Annotation of embedaddon/axTLS/ssl/ssl.h, revision 1.1

1.1     ! misho       1: /*
        !             2:  * Copyright (c) 2007, Cameron Rich
        !             3:  * 
        !             4:  * All rights reserved.
        !             5:  * 
        !             6:  * Redistribution and use in source and binary forms, with or without 
        !             7:  * modification, are permitted provided that the following conditions are met:
        !             8:  *
        !             9:  * * Redistributions of source code must retain the above copyright notice, 
        !            10:  *   this list of conditions and the following disclaimer.
        !            11:  * * Redistributions in binary form must reproduce the above copyright notice, 
        !            12:  *   this list of conditions and the following disclaimer in the documentation 
        !            13:  *   and/or other materials provided with the distribution.
        !            14:  * * Neither the name of the axTLS project nor the names of its contributors 
        !            15:  *   may be used to endorse or promote products derived from this software 
        !            16:  *   without specific prior written permission.
        !            17:  *
        !            18:  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
        !            19:  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
        !            20:  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
        !            21:  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
        !            22:  * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
        !            23:  * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
        !            24:  * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
        !            25:  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
        !            26:  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
        !            27:  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
        !            28:  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
        !            29:  */
        !            30: 
        !            31: /**
        !            32:  * @mainpage axTLS API
        !            33:  *
        !            34:  * @image html axolotl.jpg
        !            35:  *
        !            36:  * The axTLS library has features such as:
        !            37:  * - The TLSv1 SSL client/server protocol
        !            38:  * - No requirement to use any openssl libraries.
        !            39:  * - A choice between AES block (128/256 bit) and RC4 (128 bit) stream ciphers.
        !            40:  * - RSA encryption/decryption with variable sized keys (up to 4096 bits).
        !            41:  * - Certificate chaining and peer authentication.
        !            42:  * - Session resumption, session renegotiation.
        !            43:  * - ASN.1, X.509, PKCS#8, PKCS#12 keys/certificates with DER/PEM encoding.
        !            44:  * - Highly configurable compile time options.
        !            45:  * - Portable across many platforms (written in ANSI C), and has language
        !            46:  * bindings in C, C#, VB.NET, Java, Perl and Lua.
        !            47:  * - Partial openssl API compatibility (via a wrapper).
        !            48:  * - A very small footprint (around 50-60kB for the library in 'server-only' 
        !            49:  *   mode).
        !            50:  * - No dependencies on sockets - can use serial connections for example.
        !            51:  * - A very simple API - ~ 20 functions/methods.
        !            52:  *
        !            53:  * A list of these functions/methods are described below.
        !            54:  *
        !            55:  *  @ref c_api 
        !            56:  *
        !            57:  *  @ref bigint_api 
        !            58:  *
        !            59:  *  @ref csharp_api 
        !            60:  *
        !            61:  *  @ref java_api 
        !            62:  */
        !            63: #ifndef HEADER_SSL_H
        !            64: #define HEADER_SSL_H
        !            65: 
        !            66: #ifdef __cplusplus
        !            67: extern "C" {
        !            68: #endif
        !            69: 
        !            70: #include <time.h>
        !            71: 
        !            72: /* need to predefine before ssl_lib.h gets to it */
        !            73: #define SSL_SESSION_ID_SIZE                     32
        !            74: 
        !            75: #include "tls1.h"
        !            76: 
        !            77: /* The optional parameters that can be given to the client/server SSL engine */
        !            78: #define SSL_CLIENT_AUTHENTICATION               0x00010000
        !            79: #define SSL_SERVER_VERIFY_LATER                 0x00020000
        !            80: #define SSL_NO_DEFAULT_KEY                      0x00040000
        !            81: #define SSL_DISPLAY_STATES                      0x00080000
        !            82: #define SSL_DISPLAY_BYTES                       0x00100000
        !            83: #define SSL_DISPLAY_CERTS                       0x00200000
        !            84: #define SSL_DISPLAY_RSA                         0x00400000
        !            85: #define SSL_CONNECT_IN_PARTS                    0x00800000
