| /* |
| * Copyright (c) 2018 Intel Corporation |
| * Copyright (c) 2018 Nordic Semiconductor ASA |
| * |
| * SPDX-License-Identifier: Apache-2.0 |
| */ |
| |
| #include <stdbool.h> |
| #include <zephyr/posix/fcntl.h> |
| |
| #include <zephyr/logging/log.h> |
| LOG_MODULE_REGISTER(net_sock_tls, CONFIG_NET_SOCKETS_LOG_LEVEL); |
| |
| #include <zephyr/init.h> |
| #include <zephyr/sys/util.h> |
| #include <zephyr/net/socket.h> |
| #include <zephyr/random/random.h> |
| #include <zephyr/internal/syscall_handler.h> |
| #include <zephyr/sys/fdtable.h> |
| |
| /* TODO: Remove all direct access to private fields. |
| * According with Mbed TLS migration guide: |
| * |
| * Direct access to fields of structures |
| * (`struct` types) declared in public headers is no longer |
| * supported. In Mbed TLS 3, the layout of structures is not |
| * considered part of the stable API, and minor versions (3.1, 3.2, |
| * etc.) may add, remove, rename, reorder or change the type of |
| * structure fields. |
| */ |
| #if !defined(MBEDTLS_ALLOW_PRIVATE_ACCESS) |
| #define MBEDTLS_ALLOW_PRIVATE_ACCESS |
| #endif |
| |
| #if defined(CONFIG_MBEDTLS) |
| #if !defined(CONFIG_MBEDTLS_CFG_FILE) |
| #include "mbedtls/config.h" |
| #else |
| #include CONFIG_MBEDTLS_CFG_FILE |
| #endif /* CONFIG_MBEDTLS_CFG_FILE */ |
| |
| #include <mbedtls/net_sockets.h> |
| #include <mbedtls/x509.h> |
| #include <mbedtls/x509_crt.h> |
| #include <mbedtls/ssl.h> |
| #include <mbedtls/ssl_cookie.h> |
| #include <mbedtls/error.h> |
| #include <mbedtls/platform.h> |
| #include <mbedtls/ssl_cache.h> |
| #endif /* CONFIG_MBEDTLS */ |
| |
| #include "sockets_internal.h" |
| #include "tls_internal.h" |
| |
| #if defined(CONFIG_MBEDTLS_DEBUG) |
| #include <zephyr_mbedtls_priv.h> |
| #endif |
| |
| #if defined(CONFIG_NET_SOCKETS_TLS_MAX_APP_PROTOCOLS) |
| #define ALPN_MAX_PROTOCOLS (CONFIG_NET_SOCKETS_TLS_MAX_APP_PROTOCOLS + 1) |
| #else |
| #define ALPN_MAX_PROTOCOLS 0 |
| #endif /* CONFIG_NET_SOCKETS_TLS_MAX_APP_PROTOCOLS */ |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| #define DTLS_SENDMSG_BUF_SIZE (CONFIG_NET_SOCKETS_DTLS_SENDMSG_BUF_SIZE) |
| #else |
| #define DTLS_SENDMSG_BUF_SIZE 0 |
| #endif /* CONFIG_NET_SOCKETS_ENABLE_DTLS */ |
| |
| static const struct socket_op_vtable tls_sock_fd_op_vtable; |
| |
| #ifndef MBEDTLS_ERR_SSL_PEER_VERIFY_FAILED |
| #define MBEDTLS_ERR_SSL_PEER_VERIFY_FAILED MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE |
| #endif |
| |
| /** A list of secure tags that TLS context should use. */ |
| struct sec_tag_list { |
| /** An array of secure tags referencing TLS credentials. */ |
| sec_tag_t sec_tags[CONFIG_NET_SOCKETS_TLS_MAX_CREDENTIALS]; |
| |
| /** Number of configured secure tags. */ |
| int sec_tag_count; |
| }; |
| |
| /** Timer context for DTLS. */ |
| struct dtls_timing_context { |
| /** Current time, stored during timer set. */ |
| uint32_t snapshot; |
| |
| /** Intermediate delay value. For details, refer to mbedTLS API |
| * documentation (mbedtls_ssl_set_timer_t). |
| */ |
| uint32_t int_ms; |
| |
| /** Final delay value. For details, refer to mbedTLS API documentation |
| * (mbedtls_ssl_set_timer_t). |
| */ |
| uint32_t fin_ms; |
| }; |
| |
| /** TLS peer address/session ID mapping. */ |
| struct tls_session_cache { |
| /** Creation time. */ |
| int64_t timestamp; |
| |
| /** Peer address. */ |
| struct sockaddr peer_addr; |
| |
| /** Session buffer. */ |
| uint8_t *session; |
| |
| /** Session length. */ |
| size_t session_len; |
| }; |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| struct tls_dtls_cid { |
| bool enabled; |
| unsigned char cid[MAX(MBEDTLS_SSL_CID_OUT_LEN_MAX, |
| MBEDTLS_SSL_CID_IN_LEN_MAX)]; |
| size_t cid_len; |
| }; |
| #endif |
| |
| /** TLS context information. */ |
| __net_socket struct tls_context { |
| /** Underlying TCP/UDP socket. */ |
| int sock; |
| |
| /** Information whether TLS context is used. */ |
| bool is_used : 1; |
| |
| /** Information whether TLS context was initialized. */ |
| bool is_initialized : 1; |
| |
| /** Information whether underlying socket is listening. */ |
| bool is_listening : 1; |
| |
| /** Information whether TLS handshake is currently in progress. */ |
| bool handshake_in_progress : 1; |
| |
| /** Session ended at the TLS/DTLS level. */ |
| bool session_closed : 1; |
| |
| /** Socket type. */ |
| enum net_sock_type type; |
| |
| /** Secure protocol version running on TLS context. */ |
| enum net_ip_protocol_secure tls_version; |
| |
| /** Socket flags passed to a socket call. */ |
| int flags; |
| |
| /* Indicates whether socket is in error state at TLS/DTLS level. */ |
| int error; |
| |
| /** Information whether TLS handshake is complete or not. */ |
| struct k_sem tls_established; |
| |
| /* TLS socket mutex lock. */ |
| struct k_mutex *lock; |
| |
| /** TLS specific option values. */ |
| struct { |
| /** Select which credentials to use with TLS. */ |
| struct sec_tag_list sec_tag_list; |
| |
| /** 0-terminated list of allowed ciphersuites (mbedTLS format). |
| */ |
| int ciphersuites[CONFIG_NET_SOCKETS_TLS_MAX_CIPHERSUITES + 1]; |
| |
| /** Information if hostname was explicitly set on a socket. */ |
| bool is_hostname_set; |
| |
| /** Peer verification level. */ |
| int8_t verify_level; |
| |
| /** Indicating on whether DER certificates should not be copied |
| * to the heap. |
| */ |
| int8_t cert_nocopy; |
| |
| /** DTLS role, client by default. */ |
| int8_t role; |
| |
| /** NULL-terminated list of allowed application layer |
| * protocols. |
| */ |
| const char *alpn_list[ALPN_MAX_PROTOCOLS]; |
| |
| /** Session cache enabled on a socket. */ |
| bool cache_enabled; |
| |
| /** Socket TX timeout */ |
| k_timeout_t timeout_tx; |
| |
| /** Socket RX timeout */ |
| k_timeout_t timeout_rx; |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| /* DTLS handshake timeout */ |
| uint32_t dtls_handshake_timeout_min; |
| uint32_t dtls_handshake_timeout_max; |
| |
| struct tls_dtls_cid dtls_cid; |
| |
| bool dtls_handshake_on_connect; |
| #endif /* CONFIG_NET_SOCKETS_ENABLE_DTLS */ |
| } options; |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| /** Context information for DTLS timing. */ |
| struct dtls_timing_context dtls_timing; |
| |
| /** mbedTLS cookie context for DTLS */ |
| mbedtls_ssl_cookie_ctx cookie; |
| |
| /** DTLS peer address. */ |
| struct sockaddr dtls_peer_addr; |
| |
| /** DTLS peer address length. */ |
| socklen_t dtls_peer_addrlen; |
| #endif /* CONFIG_NET_SOCKETS_ENABLE_DTLS */ |
| |
| #if defined(CONFIG_MBEDTLS) |
| /** mbedTLS context. */ |
| mbedtls_ssl_context ssl; |
| |
| /** mbedTLS configuration. */ |
| mbedtls_ssl_config config; |
| |
| #if defined(MBEDTLS_X509_CRT_PARSE_C) |
| /** mbedTLS structure for CA chain. */ |
| mbedtls_x509_crt ca_chain; |
| |
| /** mbedTLS structure for own certificate. */ |
| mbedtls_x509_crt own_cert; |
| |
| /** mbedTLS structure for own private key. */ |
| mbedtls_pk_context priv_key; |
| #endif /* MBEDTLS_X509_CRT_PARSE_C */ |
| |
| #endif /* CONFIG_MBEDTLS */ |
| }; |
| |
| |
| /* A global pool of TLS contexts. */ |
| static struct tls_context tls_contexts[CONFIG_NET_SOCKETS_TLS_MAX_CONTEXTS]; |
| |
| static struct tls_session_cache client_cache[CONFIG_NET_SOCKETS_TLS_MAX_CLIENT_SESSION_COUNT]; |
| |
| #if defined(MBEDTLS_SSL_CACHE_C) |
| static mbedtls_ssl_cache_context server_cache; |
| #endif |
| |
| /* A mutex for protecting TLS context allocation. */ |
| static struct k_mutex context_lock; |
| |
| /* Arbitrary delay value to wait if mbedTLS reports it cannot proceed for |
| * reasons other than TX/RX block. |
| */ |
| #define TLS_WAIT_MS 100 |
| |
| static void tls_session_cache_reset(void) |
| { |
| for (int i = 0; i < ARRAY_SIZE(client_cache); i++) { |
| if (client_cache[i].session != NULL) { |
| mbedtls_free(client_cache[i].session); |
| } |
| } |
| |
| (void)memset(client_cache, 0, sizeof(client_cache)); |
| } |
| |
| bool net_socket_is_tls(void *obj) |
| { |
| return PART_OF_ARRAY(tls_contexts, (struct tls_context *)obj); |
| } |
| |
| static int tls_ctr_drbg_random(void *ctx, unsigned char *buf, size_t len) |
| { |
| ARG_UNUSED(ctx); |
| |
| #if defined(CONFIG_CSPRNG_ENABLED) |
| return sys_csrand_get(buf, len); |
| #else |
| sys_rand_get(buf, len); |
| |
| return 0; |
| #endif |
| } |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| /* mbedTLS-defined function for setting timer. */ |
| static void dtls_timing_set_delay(void *data, uint32_t int_ms, uint32_t fin_ms) |
| { |
| struct dtls_timing_context *ctx = data; |
| |
| ctx->int_ms = int_ms; |
| ctx->fin_ms = fin_ms; |
| |
| if (fin_ms != 0U) { |
| ctx->snapshot = k_uptime_get_32(); |
| } |
| } |
| |
| /* mbedTLS-defined function for getting timer status. |
| * The return values are specified by mbedTLS. The callback must return: |
| * -1 if cancelled (fin_ms == 0), |
| * 0 if none of the delays have passed, |
| * 1 if only the intermediate delay has passed, |
| * 2 if the final delay has passed. |
| */ |
| static int dtls_timing_get_delay(void *data) |
| { |
| struct dtls_timing_context *timing = data; |
| unsigned long elapsed_ms; |
| |
| NET_ASSERT(timing); |
| |
| if (timing->fin_ms == 0U) { |
| return -1; |
| } |
| |
| elapsed_ms = k_uptime_get_32() - timing->snapshot; |
| |
| if (elapsed_ms >= timing->fin_ms) { |
| return 2; |
| } |
| |
| if (elapsed_ms >= timing->int_ms) { |
| return 1; |
| } |
| |
| return 0; |
| } |
| |
| static int dtls_get_remaining_timeout(struct tls_context *ctx) |
| { |
| struct dtls_timing_context *timing = &ctx->dtls_timing; |
| uint32_t elapsed_ms; |
| |
| elapsed_ms = k_uptime_get_32() - timing->snapshot; |
| |
| if (timing->fin_ms == 0U) { |
| return SYS_FOREVER_MS; |
| } |
| |
| if (elapsed_ms >= timing->fin_ms) { |
| return 0; |
| } |
| |
| return timing->fin_ms - elapsed_ms; |
| } |
| #endif /* CONFIG_NET_SOCKETS_ENABLE_DTLS */ |
| |
| /* Initialize TLS internals. */ |
| static int tls_init(void) |
| { |
| |
| #if !defined(CONFIG_ENTROPY_HAS_DRIVER) |
| NET_WARN("No entropy device on the system, " |
| "TLS communication is insecure!"); |
| #endif |
| |
| (void)memset(tls_contexts, 0, sizeof(tls_contexts)); |
| (void)memset(client_cache, 0, sizeof(client_cache)); |
| |
| k_mutex_init(&context_lock); |
| |
| #if defined(MBEDTLS_SSL_CACHE_C) |
| mbedtls_ssl_cache_init(&server_cache); |
| #endif |
| |
| return 0; |
| } |
| |
| SYS_INIT(tls_init, APPLICATION, CONFIG_KERNEL_INIT_PRIORITY_DEFAULT); |
| |
| static inline bool is_handshake_complete(struct tls_context *ctx) |
| { |
| return k_sem_count_get(&ctx->tls_established) != 0; |
| } |
| |
| /* |
| * Copied from include/mbedtls/ssl_internal.h |
| * |
| * Maximum length we can advertise as our max content length for |
| * RFC 6066 max_fragment_length extension negotiation purposes |
| * (the lesser of both sizes, if they are unequal.) |
| */ |
| #define MBEDTLS_TLS_EXT_ADV_CONTENT_LEN ( \ |
| (MBEDTLS_SSL_IN_CONTENT_LEN > MBEDTLS_SSL_OUT_CONTENT_LEN) \ |
| ? (MBEDTLS_SSL_OUT_CONTENT_LEN) \ |
| : (MBEDTLS_SSL_IN_CONTENT_LEN) \ |
| ) |
| |
| #if defined(CONFIG_NET_SOCKETS_TLS_SET_MAX_FRAGMENT_LENGTH) && \ |
| defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH) && \ |
| (MBEDTLS_TLS_EXT_ADV_CONTENT_LEN < 16384) |
| |
| BUILD_ASSERT(MBEDTLS_TLS_EXT_ADV_CONTENT_LEN >= 512, |
| "Too small content length!"); |
| |
| static inline unsigned char tls_mfl_code_from_content_len(size_t len) |
| { |
| if (len >= 4096) { |
| return MBEDTLS_SSL_MAX_FRAG_LEN_4096; |
| } else if (len >= 2048) { |
| return MBEDTLS_SSL_MAX_FRAG_LEN_2048; |
| } else if (len >= 1024) { |
| return MBEDTLS_SSL_MAX_FRAG_LEN_1024; |
| } else if (len >= 512) { |
| return MBEDTLS_SSL_MAX_FRAG_LEN_512; |
| } else { |
| return MBEDTLS_SSL_MAX_FRAG_LEN_INVALID; |
| } |
| } |
| |
| static inline void tls_set_max_frag_len(mbedtls_ssl_config *config, enum net_sock_type type) |
| { |
| unsigned char mfl_code; |
| size_t len = MBEDTLS_TLS_EXT_ADV_CONTENT_LEN; |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| if (type == SOCK_DGRAM && len > CONFIG_NET_SOCKETS_DTLS_MAX_FRAGMENT_LENGTH) { |
