3 #ifndef _TLS_H_INCLUDED_
4 #define _TLS_H_INCLUDED_
10 /* libtls internal interfaces
19 #include <name_code.h>
23 * TLS enforcement levels. Non-sentinel values may also be used to indicate
24 * the actual security level of a session.
26 * XXX TLS_LEV_NOTFOUND no longer belongs in this list. The SMTP client will
27 * have to use something else to report that policy table lookup failed.
29 #define TLS_LEV_INVALID -2 /* sentinel */
30 #define TLS_LEV_NOTFOUND -1 /* XXX not in policy table */
31 #define TLS_LEV_NONE 0 /* plain-text only */
32 #define TLS_LEV_MAY 1 /* wildcard */
33 #define TLS_LEV_ENCRYPT 2 /* encrypted connection */
34 #define TLS_LEV_FPRINT 3 /* "peer" CA-less verification */
35 #define TLS_LEV_VERIFY 4 /* certificate verified */
36 #define TLS_LEV_SECURE 5 /* "secure" verification */
38 extern const NAME_CODE tls_level_table
[];
40 #define tls_level_lookup(s) name_code(tls_level_table, NAME_CODE_FLAG_NONE, (s))
41 #define str_tls_level(l) str_name_code(tls_level_table, (l))
48 #include <openssl/lhash.h>
49 #include <openssl/bn.h>
50 #include <openssl/err.h>
51 #include <openssl/pem.h>
52 #include <openssl/x509.h>
53 #include <openssl/x509v3.h>
54 #include <openssl/rand.h>
55 #include <openssl/ssl.h>
57 #if (OPENSSL_VERSION_NUMBER < 0x00905100L)
58 #error "need OpenSSL version 0.9.5 or later"
65 #include <name_mask.h>
66 #include <name_code.h>
68 #define TLS_BIO_BUFSIZE 8192
71 * Names of valid tlsmgr(8) session caches.
73 #define TLS_MGR_SCACHE_SMTPD "smtpd"
74 #define TLS_MGR_SCACHE_SMTP "smtp"
75 #define TLS_MGR_SCACHE_LMTP "lmtp"
78 * TLS session context, also used by the VSTREAM call-back routines for SMTP
79 * input/output, and by OpenSSL call-back routines for key verification.
81 * Only some members are (read-only) accessible by the public.
83 #define CCERT_BUFSIZ 256
86 /* Public, read-only. */
87 char *peer_CN
; /* Peer Common Name */
88 char *issuer_CN
; /* Issuer Common Name */
89 char *peer_fingerprint
; /* ASCII fingerprint */
90 int peer_status
; /* Certificate and match status */
92 const char *cipher_name
;
97 BIO
*internal_bio
; /* postfix/TLS side of pair */
98 BIO
*network_bio
; /* network side of pair */
99 char *cache_type
; /* tlsmgr(8) cache type if enabled */
100 char *serverid
; /* unique server identifier */
101 char *namaddr
; /* nam[addr] for logging */
102 int log_level
; /* TLS library logging level */
103 int session_reused
; /* this session was reused */
104 int am_server
; /* Are we an SSL server or client? */
108 * Peer status bits. TLS_CERT_FLAG_MATCHED implies TLS_CERT_FLAG_TRUSTED
109 * only in the case of a hostname match.
111 #define TLS_CERT_FLAG_PRESENT (1<<0)
112 #define TLS_CERT_FLAG_ALTNAME (1<<1)
113 #define TLS_CERT_FLAG_TRUSTED (1<<2)
114 #define TLS_CERT_FLAG_MATCHED (1<<3)
115 #define TLS_CERT_FLAG_LOGGED (1<<4) /* Logged trust chain error */
117 #define TLS_CERT_IS_PRESENT(c) ((c) && ((c)->peer_status&TLS_CERT_FLAG_PRESENT))
118 #define TLS_CERT_IS_ALTNAME(c) ((c) && ((c)->peer_status&TLS_CERT_FLAG_ALTNAME))
119 #define TLS_CERT_IS_TRUSTED(c) ((c) && ((c)->peer_status&TLS_CERT_FLAG_TRUSTED))
120 #define TLS_CERT_IS_MATCHED(c) ((c) && ((c)->peer_status&TLS_CERT_FLAG_MATCHED))
123 * Opaque client context handle.
125 typedef struct TLS_APPL_STATE TLS_APPL_STATE
;
130 * Client and Server application contexts
132 struct TLS_APPL_STATE
{
135 char *cipher_exclusions
; /* Last cipher selection state */
136 char *cipher_list
; /* Last cipher selection state */
137 int cipher_grade
; /* Last cipher selection state */
142 * tls_misc.c One time finalization of application context.
144 extern void tls_free_app_context(TLS_APPL_STATE
*);
150 extern void tls_param_init(void);
153 * Protocol selection.
