Important changes to repositories hosted on mbed.com
Mbed hosted mercurial repositories are deprecated and are due to be permanently deleted in July 2026.
To keep a copy of this software download the repository Zip archive or clone locally using Mercurial.
It is also possible to export all your personal repositories from the account settings page.
src/ssl.c@0:d92f9d21154c, 2015-06-26 (annotated)
- Committer:
- wolfSSL
- Date:
- Fri Jun 26 00:39:20 2015 +0000
- Revision:
- 0:d92f9d21154c
wolfSSL 3.6.0
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
wolfSSL | 0:d92f9d21154c | 1 | /* ssl.c |
wolfSSL | 0:d92f9d21154c | 2 | * |
wolfSSL | 0:d92f9d21154c | 3 | * Copyright (C) 2006-2015 wolfSSL Inc. |
wolfSSL | 0:d92f9d21154c | 4 | * |
wolfSSL | 0:d92f9d21154c | 5 | * This file is part of wolfSSL. (formerly known as CyaSSL) |
wolfSSL | 0:d92f9d21154c | 6 | * |
wolfSSL | 0:d92f9d21154c | 7 | * wolfSSL is free software; you can redistribute it and/or modify |
wolfSSL | 0:d92f9d21154c | 8 | * it under the terms of the GNU General Public License as published by |
wolfSSL | 0:d92f9d21154c | 9 | * the Free Software Foundation; either version 2 of the License, or |
wolfSSL | 0:d92f9d21154c | 10 | * (at your option) any later version. |
wolfSSL | 0:d92f9d21154c | 11 | * |
wolfSSL | 0:d92f9d21154c | 12 | * wolfSSL is distributed in the hope that it will be useful, |
wolfSSL | 0:d92f9d21154c | 13 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
wolfSSL | 0:d92f9d21154c | 14 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
wolfSSL | 0:d92f9d21154c | 15 | * GNU General Public License for more details. |
wolfSSL | 0:d92f9d21154c | 16 | * |
wolfSSL | 0:d92f9d21154c | 17 | * You should have received a copy of the GNU General Public License |
wolfSSL | 0:d92f9d21154c | 18 | * along with this program; if not, write to the Free Software |
wolfSSL | 0:d92f9d21154c | 19 | * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA |
wolfSSL | 0:d92f9d21154c | 20 | */ |
wolfSSL | 0:d92f9d21154c | 21 | |
wolfSSL | 0:d92f9d21154c | 22 | #ifdef HAVE_CONFIG_H |
wolfSSL | 0:d92f9d21154c | 23 | #include <config.h> |
wolfSSL | 0:d92f9d21154c | 24 | #endif |
wolfSSL | 0:d92f9d21154c | 25 | |
wolfSSL | 0:d92f9d21154c | 26 | #include <wolfssl/wolfcrypt/settings.h> |
wolfSSL | 0:d92f9d21154c | 27 | |
wolfSSL | 0:d92f9d21154c | 28 | #ifdef HAVE_ERRNO_H |
wolfSSL | 0:d92f9d21154c | 29 | #include <errno.h> |
wolfSSL | 0:d92f9d21154c | 30 | #endif |
wolfSSL | 0:d92f9d21154c | 31 | |
wolfSSL | 0:d92f9d21154c | 32 | #include <wolfssl/internal.h> |
wolfSSL | 0:d92f9d21154c | 33 | #include <wolfssl/error-ssl.h> |
wolfSSL | 0:d92f9d21154c | 34 | #include <wolfssl/wolfcrypt/coding.h> |
wolfSSL | 0:d92f9d21154c | 35 | |
wolfSSL | 0:d92f9d21154c | 36 | #if defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER) |
wolfSSL | 0:d92f9d21154c | 37 | #include <wolfssl/openssl/evp.h> |
wolfSSL | 0:d92f9d21154c | 38 | #endif |
wolfSSL | 0:d92f9d21154c | 39 | |
wolfSSL | 0:d92f9d21154c | 40 | #ifdef OPENSSL_EXTRA |
wolfSSL | 0:d92f9d21154c | 41 | /* openssl headers begin */ |
wolfSSL | 0:d92f9d21154c | 42 | #include <wolfssl/openssl/hmac.h> |
wolfSSL | 0:d92f9d21154c | 43 | #include <wolfssl/openssl/crypto.h> |
wolfSSL | 0:d92f9d21154c | 44 | #include <wolfssl/openssl/des.h> |
wolfSSL | 0:d92f9d21154c | 45 | #include <wolfssl/openssl/bn.h> |
wolfSSL | 0:d92f9d21154c | 46 | #include <wolfssl/openssl/dh.h> |
wolfSSL | 0:d92f9d21154c | 47 | #include <wolfssl/openssl/rsa.h> |
wolfSSL | 0:d92f9d21154c | 48 | #include <wolfssl/openssl/pem.h> |
wolfSSL | 0:d92f9d21154c | 49 | /* openssl headers end, wolfssl internal headers next */ |
wolfSSL | 0:d92f9d21154c | 50 | #include <wolfssl/wolfcrypt/hmac.h> |
wolfSSL | 0:d92f9d21154c | 51 | #include <wolfssl/wolfcrypt/random.h> |
wolfSSL | 0:d92f9d21154c | 52 | #include <wolfssl/wolfcrypt/des3.h> |
wolfSSL | 0:d92f9d21154c | 53 | #include <wolfssl/wolfcrypt/md4.h> |
wolfSSL | 0:d92f9d21154c | 54 | #include <wolfssl/wolfcrypt/md5.h> |
wolfSSL | 0:d92f9d21154c | 55 | #include <wolfssl/wolfcrypt/arc4.h> |
wolfSSL | 0:d92f9d21154c | 56 | #ifdef WOLFSSL_SHA512 |
wolfSSL | 0:d92f9d21154c | 57 | #include <wolfssl/wolfcrypt/sha512.h> |
wolfSSL | 0:d92f9d21154c | 58 | #endif |
wolfSSL | 0:d92f9d21154c | 59 | #endif |
wolfSSL | 0:d92f9d21154c | 60 | |
wolfSSL | 0:d92f9d21154c | 61 | #ifndef NO_FILESYSTEM |
wolfSSL | 0:d92f9d21154c | 62 | #if !defined(USE_WINDOWS_API) && !defined(NO_WOLFSSL_DIR) \ |
wolfSSL | 0:d92f9d21154c | 63 | && !defined(EBSNET) |
wolfSSL | 0:d92f9d21154c | 64 | #include <dirent.h> |
wolfSSL | 0:d92f9d21154c | 65 | #include <sys/stat.h> |
wolfSSL | 0:d92f9d21154c | 66 | #endif |
wolfSSL | 0:d92f9d21154c | 67 | #ifdef EBSNET |
wolfSSL | 0:d92f9d21154c | 68 | #include "vfapi.h" |
wolfSSL | 0:d92f9d21154c | 69 | #include "vfile.h" |
wolfSSL | 0:d92f9d21154c | 70 | #endif |
wolfSSL | 0:d92f9d21154c | 71 | #endif /* NO_FILESYSTEM */ |
wolfSSL | 0:d92f9d21154c | 72 | |
wolfSSL | 0:d92f9d21154c | 73 | #ifndef TRUE |
wolfSSL | 0:d92f9d21154c | 74 | #define TRUE 1 |
wolfSSL | 0:d92f9d21154c | 75 | #endif |
wolfSSL | 0:d92f9d21154c | 76 | #ifndef FALSE |
wolfSSL | 0:d92f9d21154c | 77 | #define FALSE 0 |
wolfSSL | 0:d92f9d21154c | 78 | #endif |
wolfSSL | 0:d92f9d21154c | 79 | |
wolfSSL | 0:d92f9d21154c | 80 | #ifndef WOLFSSL_HAVE_MIN |
wolfSSL | 0:d92f9d21154c | 81 | #define WOLFSSL_HAVE_MIN |
wolfSSL | 0:d92f9d21154c | 82 | |
wolfSSL | 0:d92f9d21154c | 83 | static INLINE word32 min(word32 a, word32 b) |
wolfSSL | 0:d92f9d21154c | 84 | { |
wolfSSL | 0:d92f9d21154c | 85 | return a > b ? b : a; |
wolfSSL | 0:d92f9d21154c | 86 | } |
wolfSSL | 0:d92f9d21154c | 87 | |
wolfSSL | 0:d92f9d21154c | 88 | #endif /* WOLFSSSL_HAVE_MIN */ |
wolfSSL | 0:d92f9d21154c | 89 | |
wolfSSL | 0:d92f9d21154c | 90 | #ifndef WOLFSSL_HAVE_MAX |
wolfSSL | 0:d92f9d21154c | 91 | #define WOLFSSL_HAVE_MAX |
wolfSSL | 0:d92f9d21154c | 92 | |
wolfSSL | 0:d92f9d21154c | 93 | #ifdef WOLFSSL_DTLS |
wolfSSL | 0:d92f9d21154c | 94 | static INLINE word32 max(word32 a, word32 b) |
wolfSSL | 0:d92f9d21154c | 95 | { |
wolfSSL | 0:d92f9d21154c | 96 | return a > b ? a : b; |
wolfSSL | 0:d92f9d21154c | 97 | } |
wolfSSL | 0:d92f9d21154c | 98 | #endif /* WOLFSSL_DTLS */ |
wolfSSL | 0:d92f9d21154c | 99 | |
wolfSSL | 0:d92f9d21154c | 100 | #endif /* WOLFSSL_HAVE_MAX */ |
wolfSSL | 0:d92f9d21154c | 101 | |
wolfSSL | 0:d92f9d21154c | 102 | |
wolfSSL | 0:d92f9d21154c | 103 | #ifndef WOLFSSL_LEANPSK |
wolfSSL | 0:d92f9d21154c | 104 | char* mystrnstr(const char* s1, const char* s2, unsigned int n) |
wolfSSL | 0:d92f9d21154c | 105 | { |
wolfSSL | 0:d92f9d21154c | 106 | unsigned int s2_len = (unsigned int)XSTRLEN(s2); |
wolfSSL | 0:d92f9d21154c | 107 | |
wolfSSL | 0:d92f9d21154c | 108 | if (s2_len == 0) |
wolfSSL | 0:d92f9d21154c | 109 | return (char*)s1; |
wolfSSL | 0:d92f9d21154c | 110 | |
wolfSSL | 0:d92f9d21154c | 111 | while (n >= s2_len && s1[0]) { |
wolfSSL | 0:d92f9d21154c | 112 | if (s1[0] == s2[0]) |
wolfSSL | 0:d92f9d21154c | 113 | if (XMEMCMP(s1, s2, s2_len) == 0) |
wolfSSL | 0:d92f9d21154c | 114 | return (char*)s1; |
wolfSSL | 0:d92f9d21154c | 115 | s1++; |
wolfSSL | 0:d92f9d21154c | 116 | n--; |
wolfSSL | 0:d92f9d21154c | 117 | } |
wolfSSL | 0:d92f9d21154c | 118 | |
wolfSSL | 0:d92f9d21154c | 119 | return NULL; |
wolfSSL | 0:d92f9d21154c | 120 | } |
wolfSSL | 0:d92f9d21154c | 121 | #endif |
wolfSSL | 0:d92f9d21154c | 122 | |
wolfSSL | 0:d92f9d21154c | 123 | |
wolfSSL | 0:d92f9d21154c | 124 | /* prevent multiple mutex initializations */ |
wolfSSL | 0:d92f9d21154c | 125 | static volatile int initRefCount = 0; |
wolfSSL | 0:d92f9d21154c | 126 | static wolfSSL_Mutex count_mutex; /* init ref count mutex */ |
wolfSSL | 0:d92f9d21154c | 127 | |
wolfSSL | 0:d92f9d21154c | 128 | |
wolfSSL | 0:d92f9d21154c | 129 | WOLFSSL_CTX* wolfSSL_CTX_new(WOLFSSL_METHOD* method) |
wolfSSL | 0:d92f9d21154c | 130 | { |
wolfSSL | 0:d92f9d21154c | 131 | WOLFSSL_CTX* ctx = NULL; |
wolfSSL | 0:d92f9d21154c | 132 | |
wolfSSL | 0:d92f9d21154c | 133 | WOLFSSL_ENTER("WOLFSSL_CTX_new"); |
wolfSSL | 0:d92f9d21154c | 134 | |
wolfSSL | 0:d92f9d21154c | 135 | if (initRefCount == 0) |
wolfSSL | 0:d92f9d21154c | 136 | wolfSSL_Init(); /* user no longer forced to call Init themselves */ |
wolfSSL | 0:d92f9d21154c | 137 | |
wolfSSL | 0:d92f9d21154c | 138 | if (method == NULL) |
wolfSSL | 0:d92f9d21154c | 139 | return ctx; |
wolfSSL | 0:d92f9d21154c | 140 | |
wolfSSL | 0:d92f9d21154c | 141 | ctx = (WOLFSSL_CTX*) XMALLOC(sizeof(WOLFSSL_CTX), 0, DYNAMIC_TYPE_CTX); |
wolfSSL | 0:d92f9d21154c | 142 | if (ctx) { |
wolfSSL | 0:d92f9d21154c | 143 | if (InitSSL_Ctx(ctx, method) < 0) { |
wolfSSL | 0:d92f9d21154c | 144 | WOLFSSL_MSG("Init CTX failed"); |
wolfSSL | 0:d92f9d21154c | 145 | wolfSSL_CTX_free(ctx); |
wolfSSL | 0:d92f9d21154c | 146 | ctx = NULL; |
wolfSSL | 0:d92f9d21154c | 147 | } |
wolfSSL | 0:d92f9d21154c | 148 | } |
wolfSSL | 0:d92f9d21154c | 149 | else { |
wolfSSL | 0:d92f9d21154c | 150 | WOLFSSL_MSG("Alloc CTX failed, method freed"); |
wolfSSL | 0:d92f9d21154c | 151 | XFREE(method, NULL, DYNAMIC_TYPE_METHOD); |
wolfSSL | 0:d92f9d21154c | 152 | } |
wolfSSL | 0:d92f9d21154c | 153 | |
wolfSSL | 0:d92f9d21154c | 154 | WOLFSSL_LEAVE("WOLFSSL_CTX_new", 0); |
wolfSSL | 0:d92f9d21154c | 155 | return ctx; |
wolfSSL | 0:d92f9d21154c | 156 | } |
wolfSSL | 0:d92f9d21154c | 157 | |
wolfSSL | 0:d92f9d21154c | 158 | |
wolfSSL | 0:d92f9d21154c | 159 | void wolfSSL_CTX_free(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 160 | { |
wolfSSL | 0:d92f9d21154c | 161 | WOLFSSL_ENTER("SSL_CTX_free"); |
wolfSSL | 0:d92f9d21154c | 162 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 163 | FreeSSL_Ctx(ctx); |
wolfSSL | 0:d92f9d21154c | 164 | WOLFSSL_LEAVE("SSL_CTX_free", 0); |
wolfSSL | 0:d92f9d21154c | 165 | } |
wolfSSL | 0:d92f9d21154c | 166 | |
wolfSSL | 0:d92f9d21154c | 167 | |
wolfSSL | 0:d92f9d21154c | 168 | WOLFSSL* wolfSSL_new(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 169 | { |
wolfSSL | 0:d92f9d21154c | 170 | WOLFSSL* ssl = NULL; |
wolfSSL | 0:d92f9d21154c | 171 | int ret = 0; |
wolfSSL | 0:d92f9d21154c | 172 | |
wolfSSL | 0:d92f9d21154c | 173 | (void)ret; |
wolfSSL | 0:d92f9d21154c | 174 | WOLFSSL_ENTER("SSL_new"); |
wolfSSL | 0:d92f9d21154c | 175 | |
wolfSSL | 0:d92f9d21154c | 176 | if (ctx == NULL) |
wolfSSL | 0:d92f9d21154c | 177 | return ssl; |
wolfSSL | 0:d92f9d21154c | 178 | |
wolfSSL | 0:d92f9d21154c | 179 | ssl = (WOLFSSL*) XMALLOC(sizeof(WOLFSSL), ctx->heap,DYNAMIC_TYPE_SSL); |
wolfSSL | 0:d92f9d21154c | 180 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 181 | if ( (ret = InitSSL(ssl, ctx)) < 0) { |
wolfSSL | 0:d92f9d21154c | 182 | FreeSSL(ssl); |
wolfSSL | 0:d92f9d21154c | 183 | ssl = 0; |
wolfSSL | 0:d92f9d21154c | 184 | } |
wolfSSL | 0:d92f9d21154c | 185 | |
wolfSSL | 0:d92f9d21154c | 186 | WOLFSSL_LEAVE("SSL_new", ret); |
wolfSSL | 0:d92f9d21154c | 187 | return ssl; |
wolfSSL | 0:d92f9d21154c | 188 | } |
wolfSSL | 0:d92f9d21154c | 189 | |
wolfSSL | 0:d92f9d21154c | 190 | |
wolfSSL | 0:d92f9d21154c | 191 | void wolfSSL_free(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 192 | { |
wolfSSL | 0:d92f9d21154c | 193 | WOLFSSL_ENTER("SSL_free"); |
wolfSSL | 0:d92f9d21154c | 194 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 195 | FreeSSL(ssl); |
wolfSSL | 0:d92f9d21154c | 196 | WOLFSSL_LEAVE("SSL_free", 0); |
wolfSSL | 0:d92f9d21154c | 197 | } |
wolfSSL | 0:d92f9d21154c | 198 | |
wolfSSL | 0:d92f9d21154c | 199 | #ifdef HAVE_POLY1305 |
wolfSSL | 0:d92f9d21154c | 200 | /* set if to use old poly 1 for yes 0 to use new poly */ |
wolfSSL | 0:d92f9d21154c | 201 | int wolfSSL_use_old_poly(WOLFSSL* ssl, int value) |
wolfSSL | 0:d92f9d21154c | 202 | { |
wolfSSL | 0:d92f9d21154c | 203 | WOLFSSL_ENTER("SSL_use_old_poly"); |
wolfSSL | 0:d92f9d21154c | 204 | ssl->options.oldPoly = value; |
wolfSSL | 0:d92f9d21154c | 205 | WOLFSSL_LEAVE("SSL_use_old_poly", 0); |
wolfSSL | 0:d92f9d21154c | 206 | return 0; |
wolfSSL | 0:d92f9d21154c | 207 | } |
wolfSSL | 0:d92f9d21154c | 208 | #endif |
wolfSSL | 0:d92f9d21154c | 209 | |
wolfSSL | 0:d92f9d21154c | 210 | int wolfSSL_set_fd(WOLFSSL* ssl, int fd) |
wolfSSL | 0:d92f9d21154c | 211 | { |
wolfSSL | 0:d92f9d21154c | 212 | WOLFSSL_ENTER("SSL_set_fd"); |
wolfSSL | 0:d92f9d21154c | 213 | ssl->rfd = fd; /* not used directly to allow IO callbacks */ |
wolfSSL | 0:d92f9d21154c | 214 | ssl->wfd = fd; |
wolfSSL | 0:d92f9d21154c | 215 | |
wolfSSL | 0:d92f9d21154c | 216 | ssl->IOCB_ReadCtx = &ssl->rfd; |
wolfSSL | 0:d92f9d21154c | 217 | ssl->IOCB_WriteCtx = &ssl->wfd; |
wolfSSL | 0:d92f9d21154c | 218 | |
wolfSSL | 0:d92f9d21154c | 219 | #ifdef WOLFSSL_DTLS |
wolfSSL | 0:d92f9d21154c | 220 | if (ssl->options.dtls) { |
wolfSSL | 0:d92f9d21154c | 221 | ssl->IOCB_ReadCtx = &ssl->buffers.dtlsCtx; |
wolfSSL | 0:d92f9d21154c | 222 | ssl->IOCB_WriteCtx = &ssl->buffers.dtlsCtx; |
wolfSSL | 0:d92f9d21154c | 223 | ssl->buffers.dtlsCtx.fd = fd; |
wolfSSL | 0:d92f9d21154c | 224 | } |
wolfSSL | 0:d92f9d21154c | 225 | #endif |
wolfSSL | 0:d92f9d21154c | 226 | |
wolfSSL | 0:d92f9d21154c | 227 | WOLFSSL_LEAVE("SSL_set_fd", SSL_SUCCESS); |
wolfSSL | 0:d92f9d21154c | 228 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 229 | } |
wolfSSL | 0:d92f9d21154c | 230 | |
wolfSSL | 0:d92f9d21154c | 231 | |
wolfSSL | 0:d92f9d21154c | 232 | /** |
wolfSSL | 0:d92f9d21154c | 233 | * Get the name of cipher at priotity level passed in. |
wolfSSL | 0:d92f9d21154c | 234 | */ |
wolfSSL | 0:d92f9d21154c | 235 | char* wolfSSL_get_cipher_list(int priority) |
wolfSSL | 0:d92f9d21154c | 236 | { |
wolfSSL | 0:d92f9d21154c | 237 | const char* const* ciphers = GetCipherNames(); |
wolfSSL | 0:d92f9d21154c | 238 | |
wolfSSL | 0:d92f9d21154c | 239 | if (priority >= GetCipherNamesSize() || priority < 0) { |
wolfSSL | 0:d92f9d21154c | 240 | return 0; |
wolfSSL | 0:d92f9d21154c | 241 | } |
wolfSSL | 0:d92f9d21154c | 242 | |
wolfSSL | 0:d92f9d21154c | 243 | return (char*)ciphers[priority]; |
wolfSSL | 0:d92f9d21154c | 244 | } |
wolfSSL | 0:d92f9d21154c | 245 | |
wolfSSL | 0:d92f9d21154c | 246 | |
wolfSSL | 0:d92f9d21154c | 247 | int wolfSSL_get_ciphers(char* buf, int len) |
wolfSSL | 0:d92f9d21154c | 248 | { |
wolfSSL | 0:d92f9d21154c | 249 | const char* const* ciphers = GetCipherNames(); |
wolfSSL | 0:d92f9d21154c | 250 | int totalInc = 0; |
wolfSSL | 0:d92f9d21154c | 251 | int step = 0; |
wolfSSL | 0:d92f9d21154c | 252 | char delim = ':'; |
wolfSSL | 0:d92f9d21154c | 253 | int size = GetCipherNamesSize(); |
wolfSSL | 0:d92f9d21154c | 254 | int i; |
wolfSSL | 0:d92f9d21154c | 255 | |
wolfSSL | 0:d92f9d21154c | 256 | if (buf == NULL || len <= 0) |
wolfSSL | 0:d92f9d21154c | 257 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 258 | |
wolfSSL | 0:d92f9d21154c | 259 | /* Add each member to the buffer delimitted by a : */ |
wolfSSL | 0:d92f9d21154c | 260 | for (i = 0; i < size; i++) { |
wolfSSL | 0:d92f9d21154c | 261 | step = (int)(XSTRLEN(ciphers[i]) + 1); /* delimiter */ |
wolfSSL | 0:d92f9d21154c | 262 | totalInc += step; |
wolfSSL | 0:d92f9d21154c | 263 | |
wolfSSL | 0:d92f9d21154c | 264 | /* Check to make sure buf is large enough and will not overflow */ |
wolfSSL | 0:d92f9d21154c | 265 | if (totalInc < len) { |
wolfSSL | 0:d92f9d21154c | 266 | XSTRNCPY(buf, ciphers[i], XSTRLEN(ciphers[i])); |
wolfSSL | 0:d92f9d21154c | 267 | buf += XSTRLEN(ciphers[i]); |
wolfSSL | 0:d92f9d21154c | 268 | |
wolfSSL | 0:d92f9d21154c | 269 | if (i < size - 1) |
wolfSSL | 0:d92f9d21154c | 270 | *buf++ = delim; |
wolfSSL | 0:d92f9d21154c | 271 | } |
wolfSSL | 0:d92f9d21154c | 272 | else |
wolfSSL | 0:d92f9d21154c | 273 | return BUFFER_E; |
wolfSSL | 0:d92f9d21154c | 274 | } |
wolfSSL | 0:d92f9d21154c | 275 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 276 | } |
wolfSSL | 0:d92f9d21154c | 277 | |
wolfSSL | 0:d92f9d21154c | 278 | |
wolfSSL | 0:d92f9d21154c | 279 | int wolfSSL_get_fd(const WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 280 | { |
wolfSSL | 0:d92f9d21154c | 281 | WOLFSSL_ENTER("SSL_get_fd"); |
wolfSSL | 0:d92f9d21154c | 282 | WOLFSSL_LEAVE("SSL_get_fd", ssl->rfd); |
wolfSSL | 0:d92f9d21154c | 283 | return ssl->rfd; |
wolfSSL | 0:d92f9d21154c | 284 | } |
wolfSSL | 0:d92f9d21154c | 285 | |
wolfSSL | 0:d92f9d21154c | 286 | |
wolfSSL | 0:d92f9d21154c | 287 | int wolfSSL_get_using_nonblock(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 288 | { |
wolfSSL | 0:d92f9d21154c | 289 | WOLFSSL_ENTER("wolfSSL_get_using_nonblock"); |
wolfSSL | 0:d92f9d21154c | 290 | WOLFSSL_LEAVE("wolfSSL_get_using_nonblock", ssl->options.usingNonblock); |
wolfSSL | 0:d92f9d21154c | 291 | return ssl->options.usingNonblock; |
wolfSSL | 0:d92f9d21154c | 292 | } |
wolfSSL | 0:d92f9d21154c | 293 | |
wolfSSL | 0:d92f9d21154c | 294 | |
wolfSSL | 0:d92f9d21154c | 295 | int wolfSSL_dtls(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 296 | { |
wolfSSL | 0:d92f9d21154c | 297 | return ssl->options.dtls; |
wolfSSL | 0:d92f9d21154c | 298 | } |
wolfSSL | 0:d92f9d21154c | 299 | |
wolfSSL | 0:d92f9d21154c | 300 | |
wolfSSL | 0:d92f9d21154c | 301 | #ifndef WOLFSSL_LEANPSK |
wolfSSL | 0:d92f9d21154c | 302 | void wolfSSL_set_using_nonblock(WOLFSSL* ssl, int nonblock) |
wolfSSL | 0:d92f9d21154c | 303 | { |
wolfSSL | 0:d92f9d21154c | 304 | WOLFSSL_ENTER("wolfSSL_set_using_nonblock"); |
wolfSSL | 0:d92f9d21154c | 305 | ssl->options.usingNonblock = (nonblock != 0); |
wolfSSL | 0:d92f9d21154c | 306 | } |
wolfSSL | 0:d92f9d21154c | 307 | |
wolfSSL | 0:d92f9d21154c | 308 | |
wolfSSL | 0:d92f9d21154c | 309 | int wolfSSL_dtls_set_peer(WOLFSSL* ssl, void* peer, unsigned int peerSz) |
wolfSSL | 0:d92f9d21154c | 310 | { |
wolfSSL | 0:d92f9d21154c | 311 | #ifdef WOLFSSL_DTLS |
wolfSSL | 0:d92f9d21154c | 312 | void* sa = (void*)XMALLOC(peerSz, ssl->heap, DYNAMIC_TYPE_SOCKADDR); |
wolfSSL | 0:d92f9d21154c | 313 | if (sa != NULL) { |
wolfSSL | 0:d92f9d21154c | 314 | if (ssl->buffers.dtlsCtx.peer.sa != NULL) |
wolfSSL | 0:d92f9d21154c | 315 | XFREE(ssl->buffers.dtlsCtx.peer.sa,ssl->heap,DYNAMIC_TYPE_SOCKADDR); |
wolfSSL | 0:d92f9d21154c | 316 | XMEMCPY(sa, peer, peerSz); |
wolfSSL | 0:d92f9d21154c | 317 | ssl->buffers.dtlsCtx.peer.sa = sa; |
wolfSSL | 0:d92f9d21154c | 318 | ssl->buffers.dtlsCtx.peer.sz = peerSz; |
wolfSSL | 0:d92f9d21154c | 319 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 320 | } |
wolfSSL | 0:d92f9d21154c | 321 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 322 | #else |
wolfSSL | 0:d92f9d21154c | 323 | (void)ssl; |
wolfSSL | 0:d92f9d21154c | 324 | (void)peer; |
wolfSSL | 0:d92f9d21154c | 325 | (void)peerSz; |
wolfSSL | 0:d92f9d21154c | 326 | return SSL_NOT_IMPLEMENTED; |
wolfSSL | 0:d92f9d21154c | 327 | #endif |
wolfSSL | 0:d92f9d21154c | 328 | } |
wolfSSL | 0:d92f9d21154c | 329 | |
wolfSSL | 0:d92f9d21154c | 330 | int wolfSSL_dtls_get_peer(WOLFSSL* ssl, void* peer, unsigned int* peerSz) |
wolfSSL | 0:d92f9d21154c | 331 | { |
wolfSSL | 0:d92f9d21154c | 332 | #ifdef WOLFSSL_DTLS |
wolfSSL | 0:d92f9d21154c | 333 | if (peer != NULL && peerSz != NULL |
wolfSSL | 0:d92f9d21154c | 334 | && *peerSz >= ssl->buffers.dtlsCtx.peer.sz) { |
wolfSSL | 0:d92f9d21154c | 335 | *peerSz = ssl->buffers.dtlsCtx.peer.sz; |
wolfSSL | 0:d92f9d21154c | 336 | XMEMCPY(peer, ssl->buffers.dtlsCtx.peer.sa, *peerSz); |
wolfSSL | 0:d92f9d21154c | 337 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 338 | } |
wolfSSL | 0:d92f9d21154c | 339 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 340 | #else |
wolfSSL | 0:d92f9d21154c | 341 | (void)ssl; |
wolfSSL | 0:d92f9d21154c | 342 | (void)peer; |
wolfSSL | 0:d92f9d21154c | 343 | (void)peerSz; |
wolfSSL | 0:d92f9d21154c | 344 | return SSL_NOT_IMPLEMENTED; |
wolfSSL | 0:d92f9d21154c | 345 | #endif |
wolfSSL | 0:d92f9d21154c | 346 | } |
wolfSSL | 0:d92f9d21154c | 347 | #endif /* WOLFSSL_LEANPSK */ |
wolfSSL | 0:d92f9d21154c | 348 | |
wolfSSL | 0:d92f9d21154c | 349 | |
wolfSSL | 0:d92f9d21154c | 350 | /* return underlyig connect or accept, SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 351 | int wolfSSL_negotiate(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 352 | { |
wolfSSL | 0:d92f9d21154c | 353 | int err = SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 354 | |
wolfSSL | 0:d92f9d21154c | 355 | WOLFSSL_ENTER("wolfSSL_negotiate"); |
wolfSSL | 0:d92f9d21154c | 356 | #ifndef NO_WOLFSSL_SERVER |
wolfSSL | 0:d92f9d21154c | 357 | if (ssl->options.side == WOLFSSL_SERVER_END) |
wolfSSL | 0:d92f9d21154c | 358 | err = wolfSSL_accept(ssl); |
wolfSSL | 0:d92f9d21154c | 359 | #endif |
wolfSSL | 0:d92f9d21154c | 360 | |
wolfSSL | 0:d92f9d21154c | 361 | #ifndef NO_WOLFSSL_CLIENT |
wolfSSL | 0:d92f9d21154c | 362 | if (ssl->options.side == WOLFSSL_CLIENT_END) |
wolfSSL | 0:d92f9d21154c | 363 | err = wolfSSL_connect(ssl); |
wolfSSL | 0:d92f9d21154c | 364 | #endif |
wolfSSL | 0:d92f9d21154c | 365 | |
wolfSSL | 0:d92f9d21154c | 366 | WOLFSSL_LEAVE("wolfSSL_negotiate", err); |
wolfSSL | 0:d92f9d21154c | 367 | |
wolfSSL | 0:d92f9d21154c | 368 | return err; |
wolfSSL | 0:d92f9d21154c | 369 | } |
wolfSSL | 0:d92f9d21154c | 370 | |
wolfSSL | 0:d92f9d21154c | 371 | |
wolfSSL | 0:d92f9d21154c | 372 | #ifndef WOLFSSL_LEANPSK |
wolfSSL | 0:d92f9d21154c | 373 | /* object size based on build */ |
wolfSSL | 0:d92f9d21154c | 374 | int wolfSSL_GetObjectSize(void) |
wolfSSL | 0:d92f9d21154c | 375 | { |
wolfSSL | 0:d92f9d21154c | 376 | #ifdef SHOW_SIZES |
wolfSSL | 0:d92f9d21154c | 377 | printf("sizeof suites = %lu\n", sizeof(Suites)); |
wolfSSL | 0:d92f9d21154c | 378 | printf("sizeof ciphers(2) = %lu\n", sizeof(Ciphers)); |
wolfSSL | 0:d92f9d21154c | 379 | #ifndef NO_RC4 |
wolfSSL | 0:d92f9d21154c | 380 | printf(" sizeof arc4 = %lu\n", sizeof(Arc4)); |
wolfSSL | 0:d92f9d21154c | 381 | #endif |
wolfSSL | 0:d92f9d21154c | 382 | printf(" sizeof aes = %lu\n", sizeof(Aes)); |
wolfSSL | 0:d92f9d21154c | 383 | #ifndef NO_DES3 |
wolfSSL | 0:d92f9d21154c | 384 | printf(" sizeof des3 = %lu\n", sizeof(Des3)); |
wolfSSL | 0:d92f9d21154c | 385 | #endif |
wolfSSL | 0:d92f9d21154c | 386 | #ifndef NO_RABBIT |
wolfSSL | 0:d92f9d21154c | 387 | printf(" sizeof rabbit = %lu\n", sizeof(Rabbit)); |
wolfSSL | 0:d92f9d21154c | 388 | #endif |
wolfSSL | 0:d92f9d21154c | 389 | #ifdef HAVE_CHACHA |
wolfSSL | 0:d92f9d21154c | 390 | printf(" sizeof chacha = %lu\n", sizeof(Chacha)); |
wolfSSL | 0:d92f9d21154c | 391 | #endif |
wolfSSL | 0:d92f9d21154c | 392 | printf("sizeof cipher specs = %lu\n", sizeof(CipherSpecs)); |
wolfSSL | 0:d92f9d21154c | 393 | printf("sizeof keys = %lu\n", sizeof(Keys)); |
wolfSSL | 0:d92f9d21154c | 394 | printf("sizeof Hashes(2) = %lu\n", sizeof(Hashes)); |
wolfSSL | 0:d92f9d21154c | 395 | #ifndef NO_MD5 |
wolfSSL | 0:d92f9d21154c | 396 | printf(" sizeof MD5 = %lu\n", sizeof(Md5)); |
wolfSSL | 0:d92f9d21154c | 397 | #endif |
wolfSSL | 0:d92f9d21154c | 398 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 399 | printf(" sizeof SHA = %lu\n", sizeof(Sha)); |
wolfSSL | 0:d92f9d21154c | 400 | #endif |
wolfSSL | 0:d92f9d21154c | 401 | #ifndef NO_SHA256 |
wolfSSL | 0:d92f9d21154c | 402 | printf(" sizeof SHA256 = %lu\n", sizeof(Sha256)); |
wolfSSL | 0:d92f9d21154c | 403 | #endif |
wolfSSL | 0:d92f9d21154c | 404 | #ifdef WOLFSSL_SHA384 |
wolfSSL | 0:d92f9d21154c | 405 | printf(" sizeof SHA384 = %lu\n", sizeof(Sha384)); |
wolfSSL | 0:d92f9d21154c | 406 | #endif |
wolfSSL | 0:d92f9d21154c | 407 | #ifdef WOLFSSL_SHA384 |
wolfSSL | 0:d92f9d21154c | 408 | printf(" sizeof SHA512 = %lu\n", sizeof(Sha512)); |
wolfSSL | 0:d92f9d21154c | 409 | #endif |
wolfSSL | 0:d92f9d21154c | 410 | printf("sizeof Buffers = %lu\n", sizeof(Buffers)); |
wolfSSL | 0:d92f9d21154c | 411 | printf("sizeof Options = %lu\n", sizeof(Options)); |
wolfSSL | 0:d92f9d21154c | 412 | printf("sizeof Arrays = %lu\n", sizeof(Arrays)); |
wolfSSL | 0:d92f9d21154c | 413 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 414 | printf("sizeof RsaKey = %lu\n", sizeof(RsaKey)); |
wolfSSL | 0:d92f9d21154c | 415 | #endif |
wolfSSL | 0:d92f9d21154c | 416 | #ifdef HAVE_ECC |
wolfSSL | 0:d92f9d21154c | 417 | printf("sizeof ecc_key = %lu\n", sizeof(ecc_key)); |
wolfSSL | 0:d92f9d21154c | 418 | #endif |
wolfSSL | 0:d92f9d21154c | 419 | printf("sizeof WOLFSSL_CIPHER = %lu\n", sizeof(WOLFSSL_CIPHER)); |
wolfSSL | 0:d92f9d21154c | 420 | printf("sizeof WOLFSSL_SESSION = %lu\n", sizeof(WOLFSSL_SESSION)); |
wolfSSL | 0:d92f9d21154c | 421 | printf("sizeof WOLFSSL = %lu\n", sizeof(WOLFSSL)); |
wolfSSL | 0:d92f9d21154c | 422 | printf("sizeof WOLFSSL_CTX = %lu\n", sizeof(WOLFSSL_CTX)); |
wolfSSL | 0:d92f9d21154c | 423 | #endif |
wolfSSL | 0:d92f9d21154c | 424 | |
wolfSSL | 0:d92f9d21154c | 425 | return sizeof(WOLFSSL); |
wolfSSL | 0:d92f9d21154c | 426 | } |
wolfSSL | 0:d92f9d21154c | 427 | #endif |
wolfSSL | 0:d92f9d21154c | 428 | |
wolfSSL | 0:d92f9d21154c | 429 | |
wolfSSL | 0:d92f9d21154c | 430 | #ifndef NO_DH |
wolfSSL | 0:d92f9d21154c | 431 | /* server Diffie-Hellman parameters, SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 432 | int wolfSSL_SetTmpDH(WOLFSSL* ssl, const unsigned char* p, int pSz, |
wolfSSL | 0:d92f9d21154c | 433 | const unsigned char* g, int gSz) |
wolfSSL | 0:d92f9d21154c | 434 | { |
wolfSSL | 0:d92f9d21154c | 435 | byte havePSK = 0; |
wolfSSL | 0:d92f9d21154c | 436 | byte haveRSA = 1; |
wolfSSL | 0:d92f9d21154c | 437 | |
wolfSSL | 0:d92f9d21154c | 438 | WOLFSSL_ENTER("wolfSSL_SetTmpDH"); |
wolfSSL | 0:d92f9d21154c | 439 | if (ssl == NULL || p == NULL || g == NULL) return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 440 | |
wolfSSL | 0:d92f9d21154c | 441 | if (pSz < ssl->options.minDhKeySz) |
wolfSSL | 0:d92f9d21154c | 442 | return DH_KEY_SIZE_E; |
wolfSSL | 0:d92f9d21154c | 443 | |
wolfSSL | 0:d92f9d21154c | 444 | if (ssl->options.side != WOLFSSL_SERVER_END) |
wolfSSL | 0:d92f9d21154c | 445 | return SIDE_ERROR; |
wolfSSL | 0:d92f9d21154c | 446 | |
wolfSSL | 0:d92f9d21154c | 447 | if (ssl->buffers.serverDH_P.buffer && ssl->buffers.weOwnDH) |
wolfSSL | 0:d92f9d21154c | 448 | XFREE(ssl->buffers.serverDH_P.buffer, ssl->ctx->heap, DYNAMIC_TYPE_DH); |
wolfSSL | 0:d92f9d21154c | 449 | if (ssl->buffers.serverDH_G.buffer && ssl->buffers.weOwnDH) |
wolfSSL | 0:d92f9d21154c | 450 | XFREE(ssl->buffers.serverDH_G.buffer, ssl->ctx->heap, DYNAMIC_TYPE_DH); |
wolfSSL | 0:d92f9d21154c | 451 | |
wolfSSL | 0:d92f9d21154c | 452 | ssl->buffers.weOwnDH = 1; /* SSL owns now */ |
wolfSSL | 0:d92f9d21154c | 453 | ssl->buffers.serverDH_P.buffer = (byte*)XMALLOC(pSz, ssl->ctx->heap, |
wolfSSL | 0:d92f9d21154c | 454 | DYNAMIC_TYPE_DH); |
wolfSSL | 0:d92f9d21154c | 455 | if (ssl->buffers.serverDH_P.buffer == NULL) |
wolfSSL | 0:d92f9d21154c | 456 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 457 | |
wolfSSL | 0:d92f9d21154c | 458 | ssl->buffers.serverDH_G.buffer = (byte*)XMALLOC(gSz, ssl->ctx->heap, |
wolfSSL | 0:d92f9d21154c | 459 | DYNAMIC_TYPE_DH); |
wolfSSL | 0:d92f9d21154c | 460 | if (ssl->buffers.serverDH_G.buffer == NULL) { |
wolfSSL | 0:d92f9d21154c | 461 | XFREE(ssl->buffers.serverDH_P.buffer, ssl->ctx->heap, DYNAMIC_TYPE_DH); |
wolfSSL | 0:d92f9d21154c | 462 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 463 | } |
wolfSSL | 0:d92f9d21154c | 464 | |
wolfSSL | 0:d92f9d21154c | 465 | ssl->buffers.serverDH_P.length = pSz; |
wolfSSL | 0:d92f9d21154c | 466 | ssl->buffers.serverDH_G.length = gSz; |
wolfSSL | 0:d92f9d21154c | 467 | |
wolfSSL | 0:d92f9d21154c | 468 | XMEMCPY(ssl->buffers.serverDH_P.buffer, p, pSz); |
wolfSSL | 0:d92f9d21154c | 469 | XMEMCPY(ssl->buffers.serverDH_G.buffer, g, gSz); |
wolfSSL | 0:d92f9d21154c | 470 | |
wolfSSL | 0:d92f9d21154c | 471 | ssl->options.haveDH = 1; |
wolfSSL | 0:d92f9d21154c | 472 | #ifndef NO_PSK |
wolfSSL | 0:d92f9d21154c | 473 | havePSK = ssl->options.havePSK; |
wolfSSL | 0:d92f9d21154c | 474 | #endif |
wolfSSL | 0:d92f9d21154c | 475 | #ifdef NO_RSA |
wolfSSL | 0:d92f9d21154c | 476 | haveRSA = 0; |
wolfSSL | 0:d92f9d21154c | 477 | #endif |
wolfSSL | 0:d92f9d21154c | 478 | InitSuites(ssl->suites, ssl->version, haveRSA, havePSK, ssl->options.haveDH, |
wolfSSL | 0:d92f9d21154c | 479 | ssl->options.haveNTRU, ssl->options.haveECDSAsig, |
wolfSSL | 0:d92f9d21154c | 480 | ssl->options.haveStaticECC, ssl->options.side); |
wolfSSL | 0:d92f9d21154c | 481 | |
wolfSSL | 0:d92f9d21154c | 482 | WOLFSSL_LEAVE("wolfSSL_SetTmpDH", 0); |
wolfSSL | 0:d92f9d21154c | 483 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 484 | } |
wolfSSL | 0:d92f9d21154c | 485 | |
wolfSSL | 0:d92f9d21154c | 486 | /* server ctx Diffie-Hellman parameters, SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 487 | int wolfSSL_CTX_SetTmpDH(WOLFSSL_CTX* ctx, const unsigned char* p, int pSz, |
wolfSSL | 0:d92f9d21154c | 488 | const unsigned char* g, int gSz) |
wolfSSL | 0:d92f9d21154c | 489 | { |
wolfSSL | 0:d92f9d21154c | 490 | WOLFSSL_ENTER("wolfSSL_CTX_SetTmpDH"); |
wolfSSL | 0:d92f9d21154c | 491 | if (ctx == NULL || p == NULL || g == NULL) return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 492 | |
wolfSSL | 0:d92f9d21154c | 493 | if (pSz < ctx->minDhKeySz) |
wolfSSL | 0:d92f9d21154c | 494 | return DH_KEY_SIZE_E; |
wolfSSL | 0:d92f9d21154c | 495 | |
wolfSSL | 0:d92f9d21154c | 496 | XFREE(ctx->serverDH_P.buffer, ctx->heap, DYNAMIC_TYPE_DH); |
wolfSSL | 0:d92f9d21154c | 497 | XFREE(ctx->serverDH_G.buffer, ctx->heap, DYNAMIC_TYPE_DH); |
wolfSSL | 0:d92f9d21154c | 498 | |
wolfSSL | 0:d92f9d21154c | 499 | ctx->serverDH_P.buffer = (byte*)XMALLOC(pSz, ctx->heap,DYNAMIC_TYPE_DH); |
wolfSSL | 0:d92f9d21154c | 500 | if (ctx->serverDH_P.buffer == NULL) |
wolfSSL | 0:d92f9d21154c | 501 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 502 | |
wolfSSL | 0:d92f9d21154c | 503 | ctx->serverDH_G.buffer = (byte*)XMALLOC(gSz, ctx->heap,DYNAMIC_TYPE_DH); |
wolfSSL | 0:d92f9d21154c | 504 | if (ctx->serverDH_G.buffer == NULL) { |
wolfSSL | 0:d92f9d21154c | 505 | XFREE(ctx->serverDH_P.buffer, ctx->heap, DYNAMIC_TYPE_DH); |
wolfSSL | 0:d92f9d21154c | 506 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 507 | } |
wolfSSL | 0:d92f9d21154c | 508 | |
wolfSSL | 0:d92f9d21154c | 509 | ctx->serverDH_P.length = pSz; |
wolfSSL | 0:d92f9d21154c | 510 | ctx->serverDH_G.length = gSz; |
wolfSSL | 0:d92f9d21154c | 511 | |
wolfSSL | 0:d92f9d21154c | 512 | XMEMCPY(ctx->serverDH_P.buffer, p, pSz); |
wolfSSL | 0:d92f9d21154c | 513 | XMEMCPY(ctx->serverDH_G.buffer, g, gSz); |
wolfSSL | 0:d92f9d21154c | 514 | |
wolfSSL | 0:d92f9d21154c | 515 | ctx->haveDH = 1; |
wolfSSL | 0:d92f9d21154c | 516 | |
wolfSSL | 0:d92f9d21154c | 517 | WOLFSSL_LEAVE("wolfSSL_CTX_SetTmpDH", 0); |
wolfSSL | 0:d92f9d21154c | 518 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 519 | } |
wolfSSL | 0:d92f9d21154c | 520 | |
wolfSSL | 0:d92f9d21154c | 521 | #endif /* !NO_DH */ |
wolfSSL | 0:d92f9d21154c | 522 | |
wolfSSL | 0:d92f9d21154c | 523 | |
wolfSSL | 0:d92f9d21154c | 524 | int wolfSSL_write(WOLFSSL* ssl, const void* data, int sz) |
wolfSSL | 0:d92f9d21154c | 525 | { |
wolfSSL | 0:d92f9d21154c | 526 | int ret; |
wolfSSL | 0:d92f9d21154c | 527 | |
wolfSSL | 0:d92f9d21154c | 528 | WOLFSSL_ENTER("SSL_write()"); |
wolfSSL | 0:d92f9d21154c | 529 | |
wolfSSL | 0:d92f9d21154c | 530 | if (ssl == NULL || data == NULL || sz < 0) |
wolfSSL | 0:d92f9d21154c | 531 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 532 | |
wolfSSL | 0:d92f9d21154c | 533 | #ifdef HAVE_ERRNO_H |
wolfSSL | 0:d92f9d21154c | 534 | errno = 0; |
wolfSSL | 0:d92f9d21154c | 535 | #endif |
wolfSSL | 0:d92f9d21154c | 536 | |
wolfSSL | 0:d92f9d21154c | 537 | ret = SendData(ssl, data, sz); |
wolfSSL | 0:d92f9d21154c | 538 | |
wolfSSL | 0:d92f9d21154c | 539 | WOLFSSL_LEAVE("SSL_write()", ret); |
wolfSSL | 0:d92f9d21154c | 540 | |
wolfSSL | 0:d92f9d21154c | 541 | if (ret < 0) |
wolfSSL | 0:d92f9d21154c | 542 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 543 | else |
wolfSSL | 0:d92f9d21154c | 544 | return ret; |
wolfSSL | 0:d92f9d21154c | 545 | } |
wolfSSL | 0:d92f9d21154c | 546 | |
wolfSSL | 0:d92f9d21154c | 547 | |
wolfSSL | 0:d92f9d21154c | 548 | static int wolfSSL_read_internal(WOLFSSL* ssl, void* data, int sz, int peek) |
wolfSSL | 0:d92f9d21154c | 549 | { |
wolfSSL | 0:d92f9d21154c | 550 | int ret; |
wolfSSL | 0:d92f9d21154c | 551 | |
wolfSSL | 0:d92f9d21154c | 552 | WOLFSSL_ENTER("wolfSSL_read_internal()"); |
wolfSSL | 0:d92f9d21154c | 553 | |
wolfSSL | 0:d92f9d21154c | 554 | if (ssl == NULL || data == NULL || sz < 0) |
wolfSSL | 0:d92f9d21154c | 555 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 556 | |
wolfSSL | 0:d92f9d21154c | 557 | #ifdef HAVE_ERRNO_H |
wolfSSL | 0:d92f9d21154c | 558 | errno = 0; |
wolfSSL | 0:d92f9d21154c | 559 | #endif |
wolfSSL | 0:d92f9d21154c | 560 | #ifdef WOLFSSL_DTLS |
wolfSSL | 0:d92f9d21154c | 561 | if (ssl->options.dtls) |
wolfSSL | 0:d92f9d21154c | 562 | ssl->dtls_expected_rx = max(sz + 100, MAX_MTU); |
wolfSSL | 0:d92f9d21154c | 563 | #endif |
wolfSSL | 0:d92f9d21154c | 564 | |
wolfSSL | 0:d92f9d21154c | 565 | #ifdef HAVE_MAX_FRAGMENT |
wolfSSL | 0:d92f9d21154c | 566 | ret = ReceiveData(ssl, (byte*)data, |
wolfSSL | 0:d92f9d21154c | 567 | min(sz, min(ssl->max_fragment, OUTPUT_RECORD_SIZE)), peek); |
wolfSSL | 0:d92f9d21154c | 568 | #else |
wolfSSL | 0:d92f9d21154c | 569 | ret = ReceiveData(ssl, (byte*)data, min(sz, OUTPUT_RECORD_SIZE), peek); |
wolfSSL | 0:d92f9d21154c | 570 | #endif |
wolfSSL | 0:d92f9d21154c | 571 | |
wolfSSL | 0:d92f9d21154c | 572 | WOLFSSL_LEAVE("wolfSSL_read_internal()", ret); |
wolfSSL | 0:d92f9d21154c | 573 | |
wolfSSL | 0:d92f9d21154c | 574 | if (ret < 0) |
wolfSSL | 0:d92f9d21154c | 575 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 576 | else |
wolfSSL | 0:d92f9d21154c | 577 | return ret; |
wolfSSL | 0:d92f9d21154c | 578 | } |
wolfSSL | 0:d92f9d21154c | 579 | |
wolfSSL | 0:d92f9d21154c | 580 | |
wolfSSL | 0:d92f9d21154c | 581 | int wolfSSL_peek(WOLFSSL* ssl, void* data, int sz) |
wolfSSL | 0:d92f9d21154c | 582 | { |
wolfSSL | 0:d92f9d21154c | 583 | WOLFSSL_ENTER("wolfSSL_peek()"); |
wolfSSL | 0:d92f9d21154c | 584 | |
wolfSSL | 0:d92f9d21154c | 585 | return wolfSSL_read_internal(ssl, data, sz, TRUE); |
wolfSSL | 0:d92f9d21154c | 586 | } |
wolfSSL | 0:d92f9d21154c | 587 | |
wolfSSL | 0:d92f9d21154c | 588 | |
wolfSSL | 0:d92f9d21154c | 589 | int wolfSSL_read(WOLFSSL* ssl, void* data, int sz) |
wolfSSL | 0:d92f9d21154c | 590 | { |
wolfSSL | 0:d92f9d21154c | 591 | WOLFSSL_ENTER("wolfSSL_read()"); |
wolfSSL | 0:d92f9d21154c | 592 | |
wolfSSL | 0:d92f9d21154c | 593 | return wolfSSL_read_internal(ssl, data, sz, FALSE); |
wolfSSL | 0:d92f9d21154c | 594 | } |
wolfSSL | 0:d92f9d21154c | 595 | |
wolfSSL | 0:d92f9d21154c | 596 | |
wolfSSL | 0:d92f9d21154c | 597 | #ifdef HAVE_CAVIUM |
wolfSSL | 0:d92f9d21154c | 598 | |
wolfSSL | 0:d92f9d21154c | 599 | /* let's use cavium, SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 600 | int wolfSSL_UseCavium(WOLFSSL* ssl, int devId) |
wolfSSL | 0:d92f9d21154c | 601 | { |
wolfSSL | 0:d92f9d21154c | 602 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 603 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 604 | |
wolfSSL | 0:d92f9d21154c | 605 | ssl->devId = devId; |
wolfSSL | 0:d92f9d21154c | 606 | |
wolfSSL | 0:d92f9d21154c | 607 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 608 | } |
wolfSSL | 0:d92f9d21154c | 609 | |
wolfSSL | 0:d92f9d21154c | 610 | |
wolfSSL | 0:d92f9d21154c | 611 | /* let's use cavium, SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 612 | int wolfSSL_CTX_UseCavium(WOLFSSL_CTX* ctx, int devId) |
wolfSSL | 0:d92f9d21154c | 613 | { |
wolfSSL | 0:d92f9d21154c | 614 | if (ctx == NULL) |
wolfSSL | 0:d92f9d21154c | 615 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 616 | |
wolfSSL | 0:d92f9d21154c | 617 | ctx->devId = devId; |
wolfSSL | 0:d92f9d21154c | 618 | |
wolfSSL | 0:d92f9d21154c | 619 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 620 | } |
wolfSSL | 0:d92f9d21154c | 621 | |
wolfSSL | 0:d92f9d21154c | 622 | |
wolfSSL | 0:d92f9d21154c | 623 | #endif /* HAVE_CAVIUM */ |
wolfSSL | 0:d92f9d21154c | 624 | |
wolfSSL | 0:d92f9d21154c | 625 | #ifdef HAVE_SNI |
wolfSSL | 0:d92f9d21154c | 626 | |
wolfSSL | 0:d92f9d21154c | 627 | int wolfSSL_UseSNI(WOLFSSL* ssl, byte type, const void* data, word16 size) |
wolfSSL | 0:d92f9d21154c | 628 | { |
wolfSSL | 0:d92f9d21154c | 629 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 630 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 631 | |
wolfSSL | 0:d92f9d21154c | 632 | return TLSX_UseSNI(&ssl->extensions, type, data, size); |
wolfSSL | 0:d92f9d21154c | 633 | } |
wolfSSL | 0:d92f9d21154c | 634 | |
wolfSSL | 0:d92f9d21154c | 635 | int wolfSSL_CTX_UseSNI(WOLFSSL_CTX* ctx, byte type, const void* data, word16 size) |
wolfSSL | 0:d92f9d21154c | 636 | { |
wolfSSL | 0:d92f9d21154c | 637 | if (ctx == NULL) |
wolfSSL | 0:d92f9d21154c | 638 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 639 | |
wolfSSL | 0:d92f9d21154c | 640 | return TLSX_UseSNI(&ctx->extensions, type, data, size); |
wolfSSL | 0:d92f9d21154c | 641 | } |
wolfSSL | 0:d92f9d21154c | 642 | |
wolfSSL | 0:d92f9d21154c | 643 | #ifndef NO_WOLFSSL_SERVER |
wolfSSL | 0:d92f9d21154c | 644 | |
wolfSSL | 0:d92f9d21154c | 645 | void wolfSSL_SNI_SetOptions(WOLFSSL* ssl, byte type, byte options) |
wolfSSL | 0:d92f9d21154c | 646 | { |
wolfSSL | 0:d92f9d21154c | 647 | if (ssl && ssl->extensions) |
wolfSSL | 0:d92f9d21154c | 648 | TLSX_SNI_SetOptions(ssl->extensions, type, options); |
wolfSSL | 0:d92f9d21154c | 649 | } |
wolfSSL | 0:d92f9d21154c | 650 | |
wolfSSL | 0:d92f9d21154c | 651 | void wolfSSL_CTX_SNI_SetOptions(WOLFSSL_CTX* ctx, byte type, byte options) |
wolfSSL | 0:d92f9d21154c | 652 | { |
wolfSSL | 0:d92f9d21154c | 653 | if (ctx && ctx->extensions) |
wolfSSL | 0:d92f9d21154c | 654 | TLSX_SNI_SetOptions(ctx->extensions, type, options); |
wolfSSL | 0:d92f9d21154c | 655 | } |
wolfSSL | 0:d92f9d21154c | 656 | |
wolfSSL | 0:d92f9d21154c | 657 | byte wolfSSL_SNI_Status(WOLFSSL* ssl, byte type) |
wolfSSL | 0:d92f9d21154c | 658 | { |
wolfSSL | 0:d92f9d21154c | 659 | return TLSX_SNI_Status(ssl ? ssl->extensions : NULL, type); |
wolfSSL | 0:d92f9d21154c | 660 | } |
wolfSSL | 0:d92f9d21154c | 661 | |
wolfSSL | 0:d92f9d21154c | 662 | word16 wolfSSL_SNI_GetRequest(WOLFSSL* ssl, byte type, void** data) |
wolfSSL | 0:d92f9d21154c | 663 | { |
wolfSSL | 0:d92f9d21154c | 664 | if (data) |
wolfSSL | 0:d92f9d21154c | 665 | *data = NULL; |
wolfSSL | 0:d92f9d21154c | 666 | |
wolfSSL | 0:d92f9d21154c | 667 | if (ssl && ssl->extensions) |
wolfSSL | 0:d92f9d21154c | 668 | return TLSX_SNI_GetRequest(ssl->extensions, type, data); |
wolfSSL | 0:d92f9d21154c | 669 | |
wolfSSL | 0:d92f9d21154c | 670 | return 0; |
wolfSSL | 0:d92f9d21154c | 671 | } |
wolfSSL | 0:d92f9d21154c | 672 | |
wolfSSL | 0:d92f9d21154c | 673 | int wolfSSL_SNI_GetFromBuffer(const byte* clientHello, word32 helloSz, byte type, |
wolfSSL | 0:d92f9d21154c | 674 | byte* sni, word32* inOutSz) |
wolfSSL | 0:d92f9d21154c | 675 | { |
wolfSSL | 0:d92f9d21154c | 676 | if (clientHello && helloSz > 0 && sni && inOutSz && *inOutSz > 0) |
wolfSSL | 0:d92f9d21154c | 677 | return TLSX_SNI_GetFromBuffer(clientHello, helloSz, type, sni, inOutSz); |
wolfSSL | 0:d92f9d21154c | 678 | |
wolfSSL | 0:d92f9d21154c | 679 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 680 | } |
wolfSSL | 0:d92f9d21154c | 681 | |
wolfSSL | 0:d92f9d21154c | 682 | #endif /* NO_WOLFSSL_SERVER */ |
wolfSSL | 0:d92f9d21154c | 683 | |
wolfSSL | 0:d92f9d21154c | 684 | #endif /* HAVE_SNI */ |
wolfSSL | 0:d92f9d21154c | 685 | |
wolfSSL | 0:d92f9d21154c | 686 | |
wolfSSL | 0:d92f9d21154c | 687 | #ifdef HAVE_MAX_FRAGMENT |
wolfSSL | 0:d92f9d21154c | 688 | #ifndef NO_WOLFSSL_CLIENT |
wolfSSL | 0:d92f9d21154c | 689 | int wolfSSL_UseMaxFragment(WOLFSSL* ssl, byte mfl) |
wolfSSL | 0:d92f9d21154c | 690 | { |
wolfSSL | 0:d92f9d21154c | 691 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 692 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 693 | |
wolfSSL | 0:d92f9d21154c | 694 | return TLSX_UseMaxFragment(&ssl->extensions, mfl); |
wolfSSL | 0:d92f9d21154c | 695 | } |
wolfSSL | 0:d92f9d21154c | 696 | |
wolfSSL | 0:d92f9d21154c | 697 | int wolfSSL_CTX_UseMaxFragment(WOLFSSL_CTX* ctx, byte mfl) |
wolfSSL | 0:d92f9d21154c | 698 | { |
wolfSSL | 0:d92f9d21154c | 699 | if (ctx == NULL) |
wolfSSL | 0:d92f9d21154c | 700 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 701 | |
wolfSSL | 0:d92f9d21154c | 702 | return TLSX_UseMaxFragment(&ctx->extensions, mfl); |
wolfSSL | 0:d92f9d21154c | 703 | } |
wolfSSL | 0:d92f9d21154c | 704 | #endif /* NO_WOLFSSL_CLIENT */ |
wolfSSL | 0:d92f9d21154c | 705 | #endif /* HAVE_MAX_FRAGMENT */ |
wolfSSL | 0:d92f9d21154c | 706 | |
wolfSSL | 0:d92f9d21154c | 707 | #ifdef HAVE_TRUNCATED_HMAC |
wolfSSL | 0:d92f9d21154c | 708 | #ifndef NO_WOLFSSL_CLIENT |
wolfSSL | 0:d92f9d21154c | 709 | int wolfSSL_UseTruncatedHMAC(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 710 | { |
wolfSSL | 0:d92f9d21154c | 711 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 712 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 713 | |
wolfSSL | 0:d92f9d21154c | 714 | return TLSX_UseTruncatedHMAC(&ssl->extensions); |
wolfSSL | 0:d92f9d21154c | 715 | } |
wolfSSL | 0:d92f9d21154c | 716 | |
wolfSSL | 0:d92f9d21154c | 717 | int wolfSSL_CTX_UseTruncatedHMAC(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 718 | { |
wolfSSL | 0:d92f9d21154c | 719 | if (ctx == NULL) |
wolfSSL | 0:d92f9d21154c | 720 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 721 | |
wolfSSL | 0:d92f9d21154c | 722 | return TLSX_UseTruncatedHMAC(&ctx->extensions); |
wolfSSL | 0:d92f9d21154c | 723 | } |
wolfSSL | 0:d92f9d21154c | 724 | #endif /* NO_WOLFSSL_CLIENT */ |
wolfSSL | 0:d92f9d21154c | 725 | #endif /* HAVE_TRUNCATED_HMAC */ |
wolfSSL | 0:d92f9d21154c | 726 | |
wolfSSL | 0:d92f9d21154c | 727 | /* Elliptic Curves */ |
wolfSSL | 0:d92f9d21154c | 728 | #ifdef HAVE_SUPPORTED_CURVES |
wolfSSL | 0:d92f9d21154c | 729 | #ifndef NO_WOLFSSL_CLIENT |
wolfSSL | 0:d92f9d21154c | 730 | |
wolfSSL | 0:d92f9d21154c | 731 | int wolfSSL_UseSupportedCurve(WOLFSSL* ssl, word16 name) |
wolfSSL | 0:d92f9d21154c | 732 | { |
wolfSSL | 0:d92f9d21154c | 733 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 734 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 735 | |
wolfSSL | 0:d92f9d21154c | 736 | switch (name) { |
wolfSSL | 0:d92f9d21154c | 737 | case WOLFSSL_ECC_SECP160R1: |
wolfSSL | 0:d92f9d21154c | 738 | case WOLFSSL_ECC_SECP192R1: |
wolfSSL | 0:d92f9d21154c | 739 | case WOLFSSL_ECC_SECP224R1: |
wolfSSL | 0:d92f9d21154c | 740 | case WOLFSSL_ECC_SECP256R1: |
wolfSSL | 0:d92f9d21154c | 741 | case WOLFSSL_ECC_SECP384R1: |
wolfSSL | 0:d92f9d21154c | 742 | case WOLFSSL_ECC_SECP521R1: |
wolfSSL | 0:d92f9d21154c | 743 | break; |
wolfSSL | 0:d92f9d21154c | 744 | |
wolfSSL | 0:d92f9d21154c | 745 | default: |
wolfSSL | 0:d92f9d21154c | 746 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 747 | } |
wolfSSL | 0:d92f9d21154c | 748 | |
wolfSSL | 0:d92f9d21154c | 749 | return TLSX_UseSupportedCurve(&ssl->extensions, name); |
wolfSSL | 0:d92f9d21154c | 750 | } |
wolfSSL | 0:d92f9d21154c | 751 | |
wolfSSL | 0:d92f9d21154c | 752 | int wolfSSL_CTX_UseSupportedCurve(WOLFSSL_CTX* ctx, word16 name) |
wolfSSL | 0:d92f9d21154c | 753 | { |
wolfSSL | 0:d92f9d21154c | 754 | if (ctx == NULL) |
wolfSSL | 0:d92f9d21154c | 755 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 756 | |
wolfSSL | 0:d92f9d21154c | 757 | switch (name) { |
wolfSSL | 0:d92f9d21154c | 758 | case WOLFSSL_ECC_SECP160R1: |
wolfSSL | 0:d92f9d21154c | 759 | case WOLFSSL_ECC_SECP192R1: |
wolfSSL | 0:d92f9d21154c | 760 | case WOLFSSL_ECC_SECP224R1: |
wolfSSL | 0:d92f9d21154c | 761 | case WOLFSSL_ECC_SECP256R1: |
wolfSSL | 0:d92f9d21154c | 762 | case WOLFSSL_ECC_SECP384R1: |
wolfSSL | 0:d92f9d21154c | 763 | case WOLFSSL_ECC_SECP521R1: |
wolfSSL | 0:d92f9d21154c | 764 | break; |
wolfSSL | 0:d92f9d21154c | 765 | |
wolfSSL | 0:d92f9d21154c | 766 | default: |
wolfSSL | 0:d92f9d21154c | 767 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 768 | } |
wolfSSL | 0:d92f9d21154c | 769 | |
wolfSSL | 0:d92f9d21154c | 770 | return TLSX_UseSupportedCurve(&ctx->extensions, name); |
wolfSSL | 0:d92f9d21154c | 771 | } |
wolfSSL | 0:d92f9d21154c | 772 | |
wolfSSL | 0:d92f9d21154c | 773 | #endif /* NO_WOLFSSL_CLIENT */ |
wolfSSL | 0:d92f9d21154c | 774 | #endif /* HAVE_SUPPORTED_CURVES */ |
wolfSSL | 0:d92f9d21154c | 775 | |
wolfSSL | 0:d92f9d21154c | 776 | /* Secure Renegotiation */ |
wolfSSL | 0:d92f9d21154c | 777 | #ifdef HAVE_SECURE_RENEGOTIATION |
wolfSSL | 0:d92f9d21154c | 778 | |
wolfSSL | 0:d92f9d21154c | 779 | /* user is forcing ability to use secure renegotiation, we discourage it */ |
wolfSSL | 0:d92f9d21154c | 780 | int wolfSSL_UseSecureRenegotiation(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 781 | { |
wolfSSL | 0:d92f9d21154c | 782 | int ret = BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 783 | |
wolfSSL | 0:d92f9d21154c | 784 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 785 | ret = TLSX_UseSecureRenegotiation(&ssl->extensions); |
wolfSSL | 0:d92f9d21154c | 786 | |
wolfSSL | 0:d92f9d21154c | 787 | if (ret == SSL_SUCCESS) { |
wolfSSL | 0:d92f9d21154c | 788 | TLSX* extension = TLSX_Find(ssl->extensions, SECURE_RENEGOTIATION); |
wolfSSL | 0:d92f9d21154c | 789 | |
wolfSSL | 0:d92f9d21154c | 790 | if (extension) |
wolfSSL | 0:d92f9d21154c | 791 | ssl->secure_renegotiation = (SecureRenegotiation*)extension->data; |
wolfSSL | 0:d92f9d21154c | 792 | } |
wolfSSL | 0:d92f9d21154c | 793 | |
wolfSSL | 0:d92f9d21154c | 794 | return ret; |
wolfSSL | 0:d92f9d21154c | 795 | } |
wolfSSL | 0:d92f9d21154c | 796 | |
wolfSSL | 0:d92f9d21154c | 797 | |
wolfSSL | 0:d92f9d21154c | 798 | /* do a secure renegotiation handshake, user forced, we discourage */ |
wolfSSL | 0:d92f9d21154c | 799 | int wolfSSL_Rehandshake(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 800 | { |
wolfSSL | 0:d92f9d21154c | 801 | int ret; |
wolfSSL | 0:d92f9d21154c | 802 | |
wolfSSL | 0:d92f9d21154c | 803 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 804 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 805 | |
wolfSSL | 0:d92f9d21154c | 806 | if (ssl->secure_renegotiation == NULL) { |
wolfSSL | 0:d92f9d21154c | 807 | WOLFSSL_MSG("Secure Renegotiation not forced on by user"); |
wolfSSL | 0:d92f9d21154c | 808 | return SECURE_RENEGOTIATION_E; |
wolfSSL | 0:d92f9d21154c | 809 | } |
wolfSSL | 0:d92f9d21154c | 810 | |
wolfSSL | 0:d92f9d21154c | 811 | if (ssl->secure_renegotiation->enabled == 0) { |
wolfSSL | 0:d92f9d21154c | 812 | WOLFSSL_MSG("Secure Renegotiation not enabled at extension level"); |
wolfSSL | 0:d92f9d21154c | 813 | return SECURE_RENEGOTIATION_E; |
wolfSSL | 0:d92f9d21154c | 814 | } |
wolfSSL | 0:d92f9d21154c | 815 | |
wolfSSL | 0:d92f9d21154c | 816 | if (ssl->options.handShakeState != HANDSHAKE_DONE) { |
wolfSSL | 0:d92f9d21154c | 817 | WOLFSSL_MSG("Can't renegotiate until previous handshake complete"); |
wolfSSL | 0:d92f9d21154c | 818 | return SECURE_RENEGOTIATION_E; |
wolfSSL | 0:d92f9d21154c | 819 | } |
wolfSSL | 0:d92f9d21154c | 820 | |
wolfSSL | 0:d92f9d21154c | 821 | #ifndef NO_FORCE_SCR_SAME_SUITE |
wolfSSL | 0:d92f9d21154c | 822 | /* force same suite */ |
wolfSSL | 0:d92f9d21154c | 823 | if (ssl->suites) { |
wolfSSL | 0:d92f9d21154c | 824 | ssl->suites->suiteSz = SUITE_LEN; |
wolfSSL | 0:d92f9d21154c | 825 | ssl->suites->suites[0] = ssl->options.cipherSuite0; |
wolfSSL | 0:d92f9d21154c | 826 | ssl->suites->suites[1] = ssl->options.cipherSuite; |
wolfSSL | 0:d92f9d21154c | 827 | } |
wolfSSL | 0:d92f9d21154c | 828 | #endif |
wolfSSL | 0:d92f9d21154c | 829 | |
wolfSSL | 0:d92f9d21154c | 830 | /* reset handshake states */ |
wolfSSL | 0:d92f9d21154c | 831 | ssl->options.serverState = NULL_STATE; |
wolfSSL | 0:d92f9d21154c | 832 | ssl->options.clientState = NULL_STATE; |
wolfSSL | 0:d92f9d21154c | 833 | ssl->options.connectState = CONNECT_BEGIN; |
wolfSSL | 0:d92f9d21154c | 834 | ssl->options.acceptState = ACCEPT_BEGIN; |
wolfSSL | 0:d92f9d21154c | 835 | ssl->options.handShakeState = NULL_STATE; |
wolfSSL | 0:d92f9d21154c | 836 | ssl->options.processReply = 0; /* TODO, move states in internal.h */ |
wolfSSL | 0:d92f9d21154c | 837 | |
wolfSSL | 0:d92f9d21154c | 838 | XMEMSET(&ssl->msgsReceived, 0, sizeof(ssl->msgsReceived)); |
wolfSSL | 0:d92f9d21154c | 839 | |
wolfSSL | 0:d92f9d21154c | 840 | ssl->secure_renegotiation->cache_status = SCR_CACHE_NEEDED; |
wolfSSL | 0:d92f9d21154c | 841 | |
wolfSSL | 0:d92f9d21154c | 842 | #ifndef NO_OLD_TLS |
wolfSSL | 0:d92f9d21154c | 843 | #ifndef NO_MD5 |
wolfSSL | 0:d92f9d21154c | 844 | wc_InitMd5(&ssl->hsHashes->hashMd5); |
wolfSSL | 0:d92f9d21154c | 845 | #endif |
wolfSSL | 0:d92f9d21154c | 846 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 847 | ret = wc_InitSha(&ssl->hsHashes->hashSha); |
wolfSSL | 0:d92f9d21154c | 848 | if (ret !=0) |
wolfSSL | 0:d92f9d21154c | 849 | return ret; |
wolfSSL | 0:d92f9d21154c | 850 | #endif |
wolfSSL | 0:d92f9d21154c | 851 | #endif /* NO_OLD_TLS */ |
wolfSSL | 0:d92f9d21154c | 852 | #ifndef NO_SHA256 |
wolfSSL | 0:d92f9d21154c | 853 | ret = wc_InitSha256(&ssl->hsHashes->hashSha256); |
wolfSSL | 0:d92f9d21154c | 854 | if (ret !=0) |
wolfSSL | 0:d92f9d21154c | 855 | return ret; |
wolfSSL | 0:d92f9d21154c | 856 | #endif |
wolfSSL | 0:d92f9d21154c | 857 | #ifdef WOLFSSL_SHA384 |
wolfSSL | 0:d92f9d21154c | 858 | ret = wc_InitSha384(&ssl->hsHashes->hashSha384); |
wolfSSL | 0:d92f9d21154c | 859 | if (ret !=0) |
wolfSSL | 0:d92f9d21154c | 860 | return ret; |
wolfSSL | 0:d92f9d21154c | 861 | #endif |
wolfSSL | 0:d92f9d21154c | 862 | #ifdef WOLFSSL_SHA512 |
wolfSSL | 0:d92f9d21154c | 863 | ret = wc_InitSha512(&ssl->hsHashes->hashSha512); |
wolfSSL | 0:d92f9d21154c | 864 | if (ret !=0) |
wolfSSL | 0:d92f9d21154c | 865 | return ret; |
wolfSSL | 0:d92f9d21154c | 866 | #endif |
wolfSSL | 0:d92f9d21154c | 867 | |
wolfSSL | 0:d92f9d21154c | 868 | ret = wolfSSL_negotiate(ssl); |
wolfSSL | 0:d92f9d21154c | 869 | return ret; |
wolfSSL | 0:d92f9d21154c | 870 | } |
wolfSSL | 0:d92f9d21154c | 871 | |
wolfSSL | 0:d92f9d21154c | 872 | #endif /* HAVE_SECURE_RENEGOTIATION */ |
wolfSSL | 0:d92f9d21154c | 873 | |
wolfSSL | 0:d92f9d21154c | 874 | /* Session Ticket */ |
wolfSSL | 0:d92f9d21154c | 875 | #if !defined(NO_WOLFSSL_SERVER) && defined(HAVE_SESSION_TICKET) |
wolfSSL | 0:d92f9d21154c | 876 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 877 | int wolfSSL_CTX_set_TicketEncCb(WOLFSSL_CTX* ctx, SessionTicketEncCb cb) |
wolfSSL | 0:d92f9d21154c | 878 | { |
wolfSSL | 0:d92f9d21154c | 879 | if (ctx == NULL) |
wolfSSL | 0:d92f9d21154c | 880 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 881 | |
wolfSSL | 0:d92f9d21154c | 882 | ctx->ticketEncCb = cb; |
wolfSSL | 0:d92f9d21154c | 883 | |
wolfSSL | 0:d92f9d21154c | 884 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 885 | } |
wolfSSL | 0:d92f9d21154c | 886 | |
wolfSSL | 0:d92f9d21154c | 887 | /* set hint interval, SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 888 | int wolfSSL_CTX_set_TicketHint(WOLFSSL_CTX* ctx, int hint) |
wolfSSL | 0:d92f9d21154c | 889 | { |
wolfSSL | 0:d92f9d21154c | 890 | if (ctx == NULL) |
wolfSSL | 0:d92f9d21154c | 891 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 892 | |
wolfSSL | 0:d92f9d21154c | 893 | ctx->ticketHint = hint; |
wolfSSL | 0:d92f9d21154c | 894 | |
wolfSSL | 0:d92f9d21154c | 895 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 896 | } |
wolfSSL | 0:d92f9d21154c | 897 | |
wolfSSL | 0:d92f9d21154c | 898 | /* set user context, SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 899 | int wolfSSL_CTX_set_TicketEncCtx(WOLFSSL_CTX* ctx, void* userCtx) |
wolfSSL | 0:d92f9d21154c | 900 | { |
wolfSSL | 0:d92f9d21154c | 901 | if (ctx == NULL) |
wolfSSL | 0:d92f9d21154c | 902 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 903 | |
wolfSSL | 0:d92f9d21154c | 904 | ctx->ticketEncCtx = userCtx; |
wolfSSL | 0:d92f9d21154c | 905 | |
wolfSSL | 0:d92f9d21154c | 906 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 907 | } |
wolfSSL | 0:d92f9d21154c | 908 | |
wolfSSL | 0:d92f9d21154c | 909 | #endif /* !defined(NO_WOLFSSL_CLIENT) && defined(HAVE_SESSION_TICKET) */ |
wolfSSL | 0:d92f9d21154c | 910 | |
wolfSSL | 0:d92f9d21154c | 911 | /* Session Ticket */ |
wolfSSL | 0:d92f9d21154c | 912 | #if !defined(NO_WOLFSSL_CLIENT) && defined(HAVE_SESSION_TICKET) |
wolfSSL | 0:d92f9d21154c | 913 | int wolfSSL_UseSessionTicket(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 914 | { |
wolfSSL | 0:d92f9d21154c | 915 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 916 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 917 | |
wolfSSL | 0:d92f9d21154c | 918 | return TLSX_UseSessionTicket(&ssl->extensions, NULL); |
wolfSSL | 0:d92f9d21154c | 919 | } |
wolfSSL | 0:d92f9d21154c | 920 | |
wolfSSL | 0:d92f9d21154c | 921 | int wolfSSL_CTX_UseSessionTicket(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 922 | { |
wolfSSL | 0:d92f9d21154c | 923 | if (ctx == NULL) |
wolfSSL | 0:d92f9d21154c | 924 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 925 | |
wolfSSL | 0:d92f9d21154c | 926 | return TLSX_UseSessionTicket(&ctx->extensions, NULL); |
wolfSSL | 0:d92f9d21154c | 927 | } |
wolfSSL | 0:d92f9d21154c | 928 | |
wolfSSL | 0:d92f9d21154c | 929 | WOLFSSL_API int wolfSSL_get_SessionTicket(WOLFSSL* ssl, byte* buf, word32* bufSz) |
wolfSSL | 0:d92f9d21154c | 930 | { |
wolfSSL | 0:d92f9d21154c | 931 | if (ssl == NULL || buf == NULL || bufSz == NULL || *bufSz == 0) |
wolfSSL | 0:d92f9d21154c | 932 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 933 | |
wolfSSL | 0:d92f9d21154c | 934 | if (ssl->session.ticketLen <= *bufSz) { |
wolfSSL | 0:d92f9d21154c | 935 | XMEMCPY(buf, ssl->session.ticket, ssl->session.ticketLen); |
wolfSSL | 0:d92f9d21154c | 936 | *bufSz = ssl->session.ticketLen; |
wolfSSL | 0:d92f9d21154c | 937 | } |
wolfSSL | 0:d92f9d21154c | 938 | else |
wolfSSL | 0:d92f9d21154c | 939 | *bufSz = 0; |
wolfSSL | 0:d92f9d21154c | 940 | |
wolfSSL | 0:d92f9d21154c | 941 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 942 | } |
wolfSSL | 0:d92f9d21154c | 943 | |
wolfSSL | 0:d92f9d21154c | 944 | WOLFSSL_API int wolfSSL_set_SessionTicket(WOLFSSL* ssl, byte* buf, word32 bufSz) |
wolfSSL | 0:d92f9d21154c | 945 | { |
wolfSSL | 0:d92f9d21154c | 946 | if (ssl == NULL || (buf == NULL && bufSz > 0)) |
wolfSSL | 0:d92f9d21154c | 947 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 948 | |
wolfSSL | 0:d92f9d21154c | 949 | if (bufSz > 0) |
wolfSSL | 0:d92f9d21154c | 950 | XMEMCPY(ssl->session.ticket, buf, bufSz); |
wolfSSL | 0:d92f9d21154c | 951 | ssl->session.ticketLen = (word16)bufSz; |
wolfSSL | 0:d92f9d21154c | 952 | |
wolfSSL | 0:d92f9d21154c | 953 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 954 | } |
wolfSSL | 0:d92f9d21154c | 955 | |
wolfSSL | 0:d92f9d21154c | 956 | |
wolfSSL | 0:d92f9d21154c | 957 | WOLFSSL_API int wolfSSL_set_SessionTicket_cb(WOLFSSL* ssl, |
wolfSSL | 0:d92f9d21154c | 958 | CallbackSessionTicket cb, void* ctx) |
wolfSSL | 0:d92f9d21154c | 959 | { |
wolfSSL | 0:d92f9d21154c | 960 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 961 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 962 | |
wolfSSL | 0:d92f9d21154c | 963 | ssl->session_ticket_cb = cb; |
wolfSSL | 0:d92f9d21154c | 964 | ssl->session_ticket_ctx = ctx; |
wolfSSL | 0:d92f9d21154c | 965 | |
wolfSSL | 0:d92f9d21154c | 966 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 967 | } |
wolfSSL | 0:d92f9d21154c | 968 | #endif |
wolfSSL | 0:d92f9d21154c | 969 | |
wolfSSL | 0:d92f9d21154c | 970 | #ifndef WOLFSSL_LEANPSK |
wolfSSL | 0:d92f9d21154c | 971 | |
wolfSSL | 0:d92f9d21154c | 972 | int wolfSSL_send(WOLFSSL* ssl, const void* data, int sz, int flags) |
wolfSSL | 0:d92f9d21154c | 973 | { |
wolfSSL | 0:d92f9d21154c | 974 | int ret; |
wolfSSL | 0:d92f9d21154c | 975 | int oldFlags; |
wolfSSL | 0:d92f9d21154c | 976 | |
wolfSSL | 0:d92f9d21154c | 977 | WOLFSSL_ENTER("wolfSSL_send()"); |
wolfSSL | 0:d92f9d21154c | 978 | |
wolfSSL | 0:d92f9d21154c | 979 | if (ssl == NULL || data == NULL || sz < 0) |
wolfSSL | 0:d92f9d21154c | 980 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 981 | |
wolfSSL | 0:d92f9d21154c | 982 | oldFlags = ssl->wflags; |
wolfSSL | 0:d92f9d21154c | 983 | |
wolfSSL | 0:d92f9d21154c | 984 | ssl->wflags = flags; |
wolfSSL | 0:d92f9d21154c | 985 | ret = wolfSSL_write(ssl, data, sz); |
wolfSSL | 0:d92f9d21154c | 986 | ssl->wflags = oldFlags; |
wolfSSL | 0:d92f9d21154c | 987 | |
wolfSSL | 0:d92f9d21154c | 988 | WOLFSSL_LEAVE("wolfSSL_send()", ret); |
wolfSSL | 0:d92f9d21154c | 989 | |
wolfSSL | 0:d92f9d21154c | 990 | return ret; |
wolfSSL | 0:d92f9d21154c | 991 | } |
wolfSSL | 0:d92f9d21154c | 992 | |
wolfSSL | 0:d92f9d21154c | 993 | |
wolfSSL | 0:d92f9d21154c | 994 | int wolfSSL_recv(WOLFSSL* ssl, void* data, int sz, int flags) |
wolfSSL | 0:d92f9d21154c | 995 | { |
wolfSSL | 0:d92f9d21154c | 996 | int ret; |
wolfSSL | 0:d92f9d21154c | 997 | int oldFlags; |
wolfSSL | 0:d92f9d21154c | 998 | |
wolfSSL | 0:d92f9d21154c | 999 | WOLFSSL_ENTER("wolfSSL_recv()"); |
wolfSSL | 0:d92f9d21154c | 1000 | |
wolfSSL | 0:d92f9d21154c | 1001 | if (ssl == NULL || data == NULL || sz < 0) |
wolfSSL | 0:d92f9d21154c | 1002 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1003 | |
wolfSSL | 0:d92f9d21154c | 1004 | oldFlags = ssl->rflags; |
wolfSSL | 0:d92f9d21154c | 1005 | |
wolfSSL | 0:d92f9d21154c | 1006 | ssl->rflags = flags; |
wolfSSL | 0:d92f9d21154c | 1007 | ret = wolfSSL_read(ssl, data, sz); |
wolfSSL | 0:d92f9d21154c | 1008 | ssl->rflags = oldFlags; |
wolfSSL | 0:d92f9d21154c | 1009 | |
wolfSSL | 0:d92f9d21154c | 1010 | WOLFSSL_LEAVE("wolfSSL_recv()", ret); |
wolfSSL | 0:d92f9d21154c | 1011 | |
wolfSSL | 0:d92f9d21154c | 1012 | return ret; |
wolfSSL | 0:d92f9d21154c | 1013 | } |
wolfSSL | 0:d92f9d21154c | 1014 | #endif |
wolfSSL | 0:d92f9d21154c | 1015 | |
wolfSSL | 0:d92f9d21154c | 1016 | |
wolfSSL | 0:d92f9d21154c | 1017 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 1018 | int wolfSSL_shutdown(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1019 | { |
wolfSSL | 0:d92f9d21154c | 1020 | int ret = SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 1021 | byte tmp; |
wolfSSL | 0:d92f9d21154c | 1022 | WOLFSSL_ENTER("SSL_shutdown()"); |
wolfSSL | 0:d92f9d21154c | 1023 | |
wolfSSL | 0:d92f9d21154c | 1024 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 1025 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 1026 | |
wolfSSL | 0:d92f9d21154c | 1027 | if (ssl->options.quietShutdown) { |
wolfSSL | 0:d92f9d21154c | 1028 | WOLFSSL_MSG("quiet shutdown, no close notify sent"); |
wolfSSL | 0:d92f9d21154c | 1029 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 1030 | } |
wolfSSL | 0:d92f9d21154c | 1031 | |
wolfSSL | 0:d92f9d21154c | 1032 | /* try to send close notify, not an error if can't */ |
wolfSSL | 0:d92f9d21154c | 1033 | if (!ssl->options.isClosed && !ssl->options.connReset && |
wolfSSL | 0:d92f9d21154c | 1034 | !ssl->options.sentNotify) { |
wolfSSL | 0:d92f9d21154c | 1035 | ssl->error = SendAlert(ssl, alert_warning, close_notify); |
wolfSSL | 0:d92f9d21154c | 1036 | if (ssl->error < 0) { |
wolfSSL | 0:d92f9d21154c | 1037 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 1038 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 1039 | } |
wolfSSL | 0:d92f9d21154c | 1040 | ssl->options.sentNotify = 1; /* don't send close_notify twice */ |
wolfSSL | 0:d92f9d21154c | 1041 | if (ssl->options.closeNotify) |
wolfSSL | 0:d92f9d21154c | 1042 | ret = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 1043 | else |
wolfSSL | 0:d92f9d21154c | 1044 | ret = SSL_SHUTDOWN_NOT_DONE; |
wolfSSL | 0:d92f9d21154c | 1045 | |
wolfSSL | 0:d92f9d21154c | 1046 | WOLFSSL_LEAVE("SSL_shutdown()", ret); |
wolfSSL | 0:d92f9d21154c | 1047 | return ret; |
wolfSSL | 0:d92f9d21154c | 1048 | } |
wolfSSL | 0:d92f9d21154c | 1049 | |
wolfSSL | 0:d92f9d21154c | 1050 | /* call wolfSSL_shutdown again for bidirectional shudown */ |
wolfSSL | 0:d92f9d21154c | 1051 | if (ssl->options.sentNotify && !ssl->options.closeNotify) { |
wolfSSL | 0:d92f9d21154c | 1052 | ret = wolfSSL_read(ssl, &tmp, 0); |
wolfSSL | 0:d92f9d21154c | 1053 | if (ret < 0) { |
wolfSSL | 0:d92f9d21154c | 1054 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 1055 | ret = SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 1056 | } else if (ssl->options.closeNotify) { |
wolfSSL | 0:d92f9d21154c | 1057 | ssl->error = SSL_ERROR_SYSCALL; /* simulate OpenSSL behavior */ |
wolfSSL | 0:d92f9d21154c | 1058 | ret = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 1059 | } |
wolfSSL | 0:d92f9d21154c | 1060 | } |
wolfSSL | 0:d92f9d21154c | 1061 | |
wolfSSL | 0:d92f9d21154c | 1062 | WOLFSSL_LEAVE("SSL_shutdown()", ret); |
wolfSSL | 0:d92f9d21154c | 1063 | |
wolfSSL | 0:d92f9d21154c | 1064 | return ret; |
wolfSSL | 0:d92f9d21154c | 1065 | } |
wolfSSL | 0:d92f9d21154c | 1066 | |
wolfSSL | 0:d92f9d21154c | 1067 | |
wolfSSL | 0:d92f9d21154c | 1068 | int wolfSSL_get_error(WOLFSSL* ssl, int ret) |
wolfSSL | 0:d92f9d21154c | 1069 | { |
wolfSSL | 0:d92f9d21154c | 1070 | WOLFSSL_ENTER("SSL_get_error"); |
wolfSSL | 0:d92f9d21154c | 1071 | |
wolfSSL | 0:d92f9d21154c | 1072 | if (ret > 0) |
wolfSSL | 0:d92f9d21154c | 1073 | return SSL_ERROR_NONE; |
wolfSSL | 0:d92f9d21154c | 1074 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 1075 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1076 | |
wolfSSL | 0:d92f9d21154c | 1077 | WOLFSSL_LEAVE("SSL_get_error", ssl->error); |
wolfSSL | 0:d92f9d21154c | 1078 | |
wolfSSL | 0:d92f9d21154c | 1079 | /* make sure converted types are handled in SetErrorString() too */ |
wolfSSL | 0:d92f9d21154c | 1080 | if (ssl->error == WANT_READ) |
wolfSSL | 0:d92f9d21154c | 1081 | return SSL_ERROR_WANT_READ; /* convert to OpenSSL type */ |
wolfSSL | 0:d92f9d21154c | 1082 | else if (ssl->error == WANT_WRITE) |
wolfSSL | 0:d92f9d21154c | 1083 | return SSL_ERROR_WANT_WRITE; /* convert to OpenSSL type */ |
wolfSSL | 0:d92f9d21154c | 1084 | else if (ssl->error == ZERO_RETURN) |
wolfSSL | 0:d92f9d21154c | 1085 | return SSL_ERROR_ZERO_RETURN; /* convert to OpenSSL type */ |
wolfSSL | 0:d92f9d21154c | 1086 | return ssl->error; |
wolfSSL | 0:d92f9d21154c | 1087 | } |
wolfSSL | 0:d92f9d21154c | 1088 | |
wolfSSL | 0:d92f9d21154c | 1089 | |
wolfSSL | 0:d92f9d21154c | 1090 | /* retrive alert history, SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 1091 | int wolfSSL_get_alert_history(WOLFSSL* ssl, WOLFSSL_ALERT_HISTORY *h) |
wolfSSL | 0:d92f9d21154c | 1092 | { |
wolfSSL | 0:d92f9d21154c | 1093 | if (ssl && h) { |
wolfSSL | 0:d92f9d21154c | 1094 | *h = ssl->alert_history; |
wolfSSL | 0:d92f9d21154c | 1095 | } |
wolfSSL | 0:d92f9d21154c | 1096 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 1097 | } |
wolfSSL | 0:d92f9d21154c | 1098 | |
wolfSSL | 0:d92f9d21154c | 1099 | |
wolfSSL | 0:d92f9d21154c | 1100 | /* return TRUE if current error is want read */ |
wolfSSL | 0:d92f9d21154c | 1101 | int wolfSSL_want_read(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1102 | { |
wolfSSL | 0:d92f9d21154c | 1103 | WOLFSSL_ENTER("SSL_want_read"); |
wolfSSL | 0:d92f9d21154c | 1104 | if (ssl->error == WANT_READ) |
wolfSSL | 0:d92f9d21154c | 1105 | return 1; |
wolfSSL | 0:d92f9d21154c | 1106 | |
wolfSSL | 0:d92f9d21154c | 1107 | return 0; |
wolfSSL | 0:d92f9d21154c | 1108 | } |
wolfSSL | 0:d92f9d21154c | 1109 | |
wolfSSL | 0:d92f9d21154c | 1110 | |
wolfSSL | 0:d92f9d21154c | 1111 | /* return TRUE if current error is want write */ |
wolfSSL | 0:d92f9d21154c | 1112 | int wolfSSL_want_write(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1113 | { |
wolfSSL | 0:d92f9d21154c | 1114 | WOLFSSL_ENTER("SSL_want_write"); |
wolfSSL | 0:d92f9d21154c | 1115 | if (ssl->error == WANT_WRITE) |
wolfSSL | 0:d92f9d21154c | 1116 | return 1; |
wolfSSL | 0:d92f9d21154c | 1117 | |
wolfSSL | 0:d92f9d21154c | 1118 | return 0; |
wolfSSL | 0:d92f9d21154c | 1119 | } |
wolfSSL | 0:d92f9d21154c | 1120 | |
wolfSSL | 0:d92f9d21154c | 1121 | |
wolfSSL | 0:d92f9d21154c | 1122 | char* wolfSSL_ERR_error_string(unsigned long errNumber, char* data) |
wolfSSL | 0:d92f9d21154c | 1123 | { |
wolfSSL | 0:d92f9d21154c | 1124 | static const char* msg = "Please supply a buffer for error string"; |
wolfSSL | 0:d92f9d21154c | 1125 | |
wolfSSL | 0:d92f9d21154c | 1126 | WOLFSSL_ENTER("ERR_error_string"); |
wolfSSL | 0:d92f9d21154c | 1127 | if (data) { |
wolfSSL | 0:d92f9d21154c | 1128 | SetErrorString((int)errNumber, data); |
wolfSSL | 0:d92f9d21154c | 1129 | return data; |
wolfSSL | 0:d92f9d21154c | 1130 | } |
wolfSSL | 0:d92f9d21154c | 1131 | |
wolfSSL | 0:d92f9d21154c | 1132 | return (char*)msg; |
wolfSSL | 0:d92f9d21154c | 1133 | } |
wolfSSL | 0:d92f9d21154c | 1134 | |
wolfSSL | 0:d92f9d21154c | 1135 | |
wolfSSL | 0:d92f9d21154c | 1136 | void wolfSSL_ERR_error_string_n(unsigned long e, char* buf, unsigned long len) |
wolfSSL | 0:d92f9d21154c | 1137 | { |
wolfSSL | 0:d92f9d21154c | 1138 | WOLFSSL_ENTER("wolfSSL_ERR_error_string_n"); |
wolfSSL | 0:d92f9d21154c | 1139 | if (len >= WOLFSSL_MAX_ERROR_SZ) |
wolfSSL | 0:d92f9d21154c | 1140 | wolfSSL_ERR_error_string(e, buf); |
wolfSSL | 0:d92f9d21154c | 1141 | else { |
wolfSSL | 0:d92f9d21154c | 1142 | char tmp[WOLFSSL_MAX_ERROR_SZ]; |
wolfSSL | 0:d92f9d21154c | 1143 | |
wolfSSL | 0:d92f9d21154c | 1144 | WOLFSSL_MSG("Error buffer too short, truncating"); |
wolfSSL | 0:d92f9d21154c | 1145 | if (len) { |
wolfSSL | 0:d92f9d21154c | 1146 | wolfSSL_ERR_error_string(e, tmp); |
wolfSSL | 0:d92f9d21154c | 1147 | XMEMCPY(buf, tmp, len-1); |
wolfSSL | 0:d92f9d21154c | 1148 | buf[len-1] = '\0'; |
wolfSSL | 0:d92f9d21154c | 1149 | } |
wolfSSL | 0:d92f9d21154c | 1150 | } |
wolfSSL | 0:d92f9d21154c | 1151 | } |
wolfSSL | 0:d92f9d21154c | 1152 | |
wolfSSL | 0:d92f9d21154c | 1153 | |
wolfSSL | 0:d92f9d21154c | 1154 | /* don't free temporary arrays at end of handshake */ |
wolfSSL | 0:d92f9d21154c | 1155 | void wolfSSL_KeepArrays(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1156 | { |
wolfSSL | 0:d92f9d21154c | 1157 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 1158 | ssl->options.saveArrays = 1; |
wolfSSL | 0:d92f9d21154c | 1159 | } |
wolfSSL | 0:d92f9d21154c | 1160 | |
wolfSSL | 0:d92f9d21154c | 1161 | |
wolfSSL | 0:d92f9d21154c | 1162 | /* user doesn't need temporary arrays anymore, Free */ |
wolfSSL | 0:d92f9d21154c | 1163 | void wolfSSL_FreeArrays(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1164 | { |
wolfSSL | 0:d92f9d21154c | 1165 | if (ssl && ssl->options.handShakeState == HANDSHAKE_DONE) { |
wolfSSL | 0:d92f9d21154c | 1166 | ssl->options.saveArrays = 0; |
wolfSSL | 0:d92f9d21154c | 1167 | FreeArrays(ssl, 1); |
wolfSSL | 0:d92f9d21154c | 1168 | } |
wolfSSL | 0:d92f9d21154c | 1169 | } |
wolfSSL | 0:d92f9d21154c | 1170 | |
wolfSSL | 0:d92f9d21154c | 1171 | |
wolfSSL | 0:d92f9d21154c | 1172 | const byte* wolfSSL_GetMacSecret(WOLFSSL* ssl, int verify) |
wolfSSL | 0:d92f9d21154c | 1173 | { |
wolfSSL | 0:d92f9d21154c | 1174 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 1175 | return NULL; |
wolfSSL | 0:d92f9d21154c | 1176 | |
wolfSSL | 0:d92f9d21154c | 1177 | if ( (ssl->options.side == WOLFSSL_CLIENT_END && !verify) || |
wolfSSL | 0:d92f9d21154c | 1178 | (ssl->options.side == WOLFSSL_SERVER_END && verify) ) |
wolfSSL | 0:d92f9d21154c | 1179 | return ssl->keys.client_write_MAC_secret; |
wolfSSL | 0:d92f9d21154c | 1180 | else |
wolfSSL | 0:d92f9d21154c | 1181 | return ssl->keys.server_write_MAC_secret; |
wolfSSL | 0:d92f9d21154c | 1182 | } |
wolfSSL | 0:d92f9d21154c | 1183 | |
wolfSSL | 0:d92f9d21154c | 1184 | |
wolfSSL | 0:d92f9d21154c | 1185 | #ifdef ATOMIC_USER |
wolfSSL | 0:d92f9d21154c | 1186 | |
wolfSSL | 0:d92f9d21154c | 1187 | void wolfSSL_CTX_SetMacEncryptCb(WOLFSSL_CTX* ctx, CallbackMacEncrypt cb) |
wolfSSL | 0:d92f9d21154c | 1188 | { |
wolfSSL | 0:d92f9d21154c | 1189 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 1190 | ctx->MacEncryptCb = cb; |
wolfSSL | 0:d92f9d21154c | 1191 | } |
wolfSSL | 0:d92f9d21154c | 1192 | |
wolfSSL | 0:d92f9d21154c | 1193 | |
wolfSSL | 0:d92f9d21154c | 1194 | void wolfSSL_SetMacEncryptCtx(WOLFSSL* ssl, void *ctx) |
wolfSSL | 0:d92f9d21154c | 1195 | { |
wolfSSL | 0:d92f9d21154c | 1196 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 1197 | ssl->MacEncryptCtx = ctx; |
wolfSSL | 0:d92f9d21154c | 1198 | } |
wolfSSL | 0:d92f9d21154c | 1199 | |
wolfSSL | 0:d92f9d21154c | 1200 | |
wolfSSL | 0:d92f9d21154c | 1201 | void* wolfSSL_GetMacEncryptCtx(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1202 | { |
wolfSSL | 0:d92f9d21154c | 1203 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 1204 | return ssl->MacEncryptCtx; |
wolfSSL | 0:d92f9d21154c | 1205 | |
wolfSSL | 0:d92f9d21154c | 1206 | return NULL; |
wolfSSL | 0:d92f9d21154c | 1207 | } |
wolfSSL | 0:d92f9d21154c | 1208 | |
wolfSSL | 0:d92f9d21154c | 1209 | |
wolfSSL | 0:d92f9d21154c | 1210 | void wolfSSL_CTX_SetDecryptVerifyCb(WOLFSSL_CTX* ctx, CallbackDecryptVerify cb) |
wolfSSL | 0:d92f9d21154c | 1211 | { |
wolfSSL | 0:d92f9d21154c | 1212 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 1213 | ctx->DecryptVerifyCb = cb; |
wolfSSL | 0:d92f9d21154c | 1214 | } |
wolfSSL | 0:d92f9d21154c | 1215 | |
wolfSSL | 0:d92f9d21154c | 1216 | |
wolfSSL | 0:d92f9d21154c | 1217 | void wolfSSL_SetDecryptVerifyCtx(WOLFSSL* ssl, void *ctx) |
wolfSSL | 0:d92f9d21154c | 1218 | { |
wolfSSL | 0:d92f9d21154c | 1219 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 1220 | ssl->DecryptVerifyCtx = ctx; |
wolfSSL | 0:d92f9d21154c | 1221 | } |
wolfSSL | 0:d92f9d21154c | 1222 | |
wolfSSL | 0:d92f9d21154c | 1223 | |
wolfSSL | 0:d92f9d21154c | 1224 | void* wolfSSL_GetDecryptVerifyCtx(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1225 | { |
wolfSSL | 0:d92f9d21154c | 1226 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 1227 | return ssl->DecryptVerifyCtx; |
wolfSSL | 0:d92f9d21154c | 1228 | |
wolfSSL | 0:d92f9d21154c | 1229 | return NULL; |
wolfSSL | 0:d92f9d21154c | 1230 | } |
wolfSSL | 0:d92f9d21154c | 1231 | |
wolfSSL | 0:d92f9d21154c | 1232 | |
wolfSSL | 0:d92f9d21154c | 1233 | const byte* wolfSSL_GetClientWriteKey(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1234 | { |
wolfSSL | 0:d92f9d21154c | 1235 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 1236 | return ssl->keys.client_write_key; |
wolfSSL | 0:d92f9d21154c | 1237 | |
wolfSSL | 0:d92f9d21154c | 1238 | return NULL; |
wolfSSL | 0:d92f9d21154c | 1239 | } |
wolfSSL | 0:d92f9d21154c | 1240 | |
wolfSSL | 0:d92f9d21154c | 1241 | |
wolfSSL | 0:d92f9d21154c | 1242 | const byte* wolfSSL_GetClientWriteIV(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1243 | { |
wolfSSL | 0:d92f9d21154c | 1244 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 1245 | return ssl->keys.client_write_IV; |
wolfSSL | 0:d92f9d21154c | 1246 | |
wolfSSL | 0:d92f9d21154c | 1247 | return NULL; |
wolfSSL | 0:d92f9d21154c | 1248 | } |
wolfSSL | 0:d92f9d21154c | 1249 | |
wolfSSL | 0:d92f9d21154c | 1250 | |
wolfSSL | 0:d92f9d21154c | 1251 | const byte* wolfSSL_GetServerWriteKey(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1252 | { |
wolfSSL | 0:d92f9d21154c | 1253 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 1254 | return ssl->keys.server_write_key; |
wolfSSL | 0:d92f9d21154c | 1255 | |
wolfSSL | 0:d92f9d21154c | 1256 | return NULL; |
wolfSSL | 0:d92f9d21154c | 1257 | } |
wolfSSL | 0:d92f9d21154c | 1258 | |
wolfSSL | 0:d92f9d21154c | 1259 | |
wolfSSL | 0:d92f9d21154c | 1260 | const byte* wolfSSL_GetServerWriteIV(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1261 | { |
wolfSSL | 0:d92f9d21154c | 1262 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 1263 | return ssl->keys.server_write_IV; |
wolfSSL | 0:d92f9d21154c | 1264 | |
wolfSSL | 0:d92f9d21154c | 1265 | return NULL; |
wolfSSL | 0:d92f9d21154c | 1266 | } |
wolfSSL | 0:d92f9d21154c | 1267 | |
wolfSSL | 0:d92f9d21154c | 1268 | |
wolfSSL | 0:d92f9d21154c | 1269 | int wolfSSL_GetKeySize(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1270 | { |
wolfSSL | 0:d92f9d21154c | 1271 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 1272 | return ssl->specs.key_size; |
wolfSSL | 0:d92f9d21154c | 1273 | |
wolfSSL | 0:d92f9d21154c | 1274 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1275 | } |
wolfSSL | 0:d92f9d21154c | 1276 | |
wolfSSL | 0:d92f9d21154c | 1277 | |
wolfSSL | 0:d92f9d21154c | 1278 | int wolfSSL_GetIVSize(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1279 | { |
wolfSSL | 0:d92f9d21154c | 1280 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 1281 | return ssl->specs.iv_size; |
wolfSSL | 0:d92f9d21154c | 1282 | |
wolfSSL | 0:d92f9d21154c | 1283 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1284 | } |
wolfSSL | 0:d92f9d21154c | 1285 | |
wolfSSL | 0:d92f9d21154c | 1286 | |
wolfSSL | 0:d92f9d21154c | 1287 | int wolfSSL_GetBulkCipher(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1288 | { |
wolfSSL | 0:d92f9d21154c | 1289 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 1290 | return ssl->specs.bulk_cipher_algorithm; |
wolfSSL | 0:d92f9d21154c | 1291 | |
wolfSSL | 0:d92f9d21154c | 1292 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1293 | } |
wolfSSL | 0:d92f9d21154c | 1294 | |
wolfSSL | 0:d92f9d21154c | 1295 | |
wolfSSL | 0:d92f9d21154c | 1296 | int wolfSSL_GetCipherType(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1297 | { |
wolfSSL | 0:d92f9d21154c | 1298 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 1299 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1300 | |
wolfSSL | 0:d92f9d21154c | 1301 | if (ssl->specs.cipher_type == block) |
wolfSSL | 0:d92f9d21154c | 1302 | return WOLFSSL_BLOCK_TYPE; |
wolfSSL | 0:d92f9d21154c | 1303 | if (ssl->specs.cipher_type == stream) |
wolfSSL | 0:d92f9d21154c | 1304 | return WOLFSSL_STREAM_TYPE; |
wolfSSL | 0:d92f9d21154c | 1305 | if (ssl->specs.cipher_type == aead) |
wolfSSL | 0:d92f9d21154c | 1306 | return WOLFSSL_AEAD_TYPE; |
wolfSSL | 0:d92f9d21154c | 1307 | |
wolfSSL | 0:d92f9d21154c | 1308 | return -1; |
wolfSSL | 0:d92f9d21154c | 1309 | } |
wolfSSL | 0:d92f9d21154c | 1310 | |
wolfSSL | 0:d92f9d21154c | 1311 | |
wolfSSL | 0:d92f9d21154c | 1312 | int wolfSSL_GetCipherBlockSize(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1313 | { |
wolfSSL | 0:d92f9d21154c | 1314 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 1315 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1316 | |
wolfSSL | 0:d92f9d21154c | 1317 | return ssl->specs.block_size; |
wolfSSL | 0:d92f9d21154c | 1318 | } |
wolfSSL | 0:d92f9d21154c | 1319 | |
wolfSSL | 0:d92f9d21154c | 1320 | |
wolfSSL | 0:d92f9d21154c | 1321 | int wolfSSL_GetAeadMacSize(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1322 | { |
wolfSSL | 0:d92f9d21154c | 1323 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 1324 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1325 | |
wolfSSL | 0:d92f9d21154c | 1326 | return ssl->specs.aead_mac_size; |
wolfSSL | 0:d92f9d21154c | 1327 | } |
wolfSSL | 0:d92f9d21154c | 1328 | |
wolfSSL | 0:d92f9d21154c | 1329 | |
wolfSSL | 0:d92f9d21154c | 1330 | int wolfSSL_IsTLSv1_1(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1331 | { |
wolfSSL | 0:d92f9d21154c | 1332 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 1333 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1334 | |
wolfSSL | 0:d92f9d21154c | 1335 | if (ssl->options.tls1_1) |
wolfSSL | 0:d92f9d21154c | 1336 | return 1; |
wolfSSL | 0:d92f9d21154c | 1337 | |
wolfSSL | 0:d92f9d21154c | 1338 | return 0; |
wolfSSL | 0:d92f9d21154c | 1339 | } |
wolfSSL | 0:d92f9d21154c | 1340 | |
wolfSSL | 0:d92f9d21154c | 1341 | |
wolfSSL | 0:d92f9d21154c | 1342 | int wolfSSL_GetSide(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1343 | { |
wolfSSL | 0:d92f9d21154c | 1344 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 1345 | return ssl->options.side; |
wolfSSL | 0:d92f9d21154c | 1346 | |
wolfSSL | 0:d92f9d21154c | 1347 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1348 | } |
wolfSSL | 0:d92f9d21154c | 1349 | |
wolfSSL | 0:d92f9d21154c | 1350 | |
wolfSSL | 0:d92f9d21154c | 1351 | int wolfSSL_GetHmacSize(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1352 | { |
wolfSSL | 0:d92f9d21154c | 1353 | /* AEAD ciphers don't have HMAC keys */ |
wolfSSL | 0:d92f9d21154c | 1354 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 1355 | return (ssl->specs.cipher_type != aead) ? ssl->specs.hash_size : 0; |
wolfSSL | 0:d92f9d21154c | 1356 | |
wolfSSL | 0:d92f9d21154c | 1357 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1358 | } |
wolfSSL | 0:d92f9d21154c | 1359 | |
wolfSSL | 0:d92f9d21154c | 1360 | #endif /* ATOMIC_USER */ |
wolfSSL | 0:d92f9d21154c | 1361 | |
wolfSSL | 0:d92f9d21154c | 1362 | #ifndef NO_CERTS |
wolfSSL | 0:d92f9d21154c | 1363 | |
wolfSSL | 0:d92f9d21154c | 1364 | WOLFSSL_CERT_MANAGER* wolfSSL_CertManagerNew(void) |
wolfSSL | 0:d92f9d21154c | 1365 | { |
wolfSSL | 0:d92f9d21154c | 1366 | WOLFSSL_CERT_MANAGER* cm = NULL; |
wolfSSL | 0:d92f9d21154c | 1367 | |
wolfSSL | 0:d92f9d21154c | 1368 | WOLFSSL_ENTER("wolfSSL_CertManagerNew"); |
wolfSSL | 0:d92f9d21154c | 1369 | |
wolfSSL | 0:d92f9d21154c | 1370 | cm = (WOLFSSL_CERT_MANAGER*) XMALLOC(sizeof(WOLFSSL_CERT_MANAGER), 0, |
wolfSSL | 0:d92f9d21154c | 1371 | DYNAMIC_TYPE_CERT_MANAGER); |
wolfSSL | 0:d92f9d21154c | 1372 | if (cm) { |
wolfSSL | 0:d92f9d21154c | 1373 | XMEMSET(cm, 0, sizeof(WOLFSSL_CERT_MANAGER)); |
wolfSSL | 0:d92f9d21154c | 1374 | |
wolfSSL | 0:d92f9d21154c | 1375 | if (InitMutex(&cm->caLock) != 0) { |
wolfSSL | 0:d92f9d21154c | 1376 | WOLFSSL_MSG("Bad mutex init"); |
wolfSSL | 0:d92f9d21154c | 1377 | wolfSSL_CertManagerFree(cm); |
wolfSSL | 0:d92f9d21154c | 1378 | return NULL; |
wolfSSL | 0:d92f9d21154c | 1379 | } |
wolfSSL | 0:d92f9d21154c | 1380 | } |
wolfSSL | 0:d92f9d21154c | 1381 | |
wolfSSL | 0:d92f9d21154c | 1382 | return cm; |
wolfSSL | 0:d92f9d21154c | 1383 | } |
wolfSSL | 0:d92f9d21154c | 1384 | |
wolfSSL | 0:d92f9d21154c | 1385 | |
wolfSSL | 0:d92f9d21154c | 1386 | void wolfSSL_CertManagerFree(WOLFSSL_CERT_MANAGER* cm) |
wolfSSL | 0:d92f9d21154c | 1387 | { |
wolfSSL | 0:d92f9d21154c | 1388 | WOLFSSL_ENTER("wolfSSL_CertManagerFree"); |
wolfSSL | 0:d92f9d21154c | 1389 | |
wolfSSL | 0:d92f9d21154c | 1390 | if (cm) { |
wolfSSL | 0:d92f9d21154c | 1391 | #ifdef HAVE_CRL |
wolfSSL | 0:d92f9d21154c | 1392 | if (cm->crl) |
wolfSSL | 0:d92f9d21154c | 1393 | FreeCRL(cm->crl, 1); |
wolfSSL | 0:d92f9d21154c | 1394 | #endif |
wolfSSL | 0:d92f9d21154c | 1395 | #ifdef HAVE_OCSP |
wolfSSL | 0:d92f9d21154c | 1396 | if (cm->ocsp) |
wolfSSL | 0:d92f9d21154c | 1397 | FreeOCSP(cm->ocsp, 1); |
wolfSSL | 0:d92f9d21154c | 1398 | #endif |
wolfSSL | 0:d92f9d21154c | 1399 | FreeSignerTable(cm->caTable, CA_TABLE_SIZE, NULL); |
wolfSSL | 0:d92f9d21154c | 1400 | FreeMutex(&cm->caLock); |
wolfSSL | 0:d92f9d21154c | 1401 | XFREE(cm, NULL, DYNAMIC_TYPE_CERT_MANAGER); |
wolfSSL | 0:d92f9d21154c | 1402 | } |
wolfSSL | 0:d92f9d21154c | 1403 | |
wolfSSL | 0:d92f9d21154c | 1404 | } |
wolfSSL | 0:d92f9d21154c | 1405 | |
wolfSSL | 0:d92f9d21154c | 1406 | |
wolfSSL | 0:d92f9d21154c | 1407 | /* Unload the CA signer list */ |
wolfSSL | 0:d92f9d21154c | 1408 | int wolfSSL_CertManagerUnloadCAs(WOLFSSL_CERT_MANAGER* cm) |
wolfSSL | 0:d92f9d21154c | 1409 | { |
wolfSSL | 0:d92f9d21154c | 1410 | WOLFSSL_ENTER("wolfSSL_CertManagerUnloadCAs"); |
wolfSSL | 0:d92f9d21154c | 1411 | |
wolfSSL | 0:d92f9d21154c | 1412 | if (cm == NULL) |
wolfSSL | 0:d92f9d21154c | 1413 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1414 | |
wolfSSL | 0:d92f9d21154c | 1415 | if (LockMutex(&cm->caLock) != 0) |
wolfSSL | 0:d92f9d21154c | 1416 | return BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 1417 | |
wolfSSL | 0:d92f9d21154c | 1418 | FreeSignerTable(cm->caTable, CA_TABLE_SIZE, NULL); |
wolfSSL | 0:d92f9d21154c | 1419 | |
wolfSSL | 0:d92f9d21154c | 1420 | UnLockMutex(&cm->caLock); |
wolfSSL | 0:d92f9d21154c | 1421 | |
wolfSSL | 0:d92f9d21154c | 1422 | |
wolfSSL | 0:d92f9d21154c | 1423 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 1424 | } |
wolfSSL | 0:d92f9d21154c | 1425 | |
wolfSSL | 0:d92f9d21154c | 1426 | |
wolfSSL | 0:d92f9d21154c | 1427 | /* Return bytes written to buff or < 0 for error */ |
wolfSSL | 0:d92f9d21154c | 1428 | int wolfSSL_CertPemToDer(const unsigned char* pem, int pemSz, |
wolfSSL | 0:d92f9d21154c | 1429 | unsigned char* buff, int buffSz, |
wolfSSL | 0:d92f9d21154c | 1430 | int type) |
wolfSSL | 0:d92f9d21154c | 1431 | { |
wolfSSL | 0:d92f9d21154c | 1432 | int eccKey = 0; |
wolfSSL | 0:d92f9d21154c | 1433 | int ret; |
wolfSSL | 0:d92f9d21154c | 1434 | buffer der; |
wolfSSL | 0:d92f9d21154c | 1435 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 1436 | EncryptedInfo* info = NULL; |
wolfSSL | 0:d92f9d21154c | 1437 | #else |
wolfSSL | 0:d92f9d21154c | 1438 | EncryptedInfo info[1]; |
wolfSSL | 0:d92f9d21154c | 1439 | #endif |
wolfSSL | 0:d92f9d21154c | 1440 | |
wolfSSL | 0:d92f9d21154c | 1441 | WOLFSSL_ENTER("wolfSSL_CertPemToDer"); |
wolfSSL | 0:d92f9d21154c | 1442 | |
wolfSSL | 0:d92f9d21154c | 1443 | if (pem == NULL || buff == NULL || buffSz <= 0) { |
wolfSSL | 0:d92f9d21154c | 1444 | WOLFSSL_MSG("Bad pem der args"); |
wolfSSL | 0:d92f9d21154c | 1445 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1446 | } |
wolfSSL | 0:d92f9d21154c | 1447 | |
wolfSSL | 0:d92f9d21154c | 1448 | if (type != CERT_TYPE && type != CA_TYPE && type != CERTREQ_TYPE) { |
wolfSSL | 0:d92f9d21154c | 1449 | WOLFSSL_MSG("Bad cert type"); |
wolfSSL | 0:d92f9d21154c | 1450 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1451 | } |
wolfSSL | 0:d92f9d21154c | 1452 | |
wolfSSL | 0:d92f9d21154c | 1453 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 1454 | info = (EncryptedInfo*)XMALLOC(sizeof(EncryptedInfo), NULL, |
wolfSSL | 0:d92f9d21154c | 1455 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 1456 | if (info == NULL) |
wolfSSL | 0:d92f9d21154c | 1457 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 1458 | #endif |
wolfSSL | 0:d92f9d21154c | 1459 | |
wolfSSL | 0:d92f9d21154c | 1460 | info->set = 0; |
wolfSSL | 0:d92f9d21154c | 1461 | info->ctx = NULL; |
wolfSSL | 0:d92f9d21154c | 1462 | info->consumed = 0; |
wolfSSL | 0:d92f9d21154c | 1463 | der.buffer = NULL; |
wolfSSL | 0:d92f9d21154c | 1464 | |
wolfSSL | 0:d92f9d21154c | 1465 | ret = PemToDer(pem, pemSz, type, &der, NULL, info, &eccKey); |
wolfSSL | 0:d92f9d21154c | 1466 | |
wolfSSL | 0:d92f9d21154c | 1467 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 1468 | XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 1469 | #endif |
wolfSSL | 0:d92f9d21154c | 1470 | |
wolfSSL | 0:d92f9d21154c | 1471 | if (ret < 0) { |
wolfSSL | 0:d92f9d21154c | 1472 | WOLFSSL_MSG("Bad Pem To Der"); |
wolfSSL | 0:d92f9d21154c | 1473 | } |
wolfSSL | 0:d92f9d21154c | 1474 | else { |
wolfSSL | 0:d92f9d21154c | 1475 | if (der.length <= (word32)buffSz) { |
wolfSSL | 0:d92f9d21154c | 1476 | XMEMCPY(buff, der.buffer, der.length); |
wolfSSL | 0:d92f9d21154c | 1477 | ret = der.length; |
wolfSSL | 0:d92f9d21154c | 1478 | } |
wolfSSL | 0:d92f9d21154c | 1479 | else { |
wolfSSL | 0:d92f9d21154c | 1480 | WOLFSSL_MSG("Bad der length"); |
wolfSSL | 0:d92f9d21154c | 1481 | ret = BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1482 | } |
wolfSSL | 0:d92f9d21154c | 1483 | } |
wolfSSL | 0:d92f9d21154c | 1484 | |
wolfSSL | 0:d92f9d21154c | 1485 | XFREE(der.buffer, NULL, DYNAMIC_TYPE_KEY); |
wolfSSL | 0:d92f9d21154c | 1486 | |
wolfSSL | 0:d92f9d21154c | 1487 | return ret; |
wolfSSL | 0:d92f9d21154c | 1488 | } |
wolfSSL | 0:d92f9d21154c | 1489 | |
wolfSSL | 0:d92f9d21154c | 1490 | |
wolfSSL | 0:d92f9d21154c | 1491 | #if defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER) |
wolfSSL | 0:d92f9d21154c | 1492 | |
wolfSSL | 0:d92f9d21154c | 1493 | /* our KeyPemToDer password callback, password in userData */ |
wolfSSL | 0:d92f9d21154c | 1494 | static INLINE int OurPasswordCb(char* passwd, int sz, int rw, void* userdata) |
wolfSSL | 0:d92f9d21154c | 1495 | { |
wolfSSL | 0:d92f9d21154c | 1496 | (void)rw; |
wolfSSL | 0:d92f9d21154c | 1497 | |
wolfSSL | 0:d92f9d21154c | 1498 | if (userdata == NULL) |
wolfSSL | 0:d92f9d21154c | 1499 | return 0; |
wolfSSL | 0:d92f9d21154c | 1500 | |
wolfSSL | 0:d92f9d21154c | 1501 | XSTRNCPY(passwd, (char*)userdata, sz); |
wolfSSL | 0:d92f9d21154c | 1502 | return min((word32)sz, (word32)XSTRLEN((char*)userdata)); |
wolfSSL | 0:d92f9d21154c | 1503 | } |
wolfSSL | 0:d92f9d21154c | 1504 | |
wolfSSL | 0:d92f9d21154c | 1505 | #endif /* OPENSSL_EXTRA || HAVE_WEBSERVER */ |
wolfSSL | 0:d92f9d21154c | 1506 | |
wolfSSL | 0:d92f9d21154c | 1507 | |
wolfSSL | 0:d92f9d21154c | 1508 | /* Return bytes written to buff or < 0 for error */ |
wolfSSL | 0:d92f9d21154c | 1509 | int wolfSSL_KeyPemToDer(const unsigned char* pem, int pemSz, unsigned char* buff, |
wolfSSL | 0:d92f9d21154c | 1510 | int buffSz, const char* pass) |
wolfSSL | 0:d92f9d21154c | 1511 | { |
wolfSSL | 0:d92f9d21154c | 1512 | int eccKey = 0; |
wolfSSL | 0:d92f9d21154c | 1513 | int ret; |
wolfSSL | 0:d92f9d21154c | 1514 | buffer der; |
wolfSSL | 0:d92f9d21154c | 1515 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 1516 | EncryptedInfo* info = NULL; |
wolfSSL | 0:d92f9d21154c | 1517 | #else |
wolfSSL | 0:d92f9d21154c | 1518 | EncryptedInfo info[1]; |
wolfSSL | 0:d92f9d21154c | 1519 | #endif |
wolfSSL | 0:d92f9d21154c | 1520 | |
wolfSSL | 0:d92f9d21154c | 1521 | (void)pass; |
wolfSSL | 0:d92f9d21154c | 1522 | |
wolfSSL | 0:d92f9d21154c | 1523 | WOLFSSL_ENTER("wolfSSL_KeyPemToDer"); |
wolfSSL | 0:d92f9d21154c | 1524 | |
wolfSSL | 0:d92f9d21154c | 1525 | if (pem == NULL || buff == NULL || buffSz <= 0) { |
wolfSSL | 0:d92f9d21154c | 1526 | WOLFSSL_MSG("Bad pem der args"); |
wolfSSL | 0:d92f9d21154c | 1527 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1528 | } |
wolfSSL | 0:d92f9d21154c | 1529 | |
wolfSSL | 0:d92f9d21154c | 1530 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 1531 | info = (EncryptedInfo*)XMALLOC(sizeof(EncryptedInfo), NULL, |
wolfSSL | 0:d92f9d21154c | 1532 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 1533 | if (info == NULL) |
wolfSSL | 0:d92f9d21154c | 1534 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 1535 | #endif |
wolfSSL | 0:d92f9d21154c | 1536 | |
wolfSSL | 0:d92f9d21154c | 1537 | info->set = 0; |
wolfSSL | 0:d92f9d21154c | 1538 | info->ctx = NULL; |
wolfSSL | 0:d92f9d21154c | 1539 | info->consumed = 0; |
wolfSSL | 0:d92f9d21154c | 1540 | der.buffer = NULL; |
wolfSSL | 0:d92f9d21154c | 1541 | |
wolfSSL | 0:d92f9d21154c | 1542 | #if defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER) |
wolfSSL | 0:d92f9d21154c | 1543 | if (pass) { |
wolfSSL | 0:d92f9d21154c | 1544 | info->ctx = wolfSSL_CTX_new(wolfSSLv23_client_method()); |
wolfSSL | 0:d92f9d21154c | 1545 | if (info->ctx == NULL) { |
wolfSSL | 0:d92f9d21154c | 1546 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 1547 | XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 1548 | #endif |
wolfSSL | 0:d92f9d21154c | 1549 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 1550 | } |
wolfSSL | 0:d92f9d21154c | 1551 | |
wolfSSL | 0:d92f9d21154c | 1552 | wolfSSL_CTX_set_default_passwd_cb(info->ctx, OurPasswordCb); |
wolfSSL | 0:d92f9d21154c | 1553 | wolfSSL_CTX_set_default_passwd_cb_userdata(info->ctx, (void*)pass); |
wolfSSL | 0:d92f9d21154c | 1554 | } |
wolfSSL | 0:d92f9d21154c | 1555 | #endif |
wolfSSL | 0:d92f9d21154c | 1556 | |
wolfSSL | 0:d92f9d21154c | 1557 | ret = PemToDer(pem, pemSz, PRIVATEKEY_TYPE, &der, NULL, info, &eccKey); |
wolfSSL | 0:d92f9d21154c | 1558 | |
wolfSSL | 0:d92f9d21154c | 1559 | if (info->ctx) |
wolfSSL | 0:d92f9d21154c | 1560 | wolfSSL_CTX_free(info->ctx); |
wolfSSL | 0:d92f9d21154c | 1561 | |
wolfSSL | 0:d92f9d21154c | 1562 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 1563 | XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 1564 | #endif |
wolfSSL | 0:d92f9d21154c | 1565 | |
wolfSSL | 0:d92f9d21154c | 1566 | if (ret < 0) { |
wolfSSL | 0:d92f9d21154c | 1567 | WOLFSSL_MSG("Bad Pem To Der"); |
wolfSSL | 0:d92f9d21154c | 1568 | } |
wolfSSL | 0:d92f9d21154c | 1569 | else { |
wolfSSL | 0:d92f9d21154c | 1570 | if (der.length <= (word32)buffSz) { |
wolfSSL | 0:d92f9d21154c | 1571 | XMEMCPY(buff, der.buffer, der.length); |
wolfSSL | 0:d92f9d21154c | 1572 | ret = der.length; |
wolfSSL | 0:d92f9d21154c | 1573 | } |
wolfSSL | 0:d92f9d21154c | 1574 | else { |
wolfSSL | 0:d92f9d21154c | 1575 | WOLFSSL_MSG("Bad der length"); |
wolfSSL | 0:d92f9d21154c | 1576 | ret = BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1577 | } |
wolfSSL | 0:d92f9d21154c | 1578 | } |
wolfSSL | 0:d92f9d21154c | 1579 | |
wolfSSL | 0:d92f9d21154c | 1580 | XFREE(der.buffer, NULL, DYNAMIC_TYPE_KEY); |
wolfSSL | 0:d92f9d21154c | 1581 | |
wolfSSL | 0:d92f9d21154c | 1582 | return ret; |
wolfSSL | 0:d92f9d21154c | 1583 | } |
wolfSSL | 0:d92f9d21154c | 1584 | |
wolfSSL | 0:d92f9d21154c | 1585 | |
wolfSSL | 0:d92f9d21154c | 1586 | #endif /* !NO_CERTS */ |
wolfSSL | 0:d92f9d21154c | 1587 | |
wolfSSL | 0:d92f9d21154c | 1588 | |
wolfSSL | 0:d92f9d21154c | 1589 | |
wolfSSL | 0:d92f9d21154c | 1590 | #if !defined(NO_FILESYSTEM) && !defined(NO_STDIO_FILESYSTEM) |
wolfSSL | 0:d92f9d21154c | 1591 | |
wolfSSL | 0:d92f9d21154c | 1592 | void wolfSSL_ERR_print_errors_fp(FILE* fp, int err) |
wolfSSL | 0:d92f9d21154c | 1593 | { |
wolfSSL | 0:d92f9d21154c | 1594 | char data[WOLFSSL_MAX_ERROR_SZ + 1]; |
wolfSSL | 0:d92f9d21154c | 1595 | |
wolfSSL | 0:d92f9d21154c | 1596 | WOLFSSL_ENTER("wolfSSL_ERR_print_errors_fp"); |
wolfSSL | 0:d92f9d21154c | 1597 | SetErrorString(err, data); |
wolfSSL | 0:d92f9d21154c | 1598 | fprintf(fp, "%s", data); |
wolfSSL | 0:d92f9d21154c | 1599 | } |
wolfSSL | 0:d92f9d21154c | 1600 | |
wolfSSL | 0:d92f9d21154c | 1601 | #endif |
wolfSSL | 0:d92f9d21154c | 1602 | |
wolfSSL | 0:d92f9d21154c | 1603 | |
wolfSSL | 0:d92f9d21154c | 1604 | int wolfSSL_pending(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1605 | { |
wolfSSL | 0:d92f9d21154c | 1606 | WOLFSSL_ENTER("SSL_pending"); |
wolfSSL | 0:d92f9d21154c | 1607 | return ssl->buffers.clearOutputBuffer.length; |
wolfSSL | 0:d92f9d21154c | 1608 | } |
wolfSSL | 0:d92f9d21154c | 1609 | |
wolfSSL | 0:d92f9d21154c | 1610 | |
wolfSSL | 0:d92f9d21154c | 1611 | #ifndef WOLFSSL_LEANPSK |
wolfSSL | 0:d92f9d21154c | 1612 | /* trun on handshake group messages for context */ |
wolfSSL | 0:d92f9d21154c | 1613 | int wolfSSL_CTX_set_group_messages(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 1614 | { |
wolfSSL | 0:d92f9d21154c | 1615 | if (ctx == NULL) |
wolfSSL | 0:d92f9d21154c | 1616 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1617 | |
wolfSSL | 0:d92f9d21154c | 1618 | ctx->groupMessages = 1; |
wolfSSL | 0:d92f9d21154c | 1619 | |
wolfSSL | 0:d92f9d21154c | 1620 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 1621 | } |
wolfSSL | 0:d92f9d21154c | 1622 | #endif |
wolfSSL | 0:d92f9d21154c | 1623 | |
wolfSSL | 0:d92f9d21154c | 1624 | |
wolfSSL | 0:d92f9d21154c | 1625 | #ifndef NO_WOLFSSL_CLIENT |
wolfSSL | 0:d92f9d21154c | 1626 | /* connect enough to get peer cert chain */ |
wolfSSL | 0:d92f9d21154c | 1627 | int wolfSSL_connect_cert(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1628 | { |
wolfSSL | 0:d92f9d21154c | 1629 | int ret; |
wolfSSL | 0:d92f9d21154c | 1630 | |
wolfSSL | 0:d92f9d21154c | 1631 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 1632 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 1633 | |
wolfSSL | 0:d92f9d21154c | 1634 | ssl->options.certOnly = 1; |
