| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683 | /** * \file ssl.h * * \brief SSL/TLS functions. * *  Copyright (C) 2006-2010, Brainspark B.V. * *  This file is part of PolarSSL (http://www.polarssl.org) *  Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org> * *  All rights reserved. * *  This program is free software; you can redistribute it and/or modify *  it under the terms of the GNU General Public License as published by *  the Free Software Foundation; either version 2 of the License, or *  (at your option) any later version. * *  This program is distributed in the hope that it will be useful, *  but WITHOUT ANY WARRANTY; without even the implied warranty of *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the *  GNU General Public License for more details. * *  You should have received a copy of the GNU General Public License along *  with this program; if not, write to the Free Software Foundation, Inc., *  51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. */#ifndef POLARSSL_SSL_H#define POLARSSL_SSL_H#include <time.h>#include "polarssl/net.h"#include "polarssl/dhm.h"#include "polarssl/rsa.h"#include "polarssl/md5.h"#include "polarssl/sha1.h"#include "polarssl/x509.h"#include "config.h"#if defined(POLARSSL_PKCS11_C)#include "polarssl/pkcs11.h"#endif#if defined(_MSC_VER) && !defined(inline)#define inline _inline#else#if defined(__ARMCC_VERSION) && !defined(inline)#define inline __inline#endif /* __ARMCC_VERSION */#endif /*_MSC_VER *//* * SSL Error codes */#define POLARSSL_ERR_SSL_FEATURE_UNAVAILABLE               -0x7080  /**< The requested feature is not available. */#define POLARSSL_ERR_SSL_BAD_INPUT_DATA                    -0x7100  /**< Bad input parameters to function. */#define POLARSSL_ERR_SSL_INVALID_MAC                       -0x7180  /**< Verification of the message MAC failed. */#define POLARSSL_ERR_SSL_INVALID_RECORD                    -0x7200  /**< An invalid SSL record was received. */#define POLARSSL_ERR_SSL_CONN_EOF                          -0x7280  /**< The connection indicated an EOF. */#define POLARSSL_ERR_SSL_UNKNOWN_CIPHER                    -0x7300  /**< An unknown cipher was received. */#define POLARSSL_ERR_SSL_NO_CIPHER_CHOSEN                  -0x7380  /**< The server has no ciphersuites in common with the client. */#define POLARSSL_ERR_SSL_NO_SESSION_FOUND                  -0x7400  /**< No session to recover was found. */#define POLARSSL_ERR_SSL_NO_CLIENT_CERTIFICATE             -0x7480  /**< No client certification received from the client, but required by the authentication mode. */#define POLARSSL_ERR_SSL_CERTIFICATE_TOO_LARGE             -0x7500  /**< Our own certificate(s) is/are too large to send in an SSL message.*/#define POLARSSL_ERR_SSL_CERTIFICATE_REQUIRED              -0x7580  /**< The own certificate is not set, but needed by the server. */#define POLARSSL_ERR_SSL_PRIVATE_KEY_REQUIRED              -0x7600  /**< The own private key is not set, but needed. */#define POLARSSL_ERR_SSL_CA_CHAIN_REQUIRED                 -0x7680  /**< No CA Chain is set, but required to operate. */#define POLARSSL_ERR_SSL_UNEXPECTED_MESSAGE                -0x7700  /**< An unexpected message was received from our peer. */#define POLARSSL_ERR_SSL_FATAL_ALERT_MESSAGE               -0x7780  /**< A fatal alert message was received from our peer. */#define POLARSSL_ERR_SSL_PEER_VERIFY_FAILED                -0x7800  /**< Verification of our peer failed. */#define POLARSSL_ERR_SSL_PEER_CLOSE_NOTIFY                 -0x7880  /**< The peer notified us that the connection is going to be closed. */#define POLARSSL_ERR_SSL_BAD_HS_CLIENT_HELLO               -0x7900  /**< Processing of the ClientHello handshake message failed. */#define POLARSSL_ERR_SSL_BAD_HS_SERVER_HELLO               -0x7980  /**< Processing of the ServerHello handshake message failed. */#define POLARSSL_ERR_SSL_BAD_HS_CERTIFICATE                -0x7A00  /**< Processing of the Certificate handshake message failed. */#define POLARSSL_ERR_SSL_BAD_HS_CERTIFICATE_REQUEST        -0x7A80  /**< Processing of the CertificateRequest handshake message failed. */#define POLARSSL_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE        -0x7B00  /**< Processing of the ServerKeyExchange handshake message failed. */#define POLARSSL_ERR_SSL_BAD_HS_SERVER_HELLO_DONE          -0x7B80  /**< Processing of the ServerHelloDone handshake message failed. */#define POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE        -0x7C00  /**< Processing of the ClientKeyExchange handshake message failed. */#define POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_DHM_RP -0x7C80  /**< Processing of the ClientKeyExchange handshake message failed in DHM Read Public. */#define POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_DHM_CS -0x7D00  /**< Processing of the ClientKeyExchange handshake message failed in DHM Calculate Secret. */#define POLARSSL_ERR_SSL_BAD_HS_CERTIFICATE_VERIFY         -0x7D80  /**< Processing of the CertificateVerify handshake message failed. */#define POLARSSL_ERR_SSL_BAD_HS_CHANGE_CIPHER_SPEC         -0x7E00  /**< Processing of the ChangeCipherSpec handshake message failed. */#define POLARSSL_ERR_SSL_BAD_HS_FINISHED                   -0x7E80  /**< Processing of the Finished handshake message failed. *//* * Various constants */#define SSL_MAJOR_VERSION_3             3#define SSL_MINOR_VERSION_0             0   /*!< SSL v3.0 */#define SSL_MINOR_VERSION_1             1   /*!< TLS v1.0 */#define SSL_MINOR_VERSION_2             2   /*!< TLS v1.1 */#define SSL_IS_CLIENT                   0#define SSL_IS_SERVER                   1#define SSL_COMPRESS_NULL               0#define SSL_VERIFY_NONE                 0#define SSL_VERIFY_OPTIONAL             1#define SSL_VERIFY_REQUIRED             2//#define SSL_MAX_CONTENT_LEN         16384#define SSL_MAX_CONTENT_LEN         2024/* * Allow an extra 512 bytes for the record header * and encryption overhead (counter + MAC + padding). */#define SSL_BUFFER_LEN (SSL_MAX_CONTENT_LEN + 512)/* * Supported ciphersuites */#define SSL_RSA_RC4_128_MD5          0x04#define SSL_RSA_RC4_128_SHA          0x05#define SSL_RSA_DES_168_SHA          0x0A#define SSL_EDH_RSA_DES_168_SHA      0x16#define SSL_RSA_AES_128_SHA          0x2F#define SSL_EDH_RSA_AES_128_SHA      0x33#define SSL_RSA_AES_256_SHA          0x35#define SSL_EDH_RSA_AES_256_SHA      0x39#define SSL_RSA_CAMELLIA_128_SHA     0x41#define SSL_EDH_RSA_CAMELLIA_128_SHA 0x45#define SSL_RSA_CAMELLIA_256_SHA     0x84#define SSL_EDH_RSA_CAMELLIA_256_SHA 0x88/* * Message, alert and handshake types */#define SSL_MSG_CHANGE_CIPHER_SPEC     20#define SSL_MSG_ALERT                  21#define SSL_MSG_HANDSHAKE              22#define SSL_MSG_APPLICATION_DATA       23#define SSL_ALERT_LEVEL_WARNING         1#define SSL_ALERT_LEVEL_FATAL           2#define SSL_ALERT_MSG_CLOSE_NOTIFY           0#define SSL_ALERT_MSG_UNEXPECTED_MESSAGE    10#define SSL_ALERT_MSG_BAD_RECORD_MAC        20#define SSL_ALERT_MSG_DECRYPTION_FAILED     21#define SSL_ALERT_MSG_RECORD_OVERFLOW       22#define SSL_ALERT_MSG_DECOMPRESSION_FAILURE 30#define SSL_ALERT_MSG_HANDSHAKE_FAILURE     40#define SSL_ALERT_MSG_NO_CERT               41#define SSL_ALERT_MSG_BAD_CERT              42#define SSL_ALERT_MSG_UNSUPPORTED_CERT      43#define SSL_ALERT_MSG_CERT_REVOKED          44#define SSL_ALERT_MSG_CERT_EXPIRED          45#define SSL_ALERT_MSG_CERT_UNKNOWN          46#define SSL_ALERT_MSG_ILLEGAL_PARAMETER     47#define SSL_ALERT_MSG_UNKNOWN_CA            48#define SSL_ALERT_MSG_ACCESS_DENIED         49#define SSL_ALERT_MSG_DECODE_ERROR          50#define SSL_ALERT_MSG_DECRYPT_ERROR         51#define SSL_ALERT_MSG_EXPORT_RESTRICTION    60#define SSL_ALERT_MSG_PROTOCOL_VERSION      70#define SSL_ALERT_MSG_INSUFFICIENT_SECURITY 71#define SSL_ALERT_MSG_INTERNAL_ERROR        80#define SSL_ALERT_MSG_USER_CANCELED         90#define SSL_ALERT_MSG_NO_RENEGOTIATION     100#define SSL_HS_HELLO_REQUEST            0#define SSL_HS_CLIENT_HELLO             1#define SSL_HS_SERVER_HELLO             2#define