Wolf SSL Manual
User Manual:
Open the PDF directly: View PDF .
Page Count: 605
Download | |
Open PDF In Browser | View PDF |
wolfSSL User Manual October, 2017 Version 3.12.2 Table of Contents Table of Contents Chapter 1: Introduction Chapter 2: Building wolfSSL 2.1 Getting wolfSSL Source Code 2.2 Building on *nix 2.3 Building on Windows 2.4 Building in a non-standard environment 2.5 Build Options (./configure Options) 2.6 Cross Compiling Chapter 3 : Getting Started 3.1 General Description 3.2 Testsuite 3.3 Client Example 3.4 Server Example 3.5 EchoServer Example 3.6 EchoClient Example 3.7 Benchmark Chapter 4: Features 4.1 Features Overview 4.2 Protocol Support 4.3 Cipher Support 4.4 Hardware Accelerated Crypto 4.5 SSL Inspection (Sniffer) 4.6 Compression 4.7 Pre-Shared Keys 4.8 Client Authentication 4.9 Server Name Indication 4.10 Handshake Modifications 4.11 Truncated HMAC 4.12 User Crypto Module 4.13 Timing-Resistance in wolfSSL Chapter 5: Portability 5.1 Abstraction Layers 5.2 Supported Operating Systems 5.3 Supported Chipmakers 5.4 C# Wrapper Chapter 6: Callbacks 6.1 HandShake Callback 6.2 Timeout Callback 6.3 User Atomic Record Layer Processing 6.4 Public Key Callbacks Chapter 7: Keys and Certificates 7.1 Supported Formats and Sizes 7.2 Certificate Loading 7.3 Certificate Chain Verification 7.4 Domain Name Check for Server Certificates 7.5 No File System and using Certificates 7.6 Serial Number Retrieval 7.7 RSA Key Generation 7.8 Certificate Generation 7.9 Convert to raw ECC key Chapter 8: Debugging 8.1 Debugging and Logging 8.2 Error Codes Chapter 9: Library Design 9.1 Library Headers 9.2 Startup and Exit 9.3 Structure Usage 9.4 Thread Safety 9.5 Input and Output Buffers Chapter 10: wolfCrypt (formerly CTaoCrypt) Usage Reference 10.1 Hash Functions 10.2 Keyed Hash Functions 10.3 Block Ciphers 10.4 Stream Ciphers 10.5 Public Key Cryptography Chapter 11: SSL Tutorial 11.1 Introduction 11.2 Quick Summary of SSL/TLS 11.3 Getting the Source Code 11.4 Base Example Modifications 11.5 Building and Installing wolfSSL 11.6 Initial Compilation 11.7 Libraries 11.8 Headers 11.9 Startup/Shutdown 11.10 WOLFSSL Object 11.11 Sending/Receiving Data 11.12 Signal Handling 11.13 Certificates 11.14 Conclusion Chapter 12: Best Practices for Embedded Devices 12.1 Creating Private Keys 12.2 Digitally Signing and Authenticating with wolfSSL Chapter 13: OpenSSL Compatibility 13.1 Compatibility with OpenSSL 13.2 Differences Between wolfSSL and OpenSSL 13.3 Supported OpenSSL Structures 13.4 Supported OpenSSL Functions 13.5 x509 Certificates Chapter 14: Licensing 14.1 Open Source 14.2 Commercial Licensing 14.3 Support Packages Chapter 15: Support and Consulting 15.1 How to Get Support 15.2 Consulting Chapter 16: wolfSSL (formerly CyaSSL) Updates 16.1 Product Release Information Chapter 17: wolfSSL (formerly CyaSSL) API Reference 17.1 Initialization / Shutdown 17.2 Certificates and Keys 17.3 Context and Session Setup 17.4 Callbacks 17.5 Error Handling and Debugging 17.6 OCSP and CRL 17.7 Informational 17.8 Connection, Session, and I/O 17.9 DTLS Specific 17.10 Memory Abstraction Layer 17.11 Certificate Manager 17.12 OpenSSL Compatibility Layer 17.13 TLS Extensions Appendix A: SSL/TLS Overview Chapter 1: Introduction This manual is written as a technical guide to the wolfSSL (formerly CyaSSL) embedded SSL/TLS library. It will explain how to build and get started with wolfSSL, provide an overview of build options, features, portability enhancements, support, and much more. Why Choose wolfSSL? There are many reasons to choose wolfSSL as your embedded SSL solution. Some of the top reasons include size (typical footprint sizes range from 20-100 kB), support for the newest standards (SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3, DTLS 1.0, and DTLS 1.2), current and progressive cipher support (including stream ciphers), multiplatform, royalty free, and an OpenSSL compatibility API to ease porting into existing applications which have previously used the OpenSSL package. For a complete feature list, see Section 4.1. Chapter 2: Building wolfSSL wolfSSL (formerly CyaSSL) was written with portability in mind and should generally be easy to build on most systems. If you have difficulty building wolfSSL, please don’t hesitate to seek support through our support forums (http://www.wolfssl.com/forums) or contact us directly at support@wolfssl.com. This chapter explains how to build wolfSSL on Unix and Windows, and provides guidance for building wolfSSL in a non-standard environment. You will find the “getting started” guide in Chapter 3 and an SSL tutorial in Chapter 11. When using the autoconf / automake system to build wolfSSL, wolfSSL uses a single Makefile to build all parts and examples of the library, which is both simpler and faster than using Makefiles recursively. 2.1 Getting wolfSSL Source Code The most recent version of wolfSSL can be downloaded from the wolfSSL website as a ZIP file: http://wolfssl.com/wolfSSL/download/downloadForm.php After downloading the ZIP file, unzip the file using the unzip“unzip” command. To use native line endings, enable the “-a” modifier when using unzip. From the unzip man page, the “-a” modifier functionality is described: [...] The -a option causes files identified by zip as text files (those with the ‘t’ label in zipinfo listings, rather than ‘b’) to be automatically extracted as such, converting line endings, end-of-file characters and the character set itself as necessary. [...] NOTE: Beginning with the release of wolfSSL 2.0.0rc3, the directory structure of wolfSSL was changed as well as the standard install location. These changes were made to make it easier for open source projects to integrate wolfSSL. For more information on header and structure changes, please see Sections 9.1 and 9.3. 2.2 Building on *nix When building wolfSSL on Linux, *BSD, OS X, Solaris, or other *nix-like systems, use the autoconf system. To build wolfSSL you only need to run two commands from the wolfSSL root directory: ./configure make You can append any number of build options to ./configure. For a list of available build options, please see Section 2.5 or run: ./configure --help from the command line to see a list of possible options to pass to the ./configure script. To build wolfSSL, run: make To install wolfSSL run: make install You may need superuser privileges to install, in which case precede the command with sudo: sudo make install To test the build, run the testsuite program from the root wolfSSL directory: ./testsuite/testsuite.test or use autoconf to run the testsuite as well as the standard wolfSSL API and crypto tests: make test Further details about expected output of the testsuite program can be found in Section 3.2. If you want to build only the wolfSSL library and not the additional items (examples, testsuite, benchmark app, etc.), you can run the following command from the wolfSSL root directory: make src/libwolfssl.la 2.3 Building on Windows In addition to the instructions below, you can find instructions and tips for building wolfSSL with Visual Studio here. VS 2008: Solutions are included for Visual Studio 2008 in the root directory of the install. For use with Visual Studio 2010 and later, the existing project files should be able to be converted during the import process. Note: If importing to a newer version of VS you will be asked: “Do you want to overwrite the project and its imported property sheets?” You can avoid the following by selecting “No”. Otherwise if you select “Yes”, you will see warnings about EDITANDCONTINUE being ignored due to SAFESEH specification. You will need to right click on the testsuite, sslSniffer, server, echoserver, echoclient, and client individually and modify their Properties->Configuration Properties->Linker->Advanced (scroll all the way to the bottom in Advanced window). Locate “Image Has Safe Exception Handlers” and click the drop down arrow on the far right. Change this to No (/SAFESEH:NO) for each of the aforementioned. The other option is to disable EDITANDCONTINUE which, we have found to be useful for debugging purposes and is therefore not recommended. VS 2010: You will need to download Service Pack 1 to build wolfSSL solution once it has been updated. If VS reports a linker error, clean and rebuild the project; the linker error should be taken care of. VS 2013 (64 bit solution): You will need to download Service Pack 4 to build wolfSSL solution once it has been updated. If VS reports a linker error, clean the project then Rebuild the project and the linker error should be taken care of. To test each build, choose “Build All” from the Visual Studio menu and then run the testsuite program. To edit build options in the Visual Studio project, select your desired project (wolfssl, echoclient, echoserver, etc.) and browse to the “Properties” panel. Note: After the wolfSSL v3.8.0 release the build preprocessor macros were moved to a centralized file located at ‘IDE/WIN/user_settings.h’. This file can also be found in the project. To add features such as ECC or ChaCha20/Poly1305 add #defines here such as HAVE_ECC or HAVE_CHACHA / HAVE_POLY1305. Cygwin: If using Cygwin, or other toolsets for Windows that provides *nix-like commands and functionality, please follow the instructions in section 2.2, above, for “Building on *nix”. If building wolfSSL for Windows on a Windows development machine, we recommend using the included Visual Studio project files to build wolfSSL. 