mirror of
https://github.com/FreeRTOS/FreeRTOS-Kernel.git
synced 2025-10-17 18:27:47 -04:00
* Update mbedtls to version v3.2.1 * Adjust include paths for github workflow * Update FreeRTOS+TCP to v3.1.0 * Add initial VS project files for Kernel, +TCP, and mbedtls * winpcap: Consolidate to a single copy of WinPcap * Downgrade library projects to VS 2019. Add heap_4 to kernel. * Remove *.vcxproj.user files and add to gitignore * Disable unwanted kernel config options * Update FreeRTOS+TCP and Kernel include paths * Update FreeRTOS+TCP Windows Minimal sln * Remove .suo and .vcxproj.user files * Update mbedtls transport implementations for mbedtls v3.2.1 * Fix typo in mbedtls_freertos_port.c * Update vcxproj files for +TCP, Kernel, Mbedtls * Fix typo in name WindowSimulator -> WindowsSimulator * Add wpcap lib to FreeRTOS+TCP.vcxproj * Update FreeRTOS+TCP Minimal Demo for Windows Simulator * Mask MSVC string function warnings Aad _CRT_SECURE_NO_WARNINGS preprocessor definition. * Move projects to their own directories to make VisualStudio happy * mbedtls_freertos_port.c: Fix formatting? * Add coreHTTP, Logging libs. Adjust dependencies * Disable FreeRTOS Kernel malloc failed hook * Update coreHTTP Plaintext demo * Rename / relocate transport interface implementations * Remove old VS project files * Remove extra core_http_config.h files * Remove extra FreeRTOSConfig.h files * Remove extra FreeRTOSIPConfig.h files * Remove old mbedtls_config.h files * Remove old FreeRTOSConfig and core_http_config files * Update HTTP Mutual Auth Demo build files * Fix transport_plaintext.h include name * Update HTTP_Plaintext demo build files * Update CoreHTTP_S3_Download VS project files * Update HTTP_S3_Upload demo build files * Update CoreHTTP_S3_Download_Multithreaded demo build files * Add GithubActions builds for FreeRTOS+ CoreHTTP Demos * Update S3DownloadHTTPExample.c to be compatible with mbedtls 3.x * Update GithubActions FreeRTOS+ config file * Combine core_pkcs11_config.h files into a single one * Add corePKCS11 VS project file * Update corePKCS11 WinSim demo project and build files * Update corePKCS11 library to version 3.5.0 * Modifiying demos to build using static libraries * Adding a header file * Two more demos * Update corePKCS11 demo code and auto-format * Downgrade corePKCS11 library build file to v142 / VS 2019 * Speed up CI builds with selective submodule initialization * Separate corePKCS11 demo into it's own job. * Remove WIN32.vcxproj and WIN32.vcxproj.filters files * Remove old configuration header files Partially reverts 73829ced6061e4584e521185178a61b4a437c5e0 * Revert unwanted coreHTTP demo changes * Changing include paths for demos * Adding an include * MQTT WoflSSL Demo update * wolfSSL Demo changes * Config changes for MQTT Demos * Initial Device Defender demo update. * Initial Device Shadow demo update. * Update mbedtls_transport_pkcs11 for Mbedtls 3.x * Update corePKCS11 MQTT Mutual Auth demo * Add a default definition of SdkLog * Update CorePKCS11 + MQTT Mutual Auth demo sln name * Build all configs of coreHTTP demos * Update coreSNTP Demo build files. * Update coreSNTP Demo sln name * Update FreeRTOS+TCP Posix demo * Update FreeRTOS+TCP Qemu ARM MPS2 AN385 Demo * Update FreeRTOS+TCP Demo Github Actions builds * Update Fleet Provisioning WinSim Demo build files * Remove mbedtls_pk_info_t references from mbedtls_pk_pkcs11.h * Restore / update the FreeRTOS+TCP Minimal WinSim demo * Initial Jobs demo update. * Fix jobs demo build. * Initial OTA over HTTP demo update. * Initial OTA over MQTT demo update. * Ota_Over_Mqtt_Demo build fix. * OTA over MQTT demo fix. * Update HTTP demo solution file name for CI. * Update Github actions