1 /* 2 * TLSv1 client - internal structures 3 * Copyright (c) 2006-2011, Jouni Malinen <j@w1.fi> 4 * 5 * This software may be distributed under the terms of the BSD license. 6 * See README for more details. 7 */ 8 9 #ifndef TLSV1_CLIENT_I_H 10 #define TLSV1_CLIENT_I_H 11 12 struct tlsv1_client { 13 enum { 14 CLIENT_HELLO, SERVER_HELLO, SERVER_CERTIFICATE, 15 SERVER_KEY_EXCHANGE, SERVER_CERTIFICATE_REQUEST, 16 SERVER_HELLO_DONE, CLIENT_KEY_EXCHANGE, CHANGE_CIPHER_SPEC, 17 SERVER_CHANGE_CIPHER_SPEC, SERVER_FINISHED, ACK_FINISHED, 18 ESTABLISHED, FAILED 19 } state; 20 21 struct tlsv1_record_layer rl; 22 23 u8 session_id[TLS_SESSION_ID_MAX_LEN]; 24 size_t session_id_len; 25 u8 client_random[TLS_RANDOM_LEN]; 26 u8 server_random[TLS_RANDOM_LEN]; 27 u8 master_secret[TLS_MASTER_SECRET_LEN]; 28 29 u8 alert_level; 30 u8 alert_description; 31 32 unsigned int flags; /* TLS_CONN_* bitfield */ 33 34 unsigned int certificate_requested:1; 35 unsigned int session_resumed:1; 36 unsigned int session_ticket_included:1; 37 unsigned int use_session_ticket:1; 38 unsigned int cert_in_cb:1; 39 unsigned int ocsp_resp_received:1; 40 41 struct crypto_public_key *server_rsa_key; 42 43 struct tls_verify_hash verify; 44 45 #define MAX_CIPHER_COUNT 30 46 u16 cipher_suites[MAX_CIPHER_COUNT]; 47 size_t num_cipher_suites; 48 49 u16 prev_cipher_suite; 50 51 u8 *client_hello_ext; 52 size_t client_hello_ext_len; 53 54 /* The prime modulus used for Diffie-Hellman */ 55 u8 *dh_p; 56 size_t dh_p_len; 57 /* The generator used for Diffie-Hellman */ 58 u8 *dh_g; 59 size_t dh_g_len; 60 /* The server's Diffie-Hellman public value */ 61 u8 *dh_ys; 62 size_t dh_ys_len; 63 64 struct tlsv1_credentials *cred; 65 66 tlsv1_client_session_ticket_cb session_ticket_cb; 67 void *session_ticket_cb_ctx; 68 69 struct wpabuf *partial_input; 70 71 void (*event_cb)(void *ctx, enum tls_event ev, 72 union tls_event_data *data); 73 void *cb_ctx; 74 75 struct x509_certificate *server_cert; 76 }; 77 78 79 void tls_alert(struct tlsv1_client *conn, u8 level, u8 description); 80 void tlsv1_client_free_dh(struct tlsv1_client *conn); 81 u16 tls_client_highest_ver(struct tlsv1_client *conn); 82 int tls_derive_pre_master_secret(struct tlsv1_client *conn, 83 u8 *pre_master_secret); 84 int tls_derive_keys(struct tlsv1_client *conn, 85 const u8 *pre_master_secret, size_t pre_master_secret_len); 86 u8 * tls_send_client_hello(struct tlsv1_client *conn, size_t *out_len); 87 u8 * tlsv1_client_send_alert(struct tlsv1_client *conn, u8 level, 88 u8 description, size_t *out_len); 89 u8 * tlsv1_client_handshake_write(struct tlsv1_client *conn, size_t *out_len, 90 int no_appl_data); 91 int tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, 92 const u8 *buf, size_t *len, 93 u8 **out_data, size_t *out_len); 94 95 enum tls_ocsp_result { 96 TLS_OCSP_NO_RESPONSE, TLS_OCSP_INVALID, TLS_OCSP_GOOD, TLS_OCSP_REVOKED 97 }; 98 99 enum tls_ocsp_result tls_process_ocsp_response(struct tlsv1_client *conn, 100 const u8 *resp, size_t len); 101 102 #endif /* TLSV1_CLIENT_I_H */ 103