1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000
1.2 +++ b/os/ossrv/ssl/libcrypto/inc/include/openssl/tls1.h Fri Jun 15 03:10:57 2012 +0200
1.3 @@ -0,0 +1,345 @@
1.4 +/* ssl/tls1.h */
1.5 +/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
1.6 + * All rights reserved.
1.7 + *
1.8 + * This package is an SSL implementation written
1.9 + * by Eric Young (eay@cryptsoft.com).
1.10 + * The implementation was written so as to conform with Netscapes SSL.
1.11 + *
1.12 + * This library is free for commercial and non-commercial use as long as
1.13 + * the following conditions are aheared to. The following conditions
1.14 + * apply to all code found in this distribution, be it the RC4, RSA,
1.15 + * lhash, DES, etc., code; not just the SSL code. The SSL documentation
1.16 + * included with this distribution is covered by the same copyright terms
1.17 + * except that the holder is Tim Hudson (tjh@cryptsoft.com).
1.18 + *
1.19 + * Copyright remains Eric Young's, and as such any Copyright notices in
1.20 + * the code are not to be removed.
1.21 + * If this package is used in a product, Eric Young should be given attribution
1.22 + * as the author of the parts of the library used.
1.23 + * This can be in the form of a textual message at program startup or
1.24 + * in documentation (online or textual) provided with the package.
1.25 + *
1.26 + * Redistribution and use in source and binary forms, with or without
1.27 + * modification, are permitted provided that the following conditions
1.28 + * are met:
1.29 + * 1. Redistributions of source code must retain the copyright
1.30 + * notice, this list of conditions and the following disclaimer.
1.31 + * 2. Redistributions in binary form must reproduce the above copyright
1.32 + * notice, this list of conditions and the following disclaimer in the
1.33 + * documentation and/or other materials provided with the distribution.
1.34 + * 3. All advertising materials mentioning features or use of this software
1.35 + * must display the following acknowledgement:
1.36 + * "This product includes cryptographic software written by
1.37 + * Eric Young (eay@cryptsoft.com)"
1.38 + * The word 'cryptographic' can be left out if the rouines from the library
1.39 + * being used are not cryptographic related :-).
1.40 + * 4. If you include any Windows specific code (or a derivative thereof) from
1.41 + * the apps directory (application code) you must include an acknowledgement:
1.42 + * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
1.43 + *
1.44 + * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
1.45 + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
1.46 + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
1.47 + * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
1.48 + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
1.49 + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
1.50 + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
1.51 + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
1.52 + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
1.53 + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
1.54 + * SUCH DAMAGE.
1.55 + *
1.56 + * The licence and distribution terms for any publically available version or
1.57 + * derivative of this code cannot be changed. i.e. this code cannot simply be
1.58 + * copied and put under another distribution licence
1.59 + * [including the GNU Public Licence.]
1.60 + */
1.61 +/* ====================================================================
1.62 + * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
1.63 + *
1.64 + * Portions of the attached software ("Contribution") are developed by
1.65 + * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
1.66 + *
1.67 + * The Contribution is licensed pursuant to the OpenSSL open source
1.68 + * license provided above.
1.69 + *
1.70 + * ECC cipher suite support in OpenSSL originally written by
1.71 + * Vipul Gupta and Sumit Gupta of Sun Microsystems Laboratories.