2.4 Building in a non-standard environment While not officially supported, we try to help users wishing to build wolfSSL in a nonstandard environment, particularly with embedded and cross-compilation systems. Below are some notes on getting started with this. 1. The source and header files need to remain in the same directory structure as they are in the wolfSSL download package. 2. Some build systems will want to explicitly know where the wolfSSL header files are located, so you may need to specify that. They are located in the/wolfssl directory. Typically, you can add the directory to your include path to resolve header problems. 3. wolfSSL defaults to a little endian system unless the configure process detects big endian. Since users building in a non-standard environment aren't using the configure process, BIG_ENDIAN_ORDER will need to be defined if using a big endian system. 4. wolfSSL benefits speed-wise from having a 64-bit type available. The configure process determines if long or long long is 64 bits and if so sets up a define. So if sizeof(long) is 8 bytes on your system, define SIZEOF_LONG 8. If it isn't but sizeof(long long) is 8 bytes, then define SIZEOF_LONG_LONG 8. 5. Try to build the library, and let us know if you run into any problems. If you need help, contact us at info@wolfssl.com. 6. Some defines that can modify the build are listed in the following sub-sections, below. For more verbose descriptions of many options, please see section 2.5.1, “Build Option Notes”. 2.4.1 Removing Features The following defines can be used to remove features from wolfSSL. This can be helpful if you are trying to reduce the overall library footprint size. In addition to defining a NO_ define, you can also remove the respective source file as well from the build (but not the header file). NO_WOLFSSL_CLIENT removes calls specific to the client and is for a serveronly builds. You should only use this if you want to remove a few calls for the sake of size. NO_WOLFSSL_SERVER likewise removes calls specific to the server side. NO_DES3 removes the use of DES3 encryptions. DES3 is built-in by default because some older servers still use it and it's required by SSL 3.0. NO_DH and NO_AES are the same as the two above, they are widely used. NO_DSA removes DSA since it's being phased out of popular use. NO_ERROR_STRINGS disables error strings. Error strings are located in src/internal.c for wolfSSL or wolfcrypt/src/asn.c for wolfCrypt. NO_HMAC removes HMAC from the build. NO_MD4 removes MD4 from the build, MD4 is broken and shouldn't be used. NO_MD5 removes MD5 from the build. NO_SHA256 removes SHA-256 from the build. NO_PSK turns off the use of the pre-shared key extension. It is built-in by default. NO_PWDBASED disables password-based key derivation functions such as PBKDF1, PBKDF2, and PBKDF from PKCS #12. NO_RC4 removes the use of the ARC4 stream cipher from the build. ARC4 is built-in by default because it is still popular and widely used. NO_RABBIT and NO_HC128 remove stream cipher extensions from the build. NO_SESSION_CACHE can be defined when a session cache is not needed. This should reduce memory use by nearly 3 kB. NO_TLS turns off TLS. We don’t recommend turning off TLS. SMALL_SESSION_CACHE can be defined to limit the size of the SSL session cache used by wolfSSL. This will reduce the default session cache from 33 sessions to 6 sessions and save approximately 2.5 kB. WC_NO_RSA_OAEP removes code for OAEP padding. 2.4.2 Enabling Features Disabled by Default WOLFSSL_CERT_GEN turns on wolfSSL’s certificate generation functionality. See Chapter 7 for more information. WOLFSSL_DER_LOAD allows loading DER-formatted CA certs into the wolfSSL context (WOLFSSL_CTX) using the function wolfSSL_CTX_der_load_verify_locations(). WOLFSSL_DTLS turns on the use of DTLS, or datagram TLS. This isn't widely supported or used. WOLFSSL_KEY_GEN turns on wolfSSL’s RSA key generation functionality. See Chapter 7 for more information. WOLFSSL_RIPEMD enables RIPEMD-160 support. WOLFSSL_SHA384 enables SHA-384 support. WOLFSSL_SHA512 enables SHA-512 support. DEBUG_WOLFSSL builds in the ability to debug. For more information regarding debugging wolfSSL, see Chapter 8. HAVE_AESCCM enables AES-CCM support. HAVE_AESGCM enables AES-GCM support. HAVE_CAMELLIA enables Camellia support. HAVE_CHACHA enables ChaCha20 support. HAVE_POLY1305 enables Poly1305 support. HAVE_CRL enables Certificate Revocation List (CRL) support. HAVE_CRL_IO enables blocking inline HTTP request on the CRL URL. It will load the CRL into the WOLFSSL_CTX and apply it to all WOLFSSL objects created from it. HAVE_ECC enables Elliptical Curve Cryptography (ECC) support. HAVE_LIBZ is an extension that can allow for compression of data over the connection. It normally shouldn't be used, see the note below under configure notes libz. HAVE_OCSP enables Online Certificate Status Protocol (OCSP) support. OPENSSL_EXTRA builds even more OpenSSL compatibility into the library, and enables the wolfSSL OpenSSL compatibility layer to ease porting wolfSSL into existing applications which had been designed to work with OpenSSL. It is off by default. TEST_IPV6 turns on testing of IPv6 in the test applications. wolfSSL proper is IP neutral, but the testing applications use IPv4 by default. HAVE_CSHARP turns on configuration options needed for C# wrapper. HAVE_CURVE25519 turns on the use of curve25519 algorithm. HAVE_ED25519 turns on use of the ed25519 algorithm. CURVED25519_SMALL defines CURVE25519_SMALL and ED25519_SMALL. CURVE25519_SMALL use small memory option for curve25519. This uses less memory, but is slower. ED25519_SMALL use small memory option for ed25519. This uses less memory, but is slower. WOLFSSL_DH_CONST turns off use of floating point values when performing Diffie Hellman operations and uses tables for XPOW() and XLOG(). Removes dependency on external math library. WOLFSSL_TRUST_PEER_CERT turns on the use of trusted peer certificates. This allows for loading in a peer certificate to match with a connection rather than using a CA. When turned on if a trusted peer certificate is matched than the peer cert chain is not loaded and the peer is considered verified. Using CAs is preferred. WOLFSSL_STATIC_MEMORY turns on the use of static memory buffers and functions. This allows for using static memory instead of dynamic. WOLFSSL_SESSION_EXPORT turns on the use of DTLS session export and import. This allows for serializing and sending/recieving the current state of a DTLS session. WOLFSSL_ARMASM turns on the use of ARMv8 hardware acceleration. 2.4.3 Customizing or Porting wolfSSL WOLFSSL_USER_SETTINGS if defined allows a user specific settings file to be used. The file must be named “user_settings.h” and exist in the include path. This is included prior to the standard “settings.h” file, so default settings can be overridden. WOLFSSL_CALLBACKS is an extension that allows debugging callbacks through the use of signals in an environment without a debugger, it is off by default. It can also be used to set up a timer with blocking sockets. Please see Chapter 6 for more information. WOLFSSL_USER_IO allows the user to remove automatic setting of the default I/O functions EmbedSend() and EmbedReceive(). Used for custom I/O abstraction layer (see Section 5.1 for more details). NO_FILESYSTEM is used if stdio isn't available to load certificates and key files. This enables the use of buffer extensions to be used instead of the file ones. NO_INLINE disables the automatic inlining of small, heavily used functions. Turning this on will slow down wolfSSL and actually make it bigger since these are small functions, usually much smaller than function call setup/return. You’ll also need to add wolfcrypt/src/misc.c to the list of compiled files if you’re not using autoconf. NO_DEV_RANDOM disables the use of the default /dev/random random number generator. If defined, the user needs to write an OS-specific GenerateSeed() function (found in “wolfcrypt/src/random.c”). NO_MAIN_DRIVER is used in the normal build environment to determine whether a test application is called on its own or through the testsuite driver application. You'll only need to use it with the test files: test.c, client.c, server.c, echoclient.c, echoserver.c, and testsuite.c NO_WRITEV disables simulation of writev() semantics. SINGLE_THREADED is a switch that turns off the use of mutexes. wolfSSL currently only uses one for the session cache. If your use of