os/ossrv/ssl/libssl/inc/ssl_locl.h
changeset 0 bde4ae8d615e
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/os/ossrv/ssl/libssl/inc/ssl_locl.h	Fri Jun 15 03:10:57 2012 +0200
     1.3 @@ -0,0 +1,1194 @@
     1.4 +/* ssl/ssl_locl.h */
     1.5 +/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
     1.6 + * All rights reserved.
     1.7 + *
     1.8 + * This package is an SSL implementation written
     1.9 + * by Eric Young (eay@cryptsoft.com).
    1.10 + * The implementation was written so as to conform with Netscapes SSL.
    1.11 + * 
    1.12 + * This library is free for commercial and non-commercial use as long as
    1.13 + * the following conditions are aheared to.  The following conditions
    1.14 + * apply to all code found in this distribution, be it the RC4, RSA,
    1.15 + * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
    1.16 + * included with this distribution is covered by the same copyright terms
    1.17 + * except that the holder is Tim Hudson (tjh@cryptsoft.com).
    1.18 + * 
    1.19 + * Copyright remains Eric Young's, and as such any Copyright notices in
    1.20 + * the code are not to be removed.
    1.21 + * If this package is used in a product, Eric Young should be given attribution
    1.22 + * as the author of the parts of the library used.
    1.23 + * This can be in the form of a textual message at program startup or
    1.24 + * in documentation (online or textual) provided with the package.
    1.25 + * 
    1.26 + * Redistribution and use in source and binary forms, with or without
    1.27 + * modification, are permitted provided that the following conditions
    1.28 + * are met:
    1.29 + * 1. Redistributions of source code must retain the copyright
    1.30 + *    notice, this list of conditions and the following disclaimer.
    1.31 + * 2. Redistributions in binary form must reproduce the above copyright
    1.32 + *    notice, this list of conditions and the following disclaimer in the
    1.33 + *    documentation and/or other materials provided with the distribution.
    1.34 + * 3. All advertising materials mentioning features or use of this software
    1.35 + *    must display the following acknowledgement:
    1.36 + *    "This product includes cryptographic software written by
    1.37 + *     Eric Young (eay@cryptsoft.com)"
    1.38 + *    The word 'cryptographic' can be left out if the rouines from the library
    1.39 + *    being used are not cryptographic related :-).
    1.40 + * 4. If you include any Windows specific code (or a derivative thereof) from 
    1.41 + *    the apps directory (application code) you must include an acknowledgement:
    1.42 + *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
    1.43 + * 
    1.44 + * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
    1.45 + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
    1.46 + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
    1.47 + * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
    1.48 + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
    1.49 + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
    1.50 + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
    1.51 + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
    1.52 + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
    1.53 + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
    1.54 + * SUCH DAMAGE.
    1.55 + * 
    1.56 + * The licence and distribution terms for any publically available version or
    1.57 + * derivative of this code cannot be changed.  i.e. this code cannot simply be
    1.58 + * copied and put under another distribution licence
    1.59 + * [including the GNU Public Licence.]
    1.60 + */
    1.61 +/* ====================================================================
    1.62 + * Copyright (c) 1998-2001 The OpenSSL Project.  All rights reserved.
    1.63 + *
    1.64 + * Redistribution and use in source and binary forms, with or without
    1.65 + * modification, are permitted provided that the following conditions
    1.66 + * are met:
    1.67 + *
    1.68 + * 1. Redistributions of source code must retain the above copyright
    1.69 + *    notice, this list of conditions and the following disclaimer. 
    1.70 + *
    1.71 + * 2. Redistributions in binary form must reproduce the above copyright
    1.72 + *    notice, this list of conditions and the following disclaimer in
    1.73 + *    the documentation and/or other materials provided with the
    1.74 + *    distribution.
    1.75 + *
    1.76 + * 3. All advertising materials mentioning features or use of this
    1.77 + *    software must display the following acknowledgment:
    1.78 + *    "This product includes software developed by the OpenSSL Project
    1.79 + *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
    1.80 + *
    1.81 + * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
    1.82 + *    endorse or promote products derived from this software without
    1.83 + *    prior written permission. For written permission, please contact
    1.84 + *    openssl-core@openssl.org.
    1.85 + *
    1.86 + * 5. Products derived from this software may not be called "OpenSSL"
    1.87 + *    nor may "OpenSSL" appear in their names without prior written
    1.88 + *    permission of the OpenSSL Project.
    1.89 + *
    1.90 + * 6. Redistributions of any form whatsoever must retain the following
    1.91 + *    acknowledgment:
    1.92 + *    "This product includes software developed by the OpenSSL Project
    1.93 + *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
    1.94 + *
    1.95 + * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
    1.96 + * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
    1.97 + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
    1.98 + * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
    1.99 + * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
   1.100 + * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
   1.101 + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
   1.102 + * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   1.103 + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
   1.104 + * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
   1.105 + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
   1.106 + * OF THE POSSIBILITY OF SUCH DAMAGE.
   1.107 + * ====================================================================
   1.108 + *
   1.109 + * This product includes cryptographic software written by Eric Young
   1.110 + * (eay@cryptsoft.com).  This product includes software written by Tim
   1.111 + * Hudson (tjh@cryptsoft.com).
   1.112 + *
   1.113 + */
   1.114 +/* ====================================================================
   1.115 + * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
   1.116 + * ECC cipher suite support in OpenSSL originally developed by 
   1.117 + * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
   1.118 + */
   1.119 +
   1.120 +#ifndef HEADER_SSL_LOCL_H
   1.121 +#define HEADER_SSL_LOCL_H
   1.122 +#include <stdlib.h>
   1.123 +#include <time.h>
   1.124 +#include <string.h>
   1.125 +#include <errno.h>
   1.126 +
   1.127 +#include "e_os.h"
   1.128 +
   1.129 +#include <openssl/buffer.h>
   1.130 +#include <openssl/comp.h>
   1.131 +#include <openssl/bio.h>
   1.132 +#include <openssl/stack.h>
   1.133 +#ifndef OPENSSL_NO_RSA
   1.134 +#include <openssl/rsa.h>
   1.135 +#endif
   1.136 +#ifndef OPENSSL_NO_DSA
   1.137 +#include <openssl/dsa.h>
   1.138 +#endif
   1.139 +#include <openssl/err.h>
   1.140 +#include <openssl/ssl.h>
   1.141 +#include <openssl/symhacks.h>
   1.142 +
   1.143 +#if (defined(SYMBIAN) && (defined(__WINSCW__) || defined(__WINS__)))
   1.144 +#include "libssl_wsd.h"
   1.145 +//#ifndef EMULATOR
