Ashley Mills / axTLS
Embed: (wiki syntax)

« Back to documentation index

Show/hide line numbers ssl.h Source File

ssl.h

00001 /*
00002  * Copyright (c) 2007, Cameron Rich
00003  * 
00004  * All rights reserved.
00005  * 
00006  * Redistribution and use in source and binary forms, with or without 
00007  * modification, are permitted provided that the following conditions are met:
00008  *
00009  * * Redistributions of source code must retain the above copyright notice, 
00010  *   this list of conditions and the following disclaimer.
00011  * * Redistributions in binary form must reproduce the above copyright notice, 
00012  *   this list of conditions and the following disclaimer in the documentation 
00013  *   and/or other materials provided with the distribution.
00014  * * Neither the name of the axTLS project nor the names of its contributors 
00015  *   may be used to endorse or promote products derived from this software 
00016  *   without specific prior written permission.
00017  *
00018  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
00019  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
00020  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
00021  * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
00022  * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
00023  * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
00024  * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
00025  * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
00026  * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
00027  * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
00028  * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
00029  */
00030 
00031 /**
00032  * @mainpage axTLS API
00033  *
00034  * @image html axolotl.jpg
00035  *
00036  * The axTLS library has features such as:
00037  * - The TLSv1 SSL client/server protocol
00038  * - No requirement to use any openssl libraries.
00039  * - A choice between AES block (128/256 bit) and RC4 (128 bit) stream ciphers.
00040  * - RSA encryption/decryption with variable sized keys (up to 4096 bits).
00041  * - Certificate chaining and peer authentication.
00042  * - Session resumption, session renegotiation.
00043  * - ASN.1, X.509, PKCS#8, PKCS#12 keys/certificates with DER/PEM encoding.
00044  * - Highly configurable compile time options.
00045  * - Portable across many platforms (written in ANSI C), and has language
00046  * bindings in C, C#, VB.NET, Java, Perl and Lua.
00047  * - Partial openssl API compatibility (via a wrapper).
00048  * - A very small footprint (around 50-60kB for the library in 'server-only' 
00049  *   mode).
00050  * - No dependencies on sockets - can use serial connections for example.
00051  * - A very simple API - ~ 20 functions/methods.
00052  *
00053  * A list of these functions/methods are described below.
00054  *
00055  *  @ref c_api 
00056  *
00057  *  @ref bigint_api 
00058  *
00059  *  @ref csharp_api 
00060  *
00061  *  @ref java_api 
00062  */
00063 #ifndef HEADER_SSL_H
00064 #define HEADER_SSL_H
00065 
00066 #ifdef __cplusplus
00067 extern "C" {
00068 #endif
00069 
00070 #include <time.h>
00071 
00072 /* need to predefine before ssl_lib.h gets to it */
00073 #define SSL_SESSION_ID_SIZE                     32
00074 
00075 #include "tls1.h"
00076 
00077 /* The optional parameters that can be given to the client/server SSL engine */
00078 #define SSL_CLIENT_AUTHENTICATION               0x00010000
00079 #define SSL_SERVER_VERIFY_LATER                 0x00020000
00080 #define SSL_NO_DEFAULT_KEY                      0x00040000
00081 #define SSL_DISPLAY_STATES                      0x00080000
00082 #define SSL_DISPLAY_BYTES                       0x00100000
00083 #define SSL_DISPLAY_CERTS                       0x00200000
00084 #define SSL_DISPLAY_RSA                         0x00400000
00085 #define SSL_CONNECT_IN_PARTS                    0x00800000
