Annotation of embedaddon/strongswan/src/libtls/tls.h, revision 1.1.1.2
1.1 misho 1: /*
1.1.1.2 ! misho 2: * Copyright (C) 2021 Tobias Brunner
! 3: * Copyright (C) 2020-2021 Pascal Knecht
! 4: * HSR Hochschule fuer Technik Rapperswil
! 5: *
1.1 misho 6: * Copyright (C) 2010 Martin Willi
7: * Copyright (C) 2010 revosec AG
8: *
9: * This program is free software; you can redistribute it and/or modify it
10: * under the terms of the GNU General Public License as published by the
11: * Free Software Foundation; either version 2 of the License, or (at your
12: * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
13: *
14: * This program is distributed in the hope that it will be useful, but
15: * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
16: * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
17: * for more details.
18: */
19:
20: /**
21: * @defgroup libtls libtls
22: *
23: * @addtogroup libtls
24: * TLS implementation on top of libstrongswan
25: *
26: * @defgroup tls tls
27: * @{ @ingroup libtls
28: */
29:
30: #ifndef TLS_H_
31: #define TLS_H_
32:
33: /**
34: * Maximum size of a TLS fragment
35: * as defined by section 6.2.1. "Fragmentation" of RFC 5246 TLS 1.2
36: */
37: #define TLS_MAX_FRAGMENT_LEN 16384
38:
39: typedef enum tls_version_t tls_version_t;
40: typedef enum tls_content_type_t tls_content_type_t;
41: typedef enum tls_handshake_type_t tls_handshake_type_t;
42: typedef enum tls_purpose_t tls_purpose_t;
1.1.1.2 ! misho 43: typedef enum tls_flag_t tls_flag_t;
1.1 misho 44: typedef struct tls_t tls_t;
45:
46: #include <library.h>
47:
48: #include "tls_application.h"
49: #include "tls_cache.h"
50:
51: /**
52: * TLS/SSL version numbers
53: */
54: enum tls_version_t {
1.1.1.2 ! misho 55: TLS_UNSPEC = 0,
1.1 misho 56: SSL_2_0 = 0x0200,
57: SSL_3_0 = 0x0300,
58: TLS_1_0 = 0x0301,
1.1.1.2 ! misho 59: TLS_SUPPORTED_MIN = TLS_1_0,
1.1 misho 60: TLS_1_1 = 0x0302,
61: TLS_1_2 = 0x0303,
1.1.1.2 ! misho 62: TLS_1_3 = 0x0304,
! 63: TLS_SUPPORTED_MAX = TLS_1_3,
1.1 misho 64: };
65:
66: /**
67: * Enum names for tls_version_t
68: */
69: extern enum_name_t *tls_version_names;
70:
71: /**
1.1.1.2 ! misho 72: * Simple, numeric enum names for tls_version_t (only supported versions)
! 73: */
! 74: extern enum_name_t *tls_numeric_version_names;
! 75:
! 76: /**
1.1 misho 77: * TLS higher level content type
78: */
79: enum tls_content_type_t {
80: TLS_CHANGE_CIPHER_SPEC = 20,
81: TLS_ALERT = 21,
82: TLS_HANDSHAKE = 22,
83: TLS_APPLICATION_DATA = 23,
84: };
85:
86: /**
87: * Enum names for tls_content_type_t
88: */
89: extern enum_name_t *tls_content_type_names;
90:
91: /**
92: * TLS handshake subtype
93: */
94: enum tls_handshake_type_t {
95: TLS_HELLO_REQUEST = 0,
96: TLS_CLIENT_HELLO = 1,
97: TLS_SERVER_HELLO = 2,
1.1.1.2 ! misho 98: TLS_HELLO_VERIFY_REQUEST = 3,
! 99: TLS_NEW_SESSION_TICKET = 4,
! 100: TLS_END_OF_EARLY_DATA = 5,
! 101: TLS_HELLO_RETRY_REQUEST = 6,
! 102: TLS_ENCRYPTED_EXTENSIONS = 8,
1.1 misho 103: TLS_CERTIFICATE = 11,
104: TLS_SERVER_KEY_EXCHANGE = 12,
105: TLS_CERTIFICATE_REQUEST = 13,
106: TLS_SERVER_HELLO_DONE = 14,
107: TLS_CERTIFICATE_VERIFY = 15,
108: TLS_CLIENT_KEY_EXCHANGE = 16,
109: TLS_FINISHED = 20,
1.1.1.2 ! misho 110: TLS_CERTIFICATE_URL = 21,
! 111: TLS_CERTIFICATE_STATUS = 22,
! 112: TLS_SUPPLEMENTAL_DATA = 23,
! 113: TLS_KEY_UPDATE = 24,
! 114: TLS_MESSAGE_HASH = 254,
1.1 misho 115: };
116:
117: /**
118: * Enum names for tls_handshake_type_t
119: */
120: extern enum_name_t *tls_handshake_type_names;
121:
122: /**
123: * Purpose the TLS stack is initiated for.