   1.146 +//#define EMULATOR (defined(SYMBIAN) && (defined(__WINSCW__) || defined(__WINS__)))
   1.147 +//#endif
   1.148 +#endif
   1.149 +
   1.150 +#ifdef OPENSSL_BUILD_SHLIBSSL
   1.151 +# undef OPENSSL_EXTERN
   1.152 +# define OPENSSL_EXTERN OPENSSL_EXPORT
   1.153 +#endif
   1.154 +
   1.155 +#define PKCS1_CHECK
   1.156 +
   1.157 +#define c2l(c,l)	(l = ((unsigned long)(*((c)++)))     , \
   1.158 +			 l|=(((unsigned long)(*((c)++)))<< 8), \
   1.159 +			 l|=(((unsigned long)(*((c)++)))<<16), \
   1.160 +			 l|=(((unsigned long)(*((c)++)))<<24))
   1.161 +
   1.162 +/* NOTE - c is not incremented as per c2l */
   1.163 +#define c2ln(c,l1,l2,n)	{ \
   1.164 +			c+=n; \
   1.165 +			l1=l2=0; \
   1.166 +			switch (n) { \
   1.167 +			case 8: l2 =((unsigned long)(*(--(c))))<<24; \
   1.168 +			case 7: l2|=((unsigned long)(*(--(c))))<<16; \
   1.169 +			case 6: l2|=((unsigned long)(*(--(c))))<< 8; \
   1.170 +			case 5: l2|=((unsigned long)(*(--(c))));     \
   1.171 +			case 4: l1 =((unsigned long)(*(--(c))))<<24; \
   1.172 +			case 3: l1|=((unsigned long)(*(--(c))))<<16; \
   1.173 +			case 2: l1|=((unsigned long)(*(--(c))))<< 8; \
   1.174 +			case 1: l1|=((unsigned long)(*(--(c))));     \
   1.175 +				} \
   1.176 +			}
   1.177 +
   1.178 +#define l2c(l,c)	(*((c)++)=(unsigned char)(((l)    )&0xff), \
   1.179 +			 *((c)++)=(unsigned char)(((l)>> 8)&0xff), \
   1.180 +			 *((c)++)=(unsigned char)(((l)>>16)&0xff), \
   1.181 +			 *((c)++)=(unsigned char)(((l)>>24)&0xff))
   1.182 +
   1.183 +#define n2l(c,l)	(l =((unsigned long)(*((c)++)))<<24, \
   1.184 +			 l|=((unsigned long)(*((c)++)))<<16, \
   1.185 +			 l|=((unsigned long)(*((c)++)))<< 8, \
   1.186 +			 l|=((unsigned long)(*((c)++))))
   1.187 +
   1.188 +#define l2n(l,c)	(*((c)++)=(unsigned char)(((l)>>24)&0xff), \
   1.189 +			 *((c)++)=(unsigned char)(((l)>>16)&0xff), \
   1.190 +			 *((c)++)=(unsigned char)(((l)>> 8)&0xff), \
   1.191 +			 *((c)++)=(unsigned char)(((l)    )&0xff))
   1.192 +
   1.193 +#define l2n6(l,c)	(*((c)++)=(unsigned char)(((l)>>40)&0xff), \
   1.194 +			 *((c)++)=(unsigned char)(((l)>>32)&0xff), \
   1.195 +			 *((c)++)=(unsigned char)(((l)>>24)&0xff), \
   1.196 +			 *((c)++)=(unsigned char)(((l)>>16)&0xff), \
   1.197 +			 *((c)++)=(unsigned char)(((l)>> 8)&0xff), \
   1.198 +			 *((c)++)=(unsigned char)(((l)    )&0xff))
   1.199 +
   1.200 +#define n2l6(c,l)	(l =((BN_ULLONG)(*((c)++)))<<40, \
   1.201 +			 l|=((BN_ULLONG)(*((c)++)))<<32, \
   1.202 +			 l|=((BN_ULLONG)(*((c)++)))<<24, \
   1.203 +			 l|=((BN_ULLONG)(*((c)++)))<<16, \
   1.204 +			 l|=((BN_ULLONG)(*((c)++)))<< 8, \
   1.205 +			 l|=((BN_ULLONG)(*((c)++))))
   1.206 +
   1.207 +/* NOTE - c is not incremented as per l2c */
   1.208 +#define l2cn(l1,l2,c,n)	{ \
   1.209 +			c+=n; \
   1.210 +			switch (n) { \
   1.211 +			case 8: *(--(c))=(unsigned char)(((l2)>>24)&0xff); \
   1.212 +			case 7: *(--(c))=(unsigned char)(((l2)>>16)&0xff); \
   1.213 +			case 6: *(--(c))=(unsigned char)(((l2)>> 8)&0xff); \
   1.214 +			case 5: *(--(c))=(unsigned char)(((l2)    )&0xff); \
   1.215 +			case 4: *(--(c))=(unsigned char)(((l1)>>24)&0xff); \
   1.216 +			case 3: *(--(c))=(unsigned char)(((l1)>>16)&0xff); \
   1.217 +			case 2: *(--(c))=(unsigned char)(((l1)>> 8)&0xff); \
   1.218 +			case 1: *(--(c))=(unsigned char)(((l1)    )&0xff); \
   1.219 +				} \
   1.220 +			}
   1.221 +
   1.222 +#define n2s(c,s)	((s=(((unsigned int)(c[0]))<< 8)| \
   1.223 +			    (((unsigned int)(c[1]))    )),c+=2)
   1.224 +#define s2n(s,c)	((c[0]=(unsigned char)(((s)>> 8)&0xff), \
   1.225 +			  c[1]=(unsigned char)(((s)    )&0xff)),c+=2)
   1.226 +
   1.227 +#define n2l3(c,l)	((l =(((unsigned long)(c[0]))<<16)| \
   1.228 +			     (((unsigned long)(c[1]))<< 8)| \
   1.229 +			     (((unsigned long)(c[2]))    )),c+=3)
   1.230 +
   1.231 +#define l2n3(l,c)	((c[0]=(unsigned char)(((l)>>16)&0xff), \
   1.232 +			  c[1]=(unsigned char)(((l)>> 8)&0xff), \
   1.233 +			  c[2]=(unsigned char)(((l)    )&0xff)),c+=3)
   1.234 +
   1.235 +/* LOCAL STUFF */
   1.236 +
   1.237 +#define SSL_DECRYPT	0
   1.238 +#define SSL_ENCRYPT	1
   1.239 +
   1.240 +#define TWO_BYTE_BIT	0x80
   1.241 +#define SEC_ESC_BIT	0x40
   1.242 +#define TWO_BYTE_MASK	0x7fff
   1.243 +#define THREE_BYTE_MASK	0x3fff
   1.244 +
   1.245 +#define INC32(a)	((a)=((a)+1)&0xffffffffL)
   1.246 +#define DEC32(a)	((a)=((a)-1)&0xffffffffL)
   1.247 +#define MAX_MAC_SIZE	20 /* up from 16 for SSLv3 */
   1.248 +
   1.249 +/*
   1.250 + * Define the Bitmasks for SSL_CIPHER.algorithms.
   1.251 + * This bits are used packed as dense as possible. If new methods/ciphers
   1.252 + * etc will be added, the bits a likely to change, so this information
   1.253 + * is for internal library use only, even though SSL_CIPHER.algorithms
   1.254 + * can be publicly accessed.
   1.255 + * Use the according functions for cipher management instead.
   1.256 + *
   1.257 + * The bit mask handling in the selection and sorting scheme in
   1.258 + * ssl_create_cipher_list() has only limited capabilities, reflecting
   1.259 + * that the different entities within are mutually exclusive:
   1.260 + * ONLY ONE BIT PER MASK CAN BE SET AT A TIME.
   1.261 + */
   1.262 +#define SSL_MKEY_MASK		0x000000FFL
   1.263 +#define SSL_kRSA		0x00000001L /* RSA key exchange */
   1.264 +#define SSL_kDHr		0x00000002L /* DH cert RSA CA cert */
   1.265 +#define SSL_kDHd		0x00000004L /* DH cert DSA CA cert */
   1.266 +#define SSL_kFZA		0x00000008L
   1.267 +#define SSL_kEDH		0x00000010L /* tmp DH key no DH cert */
   1.268 +#define SSL_kKRB5		0x00000020L /* Kerberos5 key exchange */
   1.269 +#define SSL_kECDH               0x00000040L /* ECDH w/ long-term keys */
   1.270 +#define SSL_kECDHE              0x00000080L /* ephemeral ECDH */
   1.271 +#define SSL_EDH			(SSL_kEDH|(SSL_AUTH_MASK^SSL_aNULL))
   1.272 +
   1.273 +#define SSL_AUTH_MASK		0x00007F00L
   1.274 +#define SSL_aRSA		0x00000100L /* Authenticate with RSA */
   1.275 +#define SSL_aDSS 		0x00000200L /* Authenticate with DSS */
   1.276 +#define SSL_DSS 		SSL_aDSS
   1.277 +#define SSL_aFZA 		0x00000400L
   1.278 +#define SSL_aNULL 		0x00000800L /* no Authenticate, ADH */
   1.279 +#define SSL_aDH 		0x00001000L /* no Authenticate, ADH */
   1.280 +#define SSL_aKRB5               0x00002000L /* Authenticate with KRB5 */
   1.281 +#define SSL_aECDSA              0x00004000L /* Authenticate with ECDSA */
   1.282 +
   1.283 +#define SSL_NULL		(SSL_eNULL)
   1.284 +#define SSL_ADH			(SSL_kEDH|SSL_aNULL)
   1.285 +#define SSL_RSA			(SSL_kRSA|SSL_aRSA)
   1.286 +#define SSL_DH			(SSL_kDHr|SSL_kDHd|SSL_kEDH)
   1.287 +#define SSL_ECDH		(SSL_kECDH|SSL_kECDHE)
   1.288 +#define SSL_FZA			(SSL_aFZA|SSL_kFZA|SSL_eFZA)
   1.289 +#define SSL_KRB5                (SSL_kKRB5|SSL_aKRB5)
   1.290 +
   1.291 +#define SSL_ENC_MASK		0x043F8000L
   1.292 +#define SSL_DES			0x00008000L
   1.293 +#define SSL_3DES		0x00010000L
   1.294 +#define SSL_RC4			0x00020000L
   1.295 +#define SSL_RC2			0x00040000L
   1.296 +#define SSL_IDEA		0x00080000L
   1.297 +#define SSL_eFZA		0x00100000L
   1.298 +#define SSL_eNULL		0x00200000L
   1.299 +#define SSL_AES			0x04000000L
   1.300 +
   1.301 +
   1.302 +
   1.303 +#define SSL_MAC_MASK		0x00c00000L
   1.304 +#define SSL_MD5			0x00400000L
   1.305 +#define SSL_SHA1		0x00800000L
   1.306 +#define SSL_SHA			(SSL_SHA1)
   1.307 +
   1.308 +#define SSL_SSL_MASK		0x03000000L
   1.309 +#define SSL_SSLV2		0x01000000L
   1.310 +#define SSL_SSLV3		0x02000000L
   1.311 +#define SSL_TLSV1		SSL_SSLV3	/* for now */
   1.312 +
   1.313 +/* we have used 07ffffff - 5 bits left to go. */
   1.314 +
   1.315 +/*
   1.316 + * Export and cipher strength information. For each cipher we have to decide
   1.317 + * whether it is exportable or not. This information is likely to change
   1.318 + * over time, since the export control rules are no static technical issue.