SSL_HS_CERTIFICATE             11#define SSL_HS_SERVER_KEY_EXCHANGE     12#define SSL_HS_CERTIFICATE_REQUEST     13#define SSL_HS_SERVER_HELLO_DONE       14#define SSL_HS_CERTIFICATE_VERIFY      15#define SSL_HS_CLIENT_KEY_EXCHANGE     16#define SSL_HS_FINISHED                20/* * TLS extensions */#define TLS_EXT_SERVERNAME              0#define TLS_EXT_SERVERNAME_HOSTNAME     0/* * SSL state machine */typedef enum{    SSL_HELLO_REQUEST,    SSL_CLIENT_HELLO,    SSL_SERVER_HELLO,    SSL_SERVER_CERTIFICATE,    SSL_SERVER_KEY_EXCHANGE,    SSL_CERTIFICATE_REQUEST,    SSL_SERVER_HELLO_DONE,    SSL_CLIENT_CERTIFICATE,    SSL_CLIENT_KEY_EXCHANGE,    SSL_CERTIFICATE_VERIFY,    SSL_CLIENT_CHANGE_CIPHER_SPEC,    SSL_CLIENT_FINISHED,    SSL_SERVER_CHANGE_CIPHER_SPEC,    SSL_SERVER_FINISHED,    SSL_FLUSH_BUFFERS,    SSL_HANDSHAKE_OVER}ssl_states;typedef struct _ssl_session ssl_session;typedef struct _ssl_context ssl_context;/* * This structure is used for session resuming. */struct _ssl_session{    time_t start;               /*!< starting time      */    int ciphersuite;            /*!< chosen ciphersuite */    size_t length;              /*!< session id length  */    unsigned char id[32];       /*!< session identifier */    unsigned char master[48];   /*!< the master secret  */    ssl_session *next;          /*!< next session entry */};struct _ssl_context{    /*     * Miscellaneous     */    int state;                  /*!< SSL handshake: current state     */    int major_ver;              /*!< equal to  SSL_MAJOR_VERSION_3    */    int minor_ver;              /*!< either 0 (SSL3) or 1 (TLS1.0)    */    int max_major_ver;          /*!< max. major version from client   */    int max_minor_ver;          /*!< max. minor version from client   */    /*     * Callbacks (RNG, debug, I/O, verification)     */    int  (*f_rng)(void *);    void (*f_dbg)(void *, int, const char *);    int (*f_recv)(void *, unsigned char *, size_t);    int (*f_send)(void *, const unsigned char *, size_t);    int (*f_vrfy)(void *, x509_cert *, int, int);    void *p_rng;                /*!< context for the RNG function     */    void *p_dbg;                /*!< context for the debug function   */    void *p_recv;               /*!< context for reading operations   */    void *p_send;               /*!< context for writing operations   */    void *p_vrfy;               /*!< context for verification */    /*     * Session layer     */    int resume;                         /*!<  session resuming flag   */    int timeout;                        /*!<  sess. expiration time   */    ssl_session *session;               /*!<  current session data    */    int (*s_get)(ssl_context *);        /*!<  (server) get callback   */    int (*s_set)(ssl_context *);        /*!<  (server) set callback   */    /*     * Record layer (incoming data)     */    unsigned char *in_ctr;      /*!< 64-bit incoming message counter  */    unsigned char *in_hdr;      /*!< 5-byte record header (in_ctr+8)  */    unsigned char *in_msg;      /*!< the message contents (in_hdr+5)  */    unsigned char *in_offt;     /*!< read offset in application data  */    int in_msgtype;             /*!< record header: message type      */    size_t in_msglen;           /*!< record header: message length    */    size_t in_left;             /*!< amount of data read so far       */    size_t in_hslen;            /*!< current handshake message length */    int nb_zero;                /*!< # of 0-length encrypted messages */    /*     * Record layer (outgoing data)     */    unsigned char *out_ctr;     /*!< 64-bit outgoing message counter  */    unsigned char *out_hdr;     /*!< 5-byte record header (out_ctr+8) */    unsigned char *out_msg;     /*!< the message contents (out_hdr+5) */    int out_msgtype;            /*!< record header: message type      */    size_t out_msglen;          /*!< record header: message length    */    size_t out_left;            /*!< amount of data not yet written   */    /*     * PKI layer     */    rsa_context *rsa_key;               /*!