00086 
00087 /* errors that can be generated */
00088 #define SSL_OK                                  0
00089 #define SSL_NOT_OK                              -1
00090 #define SSL_ERROR_DEAD                          -2
00091 #define SSL_CLOSE_NOTIFY                        -3
00092 #define SSL_ERROR_CONN_LOST                     -256
00093 #define SSL_ERROR_SOCK_SETUP_FAILURE            -258
00094 #define SSL_ERROR_INVALID_HANDSHAKE             -260
00095 #define SSL_ERROR_INVALID_PROT_MSG              -261
00096 #define SSL_ERROR_INVALID_HMAC                  -262
00097 #define SSL_ERROR_INVALID_VERSION               -263
00098 #define SSL_ERROR_INVALID_SESSION               -265
00099 #define SSL_ERROR_NO_CIPHER                     -266
00100 #define SSL_ERROR_BAD_CERTIFICATE               -268
00101 #define SSL_ERROR_INVALID_KEY                   -269
00102 #define SSL_ERROR_FINISHED_INVALID              -271
00103 #define SSL_ERROR_NO_CERT_DEFINED               -272
00104 #define SSL_ERROR_NO_CLIENT_RENOG               -273
00105 #define SSL_ERROR_NOT_SUPPORTED                 -274
00106 #define SSL_X509_OFFSET                         -512
00107 #define SSL_X509_ERROR(A)                       (SSL_X509_OFFSET+A)
00108 
00109 /* alert types that are recognized */
00110 #define SSL_ALERT_TYPE_WARNING                  1
00111 #define SLL_ALERT_TYPE_FATAL                    2
00112 
00113 /* these are all the alerts that are recognized */
00114 #define SSL_ALERT_CLOSE_NOTIFY                  0
00115 #define SSL_ALERT_UNEXPECTED_MESSAGE            10
00116 #define SSL_ALERT_BAD_RECORD_MAC                20
00117 #define SSL_ALERT_HANDSHAKE_FAILURE             40
00118 #define SSL_ALERT_BAD_CERTIFICATE               42
00119 #define SSL_ALERT_ILLEGAL_PARAMETER             47
00120 #define SSL_ALERT_DECODE_ERROR                  50
00121 #define SSL_ALERT_DECRYPT_ERROR                 51
00122 #define SSL_ALERT_INVALID_VERSION               70
00123 #define SSL_ALERT_NO_RENEGOTIATION              100
00124 
00125 /* The ciphers that are supported */
00126 #define SSL_AES128_SHA                          0x2f
00127 #define SSL_AES256_SHA                          0x35
00128 #define SSL_RC4_128_SHA                         0x05
00129 #define SSL_RC4_128_MD5                         0x04
00130 
00131 /* build mode ids' */
00132 #define SSL_BUILD_SKELETON_MODE                 0x01
00133 #define SSL_BUILD_SERVER_ONLY                   0x02
00134 #define SSL_BUILD_ENABLE_VERIFICATION           0x03
00135 #define SSL_BUILD_ENABLE_CLIENT                 0x04
00136 #define SSL_BUILD_FULL_MODE                     0x05
00137 
00138 /* offsets to retrieve configuration information */
00139 #define SSL_BUILD_MODE                          0
00140 #define SSL_MAX_CERT_CFG_OFFSET                 1
00141 #define SSL_MAX_CA_CERT_CFG_OFFSET              2
00142 #define SSL_HAS_PEM                             3
00143 
00144 /* default session sizes */
00145 #define SSL_DEFAULT_SVR_SESS                    5
00146 #define SSL_DEFAULT_CLNT_SESS                   1
00147 
00148 /* X.509/X.520 distinguished name types */
00149 #define SSL_X509_CERT_COMMON_NAME               0
00150 #define SSL_X509_CERT_ORGANIZATION              1
00151 #define SSL_X509_CERT_ORGANIZATIONAL_NAME       2
00152 #define SSL_X509_CA_CERT_COMMON_NAME            3
00153 #define SSL_X509_CA_CERT_ORGANIZATION           4
00154 #define SSL_X509_CA_CERT_ORGANIZATIONAL_NAME    5
00155 
00156 /* SSL object loader types */
00157 #define SSL_OBJ_X509_CERT                       1
00158 #define SSL_OBJ_X509_CACERT                     2
00159 #define SSL_OBJ_RSA_KEY                         3
00160 #define SSL_OBJ_PKCS8                           4
00161 #define SSL_OBJ_PKCS12                          5
00162 
00163 /**
00164  * @defgroup c_api Standard C API
00165  * @brief The standard interface in C.