wolfSSL | 0:d92f9d21154c | 1635 | ret = wolfSSL_connect(ssl); |
wolfSSL | 0:d92f9d21154c | 1636 | ssl->options.certOnly = 0; |
wolfSSL | 0:d92f9d21154c | 1637 | |
wolfSSL | 0:d92f9d21154c | 1638 | return ret; |
wolfSSL | 0:d92f9d21154c | 1639 | } |
wolfSSL | 0:d92f9d21154c | 1640 | #endif |
wolfSSL | 0:d92f9d21154c | 1641 | |
wolfSSL | 0:d92f9d21154c | 1642 | |
wolfSSL | 0:d92f9d21154c | 1643 | #ifndef WOLFSSL_LEANPSK |
wolfSSL | 0:d92f9d21154c | 1644 | /* trun on handshake group messages for ssl object */ |
wolfSSL | 0:d92f9d21154c | 1645 | int wolfSSL_set_group_messages(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 1646 | { |
wolfSSL | 0:d92f9d21154c | 1647 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 1648 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1649 | |
wolfSSL | 0:d92f9d21154c | 1650 | ssl->options.groupMessages = 1; |
wolfSSL | 0:d92f9d21154c | 1651 | |
wolfSSL | 0:d92f9d21154c | 1652 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 1653 | } |
wolfSSL | 0:d92f9d21154c | 1654 | |
wolfSSL | 0:d92f9d21154c | 1655 | |
wolfSSL | 0:d92f9d21154c | 1656 | /* make minVersion the internal equivilant SSL version */ |
wolfSSL | 0:d92f9d21154c | 1657 | static int SetMinVersionHelper(byte* minVersion, int version) |
wolfSSL | 0:d92f9d21154c | 1658 | { |
wolfSSL | 0:d92f9d21154c | 1659 | switch (version) { |
wolfSSL | 0:d92f9d21154c | 1660 | #ifndef NO_OLD_TLS |
wolfSSL | 0:d92f9d21154c | 1661 | case WOLFSSL_SSLV3: |
wolfSSL | 0:d92f9d21154c | 1662 | *minVersion = SSLv3_MINOR; |
wolfSSL | 0:d92f9d21154c | 1663 | break; |
wolfSSL | 0:d92f9d21154c | 1664 | #endif |
wolfSSL | 0:d92f9d21154c | 1665 | |
wolfSSL | 0:d92f9d21154c | 1666 | #ifndef NO_TLS |
wolfSSL | 0:d92f9d21154c | 1667 | #ifndef NO_OLD_TLS |
wolfSSL | 0:d92f9d21154c | 1668 | case WOLFSSL_TLSV1: |
wolfSSL | 0:d92f9d21154c | 1669 | *minVersion = TLSv1_MINOR; |
wolfSSL | 0:d92f9d21154c | 1670 | break; |
wolfSSL | 0:d92f9d21154c | 1671 | |
wolfSSL | 0:d92f9d21154c | 1672 | case WOLFSSL_TLSV1_1: |
wolfSSL | 0:d92f9d21154c | 1673 | *minVersion = TLSv1_1_MINOR; |
wolfSSL | 0:d92f9d21154c | 1674 | break; |
wolfSSL | 0:d92f9d21154c | 1675 | #endif |
wolfSSL | 0:d92f9d21154c | 1676 | case WOLFSSL_TLSV1_2: |
wolfSSL | 0:d92f9d21154c | 1677 | *minVersion = TLSv1_2_MINOR; |
wolfSSL | 0:d92f9d21154c | 1678 | break; |
wolfSSL | 0:d92f9d21154c | 1679 | #endif |
wolfSSL | 0:d92f9d21154c | 1680 | |
wolfSSL | 0:d92f9d21154c | 1681 | default: |
wolfSSL | 0:d92f9d21154c | 1682 | WOLFSSL_MSG("Bad function argument"); |
wolfSSL | 0:d92f9d21154c | 1683 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1684 | } |
wolfSSL | 0:d92f9d21154c | 1685 | |
wolfSSL | 0:d92f9d21154c | 1686 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 1687 | } |
wolfSSL | 0:d92f9d21154c | 1688 | |
wolfSSL | 0:d92f9d21154c | 1689 | |
wolfSSL | 0:d92f9d21154c | 1690 | /* Set minimum downgrade version allowed, SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 1691 | int wolfSSL_CTX_SetMinVersion(WOLFSSL_CTX* ctx, int version) |
wolfSSL | 0:d92f9d21154c | 1692 | { |
wolfSSL | 0:d92f9d21154c | 1693 | WOLFSSL_ENTER("wolfSSL_CTX_SetMinVersion"); |
wolfSSL | 0:d92f9d21154c | 1694 | |
wolfSSL | 0:d92f9d21154c | 1695 | if (ctx == NULL) { |
wolfSSL | 0:d92f9d21154c | 1696 | WOLFSSL_MSG("Bad function argument"); |
wolfSSL | 0:d92f9d21154c | 1697 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1698 | } |
wolfSSL | 0:d92f9d21154c | 1699 | |
wolfSSL | 0:d92f9d21154c | 1700 | return SetMinVersionHelper(&ctx->minDowngrade, version); |
wolfSSL | 0:d92f9d21154c | 1701 | } |
wolfSSL | 0:d92f9d21154c | 1702 | |
wolfSSL | 0:d92f9d21154c | 1703 | |
wolfSSL | 0:d92f9d21154c | 1704 | /* Set minimum downgrade version allowed, SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 1705 | int wolfSSL_SetMinVersion(WOLFSSL* ssl, int version) |
wolfSSL | 0:d92f9d21154c | 1706 | { |
wolfSSL | 0:d92f9d21154c | 1707 | WOLFSSL_ENTER("wolfSSL_SetMinVersion"); |
wolfSSL | 0:d92f9d21154c | 1708 | |
wolfSSL | 0:d92f9d21154c | 1709 | if (ssl == NULL) { |
wolfSSL | 0:d92f9d21154c | 1710 | WOLFSSL_MSG("Bad function argument"); |
wolfSSL | 0:d92f9d21154c | 1711 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1712 | } |
wolfSSL | 0:d92f9d21154c | 1713 | |
wolfSSL | 0:d92f9d21154c | 1714 | return SetMinVersionHelper(&ssl->options.minDowngrade, version); |
wolfSSL | 0:d92f9d21154c | 1715 | } |
wolfSSL | 0:d92f9d21154c | 1716 | |
wolfSSL | 0:d92f9d21154c | 1717 | |
wolfSSL | 0:d92f9d21154c | 1718 | int wolfSSL_SetVersion(WOLFSSL* ssl, int version) |
wolfSSL | 0:d92f9d21154c | 1719 | { |
wolfSSL | 0:d92f9d21154c | 1720 | byte haveRSA = 1; |
wolfSSL | 0:d92f9d21154c | 1721 | byte havePSK = 0; |
wolfSSL | 0:d92f9d21154c | 1722 | |
wolfSSL | 0:d92f9d21154c | 1723 | WOLFSSL_ENTER("wolfSSL_SetVersion"); |
wolfSSL | 0:d92f9d21154c | 1724 | |
wolfSSL | 0:d92f9d21154c | 1725 | if (ssl == NULL) { |
wolfSSL | 0:d92f9d21154c | 1726 | WOLFSSL_MSG("Bad function argument"); |
wolfSSL | 0:d92f9d21154c | 1727 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1728 | } |
wolfSSL | 0:d92f9d21154c | 1729 | |
wolfSSL | 0:d92f9d21154c | 1730 | switch (version) { |
wolfSSL | 0:d92f9d21154c | 1731 | #ifndef NO_OLD_TLS |
wolfSSL | 0:d92f9d21154c | 1732 | case WOLFSSL_SSLV3: |
wolfSSL | 0:d92f9d21154c | 1733 | ssl->version = MakeSSLv3(); |
wolfSSL | 0:d92f9d21154c | 1734 | break; |
wolfSSL | 0:d92f9d21154c | 1735 | #endif |
wolfSSL | 0:d92f9d21154c | 1736 | |
wolfSSL | 0:d92f9d21154c | 1737 | #ifndef NO_TLS |
wolfSSL | 0:d92f9d21154c | 1738 | #ifndef NO_OLD_TLS |
wolfSSL | 0:d92f9d21154c | 1739 | case WOLFSSL_TLSV1: |
wolfSSL | 0:d92f9d21154c | 1740 | ssl->version = MakeTLSv1(); |
wolfSSL | 0:d92f9d21154c | 1741 | break; |
wolfSSL | 0:d92f9d21154c | 1742 | |
wolfSSL | 0:d92f9d21154c | 1743 | case WOLFSSL_TLSV1_1: |
wolfSSL | 0:d92f9d21154c | 1744 | ssl->version = MakeTLSv1_1(); |
wolfSSL | 0:d92f9d21154c | 1745 | break; |
wolfSSL | 0:d92f9d21154c | 1746 | #endif |
wolfSSL | 0:d92f9d21154c | 1747 | case WOLFSSL_TLSV1_2: |
wolfSSL | 0:d92f9d21154c | 1748 | ssl->version = MakeTLSv1_2(); |
wolfSSL | 0:d92f9d21154c | 1749 | break; |
wolfSSL | 0:d92f9d21154c | 1750 | #endif |
wolfSSL | 0:d92f9d21154c | 1751 | |
wolfSSL | 0:d92f9d21154c | 1752 | default: |
wolfSSL | 0:d92f9d21154c | 1753 | WOLFSSL_MSG("Bad function argument"); |
wolfSSL | 0:d92f9d21154c | 1754 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 1755 | } |
wolfSSL | 0:d92f9d21154c | 1756 | |
wolfSSL | 0:d92f9d21154c | 1757 | #ifdef NO_RSA |
wolfSSL | 0:d92f9d21154c | 1758 | haveRSA = 0; |
wolfSSL | 0:d92f9d21154c | 1759 | #endif |
wolfSSL | 0:d92f9d21154c | 1760 | #ifndef NO_PSK |
wolfSSL | 0:d92f9d21154c | 1761 | havePSK = ssl->options.havePSK; |
wolfSSL | 0:d92f9d21154c | 1762 | #endif |
wolfSSL | 0:d92f9d21154c | 1763 | |
wolfSSL | 0:d92f9d21154c | 1764 | InitSuites(ssl->suites, ssl->version, haveRSA, havePSK, ssl->options.haveDH, |
wolfSSL | 0:d92f9d21154c | 1765 | ssl->options.haveNTRU, ssl->options.haveECDSAsig, |
wolfSSL | 0:d92f9d21154c | 1766 | ssl->options.haveStaticECC, ssl->options.side); |
wolfSSL | 0:d92f9d21154c | 1767 | |
wolfSSL | 0:d92f9d21154c | 1768 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 1769 | } |
wolfSSL | 0:d92f9d21154c | 1770 | #endif /* !leanpsk */ |
wolfSSL | 0:d92f9d21154c | 1771 | |
wolfSSL | 0:d92f9d21154c | 1772 | |
wolfSSL | 0:d92f9d21154c | 1773 | #if !defined(NO_CERTS) || !defined(NO_SESSION_CACHE) |
wolfSSL | 0:d92f9d21154c | 1774 | |
wolfSSL | 0:d92f9d21154c | 1775 | /* Make a work from the front of random hash */ |
wolfSSL | 0:d92f9d21154c | 1776 | static INLINE word32 MakeWordFromHash(const byte* hashID) |
wolfSSL | 0:d92f9d21154c | 1777 | { |
wolfSSL | 0:d92f9d21154c | 1778 | return (hashID[0] << 24) | (hashID[1] << 16) | (hashID[2] << 8) | |
wolfSSL | 0:d92f9d21154c | 1779 | hashID[3]; |
wolfSSL | 0:d92f9d21154c | 1780 | } |
wolfSSL | 0:d92f9d21154c | 1781 | |
wolfSSL | 0:d92f9d21154c | 1782 | #endif /* !NO_CERTS || !NO_SESSION_CACHE */ |
wolfSSL | 0:d92f9d21154c | 1783 | |
wolfSSL | 0:d92f9d21154c | 1784 | |
wolfSSL | 0:d92f9d21154c | 1785 | #ifndef NO_CERTS |
wolfSSL | 0:d92f9d21154c | 1786 | |
wolfSSL | 0:d92f9d21154c | 1787 | /* hash is the SHA digest of name, just use first 32 bits as hash */ |
wolfSSL | 0:d92f9d21154c | 1788 | static INLINE word32 HashSigner(const byte* hash) |
wolfSSL | 0:d92f9d21154c | 1789 | { |
wolfSSL | 0:d92f9d21154c | 1790 | return MakeWordFromHash(hash) % CA_TABLE_SIZE; |
wolfSSL | 0:d92f9d21154c | 1791 | } |
wolfSSL | 0:d92f9d21154c | 1792 | |
wolfSSL | 0:d92f9d21154c | 1793 | |
wolfSSL | 0:d92f9d21154c | 1794 | /* does CA already exist on signer list */ |
wolfSSL | 0:d92f9d21154c | 1795 | int AlreadySigner(WOLFSSL_CERT_MANAGER* cm, byte* hash) |
wolfSSL | 0:d92f9d21154c | 1796 | { |
wolfSSL | 0:d92f9d21154c | 1797 | Signer* signers; |
wolfSSL | 0:d92f9d21154c | 1798 | int ret = 0; |
wolfSSL | 0:d92f9d21154c | 1799 | word32 row = HashSigner(hash); |
wolfSSL | 0:d92f9d21154c | 1800 | |
wolfSSL | 0:d92f9d21154c | 1801 | if (LockMutex(&cm->caLock) != 0) |
wolfSSL | 0:d92f9d21154c | 1802 | return ret; |
wolfSSL | 0:d92f9d21154c | 1803 | signers = cm->caTable[row]; |
wolfSSL | 0:d92f9d21154c | 1804 | while (signers) { |
wolfSSL | 0:d92f9d21154c | 1805 | byte* subjectHash; |
wolfSSL | 0:d92f9d21154c | 1806 | #ifndef NO_SKID |
wolfSSL | 0:d92f9d21154c | 1807 | subjectHash = signers->subjectKeyIdHash; |
wolfSSL | 0:d92f9d21154c | 1808 | #else |
wolfSSL | 0:d92f9d21154c | 1809 | subjectHash = signers->subjectNameHash; |
wolfSSL | 0:d92f9d21154c | 1810 | #endif |
wolfSSL | 0:d92f9d21154c | 1811 | if (XMEMCMP(hash, subjectHash, SIGNER_DIGEST_SIZE) == 0) { |
wolfSSL | 0:d92f9d21154c | 1812 | ret = 1; |
wolfSSL | 0:d92f9d21154c | 1813 | break; |
wolfSSL | 0:d92f9d21154c | 1814 | } |
wolfSSL | 0:d92f9d21154c | 1815 | signers = signers->next; |
wolfSSL | 0:d92f9d21154c | 1816 | } |
wolfSSL | 0:d92f9d21154c | 1817 | UnLockMutex(&cm->caLock); |
wolfSSL | 0:d92f9d21154c | 1818 | |
wolfSSL | 0:d92f9d21154c | 1819 | return ret; |
wolfSSL | 0:d92f9d21154c | 1820 | } |
wolfSSL | 0:d92f9d21154c | 1821 | |
wolfSSL | 0:d92f9d21154c | 1822 | |
wolfSSL | 0:d92f9d21154c | 1823 | /* return CA if found, otherwise NULL */ |
wolfSSL | 0:d92f9d21154c | 1824 | Signer* GetCA(void* vp, byte* hash) |
wolfSSL | 0:d92f9d21154c | 1825 | { |
wolfSSL | 0:d92f9d21154c | 1826 | WOLFSSL_CERT_MANAGER* cm = (WOLFSSL_CERT_MANAGER*)vp; |
wolfSSL | 0:d92f9d21154c | 1827 | Signer* ret = NULL; |
wolfSSL | 0:d92f9d21154c | 1828 | Signer* signers; |
wolfSSL | 0:d92f9d21154c | 1829 | word32 row = HashSigner(hash); |
wolfSSL | 0:d92f9d21154c | 1830 | |
wolfSSL | 0:d92f9d21154c | 1831 | if (cm == NULL) |
wolfSSL | 0:d92f9d21154c | 1832 | return NULL; |
wolfSSL | 0:d92f9d21154c | 1833 | |
wolfSSL | 0:d92f9d21154c | 1834 | if (LockMutex(&cm->caLock) != 0) |
wolfSSL | 0:d92f9d21154c | 1835 | return ret; |
wolfSSL | 0:d92f9d21154c | 1836 | |
wolfSSL | 0:d92f9d21154c | 1837 | signers = cm->caTable[row]; |
wolfSSL | 0:d92f9d21154c | 1838 | while (signers) { |
wolfSSL | 0:d92f9d21154c | 1839 | byte* subjectHash; |
wolfSSL | 0:d92f9d21154c | 1840 | #ifndef NO_SKID |
wolfSSL | 0:d92f9d21154c | 1841 | subjectHash = signers->subjectKeyIdHash; |
wolfSSL | 0:d92f9d21154c | 1842 | #else |
wolfSSL | 0:d92f9d21154c | 1843 | subjectHash = signers->subjectNameHash; |
wolfSSL | 0:d92f9d21154c | 1844 | #endif |
wolfSSL | 0:d92f9d21154c | 1845 | if (XMEMCMP(hash, subjectHash, SIGNER_DIGEST_SIZE) == 0) { |
wolfSSL | 0:d92f9d21154c | 1846 | ret = signers; |
wolfSSL | 0:d92f9d21154c | 1847 | break; |
wolfSSL | 0:d92f9d21154c | 1848 | } |
wolfSSL | 0:d92f9d21154c | 1849 | signers = signers->next; |
wolfSSL | 0:d92f9d21154c | 1850 | } |
wolfSSL | 0:d92f9d21154c | 1851 | UnLockMutex(&cm->caLock); |
wolfSSL | 0:d92f9d21154c | 1852 | |
wolfSSL | 0:d92f9d21154c | 1853 | return ret; |
wolfSSL | 0:d92f9d21154c | 1854 | } |
wolfSSL | 0:d92f9d21154c | 1855 | |
wolfSSL | 0:d92f9d21154c | 1856 | |
wolfSSL | 0:d92f9d21154c | 1857 | #ifndef NO_SKID |
wolfSSL | 0:d92f9d21154c | 1858 | /* return CA if found, otherwise NULL. Walk through hash table. */ |
wolfSSL | 0:d92f9d21154c | 1859 | Signer* GetCAByName(void* vp, byte* hash) |
wolfSSL | 0:d92f9d21154c | 1860 | { |
wolfSSL | 0:d92f9d21154c | 1861 | WOLFSSL_CERT_MANAGER* cm = (WOLFSSL_CERT_MANAGER*)vp; |
wolfSSL | 0:d92f9d21154c | 1862 | Signer* ret = NULL; |
wolfSSL | 0:d92f9d21154c | 1863 | Signer* signers; |
wolfSSL | 0:d92f9d21154c | 1864 | word32 row; |
wolfSSL | 0:d92f9d21154c | 1865 | |
wolfSSL | 0:d92f9d21154c | 1866 | if (cm == NULL) |
wolfSSL | 0:d92f9d21154c | 1867 | return NULL; |
wolfSSL | 0:d92f9d21154c | 1868 | |
wolfSSL | 0:d92f9d21154c | 1869 | if (LockMutex(&cm->caLock) != 0) |
wolfSSL | 0:d92f9d21154c | 1870 | return ret; |
wolfSSL | 0:d92f9d21154c | 1871 | |
wolfSSL | 0:d92f9d21154c | 1872 | for (row = 0; row < CA_TABLE_SIZE && ret == NULL; row++) { |
wolfSSL | 0:d92f9d21154c | 1873 | signers = cm->caTable[row]; |
wolfSSL | 0:d92f9d21154c | 1874 | while (signers && ret == NULL) { |
wolfSSL | 0:d92f9d21154c | 1875 | if (XMEMCMP(hash, |
wolfSSL | 0:d92f9d21154c | 1876 | signers->subjectNameHash, SIGNER_DIGEST_SIZE) == 0) { |
wolfSSL | 0:d92f9d21154c | 1877 | ret = signers; |
wolfSSL | 0:d92f9d21154c | 1878 | } |
wolfSSL | 0:d92f9d21154c | 1879 | signers = signers->next; |
wolfSSL | 0:d92f9d21154c | 1880 | } |
wolfSSL | 0:d92f9d21154c | 1881 | } |
wolfSSL | 0:d92f9d21154c | 1882 | UnLockMutex(&cm->caLock); |
wolfSSL | 0:d92f9d21154c | 1883 | |
wolfSSL | 0:d92f9d21154c | 1884 | return ret; |
wolfSSL | 0:d92f9d21154c | 1885 | } |
wolfSSL | 0:d92f9d21154c | 1886 | #endif |
wolfSSL | 0:d92f9d21154c | 1887 | |
wolfSSL | 0:d92f9d21154c | 1888 | |
wolfSSL | 0:d92f9d21154c | 1889 | /* owns der, internal now uses too */ |
wolfSSL | 0:d92f9d21154c | 1890 | /* type flag ids from user or from chain received during verify |
wolfSSL | 0:d92f9d21154c | 1891 | don't allow chain ones to be added w/o isCA extension */ |
wolfSSL | 0:d92f9d21154c | 1892 | int AddCA(WOLFSSL_CERT_MANAGER* cm, buffer der, int type, int verify) |
wolfSSL | 0:d92f9d21154c | 1893 | { |
wolfSSL | 0:d92f9d21154c | 1894 | int ret; |
wolfSSL | 0:d92f9d21154c | 1895 | Signer* signer = 0; |
wolfSSL | 0:d92f9d21154c | 1896 | word32 row; |
wolfSSL | 0:d92f9d21154c | 1897 | byte* subjectHash; |
wolfSSL | 0:d92f9d21154c | 1898 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 1899 | DecodedCert* cert = NULL; |
wolfSSL | 0:d92f9d21154c | 1900 | #else |
wolfSSL | 0:d92f9d21154c | 1901 | DecodedCert cert[1]; |
wolfSSL | 0:d92f9d21154c | 1902 | #endif |
wolfSSL | 0:d92f9d21154c | 1903 | |
wolfSSL | 0:d92f9d21154c | 1904 | WOLFSSL_MSG("Adding a CA"); |
wolfSSL | 0:d92f9d21154c | 1905 | |
wolfSSL | 0:d92f9d21154c | 1906 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 1907 | cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL, |
wolfSSL | 0:d92f9d21154c | 1908 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 1909 | if (cert == NULL) |
wolfSSL | 0:d92f9d21154c | 1910 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 1911 | #endif |
wolfSSL | 0:d92f9d21154c | 1912 | |
wolfSSL | 0:d92f9d21154c | 1913 | InitDecodedCert(cert, der.buffer, der.length, cm->heap); |
wolfSSL | 0:d92f9d21154c | 1914 | ret = ParseCert(cert, CA_TYPE, verify, cm); |
wolfSSL | 0:d92f9d21154c | 1915 | WOLFSSL_MSG(" Parsed new CA"); |
wolfSSL | 0:d92f9d21154c | 1916 | |
wolfSSL | 0:d92f9d21154c | 1917 | #ifndef NO_SKID |
wolfSSL | 0:d92f9d21154c | 1918 | subjectHash = cert->extSubjKeyId; |
wolfSSL | 0:d92f9d21154c | 1919 | #else |
wolfSSL | 0:d92f9d21154c | 1920 | subjectHash = cert->subjectHash; |
wolfSSL | 0:d92f9d21154c | 1921 | #endif |
wolfSSL | 0:d92f9d21154c | 1922 | |
wolfSSL | 0:d92f9d21154c | 1923 | if (ret == 0 && cert->isCA == 0 && type != WOLFSSL_USER_CA) { |
wolfSSL | 0:d92f9d21154c | 1924 | WOLFSSL_MSG(" Can't add as CA if not actually one"); |
wolfSSL | 0:d92f9d21154c | 1925 | ret = NOT_CA_ERROR; |
wolfSSL | 0:d92f9d21154c | 1926 | } |
wolfSSL | 0:d92f9d21154c | 1927 | #ifndef ALLOW_INVALID_CERTSIGN |
wolfSSL | 0:d92f9d21154c | 1928 | else if (ret == 0 && cert->isCA == 1 && type != WOLFSSL_USER_CA && |
wolfSSL | 0:d92f9d21154c | 1929 | (cert->extKeyUsage & KEYUSE_KEY_CERT_SIGN) == 0) { |
wolfSSL | 0:d92f9d21154c | 1930 | /* Intermediate CA certs are required to have the keyCertSign |
wolfSSL | 0:d92f9d21154c | 1931 | * extension set. User loaded root certs are not. */ |
wolfSSL | 0:d92f9d21154c | 1932 | WOLFSSL_MSG(" Doesn't have key usage certificate signing"); |
wolfSSL | 0:d92f9d21154c | 1933 | ret = NOT_CA_ERROR; |
wolfSSL | 0:d92f9d21154c | 1934 | } |
wolfSSL | 0:d92f9d21154c | 1935 | #endif |
wolfSSL | 0:d92f9d21154c | 1936 | else if (ret == 0 && AlreadySigner(cm, subjectHash)) { |
wolfSSL | 0:d92f9d21154c | 1937 | WOLFSSL_MSG(" Already have this CA, not adding again"); |
wolfSSL | 0:d92f9d21154c | 1938 | (void)ret; |
wolfSSL | 0:d92f9d21154c | 1939 | } |
wolfSSL | 0:d92f9d21154c | 1940 | else if (ret == 0) { |
wolfSSL | 0:d92f9d21154c | 1941 | /* take over signer parts */ |
wolfSSL | 0:d92f9d21154c | 1942 | signer = MakeSigner(cm->heap); |
wolfSSL | 0:d92f9d21154c | 1943 | if (!signer) |
wolfSSL | 0:d92f9d21154c | 1944 | ret = MEMORY_ERROR; |
wolfSSL | 0:d92f9d21154c | 1945 | else { |
wolfSSL | 0:d92f9d21154c | 1946 | signer->keyOID = cert->keyOID; |
wolfSSL | 0:d92f9d21154c | 1947 | signer->publicKey = cert->publicKey; |
wolfSSL | 0:d92f9d21154c | 1948 | signer->pubKeySize = cert->pubKeySize; |
wolfSSL | 0:d92f9d21154c | 1949 | signer->nameLen = cert->subjectCNLen; |
wolfSSL | 0:d92f9d21154c | 1950 | signer->name = cert->subjectCN; |
wolfSSL | 0:d92f9d21154c | 1951 | #ifndef IGNORE_NAME_CONSTRAINTS |
wolfSSL | 0:d92f9d21154c | 1952 | signer->permittedNames = cert->permittedNames; |
wolfSSL | 0:d92f9d21154c | 1953 | signer->excludedNames = cert->excludedNames; |
wolfSSL | 0:d92f9d21154c | 1954 | #endif |
wolfSSL | 0:d92f9d21154c | 1955 | #ifndef NO_SKID |
wolfSSL | 0:d92f9d21154c | 1956 | XMEMCPY(signer->subjectKeyIdHash, cert->extSubjKeyId, |
wolfSSL | 0:d92f9d21154c | 1957 | SIGNER_DIGEST_SIZE); |
wolfSSL | 0:d92f9d21154c | 1958 | #endif |
wolfSSL | 0:d92f9d21154c | 1959 | XMEMCPY(signer->subjectNameHash, cert->subjectHash, |
wolfSSL | 0:d92f9d21154c | 1960 | SIGNER_DIGEST_SIZE); |
wolfSSL | 0:d92f9d21154c | 1961 | signer->keyUsage = cert->extKeyUsageSet ? cert->extKeyUsage |
wolfSSL | 0:d92f9d21154c | 1962 | : 0xFFFF; |
wolfSSL | 0:d92f9d21154c | 1963 | signer->next = NULL; /* If Key Usage not set, all uses valid. */ |
wolfSSL | 0:d92f9d21154c | 1964 | cert->publicKey = 0; /* in case lock fails don't free here. */ |
wolfSSL | 0:d92f9d21154c | 1965 | cert->subjectCN = 0; |
wolfSSL | 0:d92f9d21154c | 1966 | #ifndef IGNORE_NAME_CONSTRAINTS |
wolfSSL | 0:d92f9d21154c | 1967 | cert->permittedNames = NULL; |
wolfSSL | 0:d92f9d21154c | 1968 | cert->excludedNames = NULL; |
wolfSSL | 0:d92f9d21154c | 1969 | #endif |
wolfSSL | 0:d92f9d21154c | 1970 | |
wolfSSL | 0:d92f9d21154c | 1971 | #ifndef NO_SKID |
wolfSSL | 0:d92f9d21154c | 1972 | row = HashSigner(signer->subjectKeyIdHash); |
wolfSSL | 0:d92f9d21154c | 1973 | #else |
wolfSSL | 0:d92f9d21154c | 1974 | row = HashSigner(signer->subjectNameHash); |
wolfSSL | 0:d92f9d21154c | 1975 | #endif |
wolfSSL | 0:d92f9d21154c | 1976 | |
wolfSSL | 0:d92f9d21154c | 1977 | if (LockMutex(&cm->caLock) == 0) { |
wolfSSL | 0:d92f9d21154c | 1978 | signer->next = cm->caTable[row]; |
wolfSSL | 0:d92f9d21154c | 1979 | cm->caTable[row] = signer; /* takes ownership */ |
wolfSSL | 0:d92f9d21154c | 1980 | UnLockMutex(&cm->caLock); |
wolfSSL | 0:d92f9d21154c | 1981 | if (cm->caCacheCallback) |
wolfSSL | 0:d92f9d21154c | 1982 | cm->caCacheCallback(der.buffer, (int)der.length, type); |
wolfSSL | 0:d92f9d21154c | 1983 | } |
wolfSSL | 0:d92f9d21154c | 1984 | else { |
wolfSSL | 0:d92f9d21154c | 1985 | WOLFSSL_MSG(" CA Mutex Lock failed"); |
wolfSSL | 0:d92f9d21154c | 1986 | ret = BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 1987 | FreeSigner(signer, cm->heap); |
wolfSSL | 0:d92f9d21154c | 1988 | } |
wolfSSL | 0:d92f9d21154c | 1989 | } |
wolfSSL | 0:d92f9d21154c | 1990 | } |
wolfSSL | 0:d92f9d21154c | 1991 | |
wolfSSL | 0:d92f9d21154c | 1992 | WOLFSSL_MSG(" Freeing Parsed CA"); |
wolfSSL | 0:d92f9d21154c | 1993 | FreeDecodedCert(cert); |
wolfSSL | 0:d92f9d21154c | 1994 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 1995 | XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 1996 | #endif |
wolfSSL | 0:d92f9d21154c | 1997 | WOLFSSL_MSG(" Freeing der CA"); |
wolfSSL | 0:d92f9d21154c | 1998 | XFREE(der.buffer, cm->heap, DYNAMIC_TYPE_CA); |
wolfSSL | 0:d92f9d21154c | 1999 | WOLFSSL_MSG(" OK Freeing der CA"); |
wolfSSL | 0:d92f9d21154c | 2000 | |
wolfSSL | 0:d92f9d21154c | 2001 | WOLFSSL_LEAVE("AddCA", ret); |
wolfSSL | 0:d92f9d21154c | 2002 | |
wolfSSL | 0:d92f9d21154c | 2003 | return ret == 0 ? SSL_SUCCESS : ret; |
wolfSSL | 0:d92f9d21154c | 2004 | } |
wolfSSL | 0:d92f9d21154c | 2005 | |
wolfSSL | 0:d92f9d21154c | 2006 | #endif /* !NO_CERTS */ |
wolfSSL | 0:d92f9d21154c | 2007 | |
wolfSSL | 0:d92f9d21154c | 2008 | |
wolfSSL | 0:d92f9d21154c | 2009 | #ifndef NO_SESSION_CACHE |
wolfSSL | 0:d92f9d21154c | 2010 | |
wolfSSL | 0:d92f9d21154c | 2011 | /* basic config gives a cache with 33 sessions, adequate for clients and |
wolfSSL | 0:d92f9d21154c | 2012 | embedded servers |
wolfSSL | 0:d92f9d21154c | 2013 | |
wolfSSL | 0:d92f9d21154c | 2014 | MEDIUM_SESSION_CACHE allows 1055 sessions, adequate for servers that |
wolfSSL | 0:d92f9d21154c | 2015 | aren't under heavy load, basically allows 200 new sessions per minute |
wolfSSL | 0:d92f9d21154c | 2016 | |
wolfSSL | 0:d92f9d21154c | 2017 | BIG_SESSION_CACHE yields 20,027 sessions |
wolfSSL | 0:d92f9d21154c | 2018 | |
wolfSSL | 0:d92f9d21154c | 2019 | HUGE_SESSION_CACHE yields 65,791 sessions, for servers under heavy load, |
wolfSSL | 0:d92f9d21154c | 2020 | allows over 13,000 new sessions per minute or over 200 new sessions per |
wolfSSL | 0:d92f9d21154c | 2021 | second |
wolfSSL | 0:d92f9d21154c | 2022 | |
wolfSSL | 0:d92f9d21154c | 2023 | SMALL_SESSION_CACHE only stores 6 sessions, good for embedded clients |
wolfSSL | 0:d92f9d21154c | 2024 | or systems where the default of nearly 3kB is too much RAM, this define |
wolfSSL | 0:d92f9d21154c | 2025 | uses less than 500 bytes RAM |
wolfSSL | 0:d92f9d21154c | 2026 | |
wolfSSL | 0:d92f9d21154c | 2027 | default SESSION_CACHE stores 33 sessions (no XXX_SESSION_CACHE defined) |
wolfSSL | 0:d92f9d21154c | 2028 | */ |
wolfSSL | 0:d92f9d21154c | 2029 | #ifdef HUGE_SESSION_CACHE |
wolfSSL | 0:d92f9d21154c | 2030 | #define SESSIONS_PER_ROW 11 |
wolfSSL | 0:d92f9d21154c | 2031 | #define SESSION_ROWS 5981 |
wolfSSL | 0:d92f9d21154c | 2032 | #elif defined(BIG_SESSION_CACHE) |
wolfSSL | 0:d92f9d21154c | 2033 | #define SESSIONS_PER_ROW 7 |
wolfSSL | 0:d92f9d21154c | 2034 | #define SESSION_ROWS 2861 |
wolfSSL | 0:d92f9d21154c | 2035 | #elif defined(MEDIUM_SESSION_CACHE) |
wolfSSL | 0:d92f9d21154c | 2036 | #define SESSIONS_PER_ROW 5 |
wolfSSL | 0:d92f9d21154c | 2037 | #define SESSION_ROWS 211 |
wolfSSL | 0:d92f9d21154c | 2038 | #elif defined(SMALL_SESSION_CACHE) |
wolfSSL | 0:d92f9d21154c | 2039 | #define SESSIONS_PER_ROW 2 |
wolfSSL | 0:d92f9d21154c | 2040 | #define SESSION_ROWS 3 |
wolfSSL | 0:d92f9d21154c | 2041 | #else |
wolfSSL | 0:d92f9d21154c | 2042 | #define SESSIONS_PER_ROW 3 |
wolfSSL | 0:d92f9d21154c | 2043 | #define SESSION_ROWS 11 |
wolfSSL | 0:d92f9d21154c | 2044 | #endif |
wolfSSL | 0:d92f9d21154c | 2045 | |
wolfSSL | 0:d92f9d21154c | 2046 | typedef struct SessionRow { |
wolfSSL | 0:d92f9d21154c | 2047 | int nextIdx; /* where to place next one */ |
wolfSSL | 0:d92f9d21154c | 2048 | int totalCount; /* sessions ever on this row */ |
wolfSSL | 0:d92f9d21154c | 2049 | WOLFSSL_SESSION Sessions[SESSIONS_PER_ROW]; |
wolfSSL | 0:d92f9d21154c | 2050 | } SessionRow; |
wolfSSL | 0:d92f9d21154c | 2051 | |
wolfSSL | 0:d92f9d21154c | 2052 | static SessionRow SessionCache[SESSION_ROWS]; |
wolfSSL | 0:d92f9d21154c | 2053 | |
wolfSSL | 0:d92f9d21154c | 2054 | #if defined(WOLFSSL_SESSION_STATS) && defined(WOLFSSL_PEAK_SESSIONS) |
wolfSSL | 0:d92f9d21154c | 2055 | static word32 PeakSessions; |
wolfSSL | 0:d92f9d21154c | 2056 | #endif |
wolfSSL | 0:d92f9d21154c | 2057 | |
wolfSSL | 0:d92f9d21154c | 2058 | static wolfSSL_Mutex session_mutex; /* SessionCache mutex */ |
wolfSSL | 0:d92f9d21154c | 2059 | |
wolfSSL | 0:d92f9d21154c | 2060 | #ifndef NO_CLIENT_CACHE |
wolfSSL | 0:d92f9d21154c | 2061 | |
wolfSSL | 0:d92f9d21154c | 2062 | typedef struct ClientSession { |
wolfSSL | 0:d92f9d21154c | 2063 | word16 serverRow; /* SessionCache Row id */ |
wolfSSL | 0:d92f9d21154c | 2064 | word16 serverIdx; /* SessionCache Idx (column) */ |
wolfSSL | 0:d92f9d21154c | 2065 | } ClientSession; |
wolfSSL | 0:d92f9d21154c | 2066 | |
wolfSSL | 0:d92f9d21154c | 2067 | typedef struct ClientRow { |
wolfSSL | 0:d92f9d21154c | 2068 | int nextIdx; /* where to place next one */ |
wolfSSL | 0:d92f9d21154c | 2069 | int totalCount; /* sessions ever on this row */ |
wolfSSL | 0:d92f9d21154c | 2070 | ClientSession Clients[SESSIONS_PER_ROW]; |
wolfSSL | 0:d92f9d21154c | 2071 | } ClientRow; |
wolfSSL | 0:d92f9d21154c | 2072 | |
wolfSSL | 0:d92f9d21154c | 2073 | static ClientRow ClientCache[SESSION_ROWS]; /* Client Cache */ |
wolfSSL | 0:d92f9d21154c | 2074 | /* uses session mutex */ |
wolfSSL | 0:d92f9d21154c | 2075 | #endif /* NO_CLIENT_CACHE */ |
wolfSSL | 0:d92f9d21154c | 2076 | |
wolfSSL | 0:d92f9d21154c | 2077 | #endif /* NO_SESSION_CACHE */ |
wolfSSL | 0:d92f9d21154c | 2078 | |
wolfSSL | 0:d92f9d21154c | 2079 | |
wolfSSL | 0:d92f9d21154c | 2080 | int wolfSSL_Init(void) |
wolfSSL | 0:d92f9d21154c | 2081 | { |
wolfSSL | 0:d92f9d21154c | 2082 | int ret = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 2083 | |
wolfSSL | 0:d92f9d21154c | 2084 | WOLFSSL_ENTER("wolfSSL_Init"); |
wolfSSL | 0:d92f9d21154c | 2085 | |
wolfSSL | 0:d92f9d21154c | 2086 | if (initRefCount == 0) { |
wolfSSL | 0:d92f9d21154c | 2087 | #ifndef NO_SESSION_CACHE |
wolfSSL | 0:d92f9d21154c | 2088 | if (InitMutex(&session_mutex) != 0) |
wolfSSL | 0:d92f9d21154c | 2089 | ret = BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 2090 | #endif |
wolfSSL | 0:d92f9d21154c | 2091 | if (InitMutex(&count_mutex) != 0) |
wolfSSL | 0:d92f9d21154c | 2092 | ret = BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 2093 | } |
wolfSSL | 0:d92f9d21154c | 2094 | if (ret == SSL_SUCCESS) { |
wolfSSL | 0:d92f9d21154c | 2095 | if (LockMutex(&count_mutex) != 0) { |
wolfSSL | 0:d92f9d21154c | 2096 | WOLFSSL_MSG("Bad Lock Mutex count"); |
wolfSSL | 0:d92f9d21154c | 2097 | return BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 2098 | } |
wolfSSL | 0:d92f9d21154c | 2099 | initRefCount++; |
wolfSSL | 0:d92f9d21154c | 2100 | UnLockMutex(&count_mutex); |
wolfSSL | 0:d92f9d21154c | 2101 | } |
wolfSSL | 0:d92f9d21154c | 2102 | |
wolfSSL | 0:d92f9d21154c | 2103 | return ret; |
wolfSSL | 0:d92f9d21154c | 2104 | } |
wolfSSL | 0:d92f9d21154c | 2105 | |
wolfSSL | 0:d92f9d21154c | 2106 | |
wolfSSL | 0:d92f9d21154c | 2107 | #ifndef NO_CERTS |
wolfSSL | 0:d92f9d21154c | 2108 | |
wolfSSL | 0:d92f9d21154c | 2109 | static const char* BEGIN_CERT = "-----BEGIN CERTIFICATE-----"; |
wolfSSL | 0:d92f9d21154c | 2110 | static const char* END_CERT = "-----END CERTIFICATE-----"; |
wolfSSL | 0:d92f9d21154c | 2111 | static const char* BEGIN_CERT_REQ = "-----BEGIN CERTIFICATE REQUEST-----"; |
wolfSSL | 0:d92f9d21154c | 2112 | static const char* END_CERT_REQ = "-----END CERTIFICATE REQUEST-----"; |
wolfSSL | 0:d92f9d21154c | 2113 | static const char* BEGIN_DH_PARAM = "-----BEGIN DH PARAMETERS-----"; |
wolfSSL | 0:d92f9d21154c | 2114 | static const char* END_DH_PARAM = "-----END DH PARAMETERS-----"; |
wolfSSL | 0:d92f9d21154c | 2115 | static const char* BEGIN_X509_CRL = "-----BEGIN X509 CRL-----"; |
wolfSSL | 0:d92f9d21154c | 2116 | static const char* END_X509_CRL = "-----END X509 CRL-----"; |
wolfSSL | 0:d92f9d21154c | 2117 | static const char* BEGIN_RSA_PRIV = "-----BEGIN RSA PRIVATE KEY-----"; |
wolfSSL | 0:d92f9d21154c | 2118 | static const char* END_RSA_PRIV = "-----END RSA PRIVATE KEY-----"; |
wolfSSL | 0:d92f9d21154c | 2119 | static const char* BEGIN_PRIV_KEY = "-----BEGIN PRIVATE KEY-----"; |
wolfSSL | 0:d92f9d21154c | 2120 | static const char* END_PRIV_KEY = "-----END PRIVATE KEY-----"; |
wolfSSL | 0:d92f9d21154c | 2121 | static const char* BEGIN_ENC_PRIV_KEY = "-----BEGIN ENCRYPTED PRIVATE KEY-----"; |
wolfSSL | 0:d92f9d21154c | 2122 | static const char* END_ENC_PRIV_KEY = "-----END ENCRYPTED PRIVATE KEY-----"; |
wolfSSL | 0:d92f9d21154c | 2123 | static const char* BEGIN_EC_PRIV = "-----BEGIN EC PRIVATE KEY-----"; |
wolfSSL | 0:d92f9d21154c | 2124 | static const char* END_EC_PRIV = "-----END EC PRIVATE KEY-----"; |
wolfSSL | 0:d92f9d21154c | 2125 | static const char* BEGIN_DSA_PRIV = "-----BEGIN DSA PRIVATE KEY-----"; |
wolfSSL | 0:d92f9d21154c | 2126 | static const char* END_DSA_PRIV = "-----END DSA PRIVATE KEY-----"; |
wolfSSL | 0:d92f9d21154c | 2127 | |
wolfSSL | 0:d92f9d21154c | 2128 | /* Remove PEM header/footer, convert to ASN1, store any encrypted data |
wolfSSL | 0:d92f9d21154c | 2129 | info->consumed tracks of PEM bytes consumed in case multiple parts */ |
wolfSSL | 0:d92f9d21154c | 2130 | int PemToDer(const unsigned char* buff, long longSz, int type, |
wolfSSL | 0:d92f9d21154c | 2131 | buffer* der, void* heap, EncryptedInfo* info, int* eccKey) |
wolfSSL | 0:d92f9d21154c | 2132 | { |
wolfSSL | 0:d92f9d21154c | 2133 | const char* header = NULL; |
wolfSSL | 0:d92f9d21154c | 2134 | const char* footer = NULL; |
wolfSSL | 0:d92f9d21154c | 2135 | char* headerEnd; |
wolfSSL | 0:d92f9d21154c | 2136 | char* footerEnd; |
wolfSSL | 0:d92f9d21154c | 2137 | char* consumedEnd; |
wolfSSL | 0:d92f9d21154c | 2138 | char* bufferEnd = (char*)(buff + longSz); |
wolfSSL | 0:d92f9d21154c | 2139 | long neededSz; |
wolfSSL | 0:d92f9d21154c | 2140 | int ret = 0; |
wolfSSL | 0:d92f9d21154c | 2141 | int dynamicType = 0; |
wolfSSL | 0:d92f9d21154c | 2142 | int sz = (int)longSz; |
wolfSSL | 0:d92f9d21154c | 2143 | |
wolfSSL | 0:d92f9d21154c | 2144 | switch (type) { |
wolfSSL | 0:d92f9d21154c | 2145 | case CA_TYPE: /* same as below */ |
wolfSSL | 0:d92f9d21154c | 2146 | case CERT_TYPE: header= BEGIN_CERT; footer= END_CERT; break; |
wolfSSL | 0:d92f9d21154c | 2147 | case CRL_TYPE: header= BEGIN_X509_CRL; footer= END_X509_CRL; break; |
wolfSSL | 0:d92f9d21154c | 2148 | case DH_PARAM_TYPE: header= BEGIN_DH_PARAM; footer= END_DH_PARAM; break; |
wolfSSL | 0:d92f9d21154c | 2149 | case CERTREQ_TYPE: header= BEGIN_CERT_REQ; footer= END_CERT_REQ; break; |
wolfSSL | 0:d92f9d21154c | 2150 | default: header= BEGIN_RSA_PRIV; footer= END_RSA_PRIV; break; |
wolfSSL | 0:d92f9d21154c | 2151 | } |
wolfSSL | 0:d92f9d21154c | 2152 | |
wolfSSL | 0:d92f9d21154c | 2153 | switch (type) { |
wolfSSL | 0:d92f9d21154c | 2154 | case CA_TYPE: dynamicType = DYNAMIC_TYPE_CA; break; |
wolfSSL | 0:d92f9d21154c | 2155 | case CERT_TYPE: dynamicType = DYNAMIC_TYPE_CERT; break; |
wolfSSL | 0:d92f9d21154c | 2156 | case CRL_TYPE: dynamicType = DYNAMIC_TYPE_CRL; break; |
wolfSSL | 0:d92f9d21154c | 2157 | default: dynamicType = DYNAMIC_TYPE_KEY; break; |
wolfSSL | 0:d92f9d21154c | 2158 | } |
wolfSSL | 0:d92f9d21154c | 2159 | |
wolfSSL | 0:d92f9d21154c | 2160 | /* find header */ |
wolfSSL | 0:d92f9d21154c | 2161 | for (;;) { |
wolfSSL | 0:d92f9d21154c | 2162 | headerEnd = XSTRNSTR((char*)buff, header, sz); |
wolfSSL | 0:d92f9d21154c | 2163 | |
wolfSSL | 0:d92f9d21154c | 2164 | if (headerEnd || type != PRIVATEKEY_TYPE) { |
wolfSSL | 0:d92f9d21154c | 2165 | break; |
wolfSSL | 0:d92f9d21154c | 2166 | } else if (header == BEGIN_RSA_PRIV) { |
wolfSSL | 0:d92f9d21154c | 2167 | header = BEGIN_PRIV_KEY; footer = END_PRIV_KEY; |
wolfSSL | 0:d92f9d21154c | 2168 | } else if (header == BEGIN_PRIV_KEY) { |
wolfSSL | 0:d92f9d21154c | 2169 | header = BEGIN_ENC_PRIV_KEY; footer = END_ENC_PRIV_KEY; |
wolfSSL | 0:d92f9d21154c | 2170 | } else if (header == BEGIN_ENC_PRIV_KEY) { |
wolfSSL | 0:d92f9d21154c | 2171 | header = BEGIN_EC_PRIV; footer = END_EC_PRIV; |
wolfSSL | 0:d92f9d21154c | 2172 | } else if (header == BEGIN_EC_PRIV) { |
wolfSSL | 0:d92f9d21154c | 2173 | header = BEGIN_DSA_PRIV; footer = END_DSA_PRIV; |
wolfSSL | 0:d92f9d21154c | 2174 | } else |
wolfSSL | 0:d92f9d21154c | 2175 | break; |
wolfSSL | 0:d92f9d21154c | 2176 | } |
wolfSSL | 0:d92f9d21154c | 2177 | |
wolfSSL | 0:d92f9d21154c | 2178 | if (!headerEnd) { |
wolfSSL | 0:d92f9d21154c | 2179 | WOLFSSL_MSG("Couldn't find PEM header"); |
wolfSSL | 0:d92f9d21154c | 2180 | return SSL_NO_PEM_HEADER; |
wolfSSL | 0:d92f9d21154c | 2181 | } |
wolfSSL | 0:d92f9d21154c | 2182 | |
wolfSSL | 0:d92f9d21154c | 2183 | headerEnd += XSTRLEN(header); |
wolfSSL | 0:d92f9d21154c | 2184 | |
wolfSSL | 0:d92f9d21154c | 2185 | /* eat end of line */ |
wolfSSL | 0:d92f9d21154c | 2186 | if (headerEnd[0] == '\n') |
wolfSSL | 0:d92f9d21154c | 2187 | headerEnd++; |
wolfSSL | 0:d92f9d21154c | 2188 | else if (headerEnd[1] == '\n') |
wolfSSL | 0:d92f9d21154c | 2189 | headerEnd += 2; |
wolfSSL | 0:d92f9d21154c | 2190 | else |
wolfSSL | 0:d92f9d21154c | 2191 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 2192 | |
wolfSSL | 0:d92f9d21154c | 2193 | if (type == PRIVATEKEY_TYPE) { |
wolfSSL | 0:d92f9d21154c | 2194 | if (eccKey) |
wolfSSL | 0:d92f9d21154c | 2195 | *eccKey = header == BEGIN_EC_PRIV; |
wolfSSL | 0:d92f9d21154c | 2196 | } |
wolfSSL | 0:d92f9d21154c | 2197 | |
wolfSSL | 0:d92f9d21154c | 2198 | #if defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER) |
wolfSSL | 0:d92f9d21154c | 2199 | { |
wolfSSL | 0:d92f9d21154c | 2200 | /* remove encrypted header if there */ |
wolfSSL | 0:d92f9d21154c | 2201 | char encHeader[] = "Proc-Type"; |
wolfSSL | 0:d92f9d21154c | 2202 | char* line = XSTRNSTR(headerEnd, encHeader, PEM_LINE_LEN); |
wolfSSL | 0:d92f9d21154c | 2203 | if (line) { |
wolfSSL | 0:d92f9d21154c | 2204 | char* newline; |
wolfSSL | 0:d92f9d21154c | 2205 | char* finish; |
wolfSSL | 0:d92f9d21154c | 2206 | char* start = XSTRNSTR(line, "DES", PEM_LINE_LEN); |
wolfSSL | 0:d92f9d21154c | 2207 | |
wolfSSL | 0:d92f9d21154c | 2208 | if (!start) |
wolfSSL | 0:d92f9d21154c | 2209 | start = XSTRNSTR(line, "AES", PEM_LINE_LEN); |
wolfSSL | 0:d92f9d21154c | 2210 | |
wolfSSL | 0:d92f9d21154c | 2211 | if (!start) return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 2212 | if (!info) return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 2213 | |
wolfSSL | 0:d92f9d21154c | 2214 | finish = XSTRNSTR(start, ",", PEM_LINE_LEN); |
wolfSSL | 0:d92f9d21154c | 2215 | |
wolfSSL | 0:d92f9d21154c | 2216 | if (start && finish && (start < finish)) { |
wolfSSL | 0:d92f9d21154c | 2217 | newline = XSTRNSTR(finish, "\r", PEM_LINE_LEN); |
wolfSSL | 0:d92f9d21154c | 2218 | |
wolfSSL | 0:d92f9d21154c | 2219 | XMEMCPY(info->name, start, finish - start); |
wolfSSL | 0:d92f9d21154c | 2220 | info->name[finish - start] = 0; |
wolfSSL | 0:d92f9d21154c | 2221 | XMEMCPY(info->iv, finish + 1, sizeof(info->iv)); |
wolfSSL | 0:d92f9d21154c | 2222 | |
wolfSSL | 0:d92f9d21154c | 2223 | if (!newline) newline = XSTRNSTR(finish, "\n", PEM_LINE_LEN); |
wolfSSL | 0:d92f9d21154c | 2224 | if (newline && (newline > finish)) { |
wolfSSL | 0:d92f9d21154c | 2225 | info->ivSz = (word32)(newline - (finish + 1)); |
wolfSSL | 0:d92f9d21154c | 2226 | info->set = 1; |
wolfSSL | 0:d92f9d21154c | 2227 | } |
wolfSSL | 0:d92f9d21154c | 2228 | else |
wolfSSL | 0:d92f9d21154c | 2229 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 2230 | } |
wolfSSL | 0:d92f9d21154c | 2231 | else |
wolfSSL | 0:d92f9d21154c | 2232 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 2233 | |
wolfSSL | 0:d92f9d21154c | 2234 | /* eat blank line */ |
wolfSSL | 0:d92f9d21154c | 2235 | while (*newline == '\r' || *newline == '\n') |
wolfSSL | 0:d92f9d21154c | 2236 | newline++; |
wolfSSL | 0:d92f9d21154c | 2237 | headerEnd = newline; |
wolfSSL | 0:d92f9d21154c | 2238 | } |
wolfSSL | 0:d92f9d21154c | 2239 | } |
wolfSSL | 0:d92f9d21154c | 2240 | #endif /* OPENSSL_EXTRA || HAVE_WEBSERVER */ |
wolfSSL | 0:d92f9d21154c | 2241 | |
wolfSSL | 0:d92f9d21154c | 2242 | /* find footer */ |
wolfSSL | 0:d92f9d21154c | 2243 | footerEnd = XSTRNSTR((char*)buff, footer, sz); |
wolfSSL | 0:d92f9d21154c | 2244 | if (!footerEnd) |
wolfSSL | 0:d92f9d21154c | 2245 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 2246 | |
wolfSSL | 0:d92f9d21154c | 2247 | consumedEnd = footerEnd + XSTRLEN(footer); |
wolfSSL | 0:d92f9d21154c | 2248 | |
wolfSSL | 0:d92f9d21154c | 2249 | if (consumedEnd < bufferEnd) { /* handle no end of line on last line */ |
wolfSSL | 0:d92f9d21154c | 2250 | /* eat end of line */ |
wolfSSL | 0:d92f9d21154c | 2251 | if (consumedEnd[0] == '\n') |
wolfSSL | 0:d92f9d21154c | 2252 | consumedEnd++; |
wolfSSL | 0:d92f9d21154c | 2253 | else if (consumedEnd[1] == '\n') |
wolfSSL | 0:d92f9d21154c | 2254 | consumedEnd += 2; |
wolfSSL | 0:d92f9d21154c | 2255 | else |
wolfSSL | 0:d92f9d21154c | 2256 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 2257 | } |
wolfSSL | 0:d92f9d21154c | 2258 | |
wolfSSL | 0:d92f9d21154c | 2259 | if (info) |
wolfSSL | 0:d92f9d21154c | 2260 | info->consumed = (long)(consumedEnd - (char*)buff); |
wolfSSL | 0:d92f9d21154c | 2261 | |
wolfSSL | 0:d92f9d21154c | 2262 | /* set up der buffer */ |
wolfSSL | 0:d92f9d21154c | 2263 | neededSz = (long)(footerEnd - headerEnd); |
wolfSSL | 0:d92f9d21154c | 2264 | if (neededSz > sz || neededSz < 0) |
wolfSSL | 0:d92f9d21154c | 2265 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 2266 | |
wolfSSL | 0:d92f9d21154c | 2267 | der->buffer = (byte*)XMALLOC(neededSz, heap, dynamicType); |
wolfSSL | 0:d92f9d21154c | 2268 | if (!der->buffer) |
wolfSSL | 0:d92f9d21154c | 2269 | return MEMORY_ERROR; |
wolfSSL | 0:d92f9d21154c | 2270 | |
wolfSSL | 0:d92f9d21154c | 2271 | der->length = (word32)neededSz; |
wolfSSL | 0:d92f9d21154c | 2272 | |
wolfSSL | 0:d92f9d21154c | 2273 | if (Base64_Decode((byte*)headerEnd, (word32)neededSz, der->buffer, |
wolfSSL | 0:d92f9d21154c | 2274 | &der->length) < 0) |
wolfSSL | 0:d92f9d21154c | 2275 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 2276 | |
wolfSSL | 0:d92f9d21154c | 2277 | if (header == BEGIN_PRIV_KEY) { |
wolfSSL | 0:d92f9d21154c | 2278 | /* pkcs8 key, convert and adjust length */ |
wolfSSL | 0:d92f9d21154c | 2279 | if ((ret = ToTraditional(der->buffer, der->length)) < 0) |
wolfSSL | 0:d92f9d21154c | 2280 | return ret; |
wolfSSL | 0:d92f9d21154c | 2281 | |
wolfSSL | 0:d92f9d21154c | 2282 | der->length = ret; |
wolfSSL | 0:d92f9d21154c | 2283 | return 0; |
wolfSSL | 0:d92f9d21154c | 2284 | } |
wolfSSL | 0:d92f9d21154c | 2285 | |
wolfSSL | 0:d92f9d21154c | 2286 | #if (defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER)) && !defined(NO_PWDBASED) |
wolfSSL | 0:d92f9d21154c | 2287 | if (header == BEGIN_ENC_PRIV_KEY) { |
wolfSSL | 0:d92f9d21154c | 2288 | int passwordSz; |
wolfSSL | 0:d92f9d21154c | 2289 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2290 | char* password = NULL; |
wolfSSL | 0:d92f9d21154c | 2291 | #else |
wolfSSL | 0:d92f9d21154c | 2292 | char password[80]; |
wolfSSL | 0:d92f9d21154c | 2293 | #endif |
wolfSSL | 0:d92f9d21154c | 2294 | |
wolfSSL | 0:d92f9d21154c | 2295 | if (!info || !info->ctx || !info->ctx->passwd_cb) |
wolfSSL | 0:d92f9d21154c | 2296 | return SSL_BAD_FILE; /* no callback error */ |
wolfSSL | 0:d92f9d21154c | 2297 | |
wolfSSL | 0:d92f9d21154c | 2298 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2299 | password = (char*)XMALLOC(80, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2300 | if (password == NULL) |
wolfSSL | 0:d92f9d21154c | 2301 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 2302 | #endif |
wolfSSL | 0:d92f9d21154c | 2303 | passwordSz = info->ctx->passwd_cb(password, sizeof(password), 0, |
wolfSSL | 0:d92f9d21154c | 2304 | info->ctx->userdata); |
wolfSSL | 0:d92f9d21154c | 2305 | /* convert and adjust length */ |
wolfSSL | 0:d92f9d21154c | 2306 | ret = ToTraditionalEnc(der->buffer, der->length, password, passwordSz); |
wolfSSL | 0:d92f9d21154c | 2307 | |
wolfSSL | 0:d92f9d21154c | 2308 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2309 | XFREE(password, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2310 | #endif |
wolfSSL | 0:d92f9d21154c | 2311 | |
wolfSSL | 0:d92f9d21154c | 2312 | if (ret < 0) |
wolfSSL | 0:d92f9d21154c | 2313 | return ret; |
wolfSSL | 0:d92f9d21154c | 2314 | |
wolfSSL | 0:d92f9d21154c | 2315 | der->length = ret; |
wolfSSL | 0:d92f9d21154c | 2316 | return 0; |
wolfSSL | 0:d92f9d21154c | 2317 | } |
wolfSSL | 0:d92f9d21154c | 2318 | #endif |
wolfSSL | 0:d92f9d21154c | 2319 | |
wolfSSL | 0:d92f9d21154c | 2320 | return 0; |
wolfSSL | 0:d92f9d21154c | 2321 | } |
wolfSSL | 0:d92f9d21154c | 2322 | |
wolfSSL | 0:d92f9d21154c | 2323 | |
wolfSSL | 0:d92f9d21154c | 2324 | /* process the buffer buff, legnth sz, into ctx of format and type |
wolfSSL | 0:d92f9d21154c | 2325 | used tracks bytes consumed, userChain specifies a user cert chain |
wolfSSL | 0:d92f9d21154c | 2326 | to pass during the handshake */ |
wolfSSL | 0:d92f9d21154c | 2327 | static int ProcessBuffer(WOLFSSL_CTX* ctx, const unsigned char* buff, |
wolfSSL | 0:d92f9d21154c | 2328 | long sz, int format, int type, WOLFSSL* ssl, |
wolfSSL | 0:d92f9d21154c | 2329 | long* used, int userChain) |
wolfSSL | 0:d92f9d21154c | 2330 | { |
wolfSSL | 0:d92f9d21154c | 2331 | buffer der; /* holds DER or RAW (for NTRU) */ |
wolfSSL | 0:d92f9d21154c | 2332 | int ret; |
wolfSSL | 0:d92f9d21154c | 2333 | int dynamicType = 0; |
wolfSSL | 0:d92f9d21154c | 2334 | int eccKey = 0; |
wolfSSL | 0:d92f9d21154c | 2335 | int rsaKey = 0; |
wolfSSL | 0:d92f9d21154c | 2336 | void* heap = ctx ? ctx->heap : NULL; |
wolfSSL | 0:d92f9d21154c | 2337 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2338 | EncryptedInfo* info = NULL; |
wolfSSL | 0:d92f9d21154c | 2339 | #else |
wolfSSL | 0:d92f9d21154c | 2340 | EncryptedInfo info[1]; |
wolfSSL | 0:d92f9d21154c | 2341 | #endif |
wolfSSL | 0:d92f9d21154c | 2342 | |
wolfSSL | 0:d92f9d21154c | 2343 | (void)dynamicType; |
wolfSSL | 0:d92f9d21154c | 2344 | (void)rsaKey; |
wolfSSL | 0:d92f9d21154c | 2345 | |
wolfSSL | 0:d92f9d21154c | 2346 | if (used) |
wolfSSL | 0:d92f9d21154c | 2347 | *used = sz; /* used bytes default to sz, PEM chain may shorten*/ |
wolfSSL | 0:d92f9d21154c | 2348 | |
wolfSSL | 0:d92f9d21154c | 2349 | if (format != SSL_FILETYPE_ASN1 && format != SSL_FILETYPE_PEM |
wolfSSL | 0:d92f9d21154c | 2350 | && format != SSL_FILETYPE_RAW) |
wolfSSL | 0:d92f9d21154c | 2351 | return SSL_BAD_FILETYPE; |
wolfSSL | 0:d92f9d21154c | 2352 | |
wolfSSL | 0:d92f9d21154c | 2353 | if (ctx == NULL && ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 2354 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 2355 | |
wolfSSL | 0:d92f9d21154c | 2356 | if (type == CA_TYPE) |
wolfSSL | 0:d92f9d21154c | 2357 | dynamicType = DYNAMIC_TYPE_CA; |
wolfSSL | 0:d92f9d21154c | 2358 | else if (type == CERT_TYPE) |
wolfSSL | 0:d92f9d21154c | 2359 | dynamicType = DYNAMIC_TYPE_CERT; |
wolfSSL | 0:d92f9d21154c | 2360 | else |
wolfSSL | 0:d92f9d21154c | 2361 | dynamicType = DYNAMIC_TYPE_KEY; |
wolfSSL | 0:d92f9d21154c | 2362 | |
wolfSSL | 0:d92f9d21154c | 2363 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2364 | info = (EncryptedInfo*)XMALLOC(sizeof(EncryptedInfo), NULL, |
wolfSSL | 0:d92f9d21154c | 2365 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2366 | if (info == NULL) |
wolfSSL | 0:d92f9d21154c | 2367 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 2368 | #endif |
wolfSSL | 0:d92f9d21154c | 2369 | |
wolfSSL | 0:d92f9d21154c | 2370 | info->set = 0; |
wolfSSL | 0:d92f9d21154c | 2371 | info->ctx = ctx; |
wolfSSL | 0:d92f9d21154c | 2372 | info->consumed = 0; |
wolfSSL | 0:d92f9d21154c | 2373 | der.buffer = 0; |
wolfSSL | 0:d92f9d21154c | 2374 | |
wolfSSL | 0:d92f9d21154c | 2375 | if (format == SSL_FILETYPE_PEM) { |
wolfSSL | 0:d92f9d21154c | 2376 | ret = PemToDer(buff, sz, type, &der, heap, info, &eccKey); |
wolfSSL | 0:d92f9d21154c | 2377 | if (ret < 0) { |
wolfSSL | 0:d92f9d21154c | 2378 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2379 | XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2380 | #endif |
wolfSSL | 0:d92f9d21154c | 2381 | XFREE(der.buffer, heap, dynamicType); |
wolfSSL | 0:d92f9d21154c | 2382 | return ret; |
wolfSSL | 0:d92f9d21154c | 2383 | } |
wolfSSL | 0:d92f9d21154c | 2384 | |
wolfSSL | 0:d92f9d21154c | 2385 | if (used) |
wolfSSL | 0:d92f9d21154c | 2386 | *used = info->consumed; |
wolfSSL | 0:d92f9d21154c | 2387 | |
wolfSSL | 0:d92f9d21154c | 2388 | /* we may have a user cert chain, try to consume */ |
wolfSSL | 0:d92f9d21154c | 2389 | if (userChain && type == CERT_TYPE && info->consumed < sz) { |
wolfSSL | 0:d92f9d21154c | 2390 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2391 | byte staticBuffer[1]; /* force heap usage */ |
wolfSSL | 0:d92f9d21154c | 2392 | #else |
wolfSSL | 0:d92f9d21154c | 2393 | byte staticBuffer[FILE_BUFFER_SIZE]; /* tmp chain buffer */ |
wolfSSL | 0:d92f9d21154c | 2394 | #endif |
wolfSSL | 0:d92f9d21154c | 2395 | byte* chainBuffer = staticBuffer; |
wolfSSL | 0:d92f9d21154c | 2396 | byte* shrinked = NULL; /* shrinked to size chainBuffer |
wolfSSL | 0:d92f9d21154c | 2397 | * or staticBuffer */ |
wolfSSL | 0:d92f9d21154c | 2398 | int dynamicBuffer = 0; |
wolfSSL | 0:d92f9d21154c | 2399 | word32 bufferSz = sizeof(staticBuffer); |
wolfSSL | 0:d92f9d21154c | 2400 | long consumed = info->consumed; |
wolfSSL | 0:d92f9d21154c | 2401 | word32 idx = 0; |
wolfSSL | 0:d92f9d21154c | 2402 | int gotOne = 0; |
wolfSSL | 0:d92f9d21154c | 2403 | |
wolfSSL | 0:d92f9d21154c | 2404 | if ( (sz - consumed) > (int)bufferSz) { |
wolfSSL | 0:d92f9d21154c | 2405 | WOLFSSL_MSG("Growing Tmp Chain Buffer"); |
wolfSSL | 0:d92f9d21154c | 2406 | bufferSz = (word32)(sz - consumed); |
wolfSSL | 0:d92f9d21154c | 2407 | /* will shrink to actual size */ |
wolfSSL | 0:d92f9d21154c | 2408 | chainBuffer = (byte*)XMALLOC(bufferSz, heap, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 2409 | if (chainBuffer == NULL) { |
wolfSSL | 0:d92f9d21154c | 2410 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2411 | XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2412 | #endif |
wolfSSL | 0:d92f9d21154c | 2413 | XFREE(der.buffer, heap, dynamicType); |
wolfSSL | 0:d92f9d21154c | 2414 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 2415 | } |
wolfSSL | 0:d92f9d21154c | 2416 | dynamicBuffer = 1; |
wolfSSL | 0:d92f9d21154c | 2417 | } |
wolfSSL | 0:d92f9d21154c | 2418 | |
wolfSSL | 0:d92f9d21154c | 2419 | WOLFSSL_MSG("Processing Cert Chain"); |
wolfSSL | 0:d92f9d21154c | 2420 | while (consumed < sz) { |
wolfSSL | 0:d92f9d21154c | 2421 | buffer part; |
wolfSSL | 0:d92f9d21154c | 2422 | info->consumed = 0; |
wolfSSL | 0:d92f9d21154c | 2423 | part.buffer = 0; |
wolfSSL | 0:d92f9d21154c | 2424 | |
wolfSSL | 0:d92f9d21154c | 2425 | ret = PemToDer(buff + consumed, sz - consumed, type, &part, |
wolfSSL | 0:d92f9d21154c | 2426 | heap, info, &eccKey); |
wolfSSL | 0:d92f9d21154c | 2427 | if (ret == 0) { |
wolfSSL | 0:d92f9d21154c | 2428 | gotOne = 1; |
wolfSSL | 0:d92f9d21154c | 2429 | if ( (idx + part.length) > bufferSz) { |
wolfSSL | 0:d92f9d21154c | 2430 | WOLFSSL_MSG(" Cert Chain bigger than buffer"); |
wolfSSL | 0:d92f9d21154c | 2431 | ret = BUFFER_E; |
wolfSSL | 0:d92f9d21154c | 2432 | } |
wolfSSL | 0:d92f9d21154c | 2433 | else { |
wolfSSL | 0:d92f9d21154c | 2434 | c32to24(part.length, &chainBuffer[idx]); |
wolfSSL | 0:d92f9d21154c | 2435 | idx += CERT_HEADER_SZ; |
wolfSSL | 0:d92f9d21154c | 2436 | XMEMCPY(&chainBuffer[idx], part.buffer,part.length); |
wolfSSL | 0:d92f9d21154c | 2437 | idx += part.length; |
wolfSSL | 0:d92f9d21154c | 2438 | consumed += info->consumed; |
wolfSSL | 0:d92f9d21154c | 2439 | if (used) |
wolfSSL | 0:d92f9d21154c | 2440 | *used += info->consumed; |
wolfSSL | 0:d92f9d21154c | 2441 | } |
wolfSSL | 0:d92f9d21154c | 2442 | } |
wolfSSL | 0:d92f9d21154c | 2443 | |
wolfSSL | 0:d92f9d21154c | 2444 | XFREE(part.buffer, heap, dynamicType); |
wolfSSL | 0:d92f9d21154c | 2445 | |
wolfSSL | 0:d92f9d21154c | 2446 | if (ret == SSL_NO_PEM_HEADER && gotOne) { |
wolfSSL | 0:d92f9d21154c | 2447 | WOLFSSL_MSG("We got one good PEM so stuff at end ok"); |
wolfSSL | 0:d92f9d21154c | 2448 | break; |
wolfSSL | 0:d92f9d21154c | 2449 | } |
wolfSSL | 0:d92f9d21154c | 2450 | |
wolfSSL | 0:d92f9d21154c | 2451 | if (ret < 0) { |
wolfSSL | 0:d92f9d21154c | 2452 | WOLFSSL_MSG(" Error in Cert in Chain"); |
wolfSSL | 0:d92f9d21154c | 2453 | if (dynamicBuffer) |
wolfSSL | 0:d92f9d21154c | 2454 | XFREE(chainBuffer, heap, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 2455 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2456 | XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2457 | #endif |
wolfSSL | 0:d92f9d21154c | 2458 | XFREE(der.buffer, heap, dynamicType); |
wolfSSL | 0:d92f9d21154c | 2459 | return ret; |
wolfSSL | 0:d92f9d21154c | 2460 | } |
wolfSSL | 0:d92f9d21154c | 2461 | WOLFSSL_MSG(" Consumed another Cert in Chain"); |
wolfSSL | 0:d92f9d21154c | 2462 | } |
wolfSSL | 0:d92f9d21154c | 2463 | WOLFSSL_MSG("Finished Processing Cert Chain"); |
wolfSSL | 0:d92f9d21154c | 2464 | |
wolfSSL | 0:d92f9d21154c | 2465 | /* only retain actual size used */ |
wolfSSL | 0:d92f9d21154c | 2466 | shrinked = (byte*)XMALLOC(idx, heap, dynamicType); |
wolfSSL | 0:d92f9d21154c | 2467 | if (shrinked) { |
wolfSSL | 0:d92f9d21154c | 2468 | if (ssl) { |
wolfSSL | 0:d92f9d21154c | 2469 | if (ssl->buffers.certChain.buffer && |
wolfSSL | 0:d92f9d21154c | 2470 | ssl->buffers.weOwnCertChain) { |
wolfSSL | 0:d92f9d21154c | 2471 | XFREE(ssl->buffers.certChain.buffer, heap, |
wolfSSL | 0:d92f9d21154c | 2472 | dynamicType); |
wolfSSL | 0:d92f9d21154c | 2473 | } |
wolfSSL | 0:d92f9d21154c | 2474 | ssl->buffers.certChain.buffer = shrinked; |
wolfSSL | 0:d92f9d21154c | 2475 | ssl->buffers.certChain.length = idx; |
wolfSSL | 0:d92f9d21154c | 2476 | XMEMCPY(ssl->buffers.certChain.buffer, chainBuffer,idx); |
wolfSSL | 0:d92f9d21154c | 2477 | ssl->buffers.weOwnCertChain = 1; |
wolfSSL | 0:d92f9d21154c | 2478 | } else if (ctx) { |
wolfSSL | 0:d92f9d21154c | 2479 | if (ctx->certChain.buffer) |
wolfSSL | 0:d92f9d21154c | 2480 | XFREE(ctx->certChain.buffer, heap, dynamicType); |
wolfSSL | 0:d92f9d21154c | 2481 | ctx->certChain.buffer = shrinked; |
wolfSSL | 0:d92f9d21154c | 2482 | ctx->certChain.length = idx; |
wolfSSL | 0:d92f9d21154c | 2483 | XMEMCPY(ctx->certChain.buffer, chainBuffer, idx); |
wolfSSL | 0:d92f9d21154c | 2484 | } |
wolfSSL | 0:d92f9d21154c | 2485 | } |
wolfSSL | 0:d92f9d21154c | 2486 | |
wolfSSL | 0:d92f9d21154c | 2487 | if (dynamicBuffer) |
wolfSSL | 0:d92f9d21154c | 2488 | XFREE(chainBuffer, heap, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 2489 | |
wolfSSL | 0:d92f9d21154c | 2490 | if (shrinked == NULL) { |
wolfSSL | 0:d92f9d21154c | 2491 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2492 | XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2493 | #endif |
wolfSSL | 0:d92f9d21154c | 2494 | XFREE(der.buffer, heap, dynamicType); |
wolfSSL | 0:d92f9d21154c | 2495 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 2496 | } |
wolfSSL | 0:d92f9d21154c | 2497 | } |
wolfSSL | 0:d92f9d21154c | 2498 | } |
wolfSSL | 0:d92f9d21154c | 2499 | else { /* ASN1 (DER) or RAW (NTRU) */ |
wolfSSL | 0:d92f9d21154c | 2500 | der.buffer = (byte*) XMALLOC(sz, heap, dynamicType); |
wolfSSL | 0:d92f9d21154c | 2501 | if (!der.buffer) { |
wolfSSL | 0:d92f9d21154c | 2502 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2503 | XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2504 | #endif |
wolfSSL | 0:d92f9d21154c | 2505 | return MEMORY_ERROR; |
wolfSSL | 0:d92f9d21154c | 2506 | } |
wolfSSL | 0:d92f9d21154c | 2507 | |
wolfSSL | 0:d92f9d21154c | 2508 | XMEMCPY(der.buffer, buff, sz); |
wolfSSL | 0:d92f9d21154c | 2509 | der.length = (word32)sz; |
wolfSSL | 0:d92f9d21154c | 2510 | } |
wolfSSL | 0:d92f9d21154c | 2511 | |
wolfSSL | 0:d92f9d21154c | 2512 | #if defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER) |
wolfSSL | 0:d92f9d21154c | 2513 | if (info->set) { |
wolfSSL | 0:d92f9d21154c | 2514 | /* decrypt */ |
wolfSSL | 0:d92f9d21154c | 2515 | int passwordSz; |
wolfSSL | 0:d92f9d21154c | 2516 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2517 | char* password = NULL; |
wolfSSL | 0:d92f9d21154c | 2518 | byte* key = NULL; |
wolfSSL | 0:d92f9d21154c | 2519 | byte* iv = NULL; |
wolfSSL | 0:d92f9d21154c | 2520 | #else |
wolfSSL | 0:d92f9d21154c | 2521 | char password[80]; |
wolfSSL | 0:d92f9d21154c | 2522 | byte key[AES_256_KEY_SIZE]; |
wolfSSL | 0:d92f9d21154c | 2523 | #ifndef NO_MD5 |
wolfSSL | 0:d92f9d21154c | 2524 | byte iv[AES_IV_SIZE]; |
wolfSSL | 0:d92f9d21154c | 2525 | #endif |
wolfSSL | 0:d92f9d21154c | 2526 | #endif |
wolfSSL | 0:d92f9d21154c | 2527 | |
wolfSSL | 0:d92f9d21154c | 2528 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2529 | password = (char*)XMALLOC(80, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2530 | key = (byte*)XMALLOC(AES_256_KEY_SIZE, NULL, |
wolfSSL | 0:d92f9d21154c | 2531 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2532 | iv = (byte*)XMALLOC(AES_IV_SIZE, NULL, |
wolfSSL | 0:d92f9d21154c | 2533 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2534 | |
wolfSSL | 0:d92f9d21154c | 2535 | if (password == NULL || key == NULL || iv == NULL) { |
wolfSSL | 0:d92f9d21154c | 2536 | XFREE(password, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2537 | XFREE(key, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2538 | XFREE(iv, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2539 | ret = MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 2540 | } |
wolfSSL | 0:d92f9d21154c | 2541 | else |
wolfSSL | 0:d92f9d21154c | 2542 | #endif |
wolfSSL | 0:d92f9d21154c | 2543 | if (!ctx || !ctx->passwd_cb) { |
wolfSSL | 0:d92f9d21154c | 2544 | ret = NO_PASSWORD; |
wolfSSL | 0:d92f9d21154c | 2545 | } |
wolfSSL | 0:d92f9d21154c | 2546 | else { |
wolfSSL | 0:d92f9d21154c | 2547 | passwordSz = ctx->passwd_cb(password, sizeof(password), 0, |
wolfSSL | 0:d92f9d21154c | 2548 | ctx->userdata); |
wolfSSL | 0:d92f9d21154c | 2549 | |
wolfSSL | 0:d92f9d21154c | 2550 | /* use file's salt for key derivation, hex decode first */ |
wolfSSL | 0:d92f9d21154c | 2551 | if (Base16_Decode(info->iv, info->ivSz, info->iv, &info->ivSz) |
wolfSSL | 0:d92f9d21154c | 2552 | != 0) { |
wolfSSL | 0:d92f9d21154c | 2553 | ret = ASN_INPUT_E; |
wolfSSL | 0:d92f9d21154c | 2554 | } |
wolfSSL | 0:d92f9d21154c | 2555 | #ifndef NO_MD5 |
wolfSSL | 0:d92f9d21154c | 2556 | else if ((ret = EVP_BytesToKey(info->name, "MD5", info->iv, |
wolfSSL | 0:d92f9d21154c | 2557 | (byte*)password, passwordSz, 1, key, iv)) <= 0) { |
wolfSSL | 0:d92f9d21154c | 2558 | /* empty */ |
wolfSSL | 0:d92f9d21154c | 2559 | } |
wolfSSL | 0:d92f9d21154c | 2560 | #endif |
wolfSSL | 0:d92f9d21154c | 2561 | #ifndef NO_DES3 |
wolfSSL | 0:d92f9d21154c | 2562 | else if (XSTRNCMP(info->name, "DES-CBC", 7) == 0) { |
wolfSSL | 0:d92f9d21154c | 2563 | ret = wc_Des_CbcDecryptWithKey(der.buffer, der.buffer, der.length, |
wolfSSL | 0:d92f9d21154c | 2564 | key, info->iv); |
wolfSSL | 0:d92f9d21154c | 2565 | } |
wolfSSL | 0:d92f9d21154c | 2566 | else if (XSTRNCMP(info->name, "DES-EDE3-CBC", 13) == 0) { |
wolfSSL | 0:d92f9d21154c | 2567 | ret = wc_Des3_CbcDecryptWithKey(der.buffer, der.buffer, der.length, |
wolfSSL | 0:d92f9d21154c | 2568 | key, info->iv); |
wolfSSL | 0:d92f9d21154c | 2569 | } |
wolfSSL | 0:d92f9d21154c | 2570 | #endif |
wolfSSL | 0:d92f9d21154c | 2571 | #ifndef NO_AES |
wolfSSL | 0:d92f9d21154c | 2572 | else if (XSTRNCMP(info->name, "AES-128-CBC", 13) == 0) { |
wolfSSL | 0:d92f9d21154c | 2573 | ret = wc_AesCbcDecryptWithKey(der.buffer, der.buffer, der.length, |
wolfSSL | 0:d92f9d21154c | 2574 | key, AES_128_KEY_SIZE, info->iv); |
wolfSSL | 0:d92f9d21154c | 2575 | } |
wolfSSL | 0:d92f9d21154c | 2576 | else if (XSTRNCMP(info->name, "AES-192-CBC", 13) == 0) { |
wolfSSL | 0:d92f9d21154c | 2577 | ret = wc_AesCbcDecryptWithKey(der.buffer, der.buffer, der.length, |
wolfSSL | 0:d92f9d21154c | 2578 | key, AES_192_KEY_SIZE, info->iv); |
wolfSSL | 0:d92f9d21154c | 2579 | } |
wolfSSL | 0:d92f9d21154c | 2580 | else if (XSTRNCMP(info->name, "AES-256-CBC", 13) == 0) { |
wolfSSL | 0:d92f9d21154c | 2581 | ret = wc_AesCbcDecryptWithKey(der.buffer, der.buffer, der.length, |
wolfSSL | 0:d92f9d21154c | 2582 | key, AES_256_KEY_SIZE, info->iv); |
wolfSSL | 0:d92f9d21154c | 2583 | } |
wolfSSL | 0:d92f9d21154c | 2584 | #endif |
wolfSSL | 0:d92f9d21154c | 2585 | else { |
wolfSSL | 0:d92f9d21154c | 2586 | ret = SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 2587 | } |
wolfSSL | 0:d92f9d21154c | 2588 | } |
wolfSSL | 0:d92f9d21154c | 2589 | |
wolfSSL | 0:d92f9d21154c | 2590 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2591 | XFREE(password, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2592 | XFREE(key, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2593 | XFREE(iv, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2594 | #endif |
wolfSSL | 0:d92f9d21154c | 2595 | |
wolfSSL | 0:d92f9d21154c | 2596 | if (ret != 0) { |
wolfSSL | 0:d92f9d21154c | 2597 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2598 | XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2599 | #endif |
wolfSSL | 0:d92f9d21154c | 2600 | XFREE(der.buffer, heap, dynamicType); |
wolfSSL | 0:d92f9d21154c | 2601 | return ret; |
wolfSSL | 0:d92f9d21154c | 2602 | } |
wolfSSL | 0:d92f9d21154c | 2603 | } |
wolfSSL | 0:d92f9d21154c | 2604 | #endif /* OPENSSL_EXTRA || HAVE_WEBSERVER */ |
wolfSSL | 0:d92f9d21154c | 2605 | |
wolfSSL | 0:d92f9d21154c | 2606 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2607 | XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2608 | #endif |
wolfSSL | 0:d92f9d21154c | 2609 | |
wolfSSL | 0:d92f9d21154c | 2610 | if (type == CA_TYPE) { |
wolfSSL | 0:d92f9d21154c | 2611 | if (ctx == NULL) { |
wolfSSL | 0:d92f9d21154c | 2612 | WOLFSSL_MSG("Need context for CA load"); |
wolfSSL | 0:d92f9d21154c | 2613 | XFREE(der.buffer, heap, dynamicType); |
wolfSSL | 0:d92f9d21154c | 2614 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 2615 | } |
wolfSSL | 0:d92f9d21154c | 2616 | return AddCA(ctx->cm, der, WOLFSSL_USER_CA, ctx->verifyPeer); |
wolfSSL | 0:d92f9d21154c | 2617 | /* takes der over */ |
wolfSSL | 0:d92f9d21154c | 2618 | } |
wolfSSL | 0:d92f9d21154c | 2619 | else if (type == CERT_TYPE) { |
wolfSSL | 0:d92f9d21154c | 2620 | if (ssl) { |
wolfSSL | 0:d92f9d21154c | 2621 | if (ssl->buffers.weOwnCert && ssl->buffers.certificate.buffer) |
wolfSSL | 0:d92f9d21154c | 2622 | XFREE(ssl->buffers.certificate.buffer, heap, dynamicType); |
wolfSSL | 0:d92f9d21154c | 2623 | ssl->buffers.certificate = der; |
wolfSSL | 0:d92f9d21154c | 2624 | ssl->buffers.weOwnCert = 1; |
wolfSSL | 0:d92f9d21154c | 2625 | } |
wolfSSL | 0:d92f9d21154c | 2626 | else if (ctx) { |
wolfSSL | 0:d92f9d21154c | 2627 | if (ctx->certificate.buffer) |
wolfSSL | 0:d92f9d21154c | 2628 | XFREE(ctx->certificate.buffer, heap, dynamicType); |
wolfSSL | 0:d92f9d21154c | 2629 | ctx->certificate = der; /* takes der over */ |
wolfSSL | 0:d92f9d21154c | 2630 | } |
wolfSSL | 0:d92f9d21154c | 2631 | } |
wolfSSL | 0:d92f9d21154c | 2632 | else if (type == PRIVATEKEY_TYPE) { |
wolfSSL | 0:d92f9d21154c | 2633 | if (ssl) { |
wolfSSL | 0:d92f9d21154c | 2634 | if (ssl->buffers.weOwnKey && ssl->buffers.key.buffer) |
wolfSSL | 0:d92f9d21154c | 2635 | XFREE(ssl->buffers.key.buffer, heap, dynamicType); |
wolfSSL | 0:d92f9d21154c | 2636 | ssl->buffers.key = der; |
wolfSSL | 0:d92f9d21154c | 2637 | ssl->buffers.weOwnKey = 1; |
wolfSSL | 0:d92f9d21154c | 2638 | } |
wolfSSL | 0:d92f9d21154c | 2639 | else if (ctx) { |
wolfSSL | 0:d92f9d21154c | 2640 | if (ctx->privateKey.buffer) |
wolfSSL | 0:d92f9d21154c | 2641 | XFREE(ctx->privateKey.buffer, heap, dynamicType); |
wolfSSL | 0:d92f9d21154c | 2642 | ctx->privateKey = der; /* takes der over */ |
wolfSSL | 0:d92f9d21154c | 2643 | } |
wolfSSL | 0:d92f9d21154c | 2644 | } |
wolfSSL | 0:d92f9d21154c | 2645 | else { |
wolfSSL | 0:d92f9d21154c | 2646 | XFREE(der.buffer, heap, dynamicType); |
wolfSSL | 0:d92f9d21154c | 2647 | return SSL_BAD_CERTTYPE; |
wolfSSL | 0:d92f9d21154c | 2648 | } |
wolfSSL | 0:d92f9d21154c | 2649 | |
wolfSSL | 0:d92f9d21154c | 2650 | if (type == PRIVATEKEY_TYPE && format != SSL_FILETYPE_RAW) { |
wolfSSL | 0:d92f9d21154c | 2651 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 2652 | if (!eccKey) { |
wolfSSL | 0:d92f9d21154c | 2653 | /* make sure RSA key can be used */ |
wolfSSL | 0:d92f9d21154c | 2654 | word32 idx = 0; |
wolfSSL | 0:d92f9d21154c | 2655 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2656 | RsaKey* key = NULL; |
wolfSSL | 0:d92f9d21154c | 2657 | #else |
wolfSSL | 0:d92f9d21154c | 2658 | RsaKey key[1]; |
wolfSSL | 0:d92f9d21154c | 2659 | #endif |
wolfSSL | 0:d92f9d21154c | 2660 | |
wolfSSL | 0:d92f9d21154c | 2661 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2662 | key = (RsaKey*)XMALLOC(sizeof(RsaKey), NULL, |
wolfSSL | 0:d92f9d21154c | 2663 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2664 | if (key == NULL) |
wolfSSL | 0:d92f9d21154c | 2665 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 2666 | #endif |
wolfSSL | 0:d92f9d21154c | 2667 | |
wolfSSL | 0:d92f9d21154c | 2668 | ret = wc_InitRsaKey(key, 0); |
wolfSSL | 0:d92f9d21154c | 2669 | if (ret == 0) { |
wolfSSL | 0:d92f9d21154c | 2670 | if (wc_RsaPrivateKeyDecode(der.buffer, &idx, key, der.length) != |
wolfSSL | 0:d92f9d21154c | 2671 | 0) { |
wolfSSL | 0:d92f9d21154c | 2672 | #ifdef HAVE_ECC |
wolfSSL | 0:d92f9d21154c | 2673 | /* could have DER ECC (or pkcs8 ecc), no easy way to tell */ |
wolfSSL | 0:d92f9d21154c | 2674 | eccKey = 1; /* so try it out */ |
wolfSSL | 0:d92f9d21154c | 2675 | #endif |
wolfSSL | 0:d92f9d21154c | 2676 | if (!eccKey) |
wolfSSL | 0:d92f9d21154c | 2677 | ret = SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 2678 | } else { |
wolfSSL | 0:d92f9d21154c | 2679 | rsaKey = 1; |
wolfSSL | 0:d92f9d21154c | 2680 | (void)rsaKey; /* for no ecc builds */ |
wolfSSL | 0:d92f9d21154c | 2681 | } |
wolfSSL | 0:d92f9d21154c | 2682 | } |
wolfSSL | 0:d92f9d21154c | 2683 | |
wolfSSL | 0:d92f9d21154c | 2684 | wc_FreeRsaKey(key); |
wolfSSL | 0:d92f9d21154c | 2685 | |
wolfSSL | 0:d92f9d21154c | 2686 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2687 | XFREE(key, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2688 | #endif |
wolfSSL | 0:d92f9d21154c | 2689 | |
wolfSSL | 0:d92f9d21154c | 2690 | if (ret != 0) |
wolfSSL | 0:d92f9d21154c | 2691 | return ret; |
wolfSSL | 0:d92f9d21154c | 2692 | } |
wolfSSL | 0:d92f9d21154c | 2693 | #endif |
wolfSSL | 0:d92f9d21154c | 2694 | #ifdef HAVE_ECC |
wolfSSL | 0:d92f9d21154c | 2695 | if (!rsaKey) { |
wolfSSL | 0:d92f9d21154c | 2696 | /* make sure ECC key can be used */ |
wolfSSL | 0:d92f9d21154c | 2697 | word32 idx = 0; |
wolfSSL | 0:d92f9d21154c | 2698 | ecc_key key; |
wolfSSL | 0:d92f9d21154c | 2699 | |
wolfSSL | 0:d92f9d21154c | 2700 | wc_ecc_init(&key); |
wolfSSL | 0:d92f9d21154c | 2701 | if (wc_EccPrivateKeyDecode(der.buffer,&idx,&key,der.length) != 0) { |
wolfSSL | 0:d92f9d21154c | 2702 | wc_ecc_free(&key); |
wolfSSL | 0:d92f9d21154c | 2703 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 2704 | } |
wolfSSL | 0:d92f9d21154c | 2705 | wc_ecc_free(&key); |
wolfSSL | 0:d92f9d21154c | 2706 | eccKey = 1; |
wolfSSL | 0:d92f9d21154c | 2707 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 2708 | ctx->haveStaticECC = 1; |
wolfSSL | 0:d92f9d21154c | 2709 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 2710 | ssl->options.haveStaticECC = 1; |
wolfSSL | 0:d92f9d21154c | 2711 | } |
wolfSSL | 0:d92f9d21154c | 2712 | #endif /* HAVE_ECC */ |
wolfSSL | 0:d92f9d21154c | 2713 | } |
wolfSSL | 0:d92f9d21154c | 2714 | else if (type == CERT_TYPE) { |
wolfSSL | 0:d92f9d21154c | 2715 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2716 | DecodedCert* cert = NULL; |
wolfSSL | 0:d92f9d21154c | 2717 | #else |
wolfSSL | 0:d92f9d21154c | 2718 | DecodedCert cert[1]; |
wolfSSL | 0:d92f9d21154c | 2719 | #endif |
wolfSSL | 0:d92f9d21154c | 2720 | |
wolfSSL | 0:d92f9d21154c | 2721 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2722 | cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL, |
wolfSSL | 0:d92f9d21154c | 2723 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2724 | if (cert == NULL) |
wolfSSL | 0:d92f9d21154c | 2725 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 2726 | #endif |
wolfSSL | 0:d92f9d21154c | 2727 | |
wolfSSL | 0:d92f9d21154c | 2728 | WOLFSSL_MSG("Checking cert signature type"); |
wolfSSL | 0:d92f9d21154c | 2729 | InitDecodedCert(cert, der.buffer, der.length, heap); |
wolfSSL | 0:d92f9d21154c | 2730 | |
wolfSSL | 0:d92f9d21154c | 2731 | if (DecodeToKey(cert, 0) < 0) { |
wolfSSL | 0:d92f9d21154c | 2732 | WOLFSSL_MSG("Decode to key failed"); |
wolfSSL | 0:d92f9d21154c | 2733 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2734 | XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2735 | #endif |
wolfSSL | 0:d92f9d21154c | 2736 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 2737 | } |
wolfSSL | 0:d92f9d21154c | 2738 | switch (cert->signatureOID) { |
wolfSSL | 0:d92f9d21154c | 2739 | case CTC_SHAwECDSA: |
wolfSSL | 0:d92f9d21154c | 2740 | case CTC_SHA256wECDSA: |
wolfSSL | 0:d92f9d21154c | 2741 | case CTC_SHA384wECDSA: |
wolfSSL | 0:d92f9d21154c | 2742 | case CTC_SHA512wECDSA: |
wolfSSL | 0:d92f9d21154c | 2743 | WOLFSSL_MSG("ECDSA cert signature"); |
wolfSSL | 0:d92f9d21154c | 2744 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 2745 | ctx->haveECDSAsig = 1; |
wolfSSL | 0:d92f9d21154c | 2746 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 2747 | ssl->options.haveECDSAsig = 1; |
wolfSSL | 0:d92f9d21154c | 2748 | break; |
wolfSSL | 0:d92f9d21154c | 2749 | default: |
wolfSSL | 0:d92f9d21154c | 2750 | WOLFSSL_MSG("Not ECDSA cert signature"); |
wolfSSL | 0:d92f9d21154c | 2751 | break; |
wolfSSL | 0:d92f9d21154c | 2752 | } |
wolfSSL | 0:d92f9d21154c | 2753 | |
wolfSSL | 0:d92f9d21154c | 2754 | #ifdef HAVE_ECC |
wolfSSL | 0:d92f9d21154c | 2755 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 2756 | ctx->pkCurveOID = cert->pkCurveOID; |
wolfSSL | 0:d92f9d21154c | 2757 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 2758 | ssl->pkCurveOID = cert->pkCurveOID; |
wolfSSL | 0:d92f9d21154c | 2759 | #endif |
wolfSSL | 0:d92f9d21154c | 2760 | |
wolfSSL | 0:d92f9d21154c | 2761 | FreeDecodedCert(cert); |
wolfSSL | 0:d92f9d21154c | 2762 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2763 | XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2764 | #endif |
wolfSSL | 0:d92f9d21154c | 2765 | } |
wolfSSL | 0:d92f9d21154c | 2766 | |
wolfSSL | 0:d92f9d21154c | 2767 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 2768 | } |
wolfSSL | 0:d92f9d21154c | 2769 | |
wolfSSL | 0:d92f9d21154c | 2770 | |
wolfSSL | 0:d92f9d21154c | 2771 | /* CA PEM file for verification, may have multiple/chain certs to process */ |
wolfSSL | 0:d92f9d21154c | 2772 | static int ProcessChainBuffer(WOLFSSL_CTX* ctx, const unsigned char* buff, |
wolfSSL | 0:d92f9d21154c | 2773 | long sz, int format, int type, WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 2774 | { |
wolfSSL | 0:d92f9d21154c | 2775 | long used = 0; |
wolfSSL | 0:d92f9d21154c | 2776 | int ret = 0; |
wolfSSL | 0:d92f9d21154c | 2777 | int gotOne = 0; |
wolfSSL | 0:d92f9d21154c | 2778 | |
wolfSSL | 0:d92f9d21154c | 2779 | WOLFSSL_MSG("Processing CA PEM file"); |
wolfSSL | 0:d92f9d21154c | 2780 | while (used < sz) { |
wolfSSL | 0:d92f9d21154c | 2781 | long consumed = 0; |
wolfSSL | 0:d92f9d21154c | 2782 | |
wolfSSL | 0:d92f9d21154c | 2783 | ret = ProcessBuffer(ctx, buff + used, sz - used, format, type, ssl, |
wolfSSL | 0:d92f9d21154c | 2784 | &consumed, 0); |
wolfSSL | 0:d92f9d21154c | 2785 | |
wolfSSL | 0:d92f9d21154c | 2786 | if (ret == SSL_NO_PEM_HEADER && gotOne) { |
wolfSSL | 0:d92f9d21154c | 2787 | WOLFSSL_MSG("We got one good PEM file so stuff at end ok"); |
wolfSSL | 0:d92f9d21154c | 2788 | ret = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 2789 | break; |
wolfSSL | 0:d92f9d21154c | 2790 | } |
wolfSSL | 0:d92f9d21154c | 2791 | |
wolfSSL | 0:d92f9d21154c | 2792 | if (ret < 0) |
wolfSSL | 0:d92f9d21154c | 2793 | break; |
wolfSSL | 0:d92f9d21154c | 2794 | |
wolfSSL | 0:d92f9d21154c | 2795 | WOLFSSL_MSG(" Processed a CA"); |
wolfSSL | 0:d92f9d21154c | 2796 | gotOne = 1; |
wolfSSL | 0:d92f9d21154c | 2797 | used += consumed; |
wolfSSL | 0:d92f9d21154c | 2798 | } |
wolfSSL | 0:d92f9d21154c | 2799 | |
wolfSSL | 0:d92f9d21154c | 2800 | return ret; |
wolfSSL | 0:d92f9d21154c | 2801 | } |
wolfSSL | 0:d92f9d21154c | 2802 | |
wolfSSL | 0:d92f9d21154c | 2803 | |
wolfSSL | 0:d92f9d21154c | 2804 | /* Verify the ceritficate, SSL_SUCCESS for ok, < 0 for error */ |
wolfSSL | 0:d92f9d21154c | 2805 | int wolfSSL_CertManagerVerifyBuffer(WOLFSSL_CERT_MANAGER* cm, const byte* buff, |
wolfSSL | 0:d92f9d21154c | 2806 | long sz, int format) |
wolfSSL | 0:d92f9d21154c | 2807 | { |
wolfSSL | 0:d92f9d21154c | 2808 | int ret = 0; |
wolfSSL | 0:d92f9d21154c | 2809 | buffer der; |
wolfSSL | 0:d92f9d21154c | 2810 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2811 | DecodedCert* cert = NULL; |
wolfSSL | 0:d92f9d21154c | 2812 | #else |
wolfSSL | 0:d92f9d21154c | 2813 | DecodedCert cert[1]; |
wolfSSL | 0:d92f9d21154c | 2814 | #endif |
wolfSSL | 0:d92f9d21154c | 2815 | |
wolfSSL | 0:d92f9d21154c | 2816 | WOLFSSL_ENTER("wolfSSL_CertManagerVerifyBuffer"); |
wolfSSL | 0:d92f9d21154c | 2817 | |
wolfSSL | 0:d92f9d21154c | 2818 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2819 | cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL, |
wolfSSL | 0:d92f9d21154c | 2820 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2821 | if (cert == NULL) |
wolfSSL | 0:d92f9d21154c | 2822 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 2823 | #endif |
wolfSSL | 0:d92f9d21154c | 2824 | |
wolfSSL | 0:d92f9d21154c | 2825 | der.buffer = NULL; |
wolfSSL | 0:d92f9d21154c | 2826 | der.length = 0; |
wolfSSL | 0:d92f9d21154c | 2827 | |
wolfSSL | 0:d92f9d21154c | 2828 | if (format == SSL_FILETYPE_PEM) { |
wolfSSL | 0:d92f9d21154c | 2829 | int eccKey = 0; /* not used */ |
wolfSSL | 0:d92f9d21154c | 2830 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2831 | EncryptedInfo* info = NULL; |
wolfSSL | 0:d92f9d21154c | 2832 | #else |
wolfSSL | 0:d92f9d21154c | 2833 | EncryptedInfo info[1]; |
wolfSSL | 0:d92f9d21154c | 2834 | #endif |
wolfSSL | 0:d92f9d21154c | 2835 | |
wolfSSL | 0:d92f9d21154c | 2836 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2837 | info = (EncryptedInfo*)XMALLOC(sizeof(EncryptedInfo), NULL, |
wolfSSL | 0:d92f9d21154c | 2838 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2839 | if (info == NULL) { |
wolfSSL | 0:d92f9d21154c | 2840 | XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2841 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 2842 | } |
wolfSSL | 0:d92f9d21154c | 2843 | #endif |
wolfSSL | 0:d92f9d21154c | 2844 | |
wolfSSL | 0:d92f9d21154c | 2845 | info->set = 0; |
wolfSSL | 0:d92f9d21154c | 2846 | info->ctx = NULL; |
wolfSSL | 0:d92f9d21154c | 2847 | info->consumed = 0; |
wolfSSL | 0:d92f9d21154c | 2848 | |
wolfSSL | 0:d92f9d21154c | 2849 | ret = PemToDer(buff, sz, CERT_TYPE, &der, cm->heap, info, &eccKey); |
wolfSSL | 0:d92f9d21154c | 2850 | |
wolfSSL | 0:d92f9d21154c | 2851 | if (ret == 0) |
wolfSSL | 0:d92f9d21154c | 2852 | InitDecodedCert(cert, der.buffer, der.length, cm->heap); |
wolfSSL | 0:d92f9d21154c | 2853 | |
wolfSSL | 0:d92f9d21154c | 2854 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2855 | XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2856 | #endif |
wolfSSL | 0:d92f9d21154c | 2857 | } |
wolfSSL | 0:d92f9d21154c | 2858 | else |
wolfSSL | 0:d92f9d21154c | 2859 | InitDecodedCert(cert, (byte*)buff, (word32)sz, cm->heap); |
wolfSSL | 0:d92f9d21154c | 2860 | |
wolfSSL | 0:d92f9d21154c | 2861 | if (ret == 0) |
wolfSSL | 0:d92f9d21154c | 2862 | ret = ParseCertRelative(cert, CERT_TYPE, 1, cm); |
wolfSSL | 0:d92f9d21154c | 2863 | |
wolfSSL | 0:d92f9d21154c | 2864 | #ifdef HAVE_CRL |
wolfSSL | 0:d92f9d21154c | 2865 | if (ret == 0 && cm->crlEnabled) |
wolfSSL | 0:d92f9d21154c | 2866 | ret = CheckCertCRL(cm->crl, cert); |
wolfSSL | 0:d92f9d21154c | 2867 | #endif |
wolfSSL | 0:d92f9d21154c | 2868 | |
wolfSSL | 0:d92f9d21154c | 2869 | FreeDecodedCert(cert); |
wolfSSL | 0:d92f9d21154c | 2870 | |
wolfSSL | 0:d92f9d21154c | 2871 | XFREE(der.buffer, cm->heap, DYNAMIC_TYPE_CERT); |
wolfSSL | 0:d92f9d21154c | 2872 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2873 | XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2874 | #endif |
wolfSSL | 0:d92f9d21154c | 2875 | |
wolfSSL | 0:d92f9d21154c | 2876 | return ret == 0 ? SSL_SUCCESS : ret; |
wolfSSL | 0:d92f9d21154c | 2877 | } |
wolfSSL | 0:d92f9d21154c | 2878 | |
wolfSSL | 0:d92f9d21154c | 2879 | |
wolfSSL | 0:d92f9d21154c | 2880 | /* turn on OCSP if off and compiled in, set options */ |
wolfSSL | 0:d92f9d21154c | 2881 | int wolfSSL_CertManagerEnableOCSP(WOLFSSL_CERT_MANAGER* cm, int options) |
wolfSSL | 0:d92f9d21154c | 2882 | { |
wolfSSL | 0:d92f9d21154c | 2883 | int ret = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 2884 | |
wolfSSL | 0:d92f9d21154c | 2885 | (void)options; |
wolfSSL | 0:d92f9d21154c | 2886 | |
wolfSSL | 0:d92f9d21154c | 2887 | WOLFSSL_ENTER("wolfSSL_CertManagerEnableOCSP"); |
wolfSSL | 0:d92f9d21154c | 2888 | if (cm == NULL) |
wolfSSL | 0:d92f9d21154c | 2889 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 2890 | |
wolfSSL | 0:d92f9d21154c | 2891 | #ifdef HAVE_OCSP |
wolfSSL | 0:d92f9d21154c | 2892 | if (cm->ocsp == NULL) { |
wolfSSL | 0:d92f9d21154c | 2893 | cm->ocsp = (WOLFSSL_OCSP*)XMALLOC(sizeof(WOLFSSL_OCSP), cm->heap, |
wolfSSL | 0:d92f9d21154c | 2894 | DYNAMIC_TYPE_OCSP); |
wolfSSL | 0:d92f9d21154c | 2895 | if (cm->ocsp == NULL) |
wolfSSL | 0:d92f9d21154c | 2896 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 2897 | |
wolfSSL | 0:d92f9d21154c | 2898 | if (InitOCSP(cm->ocsp, cm) != 0) { |
wolfSSL | 0:d92f9d21154c | 2899 | WOLFSSL_MSG("Init OCSP failed"); |
wolfSSL | 0:d92f9d21154c | 2900 | FreeOCSP(cm->ocsp, 1); |
wolfSSL | 0:d92f9d21154c | 2901 | cm->ocsp = NULL; |
wolfSSL | 0:d92f9d21154c | 2902 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 2903 | } |
wolfSSL | 0:d92f9d21154c | 2904 | } |
wolfSSL | 0:d92f9d21154c | 2905 | cm->ocspEnabled = 1; |
wolfSSL | 0:d92f9d21154c | 2906 | if (options & WOLFSSL_OCSP_URL_OVERRIDE) |
wolfSSL | 0:d92f9d21154c | 2907 | cm->ocspUseOverrideURL = 1; |
wolfSSL | 0:d92f9d21154c | 2908 | if (options & WOLFSSL_OCSP_NO_NONCE) |
wolfSSL | 0:d92f9d21154c | 2909 | cm->ocspSendNonce = 0; |
wolfSSL | 0:d92f9d21154c | 2910 | else |
wolfSSL | 0:d92f9d21154c | 2911 | cm->ocspSendNonce = 1; |
wolfSSL | 0:d92f9d21154c | 2912 | if (options & WOLFSSL_OCSP_CHECKALL) |
wolfSSL | 0:d92f9d21154c | 2913 | cm->ocspCheckAll = 1; |
wolfSSL | 0:d92f9d21154c | 2914 | #ifndef WOLFSSL_USER_IO |
wolfSSL | 0:d92f9d21154c | 2915 | cm->ocspIOCb = EmbedOcspLookup; |
wolfSSL | 0:d92f9d21154c | 2916 | cm->ocspRespFreeCb = EmbedOcspRespFree; |
wolfSSL | 0:d92f9d21154c | 2917 | #endif /* WOLFSSL_USER_IO */ |
wolfSSL | 0:d92f9d21154c | 2918 | #else |
wolfSSL | 0:d92f9d21154c | 2919 | ret = NOT_COMPILED_IN; |
wolfSSL | 0:d92f9d21154c | 2920 | #endif |
wolfSSL | 0:d92f9d21154c | 2921 | |
wolfSSL | 0:d92f9d21154c | 2922 | return ret; |
wolfSSL | 0:d92f9d21154c | 2923 | } |
wolfSSL | 0:d92f9d21154c | 2924 | |
wolfSSL | 0:d92f9d21154c | 2925 | |
wolfSSL | 0:d92f9d21154c | 2926 | int wolfSSL_CertManagerDisableOCSP(WOLFSSL_CERT_MANAGER* cm) |
wolfSSL | 0:d92f9d21154c | 2927 | { |
wolfSSL | 0:d92f9d21154c | 2928 | WOLFSSL_ENTER("wolfSSL_CertManagerDisableOCSP"); |
wolfSSL | 0:d92f9d21154c | 2929 | if (cm == NULL) |
wolfSSL | 0:d92f9d21154c | 2930 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 2931 | |
wolfSSL | 0:d92f9d21154c | 2932 | cm->ocspEnabled = 0; |
wolfSSL | 0:d92f9d21154c | 2933 | |
wolfSSL | 0:d92f9d21154c | 2934 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 2935 | } |
wolfSSL | 0:d92f9d21154c | 2936 | |
wolfSSL | 0:d92f9d21154c | 2937 | |
wolfSSL | 0:d92f9d21154c | 2938 | #ifdef HAVE_OCSP |
wolfSSL | 0:d92f9d21154c | 2939 | |
wolfSSL | 0:d92f9d21154c | 2940 | |
wolfSSL | 0:d92f9d21154c | 2941 | /* check CRL if enabled, SSL_SUCCESS */ |
wolfSSL | 0:d92f9d21154c | 2942 | int wolfSSL_CertManagerCheckOCSP(WOLFSSL_CERT_MANAGER* cm, byte* der, int sz) |
wolfSSL | 0:d92f9d21154c | 2943 | { |
wolfSSL | 0:d92f9d21154c | 2944 | int ret; |
wolfSSL | 0:d92f9d21154c | 2945 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2946 | DecodedCert* cert = NULL; |
wolfSSL | 0:d92f9d21154c | 2947 | #else |
wolfSSL | 0:d92f9d21154c | 2948 | DecodedCert cert[1]; |
wolfSSL | 0:d92f9d21154c | 2949 | #endif |
wolfSSL | 0:d92f9d21154c | 2950 | |
wolfSSL | 0:d92f9d21154c | 2951 | WOLFSSL_ENTER("wolfSSL_CertManagerCheckOCSP"); |
wolfSSL | 0:d92f9d21154c | 2952 | |
wolfSSL | 0:d92f9d21154c | 2953 | if (cm == NULL) |
wolfSSL | 0:d92f9d21154c | 2954 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 2955 | |
wolfSSL | 0:d92f9d21154c | 2956 | if (cm->ocspEnabled == 0) |
wolfSSL | 0:d92f9d21154c | 2957 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 2958 | |
wolfSSL | 0:d92f9d21154c | 2959 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2960 | cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL, |
wolfSSL | 0:d92f9d21154c | 2961 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2962 | if (cert == NULL) |
wolfSSL | 0:d92f9d21154c | 2963 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 2964 | #endif |
wolfSSL | 0:d92f9d21154c | 2965 | |
wolfSSL | 0:d92f9d21154c | 2966 | InitDecodedCert(cert, der, sz, NULL); |
wolfSSL | 0:d92f9d21154c | 2967 | |
wolfSSL | 0:d92f9d21154c | 2968 | if ((ret = ParseCertRelative(cert, CERT_TYPE, NO_VERIFY, cm)) != 0) { |
wolfSSL | 0:d92f9d21154c | 2969 | WOLFSSL_MSG("ParseCert failed"); |
wolfSSL | 0:d92f9d21154c | 2970 | } |
wolfSSL | 0:d92f9d21154c | 2971 | else if ((ret = CheckCertOCSP(cm->ocsp, cert)) != 0) { |
wolfSSL | 0:d92f9d21154c | 2972 | WOLFSSL_MSG("CheckCertOCSP failed"); |
wolfSSL | 0:d92f9d21154c | 2973 | } |
wolfSSL | 0:d92f9d21154c | 2974 | |
wolfSSL | 0:d92f9d21154c | 2975 | FreeDecodedCert(cert); |
wolfSSL | 0:d92f9d21154c | 2976 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 2977 | XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 2978 | #endif |
wolfSSL | 0:d92f9d21154c | 2979 | |
wolfSSL | 0:d92f9d21154c | 2980 | return ret == 0 ? SSL_SUCCESS : ret; |
wolfSSL | 0:d92f9d21154c | 2981 | } |
wolfSSL | 0:d92f9d21154c | 2982 | |
wolfSSL | 0:d92f9d21154c | 2983 | |
wolfSSL | 0:d92f9d21154c | 2984 | int wolfSSL_CertManagerSetOCSPOverrideURL(WOLFSSL_CERT_MANAGER* cm, |
wolfSSL | 0:d92f9d21154c | 2985 | const char* url) |
wolfSSL | 0:d92f9d21154c | 2986 | { |
wolfSSL | 0:d92f9d21154c | 2987 | WOLFSSL_ENTER("wolfSSL_CertManagerSetOCSPOverrideURL"); |
wolfSSL | 0:d92f9d21154c | 2988 | if (cm == NULL) |
wolfSSL | 0:d92f9d21154c | 2989 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 2990 | |
wolfSSL | 0:d92f9d21154c | 2991 | XFREE(cm->ocspOverrideURL, cm->heap, 0); |
wolfSSL | 0:d92f9d21154c | 2992 | if (url != NULL) { |
wolfSSL | 0:d92f9d21154c | 2993 | int urlSz = (int)XSTRLEN(url) + 1; |
wolfSSL | 0:d92f9d21154c | 2994 | cm->ocspOverrideURL = (char*)XMALLOC(urlSz, cm->heap, 0); |
wolfSSL | 0:d92f9d21154c | 2995 | if (cm->ocspOverrideURL != NULL) { |
wolfSSL | 0:d92f9d21154c | 2996 | XMEMCPY(cm->ocspOverrideURL, url, urlSz); |
wolfSSL | 0:d92f9d21154c | 2997 | } |
wolfSSL | 0:d92f9d21154c | 2998 | else |
wolfSSL | 0:d92f9d21154c | 2999 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 3000 | } |
wolfSSL | 0:d92f9d21154c | 3001 | else |
wolfSSL | 0:d92f9d21154c | 3002 | cm->ocspOverrideURL = NULL; |
wolfSSL | 0:d92f9d21154c | 3003 | |
wolfSSL | 0:d92f9d21154c | 3004 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 3005 | } |
wolfSSL | 0:d92f9d21154c | 3006 | |
wolfSSL | 0:d92f9d21154c | 3007 | |
wolfSSL | 0:d92f9d21154c | 3008 | int wolfSSL_CertManagerSetOCSP_Cb(WOLFSSL_CERT_MANAGER* cm, |
wolfSSL | 0:d92f9d21154c | 3009 | CbOCSPIO ioCb, CbOCSPRespFree respFreeCb, void* ioCbCtx) |
wolfSSL | 0:d92f9d21154c | 3010 | { |
wolfSSL | 0:d92f9d21154c | 3011 | WOLFSSL_ENTER("wolfSSL_CertManagerSetOCSP_Cb"); |
wolfSSL | 0:d92f9d21154c | 3012 | if (cm == NULL) |
wolfSSL | 0:d92f9d21154c | 3013 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3014 | |
wolfSSL | 0:d92f9d21154c | 3015 | cm->ocspIOCb = ioCb; |
wolfSSL | 0:d92f9d21154c | 3016 | cm->ocspRespFreeCb = respFreeCb; |
wolfSSL | 0:d92f9d21154c | 3017 | cm->ocspIOCtx = ioCbCtx; |
wolfSSL | 0:d92f9d21154c | 3018 | |
wolfSSL | 0:d92f9d21154c | 3019 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 3020 | } |
wolfSSL | 0:d92f9d21154c | 3021 | |
wolfSSL | 0:d92f9d21154c | 3022 | |
wolfSSL | 0:d92f9d21154c | 3023 | int wolfSSL_EnableOCSP(WOLFSSL* ssl, int options) |
wolfSSL | 0:d92f9d21154c | 3024 | { |
wolfSSL | 0:d92f9d21154c | 3025 | WOLFSSL_ENTER("wolfSSL_EnableOCSP"); |
wolfSSL | 0:d92f9d21154c | 3026 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 3027 | return wolfSSL_CertManagerEnableOCSP(ssl->ctx->cm, options); |
wolfSSL | 0:d92f9d21154c | 3028 | else |
wolfSSL | 0:d92f9d21154c | 3029 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3030 | } |
wolfSSL | 0:d92f9d21154c | 3031 | |
wolfSSL | 0:d92f9d21154c | 3032 | |
wolfSSL | 0:d92f9d21154c | 3033 | int wolfSSL_DisableOCSP(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 3034 | { |
wolfSSL | 0:d92f9d21154c | 3035 | WOLFSSL_ENTER("wolfSSL_DisableOCSP"); |
wolfSSL | 0:d92f9d21154c | 3036 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 3037 | return wolfSSL_CertManagerDisableOCSP(ssl->ctx->cm); |
wolfSSL | 0:d92f9d21154c | 3038 | else |
wolfSSL | 0:d92f9d21154c | 3039 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3040 | } |
wolfSSL | 0:d92f9d21154c | 3041 | |
wolfSSL | 0:d92f9d21154c | 3042 | |
wolfSSL | 0:d92f9d21154c | 3043 | int wolfSSL_SetOCSP_OverrideURL(WOLFSSL* ssl, const char* url) |
wolfSSL | 0:d92f9d21154c | 3044 | { |
wolfSSL | 0:d92f9d21154c | 3045 | WOLFSSL_ENTER("wolfSSL_SetOCSP_OverrideURL"); |
wolfSSL | 0:d92f9d21154c | 3046 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 3047 | return wolfSSL_CertManagerSetOCSPOverrideURL(ssl->ctx->cm, url); |
wolfSSL | 0:d92f9d21154c | 3048 | else |
wolfSSL | 0:d92f9d21154c | 3049 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3050 | } |
wolfSSL | 0:d92f9d21154c | 3051 | |
wolfSSL | 0:d92f9d21154c | 3052 | |
wolfSSL | 0:d92f9d21154c | 3053 | int wolfSSL_SetOCSP_Cb(WOLFSSL* ssl, |
wolfSSL | 0:d92f9d21154c | 3054 | CbOCSPIO ioCb, CbOCSPRespFree respFreeCb, void* ioCbCtx) |
wolfSSL | 0:d92f9d21154c | 3055 | { |
wolfSSL | 0:d92f9d21154c | 3056 | WOLFSSL_ENTER("wolfSSL_SetOCSP_Cb"); |
wolfSSL | 0:d92f9d21154c | 3057 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 3058 | return wolfSSL_CertManagerSetOCSP_Cb(ssl->ctx->cm, |
wolfSSL | 0:d92f9d21154c | 3059 | ioCb, respFreeCb, ioCbCtx); |
wolfSSL | 0:d92f9d21154c | 3060 | else |
wolfSSL | 0:d92f9d21154c | 3061 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3062 | } |
wolfSSL | 0:d92f9d21154c | 3063 | |
wolfSSL | 0:d92f9d21154c | 3064 | |
wolfSSL | 0:d92f9d21154c | 3065 | int wolfSSL_CTX_EnableOCSP(WOLFSSL_CTX* ctx, int options) |
wolfSSL | 0:d92f9d21154c | 3066 | { |
wolfSSL | 0:d92f9d21154c | 3067 | WOLFSSL_ENTER("wolfSSL_CTX_EnableOCSP"); |
wolfSSL | 0:d92f9d21154c | 3068 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 3069 | return wolfSSL_CertManagerEnableOCSP(ctx->cm, options); |
wolfSSL | 0:d92f9d21154c | 3070 | else |
wolfSSL | 0:d92f9d21154c | 3071 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3072 | } |
wolfSSL | 0:d92f9d21154c | 3073 | |
wolfSSL | 0:d92f9d21154c | 3074 | |
wolfSSL | 0:d92f9d21154c | 3075 | int wolfSSL_CTX_DisableOCSP(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 3076 | { |
wolfSSL | 0:d92f9d21154c | 3077 | WOLFSSL_ENTER("wolfSSL_CTX_DisableOCSP"); |
wolfSSL | 0:d92f9d21154c | 3078 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 3079 | return wolfSSL_CertManagerDisableOCSP(ctx->cm); |
wolfSSL | 0:d92f9d21154c | 3080 | else |
wolfSSL | 0:d92f9d21154c | 3081 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3082 | } |
wolfSSL | 0:d92f9d21154c | 3083 | |
wolfSSL | 0:d92f9d21154c | 3084 | |
wolfSSL | 0:d92f9d21154c | 3085 | int wolfSSL_CTX_SetOCSP_OverrideURL(WOLFSSL_CTX* ctx, const char* url) |
wolfSSL | 0:d92f9d21154c | 3086 | { |
wolfSSL | 0:d92f9d21154c | 3087 | WOLFSSL_ENTER("wolfSSL_SetOCSP_OverrideURL"); |
wolfSSL | 0:d92f9d21154c | 3088 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 3089 | return wolfSSL_CertManagerSetOCSPOverrideURL(ctx->cm, url); |
wolfSSL | 0:d92f9d21154c | 3090 | else |
wolfSSL | 0:d92f9d21154c | 3091 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3092 | } |
wolfSSL | 0:d92f9d21154c | 3093 | |
wolfSSL | 0:d92f9d21154c | 3094 | |
wolfSSL | 0:d92f9d21154c | 3095 | int wolfSSL_CTX_SetOCSP_Cb(WOLFSSL_CTX* ctx, |
wolfSSL | 0:d92f9d21154c | 3096 | CbOCSPIO ioCb, CbOCSPRespFree respFreeCb, void* ioCbCtx) |
wolfSSL | 0:d92f9d21154c | 3097 | { |
wolfSSL | 0:d92f9d21154c | 3098 | WOLFSSL_ENTER("wolfSSL_CTX_SetOCSP_Cb"); |
wolfSSL | 0:d92f9d21154c | 3099 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 3100 | return wolfSSL_CertManagerSetOCSP_Cb(ctx->cm, ioCb, respFreeCb, ioCbCtx); |
wolfSSL | 0:d92f9d21154c | 3101 | else |
wolfSSL | 0:d92f9d21154c | 3102 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3103 | } |
wolfSSL | 0:d92f9d21154c | 3104 | |
wolfSSL | 0:d92f9d21154c | 3105 | |
wolfSSL | 0:d92f9d21154c | 3106 | #endif /* HAVE_OCSP */ |
wolfSSL | 0:d92f9d21154c | 3107 | |
wolfSSL | 0:d92f9d21154c | 3108 | |
wolfSSL | 0:d92f9d21154c | 3109 | #ifndef NO_FILESYSTEM |
wolfSSL | 0:d92f9d21154c | 3110 | |
wolfSSL | 0:d92f9d21154c | 3111 | #if defined(WOLFSSL_MDK_ARM) |
wolfSSL | 0:d92f9d21154c | 3112 | extern FILE * wolfSSL_fopen(const char *name, const char *mode) ; |
wolfSSL | 0:d92f9d21154c | 3113 | #define XFOPEN wolfSSL_fopen |
wolfSSL | 0:d92f9d21154c | 3114 | #else |
wolfSSL | 0:d92f9d21154c | 3115 | #define XFOPEN fopen |
wolfSSL | 0:d92f9d21154c | 3116 | #endif |
wolfSSL | 0:d92f9d21154c | 3117 | |
wolfSSL | 0:d92f9d21154c | 3118 | /* process a file with name fname into ctx of format and type |
wolfSSL | 0:d92f9d21154c | 3119 | userChain specifies a user certificate chain to pass during handshake */ |
wolfSSL | 0:d92f9d21154c | 3120 | int ProcessFile(WOLFSSL_CTX* ctx, const char* fname, int format, int type, |
wolfSSL | 0:d92f9d21154c | 3121 | WOLFSSL* ssl, int userChain, WOLFSSL_CRL* crl) |
wolfSSL | 0:d92f9d21154c | 3122 | { |
wolfSSL | 0:d92f9d21154c | 3123 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3124 | byte staticBuffer[1]; /* force heap usage */ |
wolfSSL | 0:d92f9d21154c | 3125 | #else |
wolfSSL | 0:d92f9d21154c | 3126 | byte staticBuffer[FILE_BUFFER_SIZE]; |
wolfSSL | 0:d92f9d21154c | 3127 | #endif |
wolfSSL | 0:d92f9d21154c | 3128 | byte* myBuffer = staticBuffer; |
wolfSSL | 0:d92f9d21154c | 3129 | int dynamic = 0; |
wolfSSL | 0:d92f9d21154c | 3130 | int ret; |
wolfSSL | 0:d92f9d21154c | 3131 | long sz = 0; |
wolfSSL | 0:d92f9d21154c | 3132 | XFILE file; |
wolfSSL | 0:d92f9d21154c | 3133 | void* heapHint = ctx ? ctx->heap : NULL; |
wolfSSL | 0:d92f9d21154c | 3134 | |
wolfSSL | 0:d92f9d21154c | 3135 | (void)crl; |
wolfSSL | 0:d92f9d21154c | 3136 | (void)heapHint; |
wolfSSL | 0:d92f9d21154c | 3137 | |
wolfSSL | 0:d92f9d21154c | 3138 | if (fname == NULL) return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 3139 | |
wolfSSL | 0:d92f9d21154c | 3140 | file = XFOPEN(fname, "rb"); |
wolfSSL | 0:d92f9d21154c | 3141 | if (file == XBADFILE) return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 3142 | XFSEEK(file, 0, XSEEK_END); |
wolfSSL | 0:d92f9d21154c | 3143 | sz = XFTELL(file); |
wolfSSL | 0:d92f9d21154c | 3144 | XREWIND(file); |
wolfSSL | 0:d92f9d21154c | 3145 | |
wolfSSL | 0:d92f9d21154c | 3146 | if (sz > (long)sizeof(staticBuffer)) { |
wolfSSL | 0:d92f9d21154c | 3147 | WOLFSSL_MSG("Getting dynamic buffer"); |
wolfSSL | 0:d92f9d21154c | 3148 | myBuffer = (byte*)XMALLOC(sz, heapHint, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 3149 | if (myBuffer == NULL) { |
wolfSSL | 0:d92f9d21154c | 3150 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 3151 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 3152 | } |
wolfSSL | 0:d92f9d21154c | 3153 | dynamic = 1; |
wolfSSL | 0:d92f9d21154c | 3154 | } |
wolfSSL | 0:d92f9d21154c | 3155 | else if (sz < 0) { |
wolfSSL | 0:d92f9d21154c | 3156 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 3157 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 3158 | } |
wolfSSL | 0:d92f9d21154c | 3159 | |
wolfSSL | 0:d92f9d21154c | 3160 | if ( (ret = (int)XFREAD(myBuffer, sz, 1, file)) < 0) |
wolfSSL | 0:d92f9d21154c | 3161 | ret = SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 3162 | else { |
wolfSSL | 0:d92f9d21154c | 3163 | if (type == CA_TYPE && format == SSL_FILETYPE_PEM) |
wolfSSL | 0:d92f9d21154c | 3164 | ret = ProcessChainBuffer(ctx, myBuffer, sz, format, type, ssl); |
wolfSSL | 0:d92f9d21154c | 3165 | #ifdef HAVE_CRL |
wolfSSL | 0:d92f9d21154c | 3166 | else if (type == CRL_TYPE) |
wolfSSL | 0:d92f9d21154c | 3167 | ret = BufferLoadCRL(crl, myBuffer, sz, format); |
wolfSSL | 0:d92f9d21154c | 3168 | #endif |
wolfSSL | 0:d92f9d21154c | 3169 | else |
wolfSSL | 0:d92f9d21154c | 3170 | ret = ProcessBuffer(ctx, myBuffer, sz, format, type, ssl, NULL, |
wolfSSL | 0:d92f9d21154c | 3171 | userChain); |
wolfSSL | 0:d92f9d21154c | 3172 | } |
wolfSSL | 0:d92f9d21154c | 3173 | |
wolfSSL | 0:d92f9d21154c | 3174 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 3175 | if (dynamic) |
wolfSSL | 0:d92f9d21154c | 3176 | XFREE(myBuffer, heapHint, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 3177 | |
wolfSSL | 0:d92f9d21154c | 3178 | return ret; |
wolfSSL | 0:d92f9d21154c | 3179 | } |
wolfSSL | 0:d92f9d21154c | 3180 | |
wolfSSL | 0:d92f9d21154c | 3181 | |
wolfSSL | 0:d92f9d21154c | 3182 | /* loads file then loads each file in path, no c_rehash */ |
wolfSSL | 0:d92f9d21154c | 3183 | int wolfSSL_CTX_load_verify_locations(WOLFSSL_CTX* ctx, const char* file, |
wolfSSL | 0:d92f9d21154c | 3184 | const char* path) |
wolfSSL | 0:d92f9d21154c | 3185 | { |
wolfSSL | 0:d92f9d21154c | 3186 | int ret = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 3187 | |
wolfSSL | 0:d92f9d21154c | 3188 | WOLFSSL_ENTER("wolfSSL_CTX_load_verify_locations"); |
wolfSSL | 0:d92f9d21154c | 3189 | (void)path; |
wolfSSL | 0:d92f9d21154c | 3190 | |
wolfSSL | 0:d92f9d21154c | 3191 | if (ctx == NULL || (file == NULL && path == NULL) ) |
wolfSSL | 0:d92f9d21154c | 3192 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 3193 | |
wolfSSL | 0:d92f9d21154c | 3194 | if (file) |
wolfSSL | 0:d92f9d21154c | 3195 | ret = ProcessFile(ctx, file, SSL_FILETYPE_PEM, CA_TYPE, NULL, 0, NULL); |
wolfSSL | 0:d92f9d21154c | 3196 | |
wolfSSL | 0:d92f9d21154c | 3197 | if (ret == SSL_SUCCESS && path) { |
wolfSSL | 0:d92f9d21154c | 3198 | /* try to load each regular file in path */ |
wolfSSL | 0:d92f9d21154c | 3199 | #ifdef USE_WINDOWS_API |
wolfSSL | 0:d92f9d21154c | 3200 | WIN32_FIND_DATAA FindFileData; |
wolfSSL | 0:d92f9d21154c | 3201 | HANDLE hFind; |
