Merge remote-tracking branch 'origin/debian' into debian
[mech_eap.git] / libeap / src / tls / tlsv1_common.h
diff --git a/libeap/src/tls/tlsv1_common.h b/libeap/src/tls/tlsv1_common.h
new file mode 100644 (file)
index 0000000..e30b15a
--- /dev/null
@@ -0,0 +1,275 @@
+/*
+ * TLSv1 common definitions
+ * Copyright (c) 2006-2014, Jouni Malinen <j@w1.fi>
+ *
+ * This software may be distributed under the terms of the BSD license.
+ * See README for more details.
+ */
+
+#ifndef TLSV1_COMMON_H
+#define TLSV1_COMMON_H
+
+#include "crypto/crypto.h"
+
+#define TLS_VERSION_1 0x0301 /* TLSv1 */
+#define TLS_VERSION_1_1 0x0302 /* TLSv1.1 */
+#define TLS_VERSION_1_2 0x0303 /* TLSv1.2 */
+#ifdef CONFIG_TLSV12
+#define TLS_VERSION TLS_VERSION_1_2
+#else /* CONFIG_TLSV12 */
+#ifdef CONFIG_TLSV11
+#define TLS_VERSION TLS_VERSION_1_1
+#else /* CONFIG_TLSV11 */
+#define TLS_VERSION TLS_VERSION_1
+#endif /* CONFIG_TLSV11 */
+#endif /* CONFIG_TLSV12 */
+#define TLS_RANDOM_LEN 32
+#define TLS_PRE_MASTER_SECRET_LEN 48
+#define TLS_MASTER_SECRET_LEN 48
+#define TLS_SESSION_ID_MAX_LEN 32
+#define TLS_VERIFY_DATA_LEN 12
+
+/* HandshakeType */
+enum {
+       TLS_HANDSHAKE_TYPE_HELLO_REQUEST = 0,
+       TLS_HANDSHAKE_TYPE_CLIENT_HELLO = 1,
+       TLS_HANDSHAKE_TYPE_SERVER_HELLO = 2,
+       TLS_HANDSHAKE_TYPE_NEW_SESSION_TICKET = 4 /* RFC 4507 */,
+       TLS_HANDSHAKE_TYPE_CERTIFICATE = 11,
+       TLS_HANDSHAKE_TYPE_SERVER_KEY_EXCHANGE = 12,
+       TLS_HANDSHAKE_TYPE_CERTIFICATE_REQUEST = 13,
+       TLS_HANDSHAKE_TYPE_SERVER_HELLO_DONE = 14,
+       TLS_HANDSHAKE_TYPE_CERTIFICATE_VERIFY = 15,
+       TLS_HANDSHAKE_TYPE_CLIENT_KEY_EXCHANGE = 16,
+       TLS_HANDSHAKE_TYPE_FINISHED = 20,
+       TLS_HANDSHAKE_TYPE_CERTIFICATE_URL = 21 /* RFC 4366 */,
+       TLS_HANDSHAKE_TYPE_CERTIFICATE_STATUS = 22 /* RFC 4366 */
+};
+
+/* CipherSuite */
+#define TLS_NULL_WITH_NULL_NULL                        0x0000 /* RFC 2246 */
+#define TLS_RSA_WITH_NULL_MD5                  0x0001 /* RFC 2246 */
+#define TLS_RSA_WITH_NULL_SHA                  0x0002 /* RFC 2246 */
+#define TLS_RSA_EXPORT_WITH_RC4_40_MD5         0x0003 /* RFC 2246 */
+#define TLS_RSA_WITH_RC4_128_MD5               0x0004 /* RFC 2246 */
+#define TLS_RSA_WITH_RC4_128_SHA               0x0005 /* RFC 2246 */
+#define TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5     0x0006 /* RFC 2246 */
+#define TLS_RSA_WITH_IDEA_CBC_SHA              0x0007 /* RFC 2246 */
+#define TLS_RSA_EXPORT_WITH_DES40_CBC_SHA      0x0008 /* RFC 2246 */
+#define TLS_RSA_WITH_DES_CBC_SHA               0x0009 /* RFC 2246 */
+#define TLS_RSA_WITH_3DES_EDE_CBC_SHA          0x000A /* RFC 2246 */
+#define TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA   0x000B /* RFC 2246 */
+#define TLS_DH_DSS_WITH_DES_CBC_SHA            0x000C /* RFC 2246 */
+#define TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA       0x000D /* RFC 2246 */
+#define TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA   0x000E /* RFC 2246 */
