blob: dcbb31d76dec4e737fc2cb7484702c22c6a315ef [file] [log] [blame]
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001/*
2 * TLS interface functions and an internal TLS implementation
Dmitry Shmidtc55524a2011-07-07 11:18:38 -07003 * Copyright (c) 2004-2011, Jouni Malinen <j@w1.fi>
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004 *
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08005 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07007 *
8 * This file interface functions for hostapd/wpa_supplicant to use the
9 * integrated TLSv1 implementation.
10 */
11
12#include "includes.h"
13
14#include "common.h"
15#include "tls.h"
16#include "tls/tlsv1_client.h"
17#include "tls/tlsv1_server.h"
18
19
20static int tls_ref_count = 0;
21
22struct tls_global {
23 int server;
24 struct tlsv1_credentials *server_cred;
25 int check_crl;
Dmitry Shmidtd7ff03d2015-12-04 14:49:35 -080026
27 void (*event_cb)(void *ctx, enum tls_event ev,
28 union tls_event_data *data);
29 void *cb_ctx;
30 int cert_in_cb;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070031};
32
33struct tls_connection {
34 struct tlsv1_client *client;
35 struct tlsv1_server *server;
Dmitry Shmidt818ea482014-03-10 13:15:21 -070036 struct tls_global *global;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070037};
38
39
40void * tls_init(const struct tls_config *conf)
41{
42 struct tls_global *global;
43
44 if (tls_ref_count == 0) {
45#ifdef CONFIG_TLS_INTERNAL_CLIENT
46 if (tlsv1_client_global_init())
47 return NULL;
48#endif /* CONFIG_TLS_INTERNAL_CLIENT */
49#ifdef CONFIG_TLS_INTERNAL_SERVER
50 if (tlsv1_server_global_init())
51 return NULL;
52#endif /* CONFIG_TLS_INTERNAL_SERVER */
53 }
54 tls_ref_count++;
55
56 global = os_zalloc(sizeof(*global));
57 if (global == NULL)
58 return NULL;
Dmitry Shmidtd7ff03d2015-12-04 14:49:35 -080059 if (conf) {
60 global->event_cb = conf->event_cb;
61 global->cb_ctx = conf->cb_ctx;
62 global->cert_in_cb = conf->cert_in_cb;
63 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070064
65 return global;
66}
67
68void tls_deinit(void *ssl_ctx)
69{
70 struct tls_global *global = ssl_ctx;
71 tls_ref_count--;
72 if (tls_ref_count == 0) {
73#ifdef CONFIG_TLS_INTERNAL_CLIENT
74 tlsv1_client_global_deinit();
75#endif /* CONFIG_TLS_INTERNAL_CLIENT */
76#ifdef CONFIG_TLS_INTERNAL_SERVER
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070077 tlsv1_server_global_deinit();
78#endif /* CONFIG_TLS_INTERNAL_SERVER */
79 }
Dmitry Shmidtd80a4012015-11-05 16:35:40 -080080#ifdef CONFIG_TLS_INTERNAL_SERVER
81 tlsv1_cred_free(global->server_cred);
82#endif /* CONFIG_TLS_INTERNAL_SERVER */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070083 os_free(global);
84}
85
86
87int tls_get_errors(void *tls_ctx)
88{
89 return 0;
90}
91
92
93struct tls_connection * tls_connection_init(void *tls_ctx)
94{
95 struct tls_connection *conn;
96 struct tls_global *global = tls_ctx;
97
98 conn = os_zalloc(sizeof(*conn));
99 if (conn == NULL)
100 return NULL;
Dmitry Shmidt818ea482014-03-10 13:15:21 -0700101 conn->global = global;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700102
103#ifdef CONFIG_TLS_INTERNAL_CLIENT
104 if (!global->server) {
105 conn->client = tlsv1_client_init();