124: */
125: enum tls_purpose_t {
126: /** authentication in EAP-TLS */
127: TLS_PURPOSE_EAP_TLS,
128: /** outer authentication and protection in EAP-TTLS */
129: TLS_PURPOSE_EAP_TTLS,
130: /** outer authentication and protection in EAP-PEAP */
131: TLS_PURPOSE_EAP_PEAP,
132: /** non-EAP TLS */
133: TLS_PURPOSE_GENERIC,
134: /** EAP binding for TNC */
135: TLS_PURPOSE_EAP_TNC
136: };
137:
138: /**
1.1.1.2 ! misho 139: * TLS Handshake extension types.
1.1 misho 140: */
141: enum tls_extension_t {
142: /** Server name the client wants to talk to */
143: TLS_EXT_SERVER_NAME = 0,
144: /** request a maximum fragment size */
145: TLS_EXT_MAX_FRAGMENT_LENGTH = 1,
146: /** indicate client certificate URL support */
147: TLS_EXT_CLIENT_CERTIFICATE_URL = 2,
148: /** list of CA the client trusts */
149: TLS_EXT_TRUSTED_CA_KEYS = 3,
150: /** request MAC truncation to 80-bit */
151: TLS_EXT_TRUNCATED_HMAC = 4,
152: /** list of OCSP responders the client trusts */
153: TLS_EXT_STATUS_REQUEST = 5,
1.1.1.2 ! misho 154: /** list of supported groups, in legacy tls: elliptic curves */
! 155: TLS_EXT_SUPPORTED_GROUPS = 10,
1.1 misho 156: /** supported point formats */
157: TLS_EXT_EC_POINT_FORMATS = 11,
158: /** list supported signature algorithms */
159: TLS_EXT_SIGNATURE_ALGORITHMS = 13,
1.1.1.2 ! misho 160: /** indicate usage of Datagram Transport Layer Security (DTLS) */
! 161: TLS_EXT_USE_SRTP = 14,
! 162: /** indicate usage of heartbeat */
! 163: TLS_EXT_HEARTBEAT = 15,
! 164: /** indicate usage of application-layer protocol negotiation */
! 165: TLS_EXT_APPLICATION_LAYER_PROTOCOL_NEGOTIATION = 16,
! 166: /** exchange raw public key, client side*/
! 167: TLS_CLIENT_CERTIFICATE_TYPE = 19,
! 168: /** exchange raw public key, server side*/
! 169: TLS_SERVER_CERTIFICATE_TYPE = 20,
! 170: /** use encrypt-then-MAC security mechanism RFC 7366 */
! 171: TLS_EXT_ENCRYPT_THEN_MAC = 22,
! 172: /** bind master secret to handshake data RFC 7627 */
! 173: TLS_EXT_EXTENDED_MASTER_SECRET = 23,
! 174: /** session resumption without server-side state RFC 5077 */
! 175: TLS_EXT_SESSION_TICKET = 35,
! 176: /** negotiate identity of the psk **/
! 177: TLS_EXT_PRE_SHARED_KEY = 41,
! 178: /** send data in 0-RTT when psk is used and early data is allowed **/
! 179: TLS_EXT_EARLY_DATA = 42,
! 180: /** negotiate supported tls versions **/
! 181: TLS_EXT_SUPPORTED_VERSIONS = 43,
! 182: /** identify client **/
! 183: TLS_EXT_COOKIE = 44,
! 184: /** psk modes supported by the client **/
! 185: TLS_EXT_PSK_KEY_EXCHANGE_MODES = 45,
! 186: /** indicate supported ca's by endpoint **/
! 187: TLS_EXT_CERTIFICATE_AUTHORITIES = 47,
! 188: /** provide oid/value pairs to match client's certificate **/
! 189: TLS_EXT_OID_FILTERS = 48,
! 190: /** willing to perform post-handshake authentication **/
! 191: TLS_EXT_POST_HANDSHAKE_AUTH = 49,
! 192: /** list supported signature algorithms to verify certificates **/