+#define TLS_DH_RSA_WITH_DES_CBC_SHA            0x000F /* RFC 2246 */
+#define TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA       0x0010 /* RFC 2246 */
+#define TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA  0x0011 /* RFC 2246 */
+#define TLS_DHE_DSS_WITH_DES_CBC_SHA           0x0012 /* RFC 2246 */
+#define TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA      0x0013 /* RFC 2246 */
+#define TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA  0x0014 /* RFC 2246 */
+#define TLS_DHE_RSA_WITH_DES_CBC_SHA           0x0015 /* RFC 2246 */
+#define TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA      0x0016 /* RFC 2246 */
+#define TLS_DH_anon_EXPORT_WITH_RC4_40_MD5     0x0017 /* RFC 2246 */
+#define TLS_DH_anon_WITH_RC4_128_MD5           0x0018 /* RFC 2246 */
+#define TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA  0x0019 /* RFC 2246 */
+#define TLS_DH_anon_WITH_DES_CBC_SHA           0x001A /* RFC 2246 */
+#define TLS_DH_anon_WITH_3DES_EDE_CBC_SHA      0x001B /* RFC 2246 */
+#define TLS_RSA_WITH_AES_128_CBC_SHA           0x002F /* RFC 3268 */
+#define TLS_DH_DSS_WITH_AES_128_CBC_SHA                0x0030 /* RFC 3268 */
+#define TLS_DH_RSA_WITH_AES_128_CBC_SHA                0x0031 /* RFC 3268 */
+#define TLS_DHE_DSS_WITH_AES_128_CBC_SHA       0x0032 /* RFC 3268 */
+#define TLS_DHE_RSA_WITH_AES_128_CBC_SHA       0x0033 /* RFC 3268 */
+#define TLS_DH_anon_WITH_AES_128_CBC_SHA       0x0034 /* RFC 3268 */
+#define TLS_RSA_WITH_AES_256_CBC_SHA           0x0035 /* RFC 3268 */
+#define TLS_DH_DSS_WITH_AES_256_CBC_SHA                0x0036 /* RFC 3268 */
+#define TLS_DH_RSA_WITH_AES_256_CBC_SHA                0x0037 /* RFC 3268 */
+#define TLS_DHE_DSS_WITH_AES_256_CBC_SHA       0x0038 /* RFC 3268 */
+#define TLS_DHE_RSA_WITH_AES_256_CBC_SHA       0x0039 /* RFC 3268 */
+#define TLS_DH_anon_WITH_AES_256_CBC_SHA       0x003A /* RFC 3268 */
+#define TLS_RSA_WITH_NULL_SHA256               0x003B /* RFC 5246 */
+#define TLS_RSA_WITH_AES_128_CBC_SHA256                0x003C /* RFC 5246 */
+#define TLS_RSA_WITH_AES_256_CBC_SHA256                0x003D /* RFC 5246 */
+#define TLS_DH_DSS_WITH_AES_128_CBC_SHA256     0x003E /* RFC 5246 */
+#define TLS_DH_RSA_WITH_AES_128_CBC_SHA256     0x003F /* RFC 5246 */
+#define TLS_DHE_DSS_WITH_AES_128_CBC_SHA256    0x0040 /* RFC 5246 */
+#define TLS_DHE_RSA_WITH_AES_128_CBC_SHA256    0x0067 /* RFC 5246 */
+#define TLS_DH_DSS_WITH_AES_256_CBC_SHA256     0x0068 /* RFC 5246 */
+#define TLS_DH_RSA_WITH_AES_256_CBC_SHA256     0x0069 /* RFC 5246 */
+#define TLS_DHE_DSS_WITH_AES_256_CBC_SHA256    0x006A /* RFC 5246 */
+#define TLS_DHE_RSA_WITH_AES_256_CBC_SHA256    0x006B /* RFC 5246 */
+#define TLS_DH_anon_WITH_AES_128_CBC_SHA256    0x006C /* RFC 5246 */
+#define TLS_DH_anon_WITH_AES_256_CBC_SHA256    0x006D /* RFC 5246 */
+
+/* CompressionMethod */
+#define TLS_COMPRESSION_NULL 0
+
+/* HashAlgorithm */
+enum {
+       TLS_HASH_ALG_NONE = 0,
+       TLS_HASH_ALG_MD5 = 1,
+       TLS_HASH_ALG_SHA1 = 2,
