tport 1.12.11devel
|
00001 /* 00002 * This file is part of the Sofia-SIP package 00003 * 00004 * Copyright (C) 2005 Nokia Corporation. 00005 * 00006 * Contact: Pekka Pessi <pekka.pessi@nokia-email.address.hidden> 00007 * 00008 * This library is free software; you can redistribute it and/or 00009 * modify it under the terms of the GNU Lesser General Public License 00010 * as published by the Free Software Foundation; either version 2.1 of 00011 * the License, or (at your option) any later version. 00012 * 00013 * This library is distributed in the hope that it will be useful, but 00014 * WITHOUT ANY WARRANTY; without even the implied warranty of 00015 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 00016 * Lesser General Public License for more details. 00017 * 00018 * You should have received a copy of the GNU Lesser General Public 00019 * License along with this library; if not, write to the Free Software 00020 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 00021 * 02110-1301 USA 00022 * 00023 */ 00024 00025 #ifndef TPORT_TLS_H 00026 00027 #define TPORT_TLS_H 00028 00038 #ifndef SU_TYPES_H 00039 #include <sofia-sip/su_types.h> 00040 #endif 00041 00042 #include "tport_internal.h" 00043 00044 SOFIA_BEGIN_DECLS 00045 00046 #define TLS_MAX_HOSTS (16) 00047 00048 typedef struct tls_s tls_t; 00049 00050 extern char const tls_version[]; 00051 00052 typedef struct tls_issues_s { 00053 unsigned policy; /* refer to tport_tag.h, tport_tls_verify_policy */ 00054 unsigned verify_depth;/* if 0, revert to default (2) */ 00055 unsigned verify_date; /* if 0, notBefore and notAfter dates are ignored */ 00056 int configured; /* If non-zero, complain about certificate errors */ 00057 char *cert; /* CERT file name. File format is PEM */ 00058 char *key; /* Private key file. PEM format */ 00059 char *passphrase; /* Passphrase for password protected private key */ 00060 char *randFile; /* Seed file for the PRNG (default: tls_seed.dat) */ 00061 char *CAfile; /* PEM file of CA's */ 00062 char *CApath; /* PEM file path of CA's */ 00063 char *cipher; /* Should be one of the above defined ciphers * 00064 * or NULL (default: "ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH 00065 */ 00066 int version; /* For tls1, version is 1. When ssl3/ssl2 is 00067 * used, it is 0. */ 00068 } tls_issues_t; 00069 00070 typedef struct tport_tls_s { 00071 tport_t tlstp_tp[1]; 00072 tls_t *tlstp_context; 00073 char *tlstp_buffer; 00074 } tport_tls_t; 00075 00076 typedef struct tport_tls_primary_s { 00077 tport_primary_t tlspri_pri[1]; 00078 tls_t *tlspri_master; 00079 } tport_tls_primary_t; 00080 00081 tls_t *tls_init_master(tls_issues_t *tls_issues); 00082 tls_t *tls_init_secondary(tls_t *tls_master, int sock, int accept); 00083 void tls_free(tls_t *tls); 00084 int tls_get_socket(tls_t *tls); 00085 ssize_t tls_read(tls_t *tls); 00086 void *tls_read_buffer(tls_t *tls, size_t N); 00087 int tls_want_read(tls_t *tls, int events); 00088 int tls_pending(tls_t const *tls); 00089 00090 int tls_connect(su_root_magic_t *magic, su_wait_t *w, tport_t *self); 00091 ssize_t tls_write(tls_t *tls, void *buf, size_t size); 00092 int tls_want_write(tls_t *tls, int events); 00093 00094 int tls_events(tls_t const *tls, int flags); 00095 00096 SOFIA_END_DECLS 00097 00098 #endif