workflow to old HTTP demo names. * Update coreSTNP demo to old solution name. * Fix defender demo / fix mbedtls config to use threading alt. * Add MBEDTLS_CONFIG_FILE definition to each config * Fix config file name. * MQTT Mutual auth fixes. * Fix job demo. * Device shadow demo fixes. * Fix coreSNTP demo not setting alt threading functions for mbedtls. * Enable Static allocation, Add default hooks for FreeRTOS Kernel and +TCP * Add xPlatformIsNetworkUp platform function to FreeRTOS+TCP hooks * Enable runtime statistics in the Windows Simualator Kernel config * Revert "Fix coreSNTP demo not setting alt threading functions for mbedtls." This reverts commit 9069707519561ca8136d58c0f18fb176c9050a1d. * Revert mbedtls threading related config changes * Add xPlatformIsNetworkUp function prototype * Remove boileplate FreeRTOS kernel and +tcp hooks * Refactor device defender demo for clarity * Add wait loop calling xPlatformIsNetworkUp * Add missing vPlatformInitLogging function * Add vPlatformInitLogging and vLoggingPrintf defitions to logging headers * Updating the FreeRTOS_Plus_CLI_with_Trace_Windows_Simulator * Updating the FreeRTOS_Plus_Reliance_Edge_and_CLI_Windows_Simulator demo * Updates to the FreeRTOS_Plus_WolfSSL_Windows_Simulator demo * Fixing wrong include path * Upating FreeRTOS_Plus_WolfSSL_FIPS_Ready_Windows_Simulator demo * Update coreMQTT WinSim demos to print start and end condition. * Modifiying repos updated as part of the CLI demo GitHub workflow * Removing duplicate functions from the FreeRTOS_Plus_TCP_Minimal_Windows_Simulator demo * Updated FreeRTOS_Plus_TCP_UDP_Mode_CLI_Windows_Simulator demo * Updating corePKCS11_MQTT_Mutual_Auth_Windows_Simulator Demo to call the static function that creates task * Fix log message using unitialized string in MQTT Multitask demo. * Fixing a broken extern function * Fixing a typo extern function name * Added a reference to coreHTTP * Fixing a pre-processor issue in the OTA_Over_Http_Demo * Updating the MQTT_Mutual_Auth_Demo_with_BG96 demo * Updating the MQTT_Mutual_Auth_Demo_with_HL7802 demo * Changes to the MQTT_Mutual_Auth_Demo_with_SARA_R4 demo * Fix demos for CI. * Adding the source path to the CBMC proofs for FreeRTOS+TCP * Spell check fixes, adding words to lexicons * Fixing a typo * Add arg to skip prompt in setup script. * Update paths of script to be relative to the file. * Changing manifest.yml file to point to corePKCS11 3.5.0 * Added CI markers to cellular demos. * Fix cellular demo flow. * Fix celullar demos. * Initial TCP sockets wrapper rework - will break things. * First cellular demo fix for new sockets wrapper. * Minor fix to cellular sockets wrapper. * Fix mbedtls bio using FreeRTOS Plus TCP call. * Clean up BG96 demo project files. * Update HL7802 demo. * Fix SARA R4 demo for new sockets wrapper. * Fix Device Defender, Device Shadow, and Fleet PRovisioning. * Fix Jobs demo. * Fix OTA over HTTP demo. * Fix OTA over MQTT demo. * Fix HTTP mutual auth demo. * Fix OTA over MQTT demo endianness. * Fix OTA over HTTP demo endianness. * Fix HTTP Plaintext demo. * Fix HTTP S3 download demo. * Fix plaintext transport * Fix OTA demos. * Fix OTA demos. * Fix OTA HTTP demo. * Fix HTTP S3 Download multithreaded demo. * Fix HTTP S3 Upload demo * Fix corePKCS11 Mutual Auth demo. * Updating MQTT_Mutual_Auth * Update pkcs11 setup script. * Updating the MQTT_Basic_TLS Demo * Organize PKCS11 demos project. * Updating MQTT_Keep_Alive demo * Clean up SNTP demo. * Updated MQTT_Multitask demo * Updated MQTT_Plain_Text * Updating the MQTT_Serializer Demo * Updating corePKCS11_MQTT_Mutual_Auth_Windows_Simulator * Updating coreSNTP_Windows_Simulator * Clean up demo projects. * Add markers to