tortls.h 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199
  1. /* Copyright (c) 2003, Roger Dingledine
  2. * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
  3. * Copyright (c) 2007-2018, The Tor Project, Inc. */
  4. /* See LICENSE for licensing information */
  5. #ifndef TOR_TORTLS_H
  6. #define TOR_TORTLS_H
  7. /**
  8. * \file tortls.h
  9. * \brief Headers for tortls.c
  10. **/
  11. #include "lib/crypt_ops/crypto_rsa.h"
  12. #include "lib/testsupport/testsupport.h"
  13. /* Opaque structure to hold a TLS connection. */
  14. typedef struct tor_tls_t tor_tls_t;
  15. struct tor_x509_cert_t;
  16. /* Possible return values for most tor_tls_* functions. */
  17. #define MIN_TOR_TLS_ERROR_VAL_ -9
  18. #define TOR_TLS_ERROR_MISC -9
  19. /* Rename to unexpected close or something. XXXX */
  20. #define TOR_TLS_ERROR_IO -8
  21. #define TOR_TLS_ERROR_CONNREFUSED -7
  22. #define TOR_TLS_ERROR_CONNRESET -6
  23. #define TOR_TLS_ERROR_NO_ROUTE -5
  24. #define TOR_TLS_ERROR_TIMEOUT -4
  25. #define TOR_TLS_CLOSE -3
  26. #define TOR_TLS_WANTREAD -2
  27. #define TOR_TLS_WANTWRITE -1
  28. #define TOR_TLS_DONE 0
  29. /** Collection of case statements for all TLS errors that are not due to
  30. * underlying IO failure. */
  31. #define CASE_TOR_TLS_ERROR_ANY_NONIO \
  32. case TOR_TLS_ERROR_MISC: \
  33. case TOR_TLS_ERROR_CONNREFUSED: \
  34. case TOR_TLS_ERROR_CONNRESET: \
  35. case TOR_TLS_ERROR_NO_ROUTE: \
  36. case TOR_TLS_ERROR_TIMEOUT
  37. /** Use this macro in a switch statement to catch _any_ TLS error. That way,
  38. * if more errors are added, your switches will still work. */
  39. #define CASE_TOR_TLS_ERROR_ANY \
  40. CASE_TOR_TLS_ERROR_ANY_NONIO: \
  41. case TOR_TLS_ERROR_IO
  42. #define TOR_TLS_IS_ERROR(rv) ((rv) < TOR_TLS_CLOSE)
  43. #ifdef TORTLS_PRIVATE
  44. #ifdef ENABLE_OPENSSL
  45. struct ssl_st;
  46. struct ssl_ctx_st;
  47. struct ssl_session_st;
  48. #endif
  49. /** Holds a SSL_CTX object and related state used to configure TLS
  50. * connections.
  51. */
  52. typedef struct tor_tls_context_t tor_tls_context_t;
  53. STATIC int tor_errno_to_tls_error(int e);
  54. STATIC int tor_tls_get_error(tor_tls_t *tls, int r, int extra,
  55. const char *doing, int severity, int domain);
  56. STATIC tor_tls_t *tor_tls_get_by_ssl(const struct ssl_st *ssl);
  57. STATIC void tor_tls_allocate_tor_tls_object_ex_data_index(void);
  58. MOCK_DECL(STATIC void, try_to_extract_certs_from_tls,
  59. (int severity, tor_tls_t *tls, struct x509_st **cert_out,
  60. struct x509_st **id_cert_out));
  61. #ifdef TORTLS_OPENSSL_PRIVATE
  62. STATIC int always_accept_verify_cb(int preverify_ok, X509_STORE_CTX *x509_ctx);
  63. STATIC int tor_tls_classify_client_ciphers(const struct ssl_st *ssl,
  64. STACK_OF(SSL_CIPHER) *peer_ciphers);
  65. #endif
  66. STATIC int tor_tls_client_is_using_v2_ciphers(const struct ssl_st *ssl);
  67. #ifndef HAVE_SSL_SESSION_GET_MASTER_KEY
  68. STATIC size_t SSL_SESSION_get_master_key(struct ssl_session_st *s,
  69. uint8_t *out,
  70. size_t len);
  71. #endif
  72. STATIC void tor_tls_debug_state_callback(const struct ssl_st *ssl,
  73. int type, int val);
  74. STATIC void tor_tls_server_info_callback(const struct ssl_st *ssl,
  75. int type, int val);
  76. #ifdef TORTLS_OPENSSL_PRIVATE
  77. STATIC int tor_tls_session_secret_cb(struct ssl_st *ssl, void *secret,
  78. int *secret_len,
  79. STACK_OF(SSL_CIPHER) *peer_ciphers,
  80. CONST_IF_OPENSSL_1_1_API SSL_CIPHER **cipher,
  81. void *arg);
  82. STATIC int find_cipher_by_id(const SSL *ssl, const SSL_METHOD *m,
  83. uint16_t cipher);
  84. #endif /* defined(TORTLS_OPENSSL_PRIVATE) */
  85. STATIC tor_tls_context_t *tor_tls_context_new(crypto_pk_t *identity,
  86. unsigned int key_lifetime, unsigned flags, int is_client);
  87. STATIC int tor_tls_context_init_one(tor_tls_context_t **ppcontext,
  88. crypto_pk_t *identity,
  89. unsigned int key_lifetime,
  90. unsigned int flags,
  91. int is_client);
  92. #ifdef TOR_UNIT_TESTS