| len = CONFIG_NET_SOCKETS_DTLS_MAX_FRAGMENT_LENGTH; |
| } |
| #endif |
| mfl_code = tls_mfl_code_from_content_len(len); |
| |
| mbedtls_ssl_conf_max_frag_len(config, mfl_code); |
| } |
| #else |
| static inline void tls_set_max_frag_len(mbedtls_ssl_config *config, enum net_sock_type type) {} |
| #endif |
| |
| /* Allocate TLS context. */ |
| static struct tls_context *tls_alloc(void) |
| { |
| int i; |
| struct tls_context *tls = NULL; |
| |
| k_mutex_lock(&context_lock, K_FOREVER); |
| |
| for (i = 0; i < ARRAY_SIZE(tls_contexts); i++) { |
| if (!tls_contexts[i].is_used) { |
| tls = &tls_contexts[i]; |
| (void)memset(tls, 0, sizeof(*tls)); |
| tls->is_used = true; |
| tls->options.verify_level = -1; |
| tls->options.timeout_tx = K_FOREVER; |
| tls->options.timeout_rx = K_FOREVER; |
| tls->sock = -1; |
| |
| NET_DBG("Allocated TLS context, %p", tls); |
| break; |
| } |
| } |
| |
| k_mutex_unlock(&context_lock); |
| |
| if (tls) { |
| k_sem_init(&tls->tls_established, 0, 1); |
| |
| mbedtls_ssl_init(&tls->ssl); |
| mbedtls_ssl_config_init(&tls->config); |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| mbedtls_ssl_cookie_init(&tls->cookie); |
| tls->options.dtls_handshake_timeout_min = |
| MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MIN; |
| tls->options.dtls_handshake_timeout_max = |
| MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MAX; |
| tls->options.dtls_cid.cid_len = 0; |
| tls->options.dtls_cid.enabled = false; |
| tls->options.dtls_handshake_on_connect = true; |
| #endif |
| #if defined(MBEDTLS_X509_CRT_PARSE_C) |
| mbedtls_x509_crt_init(&tls->ca_chain); |
| mbedtls_x509_crt_init(&tls->own_cert); |
| mbedtls_pk_init(&tls->priv_key); |
| #endif |
| |
| #if defined(CONFIG_MBEDTLS_DEBUG) |
| mbedtls_ssl_conf_dbg(&tls->config, zephyr_mbedtls_debug, NULL); |
| #endif |
| } else { |
| NET_WARN("Failed to allocate TLS context"); |
| } |
| |
| return tls; |
| } |
| |
| /* Allocate new TLS context and copy the content from the source context. */ |
| static struct tls_context *tls_clone(struct tls_context *source_tls) |
| { |
| struct tls_context *target_tls; |
| |
| target_tls = tls_alloc(); |
| if (!target_tls) { |
| return NULL; |
| } |
| |
| target_tls->tls_version = source_tls->tls_version; |
| target_tls->type = source_tls->type; |
| |
| memcpy(&target_tls->options, &source_tls->options, |
| sizeof(target_tls->options)); |
| |
| #if defined(MBEDTLS_X509_CRT_PARSE_C) |
| if (target_tls->options.is_hostname_set) { |
| mbedtls_ssl_set_hostname(&target_tls->ssl, |
| source_tls->ssl.hostname); |
| } |
| #endif |
| |
| return target_tls; |
| } |
| |
| /* Release TLS context. */ |
| static int tls_release(struct tls_context *tls) |
| { |
| if (!PART_OF_ARRAY(tls_contexts, tls)) { |
| NET_ERR("Invalid TLS context"); |
| return -EBADF; |
| } |
| |
| if (!tls->is_used) { |
| NET_ERR("Deallocating unused TLS context"); |
| return -EBADF; |
| } |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| mbedtls_ssl_cookie_free(&tls->cookie); |
| #endif |
| mbedtls_ssl_config_free(&tls->config); |
| mbedtls_ssl_free(&tls->ssl); |
| #if defined(MBEDTLS_X509_CRT_PARSE_C) |
| mbedtls_x509_crt_free(&tls->ca_chain); |
| mbedtls_x509_crt_free(&tls->own_cert); |
| mbedtls_pk_free(&tls->priv_key); |
| #endif |
| |
| tls->is_used = false; |
| |
| return 0; |
| } |
| |
| static bool peer_addr_cmp(const struct sockaddr *addr, |
| const struct sockaddr *peer_addr) |
| { |
| if (addr->sa_family != peer_addr->sa_family) { |
| return false; |
| } |
| |
| if (IS_ENABLED(CONFIG_NET_IPV6) && peer_addr->sa_family == AF_INET6) { |
| struct sockaddr_in6 *addr1 = net_sin6(peer_addr); |
| struct sockaddr_in6 *addr2 = net_sin6(addr); |
| |
| return (addr1->sin6_port == addr2->sin6_port) && |
| net_ipv6_addr_cmp(&addr1->sin6_addr, &addr2->sin6_addr); |
| } else if (IS_ENABLED(CONFIG_NET_IPV4) && peer_addr->sa_family == AF_INET) { |
| struct sockaddr_in *addr1 = net_sin(peer_addr); |
| struct sockaddr_in *addr2 = net_sin(addr); |
| |
| return (addr1->sin_port == addr2->sin_port) && |
| net_ipv4_addr_cmp(&addr1->sin_addr, &addr2->sin_addr); |
| } |
| |
| return false; |
| } |
| |
| static int tls_session_save(const struct sockaddr *peer_addr, |
| mbedtls_ssl_session *session) |
| { |
| struct tls_session_cache *entry = NULL; |
| size_t session_len; |
| int ret; |
| |
| for (int i = 0; i < ARRAY_SIZE(client_cache); i++) { |
| if (client_cache[i].session == NULL) { |
| /* New entry. */ |
| if (entry == NULL || entry->session != NULL) { |
| entry = &client_cache[i]; |
| } |
| } else { |
| if (peer_addr_cmp(&client_cache[i].peer_addr, peer_addr)) { |
| /* Reuse old entry for given address. */ |
| entry = &client_cache[i]; |
| break; |
| } |
| |
| /* Remember the oldest entry and reuse if needed. */ |
| if (entry == NULL || |
| (entry->session != NULL && |
| entry->timestamp < client_cache[i].timestamp)) { |
| entry = &client_cache[i]; |
| } |
| } |
| } |
| |
| /* Allocate session and save */ |
| |
| if (entry->session != NULL) { |
| mbedtls_free(entry->session); |
| entry->session = NULL; |
| } |
| |
| (void)mbedtls_ssl_session_save(session, NULL, 0, &session_len); |
| |
| entry->session = mbedtls_calloc(1, session_len); |
| if (entry->session == NULL) { |
| NET_ERR("Failed to allocate session buffer."); |
| return -ENOMEM; |
| } |
| |
| ret = mbedtls_ssl_session_save(session, entry->session, session_len, |
| &session_len); |
| if (ret < 0) { |
| NET_ERR("Failed to serialize session, err: -0x%x.", -ret); |
| mbedtls_free(entry->session); |
| entry->session = NULL; |
| return -ENOMEM; |
| } |
| |
| entry->session_len = session_len; |
| entry->timestamp = k_uptime_get(); |
| memcpy(&entry->peer_addr, peer_addr, sizeof(*peer_addr)); |
| |
| return 0; |
| } |
| |
| static int tls_session_get(const struct sockaddr *peer_addr, |
| mbedtls_ssl_session *session) |
| { |
| struct tls_session_cache *entry = NULL; |
| int ret; |
| |
| for (int i = 0; i < ARRAY_SIZE(client_cache); i++) { |
| if (client_cache[i].session != NULL && |
| peer_addr_cmp(&client_cache[i].peer_addr, peer_addr)) { |
| entry = &client_cache[i]; |
| break; |
| } |
| } |
| |
| if (entry == NULL) { |
| return -ENOENT; |
| } |
| |
| ret = mbedtls_ssl_session_load(session, entry->session, |
| entry->session_len); |
| if (ret < 0) { |
| /* Discard corrupted session data. */ |
| mbedtls_free(entry->session); |
| entry->session = NULL; |
| NET_ERR("Failed to load TLS session %d", ret); |
| return -EIO; |
| } |
| |
| return 0; |
| } |
| |
| static void tls_session_store(struct tls_context *context, |
| const struct sockaddr *addr, |
| socklen_t addrlen) |
| { |
| mbedtls_ssl_session session; |
| struct sockaddr peer_addr = { 0 }; |
| int ret; |
| |
| if (!context->options.cache_enabled) { |
| return; |
| } |
| |
| memcpy(&peer_addr, addr, addrlen); |
| mbedtls_ssl_session_init(&session); |
| |
| ret = mbedtls_ssl_get_session(&context->ssl, &session); |
| if (ret < 0) { |
| NET_ERR("Failed to obtain session for %p", context); |
| goto exit; |
| } |
| |
| ret = tls_session_save(&peer_addr, &session); |
| if (ret < 0) { |
| NET_ERR("Failed to save session for %p", context); |
| } |
| |
| exit: |
| mbedtls_ssl_session_free(&session); |
| } |
| |
| static void tls_session_restore(struct tls_context *context, |
| const struct sockaddr *addr, |
| socklen_t addrlen) |
| { |
| mbedtls_ssl_session session; |
| struct sockaddr peer_addr = { 0 }; |
| int ret; |
| |
| if (!context->options.cache_enabled) { |
| return; |
| } |
| |
| memcpy(&peer_addr, addr, addrlen); |
| mbedtls_ssl_session_init(&session); |
| |
| ret = tls_session_get(&peer_addr, &session); |
| if (ret < 0) { |
| NET_DBG("Session not found for %p", context); |
| goto exit; |
| } |
| |
| ret = mbedtls_ssl_set_session(&context->ssl, &session); |
| if (ret < 0) { |
| NET_ERR("Failed to set session for %p", context); |
| } |
| |
| exit: |
| mbedtls_ssl_session_free(&session); |
| } |
| |
| static void tls_session_purge(void) |
| { |
| tls_session_cache_reset(); |
| |
| #if defined(MBEDTLS_SSL_CACHE_C) |
| mbedtls_ssl_cache_free(&server_cache); |
| mbedtls_ssl_cache_init(&server_cache); |
| #endif |
| } |
| |
| static inline int time_left(uint32_t start, uint32_t timeout) |
| { |
| uint32_t elapsed = k_uptime_get_32() - start; |
| |
| return timeout - elapsed; |
| } |
| |
| static int wait(int sock, int timeout, int event) |
| { |
| struct zsock_pollfd fds = { |
| .fd = sock, |
| .events = event, |
| }; |
| int ret; |
| |
| ret = zsock_poll(&fds, 1, timeout); |
| if (ret < 0) { |
| return ret; |
| } |
| |
| if (ret == 1) { |
| if (fds.revents & ZSOCK_POLLNVAL) { |
| return -EBADF; |
| } |
| |
| if (fds.revents & ZSOCK_POLLERR) { |
| int optval; |
| socklen_t optlen = sizeof(optval); |
| |
| if (zsock_getsockopt(fds.fd, SOL_SOCKET, SO_ERROR, |
| &optval, &optlen) == 0) { |
| NET_ERR("TLS underlying socket poll error %d", |
| -optval); |
| return -optval; |
| } |
| |
| return -EIO; |
| } |
| } |
| |
| return 0; |
| } |
| |
| static int wait_for_reason(int sock, int timeout, int reason) |
| { |
| if (reason == MBEDTLS_ERR_SSL_WANT_READ) { |
| return wait(sock, timeout, ZSOCK_POLLIN); |
| } |
| |
| if (reason == MBEDTLS_ERR_SSL_WANT_WRITE) { |
| return wait(sock, timeout, ZSOCK_POLLOUT); |
| } |
| |
| /* Any other reason - no way to monitor, just wait for some time. */ |
| k_msleep(TLS_WAIT_MS); |
| |
| return 0; |
| } |
| |
| static bool is_blocking(int sock, int flags) |
| { |
| int sock_flags = zsock_fcntl(sock, F_GETFL, 0); |
| |
| if (sock_flags == -1) { |
| return false; |
| } |
| |
| return !((flags & ZSOCK_MSG_DONTWAIT) || (sock_flags & O_NONBLOCK)); |
| } |
| |
| static int timeout_to_ms(k_timeout_t *timeout) |
| { |
| if (K_TIMEOUT_EQ(*timeout, K_NO_WAIT)) { |
| return 0; |
| } else if (K_TIMEOUT_EQ(*timeout, K_FOREVER)) { |
| return SYS_FOREVER_MS; |
| } else { |
| return k_ticks_to_ms_floor32(timeout->ticks); |
| } |
| } |
| |
| static void ctx_set_lock(struct tls_context *ctx, struct k_mutex *lock) |
| { |
| ctx->lock = lock; |
| } |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| static bool dtls_is_peer_addr_valid(struct tls_context *context, |
| const struct sockaddr *peer_addr, |
| socklen_t addrlen) |
| { |
| if (context->dtls_peer_addrlen != addrlen) { |
| return false; |
| } |
| |
| return peer_addr_cmp(&context->dtls_peer_addr, peer_addr); |
| } |
| |
| static void dtls_peer_address_set(struct tls_context *context, |
| const struct sockaddr *peer_addr, |
| socklen_t addrlen) |
| { |
| if (addrlen <= sizeof(context->dtls_peer_addr)) { |
| memcpy(&context->dtls_peer_addr, peer_addr, addrlen); |
| context->dtls_peer_addrlen = addrlen; |
| } |
| } |
| |
| static void dtls_peer_address_get(struct tls_context *context, |
| struct sockaddr *peer_addr, |
| socklen_t *addrlen) |
| { |
| socklen_t len = MIN(context->dtls_peer_addrlen, *addrlen); |
| |
| memcpy(peer_addr, &context->dtls_peer_addr, len); |
| *addrlen = len; |
| } |
| |
| static int dtls_tx(void *ctx, const unsigned char *buf, size_t len) |
| { |
| struct tls_context *tls_ctx = ctx; |
| ssize_t sent; |
| |
| sent = zsock_sendto(tls_ctx->sock, buf, len, ZSOCK_MSG_DONTWAIT, |
| &tls_ctx->dtls_peer_addr, |
| tls_ctx->dtls_peer_addrlen); |
| if (sent < 0) { |
| if (errno == EAGAIN) { |
| return MBEDTLS_ERR_SSL_WANT_WRITE; |
| } |
| |
| return MBEDTLS_ERR_NET_SEND_FAILED; |
| } |
| |
| return sent; |
| } |
| |
| static int dtls_rx(void *ctx, unsigned char *buf, size_t len) |
| { |
| struct tls_context *tls_ctx = ctx; |
| socklen_t addrlen = sizeof(struct sockaddr); |
| struct sockaddr addr; |
| int err; |
| ssize_t received; |
| |
| received = zsock_recvfrom(tls_ctx->sock, buf, len, |
| ZSOCK_MSG_DONTWAIT, &addr, &addrlen); |
| if (received < 0) { |
| if (errno == EAGAIN) { |
| return MBEDTLS_ERR_SSL_WANT_READ; |
| } |
| |
| return MBEDTLS_ERR_NET_RECV_FAILED; |
| } |
| |
| if (tls_ctx->dtls_peer_addrlen == 0) { |