wolfSSL | 0:d92f9d21154c | 3202 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3203 | char* name = NULL; |
wolfSSL | 0:d92f9d21154c | 3204 | #else |
wolfSSL | 0:d92f9d21154c | 3205 | char name[MAX_FILENAME_SZ]; |
wolfSSL | 0:d92f9d21154c | 3206 | #endif |
wolfSSL | 0:d92f9d21154c | 3207 | |
wolfSSL | 0:d92f9d21154c | 3208 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3209 | name = (char*)XMALLOC(MAX_FILENAME_SZ, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 3210 | if (name == NULL) |
wolfSSL | 0:d92f9d21154c | 3211 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 3212 | #endif |
wolfSSL | 0:d92f9d21154c | 3213 | |
wolfSSL | 0:d92f9d21154c | 3214 | XMEMSET(name, 0, MAX_FILENAME_SZ); |
wolfSSL | 0:d92f9d21154c | 3215 | XSTRNCPY(name, path, MAX_FILENAME_SZ - 4); |
wolfSSL | 0:d92f9d21154c | 3216 | XSTRNCAT(name, "\\*", 3); |
wolfSSL | 0:d92f9d21154c | 3217 | |
wolfSSL | 0:d92f9d21154c | 3218 | hFind = FindFirstFileA(name, &FindFileData); |
wolfSSL | 0:d92f9d21154c | 3219 | if (hFind == INVALID_HANDLE_VALUE) { |
wolfSSL | 0:d92f9d21154c | 3220 | WOLFSSL_MSG("FindFirstFile for path verify locations failed"); |
wolfSSL | 0:d92f9d21154c | 3221 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3222 | XFREE(name, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 3223 | #endif |
wolfSSL | 0:d92f9d21154c | 3224 | return BAD_PATH_ERROR; |
wolfSSL | 0:d92f9d21154c | 3225 | } |
wolfSSL | 0:d92f9d21154c | 3226 | |
wolfSSL | 0:d92f9d21154c | 3227 | do { |
wolfSSL | 0:d92f9d21154c | 3228 | if (FindFileData.dwFileAttributes != FILE_ATTRIBUTE_DIRECTORY) { |
wolfSSL | 0:d92f9d21154c | 3229 | XSTRNCPY(name, path, MAX_FILENAME_SZ/2 - 3); |
wolfSSL | 0:d92f9d21154c | 3230 | XSTRNCAT(name, "\\", 2); |
wolfSSL | 0:d92f9d21154c | 3231 | XSTRNCAT(name, FindFileData.cFileName, MAX_FILENAME_SZ/2); |
wolfSSL | 0:d92f9d21154c | 3232 | |
wolfSSL | 0:d92f9d21154c | 3233 | ret = ProcessFile(ctx, name, SSL_FILETYPE_PEM, CA_TYPE, NULL,0, |
wolfSSL | 0:d92f9d21154c | 3234 | NULL); |
wolfSSL | 0:d92f9d21154c | 3235 | } |
wolfSSL | 0:d92f9d21154c | 3236 | } while (ret == SSL_SUCCESS && FindNextFileA(hFind, &FindFileData)); |
wolfSSL | 0:d92f9d21154c | 3237 | |
wolfSSL | 0:d92f9d21154c | 3238 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3239 | XFREE(name, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 3240 | #endif |
wolfSSL | 0:d92f9d21154c | 3241 | |
wolfSSL | 0:d92f9d21154c | 3242 | FindClose(hFind); |
wolfSSL | 0:d92f9d21154c | 3243 | #elif !defined(NO_WOLFSSL_DIR) |
wolfSSL | 0:d92f9d21154c | 3244 | struct dirent* entry; |
wolfSSL | 0:d92f9d21154c | 3245 | DIR* dir = opendir(path); |
wolfSSL | 0:d92f9d21154c | 3246 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3247 | char* name = NULL; |
wolfSSL | 0:d92f9d21154c | 3248 | #else |
wolfSSL | 0:d92f9d21154c | 3249 | char name[MAX_FILENAME_SZ]; |
wolfSSL | 0:d92f9d21154c | 3250 | #endif |
wolfSSL | 0:d92f9d21154c | 3251 | |
wolfSSL | 0:d92f9d21154c | 3252 | if (dir == NULL) { |
wolfSSL | 0:d92f9d21154c | 3253 | WOLFSSL_MSG("opendir path verify locations failed"); |
wolfSSL | 0:d92f9d21154c | 3254 | return BAD_PATH_ERROR; |
wolfSSL | 0:d92f9d21154c | 3255 | } |
wolfSSL | 0:d92f9d21154c | 3256 | |
wolfSSL | 0:d92f9d21154c | 3257 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3258 | name = (char*)XMALLOC(MAX_FILENAME_SZ, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 3259 | if (name == NULL) |
wolfSSL | 0:d92f9d21154c | 3260 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 3261 | #endif |
wolfSSL | 0:d92f9d21154c | 3262 | |
wolfSSL | 0:d92f9d21154c | 3263 | while ( ret == SSL_SUCCESS && (entry = readdir(dir)) != NULL) { |
wolfSSL | 0:d92f9d21154c | 3264 | struct stat s; |
wolfSSL | 0:d92f9d21154c | 3265 | |
wolfSSL | 0:d92f9d21154c | 3266 | XMEMSET(name, 0, MAX_FILENAME_SZ); |
wolfSSL | 0:d92f9d21154c | 3267 | XSTRNCPY(name, path, MAX_FILENAME_SZ/2 - 2); |
wolfSSL | 0:d92f9d21154c | 3268 | XSTRNCAT(name, "/", 1); |
wolfSSL | 0:d92f9d21154c | 3269 | XSTRNCAT(name, entry->d_name, MAX_FILENAME_SZ/2); |
wolfSSL | 0:d92f9d21154c | 3270 | |
wolfSSL | 0:d92f9d21154c | 3271 | if (stat(name, &s) != 0) { |
wolfSSL | 0:d92f9d21154c | 3272 | WOLFSSL_MSG("stat on name failed"); |
wolfSSL | 0:d92f9d21154c | 3273 | ret = BAD_PATH_ERROR; |
wolfSSL | 0:d92f9d21154c | 3274 | } else if (s.st_mode & S_IFREG) |
wolfSSL | 0:d92f9d21154c | 3275 | ret = ProcessFile(ctx, name, SSL_FILETYPE_PEM, CA_TYPE, NULL,0, |
wolfSSL | 0:d92f9d21154c | 3276 | NULL); |
wolfSSL | 0:d92f9d21154c | 3277 | } |
wolfSSL | 0:d92f9d21154c | 3278 | |
wolfSSL | 0:d92f9d21154c | 3279 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3280 | XFREE(name, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 3281 | #endif |
wolfSSL | 0:d92f9d21154c | 3282 | |
wolfSSL | 0:d92f9d21154c | 3283 | closedir(dir); |
wolfSSL | 0:d92f9d21154c | 3284 | #endif |
wolfSSL | 0:d92f9d21154c | 3285 | } |
wolfSSL | 0:d92f9d21154c | 3286 | |
wolfSSL | 0:d92f9d21154c | 3287 | return ret; |
wolfSSL | 0:d92f9d21154c | 3288 | } |
wolfSSL | 0:d92f9d21154c | 3289 | |
wolfSSL | 0:d92f9d21154c | 3290 | |
wolfSSL | 0:d92f9d21154c | 3291 | /* Verify the ceritficate, SSL_SUCCESS for ok, < 0 for error */ |
wolfSSL | 0:d92f9d21154c | 3292 | int wolfSSL_CertManagerVerify(WOLFSSL_CERT_MANAGER* cm, const char* fname, |
wolfSSL | 0:d92f9d21154c | 3293 | int format) |
wolfSSL | 0:d92f9d21154c | 3294 | { |
wolfSSL | 0:d92f9d21154c | 3295 | int ret = SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 3296 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3297 | byte staticBuffer[1]; /* force heap usage */ |
wolfSSL | 0:d92f9d21154c | 3298 | #else |
wolfSSL | 0:d92f9d21154c | 3299 | byte staticBuffer[FILE_BUFFER_SIZE]; |
wolfSSL | 0:d92f9d21154c | 3300 | #endif |
wolfSSL | 0:d92f9d21154c | 3301 | byte* myBuffer = staticBuffer; |
wolfSSL | 0:d92f9d21154c | 3302 | int dynamic = 0; |
wolfSSL | 0:d92f9d21154c | 3303 | long sz = 0; |
wolfSSL | 0:d92f9d21154c | 3304 | XFILE file = XFOPEN(fname, "rb"); |
wolfSSL | 0:d92f9d21154c | 3305 | |
wolfSSL | 0:d92f9d21154c | 3306 | WOLFSSL_ENTER("wolfSSL_CertManagerVerify"); |
wolfSSL | 0:d92f9d21154c | 3307 | |
wolfSSL | 0:d92f9d21154c | 3308 | if (file == XBADFILE) return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 3309 | XFSEEK(file, 0, XSEEK_END); |
wolfSSL | 0:d92f9d21154c | 3310 | sz = XFTELL(file); |
wolfSSL | 0:d92f9d21154c | 3311 | XREWIND(file); |
wolfSSL | 0:d92f9d21154c | 3312 | |
wolfSSL | 0:d92f9d21154c | 3313 | if (sz > MAX_WOLFSSL_FILE_SIZE || sz < 0) { |
wolfSSL | 0:d92f9d21154c | 3314 | WOLFSSL_MSG("CertManagerVerify file bad size"); |
wolfSSL | 0:d92f9d21154c | 3315 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 3316 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 3317 | } |
wolfSSL | 0:d92f9d21154c | 3318 | |
wolfSSL | 0:d92f9d21154c | 3319 | if (sz > (long)sizeof(staticBuffer)) { |
wolfSSL | 0:d92f9d21154c | 3320 | WOLFSSL_MSG("Getting dynamic buffer"); |
wolfSSL | 0:d92f9d21154c | 3321 | myBuffer = (byte*) XMALLOC(sz, cm->heap, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 3322 | if (myBuffer == NULL) { |
wolfSSL | 0:d92f9d21154c | 3323 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 3324 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 3325 | } |
wolfSSL | 0:d92f9d21154c | 3326 | dynamic = 1; |
wolfSSL | 0:d92f9d21154c | 3327 | } |
wolfSSL | 0:d92f9d21154c | 3328 | |
wolfSSL | 0:d92f9d21154c | 3329 | if ( (ret = (int)XFREAD(myBuffer, sz, 1, file)) < 0) |
wolfSSL | 0:d92f9d21154c | 3330 | ret = SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 3331 | else |
wolfSSL | 0:d92f9d21154c | 3332 | ret = wolfSSL_CertManagerVerifyBuffer(cm, myBuffer, sz, format); |
wolfSSL | 0:d92f9d21154c | 3333 | |
wolfSSL | 0:d92f9d21154c | 3334 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 3335 | if (dynamic) |
wolfSSL | 0:d92f9d21154c | 3336 | XFREE(myBuffer, cm->heap, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 3337 | |
wolfSSL | 0:d92f9d21154c | 3338 | return ret; |
wolfSSL | 0:d92f9d21154c | 3339 | } |
wolfSSL | 0:d92f9d21154c | 3340 | |
wolfSSL | 0:d92f9d21154c | 3341 | |
wolfSSL | 0:d92f9d21154c | 3342 | static INLINE WOLFSSL_METHOD* cm_pick_method(void) |
wolfSSL | 0:d92f9d21154c | 3343 | { |
wolfSSL | 0:d92f9d21154c | 3344 | #ifndef NO_WOLFSSL_CLIENT |
wolfSSL | 0:d92f9d21154c | 3345 | #ifdef NO_OLD_TLS |
wolfSSL | 0:d92f9d21154c | 3346 | return wolfTLSv1_2_client_method(); |
wolfSSL | 0:d92f9d21154c | 3347 | #else |
wolfSSL | 0:d92f9d21154c | 3348 | return wolfSSLv3_client_method(); |
wolfSSL | 0:d92f9d21154c | 3349 | #endif |
wolfSSL | 0:d92f9d21154c | 3350 | #elif !defined(NO_WOLFSSL_SERVER) |
wolfSSL | 0:d92f9d21154c | 3351 | #ifdef NO_OLD_TLS |
wolfSSL | 0:d92f9d21154c | 3352 | return wolfTLSv1_2_server_method(); |
wolfSSL | 0:d92f9d21154c | 3353 | #else |
wolfSSL | 0:d92f9d21154c | 3354 | return wolfSSLv3_server_method(); |
wolfSSL | 0:d92f9d21154c | 3355 | #endif |
wolfSSL | 0:d92f9d21154c | 3356 | #else |
wolfSSL | 0:d92f9d21154c | 3357 | return NULL; |
wolfSSL | 0:d92f9d21154c | 3358 | #endif |
wolfSSL | 0:d92f9d21154c | 3359 | } |
wolfSSL | 0:d92f9d21154c | 3360 | |
wolfSSL | 0:d92f9d21154c | 3361 | |
wolfSSL | 0:d92f9d21154c | 3362 | /* like load verify locations, 1 for success, < 0 for error */ |
wolfSSL | 0:d92f9d21154c | 3363 | int wolfSSL_CertManagerLoadCA(WOLFSSL_CERT_MANAGER* cm, const char* file, |
wolfSSL | 0:d92f9d21154c | 3364 | const char* path) |
wolfSSL | 0:d92f9d21154c | 3365 | { |
wolfSSL | 0:d92f9d21154c | 3366 | int ret = SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 3367 | WOLFSSL_CTX* tmp; |
wolfSSL | 0:d92f9d21154c | 3368 | |
wolfSSL | 0:d92f9d21154c | 3369 | WOLFSSL_ENTER("wolfSSL_CertManagerLoadCA"); |
wolfSSL | 0:d92f9d21154c | 3370 | |
wolfSSL | 0:d92f9d21154c | 3371 | if (cm == NULL) { |
wolfSSL | 0:d92f9d21154c | 3372 | WOLFSSL_MSG("No CertManager error"); |
wolfSSL | 0:d92f9d21154c | 3373 | return ret; |
wolfSSL | 0:d92f9d21154c | 3374 | } |
wolfSSL | 0:d92f9d21154c | 3375 | tmp = wolfSSL_CTX_new(cm_pick_method()); |
wolfSSL | 0:d92f9d21154c | 3376 | |
wolfSSL | 0:d92f9d21154c | 3377 | if (tmp == NULL) { |
wolfSSL | 0:d92f9d21154c | 3378 | WOLFSSL_MSG("CTX new failed"); |
wolfSSL | 0:d92f9d21154c | 3379 | return ret; |
wolfSSL | 0:d92f9d21154c | 3380 | } |
wolfSSL | 0:d92f9d21154c | 3381 | |
wolfSSL | 0:d92f9d21154c | 3382 | /* for tmp use */ |
wolfSSL | 0:d92f9d21154c | 3383 | wolfSSL_CertManagerFree(tmp->cm); |
wolfSSL | 0:d92f9d21154c | 3384 | tmp->cm = cm; |
wolfSSL | 0:d92f9d21154c | 3385 | |
wolfSSL | 0:d92f9d21154c | 3386 | ret = wolfSSL_CTX_load_verify_locations(tmp, file, path); |
wolfSSL | 0:d92f9d21154c | 3387 | |
wolfSSL | 0:d92f9d21154c | 3388 | /* don't loose our good one */ |
wolfSSL | 0:d92f9d21154c | 3389 | tmp->cm = NULL; |
wolfSSL | 0:d92f9d21154c | 3390 | wolfSSL_CTX_free(tmp); |
wolfSSL | 0:d92f9d21154c | 3391 | |
wolfSSL | 0:d92f9d21154c | 3392 | return ret; |
wolfSSL | 0:d92f9d21154c | 3393 | } |
wolfSSL | 0:d92f9d21154c | 3394 | |
wolfSSL | 0:d92f9d21154c | 3395 | |
wolfSSL | 0:d92f9d21154c | 3396 | |
wolfSSL | 0:d92f9d21154c | 3397 | /* turn on CRL if off and compiled in, set options */ |
wolfSSL | 0:d92f9d21154c | 3398 | int wolfSSL_CertManagerEnableCRL(WOLFSSL_CERT_MANAGER* cm, int options) |
wolfSSL | 0:d92f9d21154c | 3399 | { |
wolfSSL | 0:d92f9d21154c | 3400 | int ret = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 3401 | |
wolfSSL | 0:d92f9d21154c | 3402 | (void)options; |
wolfSSL | 0:d92f9d21154c | 3403 | |
wolfSSL | 0:d92f9d21154c | 3404 | WOLFSSL_ENTER("wolfSSL_CertManagerEnableCRL"); |
wolfSSL | 0:d92f9d21154c | 3405 | if (cm == NULL) |
wolfSSL | 0:d92f9d21154c | 3406 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3407 | |
wolfSSL | 0:d92f9d21154c | 3408 | #ifdef HAVE_CRL |
wolfSSL | 0:d92f9d21154c | 3409 | if (cm->crl == NULL) { |
wolfSSL | 0:d92f9d21154c | 3410 | cm->crl = (WOLFSSL_CRL*)XMALLOC(sizeof(WOLFSSL_CRL), cm->heap, |
wolfSSL | 0:d92f9d21154c | 3411 | DYNAMIC_TYPE_CRL); |
wolfSSL | 0:d92f9d21154c | 3412 | if (cm->crl == NULL) |
wolfSSL | 0:d92f9d21154c | 3413 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 3414 | |
wolfSSL | 0:d92f9d21154c | 3415 | if (InitCRL(cm->crl, cm) != 0) { |
wolfSSL | 0:d92f9d21154c | 3416 | WOLFSSL_MSG("Init CRL failed"); |
wolfSSL | 0:d92f9d21154c | 3417 | FreeCRL(cm->crl, 1); |
wolfSSL | 0:d92f9d21154c | 3418 | cm->crl = NULL; |
wolfSSL | 0:d92f9d21154c | 3419 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 3420 | } |
wolfSSL | 0:d92f9d21154c | 3421 | } |
wolfSSL | 0:d92f9d21154c | 3422 | cm->crlEnabled = 1; |
wolfSSL | 0:d92f9d21154c | 3423 | if (options & WOLFSSL_CRL_CHECKALL) |
wolfSSL | 0:d92f9d21154c | 3424 | cm->crlCheckAll = 1; |
wolfSSL | 0:d92f9d21154c | 3425 | #else |
wolfSSL | 0:d92f9d21154c | 3426 | ret = NOT_COMPILED_IN; |
wolfSSL | 0:d92f9d21154c | 3427 | #endif |
wolfSSL | 0:d92f9d21154c | 3428 | |
wolfSSL | 0:d92f9d21154c | 3429 | return ret; |
wolfSSL | 0:d92f9d21154c | 3430 | } |
wolfSSL | 0:d92f9d21154c | 3431 | |
wolfSSL | 0:d92f9d21154c | 3432 | |
wolfSSL | 0:d92f9d21154c | 3433 | int wolfSSL_CertManagerDisableCRL(WOLFSSL_CERT_MANAGER* cm) |
wolfSSL | 0:d92f9d21154c | 3434 | { |
wolfSSL | 0:d92f9d21154c | 3435 | WOLFSSL_ENTER("wolfSSL_CertManagerDisableCRL"); |
wolfSSL | 0:d92f9d21154c | 3436 | if (cm == NULL) |
wolfSSL | 0:d92f9d21154c | 3437 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3438 | |
wolfSSL | 0:d92f9d21154c | 3439 | cm->crlEnabled = 0; |
wolfSSL | 0:d92f9d21154c | 3440 | |
wolfSSL | 0:d92f9d21154c | 3441 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 3442 | } |
wolfSSL | 0:d92f9d21154c | 3443 | |
wolfSSL | 0:d92f9d21154c | 3444 | |
wolfSSL | 0:d92f9d21154c | 3445 | int wolfSSL_CTX_check_private_key(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 3446 | { |
wolfSSL | 0:d92f9d21154c | 3447 | /* TODO: check private against public for RSA match */ |
wolfSSL | 0:d92f9d21154c | 3448 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 3449 | WOLFSSL_ENTER("SSL_CTX_check_private_key"); |
wolfSSL | 0:d92f9d21154c | 3450 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 3451 | } |
wolfSSL | 0:d92f9d21154c | 3452 | |
wolfSSL | 0:d92f9d21154c | 3453 | |
wolfSSL | 0:d92f9d21154c | 3454 | #ifdef HAVE_CRL |
wolfSSL | 0:d92f9d21154c | 3455 | |
wolfSSL | 0:d92f9d21154c | 3456 | |
wolfSSL | 0:d92f9d21154c | 3457 | /* check CRL if enabled, SSL_SUCCESS */ |
wolfSSL | 0:d92f9d21154c | 3458 | int wolfSSL_CertManagerCheckCRL(WOLFSSL_CERT_MANAGER* cm, byte* der, int sz) |
wolfSSL | 0:d92f9d21154c | 3459 | { |
wolfSSL | 0:d92f9d21154c | 3460 | int ret = 0; |
wolfSSL | 0:d92f9d21154c | 3461 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3462 | DecodedCert* cert = NULL; |
wolfSSL | 0:d92f9d21154c | 3463 | #else |
wolfSSL | 0:d92f9d21154c | 3464 | DecodedCert cert[1]; |
wolfSSL | 0:d92f9d21154c | 3465 | #endif |
wolfSSL | 0:d92f9d21154c | 3466 | |
wolfSSL | 0:d92f9d21154c | 3467 | WOLFSSL_ENTER("wolfSSL_CertManagerCheckCRL"); |
wolfSSL | 0:d92f9d21154c | 3468 | |
wolfSSL | 0:d92f9d21154c | 3469 | if (cm == NULL) |
wolfSSL | 0:d92f9d21154c | 3470 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3471 | |
wolfSSL | 0:d92f9d21154c | 3472 | if (cm->crlEnabled == 0) |
wolfSSL | 0:d92f9d21154c | 3473 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 3474 | |
wolfSSL | 0:d92f9d21154c | 3475 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3476 | cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL, |
wolfSSL | 0:d92f9d21154c | 3477 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 3478 | if (cert == NULL) |
wolfSSL | 0:d92f9d21154c | 3479 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 3480 | #endif |
wolfSSL | 0:d92f9d21154c | 3481 | |
wolfSSL | 0:d92f9d21154c | 3482 | InitDecodedCert(cert, der, sz, NULL); |
wolfSSL | 0:d92f9d21154c | 3483 | |
wolfSSL | 0:d92f9d21154c | 3484 | if ((ret = ParseCertRelative(cert, CERT_TYPE, NO_VERIFY, cm)) != 0) { |
wolfSSL | 0:d92f9d21154c | 3485 | WOLFSSL_MSG("ParseCert failed"); |
wolfSSL | 0:d92f9d21154c | 3486 | } |
wolfSSL | 0:d92f9d21154c | 3487 | else if ((ret = CheckCertCRL(cm->crl, cert)) != 0) { |
wolfSSL | 0:d92f9d21154c | 3488 | WOLFSSL_MSG("CheckCertCRL failed"); |
wolfSSL | 0:d92f9d21154c | 3489 | } |
wolfSSL | 0:d92f9d21154c | 3490 | |
wolfSSL | 0:d92f9d21154c | 3491 | FreeDecodedCert(cert); |
wolfSSL | 0:d92f9d21154c | 3492 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3493 | XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 3494 | #endif |
wolfSSL | 0:d92f9d21154c | 3495 | |
wolfSSL | 0:d92f9d21154c | 3496 | return ret == 0 ? SSL_SUCCESS : ret; |
wolfSSL | 0:d92f9d21154c | 3497 | } |
wolfSSL | 0:d92f9d21154c | 3498 | |
wolfSSL | 0:d92f9d21154c | 3499 | |
wolfSSL | 0:d92f9d21154c | 3500 | int wolfSSL_CertManagerSetCRL_Cb(WOLFSSL_CERT_MANAGER* cm, CbMissingCRL cb) |
wolfSSL | 0:d92f9d21154c | 3501 | { |
wolfSSL | 0:d92f9d21154c | 3502 | WOLFSSL_ENTER("wolfSSL_CertManagerSetCRL_Cb"); |
wolfSSL | 0:d92f9d21154c | 3503 | if (cm == NULL) |
wolfSSL | 0:d92f9d21154c | 3504 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3505 | |
wolfSSL | 0:d92f9d21154c | 3506 | cm->cbMissingCRL = cb; |
wolfSSL | 0:d92f9d21154c | 3507 | |
wolfSSL | 0:d92f9d21154c | 3508 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 3509 | } |
wolfSSL | 0:d92f9d21154c | 3510 | |
wolfSSL | 0:d92f9d21154c | 3511 | |
wolfSSL | 0:d92f9d21154c | 3512 | int wolfSSL_CertManagerLoadCRL(WOLFSSL_CERT_MANAGER* cm, const char* path, |
wolfSSL | 0:d92f9d21154c | 3513 | int type, int monitor) |
wolfSSL | 0:d92f9d21154c | 3514 | { |
wolfSSL | 0:d92f9d21154c | 3515 | WOLFSSL_ENTER("wolfSSL_CertManagerLoadCRL"); |
wolfSSL | 0:d92f9d21154c | 3516 | if (cm == NULL) |
wolfSSL | 0:d92f9d21154c | 3517 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3518 | |
wolfSSL | 0:d92f9d21154c | 3519 | if (cm->crl == NULL) { |
wolfSSL | 0:d92f9d21154c | 3520 | if (wolfSSL_CertManagerEnableCRL(cm, 0) != SSL_SUCCESS) { |
wolfSSL | 0:d92f9d21154c | 3521 | WOLFSSL_MSG("Enable CRL failed"); |
wolfSSL | 0:d92f9d21154c | 3522 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 3523 | } |
wolfSSL | 0:d92f9d21154c | 3524 | } |
wolfSSL | 0:d92f9d21154c | 3525 | |
wolfSSL | 0:d92f9d21154c | 3526 | return LoadCRL(cm->crl, path, type, monitor); |
wolfSSL | 0:d92f9d21154c | 3527 | } |
wolfSSL | 0:d92f9d21154c | 3528 | |
wolfSSL | 0:d92f9d21154c | 3529 | |
wolfSSL | 0:d92f9d21154c | 3530 | int wolfSSL_EnableCRL(WOLFSSL* ssl, int options) |
wolfSSL | 0:d92f9d21154c | 3531 | { |
wolfSSL | 0:d92f9d21154c | 3532 | WOLFSSL_ENTER("wolfSSL_EnableCRL"); |
wolfSSL | 0:d92f9d21154c | 3533 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 3534 | return wolfSSL_CertManagerEnableCRL(ssl->ctx->cm, options); |
wolfSSL | 0:d92f9d21154c | 3535 | else |
wolfSSL | 0:d92f9d21154c | 3536 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3537 | } |
wolfSSL | 0:d92f9d21154c | 3538 | |
wolfSSL | 0:d92f9d21154c | 3539 | |
wolfSSL | 0:d92f9d21154c | 3540 | int wolfSSL_DisableCRL(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 3541 | { |
wolfSSL | 0:d92f9d21154c | 3542 | WOLFSSL_ENTER("wolfSSL_DisableCRL"); |
wolfSSL | 0:d92f9d21154c | 3543 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 3544 | return wolfSSL_CertManagerDisableCRL(ssl->ctx->cm); |
wolfSSL | 0:d92f9d21154c | 3545 | else |
wolfSSL | 0:d92f9d21154c | 3546 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3547 | } |
wolfSSL | 0:d92f9d21154c | 3548 | |
wolfSSL | 0:d92f9d21154c | 3549 | |
wolfSSL | 0:d92f9d21154c | 3550 | int wolfSSL_LoadCRL(WOLFSSL* ssl, const char* path, int type, int monitor) |
wolfSSL | 0:d92f9d21154c | 3551 | { |
wolfSSL | 0:d92f9d21154c | 3552 | WOLFSSL_ENTER("wolfSSL_LoadCRL"); |
wolfSSL | 0:d92f9d21154c | 3553 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 3554 | return wolfSSL_CertManagerLoadCRL(ssl->ctx->cm, path, type, monitor); |
wolfSSL | 0:d92f9d21154c | 3555 | else |
wolfSSL | 0:d92f9d21154c | 3556 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3557 | } |
wolfSSL | 0:d92f9d21154c | 3558 | |
wolfSSL | 0:d92f9d21154c | 3559 | |
wolfSSL | 0:d92f9d21154c | 3560 | int wolfSSL_SetCRL_Cb(WOLFSSL* ssl, CbMissingCRL cb) |
wolfSSL | 0:d92f9d21154c | 3561 | { |
wolfSSL | 0:d92f9d21154c | 3562 | WOLFSSL_ENTER("wolfSSL_SetCRL_Cb"); |
wolfSSL | 0:d92f9d21154c | 3563 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 3564 | return wolfSSL_CertManagerSetCRL_Cb(ssl->ctx->cm, cb); |
wolfSSL | 0:d92f9d21154c | 3565 | else |
wolfSSL | 0:d92f9d21154c | 3566 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3567 | } |
wolfSSL | 0:d92f9d21154c | 3568 | |
wolfSSL | 0:d92f9d21154c | 3569 | |
wolfSSL | 0:d92f9d21154c | 3570 | int wolfSSL_CTX_EnableCRL(WOLFSSL_CTX* ctx, int options) |
wolfSSL | 0:d92f9d21154c | 3571 | { |
wolfSSL | 0:d92f9d21154c | 3572 | WOLFSSL_ENTER("wolfSSL_CTX_EnableCRL"); |
wolfSSL | 0:d92f9d21154c | 3573 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 3574 | return wolfSSL_CertManagerEnableCRL(ctx->cm, options); |
wolfSSL | 0:d92f9d21154c | 3575 | else |
wolfSSL | 0:d92f9d21154c | 3576 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3577 | } |
wolfSSL | 0:d92f9d21154c | 3578 | |
wolfSSL | 0:d92f9d21154c | 3579 | |
wolfSSL | 0:d92f9d21154c | 3580 | int wolfSSL_CTX_DisableCRL(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 3581 | { |
wolfSSL | 0:d92f9d21154c | 3582 | WOLFSSL_ENTER("wolfSSL_CTX_DisableCRL"); |
wolfSSL | 0:d92f9d21154c | 3583 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 3584 | return wolfSSL_CertManagerDisableCRL(ctx->cm); |
wolfSSL | 0:d92f9d21154c | 3585 | else |
wolfSSL | 0:d92f9d21154c | 3586 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3587 | } |
wolfSSL | 0:d92f9d21154c | 3588 | |
wolfSSL | 0:d92f9d21154c | 3589 | |
wolfSSL | 0:d92f9d21154c | 3590 | int wolfSSL_CTX_LoadCRL(WOLFSSL_CTX* ctx, const char* path, int type, int monitor) |
wolfSSL | 0:d92f9d21154c | 3591 | { |
wolfSSL | 0:d92f9d21154c | 3592 | WOLFSSL_ENTER("wolfSSL_CTX_LoadCRL"); |
wolfSSL | 0:d92f9d21154c | 3593 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 3594 | return wolfSSL_CertManagerLoadCRL(ctx->cm, path, type, monitor); |
wolfSSL | 0:d92f9d21154c | 3595 | else |
wolfSSL | 0:d92f9d21154c | 3596 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3597 | } |
wolfSSL | 0:d92f9d21154c | 3598 | |
wolfSSL | 0:d92f9d21154c | 3599 | |
wolfSSL | 0:d92f9d21154c | 3600 | int wolfSSL_CTX_SetCRL_Cb(WOLFSSL_CTX* ctx, CbMissingCRL cb) |
wolfSSL | 0:d92f9d21154c | 3601 | { |
wolfSSL | 0:d92f9d21154c | 3602 | WOLFSSL_ENTER("wolfSSL_CTX_SetCRL_Cb"); |
wolfSSL | 0:d92f9d21154c | 3603 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 3604 | return wolfSSL_CertManagerSetCRL_Cb(ctx->cm, cb); |
wolfSSL | 0:d92f9d21154c | 3605 | else |
wolfSSL | 0:d92f9d21154c | 3606 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3607 | } |
wolfSSL | 0:d92f9d21154c | 3608 | |
wolfSSL | 0:d92f9d21154c | 3609 | |
wolfSSL | 0:d92f9d21154c | 3610 | #endif /* HAVE_CRL */ |
wolfSSL | 0:d92f9d21154c | 3611 | |
wolfSSL | 0:d92f9d21154c | 3612 | |
wolfSSL | 0:d92f9d21154c | 3613 | #ifdef WOLFSSL_DER_LOAD |
wolfSSL | 0:d92f9d21154c | 3614 | |
wolfSSL | 0:d92f9d21154c | 3615 | /* Add format parameter to allow DER load of CA files */ |
wolfSSL | 0:d92f9d21154c | 3616 | int wolfSSL_CTX_der_load_verify_locations(WOLFSSL_CTX* ctx, const char* file, |
wolfSSL | 0:d92f9d21154c | 3617 | int format) |
wolfSSL | 0:d92f9d21154c | 3618 | { |
wolfSSL | 0:d92f9d21154c | 3619 | WOLFSSL_ENTER("wolfSSL_CTX_der_load_verify_locations"); |
wolfSSL | 0:d92f9d21154c | 3620 | if (ctx == NULL || file == NULL) |
wolfSSL | 0:d92f9d21154c | 3621 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 3622 | |
wolfSSL | 0:d92f9d21154c | 3623 | if (ProcessFile(ctx, file, format, CA_TYPE, NULL, 0, NULL) == SSL_SUCCESS) |
wolfSSL | 0:d92f9d21154c | 3624 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 3625 | |
wolfSSL | 0:d92f9d21154c | 3626 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 3627 | } |
wolfSSL | 0:d92f9d21154c | 3628 | |
wolfSSL | 0:d92f9d21154c | 3629 | #endif /* WOLFSSL_DER_LOAD */ |
wolfSSL | 0:d92f9d21154c | 3630 | |
wolfSSL | 0:d92f9d21154c | 3631 | |
wolfSSL | 0:d92f9d21154c | 3632 | #ifdef WOLFSSL_CERT_GEN |
wolfSSL | 0:d92f9d21154c | 3633 | |
wolfSSL | 0:d92f9d21154c | 3634 | /* load pem cert from file into der buffer, return der size or error */ |
wolfSSL | 0:d92f9d21154c | 3635 | int wolfSSL_PemCertToDer(const char* fileName, unsigned char* derBuf, int derSz) |
wolfSSL | 0:d92f9d21154c | 3636 | { |
wolfSSL | 0:d92f9d21154c | 3637 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3638 | EncryptedInfo* info = NULL; |
wolfSSL | 0:d92f9d21154c | 3639 | byte staticBuffer[1]; /* force XMALLOC */ |
wolfSSL | 0:d92f9d21154c | 3640 | #else |
wolfSSL | 0:d92f9d21154c | 3641 | EncryptedInfo info[1]; |
wolfSSL | 0:d92f9d21154c | 3642 | byte staticBuffer[FILE_BUFFER_SIZE]; |
wolfSSL | 0:d92f9d21154c | 3643 | #endif |
wolfSSL | 0:d92f9d21154c | 3644 | byte* fileBuf = staticBuffer; |
wolfSSL | 0:d92f9d21154c | 3645 | int dynamic = 0; |
wolfSSL | 0:d92f9d21154c | 3646 | int ret = 0; |
wolfSSL | 0:d92f9d21154c | 3647 | int ecc = 0; |
wolfSSL | 0:d92f9d21154c | 3648 | long sz = 0; |
wolfSSL | 0:d92f9d21154c | 3649 | XFILE file = XFOPEN(fileName, "rb"); |
wolfSSL | 0:d92f9d21154c | 3650 | buffer converted; |
wolfSSL | 0:d92f9d21154c | 3651 | |
wolfSSL | 0:d92f9d21154c | 3652 | WOLFSSL_ENTER("wolfSSL_PemCertToDer"); |
wolfSSL | 0:d92f9d21154c | 3653 | |
wolfSSL | 0:d92f9d21154c | 3654 | if (file == XBADFILE) |
wolfSSL | 0:d92f9d21154c | 3655 | ret = SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 3656 | else { |
wolfSSL | 0:d92f9d21154c | 3657 | XFSEEK(file, 0, XSEEK_END); |
wolfSSL | 0:d92f9d21154c | 3658 | sz = XFTELL(file); |
wolfSSL | 0:d92f9d21154c | 3659 | XREWIND(file); |
wolfSSL | 0:d92f9d21154c | 3660 | |
wolfSSL | 0:d92f9d21154c | 3661 | if (sz < 0) { |
wolfSSL | 0:d92f9d21154c | 3662 | ret = SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 3663 | } |
wolfSSL | 0:d92f9d21154c | 3664 | else if (sz > (long)sizeof(staticBuffer)) { |
wolfSSL | 0:d92f9d21154c | 3665 | fileBuf = (byte*)XMALLOC(sz, 0, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 3666 | if (fileBuf == NULL) |
wolfSSL | 0:d92f9d21154c | 3667 | ret = MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 3668 | else |
wolfSSL | 0:d92f9d21154c | 3669 | dynamic = 1; |
wolfSSL | 0:d92f9d21154c | 3670 | } |
wolfSSL | 0:d92f9d21154c | 3671 | |
wolfSSL | 0:d92f9d21154c | 3672 | converted.buffer = 0; |
wolfSSL | 0:d92f9d21154c | 3673 | |
wolfSSL | 0:d92f9d21154c | 3674 | if (ret == 0) { |
wolfSSL | 0:d92f9d21154c | 3675 | if ( (ret = (int)XFREAD(fileBuf, sz, 1, file)) < 0) |
wolfSSL | 0:d92f9d21154c | 3676 | ret = SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 3677 | else { |
wolfSSL | 0:d92f9d21154c | 3678 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3679 | info = (EncryptedInfo*)XMALLOC(sizeof(EncryptedInfo), NULL, |
wolfSSL | 0:d92f9d21154c | 3680 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 3681 | if (info == NULL) |
wolfSSL | 0:d92f9d21154c | 3682 | ret = MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 3683 | else |
wolfSSL | 0:d92f9d21154c | 3684 | #endif |
wolfSSL | 0:d92f9d21154c | 3685 | { |
wolfSSL | 0:d92f9d21154c | 3686 | ret = PemToDer(fileBuf, sz, CA_TYPE, &converted, 0, info, |
wolfSSL | 0:d92f9d21154c | 3687 | &ecc); |
wolfSSL | 0:d92f9d21154c | 3688 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3689 | XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 3690 | #endif |
wolfSSL | 0:d92f9d21154c | 3691 | } |
wolfSSL | 0:d92f9d21154c | 3692 | } |
wolfSSL | 0:d92f9d21154c | 3693 | |
wolfSSL | 0:d92f9d21154c | 3694 | if (ret == 0) { |
wolfSSL | 0:d92f9d21154c | 3695 | if (converted.length < (word32)derSz) { |
wolfSSL | 0:d92f9d21154c | 3696 | XMEMCPY(derBuf, converted.buffer, converted.length); |
wolfSSL | 0:d92f9d21154c | 3697 | ret = converted.length; |
wolfSSL | 0:d92f9d21154c | 3698 | } |
wolfSSL | 0:d92f9d21154c | 3699 | else |
wolfSSL | 0:d92f9d21154c | 3700 | ret = BUFFER_E; |
wolfSSL | 0:d92f9d21154c | 3701 | } |
wolfSSL | 0:d92f9d21154c | 3702 | |
wolfSSL | 0:d92f9d21154c | 3703 | XFREE(converted.buffer, 0, DYNAMIC_TYPE_CA); |
wolfSSL | 0:d92f9d21154c | 3704 | } |
wolfSSL | 0:d92f9d21154c | 3705 | |
wolfSSL | 0:d92f9d21154c | 3706 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 3707 | if (dynamic) |
wolfSSL | 0:d92f9d21154c | 3708 | XFREE(fileBuf, 0, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 3709 | } |
wolfSSL | 0:d92f9d21154c | 3710 | |
wolfSSL | 0:d92f9d21154c | 3711 | return ret; |
wolfSSL | 0:d92f9d21154c | 3712 | } |
wolfSSL | 0:d92f9d21154c | 3713 | |
wolfSSL | 0:d92f9d21154c | 3714 | #endif /* WOLFSSL_CERT_GEN */ |
wolfSSL | 0:d92f9d21154c | 3715 | |
wolfSSL | 0:d92f9d21154c | 3716 | |
wolfSSL | 0:d92f9d21154c | 3717 | int wolfSSL_CTX_use_certificate_file(WOLFSSL_CTX* ctx, const char* file, |
wolfSSL | 0:d92f9d21154c | 3718 | int format) |
wolfSSL | 0:d92f9d21154c | 3719 | { |
wolfSSL | 0:d92f9d21154c | 3720 | WOLFSSL_ENTER("wolfSSL_CTX_use_certificate_file"); |
wolfSSL | 0:d92f9d21154c | 3721 | if (ProcessFile(ctx, file, format, CERT_TYPE, NULL, 0, NULL) == SSL_SUCCESS) |
wolfSSL | 0:d92f9d21154c | 3722 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 3723 | |
wolfSSL | 0:d92f9d21154c | 3724 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 3725 | } |
wolfSSL | 0:d92f9d21154c | 3726 | |
wolfSSL | 0:d92f9d21154c | 3727 | |
wolfSSL | 0:d92f9d21154c | 3728 | int wolfSSL_CTX_use_PrivateKey_file(WOLFSSL_CTX* ctx, const char* file,int format) |
wolfSSL | 0:d92f9d21154c | 3729 | { |
wolfSSL | 0:d92f9d21154c | 3730 | WOLFSSL_ENTER("wolfSSL_CTX_use_PrivateKey_file"); |
wolfSSL | 0:d92f9d21154c | 3731 | if (ProcessFile(ctx, file, format, PRIVATEKEY_TYPE, NULL, 0, NULL) |
wolfSSL | 0:d92f9d21154c | 3732 | == SSL_SUCCESS) |
wolfSSL | 0:d92f9d21154c | 3733 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 3734 | |
wolfSSL | 0:d92f9d21154c | 3735 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 3736 | } |
wolfSSL | 0:d92f9d21154c | 3737 | |
wolfSSL | 0:d92f9d21154c | 3738 | |
wolfSSL | 0:d92f9d21154c | 3739 | /* get cert chaining depth using ssl struct */ |
wolfSSL | 0:d92f9d21154c | 3740 | long wolfSSL_get_verify_depth(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 3741 | { |
wolfSSL | 0:d92f9d21154c | 3742 | if(ssl == NULL) { |
wolfSSL | 0:d92f9d21154c | 3743 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3744 | } |
wolfSSL | 0:d92f9d21154c | 3745 | return MAX_CHAIN_DEPTH; |
wolfSSL | 0:d92f9d21154c | 3746 | } |
wolfSSL | 0:d92f9d21154c | 3747 | |
wolfSSL | 0:d92f9d21154c | 3748 | |
wolfSSL | 0:d92f9d21154c | 3749 | /* get cert chaining depth using ctx struct */ |
wolfSSL | 0:d92f9d21154c | 3750 | long wolfSSL_CTX_get_verify_depth(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 3751 | { |
wolfSSL | 0:d92f9d21154c | 3752 | if(ctx == NULL) { |
wolfSSL | 0:d92f9d21154c | 3753 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3754 | } |
wolfSSL | 0:d92f9d21154c | 3755 | return MAX_CHAIN_DEPTH; |
wolfSSL | 0:d92f9d21154c | 3756 | } |
wolfSSL | 0:d92f9d21154c | 3757 | |
wolfSSL | 0:d92f9d21154c | 3758 | |
wolfSSL | 0:d92f9d21154c | 3759 | int wolfSSL_CTX_use_certificate_chain_file(WOLFSSL_CTX* ctx, const char* file) |
wolfSSL | 0:d92f9d21154c | 3760 | { |
wolfSSL | 0:d92f9d21154c | 3761 | /* procces up to MAX_CHAIN_DEPTH plus subject cert */ |
wolfSSL | 0:d92f9d21154c | 3762 | WOLFSSL_ENTER("wolfSSL_CTX_use_certificate_chain_file"); |
wolfSSL | 0:d92f9d21154c | 3763 | if (ProcessFile(ctx, file, SSL_FILETYPE_PEM,CERT_TYPE,NULL,1, NULL) |
wolfSSL | 0:d92f9d21154c | 3764 | == SSL_SUCCESS) |
wolfSSL | 0:d92f9d21154c | 3765 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 3766 | |
wolfSSL | 0:d92f9d21154c | 3767 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 3768 | } |
wolfSSL | 0:d92f9d21154c | 3769 | |
wolfSSL | 0:d92f9d21154c | 3770 | |
wolfSSL | 0:d92f9d21154c | 3771 | #ifndef NO_DH |
wolfSSL | 0:d92f9d21154c | 3772 | |
wolfSSL | 0:d92f9d21154c | 3773 | /* server wrapper for ctx or ssl Diffie-Hellman parameters */ |
wolfSSL | 0:d92f9d21154c | 3774 | static int wolfSSL_SetTmpDH_buffer_wrapper(WOLFSSL_CTX* ctx, WOLFSSL* ssl, |
wolfSSL | 0:d92f9d21154c | 3775 | const unsigned char* buf, long sz, int format) |
wolfSSL | 0:d92f9d21154c | 3776 | { |
wolfSSL | 0:d92f9d21154c | 3777 | buffer der; |
wolfSSL | 0:d92f9d21154c | 3778 | int ret = 0; |
wolfSSL | 0:d92f9d21154c | 3779 | int weOwnDer = 0; |
wolfSSL | 0:d92f9d21154c | 3780 | word32 pSz = MAX_DH_SIZE; |
wolfSSL | 0:d92f9d21154c | 3781 | word32 gSz = MAX_DH_SIZE; |
wolfSSL | 0:d92f9d21154c | 3782 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3783 | byte* p = NULL; |
wolfSSL | 0:d92f9d21154c | 3784 | byte* g = NULL; |
wolfSSL | 0:d92f9d21154c | 3785 | #else |
wolfSSL | 0:d92f9d21154c | 3786 | byte p[MAX_DH_SIZE]; |
wolfSSL | 0:d92f9d21154c | 3787 | byte g[MAX_DH_SIZE]; |
wolfSSL | 0:d92f9d21154c | 3788 | #endif |
wolfSSL | 0:d92f9d21154c | 3789 | |
wolfSSL | 0:d92f9d21154c | 3790 | der.buffer = (byte*)buf; |
wolfSSL | 0:d92f9d21154c | 3791 | der.length = (word32)sz; |
wolfSSL | 0:d92f9d21154c | 3792 | |
wolfSSL | 0:d92f9d21154c | 3793 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3794 | p = (byte*)XMALLOC(pSz, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 3795 | g = (byte*)XMALLOC(gSz, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 3796 | |
wolfSSL | 0:d92f9d21154c | 3797 | if (p == NULL || g == NULL) { |
wolfSSL | 0:d92f9d21154c | 3798 | XFREE(p, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 3799 | XFREE(g, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 3800 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 3801 | } |
wolfSSL | 0:d92f9d21154c | 3802 | #endif |
wolfSSL | 0:d92f9d21154c | 3803 | |
wolfSSL | 0:d92f9d21154c | 3804 | if (format != SSL_FILETYPE_ASN1 && format != SSL_FILETYPE_PEM) |
wolfSSL | 0:d92f9d21154c | 3805 | ret = SSL_BAD_FILETYPE; |
wolfSSL | 0:d92f9d21154c | 3806 | else { |
wolfSSL | 0:d92f9d21154c | 3807 | if (format == SSL_FILETYPE_PEM) { |
wolfSSL | 0:d92f9d21154c | 3808 | der.buffer = NULL; |
wolfSSL | 0:d92f9d21154c | 3809 | ret = PemToDer(buf, sz, DH_PARAM_TYPE, &der, ctx->heap, NULL,NULL); |
wolfSSL | 0:d92f9d21154c | 3810 | weOwnDer = 1; |
wolfSSL | 0:d92f9d21154c | 3811 | } |
wolfSSL | 0:d92f9d21154c | 3812 | |
wolfSSL | 0:d92f9d21154c | 3813 | if (ret == 0) { |
wolfSSL | 0:d92f9d21154c | 3814 | if (wc_DhParamsLoad(der.buffer, der.length, p, &pSz, g, &gSz) < 0) |
wolfSSL | 0:d92f9d21154c | 3815 | ret = SSL_BAD_FILETYPE; |
wolfSSL | 0:d92f9d21154c | 3816 | else if (ssl) |
wolfSSL | 0:d92f9d21154c | 3817 | ret = wolfSSL_SetTmpDH(ssl, p, pSz, g, gSz); |
wolfSSL | 0:d92f9d21154c | 3818 | else |
wolfSSL | 0:d92f9d21154c | 3819 | ret = wolfSSL_CTX_SetTmpDH(ctx, p, pSz, g, gSz); |
wolfSSL | 0:d92f9d21154c | 3820 | } |
wolfSSL | 0:d92f9d21154c | 3821 | } |
wolfSSL | 0:d92f9d21154c | 3822 | |
wolfSSL | 0:d92f9d21154c | 3823 | if (weOwnDer) |
wolfSSL | 0:d92f9d21154c | 3824 | XFREE(der.buffer, ctx->heap, DYNAMIC_TYPE_KEY); |
wolfSSL | 0:d92f9d21154c | 3825 | |
wolfSSL | 0:d92f9d21154c | 3826 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3827 | XFREE(p, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 3828 | XFREE(g, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 3829 | #endif |
wolfSSL | 0:d92f9d21154c | 3830 | |
wolfSSL | 0:d92f9d21154c | 3831 | return ret; |
wolfSSL | 0:d92f9d21154c | 3832 | } |
wolfSSL | 0:d92f9d21154c | 3833 | |
wolfSSL | 0:d92f9d21154c | 3834 | |
wolfSSL | 0:d92f9d21154c | 3835 | /* server Diffie-Hellman parameters, SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 3836 | int wolfSSL_SetTmpDH_buffer(WOLFSSL* ssl, const unsigned char* buf, long sz, |
wolfSSL | 0:d92f9d21154c | 3837 | int format) |
wolfSSL | 0:d92f9d21154c | 3838 | { |
wolfSSL | 0:d92f9d21154c | 3839 | return wolfSSL_SetTmpDH_buffer_wrapper(ssl->ctx, ssl, buf, sz, format); |
wolfSSL | 0:d92f9d21154c | 3840 | } |
wolfSSL | 0:d92f9d21154c | 3841 | |
wolfSSL | 0:d92f9d21154c | 3842 | |
wolfSSL | 0:d92f9d21154c | 3843 | /* server ctx Diffie-Hellman parameters, SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 3844 | int wolfSSL_CTX_SetTmpDH_buffer(WOLFSSL_CTX* ctx, const unsigned char* buf, |
wolfSSL | 0:d92f9d21154c | 3845 | long sz, int format) |
wolfSSL | 0:d92f9d21154c | 3846 | { |
wolfSSL | 0:d92f9d21154c | 3847 | return wolfSSL_SetTmpDH_buffer_wrapper(ctx, NULL, buf, sz, format); |
wolfSSL | 0:d92f9d21154c | 3848 | } |
wolfSSL | 0:d92f9d21154c | 3849 | |
wolfSSL | 0:d92f9d21154c | 3850 | |
wolfSSL | 0:d92f9d21154c | 3851 | /* server Diffie-Hellman parameters */ |
wolfSSL | 0:d92f9d21154c | 3852 | static int wolfSSL_SetTmpDH_file_wrapper(WOLFSSL_CTX* ctx, WOLFSSL* ssl, |
wolfSSL | 0:d92f9d21154c | 3853 | const char* fname, int format) |
wolfSSL | 0:d92f9d21154c | 3854 | { |
wolfSSL | 0:d92f9d21154c | 3855 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 3856 | byte staticBuffer[1]; /* force heap usage */ |
wolfSSL | 0:d92f9d21154c | 3857 | #else |
wolfSSL | 0:d92f9d21154c | 3858 | byte staticBuffer[FILE_BUFFER_SIZE]; |
wolfSSL | 0:d92f9d21154c | 3859 | #endif |
wolfSSL | 0:d92f9d21154c | 3860 | byte* myBuffer = staticBuffer; |
wolfSSL | 0:d92f9d21154c | 3861 | int dynamic = 0; |
wolfSSL | 0:d92f9d21154c | 3862 | int ret; |
wolfSSL | 0:d92f9d21154c | 3863 | long sz = 0; |
wolfSSL | 0:d92f9d21154c | 3864 | XFILE file = XFOPEN(fname, "rb"); |
wolfSSL | 0:d92f9d21154c | 3865 | |
wolfSSL | 0:d92f9d21154c | 3866 | if (file == XBADFILE) return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 3867 | XFSEEK(file, 0, XSEEK_END); |
wolfSSL | 0:d92f9d21154c | 3868 | sz = XFTELL(file); |
wolfSSL | 0:d92f9d21154c | 3869 | XREWIND(file); |
wolfSSL | 0:d92f9d21154c | 3870 | |
wolfSSL | 0:d92f9d21154c | 3871 | if (sz > (long)sizeof(staticBuffer)) { |
wolfSSL | 0:d92f9d21154c | 3872 | WOLFSSL_MSG("Getting dynamic buffer"); |
wolfSSL | 0:d92f9d21154c | 3873 | myBuffer = (byte*) XMALLOC(sz, ctx->heap, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 3874 | if (myBuffer == NULL) { |
wolfSSL | 0:d92f9d21154c | 3875 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 3876 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 3877 | } |
wolfSSL | 0:d92f9d21154c | 3878 | dynamic = 1; |
wolfSSL | 0:d92f9d21154c | 3879 | } |
wolfSSL | 0:d92f9d21154c | 3880 | else if (sz < 0) { |
wolfSSL | 0:d92f9d21154c | 3881 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 3882 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 3883 | } |
wolfSSL | 0:d92f9d21154c | 3884 | |
wolfSSL | 0:d92f9d21154c | 3885 | if ( (ret = (int)XFREAD(myBuffer, sz, 1, file)) < 0) |
wolfSSL | 0:d92f9d21154c | 3886 | ret = SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 3887 | else { |
wolfSSL | 0:d92f9d21154c | 3888 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 3889 | ret = wolfSSL_SetTmpDH_buffer(ssl, myBuffer, sz, format); |
wolfSSL | 0:d92f9d21154c | 3890 | else |
wolfSSL | 0:d92f9d21154c | 3891 | ret = wolfSSL_CTX_SetTmpDH_buffer(ctx, myBuffer, sz, format); |
wolfSSL | 0:d92f9d21154c | 3892 | } |
wolfSSL | 0:d92f9d21154c | 3893 | |
wolfSSL | 0:d92f9d21154c | 3894 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 3895 | if (dynamic) |
wolfSSL | 0:d92f9d21154c | 3896 | XFREE(myBuffer, ctx->heap, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 3897 | |
wolfSSL | 0:d92f9d21154c | 3898 | return ret; |
wolfSSL | 0:d92f9d21154c | 3899 | } |
wolfSSL | 0:d92f9d21154c | 3900 | |
wolfSSL | 0:d92f9d21154c | 3901 | /* server Diffie-Hellman parameters */ |
wolfSSL | 0:d92f9d21154c | 3902 | int wolfSSL_SetTmpDH_file(WOLFSSL* ssl, const char* fname, int format) |
wolfSSL | 0:d92f9d21154c | 3903 | { |
wolfSSL | 0:d92f9d21154c | 3904 | return wolfSSL_SetTmpDH_file_wrapper(ssl->ctx, ssl, fname, format); |
wolfSSL | 0:d92f9d21154c | 3905 | } |
wolfSSL | 0:d92f9d21154c | 3906 | |
wolfSSL | 0:d92f9d21154c | 3907 | |
wolfSSL | 0:d92f9d21154c | 3908 | /* server Diffie-Hellman parameters */ |
wolfSSL | 0:d92f9d21154c | 3909 | int wolfSSL_CTX_SetTmpDH_file(WOLFSSL_CTX* ctx, const char* fname, int format) |
wolfSSL | 0:d92f9d21154c | 3910 | { |
wolfSSL | 0:d92f9d21154c | 3911 | return wolfSSL_SetTmpDH_file_wrapper(ctx, NULL, fname, format); |
wolfSSL | 0:d92f9d21154c | 3912 | } |
wolfSSL | 0:d92f9d21154c | 3913 | |
wolfSSL | 0:d92f9d21154c | 3914 | |
wolfSSL | 0:d92f9d21154c | 3915 | int wolfSSL_CTX_SetMinDhKey_Sz(WOLFSSL_CTX* ctx, word16 keySz) |
wolfSSL | 0:d92f9d21154c | 3916 | { |
wolfSSL | 0:d92f9d21154c | 3917 | if (ctx == NULL || keySz > 16000 || keySz % 8 != 0) |
wolfSSL | 0:d92f9d21154c | 3918 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3919 | |
wolfSSL | 0:d92f9d21154c | 3920 | ctx->minDhKeySz = keySz / 8; |
wolfSSL | 0:d92f9d21154c | 3921 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 3922 | } |
wolfSSL | 0:d92f9d21154c | 3923 | |
wolfSSL | 0:d92f9d21154c | 3924 | |
wolfSSL | 0:d92f9d21154c | 3925 | int wolfSSL_SetMinDhKey_Sz(WOLFSSL* ssl, word16 keySz) |
wolfSSL | 0:d92f9d21154c | 3926 | { |
wolfSSL | 0:d92f9d21154c | 3927 | if (ssl == NULL || keySz > 16000 || keySz % 8 != 0) |
wolfSSL | 0:d92f9d21154c | 3928 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3929 | |
wolfSSL | 0:d92f9d21154c | 3930 | ssl->options.minDhKeySz = keySz / 8; |
wolfSSL | 0:d92f9d21154c | 3931 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 3932 | } |
wolfSSL | 0:d92f9d21154c | 3933 | |
wolfSSL | 0:d92f9d21154c | 3934 | |
wolfSSL | 0:d92f9d21154c | 3935 | int wolfSSL_GetDhKey_Sz(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 3936 | { |
wolfSSL | 0:d92f9d21154c | 3937 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 3938 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3939 | |
wolfSSL | 0:d92f9d21154c | 3940 | return (ssl->options.dhKeySz * 8); |
wolfSSL | 0:d92f9d21154c | 3941 | } |
wolfSSL | 0:d92f9d21154c | 3942 | |
wolfSSL | 0:d92f9d21154c | 3943 | |
wolfSSL | 0:d92f9d21154c | 3944 | #endif /* NO_DH */ |
wolfSSL | 0:d92f9d21154c | 3945 | |
wolfSSL | 0:d92f9d21154c | 3946 | |
wolfSSL | 0:d92f9d21154c | 3947 | #ifdef OPENSSL_EXTRA |
wolfSSL | 0:d92f9d21154c | 3948 | /* put SSL type in extra for now, not very common */ |
wolfSSL | 0:d92f9d21154c | 3949 | |
wolfSSL | 0:d92f9d21154c | 3950 | int wolfSSL_use_certificate_file(WOLFSSL* ssl, const char* file, int format) |
wolfSSL | 0:d92f9d21154c | 3951 | { |
wolfSSL | 0:d92f9d21154c | 3952 | WOLFSSL_ENTER("wolfSSL_use_certificate_file"); |
wolfSSL | 0:d92f9d21154c | 3953 | if (ProcessFile(ssl->ctx, file, format, CERT_TYPE, ssl, 0, NULL) |
wolfSSL | 0:d92f9d21154c | 3954 | == SSL_SUCCESS) |
wolfSSL | 0:d92f9d21154c | 3955 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 3956 | |
wolfSSL | 0:d92f9d21154c | 3957 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 3958 | } |
wolfSSL | 0:d92f9d21154c | 3959 | |
wolfSSL | 0:d92f9d21154c | 3960 | |
wolfSSL | 0:d92f9d21154c | 3961 | int wolfSSL_use_PrivateKey_file(WOLFSSL* ssl, const char* file, int format) |
wolfSSL | 0:d92f9d21154c | 3962 | { |
wolfSSL | 0:d92f9d21154c | 3963 | WOLFSSL_ENTER("wolfSSL_use_PrivateKey_file"); |
wolfSSL | 0:d92f9d21154c | 3964 | if (ProcessFile(ssl->ctx, file, format, PRIVATEKEY_TYPE, ssl, 0, NULL) |
wolfSSL | 0:d92f9d21154c | 3965 | == SSL_SUCCESS) |
wolfSSL | 0:d92f9d21154c | 3966 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 3967 | |
wolfSSL | 0:d92f9d21154c | 3968 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 3969 | } |
wolfSSL | 0:d92f9d21154c | 3970 | |
wolfSSL | 0:d92f9d21154c | 3971 | |
wolfSSL | 0:d92f9d21154c | 3972 | int wolfSSL_use_certificate_chain_file(WOLFSSL* ssl, const char* file) |
wolfSSL | 0:d92f9d21154c | 3973 | { |
wolfSSL | 0:d92f9d21154c | 3974 | /* procces up to MAX_CHAIN_DEPTH plus subject cert */ |
wolfSSL | 0:d92f9d21154c | 3975 | WOLFSSL_ENTER("wolfSSL_use_certificate_chain_file"); |
wolfSSL | 0:d92f9d21154c | 3976 | if (ProcessFile(ssl->ctx, file, SSL_FILETYPE_PEM, CERT_TYPE, ssl, 1, NULL) |
wolfSSL | 0:d92f9d21154c | 3977 | == SSL_SUCCESS) |
wolfSSL | 0:d92f9d21154c | 3978 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 3979 | |
wolfSSL | 0:d92f9d21154c | 3980 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 3981 | } |
wolfSSL | 0:d92f9d21154c | 3982 | |
wolfSSL | 0:d92f9d21154c | 3983 | |
wolfSSL | 0:d92f9d21154c | 3984 | |
wolfSSL | 0:d92f9d21154c | 3985 | #ifdef HAVE_ECC |
wolfSSL | 0:d92f9d21154c | 3986 | |
wolfSSL | 0:d92f9d21154c | 3987 | /* Set Temp CTX EC-DHE size in octets, should be 20 - 66 for 160 - 521 bit */ |
wolfSSL | 0:d92f9d21154c | 3988 | int wolfSSL_CTX_SetTmpEC_DHE_Sz(WOLFSSL_CTX* ctx, word16 sz) |
wolfSSL | 0:d92f9d21154c | 3989 | { |
wolfSSL | 0:d92f9d21154c | 3990 | if (ctx == NULL || sz < ECC_MINSIZE || sz > ECC_MAXSIZE) |
wolfSSL | 0:d92f9d21154c | 3991 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 3992 | |
wolfSSL | 0:d92f9d21154c | 3993 | ctx->eccTempKeySz = sz; |
wolfSSL | 0:d92f9d21154c | 3994 | |
wolfSSL | 0:d92f9d21154c | 3995 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 3996 | } |
wolfSSL | 0:d92f9d21154c | 3997 | |
wolfSSL | 0:d92f9d21154c | 3998 | |
wolfSSL | 0:d92f9d21154c | 3999 | /* Set Temp SSL EC-DHE size in octets, should be 20 - 66 for 160 - 521 bit */ |
wolfSSL | 0:d92f9d21154c | 4000 | int wolfSSL_SetTmpEC_DHE_Sz(WOLFSSL* ssl, word16 sz) |
wolfSSL | 0:d92f9d21154c | 4001 | { |
wolfSSL | 0:d92f9d21154c | 4002 | if (ssl == NULL || sz < ECC_MINSIZE || sz > ECC_MAXSIZE) |
wolfSSL | 0:d92f9d21154c | 4003 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 4004 | |
wolfSSL | 0:d92f9d21154c | 4005 | ssl->eccTempKeySz = sz; |
wolfSSL | 0:d92f9d21154c | 4006 | |
wolfSSL | 0:d92f9d21154c | 4007 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 4008 | } |
wolfSSL | 0:d92f9d21154c | 4009 | |
wolfSSL | 0:d92f9d21154c | 4010 | #endif /* HAVE_ECC */ |
wolfSSL | 0:d92f9d21154c | 4011 | |
wolfSSL | 0:d92f9d21154c | 4012 | |
wolfSSL | 0:d92f9d21154c | 4013 | |
wolfSSL | 0:d92f9d21154c | 4014 | |
wolfSSL | 0:d92f9d21154c | 4015 | int wolfSSL_CTX_use_RSAPrivateKey_file(WOLFSSL_CTX* ctx,const char* file, |
wolfSSL | 0:d92f9d21154c | 4016 | int format) |
wolfSSL | 0:d92f9d21154c | 4017 | { |
wolfSSL | 0:d92f9d21154c | 4018 | WOLFSSL_ENTER("SSL_CTX_use_RSAPrivateKey_file"); |
wolfSSL | 0:d92f9d21154c | 4019 | |
wolfSSL | 0:d92f9d21154c | 4020 | return wolfSSL_CTX_use_PrivateKey_file(ctx, file, format); |
wolfSSL | 0:d92f9d21154c | 4021 | } |
wolfSSL | 0:d92f9d21154c | 4022 | |
wolfSSL | 0:d92f9d21154c | 4023 | |
wolfSSL | 0:d92f9d21154c | 4024 | int wolfSSL_use_RSAPrivateKey_file(WOLFSSL* ssl, const char* file, int format) |
wolfSSL | 0:d92f9d21154c | 4025 | { |
wolfSSL | 0:d92f9d21154c | 4026 | WOLFSSL_ENTER("wolfSSL_use_RSAPrivateKey_file"); |
wolfSSL | 0:d92f9d21154c | 4027 | |
wolfSSL | 0:d92f9d21154c | 4028 | return wolfSSL_use_PrivateKey_file(ssl, file, format); |
wolfSSL | 0:d92f9d21154c | 4029 | } |
wolfSSL | 0:d92f9d21154c | 4030 | |
wolfSSL | 0:d92f9d21154c | 4031 | #endif /* OPENSSL_EXTRA */ |
wolfSSL | 0:d92f9d21154c | 4032 | |
wolfSSL | 0:d92f9d21154c | 4033 | #ifdef HAVE_NTRU |
wolfSSL | 0:d92f9d21154c | 4034 | |
wolfSSL | 0:d92f9d21154c | 4035 | int wolfSSL_CTX_use_NTRUPrivateKey_file(WOLFSSL_CTX* ctx, const char* file) |
wolfSSL | 0:d92f9d21154c | 4036 | { |
wolfSSL | 0:d92f9d21154c | 4037 | WOLFSSL_ENTER("wolfSSL_CTX_use_NTRUPrivateKey_file"); |
wolfSSL | 0:d92f9d21154c | 4038 | if (ctx == NULL) |
wolfSSL | 0:d92f9d21154c | 4039 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 4040 | |
wolfSSL | 0:d92f9d21154c | 4041 | if (ProcessFile(ctx, file, SSL_FILETYPE_RAW, PRIVATEKEY_TYPE, NULL, 0, NULL) |
wolfSSL | 0:d92f9d21154c | 4042 | == SSL_SUCCESS) { |
wolfSSL | 0:d92f9d21154c | 4043 | ctx->haveNTRU = 1; |
wolfSSL | 0:d92f9d21154c | 4044 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 4045 | } |
wolfSSL | 0:d92f9d21154c | 4046 | |
wolfSSL | 0:d92f9d21154c | 4047 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 4048 | } |
wolfSSL | 0:d92f9d21154c | 4049 | |
wolfSSL | 0:d92f9d21154c | 4050 | #endif /* HAVE_NTRU */ |
wolfSSL | 0:d92f9d21154c | 4051 | |
wolfSSL | 0:d92f9d21154c | 4052 | |
wolfSSL | 0:d92f9d21154c | 4053 | #endif /* NO_FILESYSTEM */ |
wolfSSL | 0:d92f9d21154c | 4054 | |
wolfSSL | 0:d92f9d21154c | 4055 | |
wolfSSL | 0:d92f9d21154c | 4056 | void wolfSSL_CTX_set_verify(WOLFSSL_CTX* ctx, int mode, VerifyCallback vc) |
wolfSSL | 0:d92f9d21154c | 4057 | { |
wolfSSL | 0:d92f9d21154c | 4058 | WOLFSSL_ENTER("wolfSSL_CTX_set_verify"); |
wolfSSL | 0:d92f9d21154c | 4059 | if (mode & SSL_VERIFY_PEER) { |
wolfSSL | 0:d92f9d21154c | 4060 | ctx->verifyPeer = 1; |
wolfSSL | 0:d92f9d21154c | 4061 | ctx->verifyNone = 0; /* in case perviously set */ |
wolfSSL | 0:d92f9d21154c | 4062 | } |
wolfSSL | 0:d92f9d21154c | 4063 | |
wolfSSL | 0:d92f9d21154c | 4064 | if (mode == SSL_VERIFY_NONE) { |
wolfSSL | 0:d92f9d21154c | 4065 | ctx->verifyNone = 1; |
wolfSSL | 0:d92f9d21154c | 4066 | ctx->verifyPeer = 0; /* in case previously set */ |
wolfSSL | 0:d92f9d21154c | 4067 | } |
wolfSSL | 0:d92f9d21154c | 4068 | |
wolfSSL | 0:d92f9d21154c | 4069 | if (mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT) |
wolfSSL | 0:d92f9d21154c | 4070 | ctx->failNoCert = 1; |
wolfSSL | 0:d92f9d21154c | 4071 | |
wolfSSL | 0:d92f9d21154c | 4072 | ctx->verifyCallback = vc; |
wolfSSL | 0:d92f9d21154c | 4073 | } |
wolfSSL | 0:d92f9d21154c | 4074 | |
wolfSSL | 0:d92f9d21154c | 4075 | |
wolfSSL | 0:d92f9d21154c | 4076 | void wolfSSL_set_verify(WOLFSSL* ssl, int mode, VerifyCallback vc) |
wolfSSL | 0:d92f9d21154c | 4077 | { |
wolfSSL | 0:d92f9d21154c | 4078 | WOLFSSL_ENTER("wolfSSL_set_verify"); |
wolfSSL | 0:d92f9d21154c | 4079 | if (mode & SSL_VERIFY_PEER) { |
wolfSSL | 0:d92f9d21154c | 4080 | ssl->options.verifyPeer = 1; |
wolfSSL | 0:d92f9d21154c | 4081 | ssl->options.verifyNone = 0; /* in case perviously set */ |
wolfSSL | 0:d92f9d21154c | 4082 | } |
wolfSSL | 0:d92f9d21154c | 4083 | |
wolfSSL | 0:d92f9d21154c | 4084 | if (mode == SSL_VERIFY_NONE) { |
wolfSSL | 0:d92f9d21154c | 4085 | ssl->options.verifyNone = 1; |
wolfSSL | 0:d92f9d21154c | 4086 | ssl->options.verifyPeer = 0; /* in case previously set */ |
wolfSSL | 0:d92f9d21154c | 4087 | } |
wolfSSL | 0:d92f9d21154c | 4088 | |
wolfSSL | 0:d92f9d21154c | 4089 | if (mode & SSL_VERIFY_FAIL_IF_NO_PEER_CERT) |
wolfSSL | 0:d92f9d21154c | 4090 | ssl->options.failNoCert = 1; |
wolfSSL | 0:d92f9d21154c | 4091 | |
wolfSSL | 0:d92f9d21154c | 4092 | ssl->verifyCallback = vc; |
wolfSSL | 0:d92f9d21154c | 4093 | } |
wolfSSL | 0:d92f9d21154c | 4094 | |
wolfSSL | 0:d92f9d21154c | 4095 | |
wolfSSL | 0:d92f9d21154c | 4096 | /* store user ctx for verify callback */ |
wolfSSL | 0:d92f9d21154c | 4097 | void wolfSSL_SetCertCbCtx(WOLFSSL* ssl, void* ctx) |
wolfSSL | 0:d92f9d21154c | 4098 | { |
wolfSSL | 0:d92f9d21154c | 4099 | WOLFSSL_ENTER("wolfSSL_SetCertCbCtx"); |
wolfSSL | 0:d92f9d21154c | 4100 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 4101 | ssl->verifyCbCtx = ctx; |
wolfSSL | 0:d92f9d21154c | 4102 | } |
wolfSSL | 0:d92f9d21154c | 4103 | |
wolfSSL | 0:d92f9d21154c | 4104 | |
wolfSSL | 0:d92f9d21154c | 4105 | /* store context CA Cache addition callback */ |
wolfSSL | 0:d92f9d21154c | 4106 | void wolfSSL_CTX_SetCACb(WOLFSSL_CTX* ctx, CallbackCACache cb) |
wolfSSL | 0:d92f9d21154c | 4107 | { |
wolfSSL | 0:d92f9d21154c | 4108 | if (ctx && ctx->cm) |
wolfSSL | 0:d92f9d21154c | 4109 | ctx->cm->caCacheCallback = cb; |
wolfSSL | 0:d92f9d21154c | 4110 | } |
wolfSSL | 0:d92f9d21154c | 4111 | |
wolfSSL | 0:d92f9d21154c | 4112 | |
wolfSSL | 0:d92f9d21154c | 4113 | #if defined(PERSIST_CERT_CACHE) |
wolfSSL | 0:d92f9d21154c | 4114 | |
wolfSSL | 0:d92f9d21154c | 4115 | #if !defined(NO_FILESYSTEM) |
wolfSSL | 0:d92f9d21154c | 4116 | |
wolfSSL | 0:d92f9d21154c | 4117 | /* Persist cert cache to file */ |
wolfSSL | 0:d92f9d21154c | 4118 | int wolfSSL_CTX_save_cert_cache(WOLFSSL_CTX* ctx, const char* fname) |
wolfSSL | 0:d92f9d21154c | 4119 | { |
wolfSSL | 0:d92f9d21154c | 4120 | WOLFSSL_ENTER("wolfSSL_CTX_save_cert_cache"); |
wolfSSL | 0:d92f9d21154c | 4121 | |
wolfSSL | 0:d92f9d21154c | 4122 | if (ctx == NULL || fname == NULL) |
wolfSSL | 0:d92f9d21154c | 4123 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 4124 | |
wolfSSL | 0:d92f9d21154c | 4125 | return CM_SaveCertCache(ctx->cm, fname); |
wolfSSL | 0:d92f9d21154c | 4126 | } |
wolfSSL | 0:d92f9d21154c | 4127 | |
wolfSSL | 0:d92f9d21154c | 4128 | |
wolfSSL | 0:d92f9d21154c | 4129 | /* Persist cert cache from file */ |
wolfSSL | 0:d92f9d21154c | 4130 | int wolfSSL_CTX_restore_cert_cache(WOLFSSL_CTX* ctx, const char* fname) |
wolfSSL | 0:d92f9d21154c | 4131 | { |
wolfSSL | 0:d92f9d21154c | 4132 | WOLFSSL_ENTER("wolfSSL_CTX_restore_cert_cache"); |
wolfSSL | 0:d92f9d21154c | 4133 | |
wolfSSL | 0:d92f9d21154c | 4134 | if (ctx == NULL || fname == NULL) |
wolfSSL | 0:d92f9d21154c | 4135 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 4136 | |
wolfSSL | 0:d92f9d21154c | 4137 | return CM_RestoreCertCache(ctx->cm, fname); |
wolfSSL | 0:d92f9d21154c | 4138 | } |
wolfSSL | 0:d92f9d21154c | 4139 | |
wolfSSL | 0:d92f9d21154c | 4140 | #endif /* NO_FILESYSTEM */ |
wolfSSL | 0:d92f9d21154c | 4141 | |
wolfSSL | 0:d92f9d21154c | 4142 | /* Persist cert cache to memory */ |
wolfSSL | 0:d92f9d21154c | 4143 | int wolfSSL_CTX_memsave_cert_cache(WOLFSSL_CTX* ctx, void* mem, int sz, int* used) |
wolfSSL | 0:d92f9d21154c | 4144 | { |
wolfSSL | 0:d92f9d21154c | 4145 | WOLFSSL_ENTER("wolfSSL_CTX_memsave_cert_cache"); |
wolfSSL | 0:d92f9d21154c | 4146 | |
wolfSSL | 0:d92f9d21154c | 4147 | if (ctx == NULL || mem == NULL || used == NULL || sz <= 0) |
wolfSSL | 0:d92f9d21154c | 4148 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 4149 | |
wolfSSL | 0:d92f9d21154c | 4150 | return CM_MemSaveCertCache(ctx->cm, mem, sz, used); |
wolfSSL | 0:d92f9d21154c | 4151 | } |
wolfSSL | 0:d92f9d21154c | 4152 | |
wolfSSL | 0:d92f9d21154c | 4153 | |
wolfSSL | 0:d92f9d21154c | 4154 | /* Restore cert cache from memory */ |
wolfSSL | 0:d92f9d21154c | 4155 | int wolfSSL_CTX_memrestore_cert_cache(WOLFSSL_CTX* ctx, const void* mem, int sz) |
wolfSSL | 0:d92f9d21154c | 4156 | { |
wolfSSL | 0:d92f9d21154c | 4157 | WOLFSSL_ENTER("wolfSSL_CTX_memrestore_cert_cache"); |
wolfSSL | 0:d92f9d21154c | 4158 | |
wolfSSL | 0:d92f9d21154c | 4159 | if (ctx == NULL || mem == NULL || sz <= 0) |
wolfSSL | 0:d92f9d21154c | 4160 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 4161 | |
wolfSSL | 0:d92f9d21154c | 4162 | return CM_MemRestoreCertCache(ctx->cm, mem, sz); |
wolfSSL | 0:d92f9d21154c | 4163 | } |
wolfSSL | 0:d92f9d21154c | 4164 | |
wolfSSL | 0:d92f9d21154c | 4165 | |
wolfSSL | 0:d92f9d21154c | 4166 | /* get how big the the cert cache save buffer needs to be */ |
wolfSSL | 0:d92f9d21154c | 4167 | int wolfSSL_CTX_get_cert_cache_memsize(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 4168 | { |
wolfSSL | 0:d92f9d21154c | 4169 | WOLFSSL_ENTER("wolfSSL_CTX_get_cert_cache_memsize"); |
wolfSSL | 0:d92f9d21154c | 4170 | |
wolfSSL | 0:d92f9d21154c | 4171 | if (ctx == NULL) |
wolfSSL | 0:d92f9d21154c | 4172 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 4173 | |
wolfSSL | 0:d92f9d21154c | 4174 | return CM_GetCertCacheMemSize(ctx->cm); |
wolfSSL | 0:d92f9d21154c | 4175 | } |
wolfSSL | 0:d92f9d21154c | 4176 | |
wolfSSL | 0:d92f9d21154c | 4177 | #endif /* PERSISTE_CERT_CACHE */ |
wolfSSL | 0:d92f9d21154c | 4178 | #endif /* !NO_CERTS */ |
wolfSSL | 0:d92f9d21154c | 4179 | |
wolfSSL | 0:d92f9d21154c | 4180 | |
wolfSSL | 0:d92f9d21154c | 4181 | #ifndef NO_SESSION_CACHE |
wolfSSL | 0:d92f9d21154c | 4182 | |
wolfSSL | 0:d92f9d21154c | 4183 | WOLFSSL_SESSION* wolfSSL_get_session(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 4184 | { |
wolfSSL | 0:d92f9d21154c | 4185 | WOLFSSL_ENTER("SSL_get_session"); |
wolfSSL | 0:d92f9d21154c | 4186 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 4187 | return GetSession(ssl, 0); |
wolfSSL | 0:d92f9d21154c | 4188 | |
wolfSSL | 0:d92f9d21154c | 4189 | return NULL; |
wolfSSL | 0:d92f9d21154c | 4190 | } |
wolfSSL | 0:d92f9d21154c | 4191 | |
wolfSSL | 0:d92f9d21154c | 4192 | |
wolfSSL | 0:d92f9d21154c | 4193 | int wolfSSL_set_session(WOLFSSL* ssl, WOLFSSL_SESSION* session) |
wolfSSL | 0:d92f9d21154c | 4194 | { |
wolfSSL | 0:d92f9d21154c | 4195 | WOLFSSL_ENTER("SSL_set_session"); |
wolfSSL | 0:d92f9d21154c | 4196 | if (session) |
wolfSSL | 0:d92f9d21154c | 4197 | return SetSession(ssl, session); |
wolfSSL | 0:d92f9d21154c | 4198 | |
wolfSSL | 0:d92f9d21154c | 4199 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 4200 | } |
wolfSSL | 0:d92f9d21154c | 4201 | |
wolfSSL | 0:d92f9d21154c | 4202 | |
wolfSSL | 0:d92f9d21154c | 4203 | #ifndef NO_CLIENT_CACHE |
wolfSSL | 0:d92f9d21154c | 4204 | |
wolfSSL | 0:d92f9d21154c | 4205 | /* Associate client session with serverID, find existing or store for saving |
wolfSSL | 0:d92f9d21154c | 4206 | if newSession flag on, don't reuse existing session |
wolfSSL | 0:d92f9d21154c | 4207 | SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 4208 | int wolfSSL_SetServerID(WOLFSSL* ssl, const byte* id, int len, int newSession) |
wolfSSL | 0:d92f9d21154c | 4209 | { |
wolfSSL | 0:d92f9d21154c | 4210 | WOLFSSL_SESSION* session = NULL; |
wolfSSL | 0:d92f9d21154c | 4211 | |
wolfSSL | 0:d92f9d21154c | 4212 | WOLFSSL_ENTER("wolfSSL_SetServerID"); |
wolfSSL | 0:d92f9d21154c | 4213 | |
wolfSSL | 0:d92f9d21154c | 4214 | if (ssl == NULL || id == NULL || len <= 0) |
wolfSSL | 0:d92f9d21154c | 4215 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 4216 | |
wolfSSL | 0:d92f9d21154c | 4217 | if (newSession == 0) { |
wolfSSL | 0:d92f9d21154c | 4218 | session = GetSessionClient(ssl, id, len); |
wolfSSL | 0:d92f9d21154c | 4219 | if (session) { |
wolfSSL | 0:d92f9d21154c | 4220 | if (SetSession(ssl, session) != SSL_SUCCESS) { |
wolfSSL | 0:d92f9d21154c | 4221 | WOLFSSL_MSG("SetSession failed"); |
wolfSSL | 0:d92f9d21154c | 4222 | session = NULL; |
wolfSSL | 0:d92f9d21154c | 4223 | } |
wolfSSL | 0:d92f9d21154c | 4224 | } |
wolfSSL | 0:d92f9d21154c | 4225 | } |
wolfSSL | 0:d92f9d21154c | 4226 | |
wolfSSL | 0:d92f9d21154c | 4227 | if (session == NULL) { |
wolfSSL | 0:d92f9d21154c | 4228 | WOLFSSL_MSG("Valid ServerID not cached already"); |
wolfSSL | 0:d92f9d21154c | 4229 | |
wolfSSL | 0:d92f9d21154c | 4230 | ssl->session.idLen = (word16)min(SERVER_ID_LEN, (word32)len); |
wolfSSL | 0:d92f9d21154c | 4231 | XMEMCPY(ssl->session.serverID, id, ssl->session.idLen); |
wolfSSL | 0:d92f9d21154c | 4232 | } |
wolfSSL | 0:d92f9d21154c | 4233 | |
wolfSSL | 0:d92f9d21154c | 4234 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 4235 | } |
wolfSSL | 0:d92f9d21154c | 4236 | |
wolfSSL | 0:d92f9d21154c | 4237 | #endif /* NO_CLIENT_CACHE */ |
wolfSSL | 0:d92f9d21154c | 4238 | |
wolfSSL | 0:d92f9d21154c | 4239 | #if defined(PERSIST_SESSION_CACHE) |
wolfSSL | 0:d92f9d21154c | 4240 | |
wolfSSL | 0:d92f9d21154c | 4241 | /* for persistance, if changes to layout need to increment and modify |
wolfSSL | 0:d92f9d21154c | 4242 | save_session_cache() and restore_session_cache and memory versions too */ |
wolfSSL | 0:d92f9d21154c | 4243 | #define WOLFSSL_CACHE_VERSION 2 |
wolfSSL | 0:d92f9d21154c | 4244 | |
wolfSSL | 0:d92f9d21154c | 4245 | /* Session Cache Header information */ |
wolfSSL | 0:d92f9d21154c | 4246 | typedef struct { |
wolfSSL | 0:d92f9d21154c | 4247 | int version; /* cache layout version id */ |
wolfSSL | 0:d92f9d21154c | 4248 | int rows; /* session rows */ |
wolfSSL | 0:d92f9d21154c | 4249 | int columns; /* session columns */ |
wolfSSL | 0:d92f9d21154c | 4250 | int sessionSz; /* sizeof WOLFSSL_SESSION */ |
wolfSSL | 0:d92f9d21154c | 4251 | } cache_header_t; |
wolfSSL | 0:d92f9d21154c | 4252 | |
wolfSSL | 0:d92f9d21154c | 4253 | /* current persistence layout is: |
wolfSSL | 0:d92f9d21154c | 4254 | |
wolfSSL | 0:d92f9d21154c | 4255 | 1) cache_header_t |
wolfSSL | 0:d92f9d21154c | 4256 | 2) SessionCache |
wolfSSL | 0:d92f9d21154c | 4257 | 3) ClientCache |
wolfSSL | 0:d92f9d21154c | 4258 | |
wolfSSL | 0:d92f9d21154c | 4259 | update WOLFSSL_CACHE_VERSION if change layout for the following |
wolfSSL | 0:d92f9d21154c | 4260 | PERSISTENT_SESSION_CACHE functions |
wolfSSL | 0:d92f9d21154c | 4261 | */ |
wolfSSL | 0:d92f9d21154c | 4262 | |
wolfSSL | 0:d92f9d21154c | 4263 | |
wolfSSL | 0:d92f9d21154c | 4264 | /* get how big the the session cache save buffer needs to be */ |
wolfSSL | 0:d92f9d21154c | 4265 | int wolfSSL_get_session_cache_memsize(void) |
wolfSSL | 0:d92f9d21154c | 4266 | { |
wolfSSL | 0:d92f9d21154c | 4267 | int sz = (int)(sizeof(SessionCache) + sizeof(cache_header_t)); |
wolfSSL | 0:d92f9d21154c | 4268 | |
wolfSSL | 0:d92f9d21154c | 4269 | #ifndef NO_CLIENT_CACHE |
wolfSSL | 0:d92f9d21154c | 4270 | sz += (int)(sizeof(ClientCache)); |
wolfSSL | 0:d92f9d21154c | 4271 | #endif |
wolfSSL | 0:d92f9d21154c | 4272 | |
wolfSSL | 0:d92f9d21154c | 4273 | return sz; |
wolfSSL | 0:d92f9d21154c | 4274 | } |
wolfSSL | 0:d92f9d21154c | 4275 | |
wolfSSL | 0:d92f9d21154c | 4276 | |
wolfSSL | 0:d92f9d21154c | 4277 | /* Persist session cache to memory */ |
wolfSSL | 0:d92f9d21154c | 4278 | int wolfSSL_memsave_session_cache(void* mem, int sz) |
wolfSSL | 0:d92f9d21154c | 4279 | { |
wolfSSL | 0:d92f9d21154c | 4280 | int i; |
wolfSSL | 0:d92f9d21154c | 4281 | cache_header_t cache_header; |
wolfSSL | 0:d92f9d21154c | 4282 | SessionRow* row = (SessionRow*)((byte*)mem + sizeof(cache_header)); |
wolfSSL | 0:d92f9d21154c | 4283 | #ifndef NO_CLIENT_CACHE |
wolfSSL | 0:d92f9d21154c | 4284 | ClientRow* clRow; |
wolfSSL | 0:d92f9d21154c | 4285 | #endif |
wolfSSL | 0:d92f9d21154c | 4286 | |
wolfSSL | 0:d92f9d21154c | 4287 | WOLFSSL_ENTER("wolfSSL_memsave_session_cache"); |
wolfSSL | 0:d92f9d21154c | 4288 | |
wolfSSL | 0:d92f9d21154c | 4289 | if (sz < wolfSSL_get_session_cache_memsize()) { |
wolfSSL | 0:d92f9d21154c | 4290 | WOLFSSL_MSG("Memory buffer too small"); |
wolfSSL | 0:d92f9d21154c | 4291 | return BUFFER_E; |
wolfSSL | 0:d92f9d21154c | 4292 | } |
wolfSSL | 0:d92f9d21154c | 4293 | |
wolfSSL | 0:d92f9d21154c | 4294 | cache_header.version = WOLFSSL_CACHE_VERSION; |
wolfSSL | 0:d92f9d21154c | 4295 | cache_header.rows = SESSION_ROWS; |
wolfSSL | 0:d92f9d21154c | 4296 | cache_header.columns = SESSIONS_PER_ROW; |
wolfSSL | 0:d92f9d21154c | 4297 | cache_header.sessionSz = (int)sizeof(WOLFSSL_SESSION); |
wolfSSL | 0:d92f9d21154c | 4298 | XMEMCPY(mem, &cache_header, sizeof(cache_header)); |
wolfSSL | 0:d92f9d21154c | 4299 | |
wolfSSL | 0:d92f9d21154c | 4300 | if (LockMutex(&session_mutex) != 0) { |
wolfSSL | 0:d92f9d21154c | 4301 | WOLFSSL_MSG("Session cache mutex lock failed"); |
wolfSSL | 0:d92f9d21154c | 4302 | return BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 4303 | } |
wolfSSL | 0:d92f9d21154c | 4304 | |
wolfSSL | 0:d92f9d21154c | 4305 | for (i = 0; i < cache_header.rows; ++i) |
wolfSSL | 0:d92f9d21154c | 4306 | XMEMCPY(row++, SessionCache + i, sizeof(SessionRow)); |
wolfSSL | 0:d92f9d21154c | 4307 | |
wolfSSL | 0:d92f9d21154c | 4308 | #ifndef NO_CLIENT_CACHE |
wolfSSL | 0:d92f9d21154c | 4309 | clRow = (ClientRow*)row; |
wolfSSL | 0:d92f9d21154c | 4310 | for (i = 0; i < cache_header.rows; ++i) |
wolfSSL | 0:d92f9d21154c | 4311 | XMEMCPY(clRow++, ClientCache + i, sizeof(ClientRow)); |
wolfSSL | 0:d92f9d21154c | 4312 | #endif |
wolfSSL | 0:d92f9d21154c | 4313 | |
wolfSSL | 0:d92f9d21154c | 4314 | UnLockMutex(&session_mutex); |
wolfSSL | 0:d92f9d21154c | 4315 | |
wolfSSL | 0:d92f9d21154c | 4316 | WOLFSSL_LEAVE("wolfSSL_memsave_session_cache", SSL_SUCCESS); |
wolfSSL | 0:d92f9d21154c | 4317 | |
wolfSSL | 0:d92f9d21154c | 4318 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 4319 | } |
wolfSSL | 0:d92f9d21154c | 4320 | |
wolfSSL | 0:d92f9d21154c | 4321 | |
wolfSSL | 0:d92f9d21154c | 4322 | /* Restore the persistant session cache from memory */ |
wolfSSL | 0:d92f9d21154c | 4323 | int wolfSSL_memrestore_session_cache(const void* mem, int sz) |
wolfSSL | 0:d92f9d21154c | 4324 | { |
wolfSSL | 0:d92f9d21154c | 4325 | int i; |
wolfSSL | 0:d92f9d21154c | 4326 | cache_header_t cache_header; |
wolfSSL | 0:d92f9d21154c | 4327 | SessionRow* row = (SessionRow*)((byte*)mem + sizeof(cache_header)); |
wolfSSL | 0:d92f9d21154c | 4328 | #ifndef NO_CLIENT_CACHE |
wolfSSL | 0:d92f9d21154c | 4329 | ClientRow* clRow; |
wolfSSL | 0:d92f9d21154c | 4330 | #endif |
wolfSSL | 0:d92f9d21154c | 4331 | |
wolfSSL | 0:d92f9d21154c | 4332 | WOLFSSL_ENTER("wolfSSL_memrestore_session_cache"); |
wolfSSL | 0:d92f9d21154c | 4333 | |
wolfSSL | 0:d92f9d21154c | 4334 | if (sz < wolfSSL_get_session_cache_memsize()) { |
wolfSSL | 0:d92f9d21154c | 4335 | WOLFSSL_MSG("Memory buffer too small"); |
wolfSSL | 0:d92f9d21154c | 4336 | return BUFFER_E; |
wolfSSL | 0:d92f9d21154c | 4337 | } |
wolfSSL | 0:d92f9d21154c | 4338 | |
wolfSSL | 0:d92f9d21154c | 4339 | XMEMCPY(&cache_header, mem, sizeof(cache_header)); |
wolfSSL | 0:d92f9d21154c | 4340 | if (cache_header.version != WOLFSSL_CACHE_VERSION || |
wolfSSL | 0:d92f9d21154c | 4341 | cache_header.rows != SESSION_ROWS || |
wolfSSL | 0:d92f9d21154c | 4342 | cache_header.columns != SESSIONS_PER_ROW || |
wolfSSL | 0:d92f9d21154c | 4343 | cache_header.sessionSz != (int)sizeof(WOLFSSL_SESSION)) { |
wolfSSL | 0:d92f9d21154c | 4344 | |
wolfSSL | 0:d92f9d21154c | 4345 | WOLFSSL_MSG("Session cache header match failed"); |
wolfSSL | 0:d92f9d21154c | 4346 | return CACHE_MATCH_ERROR; |
wolfSSL | 0:d92f9d21154c | 4347 | } |
wolfSSL | 0:d92f9d21154c | 4348 | |
wolfSSL | 0:d92f9d21154c | 4349 | if (LockMutex(&session_mutex) != 0) { |
wolfSSL | 0:d92f9d21154c | 4350 | WOLFSSL_MSG("Session cache mutex lock failed"); |
wolfSSL | 0:d92f9d21154c | 4351 | return BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 4352 | } |
wolfSSL | 0:d92f9d21154c | 4353 | |
wolfSSL | 0:d92f9d21154c | 4354 | for (i = 0; i < cache_header.rows; ++i) |
wolfSSL | 0:d92f9d21154c | 4355 | XMEMCPY(SessionCache + i, row++, sizeof(SessionRow)); |
wolfSSL | 0:d92f9d21154c | 4356 | |
wolfSSL | 0:d92f9d21154c | 4357 | #ifndef NO_CLIENT_CACHE |
wolfSSL | 0:d92f9d21154c | 4358 | clRow = (ClientRow*)row; |
wolfSSL | 0:d92f9d21154c | 4359 | for (i = 0; i < cache_header.rows; ++i) |
wolfSSL | 0:d92f9d21154c | 4360 | XMEMCPY(ClientCache + i, clRow++, sizeof(ClientRow)); |
wolfSSL | 0:d92f9d21154c | 4361 | #endif |
wolfSSL | 0:d92f9d21154c | 4362 | |
wolfSSL | 0:d92f9d21154c | 4363 | UnLockMutex(&session_mutex); |
wolfSSL | 0:d92f9d21154c | 4364 | |
wolfSSL | 0:d92f9d21154c | 4365 | WOLFSSL_LEAVE("wolfSSL_memrestore_session_cache", SSL_SUCCESS); |
wolfSSL | 0:d92f9d21154c | 4366 | |
wolfSSL | 0:d92f9d21154c | 4367 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 4368 | } |
wolfSSL | 0:d92f9d21154c | 4369 | |
wolfSSL | 0:d92f9d21154c | 4370 | #if !defined(NO_FILESYSTEM) |
wolfSSL | 0:d92f9d21154c | 4371 | |
wolfSSL | 0:d92f9d21154c | 4372 | /* Persist session cache to file */ |
wolfSSL | 0:d92f9d21154c | 4373 | /* doesn't use memsave because of additional memory use */ |
wolfSSL | 0:d92f9d21154c | 4374 | int wolfSSL_save_session_cache(const char *fname) |
wolfSSL | 0:d92f9d21154c | 4375 | { |
wolfSSL | 0:d92f9d21154c | 4376 | XFILE file; |
wolfSSL | 0:d92f9d21154c | 4377 | int ret; |
wolfSSL | 0:d92f9d21154c | 4378 | int rc = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 4379 | int i; |
wolfSSL | 0:d92f9d21154c | 4380 | cache_header_t cache_header; |
wolfSSL | 0:d92f9d21154c | 4381 | |
wolfSSL | 0:d92f9d21154c | 4382 | WOLFSSL_ENTER("wolfSSL_save_session_cache"); |
wolfSSL | 0:d92f9d21154c | 4383 | |
wolfSSL | 0:d92f9d21154c | 4384 | file = XFOPEN(fname, "w+b"); |
wolfSSL | 0:d92f9d21154c | 4385 | if (file == XBADFILE) { |
wolfSSL | 0:d92f9d21154c | 4386 | WOLFSSL_MSG("Couldn't open session cache save file"); |
wolfSSL | 0:d92f9d21154c | 4387 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 4388 | } |
wolfSSL | 0:d92f9d21154c | 4389 | cache_header.version = WOLFSSL_CACHE_VERSION; |
wolfSSL | 0:d92f9d21154c | 4390 | cache_header.rows = SESSION_ROWS; |
wolfSSL | 0:d92f9d21154c | 4391 | cache_header.columns = SESSIONS_PER_ROW; |
wolfSSL | 0:d92f9d21154c | 4392 | cache_header.sessionSz = (int)sizeof(WOLFSSL_SESSION); |
wolfSSL | 0:d92f9d21154c | 4393 | |
wolfSSL | 0:d92f9d21154c | 4394 | /* cache header */ |
wolfSSL | 0:d92f9d21154c | 4395 | ret = (int)XFWRITE(&cache_header, sizeof cache_header, 1, file); |
wolfSSL | 0:d92f9d21154c | 4396 | if (ret != 1) { |
wolfSSL | 0:d92f9d21154c | 4397 | WOLFSSL_MSG("Session cache header file write failed"); |
wolfSSL | 0:d92f9d21154c | 4398 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 4399 | return FWRITE_ERROR; |
wolfSSL | 0:d92f9d21154c | 4400 | } |
wolfSSL | 0:d92f9d21154c | 4401 | |
wolfSSL | 0:d92f9d21154c | 4402 | if (LockMutex(&session_mutex) != 0) { |
wolfSSL | 0:d92f9d21154c | 4403 | WOLFSSL_MSG("Session cache mutex lock failed"); |
wolfSSL | 0:d92f9d21154c | 4404 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 4405 | return BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 4406 | } |
wolfSSL | 0:d92f9d21154c | 4407 | |
wolfSSL | 0:d92f9d21154c | 4408 | /* session cache */ |
wolfSSL | 0:d92f9d21154c | 4409 | for (i = 0; i < cache_header.rows; ++i) { |
wolfSSL | 0:d92f9d21154c | 4410 | ret = (int)XFWRITE(SessionCache + i, sizeof(SessionRow), 1, file); |
wolfSSL | 0:d92f9d21154c | 4411 | if (ret != 1) { |
wolfSSL | 0:d92f9d21154c | 4412 | WOLFSSL_MSG("Session cache member file write failed"); |
wolfSSL | 0:d92f9d21154c | 4413 | rc = FWRITE_ERROR; |
wolfSSL | 0:d92f9d21154c | 4414 | break; |
wolfSSL | 0:d92f9d21154c | 4415 | } |
wolfSSL | 0:d92f9d21154c | 4416 | } |
wolfSSL | 0:d92f9d21154c | 4417 | |
wolfSSL | 0:d92f9d21154c | 4418 | #ifndef NO_CLIENT_CACHE |
wolfSSL | 0:d92f9d21154c | 4419 | /* client cache */ |
wolfSSL | 0:d92f9d21154c | 4420 | for (i = 0; i < cache_header.rows; ++i) { |
wolfSSL | 0:d92f9d21154c | 4421 | ret = (int)XFWRITE(ClientCache + i, sizeof(ClientRow), 1, file); |
wolfSSL | 0:d92f9d21154c | 4422 | if (ret != 1) { |
wolfSSL | 0:d92f9d21154c | 4423 | WOLFSSL_MSG("Client cache member file write failed"); |
wolfSSL | 0:d92f9d21154c | 4424 | rc = FWRITE_ERROR; |
wolfSSL | 0:d92f9d21154c | 4425 | break; |
wolfSSL | 0:d92f9d21154c | 4426 | } |
wolfSSL | 0:d92f9d21154c | 4427 | } |
wolfSSL | 0:d92f9d21154c | 4428 | #endif /* NO_CLIENT_CACHE */ |
wolfSSL | 0:d92f9d21154c | 4429 | |
wolfSSL | 0:d92f9d21154c | 4430 | UnLockMutex(&session_mutex); |
wolfSSL | 0:d92f9d21154c | 4431 | |
wolfSSL | 0:d92f9d21154c | 4432 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 4433 | WOLFSSL_LEAVE("wolfSSL_save_session_cache", rc); |
wolfSSL | 0:d92f9d21154c | 4434 | |
wolfSSL | 0:d92f9d21154c | 4435 | return rc; |
wolfSSL | 0:d92f9d21154c | 4436 | } |
wolfSSL | 0:d92f9d21154c | 4437 | |
wolfSSL | 0:d92f9d21154c | 4438 | |
wolfSSL | 0:d92f9d21154c | 4439 | /* Restore the persistant session cache from file */ |
wolfSSL | 0:d92f9d21154c | 4440 | /* doesn't use memstore because of additional memory use */ |
wolfSSL | 0:d92f9d21154c | 4441 | int wolfSSL_restore_session_cache(const char *fname) |
wolfSSL | 0:d92f9d21154c | 4442 | { |
wolfSSL | 0:d92f9d21154c | 4443 | XFILE file; |
wolfSSL | 0:d92f9d21154c | 4444 | int rc = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 4445 | int ret; |
wolfSSL | 0:d92f9d21154c | 4446 | int i; |
wolfSSL | 0:d92f9d21154c | 4447 | cache_header_t cache_header; |
wolfSSL | 0:d92f9d21154c | 4448 | |
wolfSSL | 0:d92f9d21154c | 4449 | WOLFSSL_ENTER("wolfSSL_restore_session_cache"); |
wolfSSL | 0:d92f9d21154c | 4450 | |
wolfSSL | 0:d92f9d21154c | 4451 | file = XFOPEN(fname, "rb"); |
wolfSSL | 0:d92f9d21154c | 4452 | if (file == XBADFILE) { |
wolfSSL | 0:d92f9d21154c | 4453 | WOLFSSL_MSG("Couldn't open session cache save file"); |
wolfSSL | 0:d92f9d21154c | 4454 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 4455 | } |
wolfSSL | 0:d92f9d21154c | 4456 | /* cache header */ |
wolfSSL | 0:d92f9d21154c | 4457 | ret = (int)XFREAD(&cache_header, sizeof cache_header, 1, file); |
wolfSSL | 0:d92f9d21154c | 4458 | if (ret != 1) { |
wolfSSL | 0:d92f9d21154c | 4459 | WOLFSSL_MSG("Session cache header file read failed"); |
wolfSSL | 0:d92f9d21154c | 4460 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 4461 | return FREAD_ERROR; |
wolfSSL | 0:d92f9d21154c | 4462 | } |
wolfSSL | 0:d92f9d21154c | 4463 | if (cache_header.version != WOLFSSL_CACHE_VERSION || |
wolfSSL | 0:d92f9d21154c | 4464 | cache_header.rows != SESSION_ROWS || |
wolfSSL | 0:d92f9d21154c | 4465 | cache_header.columns != SESSIONS_PER_ROW || |
wolfSSL | 0:d92f9d21154c | 4466 | cache_header.sessionSz != (int)sizeof(WOLFSSL_SESSION)) { |
wolfSSL | 0:d92f9d21154c | 4467 | |
wolfSSL | 0:d92f9d21154c | 4468 | WOLFSSL_MSG("Session cache header match failed"); |
wolfSSL | 0:d92f9d21154c | 4469 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 4470 | return CACHE_MATCH_ERROR; |
wolfSSL | 0:d92f9d21154c | 4471 | } |
wolfSSL | 0:d92f9d21154c | 4472 | |
wolfSSL | 0:d92f9d21154c | 4473 | if (LockMutex(&session_mutex) != 0) { |
wolfSSL | 0:d92f9d21154c | 4474 | WOLFSSL_MSG("Session cache mutex lock failed"); |
wolfSSL | 0:d92f9d21154c | 4475 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 4476 | return BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 4477 | } |
wolfSSL | 0:d92f9d21154c | 4478 | |
wolfSSL | 0:d92f9d21154c | 4479 | /* session cache */ |
wolfSSL | 0:d92f9d21154c | 4480 | for (i = 0; i < cache_header.rows; ++i) { |
wolfSSL | 0:d92f9d21154c | 4481 | ret = (int)XFREAD(SessionCache + i, sizeof(SessionRow), 1, file); |
wolfSSL | 0:d92f9d21154c | 4482 | if (ret != 1) { |
wolfSSL | 0:d92f9d21154c | 4483 | WOLFSSL_MSG("Session cache member file read failed"); |
wolfSSL | 0:d92f9d21154c | 4484 | XMEMSET(SessionCache, 0, sizeof SessionCache); |
wolfSSL | 0:d92f9d21154c | 4485 | rc = FREAD_ERROR; |
wolfSSL | 0:d92f9d21154c | 4486 | break; |
wolfSSL | 0:d92f9d21154c | 4487 | } |
wolfSSL | 0:d92f9d21154c | 4488 | } |
wolfSSL | 0:d92f9d21154c | 4489 | |
wolfSSL | 0:d92f9d21154c | 4490 | #ifndef NO_CLIENT_CACHE |
wolfSSL | 0:d92f9d21154c | 4491 | /* client cache */ |
wolfSSL | 0:d92f9d21154c | 4492 | for (i = 0; i < cache_header.rows; ++i) { |
wolfSSL | 0:d92f9d21154c | 4493 | ret = (int)XFREAD(ClientCache + i, sizeof(ClientRow), 1, file); |
wolfSSL | 0:d92f9d21154c | 4494 | if (ret != 1) { |
wolfSSL | 0:d92f9d21154c | 4495 | WOLFSSL_MSG("Client cache member file read failed"); |
wolfSSL | 0:d92f9d21154c | 4496 | XMEMSET(ClientCache, 0, sizeof ClientCache); |
wolfSSL | 0:d92f9d21154c | 4497 | rc = FREAD_ERROR; |
wolfSSL | 0:d92f9d21154c | 4498 | break; |
wolfSSL | 0:d92f9d21154c | 4499 | } |
wolfSSL | 0:d92f9d21154c | 4500 | } |
wolfSSL | 0:d92f9d21154c | 4501 | |
wolfSSL | 0:d92f9d21154c | 4502 | #endif /* NO_CLIENT_CACHE */ |
wolfSSL | 0:d92f9d21154c | 4503 | |
wolfSSL | 0:d92f9d21154c | 4504 | UnLockMutex(&session_mutex); |
wolfSSL | 0:d92f9d21154c | 4505 | |
wolfSSL | 0:d92f9d21154c | 4506 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 4507 | WOLFSSL_LEAVE("wolfSSL_restore_session_cache", rc); |
wolfSSL | 0:d92f9d21154c | 4508 | |
wolfSSL | 0:d92f9d21154c | 4509 | return rc; |
wolfSSL | 0:d92f9d21154c | 4510 | } |
wolfSSL | 0:d92f9d21154c | 4511 | |
wolfSSL | 0:d92f9d21154c | 4512 | #endif /* !NO_FILESYSTEM */ |
wolfSSL | 0:d92f9d21154c | 4513 | #endif /* PERSIST_SESSION_CACHE */ |
wolfSSL | 0:d92f9d21154c | 4514 | #endif /* NO_SESSION_CACHE */ |
wolfSSL | 0:d92f9d21154c | 4515 | |
wolfSSL | 0:d92f9d21154c | 4516 | |
wolfSSL | 0:d92f9d21154c | 4517 | void wolfSSL_load_error_strings(void) /* compatibility only */ |
wolfSSL | 0:d92f9d21154c | 4518 | {} |
wolfSSL | 0:d92f9d21154c | 4519 | |
wolfSSL | 0:d92f9d21154c | 4520 | |
wolfSSL | 0:d92f9d21154c | 4521 | int wolfSSL_library_init(void) |
wolfSSL | 0:d92f9d21154c | 4522 | { |
wolfSSL | 0:d92f9d21154c | 4523 | WOLFSSL_ENTER("SSL_library_init"); |
wolfSSL | 0:d92f9d21154c | 4524 | if (wolfSSL_Init() == SSL_SUCCESS) |
wolfSSL | 0:d92f9d21154c | 4525 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 4526 | else |
wolfSSL | 0:d92f9d21154c | 4527 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 4528 | } |
wolfSSL | 0:d92f9d21154c | 4529 | |
wolfSSL | 0:d92f9d21154c | 4530 | |
wolfSSL | 0:d92f9d21154c | 4531 | #ifdef HAVE_SECRET_CALLBACK |
wolfSSL | 0:d92f9d21154c | 4532 | |
wolfSSL | 0:d92f9d21154c | 4533 | int wolfSSL_set_session_secret_cb(WOLFSSL* ssl, SessionSecretCb cb, void* ctx) |
wolfSSL | 0:d92f9d21154c | 4534 | { |
wolfSSL | 0:d92f9d21154c | 4535 | WOLFSSL_ENTER("wolfSSL_set_session_secret_cb"); |
wolfSSL | 0:d92f9d21154c | 4536 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 4537 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 4538 | |
wolfSSL | 0:d92f9d21154c | 4539 | ssl->sessionSecretCb = cb; |
wolfSSL | 0:d92f9d21154c | 4540 | ssl->sessionSecretCtx = ctx; |
wolfSSL | 0:d92f9d21154c | 4541 | /* If using a pre-set key, assume session resumption. */ |
wolfSSL | 0:d92f9d21154c | 4542 | ssl->session.sessionIDSz = 0; |
wolfSSL | 0:d92f9d21154c | 4543 | ssl->options.resuming = 1; |
wolfSSL | 0:d92f9d21154c | 4544 | |
wolfSSL | 0:d92f9d21154c | 4545 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 4546 | } |
wolfSSL | 0:d92f9d21154c | 4547 | |
wolfSSL | 0:d92f9d21154c | 4548 | #endif |
wolfSSL | 0:d92f9d21154c | 4549 | |
wolfSSL | 0:d92f9d21154c | 4550 | |
wolfSSL | 0:d92f9d21154c | 4551 | #ifndef NO_SESSION_CACHE |
wolfSSL | 0:d92f9d21154c | 4552 | |
wolfSSL | 0:d92f9d21154c | 4553 | /* on by default if built in but allow user to turn off */ |
wolfSSL | 0:d92f9d21154c | 4554 | long wolfSSL_CTX_set_session_cache_mode(WOLFSSL_CTX* ctx, long mode) |
wolfSSL | 0:d92f9d21154c | 4555 | { |
wolfSSL | 0:d92f9d21154c | 4556 | WOLFSSL_ENTER("SSL_CTX_set_session_cache_mode"); |
wolfSSL | 0:d92f9d21154c | 4557 | if (mode == SSL_SESS_CACHE_OFF) |
wolfSSL | 0:d92f9d21154c | 4558 | ctx->sessionCacheOff = 1; |
wolfSSL | 0:d92f9d21154c | 4559 | |
wolfSSL | 0:d92f9d21154c | 4560 | if (mode == SSL_SESS_CACHE_NO_AUTO_CLEAR) |
wolfSSL | 0:d92f9d21154c | 4561 | ctx->sessionCacheFlushOff = 1; |
wolfSSL | 0:d92f9d21154c | 4562 | |
wolfSSL | 0:d92f9d21154c | 4563 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 4564 | } |
wolfSSL | 0:d92f9d21154c | 4565 | |
wolfSSL | 0:d92f9d21154c | 4566 | #endif /* NO_SESSION_CACHE */ |
wolfSSL | 0:d92f9d21154c | 4567 | |
wolfSSL | 0:d92f9d21154c | 4568 | |
wolfSSL | 0:d92f9d21154c | 4569 | #if !defined(NO_CERTS) |
wolfSSL | 0:d92f9d21154c | 4570 | #if defined(PERSIST_CERT_CACHE) |
wolfSSL | 0:d92f9d21154c | 4571 | |
wolfSSL | 0:d92f9d21154c | 4572 | |
wolfSSL | 0:d92f9d21154c | 4573 | #define WOLFSSL_CACHE_CERT_VERSION 1 |
wolfSSL | 0:d92f9d21154c | 4574 | |
wolfSSL | 0:d92f9d21154c | 4575 | typedef struct { |
wolfSSL | 0:d92f9d21154c | 4576 | int version; /* cache cert layout version id */ |
wolfSSL | 0:d92f9d21154c | 4577 | int rows; /* hash table rows, CA_TABLE_SIZE */ |
wolfSSL | 0:d92f9d21154c | 4578 | int columns[CA_TABLE_SIZE]; /* columns per row on list */ |
wolfSSL | 0:d92f9d21154c | 4579 | int signerSz; /* sizeof Signer object */ |
wolfSSL | 0:d92f9d21154c | 4580 | } CertCacheHeader; |
wolfSSL | 0:d92f9d21154c | 4581 | |
wolfSSL | 0:d92f9d21154c | 4582 | /* current cert persistance layout is: |
wolfSSL | 0:d92f9d21154c | 4583 | |
wolfSSL | 0:d92f9d21154c | 4584 | 1) CertCacheHeader |
wolfSSL | 0:d92f9d21154c | 4585 | 2) caTable |
wolfSSL | 0:d92f9d21154c | 4586 | |
wolfSSL | 0:d92f9d21154c | 4587 | update WOLFSSL_CERT_CACHE_VERSION if change layout for the following |
wolfSSL | 0:d92f9d21154c | 4588 | PERSIST_CERT_CACHE functions |
wolfSSL | 0:d92f9d21154c | 4589 | */ |
wolfSSL | 0:d92f9d21154c | 4590 | |
wolfSSL | 0:d92f9d21154c | 4591 | |
wolfSSL | 0:d92f9d21154c | 4592 | /* Return memory needed to persist this signer, have lock */ |
wolfSSL | 0:d92f9d21154c | 4593 | static INLINE int GetSignerMemory(Signer* signer) |
wolfSSL | 0:d92f9d21154c | 4594 | { |
wolfSSL | 0:d92f9d21154c | 4595 | int sz = sizeof(signer->pubKeySize) + sizeof(signer->keyOID) |
wolfSSL | 0:d92f9d21154c | 4596 | + sizeof(signer->nameLen) + sizeof(signer->subjectNameHash); |
wolfSSL | 0:d92f9d21154c | 4597 | |
wolfSSL | 0:d92f9d21154c | 4598 | #if !defined(NO_SKID) |
wolfSSL | 0:d92f9d21154c | 4599 | sz += (int)sizeof(signer->subjectKeyIdHash); |
wolfSSL | 0:d92f9d21154c | 4600 | #endif |
wolfSSL | 0:d92f9d21154c | 4601 | |
wolfSSL | 0:d92f9d21154c | 4602 | /* add dynamic bytes needed */ |
wolfSSL | 0:d92f9d21154c | 4603 | sz += signer->pubKeySize; |
wolfSSL | 0:d92f9d21154c | 4604 | sz += signer->nameLen; |
wolfSSL | 0:d92f9d21154c | 4605 | |
wolfSSL | 0:d92f9d21154c | 4606 | return sz; |
wolfSSL | 0:d92f9d21154c | 4607 | } |
wolfSSL | 0:d92f9d21154c | 4608 | |
wolfSSL | 0:d92f9d21154c | 4609 | |
wolfSSL | 0:d92f9d21154c | 4610 | /* Return memory needed to persist this row, have lock */ |
wolfSSL | 0:d92f9d21154c | 4611 | static INLINE int GetCertCacheRowMemory(Signer* row) |
wolfSSL | 0:d92f9d21154c | 4612 | { |
wolfSSL | 0:d92f9d21154c | 4613 | int sz = 0; |
wolfSSL | 0:d92f9d21154c | 4614 | |
wolfSSL | 0:d92f9d21154c | 4615 | while (row) { |
wolfSSL | 0:d92f9d21154c | 4616 | sz += GetSignerMemory(row); |
wolfSSL | 0:d92f9d21154c | 4617 | row = row->next; |
wolfSSL | 0:d92f9d21154c | 4618 | } |
wolfSSL | 0:d92f9d21154c | 4619 | |
wolfSSL | 0:d92f9d21154c | 4620 | return sz; |
wolfSSL | 0:d92f9d21154c | 4621 | } |
wolfSSL | 0:d92f9d21154c | 4622 | |
wolfSSL | 0:d92f9d21154c | 4623 | |
wolfSSL | 0:d92f9d21154c | 4624 | /* get the size of persist cert cache, have lock */ |
wolfSSL | 0:d92f9d21154c | 4625 | static INLINE int GetCertCacheMemSize(WOLFSSL_CERT_MANAGER* cm) |
wolfSSL | 0:d92f9d21154c | 4626 | { |
wolfSSL | 0:d92f9d21154c | 4627 | int sz; |
wolfSSL | 0:d92f9d21154c | 4628 | int i; |
wolfSSL | 0:d92f9d21154c | 4629 | |
wolfSSL | 0:d92f9d21154c | 4630 | sz = sizeof(CertCacheHeader); |
wolfSSL | 0:d92f9d21154c | 4631 | |
wolfSSL | 0:d92f9d21154c | 4632 | for (i = 0; i < CA_TABLE_SIZE; i++) |
wolfSSL | 0:d92f9d21154c | 4633 | sz += GetCertCacheRowMemory(cm->caTable[i]); |
wolfSSL | 0:d92f9d21154c | 4634 | |
wolfSSL | 0:d92f9d21154c | 4635 | return sz; |
wolfSSL | 0:d92f9d21154c | 4636 | } |
wolfSSL | 0:d92f9d21154c | 4637 | |
wolfSSL | 0:d92f9d21154c | 4638 | |
wolfSSL | 0:d92f9d21154c | 4639 | /* Store cert cache header columns with number of items per list, have lock */ |
wolfSSL | 0:d92f9d21154c | 4640 | static INLINE void SetCertHeaderColumns(WOLFSSL_CERT_MANAGER* cm, int* columns) |
wolfSSL | 0:d92f9d21154c | 4641 | { |
wolfSSL | 0:d92f9d21154c | 4642 | int i; |
wolfSSL | 0:d92f9d21154c | 4643 | Signer* row; |
wolfSSL | 0:d92f9d21154c | 4644 | |
wolfSSL | 0:d92f9d21154c | 4645 | for (i = 0; i < CA_TABLE_SIZE; i++) { |
wolfSSL | 0:d92f9d21154c | 4646 | int count = 0; |
wolfSSL | 0:d92f9d21154c | 4647 | row = cm->caTable[i]; |
wolfSSL | 0:d92f9d21154c | 4648 | |
wolfSSL | 0:d92f9d21154c | 4649 | while (row) { |
wolfSSL | 0:d92f9d21154c | 4650 | ++count; |
wolfSSL | 0:d92f9d21154c | 4651 | row = row->next; |
wolfSSL | 0:d92f9d21154c | 4652 | } |
wolfSSL | 0:d92f9d21154c | 4653 | columns[i] = count; |
wolfSSL | 0:d92f9d21154c | 4654 | } |
wolfSSL | 0:d92f9d21154c | 4655 | } |
wolfSSL | 0:d92f9d21154c | 4656 | |
wolfSSL | 0:d92f9d21154c | 4657 | |
wolfSSL | 0:d92f9d21154c | 4658 | /* Restore whole cert row from memory, have lock, return bytes consumed, |
wolfSSL | 0:d92f9d21154c | 4659 | < 0 on error, have lock */ |
wolfSSL | 0:d92f9d21154c | 4660 | static INLINE int RestoreCertRow(WOLFSSL_CERT_MANAGER* cm, byte* current, |
wolfSSL | 0:d92f9d21154c | 4661 | int row, int listSz, const byte* end) |
wolfSSL | 0:d92f9d21154c | 4662 | { |
wolfSSL | 0:d92f9d21154c | 4663 | int idx = 0; |
wolfSSL | 0:d92f9d21154c | 4664 | |
wolfSSL | 0:d92f9d21154c | 4665 | if (listSz < 0) { |
wolfSSL | 0:d92f9d21154c | 4666 | WOLFSSL_MSG("Row header corrupted, negative value"); |
wolfSSL | 0:d92f9d21154c | 4667 | return PARSE_ERROR; |
wolfSSL | 0:d92f9d21154c | 4668 | } |
wolfSSL | 0:d92f9d21154c | 4669 | |
wolfSSL | 0:d92f9d21154c | 4670 | while (listSz) { |
wolfSSL | 0:d92f9d21154c | 4671 | Signer* signer; |
wolfSSL | 0:d92f9d21154c | 4672 | byte* start = current + idx; /* for end checks on this signer */ |
wolfSSL | 0:d92f9d21154c | 4673 | int minSz = sizeof(signer->pubKeySize) + sizeof(signer->keyOID) + |
wolfSSL | 0:d92f9d21154c | 4674 | sizeof(signer->nameLen) + sizeof(signer->subjectNameHash); |
wolfSSL | 0:d92f9d21154c | 4675 | #ifndef NO_SKID |
wolfSSL | 0:d92f9d21154c | 4676 | minSz += (int)sizeof(signer->subjectKeyIdHash); |
wolfSSL | 0:d92f9d21154c | 4677 | #endif |
wolfSSL | 0:d92f9d21154c | 4678 | |
wolfSSL | 0:d92f9d21154c | 4679 | if (start + minSz > end) { |
wolfSSL | 0:d92f9d21154c | 4680 | WOLFSSL_MSG("Would overread restore buffer"); |
wolfSSL | 0:d92f9d21154c | 4681 | return BUFFER_E; |
wolfSSL | 0:d92f9d21154c | 4682 | } |
wolfSSL | 0:d92f9d21154c | 4683 | signer = MakeSigner(cm->heap); |
wolfSSL | 0:d92f9d21154c | 4684 | if (signer == NULL) |
wolfSSL | 0:d92f9d21154c | 4685 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 4686 | |
wolfSSL | 0:d92f9d21154c | 4687 | /* pubKeySize */ |
wolfSSL | 0:d92f9d21154c | 4688 | XMEMCPY(&signer->pubKeySize, current + idx, sizeof(signer->pubKeySize)); |
wolfSSL | 0:d92f9d21154c | 4689 | idx += (int)sizeof(signer->pubKeySize); |
wolfSSL | 0:d92f9d21154c | 4690 | |
wolfSSL | 0:d92f9d21154c | 4691 | /* keyOID */ |
wolfSSL | 0:d92f9d21154c | 4692 | XMEMCPY(&signer->keyOID, current + idx, sizeof(signer->keyOID)); |
wolfSSL | 0:d92f9d21154c | 4693 | idx += (int)sizeof(signer->keyOID); |
wolfSSL | 0:d92f9d21154c | 4694 | |
wolfSSL | 0:d92f9d21154c | 4695 | /* pulicKey */ |
wolfSSL | 0:d92f9d21154c | 4696 | if (start + minSz + signer->pubKeySize > end) { |
wolfSSL | 0:d92f9d21154c | 4697 | WOLFSSL_MSG("Would overread restore buffer"); |
wolfSSL | 0:d92f9d21154c | 4698 | FreeSigner(signer, cm->heap); |
wolfSSL | 0:d92f9d21154c | 4699 | return BUFFER_E; |
wolfSSL | 0:d92f9d21154c | 4700 | } |
wolfSSL | 0:d92f9d21154c | 4701 | signer->publicKey = (byte*)XMALLOC(signer->pubKeySize, cm->heap, |
wolfSSL | 0:d92f9d21154c | 4702 | DYNAMIC_TYPE_KEY); |
wolfSSL | 0:d92f9d21154c | 4703 | if (signer->publicKey == NULL) { |
wolfSSL | 0:d92f9d21154c | 4704 | FreeSigner(signer, cm->heap); |
wolfSSL | 0:d92f9d21154c | 4705 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 4706 | } |
wolfSSL | 0:d92f9d21154c | 4707 | |
wolfSSL | 0:d92f9d21154c | 4708 | XMEMCPY(signer->publicKey, current + idx, signer->pubKeySize); |
wolfSSL | 0:d92f9d21154c | 4709 | idx += signer->pubKeySize; |
wolfSSL | 0:d92f9d21154c | 4710 | |
wolfSSL | 0:d92f9d21154c | 4711 | /* nameLen */ |
wolfSSL | 0:d92f9d21154c | 4712 | XMEMCPY(&signer->nameLen, current + idx, sizeof(signer->nameLen)); |
wolfSSL | 0:d92f9d21154c | 4713 | idx += (int)sizeof(signer->nameLen); |
wolfSSL | 0:d92f9d21154c | 4714 | |
wolfSSL | 0:d92f9d21154c | 4715 | /* name */ |
wolfSSL | 0:d92f9d21154c | 4716 | if (start + minSz + signer->pubKeySize + signer->nameLen > end) { |
wolfSSL | 0:d92f9d21154c | 4717 | WOLFSSL_MSG("Would overread restore buffer"); |
wolfSSL | 0:d92f9d21154c | 4718 | FreeSigner(signer, cm->heap); |
wolfSSL | 0:d92f9d21154c | 4719 | return BUFFER_E; |
wolfSSL | 0:d92f9d21154c | 4720 | } |
wolfSSL | 0:d92f9d21154c | 4721 | signer->name = (char*)XMALLOC(signer->nameLen, cm->heap, |
wolfSSL | 0:d92f9d21154c | 4722 | DYNAMIC_TYPE_SUBJECT_CN); |
wolfSSL | 0:d92f9d21154c | 4723 | if (signer->name == NULL) { |
wolfSSL | 0:d92f9d21154c | 4724 | FreeSigner(signer, cm->heap); |
wolfSSL | 0:d92f9d21154c | 4725 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 4726 | } |
wolfSSL | 0:d92f9d21154c | 4727 | |
wolfSSL | 0:d92f9d21154c | 4728 | XMEMCPY(signer->name, current + idx, signer->nameLen); |
wolfSSL | 0:d92f9d21154c | 4729 | idx += signer->nameLen; |
wolfSSL | 0:d92f9d21154c | 4730 | |
wolfSSL | 0:d92f9d21154c | 4731 | /* subjectNameHash */ |
wolfSSL | 0:d92f9d21154c | 4732 | XMEMCPY(signer->subjectNameHash, current + idx, SIGNER_DIGEST_SIZE); |
wolfSSL | 0:d92f9d21154c | 4733 | idx += SIGNER_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 4734 | |
wolfSSL | 0:d92f9d21154c | 4735 | #ifndef NO_SKID |
wolfSSL | 0:d92f9d21154c | 4736 | /* subjectKeyIdHash */ |
wolfSSL | 0:d92f9d21154c | 4737 | XMEMCPY(signer->subjectKeyIdHash, current + idx,SIGNER_DIGEST_SIZE); |
wolfSSL | 0:d92f9d21154c | 4738 | idx += SIGNER_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 4739 | #endif |
wolfSSL | 0:d92f9d21154c | 4740 | |
wolfSSL | 0:d92f9d21154c | 4741 | signer->next = cm->caTable[row]; |
wolfSSL | 0:d92f9d21154c | 4742 | cm->caTable[row] = signer; |
wolfSSL | 0:d92f9d21154c | 4743 | |
wolfSSL | 0:d92f9d21154c | 4744 | --listSz; |
wolfSSL | 0:d92f9d21154c | 4745 | } |
wolfSSL | 0:d92f9d21154c | 4746 | |
wolfSSL | 0:d92f9d21154c | 4747 | return idx; |
wolfSSL | 0:d92f9d21154c | 4748 | } |
wolfSSL | 0:d92f9d21154c | 4749 | |
wolfSSL | 0:d92f9d21154c | 4750 | |
wolfSSL | 0:d92f9d21154c | 4751 | /* Store whole cert row into memory, have lock, return bytes added */ |
wolfSSL | 0:d92f9d21154c | 4752 | static INLINE int StoreCertRow(WOLFSSL_CERT_MANAGER* cm, byte* current, int row) |
wolfSSL | 0:d92f9d21154c | 4753 | { |
wolfSSL | 0:d92f9d21154c | 4754 | int added = 0; |
wolfSSL | 0:d92f9d21154c | 4755 | Signer* list = cm->caTable[row]; |
wolfSSL | 0:d92f9d21154c | 4756 | |
wolfSSL | 0:d92f9d21154c | 4757 | while (list) { |
wolfSSL | 0:d92f9d21154c | 4758 | XMEMCPY(current + added, &list->pubKeySize, sizeof(list->pubKeySize)); |
wolfSSL | 0:d92f9d21154c | 4759 | added += (int)sizeof(list->pubKeySize); |
wolfSSL | 0:d92f9d21154c | 4760 | |
wolfSSL | 0:d92f9d21154c | 4761 | XMEMCPY(current + added, &list->keyOID, sizeof(list->keyOID)); |
wolfSSL | 0:d92f9d21154c | 4762 | added += (int)sizeof(list->keyOID); |
wolfSSL | 0:d92f9d21154c | 4763 | |
wolfSSL | 0:d92f9d21154c | 4764 | XMEMCPY(current + added, list->publicKey, list->pubKeySize); |
wolfSSL | 0:d92f9d21154c | 4765 | added += list->pubKeySize; |
wolfSSL | 0:d92f9d21154c | 4766 | |
wolfSSL | 0:d92f9d21154c | 4767 | XMEMCPY(current + added, &list->nameLen, sizeof(list->nameLen)); |
wolfSSL | 0:d92f9d21154c | 4768 | added += (int)sizeof(list->nameLen); |
wolfSSL | 0:d92f9d21154c | 4769 | |
wolfSSL | 0:d92f9d21154c | 4770 | XMEMCPY(current + added, list->name, list->nameLen); |
wolfSSL | 0:d92f9d21154c | 4771 | added += list->nameLen; |
wolfSSL | 0:d92f9d21154c | 4772 | |
wolfSSL | 0:d92f9d21154c | 4773 | XMEMCPY(current + added, list->subjectNameHash, SIGNER_DIGEST_SIZE); |
wolfSSL | 0:d92f9d21154c | 4774 | added += SIGNER_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 4775 | |
wolfSSL | 0:d92f9d21154c | 4776 | #ifndef NO_SKID |
wolfSSL | 0:d92f9d21154c | 4777 | XMEMCPY(current + added, list->subjectKeyIdHash,SIGNER_DIGEST_SIZE); |
wolfSSL | 0:d92f9d21154c | 4778 | added += SIGNER_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 4779 | #endif |
wolfSSL | 0:d92f9d21154c | 4780 | |
wolfSSL | 0:d92f9d21154c | 4781 | list = list->next; |
wolfSSL | 0:d92f9d21154c | 4782 | } |
wolfSSL | 0:d92f9d21154c | 4783 | |
wolfSSL | 0:d92f9d21154c | 4784 | return added; |
wolfSSL | 0:d92f9d21154c | 4785 | } |
wolfSSL | 0:d92f9d21154c | 4786 | |
wolfSSL | 0:d92f9d21154c | 4787 | |
wolfSSL | 0:d92f9d21154c | 4788 | /* Persist cert cache to memory, have lock */ |
wolfSSL | 0:d92f9d21154c | 4789 | static INLINE int DoMemSaveCertCache(WOLFSSL_CERT_MANAGER* cm, void* mem, int sz) |
wolfSSL | 0:d92f9d21154c | 4790 | { |
