2022-09-05 23:24:04 -04:00
|
|
|
/*
|
2023-07-27 06:10:03 -04:00
|
|
|
* SPDX-FileCopyrightText: 2015-2023 Espressif Systems (Shanghai) CO LTD
|
2022-09-05 23:24:04 -04:00
|
|
|
*
|
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
|
|
*/
|
2017-11-13 22:16:20 -05:00
|
|
|
|
2018-09-26 05:56:47 -04:00
|
|
|
#ifndef _ESP_TRANSPORT_SSL_H_
|
|
|
|
#define _ESP_TRANSPORT_SSL_H_
|
2017-11-13 22:16:20 -05:00
|
|
|
|
2018-09-25 04:34:04 -04:00
|
|
|
#include "esp_transport.h"
|
2019-05-23 15:48:08 -04:00
|
|
|
#include "esp_tls.h"
|
2017-11-13 22:16:20 -05:00
|
|
|
|
|
|
|
#ifdef __cplusplus
|
|
|
|
extern "C" {
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2018-09-26 05:56:47 -04:00
|
|
|
* @brief Create new SSL transport, the transport handle must be release esp_transport_destroy callback
|
2017-11-13 22:16:20 -05:00
|
|
|
*
|
2018-09-26 05:56:47 -04:00
|
|
|
* @return the allocated esp_transport_handle_t, or NULL if the handle can not be allocated
|
2017-11-13 22:16:20 -05:00
|
|
|
*/
|
2019-07-16 05:33:30 -04:00
|
|
|
esp_transport_handle_t esp_transport_ssl_init(void);
|
2017-11-13 22:16:20 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Set SSL certificate data (as PEM format).
|
|
|
|
* Note that, this function stores the pointer to data, rather than making a copy.
|
2018-10-11 11:34:09 -04:00
|
|
|
* So this data must remain valid until after the connection is cleaned up
|
2017-11-13 22:16:20 -05:00
|
|
|
*
|
|
|
|
* @param t ssl transport
|
|
|
|
* @param[in] data The pem data
|
|
|
|
* @param[in] len The length
|
|
|
|
*/
|
2018-09-26 05:56:47 -04:00
|
|
|
void esp_transport_ssl_set_cert_data(esp_transport_handle_t t, const char *data, int len);
|
2019-02-20 02:18:45 -05:00
|
|
|
|
2019-07-15 11:53:39 -04:00
|
|
|
/**
|
|
|
|
* @brief Set SSL certificate data (as DER format).
|
|
|
|
* Note that, this function stores the pointer to data, rather than making a copy.
|
|
|
|
* So this data must remain valid until after the connection is cleaned up
|
|
|
|
*
|
|
|
|
* @param t ssl transport
|
|
|
|
* @param[in] data The der data
|
|
|
|
* @param[in] len The length
|
|
|
|
*/
|
|
|
|
void esp_transport_ssl_set_cert_data_der(esp_transport_handle_t t, const char *data, int len);
|
|
|
|
|
2021-04-04 03:40:34 -04:00
|
|
|
/**
|
|
|
|
* @brief Enable the use of certification bundle for server verfication for
|
|
|
|
* an SSL connection.
|
|
|
|
* It must be first enabled in menuconfig.
|
|
|
|
*
|
|
|
|
* @param t ssl transport
|
|
|
|
* @param[in] crt_bundle_attach Function pointer to esp_crt_bundle_attach
|
|
|
|
*/
|
|
|
|
void esp_transport_ssl_crt_bundle_attach(esp_transport_handle_t t, esp_err_t ((*crt_bundle_attach)(void *conf)));
|
|
|
|
|
2019-02-20 02:18:45 -05:00
|
|
|
/**
|
|
|
|
* @brief Enable global CA store for SSL connection
|
|
|
|
*
|
|
|
|
* @param t ssl transport
|
|
|
|
*/
|
|
|
|
void esp_transport_ssl_enable_global_ca_store(esp_transport_handle_t t);
|
2017-11-13 22:16:20 -05:00
|
|
|
|
2018-09-28 12:45:37 -04:00
|
|
|
/**
|
|
|
|
* @brief Set SSL client certificate data for mutual authentication (as PEM format).
|
|
|
|
* Note that, this function stores the pointer to data, rather than making a copy.