wolfSSL is always single threaded you can turn this on. USER_TICKS allows the user to define their own clock tick function if time(0) is not wanted. Custom function needs second accuracy, but doesn’t have to be correlated to Epoch. See LowResTimer() function in “wolfssl_int.c”. USER_TIME disables the use of time.h structures in the case that the user wants (or needs) to use their own. See “wolfcrypt/src/asn.c” for implementation details. The user will need to define and/or implement XTIME(), XGMTIME(), and XVALIDATE_DATE(). USE_CERT_BUFFERS_1024 enables 1024-bit test certificate and key buffers located in /wolfssl/certs_test.h. Helpful when testing on and porting to embedded systems with no filesystem. USE_CERT_BUFFERS_2048 enables 2048-bit test certificate and key buffers located in /wolfssl/certs_test.h. Helpful when testing on and porting to embedded systems with no filesystem. CUSTOM_RAND_GENERATE_SEED allows user to define custom function equivalent to wc_GenerateSeed(byte* output, word32 sz). CUSTOM_RAND_GENERATE_BLOCK allows user to define custom random number generation function. Examples of use are as follows. ./configure --disable-hashdrbg CFLAGS="-DCUSTOM_RAND_GENERATE_BLOCK= custom_rand_generate_block" or /* RNG */ /* #define HAVE_HASHDRBG */ extern int custom_rand_generate_block(unsigned char* output, unsigned int sz); 2.4.4 Reducing Memory Usage TFM_TIMING_RESISTANT can be defined when using fast math (USE_FAST_MATH) on systems with a small stack size. This will get rid of the large static arrays. WOLFSSL_SMALL_STACK can be used for devices which have a small stack size. This increases the use of dynamic memory in wolfcrypt/src/integer.c, but can lead to slower performance. RSA_LOW_MEM when defined CRT is not used which saves on some memory but slows down RSA operations. It is off by default. 2.4.5 Increasing Performance WOLFSSL_AESNI enables use of AES accelerated operations which are built into some Intel chipsets. When using this define, the aes_asm.c file must be added to the wolfSSL build sources. USE_FAST_MATH switches the big integer library to a faster one that uses assembly if possible. fastmath will speed up public key operations like RSA, DH, and DSA. The big integer library is generally the most portable and generally easiest to get going with, but the negatives to the normal big integer library are that it is slower and it uses a lot of dynamic memory. Because the stack memory usage can be larger when using fastmath, we recommend defining TFM_TIMING_RESISTANT as well when using this option. 2.4.6 Stack or Chip Specific Defines wolfSSL can be built for a variety of platforms and TCP/IP stacks. Most of the following defines are located in ./wolfssl/wolfcrypt/settings.h and are commented out by default. Each can be uncommented to enable support for the specific chip or stack referenced below. IPHONE can be defined if building for use with iOS. THREADX can be defined when building for use with the ThreadX RTOS (www.rtos.com). MICRIUM can be defined when building for Micrium’s µC/OS (www.micrium.com). MBED can be defined when building for the mbed prototyping platform (www.mbed.org). MICROCHIP_PIC32 can be defined when building for Microchip’s PIC32 platform (www.microchip.com). MICROCHIP_TCPIP_V5 can be defined specifically version 5 of microchip tcp/ip stack. MICROCHIP_TCPIP can be defined for microchip tcp/ip stack version 6 or later. WOLFSSL_MICROCHIP_PIC32MZ can be defined for PIC32MZ hardware cryptography engine. FREERTOS can be defined when building for FreeRTOS (www.freertos.org). If using LwIP, define WOLFSSL_LWIP as well. FREERTOS_WINSIM can be defined when building for the FreeRTOS windows simulator (www.freertos.org). EBSNET can be defined when using EBSnet products and RTIP. WOLFSSL_LWIP can be defined when using wolfSSL with the LwIP TCP/IP stack (http://savannah.nongnu.org/projects/lwip/). WOLFSSL_GAME_BUILD can be defined when building wolfSSL for a game console. WOLFSSL_LSR can be defined if building for LSR. FREESCALE_MQX can be defined when building for Freescale MQX/RTCS/MFS (www.freescale.com). This in turn defines FREESCALE_K70_RNGA to enable support for the Kinetis H/W Random Number Generator Accelerator WOLFSSL_STM32F2 can be defined when building for STM32F2. This define also enables STM32F2 hardware crypto and hardware RNG support in wolfSSL. (http://www.st.com/internet/mcu/subclass/1520.jsp) COMVERGE can be defined if using Comverge settings. WOLFSSL_QL can be defined if using QL SEP settings. WOLFSSL_EROAD can be defined building for EROAD. WOLFSSL_IAR_ARM can be defined if build for IAR EWARM. WOLFSSL_TIRTOS can be defined when building for TI-RTOS. WOLFSSL_ROWLEY_ARM can be defined when building with Rowley CrossWorks. WOLFSSL_NRF51 can be defined when porting to Nordic nRF51. WOLFSSL_NRF51_AES can be defined to use built-in AES hardware for AES 128 ECB encrypt when porting to Nordic nRF51. 2.5 Build Options (./configure Options) The following are options which may be appended to the ./configure script to customize how the wolfSSL library is built. By default, wolfSSL only builds in shared mode, with static mode being disabled. This speeds up build times by a factor of two. Either mode can be explicitly disabled or enabled if desired. Option Default Value Description --enable-debug Disabled Enable wolfSSL debugging support --enable-distro Disabled Enable wolfSSL distro build --enable-singlethreaded Disabled Enable single threaded mode, no multi thread protections --enable-dtls Disabled Enable wolfSSL DTLS support --enable-rng Enabled Enable compiling and using RNG --enable-sctp Disabled Enable wolfSSL DTLS-SCTP support --enable-openssh Disabled Enable OpenSSH compatibility build --enable-opensslextra Disabled Enable extra OpenSSL API compatibility, increases the size --enable-maxstrength Disabled Enable Max Strength build, allows TSLv1.2-AEAD-PFS ciphers only --enable-harden Enabled Enable Hardened build, Enables Timing Resistance and Blinding --enable-ipv6 Disabled Enable testing of IPv6, wolfSSL proper is IP neutral --enable-bump Disabled Enable SSL Bump build --enable-leanpsk Disabled Enable Lean PSK build --enable-leantls Disabled Implements a lean TLS 1.2 client only (no client auth), ECC256, AES128 and SHA256 w/o Shamir. Meant to be used by itself at the moment and not in conjunction with other build options. --enable-bigcache Disabled Enable a big session cache --enable-hugecache Disabled Enable a huge session cache --enable-smallcache Disabled Enable small session cache --enable-savesession Disabled Enable persistent session cache --enable-savecert Disabled Enable persistent cert cache --enable-atomicuser Disabled Enable Atomic User Record Layer --enable-pkcallbacks Disabled Enable Public Key Callbacks --enable-sniffer Disabled Enable wolfSSL sniffer support --enable-aesgcm Enabled Enable AES-GCM support --enable-aesccm Disabled Enable AES-CCM support --enable-armasm Disabled Use of ARMv8 hardware acceleration. Sets mcpu or mfpu based on 64vs32 bit system. Does not overwrite mcpu or mfpu setting passed with CPPFLAGS. --enable-aesni Disabled Enable wolfSSL Intel AES-NI support --enable-intelasm Disabled Enable all Intel ASM speedups --enable-camellia Disabled Enable Camellia support --enable-md2 Disabled Enable MD2 support --enable-nullcipher Disabled Enable wolfSSL NULL cipher support (no encryption) --enable-ripemd Disabled Enable wolfSSL RIPEMD-160 support --enable-blake2 Disabled Enable wolfSSL BLAKE2 support --enable-sha512 Enabled on x86_64 Enable wolfSSL SHA-512 support --enable-sessioncerts Disabled Enable session cert storing --enable-keygen Disabled Enable key generation --enable-certgen Disabled Enable cert generation --enable-certreq Disabled Enable cert request generation --enable-sep Disabled Enable SEP extensions --enable-hkdf Disabled Enable HKDF (HMAC-KDF) --enable-x963kdf Disabled Enable X9.63 KDF support --enable-dsa Disabled Enable Digital Signature Algorithm (DSA) --enable-eccshamir Enabled on x86_64 Enable ECC Shamir --enable-ecc Enabled on x86_64 Enable ECC --enable-ecccustcurves Disabled Enable ECC custom curves --enable-compkey Disabled Enable compressed keys support --enable-curve25519 Disabled Enable Curve25519 (or `--enablecurve25519=small` for CURVE25519_SMALL) --enable-ed25519 Disabled Enable ED25519 (or `--enableed25519=small` for ED25519_SMALL) --enable-fpecc Disabled Enable Fixed Point cache ECC --enable-eccencrypt Disabled Enable ECC encrypt --enable-psk Disabled Enable PSK (Pre Shared Keys) --enable-errorstrings Enabled Enable error strings table --enable-oldtls Enabled Enable old TLS version < 1.2 --enable-sslv3 Disabled Enable SSL version 3.0 --enable-stacksize Disabled Enable stack size info on examples --enable-memory Enabled Enable memory callbacks --enable-rsa Enabled Enable RSA --enable-dh Enabled Enable DH --enable-anon Disabled Enable Anonymous --enable-asn Enabled Enable ASN --enable-aes Enabled Enable AES --enable-coding Enabled