1.72 + *
1.73 + */
1.74 +
1.75 +#ifndef HEADER_TLS1_H
1.76 +#define HEADER_TLS1_H
1.77 +
1.78 +#include <openssl/buffer.h>
1.79 +
1.80 +#ifdef __cplusplus
1.81 +extern "C" {
1.82 +#endif
1.83 +
1.84 +#define TLS1_ALLOW_EXPERIMENTAL_CIPHERSUITES 1
1.85 +
1.86 +#define TLS1_VERSION 0x0301
1.87 +#define TLS1_VERSION_MAJOR 0x03
1.88 +#define TLS1_VERSION_MINOR 0x01
1.89 +
1.90 +#define TLS1_AD_DECRYPTION_FAILED 21
1.91 +#define TLS1_AD_RECORD_OVERFLOW 22
1.92 +#define TLS1_AD_UNKNOWN_CA 48 /* fatal */
1.93 +#define TLS1_AD_ACCESS_DENIED 49 /* fatal */
1.94 +#define TLS1_AD_DECODE_ERROR 50 /* fatal */
1.95 +#define TLS1_AD_DECRYPT_ERROR 51
1.96 +#define TLS1_AD_EXPORT_RESTRICTION 60 /* fatal */
1.97 +#define TLS1_AD_PROTOCOL_VERSION 70 /* fatal */
1.98 +#define TLS1_AD_INSUFFICIENT_SECURITY 71 /* fatal */
1.99 +#define TLS1_AD_INTERNAL_ERROR 80 /* fatal */
1.100 +#define TLS1_AD_USER_CANCELLED 90
1.101 +#define TLS1_AD_NO_RENEGOTIATION 100
1.102 +/* codes 110-114 are from RFC3546 */
1.103 +#define TLS1_AD_UNSUPPORTED_EXTENSION 110
1.104 +#define TLS1_AD_CERTIFICATE_UNOBTAINABLE 111
1.105 +#define TLS1_AD_UNRECOGNIZED_NAME 112
1.106 +#define TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE 113
1.107 +#define TLS1_AD_BAD_CERTIFICATE_HASH_VALUE 114
1.108 +#define TLS1_AD_UNKNOWN_PSK_IDENTITY 115 /* fatal */
1.109 +
1.110 +/* ExtensionType values from RFC 3546 */
1.111 +#define TLSEXT_TYPE_server_name 0
1.112 +#define TLSEXT_TYPE_max_fragment_length 1
1.113 +#define TLSEXT_TYPE_client_certificate_url 2
1.114 +#define TLSEXT_TYPE_trusted_ca_keys 3
1.115 +#define TLSEXT_TYPE_truncated_hmac 4
1.116 +#define TLSEXT_TYPE_status_request 5
1.117 +#define TLSEXT_TYPE_elliptic_curves 10
1.118 +#define TLSEXT_TYPE_ec_point_formats 11
1.119 +#define TLSEXT_TYPE_session_ticket 35
1.120 +
1.121 +/* NameType value from RFC 3546 */
1.122 +#define TLSEXT_NAMETYPE_host_name 0
1.123 +
1.124 +#ifndef OPENSSL_NO_TLSEXT
1.125 +
1.126 +#define TLSEXT_MAXLEN_host_name 255
1.127 +
1.128 +const char *SSL_get_servername(const SSL *s, const int type) ;
1.129 +int SSL_get_servername_type(const SSL *s) ;
1.130 +
1.131 +#define SSL_set_tlsext_host_name(s,name) \
1.132 +SSL_ctrl(s,SSL_CTRL_SET_TLSEXT_HOSTNAME,TLSEXT_NAMETYPE_host_name,(char *)name)
1.133 +
1.134 +#define SSL_set_tlsext_debug_callback(ssl, cb) \
1.135 +SSL_callback_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_CB,(void (*)(void))cb)
1.136 +
1.137 +#define SSL_set_tlsext_debug_arg(ssl, arg) \
1.138 +SSL_ctrl(ssl,SSL_CTRL_SET_TLSEXT_DEBUG_ARG,0, (void *)arg)
1.139 +
1.140 +#define SSL_CTX_set_tlsext_servername_callback(ctx, cb) \
1.141 +SSL_CTX_callback_ctrl(ctx,SSL_CTRL_SET_TLSEXT_SERVERNAME_CB,(void (*)(void))cb)
1.142 +
1.143 +#define SSL_TLSEXT_ERR_OK 0
1.144 +#define SSL_TLSEXT_ERR_ALERT_WARNING 1
1.145 +#define SSL_TLSEXT_ERR_ALERT_FATAL 2