00166  * @{
00167  */
00168 
00169 /**
00170  * @brief Establish a new client/server context.
00171  *
00172  * This function is called before any client/server SSL connections are made. 
00173  *
00174  * Each new connection will use the this context's private key and 
00175  * certificate chain. If a different certificate chain is required, then a 
00176  * different context needs to be be used.
00177  *
00178  * There are two threading models supported - a single thread with one
00179  * SSL_CTX can support any number of SSL connections - and multiple threads can 
00180  * support one SSL_CTX object each (the default). But if a single SSL_CTX 
00181  * object uses many SSL objects in individual threads, then the 
00182  * CONFIG_SSL_CTX_MUTEXING option needs to be configured.
00183  *
00184  * @param options [in]  Any particular options. At present the options
00185  * supported are:
00186  * - SSL_SERVER_VERIFY_LATER (client only): Don't stop a handshake if the server
00187  * authentication fails. The certificate can be authenticated later with a
00188  * call to ssl_verify_cert().
00189  * - SSL_CLIENT_AUTHENTICATION (server only): Enforce client authentication
00190  * i.e. each handshake will include a "certificate request" message from the
00191  * server. Only available if verification has been enabled.
00192  * - SSL_DISPLAY_BYTES (full mode build only): Display the byte sequences
00193  * during the handshake.
00194  * - SSL_DISPLAY_STATES (full mode build only): Display the state changes
00195  * during the handshake.
00196  * - SSL_DISPLAY_CERTS (full mode build only): Display the certificates that
00197  * are passed during a handshake.
00198  * - SSL_DISPLAY_RSA (full mode build only): Display the RSA key details that
00199  * are passed during a handshake.
00200  * - SSL_CONNECT_IN_PARTS (client only): To use a non-blocking version of 
00201  * ssl_client_new().
00202  * @param num_sessions [in] The number of sessions to be used for session
00203  * caching. If this value is 0, then there is no session caching. This option
00204  * is not used in skeleton mode.
00205  * @return A client/server context.
00206  */
00207 EXP_FUNC SSL_CTX * STDCALL ssl_ctx_new(uint32_t options, int num_sessions);
00208 
00209 /**
00210  * @brief Remove a client/server context.
00211  *
00212  * Frees any used resources used by this context. Each connection will be 
00213  * sent a "Close Notify" alert (if possible).
00214  * @param ssl_ctx [in] The client/server context.
00215  */
00216 EXP_FUNC void STDCALL ssl_ctx_free(SSL_CTX *ssl_ctx);
00217 
00218 /**
00219  * @brief (server only) Establish a new SSL connection to an SSL client.
00220  *
00221  * It is up to the application to establish the logical connection (whether it
00222  * is  a socket, serial connection etc).
00223  * @param ssl_ctx [in] The server context.
00224  * @param client_fd [in] The client's file descriptor. 
00225  * @return An SSL object reference.
00226  */
00227 EXP_FUNC SSL * STDCALL ssl_server_new(SSL_CTX *ssl_ctx, int client_fd);
00228 
00229 /**
00230  * @brief (client only) Establish a new SSL connection to an SSL server.
00231  *
00232  * It is up to the application to establish the initial logical connection 
00233  * (whether it is  a socket, serial connection etc).
00234  *
00235  * This is a normally a blocking call - it will finish when the handshake is 
00236  * complete (or has failed). To use in non-blocking mode, set 
00237  * SSL_CONNECT_IN_PARTS in ssl_ctx_new().
00238  * @param ssl_ctx [in] The client context.
00239  * @param client_fd [in] The client's file descriptor.
00240  * @param session_id [in] A 32 byte session id for session resumption. This 
00241  * can be null if no session resumption is being used or required. This option
00242  * is not used in skeleton mode.
00243  * @param sess_id_size The size of the session id (max 32)
00244  * @return An SSL object reference. Use ssl_handshake_status() to check 
00245  * if a handshake succeeded.