PKCS11 mutual auth demo. * Fix Fleet Provisioning demo script. * Fix SNTP demo solution. * Fix coreSNTP project files. * Fix Fleet Provisiong script. * Fix fleet provisioning script. * Fix demo config template. * Fleet provisioning demo markers. * Updating MQTT_Mutual_Auth_wolfSSL demo and the transport_wolfSSL file * Fixing FreeRTOS_Plus_TCP_Echo_POSIX * Fixing CLI and Trace Demos * Fixing TCP_ECHO_POSIX demo * Adding a word to the lexicon * Remove unneeded files. * Update github workflows to use Ubuntu 20.04. * Change OTA demo target names to RTOSDemo for OTAE2E tests. * Fixing Headers * Updating headers * Two more headers * Adding words to the lexicon * Whitepsace * Ignore mbedtls config file for header check. * Removing FreeRTOS Header from the mbedtls_config_v3.2.1.h file * Fix bug in lPKCS11PkMbedtlsCloseSessionAndFree. Add doxygen api docs. * Update lexicon.txt * Fix spelling * Apply suggestions from code review Co-authored-by: jasonpcarroll <23126711+jasonpcarroll@users.noreply.github.com> * Add return code comment for p11_ecdsa_ctx_init * Rename WindowsSimulator folder to VisualStudio_StaticProjects. * Remove references to coroutines * Fix mbedtls_pk_pkcs11.c * Update to LTS 2.0 submodule pointers (#880) * Update submodule pointers to LTS 2.0 * Initial coreMQTT 2.1.1 update. * Update AWS demos for coreMQTT 2.1.1 * Fix deprecated macro for coreMQTT demos. * Fix keep alive demo. * Fix plaintext demo. * Fix MQTT wolfSSL demo. * Fix MQTT PKCS11 demo. * Remove duplicate functions. * Fix Mutual auth demos for Cellular. * Fix OTA demos. * Fix header of plaintext demo config. * Set writev to NULL for OTA demos. * Fix mbedlts config for OTA demos. * Fix spelling. Co-authored-by: Jason Carroll <czjaso@amazon.com> * Removing blank line * Fix jobs demo race condition. * Fix race condition from WinPCap network interface. * Update lexicon. Co-authored-by: Paul Bartell <pbartell@amazon.com> Co-authored-by: Jason Carroll <czjaso@amazon.com> Co-authored-by: Paul Bartell <paul.bartell@gmail.com> Co-authored-by: jasonpcarroll <23126711+jasonpcarroll@users.noreply.github.com>
359 lines
10 KiB
C
359 lines
10 KiB
C
/*
|
|
* FreeRTOS V202112.00
|
|
* Copyright (C) 2020 Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|
*
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy of
|
|
* this software and associated documentation files (the "Software"), to deal in
|
|
* the Software without restriction, including without limitation the rights to
|
|
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
|
|
* the Software, and to permit persons to whom the Software is furnished to do so,
|
|
* subject to the following conditions:
|
|
*
|
|
* The above copyright notice and this permission notice shall be included in all
|
|
* copies or substantial portions of the Software.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
|
|
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
|
|
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
|
|
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
*
|
|
* https://www.FreeRTOS.org
|
|
* https://github.com/FreeRTOS
|
|
*
|
|
*/
|
|
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
|
|
#include "FreeRTOSConfig.h"
|
|
|
|
/* FreeRTOS includes. */
|
|
#include "FreeRTOS.h"
|
|
#include "semphr.h"
|
|
|
|
/* mbed TLS includes. */
|
|
#if defined( MBEDTLS_CONFIG_FILE )
|
|
#include MBEDTLS_CONFIG_FILE
|
|
#else
|
|
#include "mbedtls/mbedtls_config.h"
|
|
#endif
|
|
#include "mbedtls/entropy.h"
|
|
|
|
#include "entropy_poll.h"
|
|
|
|
#include "mbedtls_freertos_port.h"
|
|
|
|
/*-----------------------------------------------------------*/
|
|
|
|
/**
|
|
* @brief Allocates memory for an array of members.