| /* Only allow to store peer address for DTLS servers. */ |
| if (tls_ctx->options.role == MBEDTLS_SSL_IS_SERVER) { |
| dtls_peer_address_set(tls_ctx, &addr, addrlen); |
| |
| err = mbedtls_ssl_set_client_transport_id( |
| &tls_ctx->ssl, |
| (const unsigned char *)&addr, addrlen); |
| if (err < 0) { |
| return err; |
| } |
| } else { |
| /* For clients it's incorrect to receive when |
| * no peer has been set up. |
| */ |
| return MBEDTLS_ERR_SSL_PEER_VERIFY_FAILED; |
| } |
| } else if (!dtls_is_peer_addr_valid(tls_ctx, &addr, addrlen)) { |
| return MBEDTLS_ERR_SSL_WANT_READ; |
| } |
| |
| return received; |
| } |
| #endif /* CONFIG_NET_SOCKETS_ENABLE_DTLS */ |
| |
| static int tls_tx(void *ctx, const unsigned char *buf, size_t len) |
| { |
| struct tls_context *tls_ctx = ctx; |
| ssize_t sent; |
| |
| sent = zsock_sendto(tls_ctx->sock, buf, len, |
| ZSOCK_MSG_DONTWAIT, NULL, 0); |
| if (sent < 0) { |
| if (errno == EAGAIN) { |
| return MBEDTLS_ERR_SSL_WANT_WRITE; |
| } |
| |
| return MBEDTLS_ERR_NET_SEND_FAILED; |
| } |
| |
| return sent; |
| } |
| |
| static int tls_rx(void *ctx, unsigned char *buf, size_t len) |
| { |
| struct tls_context *tls_ctx = ctx; |
| ssize_t received; |
| |
| received = zsock_recvfrom(tls_ctx->sock, buf, len, |
| ZSOCK_MSG_DONTWAIT, NULL, 0); |
| if (received < 0) { |
| if (errno == EAGAIN) { |
| return MBEDTLS_ERR_SSL_WANT_READ; |
| } |
| |
| return MBEDTLS_ERR_NET_RECV_FAILED; |
| } |
| |
| return received; |
| } |
| |
| #if defined(MBEDTLS_X509_CRT_PARSE_C) |
| static bool crt_is_pem(const unsigned char *buf, size_t buflen) |
| { |
| return (buflen != 0 && buf[buflen - 1] == '\0' && |
| strstr((const char *)buf, "-----BEGIN CERTIFICATE-----") != NULL); |
| } |
| #endif |
| |
| static int tls_add_ca_certificate(struct tls_context *tls, |
| struct tls_credential *ca_cert) |
| { |
| #if defined(MBEDTLS_X509_CRT_PARSE_C) |
| int err; |
| |
| if (tls->options.cert_nocopy == TLS_CERT_NOCOPY_NONE || |
| crt_is_pem(ca_cert->buf, ca_cert->len)) { |
| err = mbedtls_x509_crt_parse(&tls->ca_chain, ca_cert->buf, |
| ca_cert->len); |
| } else { |
| err = mbedtls_x509_crt_parse_der_nocopy(&tls->ca_chain, |
| ca_cert->buf, |
| ca_cert->len); |
| } |
| |
| if (err != 0) { |
| NET_ERR("Failed to parse CA certificate, err: -0x%x", -err); |
| return -EINVAL; |
| } |
| |
| return 0; |
| #endif /* MBEDTLS_X509_CRT_PARSE_C */ |
| |
| return -ENOTSUP; |
| } |
| |
| static void tls_set_ca_chain(struct tls_context *tls) |
| { |
| #if defined(MBEDTLS_X509_CRT_PARSE_C) |
| mbedtls_ssl_conf_ca_chain(&tls->config, &tls->ca_chain, NULL); |
| mbedtls_ssl_conf_cert_profile(&tls->config, |
| &mbedtls_x509_crt_profile_default); |
| #endif /* MBEDTLS_X509_CRT_PARSE_C */ |
| } |
| |
| static int tls_add_own_cert(struct tls_context *tls, |
| struct tls_credential *own_cert) |
| { |
| #if defined(MBEDTLS_X509_CRT_PARSE_C) |
| int err; |
| |
| if (tls->options.cert_nocopy == TLS_CERT_NOCOPY_NONE || |
| crt_is_pem(own_cert->buf, own_cert->len)) { |
| err = mbedtls_x509_crt_parse(&tls->own_cert, |
| own_cert->buf, own_cert->len); |
| } else { |
| err = mbedtls_x509_crt_parse_der_nocopy(&tls->own_cert, |
| own_cert->buf, |
| own_cert->len); |
| } |
| |
| if (err != 0) { |
| return -EINVAL; |
| } |
| |
| return 0; |
| #endif /* MBEDTLS_X509_CRT_PARSE_C */ |
| |
| return -ENOTSUP; |
| } |
| |
| static int tls_set_own_cert(struct tls_context *tls) |
| { |
| #if defined(MBEDTLS_X509_CRT_PARSE_C) |
| int err = mbedtls_ssl_conf_own_cert(&tls->config, &tls->own_cert, |
| &tls->priv_key); |
| if (err != 0) { |
| err = -ENOMEM; |
| } |
| |
| return err; |
| #endif /* MBEDTLS_X509_CRT_PARSE_C */ |
| |
| return -ENOTSUP; |
| } |
| |
| static int tls_set_private_key(struct tls_context *tls, |
| struct tls_credential *priv_key) |
| { |
| #if defined(MBEDTLS_X509_CRT_PARSE_C) |
| int err; |
| |
| err = mbedtls_pk_parse_key(&tls->priv_key, priv_key->buf, |
| priv_key->len, NULL, 0, |
| tls_ctr_drbg_random, NULL); |
| if (err != 0) { |
| return -EINVAL; |
| } |
| |
| return 0; |
| #endif /* MBEDTLS_X509_CRT_PARSE_C */ |
| |
| return -ENOTSUP; |
| } |
| |
| static int tls_set_psk(struct tls_context *tls, |
| struct tls_credential *psk, |
| struct tls_credential *psk_id) |
| { |
| #if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED) |
| int err = mbedtls_ssl_conf_psk(&tls->config, |
| psk->buf, psk->len, |
| (const unsigned char *)psk_id->buf, |
| psk_id->len); |
| if (err != 0) { |
| return -EINVAL; |
| } |
| |
| return 0; |
| #endif |
| |
| return -ENOTSUP; |
| } |
| |
| static int tls_set_credential(struct tls_context *tls, |
| struct tls_credential *cred) |
| { |
| switch (cred->type) { |
| case TLS_CREDENTIAL_CA_CERTIFICATE: |
| return tls_add_ca_certificate(tls, cred); |
| |
| case TLS_CREDENTIAL_SERVER_CERTIFICATE: |
| return tls_add_own_cert(tls, cred); |
| |
| case TLS_CREDENTIAL_PRIVATE_KEY: |
| return tls_set_private_key(tls, cred); |
| break; |
| |
| case TLS_CREDENTIAL_PSK: |
| { |
| struct tls_credential *psk_id = |
| credential_get(cred->tag, TLS_CREDENTIAL_PSK_ID); |
| if (!psk_id) { |
| return -ENOENT; |
| } |
| |
| return tls_set_psk(tls, cred, psk_id); |
| } |
| |
| case TLS_CREDENTIAL_PSK_ID: |
| /* Ignore PSK ID - it will be used together |
| * with PSK |
| */ |
| break; |
| |
| default: |
| return -EINVAL; |
| } |
| |
| return 0; |
| } |
| |
| static int tls_mbedtls_set_credentials(struct tls_context *tls) |
| { |
| struct tls_credential *cred; |
| sec_tag_t tag; |
| int i, err = 0; |
| bool tag_found, ca_cert_present = false, own_cert_present = false; |
| |
| credentials_lock(); |
| |
| for (i = 0; i < tls->options.sec_tag_list.sec_tag_count; i++) { |
| tag = tls->options.sec_tag_list.sec_tags[i]; |
| cred = NULL; |
| tag_found = false; |
| |
| while ((cred = credential_next_get(tag, cred)) != NULL) { |
| tag_found = true; |
| |
| err = tls_set_credential(tls, cred); |
| if (err != 0) { |
| goto exit; |
| } |
| |
| if (cred->type == TLS_CREDENTIAL_CA_CERTIFICATE) { |
| ca_cert_present = true; |
| } else if (cred->type == TLS_CREDENTIAL_SERVER_CERTIFICATE) { |
| own_cert_present = true; |
| } |
| } |
| |
| if (!tag_found) { |
| err = -ENOENT; |
| goto exit; |
| } |
| } |
| |
| exit: |
| credentials_unlock(); |
| |
| if (err == 0) { |
| if (ca_cert_present) { |
| tls_set_ca_chain(tls); |
| } |
| if (own_cert_present) { |
| err = tls_set_own_cert(tls); |
| } |
| } |
| |
| return err; |
| } |
| |
| static int tls_mbedtls_reset(struct tls_context *context) |
| { |
| int ret; |
| |
| ret = mbedtls_ssl_session_reset(&context->ssl); |
| if (ret != 0) { |
| return ret; |
| } |
| |
| k_sem_reset(&context->tls_established); |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| /* Server role: reset the address so that a new |
| * client can connect w/o a need to reopen a socket |
| * Client role: keep peer addr so socket can continue to be used |
| * even on handshake timeout |
| */ |
| if (context->options.role == MBEDTLS_SSL_IS_SERVER) { |
| (void)memset(&context->dtls_peer_addr, 0, |
| sizeof(context->dtls_peer_addr)); |
| context->dtls_peer_addrlen = 0; |
| } |
| #endif |
| |
| return 0; |
| } |
| |
| static int tls_mbedtls_handshake(struct tls_context *context, |
| k_timeout_t timeout) |
| { |
| k_timepoint_t end; |
| int ret; |
| |
| context->handshake_in_progress = true; |
| |
| end = sys_timepoint_calc(timeout); |
| |
| while ((ret = mbedtls_ssl_handshake(&context->ssl)) != 0) { |
| if (ret == MBEDTLS_ERR_SSL_WANT_READ || |
| ret == MBEDTLS_ERR_SSL_WANT_WRITE || |
| ret == MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS || |
| ret == MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS) { |
| int timeout_ms; |
| |
| /* Blocking timeout. */ |
| timeout = sys_timepoint_timeout(end); |
| if (K_TIMEOUT_EQ(timeout, K_NO_WAIT)) { |
| ret = -EAGAIN; |
| break; |
| } |
| |
| /* Block. */ |
| timeout_ms = timeout_to_ms(&timeout); |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| if (context->type == SOCK_DGRAM) { |
| int timeout_dtls = |
| dtls_get_remaining_timeout(context); |
| |
| if (timeout_dtls != SYS_FOREVER_MS) { |
| if (timeout_ms == SYS_FOREVER_MS) { |
| timeout_ms = timeout_dtls; |
| } else { |
| timeout_ms = MIN(timeout_dtls, |
| timeout_ms); |
| } |
| } |
| } |
| #endif /* CONFIG_NET_SOCKETS_ENABLE_DTLS */ |
| |
| ret = wait_for_reason(context->sock, timeout_ms, ret); |
| if (ret != 0) { |
| break; |
| } |
| |
| continue; |
| } else if (ret == MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED) { |
| ret = tls_mbedtls_reset(context); |
| if (ret == 0) { |
| if (!K_TIMEOUT_EQ(timeout, K_NO_WAIT)) { |
| continue; |
| } |
| |
| ret = -EAGAIN; |
| break; |
| } |
| } else if (ret == MBEDTLS_ERR_SSL_TIMEOUT) { |
| /* MbedTLS API documentation requires session to |
| * be reset in this case |
| */ |
| ret = tls_mbedtls_reset(context); |
| if (ret == 0) { |
| NET_ERR("TLS handshake timeout"); |
| context->error = ETIMEDOUT; |
| ret = -ETIMEDOUT; |
| break; |
| } |
| } else { |
| /* MbedTLS API documentation requires session to |
| * be reset in other error cases |
| */ |
| NET_ERR("TLS handshake error: -0x%x", -ret); |
| ret = tls_mbedtls_reset(context); |
| if (ret == 0) { |
| context->error = ECONNABORTED; |
| ret = -ECONNABORTED; |
| break; |
| } |
| } |
| |
| /* Avoid constant loop if tls_mbedtls_reset fails */ |
| NET_ERR("TLS reset error: -0x%x", -ret); |
| context->error = ECONNABORTED; |
| ret = -ECONNABORTED; |
| break; |
| } |
| |
| if (ret == 0) { |
| k_sem_give(&context->tls_established); |
| } |
| |
| context->handshake_in_progress = false; |
| |
| return ret; |
| } |
| |
| static int tls_mbedtls_init(struct tls_context *context, bool is_server) |
| { |
| int role, type, ret; |
| |
| role = is_server ? MBEDTLS_SSL_IS_SERVER : MBEDTLS_SSL_IS_CLIENT; |
| |
| type = (context->type == SOCK_STREAM) ? |
| MBEDTLS_SSL_TRANSPORT_STREAM : |
| MBEDTLS_SSL_TRANSPORT_DATAGRAM; |
| |
| if (type == MBEDTLS_SSL_TRANSPORT_STREAM) { |
| mbedtls_ssl_set_bio(&context->ssl, context, |
| tls_tx, tls_rx, NULL); |
| } else { |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| mbedtls_ssl_set_bio(&context->ssl, context, |
| dtls_tx, dtls_rx, NULL); |
| #else |
| return -ENOTSUP; |
| #endif /* CONFIG_NET_SOCKETS_ENABLE_DTLS */ |
| } |
| |
| ret = mbedtls_ssl_config_defaults(&context->config, role, type, |
| MBEDTLS_SSL_PRESET_DEFAULT); |
| if (ret != 0) { |
| /* According to mbedTLS API documentation, |
| * mbedtls_ssl_config_defaults can fail due to memory |
| * allocation failure |
| */ |
| return -ENOMEM; |
| } |
| tls_set_max_frag_len(&context->config, context->type); |
| |
| #if defined(MBEDTLS_SSL_RENEGOTIATION) |
| mbedtls_ssl_conf_legacy_renegotiation(&context->config, |
| MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE); |
| mbedtls_ssl_conf_renegotiation(&context->config, |
| MBEDTLS_SSL_RENEGOTIATION_ENABLED); |
| #endif |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| if (type == MBEDTLS_SSL_TRANSPORT_DATAGRAM) { |
| /* DTLS requires timer callbacks to operate */ |
| mbedtls_ssl_set_timer_cb(&context->ssl, |
| &context->dtls_timing, |
| dtls_timing_set_delay, |
| dtls_timing_get_delay); |
| mbedtls_ssl_conf_handshake_timeout(&context->config, |
| context->options.dtls_handshake_timeout_min, |
| context->options.dtls_handshake_timeout_max); |
| |
| #if defined(CONFIG_MBEDTLS_SSL_DTLS_CONNECTION_ID) |
| if (context->options.dtls_cid.enabled) { |
| ret = mbedtls_ssl_conf_cid( |
| &context->config, |
| context->options.dtls_cid.cid_len, |
| MBEDTLS_SSL_UNEXPECTED_CID_IGNORE); |
| if (ret != 0) { |
| return -EINVAL; |
| } |
| } |
| #endif /* CONFIG_MBEDTLS_SSL_DTLS_CONNECTION_ID */ |
| |
| /* Configure cookie for DTLS server */ |
| if (role == MBEDTLS_SSL_IS_SERVER) { |
| ret = mbedtls_ssl_cookie_setup(&context->cookie, |
| tls_ctr_drbg_random, |
| NULL); |
| if (ret != 0) { |
| return -ENOMEM; |
| } |
| |
| mbedtls_ssl_conf_dtls_cookies(&context->config, |
| mbedtls_ssl_cookie_write, |
| mbedtls_ssl_cookie_check, |
| &context->cookie); |
| |
