esp_tls.c 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681
  1. /*
  2. * SPDX-FileCopyrightText: 2019-2022 Espressif Systems (Shanghai) CO LTD
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. */
  6. #include <stdio.h>
  7. #include <string.h>
  8. #include <stdlib.h>
  9. #include <unistd.h>
  10. #include <sys/types.h>
  11. #include <sys/socket.h>
  12. #include <netdb.h>
  13. #include <http_parser.h>
  14. #include "esp_tls.h"
  15. #include "esp_tls_private.h"
  16. #include "esp_tls_error_capture_internal.h"
  17. #include <errno.h>
  18. static const char *TAG = "esp-tls";
  19. #ifdef CONFIG_ESP_TLS_USING_MBEDTLS
  20. #include "esp_tls_mbedtls.h"
  21. #elif CONFIG_ESP_TLS_USING_WOLFSSL
  22. #include "esp_tls_wolfssl.h"
  23. #endif
  24. #ifdef ESP_PLATFORM
  25. #include <esp_log.h>
  26. #else
  27. #define ESP_LOGD(TAG, ...) //printf(__VA_ARGS__);
  28. #define ESP_LOGE(TAG, ...) printf(__VA_ARGS__);
  29. #endif
  30. #ifdef CONFIG_ESP_TLS_USING_MBEDTLS
  31. #define _esp_create_ssl_handle esp_create_mbedtls_handle
  32. #define _esp_tls_handshake esp_mbedtls_handshake
  33. #define _esp_tls_read esp_mbedtls_read
  34. #define _esp_tls_write esp_mbedtls_write
  35. #define _esp_tls_conn_delete esp_mbedtls_conn_delete
  36. #define _esp_tls_net_init esp_mbedtls_net_init
  37. #define _esp_tls_get_client_session esp_mbedtls_get_client_session
  38. #define _esp_tls_free_client_session esp_mbedtls_free_client_session
  39. #define _esp_tls_get_ssl_context esp_mbedtls_get_ssl_context
  40. #ifdef CONFIG_ESP_TLS_SERVER
  41. #define _esp_tls_server_session_create esp_mbedtls_server_session_create
  42. #define _esp_tls_server_session_delete esp_mbedtls_server_session_delete
  43. #define _esp_tls_server_session_ticket_ctx_init esp_mbedtls_server_session_ticket_ctx_init
  44. #define _esp_tls_server_session_ticket_ctx_free esp_mbedtls_server_session_ticket_ctx_free
  45. #endif /* CONFIG_ESP_TLS_SERVER */
  46. #define _esp_tls_get_bytes_avail esp_mbedtls_get_bytes_avail
  47. #define _esp_tls_init_global_ca_store esp_mbedtls_init_global_ca_store
  48. #define _esp_tls_set_global_ca_store esp_mbedtls_set_global_ca_store /*!< Callback function for setting global CA store data for TLS/SSL */
  49. #define _esp_tls_get_global_ca_store esp_mbedtls_get_global_ca_store
  50. #define _esp_tls_free_global_ca_store esp_mbedtls_free_global_ca_store /*!< Callback function for freeing global ca store for TLS/SSL */
  51. #elif CONFIG_ESP_TLS_USING_WOLFSSL /* CONFIG_ESP_TLS_USING_MBEDTLS */
  52. #define _esp_create_ssl_handle esp_create_wolfssl_handle
  53. #define _esp_tls_handshake esp_wolfssl_handshake
  54. #define _esp_tls_read esp_wolfssl_read
  55. #define _esp_tls_write esp_wolfssl_write
  56. #define _esp_tls_conn_delete esp_wolfssl_conn_delete
  57. #define _esp_tls_net_init esp_wolfssl_net_init
  58. #ifdef CONFIG_ESP_TLS_SERVER
  59. #define _esp_tls_server_session_create esp_wolfssl_server_session_create
  60. #define _esp_tls_server_session_delete esp_wolfssl_server_session_delete
  61. #endif /* CONFIG_ESP_TLS_SERVER */