wolfSSL | 0:d92f9d21154c | 4791 | int realSz; |
wolfSSL | 0:d92f9d21154c | 4792 | int ret = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 4793 | int i; |
wolfSSL | 0:d92f9d21154c | 4794 | |
wolfSSL | 0:d92f9d21154c | 4795 | WOLFSSL_ENTER("DoMemSaveCertCache"); |
wolfSSL | 0:d92f9d21154c | 4796 | |
wolfSSL | 0:d92f9d21154c | 4797 | realSz = GetCertCacheMemSize(cm); |
wolfSSL | 0:d92f9d21154c | 4798 | if (realSz > sz) { |
wolfSSL | 0:d92f9d21154c | 4799 | WOLFSSL_MSG("Mem output buffer too small"); |
wolfSSL | 0:d92f9d21154c | 4800 | ret = BUFFER_E; |
wolfSSL | 0:d92f9d21154c | 4801 | } |
wolfSSL | 0:d92f9d21154c | 4802 | else { |
wolfSSL | 0:d92f9d21154c | 4803 | byte* current; |
wolfSSL | 0:d92f9d21154c | 4804 | CertCacheHeader hdr; |
wolfSSL | 0:d92f9d21154c | 4805 | |
wolfSSL | 0:d92f9d21154c | 4806 | hdr.version = WOLFSSL_CACHE_CERT_VERSION; |
wolfSSL | 0:d92f9d21154c | 4807 | hdr.rows = CA_TABLE_SIZE; |
wolfSSL | 0:d92f9d21154c | 4808 | SetCertHeaderColumns(cm, hdr.columns); |
wolfSSL | 0:d92f9d21154c | 4809 | hdr.signerSz = (int)sizeof(Signer); |
wolfSSL | 0:d92f9d21154c | 4810 | |
wolfSSL | 0:d92f9d21154c | 4811 | XMEMCPY(mem, &hdr, sizeof(CertCacheHeader)); |
wolfSSL | 0:d92f9d21154c | 4812 | current = (byte*)mem + sizeof(CertCacheHeader); |
wolfSSL | 0:d92f9d21154c | 4813 | |
wolfSSL | 0:d92f9d21154c | 4814 | for (i = 0; i < CA_TABLE_SIZE; ++i) |
wolfSSL | 0:d92f9d21154c | 4815 | current += StoreCertRow(cm, current, i); |
wolfSSL | 0:d92f9d21154c | 4816 | } |
wolfSSL | 0:d92f9d21154c | 4817 | |
wolfSSL | 0:d92f9d21154c | 4818 | return ret; |
wolfSSL | 0:d92f9d21154c | 4819 | } |
wolfSSL | 0:d92f9d21154c | 4820 | |
wolfSSL | 0:d92f9d21154c | 4821 | |
wolfSSL | 0:d92f9d21154c | 4822 | #if !defined(NO_FILESYSTEM) |
wolfSSL | 0:d92f9d21154c | 4823 | |
wolfSSL | 0:d92f9d21154c | 4824 | /* Persist cert cache to file */ |
wolfSSL | 0:d92f9d21154c | 4825 | int CM_SaveCertCache(WOLFSSL_CERT_MANAGER* cm, const char* fname) |
wolfSSL | 0:d92f9d21154c | 4826 | { |
wolfSSL | 0:d92f9d21154c | 4827 | XFILE file; |
wolfSSL | 0:d92f9d21154c | 4828 | int rc = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 4829 | int memSz; |
wolfSSL | 0:d92f9d21154c | 4830 | byte* mem; |
wolfSSL | 0:d92f9d21154c | 4831 | |
wolfSSL | 0:d92f9d21154c | 4832 | WOLFSSL_ENTER("CM_SaveCertCache"); |
wolfSSL | 0:d92f9d21154c | 4833 | |
wolfSSL | 0:d92f9d21154c | 4834 | file = XFOPEN(fname, "w+b"); |
wolfSSL | 0:d92f9d21154c | 4835 | if (file == XBADFILE) { |
wolfSSL | 0:d92f9d21154c | 4836 | WOLFSSL_MSG("Couldn't open cert cache save file"); |
wolfSSL | 0:d92f9d21154c | 4837 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 4838 | } |
wolfSSL | 0:d92f9d21154c | 4839 | |
wolfSSL | 0:d92f9d21154c | 4840 | if (LockMutex(&cm->caLock) != 0) { |
wolfSSL | 0:d92f9d21154c | 4841 | WOLFSSL_MSG("LockMutex on caLock failed"); |
wolfSSL | 0:d92f9d21154c | 4842 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 4843 | return BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 4844 | } |
wolfSSL | 0:d92f9d21154c | 4845 | |
wolfSSL | 0:d92f9d21154c | 4846 | memSz = GetCertCacheMemSize(cm); |
wolfSSL | 0:d92f9d21154c | 4847 | mem = (byte*)XMALLOC(memSz, cm->heap, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 4848 | if (mem == NULL) { |
wolfSSL | 0:d92f9d21154c | 4849 | WOLFSSL_MSG("Alloc for tmp buffer failed"); |
wolfSSL | 0:d92f9d21154c | 4850 | rc = MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 4851 | } else { |
wolfSSL | 0:d92f9d21154c | 4852 | rc = DoMemSaveCertCache(cm, mem, memSz); |
wolfSSL | 0:d92f9d21154c | 4853 | if (rc == SSL_SUCCESS) { |
wolfSSL | 0:d92f9d21154c | 4854 | int ret = (int)XFWRITE(mem, memSz, 1, file); |
wolfSSL | 0:d92f9d21154c | 4855 | if (ret != 1) { |
wolfSSL | 0:d92f9d21154c | 4856 | WOLFSSL_MSG("Cert cache file write failed"); |
wolfSSL | 0:d92f9d21154c | 4857 | rc = FWRITE_ERROR; |
wolfSSL | 0:d92f9d21154c | 4858 | } |
wolfSSL | 0:d92f9d21154c | 4859 | } |
wolfSSL | 0:d92f9d21154c | 4860 | XFREE(mem, cm->heap, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 4861 | } |
wolfSSL | 0:d92f9d21154c | 4862 | |
wolfSSL | 0:d92f9d21154c | 4863 | UnLockMutex(&cm->caLock); |
wolfSSL | 0:d92f9d21154c | 4864 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 4865 | |
wolfSSL | 0:d92f9d21154c | 4866 | return rc; |
wolfSSL | 0:d92f9d21154c | 4867 | } |
wolfSSL | 0:d92f9d21154c | 4868 | |
wolfSSL | 0:d92f9d21154c | 4869 | |
wolfSSL | 0:d92f9d21154c | 4870 | /* Restore cert cache from file */ |
wolfSSL | 0:d92f9d21154c | 4871 | int CM_RestoreCertCache(WOLFSSL_CERT_MANAGER* cm, const char* fname) |
wolfSSL | 0:d92f9d21154c | 4872 | { |
wolfSSL | 0:d92f9d21154c | 4873 | XFILE file; |
wolfSSL | 0:d92f9d21154c | 4874 | int rc = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 4875 | int ret; |
wolfSSL | 0:d92f9d21154c | 4876 | int memSz; |
wolfSSL | 0:d92f9d21154c | 4877 | byte* mem; |
wolfSSL | 0:d92f9d21154c | 4878 | |
wolfSSL | 0:d92f9d21154c | 4879 | WOLFSSL_ENTER("CM_RestoreCertCache"); |
wolfSSL | 0:d92f9d21154c | 4880 | |
wolfSSL | 0:d92f9d21154c | 4881 | file = XFOPEN(fname, "rb"); |
wolfSSL | 0:d92f9d21154c | 4882 | if (file == XBADFILE) { |
wolfSSL | 0:d92f9d21154c | 4883 | WOLFSSL_MSG("Couldn't open cert cache save file"); |
wolfSSL | 0:d92f9d21154c | 4884 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 4885 | } |
wolfSSL | 0:d92f9d21154c | 4886 | |
wolfSSL | 0:d92f9d21154c | 4887 | XFSEEK(file, 0, XSEEK_END); |
wolfSSL | 0:d92f9d21154c | 4888 | memSz = (int)XFTELL(file); |
wolfSSL | 0:d92f9d21154c | 4889 | XREWIND(file); |
wolfSSL | 0:d92f9d21154c | 4890 | |
wolfSSL | 0:d92f9d21154c | 4891 | if (memSz <= 0) { |
wolfSSL | 0:d92f9d21154c | 4892 | WOLFSSL_MSG("Bad file size"); |
wolfSSL | 0:d92f9d21154c | 4893 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 4894 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 4895 | } |
wolfSSL | 0:d92f9d21154c | 4896 | |
wolfSSL | 0:d92f9d21154c | 4897 | mem = (byte*)XMALLOC(memSz, cm->heap, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 4898 | if (mem == NULL) { |
wolfSSL | 0:d92f9d21154c | 4899 | WOLFSSL_MSG("Alloc for tmp buffer failed"); |
wolfSSL | 0:d92f9d21154c | 4900 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 4901 | return MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 4902 | } |
wolfSSL | 0:d92f9d21154c | 4903 | |
wolfSSL | 0:d92f9d21154c | 4904 | ret = (int)XFREAD(mem, memSz, 1, file); |
wolfSSL | 0:d92f9d21154c | 4905 | if (ret != 1) { |
wolfSSL | 0:d92f9d21154c | 4906 | WOLFSSL_MSG("Cert file read error"); |
wolfSSL | 0:d92f9d21154c | 4907 | rc = FREAD_ERROR; |
wolfSSL | 0:d92f9d21154c | 4908 | } else { |
wolfSSL | 0:d92f9d21154c | 4909 | rc = CM_MemRestoreCertCache(cm, mem, memSz); |
wolfSSL | 0:d92f9d21154c | 4910 | if (rc != SSL_SUCCESS) { |
wolfSSL | 0:d92f9d21154c | 4911 | WOLFSSL_MSG("Mem restore cert cache failed"); |
wolfSSL | 0:d92f9d21154c | 4912 | } |
wolfSSL | 0:d92f9d21154c | 4913 | } |
wolfSSL | 0:d92f9d21154c | 4914 | |
wolfSSL | 0:d92f9d21154c | 4915 | XFREE(mem, cm->heap, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 4916 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 4917 | |
wolfSSL | 0:d92f9d21154c | 4918 | return rc; |
wolfSSL | 0:d92f9d21154c | 4919 | } |
wolfSSL | 0:d92f9d21154c | 4920 | |
wolfSSL | 0:d92f9d21154c | 4921 | #endif /* NO_FILESYSTEM */ |
wolfSSL | 0:d92f9d21154c | 4922 | |
wolfSSL | 0:d92f9d21154c | 4923 | |
wolfSSL | 0:d92f9d21154c | 4924 | /* Persist cert cache to memory */ |
wolfSSL | 0:d92f9d21154c | 4925 | int CM_MemSaveCertCache(WOLFSSL_CERT_MANAGER* cm, void* mem, int sz, int* used) |
wolfSSL | 0:d92f9d21154c | 4926 | { |
wolfSSL | 0:d92f9d21154c | 4927 | int ret = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 4928 | |
wolfSSL | 0:d92f9d21154c | 4929 | WOLFSSL_ENTER("CM_MemSaveCertCache"); |
wolfSSL | 0:d92f9d21154c | 4930 | |
wolfSSL | 0:d92f9d21154c | 4931 | if (LockMutex(&cm->caLock) != 0) { |
wolfSSL | 0:d92f9d21154c | 4932 | WOLFSSL_MSG("LockMutex on caLock failed"); |
wolfSSL | 0:d92f9d21154c | 4933 | return BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 4934 | } |
wolfSSL | 0:d92f9d21154c | 4935 | |
wolfSSL | 0:d92f9d21154c | 4936 | ret = DoMemSaveCertCache(cm, mem, sz); |
wolfSSL | 0:d92f9d21154c | 4937 | if (ret == SSL_SUCCESS) |
wolfSSL | 0:d92f9d21154c | 4938 | *used = GetCertCacheMemSize(cm); |
wolfSSL | 0:d92f9d21154c | 4939 | |
wolfSSL | 0:d92f9d21154c | 4940 | UnLockMutex(&cm->caLock); |
wolfSSL | 0:d92f9d21154c | 4941 | |
wolfSSL | 0:d92f9d21154c | 4942 | return ret; |
wolfSSL | 0:d92f9d21154c | 4943 | } |
wolfSSL | 0:d92f9d21154c | 4944 | |
wolfSSL | 0:d92f9d21154c | 4945 | |
wolfSSL | 0:d92f9d21154c | 4946 | /* Restore cert cache from memory */ |
wolfSSL | 0:d92f9d21154c | 4947 | int CM_MemRestoreCertCache(WOLFSSL_CERT_MANAGER* cm, const void* mem, int sz) |
wolfSSL | 0:d92f9d21154c | 4948 | { |
wolfSSL | 0:d92f9d21154c | 4949 | int ret = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 4950 | int i; |
wolfSSL | 0:d92f9d21154c | 4951 | CertCacheHeader* hdr = (CertCacheHeader*)mem; |
wolfSSL | 0:d92f9d21154c | 4952 | byte* current = (byte*)mem + sizeof(CertCacheHeader); |
wolfSSL | 0:d92f9d21154c | 4953 | byte* end = (byte*)mem + sz; /* don't go over */ |
wolfSSL | 0:d92f9d21154c | 4954 | |
wolfSSL | 0:d92f9d21154c | 4955 | WOLFSSL_ENTER("CM_MemRestoreCertCache"); |
wolfSSL | 0:d92f9d21154c | 4956 | |
wolfSSL | 0:d92f9d21154c | 4957 | if (current > end) { |
wolfSSL | 0:d92f9d21154c | 4958 | WOLFSSL_MSG("Cert Cache Memory buffer too small"); |
wolfSSL | 0:d92f9d21154c | 4959 | return BUFFER_E; |
wolfSSL | 0:d92f9d21154c | 4960 | } |
wolfSSL | 0:d92f9d21154c | 4961 | |
wolfSSL | 0:d92f9d21154c | 4962 | if (hdr->version != WOLFSSL_CACHE_CERT_VERSION || |
wolfSSL | 0:d92f9d21154c | 4963 | hdr->rows != CA_TABLE_SIZE || |
wolfSSL | 0:d92f9d21154c | 4964 | hdr->signerSz != (int)sizeof(Signer)) { |
wolfSSL | 0:d92f9d21154c | 4965 | |
wolfSSL | 0:d92f9d21154c | 4966 | WOLFSSL_MSG("Cert Cache Memory header mismatch"); |
wolfSSL | 0:d92f9d21154c | 4967 | return CACHE_MATCH_ERROR; |
wolfSSL | 0:d92f9d21154c | 4968 | } |
wolfSSL | 0:d92f9d21154c | 4969 | |
wolfSSL | 0:d92f9d21154c | 4970 | if (LockMutex(&cm->caLock) != 0) { |
wolfSSL | 0:d92f9d21154c | 4971 | WOLFSSL_MSG("LockMutex on caLock failed"); |
wolfSSL | 0:d92f9d21154c | 4972 | return BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 4973 | } |
wolfSSL | 0:d92f9d21154c | 4974 | |
wolfSSL | 0:d92f9d21154c | 4975 | FreeSignerTable(cm->caTable, CA_TABLE_SIZE, cm->heap); |
wolfSSL | 0:d92f9d21154c | 4976 | |
wolfSSL | 0:d92f9d21154c | 4977 | for (i = 0; i < CA_TABLE_SIZE; ++i) { |
wolfSSL | 0:d92f9d21154c | 4978 | int added = RestoreCertRow(cm, current, i, hdr->columns[i], end); |
wolfSSL | 0:d92f9d21154c | 4979 | if (added < 0) { |
wolfSSL | 0:d92f9d21154c | 4980 | WOLFSSL_MSG("RestoreCertRow error"); |
wolfSSL | 0:d92f9d21154c | 4981 | ret = added; |
wolfSSL | 0:d92f9d21154c | 4982 | break; |
wolfSSL | 0:d92f9d21154c | 4983 | } |
wolfSSL | 0:d92f9d21154c | 4984 | current += added; |
wolfSSL | 0:d92f9d21154c | 4985 | } |
wolfSSL | 0:d92f9d21154c | 4986 | |
wolfSSL | 0:d92f9d21154c | 4987 | UnLockMutex(&cm->caLock); |
wolfSSL | 0:d92f9d21154c | 4988 | |
wolfSSL | 0:d92f9d21154c | 4989 | return ret; |
wolfSSL | 0:d92f9d21154c | 4990 | } |
wolfSSL | 0:d92f9d21154c | 4991 | |
wolfSSL | 0:d92f9d21154c | 4992 | |
wolfSSL | 0:d92f9d21154c | 4993 | /* get how big the the cert cache save buffer needs to be */ |
wolfSSL | 0:d92f9d21154c | 4994 | int CM_GetCertCacheMemSize(WOLFSSL_CERT_MANAGER* cm) |
wolfSSL | 0:d92f9d21154c | 4995 | { |
wolfSSL | 0:d92f9d21154c | 4996 | int sz; |
wolfSSL | 0:d92f9d21154c | 4997 | |
wolfSSL | 0:d92f9d21154c | 4998 | WOLFSSL_ENTER("CM_GetCertCacheMemSize"); |
wolfSSL | 0:d92f9d21154c | 4999 | |
wolfSSL | 0:d92f9d21154c | 5000 | if (LockMutex(&cm->caLock) != 0) { |
wolfSSL | 0:d92f9d21154c | 5001 | WOLFSSL_MSG("LockMutex on caLock failed"); |
wolfSSL | 0:d92f9d21154c | 5002 | return BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 5003 | } |
wolfSSL | 0:d92f9d21154c | 5004 | |
wolfSSL | 0:d92f9d21154c | 5005 | sz = GetCertCacheMemSize(cm); |
wolfSSL | 0:d92f9d21154c | 5006 | |
wolfSSL | 0:d92f9d21154c | 5007 | UnLockMutex(&cm->caLock); |
wolfSSL | 0:d92f9d21154c | 5008 | |
wolfSSL | 0:d92f9d21154c | 5009 | return sz; |
wolfSSL | 0:d92f9d21154c | 5010 | } |
wolfSSL | 0:d92f9d21154c | 5011 | |
wolfSSL | 0:d92f9d21154c | 5012 | #endif /* PERSIST_CERT_CACHE */ |
wolfSSL | 0:d92f9d21154c | 5013 | #endif /* NO_CERTS */ |
wolfSSL | 0:d92f9d21154c | 5014 | |
wolfSSL | 0:d92f9d21154c | 5015 | |
wolfSSL | 0:d92f9d21154c | 5016 | int wolfSSL_CTX_set_cipher_list(WOLFSSL_CTX* ctx, const char* list) |
wolfSSL | 0:d92f9d21154c | 5017 | { |
wolfSSL | 0:d92f9d21154c | 5018 | WOLFSSL_ENTER("wolfSSL_CTX_set_cipher_list"); |
wolfSSL | 0:d92f9d21154c | 5019 | |
wolfSSL | 0:d92f9d21154c | 5020 | /* alloc/init on demand only */ |
wolfSSL | 0:d92f9d21154c | 5021 | if (ctx->suites == NULL) { |
wolfSSL | 0:d92f9d21154c | 5022 | ctx->suites = (Suites*)XMALLOC(sizeof(Suites), ctx->heap, |
wolfSSL | 0:d92f9d21154c | 5023 | DYNAMIC_TYPE_SUITES); |
wolfSSL | 0:d92f9d21154c | 5024 | if (ctx->suites == NULL) { |
wolfSSL | 0:d92f9d21154c | 5025 | WOLFSSL_MSG("Memory alloc for Suites failed"); |
wolfSSL | 0:d92f9d21154c | 5026 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 5027 | } |
wolfSSL | 0:d92f9d21154c | 5028 | XMEMSET(ctx->suites, 0, sizeof(Suites)); |
wolfSSL | 0:d92f9d21154c | 5029 | } |
wolfSSL | 0:d92f9d21154c | 5030 | |
wolfSSL | 0:d92f9d21154c | 5031 | return (SetCipherList(ctx->suites, list)) ? SSL_SUCCESS : SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 5032 | } |
wolfSSL | 0:d92f9d21154c | 5033 | |
wolfSSL | 0:d92f9d21154c | 5034 | |
wolfSSL | 0:d92f9d21154c | 5035 | int wolfSSL_set_cipher_list(WOLFSSL* ssl, const char* list) |
wolfSSL | 0:d92f9d21154c | 5036 | { |
wolfSSL | 0:d92f9d21154c | 5037 | WOLFSSL_ENTER("wolfSSL_set_cipher_list"); |
wolfSSL | 0:d92f9d21154c | 5038 | return (SetCipherList(ssl->suites, list)) ? SSL_SUCCESS : SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 5039 | } |
wolfSSL | 0:d92f9d21154c | 5040 | |
wolfSSL | 0:d92f9d21154c | 5041 | |
wolfSSL | 0:d92f9d21154c | 5042 | #ifndef WOLFSSL_LEANPSK |
wolfSSL | 0:d92f9d21154c | 5043 | #ifdef WOLFSSL_DTLS |
wolfSSL | 0:d92f9d21154c | 5044 | |
wolfSSL | 0:d92f9d21154c | 5045 | int wolfSSL_dtls_get_current_timeout(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 5046 | { |
wolfSSL | 0:d92f9d21154c | 5047 | (void)ssl; |
wolfSSL | 0:d92f9d21154c | 5048 | |
wolfSSL | 0:d92f9d21154c | 5049 | return ssl->dtls_timeout; |
wolfSSL | 0:d92f9d21154c | 5050 | } |
wolfSSL | 0:d92f9d21154c | 5051 | |
wolfSSL | 0:d92f9d21154c | 5052 | |
wolfSSL | 0:d92f9d21154c | 5053 | /* user may need to alter init dtls recv timeout, SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 5054 | int wolfSSL_dtls_set_timeout_init(WOLFSSL* ssl, int timeout) |
wolfSSL | 0:d92f9d21154c | 5055 | { |
wolfSSL | 0:d92f9d21154c | 5056 | if (ssl == NULL || timeout < 0) |
wolfSSL | 0:d92f9d21154c | 5057 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 5058 | |
wolfSSL | 0:d92f9d21154c | 5059 | if (timeout > ssl->dtls_timeout_max) { |
wolfSSL | 0:d92f9d21154c | 5060 | WOLFSSL_MSG("Can't set dtls timeout init greater than dtls timeout max"); |
wolfSSL | 0:d92f9d21154c | 5061 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 5062 | } |
wolfSSL | 0:d92f9d21154c | 5063 | |
wolfSSL | 0:d92f9d21154c | 5064 | ssl->dtls_timeout_init = timeout; |
wolfSSL | 0:d92f9d21154c | 5065 | ssl->dtls_timeout = timeout; |
wolfSSL | 0:d92f9d21154c | 5066 | |
wolfSSL | 0:d92f9d21154c | 5067 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 5068 | } |
wolfSSL | 0:d92f9d21154c | 5069 | |
wolfSSL | 0:d92f9d21154c | 5070 | |
wolfSSL | 0:d92f9d21154c | 5071 | /* user may need to alter max dtls recv timeout, SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 5072 | int wolfSSL_dtls_set_timeout_max(WOLFSSL* ssl, int timeout) |
wolfSSL | 0:d92f9d21154c | 5073 | { |
wolfSSL | 0:d92f9d21154c | 5074 | if (ssl == NULL || timeout < 0) |
wolfSSL | 0:d92f9d21154c | 5075 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 5076 | |
wolfSSL | 0:d92f9d21154c | 5077 | if (timeout < ssl->dtls_timeout_init) { |
wolfSSL | 0:d92f9d21154c | 5078 | WOLFSSL_MSG("Can't set dtls timeout max less than dtls timeout init"); |
wolfSSL | 0:d92f9d21154c | 5079 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 5080 | } |
wolfSSL | 0:d92f9d21154c | 5081 | |
wolfSSL | 0:d92f9d21154c | 5082 | ssl->dtls_timeout_max = timeout; |
wolfSSL | 0:d92f9d21154c | 5083 | |
wolfSSL | 0:d92f9d21154c | 5084 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 5085 | } |
wolfSSL | 0:d92f9d21154c | 5086 | |
wolfSSL | 0:d92f9d21154c | 5087 | |
wolfSSL | 0:d92f9d21154c | 5088 | int wolfSSL_dtls_got_timeout(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 5089 | { |
wolfSSL | 0:d92f9d21154c | 5090 | int result = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 5091 | |
wolfSSL | 0:d92f9d21154c | 5092 | DtlsMsgListDelete(ssl->dtls_msg_list, ssl->heap); |
wolfSSL | 0:d92f9d21154c | 5093 | ssl->dtls_msg_list = NULL; |
wolfSSL | 0:d92f9d21154c | 5094 | if (DtlsPoolTimeout(ssl) < 0 || DtlsPoolSend(ssl) < 0) { |
wolfSSL | 0:d92f9d21154c | 5095 | result = SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5096 | } |
wolfSSL | 0:d92f9d21154c | 5097 | return result; |
wolfSSL | 0:d92f9d21154c | 5098 | } |
wolfSSL | 0:d92f9d21154c | 5099 | |
wolfSSL | 0:d92f9d21154c | 5100 | #endif /* DTLS */ |
wolfSSL | 0:d92f9d21154c | 5101 | #endif /* LEANPSK */ |
wolfSSL | 0:d92f9d21154c | 5102 | |
wolfSSL | 0:d92f9d21154c | 5103 | |
wolfSSL | 0:d92f9d21154c | 5104 | /* client only parts */ |
wolfSSL | 0:d92f9d21154c | 5105 | #ifndef NO_WOLFSSL_CLIENT |
wolfSSL | 0:d92f9d21154c | 5106 | |
wolfSSL | 0:d92f9d21154c | 5107 | #ifndef NO_OLD_TLS |
wolfSSL | 0:d92f9d21154c | 5108 | WOLFSSL_METHOD* wolfSSLv3_client_method(void) |
wolfSSL | 0:d92f9d21154c | 5109 | { |
wolfSSL | 0:d92f9d21154c | 5110 | WOLFSSL_METHOD* method = |
wolfSSL | 0:d92f9d21154c | 5111 | (WOLFSSL_METHOD*) XMALLOC(sizeof(WOLFSSL_METHOD), 0, |
wolfSSL | 0:d92f9d21154c | 5112 | DYNAMIC_TYPE_METHOD); |
wolfSSL | 0:d92f9d21154c | 5113 | WOLFSSL_ENTER("SSLv3_client_method"); |
wolfSSL | 0:d92f9d21154c | 5114 | if (method) |
wolfSSL | 0:d92f9d21154c | 5115 | InitSSL_Method(method, MakeSSLv3()); |
wolfSSL | 0:d92f9d21154c | 5116 | return method; |
wolfSSL | 0:d92f9d21154c | 5117 | } |
wolfSSL | 0:d92f9d21154c | 5118 | #endif |
wolfSSL | 0:d92f9d21154c | 5119 | |
wolfSSL | 0:d92f9d21154c | 5120 | #ifdef WOLFSSL_DTLS |
wolfSSL | 0:d92f9d21154c | 5121 | |
wolfSSL | 0:d92f9d21154c | 5122 | #ifndef NO_OLD_TLS |
wolfSSL | 0:d92f9d21154c | 5123 | WOLFSSL_METHOD* wolfDTLSv1_client_method(void) |
wolfSSL | 0:d92f9d21154c | 5124 | { |
wolfSSL | 0:d92f9d21154c | 5125 | WOLFSSL_METHOD* method = |
wolfSSL | 0:d92f9d21154c | 5126 | (WOLFSSL_METHOD*) XMALLOC(sizeof(WOLFSSL_METHOD), 0, |
wolfSSL | 0:d92f9d21154c | 5127 | DYNAMIC_TYPE_METHOD); |
wolfSSL | 0:d92f9d21154c | 5128 | WOLFSSL_ENTER("DTLSv1_client_method"); |
wolfSSL | 0:d92f9d21154c | 5129 | if (method) |
wolfSSL | 0:d92f9d21154c | 5130 | InitSSL_Method(method, MakeDTLSv1()); |
wolfSSL | 0:d92f9d21154c | 5131 | return method; |
wolfSSL | 0:d92f9d21154c | 5132 | } |
wolfSSL | 0:d92f9d21154c | 5133 | #endif /* NO_OLD_TLS */ |
wolfSSL | 0:d92f9d21154c | 5134 | |
wolfSSL | 0:d92f9d21154c | 5135 | WOLFSSL_METHOD* wolfDTLSv1_2_client_method(void) |
wolfSSL | 0:d92f9d21154c | 5136 | { |
wolfSSL | 0:d92f9d21154c | 5137 | WOLFSSL_METHOD* method = |
wolfSSL | 0:d92f9d21154c | 5138 | (WOLFSSL_METHOD*) XMALLOC(sizeof(WOLFSSL_METHOD), 0, |
wolfSSL | 0:d92f9d21154c | 5139 | DYNAMIC_TYPE_METHOD); |
wolfSSL | 0:d92f9d21154c | 5140 | WOLFSSL_ENTER("DTLSv1_2_client_method"); |
wolfSSL | 0:d92f9d21154c | 5141 | if (method) |
wolfSSL | 0:d92f9d21154c | 5142 | InitSSL_Method(method, MakeDTLSv1_2()); |
wolfSSL | 0:d92f9d21154c | 5143 | return method; |
wolfSSL | 0:d92f9d21154c | 5144 | } |
wolfSSL | 0:d92f9d21154c | 5145 | #endif |
wolfSSL | 0:d92f9d21154c | 5146 | |
wolfSSL | 0:d92f9d21154c | 5147 | |
wolfSSL | 0:d92f9d21154c | 5148 | /* please see note at top of README if you get an error from connect */ |
wolfSSL | 0:d92f9d21154c | 5149 | int wolfSSL_connect(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 5150 | { |
wolfSSL | 0:d92f9d21154c | 5151 | int neededState; |
wolfSSL | 0:d92f9d21154c | 5152 | |
wolfSSL | 0:d92f9d21154c | 5153 | WOLFSSL_ENTER("SSL_connect()"); |
wolfSSL | 0:d92f9d21154c | 5154 | |
wolfSSL | 0:d92f9d21154c | 5155 | #ifdef HAVE_ERRNO_H |
wolfSSL | 0:d92f9d21154c | 5156 | errno = 0; |
wolfSSL | 0:d92f9d21154c | 5157 | #endif |
wolfSSL | 0:d92f9d21154c | 5158 | |
wolfSSL | 0:d92f9d21154c | 5159 | if (ssl->options.side != WOLFSSL_CLIENT_END) { |
wolfSSL | 0:d92f9d21154c | 5160 | WOLFSSL_ERROR(ssl->error = SIDE_ERROR); |
wolfSSL | 0:d92f9d21154c | 5161 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5162 | } |
wolfSSL | 0:d92f9d21154c | 5163 | |
wolfSSL | 0:d92f9d21154c | 5164 | #ifdef WOLFSSL_DTLS |
wolfSSL | 0:d92f9d21154c | 5165 | if (ssl->version.major == DTLS_MAJOR) { |
wolfSSL | 0:d92f9d21154c | 5166 | ssl->options.dtls = 1; |
wolfSSL | 0:d92f9d21154c | 5167 | ssl->options.tls = 1; |
wolfSSL | 0:d92f9d21154c | 5168 | ssl->options.tls1_1 = 1; |
wolfSSL | 0:d92f9d21154c | 5169 | |
wolfSSL | 0:d92f9d21154c | 5170 | if (DtlsPoolInit(ssl) != 0) { |
wolfSSL | 0:d92f9d21154c | 5171 | ssl->error = MEMORY_ERROR; |
wolfSSL | 0:d92f9d21154c | 5172 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5173 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5174 | } |
wolfSSL | 0:d92f9d21154c | 5175 | } |
wolfSSL | 0:d92f9d21154c | 5176 | #endif |
wolfSSL | 0:d92f9d21154c | 5177 | |
wolfSSL | 0:d92f9d21154c | 5178 | if (ssl->buffers.outputBuffer.length > 0) { |
wolfSSL | 0:d92f9d21154c | 5179 | if ( (ssl->error = SendBuffered(ssl)) == 0) { |
wolfSSL | 0:d92f9d21154c | 5180 | ssl->options.connectState++; |
wolfSSL | 0:d92f9d21154c | 5181 | WOLFSSL_MSG("connect state: Advanced from buffered send"); |
wolfSSL | 0:d92f9d21154c | 5182 | } |
wolfSSL | 0:d92f9d21154c | 5183 | else { |
wolfSSL | 0:d92f9d21154c | 5184 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5185 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5186 | } |
wolfSSL | 0:d92f9d21154c | 5187 | } |
wolfSSL | 0:d92f9d21154c | 5188 | |
wolfSSL | 0:d92f9d21154c | 5189 | switch (ssl->options.connectState) { |
wolfSSL | 0:d92f9d21154c | 5190 | |
wolfSSL | 0:d92f9d21154c | 5191 | case CONNECT_BEGIN : |
wolfSSL | 0:d92f9d21154c | 5192 | /* always send client hello first */ |
wolfSSL | 0:d92f9d21154c | 5193 | if ( (ssl->error = SendClientHello(ssl)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5194 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5195 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5196 | } |
wolfSSL | 0:d92f9d21154c | 5197 | ssl->options.connectState = CLIENT_HELLO_SENT; |
wolfSSL | 0:d92f9d21154c | 5198 | WOLFSSL_MSG("connect state: CLIENT_HELLO_SENT"); |
wolfSSL | 0:d92f9d21154c | 5199 | |
wolfSSL | 0:d92f9d21154c | 5200 | case CLIENT_HELLO_SENT : |
wolfSSL | 0:d92f9d21154c | 5201 | neededState = ssl->options.resuming ? SERVER_FINISHED_COMPLETE : |
wolfSSL | 0:d92f9d21154c | 5202 | SERVER_HELLODONE_COMPLETE; |
wolfSSL | 0:d92f9d21154c | 5203 | #ifdef WOLFSSL_DTLS |
wolfSSL | 0:d92f9d21154c | 5204 | /* In DTLS, when resuming, we can go straight to FINISHED, |
wolfSSL | 0:d92f9d21154c | 5205 | * or do a cookie exchange and then skip to FINISHED, assume |
wolfSSL | 0:d92f9d21154c | 5206 | * we need the cookie exchange first. */ |
wolfSSL | 0:d92f9d21154c | 5207 | if (ssl->options.dtls) |
wolfSSL | 0:d92f9d21154c | 5208 | neededState = SERVER_HELLOVERIFYREQUEST_COMPLETE; |
wolfSSL | 0:d92f9d21154c | 5209 | #endif |
wolfSSL | 0:d92f9d21154c | 5210 | /* get response */ |
wolfSSL | 0:d92f9d21154c | 5211 | while (ssl->options.serverState < neededState) { |
wolfSSL | 0:d92f9d21154c | 5212 | if ( (ssl->error = ProcessReply(ssl)) < 0) { |
wolfSSL | 0:d92f9d21154c | 5213 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5214 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5215 | } |
wolfSSL | 0:d92f9d21154c | 5216 | /* if resumption failed, reset needed state */ |
wolfSSL | 0:d92f9d21154c | 5217 | else if (neededState == SERVER_FINISHED_COMPLETE) |
wolfSSL | 0:d92f9d21154c | 5218 | if (!ssl->options.resuming) { |
wolfSSL | 0:d92f9d21154c | 5219 | if (!ssl->options.dtls) |
wolfSSL | 0:d92f9d21154c | 5220 | neededState = SERVER_HELLODONE_COMPLETE; |
wolfSSL | 0:d92f9d21154c | 5221 | else |
wolfSSL | 0:d92f9d21154c | 5222 | neededState = SERVER_HELLOVERIFYREQUEST_COMPLETE; |
wolfSSL | 0:d92f9d21154c | 5223 | } |
wolfSSL | 0:d92f9d21154c | 5224 | } |
wolfSSL | 0:d92f9d21154c | 5225 | |
wolfSSL | 0:d92f9d21154c | 5226 | ssl->options.connectState = HELLO_AGAIN; |
wolfSSL | 0:d92f9d21154c | 5227 | WOLFSSL_MSG("connect state: HELLO_AGAIN"); |
wolfSSL | 0:d92f9d21154c | 5228 | |
wolfSSL | 0:d92f9d21154c | 5229 | case HELLO_AGAIN : |
wolfSSL | 0:d92f9d21154c | 5230 | if (ssl->options.certOnly) |
wolfSSL | 0:d92f9d21154c | 5231 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 5232 | |
wolfSSL | 0:d92f9d21154c | 5233 | #ifdef WOLFSSL_DTLS |
wolfSSL | 0:d92f9d21154c | 5234 | if (ssl->options.dtls) { |
wolfSSL | 0:d92f9d21154c | 5235 | /* re-init hashes, exclude first hello and verify request */ |
wolfSSL | 0:d92f9d21154c | 5236 | #ifndef NO_OLD_TLS |
wolfSSL | 0:d92f9d21154c | 5237 | wc_InitMd5(&ssl->hsHashes->hashMd5); |
wolfSSL | 0:d92f9d21154c | 5238 | if ( (ssl->error = wc_InitSha(&ssl->hsHashes->hashSha)) |
wolfSSL | 0:d92f9d21154c | 5239 | != 0) { |
wolfSSL | 0:d92f9d21154c | 5240 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5241 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5242 | } |
wolfSSL | 0:d92f9d21154c | 5243 | #endif |
wolfSSL | 0:d92f9d21154c | 5244 | if (IsAtLeastTLSv1_2(ssl)) { |
wolfSSL | 0:d92f9d21154c | 5245 | #ifndef NO_SHA256 |
wolfSSL | 0:d92f9d21154c | 5246 | if ( (ssl->error = wc_InitSha256( |
wolfSSL | 0:d92f9d21154c | 5247 | &ssl->hsHashes->hashSha256)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5248 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5249 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5250 | } |
wolfSSL | 0:d92f9d21154c | 5251 | #endif |
wolfSSL | 0:d92f9d21154c | 5252 | #ifdef WOLFSSL_SHA384 |
wolfSSL | 0:d92f9d21154c | 5253 | if ( (ssl->error = wc_InitSha384( |
wolfSSL | 0:d92f9d21154c | 5254 | &ssl->hsHashes->hashSha384)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5255 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5256 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5257 | } |
wolfSSL | 0:d92f9d21154c | 5258 | #endif |
wolfSSL | 0:d92f9d21154c | 5259 | #ifdef WOLFSSL_SHA512 |
wolfSSL | 0:d92f9d21154c | 5260 | if ( (ssl->error = wc_InitSha512( |
wolfSSL | 0:d92f9d21154c | 5261 | &ssl->hsHashes->hashSha512)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5262 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5263 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5264 | } |
wolfSSL | 0:d92f9d21154c | 5265 | #endif |
wolfSSL | 0:d92f9d21154c | 5266 | } |
wolfSSL | 0:d92f9d21154c | 5267 | if ( (ssl->error = SendClientHello(ssl)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5268 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5269 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5270 | } |
wolfSSL | 0:d92f9d21154c | 5271 | } |
wolfSSL | 0:d92f9d21154c | 5272 | #endif |
wolfSSL | 0:d92f9d21154c | 5273 | |
wolfSSL | 0:d92f9d21154c | 5274 | ssl->options.connectState = HELLO_AGAIN_REPLY; |
wolfSSL | 0:d92f9d21154c | 5275 | WOLFSSL_MSG("connect state: HELLO_AGAIN_REPLY"); |
wolfSSL | 0:d92f9d21154c | 5276 | |
wolfSSL | 0:d92f9d21154c | 5277 | case HELLO_AGAIN_REPLY : |
wolfSSL | 0:d92f9d21154c | 5278 | #ifdef WOLFSSL_DTLS |
wolfSSL | 0:d92f9d21154c | 5279 | if (ssl->options.dtls) { |
wolfSSL | 0:d92f9d21154c | 5280 | neededState = ssl->options.resuming ? |
wolfSSL | 0:d92f9d21154c | 5281 | SERVER_FINISHED_COMPLETE : SERVER_HELLODONE_COMPLETE; |
wolfSSL | 0:d92f9d21154c | 5282 | |
wolfSSL | 0:d92f9d21154c | 5283 | /* get response */ |
wolfSSL | 0:d92f9d21154c | 5284 | while (ssl->options.serverState < neededState) { |
wolfSSL | 0:d92f9d21154c | 5285 | if ( (ssl->error = ProcessReply(ssl)) < 0) { |
wolfSSL | 0:d92f9d21154c | 5286 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5287 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5288 | } |
wolfSSL | 0:d92f9d21154c | 5289 | /* if resumption failed, reset needed state */ |
wolfSSL | 0:d92f9d21154c | 5290 | else if (neededState == SERVER_FINISHED_COMPLETE) |
wolfSSL | 0:d92f9d21154c | 5291 | if (!ssl->options.resuming) |
wolfSSL | 0:d92f9d21154c | 5292 | neededState = SERVER_HELLODONE_COMPLETE; |
wolfSSL | 0:d92f9d21154c | 5293 | } |
wolfSSL | 0:d92f9d21154c | 5294 | } |
wolfSSL | 0:d92f9d21154c | 5295 | #endif |
wolfSSL | 0:d92f9d21154c | 5296 | |
wolfSSL | 0:d92f9d21154c | 5297 | ssl->options.connectState = FIRST_REPLY_DONE; |
wolfSSL | 0:d92f9d21154c | 5298 | WOLFSSL_MSG("connect state: FIRST_REPLY_DONE"); |
wolfSSL | 0:d92f9d21154c | 5299 | |
wolfSSL | 0:d92f9d21154c | 5300 | case FIRST_REPLY_DONE : |
wolfSSL | 0:d92f9d21154c | 5301 | #ifndef NO_CERTS |
wolfSSL | 0:d92f9d21154c | 5302 | if (ssl->options.sendVerify) { |
wolfSSL | 0:d92f9d21154c | 5303 | if ( (ssl->error = SendCertificate(ssl)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5304 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5305 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5306 | } |
wolfSSL | 0:d92f9d21154c | 5307 | WOLFSSL_MSG("sent: certificate"); |
wolfSSL | 0:d92f9d21154c | 5308 | } |
wolfSSL | 0:d92f9d21154c | 5309 | |
wolfSSL | 0:d92f9d21154c | 5310 | #endif |
wolfSSL | 0:d92f9d21154c | 5311 | ssl->options.connectState = FIRST_REPLY_FIRST; |
wolfSSL | 0:d92f9d21154c | 5312 | WOLFSSL_MSG("connect state: FIRST_REPLY_FIRST"); |
wolfSSL | 0:d92f9d21154c | 5313 | |
wolfSSL | 0:d92f9d21154c | 5314 | case FIRST_REPLY_FIRST : |
wolfSSL | 0:d92f9d21154c | 5315 | if (!ssl->options.resuming) { |
wolfSSL | 0:d92f9d21154c | 5316 | if ( (ssl->error = SendClientKeyExchange(ssl)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5317 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5318 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5319 | } |
wolfSSL | 0:d92f9d21154c | 5320 | WOLFSSL_MSG("sent: client key exchange"); |
wolfSSL | 0:d92f9d21154c | 5321 | } |
wolfSSL | 0:d92f9d21154c | 5322 | |
wolfSSL | 0:d92f9d21154c | 5323 | ssl->options.connectState = FIRST_REPLY_SECOND; |
wolfSSL | 0:d92f9d21154c | 5324 | WOLFSSL_MSG("connect state: FIRST_REPLY_SECOND"); |
wolfSSL | 0:d92f9d21154c | 5325 | |
wolfSSL | 0:d92f9d21154c | 5326 | case FIRST_REPLY_SECOND : |
wolfSSL | 0:d92f9d21154c | 5327 | #ifndef NO_CERTS |
wolfSSL | 0:d92f9d21154c | 5328 | if (ssl->options.sendVerify) { |
wolfSSL | 0:d92f9d21154c | 5329 | if ( (ssl->error = SendCertificateVerify(ssl)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5330 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5331 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5332 | } |
wolfSSL | 0:d92f9d21154c | 5333 | WOLFSSL_MSG("sent: certificate verify"); |
wolfSSL | 0:d92f9d21154c | 5334 | } |
wolfSSL | 0:d92f9d21154c | 5335 | #endif |
wolfSSL | 0:d92f9d21154c | 5336 | ssl->options.connectState = FIRST_REPLY_THIRD; |
wolfSSL | 0:d92f9d21154c | 5337 | WOLFSSL_MSG("connect state: FIRST_REPLY_THIRD"); |
wolfSSL | 0:d92f9d21154c | 5338 | |
wolfSSL | 0:d92f9d21154c | 5339 | case FIRST_REPLY_THIRD : |
wolfSSL | 0:d92f9d21154c | 5340 | if ( (ssl->error = SendChangeCipher(ssl)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5341 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5342 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5343 | } |
wolfSSL | 0:d92f9d21154c | 5344 | WOLFSSL_MSG("sent: change cipher spec"); |
wolfSSL | 0:d92f9d21154c | 5345 | ssl->options.connectState = FIRST_REPLY_FOURTH; |
wolfSSL | 0:d92f9d21154c | 5346 | WOLFSSL_MSG("connect state: FIRST_REPLY_FOURTH"); |
wolfSSL | 0:d92f9d21154c | 5347 | |
wolfSSL | 0:d92f9d21154c | 5348 | case FIRST_REPLY_FOURTH : |
wolfSSL | 0:d92f9d21154c | 5349 | if ( (ssl->error = SendFinished(ssl)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5350 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5351 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5352 | } |
wolfSSL | 0:d92f9d21154c | 5353 | WOLFSSL_MSG("sent: finished"); |
wolfSSL | 0:d92f9d21154c | 5354 | ssl->options.connectState = FINISHED_DONE; |
wolfSSL | 0:d92f9d21154c | 5355 | WOLFSSL_MSG("connect state: FINISHED_DONE"); |
wolfSSL | 0:d92f9d21154c | 5356 | |
wolfSSL | 0:d92f9d21154c | 5357 | case FINISHED_DONE : |
wolfSSL | 0:d92f9d21154c | 5358 | /* get response */ |
wolfSSL | 0:d92f9d21154c | 5359 | while (ssl->options.serverState < SERVER_FINISHED_COMPLETE) |
wolfSSL | 0:d92f9d21154c | 5360 | if ( (ssl->error = ProcessReply(ssl)) < 0) { |
wolfSSL | 0:d92f9d21154c | 5361 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5362 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5363 | } |
wolfSSL | 0:d92f9d21154c | 5364 | |
wolfSSL | 0:d92f9d21154c | 5365 | ssl->options.connectState = SECOND_REPLY_DONE; |
wolfSSL | 0:d92f9d21154c | 5366 | WOLFSSL_MSG("connect state: SECOND_REPLY_DONE"); |
wolfSSL | 0:d92f9d21154c | 5367 | |
wolfSSL | 0:d92f9d21154c | 5368 | case SECOND_REPLY_DONE: |
wolfSSL | 0:d92f9d21154c | 5369 | #ifndef NO_HANDSHAKE_DONE_CB |
wolfSSL | 0:d92f9d21154c | 5370 | if (ssl->hsDoneCb) { |
wolfSSL | 0:d92f9d21154c | 5371 | int cbret = ssl->hsDoneCb(ssl, ssl->hsDoneCtx); |
wolfSSL | 0:d92f9d21154c | 5372 | if (cbret < 0) { |
wolfSSL | 0:d92f9d21154c | 5373 | ssl->error = cbret; |
wolfSSL | 0:d92f9d21154c | 5374 | WOLFSSL_MSG("HandShake Done Cb don't continue error"); |
wolfSSL | 0:d92f9d21154c | 5375 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5376 | } |
wolfSSL | 0:d92f9d21154c | 5377 | } |
wolfSSL | 0:d92f9d21154c | 5378 | #endif /* NO_HANDSHAKE_DONE_CB */ |
wolfSSL | 0:d92f9d21154c | 5379 | FreeHandshakeResources(ssl); |
wolfSSL | 0:d92f9d21154c | 5380 | WOLFSSL_LEAVE("SSL_connect()", SSL_SUCCESS); |
wolfSSL | 0:d92f9d21154c | 5381 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 5382 | |
wolfSSL | 0:d92f9d21154c | 5383 | default: |
wolfSSL | 0:d92f9d21154c | 5384 | WOLFSSL_MSG("Unknown connect state ERROR"); |
wolfSSL | 0:d92f9d21154c | 5385 | return SSL_FATAL_ERROR; /* unknown connect state */ |
wolfSSL | 0:d92f9d21154c | 5386 | } |
wolfSSL | 0:d92f9d21154c | 5387 | } |
wolfSSL | 0:d92f9d21154c | 5388 | |
wolfSSL | 0:d92f9d21154c | 5389 | #endif /* NO_WOLFSSL_CLIENT */ |
wolfSSL | 0:d92f9d21154c | 5390 | |
wolfSSL | 0:d92f9d21154c | 5391 | |
wolfSSL | 0:d92f9d21154c | 5392 | /* server only parts */ |
wolfSSL | 0:d92f9d21154c | 5393 | #ifndef NO_WOLFSSL_SERVER |
wolfSSL | 0:d92f9d21154c | 5394 | |
wolfSSL | 0:d92f9d21154c | 5395 | #ifndef NO_OLD_TLS |
wolfSSL | 0:d92f9d21154c | 5396 | WOLFSSL_METHOD* wolfSSLv3_server_method(void) |
wolfSSL | 0:d92f9d21154c | 5397 | { |
wolfSSL | 0:d92f9d21154c | 5398 | WOLFSSL_METHOD* method = |
wolfSSL | 0:d92f9d21154c | 5399 | (WOLFSSL_METHOD*) XMALLOC(sizeof(WOLFSSL_METHOD), 0, |
wolfSSL | 0:d92f9d21154c | 5400 | DYNAMIC_TYPE_METHOD); |
wolfSSL | 0:d92f9d21154c | 5401 | WOLFSSL_ENTER("SSLv3_server_method"); |
wolfSSL | 0:d92f9d21154c | 5402 | if (method) { |
wolfSSL | 0:d92f9d21154c | 5403 | InitSSL_Method(method, MakeSSLv3()); |
wolfSSL | 0:d92f9d21154c | 5404 | method->side = WOLFSSL_SERVER_END; |
wolfSSL | 0:d92f9d21154c | 5405 | } |
wolfSSL | 0:d92f9d21154c | 5406 | return method; |
wolfSSL | 0:d92f9d21154c | 5407 | } |
wolfSSL | 0:d92f9d21154c | 5408 | #endif |
wolfSSL | 0:d92f9d21154c | 5409 | |
wolfSSL | 0:d92f9d21154c | 5410 | |
wolfSSL | 0:d92f9d21154c | 5411 | #ifdef WOLFSSL_DTLS |
wolfSSL | 0:d92f9d21154c | 5412 | |
wolfSSL | 0:d92f9d21154c | 5413 | #ifndef NO_OLD_TLS |
wolfSSL | 0:d92f9d21154c | 5414 | WOLFSSL_METHOD* wolfDTLSv1_server_method(void) |
wolfSSL | 0:d92f9d21154c | 5415 | { |
wolfSSL | 0:d92f9d21154c | 5416 | WOLFSSL_METHOD* method = |
wolfSSL | 0:d92f9d21154c | 5417 | (WOLFSSL_METHOD*) XMALLOC(sizeof(WOLFSSL_METHOD), |
wolfSSL | 0:d92f9d21154c | 5418 | 0, DYNAMIC_TYPE_METHOD); |
wolfSSL | 0:d92f9d21154c | 5419 | WOLFSSL_ENTER("DTLSv1_server_method"); |
wolfSSL | 0:d92f9d21154c | 5420 | if (method) { |
wolfSSL | 0:d92f9d21154c | 5421 | InitSSL_Method(method, MakeDTLSv1()); |
wolfSSL | 0:d92f9d21154c | 5422 | method->side = WOLFSSL_SERVER_END; |
wolfSSL | 0:d92f9d21154c | 5423 | } |
wolfSSL | 0:d92f9d21154c | 5424 | return method; |
wolfSSL | 0:d92f9d21154c | 5425 | } |
wolfSSL | 0:d92f9d21154c | 5426 | #endif /* NO_OLD_TLS */ |
wolfSSL | 0:d92f9d21154c | 5427 | |
wolfSSL | 0:d92f9d21154c | 5428 | WOLFSSL_METHOD* wolfDTLSv1_2_server_method(void) |
wolfSSL | 0:d92f9d21154c | 5429 | { |
wolfSSL | 0:d92f9d21154c | 5430 | WOLFSSL_METHOD* method = |
wolfSSL | 0:d92f9d21154c | 5431 | (WOLFSSL_METHOD*) XMALLOC(sizeof(WOLFSSL_METHOD), |
wolfSSL | 0:d92f9d21154c | 5432 | 0, DYNAMIC_TYPE_METHOD); |
wolfSSL | 0:d92f9d21154c | 5433 | WOLFSSL_ENTER("DTLSv1_2_server_method"); |
wolfSSL | 0:d92f9d21154c | 5434 | if (method) { |
wolfSSL | 0:d92f9d21154c | 5435 | InitSSL_Method(method, MakeDTLSv1_2()); |
wolfSSL | 0:d92f9d21154c | 5436 | method->side = WOLFSSL_SERVER_END; |
wolfSSL | 0:d92f9d21154c | 5437 | } |
wolfSSL | 0:d92f9d21154c | 5438 | return method; |
wolfSSL | 0:d92f9d21154c | 5439 | } |
wolfSSL | 0:d92f9d21154c | 5440 | #endif |
wolfSSL | 0:d92f9d21154c | 5441 | |
wolfSSL | 0:d92f9d21154c | 5442 | |
wolfSSL | 0:d92f9d21154c | 5443 | int wolfSSL_accept(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 5444 | { |
wolfSSL | 0:d92f9d21154c | 5445 | byte havePSK = 0; |
wolfSSL | 0:d92f9d21154c | 5446 | byte haveAnon = 0; |
wolfSSL | 0:d92f9d21154c | 5447 | WOLFSSL_ENTER("SSL_accept()"); |
wolfSSL | 0:d92f9d21154c | 5448 | |
wolfSSL | 0:d92f9d21154c | 5449 | #ifdef HAVE_ERRNO_H |
wolfSSL | 0:d92f9d21154c | 5450 | errno = 0; |
wolfSSL | 0:d92f9d21154c | 5451 | #endif |
wolfSSL | 0:d92f9d21154c | 5452 | |
wolfSSL | 0:d92f9d21154c | 5453 | #ifndef NO_PSK |
wolfSSL | 0:d92f9d21154c | 5454 | havePSK = ssl->options.havePSK; |
wolfSSL | 0:d92f9d21154c | 5455 | #endif |
wolfSSL | 0:d92f9d21154c | 5456 | (void)havePSK; |
wolfSSL | 0:d92f9d21154c | 5457 | |
wolfSSL | 0:d92f9d21154c | 5458 | #ifdef HAVE_ANON |
wolfSSL | 0:d92f9d21154c | 5459 | haveAnon = ssl->options.haveAnon; |
wolfSSL | 0:d92f9d21154c | 5460 | #endif |
wolfSSL | 0:d92f9d21154c | 5461 | (void)haveAnon; |
wolfSSL | 0:d92f9d21154c | 5462 | |
wolfSSL | 0:d92f9d21154c | 5463 | if (ssl->options.side != WOLFSSL_SERVER_END) { |
wolfSSL | 0:d92f9d21154c | 5464 | WOLFSSL_ERROR(ssl->error = SIDE_ERROR); |
wolfSSL | 0:d92f9d21154c | 5465 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5466 | } |
wolfSSL | 0:d92f9d21154c | 5467 | |
wolfSSL | 0:d92f9d21154c | 5468 | #ifndef NO_CERTS |
wolfSSL | 0:d92f9d21154c | 5469 | /* in case used set_accept_state after init */ |
wolfSSL | 0:d92f9d21154c | 5470 | if (!havePSK && !haveAnon && |
wolfSSL | 0:d92f9d21154c | 5471 | (ssl->buffers.certificate.buffer == NULL || |
wolfSSL | 0:d92f9d21154c | 5472 | ssl->buffers.key.buffer == NULL)) { |
wolfSSL | 0:d92f9d21154c | 5473 | WOLFSSL_MSG("accept error: don't have server cert and key"); |
wolfSSL | 0:d92f9d21154c | 5474 | ssl->error = NO_PRIVATE_KEY; |
wolfSSL | 0:d92f9d21154c | 5475 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5476 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5477 | } |
wolfSSL | 0:d92f9d21154c | 5478 | #endif |
wolfSSL | 0:d92f9d21154c | 5479 | |
wolfSSL | 0:d92f9d21154c | 5480 | #ifdef WOLFSSL_DTLS |
wolfSSL | 0:d92f9d21154c | 5481 | if (ssl->version.major == DTLS_MAJOR) { |
wolfSSL | 0:d92f9d21154c | 5482 | ssl->options.dtls = 1; |
wolfSSL | 0:d92f9d21154c | 5483 | ssl->options.tls = 1; |
wolfSSL | 0:d92f9d21154c | 5484 | ssl->options.tls1_1 = 1; |
wolfSSL | 0:d92f9d21154c | 5485 | |
wolfSSL | 0:d92f9d21154c | 5486 | if (DtlsPoolInit(ssl) != 0) { |
wolfSSL | 0:d92f9d21154c | 5487 | ssl->error = MEMORY_ERROR; |
wolfSSL | 0:d92f9d21154c | 5488 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5489 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5490 | } |
wolfSSL | 0:d92f9d21154c | 5491 | } |
wolfSSL | 0:d92f9d21154c | 5492 | #endif |
wolfSSL | 0:d92f9d21154c | 5493 | |
wolfSSL | 0:d92f9d21154c | 5494 | if (ssl->buffers.outputBuffer.length > 0) { |
wolfSSL | 0:d92f9d21154c | 5495 | if ( (ssl->error = SendBuffered(ssl)) == 0) { |
wolfSSL | 0:d92f9d21154c | 5496 | ssl->options.acceptState++; |
wolfSSL | 0:d92f9d21154c | 5497 | WOLFSSL_MSG("accept state: Advanced from buffered send"); |
wolfSSL | 0:d92f9d21154c | 5498 | } |
wolfSSL | 0:d92f9d21154c | 5499 | else { |
wolfSSL | 0:d92f9d21154c | 5500 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5501 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5502 | } |
wolfSSL | 0:d92f9d21154c | 5503 | } |
wolfSSL | 0:d92f9d21154c | 5504 | |
wolfSSL | 0:d92f9d21154c | 5505 | switch (ssl->options.acceptState) { |
wolfSSL | 0:d92f9d21154c | 5506 | |
wolfSSL | 0:d92f9d21154c | 5507 | case ACCEPT_BEGIN : |
wolfSSL | 0:d92f9d21154c | 5508 | /* get response */ |
wolfSSL | 0:d92f9d21154c | 5509 | while (ssl->options.clientState < CLIENT_HELLO_COMPLETE) |
wolfSSL | 0:d92f9d21154c | 5510 | if ( (ssl->error = ProcessReply(ssl)) < 0) { |
wolfSSL | 0:d92f9d21154c | 5511 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5512 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5513 | } |
wolfSSL | 0:d92f9d21154c | 5514 | ssl->options.acceptState = ACCEPT_CLIENT_HELLO_DONE; |
wolfSSL | 0:d92f9d21154c | 5515 | WOLFSSL_MSG("accept state ACCEPT_CLIENT_HELLO_DONE"); |
wolfSSL | 0:d92f9d21154c | 5516 | |
wolfSSL | 0:d92f9d21154c | 5517 | case ACCEPT_CLIENT_HELLO_DONE : |
wolfSSL | 0:d92f9d21154c | 5518 | #ifdef WOLFSSL_DTLS |
wolfSSL | 0:d92f9d21154c | 5519 | if (ssl->options.dtls) |
wolfSSL | 0:d92f9d21154c | 5520 | if ( (ssl->error = SendHelloVerifyRequest(ssl)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5521 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5522 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5523 | } |
wolfSSL | 0:d92f9d21154c | 5524 | #endif |
wolfSSL | 0:d92f9d21154c | 5525 | ssl->options.acceptState = HELLO_VERIFY_SENT; |
wolfSSL | 0:d92f9d21154c | 5526 | WOLFSSL_MSG("accept state HELLO_VERIFY_SENT"); |
wolfSSL | 0:d92f9d21154c | 5527 | |
wolfSSL | 0:d92f9d21154c | 5528 | case HELLO_VERIFY_SENT: |
wolfSSL | 0:d92f9d21154c | 5529 | #ifdef WOLFSSL_DTLS |
wolfSSL | 0:d92f9d21154c | 5530 | if (ssl->options.dtls) { |
wolfSSL | 0:d92f9d21154c | 5531 | ssl->options.clientState = NULL_STATE; /* get again */ |
wolfSSL | 0:d92f9d21154c | 5532 | /* reset messages received */ |
wolfSSL | 0:d92f9d21154c | 5533 | XMEMSET(&ssl->msgsReceived, 0, sizeof(ssl->msgsReceived)); |
wolfSSL | 0:d92f9d21154c | 5534 | /* re-init hashes, exclude first hello and verify request */ |
wolfSSL | 0:d92f9d21154c | 5535 | #ifndef NO_OLD_TLS |
wolfSSL | 0:d92f9d21154c | 5536 | wc_InitMd5(&ssl->hsHashes->hashMd5); |
wolfSSL | 0:d92f9d21154c | 5537 | if ( (ssl->error = wc_InitSha(&ssl->hsHashes->hashSha)) |
wolfSSL | 0:d92f9d21154c | 5538 | != 0) { |
wolfSSL | 0:d92f9d21154c | 5539 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5540 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5541 | } |
wolfSSL | 0:d92f9d21154c | 5542 | #endif |
wolfSSL | 0:d92f9d21154c | 5543 | if (IsAtLeastTLSv1_2(ssl)) { |
wolfSSL | 0:d92f9d21154c | 5544 | #ifndef NO_SHA256 |
wolfSSL | 0:d92f9d21154c | 5545 | if ( (ssl->error = wc_InitSha256( |
wolfSSL | 0:d92f9d21154c | 5546 | &ssl->hsHashes->hashSha256)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5547 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5548 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5549 | } |
wolfSSL | 0:d92f9d21154c | 5550 | #endif |
wolfSSL | 0:d92f9d21154c | 5551 | #ifdef WOLFSSL_SHA384 |
wolfSSL | 0:d92f9d21154c | 5552 | if ( (ssl->error = wc_InitSha384( |
wolfSSL | 0:d92f9d21154c | 5553 | &ssl->hsHashes->hashSha384)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5554 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5555 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5556 | } |
wolfSSL | 0:d92f9d21154c | 5557 | #endif |
wolfSSL | 0:d92f9d21154c | 5558 | #ifdef WOLFSSL_SHA512 |
wolfSSL | 0:d92f9d21154c | 5559 | if ( (ssl->error = wc_InitSha512( |
wolfSSL | 0:d92f9d21154c | 5560 | &ssl->hsHashes->hashSha512)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5561 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5562 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5563 | } |
wolfSSL | 0:d92f9d21154c | 5564 | #endif |
wolfSSL | 0:d92f9d21154c | 5565 | } |
wolfSSL | 0:d92f9d21154c | 5566 | |
wolfSSL | 0:d92f9d21154c | 5567 | while (ssl->options.clientState < CLIENT_HELLO_COMPLETE) |
wolfSSL | 0:d92f9d21154c | 5568 | if ( (ssl->error = ProcessReply(ssl)) < 0) { |
wolfSSL | 0:d92f9d21154c | 5569 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5570 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5571 | } |
wolfSSL | 0:d92f9d21154c | 5572 | } |
wolfSSL | 0:d92f9d21154c | 5573 | #endif |
wolfSSL | 0:d92f9d21154c | 5574 | ssl->options.acceptState = ACCEPT_FIRST_REPLY_DONE; |
wolfSSL | 0:d92f9d21154c | 5575 | WOLFSSL_MSG("accept state ACCEPT_FIRST_REPLY_DONE"); |
wolfSSL | 0:d92f9d21154c | 5576 | |
wolfSSL | 0:d92f9d21154c | 5577 | case ACCEPT_FIRST_REPLY_DONE : |
wolfSSL | 0:d92f9d21154c | 5578 | if ( (ssl->error = SendServerHello(ssl)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5579 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5580 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5581 | } |
wolfSSL | 0:d92f9d21154c | 5582 | ssl->options.acceptState = SERVER_HELLO_SENT; |
wolfSSL | 0:d92f9d21154c | 5583 | WOLFSSL_MSG("accept state SERVER_HELLO_SENT"); |
wolfSSL | 0:d92f9d21154c | 5584 | |
wolfSSL | 0:d92f9d21154c | 5585 | case SERVER_HELLO_SENT : |
wolfSSL | 0:d92f9d21154c | 5586 | #ifndef NO_CERTS |
wolfSSL | 0:d92f9d21154c | 5587 | if (!ssl->options.resuming) |
wolfSSL | 0:d92f9d21154c | 5588 | if ( (ssl->error = SendCertificate(ssl)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5589 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5590 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5591 | } |
wolfSSL | 0:d92f9d21154c | 5592 | #endif |
wolfSSL | 0:d92f9d21154c | 5593 | ssl->options.acceptState = CERT_SENT; |
wolfSSL | 0:d92f9d21154c | 5594 | WOLFSSL_MSG("accept state CERT_SENT"); |
wolfSSL | 0:d92f9d21154c | 5595 | |
wolfSSL | 0:d92f9d21154c | 5596 | case CERT_SENT : |
wolfSSL | 0:d92f9d21154c | 5597 | if (!ssl->options.resuming) |
wolfSSL | 0:d92f9d21154c | 5598 | if ( (ssl->error = SendServerKeyExchange(ssl)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5599 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5600 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5601 | } |
wolfSSL | 0:d92f9d21154c | 5602 | ssl->options.acceptState = KEY_EXCHANGE_SENT; |
wolfSSL | 0:d92f9d21154c | 5603 | WOLFSSL_MSG("accept state KEY_EXCHANGE_SENT"); |
wolfSSL | 0:d92f9d21154c | 5604 | |
wolfSSL | 0:d92f9d21154c | 5605 | case KEY_EXCHANGE_SENT : |
wolfSSL | 0:d92f9d21154c | 5606 | #ifndef NO_CERTS |
wolfSSL | 0:d92f9d21154c | 5607 | if (!ssl->options.resuming) |
wolfSSL | 0:d92f9d21154c | 5608 | if (ssl->options.verifyPeer) |
wolfSSL | 0:d92f9d21154c | 5609 | if ( (ssl->error = SendCertificateRequest(ssl)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5610 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5611 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5612 | } |
wolfSSL | 0:d92f9d21154c | 5613 | #endif |
wolfSSL | 0:d92f9d21154c | 5614 | ssl->options.acceptState = CERT_REQ_SENT; |
wolfSSL | 0:d92f9d21154c | 5615 | WOLFSSL_MSG("accept state CERT_REQ_SENT"); |
wolfSSL | 0:d92f9d21154c | 5616 | |
wolfSSL | 0:d92f9d21154c | 5617 | case CERT_REQ_SENT : |
wolfSSL | 0:d92f9d21154c | 5618 | if (!ssl->options.resuming) |
wolfSSL | 0:d92f9d21154c | 5619 | if ( (ssl->error = SendServerHelloDone(ssl)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5620 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5621 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5622 | } |
wolfSSL | 0:d92f9d21154c | 5623 | ssl->options.acceptState = SERVER_HELLO_DONE; |
wolfSSL | 0:d92f9d21154c | 5624 | WOLFSSL_MSG("accept state SERVER_HELLO_DONE"); |
wolfSSL | 0:d92f9d21154c | 5625 | |
wolfSSL | 0:d92f9d21154c | 5626 | case SERVER_HELLO_DONE : |
wolfSSL | 0:d92f9d21154c | 5627 | if (!ssl->options.resuming) { |
wolfSSL | 0:d92f9d21154c | 5628 | while (ssl->options.clientState < CLIENT_FINISHED_COMPLETE) |
wolfSSL | 0:d92f9d21154c | 5629 | if ( (ssl->error = ProcessReply(ssl)) < 0) { |
wolfSSL | 0:d92f9d21154c | 5630 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5631 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5632 | } |
wolfSSL | 0:d92f9d21154c | 5633 | } |
wolfSSL | 0:d92f9d21154c | 5634 | ssl->options.acceptState = ACCEPT_SECOND_REPLY_DONE; |
wolfSSL | 0:d92f9d21154c | 5635 | WOLFSSL_MSG("accept state ACCEPT_SECOND_REPLY_DONE"); |
wolfSSL | 0:d92f9d21154c | 5636 | |
wolfSSL | 0:d92f9d21154c | 5637 | case ACCEPT_SECOND_REPLY_DONE : |
wolfSSL | 0:d92f9d21154c | 5638 | #ifdef HAVE_SESSION_TICKET |
wolfSSL | 0:d92f9d21154c | 5639 | if (ssl->options.createTicket) { |
wolfSSL | 0:d92f9d21154c | 5640 | if ( (ssl->error = SendTicket(ssl)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5641 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5642 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5643 | } |
wolfSSL | 0:d92f9d21154c | 5644 | } |
wolfSSL | 0:d92f9d21154c | 5645 | #endif /* HAVE_SESSION_TICKET */ |
wolfSSL | 0:d92f9d21154c | 5646 | ssl->options.acceptState = TICKET_SENT; |
wolfSSL | 0:d92f9d21154c | 5647 | WOLFSSL_MSG("accept state TICKET_SENT"); |
wolfSSL | 0:d92f9d21154c | 5648 | |
wolfSSL | 0:d92f9d21154c | 5649 | case TICKET_SENT: |
wolfSSL | 0:d92f9d21154c | 5650 | if ( (ssl->error = SendChangeCipher(ssl)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5651 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5652 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5653 | } |
wolfSSL | 0:d92f9d21154c | 5654 | ssl->options.acceptState = CHANGE_CIPHER_SENT; |
wolfSSL | 0:d92f9d21154c | 5655 | WOLFSSL_MSG("accept state CHANGE_CIPHER_SENT"); |
wolfSSL | 0:d92f9d21154c | 5656 | |
wolfSSL | 0:d92f9d21154c | 5657 | case CHANGE_CIPHER_SENT : |
wolfSSL | 0:d92f9d21154c | 5658 | if ( (ssl->error = SendFinished(ssl)) != 0) { |
wolfSSL | 0:d92f9d21154c | 5659 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5660 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5661 | } |
wolfSSL | 0:d92f9d21154c | 5662 | |
wolfSSL | 0:d92f9d21154c | 5663 | ssl->options.acceptState = ACCEPT_FINISHED_DONE; |
wolfSSL | 0:d92f9d21154c | 5664 | WOLFSSL_MSG("accept state ACCEPT_FINISHED_DONE"); |
wolfSSL | 0:d92f9d21154c | 5665 | |
wolfSSL | 0:d92f9d21154c | 5666 | case ACCEPT_FINISHED_DONE : |
wolfSSL | 0:d92f9d21154c | 5667 | if (ssl->options.resuming) |
wolfSSL | 0:d92f9d21154c | 5668 | while (ssl->options.clientState < CLIENT_FINISHED_COMPLETE) |
wolfSSL | 0:d92f9d21154c | 5669 | if ( (ssl->error = ProcessReply(ssl)) < 0) { |
wolfSSL | 0:d92f9d21154c | 5670 | WOLFSSL_ERROR(ssl->error); |
wolfSSL | 0:d92f9d21154c | 5671 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5672 | } |
wolfSSL | 0:d92f9d21154c | 5673 | |
wolfSSL | 0:d92f9d21154c | 5674 | ssl->options.acceptState = ACCEPT_THIRD_REPLY_DONE; |
wolfSSL | 0:d92f9d21154c | 5675 | WOLFSSL_MSG("accept state ACCEPT_THIRD_REPLY_DONE"); |
wolfSSL | 0:d92f9d21154c | 5676 | |
wolfSSL | 0:d92f9d21154c | 5677 | case ACCEPT_THIRD_REPLY_DONE : |
wolfSSL | 0:d92f9d21154c | 5678 | #ifndef NO_HANDSHAKE_DONE_CB |
wolfSSL | 0:d92f9d21154c | 5679 | if (ssl->hsDoneCb) { |
wolfSSL | 0:d92f9d21154c | 5680 | int cbret = ssl->hsDoneCb(ssl, ssl->hsDoneCtx); |
wolfSSL | 0:d92f9d21154c | 5681 | if (cbret < 0) { |
wolfSSL | 0:d92f9d21154c | 5682 | ssl->error = cbret; |
wolfSSL | 0:d92f9d21154c | 5683 | WOLFSSL_MSG("HandShake Done Cb don't continue error"); |
wolfSSL | 0:d92f9d21154c | 5684 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5685 | } |
wolfSSL | 0:d92f9d21154c | 5686 | } |
wolfSSL | 0:d92f9d21154c | 5687 | #endif /* NO_HANDSHAKE_DONE_CB */ |
wolfSSL | 0:d92f9d21154c | 5688 | FreeHandshakeResources(ssl); |
wolfSSL | 0:d92f9d21154c | 5689 | WOLFSSL_LEAVE("SSL_accept()", SSL_SUCCESS); |
wolfSSL | 0:d92f9d21154c | 5690 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 5691 | |
wolfSSL | 0:d92f9d21154c | 5692 | default : |
wolfSSL | 0:d92f9d21154c | 5693 | WOLFSSL_MSG("Unknown accept state ERROR"); |
wolfSSL | 0:d92f9d21154c | 5694 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 5695 | } |
wolfSSL | 0:d92f9d21154c | 5696 | } |
wolfSSL | 0:d92f9d21154c | 5697 | |
wolfSSL | 0:d92f9d21154c | 5698 | #endif /* NO_WOLFSSL_SERVER */ |
wolfSSL | 0:d92f9d21154c | 5699 | |
wolfSSL | 0:d92f9d21154c | 5700 | |
wolfSSL | 0:d92f9d21154c | 5701 | #ifndef NO_HANDSHAKE_DONE_CB |
wolfSSL | 0:d92f9d21154c | 5702 | |
wolfSSL | 0:d92f9d21154c | 5703 | int wolfSSL_SetHsDoneCb(WOLFSSL* ssl, HandShakeDoneCb cb, void* user_ctx) |
wolfSSL | 0:d92f9d21154c | 5704 | { |
wolfSSL | 0:d92f9d21154c | 5705 | WOLFSSL_ENTER("wolfSSL_SetHsDoneCb"); |
wolfSSL | 0:d92f9d21154c | 5706 | |
wolfSSL | 0:d92f9d21154c | 5707 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 5708 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 5709 | |
wolfSSL | 0:d92f9d21154c | 5710 | ssl->hsDoneCb = cb; |
wolfSSL | 0:d92f9d21154c | 5711 | ssl->hsDoneCtx = user_ctx; |
wolfSSL | 0:d92f9d21154c | 5712 | |
wolfSSL | 0:d92f9d21154c | 5713 | |
wolfSSL | 0:d92f9d21154c | 5714 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 5715 | } |
wolfSSL | 0:d92f9d21154c | 5716 | |
wolfSSL | 0:d92f9d21154c | 5717 | #endif /* NO_HANDSHAKE_DONE_CB */ |
wolfSSL | 0:d92f9d21154c | 5718 | |
wolfSSL | 0:d92f9d21154c | 5719 | |
wolfSSL | 0:d92f9d21154c | 5720 | int wolfSSL_Cleanup(void) |
wolfSSL | 0:d92f9d21154c | 5721 | { |
wolfSSL | 0:d92f9d21154c | 5722 | int ret = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 5723 | int release = 0; |
wolfSSL | 0:d92f9d21154c | 5724 | |
wolfSSL | 0:d92f9d21154c | 5725 | WOLFSSL_ENTER("wolfSSL_Cleanup"); |
wolfSSL | 0:d92f9d21154c | 5726 | |
wolfSSL | 0:d92f9d21154c | 5727 | if (initRefCount == 0) |
wolfSSL | 0:d92f9d21154c | 5728 | return ret; /* possibly no init yet, but not failure either way */ |
wolfSSL | 0:d92f9d21154c | 5729 | |
wolfSSL | 0:d92f9d21154c | 5730 | if (LockMutex(&count_mutex) != 0) { |
wolfSSL | 0:d92f9d21154c | 5731 | WOLFSSL_MSG("Bad Lock Mutex count"); |
wolfSSL | 0:d92f9d21154c | 5732 | return BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 5733 | } |
wolfSSL | 0:d92f9d21154c | 5734 | |
wolfSSL | 0:d92f9d21154c | 5735 | release = initRefCount-- == 1; |
wolfSSL | 0:d92f9d21154c | 5736 | if (initRefCount < 0) |
wolfSSL | 0:d92f9d21154c | 5737 | initRefCount = 0; |
wolfSSL | 0:d92f9d21154c | 5738 | |
wolfSSL | 0:d92f9d21154c | 5739 | UnLockMutex(&count_mutex); |
wolfSSL | 0:d92f9d21154c | 5740 | |
wolfSSL | 0:d92f9d21154c | 5741 | if (!release) |
wolfSSL | 0:d92f9d21154c | 5742 | return ret; |
wolfSSL | 0:d92f9d21154c | 5743 | |
wolfSSL | 0:d92f9d21154c | 5744 | #ifndef NO_SESSION_CACHE |
wolfSSL | 0:d92f9d21154c | 5745 | if (FreeMutex(&session_mutex) != 0) |
wolfSSL | 0:d92f9d21154c | 5746 | ret = BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 5747 | #endif |
wolfSSL | 0:d92f9d21154c | 5748 | if (FreeMutex(&count_mutex) != 0) |
wolfSSL | 0:d92f9d21154c | 5749 | ret = BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 5750 | |
wolfSSL | 0:d92f9d21154c | 5751 | #if defined(HAVE_ECC) && defined(FP_ECC) |
wolfSSL | 0:d92f9d21154c | 5752 | wc_ecc_fp_free(); |
wolfSSL | 0:d92f9d21154c | 5753 | #endif |
wolfSSL | 0:d92f9d21154c | 5754 | |
wolfSSL | 0:d92f9d21154c | 5755 | return ret; |
wolfSSL | 0:d92f9d21154c | 5756 | } |
wolfSSL | 0:d92f9d21154c | 5757 | |
wolfSSL | 0:d92f9d21154c | 5758 | |
wolfSSL | 0:d92f9d21154c | 5759 | #ifndef NO_SESSION_CACHE |
wolfSSL | 0:d92f9d21154c | 5760 | |
wolfSSL | 0:d92f9d21154c | 5761 | |
wolfSSL | 0:d92f9d21154c | 5762 | /* some session IDs aren't random afterall, let's make them random */ |
wolfSSL | 0:d92f9d21154c | 5763 | static INLINE word32 HashSession(const byte* sessionID, word32 len, int* error) |
wolfSSL | 0:d92f9d21154c | 5764 | { |
wolfSSL | 0:d92f9d21154c | 5765 | byte digest[MAX_DIGEST_SIZE]; |
wolfSSL | 0:d92f9d21154c | 5766 | |
wolfSSL | 0:d92f9d21154c | 5767 | #ifndef NO_MD5 |
wolfSSL | 0:d92f9d21154c | 5768 | *error = wc_Md5Hash(sessionID, len, digest); |
wolfSSL | 0:d92f9d21154c | 5769 | #elif !defined(NO_SHA) |
wolfSSL | 0:d92f9d21154c | 5770 | *error = wc_ShaHash(sessionID, len, digest); |
wolfSSL | 0:d92f9d21154c | 5771 | #elif !defined(NO_SHA256) |
wolfSSL | 0:d92f9d21154c | 5772 | *error = wc_Sha256Hash(sessionID, len, digest); |
wolfSSL | 0:d92f9d21154c | 5773 | #else |
wolfSSL | 0:d92f9d21154c | 5774 | #error "We need a digest to hash the session IDs" |
wolfSSL | 0:d92f9d21154c | 5775 | #endif |
wolfSSL | 0:d92f9d21154c | 5776 | |
wolfSSL | 0:d92f9d21154c | 5777 | return *error == 0 ? MakeWordFromHash(digest) : 0; /* 0 on failure */ |
wolfSSL | 0:d92f9d21154c | 5778 | } |
wolfSSL | 0:d92f9d21154c | 5779 | |
wolfSSL | 0:d92f9d21154c | 5780 | |
wolfSSL | 0:d92f9d21154c | 5781 | void wolfSSL_flush_sessions(WOLFSSL_CTX* ctx, long tm) |
wolfSSL | 0:d92f9d21154c | 5782 | { |
wolfSSL | 0:d92f9d21154c | 5783 | /* static table now, no flusing needed */ |
wolfSSL | 0:d92f9d21154c | 5784 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 5785 | (void)tm; |
wolfSSL | 0:d92f9d21154c | 5786 | } |
wolfSSL | 0:d92f9d21154c | 5787 | |
wolfSSL | 0:d92f9d21154c | 5788 | |
wolfSSL | 0:d92f9d21154c | 5789 | /* set ssl session timeout in seconds */ |
wolfSSL | 0:d92f9d21154c | 5790 | int wolfSSL_set_timeout(WOLFSSL* ssl, unsigned int to) |
wolfSSL | 0:d92f9d21154c | 5791 | { |
wolfSSL | 0:d92f9d21154c | 5792 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 5793 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 5794 | |
wolfSSL | 0:d92f9d21154c | 5795 | ssl->timeout = to; |
wolfSSL | 0:d92f9d21154c | 5796 | |
wolfSSL | 0:d92f9d21154c | 5797 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 5798 | } |
wolfSSL | 0:d92f9d21154c | 5799 | |
wolfSSL | 0:d92f9d21154c | 5800 | |
wolfSSL | 0:d92f9d21154c | 5801 | /* set ctx session timeout in seconds */ |
wolfSSL | 0:d92f9d21154c | 5802 | int wolfSSL_CTX_set_timeout(WOLFSSL_CTX* ctx, unsigned int to) |
wolfSSL | 0:d92f9d21154c | 5803 | { |
wolfSSL | 0:d92f9d21154c | 5804 | if (ctx == NULL) |
wolfSSL | 0:d92f9d21154c | 5805 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 5806 | |
wolfSSL | 0:d92f9d21154c | 5807 | ctx->timeout = to; |
wolfSSL | 0:d92f9d21154c | 5808 | |
wolfSSL | 0:d92f9d21154c | 5809 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 5810 | } |
wolfSSL | 0:d92f9d21154c | 5811 | |
wolfSSL | 0:d92f9d21154c | 5812 | |
wolfSSL | 0:d92f9d21154c | 5813 | #ifndef NO_CLIENT_CACHE |
wolfSSL | 0:d92f9d21154c | 5814 | |
wolfSSL | 0:d92f9d21154c | 5815 | /* Get Session from Client cache based on id/len, return NULL on failure */ |
wolfSSL | 0:d92f9d21154c | 5816 | WOLFSSL_SESSION* GetSessionClient(WOLFSSL* ssl, const byte* id, int len) |
wolfSSL | 0:d92f9d21154c | 5817 | { |
wolfSSL | 0:d92f9d21154c | 5818 | WOLFSSL_SESSION* ret = NULL; |
wolfSSL | 0:d92f9d21154c | 5819 | word32 row; |
wolfSSL | 0:d92f9d21154c | 5820 | int idx; |
wolfSSL | 0:d92f9d21154c | 5821 | int count; |
wolfSSL | 0:d92f9d21154c | 5822 | int error = 0; |
wolfSSL | 0:d92f9d21154c | 5823 | |
wolfSSL | 0:d92f9d21154c | 5824 | WOLFSSL_ENTER("GetSessionClient"); |
wolfSSL | 0:d92f9d21154c | 5825 | |
wolfSSL | 0:d92f9d21154c | 5826 | if (ssl->options.side == WOLFSSL_SERVER_END) |
wolfSSL | 0:d92f9d21154c | 5827 | return NULL; |
wolfSSL | 0:d92f9d21154c | 5828 | |
wolfSSL | 0:d92f9d21154c | 5829 | len = min(SERVER_ID_LEN, (word32)len); |
wolfSSL | 0:d92f9d21154c | 5830 | row = HashSession(id, len, &error) % SESSION_ROWS; |
wolfSSL | 0:d92f9d21154c | 5831 | if (error != 0) { |
wolfSSL | 0:d92f9d21154c | 5832 | WOLFSSL_MSG("Hash session failed"); |
wolfSSL | 0:d92f9d21154c | 5833 | return NULL; |
wolfSSL | 0:d92f9d21154c | 5834 | } |
wolfSSL | 0:d92f9d21154c | 5835 | |
wolfSSL | 0:d92f9d21154c | 5836 | if (LockMutex(&session_mutex) != 0) { |
wolfSSL | 0:d92f9d21154c | 5837 | WOLFSSL_MSG("Lock session mutex failed"); |
wolfSSL | 0:d92f9d21154c | 5838 | return NULL; |
wolfSSL | 0:d92f9d21154c | 5839 | } |
wolfSSL | 0:d92f9d21154c | 5840 | |
wolfSSL | 0:d92f9d21154c | 5841 | /* start from most recently used */ |
wolfSSL | 0:d92f9d21154c | 5842 | count = min((word32)ClientCache[row].totalCount, SESSIONS_PER_ROW); |
wolfSSL | 0:d92f9d21154c | 5843 | idx = ClientCache[row].nextIdx - 1; |
wolfSSL | 0:d92f9d21154c | 5844 | if (idx < 0) |
wolfSSL | 0:d92f9d21154c | 5845 | idx = SESSIONS_PER_ROW - 1; /* if back to front, the previous was end */ |
wolfSSL | 0:d92f9d21154c | 5846 | |
wolfSSL | 0:d92f9d21154c | 5847 | for (; count > 0; --count, idx = idx ? idx - 1 : SESSIONS_PER_ROW - 1) { |
wolfSSL | 0:d92f9d21154c | 5848 | WOLFSSL_SESSION* current; |
wolfSSL | 0:d92f9d21154c | 5849 | ClientSession clSess; |
wolfSSL | 0:d92f9d21154c | 5850 | |
wolfSSL | 0:d92f9d21154c | 5851 | if (idx >= SESSIONS_PER_ROW || idx < 0) { /* sanity check */ |
wolfSSL | 0:d92f9d21154c | 5852 | WOLFSSL_MSG("Bad idx"); |
wolfSSL | 0:d92f9d21154c | 5853 | break; |
wolfSSL | 0:d92f9d21154c | 5854 | } |
wolfSSL | 0:d92f9d21154c | 5855 | |
wolfSSL | 0:d92f9d21154c | 5856 | clSess = ClientCache[row].Clients[idx]; |
wolfSSL | 0:d92f9d21154c | 5857 | |
wolfSSL | 0:d92f9d21154c | 5858 | current = &SessionCache[clSess.serverRow].Sessions[clSess.serverIdx]; |
wolfSSL | 0:d92f9d21154c | 5859 | if (XMEMCMP(current->serverID, id, len) == 0) { |
wolfSSL | 0:d92f9d21154c | 5860 | WOLFSSL_MSG("Found a serverid match for client"); |
wolfSSL | 0:d92f9d21154c | 5861 | if (LowResTimer() < (current->bornOn + current->timeout)) { |
wolfSSL | 0:d92f9d21154c | 5862 | WOLFSSL_MSG("Session valid"); |
wolfSSL | 0:d92f9d21154c | 5863 | ret = current; |
wolfSSL | 0:d92f9d21154c | 5864 | break; |
wolfSSL | 0:d92f9d21154c | 5865 | } else { |
wolfSSL | 0:d92f9d21154c | 5866 | WOLFSSL_MSG("Session timed out"); /* could have more for id */ |
wolfSSL | 0:d92f9d21154c | 5867 | } |
wolfSSL | 0:d92f9d21154c | 5868 | } else { |
wolfSSL | 0:d92f9d21154c | 5869 | WOLFSSL_MSG("ServerID not a match from client table"); |
wolfSSL | 0:d92f9d21154c | 5870 | } |
wolfSSL | 0:d92f9d21154c | 5871 | } |
wolfSSL | 0:d92f9d21154c | 5872 | |
wolfSSL | 0:d92f9d21154c | 5873 | UnLockMutex(&session_mutex); |
wolfSSL | 0:d92f9d21154c | 5874 | |
wolfSSL | 0:d92f9d21154c | 5875 | return ret; |
wolfSSL | 0:d92f9d21154c | 5876 | } |
wolfSSL | 0:d92f9d21154c | 5877 | |
wolfSSL | 0:d92f9d21154c | 5878 | #endif /* NO_CLIENT_CACHE */ |
wolfSSL | 0:d92f9d21154c | 5879 | |
wolfSSL | 0:d92f9d21154c | 5880 | |
wolfSSL | 0:d92f9d21154c | 5881 | WOLFSSL_SESSION* GetSession(WOLFSSL* ssl, byte* masterSecret) |
wolfSSL | 0:d92f9d21154c | 5882 | { |
wolfSSL | 0:d92f9d21154c | 5883 | WOLFSSL_SESSION* ret = 0; |
wolfSSL | 0:d92f9d21154c | 5884 | const byte* id = NULL; |
wolfSSL | 0:d92f9d21154c | 5885 | word32 row; |
wolfSSL | 0:d92f9d21154c | 5886 | int idx; |
wolfSSL | 0:d92f9d21154c | 5887 | int count; |
wolfSSL | 0:d92f9d21154c | 5888 | int error = 0; |
wolfSSL | 0:d92f9d21154c | 5889 | |
wolfSSL | 0:d92f9d21154c | 5890 | if (ssl->options.sessionCacheOff) |
wolfSSL | 0:d92f9d21154c | 5891 | return NULL; |
wolfSSL | 0:d92f9d21154c | 5892 | |
wolfSSL | 0:d92f9d21154c | 5893 | if (ssl->options.haveSessionId == 0) |
wolfSSL | 0:d92f9d21154c | 5894 | return NULL; |
wolfSSL | 0:d92f9d21154c | 5895 | |
wolfSSL | 0:d92f9d21154c | 5896 | #ifdef HAVE_SESSION_TICKET |
wolfSSL | 0:d92f9d21154c | 5897 | if (ssl->options.side == WOLFSSL_SERVER_END && ssl->options.useTicket == 1) |
wolfSSL | 0:d92f9d21154c | 5898 | return NULL; |
wolfSSL | 0:d92f9d21154c | 5899 | #endif |
wolfSSL | 0:d92f9d21154c | 5900 | |
wolfSSL | 0:d92f9d21154c | 5901 | if (ssl->arrays) |
wolfSSL | 0:d92f9d21154c | 5902 | id = ssl->arrays->sessionID; |
wolfSSL | 0:d92f9d21154c | 5903 | else |
wolfSSL | 0:d92f9d21154c | 5904 | id = ssl->session.sessionID; |
wolfSSL | 0:d92f9d21154c | 5905 | |
wolfSSL | 0:d92f9d21154c | 5906 | row = HashSession(id, ID_LEN, &error) % SESSION_ROWS; |
wolfSSL | 0:d92f9d21154c | 5907 | if (error != 0) { |
wolfSSL | 0:d92f9d21154c | 5908 | WOLFSSL_MSG("Hash session failed"); |
wolfSSL | 0:d92f9d21154c | 5909 | return NULL; |
wolfSSL | 0:d92f9d21154c | 5910 | } |
wolfSSL | 0:d92f9d21154c | 5911 | |
wolfSSL | 0:d92f9d21154c | 5912 | if (LockMutex(&session_mutex) != 0) |
wolfSSL | 0:d92f9d21154c | 5913 | return 0; |
wolfSSL | 0:d92f9d21154c | 5914 | |
wolfSSL | 0:d92f9d21154c | 5915 | /* start from most recently used */ |
wolfSSL | 0:d92f9d21154c | 5916 | count = min((word32)SessionCache[row].totalCount, SESSIONS_PER_ROW); |
wolfSSL | 0:d92f9d21154c | 5917 | idx = SessionCache[row].nextIdx - 1; |
wolfSSL | 0:d92f9d21154c | 5918 | if (idx < 0) |
wolfSSL | 0:d92f9d21154c | 5919 | idx = SESSIONS_PER_ROW - 1; /* if back to front, the previous was end */ |
wolfSSL | 0:d92f9d21154c | 5920 | |
wolfSSL | 0:d92f9d21154c | 5921 | for (; count > 0; --count, idx = idx ? idx - 1 : SESSIONS_PER_ROW - 1) { |
wolfSSL | 0:d92f9d21154c | 5922 | WOLFSSL_SESSION* current; |
wolfSSL | 0:d92f9d21154c | 5923 | |
wolfSSL | 0:d92f9d21154c | 5924 | if (idx >= SESSIONS_PER_ROW || idx < 0) { /* sanity check */ |
wolfSSL | 0:d92f9d21154c | 5925 | WOLFSSL_MSG("Bad idx"); |
wolfSSL | 0:d92f9d21154c | 5926 | break; |
wolfSSL | 0:d92f9d21154c | 5927 | } |
wolfSSL | 0:d92f9d21154c | 5928 | |
wolfSSL | 0:d92f9d21154c | 5929 | current = &SessionCache[row].Sessions[idx]; |
wolfSSL | 0:d92f9d21154c | 5930 | if (XMEMCMP(current->sessionID, id, ID_LEN) == 0) { |
wolfSSL | 0:d92f9d21154c | 5931 | WOLFSSL_MSG("Found a session match"); |
wolfSSL | 0:d92f9d21154c | 5932 | if (LowResTimer() < (current->bornOn + current->timeout)) { |
wolfSSL | 0:d92f9d21154c | 5933 | WOLFSSL_MSG("Session valid"); |
wolfSSL | 0:d92f9d21154c | 5934 | ret = current; |
wolfSSL | 0:d92f9d21154c | 5935 | if (masterSecret) |
wolfSSL | 0:d92f9d21154c | 5936 | XMEMCPY(masterSecret, current->masterSecret, SECRET_LEN); |
wolfSSL | 0:d92f9d21154c | 5937 | } else { |
wolfSSL | 0:d92f9d21154c | 5938 | WOLFSSL_MSG("Session timed out"); |
wolfSSL | 0:d92f9d21154c | 5939 | } |
wolfSSL | 0:d92f9d21154c | 5940 | break; /* no more sessionIDs whether valid or not that match */ |
wolfSSL | 0:d92f9d21154c | 5941 | } else { |
wolfSSL | 0:d92f9d21154c | 5942 | WOLFSSL_MSG("SessionID not a match at this idx"); |
wolfSSL | 0:d92f9d21154c | 5943 | } |
wolfSSL | 0:d92f9d21154c | 5944 | } |
wolfSSL | 0:d92f9d21154c | 5945 | |
wolfSSL | 0:d92f9d21154c | 5946 | UnLockMutex(&session_mutex); |
wolfSSL | 0:d92f9d21154c | 5947 | |
wolfSSL | 0:d92f9d21154c | 5948 | return ret; |
wolfSSL | 0:d92f9d21154c | 5949 | } |
wolfSSL | 0:d92f9d21154c | 5950 | |
wolfSSL | 0:d92f9d21154c | 5951 | |
wolfSSL | 0:d92f9d21154c | 5952 | int SetSession(WOLFSSL* ssl, WOLFSSL_SESSION* session) |
wolfSSL | 0:d92f9d21154c | 5953 | { |
wolfSSL | 0:d92f9d21154c | 5954 | if (ssl->options.sessionCacheOff) |
wolfSSL | 0:d92f9d21154c | 5955 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 5956 | |
wolfSSL | 0:d92f9d21154c | 5957 | if (LowResTimer() < (session->bornOn + session->timeout)) { |
wolfSSL | 0:d92f9d21154c | 5958 | ssl->session = *session; |
wolfSSL | 0:d92f9d21154c | 5959 | ssl->options.resuming = 1; |
wolfSSL | 0:d92f9d21154c | 5960 | |
wolfSSL | 0:d92f9d21154c | 5961 | #ifdef SESSION_CERTS |
wolfSSL | 0:d92f9d21154c | 5962 | ssl->version = session->version; |
wolfSSL | 0:d92f9d21154c | 5963 | ssl->options.cipherSuite0 = session->cipherSuite0; |
wolfSSL | 0:d92f9d21154c | 5964 | ssl->options.cipherSuite = session->cipherSuite; |
wolfSSL | 0:d92f9d21154c | 5965 | #endif |
wolfSSL | 0:d92f9d21154c | 5966 | |
wolfSSL | 0:d92f9d21154c | 5967 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 5968 | } |
wolfSSL | 0:d92f9d21154c | 5969 | return SSL_FAILURE; /* session timed out */ |
wolfSSL | 0:d92f9d21154c | 5970 | } |
wolfSSL | 0:d92f9d21154c | 5971 | |
wolfSSL | 0:d92f9d21154c | 5972 | |
wolfSSL | 0:d92f9d21154c | 5973 | #ifdef WOLFSSL_SESSION_STATS |
wolfSSL | 0:d92f9d21154c | 5974 | static int get_locked_session_stats(word32* active, word32* total, |
wolfSSL | 0:d92f9d21154c | 5975 | word32* peak); |
wolfSSL | 0:d92f9d21154c | 5976 | #endif |
wolfSSL | 0:d92f9d21154c | 5977 | |
wolfSSL | 0:d92f9d21154c | 5978 | int AddSession(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 5979 | { |
wolfSSL | 0:d92f9d21154c | 5980 | word32 row, idx; |
wolfSSL | 0:d92f9d21154c | 5981 | int error = 0; |
wolfSSL | 0:d92f9d21154c | 5982 | |
wolfSSL | 0:d92f9d21154c | 5983 | if (ssl->options.sessionCacheOff) |
wolfSSL | 0:d92f9d21154c | 5984 | return 0; |
wolfSSL | 0:d92f9d21154c | 5985 | |
wolfSSL | 0:d92f9d21154c | 5986 | if (ssl->options.haveSessionId == 0) |
wolfSSL | 0:d92f9d21154c | 5987 | return 0; |
wolfSSL | 0:d92f9d21154c | 5988 | |
wolfSSL | 0:d92f9d21154c | 5989 | #ifdef HAVE_SESSION_TICKET |
wolfSSL | 0:d92f9d21154c | 5990 | if (ssl->options.side == WOLFSSL_SERVER_END && ssl->options.useTicket == 1) |
wolfSSL | 0:d92f9d21154c | 5991 | return 0; |
wolfSSL | 0:d92f9d21154c | 5992 | #endif |
wolfSSL | 0:d92f9d21154c | 5993 | |
wolfSSL | 0:d92f9d21154c | 5994 | row = HashSession(ssl->arrays->sessionID, ID_LEN, &error) % SESSION_ROWS; |
wolfSSL | 0:d92f9d21154c | 5995 | if (error != 0) { |
wolfSSL | 0:d92f9d21154c | 5996 | WOLFSSL_MSG("Hash session failed"); |
wolfSSL | 0:d92f9d21154c | 5997 | return error; |
wolfSSL | 0:d92f9d21154c | 5998 | } |
wolfSSL | 0:d92f9d21154c | 5999 | |
wolfSSL | 0:d92f9d21154c | 6000 | if (LockMutex(&session_mutex) != 0) |
wolfSSL | 0:d92f9d21154c | 6001 | return BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 6002 | |
wolfSSL | 0:d92f9d21154c | 6003 | idx = SessionCache[row].nextIdx++; |
wolfSSL | 0:d92f9d21154c | 6004 | #ifdef SESSION_INDEX |
wolfSSL | 0:d92f9d21154c | 6005 | ssl->sessionIndex = (row << SESSIDX_ROW_SHIFT) | idx; |
wolfSSL | 0:d92f9d21154c | 6006 | #endif |
wolfSSL | 0:d92f9d21154c | 6007 | |
wolfSSL | 0:d92f9d21154c | 6008 | XMEMCPY(SessionCache[row].Sessions[idx].masterSecret, |
wolfSSL | 0:d92f9d21154c | 6009 | ssl->arrays->masterSecret, SECRET_LEN); |
wolfSSL | 0:d92f9d21154c | 6010 | XMEMCPY(SessionCache[row].Sessions[idx].sessionID, ssl->arrays->sessionID, |
wolfSSL | 0:d92f9d21154c | 6011 | ID_LEN); |
wolfSSL | 0:d92f9d21154c | 6012 | SessionCache[row].Sessions[idx].sessionIDSz = ssl->arrays->sessionIDSz; |
wolfSSL | 0:d92f9d21154c | 6013 | |
wolfSSL | 0:d92f9d21154c | 6014 | SessionCache[row].Sessions[idx].timeout = ssl->timeout; |
wolfSSL | 0:d92f9d21154c | 6015 | SessionCache[row].Sessions[idx].bornOn = LowResTimer(); |
wolfSSL | 0:d92f9d21154c | 6016 | |
wolfSSL | 0:d92f9d21154c | 6017 | #ifdef HAVE_SESSION_TICKET |
wolfSSL | 0:d92f9d21154c | 6018 | SessionCache[row].Sessions[idx].ticketLen = ssl->session.ticketLen; |
wolfSSL | 0:d92f9d21154c | 6019 | XMEMCPY(SessionCache[row].Sessions[idx].ticket, |
wolfSSL | 0:d92f9d21154c | 6020 | ssl->session.ticket, ssl->session.ticketLen); |
wolfSSL | 0:d92f9d21154c | 6021 | #endif |
wolfSSL | 0:d92f9d21154c | 6022 | |
wolfSSL | 0:d92f9d21154c | 6023 | #ifdef SESSION_CERTS |
wolfSSL | 0:d92f9d21154c | 6024 | SessionCache[row].Sessions[idx].chain.count = ssl->session.chain.count; |
wolfSSL | 0:d92f9d21154c | 6025 | XMEMCPY(SessionCache[row].Sessions[idx].chain.certs, |
wolfSSL | 0:d92f9d21154c | 6026 | ssl->session.chain.certs, sizeof(x509_buffer) * MAX_CHAIN_DEPTH); |
wolfSSL | 0:d92f9d21154c | 6027 | |
wolfSSL | 0:d92f9d21154c | 6028 | SessionCache[row].Sessions[idx].version = ssl->version; |
wolfSSL | 0:d92f9d21154c | 6029 | SessionCache[row].Sessions[idx].cipherSuite0 = ssl->options.cipherSuite0; |
wolfSSL | 0:d92f9d21154c | 6030 | SessionCache[row].Sessions[idx].cipherSuite = ssl->options.cipherSuite; |
wolfSSL | 0:d92f9d21154c | 6031 | #endif /* SESSION_CERTS */ |
wolfSSL | 0:d92f9d21154c | 6032 | |
wolfSSL | 0:d92f9d21154c | 6033 | SessionCache[row].totalCount++; |
wolfSSL | 0:d92f9d21154c | 6034 | if (SessionCache[row].nextIdx == SESSIONS_PER_ROW) |
wolfSSL | 0:d92f9d21154c | 6035 | SessionCache[row].nextIdx = 0; |
wolfSSL | 0:d92f9d21154c | 6036 | |
wolfSSL | 0:d92f9d21154c | 6037 | #ifndef NO_CLIENT_CACHE |
wolfSSL | 0:d92f9d21154c | 6038 | if (ssl->options.side == WOLFSSL_CLIENT_END && ssl->session.idLen) { |
wolfSSL | 0:d92f9d21154c | 6039 | word32 clientRow, clientIdx; |
wolfSSL | 0:d92f9d21154c | 6040 | |
wolfSSL | 0:d92f9d21154c | 6041 | WOLFSSL_MSG("Adding client cache entry"); |
wolfSSL | 0:d92f9d21154c | 6042 | |
wolfSSL | 0:d92f9d21154c | 6043 | SessionCache[row].Sessions[idx].idLen = ssl->session.idLen; |
wolfSSL | 0:d92f9d21154c | 6044 | XMEMCPY(SessionCache[row].Sessions[idx].serverID, ssl->session.serverID, |
wolfSSL | 0:d92f9d21154c | 6045 | ssl->session.idLen); |
wolfSSL | 0:d92f9d21154c | 6046 | |
wolfSSL | 0:d92f9d21154c | 6047 | clientRow = HashSession(ssl->session.serverID, ssl->session.idLen, |
wolfSSL | 0:d92f9d21154c | 6048 | &error) % SESSION_ROWS; |
wolfSSL | 0:d92f9d21154c | 6049 | if (error != 0) { |
wolfSSL | 0:d92f9d21154c | 6050 | WOLFSSL_MSG("Hash session failed"); |
wolfSSL | 0:d92f9d21154c | 6051 | } else { |
wolfSSL | 0:d92f9d21154c | 6052 | clientIdx = ClientCache[clientRow].nextIdx++; |
wolfSSL | 0:d92f9d21154c | 6053 | |
wolfSSL | 0:d92f9d21154c | 6054 | ClientCache[clientRow].Clients[clientIdx].serverRow = (word16)row; |
wolfSSL | 0:d92f9d21154c | 6055 | ClientCache[clientRow].Clients[clientIdx].serverIdx = (word16)idx; |
wolfSSL | 0:d92f9d21154c | 6056 | |
wolfSSL | 0:d92f9d21154c | 6057 | ClientCache[clientRow].totalCount++; |
wolfSSL | 0:d92f9d21154c | 6058 | if (ClientCache[clientRow].nextIdx == SESSIONS_PER_ROW) |
wolfSSL | 0:d92f9d21154c | 6059 | ClientCache[clientRow].nextIdx = 0; |
wolfSSL | 0:d92f9d21154c | 6060 | } |
wolfSSL | 0:d92f9d21154c | 6061 | } |
wolfSSL | 0:d92f9d21154c | 6062 | else |
wolfSSL | 0:d92f9d21154c | 6063 | SessionCache[row].Sessions[idx].idLen = 0; |
wolfSSL | 0:d92f9d21154c | 6064 | #endif /* NO_CLIENT_CACHE */ |
wolfSSL | 0:d92f9d21154c | 6065 | |
wolfSSL | 0:d92f9d21154c | 6066 | #if defined(WOLFSSL_SESSION_STATS) && defined(WOLFSSL_PEAK_SESSIONS) |
wolfSSL | 0:d92f9d21154c | 6067 | if (error == 0) { |
wolfSSL | 0:d92f9d21154c | 6068 | word32 active = 0; |
wolfSSL | 0:d92f9d21154c | 6069 | |
wolfSSL | 0:d92f9d21154c | 6070 | error = get_locked_session_stats(&active, NULL, NULL); |
wolfSSL | 0:d92f9d21154c | 6071 | if (error == SSL_SUCCESS) { |
wolfSSL | 0:d92f9d21154c | 6072 | error = 0; /* back to this function ok */ |
wolfSSL | 0:d92f9d21154c | 6073 | |
wolfSSL | 0:d92f9d21154c | 6074 | if (active > PeakSessions) |
wolfSSL | 0:d92f9d21154c | 6075 | PeakSessions = active; |
wolfSSL | 0:d92f9d21154c | 6076 | } |
wolfSSL | 0:d92f9d21154c | 6077 | } |
wolfSSL | 0:d92f9d21154c | 6078 | #endif /* defined(WOLFSSL_SESSION_STATS) && defined(WOLFSSL_PEAK_SESSIONS) */ |
wolfSSL | 0:d92f9d21154c | 6079 | |
wolfSSL | 0:d92f9d21154c | 6080 | if (UnLockMutex(&session_mutex) != 0) |
wolfSSL | 0:d92f9d21154c | 6081 | return BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 6082 | |
wolfSSL | 0:d92f9d21154c | 6083 | return error; |
wolfSSL | 0:d92f9d21154c | 6084 | } |
wolfSSL | 0:d92f9d21154c | 6085 | |
wolfSSL | 0:d92f9d21154c | 6086 | |
wolfSSL | 0:d92f9d21154c | 6087 | #ifdef SESSION_INDEX |
wolfSSL | 0:d92f9d21154c | 6088 | |
wolfSSL | 0:d92f9d21154c | 6089 | int wolfSSL_GetSessionIndex(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 6090 | { |
wolfSSL | 0:d92f9d21154c | 6091 | WOLFSSL_ENTER("wolfSSL_GetSessionIndex"); |
wolfSSL | 0:d92f9d21154c | 6092 | WOLFSSL_LEAVE("wolfSSL_GetSessionIndex", ssl->sessionIndex); |
wolfSSL | 0:d92f9d21154c | 6093 | return ssl->sessionIndex; |
wolfSSL | 0:d92f9d21154c | 6094 | } |
wolfSSL | 0:d92f9d21154c | 6095 | |
wolfSSL | 0:d92f9d21154c | 6096 | |
wolfSSL | 0:d92f9d21154c | 6097 | int wolfSSL_GetSessionAtIndex(int idx, WOLFSSL_SESSION* session) |
wolfSSL | 0:d92f9d21154c | 6098 | { |
wolfSSL | 0:d92f9d21154c | 6099 | int row, col, result = SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 6100 | |
wolfSSL | 0:d92f9d21154c | 6101 | WOLFSSL_ENTER("wolfSSL_GetSessionAtIndex"); |
wolfSSL | 0:d92f9d21154c | 6102 | |
wolfSSL | 0:d92f9d21154c | 6103 | row = idx >> SESSIDX_ROW_SHIFT; |
wolfSSL | 0:d92f9d21154c | 6104 | col = idx & SESSIDX_IDX_MASK; |
wolfSSL | 0:d92f9d21154c | 6105 | |
wolfSSL | 0:d92f9d21154c | 6106 | if (LockMutex(&session_mutex) != 0) { |
wolfSSL | 0:d92f9d21154c | 6107 | return BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 6108 | } |
wolfSSL | 0:d92f9d21154c | 6109 | |
wolfSSL | 0:d92f9d21154c | 6110 | if (row < SESSION_ROWS && |
wolfSSL | 0:d92f9d21154c | 6111 | col < (int)min(SessionCache[row].totalCount, SESSIONS_PER_ROW)) { |
wolfSSL | 0:d92f9d21154c | 6112 | XMEMCPY(session, |
wolfSSL | 0:d92f9d21154c | 6113 | &SessionCache[row].Sessions[col], sizeof(WOLFSSL_SESSION)); |
wolfSSL | 0:d92f9d21154c | 6114 | result = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 6115 | } |
wolfSSL | 0:d92f9d21154c | 6116 | |
wolfSSL | 0:d92f9d21154c | 6117 | if (UnLockMutex(&session_mutex) != 0) |
wolfSSL | 0:d92f9d21154c | 6118 | result = BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 6119 | |
wolfSSL | 0:d92f9d21154c | 6120 | WOLFSSL_LEAVE("wolfSSL_GetSessionAtIndex", result); |
wolfSSL | 0:d92f9d21154c | 6121 | return result; |
wolfSSL | 0:d92f9d21154c | 6122 | } |
wolfSSL | 0:d92f9d21154c | 6123 | |
wolfSSL | 0:d92f9d21154c | 6124 | #endif /* SESSION_INDEX */ |
wolfSSL | 0:d92f9d21154c | 6125 | |
wolfSSL | 0:d92f9d21154c | 6126 | #if defined(SESSION_INDEX) && defined(SESSION_CERTS) |
wolfSSL | 0:d92f9d21154c | 6127 | |
wolfSSL | 0:d92f9d21154c | 6128 | WOLFSSL_X509_CHAIN* wolfSSL_SESSION_get_peer_chain(WOLFSSL_SESSION* session) |
wolfSSL | 0:d92f9d21154c | 6129 | { |
wolfSSL | 0:d92f9d21154c | 6130 | WOLFSSL_X509_CHAIN* chain = NULL; |
wolfSSL | 0:d92f9d21154c | 6131 | |
wolfSSL | 0:d92f9d21154c | 6132 | WOLFSSL_ENTER("wolfSSL_SESSION_get_peer_chain"); |
wolfSSL | 0:d92f9d21154c | 6133 | if (session) |
wolfSSL | 0:d92f9d21154c | 6134 | chain = &session->chain; |
wolfSSL | 0:d92f9d21154c | 6135 | |
wolfSSL | 0:d92f9d21154c | 6136 | WOLFSSL_LEAVE("wolfSSL_SESSION_get_peer_chain", chain ? 1 : 0); |
wolfSSL | 0:d92f9d21154c | 6137 | return chain; |
wolfSSL | 0:d92f9d21154c | 6138 | } |
wolfSSL | 0:d92f9d21154c | 6139 | |
wolfSSL | 0:d92f9d21154c | 6140 | #endif /* SESSION_INDEX && SESSION_CERTS */ |
wolfSSL | 0:d92f9d21154c | 6141 | |
wolfSSL | 0:d92f9d21154c | 6142 | |
wolfSSL | 0:d92f9d21154c | 6143 | #ifdef WOLFSSL_SESSION_STATS |
wolfSSL | 0:d92f9d21154c | 6144 | |
wolfSSL | 0:d92f9d21154c | 6145 | /* requires session_mutex lock held, SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 6146 | static int get_locked_session_stats(word32* active, word32* total, word32* peak) |
wolfSSL | 0:d92f9d21154c | 6147 | { |
wolfSSL | 0:d92f9d21154c | 6148 | int result = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 6149 | int i; |
wolfSSL | 0:d92f9d21154c | 6150 | int count; |
wolfSSL | 0:d92f9d21154c | 6151 | int idx; |
wolfSSL | 0:d92f9d21154c | 6152 | word32 now = 0; |
wolfSSL | 0:d92f9d21154c | 6153 | word32 seen = 0; |
wolfSSL | 0:d92f9d21154c | 6154 | word32 ticks = LowResTimer(); |
wolfSSL | 0:d92f9d21154c | 6155 | |
wolfSSL | 0:d92f9d21154c | 6156 | (void)peak; |
wolfSSL | 0:d92f9d21154c | 6157 | |
wolfSSL | 0:d92f9d21154c | 6158 | WOLFSSL_ENTER("get_locked_session_stats"); |
wolfSSL | 0:d92f9d21154c | 6159 | |
wolfSSL | 0:d92f9d21154c | 6160 | for (i = 0; i < SESSION_ROWS; i++) { |
wolfSSL | 0:d92f9d21154c | 6161 | seen += SessionCache[i].totalCount; |
wolfSSL | 0:d92f9d21154c | 6162 | |
wolfSSL | 0:d92f9d21154c | 6163 | if (active == NULL) |
wolfSSL | 0:d92f9d21154c | 6164 | continue; /* no need to calculate what we can't set */ |
wolfSSL | 0:d92f9d21154c | 6165 | |
wolfSSL | 0:d92f9d21154c | 6166 | count = min((word32)SessionCache[i].totalCount, SESSIONS_PER_ROW); |
wolfSSL | 0:d92f9d21154c | 6167 | idx = SessionCache[i].nextIdx - 1; |
wolfSSL | 0:d92f9d21154c | 6168 | if (idx < 0) |
wolfSSL | 0:d92f9d21154c | 6169 | idx = SESSIONS_PER_ROW - 1; /* if back to front previous was end */ |
wolfSSL | 0:d92f9d21154c | 6170 | |
wolfSSL | 0:d92f9d21154c | 6171 | for (; count > 0; --count, idx = idx ? idx - 1 : SESSIONS_PER_ROW - 1) { |
wolfSSL | 0:d92f9d21154c | 6172 | if (idx >= SESSIONS_PER_ROW || idx < 0) { /* sanity check */ |
wolfSSL | 0:d92f9d21154c | 6173 | WOLFSSL_MSG("Bad idx"); |
wolfSSL | 0:d92f9d21154c | 6174 | break; |
wolfSSL | 0:d92f9d21154c | 6175 | } |
wolfSSL | 0:d92f9d21154c | 6176 | |
wolfSSL | 0:d92f9d21154c | 6177 | /* if not expried then good */ |
wolfSSL | 0:d92f9d21154c | 6178 | if (ticks < (SessionCache[i].Sessions[idx].bornOn + |
wolfSSL | 0:d92f9d21154c | 6179 | SessionCache[i].Sessions[idx].timeout) ) { |
wolfSSL | 0:d92f9d21154c | 6180 | now++; |
wolfSSL | 0:d92f9d21154c | 6181 | } |
wolfSSL | 0:d92f9d21154c | 6182 | } |
wolfSSL | 0:d92f9d21154c | 6183 | } |
wolfSSL | 0:d92f9d21154c | 6184 | |
wolfSSL | 0:d92f9d21154c | 6185 | if (active) |
wolfSSL | 0:d92f9d21154c | 6186 | *active = now; |
wolfSSL | 0:d92f9d21154c | 6187 | |
wolfSSL | 0:d92f9d21154c | 6188 | if (total) |
wolfSSL | 0:d92f9d21154c | 6189 | *total = seen; |
wolfSSL | 0:d92f9d21154c | 6190 | |
wolfSSL | 0:d92f9d21154c | 6191 | #ifdef WOLFSSL_PEAK_SESSIONS |
wolfSSL | 0:d92f9d21154c | 6192 | if (peak) |
wolfSSL | 0:d92f9d21154c | 6193 | *peak = PeakSessions; |
wolfSSL | 0:d92f9d21154c | 6194 | #endif |
wolfSSL | 0:d92f9d21154c | 6195 | |
wolfSSL | 0:d92f9d21154c | 6196 | WOLFSSL_LEAVE("get_locked_session_stats", result); |
wolfSSL | 0:d92f9d21154c | 6197 | |
wolfSSL | 0:d92f9d21154c | 6198 | return result; |
wolfSSL | 0:d92f9d21154c | 6199 | } |
wolfSSL | 0:d92f9d21154c | 6200 | |
wolfSSL | 0:d92f9d21154c | 6201 | |
wolfSSL | 0:d92f9d21154c | 6202 | /* return SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 6203 | int wolfSSL_get_session_stats(word32* active, word32* total, word32* peak, |
wolfSSL | 0:d92f9d21154c | 6204 | word32* maxSessions) |
wolfSSL | 0:d92f9d21154c | 6205 | { |
wolfSSL | 0:d92f9d21154c | 6206 | int result = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 6207 | |
wolfSSL | 0:d92f9d21154c | 6208 | WOLFSSL_ENTER("wolfSSL_get_session_stats"); |
wolfSSL | 0:d92f9d21154c | 6209 | |
wolfSSL | 0:d92f9d21154c | 6210 | if (maxSessions) { |
wolfSSL | 0:d92f9d21154c | 6211 | *maxSessions = SESSIONS_PER_ROW * SESSION_ROWS; |
wolfSSL | 0:d92f9d21154c | 6212 | |
wolfSSL | 0:d92f9d21154c | 6213 | if (active == NULL && total == NULL && peak == NULL) |
wolfSSL | 0:d92f9d21154c | 6214 | return result; /* we're done */ |
wolfSSL | 0:d92f9d21154c | 6215 | } |
wolfSSL | 0:d92f9d21154c | 6216 | |
wolfSSL | 0:d92f9d21154c | 6217 | /* user must provide at least one query value */ |
wolfSSL | 0:d92f9d21154c | 6218 | if (active == NULL && total == NULL && peak == NULL) |
wolfSSL | 0:d92f9d21154c | 6219 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 6220 | |
wolfSSL | 0:d92f9d21154c | 6221 | if (LockMutex(&session_mutex) != 0) { |
wolfSSL | 0:d92f9d21154c | 6222 | return BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 6223 | } |
wolfSSL | 0:d92f9d21154c | 6224 | |
wolfSSL | 0:d92f9d21154c | 6225 | result = get_locked_session_stats(active, total, peak); |
wolfSSL | 0:d92f9d21154c | 6226 | |
wolfSSL | 0:d92f9d21154c | 6227 | if (UnLockMutex(&session_mutex) != 0) |
wolfSSL | 0:d92f9d21154c | 6228 | result = BAD_MUTEX_E; |
wolfSSL | 0:d92f9d21154c | 6229 | |
wolfSSL | 0:d92f9d21154c | 6230 | WOLFSSL_LEAVE("wolfSSL_get_session_stats", result); |
wolfSSL | 0:d92f9d21154c | 6231 | |
wolfSSL | 0:d92f9d21154c | 6232 | return result; |
wolfSSL | 0:d92f9d21154c | 6233 | } |
wolfSSL | 0:d92f9d21154c | 6234 | |
wolfSSL | 0:d92f9d21154c | 6235 | #endif /* WOLFSSL_SESSION_STATS */ |
wolfSSL | 0:d92f9d21154c | 6236 | |
wolfSSL | 0:d92f9d21154c | 6237 | |
wolfSSL | 0:d92f9d21154c | 6238 | #ifdef PRINT_SESSION_STATS |
wolfSSL | 0:d92f9d21154c | 6239 | |
wolfSSL | 0:d92f9d21154c | 6240 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 6241 | int wolfSSL_PrintSessionStats(void) |
wolfSSL | 0:d92f9d21154c | 6242 | { |
wolfSSL | 0:d92f9d21154c | 6243 | word32 totalSessionsSeen = 0; |
wolfSSL | 0:d92f9d21154c | 6244 | word32 totalSessionsNow = 0; |
wolfSSL | 0:d92f9d21154c | 6245 | word32 peak = 0; |
wolfSSL | 0:d92f9d21154c | 6246 | word32 maxSessions = 0; |
wolfSSL | 0:d92f9d21154c | 6247 | int i; |
wolfSSL | 0:d92f9d21154c | 6248 | int ret; |
wolfSSL | 0:d92f9d21154c | 6249 | double E; /* expected freq */ |
wolfSSL | 0:d92f9d21154c | 6250 | double chiSquare = 0; |
wolfSSL | 0:d92f9d21154c | 6251 | |
wolfSSL | 0:d92f9d21154c | 6252 | ret = wolfSSL_get_session_stats(&totalSessionsNow, &totalSessionsSeen, |
wolfSSL | 0:d92f9d21154c | 6253 | &peak, &maxSessions); |
wolfSSL | 0:d92f9d21154c | 6254 | if (ret != SSL_SUCCESS) |
wolfSSL | 0:d92f9d21154c | 6255 | return ret; |
wolfSSL | 0:d92f9d21154c | 6256 | printf("Total Sessions Seen = %d\n", totalSessionsSeen); |
wolfSSL | 0:d92f9d21154c | 6257 | printf("Total Sessions Now = %d\n", totalSessionsNow); |
wolfSSL | 0:d92f9d21154c | 6258 | #ifdef WOLFSSL_PEAK_SESSIONS |
wolfSSL | 0:d92f9d21154c | 6259 | printf("Peak Sessions = %d\n", peak); |
wolfSSL | 0:d92f9d21154c | 6260 | #endif |
wolfSSL | 0:d92f9d21154c | 6261 | printf("Max Sessions = %d\n", maxSessions); |
wolfSSL | 0:d92f9d21154c | 6262 | |
wolfSSL | 0:d92f9d21154c | 6263 | E = (double)totalSessionsSeen / SESSION_ROWS; |
wolfSSL | 0:d92f9d21154c | 6264 | |
wolfSSL | 0:d92f9d21154c | 6265 | for (i = 0; i < SESSION_ROWS; i++) { |
wolfSSL | 0:d92f9d21154c | 6266 | double diff = SessionCache[i].totalCount - E; |
wolfSSL | 0:d92f9d21154c | 6267 | diff *= diff; /* square */ |
wolfSSL | 0:d92f9d21154c | 6268 | diff /= E; /* normalize */ |
wolfSSL | 0:d92f9d21154c | 6269 | |
wolfSSL | 0:d92f9d21154c | 6270 | chiSquare += diff; |
wolfSSL | 0:d92f9d21154c | 6271 | } |
wolfSSL | 0:d92f9d21154c | 6272 | printf(" chi-square = %5.1f, d.f. = %d\n", chiSquare, |
wolfSSL | 0:d92f9d21154c | 6273 | SESSION_ROWS - 1); |
wolfSSL | 0:d92f9d21154c | 6274 | #if (SESSION_ROWS == 11) |
wolfSSL | 0:d92f9d21154c | 6275 | printf(" .05 p value = 18.3, chi-square should be less\n"); |
wolfSSL | 0:d92f9d21154c | 6276 | #elif (SESSION_ROWS == 211) |
wolfSSL | 0:d92f9d21154c | 6277 | printf(".05 p value = 244.8, chi-square should be less\n"); |
wolfSSL | 0:d92f9d21154c | 6278 | #elif (SESSION_ROWS == 5981) |
wolfSSL | 0:d92f9d21154c | 6279 | printf(".05 p value = 6161.0, chi-square should be less\n"); |
wolfSSL | 0:d92f9d21154c | 6280 | #elif (SESSION_ROWS == 3) |
wolfSSL | 0:d92f9d21154c | 6281 | printf(".05 p value = 6.0, chi-square should be less\n"); |
wolfSSL | 0:d92f9d21154c | 6282 | #elif (SESSION_ROWS == 2861) |
wolfSSL | 0:d92f9d21154c | 6283 | printf(".05 p value = 2985.5, chi-square should be less\n"); |
wolfSSL | 0:d92f9d21154c | 6284 | #endif |
wolfSSL | 0:d92f9d21154c | 6285 | printf("\n"); |
wolfSSL | 0:d92f9d21154c | 6286 | |
wolfSSL | 0:d92f9d21154c | 6287 | return ret; |
wolfSSL | 0:d92f9d21154c | 6288 | } |
wolfSSL | 0:d92f9d21154c | 6289 | |
wolfSSL | 0:d92f9d21154c | 6290 | #endif /* SESSION_STATS */ |
wolfSSL | 0:d92f9d21154c | 6291 | |
wolfSSL | 0:d92f9d21154c | 6292 | #else /* NO_SESSION_CACHE */ |
wolfSSL | 0:d92f9d21154c | 6293 | |
wolfSSL | 0:d92f9d21154c | 6294 | /* No session cache version */ |
wolfSSL | 0:d92f9d21154c | 6295 | WOLFSSL_SESSION* GetSession(WOLFSSL* ssl, byte* masterSecret) |
wolfSSL | 0:d92f9d21154c | 6296 | { |
wolfSSL | 0:d92f9d21154c | 6297 | (void)ssl; |
wolfSSL | 0:d92f9d21154c | 6298 | (void)masterSecret; |
wolfSSL | 0:d92f9d21154c | 6299 | |
wolfSSL | 0:d92f9d21154c | 6300 | return NULL; |
wolfSSL | 0:d92f9d21154c | 6301 | } |
wolfSSL | 0:d92f9d21154c | 6302 | |
wolfSSL | 0:d92f9d21154c | 6303 | #endif /* NO_SESSION_CACHE */ |
wolfSSL | 0:d92f9d21154c | 6304 | |
wolfSSL | 0:d92f9d21154c | 6305 | |
wolfSSL | 0:d92f9d21154c | 6306 | /* call before SSL_connect, if verifying will add name check to |
wolfSSL | 0:d92f9d21154c | 6307 | date check and signature check */ |
wolfSSL | 0:d92f9d21154c | 6308 | int wolfSSL_check_domain_name(WOLFSSL* ssl, const char* dn) |
wolfSSL | 0:d92f9d21154c | 6309 | { |
wolfSSL | 0:d92f9d21154c | 6310 | WOLFSSL_ENTER("wolfSSL_check_domain_name"); |
wolfSSL | 0:d92f9d21154c | 6311 | if (ssl->buffers.domainName.buffer) |
wolfSSL | 0:d92f9d21154c | 6312 | XFREE(ssl->buffers.domainName.buffer, ssl->heap, DYNAMIC_TYPE_DOMAIN); |
wolfSSL | 0:d92f9d21154c | 6313 | |
wolfSSL | 0:d92f9d21154c | 6314 | ssl->buffers.domainName.length = (word32)XSTRLEN(dn) + 1; |
wolfSSL | 0:d92f9d21154c | 6315 | ssl->buffers.domainName.buffer = (byte*) XMALLOC( |
wolfSSL | 0:d92f9d21154c | 6316 | ssl->buffers.domainName.length, ssl->heap, DYNAMIC_TYPE_DOMAIN); |
wolfSSL | 0:d92f9d21154c | 6317 | |
wolfSSL | 0:d92f9d21154c | 6318 | if (ssl->buffers.domainName.buffer) { |
wolfSSL | 0:d92f9d21154c | 6319 | XSTRNCPY((char*)ssl->buffers.domainName.buffer, dn, |
wolfSSL | 0:d92f9d21154c | 6320 | ssl->buffers.domainName.length); |
wolfSSL | 0:d92f9d21154c | 6321 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 6322 | } |
wolfSSL | 0:d92f9d21154c | 6323 | else { |
wolfSSL | 0:d92f9d21154c | 6324 | ssl->error = MEMORY_ERROR; |
wolfSSL | 0:d92f9d21154c | 6325 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 6326 | } |
wolfSSL | 0:d92f9d21154c | 6327 | } |
wolfSSL | 0:d92f9d21154c | 6328 | |
wolfSSL | 0:d92f9d21154c | 6329 | |
wolfSSL | 0:d92f9d21154c | 6330 | /* turn on wolfSSL zlib compression |
wolfSSL | 0:d92f9d21154c | 6331 | returns SSL_SUCCESS for success, else error (not built in) |
wolfSSL | 0:d92f9d21154c | 6332 | */ |
wolfSSL | 0:d92f9d21154c | 6333 | int wolfSSL_set_compression(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 6334 | { |
wolfSSL | 0:d92f9d21154c | 6335 | WOLFSSL_ENTER("wolfSSL_set_compression"); |
wolfSSL | 0:d92f9d21154c | 6336 | (void)ssl; |
wolfSSL | 0:d92f9d21154c | 6337 | #ifdef HAVE_LIBZ |
wolfSSL | 0:d92f9d21154c | 6338 | ssl->options.usingCompression = 1; |
wolfSSL | 0:d92f9d21154c | 6339 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 6340 | #else |
wolfSSL | 0:d92f9d21154c | 6341 | return NOT_COMPILED_IN; |
wolfSSL | 0:d92f9d21154c | 6342 | #endif |
wolfSSL | 0:d92f9d21154c | 6343 | } |
wolfSSL | 0:d92f9d21154c | 6344 | |
wolfSSL | 0:d92f9d21154c | 6345 | |
wolfSSL | 0:d92f9d21154c | 6346 | #ifndef USE_WINDOWS_API |
wolfSSL | 0:d92f9d21154c | 6347 | #ifndef NO_WRITEV |
wolfSSL | 0:d92f9d21154c | 6348 | |
wolfSSL | 0:d92f9d21154c | 6349 | /* simulate writev semantics, doesn't actually do block at a time though |
wolfSSL | 0:d92f9d21154c | 6350 | because of SSL_write behavior and because front adds may be small */ |
wolfSSL | 0:d92f9d21154c | 6351 | int wolfSSL_writev(WOLFSSL* ssl, const struct iovec* iov, int iovcnt) |