| mbedtls_ssl_conf_read_timeout( |
| &context->config, |
| CONFIG_NET_SOCKETS_DTLS_TIMEOUT); |
| } |
| } |
| #endif /* CONFIG_NET_SOCKETS_ENABLE_DTLS */ |
| |
| #if defined(MBEDTLS_X509_CRT_PARSE_C) |
| /* For TLS clients, set hostname to empty string to enforce it's |
| * verification - only if hostname option was not set. Otherwise |
| * depend on user configuration. |
| */ |
| if (!is_server && !context->options.is_hostname_set) { |
| mbedtls_ssl_set_hostname(&context->ssl, ""); |
| } |
| #endif |
| |
| /* If verification level was specified explicitly, set it. Otherwise, |
| * use mbedTLS default values (required for client, none for server) |
| */ |
| if (context->options.verify_level != -1) { |
| mbedtls_ssl_conf_authmode(&context->config, |
| context->options.verify_level); |
| } |
| |
| mbedtls_ssl_conf_rng(&context->config, |
| tls_ctr_drbg_random, |
| NULL); |
| |
| ret = tls_mbedtls_set_credentials(context); |
| if (ret != 0) { |
| return ret; |
| } |
| |
| if (context->options.ciphersuites[0] != 0) { |
| /* Specific ciphersuites configured, so use them */ |
| NET_DBG("Using user-specified ciphersuites"); |
| mbedtls_ssl_conf_ciphersuites(&context->config, |
| context->options.ciphersuites); |
| } |
| |
| #if defined(CONFIG_MBEDTLS_SSL_ALPN) |
| if (ALPN_MAX_PROTOCOLS && context->options.alpn_list[0] != NULL) { |
| ret = mbedtls_ssl_conf_alpn_protocols(&context->config, |
| context->options.alpn_list); |
| if (ret != 0) { |
| return -EINVAL; |
| } |
| } |
| #endif /* CONFIG_MBEDTLS_SSL_ALPN */ |
| |
| #if defined(MBEDTLS_SSL_CACHE_C) |
| if (is_server && context->options.cache_enabled) { |
| mbedtls_ssl_conf_session_cache(&context->config, &server_cache, |
| mbedtls_ssl_cache_get, |
| mbedtls_ssl_cache_set); |
| } |
| #endif |
| |
| ret = mbedtls_ssl_setup(&context->ssl, |
| &context->config); |
| if (ret != 0) { |
| /* According to mbedTLS API documentation, |
| * mbedtls_ssl_setup can fail due to memory allocation failure |
| */ |
| return -ENOMEM; |
| } |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) && defined(CONFIG_MBEDTLS_SSL_DTLS_CONNECTION_ID) |
| if (type == MBEDTLS_SSL_TRANSPORT_DATAGRAM) { |
| if (context->options.dtls_cid.enabled) { |
| ret = mbedtls_ssl_set_cid(&context->ssl, MBEDTLS_SSL_CID_ENABLED, |
| context->options.dtls_cid.cid, |
| context->options.dtls_cid.cid_len); |
| if (ret != 0) { |
| return -EINVAL; |
| } |
| } |
| } |
| #endif /* CONFIG_NET_SOCKETS_ENABLE_DTLS && CONFIG_MBEDTLS_SSL_DTLS_CONNECTION_ID */ |
| |
| context->is_initialized = true; |
| |
| return 0; |
| } |
| |
| static int tls_opt_sec_tag_list_set(struct tls_context *context, |
| const void *optval, socklen_t optlen) |
| { |
| int sec_tag_cnt; |
| |
| if (!optval) { |
| return -EINVAL; |
| } |
| |
| if (optlen % sizeof(sec_tag_t) != 0) { |
| return -EINVAL; |
| } |
| |
| sec_tag_cnt = optlen / sizeof(sec_tag_t); |
| if (sec_tag_cnt > |
| ARRAY_SIZE(context->options.sec_tag_list.sec_tags)) { |
| return -EINVAL; |
| } |
| |
| memcpy(context->options.sec_tag_list.sec_tags, optval, optlen); |
| context->options.sec_tag_list.sec_tag_count = sec_tag_cnt; |
| |
| return 0; |
| } |
| |
| static int sock_opt_protocol_get(struct tls_context *context, |
| void *optval, socklen_t *optlen) |
| { |
| int protocol = (int)context->tls_version; |
| |
| if (*optlen != sizeof(protocol)) { |
| return -EINVAL; |
| } |
| |
| *(int *)optval = protocol; |
| |
| return 0; |
| } |
| |
| static int tls_opt_sec_tag_list_get(struct tls_context *context, |
| void *optval, socklen_t *optlen) |
| { |
| int len; |
| |
| if (*optlen % sizeof(sec_tag_t) != 0 || *optlen == 0) { |
| return -EINVAL; |
| } |
| |
| len = MIN(context->options.sec_tag_list.sec_tag_count * |
| sizeof(sec_tag_t), *optlen); |
| |
| memcpy(optval, context->options.sec_tag_list.sec_tags, len); |
| *optlen = len; |
| |
| return 0; |
| } |
| |
| static int tls_opt_hostname_set(struct tls_context *context, |
| const void *optval, socklen_t optlen) |
| { |
| ARG_UNUSED(optlen); |
| |
| #if defined(MBEDTLS_X509_CRT_PARSE_C) |
| if (mbedtls_ssl_set_hostname(&context->ssl, optval) != 0) { |
| return -EINVAL; |
| } |
| #else |
| return -ENOPROTOOPT; |
| #endif |
| |
| context->options.is_hostname_set = true; |
| |
| return 0; |
| } |
| |
| static int tls_opt_ciphersuite_list_set(struct tls_context *context, |
| const void *optval, socklen_t optlen) |
| { |
| int cipher_cnt; |
| |
| if (!optval) { |
| return -EINVAL; |
| } |
| |
| if (optlen % sizeof(int) != 0) { |
| return -EINVAL; |
| } |
| |
| cipher_cnt = optlen / sizeof(int); |
| |
| /* + 1 for 0-termination. */ |
| if (cipher_cnt + 1 > ARRAY_SIZE(context->options.ciphersuites)) { |
| return -EINVAL; |
| } |
| |
| memcpy(context->options.ciphersuites, optval, optlen); |
| context->options.ciphersuites[cipher_cnt] = 0; |
| |
| mbedtls_ssl_conf_ciphersuites(&context->config, |
| context->options.ciphersuites); |
| return 0; |
| } |
| |
| static int tls_opt_ciphersuite_list_get(struct tls_context *context, |
| void *optval, socklen_t *optlen) |
| { |
| const int *selected_ciphers; |
| int cipher_cnt, i = 0; |
| int *ciphers = optval; |
| |
| if (*optlen % sizeof(int) != 0 || *optlen == 0) { |
| return -EINVAL; |
| } |
| |
| if (context->options.ciphersuites[0] == 0) { |
| /* No specific ciphersuites configured, return all available. */ |
| selected_ciphers = mbedtls_ssl_list_ciphersuites(); |
| } else { |
| selected_ciphers = context->options.ciphersuites; |
| } |
| |
| cipher_cnt = *optlen / sizeof(int); |
| while (selected_ciphers[i] != 0) { |
| ciphers[i] = selected_ciphers[i]; |
| |
| if (++i == cipher_cnt) { |
| break; |
| } |
| } |
| |
| *optlen = i * sizeof(int); |
| |
| return 0; |
| } |
| |
| static int tls_opt_ciphersuite_used_get(struct tls_context *context, |
| void *optval, socklen_t *optlen) |
| { |
| const char *ciph; |
| |
| if (*optlen != sizeof(int)) { |
| return -EINVAL; |
| } |
| |
| ciph = mbedtls_ssl_get_ciphersuite(&context->ssl); |
| if (ciph == NULL) { |
| return -ENOTCONN; |
| } |
| |
| *(int *)optval = mbedtls_ssl_get_ciphersuite_id(ciph); |
| |
| return 0; |
| } |
| |
| static int tls_opt_alpn_list_set(struct tls_context *context, |
| const void *optval, socklen_t optlen) |
| { |
| int alpn_cnt; |
| |
| if (!ALPN_MAX_PROTOCOLS) { |
| return -EINVAL; |
| } |
| |
| if (!optval) { |
| return -EINVAL; |
| } |
| |
| if (optlen % sizeof(const char *) != 0) { |
| return -EINVAL; |
| } |
| |
| alpn_cnt = optlen / sizeof(const char *); |
| /* + 1 for NULL-termination. */ |
| if (alpn_cnt + 1 > ARRAY_SIZE(context->options.alpn_list)) { |
| return -EINVAL; |
| } |
| |
| memcpy(context->options.alpn_list, optval, optlen); |
| context->options.alpn_list[alpn_cnt] = NULL; |
| |
| return 0; |
| } |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| static int tls_opt_dtls_handshake_timeout_get(struct tls_context *context, |
| void *optval, socklen_t *optlen, |
| bool is_max) |
| { |
| uint32_t *val = (uint32_t *)optval; |
| |
| if (sizeof(uint32_t) != *optlen) { |
| return -EINVAL; |
| } |
| |
| if (is_max) { |
| *val = context->options.dtls_handshake_timeout_max; |
| } else { |
| *val = context->options.dtls_handshake_timeout_min; |
| } |
| |
| return 0; |
| } |
| |
| static int tls_opt_dtls_handshake_timeout_set(struct tls_context *context, |
| const void *optval, |
| socklen_t optlen, bool is_max) |
| { |
| uint32_t *val = (uint32_t *)optval; |
| |
| if (!optval) { |
| return -EINVAL; |
| } |
| |
| if (sizeof(uint32_t) != optlen) { |
| return -EINVAL; |
| } |
| |
| /* If mbedTLS context not inited, it will |
| * use these values upon init. |
| */ |
| if (is_max) { |
| context->options.dtls_handshake_timeout_max = *val; |
| } else { |
| context->options.dtls_handshake_timeout_min = *val; |
| } |
| |
| /* If mbedTLS context already inited, we need to |
| * update mbedTLS config for it to take effect |
| */ |
| mbedtls_ssl_conf_handshake_timeout(&context->config, |
| context->options.dtls_handshake_timeout_min, |
| context->options.dtls_handshake_timeout_max); |
| |
| return 0; |
| } |
| |
| static int tls_opt_dtls_connection_id_set(struct tls_context *context, |
| const void *optval, socklen_t optlen) |
| { |
| #if defined(CONFIG_MBEDTLS_SSL_DTLS_CONNECTION_ID) |
| int value; |
| |
| if (optlen > 0 && optval == NULL) { |
| return -EINVAL; |
| } |
| |
| if (optlen != sizeof(int)) { |
| return -EINVAL; |
| } |
| |
| value = *((int *)optval); |
| |
| switch (value) { |
| case TLS_DTLS_CID_DISABLED: |
| context->options.dtls_cid.enabled = false; |
| context->options.dtls_cid.cid_len = 0; |
| break; |
| case TLS_DTLS_CID_SUPPORTED: |
| context->options.dtls_cid.enabled = true; |
| context->options.dtls_cid.cid_len = 0; |
| break; |
| case TLS_DTLS_CID_ENABLED: |
| context->options.dtls_cid.enabled = true; |
| if (context->options.dtls_cid.cid_len == 0) { |
| /* generate random self cid */ |
| #if defined(CONFIG_CSPRNG_ENABLED) |
| sys_csrand_get(context->options.dtls_cid.cid, |
| MBEDTLS_SSL_CID_OUT_LEN_MAX); |
| #else |
| sys_rand_get(context->options.dtls_cid.cid, |
| MBEDTLS_SSL_CID_OUT_LEN_MAX); |
| #endif |
| context->options.dtls_cid.cid_len = MBEDTLS_SSL_CID_OUT_LEN_MAX; |
| } |
| break; |
| default: |
| return -EINVAL; |
| } |
| |
| return 0; |
| #else |
| return -ENOPROTOOPT; |
| #endif /* CONFIG_MBEDTLS_SSL_DTLS_CONNECTION_ID */ |
| } |
| |
| static int tls_opt_dtls_connection_id_value_set(struct tls_context *context, |
| const void *optval, |
| socklen_t optlen) |
| { |
| #if defined(CONFIG_MBEDTLS_SSL_DTLS_CONNECTION_ID) |
| if (optlen > 0 && optval == NULL) { |
| return -EINVAL; |
| } |
| |
| if (optlen > MBEDTLS_SSL_CID_IN_LEN_MAX) { |
| return -EINVAL; |
| } |
| |
| context->options.dtls_cid.cid_len = optlen; |
| memcpy(context->options.dtls_cid.cid, optval, optlen); |
| |
| return 0; |
| #else |
| return -ENOPROTOOPT; |
| #endif /* CONFIG_MBEDTLS_SSL_DTLS_CONNECTION_ID */ |
| } |
| |
| static int tls_opt_dtls_connection_id_value_get(struct tls_context *context, |
| void *optval, socklen_t *optlen) |
| { |
| #if defined(CONFIG_MBEDTLS_SSL_DTLS_CONNECTION_ID) |
| |
| if (*optlen < context->options.dtls_cid.cid_len) { |
| return -EINVAL; |
| } |
| |
| *optlen = context->options.dtls_cid.cid_len; |
| memcpy(optval, context->options.dtls_cid.cid, *optlen); |
| |
| return 0; |
| #else |
| return -ENOPROTOOPT; |
| #endif |
| } |
| |
| static int tls_opt_dtls_peer_connection_id_value_get(struct tls_context *context, |
| void *optval, |
| socklen_t *optlen) |
| { |
| #if defined(CONFIG_MBEDTLS_SSL_DTLS_CONNECTION_ID) |
| int enabled = false; |
| int ret; |
| |
| if (!context->is_initialized) { |
| return -ENOTCONN; |
| } |
| |
| ret = mbedtls_ssl_get_peer_cid(&context->ssl, &enabled, optval, optlen); |
| if (!enabled) { |
| *optlen = 0; |
| } |
| return ret; |
| #else |
| return -ENOPROTOOPT; |
| #endif |
| } |
| |
| static int tls_opt_dtls_connection_id_status_get(struct tls_context *context, |
| void *optval, socklen_t *optlen) |
| { |
| #if defined(CONFIG_MBEDTLS_SSL_DTLS_CONNECTION_ID) |
| struct tls_dtls_cid cid; |
| int ret; |
| int val; |
| int enabled; |
| bool have_self_cid; |
| bool have_peer_cid; |
| |
| if (sizeof(int) != *optlen) { |
| return -EINVAL; |
| } |
| |
| if (!context->is_initialized) { |
| return -ENOTCONN; |
| } |
| |
| ret = mbedtls_ssl_get_peer_cid(&context->ssl, &enabled, |
| cid.cid, |
| &cid.cid_len); |
| if (ret) { |
| /* Handshake is not complete */ |
| return -EAGAIN; |
| } |
| |
| cid.enabled = (enabled == MBEDTLS_SSL_CID_ENABLED); |
| have_self_cid = (context->options.dtls_cid.cid_len != 0); |
| have_peer_cid = (cid.cid_len != 0); |
| |
| if (!context->options.dtls_cid.enabled) { |
| val = TLS_DTLS_CID_STATUS_DISABLED; |
| } else if (have_self_cid && have_peer_cid) { |
| val = TLS_DTLS_CID_STATUS_BIDIRECTIONAL; |
| } else if (have_self_cid) { |
| val = TLS_DTLS_CID_STATUS_DOWNLINK; |
| } else if (have_peer_cid) { |
| val = TLS_DTLS_CID_STATUS_UPLINK; |
| } else { |
| val = TLS_DTLS_CID_STATUS_DISABLED; |
| } |
| |
| *((int *)optval) = val; |
