tlsv1_common.h (302408) | tlsv1_common.h (337817) |
---|---|
1/* 2 * TLSv1 common definitions 3 * Copyright (c) 2006-2014, Jouni Malinen <j@w1.fi> 4 * 5 * This software may be distributed under the terms of the BSD license. 6 * See README for more details. 7 */ 8 --- 155 unchanged lines hidden (view full) --- 164 165/* TLS Extensions */ 166#define TLS_EXT_SERVER_NAME 0 /* RFC 4366 */ 167#define TLS_EXT_MAX_FRAGMENT_LENGTH 1 /* RFC 4366 */ 168#define TLS_EXT_CLIENT_CERTIFICATE_URL 2 /* RFC 4366 */ 169#define TLS_EXT_TRUSTED_CA_KEYS 3 /* RFC 4366 */ 170#define TLS_EXT_TRUNCATED_HMAC 4 /* RFC 4366 */ 171#define TLS_EXT_STATUS_REQUEST 5 /* RFC 4366 */ | 1/* 2 * TLSv1 common definitions 3 * Copyright (c) 2006-2014, Jouni Malinen <j@w1.fi> 4 * 5 * This software may be distributed under the terms of the BSD license. 6 * See README for more details. 7 */ 8 --- 155 unchanged lines hidden (view full) --- 164 165/* TLS Extensions */ 166#define TLS_EXT_SERVER_NAME 0 /* RFC 4366 */ 167#define TLS_EXT_MAX_FRAGMENT_LENGTH 1 /* RFC 4366 */ 168#define TLS_EXT_CLIENT_CERTIFICATE_URL 2 /* RFC 4366 */ 169#define TLS_EXT_TRUSTED_CA_KEYS 3 /* RFC 4366 */ 170#define TLS_EXT_TRUNCATED_HMAC 4 /* RFC 4366 */ 171#define TLS_EXT_STATUS_REQUEST 5 /* RFC 4366 */ |
172#define TLS_EXT_SIGNATURE_ALGORITHMS 13 /* RFC 5246 */ 173#define TLS_EXT_STATUS_REQUEST_V2 17 /* RFC 6961 */ |
|
172#define TLS_EXT_SESSION_TICKET 35 /* RFC 4507 */ 173 174#define TLS_EXT_PAC_OPAQUE TLS_EXT_SESSION_TICKET /* EAP-FAST terminology */ 175 176 177typedef enum { 178 TLS_KEY_X_NULL, 179 TLS_KEY_X_RSA, --- 72 unchanged lines hidden (view full) --- 252int tls_verify_hash_init(struct tls_verify_hash *verify); 253void tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, 254 size_t len); 255void tls_verify_hash_free(struct tls_verify_hash *verify); 256int tls_version_ok(u16 ver); 257const char * tls_version_str(u16 ver); 258int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, 259 const u8 *seed, size_t seed_len, u8 *out, size_t outlen); | 174#define TLS_EXT_SESSION_TICKET 35 /* RFC 4507 */ 175 176#define TLS_EXT_PAC_OPAQUE TLS_EXT_SESSION_TICKET /* EAP-FAST terminology */ 177 178 179typedef enum { 180 TLS_KEY_X_NULL, 181 TLS_KEY_X_RSA, --- 72 unchanged lines hidden (view full) --- 254int tls_verify_hash_init(struct tls_verify_hash *verify); 255void tls_verify_hash_add(struct tls_verify_hash *verify, const u8 *buf, 256 size_t len); 257void tls_verify_hash_free(struct tls_verify_hash *verify); 258int tls_version_ok(u16 ver); 259const char * tls_version_str(u16 ver); 260int tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, 261 const u8 *seed, size_t seed_len, u8 *out, size_t outlen); |
260int tlsv12_key_x_server_params_hash(u16 tls_version, const u8 *client_random, | 262int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_Alg, 263 const u8 *client_random, |
261 const u8 *server_random, 262 const u8 *server_params, 263 size_t server_params_len, u8 *hash); 264int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 265 const u8 *server_random, 266 const u8 *server_params, 267 size_t server_params_len, u8 *hash); 268int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, 269 const u8 *data, size_t data_len, 270 const u8 *pos, size_t len, u8 *alert); 271 272#endif /* TLSV1_COMMON_H */ | 264 const u8 *server_random, 265 const u8 *server_params, 266 size_t server_params_len, u8 *hash); 267int tls_key_x_server_params_hash(u16 tls_version, const u8 *client_random, 268 const u8 *server_random, 269 const u8 *server_params, 270 size_t server_params_len, u8 *hash); 271int tls_verify_signature(u16 tls_version, struct crypto_public_key *pk, 272 const u8 *data, size_t data_len, 273 const u8 *pos, size_t len, u8 *alert); 274 275#endif /* TLSV1_COMMON_H */ |