   1.319 + *
   1.320 + * Independent of the export flag the cipher strength is sorted into classes.
   1.321 + * SSL_EXP40 was denoting the 40bit US export limit of past times, which now
   1.322 + * is at 56bit (SSL_EXP56). If the exportable cipher class is going to change
   1.323 + * again (eg. to 64bit) the use of "SSL_EXP*" becomes blurred even more,
   1.324 + * since SSL_EXP64 could be similar to SSL_LOW.
   1.325 + * For this reason SSL_MICRO and SSL_MINI macros are included to widen the
   1.326 + * namespace of SSL_LOW-SSL_HIGH to lower values. As development of speed
   1.327 + * and ciphers goes, another extension to SSL_SUPER and/or SSL_ULTRA would
   1.328 + * be possible.
   1.329 + */
   1.330 +#define SSL_EXP_MASK	0x00000003L
   1.331 +#define SSL_NOT_EXP		0x00000001L
   1.332 +#define SSL_EXPORT		0x00000002L
   1.333 +
   1.334 +#define SSL_STRONG_MASK		0x000000fcL
   1.335 +#define SSL_STRONG_NONE		0x00000004L
   1.336 +#define SSL_EXP40		0x00000008L
   1.337 +#define SSL_MICRO		(SSL_EXP40)
   1.338 +#define SSL_EXP56		0x00000010L
   1.339 +#define SSL_MINI		(SSL_EXP56)
   1.340 +#define SSL_LOW			0x00000020L
   1.341 +#define SSL_MEDIUM		0x00000040L
   1.342 +#define SSL_HIGH		0x00000080L
   1.343 +
   1.344 +/* we have used 000000ff - 24 bits left to go */
   1.345 +
   1.346 +/*
   1.347 + * Macros to check the export status and cipher strength for export ciphers.
   1.348 + * Even though the macros for EXPORT and EXPORT40/56 have similar names,
   1.349 + * their meaning is different:
   1.350 + * *_EXPORT macros check the 'exportable' status.
   1.351 + * *_EXPORT40/56 macros are used to check whether a certain cipher strength
   1.352 + *          is given.
   1.353 + * Since the SSL_IS_EXPORT* and SSL_EXPORT* macros depend on the correct
   1.354 + * algorithm structure element to be passed (algorithms, algo_strength) and no
   1.355 + * typechecking can be done as they are all of type unsigned long, their
   1.356 + * direct usage is discouraged.
   1.357 + * Use the SSL_C_* macros instead.
   1.358 + */
   1.359 +#define SSL_IS_EXPORT(a)	((a)&SSL_EXPORT)
   1.360 +#define SSL_IS_EXPORT56(a)	((a)&SSL_EXP56)
   1.361 +#define SSL_IS_EXPORT40(a)	((a)&SSL_EXP40)
   1.362 +#define SSL_C_IS_EXPORT(c)	SSL_IS_EXPORT((c)->algo_strength)
   1.363 +#define SSL_C_IS_EXPORT56(c)	SSL_IS_EXPORT56((c)->algo_strength)
   1.364 +#define SSL_C_IS_EXPORT40(c)	SSL_IS_EXPORT40((c)->algo_strength)
   1.365 +
   1.366 +#define SSL_EXPORT_KEYLENGTH(a,s)	(SSL_IS_EXPORT40(s) ? 5 : \
   1.367 +				 ((a)&SSL_ENC_MASK) == SSL_DES ? 8 : 7)
   1.368 +#define SSL_EXPORT_PKEYLENGTH(a) (SSL_IS_EXPORT40(a) ? 512 : 1024)
   1.369 +#define SSL_C_EXPORT_KEYLENGTH(c)	SSL_EXPORT_KEYLENGTH((c)->algorithms, \
   1.370 +				(c)->algo_strength)
   1.371 +#define SSL_C_EXPORT_PKEYLENGTH(c)	SSL_EXPORT_PKEYLENGTH((c)->algo_strength)
   1.372 +
   1.373 +
   1.374 +#define SSL_ALL			0xffffffffL
   1.375 +#define SSL_ALL_CIPHERS		(SSL_MKEY_MASK|SSL_AUTH_MASK|SSL_ENC_MASK|\
   1.376 +				SSL_MAC_MASK)
   1.377 +#define SSL_ALL_STRENGTHS	(SSL_EXP_MASK|SSL_STRONG_MASK)
   1.378 +
   1.379 +/* Mostly for SSLv3 */
   1.380 +#define SSL_PKEY_RSA_ENC	0
   1.381 +#define SSL_PKEY_RSA_SIGN	1
   1.382 +#define SSL_PKEY_DSA_SIGN	2
   1.383 +#define SSL_PKEY_DH_RSA		3
   1.384 +#define SSL_PKEY_DH_DSA		4
   1.385 +#define SSL_PKEY_ECC            5
   1.386 +#define SSL_PKEY_NUM		6
   1.387 +
   1.388 +/* SSL_kRSA <- RSA_ENC | (RSA_TMP & RSA_SIGN) |
   1.389 + * 	    <- (EXPORT & (RSA_ENC | RSA_TMP) & RSA_SIGN)
   1.390 + * SSL_kDH  <- DH_ENC & (RSA_ENC | RSA_SIGN | DSA_SIGN)
   1.391 + * SSL_kEDH <- RSA_ENC | RSA_SIGN | DSA_SIGN
   1.392 + * SSL_aRSA <- RSA_ENC | RSA_SIGN
   1.393 + * SSL_aDSS <- DSA_SIGN
   1.394 + */
   1.395 +
   1.396 +/*
   1.397 +#define CERT_INVALID		0
   1.398 +#define CERT_PUBLIC_KEY		1
   1.399 +#define CERT_PRIVATE_KEY	2
   1.400 +*/
   1.401 +
   1.402 +#ifndef OPENSSL_NO_EC
   1.403 +/* From ECC-TLS draft, used in encoding the curve type in 
   1.404 + * ECParameters
   1.405 + */
   1.406 +#define EXPLICIT_PRIME_CURVE_TYPE  1   
   1.407 +#define EXPLICIT_CHAR2_CURVE_TYPE  2
   1.408 +#define NAMED_CURVE_TYPE           3
   1.409 +#endif  /* OPENSSL_NO_EC */
   1.410 +
   1.411 +typedef struct cert_pkey_st
   1.412 +	{
   1.413 +	X509 *x509;
   1.414 +	EVP_PKEY *privatekey;
   1.415 +	} CERT_PKEY;
   1.416 +
   1.417 +typedef struct cert_st
   1.418 +	{
   1.419 +	/* Current active set */
   1.420 +	CERT_PKEY *key; /* ALWAYS points to an element of the pkeys array
   1.421 +			 * Probably it would make more sense to store
   1.422 +			 * an index, not a pointer. */
   1.423 + 
   1.424 +	/* The following masks are for the key and auth
   1.425 +	 * algorithms that are supported by the certs below */
   1.426 +	int valid;
   1.427 +	unsigned long mask;
   1.428 +	unsigned long export_mask;
   1.429 +#ifndef OPENSSL_NO_RSA
   1.430 +	RSA *rsa_tmp;
   1.431 +	RSA *(*rsa_tmp_cb)(SSL *ssl,int is_export,int keysize);
   1.432 +#endif
   1.433 +#ifndef OPENSSL_NO_DH
   1.434 +	DH *dh_tmp;
   1.435 +	DH *(*dh_tmp_cb)(SSL *ssl,int is_export,int keysize);
   1.436 +#endif
   1.437 +#ifndef OPENSSL_NO_ECDH
   1.438 +	EC_KEY *ecdh_tmp;
   1.439 +	/* Callback for generating ephemeral ECDH keys */
   1.440 +	EC_KEY *(*ecdh_tmp_cb)(SSL *ssl,int is_export,int keysize);
   1.441 +#endif
   1.442 +
   1.443 +	CERT_PKEY pkeys[SSL_PKEY_NUM];
   1.444 +
   1.445 +	int references; /* >1 only if SSL_copy_session_id is used */
   1.446 +	} CERT;
   1.447 +	
   1.448 +typedef struct sess_cert_st
   1.449 +	{
   1.450 +	STACK_OF(X509) *cert_chain; /* as received from peer (not for SSL2) */
   1.451 +
   1.452 +	/* The 'peer_...' members are used only by clients. */
   1.453 +	int peer_cert_type;
   1.454 +
