
1818 WOLFSSL_VERIFY_CLIENT_ONCE |
1819 WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT,
1820 tls_verify_call_back);
1823 wolfSSL_CTX_set_verify(w_context->dtls.ctx,
1824 WOLFSSL_VERIFY_NONE, tls_verify_call_back);
1825#if !COAP_DISABLE_TCP
1826 wolfSSL_CTX_set_verify(w_context->tls.ctx,
1827 WOLFSSL_VERIFY_NONE, tls_verify_call_back);
1832 if (w_context->setup_data.cert_chain_validation) {
1833 wolfSSL_CTX_set_verify_depth(w_context->dtls.ctx,
1835#if !COAP_DISABLE_TCP
1836 wolfSSL_CTX_set_verify_depth(w_context->tls.ctx,
1845 w_context->psk_pki_enabled |= IS_PKI;
1847#if ! defined(WOLFSSL_DTLS_CID)
1856 const char *ca_file,
1857 const char *ca_dir) {
1858 coap_wolfssl_context_t *w_context =
1862 coap_log_warn(
"coap_context_set_pki_root_cas: (D)TLS environment "
1866 if (ca_file == NULL && ca_dir == NULL) {
1867 coap_log_warn(
"coap_context_set_pki_root_cas: ca_file and/or ca_dir "
1871 if (w_context->root_ca_file) {
1872 wolfssl_free(w_context->root_ca_file);
1873 w_context->root_ca_file = NULL;
1876 w_context->root_ca_file = wolfssl_strdup(ca_file);
1878 if (w_context->root_ca_dir) {
1879 wolfssl_free(w_context->root_ca_dir);
1880 w_context->root_ca_dir = NULL;
1883 w_context->root_ca_dir = wolfssl_strdup(ca_dir);
1890 coap_wolfssl_context_t *w_context =
1894 coap_log_warn(
"coap_context_set_pki_trust_store: (D)TLS environment "
1898#ifdef WOLFSSL_SYS_CA_CERTS
1899 w_context->trust_store_defined = 1;
1902 coap_log_warn(
"coap_context_set_pki_trust_store: (D)TLS environment "
1903 "not supported for wolfSSL < v5.5.2 or –enable-sys-ca-certs not defined\n");
1910 coap_wolfssl_context_t *w_context =
1912 return w_context->psk_pki_enabled ? 1 : 0;
1917 coap_wolfssl_context_t *w_context = (coap_wolfssl_context_t *)handle;
1921 wolfssl_free(w_context->root_ca_file);
1922 wolfssl_free(w_context->root_ca_dir);
1924 if (w_context->dtls.ctx)
1925 wolfSSL_CTX_free(w_context->dtls.ctx);
1926 if (w_context->dtls.cookie_hmac)
1927 wolfSSL_HMAC_CTX_free(w_context->dtls.cookie_hmac);
1929#if !COAP_DISABLE_TCP
1930 if (w_context->tls.ctx)
1931 wolfSSL_CTX_free(w_context->tls.ctx);
1933 wolfssl_free(w_context);
1936#if COAP_SERVER_SUPPORT
1939 coap_wolfssl_context_t *w_context = session && session->
context ?
1941 coap_dtls_context_t *dtls;
1942 WOLFSSL *ssl = NULL;
1945 coap_wolfssl_env_t *w_env = session ? (coap_wolfssl_env_t *)session->
tls : NULL;
1948 if (!w_env || !w_context)
1951 if (!setup_dtls_context(w_context))
1953 dtls = &w_context->dtls;
1955 ssl = wolfSSL_new(dtls->ctx);
1959 wolfSSL_set_app_data(ssl, NULL);
1960 wolfSSL_set_options(ssl, SSL_OP_COOKIE_EXCHANGE);
1961#ifdef WOLFSSL_DTLS_MTU
1962 wolfSSL_dtls_set_mtu(ssl, (
long)session->
mtu);
1965 wolfSSL_SetIOWriteCtx(ssl, w_env);
1966 wolfSSL_SetIOReadCtx(ssl, w_env);
1967 wolfSSL_set_app_data(ssl, session);
1968 w_env->data.session = session;
1970#if defined(WOLFSSL_DTLS13) && defined(WOLFSSL_SEND_HRR_COOKIE)
1971 if (wolfSSL_send_hrr_cookie(ssl, NULL, 0) != WOLFSSL_SUCCESS)
1972 coap_log_debug(
"Error: Unable to set cookie with Hello Retry Request\n");
1975#ifdef HAVE_SERVER_RENEGOTIATION_INFO
1976 if (wolfSSL_UseSecureRenegotiation(ssl) != WOLFSSL_SUCCESS) {
1977 coap_log_debug(
"Error: wolfSSL_UseSecureRenegotiation failed\n");
1981 if (w_context->psk_pki_enabled & IS_PSK) {
1984 if (psk_hint != NULL && psk_hint->
length) {
1985 char *hint = wolfssl_malloc(psk_hint->
length + 1);
1988 memcpy(hint, psk_hint->
s, psk_hint->
length);
1989 hint[psk_hint->
length] =
'\000';
1990 wolfSSL_use_psk_identity_hint(ssl, hint);
1997 if (w_context->psk_pki_enabled & IS_PKI) {
2002#if defined(WOLFSSL_DTLS_CH_FRAG) && defined(WOLFSSL_DTLS13)
2003 if (wolfSSL_dtls13_allow_ch_frag(ssl, 1) != WOLFSSL_SUCCESS) {
2008#if defined(WOLFSSL_DTLS_CID) && defined(WOLFSSL_DTLS13)
2010#if COAP_DTLS_CID_LENGTH > DTLS_CID_MAX_SIZE
2011#bad COAP_DTLS_CID_LENGTH > DTLS_CID_MAX_SIZE
2014 if (wolfSSL_dtls_cid_use(ssl) != WOLFSSL_SUCCESS)
2016 uint8_t cid[COAP_DTLS_CID_LENGTH];
2021 if (wolfSSL_dtls_cid_set(ssl, cid,