  62. #define _esp_tls_get_bytes_avail esp_wolfssl_get_bytes_avail
  63. #define _esp_tls_init_global_ca_store esp_wolfssl_init_global_ca_store
  64. #define _esp_tls_set_global_ca_store esp_wolfssl_set_global_ca_store /*!< Callback function for setting global CA store data for TLS/SSL */
  65. #define _esp_tls_free_global_ca_store esp_wolfssl_free_global_ca_store /*!< Callback function for freeing global ca store for TLS/SSL */
  66. #define _esp_tls_get_ssl_context esp_wolfssl_get_ssl_context
  67. #else /* ESP_TLS_USING_WOLFSSL */
  68. #error "No TLS stack configured"
  69. #endif
  70. static esp_err_t create_ssl_handle(const char *hostname, size_t hostlen, const void *cfg, esp_tls_t *tls)
  71. {
  72. return _esp_create_ssl_handle(hostname, hostlen, cfg, tls);
  73. }
  74. static esp_err_t esp_tls_handshake(esp_tls_t *tls, const esp_tls_cfg_t *cfg)
  75. {
  76. return _esp_tls_handshake(tls, cfg);
  77. }
  78. static ssize_t tcp_read(esp_tls_t *tls, char *data, size_t datalen)
  79. {
  80. return recv(tls->sockfd, data, datalen, 0);
  81. }
  82. static ssize_t tcp_write(esp_tls_t *tls, const char *data, size_t datalen)
  83. {
  84. return send(tls->sockfd, data, datalen, 0);
  85. }
  86. ssize_t esp_tls_conn_read(esp_tls_t *tls, void *data, size_t datalen)
  87. {
  88. return tls->read(tls, (char *)data, datalen);
  89. }
  90. ssize_t esp_tls_conn_write(esp_tls_t *tls, const void *data, size_t datalen)
  91. {
  92. return tls->write(tls, (char *)data, datalen);
  93. }
  94. /**
  95. * @brief Close the TLS connection and free any allocated resources.
  96. */
  97. int esp_tls_conn_destroy(esp_tls_t *tls)
  98. {
  99. if (tls != NULL) {
  100. int ret = 0;
  101. _esp_tls_conn_delete(tls);
  102. if (tls->sockfd >= 0) {
  103. ret = close(tls->sockfd);
  104. }
  105. esp_tls_internal_event_tracker_destroy(tls->error_handle);
  106. free(tls);
  107. return ret;
  108. }
  109. return -1; // invalid argument
  110. }
  111. esp_tls_t *esp_tls_init(void)
  112. {
  113. esp_tls_t *tls = (esp_tls_t *)calloc(1, sizeof(esp_tls_t));
  114. if (!tls) {
  115. return NULL;
  116. }
  117. tls->error_handle = esp_tls_internal_event_tracker_create();
  118. if (!tls->error_handle) {
  119. free(tls);
  120. return NULL;
  121. }
  122. _esp_tls_net_init(tls);
  123. tls->sockfd = -1;
  124. return tls;
  125. }
  126. static esp_err_t esp_tls_hostname_to_fd(const char *host, size_t hostlen, int port, struct sockaddr_storage *address, int* fd)
  127. {
  128. struct addrinfo *address_info;
  129. struct addrinfo hints;
  130. memset(&hints, 0, sizeof(hints));
  131. hints.ai_family = AF_UNSPEC;
  132. hints.ai_socktype = SOCK_STREAM;
  133. char *use_host = strndup(host, hostlen);
  134. if (!use_host) {
  135. return ESP_ERR_NO_MEM;
  136. }
  137. ESP_LOGD(TAG, "host:%s: strlen %lu", use_host, (unsigned long)hostlen);
  138. int res = getaddrinfo(use_host, NULL, &hints, &address_info);
  139. if (res != 0 || address_info == NULL) {
  140. ESP_LOGE(TAG, "couldn't get hostname for :%s: "