1.146 +#define SSL_TLSEXT_ERR_NOACK 3
1.147 +
1.148 +#define SSL_CTX_set_tlsext_servername_arg(ctx, arg) \
1.149 +SSL_CTX_ctrl(ctx,SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG,0, (void *)arg)
1.150 +
1.151 +#define SSL_CTX_get_tlsext_ticket_keys(ctx, keys, keylen) \
1.152 + SSL_CTX_ctrl((ctx),SSL_CTRL_GET_TLXEXT_TICKET_KEYS,(keylen),(keys))
1.153 +#define SSL_CTX_set_tlsext_ticket_keys(ctx, keys, keylen) \
1.154 + SSL_CTX_ctrl((ctx),SSL_CTRL_SET_TLXEXT_TICKET_KEYS,(keylen),(keys))
1.155 +#endif
1.156 +
1.157 +/* Additional TLS ciphersuites from draft-ietf-tls-56-bit-ciphersuites-00.txt
1.158 + * (available if TLS1_ALLOW_EXPERIMENTAL_CIPHERSUITES is defined, see
1.159 + * s3_lib.c). We actually treat them like SSL 3.0 ciphers, which we probably
1.160 + * shouldn't. */
1.161 +#define TLS1_CK_RSA_EXPORT1024_WITH_RC4_56_MD5 0x03000060
1.162 +#define TLS1_CK_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5 0x03000061
1.163 +#define TLS1_CK_RSA_EXPORT1024_WITH_DES_CBC_SHA 0x03000062
1.164 +#define TLS1_CK_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA 0x03000063
1.165 +#define TLS1_CK_RSA_EXPORT1024_WITH_RC4_56_SHA 0x03000064
1.166 +#define TLS1_CK_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA 0x03000065
1.167 +#define TLS1_CK_DHE_DSS_WITH_RC4_128_SHA 0x03000066
1.168 +
1.169 +/* AES ciphersuites from RFC3268 */
1.170 +
1.171 +#define TLS1_CK_RSA_WITH_AES_128_SHA 0x0300002F
1.172 +#define TLS1_CK_DH_DSS_WITH_AES_128_SHA 0x03000030
1.173 +#define TLS1_CK_DH_RSA_WITH_AES_128_SHA 0x03000031
1.174 +#define TLS1_CK_DHE_DSS_WITH_AES_128_SHA 0x03000032
1.175 +#define TLS1_CK_DHE_RSA_WITH_AES_128_SHA 0x03000033
1.176 +#define TLS1_CK_ADH_WITH_AES_128_SHA 0x03000034
1.177 +
1.178 +#define TLS1_CK_RSA_WITH_AES_256_SHA 0x03000035
1.179 +#define TLS1_CK_DH_DSS_WITH_AES_256_SHA 0x03000036
1.180 +#define TLS1_CK_DH_RSA_WITH_AES_256_SHA 0x03000037
1.181 +#define TLS1_CK_DHE_DSS_WITH_AES_256_SHA 0x03000038
1.182 +#define TLS1_CK_DHE_RSA_WITH_AES_256_SHA 0x03000039
1.183 +#define TLS1_CK_ADH_WITH_AES_256_SHA 0x0300003A
1.184 +
1.185 +/* ECC ciphersuites from draft-ietf-tls-ecc-01.txt (Mar 15, 2001).
1.186 + * XXX NOTE: There is a bug in the draft, cipher numbers 4B, and 4C
1.187 + * are defined twice so we define ECDH_ECDSA_EXPORT cipher
1.188 + * suites to use 5B and 5C instead (this may change with future
1.189 + * updates to the IETF draft).
1.190 + */
1.191 +/* draft-ietf-tls-ecc-03.txt (June 2003) gives a changed list of
1.192 + * ciphersuites, but does not define numbers for all of them
1.193 + * because of possible conflicts with other Internet Drafts;
1.194 + * most numbers are still subject to change. */
1.195 +#define TLS1_CK_ECDH_ECDSA_WITH_NULL_SHA 0x03000047
1.196 +#define TLS1_CK_ECDH_ECDSA_WITH_RC4_128_SHA 0x03000048
