Skip to content

Secure Sockets library eases application development by exposing a socket like interface for both secure and non-secure socket communication. This library provides abstraction API for underlying network and security libraries

License

Notifications You must be signed in to change notification settings

Infineon/secure-sockets

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Secure sockets library

The secure sockets library provides APIs to create software that can send and/or receive data over the network using sockets. This library supports both secure and non-secure sockets, and abstracts the complexity involved in directly using network stack and security stack APIs. This library supports both IPv4 and IPv6 addressing modes for UDP and TCP sockets.

Features and functionality

  • Supports Wi-Fi and Ethernet connections

  • Supports non-secure TCP and UDP sockets

  • Secure TCP (TLS) socket communication using Mbed TLS/NetXSecure library

  • Supports both IPv4 and IPv6 addressing. Only link-local IPv6 addressing is supported

  • Supports UDP multicast and broadcast for both IPv4 and IPv6

  • Thread-safe APIs

  • Provides APIs for both Client and Server mode operations

  • Supports both Synchronous and Asynchronous APIs for receiving data on a socket

  • Asynchronous Server APIs for accepting client connections

  • Provides a socket-option API to configure send/receive timeout, callback for asynchronous mode, TCP keepalive parameters, certificate/key, and TLS extensions

  • Integrated with PSA Lib through the PKCS interface to support secure client TCP (TLS) connection using the device certificate and device keys provisioned in the secured element

Quick Start

  • To use secure-sockets library with Wi-Fi kits on FreeRTOS, lwIP, and Mbed TLS combination, the application should pull wifi-core-freertos-lwip-mbedtls library which will internally pull secure-sockets, wifi-connection-manager, FreeRTOS, lwIP, Mbed TLS and other dependent modules. To pull wifi-core-freertos-lwip-mbedtls create the following .mtb file in deps folder.

    • wifi-core-freertos-lwip-mbedtls.mtb: https://github.com/Infineon/wifi-core-freertos-lwip-mbedtls#latest-v1.X#$$ASSET_REPO$$/wifi-core-freertos-lwip-mbedtls/latest-v1.X

      Note: To use TLS version 1.3, please upgrade wifi-core-freertos-lwip-mbedtls to latest-v2.X (It is supported on all the platforms except PSoC™ 64S0S2 Wi-Fi Bluetooth® pioneer kit (CY8CKIT-064S0S2-4343W))

  • To use secure-sockets library with CYW955913EVK-01 kits on Threadx, NetXDuo, and NetXSecure combination, the application should pull wifi-core-threadx-cat5 library which will internally pull secure-sockets and other dependent modules. To pull wifi-core-threadx-cat5 create the following .mtb file in deps folder.

    • wifi-core-threadx-cat5.mtb: https://github.com/Infineon/wifi-core-threadx-cat5#latest-v1.X#$$ASSET_REPO$$/wifi-core-threadx-cat5/latest-v1.X
  • To use secure-sockets library with Ethernet kits on FreeRTOS, lwIP, and Mbed TLS combination, the application should pull ethernet-core-freertos-lwip-mbedtls library which will internally pull secure-sockets, ethernet-connection-manager, FreeRTOS, lwIP, Mbed TLS and other dependent modules. To pull ethernet-core-freertos-lwip-mbedtls create the following .mtb file in deps folder.

    • ethernet-core-freertos-lwip-mbedtls.mtb: https://github.com/Infineon/ethernet-core-freertos-lwip-mbedtls#latest-v1.X#$$ASSET_REPO$$/ethernet-core-freertos-lwip-mbedtls/latest-v1.X

      Note: To use TLS version 1.3, please upgrade ethernet-core-freertos-lwip-mbedtls to latest-v2.X

  • A set of pre-defined configuration files for FreeRTOS, lwIP, and Mbed TLS combination is bundled in wifi-core-freertos-lwip-mbedtls library for Wi-Fi kits and in ethernet-core-freertos-lwip-mbedtls library for Ethernet kits. The developer is expected to review the configuration and make adjustments. Also, a set of COMPONENTS must be defined in the code example project's Makefile for this library.

    • See the "Quick Start" section in README.md for Wi-Fi kits.
    • See the "Quick Start" section in README.md for Ethernet kits.
  • The secure-sockets library disables all the debug log messages by default. To enable log messages, the application must perform the following:

  • Add the ENABLE_SECURE_SOCKETS_LOGS macro to the DEFINES in the code example's Makefile. The Makefile entry would look like as follows:

    DEFINES+=ENABLE_SECURE_SOCKETS_LOGS
    
  • Call the cy_log_init() function provided by the cy-log module. cy-log is part of the connectivity-utilities library.

