36 #if defined(POLARSSL_SSL_TLS_C)
46 #if defined(POLARSSL_GCM_C)
53 #if defined _MSC_VER && !defined strcasecmp
54 #define strcasecmp _stricmp
57 #if defined(POLARSSL_SSL_HW_RECORD_ACCEL)
59 const unsigned char *key_enc,
const unsigned char *key_dec,
60 const unsigned char *iv_enc,
const unsigned char *iv_dec,
61 const unsigned char *mac_enc,
const unsigned char *mac_dec) = NULL;
62 int (*ssl_hw_record_reset)(
ssl_context *ssl) = NULL;
63 int (*ssl_hw_record_write)(
ssl_context *ssl) = NULL;
65 int (*ssl_hw_record_finish)(
ssl_context *ssl) = NULL;
68 static int ssl_rsa_decrypt(
void *ctx,
69 int (*f_rng)(
void *,
unsigned char *,
size_t),
70 void *p_rng,
int mode,
size_t *olen,
71 const unsigned char *input,
unsigned char *output,
72 size_t output_max_len )
75 input, output, output_max_len );
78 static int ssl_rsa_sign(
void *ctx,
79 int (*f_rng)(
void *,
unsigned char *,
size_t),
void *p_rng,
80 int mode,
int hash_id,
unsigned int hashlen,
81 const unsigned char *hash,
unsigned char *sig )
87 static size_t ssl_rsa_key_len(
void *ctx )
95 static int ssl3_prf(
unsigned char *secret,
size_t slen,
char *label,
96 unsigned char *random,
size_t rlen,
97 unsigned char *dstbuf,
size_t dlen )
102 unsigned char padding[16];
103 unsigned char sha1sum[20];
114 for( i = 0; i < dlen / 16; i++ )
116 memset( padding,
'A' + i, 1 + i );
130 memset( &md5, 0,
sizeof( md5 ) );
131 memset( &sha1, 0,
sizeof( sha1 ) );
133 memset( padding, 0,
sizeof( padding ) );
134 memset( sha1sum, 0,
sizeof( sha1sum ) );
139 static int tls1_prf(
unsigned char *secret,
size_t slen,
char *label,
140 unsigned char *random,
size_t rlen,
141 unsigned char *dstbuf,
size_t dlen )
145 unsigned char *S1, *S2;
146 unsigned char tmp[128];
147 unsigned char h_i[20];
149 if(
sizeof( tmp ) < 20 + strlen( label ) + rlen )
152 hs = ( slen + 1 ) / 2;
154 S2 = secret + slen - hs;
156 nb = strlen( label );
157 memcpy( tmp + 20, label, nb );
158 memcpy( tmp + 20 + nb, random, rlen );
164 md5_hmac( S1, hs, tmp + 20, nb, 4 + tmp );
166 for( i = 0; i < dlen; i += 16 )
168 md5_hmac( S1, hs, 4 + tmp, 16 + nb, h_i );
169 md5_hmac( S1, hs, 4 + tmp, 16, 4 + tmp );
171 k = ( i + 16 > dlen ) ? dlen % 16 : 16;
173 for( j = 0; j < k; j++ )
174 dstbuf[i + j] = h_i[j];
182 for( i = 0; i < dlen; i += 20 )
187 k = ( i + 20 > dlen ) ? dlen % 20 : 20;
189 for( j = 0; j < k; j++ )
190 dstbuf[i + j] = (
unsigned char)( dstbuf[i + j] ^ h_i[j] );
193 memset( tmp, 0,
sizeof( tmp ) );
194 memset( h_i, 0,
sizeof( h_i ) );
199 static int tls_prf_sha256(
unsigned char *secret,
size_t slen,
char *label,
200 unsigned char *random,
size_t rlen,
201 unsigned char *dstbuf,
size_t dlen )
205 unsigned char tmp[128];
206 unsigned char h_i[32];
208 if(
sizeof( tmp ) < 32 + strlen( label ) + rlen )
211 nb = strlen( label );
212 memcpy( tmp + 32, label, nb );
213 memcpy( tmp + 32 + nb, random, rlen );
219 sha2_hmac( secret, slen, tmp + 32, nb, tmp, 0 );
221 for( i = 0; i < dlen; i += 32 )
223 sha2_hmac( secret, slen, tmp, 32 + nb, h_i, 0 );
224 sha2_hmac( secret, slen, tmp, 32, tmp, 0 );
226 k = ( i + 32 > dlen ) ? dlen % 32 : 32;
228 for( j = 0; j < k; j++ )
229 dstbuf[i + j] = h_i[j];
232 memset( tmp, 0,
sizeof( tmp ) );
233 memset( h_i, 0,
sizeof( h_i ) );
238 #if defined(POLARSSL_SHA4_C)
239 static int tls_prf_sha384(
unsigned char *secret,
size_t slen,
char *label,
240 unsigned char *random,
size_t rlen,
241 unsigned char *dstbuf,
size_t dlen )
245 unsigned char tmp[128];
246 unsigned char h_i[48];
248 if(
sizeof( tmp ) < 48 + strlen( label ) + rlen )
251 nb = strlen( label );
252 memcpy( tmp + 48, label, nb );
253 memcpy( tmp + 48 + nb, random, rlen );
259 sha4_hmac( secret, slen, tmp + 48, nb, tmp, 1 );
261 for( i = 0; i < dlen; i += 48 )
263 sha4_hmac( secret, slen, tmp, 48 + nb, h_i, 1 );
264 sha4_hmac( secret, slen, tmp, 48, tmp, 1 );
266 k = ( i + 48 > dlen ) ? dlen % 48 : 48;
268 for( j = 0; j < k; j++ )
269 dstbuf[i + j] = h_i[j];
272 memset( tmp, 0,
sizeof( tmp ) );
273 memset( h_i, 0,
sizeof( h_i ) );
279 static void ssl_update_checksum_start(
ssl_context *,
unsigned char *,
size_t);
280 static void ssl_update_checksum_md5sha1(
ssl_context *,
unsigned char *,
size_t);
281 static void ssl_update_checksum_sha256(
ssl_context *,
unsigned char *,
size_t);
283 static void ssl_calc_verify_ssl(
ssl_context *,
unsigned char *);
284 static void ssl_calc_verify_tls(
ssl_context *,
unsigned char *);
285 static void ssl_calc_verify_tls_sha256(
ssl_context *,
unsigned char *);
287 static void ssl_calc_finished_ssl(
ssl_context *,
unsigned char *,
int);
288 static void ssl_calc_finished_tls(
ssl_context *,
unsigned char *,
int);
289 static void ssl_calc_finished_tls_sha256(
