2 * Copyright (C) 2010 Martin Willi
3 * Copyright (C) 2010 revosec AG
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License as published by the
7 * Free Software Foundation; either version 2 of the License, or (at your
8 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
12 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
17 * @defgroup tls_crypto tls_crypto
24 typedef struct tls_crypto_t tls_crypto_t
;
25 typedef enum tls_cipher_suite_t tls_cipher_suite_t
;
26 typedef enum tls_hash_algorithm_t tls_hash_algorithm_t
;
27 typedef enum tls_signature_algorithm_t tls_signature_algorithm_t
;
28 typedef enum tls_client_certificate_type_t tls_client_certificate_type_t
;
29 typedef enum tls_ecc_curve_type_t tls_ecc_curve_type_t
;
30 typedef enum tls_named_curve_t tls_named_curve_t
;
31 typedef enum tls_ansi_point_format_t tls_ansi_point_format_t
;
32 typedef enum tls_ec_point_format_t tls_ec_point_format_t
;
36 #include "tls_protection.h"
40 #include <credentials/keys/private_key.h>
45 enum tls_cipher_suite_t
{
46 TLS_NULL_WITH_NULL_NULL
= 0x0000,
47 TLS_RSA_WITH_NULL_MD5
= 0x0001,
48 TLS_RSA_WITH_NULL_SHA
= 0x0002,
49 TLS_RSA_EXPORT_WITH_RC4_40_MD5
= 0x0003,
50 TLS_RSA_WITH_RC4_128_MD5
= 0x0004,
51 TLS_RSA_WITH_RC4_128_SHA
= 0x0005,
52 TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
= 0x0006,
53 TLS_RSA_WITH_IDEA_CBC_SHA
= 0x0007,
54 TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
= 0x0008,
55 TLS_RSA_WITH_DES_CBC_SHA
= 0x0009,
56 TLS_RSA_WITH_3DES_EDE_CBC_SHA
= 0x000A,
57 TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA
= 0x000B,
58 TLS_DH_DSS_WITH_DES_CBC_SHA
= 0x000C,
59 TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA
= 0x000D,
60 TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA
= 0x000E,
61 TLS_DH_RSA_WITH_DES_CBC_SHA
= 0x000F,
62 TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA
= 0x0010,
63 TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
= 0x0011,
64 TLS_DHE_DSS_WITH_DES_CBC_SHA
= 0x0012,
65 TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
= 0x0013,
66 TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
= 0x0014,
67 TLS_DHE_RSA_WITH_DES_CBC_SHA
= 0x0015,
68 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
= 0x0016,
69 TLS_DH_anon_EXPORT_WITH_RC4_40_MD5
= 0x0017,
70 TLS_DH_anon_WITH_RC4_128_MD5
= 0x0018,
71 TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA
= 0x0019,
72 TLS_DH_anon_WITH_DES_CBC_SHA
= 0x001A,
73 TLS_DH_anon_WITH_3DES_EDE_CBC_SHA
= 0x001B,
75 TLS_KRB5_WITH_DES_CBC_SHA
= 0x001E,
76 TLS_KRB5_WITH_3DES_EDE_CBC_SHA
= 0x001F,
77 TLS_KRB5_WITH_RC4_128_SHA
= 0x0020,
78 TLS_KRB5_WITH_IDEA_CBC_SHA
= 0x0021,
79 TLS_KRB5_WITH_DES_CBC_MD5
= 0x0022,
80 TLS_KRB5_WITH_3DES_EDE_CBC_MD5
= 0x0023,
81 TLS_KRB5_WITH_RC4_128_MD5
= 0x0024,
82 TLS_KRB5_WITH_IDEA_CBC_MD5
= 0x0025,
83 TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
= 0x0026,
84 TLS_KRB5_EXPORT_WITH_RC2_CBC_40_SHA
= 0x0027,
85 TLS_KRB5_EXPORT_WITH_RC4_40_SHA
= 0x0028,
86 TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
= 0x0029,
87 TLS_KRB5_EXPORT_WITH_RC2_CBC_40_MD5
= 0x002A,
