proto_mbedtls.c 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249
  1. /*
  2. * Copyright (c) 2006-2021, RT-Thread Development Team
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. *
  6. * Change Logs:
  7. * Date Author Notes
  8. * 2018-11-12 ChenYong First version
  9. */
  10. #include <rtthread.h>
  11. #ifdef RT_USING_DFS
  12. #include <unistd.h>
  13. #include <sys/stat.h>
  14. #include <sys/statfs.h>
  15. #endif
  16. #ifdef SAL_USING_TLS
  17. #include <sal_tls.h>
  18. #endif
  19. #include <netdb.h>
  20. #include <sal.h>
  21. #include <netdev.h>
  22. #ifdef SAL_USING_TLS
  23. #if !defined(MBEDTLS_CONFIG_FILE)
  24. #include <mbedtls/config.h>
  25. #else
  26. #include MBEDTLS_CONFIG_FILE
  27. #endif
  28. #include <tls_certificate.h>
  29. #include <tls_client.h>
  30. #ifndef SAL_MEBDTLS_BUFFER_LEN
  31. #define SAL_MEBDTLS_BUFFER_LEN 1024
  32. #endif
  33. static void *mebdtls_socket(int socket)
  34. {
  35. MbedTLSSession *session = RT_NULL;
  36. char *pers = "mbedtls";
  37. if (socket < 0)
  38. {
  39. return RT_NULL;
  40. }
  41. session = (MbedTLSSession *) tls_calloc(1, sizeof(MbedTLSSession));
  42. if (session == RT_NULL)
  43. {
  44. return RT_NULL;
  45. }
  46. session->buffer_len = SAL_MEBDTLS_BUFFER_LEN;
  47. session->buffer = tls_calloc(1, session->buffer_len);
  48. if (session->buffer == RT_NULL)
  49. {
  50. tls_free(session);
  51. session = RT_NULL;
  52. return RT_NULL;
  53. }
  54. /* initialize TLS Client sesison */
  55. if (mbedtls_client_init(session, (void *) pers, rt_strlen(pers)) != RT_EOK)
  56. {
  57. mbedtls_client_close(session);
  58. return RT_NULL;
  59. }
  60. session->server_fd.fd = socket;
  61. return (void *)session;
  62. }
  63. int mbedtls_net_send_cb(void *ctx, const unsigned char *buf, size_t len)
  64. {
  65. struct sal_socket *sock;
  66. int socket, ret;
  67. struct sal_proto_family *pf;
  68. RT_ASSERT(ctx);
  69. RT_ASSERT(buf);
  70. socket = ((mbedtls_net_context *) ctx)->fd;
  71. sock = sal_get_socket(socket);
  72. if (sock == RT_NULL)
  73. {
  74. return -1;
  75. }
  76. pf = (struct sal_proto_family *)sock->netdev->sal_user_data;
  77. /* Register scoket sendto option to TLS send data callback */
  78. ret = pf->skt_ops->sendto((int) sock->user_data, (void *)buf, len, 0, RT_NULL, RT_NULL);
  79. if (ret < 0)
  80. {
  81. #ifdef RT_USING_DFS
  82. if ((fcntl(socket, F_GETFL) & O_NONBLOCK) == O_NONBLOCK)
  83. return MBEDTLS_ERR_SSL_WANT_WRITE;
  84. #endif
  85. if (errno == ECONNRESET)
  86. return MBEDTLS_ERR_NET_CONN_RESET;
  87. if ( errno == EINTR)
  88. return MBEDTLS_ERR_SSL_WANT_READ;
  89. return MBEDTLS_ERR_NET_SEND_FAILED ;
  90. }
  91. return ret;
  92. }
  93. int mbedtls_net_recv_cb( void *ctx, unsigned char *buf, size_t len)
  94. {
  95. struct sal_socket *sock;
  96. struct sal_proto_family *pf;
  97. int socket, ret;
  98. RT_ASSERT(ctx);
  99. RT_ASSERT(buf);
  100. socket = ((mbedtls_net_context *) ctx)->fd;
  101. sock = sal_get_socket(socket);
  102. if (sock == RT_NULL)
  103. {
  104. return -1;
  105. }
