proto_mbedtls.c 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247
  1. /*
  2. * Copyright (c) 2006-2018, RT-Thread Development Team
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. *
  6. * Change Logs:
  7. * Date Author Notes
  8. * 2018-11-12 ChenYong First version
  9. */
  10. #include <rtthread.h>
  11. #ifdef RT_USING_DFS
  12. #include <dfs_posix.h>
  13. #endif
  14. #ifdef SAL_USING_TLS
  15. #include <sal_tls.h>
  16. #endif
  17. #include <netdb.h>
  18. #include <sal.h>
  19. #include <netdev.h>
  20. #ifdef SAL_USING_TLS
  21. #if !defined(MBEDTLS_CONFIG_FILE)
  22. #include <mbedtls/config.h>
  23. #else
  24. #include MBEDTLS_CONFIG_FILE
  25. #endif
  26. #include <tls_certificate.h>
  27. #include <tls_client.h>
  28. #ifndef SAL_MEBDTLS_BUFFER_LEN
  29. #define SAL_MEBDTLS_BUFFER_LEN 1024
  30. #endif
  31. static void *mebdtls_socket(int socket)
  32. {
  33. MbedTLSSession *session = RT_NULL;
  34. char *pers = "mbedtls";
  35. if (socket < 0)
  36. {
  37. return RT_NULL;
  38. }
  39. session = (MbedTLSSession *) tls_calloc(1, sizeof(MbedTLSSession));
  40. if (session == RT_NULL)
  41. {
  42. return RT_NULL;
  43. }
  44. session->buffer_len = SAL_MEBDTLS_BUFFER_LEN;
  45. session->buffer = tls_calloc(1, session->buffer_len);
  46. if (session->buffer == RT_NULL)
  47. {
  48. tls_free(session);
  49. session = RT_NULL;
  50. return RT_NULL;
  51. }
  52. /* initialize TLS Client sesison */
  53. if (mbedtls_client_init(session, (void *) pers, rt_strlen(pers)) != RT_EOK)
  54. {
  55. mbedtls_client_close(session);
  56. return RT_NULL;
  57. }
  58. session->server_fd.fd = socket;
  59. return (void *)session;
  60. }
  61. int mbedtls_net_send_cb(void *ctx, const unsigned char *buf, size_t len)
  62. {
  63. struct sal_socket *sock;
  64. int socket, ret;
  65. struct sal_proto_family *pf;
  66. RT_ASSERT(ctx);
  67. RT_ASSERT(buf);
  68. socket = ((mbedtls_net_context *) ctx)->fd;
  69. sock = sal_get_socket(socket);
  70. if (sock == RT_NULL)
  71. {
  72. return -1;
  73. }
  74. pf = (struct sal_proto_family *)sock->netdev->sal_user_data;
  75. /* Register scoket sendto option to TLS send data callback */
  76. ret = pf->skt_ops->sendto((int) sock->user_data, (void *)buf, len, 0, RT_NULL, RT_NULL);
  77. if (ret < 0)
  78. {
  79. #ifdef RT_USING_DFS
  80. if ((fcntl(socket, F_GETFL) & O_NONBLOCK) == O_NONBLOCK)
  81. return MBEDTLS_ERR_SSL_WANT_WRITE;
  82. #endif
  83. if (errno == ECONNRESET)
  84. return MBEDTLS_ERR_NET_CONN_RESET;
  85. if ( errno == EINTR)
  86. return MBEDTLS_ERR_SSL_WANT_READ;
  87. return MBEDTLS_ERR_NET_SEND_FAILED ;
  88. }
  89. return ret;
  90. }
  91. int mbedtls_net_recv_cb( void *ctx, unsigned char *buf, size_t len)
  92. {
  93. struct sal_socket *sock;
  94. struct sal_proto_family *pf;
  95. int socket, ret;
  96. RT_ASSERT(ctx);
  97. RT_ASSERT(buf);
  98. socket = ((mbedtls_net_context *) ctx)->fd;
  99. sock = sal_get_socket(socket);
  100. if (sock == RT_NULL)
  101. {
  102. return -1;
  103. }