! 193: TLS_EXT_SIGNATURE_ALGORITHMS_CERT = 50,
! 194: /** list endpoint's cryptographic parameters **/
! 195: TLS_EXT_KEY_SHARE = 51,
1.1 misho 196: /** cryptographic binding for RFC 5746 renegotiation indication */
197: TLS_EXT_RENEGOTIATION_INFO = 65281,
198: };
199:
200: enum tls_name_type_t {
201: TLS_NAME_TYPE_HOST_NAME = 0,
202: };
203:
204: /**
1.1.1.2 ! misho 205: * Flags that control the behavior of the stack
! 206: */
! 207: enum tls_flag_t {
! 208: /** set if cipher suites with null encryption are acceptable */
! 209: TLS_FLAG_ENCRYPTION_OPTIONAL = 1,
! 210: /** set if client authentication is optional even if cert req sent */
! 211: TLS_FLAG_CLIENT_AUTH_OPTIONAL = 2,
! 212: };
! 213:
! 214: /**
1.1 misho 215: * Enum names for tls_extension_t
216: */
217: extern enum_name_t *tls_extension_names;
218:
219: /**
1.1.1.2 ! misho 220: * Magic value (SHA-256 of "HelloRetryRequest") for Random to differentiate
! 221: * ServerHello from HelloRetryRequest.
! 222: */
! 223: extern chunk_t tls_hello_retry_request_magic;
! 224:
! 225: /**
! 226: * Magic values for downgrade protection (see RFC 8446, section 4.1.3)
! 227: */
! 228: extern chunk_t tls_downgrade_protection_tls11;
! 229: extern chunk_t tls_downgrade_protection_tls12;
! 230:
! 231: /**
1.1 misho 232: * A bottom-up driven TLS stack, suitable for EAP implementations.
233: */
234: struct tls_t {
235:
236: /**
237: * Process one or more TLS records, pass it to upper layers.
238: *
239: * @param buf TLS record data, including headers
240: * @param buflen number of bytes in buf to process
241: * @return
242: * - SUCCESS if TLS negotiation complete
243: * - FAILED if TLS handshake failed
244: * - NEED_MORE if more invocations to process/build needed
245: */
246: status_t (*process)(tls_t *this, void *buf, size_t buflen);
247:
248: /**
249: * Query upper layer for one or more TLS records, build fragments.
250: *
251: * The TLS stack automatically fragments the records to the given buffer
252: * size. Fragmentation is indicated by the reclen output parameter and
253: * the return value. For the first fragment of a TLS record, a non-zero
254: * record length is returned in reclen. If more fragments follow, NEED_MORE
255: * is returned. A return value of ALREADY_DONE indicates that the final
256: * fragment has been returned.
257: *
258: * @param buf buffer to write TLS record fragments to
259: * @param buflen size of buffer, receives bytes written
260: * @param msglen receives size of all TLS fragments
261: * @return
262: * - SUCCESS if TLS negotiation complete
263: * - FAILED if TLS handshake failed
264: * - INVALID_STATE if more input data required
265: * - NEED_MORE if more fragments available
266: * - ALREADY_DONE if the last available fragment returned
267: */
268: status_t (*build)(tls_t *this, void *buf, size_t *buflen, size_t *msglen);
269:
270: /**
271: * Check if TLS stack is acting as a server.