Enable Coding base 16/64 --enable-base64encode Enabled on x86_64 Enable Base64 encoding --enable-des3 Enabled Enable DES3 --enable-idea Disabled Enable IDEA Cipher --enable-arc4 Disabled Enable ARC4 --enable-md5 Enabled Enable MD5 --enable-sha Enabled Enable SHA --enable-webserver Disabled Enable Web Server --enable-hc128 Disabled Enable streaming cipher HC-128 --enable-rabbit Disabled Enable streaming cipher RABBIT --enable-fips Disabled Enable FIPS 140-2 (Must have license to implement.) --enable-sha224 Enabled on x86_64 Enable wolfSSL SHA-224 support --enable-poly1305 Enabled Enable wolfSSL POLY1305 support --enable-chacha Enabled Enable CHACHA --enable-hashdrbg Enabled Enable Hash DRBG support --enable-filesystem Enabled Enable Filesystem support --enable-inline Enabled Enable inline functions --enable-ocsp Disabled Enable Online Certificate Status Protocol (OCSP) --enable-ocspstapling Disabled Enable OCSP Stapling --enable-ocspstapling2 Disabled Enable OCSP Stapling version 2 --enable-crl Disabled Enable CRL --enable-crl-monitor Disabled Enable CRL Monitor --enable-sni Disabled Enable Server Name Indication (SNI) --enable-maxfragment Disabled Enable Maximum Fragment Length --enable-alpn Disabled Enable Application Layer Protocol Negotiation (ALPN) --enable-truncatedhmac Disabled Enable Truncated Keyed-hash MAC (HMAC) --enable-renegotiationindication Disabled Enable Renegotiation Indication --enable-securerenegotiation Disabled Enable Secure Renegotiation --enable-supportedcurves Disabled Enable Supported Elliptic Curves --enable-session-ticket Disabled Enable Session Ticket --enable-extended-master Enabled Enable Extended Master Secret --enable-tlsx Disabled Enable all TLS extensions --enable-pkcs7 Disabled Enable PKCS#7 support --enable-scep Disabled Enable wolfSCEP (Simple Certificate Enrollment Protocol) --enable-srp Disabled Enable Secure Remote Password --enable-smallstack Disabled Enable Small Stack Usage --enable-valgrind Disabled Enable valgrind for unit tests --enable-testcert Disabled Enable Test Cert --enable-iopool Disabled Enable I/O Pool example --enable-certservice Disabled Enable certificate service (Windows Servers) --enable-jni Disabled Enable wolfSSL JNI --enable-lighty Disabled Enable lighttpd/lighty --enable-stunnel Disabled Enable stunnel --enable-md4 Disabled Enable MD4 --enable-pwdbased Disabled Enable PWDBASED --enable-scrypt Disabled Enable SCRYPT --enable-cryptonly Disabled Enable wolfCrypt Only build --enable-fastmath Enabled on x86_64 Enable fast math ops --enable-fasthugemath Disabled Enable fast math + huge code --enable-examples Enabled Enable examples --enable-crypttests Enabled Enable Crypt Bench/Test --enable-fast-rsa Disabled Enable RSA using Intel IPP --enable-staticmemory Disabled Enable static memory use --enable-mcapi Disabled Enable Microchip API --enable-asynccrypt Disabled Enable Asynchronous Crypto --enable-sessionexport Disabled Enable export and import of sessions --enable-aeskeywrap Disabled Enable AES key wrap support --enable-jobserver [=no/yes/#] yes Enable up to # make jobs yes: enable one more than CPU count --enable-shared[=PKGS] Disabled Building shared wolfSSL libraries [default = no] --enable-static[=PKGS] Disabled Building static wolfSSL libraries [default=no] --with-ntru=PATH Disabled Path to NTRU install (default /usr/) --with-libz=PATH Disabled Optionally include libz for compression --with-cavium=PATH Disabled Path to cavium/software directory. --with-user-crypto=PATH Disabled Path to USER_CRYPTO install (default /usr/local). 2.5.1 Build Option Notes debug - enabling debug support allows easier debugging by compiling with debug information and defining the constant DEBUG_WOLFSSL which outputs messages to stderr. To turn debug on at runtime, call wolfSSL_Debugging_ON(). To turn debug logging off at runtime, call wolfSSL_Debugging_OFF(). For more information, see Chapter 8. singlethreaded - enabling single threaded mode turns off multi thread protection of the session cache. Only enable single threaded mode if you know your application is single threaded or your application is multithreaded and only one thread at a time will be accessing the library. dtls - enabling DTLS support allows users of the library to also use the DTLS protocol in addition to TLS and SSL. For more information, see Chapter 4. opensslextra - enabling OpenSSL Extra includes a larger set of OpenSSL compatibility functions. The basic build will enable enough functions for most TLS/SSL needs, but if you're porting an application that uses 10s or 100s of OpenSSL calls, enabling this will allow better support. The wolfSSL OpenSSL compatibility layer is under active development, so if there is a function missing which you need, please contact us and we'll try to help. For more information about the OpenSSL Compatibility Layer, please see Chapter 13. ipv6 - enabling IPV6 changes the test applications to use IPv6 instead of IPv4. wolfSSL proper is IP neutral, either version can be used, but currently the test applications are IP dependent, IPv4 by default. leanpsk - Very small build using PSK, and eliminating many features from the library. Approximate build size for wolfSSL on an embedded system with this enabled is 21kB. fastmath - enabling fastmath will speed up public key operations like RSA, DH, and DSA. By default, wolfSSL uses the normal big integer math library. This is generally the most portable and generally easiest to get going with. The negatives to the normal big integer library are that it is slower and it uses a lot of dynamic memory. This option switches the big integer library to a faster one that uses assembly if possible. Assembly inclusion is dependent on compiler and processor combinations. Some combinations will need additional configure flags and some may not be possible. Help with optimizing fastmath with new assembly routines is available on a consulting basis. On ia32, for example, all of the registers need to be available so high optimization and omitting the frame pointer needs to be taken care of. wolfSSL will add "-O3 -fomitframe-pointer" to GCC for non debug builds. If you're using a different compiler you may need to add these manually to CFLAGS during configure. OS X will also need "-mdynamic-no-pic" added to CFLAGS. In addition, if you're building in shared mode for ia32 on OS X you'll need to pass options to LDFLAGS as well: LDFLAGS="-Wl,-read_only_relocs,warning" This gives warning for some symbols instead of errors. fastmath also changes the way dynamic and stack memory is used. The normal math library uses dynamic memory for big integers. Fastmath uses fixed size buffers that hold 4096 bit integers by default, allowing for 2048 bit by 2048 bit multiplications. If you need 4096 bit by 4096 bit multiplications then change FP_MAX_BITS in wolfssl/wolfcrypt/tfm.h. As FP_MAX_BITS is increased, this will also increase the runtime stack usage since the buffers used in the public key operations will now be larger. A couple of functions in the library use several temporary big integers, meaning the stack can get relatively large. This should only come into play on embedded systems or in threaded environments where the stack size is set to a low value. If stack corruption occurs with fastmath during public key operations in those environments, increase the stack size to accommodate the stack usage. If you are enabling fastmath without using the autoconf system, you’ll need to define USE_FAST_MATH and add tfm.c to the wolfSSL build instead of integer.c. Since the stack memory can be large when using fastmath, we recommend defining TFM_TIMING_RESISTANT when using the fastmath library. This will get rid of large static arrays. fasthugemath - enabling fasthugemath includes support for the fastmath library and greatly increases the code size by unrolling loops for popular key sizes during public key operations. Try using the benchmark utility before and after using fasthugemath to see if the slight speedup is worth the increased code size. bigcache - enabling the big session cache will increase the session cache from 33 sessions to 20,027 sessions. The default session cache size of 33 is adequate for TLS clients and embedded servers. The big session cache is suitable for servers that aren't under heavy load, basically allowing 200 new sessions per minute or so. hugecache - enabling the huge session cache will increase the session cache size to 65,791 sessions. This option is for servers that are under heavy load, over 13,000 new sessions per minute are possible or over 200 new sessions per second. smallcache - enabling the small session cache will cause wolfSSL to only store 6 sessions. This may be useful for embedded clients or systems where the default of nearly 3kB is too much RAM. This define uses less than 500 bytes of RAM. savesession - enabling this option will allow an application to persist (save) and restore the wolfSSL session cache to/from memory buffers. savecert - enabling this option will allow an application to persist (save) and restore the wolfSSL certificate cache to/from memory buffers. atomicuser - enabling this option will turn on User Atomic Record Layer Processing callbacks. This will allow the application to register its own MAC/encrypt and decrypt/verify callbacks. pkcallbacks - enabling this option will turn on Public Key callbacks, allowing the application to register its own ECC sign/verify and RSA sign/verify and encrypt/decrypt callbacks. sniffer - enabling sniffer (SSL inspection) support will allow the collection of SSL traffic packets as well as the ability to decrypt those packets with the correct key file. Currently the sniffer supports the following RSA ciphers CBC ciphers: - AES-CBC - Camellia-CBC - 3DES-CBC Stream ciphers: - RC4 - Rabbit - HC-128 aesgcm - enabling AES-GCM will add these cipher suites to wolfSSL. wolfSSL offers four different implementations of AES-GCM balancing speed versus memory consumption. If available, wolfSSL will use 64-bit or 32-bit math. For embedded applications, there is a speedy 8-bit version that uses RAM-based lookup tables (8KB per session) which is speed comparable to the 64-bit version and a slower 8-bit version that doesn't take up any additional RAM. The --enable-aesgcm configure option may be modified with the options "=word32", "=table", or "=small", i.e. "--enable-aesgcm=table". aesccm - enabling AES-GCM will enable Counter with CBC-MAC Mode with 8 byte authentication (CCM-8) for AES. aesni - enabling AES-NI support will allow AES instructions to be called directly from the chip when using an AES-NI supported chip. This provides speed increases for AES functions. See Chapter 4 for more details regarding AES-NI. poly1305 - enabling this option will add Poly1305 support to wolfCrypt and wolfSSL. camellia - enabling this option will add Camellia-CBC support to wolfCrypt and wolfSSL. chacha - enabling this option will add ChaCha support to wolfCrypt and wolfSSL. md2 - enabling this option adds support for the MD2 algorithm to wolfSSL. MD2 is disabled by default due to known security vulnerabilities. ripemd - enabling this option adds support for the RIPEMD-160 algorithm to wolfSSL. sha512 - enabling this option adds support for the SHA-512 hash algorithm. This algorithm needs the word64 type to be available, which is why it is disabled by default. Some embedded system may not have this type available. sessioncerts - enabling this option adds support for the peer’s certificate chain in the session cache through the wolfSSL_get_peer_chain(), wolfSSL_get_chain_count(), wolfSSL_get_chain_length(), wolfSSL_get_chain_cert(), wolfSSL_get_chain_cert_pem(), and wolfSSL_get_sessionID() functions. keygen - enabling support for RSA key generation allows generating keys of varying lengths up to 4096 bits. wolfSSL provides both DER and PEM formatting. certgen - enables support for self-signed X.509 v3 certificate generation. certreq - enabling this option will add support for certificate request generation. hc128 - Though we really like the speed of the HC-128 streaming cipher, it takes up some room in the cipher union for users who aren’t using it. To keep the default build small in as many aspects as we can, we’ve disabled this cipher by default. In order to use this cipher or the corresponding cipher suite just turn it on, no other action is required. rabbit - enabling this option adds support for the RABBIT stream cipher. psk - Pre Shared Key support is off by default since it’s not commonly used. To enable this feature simply turn it on, no other action is required. poly1305 - enabling this option adds support for Poly1305 to wolfcrypt and wolfSSL. webserver - this turns on functions required over the standard build that will allow full functionality for building with the yaSSL Embedded Web Server. noFilesystem - this makes it easier to disable filesystem use. This option defines NO_FILESYSTEM. inline - disabling this option disables function inlining in wolfSSL. Function placeholders that are not linked against but, rather, the code block is inserted into the function call when function inlining is enabled. ecc - enabling this option will build ECC support and cipher suites into wolfSSL. ocsp - enabling this option adds OCSP (Online Certificate Status Protocol) support to wolfSSL. It is used to obtain the revocation status of x.509 certificates as described in RFC 6960. crl - enabling this option adds CRL (Certificate Revocation List) support to wolfSSL. crl-monitor - enabling this option adds the ability to have wolfSSL actively monitor a specific CRL (Certificate Revocation List) directory. ntru - this turns on the ability for wolfSSL to use NTRU cipher suites. NTRU is now available under the GPLv2 from Security Innovation. The NTRU bundle may be downloaded from the Security Innovation GitHub repository available at https://github.com/NTRUOpenSourceProject/ntru-crypto. sni - enabling this option will turn on the TLS Server Name Indication (SNI) extension. maxfragment - enabling this option will turn on the TLS Maximum Fragment Length extension. truncatedhmac - enabling this option will turn on the TLS Truncated HMAC extension. supportedcurves - enabling this option will turn on the TLS Supported ECC Curves extension. tlsx - enabling this option will turn on all TLS extensions currently supported by wolfSSL. valgrind - enabling this option will turn on valgrind when running the wolfSSL unit tests. This can be useful for catching problems early on in the development cycle. testcert - when this option is enabled, it exposes part of the ASN certificate API that is usually not exposed. This can be useful for testing purposes, as seen in the wolfCrypt test application (wolfcrypt/test/test.c). examples - this option is enabled by default. When enabled, the wolfSSL example applications will be built (client, server, echoclient, echoserver). gcc-hardening - enabling this option will add extra compiler security checks. jobserver - enabling this option allows “make” on computers with multiple processors to build several files in parallel, which can significantly reduce build times. Users have the ability to pass different arguments to this command (yes/no/#). If “yes” is used, the configure script will tell make to use one more than the CPU count for the number of jobs. “no” obviously disables this feature. Optionally, the user can pass in the number of jobs as well. disable shared - disabling the shared library build will exclude a wolfSSL shared library from being built. By default only a shared library is built in order to save time and space. disable static - disabling the static library build will exclude a wolfSSL static library from being built. This options is enabled by default. A static library can be built by using the --enable-static build option. libz - enabling libz will allow compression support in wolfSSL from the libz library. Think twice about including this option and using it by calling wolfSSL_set_compression() . While compressing data before sending decreases the actual size of the messages being sent and received, the amount of data saved by compression usually takes longer in time to analyze than it does to send it raw on all but the slowest of networks. fast-rsa - enabling fast-rsa speeds up RSA operations by using IPP libraries. It has a larger memory consumption then the default RSA set by wolfSSL. If IPP libraries can not be found an error message will be displayed during configuration. The first location that autoconf will look is in the directory wolfssl_root/IPP the second is standard location for libraries on the machine such as /usr/lib/ on linux systems. The libraries used for RSA operations are in the directory “wolfssl-X.X.X/IPP/” where X.X.X is the current wolfSSL version number. Building from the bundled libraries is dependent on the directory location and name of IPP so the file structure of the subdirectory IPP should not be changed. When allocating memory the fast-rsa operations have a memory tag of DYNAMIC_TYPE_USER_CRYPTO. This allows for viewing the memory consumption of RSA operations during run time with the fast-rsa option. leantls - enabling produces a small footprint TLS client that supports TLS 1.2 client only (no client auth), ECC256, AES128 and SHA256 w/o Shamir. Meant to be used by itself at the moment and not in conjunction with other build options. curve25519 - an elliptic curve offering 128 bits of security and to be used with ECDH key agreement (see § 2.6 Cross Compiling). renegotiation-indication - as described in RFC 5746, this specification prevents an SSL/TLS attack involving renegotiation splicing by tying the renegotiations to the TLS connection they are performed over. scep - as defined by the Internet Engineering Task Force, Simple Certificate Enrollment Protocol is a PKI that leverages PKCS#7 and PKCS#10 over HTTP. CERT notes that SCEP does not strongly authenticate certificate requests. dsa - NIST approved digital signature algorithm along with RSA and ECDSA as defined by FIPS 186-4 and are used to generate and verify digital signatures if used in conjunction with an approved hash function as defined by the Secure Hash Standard (FIPS 180-4). curve25519 - enabling curve25519 option allows for the use of the curve25519 algorithm. The default curve25519 is set to use more memory but have a faster run time. To have the algorithm use less memory the option -”-enable-curve25519=small” can be used. Although using less memory there is a trade off in speed. ed25519 - enabling ed25519 option allows for the use of the ed25519 algorithm. The default ed25519 is set to use more memory but have a faster run time. To have the algorithm use less memory the option -”-enable-ed25519=small” can be used. Like with curve25519 using this enable option less is a trade off between speed and memory. 