  • See connectivity-utilities library API documentation.

Supported platforms

This library and its features are supported on the following Infineon MCUs:

Send and receive timeout values

The secure sockets library configures the default send and receive timeout values to 10 seconds for a newly created socket. These can be changed using the cy_socket_setsockopt API function. To change the send timeout, use the CY_SOCKET_SO_SNDTIMEO socket option; similarly, for receive timeout, use the CY_SOCKET_SO_RCVTIMEO socket option. Adjust the default timeout values based on the network speed or use case.

TCP/IP and security stacks

  • The secure sockets library has been designed to support different flavors of the TCP/IP stack or security stack. Currently, secure-sockets supports two combinations of TCP/IP stack and security stack.

    • lwIP + Mbed TLS combination

    • NetXDuo + NetXSecure combination

  • Any application that uses the secure sockets library with lwIP + Mbed TLS combination, must ensure that the following COMPONENTS are defined in the code example project's Makefile.

    To do so, add LWIP and MBEDTLS components to the Makefile. The Makefile entry would look like as follows:

    COMPONENTS+=LWIP MBEDTLS
    
  • Currently NetXDuo + NetXSecure combination is supported only on CYW955913EVK-01. This does not require addition of any COMPONENTS to the code example project's Makefile.

  • Applications using the secure sockets library must include only the cy_secure_sockets.h file for non-secure connections. For secure connections, the application must include both cy_secure_sockets.h and cy_tls.h header files.

Stack size

The default stack size of the secure sockets library is 6 KB (6*1024). To customize the stack size add the SECURE_SOCKETS_THREAD_STACKSIZE macro to the DEFINES in the code example's Makefile with the required stack size. The Makefile entry would look like as follows:

DEFINES+=SECURE_SOCKETS_THREAD_STACKSIZE=8*1024

Validity period verification

  • The default Mbed TLS configuration provided by the Wi-Fi core FreeRTOS lwIP mbedtls library or Ethernet core FreeRTOS lwIP mbedtls library disables the validity period verification of the certificates. To perform this verification, enable MBEDTLS_HAVE_TIME_DATE in the mbedtls_user_config.h

  • Ensure that the system time is set prior to the cy_socket_connect() function call. To set the system time, get the time from the NTP server and set the system's RTC time using cyhal_rtc_init(), cyhal_rtc_write() and cy_set_rtc_instance() functions. See the time support details for reference.

  • See the code snippet given in secure sockets API documentation to get the time from the NTP server.

PKCS/Non-PKCS mode

Secure sockets library can be built using PKCS and Non-PKCS mode on secure platform such as CY8CKIT-064S0S2-4343W. When Secure sockets library is built with PKCS flow, the certificates and keys can be provisioned in the secure element of the platform, and the provisioned certificates and keys will be read/used by secure sockets library while establishing the TLS connection with the peer. On the other hand, in non-PKCS mode, the certificates/keys will be passed from the application stored in flash/RAM.

Non-PKCS mode

  1. Provision the kit. See Device provisioning steps.

  2. Add CY_TFM_PSA_SUPPORTED and TFM_MULTI_CORE_NS_OS to the DEFINES in the application's Makefile. The Makefile entry would look like as follows:

    DEFINES+=CY_TFM_PSA_SUPPORTED TFM_MULTI_CORE_NS_OS
    

PKCS mode

Secure Kits

Secure kits will have inbuilt secure element to store the keys and certificates which can be provisioned into the device.

  1. Provision the kit. See Device provisioning steps.

  2. Provision device certificate/RootCA certificate. Add/modify the respective policy .json file with the device and RootCA certificate path to be provisioned to the secured element as follows, and then re-provision the kit:

    "provisioning:"
     {
        "chain_of_trust": ["../certificates/device_cert.pem", "../certificates/rootCA.pem"]
     },
    
Dependencies

The secure sockets library depends on the other libraries for PKCS support. Ensure that the following libraries are pulled in by creating the following .mtb files:

  • aws-iot-device-sdk-embedded-C.mtb: https://github.com/aws/aws-iot-device-sdk-embedded-C/#202103.00#$$ASSET_REPO$$/aws-iot-device-sdk-embedded-C/202103.00

  • freertos-pkcs11-psa.mtb: https://github.com/Linaro/freertos-pkcs11-psa/#80292d24f4978891b0fd35feeb5f1d6f6f0fff06#$$ASSET_REPO$$/freertos-pkcs11-psa/master

Pull required libraries and enable PKCS mode
  1. Execute the make getlibs command to pull the required libraries created as .mtb.

