xref: /dflybsd-src/contrib/wpa_supplicant/src/tls/tlsv1_client_i.h (revision 3a84a4273475ed07d0ab1c2dfeffdfedef35d9cd)
16d49e1aeSJan Lentfer /*
26d49e1aeSJan Lentfer  * TLSv1 client - internal structures
33ff40c12SJohn Marino  * Copyright (c) 2006-2011, Jouni Malinen <j@w1.fi>
46d49e1aeSJan Lentfer  *
53ff40c12SJohn Marino  * This software may be distributed under the terms of the BSD license.
63ff40c12SJohn Marino  * See README for more details.
76d49e1aeSJan Lentfer  */
86d49e1aeSJan Lentfer 
96d49e1aeSJan Lentfer #ifndef TLSV1_CLIENT_I_H
106d49e1aeSJan Lentfer #define TLSV1_CLIENT_I_H
116d49e1aeSJan Lentfer 
126d49e1aeSJan Lentfer struct tlsv1_client {
136d49e1aeSJan Lentfer 	enum {
146d49e1aeSJan Lentfer 		CLIENT_HELLO, SERVER_HELLO, SERVER_CERTIFICATE,
156d49e1aeSJan Lentfer 		SERVER_KEY_EXCHANGE, SERVER_CERTIFICATE_REQUEST,
166d49e1aeSJan Lentfer 		SERVER_HELLO_DONE, CLIENT_KEY_EXCHANGE, CHANGE_CIPHER_SPEC,
176d49e1aeSJan Lentfer 		SERVER_CHANGE_CIPHER_SPEC, SERVER_FINISHED, ACK_FINISHED,
186d49e1aeSJan Lentfer 		ESTABLISHED, FAILED
196d49e1aeSJan Lentfer 	} state;
206d49e1aeSJan Lentfer 
216d49e1aeSJan Lentfer 	struct tlsv1_record_layer rl;
226d49e1aeSJan Lentfer 
236d49e1aeSJan Lentfer 	u8 session_id[TLS_SESSION_ID_MAX_LEN];
246d49e1aeSJan Lentfer 	size_t session_id_len;
256d49e1aeSJan Lentfer 	u8 client_random[TLS_RANDOM_LEN];
266d49e1aeSJan Lentfer 	u8 server_random[TLS_RANDOM_LEN];
276d49e1aeSJan Lentfer 	u8 master_secret[TLS_MASTER_SECRET_LEN];
286d49e1aeSJan Lentfer 
296d49e1aeSJan Lentfer 	u8 alert_level;
306d49e1aeSJan Lentfer 	u8 alert_description;
316d49e1aeSJan Lentfer 
32*a1157835SDaniel Fojt 	unsigned int flags; /* TLS_CONN_* bitfield */
33*a1157835SDaniel Fojt 
346d49e1aeSJan Lentfer 	unsigned int certificate_requested:1;
356d49e1aeSJan Lentfer 	unsigned int session_resumed:1;
366d49e1aeSJan Lentfer 	unsigned int session_ticket_included:1;
376d49e1aeSJan Lentfer 	unsigned int use_session_ticket:1;
38*a1157835SDaniel Fojt 	unsigned int cert_in_cb:1;
39*a1157835SDaniel Fojt 	unsigned int ocsp_resp_received:1;
406d49e1aeSJan Lentfer 
416d49e1aeSJan Lentfer 	struct crypto_public_key *server_rsa_key;
426d49e1aeSJan Lentfer 
436d49e1aeSJan Lentfer 	struct tls_verify_hash verify;
446d49e1aeSJan Lentfer 
456d49e1aeSJan Lentfer #define MAX_CIPHER_COUNT 30
466d49e1aeSJan Lentfer 	u16 cipher_suites[MAX_CIPHER_COUNT];
476d49e1aeSJan Lentfer 	size_t num_cipher_suites;
486d49e1aeSJan Lentfer 
496d49e1aeSJan Lentfer 	u16 prev_cipher_suite;
506d49e1aeSJan Lentfer 
516d49e1aeSJan Lentfer 	u8 *client_hello_ext;
526d49e1aeSJan Lentfer 	size_t client_hello_ext_len;