sizeof(cid)) != WOLFSSL_SUCCESS)
2027 w_env->last_timeout = now;
2030 r = wolfSSL_accept(ssl);
2032 int err = wolfSSL_get_error(ssl, r);
2033 if (err != WOLFSSL_ERROR_WANT_READ && err != WOLFSSL_ERROR_WANT_WRITE)
2046 coap_dtls_free_wolfssl_env(w_env);
2047 session->
tls = NULL;
2052#if COAP_CLIENT_SUPPORT
2055 coap_wolfssl_context_t *w_context =
2058 if (w_context->psk_pki_enabled & IS_PSK) {
2063 wolfSSL_set_max_proto_version(ssl,
2066#if !COAP_DISABLE_TCP
2068 wolfSSL_set_max_proto_version(ssl,
2070 wolfSSL_set_options(ssl, WOLFSSL_OP_NO_TLSv1_3);
2073 coap_log_debug(
"CoAP Client restricted to (D)TLS1.2 with Identity Hint callback\n");
2075 set_ciphersuites(ssl, COAP_ENC_PSK);
2079 wolfSSL_set_tlsext_host_name(ssl, setup_data->
client_sni) != 1) {
2080 coap_log_warn(
"wolfSSL_set_tlsext_host_name: set '%s' failed",
2083 wolfSSL_set_psk_client_callback(ssl, coap_dtls_psk_client_callback);
2085#if defined(WOLFSSL_DTLS_CID) && defined(WOLFSSL_DTLS13)
2087 if (wolfSSL_dtls_cid_use(ssl) != WOLFSSL_SUCCESS)
2092 if (wolfSSL_dtls_cid_set(ssl, NULL, 0) != WOLFSSL_SUCCESS)
2097 if ((w_context->psk_pki_enabled & IS_PKI) ||
2098 (w_context->psk_pki_enabled & (IS_PSK | IS_PKI)) == 0) {
2105 if (!(w_context->psk_pki_enabled & IS_PKI)) {
2119 set_ciphersuites(ssl, COAP_ENC_PKI);
2123#if !COAP_DISABLE_TCP
2125 wolfSSL_set_alpn_protos(ssl, coap_alpn,
sizeof(coap_alpn));
2130 wolfSSL_set_tlsext_host_name(ssl, setup_data->
client_sni) != 1) {
2131 coap_log_warn(
"wolfSSL_set_tlsext_host_name: set '%s' failed",
2136 WOLFSSL_X509_VERIFY_PARAM *param;
2138 param = wolfSSL_X509_VERIFY_PARAM_new();
2139 wolfSSL_X509_VERIFY_PARAM_set_flags(param, WOLFSSL_CRL_CHECK);
2140 WOLFSSL_CTX *ctx = wolfSSL_get_SSL_CTX(ssl);
2142 wolfSSL_CTX_set1_param(ctx, param);
2143 wolfSSL_X509_VERIFY_PARAM_free(param);
2147 wolfSSL_set_verify(ssl,
2148 WOLFSSL_VERIFY_PEER |
2149 WOLFSSL_VERIFY_CLIENT_ONCE |
2150 WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT,
2151 tls_verify_call_back);
2153 wolfSSL_set_verify(ssl, WOLFSSL_VERIFY_NONE, tls_verify_call_back);
2159#if defined(WOLFSSL_DTLS_CID) && defined(WOLFSSL_DTLS13)
2161 if (wolfSSL_dtls_cid_use(ssl) != WOLFSSL_SUCCESS)
2166 if (wolfSSL_dtls_cid_set(ssl, NULL, 0) != WOLFSSL_SUCCESS)
2177 WOLFSSL *ssl = NULL;
2179 coap_wolfssl_context_t *w_context = session && session->
context ?
2181 coap_dtls_context_t *dtls;
2182 coap_wolfssl_env_t *w_env = session ?
2186 if (!w_env || !w_context)
2189 if (!setup_dtls_context(w_context))
2191 dtls = &w_context->dtls;
2193 ssl = wolfSSL_new(dtls->ctx);
2198 w_env->data.session = session;
2199 wolfSSL_set_app_data(ssl, session);
2200 wolfSSL_set_options(ssl, SSL_OP_COOKIE_EXCHANGE);
2201 wolfSSL_SetIOWriteCtx(ssl, w_env);
2202 wolfSSL_SetIOReadCtx(ssl, w_env);
2203#ifdef WOLFSSL_DTLS_MTU
2204 wolfSSL_dtls_set_mtu(ssl, (
long)session->
mtu);
2207 if (!setup_client_ssl_session(session, ssl))
2209#ifdef HAVE_SERVER_RENEGOTIATION_INFO
2210 if (wolfSSL_UseSecureRenegotiation(ssl) != WOLFSSL_SUCCESS) {
2211 coap_log_debug(
"Error: wolfSSL_UseSecureRenegotiation failed\n");
2217#if defined(WOLFSSL_DTLS13) && defined(WOLFSSL_SEND_HRR_COOKIE)
2218 wolfSSL_NoKeyShares(ssl);
2220 r = wolfSSL_connect(ssl);
2222 int ret = wolfSSL_get_error(ssl, r);
2223 if (ret != WOLFSSL_ERROR_WANT_READ && ret != WOLFSSL_ERROR_WANT_WRITE)
2231 w_env->last_timeout = now;
2243#ifdef WOLFSSL_DTLS_MTU
2244 coap_wolfssl_env_t *w_env = (coap_wolfssl_env_t *)session->
tls;
2245 WOLFSSL *ssl = w_env ? w_env->ssl : NULL;
2248 wolfSSL_dtls_set_mtu(ssl, (
long)session->
mtu);
2257 coap_wolfssl_env_t *w_env = (coap_wolfssl_env_t *)session->
tls;
2258 WOLFSSL *ssl = w_env ? w_env->ssl : NULL;
2261 if (!wolfSSL_SSL_in_init(ssl) && !(wolfSSL_get_shutdown(ssl) & WOLFSSL_SENT_SHUTDOWN)) {
2262 int r = wolfSSL_shutdown(ssl);
2264 wolfSSL_shutdown(ssl);
2271 coap_dtls_free_wolfssl_env(w_env);
2272 session->
tls = NULL;
2277 const uint8_t *data,
size_t data_len) {
2278 coap_wolfssl_env_t *w_env = (coap_wolfssl_env_t *)session->
tls;
2279 WOLFSSL *ssl = w_env ? w_env->ssl : NULL;