|
2018-10-11 11:34:09 -04:00
|
|
|
* So this data must remain valid until after the connection is cleaned up
|
2018-09-28 12:45:37 -04:00
|
|
|
*
|
|
|
|
* @param t ssl transport
|
|
|
|
* @param[in] data The pem data
|
|
|
|
* @param[in] len The length
|
|
|
|
*/
|
|
|
|
void esp_transport_ssl_set_client_cert_data(esp_transport_handle_t t, const char *data, int len);
|
|
|
|
|
2023-07-27 06:10:03 -04:00
|
|
|
#ifdef CONFIG_MBEDTLS_HARDWARE_ECDSA_SIGN
|
|
|
|
/**
|
|
|
|
* @brief Set SSL client key data for mutual authentication when using ECDSA peripheral.
|
|
|
|
*
|
|
|
|
* @param t ssl transport
|
|
|
|
* @param[in] efuse_blk Efuse block where ECDSA private key is stored
|
|
|
|
*/
|
|
|
|
void esp_transport_ssl_set_client_key_ecdsa_peripheral(esp_transport_handle_t t, uint8_t ecdsa_efuse_blk);
|
|
|
|
#endif
|
|
|
|
|
2019-07-15 11:53:39 -04:00
|
|
|
/**
|
|
|
|
* @brief Set SSL client certificate data for mutual authentication (as DER format).
|
|
|
|
* Note that, this function stores the pointer to data, rather than making a copy.
|
|
|
|
* So this data must remain valid until after the connection is cleaned up
|
|
|
|
*
|
|
|
|
* @param t ssl transport
|
|
|
|
* @param[in] data The der data
|
|
|
|
* @param[in] len The length
|
|
|
|
*/
|
|
|
|
void esp_transport_ssl_set_client_cert_data_der(esp_transport_handle_t t, const char *data, int len);
|
|
|
|
|
2018-09-28 12:45:37 -04:00
|
|
|
/**
|
|
|
|
* @brief Set SSL client key data for mutual authentication (as PEM format).
|
|
|
|
* Note that, this function stores the pointer to data, rather than making a copy.
|
2018-10-11 11:34:09 -04:00
|
|
|
* So this data must remain valid until after the connection is cleaned up
|
2018-09-28 12:45:37 -04:00
|
|
|
*
|
|
|
|
* @param t ssl transport
|
|
|
|
* @param[in] data The pem data
|
|
|
|
* @param[in] len The length
|
|
|
|
*/
|
|
|
|
void esp_transport_ssl_set_client_key_data(esp_transport_handle_t t, const char *data, int len);
|
2017-11-13 22:16:20 -05:00
|
|
|
|
2019-12-30 02:40:50 -05:00
|
|
|
/**
|
|
|
|
* @brief Set SSL client key password if the key is password protected. The configured
|
|
|
|
* password is passed to the underlying TLS stack to decrypt the client key
|
|
|
|
*
|
|
|
|
* @param t ssl transport
|
|
|
|
* @param[in] password Pointer to the password
|
|
|
|
* @param[in] password_len Password length
|
|
|
|
*/
|
|
|
|
void esp_transport_ssl_set_client_key_password(esp_transport_handle_t t, const char *password, int password_len);
|
|
|
|
|
2019-07-15 11:53:39 -04:00
|
|
|
/**
|
|
|
|
* @brief Set SSL client key data for mutual authentication (as DER format).
|
|
|
|
* Note that, this function stores the pointer to data, rather than making a copy.
|
|
|
|
* So this data must remain valid until after the connection is cleaned up
|
|
|
|
*
|
|
|
|
* @param t ssl transport
|
|
|
|
* @param[in] data The der data
|
|
|
|
* @param[in] len The length
|
|
|
|
*/
|
|
|
|
void esp_transport_ssl_set_client_key_data_der(esp_transport_handle_t t, const char *data, int len);
|
|
|
|
|
2019-11-12 21:36:24 -05:00
|
|
|
/**
|
|
|
|
* @brief Set the list of supported application protocols to be used with ALPN.
|
|
|
|
* Note that, this function stores the pointer to data, rather than making a copy.