|
|
*
|
|
* @param[in] nmemb Number of members that need to be allocated.
|
|
* @param[in] size Size of each member.
|
|
*
|
|
* @return Pointer to the beginning of newly allocated memory.
|
|
*/
|
|
void * mbedtls_platform_calloc( size_t nmemb,
|
|
size_t size )
|
|
{
|
|
size_t totalSize = nmemb * size;
|
|
void * pBuffer = NULL;
|
|
|
|
/* Check that neither nmemb nor size were 0. */
|
|
if( totalSize > 0 )
|
|
{
|
|
/* Overflow check. */
|
|
if( ( totalSize / size ) == nmemb )
|
|
{
|
|
pBuffer = pvPortMalloc( totalSize );
|
|
|
|
if( pBuffer != NULL )
|
|
{
|
|
( void ) memset( pBuffer, 0U, totalSize );
|
|
}
|
|
}
|
|
}
|
|
|
|
return pBuffer;
|
|
}
|
|
|
|
/*-----------------------------------------------------------*/
|
|
|
|
/**
|
|
* @brief Frees the space previously allocated by calloc.
|
|
*
|
|
* @param[in] ptr Pointer to the memory to be freed.
|
|
*/
|
|
void mbedtls_platform_free( void * ptr )
|
|
{
|
|
if( ptr != NULL )
|
|
{
|
|
vPortFree( ptr );
|
|
}
|
|
}
|
|
|
|
/*-----------------------------------------------------------*/
|
|
|
|
#if defined( MBEDTLS_THREADING_C )
|
|
|
|
/**
|
|
* @brief Creates a mutex.
|
|
*
|
|
* @param[in, out] pMutex mbedtls mutex handle.
|
|
*/
|
|
static void mbedtls_platform_mutex_init( mbedtls_threading_mutex_t * pMutex )
|
|
{
|
|
configASSERT( pMutex != NULL );
|
|
|
|
#if( configSUPPORT_STATIC_ALLOCATION == 1 )
|
|
/* Create a statically-allocated FreeRTOS mutex. This should never fail as
|
|
* storage is provided. */
|
|
|
|
pMutex->mutexHandle = xSemaphoreCreateMutexStatic( &( pMutex->mutexStorage ) );
|
|
#elif( configSUPPORT_DYNAMIC_ALLOCATION == 1 )
|
|
pMutex->mutexHandle = xSemaphoreCreateMutex();
|
|
#endif
|
|
|
|
configASSERT( pMutex->mutexHandle != NULL );
|
|
}
|
|
|
|
/*-----------------------------------------------------------*/
|
|
|
|
/**
|
|
* @brief Frees a mutex.
|
|
*
|
|
* @param[in] pMutex mbedtls mutex handle.
|
|
*
|
|
* @note This function is an empty stub as nothing needs to be done to free
|
|
* a statically allocated FreeRTOS mutex.
|
|
*/
|
|
static void mbedtls_platform_mutex_free( mbedtls_threading_mutex_t * pMutex )
|
|
{
|
|
vSemaphoreDelete( pMutex->mutexHandle );
|
|
pMutex->mutexHandle = NULL;
|
|
}
|
|
|
|
/*-----------------------------------------------------------*/
|
|
|
|
/**
|
|
* @brief Function to lock a mutex.
|
|
*
|
|
* @param[in] pMutex mbedtls mutex handle.
|
|
*
|
|
* @return 0 (success) is always returned as any other failure is asserted.