| return 0; |
| #else |
| return -ENOPROTOOPT; |
| #endif |
| } |
| |
| static int tls_opt_dtls_handshake_on_connect_set(struct tls_context *context, |
| const void *optval, |
| socklen_t optlen) |
| { |
| int *val = (int *)optval; |
| |
| if (!optval) { |
| return -EINVAL; |
| } |
| |
| if (sizeof(int) != optlen) { |
| return -EINVAL; |
| } |
| |
| context->options.dtls_handshake_on_connect = (bool)*val; |
| |
| return 0; |
| } |
| |
| static int tls_opt_dtls_handshake_on_connect_get(struct tls_context *context, |
| void *optval, |
| socklen_t *optlen) |
| { |
| if (*optlen != sizeof(int)) { |
| return -EINVAL; |
| } |
| |
| *(int *)optval = context->options.dtls_handshake_on_connect; |
| |
| return 0; |
| } |
| #endif /* CONFIG_NET_SOCKETS_ENABLE_DTLS */ |
| |
| static int tls_opt_alpn_list_get(struct tls_context *context, |
| void *optval, socklen_t *optlen) |
| { |
| const char **alpn_list = context->options.alpn_list; |
| int alpn_cnt, i = 0; |
| const char **ret_list = optval; |
| |
| if (!ALPN_MAX_PROTOCOLS) { |
| return -EINVAL; |
| } |
| |
| if (*optlen % sizeof(const char *) != 0 || *optlen == 0) { |
| return -EINVAL; |
| } |
| |
| alpn_cnt = *optlen / sizeof(const char *); |
| while (alpn_list[i] != NULL) { |
| ret_list[i] = alpn_list[i]; |
| |
| if (++i == alpn_cnt) { |
| break; |
| } |
| } |
| |
| *optlen = i * sizeof(const char *); |
| |
| return 0; |
| } |
| |
| static int tls_opt_session_cache_set(struct tls_context *context, |
| const void *optval, socklen_t optlen) |
| { |
| int *val = (int *)optval; |
| |
| if (!optval) { |
| return -EINVAL; |
| } |
| |
| if (sizeof(int) != optlen) { |
| return -EINVAL; |
| } |
| |
| context->options.cache_enabled = (*val == TLS_SESSION_CACHE_ENABLED); |
| |
| return 0; |
| } |
| |
| static int tls_opt_session_cache_get(struct tls_context *context, |
| void *optval, socklen_t *optlen) |
| { |
| int cache_enabled = context->options.cache_enabled ? |
| TLS_SESSION_CACHE_ENABLED : |
| TLS_SESSION_CACHE_DISABLED; |
| |
| if (*optlen != sizeof(cache_enabled)) { |
| return -EINVAL; |
| } |
| |
| *(int *)optval = cache_enabled; |
| |
| return 0; |
| } |
| |
| static int tls_opt_session_cache_purge_set(struct tls_context *context, |
| const void *optval, socklen_t optlen) |
| { |
| ARG_UNUSED(context); |
| ARG_UNUSED(optval); |
| ARG_UNUSED(optlen); |
| |
| tls_session_purge(); |
| |
| return 0; |
| } |
| |
| static int tls_opt_peer_verify_set(struct tls_context *context, |
| const void *optval, socklen_t optlen) |
| { |
| int *peer_verify; |
| |
| if (!optval) { |
| return -EINVAL; |
| } |
| |
| if (optlen != sizeof(int)) { |
| return -EINVAL; |
| } |
| |
| peer_verify = (int *)optval; |
| |
| if (*peer_verify != MBEDTLS_SSL_VERIFY_NONE && |
| *peer_verify != MBEDTLS_SSL_VERIFY_OPTIONAL && |
| *peer_verify != MBEDTLS_SSL_VERIFY_REQUIRED) { |
| return -EINVAL; |
| } |
| |
| context->options.verify_level = *peer_verify; |
| |
| return 0; |
| } |
| |
| static int tls_opt_cert_nocopy_set(struct tls_context *context, |
| const void *optval, socklen_t optlen) |
| { |
| int *cert_nocopy; |
| |
| if (!optval) { |
| return -EINVAL; |
| } |
| |
| if (optlen != sizeof(int)) { |
| return -EINVAL; |
| } |
| |
| cert_nocopy = (int *)optval; |
| |
| if (*cert_nocopy != TLS_CERT_NOCOPY_NONE && |
| *cert_nocopy != TLS_CERT_NOCOPY_OPTIONAL) { |
| return -EINVAL; |
| } |
| |
| context->options.cert_nocopy = *cert_nocopy; |
| |
| return 0; |
| } |
| |
| static int tls_opt_dtls_role_set(struct tls_context *context, |
| const void *optval, socklen_t optlen) |
| { |
| int *role; |
| |
| if (!optval) { |
| return -EINVAL; |
| } |
| |
| if (optlen != sizeof(int)) { |
| return -EINVAL; |
| } |
| |
| role = (int *)optval; |
| if (*role != MBEDTLS_SSL_IS_CLIENT && |
| *role != MBEDTLS_SSL_IS_SERVER) { |
| return -EINVAL; |
| } |
| |
| context->options.role = *role; |
| |
| return 0; |
| } |
| |
| static int protocol_check(int family, int type, int *proto) |
| { |
| if (family != AF_INET && family != AF_INET6) { |
| return -EAFNOSUPPORT; |
| } |
| |
| if (*proto >= IPPROTO_TLS_1_0 && *proto <= IPPROTO_TLS_1_2) { |
| if (type != SOCK_STREAM) { |
| return -EPROTOTYPE; |
| } |
| |
| *proto = IPPROTO_TCP; |
| } else if (*proto >= IPPROTO_DTLS_1_0 && *proto <= IPPROTO_DTLS_1_2) { |
| if (!IS_ENABLED(CONFIG_NET_SOCKETS_ENABLE_DTLS)) { |
| return -EPROTONOSUPPORT; |
| } |
| |
| if (type != SOCK_DGRAM) { |
| return -EPROTOTYPE; |
| } |
| |
| *proto = IPPROTO_UDP; |
| } else { |
| return -EPROTONOSUPPORT; |
| } |
| |
| return 0; |
| } |
| |
| static int ztls_socket(int family, int type, int proto) |
| { |
| enum net_ip_protocol_secure tls_proto = proto; |
| int fd = z_reserve_fd(); |
| int sock = -1; |
| int ret; |
| struct tls_context *ctx; |
| |
| if (fd < 0) { |
| return -1; |
| } |
| |
| ret = protocol_check(family, type, &proto); |
| if (ret < 0) { |
| errno = -ret; |
| goto free_fd; |
| } |
| |
| ctx = tls_alloc(); |
| if (ctx == NULL) { |
| errno = ENOMEM; |
| goto free_fd; |
| } |
| |
| sock = zsock_socket(family, type, proto); |
| if (sock < 0) { |
| goto release_tls; |
| } |
| |
| ctx->tls_version = tls_proto; |
| ctx->type = (proto == IPPROTO_TCP) ? SOCK_STREAM : SOCK_DGRAM; |
| ctx->sock = sock; |
| |
| z_finalize_typed_fd(fd, ctx, (const struct fd_op_vtable *)&tls_sock_fd_op_vtable, |
| ZVFS_MODE_IFSOCK); |
| |
| return fd; |
| |
| release_tls: |
| (void)tls_release(ctx); |
| |
| free_fd: |
| z_free_fd(fd); |
| |
| return -1; |
| } |
| |
| int ztls_close_ctx(struct tls_context *ctx) |
| { |
| int ret, err = 0; |
| |
| /* Try to send close notification. */ |
| ctx->flags = 0; |
| |
| (void)mbedtls_ssl_close_notify(&ctx->ssl); |
| |
| err = tls_release(ctx); |
| ret = zsock_close(ctx->sock); |
| |
| /* In case close fails, we propagate errno value set by close. |
| * In case close succeeds, but tls_release fails, set errno |
| * according to tls_release return value. |
| */ |
| if (ret == 0 && err < 0) { |
| errno = -err; |
| ret = -1; |
| } |
| |
| return ret; |
| } |
| |
| int ztls_connect_ctx(struct tls_context *ctx, const struct sockaddr *addr, |
| socklen_t addrlen) |
| { |
| int ret; |
| int sock_flags; |
| |
| sock_flags = zsock_fcntl(ctx->sock, F_GETFL, 0); |
| if (sock_flags < 0) { |
| return -EIO; |
| } |
| |
| if (sock_flags & O_NONBLOCK) { |
| (void)zsock_fcntl(ctx->sock, F_SETFL, |
| sock_flags & ~O_NONBLOCK); |
| } |
| |
| ret = zsock_connect(ctx->sock, addr, addrlen); |
| if (ret < 0) { |
| return ret; |
| } |
| |
| if (sock_flags & O_NONBLOCK) { |
| (void)zsock_fcntl(ctx->sock, F_SETFL, sock_flags); |
| } |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| if (ctx->type == SOCK_DGRAM) { |
| dtls_peer_address_set(ctx, addr, addrlen); |
| } |
| #endif |
| |
| if (ctx->type == SOCK_STREAM |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| || (ctx->type == SOCK_DGRAM && ctx->options.dtls_handshake_on_connect) |
| #endif |
| ) { |
| ret = tls_mbedtls_init(ctx, false); |
| if (ret < 0) { |
| goto error; |
| } |
| |
| /* Do not use any socket flags during the handshake. */ |
| ctx->flags = 0; |
| |
| tls_session_restore(ctx, addr, addrlen); |
| |
| /* TODO For simplicity, TLS handshake blocks the socket |
| * even for non-blocking socket. |
| */ |
| ret = tls_mbedtls_handshake(ctx, K_FOREVER); |
| if (ret < 0) { |
| goto error; |
| } |
| |
| tls_session_store(ctx, addr, addrlen); |
| } |
| |
| return 0; |
| |
| error: |
| errno = -ret; |
| return -1; |
| } |
| |
| int ztls_accept_ctx(struct tls_context *parent, struct sockaddr *addr, |
| socklen_t *addrlen) |
| { |
| struct tls_context *child = NULL; |
| int ret, err, fd, sock; |
| |
| fd = z_reserve_fd(); |
| if (fd < 0) { |
| return -1; |
| } |
| |
| |
| k_mutex_unlock(parent->lock); |
| sock = zsock_accept(parent->sock, addr, addrlen); |
| k_mutex_lock(parent->lock, K_FOREVER); |
| if (sock < 0) { |
| ret = -errno; |
| goto error; |
| } |
| |
| child = tls_clone(parent); |
| if (child == NULL) { |
| ret = -ENOMEM; |
| goto error; |
| } |
| |
| z_finalize_typed_fd(fd, child, (const struct fd_op_vtable *)&tls_sock_fd_op_vtable, |
| ZVFS_MODE_IFSOCK); |
| |
| child->sock = sock; |
| |
| ret = tls_mbedtls_init(child, true); |
| if (ret < 0) { |
| goto error; |
| } |
| |
| /* Do not use any socket flags during the handshake. */ |
| child->flags = 0; |
| |
| /* TODO For simplicity, TLS handshake blocks the socket even for |
| * non-blocking socket. |
| */ |
| ret = tls_mbedtls_handshake(child, K_FOREVER); |
| if (ret < 0) { |
| goto error; |
| } |
| |
| return fd; |
| |
| error: |
| if (child != NULL) { |
| err = tls_release(child); |
| __ASSERT(err == 0, "TLS context release failed"); |
| } |
| |
| if (sock >= 0) { |
| err = zsock_close(sock); |
| __ASSERT(err == 0, "Child socket close failed"); |
| } |
| |
| z_free_fd(fd); |
| |
| errno = -ret; |
| return -1; |
| } |
| |
| static ssize_t send_tls(struct tls_context *ctx, const void *buf, |
| size_t len, int flags) |
| { |
| const bool is_block = is_blocking(ctx->sock, flags); |
| k_timeout_t timeout; |
| k_timepoint_t end; |
| int ret; |
| |
| if (ctx->error != 0) { |
| errno = ctx->error; |
| return -1; |
| } |
| |
| if (ctx->session_closed) { |
| errno = ECONNABORTED; |
| return -1; |
| } |
| |
| if (!is_block) { |
| timeout = K_NO_WAIT; |
| } else { |
| timeout = ctx->options.timeout_tx; |
| } |
| |
| end = sys_timepoint_calc(timeout); |
| |
| do { |
| ret = mbedtls_ssl_write(&ctx->ssl, buf, len); |
| if (ret >= 0) { |
| return ret; |
| } |
| |
| if (ret == MBEDTLS_ERR_SSL_WANT_READ || |
| ret == MBEDTLS_ERR_SSL_WANT_WRITE || |
| ret == MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS || |
| ret == MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS) { |
| int timeout_ms; |
| |
| if (!is_block) { |
| errno = EAGAIN; |
| break; |
| } |
| |
| /* Blocking timeout. */ |
| timeout = sys_timepoint_timeout(end); |
| if (K_TIMEOUT_EQ(timeout, K_NO_WAIT)) { |
| errno = EAGAIN; |
| break; |
| } |
| |
| /* Block. */ |
| timeout_ms = timeout_to_ms(&timeout); |
| ret = wait_for_reason(ctx->sock, timeout_ms, ret); |
| if (ret != 0) { |
| errno = -ret; |
| break; |
| } |
| } else { |
| NET_ERR("TLS send error: -%x", -ret); |
| |
| /* MbedTLS API documentation requires session to |
| * be reset in other error cases |
| */ |
| ret = tls_mbedtls_reset(ctx); |
| if (ret != 0) { |
| ctx->error = ENOMEM; |
| errno = ENOMEM; |
| } else { |
| ctx->error = ECONNABORTED; |
| errno = ECONNABORTED; |
| } |
| |
| break; |
| } |
| } while (true); |
| |
| return -1; |
| } |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| static ssize_t sendto_dtls_client(struct tls_context *ctx, const void *buf, |
| size_t len, int flags, |
| const struct sockaddr *dest_addr, |
| socklen_t addrlen) |
| { |
| int ret; |
| |
| if (!dest_addr) { |
| /* No address provided, check if we have stored one, |
| * otherwise return error. |
| */ |
| if (ctx->dtls_peer_addrlen == 0) { |
| ret = -EDESTADDRREQ; |
| goto error; |
| } |
| } else if (ctx->dtls_peer_addrlen == 0) { |
| /* Address provided and no peer address stored. */ |
| dtls_peer_address_set(ctx, dest_addr, addrlen); |
| } else if (!dtls_is_peer_addr_valid(ctx, dest_addr, addrlen) != 0) { |
| /* Address provided but it does not match stored one */ |
| ret = -EISCONN; |
| goto error; |
| } |
| |
| if (!ctx->is_initialized) { |
| ret = tls_mbedtls_init(ctx, false); |
| if (ret < 0) { |
| goto error; |
| } |
| } |
| |
| if (!is_handshake_complete(ctx)) { |
| tls_session_restore(ctx, &ctx->dtls_peer_addr, |
| ctx->dtls_peer_addrlen); |
| |
| /* TODO For simplicity, TLS handshake blocks the socket even for |
| * non-blocking socket. |
| */ |
| ret = tls_mbedtls_handshake(ctx, K_FOREVER); |
| if (ret < 0) { |
| goto error; |
| } |
| |
| /* Client socket ready to use again. */ |
| ctx->error = 0; |
| |
| tls_session_store(ctx, &ctx->dtls_peer_addr, |
| ctx->dtls_peer_addrlen); |
| } |
| |
| return send_tls(ctx, buf, len, flags); |
| |
| error: |
| errno = -ret; |
| return -1; |
| } |
| |