00246  */
00247 EXP_FUNC SSL * STDCALL ssl_client_new(SSL_CTX *ssl_ctx, int client_fd, const uint8_t *session_id, uint8_t sess_id_size);
00248 
00249 /**
00250  * @brief Free any used resources on this connection. 
00251  
00252  * A "Close Notify" message is sent on this connection (if possible). It is up 
00253  * to the application to close the socket or file descriptor.
00254  * @param ssl [in] The ssl object reference.
00255  */
00256 EXP_FUNC void STDCALL ssl_free(SSL *ssl);
00257 
00258 /**
00259  * @brief Read the SSL data stream.
00260  * If the socket is non-blocking and data is blocked then SSO_OK will be
00261  * returned.
00262  * @param ssl [in] An SSL object reference.
00263  * @param in_data [out] If the read was successful, a pointer to the read
00264  * buffer will be here. Do NOT ever free this memory as this buffer is used in
00265  * sucessive calls. If the call was unsuccessful, this value will be null.
00266  * @return The number of decrypted bytes:
00267  * - if > 0, then the handshaking is complete and we are returning the number 
00268  *   of decrypted bytes. 
00269  * - SSL_OK if the handshaking stage is successful (but not yet complete).  
00270  * - < 0 if an error.
00271  * @see ssl.h for the error code list.
00272  * @note Use in_data before doing any successive ssl calls.
00273  */
00274 EXP_FUNC int STDCALL ssl_read(SSL *ssl, uint8_t **in_data);
00275 
00276 /**
00277  * @brief Write to the SSL data stream. 
00278  * if the socket is non-blocking and data is blocked then a check is made
00279  * to ensure that all data is sent (i.e. blocked mode is forced).
00280  * @param ssl [in] An SSL obect reference.
00281  * @param out_data [in] The data to be written
00282  * @param out_len [in] The number of bytes to be written.
00283  * @return The number of bytes sent, or if < 0 if an error.
00284  * @see ssl.h for the error code list.
00285  */
00286 EXP_FUNC int STDCALL ssl_write(SSL *ssl, const uint8_t *out_data, int out_len);
00287 
00288 /**
00289  * @brief Find an ssl object based on a file descriptor.
00290  *
00291  * Goes through the list of SSL objects maintained in a client/server context
00292  * to look for a file descriptor match.
00293  * @param ssl_ctx [in] The client/server context.
00294  * @param client_fd [in]  The file descriptor.
00295  * @return A reference to the SSL object. Returns null if the object could not 
00296  * be found.
00297  */
00298 EXP_FUNC SSL * STDCALL ssl_find(SSL_CTX *ssl_ctx, int client_fd);
00299 
00300 /**
00301  * @brief Get the session id for a handshake. 
00302  * 
00303  * This will be a 32 byte sequence and is available after the first
00304  * handshaking messages are sent.
00305  * @param ssl [in] An SSL object reference.
00306  * @return The session id as a 32 byte sequence.
00307  * @note A SSLv23 handshake may have only 16 valid bytes.
00308  */
00309 EXP_FUNC const uint8_t * STDCALL ssl_get_session_id(const SSL *ssl);
00310 
00311 /**
00312  * @brief Get the session id size for a handshake. 
00313  * 
00314  * This will normally be 32 but could be 0 (no session id) or something else.
00315  * @param ssl [in] An SSL object reference.
00316  * @return The size of the session id.
00317  */
00318 EXP_FUNC uint8_t STDCALL ssl_get_session_id_size(const SSL *ssl);
00319 
00320 /**
00321  * @brief Return the cipher id (in the SSL form).
00322  * @param ssl [in] An SSL object reference.
00323  * @return The cipher id. This will be one of the following:
00324  * - SSL_AES128_SHA (0x2f)
00325  * - SSL_AES256_SHA (0x35)
00326  * - SSL_RC4_128_SHA (0x05)
00327  * - SSL_RC4_128_MD5 (0x04)
00328  */
00329 EXP_FUNC uint8_t STDCALL ssl_get_cipher_id(const SSL *ssl);
00330 
00331 /**
00332  * @brief Return the status of the handshake.
00333  * @param ssl [in] An SSL object reference.
