xref: /freebsd/contrib/wpa/src/crypto/tls_internal.c (revision b9f654b163bce26de79705e77b872427c9f2afa1)
1 /*
2  * TLS interface functions and an internal TLS implementation
3  * Copyright (c) 2004-2019, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  *
8  * This file interface functions for hostapd/wpa_supplicant to use the
9  * integrated TLSv1 implementation.
10  */
11 
12 #include "includes.h"
13 
14 #include "common.h"
15 #include "tls.h"
16 #include "tls/tlsv1_client.h"
17 #include "tls/tlsv1_server.h"
18 
19 
20 static int tls_ref_count = 0;
21 
22 struct tls_global {
23 	int server;
24 	struct tlsv1_credentials *server_cred;
25 	int check_crl;
26 
27 	void (*event_cb)(void *ctx, enum tls_event ev,
28 			 union tls_event_data *data);
29 	void *cb_ctx;
30 	int cert_in_cb;
31 };
32 
33 struct tls_connection {
34 	struct tlsv1_client *client;
35 	struct tlsv1_server *server;
36 	struct tls_global *global;
37 };
38 
39 
40 void * tls_init(const struct tls_config *conf)
41 {
42 	struct tls_global *global;
43 
44 	if (tls_ref_count == 0) {
45 #ifdef CONFIG_TLS_INTERNAL_CLIENT
46 		if (tlsv1_client_global_init())
47 			return NULL;
48 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
49 #ifdef CONFIG_TLS_INTERNAL_SERVER
50 		if (tlsv1_server_global_init())
51 			return NULL;
52 #endif /* CONFIG_TLS_INTERNAL_SERVER */
53 	}
54 	tls_ref_count++;
55 
56 	global = os_zalloc(sizeof(*global));
57 	if (global == NULL)
58 		return NULL;
59 	if (conf) {
60 		global->event_cb = conf->event_cb;
61 		global->cb_ctx = conf->cb_ctx;
62 		global->cert_in_cb = conf->cert_in_cb;
63 	}
64 
65 	return global;
66 }
67 
68 void tls_deinit(void *ssl_ctx)
69 {
70 	struct tls_global *global = ssl_ctx;
71 	tls_ref_count--;
72 	if (tls_ref_count == 0) {
73 #ifdef CONFIG_TLS_INTERNAL_CLIENT
74 		tlsv1_client_global_deinit();
75 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
76 #ifdef CONFIG_TLS_INTERNAL_SERVER
77 		tlsv1_server_global_deinit();
78 #endif /* CONFIG_TLS_INTERNAL_SERVER */
79 	}
80 #ifdef CONFIG_TLS_INTERNAL_SERVER
81 	tlsv1_cred_free(global->server_cred);
82 #endif /* CONFIG_TLS_INTERNAL_SERVER */
83 	os_free(global);
84 }
85 
86 
87 int tls_get_errors(void *tls_ctx)
88 {
89 	return 0;
90 }
91 
92 
93 struct tls_connection * tls_connection_init(void *tls_ctx)
94 {
95 	struct tls_connection *conn;
96 	struct tls_global *global = tls_ctx;
97 
98 	conn = os_zalloc(sizeof(*conn));
99 	if (conn == NULL)
100 		return NULL;
101 	conn->global = global;
102 
103 #ifdef CONFIG_TLS_INTERNAL_CLIENT
104 	if (!global->server) {
105 		conn->client = tlsv1_client_init();
106 		if (conn->client == NULL) {
107 			os_free(conn);
108 			return NULL;
109 		}
110 		tlsv1_client_set_cb(conn->client, global->event_cb,
111 				    global->cb_ctx, global->cert_in_cb);
112 	}
113 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
114 #ifdef CONFIG_TLS_INTERNAL_SERVER
115 	if (global->server) {
116 		conn->server = tlsv1_server_init(global->server_cred);
117 		if (conn->server == NULL) {
118 			os_free(conn);
119 			return NULL;
120 		}
121 	}
122 #endif /* CONFIG_TLS_INTERNAL_SERVER */
123 
124 	return conn;
125 }
126 
127 
128 #ifdef CONFIG_TESTING_OPTIONS
129 #ifdef CONFIG_TLS_INTERNAL_SERVER