106 if (conn->client == NULL) {
107 os_free(conn);
108 return NULL;
109 }
Dmitry Shmidtd7ff03d2015-12-04 14:49:35 -0800110 tlsv1_client_set_cb(conn->client, global->event_cb,
111 global->cb_ctx, global->cert_in_cb);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700112 }
113#endif /* CONFIG_TLS_INTERNAL_CLIENT */
114#ifdef CONFIG_TLS_INTERNAL_SERVER
115 if (global->server) {
116 conn->server = tlsv1_server_init(global->server_cred);
117 if (conn->server == NULL) {
118 os_free(conn);
119 return NULL;
120 }
121 }
122#endif /* CONFIG_TLS_INTERNAL_SERVER */
123
124 return conn;
125}
126
127
Dmitry Shmidt818ea482014-03-10 13:15:21 -0700128#ifdef CONFIG_TESTING_OPTIONS
129#ifdef CONFIG_TLS_INTERNAL_SERVER
130void tls_connection_set_test_flags(struct tls_connection *conn, u32 flags)
131{
132 if (conn->server)
133 tlsv1_server_set_test_flags(conn->server, flags);
134}
135#endif /* CONFIG_TLS_INTERNAL_SERVER */
136#endif /* CONFIG_TESTING_OPTIONS */
137
138
139void tls_connection_set_log_cb(struct tls_connection *conn,
140 void (*log_cb)(void *ctx, const char *msg),
141 void *ctx)
142{
143#ifdef CONFIG_TLS_INTERNAL_SERVER
144 if (conn->server)
145 tlsv1_server_set_log_cb(conn->server, log_cb, ctx);
146#endif /* CONFIG_TLS_INTERNAL_SERVER */
147}
148
149
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700150void tls_connection_deinit(void *tls_ctx, struct tls_connection *conn)
151{
152 if (conn == NULL)
153 return;
154#ifdef CONFIG_TLS_INTERNAL_CLIENT
155 if (conn->client)
156 tlsv1_client_deinit(conn->client);
157#endif /* CONFIG_TLS_INTERNAL_CLIENT */
158#ifdef CONFIG_TLS_INTERNAL_SERVER
159 if (conn->server)
160 tlsv1_server_deinit(conn->server);
161#endif /* CONFIG_TLS_INTERNAL_SERVER */
162 os_free(conn);
163}
164
165
166int tls_connection_established(void *tls_ctx, struct tls_connection *conn)
167{
168#ifdef CONFIG_TLS_INTERNAL_CLIENT
169 if (conn->client)
170 return tlsv1_client_established(conn->client);
171#endif /* CONFIG_TLS_INTERNAL_CLIENT */
172#ifdef CONFIG_TLS_INTERNAL_SERVER
173 if (conn->server)
174 return tlsv1_server_established(conn->server);
175#endif /* CONFIG_TLS_INTERNAL_SERVER */
176 return 0;
177}
178
179
180int tls_connection_shutdown(void *tls_ctx, struct tls_connection *conn)
181{
182#ifdef CONFIG_TLS_INTERNAL_CLIENT
183 if (conn->client)
184 return tlsv1_client_shutdown(conn->client);
185#endif /* CONFIG_TLS_INTERNAL_CLIENT */
186#ifdef CONFIG_TLS_INTERNAL_SERVER
187 if (conn->server)
188 return tlsv1_server_shutdown(conn->server);
189#endif /* CONFIG_TLS_INTERNAL_SERVER */
190 return -1;
191}
192
193
194int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn,
195 const struct tls_connection_params *params)
196{
197#ifdef CONFIG_TLS_INTERNAL_CLIENT
198 struct tlsv1_credentials *cred;
199
200 if (conn->client == NULL)
201 return -1;
202
203 cred = tlsv1_cred_alloc();
204 if (cred == NULL)
205 return -1;
206
Dmitry Shmidtff787d52015-01-12 13:01:47 -0800207 if (params->subject_match) {
208 wpa_printf(MSG_INFO, "TLS: subject_match not supported");
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700209 tlsv1_cred_free(cred);
Dmitry Shmidtff787d52015-01-12 13:01:47 -0800210 return -1;
211 }
212
213 if (params->altsubject_match) {
