1
10
13
14
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
173
174
175
180
181
182
186
187
188
193
194
195
199
200
202
208
209
213
214
215
216
217
218
219
220
221
225
226
227
228
232
233
235
239
240
241
242
243
245
246
247
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
281
282
283
284
285
287
292
293
294
295
296
297
298
299
300
311
315
319
320
321
322
323
324
325
326
327
331
335
342
350
351
352
353
354
355
356
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
382
383
384
385
386
387
388
391
392
397
406
407
408
409
410
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
435
440
442
446
447
449
450
451
452
453
454
455
456
460
461
462
463
464
465
469
470
471
472
473
477
478
479
480
481
485
486
487
488
489
490
494
495
497
498
499
500
501
502
503
504
505
509
510
511
512
513
514
518
519
520
523
524
525
529
530
531
532
533
536
537
538
539
540
541
545
546
547
548
549
550
556
560
561
562
563
564
565
566
570
571
572
573
574
575
576
577
581
582
583
584
585
586
587
591
593
594
595
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
...
...
...
#define NX_SECURE_SOURCE_CODE
#include "nx_secure_dtls.h"
#ifdef NX_SECURE_ENABLE_DTLS
#include "nx_packet.h"
#include "nx_udp.h"
...
UINT _nx_secure_dtls_client_handshake(NX_SECURE_DTLS_SESSION *dtls_session, UCHAR *packet_buffer,
UINT data_length, ULONG wait_option)
{
#ifndef NX_SECURE_TLS_CLIENT_DISABLED
UINT status;
USHORT message_type = NX_SECURE_TLS_INVALID_MESSAGE;
UINT header_bytes;
UINT message_length;
UCHAR *data_start = NX_NULL;
NX_PACKET *send_packet = NX_NULL;
NX_PACKET_POOL *packet_pool;
UINT error_number;
UINT alert_number;
UINT alert_level;
UINT message_seq;
UINT fragment_offset;
UINT fragment_length;
UCHAR *fragment_buffer;
NX_SECURE_TLS_SESSION *tls_session;
/* ... */
tls_session = &dtls_session -> nx_secure_dtls_tls_session;
fragment_buffer = tls_session->nx_secure_tls_packet_buffer;
while (data_length > 0)
{
header_bytes = data_length;
status = _nx_secure_dtls_process_handshake_header(packet_buffer, &message_type, &header_bytes,
&message_length, &message_seq, &fragment_offset, &fragment_length);
if (status == NX_SUCCESS)
{
/* ... */
if (message_seq < dtls_session -> nx_secure_dtls_remote_handshake_sequence)
{
return(NX_SUCCESS);
}if (message_seq < dtls_session -> nx_secure_dtls_remote_handshake_sequence) { ... }
if ((header_bytes + fragment_length) > data_length)
{
return(NX_SECURE_TLS_INCORRECT_MESSAGE_LENGTH);
}if ((header_bytes + fragment_length) > data_length) { ... }
if ((fragment_offset + fragment_length) > tls_session -> nx_secure_tls_packet_buffer_size ||
(header_bytes + message_length) > tls_session -> nx_secure_tls_packet_buffer_size)
{
return(NX_SECURE_TLS_PACKET_BUFFER_TOO_SMALL);
}if ((fragment_offset + fragment_length) > tls_session -> nx_secure_tls_packet_buffer_size || (header_bytes + message_length) > tls_session -> nx_secure_tls_packet_buffer_size) { ... }
if(message_seq != dtls_session -> nx_secure_dtls_expected_handshake_sequence)
{
return(NX_SECURE_TLS_OUT_OF_ORDER_MESSAGE);