  106. pf = (struct sal_proto_family *)sock->netdev->sal_user_data;
  107. /* Register scoket recvfrom option to TLS recv data callback */
  108. ret = pf->skt_ops->recvfrom((int) sock->user_data, (void *)buf, len, 0, RT_NULL, RT_NULL);
  109. if (ret < 0)
  110. {
  111. #ifdef RT_USING_DFS
  112. if ((fcntl(socket, F_GETFL) & O_NONBLOCK) == O_NONBLOCK)
  113. return MBEDTLS_ERR_SSL_WANT_WRITE;
  114. #endif
  115. if (errno == ECONNRESET)
  116. return MBEDTLS_ERR_NET_CONN_RESET;
  117. if ( errno == EINTR)
  118. return MBEDTLS_ERR_SSL_WANT_READ;
  119. return MBEDTLS_ERR_NET_RECV_FAILED ;
  120. }
  121. return ret;
  122. }
  123. static int mbedtls_connect(void *sock)
  124. {
  125. MbedTLSSession *session = RT_NULL;
  126. int ret = 0;
  127. RT_ASSERT(sock);
  128. session = (MbedTLSSession *) sock;
  129. /* Set the SSL Configure infromation */
  130. ret = mbedtls_client_context(session);
  131. if (ret < 0)
  132. {
  133. goto __exit;
  134. }
  135. /* Set the underlying BIO callbacks for write, read and read-with-timeout. */
  136. mbedtls_ssl_set_bio(&session->ssl, &session->server_fd, mbedtls_net_send_cb, mbedtls_net_recv_cb, RT_NULL);
  137. while ((ret = mbedtls_ssl_handshake(&session->ssl)) != 0)
  138. {
  139. if (ret != MBEDTLS_ERR_SSL_WANT_READ && ret != MBEDTLS_ERR_SSL_WANT_WRITE)
  140. {
  141. goto __exit;
  142. }
  143. }
  144. /* Return the result of the certificate verification */
  145. ret = mbedtls_ssl_get_verify_result(&session->ssl);
  146. if (ret != 0)
  147. {
  148. rt_memset(session->buffer, 0x00, session->buffer_len);
  149. mbedtls_x509_crt_verify_info((char *)session->buffer, session->buffer_len, " ! ", ret);
  150. goto __exit;
  151. }
  152. return ret;
  153. __exit:
  154. if (session)
  155. {
  156. mbedtls_client_close(session);
  157. }
  158. return ret;
  159. }
  160. static int mbedtls_closesocket(void *sock)
  161. {
  162. struct sal_socket *ssock;
  163. int socket;
  164. if (sock == RT_NULL)
  165. {
  166. return 0;
  167. }
  168. socket = ((MbedTLSSession *) sock)->server_fd.fd;
  169. ssock = sal_get_socket(socket);
  170. if (ssock == RT_NULL)
  171. {
  172. return -1;
  173. }
  174. /* Close TLS client session, and clean user-data in SAL socket */
  175. mbedtls_client_close((MbedTLSSession *) sock);
  176. ssock->user_data_tls = RT_NULL;
  177. return 0;
  178. }
  179. static const struct sal_proto_tls_ops mbedtls_proto_ops=
  180. {
  181. RT_NULL,
  182. mebdtls_socket,
  183. mbedtls_connect,
  184. (int (*)(void *sock, const void *data, size_t size)) mbedtls_client_write,
  185. (int (*)(void *sock, void *mem, size_t len)) mbedtls_client_read,
  186. mbedtls_closesocket,
  187. };
  188. static const struct sal_proto_tls mbedtls_proto =
  189. {
  190. "mbedtls",
  191. &mbedtls_proto_ops,
  192. };
  193. int sal_mbedtls_proto_init(void)
  194. {
  195. /* register MbedTLS protocol options to SAL */
  196. sal_proto_tls_register(&mbedtls_proto);
  197. return 0;
  198. }
  199. INIT_COMPONENT_EXPORT(sal_mbedtls_proto_init);
  200. #endif /* SAL_USING_TLS */