130 void tls_connection_set_test_flags(struct tls_connection *conn, u32 flags)
131 {
132 	if (conn->server)
133 		tlsv1_server_set_test_flags(conn->server, flags);
134 }
135 #endif /* CONFIG_TLS_INTERNAL_SERVER */
136 #endif /* CONFIG_TESTING_OPTIONS */
137 
138 
139 void tls_connection_set_log_cb(struct tls_connection *conn,
140 			       void (*log_cb)(void *ctx, const char *msg),
141 			       void *ctx)
142 {
143 #ifdef CONFIG_TLS_INTERNAL_SERVER
144 	if (conn->server)
145 		tlsv1_server_set_log_cb(conn->server, log_cb, ctx);
146 #endif /* CONFIG_TLS_INTERNAL_SERVER */
147 }
148 
149 
150 void tls_connection_deinit(void *tls_ctx, struct tls_connection *conn)
151 {
152 	if (conn == NULL)
153 		return;
154 #ifdef CONFIG_TLS_INTERNAL_CLIENT
155 	if (conn->client)
156 		tlsv1_client_deinit(conn->client);
157 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
158 #ifdef CONFIG_TLS_INTERNAL_SERVER
159 	if (conn->server)
160 		tlsv1_server_deinit(conn->server);
161 #endif /* CONFIG_TLS_INTERNAL_SERVER */
162 	os_free(conn);
163 }
164 
165 
166 int tls_connection_established(void *tls_ctx, struct tls_connection *conn)
167 {
168 #ifdef CONFIG_TLS_INTERNAL_CLIENT
169 	if (conn->client)
170 		return tlsv1_client_established(conn->client);
171 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
172 #ifdef CONFIG_TLS_INTERNAL_SERVER
173 	if (conn->server)
174 		return tlsv1_server_established(conn->server);
175 #endif /* CONFIG_TLS_INTERNAL_SERVER */
176 	return 0;
177 }
178 
179 
180 char * tls_connection_peer_serial_num(void *tls_ctx,
181 				      struct tls_connection *conn)
182 {
183 	/* TODO */
184 	return NULL;
185 }
186 
187 
188 int tls_connection_shutdown(void *tls_ctx, struct tls_connection *conn)
189 {
190 #ifdef CONFIG_TLS_INTERNAL_CLIENT
191 	if (conn->client)
192 		return tlsv1_client_shutdown(conn->client);
193 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
194 #ifdef CONFIG_TLS_INTERNAL_SERVER
195 	if (conn->server)
196 		return tlsv1_server_shutdown(conn->server);
197 #endif /* CONFIG_TLS_INTERNAL_SERVER */
198 	return -1;
199 }
200 
201 
202 int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn,
203 			      const struct tls_connection_params *params)
204 {
205 #ifdef CONFIG_TLS_INTERNAL_CLIENT
206 	struct tlsv1_credentials *cred;
207 
208 	if (conn->client == NULL)
209 		return -1;
210 
211 	if (params->flags & TLS_CONN_EXT_CERT_CHECK) {
212 		wpa_printf(MSG_INFO,
213 			   "TLS: tls_ext_cert_check=1 not supported");
214 		return -1;
215 	}
216 
217 	cred = tlsv1_cred_alloc();
218 	if (cred == NULL)
219 		return -1;
220 
221 	if (params->subject_match) {
222 		wpa_printf(MSG_INFO, "TLS: subject_match not supported");
223 		tlsv1_cred_free(cred);
224 		return -1;
225 	}
226 
227 	if (params->altsubject_match) {
228 		wpa_printf(MSG_INFO, "TLS: altsubject_match not supported");
229 		tlsv1_cred_free(cred);
230 		return -1;
231 	}
232 
233 	if (params->suffix_match) {
234 		wpa_printf(MSG_INFO, "TLS: suffix_match not supported");
235 		tlsv1_cred_free(cred);
236 		return -1;
237 	}
238 
239 	if (params->domain_match) {
240 		wpa_printf(MSG_INFO, "TLS: domain_match not supported");
241 		tlsv1_cred_free(cred);
242 		return -1;
243 	}
244 
245 	if (params->openssl_ciphers) {