88 TLS_KRB5_EXPORT_WITH_RC4_40_MD5
= 0x002B,
89 TLS_PSK_WITH_NULL_SHA
= 0x002C,
90 TLS_DHE_PSK_WITH_NULL_SHA
= 0x002D,
91 TLS_RSA_PSK_WITH_NULL_SHA
= 0x002E,
92 TLS_RSA_WITH_AES_128_CBC_SHA
= 0x002F,
93 TLS_DH_DSS_WITH_AES_128_CBC_SHA
= 0x0030,
94 TLS_DH_RSA_WITH_AES_128_CBC_SHA
= 0x0031,
95 TLS_DHE_DSS_WITH_AES_128_CBC_SHA
= 0x0032,
96 TLS_DHE_RSA_WITH_AES_128_CBC_SHA
= 0x0033,
97 TLS_DH_anon_WITH_AES_128_CBC_SHA
= 0x0034,
98 TLS_RSA_WITH_AES_256_CBC_SHA
= 0x0035,
99 TLS_DH_DSS_WITH_AES_256_CBC_SHA
= 0x0036,
100 TLS_DH_RSA_WITH_AES_256_CBC_SHA
= 0x0037,
101 TLS_DHE_DSS_WITH_AES_256_CBC_SHA
= 0x0038,
102 TLS_DHE_RSA_WITH_AES_256_CBC_SHA
= 0x0039,
103 TLS_DH_anon_WITH_AES_256_CBC_SHA
= 0x003A,
104 TLS_RSA_WITH_NULL_SHA256
= 0x003B,
105 TLS_RSA_WITH_AES_128_CBC_SHA256
= 0x003C,
106 TLS_RSA_WITH_AES_256_CBC_SHA256
= 0x003D,
107 TLS_DH_DSS_WITH_AES_128_CBC_SHA256
= 0x003E,
108 TLS_DH_RSA_WITH_AES_128_CBC_SHA256
= 0x003F,
109 TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
= 0x0040,
110 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
= 0x0041,
111 TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA
= 0x0042,
112 TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA
= 0x0043,
113 TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA
= 0x0044,
114 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
= 0x0045,
115 TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA
= 0x0046,
117 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
= 0x0067,
118 TLS_DH_DSS_WITH_AES_256_CBC_SHA256
= 0x0068,
119 TLS_DH_RSA_WITH_AES_256_CBC_SHA256
= 0x0069,
120 TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
= 0x006A,
121 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
= 0x006B,
122 TLS_DH_anon_WITH_AES_128_CBC_SHA256
= 0x006C,
123 TLS_DH_anon_WITH_AES_256_CBC_SHA256
= 0x006D,
125 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
= 0x0084,
126 TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA
= 0x0085,
127 TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA
= 0x0086,
128 TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA
= 0x0087,
129 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
= 0x0088,
130 TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA
= 0x0089,
131 TLS_PSK_WITH_RC4_128_SHA
= 0x008A,
132 TLS_PSK_WITH_3DES_EDE_CBC_SHA
= 0x008B,
133 TLS_PSK_WITH_AES_128_CBC_SHA
= 0x008C,
134 TLS_PSK_WITH_AES_256_CBC_SHA
= 0x008D,
135 TLS_DHE_PSK_WITH_RC4_128_SHA
= 0x008E,
136 TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA
= 0x008F,
137 TLS_DHE_PSK_WITH_AES_128_CBC_SHA
= 0x0090,
138 TLS_DHE_PSK_WITH_AES_256_CBC_SHA
= 0x0091,
139 TLS_RSA_PSK_WITH_RC4_128_SHA
= 0x0092,
140 TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA
= 0x0093,
141 TLS_RSA_PSK_WITH_AES_128_CBC_SHA
= 0x0094,
142 TLS_RSA_PSK_WITH_AES_256_CBC_SHA
= 0x0095,
143 TLS_RSA_WITH_SEED_CBC_SHA
= 0x0096,
144 TLS_DH_DSS_WITH_SEED_CBC_SHA
= 0x0097,
145 TLS_DH_RSA_WITH_SEED_CBC_SHA
= 0x0098,
146 TLS_DHE_DSS_WITH_SEED_CBC_SHA
= 0x0099,
147 TLS_DHE_RSA_WITH_SEED_CBC_SHA
= 0x009A,
148 TLS_DH_anon_WITH_SEED_CBC_SHA
= 0x009B,