214 wpa_printf(MSG_INFO, "TLS: altsubject_match not supported");
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700215 tlsv1_cred_free(cred);
Dmitry Shmidtff787d52015-01-12 13:01:47 -0800216 return -1;
217 }
218
219 if (params->suffix_match) {
220 wpa_printf(MSG_INFO, "TLS: suffix_match not supported");
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700221 tlsv1_cred_free(cred);
Dmitry Shmidtff787d52015-01-12 13:01:47 -0800222 return -1;
223 }
224
Dmitry Shmidt2f74e362015-01-21 13:19:05 -0800225 if (params->domain_match) {
226 wpa_printf(MSG_INFO, "TLS: domain_match not supported");
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700227 tlsv1_cred_free(cred);
Dmitry Shmidt2f74e362015-01-21 13:19:05 -0800228 return -1;
229 }
230
Dmitry Shmidtff787d52015-01-12 13:01:47 -0800231 if (params->openssl_ciphers) {
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700232 wpa_printf(MSG_INFO, "TLS: openssl_ciphers not supported");
233 tlsv1_cred_free(cred);
Dmitry Shmidtff787d52015-01-12 13:01:47 -0800234 return -1;
235 }
236
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700237 if (tlsv1_set_ca_cert(cred, params->ca_cert,
238 params->ca_cert_blob, params->ca_cert_blob_len,
239 params->ca_path)) {
240 wpa_printf(MSG_INFO, "TLS: Failed to configure trusted CA "
241 "certificates");
242 tlsv1_cred_free(cred);
243 return -1;
244 }
245
246 if (tlsv1_set_cert(cred, params->client_cert,
247 params->client_cert_blob,
248 params->client_cert_blob_len)) {
249 wpa_printf(MSG_INFO, "TLS: Failed to configure client "
250 "certificate");
251 tlsv1_cred_free(cred);
252 return -1;
253 }
254
255 if (tlsv1_set_private_key(cred, params->private_key,
256 params->private_key_passwd,
257 params->private_key_blob,
258 params->private_key_blob_len)) {
259 wpa_printf(MSG_INFO, "TLS: Failed to load private key");
260 tlsv1_cred_free(cred);
261 return -1;
262 }
263
264 if (tlsv1_set_dhparams(cred, params->dh_file, params->dh_blob,
265 params->dh_blob_len)) {
266 wpa_printf(MSG_INFO, "TLS: Failed to load DH parameters");
267 tlsv1_cred_free(cred);
268 return -1;
269 }
270
271 if (tlsv1_client_set_cred(conn->client, cred) < 0) {
272 tlsv1_cred_free(cred);
273 return -1;
274 }
275
Dmitry Shmidtd7ff03d2015-12-04 14:49:35 -0800276 tlsv1_client_set_flags(conn->client, params->flags);
Dmitry Shmidtc55524a2011-07-07 11:18:38 -0700277
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700278 return 0;
279#else /* CONFIG_TLS_INTERNAL_CLIENT */
280 return -1;
281#endif /* CONFIG_TLS_INTERNAL_CLIENT */
282}
283
284
285int tls_global_set_params(void *tls_ctx,
286 const struct tls_connection_params *params)
287{
288#ifdef CONFIG_TLS_INTERNAL_SERVER
289 struct tls_global *global = tls_ctx;
290 struct tlsv1_credentials *cred;
291
292 /* Currently, global parameters are only set when running in server
293 * mode. */
294 global->server = 1;
295 tlsv1_cred_free(global->server_cred);
296 global->server_cred = cred = tlsv1_cred_alloc();
297 if (cred == NULL)
298 return -1;
299
300 if (tlsv1_set_ca_cert(cred, params->ca_cert, params->ca_cert_blob,
301 params->ca_cert_blob_len, params->ca_path)) {
302 wpa_printf(MSG_INFO, "TLS: Failed to configure trusted CA "
303 "certificates");
304 return -1;
305 }
306