ssl_context *,
unsigned char *,
int);
291 #if defined(POLARSSL_SHA4_C)
292 static void ssl_update_checksum_sha384(
ssl_context *,
unsigned char *,
size_t);
293 static void ssl_calc_verify_tls_sha384(
ssl_context *,
unsigned char *);
294 static void ssl_calc_finished_tls_sha384(
ssl_context *,
unsigned char *,
int);
299 unsigned char tmp[64];
300 unsigned char keyblk[256];
303 unsigned int iv_copy_len;
325 #if defined(POLARSSL_SHA4_C)
329 handshake->
tls_prf = tls_prf_sha384;
330 handshake->
calc_verify = ssl_calc_verify_tls_sha384;
336 handshake->
tls_prf = tls_prf_sha256;
337 handshake->
calc_verify = ssl_calc_verify_tls_sha256;
351 if( handshake->
resume == 0 )
369 memcpy( handshake->
randbytes, tmp + 32, 32 );
370 memcpy( handshake->
randbytes + 32, tmp, 32 );
371 memset( tmp, 0,
sizeof( tmp ) );
401 #if defined(POLARSSL_ARC4_C)
413 #if defined(POLARSSL_DES_C)
421 #if defined(POLARSSL_AES_C)
434 #if defined(POLARSSL_SHA2_C)
447 #if defined(POLARSSL_GCM_C)
464 #if defined(POLARSSL_CAMELLIA_C)
477 #if defined(POLARSSL_SHA2_C)
492 #if defined(POLARSSL_ENABLE_WEAK_CIPHERSUITES)
493 #if defined(POLARSSL_CIPHER_NULL_CIPHER)
510 #if defined(POLARSSL_DES_C)
525 SSL_DEBUG_MSG( 3, (
"keylen: %d, minlen: %d, ivlen: %d, maclen: %d",
534 key1 = keyblk + transform->
maclen * 2;
535 key2 = keyblk + transform->
maclen * 2 + transform->
keylen;
546 memcpy( transform->
iv_enc, key2 + transform->
keylen, iv_copy_len );
547 memcpy( transform->
iv_dec, key2 + transform->
keylen + iv_copy_len,
552 key1 = keyblk + transform->
maclen * 2 + transform->
keylen;
553 key2 = keyblk + transform->
maclen * 2;
564 memcpy( transform->
iv_dec, key1 + transform->
keylen, iv_copy_len );
565 memcpy( transform->
iv_enc, key1 + transform->
keylen + iv_copy_len,
569 #if defined(POLARSSL_SSL_HW_RECORD_ACCEL)
570 if( ssl_hw_record_init != NULL)
576 if( ( ret = ssl_hw_record_init( ssl, key1, key2, transform->
iv_enc,
588 #if defined(POLARSSL_ARC4_C)
598 #if defined(POLARSSL_DES_C)
606 #if defined(POLARSSL_AES_C)
623 #if defined(POLARSSL_GCM_C)
638 #if defined(POLARSSL_CAMELLIA_C)
656 #if defined(POLARSSL_ENABLE_WEAK_CIPHERSUITES)
657 #if defined(POLARSSL_CIPHER_NULL_CIPHER)
664 #if defined(POLARSSL_DES_C)
677 memset( keyblk, 0,
sizeof( keyblk ) );
679 #if defined(POLARSSL_ZLIB_SUPPORT)
686 memset( &transform->ctx_deflate, 0,
sizeof( transform->ctx_deflate ) );
687 memset( &transform->ctx_inflate, 0,
sizeof( transform->ctx_inflate ) );
689 if( deflateInit( &transform->ctx_deflate, Z_DEFAULT_COMPRESSION ) != Z_OK ||
690 inflateInit( &transform->ctx_inflate ) != Z_OK )
703 void ssl_calc_verify_ssl(
ssl_context *ssl,
unsigned char hash[36] )
707 unsigned char pad_1[48];
708 unsigned char pad_2[48];
715 memset( pad_1, 0x36, 48 );
716 memset( pad_2, 0x5C, 48 );
744 void ssl_calc_verify_tls(
ssl_context *ssl,
unsigned char hash[36] )
763 void ssl_calc_verify_tls_sha256(
ssl_context *ssl,
unsigned char hash[32] )
778 #if defined(POLARSSL_SHA4_C)
779 void ssl_calc_verify_tls_sha384(
ssl_context *ssl,
unsigned char hash[48] )
798 static void ssl_mac_md5(
unsigned char *secret,
799 unsigned char *buf,
size_t len,
800 unsigned char *ctr,
int type )
802 unsigned char header[11];
803 unsigned char padding[48];
806 memcpy( header, ctr, 8 );
807 header[ 8] = (
unsigned char) type;
808 header[ 9] = (
unsigned char)( len >> 8 );
809 header[10] = (
unsigned char)( len );
811 memset( padding, 0x36, 48 );
819 memset( padding, 0x5C, 48 );
827 static void ssl_mac_sha1(
unsigned char *secret,
828 unsigned char *buf,
size_t len,
829 unsigned char *ctr,
int type )
831 unsigned char header[11];
832 unsigned char padding[40];
835 memcpy( header, ctr, 8 );
836 header[ 8] = (
unsigned char) type;
837 header[ 9] = (
unsigned char)( len >> 8 );
838 header[10] = (
unsigned char)( len );
840 memset( padding, 0x36, 40 );
848 memset( padding, 0x5C, 40 );
856 static void ssl_mac_sha2(
unsigned char *secret,
857 unsigned char *buf,
size_t len,
858 unsigned char *ctr,
int type )
860 unsigned char header[11];
861 unsigned char padding[32];
864 memcpy( header, ctr, 8 );
865 header[ 8] = (
unsigned char) type;
866 header[ 9] = (
unsigned char)( len >> 8 );
867 header[10] = (
unsigned char)( len );
869 memset( padding, 0x36, 32 );
877 memset( padding, 0x5C, 32 );
965 "including %d bytes of padding",
971 #if defined(POLARSSL_ARC4_C)
980 #if defined(POLARSSL_CIPHER_NULL_CIPHER)
992 unsigned char *enc_msg;
993 unsigned char add_data[13];
999 memcpy( add_data, ssl->
out_ctr, 8 );
1003 add_data[11] = ( ssl->
out_msglen >> 8 ) & 0xFF;
1009 #if defined(POLARSSL_AES_C) && defined(POLARSSL_GCM_C)
1045 "including %d bytes of padding",
1061 16, enc_msg + enc_msglen );