<  own RSA private key     */#if defined(POLARSSL_PKCS11_C)    pkcs11_context *pkcs11_key;         /*!<  own PKCS#11 RSA private key */#endif    x509_cert *own_cert;                /*!<  own X.509 certificate   */    x509_cert *ca_chain;                /*!<  own trusted CA chain    */    x509_crl *ca_crl;                   /*!<  trusted CA CRLs         */    x509_cert *peer_cert;               /*!<  peer X.509 cert chain   */    const char *peer_cn;                /*!<  expected peer CN        */    int endpoint;                       /*!<  0: client, 1: server    */    int authmode;                       /*!<  verification mode       */    int client_auth;                    /*!<  flag for client auth.   */    int verify_result;                  /*!<  verification result     */    /*     * Crypto layer     */    dhm_context dhm_ctx;                /*!<  DHM key exchange        */    md5_context fin_md5;                /*!<  Finished MD5 checksum   */    sha1_context fin_sha1;              /*!<  Finished SHA-1 checksum */    int do_crypt;                       /*!<  en(de)cryption flag     */    int *ciphersuites;                  /*!<  allowed ciphersuites    */    size_t pmslen;                      /*!<  premaster length        */    unsigned int keylen;                /*!<  symmetric key length    */    size_t minlen;                      /*!<  min. ciphertext length  */    size_t ivlen;                       /*!<  IV length               */    size_t maclen;                      /*!<  MAC length              */    unsigned char randbytes[64];        /*!<  random bytes            */    unsigned char premaster[256];       /*!<  premaster secret        */    unsigned char iv_enc[16];           /*!<  IV (encryption)         */    unsigned char iv_dec[16];           /*!<  IV (decryption)         */    unsigned char mac_enc[32];          /*!<  MAC (encryption)        */    unsigned char mac_dec[32];          /*!<  MAC (decryption)        */    unsigned long ctx_enc[128];         /*!<  encryption context      */    unsigned long ctx_dec[128];         /*!<  decryption context      */    /*     * TLS extensions     */    unsigned char *hostname;    size_t         hostname_len;};#ifdef __cplusplusextern "C" {#endifextern int ssl_default_ciphersuites[];/** * \brief Returns the list of ciphersuites supported by the SSL/TLS module. * * \return              a statically allocated array of ciphersuites, the last *                      entry is 0. */static inline const int *ssl_list_ciphersuites( void ){    return ssl_default_ciphersuites;}/** * \brief               Return the name of the ciphersuite associated with the given *                      ID * * \param ciphersuite_id SSL ciphersuite ID * * \return              a string containing the ciphersuite name */const char *ssl_get_ciphersuite_name( const int ciphersuite_id );/** * \brief               Return the ID of the ciphersuite associated with the given *                      name * * \param ciphersuite_name SSL ciphersuite name * * \return              the ID with the ciphersuite or 0 if not found */int ssl_get_ciphersuite_id( const char *ciphersuite_name );/** * \brief          Initialize an SSL context * * \param ssl      SSL context * * \return         0 if successful, or 1 if memory allocation failed */int ssl_init( ssl_context *ssl );/** * \brief          Set the current endpoint type * * \param ssl      SSL context * \param endpoint must be SSL_IS_CLIENT or SSL_IS_SERVER */void ssl_set_endpoint( ssl_context *ssl, int endpoint );/** * \brief          Set the certificate verification mode * * \param ssl      SSL context * \param authmode can be: * *  SSL_VERIFY_NONE:      peer certificate is not checked (default), *                        this is insecure and SHOULD be avoided. * *  SSL_VERIFY_OPTIONAL:  peer certificate is checked, however the *                        handshake continues even if verification failed; *                        ssl_get_verify_result() can be called after the *                        handshake is complete. * *  