307 if (tlsv1_set_cert(cred, params->client_cert, params->client_cert_blob,
308 params->client_cert_blob_len)) {
309 wpa_printf(MSG_INFO, "TLS: Failed to configure server "
310 "certificate");
311 return -1;
312 }
313
314 if (tlsv1_set_private_key(cred, params->private_key,
315 params->private_key_passwd,
316 params->private_key_blob,
317 params->private_key_blob_len)) {
318 wpa_printf(MSG_INFO, "TLS: Failed to load private key");
319 return -1;
320 }
321
322 if (tlsv1_set_dhparams(cred, params->dh_file, params->dh_blob,
323 params->dh_blob_len)) {
324 wpa_printf(MSG_INFO, "TLS: Failed to load DH parameters");
325 return -1;
326 }
327
328 return 0;
329#else /* CONFIG_TLS_INTERNAL_SERVER */
330 return -1;
331#endif /* CONFIG_TLS_INTERNAL_SERVER */
332}
333
334
335int tls_global_set_verify(void *tls_ctx, int check_crl)
336{
337 struct tls_global *global = tls_ctx;
338 global->check_crl = check_crl;
339 return 0;
340}
341
342
343int tls_connection_set_verify(void *tls_ctx, struct tls_connection *conn,
Dmitry Shmidtd80a4012015-11-05 16:35:40 -0800344 int verify_peer, unsigned int flags,
345 const u8 *session_ctx, size_t session_ctx_len)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700346{
347#ifdef CONFIG_TLS_INTERNAL_SERVER
348 if (conn->server)
349 return tlsv1_server_set_verify(conn->server, verify_peer);
350#endif /* CONFIG_TLS_INTERNAL_SERVER */
351 return -1;
352}
353
354
Dmitry Shmidtd80a4012015-11-05 16:35:40 -0800355int tls_connection_get_random(void *tls_ctx, struct tls_connection *conn,
356 struct tls_random *data)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700357{
358#ifdef CONFIG_TLS_INTERNAL_CLIENT
359 if (conn->client)
Dmitry Shmidtd80a4012015-11-05 16:35:40 -0800360 return tlsv1_client_get_random(conn->client, data);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700361#endif /* CONFIG_TLS_INTERNAL_CLIENT */
362#ifdef CONFIG_TLS_INTERNAL_SERVER
363 if (conn->server)
Dmitry Shmidtd80a4012015-11-05 16:35:40 -0800364 return tlsv1_server_get_random(conn->server, data);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700365#endif /* CONFIG_TLS_INTERNAL_SERVER */
366 return -1;
367}
368
369
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700370static int tls_get_keyblock_size(struct tls_connection *conn)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700371{
372#ifdef CONFIG_TLS_INTERNAL_CLIENT
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700373 if (conn->client)
374 return tlsv1_client_get_keyblock_size(conn->client);
375#endif /* CONFIG_TLS_INTERNAL_CLIENT */
376#ifdef CONFIG_TLS_INTERNAL_SERVER
377 if (conn->server)
378 return tlsv1_server_get_keyblock_size(conn->server);
379#endif /* CONFIG_TLS_INTERNAL_SERVER */
380 return -1;
381}
382
383
384int tls_connection_prf(void *tls_ctx, struct tls_connection *conn,
385 const char *label, int server_random_first,
386 int skip_keyblock, u8 *out, size_t out_len)
387{
388 int ret = -1, skip = 0;
389 u8 *tmp_out = NULL;
390 u8 *_out = out;
391
392 if (skip_keyblock) {
393 skip = tls_get_keyblock_size(conn);
394 if (skip < 0)
395 return -1;
396 tmp_out = os_malloc(skip + out_len);
397 if (!tmp_out)
398 return -1;
399 _out = tmp_out;
400 }
401
402#ifdef CONFIG_TLS_INTERNAL_CLIENT
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700403 if (conn->client) {