}if (message_seq != dtls_session -> nx_secure_dtls_expected_handshake_sequence) { ... }
/* ... */
if (message_seq > dtls_session -> nx_secure_dtls_remote_handshake_sequence || (message_seq == 0 && fragment_offset == 0))
{
dtls_session -> nx_secure_dtls_remote_handshake_sequence = message_seq;
dtls_session -> nx_secure_dtls_fragment_length = message_length;
}if (message_seq > dtls_session -> nx_secure_dtls_remote_handshake_sequence || (message_seq == 0 && fragment_offset == 0)) { ... }
if (fragment_length > dtls_session -> nx_secure_dtls_fragment_length)
{
return(NX_SECURE_TLS_INVALID_PACKET);
}if (fragment_length > dtls_session -> nx_secure_dtls_fragment_length) { ... }
dtls_session -> nx_secure_dtls_fragment_length -= fragment_length;
NX_SECURE_MEMCPY(&fragment_buffer[fragment_offset], &packet_buffer[header_bytes], fragment_length);
if (dtls_session -> nx_secure_dtls_fragment_length > 0)
{
return(NX_SUCCESS);
}if (dtls_session -> nx_secure_dtls_fragment_length > 0) { ... }
else
{
if (message_seq == 0)
{
dtls_session -> nx_secure_dtls_expected_handshake_sequence = 0;
}if (message_seq == 0) { ... }
/* ... */
if (message_seq != dtls_session -> nx_secure_dtls_expected_handshake_sequence)
{
return(NX_SUCCESS);
}if (message_seq != dtls_session -> nx_secure_dtls_expected_handshake_sequence) { ... }
dtls_session -> nx_secure_dtls_expected_handshake_sequence = message_seq + 1;
/* ... */
NX_SECURE_MEMMOVE(&fragment_buffer[header_bytes], fragment_buffer, message_length);
/* ... */
fragment_buffer[0] = (UCHAR)message_type;
fragment_buffer[1] = (UCHAR)(message_length >> 16);
fragment_buffer[2] = (UCHAR)(message_length >> 8);
fragment_buffer[3] = (UCHAR)(message_length);
fragment_buffer[4] = (UCHAR)(message_seq >> 8);
fragment_buffer[5] = (UCHAR)(message_seq);
fragment_buffer[6] = 0;
fragment_buffer[7] = 0;
fragment_buffer[8] = 0;
fragment_buffer[9] = (UCHAR)(message_length >> 16);
fragment_buffer[10] = (UCHAR)(message_length >> 8);
fragment_buffer[11] = (UCHAR)(message_length);
data_start = fragment_buffer;
}else { ... }
}if (status == NX_SUCCESS) { ... }
if (status != NX_SECURE_TLS_SUCCESS)
{
return(status);
}if (status != NX_SECURE_TLS_SUCCESS) { ... }
packet_pool = tls_session -> nx_secure_tls_packet_pool;
/* ... */
if (message_type != NX_SECURE_TLS_HELLO_REQUEST && message_type != NX_SECURE_TLS_FINISHED &&
message_type != NX_SECURE_TLS_HELLO_VERIFY_REQUEST)
{
_nx_secure_tls_handshake_hash_update(tls_session, data_start, message_length + header_bytes);
}if (message_type != NX_SECURE_TLS_HELLO_REQUEST && message_type != NX_SECURE_TLS_FINISHED && message_type != NX_SECURE_TLS_HELLO_VERIFY_REQUEST) { ... }
data_length -= (fragment_length + header_bytes);
data_start += header_bytes;
switch (message_type)
{
case NX_SECURE_TLS_HELLO_VERIFY_REQUEST:
status = _nx_secure_dtls_process_helloverifyrequest(dtls_session, data_start, message_length);
if (status)
{
_nx_secure_dtls_retransmit_queue_flush(dtls_session);
}if (status) { ... }