149 TLS_RSA_WITH_AES_128_GCM_SHA256
= 0x009C,
150 TLS_RSA_WITH_AES_256_GCM_SHA384
= 0x009D,
151 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
= 0x009E,
152 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
= 0x009F,
153 TLS_DH_RSA_WITH_AES_128_GCM_SHA256
= 0x00A0,
154 TLS_DH_RSA_WITH_AES_256_GCM_SHA384
= 0x00A1,
155 TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
= 0x00A2,
156 TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
= 0x00A3,
157 TLS_DH_DSS_WITH_AES_128_GCM_SHA256
= 0x00A4,
158 TLS_DH_DSS_WITH_AES_256_GCM_SHA384
= 0x00A5,
159 TLS_DH_anon_WITH_AES_128_GCM_SHA256
= 0x00A6,
160 TLS_DH_anon_WITH_AES_256_GCM_SHA384
= 0x00A7,
161 TLS_PSK_WITH_AES_128_GCM_SHA256
= 0x00A8,
162 TLS_PSK_WITH_AES_256_GCM_SHA384
= 0x00A9,
163 TLS_DHE_PSK_WITH_AES_128_GCM_SHA256
= 0x00AA,
164 TLS_DHE_PSK_WITH_AES_256_GCM_SHA384
= 0x00AB,
165 TLS_RSA_PSK_WITH_AES_128_GCM_SHA256
= 0x00AC,
166 TLS_RSA_PSK_WITH_AES_256_GCM_SHA384
= 0x00AD,
167 TLS_PSK_WITH_AES_128_CBC_SHA256
= 0x00AE,
168 TLS_PSK_WITH_AES_256_CBC_SHA384
= 0x00AF,
169 TLS_PSK_WITH_NULL_SHA256
= 0x00B0,
170 TLS_PSK_WITH_NULL_SHA384
= 0x00B1,
171 TLS_DHE_PSK_WITH_AES_128_CBC_SHA256
= 0x00B2,
172 TLS_DHE_PSK_WITH_AES_256_CBC_SHA384
= 0x00B3,
173 TLS_DHE_PSK_WITH_NULL_SHA256
= 0x00B4,
174 TLS_DHE_PSK_WITH_NULL_SHA384
= 0x00B5,
175 TLS_RSA_PSK_WITH_AES_128_CBC_SHA256
= 0x00B6,
176 TLS_RSA_PSK_WITH_AES_256_CBC_SHA384
= 0x00B7,
177 TLS_RSA_PSK_WITH_NULL_SHA256
= 0x00B8,
178 TLS_RSA_PSK_WITH_NULL_SHA384
= 0x00B9,
179 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
= 0x00BA,
180 TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256
= 0x00BB,
181 TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256
= 0x00BC,
182 TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256
= 0x00BD,
183 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
= 0x00BE,
184 TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256
= 0x00BF,
185 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
= 0x00C0,
186 TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256
= 0x00C1,
187 TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256
= 0x00C2,
188 TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256
= 0x00C3,
189 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
= 0x00C4,
190 TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256
= 0x00C5,
192 TLS_EMPTY_RENEGOTIATION_INFO_SCSV
= 0x00FF,
194 TLS_ECDH_ECDSA_WITH_NULL_SHA
= 0xC001,
195 TLS_ECDH_ECDSA_WITH_RC4_128_SHA
= 0xC002,
196 TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
= 0xC003,
197 TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
= 0xC004,
198 TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
= 0xC005,
199 TLS_ECDHE_ECDSA_WITH_NULL_SHA
= 0xC006,
200 TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
= 0xC007,
201 TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
= 0xC008,
202 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
= 0xC009,
203 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
= 0xC00A,
204 TLS_ECDH_RSA_WITH_NULL_SHA
= 0xC00B,
205 TLS_ECDH_RSA_WITH_RC4_128_SHA