2282 assert(ssl != NULL);
2287 r = wolfSSL_write(ssl, data, (
int)data_len);
2290 int err = wolfSSL_get_error(ssl, r);
2291 if (err == WOLFSSL_ERROR_WANT_READ || err == WOLFSSL_ERROR_WANT_WRITE) {
2295 if (err == WOLFSSL_ERROR_ZERO_RETURN)
2297 else if (err == WOLFSSL_ERROR_SSL)
2330 coap_wolfssl_env_t *w_env = (coap_wolfssl_env_t *)session->
tls;
2331 unsigned int scalar;
2338 scalar = 1 << w_env->retry_scalar;
2352 coap_wolfssl_env_t *w_env = (coap_wolfssl_env_t *)session->
tls;
2353 WOLFSSL *ssl = w_env ? w_env->ssl : NULL;
2356 w_env->retry_scalar++;
2362 wolfSSL_dtls_retransmit(ssl);
2366#if COAP_SERVER_SUPPORT
2370 const uint8_t *data,
size_t data_len) {
2371 coap_wolfssl_env_t *w_env = (coap_wolfssl_env_t *)session->
tls;
2372 coap_ssl_data_t *ssl_data;
2377 session->
tls = w_env;
2384 ssl_data = w_env ? &w_env->data : NULL;
2385 assert(ssl_data != NULL);
2390 if (ssl_data->pdu_len) {
2391 coap_log_err(
"** %s: Previous data not read %u bytes\n",
2395 ssl_data->session = session;
2396 ssl_data->pdu = data;
2397 ssl_data->pdu_len = (unsigned)data_len;
2406 coap_ssl_data_t *ssl_data;
2407 coap_wolfssl_env_t *w_env = (coap_wolfssl_env_t *)session->
tls;
2408 WOLFSSL *ssl = w_env ? w_env->ssl : NULL;
2410 int in_init = wolfSSL_SSL_in_init(ssl);
2413 assert(ssl != NULL);
2415 ssl_data = &w_env->data;
2417 if (ssl_data->pdu_len) {
2418 coap_log_err(
"** %s: Previous data not read %u bytes\n",
2421 ssl_data->pdu = data;
2422 ssl_data->pdu_len = (unsigned)data_len;
2425 r = wolfSSL_read(ssl, pdu, (
int)
sizeof(pdu));
2432 int err = wolfSSL_get_error(ssl, r);
2433 if (err == WOLFSSL_ERROR_WANT_READ || err == WOLFSSL_ERROR_WANT_WRITE) {
2434 if (in_init && wolfSSL_is_init_finished(ssl)) {
2437#if defined(WOLFSSL_DTLS_CID) && defined(WOLFSSL_DTLS13) && COAP_CLIENT_SUPPORT
2440 if (wolfSSL_dtls_cid_is_enabled(ssl)) {
2448 if (!strcmp(wolfSSL_get_version(ssl),
"DTLSv1.3")) {
2457 }
else if (err == APP_DATA_READY) {
2458 r = wolfSSL_read(ssl, pdu, (
int)
sizeof(pdu));
2466 if (err == WOLFSSL_ERROR_ZERO_RETURN) {
2471 if (err == FATAL_ERROR) {
2472 WOLFSSL_ALERT_HISTORY h;
2474 if (wolfSSL_get_alert_history(ssl, &h) == WOLFSSL_SUCCESS) {
2475 if (h.last_rx.code != close_notify && h.last_rx.code != -1) {
2478 wolfSSL_alert_desc_string_long(h.last_rx.code));
2499 if (ssl_data && ssl_data->pdu_len) {
2501 coap_log_debug(
"coap_dtls_receive: ret %d: remaining data %u\n", r, ssl_data->pdu_len);
2502 ssl_data->pdu_len = 0;
2503 ssl_data->pdu = NULL;
2510 unsigned int overhead = 37;
2511 const WOLFSSL_CIPHER *s_ciph = NULL;
2512 coap_wolfssl_env_t *w_env = (coap_wolfssl_env_t *)session->
tls;
2513 WOLFSSL *ssl = w_env ? w_env->ssl : NULL;
2516 s_ciph = wolfSSL_get_current_cipher(ssl);
2518 unsigned int ivlen, maclen, blocksize = 1, pad = 0;
2520 const WOLFSSL_EVP_CIPHER *e_ciph;
2521 const WOLFSSL_EVP_MD *e_md;
2524 e_ciph = wolfSSL_EVP_get_cipherbynid(wolfSSL_CIPHER_get_cipher_nid(s_ciph));
2526 switch (WOLFSSL_EVP_CIPHER_mode(e_ciph)) {
2528 case WOLFSSL_EVP_CIPH_GCM_MODE:
2529#ifndef WOLFSSL_EVP_GCM_TLS_EXPLICIT_IV_LEN
2530#define WOLFSSL_EVP_GCM_TLS_EXPLICIT_IV_LEN 8
2532#ifndef WOLFSSL_EVP_GCM_TLS_TAG_LEN
2533#define WOLFSSL_EVP_GCM_TLS_TAG_LEN 16
2535 ivlen = WOLFSSL_EVP_GCM_TLS_EXPLICIT_IV_LEN;
2536 maclen = WOLFSSL_EVP_GCM_TLS_TAG_LEN;
2539 case WOLFSSL_EVP_CIPH_CCM_MODE:
2540#ifndef WOLFSSL_EVP_CCM_TLS_EXPLICIT_IV_LEN
2541#define WOLFSSL_EVP_CCM_TLS_EXPLICIT_IV_LEN 8
2543 ivlen = WOLFSSL_EVP_CCM_TLS_EXPLICIT_IV_LEN;
2544 wolfSSL_CIPHER_description(s_ciph, cipher,
sizeof(cipher));
2545 if (strstr(cipher,
"CCM8"))
2551 case WOLFSSL_EVP_CIPH_CBC_MODE:
2552 e_md = wolfSSL_EVP_get_digestbynid(wolfSSL_CIPHER_get_digest_nid(s_ciph));
2553 blocksize = wolfSSL_EVP_CIPHER_block_size(e_ciph);
2554 ivlen = wolfSSL_EVP_CIPHER_iv_length(e_ciph);
2556 maclen = wolfSSL_EVP_MD_size(e_md);
2559 case WOLFSSL_EVP_CIPH_STREAM_CIPHER:
2566 wolfSSL_CIPHER_description(s_ciph, cipher,
sizeof(cipher));
2573#ifndef WOLFSSL_DTLS13_RT_HEADER_LENGTH
2574#define WOLFSSL_DTLS13_RT_HEADER_LENGTH 13