  141. "getaddrinfo() returns %d, addrinfo=%p", use_host, res, address_info);
  142. free(use_host);
  143. return ESP_ERR_ESP_TLS_CANNOT_RESOLVE_HOSTNAME;
  144. }
  145. free(use_host);
  146. *fd = socket(address_info->ai_family, address_info->ai_socktype, address_info->ai_protocol);
  147. if (*fd < 0) {
  148. ESP_LOGE(TAG, "Failed to create socket (family %d socktype %d protocol %d)", address_info->ai_family, address_info->ai_socktype, address_info->ai_protocol);
  149. freeaddrinfo(address_info);
  150. return ESP_ERR_ESP_TLS_CANNOT_CREATE_SOCKET;
  151. }
  152. if (address_info->ai_family == AF_INET) {
  153. struct sockaddr_in *p = (struct sockaddr_in *)address_info->ai_addr;
  154. p->sin_port = htons(port);
  155. ESP_LOGD(TAG, "[sock=%d] Resolved IPv4 address: %s", *fd, ipaddr_ntoa((const ip_addr_t*)&p->sin_addr.s_addr));
  156. memcpy(address, p, sizeof(struct sockaddr ));
  157. }
  158. #if CONFIG_LWIP_IPV6
  159. else if (address_info->ai_family == AF_INET6) {
  160. struct sockaddr_in6 *p = (struct sockaddr_in6 *)address_info->ai_addr;
  161. p->sin6_port = htons(port);
  162. p->sin6_family = AF_INET6;
  163. ESP_LOGD(TAG, "[sock=%d] Resolved IPv6 address: %s", *fd, ip6addr_ntoa((const ip6_addr_t*)&p->sin6_addr));
  164. memcpy(address, p, sizeof(struct sockaddr_in6 ));
  165. }
  166. #endif
  167. else {
  168. ESP_LOGE(TAG, "Unsupported protocol family %d", address_info->ai_family);
  169. close(*fd);
  170. freeaddrinfo(address_info);
  171. return ESP_ERR_ESP_TLS_UNSUPPORTED_PROTOCOL_FAMILY;
  172. }
  173. freeaddrinfo(address_info);
  174. return ESP_OK;
  175. }
  176. static void ms_to_timeval(int timeout_ms, struct timeval *tv)
  177. {
  178. tv->tv_sec = timeout_ms / 1000;
  179. tv->tv_usec = (timeout_ms % 1000) * 1000;
  180. }
  181. static esp_err_t esp_tls_set_socket_options(int fd, const esp_tls_cfg_t *cfg)
  182. {
  183. if (cfg) {
  184. if (cfg->timeout_ms >= 0) {
  185. struct timeval tv;
  186. ms_to_timeval(cfg->timeout_ms, &tv);
  187. if (setsockopt(fd, SOL_SOCKET, SO_RCVTIMEO, &tv, sizeof(tv)) != 0) {
  188. ESP_LOGE(TAG, "Fail to setsockopt SO_RCVTIMEO");
  189. return ESP_ERR_ESP_TLS_SOCKET_SETOPT_FAILED;
  190. }
  191. if (setsockopt(fd, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(tv)) != 0) {
  192. ESP_LOGE(TAG, "Fail to setsockopt SO_SNDTIMEO");
  193. return ESP_ERR_ESP_TLS_SOCKET_SETOPT_FAILED;
  194. }
  195. }
  196. if (cfg->keep_alive_cfg && cfg->keep_alive_cfg->keep_alive_enable) {
  197. int keep_alive_enable = 1;
  198. int keep_alive_idle = cfg->keep_alive_cfg->keep_alive_idle;
  199. int keep_alive_interval = cfg->keep_alive_cfg->keep_alive_interval;
  200. int keep_alive_count = cfg->keep_alive_cfg->keep_alive_count;
  201. ESP_LOGD(TAG, "Enable TCP keep alive. idle: %d, interval: %d, count: %d", keep_alive_idle, keep_alive_interval, keep_alive_count);
  202. if (setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &keep_alive_enable, sizeof(keep_alive_enable)) != 0) {
  203. ESP_LOGE(TAG, "Fail to setsockopt SO_KEEPALIVE");
  204. return ESP_ERR_ESP_TLS_SOCKET_SETOPT_FAILED;