1064 enc_msg + enc_msglen, 16 );
1072 unsigned char *enc_msg;
1080 for( i = 0; i <= padlen; i++ )
1119 "including %d bytes of IV and %d bytes of padding",
1127 #if defined(POLARSSL_DES_C)
1129 #if defined(POLARSSL_ENABLE_WEAK_CIPHERSUITES)
1146 #if defined(POLARSSL_AES_C)
1163 #if defined(POLARSSL_CAMELLIA_C)
1185 for( i = 8; i > 0; i-- )
1186 if( ++ssl->
out_ctr[i - 1] != 0 )
1197 #define POLARSSL_SSL_MAX_MAC_SIZE 32
1201 size_t i, padlen = 0, correct = 1;
1202 unsigned char tmp[POLARSSL_SSL_MAX_MAC_SIZE];
1215 #if defined(POLARSSL_ARC4_C)
1224 #if defined(POLARSSL_CIPHER_NULL_CIPHER)
1235 unsigned char *dec_msg;
1236 unsigned char *dec_msg_result;
1238 unsigned char add_data[13];
1241 #if defined(POLARSSL_AES_C) && defined(POLARSSL_GCM_C)
1252 dec_msg_result = ssl->
in_msg;
1255 memcpy( add_data, ssl->
in_ctr, 8 );
1259 add_data[11] = ( ssl->
in_msglen >> 8 ) & 0xFF;
1282 dec_msg + dec_msglen, 16,
1283 dec_msg, dec_msg_result );
1287 SSL_DEBUG_MSG( 1, (
"AEAD decrypt failed on validation (ret = -0x%02x)",
1301 unsigned char *dec_msg;
1302 unsigned char *dec_msg_result;
1322 SSL_DEBUG_MSG( 1, (
"msglen (%d) < max( ivlen(%d), maclen (%d) + 1 ) ( + expl IV )",
1329 dec_msg_result = ssl->
in_msg;
1346 #if defined(POLARSSL_DES_C)
1348 #if defined(POLARSSL_ENABLE_WEAK_CIPHERSUITES)
1365 #if defined(POLARSSL_AES_C)
1382 #if defined(POLARSSL_CAMELLIA_C)
1407 #if defined(POLARSSL_SSL_DEBUG_ALL)
1408 SSL_DEBUG_MSG( 1, (
"msglen (%d) < maclen (%d) + padlen (%d)",
1419 #if defined(POLARSSL_SSL_DEBUG_ALL)
1421 "should be no more than %d",
1433 size_t pad_count = 0, fake_pad_count = 0;
1434 size_t padding_idx = ssl->
in_msglen - padlen - 1;
1436 for( i = 1; i <= padlen; i++ )
1437 pad_count += ( ssl->
in_msg[padding_idx + i] == padlen - 1 );
1439 for( ; i <= 256; i++ )
1440 fake_pad_count += ( ssl->
in_msg[padding_idx + i] == padlen - 1 );
1442 correct &= ( pad_count == padlen );
1443 correct &= ( pad_count + fake_pad_count < 512 );
1445 #if defined(POLARSSL_SSL_DEBUG_ALL)
1446 if( padlen > 0 && correct == 0)
1449 padlen &= correct * 0x1FF;
1502 int j, extra_run = 0;
1503 extra_run = ( 13 + ssl->
in_msglen + padlen + 8 ) / 64 -
1506 extra_run &= correct * 0xFF;
1515 for( j = 0; j < extra_run; j++ )
1525 for( j = 0; j < extra_run; j++ )
1535 for( j = 0; j < extra_run; j++ )
1553 #if defined(POLARSSL_SSL_DEBUG_ALL)
1576 "messages, possible DoS attack" ) );
1583 for( i = 8; i > 0; i-- )
1584 if( ++ssl->
in_ctr[i - 1] != 0 )
1592 #if defined(POLARSSL_ZLIB_SUPPORT)
1599 unsigned char *msg_post = ssl->
out_msg;
1601 unsigned char *msg_pre;
1605 msg_pre = (
unsigned char*) malloc( len_pre );
1606 if( msg_pre == NULL )
1612 memcpy( msg_pre, ssl->
out_msg, len_pre );
1625 ret = deflate( &ssl->
transform_out->ctx_deflate, Z_SYNC_FLUSH );
1628 SSL_DEBUG_MSG( 1, (
"failed to perform compression (%d)", ret ) );
1650 unsigned char *msg_post = ssl->
in_msg;
1652 unsigned char *msg_pre;
1656 msg_pre = (
unsigned char*) malloc( len_pre );
1657 if( msg_pre == NULL )
1663 memcpy( msg_pre, ssl->
in_msg, len_pre );
1676 ret = inflate( &ssl->
transform_in->ctx_inflate, Z_SYNC_FLUSH );
1679 SSL_DEBUG_MSG( 1, (
"failed to perform decompression (%d)", ret ) );
1709 while( ssl->
in_left < nb_want )
1751 buf = ssl->
out_hdr + 5 - header_left;
1790 ssl->
out_msg[1] = (
unsigned char)( ( len - 4 ) >> 16 );
1791 ssl->
out_msg[2] = (
unsigned char)( ( len - 4 ) >> 8 );
1792 ssl->
out_msg[3] = (
unsigned char)( ( len - 4 ) );
1797 #if defined(POLARSSL_ZLIB_SUPPORT)
1801 if( ( ret = ssl_compress_buf( ssl ) ) != 0 )
1811 #if defined(POLARSSL_SSL_HW_RECORD_ACCEL)
1812 if( ssl_hw_record_write != NULL)
1816 ret = ssl_hw_record_write( ssl );
1830 ssl->
out_hdr[3] = (
unsigned char)( len >> 8 );
1831 ssl->
out_hdr[4] = (
unsigned char)( len );
1835 if( ( ret = ssl_encrypt_buf( ssl ) ) != 0 )
1842 ssl->
out_hdr[3] = (
unsigned char)( len >> 8 );
1843 ssl->
out_hdr[4] = (
unsigned char)( len );
1849 "version = [%d:%d], msglen = %d",
1891 " %d, type = %d, hslen = %d",
1926 "version = [%d:%d], msglen = %d",
1992 #if defined(POLARSSL_SSL_HW_RECORD_ACCEL)
1993 if( ssl_hw_record_read != NULL)
1997 ret = ssl_hw_record_read( ssl );
2008 if( ( ret = ssl_decrypt_buf( ssl ) ) != 0 )
2010 #if defined(POLARSSL_SSL_ALERT_MESSAGES)
2032 #if defined(POLARSSL_ZLIB_SUPPORT)
2036 if( ( ret = ssl_decompress_buf( ssl ) ) != 0 )
2070 " %d, type = %d, hslen = %d",
2141 unsigned char level,
2142 unsigned char message )
2223 while( crt != NULL )
2233 ssl->
out_msg[i ] = (
unsigned char)( n >> 16 );
2234 ssl->
out_msg[i + 1] = (
unsigned char)( n >> 8 );
2235 ssl->
out_msg[i + 2] = (
unsigned char)( n );
2237 i += 3; memcpy( ssl->
out_msg + i, crt->
raw.