272: *
273: * @return TRUE if server, FALSE if peer
274: */
275: bool (*is_server)(tls_t *this);
276:
277: /**
278: * Return the server identity.
279: *
280: * @return server identity
281: */
282: identification_t* (*get_server_id)(tls_t *this);
283:
284: /**
285: * Set the peer identity.
286: *
287: * @param id peer identity
288: */
289: void (*set_peer_id)(tls_t *this, identification_t *id);
290:
291: /**
292: * Return the peer identity.
293: *
294: * @return peer identity
295: */
296: identification_t* (*get_peer_id)(tls_t *this);
297:
298: /**
1.1.1.2 ! misho 299: * Get the maximum and negotiated TLS version.
1.1 misho 300: *
1.1.1.2 ! misho 301: * @return max and negotiated TLS version
1.1 misho 302: */
1.1.1.2 ! misho 303: tls_version_t (*get_version_max)(tls_t *this);
! 304:
! 305: /**
! 306: * Get the minimum TLS version.
! 307: *
! 308: * @return min TLS version
! 309: */
! 310: tls_version_t (*get_version_min)(tls_t *this);
1.1 misho 311:
312: /**
1.1.1.2 ! misho 313: * Set the initial minimum/maximum TLS version, or set both to the same
! 314: * value once negotiated.
1.1 misho 315: *
1.1.1.2 ! misho 316: * @param min_version minimum (or negotiated) TLS version
! 317: * @param max_version maximum (or negotiated) TLS version
! 318: * @return TRUE if version(s) acceptable
1.1 misho 319: */
1.1.1.2 ! misho 320: bool (*set_version)(tls_t *this, tls_version_t min_version,
! 321: tls_version_t max_version);
1.1 misho 322:
323: /**
324: * Get the purpose of this TLS stack instance.
325: *
326: * @return purpose given during construction
327: */
328: tls_purpose_t (*get_purpose)(tls_t *this);
329:
330: /**
1.1.1.2 ! misho 331: * Get the flags controlling this TLS stack instance.
! 332: *
! 333: * @return flags given during construction
! 334: */
! 335: tls_flag_t (*get_flags)(tls_t *this);
! 336:
! 337: /**
1.1 misho 338: * Check if TLS negotiation completed successfully.
339: *
340: * @return TRUE if TLS negotiation and authentication complete
341: */
342: bool (*is_complete)(tls_t *this);
343:
344: /**
345: * Get the MSK for EAP-TLS.
346: *
347: * @return MSK, internal data
348: */
349: chunk_t (*get_eap_msk)(tls_t *this);
350:
351: /**
352: * Get the authentication details after completing the handshake.
353: *
354: * @return authentication details, internal data
355: */
356: auth_cfg_t* (*get_auth)(tls_t *this);
357:
358: /**
359: * Destroy a tls_t.
360: */
361: void (*destroy)(tls_t *this);
362: };
363:
364: /**
365: * Dummy libtls initialization function needed for integrity test
366: */
367: void libtls_init(void);
368:
369: /**
370: * Create a tls instance.
371: *
372: * @param is_server TRUE to act as server, FALSE for client
373: * @param server server identity
374: * @param peer peer identity, NULL for no client authentication
375: * @param purpose purpose this TLS stack instance is used for
376: * @param application higher layer application or NULL if none
377: * @param cache session cache to use, or NULL
1.1.1.2 ! misho 378: * @param flags flags that control the behavior of the TLS stack
1.1 misho 379: * @return TLS stack
380: */
381: tls_t *tls_create(bool is_server, identification_t *server,
382: identification_t *peer, tls_purpose_t purpose,
1.1.1.2 ! misho 383: tls_application_t *application, tls_cache_t *cache,
! 384: tls_flag_t flags);
1.1 misho 385:
386: #endif /** TLS_H_ @}*/
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>