139beb93cSSam Leffler /* 239beb93cSSam Leffler * TLSv1 server - internal structures 339beb93cSSam Leffler * Copyright (c) 2006-2007, Jouni Malinen <j@w1.fi> 439beb93cSSam Leffler * 5f05cddf9SRui Paulo * This software may be distributed under the terms of the BSD license. 6f05cddf9SRui Paulo * See README for more details. 739beb93cSSam Leffler */ 839beb93cSSam Leffler 939beb93cSSam Leffler #ifndef TLSV1_SERVER_I_H 1039beb93cSSam Leffler #define TLSV1_SERVER_I_H 1139beb93cSSam Leffler 1239beb93cSSam Leffler struct tlsv1_server { 1339beb93cSSam Leffler enum { 1439beb93cSSam Leffler CLIENT_HELLO, SERVER_HELLO, SERVER_CERTIFICATE, 1539beb93cSSam Leffler SERVER_KEY_EXCHANGE, SERVER_CERTIFICATE_REQUEST, 1639beb93cSSam Leffler SERVER_HELLO_DONE, CLIENT_CERTIFICATE, CLIENT_KEY_EXCHANGE, 1739beb93cSSam Leffler CERTIFICATE_VERIFY, CHANGE_CIPHER_SPEC, CLIENT_FINISHED, 1839beb93cSSam Leffler SERVER_CHANGE_CIPHER_SPEC, SERVER_FINISHED, 1939beb93cSSam Leffler ESTABLISHED, FAILED 2039beb93cSSam Leffler } state; 2139beb93cSSam Leffler 2239beb93cSSam Leffler struct tlsv1_record_layer rl; 2339beb93cSSam Leffler 2439beb93cSSam Leffler u8 session_id[TLS_SESSION_ID_MAX_LEN]; 2539beb93cSSam Leffler size_t session_id_len; 2639beb93cSSam Leffler u8 client_random[TLS_RANDOM_LEN]; 2739beb93cSSam Leffler u8 server_random[TLS_RANDOM_LEN]; 2839beb93cSSam Leffler u8 master_secret[TLS_MASTER_SECRET_LEN]; 2939beb93cSSam Leffler 3039beb93cSSam Leffler u8 alert_level; 3139beb93cSSam Leffler u8 alert_description; 3239beb93cSSam Leffler 3339beb93cSSam Leffler struct crypto_public_key *client_rsa_key; 3439beb93cSSam Leffler 3539beb93cSSam Leffler struct tls_verify_hash verify; 3639beb93cSSam Leffler 3739beb93cSSam Leffler #define MAX_CIPHER_COUNT 30 3839beb93cSSam Leffler u16 cipher_suites[MAX_CIPHER_COUNT]; 3939beb93cSSam Leffler size_t num_cipher_suites; 4039beb93cSSam Leffler 4139beb93cSSam Leffler u16 cipher_suite; 4239beb93cSSam Leffler 4339beb93cSSam Leffler struct tlsv1_credentials *cred; 4439beb93cSSam Leffler 4539beb93cSSam Leffler int verify_peer; 4639beb93cSSam Leffler u16 client_version; 4739beb93cSSam Leffler 4839beb93cSSam Leffler u8 *session_ticket; 4939beb93cSSam Leffler size_t session_ticket_len; 5039beb93cSSam Leffler 5139beb93cSSam Leffler tlsv1_server_session_ticket_cb session_ticket_cb; 5239beb93cSSam Leffler void *session_ticket_cb_ctx; 5339beb93cSSam Leffler 54*5b9c547cSRui Paulo void (*log_cb)(void *ctx, const char *msg); 55*5b9c547cSRui Paulo void *log_cb_ctx; 56*5b9c547cSRui Paulo 5739beb93cSSam Leffler int use_session_ticket; 5839beb93cSSam Leffler 5939beb93cSSam Leffler u8 *dh_secret; 6039beb93cSSam Leffler size_t dh_secret_len; 61*5b9c547cSRui Paulo 62*5b9c547cSRui Paulo #ifdef CONFIG_TESTING_OPTIONS 63*5b9c547cSRui Paulo u32 test_flags; 64*5b9c547cSRui Paulo int test_failure_reported; 65*5b9c547cSRui Paulo #endif /* CONFIG_TESTING_OPTIONS */ 6639beb93cSSam Leffler }; 6739beb93cSSam Leffler 6839beb93cSSam Leffler 69*5b9c547cSRui Paulo void tlsv1_server_log(struct tlsv1_server *conn, const char *fmt, ...) 70*5b9c547cSRui Paulo PRINTF_FORMAT(2, 3); 71*5b9c547cSRui Paulo 7239beb93cSSam Leffler void tlsv1_server_alert(struct tlsv1_server *conn, u8 level, u8 description); 7339beb93cSSam Leffler int tlsv1_server_derive_keys(struct tlsv1_server *conn, 7439beb93cSSam Leffler const u8 *pre_master_secret, 7539beb93cSSam Leffler size_t pre_master_secret_len); 7639beb93cSSam Leffler u8 * tlsv1_server_handshake_write(struct tlsv1_server *conn, size_t *out_len); 7739beb93cSSam Leffler u8 * tlsv1_server_send_alert(struct tlsv1_server *conn, u8 level, 7839beb93cSSam Leffler u8 description, size_t *out_len); 7939beb93cSSam Leffler int tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct, 8039beb93cSSam Leffler const u8 *buf, size_t *len); 81*5b9c547cSRui Paulo void tlsv1_server_get_dh_p(struct tlsv1_server *conn, const u8 **dh_p, 82*5b9c547cSRui Paulo size_t *dh_p_len); 8339beb93cSSam Leffler 8439beb93cSSam Leffler #endif /* TLSV1_SERVER_I_H */ 85