246 		wpa_printf(MSG_INFO, "TLS: openssl_ciphers not supported");
247 		tlsv1_cred_free(cred);
248 		return -1;
249 	}
250 
251 	if (params->openssl_ecdh_curves) {
252 		wpa_printf(MSG_INFO, "TLS: openssl_ecdh_curves not supported");
253 		tlsv1_cred_free(cred);
254 		return -1;
255 	}
256 
257 	if (tlsv1_set_ca_cert(cred, params->ca_cert,
258 			      params->ca_cert_blob, params->ca_cert_blob_len,
259 			      params->ca_path)) {
260 		wpa_printf(MSG_INFO, "TLS: Failed to configure trusted CA "
261 			   "certificates");
262 		tlsv1_cred_free(cred);
263 		return -1;
264 	}
265 
266 	if (tlsv1_set_cert(cred, params->client_cert,
267 			   params->client_cert_blob,
268 			   params->client_cert_blob_len)) {
269 		wpa_printf(MSG_INFO, "TLS: Failed to configure client "
270 			   "certificate");
271 		tlsv1_cred_free(cred);
272 		return -1;
273 	}
274 
275 	if (tlsv1_set_private_key(cred, params->private_key,
276 				  params->private_key_passwd,
277 				  params->private_key_blob,
278 				  params->private_key_blob_len)) {
279 		wpa_printf(MSG_INFO, "TLS: Failed to load private key");
280 		tlsv1_cred_free(cred);
281 		return -1;
282 	}
283 
284 	if (tlsv1_set_dhparams(cred, params->dh_file, params->dh_blob,
285 			       params->dh_blob_len)) {
286 		wpa_printf(MSG_INFO, "TLS: Failed to load DH parameters");
287 		tlsv1_cred_free(cred);
288 		return -1;
289 	}
290 
291 	if (tlsv1_client_set_cred(conn->client, cred) < 0) {
292 		tlsv1_cred_free(cred);
293 		return -1;
294 	}
295 
296 	tlsv1_client_set_flags(conn->client, params->flags);
297 
298 	return 0;
299 #else /* CONFIG_TLS_INTERNAL_CLIENT */
300 	return -1;
301 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
302 }
303 
304 
305 int tls_global_set_params(void *tls_ctx,
306 			  const struct tls_connection_params *params)
307 {
308 #ifdef CONFIG_TLS_INTERNAL_SERVER
309 	struct tls_global *global = tls_ctx;
310 	struct tlsv1_credentials *cred;
311 
312 	if (params->check_cert_subject)
313 		return -1; /* not yet supported */
314 
315 	/* Currently, global parameters are only set when running in server
316 	 * mode. */
317 	global->server = 1;
318 	tlsv1_cred_free(global->server_cred);
319 	global->server_cred = cred = tlsv1_cred_alloc();
320 	if (cred == NULL)
321 		return -1;
322 
323 	if (tlsv1_set_ca_cert(cred, params->ca_cert, params->ca_cert_blob,
324 			      params->ca_cert_blob_len, params->ca_path)) {
325 		wpa_printf(MSG_INFO, "TLS: Failed to configure trusted CA "
326 			   "certificates");
327 		return -1;
328 	}
329 
330 	if (tlsv1_set_cert(cred, params->client_cert, params->client_cert_blob,
331 			   params->client_cert_blob_len)) {
332 		wpa_printf(MSG_INFO, "TLS: Failed to configure server "
333 			   "certificate");
334 		return -1;
335 	}
336 
337 	if (tlsv1_set_private_key(cred, params->private_key,
338 				  params->private_key_passwd,
339 				  params->private_key_blob,
340 				  params->private_key_blob_len)) {
341 		wpa_printf(MSG_INFO, "TLS: Failed to load private key");
342 		return -1;
343 	}
344 
345 	if (tlsv1_set_dhparams(cred, params->dh_file, params->dh_blob,
346 			       params->dh_blob_len)) {
347 		wpa_printf(MSG_INFO, "TLS: Failed to load DH parameters");
348 		return -1;
349 	}
350 