wolfSSL | 0:d92f9d21154c | 6352 | { |
wolfSSL | 0:d92f9d21154c | 6353 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 6354 | byte staticBuffer[1]; /* force heap usage */ |
wolfSSL | 0:d92f9d21154c | 6355 | #else |
wolfSSL | 0:d92f9d21154c | 6356 | byte staticBuffer[FILE_BUFFER_SIZE]; |
wolfSSL | 0:d92f9d21154c | 6357 | #endif |
wolfSSL | 0:d92f9d21154c | 6358 | byte* myBuffer = staticBuffer; |
wolfSSL | 0:d92f9d21154c | 6359 | int dynamic = 0; |
wolfSSL | 0:d92f9d21154c | 6360 | int sending = 0; |
wolfSSL | 0:d92f9d21154c | 6361 | int idx = 0; |
wolfSSL | 0:d92f9d21154c | 6362 | int i; |
wolfSSL | 0:d92f9d21154c | 6363 | int ret; |
wolfSSL | 0:d92f9d21154c | 6364 | |
wolfSSL | 0:d92f9d21154c | 6365 | WOLFSSL_ENTER("wolfSSL_writev"); |
wolfSSL | 0:d92f9d21154c | 6366 | |
wolfSSL | 0:d92f9d21154c | 6367 | for (i = 0; i < iovcnt; i++) |
wolfSSL | 0:d92f9d21154c | 6368 | sending += (int)iov[i].iov_len; |
wolfSSL | 0:d92f9d21154c | 6369 | |
wolfSSL | 0:d92f9d21154c | 6370 | if (sending > (int)sizeof(staticBuffer)) { |
wolfSSL | 0:d92f9d21154c | 6371 | myBuffer = (byte*)XMALLOC(sending, ssl->heap, |
wolfSSL | 0:d92f9d21154c | 6372 | DYNAMIC_TYPE_WRITEV); |
wolfSSL | 0:d92f9d21154c | 6373 | if (!myBuffer) |
wolfSSL | 0:d92f9d21154c | 6374 | return MEMORY_ERROR; |
wolfSSL | 0:d92f9d21154c | 6375 | |
wolfSSL | 0:d92f9d21154c | 6376 | dynamic = 1; |
wolfSSL | 0:d92f9d21154c | 6377 | } |
wolfSSL | 0:d92f9d21154c | 6378 | |
wolfSSL | 0:d92f9d21154c | 6379 | for (i = 0; i < iovcnt; i++) { |
wolfSSL | 0:d92f9d21154c | 6380 | XMEMCPY(&myBuffer[idx], iov[i].iov_base, iov[i].iov_len); |
wolfSSL | 0:d92f9d21154c | 6381 | idx += (int)iov[i].iov_len; |
wolfSSL | 0:d92f9d21154c | 6382 | } |
wolfSSL | 0:d92f9d21154c | 6383 | |
wolfSSL | 0:d92f9d21154c | 6384 | ret = wolfSSL_write(ssl, myBuffer, sending); |
wolfSSL | 0:d92f9d21154c | 6385 | |
wolfSSL | 0:d92f9d21154c | 6386 | if (dynamic) |
wolfSSL | 0:d92f9d21154c | 6387 | XFREE(myBuffer, ssl->heap, DYNAMIC_TYPE_WRITEV); |
wolfSSL | 0:d92f9d21154c | 6388 | |
wolfSSL | 0:d92f9d21154c | 6389 | return ret; |
wolfSSL | 0:d92f9d21154c | 6390 | } |
wolfSSL | 0:d92f9d21154c | 6391 | #endif |
wolfSSL | 0:d92f9d21154c | 6392 | #endif |
wolfSSL | 0:d92f9d21154c | 6393 | |
wolfSSL | 0:d92f9d21154c | 6394 | |
wolfSSL | 0:d92f9d21154c | 6395 | #ifdef WOLFSSL_CALLBACKS |
wolfSSL | 0:d92f9d21154c | 6396 | |
wolfSSL | 0:d92f9d21154c | 6397 | typedef struct itimerval Itimerval; |
wolfSSL | 0:d92f9d21154c | 6398 | |
wolfSSL | 0:d92f9d21154c | 6399 | /* don't keep calling simple functions while setting up timer and singals |
wolfSSL | 0:d92f9d21154c | 6400 | if no inlining these are the next best */ |
wolfSSL | 0:d92f9d21154c | 6401 | |
wolfSSL | 0:d92f9d21154c | 6402 | #define AddTimes(a, b, c) \ |
wolfSSL | 0:d92f9d21154c | 6403 | do { \ |
wolfSSL | 0:d92f9d21154c | 6404 | c.tv_sec = a.tv_sec + b.tv_sec; \ |
wolfSSL | 0:d92f9d21154c | 6405 | c.tv_usec = a.tv_usec + b.tv_usec; \ |
wolfSSL | 0:d92f9d21154c | 6406 | if (c.tv_usec >= 1000000) { \ |
wolfSSL | 0:d92f9d21154c | 6407 | c.tv_sec++; \ |
wolfSSL | 0:d92f9d21154c | 6408 | c.tv_usec -= 1000000; \ |
wolfSSL | 0:d92f9d21154c | 6409 | } \ |
wolfSSL | 0:d92f9d21154c | 6410 | } while (0) |
wolfSSL | 0:d92f9d21154c | 6411 | |
wolfSSL | 0:d92f9d21154c | 6412 | |
wolfSSL | 0:d92f9d21154c | 6413 | #define SubtractTimes(a, b, c) \ |
wolfSSL | 0:d92f9d21154c | 6414 | do { \ |
wolfSSL | 0:d92f9d21154c | 6415 | c.tv_sec = a.tv_sec - b.tv_sec; \ |
wolfSSL | 0:d92f9d21154c | 6416 | c.tv_usec = a.tv_usec - b.tv_usec; \ |
wolfSSL | 0:d92f9d21154c | 6417 | if (c.tv_usec < 0) { \ |
wolfSSL | 0:d92f9d21154c | 6418 | c.tv_sec--; \ |
wolfSSL | 0:d92f9d21154c | 6419 | c.tv_usec += 1000000; \ |
wolfSSL | 0:d92f9d21154c | 6420 | } \ |
wolfSSL | 0:d92f9d21154c | 6421 | } while (0) |
wolfSSL | 0:d92f9d21154c | 6422 | |
wolfSSL | 0:d92f9d21154c | 6423 | #define CmpTimes(a, b, cmp) \ |
wolfSSL | 0:d92f9d21154c | 6424 | ((a.tv_sec == b.tv_sec) ? \ |
wolfSSL | 0:d92f9d21154c | 6425 | (a.tv_usec cmp b.tv_usec) : \ |
wolfSSL | 0:d92f9d21154c | 6426 | (a.tv_sec cmp b.tv_sec)) \ |
wolfSSL | 0:d92f9d21154c | 6427 | |
wolfSSL | 0:d92f9d21154c | 6428 | |
wolfSSL | 0:d92f9d21154c | 6429 | /* do nothing handler */ |
wolfSSL | 0:d92f9d21154c | 6430 | static void myHandler(int signo) |
wolfSSL | 0:d92f9d21154c | 6431 | { |
wolfSSL | 0:d92f9d21154c | 6432 | (void)signo; |
wolfSSL | 0:d92f9d21154c | 6433 | return; |
wolfSSL | 0:d92f9d21154c | 6434 | } |
wolfSSL | 0:d92f9d21154c | 6435 | |
wolfSSL | 0:d92f9d21154c | 6436 | |
wolfSSL | 0:d92f9d21154c | 6437 | static int wolfSSL_ex_wrapper(WOLFSSL* ssl, HandShakeCallBack hsCb, |
wolfSSL | 0:d92f9d21154c | 6438 | TimeoutCallBack toCb, Timeval timeout) |
wolfSSL | 0:d92f9d21154c | 6439 | { |
wolfSSL | 0:d92f9d21154c | 6440 | int ret = SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 6441 | int oldTimerOn = 0; /* was timer already on */ |
wolfSSL | 0:d92f9d21154c | 6442 | Timeval startTime; |
wolfSSL | 0:d92f9d21154c | 6443 | Timeval endTime; |
wolfSSL | 0:d92f9d21154c | 6444 | Timeval totalTime; |
wolfSSL | 0:d92f9d21154c | 6445 | Itimerval myTimeout; |
wolfSSL | 0:d92f9d21154c | 6446 | Itimerval oldTimeout; /* if old timer adjust from total time to reset */ |
wolfSSL | 0:d92f9d21154c | 6447 | struct sigaction act, oact; |
wolfSSL | 0:d92f9d21154c | 6448 | |
wolfSSL | 0:d92f9d21154c | 6449 | #define ERR_OUT(x) { ssl->hsInfoOn = 0; ssl->toInfoOn = 0; return x; } |
wolfSSL | 0:d92f9d21154c | 6450 | |
wolfSSL | 0:d92f9d21154c | 6451 | if (hsCb) { |
wolfSSL | 0:d92f9d21154c | 6452 | ssl->hsInfoOn = 1; |
wolfSSL | 0:d92f9d21154c | 6453 | InitHandShakeInfo(&ssl->handShakeInfo); |
wolfSSL | 0:d92f9d21154c | 6454 | } |
wolfSSL | 0:d92f9d21154c | 6455 | if (toCb) { |
wolfSSL | 0:d92f9d21154c | 6456 | ssl->toInfoOn = 1; |
wolfSSL | 0:d92f9d21154c | 6457 | InitTimeoutInfo(&ssl->timeoutInfo); |
wolfSSL | 0:d92f9d21154c | 6458 | |
wolfSSL | 0:d92f9d21154c | 6459 | if (gettimeofday(&startTime, 0) < 0) |
wolfSSL | 0:d92f9d21154c | 6460 | ERR_OUT(GETTIME_ERROR); |
wolfSSL | 0:d92f9d21154c | 6461 | |
wolfSSL | 0:d92f9d21154c | 6462 | /* use setitimer to simulate getitimer, init 0 myTimeout */ |
wolfSSL | 0:d92f9d21154c | 6463 | myTimeout.it_interval.tv_sec = 0; |
wolfSSL | 0:d92f9d21154c | 6464 | myTimeout.it_interval.tv_usec = 0; |
wolfSSL | 0:d92f9d21154c | 6465 | myTimeout.it_value.tv_sec = 0; |
wolfSSL | 0:d92f9d21154c | 6466 | myTimeout.it_value.tv_usec = 0; |
wolfSSL | 0:d92f9d21154c | 6467 | if (setitimer(ITIMER_REAL, &myTimeout, &oldTimeout) < 0) |
wolfSSL | 0:d92f9d21154c | 6468 | ERR_OUT(SETITIMER_ERROR); |
wolfSSL | 0:d92f9d21154c | 6469 | |
wolfSSL | 0:d92f9d21154c | 6470 | if (oldTimeout.it_value.tv_sec || oldTimeout.it_value.tv_usec) { |
wolfSSL | 0:d92f9d21154c | 6471 | oldTimerOn = 1; |
wolfSSL | 0:d92f9d21154c | 6472 | |
wolfSSL | 0:d92f9d21154c | 6473 | /* is old timer going to expire before ours */ |
wolfSSL | 0:d92f9d21154c | 6474 | if (CmpTimes(oldTimeout.it_value, timeout, <)) { |
wolfSSL | 0:d92f9d21154c | 6475 | timeout.tv_sec = oldTimeout.it_value.tv_sec; |
wolfSSL | 0:d92f9d21154c | 6476 | timeout.tv_usec = oldTimeout.it_value.tv_usec; |
wolfSSL | 0:d92f9d21154c | 6477 | } |
wolfSSL | 0:d92f9d21154c | 6478 | } |
wolfSSL | 0:d92f9d21154c | 6479 | myTimeout.it_value.tv_sec = timeout.tv_sec; |
wolfSSL | 0:d92f9d21154c | 6480 | myTimeout.it_value.tv_usec = timeout.tv_usec; |
wolfSSL | 0:d92f9d21154c | 6481 | |
wolfSSL | 0:d92f9d21154c | 6482 | /* set up signal handler, don't restart socket send/recv */ |
wolfSSL | 0:d92f9d21154c | 6483 | act.sa_handler = myHandler; |
wolfSSL | 0:d92f9d21154c | 6484 | sigemptyset(&act.sa_mask); |
wolfSSL | 0:d92f9d21154c | 6485 | act.sa_flags = 0; |
wolfSSL | 0:d92f9d21154c | 6486 | #ifdef SA_INTERRUPT |
wolfSSL | 0:d92f9d21154c | 6487 | act.sa_flags |= SA_INTERRUPT; |
wolfSSL | 0:d92f9d21154c | 6488 | #endif |
wolfSSL | 0:d92f9d21154c | 6489 | if (sigaction(SIGALRM, &act, &oact) < 0) |
wolfSSL | 0:d92f9d21154c | 6490 | ERR_OUT(SIGACT_ERROR); |
wolfSSL | 0:d92f9d21154c | 6491 | |
wolfSSL | 0:d92f9d21154c | 6492 | if (setitimer(ITIMER_REAL, &myTimeout, 0) < 0) |
wolfSSL | 0:d92f9d21154c | 6493 | ERR_OUT(SETITIMER_ERROR); |
wolfSSL | 0:d92f9d21154c | 6494 | } |
wolfSSL | 0:d92f9d21154c | 6495 | |
wolfSSL | 0:d92f9d21154c | 6496 | /* do main work */ |
wolfSSL | 0:d92f9d21154c | 6497 | #ifndef NO_WOLFSSL_CLIENT |
wolfSSL | 0:d92f9d21154c | 6498 | if (ssl->options.side == WOLFSSL_CLIENT_END) |
wolfSSL | 0:d92f9d21154c | 6499 | ret = wolfSSL_connect(ssl); |
wolfSSL | 0:d92f9d21154c | 6500 | #endif |
wolfSSL | 0:d92f9d21154c | 6501 | #ifndef NO_WOLFSSL_SERVER |
wolfSSL | 0:d92f9d21154c | 6502 | if (ssl->options.side == WOLFSSL_SERVER_END) |
wolfSSL | 0:d92f9d21154c | 6503 | ret = wolfSSL_accept(ssl); |
wolfSSL | 0:d92f9d21154c | 6504 | #endif |
wolfSSL | 0:d92f9d21154c | 6505 | |
wolfSSL | 0:d92f9d21154c | 6506 | /* do callbacks */ |
wolfSSL | 0:d92f9d21154c | 6507 | if (toCb) { |
wolfSSL | 0:d92f9d21154c | 6508 | if (oldTimerOn) { |
wolfSSL | 0:d92f9d21154c | 6509 | gettimeofday(&endTime, 0); |
wolfSSL | 0:d92f9d21154c | 6510 | SubtractTimes(endTime, startTime, totalTime); |
wolfSSL | 0:d92f9d21154c | 6511 | /* adjust old timer for elapsed time */ |
wolfSSL | 0:d92f9d21154c | 6512 | if (CmpTimes(totalTime, oldTimeout.it_value, <)) |
wolfSSL | 0:d92f9d21154c | 6513 | SubtractTimes(oldTimeout.it_value, totalTime, |
wolfSSL | 0:d92f9d21154c | 6514 | oldTimeout.it_value); |
wolfSSL | 0:d92f9d21154c | 6515 | else { |
wolfSSL | 0:d92f9d21154c | 6516 | /* reset value to interval, may be off */ |
wolfSSL | 0:d92f9d21154c | 6517 | oldTimeout.it_value.tv_sec = oldTimeout.it_interval.tv_sec; |
wolfSSL | 0:d92f9d21154c | 6518 | oldTimeout.it_value.tv_usec =oldTimeout.it_interval.tv_usec; |
wolfSSL | 0:d92f9d21154c | 6519 | } |
wolfSSL | 0:d92f9d21154c | 6520 | /* keep iter the same whether there or not */ |
wolfSSL | 0:d92f9d21154c | 6521 | } |
wolfSSL | 0:d92f9d21154c | 6522 | /* restore old handler */ |
wolfSSL | 0:d92f9d21154c | 6523 | if (sigaction(SIGALRM, &oact, 0) < 0) |
wolfSSL | 0:d92f9d21154c | 6524 | ret = SIGACT_ERROR; /* more pressing error, stomp */ |
wolfSSL | 0:d92f9d21154c | 6525 | else |
wolfSSL | 0:d92f9d21154c | 6526 | /* use old settings which may turn off (expired or not there) */ |
wolfSSL | 0:d92f9d21154c | 6527 | if (setitimer(ITIMER_REAL, &oldTimeout, 0) < 0) |
wolfSSL | 0:d92f9d21154c | 6528 | ret = SETITIMER_ERROR; |
wolfSSL | 0:d92f9d21154c | 6529 | |
wolfSSL | 0:d92f9d21154c | 6530 | /* if we had a timeout call callback */ |
wolfSSL | 0:d92f9d21154c | 6531 | if (ssl->timeoutInfo.timeoutName[0]) { |
wolfSSL | 0:d92f9d21154c | 6532 | ssl->timeoutInfo.timeoutValue.tv_sec = timeout.tv_sec; |
wolfSSL | 0:d92f9d21154c | 6533 | ssl->timeoutInfo.timeoutValue.tv_usec = timeout.tv_usec; |
wolfSSL | 0:d92f9d21154c | 6534 | (toCb)(&ssl->timeoutInfo); |
wolfSSL | 0:d92f9d21154c | 6535 | } |
wolfSSL | 0:d92f9d21154c | 6536 | /* clean up */ |
wolfSSL | 0:d92f9d21154c | 6537 | FreeTimeoutInfo(&ssl->timeoutInfo, ssl->heap); |
wolfSSL | 0:d92f9d21154c | 6538 | ssl->toInfoOn = 0; |
wolfSSL | 0:d92f9d21154c | 6539 | } |
wolfSSL | 0:d92f9d21154c | 6540 | if (hsCb) { |
wolfSSL | 0:d92f9d21154c | 6541 | FinishHandShakeInfo(&ssl->handShakeInfo, ssl); |
wolfSSL | 0:d92f9d21154c | 6542 | (hsCb)(&ssl->handShakeInfo); |
wolfSSL | 0:d92f9d21154c | 6543 | ssl->hsInfoOn = 0; |
wolfSSL | 0:d92f9d21154c | 6544 | } |
wolfSSL | 0:d92f9d21154c | 6545 | return ret; |
wolfSSL | 0:d92f9d21154c | 6546 | } |
wolfSSL | 0:d92f9d21154c | 6547 | |
wolfSSL | 0:d92f9d21154c | 6548 | |
wolfSSL | 0:d92f9d21154c | 6549 | #ifndef NO_WOLFSSL_CLIENT |
wolfSSL | 0:d92f9d21154c | 6550 | |
wolfSSL | 0:d92f9d21154c | 6551 | int wolfSSL_connect_ex(WOLFSSL* ssl, HandShakeCallBack hsCb, |
wolfSSL | 0:d92f9d21154c | 6552 | TimeoutCallBack toCb, Timeval timeout) |
wolfSSL | 0:d92f9d21154c | 6553 | { |
wolfSSL | 0:d92f9d21154c | 6554 | WOLFSSL_ENTER("wolfSSL_connect_ex"); |
wolfSSL | 0:d92f9d21154c | 6555 | return wolfSSL_ex_wrapper(ssl, hsCb, toCb, timeout); |
wolfSSL | 0:d92f9d21154c | 6556 | } |
wolfSSL | 0:d92f9d21154c | 6557 | |
wolfSSL | 0:d92f9d21154c | 6558 | #endif |
wolfSSL | 0:d92f9d21154c | 6559 | |
wolfSSL | 0:d92f9d21154c | 6560 | |
wolfSSL | 0:d92f9d21154c | 6561 | #ifndef NO_WOLFSSL_SERVER |
wolfSSL | 0:d92f9d21154c | 6562 | |
wolfSSL | 0:d92f9d21154c | 6563 | int wolfSSL_accept_ex(WOLFSSL* ssl, HandShakeCallBack hsCb, |
wolfSSL | 0:d92f9d21154c | 6564 | TimeoutCallBack toCb,Timeval timeout) |
wolfSSL | 0:d92f9d21154c | 6565 | { |
wolfSSL | 0:d92f9d21154c | 6566 | WOLFSSL_ENTER("wolfSSL_accept_ex"); |
wolfSSL | 0:d92f9d21154c | 6567 | return wolfSSL_ex_wrapper(ssl, hsCb, toCb, timeout); |
wolfSSL | 0:d92f9d21154c | 6568 | } |
wolfSSL | 0:d92f9d21154c | 6569 | |
wolfSSL | 0:d92f9d21154c | 6570 | #endif |
wolfSSL | 0:d92f9d21154c | 6571 | |
wolfSSL | 0:d92f9d21154c | 6572 | #endif /* WOLFSSL_CALLBACKS */ |
wolfSSL | 0:d92f9d21154c | 6573 | |
wolfSSL | 0:d92f9d21154c | 6574 | |
wolfSSL | 0:d92f9d21154c | 6575 | #ifndef NO_PSK |
wolfSSL | 0:d92f9d21154c | 6576 | |
wolfSSL | 0:d92f9d21154c | 6577 | void wolfSSL_CTX_set_psk_client_callback(WOLFSSL_CTX* ctx, |
wolfSSL | 0:d92f9d21154c | 6578 | psk_client_callback cb) |
wolfSSL | 0:d92f9d21154c | 6579 | { |
wolfSSL | 0:d92f9d21154c | 6580 | WOLFSSL_ENTER("SSL_CTX_set_psk_client_callback"); |
wolfSSL | 0:d92f9d21154c | 6581 | ctx->havePSK = 1; |
wolfSSL | 0:d92f9d21154c | 6582 | ctx->client_psk_cb = cb; |
wolfSSL | 0:d92f9d21154c | 6583 | } |
wolfSSL | 0:d92f9d21154c | 6584 | |
wolfSSL | 0:d92f9d21154c | 6585 | |
wolfSSL | 0:d92f9d21154c | 6586 | void wolfSSL_set_psk_client_callback(WOLFSSL* ssl, psk_client_callback cb) |
wolfSSL | 0:d92f9d21154c | 6587 | { |
wolfSSL | 0:d92f9d21154c | 6588 | byte haveRSA = 1; |
wolfSSL | 0:d92f9d21154c | 6589 | |
wolfSSL | 0:d92f9d21154c | 6590 | WOLFSSL_ENTER("SSL_set_psk_client_callback"); |
wolfSSL | 0:d92f9d21154c | 6591 | ssl->options.havePSK = 1; |
wolfSSL | 0:d92f9d21154c | 6592 | ssl->options.client_psk_cb = cb; |
wolfSSL | 0:d92f9d21154c | 6593 | |
wolfSSL | 0:d92f9d21154c | 6594 | #ifdef NO_RSA |
wolfSSL | 0:d92f9d21154c | 6595 | haveRSA = 0; |
wolfSSL | 0:d92f9d21154c | 6596 | #endif |
wolfSSL | 0:d92f9d21154c | 6597 | InitSuites(ssl->suites, ssl->version, haveRSA, TRUE, |
wolfSSL | 0:d92f9d21154c | 6598 | ssl->options.haveDH, ssl->options.haveNTRU, |
wolfSSL | 0:d92f9d21154c | 6599 | ssl->options.haveECDSAsig, ssl->options.haveStaticECC, |
wolfSSL | 0:d92f9d21154c | 6600 | ssl->options.side); |
wolfSSL | 0:d92f9d21154c | 6601 | } |
wolfSSL | 0:d92f9d21154c | 6602 | |
wolfSSL | 0:d92f9d21154c | 6603 | |
wolfSSL | 0:d92f9d21154c | 6604 | void wolfSSL_CTX_set_psk_server_callback(WOLFSSL_CTX* ctx, |
wolfSSL | 0:d92f9d21154c | 6605 | psk_server_callback cb) |
wolfSSL | 0:d92f9d21154c | 6606 | { |
wolfSSL | 0:d92f9d21154c | 6607 | WOLFSSL_ENTER("SSL_CTX_set_psk_server_callback"); |
wolfSSL | 0:d92f9d21154c | 6608 | ctx->havePSK = 1; |
wolfSSL | 0:d92f9d21154c | 6609 | ctx->server_psk_cb = cb; |
wolfSSL | 0:d92f9d21154c | 6610 | } |
wolfSSL | 0:d92f9d21154c | 6611 | |
wolfSSL | 0:d92f9d21154c | 6612 | |
wolfSSL | 0:d92f9d21154c | 6613 | void wolfSSL_set_psk_server_callback(WOLFSSL* ssl, psk_server_callback cb) |
wolfSSL | 0:d92f9d21154c | 6614 | { |
wolfSSL | 0:d92f9d21154c | 6615 | byte haveRSA = 1; |
wolfSSL | 0:d92f9d21154c | 6616 | |
wolfSSL | 0:d92f9d21154c | 6617 | WOLFSSL_ENTER("SSL_set_psk_server_callback"); |
wolfSSL | 0:d92f9d21154c | 6618 | ssl->options.havePSK = 1; |
wolfSSL | 0:d92f9d21154c | 6619 | ssl->options.server_psk_cb = cb; |
wolfSSL | 0:d92f9d21154c | 6620 | |
wolfSSL | 0:d92f9d21154c | 6621 | #ifdef NO_RSA |
wolfSSL | 0:d92f9d21154c | 6622 | haveRSA = 0; |
wolfSSL | 0:d92f9d21154c | 6623 | #endif |
wolfSSL | 0:d92f9d21154c | 6624 | InitSuites(ssl->suites, ssl->version, haveRSA, TRUE, |
wolfSSL | 0:d92f9d21154c | 6625 | ssl->options.haveDH, ssl->options.haveNTRU, |
wolfSSL | 0:d92f9d21154c | 6626 | ssl->options.haveECDSAsig, ssl->options.haveStaticECC, |
wolfSSL | 0:d92f9d21154c | 6627 | ssl->options.side); |
wolfSSL | 0:d92f9d21154c | 6628 | } |
wolfSSL | 0:d92f9d21154c | 6629 | |
wolfSSL | 0:d92f9d21154c | 6630 | |
wolfSSL | 0:d92f9d21154c | 6631 | const char* wolfSSL_get_psk_identity_hint(const WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 6632 | { |
wolfSSL | 0:d92f9d21154c | 6633 | WOLFSSL_ENTER("SSL_get_psk_identity_hint"); |
wolfSSL | 0:d92f9d21154c | 6634 | |
wolfSSL | 0:d92f9d21154c | 6635 | if (ssl == NULL || ssl->arrays == NULL) |
wolfSSL | 0:d92f9d21154c | 6636 | return NULL; |
wolfSSL | 0:d92f9d21154c | 6637 | |
wolfSSL | 0:d92f9d21154c | 6638 | return ssl->arrays->server_hint; |
wolfSSL | 0:d92f9d21154c | 6639 | } |
wolfSSL | 0:d92f9d21154c | 6640 | |
wolfSSL | 0:d92f9d21154c | 6641 | |
wolfSSL | 0:d92f9d21154c | 6642 | const char* wolfSSL_get_psk_identity(const WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 6643 | { |
wolfSSL | 0:d92f9d21154c | 6644 | WOLFSSL_ENTER("SSL_get_psk_identity"); |
wolfSSL | 0:d92f9d21154c | 6645 | |
wolfSSL | 0:d92f9d21154c | 6646 | if (ssl == NULL || ssl->arrays == NULL) |
wolfSSL | 0:d92f9d21154c | 6647 | return NULL; |
wolfSSL | 0:d92f9d21154c | 6648 | |
wolfSSL | 0:d92f9d21154c | 6649 | return ssl->arrays->client_identity; |
wolfSSL | 0:d92f9d21154c | 6650 | } |
wolfSSL | 0:d92f9d21154c | 6651 | |
wolfSSL | 0:d92f9d21154c | 6652 | |
wolfSSL | 0:d92f9d21154c | 6653 | int wolfSSL_CTX_use_psk_identity_hint(WOLFSSL_CTX* ctx, const char* hint) |
wolfSSL | 0:d92f9d21154c | 6654 | { |
wolfSSL | 0:d92f9d21154c | 6655 | WOLFSSL_ENTER("SSL_CTX_use_psk_identity_hint"); |
wolfSSL | 0:d92f9d21154c | 6656 | if (hint == 0) |
wolfSSL | 0:d92f9d21154c | 6657 | ctx->server_hint[0] = 0; |
wolfSSL | 0:d92f9d21154c | 6658 | else { |
wolfSSL | 0:d92f9d21154c | 6659 | XSTRNCPY(ctx->server_hint, hint, MAX_PSK_ID_LEN); |
wolfSSL | 0:d92f9d21154c | 6660 | ctx->server_hint[MAX_PSK_ID_LEN - 1] = '\0'; |
wolfSSL | 0:d92f9d21154c | 6661 | } |
wolfSSL | 0:d92f9d21154c | 6662 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 6663 | } |
wolfSSL | 0:d92f9d21154c | 6664 | |
wolfSSL | 0:d92f9d21154c | 6665 | |
wolfSSL | 0:d92f9d21154c | 6666 | int wolfSSL_use_psk_identity_hint(WOLFSSL* ssl, const char* hint) |
wolfSSL | 0:d92f9d21154c | 6667 | { |
wolfSSL | 0:d92f9d21154c | 6668 | WOLFSSL_ENTER("SSL_use_psk_identity_hint"); |
wolfSSL | 0:d92f9d21154c | 6669 | |
wolfSSL | 0:d92f9d21154c | 6670 | if (ssl == NULL || ssl->arrays == NULL) |
wolfSSL | 0:d92f9d21154c | 6671 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 6672 | |
wolfSSL | 0:d92f9d21154c | 6673 | if (hint == 0) |
wolfSSL | 0:d92f9d21154c | 6674 | ssl->arrays->server_hint[0] = 0; |
wolfSSL | 0:d92f9d21154c | 6675 | else { |
wolfSSL | 0:d92f9d21154c | 6676 | XSTRNCPY(ssl->arrays->server_hint, hint, MAX_PSK_ID_LEN); |
wolfSSL | 0:d92f9d21154c | 6677 | ssl->arrays->server_hint[MAX_PSK_ID_LEN - 1] = '\0'; |
wolfSSL | 0:d92f9d21154c | 6678 | } |
wolfSSL | 0:d92f9d21154c | 6679 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 6680 | } |
wolfSSL | 0:d92f9d21154c | 6681 | |
wolfSSL | 0:d92f9d21154c | 6682 | #endif /* NO_PSK */ |
wolfSSL | 0:d92f9d21154c | 6683 | |
wolfSSL | 0:d92f9d21154c | 6684 | |
wolfSSL | 0:d92f9d21154c | 6685 | #ifdef HAVE_ANON |
wolfSSL | 0:d92f9d21154c | 6686 | |
wolfSSL | 0:d92f9d21154c | 6687 | int wolfSSL_CTX_allow_anon_cipher(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 6688 | { |
wolfSSL | 0:d92f9d21154c | 6689 | WOLFSSL_ENTER("wolfSSL_CTX_allow_anon_cipher"); |
wolfSSL | 0:d92f9d21154c | 6690 | |
wolfSSL | 0:d92f9d21154c | 6691 | if (ctx == NULL) |
wolfSSL | 0:d92f9d21154c | 6692 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 6693 | |
wolfSSL | 0:d92f9d21154c | 6694 | ctx->haveAnon = 1; |
wolfSSL | 0:d92f9d21154c | 6695 | |
wolfSSL | 0:d92f9d21154c | 6696 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 6697 | } |
wolfSSL | 0:d92f9d21154c | 6698 | |
wolfSSL | 0:d92f9d21154c | 6699 | #endif /* HAVE_ANON */ |
wolfSSL | 0:d92f9d21154c | 6700 | |
wolfSSL | 0:d92f9d21154c | 6701 | |
wolfSSL | 0:d92f9d21154c | 6702 | #ifndef NO_CERTS |
wolfSSL | 0:d92f9d21154c | 6703 | /* used to be defined on NO_FILESYSTEM only, but are generally useful */ |
wolfSSL | 0:d92f9d21154c | 6704 | |
wolfSSL | 0:d92f9d21154c | 6705 | /* wolfSSL extension allows DER files to be loaded from buffers as well */ |
wolfSSL | 0:d92f9d21154c | 6706 | int wolfSSL_CTX_load_verify_buffer(WOLFSSL_CTX* ctx, const unsigned char* in, |
wolfSSL | 0:d92f9d21154c | 6707 | long sz, int format) |
wolfSSL | 0:d92f9d21154c | 6708 | { |
wolfSSL | 0:d92f9d21154c | 6709 | WOLFSSL_ENTER("wolfSSL_CTX_load_verify_buffer"); |
wolfSSL | 0:d92f9d21154c | 6710 | if (format == SSL_FILETYPE_PEM) |
wolfSSL | 0:d92f9d21154c | 6711 | return ProcessChainBuffer(ctx, in, sz, format, CA_TYPE, NULL); |
wolfSSL | 0:d92f9d21154c | 6712 | else |
wolfSSL | 0:d92f9d21154c | 6713 | return ProcessBuffer(ctx, in, sz, format, CA_TYPE, NULL,NULL,0); |
wolfSSL | 0:d92f9d21154c | 6714 | } |
wolfSSL | 0:d92f9d21154c | 6715 | |
wolfSSL | 0:d92f9d21154c | 6716 | |
wolfSSL | 0:d92f9d21154c | 6717 | int wolfSSL_CTX_use_certificate_buffer(WOLFSSL_CTX* ctx, |
wolfSSL | 0:d92f9d21154c | 6718 | const unsigned char* in, long sz, int format) |
wolfSSL | 0:d92f9d21154c | 6719 | { |
wolfSSL | 0:d92f9d21154c | 6720 | WOLFSSL_ENTER("wolfSSL_CTX_use_certificate_buffer"); |
wolfSSL | 0:d92f9d21154c | 6721 | return ProcessBuffer(ctx, in, sz, format, CERT_TYPE, NULL, NULL, 0); |
wolfSSL | 0:d92f9d21154c | 6722 | } |
wolfSSL | 0:d92f9d21154c | 6723 | |
wolfSSL | 0:d92f9d21154c | 6724 | |
wolfSSL | 0:d92f9d21154c | 6725 | int wolfSSL_CTX_use_PrivateKey_buffer(WOLFSSL_CTX* ctx, |
wolfSSL | 0:d92f9d21154c | 6726 | const unsigned char* in, long sz, int format) |
wolfSSL | 0:d92f9d21154c | 6727 | { |
wolfSSL | 0:d92f9d21154c | 6728 | WOLFSSL_ENTER("wolfSSL_CTX_use_PrivateKey_buffer"); |
wolfSSL | 0:d92f9d21154c | 6729 | return ProcessBuffer(ctx, in, sz, format, PRIVATEKEY_TYPE, NULL,NULL,0); |
wolfSSL | 0:d92f9d21154c | 6730 | } |
wolfSSL | 0:d92f9d21154c | 6731 | |
wolfSSL | 0:d92f9d21154c | 6732 | |
wolfSSL | 0:d92f9d21154c | 6733 | int wolfSSL_CTX_use_certificate_chain_buffer(WOLFSSL_CTX* ctx, |
wolfSSL | 0:d92f9d21154c | 6734 | const unsigned char* in, long sz) |
wolfSSL | 0:d92f9d21154c | 6735 | { |
wolfSSL | 0:d92f9d21154c | 6736 | WOLFSSL_ENTER("wolfSSL_CTX_use_certificate_chain_buffer"); |
wolfSSL | 0:d92f9d21154c | 6737 | return ProcessBuffer(ctx, in, sz, SSL_FILETYPE_PEM, CERT_TYPE, NULL, |
wolfSSL | 0:d92f9d21154c | 6738 | NULL, 1); |
wolfSSL | 0:d92f9d21154c | 6739 | } |
wolfSSL | 0:d92f9d21154c | 6740 | |
wolfSSL | 0:d92f9d21154c | 6741 | int wolfSSL_use_certificate_buffer(WOLFSSL* ssl, |
wolfSSL | 0:d92f9d21154c | 6742 | const unsigned char* in, long sz, int format) |
wolfSSL | 0:d92f9d21154c | 6743 | { |
wolfSSL | 0:d92f9d21154c | 6744 | WOLFSSL_ENTER("wolfSSL_use_certificate_buffer"); |
wolfSSL | 0:d92f9d21154c | 6745 | return ProcessBuffer(ssl->ctx, in, sz, format,CERT_TYPE,ssl,NULL,0); |
wolfSSL | 0:d92f9d21154c | 6746 | } |
wolfSSL | 0:d92f9d21154c | 6747 | |
wolfSSL | 0:d92f9d21154c | 6748 | |
wolfSSL | 0:d92f9d21154c | 6749 | int wolfSSL_use_PrivateKey_buffer(WOLFSSL* ssl, |
wolfSSL | 0:d92f9d21154c | 6750 | const unsigned char* in, long sz, int format) |
wolfSSL | 0:d92f9d21154c | 6751 | { |
wolfSSL | 0:d92f9d21154c | 6752 | WOLFSSL_ENTER("wolfSSL_use_PrivateKey_buffer"); |
wolfSSL | 0:d92f9d21154c | 6753 | return ProcessBuffer(ssl->ctx, in, sz, format, PRIVATEKEY_TYPE, |
wolfSSL | 0:d92f9d21154c | 6754 | ssl, NULL, 0); |
wolfSSL | 0:d92f9d21154c | 6755 | } |
wolfSSL | 0:d92f9d21154c | 6756 | |
wolfSSL | 0:d92f9d21154c | 6757 | |
wolfSSL | 0:d92f9d21154c | 6758 | int wolfSSL_use_certificate_chain_buffer(WOLFSSL* ssl, |
wolfSSL | 0:d92f9d21154c | 6759 | const unsigned char* in, long sz) |
wolfSSL | 0:d92f9d21154c | 6760 | { |
wolfSSL | 0:d92f9d21154c | 6761 | WOLFSSL_ENTER("wolfSSL_use_certificate_chain_buffer"); |
wolfSSL | 0:d92f9d21154c | 6762 | return ProcessBuffer(ssl->ctx, in, sz, SSL_FILETYPE_PEM, CERT_TYPE, |
wolfSSL | 0:d92f9d21154c | 6763 | ssl, NULL, 1); |
wolfSSL | 0:d92f9d21154c | 6764 | } |
wolfSSL | 0:d92f9d21154c | 6765 | |
wolfSSL | 0:d92f9d21154c | 6766 | |
wolfSSL | 0:d92f9d21154c | 6767 | /* unload any certs or keys that SSL owns, leave CTX as is |
wolfSSL | 0:d92f9d21154c | 6768 | SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 6769 | int wolfSSL_UnloadCertsKeys(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 6770 | { |
wolfSSL | 0:d92f9d21154c | 6771 | if (ssl == NULL) { |
wolfSSL | 0:d92f9d21154c | 6772 | WOLFSSL_MSG("Null function arg"); |
wolfSSL | 0:d92f9d21154c | 6773 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 6774 | } |
wolfSSL | 0:d92f9d21154c | 6775 | |
wolfSSL | 0:d92f9d21154c | 6776 | if (ssl->buffers.weOwnCert) { |
wolfSSL | 0:d92f9d21154c | 6777 | WOLFSSL_MSG("Unloading cert"); |
wolfSSL | 0:d92f9d21154c | 6778 | XFREE(ssl->buffers.certificate.buffer, ssl->heap,DYNAMIC_TYPE_CERT); |
wolfSSL | 0:d92f9d21154c | 6779 | ssl->buffers.weOwnCert = 0; |
wolfSSL | 0:d92f9d21154c | 6780 | ssl->buffers.certificate.length = 0; |
wolfSSL | 0:d92f9d21154c | 6781 | ssl->buffers.certificate.buffer = NULL; |
wolfSSL | 0:d92f9d21154c | 6782 | } |
wolfSSL | 0:d92f9d21154c | 6783 | |
wolfSSL | 0:d92f9d21154c | 6784 | if (ssl->buffers.weOwnCertChain) { |
wolfSSL | 0:d92f9d21154c | 6785 | WOLFSSL_MSG("Unloading cert chain"); |
wolfSSL | 0:d92f9d21154c | 6786 | XFREE(ssl->buffers.certChain.buffer, ssl->heap,DYNAMIC_TYPE_CERT); |
wolfSSL | 0:d92f9d21154c | 6787 | ssl->buffers.weOwnCertChain = 0; |
wolfSSL | 0:d92f9d21154c | 6788 | ssl->buffers.certChain.length = 0; |
wolfSSL | 0:d92f9d21154c | 6789 | ssl->buffers.certChain.buffer = NULL; |
wolfSSL | 0:d92f9d21154c | 6790 | } |
wolfSSL | 0:d92f9d21154c | 6791 | |
wolfSSL | 0:d92f9d21154c | 6792 | if (ssl->buffers.weOwnKey) { |
wolfSSL | 0:d92f9d21154c | 6793 | WOLFSSL_MSG("Unloading key"); |
wolfSSL | 0:d92f9d21154c | 6794 | XFREE(ssl->buffers.key.buffer, ssl->heap, DYNAMIC_TYPE_KEY); |
wolfSSL | 0:d92f9d21154c | 6795 | ssl->buffers.weOwnKey = 0; |
wolfSSL | 0:d92f9d21154c | 6796 | ssl->buffers.key.length = 0; |
wolfSSL | 0:d92f9d21154c | 6797 | ssl->buffers.key.buffer = NULL; |
wolfSSL | 0:d92f9d21154c | 6798 | } |
wolfSSL | 0:d92f9d21154c | 6799 | |
wolfSSL | 0:d92f9d21154c | 6800 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 6801 | } |
wolfSSL | 0:d92f9d21154c | 6802 | |
wolfSSL | 0:d92f9d21154c | 6803 | |
wolfSSL | 0:d92f9d21154c | 6804 | int wolfSSL_CTX_UnloadCAs(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 6805 | { |
wolfSSL | 0:d92f9d21154c | 6806 | WOLFSSL_ENTER("wolfSSL_CTX_UnloadCAs"); |
wolfSSL | 0:d92f9d21154c | 6807 | |
wolfSSL | 0:d92f9d21154c | 6808 | if (ctx == NULL) |
wolfSSL | 0:d92f9d21154c | 6809 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 6810 | |
wolfSSL | 0:d92f9d21154c | 6811 | return wolfSSL_CertManagerUnloadCAs(ctx->cm); |
wolfSSL | 0:d92f9d21154c | 6812 | } |
wolfSSL | 0:d92f9d21154c | 6813 | |
wolfSSL | 0:d92f9d21154c | 6814 | /* old NO_FILESYSTEM end */ |
wolfSSL | 0:d92f9d21154c | 6815 | #endif /* !NO_CERTS */ |
wolfSSL | 0:d92f9d21154c | 6816 | |
wolfSSL | 0:d92f9d21154c | 6817 | |
wolfSSL | 0:d92f9d21154c | 6818 | #if defined(OPENSSL_EXTRA) || defined(GOAHEAD_WS) |
wolfSSL | 0:d92f9d21154c | 6819 | |
wolfSSL | 0:d92f9d21154c | 6820 | |
wolfSSL | 0:d92f9d21154c | 6821 | int wolfSSL_add_all_algorithms(void) |
wolfSSL | 0:d92f9d21154c | 6822 | { |
wolfSSL | 0:d92f9d21154c | 6823 | WOLFSSL_ENTER("wolfSSL_add_all_algorithms"); |
wolfSSL | 0:d92f9d21154c | 6824 | wolfSSL_Init(); |
wolfSSL | 0:d92f9d21154c | 6825 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 6826 | } |
wolfSSL | 0:d92f9d21154c | 6827 | |
wolfSSL | 0:d92f9d21154c | 6828 | |
wolfSSL | 0:d92f9d21154c | 6829 | long wolfSSL_CTX_sess_set_cache_size(WOLFSSL_CTX* ctx, long sz) |
wolfSSL | 0:d92f9d21154c | 6830 | { |
wolfSSL | 0:d92f9d21154c | 6831 | /* cache size fixed at compile time in wolfSSL */ |
wolfSSL | 0:d92f9d21154c | 6832 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 6833 | (void)sz; |
wolfSSL | 0:d92f9d21154c | 6834 | return 0; |
wolfSSL | 0:d92f9d21154c | 6835 | } |
wolfSSL | 0:d92f9d21154c | 6836 | |
wolfSSL | 0:d92f9d21154c | 6837 | |
wolfSSL | 0:d92f9d21154c | 6838 | void wolfSSL_CTX_set_quiet_shutdown(WOLFSSL_CTX* ctx, int mode) |
wolfSSL | 0:d92f9d21154c | 6839 | { |
wolfSSL | 0:d92f9d21154c | 6840 | WOLFSSL_ENTER("wolfSSL_CTX_set_quiet_shutdown"); |
wolfSSL | 0:d92f9d21154c | 6841 | if (mode) |
wolfSSL | 0:d92f9d21154c | 6842 | ctx->quietShutdown = 1; |
wolfSSL | 0:d92f9d21154c | 6843 | } |
wolfSSL | 0:d92f9d21154c | 6844 | |
wolfSSL | 0:d92f9d21154c | 6845 | |
wolfSSL | 0:d92f9d21154c | 6846 | void wolfSSL_set_quiet_shutdown(WOLFSSL* ssl, int mode) |
wolfSSL | 0:d92f9d21154c | 6847 | { |
wolfSSL | 0:d92f9d21154c | 6848 | WOLFSSL_ENTER("wolfSSL_CTX_set_quiet_shutdown"); |
wolfSSL | 0:d92f9d21154c | 6849 | if (mode) |
wolfSSL | 0:d92f9d21154c | 6850 | ssl->options.quietShutdown = 1; |
wolfSSL | 0:d92f9d21154c | 6851 | } |
wolfSSL | 0:d92f9d21154c | 6852 | |
wolfSSL | 0:d92f9d21154c | 6853 | |
wolfSSL | 0:d92f9d21154c | 6854 | void wolfSSL_set_bio(WOLFSSL* ssl, WOLFSSL_BIO* rd, WOLFSSL_BIO* wr) |
wolfSSL | 0:d92f9d21154c | 6855 | { |
wolfSSL | 0:d92f9d21154c | 6856 | WOLFSSL_ENTER("SSL_set_bio"); |
wolfSSL | 0:d92f9d21154c | 6857 | wolfSSL_set_rfd(ssl, rd->fd); |
wolfSSL | 0:d92f9d21154c | 6858 | wolfSSL_set_wfd(ssl, wr->fd); |
wolfSSL | 0:d92f9d21154c | 6859 | |
wolfSSL | 0:d92f9d21154c | 6860 | ssl->biord = rd; |
wolfSSL | 0:d92f9d21154c | 6861 | ssl->biowr = wr; |
wolfSSL | 0:d92f9d21154c | 6862 | } |
wolfSSL | 0:d92f9d21154c | 6863 | |
wolfSSL | 0:d92f9d21154c | 6864 | |
wolfSSL | 0:d92f9d21154c | 6865 | void wolfSSL_CTX_set_client_CA_list(WOLFSSL_CTX* ctx, |
wolfSSL | 0:d92f9d21154c | 6866 | STACK_OF(WOLFSSL_X509_NAME)* names) |
wolfSSL | 0:d92f9d21154c | 6867 | { |
wolfSSL | 0:d92f9d21154c | 6868 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 6869 | (void)names; |
wolfSSL | 0:d92f9d21154c | 6870 | } |
wolfSSL | 0:d92f9d21154c | 6871 | |
wolfSSL | 0:d92f9d21154c | 6872 | |
wolfSSL | 0:d92f9d21154c | 6873 | STACK_OF(WOLFSSL_X509_NAME)* wolfSSL_load_client_CA_file(const char* fname) |
wolfSSL | 0:d92f9d21154c | 6874 | { |
wolfSSL | 0:d92f9d21154c | 6875 | (void)fname; |
wolfSSL | 0:d92f9d21154c | 6876 | return 0; |
wolfSSL | 0:d92f9d21154c | 6877 | } |
wolfSSL | 0:d92f9d21154c | 6878 | |
wolfSSL | 0:d92f9d21154c | 6879 | |
wolfSSL | 0:d92f9d21154c | 6880 | int wolfSSL_CTX_set_default_verify_paths(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 6881 | { |
wolfSSL | 0:d92f9d21154c | 6882 | /* TODO:, not needed in goahead */ |
wolfSSL | 0:d92f9d21154c | 6883 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 6884 | return SSL_NOT_IMPLEMENTED; |
wolfSSL | 0:d92f9d21154c | 6885 | } |
wolfSSL | 0:d92f9d21154c | 6886 | |
wolfSSL | 0:d92f9d21154c | 6887 | |
wolfSSL | 0:d92f9d21154c | 6888 | /* keyblock size in bytes or -1 */ |
wolfSSL | 0:d92f9d21154c | 6889 | int wolfSSL_get_keyblock_size(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 6890 | { |
wolfSSL | 0:d92f9d21154c | 6891 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 6892 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 6893 | |
wolfSSL | 0:d92f9d21154c | 6894 | return 2 * (ssl->specs.key_size + ssl->specs.iv_size + |
wolfSSL | 0:d92f9d21154c | 6895 | ssl->specs.hash_size); |
wolfSSL | 0:d92f9d21154c | 6896 | } |
wolfSSL | 0:d92f9d21154c | 6897 | |
wolfSSL | 0:d92f9d21154c | 6898 | |
wolfSSL | 0:d92f9d21154c | 6899 | /* store keys returns SSL_SUCCESS or -1 on error */ |
wolfSSL | 0:d92f9d21154c | 6900 | int wolfSSL_get_keys(WOLFSSL* ssl, unsigned char** ms, unsigned int* msLen, |
wolfSSL | 0:d92f9d21154c | 6901 | unsigned char** sr, unsigned int* srLen, |
wolfSSL | 0:d92f9d21154c | 6902 | unsigned char** cr, unsigned int* crLen) |
wolfSSL | 0:d92f9d21154c | 6903 | { |
wolfSSL | 0:d92f9d21154c | 6904 | if (ssl == NULL || ssl->arrays == NULL) |
wolfSSL | 0:d92f9d21154c | 6905 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 6906 | |
wolfSSL | 0:d92f9d21154c | 6907 | *ms = ssl->arrays->masterSecret; |
wolfSSL | 0:d92f9d21154c | 6908 | *sr = ssl->arrays->serverRandom; |
wolfSSL | 0:d92f9d21154c | 6909 | *cr = ssl->arrays->clientRandom; |
wolfSSL | 0:d92f9d21154c | 6910 | |
wolfSSL | 0:d92f9d21154c | 6911 | *msLen = SECRET_LEN; |
wolfSSL | 0:d92f9d21154c | 6912 | *srLen = RAN_LEN; |
wolfSSL | 0:d92f9d21154c | 6913 | *crLen = RAN_LEN; |
wolfSSL | 0:d92f9d21154c | 6914 | |
wolfSSL | 0:d92f9d21154c | 6915 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 6916 | } |
wolfSSL | 0:d92f9d21154c | 6917 | |
wolfSSL | 0:d92f9d21154c | 6918 | |
wolfSSL | 0:d92f9d21154c | 6919 | void wolfSSL_set_accept_state(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 6920 | { |
wolfSSL | 0:d92f9d21154c | 6921 | byte haveRSA = 1; |
wolfSSL | 0:d92f9d21154c | 6922 | byte havePSK = 0; |
wolfSSL | 0:d92f9d21154c | 6923 | |
wolfSSL | 0:d92f9d21154c | 6924 | WOLFSSL_ENTER("SSL_set_accept_state"); |
wolfSSL | 0:d92f9d21154c | 6925 | ssl->options.side = WOLFSSL_SERVER_END; |
wolfSSL | 0:d92f9d21154c | 6926 | /* reset suites in case user switched */ |
wolfSSL | 0:d92f9d21154c | 6927 | |
wolfSSL | 0:d92f9d21154c | 6928 | #ifdef NO_RSA |
wolfSSL | 0:d92f9d21154c | 6929 | haveRSA = 0; |
wolfSSL | 0:d92f9d21154c | 6930 | #endif |
wolfSSL | 0:d92f9d21154c | 6931 | #ifndef NO_PSK |
wolfSSL | 0:d92f9d21154c | 6932 | havePSK = ssl->options.havePSK; |
wolfSSL | 0:d92f9d21154c | 6933 | #endif |
wolfSSL | 0:d92f9d21154c | 6934 | InitSuites(ssl->suites, ssl->version, haveRSA, havePSK, |
wolfSSL | 0:d92f9d21154c | 6935 | ssl->options.haveDH, ssl->options.haveNTRU, |
wolfSSL | 0:d92f9d21154c | 6936 | ssl->options.haveECDSAsig, ssl->options.haveStaticECC, |
wolfSSL | 0:d92f9d21154c | 6937 | ssl->options.side); |
wolfSSL | 0:d92f9d21154c | 6938 | } |
wolfSSL | 0:d92f9d21154c | 6939 | #endif |
wolfSSL | 0:d92f9d21154c | 6940 | |
wolfSSL | 0:d92f9d21154c | 6941 | /* return true if connection established */ |
wolfSSL | 0:d92f9d21154c | 6942 | int wolfSSL_is_init_finished(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 6943 | { |
wolfSSL | 0:d92f9d21154c | 6944 | if (ssl == NULL) |
wolfSSL | 0:d92f9d21154c | 6945 | return 0; |
wolfSSL | 0:d92f9d21154c | 6946 | |
wolfSSL | 0:d92f9d21154c | 6947 | if (ssl->options.handShakeState == HANDSHAKE_DONE) |
wolfSSL | 0:d92f9d21154c | 6948 | return 1; |
wolfSSL | 0:d92f9d21154c | 6949 | |
wolfSSL | 0:d92f9d21154c | 6950 | return 0; |
wolfSSL | 0:d92f9d21154c | 6951 | } |
wolfSSL | 0:d92f9d21154c | 6952 | |
wolfSSL | 0:d92f9d21154c | 6953 | #if defined(OPENSSL_EXTRA) || defined(GOAHEAD_WS) |
wolfSSL | 0:d92f9d21154c | 6954 | void wolfSSL_CTX_set_tmp_rsa_callback(WOLFSSL_CTX* ctx, |
wolfSSL | 0:d92f9d21154c | 6955 | WOLFSSL_RSA*(*f)(WOLFSSL*, int, int)) |
wolfSSL | 0:d92f9d21154c | 6956 | { |
wolfSSL | 0:d92f9d21154c | 6957 | /* wolfSSL verifies all these internally */ |
wolfSSL | 0:d92f9d21154c | 6958 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 6959 | (void)f; |
wolfSSL | 0:d92f9d21154c | 6960 | } |
wolfSSL | 0:d92f9d21154c | 6961 | |
wolfSSL | 0:d92f9d21154c | 6962 | |
wolfSSL | 0:d92f9d21154c | 6963 | void wolfSSL_set_shutdown(WOLFSSL* ssl, int opt) |
wolfSSL | 0:d92f9d21154c | 6964 | { |
wolfSSL | 0:d92f9d21154c | 6965 | (void)ssl; |
wolfSSL | 0:d92f9d21154c | 6966 | (void)opt; |
wolfSSL | 0:d92f9d21154c | 6967 | } |
wolfSSL | 0:d92f9d21154c | 6968 | |
wolfSSL | 0:d92f9d21154c | 6969 | |
wolfSSL | 0:d92f9d21154c | 6970 | long wolfSSL_CTX_set_options(WOLFSSL_CTX* ctx, long opt) |
wolfSSL | 0:d92f9d21154c | 6971 | { |
wolfSSL | 0:d92f9d21154c | 6972 | /* goahead calls with 0, do nothing */ |
wolfSSL | 0:d92f9d21154c | 6973 | WOLFSSL_ENTER("SSL_CTX_set_options"); |
wolfSSL | 0:d92f9d21154c | 6974 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 6975 | return opt; |
wolfSSL | 0:d92f9d21154c | 6976 | } |
wolfSSL | 0:d92f9d21154c | 6977 | |
wolfSSL | 0:d92f9d21154c | 6978 | |
wolfSSL | 0:d92f9d21154c | 6979 | int wolfSSL_set_rfd(WOLFSSL* ssl, int rfd) |
wolfSSL | 0:d92f9d21154c | 6980 | { |
wolfSSL | 0:d92f9d21154c | 6981 | WOLFSSL_ENTER("SSL_set_rfd"); |
wolfSSL | 0:d92f9d21154c | 6982 | ssl->rfd = rfd; /* not used directly to allow IO callbacks */ |
wolfSSL | 0:d92f9d21154c | 6983 | |
wolfSSL | 0:d92f9d21154c | 6984 | ssl->IOCB_ReadCtx = &ssl->rfd; |
wolfSSL | 0:d92f9d21154c | 6985 | |
wolfSSL | 0:d92f9d21154c | 6986 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 6987 | } |
wolfSSL | 0:d92f9d21154c | 6988 | |
wolfSSL | 0:d92f9d21154c | 6989 | |
wolfSSL | 0:d92f9d21154c | 6990 | int wolfSSL_set_wfd(WOLFSSL* ssl, int wfd) |
wolfSSL | 0:d92f9d21154c | 6991 | { |
wolfSSL | 0:d92f9d21154c | 6992 | WOLFSSL_ENTER("SSL_set_wfd"); |
wolfSSL | 0:d92f9d21154c | 6993 | ssl->wfd = wfd; /* not used directly to allow IO callbacks */ |
wolfSSL | 0:d92f9d21154c | 6994 | |
wolfSSL | 0:d92f9d21154c | 6995 | ssl->IOCB_WriteCtx = &ssl->wfd; |
wolfSSL | 0:d92f9d21154c | 6996 | |
wolfSSL | 0:d92f9d21154c | 6997 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 6998 | } |
wolfSSL | 0:d92f9d21154c | 6999 | |
wolfSSL | 0:d92f9d21154c | 7000 | |
wolfSSL | 0:d92f9d21154c | 7001 | WOLFSSL_RSA* wolfSSL_RSA_generate_key(int len, unsigned long bits, |
wolfSSL | 0:d92f9d21154c | 7002 | void(*f)(int, int, void*), void* data) |
wolfSSL | 0:d92f9d21154c | 7003 | { |
wolfSSL | 0:d92f9d21154c | 7004 | /* no tmp key needed, actual generation not supported */ |
wolfSSL | 0:d92f9d21154c | 7005 | WOLFSSL_ENTER("RSA_generate_key"); |
wolfSSL | 0:d92f9d21154c | 7006 | (void)len; |
wolfSSL | 0:d92f9d21154c | 7007 | (void)bits; |
wolfSSL | 0:d92f9d21154c | 7008 | (void)f; |
wolfSSL | 0:d92f9d21154c | 7009 | (void)data; |
wolfSSL | 0:d92f9d21154c | 7010 | return NULL; |
wolfSSL | 0:d92f9d21154c | 7011 | } |
wolfSSL | 0:d92f9d21154c | 7012 | |
wolfSSL | 0:d92f9d21154c | 7013 | |
wolfSSL | 0:d92f9d21154c | 7014 | |
wolfSSL | 0:d92f9d21154c | 7015 | WOLFSSL_X509* wolfSSL_X509_STORE_CTX_get_current_cert( |
wolfSSL | 0:d92f9d21154c | 7016 | WOLFSSL_X509_STORE_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 7017 | { |
wolfSSL | 0:d92f9d21154c | 7018 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 7019 | return 0; |
wolfSSL | 0:d92f9d21154c | 7020 | } |
wolfSSL | 0:d92f9d21154c | 7021 | |
wolfSSL | 0:d92f9d21154c | 7022 | |
wolfSSL | 0:d92f9d21154c | 7023 | int wolfSSL_X509_STORE_CTX_get_error(WOLFSSL_X509_STORE_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 7024 | { |
wolfSSL | 0:d92f9d21154c | 7025 | if (ctx != NULL) |
wolfSSL | 0:d92f9d21154c | 7026 | return ctx->error; |
wolfSSL | 0:d92f9d21154c | 7027 | return 0; |
wolfSSL | 0:d92f9d21154c | 7028 | } |
wolfSSL | 0:d92f9d21154c | 7029 | |
wolfSSL | 0:d92f9d21154c | 7030 | |
wolfSSL | 0:d92f9d21154c | 7031 | int wolfSSL_X509_STORE_CTX_get_error_depth(WOLFSSL_X509_STORE_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 7032 | { |
wolfSSL | 0:d92f9d21154c | 7033 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 7034 | return 0; |
wolfSSL | 0:d92f9d21154c | 7035 | } |
wolfSSL | 0:d92f9d21154c | 7036 | |
wolfSSL | 0:d92f9d21154c | 7037 | |
wolfSSL | 0:d92f9d21154c | 7038 | WOLFSSL_BIO_METHOD* wolfSSL_BIO_f_buffer(void) |
wolfSSL | 0:d92f9d21154c | 7039 | { |
wolfSSL | 0:d92f9d21154c | 7040 | static WOLFSSL_BIO_METHOD meth; |
wolfSSL | 0:d92f9d21154c | 7041 | |
wolfSSL | 0:d92f9d21154c | 7042 | WOLFSSL_ENTER("BIO_f_buffer"); |
wolfSSL | 0:d92f9d21154c | 7043 | meth.type = BIO_BUFFER; |
wolfSSL | 0:d92f9d21154c | 7044 | |
wolfSSL | 0:d92f9d21154c | 7045 | return &meth; |
wolfSSL | 0:d92f9d21154c | 7046 | } |
wolfSSL | 0:d92f9d21154c | 7047 | |
wolfSSL | 0:d92f9d21154c | 7048 | |
wolfSSL | 0:d92f9d21154c | 7049 | long wolfSSL_BIO_set_write_buffer_size(WOLFSSL_BIO* bio, long size) |
wolfSSL | 0:d92f9d21154c | 7050 | { |
wolfSSL | 0:d92f9d21154c | 7051 | /* wolfSSL has internal buffer, compatibility only */ |
wolfSSL | 0:d92f9d21154c | 7052 | WOLFSSL_ENTER("BIO_set_write_buffer_size"); |
wolfSSL | 0:d92f9d21154c | 7053 | (void)bio; |
wolfSSL | 0:d92f9d21154c | 7054 | return size; |
wolfSSL | 0:d92f9d21154c | 7055 | } |
wolfSSL | 0:d92f9d21154c | 7056 | |
wolfSSL | 0:d92f9d21154c | 7057 | |
wolfSSL | 0:d92f9d21154c | 7058 | WOLFSSL_BIO_METHOD* wolfSSL_BIO_f_ssl(void) |
wolfSSL | 0:d92f9d21154c | 7059 | { |
wolfSSL | 0:d92f9d21154c | 7060 | static WOLFSSL_BIO_METHOD meth; |
wolfSSL | 0:d92f9d21154c | 7061 | |
wolfSSL | 0:d92f9d21154c | 7062 | WOLFSSL_ENTER("BIO_f_ssl"); |
wolfSSL | 0:d92f9d21154c | 7063 | meth.type = BIO_SSL; |
wolfSSL | 0:d92f9d21154c | 7064 | |
wolfSSL | 0:d92f9d21154c | 7065 | return &meth; |
wolfSSL | 0:d92f9d21154c | 7066 | } |
wolfSSL | 0:d92f9d21154c | 7067 | |
wolfSSL | 0:d92f9d21154c | 7068 | |
wolfSSL | 0:d92f9d21154c | 7069 | WOLFSSL_BIO* wolfSSL_BIO_new_socket(int sfd, int closeF) |
wolfSSL | 0:d92f9d21154c | 7070 | { |
wolfSSL | 0:d92f9d21154c | 7071 | WOLFSSL_BIO* bio = (WOLFSSL_BIO*) XMALLOC(sizeof(WOLFSSL_BIO), 0, |
wolfSSL | 0:d92f9d21154c | 7072 | DYNAMIC_TYPE_OPENSSL); |
wolfSSL | 0:d92f9d21154c | 7073 | |
wolfSSL | 0:d92f9d21154c | 7074 | WOLFSSL_ENTER("BIO_new_socket"); |
wolfSSL | 0:d92f9d21154c | 7075 | if (bio) { |
wolfSSL | 0:d92f9d21154c | 7076 | bio->type = BIO_SOCKET; |
wolfSSL | 0:d92f9d21154c | 7077 | bio->close = (byte)closeF; |
wolfSSL | 0:d92f9d21154c | 7078 | bio->eof = 0; |
wolfSSL | 0:d92f9d21154c | 7079 | bio->ssl = 0; |
wolfSSL | 0:d92f9d21154c | 7080 | bio->fd = sfd; |
wolfSSL | 0:d92f9d21154c | 7081 | bio->prev = 0; |
wolfSSL | 0:d92f9d21154c | 7082 | bio->next = 0; |
wolfSSL | 0:d92f9d21154c | 7083 | bio->mem = NULL; |
wolfSSL | 0:d92f9d21154c | 7084 | bio->memLen = 0; |
wolfSSL | 0:d92f9d21154c | 7085 | } |
wolfSSL | 0:d92f9d21154c | 7086 | return bio; |
wolfSSL | 0:d92f9d21154c | 7087 | } |
wolfSSL | 0:d92f9d21154c | 7088 | |
wolfSSL | 0:d92f9d21154c | 7089 | |
wolfSSL | 0:d92f9d21154c | 7090 | int wolfSSL_BIO_eof(WOLFSSL_BIO* b) |
wolfSSL | 0:d92f9d21154c | 7091 | { |
wolfSSL | 0:d92f9d21154c | 7092 | WOLFSSL_ENTER("BIO_eof"); |
wolfSSL | 0:d92f9d21154c | 7093 | if (b->eof) |
wolfSSL | 0:d92f9d21154c | 7094 | return 1; |
wolfSSL | 0:d92f9d21154c | 7095 | |
wolfSSL | 0:d92f9d21154c | 7096 | return 0; |
wolfSSL | 0:d92f9d21154c | 7097 | } |
wolfSSL | 0:d92f9d21154c | 7098 | |
wolfSSL | 0:d92f9d21154c | 7099 | |
wolfSSL | 0:d92f9d21154c | 7100 | long wolfSSL_BIO_set_ssl(WOLFSSL_BIO* b, WOLFSSL* ssl, int closeF) |
wolfSSL | 0:d92f9d21154c | 7101 | { |
wolfSSL | 0:d92f9d21154c | 7102 | WOLFSSL_ENTER("BIO_set_ssl"); |
wolfSSL | 0:d92f9d21154c | 7103 | b->ssl = ssl; |
wolfSSL | 0:d92f9d21154c | 7104 | b->close = (byte)closeF; |
wolfSSL | 0:d92f9d21154c | 7105 | /* add to ssl for bio free if SSL_free called before/instead of free_all? */ |
wolfSSL | 0:d92f9d21154c | 7106 | |
wolfSSL | 0:d92f9d21154c | 7107 | return 0; |
wolfSSL | 0:d92f9d21154c | 7108 | } |
wolfSSL | 0:d92f9d21154c | 7109 | |
wolfSSL | 0:d92f9d21154c | 7110 | |
wolfSSL | 0:d92f9d21154c | 7111 | WOLFSSL_BIO* wolfSSL_BIO_new(WOLFSSL_BIO_METHOD* method) |
wolfSSL | 0:d92f9d21154c | 7112 | { |
wolfSSL | 0:d92f9d21154c | 7113 | WOLFSSL_BIO* bio = (WOLFSSL_BIO*) XMALLOC(sizeof(WOLFSSL_BIO), 0, |
wolfSSL | 0:d92f9d21154c | 7114 | DYNAMIC_TYPE_OPENSSL); |
wolfSSL | 0:d92f9d21154c | 7115 | WOLFSSL_ENTER("BIO_new"); |
wolfSSL | 0:d92f9d21154c | 7116 | if (bio) { |
wolfSSL | 0:d92f9d21154c | 7117 | bio->type = method->type; |
wolfSSL | 0:d92f9d21154c | 7118 | bio->close = 0; |
wolfSSL | 0:d92f9d21154c | 7119 | bio->eof = 0; |
wolfSSL | 0:d92f9d21154c | 7120 | bio->ssl = NULL; |
wolfSSL | 0:d92f9d21154c | 7121 | bio->mem = NULL; |
wolfSSL | 0:d92f9d21154c | 7122 | bio->memLen = 0; |
wolfSSL | 0:d92f9d21154c | 7123 | bio->fd = 0; |
wolfSSL | 0:d92f9d21154c | 7124 | bio->prev = NULL; |
wolfSSL | 0:d92f9d21154c | 7125 | bio->next = NULL; |
wolfSSL | 0:d92f9d21154c | 7126 | } |
wolfSSL | 0:d92f9d21154c | 7127 | return bio; |
wolfSSL | 0:d92f9d21154c | 7128 | } |
wolfSSL | 0:d92f9d21154c | 7129 | |
wolfSSL | 0:d92f9d21154c | 7130 | |
wolfSSL | 0:d92f9d21154c | 7131 | int wolfSSL_BIO_get_mem_data(WOLFSSL_BIO* bio, const byte** p) |
wolfSSL | 0:d92f9d21154c | 7132 | { |
wolfSSL | 0:d92f9d21154c | 7133 | if (bio == NULL || p == NULL) |
wolfSSL | 0:d92f9d21154c | 7134 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 7135 | |
wolfSSL | 0:d92f9d21154c | 7136 | *p = bio->mem; |
wolfSSL | 0:d92f9d21154c | 7137 | |
wolfSSL | 0:d92f9d21154c | 7138 | return bio->memLen; |
wolfSSL | 0:d92f9d21154c | 7139 | } |
wolfSSL | 0:d92f9d21154c | 7140 | |
wolfSSL | 0:d92f9d21154c | 7141 | |
wolfSSL | 0:d92f9d21154c | 7142 | WOLFSSL_BIO* wolfSSL_BIO_new_mem_buf(void* buf, int len) |
wolfSSL | 0:d92f9d21154c | 7143 | { |
wolfSSL | 0:d92f9d21154c | 7144 | WOLFSSL_BIO* bio = NULL; |
wolfSSL | 0:d92f9d21154c | 7145 | if (buf == NULL) |
wolfSSL | 0:d92f9d21154c | 7146 | return bio; |
wolfSSL | 0:d92f9d21154c | 7147 | |
wolfSSL | 0:d92f9d21154c | 7148 | bio = wolfSSL_BIO_new(wolfSSL_BIO_s_mem()); |
wolfSSL | 0:d92f9d21154c | 7149 | if (bio == NULL) |
wolfSSL | 0:d92f9d21154c | 7150 | return bio; |
wolfSSL | 0:d92f9d21154c | 7151 | |
wolfSSL | 0:d92f9d21154c | 7152 | bio->memLen = len; |
wolfSSL | 0:d92f9d21154c | 7153 | bio->mem = (byte*)XMALLOC(len, 0, DYNAMIC_TYPE_OPENSSL); |
wolfSSL | 0:d92f9d21154c | 7154 | if (bio->mem == NULL) { |
wolfSSL | 0:d92f9d21154c | 7155 | XFREE(bio, 0, DYNAMIC_TYPE_OPENSSL); |
wolfSSL | 0:d92f9d21154c | 7156 | return NULL; |
wolfSSL | 0:d92f9d21154c | 7157 | } |
wolfSSL | 0:d92f9d21154c | 7158 | |
wolfSSL | 0:d92f9d21154c | 7159 | XMEMCPY(bio->mem, buf, len); |
wolfSSL | 0:d92f9d21154c | 7160 | |
wolfSSL | 0:d92f9d21154c | 7161 | return bio; |
wolfSSL | 0:d92f9d21154c | 7162 | } |
wolfSSL | 0:d92f9d21154c | 7163 | |
wolfSSL | 0:d92f9d21154c | 7164 | |
wolfSSL | 0:d92f9d21154c | 7165 | #ifdef USE_WINDOWS_API |
wolfSSL | 0:d92f9d21154c | 7166 | #define CloseSocket(s) closesocket(s) |
wolfSSL | 0:d92f9d21154c | 7167 | #elif defined(WOLFSSL_MDK_ARM) |
wolfSSL | 0:d92f9d21154c | 7168 | #define CloseSocket(s) closesocket(s) |
wolfSSL | 0:d92f9d21154c | 7169 | extern int closesocket(int) ; |
wolfSSL | 0:d92f9d21154c | 7170 | #else |
wolfSSL | 0:d92f9d21154c | 7171 | #define CloseSocket(s) close(s) |
wolfSSL | 0:d92f9d21154c | 7172 | #endif |
wolfSSL | 0:d92f9d21154c | 7173 | |
wolfSSL | 0:d92f9d21154c | 7174 | int wolfSSL_BIO_free(WOLFSSL_BIO* bio) |
wolfSSL | 0:d92f9d21154c | 7175 | { |
wolfSSL | 0:d92f9d21154c | 7176 | /* unchain?, doesn't matter in goahead since from free all */ |
wolfSSL | 0:d92f9d21154c | 7177 | WOLFSSL_ENTER("BIO_free"); |
wolfSSL | 0:d92f9d21154c | 7178 | if (bio) { |
wolfSSL | 0:d92f9d21154c | 7179 | if (bio->close) { |
wolfSSL | 0:d92f9d21154c | 7180 | if (bio->ssl) |
wolfSSL | 0:d92f9d21154c | 7181 | wolfSSL_free(bio->ssl); |
wolfSSL | 0:d92f9d21154c | 7182 | if (bio->fd) |
wolfSSL | 0:d92f9d21154c | 7183 | CloseSocket(bio->fd); |
wolfSSL | 0:d92f9d21154c | 7184 | } |
wolfSSL | 0:d92f9d21154c | 7185 | if (bio->mem) |
wolfSSL | 0:d92f9d21154c | 7186 | XFREE(bio->mem, 0, DYNAMIC_TYPE_OPENSSL); |
wolfSSL | 0:d92f9d21154c | 7187 | XFREE(bio, 0, DYNAMIC_TYPE_OPENSSL); |
wolfSSL | 0:d92f9d21154c | 7188 | } |
wolfSSL | 0:d92f9d21154c | 7189 | return 0; |
wolfSSL | 0:d92f9d21154c | 7190 | } |
wolfSSL | 0:d92f9d21154c | 7191 | |
wolfSSL | 0:d92f9d21154c | 7192 | |
wolfSSL | 0:d92f9d21154c | 7193 | int wolfSSL_BIO_free_all(WOLFSSL_BIO* bio) |
wolfSSL | 0:d92f9d21154c | 7194 | { |
wolfSSL | 0:d92f9d21154c | 7195 | WOLFSSL_ENTER("BIO_free_all"); |
wolfSSL | 0:d92f9d21154c | 7196 | while (bio) { |
wolfSSL | 0:d92f9d21154c | 7197 | WOLFSSL_BIO* next = bio->next; |
wolfSSL | 0:d92f9d21154c | 7198 | wolfSSL_BIO_free(bio); |
wolfSSL | 0:d92f9d21154c | 7199 | bio = next; |
wolfSSL | 0:d92f9d21154c | 7200 | } |
wolfSSL | 0:d92f9d21154c | 7201 | return 0; |
wolfSSL | 0:d92f9d21154c | 7202 | } |
wolfSSL | 0:d92f9d21154c | 7203 | |
wolfSSL | 0:d92f9d21154c | 7204 | |
wolfSSL | 0:d92f9d21154c | 7205 | int wolfSSL_BIO_read(WOLFSSL_BIO* bio, void* buf, int len) |
wolfSSL | 0:d92f9d21154c | 7206 | { |
wolfSSL | 0:d92f9d21154c | 7207 | int ret; |
wolfSSL | 0:d92f9d21154c | 7208 | WOLFSSL* ssl = 0; |
wolfSSL | 0:d92f9d21154c | 7209 | WOLFSSL_BIO* front = bio; |
wolfSSL | 0:d92f9d21154c | 7210 | |
wolfSSL | 0:d92f9d21154c | 7211 | WOLFSSL_ENTER("BIO_read"); |
wolfSSL | 0:d92f9d21154c | 7212 | /* already got eof, again is error */ |
wolfSSL | 0:d92f9d21154c | 7213 | if (front->eof) |
wolfSSL | 0:d92f9d21154c | 7214 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 7215 | |
wolfSSL | 0:d92f9d21154c | 7216 | while(bio && ((ssl = bio->ssl) == 0) ) |
wolfSSL | 0:d92f9d21154c | 7217 | bio = bio->next; |
wolfSSL | 0:d92f9d21154c | 7218 | |
wolfSSL | 0:d92f9d21154c | 7219 | if (ssl == 0) return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 7220 | |
wolfSSL | 0:d92f9d21154c | 7221 | ret = wolfSSL_read(ssl, buf, len); |
wolfSSL | 0:d92f9d21154c | 7222 | if (ret == 0) |
wolfSSL | 0:d92f9d21154c | 7223 | front->eof = 1; |
wolfSSL | 0:d92f9d21154c | 7224 | else if (ret < 0) { |
wolfSSL | 0:d92f9d21154c | 7225 | int err = wolfSSL_get_error(ssl, 0); |
wolfSSL | 0:d92f9d21154c | 7226 | if ( !(err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) ) |
wolfSSL | 0:d92f9d21154c | 7227 | front->eof = 1; |
wolfSSL | 0:d92f9d21154c | 7228 | } |
wolfSSL | 0:d92f9d21154c | 7229 | return ret; |
wolfSSL | 0:d92f9d21154c | 7230 | } |
wolfSSL | 0:d92f9d21154c | 7231 | |
wolfSSL | 0:d92f9d21154c | 7232 | |
wolfSSL | 0:d92f9d21154c | 7233 | int wolfSSL_BIO_write(WOLFSSL_BIO* bio, const void* data, int len) |
wolfSSL | 0:d92f9d21154c | 7234 | { |
wolfSSL | 0:d92f9d21154c | 7235 | int ret; |
wolfSSL | 0:d92f9d21154c | 7236 | WOLFSSL* ssl = 0; |
wolfSSL | 0:d92f9d21154c | 7237 | WOLFSSL_BIO* front = bio; |
wolfSSL | 0:d92f9d21154c | 7238 | |
wolfSSL | 0:d92f9d21154c | 7239 | WOLFSSL_ENTER("BIO_write"); |
wolfSSL | 0:d92f9d21154c | 7240 | /* already got eof, again is error */ |
wolfSSL | 0:d92f9d21154c | 7241 | if (front->eof) |
wolfSSL | 0:d92f9d21154c | 7242 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 7243 | |
wolfSSL | 0:d92f9d21154c | 7244 | while(bio && ((ssl = bio->ssl) == 0) ) |
wolfSSL | 0:d92f9d21154c | 7245 | bio = bio->next; |
wolfSSL | 0:d92f9d21154c | 7246 | |
wolfSSL | 0:d92f9d21154c | 7247 | if (ssl == 0) return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 7248 | |
wolfSSL | 0:d92f9d21154c | 7249 | ret = wolfSSL_write(ssl, data, len); |
wolfSSL | 0:d92f9d21154c | 7250 | if (ret == 0) |
wolfSSL | 0:d92f9d21154c | 7251 | front->eof = 1; |
wolfSSL | 0:d92f9d21154c | 7252 | else if (ret < 0) { |
wolfSSL | 0:d92f9d21154c | 7253 | int err = wolfSSL_get_error(ssl, 0); |
wolfSSL | 0:d92f9d21154c | 7254 | if ( !(err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) ) |
wolfSSL | 0:d92f9d21154c | 7255 | front->eof = 1; |
wolfSSL | 0:d92f9d21154c | 7256 | } |
wolfSSL | 0:d92f9d21154c | 7257 | |
wolfSSL | 0:d92f9d21154c | 7258 | return ret; |
wolfSSL | 0:d92f9d21154c | 7259 | } |
wolfSSL | 0:d92f9d21154c | 7260 | |
wolfSSL | 0:d92f9d21154c | 7261 | |
wolfSSL | 0:d92f9d21154c | 7262 | WOLFSSL_BIO* wolfSSL_BIO_push(WOLFSSL_BIO* top, WOLFSSL_BIO* append) |
wolfSSL | 0:d92f9d21154c | 7263 | { |
wolfSSL | 0:d92f9d21154c | 7264 | WOLFSSL_ENTER("BIO_push"); |
wolfSSL | 0:d92f9d21154c | 7265 | top->next = append; |
wolfSSL | 0:d92f9d21154c | 7266 | append->prev = top; |
wolfSSL | 0:d92f9d21154c | 7267 | |
wolfSSL | 0:d92f9d21154c | 7268 | return top; |
wolfSSL | 0:d92f9d21154c | 7269 | } |
wolfSSL | 0:d92f9d21154c | 7270 | |
wolfSSL | 0:d92f9d21154c | 7271 | |
wolfSSL | 0:d92f9d21154c | 7272 | int wolfSSL_BIO_flush(WOLFSSL_BIO* bio) |
wolfSSL | 0:d92f9d21154c | 7273 | { |
wolfSSL | 0:d92f9d21154c | 7274 | /* for wolfSSL no flushing needed */ |
wolfSSL | 0:d92f9d21154c | 7275 | WOLFSSL_ENTER("BIO_flush"); |
wolfSSL | 0:d92f9d21154c | 7276 | (void)bio; |
wolfSSL | 0:d92f9d21154c | 7277 | return 1; |
wolfSSL | 0:d92f9d21154c | 7278 | } |
wolfSSL | 0:d92f9d21154c | 7279 | |
wolfSSL | 0:d92f9d21154c | 7280 | |
wolfSSL | 0:d92f9d21154c | 7281 | #endif /* OPENSSL_EXTRA || GOAHEAD_WS */ |
wolfSSL | 0:d92f9d21154c | 7282 | |
wolfSSL | 0:d92f9d21154c | 7283 | |
wolfSSL | 0:d92f9d21154c | 7284 | #if defined(OPENSSL_EXTRA) || defined(HAVE_WEBSERVER) |
wolfSSL | 0:d92f9d21154c | 7285 | |
wolfSSL | 0:d92f9d21154c | 7286 | void wolfSSL_CTX_set_default_passwd_cb_userdata(WOLFSSL_CTX* ctx, |
wolfSSL | 0:d92f9d21154c | 7287 | void* userdata) |
wolfSSL | 0:d92f9d21154c | 7288 | { |
wolfSSL | 0:d92f9d21154c | 7289 | WOLFSSL_ENTER("SSL_CTX_set_default_passwd_cb_userdata"); |
wolfSSL | 0:d92f9d21154c | 7290 | ctx->userdata = userdata; |
wolfSSL | 0:d92f9d21154c | 7291 | } |
wolfSSL | 0:d92f9d21154c | 7292 | |
wolfSSL | 0:d92f9d21154c | 7293 | |
wolfSSL | 0:d92f9d21154c | 7294 | void wolfSSL_CTX_set_default_passwd_cb(WOLFSSL_CTX* ctx, pem_password_cb cb) |
wolfSSL | 0:d92f9d21154c | 7295 | { |
wolfSSL | 0:d92f9d21154c | 7296 | WOLFSSL_ENTER("SSL_CTX_set_default_passwd_cb"); |
wolfSSL | 0:d92f9d21154c | 7297 | ctx->passwd_cb = cb; |
wolfSSL | 0:d92f9d21154c | 7298 | } |
wolfSSL | 0:d92f9d21154c | 7299 | |
wolfSSL | 0:d92f9d21154c | 7300 | int wolfSSL_num_locks(void) |
wolfSSL | 0:d92f9d21154c | 7301 | { |
wolfSSL | 0:d92f9d21154c | 7302 | return 0; |
wolfSSL | 0:d92f9d21154c | 7303 | } |
wolfSSL | 0:d92f9d21154c | 7304 | |
wolfSSL | 0:d92f9d21154c | 7305 | void wolfSSL_set_locking_callback(void (*f)(int, int, const char*, int)) |
wolfSSL | 0:d92f9d21154c | 7306 | { |
wolfSSL | 0:d92f9d21154c | 7307 | (void)f; |
wolfSSL | 0:d92f9d21154c | 7308 | } |
wolfSSL | 0:d92f9d21154c | 7309 | |
wolfSSL | 0:d92f9d21154c | 7310 | void wolfSSL_set_id_callback(unsigned long (*f)(void)) |
wolfSSL | 0:d92f9d21154c | 7311 | { |
wolfSSL | 0:d92f9d21154c | 7312 | (void)f; |
wolfSSL | 0:d92f9d21154c | 7313 | } |
wolfSSL | 0:d92f9d21154c | 7314 | |
wolfSSL | 0:d92f9d21154c | 7315 | unsigned long wolfSSL_ERR_get_error(void) |
wolfSSL | 0:d92f9d21154c | 7316 | { |
wolfSSL | 0:d92f9d21154c | 7317 | /* TODO: */ |
wolfSSL | 0:d92f9d21154c | 7318 | return 0; |
wolfSSL | 0:d92f9d21154c | 7319 | } |
wolfSSL | 0:d92f9d21154c | 7320 | |
wolfSSL | 0:d92f9d21154c | 7321 | #ifndef NO_MD5 |
wolfSSL | 0:d92f9d21154c | 7322 | |
wolfSSL | 0:d92f9d21154c | 7323 | int wolfSSL_EVP_BytesToKey(const WOLFSSL_EVP_CIPHER* type, |
wolfSSL | 0:d92f9d21154c | 7324 | const WOLFSSL_EVP_MD* md, const byte* salt, |
wolfSSL | 0:d92f9d21154c | 7325 | const byte* data, int sz, int count, byte* key, byte* iv) |
wolfSSL | 0:d92f9d21154c | 7326 | { |
wolfSSL | 0:d92f9d21154c | 7327 | int keyLen = 0; |
wolfSSL | 0:d92f9d21154c | 7328 | int ivLen = 0; |
wolfSSL | 0:d92f9d21154c | 7329 | int j; |
wolfSSL | 0:d92f9d21154c | 7330 | int keyLeft; |
wolfSSL | 0:d92f9d21154c | 7331 | int ivLeft; |
wolfSSL | 0:d92f9d21154c | 7332 | int keyOutput = 0; |
wolfSSL | 0:d92f9d21154c | 7333 | byte digest[MD5_DIGEST_SIZE]; |
wolfSSL | 0:d92f9d21154c | 7334 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 7335 | Md5* md5 = NULL; |
wolfSSL | 0:d92f9d21154c | 7336 | #else |
wolfSSL | 0:d92f9d21154c | 7337 | Md5 md5[1]; |
wolfSSL | 0:d92f9d21154c | 7338 | #endif |
wolfSSL | 0:d92f9d21154c | 7339 | |
wolfSSL | 0:d92f9d21154c | 7340 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 7341 | md5 = (Md5*)XMALLOC(sizeof(Md5), NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 7342 | if (md5 == NULL) |
wolfSSL | 0:d92f9d21154c | 7343 | return 0; |
wolfSSL | 0:d92f9d21154c | 7344 | #endif |
wolfSSL | 0:d92f9d21154c | 7345 | |
wolfSSL | 0:d92f9d21154c | 7346 | WOLFSSL_ENTER("EVP_BytesToKey"); |
wolfSSL | 0:d92f9d21154c | 7347 | wc_InitMd5(md5); |
wolfSSL | 0:d92f9d21154c | 7348 | |
wolfSSL | 0:d92f9d21154c | 7349 | /* only support MD5 for now */ |
wolfSSL | 0:d92f9d21154c | 7350 | if (XSTRNCMP(md, "MD5", 3) != 0) return 0; |
wolfSSL | 0:d92f9d21154c | 7351 | |
wolfSSL | 0:d92f9d21154c | 7352 | /* only support CBC DES and AES for now */ |
wolfSSL | 0:d92f9d21154c | 7353 | if (XSTRNCMP(type, "DES-CBC", 7) == 0) { |
wolfSSL | 0:d92f9d21154c | 7354 | keyLen = DES_KEY_SIZE; |
wolfSSL | 0:d92f9d21154c | 7355 | ivLen = DES_IV_SIZE; |
wolfSSL | 0:d92f9d21154c | 7356 | } |
wolfSSL | 0:d92f9d21154c | 7357 | else if (XSTRNCMP(type, "DES-EDE3-CBC", 12) == 0) { |
wolfSSL | 0:d92f9d21154c | 7358 | keyLen = DES3_KEY_SIZE; |
wolfSSL | 0:d92f9d21154c | 7359 | ivLen = DES_IV_SIZE; |
wolfSSL | 0:d92f9d21154c | 7360 | } |
wolfSSL | 0:d92f9d21154c | 7361 | else if (XSTRNCMP(type, "AES-128-CBC", 11) == 0) { |
wolfSSL | 0:d92f9d21154c | 7362 | keyLen = AES_128_KEY_SIZE; |
wolfSSL | 0:d92f9d21154c | 7363 | ivLen = AES_IV_SIZE; |
wolfSSL | 0:d92f9d21154c | 7364 | } |
wolfSSL | 0:d92f9d21154c | 7365 | else if (XSTRNCMP(type, "AES-192-CBC", 11) == 0) { |
wolfSSL | 0:d92f9d21154c | 7366 | keyLen = AES_192_KEY_SIZE; |
wolfSSL | 0:d92f9d21154c | 7367 | ivLen = AES_IV_SIZE; |
wolfSSL | 0:d92f9d21154c | 7368 | } |
wolfSSL | 0:d92f9d21154c | 7369 | else if (XSTRNCMP(type, "AES-256-CBC", 11) == 0) { |
wolfSSL | 0:d92f9d21154c | 7370 | keyLen = AES_256_KEY_SIZE; |
wolfSSL | 0:d92f9d21154c | 7371 | ivLen = AES_IV_SIZE; |
wolfSSL | 0:d92f9d21154c | 7372 | } |
wolfSSL | 0:d92f9d21154c | 7373 | else { |
wolfSSL | 0:d92f9d21154c | 7374 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 7375 | XFREE(md5, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 7376 | #endif |
wolfSSL | 0:d92f9d21154c | 7377 | return 0; |
wolfSSL | 0:d92f9d21154c | 7378 | } |
wolfSSL | 0:d92f9d21154c | 7379 | |
wolfSSL | 0:d92f9d21154c | 7380 | keyLeft = keyLen; |
wolfSSL | 0:d92f9d21154c | 7381 | ivLeft = ivLen; |
wolfSSL | 0:d92f9d21154c | 7382 | |
wolfSSL | 0:d92f9d21154c | 7383 | while (keyOutput < (keyLen + ivLen)) { |
wolfSSL | 0:d92f9d21154c | 7384 | int digestLeft = MD5_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 7385 | /* D_(i - 1) */ |
wolfSSL | 0:d92f9d21154c | 7386 | if (keyOutput) /* first time D_0 is empty */ |
wolfSSL | 0:d92f9d21154c | 7387 | wc_Md5Update(md5, digest, MD5_DIGEST_SIZE); |
wolfSSL | 0:d92f9d21154c | 7388 | /* data */ |
wolfSSL | 0:d92f9d21154c | 7389 | wc_Md5Update(md5, data, sz); |
wolfSSL | 0:d92f9d21154c | 7390 | /* salt */ |
wolfSSL | 0:d92f9d21154c | 7391 | if (salt) |
wolfSSL | 0:d92f9d21154c | 7392 | wc_Md5Update(md5, salt, EVP_SALT_SIZE); |
wolfSSL | 0:d92f9d21154c | 7393 | wc_Md5Final(md5, digest); |
wolfSSL | 0:d92f9d21154c | 7394 | /* count */ |
wolfSSL | 0:d92f9d21154c | 7395 | for (j = 1; j < count; j++) { |
wolfSSL | 0:d92f9d21154c | 7396 | wc_Md5Update(md5, digest, MD5_DIGEST_SIZE); |
wolfSSL | 0:d92f9d21154c | 7397 | wc_Md5Final(md5, digest); |
wolfSSL | 0:d92f9d21154c | 7398 | } |
wolfSSL | 0:d92f9d21154c | 7399 | |
wolfSSL | 0:d92f9d21154c | 7400 | if (keyLeft) { |
wolfSSL | 0:d92f9d21154c | 7401 | int store = min(keyLeft, MD5_DIGEST_SIZE); |
wolfSSL | 0:d92f9d21154c | 7402 | XMEMCPY(&key[keyLen - keyLeft], digest, store); |
wolfSSL | 0:d92f9d21154c | 7403 | |
wolfSSL | 0:d92f9d21154c | 7404 | keyOutput += store; |
wolfSSL | 0:d92f9d21154c | 7405 | keyLeft -= store; |
wolfSSL | 0:d92f9d21154c | 7406 | digestLeft -= store; |
wolfSSL | 0:d92f9d21154c | 7407 | } |
wolfSSL | 0:d92f9d21154c | 7408 | |
wolfSSL | 0:d92f9d21154c | 7409 | if (ivLeft && digestLeft) { |
wolfSSL | 0:d92f9d21154c | 7410 | int store = min(ivLeft, digestLeft); |
wolfSSL | 0:d92f9d21154c | 7411 | XMEMCPY(&iv[ivLen - ivLeft], &digest[MD5_DIGEST_SIZE - |
wolfSSL | 0:d92f9d21154c | 7412 | digestLeft], store); |
wolfSSL | 0:d92f9d21154c | 7413 | keyOutput += store; |
wolfSSL | 0:d92f9d21154c | 7414 | ivLeft -= store; |
wolfSSL | 0:d92f9d21154c | 7415 | } |
wolfSSL | 0:d92f9d21154c | 7416 | } |
wolfSSL | 0:d92f9d21154c | 7417 | |
wolfSSL | 0:d92f9d21154c | 7418 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 7419 | XFREE(md5, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 7420 | #endif |
wolfSSL | 0:d92f9d21154c | 7421 | |
wolfSSL | 0:d92f9d21154c | 7422 | return keyOutput == (keyLen + ivLen) ? keyOutput : 0; |
wolfSSL | 0:d92f9d21154c | 7423 | } |
wolfSSL | 0:d92f9d21154c | 7424 | |
wolfSSL | 0:d92f9d21154c | 7425 | #endif /* NO_MD5 */ |
wolfSSL | 0:d92f9d21154c | 7426 | |
wolfSSL | 0:d92f9d21154c | 7427 | #endif /* OPENSSL_EXTRA || HAVE_WEBSERVER */ |
wolfSSL | 0:d92f9d21154c | 7428 | |
wolfSSL | 0:d92f9d21154c | 7429 | |
wolfSSL | 0:d92f9d21154c | 7430 | #ifdef OPENSSL_EXTRA |
wolfSSL | 0:d92f9d21154c | 7431 | |
wolfSSL | 0:d92f9d21154c | 7432 | unsigned long wolfSSLeay(void) |
wolfSSL | 0:d92f9d21154c | 7433 | { |
wolfSSL | 0:d92f9d21154c | 7434 | return SSLEAY_VERSION_NUMBER; |
wolfSSL | 0:d92f9d21154c | 7435 | } |
wolfSSL | 0:d92f9d21154c | 7436 | |
wolfSSL | 0:d92f9d21154c | 7437 | |
wolfSSL | 0:d92f9d21154c | 7438 | const char* wolfSSLeay_version(int type) |
wolfSSL | 0:d92f9d21154c | 7439 | { |
wolfSSL | 0:d92f9d21154c | 7440 | static const char* version = "SSLeay wolfSSL compatibility"; |
wolfSSL | 0:d92f9d21154c | 7441 | (void)type; |
wolfSSL | 0:d92f9d21154c | 7442 | return version; |
wolfSSL | 0:d92f9d21154c | 7443 | } |
wolfSSL | 0:d92f9d21154c | 7444 | |
wolfSSL | 0:d92f9d21154c | 7445 | |
wolfSSL | 0:d92f9d21154c | 7446 | #ifndef NO_MD5 |
wolfSSL | 0:d92f9d21154c | 7447 | void wolfSSL_MD5_Init(WOLFSSL_MD5_CTX* md5) |
wolfSSL | 0:d92f9d21154c | 7448 | { |
wolfSSL | 0:d92f9d21154c | 7449 | typedef char md5_test[sizeof(MD5_CTX) >= sizeof(Md5) ? 1 : -1]; |
wolfSSL | 0:d92f9d21154c | 7450 | (void)sizeof(md5_test); |
wolfSSL | 0:d92f9d21154c | 7451 | |
wolfSSL | 0:d92f9d21154c | 7452 | WOLFSSL_ENTER("MD5_Init"); |
wolfSSL | 0:d92f9d21154c | 7453 | wc_InitMd5((Md5*)md5); |
wolfSSL | 0:d92f9d21154c | 7454 | } |
wolfSSL | 0:d92f9d21154c | 7455 | |
wolfSSL | 0:d92f9d21154c | 7456 | |
wolfSSL | 0:d92f9d21154c | 7457 | void wolfSSL_MD5_Update(WOLFSSL_MD5_CTX* md5, const void* input, |
wolfSSL | 0:d92f9d21154c | 7458 | unsigned long sz) |
wolfSSL | 0:d92f9d21154c | 7459 | { |
wolfSSL | 0:d92f9d21154c | 7460 | WOLFSSL_ENTER("wolfSSL_MD5_Update"); |
wolfSSL | 0:d92f9d21154c | 7461 | wc_Md5Update((Md5*)md5, (const byte*)input, (word32)sz); |
wolfSSL | 0:d92f9d21154c | 7462 | } |
wolfSSL | 0:d92f9d21154c | 7463 | |
wolfSSL | 0:d92f9d21154c | 7464 | |
wolfSSL | 0:d92f9d21154c | 7465 | void wolfSSL_MD5_Final(byte* input, WOLFSSL_MD5_CTX* md5) |
wolfSSL | 0:d92f9d21154c | 7466 | { |
wolfSSL | 0:d92f9d21154c | 7467 | WOLFSSL_ENTER("MD5_Final"); |
wolfSSL | 0:d92f9d21154c | 7468 | wc_Md5Final((Md5*)md5, input); |
wolfSSL | 0:d92f9d21154c | 7469 | } |
wolfSSL | 0:d92f9d21154c | 7470 | #endif /* NO_MD5 */ |
wolfSSL | 0:d92f9d21154c | 7471 | |
wolfSSL | 0:d92f9d21154c | 7472 | |
wolfSSL | 0:d92f9d21154c | 7473 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 7474 | void wolfSSL_SHA_Init(WOLFSSL_SHA_CTX* sha) |
wolfSSL | 0:d92f9d21154c | 7475 | { |
wolfSSL | 0:d92f9d21154c | 7476 | typedef char sha_test[sizeof(SHA_CTX) >= sizeof(Sha) ? 1 : -1]; |
wolfSSL | 0:d92f9d21154c | 7477 | (void)sizeof(sha_test); |
wolfSSL | 0:d92f9d21154c | 7478 | |
wolfSSL | 0:d92f9d21154c | 7479 | WOLFSSL_ENTER("SHA_Init"); |
wolfSSL | 0:d92f9d21154c | 7480 | wc_InitSha((Sha*)sha); /* OpenSSL compat, no ret */ |
wolfSSL | 0:d92f9d21154c | 7481 | } |
wolfSSL | 0:d92f9d21154c | 7482 | |
wolfSSL | 0:d92f9d21154c | 7483 | |
wolfSSL | 0:d92f9d21154c | 7484 | void wolfSSL_SHA_Update(WOLFSSL_SHA_CTX* sha, const void* input, |
wolfSSL | 0:d92f9d21154c | 7485 | unsigned long sz) |
wolfSSL | 0:d92f9d21154c | 7486 | { |
wolfSSL | 0:d92f9d21154c | 7487 | WOLFSSL_ENTER("SHA_Update"); |
wolfSSL | 0:d92f9d21154c | 7488 | wc_ShaUpdate((Sha*)sha, (const byte*)input, (word32)sz); |
wolfSSL | 0:d92f9d21154c | 7489 | } |
wolfSSL | 0:d92f9d21154c | 7490 | |
wolfSSL | 0:d92f9d21154c | 7491 | |
wolfSSL | 0:d92f9d21154c | 7492 | void wolfSSL_SHA_Final(byte* input, WOLFSSL_SHA_CTX* sha) |
wolfSSL | 0:d92f9d21154c | 7493 | { |
wolfSSL | 0:d92f9d21154c | 7494 | WOLFSSL_ENTER("SHA_Final"); |
wolfSSL | 0:d92f9d21154c | 7495 | wc_ShaFinal((Sha*)sha, input); |
wolfSSL | 0:d92f9d21154c | 7496 | } |
wolfSSL | 0:d92f9d21154c | 7497 | |
wolfSSL | 0:d92f9d21154c | 7498 | |
wolfSSL | 0:d92f9d21154c | 7499 | void wolfSSL_SHA1_Init(WOLFSSL_SHA_CTX* sha) |
wolfSSL | 0:d92f9d21154c | 7500 | { |
wolfSSL | 0:d92f9d21154c | 7501 | WOLFSSL_ENTER("SHA1_Init"); |
wolfSSL | 0:d92f9d21154c | 7502 | SHA_Init(sha); |
wolfSSL | 0:d92f9d21154c | 7503 | } |
wolfSSL | 0:d92f9d21154c | 7504 | |
wolfSSL | 0:d92f9d21154c | 7505 | |
wolfSSL | 0:d92f9d21154c | 7506 | void wolfSSL_SHA1_Update(WOLFSSL_SHA_CTX* sha, const void* input, |
wolfSSL | 0:d92f9d21154c | 7507 | unsigned long sz) |
wolfSSL | 0:d92f9d21154c | 7508 | { |
wolfSSL | 0:d92f9d21154c | 7509 | WOLFSSL_ENTER("SHA1_Update"); |
wolfSSL | 0:d92f9d21154c | 7510 | SHA_Update(sha, input, sz); |
wolfSSL | 0:d92f9d21154c | 7511 | } |
wolfSSL | 0:d92f9d21154c | 7512 | |
wolfSSL | 0:d92f9d21154c | 7513 | |
wolfSSL | 0:d92f9d21154c | 7514 | void wolfSSL_SHA1_Final(byte* input, WOLFSSL_SHA_CTX* sha) |
wolfSSL | 0:d92f9d21154c | 7515 | { |
wolfSSL | 0:d92f9d21154c | 7516 | WOLFSSL_ENTER("SHA1_Final"); |
wolfSSL | 0:d92f9d21154c | 7517 | SHA_Final(input, sha); |
wolfSSL | 0:d92f9d21154c | 7518 | } |
wolfSSL | 0:d92f9d21154c | 7519 | #endif /* NO_SHA */ |
wolfSSL | 0:d92f9d21154c | 7520 | |
wolfSSL | 0:d92f9d21154c | 7521 | |
wolfSSL | 0:d92f9d21154c | 7522 | void wolfSSL_SHA256_Init(WOLFSSL_SHA256_CTX* sha256) |
wolfSSL | 0:d92f9d21154c | 7523 | { |
wolfSSL | 0:d92f9d21154c | 7524 | typedef char sha_test[sizeof(SHA256_CTX) >= sizeof(Sha256) ? 1 : -1]; |
wolfSSL | 0:d92f9d21154c | 7525 | (void)sizeof(sha_test); |
wolfSSL | 0:d92f9d21154c | 7526 | |
wolfSSL | 0:d92f9d21154c | 7527 | WOLFSSL_ENTER("SHA256_Init"); |
wolfSSL | 0:d92f9d21154c | 7528 | wc_InitSha256((Sha256*)sha256); /* OpenSSL compat, no error */ |
wolfSSL | 0:d92f9d21154c | 7529 | } |
wolfSSL | 0:d92f9d21154c | 7530 | |
wolfSSL | 0:d92f9d21154c | 7531 | |
wolfSSL | 0:d92f9d21154c | 7532 | void wolfSSL_SHA256_Update(WOLFSSL_SHA256_CTX* sha, const void* input, |
wolfSSL | 0:d92f9d21154c | 7533 | unsigned long sz) |
wolfSSL | 0:d92f9d21154c | 7534 | { |
wolfSSL | 0:d92f9d21154c | 7535 | WOLFSSL_ENTER("SHA256_Update"); |
wolfSSL | 0:d92f9d21154c | 7536 | wc_Sha256Update((Sha256*)sha, (const byte*)input, (word32)sz); |
wolfSSL | 0:d92f9d21154c | 7537 | /* OpenSSL compat, no error */ |
wolfSSL | 0:d92f9d21154c | 7538 | } |
wolfSSL | 0:d92f9d21154c | 7539 | |
wolfSSL | 0:d92f9d21154c | 7540 | |
wolfSSL | 0:d92f9d21154c | 7541 | void wolfSSL_SHA256_Final(byte* input, WOLFSSL_SHA256_CTX* sha) |
wolfSSL | 0:d92f9d21154c | 7542 | { |
wolfSSL | 0:d92f9d21154c | 7543 | WOLFSSL_ENTER("SHA256_Final"); |
wolfSSL | 0:d92f9d21154c | 7544 | wc_Sha256Final((Sha256*)sha, input); |
wolfSSL | 0:d92f9d21154c | 7545 | /* OpenSSL compat, no error */ |
wolfSSL | 0:d92f9d21154c | 7546 | } |
wolfSSL | 0:d92f9d21154c | 7547 | |
wolfSSL | 0:d92f9d21154c | 7548 | |
wolfSSL | 0:d92f9d21154c | 7549 | #ifdef WOLFSSL_SHA384 |
wolfSSL | 0:d92f9d21154c | 7550 | |
wolfSSL | 0:d92f9d21154c | 7551 | void wolfSSL_SHA384_Init(WOLFSSL_SHA384_CTX* sha) |
wolfSSL | 0:d92f9d21154c | 7552 | { |
wolfSSL | 0:d92f9d21154c | 7553 | typedef char sha_test[sizeof(SHA384_CTX) >= sizeof(Sha384) ? 1 : -1]; |
wolfSSL | 0:d92f9d21154c | 7554 | (void)sizeof(sha_test); |
wolfSSL | 0:d92f9d21154c | 7555 | |
wolfSSL | 0:d92f9d21154c | 7556 | WOLFSSL_ENTER("SHA384_Init"); |
wolfSSL | 0:d92f9d21154c | 7557 | wc_InitSha384((Sha384*)sha); /* OpenSSL compat, no error */ |
wolfSSL | 0:d92f9d21154c | 7558 | } |
wolfSSL | 0:d92f9d21154c | 7559 | |
wolfSSL | 0:d92f9d21154c | 7560 | |
wolfSSL | 0:d92f9d21154c | 7561 | void wolfSSL_SHA384_Update(WOLFSSL_SHA384_CTX* sha, const void* input, |
wolfSSL | 0:d92f9d21154c | 7562 | unsigned long sz) |
wolfSSL | 0:d92f9d21154c | 7563 | { |
wolfSSL | 0:d92f9d21154c | 7564 | WOLFSSL_ENTER("SHA384_Update"); |
wolfSSL | 0:d92f9d21154c | 7565 | wc_Sha384Update((Sha384*)sha, (const byte*)input, (word32)sz); |
wolfSSL | 0:d92f9d21154c | 7566 | /* OpenSSL compat, no error */ |
wolfSSL | 0:d92f9d21154c | 7567 | } |
wolfSSL | 0:d92f9d21154c | 7568 | |
wolfSSL | 0:d92f9d21154c | 7569 | |
wolfSSL | 0:d92f9d21154c | 7570 | void wolfSSL_SHA384_Final(byte* input, WOLFSSL_SHA384_CTX* sha) |
wolfSSL | 0:d92f9d21154c | 7571 | { |
wolfSSL | 0:d92f9d21154c | 7572 | WOLFSSL_ENTER("SHA384_Final"); |
wolfSSL | 0:d92f9d21154c | 7573 | wc_Sha384Final((Sha384*)sha, input); |
wolfSSL | 0:d92f9d21154c | 7574 | /* OpenSSL compat, no error */ |
wolfSSL | 0:d92f9d21154c | 7575 | } |
wolfSSL | 0:d92f9d21154c | 7576 | |
wolfSSL | 0:d92f9d21154c | 7577 | #endif /* WOLFSSL_SHA384 */ |
wolfSSL | 0:d92f9d21154c | 7578 | |
wolfSSL | 0:d92f9d21154c | 7579 | |
wolfSSL | 0:d92f9d21154c | 7580 | #ifdef WOLFSSL_SHA512 |
wolfSSL | 0:d92f9d21154c | 7581 | |
wolfSSL | 0:d92f9d21154c | 7582 | void wolfSSL_SHA512_Init(WOLFSSL_SHA512_CTX* sha) |
wolfSSL | 0:d92f9d21154c | 7583 | { |
wolfSSL | 0:d92f9d21154c | 7584 | typedef char sha_test[sizeof(SHA512_CTX) >= sizeof(Sha512) ? 1 : -1]; |
wolfSSL | 0:d92f9d21154c | 7585 | (void)sizeof(sha_test); |
wolfSSL | 0:d92f9d21154c | 7586 | |
wolfSSL | 0:d92f9d21154c | 7587 | WOLFSSL_ENTER("SHA512_Init"); |
wolfSSL | 0:d92f9d21154c | 7588 | wc_InitSha512((Sha512*)sha); /* OpenSSL compat, no error */ |
wolfSSL | 0:d92f9d21154c | 7589 | } |
wolfSSL | 0:d92f9d21154c | 7590 | |
wolfSSL | 0:d92f9d21154c | 7591 | |
wolfSSL | 0:d92f9d21154c | 7592 | void wolfSSL_SHA512_Update(WOLFSSL_SHA512_CTX* sha, const void* input, |
wolfSSL | 0:d92f9d21154c | 7593 | unsigned long sz) |
wolfSSL | 0:d92f9d21154c | 7594 | { |
wolfSSL | 0:d92f9d21154c | 7595 | WOLFSSL_ENTER("SHA512_Update"); |
wolfSSL | 0:d92f9d21154c | 7596 | wc_Sha512Update((Sha512*)sha, (const byte*)input, (word32)sz); |
wolfSSL | 0:d92f9d21154c | 7597 | /* OpenSSL compat, no error */ |
wolfSSL | 0:d92f9d21154c | 7598 | } |
wolfSSL | 0:d92f9d21154c | 7599 | |
wolfSSL | 0:d92f9d21154c | 7600 | |
wolfSSL | 0:d92f9d21154c | 7601 | void wolfSSL_SHA512_Final(byte* input, WOLFSSL_SHA512_CTX* sha) |
wolfSSL | 0:d92f9d21154c | 7602 | { |
wolfSSL | 0:d92f9d21154c | 7603 | WOLFSSL_ENTER("SHA512_Final"); |
wolfSSL | 0:d92f9d21154c | 7604 | wc_Sha512Final((Sha512*)sha, input); |
wolfSSL | 0:d92f9d21154c | 7605 | /* OpenSSL compat, no error */ |
wolfSSL | 0:d92f9d21154c | 7606 | } |
wolfSSL | 0:d92f9d21154c | 7607 | |
wolfSSL | 0:d92f9d21154c | 7608 | #endif /* WOLFSSL_SHA512 */ |
wolfSSL | 0:d92f9d21154c | 7609 | |
wolfSSL | 0:d92f9d21154c | 7610 | |
wolfSSL | 0:d92f9d21154c | 7611 | #ifndef NO_MD5 |
wolfSSL | 0:d92f9d21154c | 7612 | |
wolfSSL | 0:d92f9d21154c | 7613 | const WOLFSSL_EVP_MD* wolfSSL_EVP_md5(void) |
wolfSSL | 0:d92f9d21154c | 7614 | { |
wolfSSL | 0:d92f9d21154c | 7615 | static const char* type = "MD5"; |
wolfSSL | 0:d92f9d21154c | 7616 | WOLFSSL_ENTER("EVP_md5"); |
wolfSSL | 0:d92f9d21154c | 7617 | return type; |
wolfSSL | 0:d92f9d21154c | 7618 | } |
wolfSSL | 0:d92f9d21154c | 7619 | |
wolfSSL | 0:d92f9d21154c | 7620 | #endif /* NO_MD5 */ |
wolfSSL | 0:d92f9d21154c | 7621 | |
wolfSSL | 0:d92f9d21154c | 7622 | |
wolfSSL | 0:d92f9d21154c | 7623 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 7624 | const WOLFSSL_EVP_MD* wolfSSL_EVP_sha1(void) |
wolfSSL | 0:d92f9d21154c | 7625 | { |
wolfSSL | 0:d92f9d21154c | 7626 | static const char* type = "SHA"; |
wolfSSL | 0:d92f9d21154c | 7627 | WOLFSSL_ENTER("EVP_sha1"); |
wolfSSL | 0:d92f9d21154c | 7628 | return type; |
wolfSSL | 0:d92f9d21154c | 7629 | } |
wolfSSL | 0:d92f9d21154c | 7630 | #endif /* NO_SHA */ |
wolfSSL | 0:d92f9d21154c | 7631 | |
wolfSSL | 0:d92f9d21154c | 7632 | |
wolfSSL | 0:d92f9d21154c | 7633 | const WOLFSSL_EVP_MD* wolfSSL_EVP_sha256(void) |
wolfSSL | 0:d92f9d21154c | 7634 | { |
wolfSSL | 0:d92f9d21154c | 7635 | static const char* type = "SHA256"; |
wolfSSL | 0:d92f9d21154c | 7636 | WOLFSSL_ENTER("EVP_sha256"); |
wolfSSL | 0:d92f9d21154c | 7637 | return type; |
wolfSSL | 0:d92f9d21154c | 7638 | } |
wolfSSL | 0:d92f9d21154c | 7639 | |
wolfSSL | 0:d92f9d21154c | 7640 | #ifdef WOLFSSL_SHA384 |
wolfSSL | 0:d92f9d21154c | 7641 | |
wolfSSL | 0:d92f9d21154c | 7642 | const WOLFSSL_EVP_MD* wolfSSL_EVP_sha384(void) |
wolfSSL | 0:d92f9d21154c | 7643 | { |
wolfSSL | 0:d92f9d21154c | 7644 | static const char* type = "SHA384"; |
wolfSSL | 0:d92f9d21154c | 7645 | WOLFSSL_ENTER("EVP_sha384"); |
wolfSSL | 0:d92f9d21154c | 7646 | return type; |
wolfSSL | 0:d92f9d21154c | 7647 | } |
wolfSSL | 0:d92f9d21154c | 7648 | |
wolfSSL | 0:d92f9d21154c | 7649 | #endif /* WOLFSSL_SHA384 */ |
wolfSSL | 0:d92f9d21154c | 7650 | |
wolfSSL | 0:d92f9d21154c | 7651 | #ifdef WOLFSSL_SHA512 |
wolfSSL | 0:d92f9d21154c | 7652 | |
wolfSSL | 0:d92f9d21154c | 7653 | const WOLFSSL_EVP_MD* wolfSSL_EVP_sha512(void) |
wolfSSL | 0:d92f9d21154c | 7654 | { |
wolfSSL | 0:d92f9d21154c | 7655 | static const char* type = "SHA512"; |
wolfSSL | 0:d92f9d21154c | 7656 | WOLFSSL_ENTER("EVP_sha512"); |
wolfSSL | 0:d92f9d21154c | 7657 | return type; |
wolfSSL | 0:d92f9d21154c | 7658 | } |
wolfSSL | 0:d92f9d21154c | 7659 | |
wolfSSL | 0:d92f9d21154c | 7660 | #endif /* WOLFSSL_SHA512 */ |
wolfSSL | 0:d92f9d21154c | 7661 | |
wolfSSL | 0:d92f9d21154c | 7662 | |
wolfSSL | 0:d92f9d21154c | 7663 | void wolfSSL_EVP_MD_CTX_init(WOLFSSL_EVP_MD_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 7664 | { |
wolfSSL | 0:d92f9d21154c | 7665 | WOLFSSL_ENTER("EVP_CIPHER_MD_CTX_init"); |
wolfSSL | 0:d92f9d21154c | 7666 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 7667 | /* do nothing */ |
wolfSSL | 0:d92f9d21154c | 7668 | } |
wolfSSL | 0:d92f9d21154c | 7669 | |
wolfSSL | 0:d92f9d21154c | 7670 | |
wolfSSL | 0:d92f9d21154c | 7671 | const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_128_cbc(void) |
wolfSSL | 0:d92f9d21154c | 7672 | { |
wolfSSL | 0:d92f9d21154c | 7673 | static const char* type = "AES128-CBC"; |
wolfSSL | 0:d92f9d21154c | 7674 | WOLFSSL_ENTER("wolfSSL_EVP_aes_128_cbc"); |
wolfSSL | 0:d92f9d21154c | 7675 | return type; |
wolfSSL | 0:d92f9d21154c | 7676 | } |
wolfSSL | 0:d92f9d21154c | 7677 | |
wolfSSL | 0:d92f9d21154c | 7678 | |
wolfSSL | 0:d92f9d21154c | 7679 | const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_192_cbc(void) |
wolfSSL | 0:d92f9d21154c | 7680 | { |
wolfSSL | 0:d92f9d21154c | 7681 | static const char* type = "AES192-CBC"; |
wolfSSL | 0:d92f9d21154c | 7682 | WOLFSSL_ENTER("wolfSSL_EVP_aes_192_cbc"); |
wolfSSL | 0:d92f9d21154c | 7683 | return type; |
wolfSSL | 0:d92f9d21154c | 7684 | } |
wolfSSL | 0:d92f9d21154c | 7685 | |
wolfSSL | 0:d92f9d21154c | 7686 | |
wolfSSL | 0:d92f9d21154c | 7687 | const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_256_cbc(void) |
wolfSSL | 0:d92f9d21154c | 7688 | { |
wolfSSL | 0:d92f9d21154c | 7689 | static const char* type = "AES256-CBC"; |
wolfSSL | 0:d92f9d21154c | 7690 | WOLFSSL_ENTER("wolfSSL_EVP_aes_256_cbc"); |
wolfSSL | 0:d92f9d21154c | 7691 | return type; |
wolfSSL | 0:d92f9d21154c | 7692 | } |
wolfSSL | 0:d92f9d21154c | 7693 | |
wolfSSL | 0:d92f9d21154c | 7694 | |
wolfSSL | 0:d92f9d21154c | 7695 | const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_128_ctr(void) |
wolfSSL | 0:d92f9d21154c | 7696 | { |
wolfSSL | 0:d92f9d21154c | 7697 | static const char* type = "AES128-CTR"; |
wolfSSL | 0:d92f9d21154c | 7698 | WOLFSSL_ENTER("wolfSSL_EVP_aes_128_ctr"); |
wolfSSL | 0:d92f9d21154c | 7699 | return type; |
wolfSSL | 0:d92f9d21154c | 7700 | } |
wolfSSL | 0:d92f9d21154c | 7701 | |
wolfSSL | 0:d92f9d21154c | 7702 | |
wolfSSL | 0:d92f9d21154c | 7703 | const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_192_ctr(void) |
wolfSSL | 0:d92f9d21154c | 7704 | { |
wolfSSL | 0:d92f9d21154c | 7705 | static const char* type = "AES192-CTR"; |
wolfSSL | 0:d92f9d21154c | 7706 | WOLFSSL_ENTER("wolfSSL_EVP_aes_192_ctr"); |
wolfSSL | 0:d92f9d21154c | 7707 | return type; |
wolfSSL | 0:d92f9d21154c | 7708 | } |
wolfSSL | 0:d92f9d21154c | 7709 | |
wolfSSL | 0:d92f9d21154c | 7710 | |
wolfSSL | 0:d92f9d21154c | 7711 | const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_256_ctr(void) |
wolfSSL | 0:d92f9d21154c | 7712 | { |
wolfSSL | 0:d92f9d21154c | 7713 | static const char* type = "AES256-CTR"; |
wolfSSL | 0:d92f9d21154c | 7714 | WOLFSSL_ENTER("wolfSSL_EVP_aes_256_ctr"); |
wolfSSL | 0:d92f9d21154c | 7715 | return type; |
wolfSSL | 0:d92f9d21154c | 7716 | } |
wolfSSL | 0:d92f9d21154c | 7717 | |
wolfSSL | 0:d92f9d21154c | 7718 | |
wolfSSL | 0:d92f9d21154c | 7719 | const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_des_cbc(void) |
wolfSSL | 0:d92f9d21154c | 7720 | { |
wolfSSL | 0:d92f9d21154c | 7721 | static const char* type = "DES-CBC"; |
wolfSSL | 0:d92f9d21154c | 7722 | WOLFSSL_ENTER("wolfSSL_EVP_des_cbc"); |
wolfSSL | 0:d92f9d21154c | 7723 | return type; |
wolfSSL | 0:d92f9d21154c | 7724 | } |
wolfSSL | 0:d92f9d21154c | 7725 | |
wolfSSL | 0:d92f9d21154c | 7726 | |
wolfSSL | 0:d92f9d21154c | 7727 | const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_des_ede3_cbc(void) |
wolfSSL | 0:d92f9d21154c | 7728 | { |
wolfSSL | 0:d92f9d21154c | 7729 | static const char* type = "DES-EDE3-CBC"; |
wolfSSL | 0:d92f9d21154c | 7730 | WOLFSSL_ENTER("wolfSSL_EVP_des_ede3_cbc"); |
wolfSSL | 0:d92f9d21154c | 7731 | return type; |
wolfSSL | 0:d92f9d21154c | 7732 | } |
wolfSSL | 0:d92f9d21154c | 7733 | |
wolfSSL | 0:d92f9d21154c | 7734 | |
wolfSSL | 0:d92f9d21154c | 7735 | const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_rc4(void) |
wolfSSL | 0:d92f9d21154c | 7736 | { |
wolfSSL | 0:d92f9d21154c | 7737 | static const char* type = "ARC4"; |
wolfSSL | 0:d92f9d21154c | 7738 | WOLFSSL_ENTER("wolfSSL_EVP_rc4"); |
wolfSSL | 0:d92f9d21154c | 7739 | return type; |
wolfSSL | 0:d92f9d21154c | 7740 | } |
wolfSSL | 0:d92f9d21154c | 7741 | |
wolfSSL | 0:d92f9d21154c | 7742 | |
wolfSSL | 0:d92f9d21154c | 7743 | const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_enc_null(void) |
wolfSSL | 0:d92f9d21154c | 7744 | { |
wolfSSL | 0:d92f9d21154c | 7745 | static const char* type = "NULL"; |
wolfSSL | 0:d92f9d21154c | 7746 | WOLFSSL_ENTER("wolfSSL_EVP_enc_null"); |
wolfSSL | 0:d92f9d21154c | 7747 | return type; |
wolfSSL | 0:d92f9d21154c | 7748 | } |
wolfSSL | 0:d92f9d21154c | 7749 | |
wolfSSL | 0:d92f9d21154c | 7750 | |
wolfSSL | 0:d92f9d21154c | 7751 | int wolfSSL_EVP_MD_CTX_cleanup(WOLFSSL_EVP_MD_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 7752 | { |
wolfSSL | 0:d92f9d21154c | 7753 | WOLFSSL_ENTER("EVP_MD_CTX_cleanup"); |
wolfSSL | 0:d92f9d21154c | 7754 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 7755 | return 0; |
wolfSSL | 0:d92f9d21154c | 7756 | } |
wolfSSL | 0:d92f9d21154c | 7757 | |
wolfSSL | 0:d92f9d21154c | 7758 | |
wolfSSL | 0:d92f9d21154c | 7759 | |
wolfSSL | 0:d92f9d21154c | 7760 | void wolfSSL_EVP_CIPHER_CTX_init(WOLFSSL_EVP_CIPHER_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 7761 | { |
wolfSSL | 0:d92f9d21154c | 7762 | WOLFSSL_ENTER("EVP_CIPHER_CTX_init"); |
wolfSSL | 0:d92f9d21154c | 7763 | if (ctx) { |
wolfSSL | 0:d92f9d21154c | 7764 | ctx->cipherType = 0xff; /* no init */ |
wolfSSL | 0:d92f9d21154c | 7765 | ctx->keyLen = 0; |
wolfSSL | 0:d92f9d21154c | 7766 | ctx->enc = 1; /* start in encrypt mode */ |
wolfSSL | 0:d92f9d21154c | 7767 | } |
wolfSSL | 0:d92f9d21154c | 7768 | } |
wolfSSL | 0:d92f9d21154c | 7769 | |
wolfSSL | 0:d92f9d21154c | 7770 | |
wolfSSL | 0:d92f9d21154c | 7771 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 7772 | int wolfSSL_EVP_CIPHER_CTX_cleanup(WOLFSSL_EVP_CIPHER_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 7773 | { |
wolfSSL | 0:d92f9d21154c | 7774 | WOLFSSL_ENTER("EVP_CIPHER_CTX_cleanup"); |
wolfSSL | 0:d92f9d21154c | 7775 | if (ctx) { |
wolfSSL | 0:d92f9d21154c | 7776 | ctx->cipherType = 0xff; /* no more init */ |
wolfSSL | 0:d92f9d21154c | 7777 | ctx->keyLen = 0; |
wolfSSL | 0:d92f9d21154c | 7778 | } |
wolfSSL | 0:d92f9d21154c | 7779 | |
wolfSSL | 0:d92f9d21154c | 7780 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 7781 | } |
wolfSSL | 0:d92f9d21154c | 7782 | |
wolfSSL | 0:d92f9d21154c | 7783 | |
wolfSSL | 0:d92f9d21154c | 7784 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 7785 | int wolfSSL_EVP_CipherInit(WOLFSSL_EVP_CIPHER_CTX* ctx, |
wolfSSL | 0:d92f9d21154c | 7786 | const WOLFSSL_EVP_CIPHER* type, byte* key, |
wolfSSL | 0:d92f9d21154c | 7787 | byte* iv, int enc) |
wolfSSL | 0:d92f9d21154c | 7788 | { |
wolfSSL | 0:d92f9d21154c | 7789 | #if defined(NO_AES) && defined(NO_DES3) |
wolfSSL | 0:d92f9d21154c | 7790 | (void)iv; |
wolfSSL | 0:d92f9d21154c | 7791 | (void)enc; |
wolfSSL | 0:d92f9d21154c | 7792 | #else |
wolfSSL | 0:d92f9d21154c | 7793 | int ret = 0; |
wolfSSL | 0:d92f9d21154c | 7794 | #endif |
wolfSSL | 0:d92f9d21154c | 7795 | |
wolfSSL | 0:d92f9d21154c | 7796 | WOLFSSL_ENTER("wolfSSL_EVP_CipherInit"); |
wolfSSL | 0:d92f9d21154c | 7797 | if (ctx == NULL) { |
wolfSSL | 0:d92f9d21154c | 7798 | WOLFSSL_MSG("no ctx"); |
wolfSSL | 0:d92f9d21154c | 7799 | return 0; /* failure */ |
wolfSSL | 0:d92f9d21154c | 7800 | } |
wolfSSL | 0:d92f9d21154c | 7801 | |
wolfSSL | 0:d92f9d21154c | 7802 | if (type == NULL && ctx->cipherType == 0xff) { |
wolfSSL | 0:d92f9d21154c | 7803 | WOLFSSL_MSG("no type set"); |
wolfSSL | 0:d92f9d21154c | 7804 | return 0; /* failure */ |
wolfSSL | 0:d92f9d21154c | 7805 | } |
wolfSSL | 0:d92f9d21154c | 7806 | |
wolfSSL | 0:d92f9d21154c | 7807 | #ifndef NO_AES |
wolfSSL | 0:d92f9d21154c | 7808 | if (ctx->cipherType == AES_128_CBC_TYPE || (type && |
wolfSSL | 0:d92f9d21154c | 7809 | XSTRNCMP(type, "AES128-CBC", 10) == 0)) { |
wolfSSL | 0:d92f9d21154c | 7810 | WOLFSSL_MSG("AES-128-CBC"); |
wolfSSL | 0:d92f9d21154c | 7811 | ctx->cipherType = AES_128_CBC_TYPE; |
wolfSSL | 0:d92f9d21154c | 7812 | ctx->keyLen = 16; |
wolfSSL | 0:d92f9d21154c | 7813 | if (enc == 0 || enc == 1) |
wolfSSL | 0:d92f9d21154c | 7814 | ctx->enc = enc ? 1 : 0; |
wolfSSL | 0:d92f9d21154c | 7815 | if (key) { |
wolfSSL | 0:d92f9d21154c | 7816 | ret = wc_AesSetKey(&ctx->cipher.aes, key, ctx->keyLen, iv, |
wolfSSL | 0:d92f9d21154c | 7817 | ctx->enc ? AES_ENCRYPTION : AES_DECRYPTION); |
wolfSSL | 0:d92f9d21154c | 7818 | if (ret != 0) |
wolfSSL | 0:d92f9d21154c | 7819 | return ret; |
wolfSSL | 0:d92f9d21154c | 7820 | } |
wolfSSL | 0:d92f9d21154c | 7821 | if (iv && key == NULL) { |
wolfSSL | 0:d92f9d21154c | 7822 | ret = wc_AesSetIV(&ctx->cipher.aes, iv); |
wolfSSL | 0:d92f9d21154c | 7823 | if (ret != 0) |
wolfSSL | 0:d92f9d21154c | 7824 | return ret; |
wolfSSL | 0:d92f9d21154c | 7825 | } |
wolfSSL | 0:d92f9d21154c | 7826 | } |
wolfSSL | 0:d92f9d21154c | 7827 | else if (ctx->cipherType == AES_192_CBC_TYPE || (type && |
wolfSSL | 0:d92f9d21154c | 7828 | XSTRNCMP(type, "AES192-CBC", 10) == 0)) { |
wolfSSL | 0:d92f9d21154c | 7829 | WOLFSSL_MSG("AES-192-CBC"); |
wolfSSL | 0:d92f9d21154c | 7830 | ctx->cipherType = AES_192_CBC_TYPE; |
wolfSSL | 0:d92f9d21154c | 7831 | ctx->keyLen = 24; |
wolfSSL | 0:d92f9d21154c | 7832 | if (enc == 0 || enc == 1) |
wolfSSL | 0:d92f9d21154c | 7833 | ctx->enc = enc ? 1 : 0; |
wolfSSL | 0:d92f9d21154c | 7834 | if (key) { |
wolfSSL | 0:d92f9d21154c | 7835 | ret = wc_AesSetKey(&ctx->cipher.aes, key, ctx->keyLen, iv, |
wolfSSL | 0:d92f9d21154c | 7836 | ctx->enc ? AES_ENCRYPTION : AES_DECRYPTION); |
wolfSSL | 0:d92f9d21154c | 7837 | if (ret != 0) |
wolfSSL | 0:d92f9d21154c | 7838 | return ret; |
wolfSSL | 0:d92f9d21154c | 7839 | } |
wolfSSL | 0:d92f9d21154c | 7840 | if (iv && key == NULL) { |
wolfSSL | 0:d92f9d21154c | 7841 | ret = wc_AesSetIV(&ctx->cipher.aes, iv); |
wolfSSL | 0:d92f9d21154c | 7842 | if (ret != 0) |
wolfSSL | 0:d92f9d21154c | 7843 | return ret; |
wolfSSL | 0:d92f9d21154c | 7844 | } |
wolfSSL | 0:d92f9d21154c | 7845 | } |
wolfSSL | 0:d92f9d21154c | 7846 | else if (ctx->cipherType == AES_256_CBC_TYPE || (type && |
wolfSSL | 0:d92f9d21154c | 7847 | XSTRNCMP(type, "AES256-CBC", 10) == 0)) { |
wolfSSL | 0:d92f9d21154c | 7848 | WOLFSSL_MSG("AES-256-CBC"); |
wolfSSL | 0:d92f9d21154c | 7849 | ctx->cipherType = AES_256_CBC_TYPE; |
wolfSSL | 0:d92f9d21154c | 7850 | ctx->keyLen = 32; |
wolfSSL | 0:d92f9d21154c | 7851 | if (enc == 0 || enc == 1) |
wolfSSL | 0:d92f9d21154c | 7852 | ctx->enc = enc ? 1 : 0; |
wolfSSL | 0:d92f9d21154c | 7853 | if (key) { |
wolfSSL | 0:d92f9d21154c | 7854 | ret = wc_AesSetKey(&ctx->cipher.aes, key, ctx->keyLen, iv, |
wolfSSL | 0:d92f9d21154c | 7855 | ctx->enc ? AES_ENCRYPTION : AES_DECRYPTION); |
wolfSSL | 0:d92f9d21154c | 7856 | if (ret != 0) |
wolfSSL | 0:d92f9d21154c | 7857 | return ret; |
wolfSSL | 0:d92f9d21154c | 7858 | } |
wolfSSL | 0:d92f9d21154c | 7859 | if (iv && key == NULL) { |
wolfSSL | 0:d92f9d21154c | 7860 | ret = wc_AesSetIV(&ctx->cipher.aes, iv); |
wolfSSL | 0:d92f9d21154c | 7861 | if (ret != 0) |
wolfSSL | 0:d92f9d21154c | 7862 | return ret; |
wolfSSL | 0:d92f9d21154c | 7863 | } |
wolfSSL | 0:d92f9d21154c | 7864 | } |
wolfSSL | 0:d92f9d21154c | 7865 | #ifdef WOLFSSL_AES_COUNTER |
wolfSSL | 0:d92f9d21154c | 7866 | else if (ctx->cipherType == AES_128_CTR_TYPE || (type && |
wolfSSL | 0:d92f9d21154c | 7867 | XSTRNCMP(type, "AES128-CTR", 10) == 0)) { |
wolfSSL | 0:d92f9d21154c | 7868 | WOLFSSL_MSG("AES-128-CTR"); |
wolfSSL | 0:d92f9d21154c | 7869 | ctx->cipherType = AES_128_CTR_TYPE; |
wolfSSL | 0:d92f9d21154c | 7870 | ctx->keyLen = 16; |
wolfSSL | 0:d92f9d21154c | 7871 | if (enc == 0 || enc == 1) |
wolfSSL | 0:d92f9d21154c | 7872 | ctx->enc = enc ? 1 : 0; |
wolfSSL | 0:d92f9d21154c | 7873 | if (key) { |
wolfSSL | 0:d92f9d21154c | 7874 | ret = wc_AesSetKey(&ctx->cipher.aes, key, ctx->keyLen, iv, |
wolfSSL | 0:d92f9d21154c | 7875 | AES_ENCRYPTION); |
wolfSSL | 0:d92f9d21154c | 7876 | if (ret != 0) |
wolfSSL | 0:d92f9d21154c | 7877 | return ret; |
wolfSSL | 0:d92f9d21154c | 7878 | } |
wolfSSL | 0:d92f9d21154c | 7879 | if (iv && key == NULL) { |
wolfSSL | 0:d92f9d21154c | 7880 | ret = wc_AesSetIV(&ctx->cipher.aes, iv); |
wolfSSL | 0:d92f9d21154c | 7881 | if (ret != 0) |
wolfSSL | 0:d92f9d21154c | 7882 | return ret; |
wolfSSL | 0:d92f9d21154c | 7883 | } |
wolfSSL | 0:d92f9d21154c | 7884 | } |
wolfSSL | 0:d92f9d21154c | 7885 | else if (ctx->cipherType == AES_192_CTR_TYPE || (type && |
wolfSSL | 0:d92f9d21154c | 7886 | XSTRNCMP(type, "AES192-CTR", 10) == 0)) { |
wolfSSL | 0:d92f9d21154c | 7887 | WOLFSSL_MSG("AES-192-CTR"); |
wolfSSL | 0:d92f9d21154c | 7888 | ctx->cipherType = AES_192_CTR_TYPE; |
wolfSSL | 0:d92f9d21154c | 7889 | ctx->keyLen = 24; |
wolfSSL | 0:d92f9d21154c | 7890 | if (enc == 0 || enc == 1) |
wolfSSL | 0:d92f9d21154c | 7891 | ctx->enc = enc ? 1 : 0; |
wolfSSL | 0:d92f9d21154c | 7892 | if (key) { |
wolfSSL | 0:d92f9d21154c | 7893 | ret = wc_AesSetKey(&ctx->cipher.aes, key, ctx->keyLen, iv, |
wolfSSL | 0:d92f9d21154c | 7894 | AES_ENCRYPTION); |
wolfSSL | 0:d92f9d21154c | 7895 | if (ret != 0) |
wolfSSL | 0:d92f9d21154c | 7896 | return ret; |
wolfSSL | 0:d92f9d21154c | 7897 | } |
wolfSSL | 0:d92f9d21154c | 7898 | if (iv && key == NULL) { |
wolfSSL | 0:d92f9d21154c | 7899 | ret = wc_AesSetIV(&ctx->cipher.aes, iv); |
wolfSSL | 0:d92f9d21154c | 7900 | if (ret != 0) |
wolfSSL | 0:d92f9d21154c | 7901 | return ret; |
wolfSSL | 0:d92f9d21154c | 7902 | } |
wolfSSL | 0:d92f9d21154c | 7903 | } |
wolfSSL | 0:d92f9d21154c | 7904 | else if (ctx->cipherType == AES_256_CTR_TYPE || (type && |
wolfSSL | 0:d92f9d21154c | 7905 | XSTRNCMP(type, "AES256-CTR", 10) == 0)) { |
wolfSSL | 0:d92f9d21154c | 7906 | WOLFSSL_MSG("AES-256-CTR"); |
wolfSSL | 0:d92f9d21154c | 7907 | ctx->cipherType = AES_256_CTR_TYPE; |
wolfSSL | 0:d92f9d21154c | 7908 | ctx->keyLen = 32; |
wolfSSL | 0:d92f9d21154c | 7909 | if (enc == 0 || enc == 1) |
wolfSSL | 0:d92f9d21154c | 7910 | ctx->enc = enc ? 1 : 0; |
wolfSSL | 0:d92f9d21154c | 7911 | if (key) { |
wolfSSL | 0:d92f9d21154c | 7912 | ret = wc_AesSetKey(&ctx->cipher.aes, key, ctx->keyLen, iv, |
wolfSSL | 0:d92f9d21154c | 7913 | AES_ENCRYPTION); |
wolfSSL | 0:d92f9d21154c | 7914 | if (ret != 0) |
wolfSSL | 0:d92f9d21154c | 7915 | return ret; |
wolfSSL | 0:d92f9d21154c | 7916 | } |
wolfSSL | 0:d92f9d21154c | 7917 | if (iv && key == NULL) { |
wolfSSL | 0:d92f9d21154c | 7918 | ret = wc_AesSetIV(&ctx->cipher.aes, iv); |
wolfSSL | 0:d92f9d21154c | 7919 | if (ret != 0) |
wolfSSL | 0:d92f9d21154c | 7920 | return ret; |
wolfSSL | 0:d92f9d21154c | 7921 | } |
wolfSSL | 0:d92f9d21154c | 7922 | } |
wolfSSL | 0:d92f9d21154c | 7923 | #endif /* WOLFSSL_AES_CTR */ |
wolfSSL | 0:d92f9d21154c | 7924 | #endif /* NO_AES */ |
wolfSSL | 0:d92f9d21154c | 7925 | |
wolfSSL | 0:d92f9d21154c | 7926 | #ifndef NO_DES3 |
wolfSSL | 0:d92f9d21154c | 7927 | else if (ctx->cipherType == DES_CBC_TYPE || (type && |
wolfSSL | 0:d92f9d21154c | 7928 | XSTRNCMP(type, "DES-CBC", 7) == 0)) { |
wolfSSL | 0:d92f9d21154c | 7929 | WOLFSSL_MSG("DES-CBC"); |
wolfSSL | 0:d92f9d21154c | 7930 | ctx->cipherType = DES_CBC_TYPE; |
wolfSSL | 0:d92f9d21154c | 7931 | ctx->keyLen = 8; |
wolfSSL | 0:d92f9d21154c | 7932 | if (enc == 0 || enc == 1) |
wolfSSL | 0:d92f9d21154c | 7933 | ctx->enc = enc ? 1 : 0; |
wolfSSL | 0:d92f9d21154c | 7934 | if (key) { |
wolfSSL | 0:d92f9d21154c | 7935 | ret = wc_Des_SetKey(&ctx->cipher.des, key, iv, |
wolfSSL | 0:d92f9d21154c | 7936 | ctx->enc ? DES_ENCRYPTION : DES_DECRYPTION); |
wolfSSL | 0:d92f9d21154c | 7937 | if (ret != 0) |
wolfSSL | 0:d92f9d21154c | 7938 | return ret; |
wolfSSL | 0:d92f9d21154c | 7939 | } |
wolfSSL | 0:d92f9d21154c | 7940 | |
wolfSSL | 0:d92f9d21154c | 7941 | if (iv && key == NULL) |
wolfSSL | 0:d92f9d21154c | 7942 | wc_Des_SetIV(&ctx->cipher.des, iv); |
wolfSSL | 0:d92f9d21154c | 7943 | } |
wolfSSL | 0:d92f9d21154c | 7944 | else if (ctx->cipherType == DES_EDE3_CBC_TYPE || (type && |
wolfSSL | 0:d92f9d21154c | 7945 | XSTRNCMP(type, "DES-EDE3-CBC", 11) == 0)) { |
wolfSSL | 0:d92f9d21154c | 7946 | WOLFSSL_MSG("DES-EDE3-CBC"); |
wolfSSL | 0:d92f9d21154c | 7947 | ctx->cipherType = DES_EDE3_CBC_TYPE; |
wolfSSL | 0:d92f9d21154c | 7948 | ctx->keyLen = 24; |
wolfSSL | 0:d92f9d21154c | 7949 | if (enc == 0 || enc == 1) |
wolfSSL | 0:d92f9d21154c | 7950 | ctx->enc = enc ? 1 : 0; |
wolfSSL | 0:d92f9d21154c | 7951 | if (key) { |
wolfSSL | 0:d92f9d21154c | 7952 | ret = wc_Des3_SetKey(&ctx->cipher.des3, key, iv, |
wolfSSL | 0:d92f9d21154c | 7953 | ctx->enc ? DES_ENCRYPTION : DES_DECRYPTION); |
wolfSSL | 0:d92f9d21154c | 7954 | if (ret != 0) |
wolfSSL | 0:d92f9d21154c | 7955 | return ret; |
wolfSSL | 0:d92f9d21154c | 7956 | } |
wolfSSL | 0:d92f9d21154c | 7957 | |
wolfSSL | 0:d92f9d21154c | 7958 | if (iv && key == NULL) { |
wolfSSL | 0:d92f9d21154c | 7959 | ret = wc_Des3_SetIV(&ctx->cipher.des3, iv); |
wolfSSL | 0:d92f9d21154c | 7960 | if (ret != 0) |
wolfSSL | 0:d92f9d21154c | 7961 | return ret; |
wolfSSL | 0:d92f9d21154c | 7962 | } |
wolfSSL | 0:d92f9d21154c | 7963 | } |
wolfSSL | 0:d92f9d21154c | 7964 | #endif /* NO_DES3 */ |
wolfSSL | 0:d92f9d21154c | 7965 | #ifndef NO_RC4 |
wolfSSL | 0:d92f9d21154c | 7966 | else if (ctx->cipherType == ARC4_TYPE || (type && |
wolfSSL | 0:d92f9d21154c | 7967 | XSTRNCMP(type, "ARC4", 4) == 0)) { |
wolfSSL | 0:d92f9d21154c | 7968 | WOLFSSL_MSG("ARC4"); |
wolfSSL | 0:d92f9d21154c | 7969 | ctx->cipherType = ARC4_TYPE; |
wolfSSL | 0:d92f9d21154c | 7970 | if (ctx->keyLen == 0) /* user may have already set */ |
wolfSSL | 0:d92f9d21154c | 7971 | ctx->keyLen = 16; /* default to 128 */ |
wolfSSL | 0:d92f9d21154c | 7972 | if (key) |
wolfSSL | 0:d92f9d21154c | 7973 | wc_Arc4SetKey(&ctx->cipher.arc4, key, ctx->keyLen); |
wolfSSL | 0:d92f9d21154c | 7974 | } |
wolfSSL | 0:d92f9d21154c | 7975 | #endif /* NO_RC4 */ |