break;case NX_SECURE_TLS_HELLO_VERIFY_REQUEST:
case NX_SECURE_TLS_SERVER_HELLO:
status = _nx_secure_tls_process_serverhello(tls_session, data_start, message_length);
break;case NX_SECURE_TLS_SERVER_HELLO:
case NX_SECURE_TLS_CERTIFICATE_MSG:
status = _nx_secure_tls_process_remote_certificate(tls_session, data_start, message_length, message_length);
break;case NX_SECURE_TLS_CERTIFICATE_MSG:
case NX_SECURE_TLS_SERVER_HELLO_DONE:
tls_session -> nx_secure_tls_client_state = NX_SECURE_TLS_CLIENT_STATE_SERVERHELLO_DONE;
_nx_secure_dtls_retransmit_queue_flush(dtls_session);
break;case NX_SECURE_TLS_SERVER_HELLO_DONE:
case NX_SECURE_TLS_SERVER_KEY_EXCHANGE:
status = _nx_secure_tls_process_server_key_exchange(tls_session, data_start, message_length);
break;case NX_SECURE_TLS_SERVER_KEY_EXCHANGE:
case NX_SECURE_TLS_CERTIFICATE_REQUEST:
status = _nx_secure_tls_process_certificate_request(tls_session, data_start, message_length);
break;case NX_SECURE_TLS_CERTIFICATE_REQUEST:
case NX_SECURE_TLS_FINISHED:
status = _nx_secure_tls_process_finished(tls_session, data_start, message_length);
_nx_secure_dtls_retransmit_queue_flush(dtls_session);
break;case NX_SECURE_TLS_FINISHED:
case NX_SECURE_TLS_HELLO_REQUEST:
/* ... */
tls_session -> nx_secure_tls_client_state = NX_SECURE_TLS_CLIENT_STATE_HELLO_REQUEST;
break;case NX_SECURE_TLS_HELLO_REQUEST:
case NX_SECURE_TLS_CERTIFICATE_VERIFY:
case NX_SECURE_TLS_CLIENT_KEY_EXCHANGE:
case NX_SECURE_TLS_CLIENT_HELLO:
case NX_SECURE_TLS_INVALID_MESSAGE:
case NX_SECURE_TLS_CERTIFICATE_URL:
case NX_SECURE_TLS_CERTIFICATE_STATUS:
default:
status = NX_SECURE_TLS_UNEXPECTED_MESSAGE;
break;default
}switch (message_type) { ... }
if (status != NX_SECURE_TLS_SUCCESS)
{
error_number = status;
_nx_secure_tls_map_error_to_alert(error_number, &alert_number, &alert_level);
tx_mutex_put(&_nx_secure_tls_protection);
status = _nx_secure_dtls_packet_allocate(dtls_session, packet_pool, &send_packet, wait_option);
tx_mutex_get(&_nx_secure_tls_protection, TX_WAIT_FOREVER);
if (status == NX_SUCCESS)
{
_nx_secure_tls_send_alert(tls_session, send_packet, (UCHAR)alert_number, (UCHAR)alert_level);
_nx_secure_dtls_send_record(dtls_session, send_packet, NX_SECURE_TLS_ALERT, wait_option);
}if (status == NX_SUCCESS) { ... }
return(error_number);
}if (status != NX_SECURE_TLS_SUCCESS) { ... }
switch (tls_session -> nx_secure_tls_client_state)
{
case NX_SECURE_TLS_CLIENT_STATE_IDLE:
break;case NX_SECURE_TLS_CLIENT_STATE_IDLE:
case NX_SECURE_TLS_CLIENT_STATE_ERROR:
case NX_SECURE_TLS_CLIENT_STATE_ALERT_SENT:
/* ... */
return(NX_SECURE_TLS_HANDSHAKE_FAILURE);
break;case NX_SECURE_TLS_CLIENT_STATE_ALERT_SENT:
case NX_SECURE_TLS_CLIENT_STATE_HELLO_REQUEST:
if (tls_session -> nx_secure_tls_local_session_active)
{
status = NX_SECURE_TLS_NO_RENEGOTIATION_ERROR;
}if (tls_session -> nx_secure_tls_local_session_active) { ... }
break;case NX_SECURE_TLS_CLIENT_STATE_HELLO_REQUEST:
case NX_SECURE_TLS_CLIENT_STATE_HELLO_VERIFY:
send_packet = dtls_session -> nx_secure_dtls_transmit_sent_head;
