diff options
| author | Raghuram Subramani <raghus2247@gmail.com> | 2022-06-19 19:47:51 +0530 | 
|---|---|---|
| committer | Raghuram Subramani <raghus2247@gmail.com> | 2022-06-19 19:47:51 +0530 | 
| commit | 4fd287655a72b9aea14cdac715ad5b90ed082ed2 (patch) | |
| tree | 65d393bc0e699dd12d05b29ba568e04cea666207 /circuitpython/lib/axtls/ssl/tls1.h | |
| parent | 0150f70ce9c39e9e6dd878766c0620c85e47bed0 (diff) | |
add circuitpython code
Diffstat (limited to 'circuitpython/lib/axtls/ssl/tls1.h')
| -rwxr-xr-x | circuitpython/lib/axtls/ssl/tls1.h | 329 | 
1 files changed, 329 insertions, 0 deletions
| diff --git a/circuitpython/lib/axtls/ssl/tls1.h b/circuitpython/lib/axtls/ssl/tls1.h new file mode 100755 index 0000000..e8ed8a7 --- /dev/null +++ b/circuitpython/lib/axtls/ssl/tls1.h @@ -0,0 +1,329 @@ +/* + * Copyright (c) 2007-2016, Cameron Rich + *  + * All rights reserved. + *  + * Redistribution and use in source and binary forms, with or without  + * modification, are permitted provided that the following conditions are met: + * + * * Redistributions of source code must retain the above copyright notice,  + *   this list of conditions and the following disclaimer. + * * Redistributions in binary form must reproduce the above copyright notice,  + *   this list of conditions and the following disclaimer in the documentation  + *   and/or other materials provided with the distribution. + * * Neither the name of the axTLS project nor the names of its contributors  + *   may be used to endorse or promote products derived from this software  + *   without specific prior written permission. + * + * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR + * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR + * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, + * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, + * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR + * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF + * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING + * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS + * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ + +/** + * @file tls1.h + * + * @brief The definitions for the TLS library. + */ +#ifndef HEADER_SSL_LIB_H +#define HEADER_SSL_LIB_H + +#ifdef __cplusplus +extern "C" { +#endif + +#include "version.h" +#include "config.h" +#include "os_int.h" +#include "os_port.h" +#include "crypto.h" +#include "crypto_misc.h" + +#define SSL_PROTOCOL_MIN_VERSION    0x31   /* TLS v1.0 */ +#define SSL_PROTOCOL_VERSION_MAX    0x33   /* TLS v1.3 */ +#define SSL_PROTOCOL_VERSION_TLS1_1 0x32   /* TLS v1.1 */ +#define SSL_PROTOCOL_VERSION_TLS1_2 0x33   /* TLS v1.2 */ +#define SSL_RANDOM_SIZE             32 +#define SSL_SECRET_SIZE             48 +#define SSL_FINISHED_HASH_SIZE      12 +#define SSL_RECORD_SIZE             5 +#define SSL_SERVER_READ             0 +#define SSL_SERVER_WRITE            1 +#define SSL_CLIENT_READ             2 +#define SSL_CLIENT_WRITE            3 +#define SSL_HS_HDR_SIZE             4 + +/* the flags we use while establishing a connection */ +#define SSL_NEED_RECORD             0x0001 +#define SSL_TX_ENCRYPTED            0x0002  +#define SSL_RX_ENCRYPTED            0x0004 +#define SSL_SESSION_RESUME          0x0008 +#define SSL_IS_CLIENT               0x0010 +#define SSL_HAS_CERT_REQ            0x0020 +#define SSL_SENT_CLOSE_NOTIFY       0x0040 + +/* some macros to muck around with flag bits */ +#define SET_SSL_FLAG(A)             (ssl->flag |= A) +#define CLR_SSL_FLAG(A)             (ssl->flag &= ~A) +#define IS_SET_SSL_FLAG(A)          (ssl->flag & A) + +#define MAX_KEY_BYTE_SIZE           512     /* for a 4096 bit key */ +/* On send, will send another SSL fragment if plaintext exceeds RT_MAX_PLAIN_LENGTH */ +#ifndef RT_MAX_PLAIN_LENGTH +#define RT_MAX_PLAIN_LENGTH         16384 +#endif +/* Total receive buffer is RT_MAX_PLAIN_LENGTH + RT_EXTRA */ +#ifndef RT_EXTRA +#define RT_EXTRA                    1024 +#endif +#define BM_RECORD_OFFSET            5 + +#define NUM_PROTOCOLS               4 + +#define MAX_SIG_ALGORITHMS          4 +#define SIG_ALG_SHA1                2 +#define SIG_ALG_SHA256              4 +#define SIG_ALG_SHA384              5 +#define SIG_ALG_SHA512              6 +#define SIG_ALG_RSA                 1 + +#define PARANOIA_CHECK(A, B)        if (A < B) { \ +    ret = SSL_ERROR_INVALID_HANDSHAKE; goto error; } + +/* protocol types */ +enum +{ +    PT_CHANGE_CIPHER_SPEC = 20, +    PT_ALERT_PROTOCOL, +    PT_HANDSHAKE_PROTOCOL, +    PT_APP_PROTOCOL_DATA +}; + +/* handshaking types */ +enum +{ +    HS_HELLO_REQUEST, +    HS_CLIENT_HELLO, +    HS_SERVER_HELLO, +    HS_CERTIFICATE = 11, +    HS_SERVER_KEY_XCHG, +    HS_CERT_REQ, +    HS_SERVER_HELLO_DONE, +    HS_CERT_VERIFY, +    HS_CLIENT_KEY_XCHG, +    HS_FINISHED = 20 +}; + +/* SSL extension types */ +enum +{ +    SSL_EXT_SERVER_NAME = 0, +    SSL_EXT_MAX_FRAGMENT_SIZE, +    SSL_EXT_SIG_ALG = 0x0d, +}; + +typedef struct  +{ +    uint8_t cipher; +    uint8_t key_size; +    uint8_t iv_size; +    uint8_t padding_size; +    uint8_t digest_size; +    uint8_t key_block_size; +    hmac_func hmac; +    crypt_func encrypt; +    crypt_func decrypt; +} cipher_info_t; + +struct _SSLObjLoader  +{ +    uint8_t *buf; +    int len; +}; + +typedef struct _SSLObjLoader SSLObjLoader; + +typedef struct  +{ +    time_t conn_time; +    uint8_t session_id[SSL_SESSION_ID_SIZE]; +    uint8_t master_secret[SSL_SECRET_SIZE]; +} SSL_SESSION; + +typedef struct +{ +    uint8_t *buf; +    int size; +    uint8_t hash_alg; +} SSL_CERT; + +typedef struct +{ +    MD5_CTX md5_ctx; +    SHA1_CTX sha1_ctx; +    SHA256_CTX sha256_ctx; +    uint8_t client_random[SSL_RANDOM_SIZE]; /* client's random sequence */ +    uint8_t server_random[SSL_RANDOM_SIZE]; /* server's random sequence */ +    uint8_t final_finish_mac[128]; +    uint8_t master_secret[SSL_SECRET_SIZE]; +    uint8_t key_block[256]; +    uint16_t bm_proc_index; +    uint8_t key_block_generated; +} DISPOSABLE_CTX; + +typedef struct  +{ +    const char *host_name; /* Needed for the SNI support */ +    /* Needed for the Max Fragment Size Extension.  +       Allowed values: 2^9, 2^10 .. 2^14 */ +    uint16_t max_fragment_size;  +} SSL_EXTENSIONS; + +struct _SSL +{ +    uint32_t flag; +    uint16_t need_bytes; +    uint16_t got_bytes; +    uint8_t record_type; +    uint8_t cipher; +    uint8_t sess_id_size; +    uint8_t version; +    uint8_t client_version; +    int16_t next_state; +    int16_t hs_status; +    DISPOSABLE_CTX *dc;         /* temporary data which we'll get rid of soon */ +    long client_fd; +    const cipher_info_t *cipher_info; +    void *encrypt_ctx; +    void *decrypt_ctx; +    uint8_t bm_all_data[RT_MAX_PLAIN_LENGTH+RT_EXTRA]; +    uint8_t *bm_data; +    uint16_t bm_index; +    uint16_t bm_read_index; +    uint8_t sig_algs[MAX_SIG_ALGORITHMS]; +    uint8_t num_sig_algs; +    struct _SSL *next;                  /* doubly linked list */ +    struct _SSL *prev; +    struct _SSL_CTX *ssl_ctx;           /* back reference to a clnt/svr ctx */ +#ifndef CONFIG_SSL_SKELETON_MODE +    uint16_t session_index; +    SSL_SESSION *session; +#endif +#if defined(CONFIG_SSL_CERT_VERIFICATION) || defined(CONFIG_SSL_ENABLE_CLIENT) +    X509_CTX *x509_ctx; +#endif + +    uint8_t session_id[SSL_SESSION_ID_SIZE];  +    uint8_t client_mac[SHA256_SIZE];    /* for HMAC verification */ +    uint8_t server_mac[SHA256_SIZE];    /* for HMAC verification */ +    uint8_t read_sequence[8];           /* 64 bit sequence number */ +    uint8_t write_sequence[8];          /* 64 bit sequence number */ +    uint8_t hmac_header[SSL_RECORD_SIZE];    /* rx hmac */ +    SSL_EXTENSIONS *extensions; /* Contains the SSL (client) extensions */ +}; + +typedef struct _SSL SSL; + +struct _SSL_CTX +{ +    uint32_t options; +    uint8_t chain_length; +    RSA_CTX *rsa_ctx; +#ifdef CONFIG_SSL_CERT_VERIFICATION +    CA_CERT_CTX *ca_cert_ctx; +#endif +    SSL *head; +    SSL *tail; +    SSL_CERT certs[CONFIG_SSL_MAX_CERTS]; +#ifndef CONFIG_SSL_SKELETON_MODE +    uint16_t num_sessions; +    SSL_SESSION **ssl_sessions; +#endif +#ifdef CONFIG_SSL_CTX_MUTEXING +    SSL_CTX_MUTEX_TYPE mutex; +#endif +#ifdef CONFIG_OPENSSL_COMPATIBLE +    void *bonus_attr; +#endif +}; + +typedef struct _SSL_CTX SSL_CTX; + +/* backwards compatibility */ +typedef struct _SSL_CTX SSLCTX; + +extern const uint8_t ssl_prot_prefs[NUM_PROTOCOLS]; + +SSL *ssl_new(SSL_CTX *ssl_ctx, long client_fd); +void disposable_new(SSL *ssl); +void disposable_free(SSL *ssl); +int send_packet(SSL *ssl, uint8_t protocol,  +        const uint8_t *in, int length); +int do_svr_handshake(SSL *ssl, int handshake_type, uint8_t *buf, int hs_len); +int do_clnt_handshake(SSL *ssl, int handshake_type, uint8_t *buf, int hs_len); +int process_finished(SSL *ssl, uint8_t *buf, int hs_len); +int process_sslv23_client_hello(SSL *ssl); +int send_alert(SSL *ssl, int error_code); +int send_finished(SSL *ssl); +int send_certificate(SSL *ssl); +int basic_read(SSL *ssl, uint8_t **in_data); +int send_change_cipher_spec(SSL *ssl); +int finished_digest(SSL *ssl, const char *label, uint8_t *digest); +void generate_master_secret(SSL *ssl, const uint8_t *premaster_secret); +void add_packet(SSL *ssl, const uint8_t *pkt, int len); +int add_cert(SSL_CTX *ssl_ctx, const uint8_t *buf, int len); +int add_private_key(SSL_CTX *ssl_ctx, SSLObjLoader *ssl_obj); +void ssl_obj_free(SSLObjLoader *ssl_obj); +int pkcs8_decode(SSL_CTX *ssl_ctx, SSLObjLoader *ssl_obj, const char *password); +int pkcs12_decode(SSL_CTX *ssl_ctx, SSLObjLoader *ssl_obj, const char *password); +int load_key_certs(SSL_CTX *ssl_ctx); +#ifdef CONFIG_SSL_CERT_VERIFICATION +int add_cert_auth(SSL_CTX *ssl_ctx, const uint8_t *buf, int len); +void remove_ca_certs(CA_CERT_CTX *ca_cert_ctx); +#endif +#ifdef CONFIG_SSL_ENABLE_CLIENT +int do_client_connect(SSL *ssl); +#endif + +#ifdef CONFIG_SSL_DIAGNOSTICS +void DISPLAY_STATE(SSL *ssl, int is_send, uint8_t state, int not_ok); +void DISPLAY_BYTES(SSL *ssl, const char *format,  +        const uint8_t *data, int size, ...); +void DISPLAY_CERT(SSL *ssl, const X509_CTX *x509_ctx); +void DISPLAY_RSA(SSL *ssl,  const RSA_CTX *rsa_ctx); +void DISPLAY_ALERT(SSL *ssl, int alert); +#else +#define DISPLAY_STATE(A,B,C,D) +#define DISPLAY_CERT(A,B) +#define DISPLAY_RSA(A,B) +#define DISPLAY_ALERT(A, B) +#ifdef WIN32 +void DISPLAY_BYTES(SSL *ssl, const char *format,/* win32 has no variadic macros */ +        const uint8_t *data, int size, ...); +#else +#define DISPLAY_BYTES(A,B,C,D,...) +#endif +#endif + +//#ifdef CONFIG_SSL_CERT_VERIFICATION +int process_certificate(SSL *ssl, X509_CTX **x509_ctx); +//#endif + +SSL_SESSION *ssl_session_update(int max_sessions,  +        SSL_SESSION *ssl_sessions[], SSL *ssl, +        const uint8_t *session_id); +void kill_ssl_session(SSL_SESSION **ssl_sessions, SSL *ssl); + +#ifdef __cplusplus +} +#endif + +#endif  | 