  104. pf = (struct sal_proto_family *)sock->netdev->sal_user_data;
  105. /* Register scoket recvfrom option to TLS recv data callback */
  106. ret = pf->skt_ops->recvfrom((int) sock->user_data, (void *)buf, len, 0, RT_NULL, RT_NULL);
  107. if (ret < 0)
  108. {
  109. #ifdef RT_USING_DFS
  110. if ((fcntl(socket, F_GETFL) & O_NONBLOCK) == O_NONBLOCK)
  111. return MBEDTLS_ERR_SSL_WANT_WRITE;
  112. #endif
  113. if (errno == ECONNRESET)
  114. return MBEDTLS_ERR_NET_CONN_RESET;
  115. if ( errno == EINTR)
  116. return MBEDTLS_ERR_SSL_WANT_READ;
  117. return MBEDTLS_ERR_NET_RECV_FAILED ;
  118. }
  119. return ret;
  120. }
  121. static int mbedtls_connect(void *sock)
  122. {
  123. MbedTLSSession *session = RT_NULL;
  124. int ret = 0;
  125. RT_ASSERT(sock);
  126. session = (MbedTLSSession *) sock;
  127. /* Set the SSL Configure infromation */
  128. ret = mbedtls_client_context(session);
  129. if (ret < 0)
  130. {
  131. goto __exit;
  132. }
  133. /* Set the underlying BIO callbacks for write, read and read-with-timeout. */
  134. mbedtls_ssl_set_bio(&session->ssl, &session->server_fd, mbedtls_net_send_cb, mbedtls_net_recv_cb, RT_NULL);
  135. while ((ret = mbedtls_ssl_handshake(&session->ssl)) != 0)
  136. {
  137. if (ret != MBEDTLS_ERR_SSL_WANT_READ && ret != MBEDTLS_ERR_SSL_WANT_WRITE)
  138. {
  139. goto __exit;
  140. }
  141. }
  142. /* Return the result of the certificate verification */
  143. ret = mbedtls_ssl_get_verify_result(&session->ssl);
  144. if (ret != 0)
  145. {
  146. rt_memset(session->buffer, 0x00, session->buffer_len);
  147. mbedtls_x509_crt_verify_info((char *)session->buffer, session->buffer_len, " ! ", ret);
  148. goto __exit;
  149. }
  150. return ret;
  151. __exit:
  152. if (session)
  153. {
  154. mbedtls_client_close(session);
  155. }
  156. return ret;
  157. }
  158. static int mbedtls_closesocket(void *sock)
  159. {
  160. struct sal_socket *ssock;
  161. int socket;
  162. if (sock == RT_NULL)
  163. {
  164. return 0;
  165. }
  166. socket = ((MbedTLSSession *) sock)->server_fd.fd;
  167. ssock = sal_get_socket(socket);
  168. if (ssock == RT_NULL)
  169. {
  170. return -1;
  171. }
  172. /* Close TLS client session, and clean user-data in SAL socket */
  173. mbedtls_client_close((MbedTLSSession *) sock);
  174. ssock->user_data_tls = RT_NULL;
  175. return 0;
  176. }
  177. static const struct sal_proto_tls_ops mbedtls_proto_ops=
  178. {
  179. RT_NULL,
  180. mebdtls_socket,
  181. mbedtls_connect,
  182. (int (*)(void *sock, const void *data, size_t size)) mbedtls_client_write,
  183. (int (*)(void *sock, void *mem, size_t len)) mbedtls_client_read,
  184. mbedtls_closesocket,
  185. };
  186. static const struct sal_proto_tls mbedtls_proto =
  187. {
  188. "mbedtls",
  189. &mbedtls_proto_ops,
  190. };
  191. int sal_mbedtls_proto_init(void)
  192. {
  193. /* register MbedTLS protocol options to SAL */
  194. sal_proto_tls_register(&mbedtls_proto);
  195. return 0;
  196. }
  197. INIT_COMPONENT_EXPORT(sal_mbedtls_proto_init);
  198. #endif /* SAL_USING_TLS */