        !            86: 
        !            87: /* errors that can be generated */
        !            88: #define SSL_OK                                  0
        !            89: #define SSL_NOT_OK                              -1
        !            90: #define SSL_ERROR_DEAD                          -2
        !            91: #define SSL_CLOSE_NOTIFY                        -3
        !            92: #define SSL_ERROR_CONN_LOST                     -256
        !            93: #define SSL_ERROR_SOCK_SETUP_FAILURE            -258
        !            94: #define SSL_ERROR_INVALID_HANDSHAKE             -260
        !            95: #define SSL_ERROR_INVALID_PROT_MSG              -261
        !            96: #define SSL_ERROR_INVALID_HMAC                  -262
        !            97: #define SSL_ERROR_INVALID_VERSION               -263
        !            98: #define SSL_ERROR_INVALID_SESSION               -265
        !            99: #define SSL_ERROR_NO_CIPHER                     -266
        !           100: #define SSL_ERROR_BAD_CERTIFICATE               -268
        !           101: #define SSL_ERROR_INVALID_KEY                   -269
        !           102: #define SSL_ERROR_FINISHED_INVALID              -271
        !           103: #define SSL_ERROR_NO_CERT_DEFINED               -272
        !           104: #define SSL_ERROR_NO_CLIENT_RENOG               -273
        !           105: #define SSL_ERROR_NOT_SUPPORTED                 -274
        !           106: #define SSL_X509_OFFSET                         -512
        !           107: #define SSL_X509_ERROR(A)                       (SSL_X509_OFFSET+A)
        !           108: 
        !           109: /* alert types that are recognized */
        !           110: #define SSL_ALERT_TYPE_WARNING                  1
        !           111: #define SLL_ALERT_TYPE_FATAL                    2
        !           112: 
        !           113: /* these are all the alerts that are recognized */
        !           114: #define SSL_ALERT_CLOSE_NOTIFY                  0
        !           115: #define SSL_ALERT_UNEXPECTED_MESSAGE            10
        !           116: #define SSL_ALERT_BAD_RECORD_MAC                20
        !           117: #define SSL_ALERT_HANDSHAKE_FAILURE             40
        !           118: #define SSL_ALERT_BAD_CERTIFICATE               42
        !           119: #define SSL_ALERT_ILLEGAL_PARAMETER             47
        !           120: #define SSL_ALERT_DECODE_ERROR                  50
        !           121: #define SSL_ALERT_DECRYPT_ERROR                 51
        !           122: #define SSL_ALERT_INVALID_VERSION               70
        !           123: #define SSL_ALERT_NO_RENEGOTIATION              100
        !           124: 
        !           125: /* The ciphers that are supported */
        !           126: #define SSL_AES128_SHA                          0x2f
        !           127: #define SSL_AES256_SHA                          0x35
        !           128: #define SSL_RC4_128_SHA                         0x05
        !           129: #define SSL_RC4_128_MD5                         0x04
        !           130: 
        !           131: /* build mode ids' */
        !           132: #define SSL_BUILD_SKELETON_MODE                 0x01
        !           133: #define SSL_BUILD_SERVER_ONLY                   0x02
        !           134: #define SSL_BUILD_ENABLE_VERIFICATION           0x03
        !           135: #define SSL_BUILD_ENABLE_CLIENT                 0x04
        !           136: #define SSL_BUILD_FULL_MODE                     0x05
        !           137: 
        !           138: /* offsets to retrieve configuration information */
        !           139: #define SSL_BUILD_MODE                          0
        !           140: #define SSL_MAX_CERT_CFG_OFFSET                 1
        !           141: #define SSL_MAX_CA_CERT_CFG_OFFSET              2
        !           142: #define SSL_HAS_PEM                             3
        !           143: 
        !           144: /* default session sizes */
        !           145: #define SSL_DEFAULT_SVR_SESS                    5
        !           146: #define SSL_DEFAULT_CLNT_SESS                   1
        !           147: 
        !           148: /* X.509/X.520 distinguished name types */
        !           149: #define SSL_X509_CERT_COMMON_NAME               0
        !           150: #define SSL_X509_CERT_ORGANIZATION              1
        !           151: #define SSL_X509_CERT_ORGANIZATIONAL_NAME       2
        !           152: #define SSL_X509_CA_CERT_COMMON_NAME            3
        !           153: #define SSL_X509_CA_CERT_ORGANIZATION           4
        !           154: #define SSL_X509_CA_CERT_ORGANIZATIONAL_NAME    5
        !           155: 
        !           156: /* SSL object loader types */
        !           157: #define SSL_OBJ_X509_CERT                       1
        !           158: #define SSL_OBJ_X509_CACERT                     2
        !           159: #define SSL_OBJ_RSA_KEY                         3
        !           160: #define SSL_OBJ_PKCS8                           4
        !           161: #define SSL_OBJ_PKCS12                          5
        !           162: 
        !           163: /**
        !           164:  * @defgroup c_api Standard C API
        !           165:  * @brief The standard interface in C.