p, n );
2238 i += n; crt = crt->
next;
2241 ssl->
out_msg[4] = (
unsigned char)( ( i - 7 ) >> 16 );
2242 ssl->
out_msg[5] = (
unsigned char)( ( i - 7 ) >> 8 );
2243 ssl->
out_msg[6] = (
unsigned char)( ( i - 7 ) );
2315 memcmp( ssl->
in_msg + 4,
"\0\0\0", 3 ) == 0 )
2369 while( i < ssl->in_hslen )
2371 if( ssl->
in_msg[i] != 0 )
2377 n = ( (
unsigned int) ssl->
in_msg[i + 1] << 8 )
2378 | (
unsigned int) ssl->
in_msg[i + 2];
2381 if( n < 128 || i + n > ssl->
in_hslen )
2481 #if !defined(POLARSSL_SHA4_C)
2482 ((void) ciphersuite);
2487 #if defined(POLARSSL_SHA4_C)
2498 static void ssl_update_checksum_start(
ssl_context *ssl,
unsigned char *buf,
2504 #if defined(POLARSSL_SHA4_C)
2509 static void ssl_update_checksum_md5sha1(
ssl_context *ssl,
unsigned char *buf,
2516 static void ssl_update_checksum_sha256(
ssl_context *ssl,
unsigned char *buf,
2522 #if defined(POLARSSL_SHA4_C)
2523 static void ssl_update_checksum_sha384(
ssl_context *ssl,
unsigned char *buf,
2530 static void ssl_calc_finished_ssl(
2537 unsigned char padbuf[48];
2538 unsigned char md5sum[16];
2539 unsigned char sha1sum[20];
2559 #if !defined(POLARSSL_MD5_ALT)
2564 #if !defined(POLARSSL_SHA1_ALT)
2572 memset( padbuf, 0x36, 48 );
2574 md5_update( &md5, (
const unsigned char *) sender, 4 );
2579 sha1_update( &sha1, (
const unsigned char *) sender, 4 );
2584 memset( padbuf, 0x5C, 48 );
2603 memset( padbuf, 0,
sizeof( padbuf ) );
2604 memset( md5sum, 0,
sizeof( md5sum ) );
2605 memset( sha1sum, 0,
sizeof( sha1sum ) );
2610 static void ssl_calc_finished_tls(
2617 unsigned char padbuf[36];
2634 #if !defined(POLARSSL_MD5_ALT)
2639 #if !defined(POLARSSL_SHA1_ALT)
2646 :
"server finished";
2652 padbuf, 36, buf, len );
2659 memset( padbuf, 0,
sizeof( padbuf ) );
2664 static void ssl_calc_finished_tls_sha256(
2670 unsigned char padbuf[32];
2686 #if !defined(POLARSSL_SHA2_ALT)
2693 :
"server finished";
2698 padbuf, 32, buf, len );
2704 memset( padbuf, 0,
sizeof( padbuf ) );
2709 #if defined(POLARSSL_SHA4_C)
2710 static void ssl_calc_finished_tls_sha384(
2716 unsigned char padbuf[48];
2732 #if !defined(POLARSSL_SHA4_ALT)
2739 :
"server finished";
2744 padbuf, 48, buf, len );
2750 memset( padbuf, 0,
sizeof( padbuf ) );
2833 SSL_DEBUG_MSG( 3, (
"switching to new transform spec for outbound data" ) );
2852 unsigned int hash_len;
2853 unsigned char buf[36];
2862 SSL_DEBUG_MSG( 3, (
"switching to new transform spec for inbound data" ) );
2865 memset( ssl->
in_ctr, 0, 8 );
2889 if( memcmp( ssl->
in_msg + 4, buf, hash_len ) != 0 )
2935 SSL_DEBUG_MSG( 1, (
"malloc() of ssl sub-contexts failed" ) );
2946 #if defined(POLARSSL_SHA4_C)
2979 #if defined(POLARSSL_DHM_C)
2993 ssl->
in_ctr = (
unsigned char *) malloc( len );
2997 if( ssl->
in_ctr == NULL )
3003 ssl->
out_ctr = (
unsigned char *) malloc( len );
3010 free( ssl-> in_ctr );
3020 if( ( ret = ssl_handshake_init( ssl ) ) != 0 )
3061 #if defined(POLARSSL_SSL_HW_RECORD_ACCEL)
3062 if( ssl_hw_record_reset != NULL)
3065 if( ssl_hw_record_reset( ssl ) != 0 )
3087 if( ( ret = ssl_handshake_init( ssl ) ) != 0 )
3107 int (*f_vrfy)(
void *,
x509_cert *,
int,
int *),
3115 int (*f_rng)(
void *,
unsigned char *,
size_t),
3123 void (*f_dbg)(
void *,
int,
const char *),
3131 int (*f_recv)(
void *,
unsigned char *,
size_t),
void *p_recv,
3132 int (*f_send)(
void *,
const unsigned char *,
size_t),
void *p_send )
3141 int (*f_get_cache)(
void *,
ssl_session *),
void *p_get_cache,
3142 int (*f_set_cache)(
void *,
const ssl_session *),
void *p_set_cache )
3165 int major,
int minor )
3177 x509_crl *ca_crl,
const char *peer_cn )
3205 #if defined(POLARSSL_DHM_C)
3247 if( hostname == NULL )
3260 memcpy( ssl->
hostname, (
const unsigned char *) hostname,
3270 const unsigned char *,
size_t),
3314 switch( ciphersuite_id )
3316 #if defined(POLARSSL_ARC4_C)
3318 return(
"TLS-RSA-WITH-RC4-128-MD5" );
3321 return(
"TLS-RSA-WITH-RC4-128-SHA" );
3324 #if defined(POLARSSL_DES_C)
3326 return(
"TLS-RSA-WITH-3DES-EDE-CBC-SHA" );
3329 return(
"TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA" );
3332 #if defined(POLARSSL_AES_C)
3334 return(
"TLS-RSA-WITH-AES-128-CBC-SHA" );
3337 return(
"TLS-DHE-RSA-WITH-AES-128-CBC-SHA" );
3340 return(
"TLS-RSA-WITH-AES-256-CBC-SHA" );
3343 return(
"TLS-DHE-RSA-WITH-AES-256-CBC-SHA" );
3345 #if defined(POLARSSL_SHA2_C)
3347 return(
"TLS-RSA-WITH-AES-128-CBC-SHA256" );
3350 return(
"TLS-RSA-WITH-AES-256-CBC-SHA256" );
3353 return(
"TLS-DHE-RSA-WITH-AES-128-CBC-SHA256" );
3356 return(
"TLS-DHE-RSA-WITH-AES-256-CBC-SHA256" );
3359 #if defined(POLARSSL_GCM_C) && defined(POLARSSL_SHA2_C)
3361 return(
"TLS-RSA-WITH-AES-128-GCM-SHA256" );
3364 return(
"TLS-RSA-WITH-AES-256-GCM-SHA384" );
3367 #if defined(POLARSSL_GCM_C) && defined(POLARSSL_SHA4_C)
3369 return(
"TLS-DHE-RSA-WITH-AES-128-GCM-SHA256" );
3372 return(
"TLS-DHE-RSA-WITH-AES-256-GCM-SHA384" );
3376 #if defined(POLARSSL_CAMELLIA_C)
3378 return(
"TLS-RSA-WITH-CAMELLIA-128-CBC-SHA" );
3381 return(
"TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA" );
3384 return(
"TLS-RSA-WITH-CAMELLIA-256-CBC-SHA" );
3387 return(
"TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA" );
3389 #if defined(POLARSSL_SHA2_C)
3391 return(
"TLS-RSA-WITH-CAMELLIA-128-CBC-SHA256" );
3394 return(
"TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA256" );
3397 return(
"TLS-RSA-WITH-CAMELLIA-256-CBC-SHA256" );
3400 return(
"TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA256" );
3404 #if defined(POLARSSL_ENABLE_WEAK_CIPHERSUITES)
3405 #if defined(POLARSSL_CIPHER_NULL_CIPHER)
3407 return(
"TLS-RSA-WITH-NULL-MD5" );
3409 return(
"TLS-RSA-WITH-NULL-SHA" );
3411 return(