  205. }
  206. if (setsockopt(fd, IPPROTO_TCP, TCP_KEEPIDLE, &keep_alive_idle, sizeof(keep_alive_idle)) != 0) {
  207. ESP_LOGE(TAG, "Fail to setsockopt TCP_KEEPIDLE");
  208. return ESP_ERR_ESP_TLS_SOCKET_SETOPT_FAILED;
  209. }
  210. if (setsockopt(fd, IPPROTO_TCP, TCP_KEEPINTVL, &keep_alive_interval, sizeof(keep_alive_interval)) != 0) {
  211. ESP_LOGE(TAG, "Fail to setsockopt TCP_KEEPINTVL");
  212. return ESP_ERR_ESP_TLS_SOCKET_SETOPT_FAILED;
  213. }
  214. if (setsockopt(fd, IPPROTO_TCP, TCP_KEEPCNT, &keep_alive_count, sizeof(keep_alive_count)) != 0) {
  215. ESP_LOGE(TAG, "Fail to setsockopt TCP_KEEPCNT");
  216. return ESP_ERR_ESP_TLS_SOCKET_SETOPT_FAILED;
  217. }
  218. }
  219. if (cfg->if_name) {
  220. if (cfg->if_name->ifr_name[0] != 0) {
  221. ESP_LOGD(TAG, "Bind [sock=%d] to interface %s", fd, cfg->if_name->ifr_name);
  222. if (setsockopt(fd, SOL_SOCKET, SO_BINDTODEVICE, cfg->if_name, sizeof(struct ifreq)) != 0) {
  223. ESP_LOGE(TAG, "Bind [sock=%d] to interface %s fail", fd, cfg->if_name->ifr_name);
  224. return ESP_ERR_ESP_TLS_SOCKET_SETOPT_FAILED;
  225. }
  226. }
  227. }
  228. }
  229. return ESP_OK;
  230. }
  231. static esp_err_t esp_tls_set_socket_non_blocking(int fd, bool non_blocking)
  232. {
  233. int flags;
  234. if ((flags = fcntl(fd, F_GETFL, NULL)) < 0) {
  235. ESP_LOGE(TAG, "[sock=%d] get file flags error: %s", fd, strerror(errno));
  236. return ESP_ERR_ESP_TLS_SOCKET_SETOPT_FAILED;
  237. }
  238. if (non_blocking) {
  239. flags |= O_NONBLOCK;
  240. } else {
  241. flags &= ~O_NONBLOCK;
  242. }
  243. if (fcntl(fd, F_SETFL, flags) < 0) {
  244. ESP_LOGE(TAG, "[sock=%d] set blocking/nonblocking error: %s", fd, strerror(errno));
  245. return ESP_ERR_ESP_TLS_SOCKET_SETOPT_FAILED;
  246. }
  247. return ESP_OK;
  248. }
  249. static inline esp_err_t tcp_connect(const char *host, int hostlen, int port, const esp_tls_cfg_t *cfg, esp_tls_error_handle_t error_handle, int *sockfd)
  250. {
  251. struct sockaddr_storage address;
  252. int fd;
  253. esp_err_t ret = esp_tls_hostname_to_fd(host, hostlen, port, &address, &fd);
  254. if (ret != ESP_OK) {
  255. ESP_INT_EVENT_TRACKER_CAPTURE(error_handle, ESP_TLS_ERR_TYPE_SYSTEM, errno);
  256. return ret;
  257. }
  258. // Set timeout options, keep-alive options and bind device options if configured
  259. ret = esp_tls_set_socket_options(fd, cfg);
  260. if (ret != ESP_OK) {
  261. goto err;
  262. }
  263. // Set to non block before connecting to better control connection timeout
  264. ret = esp_tls_set_socket_non_blocking(fd, true);
  265. if (ret != ESP_OK) {
  266. goto err;
  267. }
  268. ret = ESP_ERR_ESP_TLS_FAILED_CONNECT_TO_HOST;
  269. ESP_LOGD(TAG, "[sock=%d] Connecting to server. HOST: %s, Port: %d", fd, host, port);
  270. if (connect(fd, (struct sockaddr *)&address, sizeof(struct sockaddr)) < 0) {
  271. if (errno == EINPROGRESS) {
  272. fd_set fdset;
  273. struct timeval tv = { .tv_usec = 0, .tv_sec = 10 }; // Default connection timeout is 10 s
  274. if (cfg && cfg->non_block) {
  275. // Non-blocking mode -> just return successfully at this stage