        !           166:  * @{
        !           167:  */
        !           168: 
        !           169: /**
        !           170:  * @brief Establish a new client/server context.
        !           171:  *
        !           172:  * This function is called before any client/server SSL connections are made. 
        !           173:  *
        !           174:  * Each new connection will use the this context's private key and 
        !           175:  * certificate chain. If a different certificate chain is required, then a 
        !           176:  * different context needs to be be used.
        !           177:  *
        !           178:  * There are two threading models supported - a single thread with one
        !           179:  * SSL_CTX can support any number of SSL connections - and multiple threads can 
        !           180:  * support one SSL_CTX object each (the default). But if a single SSL_CTX 
        !           181:  * object uses many SSL objects in individual threads, then the 
        !           182:  * CONFIG_SSL_CTX_MUTEXING option needs to be configured.
        !           183:  *
        !           184:  * @param options [in]  Any particular options. At present the options
        !           185:  * supported are:
        !           186:  * - SSL_SERVER_VERIFY_LATER (client only): Don't stop a handshake if the server
        !           187:  * authentication fails. The certificate can be authenticated later with a
        !           188:  * call to ssl_verify_cert().
        !           189:  * - SSL_CLIENT_AUTHENTICATION (server only): Enforce client authentication
        !           190:  * i.e. each handshake will include a "certificate request" message from the
        !           191:  * server. Only available if verification has been enabled.
        !           192:  * - SSL_DISPLAY_BYTES (full mode build only): Display the byte sequences
        !           193:  * during the handshake.
        !           194:  * - SSL_DISPLAY_STATES (full mode build only): Display the state changes
        !           195:  * during the handshake.
        !           196:  * - SSL_DISPLAY_CERTS (full mode build only): Display the certificates that
        !           197:  * are passed during a handshake.
        !           198:  * - SSL_DISPLAY_RSA (full mode build only): Display the RSA key details that
        !           199:  * are passed during a handshake.
        !           200:  * - SSL_CONNECT_IN_PARTS (client only): To use a non-blocking version of 
        !           201:  * ssl_client_new().
        !           202:  * @param num_sessions [in] The number of sessions to be used for session
        !           203:  * caching. If this value is 0, then there is no session caching. This option
        !           204:  * is not used in skeleton mode.
        !           205:  * @return A client/server context.
        !           206:  */
        !           207: EXP_FUNC SSL_CTX * STDCALL ssl_ctx_new(uint32_t options, int num_sessions);
        !           208: 
        !           209: /**
        !           210:  * @brief Remove a client/server context.
        !           211:  *
        !           212:  * Frees any used resources used by this context. Each connection will be 
        !           213:  * sent a "Close Notify" alert (if possible).
        !           214:  * @param ssl_ctx [in] The client/server context.