wolfSSL | 0:d92f9d21154c | 7976 | else if (ctx->cipherType == NULL_CIPHER_TYPE || (type && |
wolfSSL | 0:d92f9d21154c | 7977 | XSTRNCMP(type, "NULL", 4) == 0)) { |
wolfSSL | 0:d92f9d21154c | 7978 | WOLFSSL_MSG("NULL cipher"); |
wolfSSL | 0:d92f9d21154c | 7979 | ctx->cipherType = NULL_CIPHER_TYPE; |
wolfSSL | 0:d92f9d21154c | 7980 | ctx->keyLen = 0; |
wolfSSL | 0:d92f9d21154c | 7981 | } |
wolfSSL | 0:d92f9d21154c | 7982 | else |
wolfSSL | 0:d92f9d21154c | 7983 | return 0; /* failure */ |
wolfSSL | 0:d92f9d21154c | 7984 | |
wolfSSL | 0:d92f9d21154c | 7985 | |
wolfSSL | 0:d92f9d21154c | 7986 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 7987 | } |
wolfSSL | 0:d92f9d21154c | 7988 | |
wolfSSL | 0:d92f9d21154c | 7989 | |
wolfSSL | 0:d92f9d21154c | 7990 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 7991 | int wolfSSL_EVP_CIPHER_CTX_key_length(WOLFSSL_EVP_CIPHER_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 7992 | { |
wolfSSL | 0:d92f9d21154c | 7993 | WOLFSSL_ENTER("wolfSSL_EVP_CIPHER_CTX_key_length"); |
wolfSSL | 0:d92f9d21154c | 7994 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 7995 | return ctx->keyLen; |
wolfSSL | 0:d92f9d21154c | 7996 | |
wolfSSL | 0:d92f9d21154c | 7997 | return 0; /* failure */ |
wolfSSL | 0:d92f9d21154c | 7998 | } |
wolfSSL | 0:d92f9d21154c | 7999 | |
wolfSSL | 0:d92f9d21154c | 8000 | |
wolfSSL | 0:d92f9d21154c | 8001 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 8002 | int wolfSSL_EVP_CIPHER_CTX_set_key_length(WOLFSSL_EVP_CIPHER_CTX* ctx, |
wolfSSL | 0:d92f9d21154c | 8003 | int keylen) |
wolfSSL | 0:d92f9d21154c | 8004 | { |
wolfSSL | 0:d92f9d21154c | 8005 | WOLFSSL_ENTER("wolfSSL_EVP_CIPHER_CTX_set_key_length"); |
wolfSSL | 0:d92f9d21154c | 8006 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 8007 | ctx->keyLen = keylen; |
wolfSSL | 0:d92f9d21154c | 8008 | else |
wolfSSL | 0:d92f9d21154c | 8009 | return 0; /* failure */ |
wolfSSL | 0:d92f9d21154c | 8010 | |
wolfSSL | 0:d92f9d21154c | 8011 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 8012 | } |
wolfSSL | 0:d92f9d21154c | 8013 | |
wolfSSL | 0:d92f9d21154c | 8014 | |
wolfSSL | 0:d92f9d21154c | 8015 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 8016 | int wolfSSL_EVP_Cipher(WOLFSSL_EVP_CIPHER_CTX* ctx, byte* dst, byte* src, |
wolfSSL | 0:d92f9d21154c | 8017 | word32 len) |
wolfSSL | 0:d92f9d21154c | 8018 | { |
wolfSSL | 0:d92f9d21154c | 8019 | int ret = 0; |
wolfSSL | 0:d92f9d21154c | 8020 | WOLFSSL_ENTER("wolfSSL_EVP_Cipher"); |
wolfSSL | 0:d92f9d21154c | 8021 | |
wolfSSL | 0:d92f9d21154c | 8022 | if (ctx == NULL || dst == NULL || src == NULL) { |
wolfSSL | 0:d92f9d21154c | 8023 | WOLFSSL_MSG("Bad function argument"); |
wolfSSL | 0:d92f9d21154c | 8024 | return 0; /* failure */ |
wolfSSL | 0:d92f9d21154c | 8025 | } |
wolfSSL | 0:d92f9d21154c | 8026 | |
wolfSSL | 0:d92f9d21154c | 8027 | if (ctx->cipherType == 0xff) { |
wolfSSL | 0:d92f9d21154c | 8028 | WOLFSSL_MSG("no init"); |
wolfSSL | 0:d92f9d21154c | 8029 | return 0; /* failure */ |
wolfSSL | 0:d92f9d21154c | 8030 | } |
wolfSSL | 0:d92f9d21154c | 8031 | |
wolfSSL | 0:d92f9d21154c | 8032 | switch (ctx->cipherType) { |
wolfSSL | 0:d92f9d21154c | 8033 | |
wolfSSL | 0:d92f9d21154c | 8034 | #ifndef NO_AES |
wolfSSL | 0:d92f9d21154c | 8035 | case AES_128_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 8036 | case AES_192_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 8037 | case AES_256_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 8038 | WOLFSSL_MSG("AES CBC"); |
wolfSSL | 0:d92f9d21154c | 8039 | if (ctx->enc) |
wolfSSL | 0:d92f9d21154c | 8040 | ret = wc_AesCbcEncrypt(&ctx->cipher.aes, dst, src, len); |
wolfSSL | 0:d92f9d21154c | 8041 | else |
wolfSSL | 0:d92f9d21154c | 8042 | ret = wc_AesCbcDecrypt(&ctx->cipher.aes, dst, src, len); |
wolfSSL | 0:d92f9d21154c | 8043 | break; |
wolfSSL | 0:d92f9d21154c | 8044 | |
wolfSSL | 0:d92f9d21154c | 8045 | #ifdef WOLFSSL_AES_COUNTER |
wolfSSL | 0:d92f9d21154c | 8046 | case AES_128_CTR_TYPE : |
wolfSSL | 0:d92f9d21154c | 8047 | case AES_192_CTR_TYPE : |
wolfSSL | 0:d92f9d21154c | 8048 | case AES_256_CTR_TYPE : |
wolfSSL | 0:d92f9d21154c | 8049 | WOLFSSL_MSG("AES CTR"); |
wolfSSL | 0:d92f9d21154c | 8050 | wc_AesCtrEncrypt(&ctx->cipher.aes, dst, src, len); |
wolfSSL | 0:d92f9d21154c | 8051 | break; |
wolfSSL | 0:d92f9d21154c | 8052 | #endif |
wolfSSL | 0:d92f9d21154c | 8053 | #endif /* NO_AES */ |
wolfSSL | 0:d92f9d21154c | 8054 | |
wolfSSL | 0:d92f9d21154c | 8055 | #ifndef NO_DES3 |
wolfSSL | 0:d92f9d21154c | 8056 | case DES_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 8057 | if (ctx->enc) |
wolfSSL | 0:d92f9d21154c | 8058 | wc_Des_CbcEncrypt(&ctx->cipher.des, dst, src, len); |
wolfSSL | 0:d92f9d21154c | 8059 | else |
wolfSSL | 0:d92f9d21154c | 8060 | wc_Des_CbcDecrypt(&ctx->cipher.des, dst, src, len); |
wolfSSL | 0:d92f9d21154c | 8061 | break; |
wolfSSL | 0:d92f9d21154c | 8062 | |
wolfSSL | 0:d92f9d21154c | 8063 | case DES_EDE3_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 8064 | if (ctx->enc) |
wolfSSL | 0:d92f9d21154c | 8065 | ret = wc_Des3_CbcEncrypt(&ctx->cipher.des3, dst, src, len); |
wolfSSL | 0:d92f9d21154c | 8066 | else |
wolfSSL | 0:d92f9d21154c | 8067 | ret = wc_Des3_CbcDecrypt(&ctx->cipher.des3, dst, src, len); |
wolfSSL | 0:d92f9d21154c | 8068 | break; |
wolfSSL | 0:d92f9d21154c | 8069 | #endif |
wolfSSL | 0:d92f9d21154c | 8070 | |
wolfSSL | 0:d92f9d21154c | 8071 | #ifndef NO_RC4 |
wolfSSL | 0:d92f9d21154c | 8072 | case ARC4_TYPE : |
wolfSSL | 0:d92f9d21154c | 8073 | wc_Arc4Process(&ctx->cipher.arc4, dst, src, len); |
wolfSSL | 0:d92f9d21154c | 8074 | break; |
wolfSSL | 0:d92f9d21154c | 8075 | #endif |
wolfSSL | 0:d92f9d21154c | 8076 | |
wolfSSL | 0:d92f9d21154c | 8077 | case NULL_CIPHER_TYPE : |
wolfSSL | 0:d92f9d21154c | 8078 | XMEMCPY(dst, src, len); |
wolfSSL | 0:d92f9d21154c | 8079 | break; |
wolfSSL | 0:d92f9d21154c | 8080 | |
wolfSSL | 0:d92f9d21154c | 8081 | default: { |
wolfSSL | 0:d92f9d21154c | 8082 | WOLFSSL_MSG("bad type"); |
wolfSSL | 0:d92f9d21154c | 8083 | return 0; /* failure */ |
wolfSSL | 0:d92f9d21154c | 8084 | } |
wolfSSL | 0:d92f9d21154c | 8085 | } |
wolfSSL | 0:d92f9d21154c | 8086 | |
wolfSSL | 0:d92f9d21154c | 8087 | if (ret != 0) { |
wolfSSL | 0:d92f9d21154c | 8088 | WOLFSSL_MSG("wolfSSL_EVP_Cipher failure"); |
wolfSSL | 0:d92f9d21154c | 8089 | return 0; /* failuer */ |
wolfSSL | 0:d92f9d21154c | 8090 | } |
wolfSSL | 0:d92f9d21154c | 8091 | |
wolfSSL | 0:d92f9d21154c | 8092 | WOLFSSL_MSG("wolfSSL_EVP_Cipher success"); |
wolfSSL | 0:d92f9d21154c | 8093 | return SSL_SUCCESS; /* success */ |
wolfSSL | 0:d92f9d21154c | 8094 | } |
wolfSSL | 0:d92f9d21154c | 8095 | |
wolfSSL | 0:d92f9d21154c | 8096 | |
wolfSSL | 0:d92f9d21154c | 8097 | /* store for external read of iv, SSL_SUCCESS on success */ |
wolfSSL | 0:d92f9d21154c | 8098 | int wolfSSL_StoreExternalIV(WOLFSSL_EVP_CIPHER_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 8099 | { |
wolfSSL | 0:d92f9d21154c | 8100 | WOLFSSL_ENTER("wolfSSL_StoreExternalIV"); |
wolfSSL | 0:d92f9d21154c | 8101 | |
wolfSSL | 0:d92f9d21154c | 8102 | if (ctx == NULL) { |
wolfSSL | 0:d92f9d21154c | 8103 | WOLFSSL_MSG("Bad function argument"); |
wolfSSL | 0:d92f9d21154c | 8104 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 8105 | } |
wolfSSL | 0:d92f9d21154c | 8106 | |
wolfSSL | 0:d92f9d21154c | 8107 | switch (ctx->cipherType) { |
wolfSSL | 0:d92f9d21154c | 8108 | |
wolfSSL | 0:d92f9d21154c | 8109 | #ifndef NO_AES |
wolfSSL | 0:d92f9d21154c | 8110 | case AES_128_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 8111 | case AES_192_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 8112 | case AES_256_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 8113 | WOLFSSL_MSG("AES CBC"); |
wolfSSL | 0:d92f9d21154c | 8114 | memcpy(ctx->iv, &ctx->cipher.aes.reg, AES_BLOCK_SIZE); |
wolfSSL | 0:d92f9d21154c | 8115 | break; |
wolfSSL | 0:d92f9d21154c | 8116 | |
wolfSSL | 0:d92f9d21154c | 8117 | #ifdef WOLFSSL_AES_COUNTER |
wolfSSL | 0:d92f9d21154c | 8118 | case AES_128_CTR_TYPE : |
wolfSSL | 0:d92f9d21154c | 8119 | case AES_192_CTR_TYPE : |
wolfSSL | 0:d92f9d21154c | 8120 | case AES_256_CTR_TYPE : |
wolfSSL | 0:d92f9d21154c | 8121 | WOLFSSL_MSG("AES CTR"); |
wolfSSL | 0:d92f9d21154c | 8122 | memcpy(ctx->iv, &ctx->cipher.aes.reg, AES_BLOCK_SIZE); |
wolfSSL | 0:d92f9d21154c | 8123 | break; |
wolfSSL | 0:d92f9d21154c | 8124 | #endif /* WOLFSSL_AES_COUNTER */ |
wolfSSL | 0:d92f9d21154c | 8125 | |
wolfSSL | 0:d92f9d21154c | 8126 | #endif /* NO_AES */ |
wolfSSL | 0:d92f9d21154c | 8127 | |
wolfSSL | 0:d92f9d21154c | 8128 | #ifndef NO_DES3 |
wolfSSL | 0:d92f9d21154c | 8129 | case DES_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 8130 | WOLFSSL_MSG("DES CBC"); |
wolfSSL | 0:d92f9d21154c | 8131 | memcpy(ctx->iv, &ctx->cipher.des.reg, DES_BLOCK_SIZE); |
wolfSSL | 0:d92f9d21154c | 8132 | break; |
wolfSSL | 0:d92f9d21154c | 8133 | |
wolfSSL | 0:d92f9d21154c | 8134 | case DES_EDE3_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 8135 | WOLFSSL_MSG("DES EDE3 CBC"); |
wolfSSL | 0:d92f9d21154c | 8136 | memcpy(ctx->iv, &ctx->cipher.des3.reg, DES_BLOCK_SIZE); |
wolfSSL | 0:d92f9d21154c | 8137 | break; |
wolfSSL | 0:d92f9d21154c | 8138 | #endif |
wolfSSL | 0:d92f9d21154c | 8139 | |
wolfSSL | 0:d92f9d21154c | 8140 | case ARC4_TYPE : |
wolfSSL | 0:d92f9d21154c | 8141 | WOLFSSL_MSG("ARC4"); |
wolfSSL | 0:d92f9d21154c | 8142 | break; |
wolfSSL | 0:d92f9d21154c | 8143 | |
wolfSSL | 0:d92f9d21154c | 8144 | case NULL_CIPHER_TYPE : |
wolfSSL | 0:d92f9d21154c | 8145 | WOLFSSL_MSG("NULL"); |
wolfSSL | 0:d92f9d21154c | 8146 | break; |
wolfSSL | 0:d92f9d21154c | 8147 | |
wolfSSL | 0:d92f9d21154c | 8148 | default: { |
wolfSSL | 0:d92f9d21154c | 8149 | WOLFSSL_MSG("bad type"); |
wolfSSL | 0:d92f9d21154c | 8150 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 8151 | } |
wolfSSL | 0:d92f9d21154c | 8152 | } |
wolfSSL | 0:d92f9d21154c | 8153 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 8154 | } |
wolfSSL | 0:d92f9d21154c | 8155 | |
wolfSSL | 0:d92f9d21154c | 8156 | |
wolfSSL | 0:d92f9d21154c | 8157 | /* set internal IV from external, SSL_SUCCESS on success */ |
wolfSSL | 0:d92f9d21154c | 8158 | int wolfSSL_SetInternalIV(WOLFSSL_EVP_CIPHER_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 8159 | { |
wolfSSL | 0:d92f9d21154c | 8160 | |
wolfSSL | 0:d92f9d21154c | 8161 | WOLFSSL_ENTER("wolfSSL_SetInternalIV"); |
wolfSSL | 0:d92f9d21154c | 8162 | |
wolfSSL | 0:d92f9d21154c | 8163 | if (ctx == NULL) { |
wolfSSL | 0:d92f9d21154c | 8164 | WOLFSSL_MSG("Bad function argument"); |
wolfSSL | 0:d92f9d21154c | 8165 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 8166 | } |
wolfSSL | 0:d92f9d21154c | 8167 | |
wolfSSL | 0:d92f9d21154c | 8168 | switch (ctx->cipherType) { |
wolfSSL | 0:d92f9d21154c | 8169 | |
wolfSSL | 0:d92f9d21154c | 8170 | #ifndef NO_AES |
wolfSSL | 0:d92f9d21154c | 8171 | case AES_128_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 8172 | case AES_192_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 8173 | case AES_256_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 8174 | WOLFSSL_MSG("AES CBC"); |
wolfSSL | 0:d92f9d21154c | 8175 | memcpy(&ctx->cipher.aes.reg, ctx->iv, AES_BLOCK_SIZE); |
wolfSSL | 0:d92f9d21154c | 8176 | break; |
wolfSSL | 0:d92f9d21154c | 8177 | |
wolfSSL | 0:d92f9d21154c | 8178 | #ifdef WOLFSSL_AES_COUNTER |
wolfSSL | 0:d92f9d21154c | 8179 | case AES_128_CTR_TYPE : |
wolfSSL | 0:d92f9d21154c | 8180 | case AES_192_CTR_TYPE : |
wolfSSL | 0:d92f9d21154c | 8181 | case AES_256_CTR_TYPE : |
wolfSSL | 0:d92f9d21154c | 8182 | WOLFSSL_MSG("AES CTR"); |
wolfSSL | 0:d92f9d21154c | 8183 | memcpy(&ctx->cipher.aes.reg, ctx->iv, AES_BLOCK_SIZE); |
wolfSSL | 0:d92f9d21154c | 8184 | break; |
wolfSSL | 0:d92f9d21154c | 8185 | #endif |
wolfSSL | 0:d92f9d21154c | 8186 | |
wolfSSL | 0:d92f9d21154c | 8187 | #endif /* NO_AES */ |
wolfSSL | 0:d92f9d21154c | 8188 | |
wolfSSL | 0:d92f9d21154c | 8189 | #ifndef NO_DES3 |
wolfSSL | 0:d92f9d21154c | 8190 | case DES_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 8191 | WOLFSSL_MSG("DES CBC"); |
wolfSSL | 0:d92f9d21154c | 8192 | memcpy(&ctx->cipher.des.reg, ctx->iv, DES_BLOCK_SIZE); |
wolfSSL | 0:d92f9d21154c | 8193 | break; |
wolfSSL | 0:d92f9d21154c | 8194 | |
wolfSSL | 0:d92f9d21154c | 8195 | case DES_EDE3_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 8196 | WOLFSSL_MSG("DES EDE3 CBC"); |
wolfSSL | 0:d92f9d21154c | 8197 | memcpy(&ctx->cipher.des3.reg, ctx->iv, DES_BLOCK_SIZE); |
wolfSSL | 0:d92f9d21154c | 8198 | break; |
wolfSSL | 0:d92f9d21154c | 8199 | #endif |
wolfSSL | 0:d92f9d21154c | 8200 | |
wolfSSL | 0:d92f9d21154c | 8201 | case ARC4_TYPE : |
wolfSSL | 0:d92f9d21154c | 8202 | WOLFSSL_MSG("ARC4"); |
wolfSSL | 0:d92f9d21154c | 8203 | break; |
wolfSSL | 0:d92f9d21154c | 8204 | |
wolfSSL | 0:d92f9d21154c | 8205 | case NULL_CIPHER_TYPE : |
wolfSSL | 0:d92f9d21154c | 8206 | WOLFSSL_MSG("NULL"); |
wolfSSL | 0:d92f9d21154c | 8207 | break; |
wolfSSL | 0:d92f9d21154c | 8208 | |
wolfSSL | 0:d92f9d21154c | 8209 | default: { |
wolfSSL | 0:d92f9d21154c | 8210 | WOLFSSL_MSG("bad type"); |
wolfSSL | 0:d92f9d21154c | 8211 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 8212 | } |
wolfSSL | 0:d92f9d21154c | 8213 | } |
wolfSSL | 0:d92f9d21154c | 8214 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 8215 | } |
wolfSSL | 0:d92f9d21154c | 8216 | |
wolfSSL | 0:d92f9d21154c | 8217 | |
wolfSSL | 0:d92f9d21154c | 8218 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 8219 | int wolfSSL_EVP_DigestInit(WOLFSSL_EVP_MD_CTX* ctx, const WOLFSSL_EVP_MD* type) |
wolfSSL | 0:d92f9d21154c | 8220 | { |
wolfSSL | 0:d92f9d21154c | 8221 | WOLFSSL_ENTER("EVP_DigestInit"); |
wolfSSL | 0:d92f9d21154c | 8222 | if (XSTRNCMP(type, "SHA256", 6) == 0) { |
wolfSSL | 0:d92f9d21154c | 8223 | ctx->macType = SHA256; |
wolfSSL | 0:d92f9d21154c | 8224 | wolfSSL_SHA256_Init((SHA256_CTX*)&ctx->hash); |
wolfSSL | 0:d92f9d21154c | 8225 | } |
wolfSSL | 0:d92f9d21154c | 8226 | #ifdef WOLFSSL_SHA384 |
wolfSSL | 0:d92f9d21154c | 8227 | else if (XSTRNCMP(type, "SHA384", 6) == 0) { |
wolfSSL | 0:d92f9d21154c | 8228 | ctx->macType = SHA384; |
wolfSSL | 0:d92f9d21154c | 8229 | wolfSSL_SHA384_Init((SHA384_CTX*)&ctx->hash); |
wolfSSL | 0:d92f9d21154c | 8230 | } |
wolfSSL | 0:d92f9d21154c | 8231 | #endif |
wolfSSL | 0:d92f9d21154c | 8232 | #ifdef WOLFSSL_SHA512 |
wolfSSL | 0:d92f9d21154c | 8233 | else if (XSTRNCMP(type, "SHA512", 6) == 0) { |
wolfSSL | 0:d92f9d21154c | 8234 | ctx->macType = SHA512; |
wolfSSL | 0:d92f9d21154c | 8235 | wolfSSL_SHA512_Init((SHA512_CTX*)&ctx->hash); |
wolfSSL | 0:d92f9d21154c | 8236 | } |
wolfSSL | 0:d92f9d21154c | 8237 | #endif |
wolfSSL | 0:d92f9d21154c | 8238 | #ifndef NO_MD5 |
wolfSSL | 0:d92f9d21154c | 8239 | else if (XSTRNCMP(type, "MD5", 3) == 0) { |
wolfSSL | 0:d92f9d21154c | 8240 | ctx->macType = MD5; |
wolfSSL | 0:d92f9d21154c | 8241 | wolfSSL_MD5_Init((MD5_CTX*)&ctx->hash); |
wolfSSL | 0:d92f9d21154c | 8242 | } |
wolfSSL | 0:d92f9d21154c | 8243 | #endif |
wolfSSL | 0:d92f9d21154c | 8244 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 8245 | /* has to be last since would pick or 256, 384, or 512 too */ |
wolfSSL | 0:d92f9d21154c | 8246 | else if (XSTRNCMP(type, "SHA", 3) == 0) { |
wolfSSL | 0:d92f9d21154c | 8247 | ctx->macType = SHA; |
wolfSSL | 0:d92f9d21154c | 8248 | wolfSSL_SHA_Init((SHA_CTX*)&ctx->hash); |
wolfSSL | 0:d92f9d21154c | 8249 | } |
wolfSSL | 0:d92f9d21154c | 8250 | #endif /* NO_SHA */ |
wolfSSL | 0:d92f9d21154c | 8251 | else |
wolfSSL | 0:d92f9d21154c | 8252 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 8253 | |
wolfSSL | 0:d92f9d21154c | 8254 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 8255 | } |
wolfSSL | 0:d92f9d21154c | 8256 | |
wolfSSL | 0:d92f9d21154c | 8257 | |
wolfSSL | 0:d92f9d21154c | 8258 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 8259 | int wolfSSL_EVP_DigestUpdate(WOLFSSL_EVP_MD_CTX* ctx, const void* data, |
wolfSSL | 0:d92f9d21154c | 8260 | unsigned long sz) |
wolfSSL | 0:d92f9d21154c | 8261 | { |
wolfSSL | 0:d92f9d21154c | 8262 | WOLFSSL_ENTER("EVP_DigestUpdate"); |
wolfSSL | 0:d92f9d21154c | 8263 | |
wolfSSL | 0:d92f9d21154c | 8264 | switch (ctx->macType) { |
wolfSSL | 0:d92f9d21154c | 8265 | #ifndef NO_MD5 |
wolfSSL | 0:d92f9d21154c | 8266 | case MD5: |
wolfSSL | 0:d92f9d21154c | 8267 | wolfSSL_MD5_Update((MD5_CTX*)&ctx->hash, data, |
wolfSSL | 0:d92f9d21154c | 8268 | (unsigned long)sz); |
wolfSSL | 0:d92f9d21154c | 8269 | break; |
wolfSSL | 0:d92f9d21154c | 8270 | #endif |
wolfSSL | 0:d92f9d21154c | 8271 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 8272 | case SHA: |
wolfSSL | 0:d92f9d21154c | 8273 | wolfSSL_SHA_Update((SHA_CTX*)&ctx->hash, data, |
wolfSSL | 0:d92f9d21154c | 8274 | (unsigned long)sz); |
wolfSSL | 0:d92f9d21154c | 8275 | break; |
wolfSSL | 0:d92f9d21154c | 8276 | #endif |
wolfSSL | 0:d92f9d21154c | 8277 | #ifndef NO_SHA256 |
wolfSSL | 0:d92f9d21154c | 8278 | case SHA256: |
wolfSSL | 0:d92f9d21154c | 8279 | wolfSSL_SHA256_Update((SHA256_CTX*)&ctx->hash, data, |
wolfSSL | 0:d92f9d21154c | 8280 | (unsigned long)sz); |
wolfSSL | 0:d92f9d21154c | 8281 | break; |
wolfSSL | 0:d92f9d21154c | 8282 | #endif |
wolfSSL | 0:d92f9d21154c | 8283 | #ifdef WOLFSSL_SHA384 |
wolfSSL | 0:d92f9d21154c | 8284 | case SHA384: |
wolfSSL | 0:d92f9d21154c | 8285 | wolfSSL_SHA384_Update((SHA384_CTX*)&ctx->hash, data, |
wolfSSL | 0:d92f9d21154c | 8286 | (unsigned long)sz); |
wolfSSL | 0:d92f9d21154c | 8287 | break; |
wolfSSL | 0:d92f9d21154c | 8288 | #endif |
wolfSSL | 0:d92f9d21154c | 8289 | #ifdef WOLFSSL_SHA512 |
wolfSSL | 0:d92f9d21154c | 8290 | case SHA512: |
wolfSSL | 0:d92f9d21154c | 8291 | wolfSSL_SHA512_Update((SHA512_CTX*)&ctx->hash, data, |
wolfSSL | 0:d92f9d21154c | 8292 | (unsigned long)sz); |
wolfSSL | 0:d92f9d21154c | 8293 | break; |
wolfSSL | 0:d92f9d21154c | 8294 | #endif |
wolfSSL | 0:d92f9d21154c | 8295 | default: |
wolfSSL | 0:d92f9d21154c | 8296 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 8297 | } |
wolfSSL | 0:d92f9d21154c | 8298 | |
wolfSSL | 0:d92f9d21154c | 8299 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 8300 | } |
wolfSSL | 0:d92f9d21154c | 8301 | |
wolfSSL | 0:d92f9d21154c | 8302 | |
wolfSSL | 0:d92f9d21154c | 8303 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 8304 | int wolfSSL_EVP_DigestFinal(WOLFSSL_EVP_MD_CTX* ctx, unsigned char* md, |
wolfSSL | 0:d92f9d21154c | 8305 | unsigned int* s) |
wolfSSL | 0:d92f9d21154c | 8306 | { |
wolfSSL | 0:d92f9d21154c | 8307 | WOLFSSL_ENTER("EVP_DigestFinal"); |
wolfSSL | 0:d92f9d21154c | 8308 | switch (ctx->macType) { |
wolfSSL | 0:d92f9d21154c | 8309 | #ifndef NO_MD5 |
wolfSSL | 0:d92f9d21154c | 8310 | case MD5: |
wolfSSL | 0:d92f9d21154c | 8311 | wolfSSL_MD5_Final(md, (MD5_CTX*)&ctx->hash); |
wolfSSL | 0:d92f9d21154c | 8312 | if (s) *s = MD5_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 8313 | break; |
wolfSSL | 0:d92f9d21154c | 8314 | #endif |
wolfSSL | 0:d92f9d21154c | 8315 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 8316 | case SHA: |
wolfSSL | 0:d92f9d21154c | 8317 | wolfSSL_SHA_Final(md, (SHA_CTX*)&ctx->hash); |
wolfSSL | 0:d92f9d21154c | 8318 | if (s) *s = SHA_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 8319 | break; |
wolfSSL | 0:d92f9d21154c | 8320 | #endif |
wolfSSL | 0:d92f9d21154c | 8321 | #ifndef NO_SHA256 |
wolfSSL | 0:d92f9d21154c | 8322 | case SHA256: |
wolfSSL | 0:d92f9d21154c | 8323 | wolfSSL_SHA256_Final(md, (SHA256_CTX*)&ctx->hash); |
wolfSSL | 0:d92f9d21154c | 8324 | if (s) *s = SHA256_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 8325 | break; |
wolfSSL | 0:d92f9d21154c | 8326 | #endif |
wolfSSL | 0:d92f9d21154c | 8327 | #ifdef WOLFSSL_SHA384 |
wolfSSL | 0:d92f9d21154c | 8328 | case SHA384: |
wolfSSL | 0:d92f9d21154c | 8329 | wolfSSL_SHA384_Final(md, (SHA384_CTX*)&ctx->hash); |
wolfSSL | 0:d92f9d21154c | 8330 | if (s) *s = SHA384_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 8331 | break; |
wolfSSL | 0:d92f9d21154c | 8332 | #endif |
wolfSSL | 0:d92f9d21154c | 8333 | #ifdef WOLFSSL_SHA512 |
wolfSSL | 0:d92f9d21154c | 8334 | case SHA512: |
wolfSSL | 0:d92f9d21154c | 8335 | wolfSSL_SHA512_Final(md, (SHA512_CTX*)&ctx->hash); |
wolfSSL | 0:d92f9d21154c | 8336 | if (s) *s = SHA512_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 8337 | break; |
wolfSSL | 0:d92f9d21154c | 8338 | #endif |
wolfSSL | 0:d92f9d21154c | 8339 | default: |
wolfSSL | 0:d92f9d21154c | 8340 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 8341 | } |
wolfSSL | 0:d92f9d21154c | 8342 | |
wolfSSL | 0:d92f9d21154c | 8343 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 8344 | } |
wolfSSL | 0:d92f9d21154c | 8345 | |
wolfSSL | 0:d92f9d21154c | 8346 | |
wolfSSL | 0:d92f9d21154c | 8347 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 8348 | int wolfSSL_EVP_DigestFinal_ex(WOLFSSL_EVP_MD_CTX* ctx, unsigned char* md, |
wolfSSL | 0:d92f9d21154c | 8349 | unsigned int* s) |
wolfSSL | 0:d92f9d21154c | 8350 | { |
wolfSSL | 0:d92f9d21154c | 8351 | WOLFSSL_ENTER("EVP_DigestFinal_ex"); |
wolfSSL | 0:d92f9d21154c | 8352 | return EVP_DigestFinal(ctx, md, s); |
wolfSSL | 0:d92f9d21154c | 8353 | } |
wolfSSL | 0:d92f9d21154c | 8354 | |
wolfSSL | 0:d92f9d21154c | 8355 | |
wolfSSL | 0:d92f9d21154c | 8356 | unsigned char* wolfSSL_HMAC(const WOLFSSL_EVP_MD* evp_md, const void* key, |
wolfSSL | 0:d92f9d21154c | 8357 | int key_len, const unsigned char* d, int n, |
wolfSSL | 0:d92f9d21154c | 8358 | unsigned char* md, unsigned int* md_len) |
wolfSSL | 0:d92f9d21154c | 8359 | { |
wolfSSL | 0:d92f9d21154c | 8360 | int type; |
wolfSSL | 0:d92f9d21154c | 8361 | unsigned char* ret = NULL; |
wolfSSL | 0:d92f9d21154c | 8362 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 8363 | Hmac* hmac = NULL; |
wolfSSL | 0:d92f9d21154c | 8364 | #else |
wolfSSL | 0:d92f9d21154c | 8365 | Hmac hmac[1]; |
wolfSSL | 0:d92f9d21154c | 8366 | #endif |
wolfSSL | 0:d92f9d21154c | 8367 | |
wolfSSL | 0:d92f9d21154c | 8368 | WOLFSSL_ENTER("HMAC"); |
wolfSSL | 0:d92f9d21154c | 8369 | if (!md) |
wolfSSL | 0:d92f9d21154c | 8370 | return NULL; /* no static buffer support */ |
wolfSSL | 0:d92f9d21154c | 8371 | |
wolfSSL | 0:d92f9d21154c | 8372 | if (XSTRNCMP(evp_md, "MD5", 3) == 0) |
wolfSSL | 0:d92f9d21154c | 8373 | type = MD5; |
wolfSSL | 0:d92f9d21154c | 8374 | else if (XSTRNCMP(evp_md, "SHA", 3) == 0) |
wolfSSL | 0:d92f9d21154c | 8375 | type = SHA; |
wolfSSL | 0:d92f9d21154c | 8376 | else |
wolfSSL | 0:d92f9d21154c | 8377 | return NULL; |
wolfSSL | 0:d92f9d21154c | 8378 | |
wolfSSL | 0:d92f9d21154c | 8379 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 8380 | hmac = (Hmac*)XMALLOC(sizeof(Hmac), NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 8381 | if (hmac == NULL) |
wolfSSL | 0:d92f9d21154c | 8382 | return NULL; |
wolfSSL | 0:d92f9d21154c | 8383 | #endif |
wolfSSL | 0:d92f9d21154c | 8384 | |
wolfSSL | 0:d92f9d21154c | 8385 | if (wc_HmacSetKey(hmac, type, (const byte*)key, key_len) == 0) |
wolfSSL | 0:d92f9d21154c | 8386 | if (wc_HmacUpdate(hmac, d, n) == 0) |
wolfSSL | 0:d92f9d21154c | 8387 | if (wc_HmacFinal(hmac, md) == 0) { |
wolfSSL | 0:d92f9d21154c | 8388 | if (md_len) |
wolfSSL | 0:d92f9d21154c | 8389 | *md_len = (type == MD5) ? (int)MD5_DIGEST_SIZE |
wolfSSL | 0:d92f9d21154c | 8390 | : (int)SHA_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 8391 | ret = md; |
wolfSSL | 0:d92f9d21154c | 8392 | } |
wolfSSL | 0:d92f9d21154c | 8393 | |
wolfSSL | 0:d92f9d21154c | 8394 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 8395 | XFREE(hmac, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 8396 | #endif |
wolfSSL | 0:d92f9d21154c | 8397 | |
wolfSSL | 0:d92f9d21154c | 8398 | return ret; |
wolfSSL | 0:d92f9d21154c | 8399 | } |
wolfSSL | 0:d92f9d21154c | 8400 | |
wolfSSL | 0:d92f9d21154c | 8401 | void wolfSSL_ERR_clear_error(void) |
wolfSSL | 0:d92f9d21154c | 8402 | { |
wolfSSL | 0:d92f9d21154c | 8403 | /* TODO: */ |
wolfSSL | 0:d92f9d21154c | 8404 | } |
wolfSSL | 0:d92f9d21154c | 8405 | |
wolfSSL | 0:d92f9d21154c | 8406 | |
wolfSSL | 0:d92f9d21154c | 8407 | int wolfSSL_RAND_status(void) |
wolfSSL | 0:d92f9d21154c | 8408 | { |
wolfSSL | 0:d92f9d21154c | 8409 | return SSL_SUCCESS; /* wolfCrypt provides enough seed internally */ |
wolfSSL | 0:d92f9d21154c | 8410 | } |
wolfSSL | 0:d92f9d21154c | 8411 | |
wolfSSL | 0:d92f9d21154c | 8412 | |
wolfSSL | 0:d92f9d21154c | 8413 | |
wolfSSL | 0:d92f9d21154c | 8414 | void wolfSSL_RAND_add(const void* add, int len, double entropy) |
wolfSSL | 0:d92f9d21154c | 8415 | { |
wolfSSL | 0:d92f9d21154c | 8416 | (void)add; |
wolfSSL | 0:d92f9d21154c | 8417 | (void)len; |
wolfSSL | 0:d92f9d21154c | 8418 | (void)entropy; |
wolfSSL | 0:d92f9d21154c | 8419 | |
wolfSSL | 0:d92f9d21154c | 8420 | /* wolfSSL seeds/adds internally, use explicit RNG if you want |
wolfSSL | 0:d92f9d21154c | 8421 | to take control */ |
wolfSSL | 0:d92f9d21154c | 8422 | } |
wolfSSL | 0:d92f9d21154c | 8423 | |
wolfSSL | 0:d92f9d21154c | 8424 | |
wolfSSL | 0:d92f9d21154c | 8425 | #ifndef NO_DES3 |
wolfSSL | 0:d92f9d21154c | 8426 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 8427 | int wolfSSL_DES_key_sched(WOLFSSL_const_DES_cblock* key, |
wolfSSL | 0:d92f9d21154c | 8428 | WOLFSSL_DES_key_schedule* schedule) |
wolfSSL | 0:d92f9d21154c | 8429 | { |
wolfSSL | 0:d92f9d21154c | 8430 | WOLFSSL_ENTER("DES_key_sched"); |
wolfSSL | 0:d92f9d21154c | 8431 | XMEMCPY(schedule, key, sizeof(const_DES_cblock)); |
wolfSSL | 0:d92f9d21154c | 8432 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 8433 | } |
wolfSSL | 0:d92f9d21154c | 8434 | |
wolfSSL | 0:d92f9d21154c | 8435 | |
wolfSSL | 0:d92f9d21154c | 8436 | void wolfSSL_DES_cbc_encrypt(const unsigned char* input, |
wolfSSL | 0:d92f9d21154c | 8437 | unsigned char* output, long length, |
wolfSSL | 0:d92f9d21154c | 8438 | WOLFSSL_DES_key_schedule* schedule, WOLFSSL_DES_cblock* ivec, |
wolfSSL | 0:d92f9d21154c | 8439 | int enc) |
wolfSSL | 0:d92f9d21154c | 8440 | { |
wolfSSL | 0:d92f9d21154c | 8441 | Des myDes; |
wolfSSL | 0:d92f9d21154c | 8442 | |
wolfSSL | 0:d92f9d21154c | 8443 | WOLFSSL_ENTER("DES_cbc_encrypt"); |
wolfSSL | 0:d92f9d21154c | 8444 | |
wolfSSL | 0:d92f9d21154c | 8445 | /* OpenSSL compat, no ret */ |
wolfSSL | 0:d92f9d21154c | 8446 | wc_Des_SetKey(&myDes, (const byte*)schedule, (const byte*)ivec, !enc); |
wolfSSL | 0:d92f9d21154c | 8447 | |
wolfSSL | 0:d92f9d21154c | 8448 | if (enc) |
wolfSSL | 0:d92f9d21154c | 8449 | wc_Des_CbcEncrypt(&myDes, output, input, (word32)length); |
wolfSSL | 0:d92f9d21154c | 8450 | else |
wolfSSL | 0:d92f9d21154c | 8451 | wc_Des_CbcDecrypt(&myDes, output, input, (word32)length); |
wolfSSL | 0:d92f9d21154c | 8452 | } |
wolfSSL | 0:d92f9d21154c | 8453 | |
wolfSSL | 0:d92f9d21154c | 8454 | |
wolfSSL | 0:d92f9d21154c | 8455 | /* correctly sets ivec for next call */ |
wolfSSL | 0:d92f9d21154c | 8456 | void wolfSSL_DES_ncbc_encrypt(const unsigned char* input, |
wolfSSL | 0:d92f9d21154c | 8457 | unsigned char* output, long length, |
wolfSSL | 0:d92f9d21154c | 8458 | WOLFSSL_DES_key_schedule* schedule, WOLFSSL_DES_cblock* ivec, |
wolfSSL | 0:d92f9d21154c | 8459 | int enc) |
wolfSSL | 0:d92f9d21154c | 8460 | { |
wolfSSL | 0:d92f9d21154c | 8461 | Des myDes; |
wolfSSL | 0:d92f9d21154c | 8462 | |
wolfSSL | 0:d92f9d21154c | 8463 | WOLFSSL_ENTER("DES_ncbc_encrypt"); |
wolfSSL | 0:d92f9d21154c | 8464 | |
wolfSSL | 0:d92f9d21154c | 8465 | /* OpenSSL compat, no ret */ |
wolfSSL | 0:d92f9d21154c | 8466 | wc_Des_SetKey(&myDes, (const byte*)schedule, (const byte*)ivec, !enc); |
wolfSSL | 0:d92f9d21154c | 8467 | |
wolfSSL | 0:d92f9d21154c | 8468 | if (enc) |
wolfSSL | 0:d92f9d21154c | 8469 | wc_Des_CbcEncrypt(&myDes, output, input, (word32)length); |
wolfSSL | 0:d92f9d21154c | 8470 | else |
wolfSSL | 0:d92f9d21154c | 8471 | wc_Des_CbcDecrypt(&myDes, output, input, (word32)length); |
wolfSSL | 0:d92f9d21154c | 8472 | |
wolfSSL | 0:d92f9d21154c | 8473 | XMEMCPY(ivec, output + length - sizeof(DES_cblock), sizeof(DES_cblock)); |
wolfSSL | 0:d92f9d21154c | 8474 | } |
wolfSSL | 0:d92f9d21154c | 8475 | |
wolfSSL | 0:d92f9d21154c | 8476 | #endif /* NO_DES3 */ |
wolfSSL | 0:d92f9d21154c | 8477 | |
wolfSSL | 0:d92f9d21154c | 8478 | |
wolfSSL | 0:d92f9d21154c | 8479 | void wolfSSL_ERR_free_strings(void) |
wolfSSL | 0:d92f9d21154c | 8480 | { |
wolfSSL | 0:d92f9d21154c | 8481 | /* handled internally */ |
wolfSSL | 0:d92f9d21154c | 8482 | } |
wolfSSL | 0:d92f9d21154c | 8483 | |
wolfSSL | 0:d92f9d21154c | 8484 | |
wolfSSL | 0:d92f9d21154c | 8485 | void wolfSSL_ERR_remove_state(unsigned long state) |
wolfSSL | 0:d92f9d21154c | 8486 | { |
wolfSSL | 0:d92f9d21154c | 8487 | /* TODO: GetErrors().Remove(); */ |
wolfSSL | 0:d92f9d21154c | 8488 | (void)state; |
wolfSSL | 0:d92f9d21154c | 8489 | } |
wolfSSL | 0:d92f9d21154c | 8490 | |
wolfSSL | 0:d92f9d21154c | 8491 | |
wolfSSL | 0:d92f9d21154c | 8492 | void wolfSSL_EVP_cleanup(void) |
wolfSSL | 0:d92f9d21154c | 8493 | { |
wolfSSL | 0:d92f9d21154c | 8494 | /* nothing to do here */ |
wolfSSL | 0:d92f9d21154c | 8495 | } |
wolfSSL | 0:d92f9d21154c | 8496 | |
wolfSSL | 0:d92f9d21154c | 8497 | |
wolfSSL | 0:d92f9d21154c | 8498 | void wolfSSL_cleanup_all_ex_data(void) |
wolfSSL | 0:d92f9d21154c | 8499 | { |
wolfSSL | 0:d92f9d21154c | 8500 | /* nothing to do here */ |
wolfSSL | 0:d92f9d21154c | 8501 | } |
wolfSSL | 0:d92f9d21154c | 8502 | |
wolfSSL | 0:d92f9d21154c | 8503 | |
wolfSSL | 0:d92f9d21154c | 8504 | int wolfSSL_clear(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 8505 | { |
wolfSSL | 0:d92f9d21154c | 8506 | (void)ssl; |
wolfSSL | 0:d92f9d21154c | 8507 | /* TODO: GetErrors().Remove(); */ |
wolfSSL | 0:d92f9d21154c | 8508 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 8509 | } |
wolfSSL | 0:d92f9d21154c | 8510 | |
wolfSSL | 0:d92f9d21154c | 8511 | |
wolfSSL | 0:d92f9d21154c | 8512 | long wolfSSL_SSL_SESSION_set_timeout(WOLFSSL_SESSION* ses, long t) |
wolfSSL | 0:d92f9d21154c | 8513 | { |
wolfSSL | 0:d92f9d21154c | 8514 | word32 tmptime; |
wolfSSL | 0:d92f9d21154c | 8515 | if (!ses || t < 0) |
wolfSSL | 0:d92f9d21154c | 8516 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 8517 | |
wolfSSL | 0:d92f9d21154c | 8518 | tmptime = t & 0xFFFFFFFF; |
wolfSSL | 0:d92f9d21154c | 8519 | |
wolfSSL | 0:d92f9d21154c | 8520 | ses->timeout = tmptime; |
wolfSSL | 0:d92f9d21154c | 8521 | |
wolfSSL | 0:d92f9d21154c | 8522 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 8523 | } |
wolfSSL | 0:d92f9d21154c | 8524 | |
wolfSSL | 0:d92f9d21154c | 8525 | |
wolfSSL | 0:d92f9d21154c | 8526 | long wolfSSL_CTX_set_mode(WOLFSSL_CTX* ctx, long mode) |
wolfSSL | 0:d92f9d21154c | 8527 | { |
wolfSSL | 0:d92f9d21154c | 8528 | /* SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER is wolfSSL default mode */ |
wolfSSL | 0:d92f9d21154c | 8529 | |
wolfSSL | 0:d92f9d21154c | 8530 | WOLFSSL_ENTER("SSL_CTX_set_mode"); |
wolfSSL | 0:d92f9d21154c | 8531 | if (mode == SSL_MODE_ENABLE_PARTIAL_WRITE) |
wolfSSL | 0:d92f9d21154c | 8532 | ctx->partialWrite = 1; |
wolfSSL | 0:d92f9d21154c | 8533 | |
wolfSSL | 0:d92f9d21154c | 8534 | return mode; |
wolfSSL | 0:d92f9d21154c | 8535 | } |
wolfSSL | 0:d92f9d21154c | 8536 | |
wolfSSL | 0:d92f9d21154c | 8537 | |
wolfSSL | 0:d92f9d21154c | 8538 | long wolfSSL_SSL_get_mode(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 8539 | { |
wolfSSL | 0:d92f9d21154c | 8540 | /* TODO: */ |
wolfSSL | 0:d92f9d21154c | 8541 | (void)ssl; |
wolfSSL | 0:d92f9d21154c | 8542 | return 0; |
wolfSSL | 0:d92f9d21154c | 8543 | } |
wolfSSL | 0:d92f9d21154c | 8544 | |
wolfSSL | 0:d92f9d21154c | 8545 | |
wolfSSL | 0:d92f9d21154c | 8546 | long wolfSSL_CTX_get_mode(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 8547 | { |
wolfSSL | 0:d92f9d21154c | 8548 | /* TODO: */ |
wolfSSL | 0:d92f9d21154c | 8549 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 8550 | return 0; |
wolfSSL | 0:d92f9d21154c | 8551 | } |
wolfSSL | 0:d92f9d21154c | 8552 | |
wolfSSL | 0:d92f9d21154c | 8553 | |
wolfSSL | 0:d92f9d21154c | 8554 | void wolfSSL_CTX_set_default_read_ahead(WOLFSSL_CTX* ctx, int m) |
wolfSSL | 0:d92f9d21154c | 8555 | { |
wolfSSL | 0:d92f9d21154c | 8556 | /* TODO: maybe? */ |
wolfSSL | 0:d92f9d21154c | 8557 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 8558 | (void)m; |
wolfSSL | 0:d92f9d21154c | 8559 | } |
wolfSSL | 0:d92f9d21154c | 8560 | |
wolfSSL | 0:d92f9d21154c | 8561 | |
wolfSSL | 0:d92f9d21154c | 8562 | int wolfSSL_CTX_set_session_id_context(WOLFSSL_CTX* ctx, |
wolfSSL | 0:d92f9d21154c | 8563 | const unsigned char* sid_ctx, |
wolfSSL | 0:d92f9d21154c | 8564 | unsigned int sid_ctx_len) |
wolfSSL | 0:d92f9d21154c | 8565 | { |
wolfSSL | 0:d92f9d21154c | 8566 | /* No application specific context needed for wolfSSL */ |
wolfSSL | 0:d92f9d21154c | 8567 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 8568 | (void)sid_ctx; |
wolfSSL | 0:d92f9d21154c | 8569 | (void)sid_ctx_len; |
wolfSSL | 0:d92f9d21154c | 8570 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 8571 | } |
wolfSSL | 0:d92f9d21154c | 8572 | |
wolfSSL | 0:d92f9d21154c | 8573 | |
wolfSSL | 0:d92f9d21154c | 8574 | long wolfSSL_CTX_sess_get_cache_size(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 8575 | { |
wolfSSL | 0:d92f9d21154c | 8576 | /* TODO: maybe? */ |
wolfSSL | 0:d92f9d21154c | 8577 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 8578 | return (~0); |
wolfSSL | 0:d92f9d21154c | 8579 | } |
wolfSSL | 0:d92f9d21154c | 8580 | |
wolfSSL | 0:d92f9d21154c | 8581 | unsigned long wolfSSL_ERR_get_error_line_data(const char** file, int* line, |
wolfSSL | 0:d92f9d21154c | 8582 | const char** data, int *flags) |
wolfSSL | 0:d92f9d21154c | 8583 | { |
wolfSSL | 0:d92f9d21154c | 8584 | /* Not implemented */ |
wolfSSL | 0:d92f9d21154c | 8585 | (void)file; |
wolfSSL | 0:d92f9d21154c | 8586 | (void)line; |
wolfSSL | 0:d92f9d21154c | 8587 | (void)data; |
wolfSSL | 0:d92f9d21154c | 8588 | (void)flags; |
wolfSSL | 0:d92f9d21154c | 8589 | return 0; |
wolfSSL | 0:d92f9d21154c | 8590 | } |
wolfSSL | 0:d92f9d21154c | 8591 | |
wolfSSL | 0:d92f9d21154c | 8592 | #endif /* OPENSSL_EXTRA */ |
wolfSSL | 0:d92f9d21154c | 8593 | |
wolfSSL | 0:d92f9d21154c | 8594 | |
wolfSSL | 0:d92f9d21154c | 8595 | #if defined(KEEP_PEER_CERT) |
wolfSSL | 0:d92f9d21154c | 8596 | |
wolfSSL | 0:d92f9d21154c | 8597 | WOLFSSL_X509* wolfSSL_get_peer_certificate(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 8598 | { |
wolfSSL | 0:d92f9d21154c | 8599 | WOLFSSL_ENTER("SSL_get_peer_certificate"); |
wolfSSL | 0:d92f9d21154c | 8600 | if (ssl->peerCert.issuer.sz) |
wolfSSL | 0:d92f9d21154c | 8601 | return &ssl->peerCert; |
wolfSSL | 0:d92f9d21154c | 8602 | else |
wolfSSL | 0:d92f9d21154c | 8603 | return 0; |
wolfSSL | 0:d92f9d21154c | 8604 | } |
wolfSSL | 0:d92f9d21154c | 8605 | |
wolfSSL | 0:d92f9d21154c | 8606 | #endif /* KEEP_PEER_CERT */ |
wolfSSL | 0:d92f9d21154c | 8607 | |
wolfSSL | 0:d92f9d21154c | 8608 | |
wolfSSL | 0:d92f9d21154c | 8609 | #if defined(KEEP_PEER_CERT) || defined(SESSION_CERTS) |
wolfSSL | 0:d92f9d21154c | 8610 | |
wolfSSL | 0:d92f9d21154c | 8611 | void wolfSSL_FreeX509(WOLFSSL_X509* x509) |
wolfSSL | 0:d92f9d21154c | 8612 | { |
wolfSSL | 0:d92f9d21154c | 8613 | WOLFSSL_ENTER("wolfSSL_FreeX509"); |
wolfSSL | 0:d92f9d21154c | 8614 | FreeX509(x509); |
wolfSSL | 0:d92f9d21154c | 8615 | } |
wolfSSL | 0:d92f9d21154c | 8616 | |
wolfSSL | 0:d92f9d21154c | 8617 | |
wolfSSL | 0:d92f9d21154c | 8618 | /* return the next, if any, altname from the peer cert */ |
wolfSSL | 0:d92f9d21154c | 8619 | char* wolfSSL_X509_get_next_altname(WOLFSSL_X509* cert) |
wolfSSL | 0:d92f9d21154c | 8620 | { |
wolfSSL | 0:d92f9d21154c | 8621 | char* ret = NULL; |
wolfSSL | 0:d92f9d21154c | 8622 | WOLFSSL_ENTER("wolfSSL_X509_get_next_altname"); |
wolfSSL | 0:d92f9d21154c | 8623 | |
wolfSSL | 0:d92f9d21154c | 8624 | /* don't have any to work with */ |
wolfSSL | 0:d92f9d21154c | 8625 | if (cert == NULL || cert->altNames == NULL) |
wolfSSL | 0:d92f9d21154c | 8626 | return NULL; |
wolfSSL | 0:d92f9d21154c | 8627 | |
wolfSSL | 0:d92f9d21154c | 8628 | /* already went through them */ |
wolfSSL | 0:d92f9d21154c | 8629 | if (cert->altNamesNext == NULL) |
wolfSSL | 0:d92f9d21154c | 8630 | return NULL; |
wolfSSL | 0:d92f9d21154c | 8631 | |
wolfSSL | 0:d92f9d21154c | 8632 | ret = cert->altNamesNext->name; |
wolfSSL | 0:d92f9d21154c | 8633 | cert->altNamesNext = cert->altNamesNext->next; |
wolfSSL | 0:d92f9d21154c | 8634 | |
wolfSSL | 0:d92f9d21154c | 8635 | return ret; |
wolfSSL | 0:d92f9d21154c | 8636 | } |
wolfSSL | 0:d92f9d21154c | 8637 | |
wolfSSL | 0:d92f9d21154c | 8638 | |
wolfSSL | 0:d92f9d21154c | 8639 | WOLFSSL_X509_NAME* wolfSSL_X509_get_issuer_name(WOLFSSL_X509* cert) |
wolfSSL | 0:d92f9d21154c | 8640 | { |
wolfSSL | 0:d92f9d21154c | 8641 | WOLFSSL_ENTER("X509_get_issuer_name"); |
wolfSSL | 0:d92f9d21154c | 8642 | return &cert->issuer; |
wolfSSL | 0:d92f9d21154c | 8643 | } |
wolfSSL | 0:d92f9d21154c | 8644 | |
wolfSSL | 0:d92f9d21154c | 8645 | |
wolfSSL | 0:d92f9d21154c | 8646 | WOLFSSL_X509_NAME* wolfSSL_X509_get_subject_name(WOLFSSL_X509* cert) |
wolfSSL | 0:d92f9d21154c | 8647 | { |
wolfSSL | 0:d92f9d21154c | 8648 | WOLFSSL_ENTER("X509_get_subject_name"); |
wolfSSL | 0:d92f9d21154c | 8649 | return &cert->subject; |
wolfSSL | 0:d92f9d21154c | 8650 | } |
wolfSSL | 0:d92f9d21154c | 8651 | |
wolfSSL | 0:d92f9d21154c | 8652 | |
wolfSSL | 0:d92f9d21154c | 8653 | int wolfSSL_X509_get_isCA(WOLFSSL_X509* x509) |
wolfSSL | 0:d92f9d21154c | 8654 | { |
wolfSSL | 0:d92f9d21154c | 8655 | int isCA = 0; |
wolfSSL | 0:d92f9d21154c | 8656 | |
wolfSSL | 0:d92f9d21154c | 8657 | WOLFSSL_ENTER("wolfSSL_X509_get_isCA"); |
wolfSSL | 0:d92f9d21154c | 8658 | |
wolfSSL | 0:d92f9d21154c | 8659 | if (x509 != NULL) |
wolfSSL | 0:d92f9d21154c | 8660 | isCA = x509->isCa; |
wolfSSL | 0:d92f9d21154c | 8661 | |
wolfSSL | 0:d92f9d21154c | 8662 | WOLFSSL_LEAVE("wolfSSL_X509_get_isCA", isCA); |
wolfSSL | 0:d92f9d21154c | 8663 | |
wolfSSL | 0:d92f9d21154c | 8664 | return isCA; |
wolfSSL | 0:d92f9d21154c | 8665 | } |
wolfSSL | 0:d92f9d21154c | 8666 | |
wolfSSL | 0:d92f9d21154c | 8667 | |
wolfSSL | 0:d92f9d21154c | 8668 | #ifdef OPENSSL_EXTRA |
wolfSSL | 0:d92f9d21154c | 8669 | int wolfSSL_X509_ext_isSet_by_NID(WOLFSSL_X509* x509, int nid) |
wolfSSL | 0:d92f9d21154c | 8670 | { |
wolfSSL | 0:d92f9d21154c | 8671 | int isSet = 0; |
wolfSSL | 0:d92f9d21154c | 8672 | |
wolfSSL | 0:d92f9d21154c | 8673 | WOLFSSL_ENTER("wolfSSL_X509_ext_isSet_by_NID"); |
wolfSSL | 0:d92f9d21154c | 8674 | |
wolfSSL | 0:d92f9d21154c | 8675 | if (x509 != NULL) { |
wolfSSL | 0:d92f9d21154c | 8676 | switch (nid) { |
wolfSSL | 0:d92f9d21154c | 8677 | case BASIC_CA_OID: isSet = x509->basicConstSet; break; |
wolfSSL | 0:d92f9d21154c | 8678 | case ALT_NAMES_OID: isSet = x509->subjAltNameSet; break; |
wolfSSL | 0:d92f9d21154c | 8679 | case AUTH_KEY_OID: isSet = x509->authKeyIdSet; break; |
wolfSSL | 0:d92f9d21154c | 8680 | case SUBJ_KEY_OID: isSet = x509->subjKeyIdSet; break; |
wolfSSL | 0:d92f9d21154c | 8681 | case KEY_USAGE_OID: isSet = x509->keyUsageSet; break; |
wolfSSL | 0:d92f9d21154c | 8682 | #ifdef WOLFSSL_SEP |
wolfSSL | 0:d92f9d21154c | 8683 | case CERT_POLICY_OID: isSet = x509->certPolicySet; break; |
wolfSSL | 0:d92f9d21154c | 8684 | #endif /* WOLFSSL_SEP */ |
wolfSSL | 0:d92f9d21154c | 8685 | } |
wolfSSL | 0:d92f9d21154c | 8686 | } |
wolfSSL | 0:d92f9d21154c | 8687 | |
wolfSSL | 0:d92f9d21154c | 8688 | WOLFSSL_LEAVE("wolfSSL_X509_ext_isSet_by_NID", isSet); |
wolfSSL | 0:d92f9d21154c | 8689 | |
wolfSSL | 0:d92f9d21154c | 8690 | return isSet; |
wolfSSL | 0:d92f9d21154c | 8691 | } |
wolfSSL | 0:d92f9d21154c | 8692 | |
wolfSSL | 0:d92f9d21154c | 8693 | |
wolfSSL | 0:d92f9d21154c | 8694 | int wolfSSL_X509_ext_get_critical_by_NID(WOLFSSL_X509* x509, int nid) |
wolfSSL | 0:d92f9d21154c | 8695 | { |
wolfSSL | 0:d92f9d21154c | 8696 | int crit = 0; |
wolfSSL | 0:d92f9d21154c | 8697 | |
wolfSSL | 0:d92f9d21154c | 8698 | WOLFSSL_ENTER("wolfSSL_X509_ext_get_critical_by_NID"); |
wolfSSL | 0:d92f9d21154c | 8699 | |
wolfSSL | 0:d92f9d21154c | 8700 | if (x509 != NULL) { |
wolfSSL | 0:d92f9d21154c | 8701 | switch (nid) { |
wolfSSL | 0:d92f9d21154c | 8702 | case BASIC_CA_OID: crit = x509->basicConstCrit; break; |
wolfSSL | 0:d92f9d21154c | 8703 | case ALT_NAMES_OID: crit = x509->subjAltNameCrit; break; |
wolfSSL | 0:d92f9d21154c | 8704 | case AUTH_KEY_OID: crit = x509->authKeyIdCrit; break; |
wolfSSL | 0:d92f9d21154c | 8705 | case SUBJ_KEY_OID: crit = x509->subjKeyIdCrit; break; |
wolfSSL | 0:d92f9d21154c | 8706 | case KEY_USAGE_OID: crit = x509->keyUsageCrit; break; |
wolfSSL | 0:d92f9d21154c | 8707 | #ifdef WOLFSSL_SEP |
wolfSSL | 0:d92f9d21154c | 8708 | case CERT_POLICY_OID: crit = x509->certPolicyCrit; break; |
wolfSSL | 0:d92f9d21154c | 8709 | #endif /* WOLFSSL_SEP */ |
wolfSSL | 0:d92f9d21154c | 8710 | } |
wolfSSL | 0:d92f9d21154c | 8711 | } |
wolfSSL | 0:d92f9d21154c | 8712 | |
wolfSSL | 0:d92f9d21154c | 8713 | WOLFSSL_LEAVE("wolfSSL_X509_ext_get_critical_by_NID", crit); |
wolfSSL | 0:d92f9d21154c | 8714 | |
wolfSSL | 0:d92f9d21154c | 8715 | return crit; |
wolfSSL | 0:d92f9d21154c | 8716 | } |
wolfSSL | 0:d92f9d21154c | 8717 | |
wolfSSL | 0:d92f9d21154c | 8718 | |
wolfSSL | 0:d92f9d21154c | 8719 | int wolfSSL_X509_get_isSet_pathLength(WOLFSSL_X509* x509) |
wolfSSL | 0:d92f9d21154c | 8720 | { |
wolfSSL | 0:d92f9d21154c | 8721 | int isSet = 0; |
wolfSSL | 0:d92f9d21154c | 8722 | |
wolfSSL | 0:d92f9d21154c | 8723 | WOLFSSL_ENTER("wolfSSL_X509_get_isSet_pathLength"); |
wolfSSL | 0:d92f9d21154c | 8724 | |
wolfSSL | 0:d92f9d21154c | 8725 | if (x509 != NULL) |
wolfSSL | 0:d92f9d21154c | 8726 | isSet = x509->basicConstPlSet; |
wolfSSL | 0:d92f9d21154c | 8727 | |
wolfSSL | 0:d92f9d21154c | 8728 | WOLFSSL_LEAVE("wolfSSL_X509_get_isSet_pathLength", isSet); |
wolfSSL | 0:d92f9d21154c | 8729 | |
wolfSSL | 0:d92f9d21154c | 8730 | return isSet; |
wolfSSL | 0:d92f9d21154c | 8731 | } |
wolfSSL | 0:d92f9d21154c | 8732 | |
wolfSSL | 0:d92f9d21154c | 8733 | |
wolfSSL | 0:d92f9d21154c | 8734 | word32 wolfSSL_X509_get_pathLength(WOLFSSL_X509* x509) |
wolfSSL | 0:d92f9d21154c | 8735 | { |
wolfSSL | 0:d92f9d21154c | 8736 | word32 pathLength = 0; |
wolfSSL | 0:d92f9d21154c | 8737 | |
wolfSSL | 0:d92f9d21154c | 8738 | WOLFSSL_ENTER("wolfSSL_X509_get_pathLength"); |
wolfSSL | 0:d92f9d21154c | 8739 | |
wolfSSL | 0:d92f9d21154c | 8740 | if (x509 != NULL) |
wolfSSL | 0:d92f9d21154c | 8741 | pathLength = x509->pathLength; |
wolfSSL | 0:d92f9d21154c | 8742 | |
wolfSSL | 0:d92f9d21154c | 8743 | WOLFSSL_LEAVE("wolfSSL_X509_get_pathLength", pathLength); |
wolfSSL | 0:d92f9d21154c | 8744 | |
wolfSSL | 0:d92f9d21154c | 8745 | return pathLength; |
wolfSSL | 0:d92f9d21154c | 8746 | } |
wolfSSL | 0:d92f9d21154c | 8747 | |
wolfSSL | 0:d92f9d21154c | 8748 | |
wolfSSL | 0:d92f9d21154c | 8749 | unsigned int wolfSSL_X509_get_keyUsage(WOLFSSL_X509* x509) |
wolfSSL | 0:d92f9d21154c | 8750 | { |
wolfSSL | 0:d92f9d21154c | 8751 | word16 usage = 0; |
wolfSSL | 0:d92f9d21154c | 8752 | |
wolfSSL | 0:d92f9d21154c | 8753 | WOLFSSL_ENTER("wolfSSL_X509_get_keyUsage"); |
wolfSSL | 0:d92f9d21154c | 8754 | |
wolfSSL | 0:d92f9d21154c | 8755 | if (x509 != NULL) |
wolfSSL | 0:d92f9d21154c | 8756 | usage = x509->keyUsage; |
wolfSSL | 0:d92f9d21154c | 8757 | |
wolfSSL | 0:d92f9d21154c | 8758 | WOLFSSL_LEAVE("wolfSSL_X509_get_keyUsage", usage); |
wolfSSL | 0:d92f9d21154c | 8759 | |
wolfSSL | 0:d92f9d21154c | 8760 | return usage; |
wolfSSL | 0:d92f9d21154c | 8761 | } |
wolfSSL | 0:d92f9d21154c | 8762 | |
wolfSSL | 0:d92f9d21154c | 8763 | |
wolfSSL | 0:d92f9d21154c | 8764 | byte* wolfSSL_X509_get_authorityKeyID( |
wolfSSL | 0:d92f9d21154c | 8765 | WOLFSSL_X509* x509, byte* dst, int* dstLen) |
wolfSSL | 0:d92f9d21154c | 8766 | { |
wolfSSL | 0:d92f9d21154c | 8767 | byte *id = NULL; |
wolfSSL | 0:d92f9d21154c | 8768 | int copySz = 0; |
wolfSSL | 0:d92f9d21154c | 8769 | |
wolfSSL | 0:d92f9d21154c | 8770 | WOLFSSL_ENTER("wolfSSL_X509_get_authorityKeyID"); |
wolfSSL | 0:d92f9d21154c | 8771 | |
wolfSSL | 0:d92f9d21154c | 8772 | if (x509 != NULL) { |
wolfSSL | 0:d92f9d21154c | 8773 | if (x509->authKeyIdSet) { |
wolfSSL | 0:d92f9d21154c | 8774 | copySz = min(dstLen != NULL ? *dstLen : 0, |
wolfSSL | 0:d92f9d21154c | 8775 | (int)x509->authKeyIdSz); |
wolfSSL | 0:d92f9d21154c | 8776 | id = x509->authKeyId; |
wolfSSL | 0:d92f9d21154c | 8777 | } |
wolfSSL | 0:d92f9d21154c | 8778 | |
wolfSSL | 0:d92f9d21154c | 8779 | if (dst != NULL && dstLen != NULL && id != NULL && copySz > 0) { |
wolfSSL | 0:d92f9d21154c | 8780 | XMEMCPY(dst, id, copySz); |
wolfSSL | 0:d92f9d21154c | 8781 | id = dst; |
wolfSSL | 0:d92f9d21154c | 8782 | *dstLen = copySz; |
wolfSSL | 0:d92f9d21154c | 8783 | } |
wolfSSL | 0:d92f9d21154c | 8784 | } |
wolfSSL | 0:d92f9d21154c | 8785 | |
wolfSSL | 0:d92f9d21154c | 8786 | WOLFSSL_LEAVE("wolfSSL_X509_get_authorityKeyID", copySz); |
wolfSSL | 0:d92f9d21154c | 8787 | |
wolfSSL | 0:d92f9d21154c | 8788 | return id; |
wolfSSL | 0:d92f9d21154c | 8789 | } |
wolfSSL | 0:d92f9d21154c | 8790 | |
wolfSSL | 0:d92f9d21154c | 8791 | |
wolfSSL | 0:d92f9d21154c | 8792 | byte* wolfSSL_X509_get_subjectKeyID( |
wolfSSL | 0:d92f9d21154c | 8793 | WOLFSSL_X509* x509, byte* dst, int* dstLen) |
wolfSSL | 0:d92f9d21154c | 8794 | { |
wolfSSL | 0:d92f9d21154c | 8795 | byte *id = NULL; |
wolfSSL | 0:d92f9d21154c | 8796 | int copySz = 0; |
wolfSSL | 0:d92f9d21154c | 8797 | |
wolfSSL | 0:d92f9d21154c | 8798 | WOLFSSL_ENTER("wolfSSL_X509_get_subjectKeyID"); |
wolfSSL | 0:d92f9d21154c | 8799 | |
wolfSSL | 0:d92f9d21154c | 8800 | if (x509 != NULL) { |
wolfSSL | 0:d92f9d21154c | 8801 | if (x509->subjKeyIdSet) { |
wolfSSL | 0:d92f9d21154c | 8802 | copySz = min(dstLen != NULL ? *dstLen : 0, |
wolfSSL | 0:d92f9d21154c | 8803 | (int)x509->subjKeyIdSz); |
wolfSSL | 0:d92f9d21154c | 8804 | id = x509->subjKeyId; |
wolfSSL | 0:d92f9d21154c | 8805 | } |
wolfSSL | 0:d92f9d21154c | 8806 | |
wolfSSL | 0:d92f9d21154c | 8807 | if (dst != NULL && dstLen != NULL && id != NULL && copySz > 0) { |
wolfSSL | 0:d92f9d21154c | 8808 | XMEMCPY(dst, id, copySz); |
wolfSSL | 0:d92f9d21154c | 8809 | id = dst; |
wolfSSL | 0:d92f9d21154c | 8810 | *dstLen = copySz; |
wolfSSL | 0:d92f9d21154c | 8811 | } |
wolfSSL | 0:d92f9d21154c | 8812 | } |
wolfSSL | 0:d92f9d21154c | 8813 | |
wolfSSL | 0:d92f9d21154c | 8814 | WOLFSSL_LEAVE("wolfSSL_X509_get_subjectKeyID", copySz); |
wolfSSL | 0:d92f9d21154c | 8815 | |
wolfSSL | 0:d92f9d21154c | 8816 | return id; |
wolfSSL | 0:d92f9d21154c | 8817 | } |
wolfSSL | 0:d92f9d21154c | 8818 | |
wolfSSL | 0:d92f9d21154c | 8819 | |
wolfSSL | 0:d92f9d21154c | 8820 | int wolfSSL_X509_NAME_entry_count(WOLFSSL_X509_NAME* name) |
wolfSSL | 0:d92f9d21154c | 8821 | { |
wolfSSL | 0:d92f9d21154c | 8822 | int count = 0; |
wolfSSL | 0:d92f9d21154c | 8823 | |
wolfSSL | 0:d92f9d21154c | 8824 | WOLFSSL_ENTER("wolfSSL_X509_NAME_entry_count"); |
wolfSSL | 0:d92f9d21154c | 8825 | |
wolfSSL | 0:d92f9d21154c | 8826 | if (name != NULL) |
wolfSSL | 0:d92f9d21154c | 8827 | count = name->fullName.entryCount; |
wolfSSL | 0:d92f9d21154c | 8828 | |
wolfSSL | 0:d92f9d21154c | 8829 | WOLFSSL_LEAVE("wolfSSL_X509_NAME_entry_count", count); |
wolfSSL | 0:d92f9d21154c | 8830 | return count; |
wolfSSL | 0:d92f9d21154c | 8831 | } |
wolfSSL | 0:d92f9d21154c | 8832 | |
wolfSSL | 0:d92f9d21154c | 8833 | |
wolfSSL | 0:d92f9d21154c | 8834 | int wolfSSL_X509_NAME_get_text_by_NID(WOLFSSL_X509_NAME* name, |
wolfSSL | 0:d92f9d21154c | 8835 | int nid, char* buf, int len) |
wolfSSL | 0:d92f9d21154c | 8836 | { |
wolfSSL | 0:d92f9d21154c | 8837 | char *text = NULL; |
wolfSSL | 0:d92f9d21154c | 8838 | int textSz = 0; |
wolfSSL | 0:d92f9d21154c | 8839 | |
wolfSSL | 0:d92f9d21154c | 8840 | WOLFSSL_ENTER("wolfSSL_X509_NAME_get_text_by_NID"); |
wolfSSL | 0:d92f9d21154c | 8841 | |
wolfSSL | 0:d92f9d21154c | 8842 | switch (nid) { |
wolfSSL | 0:d92f9d21154c | 8843 | case ASN_COMMON_NAME: |
wolfSSL | 0:d92f9d21154c | 8844 | text = name->fullName.fullName + name->fullName.cnIdx; |
wolfSSL | 0:d92f9d21154c | 8845 | textSz = name->fullName.cnLen; |
wolfSSL | 0:d92f9d21154c | 8846 | break; |
wolfSSL | 0:d92f9d21154c | 8847 | case ASN_SUR_NAME: |
wolfSSL | 0:d92f9d21154c | 8848 | text = name->fullName.fullName + name->fullName.snIdx; |
wolfSSL | 0:d92f9d21154c | 8849 | textSz = name->fullName.snLen; |
wolfSSL | 0:d92f9d21154c | 8850 | break; |
wolfSSL | 0:d92f9d21154c | 8851 | case ASN_SERIAL_NUMBER: |
wolfSSL | 0:d92f9d21154c | 8852 | text = name->fullName.fullName + name->fullName.serialIdx; |
wolfSSL | 0:d92f9d21154c | 8853 | textSz = name->fullName.serialLen; |
wolfSSL | 0:d92f9d21154c | 8854 | break; |
wolfSSL | 0:d92f9d21154c | 8855 | case ASN_COUNTRY_NAME: |
wolfSSL | 0:d92f9d21154c | 8856 | text = name->fullName.fullName + name->fullName.cIdx; |
wolfSSL | 0:d92f9d21154c | 8857 | textSz = name->fullName.cLen; |
wolfSSL | 0:d92f9d21154c | 8858 | break; |
wolfSSL | 0:d92f9d21154c | 8859 | case ASN_LOCALITY_NAME: |
wolfSSL | 0:d92f9d21154c | 8860 | text = name->fullName.fullName + name->fullName.lIdx; |
wolfSSL | 0:d92f9d21154c | 8861 | textSz = name->fullName.lLen; |
wolfSSL | 0:d92f9d21154c | 8862 | break; |
wolfSSL | 0:d92f9d21154c | 8863 | case ASN_STATE_NAME: |
wolfSSL | 0:d92f9d21154c | 8864 | text = name->fullName.fullName + name->fullName.stIdx; |
wolfSSL | 0:d92f9d21154c | 8865 | textSz = name->fullName.stLen; |
wolfSSL | 0:d92f9d21154c | 8866 | break; |
wolfSSL | 0:d92f9d21154c | 8867 | case ASN_ORG_NAME: |
wolfSSL | 0:d92f9d21154c | 8868 | text = name->fullName.fullName + name->fullName.oIdx; |
wolfSSL | 0:d92f9d21154c | 8869 | textSz = name->fullName.oLen; |
wolfSSL | 0:d92f9d21154c | 8870 | break; |
wolfSSL | 0:d92f9d21154c | 8871 | case ASN_ORGUNIT_NAME: |
wolfSSL | 0:d92f9d21154c | 8872 | text = name->fullName.fullName + name->fullName.ouIdx; |
wolfSSL | 0:d92f9d21154c | 8873 | textSz = name->fullName.ouLen; |
wolfSSL | 0:d92f9d21154c | 8874 | break; |
wolfSSL | 0:d92f9d21154c | 8875 | default: |
wolfSSL | 0:d92f9d21154c | 8876 | break; |
wolfSSL | 0:d92f9d21154c | 8877 | } |
wolfSSL | 0:d92f9d21154c | 8878 | |
wolfSSL | 0:d92f9d21154c | 8879 | if (buf != NULL && text != NULL) { |
wolfSSL | 0:d92f9d21154c | 8880 | textSz = min(textSz, len); |
wolfSSL | 0:d92f9d21154c | 8881 | XMEMCPY(buf, text, textSz); |
wolfSSL | 0:d92f9d21154c | 8882 | buf[textSz] = '\0'; |
wolfSSL | 0:d92f9d21154c | 8883 | } |
wolfSSL | 0:d92f9d21154c | 8884 | |
wolfSSL | 0:d92f9d21154c | 8885 | WOLFSSL_LEAVE("wolfSSL_X509_NAME_get_text_by_NID", textSz); |
wolfSSL | 0:d92f9d21154c | 8886 | return textSz; |
wolfSSL | 0:d92f9d21154c | 8887 | } |
wolfSSL | 0:d92f9d21154c | 8888 | #endif |
wolfSSL | 0:d92f9d21154c | 8889 | |
wolfSSL | 0:d92f9d21154c | 8890 | |
wolfSSL | 0:d92f9d21154c | 8891 | /* copy name into in buffer, at most sz bytes, if buffer is null will |
wolfSSL | 0:d92f9d21154c | 8892 | malloc buffer, call responsible for freeing */ |
wolfSSL | 0:d92f9d21154c | 8893 | char* wolfSSL_X509_NAME_oneline(WOLFSSL_X509_NAME* name, char* in, int sz) |
wolfSSL | 0:d92f9d21154c | 8894 | { |
wolfSSL | 0:d92f9d21154c | 8895 | int copySz = min(sz, name->sz); |
wolfSSL | 0:d92f9d21154c | 8896 | |
wolfSSL | 0:d92f9d21154c | 8897 | WOLFSSL_ENTER("wolfSSL_X509_NAME_oneline"); |
wolfSSL | 0:d92f9d21154c | 8898 | if (!name->sz) return in; |
wolfSSL | 0:d92f9d21154c | 8899 | |
wolfSSL | 0:d92f9d21154c | 8900 | if (!in) { |
wolfSSL | 0:d92f9d21154c | 8901 | in = (char*)XMALLOC(name->sz, 0, DYNAMIC_TYPE_OPENSSL); |
wolfSSL | 0:d92f9d21154c | 8902 | if (!in ) return in; |
wolfSSL | 0:d92f9d21154c | 8903 | copySz = name->sz; |
wolfSSL | 0:d92f9d21154c | 8904 | } |
wolfSSL | 0:d92f9d21154c | 8905 | |
wolfSSL | 0:d92f9d21154c | 8906 | if (copySz == 0) |
wolfSSL | 0:d92f9d21154c | 8907 | return in; |
wolfSSL | 0:d92f9d21154c | 8908 | |
wolfSSL | 0:d92f9d21154c | 8909 | XMEMCPY(in, name->name, copySz - 1); |
wolfSSL | 0:d92f9d21154c | 8910 | in[copySz - 1] = 0; |
wolfSSL | 0:d92f9d21154c | 8911 | |
wolfSSL | 0:d92f9d21154c | 8912 | return in; |
wolfSSL | 0:d92f9d21154c | 8913 | } |
wolfSSL | 0:d92f9d21154c | 8914 | |
wolfSSL | 0:d92f9d21154c | 8915 | |
wolfSSL | 0:d92f9d21154c | 8916 | int wolfSSL_X509_get_signature_type(WOLFSSL_X509* x509) |
wolfSSL | 0:d92f9d21154c | 8917 | { |
wolfSSL | 0:d92f9d21154c | 8918 | int type = 0; |
wolfSSL | 0:d92f9d21154c | 8919 | |
wolfSSL | 0:d92f9d21154c | 8920 | WOLFSSL_ENTER("wolfSSL_X509_get_signature_type"); |
wolfSSL | 0:d92f9d21154c | 8921 | |
wolfSSL | 0:d92f9d21154c | 8922 | if (x509 != NULL) |
wolfSSL | 0:d92f9d21154c | 8923 | type = x509->sigOID; |
wolfSSL | 0:d92f9d21154c | 8924 | |
wolfSSL | 0:d92f9d21154c | 8925 | return type; |
wolfSSL | 0:d92f9d21154c | 8926 | } |
wolfSSL | 0:d92f9d21154c | 8927 | |
wolfSSL | 0:d92f9d21154c | 8928 | |
wolfSSL | 0:d92f9d21154c | 8929 | int wolfSSL_X509_get_signature(WOLFSSL_X509* x509, |
wolfSSL | 0:d92f9d21154c | 8930 | unsigned char* buf, int* bufSz) |
wolfSSL | 0:d92f9d21154c | 8931 | { |
wolfSSL | 0:d92f9d21154c | 8932 | WOLFSSL_ENTER("wolfSSL_X509_get_signature"); |
wolfSSL | 0:d92f9d21154c | 8933 | if (x509 == NULL || bufSz == NULL || *bufSz < (int)x509->sig.length) |
wolfSSL | 0:d92f9d21154c | 8934 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 8935 | |
wolfSSL | 0:d92f9d21154c | 8936 | if (buf != NULL) |
wolfSSL | 0:d92f9d21154c | 8937 | XMEMCPY(buf, x509->sig.buffer, x509->sig.length); |
wolfSSL | 0:d92f9d21154c | 8938 | *bufSz = x509->sig.length; |
wolfSSL | 0:d92f9d21154c | 8939 | |
wolfSSL | 0:d92f9d21154c | 8940 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 8941 | } |
wolfSSL | 0:d92f9d21154c | 8942 | |
wolfSSL | 0:d92f9d21154c | 8943 | |
wolfSSL | 0:d92f9d21154c | 8944 | /* write X509 serial number in unsigned binary to buffer |
wolfSSL | 0:d92f9d21154c | 8945 | buffer needs to be at least EXTERNAL_SERIAL_SIZE (32) for all cases |
wolfSSL | 0:d92f9d21154c | 8946 | return SSL_SUCCESS on success */ |
wolfSSL | 0:d92f9d21154c | 8947 | int wolfSSL_X509_get_serial_number(WOLFSSL_X509* x509, byte* in, int* inOutSz) |
wolfSSL | 0:d92f9d21154c | 8948 | { |
wolfSSL | 0:d92f9d21154c | 8949 | WOLFSSL_ENTER("wolfSSL_X509_get_serial_number"); |
wolfSSL | 0:d92f9d21154c | 8950 | if (x509 == NULL || in == NULL || |
wolfSSL | 0:d92f9d21154c | 8951 | inOutSz == NULL || *inOutSz < x509->serialSz) |
wolfSSL | 0:d92f9d21154c | 8952 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 8953 | |
wolfSSL | 0:d92f9d21154c | 8954 | XMEMCPY(in, x509->serial, x509->serialSz); |
wolfSSL | 0:d92f9d21154c | 8955 | *inOutSz = x509->serialSz; |
wolfSSL | 0:d92f9d21154c | 8956 | |
wolfSSL | 0:d92f9d21154c | 8957 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 8958 | } |
wolfSSL | 0:d92f9d21154c | 8959 | |
wolfSSL | 0:d92f9d21154c | 8960 | |
wolfSSL | 0:d92f9d21154c | 8961 | const byte* wolfSSL_X509_get_der(WOLFSSL_X509* x509, int* outSz) |
wolfSSL | 0:d92f9d21154c | 8962 | { |
wolfSSL | 0:d92f9d21154c | 8963 | WOLFSSL_ENTER("wolfSSL_X509_get_der"); |
wolfSSL | 0:d92f9d21154c | 8964 | |
wolfSSL | 0:d92f9d21154c | 8965 | if (x509 == NULL || outSz == NULL) |
wolfSSL | 0:d92f9d21154c | 8966 | return NULL; |
wolfSSL | 0:d92f9d21154c | 8967 | |
wolfSSL | 0:d92f9d21154c | 8968 | *outSz = (int)x509->derCert.length; |
wolfSSL | 0:d92f9d21154c | 8969 | return x509->derCert.buffer; |
wolfSSL | 0:d92f9d21154c | 8970 | } |
wolfSSL | 0:d92f9d21154c | 8971 | |
wolfSSL | 0:d92f9d21154c | 8972 | |
wolfSSL | 0:d92f9d21154c | 8973 | int wolfSSL_X509_version(WOLFSSL_X509* x509) |
wolfSSL | 0:d92f9d21154c | 8974 | { |
wolfSSL | 0:d92f9d21154c | 8975 | WOLFSSL_ENTER("wolfSSL_X509_version"); |
wolfSSL | 0:d92f9d21154c | 8976 | |
wolfSSL | 0:d92f9d21154c | 8977 | if (x509 == NULL) |
wolfSSL | 0:d92f9d21154c | 8978 | return 0; |
wolfSSL | 0:d92f9d21154c | 8979 | |
wolfSSL | 0:d92f9d21154c | 8980 | return x509->version; |
wolfSSL | 0:d92f9d21154c | 8981 | } |
wolfSSL | 0:d92f9d21154c | 8982 | |
wolfSSL | 0:d92f9d21154c | 8983 | |
wolfSSL | 0:d92f9d21154c | 8984 | const byte* wolfSSL_X509_notBefore(WOLFSSL_X509* x509) |
wolfSSL | 0:d92f9d21154c | 8985 | { |
wolfSSL | 0:d92f9d21154c | 8986 | WOLFSSL_ENTER("wolfSSL_X509_notBefore"); |
wolfSSL | 0:d92f9d21154c | 8987 | |
wolfSSL | 0:d92f9d21154c | 8988 | if (x509 == NULL) |
wolfSSL | 0:d92f9d21154c | 8989 | return NULL; |
wolfSSL | 0:d92f9d21154c | 8990 | |
wolfSSL | 0:d92f9d21154c | 8991 | return x509->notBefore; |
wolfSSL | 0:d92f9d21154c | 8992 | } |
wolfSSL | 0:d92f9d21154c | 8993 | |
wolfSSL | 0:d92f9d21154c | 8994 | |
wolfSSL | 0:d92f9d21154c | 8995 | const byte* wolfSSL_X509_notAfter(WOLFSSL_X509* x509) |
wolfSSL | 0:d92f9d21154c | 8996 | { |
wolfSSL | 0:d92f9d21154c | 8997 | WOLFSSL_ENTER("wolfSSL_X509_notAfter"); |
wolfSSL | 0:d92f9d21154c | 8998 | |
wolfSSL | 0:d92f9d21154c | 8999 | if (x509 == NULL) |
wolfSSL | 0:d92f9d21154c | 9000 | return NULL; |
wolfSSL | 0:d92f9d21154c | 9001 | |
wolfSSL | 0:d92f9d21154c | 9002 | return x509->notAfter; |
wolfSSL | 0:d92f9d21154c | 9003 | } |
wolfSSL | 0:d92f9d21154c | 9004 | |
wolfSSL | 0:d92f9d21154c | 9005 | |
wolfSSL | 0:d92f9d21154c | 9006 | #ifdef WOLFSSL_SEP |
wolfSSL | 0:d92f9d21154c | 9007 | |
wolfSSL | 0:d92f9d21154c | 9008 | /* copy oid into in buffer, at most *inOutSz bytes, if buffer is null will |
wolfSSL | 0:d92f9d21154c | 9009 | malloc buffer, call responsible for freeing. Actual size returned in |
wolfSSL | 0:d92f9d21154c | 9010 | *inOutSz. Requires inOutSz be non-null */ |
wolfSSL | 0:d92f9d21154c | 9011 | byte* wolfSSL_X509_get_device_type(WOLFSSL_X509* x509, byte* in, int *inOutSz) |
wolfSSL | 0:d92f9d21154c | 9012 | { |
wolfSSL | 0:d92f9d21154c | 9013 | int copySz; |
wolfSSL | 0:d92f9d21154c | 9014 | |
wolfSSL | 0:d92f9d21154c | 9015 | WOLFSSL_ENTER("wolfSSL_X509_get_dev_type"); |
wolfSSL | 0:d92f9d21154c | 9016 | if (inOutSz == NULL) return NULL; |
wolfSSL | 0:d92f9d21154c | 9017 | if (!x509->deviceTypeSz) return in; |
wolfSSL | 0:d92f9d21154c | 9018 | |
wolfSSL | 0:d92f9d21154c | 9019 | copySz = min(*inOutSz, x509->deviceTypeSz); |
wolfSSL | 0:d92f9d21154c | 9020 | |
wolfSSL | 0:d92f9d21154c | 9021 | if (!in) { |
wolfSSL | 0:d92f9d21154c | 9022 | in = (byte*)XMALLOC(x509->deviceTypeSz, 0, DYNAMIC_TYPE_OPENSSL); |
wolfSSL | 0:d92f9d21154c | 9023 | if (!in) return in; |
wolfSSL | 0:d92f9d21154c | 9024 | copySz = x509->deviceTypeSz; |
wolfSSL | 0:d92f9d21154c | 9025 | } |
wolfSSL | 0:d92f9d21154c | 9026 | |
wolfSSL | 0:d92f9d21154c | 9027 | XMEMCPY(in, x509->deviceType, copySz); |
wolfSSL | 0:d92f9d21154c | 9028 | *inOutSz = copySz; |
wolfSSL | 0:d92f9d21154c | 9029 | |
wolfSSL | 0:d92f9d21154c | 9030 | return in; |
wolfSSL | 0:d92f9d21154c | 9031 | } |
wolfSSL | 0:d92f9d21154c | 9032 | |
wolfSSL | 0:d92f9d21154c | 9033 | |
wolfSSL | 0:d92f9d21154c | 9034 | byte* wolfSSL_X509_get_hw_type(WOLFSSL_X509* x509, byte* in, int* inOutSz) |
wolfSSL | 0:d92f9d21154c | 9035 | { |
wolfSSL | 0:d92f9d21154c | 9036 | int copySz; |
wolfSSL | 0:d92f9d21154c | 9037 | |
wolfSSL | 0:d92f9d21154c | 9038 | WOLFSSL_ENTER("wolfSSL_X509_get_hw_type"); |
wolfSSL | 0:d92f9d21154c | 9039 | if (inOutSz == NULL) return NULL; |
wolfSSL | 0:d92f9d21154c | 9040 | if (!x509->hwTypeSz) return in; |
wolfSSL | 0:d92f9d21154c | 9041 | |
wolfSSL | 0:d92f9d21154c | 9042 | copySz = min(*inOutSz, x509->hwTypeSz); |
wolfSSL | 0:d92f9d21154c | 9043 | |
wolfSSL | 0:d92f9d21154c | 9044 | if (!in) { |
wolfSSL | 0:d92f9d21154c | 9045 | in = (byte*)XMALLOC(x509->hwTypeSz, 0, DYNAMIC_TYPE_OPENSSL); |
wolfSSL | 0:d92f9d21154c | 9046 | if (!in) return in; |
wolfSSL | 0:d92f9d21154c | 9047 | copySz = x509->hwTypeSz; |
wolfSSL | 0:d92f9d21154c | 9048 | } |
wolfSSL | 0:d92f9d21154c | 9049 | |
wolfSSL | 0:d92f9d21154c | 9050 | XMEMCPY(in, x509->hwType, copySz); |
wolfSSL | 0:d92f9d21154c | 9051 | *inOutSz = copySz; |
wolfSSL | 0:d92f9d21154c | 9052 | |
wolfSSL | 0:d92f9d21154c | 9053 | return in; |
wolfSSL | 0:d92f9d21154c | 9054 | } |
wolfSSL | 0:d92f9d21154c | 9055 | |
wolfSSL | 0:d92f9d21154c | 9056 | |
wolfSSL | 0:d92f9d21154c | 9057 | byte* wolfSSL_X509_get_hw_serial_number(WOLFSSL_X509* x509,byte* in,int* inOutSz) |
wolfSSL | 0:d92f9d21154c | 9058 | { |
wolfSSL | 0:d92f9d21154c | 9059 | int copySz; |
wolfSSL | 0:d92f9d21154c | 9060 | |
wolfSSL | 0:d92f9d21154c | 9061 | WOLFSSL_ENTER("wolfSSL_X509_get_hw_serial_number"); |
wolfSSL | 0:d92f9d21154c | 9062 | if (inOutSz == NULL) return NULL; |
wolfSSL | 0:d92f9d21154c | 9063 | if (!x509->hwTypeSz) return in; |
wolfSSL | 0:d92f9d21154c | 9064 | |
wolfSSL | 0:d92f9d21154c | 9065 | copySz = min(*inOutSz, x509->hwSerialNumSz); |
wolfSSL | 0:d92f9d21154c | 9066 | |
wolfSSL | 0:d92f9d21154c | 9067 | if (!in) { |
wolfSSL | 0:d92f9d21154c | 9068 | in = (byte*)XMALLOC(x509->hwSerialNumSz, 0, DYNAMIC_TYPE_OPENSSL); |
wolfSSL | 0:d92f9d21154c | 9069 | if (!in) return in; |
wolfSSL | 0:d92f9d21154c | 9070 | copySz = x509->hwSerialNumSz; |
wolfSSL | 0:d92f9d21154c | 9071 | } |
wolfSSL | 0:d92f9d21154c | 9072 | |
wolfSSL | 0:d92f9d21154c | 9073 | XMEMCPY(in, x509->hwSerialNum, copySz); |
wolfSSL | 0:d92f9d21154c | 9074 | *inOutSz = copySz; |
wolfSSL | 0:d92f9d21154c | 9075 | |
wolfSSL | 0:d92f9d21154c | 9076 | return in; |
wolfSSL | 0:d92f9d21154c | 9077 | } |
wolfSSL | 0:d92f9d21154c | 9078 | |
wolfSSL | 0:d92f9d21154c | 9079 | #endif /* WOLFSSL_SEP */ |
wolfSSL | 0:d92f9d21154c | 9080 | |
wolfSSL | 0:d92f9d21154c | 9081 | |
wolfSSL | 0:d92f9d21154c | 9082 | WOLFSSL_X509* wolfSSL_X509_d2i(WOLFSSL_X509** x509, const byte* in, int len) |
wolfSSL | 0:d92f9d21154c | 9083 | { |
wolfSSL | 0:d92f9d21154c | 9084 | WOLFSSL_X509 *newX509 = NULL; |
wolfSSL | 0:d92f9d21154c | 9085 | |
wolfSSL | 0:d92f9d21154c | 9086 | WOLFSSL_ENTER("wolfSSL_X509_d2i"); |
wolfSSL | 0:d92f9d21154c | 9087 | |
wolfSSL | 0:d92f9d21154c | 9088 | if (in != NULL && len != 0) { |
wolfSSL | 0:d92f9d21154c | 9089 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 9090 | DecodedCert* cert = NULL; |
wolfSSL | 0:d92f9d21154c | 9091 | #else |
wolfSSL | 0:d92f9d21154c | 9092 | DecodedCert cert[1]; |
wolfSSL | 0:d92f9d21154c | 9093 | #endif |
wolfSSL | 0:d92f9d21154c | 9094 | |
wolfSSL | 0:d92f9d21154c | 9095 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 9096 | cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL, |
wolfSSL | 0:d92f9d21154c | 9097 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 9098 | if (cert == NULL) |
wolfSSL | 0:d92f9d21154c | 9099 | return NULL; |
wolfSSL | 0:d92f9d21154c | 9100 | #endif |
wolfSSL | 0:d92f9d21154c | 9101 | |
wolfSSL | 0:d92f9d21154c | 9102 | InitDecodedCert(cert, (byte*)in, len, NULL); |
wolfSSL | 0:d92f9d21154c | 9103 | if (ParseCertRelative(cert, CERT_TYPE, 0, NULL) == 0) { |
wolfSSL | 0:d92f9d21154c | 9104 | newX509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), |
wolfSSL | 0:d92f9d21154c | 9105 | NULL, DYNAMIC_TYPE_X509); |
wolfSSL | 0:d92f9d21154c | 9106 | if (newX509 != NULL) { |
wolfSSL | 0:d92f9d21154c | 9107 | InitX509(newX509, 1); |
wolfSSL | 0:d92f9d21154c | 9108 | if (CopyDecodedToX509(newX509, cert) != 0) { |
wolfSSL | 0:d92f9d21154c | 9109 | XFREE(newX509, NULL, DYNAMIC_TYPE_X509); |
wolfSSL | 0:d92f9d21154c | 9110 | newX509 = NULL; |
wolfSSL | 0:d92f9d21154c | 9111 | } |
wolfSSL | 0:d92f9d21154c | 9112 | } |
wolfSSL | 0:d92f9d21154c | 9113 | } |
wolfSSL | 0:d92f9d21154c | 9114 | FreeDecodedCert(cert); |
wolfSSL | 0:d92f9d21154c | 9115 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 9116 | XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 9117 | #endif |
wolfSSL | 0:d92f9d21154c | 9118 | } |
wolfSSL | 0:d92f9d21154c | 9119 | |
wolfSSL | 0:d92f9d21154c | 9120 | if (x509 != NULL) |
wolfSSL | 0:d92f9d21154c | 9121 | *x509 = newX509; |
wolfSSL | 0:d92f9d21154c | 9122 | |
wolfSSL | 0:d92f9d21154c | 9123 | return newX509; |
wolfSSL | 0:d92f9d21154c | 9124 | } |
wolfSSL | 0:d92f9d21154c | 9125 | |
wolfSSL | 0:d92f9d21154c | 9126 | |
wolfSSL | 0:d92f9d21154c | 9127 | #ifndef NO_FILESYSTEM |
wolfSSL | 0:d92f9d21154c | 9128 | |
wolfSSL | 0:d92f9d21154c | 9129 | #ifndef NO_STDIO_FILESYSTEM |
wolfSSL | 0:d92f9d21154c | 9130 | |
wolfSSL | 0:d92f9d21154c | 9131 | WOLFSSL_X509* wolfSSL_X509_d2i_fp(WOLFSSL_X509** x509, XFILE file) |
wolfSSL | 0:d92f9d21154c | 9132 | { |
wolfSSL | 0:d92f9d21154c | 9133 | WOLFSSL_X509* newX509 = NULL; |
wolfSSL | 0:d92f9d21154c | 9134 | |
wolfSSL | 0:d92f9d21154c | 9135 | WOLFSSL_ENTER("wolfSSL_X509_d2i_fp"); |
wolfSSL | 0:d92f9d21154c | 9136 | |
wolfSSL | 0:d92f9d21154c | 9137 | if (file != XBADFILE) { |
wolfSSL | 0:d92f9d21154c | 9138 | byte* fileBuffer = NULL; |
wolfSSL | 0:d92f9d21154c | 9139 | long sz = 0; |
wolfSSL | 0:d92f9d21154c | 9140 | |
wolfSSL | 0:d92f9d21154c | 9141 | XFSEEK(file, 0, XSEEK_END); |
wolfSSL | 0:d92f9d21154c | 9142 | sz = XFTELL(file); |
wolfSSL | 0:d92f9d21154c | 9143 | XREWIND(file); |
wolfSSL | 0:d92f9d21154c | 9144 | |
wolfSSL | 0:d92f9d21154c | 9145 | if (sz < 0) { |
wolfSSL | 0:d92f9d21154c | 9146 | WOLFSSL_MSG("Bad tell on FILE"); |
wolfSSL | 0:d92f9d21154c | 9147 | return NULL; |
wolfSSL | 0:d92f9d21154c | 9148 | } |
wolfSSL | 0:d92f9d21154c | 9149 | |
wolfSSL | 0:d92f9d21154c | 9150 | fileBuffer = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 9151 | if (fileBuffer != NULL) { |
wolfSSL | 0:d92f9d21154c | 9152 | int ret = (int)XFREAD(fileBuffer, sz, 1, file); |
wolfSSL | 0:d92f9d21154c | 9153 | if (ret > 0) { |
wolfSSL | 0:d92f9d21154c | 9154 | newX509 = wolfSSL_X509_d2i(NULL, fileBuffer, (int)sz); |
wolfSSL | 0:d92f9d21154c | 9155 | } |
wolfSSL | 0:d92f9d21154c | 9156 | XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 9157 | } |
wolfSSL | 0:d92f9d21154c | 9158 | } |
wolfSSL | 0:d92f9d21154c | 9159 | |
wolfSSL | 0:d92f9d21154c | 9160 | if (x509 != NULL) |
wolfSSL | 0:d92f9d21154c | 9161 | *x509 = newX509; |
wolfSSL | 0:d92f9d21154c | 9162 | |
wolfSSL | 0:d92f9d21154c | 9163 | return newX509; |
wolfSSL | 0:d92f9d21154c | 9164 | } |
wolfSSL | 0:d92f9d21154c | 9165 | |
wolfSSL | 0:d92f9d21154c | 9166 | #endif /* NO_STDIO_FILESYSTEM */ |
wolfSSL | 0:d92f9d21154c | 9167 | |
wolfSSL | 0:d92f9d21154c | 9168 | WOLFSSL_X509* wolfSSL_X509_load_certificate_file(const char* fname, int format) |
wolfSSL | 0:d92f9d21154c | 9169 | { |
wolfSSL | 0:d92f9d21154c | 9170 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 9171 | byte staticBuffer[1]; /* force heap usage */ |
wolfSSL | 0:d92f9d21154c | 9172 | #else |
wolfSSL | 0:d92f9d21154c | 9173 | byte staticBuffer[FILE_BUFFER_SIZE]; |
wolfSSL | 0:d92f9d21154c | 9174 | #endif |
wolfSSL | 0:d92f9d21154c | 9175 | byte* fileBuffer = staticBuffer; |
wolfSSL | 0:d92f9d21154c | 9176 | int dynamic = 0; |
wolfSSL | 0:d92f9d21154c | 9177 | int ret; |
wolfSSL | 0:d92f9d21154c | 9178 | long sz = 0; |
wolfSSL | 0:d92f9d21154c | 9179 | XFILE file; |
wolfSSL | 0:d92f9d21154c | 9180 | |
wolfSSL | 0:d92f9d21154c | 9181 | WOLFSSL_X509* x509 = NULL; |
wolfSSL | 0:d92f9d21154c | 9182 | buffer der; |
wolfSSL | 0:d92f9d21154c | 9183 | |
wolfSSL | 0:d92f9d21154c | 9184 | WOLFSSL_ENTER("wolfSSL_X509_load_certificate"); |
wolfSSL | 0:d92f9d21154c | 9185 | |
wolfSSL | 0:d92f9d21154c | 9186 | /* Check the inputs */ |
wolfSSL | 0:d92f9d21154c | 9187 | if ((fname == NULL) || |
wolfSSL | 0:d92f9d21154c | 9188 | (format != SSL_FILETYPE_ASN1 && format != SSL_FILETYPE_PEM)) |
wolfSSL | 0:d92f9d21154c | 9189 | return NULL; |
wolfSSL | 0:d92f9d21154c | 9190 | |
wolfSSL | 0:d92f9d21154c | 9191 | file = XFOPEN(fname, "rb"); |
wolfSSL | 0:d92f9d21154c | 9192 | if (file == XBADFILE) |
wolfSSL | 0:d92f9d21154c | 9193 | return NULL; |
wolfSSL | 0:d92f9d21154c | 9194 | |
wolfSSL | 0:d92f9d21154c | 9195 | XFSEEK(file, 0, XSEEK_END); |
wolfSSL | 0:d92f9d21154c | 9196 | sz = XFTELL(file); |
wolfSSL | 0:d92f9d21154c | 9197 | XREWIND(file); |
wolfSSL | 0:d92f9d21154c | 9198 | |
wolfSSL | 0:d92f9d21154c | 9199 | if (sz > (long)sizeof(staticBuffer)) { |
wolfSSL | 0:d92f9d21154c | 9200 | fileBuffer = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 9201 | if (fileBuffer == NULL) { |
wolfSSL | 0:d92f9d21154c | 9202 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 9203 | return NULL; |
wolfSSL | 0:d92f9d21154c | 9204 | } |
wolfSSL | 0:d92f9d21154c | 9205 | dynamic = 1; |
wolfSSL | 0:d92f9d21154c | 9206 | } |
wolfSSL | 0:d92f9d21154c | 9207 | else if (sz < 0) { |
wolfSSL | 0:d92f9d21154c | 9208 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 9209 | return NULL; |
wolfSSL | 0:d92f9d21154c | 9210 | } |
wolfSSL | 0:d92f9d21154c | 9211 | |
wolfSSL | 0:d92f9d21154c | 9212 | ret = (int)XFREAD(fileBuffer, sz, 1, file); |
wolfSSL | 0:d92f9d21154c | 9213 | if (ret < 0) { |
wolfSSL | 0:d92f9d21154c | 9214 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 9215 | if (dynamic) |
wolfSSL | 0:d92f9d21154c | 9216 | XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 9217 | return NULL; |
wolfSSL | 0:d92f9d21154c | 9218 | } |
wolfSSL | 0:d92f9d21154c | 9219 | |
wolfSSL | 0:d92f9d21154c | 9220 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 9221 | |
wolfSSL | 0:d92f9d21154c | 9222 | der.buffer = NULL; |
wolfSSL | 0:d92f9d21154c | 9223 | der.length = 0; |
wolfSSL | 0:d92f9d21154c | 9224 | |
wolfSSL | 0:d92f9d21154c | 9225 | if (format == SSL_FILETYPE_PEM) { |
wolfSSL | 0:d92f9d21154c | 9226 | int ecc = 0; |
wolfSSL | 0:d92f9d21154c | 9227 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 9228 | EncryptedInfo* info = NULL; |
wolfSSL | 0:d92f9d21154c | 9229 | #else |
wolfSSL | 0:d92f9d21154c | 9230 | EncryptedInfo info[1]; |
wolfSSL | 0:d92f9d21154c | 9231 | #endif |
wolfSSL | 0:d92f9d21154c | 9232 | |
wolfSSL | 0:d92f9d21154c | 9233 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 9234 | info = (EncryptedInfo*)XMALLOC(sizeof(EncryptedInfo), NULL, |
wolfSSL | 0:d92f9d21154c | 9235 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 9236 | if (info == NULL) { |
wolfSSL | 0:d92f9d21154c | 9237 | if (dynamic) |
wolfSSL | 0:d92f9d21154c | 9238 | XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 9239 | |
wolfSSL | 0:d92f9d21154c | 9240 | return NULL; |
wolfSSL | 0:d92f9d21154c | 9241 | } |
wolfSSL | 0:d92f9d21154c | 9242 | #endif |
wolfSSL | 0:d92f9d21154c | 9243 | |
wolfSSL | 0:d92f9d21154c | 9244 | info->set = 0; |
wolfSSL | 0:d92f9d21154c | 9245 | info->ctx = NULL; |
wolfSSL | 0:d92f9d21154c | 9246 | info->consumed = 0; |
wolfSSL | 0:d92f9d21154c | 9247 | |
wolfSSL | 0:d92f9d21154c | 9248 | if (PemToDer(fileBuffer, sz, CERT_TYPE, &der, NULL, info, &ecc) != 0) |
wolfSSL | 0:d92f9d21154c | 9249 | { |
wolfSSL | 0:d92f9d21154c | 9250 | /* Only time this should fail, and leave `der` with a buffer |
wolfSSL | 0:d92f9d21154c | 9251 | is when the Base64 Decode fails. Release `der.buffer` in |
wolfSSL | 0:d92f9d21154c | 9252 | that case. */ |
wolfSSL | 0:d92f9d21154c | 9253 | if (der.buffer != NULL) { |
wolfSSL | 0:d92f9d21154c | 9254 | XFREE(der.buffer, NULL, DYNAMIC_TYPE_CERT); |
wolfSSL | 0:d92f9d21154c | 9255 | der.buffer = NULL; |
wolfSSL | 0:d92f9d21154c | 9256 | } |
wolfSSL | 0:d92f9d21154c | 9257 | } |
wolfSSL | 0:d92f9d21154c | 9258 | |
wolfSSL | 0:d92f9d21154c | 9259 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 9260 | XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 9261 | #endif |
wolfSSL | 0:d92f9d21154c | 9262 | } |
wolfSSL | 0:d92f9d21154c | 9263 | else { |
wolfSSL | 0:d92f9d21154c | 9264 | der.buffer = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_CERT); |
wolfSSL | 0:d92f9d21154c | 9265 | if (der.buffer != NULL) { |
wolfSSL | 0:d92f9d21154c | 9266 | XMEMCPY(der.buffer, fileBuffer, sz); |
wolfSSL | 0:d92f9d21154c | 9267 | der.length = (word32)sz; |
wolfSSL | 0:d92f9d21154c | 9268 | } |
wolfSSL | 0:d92f9d21154c | 9269 | } |
wolfSSL | 0:d92f9d21154c | 9270 | |
wolfSSL | 0:d92f9d21154c | 9271 | if (dynamic) |
wolfSSL | 0:d92f9d21154c | 9272 | XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 9273 | |
wolfSSL | 0:d92f9d21154c | 9274 | /* At this point we want `der` to have the certificate in DER format */ |
wolfSSL | 0:d92f9d21154c | 9275 | /* ready to be decoded. */ |
wolfSSL | 0:d92f9d21154c | 9276 | if (der.buffer != NULL) { |
wolfSSL | 0:d92f9d21154c | 9277 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 9278 | DecodedCert* cert = NULL; |
wolfSSL | 0:d92f9d21154c | 9279 | #else |
wolfSSL | 0:d92f9d21154c | 9280 | DecodedCert cert[1]; |
wolfSSL | 0:d92f9d21154c | 9281 | #endif |
wolfSSL | 0:d92f9d21154c | 9282 | |
wolfSSL | 0:d92f9d21154c | 9283 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 9284 | cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL, |
wolfSSL | 0:d92f9d21154c | 9285 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 9286 | if (cert != NULL) |
wolfSSL | 0:d92f9d21154c | 9287 | #endif |
wolfSSL | 0:d92f9d21154c | 9288 | { |
wolfSSL | 0:d92f9d21154c | 9289 | InitDecodedCert(cert, der.buffer, der.length, NULL); |
wolfSSL | 0:d92f9d21154c | 9290 | if (ParseCertRelative(cert, CERT_TYPE, 0, NULL) == 0) { |
wolfSSL | 0:d92f9d21154c | 9291 | x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL, |
wolfSSL | 0:d92f9d21154c | 9292 | DYNAMIC_TYPE_X509); |
wolfSSL | 0:d92f9d21154c | 9293 | if (x509 != NULL) { |
wolfSSL | 0:d92f9d21154c | 9294 | InitX509(x509, 1); |
wolfSSL | 0:d92f9d21154c | 9295 | if (CopyDecodedToX509(x509, cert) != 0) { |
wolfSSL | 0:d92f9d21154c | 9296 | XFREE(x509, NULL, DYNAMIC_TYPE_X509); |
wolfSSL | 0:d92f9d21154c | 9297 | x509 = NULL; |
wolfSSL | 0:d92f9d21154c | 9298 | } |
wolfSSL | 0:d92f9d21154c | 9299 | } |
wolfSSL | 0:d92f9d21154c | 9300 | } |
wolfSSL | 0:d92f9d21154c | 9301 | |
wolfSSL | 0:d92f9d21154c | 9302 | FreeDecodedCert(cert); |
wolfSSL | 0:d92f9d21154c | 9303 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 9304 | XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 9305 | #endif |
wolfSSL | 0:d92f9d21154c | 9306 | } |
wolfSSL | 0:d92f9d21154c | 9307 | |
wolfSSL | 0:d92f9d21154c | 9308 | XFREE(der.buffer, NULL, DYNAMIC_TYPE_CERT); |
wolfSSL | 0:d92f9d21154c | 9309 | } |
wolfSSL | 0:d92f9d21154c | 9310 | |
wolfSSL | 0:d92f9d21154c | 9311 | return x509; |
wolfSSL | 0:d92f9d21154c | 9312 | } |
wolfSSL | 0:d92f9d21154c | 9313 | |
wolfSSL | 0:d92f9d21154c | 9314 | #endif /* NO_FILESYSTEM */ |
wolfSSL | 0:d92f9d21154c | 9315 | |
wolfSSL | 0:d92f9d21154c | 9316 | #endif /* KEEP_PEER_CERT || SESSION_CERTS */ |
wolfSSL | 0:d92f9d21154c | 9317 | |
wolfSSL | 0:d92f9d21154c | 9318 | |
wolfSSL | 0:d92f9d21154c | 9319 | #ifdef OPENSSL_EXTRA |
wolfSSL | 0:d92f9d21154c | 9320 | int wolfSSL_set_ex_data(WOLFSSL* ssl, int idx, void* data) |
wolfSSL | 0:d92f9d21154c | 9321 | { |
wolfSSL | 0:d92f9d21154c | 9322 | #ifdef FORTRESS |
wolfSSL | 0:d92f9d21154c | 9323 | if (ssl != NULL && idx < MAX_EX_DATA) |
wolfSSL | 0:d92f9d21154c | 9324 | { |
wolfSSL | 0:d92f9d21154c | 9325 | ssl->ex_data[idx] = data; |
wolfSSL | 0:d92f9d21154c | 9326 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 9327 | } |
wolfSSL | 0:d92f9d21154c | 9328 | #else |
wolfSSL | 0:d92f9d21154c | 9329 | (void)ssl; |
wolfSSL | 0:d92f9d21154c | 9330 | (void)idx; |
wolfSSL | 0:d92f9d21154c | 9331 | (void)data; |
wolfSSL | 0:d92f9d21154c | 9332 | #endif |
wolfSSL | 0:d92f9d21154c | 9333 | return SSL_FAILURE; |
wolfSSL | 0:d92f9d21154c | 9334 | } |
wolfSSL | 0:d92f9d21154c | 9335 | |
wolfSSL | 0:d92f9d21154c | 9336 | |
wolfSSL | 0:d92f9d21154c | 9337 | int wolfSSL_set_session_id_context(WOLFSSL* ssl, const unsigned char* id, |
wolfSSL | 0:d92f9d21154c | 9338 | unsigned int len) |
wolfSSL | 0:d92f9d21154c | 9339 | { |
wolfSSL | 0:d92f9d21154c | 9340 | (void)ssl; |
wolfSSL | 0:d92f9d21154c | 9341 | (void)id; |
wolfSSL | 0:d92f9d21154c | 9342 | (void)len; |
wolfSSL | 0:d92f9d21154c | 9343 | return 0; |
wolfSSL | 0:d92f9d21154c | 9344 | } |
wolfSSL | 0:d92f9d21154c | 9345 | |
wolfSSL | 0:d92f9d21154c | 9346 | |
wolfSSL | 0:d92f9d21154c | 9347 | void wolfSSL_set_connect_state(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 9348 | { |
wolfSSL | 0:d92f9d21154c | 9349 | (void)ssl; |
wolfSSL | 0:d92f9d21154c | 9350 | /* client by default */ |
wolfSSL | 0:d92f9d21154c | 9351 | } |
wolfSSL | 0:d92f9d21154c | 9352 | #endif |
wolfSSL | 0:d92f9d21154c | 9353 | |
wolfSSL | 0:d92f9d21154c | 9354 | int wolfSSL_get_shutdown(const WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 9355 | { |
wolfSSL | 0:d92f9d21154c | 9356 | return (ssl->options.isClosed || |
wolfSSL | 0:d92f9d21154c | 9357 | ssl->options.connReset || |
wolfSSL | 0:d92f9d21154c | 9358 | ssl->options.sentNotify); |
wolfSSL | 0:d92f9d21154c | 9359 | } |
wolfSSL | 0:d92f9d21154c | 9360 | |
wolfSSL | 0:d92f9d21154c | 9361 | |
wolfSSL | 0:d92f9d21154c | 9362 | int wolfSSL_session_reused(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 9363 | { |
wolfSSL | 0:d92f9d21154c | 9364 | return ssl->options.resuming; |
wolfSSL | 0:d92f9d21154c | 9365 | } |
wolfSSL | 0:d92f9d21154c | 9366 | |
wolfSSL | 0:d92f9d21154c | 9367 | #ifdef OPENSSL_EXTRA |
wolfSSL | 0:d92f9d21154c | 9368 | void wolfSSL_SESSION_free(WOLFSSL_SESSION* session) |
wolfSSL | 0:d92f9d21154c | 9369 | { |
wolfSSL | 0:d92f9d21154c | 9370 | (void)session; |
wolfSSL | 0:d92f9d21154c | 9371 | } |
wolfSSL | 0:d92f9d21154c | 9372 | #endif |
wolfSSL | 0:d92f9d21154c | 9373 | |
wolfSSL | 0:d92f9d21154c | 9374 | const char* wolfSSL_get_version(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 9375 | { |
wolfSSL | 0:d92f9d21154c | 9376 | WOLFSSL_ENTER("SSL_get_version"); |
wolfSSL | 0:d92f9d21154c | 9377 | if (ssl->version.major == SSLv3_MAJOR) { |
wolfSSL | 0:d92f9d21154c | 9378 | switch (ssl->version.minor) { |
wolfSSL | 0:d92f9d21154c | 9379 | case SSLv3_MINOR : |
wolfSSL | 0:d92f9d21154c | 9380 | return "SSLv3"; |
wolfSSL | 0:d92f9d21154c | 9381 | case TLSv1_MINOR : |
wolfSSL | 0:d92f9d21154c | 9382 | return "TLSv1"; |
wolfSSL | 0:d92f9d21154c | 9383 | case TLSv1_1_MINOR : |
wolfSSL | 0:d92f9d21154c | 9384 | return "TLSv1.1"; |
wolfSSL | 0:d92f9d21154c | 9385 | case TLSv1_2_MINOR : |
wolfSSL | 0:d92f9d21154c | 9386 | return "TLSv1.2"; |
wolfSSL | 0:d92f9d21154c | 9387 | default: |
wolfSSL | 0:d92f9d21154c | 9388 | return "unknown"; |
wolfSSL | 0:d92f9d21154c | 9389 | } |
wolfSSL | 0:d92f9d21154c | 9390 | } |
wolfSSL | 0:d92f9d21154c | 9391 | else if (ssl->version.major == DTLS_MAJOR) { |
wolfSSL | 0:d92f9d21154c | 9392 | switch (ssl->version.minor) { |
wolfSSL | 0:d92f9d21154c | 9393 | case DTLS_MINOR : |
wolfSSL | 0:d92f9d21154c | 9394 | return "DTLS"; |
wolfSSL | 0:d92f9d21154c | 9395 | case DTLSv1_2_MINOR : |
wolfSSL | 0:d92f9d21154c | 9396 | return "DTLSv1.2"; |
wolfSSL | 0:d92f9d21154c | 9397 | default: |
wolfSSL | 0:d92f9d21154c | 9398 | return "unknown"; |
wolfSSL | 0:d92f9d21154c | 9399 | } |
wolfSSL | 0:d92f9d21154c | 9400 | } |
wolfSSL | 0:d92f9d21154c | 9401 | return "unknown"; |
wolfSSL | 0:d92f9d21154c | 9402 | } |
wolfSSL | 0:d92f9d21154c | 9403 | |
wolfSSL | 0:d92f9d21154c | 9404 | |
wolfSSL | 0:d92f9d21154c | 9405 | /* current library version */ |
wolfSSL | 0:d92f9d21154c | 9406 | const char* wolfSSL_lib_version(void) |
wolfSSL | 0:d92f9d21154c | 9407 | { |
wolfSSL | 0:d92f9d21154c | 9408 | return LIBWOLFSSL_VERSION_STRING; |
wolfSSL | 0:d92f9d21154c | 9409 | } |
wolfSSL | 0:d92f9d21154c | 9410 | |
wolfSSL | 0:d92f9d21154c | 9411 | |
wolfSSL | 0:d92f9d21154c | 9412 | /* current library version in hex */ |
wolfSSL | 0:d92f9d21154c | 9413 | word32 wolfSSL_lib_version_hex(void) |
wolfSSL | 0:d92f9d21154c | 9414 | { |
wolfSSL | 0:d92f9d21154c | 9415 | return LIBWOLFSSL_VERSION_HEX; |
wolfSSL | 0:d92f9d21154c | 9416 | } |
wolfSSL | 0:d92f9d21154c | 9417 | |
wolfSSL | 0:d92f9d21154c | 9418 | |
wolfSSL | 0:d92f9d21154c | 9419 | int wolfSSL_get_current_cipher_suite(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 9420 | { |
wolfSSL | 0:d92f9d21154c | 9421 | WOLFSSL_ENTER("SSL_get_current_cipher_suite"); |
wolfSSL | 0:d92f9d21154c | 9422 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 9423 | return (ssl->options.cipherSuite0 << 8) | ssl->options.cipherSuite; |
wolfSSL | 0:d92f9d21154c | 9424 | return 0; |
wolfSSL | 0:d92f9d21154c | 9425 | } |
wolfSSL | 0:d92f9d21154c | 9426 | |
wolfSSL | 0:d92f9d21154c | 9427 | WOLFSSL_CIPHER* wolfSSL_get_current_cipher(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 9428 | { |
wolfSSL | 0:d92f9d21154c | 9429 | WOLFSSL_ENTER("SSL_get_current_cipher"); |
wolfSSL | 0:d92f9d21154c | 9430 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 9431 | return &ssl->cipher; |
wolfSSL | 0:d92f9d21154c | 9432 | else |
wolfSSL | 0:d92f9d21154c | 9433 | return NULL; |
wolfSSL | 0:d92f9d21154c | 9434 | } |
wolfSSL | 0:d92f9d21154c | 9435 | |
wolfSSL | 0:d92f9d21154c | 9436 | |
wolfSSL | 0:d92f9d21154c | 9437 | const char* wolfSSL_CIPHER_get_name(const WOLFSSL_CIPHER* cipher) |
wolfSSL | 0:d92f9d21154c | 9438 | { |
wolfSSL | 0:d92f9d21154c | 9439 | (void)cipher; |
wolfSSL | 0:d92f9d21154c | 9440 | |
wolfSSL | 0:d92f9d21154c | 9441 | WOLFSSL_ENTER("SSL_CIPHER_get_name"); |
wolfSSL | 0:d92f9d21154c | 9442 | #ifndef NO_ERROR_STRINGS |
wolfSSL | 0:d92f9d21154c | 9443 | if (cipher) { |
wolfSSL | 0:d92f9d21154c | 9444 | #if defined(HAVE_CHACHA) |
wolfSSL | 0:d92f9d21154c | 9445 | if (cipher->ssl->options.cipherSuite0 == CHACHA_BYTE) { |
wolfSSL | 0:d92f9d21154c | 9446 | /* ChaCha suites */ |
wolfSSL | 0:d92f9d21154c | 9447 | switch (cipher->ssl->options.cipherSuite) { |
wolfSSL | 0:d92f9d21154c | 9448 | #ifdef HAVE_CHACHA |
wolfSSL | 0:d92f9d21154c | 9449 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 9450 | case TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9451 | return "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9452 | |
wolfSSL | 0:d92f9d21154c | 9453 | case TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9454 | return "TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9455 | #endif |
wolfSSL | 0:d92f9d21154c | 9456 | case TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9457 | return "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9458 | #endif |
wolfSSL | 0:d92f9d21154c | 9459 | } |
wolfSSL | 0:d92f9d21154c | 9460 | } |
wolfSSL | 0:d92f9d21154c | 9461 | #endif |
wolfSSL | 0:d92f9d21154c | 9462 | |
wolfSSL | 0:d92f9d21154c | 9463 | #if defined(HAVE_ECC) || defined(HAVE_AESCCM) |
wolfSSL | 0:d92f9d21154c | 9464 | /* Awkwardly, the ECC cipher suites use the ECC_BYTE as expected, |
wolfSSL | 0:d92f9d21154c | 9465 | * but the AES-CCM cipher suites also use it, even the ones that |
wolfSSL | 0:d92f9d21154c | 9466 | * aren't ECC. */ |
wolfSSL | 0:d92f9d21154c | 9467 | if (cipher->ssl->options.cipherSuite0 == ECC_BYTE) { |
wolfSSL | 0:d92f9d21154c | 9468 | /* ECC suites */ |
wolfSSL | 0:d92f9d21154c | 9469 | switch (cipher->ssl->options.cipherSuite) { |
wolfSSL | 0:d92f9d21154c | 9470 | #ifdef HAVE_ECC |
wolfSSL | 0:d92f9d21154c | 9471 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 9472 | case TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9473 | return "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9474 | #endif |
wolfSSL | 0:d92f9d21154c | 9475 | case TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9476 | return "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9477 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 9478 | case TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9479 | return "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9480 | #endif |
wolfSSL | 0:d92f9d21154c | 9481 | case TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9482 | return "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9483 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 9484 | case TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 : |
wolfSSL | 0:d92f9d21154c | 9485 | return "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384"; |
wolfSSL | 0:d92f9d21154c | 9486 | #endif |
wolfSSL | 0:d92f9d21154c | 9487 | case TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 : |
wolfSSL | 0:d92f9d21154c | 9488 | return "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384"; |
wolfSSL | 0:d92f9d21154c | 9489 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 9490 | case TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 : |
wolfSSL | 0:d92f9d21154c | 9491 | return "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384"; |
wolfSSL | 0:d92f9d21154c | 9492 | #endif |
wolfSSL | 0:d92f9d21154c | 9493 | case TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 : |
wolfSSL | 0:d92f9d21154c | 9494 | return "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384"; |
wolfSSL | 0:d92f9d21154c | 9495 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 9496 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 9497 | case TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9498 | return "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9499 | case TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9500 | return "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9501 | #endif |
wolfSSL | 0:d92f9d21154c | 9502 | case TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9503 | return "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9504 | case TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9505 | return "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9506 | #ifndef NO_RC4 |
wolfSSL | 0:d92f9d21154c | 9507 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 9508 | case TLS_ECDHE_RSA_WITH_RC4_128_SHA : |
wolfSSL | 0:d92f9d21154c | 9509 | return "TLS_ECDHE_RSA_WITH_RC4_128_SHA"; |
wolfSSL | 0:d92f9d21154c | 9510 | #endif |
wolfSSL | 0:d92f9d21154c | 9511 | case TLS_ECDHE_ECDSA_WITH_RC4_128_SHA : |
wolfSSL | 0:d92f9d21154c | 9512 | return "TLS_ECDHE_ECDSA_WITH_RC4_128_SHA"; |
wolfSSL | 0:d92f9d21154c | 9513 | #endif |
wolfSSL | 0:d92f9d21154c | 9514 | #ifndef NO_DES3 |
wolfSSL | 0:d92f9d21154c | 9515 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 9516 | case TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9517 | return "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9518 | #endif |
wolfSSL | 0:d92f9d21154c | 9519 | case TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9520 | return "TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9521 | #endif |
wolfSSL | 0:d92f9d21154c | 9522 | |
wolfSSL | 0:d92f9d21154c | 9523 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 9524 | case TLS_ECDH_RSA_WITH_AES_128_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9525 | return "TLS_ECDH_RSA_WITH_AES_128_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9526 | case TLS_ECDH_RSA_WITH_AES_256_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9527 | return "TLS_ECDH_RSA_WITH_AES_256_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9528 | #endif |
wolfSSL | 0:d92f9d21154c | 9529 | case TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9530 | return "TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9531 | case TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9532 | return "TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9533 | #ifndef NO_RC4 |
wolfSSL | 0:d92f9d21154c | 9534 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 9535 | case TLS_ECDH_RSA_WITH_RC4_128_SHA : |
wolfSSL | 0:d92f9d21154c | 9536 | return "TLS_ECDH_RSA_WITH_RC4_128_SHA"; |
wolfSSL | 0:d92f9d21154c | 9537 | #endif |
wolfSSL | 0:d92f9d21154c | 9538 | case TLS_ECDH_ECDSA_WITH_RC4_128_SHA : |
wolfSSL | 0:d92f9d21154c | 9539 | return "TLS_ECDH_ECDSA_WITH_RC4_128_SHA"; |
wolfSSL | 0:d92f9d21154c | 9540 | #endif |
wolfSSL | 0:d92f9d21154c | 9541 | #ifndef NO_DES3 |
wolfSSL | 0:d92f9d21154c | 9542 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 9543 | case TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9544 | return "TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9545 | #endif |
wolfSSL | 0:d92f9d21154c | 9546 | case TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9547 | return "TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9548 | #endif |
wolfSSL | 0:d92f9d21154c | 9549 | #endif /* NO_SHA */ |
wolfSSL | 0:d92f9d21154c | 9550 | |
wolfSSL | 0:d92f9d21154c | 9551 | #ifdef HAVE_AESGCM |
wolfSSL | 0:d92f9d21154c | 9552 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 9553 | case TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9554 | return "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9555 | case TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 : |
wolfSSL | 0:d92f9d21154c | 9556 | return "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384"; |
wolfSSL | 0:d92f9d21154c | 9557 | #endif |
wolfSSL | 0:d92f9d21154c | 9558 | case TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9559 | return "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9560 | case TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 : |
wolfSSL | 0:d92f9d21154c | 9561 | return "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384"; |
wolfSSL | 0:d92f9d21154c | 9562 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 9563 | case TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9564 | return "TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9565 | case TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 : |
wolfSSL | 0:d92f9d21154c | 9566 | return "TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384"; |
wolfSSL | 0:d92f9d21154c | 9567 | #endif |
wolfSSL | 0:d92f9d21154c | 9568 | case TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9569 | return "TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9570 | case TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 : |
wolfSSL | 0:d92f9d21154c | 9571 | return "TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384"; |
wolfSSL | 0:d92f9d21154c | 9572 | #endif |
wolfSSL | 0:d92f9d21154c | 9573 | #endif /* HAVE_ECC */ |
wolfSSL | 0:d92f9d21154c | 9574 | |
wolfSSL | 0:d92f9d21154c | 9575 | #ifdef HAVE_AESCCM |
wolfSSL | 0:d92f9d21154c | 9576 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 9577 | case TLS_RSA_WITH_AES_128_CCM_8 : |
wolfSSL | 0:d92f9d21154c | 9578 | return "TLS_RSA_WITH_AES_128_CCM_8"; |
wolfSSL | 0:d92f9d21154c | 9579 | case TLS_RSA_WITH_AES_256_CCM_8 : |
wolfSSL | 0:d92f9d21154c | 9580 | return "TLS_RSA_WITH_AES_256_CCM_8"; |
wolfSSL | 0:d92f9d21154c | 9581 | #endif |
wolfSSL | 0:d92f9d21154c | 9582 | #ifndef NO_PSK |
wolfSSL | 0:d92f9d21154c | 9583 | case TLS_PSK_WITH_AES_128_CCM_8 : |
wolfSSL | 0:d92f9d21154c | 9584 | return "TLS_PSK_WITH_AES_128_CCM_8"; |
wolfSSL | 0:d92f9d21154c | 9585 | case TLS_PSK_WITH_AES_256_CCM_8 : |
wolfSSL | 0:d92f9d21154c | 9586 | return "TLS_PSK_WITH_AES_256_CCM_8"; |
wolfSSL | 0:d92f9d21154c | 9587 | case TLS_PSK_WITH_AES_128_CCM : |
wolfSSL | 0:d92f9d21154c | 9588 | return "TLS_PSK_WITH_AES_128_CCM"; |
wolfSSL | 0:d92f9d21154c | 9589 | case TLS_PSK_WITH_AES_256_CCM : |
wolfSSL | 0:d92f9d21154c | 9590 | return "TLS_PSK_WITH_AES_256_CCM"; |
wolfSSL | 0:d92f9d21154c | 9591 | case TLS_DHE_PSK_WITH_AES_128_CCM : |
wolfSSL | 0:d92f9d21154c | 9592 | return "TLS_DHE_PSK_WITH_AES_128_CCM"; |
wolfSSL | 0:d92f9d21154c | 9593 | case TLS_DHE_PSK_WITH_AES_256_CCM : |
wolfSSL | 0:d92f9d21154c | 9594 | return "TLS_DHE_PSK_WITH_AES_256_CCM"; |
wolfSSL | 0:d92f9d21154c | 9595 | #endif |
wolfSSL | 0:d92f9d21154c | 9596 | #ifdef HAVE_ECC |
wolfSSL | 0:d92f9d21154c | 9597 | case TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8: |
wolfSSL | 0:d92f9d21154c | 9598 | return "TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8"; |
wolfSSL | 0:d92f9d21154c | 9599 | case TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 : |
wolfSSL | 0:d92f9d21154c | 9600 | return "TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8"; |
wolfSSL | 0:d92f9d21154c | 9601 | #endif |
wolfSSL | 0:d92f9d21154c | 9602 | #endif |
wolfSSL | 0:d92f9d21154c | 9603 | |
wolfSSL | 0:d92f9d21154c | 9604 | default: |