|
|
|
|
* So this data must remain valid until after the connection is cleaned up
|
|
|
|
*
|
|
|
|
* @param t ssl transport
|
|
|
|
* @param[in] alpn_porot The list of ALPN protocols, the last entry must be NULL
|
|
|
|
*/
|
|
|
|
void esp_transport_ssl_set_alpn_protocol(esp_transport_handle_t t, const char **alpn_protos);
|
|
|
|
|
2019-06-12 04:41:00 -04:00
|
|
|
/**
|
|
|
|
* @brief Skip validation of certificate's common name field
|
|
|
|
*
|
|
|
|
* @note Skipping CN validation is not recommended
|
|
|
|
*
|
|
|
|
* @param t ssl transport
|
|
|
|
*/
|
|
|
|
void esp_transport_ssl_skip_common_name_check(esp_transport_handle_t t);
|
|
|
|
|
2022-09-05 23:24:04 -04:00
|
|
|
/**
|
|
|
|
* @brief Set the server certificate's common name field
|
|
|
|
*
|
|
|
|
* @note
|
|
|
|
* If non-NULL, server certificate CN must match this name,
|
|
|
|
* If NULL, server certificate CN must match hostname.
|
|
|
|
* @param t ssl transport
|
|
|
|
* common_name A string containing the common name to be set
|
|
|
|
*/
|
|
|
|
void esp_transport_ssl_set_common_name(esp_transport_handle_t t, const char *common_name);
|
|
|
|
|
2020-04-06 10:42:52 -04:00
|
|
|
/**
|
|
|
|
* @brief Set the ssl context to use secure element (atecc608a) for client(device) private key and certificate
|
|
|
|
*
|
|
|
|
* @note Recommended to be used with ESP32-WROOM-32SE (which has inbuilt ATECC608A a.k.a Secure Element)
|
|
|
|
*
|
|
|
|
* @param t ssl transport
|
|
|
|
*/
|
|
|
|
void esp_transport_ssl_use_secure_element(esp_transport_handle_t t);
|
|
|
|
|
2020-07-31 04:27:25 -04:00
|
|
|
/**
|
|
|
|
* @brief Set the ds_data handle in ssl context.(used for the digital signature operation)
|
|
|
|
*
|
|
|
|
* @param t ssl transport
|
|
|
|
* ds_data the handle for ds data params
|
|
|
|
*/
|
|
|
|
void esp_transport_ssl_set_ds_data(esp_transport_handle_t t, void *ds_data);
|
|
|
|
|
2019-05-23 15:48:08 -04:00
|
|
|
/**
|
|
|
|
* @brief Set PSK key and hint for PSK server/client verification in esp-tls component.
|
|
|
|
* Important notes:
|
|
|
|
* - This function stores the pointer to data, rather than making a copy.
|
|
|
|
* So this data must remain valid until after the connection is cleaned up
|
|
|
|
* - ESP_TLS_PSK_VERIFICATION config option must be enabled in menuconfig
|
|
|
|
* - certificate verification takes priority so it must not be configured
|
|
|
|
* to enable PSK method.
|
|
|
|
*
|
|
|
|
* @param t ssl transport
|
|
|
|
* @param[in] psk_hint_key psk key and hint structure defined in esp_tls.h
|
|
|
|
*/
|
|
|
|
void esp_transport_ssl_set_psk_key_hint(esp_transport_handle_t t, const psk_hint_key_t* psk_hint_key);
|
|
|
|
|
2021-01-06 03:58:39 -05:00
|
|
|
/**
|
|
|
|
* @brief Set keep-alive status in current ssl context
|
|
|
|
*
|
|
|
|
* @param[in] t ssl transport
|
|
|
|
* @param[in] keep_alive_cfg The handle for keep-alive configuration
|
|
|
|
*/
|
|
|
|
void esp_transport_ssl_set_keep_alive(esp_transport_handle_t t, esp_transport_keep_alive_t *keep_alive_cfg);
|
|
|
|
|
2021-01-19 04:49:42 -05:00
|
|
|
/**
|
|
|
|
* @brief Set name of interface that socket can be binded on
|
|
|
|
* So the data can transport on this interface
|
|
|
|
*
|
|
|
|
* @param[in] t The transport handle
|
|
|
|
* @param[in] if_name The interface name
|
|
|
|
*/
|
|
|
|
void esp_transport_ssl_set_interface_name(esp_transport_handle_t t, struct ifreq *if_name);
|
|
|
|
|
2017-11-13 22:16:20 -05:00
|
|
|
#ifdef __cplusplus
|
|
|
|
}
|
|
|
|
#endif
|
2018-09-26 05:56:47 -04:00
|
|
|
#endif /* _ESP_TRANSPORT_SSL_H_ */
|