        !           215:  */
        !           216: EXP_FUNC void STDCALL ssl_ctx_free(SSL_CTX *ssl_ctx);
        !           217: 
        !           218: /**
        !           219:  * @brief (server only) Establish a new SSL connection to an SSL client.
        !           220:  *
        !           221:  * It is up to the application to establish the logical connection (whether it
        !           222:  * is  a socket, serial connection etc).
        !           223:  * @param ssl_ctx [in] The server context.
        !           224:  * @param client_fd [in] The client's file descriptor. 
        !           225:  * @return An SSL object reference.
        !           226:  */
        !           227: EXP_FUNC SSL * STDCALL ssl_server_new(SSL_CTX *ssl_ctx, int client_fd);
        !           228: 
        !           229: /**
        !           230:  * @brief (client only) Establish a new SSL connection to an SSL server.
        !           231:  *
        !           232:  * It is up to the application to establish the initial logical connection 
        !           233:  * (whether it is  a socket, serial connection etc).
        !           234:  *
        !           235:  * This is a normally a blocking call - it will finish when the handshake is 
        !           236:  * complete (or has failed). To use in non-blocking mode, set 
        !           237:  * SSL_CONNECT_IN_PARTS in ssl_ctx_new().
        !           238:  * @param ssl_ctx [in] The client context.
        !           239:  * @param client_fd [in] The client's file descriptor.
        !           240:  * @param session_id [in] A 32 byte session id for session resumption. This 
        !           241:  * can be null if no session resumption is being used or required. This option
        !           242:  * is not used in skeleton mode.
        !           243:  * @param sess_id_size The size of the session id (max 32)
        !           244:  * @return An SSL object reference. Use ssl_handshake_status() to check 
        !           245:  * if a handshake succeeded.
        !           246:  */
        !           247: EXP_FUNC SSL * STDCALL ssl_client_new(SSL_CTX *ssl_ctx, int client_fd, const uint8_t *session_id, uint8_t sess_id_size);
        !           248: 
        !           249: /**
        !           250:  * @brief Free any used resources on this connection. 
        !           251:  
        !           252:  * A "Close Notify" message is sent on this connection (if possible). It is up 
        !           253:  * to the application to close the socket or file descriptor.
        !           254:  * @param ssl [in] The ssl object reference.
        !           255:  */
        !           256: EXP_FUNC void STDCALL ssl_free(SSL *ssl);
        !           257: 
        !           258: /**
        !           259:  * @brief Read the SSL data stream.
        !           260:  * If the socket is non-blocking and data is blocked then SSO_OK will be
        !           261:  * returned.
        !           262:  * @param ssl [in] An SSL object reference.
        !           263:  * @param in_data [out] If the read was successful, a pointer to the read
        !           264:  * buffer will be here. Do NOT ever free this memory as this buffer is used in
        !           265:  * sucessive calls. If the call was unsuccessful, this value will be null.
        !           266:  * @return The number of decrypted bytes:
        !           267:  * - if > 0, then the handshaking is complete and we are returning the number 
        !           268:  *   of decrypted bytes. 
        !           269:  * - SSL_OK if the handshaking stage is successful (but not yet complete).  
        !           270:  * - < 0 if an error.
        !           271:  * @see ssl.h for the error code list.
        !           272:  * @note Use in_data before doing any successive ssl calls.
        !           273:  */
        !           274: EXP_FUNC int STDCALL ssl_read(SSL *ssl, uint8_t **in_data);
        !           275: 
        !           276: /**
        !           277:  * @brief Write to the SSL data stream. 
        !           278:  * if the socket is non-blocking and data is blocked then a check is made
        !           279:  * to ensure that all data is sent (i.e. blocked mode is forced).
        !           280:  * @param ssl [in] An SSL obect reference.
        !           281:  * @param out_data [in] The data to be written
        !           282:  * @param out_len [in] The number of bytes to be written.
        !           283:  * @return The number of bytes sent, or if < 0 if an error.
        !           284:  * @see ssl.h for the error code list.