351 	if (params->ocsp_stapling_response)
352 		cred->ocsp_stapling_response =
353 			os_strdup(params->ocsp_stapling_response);
354 	if (params->ocsp_stapling_response_multi)
355 		cred->ocsp_stapling_response_multi =
356 			os_strdup(params->ocsp_stapling_response_multi);
357 
358 	return 0;
359 #else /* CONFIG_TLS_INTERNAL_SERVER */
360 	return -1;
361 #endif /* CONFIG_TLS_INTERNAL_SERVER */
362 }
363 
364 
365 int tls_global_set_verify(void *tls_ctx, int check_crl, int strict)
366 {
367 	struct tls_global *global = tls_ctx;
368 	global->check_crl = check_crl;
369 	return 0;
370 }
371 
372 
373 int tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn,
374 			      int verify_peer, unsigned int flags,
375 			      const u8 *session_ctx, size_t session_ctx_len)
376 {
377 #ifdef CONFIG_TLS_INTERNAL_SERVER
378 	if (conn->server)
379 		return tlsv1_server_set_verify(conn->server, verify_peer);
380 #endif /* CONFIG_TLS_INTERNAL_SERVER */
381 	return -1;
382 }
383 
384 
385 int tls_connection_get_random(void *tls_ctx, struct tls_connection *conn,
386 			      struct tls_random *data)
387 {
388 #ifdef CONFIG_TLS_INTERNAL_CLIENT
389 	if (conn->client)
390 		return tlsv1_client_get_random(conn->client, data);
391 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
392 #ifdef CONFIG_TLS_INTERNAL_SERVER
393 	if (conn->server)
394 		return tlsv1_server_get_random(conn->server, data);
395 #endif /* CONFIG_TLS_INTERNAL_SERVER */
396 	return -1;
397 }
398 
399 
400 static int tls_get_keyblock_size(struct tls_connection *conn)
401 {
402 #ifdef CONFIG_TLS_INTERNAL_CLIENT
403 	if (conn->client)
404 		return tlsv1_client_get_keyblock_size(conn->client);
405 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
406 #ifdef CONFIG_TLS_INTERNAL_SERVER
407 	if (conn->server)
408 		return tlsv1_server_get_keyblock_size(conn->server);
409 #endif /* CONFIG_TLS_INTERNAL_SERVER */
410 	return -1;
411 }
412 
413 
414 static int tls_connection_prf(void *tls_ctx, struct tls_connection *conn,
415 			      const char *label, const u8 *context,
416 			      size_t context_len, int server_random_first,
417 			      int skip_keyblock, u8 *out, size_t out_len)
418 {
419 	int ret = -1, skip = 0;
420 	u8 *tmp_out = NULL;
421 	u8 *_out = out;
422 
423 	if (skip_keyblock) {
424 		skip = tls_get_keyblock_size(conn);
425 		if (skip < 0)
426 			return -1;
427 		tmp_out = os_malloc(skip + out_len);
428 		if (!tmp_out)
429 			return -1;
430 		_out = tmp_out;
431 	}
432 
433 #ifdef CONFIG_TLS_INTERNAL_CLIENT
434 	if (conn->client) {
435 		ret = tlsv1_client_prf(conn->client, label, context,
436 				       context_len, server_random_first,
437 				       _out, skip + out_len);
438 	}
439 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
440 #ifdef CONFIG_TLS_INTERNAL_SERVER
441 	if (conn->server) {
442 		ret = tlsv1_server_prf(conn->server, label, context,
443 				       context_len, server_random_first,
444 				       _out, skip + out_len);
445 	}
446 #endif /* CONFIG_TLS_INTERNAL_SERVER */
447 	if (ret == 0 && skip_keyblock)
448 		os_memcpy(out, _out + skip, out_len);
449 	bin_clear_free(tmp_out, skip);
450 
451 	return ret;
452 }
453 
454 
455 int tls_connection_export_key(void *tls_ctx, struct tls_connection *conn,
