16d49e1aeSJan Lentfer /* 26d49e1aeSJan Lentfer * TLSv1 client - internal structures 33ff40c12SJohn Marino * Copyright (c) 2006-2011, Jouni Malinen <j@w1.fi> 46d49e1aeSJan Lentfer * 53ff40c12SJohn Marino * This software may be distributed under the terms of the BSD license. 63ff40c12SJohn Marino * See README for more details. 76d49e1aeSJan Lentfer */ 86d49e1aeSJan Lentfer 96d49e1aeSJan Lentfer #ifndef TLSV1_CLIENT_I_H 106d49e1aeSJan Lentfer #define TLSV1_CLIENT_I_H 116d49e1aeSJan Lentfer 126d49e1aeSJan Lentfer struct tlsv1_client { 136d49e1aeSJan Lentfer enum { 146d49e1aeSJan Lentfer CLIENT_HELLO, SERVER_HELLO, SERVER_CERTIFICATE, 156d49e1aeSJan Lentfer SERVER_KEY_EXCHANGE, SERVER_CERTIFICATE_REQUEST, 166d49e1aeSJan Lentfer SERVER_HELLO_DONE, CLIENT_KEY_EXCHANGE, CHANGE_CIPHER_SPEC, 176d49e1aeSJan Lentfer SERVER_CHANGE_CIPHER_SPEC, SERVER_FINISHED, ACK_FINISHED, 186d49e1aeSJan Lentfer ESTABLISHED, FAILED 196d49e1aeSJan Lentfer } state; 206d49e1aeSJan Lentfer 216d49e1aeSJan Lentfer struct tlsv1_record_layer rl; 226d49e1aeSJan Lentfer 236d49e1aeSJan Lentfer u8 session_id[TLS_SESSION_ID_MAX_LEN]; 246d49e1aeSJan Lentfer size_t session_id_len; 256d49e1aeSJan Lentfer u8 client_random[TLS_RANDOM_LEN]; 266d49e1aeSJan Lentfer u8 server_random[TLS_RANDOM_LEN]; 276d49e1aeSJan Lentfer u8 master_secret[TLS_MASTER_SECRET_LEN]; 286d49e1aeSJan Lentfer 296d49e1aeSJan Lentfer u8 alert_level; 306d49e1aeSJan Lentfer u8 alert_description; 316d49e1aeSJan Lentfer 32*a1157835SDaniel Fojt unsigned int flags; /* TLS_CONN_* bitfield */ 33*a1157835SDaniel Fojt 346d49e1aeSJan Lentfer unsigned int certificate_requested:1; 356d49e1aeSJan Lentfer unsigned int session_resumed:1; 366d49e1aeSJan Lentfer unsigned int session_ticket_included:1; 376d49e1aeSJan Lentfer unsigned int use_session_ticket:1; 38*a1157835SDaniel Fojt unsigned int cert_in_cb:1; 39*a1157835SDaniel Fojt unsigned int ocsp_resp_received:1; 406d49e1aeSJan Lentfer 416d49e1aeSJan Lentfer struct crypto_public_key *server_rsa_key; 426d49e1aeSJan Lentfer 436d49e1aeSJan Lentfer struct tls_verify_hash verify; 446d49e1aeSJan Lentfer 456d49e1aeSJan Lentfer #define MAX_CIPHER_COUNT 30 466d49e1aeSJan Lentfer u16 cipher_suites[MAX_CIPHER_COUNT]; 476d49e1aeSJan Lentfer size_t num_cipher_suites; 486d49e1aeSJan Lentfer 496d49e1aeSJan Lentfer u16 prev_cipher_suite; 506d49e1aeSJan Lentfer 516d49e1aeSJan Lentfer u8 *client_hello_ext; 526d49e1aeSJan Lentfer size_t client_hello_ext_len; 536d49e1aeSJan Lentfer 546d49e1aeSJan Lentfer /* The prime modulus used for Diffie-Hellman */ 556d49e1aeSJan Lentfer u8 *dh_p; 566d49e1aeSJan Lentfer size_t dh_p_len; 576d49e1aeSJan Lentfer /* The generator used for Diffie-Hellman */ 586d49e1aeSJan Lentfer u8 *dh_g; 596d49e1aeSJan Lentfer size_t dh_g_len; 606d49e1aeSJan Lentfer /* The server's Diffie-Hellman public value */ 616d49e1aeSJan Lentfer u8 *dh_ys; 626d49e1aeSJan Lentfer size_t dh_ys_len; 636d49e1aeSJan Lentfer 646d49e1aeSJan Lentfer struct tlsv1_credentials *cred; 656d49e1aeSJan Lentfer 666d49e1aeSJan Lentfer tlsv1_client_session_ticket_cb session_ticket_cb; 676d49e1aeSJan Lentfer void *session_ticket_cb_ctx; 683ff40c12SJohn Marino 693ff40c12SJohn Marino struct wpabuf *partial_input; 70*a1157835SDaniel Fojt 71*a1157835SDaniel Fojt void (*event_cb)(void *ctx, enum tls_event ev, 72*a1157835SDaniel Fojt union tls_event_data *data); 73*a1157835SDaniel Fojt void *cb_ctx; 74*a1157835SDaniel Fojt 75*a1157835SDaniel Fojt struct x509_certificate *server_cert; 766d49e1aeSJan Lentfer }; 776d49e1aeSJan Lentfer 786d49e1aeSJan Lentfer 796d49e1aeSJan Lentfer void tls_alert(struct tlsv1_client *conn, u8 level, u8 description); 806d49e1aeSJan Lentfer void tlsv1_client_free_dh(struct tlsv1_client *conn); 816d49e1aeSJan Lentfer int tls_derive_pre_master_secret(u8 *pre_master_secret); 826d49e1aeSJan Lentfer int tls_derive_keys(struct tlsv1_client *conn, 836d49e1aeSJan Lentfer const u8 *pre_master_secret, size_t pre_master_secret_len); 846d49e1aeSJan Lentfer u8 * tls_send_client_hello(struct tlsv1_client *conn, size_t *out_len); 856d49e1aeSJan Lentfer u8 * tlsv1_client_send_alert(struct tlsv1_client *conn, u8 level, 866d49e1aeSJan Lentfer u8 description, size_t *out_len); 876d49e1aeSJan Lentfer u8 * tlsv1_client_handshake_write(struct tlsv1_client *conn, size_t *out_len, 886d49e1aeSJan Lentfer int no_appl_data); 896d49e1aeSJan Lentfer int tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, 906d49e1aeSJan Lentfer const u8 *buf, size_t *len, 916d49e1aeSJan Lentfer u8 **out_data, size_t *out_len); 926d49e1aeSJan Lentfer 93*a1157835SDaniel Fojt enum tls_ocsp_result { 94*a1157835SDaniel Fojt TLS_OCSP_NO_RESPONSE, TLS_OCSP_INVALID, TLS_OCSP_GOOD, TLS_OCSP_REVOKED 95*a1157835SDaniel Fojt }; 96*a1157835SDaniel Fojt 97*a1157835SDaniel Fojt enum tls_ocsp_result tls_process_ocsp_response(struct tlsv1_client *conn, 98*a1157835SDaniel Fojt const u8 *resp, size_t len); 99*a1157835SDaniel Fojt 1006d49e1aeSJan Lentfer #endif /* TLSV1_CLIENT_I_H */ 101