        !           285:  */
        !           286: EXP_FUNC int STDCALL ssl_write(SSL *ssl, const uint8_t *out_data, int out_len);
        !           287: 
        !           288: /**
        !           289:  * @brief Find an ssl object based on a file descriptor.
        !           290:  *
        !           291:  * Goes through the list of SSL objects maintained in a client/server context
        !           292:  * to look for a file descriptor match.
        !           293:  * @param ssl_ctx [in] The client/server context.
        !           294:  * @param client_fd [in]  The file descriptor.
        !           295:  * @return A reference to the SSL object. Returns null if the object could not 
        !           296:  * be found.
        !           297:  */
        !           298: EXP_FUNC SSL * STDCALL ssl_find(SSL_CTX *ssl_ctx, int client_fd);
        !           299: 
        !           300: /**
        !           301:  * @brief Get the session id for a handshake. 
        !           302:  * 
        !           303:  * This will be a 32 byte sequence and is available after the first
        !           304:  * handshaking messages are sent.
        !           305:  * @param ssl [in] An SSL object reference.
        !           306:  * @return The session id as a 32 byte sequence.
        !           307:  * @note A SSLv23 handshake may have only 16 valid bytes.
        !           308:  */
        !           309: EXP_FUNC const uint8_t * STDCALL ssl_get_session_id(const SSL *ssl);
        !           310: 
        !           311: /**
        !           312:  * @brief Get the session id size for a handshake. 
        !           313:  * 
        !           314:  * This will normally be 32 but could be 0 (no session id) or something else.
        !           315:  * @param ssl [in] An SSL object reference.
        !           316:  * @return The size of the session id.
        !           317:  */
        !           318: EXP_FUNC uint8_t STDCALL ssl_get_session_id_size(const SSL *ssl);
        !           319: 
        !           320: /**
        !           321:  * @brief Return the cipher id (in the SSL form).
        !           322:  * @param ssl [in] An SSL object reference.
        !           323:  * @return The cipher id. This will be one of the following:
        !           324:  * - SSL_AES128_SHA (0x2f)
        !           325:  * - SSL_AES256_SHA (0x35)
        !           326:  * - SSL_RC4_128_SHA (0x05)
        !           327:  * - SSL_RC4_128_MD5 (0x04)
        !           328:  */
        !           329: EXP_FUNC uint8_t STDCALL ssl_get_cipher_id(const SSL *ssl);
        !           330: 
        !           331: /**
        !           332:  * @brief Return the status of the handshake.
        !           333:  * @param ssl [in] An SSL object reference.
        !           334:  * @return SSL_OK if the handshake is complete and ok. 
        !           335:  * @see ssl.h for the error code list.
        !           336:  */
        !           337: EXP_FUNC int STDCALL ssl_handshake_status(const SSL *ssl);
        !           338: 
        !           339: /**
        !           340:  * @brief Retrieve various parameters about the axTLS engine.
        !           341:  * @param offset [in] The configuration offset. It will be one of the following:
        !           342:  * - SSL_BUILD_MODE The build mode. This will be one of the following:
        !           343:  *   - SSL_BUILD_SERVER_ONLY            (basic server mode)
        !           344:  *   - SSL_BUILD_ENABLE_VERIFICATION    (server can do client authentication)
        !           345:  *   - SSL_BUILD_ENABLE_CLIENT          (client/server capabilties)
        !           346:  *   - SSL_BUILD_FULL_MODE              (client/server with diagnostics)
        !           347:  *   - SSL_BUILD_SKELETON_MODE          (skeleton mode)
        !           348:  * - SSL_MAX_CERT_CFG_OFFSET The maximum number of certificates allowed.
        !           349:  * - SSL_MAX_CA_CERT_CFG_OFFSET The maximum number of CA certificates allowed.
        !           350:  * - SSL_HAS_PEM                        1 if supported
        !           351:  * @return The value of the requested parameter.