   1.455 +	CERT_PKEY *peer_key; /* points to an element of peer_pkeys (never NULL!) */
   1.456 +	CERT_PKEY peer_pkeys[SSL_PKEY_NUM];
   1.457 +	/* Obviously we don't have the private keys of these,
   1.458 +	 * so maybe we shouldn't even use the CERT_PKEY type here. */
   1.459 +
   1.460 +#ifndef OPENSSL_NO_RSA
   1.461 +	RSA *peer_rsa_tmp; /* not used for SSL 2 */
   1.462 +#endif
   1.463 +#ifndef OPENSSL_NO_DH
   1.464 +	DH *peer_dh_tmp; /* not used for SSL 2 */
   1.465 +#endif
   1.466 +#ifndef OPENSSL_NO_ECDH
   1.467 +	EC_KEY *peer_ecdh_tmp;
   1.468 +#endif
   1.469 +
   1.470 +	int references; /* actually always 1 at the moment */
   1.471 +	} SESS_CERT;
   1.472 +
   1.473 +
   1.474 +/*#define MAC_DEBUG	*/
   1.475 +
   1.476 +/*#define ERR_DEBUG	*/
   1.477 +/*#define ABORT_DEBUG	*/
   1.478 +/*#define PKT_DEBUG 1   */
   1.479 +/*#define DES_DEBUG	*/
   1.480 +/*#define DES_OFB_DEBUG	*/
   1.481 +/*#define SSL_DEBUG	*/
   1.482 +/*#define RSA_DEBUG	*/ 
   1.483 +/*#define IDEA_DEBUG	*/ 
   1.484 +
   1.485 +#define FP_ICC  (int (*)(const void *,const void *))
   1.486 +#define ssl_put_cipher_by_char(ssl,ciph,ptr) \
   1.487 +		((ssl)->method->put_cipher_by_char((ciph),(ptr)))
   1.488 +#define ssl_get_cipher_by_char(ssl,ptr) \
   1.489 +		((ssl)->method->get_cipher_by_char(ptr))
   1.490 +
   1.491 +#ifndef EMULATOR
   1.492 +/* This is for the SSLv3/TLSv1.0 differences in crypto/hash stuff
   1.493 + * It is a bit of a mess of functions, but hell, think of it as
   1.494 + * an opaque structure :-) */
   1.495 +typedef struct ssl3_enc_method
   1.496 +	{
   1.497 +	int (*enc)(SSL *, int);
   1.498 +	int (*mac)(SSL *, unsigned char *, int);
   1.499 +	int (*setup_key_block)(SSL *);
   1.500 +	int (*generate_master_secret)(SSL *, unsigned char *, unsigned char *, int);
   1.501 +	int (*change_cipher_state)(SSL *, int);
   1.502 +	int (*final_finish_mac)(SSL *, EVP_MD_CTX *, EVP_MD_CTX *, const char *, int, unsigned char *);
   1.503 +	int finish_mac_length;
   1.504 +	int (*cert_verify_mac)(SSL *, EVP_MD_CTX *, unsigned char *);
   1.505 +	const char *client_finished_label;
   1.506 +	int client_finished_label_len;
   1.507 +	const char *server_finished_label;
   1.508 +	int server_finished_label_len;
   1.509 +	int (*alert_value)(int);
   1.510 +	} SSL3_ENC_METHOD;
   1.511 +#endif
   1.512 +/* Used for holding the relevant compression methods loaded into SSL_CTX */
   1.513 +typedef struct ssl3_comp_st
   1.514 +	{
   1.515 +	int comp_id;	/* The identifier byte for this compression type */
   1.516 +	char *name;	/* Text name used for the compression type */
   1.517 +	COMP_METHOD *method; /* The method :-) */
   1.518 +	} SSL3_COMP;
   1.519 +
   1.520 +#ifndef EMULATOR
   1.521 +
   1.522 +extern SSL3_ENC_METHOD ssl3_undef_enc_method;
   1.523 +OPENSSL_EXTERN SSL_CIPHER ssl2_ciphers[];
   1.524 +OPENSSL_EXTERN SSL_CIPHER ssl3_ciphers[];
   1.525 +
   1.526 +#else
   1.527 +
   1.528 +//GET_GLOBAL_VAR_FROM_TLS(ssl3_undef_enc_method,ssl_lib,SSL3_ENC_METHOD)
   1.529 +//#define ssl3_undef_enc_method (GET_WSD_VAR_NAME(ssl3_undef_enc_method,ssl_lib,g)())
   1.530 +
   1.531 +
   1.532 +//GET_GLOBAL_ARRAY_FROM_TLS(ssl2_ciphers,s2_lib,SSL_CIPHER)
   1.533 +
   1.534 +//#define ssl2_ciphers (GET_WSD_VAR_NAME(ssl2_ciphers,s2_lib,g)())
   1.535 +
   1.536 +
   1.537 +//GET_GLOBAL_ARRAY_FROM_TLS(ssl3_ciphers,s3_lib,SSL_CIPHER)
   1.538 +
   1.539 +//#define ssl3_ciphers (GET_WSD_VAR_NAME(ssl3_ciphers,s3_lib,g)())
   1.540 +
   1.541 +#endif
   1.542 +
   1.543 +//extern const SSL3_ENC_METHOD ssl3_undef_enc_method;
   1.544 +//OPENSSL_EXTERN const SSL_CIPHER ssl2_ciphers[];
   1.545 +//OPENSSL_EXTERN const SSL_CIPHER ssl3_ciphers[];
   1.546 +
   1.547 +//#endif
   1.548 +
   1.549 +SSL_METHOD *ssl_bad_method(int ver);
   1.550 +SSL_METHOD *sslv2_base_method(void);
   1.551 +SSL_METHOD *sslv23_base_method(void);
   1.552 +SSL_METHOD *sslv3_base_method(void);
   1.553 +
   1.554 +
   1.555 +
   1.556 +#ifndef EMULATOR
   1.557 +
   1.558 +extern SSL3_ENC_METHOD DTLSv1_enc_data;
   1.559 +extern SSL3_ENC_METHOD TLSv1_enc_data;
   1.560 +extern SSL3_ENC_METHOD SSLv3_enc_data;
   1.561 +
   1.562 +#endif
   1.563 +
   1.564 +#ifdef EMULATOR
   1.565 +
   1.566 +#define IMPLEMENT_ssl23_meth_func(func_name, s_accept, s_connect, s_get_meth) \
   1.567 +	SSL_METHOD *func_name(void)  \
   1.568 +	{ \
   1.569 +		return &func_name##_data; \
   1.570 +	}\
   1.571 +const SSL_METHOD temp_##func_name##_data= { \
   1.572 +	TLS1_VERSION, \
   1.573 +	tls1_new, \
   1.574 +	tls1_clear, \
   1.575 +	tls1_free, \
   1.576 +	s_accept, \
   1.577 +	s_connect, \
   1.578 +	ssl23_read, \
   1.579 +	ssl23_peek, \
   1.580 +	ssl23_write, \
   1.581 +	ssl_undefined_function, \
   1.582 +	ssl_undefined_function, \
   1.583 +	ssl_ok, \
   1.584 +	ssl3_get_message, \
   1.585 +	ssl3_read_bytes, \
   1.586 +	ssl3_write_bytes, \
   1.587 +	ssl3_dispatch_alert, \
   1.588 +	ssl3_ctrl, \
   1.589 +	ssl3_ctx_ctrl, \
   1.590 +	ssl23_get_cipher_by_char, \
   1.591 +	ssl23_put_cipher_by_char, \
   1.592 +	ssl_undefined_const_function, \
   1.593 +	ssl23_num_ciphers, \
   1.594 +	ssl23_get_cipher, \
   1.595 +	s_get_meth, \
   1.596 +	ssl23_default_timeout, \
   1.597 +	/*&ssl3_undef_enc_method*/NULL, \
   1.598 +	ssl_undefined_void_function, \
   1.599 +	ssl3_callback_ctrl, \
   1.600 +	ssl3_ctx_callback_ctrl, \
   1.601 +	}; 
   1.602 +
   1.603 +	
   1.604 +	#define IMPLEMENT_ssl2_meth_func(func_name, s_accept, s_connect, s_get_meth) \
   1.605 +	\
   1.606 +	SSL_METHOD *func_name(void)  \
   1.607 +	{ \
   1.608 +		return &func_name##_data; \
   1.609 +	}\
   1.610 +	const SSL_METHOD temp_##func_name##_data= { \
   1.611 +		SSL2_VERSION, \
   1.612 +		ssl2_new,	/* local */ \
   1.613 +		ssl2_clear,	/* local */ \