+       TLS_HASH_ALG_SHA224 = 3,
+       TLS_HASH_ALG_SHA256 = 4,
+       TLS_HASH_ALG_SHA384 = 5,
+       TLS_HASH_ALG_SHA512 = 6
+};
+
+/* SignatureAlgorithm */
+enum {
+       TLS_SIGN_ALG_ANONYMOUS = 0,
+       TLS_SIGN_ALG_RSA = 1,
+       TLS_SIGN_ALG_DSA = 2,
+       TLS_SIGN_ALG_ECDSA = 3,
+};
+
+/* AlertLevel */
+#define TLS_ALERT_LEVEL_WARNING 1
+#define TLS_ALERT_LEVEL_FATAL 2
+
+/* AlertDescription */
+#define TLS_ALERT_CLOSE_NOTIFY                 0
+#define TLS_ALERT_UNEXPECTED_MESSAGE           10
+#define TLS_ALERT_BAD_RECORD_MAC               20
+#define TLS_ALERT_DECRYPTION_FAILED            21
+#define TLS_ALERT_RECORD_OVERFLOW              22
+#define TLS_ALERT_DECOMPRESSION_FAILURE                30
+#define TLS_ALERT_HANDSHAKE_FAILURE            40
+#define TLS_ALERT_BAD_CERTIFICATE              42
+#define TLS_ALERT_UNSUPPORTED_CERTIFICATE      43
+#define TLS_ALERT_CERTIFICATE_REVOKED          44
+#define TLS_ALERT_CERTIFICATE_EXPIRED          45
+#define TLS_ALERT_CERTIFICATE_UNKNOWN          46
+#define TLS_ALERT_ILLEGAL_PARAMETER            47
+#define TLS_ALERT_UNKNOWN_CA                   48
+#define TLS_ALERT_ACCESS_DENIED                        49
+#define TLS_ALERT_DECODE_ERROR                 50
+#define TLS_ALERT_DECRYPT_ERROR                        51
+#define TLS_ALERT_EXPORT_RESTRICTION           60
+#define TLS_ALERT_PROTOCOL_VERSION             70
+#define TLS_ALERT_INSUFFICIENT_SECURITY                71
+#define TLS_ALERT_INTERNAL_ERROR               80
+#define TLS_ALERT_USER_CANCELED                        90
+#define TLS_ALERT_NO_RENEGOTIATION             100
+#define TLS_ALERT_UNSUPPORTED_EXTENSION                110 /* RFC 4366 */
+#define TLS_ALERT_CERTIFICATE_UNOBTAINABLE     111 /* RFC 4366 */
+#define TLS_ALERT_UNRECOGNIZED_NAME            112 /* RFC 4366 */
+#define TLS_ALERT_BAD_CERTIFICATE_STATUS_RESPONSE      113 /* RFC 4366 */
+#define TLS_ALERT_BAD_CERTIFICATE_HASH_VALUE   114 /* RFC 4366 */
+
+/* ChangeCipherSpec */
+enum {
+       TLS_CHANGE_CIPHER_SPEC = 1
+};
+
+/* TLS Extensions */
+#define TLS_EXT_SERVER_NAME                    0 /* RFC 4366 */
+#define TLS_EXT_MAX_FRAGMENT_LENGTH            1 /* RFC 4366 */
+#define TLS_EXT_CLIENT_CERTIFICATE_URL         2 /* RFC 4366 */
+#define TLS_EXT_TRUSTED_CA_KEYS                        3 /* RFC 4366 */
+#define TLS_EXT_TRUNCATED_HMAC                 4 /* RFC 4366 */
+#define TLS_EXT_STATUS_REQUEST                 5 /* RFC 4366 */
+#define TLS_EXT_SIGNATURE_ALGORITHMS           13 /* RFC 5246 */
+#define TLS_EXT_STATUS_REQUEST_V2              17 /* RFC 6961 */
+#define TLS_EXT_SESSION_TICKET                 35 /* RFC 4507 */
+
+#define TLS_EXT_PAC_OPAQUE TLS_EXT_SESSION_TICKET /* EAP-FAST terminology */
+
+
+typedef enum {
+       TLS_KEY_X_NULL,
+       TLS_KEY_X_RSA,
+       TLS_KEY_X_RSA_EXPORT,
+       TLS_KEY_X_DH_DSS_EXPORT,
+       TLS_KEY_X_DH_DSS,
+       TLS_KEY_X_DH_RSA_EXPORT,
+       TLS_KEY_X_DH_RSA,