        !           352:  */
        !           353: EXP_FUNC int STDCALL ssl_get_config(int offset);
        !           354: 
        !           355: /**
        !           356:  * @brief Display why the handshake failed.
        !           357:  *
        !           358:  * This call is only useful in a 'full mode' build. The output is to stdout.
        !           359:  * @param error_code [in] An error code.
        !           360:  * @see ssl.h for the error code list.
        !           361:  */
        !           362: EXP_FUNC void STDCALL ssl_display_error(int error_code);
        !           363: 
        !           364: /**
        !           365:  * @brief Authenticate a received certificate.
        !           366:  * 
        !           367:  * This call is usually made by a client after a handshake is complete and the
        !           368:  * context is in SSL_SERVER_VERIFY_LATER mode.
        !           369:  * @param ssl [in] An SSL object reference.
        !           370:  * @return SSL_OK if the certificate is verified.
        !           371:  */
        !           372: EXP_FUNC int STDCALL ssl_verify_cert(const SSL *ssl);
        !           373: 
        !           374: /**
        !           375:  * @brief Retrieve an X.509 distinguished name component.
        !           376:  * 
        !           377:  * When a handshake is complete and a certificate has been exchanged, then the
        !           378:  * details of the remote certificate can be retrieved.
        !           379:  *
        !           380:  * This will usually be used by a client to check that the server's common 
        !           381:  * name matches the URL.
        !           382:  *
        !           383:  * @param ssl [in] An SSL object reference.
        !           384:  * @param component [in] one of:
        !           385:  * - SSL_X509_CERT_COMMON_NAME
        !           386:  * - SSL_X509_CERT_ORGANIZATION
        !           387:  * - SSL_X509_CERT_ORGANIZATIONAL_NAME
        !           388:  * - SSL_X509_CA_CERT_COMMON_NAME
        !           389:  * - SSL_X509_CA_CERT_ORGANIZATION
        !           390:  * - SSL_X509_CA_CERT_ORGANIZATIONAL_NAME
        !           391:  * @return The appropriate string (or null if not defined)
        !           392:  * @note Verification build mode must be enabled.
        !           393:  */
        !           394: EXP_FUNC const char * STDCALL ssl_get_cert_dn(const SSL *ssl, int component);
        !           395: 
        !           396: /**
        !           397:  * @brief Retrieve a Subject Alternative DNSName
        !           398:  *
        !           399:  * When a handshake is complete and a certificate has been exchanged, then the
        !           400:  * details of the remote certificate can be retrieved.
        !           401:  *
        !           402:  * This will usually be used by a client to check that the server's DNS  
        !           403:  * name matches the URL.
        !           404:  *
        !           405:  * @param ssl [in] An SSL object reference.
        !           406:  * @param dnsindex [in] The index of the DNS name to retrieve.
        !           407:  * @return The appropriate string (or null if not defined)
        !           408:  * @note Verification build mode must be enabled.
        !           409:  */
        !           410: EXP_FUNC const char * STDCALL ssl_get_cert_subject_alt_dnsname(const SSL *ssl, int dnsindex);
        !           411: 
        !           412: /**
        !           413:  * @brief Force the client to perform its handshake again.
        !           414:  *
        !           415:  * For a client this involves sending another "client hello" message.
        !           416:  * For the server is means sending a "hello request" message.
        !           417:  *
        !           418:  * This is a blocking call on the client (until the handshake completes).
        !           419:  *
        !           420:  * @param ssl [in] An SSL object reference.
        !           421:  * @return SSL_OK if renegotiation instantiation was ok
        !           422:  */
        !           423: EXP_FUNC int STDCALL ssl_renegotiate(SSL *ssl);
        !           424: 
        !           425: /**
        !           426:  * @brief Process a file that is in binary DER or ASCII PEM format.
        !           427:  *
        !           428:  * These are temporary objects that are used to load private keys,
        !           429:  * certificates etc into memory.
        !           430:  * @param ssl_ctx [in] The client/server context.
