Select one of the symbols to view example projects that use it.
 
Outline
...
...
...
...
#define NX_SECURE_SOURCE_CODE
#include "nx_secure_tls.h"
...
...
_nx_secure_tls_session_start(NX_SECURE_TLS_SESSION *, NX_TCP_SOCKET *, UINT)
Files
loading...
CodeScopeSTM32 Libraries and Samplesnetxduonx_secure/src/nx_secure_tls_session_start.c
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
/**************************************************************************/ /* */ /* Copyright (c) Microsoft Corporation. All rights reserved. */ /* */ /* This software is licensed under the Microsoft Software License */ /* Terms for Microsoft Azure RTOS. Full text of the license can be */ /* found in the LICENSE file at https://aka.ms/AzureRTOS_EULA */ /* and in the root directory of this software. */ /* */... /**************************************************************************/ ... /**************************************************************************/ /**************************************************************************/ /** */ /** NetX Secure Component */ /** */ /** Transport Layer Security (TLS) */ /** */... /**************************************************************************/ /**************************************************************************/ #define NX_SECURE_SOURCE_CODE #include "nx_secure_tls.h" ... /**************************************************************************/ /* */ /* FUNCTION RELEASE */ /* */ /* _nx_secure_tls_session_start PORTABLE C */ /* 6.1 */ /* AUTHOR */ /* */ /* Timothy Stapko, Microsoft Corporation */ /* */ /* DESCRIPTION */ /* */ /* This function starts a TLS session given a TCP socket. The TCP */ /* connection must be established before calling this function, */ /* or the TLS handshake will fail. */ /* */ /* The type of TLS session is derived automatically from the TCP */ /* socket, which must have gone through a successful call to */ /* either nx_tcp_client_socket_connect or nx_tcp_server_socket_accept. */ /* */ /* INPUT */ /* */ /* tls_session TLS control block */ /* tcp_socket TCP socket pointer */ /* wait_option Suspension option */ /* */ /* OUTPUT */ /* */ /* status Completion status */ /* */ /* CALLS */ /* */ /* _nx_secure_tls_allocate_handshake_packet */ /* Allocate TLS packet */ /* _nx_secure_tls_handshake_process Process TLS handshake */ /* _nx_secure_tls_send_clienthello Send ClientHello */ /* _nx_secure_tls_send_handshake_record Send TLS handshake record */ /* nx_secure_tls_packet_release Release packet */ /* tx_mutex_get Get protection mutex */ /* tx_mutex_put Put protection mutex */ /* */ /* CALLED BY */ /* */ /* Application Code */ /* */ /* RELEASE HISTORY */ /* */ /* DATE NAME DESCRIPTION */ /* */ /* 05-19-2020 Timothy Stapko Initial Version 6.0 */ /* 09-30-2020 Timothy Stapko Modified comment(s), */ /* supported chained packet, */ /* resulting in version 6.1 */ /* */... /**************************************************************************/ UINT _nx_secure_tls_session_start(NX_SECURE_TLS_SESSION *tls_session, NX_TCP_SOCKET *tcp_socket, UINT wait_option) { UINT status = NX_NOT_SUCCESSFUL; UINT error_return; #ifndef NX_SECURE_TLS_CLIENT_DISABLED NX_PACKET *send_packet; #endif /* Get the protection. */ tx_mutex_get(&_nx_secure_tls_protection, TX_WAIT_FOREVER); /* Assign the packet pool from which TLS will allocate internal message packets. */ tls_session -> nx_secure_tls_packet_pool = tcp_socket -> nx_tcp_socket_ip_ptr -> nx_ip_default_packet_pool; /* Assign the TCP socket to the TLS session. */ tls_session -> nx_secure_tls_tcp_socket = tcp_socket; /* Reset the record queue. */ tls_session -> nx_secure_record_queue_header = NX_NULL; tls_session -> nx_secure_record_decrypted_packet = NX_NULL; /* Make sure we are starting with a fresh session. */ tls_session -> nx_secure_tls_local_session_active = 0; tls_session -> nx_secure_tls_remote_session_active = 0; tls_session -> nx_secure_tls_received_remote_credentials = NX_FALSE; /* Reset alert tracking. */ tls_session -> nx_secure_tls_received_alert_level = 0; tls_session -> nx_secure_tls_received_alert_value = 0; /* See if this is a TCP server started with listen/accept, or a TCP client started with connect. */ if (tcp_socket -> nx_tcp_socket_client_type) { /* The TCP socket is a client, so our TLS session is a TLS Client. */ tls_session -> nx_secure_tls_socket_type = NX_SECURE_TLS_SESSION_TYPE_CLIENT; }if (tcp_socket -> nx_tcp_socket_client_type) { ... } else { /* This session is now being treated as a server - indicate that fact to the TLS stack. */ tls_session -> nx_secure_tls_socket_type = NX_SECURE_TLS_SESSION_TYPE_SERVER; }else { ... } #if (NX_SECURE_TLS_TLS_1_3_ENABLED) /* Initialize TLS 1.3 cryptographic primitives. */ if(tls_session->nx_secure_tls_1_3) { status = _nx_secure_tls_1_3_crypto_init(tls_session); if(status != NX_SUCCESS) { /* Release the protection. */ tx_mutex_put(&_nx_secure_tls_protection); return(status); }if (status != NX_SUCCESS) { ... } }if (tls_session->nx_secure_tls_1_3) { ... } /* ... */#endif /* Now process the handshake depending on the TLS session type. */ #ifndef NX_SECURE_TLS_CLIENT_DISABLED if (tls_session -> nx_secure_tls_socket_type == NX_SECURE_TLS_SESSION_TYPE_CLIENT) { /* Allocate a handshake packet so we can send the ClientHello. */ status = _nx_secure_tls_allocate_handshake_packet(tls_session, tls_session -> nx_secure_tls_packet_pool, &send_packet, wait_option); if (status != NX_SUCCESS) { /* Release the protection. */ tx_mutex_put(&_nx_secure_tls_protection); return(status); }if (status != NX_SUCCESS) { ... } /* Populate our packet with clienthello data. */ status = _nx_secure_tls_send_clienthello(tls_session, send_packet); if (status == NX_SUCCESS) { /* Send the ClientHello to kick things off. */ status = _nx_secure_tls_send_handshake_record(tls_session, send_packet, NX_SECURE_TLS_CLIENT_HELLO, wait_option); }if (status == NX_SUCCESS) { ... } /* If anything after the allocate fails, we need to release our packet. */ if (status != NX_SUCCESS) { /* Release the protection. */ tx_mutex_put(&_nx_secure_tls_protection); nx_secure_tls_packet_release(send_packet); return(status); }if (status != NX_SUCCESS) { ... } }if (tls_session -> nx_secure_tls_socket_type == NX_SECURE_TLS_SESSION_TYPE_CLIENT) { ... } /* ... */#endif /* Release the protection. */ tx_mutex_put(&_nx_secure_tls_protection); /* Now handle our incoming handshake messages. Continue processing until the handshake is complete or an error/timeout occurs. *//* ... */ status = _nx_secure_tls_handshake_process(tls_session, wait_option); if ((status == NX_CONTINUE) && (wait_option == 0)) { /* It is non blocking mode. */ return(NX_CONTINUE); }if ((status == NX_CONTINUE) && (wait_option == 0)) { ... } if(status != NX_SUCCESS) { /* Save the return status before resetting the TLS session. */ error_return = status; /* Reset the TLS state so this socket can be reused. */ status = _nx_secure_tls_session_reset(tls_session); if(status != NX_SUCCESS) { return(status); }if (status != NX_SUCCESS) { ... } return(error_return); }if (status != NX_SUCCESS) { ... } return(status); }{ ... }