00334  * @return SSL_OK if the handshake is complete and ok. 
00335  * @see ssl.h for the error code list.
00336  */
00337 EXP_FUNC int STDCALL ssl_handshake_status(const SSL *ssl);
00338 
00339 /**
00340  * @brief Retrieve various parameters about the axTLS engine.
00341  * @param offset [in] The configuration offset. It will be one of the following:
00342  * - SSL_BUILD_MODE The build mode. This will be one of the following:
00343  *   - SSL_BUILD_SERVER_ONLY            (basic server mode)
00344  *   - SSL_BUILD_ENABLE_VERIFICATION    (server can do client authentication)
00345  *   - SSL_BUILD_ENABLE_CLIENT          (client/server capabilties)
00346  *   - SSL_BUILD_FULL_MODE              (client/server with diagnostics)
00347  *   - SSL_BUILD_SKELETON_MODE          (skeleton mode)
00348  * - SSL_MAX_CERT_CFG_OFFSET The maximum number of certificates allowed.
00349  * - SSL_MAX_CA_CERT_CFG_OFFSET The maximum number of CA certificates allowed.
00350  * - SSL_HAS_PEM                        1 if supported
00351  * @return The value of the requested parameter.
00352  */
00353 EXP_FUNC int STDCALL ssl_get_config(int offset);
00354 
00355 /**
00356  * @brief Display why the handshake failed.
00357  *
00358  * This call is only useful in a 'full mode' build. The output is to stdout.
00359  * @param error_code [in] An error code.
00360  * @see ssl.h for the error code list.
00361  */
00362 EXP_FUNC void STDCALL ssl_display_error(int error_code);
00363 
00364 /**
00365  * @brief Authenticate a received certificate.
00366  * 
00367  * This call is usually made by a client after a handshake is complete and the
00368  * context is in SSL_SERVER_VERIFY_LATER mode.
00369  * @param ssl [in] An SSL object reference.
00370  * @return SSL_OK if the certificate is verified.
00371  */
00372 EXP_FUNC int STDCALL ssl_verify_cert(const SSL *ssl);
00373 
00374 /**
00375  * @brief Retrieve an X.509 distinguished name component.
00376  * 
00377  * When a handshake is complete and a certificate has been exchanged, then the
00378  * details of the remote certificate can be retrieved.
00379  *
00380  * This will usually be used by a client to check that the server's common 
00381  * name matches the URL.
00382  *
00383  * @param ssl [in] An SSL object reference.
00384  * @param component [in] one of:
00385  * - SSL_X509_CERT_COMMON_NAME
00386  * - SSL_X509_CERT_ORGANIZATION
00387  * - SSL_X509_CERT_ORGANIZATIONAL_NAME
00388  * - SSL_X509_CA_CERT_COMMON_NAME
00389  * - SSL_X509_CA_CERT_ORGANIZATION
00390  * - SSL_X509_CA_CERT_ORGANIZATIONAL_NAME
00391  * @return The appropriate string (or null if not defined)
00392  * @note Verification build mode must be enabled.
00393  */
00394 EXP_FUNC const char * STDCALL ssl_get_cert_dn(const SSL *ssl, int component);
00395 
00396 /**
00397  * @brief Retrieve a Subject Alternative DNSName
00398  *
00399  * When a handshake is complete and a certificate has been exchanged, then the
00400  * details of the remote certificate can be retrieved.
00401  *
00402  * This will usually be used by a client to check that the server's DNS  
00403  * name matches the URL.
00404  *
00405  * @param ssl [in] An SSL object reference.
00406  * @param dnsindex [in] The index of the DNS name to retrieve.
00407  * @return The appropriate string (or null if not defined)
00408  * @note Verification build mode must be enabled.
00409  */
00410 EXP_FUNC const char * STDCALL ssl_get_cert_subject_alt_dnsname(const SSL *ssl, int dnsindex);
00411 
00412 /**
00413  * @brief Force the client to perform its handshake again.
00414  *
00415  * For a client this involves sending another "client hello" message.
00416  * For the server is means sending a "hello request" message.