| static ssize_t sendto_dtls_server(struct tls_context *ctx, const void *buf, |
| size_t len, int flags, |
| const struct sockaddr *dest_addr, |
| socklen_t addrlen) |
| { |
| /* For DTLS server, require to have established DTLS connection |
| * in order to send data. |
| */ |
| if (!is_handshake_complete(ctx)) { |
| errno = ENOTCONN; |
| return -1; |
| } |
| |
| /* Verify we are sending to a peer that we have connection with. */ |
| if (dest_addr && |
| !dtls_is_peer_addr_valid(ctx, dest_addr, addrlen) != 0) { |
| errno = EISCONN; |
| return -1; |
| } |
| |
| return send_tls(ctx, buf, len, flags); |
| } |
| #endif /* CONFIG_NET_SOCKETS_ENABLE_DTLS */ |
| |
| ssize_t ztls_sendto_ctx(struct tls_context *ctx, const void *buf, size_t len, |
| int flags, const struct sockaddr *dest_addr, |
| socklen_t addrlen) |
| { |
| ctx->flags = flags; |
| |
| /* TLS */ |
| if (ctx->type == SOCK_STREAM) { |
| return send_tls(ctx, buf, len, flags); |
| } |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| /* DTLS */ |
| if (ctx->options.role == MBEDTLS_SSL_IS_SERVER) { |
| return sendto_dtls_server(ctx, buf, len, flags, |
| dest_addr, addrlen); |
| } |
| |
| return sendto_dtls_client(ctx, buf, len, flags, dest_addr, addrlen); |
| #else |
| errno = ENOTSUP; |
| return -1; |
| #endif /* CONFIG_NET_SOCKETS_ENABLE_DTLS */ |
| } |
| |
| static ssize_t dtls_sendmsg_merge_and_send(struct tls_context *ctx, |
| const struct msghdr *msg, |
| int flags) |
| { |
| static K_MUTEX_DEFINE(sendmsg_lock); |
| static uint8_t sendmsg_buf[DTLS_SENDMSG_BUF_SIZE]; |
| ssize_t len = 0; |
| |
| k_mutex_lock(&sendmsg_lock, K_FOREVER); |
| |
| for (int i = 0; i < msg->msg_iovlen; i++) { |
| struct iovec *vec = msg->msg_iov + i; |
| |
| if (vec->iov_len >= 0) { |
| if (len + vec->iov_len > sizeof(sendmsg_buf)) { |
| k_mutex_unlock(&sendmsg_lock); |
| errno = EMSGSIZE; |
| return -1; |
| } |
| |
| memcpy(sendmsg_buf + len, vec->iov_base, vec->iov_len); |
| len += vec->iov_len; |
| } |
| } |
| |
| if (len > 0) { |
| len = ztls_sendto_ctx(ctx, sendmsg_buf, len, flags, |
| msg->msg_name, msg->msg_namelen); |
| } |
| |
| k_mutex_unlock(&sendmsg_lock); |
| |
| return len; |
| } |
| |
| static ssize_t tls_sendmsg_loop_and_send(struct tls_context *ctx, |
| const struct msghdr *msg, |
| int flags) |
| { |
| ssize_t len = 0; |
| ssize_t ret; |
| |
| for (int i = 0; i < msg->msg_iovlen; i++) { |
| struct iovec *vec = msg->msg_iov + i; |
| size_t sent = 0; |
| |
| if (vec->iov_len == 0) { |
| continue; |
| } |
| |
| while (sent < vec->iov_len) { |
| uint8_t *ptr = (uint8_t *)vec->iov_base + sent; |
| |
| ret = ztls_sendto_ctx(ctx, ptr, vec->iov_len - sent, |
| flags, msg->msg_name, |
| msg->msg_namelen); |
| if (ret < 0) { |
| return ret; |
| } |
| sent += ret; |
| } |
| len += sent; |
| } |
| |
| return len; |
| } |
| |
| ssize_t ztls_sendmsg_ctx(struct tls_context *ctx, const struct msghdr *msg, |
| int flags) |
| { |
| if (msg == NULL) { |
| errno = EINVAL; |
| return -1; |
| } |
| |
| if (IS_ENABLED(CONFIG_NET_SOCKETS_ENABLE_DTLS) && |
| ctx->type == SOCK_DGRAM) { |
| if (DTLS_SENDMSG_BUF_SIZE > 0) { |
| /* With one buffer only, there's no need to use |
| * intermediate buffer. |
| */ |
| if (msghdr_non_empty_iov_count(msg) == 1) { |
| goto send_loop; |
| } |
| |
| return dtls_sendmsg_merge_and_send(ctx, msg, flags); |
| } |
| |
| /* |
| * Current mbedTLS API (i.e. mbedtls_ssl_write()) allows only to send a single |
| * contiguous buffer. This means that gather write using sendmsg() can only be |
| * handled correctly if there is a single non-empty buffer in msg->msg_iov. |
| */ |
| if (msghdr_non_empty_iov_count(msg) > 1) { |
| errno = EMSGSIZE; |
| return -1; |
| } |
| } |
| |
| send_loop: |
| return tls_sendmsg_loop_and_send(ctx, msg, flags); |
| } |
| |
| static ssize_t recv_tls(struct tls_context *ctx, void *buf, |
| size_t max_len, int flags) |
| { |
| size_t recv_len = 0; |
| const bool waitall = flags & ZSOCK_MSG_WAITALL; |
| const bool is_block = is_blocking(ctx->sock, flags); |
| k_timeout_t timeout; |
| k_timepoint_t end; |
| int ret; |
| |
| if (ctx->error != 0) { |
| errno = ctx->error; |
| return -1; |
| } |
| |
| if (ctx->session_closed) { |
| return 0; |
| } |
| |
| if (!is_block) { |
| timeout = K_NO_WAIT; |
| } else { |
| timeout = ctx->options.timeout_rx; |
| } |
| |
| end = sys_timepoint_calc(timeout); |
| |
| do { |
| size_t read_len = max_len - recv_len; |
| |
| ret = mbedtls_ssl_read(&ctx->ssl, (uint8_t *)buf + recv_len, |
| read_len); |
| if (ret < 0) { |
| if (ret == MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY) { |
| /* Peer notified that it's closing the |
| * connection. |
| */ |
| ctx->session_closed = true; |
| break; |
| } |
| |
| if (ret == MBEDTLS_ERR_SSL_CLIENT_RECONNECT) { |
| /* Client reconnect on the same socket is not |
| * supported. See mbedtls_ssl_read API |
| * documentation. |
| */ |
| ctx->session_closed = true; |
| break; |
| } |
| |
| if (ret == MBEDTLS_ERR_SSL_WANT_READ || |
| ret == MBEDTLS_ERR_SSL_WANT_WRITE || |
| ret == MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS || |
| ret == MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS) { |
| int timeout_ms; |
| |
| if (!is_block) { |
| ret = -EAGAIN; |
| goto err; |
| } |
| |
| /* Blocking timeout. */ |
| timeout = sys_timepoint_timeout(end); |
| if (K_TIMEOUT_EQ(timeout, K_NO_WAIT)) { |
| ret = -EAGAIN; |
| goto err; |
| } |
| |
| timeout_ms = timeout_to_ms(&timeout); |
| |
| /* Block. */ |
| k_mutex_unlock(ctx->lock); |
| ret = wait_for_reason(ctx->sock, timeout_ms, ret); |
| k_mutex_lock(ctx->lock, K_FOREVER); |
| |
| if (ret == 0) { |
| /* Retry. */ |
| continue; |
| } |
| } else { |
| NET_ERR("TLS recv error: -%x", -ret); |
| ret = -EIO; |
| } |
| |
| err: |
| errno = -ret; |
| return -1; |
| } |
| |
| if (ret == 0) { |
| break; |
| } |
| |
| recv_len += ret; |
| } while ((recv_len == 0) || (waitall && (recv_len < max_len))); |
| |
| return recv_len; |
| } |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| static ssize_t recvfrom_dtls_common(struct tls_context *ctx, void *buf, |
| size_t max_len, int flags, |
| struct sockaddr *src_addr, |
| socklen_t *addrlen) |
| { |
| int ret; |
| bool is_block = is_blocking(ctx->sock, flags); |
| k_timeout_t timeout; |
| k_timepoint_t end; |
| |
| if (ctx->error != 0) { |
| errno = ctx->error; |
| return -1; |
| } |
| |
| if (!is_block) { |
| timeout = K_NO_WAIT; |
| } else { |
| timeout = ctx->options.timeout_rx; |
| } |
| |
| end = sys_timepoint_calc(timeout); |
| |
| do { |
| size_t remaining; |
| |
| ret = mbedtls_ssl_read(&ctx->ssl, buf, max_len); |
| if (ret < 0) { |
| if (ret == MBEDTLS_ERR_SSL_WANT_READ || |
| ret == MBEDTLS_ERR_SSL_WANT_WRITE || |
| ret == MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS || |
| ret == MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS) { |
| int timeout_dtls, timeout_sock, timeout_ms; |
| |
| if (!is_block) { |
| return ret; |
| } |
| |
| /* Blocking timeout. */ |
| timeout = sys_timepoint_timeout(end); |
| if (K_TIMEOUT_EQ(timeout, K_NO_WAIT)) { |
| return ret; |
| } |
| |
| timeout_dtls = dtls_get_remaining_timeout(ctx); |
| timeout_sock = timeout_to_ms(&timeout); |
| if (timeout_dtls == SYS_FOREVER_MS || |
| timeout_sock == SYS_FOREVER_MS) { |
| timeout_ms = MAX(timeout_dtls, timeout_sock); |
| } else { |
| timeout_ms = MIN(timeout_dtls, timeout_sock); |
| } |
| |
| /* Block. */ |
| k_mutex_unlock(ctx->lock); |
| ret = wait_for_reason(ctx->sock, timeout_ms, ret); |
| k_mutex_lock(ctx->lock, K_FOREVER); |
| |
| if (ret == 0) { |
| /* Retry. */ |
| continue; |
| } else { |
| return MBEDTLS_ERR_SSL_INTERNAL_ERROR; |
| } |
| } else { |
| return ret; |
| } |
| } |
| |
| if (src_addr && addrlen) { |
| dtls_peer_address_get(ctx, src_addr, addrlen); |
| } |
| |
| /* mbedtls_ssl_get_bytes_avail() indicate the data length |
| * remaining in the current datagram. |
| */ |
| remaining = mbedtls_ssl_get_bytes_avail(&ctx->ssl); |
| |
| /* No more data in the datagram, or dummy read. */ |
| if ((remaining == 0) || (max_len == 0)) { |
| return ret; |
| } |
| |
| if (flags & ZSOCK_MSG_TRUNC) { |
| ret += remaining; |
| } |
| |
| for (int i = 0; i < remaining; i++) { |
| uint8_t byte; |
| int err; |
| |
| err = mbedtls_ssl_read(&ctx->ssl, &byte, sizeof(byte)); |
| if (err <= 0) { |
| NET_ERR("Error while flushing the rest of the" |
| " datagram, err %d", err); |
| ret = MBEDTLS_ERR_SSL_INTERNAL_ERROR; |
| break; |
| } |
| } |
| |
| break; |
| } while (true); |
| |
| |
| return ret; |
| } |
| |
| static ssize_t recvfrom_dtls_client(struct tls_context *ctx, void *buf, |
| size_t max_len, int flags, |
| struct sockaddr *src_addr, |
| socklen_t *addrlen) |
| { |
| int ret; |
| |
| if (!is_handshake_complete(ctx)) { |
| ret = -ENOTCONN; |
| goto error; |
| } |
| |
| ret = recvfrom_dtls_common(ctx, buf, max_len, flags, src_addr, addrlen); |
| if (ret >= 0) { |
| return ret; |
| } |
| |
| switch (ret) { |
| case MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY: |
| /* Peer notified that it's closing the connection. */ |
| ret = tls_mbedtls_reset(ctx); |
| if (ret == 0) { |
| ctx->error = ENOTCONN; |
| ret = -ENOTCONN; |
| } else { |
| ctx->error = ENOMEM; |
| ret = -ENOMEM; |
| } |
| break; |
| |
| case MBEDTLS_ERR_SSL_TIMEOUT: |
| (void)mbedtls_ssl_close_notify(&ctx->ssl); |
| ctx->error = ETIMEDOUT; |
| ret = -ETIMEDOUT; |
| break; |
| |
| case MBEDTLS_ERR_SSL_WANT_READ: |
| case MBEDTLS_ERR_SSL_WANT_WRITE: |
| case MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS: |
| case MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS: |
| ret = -EAGAIN; |
| break; |
| |
| default: |
| NET_ERR("DTLS client recv error: -%x", -ret); |
| |
| /* MbedTLS API documentation requires session to |
| * be reset in other error cases |
| */ |
| ret = tls_mbedtls_reset(ctx); |
| if (ret != 0) { |
| ctx->error = ENOMEM; |
| errno = ENOMEM; |
| } else { |
| ctx->error = ECONNABORTED; |
| ret = -ECONNABORTED; |
| } |
| |
| break; |
| } |
| |
| error: |
| errno = -ret; |
| return -1; |
| } |
| |
| static ssize_t recvfrom_dtls_server(struct tls_context *ctx, void *buf, |
| size_t max_len, int flags, |
| struct sockaddr *src_addr, |
| socklen_t *addrlen) |
| { |
| int ret; |
| bool repeat; |
| k_timeout_t timeout; |
| |
| if (!ctx->is_initialized) { |
| ret = tls_mbedtls_init(ctx, true); |
| if (ret < 0) { |
| goto error; |
| } |
| } |
| |
| if (is_blocking(ctx->sock, flags)) { |
| timeout = ctx->options.timeout_rx; |
| } else { |
| timeout = K_NO_WAIT; |
| } |
| |
| /* Loop to enable DTLS reconnection for servers without closing |
| * a socket. |
| */ |
| do { |
| repeat = false; |
| |
| if (!is_handshake_complete(ctx)) { |
| ret = tls_mbedtls_handshake(ctx, timeout); |
| if (ret < 0) { |
| /* In case of EAGAIN, just exit. */ |
| if (ret == -EAGAIN) { |
| break; |
| } |
| |
| ret = tls_mbedtls_reset(ctx); |
| if (ret == 0) { |
| repeat = true; |
| } else { |
| ret = -ENOMEM; |
| } |
| |
| continue; |
| } |
| |
| /* Server socket ready to use again. */ |
| ctx->error = 0; |
| } |
| |
| ret = recvfrom_dtls_common(ctx, buf, max_len, flags, |
| src_addr, addrlen); |
| if (ret >= 0) { |
| return ret; |
| } |
| |
| switch (ret) { |
| case MBEDTLS_ERR_SSL_TIMEOUT: |
| (void)mbedtls_ssl_close_notify(&ctx->ssl); |
| __fallthrough; |
| /* fallthrough */ |
| |
| case MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY: |
| case MBEDTLS_ERR_SSL_CLIENT_RECONNECT: |
| ret = tls_mbedtls_reset(ctx); |
| if (ret == 0) { |
| repeat = true; |
| } else { |
| ctx->error = ENOMEM; |
| ret = -ENOMEM; |
| } |
| break; |
| |
| case MBEDTLS_ERR_SSL_WANT_READ: |
| case MBEDTLS_ERR_SSL_WANT_WRITE: |
| case MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS: |
| case MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS: |
| ret = -EAGAIN; |
| break; |
| |
| default: |
| NET_ERR("DTLS server recv error: -%x", -ret); |
| |
| ret = tls_mbedtls_reset(ctx); |
| if (ret != 0) { |
| ctx->error = ENOMEM; |
| errno = ENOMEM; |
| } else { |
| ctx->error = ECONNABORTED; |