"TLS-RSA-WITH-NULL-SHA256" );
3414 #if defined(POLARSSL_DES_C)
3416 return(
"TLS-RSA-WITH-DES-CBC-SHA" );
3418 return(
"TLS-DHE-RSA-WITH-DES-CBC-SHA" );
3426 return(
"unknown" );
3431 #if defined(POLARSSL_ARC4_C)
3432 if (0 == strcasecmp(ciphersuite_name,
"TLS-RSA-WITH-RC4-128-MD5"))
3434 if (0 == strcasecmp(ciphersuite_name,
"TLS-RSA-WITH-RC4-128-SHA"))
3438 #if defined(POLARSSL_DES_C)
3439 if (0 == strcasecmp(ciphersuite_name,
"TLS-RSA-WITH-3DES-EDE-CBC-SHA"))
3441 if (0 == strcasecmp(ciphersuite_name,
"TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA"))
3445 #if defined(POLARSSL_AES_C)
3446 if (0 == strcasecmp(ciphersuite_name,
"TLS-RSA-WITH-AES-128-CBC-SHA"))
3448 if (0 == strcasecmp(ciphersuite_name,
"TLS-DHE-RSA-WITH-AES-128-CBC-SHA"))
3450 if (0 == strcasecmp(ciphersuite_name,
"TLS-RSA-WITH-AES-256-CBC-SHA"))
3452 if (0 == strcasecmp(ciphersuite_name,
"TLS-DHE-RSA-WITH-AES-256-CBC-SHA"))
3455 #if defined(POLARSSL_SHA2_C)
3456 if (0 == strcasecmp(ciphersuite_name,
"TLS-RSA-WITH-AES-128-CBC-SHA256"))
3458 if (0 == strcasecmp(ciphersuite_name,
"TLS-RSA-WITH-AES-256-CBC-SHA256"))
3460 if (0 == strcasecmp(ciphersuite_name,
"TLS-DHE-RSA-WITH-AES-128-CBC-SHA256"))
3462 if (0 == strcasecmp(ciphersuite_name,
"TLS-DHE-RSA-WITH-AES-256-CBC-SHA256"))
3466 #if defined(POLARSSL_GCM_C) && defined(POLARSSL_SHA2_C)
3467 if (0 == strcasecmp(ciphersuite_name,
"TLS-RSA-WITH-AES-128-GCM-SHA256"))
3469 if (0 == strcasecmp(ciphersuite_name,
"TLS-RSA-WITH-AES-256-GCM-SHA384"))
3473 #if defined(POLARSSL_GCM_C) && defined(POLARSSL_SHA2_C)
3474 if (0 == strcasecmp(ciphersuite_name,
"TLS-DHE-RSA-WITH-AES-128-GCM-SHA256"))
3476 if (0 == strcasecmp(ciphersuite_name,
"TLS-DHE-RSA-WITH-AES-256-GCM-SHA384"))
3481 #if defined(POLARSSL_CAMELLIA_C)
3482 if (0 == strcasecmp(ciphersuite_name,
"TLS-RSA-WITH-CAMELLIA-128-CBC-SHA"))
3484 if (0 == strcasecmp(ciphersuite_name,
"TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA"))
3486 if (0 == strcasecmp(ciphersuite_name,
"TLS-RSA-WITH-CAMELLIA-256-CBC-SHA"))
3488 if (0 == strcasecmp(ciphersuite_name,
"TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA"))
3491 #if defined(POLARSSL_SHA2_C)
3492 if (0 == strcasecmp(ciphersuite_name,
"TLS-RSA-WITH-CAMELLIA-128-CBC-SHA256"))
3494 if (0 == strcasecmp(ciphersuite_name,
"TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA256"))
3496 if (0 == strcasecmp(ciphersuite_name,
"TLS-RSA-WITH-CAMELLIA-256-CBC-SHA256"))
3498 if (0 == strcasecmp(ciphersuite_name,
"TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA256"))
3503 #if defined(POLARSSL_ENABLE_WEAK_CIPHERSUITES)
3504 #if defined(POLARSSL_CIPHER_NULL_CIPHER)
3505 if (0 == strcasecmp(ciphersuite_name,
"TLS-RSA-WITH-NULL-MD5"))
3507 if (0 == strcasecmp(ciphersuite_name,
"TLS-RSA-WITH-NULL-SHA"))
3509 if (0 == strcasecmp(ciphersuite_name,
"TLS-RSA-WITH-NULL-SHA256"))
3513 #if defined(POLARSSL_DES_C)
3514 if (0 == strcasecmp(ciphersuite_name,
"TLS-RSA-WITH-DES-CBC-SHA"))
3516 if (0 == strcasecmp(ciphersuite_name,
"TLS-DHE-RSA-WITH-DES-CBC-SHA"))
3526 switch( ciphersuite_id )
3570 if( ssl == NULL || ssl->
session == NULL )
3581 return(
"SSLv3.0" );
3584 return(
"TLSv1.0" );
3587 return(
"TLSv1.1" );
3590 return(
"TLSv1.2" );
3595 return(
"unknown" );
3600 if( ssl == NULL || ssl->
session == NULL )
3608 #if defined(POLARSSL_DHM_C)
3609 #if defined(POLARSSL_AES_C)
3610 #if defined(POLARSSL_SHA2_C)
3613 #if defined(POLARSSL_GCM_C) && defined(POLARSSL_SHA4_C)
3617 #if defined(POLARSSL_SHA2_C)
3620 #if defined(POLARSSL_GCM_C) && defined(POLARSSL_SHA2_C)
3625 #if defined(POLARSSL_CAMELLIA_C)
3626 #if defined(POLARSSL_SHA2_C)
3630 #if defined(POLARSSL_SHA2_C)
3635 #if defined(POLARSSL_DES_C)
3640 #if defined(POLARSSL_AES_C)
3641 #if defined(POLARSSL_SHA2_C)
3644 #if defined(POLARSSL_GCM_C) && defined(POLARSSL_SHA4_C)
3649 #if defined(POLARSSL_CAMELLIA_C)
3650 #if defined(POLARSSL_SHA2_C)
3655 #if defined(POLARSSL_AES_C)
3656 #if defined(POLARSSL_SHA2_C)
3659 #if defined(POLARSSL_GCM_C) && defined(POLARSSL_SHA2_C)
3664 #if defined(POLARSSL_CAMELLIA_C)
3665 #if defined(POLARSSL_SHA2_C)
3670 #if defined(POLARSSL_DES_C)
3673 #if defined(POLARSSL_ARC4_C)
3687 #if defined(POLARSSL_SSL_CLI_C)
3692 #if defined(POLARSSL_SSL_SRV_C)
3737 if( ( ret = ssl_handshake_init( ssl ) ) != 0 )
3805 SSL_DEBUG_MSG( 1, (
"handshake received (not HelloRequest)" ) );
3813 SSL_DEBUG_MSG( 3, (
"ignoring renegotiation, sending alert" ) );
3856 memcpy( buf, ssl->
in_offt, n );
3905 memcpy( ssl->
out_msg, buf, n );
3951 #if defined(POLARSSL_ZLIB_SUPPORT)
3952 deflateEnd( &transform->ctx_deflate );
3953 inflateEnd( &transform->ctx_inflate );
3961 #if defined(POLARSSL_DHM_C)
3993 if( ssl->
in_ctr != NULL )
3999 #if defined(POLARSSL_DHM_C)
4034 #if defined(POLARSSL_SSL_HW_RECORD_ACCEL)
4035 if( ssl_hw_record_finish != NULL )
4038 ssl_hw_record_finish( ssl );
#define SSL_ALERT_LEVEL_FATAL
#define SSL_ALERT_MSG_BAD_RECORD_MAC
#define TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
TLS 1.2.
void sha1_hmac_finish(sha1_context *ctx, unsigned char output[20])
SHA-1 HMAC final digest.
#define POLARSSL_ERR_SSL_BAD_HS_CHANGE_CIPHER_SPEC
Processing of the ChangeCipherSpec handshake message failed.
int x509parse_crt_der(x509_cert *chain, const unsigned char *buf, size_t buflen)
Parse a single DER formatted certificate and add it to the chained list.
int ssl_send_alert_message(ssl_context *ssl, unsigned char level, unsigned char message)
Send an alert message.
void(* f_dbg)(void *, int, const char *)
int(* f_rng)(void *, unsigned char *, size_t)
void sha2_hmac_update(sha2_context *ctx, const unsigned char *input, size_t ilen)
SHA-256 HMAC process buffer.