        !           431:  * @param obj_type [in] The format of the file. Can be one of:
        !           432:  * - SSL_OBJ_X509_CERT (no password required)
        !           433:  * - SSL_OBJ_X509_CACERT (no password required)
        !           434:  * - SSL_OBJ_RSA_KEY (AES128/AES256 PEM encryption supported)
        !           435:  * - SSL_OBJ_PKCS8 (RC4-128 encrypted data supported)
        !           436:  * - SSL_OBJ_PKCS12 (RC4-128 encrypted data supported)
        !           437:  *
        !           438:  * PEM files are automatically detected (if supported). The object type is
        !           439:  * also detected, and so is not relevant for these types of files.
        !           440:  * @param filename [in] The location of a file in DER/PEM format.
        !           441:  * @param password [in] The password used. Can be null if not required.
        !           442:  * @return SSL_OK if all ok
        !           443:  * @note Not available in skeleton build mode.
        !           444:  */
        !           445: EXP_FUNC int STDCALL ssl_obj_load(SSL_CTX *ssl_ctx, int obj_type, const char *filename, const char *password);
        !           446: 
        !           447: /**
        !           448:  * @brief Process binary data.
        !           449:  *
        !           450:  * These are temporary objects that are used to load private keys,
        !           451:  * certificates etc into memory.
        !           452:  * @param ssl_ctx [in] The client/server context.
        !           453:  * @param obj_type [in] The format of the memory data.
        !           454:  * @param data [in] The binary data to be loaded.
        !           455:  * @param len [in] The amount of data to be loaded.
        !           456:  * @param password [in] The password used. Can be null if not required.
        !           457:  * @return SSL_OK if all ok
        !           458:  * @see ssl_obj_load for more details on obj_type.
        !           459:  */
        !           460: EXP_FUNC int STDCALL ssl_obj_memory_load(SSL_CTX *ssl_ctx, int obj_type, const uint8_t *data, int len, const char *password);
        !           461: 
        !           462: #ifdef CONFIG_SSL_GENERATE_X509_CERT
        !           463: /**
        !           464:  * @brief Create an X.509 certificate. 
        !           465:  * 
        !           466:  * This certificate is a self-signed v1 cert with a fixed start/stop validity 
        !           467:  * times. It is signed with an internal private key in ssl_ctx.
        !           468:  *
        !           469:  * @param ssl_ctx [in] The client/server context.
        !           470:  * @param options [in] Not used yet.
        !           471:  * @param dn [in] An array of distinguished name strings. The array is defined
        !           472:  * by:
        !           473:  * - SSL_X509_CERT_COMMON_NAME (0)
        !           474:  *      - If SSL_X509_CERT_COMMON_NAME is empty or not defined, then the 
        !           475:  *        hostname will be used.
        !           476:  * - SSL_X509_CERT_ORGANIZATION (1)
        !           477:  *      - If SSL_X509_CERT_ORGANIZATION is empty or not defined, then $USERNAME 
        !           478:  *        will be used.
        !           479:  * - SSL_X509_CERT_ORGANIZATIONAL_NAME (2)
        !           480:  *      - SSL_X509_CERT_ORGANIZATIONAL_NAME is optional.
        !           481:  * @param cert_data [out] The certificate as a sequence of bytes.
        !           482:  * @return < 0 if an error, or the size of the certificate in bytes.
        !           483:  * @note cert_data must be freed when there is no more need for it.
        !           484:  */
        !           485: EXP_FUNC int STDCALL ssl_x509_create(SSL_CTX *ssl_ctx, uint32_t options, const char * dn[], uint8_t **cert_data);
        !           486: #endif
        !           487: 
        !           488: /**
        !           489:  * @brief Return the axTLS library version as a string.
        !           490:  */
        !           491: EXP_FUNC const char * STDCALL ssl_version(void);
        !           492: 
        !           493: /** @} */
        !           494: 
        !           495: #ifdef __cplusplus
        !           496: }
        !           497: #endif
        !           498: 
        !           499: #endif

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>