1/*
2 * Copyright 2016-2018 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the OpenSSL license (the "License").  You may not use
5 * this file except in compliance with the License.  You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10#ifndef OSSL_TEST_HANDSHAKE_HELPER_H
11#define OSSL_TEST_HANDSHAKE_HELPER_H
12
13#include "ssl_test_ctx.h"
14
15typedef struct handshake_result {
16    ssl_test_result_t result;
17    /* These alerts are in the 2-byte format returned by the info_callback. */
18    /* (Latest) alert sent by the client; 0 if no alert. */
19    int client_alert_sent;
20    /* Number of fatal or close_notify alerts sent. */
21    int client_num_fatal_alerts_sent;
22    /* (Latest) alert received by the server; 0 if no alert. */
23    int client_alert_received;
24    /* (Latest) alert sent by the server; 0 if no alert. */
25    int server_alert_sent;
26    /* Number of fatal or close_notify alerts sent. */
27    int server_num_fatal_alerts_sent;
28    /* (Latest) alert received by the client; 0 if no alert. */
29    int server_alert_received;
30    /* Negotiated protocol. On success, these should always match. */
31    int server_protocol;
32    int client_protocol;
33    /* Server connection */
34    ssl_servername_t servername;
35    /* Session ticket status */
36    ssl_session_ticket_t session_ticket;
37    int compression;
38    /* Was this called on the second context? */
39    int session_ticket_do_not_call;
40    char *client_npn_negotiated;
41    char *server_npn_negotiated;
42    char *client_alpn_negotiated;
43    char *server_alpn_negotiated;
44    /* Was the handshake resumed? */
45    int client_resumed;
46    int server_resumed;
47    /* Temporary key type */
48    int tmp_key_type;
49    /* server certificate key type */
50    int server_cert_type;
51    /* server signing hash */
52    int server_sign_hash;
53    /* server signature type */
54    int server_sign_type;
55    /* server CA names */
56    STACK_OF(X509_NAME) *server_ca_names;
57    /* client certificate key type */
58    int client_cert_type;
59    /* client signing hash */
60    int client_sign_hash;
61    /* client signature type */
62    int client_sign_type;
63    /* Client CA names */
64    STACK_OF(X509_NAME) *client_ca_names;
65    /* Session id status */
66    ssl_session_id_t session_id;
67    char *cipher;
68    /* session ticket application data */
69    char *result_session_ticket_app_data;
70} HANDSHAKE_RESULT;
71
72HANDSHAKE_RESULT *HANDSHAKE_RESULT_new(void);
73void HANDSHAKE_RESULT_free(HANDSHAKE_RESULT *result);
74
75/* Do a handshake and report some information about the result. */
76HANDSHAKE_RESULT *do_handshake(SSL_CTX *server_ctx, SSL_CTX *server2_ctx,
77                               SSL_CTX *client_ctx, SSL_CTX *resume_server_ctx,
78                               SSL_CTX *resume_client_ctx,
79                               const SSL_TEST_CTX *test_ctx);
80
81#endif  /* OSSL_TEST_HANDSHAKE_HELPER_H */
82