mirror of
https://github.com/espressif/esp-protocols.git
synced 2025-07-18 04:52:18 +02:00
feat(tls_cxx): Publish mbedtls component
Adds examples and tests. Also supports DTLS now.
This commit is contained in:
@ -0,0 +1,8 @@
|
||||
# For more information about build system see
|
||||
# https://docs.espressif.com/projects/esp-idf/en/latest/api-guides/build-system.html
|
||||
# The following five lines of boilerplate have to be in your project's
|
||||
# CMakeLists in this exact order for cmake to work correctly
|
||||
cmake_minimum_required(VERSION 3.16)
|
||||
|
||||
include($ENV{IDF_PATH}/tools/cmake/project.cmake)
|
||||
project(uart_mutual)
|
17
components/mbedtls_cxx/tests/uart_mutual_auth/README.md
Normal file
17
components/mbedtls_cxx/tests/uart_mutual_auth/README.md
Normal file
@ -0,0 +1,17 @@
|
||||
# UART mutual authentication test
|
||||
|
||||
This test creates a (D)TLS server and a client on one device and checks if they can perform a TLS handshake and exchange a message.
|
||||
The test uses UART as the physical layer of communication channel and, since it runs on a single ESP32, it expects two UART ports interconnected as per below:
|
||||
|
||||
```
|
||||
+------------------------+
|
||||
| ESP32 |
|
||||
| |
|
||||
| UART-1 UART-2 |
|
||||
+---25---26------4---5---+
|
||||
| | | |
|
||||
| +-------+ |
|
||||
+----------------+
|
||||
```
|
||||
|
||||
The test runs in two configurations: TLS and DTLS.
|
@ -0,0 +1,2 @@
|
||||
idf_component_register(SRCS "uart_mutual.cpp"
|
||||
INCLUDE_DIRS ".")
|
@ -0,0 +1,19 @@
|
||||
menu "Test Configuration"
|
||||
|
||||
choice TEST_CONNECTION_METHOD
|
||||
prompt "Choose connection method"
|
||||
default TEST_TLS
|
||||
help
|
||||
Select type of connection. Either TLS or DTLS
|
||||
|
||||
config TEST_TLS
|
||||
bool "TLS"
|
||||
help
|
||||
Use TLS method.
|
||||
config TEST_DTLS
|
||||
bool "DTLS"
|
||||
help
|
||||
Use DTLS method.
|
||||
endchoice # TEST_CONNECTION_METHOD
|
||||
|
||||
endmenu
|
@ -0,0 +1,8 @@
|
||||
dependencies:
|
||||
idf: ">=5.0"
|
||||
espressif/mbedtls_cxx:
|
||||
version: "*"
|
||||
override_path: "../../.."
|
||||
test_certs:
|
||||
version: "*"
|
||||
path: "../../../examples/test_certs"
|
@ -0,0 +1,282 @@
|
||||
/*
|
||||
* SPDX-FileCopyrightText: 2024 Espressif Systems (Shanghai) CO LTD
|
||||
*
|
||||
* SPDX-License-Identifier: Unlicense OR CC0-1.0
|
||||
*/
|
||||
#include <thread>
|
||||
#include <sys/socket.h>
|
||||
#include <unistd.h>
|
||||
#include <esp_check.h>
|
||||
#include "esp_log.h"
|
||||
#include "mbedtls_wrap.hpp"
|
||||
#include "driver/uart.h"
|
||||
#include "esp_event.h"
|
||||
#include "esp_netif.h"
|
||||
#include "test_certs.hpp"
|
||||
|
||||
namespace {
|
||||
constexpr auto *TAG = "uart_mutual_tls";
|
||||
|
||||
/**
|
||||
* Using DTLS the below is set to true.
|
||||
* In that case, we need to receive the entire datagram, not a fragment
|
||||
* This defines a very simple datagram protocol over UART:
|
||||
* | HEADER (2bytes) | PAYLOAD ... |
|
||||
* | dgram_len | dgram_payload |
|
||||
*
|
||||
* If `use_dgrams` is set to false, we perform TLS on UART stream.