SHA-256 context structure.
#define POLARSSL_DHM_RFC5114_MODP_1024_P
int gcm_auth_decrypt(gcm_context *ctx, size_t length, const unsigned char *iv, size_t iv_len, const unsigned char *add, size_t add_len, const unsigned char *tag, size_t tag_len, const unsigned char *input, unsigned char *output)
GCM buffer authenticated decryption using AES.
#define TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
void(* update_checksum)(ssl_context *, unsigned char *, size_t)
#define SSL_DEBUG_RET(level, text, ret)
#define TLS_RSA_WITH_AES_128_CBC_SHA
int(* tls_prf)(unsigned char *, size_t, char *, unsigned char *, size_t, unsigned char *, size_t)
int arc4_crypt(arc4_context *ctx, size_t length, const unsigned char *input, unsigned char *output)
ARC4 cipher function.
void arc4_setup(arc4_context *ctx, const unsigned char *key, unsigned int keylen)
ARC4 key schedule.
const int ** ciphersuites
#define TLS_RSA_WITH_RC4_128_SHA
char peer_verify_data[36]
int camellia_crypt_cbc(camellia_context *ctx, int mode, size_t length, unsigned char iv[16], const unsigned char *input, unsigned char *output)
CAMELLIA-CBC buffer encryption/decryption Length should be a multiple of the block size (16 bytes) ...
void ssl_set_own_cert(ssl_context *ssl, x509_cert *own_cert, rsa_context *rsa_key)
Set own certificate chain and private key.
ssl_transform * transform_out
int ssl_get_ciphersuite_min_version(const int ciphersuite_id)
#define POLARSSL_ERR_SSL_CONN_EOF
The connection indicated an EOF.
int(* f_sni)(void *, ssl_context *, const unsigned char *, size_t)
void sha1(const unsigned char *input, size_t ilen, unsigned char output[20])
Output = SHA-1( input buffer )
void(* calc_verify)(ssl_context *, unsigned char *)
#define TLS_RSA_WITH_AES_256_CBC_SHA256
TLS 1.2.
void sha1_finish(sha1_context *ctx, unsigned char output[20])
SHA-1 final digest.
void ssl_set_verify(ssl_context *ssl, int(*f_vrfy)(void *, x509_cert *, int, int *), void *p_vrfy)
Set the verification callback (Optional).
ssl_session * session_negotiate
void ssl_legacy_renegotiation(ssl_context *ssl, int allow_legacy)
Prevent or allow legacy renegotiation.
int ssl_parse_certificate(ssl_context *ssl)
void ssl_set_dbg(ssl_context *ssl, void(*f_dbg)(void *, int, const char *), void *p_dbg)
Set the debug callback.
#define POLARSSL_ERR_SSL_INVALID_RECORD
An invalid SSL record was received.
void ssl_set_own_cert_alt(ssl_context *ssl, x509_cert *own_cert, void *rsa_key, rsa_decrypt_func rsa_decrypt, rsa_sign_func rsa_sign, rsa_key_len_func rsa_key_len)
Set own certificate and alternate non-PolarSSL private key and handling callbacks, such as the PKCS#11 wrappers or any other external private key handler.
#define BADCERT_SKIP_VERIFY
Certificate verification was skipped.
void sha2_hmac_starts(sha2_context *ctx, const unsigned char *key, size_t keylen, int is224)
SHA-256 HMAC context setup.
ssl_transform * transform_in
int ssl_parse_finished(ssl_context *ssl)
x509_buf raw
The raw certificate data (DER).
int rsa_pkcs1_sign(rsa_context *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, int hash_id, unsigned int hashlen, const unsigned char *hash, unsigned char *sig)
Generic wrapper to perform a PKCS#1 signature using the mode from the context.
#define TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
TLS 1.2.
#define SSL_RENEGOTIATION
void ssl_session_free(ssl_session *session)
Free referenced items in an SSL session including the peer certificate and clear memory.
void sha1_hmac(const unsigned char *key, size_t keylen, const unsigned char *input, size_t ilen, unsigned char output[20])
Output = HMAC-SHA-1( hmac key, input buffer )
void x509_free(x509_cert *crt)
Unallocate all certificate data.
int ssl_write_finished(ssl_context *ssl)
#define TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
TLS 1.2.
Configuration options (set of defines)
ssl_transform * transform
#define SSL_DEBUG_MSG(level, args)
int aes_setkey_dec(aes_context *ctx, const unsigned char *key, unsigned int keysize)
AES key schedule (decryption)
#define POLARSSL_ERR_SSL_PEER_CLOSE_NOTIFY
The peer notified us that the connection is going to be closed.
void ssl_handshake_wrapup(ssl_context *ssl)
int camellia_setkey_enc(camellia_context *ctx, const unsigned char *key, unsigned int keysize)
CAMELLIA key schedule (encryption)
#define TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
void md5_finish(md5_context *ctx, unsigned char output[16])
MD5 final digest.
int(* f_send)(void *, const unsigned char *, size_t)
int rsa_pkcs1_decrypt(rsa_context *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, size_t *olen, const unsigned char *input, unsigned char *output, size_t output_max_len)
Generic wrapper to perform a PKCS#1 decryption using the mode from the context.
#define SSL_VERIFY_OPTIONAL
int ssl_set_dh_param_ctx(ssl_context *ssl, dhm_context *dhm_ctx)
Set the Diffie-Hellman public P and G values, read from existing context (server-side only) ...
#define TLS_RSA_WITH_3DES_EDE_CBC_SHA
int(* rsa_decrypt_func)(void *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, size_t *olen, const unsigned char *input, unsigned char *output, size_t output_max_len)
Container for an X.509 certificate.
#define SSL_VERIFY_REQUIRED
#define SSL_ALERT_MSG_NO_RENEGOTIATION
void md5_hmac(const unsigned char *key, size_t keylen, const unsigned char *input, size_t ilen, unsigned char output[16])
Output = HMAC-MD5( hmac key, input buffer )
int ssl_handshake_server_step(ssl_context *ssl)
#define SSL_LEGACY_NO_RENEGOTIATION
#define SSL_MAJOR_VERSION_3
#define TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
#define POLARSSL_ERR_SSL_HW_ACCEL_FAILED
Hardware acceleration function returned with error.
void ssl_set_max_version(ssl_context *ssl, int major, int minor)
Set the maximum supported version sent from the client side.
#define POLARSSL_ERR_SSL_INVALID_MAC
Verification of the message MAC failed.
#define POLARSSL_ERR_SSL_NO_CLIENT_CERTIFICATE
No client certification received from the client, but required by the authentication mode...
const int ssl_default_ciphersuites[]
void ssl_set_ciphersuites_for_version(ssl_context *ssl, const int *ciphersuites, int major, int minor)
Set the list of allowed ciphersuites for a specific version of the protocol.
int des3_set3key_enc(des3_context *ctx, const unsigned char key[DES_KEY_SIZE *3])
Triple-DES key schedule (168-bit, encryption)
int ssl_init(ssl_context *ssl)
Initialize an SSL context.
int ssl_get_ciphersuite_id(const char *ciphersuite_name)
Return the ID of the ciphersuite associated with the given name.