if ((send_packet == NX_NULL) || (send_packet -> nx_packet_queue_next != ((NX_PACKET *)NX_DRIVER_TX_DONE)))
{
status = NX_INVALID_PACKET;
break;
}if ((send_packet == NX_NULL) || (send_packet -> nx_packet_queue_next != ((NX_PACKET *)NX_DRIVER_TX_DONE))) { ... }
dtls_session -> nx_secure_dtls_transmit_sent_head = NX_NULL;
dtls_session -> nx_secure_dtls_transmit_sent_tail = NX_NULL;
dtls_session -> nx_secure_dtls_transmit_sent_count = 0;
send_packet -> nx_packet_prepend_ptr += sizeof(NX_UDP_HEADER);
send_packet -> nx_packet_length -= sizeof(NX_UDP_HEADER);
send_packet -> nx_packet_union_next.nx_packet_tcp_queue_next = (NX_PACKET *)NX_PACKET_ALLOCATED;
_nx_secure_dtls_send_clienthello(dtls_session, send_packet);
status = _nx_secure_dtls_send_handshake_record(dtls_session, send_packet, NX_SECURE_TLS_CLIENT_HELLO, wait_option, 1);
break;case NX_SECURE_TLS_CLIENT_STATE_HELLO_VERIFY:
case NX_SECURE_TLS_CLIENT_STATE_SERVERHELLO:
break;case NX_SECURE_TLS_CLIENT_STATE_SERVERHELLO:
case NX_SECURE_TLS_CLIENT_STATE_SERVER_CERTIFICATE:
/* ... */
break;case NX_SECURE_TLS_CLIENT_STATE_SERVER_CERTIFICATE:
case NX_SECURE_TLS_CLIENT_STATE_SERVER_KEY_EXCHANGE:
break;case NX_SECURE_TLS_CLIENT_STATE_SERVER_KEY_EXCHANGE:
case NX_SECURE_TLS_CLIENT_STATE_CERTIFICATE_REQUEST:
tls_session -> nx_secure_tls_client_certificate_requested = 1;
break;case NX_SECURE_TLS_CLIENT_STATE_CERTIFICATE_REQUEST:
case NX_SECURE_TLS_CLIENT_STATE_SERVERHELLO_DONE:
/* ... */
if (tls_session -> nx_secure_tls_client_certificate_requested)
{
status = _nx_secure_dtls_allocate_handshake_packet(dtls_session, packet_pool, &send_packet, wait_option);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
_nx_secure_tls_send_certificate(tls_session, send_packet, wait_option);
status = _nx_secure_dtls_send_handshake_record(dtls_session, send_packet, NX_SECURE_TLS_CERTIFICATE_MSG, wait_option, 1);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
}if (tls_session -> nx_secure_tls_client_certificate_requested) { ... }
status = _nx_secure_tls_generate_premaster_secret(tls_session, NX_SECURE_DTLS);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
status = _nx_secure_dtls_allocate_handshake_packet(dtls_session, packet_pool, &send_packet, wait_option);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
_nx_secure_tls_send_client_key_exchange(tls_session, send_packet);
status = _nx_secure_dtls_send_handshake_record(dtls_session, send_packet, NX_SECURE_TLS_CLIENT_KEY_EXCHANGE, wait_option, 1);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
/* ... */
if (tls_session -> nx_secure_tls_client_certificate_requested)
{
tls_session -> nx_secure_tls_client_certificate_requested = 0;
status = _nx_secure_dtls_allocate_handshake_packet(dtls_session, packet_pool, &send_packet, wait_option);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
_nx_secure_tls_send_certificate_verify(tls_session, send_packet);
status = _nx_secure_dtls_send_handshake_record(dtls_session, send_packet, NX_SECURE_TLS_CERTIFICATE_VERIFY, wait_option, 1);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