+       TLS_KEY_X_DHE_DSS_EXPORT,
+       TLS_KEY_X_DHE_DSS,
+       TLS_KEY_X_DHE_RSA_EXPORT,
+       TLS_KEY_X_DHE_RSA,
+       TLS_KEY_X_DH_anon_EXPORT,
+       TLS_KEY_X_DH_anon
+} tls_key_exchange;
+
+typedef enum {
+       TLS_CIPHER_NULL,
+       TLS_CIPHER_RC4_40,
+       TLS_CIPHER_RC4_128,
+       TLS_CIPHER_RC2_CBC_40,
+       TLS_CIPHER_IDEA_CBC,
+       TLS_CIPHER_DES40_CBC,
+       TLS_CIPHER_DES_CBC,
+       TLS_CIPHER_3DES_EDE_CBC,
+       TLS_CIPHER_AES_128_CBC,
+       TLS_CIPHER_AES_256_CBC
+} tls_cipher;
+
+typedef enum {
+       TLS_HASH_NULL,
+       TLS_HASH_MD5,
+       TLS_HASH_SHA,
+       TLS_HASH_SHA256
+} tls_hash;
+
+struct tls_cipher_suite {
+       u16 suite;
+       tls_key_exchange key_exchange;
+       tls_cipher cipher;
+       tls_hash hash;
+};
+
+typedef enum {
+       TLS_CIPHER_STREAM,
+       TLS_CIPHER_BLOCK
+} tls_cipher_type;
+
+struct tls_cipher_data {
+       tls_cipher cipher;
+       tls_cipher_type type;
+       size_t key_material;
+       size_t expanded_key_material;
+       size_t block_size; /* also iv_size */
+       enum crypto_cipher_alg alg;
+};
+
+
+struct tls_verify_hash {
+       struct crypto_hash *md5_client;
+       struct crypto_hash *sha1_client;
+       struct crypto_hash *sha256_client;
+       struct crypto_hash *md5_server;
+       struct crypto_hash *sha1_server;
+       struct crypto_hash *sha256_server;
+       struct crypto_hash *md5_cert;
+       struct crypto_hash *sha1_cert;
+       struct crypto_hash *sha256_cert;
+};
+
+
+const struct tls_cipher_suite * tls_get_cipher_suite(u16 suite);
+const struct tls_cipher_data * tls_get_cipher_data(tls_cipher cipher);
+int tls_server_key_exchange_allowed(tls_cipher cipher);
+int tls_parse_cert(const u8 *buf, size_t len, struct crypto_public_key **pk);
+int tls_verify_hash_init(struct tls_verify_hash *verify);
+void tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf,
+                        size_t len);
+void tls_verify_hash_free(struct tls_verify_hash *verify);
+int tls_version_ok(u16 ver);
+const char * tls_version_str(u16 ver);
+int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label,
+           const u8 *seed, size_t seed_len, u8 *out, size_t outlen);
+int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_Alg,
+                                   const u8 *client_random,
+                                   const u8 *server_random,
+                                   const u8 *server_params,
+                                   size_t server_params_len, u8 *hash);
+int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random,
+                                const u8 *server_random,
+                                const u8 *server_params,
+                                size_t server_params_len, u8 *hash);
+int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk,
+                        const u8 *data, size_t data_len,
+                        const u8 *pos, size_t len, u8 *alert);
+
+#endif /* TLSV1_COMMON_H */