456 			      const char *label, const u8 *context,
457 			      size_t context_len, u8 *out, size_t out_len)
458 {
459 	return tls_connection_prf(tls_ctx, conn, label, context, context_len,
460 				  0, 0, out, out_len);
461 }
462 
463 
464 int tls_connection_get_eap_fast_key(void *tls_ctx, struct tls_connection *conn,
465 				    u8 *out, size_t out_len)
466 {
467 	return tls_connection_prf(tls_ctx, conn, "key expansion", NULL, 0,
468 				  1, 1, out, out_len);
469 }
470 
471 
472 struct wpabuf * tls_connection_handshake(void *tls_ctx,
473 					 struct tls_connection *conn,
474 					 const struct wpabuf *in_data,
475 					 struct wpabuf **appl_data)
476 {
477 	return tls_connection_handshake2(tls_ctx, conn, in_data, appl_data,
478 					 NULL);
479 }
480 
481 
482 struct wpabuf * tls_connection_handshake2(void *tls_ctx,
483 					  struct tls_connection *conn,
484 					  const struct wpabuf *in_data,
485 					  struct wpabuf **appl_data,
486 					  int *need_more_data)
487 {
488 #ifdef CONFIG_TLS_INTERNAL_CLIENT
489 	u8 *res, *ad;
490 	size_t res_len, ad_len;
491 	struct wpabuf *out;
492 
493 	if (conn->client == NULL)
494 		return NULL;
495 
496 	ad = NULL;
497 	res = tlsv1_client_handshake(conn->client,
498 				     in_data ? wpabuf_head(in_data) : NULL,
499 				     in_data ? wpabuf_len(in_data) : 0,
500 				     &res_len, &ad, &ad_len, need_more_data);
501 	if (res == NULL)
502 		return NULL;
503 	out = wpabuf_alloc_ext_data(res, res_len);
504 	if (out == NULL) {
505 		os_free(res);
506 		os_free(ad);
507 		return NULL;
508 	}
509 	if (appl_data) {
510 		if (ad) {
511 			*appl_data = wpabuf_alloc_ext_data(ad, ad_len);
512 			if (*appl_data == NULL)
513 				os_free(ad);
514 		} else
515 			*appl_data = NULL;
516 	} else
517 		os_free(ad);
518 
519 	return out;
520 #else /* CONFIG_TLS_INTERNAL_CLIENT */
521 	return NULL;
522 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
523 }
524 
525 
526 struct wpabuf * tls_connection_server_handshake(void *tls_ctx,
527 						struct tls_connection *conn,
528 						const struct wpabuf *in_data,
529 						struct wpabuf **appl_data)
530 {
531 #ifdef CONFIG_TLS_INTERNAL_SERVER
532 	u8 *res;
533 	size_t res_len;
534 	struct wpabuf *out;
535 
536 	if (conn->server == NULL)
537 		return NULL;
538 
539 	if (appl_data)
540 		*appl_data = NULL;
541 
542 	res = tlsv1_server_handshake(conn->server, wpabuf_head(in_data),
543 				     wpabuf_len(in_data), &res_len);
544 	if (res == NULL && tlsv1_server_established(conn->server))
545 		return wpabuf_alloc(0);
546 	if (res == NULL)
547 		return NULL;
548 	out = wpabuf_alloc_ext_data(res, res_len);
549 	if (out == NULL) {
550 		os_free(res);
551 		return NULL;
552 	}
553 
554 	return out;
555 #else /* CONFIG_TLS_INTERNAL_SERVER */
556 	return NULL;
557 #endif /* CONFIG_TLS_INTERNAL_SERVER */
558 }
559 
560 
561 struct wpabuf * tls_connection_encrypt(void *tls_ctx,
562 				       struct tls_connection *conn,
563 				       const struct wpabuf *in_data)
564 {
565 #ifdef CONFIG_TLS_INTERNAL_CLIENT
566 	if (conn->client) {
567 		struct wpabuf *buf;
568 		int res;
569 		buf = wpabuf_alloc(wpabuf_len(in_data) + 300);
570 		if (buf == NULL)
571 			return NULL;
572 		res = tlsv1_client_encrypt(conn->client, wpabuf_head(in_data),