00417  *
00418  * This is a blocking call on the client (until the handshake completes).
00419  *
00420  * @param ssl [in] An SSL object reference.
00421  * @return SSL_OK if renegotiation instantiation was ok
00422  */
00423 EXP_FUNC int STDCALL ssl_renegotiate(SSL *ssl);
00424 
00425 /**
00426  * @brief Process a file that is in binary DER or ASCII PEM format.
00427  *
00428  * These are temporary objects that are used to load private keys,
00429  * certificates etc into memory.
00430  * @param ssl_ctx [in] The client/server context.
00431  * @param obj_type [in] The format of the file. Can be one of:
00432  * - SSL_OBJ_X509_CERT (no password required)
00433  * - SSL_OBJ_X509_CACERT (no password required)
00434  * - SSL_OBJ_RSA_KEY (AES128/AES256 PEM encryption supported)
00435  * - SSL_OBJ_PKCS8 (RC4-128 encrypted data supported)
00436  * - SSL_OBJ_PKCS12 (RC4-128 encrypted data supported)
00437  *
00438  * PEM files are automatically detected (if supported). The object type is
00439  * also detected, and so is not relevant for these types of files.
00440  * @param filename [in] The location of a file in DER/PEM format.
00441  * @param password [in] The password used. Can be null if not required.
00442  * @return SSL_OK if all ok
00443  * @note Not available in skeleton build mode.
00444  */
00445 EXP_FUNC int STDCALL ssl_obj_load(SSL_CTX *ssl_ctx, int obj_type, const char *filename, const char *password);
00446 
00447 /**
00448  * @brief Process binary data.
00449  *
00450  * These are temporary objects that are used to load private keys,
00451  * certificates etc into memory.
00452  * @param ssl_ctx [in] The client/server context.
00453  * @param obj_type [in] The format of the memory data.
00454  * @param data [in] The binary data to be loaded.
00455  * @param len [in] The amount of data to be loaded.
00456  * @param password [in] The password used. Can be null if not required.
00457  * @return SSL_OK if all ok
00458  * @see ssl_obj_load for more details on obj_type.
00459  */
00460 EXP_FUNC int STDCALL ssl_obj_memory_load(SSL_CTX *ssl_ctx, int obj_type, const uint8_t *data, int len, const char *password);
00461 
00462 #ifdef CONFIG_SSL_GENERATE_X509_CERT
00463 /**
00464  * @brief Create an X.509 certificate. 
00465  * 
00466  * This certificate is a self-signed v1 cert with a fixed start/stop validity 
00467  * times. It is signed with an internal private key in ssl_ctx.
00468  *
00469  * @param ssl_ctx [in] The client/server context.
00470  * @param options [in] Not used yet.
00471  * @param dn [in] An array of distinguished name strings. The array is defined
00472  * by:
00473  * - SSL_X509_CERT_COMMON_NAME (0)
00474  *      - If SSL_X509_CERT_COMMON_NAME is empty or not defined, then the 
00475  *        hostname will be used.
00476  * - SSL_X509_CERT_ORGANIZATION (1)
00477  *      - If SSL_X509_CERT_ORGANIZATION is empty or not defined, then $USERNAME 
00478  *        will be used.
00479  * - SSL_X509_CERT_ORGANIZATIONAL_NAME (2)
00480  *      - SSL_X509_CERT_ORGANIZATIONAL_NAME is optional.
00481  * @param cert_data [out] The certificate as a sequence of bytes.
00482  * @return < 0 if an error, or the size of the certificate in bytes.
00483  * @note cert_data must be freed when there is no more need for it.
00484  */
00485 EXP_FUNC int STDCALL ssl_x509_create(SSL_CTX *ssl_ctx, uint32_t options, const char * dn[], uint8_t **cert_data);
00486 #endif
00487 
00488 /**
00489  * @brief Return the axTLS library version as a string.
00490  */
00491 EXP_FUNC const char * STDCALL ssl_version(void);
00492 
00493 /** @} */
00494 
00495 #ifdef __cplusplus
00496 }
00497 #endif
00498 
00499 #endif