SSL_VERIFY_REQUIRED:  peer *must* present a valid certificate, *                        handshake is aborted if verification failed. */void ssl_set_authmode( ssl_context *ssl, int authmode );/** * \brief          Set the verification callback (Optional). * *                 If set, the verification callback is called once for every *                 certificate in the chain. The verification function has the *                 following parameter: (void *parameter, x509_cert certificate, *                 int certifcate_depth, int preverify_ok). It should *                 return 0 on SUCCESS. * * \param ssl      SSL context * \param f_vrfy   verification function * \param p_vrfy   verification parameter */void ssl_set_verify( ssl_context *ssl,                     int (*f_vrfy)(void *, x509_cert *, int, int),                     void *p_vrfy );/** * \brief          Set the random number generator callback * * \param ssl      SSL context * \param f_rng    RNG function * \param p_rng    RNG parameter */void ssl_set_rng( ssl_context *ssl,                  int (*f_rng)(void *),                  void *p_rng );/** * \brief          Set the debug callback * * \param ssl      SSL context * \param f_dbg    debug function * \param p_dbg    debug parameter */void ssl_set_dbg( ssl_context *ssl,                  void (*f_dbg)(void *, int, const char *),                  void  *p_dbg );/** * \brief          Set the underlying BIO read and write callbacks * * \param ssl      SSL context * \param f_recv   read callback * \param p_recv   read parameter * \param f_send   write callback * \param p_send   write parameter */void ssl_set_bio( ssl_context *ssl,        int (*f_recv)(void *, unsigned char *, size_t), void *p_recv,        int (*f_send)(void *, const unsigned char *, size_t), void *p_send );/** * \brief          Set the session callbacks (server-side only) * * \param ssl      SSL context * \param s_get    session get callback * \param s_set    session set callback */void ssl_set_scb( ssl_context *ssl,                  int (*s_get)(ssl_context *),                  int (*s_set)(ssl_context *) );/** * \brief          Set the session resuming flag, timeout and data * * \param ssl      SSL context * \param resume   if 0 (default), the session will not be resumed * \param timeout  session timeout in seconds, or 0 (no timeout) * \param session  session context */void ssl_set_session( ssl_context *ssl, int resume, int timeout,                      ssl_session *session );/** * \brief               Set the list of allowed ciphersuites * * \param ssl           SSL context * \param ciphersuites  0-terminated list of allowed ciphersuites */void ssl_set_ciphersuites( ssl_context *ssl, int *ciphersuites );/** * \brief          Set the data required to verify peer certificate * * \param ssl      SSL context * \param ca_chain trusted CA chain * \param ca_crl   trusted CA CRLs * \param peer_cn  expected peer CommonName (or NULL) * * \note           TODO: add two more parameters: depth and crl */void ssl_set_ca_chain( ssl_context *ssl, x509_cert *ca_chain,                       x509_crl *ca_crl, const char *peer_cn );/** * \brief          Set own certificate and private key * * \param ssl      SSL context * \param own_cert own public certificate * \param rsa_key  own private RSA key */void ssl_set_own_cert( ssl_context *ssl, x509_cert *own_cert,                       rsa_context *rsa_key );#if defined(POLARSSL_PKCS11_C)/** * \brief          Set own certificate and PKCS#11 private key * * \param ssl      SSL context * \param own_cert own public certificate * \param pkcs11_key    own PKCS#11 RSA key */void ssl_set_own_cert_pkcs11( ssl_context *ssl, x509_cert *own_cert,                       pkcs11_context *pkcs11_key );#endif/** * \brief          Set the Diffie-Hellman public P and G values, *                 read as hexadecimal strings (server-side only) * * \param ssl      SSL context * \param dhm_P    Diffie-Hellman-Merkle modulus * \param dhm_G    Diffie-Hellman-Merkle generator * * \return         0 if successful */int ssl_set_dh_param( ssl_context *ssl, const char *dhm_P, const char *dhm_G );/** * \brief          Set the Diffie-Hellman public P and G values, *                 read from existing context (server-side only) * * \param ssl      SSL context * \param dhm_ctx  Diffie-Hellman-Merkle context * * \return         0 if successful */int ssl_set_dh_param_ctx( ssl_context *ssl, dhm_context *dhm_ctx );/** * \brief          Set hostname for ServerName TLS Extension *                  * * \param ssl      SSL context * \param hostname the server hostname * * \return         0 if successful */int ssl_set_hostname( ssl_context *ssl, const char *hostname );/** * \brief          Return the number of data bytes available to read * * \param ssl      SSL context * * \return         how many bytes are available in the read buffer */size_t ssl_get_bytes_avail( const ssl_context *ssl );/** * \brief          Return the result of the certificate verification * * \param ssl      SSL context * * \return         0 if successful, or a combination of: *                      BADCERT_EXPIRED *                      BADCERT_REVOKED *                      BADCERT_CN_MISMATCH *                      BADCERT_NOT_TRUSTED */int ssl_get_verify_result( const ssl_context *ssl );/** * \brief          Return the name of the current ciphersuite * * \param ssl      SSL context * * \return         a string containing the ciphersuite name */const char *ssl_get_ciphersuite( const ssl_context *ssl );/** * \brief          Return the current SSL version (SSLv3/TLSv1/etc) * * \param ssl      SSL context * * \return         a string containing the SSL version */const char *ssl_get_version( const ssl_context *ssl );/** * \brief          Perform the SSL handshake * * \param ssl      SSL context * * \return         0 if successful, POLARSSL_ERR_NET_WANT_READ, *                 POLARSSL_ERR_NET_WANT_WRITE, or a specific SSL error code. */int ssl_handshake( ssl_context *ssl );/** * \brief          Read at most 'len' application data bytes * * \param ssl      SSL context * \param buf      buffer that will hold the data * \param len      how many bytes must be read * * \return         This function returns the number of bytes read, 0 for EOF, *                 or a negative error code. */int ssl_read( ssl_context *ssl, unsigned char *buf, size_t len );/** * \brief          Write exactly 'len' application data bytes * * \param ssl      SSL context * \param buf      buffer holding the data * \param len      how many bytes must be written * * \return         This function returns the number of bytes written, *                 or a negative error code. * * \note           When this function returns POLARSSL_ERR_NET_WANT_WRITE, *                 it must be called later with the *same* arguments, *                 until it returns a positive value. */int ssl_write( ssl_context *ssl, const unsigned char *buf, size_t len );/** * \brief          Notify the peer that the connection is being closed * * \param ssl      SSL context */int ssl_close_notify( ssl_context *ssl );/** * \brief          Free an SSL context * * \param ssl      SSL context */void ssl_free( ssl_context *ssl );/* * Internal functions (do not call directly) */int ssl_handshake_client( ssl_context *ssl );int ssl_handshake_server( ssl_context *ssl );int ssl_derive_keys( ssl_context *ssl );void ssl_calc_verify( ssl_context *ssl, unsigned char hash[36] );int ssl_read_record( ssl_context *ssl );/** * \return         0 if successful, POLARSSL_ERR_SSL_CONN_EOF on EOF or *                 another negative error code. */int ssl_fetch_input( ssl_context *ssl, size_t nb_want );int ssl_write_record( ssl_context *ssl );int ssl_flush_output( ssl_context *ssl );int ssl_parse_certificate( ssl_context *ssl );int ssl_write_certificate( ssl_context *ssl );int ssl_parse_change_cipher_spec( ssl_context *ssl );int ssl_write_change_cipher_spec( ssl_context *ssl );int ssl_parse_finished( ssl_context *ssl );int ssl_write_finished( ssl_context *ssl );#ifdef __cplusplus}#endif#endif /* ssl.h */
 |