   1.614 +		ssl2_free,	/* local */ \
   1.615 +		s_accept, \
   1.616 +		s_connect, \
   1.617 +		ssl2_read, \
   1.618 +		ssl2_peek, \
   1.619 +		ssl2_write, \
   1.620 +		ssl2_shutdown, \
   1.621 +		ssl_ok,	/* NULL - renegotiate */ \
   1.622 +		ssl_ok,	/* NULL - check renegotiate */ \
   1.623 +		NULL, /* NULL - ssl_get_message */ \
   1.624 +		NULL, /* NULL - ssl_get_record */ \
   1.625 +		NULL, /* NULL - ssl_write_bytes */ \
   1.626 +		NULL, /* NULL - dispatch_alert */ \
   1.627 +		ssl2_ctrl,	/* local */ \
   1.628 +		ssl2_ctx_ctrl,	/* local */ \
   1.629 +		ssl2_get_cipher_by_char, \
   1.630 +		ssl2_put_cipher_by_char, \
   1.631 +		ssl2_pending, \
   1.632 +		ssl2_num_ciphers, \
   1.633 +		ssl2_get_cipher, \
   1.634 +		s_get_meth, \
   1.635 +		ssl2_default_timeout, \
   1.636 +		/*&ssl3_undef_enc_method*/NULL, \
   1.637 +		ssl_undefined_void_function, \
   1.638 +		ssl2_callback_ctrl,	/* local */ \
   1.639 +		ssl2_ctx_callback_ctrl,	/* local */ \
   1.640 +	}; 
   1.641 +	
   1.642 +	#define IMPLEMENT_dtls1_meth_func(func_name, s_accept, s_connect, s_get_meth) \
   1.643 +	\
   1.644 +	SSL_METHOD *func_name(void)  \
   1.645 +	{ \
   1.646 +		return &func_name##_data; \
   1.647 +	}\
   1.648 +	const SSL_METHOD temp_##func_name##_data= { \
   1.649 +		DTLS1_VERSION, \
   1.650 +		dtls1_new, \
   1.651 +		dtls1_clear, \
   1.652 +		dtls1_free, \
   1.653 +		s_accept, \
   1.654 +		s_connect, \
   1.655 +		ssl3_read, \
   1.656 +		ssl3_peek, \
   1.657 +		ssl3_write, \
   1.658 +		ssl3_shutdown, \
   1.659 +		ssl3_renegotiate, \
   1.660 +		ssl3_renegotiate_check, \
   1.661 +		dtls1_get_message, \
   1.662 +		dtls1_read_bytes, \
   1.663 +		dtls1_write_app_data_bytes, \
   1.664 +		dtls1_dispatch_alert, \
   1.665 +		ssl3_ctrl, \
   1.666 +		ssl3_ctx_ctrl, \
   1.667 +		ssl3_get_cipher_by_char, \
   1.668 +		ssl3_put_cipher_by_char, \
   1.669 +		ssl3_pending, \
   1.670 +		ssl3_num_ciphers, \
   1.671 +		ssl3_get_cipher, \
   1.672 +		s_get_meth, \
   1.673 +		dtls1_default_timeout, \
   1.674 +		/*&DTLSv1_enc_data*/NULL,\
   1.675 +		ssl_undefined_void_function, \
   1.676 +		ssl3_callback_ctrl, \
   1.677 +		ssl3_ctx_callback_ctrl, \
   1.678 +	}; 
   1.679 +	
   1.680 +
   1.681 +
   1.682 +#define IMPLEMENT_ssl3_meth_func(func_name, s_accept, s_connect, s_get_meth) \
   1.683 + \
   1.684 +	SSL_METHOD *func_name(void)  \
   1.685 +	{ \
   1.686 +		return &func_name##_data; \
   1.687 +	}\
   1.688 +	const SSL_METHOD temp_##func_name##_data= { \
   1.689 +		SSL3_VERSION, \
   1.690 +		ssl3_new, \
   1.691 +		ssl3_clear, \
   1.692 +		ssl3_free, \
   1.693 +		s_accept, \
   1.694 +		s_connect, \
   1.695 +		ssl3_read, \
   1.696 +		ssl3_peek, \
   1.697 +		ssl3_write, \
   1.698 +		ssl3_shutdown, \
   1.699 +		ssl3_renegotiate, \
   1.700 +		ssl3_renegotiate_check, \
   1.701 +		ssl3_get_message, \
   1.702 +		ssl3_read_bytes, \
   1.703 +		ssl3_write_bytes, \
   1.704 +		ssl3_dispatch_alert, \
   1.705 +		ssl3_ctrl, \
   1.706 +		ssl3_ctx_ctrl, \
   1.707 +		ssl3_get_cipher_by_char, \
   1.708 +		ssl3_put_cipher_by_char, \
   1.709 +		ssl3_pending, \
   1.710 +		ssl3_num_ciphers, \
   1.711 +		ssl3_get_cipher, \
   1.712 +		s_get_meth, \
   1.713 +		ssl3_default_timeout, \
   1.714 +		/*&SSLv3_enc_data*/NULL, \
   1.715 +		ssl_undefined_void_function, \
   1.716 +		ssl3_callback_ctrl, \
   1.717 +		ssl3_ctx_callback_ctrl, \
   1.718 +	};
   1.719 +
   1.720 +#define IMPLEMENT_tls1_meth_func(func_name, s_accept, s_connect, s_get_meth) \
   1.721 +	\
   1.722 +	SSL_METHOD *func_name(void)  \
   1.723 +	{ \
   1.724 +	return &func_name##_data; \
   1.725 +	}\
   1.726 +	const SSL_METHOD temp_##func_name##_data= { \
   1.727 +		TLS1_VERSION, \
   1.728 +		tls1_new, \
   1.729 +		tls1_clear, \
   1.730 +		tls1_free, \
   1.731 +		s_accept, \
   1.732 +		s_connect, \
   1.733 +		ssl3_read, \
   1.734 +		ssl3_peek, \
   1.735 +		ssl3_write, \
   1.736 +		ssl3_shutdown, \
   1.737 +		ssl3_renegotiate, \
   1.738 +		ssl3_renegotiate_check, \
   1.739 +		ssl3_get_message, \
   1.740 +		ssl3_read_bytes, \
   1.741 +		ssl3_write_bytes, \
   1.742 +		ssl3_dispatch_alert, \
   1.743 +		ssl3_ctrl, \
   1.744 +		ssl3_ctx_ctrl, \
   1.745 +		ssl3_get_cipher_by_char, \
   1.746 +		ssl3_put_cipher_by_char, \
   1.747 +		ssl3_pending, \
   1.748 +		ssl3_num_ciphers, \
   1.749 +		ssl3_get_cipher, \
   1.750 +		s_get_meth, \
   1.751 +		tls1_default_timeout, \
   1.752 +		/* &TLSv1_enc_data */NULL, \
   1.753 +		ssl_undefined_void_function, \
   1.754 +		ssl3_callback_ctrl, \
   1.755 +		ssl3_ctx_callback_ctrl, \
   1.756 +	}; 
   1.757 +
   1.758 +#else /* #endif *//* EMULATOR */
   1.759 +
   1.760 +
   1.761 +#define IMPLEMENT_tls1_meth_func(func_name, s_accept, s_connect, s_get_meth) \
   1.762 +SSL_METHOD *func_name(void)  \
   1.763 +	{ \
   1.764 +	static SSL_METHOD func_name##_data= { \
   1.765 +		TLS1_VERSION, \
   1.766 +		tls1_new, \
   1.767 +		tls1_clear, \
   1.768 +		tls1_free, \
   1.769 +		s_accept, \
   1.770 +		s_connect, \
   1.771 +		ssl3_read, \
   1.772 +		ssl3_peek, \
   1.773 +		ssl3_write, \
   1.774 +		ssl3_shutdown, \
   1.775 +		ssl3_renegotiate, \
   1.776 +		ssl3_renegotiate_check, \
   1.777 +		ssl3_get_message, \
   1.778 +		ssl3_read_bytes, \
   1.779 +		ssl3_write_bytes, \
   1.780 +		ssl3_dispatch_alert, \
   1.781 +		ssl3_ctrl, \
   1.782 +		ssl3_ctx_ctrl, \
   1.783 +		ssl3_get_cipher_by_char, \
   1.784 +		ssl3_put_cipher_by_char, \
   1.785 +		ssl3_pending, \
   1.786 +		ssl3_num_ciphers, \
   1.787 +		ssl3_get_cipher, \
   1.788 +		s_get_meth, \
   1.789 +		tls1_default_timeout, \
   1.790 +		&TLSv1_enc_data, \
   1.791 +		ssl_undefined_void_function, \
   1.792 +		ssl3_callback_ctrl, \
   1.793 +		ssl3_ctx_callback_ctrl, \
   1.794 +	}; \