  276. *sockfd = fd;
  277. return ESP_OK;
  278. }
  279. if ( cfg && cfg->timeout_ms > 0 ) {
  280. ms_to_timeval(cfg->timeout_ms, &tv);
  281. }
  282. FD_ZERO(&fdset);
  283. FD_SET(fd, &fdset);
  284. int res = select(fd+1, NULL, &fdset, NULL, &tv);
  285. if (res < 0) {
  286. ESP_LOGE(TAG, "[sock=%d] select() error: %s", fd, strerror(errno));
  287. ESP_INT_EVENT_TRACKER_CAPTURE(error_handle, ESP_TLS_ERR_TYPE_SYSTEM, errno);
  288. goto err;
  289. }
  290. else if (res == 0) {
  291. ESP_LOGE(TAG, "[sock=%d] select() timeout", fd);
  292. ret = ESP_ERR_ESP_TLS_CONNECTION_TIMEOUT;
  293. goto err;
  294. } else {
  295. int sockerr;
  296. socklen_t len = (socklen_t)sizeof(int);
  297. if (getsockopt(fd, SOL_SOCKET, SO_ERROR, (void*)(&sockerr), &len) < 0) {
  298. ESP_LOGE(TAG, "[sock=%d] getsockopt() error: %s", fd, strerror(errno));
  299. ret = ESP_ERR_ESP_TLS_SOCKET_SETOPT_FAILED;
  300. goto err;
  301. }
  302. else if (sockerr) {
  303. ESP_INT_EVENT_TRACKER_CAPTURE(error_handle, ESP_TLS_ERR_TYPE_SYSTEM, sockerr);
  304. ESP_LOGE(TAG, "[sock=%d] delayed connect error: %s", fd, strerror(sockerr));
  305. goto err;
  306. }
  307. }
  308. } else {
  309. ESP_LOGE(TAG, "[sock=%d] connect() error: %s", fd, strerror(errno));
  310. goto err;
  311. }
  312. }
  313. if (cfg && cfg->non_block == false) {
  314. // reset back to blocking mode (unless non_block configured)
  315. ret = esp_tls_set_socket_non_blocking(fd, false);
  316. if (ret != ESP_OK) {
  317. goto err;
  318. }
  319. }
  320. *sockfd = fd;
  321. return ESP_OK;
  322. err:
  323. close(fd);
  324. return ret;
  325. }
  326. static int esp_tls_low_level_conn(const char *hostname, int hostlen, int port, const esp_tls_cfg_t *cfg, esp_tls_t *tls)
  327. {
  328. if (!tls) {
  329. ESP_LOGE(TAG, "empty esp_tls parameter");
  330. return -1;
  331. }
  332. esp_err_t esp_ret;
  333. /* These states are used to keep a tab on connection progress in case of non-blocking connect,
  334. and in case of blocking connect these cases will get executed one after the other */
  335. switch (tls->conn_state) {
  336. case ESP_TLS_INIT:
  337. tls->sockfd = -1;
  338. if (cfg != NULL && cfg->is_plain_tcp == false) {
  339. _esp_tls_net_init(tls);
  340. tls->is_tls = true;
  341. }
  342. if ((esp_ret = tcp_connect(hostname, hostlen, port, cfg, tls->error_handle, &tls->sockfd)) != ESP_OK) {
  343. ESP_INT_EVENT_TRACKER_CAPTURE(tls->error_handle, ESP_TLS_ERR_TYPE_ESP, esp_ret);
  344. return -1;
  345. }
  346. if (tls->is_tls == false) {
  347. tls->read = tcp_read;
  348. tls->write = tcp_write;
  349. ESP_LOGD(TAG, "non-tls connection established");
  350. return 1;
  351. }
  352. if (cfg && cfg->non_block) {
  353. FD_ZERO(&tls->rset);
  354. FD_SET(tls->sockfd, &tls->rset);
  355. tls->wset = tls->rset;
  356. }
  357. tls->conn_state = ESP_TLS_CONNECTING;
  358. /* falls through */
  359. case ESP_TLS_CONNECTING:
  360. if (cfg && cfg->non_block) {
  361. ESP_LOGD(TAG, "connecting...");
  362. struct timeval tv;
  363. ms_to_timeval(cfg->timeout_ms, &tv);