|
||||
* The UART driver is already a stream-like API (using ringbufer), so we simple read and write to UART
|
||||
*/
|
||||
#if CONFIG_TEST_TLS
|
||||
const bool use_dgrams = false;
|
||||
#elif CONFIG_TEST_DTLS
|
||||
const bool use_dgrams = true;
|
||||
#endif
|
||||
}
|
||||
|
||||
using namespace idf::mbedtls_cxx;
|
||||
using namespace test_certs;
|
||||
|
||||
class SecureLink: public Tls {
|
||||
public:
|
||||
explicit SecureLink(uart_port_t port, int tx, int rx) : Tls(), uart(port, tx, rx) {}
|
||||
~SecureLink() = default;
|
||||
int send(const unsigned char *buf, size_t len) override
|
||||
{
|
||||
if (use_dgrams) {
|
||||
// sends a separate dgram header
|
||||
uint16_t header = len;
|
||||
uart_write_bytes(uart.port_, &header, 2);
|
||||
}
|
||||
return uart_write_bytes(uart.port_, buf, len);
|
||||
}
|
||||
|
||||
int recv(unsigned char *buf, size_t len) override
|
||||
{
|
||||
// stream read
|
||||
return uart.recv(buf, len, 0);
|
||||
}
|
||||
|
||||
int recv_timeout(unsigned char *buf, size_t len, int timeout) override
|
||||
{
|
||||
// dgram read
|
||||
return uart.recv_dgram(buf, len, timeout);
|
||||
}
|
||||
|
||||
bool listen() // open as server
|
||||
{
|
||||
return open(true);
|
||||
}
|
||||
|
||||
bool connect() // open as client
|
||||
{
|
||||
return open(false);
|
||||
}
|
||||
|
||||
private:
|
||||
bool open(bool server_not_client)
|
||||
{
|
||||
if (uart.init() != ESP_OK) {
|
||||
return false;
|
||||
}
|
||||
while (!uart.debounce(server_not_client)) {
|
||||
printf("debouncing...\n");
|
||||
usleep(10000);
|
||||
}
|
||||
TlsConfig config{};
|
||||
config.is_dtls = use_dgrams;
|
||||
config.timeout = 10000;
|
||||
if (server_not_client) {
|
||||
const unsigned char client_id[] = "Client1";
|
||||
config.client_id = std::make_pair(client_id, sizeof(client_id));
|
||||
}
|
||||
if (!init(is_server{server_not_client}, do_verify{true}, &config)) {
|
||||
return false;
|
||||
}
|
||||
|
||||
return handshake() == 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* RAII wrapper of UART
|
||||
*/
|
||||
struct uart_info {
|
||||
uart_port_t port_;
|
||||
QueueHandle_t queue_{};
|
||||
int tx_, rx_;
|
||||
|
||||
// used for datagrams
|
||||
bool header_{true};
|
||||
int in_payload_{0};
|
||||
int payload_len_{0};
|
||||
uint8_t payload_[1600] {};
|
||||
|
||||
explicit uart_info(uart_port_t port, int tx, int rx): port_(port), tx_(tx), rx_(rx)
|
||||
{
|
||||
}
|
||||
esp_err_t init()
|
||||
{
|
||||
uart_config_t uart_config = {};
|
||||
uart_config.baud_rate = 115200;
|
||||
uart_config.data_bits = UART_DATA_8_BITS;
|
||||
uart_config.parity = UART_PARITY_DISABLE;
|
||||
uart_config.stop_bits = UART_STOP_BITS_1;
|
||||