2.6 Cross Compiling Many users on embedded platforms cross compile wolfSSL for their environment. The easiest way to cross compile the library is to use the ./configure system. It will generate a Makefile which can then be used to build wolfSSL. When cross compiling, you’ll need to specify the host to ./configure, such as: ./configure --host=arm-linux You may also need to specify the compiler, linker, etc. that you want to use: ./configure --host=arm-linux CC=arm-linux-gcc AR=arm-linux-ar RANLIB=arm-linux There is a bug in the configure system which you might see when cross compiling and detecting user overriding malloc. If you get an undefined reference to ‘rpl_malloc’ and/or ‘rpl_realloc’, please add the following to your ./configure line: ac_cv_func_malloc_0_nonnull=yes ac_cv_func_realloc_0_nonnull=yes After correctly configuring wolfSSL for cross-compilation, you should be able to follow standard autoconf practices for building and installing the library: make sudo make install If you have any additional tips or feedback about cross compiling wolfSSL, please let us know at info@wolfssl.com. Chapter 3 : Getting Started 3.1 General Description wolfSSL, formerly CyaSSL, is about 10 times smaller than yaSSL and up to 20 times smaller than OpenSSL when using the compile options described in Chapter 2. User benchmarking and feedback also reports dramatically better performance from wolfSSL vs. OpenSSL in the vast majority of standard SSL operations. For instructions on the build process please see Chapter 2. 3.2 Testsuite The testsuite program is designed to test the ability of wolfSSL and its cryptography library, wolfCrypt, to run on the system. wolfSSL needs all examples and tests to be run from the wolfSSL home directory. This is because it finds certs and keys from ./certs. To run testsuite, execute: ./testsuite/testsuite.test or make test (when using autoconf) On *nix or Windows the examples and testsuite will check to see if the current directory is the source directory and if so, attempt to change to the wolfSSL home directory. This should work in most setup cases, if not, just use the first method above and specify the full path. On a successful run you should see output like this, with additional output for unit tests and cipher suite tests: MD5 test passed! SHA test passed! SHA-224 test passed! SHA-256 test passed! SHA-384 test passed! SHA-512 test passed! HMAC-MD5 test passed! HMAC-SHA test passed! HMAC-SHA224 test passed! HMAC-SHA256 test passed! HMAC-SHA384 test passed! HMAC-SHA512 test passed! GMAC test passed! Chacha test passed! POLY1305 test passed! ChaCha20-Poly1305 AEAD test passed! AES test passed! AES-GCM test passed! RANDOM test passed! RSA test passed! DH test passed! ECC test passed! SSL version is TLSv1.2 SSL cipher suite is TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 SSL version is TLSv1.2 SSL cipher suite is TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Client message: hello wolfssl! Server response: I hear you fa shizzle! sending server shutdown command: quit! client sent quit command: shutting down! ciphers = DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:ECDHERSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128SHA256:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCMSHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSAAES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES128SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256SHA384:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-CHACHA20-POLY1305:DHE-RSACHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305-OLD:ECDHE-ECDSA-CHACHA20POLY1305-OLD:DHE-RSA-CHACHA20-POLY1305-OLD 33bc1a4570f4f1abccd5c48aace529b01a42ab51293954a297796e90d20970f0 input 33bc1a4570f4f1abccd5c48aace529b01a42ab51293954a297796e90d20970f0 /tmp/output-7Iyhbo All tests passed! This indicates that everything is configured and built correctly. If any of the tests fail, make sure the build system was set up correctly. Likely culprits include having the wrong endianness or not properly setting the 64-bit type. If you've set anything to the non-default settings try removing those, rebuilding wolfSSL, and then re-testing. 3.3 Client Example You can use the client example found in examples/client to test wolfSSL against any SSL server. To see a list of available command line runtime options, run the client with the --help argument: ./examples/client/client --help client 3.9.10 NOTE: All files relative to wolfSSL home dir -? Help, print this usage -h Host to connect to, default 127.0.0.1 -p Port to connect on, not 0, default 11111 -v SSL version [0-3], SSLv3(0) - TLS1.2(3)), default 3 -V Prints valid ssl version numbers, SSLv3(0) - TLS1.2(3) -l Cipher suite list (: delimited) -c Certificate file, default ./certs/client-cert.pem -k Key file, default ./certs/client-key.pem -A Certificate Authority file, default ./certs/ca-cert.pem -Z Minimum DH key bits, default 1024 -b Benchmark connections and print stats -B Benchmark throughput using bytes and print stats -s Use pre Shared keys -t Track wolfSSL memory use -d -D -e -g -u -m -N -r -w -M -f -x -X -n Disable peer checks Override Date Errors example List Every cipher suite available, Send server HTTP GET Use UDP DTLS, add -v 2 for DTLSv1, -v 3 for DTLSv1.2 (default) Match domain name in cert Use Non-blocking sockets Resume session Wait for bidirectional shutdown Use STARTTLS, using protocol (smtp) Fewer packets/group messages Disable client cert/key loading Driven by eXternal test case Disable Extended Master Secret To test against example.com:443 try the following. This is using wolfSSL compiled with the --enable-opensslextra --enable-supportedcurves build options: ./examples/client/client -h example.com -p 443 -d -g peer's cert info: issuer : /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert SHA2 High Assurance Server CA subject: /C=US/ST=California/L=Los Angeles/O=Internet Corporation for Assigned Names and Numbers/OU=Technology/CN=www.example.org altname = www.example.net altname = www.example.edu altname = www.example.com altname = example.org altname = example.net altname = example.edu altname = example.com altname = www.example.org serial number:0e:64:c5:fb:c2:36:ad:e1:4b:17:2a:eb:41:c7:8c:b0 SSL version is TLSv1.2 SSL cipher suite is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Client Random : 83083A1D84404E66C86D7560A2C6ACEEEB0C35F94FDD5E07BC7507CD4E273B19 SSL connect ok, sending GET... Server response: HTTP/1.0 200 OK Accept-Ranges: bytes Content-Type: text/html Date: Tue, 20 D ec 2016 22:52:00 GMT Last-Modified: Tue, 20 Dec 2016 22:33:12 GMT Server: ECS (pae/378A) Content-Length: 94 Connection: close edgecastcdn.net edgecastcdn.net
This tells the client to connect to (-h) example.com on the HTTPS port (-p) of 443 and sends a generic (-g) GET request. The (-d) option tells the client not to verify the server. The rest is the initial output from the server that fits into the read buffer. If no command line arguments are given, then the client attempts to connect to the localhost on the wolfSSL default port of 11111. It also loads the client certificate in case the server wants to perform client authentication. The client is able to benchmark a connection when using the “-b” argument. When used, the client attempts to connect to the specified server/port the argument number of times and gives the average time in milliseconds that it took to perform SSL_connect(). For example, ./examples/client/client -b 100 SSL_connect avg took: 0.653 milliseconds If you'd like to change the default host from localhost, or the default port from 11111, you can change these settings in /wolfssl/test.h. The variables wolfSSLIP and wolfSSLPort control these settings. Re-build all of the examples including testsuite when changing these settings otherwise the test programs won't be able to connect to each other. By default, the wolfSSL example client tries to connect to the specified server using TLS 1.2. The user is able to change the SSL/TLS version which the client uses by using the “-v” command line option. The following values are available for this option: -v -v -v -v 0 1 2 3 = = = = SSL TLS TLS TLS 3.0 (disabled by default) 1.0 1.1 1.2 A common error users see when using the example client is -155: err = -155, ASN sig error, confirm failure This is typically caused by the wolfSSL client not being able to verify the certificate of the server it is connecting to. By default, the wolfSSL client loads the yaSSL test CA certificate as a trusted root certificate. This test CA certificate will not be able to verify an external server certificate which was signed by a different CA. As such, to solve this problem, users either need to turn off verification of the peer (server), using the “-d” option: ./examples/client/client -h myhost.com -p 443 -d Or load the correct CA certificate into the wolfSSL client using the “-A” command line option: ./examples/client/client -h myhost.com -p 443 -A serverCA.pem 3.4 Server Example The server example demonstrates a simple SSL server that optionally performs client authentication. Only one client connection is accepted and then the server quits. The client example in normal mode (no command line arguments) will work just fine against the example server, but if you specify command line arguments for the client example, then a client certificate isn't loaded and the wolfSSL_connect() will fail (unless client cert check is disabled using the “-d” option). The server will report an error "-245, peer didn't send cert". Like the example client, the server can be used with several command line arguments as well: ./examples/server/server --help server 3.9.10 NOTE: All files relative to wolfSSL home dir -? Help, print this usage -p Port to listen on, not 0, default 11111 -v SSL version [0-3], SSLv3(0) - TLS1.2(3)), default 3 -l Cipher suite list (: delimited) -c Certificate file, default ./certs/server-cert.pem -k Key file, default ./certs/server-key.pem -A Certificate Authority file, default ./certs/client-cert.pem -R Create Ready file for external monitor default none -D Diffie-Hellman Params file, default ./certs/dh2048.pem -Z Minimum DH key bits, default 1024 -d Disable client cert check -b Bind to any interface instead of localhost only -s Use pre Shared keys -t Track wolfSSL memory use -u Use UDP DTLS, add -v 2 for DTLSv1, -v 3 for DTLSv1.2 (default) -f Fewer packets/group messages -r Allow one client Resumption -N Use Non-blocking sockets -S -w -i -e -B Use Host Name Indication Wait for bidirectional shutdown Loop indefinitely (allow repeated connections) Echo data mode (return raw bytes received) Benchmark throughput using bytes and print stats 3.5 EchoServer Example The echoserver example sits in an endless loop waiting for an unlimited number of client connections. Whatever the client sends the echoserver echoes back. Client authentication isn't performed so the example client can be used against the echoserver in all 3 modes. Four special commands aren't echoed back and instruct the echoserver to take a different action. 1. "quit" If the echoserver receives the string "quit" it will shutdown. 2. "break" If the echoserver receives the string "break" it will stop the current session but continue handling requests. This is particularly useful for DTLS testing. 3. "printstats" If the echoserver receives the string "printstats" it will print out statistics for the session cache. 4. "GET" If the echoserver receives the string "GET" it will handle it as an http get and send back a simple page with the message "greeting from wolfSSL". This allows testing of various TLS/SSL clients like Safari, IE, Firefox, gnutls, and the like against the echoserver example. The output of the echoserver is echoed to stdout unless NO_MAIN_DRIVER is defined. You can redirect output through the shell or through the first command line argument. To create a file named output.txt with the output from the echoserver run: ./examples/echoserver/echoserver output.txt 3.6 EchoClient Example The echoclient example can be run in interactive mode or batch mode with files. To run in interactive mode and write 3 strings "hello", "wolfssl", and "quit" results in: ./examples/echoclient/echoclient hello hello wolfssl wolfssl quit sending server shutdown command: quit! To use an input file, specify the filename on the command line as the first argument. To echo the contents of the file input.txt issue: ./examples/echoclient/echoclient input.txt If you want the result to be written out to a file, you can specify the output file name as an additional command line argument. The following command will echo the contents of file input.txt and write the result from the server to output.txt: ./examples/echoclient/echoclient input.txt output.txt The testsuite program does just that, but hashes the input and output files to make sure that the client and server were getting/sending the correct and expected results. 3.7 Benchmark Many users are curious about how the wolfSSL embedded SSL library will perform on a specific hardware device or in a specific environment. Because of the wide variety of different platforms and compilers used today in embedded, enterprise, and cloud-based environments, it is hard to give generic performance calculations across the board. To help wolfSSL users and customers in determining SSL performance for wolfSSL / wolfCrypt, a benchmark application is provided which is bundled with wolfSSL. wolfSSL uses the wolfCrypt cryptography library for all crypto operations by default. Because the underlying crypto is a very performance-critical aspect of SSL/TLS, our benchmark application runs performance tests on wolfCrypt’s algorithms. The benchmark utility located in wolfcrypt/benchmark (./wolfcrypt/benchmark/benchmark) may be used to benchmark the cryptographic functionality of wolfCrypt. Typical output may look like the following (in this output, several optional algorithms/ciphers were enabled including HC-128, RABBIT, ECC, SHA-256, SHA-512, AES-GCM, AES-CCM, and Camellia): ./wolfcrypt/benchmark/benchmark RNG AES enc AES dec AES-GCM AES-CCM Camellia HC128 RABBIT CHACHA CHA-POLY IDEA 50 50 50 50 50 50 50 50 50 50 50 megs megs megs megs megs megs megs megs megs megs megs took took took took took took took took took took took 0.516 0.278 0.260 0.840 0.534 0.376 0.032 0.109 0.144 0.190 0.807 seconds, 96.975 MB/s Cycles per byte seconds, 179.737 MB/s Cycles per byte seconds, 192.029 MB/s Cycles per byte seconds, 59.552 MB/s Cycles per byte seconds, 93.548 MB/s Cycles per byte seconds, 132.928 MB/s Cycles per byte seconds, 1550.586 MB/s Cycles per byte seconds, 459.559 MB/s Cycles per byte seconds, 347.427 MB/s Cycles per byte seconds, 262.978 MB/s Cycles per byte seconds, 61.982 MB/s Cycles per byte = = = = = = = = = = = 22.57 12.18 11.40 36.75 23.39 16.46 1.41 4.76 6.30 8.32 35.31 MD5 POLY1305 SHA SHA-224 SHA-256 SHA-384 SHA-512 50 50 50 50 50 50 50 megs megs megs megs megs megs megs took took took took took took took 0.111 0.039 0.118 0.242 0.243 0.172 0.175 seconds, 452.121 MB/s Cycles per byte = seconds, 1281.392 MB/s Cycles per byte = seconds, 424.747 MB/s Cycles per byte = seconds, 206.789 MB/s Cycles per byte = seconds, 206.022 MB/s Cycles per byte = seconds, 290.787 MB/s Cycles per byte = seconds, 286.117 MB/s Cycles per byte = 4.84 1.71 5.15 10.58 10.62 7.53 7.65 scrypt 39.698 milliseconds, avg over 10 iterations RSA RSA DH DH 2048 2048 2048 2048 public private key generation key agreement 0.358 4.537 1.391 1.422 milliseconds, milliseconds, milliseconds, milliseconds, avg avg avg avg over over over over 100 100 100 100 iterations iterations iterations iterations ECC 256 EC-DHE EC-DSA EC-DSA key generation key agreement sign time verify time 0.885 0.874 0.929 0.602 milliseconds, milliseconds, milliseconds, milliseconds, avg avg avg avg over over over over 100 100 100 100 iterations iterations iterations iterations This is especially useful for comparing the public key speed before and after changing the math library. You can test the results using the normal math library (./configure), the fastmath library (./configure --enable-fastmath), and the fasthugemath library (./configure --enable-fasthugemath). For more details and benchmark results, please refer to the wolfSSL Benchmarks page: https://wolfssl.com/wolfSSL/benchmarks-wolfssl.html 3.7.1 Relative Performance Although the performance of individual ciphers and algorithms will depend on the host platform, the following graph shows relative performance between wolfCrypt’s ciphers. These tests were conducted on a Macbook Pro (OS X 10.6.8) running a 2.2 GHz Intel Core i7. If you want to use only a subset of ciphers, you can customize which specific cipher suites and/or ciphers wolfSSL uses when making an SSL/TLS connection. For example, to force 128-bit AES, add the following line after the call to wolfSSL_CTX_new (SSL_CTX_new): wolfSSL_CTX_set_cipher_list(ctx, “AES128-SHA”); 3.7.2 Benchmarking Notes 1. The processors native register size (32 vs 64-bit) can make a big difference when doing 1000+ bit public key operations. 