  93. extern int tor_tls_object_ex_data_index;
  94. extern tor_tls_context_t *server_tls_context;
  95. extern tor_tls_context_t *client_tls_context;
  96. extern uint16_t v2_cipher_list[];
  97. extern uint64_t total_bytes_written_over_tls;
  98. extern uint64_t total_bytes_written_by_tls;
  99. #endif /* defined(TOR_UNIT_TESTS) */
  100. #endif /* defined(TORTLS_PRIVATE) */
  101. const char *tor_tls_err_to_string(int err);
  102. void tor_tls_get_state_description(tor_tls_t *tls, char *buf, size_t sz);
  103. void tor_tls_free_all(void);
  104. #define TOR_TLS_CTX_IS_PUBLIC_SERVER (1u<<0)
  105. #define TOR_TLS_CTX_USE_ECDHE_P256 (1u<<1)
  106. #define TOR_TLS_CTX_USE_ECDHE_P224 (1u<<2)
  107. void tor_tls_init(void);
  108. void tls_log_errors(tor_tls_t *tls, int severity, int domain,
  109. const char *doing);
  110. int tor_tls_context_init(unsigned flags,
  111. crypto_pk_t *client_identity,
  112. crypto_pk_t *server_identity,
  113. unsigned int key_lifetime);
  114. tor_tls_t *tor_tls_new(int sock, int is_server);
  115. void tor_tls_set_logged_address(tor_tls_t *tls, const char *address);
  116. void tor_tls_set_renegotiate_callback(tor_tls_t *tls,
  117. void (*cb)(tor_tls_t *, void *arg),
  118. void *arg);
  119. int tor_tls_is_server(tor_tls_t *tls);
  120. void tor_tls_free_(tor_tls_t *tls);
  121. #define tor_tls_free(tls) FREE_AND_NULL(tor_tls_t, tor_tls_free_, (tls))
  122. int tor_tls_peer_has_cert(tor_tls_t *tls);
  123. MOCK_DECL(struct tor_x509_cert_t *,tor_tls_get_peer_cert,(tor_tls_t *tls));
  124. MOCK_DECL(struct tor_x509_cert_t *,tor_tls_get_own_cert,(tor_tls_t *tls));
  125. int tor_tls_verify(int severity, tor_tls_t *tls, crypto_pk_t **identity);
  126. int tor_tls_check_lifetime(int severity,
  127. tor_tls_t *tls, time_t now,
  128. int past_tolerance,
  129. int future_tolerance);
  130. MOCK_DECL(int, tor_tls_read, (tor_tls_t *tls, char *cp, size_t len));
  131. int tor_tls_write(tor_tls_t *tls, const char *cp, size_t n);
  132. int tor_tls_handshake(tor_tls_t *tls);
  133. int tor_tls_finish_handshake(tor_tls_t *tls);
  134. void tor_tls_unblock_renegotiation(tor_tls_t *tls);
  135. void tor_tls_block_renegotiation(tor_tls_t *tls);
  136. void tor_tls_assert_renegotiation_unblocked(tor_tls_t *tls);
  137. int tor_tls_shutdown(tor_tls_t *tls);
  138. int tor_tls_get_pending_bytes(tor_tls_t *tls);
  139. size_t tor_tls_get_forced_write_size(tor_tls_t *tls);
  140. void tor_tls_get_n_raw_bytes(tor_tls_t *tls,
  141. size_t *n_read, size_t *n_written);
  142. int tor_tls_get_buffer_sizes(tor_tls_t *tls,
  143. size_t *rbuf_capacity, size_t *rbuf_bytes,
  144. size_t *wbuf_capacity, size_t *wbuf_bytes);
  145. MOCK_DECL(double, tls_get_write_overhead_ratio, (void));
  146. int tor_tls_used_v1_handshake(tor_tls_t *tls);
  147. int tor_tls_get_num_server_handshakes(tor_tls_t *tls);
  148. int tor_tls_server_got_renegotiate(tor_tls_t *tls);
  149. MOCK_DECL(int,tor_tls_cert_matches_key,(const tor_tls_t *tls,
  150. const struct tor_x509_cert_t *cert));
  151. MOCK_DECL(int,tor_tls_get_tlssecrets,(tor_tls_t *tls, uint8_t *secrets_out));
  152. MOCK_DECL(int,tor_tls_export_key_material,(
  153. tor_tls_t *tls, uint8_t *secrets_out,
  154. const uint8_t *context,
  155. size_t context_len,
  156. const char *label));
  157. /* Log and abort if there are unhandled TLS errors in OpenSSL's error stack.
  158. */
  159. #define check_no_tls_errors() check_no_tls_errors_(__FILE__,__LINE__)
  160. void check_no_tls_errors_(const char *fname, int line);
  161. void tor_tls_log_one_error(tor_tls_t *tls, unsigned long err,
  162. int severity, int domain, const char *doing);
  163. int tor_tls_get_my_certs(int server,
  164. const struct tor_x509_cert_t **link_cert_out,
  165. const struct tor_x509_cert_t **id_cert_out);
  166. crypto_pk_t *tor_tls_get_my_client_auth_key(void);
  167. const char *tor_tls_get_ciphersuite_name(tor_tls_t *tls);
  168. int evaluate_ecgroup_for_tls(const char *ecgroup);
  169. #endif /* !defined(TOR_TORTLS_H) */