1.197 +#define TLS1_CK_ECDH_ECDSA_WITH_DES_CBC_SHA 0x03000049
1.198 +#define TLS1_CK_ECDH_ECDSA_WITH_DES_192_CBC3_SHA 0x0300004A
1.199 +#define TLS1_CK_ECDH_ECDSA_WITH_AES_128_CBC_SHA 0x0300004B
1.200 +#define TLS1_CK_ECDH_ECDSA_WITH_AES_256_CBC_SHA 0x0300004C
1.201 +#define TLS1_CK_ECDH_ECDSA_EXPORT_WITH_RC4_40_SHA 0x0300005B
1.202 +#define TLS1_CK_ECDH_ECDSA_EXPORT_WITH_RC4_56_SHA 0x0300005C
1.203 +
1.204 +#define TLS1_CK_ECDH_RSA_WITH_NULL_SHA 0x0300004D
1.205 +#define TLS1_CK_ECDH_RSA_WITH_RC4_128_SHA 0x0300004E
1.206 +#define TLS1_CK_ECDH_RSA_WITH_DES_CBC_SHA 0x0300004F
1.207 +#define TLS1_CK_ECDH_RSA_WITH_DES_192_CBC3_SHA 0x03000050
1.208 +#define TLS1_CK_ECDH_RSA_WITH_AES_128_CBC_SHA 0x03000051
1.209 +#define TLS1_CK_ECDH_RSA_WITH_AES_256_CBC_SHA 0x03000052
1.210 +#define TLS1_CK_ECDH_RSA_EXPORT_WITH_RC4_40_SHA 0x03000053
1.211 +#define TLS1_CK_ECDH_RSA_EXPORT_WITH_RC4_56_SHA 0x03000054
1.212 +
1.213 +#define TLS1_CK_ECDH_anon_WITH_NULL_SHA 0x03000055
1.214 +#define TLS1_CK_ECDH_anon_WITH_RC4_128_SHA 0x03000056
1.215 +#define TLS1_CK_ECDH_anon_WITH_DES_CBC_SHA 0x03000057
1.216 +#define TLS1_CK_ECDH_anon_WITH_DES_192_CBC3_SHA 0x03000058
1.217 +#define TLS1_CK_ECDH_anon_EXPORT_WITH_DES_40_CBC_SHA 0x03000059
1.218 +#define TLS1_CK_ECDH_anon_EXPORT_WITH_RC4_40_SHA 0x0300005A
1.219 +
1.220 +/* XXX: ECC ciphersuites offering forward secrecy are not yet specified
1.221 + * in the ECC/TLS draft but our code allows them to be implemented
1.222 + * very easily. To add such a cipher suite, one needs to add two constant
1.223 + * definitions to this file and a new structure in s3_lib.c. We illustrate
1.224 + * the process for the made-up ciphers ECDHE-ECDSA-AES128-SHA and
1.225 + * ECDHE-RSA-AES128-SHA.
1.226 + */
1.227 +#define TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA 0x03000077
1.228 +#define TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA 0x03000078
1.229 +
1.230 +
1.231 +/* XXX
1.232 + * Inconsistency alert:
1.233 + * The OpenSSL names of ciphers with ephemeral DH here include the string
1.234 + * "DHE", while elsewhere it has always been "EDH".
1.235 + * (The alias for the list of all such ciphers also is "EDH".)
1.236 + * The specifications speak of "EDH"; maybe we should allow both forms
1.237 + * for everything. */
1.238 +#define TLS1_TXT_RSA_EXPORT1024_WITH_RC4_56_MD5 "EXP1024-RC4-MD5"
1.239 +#define TLS1_TXT_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5 "EXP1024-RC2-CBC-MD5"
1.240 +#define TLS1_TXT_RSA_EXPORT1024_WITH_DES_CBC_SHA "EXP1024-DES-CBC-SHA"
1.241 +#define TLS1_TXT_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA "EXP1024-DHE-DSS-DES-CBC-SHA"
1.242 +#define TLS1_TXT_RSA_EXPORT1024_WITH_RC4_56_SHA "EXP1024-RC4-SHA"
1.243 +#define TLS1_TXT_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA "EXP1024-DHE-DSS-RC4-SHA"