uart_config.flow_ctrl = UART_HW_FLOWCTRL_DISABLE;
|
||||
uart_config.source_clk = UART_SCLK_DEFAULT;
|
||||
ESP_RETURN_ON_ERROR(uart_driver_install(port_, 1024, 0, 1, &queue_, 0), TAG, "Failed to install UART");
|
||||
ESP_RETURN_ON_ERROR(uart_param_config(port_, &uart_config), TAG, "Failed to set params");
|
||||
ESP_RETURN_ON_ERROR(uart_set_pin(port_, tx_, rx_, UART_PIN_NO_CHANGE, UART_PIN_NO_CHANGE), TAG, "Failed to set UART pins");
|
||||
ESP_RETURN_ON_ERROR(uart_set_rx_timeout(port_, 10), TAG, "Failed to set UART Rx timeout");
|
||||
return ESP_OK;
|
||||
}
|
||||
~uart_info()
|
||||
{
|
||||
uart_driver_delete(port_);
|
||||
}
|
||||
bool debounce(bool server)
|
||||
{
|
||||
uint8_t data = 0;
|
||||
if (server) {
|
||||
while (uart_read_bytes(port_, &data, 1, 0) != 0) {
|
||||
if (data == 0x55) {
|
||||
uart_write_bytes(port_, &data, 1);
|
||||
return true;
|
||||
}
|
||||
}
|
||||
return false;
|
||||
}
|
||||
data = 0x55;
|
||||
uart_write_bytes(port_, &data, 1);
|
||||
data = 0;
|
||||
uart_read_bytes(port_, &data, 1, pdMS_TO_TICKS(1000));
|
||||
if (data != 0x55) {
|
||||
uart_flush_input(port_);
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
int recv(unsigned char *buf, size_t size, int timeout) // this is for stream transport
|
||||
{
|
||||
int len = uart_read_bytes(port_, buf, size, pdMS_TO_TICKS(timeout));
|
||||
if (len == 0) {
|
||||
return MBEDTLS_ERR_SSL_WANT_READ;
|
||||
}
|
||||
return len;
|
||||
}
|
||||
|
||||
int recv_dgram(unsigned char *buf, size_t size, int timeout) // this is for datagrams
|
||||
{
|
||||
uart_event_t event = {};
|
||||
size_t length;
|
||||
uart_get_buffered_data_len(port_, &length);
|
||||
if (length == 0) {
|
||||
xQueueReceive(queue_, &event, pdMS_TO_TICKS(timeout));
|
||||
}
|
||||
uart_get_buffered_data_len(port_, &length);
|
||||
if (length == 0) {
|
||||
return MBEDTLS_ERR_SSL_WANT_READ;
|
||||
}
|
||||
if (header_) {
|
||||
if (length >= 2) {
|
||||
uart_read_bytes(port_, &payload_len_, 2, 0);
|
||||
header_ = false;
|
||||
length -= 2;
|
||||
}
|
||||
}
|
||||
if (!header_ && length > 0) {
|
||||
int to_read = payload_len_ - in_payload_;
|
||||
int l = uart_read_bytes(port_, &payload_[in_payload_], to_read, 0);
|
||||
in_payload_ += l;
|
||||
if (payload_len_ == in_payload_) {
|
||||
header_ = true;
|
||||
memcpy(buf, payload_, payload_len_);
|
||||
in_payload_ = 0;
|
||||
return payload_len_;
|
||||
}
|
||||
}
|
||||
return MBEDTLS_ERR_SSL_WANT_READ;
|
||||
}
|
||||
} uart;
|
||||
};
|
||||
|
||||
namespace {
|
||||
void tls_client()
|
||||
{
|
||||
const unsigned char message[] = "Hello\n";
|
||||
unsigned char reply[128];
|
||||
SecureLink client(UART_NUM_2, 4, 5);
|
||||
client.set_hostname(get_server_cn());