   1.795 +	return &func_name##_data; \
   1.796 +	}
   1.797 +
   1.798 +#define IMPLEMENT_ssl3_meth_func(func_name, s_accept, s_connect, s_get_meth) \
   1.799 +SSL_METHOD *func_name(void)  \
   1.800 +	{ \
   1.801 +	static SSL_METHOD func_name##_data= { \
   1.802 +		SSL3_VERSION, \
   1.803 +		ssl3_new, \
   1.804 +		ssl3_clear, \
   1.805 +		ssl3_free, \
   1.806 +		s_accept, \
   1.807 +		s_connect, \
   1.808 +		ssl3_read, \
   1.809 +		ssl3_peek, \
   1.810 +		ssl3_write, \
   1.811 +		ssl3_shutdown, \
   1.812 +		ssl3_renegotiate, \
   1.813 +		ssl3_renegotiate_check, \
   1.814 +		ssl3_get_message, \
   1.815 +		ssl3_read_bytes, \
   1.816 +		ssl3_write_bytes, \
   1.817 +		ssl3_dispatch_alert, \
   1.818 +		ssl3_ctrl, \
   1.819 +		ssl3_ctx_ctrl, \
   1.820 +		ssl3_get_cipher_by_char, \
   1.821 +		ssl3_put_cipher_by_char, \
   1.822 +		ssl3_pending, \
   1.823 +		ssl3_num_ciphers, \
   1.824 +		ssl3_get_cipher, \
   1.825 +		s_get_meth, \
   1.826 +		ssl3_default_timeout, \
   1.827 +		&SSLv3_enc_data, \
   1.828 +		ssl_undefined_void_function, \
   1.829 +		ssl3_callback_ctrl, \
   1.830 +		ssl3_ctx_callback_ctrl, \
   1.831 +	}; \
   1.832 +	return &func_name##_data; \
   1.833 +	}
   1.834 +
   1.835 +
   1.836 +#define IMPLEMENT_ssl23_meth_func(func_name, s_accept, s_connect, s_get_meth) \
   1.837 +SSL_METHOD *func_name(void)  \
   1.838 +	{ \
   1.839 +	static SSL_METHOD func_name##_data= { \
   1.840 +	TLS1_VERSION, \
   1.841 +	tls1_new, \
   1.842 +	tls1_clear, \
   1.843 +	tls1_free, \
   1.844 +	s_accept, \
   1.845 +	s_connect, \
   1.846 +	ssl23_read, \
   1.847 +	ssl23_peek, \
   1.848 +	ssl23_write, \
   1.849 +	ssl_undefined_function, \
   1.850 +	ssl_undefined_function, \
   1.851 +	ssl_ok, \
   1.852 +	ssl3_get_message, \
   1.853 +	ssl3_read_bytes, \
   1.854 +	ssl3_write_bytes, \
   1.855 +	ssl3_dispatch_alert, \
   1.856 +	ssl3_ctrl, \
   1.857 +	ssl3_ctx_ctrl, \
   1.858 +	ssl23_get_cipher_by_char, \
   1.859 +	ssl23_put_cipher_by_char, \
   1.860 +	ssl_undefined_const_function, \
   1.861 +	ssl23_num_ciphers, \
   1.862 +	ssl23_get_cipher, \
   1.863 +	s_get_meth, \
   1.864 +	ssl23_default_timeout, \
   1.865 +	&ssl3_undef_enc_method, \
   1.866 +	ssl_undefined_void_function, \
   1.867 +	ssl3_callback_ctrl, \
   1.868 +	ssl3_ctx_callback_ctrl, \
   1.869 +	}; \
   1.870 +	return &func_name##_data; \
   1.871 +	}
   1.872 +
   1.873 +
   1.874 +#define IMPLEMENT_ssl2_meth_func(func_name, s_accept, s_connect, s_get_meth) \
   1.875 +SSL_METHOD *func_name(void)  \
   1.876 +	{ \
   1.877 +	static SSL_METHOD func_name##_data= { \
   1.878 +		SSL2_VERSION, \
   1.879 +		ssl2_new,	/* local */ \
   1.880 +		ssl2_clear,	/* local */ \
   1.881 +		ssl2_free,	/* local */ \
   1.882 +		s_accept, \
   1.883 +		s_connect, \
   1.884 +		ssl2_read, \
   1.885 +		ssl2_peek, \
   1.886 +		ssl2_write, \
   1.887 +		ssl2_shutdown, \
   1.888 +		ssl_ok,	/* NULL - renegotiate */ \
   1.889 +		ssl_ok,	/* NULL - check renegotiate */ \
   1.890 +		NULL, /* NULL - ssl_get_message */ \
   1.891 +		NULL, /* NULL - ssl_get_record */ \
   1.892 +		NULL, /* NULL - ssl_write_bytes */ \
   1.893 +		NULL, /* NULL - dispatch_alert */ \
   1.894 +		ssl2_ctrl,	/* local */ \
   1.895 +		ssl2_ctx_ctrl,	/* local */ \
   1.896 +		ssl2_get_cipher_by_char, \
   1.897 +		ssl2_put_cipher_by_char, \
   1.898 +		ssl2_pending, \
   1.899 +		ssl2_num_ciphers, \
   1.900 +		ssl2_get_cipher, \
   1.901 +		s_get_meth, \
   1.902 +		ssl2_default_timeout, \
   1.903 +		&ssl3_undef_enc_method, \
   1.904 +		ssl_undefined_void_function, \
   1.905 +		ssl2_callback_ctrl,	/* local */ \
   1.906 +		ssl2_ctx_callback_ctrl,	/* local */ \
   1.907 +	}; \
   1.908 +	return &func_name##_data; \
   1.909 +	}
   1.910 +
   1.911 +
   1.912 +#define IMPLEMENT_dtls1_meth_func(func_name, s_accept, s_connect, s_get_meth) \
   1.913 +SSL_METHOD *func_name(void)  \
   1.914 +	{ \
   1.915 +	static SSL_METHOD func_name##_data= { \
   1.916 +		DTLS1_VERSION, \
   1.917 +		dtls1_new, \
   1.918 +		dtls1_clear, \
   1.919 +		dtls1_free, \
   1.920 +		s_accept, \
   1.921 +		s_connect, \
   1.922 +		ssl3_read, \
   1.923 +		ssl3_peek, \
   1.924 +		ssl3_write, \
   1.925 +		ssl3_shutdown, \
   1.926 +		ssl3_renegotiate, \
   1.927 +		ssl3_renegotiate_check, \
   1.928 +		dtls1_get_message, \
   1.929 +		dtls1_read_bytes, \
   1.930 +		dtls1_write_app_data_bytes, \
   1.931 +		dtls1_dispatch_alert, \
   1.932 +		ssl3_ctrl, \
   1.933 +		ssl3_ctx_ctrl, \
   1.934 +		ssl3_get_cipher_by_char, \
   1.935 +		ssl3_put_cipher_by_char, \
   1.936 +		ssl3_pending, \
   1.937 +		ssl3_num_ciphers, \
   1.938 +		ssl3_get_cipher, \
   1.939 +		s_get_meth, \
   1.940 +		dtls1_default_timeout, \
   1.941 +		&DTLSv1_enc_data, \
   1.942 +		ssl_undefined_void_function, \
   1.943 +		ssl3_callback_ctrl, \
   1.944 +		ssl3_ctx_callback_ctrl, \
   1.945 +	}; \
   1.946 +	return &func_name##_data; \
   1.947 +}
   1.948 +
   1.949 +
   1.950 +#endif /* EMULATOR */
   1.951 +
   1.952 +void ssl_clear_cipher_ctx(SSL *s);
   1.953 +int ssl_clear_bad_session(SSL *s);
   1.954 +CERT *ssl_cert_new(void);
   1.955 +CERT *ssl_cert_dup(CERT *cert);
   1.956 +int ssl_cert_inst(CERT **o);
   1.957 +void ssl_cert_free(CERT *c);
   1.958 +SESS_CERT *ssl_sess_cert_new(void);
   1.959 +void ssl_sess_cert_free(SESS_CERT *sc);
   1.960 +int ssl_set_peer_cert_type(SESS_CERT *c, int type);
   1.961 +int ssl_get_new_session(SSL *s, int session);
   1.962 +int ssl_get_prev_session(SSL *s, unsigned char *session,int len, const unsigned char *limit);
   1.963 +int ssl_cipher_id_cmp(const SSL_CIPHER *a,const SSL_CIPHER *b);
   1.964 +int ssl_cipher_ptr_id_cmp(const SSL_CIPHER * const *ap,
   1.965 +			const SSL_CIPHER * const *bp);