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700404 ret = tlsv1_client_prf(conn->client, label,
405 server_random_first,
Dmitry Shmidtd7ff03d2015-12-04 14:49:35 -0800406 _out, skip + out_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700407 }
408#endif /* CONFIG_TLS_INTERNAL_CLIENT */
409#ifdef CONFIG_TLS_INTERNAL_SERVER
410 if (conn->server) {
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700411 ret = tlsv1_server_prf(conn->server, label,
412 server_random_first,
Dmitry Shmidtd7ff03d2015-12-04 14:49:35 -0800413 _out, skip + out_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700414 }
415#endif /* CONFIG_TLS_INTERNAL_SERVER */
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700416 if (ret == 0 && skip_keyblock)
417 os_memcpy(out, _out + skip, out_len);
418 bin_clear_free(tmp_out, skip);
419
420 return ret;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700421}
422
423
424struct wpabuf * tls_connection_handshake(void *tls_ctx,
425 struct tls_connection *conn,
426 const struct wpabuf *in_data,
427 struct wpabuf **appl_data)
428{
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800429 return tls_connection_handshake2(tls_ctx, conn, in_data, appl_data,
430 NULL);
431}
432
433
434struct wpabuf * tls_connection_handshake2(void *tls_ctx,
435 struct tls_connection *conn,
436 const struct wpabuf *in_data,
437 struct wpabuf **appl_data,
438 int *need_more_data)
439{
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700440#ifdef CONFIG_TLS_INTERNAL_CLIENT
441 u8 *res, *ad;
442 size_t res_len, ad_len;
443 struct wpabuf *out;
444
445 if (conn->client == NULL)
446 return NULL;
447
448 ad = NULL;
449 res = tlsv1_client_handshake(conn->client,
450 in_data ? wpabuf_head(in_data) : NULL,
451 in_data ? wpabuf_len(in_data) : 0,
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800452 &res_len, &ad, &ad_len, need_more_data);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700453 if (res == NULL)
454 return NULL;
455 out = wpabuf_alloc_ext_data(res, res_len);
456 if (out == NULL) {
457 os_free(res);
458 os_free(ad);
459 return NULL;
460 }
461 if (appl_data) {
462 if (ad) {
463 *appl_data = wpabuf_alloc_ext_data(ad, ad_len);
464 if (*appl_data == NULL)
465 os_free(ad);
466 } else
467 *appl_data = NULL;
468 } else
469 os_free(ad);
470
471 return out;
472#else /* CONFIG_TLS_INTERNAL_CLIENT */
473 return NULL;
474#endif /* CONFIG_TLS_INTERNAL_CLIENT */
475}
476
477
478struct wpabuf * tls_connection_server_handshake(void *tls_ctx,
479 struct tls_connection *conn,
480 const struct wpabuf *in_data,
481 struct wpabuf **appl_data)
482{
483#ifdef CONFIG_TLS_INTERNAL_SERVER
484 u8 *res;
485 size_t res_len;
486 struct wpabuf *out;
487
488 if (conn->server == NULL)
489 return NULL;
490
491 if (appl_data)
492 *appl_data = NULL;
493
494 res = tlsv1_server_handshake(conn->server, wpabuf_head(in_data),
495 wpabuf_len(in_data), &res_len);
496 if (res == NULL && tlsv1_server_established(conn->server))
497 return wpabuf_alloc(0);
498 if (res == NULL)
499 return NULL;
500 out = wpabuf_alloc_ext_data(res, res_len);
501 if (out == NULL) {
502 os_free(res);
503 return NULL;
504 }
505
506 return out;
507#else /* CONFIG_TLS_INTERNAL_SERVER */