  364. /* In case of non-blocking I/O, we use the select() API to check whether
  365. connection has been established or not*/
  366. if (select(tls->sockfd + 1, &tls->rset, &tls->wset, NULL,
  367. cfg->timeout_ms>0 ? &tv : NULL) == 0) {
  368. ESP_LOGD(TAG, "select() timed out");
  369. return 0;
  370. }
  371. if (FD_ISSET(tls->sockfd, &tls->rset) || FD_ISSET(tls->sockfd, &tls->wset)) {
  372. int error;
  373. socklen_t len = sizeof(error);
  374. /* pending error check */
  375. if (getsockopt(tls->sockfd, SOL_SOCKET, SO_ERROR, &error, &len) < 0) {
  376. ESP_LOGD(TAG, "Non blocking connect failed");
  377. ESP_INT_EVENT_TRACKER_CAPTURE(tls->error_handle, ESP_TLS_ERR_TYPE_SYSTEM, errno);
  378. ESP_INT_EVENT_TRACKER_CAPTURE(tls->error_handle, ESP_TLS_ERR_TYPE_ESP, ESP_ERR_ESP_TLS_SOCKET_SETOPT_FAILED);
  379. tls->conn_state = ESP_TLS_FAIL;
  380. return -1;
  381. }
  382. }
  383. }
  384. /* By now, the connection has been established */
  385. esp_ret = create_ssl_handle(hostname, hostlen, cfg, tls);
  386. if (esp_ret != ESP_OK) {
  387. ESP_LOGE(TAG, "create_ssl_handle failed");
  388. ESP_INT_EVENT_TRACKER_CAPTURE(tls->error_handle, ESP_TLS_ERR_TYPE_ESP, esp_ret);
  389. tls->conn_state = ESP_TLS_FAIL;
  390. return -1;
  391. }
  392. tls->read = _esp_tls_read;
  393. tls->write = _esp_tls_write;
  394. tls->conn_state = ESP_TLS_HANDSHAKE;
  395. /* falls through */
  396. case ESP_TLS_HANDSHAKE:
  397. ESP_LOGD(TAG, "handshake in progress...");
  398. return esp_tls_handshake(tls, cfg);
  399. break;
  400. case ESP_TLS_FAIL:
  401. ESP_LOGE(TAG, "failed to open a new connection");;
  402. break;
  403. default:
  404. ESP_LOGE(TAG, "invalid esp-tls state");
  405. break;
  406. }
  407. return -1;
  408. }
  409. /**
  410. * @brief Create a new plain TCP connection
  411. */
  412. esp_err_t esp_tls_plain_tcp_connect(const char *host, int hostlen, int port, const esp_tls_cfg_t *cfg, esp_tls_error_handle_t error_handle, int *sockfd)
  413. {
  414. if (sockfd == NULL || error_handle == NULL) {
  415. return ESP_ERR_INVALID_ARG;
  416. }
  417. return tcp_connect(host, hostlen, port, cfg, error_handle, sockfd);
  418. }
  419. int esp_tls_conn_new_sync(const char *hostname, int hostlen, int port, const esp_tls_cfg_t *cfg, esp_tls_t *tls)
  420. {
  421. size_t start = xTaskGetTickCount();
  422. while (1) {
  423. int ret = esp_tls_low_level_conn(hostname, hostlen, port, cfg, tls);
  424. if (ret == 1) {
  425. return ret;
  426. } else if (ret == -1) {
  427. ESP_LOGE(TAG, "Failed to open new connection");
  428. return -1;
  429. } else if (ret == 0 && cfg->timeout_ms >= 0) {
  430. size_t timeout_ticks = pdMS_TO_TICKS(cfg->timeout_ms);
  431. uint32_t expired = xTaskGetTickCount() - start;
  432. if (expired >= timeout_ticks) {
  433. ESP_LOGW(TAG, "Failed to open new connection in specified timeout");
  434. ESP_INT_EVENT_TRACKER_CAPTURE(tls->error_handle, ESP_TLS_ERR_TYPE_ESP, ESP_ERR_ESP_TLS_CONNECTION_TIMEOUT);
  435. return 0;
  436. }
  437. }
  438. }
  439. return 0;
  440. }
  441. /*
