blob: 5aa57d47ffbd2c47f659d70c9644852eda1a4e3d [file] [log] [blame]
Andres AG788aa4a2016-09-14 14:32:09 +01001/**
2 * \file net_sockets.h
3 *
Simon Butcherca33caf2018-07-18 17:52:14 +01004 * \brief Network sockets abstraction layer to integrate Mbed TLS into a
5 * BSD-style sockets API.
6 *
7 * The network sockets module provides an example integration of the
8 * Mbed TLS library into a BSD sockets implementation. The module is
Simon Butcher5cf4d062018-07-23 14:36:40 +01009 * intended to be an example of how Mbed TLS can be integrated into a
10 * networking stack, as well as to be Mbed TLS's network integration
11 * for its supported platforms.
Simon Butcherca33caf2018-07-18 17:52:14 +010012 *
Simon Butcher5cf4d062018-07-23 14:36:40 +010013 * The module is intended only to be used with the Mbed TLS library and
14 * is not intended to be used by third party application software
15 * directly.
Simon Butcherca33caf2018-07-18 17:52:14 +010016 *
17 * The supported platforms are as follows:
18 * * Microsoft Windows and Windows CE
19 * * POSIX/Unix platforms including Linux, OS X
20 *
Darryl Greena40a1012018-01-05 15:33:17 +000021 */
22/*
Bence Szépkúti1e148272020-08-07 13:07:28 +020023 * Copyright The Mbed TLS Contributors
Andres AG788aa4a2016-09-14 14:32:09 +010024 * SPDX-License-Identifier: Apache-2.0
25 *
26 * Licensed under the Apache License, Version 2.0 (the "License"); you may
27 * not use this file except in compliance with the License.
28 * You may obtain a copy of the License at
29 *
30 * http://www.apache.org/licenses/LICENSE-2.0
31 *
32 * Unless required by applicable law or agreed to in writing, software
33 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
34 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
35 * See the License for the specific language governing permissions and
36 * limitations under the License.
Andres AG788aa4a2016-09-14 14:32:09 +010037 */
38#ifndef MBEDTLS_NET_SOCKETS_H
39#define MBEDTLS_NET_SOCKETS_H
Mateusz Starzyk846f0212021-05-19 19:44:07 +020040#include "mbedtls/private_access.h"
Andres AG788aa4a2016-09-14 14:32:09 +010041
Bence Szépkútic662b362021-05-27 11:25:03 +020042#include "mbedtls/build_info.h"
Andres AG788aa4a2016-09-14 14:32:09 +010043
Jaeden Amero6609aef2019-07-04 20:01:14 +010044#include "mbedtls/ssl.h"
Andres AG788aa4a2016-09-14 14:32:09 +010045
46#include <stddef.h>
47#include <stdint.h>
48
Gilles Peskined2971572021-07-26 18:48:10 +020049/** Failed to open a socket. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020050#define MBEDTLS_ERR_NET_SOCKET_FAILED -0x0042
Gilles Peskined2971572021-07-26 18:48:10 +020051/** The connection to the given server / port failed. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020052#define MBEDTLS_ERR_NET_CONNECT_FAILED -0x0044
Gilles Peskined2971572021-07-26 18:48:10 +020053/** Binding of the socket failed. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020054#define MBEDTLS_ERR_NET_BIND_FAILED -0x0046
Gilles Peskined2971572021-07-26 18:48:10 +020055/** Could not listen on the socket. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020056#define MBEDTLS_ERR_NET_LISTEN_FAILED -0x0048
Gilles Peskined2971572021-07-26 18:48:10 +020057/** Could not accept the incoming connection. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020058#define MBEDTLS_ERR_NET_ACCEPT_FAILED -0x004A
Gilles Peskined2971572021-07-26 18:48:10 +020059/** Reading information from the socket failed. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020060#define MBEDTLS_ERR_NET_RECV_FAILED -0x004C
Gilles Peskined2971572021-07-26 18:48:10 +020061/** Sending information through the socket failed. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020062#define MBEDTLS_ERR_NET_SEND_FAILED -0x004E
Gilles Peskined2971572021-07-26 18:48:10 +020063/** Connection was reset by peer. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020064#define MBEDTLS_ERR_NET_CONN_RESET -0x0050
Gilles Peskined2971572021-07-26 18:48:10 +020065/** Failed to get an IP address for the given hostname. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020066#define MBEDTLS_ERR_NET_UNKNOWN_HOST -0x0052