   1.966 +STACK_OF(SSL_CIPHER) *ssl_bytes_to_cipher_list(SSL *s,unsigned char *p,int num,
   1.967 +					       STACK_OF(SSL_CIPHER) **skp);
   1.968 +int ssl_cipher_list_to_bytes(SSL *s,STACK_OF(SSL_CIPHER) *sk,unsigned char *p,
   1.969 +                             int (*put_cb)(const SSL_CIPHER *, unsigned char *));
   1.970 +STACK_OF(SSL_CIPHER) *ssl_create_cipher_list(const SSL_METHOD *meth,
   1.971 +					     STACK_OF(SSL_CIPHER) **pref,
   1.972 +					     STACK_OF(SSL_CIPHER) **sorted,
   1.973 +					     const char *rule_str);
   1.974 +void ssl_update_cache(SSL *s, int mode);
   1.975 +int ssl_cipher_get_evp(const SSL_SESSION *s,const EVP_CIPHER **enc,
   1.976 +		       const EVP_MD **md,SSL_COMP **comp);
   1.977 +int ssl_verify_cert_chain(SSL *s,STACK_OF(X509) *sk);
   1.978 +int ssl_undefined_function(SSL *s);
   1.979 +int ssl_undefined_void_function(void);
   1.980 +int ssl_undefined_const_function(const SSL *s);
   1.981 +X509 *ssl_get_server_send_cert(SSL *);
   1.982 +EVP_PKEY *ssl_get_sign_pkey(SSL *,SSL_CIPHER *);
   1.983 +int ssl_cert_type(X509 *x,EVP_PKEY *pkey);
   1.984 +void ssl_set_cert_masks(CERT *c, SSL_CIPHER *cipher);
   1.985 +STACK_OF(SSL_CIPHER) *ssl_get_ciphers_by_id(SSL *s);
   1.986 +int ssl_verify_alarm_type(long type);
   1.987 +void ssl_load_ciphers(void);
   1.988 +
   1.989 +int ssl2_enc_init(SSL *s, int client);
   1.990 +int ssl2_generate_key_material(SSL *s);
   1.991 +void ssl2_enc(SSL *s,int send_data);
   1.992 +void ssl2_mac(SSL *s,unsigned char *mac,int send_data);
   1.993 +SSL_CIPHER *ssl2_get_cipher_by_char(const unsigned char *p);
   1.994 +int ssl2_put_cipher_by_char(const SSL_CIPHER *c,unsigned char *p);
   1.995 +int ssl2_part_read(SSL *s, unsigned long f, int i);
   1.996 +int ssl2_do_write(SSL *s);
   1.997 +int ssl2_set_certificate(SSL *s, int type, int len, const unsigned char *data);
   1.998 +void ssl2_return_error(SSL *s,int reason);
   1.999 +void ssl2_write_error(SSL *s);
  1.1000 +int ssl2_num_ciphers(void);
  1.1001 +SSL_CIPHER *ssl2_get_cipher(unsigned int u);
  1.1002 +int	ssl2_new(SSL *s);
  1.1003 +void	ssl2_free(SSL *s);
  1.1004 +int	ssl2_accept(SSL *s);
  1.1005 +int	ssl2_connect(SSL *s);
  1.1006 +int	ssl2_read(SSL *s, void *buf, int len);
  1.1007 +int	ssl2_peek(SSL *s, void *buf, int len);
  1.1008 +int	ssl2_write(SSL *s, const void *buf, int len);
  1.1009 +int	ssl2_shutdown(SSL *s);
  1.1010 +void	ssl2_clear(SSL *s);
  1.1011 +long	ssl2_ctrl(SSL *s,int cmd, long larg, void *parg);
  1.1012 +long	ssl2_ctx_ctrl(SSL_CTX *s,int cmd, long larg, void *parg);
  1.1013 +long	ssl2_callback_ctrl(SSL *s,int cmd, void (*fp)(void));
  1.1014 +long	ssl2_ctx_callback_ctrl(SSL_CTX *s,int cmd, void (*fp)(void));
  1.1015 +int	ssl2_pending(const SSL *s);
  1.1016 +long	ssl2_default_timeout(void );
  1.1017 +
  1.1018 +SSL_CIPHER *ssl3_get_cipher_by_char(const unsigned char *p);
  1.1019 +int ssl3_put_cipher_by_char(const SSL_CIPHER *c,unsigned char *p);
  1.1020 +void ssl3_init_finished_mac(SSL *s);
  1.1021 +int ssl3_send_server_certificate(SSL *s);
  1.1022 +int ssl3_send_newsession_ticket(SSL *s);
  1.1023 +int ssl3_get_finished(SSL *s,int state_a,int state_b);
  1.1024 +int ssl3_setup_key_block(SSL *s);
  1.1025 +int ssl3_send_change_cipher_spec(SSL *s,int state_a,int state_b);
  1.1026 +int ssl3_change_cipher_state(SSL *s,int which);
  1.1027 +void ssl3_cleanup_key_block(SSL *s);
  1.1028 +int ssl3_do_write(SSL *s,int type);
  1.1029 +void ssl3_send_alert(SSL *s,int level, int desc);
  1.1030 +int ssl3_generate_master_secret(SSL *s, unsigned char *out,
  1.1031 +	unsigned char *p, int len);
  1.1032 +int ssl3_get_req_cert_type(SSL *s,unsigned char *p);
  1.1033 +long ssl3_get_message(SSL *s, int st1, int stn, int mt, long max, int *ok);
  1.1034 +int ssl3_send_finished(SSL *s, int a, int b, const char *sender,int slen);
  1.1035 +int ssl3_num_ciphers(void);
  1.1036 +SSL_CIPHER *ssl3_get_cipher(unsigned int u);
  1.1037 +int ssl3_renegotiate(SSL *ssl); 
  1.1038 +int ssl3_renegotiate_check(SSL *ssl); 
  1.1039 +int ssl3_dispatch_alert(SSL *s);
  1.1040 +int ssl3_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek);
  1.1041 +int ssl3_write_bytes(SSL *s, int type, const void *buf, int len);
  1.1042 +int ssl3_final_finish_mac(SSL *s, EVP_MD_CTX *ctx1, EVP_MD_CTX *ctx2,
  1.1043 +	const char *sender, int slen,unsigned char *p);
  1.1044 +int ssl3_cert_verify_mac(SSL *s, EVP_MD_CTX *in, unsigned char *p);
  1.1045 +void ssl3_finish_mac(SSL *s, const unsigned char *buf, int len);
  1.1046 +int ssl3_enc(SSL *s, int send_data);
  1.1047 +int ssl3_mac(SSL *ssl, unsigned char *md, int send_data);
  1.1048 +unsigned long ssl3_output_cert_chain(SSL *s, X509 *x);
  1.1049 +SSL_CIPHER *ssl3_choose_cipher(SSL *ssl,STACK_OF(SSL_CIPHER) *clnt,
  1.1050 +			       STACK_OF(SSL_CIPHER) *srvr);
  1.1051 +int	ssl3_setup_buffers(SSL *s);
  1.1052 +int	ssl3_new(SSL *s);
  1.1053 +void	ssl3_free(SSL *s);
  1.1054 +int	ssl3_accept(SSL *s);
  1.1055 +int	ssl3_connect(SSL *s);
  1.1056 +int	ssl3_read(SSL *s, void *buf, int len);
  1.1057 +int	ssl3_peek(SSL *s, void *buf, int len);
  1.1058 +int	ssl3_write(SSL *s, const void *buf, int len);
  1.1059 +int	ssl3_shutdown(SSL *s);
  1.1060 +void	ssl3_clear(SSL *s);
  1.1061 +long	ssl3_ctrl(SSL *s,int cmd, long larg, void *parg);
  1.1062 +long	ssl3_ctx_ctrl(SSL_CTX *s,int cmd, long larg, void *parg);
  1.1063 +long	ssl3_callback_ctrl(SSL *s,int cmd, void (*fp)(void));
  1.1064 +long	ssl3_ctx_callback_ctrl(SSL_CTX *s,int cmd, void (*fp)(void));
  1.1065 +int	ssl3_pending(const SSL *s);
  1.1066 +
  1.1067 +void ssl3_record_sequence_update(unsigned char *seq);
  1.1068 +int ssl3_do_change_cipher_spec(SSL *ssl);
  1.1069 +long ssl3_default_timeout(void );
  1.1070 +
  1.1071 +int ssl23_num_ciphers(void );
  1.1072 +SSL_CIPHER *ssl23_get_cipher(unsigned int u);