  442. * @brief Create a new TLS/SSL non-blocking connection
  443. */
  444. int esp_tls_conn_new_async(const char *hostname, int hostlen, int port, const esp_tls_cfg_t *cfg, esp_tls_t *tls)
  445. {
  446. return esp_tls_low_level_conn(hostname, hostlen, port, cfg, tls);
  447. }
  448. static int get_port(const char *url, struct http_parser_url *u)
  449. {
  450. if (u->field_data[UF_PORT].len) {
  451. return strtol(&url[u->field_data[UF_PORT].off], NULL, 10);
  452. } else {
  453. if (strncasecmp(&url[u->field_data[UF_SCHEMA].off], "http", u->field_data[UF_SCHEMA].len) == 0) {
  454. return 80;
  455. } else if (strncasecmp(&url[u->field_data[UF_SCHEMA].off], "https", u->field_data[UF_SCHEMA].len) == 0) {
  456. return 443;
  457. }
  458. }
  459. return 0;
  460. }
  461. esp_tls_t *esp_tls_conn_http_new(const char *url, const esp_tls_cfg_t *cfg)
  462. {
  463. /* Parse URI */
  464. struct http_parser_url u;
  465. http_parser_url_init(&u);
  466. http_parser_parse_url(url, strlen(url), 0, &u);
  467. esp_tls_t *tls = esp_tls_init();
  468. if (!tls) {
  469. return NULL;
  470. }
  471. /* Connect to host */
  472. if (esp_tls_conn_new_sync(&url[u.field_data[UF_HOST].off], u.field_data[UF_HOST].len,
  473. get_port(url, &u), cfg, tls) == 1) {
  474. return tls;
  475. }
  476. esp_tls_conn_destroy(tls);
  477. return NULL;
  478. }
  479. /**
  480. * @brief Create a new TLS/SSL connection with a given "HTTP" url
  481. */
  482. int esp_tls_conn_http_new_sync(const char *url, const esp_tls_cfg_t *cfg, esp_tls_t *tls)
  483. {
  484. /* Parse URI */
  485. struct http_parser_url u;
  486. http_parser_url_init(&u);
  487. http_parser_parse_url(url, strlen(url), 0, &u);
  488. /* Connect to host */
  489. return esp_tls_conn_new_sync(&url[u.field_data[UF_HOST].off], u.field_data[UF_HOST].len,
  490. get_port(url, &u), cfg, tls);
  491. }
  492. /**
  493. * @brief Create a new non-blocking TLS/SSL connection with a given "HTTP" url
  494. */
  495. int esp_tls_conn_http_new_async(const char *url, const esp_tls_cfg_t *cfg, esp_tls_t *tls)
  496. {
  497. /* Parse URI */
  498. struct http_parser_url u;
  499. http_parser_url_init(&u);
  500. http_parser_parse_url(url, strlen(url), 0, &u);
  501. /* Connect to host */
  502. return esp_tls_conn_new_async(&url[u.field_data[UF_HOST].off], u.field_data[UF_HOST].len,
  503. get_port(url, &u), cfg, tls);
  504. }
  505. #ifdef CONFIG_ESP_TLS_USING_MBEDTLS
  506. mbedtls_x509_crt *esp_tls_get_global_ca_store(void)
  507. {
  508. return _esp_tls_get_global_ca_store();
  509. }
  510. #endif /* CONFIG_ESP_TLS_USING_MBEDTLS */
  511. #ifdef CONFIG_ESP_TLS_CLIENT_SESSION_TICKETS
  512. esp_tls_client_session_t *esp_tls_get_client_session(esp_tls_t *tls)
  513. {
  514. return _esp_tls_get_client_session(tls);
  515. }
  516. void esp_tls_free_client_session(esp_tls_client_session_t *client_session)
  517. {
  518. _esp_tls_free_client_session(client_session);
  519. }
  520. #endif /* CONFIG_ESP_TLS_CLIENT_SESSION_TICKETS */
  521. #ifdef CONFIG_ESP_TLS_SERVER