155 #define TLS_PROTOCOL_INVALID (~0) /* All protocol bits masked */
156 #define TLS_PROTOCOL_SSLv2 (1<<0) /* SSLv2 */
157 #define TLS_PROTOCOL_SSLv3 (1<<1) /* SSLv3 */
158 #define TLS_PROTOCOL_TLSv1 (1<<2) /* TLSv1 */
159 #define TLS_KNOWN_PROTOCOLS \
160 ( TLS_PROTOCOL_SSLv2 | TLS_PROTOCOL_SSLv3 | TLS_PROTOCOL_TLSv1 )
162 extern int tls_protocol_mask(const char *);
165 * Cipher grade selection.
167 #define TLS_CIPHER_NONE 0
168 #define TLS_CIPHER_NULL 1
169 #define TLS_CIPHER_EXPORT 2
170 #define TLS_CIPHER_LOW 3
171 #define TLS_CIPHER_MEDIUM 4
172 #define TLS_CIPHER_HIGH 5
174 extern const NAME_CODE tls_cipher_grade_table
[];
176 #define tls_cipher_grade(str) \
177 name_code(tls_cipher_grade_table, NAME_CODE_FLAG_NONE, (str))
178 #define str_tls_cipher_grade(gr) \
179 str_name_code(tls_cipher_grade_table, (gr))
182 * Cipher lists with exclusions.
184 extern const char *tls_set_ciphers(TLS_APPL_STATE
*, const char *,
185 const char *, const char *);
195 const char *cache_type
;
196 const char *cert_file
;
197 const char *key_file
;
198 const char *dcert_file
;
199 const char *dkey_file
;
200 const char *eccert_file
;
201 const char *eckey_file
;
204 const char *fpt_dgst
; /* Fingerprint digest algorithm */
205 } TLS_CLIENT_INIT_PROPS
;
212 int tls_level
; /* Security level */
213 const char *nexthop
; /* destination domain */
214 const char *host
; /* MX hostname */
215 const char *namaddr
; /* nam[addr] for logging */
216 const char *serverid
; /* Session cache key */
217 const char *protocols
; /* Enabled protocols */
218 const char *cipher_grade
; /* Minimum cipher grade */
219 const char *cipher_exclusions
; /* Ciphers to exclude */
220 const ARGV
*matchargv
; /* Cert match patterns */
221 const char *fpt_dgst
; /* Fingerprint digest algorithm */
222 } TLS_CLIENT_START_PROPS
;
224 extern TLS_APPL_STATE
*tls_client_init(const TLS_CLIENT_INIT_PROPS
*);
225 extern TLS_SESS_STATE
*tls_client_start(const TLS_CLIENT_START_PROPS
*);
227 #define tls_client_stop(ctx, stream, timeout, failure, TLScontext) \
228 tls_session_stop(ctx, (stream), (timeout), (failure), (TLScontext))
230 #define TLS_CLIENT_INIT(props, a1, a2, a3, a4, a5, a6, a7, a8, a9, \
232 tls_client_init((((props)->a1), ((props)->a2), ((props)->a3), \
233 ((props)->a4), ((props)->a5), ((props)->a6), ((props)->a7), \
234 ((props)->a8), ((props)->a9), ((props)->a10), ((props)->a11), \
235 ((props)->a12), (props)))
237 #define TLS_CLIENT_START(props, a1, a2, a3, a4, a5, a6, a7, a8, a9, \
238 a10, a11, a12, a13, a14) \
239 tls_client_start((((props)->a1), ((props)->a2), ((props)->a3), \
240 ((props)->a4), ((props)->a5), ((props)->a6), ((props)->a7), \
241 ((props)->a8), ((props)->a9), ((props)->a10), ((props)->a11), \
242 ((props)->a12), ((props)->a13), ((props)->a14), (props)))
250 const char *cache_type
;
253 const char *cert_file
;
254 const char *key_file
;
255 const char *dcert_file
;
256 const char *dkey_file
;
257 const char *eccert_file
;
258 const char *eckey_file
;
261 const char *protocols
;
262 const char *eecdh_grade
;
263 const char *dh1024_param_file
;
264 const char *dh512_param_file
;
266 const char *fpt_dgst
; /* Fingerprint digest algorithm */
267 } TLS_SERVER_INIT_PROPS
;
270 TLS_APPL_STATE
*ctx
; /* TLS application context */
271 VSTREAM
*stream
; /* Client stream */
272 int log_level
; /* TLS log level */
273 int timeout
; /* TLS handshake timeout */
274 int requirecert
; /* Insist on client cert? */
275 const char *serverid
; /* Server instance (salt cache key) */
276 const char *namaddr
; /* Client nam[addr] for logging */
277 const char *cipher_grade
;
278 const char *cipher_exclusions
;
279 const char *fpt_dgst
; /* Fingerprint digest algorithm */
280 } TLS_SERVER_START_PROPS
;
282 extern TLS_APPL_STATE
*tls_server_init(const TLS_SERVER_INIT_PROPS
*);
283 extern TLS_SESS_STATE
*tls_server_start(const TLS_SERVER_START_PROPS