Gilles Peskined2971572021-07-26 18:48:10 +020067/** Buffer is too small to hold the data. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020068#define MBEDTLS_ERR_NET_BUFFER_TOO_SMALL -0x0043
Gilles Peskined2971572021-07-26 18:48:10 +020069/** The context is invalid, eg because it was free()ed. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020070#define MBEDTLS_ERR_NET_INVALID_CONTEXT -0x0045
Gilles Peskined2971572021-07-26 18:48:10 +020071/** Polling the net context failed. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020072#define MBEDTLS_ERR_NET_POLL_FAILED -0x0047
Gilles Peskined2971572021-07-26 18:48:10 +020073/** Input invalid. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020074#define MBEDTLS_ERR_NET_BAD_INPUT_DATA -0x0049
Andres AG788aa4a2016-09-14 14:32:09 +010075
Mateusz Starzyk16fec332021-07-22 16:43:35 +020076/** The backlog that listen() should use. */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020077#define MBEDTLS_NET_LISTEN_BACKLOG 10
Andres AG788aa4a2016-09-14 14:32:09 +010078
Mateusz Starzyk16fec332021-07-22 16:43:35 +020079/** The TCP transport protocol */
80#define MBEDTLS_NET_PROTO_TCP 0
81/** The UDP transport protocol */
82#define MBEDTLS_NET_PROTO_UDP 1
Andres AG788aa4a2016-09-14 14:32:09 +010083
Mateusz Starzyk16fec332021-07-22 16:43:35 +020084/** Used in \c mbedtls_net_poll to check for pending data */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +020085#define MBEDTLS_NET_POLL_READ 1
Mateusz Starzyk16fec332021-07-22 16:43:35 +020086/** Used in \c mbedtls_net_poll to check if write possible */
87#define MBEDTLS_NET_POLL_WRITE 2
Hanno Beckere09ca3d2017-05-22 15:06:06 +010088
Andres AG788aa4a2016-09-14 14:32:09 +010089#ifdef __cplusplus
90extern "C" {
91#endif
92
93/**
94 * Wrapper type for sockets.
95 *
96 * Currently backed by just a file descriptor, but might be more in the future
97 * (eg two file descriptors for combined IPv4 + IPv6 support, or additional
98 * structures for hand-made UDP demultiplexing).
99 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200100typedef struct mbedtls_net_context {
101 int MBEDTLS_PRIVATE(fd); /**< The underlying file descriptor */
102} mbedtls_net_context;
Andres AG788aa4a2016-09-14 14:32:09 +0100103
104/**
105 * \brief Initialize a context
106 * Just makes the context ready to be used or freed safely.
107 *
108 * \param ctx Context to initialize
109 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200110void mbedtls_net_init(mbedtls_net_context *ctx);
Andres AG788aa4a2016-09-14 14:32:09 +0100111
112/**
113 * \brief Initiate a connection with host:port in the given protocol
114 *
115 * \param ctx Socket to use
116 * \param host Host to connect to
117 * \param port Port to connect to
118 * \param proto Protocol: MBEDTLS_NET_PROTO_TCP or MBEDTLS_NET_PROTO_UDP
119 *
120 * \return 0 if successful, or one of:
121 * MBEDTLS_ERR_NET_SOCKET_FAILED,
122 * MBEDTLS_ERR_NET_UNKNOWN_HOST,
123 * MBEDTLS_ERR_NET_CONNECT_FAILED
124 *
125 * \note Sets the socket in connected mode even with UDP.
126 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200127int mbedtls_net_connect(mbedtls_net_context *ctx,
128 const char *host,
129 const char *port,
130 int proto);
Andres AG788aa4a2016-09-14 14:32:09 +0100131
132/**
133 * \brief Create a receiving socket on bind_ip:port in the chosen
134 * protocol. If bind_ip == NULL, all interfaces are bound.
135 *
136 * \param ctx Socket to use
137 * \param bind_ip IP to bind to, can be NULL
138 * \param port Port number to use
139 * \param proto Protocol: MBEDTLS_NET_PROTO_TCP or MBEDTLS_NET_PROTO_UDP
140 *
141 * \return 0 if successful, or one of:
142 * MBEDTLS_ERR_NET_SOCKET_FAILED,
Gilles Peskine9264e012021-03-03 12:25:06 +0100143 * MBEDTLS_ERR_NET_UNKNOWN_HOST,
Andres AG788aa4a2016-09-14 14:32:09 +0100144 * MBEDTLS_ERR_NET_BIND_FAILED,
145 * MBEDTLS_ERR_NET_LISTEN_FAILED
146 *
147 * \note Regardless of the protocol, opens the sockets and binds it.