  522. esp_err_t esp_tls_cfg_server_session_tickets_init(esp_tls_cfg_server_t *cfg)
  523. {
  524. #if defined(CONFIG_ESP_TLS_SERVER_SESSION_TICKETS)
  525. if (!cfg || cfg->ticket_ctx) {
  526. return ESP_ERR_INVALID_ARG;
  527. }
  528. cfg->ticket_ctx = calloc(1, sizeof(esp_tls_server_session_ticket_ctx_t));
  529. if (!cfg->ticket_ctx) {
  530. return ESP_ERR_NO_MEM;
  531. }
  532. esp_err_t ret = _esp_tls_server_session_ticket_ctx_init(cfg->ticket_ctx);
  533. if (ret != ESP_OK) {
  534. free(cfg->ticket_ctx);
  535. }
  536. return ret;
  537. #else
  538. return ESP_ERR_NOT_SUPPORTED;
  539. #endif
  540. }
  541. void esp_tls_cfg_server_session_tickets_free(esp_tls_cfg_server_t *cfg)
  542. {
  543. #if defined(CONFIG_ESP_TLS_SERVER_SESSION_TICKETS)
  544. if (cfg && cfg->ticket_ctx) {
  545. _esp_tls_server_session_ticket_ctx_free(cfg->ticket_ctx);
  546. }
  547. #endif
  548. }
  549. /**
  550. * @brief Create a server side TLS/SSL connection
  551. */
  552. int esp_tls_server_session_create(esp_tls_cfg_server_t *cfg, int sockfd, esp_tls_t *tls)
  553. {
  554. return _esp_tls_server_session_create(cfg, sockfd, tls);
  555. }
  556. /**
  557. * @brief Close the server side TLS/SSL connection and free any allocated resources.
  558. */
  559. void esp_tls_server_session_delete(esp_tls_t *tls)
  560. {
  561. return _esp_tls_server_session_delete(tls);
  562. }
  563. #endif /* CONFIG_ESP_TLS_SERVER */
  564. ssize_t esp_tls_get_bytes_avail(esp_tls_t *tls)
  565. {
  566. return _esp_tls_get_bytes_avail(tls);
  567. }
  568. void *esp_tls_get_ssl_context(esp_tls_t *tls)
  569. {
  570. return _esp_tls_get_ssl_context(tls);
  571. }
  572. esp_err_t esp_tls_get_conn_sockfd(esp_tls_t *tls, int *sockfd)
  573. {
  574. if (!tls || !sockfd) {
  575. ESP_LOGE(TAG, "Invalid arguments passed");
  576. return ESP_ERR_INVALID_ARG;
  577. }
  578. *sockfd = tls->sockfd;
  579. return ESP_OK;
  580. }
  581. esp_err_t esp_tls_get_and_clear_last_error(esp_tls_error_handle_t h, int *esp_tls_code, int *esp_tls_flags)
  582. {
  583. if (!h) {
  584. return ESP_ERR_INVALID_STATE;
  585. }
  586. esp_err_t last_err = h->last_error;
  587. if (esp_tls_code) {
  588. *esp_tls_code = h->esp_tls_error_code;
  589. }
  590. if (esp_tls_flags) {
  591. *esp_tls_flags = h->esp_tls_flags;
  592. }
  593. memset(h, 0, sizeof(esp_tls_last_error_t));
  594. return last_err;
  595. }
  596. esp_err_t esp_tls_get_error_handle(esp_tls_t *tls, esp_tls_error_handle_t *error_handle)
  597. {
  598. if (!tls || !error_handle) {
  599. return ESP_ERR_INVALID_ARG;
  600. }
  601. *error_handle = tls->error_handle;
  602. return ESP_OK;
  603. }
  604. esp_err_t esp_tls_init_global_ca_store(void)
  605. {
  606. return _esp_tls_init_global_ca_store();
  607. }
  608. esp_err_t esp_tls_set_global_ca_store(const unsigned char *cacert_pem_buf, const unsigned int cacert_pem_bytes)
  609. {
  610. return _esp_tls_set_global_ca_store(cacert_pem_buf, cacert_pem_bytes);
  611. }
  612. void esp_tls_free_global_ca_store(void)
  613. {
  614. return _esp_tls_free_global_ca_store();
  615. }