2576 overhead = WOLFSSL_DTLS13_RT_HEADER_LENGTH + ivlen + maclen + blocksize - 1 +
2582#if !COAP_DISABLE_TCP
2583#if COAP_CLIENT_SUPPORT
2586 WOLFSSL *ssl = NULL;
2588 coap_wolfssl_context_t *w_context =
2590 coap_tls_context_t *tls;
2591 coap_wolfssl_env_t *w_env =
2598 if (!setup_tls_context(w_context))
2600 tls = &w_context->tls;
2602 ssl = wolfSSL_new(tls->ctx);
2605 wolfSSL_SetIOWriteCtx(ssl, w_env);
2606 wolfSSL_SetIOReadCtx(ssl, w_env);
2607 wolfSSL_set_app_data(ssl, session);
2608 w_env->data.session = session;
2610 if (!setup_client_ssl_session(session, ssl))
2613 session->
tls = w_env;
2615 r = wolfSSL_connect(ssl);
2617 int ret = wolfSSL_get_error(ssl, r);
2618 if (ret != WOLFSSL_ERROR_WANT_READ && ret != WOLFSSL_ERROR_WANT_WRITE)
2620 if (ret == WOLFSSL_ERROR_WANT_READ)
2622 if (ret == WOLFSSL_ERROR_WANT_WRITE) {
2624#ifdef COAP_EPOLL_SUPPORT
2638 w_env->last_timeout = now;
2639 if (wolfSSL_is_init_finished(ssl)) {
2647 coap_dtls_free_wolfssl_env(w_env);
2654#if COAP_SERVER_SUPPORT
2657 WOLFSSL *ssl = NULL;
2658 coap_wolfssl_context_t *w_context =
2660 coap_tls_context_t *tls;
2663 coap_wolfssl_env_t *w_env =
2670 if (!setup_tls_context(w_context))
2672 tls = &w_context->tls;
2674 ssl = wolfSSL_new(tls->ctx);
2677 wolfSSL_SetIOWriteCtx(ssl, w_env);
2678 wolfSSL_SetIOReadCtx(ssl, w_env);
2679 wolfSSL_set_app_data(ssl, session);
2681 wolfSSL_set_cipher_list(ssl,
"ALL");
2683 if (w_context->psk_pki_enabled & IS_PSK) {
2685 if (psk_hint != NULL && psk_hint->
length) {
2686 char *hint = wolfssl_malloc(psk_hint->
length + 1);
2689 memcpy(hint, psk_hint->
s, psk_hint->
length);
2690 hint[psk_hint->
length] =
'\000';
2691 wolfSSL_use_psk_identity_hint(ssl, hint);
2698 if (w_context->psk_pki_enabled & IS_PKI) {
2702#if defined(HAVE_RPK) && LIBWOLFSSL_VERSION_HEX >= 0x05006004
2703 if (w_context->setup_data.is_rpk_not_cert) {
2704 char stype[] = {WOLFSSL_CERT_TYPE_RPK};
2706 wolfSSL_set_server_cert_type(ssl, stype,
sizeof(stype)/
sizeof(stype[0]));
2711 w_env->last_timeout = now;
2713 w_env->data.session = session;
2715 r = wolfSSL_accept(ssl);
2717 int err = wolfSSL_get_error(ssl, r);
2718 if (err != WOLFSSL_ERROR_WANT_READ && err != WOLFSSL_ERROR_WANT_WRITE) {
2721 if (err == WOLFSSL_ERROR_WANT_READ) {
2724 if (err == WOLFSSL_ERROR_WANT_WRITE) {
2726#ifdef COAP_EPOLL_SUPPORT
2739 session->
tls = w_env;
2740 if (wolfSSL_is_init_finished(ssl)) {
2750 coap_dtls_free_wolfssl_env(w_env);
2751 session->
tls = NULL;
2758 coap_wolfssl_env_t *w_env = (coap_wolfssl_env_t *)session->
tls;
2759 WOLFSSL *ssl = w_env ? w_env->ssl : NULL;
2762 if (!wolfSSL_SSL_in_init(ssl) && !(wolfSSL_get_shutdown(ssl) & WOLFSSL_SENT_SHUTDOWN)) {
2763 int r = wolfSSL_shutdown(ssl);
2765 wolfSSL_shutdown(ssl);
2772 coap_dtls_free_wolfssl_env(w_env);
2773 session->
tls = NULL;
2783 coap_wolfssl_env_t *w_env = (coap_wolfssl_env_t *)session->
tls;
2784 WOLFSSL *ssl = w_env ? w_env->ssl : NULL;
2790 in_init = !wolfSSL_is_init_finished(ssl);
2792 r = wolfSSL_write(ssl, data, (
int)data_len);
2795 int err = wolfSSL_get_error(ssl, r);
2796 if (err == WOLFSSL_ERROR_WANT_READ || err == WOLFSSL_ERROR_WANT_WRITE) {
2797 if (in_init && wolfSSL_is_init_finished(ssl)) {
2803 if (err == WOLFSSL_ERROR_WANT_READ)
2805 else if (err == WOLFSSL_ERROR_WANT_WRITE) {
2807#ifdef COAP_EPOLL_SUPPORT
2819 if (err == WOLFSSL_ERROR_ZERO_RETURN)
2821 else if (err == WOLFSSL_ERROR_SSL)
2825 }
else if (in_init && wolfSSL_is_init_finished(ssl)) {
2844 if (r == (ssize_t)data_len)
2861 coap_wolfssl_env_t *w_env = (coap_wolfssl_env_t *)session->
tls;
2862 WOLFSSL *ssl = w_env ? w_env->ssl : NULL;
2870 in_init = !wolfSSL_is_init_finished(ssl);
2872 r = wolfSSL_read(ssl, data, (
int)data_len);
2874 int err = wolfSSL_get_error(ssl, r);
2875 if (err == WOLFSSL_ERROR_WANT_READ || err == WOLFSSL_ERROR_WANT_WRITE) {
2876 if (in_init && wolfSSL_is_init_finished(ssl)) {
2882 if (err == WOLFSSL_ERROR_WANT_READ)
2884 if (err == WOLFSSL_ERROR_WANT_WRITE) {
2886#ifdef COAP_EPOLL_SUPPORT
2896 if (err == WOLFSSL_ERROR_ZERO_RETURN) {