#define SSL_MINOR_VERSION_1
void sha2_hmac_finish(sha2_context *ctx, unsigned char output[32])
SHA-256 HMAC final digest.
#define TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
#define POLARSSL_ERR_SSL_HW_ACCEL_FALLTHROUGH
Hardware acceleration function skipped / left alone data.
int des3_set3key_dec(des3_context *ctx, const unsigned char key[DES_KEY_SIZE *3])
Triple-DES key schedule (168-bit, decryption)
unsigned char premaster[POLARSSL_MPI_MAX_SIZE]
#define POLARSSL_ERR_SSL_CERTIFICATE_REQUIRED
The own certificate is not set, but needed by the server.
void sha4_starts(sha4_context *ctx, int is384)
SHA-512 context setup.
#define SSL_ALERT_MSG_UNEXPECTED_MESSAGE
#define TLS_RSA_WITH_AES_256_GCM_SHA384
ssl_handshake_params * handshake
#define POLARSSL_ERR_SSL_CERTIFICATE_TOO_LARGE
Our own certificate(s) is/are too large to send in an SSL message.
#define SSL_MSG_HANDSHAKE
#define SSL_MINOR_VERSION_2
void sha4_hmac(const unsigned char *key, size_t keylen, const unsigned char *input, size_t ilen, unsigned char output[64], int is384)
Output = HMAC-SHA-512( hmac key, input buffer )
int ssl_write_certificate(ssl_context *ssl)
int gcm_crypt_and_tag(gcm_context *ctx, int mode, size_t length, const unsigned char *iv, size_t iv_len, const unsigned char *add, size_t add_len, const unsigned char *input, unsigned char *output, size_t tag_len, unsigned char *tag)
GCM buffer encryption/decryption using AES.
size_t(* rsa_key_len_func)(void *ctx)
#define POLARSSL_DHM_RFC5114_MODP_1024_G
rsa_key_len_func rsa_key_len
#define POLARSSL_ERR_SSL_FATAL_ALERT_MESSAGE
A fatal alert message was received from our peer.
#define TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
Triple-DES context structure.
void md5_hmac_starts(md5_context *ctx, const unsigned char *key, size_t keylen)
MD5 HMAC context setup.
const char * ssl_get_ciphersuite(const ssl_context *ssl)
Return the name of the current ciphersuite.
const char * ssl_get_version(const ssl_context *ssl)
Return the current SSL version (SSLv3/TLSv1/etc)
void ssl_set_renegotiation(ssl_context *ssl, int renegotiation)
Enable / Disable renegotiation support for connection when initiated by peer (Default: SSL_RENEGOTIAT...
int aes_crypt_cbc(aes_context *ctx, int mode, size_t length, unsigned char iv[16], const unsigned char *input, unsigned char *output)
AES-CBC buffer encryption/decryption Length should be a multiple of the block size (16 bytes) ...
SHA-224 and SHA-256 cryptographic hash function.
#define SSL_MINOR_VERSION_0
#define SSL_MSG_CHANGE_CIPHER_SPEC
#define TLS_DHE_RSA_WITH_DES_CBC_SHA
Weak! Not in TLS 1.2.
int ssl_handshake_client_step(ssl_context *ssl)
void sha4_update(sha4_context *ctx, const unsigned char *input, size_t ilen)
SHA-512 process buffer.
#define POLARSSL_ERR_SSL_UNEXPECTED_MESSAGE
An unexpected message was received from our peer.
unsigned char * p
ASN1 data, e.g.
#define TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
#define POLARSSL_ERR_SSL_COMPRESSION_FAILED
Processing of the compression / decompression failed.
int(* f_vrfy)(void *, x509_cert *, int, int *)
void ssl_set_endpoint(ssl_context *ssl, int endpoint)
Set the current endpoint type.
void mpi_free(mpi *X)
Unallocate one MPI.
void ssl_set_ciphersuites(ssl_context *ssl, const int *ciphersuites)
Set the list of allowed ciphersuites (Default: ssl_default_ciphersuites) (Overrides all version speci...
void md5_process(md5_context *ctx, const unsigned char data[64])
#define TLS_RSA_WITH_NULL_SHA256
Weak!
#define SSL_ALERT_LEVEL_WARNING
void ssl_set_rng(ssl_context *ssl, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Set the random number generator callback.
#define TLS_RSA_WITH_RC4_128_MD5
void ssl_set_bio(ssl_context *ssl, int(*f_recv)(void *, unsigned char *, size_t), void *p_recv, int(*f_send)(void *, const unsigned char *, size_t), void *p_send)
Set the underlying BIO read and write callbacks.
void ssl_free(ssl_context *ssl)
Free referenced items in an SSL context and clear memory.
void md5_starts(md5_context *ctx)
MD5 context setup.
#define SSL_RENEGOTIATION_DISABLED
int(* rsa_sign_func)(void *ctx, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng, int mode, int hash_id, unsigned int hashlen, const unsigned char *hash, unsigned char *sig)
#define POLARSSL_ERR_SSL_CA_CHAIN_REQUIRED
No CA Chain is set, but required to operate.
CAMELLIA context structure.
void ssl_handshake_free(ssl_handshake_params *handshake)
Free referenced items in an SSL handshake context and clear memory.
int ssl_flush_output(ssl_context *ssl)
int ssl_handshake(ssl_context *ssl)
Perform the SSL handshake.
rsa_decrypt_func rsa_decrypt
#define TLS_DHE_RSA_WITH_AES_256_CBC_SHA
void ssl_set_min_version(ssl_context *ssl, int major, int minor)
Set the minimum accepted SSL/TLS protocol version (Default: SSL_MAJOR_VERSION_3, SSL_MINOR_VERSION_0)...
#define SSL_COMPRESS_DEFLATE
void sha1_hmac_starts(sha1_context *ctx, const unsigned char *key, size_t keylen)
SHA-1 HMAC context setup.
void ssl_set_session(ssl_context *ssl, const ssl_session *session)
Request resumption of session (client-side only) Session data is copied from presented session struct...
int ssl_set_hostname(ssl_context *ssl, const char *hostname)
Set hostname for ServerName TLS extension (client-side only)
void md5_hmac_finish(md5_context *ctx, unsigned char output[16])
MD5 HMAC final digest.
int ssl_handshake_step(ssl_context *ssl)
Perform a single step of the SSL handshake.
#define SSL_MINOR_VERSION_3
int gcm_init(gcm_context *ctx, const unsigned char *key, unsigned int keysize)
GCM initialization (encryption)
#define POLARSSL_ERR_NET_WANT_READ
Connection requires a read call.
#define SSL_HS_CERTIFICATE
int ssl_parse_change_cipher_spec(ssl_context *ssl)
#define SSL_DEBUG_CRT(level, text, crt)
void sha1_starts(sha1_context *ctx)
SHA-1 context setup.
int des_crypt_cbc(des_context *ctx, int mode, size_t length, unsigned char iv[8], const unsigned char *input, unsigned char *output)
DES-CBC buffer encryption/decryption.
struct _x509_cert * next
Next certificate in the CA-chain.
#define SSL_ALERT_MSG_HANDSHAKE_FAILURE
int ssl_close_notify(ssl_context *ssl)
Notify the peer that the connection is being closed.
void ssl_set_session_cache(ssl_context *ssl, int(*f_get_cache)(void *, ssl_session *), void *p_get_cache, int(*f_set_cache)(void *, const ssl_session *), void *p_set_cache)
Set the session cache callbacks (server-side only) If not set, no session resuming is done...
size_t ssl_get_bytes_avail(const ssl_context *ssl)
Return the number of data bytes available to read.