1.244 +#define TLS1_TXT_DHE_DSS_WITH_RC4_128_SHA "DHE-DSS-RC4-SHA"
1.245 +
1.246 +/* AES ciphersuites from RFC3268 */
1.247 +#define TLS1_TXT_RSA_WITH_AES_128_SHA "AES128-SHA"
1.248 +#define TLS1_TXT_DH_DSS_WITH_AES_128_SHA "DH-DSS-AES128-SHA"
1.249 +#define TLS1_TXT_DH_RSA_WITH_AES_128_SHA "DH-RSA-AES128-SHA"
1.250 +#define TLS1_TXT_DHE_DSS_WITH_AES_128_SHA "DHE-DSS-AES128-SHA"
1.251 +#define TLS1_TXT_DHE_RSA_WITH_AES_128_SHA "DHE-RSA-AES128-SHA"
1.252 +#define TLS1_TXT_ADH_WITH_AES_128_SHA "ADH-AES128-SHA"
1.253 +
1.254 +#define TLS1_TXT_RSA_WITH_AES_256_SHA "AES256-SHA"
1.255 +#define TLS1_TXT_DH_DSS_WITH_AES_256_SHA "DH-DSS-AES256-SHA"
1.256 +#define TLS1_TXT_DH_RSA_WITH_AES_256_SHA "DH-RSA-AES256-SHA"
1.257 +#define TLS1_TXT_DHE_DSS_WITH_AES_256_SHA "DHE-DSS-AES256-SHA"
1.258 +#define TLS1_TXT_DHE_RSA_WITH_AES_256_SHA "DHE-RSA-AES256-SHA"
1.259 +#define TLS1_TXT_ADH_WITH_AES_256_SHA "ADH-AES256-SHA"
1.260 +
1.261 +/* ECC ciphersuites from draft-ietf-tls-ecc-01.txt (Mar 15, 2001) */
1.262 +#define TLS1_TXT_ECDH_ECDSA_WITH_NULL_SHA "ECDH-ECDSA-NULL-SHA"
1.263 +#define TLS1_TXT_ECDH_ECDSA_WITH_RC4_128_SHA "ECDH-ECDSA-RC4-SHA"
1.264 +#define TLS1_TXT_ECDH_ECDSA_WITH_DES_CBC_SHA "ECDH-ECDSA-DES-CBC-SHA"
1.265 +#define TLS1_TXT_ECDH_ECDSA_WITH_DES_192_CBC3_SHA "ECDH-ECDSA-DES-CBC3-SHA"
1.266 +#define TLS1_TXT_ECDH_ECDSA_WITH_AES_128_CBC_SHA "ECDH-ECDSA-AES128-SHA"
1.267 +#define TLS1_TXT_ECDH_ECDSA_WITH_AES_256_CBC_SHA "ECDH-ECDSA-AES256-SHA"
1.268 +#define TLS1_TXT_ECDH_ECDSA_EXPORT_WITH_RC4_40_SHA "EXP-ECDH-ECDSA-RC4-40-SHA"
1.269 +#define TLS1_TXT_ECDH_ECDSA_EXPORT_WITH_RC4_56_SHA "EXP-ECDH-ECDSA-RC4-56-SHA"
1.270 +
1.271 +#define TLS1_TXT_ECDH_RSA_WITH_NULL_SHA "ECDH-RSA-NULL-SHA"
1.272 +#define TLS1_TXT_ECDH_RSA_WITH_RC4_128_SHA "ECDH-RSA-RC4-SHA"
1.273 +#define TLS1_TXT_ECDH_RSA_WITH_DES_CBC_SHA "ECDH-RSA-DES-CBC-SHA"
1.274 +#define TLS1_TXT_ECDH_RSA_WITH_DES_192_CBC3_SHA "ECDH-RSA-DES-CBC3-SHA"
1.275 +#define TLS1_TXT_ECDH_RSA_WITH_AES_128_CBC_SHA "ECDH-RSA-AES128-SHA"
1.276 +#define TLS1_TXT_ECDH_RSA_WITH_AES_256_CBC_SHA "ECDH-RSA-AES256-SHA"
1.277 +#define TLS1_TXT_ECDH_RSA_EXPORT_WITH_RC4_40_SHA "EXP-ECDH-RSA-RC4-40-SHA"
1.278 +#define TLS1_TXT_ECDH_RSA_EXPORT_WITH_RC4_56_SHA "EXP-ECDH-RSA-RC4-56-SHA"
1.279 +
1.280 +#define TLS1_TXT_ECDH_anon_WITH_NULL_SHA "AECDH-NULL-SHA"
1.281 +#define TLS1_TXT_ECDH_anon_WITH_RC4_128_SHA "AECDH-RC4-SHA"
1.282 +#define TLS1_TXT_ECDH_anon_WITH_DES_CBC_SHA "AECDH-DES-CBC-SHA"
1.283 +#define TLS1_TXT_ECDH_anon_WITH_DES_192_CBC3_SHA "AECDH-DES-CBC3-SHA"
1.284 +#define TLS1_TXT_ECDH_anon_EXPORT_WITH_DES_40_CBC_SHA "EXP-AECDH-DES-40-CBC-SHA"
1.285 +#define TLS1_TXT_ECDH_anon_EXPORT_WITH_RC4_40_SHA "EXP-AECDH-RC4-40-SHA"
1.286 +
1.287 +/* XXX: Made-up ECC cipher suites offering forward secrecy. This is for
1.288 + * illustration only.