2899 }
else if (err == WOLFSSL_ERROR_SSL) {
2901 }
else if (err == FATAL_ERROR) {
2902 WOLFSSL_ALERT_HISTORY h;
2905 if (wolfSSL_get_alert_history(ssl, &h) == WOLFSSL_SUCCESS) {
2906 if (h.last_rx.code != close_notify && h.last_rx.code != -1) {
2909 wolfSSL_alert_desc_string_long(h.last_rx.code));
2915 }
else if (in_init && wolfSSL_is_init_finished(ssl)) {
2941#if COAP_SERVER_SUPPORT
2944 WOLFSSL_EVP_MD_CTX *digest_ctx = wolfSSL_EVP_MD_CTX_new();
2947 wolfSSL_EVP_DigestInit_ex(digest_ctx, wolfSSL_EVP_sha256(), NULL);
2955 wolfSSL_EVP_MD_CTX_free(digest_ctx);
2960 const uint8_t *data,
2962 return wolfSSL_EVP_DigestUpdate(digest_ctx, data, data_len);
2969 int ret = wolfSSL_EVP_DigestFinal_ex(digest_ctx, (uint8_t *)digest_buffer, &size);
2976#if COAP_WS_SUPPORT || COAP_OSCORE_SUPPORT
2978coap_crypto_output_errors(
const char *prefix) {
2979#if COAP_MAX_LOGGING_LEVEL < _COAP_LOG_WARN
2984 while ((e = wolfSSL_ERR_get_error()))
2987 wolfSSL_ERR_reason_error_string(e),
2988 ssl_function_definition(e));
2998static struct hash_algs {
3000 const WOLFSSL_EVP_MD *(*get_hash)(void);
3009static const WOLFSSL_EVP_MD *
3010get_hash_alg(
cose_alg_t alg,
size_t *length) {
3013 for (idx = 0; idx <
sizeof(hashs) /
sizeof(
struct hash_algs); idx++) {
3014 if (hashs[idx].alg == alg) {
3015 *length = hashs[idx].length;
3016 return hashs[idx].get_hash();
3019 coap_log_debug(
"get_hash_alg: COSE hash %d not supported\n", alg);
3027 unsigned int length;
3028 const WOLFSSL_EVP_MD *evp_md;
3029 WOLFSSL_EVP_MD_CTX *evp_ctx = NULL;
3033 if ((evp_md = get_hash_alg(alg, &hash_length)) == NULL) {
3034 coap_log_debug(
"coap_crypto_hash: algorithm %d not supported\n", alg);
3037 evp_ctx = wolfSSL_EVP_MD_CTX_new();
3038 if (evp_ctx == NULL)
3040 if (wolfSSL_EVP_DigestInit_ex(evp_ctx, evp_md, NULL) == 0)
3043 if (wolfSSL_EVP_DigestUpdate(evp_ctx, data->
s, data->
length) == 0)
3049 if (wolfSSL_EVP_DigestFinal_ex(evp_ctx,
dummy->s, &length) == 0)
3051 dummy->length = length;
3052 if (hash_length < dummy->length)
3053 dummy->length = hash_length;
3055 wolfSSL_EVP_MD_CTX_free(evp_ctx);
3059 coap_crypto_output_errors(
"coap_crypto_hash");
3062 wolfSSL_EVP_MD_CTX_free(evp_ctx);
3067#if COAP_OSCORE_SUPPORT
3068#if LIBWOLFSSL_VERSION_HEX < 0x05006000
3069static const WOLFSSL_EVP_CIPHER *
3070EVP_aes_128_ccm(
void) {
3071 return "AES-128-CCM";
3074static const WOLFSSL_EVP_CIPHER *
3075EVP_aes_256_ccm(
void) {
3076 return "AES-256-CCM";
3090static struct cipher_algs {
3092 const WOLFSSL_EVP_CIPHER *(*get_cipher)(void);
3097static const WOLFSSL_EVP_CIPHER *
3101 for (idx = 0; idx <
sizeof(ciphers) /
sizeof(
struct cipher_algs); idx++) {
3102 if (ciphers[idx].alg == alg)
3103 return ciphers[idx].get_cipher();
3105 coap_log_debug(
"get_cipher_alg: COSE cipher %d not supported\n", alg);
3114static struct hmac_algs {
3116 const WOLFSSL_EVP_MD *(*get_hmac)(void);
3123static const WOLFSSL_EVP_MD *
3127 for (idx = 0; idx <
sizeof(hmacs) /
sizeof(
struct hmac_algs); idx++) {
3128 if (hmacs[idx].hmac_alg == hmac_alg)
3129 return hmacs[idx].get_hmac();
3131 coap_log_debug(
"get_hmac_alg: COSE HMAC %d not supported\n", hmac_alg);
3137 return get_cipher_alg(alg) != NULL;
3146 return get_hmac_alg(hmac_alg) != NULL;
3150 if (1 != (Func)) { \
3159 size_t *max_result_len) {
3165 byte *authTag = NULL;
3171 assert(params != NULL);
3177 if (ccm->
key.
s == NULL || ccm->
nonce == NULL)
3180 result_len = data->
length;
3181 nonce_length = 15 - ccm->
l;
3183 memset(&aes, 0,
sizeof(aes));
3188 authTag = (
byte *)wolfssl_malloc(ccm->
tag_len);
3192 ret = wc_AesCcmEncrypt(&aes, result, data->
s, data->
length, ccm->
nonce,
3193 nonce_length, authTag, ccm->
tag_len,
3200 memcpy(result + result_len, authTag, ccm->
tag_len);
3202 *max_result_len = result_len;
3203 wolfssl_free(authTag);
3207 coap_crypto_output_errors(
"coap_crypto_aead_encrypt");
3208 wolfssl_free(authTag);
3218 size_t *max_result_len) {
3223 byte *authTag = NULL;
3232 assert(params != NULL);
3240 authTag = (
byte *)wolfssl_malloc(ccm->
tag_len);
3248 if (ccm->
key.