}if (tls_session -> nx_secure_tls_client_certificate_requested) { ... }
/* ... */
status = _nx_secure_tls_generate_keys(tls_session);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
tx_mutex_put(&_nx_secure_tls_protection);
/* ... */
status = _nx_secure_dtls_packet_allocate(dtls_session, packet_pool, &send_packet, wait_option);
tx_mutex_get(&_nx_secure_tls_protection, TX_WAIT_FOREVER);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
_nx_secure_tls_send_changecipherspec(tls_session, send_packet);
status = _nx_secure_dtls_send_record(dtls_session, send_packet, NX_SECURE_TLS_CHANGE_CIPHER_SPEC, wait_option);
if (status != NX_SUCCESS)
{
nx_secure_tls_packet_release(send_packet);
break;
}if (status != NX_SUCCESS) { ... }
/* ... */
NX_SECURE_MEMSET(tls_session -> nx_secure_tls_local_sequence_number, 0, sizeof(tls_session -> nx_secure_tls_local_sequence_number));
status = _nx_secure_tls_session_keys_set(tls_session, NX_SECURE_TLS_KEY_SET_LOCAL);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
dtls_session -> nx_secure_dtls_local_epoch = (USHORT)(dtls_session -> nx_secure_dtls_local_epoch + 1);
status = _nx_secure_dtls_allocate_handshake_packet(dtls_session, packet_pool, &send_packet, wait_option);
if (status != NX_SUCCESS)
{
break;
}if (status != NX_SUCCESS) { ... }
_nx_secure_tls_send_finished(tls_session, send_packet);
status = _nx_secure_dtls_send_handshake_record(dtls_session, send_packet, NX_SECURE_TLS_FINISHED, wait_option, 1);
break;case NX_SECURE_TLS_CLIENT_STATE_SERVERHELLO_DONE:
case NX_SECURE_TLS_CLIENT_STATE_HANDSHAKE_FINISHED:
/* ... */
break;case NX_SECURE_TLS_CLIENT_STATE_HANDSHAKE_FINISHED:
default:
status = NX_SECURE_TLS_INVALID_STATE;default
}switch (tls_session -> nx_secure_tls_client_state) { ... }
/* ... */
if (status != NX_SUCCESS)
{
error_number = status;
_nx_secure_tls_map_error_to_alert(error_number, &alert_number, &alert_level);
tx_mutex_put(&_nx_secure_tls_protection);
status = _nx_secure_dtls_packet_allocate(dtls_session, packet_pool, &send_packet, wait_option);
tx_mutex_get(&_nx_secure_tls_protection, TX_WAIT_FOREVER);
if (status == NX_SUCCESS)
{
_nx_secure_tls_send_alert(tls_session, send_packet, (UCHAR)alert_number, (UCHAR)alert_level);
_nx_secure_dtls_send_record(dtls_session, send_packet, NX_SECURE_TLS_ALERT, wait_option);
}if (status == NX_SUCCESS) { ... }
return(error_number);
}if (status != NX_SUCCESS) { ... }
packet_buffer += (fragment_length + header_bytes);
}while (data_length > 0) { ... }
return(NX_SUCCESS);/* ... */
#else
NX_PARAMETER_NOT_USED(packet_buffer);
NX_PARAMETER_NOT_USED(wait_option);
NX_PARAMETER_NOT_USED(data_length);
dtls_session -> nx_secure_dtls_tls_session.nx_secure_tls_server_state = NX_SECURE_TLS_SERVER_STATE_ERROR;
return(NX_SECURE_TLS_INVALID_STATE);/* ... */
#endif
}_nx_secure_dtls_client_handshake (NX_SECURE_DTLS_SESSION *dtls_session, UCHAR *packet_buffer, UINT data_length, ULONG wait_option) { ... }
/* ... */#endif