148 * In addition, make the socket listening if protocol is TCP.
149 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200150int mbedtls_net_bind(mbedtls_net_context *ctx,
151 const char *bind_ip,
152 const char *port,
153 int proto);
Andres AG788aa4a2016-09-14 14:32:09 +0100154
155/**
156 * \brief Accept a connection from a remote client
157 *
158 * \param bind_ctx Relevant socket
159 * \param client_ctx Will contain the connected client socket
aitap4dab5512017-01-13 13:22:31 +0400160 * \param client_ip Will contain the client IP address, can be NULL
Andres AG788aa4a2016-09-14 14:32:09 +0100161 * \param buf_size Size of the client_ip buffer
aitap4dab5512017-01-13 13:22:31 +0400162 * \param ip_len Will receive the size of the client IP written,
Ivan Krylov5cb1f092018-03-24 18:48:04 +0300163 * can be NULL if client_ip is null
Andres AG788aa4a2016-09-14 14:32:09 +0100164 *
165 * \return 0 if successful, or
Gilles Peskine9264e012021-03-03 12:25:06 +0100166 * MBEDTLS_ERR_NET_SOCKET_FAILED,
167 * MBEDTLS_ERR_NET_BIND_FAILED,
Andres AG788aa4a2016-09-14 14:32:09 +0100168 * MBEDTLS_ERR_NET_ACCEPT_FAILED, or
169 * MBEDTLS_ERR_NET_BUFFER_TOO_SMALL if buf_size is too small,
170 * MBEDTLS_ERR_SSL_WANT_READ if bind_fd was set to
171 * non-blocking and accept() would block.
172 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200173int mbedtls_net_accept(mbedtls_net_context *bind_ctx,
174 mbedtls_net_context *client_ctx,
175 void *client_ip,
176 size_t buf_size,
177 size_t *ip_len);
Andres AG788aa4a2016-09-14 14:32:09 +0100178
179/**
Hanno Beckere09ca3d2017-05-22 15:06:06 +0100180 * \brief Check and wait for the context to be ready for read/write
181 *
Gilles Peskinee28f2362021-02-24 19:51:23 +0100182 * \note The current implementation of this function uses
183 * select() and returns an error if the file descriptor
Gilles Peskinec8dab5b2021-03-01 11:39:21 +0100184 * is \c FD_SETSIZE or greater.
Gilles Peskinee28f2362021-02-24 19:51:23 +0100185 *
Hanno Beckere09ca3d2017-05-22 15:06:06 +0100186 * \param ctx Socket to check
187 * \param rw Bitflag composed of MBEDTLS_NET_POLL_READ and
188 * MBEDTLS_NET_POLL_WRITE specifying the events
189 * to wait for:
190 * - If MBEDTLS_NET_POLL_READ is set, the function
191 * will return as soon as the net context is available
192 * for reading.
193 * - If MBEDTLS_NET_POLL_WRITE is set, the function
194 * will return as soon as the net context is available
195 * for writing.
196 * \param timeout Maximal amount of time to wait before returning,
197 * in milliseconds. If \c timeout is zero, the
198 * function returns immediately. If \c timeout is
199 * -1u, the function blocks potentially indefinitely.
200 *
201 * \return Bitmask composed of MBEDTLS_NET_POLL_READ/WRITE
202 * on success or timeout, or a negative return code otherwise.
203 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200204int mbedtls_net_poll(mbedtls_net_context *ctx, uint32_t rw, uint32_t timeout);
Hanno Beckere09ca3d2017-05-22 15:06:06 +0100205
206/**
Andres AG788aa4a2016-09-14 14:32:09 +0100207 * \brief Set the socket blocking
208 *
209 * \param ctx Socket to set
210 *
211 * \return 0 if successful, or a non-zero error code
212 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200213int mbedtls_net_set_block(mbedtls_net_context *ctx);
Andres AG788aa4a2016-09-14 14:32:09 +0100214
215/**
216 * \brief Set the socket non-blocking
217 *
218 * \param ctx Socket to set
219 *
220 * \return 0 if successful, or a non-zero error code
221 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200222int mbedtls_net_set_nonblock(mbedtls_net_context *ctx);
Andres AG788aa4a2016-09-14 14:32:09 +0100223
224/**
225 * \brief Portable usleep helper
226 *
227 * \param usec Amount of microseconds to sleep
228 *
229 * \note Real amount of time slept will not be less than
230 * select()'s timeout granularity (typically, 10ms).