s == NULL || ccm->
nonce == NULL)
3251 memset(&aes, 0,
sizeof(aes));
3258 ret = wc_AesCcmDecrypt(&aes, result, data->
s, len, ccm->
nonce,
3259 15 - ccm->
l, authTag, ccm->
tag_len,
3265 *max_result_len = len;
3266 wolfssl_free(authTag);
3270 coap_crypto_output_errors(
"coap_crypto_aead_decrypt");
3271 wolfssl_free(authTag);
3280 unsigned int result_len;
3281 const WOLFSSL_EVP_MD *evp_md;
3288 if ((evp_md = get_hmac_alg(hmac_alg)) == 0) {
3289 coap_log_debug(
"coap_crypto_hmac: algorithm %d not supported\n", hmac_alg);
3295 result_len = (
unsigned int)
dummy->length;
3296 if (wolfSSL_HMAC(evp_md,
3303 dummy->length = result_len;
3308 coap_crypto_output_errors(
"coap_crypto_hmac");
3320#pragma GCC diagnostic ignored "-Wunused-function"
static size_t strnlen(const char *s, size_t maxlen)
A length-safe strlen() fake.
#define COAP_RXBUFFER_SIZE
#define COAP_SOCKET_WANT_READ
non blocking socket is waiting for reading
#define COAP_SOCKET_WANT_WRITE
non blocking socket is waiting for writing
void coap_epoll_ctl_mod(coap_socket_t *sock, uint32_t events, const char *func)
Epoll specific function to modify the state of events that epoll is tracking on the appropriate file ...
Library specific build wrapper for coap_internal.h.
int coap_dtls_context_set_pki(coap_context_t *ctx COAP_UNUSED, const coap_dtls_pki_t *setup_data COAP_UNUSED, const coap_dtls_role_t role COAP_UNUSED)
coap_tick_t coap_dtls_get_timeout(coap_session_t *session COAP_UNUSED, coap_tick_t now COAP_UNUSED)
ssize_t coap_tls_read(coap_session_t *session COAP_UNUSED, uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
coap_tick_t coap_dtls_get_context_timeout(void *dtls_context COAP_UNUSED)
int coap_dtls_receive(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
void * coap_dtls_get_tls(const coap_session_t *c_session COAP_UNUSED, coap_tls_library_t *tls_lib)
unsigned int coap_dtls_get_overhead(coap_session_t *session COAP_UNUSED)
int coap_dtls_context_load_pki_trust_store(coap_context_t *ctx COAP_UNUSED)
static coap_log_t dtls_log_level
int coap_dtls_context_check_keys_enabled(coap_context_t *ctx COAP_UNUSED)
ssize_t coap_dtls_send(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
ssize_t coap_tls_write(coap_session_t *session COAP_UNUSED, const uint8_t *data COAP_UNUSED, size_t data_len COAP_UNUSED)
void coap_dtls_session_update_mtu(coap_session_t *session COAP_UNUSED)
int coap_dtls_context_set_pki_root_cas(coap_context_t *ctx COAP_UNUSED, const char *ca_file COAP_UNUSED, const char *ca_path COAP_UNUSED)
int coap_dtls_handle_timeout(coap_session_t *session COAP_UNUSED)
void coap_dtls_free_context(void *handle COAP_UNUSED)
void coap_dtls_free_session(coap_session_t *coap_session COAP_UNUSED)
void * coap_dtls_new_context(coap_context_t *coap_context COAP_UNUSED)
void coap_tls_free_session(coap_session_t *coap_session COAP_UNUSED)
coap_binary_t * get_asn1_spki(const uint8_t *data, size_t size)
Abstract SPKI public key from the ASN1.
void coap_digest_free(coap_digest_ctx_t *digest_ctx)
Free off coap_digest_ctx_t.
int coap_digest_final(coap_digest_ctx_t *digest_ctx, coap_digest_t *digest_buffer)
Finalize the coap_digest information into the provided digest_buffer.
int coap_digest_update(coap_digest_ctx_t *digest_ctx, const uint8_t *data, size_t data_len)
Update the coap_digest information with the next chunk of data.
coap_digest_ctx_t * coap_digest_setup(void)
Initialize a coap_digest.
uint64_t coap_tick_t
This data type represents internal timer ticks with COAP_TICKS_PER_SECOND resolution.
int coap_prng_lkd(void *buf, size_t len)
Fills buf with len random bytes using the default pseudo random number generator.
int coap_handle_event_lkd(coap_context_t *context, coap_event_t event, coap_session_t *session)
Invokes the event handler of context for the given event and data.
int coap_handle_dgram(coap_context_t *ctx, coap_session_t *session, uint8_t *msg, size_t msg_len)
Parses and interprets a CoAP datagram with context ctx.
void coap_ticks(coap_tick_t *t)
Returns the current value of an internal tick counter.
int coap_crypto_hmac(cose_hmac_alg_t hmac_alg, coap_bin_const_t *key, coap_bin_const_t *data, coap_bin_const_t **hmac)
Create a HMAC hash of the provided data.
int coap_crypto_aead_decrypt(const coap_crypto_param_t *params, coap_bin_const_t *data, coap_bin_const_t *aad, uint8_t *result, size_t *max_result_len)
Decrypt the provided encrypted data into plaintext.
int coap_crypto_aead_encrypt(const coap_crypto_param_t *params, coap_bin_const_t *data, coap_bin_const_t *aad, uint8_t *result, size_t *max_result_len)
Encrypt the provided plaintext data.
int coap_crypto_hash(cose_alg_t alg, const coap_bin_const_t *data, coap_bin_const_t **hash)
Create a hash of the provided data.
int coap_crypto_check_hkdf_alg(cose_hkdf_alg_t hkdf_alg)
Check whether the defined hkdf algorithm is supported by the underlying crypto library.
int coap_crypto_check_cipher_alg(cose_alg_t alg)
Check whether the defined cipher algorithm is supported by the underlying crypto library.
void * coap_tls_new_server_session(coap_session_t *coap_session)
Create a TLS new server-side session.