573 					   wpabuf_len(in_data),
574 					   wpabuf_mhead(buf),
575 					   wpabuf_size(buf));
576 		if (res < 0) {
577 			wpabuf_free(buf);
578 			return NULL;
579 		}
580 		wpabuf_put(buf, res);
581 		return buf;
582 	}
583 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
584 #ifdef CONFIG_TLS_INTERNAL_SERVER
585 	if (conn->server) {
586 		struct wpabuf *buf;
587 		int res;
588 		buf = wpabuf_alloc(wpabuf_len(in_data) + 300);
589 		if (buf == NULL)
590 			return NULL;
591 		res = tlsv1_server_encrypt(conn->server, wpabuf_head(in_data),
592 					   wpabuf_len(in_data),
593 					   wpabuf_mhead(buf),
594 					   wpabuf_size(buf));
595 		if (res < 0) {
596 			wpabuf_free(buf);
597 			return NULL;
598 		}
599 		wpabuf_put(buf, res);
600 		return buf;
601 	}
602 #endif /* CONFIG_TLS_INTERNAL_SERVER */
603 	return NULL;
604 }
605 
606 
607 struct wpabuf * tls_connection_decrypt(void *tls_ctx,
608 				       struct tls_connection *conn,
609 				       const struct wpabuf *in_data)
610 {
611 	return tls_connection_decrypt2(tls_ctx, conn, in_data, NULL);
612 }
613 
614 
615 struct wpabuf * tls_connection_decrypt2(void *tls_ctx,
616 					struct tls_connection *conn,
617 					const struct wpabuf *in_data,
618 					int *need_more_data)
619 {
620 	if (need_more_data)
621 		*need_more_data = 0;
622 
623 #ifdef CONFIG_TLS_INTERNAL_CLIENT
624 	if (conn->client) {
625 		return tlsv1_client_decrypt(conn->client, wpabuf_head(in_data),
626 					    wpabuf_len(in_data),
627 					    need_more_data);
628 	}
629 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
630 #ifdef CONFIG_TLS_INTERNAL_SERVER
631 	if (conn->server) {
632 		struct wpabuf *buf;
633 		int res;
634 		buf = wpabuf_alloc((wpabuf_len(in_data) + 500) * 3);
635 		if (buf == NULL)
636 			return NULL;
637 		res = tlsv1_server_decrypt(conn->server, wpabuf_head(in_data),
638 					   wpabuf_len(in_data),
639 					   wpabuf_mhead(buf),
640 					   wpabuf_size(buf));
641 		if (res < 0) {
642 			wpabuf_free(buf);
643 			return NULL;
644 		}
645 		wpabuf_put(buf, res);
646 		return buf;
647 	}
648 #endif /* CONFIG_TLS_INTERNAL_SERVER */
649 	return NULL;
650 }
651 
652 
653 int tls_connection_resumed(void *tls_ctx, struct tls_connection *conn)
654 {
655 #ifdef CONFIG_TLS_INTERNAL_CLIENT
656 	if (conn->client)
657 		return tlsv1_client_resumed(conn->client);
658 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
659 #ifdef CONFIG_TLS_INTERNAL_SERVER
660 	if (conn->server)
661 		return tlsv1_server_resumed(conn->server);
662 #endif /* CONFIG_TLS_INTERNAL_SERVER */
663 	return -1;
664 }
665 
666 
667 int tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn,
668 				   u8 *ciphers)
669 {
670 #ifdef CONFIG_TLS_INTERNAL_CLIENT
671 	if (conn->client)
672 		return tlsv1_client_set_cipher_list(conn->client, ciphers);
673 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
674 #ifdef CONFIG_TLS_INTERNAL_SERVER
675 	if (conn->server)
676 		return tlsv1_server_set_cipher_list(conn->server, ciphers);
677 #endif /* CONFIG_TLS_INTERNAL_SERVER */
678 	return -1;
679 }
680 
681 
682 int tls_get_version(void *ssl_ctx, struct tls_connection *conn,
683 		    char *buf, size_t buflen)
684 {
685 	if (conn == NULL)
686 		return -1;
687 #ifdef CONFIG_TLS_INTERNAL_CLIENT
