summaryrefslogtreecommitdiffstats
path: root/src/PolarSSL++/SslContext.h
blob: 6effdcaea2707d516486d196e747f0b2ed23adcd (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134

// SslContext.h

// Declares the cSslContext class that holds everything a single SSL context needs to function





#pragma once

#include "polarssl/ssl.h"
#include "../ByteBuffer.h"
#include "X509Cert.h"





// fwd:
class cCtrDrbgContext;





/**
Acts as a generic SSL encryptor / decryptor between the two endpoints. The "owner" of this class is expected
to create it, initialize it and then provide the means of reading and writing data through the SSL link.
This is an abstract base class, there are descendants that handle the specific aspects of how the SSL peer
data comes into the system:
	- cBufferedSslContext uses a cByteBuffer to read and write the data
	- cCallbackSslContext uses callbacks to provide the data
*/
class cSslContext abstract
{
public:
	/** Creates a new uninitialized context */
	cSslContext(void);
	
	~cSslContext();
	
	/** Initializes the context for use as a server or client.
	Returns 0 on success, PolarSSL error on failure. */
	int Initialize(bool a_IsClient, const SharedPtr<cCtrDrbgContext> & a_CtrDrbg = SharedPtr<cCtrDrbgContext>());
	
	/** Returns true if the object has been initialized properly. */
	bool IsValid(void) const { return m_IsValid; }
	
	/** Sets a cert chain as the trusted cert store for this context.
	Calling this will switch the context into strict cert verification mode.
	a_ExpectedPeerName is the CommonName that we expect the SSL peer to have in its cert,
	if it is different, the verification will fail. An empty string will disable the CN check. */
	void SetCACerts(const cX509CertPtr & a_CACert, const AString & a_ExpectedPeerName);
	
	/** Writes data to be encrypted and sent to the SSL peer. Will perform SSL handshake, if needed.
	Returns the number of bytes actually written, or PolarSSL error code.
	If the return value is POLARSSL_ERR_NET_WANT_READ or POLARSSL_ERR_NET_WANT_WRITE, the owner should send any
	cached outgoing data to the SSL peer and write any incoming data received from the SSL peer and then call
	this function again with the same parameters. Note that this may repeat a few times before the data is
	actually written, mainly due to initial handshake. */
	int WritePlain(const void * a_Data, size_t a_NumBytes);
	
	/** Reads data decrypted from the SSL stream. Will perform SSL handshake, if needed.
	Returns the number of bytes actually read, or PolarSSL error code.
	If the return value is POLARSSL_ERR_NET_WANT_READ or POLARSSL_ERR_NET_WANT_WRITE, the owner should send any
	cached outgoing data to the SSL peer and write any incoming data received from the SSL peer and then call
	this function again with the same parameters. Note that this may repeat a few times before the data is
	actually read, mainly due to initial handshake. */
	int ReadPlain(void * a_Data, size_t a_MaxBytes);
	
	/** Performs the SSL handshake.
	Returns zero on success, PoladSSL error code on failure.
	If the return value is POLARSSL_ERR_NET_WANT_READ or POLARSSL_ERR_NET_WANT_WRITE, the owner should send any
	cached outgoing data to the SSL peer and write any incoming data received from the SSL peer and then call
	this function again. Note that this may repeat a few times before the handshake is completed. */
	int Handshake(void);
	
	/** Returns true if the SSL handshake has been completed. */
	bool HasHandshaken(void) const { return m_HasHandshaken; }
	
	/** Notifies the SSL peer that the connection is being closed.
	Returns 0 on success, PolarSSL error code on failure. */
	int NotifyClose(void);
	
protected:
	/** True if the object has been initialized properly. */
	bool m_IsValid;
	
	/** The random generator to use */
	SharedPtr<cCtrDrbgContext> m_CtrDrbg;
	
	/** The SSL context that PolarSSL uses. */
	ssl_context m_Ssl;
	
	/** True if the SSL handshake has been completed. */
	bool m_HasHandshaken;
	
	/** A copy of the trusted CA root cert store that is passed to us in SetCACerts(), so that the pointer
	stays valid even after the call, when PolarSSL finally uses it. */
	cX509CertPtr m_CACerts;
	
	/** Buffer for the expected peer name. We need to buffer it because the caller may free the string they
	give us before PolarSSL consumes the raw pointer it gets to the CN. */
	AString m_ExpectedPeerName;
	
	
	/** The callback used by PolarSSL when it wants to read encrypted data. */
	static int ReceiveEncrypted(void * a_This, unsigned char * a_Buffer, size_t a_NumBytes)
	{
		return ((cSslContext *)a_This)->ReceiveEncrypted(a_Buffer, a_NumBytes);
	}
	
	/** The callback used by PolarSSL when it wants to write encrypted data. */
	static int SendEncrypted(void * a_This, const unsigned char * a_Buffer, size_t a_NumBytes)
	{
		return ((cSslContext *)a_This)->SendEncrypted(a_Buffer, a_NumBytes);
	}
	
	#ifdef _DEBUG
		/** The callback used by PolarSSL to output debug messages */
		static void SSLDebugMessage(void * a_UserParam, int a_Level, const char * a_Text);
	#endif  // _DEBUG

	/** Called when PolarSSL wants to read encrypted data. */
	virtual int ReceiveEncrypted(unsigned char * a_Buffer, size_t a_NumBytes) = 0;
	
	/** Called when PolarSSL wants to write encrypted data. */
	virtual int SendEncrypted(const unsigned char * a_Buffer, size_t a_NumBytes) = 0;
} ;