|
||||
if (!client.set_own_cert(get_buf(type::clientcert), get_buf(type::clientkey))) {
|
||||
ESP_LOGE(TAG, "Failed to set own cert");
|
||||
return;
|
||||
}
|
||||
if (!client.set_ca_cert(get_buf(type::cacert))) {
|
||||
ESP_LOGE(TAG, "Failed to set peer's cert");
|
||||
return;
|
||||
}
|
||||
if (!client.connect()) {
|
||||
ESP_LOGE(TAG, "Failed to CONNECT! %d", errno);
|
||||
return;
|
||||
}
|
||||
ESP_LOGI(TAG, "client opened...");
|
||||
if (client.write(message, sizeof(message)) < 0) {
|
||||
ESP_LOGE(TAG, "Failed to write!");
|
||||
return;
|
||||
}
|
||||
|
||||
int len;
|
||||
while ((len = client.read(reply, sizeof(reply))) == MBEDTLS_ERR_SSL_WANT_READ) {
|
||||
vTaskDelay(pdMS_TO_TICKS(500));
|
||||
}
|
||||
if (len < 0) {
|
||||
ESP_LOGE(TAG, "Failed to read!");
|
||||
return;
|
||||
}
|
||||
ESP_LOGI(TAG, "Successfully received: %.*s", len, reply);
|
||||
}
|
||||
|
||||
void tls_server()
|
||||
{
|
||||
unsigned char message[128];
|
||||
SecureLink server(UART_NUM_1, 25, 26);
|
||||
if (!server.set_own_cert(get_buf(type::servercert), get_buf(type::serverkey))) {
|
||||
ESP_LOGE(TAG, "Failed to set own cert");
|
||||
return;
|
||||
}
|
||||
if (!server.set_ca_cert(get_buf(type::cacert))) {
|
||||
ESP_LOGE(TAG, "Failed to set peer's cert");
|
||||
return;
|
||||
}
|
||||
ESP_LOGI(TAG, "openning...");
|
||||
if (!server.listen()) {
|
||||
ESP_LOGE(TAG, "Failed to OPEN! %d", errno);
|
||||
return;
|
||||
}
|
||||
int len;
|
||||
while ((len = server.read(message, sizeof(message))) == MBEDTLS_ERR_SSL_WANT_READ) {
|
||||
vTaskDelay(pdMS_TO_TICKS(500));
|
||||
}
|
||||
if (len < 0) {
|
||||
ESP_LOGE(TAG, "Failed to read! %x", -len);
|
||||
return;
|
||||
}
|
||||
ESP_LOGI(TAG, "Received from client: %.*s", len, message);
|
||||
if (server.write(message, len) < 0) {
|
||||
ESP_LOGE(TAG, "Failed to write!");
|
||||
return;
|
||||
}
|
||||
ESP_LOGI(TAG, "Written back");
|
||||
vTaskDelay(pdMS_TO_TICKS(500));
|
||||
}
|
||||
} // namespace
|
||||
|
||||
extern "C" void app_main()
|
||||
{
|
||||
ESP_ERROR_CHECK(esp_netif_init());
|
||||
ESP_ERROR_CHECK(esp_event_loop_create_default());
|
||||
std::thread t2(tls_server);
|
||||
std::thread t1(tls_client);
|
||||
t1.join();
|
||||
t2.join();
|
||||
}
|
@ -0,0 +1,3 @@
|
||||
CONFIG_TEST_DTLS=y
|
||||
CONFIG_MBEDTLS_SSL_PROTO_DTLS=y
|
||||
CONFIG_PTHREAD_TASK_STACK_SIZE_DEFAULT=8192
|
@ -0,0 +1,3 @@
|
||||
CONFIG_TEST_TLS=y
|
||||
CONFIG_MBEDTLS_SSL_PROTO_DTLS=y
|
||||
CONFIG_PTHREAD_TASK_STACK_SIZE_DEFAULT=8192
|
@ -0,0 +1,3 @@
|
||||
CONFIG_IDF_TARGET="esp32"
|
||||
CONFIG_MBEDTLS_SSL_PROTO_DTLS=y
|
||||
CONFIG_PTHREAD_TASK_STACK_SIZE_DEFAULT=8192
|
Reference in New Issue
Block a user