|
|
*/
|
|
static int mbedtls_platform_mutex_lock( mbedtls_threading_mutex_t * pMutex )
|
|
{
|
|
BaseType_t mutexStatus = 0;
|
|
|
|
configASSERT( pMutex != NULL );
|
|
configASSERT( pMutex->mutexHandle != NULL );
|
|
|
|
/* mutexStatus is not used if asserts are disabled. */
|
|
( void ) mutexStatus;
|
|
|
|
/* This function should never fail if the mutex is initialized. */
|
|
mutexStatus = xSemaphoreTake( pMutex->mutexHandle, portMAX_DELAY );
|
|
|
|
configASSERT( mutexStatus == pdTRUE );
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*-----------------------------------------------------------*/
|
|
|
|
/**
|
|
* @brief Function to unlock a mutex.
|
|
*
|
|
* @param[in] pMutex mbedtls mutex handle.
|
|
*
|
|
* @return 0 is always returned as any other failure is asserted.
|
|
*/
|
|
static int mbedtls_platform_mutex_unlock( mbedtls_threading_mutex_t * pMutex )
|
|
{
|
|
BaseType_t mutexStatus = 0;
|
|
|
|
configASSERT( pMutex != NULL );
|
|
configASSERT( pMutex->mutexHandle != NULL );
|
|
/* mutexStatus is not used if asserts are disabled. */
|
|
( void ) mutexStatus;
|
|
|
|
/* This function should never fail if the mutex is initialized. */
|
|
mutexStatus = xSemaphoreGive( pMutex->mutexHandle );
|
|
configASSERT( mutexStatus == pdTRUE );
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*-----------------------------------------------------------*/
|
|
|
|
#if defined( MBEDTLS_THREADING_ALT )
|
|
int mbedtls_platform_threading_init( void )
|
|
{
|
|
mbedtls_threading_set_alt( mbedtls_platform_mutex_init,
|
|
mbedtls_platform_mutex_free,
|
|
mbedtls_platform_mutex_lock,
|
|
mbedtls_platform_mutex_unlock );
|
|
return 0;
|
|
}
|
|
|
|
#else /* !MBEDTLS_THREADING_ALT */
|
|
|
|
void (* mbedtls_mutex_init)( mbedtls_threading_mutex_t * mutex ) = mbedtls_platform_mutex_init;
|
|
void (* mbedtls_mutex_free)( mbedtls_threading_mutex_t * mutex ) = mbedtls_platform_mutex_free;
|
|
int (* mbedtls_mutex_lock)( mbedtls_threading_mutex_t * mutex ) = mbedtls_platform_mutex_lock;
|
|
int (* mbedtls_mutex_unlock)( mbedtls_threading_mutex_t * mutex ) = mbedtls_platform_mutex_unlock;
|
|
|
|
#endif /* !MBEDTLS_THREADING_ALT */
|
|
|
|
#endif /* MBEDTLS_THREADING_C */
|
|
/*-----------------------------------------------------------*/
|
|
|
|
#if defined( MBEDTLS_ENTROPY_HARDWARE_ALT )
|
|
/* Determine which API is available */
|
|
#if defined(_WIN32)
|
|
#define RNG_SOURCE_WINDOWS_CRYPT
|
|
#elif defined(__linux__)
|
|
#include <unistd.h>
|
|
#include <sys/syscall.h>
|
|
#if defined(SYS_getrandom)
|
|
#define RNG_SOURCE_GETRANDOM
|
|
#endif /* SYS_getrandom */
|
|
#elif defined( ARM_RDI_MONITOR ) || defined( SEMIHOSTING )
|
|
#define RNG_SOURCE_SEMIHOST
|
|
#else
|
|
#define RNG_SOURCE_DEV_RANDOM
|
|
#endif
|
|
|
|
#if defined(RNG_SOURCE_WINDOWS_CRYPT)
|
|
#include <windows.h>
|
|
#include <wincrypt.h>
|
|
int mbedtls_hardware_poll( void * data,
|
|
unsigned char * output,
|
|
size_t len,
|
|
size_t * olen )
|
|
{
|
|
int lStatus = MBEDTLS_ERR_ENTROPY_SOURCE_FAILED;
|
|
HCRYPTPROV hProv = 0;
|
|
|
|
/* Unferenced parameter. */
|
|
( void ) data;
|
|
|
|
/*
|
|
* This is port-specific for the Windows simulator, so just use Crypto API.
