tlsv1_client_i.h 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100
  1. /*
  2. * TLSv1 client - internal structures
  3. * Copyright (c) 2006-2011, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #ifndef TLSV1_CLIENT_I_H
  9. #define TLSV1_CLIENT_I_H
  10. struct tlsv1_client {
  11. enum {
  12. CLIENT_HELLO, SERVER_HELLO, SERVER_CERTIFICATE,
  13. SERVER_KEY_EXCHANGE, SERVER_CERTIFICATE_REQUEST,
  14. SERVER_HELLO_DONE, CLIENT_KEY_EXCHANGE, CHANGE_CIPHER_SPEC,
  15. SERVER_CHANGE_CIPHER_SPEC, SERVER_FINISHED, ACK_FINISHED,
  16. ESTABLISHED, FAILED
  17. } state;
  18. struct tlsv1_record_layer rl;
  19. u8 session_id[TLS_SESSION_ID_MAX_LEN];
  20. size_t session_id_len;
  21. u8 client_random[TLS_RANDOM_LEN];
  22. u8 server_random[TLS_RANDOM_LEN];
  23. u8 master_secret[TLS_MASTER_SECRET_LEN];
  24. u8 alert_level;
  25. u8 alert_description;
  26. unsigned int flags; /* TLS_CONN_* bitfield */
  27. unsigned int certificate_requested:1;
  28. unsigned int session_resumed:1;
  29. unsigned int session_ticket_included:1;
  30. unsigned int use_session_ticket:1;
  31. unsigned int cert_in_cb:1;
  32. unsigned int ocsp_resp_received:1;
  33. struct crypto_public_key *server_rsa_key;
  34. struct tls_verify_hash verify;
  35. #define MAX_CIPHER_COUNT 30
  36. u16 cipher_suites[MAX_CIPHER_COUNT];
  37. size_t num_cipher_suites;
  38. u16 prev_cipher_suite;
  39. u8 *client_hello_ext;
  40. size_t client_hello_ext_len;
  41. /* The prime modulus used for Diffie-Hellman */
  42. u8 *dh_p;
  43. size_t dh_p_len;
  44. /* The generator used for Diffie-Hellman */
  45. u8 *dh_g;
  46. size_t dh_g_len;
  47. /* The server's Diffie-Hellman public value */
  48. u8 *dh_ys;
  49. size_t dh_ys_len;
  50. struct tlsv1_credentials *cred;
  51. tlsv1_client_session_ticket_cb session_ticket_cb;
  52. void *session_ticket_cb_ctx;
  53. struct wpabuf *partial_input;
  54. void (*event_cb)(void *ctx, enum tls_event ev,
  55. union tls_event_data *data);
  56. void *cb_ctx;
  57. struct x509_certificate *server_cert;
  58. };
  59. void tls_alert(struct tlsv1_client *conn, u8 level, u8 description);
  60. void tlsv1_client_free_dh(struct tlsv1_client *conn);
  61. int tls_derive_pre_master_secret(u8 *pre_master_secret);
  62. int tls_derive_keys(struct tlsv1_client *conn,
  63. const u8 *pre_master_secret, size_t pre_master_secret_len);
  64. u8 * tls_send_client_hello(struct tlsv1_client *conn, size_t *out_len);
  65. u8 * tlsv1_client_send_alert(struct tlsv1_client *conn, u8 level,
  66. u8 description, size_t *out_len);
  67. u8 * tlsv1_client_handshake_write(struct tlsv1_client *conn, size_t *out_len,
  68. int no_appl_data);
  69. int tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct,
  70. const u8 *buf, size_t *len,
  71. u8 **out_data, size_t *out_len);
  72. enum tls_ocsp_result {
  73. TLS_OCSP_NO_RESPONSE, TLS_OCSP_INVALID, TLS_OCSP_GOOD, TLS_OCSP_REVOKED
  74. };
  75. enum tls_ocsp_result tls_process_ocsp_response(struct tlsv1_client *conn,
  76. const u8 *resp, size_t len);
  77. #endif /* TLSV1_CLIENT_I_H */