688 	if (conn->client)
689 		return tlsv1_client_get_version(conn->client, buf, buflen);
690 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
691 	return -1;
692 }
693 
694 
695 int tls_get_cipher(void *tls_ctx, struct tls_connection *conn,
696 		   char *buf, size_t buflen)
697 {
698 	if (conn == NULL)
699 		return -1;
700 #ifdef CONFIG_TLS_INTERNAL_CLIENT
701 	if (conn->client)
702 		return tlsv1_client_get_cipher(conn->client, buf, buflen);
703 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
704 #ifdef CONFIG_TLS_INTERNAL_SERVER
705 	if (conn->server)
706 		return tlsv1_server_get_cipher(conn->server, buf, buflen);
707 #endif /* CONFIG_TLS_INTERNAL_SERVER */
708 	return -1;
709 }
710 
711 
712 int tls_connection_enable_workaround(void *tls_ctx,
713 				     struct tls_connection *conn)
714 {
715 	return -1;
716 }
717 
718 
719 int tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn,
720 				    int ext_type, const u8 *data,
721 				    size_t data_len)
722 {
723 #ifdef CONFIG_TLS_INTERNAL_CLIENT
724 	if (conn->client) {
725 		return tlsv1_client_hello_ext(conn->client, ext_type,
726 					      data, data_len);
727 	}
728 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
729 	return -1;
730 }
731 
732 
733 int tls_connection_get_failed(void *tls_ctx, struct tls_connection *conn)
734 {
735 #ifdef CONFIG_TLS_INTERNAL_SERVER
736 	if (conn->server)
737 		return tlsv1_server_get_failed(conn->server);
738 #endif /* CONFIG_TLS_INTERNAL_SERVER */
739 	return 0;
740 }
741 
742 
743 int tls_connection_get_read_alerts(void *tls_ctx, struct tls_connection *conn)
744 {
745 #ifdef CONFIG_TLS_INTERNAL_SERVER
746 	if (conn->server)
747 		return tlsv1_server_get_read_alerts(conn->server);
748 #endif /* CONFIG_TLS_INTERNAL_SERVER */
749 	return 0;
750 }
751 
752 
753 int tls_connection_get_write_alerts(void *tls_ctx,
754 				    struct tls_connection *conn)
755 {
756 #ifdef CONFIG_TLS_INTERNAL_SERVER
757 	if (conn->server)
758 		return tlsv1_server_get_write_alerts(conn->server);
759 #endif /* CONFIG_TLS_INTERNAL_SERVER */
760 	return 0;
761 }
762 
763 
764 int tls_connection_set_session_ticket_cb(void *tls_ctx,
765 					 struct tls_connection *conn,
766 					 tls_session_ticket_cb cb,
767 					 void *ctx)
768 {
769 #ifdef CONFIG_TLS_INTERNAL_CLIENT
770 	if (conn->client) {
771 		tlsv1_client_set_session_ticket_cb(conn->client, cb, ctx);
772 		return 0;
773 	}
774 #endif /* CONFIG_TLS_INTERNAL_CLIENT */
775 #ifdef CONFIG_TLS_INTERNAL_SERVER
776 	if (conn->server) {
777 		tlsv1_server_set_session_ticket_cb(conn->server, cb, ctx);
778 		return 0;
779 	}
780 #endif /* CONFIG_TLS_INTERNAL_SERVER */
781 	return -1;
782 }
783 
784 
785 int tls_get_library_version(char *buf, size_t buf_len)
786 {
787 	return os_snprintf(buf, buf_len, "internal");
788 }
789 
790 
791 void tls_connection_set_success_data(struct tls_connection *conn,
792 				     struct wpabuf *data)
793 {
794 }
795 
796 
797 void tls_connection_set_success_data_resumed(struct tls_connection *conn)
798 {
799 }
800 
801 
802 const struct wpabuf *
803 tls_connection_get_success_data(struct tls_connection *conn)
804 {
805 	return NULL;
806 }
807 
808 
809 void tls_connection_remove_session(struct tls_connection *conn)
810 {
811 }
812