wolfSSL | 0:d92f9d21154c | 9605 | return "NONE"; |
wolfSSL | 0:d92f9d21154c | 9606 | } |
wolfSSL | 0:d92f9d21154c | 9607 | } |
wolfSSL | 0:d92f9d21154c | 9608 | #endif /* ECC */ |
wolfSSL | 0:d92f9d21154c | 9609 | if (cipher->ssl->options.cipherSuite0 != ECC_BYTE && |
wolfSSL | 0:d92f9d21154c | 9610 | cipher->ssl->options.cipherSuite0 != CHACHA_BYTE) { |
wolfSSL | 0:d92f9d21154c | 9611 | |
wolfSSL | 0:d92f9d21154c | 9612 | /* normal suites */ |
wolfSSL | 0:d92f9d21154c | 9613 | switch (cipher->ssl->options.cipherSuite) { |
wolfSSL | 0:d92f9d21154c | 9614 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 9615 | #ifndef NO_RC4 |
wolfSSL | 0:d92f9d21154c | 9616 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 9617 | case SSL_RSA_WITH_RC4_128_SHA : |
wolfSSL | 0:d92f9d21154c | 9618 | return "SSL_RSA_WITH_RC4_128_SHA"; |
wolfSSL | 0:d92f9d21154c | 9619 | #endif |
wolfSSL | 0:d92f9d21154c | 9620 | #ifndef NO_MD5 |
wolfSSL | 0:d92f9d21154c | 9621 | case SSL_RSA_WITH_RC4_128_MD5 : |
wolfSSL | 0:d92f9d21154c | 9622 | return "SSL_RSA_WITH_RC4_128_MD5"; |
wolfSSL | 0:d92f9d21154c | 9623 | #endif |
wolfSSL | 0:d92f9d21154c | 9624 | #endif |
wolfSSL | 0:d92f9d21154c | 9625 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 9626 | #ifndef NO_DES3 |
wolfSSL | 0:d92f9d21154c | 9627 | case SSL_RSA_WITH_3DES_EDE_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9628 | return "SSL_RSA_WITH_3DES_EDE_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9629 | #endif |
wolfSSL | 0:d92f9d21154c | 9630 | case TLS_RSA_WITH_AES_128_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9631 | return "TLS_RSA_WITH_AES_128_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9632 | case TLS_RSA_WITH_AES_256_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9633 | return "TLS_RSA_WITH_AES_256_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9634 | #endif |
wolfSSL | 0:d92f9d21154c | 9635 | case TLS_RSA_WITH_AES_128_CBC_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9636 | return "TLS_RSA_WITH_AES_128_CBC_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9637 | case TLS_RSA_WITH_AES_256_CBC_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9638 | return "TLS_RSA_WITH_AES_256_CBC_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9639 | #ifdef HAVE_BLAKE2 |
wolfSSL | 0:d92f9d21154c | 9640 | case TLS_RSA_WITH_AES_128_CBC_B2B256: |
wolfSSL | 0:d92f9d21154c | 9641 | return "TLS_RSA_WITH_AES_128_CBC_B2B256"; |
wolfSSL | 0:d92f9d21154c | 9642 | case TLS_RSA_WITH_AES_256_CBC_B2B256: |
wolfSSL | 0:d92f9d21154c | 9643 | return "TLS_RSA_WITH_AES_256_CBC_B2B256"; |
wolfSSL | 0:d92f9d21154c | 9644 | #endif |
wolfSSL | 0:d92f9d21154c | 9645 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 9646 | case TLS_RSA_WITH_NULL_SHA : |
wolfSSL | 0:d92f9d21154c | 9647 | return "TLS_RSA_WITH_NULL_SHA"; |
wolfSSL | 0:d92f9d21154c | 9648 | #endif |
wolfSSL | 0:d92f9d21154c | 9649 | case TLS_RSA_WITH_NULL_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9650 | return "TLS_RSA_WITH_NULL_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9651 | #endif /* NO_RSA */ |
wolfSSL | 0:d92f9d21154c | 9652 | #ifndef NO_PSK |
wolfSSL | 0:d92f9d21154c | 9653 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 9654 | case TLS_PSK_WITH_AES_128_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9655 | return "TLS_PSK_WITH_AES_128_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9656 | case TLS_PSK_WITH_AES_256_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9657 | return "TLS_PSK_WITH_AES_256_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9658 | #endif |
wolfSSL | 0:d92f9d21154c | 9659 | #ifndef NO_SHA256 |
wolfSSL | 0:d92f9d21154c | 9660 | case TLS_PSK_WITH_AES_128_CBC_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9661 | return "TLS_PSK_WITH_AES_128_CBC_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9662 | case TLS_PSK_WITH_NULL_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9663 | return "TLS_PSK_WITH_NULL_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9664 | case TLS_DHE_PSK_WITH_AES_128_CBC_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9665 | return "TLS_DHE_PSK_WITH_AES_128_CBC_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9666 | case TLS_DHE_PSK_WITH_NULL_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9667 | return "TLS_DHE_PSK_WITH_NULL_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9668 | #ifdef HAVE_AESGCM |
wolfSSL | 0:d92f9d21154c | 9669 | case TLS_PSK_WITH_AES_128_GCM_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9670 | return "TLS_PSK_WITH_AES_128_GCM_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9671 | case TLS_DHE_PSK_WITH_AES_128_GCM_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9672 | return "TLS_DHE_PSK_WITH_AES_128_GCM_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9673 | #endif |
wolfSSL | 0:d92f9d21154c | 9674 | #endif |
wolfSSL | 0:d92f9d21154c | 9675 | #ifdef WOLFSSL_SHA384 |
wolfSSL | 0:d92f9d21154c | 9676 | case TLS_PSK_WITH_AES_256_CBC_SHA384 : |
wolfSSL | 0:d92f9d21154c | 9677 | return "TLS_PSK_WITH_AES_256_CBC_SHA384"; |
wolfSSL | 0:d92f9d21154c | 9678 | case TLS_PSK_WITH_NULL_SHA384 : |
wolfSSL | 0:d92f9d21154c | 9679 | return "TLS_PSK_WITH_NULL_SHA384"; |
wolfSSL | 0:d92f9d21154c | 9680 | case TLS_DHE_PSK_WITH_AES_256_CBC_SHA384 : |
wolfSSL | 0:d92f9d21154c | 9681 | return "TLS_DHE_PSK_WITH_AES_256_CBC_SHA384"; |
wolfSSL | 0:d92f9d21154c | 9682 | case TLS_DHE_PSK_WITH_NULL_SHA384 : |
wolfSSL | 0:d92f9d21154c | 9683 | return "TLS_DHE_PSK_WITH_NULL_SHA384"; |
wolfSSL | 0:d92f9d21154c | 9684 | #ifdef HAVE_AESGCM |
wolfSSL | 0:d92f9d21154c | 9685 | case TLS_PSK_WITH_AES_256_GCM_SHA384 : |
wolfSSL | 0:d92f9d21154c | 9686 | return "TLS_PSK_WITH_AES_256_GCM_SHA384"; |
wolfSSL | 0:d92f9d21154c | 9687 | case TLS_DHE_PSK_WITH_AES_256_GCM_SHA384 : |
wolfSSL | 0:d92f9d21154c | 9688 | return "TLS_DHE_PSK_WITH_AES_256_GCM_SHA384"; |
wolfSSL | 0:d92f9d21154c | 9689 | #endif |
wolfSSL | 0:d92f9d21154c | 9690 | #endif |
wolfSSL | 0:d92f9d21154c | 9691 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 9692 | case TLS_PSK_WITH_NULL_SHA : |
wolfSSL | 0:d92f9d21154c | 9693 | return "TLS_PSK_WITH_NULL_SHA"; |
wolfSSL | 0:d92f9d21154c | 9694 | #endif |
wolfSSL | 0:d92f9d21154c | 9695 | #endif /* NO_PSK */ |
wolfSSL | 0:d92f9d21154c | 9696 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 9697 | case TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9698 | return "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9699 | case TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9700 | return "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9701 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 9702 | case TLS_DHE_RSA_WITH_AES_128_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9703 | return "TLS_DHE_RSA_WITH_AES_128_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9704 | case TLS_DHE_RSA_WITH_AES_256_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9705 | return "TLS_DHE_RSA_WITH_AES_256_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9706 | #endif |
wolfSSL | 0:d92f9d21154c | 9707 | #ifndef NO_HC128 |
wolfSSL | 0:d92f9d21154c | 9708 | #ifndef NO_MD5 |
wolfSSL | 0:d92f9d21154c | 9709 | case TLS_RSA_WITH_HC_128_MD5 : |
wolfSSL | 0:d92f9d21154c | 9710 | return "TLS_RSA_WITH_HC_128_MD5"; |
wolfSSL | 0:d92f9d21154c | 9711 | #endif |
wolfSSL | 0:d92f9d21154c | 9712 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 9713 | case TLS_RSA_WITH_HC_128_SHA : |
wolfSSL | 0:d92f9d21154c | 9714 | return "TLS_RSA_WITH_HC_128_SHA"; |
wolfSSL | 0:d92f9d21154c | 9715 | #endif |
wolfSSL | 0:d92f9d21154c | 9716 | #ifdef HAVE_BLAKE2 |
wolfSSL | 0:d92f9d21154c | 9717 | case TLS_RSA_WITH_HC_128_B2B256: |
wolfSSL | 0:d92f9d21154c | 9718 | return "TLS_RSA_WITH_HC_128_B2B256"; |
wolfSSL | 0:d92f9d21154c | 9719 | #endif |
wolfSSL | 0:d92f9d21154c | 9720 | #endif /* NO_HC128 */ |
wolfSSL | 0:d92f9d21154c | 9721 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 9722 | #ifndef NO_RABBIT |
wolfSSL | 0:d92f9d21154c | 9723 | case TLS_RSA_WITH_RABBIT_SHA : |
wolfSSL | 0:d92f9d21154c | 9724 | return "TLS_RSA_WITH_RABBIT_SHA"; |
wolfSSL | 0:d92f9d21154c | 9725 | #endif |
wolfSSL | 0:d92f9d21154c | 9726 | #ifdef HAVE_NTRU |
wolfSSL | 0:d92f9d21154c | 9727 | #ifndef NO_RC4 |
wolfSSL | 0:d92f9d21154c | 9728 | case TLS_NTRU_RSA_WITH_RC4_128_SHA : |
wolfSSL | 0:d92f9d21154c | 9729 | return "TLS_NTRU_RSA_WITH_RC4_128_SHA"; |
wolfSSL | 0:d92f9d21154c | 9730 | #endif |
wolfSSL | 0:d92f9d21154c | 9731 | #ifndef NO_DES3 |
wolfSSL | 0:d92f9d21154c | 9732 | case TLS_NTRU_RSA_WITH_3DES_EDE_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9733 | return "TLS_NTRU_RSA_WITH_3DES_EDE_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9734 | #endif |
wolfSSL | 0:d92f9d21154c | 9735 | case TLS_NTRU_RSA_WITH_AES_128_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9736 | return "TLS_NTRU_RSA_WITH_AES_128_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9737 | case TLS_NTRU_RSA_WITH_AES_256_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9738 | return "TLS_NTRU_RSA_WITH_AES_256_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9739 | #endif /* HAVE_NTRU */ |
wolfSSL | 0:d92f9d21154c | 9740 | #endif /* NO_SHA */ |
wolfSSL | 0:d92f9d21154c | 9741 | case TLS_RSA_WITH_AES_128_GCM_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9742 | return "TLS_RSA_WITH_AES_128_GCM_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9743 | case TLS_RSA_WITH_AES_256_GCM_SHA384 : |
wolfSSL | 0:d92f9d21154c | 9744 | return "TLS_RSA_WITH_AES_256_GCM_SHA384"; |
wolfSSL | 0:d92f9d21154c | 9745 | case TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9746 | return "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9747 | case TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 : |
wolfSSL | 0:d92f9d21154c | 9748 | return "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384"; |
wolfSSL | 0:d92f9d21154c | 9749 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 9750 | case TLS_RSA_WITH_CAMELLIA_128_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9751 | return "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9752 | case TLS_RSA_WITH_CAMELLIA_256_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9753 | return "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9754 | #endif |
wolfSSL | 0:d92f9d21154c | 9755 | case TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9756 | return "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9757 | case TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9758 | return "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9759 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 9760 | case TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9761 | return "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9762 | case TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9763 | return "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9764 | #endif |
wolfSSL | 0:d92f9d21154c | 9765 | case TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9766 | return "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9767 | case TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 : |
wolfSSL | 0:d92f9d21154c | 9768 | return "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256"; |
wolfSSL | 0:d92f9d21154c | 9769 | #endif /* NO_RSA */ |
wolfSSL | 0:d92f9d21154c | 9770 | #ifdef BUILD_TLS_DH_anon_WITH_AES_128_CBC_SHA |
wolfSSL | 0:d92f9d21154c | 9771 | case TLS_DH_anon_WITH_AES_128_CBC_SHA : |
wolfSSL | 0:d92f9d21154c | 9772 | return "TLS_DH_anon_WITH_AES_128_CBC_SHA"; |
wolfSSL | 0:d92f9d21154c | 9773 | #endif |
wolfSSL | 0:d92f9d21154c | 9774 | default: |
wolfSSL | 0:d92f9d21154c | 9775 | return "NONE"; |
wolfSSL | 0:d92f9d21154c | 9776 | } /* switch */ |
wolfSSL | 0:d92f9d21154c | 9777 | } /* normal / ECC */ |
wolfSSL | 0:d92f9d21154c | 9778 | } |
wolfSSL | 0:d92f9d21154c | 9779 | #endif /* NO_ERROR_STRINGS */ |
wolfSSL | 0:d92f9d21154c | 9780 | return "NONE"; |
wolfSSL | 0:d92f9d21154c | 9781 | } |
wolfSSL | 0:d92f9d21154c | 9782 | |
wolfSSL | 0:d92f9d21154c | 9783 | |
wolfSSL | 0:d92f9d21154c | 9784 | const char* wolfSSL_get_cipher(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 9785 | { |
wolfSSL | 0:d92f9d21154c | 9786 | WOLFSSL_ENTER("wolfSSL_get_cipher"); |
wolfSSL | 0:d92f9d21154c | 9787 | return wolfSSL_CIPHER_get_name(wolfSSL_get_current_cipher(ssl)); |
wolfSSL | 0:d92f9d21154c | 9788 | } |
wolfSSL | 0:d92f9d21154c | 9789 | |
wolfSSL | 0:d92f9d21154c | 9790 | #ifdef OPENSSL_EXTRA |
wolfSSL | 0:d92f9d21154c | 9791 | |
wolfSSL | 0:d92f9d21154c | 9792 | |
wolfSSL | 0:d92f9d21154c | 9793 | |
wolfSSL | 0:d92f9d21154c | 9794 | char* wolfSSL_CIPHER_description(WOLFSSL_CIPHER* cipher, char* in, int len) |
wolfSSL | 0:d92f9d21154c | 9795 | { |
wolfSSL | 0:d92f9d21154c | 9796 | (void)cipher; |
wolfSSL | 0:d92f9d21154c | 9797 | (void)in; |
wolfSSL | 0:d92f9d21154c | 9798 | (void)len; |
wolfSSL | 0:d92f9d21154c | 9799 | return 0; |
wolfSSL | 0:d92f9d21154c | 9800 | } |
wolfSSL | 0:d92f9d21154c | 9801 | |
wolfSSL | 0:d92f9d21154c | 9802 | |
wolfSSL | 0:d92f9d21154c | 9803 | WOLFSSL_SESSION* wolfSSL_get1_session(WOLFSSL* ssl) /* what's ref count */ |
wolfSSL | 0:d92f9d21154c | 9804 | { |
wolfSSL | 0:d92f9d21154c | 9805 | (void)ssl; |
wolfSSL | 0:d92f9d21154c | 9806 | return 0; |
wolfSSL | 0:d92f9d21154c | 9807 | } |
wolfSSL | 0:d92f9d21154c | 9808 | |
wolfSSL | 0:d92f9d21154c | 9809 | |
wolfSSL | 0:d92f9d21154c | 9810 | void wolfSSL_X509_free(WOLFSSL_X509* buf) |
wolfSSL | 0:d92f9d21154c | 9811 | { |
wolfSSL | 0:d92f9d21154c | 9812 | FreeX509(buf); |
wolfSSL | 0:d92f9d21154c | 9813 | } |
wolfSSL | 0:d92f9d21154c | 9814 | |
wolfSSL | 0:d92f9d21154c | 9815 | |
wolfSSL | 0:d92f9d21154c | 9816 | /* was do nothing */ |
wolfSSL | 0:d92f9d21154c | 9817 | /* |
wolfSSL | 0:d92f9d21154c | 9818 | void OPENSSL_free(void* buf) |
wolfSSL | 0:d92f9d21154c | 9819 | { |
wolfSSL | 0:d92f9d21154c | 9820 | (void)buf; |
wolfSSL | 0:d92f9d21154c | 9821 | } |
wolfSSL | 0:d92f9d21154c | 9822 | */ |
wolfSSL | 0:d92f9d21154c | 9823 | |
wolfSSL | 0:d92f9d21154c | 9824 | |
wolfSSL | 0:d92f9d21154c | 9825 | int wolfSSL_OCSP_parse_url(char* url, char** host, char** port, char** path, |
wolfSSL | 0:d92f9d21154c | 9826 | int* ssl) |
wolfSSL | 0:d92f9d21154c | 9827 | { |
wolfSSL | 0:d92f9d21154c | 9828 | (void)url; |
wolfSSL | 0:d92f9d21154c | 9829 | (void)host; |
wolfSSL | 0:d92f9d21154c | 9830 | (void)port; |
wolfSSL | 0:d92f9d21154c | 9831 | (void)path; |
wolfSSL | 0:d92f9d21154c | 9832 | (void)ssl; |
wolfSSL | 0:d92f9d21154c | 9833 | return 0; |
wolfSSL | 0:d92f9d21154c | 9834 | } |
wolfSSL | 0:d92f9d21154c | 9835 | |
wolfSSL | 0:d92f9d21154c | 9836 | |
wolfSSL | 0:d92f9d21154c | 9837 | WOLFSSL_METHOD* wolfSSLv2_client_method(void) |
wolfSSL | 0:d92f9d21154c | 9838 | { |
wolfSSL | 0:d92f9d21154c | 9839 | return 0; |
wolfSSL | 0:d92f9d21154c | 9840 | } |
wolfSSL | 0:d92f9d21154c | 9841 | |
wolfSSL | 0:d92f9d21154c | 9842 | |
wolfSSL | 0:d92f9d21154c | 9843 | WOLFSSL_METHOD* wolfSSLv2_server_method(void) |
wolfSSL | 0:d92f9d21154c | 9844 | { |
wolfSSL | 0:d92f9d21154c | 9845 | return 0; |
wolfSSL | 0:d92f9d21154c | 9846 | } |
wolfSSL | 0:d92f9d21154c | 9847 | |
wolfSSL | 0:d92f9d21154c | 9848 | |
wolfSSL | 0:d92f9d21154c | 9849 | #ifndef NO_MD4 |
wolfSSL | 0:d92f9d21154c | 9850 | |
wolfSSL | 0:d92f9d21154c | 9851 | void wolfSSL_MD4_Init(WOLFSSL_MD4_CTX* md4) |
wolfSSL | 0:d92f9d21154c | 9852 | { |
wolfSSL | 0:d92f9d21154c | 9853 | /* make sure we have a big enough buffer */ |
wolfSSL | 0:d92f9d21154c | 9854 | typedef char ok[sizeof(md4->buffer) >= sizeof(Md4) ? 1 : -1]; |
wolfSSL | 0:d92f9d21154c | 9855 | (void) sizeof(ok); |
wolfSSL | 0:d92f9d21154c | 9856 | |
wolfSSL | 0:d92f9d21154c | 9857 | WOLFSSL_ENTER("MD4_Init"); |
wolfSSL | 0:d92f9d21154c | 9858 | wc_InitMd4((Md4*)md4); |
wolfSSL | 0:d92f9d21154c | 9859 | } |
wolfSSL | 0:d92f9d21154c | 9860 | |
wolfSSL | 0:d92f9d21154c | 9861 | |
wolfSSL | 0:d92f9d21154c | 9862 | void wolfSSL_MD4_Update(WOLFSSL_MD4_CTX* md4, const void* data, |
wolfSSL | 0:d92f9d21154c | 9863 | unsigned long len) |
wolfSSL | 0:d92f9d21154c | 9864 | { |
wolfSSL | 0:d92f9d21154c | 9865 | WOLFSSL_ENTER("MD4_Update"); |
wolfSSL | 0:d92f9d21154c | 9866 | wc_Md4Update((Md4*)md4, (const byte*)data, (word32)len); |
wolfSSL | 0:d92f9d21154c | 9867 | } |
wolfSSL | 0:d92f9d21154c | 9868 | |
wolfSSL | 0:d92f9d21154c | 9869 | |
wolfSSL | 0:d92f9d21154c | 9870 | void wolfSSL_MD4_Final(unsigned char* digest, WOLFSSL_MD4_CTX* md4) |
wolfSSL | 0:d92f9d21154c | 9871 | { |
wolfSSL | 0:d92f9d21154c | 9872 | WOLFSSL_ENTER("MD4_Final"); |
wolfSSL | 0:d92f9d21154c | 9873 | wc_Md4Final((Md4*)md4, digest); |
wolfSSL | 0:d92f9d21154c | 9874 | } |
wolfSSL | 0:d92f9d21154c | 9875 | |
wolfSSL | 0:d92f9d21154c | 9876 | #endif /* NO_MD4 */ |
wolfSSL | 0:d92f9d21154c | 9877 | |
wolfSSL | 0:d92f9d21154c | 9878 | |
wolfSSL | 0:d92f9d21154c | 9879 | WOLFSSL_BIO* wolfSSL_BIO_pop(WOLFSSL_BIO* top) |
wolfSSL | 0:d92f9d21154c | 9880 | { |
wolfSSL | 0:d92f9d21154c | 9881 | (void)top; |
wolfSSL | 0:d92f9d21154c | 9882 | return 0; |
wolfSSL | 0:d92f9d21154c | 9883 | } |
wolfSSL | 0:d92f9d21154c | 9884 | |
wolfSSL | 0:d92f9d21154c | 9885 | |
wolfSSL | 0:d92f9d21154c | 9886 | int wolfSSL_BIO_pending(WOLFSSL_BIO* bio) |
wolfSSL | 0:d92f9d21154c | 9887 | { |
wolfSSL | 0:d92f9d21154c | 9888 | (void)bio; |
wolfSSL | 0:d92f9d21154c | 9889 | return 0; |
wolfSSL | 0:d92f9d21154c | 9890 | } |
wolfSSL | 0:d92f9d21154c | 9891 | |
wolfSSL | 0:d92f9d21154c | 9892 | |
wolfSSL | 0:d92f9d21154c | 9893 | |
wolfSSL | 0:d92f9d21154c | 9894 | WOLFSSL_BIO_METHOD* wolfSSL_BIO_s_mem(void) |
wolfSSL | 0:d92f9d21154c | 9895 | { |
wolfSSL | 0:d92f9d21154c | 9896 | static WOLFSSL_BIO_METHOD meth; |
wolfSSL | 0:d92f9d21154c | 9897 | |
wolfSSL | 0:d92f9d21154c | 9898 | WOLFSSL_ENTER("BIO_s_mem"); |
wolfSSL | 0:d92f9d21154c | 9899 | meth.type = BIO_MEMORY; |
wolfSSL | 0:d92f9d21154c | 9900 | |
wolfSSL | 0:d92f9d21154c | 9901 | return &meth; |
wolfSSL | 0:d92f9d21154c | 9902 | } |
wolfSSL | 0:d92f9d21154c | 9903 | |
wolfSSL | 0:d92f9d21154c | 9904 | |
wolfSSL | 0:d92f9d21154c | 9905 | WOLFSSL_BIO_METHOD* wolfSSL_BIO_f_base64(void) |
wolfSSL | 0:d92f9d21154c | 9906 | { |
wolfSSL | 0:d92f9d21154c | 9907 | return 0; |
wolfSSL | 0:d92f9d21154c | 9908 | } |
wolfSSL | 0:d92f9d21154c | 9909 | |
wolfSSL | 0:d92f9d21154c | 9910 | |
wolfSSL | 0:d92f9d21154c | 9911 | void wolfSSL_BIO_set_flags(WOLFSSL_BIO* bio, int flags) |
wolfSSL | 0:d92f9d21154c | 9912 | { |
wolfSSL | 0:d92f9d21154c | 9913 | (void)bio; |
wolfSSL | 0:d92f9d21154c | 9914 | (void)flags; |
wolfSSL | 0:d92f9d21154c | 9915 | } |
wolfSSL | 0:d92f9d21154c | 9916 | |
wolfSSL | 0:d92f9d21154c | 9917 | |
wolfSSL | 0:d92f9d21154c | 9918 | |
wolfSSL | 0:d92f9d21154c | 9919 | void wolfSSL_RAND_screen(void) |
wolfSSL | 0:d92f9d21154c | 9920 | { |
wolfSSL | 0:d92f9d21154c | 9921 | |
wolfSSL | 0:d92f9d21154c | 9922 | } |
wolfSSL | 0:d92f9d21154c | 9923 | |
wolfSSL | 0:d92f9d21154c | 9924 | |
wolfSSL | 0:d92f9d21154c | 9925 | const char* wolfSSL_RAND_file_name(char* fname, unsigned long len) |
wolfSSL | 0:d92f9d21154c | 9926 | { |
wolfSSL | 0:d92f9d21154c | 9927 | (void)fname; |
wolfSSL | 0:d92f9d21154c | 9928 | (void)len; |
wolfSSL | 0:d92f9d21154c | 9929 | return 0; |
wolfSSL | 0:d92f9d21154c | 9930 | } |
wolfSSL | 0:d92f9d21154c | 9931 | |
wolfSSL | 0:d92f9d21154c | 9932 | |
wolfSSL | 0:d92f9d21154c | 9933 | int wolfSSL_RAND_write_file(const char* fname) |
wolfSSL | 0:d92f9d21154c | 9934 | { |
wolfSSL | 0:d92f9d21154c | 9935 | (void)fname; |
wolfSSL | 0:d92f9d21154c | 9936 | return 0; |
wolfSSL | 0:d92f9d21154c | 9937 | } |
wolfSSL | 0:d92f9d21154c | 9938 | |
wolfSSL | 0:d92f9d21154c | 9939 | |
wolfSSL | 0:d92f9d21154c | 9940 | int wolfSSL_RAND_load_file(const char* fname, long len) |
wolfSSL | 0:d92f9d21154c | 9941 | { |
wolfSSL | 0:d92f9d21154c | 9942 | (void)fname; |
wolfSSL | 0:d92f9d21154c | 9943 | /* wolfCrypt provides enough entropy internally or will report error */ |
wolfSSL | 0:d92f9d21154c | 9944 | if (len == -1) |
wolfSSL | 0:d92f9d21154c | 9945 | return 1024; |
wolfSSL | 0:d92f9d21154c | 9946 | else |
wolfSSL | 0:d92f9d21154c | 9947 | return (int)len; |
wolfSSL | 0:d92f9d21154c | 9948 | } |
wolfSSL | 0:d92f9d21154c | 9949 | |
wolfSSL | 0:d92f9d21154c | 9950 | |
wolfSSL | 0:d92f9d21154c | 9951 | int wolfSSL_RAND_egd(const char* path) |
wolfSSL | 0:d92f9d21154c | 9952 | { |
wolfSSL | 0:d92f9d21154c | 9953 | (void)path; |
wolfSSL | 0:d92f9d21154c | 9954 | return 0; |
wolfSSL | 0:d92f9d21154c | 9955 | } |
wolfSSL | 0:d92f9d21154c | 9956 | |
wolfSSL | 0:d92f9d21154c | 9957 | |
wolfSSL | 0:d92f9d21154c | 9958 | |
wolfSSL | 0:d92f9d21154c | 9959 | WOLFSSL_COMP_METHOD* wolfSSL_COMP_zlib(void) |
wolfSSL | 0:d92f9d21154c | 9960 | { |
wolfSSL | 0:d92f9d21154c | 9961 | return 0; |
wolfSSL | 0:d92f9d21154c | 9962 | } |
wolfSSL | 0:d92f9d21154c | 9963 | |
wolfSSL | 0:d92f9d21154c | 9964 | |
wolfSSL | 0:d92f9d21154c | 9965 | WOLFSSL_COMP_METHOD* wolfSSL_COMP_rle(void) |
wolfSSL | 0:d92f9d21154c | 9966 | { |
wolfSSL | 0:d92f9d21154c | 9967 | return 0; |
wolfSSL | 0:d92f9d21154c | 9968 | } |
wolfSSL | 0:d92f9d21154c | 9969 | |
wolfSSL | 0:d92f9d21154c | 9970 | |
wolfSSL | 0:d92f9d21154c | 9971 | int wolfSSL_COMP_add_compression_method(int method, void* data) |
wolfSSL | 0:d92f9d21154c | 9972 | { |
wolfSSL | 0:d92f9d21154c | 9973 | (void)method; |
wolfSSL | 0:d92f9d21154c | 9974 | (void)data; |
wolfSSL | 0:d92f9d21154c | 9975 | return 0; |
wolfSSL | 0:d92f9d21154c | 9976 | } |
wolfSSL | 0:d92f9d21154c | 9977 | |
wolfSSL | 0:d92f9d21154c | 9978 | |
wolfSSL | 0:d92f9d21154c | 9979 | |
wolfSSL | 0:d92f9d21154c | 9980 | int wolfSSL_get_ex_new_index(long idx, void* data, void* cb1, void* cb2, |
wolfSSL | 0:d92f9d21154c | 9981 | void* cb3) |
wolfSSL | 0:d92f9d21154c | 9982 | { |
wolfSSL | 0:d92f9d21154c | 9983 | (void)idx; |
wolfSSL | 0:d92f9d21154c | 9984 | (void)data; |
wolfSSL | 0:d92f9d21154c | 9985 | (void)cb1; |
wolfSSL | 0:d92f9d21154c | 9986 | (void)cb2; |
wolfSSL | 0:d92f9d21154c | 9987 | (void)cb3; |
wolfSSL | 0:d92f9d21154c | 9988 | return 0; |
wolfSSL | 0:d92f9d21154c | 9989 | } |
wolfSSL | 0:d92f9d21154c | 9990 | |
wolfSSL | 0:d92f9d21154c | 9991 | |
wolfSSL | 0:d92f9d21154c | 9992 | void wolfSSL_set_dynlock_create_callback(WOLFSSL_dynlock_value* (*f)( |
wolfSSL | 0:d92f9d21154c | 9993 | const char*, int)) |
wolfSSL | 0:d92f9d21154c | 9994 | { |
wolfSSL | 0:d92f9d21154c | 9995 | (void)f; |
wolfSSL | 0:d92f9d21154c | 9996 | } |
wolfSSL | 0:d92f9d21154c | 9997 | |
wolfSSL | 0:d92f9d21154c | 9998 | |
wolfSSL | 0:d92f9d21154c | 9999 | void wolfSSL_set_dynlock_lock_callback( |
wolfSSL | 0:d92f9d21154c | 10000 | void (*f)(int, WOLFSSL_dynlock_value*, const char*, int)) |
wolfSSL | 0:d92f9d21154c | 10001 | { |
wolfSSL | 0:d92f9d21154c | 10002 | (void)f; |
wolfSSL | 0:d92f9d21154c | 10003 | } |
wolfSSL | 0:d92f9d21154c | 10004 | |
wolfSSL | 0:d92f9d21154c | 10005 | |
wolfSSL | 0:d92f9d21154c | 10006 | void wolfSSL_set_dynlock_destroy_callback( |
wolfSSL | 0:d92f9d21154c | 10007 | void (*f)(WOLFSSL_dynlock_value*, const char*, int)) |
wolfSSL | 0:d92f9d21154c | 10008 | { |
wolfSSL | 0:d92f9d21154c | 10009 | (void)f; |
wolfSSL | 0:d92f9d21154c | 10010 | } |
wolfSSL | 0:d92f9d21154c | 10011 | |
wolfSSL | 0:d92f9d21154c | 10012 | |
wolfSSL | 0:d92f9d21154c | 10013 | |
wolfSSL | 0:d92f9d21154c | 10014 | const char* wolfSSL_X509_verify_cert_error_string(long err) |
wolfSSL | 0:d92f9d21154c | 10015 | { |
wolfSSL | 0:d92f9d21154c | 10016 | (void)err; |
wolfSSL | 0:d92f9d21154c | 10017 | return 0; |
wolfSSL | 0:d92f9d21154c | 10018 | } |
wolfSSL | 0:d92f9d21154c | 10019 | |
wolfSSL | 0:d92f9d21154c | 10020 | |
wolfSSL | 0:d92f9d21154c | 10021 | |
wolfSSL | 0:d92f9d21154c | 10022 | int wolfSSL_X509_LOOKUP_add_dir(WOLFSSL_X509_LOOKUP* lookup, const char* dir, |
wolfSSL | 0:d92f9d21154c | 10023 | long len) |
wolfSSL | 0:d92f9d21154c | 10024 | { |
wolfSSL | 0:d92f9d21154c | 10025 | (void)lookup; |
wolfSSL | 0:d92f9d21154c | 10026 | (void)dir; |
wolfSSL | 0:d92f9d21154c | 10027 | (void)len; |
wolfSSL | 0:d92f9d21154c | 10028 | return 0; |
wolfSSL | 0:d92f9d21154c | 10029 | } |
wolfSSL | 0:d92f9d21154c | 10030 | |
wolfSSL | 0:d92f9d21154c | 10031 | |
wolfSSL | 0:d92f9d21154c | 10032 | int wolfSSL_X509_LOOKUP_load_file(WOLFSSL_X509_LOOKUP* lookup, |
wolfSSL | 0:d92f9d21154c | 10033 | const char* file, long len) |
wolfSSL | 0:d92f9d21154c | 10034 | { |
wolfSSL | 0:d92f9d21154c | 10035 | (void)lookup; |
wolfSSL | 0:d92f9d21154c | 10036 | (void)file; |
wolfSSL | 0:d92f9d21154c | 10037 | (void)len; |
wolfSSL | 0:d92f9d21154c | 10038 | return 0; |
wolfSSL | 0:d92f9d21154c | 10039 | } |
wolfSSL | 0:d92f9d21154c | 10040 | |
wolfSSL | 0:d92f9d21154c | 10041 | |
wolfSSL | 0:d92f9d21154c | 10042 | WOLFSSL_X509_LOOKUP_METHOD* wolfSSL_X509_LOOKUP_hash_dir(void) |
wolfSSL | 0:d92f9d21154c | 10043 | { |
wolfSSL | 0:d92f9d21154c | 10044 | return 0; |
wolfSSL | 0:d92f9d21154c | 10045 | } |
wolfSSL | 0:d92f9d21154c | 10046 | |
wolfSSL | 0:d92f9d21154c | 10047 | |
wolfSSL | 0:d92f9d21154c | 10048 | WOLFSSL_X509_LOOKUP_METHOD* wolfSSL_X509_LOOKUP_file(void) |
wolfSSL | 0:d92f9d21154c | 10049 | { |
wolfSSL | 0:d92f9d21154c | 10050 | return 0; |
wolfSSL | 0:d92f9d21154c | 10051 | } |
wolfSSL | 0:d92f9d21154c | 10052 | |
wolfSSL | 0:d92f9d21154c | 10053 | |
wolfSSL | 0:d92f9d21154c | 10054 | |
wolfSSL | 0:d92f9d21154c | 10055 | WOLFSSL_X509_LOOKUP* wolfSSL_X509_STORE_add_lookup(WOLFSSL_X509_STORE* store, |
wolfSSL | 0:d92f9d21154c | 10056 | WOLFSSL_X509_LOOKUP_METHOD* m) |
wolfSSL | 0:d92f9d21154c | 10057 | { |
wolfSSL | 0:d92f9d21154c | 10058 | (void)store; |
wolfSSL | 0:d92f9d21154c | 10059 | (void)m; |
wolfSSL | 0:d92f9d21154c | 10060 | return 0; |
wolfSSL | 0:d92f9d21154c | 10061 | } |
wolfSSL | 0:d92f9d21154c | 10062 | |
wolfSSL | 0:d92f9d21154c | 10063 | |
wolfSSL | 0:d92f9d21154c | 10064 | int wolfSSL_X509_STORE_add_cert(WOLFSSL_X509_STORE* store, WOLFSSL_X509* x509) |
wolfSSL | 0:d92f9d21154c | 10065 | { |
wolfSSL | 0:d92f9d21154c | 10066 | int result = SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 10067 | |
wolfSSL | 0:d92f9d21154c | 10068 | WOLFSSL_ENTER("wolfSSL_X509_STORE_add_cert"); |
wolfSSL | 0:d92f9d21154c | 10069 | if (store != NULL && store->cm != NULL && x509 != NULL) { |
wolfSSL | 0:d92f9d21154c | 10070 | buffer derCert; |
wolfSSL | 0:d92f9d21154c | 10071 | derCert.buffer = (byte*)XMALLOC(x509->derCert.length, |
wolfSSL | 0:d92f9d21154c | 10072 | NULL, DYNAMIC_TYPE_CERT); |
wolfSSL | 0:d92f9d21154c | 10073 | if (derCert.buffer != NULL) { |
wolfSSL | 0:d92f9d21154c | 10074 | derCert.length = x509->derCert.length; |
wolfSSL | 0:d92f9d21154c | 10075 | /* AddCA() frees the buffer. */ |
wolfSSL | 0:d92f9d21154c | 10076 | XMEMCPY(derCert.buffer, |
wolfSSL | 0:d92f9d21154c | 10077 | x509->derCert.buffer, x509->derCert.length); |
wolfSSL | 0:d92f9d21154c | 10078 | result = AddCA(store->cm, derCert, WOLFSSL_USER_CA, 1); |
wolfSSL | 0:d92f9d21154c | 10079 | if (result != SSL_SUCCESS) result = SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 10080 | } |
wolfSSL | 0:d92f9d21154c | 10081 | } |
wolfSSL | 0:d92f9d21154c | 10082 | |
wolfSSL | 0:d92f9d21154c | 10083 | WOLFSSL_LEAVE("wolfSSL_X509_STORE_add_cert", result); |
wolfSSL | 0:d92f9d21154c | 10084 | return result; |
wolfSSL | 0:d92f9d21154c | 10085 | } |
wolfSSL | 0:d92f9d21154c | 10086 | |
wolfSSL | 0:d92f9d21154c | 10087 | |
wolfSSL | 0:d92f9d21154c | 10088 | WOLFSSL_X509_STORE* wolfSSL_X509_STORE_new(void) |
wolfSSL | 0:d92f9d21154c | 10089 | { |
wolfSSL | 0:d92f9d21154c | 10090 | WOLFSSL_X509_STORE* store = NULL; |
wolfSSL | 0:d92f9d21154c | 10091 | |
wolfSSL | 0:d92f9d21154c | 10092 | store = (WOLFSSL_X509_STORE*)XMALLOC(sizeof(WOLFSSL_X509_STORE), NULL, 0); |
wolfSSL | 0:d92f9d21154c | 10093 | if (store != NULL) { |
wolfSSL | 0:d92f9d21154c | 10094 | store->cm = wolfSSL_CertManagerNew(); |
wolfSSL | 0:d92f9d21154c | 10095 | if (store->cm == NULL) { |
wolfSSL | 0:d92f9d21154c | 10096 | XFREE(store, NULL, 0); |
wolfSSL | 0:d92f9d21154c | 10097 | store = NULL; |
wolfSSL | 0:d92f9d21154c | 10098 | } |
wolfSSL | 0:d92f9d21154c | 10099 | } |
wolfSSL | 0:d92f9d21154c | 10100 | |
wolfSSL | 0:d92f9d21154c | 10101 | return store; |
wolfSSL | 0:d92f9d21154c | 10102 | } |
wolfSSL | 0:d92f9d21154c | 10103 | |
wolfSSL | 0:d92f9d21154c | 10104 | |
wolfSSL | 0:d92f9d21154c | 10105 | void wolfSSL_X509_STORE_free(WOLFSSL_X509_STORE* store) |
wolfSSL | 0:d92f9d21154c | 10106 | { |
wolfSSL | 0:d92f9d21154c | 10107 | if (store != NULL) { |
wolfSSL | 0:d92f9d21154c | 10108 | if (store->cm != NULL) |
wolfSSL | 0:d92f9d21154c | 10109 | wolfSSL_CertManagerFree(store->cm); |
wolfSSL | 0:d92f9d21154c | 10110 | XFREE(store, NULL, 0); |
wolfSSL | 0:d92f9d21154c | 10111 | } |
wolfSSL | 0:d92f9d21154c | 10112 | } |
wolfSSL | 0:d92f9d21154c | 10113 | |
wolfSSL | 0:d92f9d21154c | 10114 | |
wolfSSL | 0:d92f9d21154c | 10115 | int wolfSSL_X509_STORE_set_default_paths(WOLFSSL_X509_STORE* store) |
wolfSSL | 0:d92f9d21154c | 10116 | { |
wolfSSL | 0:d92f9d21154c | 10117 | (void)store; |
wolfSSL | 0:d92f9d21154c | 10118 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 10119 | } |
wolfSSL | 0:d92f9d21154c | 10120 | |
wolfSSL | 0:d92f9d21154c | 10121 | |
wolfSSL | 0:d92f9d21154c | 10122 | int wolfSSL_X509_STORE_get_by_subject(WOLFSSL_X509_STORE_CTX* ctx, int idx, |
wolfSSL | 0:d92f9d21154c | 10123 | WOLFSSL_X509_NAME* name, WOLFSSL_X509_OBJECT* obj) |
wolfSSL | 0:d92f9d21154c | 10124 | { |
wolfSSL | 0:d92f9d21154c | 10125 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10126 | (void)idx; |
wolfSSL | 0:d92f9d21154c | 10127 | (void)name; |
wolfSSL | 0:d92f9d21154c | 10128 | (void)obj; |
wolfSSL | 0:d92f9d21154c | 10129 | return 0; |
wolfSSL | 0:d92f9d21154c | 10130 | } |
wolfSSL | 0:d92f9d21154c | 10131 | |
wolfSSL | 0:d92f9d21154c | 10132 | |
wolfSSL | 0:d92f9d21154c | 10133 | WOLFSSL_X509_STORE_CTX* wolfSSL_X509_STORE_CTX_new(void) |
wolfSSL | 0:d92f9d21154c | 10134 | { |
wolfSSL | 0:d92f9d21154c | 10135 | WOLFSSL_X509_STORE_CTX* ctx = (WOLFSSL_X509_STORE_CTX*)XMALLOC( |
wolfSSL | 0:d92f9d21154c | 10136 | sizeof(WOLFSSL_X509_STORE_CTX), NULL, 0); |
wolfSSL | 0:d92f9d21154c | 10137 | |
wolfSSL | 0:d92f9d21154c | 10138 | if (ctx != NULL) |
wolfSSL | 0:d92f9d21154c | 10139 | wolfSSL_X509_STORE_CTX_init(ctx, NULL, NULL, NULL); |
wolfSSL | 0:d92f9d21154c | 10140 | |
wolfSSL | 0:d92f9d21154c | 10141 | return ctx; |
wolfSSL | 0:d92f9d21154c | 10142 | } |
wolfSSL | 0:d92f9d21154c | 10143 | |
wolfSSL | 0:d92f9d21154c | 10144 | |
wolfSSL | 0:d92f9d21154c | 10145 | int wolfSSL_X509_STORE_CTX_init(WOLFSSL_X509_STORE_CTX* ctx, |
wolfSSL | 0:d92f9d21154c | 10146 | WOLFSSL_X509_STORE* store, WOLFSSL_X509* x509, STACK_OF(WOLFSSL_X509)* sk) |
wolfSSL | 0:d92f9d21154c | 10147 | { |
wolfSSL | 0:d92f9d21154c | 10148 | (void)sk; |
wolfSSL | 0:d92f9d21154c | 10149 | if (ctx != NULL) { |
wolfSSL | 0:d92f9d21154c | 10150 | ctx->store = store; |
wolfSSL | 0:d92f9d21154c | 10151 | ctx->current_cert = x509; |
wolfSSL | 0:d92f9d21154c | 10152 | ctx->domain = NULL; |
wolfSSL | 0:d92f9d21154c | 10153 | ctx->ex_data = NULL; |
wolfSSL | 0:d92f9d21154c | 10154 | ctx->userCtx = NULL; |
wolfSSL | 0:d92f9d21154c | 10155 | ctx->error = 0; |
wolfSSL | 0:d92f9d21154c | 10156 | ctx->error_depth = 0; |
wolfSSL | 0:d92f9d21154c | 10157 | ctx->discardSessionCerts = 0; |
wolfSSL | 0:d92f9d21154c | 10158 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 10159 | } |
wolfSSL | 0:d92f9d21154c | 10160 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 10161 | } |
wolfSSL | 0:d92f9d21154c | 10162 | |
wolfSSL | 0:d92f9d21154c | 10163 | |
wolfSSL | 0:d92f9d21154c | 10164 | void wolfSSL_X509_STORE_CTX_free(WOLFSSL_X509_STORE_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 10165 | { |
wolfSSL | 0:d92f9d21154c | 10166 | if (ctx != NULL) { |
wolfSSL | 0:d92f9d21154c | 10167 | if (ctx->store != NULL) |
wolfSSL | 0:d92f9d21154c | 10168 | wolfSSL_X509_STORE_free(ctx->store); |
wolfSSL | 0:d92f9d21154c | 10169 | if (ctx->current_cert != NULL) |
wolfSSL | 0:d92f9d21154c | 10170 | wolfSSL_FreeX509(ctx->current_cert); |
wolfSSL | 0:d92f9d21154c | 10171 | XFREE(ctx, NULL, 0); |
wolfSSL | 0:d92f9d21154c | 10172 | } |
wolfSSL | 0:d92f9d21154c | 10173 | } |
wolfSSL | 0:d92f9d21154c | 10174 | |
wolfSSL | 0:d92f9d21154c | 10175 | |
wolfSSL | 0:d92f9d21154c | 10176 | void wolfSSL_X509_STORE_CTX_cleanup(WOLFSSL_X509_STORE_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 10177 | { |
wolfSSL | 0:d92f9d21154c | 10178 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10179 | } |
wolfSSL | 0:d92f9d21154c | 10180 | |
wolfSSL | 0:d92f9d21154c | 10181 | |
wolfSSL | 0:d92f9d21154c | 10182 | int wolfSSL_X509_verify_cert(WOLFSSL_X509_STORE_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 10183 | { |
wolfSSL | 0:d92f9d21154c | 10184 | if (ctx != NULL && ctx->store != NULL && ctx->store->cm != NULL |
wolfSSL | 0:d92f9d21154c | 10185 | && ctx->current_cert != NULL) { |
wolfSSL | 0:d92f9d21154c | 10186 | return wolfSSL_CertManagerVerifyBuffer(ctx->store->cm, |
wolfSSL | 0:d92f9d21154c | 10187 | ctx->current_cert->derCert.buffer, |
wolfSSL | 0:d92f9d21154c | 10188 | ctx->current_cert->derCert.length, |
wolfSSL | 0:d92f9d21154c | 10189 | SSL_FILETYPE_ASN1); |
wolfSSL | 0:d92f9d21154c | 10190 | } |
wolfSSL | 0:d92f9d21154c | 10191 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 10192 | } |
wolfSSL | 0:d92f9d21154c | 10193 | |
wolfSSL | 0:d92f9d21154c | 10194 | |
wolfSSL | 0:d92f9d21154c | 10195 | WOLFSSL_ASN1_TIME* wolfSSL_X509_CRL_get_lastUpdate(WOLFSSL_X509_CRL* crl) |
wolfSSL | 0:d92f9d21154c | 10196 | { |
wolfSSL | 0:d92f9d21154c | 10197 | (void)crl; |
wolfSSL | 0:d92f9d21154c | 10198 | return 0; |
wolfSSL | 0:d92f9d21154c | 10199 | } |
wolfSSL | 0:d92f9d21154c | 10200 | |
wolfSSL | 0:d92f9d21154c | 10201 | |
wolfSSL | 0:d92f9d21154c | 10202 | WOLFSSL_ASN1_TIME* wolfSSL_X509_CRL_get_nextUpdate(WOLFSSL_X509_CRL* crl) |
wolfSSL | 0:d92f9d21154c | 10203 | { |
wolfSSL | 0:d92f9d21154c | 10204 | (void)crl; |
wolfSSL | 0:d92f9d21154c | 10205 | return 0; |
wolfSSL | 0:d92f9d21154c | 10206 | } |
wolfSSL | 0:d92f9d21154c | 10207 | |
wolfSSL | 0:d92f9d21154c | 10208 | |
wolfSSL | 0:d92f9d21154c | 10209 | |
wolfSSL | 0:d92f9d21154c | 10210 | WOLFSSL_EVP_PKEY* wolfSSL_X509_get_pubkey(WOLFSSL_X509* x509) |
wolfSSL | 0:d92f9d21154c | 10211 | { |
wolfSSL | 0:d92f9d21154c | 10212 | WOLFSSL_EVP_PKEY* key = NULL; |
wolfSSL | 0:d92f9d21154c | 10213 | if (x509 != NULL) { |
wolfSSL | 0:d92f9d21154c | 10214 | key = (WOLFSSL_EVP_PKEY*)XMALLOC( |
wolfSSL | 0:d92f9d21154c | 10215 | sizeof(WOLFSSL_EVP_PKEY), NULL, DYNAMIC_TYPE_PUBLIC_KEY); |
wolfSSL | 0:d92f9d21154c | 10216 | if (key != NULL) { |
wolfSSL | 0:d92f9d21154c | 10217 | key->type = x509->pubKeyOID; |
wolfSSL | 0:d92f9d21154c | 10218 | key->save_type = 0; |
wolfSSL | 0:d92f9d21154c | 10219 | key->pkey.ptr = (char*)XMALLOC( |
wolfSSL | 0:d92f9d21154c | 10220 | x509->pubKey.length, NULL, DYNAMIC_TYPE_PUBLIC_KEY); |
wolfSSL | 0:d92f9d21154c | 10221 | if (key->pkey.ptr == NULL) { |
wolfSSL | 0:d92f9d21154c | 10222 | XFREE(key, NULL, DYNAMIC_TYPE_PUBLIC_KEY); |
wolfSSL | 0:d92f9d21154c | 10223 | return NULL; |
wolfSSL | 0:d92f9d21154c | 10224 | } |
wolfSSL | 0:d92f9d21154c | 10225 | XMEMCPY(key->pkey.ptr, |
wolfSSL | 0:d92f9d21154c | 10226 | x509->pubKey.buffer, x509->pubKey.length); |
wolfSSL | 0:d92f9d21154c | 10227 | key->pkey_sz = x509->pubKey.length; |
wolfSSL | 0:d92f9d21154c | 10228 | #ifdef HAVE_ECC |
wolfSSL | 0:d92f9d21154c | 10229 | key->pkey_curve = (int)x509->pkCurveOID; |
wolfSSL | 0:d92f9d21154c | 10230 | #endif /* HAVE_ECC */ |
wolfSSL | 0:d92f9d21154c | 10231 | } |
wolfSSL | 0:d92f9d21154c | 10232 | } |
wolfSSL | 0:d92f9d21154c | 10233 | return key; |
wolfSSL | 0:d92f9d21154c | 10234 | } |
wolfSSL | 0:d92f9d21154c | 10235 | |
wolfSSL | 0:d92f9d21154c | 10236 | |
wolfSSL | 0:d92f9d21154c | 10237 | int wolfSSL_X509_CRL_verify(WOLFSSL_X509_CRL* crl, WOLFSSL_EVP_PKEY* key) |
wolfSSL | 0:d92f9d21154c | 10238 | { |
wolfSSL | 0:d92f9d21154c | 10239 | (void)crl; |
wolfSSL | 0:d92f9d21154c | 10240 | (void)key; |
wolfSSL | 0:d92f9d21154c | 10241 | return 0; |
wolfSSL | 0:d92f9d21154c | 10242 | } |
wolfSSL | 0:d92f9d21154c | 10243 | |
wolfSSL | 0:d92f9d21154c | 10244 | |
wolfSSL | 0:d92f9d21154c | 10245 | void wolfSSL_X509_STORE_CTX_set_error(WOLFSSL_X509_STORE_CTX* ctx, int err) |
wolfSSL | 0:d92f9d21154c | 10246 | { |
wolfSSL | 0:d92f9d21154c | 10247 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10248 | (void)err; |
wolfSSL | 0:d92f9d21154c | 10249 | } |
wolfSSL | 0:d92f9d21154c | 10250 | |
wolfSSL | 0:d92f9d21154c | 10251 | |
wolfSSL | 0:d92f9d21154c | 10252 | void wolfSSL_X509_OBJECT_free_contents(WOLFSSL_X509_OBJECT* obj) |
wolfSSL | 0:d92f9d21154c | 10253 | { |
wolfSSL | 0:d92f9d21154c | 10254 | (void)obj; |
wolfSSL | 0:d92f9d21154c | 10255 | } |
wolfSSL | 0:d92f9d21154c | 10256 | |
wolfSSL | 0:d92f9d21154c | 10257 | |
wolfSSL | 0:d92f9d21154c | 10258 | void wolfSSL_EVP_PKEY_free(WOLFSSL_EVP_PKEY* key) |
wolfSSL | 0:d92f9d21154c | 10259 | { |
wolfSSL | 0:d92f9d21154c | 10260 | if (key != NULL) { |
wolfSSL | 0:d92f9d21154c | 10261 | if (key->pkey.ptr != NULL) |
wolfSSL | 0:d92f9d21154c | 10262 | XFREE(key->pkey.ptr, NULL, 0); |
wolfSSL | 0:d92f9d21154c | 10263 | XFREE(key, NULL, 0); |
wolfSSL | 0:d92f9d21154c | 10264 | } |
wolfSSL | 0:d92f9d21154c | 10265 | } |
wolfSSL | 0:d92f9d21154c | 10266 | |
wolfSSL | 0:d92f9d21154c | 10267 | |
wolfSSL | 0:d92f9d21154c | 10268 | int wolfSSL_X509_cmp_current_time(const WOLFSSL_ASN1_TIME* asnTime) |
wolfSSL | 0:d92f9d21154c | 10269 | { |
wolfSSL | 0:d92f9d21154c | 10270 | (void)asnTime; |
wolfSSL | 0:d92f9d21154c | 10271 | return 0; |
wolfSSL | 0:d92f9d21154c | 10272 | } |
wolfSSL | 0:d92f9d21154c | 10273 | |
wolfSSL | 0:d92f9d21154c | 10274 | |
wolfSSL | 0:d92f9d21154c | 10275 | int wolfSSL_sk_X509_REVOKED_num(WOLFSSL_X509_REVOKED* revoked) |
wolfSSL | 0:d92f9d21154c | 10276 | { |
wolfSSL | 0:d92f9d21154c | 10277 | (void)revoked; |
wolfSSL | 0:d92f9d21154c | 10278 | return 0; |
wolfSSL | 0:d92f9d21154c | 10279 | } |
wolfSSL | 0:d92f9d21154c | 10280 | |
wolfSSL | 0:d92f9d21154c | 10281 | |
wolfSSL | 0:d92f9d21154c | 10282 | |
wolfSSL | 0:d92f9d21154c | 10283 | WOLFSSL_X509_REVOKED* wolfSSL_X509_CRL_get_REVOKED(WOLFSSL_X509_CRL* crl) |
wolfSSL | 0:d92f9d21154c | 10284 | { |
wolfSSL | 0:d92f9d21154c | 10285 | (void)crl; |
wolfSSL | 0:d92f9d21154c | 10286 | return 0; |
wolfSSL | 0:d92f9d21154c | 10287 | } |
wolfSSL | 0:d92f9d21154c | 10288 | |
wolfSSL | 0:d92f9d21154c | 10289 | |
wolfSSL | 0:d92f9d21154c | 10290 | WOLFSSL_X509_REVOKED* wolfSSL_sk_X509_REVOKED_value( |
wolfSSL | 0:d92f9d21154c | 10291 | WOLFSSL_X509_REVOKED* revoked, int value) |
wolfSSL | 0:d92f9d21154c | 10292 | { |
wolfSSL | 0:d92f9d21154c | 10293 | (void)revoked; |
wolfSSL | 0:d92f9d21154c | 10294 | (void)value; |
wolfSSL | 0:d92f9d21154c | 10295 | return 0; |
wolfSSL | 0:d92f9d21154c | 10296 | } |
wolfSSL | 0:d92f9d21154c | 10297 | |
wolfSSL | 0:d92f9d21154c | 10298 | |
wolfSSL | 0:d92f9d21154c | 10299 | |
wolfSSL | 0:d92f9d21154c | 10300 | WOLFSSL_ASN1_INTEGER* wolfSSL_X509_get_serialNumber(WOLFSSL_X509* x509) |
wolfSSL | 0:d92f9d21154c | 10301 | { |
wolfSSL | 0:d92f9d21154c | 10302 | (void)x509; |
wolfSSL | 0:d92f9d21154c | 10303 | return 0; |
wolfSSL | 0:d92f9d21154c | 10304 | } |
wolfSSL | 0:d92f9d21154c | 10305 | |
wolfSSL | 0:d92f9d21154c | 10306 | |
wolfSSL | 0:d92f9d21154c | 10307 | int wolfSSL_ASN1_TIME_print(WOLFSSL_BIO* bio, const WOLFSSL_ASN1_TIME* asnTime) |
wolfSSL | 0:d92f9d21154c | 10308 | { |
wolfSSL | 0:d92f9d21154c | 10309 | (void)bio; |
wolfSSL | 0:d92f9d21154c | 10310 | (void)asnTime; |
wolfSSL | 0:d92f9d21154c | 10311 | return 0; |
wolfSSL | 0:d92f9d21154c | 10312 | } |
wolfSSL | 0:d92f9d21154c | 10313 | |
wolfSSL | 0:d92f9d21154c | 10314 | |
wolfSSL | 0:d92f9d21154c | 10315 | |
wolfSSL | 0:d92f9d21154c | 10316 | int wolfSSL_ASN1_INTEGER_cmp(const WOLFSSL_ASN1_INTEGER* a, |
wolfSSL | 0:d92f9d21154c | 10317 | const WOLFSSL_ASN1_INTEGER* b) |
wolfSSL | 0:d92f9d21154c | 10318 | { |
wolfSSL | 0:d92f9d21154c | 10319 | (void)a; |
wolfSSL | 0:d92f9d21154c | 10320 | (void)b; |
wolfSSL | 0:d92f9d21154c | 10321 | return 0; |
wolfSSL | 0:d92f9d21154c | 10322 | } |
wolfSSL | 0:d92f9d21154c | 10323 | |
wolfSSL | 0:d92f9d21154c | 10324 | |
wolfSSL | 0:d92f9d21154c | 10325 | long wolfSSL_ASN1_INTEGER_get(const WOLFSSL_ASN1_INTEGER* i) |
wolfSSL | 0:d92f9d21154c | 10326 | { |
wolfSSL | 0:d92f9d21154c | 10327 | (void)i; |
wolfSSL | 0:d92f9d21154c | 10328 | return 0; |
wolfSSL | 0:d92f9d21154c | 10329 | } |
wolfSSL | 0:d92f9d21154c | 10330 | |
wolfSSL | 0:d92f9d21154c | 10331 | |
wolfSSL | 0:d92f9d21154c | 10332 | |
wolfSSL | 0:d92f9d21154c | 10333 | void* wolfSSL_X509_STORE_CTX_get_ex_data(WOLFSSL_X509_STORE_CTX* ctx, int idx) |
wolfSSL | 0:d92f9d21154c | 10334 | { |
wolfSSL | 0:d92f9d21154c | 10335 | #ifdef FORTRESS |
wolfSSL | 0:d92f9d21154c | 10336 | if (ctx != NULL && idx == 0) |
wolfSSL | 0:d92f9d21154c | 10337 | return ctx->ex_data; |
wolfSSL | 0:d92f9d21154c | 10338 | #else |
wolfSSL | 0:d92f9d21154c | 10339 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10340 | (void)idx; |
wolfSSL | 0:d92f9d21154c | 10341 | #endif |
wolfSSL | 0:d92f9d21154c | 10342 | return 0; |
wolfSSL | 0:d92f9d21154c | 10343 | } |
wolfSSL | 0:d92f9d21154c | 10344 | |
wolfSSL | 0:d92f9d21154c | 10345 | |
wolfSSL | 0:d92f9d21154c | 10346 | int wolfSSL_get_ex_data_X509_STORE_CTX_idx(void) |
wolfSSL | 0:d92f9d21154c | 10347 | { |
wolfSSL | 0:d92f9d21154c | 10348 | return 0; |
wolfSSL | 0:d92f9d21154c | 10349 | } |
wolfSSL | 0:d92f9d21154c | 10350 | |
wolfSSL | 0:d92f9d21154c | 10351 | |
wolfSSL | 0:d92f9d21154c | 10352 | void* wolfSSL_get_ex_data(const WOLFSSL* ssl, int idx) |
wolfSSL | 0:d92f9d21154c | 10353 | { |
wolfSSL | 0:d92f9d21154c | 10354 | #ifdef FORTRESS |
wolfSSL | 0:d92f9d21154c | 10355 | if (ssl != NULL && idx < MAX_EX_DATA) |
wolfSSL | 0:d92f9d21154c | 10356 | return ssl->ex_data[idx]; |
wolfSSL | 0:d92f9d21154c | 10357 | #else |
wolfSSL | 0:d92f9d21154c | 10358 | (void)ssl; |
wolfSSL | 0:d92f9d21154c | 10359 | (void)idx; |
wolfSSL | 0:d92f9d21154c | 10360 | #endif |
wolfSSL | 0:d92f9d21154c | 10361 | return 0; |
wolfSSL | 0:d92f9d21154c | 10362 | } |
wolfSSL | 0:d92f9d21154c | 10363 | |
wolfSSL | 0:d92f9d21154c | 10364 | |
wolfSSL | 0:d92f9d21154c | 10365 | void wolfSSL_CTX_set_info_callback(WOLFSSL_CTX* ctx, void (*f)(void)) |
wolfSSL | 0:d92f9d21154c | 10366 | { |
wolfSSL | 0:d92f9d21154c | 10367 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10368 | (void)f; |
wolfSSL | 0:d92f9d21154c | 10369 | } |
wolfSSL | 0:d92f9d21154c | 10370 | |
wolfSSL | 0:d92f9d21154c | 10371 | |
wolfSSL | 0:d92f9d21154c | 10372 | unsigned long wolfSSL_ERR_peek_error(void) |
wolfSSL | 0:d92f9d21154c | 10373 | { |
wolfSSL | 0:d92f9d21154c | 10374 | return 0; |
wolfSSL | 0:d92f9d21154c | 10375 | } |
wolfSSL | 0:d92f9d21154c | 10376 | |
wolfSSL | 0:d92f9d21154c | 10377 | |
wolfSSL | 0:d92f9d21154c | 10378 | int wolfSSL_ERR_GET_REASON(int err) |
wolfSSL | 0:d92f9d21154c | 10379 | { |
wolfSSL | 0:d92f9d21154c | 10380 | (void)err; |
wolfSSL | 0:d92f9d21154c | 10381 | return 0; |
wolfSSL | 0:d92f9d21154c | 10382 | } |
wolfSSL | 0:d92f9d21154c | 10383 | |
wolfSSL | 0:d92f9d21154c | 10384 | |
wolfSSL | 0:d92f9d21154c | 10385 | char* wolfSSL_alert_type_string_long(int alertID) |
wolfSSL | 0:d92f9d21154c | 10386 | { |
wolfSSL | 0:d92f9d21154c | 10387 | (void)alertID; |
wolfSSL | 0:d92f9d21154c | 10388 | return 0; |
wolfSSL | 0:d92f9d21154c | 10389 | } |
wolfSSL | 0:d92f9d21154c | 10390 | |
wolfSSL | 0:d92f9d21154c | 10391 | |
wolfSSL | 0:d92f9d21154c | 10392 | char* wolfSSL_alert_desc_string_long(int alertID) |
wolfSSL | 0:d92f9d21154c | 10393 | { |
wolfSSL | 0:d92f9d21154c | 10394 | (void)alertID; |
wolfSSL | 0:d92f9d21154c | 10395 | return 0; |
wolfSSL | 0:d92f9d21154c | 10396 | } |
wolfSSL | 0:d92f9d21154c | 10397 | |
wolfSSL | 0:d92f9d21154c | 10398 | |
wolfSSL | 0:d92f9d21154c | 10399 | char* wolfSSL_state_string_long(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 10400 | { |
wolfSSL | 0:d92f9d21154c | 10401 | (void)ssl; |
wolfSSL | 0:d92f9d21154c | 10402 | return 0; |
wolfSSL | 0:d92f9d21154c | 10403 | } |
wolfSSL | 0:d92f9d21154c | 10404 | |
wolfSSL | 0:d92f9d21154c | 10405 | |
wolfSSL | 0:d92f9d21154c | 10406 | int wolfSSL_PEM_def_callback(char* name, int num, int w, void* key) |
wolfSSL | 0:d92f9d21154c | 10407 | { |
wolfSSL | 0:d92f9d21154c | 10408 | (void)name; |
wolfSSL | 0:d92f9d21154c | 10409 | (void)num; |
wolfSSL | 0:d92f9d21154c | 10410 | (void)w; |
wolfSSL | 0:d92f9d21154c | 10411 | (void)key; |
wolfSSL | 0:d92f9d21154c | 10412 | return 0; |
wolfSSL | 0:d92f9d21154c | 10413 | } |
wolfSSL | 0:d92f9d21154c | 10414 | |
wolfSSL | 0:d92f9d21154c | 10415 | |
wolfSSL | 0:d92f9d21154c | 10416 | long wolfSSL_CTX_sess_accept(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 10417 | { |
wolfSSL | 0:d92f9d21154c | 10418 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10419 | return 0; |
wolfSSL | 0:d92f9d21154c | 10420 | } |
wolfSSL | 0:d92f9d21154c | 10421 | |
wolfSSL | 0:d92f9d21154c | 10422 | |
wolfSSL | 0:d92f9d21154c | 10423 | long wolfSSL_CTX_sess_connect(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 10424 | { |
wolfSSL | 0:d92f9d21154c | 10425 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10426 | return 0; |
wolfSSL | 0:d92f9d21154c | 10427 | } |
wolfSSL | 0:d92f9d21154c | 10428 | |
wolfSSL | 0:d92f9d21154c | 10429 | |
wolfSSL | 0:d92f9d21154c | 10430 | long wolfSSL_CTX_sess_accept_good(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 10431 | { |
wolfSSL | 0:d92f9d21154c | 10432 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10433 | return 0; |
wolfSSL | 0:d92f9d21154c | 10434 | } |
wolfSSL | 0:d92f9d21154c | 10435 | |
wolfSSL | 0:d92f9d21154c | 10436 | |
wolfSSL | 0:d92f9d21154c | 10437 | long wolfSSL_CTX_sess_connect_good(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 10438 | { |
wolfSSL | 0:d92f9d21154c | 10439 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10440 | return 0; |
wolfSSL | 0:d92f9d21154c | 10441 | } |
wolfSSL | 0:d92f9d21154c | 10442 | |
wolfSSL | 0:d92f9d21154c | 10443 | |
wolfSSL | 0:d92f9d21154c | 10444 | long wolfSSL_CTX_sess_accept_renegotiate(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 10445 | { |
wolfSSL | 0:d92f9d21154c | 10446 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10447 | return 0; |
wolfSSL | 0:d92f9d21154c | 10448 | } |
wolfSSL | 0:d92f9d21154c | 10449 | |
wolfSSL | 0:d92f9d21154c | 10450 | |
wolfSSL | 0:d92f9d21154c | 10451 | long wolfSSL_CTX_sess_connect_renegotiate(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 10452 | { |
wolfSSL | 0:d92f9d21154c | 10453 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10454 | return 0; |
wolfSSL | 0:d92f9d21154c | 10455 | } |
wolfSSL | 0:d92f9d21154c | 10456 | |
wolfSSL | 0:d92f9d21154c | 10457 | |
wolfSSL | 0:d92f9d21154c | 10458 | long wolfSSL_CTX_sess_hits(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 10459 | { |
wolfSSL | 0:d92f9d21154c | 10460 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10461 | return 0; |
wolfSSL | 0:d92f9d21154c | 10462 | } |
wolfSSL | 0:d92f9d21154c | 10463 | |
wolfSSL | 0:d92f9d21154c | 10464 | |
wolfSSL | 0:d92f9d21154c | 10465 | long wolfSSL_CTX_sess_cb_hits(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 10466 | { |
wolfSSL | 0:d92f9d21154c | 10467 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10468 | return 0; |
wolfSSL | 0:d92f9d21154c | 10469 | } |
wolfSSL | 0:d92f9d21154c | 10470 | |
wolfSSL | 0:d92f9d21154c | 10471 | |
wolfSSL | 0:d92f9d21154c | 10472 | long wolfSSL_CTX_sess_cache_full(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 10473 | { |
wolfSSL | 0:d92f9d21154c | 10474 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10475 | return 0; |
wolfSSL | 0:d92f9d21154c | 10476 | } |
wolfSSL | 0:d92f9d21154c | 10477 | |
wolfSSL | 0:d92f9d21154c | 10478 | |
wolfSSL | 0:d92f9d21154c | 10479 | long wolfSSL_CTX_sess_misses(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 10480 | { |
wolfSSL | 0:d92f9d21154c | 10481 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10482 | return 0; |
wolfSSL | 0:d92f9d21154c | 10483 | } |
wolfSSL | 0:d92f9d21154c | 10484 | |
wolfSSL | 0:d92f9d21154c | 10485 | |
wolfSSL | 0:d92f9d21154c | 10486 | long wolfSSL_CTX_sess_timeouts(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 10487 | { |
wolfSSL | 0:d92f9d21154c | 10488 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10489 | return 0; |
wolfSSL | 0:d92f9d21154c | 10490 | } |
wolfSSL | 0:d92f9d21154c | 10491 | |
wolfSSL | 0:d92f9d21154c | 10492 | |
wolfSSL | 0:d92f9d21154c | 10493 | long wolfSSL_CTX_sess_number(WOLFSSL_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 10494 | { |
wolfSSL | 0:d92f9d21154c | 10495 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10496 | return 0; |
wolfSSL | 0:d92f9d21154c | 10497 | } |
wolfSSL | 0:d92f9d21154c | 10498 | |
wolfSSL | 0:d92f9d21154c | 10499 | #ifndef NO_DES3 |
wolfSSL | 0:d92f9d21154c | 10500 | |
wolfSSL | 0:d92f9d21154c | 10501 | void wolfSSL_DES_set_key_unchecked(WOLFSSL_const_DES_cblock* myDes, |
wolfSSL | 0:d92f9d21154c | 10502 | WOLFSSL_DES_key_schedule* key) |
wolfSSL | 0:d92f9d21154c | 10503 | { |
wolfSSL | 0:d92f9d21154c | 10504 | (void)myDes; |
wolfSSL | 0:d92f9d21154c | 10505 | (void)key; |
wolfSSL | 0:d92f9d21154c | 10506 | } |
wolfSSL | 0:d92f9d21154c | 10507 | |
wolfSSL | 0:d92f9d21154c | 10508 | |
wolfSSL | 0:d92f9d21154c | 10509 | void wolfSSL_DES_set_odd_parity(WOLFSSL_DES_cblock* myDes) |
wolfSSL | 0:d92f9d21154c | 10510 | { |
wolfSSL | 0:d92f9d21154c | 10511 | (void)myDes; |
wolfSSL | 0:d92f9d21154c | 10512 | } |
wolfSSL | 0:d92f9d21154c | 10513 | |
wolfSSL | 0:d92f9d21154c | 10514 | |
wolfSSL | 0:d92f9d21154c | 10515 | void wolfSSL_DES_ecb_encrypt(WOLFSSL_DES_cblock* desa, |
wolfSSL | 0:d92f9d21154c | 10516 | WOLFSSL_DES_cblock* desb, WOLFSSL_DES_key_schedule* key, int len) |
wolfSSL | 0:d92f9d21154c | 10517 | { |
wolfSSL | 0:d92f9d21154c | 10518 | (void)desa; |
wolfSSL | 0:d92f9d21154c | 10519 | (void)desb; |
wolfSSL | 0:d92f9d21154c | 10520 | (void)key; |
wolfSSL | 0:d92f9d21154c | 10521 | (void)len; |
wolfSSL | 0:d92f9d21154c | 10522 | } |
wolfSSL | 0:d92f9d21154c | 10523 | |
wolfSSL | 0:d92f9d21154c | 10524 | #endif /* NO_DES3 */ |
wolfSSL | 0:d92f9d21154c | 10525 | |
wolfSSL | 0:d92f9d21154c | 10526 | int wolfSSL_BIO_printf(WOLFSSL_BIO* bio, const char* format, ...) |
wolfSSL | 0:d92f9d21154c | 10527 | { |
wolfSSL | 0:d92f9d21154c | 10528 | (void)bio; |
wolfSSL | 0:d92f9d21154c | 10529 | (void)format; |
wolfSSL | 0:d92f9d21154c | 10530 | return 0; |
wolfSSL | 0:d92f9d21154c | 10531 | } |
wolfSSL | 0:d92f9d21154c | 10532 | |
wolfSSL | 0:d92f9d21154c | 10533 | |
wolfSSL | 0:d92f9d21154c | 10534 | int wolfSSL_ASN1_UTCTIME_print(WOLFSSL_BIO* bio, const WOLFSSL_ASN1_UTCTIME* a) |
wolfSSL | 0:d92f9d21154c | 10535 | { |
wolfSSL | 0:d92f9d21154c | 10536 | (void)bio; |
wolfSSL | 0:d92f9d21154c | 10537 | (void)a; |
wolfSSL | 0:d92f9d21154c | 10538 | return 0; |
wolfSSL | 0:d92f9d21154c | 10539 | } |
wolfSSL | 0:d92f9d21154c | 10540 | |
wolfSSL | 0:d92f9d21154c | 10541 | |
wolfSSL | 0:d92f9d21154c | 10542 | int wolfSSL_sk_num(WOLFSSL_X509_REVOKED* rev) |
wolfSSL | 0:d92f9d21154c | 10543 | { |
wolfSSL | 0:d92f9d21154c | 10544 | (void)rev; |
wolfSSL | 0:d92f9d21154c | 10545 | return 0; |
wolfSSL | 0:d92f9d21154c | 10546 | } |
wolfSSL | 0:d92f9d21154c | 10547 | |
wolfSSL | 0:d92f9d21154c | 10548 | |
wolfSSL | 0:d92f9d21154c | 10549 | void* wolfSSL_sk_value(WOLFSSL_X509_REVOKED* rev, int i) |
wolfSSL | 0:d92f9d21154c | 10550 | { |
wolfSSL | 0:d92f9d21154c | 10551 | (void)rev; |
wolfSSL | 0:d92f9d21154c | 10552 | (void)i; |
wolfSSL | 0:d92f9d21154c | 10553 | return 0; |
wolfSSL | 0:d92f9d21154c | 10554 | } |
wolfSSL | 0:d92f9d21154c | 10555 | |
wolfSSL | 0:d92f9d21154c | 10556 | |
wolfSSL | 0:d92f9d21154c | 10557 | /* stunnel 4.28 needs */ |
wolfSSL | 0:d92f9d21154c | 10558 | void* wolfSSL_CTX_get_ex_data(const WOLFSSL_CTX* ctx, int d) |
wolfSSL | 0:d92f9d21154c | 10559 | { |
wolfSSL | 0:d92f9d21154c | 10560 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10561 | (void)d; |
wolfSSL | 0:d92f9d21154c | 10562 | return 0; |
wolfSSL | 0:d92f9d21154c | 10563 | } |
wolfSSL | 0:d92f9d21154c | 10564 | |
wolfSSL | 0:d92f9d21154c | 10565 | |
wolfSSL | 0:d92f9d21154c | 10566 | int wolfSSL_CTX_set_ex_data(WOLFSSL_CTX* ctx, int d, void* p) |
wolfSSL | 0:d92f9d21154c | 10567 | { |
wolfSSL | 0:d92f9d21154c | 10568 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10569 | (void)d; |
wolfSSL | 0:d92f9d21154c | 10570 | (void)p; |
wolfSSL | 0:d92f9d21154c | 10571 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 10572 | } |
wolfSSL | 0:d92f9d21154c | 10573 | |
wolfSSL | 0:d92f9d21154c | 10574 | |
wolfSSL | 0:d92f9d21154c | 10575 | void wolfSSL_CTX_sess_set_get_cb(WOLFSSL_CTX* ctx, |
wolfSSL | 0:d92f9d21154c | 10576 | WOLFSSL_SESSION*(*f)(WOLFSSL*, unsigned char*, int, int*)) |
wolfSSL | 0:d92f9d21154c | 10577 | { |
wolfSSL | 0:d92f9d21154c | 10578 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10579 | (void)f; |
wolfSSL | 0:d92f9d21154c | 10580 | } |
wolfSSL | 0:d92f9d21154c | 10581 | |
wolfSSL | 0:d92f9d21154c | 10582 | |
wolfSSL | 0:d92f9d21154c | 10583 | void wolfSSL_CTX_sess_set_new_cb(WOLFSSL_CTX* ctx, |
wolfSSL | 0:d92f9d21154c | 10584 | int (*f)(WOLFSSL*, WOLFSSL_SESSION*)) |
wolfSSL | 0:d92f9d21154c | 10585 | { |
wolfSSL | 0:d92f9d21154c | 10586 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10587 | (void)f; |
wolfSSL | 0:d92f9d21154c | 10588 | } |
wolfSSL | 0:d92f9d21154c | 10589 | |
wolfSSL | 0:d92f9d21154c | 10590 | |
wolfSSL | 0:d92f9d21154c | 10591 | void wolfSSL_CTX_sess_set_remove_cb(WOLFSSL_CTX* ctx, void (*f)(WOLFSSL_CTX*, |
wolfSSL | 0:d92f9d21154c | 10592 | WOLFSSL_SESSION*)) |
wolfSSL | 0:d92f9d21154c | 10593 | { |
wolfSSL | 0:d92f9d21154c | 10594 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10595 | (void)f; |
wolfSSL | 0:d92f9d21154c | 10596 | } |
wolfSSL | 0:d92f9d21154c | 10597 | |
wolfSSL | 0:d92f9d21154c | 10598 | |
wolfSSL | 0:d92f9d21154c | 10599 | int wolfSSL_i2d_SSL_SESSION(WOLFSSL_SESSION* sess, unsigned char** p) |
wolfSSL | 0:d92f9d21154c | 10600 | { |
wolfSSL | 0:d92f9d21154c | 10601 | (void)sess; |
wolfSSL | 0:d92f9d21154c | 10602 | (void)p; |
wolfSSL | 0:d92f9d21154c | 10603 | return sizeof(WOLFSSL_SESSION); |
wolfSSL | 0:d92f9d21154c | 10604 | } |
wolfSSL | 0:d92f9d21154c | 10605 | |
wolfSSL | 0:d92f9d21154c | 10606 | |
wolfSSL | 0:d92f9d21154c | 10607 | WOLFSSL_SESSION* wolfSSL_d2i_SSL_SESSION(WOLFSSL_SESSION** sess, |
wolfSSL | 0:d92f9d21154c | 10608 | const unsigned char** p, long i) |
wolfSSL | 0:d92f9d21154c | 10609 | { |
wolfSSL | 0:d92f9d21154c | 10610 | (void)p; |
wolfSSL | 0:d92f9d21154c | 10611 | (void)i; |
wolfSSL | 0:d92f9d21154c | 10612 | if (sess) |
wolfSSL | 0:d92f9d21154c | 10613 | return *sess; |
wolfSSL | 0:d92f9d21154c | 10614 | return NULL; |
wolfSSL | 0:d92f9d21154c | 10615 | } |
wolfSSL | 0:d92f9d21154c | 10616 | |
wolfSSL | 0:d92f9d21154c | 10617 | |
wolfSSL | 0:d92f9d21154c | 10618 | long wolfSSL_SESSION_get_timeout(const WOLFSSL_SESSION* sess) |
wolfSSL | 0:d92f9d21154c | 10619 | { |
wolfSSL | 0:d92f9d21154c | 10620 | WOLFSSL_ENTER("wolfSSL_SESSION_get_timeout"); |
wolfSSL | 0:d92f9d21154c | 10621 | return sess->timeout; |
wolfSSL | 0:d92f9d21154c | 10622 | } |
wolfSSL | 0:d92f9d21154c | 10623 | |
wolfSSL | 0:d92f9d21154c | 10624 | |
wolfSSL | 0:d92f9d21154c | 10625 | long wolfSSL_SESSION_get_time(const WOLFSSL_SESSION* sess) |
wolfSSL | 0:d92f9d21154c | 10626 | { |
wolfSSL | 0:d92f9d21154c | 10627 | WOLFSSL_ENTER("wolfSSL_SESSION_get_time"); |
wolfSSL | 0:d92f9d21154c | 10628 | return sess->bornOn; |
wolfSSL | 0:d92f9d21154c | 10629 | } |
wolfSSL | 0:d92f9d21154c | 10630 | |
wolfSSL | 0:d92f9d21154c | 10631 | |
wolfSSL | 0:d92f9d21154c | 10632 | int wolfSSL_CTX_get_ex_new_index(long idx, void* arg, void* a, void* b, |
wolfSSL | 0:d92f9d21154c | 10633 | void* c) |
wolfSSL | 0:d92f9d21154c | 10634 | { |
wolfSSL | 0:d92f9d21154c | 10635 | (void)idx; |
wolfSSL | 0:d92f9d21154c | 10636 | (void)arg; |
wolfSSL | 0:d92f9d21154c | 10637 | (void)a; |
wolfSSL | 0:d92f9d21154c | 10638 | (void)b; |
wolfSSL | 0:d92f9d21154c | 10639 | (void)c; |
wolfSSL | 0:d92f9d21154c | 10640 | return 0; |
wolfSSL | 0:d92f9d21154c | 10641 | } |
wolfSSL | 0:d92f9d21154c | 10642 | |
wolfSSL | 0:d92f9d21154c | 10643 | #endif /* OPENSSL_EXTRA */ |
wolfSSL | 0:d92f9d21154c | 10644 | |
wolfSSL | 0:d92f9d21154c | 10645 | |
wolfSSL | 0:d92f9d21154c | 10646 | #ifdef KEEP_PEER_CERT |
wolfSSL | 0:d92f9d21154c | 10647 | char* wolfSSL_X509_get_subjectCN(WOLFSSL_X509* x509) |
wolfSSL | 0:d92f9d21154c | 10648 | { |
wolfSSL | 0:d92f9d21154c | 10649 | if (x509 == NULL) |
wolfSSL | 0:d92f9d21154c | 10650 | return NULL; |
wolfSSL | 0:d92f9d21154c | 10651 | |
wolfSSL | 0:d92f9d21154c | 10652 | return x509->subjectCN; |
wolfSSL | 0:d92f9d21154c | 10653 | } |
wolfSSL | 0:d92f9d21154c | 10654 | #endif /* KEEP_PEER_CERT */ |
wolfSSL | 0:d92f9d21154c | 10655 | |
wolfSSL | 0:d92f9d21154c | 10656 | #ifdef OPENSSL_EXTRA |
wolfSSL | 0:d92f9d21154c | 10657 | |
wolfSSL | 0:d92f9d21154c | 10658 | #ifdef FORTRESS |
wolfSSL | 0:d92f9d21154c | 10659 | int wolfSSL_cmp_peer_cert_to_file(WOLFSSL* ssl, const char *fname) |
wolfSSL | 0:d92f9d21154c | 10660 | { |
wolfSSL | 0:d92f9d21154c | 10661 | int ret = SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 10662 | |
wolfSSL | 0:d92f9d21154c | 10663 | WOLFSSL_ENTER("wolfSSL_cmp_peer_cert_to_file"); |
wolfSSL | 0:d92f9d21154c | 10664 | if (ssl != NULL && fname != NULL) |
wolfSSL | 0:d92f9d21154c | 10665 | { |
wolfSSL | 0:d92f9d21154c | 10666 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 10667 | EncryptedInfo* info = NULL; |
wolfSSL | 0:d92f9d21154c | 10668 | byte staticBuffer[1]; /* force heap usage */ |
wolfSSL | 0:d92f9d21154c | 10669 | #else |
wolfSSL | 0:d92f9d21154c | 10670 | EncryptedInfo info[1]; |
wolfSSL | 0:d92f9d21154c | 10671 | byte staticBuffer[FILE_BUFFER_SIZE]; |
wolfSSL | 0:d92f9d21154c | 10672 | #endif |
wolfSSL | 0:d92f9d21154c | 10673 | byte* myBuffer = staticBuffer; |
wolfSSL | 0:d92f9d21154c | 10674 | int dynamic = 0; |
wolfSSL | 0:d92f9d21154c | 10675 | XFILE file = XBADFILE; |
wolfSSL | 0:d92f9d21154c | 10676 | long sz = 0; |
wolfSSL | 0:d92f9d21154c | 10677 | int eccKey = 0; |
wolfSSL | 0:d92f9d21154c | 10678 | WOLFSSL_CTX* ctx = ssl->ctx; |
wolfSSL | 0:d92f9d21154c | 10679 | WOLFSSL_X509* peer_cert = &ssl->peerCert; |
wolfSSL | 0:d92f9d21154c | 10680 | buffer fileDer; |
wolfSSL | 0:d92f9d21154c | 10681 | |
wolfSSL | 0:d92f9d21154c | 10682 | file = XFOPEN(fname, "rb"); |
wolfSSL | 0:d92f9d21154c | 10683 | if (file == XBADFILE) |
wolfSSL | 0:d92f9d21154c | 10684 | return SSL_BAD_FILE; |
wolfSSL | 0:d92f9d21154c | 10685 | |
wolfSSL | 0:d92f9d21154c | 10686 | XFSEEK(file, 0, XSEEK_END); |
wolfSSL | 0:d92f9d21154c | 10687 | sz = XFTELL(file); |
wolfSSL | 0:d92f9d21154c | 10688 | XREWIND(file); |
wolfSSL | 0:d92f9d21154c | 10689 | |
wolfSSL | 0:d92f9d21154c | 10690 | if (sz > (long)sizeof(staticBuffer)) { |
wolfSSL | 0:d92f9d21154c | 10691 | WOLFSSL_MSG("Getting dynamic buffer"); |
wolfSSL | 0:d92f9d21154c | 10692 | myBuffer = (byte*)XMALLOC(sz, ctx->heap, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 10693 | dynamic = 1; |
wolfSSL | 0:d92f9d21154c | 10694 | } |
wolfSSL | 0:d92f9d21154c | 10695 | |
wolfSSL | 0:d92f9d21154c | 10696 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 10697 | info = (EncryptedInfo*)XMALLOC(sizeof(EncryptedInfo), NULL, |
wolfSSL | 0:d92f9d21154c | 10698 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 10699 | if (info == NULL) |
wolfSSL | 0:d92f9d21154c | 10700 | ret = MEMORY_E; |
wolfSSL | 0:d92f9d21154c | 10701 | else |
wolfSSL | 0:d92f9d21154c | 10702 | #endif |
wolfSSL | 0:d92f9d21154c | 10703 | { |
wolfSSL | 0:d92f9d21154c | 10704 | info->set = 0; |
wolfSSL | 0:d92f9d21154c | 10705 | info->ctx = ctx; |
wolfSSL | 0:d92f9d21154c | 10706 | info->consumed = 0; |
wolfSSL | 0:d92f9d21154c | 10707 | fileDer.buffer = 0; |
wolfSSL | 0:d92f9d21154c | 10708 | |
wolfSSL | 0:d92f9d21154c | 10709 | if ((myBuffer != NULL) && |
wolfSSL | 0:d92f9d21154c | 10710 | (sz > 0) && |
wolfSSL | 0:d92f9d21154c | 10711 | (XFREAD(myBuffer, sz, 1, file) > 0) && |
wolfSSL | 0:d92f9d21154c | 10712 | (PemToDer(myBuffer, sz, CERT_TYPE, |
wolfSSL | 0:d92f9d21154c | 10713 | &fileDer, ctx->heap, info, &eccKey) == 0) && |
wolfSSL | 0:d92f9d21154c | 10714 | (fileDer.length != 0) && |
wolfSSL | 0:d92f9d21154c | 10715 | (fileDer.length == peer_cert->derCert.length) && |
wolfSSL | 0:d92f9d21154c | 10716 | (XMEMCMP(peer_cert->derCert.buffer, fileDer.buffer, |
wolfSSL | 0:d92f9d21154c | 10717 | fileDer.length) == 0)) |
wolfSSL | 0:d92f9d21154c | 10718 | { |
wolfSSL | 0:d92f9d21154c | 10719 | ret = 0; |
wolfSSL | 0:d92f9d21154c | 10720 | } |
wolfSSL | 0:d92f9d21154c | 10721 | |
wolfSSL | 0:d92f9d21154c | 10722 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 10723 | XFREE(info, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 10724 | #endif |
wolfSSL | 0:d92f9d21154c | 10725 | } |
wolfSSL | 0:d92f9d21154c | 10726 | |
wolfSSL | 0:d92f9d21154c | 10727 | XFREE(fileDer.buffer, ctx->heap, DYNAMIC_TYPE_CERT); |
wolfSSL | 0:d92f9d21154c | 10728 | if (dynamic) |
wolfSSL | 0:d92f9d21154c | 10729 | XFREE(myBuffer, ctx->heap, DYNAMIC_TYPE_FILE); |
wolfSSL | 0:d92f9d21154c | 10730 | |
wolfSSL | 0:d92f9d21154c | 10731 | XFCLOSE(file); |
wolfSSL | 0:d92f9d21154c | 10732 | } |
wolfSSL | 0:d92f9d21154c | 10733 | |
wolfSSL | 0:d92f9d21154c | 10734 | return ret; |
wolfSSL | 0:d92f9d21154c | 10735 | } |
wolfSSL | 0:d92f9d21154c | 10736 | #endif |
wolfSSL | 0:d92f9d21154c | 10737 | |
wolfSSL | 0:d92f9d21154c | 10738 | |
wolfSSL | 0:d92f9d21154c | 10739 | static RNG globalRNG; |
wolfSSL | 0:d92f9d21154c | 10740 | static int initGlobalRNG = 0; |
wolfSSL | 0:d92f9d21154c | 10741 | |
wolfSSL | 0:d92f9d21154c | 10742 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 10743 | int wolfSSL_RAND_seed(const void* seed, int len) |
wolfSSL | 0:d92f9d21154c | 10744 | { |
wolfSSL | 0:d92f9d21154c | 10745 | |
wolfSSL | 0:d92f9d21154c | 10746 | WOLFSSL_MSG("wolfSSL_RAND_seed"); |
wolfSSL | 0:d92f9d21154c | 10747 | |
wolfSSL | 0:d92f9d21154c | 10748 | (void)seed; |
wolfSSL | 0:d92f9d21154c | 10749 | (void)len; |
wolfSSL | 0:d92f9d21154c | 10750 | |
wolfSSL | 0:d92f9d21154c | 10751 | if (initGlobalRNG == 0) { |
wolfSSL | 0:d92f9d21154c | 10752 | if (wc_InitRng(&globalRNG) < 0) { |
wolfSSL | 0:d92f9d21154c | 10753 | WOLFSSL_MSG("wolfSSL Init Global RNG failed"); |
wolfSSL | 0:d92f9d21154c | 10754 | return 0; |
wolfSSL | 0:d92f9d21154c | 10755 | } |
wolfSSL | 0:d92f9d21154c | 10756 | initGlobalRNG = 1; |
wolfSSL | 0:d92f9d21154c | 10757 | } |
wolfSSL | 0:d92f9d21154c | 10758 | |
wolfSSL | 0:d92f9d21154c | 10759 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 10760 | } |
wolfSSL | 0:d92f9d21154c | 10761 | |
wolfSSL | 0:d92f9d21154c | 10762 | |
wolfSSL | 0:d92f9d21154c | 10763 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 10764 | int wolfSSL_RAND_bytes(unsigned char* buf, int num) |
wolfSSL | 0:d92f9d21154c | 10765 | { |
wolfSSL | 0:d92f9d21154c | 10766 | int ret = 0; |
wolfSSL | 0:d92f9d21154c | 10767 | int initTmpRng = 0; |
wolfSSL | 0:d92f9d21154c | 10768 | RNG* rng = NULL; |
wolfSSL | 0:d92f9d21154c | 10769 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 10770 | RNG* tmpRNG = NULL; |
wolfSSL | 0:d92f9d21154c | 10771 | #else |
wolfSSL | 0:d92f9d21154c | 10772 | RNG tmpRNG[1]; |
wolfSSL | 0:d92f9d21154c | 10773 | #endif |
wolfSSL | 0:d92f9d21154c | 10774 | |
wolfSSL | 0:d92f9d21154c | 10775 | WOLFSSL_ENTER("RAND_bytes"); |
wolfSSL | 0:d92f9d21154c | 10776 | |
wolfSSL | 0:d92f9d21154c | 10777 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 10778 | tmpRNG = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 10779 | if (tmpRNG == NULL) |
wolfSSL | 0:d92f9d21154c | 10780 | return ret; |
wolfSSL | 0:d92f9d21154c | 10781 | #endif |
wolfSSL | 0:d92f9d21154c | 10782 | |
wolfSSL | 0:d92f9d21154c | 10783 | if (wc_InitRng(tmpRNG) == 0) { |
wolfSSL | 0:d92f9d21154c | 10784 | rng = tmpRNG; |
wolfSSL | 0:d92f9d21154c | 10785 | initTmpRng = 1; |
wolfSSL | 0:d92f9d21154c | 10786 | } |
wolfSSL | 0:d92f9d21154c | 10787 | else if (initGlobalRNG) |
wolfSSL | 0:d92f9d21154c | 10788 | rng = &globalRNG; |
wolfSSL | 0:d92f9d21154c | 10789 | |
wolfSSL | 0:d92f9d21154c | 10790 | if (rng) { |
wolfSSL | 0:d92f9d21154c | 10791 | if (wc_RNG_GenerateBlock(rng, buf, num) != 0) |
wolfSSL | 0:d92f9d21154c | 10792 | WOLFSSL_MSG("Bad wc_RNG_GenerateBlock"); |
wolfSSL | 0:d92f9d21154c | 10793 | else |
wolfSSL | 0:d92f9d21154c | 10794 | ret = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 10795 | } |
wolfSSL | 0:d92f9d21154c | 10796 | |
wolfSSL | 0:d92f9d21154c | 10797 | if (initTmpRng) |
wolfSSL | 0:d92f9d21154c | 10798 | wc_FreeRng(tmpRNG); |
wolfSSL | 0:d92f9d21154c | 10799 | |
wolfSSL | 0:d92f9d21154c | 10800 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 10801 | XFREE(tmpRNG, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 10802 | #endif |
wolfSSL | 0:d92f9d21154c | 10803 | |
wolfSSL | 0:d92f9d21154c | 10804 | return ret; |
wolfSSL | 0:d92f9d21154c | 10805 | } |
wolfSSL | 0:d92f9d21154c | 10806 | |
wolfSSL | 0:d92f9d21154c | 10807 | WOLFSSL_BN_CTX* wolfSSL_BN_CTX_new(void) |
wolfSSL | 0:d92f9d21154c | 10808 | { |
wolfSSL | 0:d92f9d21154c | 10809 | static int ctx; /* wolfcrypt doesn't now need ctx */ |
wolfSSL | 0:d92f9d21154c | 10810 | |
wolfSSL | 0:d92f9d21154c | 10811 | WOLFSSL_MSG("wolfSSL_BN_CTX_new"); |
wolfSSL | 0:d92f9d21154c | 10812 | |
wolfSSL | 0:d92f9d21154c | 10813 | return (WOLFSSL_BN_CTX*)&ctx; |
wolfSSL | 0:d92f9d21154c | 10814 | } |
wolfSSL | 0:d92f9d21154c | 10815 | |
wolfSSL | 0:d92f9d21154c | 10816 | void wolfSSL_BN_CTX_init(WOLFSSL_BN_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 10817 | { |
wolfSSL | 0:d92f9d21154c | 10818 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10819 | WOLFSSL_MSG("wolfSSL_BN_CTX_init"); |
wolfSSL | 0:d92f9d21154c | 10820 | } |
wolfSSL | 0:d92f9d21154c | 10821 | |
wolfSSL | 0:d92f9d21154c | 10822 | |
wolfSSL | 0:d92f9d21154c | 10823 | void wolfSSL_BN_CTX_free(WOLFSSL_BN_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 10824 | { |
wolfSSL | 0:d92f9d21154c | 10825 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 10826 | WOLFSSL_MSG("wolfSSL_BN_CTX_free"); |
wolfSSL | 0:d92f9d21154c | 10827 | |
wolfSSL | 0:d92f9d21154c | 10828 | /* do free since static ctx that does nothing */ |
wolfSSL | 0:d92f9d21154c | 10829 | } |
wolfSSL | 0:d92f9d21154c | 10830 | |
wolfSSL | 0:d92f9d21154c | 10831 | |
wolfSSL | 0:d92f9d21154c | 10832 | static void InitwolfSSL_BigNum(WOLFSSL_BIGNUM* bn) |
wolfSSL | 0:d92f9d21154c | 10833 | { |
wolfSSL | 0:d92f9d21154c | 10834 | WOLFSSL_MSG("InitwolfSSL_BigNum"); |
wolfSSL | 0:d92f9d21154c | 10835 | if (bn) { |
wolfSSL | 0:d92f9d21154c | 10836 | bn->neg = 0; |
wolfSSL | 0:d92f9d21154c | 10837 | bn->internal = NULL; |
wolfSSL | 0:d92f9d21154c | 10838 | } |
wolfSSL | 0:d92f9d21154c | 10839 | } |
wolfSSL | 0:d92f9d21154c | 10840 | |
wolfSSL | 0:d92f9d21154c | 10841 | |
wolfSSL | 0:d92f9d21154c | 10842 | WOLFSSL_BIGNUM* wolfSSL_BN_new(void) |
wolfSSL | 0:d92f9d21154c | 10843 | { |
wolfSSL | 0:d92f9d21154c | 10844 | WOLFSSL_BIGNUM* external; |
wolfSSL | 0:d92f9d21154c | 10845 | mp_int* mpi; |
wolfSSL | 0:d92f9d21154c | 10846 | |
wolfSSL | 0:d92f9d21154c | 10847 | WOLFSSL_MSG("wolfSSL_BN_new"); |
wolfSSL | 0:d92f9d21154c | 10848 | |
wolfSSL | 0:d92f9d21154c | 10849 | mpi = (mp_int*) XMALLOC(sizeof(mp_int), NULL, DYNAMIC_TYPE_BIGINT); |
wolfSSL | 0:d92f9d21154c | 10850 | if (mpi == NULL) { |
wolfSSL | 0:d92f9d21154c | 10851 | WOLFSSL_MSG("wolfSSL_BN_new malloc mpi failure"); |
wolfSSL | 0:d92f9d21154c | 10852 | return NULL; |
wolfSSL | 0:d92f9d21154c | 10853 | } |
wolfSSL | 0:d92f9d21154c | 10854 | |
wolfSSL | 0:d92f9d21154c | 10855 | external = (WOLFSSL_BIGNUM*) XMALLOC(sizeof(WOLFSSL_BIGNUM), NULL, |
wolfSSL | 0:d92f9d21154c | 10856 | DYNAMIC_TYPE_BIGINT); |
wolfSSL | 0:d92f9d21154c | 10857 | if (external == NULL) { |
wolfSSL | 0:d92f9d21154c | 10858 | WOLFSSL_MSG("wolfSSL_BN_new malloc WOLFSSL_BIGNUM failure"); |
wolfSSL | 0:d92f9d21154c | 10859 | XFREE(mpi, NULL, DYNAMIC_TYPE_BIGINT); |
wolfSSL | 0:d92f9d21154c | 10860 | return NULL; |
wolfSSL | 0:d92f9d21154c | 10861 | } |
wolfSSL | 0:d92f9d21154c | 10862 | |
wolfSSL | 0:d92f9d21154c | 10863 | InitwolfSSL_BigNum(external); |
wolfSSL | 0:d92f9d21154c | 10864 | external->internal = mpi; |
wolfSSL | 0:d92f9d21154c | 10865 | if (mp_init(mpi) != MP_OKAY) { |
wolfSSL | 0:d92f9d21154c | 10866 | wolfSSL_BN_free(external); |
wolfSSL | 0:d92f9d21154c | 10867 | return NULL; |
wolfSSL | 0:d92f9d21154c | 10868 | } |
wolfSSL | 0:d92f9d21154c | 10869 | |
wolfSSL | 0:d92f9d21154c | 10870 | return external; |
wolfSSL | 0:d92f9d21154c | 10871 | } |
wolfSSL | 0:d92f9d21154c | 10872 | |
wolfSSL | 0:d92f9d21154c | 10873 | |
wolfSSL | 0:d92f9d21154c | 10874 | void wolfSSL_BN_free(WOLFSSL_BIGNUM* bn) |
wolfSSL | 0:d92f9d21154c | 10875 | { |
wolfSSL | 0:d92f9d21154c | 10876 | WOLFSSL_MSG("wolfSSL_BN_free"); |
wolfSSL | 0:d92f9d21154c | 10877 | if (bn) { |
wolfSSL | 0:d92f9d21154c | 10878 | if (bn->internal) { |
wolfSSL | 0:d92f9d21154c | 10879 | mp_clear((mp_int*)bn->internal); |
wolfSSL | 0:d92f9d21154c | 10880 | XFREE(bn->internal, NULL, DYNAMIC_TYPE_BIGINT); |
wolfSSL | 0:d92f9d21154c | 10881 | bn->internal = NULL; |
wolfSSL | 0:d92f9d21154c | 10882 | } |
wolfSSL | 0:d92f9d21154c | 10883 | XFREE(bn, NULL, DYNAMIC_TYPE_BIGINT); |
wolfSSL | 0:d92f9d21154c | 10884 | } |
wolfSSL | 0:d92f9d21154c | 10885 | } |
wolfSSL | 0:d92f9d21154c | 10886 | |
wolfSSL | 0:d92f9d21154c | 10887 | |
wolfSSL | 0:d92f9d21154c | 10888 | void wolfSSL_BN_clear_free(WOLFSSL_BIGNUM* bn) |
wolfSSL | 0:d92f9d21154c | 10889 | { |
wolfSSL | 0:d92f9d21154c | 10890 | WOLFSSL_MSG("wolfSSL_BN_clear_free"); |
wolfSSL | 0:d92f9d21154c | 10891 | |
wolfSSL | 0:d92f9d21154c | 10892 | wolfSSL_BN_free(bn); |
wolfSSL | 0:d92f9d21154c | 10893 | } |
wolfSSL | 0:d92f9d21154c | 10894 | |
wolfSSL | 0:d92f9d21154c | 10895 | |
wolfSSL | 0:d92f9d21154c | 10896 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 10897 | int wolfSSL_BN_sub(WOLFSSL_BIGNUM* r, const WOLFSSL_BIGNUM* a, |
wolfSSL | 0:d92f9d21154c | 10898 | const WOLFSSL_BIGNUM* b) |
wolfSSL | 0:d92f9d21154c | 10899 | { |
wolfSSL | 0:d92f9d21154c | 10900 | WOLFSSL_MSG("wolfSSL_BN_sub"); |
wolfSSL | 0:d92f9d21154c | 10901 | |
wolfSSL | 0:d92f9d21154c | 10902 | if (r == NULL || a == NULL || b == NULL) |
wolfSSL | 0:d92f9d21154c | 10903 | return 0; |
wolfSSL | 0:d92f9d21154c | 10904 | |
wolfSSL | 0:d92f9d21154c | 10905 | if (mp_sub((mp_int*)a->internal,(mp_int*)b->internal, |
wolfSSL | 0:d92f9d21154c | 10906 | (mp_int*)r->internal) == MP_OKAY) |
wolfSSL | 0:d92f9d21154c | 10907 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 10908 | |
wolfSSL | 0:d92f9d21154c | 10909 | WOLFSSL_MSG("wolfSSL_BN_sub mp_sub failed"); |
wolfSSL | 0:d92f9d21154c | 10910 | return 0; |
wolfSSL | 0:d92f9d21154c | 10911 | } |
wolfSSL | 0:d92f9d21154c | 10912 | |
wolfSSL | 0:d92f9d21154c | 10913 | |
wolfSSL | 0:d92f9d21154c | 10914 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 10915 | int wolfSSL_BN_mod(WOLFSSL_BIGNUM* r, const WOLFSSL_BIGNUM* a, |
wolfSSL | 0:d92f9d21154c | 10916 | const WOLFSSL_BIGNUM* b, const WOLFSSL_BN_CTX* c) |
wolfSSL | 0:d92f9d21154c | 10917 | { |
wolfSSL | 0:d92f9d21154c | 10918 | (void)c; |
wolfSSL | 0:d92f9d21154c | 10919 | WOLFSSL_MSG("wolfSSL_BN_mod"); |
wolfSSL | 0:d92f9d21154c | 10920 | |
wolfSSL | 0:d92f9d21154c | 10921 | if (r == NULL || a == NULL || b == NULL) |
wolfSSL | 0:d92f9d21154c | 10922 | return 0; |
wolfSSL | 0:d92f9d21154c | 10923 | |
wolfSSL | 0:d92f9d21154c | 10924 | if (mp_mod((mp_int*)a->internal,(mp_int*)b->internal, |
wolfSSL | 0:d92f9d21154c | 10925 | (mp_int*)r->internal) == MP_OKAY) |
wolfSSL | 0:d92f9d21154c | 10926 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 10927 | |
wolfSSL | 0:d92f9d21154c | 10928 | WOLFSSL_MSG("wolfSSL_BN_mod mp_mod failed"); |
wolfSSL | 0:d92f9d21154c | 10929 | return 0; |
wolfSSL | 0:d92f9d21154c | 10930 | } |
wolfSSL | 0:d92f9d21154c | 10931 | |
wolfSSL | 0:d92f9d21154c | 10932 | |
wolfSSL | 0:d92f9d21154c | 10933 | const WOLFSSL_BIGNUM* wolfSSL_BN_value_one(void) |
wolfSSL | 0:d92f9d21154c | 10934 | { |
wolfSSL | 0:d92f9d21154c | 10935 | static WOLFSSL_BIGNUM* bn_one = NULL; |
wolfSSL | 0:d92f9d21154c | 10936 | |
wolfSSL | 0:d92f9d21154c | 10937 | WOLFSSL_MSG("wolfSSL_BN_value_one"); |
wolfSSL | 0:d92f9d21154c | 10938 | |
wolfSSL | 0:d92f9d21154c | 10939 | if (bn_one == NULL) { |
wolfSSL | 0:d92f9d21154c | 10940 | bn_one = wolfSSL_BN_new(); |
wolfSSL | 0:d92f9d21154c | 10941 | if (bn_one) |
wolfSSL | 0:d92f9d21154c | 10942 | mp_set_int((mp_int*)bn_one->internal, 1); |
wolfSSL | 0:d92f9d21154c | 10943 | } |
wolfSSL | 0:d92f9d21154c | 10944 | |
wolfSSL | 0:d92f9d21154c | 10945 | return bn_one; |
wolfSSL | 0:d92f9d21154c | 10946 | } |
wolfSSL | 0:d92f9d21154c | 10947 | |
wolfSSL | 0:d92f9d21154c | 10948 | |
wolfSSL | 0:d92f9d21154c | 10949 | int wolfSSL_BN_num_bytes(const WOLFSSL_BIGNUM* bn) |
wolfSSL | 0:d92f9d21154c | 10950 | { |
wolfSSL | 0:d92f9d21154c | 10951 | WOLFSSL_MSG("wolfSSL_BN_num_bytes"); |
wolfSSL | 0:d92f9d21154c | 10952 | |
wolfSSL | 0:d92f9d21154c | 10953 | if (bn == NULL || bn->internal == NULL) |
wolfSSL | 0:d92f9d21154c | 10954 | return 0; |
wolfSSL | 0:d92f9d21154c | 10955 | |
wolfSSL | 0:d92f9d21154c | 10956 | return mp_unsigned_bin_size((mp_int*)bn->internal); |
wolfSSL | 0:d92f9d21154c | 10957 | } |
wolfSSL | 0:d92f9d21154c | 10958 | |
wolfSSL | 0:d92f9d21154c | 10959 | |
wolfSSL | 0:d92f9d21154c | 10960 | int wolfSSL_BN_num_bits(const WOLFSSL_BIGNUM* bn) |
wolfSSL | 0:d92f9d21154c | 10961 | { |
wolfSSL | 0:d92f9d21154c | 10962 | WOLFSSL_MSG("wolfSSL_BN_num_bits"); |
wolfSSL | 0:d92f9d21154c | 10963 | |
wolfSSL | 0:d92f9d21154c | 10964 | if (bn == NULL || bn->internal == NULL) |
wolfSSL | 0:d92f9d21154c | 10965 | return 0; |
wolfSSL | 0:d92f9d21154c | 10966 | |
wolfSSL | 0:d92f9d21154c | 10967 | return mp_count_bits((mp_int*)bn->internal); |
wolfSSL | 0:d92f9d21154c | 10968 | } |
wolfSSL | 0:d92f9d21154c | 10969 | |
wolfSSL | 0:d92f9d21154c | 10970 | |
wolfSSL | 0:d92f9d21154c | 10971 | int wolfSSL_BN_is_zero(const WOLFSSL_BIGNUM* bn) |
wolfSSL | 0:d92f9d21154c | 10972 | { |
wolfSSL | 0:d92f9d21154c | 10973 | WOLFSSL_MSG("wolfSSL_BN_is_zero"); |
wolfSSL | 0:d92f9d21154c | 10974 | |
wolfSSL | 0:d92f9d21154c | 10975 | if (bn == NULL || bn->internal == NULL) |
wolfSSL | 0:d92f9d21154c | 10976 | return 0; |
wolfSSL | 0:d92f9d21154c | 10977 | |
wolfSSL | 0:d92f9d21154c | 10978 | return mp_iszero((mp_int*)bn->internal); |
wolfSSL | 0:d92f9d21154c | 10979 | } |
wolfSSL | 0:d92f9d21154c | 10980 | |
wolfSSL | 0:d92f9d21154c | 10981 | |
wolfSSL | 0:d92f9d21154c | 10982 | int wolfSSL_BN_is_one(const WOLFSSL_BIGNUM* bn) |
wolfSSL | 0:d92f9d21154c | 10983 | { |
wolfSSL | 0:d92f9d21154c | 10984 | WOLFSSL_MSG("wolfSSL_BN_is_one"); |
wolfSSL | 0:d92f9d21154c | 10985 | |
wolfSSL | 0:d92f9d21154c | 10986 | if (bn == NULL || bn->internal == NULL) |
wolfSSL | 0:d92f9d21154c | 10987 | return 0; |
wolfSSL | 0:d92f9d21154c | 10988 | |
wolfSSL | 0:d92f9d21154c | 10989 | if (mp_cmp_d((mp_int*)bn->internal, 1) == 0) |
wolfSSL | 0:d92f9d21154c | 10990 | return 1; |
wolfSSL | 0:d92f9d21154c | 10991 | |
wolfSSL | 0:d92f9d21154c | 10992 | return 0; |
wolfSSL | 0:d92f9d21154c | 10993 | } |
wolfSSL | 0:d92f9d21154c | 10994 | |
wolfSSL | 0:d92f9d21154c | 10995 | |
wolfSSL | 0:d92f9d21154c | 10996 | int wolfSSL_BN_is_odd(const WOLFSSL_BIGNUM* bn) |
wolfSSL | 0:d92f9d21154c | 10997 | { |
wolfSSL | 0:d92f9d21154c | 10998 | WOLFSSL_MSG("wolfSSL_BN_is_odd"); |
wolfSSL | 0:d92f9d21154c | 10999 | |
wolfSSL | 0:d92f9d21154c | 11000 | if (bn == NULL || bn->internal == NULL) |
wolfSSL | 0:d92f9d21154c | 11001 | return 0; |
wolfSSL | 0:d92f9d21154c | 11002 | |
wolfSSL | 0:d92f9d21154c | 11003 | return mp_isodd((mp_int*)bn->internal); |
wolfSSL | 0:d92f9d21154c | 11004 | } |
wolfSSL | 0:d92f9d21154c | 11005 | |
wolfSSL | 0:d92f9d21154c | 11006 | |
wolfSSL | 0:d92f9d21154c | 11007 | int wolfSSL_BN_cmp(const WOLFSSL_BIGNUM* a, const WOLFSSL_BIGNUM* b) |
wolfSSL | 0:d92f9d21154c | 11008 | { |
wolfSSL | 0:d92f9d21154c | 11009 | WOLFSSL_MSG("wolfSSL_BN_cmp"); |
wolfSSL | 0:d92f9d21154c | 11010 | |
wolfSSL | 0:d92f9d21154c | 11011 | if (a == NULL || a->internal == NULL || b == NULL || b->internal ==NULL) |
wolfSSL | 0:d92f9d21154c | 11012 | return 0; |
wolfSSL | 0:d92f9d21154c | 11013 | |
wolfSSL | 0:d92f9d21154c | 11014 | return mp_cmp((mp_int*)a->internal, (mp_int*)b->internal); |
wolfSSL | 0:d92f9d21154c | 11015 | } |
wolfSSL | 0:d92f9d21154c | 11016 | |
wolfSSL | 0:d92f9d21154c | 11017 | |
wolfSSL | 0:d92f9d21154c | 11018 | int wolfSSL_BN_bn2bin(const WOLFSSL_BIGNUM* bn, unsigned char* r) |
wolfSSL | 0:d92f9d21154c | 11019 | { |
wolfSSL | 0:d92f9d21154c | 11020 | WOLFSSL_MSG("wolfSSL_BN_bn2bin"); |
wolfSSL | 0:d92f9d21154c | 11021 | |
wolfSSL | 0:d92f9d21154c | 11022 | if (bn == NULL || bn->internal == NULL) { |
wolfSSL | 0:d92f9d21154c | 11023 | WOLFSSL_MSG("NULL bn error"); |
wolfSSL | 0:d92f9d21154c | 11024 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11025 | } |
wolfSSL | 0:d92f9d21154c | 11026 | |
wolfSSL | 0:d92f9d21154c | 11027 | if (r == NULL) |
wolfSSL | 0:d92f9d21154c | 11028 | return mp_unsigned_bin_size((mp_int*)bn->internal); |
wolfSSL | 0:d92f9d21154c | 11029 | |
wolfSSL | 0:d92f9d21154c | 11030 | if (mp_to_unsigned_bin((mp_int*)bn->internal, r) != MP_OKAY) { |
wolfSSL | 0:d92f9d21154c | 11031 | WOLFSSL_MSG("mp_to_unsigned_bin error"); |
wolfSSL | 0:d92f9d21154c | 11032 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11033 | } |
wolfSSL | 0:d92f9d21154c | 11034 | |
wolfSSL | 0:d92f9d21154c | 11035 | return mp_unsigned_bin_size((mp_int*)bn->internal); |
wolfSSL | 0:d92f9d21154c | 11036 | } |
wolfSSL | 0:d92f9d21154c | 11037 | |
wolfSSL | 0:d92f9d21154c | 11038 | |
wolfSSL | 0:d92f9d21154c | 11039 | WOLFSSL_BIGNUM* wolfSSL_BN_bin2bn(const unsigned char* str, int len, |
wolfSSL | 0:d92f9d21154c | 11040 | WOLFSSL_BIGNUM* ret) |
wolfSSL | 0:d92f9d21154c | 11041 | { |
wolfSSL | 0:d92f9d21154c | 11042 | WOLFSSL_MSG("wolfSSL_BN_bin2bn"); |
wolfSSL | 0:d92f9d21154c | 11043 | |
wolfSSL | 0:d92f9d21154c | 11044 | if (ret && ret->internal) { |
wolfSSL | 0:d92f9d21154c | 11045 | if (mp_read_unsigned_bin((mp_int*)ret->internal, str, len) != 0) { |
wolfSSL | 0:d92f9d21154c | 11046 | WOLFSSL_MSG("mp_read_unsigned_bin failure"); |
wolfSSL | 0:d92f9d21154c | 11047 | return NULL; |
wolfSSL | 0:d92f9d21154c | 11048 | } |
wolfSSL | 0:d92f9d21154c | 11049 | } |
wolfSSL | 0:d92f9d21154c | 11050 | else { |
wolfSSL | 0:d92f9d21154c | 11051 | WOLFSSL_MSG("wolfSSL_BN_bin2bn wants return bignum"); |
wolfSSL | 0:d92f9d21154c | 11052 | } |
wolfSSL | 0:d92f9d21154c | 11053 | |
wolfSSL | 0:d92f9d21154c | 11054 | return ret; |
wolfSSL | 0:d92f9d21154c | 11055 | } |
wolfSSL | 0:d92f9d21154c | 11056 | |
wolfSSL | 0:d92f9d21154c | 11057 | |
wolfSSL | 0:d92f9d21154c | 11058 | int wolfSSL_mask_bits(WOLFSSL_BIGNUM* bn, int n) |
wolfSSL | 0:d92f9d21154c | 11059 | { |
wolfSSL | 0:d92f9d21154c | 11060 | (void)bn; |
wolfSSL | 0:d92f9d21154c | 11061 | (void)n; |
wolfSSL | 0:d92f9d21154c | 11062 | WOLFSSL_MSG("wolfSSL_BN_mask_bits"); |
wolfSSL | 0:d92f9d21154c | 11063 | |
wolfSSL | 0:d92f9d21154c | 11064 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11065 | } |
wolfSSL | 0:d92f9d21154c | 11066 | |
wolfSSL | 0:d92f9d21154c | 11067 | |
wolfSSL | 0:d92f9d21154c | 11068 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 11069 | int wolfSSL_BN_rand(WOLFSSL_BIGNUM* bn, int bits, int top, int bottom) |
wolfSSL | 0:d92f9d21154c | 11070 | { |
wolfSSL | 0:d92f9d21154c | 11071 | int ret = 0; |
wolfSSL | 0:d92f9d21154c | 11072 | int len = bits / 8; |
wolfSSL | 0:d92f9d21154c | 11073 | int initTmpRng = 0; |
wolfSSL | 0:d92f9d21154c | 11074 | RNG* rng = NULL; |
wolfSSL | 0:d92f9d21154c | 11075 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11076 | RNG* tmpRNG = NULL; |
wolfSSL | 0:d92f9d21154c | 11077 | byte* buff = NULL; |
wolfSSL | 0:d92f9d21154c | 11078 | #else |
wolfSSL | 0:d92f9d21154c | 11079 | RNG tmpRNG[1]; |
wolfSSL | 0:d92f9d21154c | 11080 | byte buff[1024]; |
wolfSSL | 0:d92f9d21154c | 11081 | #endif |
wolfSSL | 0:d92f9d21154c | 11082 | |
wolfSSL | 0:d92f9d21154c | 11083 | (void)top; |
wolfSSL | 0:d92f9d21154c | 11084 | (void)bottom; |
wolfSSL | 0:d92f9d21154c | 11085 | WOLFSSL_MSG("wolfSSL_BN_rand"); |
wolfSSL | 0:d92f9d21154c | 11086 | |
wolfSSL | 0:d92f9d21154c | 11087 | if (bits % 8) |
wolfSSL | 0:d92f9d21154c | 11088 | len++; |
wolfSSL | 0:d92f9d21154c | 11089 | |
wolfSSL | 0:d92f9d21154c | 11090 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11091 | buff = (byte*)XMALLOC(1024, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11092 | tmpRNG = (RNG*) XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11093 | if (buff == NULL || tmpRNG == NULL) { |
wolfSSL | 0:d92f9d21154c | 11094 | XFREE(buff, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11095 | XFREE(tmpRNG, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11096 | return ret; |
wolfSSL | 0:d92f9d21154c | 11097 | } |
wolfSSL | 0:d92f9d21154c | 11098 | #endif |
wolfSSL | 0:d92f9d21154c | 11099 | |
wolfSSL | 0:d92f9d21154c | 11100 | if (bn == NULL || bn->internal == NULL) |
wolfSSL | 0:d92f9d21154c | 11101 | WOLFSSL_MSG("Bad function arguments"); |
wolfSSL | 0:d92f9d21154c | 11102 | else if (wc_InitRng(tmpRNG) == 0) { |
wolfSSL | 0:d92f9d21154c | 11103 | rng = tmpRNG; |
wolfSSL | 0:d92f9d21154c | 11104 | initTmpRng = 1; |
wolfSSL | 0:d92f9d21154c | 11105 | } |
wolfSSL | 0:d92f9d21154c | 11106 | else if (initGlobalRNG) |
wolfSSL | 0:d92f9d21154c | 11107 | rng = &globalRNG; |
wolfSSL | 0:d92f9d21154c | 11108 | |
wolfSSL | 0:d92f9d21154c | 11109 | if (rng) { |
wolfSSL | 0:d92f9d21154c | 11110 | if (wc_RNG_GenerateBlock(rng, buff, len) != 0) |
wolfSSL | 0:d92f9d21154c | 11111 | WOLFSSL_MSG("Bad wc_RNG_GenerateBlock"); |
wolfSSL | 0:d92f9d21154c | 11112 | else { |
wolfSSL | 0:d92f9d21154c | 11113 | buff[0] |= 0x80 | 0x40; |
wolfSSL | 0:d92f9d21154c | 11114 | buff[len-1] |= 0x01; |
wolfSSL | 0:d92f9d21154c | 11115 | |
wolfSSL | 0:d92f9d21154c | 11116 | if (mp_read_unsigned_bin((mp_int*)bn->internal,buff,len) != MP_OKAY) |
wolfSSL | 0:d92f9d21154c | 11117 | WOLFSSL_MSG("mp read bin failed"); |
wolfSSL | 0:d92f9d21154c | 11118 | else |
wolfSSL | 0:d92f9d21154c | 11119 | ret = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 11120 | } |
wolfSSL | 0:d92f9d21154c | 11121 | } |
wolfSSL | 0:d92f9d21154c | 11122 | |
wolfSSL | 0:d92f9d21154c | 11123 | if (initTmpRng) |
wolfSSL | 0:d92f9d21154c | 11124 | wc_FreeRng(tmpRNG); |
wolfSSL | 0:d92f9d21154c | 11125 | |
wolfSSL | 0:d92f9d21154c | 11126 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11127 | XFREE(buff, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11128 | XFREE(tmpRNG, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11129 | #endif |
wolfSSL | 0:d92f9d21154c | 11130 | |
wolfSSL | 0:d92f9d21154c | 11131 | return ret; |
wolfSSL | 0:d92f9d21154c | 11132 | } |
wolfSSL | 0:d92f9d21154c | 11133 | |
wolfSSL | 0:d92f9d21154c | 11134 | |
wolfSSL | 0:d92f9d21154c | 11135 | int wolfSSL_BN_is_bit_set(const WOLFSSL_BIGNUM* bn, int n) |
wolfSSL | 0:d92f9d21154c | 11136 | { |
wolfSSL | 0:d92f9d21154c | 11137 | (void)bn; |
wolfSSL | 0:d92f9d21154c | 11138 | (void)n; |
wolfSSL | 0:d92f9d21154c | 11139 | |
wolfSSL | 0:d92f9d21154c | 11140 | WOLFSSL_MSG("wolfSSL_BN_is_bit_set"); |
wolfSSL | 0:d92f9d21154c | 11141 | |
wolfSSL | 0:d92f9d21154c | 11142 | return 0; |
wolfSSL | 0:d92f9d21154c | 11143 | } |
wolfSSL | 0:d92f9d21154c | 11144 | |
wolfSSL | 0:d92f9d21154c | 11145 | |
wolfSSL | 0:d92f9d21154c | 11146 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 11147 | int wolfSSL_BN_hex2bn(WOLFSSL_BIGNUM** bn, const char* str) |
wolfSSL | 0:d92f9d21154c | 11148 | { |
wolfSSL | 0:d92f9d21154c | 11149 | int ret = 0; |
wolfSSL | 0:d92f9d21154c | 11150 | word32 decSz = 1024; |
wolfSSL | 0:d92f9d21154c | 11151 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11152 | byte* decoded = NULL; |
wolfSSL | 0:d92f9d21154c | 11153 | #else |
wolfSSL | 0:d92f9d21154c | 11154 | byte decoded[1024]; |
wolfSSL | 0:d92f9d21154c | 11155 | #endif |
wolfSSL | 0:d92f9d21154c | 11156 | |
wolfSSL | 0:d92f9d21154c | 11157 | WOLFSSL_MSG("wolfSSL_BN_hex2bn"); |
wolfSSL | 0:d92f9d21154c | 11158 | |
wolfSSL | 0:d92f9d21154c | 11159 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11160 | decoded = (byte*)XMALLOC(decSz, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11161 | if (decoded == NULL) |
wolfSSL | 0:d92f9d21154c | 11162 | return ret; |
wolfSSL | 0:d92f9d21154c | 11163 | #endif |
wolfSSL | 0:d92f9d21154c | 11164 | |
wolfSSL | 0:d92f9d21154c | 11165 | if (str == NULL) |
wolfSSL | 0:d92f9d21154c | 11166 | WOLFSSL_MSG("Bad function argument"); |
wolfSSL | 0:d92f9d21154c | 11167 | else if (Base16_Decode((byte*)str, (int)XSTRLEN(str), decoded, &decSz) < 0) |
wolfSSL | 0:d92f9d21154c | 11168 | WOLFSSL_MSG("Bad Base16_Decode error"); |
wolfSSL | 0:d92f9d21154c | 11169 | else if (bn == NULL) |
wolfSSL | 0:d92f9d21154c | 11170 | ret = decSz; |
wolfSSL | 0:d92f9d21154c | 11171 | else { |
wolfSSL | 0:d92f9d21154c | 11172 | if (*bn == NULL) |
wolfSSL | 0:d92f9d21154c | 11173 | *bn = wolfSSL_BN_new(); |
wolfSSL | 0:d92f9d21154c | 11174 | |
wolfSSL | 0:d92f9d21154c | 11175 | if (*bn == NULL) |
wolfSSL | 0:d92f9d21154c | 11176 | WOLFSSL_MSG("BN new failed"); |
wolfSSL | 0:d92f9d21154c | 11177 | else if (wolfSSL_BN_bin2bn(decoded, decSz, *bn) == NULL) |
wolfSSL | 0:d92f9d21154c | 11178 | WOLFSSL_MSG("Bad bin2bn error"); |
wolfSSL | 0:d92f9d21154c | 11179 | else |
wolfSSL | 0:d92f9d21154c | 11180 | ret = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 11181 | } |
wolfSSL | 0:d92f9d21154c | 11182 | |
wolfSSL | 0:d92f9d21154c | 11183 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11184 | XFREE(decoded, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11185 | #endif |
wolfSSL | 0:d92f9d21154c | 11186 | |
wolfSSL | 0:d92f9d21154c | 11187 | return ret; |
wolfSSL | 0:d92f9d21154c | 11188 | } |
wolfSSL | 0:d92f9d21154c | 11189 | |
wolfSSL | 0:d92f9d21154c | 11190 | |
wolfSSL | 0:d92f9d21154c | 11191 | WOLFSSL_BIGNUM* wolfSSL_BN_dup(const WOLFSSL_BIGNUM* bn) |
wolfSSL | 0:d92f9d21154c | 11192 | { |
wolfSSL | 0:d92f9d21154c | 11193 | WOLFSSL_BIGNUM* ret; |
wolfSSL | 0:d92f9d21154c | 11194 | |
wolfSSL | 0:d92f9d21154c | 11195 | WOLFSSL_MSG("wolfSSL_BN_dup"); |
wolfSSL | 0:d92f9d21154c | 11196 | |
wolfSSL | 0:d92f9d21154c | 11197 | if (bn == NULL || bn->internal == NULL) { |
wolfSSL | 0:d92f9d21154c | 11198 | WOLFSSL_MSG("bn NULL error"); |
wolfSSL | 0:d92f9d21154c | 11199 | return NULL; |
wolfSSL | 0:d92f9d21154c | 11200 | } |
wolfSSL | 0:d92f9d21154c | 11201 | |
wolfSSL | 0:d92f9d21154c | 11202 | ret = wolfSSL_BN_new(); |
wolfSSL | 0:d92f9d21154c | 11203 | if (ret == NULL) { |
wolfSSL | 0:d92f9d21154c | 11204 | WOLFSSL_MSG("bn new error"); |
wolfSSL | 0:d92f9d21154c | 11205 | return NULL; |
wolfSSL | 0:d92f9d21154c | 11206 | } |
wolfSSL | 0:d92f9d21154c | 11207 | |
wolfSSL | 0:d92f9d21154c | 11208 | if (mp_copy((mp_int*)bn->internal, (mp_int*)ret->internal) != MP_OKAY) { |
wolfSSL | 0:d92f9d21154c | 11209 | WOLFSSL_MSG("mp_copy error"); |
wolfSSL | 0:d92f9d21154c | 11210 | wolfSSL_BN_free(ret); |
wolfSSL | 0:d92f9d21154c | 11211 | return NULL; |
wolfSSL | 0:d92f9d21154c | 11212 | } |
wolfSSL | 0:d92f9d21154c | 11213 | |
wolfSSL | 0:d92f9d21154c | 11214 | return ret; |
wolfSSL | 0:d92f9d21154c | 11215 | } |
wolfSSL | 0:d92f9d21154c | 11216 | |
wolfSSL | 0:d92f9d21154c | 11217 | |
wolfSSL | 0:d92f9d21154c | 11218 | WOLFSSL_BIGNUM* wolfSSL_BN_copy(WOLFSSL_BIGNUM* r, const WOLFSSL_BIGNUM* bn) |
wolfSSL | 0:d92f9d21154c | 11219 | { |
wolfSSL | 0:d92f9d21154c | 11220 | (void)r; |
wolfSSL | 0:d92f9d21154c | 11221 | (void)bn; |
wolfSSL | 0:d92f9d21154c | 11222 | |
wolfSSL | 0:d92f9d21154c | 11223 | WOLFSSL_MSG("wolfSSL_BN_copy"); |
wolfSSL | 0:d92f9d21154c | 11224 | |
wolfSSL | 0:d92f9d21154c | 11225 | return NULL; |
wolfSSL | 0:d92f9d21154c | 11226 | } |
wolfSSL | 0:d92f9d21154c | 11227 | |
wolfSSL | 0:d92f9d21154c | 11228 | |
wolfSSL | 0:d92f9d21154c | 11229 | int wolfSSL_BN_set_word(WOLFSSL_BIGNUM* bn, unsigned long w) |
wolfSSL | 0:d92f9d21154c | 11230 | { |
wolfSSL | 0:d92f9d21154c | 11231 | (void)bn; |
wolfSSL | 0:d92f9d21154c | 11232 | (void)w; |
wolfSSL | 0:d92f9d21154c | 11233 | |
wolfSSL | 0:d92f9d21154c | 11234 | WOLFSSL_MSG("wolfSSL_BN_set_word"); |
wolfSSL | 0:d92f9d21154c | 11235 | |
wolfSSL | 0:d92f9d21154c | 11236 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11237 | } |
wolfSSL | 0:d92f9d21154c | 11238 | |
wolfSSL | 0:d92f9d21154c | 11239 | |
wolfSSL | 0:d92f9d21154c | 11240 | int wolfSSL_BN_dec2bn(WOLFSSL_BIGNUM** bn, const char* str) |
wolfSSL | 0:d92f9d21154c | 11241 | { |
wolfSSL | 0:d92f9d21154c | 11242 | (void)bn; |
wolfSSL | 0:d92f9d21154c | 11243 | (void)str; |
wolfSSL | 0:d92f9d21154c | 11244 | |
wolfSSL | 0:d92f9d21154c | 11245 | WOLFSSL_MSG("wolfSSL_BN_dec2bn"); |
wolfSSL | 0:d92f9d21154c | 11246 | |
wolfSSL | 0:d92f9d21154c | 11247 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11248 | } |
wolfSSL | 0:d92f9d21154c | 11249 | |
wolfSSL | 0:d92f9d21154c | 11250 | |
wolfSSL | 0:d92f9d21154c | 11251 | char* wolfSSL_BN_bn2dec(const WOLFSSL_BIGNUM* bn) |
wolfSSL | 0:d92f9d21154c | 11252 | { |
wolfSSL | 0:d92f9d21154c | 11253 | (void)bn; |
wolfSSL | 0:d92f9d21154c | 11254 | |
wolfSSL | 0:d92f9d21154c | 11255 | WOLFSSL_MSG("wolfSSL_BN_bn2dec"); |
wolfSSL | 0:d92f9d21154c | 11256 | |
wolfSSL | 0:d92f9d21154c | 11257 | return NULL; |
wolfSSL | 0:d92f9d21154c | 11258 | } |
wolfSSL | 0:d92f9d21154c | 11259 | |
wolfSSL | 0:d92f9d21154c | 11260 | |
wolfSSL | 0:d92f9d21154c | 11261 | #ifndef NO_DH |
wolfSSL | 0:d92f9d21154c | 11262 | |
wolfSSL | 0:d92f9d21154c | 11263 | static void InitwolfSSL_DH(WOLFSSL_DH* dh) |
wolfSSL | 0:d92f9d21154c | 11264 | { |
wolfSSL | 0:d92f9d21154c | 11265 | if (dh) { |
wolfSSL | 0:d92f9d21154c | 11266 | dh->p = NULL; |
wolfSSL | 0:d92f9d21154c | 11267 | dh->g = NULL; |
wolfSSL | 0:d92f9d21154c | 11268 | dh->pub_key = NULL; |
wolfSSL | 0:d92f9d21154c | 11269 | dh->priv_key = NULL; |
wolfSSL | 0:d92f9d21154c | 11270 | dh->internal = NULL; |
wolfSSL | 0:d92f9d21154c | 11271 | dh->inSet = 0; |
wolfSSL | 0:d92f9d21154c | 11272 | dh->exSet = 0; |
wolfSSL | 0:d92f9d21154c | 11273 | } |
wolfSSL | 0:d92f9d21154c | 11274 | } |
wolfSSL | 0:d92f9d21154c | 11275 | |
wolfSSL | 0:d92f9d21154c | 11276 | |
wolfSSL | 0:d92f9d21154c | 11277 | WOLFSSL_DH* wolfSSL_DH_new(void) |
wolfSSL | 0:d92f9d21154c | 11278 | { |
wolfSSL | 0:d92f9d21154c | 11279 | WOLFSSL_DH* external; |
wolfSSL | 0:d92f9d21154c | 11280 | DhKey* key; |
wolfSSL | 0:d92f9d21154c | 11281 | |
wolfSSL | 0:d92f9d21154c | 11282 | WOLFSSL_MSG("wolfSSL_DH_new"); |
wolfSSL | 0:d92f9d21154c | 11283 | |
wolfSSL | 0:d92f9d21154c | 11284 | key = (DhKey*) XMALLOC(sizeof(DhKey), NULL, DYNAMIC_TYPE_DH); |
wolfSSL | 0:d92f9d21154c | 11285 | if (key == NULL) { |