| ret = -ECONNABORTED; |
| } |
| |
| break; |
| } |
| } while (repeat); |
| |
| error: |
| errno = -ret; |
| return -1; |
| } |
| #endif /* CONFIG_NET_SOCKETS_ENABLE_DTLS */ |
| |
| ssize_t ztls_recvfrom_ctx(struct tls_context *ctx, void *buf, size_t max_len, |
| int flags, struct sockaddr *src_addr, |
| socklen_t *addrlen) |
| { |
| if (flags & ZSOCK_MSG_PEEK) { |
| /* TODO mbedTLS does not support 'peeking' This could be |
| * bypassed by having intermediate buffer for peeking |
| */ |
| errno = ENOTSUP; |
| return -1; |
| } |
| |
| ctx->flags = flags; |
| |
| /* TLS */ |
| if (ctx->type == SOCK_STREAM) { |
| return recv_tls(ctx, buf, max_len, flags); |
| } |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| /* DTLS */ |
| if (ctx->options.role == MBEDTLS_SSL_IS_SERVER) { |
| return recvfrom_dtls_server(ctx, buf, max_len, flags, |
| src_addr, addrlen); |
| } |
| |
| return recvfrom_dtls_client(ctx, buf, max_len, flags, |
| src_addr, addrlen); |
| #else |
| errno = ENOTSUP; |
| return -1; |
| #endif /* CONFIG_NET_SOCKETS_ENABLE_DTLS */ |
| } |
| |
| static int ztls_poll_prepare_pollin(struct tls_context *ctx) |
| { |
| /* If there already is mbedTLS data to read, there is no |
| * need to set the k_poll_event object. Return EALREADY |
| * so we won't block in the k_poll. |
| */ |
| if (!ctx->is_listening) { |
| if (mbedtls_ssl_get_bytes_avail(&ctx->ssl) > 0) { |
| return -EALREADY; |
| } |
| } |
| |
| return 0; |
| } |
| |
| static int ztls_poll_prepare_ctx(struct tls_context *ctx, |
| struct zsock_pollfd *pfd, |
| struct k_poll_event **pev, |
| struct k_poll_event *pev_end) |
| { |
| const struct fd_op_vtable *vtable; |
| struct k_mutex *lock; |
| void *obj; |
| int ret; |
| short events = pfd->events; |
| |
| /* DTLS client should wait for the handshake to complete before |
| * it actually starts to poll for data. |
| */ |
| if ((pfd->events & ZSOCK_POLLIN) && (ctx->type == SOCK_DGRAM) && |
| (ctx->options.role == MBEDTLS_SSL_IS_CLIENT) && |
| !is_handshake_complete(ctx)) { |
| (*pev)->obj = &ctx->tls_established; |
| (*pev)->type = K_POLL_TYPE_SEM_AVAILABLE; |
| (*pev)->mode = K_POLL_MODE_NOTIFY_ONLY; |
| (*pev)->state = K_POLL_STATE_NOT_READY; |
| (*pev)++; |
| |
| /* Since k_poll_event is configured by the TLS layer in this |
| * case, do not forward ZSOCK_POLLIN to the underlying socket. |
| */ |
| pfd->events &= ~ZSOCK_POLLIN; |
| } |
| |
| obj = z_get_fd_obj_and_vtable( |
| ctx->sock, (const struct fd_op_vtable **)&vtable, &lock); |
| if (obj == NULL) { |
| ret = -EBADF; |
| goto exit; |
| } |
| |
| (void)k_mutex_lock(lock, K_FOREVER); |
| |
| ret = z_fdtable_call_ioctl(vtable, obj, ZFD_IOCTL_POLL_PREPARE, |
| pfd, pev, pev_end); |
| if (ret != 0) { |
| goto exit; |
| } |
| |
| if (pfd->events & ZSOCK_POLLIN) { |
| ret = ztls_poll_prepare_pollin(ctx); |
| } |
| |
| exit: |
| /* Restore original events. */ |
| pfd->events = events; |
| |
| k_mutex_unlock(lock); |
| |
| return ret; |
| } |
| |
| #include <zephyr/net/net_core.h> |
| |
| static int ztls_socket_data_check(struct tls_context *ctx) |
| { |
| int ret; |
| |
| if (ctx->type == SOCK_STREAM) { |
| if (!ctx->is_initialized) { |
| return -ENOTCONN; |
| } |
| } |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| else { |
| if (!ctx->is_initialized) { |
| bool is_server = ctx->options.role == MBEDTLS_SSL_IS_SERVER; |
| |
| ret = tls_mbedtls_init(ctx, is_server); |
| if (ret < 0) { |
| return -ENOMEM; |
| } |
| } |
| |
| if (!is_handshake_complete(ctx)) { |
| ret = tls_mbedtls_handshake(ctx, K_NO_WAIT); |
| if (ret < 0) { |
| if (ret == -EAGAIN) { |
| return 0; |
| } |
| |
| ret = tls_mbedtls_reset(ctx); |
| if (ret != 0) { |
| return -ENOMEM; |
| } |
| |
| return 0; |
| } |
| |
| /* Socket ready to use again. */ |
| ctx->error = 0; |
| |
| return 0; |
| } |
| } |
| #endif /* CONFIG_NET_SOCKETS_ENABLE_DTLS */ |
| |
| ctx->flags = ZSOCK_MSG_DONTWAIT; |
| |
| ret = mbedtls_ssl_read(&ctx->ssl, NULL, 0); |
| if (ret < 0) { |
| if (ret == MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY) { |
| /* Don't reset the context for STREAM socket - the |
| * application needs to reopen the socket anyway, and |
| * resetting the context would result in an error instead |
| * of 0 in a consecutive recv() call. |
| */ |
| if (ctx->type == SOCK_DGRAM) { |
| ret = tls_mbedtls_reset(ctx); |
| if (ret != 0) { |
| return -ENOMEM; |
| } |
| } else { |
| ctx->session_closed = true; |
| } |
| |
| return -ENOTCONN; |
| } |
| |
| if (ret == MBEDTLS_ERR_SSL_WANT_READ || |
| ret == MBEDTLS_ERR_SSL_WANT_WRITE) { |
| return 0; |
| } |
| |
| NET_ERR("TLS data check error: -%x", -ret); |
| |
| /* MbedTLS API documentation requires session to |
| * be reset in other error cases |
| */ |
| if (tls_mbedtls_reset(ctx) != 0) { |
| return -ENOMEM; |
| } |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| if (ret == MBEDTLS_ERR_SSL_TIMEOUT && ctx->type == SOCK_DGRAM) { |
| /* DTLS timeout interpreted as closing of connection. */ |
| return -ENOTCONN; |
| } |
| #endif |
| return -ECONNABORTED; |
| } |
| |
| return mbedtls_ssl_get_bytes_avail(&ctx->ssl); |
| } |
| |
| static int ztls_poll_update_pollin(int fd, struct tls_context *ctx, |
| struct zsock_pollfd *pfd) |
| { |
| int ret; |
| |
| if (!ctx->is_listening) { |
| /* Already had TLS data to read on socket. */ |
| if (mbedtls_ssl_get_bytes_avail(&ctx->ssl) > 0) { |
| pfd->revents |= ZSOCK_POLLIN; |
| goto next; |
| } |
| } |
| |
| if (ctx->type == SOCK_STREAM) { |
| if (!(pfd->revents & ZSOCK_POLLIN)) { |
| /* No new data on a socket. */ |
| goto next; |
| } |
| |
| if (ctx->is_listening) { |
| goto next; |
| } |
| } |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| else { |
| /* Perform data check without incoming data for completed DTLS connections. |
| * This allows the connections to timeout with CONFIG_NET_SOCKETS_DTLS_TIMEOUT. |
| */ |
| if (!is_handshake_complete(ctx) && !(pfd->revents & ZSOCK_POLLIN)) { |
| goto next; |
| } |
| } |
| #endif |
| ret = ztls_socket_data_check(ctx); |
| if (ret == -ENOTCONN || (pfd->revents & ZSOCK_POLLHUP)) { |
| /* Datagram does not return 0 on consecutive recv, but an error |
| * code, hence clear POLLIN. |
| */ |
| if (ctx->type == SOCK_DGRAM) { |
| pfd->revents &= ~ZSOCK_POLLIN; |
| } |
| pfd->revents |= ZSOCK_POLLHUP; |
| goto next; |
| } else if (ret < 0) { |
| ctx->error = -ret; |
| pfd->revents |= ZSOCK_POLLERR; |
| goto next; |
| } else if (ret == 0) { |
| goto again; |
| } |
| |
| next: |
| return 0; |
| |
| again: |
| /* Received encrypted data, but still not enough |
| * to decrypt it and return data through socket, |
| * ask for retry if no other events are set. |
| */ |
| pfd->revents &= ~ZSOCK_POLLIN; |
| |
| return -EAGAIN; |
| } |
| |
| static int ztls_poll_update_ctx(struct tls_context *ctx, |
| struct zsock_pollfd *pfd, |
| struct k_poll_event **pev) |
| { |
| const struct fd_op_vtable *vtable; |
| struct k_mutex *lock; |
| void *obj; |
| int ret; |
| short events = pfd->events; |
| |
| obj = z_get_fd_obj_and_vtable( |
| ctx->sock, (const struct fd_op_vtable **)&vtable, &lock); |
| if (obj == NULL) { |
| return -EBADF; |
| } |
| |
| (void)k_mutex_lock(lock, K_FOREVER); |
| |
| /* Check if the socket was waiting for the handshake to complete. */ |
| if ((pfd->events & ZSOCK_POLLIN) && |
| ((*pev)->obj == &ctx->tls_established)) { |
| /* In case handshake is complete, reconfigure the k_poll_event |
| * to monitor the underlying socket now. |
| */ |
| if ((*pev)->state != K_POLL_STATE_NOT_READY) { |
| ret = z_fdtable_call_ioctl(vtable, obj, |
| ZFD_IOCTL_POLL_PREPARE, |
| pfd, pev, *pev + 1); |
| if (ret != 0 && ret != -EALREADY) { |
| goto out; |
| } |
| |
| /* Return -EAGAIN to signal to poll() that it should |
| * make another iteration with the event reconfigured |
| * above (if needed). |
| */ |
| ret = -EAGAIN; |
| goto out; |
| } |
| |
| /* Handshake still not ready - skip ZSOCK_POLLIN verification |
| * for the underlying socket. |
| */ |
| (*pev)++; |
| pfd->events &= ~ZSOCK_POLLIN; |
| } |
| |
| ret = z_fdtable_call_ioctl(vtable, obj, ZFD_IOCTL_POLL_UPDATE, |
| pfd, pev); |
| if (ret != 0) { |
| goto exit; |
| } |
| |
| if (pfd->events & ZSOCK_POLLIN) { |
| ret = ztls_poll_update_pollin(pfd->fd, ctx, pfd); |
| if (ret == -EAGAIN && pfd->revents != 0) { |
| (*pev - 1)->state = K_POLL_STATE_NOT_READY; |
| goto exit; |
| } |
| } |
| exit: |
| /* Restore original events. */ |
| pfd->events = events; |
| |
| out: |
| k_mutex_unlock(lock); |
| |
| return ret; |
| } |
| |
| /* Return true if needed to retry rightoff or false otherwise. */ |
| static bool poll_offload_dtls_client_retry(struct tls_context *ctx, |
| struct zsock_pollfd *pfd) |
| { |
| /* DTLS client should wait for the handshake to complete before it |
| * reports that data is ready. |
| */ |
| if ((ctx->type != SOCK_DGRAM) || |
| (ctx->options.role != MBEDTLS_SSL_IS_CLIENT)) { |
| return false; |
| } |
| |
| if (ctx->handshake_in_progress) { |
| /* Add some sleep to allow lower priority threads to proceed |
| * with handshake. |
| */ |
| k_msleep(10); |
| |
| pfd->revents &= ~ZSOCK_POLLIN; |
| return true; |
| } else if (!is_handshake_complete(ctx)) { |
| uint8_t byte; |
| int ret; |
| |
| /* Handshake didn't start yet - just drop the incoming data - |
| * it's the client who should initiate the handshake. |
| */ |
| ret = zsock_recv(ctx->sock, &byte, sizeof(byte), |
| ZSOCK_MSG_DONTWAIT); |
| if (ret < 0) { |
| pfd->revents |= ZSOCK_POLLERR; |
| } |
| |
| pfd->revents &= ~ZSOCK_POLLIN; |
| return true; |
| } |
| |
| /* Handshake complete, just proceed. */ |
| return false; |
| } |
| |
| static int ztls_poll_offload(struct zsock_pollfd *fds, int nfds, int timeout) |
| { |
| int fd_backup[CONFIG_NET_SOCKETS_POLL_MAX]; |
| const struct fd_op_vtable *vtable; |
| void *ctx; |
| int ret = 0; |
| int result; |
| int i; |
| bool retry; |
| int remaining; |
| uint32_t entry = k_uptime_get_32(); |
| |
| /* Overwrite TLS file descriptors with underlying ones. */ |
| for (i = 0; i < nfds; i++) { |
| fd_backup[i] = fds[i].fd; |
| |
| ctx = z_get_fd_obj(fds[i].fd, |
| (const struct fd_op_vtable *) |
| &tls_sock_fd_op_vtable, |
| 0); |
| if (ctx == NULL) { |
| continue; |
| } |
| |
| if (fds[i].events & ZSOCK_POLLIN) { |
| ret = ztls_poll_prepare_pollin(ctx); |
| /* In case data is already available in mbedtls, |
| * do not wait in poll. |
| */ |
| if (ret == -EALREADY) { |
| timeout = 0; |
| } |
| } |
| |
| fds[i].fd = ((struct tls_context *)ctx)->sock; |
| } |
| |
| /* Get offloaded sockets vtable. */ |
| ctx = z_get_fd_obj_and_vtable(fds[0].fd, |
| (const struct fd_op_vtable **)&vtable, |
| NULL); |
| if (ctx == NULL) { |
| errno = EINVAL; |
| goto exit; |
| } |
| |
| remaining = timeout; |
| |
| do { |
| for (i = 0; i < nfds; i++) { |
| fds[i].revents = 0; |
| } |
| |
| ret = z_fdtable_call_ioctl(vtable, ctx, ZFD_IOCTL_POLL_OFFLOAD, |
| fds, nfds, remaining); |
| if (ret < 0) { |
| goto exit; |
| } |
| |
| retry = false; |
| ret = 0; |
| |
| for (i = 0; i < nfds; i++) { |
| ctx = z_get_fd_obj(fd_backup[i], |
| (const struct fd_op_vtable *) |
| &tls_sock_fd_op_vtable, |
| 0); |
| if (ctx != NULL) { |
| if (fds[i].events & ZSOCK_POLLIN) { |
| if (poll_offload_dtls_client_retry( |
| ctx, &fds[i])) { |
| retry = true; |
| continue; |
| } |
| |
| result = ztls_poll_update_pollin( |
| fd_backup[i], ctx, &fds[i]); |
| if (result == -EAGAIN) { |
| retry = true; |
| } |
| } |
| } |
| |
| if (fds[i].revents != 0) { |
| ret++; |
| } |
| } |
| |
| if (retry) { |
| if (ret > 0 || timeout == 0) { |
| goto exit; |
| } |
| |
| if (timeout > 0) { |
| remaining = time_left(entry, timeout); |
| if (remaining <= 0) { |
| goto exit; |
| } |
| } |
| } |
| } while (retry); |
| |
| exit: |
| /* Restore original fds. */ |
| for (i = 0; i < nfds; i++) { |
| fds[i].fd = fd_backup[i]; |
| } |
| |
| return ret; |
| } |
| |
| int ztls_getsockopt_ctx(struct tls_context *ctx, int level, int optname, |
| void *optval, socklen_t *optlen) |
| { |
| int err; |
| |
| if (!optval || !optlen) { |
