/* Unix SMB/CIFS implementation. transport layer security handling code Copyright (C) Andrew Tridgell 2005 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ #ifndef _TLS_H_ #define _TLS_H_ #include "lib/socket/socket.h" struct loadparm_context; void tls_cert_generate(TALLOC_CTX *mem_ctx, const char *hostname, const char * const *additional_hostnames, const char *keyfile, const char *certfile, const char *cafile); struct tstream_context; struct tstream_tls_params; struct tstream_tls_sync; enum tls_verify_peer_state { TLS_VERIFY_PEER_NO_CHECK = 0, #define TLS_VERIFY_PEER_NO_CHECK_STRING "no_check" TLS_VERIFY_PEER_CA_ONLY = 10, #define TLS_VERIFY_PEER_CA_ONLY_STRING "ca_only" TLS_VERIFY_PEER_CA_AND_NAME_IF_AVAILABLE = 20, #define TLS_VERIFY_PEER_CA_AND_NAME_IF_AVAILABLE_STRING \ "ca_and_name_if_available" TLS_VERIFY_PEER_CA_AND_NAME = 30, #define TLS_VERIFY_PEER_CA_AND_NAME_STRING "ca_and_name" TLS_VERIFY_PEER_AS_STRICT_AS_POSSIBLE = 9999, #define TLS_VERIFY_PEER_AS_STRICT_AS_POSSIBLE_STRING \ "as_strict_as_possible" }; const char *tls_verify_peer_string(enum tls_verify_peer_state verify_peer); NTSTATUS tstream_tls_params_client(TALLOC_CTX *mem_ctx, bool system_cas, const char * const *ca_dirs, const char *ca_file, const char *crl_file, const char *tls_priority, enum tls_verify_peer_state verify_peer, const char *peer_name, struct tstream_tls_params **_tlsp); NTSTATUS tstream_tls_params_client_lpcfg(TALLOC_CTX *mem_ctx, struct loadparm_context *lp_ctx, const char *peer_name, struct tstream_tls_params **tlsp); NTSTATUS tstream_tls_params_quic_prepare(struct tstream_tls_params *tlsp); NTSTATUS tstream_tls_params_server(TALLOC_CTX *mem_ctx, const char *dns_host_name, const char * const *additional_dns_hostnames, bool enabled, const char *key_file, const char *cert_file, const char *ca_file, const char *crl_file, const char *dhp_file, const char *tls_priority, struct tstream_tls_params **_params); NTSTATUS tstream_tls_params_server_lpcfg(TALLOC_CTX *mem_ctx, struct loadparm_context *lp_ctx, struct tstream_tls_params **_params); bool tstream_tls_params_enabled(struct tstream_tls_params *params); bool tstream_tls_params_quic_enabled(struct tstream_tls_params *params); enum tls_verify_peer_state tstream_tls_params_verify_peer( struct tstream_tls_params *tls_params); bool tstream_tls_verify_peer_trusted(enum tls_verify_peer_state verify_peer); const char *tstream_tls_params_peer_name( const struct tstream_tls_params *params); const DATA_BLOB *tstream_tls_channel_bindings(struct tstream_context *tls_tstream); struct tevent_req *_tstream_tls_connect_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct tstream_context *plain_stream, struct tstream_tls_params *tls_params, const char *location); #define tstream_tls_connect_send(mem_ctx, ev, plain_stream, tls_params) \ _tstream_tls_connect_send(mem_ctx, ev, plain_stream, tls_params, __location__) int tstream_tls_connect_recv(struct tevent_req *req, int *perrno, TALLOC_CTX *mem_ctx, struct tstream_context **tls_stream); struct tevent_req *_tstream_tls_accept_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct tstream_context *plain_stream, struct tstream_tls_params *tls_params, const char *location); #define tstream_tls_accept_send(mem_ctx, ev, plain_stream, tls_params) \ _tstream_tls_accept_send(mem_ctx, ev, plain_stream, tls_params, __location__) int tstream_tls_accept_recv(struct tevent_req *req, int *perrno, TALLOC_CTX *mem_ctx, struct tstream_context **tls_stream); ssize_t tstream_tls_sync_read(struct tstream_tls_sync *tlsss, void *buf, size_t len); ssize_t tstream_tls_sync_write(struct tstream_tls_sync *tlsss, const void *buf, size_t len); size_t tstream_tls_sync_pending(struct tstream_tls_sync *tlsss); NTSTATUS tstream_tls_sync_setup(struct tstream_tls_params *_tls_params, void *io_private, ssize_t (*io_send_fn)(void *io_private, const uint8_t *buf, size_t len), ssize_t (*io_recv_fn)(void *io_private, uint8_t *buf, size_t len), TALLOC_CTX *mem_ctx, struct tstream_tls_sync **_tlsss); const DATA_BLOB *tstream_tls_sync_channel_bindings(struct tstream_tls_sync *tlsss); struct tevent_req *tstream_tls_quic_handshake_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct tstream_tls_params *tlsp, bool is_server, uint32_t timeout_msec, const char *alpn, int sockfd); NTSTATUS tstream_tls_quic_handshake_recv(struct tevent_req *req); NTSTATUS tstream_tls_quic_handshake(struct tstream_tls_params *tlsp, bool is_server, uint32_t timeout_msec, const char *alpn, int sockfd); #define tstream_tls_ngtcp2_connect_send(mem_ctx, ev, tls_params, \ timeout_msec, alpn, sockfd) \ _tstream_tls_ngtcp2_connect_send(mem_ctx, ev, tls_params, \ timeout_msec, alpn, sockfd, \ __location__) struct tevent_req *_tstream_tls_ngtcp2_connect_send(TALLOC_CTX *mem_ctx, struct tevent_context *ev, struct tstream_tls_params *tlsp, uint32_t timeout_msec, const char *alpn, int *sockfd, const char *location); int tstream_tls_ngtcp2_connect_recv(struct tevent_req *req, int *perrno, TALLOC_CTX *mem_ctx, struct tstream_context **quic_stream); #endif /* _TLS_H_ */