  1.1073 +int ssl23_read(SSL *s, void *buf, int len);
  1.1074 +int ssl23_peek(SSL *s, void *buf, int len);
  1.1075 +int ssl23_write(SSL *s, const void *buf, int len);
  1.1076 +int ssl23_put_cipher_by_char(const SSL_CIPHER *c, unsigned char *p);
  1.1077 +SSL_CIPHER *ssl23_get_cipher_by_char(const unsigned char *p);
  1.1078 +long ssl23_default_timeout(void );
  1.1079 +
  1.1080 +long tls1_default_timeout(void);
  1.1081 +int dtls1_do_write(SSL *s,int type);
  1.1082 +int ssl3_read_n(SSL *s, int n, int max, int extend);
  1.1083 +int dtls1_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek);
  1.1084 +int ssl3_do_compress(SSL *ssl);
  1.1085 +int ssl3_do_uncompress(SSL *ssl);
  1.1086 +int ssl3_write_pending(SSL *s, int type, const unsigned char *buf,
  1.1087 +	unsigned int len);
  1.1088 +unsigned char *dtls1_set_message_header(SSL *s, 
  1.1089 +	unsigned char *p, unsigned char mt,	unsigned long len, 
  1.1090 +	unsigned long frag_off, unsigned long frag_len);
  1.1091 +
  1.1092 +int dtls1_write_app_data_bytes(SSL *s, int type, const void *buf, int len);
  1.1093 +int dtls1_write_bytes(SSL *s, int type, const void *buf, int len);
  1.1094 +
  1.1095 +int dtls1_send_change_cipher_spec(SSL *s, int a, int b);
  1.1096 +int dtls1_send_finished(SSL *s, int a, int b, const char *sender, int slen);
  1.1097 +unsigned long dtls1_output_cert_chain(SSL *s, X509 *x);
  1.1098 +int dtls1_read_failed(SSL *s, int code);
  1.1099 +int dtls1_buffer_message(SSL *s, int ccs);
  1.1100 +int dtls1_retransmit_message(SSL *s, unsigned short seq, 
  1.1101 +	unsigned long frag_off, int *found);
  1.1102 +void dtls1_clear_record_buffer(SSL *s);
  1.1103 +void dtls1_get_message_header(unsigned char *data, struct hm_header_st *msg_hdr);
  1.1104 +void dtls1_get_ccs_header(unsigned char *data, struct ccs_header_st *ccs_hdr);
  1.1105 +void dtls1_reset_seq_numbers(SSL *s, int rw);
  1.1106 +long dtls1_default_timeout(void);
  1.1107 +SSL_CIPHER *dtls1_get_cipher(unsigned int u);
  1.1108 +
  1.1109 +
  1.1110 +/* some client-only functions */
  1.1111 +int ssl3_client_hello(SSL *s);
  1.1112 +int ssl3_get_server_hello(SSL *s);
  1.1113 +int ssl3_get_certificate_request(SSL *s);
  1.1114 +int ssl3_get_new_session_ticket(SSL *s);
  1.1115 +int ssl3_get_server_done(SSL *s);
  1.1116 +int ssl3_send_client_verify(SSL *s);
  1.1117 +int ssl3_send_client_certificate(SSL *s);
  1.1118 +int ssl3_send_client_key_exchange(SSL *s);
  1.1119 +int ssl3_get_key_exchange(SSL *s);
  1.1120 +int ssl3_get_server_certificate(SSL *s);
  1.1121 +int ssl3_check_cert_and_algorithm(SSL *s);
  1.1122 +
  1.1123 +int dtls1_client_hello(SSL *s);
  1.1124 +int dtls1_send_client_certificate(SSL *s);
  1.1125 +int dtls1_send_client_key_exchange(SSL *s);
  1.1126 +int dtls1_send_client_verify(SSL *s);
  1.1127 +
  1.1128 +/* some server-only functions */
  1.1129 +int ssl3_get_client_hello(SSL *s);
  1.1130 +int ssl3_send_server_hello(SSL *s);
  1.1131 +int ssl3_send_hello_request(SSL *s);
  1.1132 +int ssl3_send_server_key_exchange(SSL *s);
  1.1133 +int ssl3_send_certificate_request(SSL *s);
  1.1134 +int ssl3_send_server_done(SSL *s);
  1.1135 +int ssl3_check_client_hello(SSL *s);
  1.1136 +int ssl3_get_client_certificate(SSL *s);
  1.1137 +int ssl3_get_client_key_exchange(SSL *s);
  1.1138 +int ssl3_get_cert_verify(SSL *s);
  1.1139 +
  1.1140 +int dtls1_send_hello_request(SSL *s);
  1.1141 +int dtls1_send_server_hello(SSL *s);
  1.1142 +int dtls1_send_server_certificate(SSL *s);
  1.1143 +int dtls1_send_server_key_exchange(SSL *s);
  1.1144 +int dtls1_send_certificate_request(SSL *s);
  1.1145 +int dtls1_send_server_done(SSL *s);
  1.1146 +
  1.1147 +
  1.1148 +
  1.1149 +int ssl23_accept(SSL *s);
  1.1150 +int ssl23_connect(SSL *s);
  1.1151 +int ssl23_read_bytes(SSL *s, int n);
  1.1152 +int ssl23_write_bytes(SSL *s);
  1.1153 +
  1.1154 +int tls1_new(SSL *s);
  1.1155 +void tls1_free(SSL *s);
  1.1156 +void tls1_clear(SSL *s);
  1.1157 +long tls1_ctrl(SSL *s,int cmd, long larg, void *parg);
  1.1158 +long tls1_callback_ctrl(SSL *s,int cmd, void (*fp)(void));
  1.1159 +SSL_METHOD *tlsv1_base_method(void );
  1.1160 +
  1.1161 +int dtls1_new(SSL *s);
  1.1162 +int	dtls1_accept(SSL *s);
  1.1163 +int	dtls1_connect(SSL *s);
  1.1164 +void dtls1_free(SSL *s);
  1.1165 +void dtls1_clear(SSL *s);
  1.1166 +long dtls1_ctrl(SSL *s,int cmd, long larg, void *parg);
  1.1167 +SSL_METHOD *dtlsv1_base_method(void );
  1.1168 +
  1.1169 +long dtls1_get_message(SSL *s, int st1, int stn, int mt, long max, int *ok);
  1.1170 +int dtls1_get_record(SSL *s);
  1.1171 +int do_dtls1_write(SSL *s, int type, const unsigned char *buf,
  1.1172 +	unsigned int len, int create_empty_fragement);
  1.1173 +int dtls1_dispatch_alert(SSL *s);
  1.1174 +int dtls1_enc(SSL *s, int snd);
  1.1175 +
  1.1176 +int ssl_init_wbio_buffer(SSL *s, int push);
  1.1177 +void ssl_free_wbio_buffer(SSL *s);
  1.1178 +
  1.1179 +int tls1_change_cipher_state(SSL *s, int which);
  1.1180 +int tls1_setup_key_block(SSL *s);
  1.1181 +int tls1_enc(SSL *s, int snd);
  1.1182 +int tls1_final_finish_mac(SSL *s, EVP_MD_CTX *in1_ctx, EVP_MD_CTX *in2_ctx,
  1.1183 +	const char *str, int slen, unsigned char *p);
  1.1184 +int tls1_cert_verify_mac(SSL *s, EVP_MD_CTX *in, unsigned char *p);
  1.1185 +int tls1_mac(SSL *ssl, unsigned char *md, int snd);
  1.1186 +int tls1_generate_master_secret(SSL *s, unsigned char *out,
  1.1187 +	unsigned char *p, int len);
  1.1188 +int tls1_alert_code(int code);
  1.1189 +int ssl3_alert_code(int code);
  1.1190 +int ssl_ok(SSL *s);
  1.1191 +
  1.1192 +int check_srvr_ecc_cert_and_alg(X509 *x, SSL_CIPHER *cs);
  1.1193 +
  1.1194 +SSL_COMP *ssl3_comp_find(STACK_OF(SSL_COMP) *sk, int n);
  1.1195 +
  1.1196 +
  1.1197 +#endif