508 return NULL;
509#endif /* CONFIG_TLS_INTERNAL_SERVER */
510}
511
512
513struct wpabuf * tls_connection_encrypt(void *tls_ctx,
514 struct tls_connection *conn,
515 const struct wpabuf *in_data)
516{
517#ifdef CONFIG_TLS_INTERNAL_CLIENT
518 if (conn->client) {
519 struct wpabuf *buf;
520 int res;
521 buf = wpabuf_alloc(wpabuf_len(in_data) + 300);
522 if (buf == NULL)
523 return NULL;
524 res = tlsv1_client_encrypt(conn->client, wpabuf_head(in_data),
525 wpabuf_len(in_data),
526 wpabuf_mhead(buf),
527 wpabuf_size(buf));
528 if (res < 0) {
529 wpabuf_free(buf);
530 return NULL;
531 }
532 wpabuf_put(buf, res);
533 return buf;
534 }
535#endif /* CONFIG_TLS_INTERNAL_CLIENT */
536#ifdef CONFIG_TLS_INTERNAL_SERVER
537 if (conn->server) {
538 struct wpabuf *buf;
539 int res;
540 buf = wpabuf_alloc(wpabuf_len(in_data) + 300);
541 if (buf == NULL)
542 return NULL;
543 res = tlsv1_server_encrypt(conn->server, wpabuf_head(in_data),
544 wpabuf_len(in_data),
545 wpabuf_mhead(buf),
546 wpabuf_size(buf));
547 if (res < 0) {
548 wpabuf_free(buf);
549 return NULL;
550 }
551 wpabuf_put(buf, res);
552 return buf;
553 }
554#endif /* CONFIG_TLS_INTERNAL_SERVER */
555 return NULL;
556}
557
558
559struct wpabuf * tls_connection_decrypt(void *tls_ctx,
560 struct tls_connection *conn,
561 const struct wpabuf *in_data)
562{
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800563 return tls_connection_decrypt2(tls_ctx, conn, in_data, NULL);
564}
565
566
567struct wpabuf * tls_connection_decrypt2(void *tls_ctx,
568 struct tls_connection *conn,
569 const struct wpabuf *in_data,
570 int *need_more_data)
571{
572 if (need_more_data)
573 *need_more_data = 0;
574
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700575#ifdef CONFIG_TLS_INTERNAL_CLIENT
576 if (conn->client) {
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800577 return tlsv1_client_decrypt(conn->client, wpabuf_head(in_data),
578 wpabuf_len(in_data),
579 need_more_data);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700580 }
581#endif /* CONFIG_TLS_INTERNAL_CLIENT */
582#ifdef CONFIG_TLS_INTERNAL_SERVER
583 if (conn->server) {
584 struct wpabuf *buf;
585 int res;
586 buf = wpabuf_alloc((wpabuf_len(in_data) + 500) * 3);
587 if (buf == NULL)
588 return NULL;
589 res = tlsv1_server_decrypt(conn->server, wpabuf_head(in_data),
590 wpabuf_len(in_data),
591 wpabuf_mhead(buf),
592 wpabuf_size(buf));
593 if (res < 0) {
594 wpabuf_free(buf);
595 return NULL;
596 }
597 wpabuf_put(buf, res);
598 return buf;
599 }
600#endif /* CONFIG_TLS_INTERNAL_SERVER */
601 return NULL;
602}
603
604
605int tls_connection_resumed(void *tls_ctx, struct tls_connection *conn)
606{
607#ifdef CONFIG_TLS_INTERNAL_CLIENT
608 if (conn->client)
609 return tlsv1_client_resumed(conn->client);
610#endif /* CONFIG_TLS_INTERNAL_CLIENT */
611#ifdef CONFIG_TLS_INTERNAL_SERVER
612 if (conn->server)
613 return tlsv1_server_resumed(conn->server);
614#endif /* CONFIG_TLS_INTERNAL_SERVER */
615 return -1;
616}
617
618
619int tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn,
620 u8 *ciphers)
621{
622#ifdef CONFIG_TLS_INTERNAL_CLIENT
623 if (conn->client)
624 return tlsv1_client_set_cipher_list(conn->client, ciphers);
625#endif /* CONFIG_TLS_INTERNAL_CLIENT */
626#ifdef CONFIG_TLS_INTERNAL_SERVER