const coap_bin_const_t * coap_get_session_client_psk_identity(const coap_session_t *coap_session)
Get the current client's PSK identity.
void coap_dtls_startup(void)
Initialize the underlying (D)TLS Library layer.
int coap_dtls_define_issue(coap_define_issue_key_t type, coap_define_issue_fail_t fail, coap_dtls_key_t *key, const coap_dtls_role_t role, int ret)
Report PKI DEFINE type issue.
void * coap_dtls_new_client_session(coap_session_t *coap_session)
Create a new client-side session.
void * coap_dtls_new_server_session(coap_session_t *coap_session)
Create a new DTLS server-side session.
int coap_dtls_hello(coap_session_t *coap_session, const uint8_t *data, size_t data_len)
Handling client HELLO messages from a new candiate peer.
int coap_dtls_set_cid_tuple_change(coap_context_t *context, uint8_t every)
Set the Connection ID client tuple frequency change for testing CIDs.
int coap_dtls_is_context_timeout(void)
Check if timeout is handled per CoAP session or per CoAP context.
int coap_dtls_context_set_cpsk(coap_context_t *coap_context, coap_dtls_cpsk_t *setup_data)
Set the DTLS context's default client PSK information.
int coap_dtls_context_set_spsk(coap_context_t *coap_context, coap_dtls_spsk_t *setup_data)
Set the DTLS context's default server PSK information.
void coap_dtls_shutdown(void)
Close down the underlying (D)TLS Library layer.
const coap_bin_const_t * coap_get_session_client_psk_key(const coap_session_t *coap_session)
Get the current client's PSK key.
void * coap_tls_new_client_session(coap_session_t *coap_session)
Create a new TLS client-side session.
#define COAP_DTLS_RETRANSMIT_COAP_TICKS
void coap_dtls_map_key_type_to_define(const coap_dtls_pki_t *setup_data, coap_dtls_key_t *key)
Map the PKI key definitions to the new DEFINE format.
const coap_bin_const_t * coap_get_session_server_psk_key(const coap_session_t *coap_session)
Get the current server's PSK key.
const coap_bin_const_t * coap_get_session_server_psk_hint(const coap_session_t *coap_session)
Get the current server's PSK identity hint.
@ COAP_DEFINE_KEY_PRIVATE
@ COAP_DEFINE_FAIL_NOT_SUPPORTED
#define COAP_DTLS_HINT_LENGTH
coap_tls_version_t * coap_get_tls_library_version(void)
Determine the type and version of the underlying (D)TLS library.
@ COAP_PKI_KEY_DEF_PKCS11
The PKI key type is PKCS11 (pkcs11:...).
@ COAP_PKI_KEY_DEF_DER_BUF
The PKI key type is DER buffer (ASN.1).
@ COAP_PKI_KEY_DEF_PEM_BUF
The PKI key type is PEM buffer.
@ COAP_PKI_KEY_DEF_PEM
The PKI key type is PEM file.
@ COAP_PKI_KEY_DEF_ENGINE
The PKI key type is to be passed to ENGINE.
@ COAP_PKI_KEY_DEF_RPK_BUF
The PKI key type is RPK in buffer.
@ COAP_PKI_KEY_DEF_DER
The PKI key type is DER file.
@ COAP_PKI_KEY_DEF_PKCS11_RPK
The PKI key type is PKCS11 w/ RPK (pkcs11:...).
@ COAP_DTLS_ROLE_SERVER
Internal function invoked for server.
@ COAP_DTLS_ROLE_CLIENT
Internal function invoked for client.
@ COAP_PKI_KEY_DEFINE
The individual PKI key types are Definable.
@ COAP_TLS_LIBRARY_WOLFSSL
Using wolfSSL library.
@ COAP_EVENT_DTLS_CLOSED
Triggerred when (D)TLS session closed.
@ COAP_EVENT_DTLS_CONNECTED
Triggered when (D)TLS session connected.
@ COAP_EVENT_DTLS_RENEGOTIATE
Triggered when (D)TLS session renegotiated.
@ COAP_EVENT_DTLS_ERROR
Triggered when (D)TLS error occurs.
#define coap_lock_callback_ret(r, func)
Dummy for no thread-safe code.
#define coap_log_debug(...)
coap_log_t coap_dtls_get_log_level(void)
Get the current (D)TLS logging.
#define coap_dtls_log(level,...)
Logging function.
void coap_dtls_set_log_level(coap_log_t level)
Sets the (D)TLS logging level to the specified level.
const char * coap_session_str(const coap_session_t *session)
Get session description.
#define coap_log_info(...)
#define coap_log_warn(...)
#define coap_log_err(...)
#define coap_log(level,...)
Logging function.
int coap_netif_available(coap_session_t *session)
Function interface to check whether netif for session is still available.
int cose_get_hmac_alg_for_hkdf(cose_hkdf_alg_t hkdf_alg, cose_hmac_alg_t *hmac_alg)
@ COSE_HMAC_ALG_HMAC384_384
@ COSE_HMAC_ALG_HMAC256_256
@ COSE_HMAC_ALG_HMAC512_512
@ COSE_ALGORITHM_SHA_256_64
@ COSE_ALGORITHM_SHA_256_256
@ COSE_ALGORITHM_AES_CCM_16_64_128
@ COSE_ALGORITHM_AES_CCM_16_64_256
int coap_session_refresh_psk_hint(coap_session_t *session, const coap_bin_const_t *psk_hint)
Refresh the session's current Identity Hint (PSK).
int coap_session_refresh_psk_key(coap_session_t *session, const coap_bin_const_t *psk_key)
Refresh the session's current pre-shared key (PSK).
int coap_session_refresh_psk_identity(coap_session_t *session, const coap_bin_const_t *psk_identity)
Refresh the session's current pre-shared identity (PSK).
void coap_session_disconnected_lkd(coap_session_t *session, coap_nack_reason_t reason)
Notify session that it has failed.