#define TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2.
#define SSL_DEBUG_BUF(level, text, buf, len)
int mpi_read_string(mpi *X, int radix, const char *s)
Import from an ASCII string.
#define SSL_INITIAL_HANDSHAKE
#define TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
void sha2_update(sha2_context *ctx, const unsigned char *input, size_t ilen)
SHA-256 process buffer.
int allow_legacy_renegotiation
void sha2_process(sha2_context *ctx, const unsigned char data[64])
ssl_session * session_out
int camellia_setkey_dec(camellia_context *ctx, const unsigned char *key, unsigned int keysize)
CAMELLIA key schedule (decryption)
void(* calc_finished)(ssl_context *, unsigned char *, int)
int ssl_read_record(ssl_context *ssl)
size_t len
ASN1 length, e.g.
int des_setkey_enc(des_context *ctx, const unsigned char key[DES_KEY_SIZE])
DES key schedule (56-bit, encryption)
#define TLS_RSA_WITH_AES_256_CBC_SHA
int ssl_set_dh_param(ssl_context *ssl, const char *dhm_P, const char *dhm_G)
Set the Diffie-Hellman public P and G values, read as hexadecimal strings (server-side only) (Default...
#define TLS_RSA_WITH_AES_128_CBC_SHA256
TLS 1.2.
void sha4(const unsigned char *input, size_t ilen, unsigned char output[64], int is384)
Output = SHA-512( input buffer )
int des_setkey_dec(des_context *ctx, const unsigned char key[DES_KEY_SIZE])
DES key schedule (56-bit, decryption)
#define BADCERT_MISSING
Certificate was missing.
#define POLARSSL_ERR_SSL_BAD_HS_FINISHED
Processing of the Finished handshake message failed.
int mpi_copy(mpi *X, const mpi *Y)
Copy the contents of Y into X.
void sha2_hmac(const unsigned char *key, size_t keylen, const unsigned char *input, size_t ilen, unsigned char output[32], int is224)
Output = HMAC-SHA-256( hmac key, input buffer )
int ssl_get_verify_result(const ssl_context *ssl)
Return the result of the certificate verification.
#define SSL_ALERT_MSG_NO_CERT
Galois/Counter mode for AES.
int ssl_session_reset(ssl_context *ssl)
Reset an already initialized SSL context for re-use while retaining application-set variables...
Certificate revocation list structure.
ssl_transform * transform_negotiate
SHA-512 context structure.
#define SSL_LEGACY_RENEGOTIATION
#define POLARSSL_ERR_SSL_MALLOC_FAILED
Memory allocation failed.
int disable_renegotiation
#define SSL_ALERT_MSG_CLOSE_NOTIFY
void sha1_update(sha1_context *ctx, const unsigned char *input, size_t ilen)
SHA-1 process buffer.
#define TLS_DHE_RSA_WITH_AES_128_CBC_SHA
void dhm_free(dhm_context *ctx)
Free the components of a DHM key.
#define TLS_RSA_WITH_DES_CBC_SHA
Weak! Not in TLS 1.2.
void md5_update(md5_context *ctx, const unsigned char *input, size_t ilen)
MD5 process buffer.
int ssl_write_change_cipher_spec(ssl_context *ssl)
int(* f_get_cache)(void *, ssl_session *)
void sha2(const unsigned char *input, size_t ilen, unsigned char output[32], int is224)
Output = SHA-256( input buffer )
int ssl_derive_keys(ssl_context *ssl)
void ssl_set_authmode(ssl_context *ssl, int authmode)
Set the certificate verification mode.
void sha4_finish(sha4_context *ctx, unsigned char output[64])
SHA-512 final digest.
void sha1_process(sha1_context *ctx, const unsigned char data[64])
#define TLS_RSA_WITH_NULL_SHA
Weak!
int(* f_set_cache)(void *, const ssl_session *)
void ssl_set_ca_chain(ssl_context *ssl, x509_cert *ca_chain, x509_crl *ca_crl, const char *peer_cn)
Set the data required to verify peer certificate.
void sha1_hmac_update(sha1_context *ctx, const unsigned char *input, size_t ilen)
SHA-1 HMAC process buffer.
void ssl_optimize_checksum(ssl_context *ssl, int ciphersuite)
int x509parse_verify(x509_cert *crt, x509_cert *trust_ca, x509_crl *ca_crl, const char *cn, int *flags, int(*f_vrfy)(void *, x509_cert *, int, int *), void *p_vrfy)
Verify the certificate signature.
void md5_hmac_update(md5_context *ctx, const unsigned char *input, size_t ilen)
MD5 HMAC process buffer.
int ssl_send_fatal_handshake_failure(ssl_context *ssl)
#define TLS_RSA_WITH_AES_128_GCM_SHA256
void sha2_starts(sha2_context *ctx, int is224)
SHA-256 context setup.
int ssl_read(ssl_context *ssl, unsigned char *buf, size_t len)
Read at most 'len' application data bytes.
void ssl_transform_free(ssl_transform *transform)
Free referenced items in an SSL transform context and clear memory.
#define TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
TLS 1.2.
#define SSL_MAX_CONTENT_LEN
Size of the input / output buffer.
#define SSL_MSG_APPLICATION_DATA
const char * ssl_get_ciphersuite_name(const int ciphersuite_id)
Return the name of the ciphersuite associated with the given ID.
int ssl_renegotiate(ssl_context *ssl)
Perform an SSL renegotiation on the running connection.
#define TLS_RSA_WITH_NULL_MD5
Weak!
int(* f_recv)(void *, unsigned char *, size_t)
int ssl_write(ssl_context *ssl, const unsigned char *buf, size_t len)
Write exactly 'len' application data bytes.
void md5(const unsigned char *input, size_t ilen, unsigned char output[16])
Output = MD5( input buffer )
#define POLARSSL_ERR_SSL_FEATURE_UNAVAILABLE
The requested feature is not available.
#define POLARSSL_ERR_SSL_BAD_HS_CERTIFICATE
Processing of the Certificate handshake message failed.
The ARCFOUR stream cipher.
int aes_setkey_enc(aes_context *ctx, const unsigned char *key, unsigned int keysize)
AES key schedule (encryption)
#define POLARSSL_ERR_SSL_BAD_INPUT_DATA
Bad input parameters to function.
void ssl_set_sni(ssl_context *ssl, int(*f_sni)(void *, ssl_context *, const unsigned char *, size_t), void *p_sni)
Set server side ServerName TLS extension callback (optional, server-side only).
int ssl_fetch_input(ssl_context *ssl, size_t nb_want)
#define TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
TLS 1.2.
int ssl_write_record(ssl_context *ssl)
const x509_cert * ssl_get_peer_cert(const ssl_context *ssl)
Return the peer certificate from the current connection.
unsigned char randbytes[64]
void sha2_finish(sha2_context *ctx, unsigned char output[32])
SHA-256 final digest.
int des3_crypt_cbc(des3_context *ctx, int mode, size_t length, unsigned char iv[8], const unsigned char *input, unsigned char *output)
3DES-CBC buffer encryption/decryption
#define SSL_HS_HELLO_REQUEST