536d49e1aeSJan Lentfer 
546d49e1aeSJan Lentfer 	/* The prime modulus used for Diffie-Hellman */
556d49e1aeSJan Lentfer 	u8 *dh_p;
566d49e1aeSJan Lentfer 	size_t dh_p_len;
576d49e1aeSJan Lentfer 	/* The generator used for Diffie-Hellman */
586d49e1aeSJan Lentfer 	u8 *dh_g;
596d49e1aeSJan Lentfer 	size_t dh_g_len;
606d49e1aeSJan Lentfer 	/* The server's Diffie-Hellman public value */
616d49e1aeSJan Lentfer 	u8 *dh_ys;
626d49e1aeSJan Lentfer 	size_t dh_ys_len;
636d49e1aeSJan Lentfer 
646d49e1aeSJan Lentfer 	struct tlsv1_credentials *cred;
656d49e1aeSJan Lentfer 
666d49e1aeSJan Lentfer 	tlsv1_client_session_ticket_cb session_ticket_cb;
676d49e1aeSJan Lentfer 	void *session_ticket_cb_ctx;
683ff40c12SJohn Marino 
693ff40c12SJohn Marino 	struct wpabuf *partial_input;
70*a1157835SDaniel Fojt 
71*a1157835SDaniel Fojt 	void (*event_cb)(void *ctx, enum tls_event ev,
72*a1157835SDaniel Fojt 			 union tls_event_data *data);
73*a1157835SDaniel Fojt 	void *cb_ctx;
74*a1157835SDaniel Fojt 
75*a1157835SDaniel Fojt 	struct x509_certificate *server_cert;
766d49e1aeSJan Lentfer };
776d49e1aeSJan Lentfer 
786d49e1aeSJan Lentfer 
796d49e1aeSJan Lentfer void tls_alert(struct tlsv1_client *conn, u8 level, u8 description);
806d49e1aeSJan Lentfer void tlsv1_client_free_dh(struct tlsv1_client *conn);
816d49e1aeSJan Lentfer int tls_derive_pre_master_secret(u8 *pre_master_secret);
826d49e1aeSJan Lentfer int tls_derive_keys(struct tlsv1_client *conn,
836d49e1aeSJan Lentfer 		    const u8 *pre_master_secret, size_t pre_master_secret_len);
846d49e1aeSJan Lentfer u8 * tls_send_client_hello(struct tlsv1_client *conn, size_t *out_len);
856d49e1aeSJan Lentfer u8 * tlsv1_client_send_alert(struct tlsv1_client *conn, u8 level,
866d49e1aeSJan Lentfer 			     u8 description, size_t *out_len);
876d49e1aeSJan Lentfer u8 * tlsv1_client_handshake_write(struct tlsv1_client *conn, size_t *out_len,
886d49e1aeSJan Lentfer 				  int no_appl_data);
896d49e1aeSJan Lentfer int tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct,
906d49e1aeSJan Lentfer 				   const u8 *buf, size_t *len,
916d49e1aeSJan Lentfer 				   u8 **out_data, size_t *out_len);
926d49e1aeSJan Lentfer 
93*a1157835SDaniel Fojt enum tls_ocsp_result {
94*a1157835SDaniel Fojt 	TLS_OCSP_NO_RESPONSE, TLS_OCSP_INVALID, TLS_OCSP_GOOD, TLS_OCSP_REVOKED
95*a1157835SDaniel Fojt };
96*a1157835SDaniel Fojt 
97*a1157835SDaniel Fojt enum tls_ocsp_result tls_process_ocsp_response(struct tlsv1_client *conn,
98*a1157835SDaniel Fojt 					       const u8 *resp, size_t len);
99*a1157835SDaniel Fojt 
1006d49e1aeSJan Lentfer #endif /* TLSV1_CLIENT_I_H */
101