= 0xC00C,
206 TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
= 0xC00D,
207 TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
= 0xC00E,
208 TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
= 0xC00F,
209 TLS_ECDHE_RSA_WITH_NULL_SHA
= 0xC010,
210 TLS_ECDHE_RSA_WITH_RC4_128_SHA
= 0xC011,
211 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
= 0xC012,
212 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
= 0xC013,
213 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
= 0xC014,
214 TLS_ECDH_anon_WITH_NULL_SHA
= 0xC015,
215 TLS_ECDH_anon_WITH_RC4_128_SHA
= 0xC016,
216 TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA
= 0xC017,
217 TLS_ECDH_anon_WITH_AES_128_CBC_SHA
= 0xC018,
218 TLS_ECDH_anon_WITH_AES_256_CBC_SHA
= 0xC019,
219 TLS_SRP_SHA_WITH_3DES_EDE_CBC_SHA
= 0xC01A,
220 TLS_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA
= 0xC01B,
221 TLS_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA
= 0xC01C,
222 TLS_SRP_SHA_WITH_AES_128_CBC_SHA
= 0xC01D,
223 TLS_SRP_SHA_RSA_WITH_AES_128_CBC_SHA
= 0xC01E,
224 TLS_SRP_SHA_DSS_WITH_AES_128_CBC_SHA
= 0xC01F,
225 TLS_SRP_SHA_WITH_AES_256_CBC_SHA
= 0xC020,
226 TLS_SRP_SHA_RSA_WITH_AES_256_CBC_SHA
= 0xC021,
227 TLS_SRP_SHA_DSS_WITH_AES_256_CBC_SHA
= 0xC022,
228 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
= 0xC023,
229 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
= 0xC024,
230 TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
= 0xC025,
231 TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
= 0xC026,
232 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
= 0xC027,
233 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
= 0xC028,
234 TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
= 0xC029,
235 TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
= 0xC02A,
236 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
= 0xC02B,
237 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
= 0xC02C,
238 TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
= 0xC02D,
239 TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
= 0xC02E,
240 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
= 0xC02F,
241 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
= 0xC030,
242 TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
= 0xC031,
243 TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
= 0xC032,
244 TLS_ECDHE_PSK_WITH_RC4_128_SHA
= 0xC033,
245 TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA
= 0xC034,
246 TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA
= 0xC035,
247 TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA
= 0xC036,
248 TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256
= 0xC037,
249 TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384
= 0xC038,
250 TLS_ECDHE_PSK_WITH_NULL_SHA
= 0xC039,
251 TLS_ECDHE_PSK_WITH_NULL_SHA256
= 0xC03A,
252 TLS_ECDHE_PSK_WITH_NULL_SHA384
= 0xC03B
256 * Enum names for tls_cipher_suite_t
258 extern enum_name_t
*tls_cipher_suite_names
;
261 * TLS HashAlgorithm identifiers
263 enum tls_hash_algorithm_t
{
274 * Enum names for tls_hash_algorithm_t