wolfSSL | 0:d92f9d21154c | 11286 | WOLFSSL_MSG("wolfSSL_DH_new malloc DhKey failure"); |
wolfSSL | 0:d92f9d21154c | 11287 | return NULL; |
wolfSSL | 0:d92f9d21154c | 11288 | } |
wolfSSL | 0:d92f9d21154c | 11289 | |
wolfSSL | 0:d92f9d21154c | 11290 | external = (WOLFSSL_DH*) XMALLOC(sizeof(WOLFSSL_DH), NULL, |
wolfSSL | 0:d92f9d21154c | 11291 | DYNAMIC_TYPE_DH); |
wolfSSL | 0:d92f9d21154c | 11292 | if (external == NULL) { |
wolfSSL | 0:d92f9d21154c | 11293 | WOLFSSL_MSG("wolfSSL_DH_new malloc WOLFSSL_DH failure"); |
wolfSSL | 0:d92f9d21154c | 11294 | XFREE(key, NULL, DYNAMIC_TYPE_DH); |
wolfSSL | 0:d92f9d21154c | 11295 | return NULL; |
wolfSSL | 0:d92f9d21154c | 11296 | } |
wolfSSL | 0:d92f9d21154c | 11297 | |
wolfSSL | 0:d92f9d21154c | 11298 | InitwolfSSL_DH(external); |
wolfSSL | 0:d92f9d21154c | 11299 | wc_InitDhKey(key); |
wolfSSL | 0:d92f9d21154c | 11300 | external->internal = key; |
wolfSSL | 0:d92f9d21154c | 11301 | |
wolfSSL | 0:d92f9d21154c | 11302 | return external; |
wolfSSL | 0:d92f9d21154c | 11303 | } |
wolfSSL | 0:d92f9d21154c | 11304 | |
wolfSSL | 0:d92f9d21154c | 11305 | |
wolfSSL | 0:d92f9d21154c | 11306 | void wolfSSL_DH_free(WOLFSSL_DH* dh) |
wolfSSL | 0:d92f9d21154c | 11307 | { |
wolfSSL | 0:d92f9d21154c | 11308 | WOLFSSL_MSG("wolfSSL_DH_free"); |
wolfSSL | 0:d92f9d21154c | 11309 | |
wolfSSL | 0:d92f9d21154c | 11310 | if (dh) { |
wolfSSL | 0:d92f9d21154c | 11311 | if (dh->internal) { |
wolfSSL | 0:d92f9d21154c | 11312 | wc_FreeDhKey((DhKey*)dh->internal); |
wolfSSL | 0:d92f9d21154c | 11313 | XFREE(dh->internal, NULL, DYNAMIC_TYPE_DH); |
wolfSSL | 0:d92f9d21154c | 11314 | dh->internal = NULL; |
wolfSSL | 0:d92f9d21154c | 11315 | } |
wolfSSL | 0:d92f9d21154c | 11316 | wolfSSL_BN_free(dh->priv_key); |
wolfSSL | 0:d92f9d21154c | 11317 | wolfSSL_BN_free(dh->pub_key); |
wolfSSL | 0:d92f9d21154c | 11318 | wolfSSL_BN_free(dh->g); |
wolfSSL | 0:d92f9d21154c | 11319 | wolfSSL_BN_free(dh->p); |
wolfSSL | 0:d92f9d21154c | 11320 | InitwolfSSL_DH(dh); /* set back to NULLs for safety */ |
wolfSSL | 0:d92f9d21154c | 11321 | |
wolfSSL | 0:d92f9d21154c | 11322 | XFREE(dh, NULL, DYNAMIC_TYPE_DH); |
wolfSSL | 0:d92f9d21154c | 11323 | } |
wolfSSL | 0:d92f9d21154c | 11324 | } |
wolfSSL | 0:d92f9d21154c | 11325 | |
wolfSSL | 0:d92f9d21154c | 11326 | |
wolfSSL | 0:d92f9d21154c | 11327 | static int SetDhInternal(WOLFSSL_DH* dh) |
wolfSSL | 0:d92f9d21154c | 11328 | { |
wolfSSL | 0:d92f9d21154c | 11329 | int ret = SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11330 | int pSz = 1024; |
wolfSSL | 0:d92f9d21154c | 11331 | int gSz = 1024; |
wolfSSL | 0:d92f9d21154c | 11332 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11333 | unsigned char* p = NULL; |
wolfSSL | 0:d92f9d21154c | 11334 | unsigned char* g = NULL; |
wolfSSL | 0:d92f9d21154c | 11335 | #else |
wolfSSL | 0:d92f9d21154c | 11336 | unsigned char p[1024]; |
wolfSSL | 0:d92f9d21154c | 11337 | unsigned char g[1024]; |
wolfSSL | 0:d92f9d21154c | 11338 | #endif |
wolfSSL | 0:d92f9d21154c | 11339 | |
wolfSSL | 0:d92f9d21154c | 11340 | WOLFSSL_ENTER("SetDhInternal"); |
wolfSSL | 0:d92f9d21154c | 11341 | |
wolfSSL | 0:d92f9d21154c | 11342 | if (dh == NULL || dh->p == NULL || dh->g == NULL) |
wolfSSL | 0:d92f9d21154c | 11343 | WOLFSSL_MSG("Bad function arguments"); |
wolfSSL | 0:d92f9d21154c | 11344 | else if (wolfSSL_BN_bn2bin(dh->p, NULL) > pSz) |
wolfSSL | 0:d92f9d21154c | 11345 | WOLFSSL_MSG("Bad p internal size"); |
wolfSSL | 0:d92f9d21154c | 11346 | else if (wolfSSL_BN_bn2bin(dh->g, NULL) > gSz) |
wolfSSL | 0:d92f9d21154c | 11347 | WOLFSSL_MSG("Bad g internal size"); |
wolfSSL | 0:d92f9d21154c | 11348 | else { |
wolfSSL | 0:d92f9d21154c | 11349 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11350 | p = (unsigned char*)XMALLOC(pSz, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11351 | g = (unsigned char*)XMALLOC(gSz, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11352 | |
wolfSSL | 0:d92f9d21154c | 11353 | if (p == NULL || g == NULL) { |
wolfSSL | 0:d92f9d21154c | 11354 | XFREE(p, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11355 | XFREE(g, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11356 | return ret; |
wolfSSL | 0:d92f9d21154c | 11357 | } |
wolfSSL | 0:d92f9d21154c | 11358 | #endif |
wolfSSL | 0:d92f9d21154c | 11359 | |
wolfSSL | 0:d92f9d21154c | 11360 | pSz = wolfSSL_BN_bn2bin(dh->p, p); |
wolfSSL | 0:d92f9d21154c | 11361 | gSz = wolfSSL_BN_bn2bin(dh->g, g); |
wolfSSL | 0:d92f9d21154c | 11362 | |
wolfSSL | 0:d92f9d21154c | 11363 | if (pSz <= 0 || gSz <= 0) |
wolfSSL | 0:d92f9d21154c | 11364 | WOLFSSL_MSG("Bad BN2bin set"); |
wolfSSL | 0:d92f9d21154c | 11365 | else if (wc_DhSetKey((DhKey*)dh->internal, p, pSz, g, gSz) < 0) |
wolfSSL | 0:d92f9d21154c | 11366 | WOLFSSL_MSG("Bad DH SetKey"); |
wolfSSL | 0:d92f9d21154c | 11367 | else { |
wolfSSL | 0:d92f9d21154c | 11368 | dh->inSet = 1; |
wolfSSL | 0:d92f9d21154c | 11369 | ret = 0; |
wolfSSL | 0:d92f9d21154c | 11370 | } |
wolfSSL | 0:d92f9d21154c | 11371 | |
wolfSSL | 0:d92f9d21154c | 11372 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11373 | XFREE(p, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11374 | XFREE(g, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11375 | #endif |
wolfSSL | 0:d92f9d21154c | 11376 | } |
wolfSSL | 0:d92f9d21154c | 11377 | |
wolfSSL | 0:d92f9d21154c | 11378 | |
wolfSSL | 0:d92f9d21154c | 11379 | return ret; |
wolfSSL | 0:d92f9d21154c | 11380 | } |
wolfSSL | 0:d92f9d21154c | 11381 | |
wolfSSL | 0:d92f9d21154c | 11382 | |
wolfSSL | 0:d92f9d21154c | 11383 | int wolfSSL_DH_size(WOLFSSL_DH* dh) |
wolfSSL | 0:d92f9d21154c | 11384 | { |
wolfSSL | 0:d92f9d21154c | 11385 | WOLFSSL_MSG("wolfSSL_DH_size"); |
wolfSSL | 0:d92f9d21154c | 11386 | |
wolfSSL | 0:d92f9d21154c | 11387 | if (dh == NULL) |
wolfSSL | 0:d92f9d21154c | 11388 | return 0; |
wolfSSL | 0:d92f9d21154c | 11389 | |
wolfSSL | 0:d92f9d21154c | 11390 | return wolfSSL_BN_num_bytes(dh->p); |
wolfSSL | 0:d92f9d21154c | 11391 | } |
wolfSSL | 0:d92f9d21154c | 11392 | |
wolfSSL | 0:d92f9d21154c | 11393 | |
wolfSSL | 0:d92f9d21154c | 11394 | /* return SSL_SUCCESS on ok, else 0 */ |
wolfSSL | 0:d92f9d21154c | 11395 | int wolfSSL_DH_generate_key(WOLFSSL_DH* dh) |
wolfSSL | 0:d92f9d21154c | 11396 | { |
wolfSSL | 0:d92f9d21154c | 11397 | int ret = 0; |
wolfSSL | 0:d92f9d21154c | 11398 | word32 pubSz = 768; |
wolfSSL | 0:d92f9d21154c | 11399 | word32 privSz = 768; |
wolfSSL | 0:d92f9d21154c | 11400 | int initTmpRng = 0; |
wolfSSL | 0:d92f9d21154c | 11401 | RNG* rng = NULL; |
wolfSSL | 0:d92f9d21154c | 11402 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11403 | unsigned char* pub = NULL; |
wolfSSL | 0:d92f9d21154c | 11404 | unsigned char* priv = NULL; |
wolfSSL | 0:d92f9d21154c | 11405 | RNG* tmpRNG = NULL; |
wolfSSL | 0:d92f9d21154c | 11406 | #else |
wolfSSL | 0:d92f9d21154c | 11407 | unsigned char pub [768]; |
wolfSSL | 0:d92f9d21154c | 11408 | unsigned char priv[768]; |
wolfSSL | 0:d92f9d21154c | 11409 | RNG tmpRNG[1]; |
wolfSSL | 0:d92f9d21154c | 11410 | #endif |
wolfSSL | 0:d92f9d21154c | 11411 | |
wolfSSL | 0:d92f9d21154c | 11412 | WOLFSSL_MSG("wolfSSL_DH_generate_key"); |
wolfSSL | 0:d92f9d21154c | 11413 | |
wolfSSL | 0:d92f9d21154c | 11414 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11415 | tmpRNG = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11416 | pub = (unsigned char*)XMALLOC(pubSz, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11417 | priv = (unsigned char*)XMALLOC(privSz, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11418 | |
wolfSSL | 0:d92f9d21154c | 11419 | if (tmpRNG == NULL || pub == NULL || priv == NULL) { |
wolfSSL | 0:d92f9d21154c | 11420 | XFREE(tmpRNG, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11421 | XFREE(pub, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11422 | XFREE(priv, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11423 | return ret; |
wolfSSL | 0:d92f9d21154c | 11424 | } |
wolfSSL | 0:d92f9d21154c | 11425 | #endif |
wolfSSL | 0:d92f9d21154c | 11426 | |
wolfSSL | 0:d92f9d21154c | 11427 | if (dh == NULL || dh->p == NULL || dh->g == NULL) |
wolfSSL | 0:d92f9d21154c | 11428 | WOLFSSL_MSG("Bad function arguments"); |
wolfSSL | 0:d92f9d21154c | 11429 | else if (dh->inSet == 0 && SetDhInternal(dh) < 0) |
wolfSSL | 0:d92f9d21154c | 11430 | WOLFSSL_MSG("Bad DH set internal"); |
wolfSSL | 0:d92f9d21154c | 11431 | else if (wc_InitRng(tmpRNG) == 0) { |
wolfSSL | 0:d92f9d21154c | 11432 | rng = tmpRNG; |
wolfSSL | 0:d92f9d21154c | 11433 | initTmpRng = 1; |
wolfSSL | 0:d92f9d21154c | 11434 | } |
wolfSSL | 0:d92f9d21154c | 11435 | else { |
wolfSSL | 0:d92f9d21154c | 11436 | WOLFSSL_MSG("Bad RNG Init, trying global"); |
wolfSSL | 0:d92f9d21154c | 11437 | if (initGlobalRNG == 0) |
wolfSSL | 0:d92f9d21154c | 11438 | WOLFSSL_MSG("Global RNG no Init"); |
wolfSSL | 0:d92f9d21154c | 11439 | else |
wolfSSL | 0:d92f9d21154c | 11440 | rng = &globalRNG; |
wolfSSL | 0:d92f9d21154c | 11441 | } |
wolfSSL | 0:d92f9d21154c | 11442 | |
wolfSSL | 0:d92f9d21154c | 11443 | if (rng) { |
wolfSSL | 0:d92f9d21154c | 11444 | if (wc_DhGenerateKeyPair((DhKey*)dh->internal, rng, priv, &privSz, |
wolfSSL | 0:d92f9d21154c | 11445 | pub, &pubSz) < 0) |
wolfSSL | 0:d92f9d21154c | 11446 | WOLFSSL_MSG("Bad wc_DhGenerateKeyPair"); |
wolfSSL | 0:d92f9d21154c | 11447 | else { |
wolfSSL | 0:d92f9d21154c | 11448 | if (dh->pub_key) |
wolfSSL | 0:d92f9d21154c | 11449 | wolfSSL_BN_free(dh->pub_key); |
wolfSSL | 0:d92f9d21154c | 11450 | |
wolfSSL | 0:d92f9d21154c | 11451 | dh->pub_key = wolfSSL_BN_new(); |
wolfSSL | 0:d92f9d21154c | 11452 | if (dh->pub_key == NULL) { |
wolfSSL | 0:d92f9d21154c | 11453 | WOLFSSL_MSG("Bad DH new pub"); |
wolfSSL | 0:d92f9d21154c | 11454 | } |
wolfSSL | 0:d92f9d21154c | 11455 | if (dh->priv_key) |
wolfSSL | 0:d92f9d21154c | 11456 | wolfSSL_BN_free(dh->priv_key); |
wolfSSL | 0:d92f9d21154c | 11457 | |
wolfSSL | 0:d92f9d21154c | 11458 | dh->priv_key = wolfSSL_BN_new(); |
wolfSSL | 0:d92f9d21154c | 11459 | |
wolfSSL | 0:d92f9d21154c | 11460 | if (dh->priv_key == NULL) { |
wolfSSL | 0:d92f9d21154c | 11461 | WOLFSSL_MSG("Bad DH new priv"); |
wolfSSL | 0:d92f9d21154c | 11462 | } |
wolfSSL | 0:d92f9d21154c | 11463 | |
wolfSSL | 0:d92f9d21154c | 11464 | if (dh->pub_key && dh->priv_key) { |
wolfSSL | 0:d92f9d21154c | 11465 | if (wolfSSL_BN_bin2bn(pub, pubSz, dh->pub_key) == NULL) |
wolfSSL | 0:d92f9d21154c | 11466 | WOLFSSL_MSG("Bad DH bn2bin error pub"); |
wolfSSL | 0:d92f9d21154c | 11467 | else if (wolfSSL_BN_bin2bn(priv, privSz, dh->priv_key) == NULL) |
wolfSSL | 0:d92f9d21154c | 11468 | WOLFSSL_MSG("Bad DH bn2bin error priv"); |
wolfSSL | 0:d92f9d21154c | 11469 | else |
wolfSSL | 0:d92f9d21154c | 11470 | ret = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 11471 | } |
wolfSSL | 0:d92f9d21154c | 11472 | } |
wolfSSL | 0:d92f9d21154c | 11473 | } |
wolfSSL | 0:d92f9d21154c | 11474 | |
wolfSSL | 0:d92f9d21154c | 11475 | if (initTmpRng) |
wolfSSL | 0:d92f9d21154c | 11476 | wc_FreeRng(tmpRNG); |
wolfSSL | 0:d92f9d21154c | 11477 | |
wolfSSL | 0:d92f9d21154c | 11478 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11479 | XFREE(tmpRNG, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11480 | XFREE(pub, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11481 | XFREE(priv, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11482 | #endif |
wolfSSL | 0:d92f9d21154c | 11483 | |
wolfSSL | 0:d92f9d21154c | 11484 | return ret; |
wolfSSL | 0:d92f9d21154c | 11485 | } |
wolfSSL | 0:d92f9d21154c | 11486 | |
wolfSSL | 0:d92f9d21154c | 11487 | |
wolfSSL | 0:d92f9d21154c | 11488 | /* return key size on ok, 0 otherwise */ |
wolfSSL | 0:d92f9d21154c | 11489 | int wolfSSL_DH_compute_key(unsigned char* key, WOLFSSL_BIGNUM* otherPub, |
wolfSSL | 0:d92f9d21154c | 11490 | WOLFSSL_DH* dh) |
wolfSSL | 0:d92f9d21154c | 11491 | { |
wolfSSL | 0:d92f9d21154c | 11492 | int ret = 0; |
wolfSSL | 0:d92f9d21154c | 11493 | word32 keySz = 0; |
wolfSSL | 0:d92f9d21154c | 11494 | word32 pubSz = 1024; |
wolfSSL | 0:d92f9d21154c | 11495 | word32 privSz = 1024; |
wolfSSL | 0:d92f9d21154c | 11496 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11497 | unsigned char* pub = NULL; |
wolfSSL | 0:d92f9d21154c | 11498 | unsigned char* priv = NULL; |
wolfSSL | 0:d92f9d21154c | 11499 | #else |
wolfSSL | 0:d92f9d21154c | 11500 | unsigned char pub [1024]; |
wolfSSL | 0:d92f9d21154c | 11501 | unsigned char priv[1024]; |
wolfSSL | 0:d92f9d21154c | 11502 | #endif |
wolfSSL | 0:d92f9d21154c | 11503 | |
wolfSSL | 0:d92f9d21154c | 11504 | WOLFSSL_MSG("wolfSSL_DH_compute_key"); |
wolfSSL | 0:d92f9d21154c | 11505 | |
wolfSSL | 0:d92f9d21154c | 11506 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11507 | pub = (unsigned char*)XMALLOC(pubSz, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11508 | if (pub == NULL) |
wolfSSL | 0:d92f9d21154c | 11509 | return ret; |
wolfSSL | 0:d92f9d21154c | 11510 | |
wolfSSL | 0:d92f9d21154c | 11511 | priv = (unsigned char*)XMALLOC(privSz, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11512 | if (priv == NULL) { |
wolfSSL | 0:d92f9d21154c | 11513 | XFREE(pub, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11514 | return 0; |
wolfSSL | 0:d92f9d21154c | 11515 | } |
wolfSSL | 0:d92f9d21154c | 11516 | #endif |
wolfSSL | 0:d92f9d21154c | 11517 | |
wolfSSL | 0:d92f9d21154c | 11518 | if (dh == NULL || dh->priv_key == NULL || otherPub == NULL) |
wolfSSL | 0:d92f9d21154c | 11519 | WOLFSSL_MSG("Bad function arguments"); |
wolfSSL | 0:d92f9d21154c | 11520 | else if ((keySz = (word32)DH_size(dh)) == 0) |
wolfSSL | 0:d92f9d21154c | 11521 | WOLFSSL_MSG("Bad DH_size"); |
wolfSSL | 0:d92f9d21154c | 11522 | else if (wolfSSL_BN_bn2bin(dh->priv_key, NULL) > (int)privSz) |
wolfSSL | 0:d92f9d21154c | 11523 | WOLFSSL_MSG("Bad priv internal size"); |
wolfSSL | 0:d92f9d21154c | 11524 | else if (wolfSSL_BN_bn2bin(otherPub, NULL) > (int)pubSz) |
wolfSSL | 0:d92f9d21154c | 11525 | WOLFSSL_MSG("Bad otherPub size"); |
wolfSSL | 0:d92f9d21154c | 11526 | else { |
wolfSSL | 0:d92f9d21154c | 11527 | privSz = wolfSSL_BN_bn2bin(dh->priv_key, priv); |
wolfSSL | 0:d92f9d21154c | 11528 | pubSz = wolfSSL_BN_bn2bin(otherPub, pub); |
wolfSSL | 0:d92f9d21154c | 11529 | |
wolfSSL | 0:d92f9d21154c | 11530 | if (privSz <= 0 || pubSz <= 0) |
wolfSSL | 0:d92f9d21154c | 11531 | WOLFSSL_MSG("Bad BN2bin set"); |
wolfSSL | 0:d92f9d21154c | 11532 | else if (wc_DhAgree((DhKey*)dh->internal, key, &keySz, priv, privSz, pub, |
wolfSSL | 0:d92f9d21154c | 11533 | pubSz) < 0) |
wolfSSL | 0:d92f9d21154c | 11534 | WOLFSSL_MSG("wc_DhAgree failed"); |
wolfSSL | 0:d92f9d21154c | 11535 | else |
wolfSSL | 0:d92f9d21154c | 11536 | ret = (int)keySz; |
wolfSSL | 0:d92f9d21154c | 11537 | } |
wolfSSL | 0:d92f9d21154c | 11538 | |
wolfSSL | 0:d92f9d21154c | 11539 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11540 | XFREE(pub, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11541 | XFREE(priv, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11542 | #endif |
wolfSSL | 0:d92f9d21154c | 11543 | |
wolfSSL | 0:d92f9d21154c | 11544 | return ret; |
wolfSSL | 0:d92f9d21154c | 11545 | } |
wolfSSL | 0:d92f9d21154c | 11546 | #endif /* NO_DH */ |
wolfSSL | 0:d92f9d21154c | 11547 | |
wolfSSL | 0:d92f9d21154c | 11548 | |
wolfSSL | 0:d92f9d21154c | 11549 | #ifndef NO_DSA |
wolfSSL | 0:d92f9d21154c | 11550 | static void InitwolfSSL_DSA(WOLFSSL_DSA* dsa) |
wolfSSL | 0:d92f9d21154c | 11551 | { |
wolfSSL | 0:d92f9d21154c | 11552 | if (dsa) { |
wolfSSL | 0:d92f9d21154c | 11553 | dsa->p = NULL; |
wolfSSL | 0:d92f9d21154c | 11554 | dsa->q = NULL; |
wolfSSL | 0:d92f9d21154c | 11555 | dsa->g = NULL; |
wolfSSL | 0:d92f9d21154c | 11556 | dsa->pub_key = NULL; |
wolfSSL | 0:d92f9d21154c | 11557 | dsa->priv_key = NULL; |
wolfSSL | 0:d92f9d21154c | 11558 | dsa->internal = NULL; |
wolfSSL | 0:d92f9d21154c | 11559 | dsa->inSet = 0; |
wolfSSL | 0:d92f9d21154c | 11560 | dsa->exSet = 0; |
wolfSSL | 0:d92f9d21154c | 11561 | } |
wolfSSL | 0:d92f9d21154c | 11562 | } |
wolfSSL | 0:d92f9d21154c | 11563 | |
wolfSSL | 0:d92f9d21154c | 11564 | |
wolfSSL | 0:d92f9d21154c | 11565 | WOLFSSL_DSA* wolfSSL_DSA_new(void) |
wolfSSL | 0:d92f9d21154c | 11566 | { |
wolfSSL | 0:d92f9d21154c | 11567 | WOLFSSL_DSA* external; |
wolfSSL | 0:d92f9d21154c | 11568 | DsaKey* key; |
wolfSSL | 0:d92f9d21154c | 11569 | |
wolfSSL | 0:d92f9d21154c | 11570 | WOLFSSL_MSG("wolfSSL_DSA_new"); |
wolfSSL | 0:d92f9d21154c | 11571 | |
wolfSSL | 0:d92f9d21154c | 11572 | key = (DsaKey*) XMALLOC(sizeof(DsaKey), NULL, DYNAMIC_TYPE_DSA); |
wolfSSL | 0:d92f9d21154c | 11573 | if (key == NULL) { |
wolfSSL | 0:d92f9d21154c | 11574 | WOLFSSL_MSG("wolfSSL_DSA_new malloc DsaKey failure"); |
wolfSSL | 0:d92f9d21154c | 11575 | return NULL; |
wolfSSL | 0:d92f9d21154c | 11576 | } |
wolfSSL | 0:d92f9d21154c | 11577 | |
wolfSSL | 0:d92f9d21154c | 11578 | external = (WOLFSSL_DSA*) XMALLOC(sizeof(WOLFSSL_DSA), NULL, |
wolfSSL | 0:d92f9d21154c | 11579 | DYNAMIC_TYPE_DSA); |
wolfSSL | 0:d92f9d21154c | 11580 | if (external == NULL) { |
wolfSSL | 0:d92f9d21154c | 11581 | WOLFSSL_MSG("wolfSSL_DSA_new malloc WOLFSSL_DSA failure"); |
wolfSSL | 0:d92f9d21154c | 11582 | XFREE(key, NULL, DYNAMIC_TYPE_DSA); |
wolfSSL | 0:d92f9d21154c | 11583 | return NULL; |
wolfSSL | 0:d92f9d21154c | 11584 | } |
wolfSSL | 0:d92f9d21154c | 11585 | |
wolfSSL | 0:d92f9d21154c | 11586 | InitwolfSSL_DSA(external); |
wolfSSL | 0:d92f9d21154c | 11587 | InitDsaKey(key); |
wolfSSL | 0:d92f9d21154c | 11588 | external->internal = key; |
wolfSSL | 0:d92f9d21154c | 11589 | |
wolfSSL | 0:d92f9d21154c | 11590 | return external; |
wolfSSL | 0:d92f9d21154c | 11591 | } |
wolfSSL | 0:d92f9d21154c | 11592 | |
wolfSSL | 0:d92f9d21154c | 11593 | |
wolfSSL | 0:d92f9d21154c | 11594 | void wolfSSL_DSA_free(WOLFSSL_DSA* dsa) |
wolfSSL | 0:d92f9d21154c | 11595 | { |
wolfSSL | 0:d92f9d21154c | 11596 | WOLFSSL_MSG("wolfSSL_DSA_free"); |
wolfSSL | 0:d92f9d21154c | 11597 | |
wolfSSL | 0:d92f9d21154c | 11598 | if (dsa) { |
wolfSSL | 0:d92f9d21154c | 11599 | if (dsa->internal) { |
wolfSSL | 0:d92f9d21154c | 11600 | FreeDsaKey((DsaKey*)dsa->internal); |
wolfSSL | 0:d92f9d21154c | 11601 | XFREE(dsa->internal, NULL, DYNAMIC_TYPE_DSA); |
wolfSSL | 0:d92f9d21154c | 11602 | dsa->internal = NULL; |
wolfSSL | 0:d92f9d21154c | 11603 | } |
wolfSSL | 0:d92f9d21154c | 11604 | wolfSSL_BN_free(dsa->priv_key); |
wolfSSL | 0:d92f9d21154c | 11605 | wolfSSL_BN_free(dsa->pub_key); |
wolfSSL | 0:d92f9d21154c | 11606 | wolfSSL_BN_free(dsa->g); |
wolfSSL | 0:d92f9d21154c | 11607 | wolfSSL_BN_free(dsa->q); |
wolfSSL | 0:d92f9d21154c | 11608 | wolfSSL_BN_free(dsa->p); |
wolfSSL | 0:d92f9d21154c | 11609 | InitwolfSSL_DSA(dsa); /* set back to NULLs for safety */ |
wolfSSL | 0:d92f9d21154c | 11610 | |
wolfSSL | 0:d92f9d21154c | 11611 | XFREE(dsa, NULL, DYNAMIC_TYPE_DSA); |
wolfSSL | 0:d92f9d21154c | 11612 | } |
wolfSSL | 0:d92f9d21154c | 11613 | } |
wolfSSL | 0:d92f9d21154c | 11614 | |
wolfSSL | 0:d92f9d21154c | 11615 | |
wolfSSL | 0:d92f9d21154c | 11616 | int wolfSSL_DSA_generate_key(WOLFSSL_DSA* dsa) |
wolfSSL | 0:d92f9d21154c | 11617 | { |
wolfSSL | 0:d92f9d21154c | 11618 | (void)dsa; |
wolfSSL | 0:d92f9d21154c | 11619 | |
wolfSSL | 0:d92f9d21154c | 11620 | WOLFSSL_MSG("wolfSSL_DSA_generate_key"); |
wolfSSL | 0:d92f9d21154c | 11621 | |
wolfSSL | 0:d92f9d21154c | 11622 | return 0; /* key gen not needed by server */ |
wolfSSL | 0:d92f9d21154c | 11623 | } |
wolfSSL | 0:d92f9d21154c | 11624 | |
wolfSSL | 0:d92f9d21154c | 11625 | |
wolfSSL | 0:d92f9d21154c | 11626 | int wolfSSL_DSA_generate_parameters_ex(WOLFSSL_DSA* dsa, int bits, |
wolfSSL | 0:d92f9d21154c | 11627 | unsigned char* seed, int seedLen, int* counterRet, |
wolfSSL | 0:d92f9d21154c | 11628 | unsigned long* hRet, void* cb) |
wolfSSL | 0:d92f9d21154c | 11629 | { |
wolfSSL | 0:d92f9d21154c | 11630 | (void)dsa; |
wolfSSL | 0:d92f9d21154c | 11631 | (void)bits; |
wolfSSL | 0:d92f9d21154c | 11632 | (void)seed; |
wolfSSL | 0:d92f9d21154c | 11633 | (void)seedLen; |
wolfSSL | 0:d92f9d21154c | 11634 | (void)counterRet; |
wolfSSL | 0:d92f9d21154c | 11635 | (void)hRet; |
wolfSSL | 0:d92f9d21154c | 11636 | (void)cb; |
wolfSSL | 0:d92f9d21154c | 11637 | |
wolfSSL | 0:d92f9d21154c | 11638 | WOLFSSL_MSG("wolfSSL_DSA_generate_parameters_ex"); |
wolfSSL | 0:d92f9d21154c | 11639 | |
wolfSSL | 0:d92f9d21154c | 11640 | return 0; /* key gen not needed by server */ |
wolfSSL | 0:d92f9d21154c | 11641 | } |
wolfSSL | 0:d92f9d21154c | 11642 | #endif /* NO_DSA */ |
wolfSSL | 0:d92f9d21154c | 11643 | |
wolfSSL | 0:d92f9d21154c | 11644 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 11645 | static void InitwolfSSL_Rsa(WOLFSSL_RSA* rsa) |
wolfSSL | 0:d92f9d21154c | 11646 | { |
wolfSSL | 0:d92f9d21154c | 11647 | if (rsa) { |
wolfSSL | 0:d92f9d21154c | 11648 | rsa->n = NULL; |
wolfSSL | 0:d92f9d21154c | 11649 | rsa->e = NULL; |
wolfSSL | 0:d92f9d21154c | 11650 | rsa->d = NULL; |
wolfSSL | 0:d92f9d21154c | 11651 | rsa->p = NULL; |
wolfSSL | 0:d92f9d21154c | 11652 | rsa->q = NULL; |
wolfSSL | 0:d92f9d21154c | 11653 | rsa->dmp1 = NULL; |
wolfSSL | 0:d92f9d21154c | 11654 | rsa->dmq1 = NULL; |
wolfSSL | 0:d92f9d21154c | 11655 | rsa->iqmp = NULL; |
wolfSSL | 0:d92f9d21154c | 11656 | rsa->internal = NULL; |
wolfSSL | 0:d92f9d21154c | 11657 | rsa->inSet = 0; |
wolfSSL | 0:d92f9d21154c | 11658 | rsa->exSet = 0; |
wolfSSL | 0:d92f9d21154c | 11659 | } |
wolfSSL | 0:d92f9d21154c | 11660 | } |
wolfSSL | 0:d92f9d21154c | 11661 | |
wolfSSL | 0:d92f9d21154c | 11662 | |
wolfSSL | 0:d92f9d21154c | 11663 | WOLFSSL_RSA* wolfSSL_RSA_new(void) |
wolfSSL | 0:d92f9d21154c | 11664 | { |
wolfSSL | 0:d92f9d21154c | 11665 | WOLFSSL_RSA* external; |
wolfSSL | 0:d92f9d21154c | 11666 | RsaKey* key; |
wolfSSL | 0:d92f9d21154c | 11667 | |
wolfSSL | 0:d92f9d21154c | 11668 | WOLFSSL_MSG("wolfSSL_RSA_new"); |
wolfSSL | 0:d92f9d21154c | 11669 | |
wolfSSL | 0:d92f9d21154c | 11670 | key = (RsaKey*) XMALLOC(sizeof(RsaKey), NULL, DYNAMIC_TYPE_RSA); |
wolfSSL | 0:d92f9d21154c | 11671 | if (key == NULL) { |
wolfSSL | 0:d92f9d21154c | 11672 | WOLFSSL_MSG("wolfSSL_RSA_new malloc RsaKey failure"); |
wolfSSL | 0:d92f9d21154c | 11673 | return NULL; |
wolfSSL | 0:d92f9d21154c | 11674 | } |
wolfSSL | 0:d92f9d21154c | 11675 | |
wolfSSL | 0:d92f9d21154c | 11676 | external = (WOLFSSL_RSA*) XMALLOC(sizeof(WOLFSSL_RSA), NULL, |
wolfSSL | 0:d92f9d21154c | 11677 | DYNAMIC_TYPE_RSA); |
wolfSSL | 0:d92f9d21154c | 11678 | if (external == NULL) { |
wolfSSL | 0:d92f9d21154c | 11679 | WOLFSSL_MSG("wolfSSL_RSA_new malloc WOLFSSL_RSA failure"); |
wolfSSL | 0:d92f9d21154c | 11680 | XFREE(key, NULL, DYNAMIC_TYPE_RSA); |
wolfSSL | 0:d92f9d21154c | 11681 | return NULL; |
wolfSSL | 0:d92f9d21154c | 11682 | } |
wolfSSL | 0:d92f9d21154c | 11683 | |
wolfSSL | 0:d92f9d21154c | 11684 | InitwolfSSL_Rsa(external); |
wolfSSL | 0:d92f9d21154c | 11685 | if (wc_InitRsaKey(key, NULL) != 0) { |
wolfSSL | 0:d92f9d21154c | 11686 | WOLFSSL_MSG("InitRsaKey WOLFSSL_RSA failure"); |
wolfSSL | 0:d92f9d21154c | 11687 | XFREE(external, NULL, DYNAMIC_TYPE_RSA); |
wolfSSL | 0:d92f9d21154c | 11688 | XFREE(key, NULL, DYNAMIC_TYPE_RSA); |
wolfSSL | 0:d92f9d21154c | 11689 | return NULL; |
wolfSSL | 0:d92f9d21154c | 11690 | } |
wolfSSL | 0:d92f9d21154c | 11691 | external->internal = key; |
wolfSSL | 0:d92f9d21154c | 11692 | |
wolfSSL | 0:d92f9d21154c | 11693 | return external; |
wolfSSL | 0:d92f9d21154c | 11694 | } |
wolfSSL | 0:d92f9d21154c | 11695 | |
wolfSSL | 0:d92f9d21154c | 11696 | |
wolfSSL | 0:d92f9d21154c | 11697 | void wolfSSL_RSA_free(WOLFSSL_RSA* rsa) |
wolfSSL | 0:d92f9d21154c | 11698 | { |
wolfSSL | 0:d92f9d21154c | 11699 | WOLFSSL_MSG("wolfSSL_RSA_free"); |
wolfSSL | 0:d92f9d21154c | 11700 | |
wolfSSL | 0:d92f9d21154c | 11701 | if (rsa) { |
wolfSSL | 0:d92f9d21154c | 11702 | if (rsa->internal) { |
wolfSSL | 0:d92f9d21154c | 11703 | wc_FreeRsaKey((RsaKey*)rsa->internal); |
wolfSSL | 0:d92f9d21154c | 11704 | XFREE(rsa->internal, NULL, DYNAMIC_TYPE_RSA); |
wolfSSL | 0:d92f9d21154c | 11705 | rsa->internal = NULL; |
wolfSSL | 0:d92f9d21154c | 11706 | } |
wolfSSL | 0:d92f9d21154c | 11707 | wolfSSL_BN_free(rsa->iqmp); |
wolfSSL | 0:d92f9d21154c | 11708 | wolfSSL_BN_free(rsa->dmq1); |
wolfSSL | 0:d92f9d21154c | 11709 | wolfSSL_BN_free(rsa->dmp1); |
wolfSSL | 0:d92f9d21154c | 11710 | wolfSSL_BN_free(rsa->q); |
wolfSSL | 0:d92f9d21154c | 11711 | wolfSSL_BN_free(rsa->p); |
wolfSSL | 0:d92f9d21154c | 11712 | wolfSSL_BN_free(rsa->d); |
wolfSSL | 0:d92f9d21154c | 11713 | wolfSSL_BN_free(rsa->e); |
wolfSSL | 0:d92f9d21154c | 11714 | wolfSSL_BN_free(rsa->n); |
wolfSSL | 0:d92f9d21154c | 11715 | InitwolfSSL_Rsa(rsa); /* set back to NULLs for safety */ |
wolfSSL | 0:d92f9d21154c | 11716 | |
wolfSSL | 0:d92f9d21154c | 11717 | XFREE(rsa, NULL, DYNAMIC_TYPE_RSA); |
wolfSSL | 0:d92f9d21154c | 11718 | } |
wolfSSL | 0:d92f9d21154c | 11719 | } |
wolfSSL | 0:d92f9d21154c | 11720 | #endif /* NO_RSA */ |
wolfSSL | 0:d92f9d21154c | 11721 | |
wolfSSL | 0:d92f9d21154c | 11722 | |
wolfSSL | 0:d92f9d21154c | 11723 | #if !defined(NO_RSA) || !defined(NO_DSA) |
wolfSSL | 0:d92f9d21154c | 11724 | static int SetIndividualExternal(WOLFSSL_BIGNUM** bn, mp_int* mpi) |
wolfSSL | 0:d92f9d21154c | 11725 | { |
wolfSSL | 0:d92f9d21154c | 11726 | WOLFSSL_MSG("Entering SetIndividualExternal"); |
wolfSSL | 0:d92f9d21154c | 11727 | |
wolfSSL | 0:d92f9d21154c | 11728 | if (mpi == NULL) { |
wolfSSL | 0:d92f9d21154c | 11729 | WOLFSSL_MSG("mpi NULL error"); |
wolfSSL | 0:d92f9d21154c | 11730 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11731 | } |
wolfSSL | 0:d92f9d21154c | 11732 | |
wolfSSL | 0:d92f9d21154c | 11733 | if (*bn == NULL) { |
wolfSSL | 0:d92f9d21154c | 11734 | *bn = wolfSSL_BN_new(); |
wolfSSL | 0:d92f9d21154c | 11735 | if (*bn == NULL) { |
wolfSSL | 0:d92f9d21154c | 11736 | WOLFSSL_MSG("SetIndividualExternal alloc failed"); |
wolfSSL | 0:d92f9d21154c | 11737 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11738 | } |
wolfSSL | 0:d92f9d21154c | 11739 | } |
wolfSSL | 0:d92f9d21154c | 11740 | |
wolfSSL | 0:d92f9d21154c | 11741 | if (mp_copy(mpi, (mp_int*)((*bn)->internal)) != MP_OKAY) { |
wolfSSL | 0:d92f9d21154c | 11742 | WOLFSSL_MSG("mp_copy error"); |
wolfSSL | 0:d92f9d21154c | 11743 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11744 | } |
wolfSSL | 0:d92f9d21154c | 11745 | |
wolfSSL | 0:d92f9d21154c | 11746 | return 0; |
wolfSSL | 0:d92f9d21154c | 11747 | } |
wolfSSL | 0:d92f9d21154c | 11748 | #endif /* !NO_RSA && !NO_DSA */ |
wolfSSL | 0:d92f9d21154c | 11749 | |
wolfSSL | 0:d92f9d21154c | 11750 | |
wolfSSL | 0:d92f9d21154c | 11751 | #ifndef NO_DSA |
wolfSSL | 0:d92f9d21154c | 11752 | static int SetDsaExternal(WOLFSSL_DSA* dsa) |
wolfSSL | 0:d92f9d21154c | 11753 | { |
wolfSSL | 0:d92f9d21154c | 11754 | DsaKey* key; |
wolfSSL | 0:d92f9d21154c | 11755 | WOLFSSL_MSG("Entering SetDsaExternal"); |
wolfSSL | 0:d92f9d21154c | 11756 | |
wolfSSL | 0:d92f9d21154c | 11757 | if (dsa == NULL || dsa->internal == NULL) { |
wolfSSL | 0:d92f9d21154c | 11758 | WOLFSSL_MSG("dsa key NULL error"); |
wolfSSL | 0:d92f9d21154c | 11759 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11760 | } |
wolfSSL | 0:d92f9d21154c | 11761 | |
wolfSSL | 0:d92f9d21154c | 11762 | key = (DsaKey*)dsa->internal; |
wolfSSL | 0:d92f9d21154c | 11763 | |
wolfSSL | 0:d92f9d21154c | 11764 | if (SetIndividualExternal(&dsa->p, &key->p) < 0) { |
wolfSSL | 0:d92f9d21154c | 11765 | WOLFSSL_MSG("dsa p key error"); |
wolfSSL | 0:d92f9d21154c | 11766 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11767 | } |
wolfSSL | 0:d92f9d21154c | 11768 | |
wolfSSL | 0:d92f9d21154c | 11769 | if (SetIndividualExternal(&dsa->q, &key->q) < 0) { |
wolfSSL | 0:d92f9d21154c | 11770 | WOLFSSL_MSG("dsa q key error"); |
wolfSSL | 0:d92f9d21154c | 11771 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11772 | } |
wolfSSL | 0:d92f9d21154c | 11773 | |
wolfSSL | 0:d92f9d21154c | 11774 | if (SetIndividualExternal(&dsa->g, &key->g) < 0) { |
wolfSSL | 0:d92f9d21154c | 11775 | WOLFSSL_MSG("dsa g key error"); |
wolfSSL | 0:d92f9d21154c | 11776 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11777 | } |
wolfSSL | 0:d92f9d21154c | 11778 | |
wolfSSL | 0:d92f9d21154c | 11779 | if (SetIndividualExternal(&dsa->pub_key, &key->y) < 0) { |
wolfSSL | 0:d92f9d21154c | 11780 | WOLFSSL_MSG("dsa y key error"); |
wolfSSL | 0:d92f9d21154c | 11781 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11782 | } |
wolfSSL | 0:d92f9d21154c | 11783 | |
wolfSSL | 0:d92f9d21154c | 11784 | if (SetIndividualExternal(&dsa->priv_key, &key->x) < 0) { |
wolfSSL | 0:d92f9d21154c | 11785 | WOLFSSL_MSG("dsa x key error"); |
wolfSSL | 0:d92f9d21154c | 11786 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11787 | } |
wolfSSL | 0:d92f9d21154c | 11788 | |
wolfSSL | 0:d92f9d21154c | 11789 | dsa->exSet = 1; |
wolfSSL | 0:d92f9d21154c | 11790 | |
wolfSSL | 0:d92f9d21154c | 11791 | return 0; |
wolfSSL | 0:d92f9d21154c | 11792 | } |
wolfSSL | 0:d92f9d21154c | 11793 | #endif /* NO_DSA */ |
wolfSSL | 0:d92f9d21154c | 11794 | |
wolfSSL | 0:d92f9d21154c | 11795 | |
wolfSSL | 0:d92f9d21154c | 11796 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 11797 | static int SetRsaExternal(WOLFSSL_RSA* rsa) |
wolfSSL | 0:d92f9d21154c | 11798 | { |
wolfSSL | 0:d92f9d21154c | 11799 | RsaKey* key; |
wolfSSL | 0:d92f9d21154c | 11800 | WOLFSSL_MSG("Entering SetRsaExternal"); |
wolfSSL | 0:d92f9d21154c | 11801 | |
wolfSSL | 0:d92f9d21154c | 11802 | if (rsa == NULL || rsa->internal == NULL) { |
wolfSSL | 0:d92f9d21154c | 11803 | WOLFSSL_MSG("rsa key NULL error"); |
wolfSSL | 0:d92f9d21154c | 11804 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11805 | } |
wolfSSL | 0:d92f9d21154c | 11806 | |
wolfSSL | 0:d92f9d21154c | 11807 | key = (RsaKey*)rsa->internal; |
wolfSSL | 0:d92f9d21154c | 11808 | |
wolfSSL | 0:d92f9d21154c | 11809 | if (SetIndividualExternal(&rsa->n, &key->n) < 0) { |
wolfSSL | 0:d92f9d21154c | 11810 | WOLFSSL_MSG("rsa n key error"); |
wolfSSL | 0:d92f9d21154c | 11811 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11812 | } |
wolfSSL | 0:d92f9d21154c | 11813 | |
wolfSSL | 0:d92f9d21154c | 11814 | if (SetIndividualExternal(&rsa->e, &key->e) < 0) { |
wolfSSL | 0:d92f9d21154c | 11815 | WOLFSSL_MSG("rsa e key error"); |
wolfSSL | 0:d92f9d21154c | 11816 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11817 | } |
wolfSSL | 0:d92f9d21154c | 11818 | |
wolfSSL | 0:d92f9d21154c | 11819 | if (SetIndividualExternal(&rsa->d, &key->d) < 0) { |
wolfSSL | 0:d92f9d21154c | 11820 | WOLFSSL_MSG("rsa d key error"); |
wolfSSL | 0:d92f9d21154c | 11821 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11822 | } |
wolfSSL | 0:d92f9d21154c | 11823 | |
wolfSSL | 0:d92f9d21154c | 11824 | if (SetIndividualExternal(&rsa->p, &key->p) < 0) { |
wolfSSL | 0:d92f9d21154c | 11825 | WOLFSSL_MSG("rsa p key error"); |
wolfSSL | 0:d92f9d21154c | 11826 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11827 | } |
wolfSSL | 0:d92f9d21154c | 11828 | |
wolfSSL | 0:d92f9d21154c | 11829 | if (SetIndividualExternal(&rsa->q, &key->q) < 0) { |
wolfSSL | 0:d92f9d21154c | 11830 | WOLFSSL_MSG("rsa q key error"); |
wolfSSL | 0:d92f9d21154c | 11831 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11832 | } |
wolfSSL | 0:d92f9d21154c | 11833 | |
wolfSSL | 0:d92f9d21154c | 11834 | if (SetIndividualExternal(&rsa->dmp1, &key->dP) < 0) { |
wolfSSL | 0:d92f9d21154c | 11835 | WOLFSSL_MSG("rsa dP key error"); |
wolfSSL | 0:d92f9d21154c | 11836 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11837 | } |
wolfSSL | 0:d92f9d21154c | 11838 | |
wolfSSL | 0:d92f9d21154c | 11839 | if (SetIndividualExternal(&rsa->dmq1, &key->dQ) < 0) { |
wolfSSL | 0:d92f9d21154c | 11840 | WOLFSSL_MSG("rsa dQ key error"); |
wolfSSL | 0:d92f9d21154c | 11841 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11842 | } |
wolfSSL | 0:d92f9d21154c | 11843 | |
wolfSSL | 0:d92f9d21154c | 11844 | if (SetIndividualExternal(&rsa->iqmp, &key->u) < 0) { |
wolfSSL | 0:d92f9d21154c | 11845 | WOLFSSL_MSG("rsa u key error"); |
wolfSSL | 0:d92f9d21154c | 11846 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11847 | } |
wolfSSL | 0:d92f9d21154c | 11848 | |
wolfSSL | 0:d92f9d21154c | 11849 | rsa->exSet = 1; |
wolfSSL | 0:d92f9d21154c | 11850 | |
wolfSSL | 0:d92f9d21154c | 11851 | return 0; |
wolfSSL | 0:d92f9d21154c | 11852 | } |
wolfSSL | 0:d92f9d21154c | 11853 | |
wolfSSL | 0:d92f9d21154c | 11854 | |
wolfSSL | 0:d92f9d21154c | 11855 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 11856 | int wolfSSL_RSA_generate_key_ex(WOLFSSL_RSA* rsa, int bits, WOLFSSL_BIGNUM* bn, |
wolfSSL | 0:d92f9d21154c | 11857 | void* cb) |
wolfSSL | 0:d92f9d21154c | 11858 | { |
wolfSSL | 0:d92f9d21154c | 11859 | int ret = SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11860 | |
wolfSSL | 0:d92f9d21154c | 11861 | WOLFSSL_MSG("wolfSSL_RSA_generate_key_ex"); |
wolfSSL | 0:d92f9d21154c | 11862 | |
wolfSSL | 0:d92f9d21154c | 11863 | (void)rsa; |
wolfSSL | 0:d92f9d21154c | 11864 | (void)bits; |
wolfSSL | 0:d92f9d21154c | 11865 | (void)cb; |
wolfSSL | 0:d92f9d21154c | 11866 | (void)bn; |
wolfSSL | 0:d92f9d21154c | 11867 | |
wolfSSL | 0:d92f9d21154c | 11868 | #ifdef WOLFSSL_KEY_GEN |
wolfSSL | 0:d92f9d21154c | 11869 | { |
wolfSSL | 0:d92f9d21154c | 11870 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11871 | RNG* rng = NULL; |
wolfSSL | 0:d92f9d21154c | 11872 | #else |
wolfSSL | 0:d92f9d21154c | 11873 | RNG rng[1]; |
wolfSSL | 0:d92f9d21154c | 11874 | #endif |
wolfSSL | 0:d92f9d21154c | 11875 | |
wolfSSL | 0:d92f9d21154c | 11876 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11877 | rng = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11878 | if (rng == NULL) |
wolfSSL | 0:d92f9d21154c | 11879 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11880 | #endif |
wolfSSL | 0:d92f9d21154c | 11881 | |
wolfSSL | 0:d92f9d21154c | 11882 | if (wc_InitRng(rng) < 0) |
wolfSSL | 0:d92f9d21154c | 11883 | WOLFSSL_MSG("RNG init failed"); |
wolfSSL | 0:d92f9d21154c | 11884 | else if (wc_MakeRsaKey((RsaKey*)rsa->internal, bits, 65537, rng) < 0) |
wolfSSL | 0:d92f9d21154c | 11885 | WOLFSSL_MSG("wc_MakeRsaKey failed"); |
wolfSSL | 0:d92f9d21154c | 11886 | else if (SetRsaExternal(rsa) < 0) |
wolfSSL | 0:d92f9d21154c | 11887 | WOLFSSL_MSG("SetRsaExternal failed"); |
wolfSSL | 0:d92f9d21154c | 11888 | else { |
wolfSSL | 0:d92f9d21154c | 11889 | rsa->inSet = 1; |
wolfSSL | 0:d92f9d21154c | 11890 | ret = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 11891 | } |
wolfSSL | 0:d92f9d21154c | 11892 | |
wolfSSL | 0:d92f9d21154c | 11893 | wc_FreeRng(rng); |
wolfSSL | 0:d92f9d21154c | 11894 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11895 | XFREE(rng, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11896 | #endif |
wolfSSL | 0:d92f9d21154c | 11897 | } |
wolfSSL | 0:d92f9d21154c | 11898 | #else |
wolfSSL | 0:d92f9d21154c | 11899 | WOLFSSL_MSG("No Key Gen built in"); |
wolfSSL | 0:d92f9d21154c | 11900 | #endif |
wolfSSL | 0:d92f9d21154c | 11901 | return ret; |
wolfSSL | 0:d92f9d21154c | 11902 | } |
wolfSSL | 0:d92f9d21154c | 11903 | |
wolfSSL | 0:d92f9d21154c | 11904 | |
wolfSSL | 0:d92f9d21154c | 11905 | /* SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 11906 | int wolfSSL_RSA_blinding_on(WOLFSSL_RSA* rsa, WOLFSSL_BN_CTX* bn) |
wolfSSL | 0:d92f9d21154c | 11907 | { |
wolfSSL | 0:d92f9d21154c | 11908 | (void)rsa; |
wolfSSL | 0:d92f9d21154c | 11909 | (void)bn; |
wolfSSL | 0:d92f9d21154c | 11910 | |
wolfSSL | 0:d92f9d21154c | 11911 | WOLFSSL_MSG("wolfSSL_RSA_blinding_on"); |
wolfSSL | 0:d92f9d21154c | 11912 | |
wolfSSL | 0:d92f9d21154c | 11913 | return SSL_SUCCESS; /* on by default */ |
wolfSSL | 0:d92f9d21154c | 11914 | } |
wolfSSL | 0:d92f9d21154c | 11915 | |
wolfSSL | 0:d92f9d21154c | 11916 | |
wolfSSL | 0:d92f9d21154c | 11917 | int wolfSSL_RSA_public_encrypt(int len, unsigned char* fr, |
wolfSSL | 0:d92f9d21154c | 11918 | unsigned char* to, WOLFSSL_RSA* rsa, int padding) |
wolfSSL | 0:d92f9d21154c | 11919 | { |
wolfSSL | 0:d92f9d21154c | 11920 | (void)len; |
wolfSSL | 0:d92f9d21154c | 11921 | (void)fr; |
wolfSSL | 0:d92f9d21154c | 11922 | (void)to; |
wolfSSL | 0:d92f9d21154c | 11923 | (void)rsa; |
wolfSSL | 0:d92f9d21154c | 11924 | (void)padding; |
wolfSSL | 0:d92f9d21154c | 11925 | |
wolfSSL | 0:d92f9d21154c | 11926 | WOLFSSL_MSG("wolfSSL_RSA_public_encrypt"); |
wolfSSL | 0:d92f9d21154c | 11927 | |
wolfSSL | 0:d92f9d21154c | 11928 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11929 | } |
wolfSSL | 0:d92f9d21154c | 11930 | |
wolfSSL | 0:d92f9d21154c | 11931 | |
wolfSSL | 0:d92f9d21154c | 11932 | int wolfSSL_RSA_private_decrypt(int len, unsigned char* fr, |
wolfSSL | 0:d92f9d21154c | 11933 | unsigned char* to, WOLFSSL_RSA* rsa, int padding) |
wolfSSL | 0:d92f9d21154c | 11934 | { |
wolfSSL | 0:d92f9d21154c | 11935 | (void)len; |
wolfSSL | 0:d92f9d21154c | 11936 | (void)fr; |
wolfSSL | 0:d92f9d21154c | 11937 | (void)to; |
wolfSSL | 0:d92f9d21154c | 11938 | (void)rsa; |
wolfSSL | 0:d92f9d21154c | 11939 | (void)padding; |
wolfSSL | 0:d92f9d21154c | 11940 | |
wolfSSL | 0:d92f9d21154c | 11941 | WOLFSSL_MSG("wolfSSL_RSA_private_decrypt"); |
wolfSSL | 0:d92f9d21154c | 11942 | |
wolfSSL | 0:d92f9d21154c | 11943 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11944 | } |
wolfSSL | 0:d92f9d21154c | 11945 | |
wolfSSL | 0:d92f9d21154c | 11946 | |
wolfSSL | 0:d92f9d21154c | 11947 | int wolfSSL_RSA_size(const WOLFSSL_RSA* rsa) |
wolfSSL | 0:d92f9d21154c | 11948 | { |
wolfSSL | 0:d92f9d21154c | 11949 | WOLFSSL_MSG("wolfSSL_RSA_size"); |
wolfSSL | 0:d92f9d21154c | 11950 | |
wolfSSL | 0:d92f9d21154c | 11951 | if (rsa == NULL) |
wolfSSL | 0:d92f9d21154c | 11952 | return 0; |
wolfSSL | 0:d92f9d21154c | 11953 | |
wolfSSL | 0:d92f9d21154c | 11954 | return wolfSSL_BN_num_bytes(rsa->n); |
wolfSSL | 0:d92f9d21154c | 11955 | } |
wolfSSL | 0:d92f9d21154c | 11956 | #endif /* NO_RSA */ |
wolfSSL | 0:d92f9d21154c | 11957 | |
wolfSSL | 0:d92f9d21154c | 11958 | |
wolfSSL | 0:d92f9d21154c | 11959 | #ifndef NO_DSA |
wolfSSL | 0:d92f9d21154c | 11960 | /* return SSL_SUCCESS on success, < 0 otherwise */ |
wolfSSL | 0:d92f9d21154c | 11961 | int wolfSSL_DSA_do_sign(const unsigned char* d, unsigned char* sigRet, |
wolfSSL | 0:d92f9d21154c | 11962 | WOLFSSL_DSA* dsa) |
wolfSSL | 0:d92f9d21154c | 11963 | { |
wolfSSL | 0:d92f9d21154c | 11964 | int ret = SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11965 | int initTmpRng = 0; |
wolfSSL | 0:d92f9d21154c | 11966 | RNG* rng = NULL; |
wolfSSL | 0:d92f9d21154c | 11967 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11968 | RNG* tmpRNG = NULL; |
wolfSSL | 0:d92f9d21154c | 11969 | #else |
wolfSSL | 0:d92f9d21154c | 11970 | RNG tmpRNG[1]; |
wolfSSL | 0:d92f9d21154c | 11971 | #endif |
wolfSSL | 0:d92f9d21154c | 11972 | |
wolfSSL | 0:d92f9d21154c | 11973 | WOLFSSL_MSG("wolfSSL_DSA_do_sign"); |
wolfSSL | 0:d92f9d21154c | 11974 | |
wolfSSL | 0:d92f9d21154c | 11975 | if (d == NULL || sigRet == NULL || dsa == NULL) |
wolfSSL | 0:d92f9d21154c | 11976 | WOLFSSL_MSG("Bad function arguments"); |
wolfSSL | 0:d92f9d21154c | 11977 | else if (dsa->inSet == 0) |
wolfSSL | 0:d92f9d21154c | 11978 | WOLFSSL_MSG("No DSA internal set"); |
wolfSSL | 0:d92f9d21154c | 11979 | else { |
wolfSSL | 0:d92f9d21154c | 11980 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 11981 | tmpRNG = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 11982 | if (tmpRNG == NULL) |
wolfSSL | 0:d92f9d21154c | 11983 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 11984 | #endif |
wolfSSL | 0:d92f9d21154c | 11985 | |
wolfSSL | 0:d92f9d21154c | 11986 | if (wc_InitRng(tmpRNG) == 0) { |
wolfSSL | 0:d92f9d21154c | 11987 | rng = tmpRNG; |
wolfSSL | 0:d92f9d21154c | 11988 | initTmpRng = 1; |
wolfSSL | 0:d92f9d21154c | 11989 | } |
wolfSSL | 0:d92f9d21154c | 11990 | else { |
wolfSSL | 0:d92f9d21154c | 11991 | WOLFSSL_MSG("Bad RNG Init, trying global"); |
wolfSSL | 0:d92f9d21154c | 11992 | if (initGlobalRNG == 0) |
wolfSSL | 0:d92f9d21154c | 11993 | WOLFSSL_MSG("Global RNG no Init"); |
wolfSSL | 0:d92f9d21154c | 11994 | else |
wolfSSL | 0:d92f9d21154c | 11995 | rng = &globalRNG; |
wolfSSL | 0:d92f9d21154c | 11996 | } |
wolfSSL | 0:d92f9d21154c | 11997 | |
wolfSSL | 0:d92f9d21154c | 11998 | if (rng) { |
wolfSSL | 0:d92f9d21154c | 11999 | if (DsaSign(d, sigRet, (DsaKey*)dsa->internal, rng) < 0) |
wolfSSL | 0:d92f9d21154c | 12000 | WOLFSSL_MSG("DsaSign failed"); |
wolfSSL | 0:d92f9d21154c | 12001 | else |
wolfSSL | 0:d92f9d21154c | 12002 | ret = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 12003 | } |
wolfSSL | 0:d92f9d21154c | 12004 | |
wolfSSL | 0:d92f9d21154c | 12005 | if (initTmpRng) |
wolfSSL | 0:d92f9d21154c | 12006 | wc_FreeRng(tmpRNG); |
wolfSSL | 0:d92f9d21154c | 12007 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 12008 | XFREE(tmpRNG, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 12009 | #endif |
wolfSSL | 0:d92f9d21154c | 12010 | } |
wolfSSL | 0:d92f9d21154c | 12011 | |
wolfSSL | 0:d92f9d21154c | 12012 | return ret; |
wolfSSL | 0:d92f9d21154c | 12013 | } |
wolfSSL | 0:d92f9d21154c | 12014 | #endif /* NO_DSA */ |
wolfSSL | 0:d92f9d21154c | 12015 | |
wolfSSL | 0:d92f9d21154c | 12016 | |
wolfSSL | 0:d92f9d21154c | 12017 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 12018 | /* return SSL_SUCCES on ok, 0 otherwise */ |
wolfSSL | 0:d92f9d21154c | 12019 | int wolfSSL_RSA_sign(int type, const unsigned char* m, |
wolfSSL | 0:d92f9d21154c | 12020 | unsigned int mLen, unsigned char* sigRet, |
wolfSSL | 0:d92f9d21154c | 12021 | unsigned int* sigLen, WOLFSSL_RSA* rsa) |
wolfSSL | 0:d92f9d21154c | 12022 | { |
wolfSSL | 0:d92f9d21154c | 12023 | word32 outLen; |
wolfSSL | 0:d92f9d21154c | 12024 | word32 signSz; |
wolfSSL | 0:d92f9d21154c | 12025 | int initTmpRng = 0; |
wolfSSL | 0:d92f9d21154c | 12026 | RNG* rng = NULL; |
wolfSSL | 0:d92f9d21154c | 12027 | int ret = 0; |
wolfSSL | 0:d92f9d21154c | 12028 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 12029 | RNG* tmpRNG = NULL; |
wolfSSL | 0:d92f9d21154c | 12030 | byte* encodedSig = NULL; |
wolfSSL | 0:d92f9d21154c | 12031 | #else |
wolfSSL | 0:d92f9d21154c | 12032 | RNG tmpRNG[1]; |
wolfSSL | 0:d92f9d21154c | 12033 | byte encodedSig[MAX_ENCODED_SIG_SZ]; |
wolfSSL | 0:d92f9d21154c | 12034 | #endif |
wolfSSL | 0:d92f9d21154c | 12035 | |
wolfSSL | 0:d92f9d21154c | 12036 | WOLFSSL_MSG("wolfSSL_RSA_sign"); |
wolfSSL | 0:d92f9d21154c | 12037 | |
wolfSSL | 0:d92f9d21154c | 12038 | if (m == NULL || sigRet == NULL || sigLen == NULL || rsa == NULL) |
wolfSSL | 0:d92f9d21154c | 12039 | WOLFSSL_MSG("Bad function arguments"); |
wolfSSL | 0:d92f9d21154c | 12040 | else if (rsa->inSet == 0) |
wolfSSL | 0:d92f9d21154c | 12041 | WOLFSSL_MSG("No RSA internal set"); |
wolfSSL | 0:d92f9d21154c | 12042 | else if (type != NID_md5 && type != NID_sha1) |
wolfSSL | 0:d92f9d21154c | 12043 | WOLFSSL_MSG("Bad md type"); |
wolfSSL | 0:d92f9d21154c | 12044 | else { |
wolfSSL | 0:d92f9d21154c | 12045 | outLen = (word32)wolfSSL_BN_num_bytes(rsa->n); |
wolfSSL | 0:d92f9d21154c | 12046 | |
wolfSSL | 0:d92f9d21154c | 12047 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 12048 | tmpRNG = (RNG*)XMALLOC(sizeof(RNG), NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 12049 | if (tmpRNG == NULL) |
wolfSSL | 0:d92f9d21154c | 12050 | return 0; |
wolfSSL | 0:d92f9d21154c | 12051 | |
wolfSSL | 0:d92f9d21154c | 12052 | encodedSig = (byte*)XMALLOC(MAX_ENCODED_SIG_SZ, NULL, |
wolfSSL | 0:d92f9d21154c | 12053 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 12054 | if (encodedSig == NULL) { |
wolfSSL | 0:d92f9d21154c | 12055 | XFREE(tmpRNG, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 12056 | return 0; |
wolfSSL | 0:d92f9d21154c | 12057 | } |
wolfSSL | 0:d92f9d21154c | 12058 | #endif |
wolfSSL | 0:d92f9d21154c | 12059 | |
wolfSSL | 0:d92f9d21154c | 12060 | if (outLen == 0) |
wolfSSL | 0:d92f9d21154c | 12061 | WOLFSSL_MSG("Bad RSA size"); |
wolfSSL | 0:d92f9d21154c | 12062 | else if (wc_InitRng(tmpRNG) == 0) { |
wolfSSL | 0:d92f9d21154c | 12063 | rng = tmpRNG; |
wolfSSL | 0:d92f9d21154c | 12064 | initTmpRng = 1; |
wolfSSL | 0:d92f9d21154c | 12065 | } |
wolfSSL | 0:d92f9d21154c | 12066 | else { |
wolfSSL | 0:d92f9d21154c | 12067 | WOLFSSL_MSG("Bad RNG Init, trying global"); |
wolfSSL | 0:d92f9d21154c | 12068 | |
wolfSSL | 0:d92f9d21154c | 12069 | if (initGlobalRNG == 0) |
wolfSSL | 0:d92f9d21154c | 12070 | WOLFSSL_MSG("Global RNG no Init"); |
wolfSSL | 0:d92f9d21154c | 12071 | else |
wolfSSL | 0:d92f9d21154c | 12072 | rng = &globalRNG; |
wolfSSL | 0:d92f9d21154c | 12073 | } |
wolfSSL | 0:d92f9d21154c | 12074 | } |
wolfSSL | 0:d92f9d21154c | 12075 | |
wolfSSL | 0:d92f9d21154c | 12076 | if (rng) { |
wolfSSL | 0:d92f9d21154c | 12077 | type = (type == NID_md5) ? MD5h : SHAh; |
wolfSSL | 0:d92f9d21154c | 12078 | |
wolfSSL | 0:d92f9d21154c | 12079 | signSz = wc_EncodeSignature(encodedSig, m, mLen, type); |
wolfSSL | 0:d92f9d21154c | 12080 | if (signSz == 0) { |
wolfSSL | 0:d92f9d21154c | 12081 | WOLFSSL_MSG("Bad Encode Signature"); |
wolfSSL | 0:d92f9d21154c | 12082 | } |
wolfSSL | 0:d92f9d21154c | 12083 | else { |
wolfSSL | 0:d92f9d21154c | 12084 | *sigLen = wc_RsaSSL_Sign(encodedSig, signSz, sigRet, outLen, |
wolfSSL | 0:d92f9d21154c | 12085 | (RsaKey*)rsa->internal, rng); |
wolfSSL | 0:d92f9d21154c | 12086 | if (*sigLen <= 0) |
wolfSSL | 0:d92f9d21154c | 12087 | WOLFSSL_MSG("Bad Rsa Sign"); |
wolfSSL | 0:d92f9d21154c | 12088 | else |
wolfSSL | 0:d92f9d21154c | 12089 | ret = SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 12090 | } |
wolfSSL | 0:d92f9d21154c | 12091 | |
wolfSSL | 0:d92f9d21154c | 12092 | } |
wolfSSL | 0:d92f9d21154c | 12093 | |
wolfSSL | 0:d92f9d21154c | 12094 | if (initTmpRng) |
wolfSSL | 0:d92f9d21154c | 12095 | wc_FreeRng(tmpRNG); |
wolfSSL | 0:d92f9d21154c | 12096 | |
wolfSSL | 0:d92f9d21154c | 12097 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 12098 | XFREE(tmpRNG, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 12099 | XFREE(encodedSig, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 12100 | #endif |
wolfSSL | 0:d92f9d21154c | 12101 | |
wolfSSL | 0:d92f9d21154c | 12102 | WOLFSSL_MSG("wolfSSL_RSA_sign success"); |
wolfSSL | 0:d92f9d21154c | 12103 | return ret; |
wolfSSL | 0:d92f9d21154c | 12104 | } |
wolfSSL | 0:d92f9d21154c | 12105 | |
wolfSSL | 0:d92f9d21154c | 12106 | |
wolfSSL | 0:d92f9d21154c | 12107 | int wolfSSL_RSA_public_decrypt(int flen, unsigned char* from, |
wolfSSL | 0:d92f9d21154c | 12108 | unsigned char* to, WOLFSSL_RSA* rsa, int padding) |
wolfSSL | 0:d92f9d21154c | 12109 | { |
wolfSSL | 0:d92f9d21154c | 12110 | (void)flen; |
wolfSSL | 0:d92f9d21154c | 12111 | (void)from; |
wolfSSL | 0:d92f9d21154c | 12112 | (void)to; |
wolfSSL | 0:d92f9d21154c | 12113 | (void)rsa; |
wolfSSL | 0:d92f9d21154c | 12114 | (void)padding; |
wolfSSL | 0:d92f9d21154c | 12115 | |
wolfSSL | 0:d92f9d21154c | 12116 | WOLFSSL_MSG("wolfSSL_RSA_public_decrypt"); |
wolfSSL | 0:d92f9d21154c | 12117 | |
wolfSSL | 0:d92f9d21154c | 12118 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 12119 | } |
wolfSSL | 0:d92f9d21154c | 12120 | |
wolfSSL | 0:d92f9d21154c | 12121 | |
wolfSSL | 0:d92f9d21154c | 12122 | /* generate p-1 and q-1, SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 12123 | int wolfSSL_RSA_GenAdd(WOLFSSL_RSA* rsa) |
wolfSSL | 0:d92f9d21154c | 12124 | { |
wolfSSL | 0:d92f9d21154c | 12125 | int err; |
wolfSSL | 0:d92f9d21154c | 12126 | mp_int tmp; |
wolfSSL | 0:d92f9d21154c | 12127 | |
wolfSSL | 0:d92f9d21154c | 12128 | WOLFSSL_MSG("wolfSSL_RsaGenAdd"); |
wolfSSL | 0:d92f9d21154c | 12129 | |
wolfSSL | 0:d92f9d21154c | 12130 | if (rsa == NULL || rsa->p == NULL || rsa->q == NULL || rsa->d == NULL || |
wolfSSL | 0:d92f9d21154c | 12131 | rsa->dmp1 == NULL || rsa->dmq1 == NULL) { |
wolfSSL | 0:d92f9d21154c | 12132 | WOLFSSL_MSG("rsa no init error"); |
wolfSSL | 0:d92f9d21154c | 12133 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 12134 | } |
wolfSSL | 0:d92f9d21154c | 12135 | |
wolfSSL | 0:d92f9d21154c | 12136 | if (mp_init(&tmp) != MP_OKAY) { |
wolfSSL | 0:d92f9d21154c | 12137 | WOLFSSL_MSG("mp_init error"); |
wolfSSL | 0:d92f9d21154c | 12138 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 12139 | } |
wolfSSL | 0:d92f9d21154c | 12140 | |
wolfSSL | 0:d92f9d21154c | 12141 | err = mp_sub_d((mp_int*)rsa->p->internal, 1, &tmp); |
wolfSSL | 0:d92f9d21154c | 12142 | if (err != MP_OKAY) { |
wolfSSL | 0:d92f9d21154c | 12143 | WOLFSSL_MSG("mp_sub_d error"); |
wolfSSL | 0:d92f9d21154c | 12144 | } |
wolfSSL | 0:d92f9d21154c | 12145 | else |
wolfSSL | 0:d92f9d21154c | 12146 | err = mp_mod((mp_int*)rsa->d->internal, &tmp, |
wolfSSL | 0:d92f9d21154c | 12147 | (mp_int*)rsa->dmp1->internal); |
wolfSSL | 0:d92f9d21154c | 12148 | |
wolfSSL | 0:d92f9d21154c | 12149 | if (err != MP_OKAY) { |
wolfSSL | 0:d92f9d21154c | 12150 | WOLFSSL_MSG("mp_mod error"); |
wolfSSL | 0:d92f9d21154c | 12151 | } |
wolfSSL | 0:d92f9d21154c | 12152 | else |
wolfSSL | 0:d92f9d21154c | 12153 | err = mp_sub_d((mp_int*)rsa->q->internal, 1, &tmp); |
wolfSSL | 0:d92f9d21154c | 12154 | if (err != MP_OKAY) { |
wolfSSL | 0:d92f9d21154c | 12155 | WOLFSSL_MSG("mp_sub_d error"); |
wolfSSL | 0:d92f9d21154c | 12156 | } |
wolfSSL | 0:d92f9d21154c | 12157 | else |
wolfSSL | 0:d92f9d21154c | 12158 | err = mp_mod((mp_int*)rsa->d->internal, &tmp, |
wolfSSL | 0:d92f9d21154c | 12159 | (mp_int*)rsa->dmq1->internal); |
wolfSSL | 0:d92f9d21154c | 12160 | |
wolfSSL | 0:d92f9d21154c | 12161 | mp_clear(&tmp); |
wolfSSL | 0:d92f9d21154c | 12162 | |
wolfSSL | 0:d92f9d21154c | 12163 | if (err == MP_OKAY) |
wolfSSL | 0:d92f9d21154c | 12164 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 12165 | else |
wolfSSL | 0:d92f9d21154c | 12166 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 12167 | } |
wolfSSL | 0:d92f9d21154c | 12168 | #endif /* NO_RSA */ |
wolfSSL | 0:d92f9d21154c | 12169 | |
wolfSSL | 0:d92f9d21154c | 12170 | |
wolfSSL | 0:d92f9d21154c | 12171 | void wolfSSL_HMAC_Init(WOLFSSL_HMAC_CTX* ctx, const void* key, int keylen, |
wolfSSL | 0:d92f9d21154c | 12172 | const EVP_MD* type) |
wolfSSL | 0:d92f9d21154c | 12173 | { |
wolfSSL | 0:d92f9d21154c | 12174 | WOLFSSL_MSG("wolfSSL_HMAC_Init"); |
wolfSSL | 0:d92f9d21154c | 12175 | |
wolfSSL | 0:d92f9d21154c | 12176 | if (ctx == NULL) { |
wolfSSL | 0:d92f9d21154c | 12177 | WOLFSSL_MSG("no ctx on init"); |
wolfSSL | 0:d92f9d21154c | 12178 | return; |
wolfSSL | 0:d92f9d21154c | 12179 | } |
wolfSSL | 0:d92f9d21154c | 12180 | |
wolfSSL | 0:d92f9d21154c | 12181 | if (type) { |
wolfSSL | 0:d92f9d21154c | 12182 | WOLFSSL_MSG("init has type"); |
wolfSSL | 0:d92f9d21154c | 12183 | |
wolfSSL | 0:d92f9d21154c | 12184 | if (XSTRNCMP(type, "MD5", 3) == 0) { |
wolfSSL | 0:d92f9d21154c | 12185 | WOLFSSL_MSG("md5 hmac"); |
wolfSSL | 0:d92f9d21154c | 12186 | ctx->type = MD5; |
wolfSSL | 0:d92f9d21154c | 12187 | } |
wolfSSL | 0:d92f9d21154c | 12188 | else if (XSTRNCMP(type, "SHA256", 6) == 0) { |
wolfSSL | 0:d92f9d21154c | 12189 | WOLFSSL_MSG("sha256 hmac"); |
wolfSSL | 0:d92f9d21154c | 12190 | ctx->type = SHA256; |
wolfSSL | 0:d92f9d21154c | 12191 | } |
wolfSSL | 0:d92f9d21154c | 12192 | |
wolfSSL | 0:d92f9d21154c | 12193 | /* has to be last since would pick or 256, 384, or 512 too */ |
wolfSSL | 0:d92f9d21154c | 12194 | else if (XSTRNCMP(type, "SHA", 3) == 0) { |
wolfSSL | 0:d92f9d21154c | 12195 | WOLFSSL_MSG("sha hmac"); |
wolfSSL | 0:d92f9d21154c | 12196 | ctx->type = SHA; |
wolfSSL | 0:d92f9d21154c | 12197 | } |
wolfSSL | 0:d92f9d21154c | 12198 | else { |
wolfSSL | 0:d92f9d21154c | 12199 | WOLFSSL_MSG("bad init type"); |
wolfSSL | 0:d92f9d21154c | 12200 | } |
wolfSSL | 0:d92f9d21154c | 12201 | } |
wolfSSL | 0:d92f9d21154c | 12202 | |
wolfSSL | 0:d92f9d21154c | 12203 | if (key && keylen) { |
wolfSSL | 0:d92f9d21154c | 12204 | WOLFSSL_MSG("keying hmac"); |
wolfSSL | 0:d92f9d21154c | 12205 | wc_HmacSetKey(&ctx->hmac, ctx->type, (const byte*)key, (word32)keylen); |
wolfSSL | 0:d92f9d21154c | 12206 | /* OpenSSL compat, no error */ |
wolfSSL | 0:d92f9d21154c | 12207 | } |
wolfSSL | 0:d92f9d21154c | 12208 | } |
wolfSSL | 0:d92f9d21154c | 12209 | |
wolfSSL | 0:d92f9d21154c | 12210 | |
wolfSSL | 0:d92f9d21154c | 12211 | void wolfSSL_HMAC_Update(WOLFSSL_HMAC_CTX* ctx, const unsigned char* data, |
wolfSSL | 0:d92f9d21154c | 12212 | int len) |
wolfSSL | 0:d92f9d21154c | 12213 | { |
wolfSSL | 0:d92f9d21154c | 12214 | WOLFSSL_MSG("wolfSSL_HMAC_Update"); |
wolfSSL | 0:d92f9d21154c | 12215 | |
wolfSSL | 0:d92f9d21154c | 12216 | if (ctx && data) { |
wolfSSL | 0:d92f9d21154c | 12217 | WOLFSSL_MSG("updating hmac"); |
wolfSSL | 0:d92f9d21154c | 12218 | wc_HmacUpdate(&ctx->hmac, data, (word32)len); |
wolfSSL | 0:d92f9d21154c | 12219 | /* OpenSSL compat, no error */ |
wolfSSL | 0:d92f9d21154c | 12220 | } |
wolfSSL | 0:d92f9d21154c | 12221 | } |
wolfSSL | 0:d92f9d21154c | 12222 | |
wolfSSL | 0:d92f9d21154c | 12223 | |
wolfSSL | 0:d92f9d21154c | 12224 | void wolfSSL_HMAC_Final(WOLFSSL_HMAC_CTX* ctx, unsigned char* hash, |
wolfSSL | 0:d92f9d21154c | 12225 | unsigned int* len) |
wolfSSL | 0:d92f9d21154c | 12226 | { |
wolfSSL | 0:d92f9d21154c | 12227 | WOLFSSL_MSG("wolfSSL_HMAC_Final"); |
wolfSSL | 0:d92f9d21154c | 12228 | |
wolfSSL | 0:d92f9d21154c | 12229 | if (ctx && hash) { |
wolfSSL | 0:d92f9d21154c | 12230 | WOLFSSL_MSG("final hmac"); |
wolfSSL | 0:d92f9d21154c | 12231 | wc_HmacFinal(&ctx->hmac, hash); |
wolfSSL | 0:d92f9d21154c | 12232 | /* OpenSSL compat, no error */ |
wolfSSL | 0:d92f9d21154c | 12233 | |
wolfSSL | 0:d92f9d21154c | 12234 | if (len) { |
wolfSSL | 0:d92f9d21154c | 12235 | WOLFSSL_MSG("setting output len"); |
wolfSSL | 0:d92f9d21154c | 12236 | switch (ctx->type) { |
wolfSSL | 0:d92f9d21154c | 12237 | case MD5: |
wolfSSL | 0:d92f9d21154c | 12238 | *len = MD5_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 12239 | break; |
wolfSSL | 0:d92f9d21154c | 12240 | |
wolfSSL | 0:d92f9d21154c | 12241 | case SHA: |
wolfSSL | 0:d92f9d21154c | 12242 | *len = SHA_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 12243 | break; |
wolfSSL | 0:d92f9d21154c | 12244 | |
wolfSSL | 0:d92f9d21154c | 12245 | case SHA256: |
wolfSSL | 0:d92f9d21154c | 12246 | *len = SHA256_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 12247 | break; |
wolfSSL | 0:d92f9d21154c | 12248 | |
wolfSSL | 0:d92f9d21154c | 12249 | default: |
wolfSSL | 0:d92f9d21154c | 12250 | WOLFSSL_MSG("bad hmac type"); |
wolfSSL | 0:d92f9d21154c | 12251 | } |
wolfSSL | 0:d92f9d21154c | 12252 | } |
wolfSSL | 0:d92f9d21154c | 12253 | } |
wolfSSL | 0:d92f9d21154c | 12254 | } |
wolfSSL | 0:d92f9d21154c | 12255 | |
wolfSSL | 0:d92f9d21154c | 12256 | |
wolfSSL | 0:d92f9d21154c | 12257 | void wolfSSL_HMAC_cleanup(WOLFSSL_HMAC_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 12258 | { |
wolfSSL | 0:d92f9d21154c | 12259 | (void)ctx; |
wolfSSL | 0:d92f9d21154c | 12260 | |
wolfSSL | 0:d92f9d21154c | 12261 | WOLFSSL_MSG("wolfSSL_HMAC_cleanup"); |
wolfSSL | 0:d92f9d21154c | 12262 | } |
wolfSSL | 0:d92f9d21154c | 12263 | |
wolfSSL | 0:d92f9d21154c | 12264 | |
wolfSSL | 0:d92f9d21154c | 12265 | const WOLFSSL_EVP_MD* wolfSSL_EVP_get_digestbynid(int id) |
wolfSSL | 0:d92f9d21154c | 12266 | { |
wolfSSL | 0:d92f9d21154c | 12267 | WOLFSSL_MSG("wolfSSL_get_digestbynid"); |
wolfSSL | 0:d92f9d21154c | 12268 | |
wolfSSL | 0:d92f9d21154c | 12269 | switch(id) { |
wolfSSL | 0:d92f9d21154c | 12270 | #ifndef NO_MD5 |
wolfSSL | 0:d92f9d21154c | 12271 | case NID_md5: |
wolfSSL | 0:d92f9d21154c | 12272 | return wolfSSL_EVP_md5(); |
wolfSSL | 0:d92f9d21154c | 12273 | #endif |
wolfSSL | 0:d92f9d21154c | 12274 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 12275 | case NID_sha1: |
wolfSSL | 0:d92f9d21154c | 12276 | return wolfSSL_EVP_sha1(); |
wolfSSL | 0:d92f9d21154c | 12277 | #endif |
wolfSSL | 0:d92f9d21154c | 12278 | default: |
wolfSSL | 0:d92f9d21154c | 12279 | WOLFSSL_MSG("Bad digest id value"); |
wolfSSL | 0:d92f9d21154c | 12280 | } |
wolfSSL | 0:d92f9d21154c | 12281 | |
wolfSSL | 0:d92f9d21154c | 12282 | return NULL; |
wolfSSL | 0:d92f9d21154c | 12283 | } |
wolfSSL | 0:d92f9d21154c | 12284 | |
wolfSSL | 0:d92f9d21154c | 12285 | |
wolfSSL | 0:d92f9d21154c | 12286 | WOLFSSL_RSA* wolfSSL_EVP_PKEY_get1_RSA(WOLFSSL_EVP_PKEY* key) |
wolfSSL | 0:d92f9d21154c | 12287 | { |
wolfSSL | 0:d92f9d21154c | 12288 | (void)key; |
wolfSSL | 0:d92f9d21154c | 12289 | WOLFSSL_MSG("wolfSSL_EVP_PKEY_get1_RSA"); |
wolfSSL | 0:d92f9d21154c | 12290 | |
wolfSSL | 0:d92f9d21154c | 12291 | return NULL; |
wolfSSL | 0:d92f9d21154c | 12292 | } |
wolfSSL | 0:d92f9d21154c | 12293 | |
wolfSSL | 0:d92f9d21154c | 12294 | |
wolfSSL | 0:d92f9d21154c | 12295 | WOLFSSL_DSA* wolfSSL_EVP_PKEY_get1_DSA(WOLFSSL_EVP_PKEY* key) |
wolfSSL | 0:d92f9d21154c | 12296 | { |
wolfSSL | 0:d92f9d21154c | 12297 | (void)key; |
wolfSSL | 0:d92f9d21154c | 12298 | WOLFSSL_MSG("wolfSSL_EVP_PKEY_get1_DSA"); |
wolfSSL | 0:d92f9d21154c | 12299 | |
wolfSSL | 0:d92f9d21154c | 12300 | return NULL; |
wolfSSL | 0:d92f9d21154c | 12301 | } |
wolfSSL | 0:d92f9d21154c | 12302 | |
wolfSSL | 0:d92f9d21154c | 12303 | |
wolfSSL | 0:d92f9d21154c | 12304 | void* wolfSSL_EVP_X_STATE(const WOLFSSL_EVP_CIPHER_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 12305 | { |
wolfSSL | 0:d92f9d21154c | 12306 | WOLFSSL_MSG("wolfSSL_EVP_X_STATE"); |
wolfSSL | 0:d92f9d21154c | 12307 | |
wolfSSL | 0:d92f9d21154c | 12308 | if (ctx) { |
wolfSSL | 0:d92f9d21154c | 12309 | switch (ctx->cipherType) { |
wolfSSL | 0:d92f9d21154c | 12310 | case ARC4_TYPE: |
wolfSSL | 0:d92f9d21154c | 12311 | WOLFSSL_MSG("returning arc4 state"); |
wolfSSL | 0:d92f9d21154c | 12312 | return (void*)&ctx->cipher.arc4.x; |
wolfSSL | 0:d92f9d21154c | 12313 | |
wolfSSL | 0:d92f9d21154c | 12314 | default: |
wolfSSL | 0:d92f9d21154c | 12315 | WOLFSSL_MSG("bad x state type"); |
wolfSSL | 0:d92f9d21154c | 12316 | return 0; |
wolfSSL | 0:d92f9d21154c | 12317 | } |
wolfSSL | 0:d92f9d21154c | 12318 | } |
wolfSSL | 0:d92f9d21154c | 12319 | |
wolfSSL | 0:d92f9d21154c | 12320 | return NULL; |
wolfSSL | 0:d92f9d21154c | 12321 | } |
wolfSSL | 0:d92f9d21154c | 12322 | |
wolfSSL | 0:d92f9d21154c | 12323 | |
wolfSSL | 0:d92f9d21154c | 12324 | int wolfSSL_EVP_X_STATE_LEN(const WOLFSSL_EVP_CIPHER_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 12325 | { |
wolfSSL | 0:d92f9d21154c | 12326 | WOLFSSL_MSG("wolfSSL_EVP_X_STATE_LEN"); |
wolfSSL | 0:d92f9d21154c | 12327 | |
wolfSSL | 0:d92f9d21154c | 12328 | if (ctx) { |
wolfSSL | 0:d92f9d21154c | 12329 | switch (ctx->cipherType) { |
wolfSSL | 0:d92f9d21154c | 12330 | case ARC4_TYPE: |
wolfSSL | 0:d92f9d21154c | 12331 | WOLFSSL_MSG("returning arc4 state size"); |
wolfSSL | 0:d92f9d21154c | 12332 | return sizeof(Arc4); |
wolfSSL | 0:d92f9d21154c | 12333 | |
wolfSSL | 0:d92f9d21154c | 12334 | default: |
wolfSSL | 0:d92f9d21154c | 12335 | WOLFSSL_MSG("bad x state type"); |
wolfSSL | 0:d92f9d21154c | 12336 | return 0; |
wolfSSL | 0:d92f9d21154c | 12337 | } |
wolfSSL | 0:d92f9d21154c | 12338 | } |
wolfSSL | 0:d92f9d21154c | 12339 | |
wolfSSL | 0:d92f9d21154c | 12340 | return 0; |
wolfSSL | 0:d92f9d21154c | 12341 | } |
wolfSSL | 0:d92f9d21154c | 12342 | |
wolfSSL | 0:d92f9d21154c | 12343 | |
wolfSSL | 0:d92f9d21154c | 12344 | #ifndef NO_DES3 |
wolfSSL | 0:d92f9d21154c | 12345 | |
wolfSSL | 0:d92f9d21154c | 12346 | void wolfSSL_3des_iv(WOLFSSL_EVP_CIPHER_CTX* ctx, int doset, |
wolfSSL | 0:d92f9d21154c | 12347 | unsigned char* iv, int len) |
wolfSSL | 0:d92f9d21154c | 12348 | { |
wolfSSL | 0:d92f9d21154c | 12349 | (void)len; |
wolfSSL | 0:d92f9d21154c | 12350 | |
wolfSSL | 0:d92f9d21154c | 12351 | WOLFSSL_MSG("wolfSSL_3des_iv"); |
wolfSSL | 0:d92f9d21154c | 12352 | |
wolfSSL | 0:d92f9d21154c | 12353 | if (ctx == NULL || iv == NULL) { |
wolfSSL | 0:d92f9d21154c | 12354 | WOLFSSL_MSG("Bad function argument"); |
wolfSSL | 0:d92f9d21154c | 12355 | return; |
wolfSSL | 0:d92f9d21154c | 12356 | } |
wolfSSL | 0:d92f9d21154c | 12357 | |
wolfSSL | 0:d92f9d21154c | 12358 | if (doset) |
wolfSSL | 0:d92f9d21154c | 12359 | wc_Des3_SetIV(&ctx->cipher.des3, iv); /* OpenSSL compat, no ret */ |
wolfSSL | 0:d92f9d21154c | 12360 | else |
wolfSSL | 0:d92f9d21154c | 12361 | memcpy(iv, &ctx->cipher.des3.reg, DES_BLOCK_SIZE); |
wolfSSL | 0:d92f9d21154c | 12362 | } |
wolfSSL | 0:d92f9d21154c | 12363 | |
wolfSSL | 0:d92f9d21154c | 12364 | #endif /* NO_DES3 */ |
wolfSSL | 0:d92f9d21154c | 12365 | |
wolfSSL | 0:d92f9d21154c | 12366 | |
wolfSSL | 0:d92f9d21154c | 12367 | #ifndef NO_AES |
wolfSSL | 0:d92f9d21154c | 12368 | |
wolfSSL | 0:d92f9d21154c | 12369 | void wolfSSL_aes_ctr_iv(WOLFSSL_EVP_CIPHER_CTX* ctx, int doset, |
wolfSSL | 0:d92f9d21154c | 12370 | unsigned char* iv, int len) |
wolfSSL | 0:d92f9d21154c | 12371 | { |
wolfSSL | 0:d92f9d21154c | 12372 | (void)len; |
wolfSSL | 0:d92f9d21154c | 12373 | |
wolfSSL | 0:d92f9d21154c | 12374 | WOLFSSL_MSG("wolfSSL_aes_ctr_iv"); |
wolfSSL | 0:d92f9d21154c | 12375 | |
wolfSSL | 0:d92f9d21154c | 12376 | if (ctx == NULL || iv == NULL) { |
wolfSSL | 0:d92f9d21154c | 12377 | WOLFSSL_MSG("Bad function argument"); |
wolfSSL | 0:d92f9d21154c | 12378 | return; |
wolfSSL | 0:d92f9d21154c | 12379 | } |
wolfSSL | 0:d92f9d21154c | 12380 | |
wolfSSL | 0:d92f9d21154c | 12381 | if (doset) |
wolfSSL | 0:d92f9d21154c | 12382 | wc_AesSetIV(&ctx->cipher.aes, iv); /* OpenSSL compat, no ret */ |
wolfSSL | 0:d92f9d21154c | 12383 | else |
wolfSSL | 0:d92f9d21154c | 12384 | memcpy(iv, &ctx->cipher.aes.reg, AES_BLOCK_SIZE); |
wolfSSL | 0:d92f9d21154c | 12385 | } |
wolfSSL | 0:d92f9d21154c | 12386 | |
wolfSSL | 0:d92f9d21154c | 12387 | #endif /* NO_AES */ |
wolfSSL | 0:d92f9d21154c | 12388 | |
wolfSSL | 0:d92f9d21154c | 12389 | |
wolfSSL | 0:d92f9d21154c | 12390 | const WOLFSSL_EVP_MD* wolfSSL_EVP_ripemd160(void) |
wolfSSL | 0:d92f9d21154c | 12391 | { |
wolfSSL | 0:d92f9d21154c | 12392 | WOLFSSL_MSG("wolfSSL_ripemd160"); |
wolfSSL | 0:d92f9d21154c | 12393 | |
wolfSSL | 0:d92f9d21154c | 12394 | return NULL; |
wolfSSL | 0:d92f9d21154c | 12395 | } |
wolfSSL | 0:d92f9d21154c | 12396 | |
wolfSSL | 0:d92f9d21154c | 12397 | |
wolfSSL | 0:d92f9d21154c | 12398 | int wolfSSL_EVP_MD_size(const WOLFSSL_EVP_MD* type) |
wolfSSL | 0:d92f9d21154c | 12399 | { |
wolfSSL | 0:d92f9d21154c | 12400 | WOLFSSL_MSG("wolfSSL_EVP_MD_size"); |
wolfSSL | 0:d92f9d21154c | 12401 | |
wolfSSL | 0:d92f9d21154c | 12402 | if (type == NULL) { |
wolfSSL | 0:d92f9d21154c | 12403 | WOLFSSL_MSG("No md type arg"); |
wolfSSL | 0:d92f9d21154c | 12404 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 12405 | } |
wolfSSL | 0:d92f9d21154c | 12406 | |
wolfSSL | 0:d92f9d21154c | 12407 | if (XSTRNCMP(type, "SHA256", 6) == 0) { |
wolfSSL | 0:d92f9d21154c | 12408 | return SHA256_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 12409 | } |
wolfSSL | 0:d92f9d21154c | 12410 | #ifndef NO_MD5 |
wolfSSL | 0:d92f9d21154c | 12411 | else if (XSTRNCMP(type, "MD5", 3) == 0) { |
wolfSSL | 0:d92f9d21154c | 12412 | return MD5_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 12413 | } |
wolfSSL | 0:d92f9d21154c | 12414 | #endif |
wolfSSL | 0:d92f9d21154c | 12415 | #ifdef WOLFSSL_SHA384 |
wolfSSL | 0:d92f9d21154c | 12416 | else if (XSTRNCMP(type, "SHA384", 6) == 0) { |
wolfSSL | 0:d92f9d21154c | 12417 | return SHA384_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 12418 | } |
wolfSSL | 0:d92f9d21154c | 12419 | #endif |
wolfSSL | 0:d92f9d21154c | 12420 | #ifdef WOLFSSL_SHA512 |
wolfSSL | 0:d92f9d21154c | 12421 | else if (XSTRNCMP(type, "SHA512", 6) == 0) { |
wolfSSL | 0:d92f9d21154c | 12422 | return SHA512_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 12423 | } |
wolfSSL | 0:d92f9d21154c | 12424 | #endif |
wolfSSL | 0:d92f9d21154c | 12425 | #ifndef NO_SHA |
wolfSSL | 0:d92f9d21154c | 12426 | /* has to be last since would pick or 256, 384, or 512 too */ |
wolfSSL | 0:d92f9d21154c | 12427 | else if (XSTRNCMP(type, "SHA", 3) == 0) { |
wolfSSL | 0:d92f9d21154c | 12428 | return SHA_DIGEST_SIZE; |
wolfSSL | 0:d92f9d21154c | 12429 | } |
wolfSSL | 0:d92f9d21154c | 12430 | #endif |
wolfSSL | 0:d92f9d21154c | 12431 | |
wolfSSL | 0:d92f9d21154c | 12432 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 12433 | } |
wolfSSL | 0:d92f9d21154c | 12434 | |
wolfSSL | 0:d92f9d21154c | 12435 | |
wolfSSL | 0:d92f9d21154c | 12436 | int wolfSSL_EVP_CIPHER_CTX_iv_length(const WOLFSSL_EVP_CIPHER_CTX* ctx) |
wolfSSL | 0:d92f9d21154c | 12437 | { |
wolfSSL | 0:d92f9d21154c | 12438 | WOLFSSL_MSG("wolfSSL_EVP_CIPHER_CTX_iv_length"); |
wolfSSL | 0:d92f9d21154c | 12439 | |
wolfSSL | 0:d92f9d21154c | 12440 | switch (ctx->cipherType) { |
wolfSSL | 0:d92f9d21154c | 12441 | |
wolfSSL | 0:d92f9d21154c | 12442 | case AES_128_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 12443 | case AES_192_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 12444 | case AES_256_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 12445 | WOLFSSL_MSG("AES CBC"); |
wolfSSL | 0:d92f9d21154c | 12446 | return AES_BLOCK_SIZE; |
wolfSSL | 0:d92f9d21154c | 12447 | |
wolfSSL | 0:d92f9d21154c | 12448 | #ifdef WOLFSSL_AES_COUNTER |
wolfSSL | 0:d92f9d21154c | 12449 | case AES_128_CTR_TYPE : |
wolfSSL | 0:d92f9d21154c | 12450 | case AES_192_CTR_TYPE : |
wolfSSL | 0:d92f9d21154c | 12451 | case AES_256_CTR_TYPE : |
wolfSSL | 0:d92f9d21154c | 12452 | WOLFSSL_MSG("AES CTR"); |
wolfSSL | 0:d92f9d21154c | 12453 | return AES_BLOCK_SIZE; |
wolfSSL | 0:d92f9d21154c | 12454 | #endif |
wolfSSL | 0:d92f9d21154c | 12455 | |
wolfSSL | 0:d92f9d21154c | 12456 | case DES_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 12457 | WOLFSSL_MSG("DES CBC"); |
wolfSSL | 0:d92f9d21154c | 12458 | return DES_BLOCK_SIZE; |
wolfSSL | 0:d92f9d21154c | 12459 | |
wolfSSL | 0:d92f9d21154c | 12460 | case DES_EDE3_CBC_TYPE : |
wolfSSL | 0:d92f9d21154c | 12461 | WOLFSSL_MSG("DES EDE3 CBC"); |
wolfSSL | 0:d92f9d21154c | 12462 | return DES_BLOCK_SIZE; |
wolfSSL | 0:d92f9d21154c | 12463 | |
wolfSSL | 0:d92f9d21154c | 12464 | case ARC4_TYPE : |
wolfSSL | 0:d92f9d21154c | 12465 | WOLFSSL_MSG("ARC4"); |
wolfSSL | 0:d92f9d21154c | 12466 | return 0; |
wolfSSL | 0:d92f9d21154c | 12467 | |
wolfSSL | 0:d92f9d21154c | 12468 | case NULL_CIPHER_TYPE : |
wolfSSL | 0:d92f9d21154c | 12469 | WOLFSSL_MSG("NULL"); |
wolfSSL | 0:d92f9d21154c | 12470 | return 0; |
wolfSSL | 0:d92f9d21154c | 12471 | |
wolfSSL | 0:d92f9d21154c | 12472 | default: { |
wolfSSL | 0:d92f9d21154c | 12473 | WOLFSSL_MSG("bad type"); |
wolfSSL | 0:d92f9d21154c | 12474 | } |
wolfSSL | 0:d92f9d21154c | 12475 | } |
wolfSSL | 0:d92f9d21154c | 12476 | return 0; |
wolfSSL | 0:d92f9d21154c | 12477 | } |
wolfSSL | 0:d92f9d21154c | 12478 | |
wolfSSL | 0:d92f9d21154c | 12479 | |
wolfSSL | 0:d92f9d21154c | 12480 | void wolfSSL_OPENSSL_free(void* p) |
wolfSSL | 0:d92f9d21154c | 12481 | { |
wolfSSL | 0:d92f9d21154c | 12482 | WOLFSSL_MSG("wolfSSL_OPENSSL_free"); |
wolfSSL | 0:d92f9d21154c | 12483 | |
wolfSSL | 0:d92f9d21154c | 12484 | XFREE(p, NULL, 0); |
wolfSSL | 0:d92f9d21154c | 12485 | } |
wolfSSL | 0:d92f9d21154c | 12486 | |
wolfSSL | 0:d92f9d21154c | 12487 | |
wolfSSL | 0:d92f9d21154c | 12488 | int wolfSSL_PEM_write_bio_RSAPrivateKey(WOLFSSL_BIO* bio, RSA* rsa, |
wolfSSL | 0:d92f9d21154c | 12489 | const EVP_CIPHER* cipher, |
wolfSSL | 0:d92f9d21154c | 12490 | unsigned char* passwd, int len, |
wolfSSL | 0:d92f9d21154c | 12491 | pem_password_cb cb, void* arg) |
wolfSSL | 0:d92f9d21154c | 12492 | { |
wolfSSL | 0:d92f9d21154c | 12493 | (void)bio; |
wolfSSL | 0:d92f9d21154c | 12494 | (void)rsa; |
wolfSSL | 0:d92f9d21154c | 12495 | (void)cipher; |
wolfSSL | 0:d92f9d21154c | 12496 | (void)passwd; |
wolfSSL | 0:d92f9d21154c | 12497 | (void)len; |
wolfSSL | 0:d92f9d21154c | 12498 | (void)cb; |
wolfSSL | 0:d92f9d21154c | 12499 | (void)arg; |
wolfSSL | 0:d92f9d21154c | 12500 | |
wolfSSL | 0:d92f9d21154c | 12501 | WOLFSSL_MSG("wolfSSL_PEM_write_bio_RSAPrivateKey"); |
wolfSSL | 0:d92f9d21154c | 12502 | |
wolfSSL | 0:d92f9d21154c | 12503 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 12504 | } |
wolfSSL | 0:d92f9d21154c | 12505 | |
wolfSSL | 0:d92f9d21154c | 12506 | |
wolfSSL | 0:d92f9d21154c | 12507 | |
wolfSSL | 0:d92f9d21154c | 12508 | int wolfSSL_PEM_write_bio_DSAPrivateKey(WOLFSSL_BIO* bio, DSA* rsa, |
wolfSSL | 0:d92f9d21154c | 12509 | const EVP_CIPHER* cipher, |
wolfSSL | 0:d92f9d21154c | 12510 | unsigned char* passwd, int len, |
wolfSSL | 0:d92f9d21154c | 12511 | pem_password_cb cb, void* arg) |
wolfSSL | 0:d92f9d21154c | 12512 | { |
wolfSSL | 0:d92f9d21154c | 12513 | (void)bio; |
wolfSSL | 0:d92f9d21154c | 12514 | (void)rsa; |
wolfSSL | 0:d92f9d21154c | 12515 | (void)cipher; |
wolfSSL | 0:d92f9d21154c | 12516 | (void)passwd; |
wolfSSL | 0:d92f9d21154c | 12517 | (void)len; |
wolfSSL | 0:d92f9d21154c | 12518 | (void)cb; |
wolfSSL | 0:d92f9d21154c | 12519 | (void)arg; |
wolfSSL | 0:d92f9d21154c | 12520 | |
wolfSSL | 0:d92f9d21154c | 12521 | WOLFSSL_MSG("wolfSSL_PEM_write_bio_DSAPrivateKey"); |
wolfSSL | 0:d92f9d21154c | 12522 | |
wolfSSL | 0:d92f9d21154c | 12523 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 12524 | } |
wolfSSL | 0:d92f9d21154c | 12525 | |
wolfSSL | 0:d92f9d21154c | 12526 | |
wolfSSL | 0:d92f9d21154c | 12527 | |
wolfSSL | 0:d92f9d21154c | 12528 | WOLFSSL_EVP_PKEY* wolfSSL_PEM_read_bio_PrivateKey(WOLFSSL_BIO* bio, |
wolfSSL | 0:d92f9d21154c | 12529 | WOLFSSL_EVP_PKEY** key, pem_password_cb cb, void* arg) |
wolfSSL | 0:d92f9d21154c | 12530 | { |
wolfSSL | 0:d92f9d21154c | 12531 | (void)bio; |
wolfSSL | 0:d92f9d21154c | 12532 | (void)key; |
wolfSSL | 0:d92f9d21154c | 12533 | (void)cb; |
wolfSSL | 0:d92f9d21154c | 12534 | (void)arg; |
wolfSSL | 0:d92f9d21154c | 12535 | |
wolfSSL | 0:d92f9d21154c | 12536 | WOLFSSL_MSG("wolfSSL_PEM_read_bio_PrivateKey"); |
wolfSSL | 0:d92f9d21154c | 12537 | |
wolfSSL | 0:d92f9d21154c | 12538 | return NULL; |
wolfSSL | 0:d92f9d21154c | 12539 | } |
wolfSSL | 0:d92f9d21154c | 12540 | |
wolfSSL | 0:d92f9d21154c | 12541 | |
wolfSSL | 0:d92f9d21154c | 12542 | |
wolfSSL | 0:d92f9d21154c | 12543 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 12544 | /* Load RSA from Der, SSL_SUCCESS on success < 0 on error */ |
wolfSSL | 0:d92f9d21154c | 12545 | int wolfSSL_RSA_LoadDer(WOLFSSL_RSA* rsa, const unsigned char* der, int derSz) |
wolfSSL | 0:d92f9d21154c | 12546 | { |
wolfSSL | 0:d92f9d21154c | 12547 | word32 idx = 0; |
wolfSSL | 0:d92f9d21154c | 12548 | int ret; |
wolfSSL | 0:d92f9d21154c | 12549 | |
wolfSSL | 0:d92f9d21154c | 12550 | WOLFSSL_ENTER("wolfSSL_RSA_LoadDer"); |
wolfSSL | 0:d92f9d21154c | 12551 | |
wolfSSL | 0:d92f9d21154c | 12552 | if (rsa == NULL || rsa->internal == NULL || der == NULL || derSz <= 0) { |
wolfSSL | 0:d92f9d21154c | 12553 | WOLFSSL_MSG("Bad function arguments"); |
wolfSSL | 0:d92f9d21154c | 12554 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 12555 | } |
wolfSSL | 0:d92f9d21154c | 12556 | |
wolfSSL | 0:d92f9d21154c | 12557 | ret = wc_RsaPrivateKeyDecode(der, &idx, (RsaKey*)rsa->internal, derSz); |
wolfSSL | 0:d92f9d21154c | 12558 | if (ret < 0) { |
wolfSSL | 0:d92f9d21154c | 12559 | WOLFSSL_MSG("RsaPrivateKeyDecode failed"); |
wolfSSL | 0:d92f9d21154c | 12560 | return ret; |
wolfSSL | 0:d92f9d21154c | 12561 | } |
wolfSSL | 0:d92f9d21154c | 12562 | |
wolfSSL | 0:d92f9d21154c | 12563 | if (SetRsaExternal(rsa) < 0) { |
wolfSSL | 0:d92f9d21154c | 12564 | WOLFSSL_MSG("SetRsaExternal failed"); |
wolfSSL | 0:d92f9d21154c | 12565 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 12566 | } |
wolfSSL | 0:d92f9d21154c | 12567 | |
wolfSSL | 0:d92f9d21154c | 12568 | rsa->inSet = 1; |
wolfSSL | 0:d92f9d21154c | 12569 | |
wolfSSL | 0:d92f9d21154c | 12570 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 12571 | } |
wolfSSL | 0:d92f9d21154c | 12572 | #endif /* NO_RSA */ |
wolfSSL | 0:d92f9d21154c | 12573 | |
wolfSSL | 0:d92f9d21154c | 12574 | |
wolfSSL | 0:d92f9d21154c | 12575 | #ifndef NO_DSA |
wolfSSL | 0:d92f9d21154c | 12576 | /* Load DSA from Der, SSL_SUCCESS on success < 0 on error */ |
wolfSSL | 0:d92f9d21154c | 12577 | int wolfSSL_DSA_LoadDer(WOLFSSL_DSA* dsa, const unsigned char* der, int derSz) |
wolfSSL | 0:d92f9d21154c | 12578 | { |
wolfSSL | 0:d92f9d21154c | 12579 | word32 idx = 0; |
wolfSSL | 0:d92f9d21154c | 12580 | int ret; |
wolfSSL | 0:d92f9d21154c | 12581 | |
wolfSSL | 0:d92f9d21154c | 12582 | WOLFSSL_ENTER("wolfSSL_DSA_LoadDer"); |
wolfSSL | 0:d92f9d21154c | 12583 | |
wolfSSL | 0:d92f9d21154c | 12584 | if (dsa == NULL || dsa->internal == NULL || der == NULL || derSz <= 0) { |
wolfSSL | 0:d92f9d21154c | 12585 | WOLFSSL_MSG("Bad function arguments"); |
wolfSSL | 0:d92f9d21154c | 12586 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 12587 | } |
wolfSSL | 0:d92f9d21154c | 12588 | |
wolfSSL | 0:d92f9d21154c | 12589 | ret = DsaPrivateKeyDecode(der, &idx, (DsaKey*)dsa->internal, derSz); |
wolfSSL | 0:d92f9d21154c | 12590 | if (ret < 0) { |
wolfSSL | 0:d92f9d21154c | 12591 | WOLFSSL_MSG("DsaPrivateKeyDecode failed"); |
wolfSSL | 0:d92f9d21154c | 12592 | return ret; |
wolfSSL | 0:d92f9d21154c | 12593 | } |
wolfSSL | 0:d92f9d21154c | 12594 | |
wolfSSL | 0:d92f9d21154c | 12595 | if (SetDsaExternal(dsa) < 0) { |
wolfSSL | 0:d92f9d21154c | 12596 | WOLFSSL_MSG("SetDsaExternal failed"); |
wolfSSL | 0:d92f9d21154c | 12597 | return SSL_FATAL_ERROR; |
wolfSSL | 0:d92f9d21154c | 12598 | } |
wolfSSL | 0:d92f9d21154c | 12599 | |
wolfSSL | 0:d92f9d21154c | 12600 | dsa->inSet = 1; |
wolfSSL | 0:d92f9d21154c | 12601 | |
wolfSSL | 0:d92f9d21154c | 12602 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 12603 | } |
wolfSSL | 0:d92f9d21154c | 12604 | #endif /* NO_DSA */ |
wolfSSL | 0:d92f9d21154c | 12605 | |
wolfSSL | 0:d92f9d21154c | 12606 | |
wolfSSL | 0:d92f9d21154c | 12607 | |
wolfSSL | 0:d92f9d21154c | 12608 | |
wolfSSL | 0:d92f9d21154c | 12609 | #endif /* OPENSSL_EXTRA */ |
wolfSSL | 0:d92f9d21154c | 12610 | |
wolfSSL | 0:d92f9d21154c | 12611 | |
wolfSSL | 0:d92f9d21154c | 12612 | #ifdef SESSION_CERTS |
wolfSSL | 0:d92f9d21154c | 12613 | |
wolfSSL | 0:d92f9d21154c | 12614 | |
wolfSSL | 0:d92f9d21154c | 12615 | /* Get peer's certificate chain */ |
wolfSSL | 0:d92f9d21154c | 12616 | WOLFSSL_X509_CHAIN* wolfSSL_get_peer_chain(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 12617 | { |
wolfSSL | 0:d92f9d21154c | 12618 | WOLFSSL_ENTER("wolfSSL_get_peer_chain"); |
wolfSSL | 0:d92f9d21154c | 12619 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 12620 | return &ssl->session.chain; |
wolfSSL | 0:d92f9d21154c | 12621 | |
wolfSSL | 0:d92f9d21154c | 12622 | return 0; |
wolfSSL | 0:d92f9d21154c | 12623 | } |
wolfSSL | 0:d92f9d21154c | 12624 | |
wolfSSL | 0:d92f9d21154c | 12625 | |
wolfSSL | 0:d92f9d21154c | 12626 | /* Get peer's certificate chain total count */ |
wolfSSL | 0:d92f9d21154c | 12627 | int wolfSSL_get_chain_count(WOLFSSL_X509_CHAIN* chain) |
wolfSSL | 0:d92f9d21154c | 12628 | { |
wolfSSL | 0:d92f9d21154c | 12629 | WOLFSSL_ENTER("wolfSSL_get_chain_count"); |
wolfSSL | 0:d92f9d21154c | 12630 | if (chain) |
wolfSSL | 0:d92f9d21154c | 12631 | return chain->count; |
wolfSSL | 0:d92f9d21154c | 12632 | |
wolfSSL | 0:d92f9d21154c | 12633 | return 0; |
wolfSSL | 0:d92f9d21154c | 12634 | } |
wolfSSL | 0:d92f9d21154c | 12635 | |
wolfSSL | 0:d92f9d21154c | 12636 | |
wolfSSL | 0:d92f9d21154c | 12637 | /* Get peer's ASN.1 DER ceritifcate at index (idx) length in bytes */ |
wolfSSL | 0:d92f9d21154c | 12638 | int wolfSSL_get_chain_length(WOLFSSL_X509_CHAIN* chain, int idx) |
wolfSSL | 0:d92f9d21154c | 12639 | { |
wolfSSL | 0:d92f9d21154c | 12640 | WOLFSSL_ENTER("wolfSSL_get_chain_length"); |
wolfSSL | 0:d92f9d21154c | 12641 | if (chain) |
wolfSSL | 0:d92f9d21154c | 12642 | return chain->certs[idx].length; |
wolfSSL | 0:d92f9d21154c | 12643 | |
wolfSSL | 0:d92f9d21154c | 12644 | return 0; |
wolfSSL | 0:d92f9d21154c | 12645 | } |
wolfSSL | 0:d92f9d21154c | 12646 | |
wolfSSL | 0:d92f9d21154c | 12647 | |
wolfSSL | 0:d92f9d21154c | 12648 | /* Get peer's ASN.1 DER ceritifcate at index (idx) */ |
wolfSSL | 0:d92f9d21154c | 12649 | byte* wolfSSL_get_chain_cert(WOLFSSL_X509_CHAIN* chain, int idx) |
wolfSSL | 0:d92f9d21154c | 12650 | { |
wolfSSL | 0:d92f9d21154c | 12651 | WOLFSSL_ENTER("wolfSSL_get_chain_cert"); |
wolfSSL | 0:d92f9d21154c | 12652 | if (chain) |
wolfSSL | 0:d92f9d21154c | 12653 | return chain->certs[idx].buffer; |
wolfSSL | 0:d92f9d21154c | 12654 | |
wolfSSL | 0:d92f9d21154c | 12655 | return 0; |
wolfSSL | 0:d92f9d21154c | 12656 | } |
wolfSSL | 0:d92f9d21154c | 12657 | |
wolfSSL | 0:d92f9d21154c | 12658 | |
wolfSSL | 0:d92f9d21154c | 12659 | /* Get peer's wolfSSL X509 ceritifcate at index (idx) */ |
wolfSSL | 0:d92f9d21154c | 12660 | WOLFSSL_X509* wolfSSL_get_chain_X509(WOLFSSL_X509_CHAIN* chain, int idx) |
wolfSSL | 0:d92f9d21154c | 12661 | { |
wolfSSL | 0:d92f9d21154c | 12662 | int ret; |
wolfSSL | 0:d92f9d21154c | 12663 | WOLFSSL_X509* x509 = NULL; |
wolfSSL | 0:d92f9d21154c | 12664 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 12665 | DecodedCert* cert = NULL; |
wolfSSL | 0:d92f9d21154c | 12666 | #else |
wolfSSL | 0:d92f9d21154c | 12667 | DecodedCert cert[1]; |
wolfSSL | 0:d92f9d21154c | 12668 | #endif |
wolfSSL | 0:d92f9d21154c | 12669 | |
wolfSSL | 0:d92f9d21154c | 12670 | WOLFSSL_ENTER("wolfSSL_get_chain_X509"); |
wolfSSL | 0:d92f9d21154c | 12671 | if (chain != NULL) { |
wolfSSL | 0:d92f9d21154c | 12672 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 12673 | cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL, |
wolfSSL | 0:d92f9d21154c | 12674 | DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 12675 | if (cert != NULL) |
wolfSSL | 0:d92f9d21154c | 12676 | #endif |
wolfSSL | 0:d92f9d21154c | 12677 | { |
wolfSSL | 0:d92f9d21154c | 12678 | InitDecodedCert(cert, chain->certs[idx].buffer, |
wolfSSL | 0:d92f9d21154c | 12679 | chain->certs[idx].length, NULL); |
wolfSSL | 0:d92f9d21154c | 12680 | |
wolfSSL | 0:d92f9d21154c | 12681 | if ((ret = ParseCertRelative(cert, CERT_TYPE, 0, NULL)) != 0) |
wolfSSL | 0:d92f9d21154c | 12682 | WOLFSSL_MSG("Failed to parse cert"); |
wolfSSL | 0:d92f9d21154c | 12683 | else { |
wolfSSL | 0:d92f9d21154c | 12684 | x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL, |
wolfSSL | 0:d92f9d21154c | 12685 | DYNAMIC_TYPE_X509); |
wolfSSL | 0:d92f9d21154c | 12686 | if (x509 == NULL) { |
wolfSSL | 0:d92f9d21154c | 12687 | WOLFSSL_MSG("Failed alloc X509"); |
wolfSSL | 0:d92f9d21154c | 12688 | } |
wolfSSL | 0:d92f9d21154c | 12689 | else { |
wolfSSL | 0:d92f9d21154c | 12690 | InitX509(x509, 1); |
wolfSSL | 0:d92f9d21154c | 12691 | |
wolfSSL | 0:d92f9d21154c | 12692 | if ((ret = CopyDecodedToX509(x509, cert)) != 0) { |
wolfSSL | 0:d92f9d21154c | 12693 | WOLFSSL_MSG("Failed to copy decoded"); |
wolfSSL | 0:d92f9d21154c | 12694 | XFREE(x509, NULL, DYNAMIC_TYPE_X509); |
wolfSSL | 0:d92f9d21154c | 12695 | x509 = NULL; |
wolfSSL | 0:d92f9d21154c | 12696 | } |
wolfSSL | 0:d92f9d21154c | 12697 | } |
wolfSSL | 0:d92f9d21154c | 12698 | } |
wolfSSL | 0:d92f9d21154c | 12699 | |
wolfSSL | 0:d92f9d21154c | 12700 | FreeDecodedCert(cert); |
wolfSSL | 0:d92f9d21154c | 12701 | #ifdef WOLFSSL_SMALL_STACK |
wolfSSL | 0:d92f9d21154c | 12702 | XFREE(cert, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
wolfSSL | 0:d92f9d21154c | 12703 | #endif |
wolfSSL | 0:d92f9d21154c | 12704 | } |
wolfSSL | 0:d92f9d21154c | 12705 | } |
wolfSSL | 0:d92f9d21154c | 12706 | |
wolfSSL | 0:d92f9d21154c | 12707 | return x509; |
wolfSSL | 0:d92f9d21154c | 12708 | } |
wolfSSL | 0:d92f9d21154c | 12709 | |
wolfSSL | 0:d92f9d21154c | 12710 | |
wolfSSL | 0:d92f9d21154c | 12711 | /* Get peer's PEM ceritifcate at index (idx), output to buffer if inLen big |
wolfSSL | 0:d92f9d21154c | 12712 | enough else return error (-1), output length is in *outLen |
wolfSSL | 0:d92f9d21154c | 12713 | SSL_SUCCESS on ok */ |
wolfSSL | 0:d92f9d21154c | 12714 | int wolfSSL_get_chain_cert_pem(WOLFSSL_X509_CHAIN* chain, int idx, |
wolfSSL | 0:d92f9d21154c | 12715 | unsigned char* buf, int inLen, int* outLen) |
wolfSSL | 0:d92f9d21154c | 12716 | { |
wolfSSL | 0:d92f9d21154c | 12717 | const char header[] = "-----BEGIN CERTIFICATE-----\n"; |
wolfSSL | 0:d92f9d21154c | 12718 | const char footer[] = "-----END CERTIFICATE-----\n"; |
wolfSSL | 0:d92f9d21154c | 12719 | |
wolfSSL | 0:d92f9d21154c | 12720 | int headerLen = sizeof(header) - 1; |
wolfSSL | 0:d92f9d21154c | 12721 | int footerLen = sizeof(footer) - 1; |
wolfSSL | 0:d92f9d21154c | 12722 | int i; |
wolfSSL | 0:d92f9d21154c | 12723 | int err; |
wolfSSL | 0:d92f9d21154c | 12724 | |
wolfSSL | 0:d92f9d21154c | 12725 | WOLFSSL_ENTER("wolfSSL_get_chain_cert_pem"); |
wolfSSL | 0:d92f9d21154c | 12726 | if (!chain || !outLen || !buf) |
wolfSSL | 0:d92f9d21154c | 12727 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 12728 | |
wolfSSL | 0:d92f9d21154c | 12729 | /* don't even try if inLen too short */ |
wolfSSL | 0:d92f9d21154c | 12730 | if (inLen < headerLen + footerLen + chain->certs[idx].length) |
wolfSSL | 0:d92f9d21154c | 12731 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 12732 | |
wolfSSL | 0:d92f9d21154c | 12733 | /* header */ |
wolfSSL | 0:d92f9d21154c | 12734 | XMEMCPY(buf, header, headerLen); |
wolfSSL | 0:d92f9d21154c | 12735 | i = headerLen; |
wolfSSL | 0:d92f9d21154c | 12736 | |
wolfSSL | 0:d92f9d21154c | 12737 | /* body */ |
wolfSSL | 0:d92f9d21154c | 12738 | *outLen = inLen; /* input to Base64_Encode */ |
wolfSSL | 0:d92f9d21154c | 12739 | if ( (err = Base64_Encode(chain->certs[idx].buffer, |
wolfSSL | 0:d92f9d21154c | 12740 | chain->certs[idx].length, buf + i, (word32*)outLen)) < 0) |
wolfSSL | 0:d92f9d21154c | 12741 | return err; |
wolfSSL | 0:d92f9d21154c | 12742 | i += *outLen; |
wolfSSL | 0:d92f9d21154c | 12743 | |
wolfSSL | 0:d92f9d21154c | 12744 | /* footer */ |
wolfSSL | 0:d92f9d21154c | 12745 | if ( (i + footerLen) > inLen) |
wolfSSL | 0:d92f9d21154c | 12746 | return BAD_FUNC_ARG; |
wolfSSL | 0:d92f9d21154c | 12747 | XMEMCPY(buf + i, footer, footerLen); |
wolfSSL | 0:d92f9d21154c | 12748 | *outLen += headerLen + footerLen; |
wolfSSL | 0:d92f9d21154c | 12749 | |
wolfSSL | 0:d92f9d21154c | 12750 | return SSL_SUCCESS; |
wolfSSL | 0:d92f9d21154c | 12751 | } |
wolfSSL | 0:d92f9d21154c | 12752 | |
wolfSSL | 0:d92f9d21154c | 12753 | |
wolfSSL | 0:d92f9d21154c | 12754 | /* get session ID */ |
wolfSSL | 0:d92f9d21154c | 12755 | const byte* wolfSSL_get_sessionID(const WOLFSSL_SESSION* session) |
wolfSSL | 0:d92f9d21154c | 12756 | { |
wolfSSL | 0:d92f9d21154c | 12757 | WOLFSSL_ENTER("wolfSSL_get_sessionID"); |
wolfSSL | 0:d92f9d21154c | 12758 | if (session) |
wolfSSL | 0:d92f9d21154c | 12759 | return session->sessionID; |
wolfSSL | 0:d92f9d21154c | 12760 | |
wolfSSL | 0:d92f9d21154c | 12761 | return NULL; |
wolfSSL | 0:d92f9d21154c | 12762 | } |
wolfSSL | 0:d92f9d21154c | 12763 | |
wolfSSL | 0:d92f9d21154c | 12764 | |
wolfSSL | 0:d92f9d21154c | 12765 | #endif /* SESSION_CERTS */ |
wolfSSL | 0:d92f9d21154c | 12766 | |
wolfSSL | 0:d92f9d21154c | 12767 | #ifdef HAVE_FUZZER |
wolfSSL | 0:d92f9d21154c | 12768 | void wolfSSL_SetFuzzerCb(WOLFSSL* ssl, CallbackFuzzer cbf, void* fCtx) |
wolfSSL | 0:d92f9d21154c | 12769 | { |
wolfSSL | 0:d92f9d21154c | 12770 | if (ssl) { |
wolfSSL | 0:d92f9d21154c | 12771 | ssl->fuzzerCb = cbf; |
wolfSSL | 0:d92f9d21154c | 12772 | ssl->fuzzerCtx = fCtx; |
wolfSSL | 0:d92f9d21154c | 12773 | } |
wolfSSL | 0:d92f9d21154c | 12774 | } |
wolfSSL | 0:d92f9d21154c | 12775 | #endif |
wolfSSL | 0:d92f9d21154c | 12776 | |
wolfSSL | 0:d92f9d21154c | 12777 | #ifndef NO_CERTS |
wolfSSL | 0:d92f9d21154c | 12778 | #ifdef HAVE_PK_CALLBACKS |
wolfSSL | 0:d92f9d21154c | 12779 | |
wolfSSL | 0:d92f9d21154c | 12780 | #ifdef HAVE_ECC |
wolfSSL | 0:d92f9d21154c | 12781 | |
wolfSSL | 0:d92f9d21154c | 12782 | void wolfSSL_CTX_SetEccSignCb(WOLFSSL_CTX* ctx, CallbackEccSign cb) |
wolfSSL | 0:d92f9d21154c | 12783 | { |
wolfSSL | 0:d92f9d21154c | 12784 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 12785 | ctx->EccSignCb = cb; |
wolfSSL | 0:d92f9d21154c | 12786 | } |
wolfSSL | 0:d92f9d21154c | 12787 | |
wolfSSL | 0:d92f9d21154c | 12788 | |
wolfSSL | 0:d92f9d21154c | 12789 | void wolfSSL_SetEccSignCtx(WOLFSSL* ssl, void *ctx) |
wolfSSL | 0:d92f9d21154c | 12790 | { |
wolfSSL | 0:d92f9d21154c | 12791 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 12792 | ssl->EccSignCtx = ctx; |
wolfSSL | 0:d92f9d21154c | 12793 | } |
wolfSSL | 0:d92f9d21154c | 12794 | |
wolfSSL | 0:d92f9d21154c | 12795 | |
wolfSSL | 0:d92f9d21154c | 12796 | void* wolfSSL_GetEccSignCtx(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 12797 | { |
wolfSSL | 0:d92f9d21154c | 12798 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 12799 | return ssl->EccSignCtx; |
wolfSSL | 0:d92f9d21154c | 12800 | |
wolfSSL | 0:d92f9d21154c | 12801 | return NULL; |
wolfSSL | 0:d92f9d21154c | 12802 | } |
wolfSSL | 0:d92f9d21154c | 12803 | |
wolfSSL | 0:d92f9d21154c | 12804 | |
wolfSSL | 0:d92f9d21154c | 12805 | void wolfSSL_CTX_SetEccVerifyCb(WOLFSSL_CTX* ctx, CallbackEccVerify cb) |
wolfSSL | 0:d92f9d21154c | 12806 | { |
wolfSSL | 0:d92f9d21154c | 12807 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 12808 | ctx->EccVerifyCb = cb; |
wolfSSL | 0:d92f9d21154c | 12809 | } |
wolfSSL | 0:d92f9d21154c | 12810 | |
wolfSSL | 0:d92f9d21154c | 12811 | |
wolfSSL | 0:d92f9d21154c | 12812 | void wolfSSL_SetEccVerifyCtx(WOLFSSL* ssl, void *ctx) |
wolfSSL | 0:d92f9d21154c | 12813 | { |
wolfSSL | 0:d92f9d21154c | 12814 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 12815 | ssl->EccVerifyCtx = ctx; |
wolfSSL | 0:d92f9d21154c | 12816 | } |
wolfSSL | 0:d92f9d21154c | 12817 | |
wolfSSL | 0:d92f9d21154c | 12818 | |
wolfSSL | 0:d92f9d21154c | 12819 | void* wolfSSL_GetEccVerifyCtx(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 12820 | { |
wolfSSL | 0:d92f9d21154c | 12821 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 12822 | return ssl->EccVerifyCtx; |
wolfSSL | 0:d92f9d21154c | 12823 | |
wolfSSL | 0:d92f9d21154c | 12824 | return NULL; |
wolfSSL | 0:d92f9d21154c | 12825 | } |
wolfSSL | 0:d92f9d21154c | 12826 | |
wolfSSL | 0:d92f9d21154c | 12827 | #endif /* HAVE_ECC */ |
wolfSSL | 0:d92f9d21154c | 12828 | |
wolfSSL | 0:d92f9d21154c | 12829 | #ifndef NO_RSA |
wolfSSL | 0:d92f9d21154c | 12830 | |
wolfSSL | 0:d92f9d21154c | 12831 | void wolfSSL_CTX_SetRsaSignCb(WOLFSSL_CTX* ctx, CallbackRsaSign cb) |
wolfSSL | 0:d92f9d21154c | 12832 | { |
wolfSSL | 0:d92f9d21154c | 12833 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 12834 | ctx->RsaSignCb = cb; |
wolfSSL | 0:d92f9d21154c | 12835 | } |
wolfSSL | 0:d92f9d21154c | 12836 | |
wolfSSL | 0:d92f9d21154c | 12837 | |
wolfSSL | 0:d92f9d21154c | 12838 | void wolfSSL_SetRsaSignCtx(WOLFSSL* ssl, void *ctx) |
wolfSSL | 0:d92f9d21154c | 12839 | { |
wolfSSL | 0:d92f9d21154c | 12840 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 12841 | ssl->RsaSignCtx = ctx; |
wolfSSL | 0:d92f9d21154c | 12842 | } |
wolfSSL | 0:d92f9d21154c | 12843 | |
wolfSSL | 0:d92f9d21154c | 12844 | |
wolfSSL | 0:d92f9d21154c | 12845 | void* wolfSSL_GetRsaSignCtx(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 12846 | { |
wolfSSL | 0:d92f9d21154c | 12847 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 12848 | return ssl->RsaSignCtx; |
wolfSSL | 0:d92f9d21154c | 12849 | |
wolfSSL | 0:d92f9d21154c | 12850 | return NULL; |
wolfSSL | 0:d92f9d21154c | 12851 | } |
wolfSSL | 0:d92f9d21154c | 12852 | |
wolfSSL | 0:d92f9d21154c | 12853 | |
wolfSSL | 0:d92f9d21154c | 12854 | void wolfSSL_CTX_SetRsaVerifyCb(WOLFSSL_CTX* ctx, CallbackRsaVerify cb) |
wolfSSL | 0:d92f9d21154c | 12855 | { |
wolfSSL | 0:d92f9d21154c | 12856 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 12857 | ctx->RsaVerifyCb = cb; |
wolfSSL | 0:d92f9d21154c | 12858 | } |
wolfSSL | 0:d92f9d21154c | 12859 | |
wolfSSL | 0:d92f9d21154c | 12860 | |
wolfSSL | 0:d92f9d21154c | 12861 | void wolfSSL_SetRsaVerifyCtx(WOLFSSL* ssl, void *ctx) |
wolfSSL | 0:d92f9d21154c | 12862 | { |
wolfSSL | 0:d92f9d21154c | 12863 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 12864 | ssl->RsaVerifyCtx = ctx; |
wolfSSL | 0:d92f9d21154c | 12865 | } |
wolfSSL | 0:d92f9d21154c | 12866 | |
wolfSSL | 0:d92f9d21154c | 12867 | |
wolfSSL | 0:d92f9d21154c | 12868 | void* wolfSSL_GetRsaVerifyCtx(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 12869 | { |
wolfSSL | 0:d92f9d21154c | 12870 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 12871 | return ssl->RsaVerifyCtx; |
wolfSSL | 0:d92f9d21154c | 12872 | |
wolfSSL | 0:d92f9d21154c | 12873 | return NULL; |
wolfSSL | 0:d92f9d21154c | 12874 | } |
wolfSSL | 0:d92f9d21154c | 12875 | |
wolfSSL | 0:d92f9d21154c | 12876 | void wolfSSL_CTX_SetRsaEncCb(WOLFSSL_CTX* ctx, CallbackRsaEnc cb) |
wolfSSL | 0:d92f9d21154c | 12877 | { |
wolfSSL | 0:d92f9d21154c | 12878 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 12879 | ctx->RsaEncCb = cb; |
wolfSSL | 0:d92f9d21154c | 12880 | } |
wolfSSL | 0:d92f9d21154c | 12881 | |
wolfSSL | 0:d92f9d21154c | 12882 | |
wolfSSL | 0:d92f9d21154c | 12883 | void wolfSSL_SetRsaEncCtx(WOLFSSL* ssl, void *ctx) |
wolfSSL | 0:d92f9d21154c | 12884 | { |
wolfSSL | 0:d92f9d21154c | 12885 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 12886 | ssl->RsaEncCtx = ctx; |
wolfSSL | 0:d92f9d21154c | 12887 | } |
wolfSSL | 0:d92f9d21154c | 12888 | |
wolfSSL | 0:d92f9d21154c | 12889 | |
wolfSSL | 0:d92f9d21154c | 12890 | void* wolfSSL_GetRsaEncCtx(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 12891 | { |
wolfSSL | 0:d92f9d21154c | 12892 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 12893 | return ssl->RsaEncCtx; |
wolfSSL | 0:d92f9d21154c | 12894 | |
wolfSSL | 0:d92f9d21154c | 12895 | return NULL; |
wolfSSL | 0:d92f9d21154c | 12896 | } |
wolfSSL | 0:d92f9d21154c | 12897 | |
wolfSSL | 0:d92f9d21154c | 12898 | void wolfSSL_CTX_SetRsaDecCb(WOLFSSL_CTX* ctx, CallbackRsaDec cb) |
wolfSSL | 0:d92f9d21154c | 12899 | { |
wolfSSL | 0:d92f9d21154c | 12900 | if (ctx) |
wolfSSL | 0:d92f9d21154c | 12901 | ctx->RsaDecCb = cb; |
wolfSSL | 0:d92f9d21154c | 12902 | } |
wolfSSL | 0:d92f9d21154c | 12903 | |
wolfSSL | 0:d92f9d21154c | 12904 | |
wolfSSL | 0:d92f9d21154c | 12905 | void wolfSSL_SetRsaDecCtx(WOLFSSL* ssl, void *ctx) |
wolfSSL | 0:d92f9d21154c | 12906 | { |
wolfSSL | 0:d92f9d21154c | 12907 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 12908 | ssl->RsaDecCtx = ctx; |
wolfSSL | 0:d92f9d21154c | 12909 | } |
wolfSSL | 0:d92f9d21154c | 12910 | |
wolfSSL | 0:d92f9d21154c | 12911 | |
wolfSSL | 0:d92f9d21154c | 12912 | void* wolfSSL_GetRsaDecCtx(WOLFSSL* ssl) |
wolfSSL | 0:d92f9d21154c | 12913 | { |
wolfSSL | 0:d92f9d21154c | 12914 | if (ssl) |
wolfSSL | 0:d92f9d21154c | 12915 | return ssl->RsaDecCtx; |
wolfSSL | 0:d92f9d21154c | 12916 | |
wolfSSL | 0:d92f9d21154c | 12917 | return NULL; |
wolfSSL | 0:d92f9d21154c | 12918 | } |
wolfSSL | 0:d92f9d21154c | 12919 | |
wolfSSL | 0:d92f9d21154c | 12920 | |
wolfSSL | 0:d92f9d21154c | 12921 | #endif /* NO_RSA */ |
wolfSSL | 0:d92f9d21154c | 12922 | |
wolfSSL | 0:d92f9d21154c | 12923 | #endif /* HAVE_PK_CALLBACKS */ |
wolfSSL | 0:d92f9d21154c | 12924 | #endif /* NO_CERTS */ |
wolfSSL | 0:d92f9d21154c | 12925 | |
wolfSSL | 0:d92f9d21154c | 12926 | |
wolfSSL | 0:d92f9d21154c | 12927 | #ifdef WOLFSSL_HAVE_WOLFSCEP |
wolfSSL | 0:d92f9d21154c | 12928 | /* Used by autoconf to see if wolfSCEP is available */ |
wolfSSL | 0:d92f9d21154c | 12929 | void wolfSSL_wolfSCEP(void) {} |
wolfSSL | 0:d92f9d21154c | 12930 | #endif |
wolfSSL | 0:d92f9d21154c | 12931 | |
wolfSSL | 0:d92f9d21154c | 12932 | |
wolfSSL | 0:d92f9d21154c | 12933 | #ifdef WOLFSSL_HAVE_CERT_SERVICE |
wolfSSL | 0:d92f9d21154c | 12934 | /* Used by autoconf to see if cert service is available */ |
wolfSSL | 0:d92f9d21154c | 12935 | void wolfSSL_cert_service(void) {} |
wolfSSL | 0:d92f9d21154c | 12936 | #endif |
wolfSSL | 0:d92f9d21154c | 12937 | |
wolfSSL | 0:d92f9d21154c | 12938 |