| errno = EINVAL; |
| return -1; |
| } |
| |
| if ((level == SOL_SOCKET) && (optname == SO_PROTOCOL)) { |
| /* Protocol type is overridden during socket creation. Its |
| * value is restored here to return current value. |
| */ |
| err = sock_opt_protocol_get(ctx, optval, optlen); |
| if (err < 0) { |
| errno = -err; |
| return -1; |
| } |
| return err; |
| } |
| |
| /* In case error was set on a socket at the TLS layer (for example due |
| * to receiving TLS alert), handle SO_ERROR here, and report that error. |
| * Otherwise, forward the SO_ERROR option request to the underlying |
| * TCP/UDP socket to handle. |
| */ |
| if ((level == SOL_SOCKET) && (optname == SO_ERROR) && ctx->error != 0) { |
| if (*optlen != sizeof(int)) { |
| errno = EINVAL; |
| return -1; |
| } |
| |
| *(int *)optval = ctx->error; |
| |
| return 0; |
| } |
| |
| if (level != SOL_TLS) { |
| return zsock_getsockopt(ctx->sock, level, optname, |
| optval, optlen); |
| } |
| |
| switch (optname) { |
| case TLS_SEC_TAG_LIST: |
| err = tls_opt_sec_tag_list_get(ctx, optval, optlen); |
| break; |
| |
| case TLS_CIPHERSUITE_LIST: |
| err = tls_opt_ciphersuite_list_get(ctx, optval, optlen); |
| break; |
| |
| case TLS_CIPHERSUITE_USED: |
| err = tls_opt_ciphersuite_used_get(ctx, optval, optlen); |
| break; |
| |
| case TLS_ALPN_LIST: |
| err = tls_opt_alpn_list_get(ctx, optval, optlen); |
| break; |
| |
| case TLS_SESSION_CACHE: |
| err = tls_opt_session_cache_get(ctx, optval, optlen); |
| break; |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| case TLS_DTLS_HANDSHAKE_TIMEOUT_MIN: |
| err = tls_opt_dtls_handshake_timeout_get(ctx, optval, |
| optlen, false); |
| break; |
| |
| case TLS_DTLS_HANDSHAKE_TIMEOUT_MAX: |
| err = tls_opt_dtls_handshake_timeout_get(ctx, optval, |
| optlen, true); |
| break; |
| |
| case TLS_DTLS_CID_STATUS: |
| err = tls_opt_dtls_connection_id_status_get(ctx, optval, |
| optlen); |
| break; |
| |
| case TLS_DTLS_CID_VALUE: |
| err = tls_opt_dtls_connection_id_value_get(ctx, optval, optlen); |
| break; |
| |
| case TLS_DTLS_PEER_CID_VALUE: |
| err = tls_opt_dtls_peer_connection_id_value_get(ctx, optval, |
| optlen); |
| break; |
| |
| case TLS_DTLS_HANDSHAKE_ON_CONNECT: |
| err = tls_opt_dtls_handshake_on_connect_get(ctx, optval, optlen); |
| break; |
| #endif /* CONFIG_NET_SOCKETS_ENABLE_DTLS */ |
| |
| default: |
| /* Unknown or write-only option. */ |
| err = -ENOPROTOOPT; |
| break; |
| } |
| |
| if (err < 0) { |
| errno = -err; |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| static int set_timeout_opt(k_timeout_t *timeout, const void *optval, |
| socklen_t optlen) |
| { |
| const struct zsock_timeval *tval = optval; |
| |
| if (optlen != sizeof(struct zsock_timeval)) { |
| return -EINVAL; |
| } |
| |
| if (tval->tv_sec == 0 && tval->tv_usec == 0) { |
| *timeout = K_FOREVER; |
| } else { |
| *timeout = K_USEC(tval->tv_sec * 1000000ULL + tval->tv_usec); |
| } |
| |
| return 0; |
| } |
| |
| int ztls_setsockopt_ctx(struct tls_context *ctx, int level, int optname, |
| const void *optval, socklen_t optlen) |
| { |
| int err; |
| |
| /* Underlying socket is used in non-blocking mode, hence implement |
| * timeout at the TLS socket level. |
| */ |
| if ((level == SOL_SOCKET) && (optname == SO_SNDTIMEO)) { |
| err = set_timeout_opt(&ctx->options.timeout_tx, optval, optlen); |
| goto out; |
| } |
| |
| if ((level == SOL_SOCKET) && (optname == SO_RCVTIMEO)) { |
| err = set_timeout_opt(&ctx->options.timeout_rx, optval, optlen); |
| goto out; |
| } |
| |
| if (level != SOL_TLS) { |
| return zsock_setsockopt(ctx->sock, level, optname, |
| optval, optlen); |
| } |
| |
| switch (optname) { |
| case TLS_SEC_TAG_LIST: |
| err = tls_opt_sec_tag_list_set(ctx, optval, optlen); |
| break; |
| |
| case TLS_HOSTNAME: |
| err = tls_opt_hostname_set(ctx, optval, optlen); |
| break; |
| |
| case TLS_CIPHERSUITE_LIST: |
| err = tls_opt_ciphersuite_list_set(ctx, optval, optlen); |
| break; |
| |
| case TLS_PEER_VERIFY: |
| err = tls_opt_peer_verify_set(ctx, optval, optlen); |
| break; |
| |
| case TLS_CERT_NOCOPY: |
| err = tls_opt_cert_nocopy_set(ctx, optval, optlen); |
| break; |
| |
| case TLS_DTLS_ROLE: |
| err = tls_opt_dtls_role_set(ctx, optval, optlen); |
| break; |
| |
| case TLS_ALPN_LIST: |
| err = tls_opt_alpn_list_set(ctx, optval, optlen); |
| break; |
| |
| case TLS_SESSION_CACHE: |
| err = tls_opt_session_cache_set(ctx, optval, optlen); |
| break; |
| |
| case TLS_SESSION_CACHE_PURGE: |
| err = tls_opt_session_cache_purge_set(ctx, optval, optlen); |
| break; |
| |
| #if defined(CONFIG_NET_SOCKETS_ENABLE_DTLS) |
| case TLS_DTLS_HANDSHAKE_TIMEOUT_MIN: |
| err = tls_opt_dtls_handshake_timeout_set(ctx, optval, |
| optlen, false); |
| break; |
| |
| case TLS_DTLS_HANDSHAKE_TIMEOUT_MAX: |
| err = tls_opt_dtls_handshake_timeout_set(ctx, optval, |
| optlen, true); |
| break; |
| |
| case TLS_DTLS_CID: |
| err = tls_opt_dtls_connection_id_set(ctx, optval, optlen); |
| break; |
| |
| case TLS_DTLS_CID_VALUE: |
| err = tls_opt_dtls_connection_id_value_set(ctx, optval, optlen); |
| break; |
| |
| case TLS_DTLS_HANDSHAKE_ON_CONNECT: |
| err = tls_opt_dtls_handshake_on_connect_set(ctx, optval, optlen); |
| break; |
| |
| #endif /* CONFIG_NET_SOCKETS_ENABLE_DTLS */ |
| |
| case TLS_NATIVE: |
| /* Option handled at the socket dispatcher level. */ |
| err = 0; |
| break; |
| |
| default: |
| /* Unknown or read-only option. */ |
| err = -ENOPROTOOPT; |
| break; |
| } |
| |
| out: |
| if (err < 0) { |
| errno = -err; |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| #if defined(CONFIG_NET_TEST) |
| mbedtls_ssl_context *ztls_get_mbedtls_ssl_context(int fd) |
| { |
| struct tls_context *ctx; |
| |
| ctx = z_get_fd_obj(fd, (const struct fd_op_vtable *) |
| &tls_sock_fd_op_vtable, EBADF); |
| if (ctx == NULL) { |
| return NULL; |
| } |
| |
| return &ctx->ssl; |
| } |
| #endif /* CONFIG_NET_TEST */ |
| |
| static ssize_t tls_sock_read_vmeth(void *obj, void *buffer, size_t count) |
| { |
| return ztls_recvfrom_ctx(obj, buffer, count, 0, NULL, 0); |
| } |
| |
| static ssize_t tls_sock_write_vmeth(void *obj, const void *buffer, |
| size_t count) |
| { |
| return ztls_sendto_ctx(obj, buffer, count, 0, NULL, 0); |
| } |
| |
| static int tls_sock_ioctl_vmeth(void *obj, unsigned int request, va_list args) |
| { |
| struct tls_context *ctx = obj; |
| |
| switch (request) { |
| /* fcntl() commands */ |
| case F_GETFL: |
| case F_SETFL: { |
| const struct fd_op_vtable *vtable; |
| struct k_mutex *lock; |
| void *fd_obj; |
| int ret; |
| |
| fd_obj = z_get_fd_obj_and_vtable(ctx->sock, |
| (const struct fd_op_vtable **)&vtable, &lock); |
| if (fd_obj == NULL) { |
| errno = EBADF; |
| return -1; |
| } |
| |
| (void)k_mutex_lock(lock, K_FOREVER); |
| |
| /* Pass the call to the core socket implementation. */ |
| ret = vtable->ioctl(fd_obj, request, args); |
| |
| k_mutex_unlock(lock); |
| |
| return ret; |
| } |
| |
| case ZFD_IOCTL_SET_LOCK: { |
| struct k_mutex *lock; |
| |
| lock = va_arg(args, struct k_mutex *); |
| |
| ctx_set_lock(obj, lock); |
| |
| return 0; |
| } |
| |
| case ZFD_IOCTL_POLL_PREPARE: { |
| struct zsock_pollfd *pfd; |
| struct k_poll_event **pev; |
| struct k_poll_event *pev_end; |
| |
| pfd = va_arg(args, struct zsock_pollfd *); |
| pev = va_arg(args, struct k_poll_event **); |
| pev_end = va_arg(args, struct k_poll_event *); |
| |
| return ztls_poll_prepare_ctx(obj, pfd, pev, pev_end); |
| } |
| |
| case ZFD_IOCTL_POLL_UPDATE: { |
| struct zsock_pollfd *pfd; |
| struct k_poll_event **pev; |
| |
| pfd = va_arg(args, struct zsock_pollfd *); |
| pev = va_arg(args, struct k_poll_event **); |
| |
| return ztls_poll_update_ctx(obj, pfd, pev); |
| } |
| |
| case ZFD_IOCTL_POLL_OFFLOAD: { |
| struct zsock_pollfd *fds; |
| int nfds; |
| int timeout; |
| |
| fds = va_arg(args, struct zsock_pollfd *); |
| nfds = va_arg(args, int); |
| timeout = va_arg(args, int); |
| |
| return ztls_poll_offload(fds, nfds, timeout); |
| } |
| |
| default: |
| errno = EOPNOTSUPP; |
| return -1; |
| } |
| } |
| |
| static int tls_sock_shutdown_vmeth(void *obj, int how) |
| { |
| struct tls_context *ctx = obj; |
| |
| return zsock_shutdown(ctx->sock, how); |
| } |
| |
| static int tls_sock_bind_vmeth(void *obj, const struct sockaddr *addr, |
| socklen_t addrlen) |
| { |
| struct tls_context *ctx = obj; |
| |
| return zsock_bind(ctx->sock, addr, addrlen); |
| } |
| |
| static int tls_sock_connect_vmeth(void *obj, const struct sockaddr *addr, |
| socklen_t addrlen) |
| { |
| return ztls_connect_ctx(obj, addr, addrlen); |
| } |
| |
| static int tls_sock_listen_vmeth(void *obj, int backlog) |
| { |
| struct tls_context *ctx = obj; |
| |
| ctx->is_listening = true; |
| |
| return zsock_listen(ctx->sock, backlog); |
| } |
| |
| static int tls_sock_accept_vmeth(void *obj, struct sockaddr *addr, |
| socklen_t *addrlen) |
| { |
| return ztls_accept_ctx(obj, addr, addrlen); |
| } |
| |
| static ssize_t tls_sock_sendto_vmeth(void *obj, const void *buf, size_t len, |
| int flags, |
| const struct sockaddr *dest_addr, |
| socklen_t addrlen) |
| { |
| return ztls_sendto_ctx(obj, buf, len, flags, dest_addr, addrlen); |
| } |
| |
| static ssize_t tls_sock_sendmsg_vmeth(void *obj, const struct msghdr *msg, |
| int flags) |
| { |
| return ztls_sendmsg_ctx(obj, msg, flags); |
| } |
| |
| static ssize_t tls_sock_recvfrom_vmeth(void *obj, void *buf, size_t max_len, |
| int flags, struct sockaddr *src_addr, |
| socklen_t *addrlen) |
| { |
| return ztls_recvfrom_ctx(obj, buf, max_len, flags, |
| src_addr, addrlen); |
| } |
| |
| static int tls_sock_getsockopt_vmeth(void *obj, int level, int optname, |
| void *optval, socklen_t *optlen) |
| { |
| return ztls_getsockopt_ctx(obj, level, optname, optval, optlen); |
| } |
| |
| static int tls_sock_setsockopt_vmeth(void *obj, int level, int optname, |
| const void *optval, socklen_t optlen) |
| { |
| return ztls_setsockopt_ctx(obj, level, optname, optval, optlen); |
| } |
| |
| static int tls_sock_close_vmeth(void *obj) |
| { |
| return ztls_close_ctx(obj); |
| } |
| |
| static int tls_sock_getpeername_vmeth(void *obj, struct sockaddr *addr, |
| socklen_t *addrlen) |
| { |
| struct tls_context *ctx = obj; |
| |
| return zsock_getpeername(ctx->sock, addr, addrlen); |
| } |
| |
| static int tls_sock_getsockname_vmeth(void *obj, struct sockaddr *addr, |
| socklen_t *addrlen) |
| { |
| struct tls_context *ctx = obj; |
| |
| return zsock_getsockname(ctx->sock, addr, addrlen); |
| } |
| |
| static const struct socket_op_vtable tls_sock_fd_op_vtable = { |
| .fd_vtable = { |
| .read = tls_sock_read_vmeth, |
| .write = tls_sock_write_vmeth, |
| .close = tls_sock_close_vmeth, |
| .ioctl = tls_sock_ioctl_vmeth, |
| }, |
| .shutdown = tls_sock_shutdown_vmeth, |
| .bind = tls_sock_bind_vmeth, |
| .connect = tls_sock_connect_vmeth, |
| .listen = tls_sock_listen_vmeth, |
| .accept = tls_sock_accept_vmeth, |
| .sendto = tls_sock_sendto_vmeth, |
| .sendmsg = tls_sock_sendmsg_vmeth, |
| .recvfrom = tls_sock_recvfrom_vmeth, |
| .getsockopt = tls_sock_getsockopt_vmeth, |
| .setsockopt = tls_sock_setsockopt_vmeth, |
| .getpeername = tls_sock_getpeername_vmeth, |
| .getsockname = tls_sock_getsockname_vmeth, |
| }; |
| |
| static bool tls_is_supported(int family, int type, int proto) |
| { |
| if (protocol_check(family, type, &proto) == 0) { |
| return true; |
| } |
| |
| return false; |
| } |
| |
| /* Since both, TLS sockets and regular ones fall under the same address family, |
| * it's required to process TLS first in order to capture socket calls which |
| * create sockets for secure protocols. Every other call for AF_INET/AF_INET6 |
| * will be forwarded to regular socket implementation. |
| */ |
| BUILD_ASSERT(CONFIG_NET_SOCKETS_TLS_PRIORITY < CONFIG_NET_SOCKETS_PRIORITY_DEFAULT, |
| "CONFIG_NET_SOCKETS_TLS_PRIORITY have to be smaller than CONFIG_NET_SOCKETS_PRIORITY_DEFAULT"); |
| |
| NET_SOCKET_REGISTER(tls, CONFIG_NET_SOCKETS_TLS_PRIORITY, AF_UNSPEC, |
| tls_is_supported, ztls_socket); |