mirror of https://github.com/ARMmbed/mbed-os.git
119 lines
3.5 KiB
C++
119 lines
3.5 KiB
C++
/*
|
|
* Copyright (c) 2018 ARM Limited
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include "TLSSocket.h"
|
|
|
|
#define TRACE_GROUP "TLSS"
|
|
#include "mbed-trace/mbed_trace.h"
|
|
|
|
#if !defined(MBED_CONF_NSAPI_OFFLOAD_TLSSOCKET) || !(MBED_CONF_NSAPI_OFFLOAD_TLSSOCKET)
|
|
|
|
// This class requires Mbed TLS SSL/TLS client code
|
|
#if defined(MBEDTLS_SSL_CLI_C)
|
|
|
|
nsapi_error_t TLSSocket::connect(const char *host, uint16_t port)
|
|
{
|
|
nsapi_error_t ret = NSAPI_ERROR_OK;
|
|
if (!is_handshake_started()) {
|
|
ret = tcp_socket.connect(host, port);
|
|
if (ret == NSAPI_ERROR_OK || ret == NSAPI_ERROR_IN_PROGRESS) {
|
|
set_hostname(host);
|
|
}
|
|
if (ret != NSAPI_ERROR_OK && ret != NSAPI_ERROR_IS_CONNECTED) {
|
|
return ret;
|
|
}
|
|
}
|
|
return TLSSocketWrapper::start_handshake(ret == NSAPI_ERROR_OK);
|
|
}
|
|
|
|
TLSSocket::~TLSSocket()
|
|
{
|
|
/* Transport is a member of TLSSocket which is derived from TLSSocketWrapper.
|
|
* Make sure that TLSSocketWrapper::close() is called before the transport is
|
|
* destroyed.
|
|
*/
|
|
close();
|
|
}
|
|
#endif // MBEDTLS_SSL_CLI_C
|
|
|
|
#else // MBED_CONF_NSAPI_OFFLOAD_TLSSOCKET
|
|
|
|
TLSSocket::TLSSocket()
|
|
{
|
|
}
|
|
|
|
TLSSocket::~TLSSocket()
|
|
{
|
|
}
|
|
|
|
|
|
nsapi_error_t TLSSocket::set_hostname(const char *hostname)
|
|
{
|
|
return setsockopt(NSAPI_TLSSOCKET_LEVEL, NSAPI_TLSSOCKET_SET_HOSTNAME, hostname, strlen(hostname));
|
|
}
|
|
|
|
nsapi_error_t TLSSocket::set_root_ca_cert(const void *root_ca, size_t len)
|
|
{
|
|
return setsockopt(NSAPI_TLSSOCKET_LEVEL, NSAPI_TLSSOCKET_SET_CACERT, root_ca, len);
|
|
}
|
|
|
|
nsapi_error_t TLSSocket::set_root_ca_cert(const char *root_ca_pem)
|
|
{
|
|
return set_root_ca_cert(root_ca_pem, strlen(root_ca_pem));
|
|
}
|
|
|
|
nsapi_error_t TLSSocket::set_client_cert_key(const void *client_cert, size_t client_cert_len,
|
|
const void *client_private_key_pem, size_t client_private_key_len)
|
|
{
|
|
nsapi_error_t ret = setsockopt(NSAPI_TLSSOCKET_LEVEL, NSAPI_TLSSOCKET_SET_CLCERT, client_cert, client_cert_len);
|
|
if (ret == NSAPI_ERROR_OK) {
|
|
ret = setsockopt(NSAPI_TLSSOCKET_LEVEL, NSAPI_TLSSOCKET_SET_CLKEY, client_private_key_pem, client_private_key_len);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
nsapi_error_t TLSSocket::set_client_cert_key(const char *client_cert_pem, const char *client_private_key_pem)
|
|
{
|
|
return set_client_cert_key(client_cert_pem, strlen(client_cert_pem), client_private_key_pem, strlen(client_private_key_pem));
|
|
}
|
|
|
|
nsapi_error_t TLSSocket::connect(const char *host, uint16_t port)
|
|
{
|
|
nsapi_error_t ret = enable_tlssocket();
|
|
if (ret == NSAPI_ERROR_OK) {
|
|
ret = TCPSocket::connect(host, port);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
nsapi_error_t TLSSocket::connect(const SocketAddress &address)
|
|
{
|
|
nsapi_error_t ret = enable_tlssocket();
|
|
if (ret == NSAPI_ERROR_OK) {
|
|
ret = TCPSocket::connect(address);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
nsapi_error_t TLSSocket::enable_tlssocket()
|
|
{
|
|
bool enabled = true;
|
|
return setsockopt(NSAPI_TLSSOCKET_LEVEL, NSAPI_TLSSOCKET_ENABLE, &enabled, sizeof(enabled));
|
|
}
|
|
|
|
#endif // MBED_CONF_NSAPI_OFFLOAD_TLSSOCKET
|