*props
);
285 #define tls_server_stop(ctx, stream, timeout, failure, TLScontext) \
286 tls_session_stop(ctx, (stream), (timeout), (failure), (TLScontext))
288 #define TLS_SERVER_INIT(props, a1, a2, a3, a4, a5, a6, a7, a8, a9, \
289 a10, a11, a12, a13, a14, a15, a16, a17, a18, a19) \
290 tls_server_init((((props)->a1), ((props)->a2), ((props)->a3), \
291 ((props)->a4), ((props)->a5), ((props)->a6), ((props)->a7), \
292 ((props)->a8), ((props)->a9), ((props)->a10), ((props)->a11), \
293 ((props)->a12), ((props)->a13), ((props)->a14), ((props)->a15), \
294 ((props)->a16), ((props)->a17), ((props)->a18), ((props)->a19), (props)))
296 #define TLS_SERVER_START(props, a1, a2, a3, a4, a5, a6, a7, a8, a9, a10) \
297 tls_server_start((((props)->a1), ((props)->a2), ((props)->a3), \
298 ((props)->a4), ((props)->a5), ((props)->a6), ((props)->a7), \
299 ((props)->a8), ((props)->a9), ((props)->a10), (props)))
304 extern void tls_session_stop(TLS_APPL_STATE
*, VSTREAM
*, int, int, TLS_SESS_STATE
*);
310 extern VSTRING
*tls_session_passivate(SSL_SESSION
*);
311 extern SSL_SESSION
*tls_session_activate(const char *, int);
316 extern void tls_stream_start(VSTREAM
*, TLS_SESS_STATE
*);
317 extern void tls_stream_stop(VSTREAM
*);
320 * tls_bio_ops.c: a generic multi-personality driver that retries SSL
321 * operations until they are satisfied or until a hard error happens.
322 * Because of its ugly multi-personality user interface we invoke it via
323 * not-so-ugly single-personality wrappers.
325 extern int tls_bio(int, int, TLS_SESS_STATE
*,
326 int (*) (SSL
*), /* handshake */
327 int (*) (SSL
*, void *, int), /* read */
328 int (*) (SSL
*, const void *, int), /* write */
331 #define tls_bio_connect(fd, timeout, context) \
332 tls_bio((fd), (timeout), (context), SSL_connect, \
334 #define tls_bio_accept(fd, timeout, context) \
335 tls_bio((fd), (timeout), (context), SSL_accept, \
337 #define tls_bio_shutdown(fd, timeout, context) \
338 tls_bio((fd), (timeout), (context), SSL_shutdown, \
340 #define tls_bio_read(fd, buf, len, timeout, context) \
341 tls_bio((fd), (timeout), (context), NULL, \
342 SSL_read, NULL, (buf), (len))
343 #define tls_bio_write(fd, buf, len, timeout, context) \
344 tls_bio((fd), (timeout), (context), NULL, \
345 NULL, SSL_write, (buf), (len))
350 extern void tls_set_dh_from_file(const char *, int);
351 extern DH
*tls_tmp_dh_cb(SSL
*, int, int);
352 extern int tls_set_eecdh_curve(SSL_CTX
*, const char *);
357 extern RSA
*tls_tmp_rsa_cb(SSL
*, int, int);
362 extern char *tls_peer_CN(X509
*, const TLS_SESS_STATE
*);
363 extern char *tls_issuer_CN(X509
*, const TLS_SESS_STATE
*);
364 extern const char *tls_dns_name(const GENERAL_NAME
*, const TLS_SESS_STATE
*);
365 extern char *tls_fingerprint(X509
*, const char *);
366 extern int tls_verify_certificate_callback(int, X509_STORE_CTX
*);
371 extern int tls_set_ca_certificate_info(SSL_CTX
*, const char *, const char *);
372 extern int tls_set_my_certificate_key_info(SSL_CTX
*,
373 /* RSA */ const char *, const char *,
374 /* DSA */ const char *, const char *,
375 /* ECDSA */ const char *, const char *);
380 extern int TLScontext_index
;
382 extern TLS_APPL_STATE
*tls_alloc_app_context(SSL_CTX
*);
383 extern TLS_SESS_STATE
*tls_alloc_sess_context(int, const char *);
384 extern void tls_free_context(TLS_SESS_STATE
*);
385 extern void tls_check_version(void);
386 extern long tls_bug_bits(void);
387 extern void tls_print_errors(void);
388 extern void tls_info_callback(const SSL
*, int, int);
389 extern long tls_bio_dump_cb(BIO
*, int, const char *, int, long, long);
394 extern void tls_int_seed(void);
395 extern int tls_ext_seed(int);
397 #endif /* TLS_INTERNAL */
402 /* The Secure Mailer license must be distributed with this software.
405 /* IBM T.J. Watson Research
407 /* Yorktown Heights, NY 10598, USA
414 #endif /* _TLS_H_INCLUDED_ */