276 extern enum_name_t
*tls_hash_algorithm_names
;
279 * TLS SignatureAlgorithm identifiers
281 enum tls_signature_algorithm_t
{
288 * Enum names for tls_signature_algorithm_t
290 extern enum_name_t
*tls_signature_algorithm_names
;
293 * TLS ClientCertificateType
295 enum tls_client_certificate_type_t
{
298 TLS_RSA_FIXED_DH
= 3,
299 TLS_DSS_FIXED_DH
= 4,
300 TLS_RSA_EPHEMERAL_DH
= 5,
301 TLS_DSS_EPHEMERAL_DH
= 6,
302 TLS_FORTEZZA_DMS
= 20,
304 TLS_RSA_FIXED_ECDH
= 65,
305 TLS_ECDSA_FIXED_ECDH
= 66,
309 * Enum names for tls_client_certificate_type_t
311 extern enum_name_t
*tls_client_certificate_type_names
;
316 enum tls_ecc_curve_type_t
{
317 TLS_ECC_EXPLICIT_PRIME
= 1,
318 TLS_ECC_EXPLICIT_CHAR2
= 2,
319 TLS_ECC_NAMED_CURVE
= 3,
323 * Enum names for tls_ecc_curve_type_t
325 extern enum_name_t
*tls_ecc_curve_type_names
;
328 * TLS Named Curve identifiers
330 enum tls_named_curve_t
{
359 * Enum names for tls_named_curve_t
361 extern enum_name_t
*tls_named_curve_names
;
364 * EC Point format, ANSI X9.62.
366 enum tls_ansi_point_format_t
{
367 TLS_ANSI_COMPRESSED
= 2,
368 TLS_ANSI_COMPRESSED_Y
= 3,
369 TLS_ANSI_UNCOMPRESSED
= 4,
371 TLS_ANSI_HYBRID_Y
= 7,
375 * Enum names for tls_ansi_point_format_t.
377 extern enum_name_t
*tls_ansi_point_format_names
;
380 * EC Point format, TLS specific identifiers.
382 enum tls_ec_point_format_t
{
383 TLS_EC_POINT_UNCOMPRESSED
= 0,
384 TLS_EC_POINT_ANSIX962_COMPRESSED_PRIME
= 1,
385 TLS_EC_POINT_ANSIX962_COMPRESSED_CHAR2
= 2,
389 * Enum names for tls_ec_point_format_t.
391 extern enum_name_t
*tls_ec_point_format_names
;
394 * TLS crypto helper functions.
396 struct tls_crypto_t
{
399 * Get a list of supported TLS cipher suites.
401 * @param suites list of suites, points to internal data
402 * @return number of suites returned
404 int (*get_cipher_suites
)(tls_crypto_t
*this, tls_cipher_suite_t
**suites
);
407 * Select and store a cipher suite from a given list of candidates.
409 * @param suites list of candidates to select from
410 * @param count number of suites
411 * @param key key type used, or KEY_ANY
412 * @return selected suite, 0 if none acceptable
414 tls_cipher_suite_t (*select_cipher_suite
)(tls_crypto_t
*this,
415 tls_cipher_suite_t
*suites
, int count
,
419 * Get the Diffie-Hellman group to use, if any.
421 * @return Diffie Hellman group, ord MODP_NONE
423 diffie_hellman_group_t (*get_dh_group
)(tls_crypto_t
*this);
426 * Write the list of supported hash/sig algorithms to writer.
428 * @param writer writer to write supported hash/sig algorithms
430 void (*get_signature_algorithms
)(tls_crypto_t
*this, bio_writer_t
*writer
);
433 * Create an enumerator over supported ECDH groups.
435 * Enumerates over (diffie_hellman_group_t, tls_named_curve_t)
439 enumerator_t
* (*create_ec_enumerator
)(tls_crypto_t
*this);
442 * Set the protection layer of the TLS stack to control it.
444 * @param protection protection layer to work on
446 void (*set_protection
)(tls_crypto_t
*this, tls_protection_t
*protection
);
449 * Store exchanged handshake data, used for cryptographic operations.