231 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200232void mbedtls_net_usleep(unsigned long usec);
Andres AG788aa4a2016-09-14 14:32:09 +0100233
234/**
235 * \brief Read at most 'len' characters. If no error occurs,
236 * the actual amount read is returned.
237 *
238 * \param ctx Socket
239 * \param buf The buffer to write to
240 * \param len Maximum length of the buffer
241 *
242 * \return the number of bytes received,
243 * or a non-zero error code; with a non-blocking socket,
244 * MBEDTLS_ERR_SSL_WANT_READ indicates read() would block.
245 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200246int mbedtls_net_recv(void *ctx, unsigned char *buf, size_t len);
Andres AG788aa4a2016-09-14 14:32:09 +0100247
248/**
249 * \brief Write at most 'len' characters. If no error occurs,
250 * the actual amount read is returned.
251 *
252 * \param ctx Socket
253 * \param buf The buffer to read from
254 * \param len The length of the buffer
255 *
256 * \return the number of bytes sent,
257 * or a non-zero error code; with a non-blocking socket,
258 * MBEDTLS_ERR_SSL_WANT_WRITE indicates write() would block.
259 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200260int mbedtls_net_send(void *ctx, const unsigned char *buf, size_t len);
Andres AG788aa4a2016-09-14 14:32:09 +0100261
262/**
263 * \brief Read at most 'len' characters, blocking for at most
264 * 'timeout' seconds. If no error occurs, the actual amount
265 * read is returned.
266 *
Gilles Peskinee28f2362021-02-24 19:51:23 +0100267 * \note The current implementation of this function uses
268 * select() and returns an error if the file descriptor
Gilles Peskinec8dab5b2021-03-01 11:39:21 +0100269 * is \c FD_SETSIZE or greater.
Gilles Peskinee28f2362021-02-24 19:51:23 +0100270 *
Andres AG788aa4a2016-09-14 14:32:09 +0100271 * \param ctx Socket
272 * \param buf The buffer to write to
273 * \param len Maximum length of the buffer
274 * \param timeout Maximum number of milliseconds to wait for data
275 * 0 means no timeout (wait forever)
276 *
Gilles Peskine9264e012021-03-03 12:25:06 +0100277 * \return The number of bytes received if successful.
278 * MBEDTLS_ERR_SSL_TIMEOUT if the operation timed out.
Andres AG788aa4a2016-09-14 14:32:09 +0100279 * MBEDTLS_ERR_SSL_WANT_READ if interrupted by a signal.
Gilles Peskine9264e012021-03-03 12:25:06 +0100280 * Another negative error code (MBEDTLS_ERR_NET_xxx)
281 * for other failures.
Andres AG788aa4a2016-09-14 14:32:09 +0100282 *
283 * \note This function will block (until data becomes available or
284 * timeout is reached) even if the socket is set to
285 * non-blocking. Handling timeouts with non-blocking reads
286 * requires a different strategy.
287 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200288int mbedtls_net_recv_timeout(void *ctx,
289 unsigned char *buf,
290 size_t len,
291 uint32_t timeout);
Andres AG788aa4a2016-09-14 14:32:09 +0100292
293/**
Robert Larsendf8e5112019-08-23 10:55:47 +0200294 * \brief Closes down the connection and free associated data
295 *
296 * \param ctx The context to close
297 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200298void mbedtls_net_close(mbedtls_net_context *ctx);
Robert Larsendf8e5112019-08-23 10:55:47 +0200299
300/**
Andres AG788aa4a2016-09-14 14:32:09 +0100301 * \brief Gracefully shutdown the connection and free associated data
302 *
303 * \param ctx The context to free
304 */
Mateusz Starzykc0eabdc2021-08-03 14:09:02 +0200305void mbedtls_net_free(mbedtls_net_context *ctx);
Andres AG788aa4a2016-09-14 14:32:09 +0100306
307#ifdef __cplusplus
308}
309#endif
310
311#endif /* net_sockets.h */