|
|
*/
|
|
|
|
if( TRUE == CryptAcquireContextA(
|
|
&hProv, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT ) )
|
|
{
|
|
if( TRUE == CryptGenRandom( hProv, len, output ) )
|
|
{
|
|
lStatus = 0;
|
|
*olen = len;
|
|
}
|
|
|
|
CryptReleaseContext( hProv, 0 );
|
|
}
|
|
|
|
return lStatus;
|
|
}
|
|
#elif defined( RNG_SOURCE_GETRANDOM )
|
|
int mbedtls_hardware_poll( void * data,
|
|
unsigned char * output,
|
|
size_t len,
|
|
size_t * olen )
|
|
{
|
|
( void ) data;
|
|
int rslt = MBEDTLS_ERR_ENTROPY_SOURCE_FAILED;
|
|
|
|
configASSERT( olen != NULL );
|
|
|
|
rslt = getrandom( output, len, 0 );
|
|
|
|
if( rslt >= 0 )
|
|
{
|
|
*olen = (size_t) rslt;
|
|
rslt = 0;
|
|
}
|
|
else
|
|
{
|
|
rslt = MBEDTLS_ERR_ENTROPY_SOURCE_FAILED;
|
|
}
|
|
return rslt;
|
|
}
|
|
#elif defined( RNG_SOURCE_SEMIHOST )
|
|
int mbedtls_hardware_poll( void * data,
|
|
unsigned char * output,
|
|
size_t len,
|
|
size_t * olen )
|
|
{
|
|
int rslt = MBEDTLS_ERR_ENTROPY_SOURCE_FAILED;
|
|
int file;
|
|
|
|
(void) data;
|
|
|
|
configASSERT( olen != NULL );
|
|
configASSERT( output != NULL );
|
|
|
|
file = _open( "/dev/urandom", O_RDONLY );
|
|
|
|
if( file >= 0 )
|
|
{
|
|
rslt = _read( file, ( char * ) output, len );
|
|
}
|
|
|
|
if( rslt >= 0 )
|
|
{
|
|
*olen = len;
|
|
}
|
|
|
|
if( rslt >= 0 )
|
|
{
|
|
*olen = len;
|
|
rslt = 0;
|
|
}
|
|
else
|
|
{
|
|
rslt = MBEDTLS_ERR_ENTROPY_SOURCE_FAILED;
|
|
}
|
|
|
|
( void ) _close( file );
|
|
return rslt;
|
|
}
|
|
#else
|
|
#include <stdio.h>
|
|
int mbedtls_hardware_poll( void * data,
|
|
unsigned char * output,
|
|
size_t len,
|
|
size_t * olen )
|
|
{
|
|
int rslt = MBEDTLS_ERR_ENTROPY_SOURCE_FAILED;
|
|
FILE * file;
|
|
size_t read_length = 0U;
|
|
|
|
configASSERT( olen != NULL );
|
|
configASSERT( output != NULL );
|
|
|
|
file = fopen("/dev/urandom", "rb");
|
|
if( file != NULL )
|
|
{
|
|
rslt = fread( output, 1, len, file );
|
|
fclose( file );
|
|
}
|
|
|
|
if( rslt >= 0 )
|
|
{
|
|
*olen = len;
|
|
rslt = 0;
|
|
}
|
|
else
|
|
{
|
|
rslt = MBEDTLS_ERR_ENTROPY_SOURCE_FAILED;
|
|
}
|
|
return rslt;
|
|
}
|
|
#endif
|
|
#endif
|
|
/*-----------------------------------------------------------*/
|