@ COAP_SESSION_TYPE_CLIENT
client-side
@ COAP_SESSION_STATE_HANDSHAKE
coap_binary_t * coap_new_binary(size_t size)
Returns a new binary object with at least size bytes storage allocated.
coap_bin_const_t * coap_new_bin_const(const uint8_t *data, size_t size)
Take the specified byte array (text) and create a coap_bin_const_t * Returns a new const binary objec...
void coap_delete_binary(coap_binary_t *s)
Deletes the given coap_binary_t object and releases any memory allocated.
int coap_dtls_cid_is_supported(void)
Check whether (D)TLS CID is available.
int coap_dtls_psk_is_supported(void)
Check whether (D)TLS PSK is available.
int coap_tls_is_supported(void)
Check whether TLS is available.
int coap_oscore_is_supported(void)
Check whether OSCORE is available.
int coap_dtls_is_supported(void)
Check whether DTLS is available.
int coap_dtls_pki_is_supported(void)
Check whether (D)TLS PKI is available.
int coap_dtls_rpk_is_supported(void)
Check whether (D)TLS RPK is available.
int coap_dtls_pkcs11_is_supported(void)
Check whether (D)TLS PKCS11 is available.
CoAP binary data definition with const data.
size_t length
length of binary data
const uint8_t * s
read-only binary data
CoAP binary data definition.
size_t length
length of binary data
The CoAP stack's global state is stored in a coap_context_t object.
uint8_t testing_cids
Change client's source port every testing_cids.
coap_dtls_spsk_t spsk_setup_data
Contains the initial PSK server setup data.
The structure that holds the AES Crypto information.
size_t l
The number of bytes in the length field.
const uint8_t * nonce
must be exactly 15 - l bytes
coap_crypto_key_t key
The Key to use.
size_t tag_len
The size of the Tag.
The common structure that holds the Crypto information.
union coap_crypto_param_t::@2 params
coap_crypto_aes_ccm_t aes
Used if AES type encryption.
The structure that holds the Client PSK information.
coap_bin_const_t identity
The structure used for defining the Client PSK setup data to be used.
uint8_t use_cid
Set to 1 if DTLS Connection ID is to be used.
void * ih_call_back_arg
Passed in to the Identity Hint callback function.
char * client_sni
If not NULL, SNI to use in client TLS setup.
coap_dtls_ih_callback_t validate_ih_call_back
Identity Hint check callback function.
uint8_t ec_jpake
Set to COAP_DTLS_CPSK_SETUP_VERSION to support this version of the struct.
The structure that holds the PKI key information.
coap_pki_key_define_t define
for definable type keys
union coap_dtls_key_t::@3 key
coap_pki_key_t key_type
key format type
The structure used for defining the PKI setup data to be used.
uint8_t allow_no_crl
1 ignore if CRL not there
void * cn_call_back_arg
Passed in to the CN callback function.
uint8_t cert_chain_validation
1 if to check cert_chain_verify_depth
uint8_t use_cid
1 if DTLS Connection ID is to be used (Client only, server always enabled) if supported
uint8_t check_cert_revocation
1 if revocation checks wanted
coap_dtls_pki_sni_callback_t validate_sni_call_back
SNI check callback function.
uint8_t cert_chain_verify_depth
recommended depth is 3
uint8_t allow_expired_certs
1 if expired certs are allowed
uint8_t verify_peer_cert
Set to COAP_DTLS_PKI_SETUP_VERSION to support this version of the struct.
char * client_sni
If not NULL, SNI to use in client TLS setup.
uint8_t allow_self_signed
1 if self-signed certs are allowed.
void * sni_call_back_arg
Passed in to the sni callback function.
coap_dtls_cn_callback_t validate_cn_call_back
CN check callback function.
uint8_t allow_expired_crl
1 if expired crl is allowed
uint8_t is_rpk_not_cert
1 is RPK instead of Public Certificate.
uint8_t check_common_ca
1 if peer cert is to be signed by the same CA as the local cert
coap_dtls_key_t pki_key
PKI key definition.
The structure that holds the Server Pre-Shared Key and Identity Hint information.
The structure used for defining the Server PSK setup data to be used.
coap_dtls_psk_sni_callback_t validate_sni_call_back
SNI check callback function.
coap_dtls_id_callback_t validate_id_call_back
Identity check callback function.
void * id_call_back_arg
Passed in to the Identity callback function.
uint8_t ec_jpake
Set to COAP_DTLS_SPSK_SETUP_VERSION to support this version of the struct.
void * sni_call_back_arg
Passed in to the SNI callback function.
coap_dtls_spsk_info_t psk_info
Server PSK definition.
coap_layer_write_t l_write
coap_layer_establish_t l_establish
coap_const_char_ptr_t public_cert
define: Public Cert
coap_const_char_ptr_t private_key
define: Private Key
coap_const_char_ptr_t ca
define: Common CA Certificate
size_t public_cert_len
define Public Cert length (if needed)
size_t ca_len
define CA Cert length (if needed)
coap_pki_define_t private_key_def
define: Private Key type definition
size_t private_key_len
define Private Key length (if needed)
coap_pki_define_t ca_def
define: Common CA type definition
coap_pki_define_t public_cert_def
define: Public Cert type definition
Abstraction of virtual session that can be attached to coap_context_t (client) or coap_endpoint_t (se...
unsigned int dtls_timeout_count
dtls setup retry counter
coap_socket_t sock
socket object for the session, if any
coap_session_state_t state
current state of relationship with peer
coap_bin_const_t * client_cid
Contains client CID or NULL.
coap_proto_t proto
protocol used
uint8_t is_dtls13
Set if session is DTLS1.3.
coap_dtls_cpsk_t cpsk_setup_data
client provided PSK initial setup data
size_t mtu
path or CSM mtu (xmt)
uint8_t negotiated_cid
Set for a client if CID negotiated.
int dtls_event
Tracking any (D)TLS events on this session.
void * tls
security parameters
uint16_t max_retransmit
maximum re-transmit count (default 4)
coap_session_type_t type
client or server side socket
coap_context_t * context
session's context
coap_layer_func_t lfunc[COAP_LAYER_LAST]
Layer functions to use.
coap_socket_flags_t flags
1 or more of COAP_SOCKET* flag values
CoAP string data definition with const data.
const uint8_t * s
read-only string data
size_t length
length of string
The structure used for returning the underlying (D)TLS library information.
uint64_t built_version
(D)TLS Built against Library Version
coap_tls_library_t type
Library type.
uint64_t version
(D)TLS runtime Library Version
const char * s_byte
signed char ptr
const uint8_t * u_byte
unsigned char ptr