blob: 9c57ab25c59539776d9a9936d776238dbd448d0c [file] [log] [blame]
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001/*
2 * TLS interface functions and an internal TLS implementation
Dmitry Shmidtc55524a2011-07-07 11:18:38 -07003 * Copyright (c) 2004-2011, Jouni Malinen <j@w1.fi>
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004 *
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08005 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07007 *
8 * This file interface functions for hostapd/wpa_supplicant to use the
9 * integrated TLSv1 implementation.
10 */
11
12#include "includes.h"
13
14#include "common.h"
15#include "tls.h"
16#include "tls/tlsv1_client.h"
17#include "tls/tlsv1_server.h"
18
19
20static int tls_ref_count = 0;
21
22struct tls_global {
23 int server;
24 struct tlsv1_credentials *server_cred;
25 int check_crl;
Dmitry Shmidtd7ff03d2015-12-04 14:49:35 -080026
27 void (*event_cb)(void *ctx, enum tls_event ev,
28 union tls_event_data *data);
29 void *cb_ctx;
30 int cert_in_cb;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070031};
32
33struct tls_connection {
34 struct tlsv1_client *client;
35 struct tlsv1_server *server;
Dmitry Shmidt818ea482014-03-10 13:15:21 -070036 struct tls_global *global;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070037};
38
39
40void * tls_init(const struct tls_config *conf)
41{
42 struct tls_global *global;
43
44 if (tls_ref_count == 0) {
45#ifdef CONFIG_TLS_INTERNAL_CLIENT
46 if (tlsv1_client_global_init())
47 return NULL;
48#endif /* CONFIG_TLS_INTERNAL_CLIENT */
49#ifdef CONFIG_TLS_INTERNAL_SERVER
50 if (tlsv1_server_global_init())
51 return NULL;
52#endif /* CONFIG_TLS_INTERNAL_SERVER */
53 }
54 tls_ref_count++;
55
56 global = os_zalloc(sizeof(*global));
57 if (global == NULL)
58 return NULL;
Dmitry Shmidtd7ff03d2015-12-04 14:49:35 -080059 if (conf) {
60 global->event_cb = conf->event_cb;
61 global->cb_ctx = conf->cb_ctx;
62 global->cert_in_cb = conf->cert_in_cb;
63 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070064
65 return global;
66}
67
68void tls_deinit(void *ssl_ctx)
69{
70 struct tls_global *global = ssl_ctx;
71 tls_ref_count--;
72 if (tls_ref_count == 0) {
73#ifdef CONFIG_TLS_INTERNAL_CLIENT
74 tlsv1_client_global_deinit();
75#endif /* CONFIG_TLS_INTERNAL_CLIENT */
76#ifdef CONFIG_TLS_INTERNAL_SERVER
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070077 tlsv1_server_global_deinit();
78#endif /* CONFIG_TLS_INTERNAL_SERVER */
79 }
Dmitry Shmidtd80a4012015-11-05 16:35:40 -080080#ifdef CONFIG_TLS_INTERNAL_SERVER
81 tlsv1_cred_free(global->server_cred);
82#endif /* CONFIG_TLS_INTERNAL_SERVER */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070083 os_free(global);
84}
85
86
87int tls_get_errors(void *tls_ctx)
88{
89 return 0;
90}
91
92
93struct tls_connection * tls_connection_init(void *tls_ctx)
94{
95 struct tls_connection *conn;
96 struct tls_global *global = tls_ctx;
97
98 conn = os_zalloc(sizeof(*conn));
99 if (conn == NULL)
100 return NULL;
Dmitry Shmidt818ea482014-03-10 13:15:21 -0700101 conn->global = global;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700102
103#ifdef CONFIG_TLS_INTERNAL_CLIENT
104 if (!global->server) {
105 conn->client = tlsv1_client_init();
106 if (conn->client == NULL) {
107 os_free(conn);
108 return NULL;
109 }
Dmitry Shmidtd7ff03d2015-12-04 14:49:35 -0800110 tlsv1_client_set_cb(conn->client, global->event_cb,
111 global->cb_ctx, global->cert_in_cb);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700112 }
113#endif /* CONFIG_TLS_INTERNAL_CLIENT */
114#ifdef CONFIG_TLS_INTERNAL_SERVER
115 if (global->server) {
116 conn->server = tlsv1_server_init(global->server_cred);
117 if (conn->server == NULL) {
118 os_free(conn);
119 return NULL;
120 }
121 }
122#endif /* CONFIG_TLS_INTERNAL_SERVER */
123
124 return conn;
125}
126
127
Dmitry Shmidt818ea482014-03-10 13:15:21 -0700128#ifdef CONFIG_TESTING_OPTIONS
129#ifdef CONFIG_TLS_INTERNAL_SERVER
130void tls_connection_set_test_flags(struct tls_connection *conn, u32 flags)
131{
132 if (conn->server)
133 tlsv1_server_set_test_flags(conn->server, flags);
134}
135#endif /* CONFIG_TLS_INTERNAL_SERVER */
136#endif /* CONFIG_TESTING_OPTIONS */
137
138
139void tls_connection_set_log_cb(struct tls_connection *conn,
140 void (*log_cb)(void *ctx, const char *msg),
141 void *ctx)
142{
143#ifdef CONFIG_TLS_INTERNAL_SERVER
144 if (conn->server)
145 tlsv1_server_set_log_cb(conn->server, log_cb, ctx);
146#endif /* CONFIG_TLS_INTERNAL_SERVER */
147}
148
149
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700150void tls_connection_deinit(void *tls_ctx, struct tls_connection *conn)
151{
152 if (conn == NULL)
153 return;
154#ifdef CONFIG_TLS_INTERNAL_CLIENT
155 if (conn->client)
156 tlsv1_client_deinit(conn->client);
157#endif /* CONFIG_TLS_INTERNAL_CLIENT */
158#ifdef CONFIG_TLS_INTERNAL_SERVER
159 if (conn->server)
160 tlsv1_server_deinit(conn->server);
161#endif /* CONFIG_TLS_INTERNAL_SERVER */
162 os_free(conn);
163}
164
165
166int tls_connection_established(void *tls_ctx, struct tls_connection *conn)
167{
168#ifdef CONFIG_TLS_INTERNAL_CLIENT
169 if (conn->client)
170 return tlsv1_client_established(conn->client);
171#endif /* CONFIG_TLS_INTERNAL_CLIENT */
172#ifdef CONFIG_TLS_INTERNAL_SERVER
173 if (conn->server)
174 return tlsv1_server_established(conn->server);
175#endif /* CONFIG_TLS_INTERNAL_SERVER */
176 return 0;
177}
178
179
Hai Shalom39ba6fc2019-01-22 12:40:38 -0800180char * tls_connection_peer_serial_num(void *tls_ctx,
181 struct tls_connection *conn)
182{
183 /* TODO */
184 return NULL;
185}
186
187
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700188int tls_connection_shutdown(void *tls_ctx, struct tls_connection *conn)
189{
190#ifdef CONFIG_TLS_INTERNAL_CLIENT
191 if (conn->client)
192 return tlsv1_client_shutdown(conn->client);
193#endif /* CONFIG_TLS_INTERNAL_CLIENT */
194#ifdef CONFIG_TLS_INTERNAL_SERVER
195 if (conn->server)
196 return tlsv1_server_shutdown(conn->server);
197#endif /* CONFIG_TLS_INTERNAL_SERVER */
198 return -1;
199}
200
201
202int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn,
203 const struct tls_connection_params *params)
204{
205#ifdef CONFIG_TLS_INTERNAL_CLIENT
206 struct tlsv1_credentials *cred;
207
208 if (conn->client == NULL)
209 return -1;
210
Dmitry Shmidt1b467752015-12-14 12:45:46 -0800211 if (params->flags & TLS_CONN_EXT_CERT_CHECK) {
212 wpa_printf(MSG_INFO,
213 "TLS: tls_ext_cert_check=1 not supported");
214 return -1;
215 }
216
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700217 cred = tlsv1_cred_alloc();
218 if (cred == NULL)
219 return -1;
220
Dmitry Shmidtff787d52015-01-12 13:01:47 -0800221 if (params->subject_match) {
222 wpa_printf(MSG_INFO, "TLS: subject_match not supported");
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700223 tlsv1_cred_free(cred);
Dmitry Shmidtff787d52015-01-12 13:01:47 -0800224 return -1;
225 }
226
227 if (params->altsubject_match) {
228 wpa_printf(MSG_INFO, "TLS: altsubject_match not supported");
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700229 tlsv1_cred_free(cred);
Dmitry Shmidtff787d52015-01-12 13:01:47 -0800230 return -1;
231 }
232
233 if (params->suffix_match) {
234 wpa_printf(MSG_INFO, "TLS: suffix_match not supported");
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700235 tlsv1_cred_free(cred);
Dmitry Shmidtff787d52015-01-12 13:01:47 -0800236 return -1;
237 }
238
Dmitry Shmidt2f74e362015-01-21 13:19:05 -0800239 if (params->domain_match) {
240 wpa_printf(MSG_INFO, "TLS: domain_match not supported");
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700241 tlsv1_cred_free(cred);
Dmitry Shmidt2f74e362015-01-21 13:19:05 -0800242 return -1;
243 }
244
Dmitry Shmidtff787d52015-01-12 13:01:47 -0800245 if (params->openssl_ciphers) {
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700246 wpa_printf(MSG_INFO, "TLS: openssl_ciphers not supported");
247 tlsv1_cred_free(cred);
Dmitry Shmidtff787d52015-01-12 13:01:47 -0800248 return -1;
249 }
250
Hai Shalom39bc25d2019-02-06 16:32:13 -0800251 if (params->openssl_ecdh_curves) {
252 wpa_printf(MSG_INFO, "TLS: openssl_ecdh_curves not supported");
253 tlsv1_cred_free(cred);
254 return -1;
255 }
256
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700257 if (tlsv1_set_ca_cert(cred, params->ca_cert,
258 params->ca_cert_blob, params->ca_cert_blob_len,
259 params->ca_path)) {
260 wpa_printf(MSG_INFO, "TLS: Failed to configure trusted CA "
261 "certificates");
262 tlsv1_cred_free(cred);
263 return -1;
264 }
265
266 if (tlsv1_set_cert(cred, params->client_cert,
267 params->client_cert_blob,
268 params->client_cert_blob_len)) {
269 wpa_printf(MSG_INFO, "TLS: Failed to configure client "
270 "certificate");
271 tlsv1_cred_free(cred);
272 return -1;
273 }
274
275 if (tlsv1_set_private_key(cred, params->private_key,
276 params->private_key_passwd,
277 params->private_key_blob,
278 params->private_key_blob_len)) {
279 wpa_printf(MSG_INFO, "TLS: Failed to load private key");
280 tlsv1_cred_free(cred);
281 return -1;
282 }
283
284 if (tlsv1_set_dhparams(cred, params->dh_file, params->dh_blob,
285 params->dh_blob_len)) {
286 wpa_printf(MSG_INFO, "TLS: Failed to load DH parameters");
287 tlsv1_cred_free(cred);
288 return -1;
289 }
290
291 if (tlsv1_client_set_cred(conn->client, cred) < 0) {
292 tlsv1_cred_free(cred);
293 return -1;
294 }
295
Dmitry Shmidtd7ff03d2015-12-04 14:49:35 -0800296 tlsv1_client_set_flags(conn->client, params->flags);
Dmitry Shmidtc55524a2011-07-07 11:18:38 -0700297
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700298 return 0;
299#else /* CONFIG_TLS_INTERNAL_CLIENT */
300 return -1;
301#endif /* CONFIG_TLS_INTERNAL_CLIENT */
302}
303
304
305int tls_global_set_params(void *tls_ctx,
306 const struct tls_connection_params *params)
307{
308#ifdef CONFIG_TLS_INTERNAL_SERVER
309 struct tls_global *global = tls_ctx;
310 struct tlsv1_credentials *cred;
311
312 /* Currently, global parameters are only set when running in server
313 * mode. */
314 global->server = 1;
315 tlsv1_cred_free(global->server_cred);
316 global->server_cred = cred = tlsv1_cred_alloc();
317 if (cred == NULL)
318 return -1;
319
320 if (tlsv1_set_ca_cert(cred, params->ca_cert, params->ca_cert_blob,
321 params->ca_cert_blob_len, params->ca_path)) {
322 wpa_printf(MSG_INFO, "TLS: Failed to configure trusted CA "
323 "certificates");
324 return -1;
325 }
326
327 if (tlsv1_set_cert(cred, params->client_cert, params->client_cert_blob,
328 params->client_cert_blob_len)) {
329 wpa_printf(MSG_INFO, "TLS: Failed to configure server "
330 "certificate");
331 return -1;
332 }
333
334 if (tlsv1_set_private_key(cred, params->private_key,
335 params->private_key_passwd,
336 params->private_key_blob,
337 params->private_key_blob_len)) {
338 wpa_printf(MSG_INFO, "TLS: Failed to load private key");
339 return -1;
340 }
341
342 if (tlsv1_set_dhparams(cred, params->dh_file, params->dh_blob,
343 params->dh_blob_len)) {
344 wpa_printf(MSG_INFO, "TLS: Failed to load DH parameters");
345 return -1;
346 }
347
Dmitry Shmidtd97138d2015-12-28 13:27:49 -0800348 if (params->ocsp_stapling_response)
349 cred->ocsp_stapling_response =
350 os_strdup(params->ocsp_stapling_response);
351 if (params->ocsp_stapling_response_multi)
352 cred->ocsp_stapling_response_multi =
353 os_strdup(params->ocsp_stapling_response_multi);
354
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700355 return 0;
356#else /* CONFIG_TLS_INTERNAL_SERVER */
357 return -1;
358#endif /* CONFIG_TLS_INTERNAL_SERVER */
359}
360
361
Hai Shalom39bc25d2019-02-06 16:32:13 -0800362int tls_global_set_verify(void *tls_ctx, int check_crl, int strict)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700363{
364 struct tls_global *global = tls_ctx;
365 global->check_crl = check_crl;
366 return 0;
367}
368
369
370int tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn,
Dmitry Shmidtd80a4012015-11-05 16:35:40 -0800371 int verify_peer, unsigned int flags,
372 const u8 *session_ctx, size_t session_ctx_len)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700373{
374#ifdef CONFIG_TLS_INTERNAL_SERVER
375 if (conn->server)
376 return tlsv1_server_set_verify(conn->server, verify_peer);
377#endif /* CONFIG_TLS_INTERNAL_SERVER */
378 return -1;
379}
380
381
Dmitry Shmidtd80a4012015-11-05 16:35:40 -0800382int tls_connection_get_random(void *tls_ctx, struct tls_connection *conn,
383 struct tls_random *data)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700384{
385#ifdef CONFIG_TLS_INTERNAL_CLIENT
386 if (conn->client)
Dmitry Shmidtd80a4012015-11-05 16:35:40 -0800387 return tlsv1_client_get_random(conn->client, data);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700388#endif /* CONFIG_TLS_INTERNAL_CLIENT */
389#ifdef CONFIG_TLS_INTERNAL_SERVER
390 if (conn->server)
Dmitry Shmidtd80a4012015-11-05 16:35:40 -0800391 return tlsv1_server_get_random(conn->server, data);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700392#endif /* CONFIG_TLS_INTERNAL_SERVER */
393 return -1;
394}
395
396
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700397static int tls_get_keyblock_size(struct tls_connection *conn)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700398{
399#ifdef CONFIG_TLS_INTERNAL_CLIENT
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700400 if (conn->client)
401 return tlsv1_client_get_keyblock_size(conn->client);
402#endif /* CONFIG_TLS_INTERNAL_CLIENT */
403#ifdef CONFIG_TLS_INTERNAL_SERVER
404 if (conn->server)
405 return tlsv1_server_get_keyblock_size(conn->server);
406#endif /* CONFIG_TLS_INTERNAL_SERVER */
407 return -1;
408}
409
410
Dmitry Shmidt849734c2016-05-27 09:59:01 -0700411static int tls_connection_prf(void *tls_ctx, struct tls_connection *conn,
412 const char *label, int server_random_first,
413 int skip_keyblock, u8 *out, size_t out_len)
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700414{
415 int ret = -1, skip = 0;
416 u8 *tmp_out = NULL;
417 u8 *_out = out;
418
419 if (skip_keyblock) {
420 skip = tls_get_keyblock_size(conn);
421 if (skip < 0)
422 return -1;
423 tmp_out = os_malloc(skip + out_len);
424 if (!tmp_out)
425 return -1;
426 _out = tmp_out;
427 }
428
429#ifdef CONFIG_TLS_INTERNAL_CLIENT
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700430 if (conn->client) {
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700431 ret = tlsv1_client_prf(conn->client, label,
432 server_random_first,
Dmitry Shmidtd7ff03d2015-12-04 14:49:35 -0800433 _out, skip + out_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700434 }
435#endif /* CONFIG_TLS_INTERNAL_CLIENT */
436#ifdef CONFIG_TLS_INTERNAL_SERVER
437 if (conn->server) {
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700438 ret = tlsv1_server_prf(conn->server, label,
439 server_random_first,
Dmitry Shmidtd7ff03d2015-12-04 14:49:35 -0800440 _out, skip + out_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700441 }
442#endif /* CONFIG_TLS_INTERNAL_SERVER */
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700443 if (ret == 0 && skip_keyblock)
444 os_memcpy(out, _out + skip, out_len);
445 bin_clear_free(tmp_out, skip);
446
447 return ret;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700448}
449
450
Dmitry Shmidt849734c2016-05-27 09:59:01 -0700451int tls_connection_export_key(void *tls_ctx, struct tls_connection *conn,
452 const char *label, u8 *out, size_t out_len)
453{
454 return tls_connection_prf(tls_ctx, conn, label, 0, 0, out, out_len);
455}
456
457
458int tls_connection_get_eap_fast_key(void *tls_ctx, struct tls_connection *conn,
459 u8 *out, size_t out_len)
460{
461 return tls_connection_prf(tls_ctx, conn, "key expansion", 1, 1, out,
462 out_len);
463}
464
465
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700466struct wpabuf * tls_connection_handshake(void *tls_ctx,
467 struct tls_connection *conn,
468 const struct wpabuf *in_data,
469 struct wpabuf **appl_data)
470{
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800471 return tls_connection_handshake2(tls_ctx, conn, in_data, appl_data,
472 NULL);
473}
474
475
476struct wpabuf * tls_connection_handshake2(void *tls_ctx,
477 struct tls_connection *conn,
478 const struct wpabuf *in_data,
479 struct wpabuf **appl_data,
480 int *need_more_data)
481{
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700482#ifdef CONFIG_TLS_INTERNAL_CLIENT
483 u8 *res, *ad;
484 size_t res_len, ad_len;
485 struct wpabuf *out;
486
487 if (conn->client == NULL)
488 return NULL;
489
490 ad = NULL;
491 res = tlsv1_client_handshake(conn->client,
492 in_data ? wpabuf_head(in_data) : NULL,
493 in_data ? wpabuf_len(in_data) : 0,
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800494 &res_len, &ad, &ad_len, need_more_data);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700495 if (res == NULL)
496 return NULL;
497 out = wpabuf_alloc_ext_data(res, res_len);
498 if (out == NULL) {
499 os_free(res);
500 os_free(ad);
501 return NULL;
502 }
503 if (appl_data) {
504 if (ad) {
505 *appl_data = wpabuf_alloc_ext_data(ad, ad_len);
506 if (*appl_data == NULL)
507 os_free(ad);
508 } else
509 *appl_data = NULL;
510 } else
511 os_free(ad);
512
513 return out;
514#else /* CONFIG_TLS_INTERNAL_CLIENT */
515 return NULL;
516#endif /* CONFIG_TLS_INTERNAL_CLIENT */
517}
518
519
520struct wpabuf * tls_connection_server_handshake(void *tls_ctx,
521 struct tls_connection *conn,
522 const struct wpabuf *in_data,
523 struct wpabuf **appl_data)
524{
525#ifdef CONFIG_TLS_INTERNAL_SERVER
526 u8 *res;
527 size_t res_len;
528 struct wpabuf *out;
529
530 if (conn->server == NULL)
531 return NULL;
532
533 if (appl_data)
534 *appl_data = NULL;
535
536 res = tlsv1_server_handshake(conn->server, wpabuf_head(in_data),
537 wpabuf_len(in_data), &res_len);
538 if (res == NULL && tlsv1_server_established(conn->server))
539 return wpabuf_alloc(0);
540 if (res == NULL)
541 return NULL;
542 out = wpabuf_alloc_ext_data(res, res_len);
543 if (out == NULL) {
544 os_free(res);
545 return NULL;
546 }
547
548 return out;
549#else /* CONFIG_TLS_INTERNAL_SERVER */
550 return NULL;
551#endif /* CONFIG_TLS_INTERNAL_SERVER */
552}
553
554
555struct wpabuf * tls_connection_encrypt(void *tls_ctx,
556 struct tls_connection *conn,
557 const struct wpabuf *in_data)
558{
559#ifdef CONFIG_TLS_INTERNAL_CLIENT
560 if (conn->client) {
561 struct wpabuf *buf;
562 int res;
563 buf = wpabuf_alloc(wpabuf_len(in_data) + 300);
564 if (buf == NULL)
565 return NULL;
566 res = tlsv1_client_encrypt(conn->client, wpabuf_head(in_data),
567 wpabuf_len(in_data),
568 wpabuf_mhead(buf),
569 wpabuf_size(buf));
570 if (res < 0) {
571 wpabuf_free(buf);
572 return NULL;
573 }
574 wpabuf_put(buf, res);
575 return buf;
576 }
577#endif /* CONFIG_TLS_INTERNAL_CLIENT */
578#ifdef CONFIG_TLS_INTERNAL_SERVER
579 if (conn->server) {
580 struct wpabuf *buf;
581 int res;
582 buf = wpabuf_alloc(wpabuf_len(in_data) + 300);
583 if (buf == NULL)
584 return NULL;
585 res = tlsv1_server_encrypt(conn->server, wpabuf_head(in_data),
586 wpabuf_len(in_data),
587 wpabuf_mhead(buf),
588 wpabuf_size(buf));
589 if (res < 0) {
590 wpabuf_free(buf);
591 return NULL;
592 }
593 wpabuf_put(buf, res);
594 return buf;
595 }
596#endif /* CONFIG_TLS_INTERNAL_SERVER */
597 return NULL;
598}
599
600
601struct wpabuf * tls_connection_decrypt(void *tls_ctx,
602 struct tls_connection *conn,
603 const struct wpabuf *in_data)
604{
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800605 return tls_connection_decrypt2(tls_ctx, conn, in_data, NULL);
606}
607
608
609struct wpabuf * tls_connection_decrypt2(void *tls_ctx,
610 struct tls_connection *conn,
611 const struct wpabuf *in_data,
612 int *need_more_data)
613{
614 if (need_more_data)
615 *need_more_data = 0;
616
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700617#ifdef CONFIG_TLS_INTERNAL_CLIENT
618 if (conn->client) {
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800619 return tlsv1_client_decrypt(conn->client, wpabuf_head(in_data),
620 wpabuf_len(in_data),
621 need_more_data);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700622 }
623#endif /* CONFIG_TLS_INTERNAL_CLIENT */
624#ifdef CONFIG_TLS_INTERNAL_SERVER
625 if (conn->server) {
626 struct wpabuf *buf;
627 int res;
628 buf = wpabuf_alloc((wpabuf_len(in_data) + 500) * 3);
629 if (buf == NULL)
630 return NULL;
631 res = tlsv1_server_decrypt(conn->server, wpabuf_head(in_data),
632 wpabuf_len(in_data),
633 wpabuf_mhead(buf),
634 wpabuf_size(buf));
635 if (res < 0) {
636 wpabuf_free(buf);
637 return NULL;
638 }
639 wpabuf_put(buf, res);
640 return buf;
641 }
642#endif /* CONFIG_TLS_INTERNAL_SERVER */
643 return NULL;
644}
645
646
647int tls_connection_resumed(void *tls_ctx, struct tls_connection *conn)
648{
649#ifdef CONFIG_TLS_INTERNAL_CLIENT
650 if (conn->client)
651 return tlsv1_client_resumed(conn->client);
652#endif /* CONFIG_TLS_INTERNAL_CLIENT */
653#ifdef CONFIG_TLS_INTERNAL_SERVER
654 if (conn->server)
655 return tlsv1_server_resumed(conn->server);
656#endif /* CONFIG_TLS_INTERNAL_SERVER */
657 return -1;
658}
659
660
661int tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn,
662 u8 *ciphers)
663{
664#ifdef CONFIG_TLS_INTERNAL_CLIENT
665 if (conn->client)
666 return tlsv1_client_set_cipher_list(conn->client, ciphers);
667#endif /* CONFIG_TLS_INTERNAL_CLIENT */
668#ifdef CONFIG_TLS_INTERNAL_SERVER
669 if (conn->server)
670 return tlsv1_server_set_cipher_list(conn->server, ciphers);
671#endif /* CONFIG_TLS_INTERNAL_SERVER */
672 return -1;
673}
674
675
Dmitry Shmidtd80a4012015-11-05 16:35:40 -0800676int tls_get_version(void *ssl_ctx, struct tls_connection *conn,
677 char *buf, size_t buflen)
678{
Dmitry Shmidtd7ff03d2015-12-04 14:49:35 -0800679 if (conn == NULL)
680 return -1;
681#ifdef CONFIG_TLS_INTERNAL_CLIENT
682 if (conn->client)
683 return tlsv1_client_get_version(conn->client, buf, buflen);
684#endif /* CONFIG_TLS_INTERNAL_CLIENT */
Dmitry Shmidtd80a4012015-11-05 16:35:40 -0800685 return -1;
686}
687
688
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700689int tls_get_cipher(void *tls_ctx, struct tls_connection *conn,
690 char *buf, size_t buflen)
691{
692 if (conn == NULL)
693 return -1;
694#ifdef CONFIG_TLS_INTERNAL_CLIENT
695 if (conn->client)
696 return tlsv1_client_get_cipher(conn->client, buf, buflen);
697#endif /* CONFIG_TLS_INTERNAL_CLIENT */
698#ifdef CONFIG_TLS_INTERNAL_SERVER
699 if (conn->server)
700 return tlsv1_server_get_cipher(conn->server, buf, buflen);
701#endif /* CONFIG_TLS_INTERNAL_SERVER */
702 return -1;
703}
704
705
706int tls_connection_enable_workaround(void *tls_ctx,
707 struct tls_connection *conn)
708{
709 return -1;
710}
711
712
713int tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn,
714 int ext_type, const u8 *data,
715 size_t data_len)
716{
717#ifdef CONFIG_TLS_INTERNAL_CLIENT
718 if (conn->client) {
719 return tlsv1_client_hello_ext(conn->client, ext_type,
720 data, data_len);
721 }
722#endif /* CONFIG_TLS_INTERNAL_CLIENT */
723 return -1;
724}
725
726
727int tls_connection_get_failed(void *tls_ctx, struct tls_connection *conn)
728{
729 return 0;
730}
731
732
733int tls_connection_get_read_alerts(void *tls_ctx, struct tls_connection *conn)
734{
735 return 0;
736}
737
738
739int tls_connection_get_write_alerts(void *tls_ctx,
740 struct tls_connection *conn)
741{
742 return 0;
743}
744
745
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700746int tls_connection_set_session_ticket_cb(void *tls_ctx,
747 struct tls_connection *conn,
748 tls_session_ticket_cb cb,
749 void *ctx)
750{
751#ifdef CONFIG_TLS_INTERNAL_CLIENT
752 if (conn->client) {
753 tlsv1_client_set_session_ticket_cb(conn->client, cb, ctx);
754 return 0;
755 }
756#endif /* CONFIG_TLS_INTERNAL_CLIENT */
757#ifdef CONFIG_TLS_INTERNAL_SERVER
758 if (conn->server) {
759 tlsv1_server_set_session_ticket_cb(conn->server, cb, ctx);
760 return 0;
761 }
762#endif /* CONFIG_TLS_INTERNAL_SERVER */
763 return -1;
764}
Dmitry Shmidtff787d52015-01-12 13:01:47 -0800765
766
767int tls_get_library_version(char *buf, size_t buf_len)
768{
769 return os_snprintf(buf, buf_len, "internal");
770}
Dmitry Shmidtd80a4012015-11-05 16:35:40 -0800771
772
773void tls_connection_set_success_data(struct tls_connection *conn,
774 struct wpabuf *data)
775{
776}
777
778
779void tls_connection_set_success_data_resumed(struct tls_connection *conn)
780{
781}
782
783
784const struct wpabuf *
785tls_connection_get_success_data(struct tls_connection *conn)
786{
787 return NULL;
788}
789
790
791void tls_connection_remove_session(struct tls_connection *conn)
792{
793}