1.289 + */
1.290 +#define TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CBC_SHA "ECDHE-ECDSA-AES128-SHA"
1.291 +#define TLS1_TXT_ECDHE_RSA_WITH_AES_128_CBC_SHA "ECDHE-RSA-AES128-SHA"
1.292 +
1.293 +
1.294 +#define TLS_CT_RSA_SIGN 1
1.295 +#define TLS_CT_DSS_SIGN 2
1.296 +#define TLS_CT_RSA_FIXED_DH 3
1.297 +#define TLS_CT_DSS_FIXED_DH 4
1.298 +#define TLS_CT_ECDSA_SIGN 5
1.299 +#define TLS_CT_RSA_FIXED_ECDH 6
1.300 +#define TLS_CT_ECDSA_FIXED_ECDH 7
1.301 +#define TLS_CT_NUMBER 7
1.302 +
1.303 +#define TLS1_FINISH_MAC_LENGTH 12
1.304 +
1.305 +#define TLS_MD_MAX_CONST_SIZE 20
1.306 +#define TLS_MD_CLIENT_FINISH_CONST "client finished"
1.307 +#define TLS_MD_CLIENT_FINISH_CONST_SIZE 15
1.308 +#define TLS_MD_SERVER_FINISH_CONST "server finished"
1.309 +#define TLS_MD_SERVER_FINISH_CONST_SIZE 15
1.310 +#define TLS_MD_SERVER_WRITE_KEY_CONST "server write key"
1.311 +#define TLS_MD_SERVER_WRITE_KEY_CONST_SIZE 16
1.312 +#define TLS_MD_KEY_EXPANSION_CONST "key expansion"
1.313 +#define TLS_MD_KEY_EXPANSION_CONST_SIZE 13
1.314 +#define TLS_MD_CLIENT_WRITE_KEY_CONST "client write key"
1.315 +#define TLS_MD_CLIENT_WRITE_KEY_CONST_SIZE 16
1.316 +#define TLS_MD_SERVER_WRITE_KEY_CONST "server write key"
1.317 +#define TLS_MD_SERVER_WRITE_KEY_CONST_SIZE 16
1.318 +#define TLS_MD_IV_BLOCK_CONST "IV block"
1.319 +#define TLS_MD_IV_BLOCK_CONST_SIZE 8
1.320 +#define TLS_MD_MASTER_SECRET_CONST "master secret"
1.321 +#define TLS_MD_MASTER_SECRET_CONST_SIZE 13
1.322 +
1.323 +#ifdef CHARSET_EBCDIC
1.324 +#undef TLS_MD_CLIENT_FINISH_CONST
1.325 +#define TLS_MD_CLIENT_FINISH_CONST "\x63\x6c\x69\x65\x6e\x74\x20\x66\x69\x6e\x69\x73\x68\x65\x64" /*client finished*/
1.326 +#undef TLS_MD_SERVER_FINISH_CONST
1.327 +#define TLS_MD_SERVER_FINISH_CONST "\x73\x65\x72\x76\x65\x72\x20\x66\x69\x6e\x69\x73\x68\x65\x64" /*server finished*/
1.328 +#undef TLS_MD_SERVER_WRITE_KEY_CONST
1.329 +#define TLS_MD_SERVER_WRITE_KEY_CONST "\x73\x65\x72\x76\x65\x72\x20\x77\x72\x69\x74\x65\x20\x6b\x65\x79" /*server write key*/
1.330 +#undef TLS_MD_KEY_EXPANSION_CONST
1.331 +#define TLS_MD_KEY_EXPANSION_CONST "\x6b\x65\x79\x20\x65\x78\x70\x61\x6e\x73\x69\x6f\x6e" /*key expansion*/
1.332 +#undef TLS_MD_CLIENT_WRITE_KEY_CONST
1.333 +#define TLS_MD_CLIENT_WRITE_KEY_CONST "\x63\x6c\x69\x65\x6e\x74\x20\x77\x72\x69\x74\x65\x20\x6b\x65\x79" /*client write key*/
1.334 +#undef TLS_MD_SERVER_WRITE_KEY_CONST
1.335 +#define TLS_MD_SERVER_WRITE_KEY_CONST "\x73\x65\x72\x76\x65\x72\x20\x77\x72\x69\x74\x65\x20\x6b\x65\x79" /*server write key*/
1.336 +#undef TLS_MD_IV_BLOCK_CONST
1.337 +#define TLS_MD_IV_BLOCK_CONST "\x49\x56\x20\x62\x6c\x6f\x63\x6b" /*IV block*/
1.338 +#undef TLS_MD_MASTER_SECRET_CONST
1.339 +#define TLS_MD_MASTER_SECRET_CONST "\x6d\x61\x73\x74\x65\x72\x20\x73\x65\x63\x72\x65\x74" /*master secret*/
1.340 +#endif
1.341 +
1.342 +#ifdef __cplusplus
1.343 +}
1.344 +#endif
1.345 +#endif
1.346 +
1.347 +
1.348 +