627 if (conn->server)
628 return tlsv1_server_set_cipher_list(conn->server, ciphers);
629#endif /* CONFIG_TLS_INTERNAL_SERVER */
630 return -1;
631}
632
633
Dmitry Shmidtd80a4012015-11-05 16:35:40 -0800634int tls_get_version(void *ssl_ctx, struct tls_connection *conn,
635 char *buf, size_t buflen)
636{
Dmitry Shmidtd7ff03d2015-12-04 14:49:35 -0800637 if (conn == NULL)
638 return -1;
639#ifdef CONFIG_TLS_INTERNAL_CLIENT
640 if (conn->client)
641 return tlsv1_client_get_version(conn->client, buf, buflen);
642#endif /* CONFIG_TLS_INTERNAL_CLIENT */
Dmitry Shmidtd80a4012015-11-05 16:35:40 -0800643 return -1;
644}
645
646
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700647int tls_get_cipher(void *tls_ctx, struct tls_connection *conn,
648 char *buf, size_t buflen)
649{
650 if (conn == NULL)
651 return -1;
652#ifdef CONFIG_TLS_INTERNAL_CLIENT
653 if (conn->client)
654 return tlsv1_client_get_cipher(conn->client, buf, buflen);
655#endif /* CONFIG_TLS_INTERNAL_CLIENT */
656#ifdef CONFIG_TLS_INTERNAL_SERVER
657 if (conn->server)
658 return tlsv1_server_get_cipher(conn->server, buf, buflen);
659#endif /* CONFIG_TLS_INTERNAL_SERVER */
660 return -1;
661}
662
663
664int tls_connection_enable_workaround(void *tls_ctx,
665 struct tls_connection *conn)
666{
667 return -1;
668}
669
670
671int tls_connection_client_hello_ext(void *tls_ctx, struct tls_connection *conn,
672 int ext_type, const u8 *data,
673 size_t data_len)
674{
675#ifdef CONFIG_TLS_INTERNAL_CLIENT
676 if (conn->client) {
677 return tlsv1_client_hello_ext(conn->client, ext_type,
678 data, data_len);
679 }
680#endif /* CONFIG_TLS_INTERNAL_CLIENT */
681 return -1;
682}
683
684
685int tls_connection_get_failed(void *tls_ctx, struct tls_connection *conn)
686{
687 return 0;
688}
689
690
691int tls_connection_get_read_alerts(void *tls_ctx, struct tls_connection *conn)
692{
693 return 0;
694}
695
696
697int tls_connection_get_write_alerts(void *tls_ctx,
698 struct tls_connection *conn)
699{
700 return 0;
701}
702
703
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700704int tls_connection_set_session_ticket_cb(void *tls_ctx,
705 struct tls_connection *conn,
706 tls_session_ticket_cb cb,
707 void *ctx)
708{
709#ifdef CONFIG_TLS_INTERNAL_CLIENT
710 if (conn->client) {
711 tlsv1_client_set_session_ticket_cb(conn->client, cb, ctx);
712 return 0;
713 }
714#endif /* CONFIG_TLS_INTERNAL_CLIENT */
715#ifdef CONFIG_TLS_INTERNAL_SERVER
716 if (conn->server) {
717 tlsv1_server_set_session_ticket_cb(conn->server, cb, ctx);
718 return 0;
719 }
720#endif /* CONFIG_TLS_INTERNAL_SERVER */
721 return -1;
722}
Dmitry Shmidtff787d52015-01-12 13:01:47 -0800723
724
725int tls_get_library_version(char *buf, size_t buf_len)
726{
727 return os_snprintf(buf, buf_len, "internal");
728}
Dmitry Shmidtd80a4012015-11-05 16:35:40 -0800729
730
731void tls_connection_set_success_data(struct tls_connection *conn,
732 struct wpabuf *data)
733{
734}
735
736
737void tls_connection_set_success_data_resumed(struct tls_connection *conn)
738{
739}
740
741
742const struct wpabuf *
743tls_connection_get_success_data(struct tls_connection *conn)
744{
745 return NULL;
746}
747
748
749void tls_connection_remove_session(struct tls_connection *conn)
750{
751}