  2. Add the CY_TFM_PSA_SUPPORTED, TFM_MULTI_CORE_NS_OS and CY_SECURE_SOCKETS_PKCS_SUPPORT macros to the DEFINES in the code example's Makefile. The Makefile entry would look like as follows:

     DEFINES+=CY_TFM_PSA_SUPPORTED TFM_MULTI_CORE_NS_OS CY_SECURE_SOCKETS_PKCS_SUPPORT
    
Trusted firmware library include path

To compile the FreeRTOS PKCS PSA integration library, add the trusted firmware library include path before the MBEDTLS library include path. Add the following lines to the Makefile.

 INCLUDES=$(SEARCH_trusted-firmware-m)/COMPONENT_TFM_NS_INTERFACE/include
 INCLUDES+=./libs/trusted-firmware-m/COMPONENT_TFM_NS_INTERFACE/include

Non-Secure Kits

The non-secure kits can also support the key and certificate storage in separate hardware like optiga. Optiga PKCS11 support is enabled in secure sockets.

Dependencies

Ensure that the following libraries are pulled in by creating the following .mtb files.

  • aws-iot-device-sdk-embedded-C.mtb: https://github.com/aws/aws-iot-device-sdk-embedded-C/#202103.00#$$ASSET_REPO$$/aws-iot-device-sdk-embedded-C/202103.00

  • optiga-trust-m.mtb: https://github.com/Infineon/optiga-trust-m#release-v4.0.3#$$ASSET_REPO$$/optiga-trust-m/release-v4.0.3

Pull required libraries and enable PKCS mode
  1. Execute the make getlibs command to pull the required libraries created as .mtb.

  2. Add OPTIGA in COMPONENTS in Makefile.

     COMPONENTS+= OPTIGA
    
  3. Add the Optiga PAL interface as per the platform. Use PSOC6_FREERTOS for PSOC6 with FREERTOS. The Makefile entry would look like as follows

     COMPONENTS+= PSOC6_FREERTOS
    
  4. Add OPTIGAFLAGS with the configuration file for Optiga. A pre-defined configuration file optiga_lib_config_mtb.h is bundled with the secure sockets library. To change the default configuration for PKCS11, copy the optiga_config.h file from the secure sockets library to the top-level application directory, and then modify it.

     OPTIGAFLAGS=OPTIGA_LIB_EXTERNAL='"optiga_config.h"'
    
  5. Add the CY_SECURE_SOCKETS_PKCS_SUPPORT and OPTIGAFLAGS macros to the DEFINES in the code example's Makefile. The Makefile entry would look like as follows:

     DEFINES+= $(OPTIGAFLAGS) CY_SECURE_SOCKETS_PKCS_SUPPORT
    
Configuration for PKCS11

A pre-defined configuration file core_pkcs11_config.h is bundled with the secure sockets library. To change the default configuration for PKCS11, copy the core_pkcs11_config.h file from the secure sockets library to the top-level application directory, and then modify it.

Secure Kits

FreeRTOS PSA PKCS11 implementation supports only SHA-256 hashing algorithm. So the application should chose the cipher suite list compatible for SHA-256. To chose the cipher suite list(compatible for SHA-256), application need to copy mbedtls_user_config.h file from libs/wifi-core-freertos-lwip-mbedtls/configs to root folder and add required cipher suites to the MBEDTLS_SSL_CIPHERSUITES macro.

Non-Secure Kits

The secure sockets will use 3 OID information from the optiga chip for TLS connection. Secure sockets uses the below macros (default OID value in brackets) correspoding to those OIDs to fetch information. To change the default configuration, add these defines in the makefile with new values.

  1. Device private key : LABEL_DEVICE_PRIVATE_KEY_FOR_TLS (0xE0F0)
  2. Device certificate : LABEL_DEVICE_CERTIFICATE_FOR_TLS (0xE0E0)
  3. Root certificate : LABEL_ROOT_CERTIFICATE (0xE0E8)

Example : if the Device private key slot is 0xE0F1, please add below line to Makefile

DEFINES+=LABEL_DEVICE_PRIVATE_KEY_FOR_TLS='"0xE0F1"'

Note : Optiga-trust-m has a limitation on the maximum size of Public Key Certificate/Device Certificate. Using a certificate of a size greater than 1728 bytes may result in erroneous outputs.

To use secure-sockets library for FreeRTOS, lwIP, and Mbed TLS, pull wifi-core-freertos-lwip-mbedtls library which will internally pull secure-sockets, wifi-connection-manager, FreeRTOS, lwIP, mbed TLS and other dependent modules.

Additional information

About

Secure Sockets library eases application development by exposing a socket like interface for both secure and non-secure socket communication. This library provides abstraction API for underlying network and security libraries

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages