123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683 |
- /**
- * \file ssl.h
- *
- * \brief SSL/TLS functions.
- *
- * Copyright (C) 2006-2010, Brainspark B.V.
- *
- * This file is part of PolarSSL (http://www.polarssl.org)
- * Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
- *
- * All rights reserved.
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License along
- * with this program; if not, write to the Free Software Foundation, Inc.,
- * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
- */
- #ifndef POLARSSL_SSL_H
- #define POLARSSL_SSL_H
- #include <time.h>
- #include "polarssl/net.h"
- #include "polarssl/dhm.h"
- #include "polarssl/rsa.h"
- #include "polarssl/md5.h"
- #include "polarssl/sha1.h"
- #include "polarssl/x509.h"
- #include "config.h"
- #if defined(POLARSSL_PKCS11_C)
- #include "polarssl/pkcs11.h"
- #endif
- #if defined(_MSC_VER) && !defined(inline)
- #define inline _inline
- #else
- #if defined(__ARMCC_VERSION) && !defined(inline)
- #define inline __inline
- #endif /* __ARMCC_VERSION */
- #endif /*_MSC_VER */
- /*
- * SSL Error codes
- */
- #define POLARSSL_ERR_SSL_FEATURE_UNAVAILABLE -0x7080 /**< The requested feature is not available. */
- #define POLARSSL_ERR_SSL_BAD_INPUT_DATA -0x7100 /**< Bad input parameters to function. */
- #define POLARSSL_ERR_SSL_INVALID_MAC -0x7180 /**< Verification of the message MAC failed. */
- #define POLARSSL_ERR_SSL_INVALID_RECORD -0x7200 /**< An invalid SSL record was received. */
- #define POLARSSL_ERR_SSL_CONN_EOF -0x7280 /**< The connection indicated an EOF. */
- #define POLARSSL_ERR_SSL_UNKNOWN_CIPHER -0x7300 /**< An unknown cipher was received. */
- #define POLARSSL_ERR_SSL_NO_CIPHER_CHOSEN -0x7380 /**< The server has no ciphersuites in common with the client. */
- #define POLARSSL_ERR_SSL_NO_SESSION_FOUND -0x7400 /**< No session to recover was found. */
- #define POLARSSL_ERR_SSL_NO_CLIENT_CERTIFICATE -0x7480 /**< No client certification received from the client, but required by the authentication mode. */
- #define POLARSSL_ERR_SSL_CERTIFICATE_TOO_LARGE -0x7500 /**< Our own certificate(s) is/are too large to send in an SSL message.*/
- #define POLARSSL_ERR_SSL_CERTIFICATE_REQUIRED -0x7580 /**< The own certificate is not set, but needed by the server. */
- #define POLARSSL_ERR_SSL_PRIVATE_KEY_REQUIRED -0x7600 /**< The own private key is not set, but needed. */
- #define POLARSSL_ERR_SSL_CA_CHAIN_REQUIRED -0x7680 /**< No CA Chain is set, but required to operate. */
- #define POLARSSL_ERR_SSL_UNEXPECTED_MESSAGE -0x7700 /**< An unexpected message was received from our peer. */
- #define POLARSSL_ERR_SSL_FATAL_ALERT_MESSAGE -0x7780 /**< A fatal alert message was received from our peer. */
- #define POLARSSL_ERR_SSL_PEER_VERIFY_FAILED -0x7800 /**< Verification of our peer failed. */
- #define POLARSSL_ERR_SSL_PEER_CLOSE_NOTIFY -0x7880 /**< The peer notified us that the connection is going to be closed. */
- #define POLARSSL_ERR_SSL_BAD_HS_CLIENT_HELLO -0x7900 /**< Processing of the ClientHello handshake message failed. */
- #define POLARSSL_ERR_SSL_BAD_HS_SERVER_HELLO -0x7980 /**< Processing of the ServerHello handshake message failed. */
- #define POLARSSL_ERR_SSL_BAD_HS_CERTIFICATE -0x7A00 /**< Processing of the Certificate handshake message failed. */
- #define POLARSSL_ERR_SSL_BAD_HS_CERTIFICATE_REQUEST -0x7A80 /**< Processing of the CertificateRequest handshake message failed. */
- #define POLARSSL_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE -0x7B00 /**< Processing of the ServerKeyExchange handshake message failed. */
- #define POLARSSL_ERR_SSL_BAD_HS_SERVER_HELLO_DONE -0x7B80 /**< Processing of the ServerHelloDone handshake message failed. */
- #define POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE -0x7C00 /**< Processing of the ClientKeyExchange handshake message failed. */
- #define POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_DHM_RP -0x7C80 /**< Processing of the ClientKeyExchange handshake message failed in DHM Read Public. */
- #define POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_DHM_CS -0x7D00 /**< Processing of the ClientKeyExchange handshake message failed in DHM Calculate Secret. */
- #define POLARSSL_ERR_SSL_BAD_HS_CERTIFICATE_VERIFY -0x7D80 /**< Processing of the CertificateVerify handshake message failed. */
- #define POLARSSL_ERR_SSL_BAD_HS_CHANGE_CIPHER_SPEC -0x7E00 /**< Processing of the ChangeCipherSpec handshake message failed. */
- #define POLARSSL_ERR_SSL_BAD_HS_FINISHED -0x7E80 /**< Processing of the Finished handshake message failed. */
- /*
- * Various constants
- */
- #define SSL_MAJOR_VERSION_3 3
- #define SSL_MINOR_VERSION_0 0 /*!< SSL v3.0 */
- #define SSL_MINOR_VERSION_1 1 /*!< TLS v1.0 */
- #define SSL_MINOR_VERSION_2 2 /*!< TLS v1.1 */
- #define SSL_IS_CLIENT 0
- #define SSL_IS_SERVER 1
- #define SSL_COMPRESS_NULL 0
- #define SSL_VERIFY_NONE 0
- #define SSL_VERIFY_OPTIONAL 1
- #define SSL_VERIFY_REQUIRED 2
- //#define SSL_MAX_CONTENT_LEN 16384
- #define SSL_MAX_CONTENT_LEN 2024
- /*
- * Allow an extra 512 bytes for the record header
- * and encryption overhead (counter + MAC + padding).
- */
- #define SSL_BUFFER_LEN (SSL_MAX_CONTENT_LEN + 512)
- /*
- * Supported ciphersuites
- */
- #define SSL_RSA_RC4_128_MD5 0x04
- #define SSL_RSA_RC4_128_SHA 0x05
- #define SSL_RSA_DES_168_SHA 0x0A
- #define SSL_EDH_RSA_DES_168_SHA 0x16
- #define SSL_RSA_AES_128_SHA 0x2F
- #define SSL_EDH_RSA_AES_128_SHA 0x33
- #define SSL_RSA_AES_256_SHA 0x35
- #define SSL_EDH_RSA_AES_256_SHA 0x39
- #define SSL_RSA_CAMELLIA_128_SHA 0x41
- #define SSL_EDH_RSA_CAMELLIA_128_SHA 0x45
- #define SSL_RSA_CAMELLIA_256_SHA 0x84
- #define SSL_EDH_RSA_CAMELLIA_256_SHA 0x88
- /*
- * Message, alert and handshake types
- */
- #define SSL_MSG_CHANGE_CIPHER_SPEC 20
- #define SSL_MSG_ALERT 21
- #define SSL_MSG_HANDSHAKE 22
- #define SSL_MSG_APPLICATION_DATA 23
- #define SSL_ALERT_LEVEL_WARNING 1
- #define SSL_ALERT_LEVEL_FATAL 2
- #define SSL_ALERT_MSG_CLOSE_NOTIFY 0
- #define SSL_ALERT_MSG_UNEXPECTED_MESSAGE 10
- #define SSL_ALERT_MSG_BAD_RECORD_MAC 20
- #define SSL_ALERT_MSG_DECRYPTION_FAILED 21
- #define SSL_ALERT_MSG_RECORD_OVERFLOW 22
- #define SSL_ALERT_MSG_DECOMPRESSION_FAILURE 30
- #define SSL_ALERT_MSG_HANDSHAKE_FAILURE 40
- #define SSL_ALERT_MSG_NO_CERT 41
- #define SSL_ALERT_MSG_BAD_CERT 42
- #define SSL_ALERT_MSG_UNSUPPORTED_CERT 43
- #define SSL_ALERT_MSG_CERT_REVOKED 44
- #define SSL_ALERT_MSG_CERT_EXPIRED 45
- #define SSL_ALERT_MSG_CERT_UNKNOWN 46
- #define SSL_ALERT_MSG_ILLEGAL_PARAMETER 47
- #define SSL_ALERT_MSG_UNKNOWN_CA 48
- #define SSL_ALERT_MSG_ACCESS_DENIED 49
- #define SSL_ALERT_MSG_DECODE_ERROR 50
- #define SSL_ALERT_MSG_DECRYPT_ERROR 51
- #define SSL_ALERT_MSG_EXPORT_RESTRICTION 60
- #define SSL_ALERT_MSG_PROTOCOL_VERSION 70
- #define SSL_ALERT_MSG_INSUFFICIENT_SECURITY 71
- #define SSL_ALERT_MSG_INTERNAL_ERROR 80
- #define SSL_ALERT_MSG_USER_CANCELED 90
- #define SSL_ALERT_MSG_NO_RENEGOTIATION 100
- #define SSL_HS_HELLO_REQUEST 0
- #define SSL_HS_CLIENT_HELLO 1
- #define SSL_HS_SERVER_HELLO 2
- #define SSL_HS_CERTIFICATE 11
- #define SSL_HS_SERVER_KEY_EXCHANGE 12
- #define SSL_HS_CERTIFICATE_REQUEST 13
- #define SSL_HS_SERVER_HELLO_DONE 14
- #define SSL_HS_CERTIFICATE_VERIFY 15
- #define SSL_HS_CLIENT_KEY_EXCHANGE 16
- #define SSL_HS_FINISHED 20
- /*
- * TLS extensions
- */
- #define TLS_EXT_SERVERNAME 0
- #define TLS_EXT_SERVERNAME_HOSTNAME 0
- /*
- * SSL state machine
- */
- typedef enum
- {
- SSL_HELLO_REQUEST,
- SSL_CLIENT_HELLO,
- SSL_SERVER_HELLO,
- SSL_SERVER_CERTIFICATE,
- SSL_SERVER_KEY_EXCHANGE,
- SSL_CERTIFICATE_REQUEST,
- SSL_SERVER_HELLO_DONE,
- SSL_CLIENT_CERTIFICATE,
- SSL_CLIENT_KEY_EXCHANGE,
- SSL_CERTIFICATE_VERIFY,
- SSL_CLIENT_CHANGE_CIPHER_SPEC,
- SSL_CLIENT_FINISHED,
- SSL_SERVER_CHANGE_CIPHER_SPEC,
- SSL_SERVER_FINISHED,
- SSL_FLUSH_BUFFERS,
- SSL_HANDSHAKE_OVER
- }
- ssl_states;
- typedef struct _ssl_session ssl_session;
- typedef struct _ssl_context ssl_context;
- /*
- * This structure is used for session resuming.
- */
- struct _ssl_session
- {
- time_t start; /*!< starting time */
- int ciphersuite; /*!< chosen ciphersuite */
- size_t length; /*!< session id length */
- unsigned char id[32]; /*!< session identifier */
- unsigned char master[48]; /*!< the master secret */
- ssl_session *next; /*!< next session entry */
- };
- struct _ssl_context
- {
- /*
- * Miscellaneous
- */
- int state; /*!< SSL handshake: current state */
- int major_ver; /*!< equal to SSL_MAJOR_VERSION_3 */
- int minor_ver; /*!< either 0 (SSL3) or 1 (TLS1.0) */
- int max_major_ver; /*!< max. major version from client */
- int max_minor_ver; /*!< max. minor version from client */
- /*
- * Callbacks (RNG, debug, I/O, verification)
- */
- int (*f_rng)(void *);
- void (*f_dbg)(void *, int, const char *);
- int (*f_recv)(void *, unsigned char *, size_t);
- int (*f_send)(void *, const unsigned char *, size_t);
- int (*f_vrfy)(void *, x509_cert *, int, int);
- void *p_rng; /*!< context for the RNG function */
- void *p_dbg; /*!< context for the debug function */
- void *p_recv; /*!< context for reading operations */
- void *p_send; /*!< context for writing operations */
- void *p_vrfy; /*!< context for verification */
- /*
- * Session layer
- */
- int resume; /*!< session resuming flag */
- int timeout; /*!< sess. expiration time */
- ssl_session *session; /*!< current session data */
- int (*s_get)(ssl_context *); /*!< (server) get callback */
- int (*s_set)(ssl_context *); /*!< (server) set callback */
- /*
- * Record layer (incoming data)
- */
- unsigned char *in_ctr; /*!< 64-bit incoming message counter */
- unsigned char *in_hdr; /*!< 5-byte record header (in_ctr+8) */
- unsigned char *in_msg; /*!< the message contents (in_hdr+5) */
- unsigned char *in_offt; /*!< read offset in application data */
- int in_msgtype; /*!< record header: message type */
- size_t in_msglen; /*!< record header: message length */
- size_t in_left; /*!< amount of data read so far */
- size_t in_hslen; /*!< current handshake message length */
- int nb_zero; /*!< # of 0-length encrypted messages */
- /*
- * Record layer (outgoing data)
- */
- unsigned char *out_ctr; /*!< 64-bit outgoing message counter */
- unsigned char *out_hdr; /*!< 5-byte record header (out_ctr+8) */
- unsigned char *out_msg; /*!< the message contents (out_hdr+5) */
- int out_msgtype; /*!< record header: message type */
- size_t out_msglen; /*!< record header: message length */
- size_t out_left; /*!< amount of data not yet written */
- /*
- * PKI layer
- */
- rsa_context *rsa_key; /*!< own RSA private key */
- #if defined(POLARSSL_PKCS11_C)
- pkcs11_context *pkcs11_key; /*!< own PKCS#11 RSA private key */
- #endif
- x509_cert *own_cert; /*!< own X.509 certificate */
- x509_cert *ca_chain; /*!< own trusted CA chain */
- x509_crl *ca_crl; /*!< trusted CA CRLs */
- x509_cert *peer_cert; /*!< peer X.509 cert chain */
- const char *peer_cn; /*!< expected peer CN */
- int endpoint; /*!< 0: client, 1: server */
- int authmode; /*!< verification mode */
- int client_auth; /*!< flag for client auth. */
- int verify_result; /*!< verification result */
- /*
- * Crypto layer
- */
- dhm_context dhm_ctx; /*!< DHM key exchange */
- md5_context fin_md5; /*!< Finished MD5 checksum */
- sha1_context fin_sha1; /*!< Finished SHA-1 checksum */
- int do_crypt; /*!< en(de)cryption flag */
- int *ciphersuites; /*!< allowed ciphersuites */
- size_t pmslen; /*!< premaster length */
- unsigned int keylen; /*!< symmetric key length */
- size_t minlen; /*!< min. ciphertext length */
- size_t ivlen; /*!< IV length */
- size_t maclen; /*!< MAC length */
- unsigned char randbytes[64]; /*!< random bytes */
- unsigned char premaster[256]; /*!< premaster secret */
- unsigned char iv_enc[16]; /*!< IV (encryption) */
- unsigned char iv_dec[16]; /*!< IV (decryption) */
- unsigned char mac_enc[32]; /*!< MAC (encryption) */
- unsigned char mac_dec[32]; /*!< MAC (decryption) */
- unsigned long ctx_enc[128]; /*!< encryption context */
- unsigned long ctx_dec[128]; /*!< decryption context */
- /*
- * TLS extensions
- */
- unsigned char *hostname;
- size_t hostname_len;
- };
- #ifdef __cplusplus
- extern "C" {
- #endif
- extern int ssl_default_ciphersuites[];
- /**
- * \brief Returns the list of ciphersuites supported by the SSL/TLS module.
- *
- * \return a statically allocated array of ciphersuites, the last
- * entry is 0.
- */
- static inline const int *ssl_list_ciphersuites( void )
- {
- return ssl_default_ciphersuites;
- }
- /**
- * \brief Return the name of the ciphersuite associated with the given
- * ID
- *
- * \param ciphersuite_id SSL ciphersuite ID
- *
- * \return a string containing the ciphersuite name
- */
- const char *ssl_get_ciphersuite_name( const int ciphersuite_id );
- /**
- * \brief Return the ID of the ciphersuite associated with the given
- * name
- *
- * \param ciphersuite_name SSL ciphersuite name
- *
- * \return the ID with the ciphersuite or 0 if not found
- */
- int ssl_get_ciphersuite_id( const char *ciphersuite_name );
- /**
- * \brief Initialize an SSL context
- *
- * \param ssl SSL context
- *
- * \return 0 if successful, or 1 if memory allocation failed
- */
- int ssl_init( ssl_context *ssl );
- /**
- * \brief Set the current endpoint type
- *
- * \param ssl SSL context
- * \param endpoint must be SSL_IS_CLIENT or SSL_IS_SERVER
- */
- void ssl_set_endpoint( ssl_context *ssl, int endpoint );
- /**
- * \brief Set the certificate verification mode
- *
- * \param ssl SSL context
- * \param authmode can be:
- *
- * SSL_VERIFY_NONE: peer certificate is not checked (default),
- * this is insecure and SHOULD be avoided.
- *
- * SSL_VERIFY_OPTIONAL: peer certificate is checked, however the
- * handshake continues even if verification failed;
- * ssl_get_verify_result() can be called after the
- * handshake is complete.
- *
- * SSL_VERIFY_REQUIRED: peer *must* present a valid certificate,
- * handshake is aborted if verification failed.
- */
- void ssl_set_authmode( ssl_context *ssl, int authmode );
- /**
- * \brief Set the verification callback (Optional).
- *
- * If set, the verification callback is called once for every
- * certificate in the chain. The verification function has the
- * following parameter: (void *parameter, x509_cert certificate,
- * int certifcate_depth, int preverify_ok). It should
- * return 0 on SUCCESS.
- *
- * \param ssl SSL context
- * \param f_vrfy verification function
- * \param p_vrfy verification parameter
- */
- void ssl_set_verify( ssl_context *ssl,
- int (*f_vrfy)(void *, x509_cert *, int, int),
- void *p_vrfy );
- /**
- * \brief Set the random number generator callback
- *
- * \param ssl SSL context
- * \param f_rng RNG function
- * \param p_rng RNG parameter
- */
- void ssl_set_rng( ssl_context *ssl,
- int (*f_rng)(void *),
- void *p_rng );
- /**
- * \brief Set the debug callback
- *
- * \param ssl SSL context
- * \param f_dbg debug function
- * \param p_dbg debug parameter
- */
- void ssl_set_dbg( ssl_context *ssl,
- void (*f_dbg)(void *, int, const char *),
- void *p_dbg );
- /**
- * \brief Set the underlying BIO read and write callbacks
- *
- * \param ssl SSL context
- * \param f_recv read callback
- * \param p_recv read parameter
- * \param f_send write callback
- * \param p_send write parameter
- */
- void ssl_set_bio( ssl_context *ssl,
- int (*f_recv)(void *, unsigned char *, size_t), void *p_recv,
- int (*f_send)(void *, const unsigned char *, size_t), void *p_send );
- /**
- * \brief Set the session callbacks (server-side only)
- *
- * \param ssl SSL context
- * \param s_get session get callback
- * \param s_set session set callback
- */
- void ssl_set_scb( ssl_context *ssl,
- int (*s_get)(ssl_context *),
- int (*s_set)(ssl_context *) );
- /**
- * \brief Set the session resuming flag, timeout and data
- *
- * \param ssl SSL context
- * \param resume if 0 (default), the session will not be resumed
- * \param timeout session timeout in seconds, or 0 (no timeout)
- * \param session session context
- */
- void ssl_set_session( ssl_context *ssl, int resume, int timeout,
- ssl_session *session );
- /**
- * \brief Set the list of allowed ciphersuites
- *
- * \param ssl SSL context
- * \param ciphersuites 0-terminated list of allowed ciphersuites
- */
- void ssl_set_ciphersuites( ssl_context *ssl, int *ciphersuites );
- /**
- * \brief Set the data required to verify peer certificate
- *
- * \param ssl SSL context
- * \param ca_chain trusted CA chain
- * \param ca_crl trusted CA CRLs
- * \param peer_cn expected peer CommonName (or NULL)
- *
- * \note TODO: add two more parameters: depth and crl
- */
- void ssl_set_ca_chain( ssl_context *ssl, x509_cert *ca_chain,
- x509_crl *ca_crl, const char *peer_cn );
- /**
- * \brief Set own certificate and private key
- *
- * \param ssl SSL context
- * \param own_cert own public certificate
- * \param rsa_key own private RSA key
- */
- void ssl_set_own_cert( ssl_context *ssl, x509_cert *own_cert,
- rsa_context *rsa_key );
- #if defined(POLARSSL_PKCS11_C)
- /**
- * \brief Set own certificate and PKCS#11 private key
- *
- * \param ssl SSL context
- * \param own_cert own public certificate
- * \param pkcs11_key own PKCS#11 RSA key
- */
- void ssl_set_own_cert_pkcs11( ssl_context *ssl, x509_cert *own_cert,
- pkcs11_context *pkcs11_key );
- #endif
- /**
- * \brief Set the Diffie-Hellman public P and G values,
- * read as hexadecimal strings (server-side only)
- *
- * \param ssl SSL context
- * \param dhm_P Diffie-Hellman-Merkle modulus
- * \param dhm_G Diffie-Hellman-Merkle generator
- *
- * \return 0 if successful
- */
- int ssl_set_dh_param( ssl_context *ssl, const char *dhm_P, const char *dhm_G );
- /**
- * \brief Set the Diffie-Hellman public P and G values,
- * read from existing context (server-side only)
- *
- * \param ssl SSL context
- * \param dhm_ctx Diffie-Hellman-Merkle context
- *
- * \return 0 if successful
- */
- int ssl_set_dh_param_ctx( ssl_context *ssl, dhm_context *dhm_ctx );
- /**
- * \brief Set hostname for ServerName TLS Extension
- *
- *
- * \param ssl SSL context
- * \param hostname the server hostname
- *
- * \return 0 if successful
- */
- int ssl_set_hostname( ssl_context *ssl, const char *hostname );
- /**
- * \brief Return the number of data bytes available to read
- *
- * \param ssl SSL context
- *
- * \return how many bytes are available in the read buffer
- */
- size_t ssl_get_bytes_avail( const ssl_context *ssl );
- /**
- * \brief Return the result of the certificate verification
- *
- * \param ssl SSL context
- *
- * \return 0 if successful, or a combination of:
- * BADCERT_EXPIRED
- * BADCERT_REVOKED
- * BADCERT_CN_MISMATCH
- * BADCERT_NOT_TRUSTED
- */
- int ssl_get_verify_result( const ssl_context *ssl );
- /**
- * \brief Return the name of the current ciphersuite
- *
- * \param ssl SSL context
- *
- * \return a string containing the ciphersuite name
- */
- const char *ssl_get_ciphersuite( const ssl_context *ssl );
- /**
- * \brief Return the current SSL version (SSLv3/TLSv1/etc)
- *
- * \param ssl SSL context
- *
- * \return a string containing the SSL version
- */
- const char *ssl_get_version( const ssl_context *ssl );
- /**
- * \brief Perform the SSL handshake
- *
- * \param ssl SSL context
- *
- * \return 0 if successful, POLARSSL_ERR_NET_WANT_READ,
- * POLARSSL_ERR_NET_WANT_WRITE, or a specific SSL error code.
- */
- int ssl_handshake( ssl_context *ssl );
- /**
- * \brief Read at most 'len' application data bytes
- *
- * \param ssl SSL context
- * \param buf buffer that will hold the data
- * \param len how many bytes must be read
- *
- * \return This function returns the number of bytes read, 0 for EOF,
- * or a negative error code.
- */
- int ssl_read( ssl_context *ssl, unsigned char *buf, size_t len );
- /**
- * \brief Write exactly 'len' application data bytes
- *
- * \param ssl SSL context
- * \param buf buffer holding the data
- * \param len how many bytes must be written
- *
- * \return This function returns the number of bytes written,
- * or a negative error code.
- *
- * \note When this function returns POLARSSL_ERR_NET_WANT_WRITE,
- * it must be called later with the *same* arguments,
- * until it returns a positive value.
- */
- int ssl_write( ssl_context *ssl, const unsigned char *buf, size_t len );
- /**
- * \brief Notify the peer that the connection is being closed
- *
- * \param ssl SSL context
- */
- int ssl_close_notify( ssl_context *ssl );
- /**
- * \brief Free an SSL context
- *
- * \param ssl SSL context
- */
- void ssl_free( ssl_context *ssl );
- /*
- * Internal functions (do not call directly)
- */
- int ssl_handshake_client( ssl_context *ssl );
- int ssl_handshake_server( ssl_context *ssl );
- int ssl_derive_keys( ssl_context *ssl );
- void ssl_calc_verify( ssl_context *ssl, unsigned char hash[36] );
- int ssl_read_record( ssl_context *ssl );
- /**
- * \return 0 if successful, POLARSSL_ERR_SSL_CONN_EOF on EOF or
- * another negative error code.
- */
- int ssl_fetch_input( ssl_context *ssl, size_t nb_want );
- int ssl_write_record( ssl_context *ssl );
- int ssl_flush_output( ssl_context *ssl );
- int ssl_parse_certificate( ssl_context *ssl );
- int ssl_write_certificate( ssl_context *ssl );
- int ssl_parse_change_cipher_spec( ssl_context *ssl );
- int ssl_write_change_cipher_spec( ssl_context *ssl );
- int ssl_parse_finished( ssl_context *ssl );
- int ssl_write_finished( ssl_context *ssl );
- #ifdef __cplusplus
- }
- #endif
- #endif /* ssl.h */
|