451 * @param type handshake sub type
452 * @param data data to append to handshake buffer
454 void (*append_handshake
)(tls_crypto_t
*this,
455 tls_handshake_type_t type
, chunk_t data
);
458 * Sign a blob of data, append signature to writer.
460 * @param key private key to use for signature
461 * @param writer TLS writer to write signature to
462 * @param data data to sign
463 * @param hashsig list of TLS1.2 hash/sig algorithms to select from
464 * @return TRUE if signature create successfully
466 bool (*sign
)(tls_crypto_t
*this, private_key_t
*key
,
467 bio_writer_t
*writer
, chunk_t data
, chunk_t hashsig
);
470 * Verify a blob of data, read signature from a reader.
472 * @param key public key to verify signature with
473 * @param reader TLS reader to read signature from
474 * @param data data to verify signature
475 * @return TRUE if signature valid
477 bool (*verify
)(tls_crypto_t
*this, public_key_t
*key
,
478 bio_reader_t
*reader
, chunk_t data
);
481 * Create a signature of the handshake data using a given private key.
483 * @param key private key to use for signature
484 * @param writer TLS writer to write signature to
485 * @param hashsig list of TLS1.2 hash/sig algorithms to select from
486 * @return TRUE if signature create successfully
488 bool (*sign_handshake
)(tls_crypto_t
*this, private_key_t
*key
,
489 bio_writer_t
*writer
, chunk_t hashsig
);
492 * Verify the signature over handshake data using a given public key.
494 * @param key public key to verify signature with
495 * @param reader TLS reader to read signature from
496 * @return TRUE if signature valid
498 bool (*verify_handshake
)(tls_crypto_t
*this, public_key_t
*key
,
499 bio_reader_t
*reader
);
502 * Calculate the data of a TLS finished message.
504 * @param label ASCII label to use for calculation
505 * @param out buffer to write finished data to
506 * @return TRUE if calculation successful
508 bool (*calculate_finished
)(tls_crypto_t
*this, char *label
, char out
[12]);
511 * Derive the master secret, MAC and encryption keys.
513 * @param premaster premaster secret
514 * @param session session identifier to cache master secret
515 * @param id identity the session is bound to
516 * @param client_random random data from client hello
517 * @param server_random random data from server hello
519 void (*derive_secrets
)(tls_crypto_t
*this, chunk_t premaster
,
520 chunk_t session
, identification_t
*id
,
521 chunk_t client_random
, chunk_t server_random
);
524 * Try to resume a TLS session, derive key material.
526 * @param session session identifier
527 * @param id identity the session is bound to
528 * @param client_random random data from client hello
529 * @param server_random random data from server hello
532 tls_cipher_suite_t (*resume_session
)(tls_crypto_t
*this, chunk_t session
,
533 identification_t
*id
,
534 chunk_t client_random
,
535 chunk_t server_random
);
538 * Check if we have a session to resume as a client.
540 * @param id server identity to get a session for
541 * @return allocated session identifier, or chunk_empty
543 chunk_t (*get_session
)(tls_crypto_t
*this, identification_t
*id
);
546 * Change the cipher used at protection layer.
548 * @param inbound TRUE to change inbound cipher, FALSE for outbound
550 void (*change_cipher
)(tls_crypto_t
*this, bool inbound
);
553 * Get the MSK to use in EAP-TLS.
555 * @return MSK, points to internal data
557 chunk_t (*get_eap_msk
)(tls_crypto_t
*this);
560 * Destroy a tls_crypto_t.
562 void (*destroy
)(tls_crypto_t
*this);
566 * Create a tls_crypto instance.
568 * @param tls TLS stack
569 * @param tls_cache TLS session cache
570 * @return TLS crypto helper
572 tls_crypto_t
*tls_crypto_create(tls_t
*tls
, tls_cache_t
*cache
);
574 #endif /** TLS_CRYPTO_H_ @}*/