2. keygen (--enable-keygen) will allow you to also benchmark key generation speeds when running the benchmark utility. 3. fastmath (--enable-fastmath) reduces dynamic memory usage and speeds up public key operations. If you are having trouble building on 32-bit platform with fastmath, disable shared libraries so that PIC isn’t hogging a register (also see notes in the README) ./configure --enable-fastmath --disable-shared make clean make *Note: doing a “make clean” is good practice with wolfSSL when switching configure options. 4. By default, fastmath tries to use assembly optimizations if possible. If assembly optimizations don’t work, you can still use fastmath without them by adding TFM_NO_ASM to CFLAGS when building wolfSSL: ./configure --enable-fastmath C_EXTRA_FLAGS=”-DTFM_NO_ASM” 5. Using fasthugemath can try to push fastmath even more for users who are not running on embedded platforms: ./configure --enable-fasthugemath 6. With the default wolfSSL build, we have tried to find a good balance between memory usage and performance. If you are more concerned about one of the two, please refer back to Chapter 2 for additional wolfSSL configuration options. 7. Bulk Transfers: wolfSSL by default uses 128 byte I/O buffers since about 80% of SSL traffic falls within this size and to limit dynamic memory use. It can be configured to use 16K buffers (the maximum SSL size) if bulk transfers are required. 3.7.3 Benchmarking on Embedded Systems There are several build options available to make building the benchmark application on an embedded system easier. These include: BENCH_EMBEDDED - enabling this define will switch the benchmark application from using Megabytes to using Kilobytes, therefore reducing the memory usage. By default, when using this define, ciphers and algorithms will be benchmarked with 25kB. Public key algorithms will only be benchmarked over 1 iteration (as public key operations on some embedded processors can be fairly slow). These can be adjusted in benchmark.c by altering the variables “numBlocks” and “times” located inside the BENCH_EMBEDDED define. USE_CERT_BUFFERS_1024 - enabling this define will switch the benchmark application from loading test keys and certificates from the file system and instead use 1024-bit key and certificate buffers located in /wolfssl/certs_test.h. It is useful to use this define when an embedded platform has no filesystem (used with NO_FILESYSTEM) and a slow processor where 2048-bit public key operations may not be reasonable. USE_CERT_BUFFERS_2048 - enabling this define is similar to USE_CERT_BUFFERS_1024 accept that 2048-bit key and certificate buffers are used instead of 1024-bit ones. This define is useful when the processor is fast enough to do 2048-bit public key operations but when there is no filesystem available to load keys and certificates from files. 3.8 Changing a Client Application to Use wolfSSL This section will explain the basic steps needed to add wolfSSL to a client application, using the wolfSSL native API. For a server explanation, please see Section 3.9. A more complete walk-through with example code is located in the SSL Tutorial in Chapter 11. If you want more information about the OpenSSL compatibility layer, please see Chapter 13. 1. Include the wolfSSL header #include 2. Change all calls from read() (or recv()) to wolfSSL_read() so result = read(fd, buffer, bytes); becomes result = wolfSSL_read(ssl, buffer, bytes); 3. Change all calls from write (or send) to wolfSSL_write() so result = write(fd, buffer, bytes); becomes result = wolfSSL_write(ssl, buffer, bytes); 4. You can manually call wolfSSL_connect() but that's not even necessary; the first call to wolfSSL_read() or wolfSSL_write() will initiate the wolfSSL_connect() if it hasn't taken place yet. 5. Initialize wolfSSL and the WOLFSSL_CTX. You can use one WOLFSSL_CTX no matter how many WOLFSSL objects you end up creating. Basically you'll just need to load CA certificates to verify the server you are connecting to. Basic initialization looks like: wolfSSL_Init(); WOLFSSL_CTX* ctx; if ( (ctx = wolfSSL_CTX_new(wolfTLSv1_client_method())) == NULL) { fprintf(stderr, "wolfSSL_CTX_new error.\n"); exit(EXIT_FAILURE); } if (wolfSSL_CTX_load_verify_locations(ctx,"./ca-cert.pem",0) != SSL_SUCCESS) { fprintf(stderr, "Error loading ./ca-cert.pem," " please check the file.\n"); exit(EXIT_FAILURE); } 6. Create the WOLFSSL object after each TCP connect and associate the file descriptor with the session: /*after connecting to socket fd*/ WOLFSSL* ssl; if ( (ssl = wolfSSL_new(ctx)) == NULL) { fprintf(stderr, "wolfSSL_new error.\n"); exit(EXIT_FAILURE); } wolfSSL_set_fd(ssl, fd); 7. Error checking. Each wolfSSL_read() and wolfSSL_write() call will return the number of bytes written upon success, 0 upon connection closure, and -1 for an error, just like read() and write(). In the event of an error you can use two calls to get more information about the error: char errorString[80]; int err = wolfSSL_get_error(ssl, 0); wolfSSL_ERR_error_string(err, errorString); If you are using non-blocking sockets, you can test for errno EAGAIN/EWOULDBLOCK or more correctly you can test the specific error code returned by wolfSSL_get_error() for SSL_ERROR_WANT_READ or SSL_ERROR_WANT_WRITE. 8. Cleanup. After each WOLFSSL object is done being used you can free it up by calling: wolfSSL_free(ssl); When you are completely done using SSL/TLS altogether you can free the WOLFSSL_CTX object by calling: wolfSSL_CTX_free(ctx); wolfSSL_Cleanup(); For an example of a client application using wolfSSL, see the client example located in the /examples/client.c file. 3.9 Changing a Server Application to Use wolfSSL This section will explain the basic steps needed to add wolfSSL to a server application using the wolfSSL native API. For a client explanation, please see section 3.8. A more complete walk-through, with example code, is located in the SSL Tutorial in Chapter 11. 1. Follow the instructions above for a client, except change the client method call in step 5 to a server one, so wolfSSL_CTX_new(wolfTLSv1ls_client_method()) becomes wolfSSL_CTX_new(wolfTLSv1_server_method()) or even wolfSSL_CTX_new(wolfSSLv23_server_method()) To allow SSLv3 and TLSv1+ clients to connect to the server. 2. Add the server's certificate and key file to the initialization in step 5 above: if (wolfSSL_CTX_use_certificate_file(ctx,"./server-cert.pem", SSL_FILETYPE_PEM) != SSL_SUCCESS) { fprintf(stderr, "Error loading ./server-cert.pem," " please check the file.\n"); exit(EXIT_FAILURE); } if (wolfSSL_CTX_use_PrivateKey_file(ctx,"./server-key.pem", SSL_FILETYPE_PEM) != SSL_SUCCESS) { fprintf(stderr, "Error loading ./server-key.pem," " please check the file.\n"); exit(EXIT_FAILURE); } It is possible to load certificates and keys from buffers as well if there is no filesystem available. In this case, see the wolfSSL_CTX_use_certificate_buffer() and wolfSSL_CTX_use_PrivateKey_buffer() API documentation, linked here, for more information. For an example of a server application using wolfSSL, see the server example located in the /examples/server.c file. Chapter 4: Features wolfSSL (formerly CyaSSL) supports the C programming language as a primary interface, but also supports several other host languages, including Java, PHP, Perl, and Python (through a SWIG interface). If you have interest in hosting wolfSSL in another programming language that is not currently supported, please contact us. This chapter covers some of the features of wolfSSL in more depth, including Stream Ciphers, AES-NI, IPv6 support, SSL Inspection (Sniffer) support, and more. 4.1 Features Overview For an overview of wolfSSL features, please reference the wolfSSL product webpage: https://wolfssl.com/wolfSSL/Products-wolfssl.html 4.2 Protocol Support wolfSSL supports SSL 3.0, TLS (1.0, 1.1, 1.2, 1.3 (client side)), and DTLS (1.0 and 1.2). You can easily select a protocol to use by using one of the following functions (as shown for either the client or server). wolfSSL does not support SSL 2.0, as it has been insecure for several years. The client and server functions below change slightly when using the OpenSSL compatibility layer. For the OpenSSL-compatible functions, please see Chapter 13. 4.2.1 Server Functions wolfDTLSv1_server_method(void); /*DTLS 1.0*/ wolfDTLSv1_2_server_method(void); /*DTLS 1.2*/ wolfSSLv3_server_method(void); /*SSL 3.0*/ wolfTLSv1_server_method(void); /*TLS 1.0*/ wolfTLSv1_1_server_method(void); /*TLS 1.1*/ wolfTLSv1_2_server_method(void); /*TLS 1.2*/ wolfSSLv23_server_method(void); /*Use highest possible version from SSLv3 - TLS 1.2*/ wolfSSL supports robust server downgrade with the wolfSSLv23_server_method() function. See section 4.2.3 for a details. 4.2.2 Client Functions wolfDTLSv1_client_method(void); /* DTLS 1.0*/ wolfDTLSv1_2_client_method(void); /* DTLS 1.2*/ wolfSSLv3_client_method(void); /* SSL 3.0*/ wolfTLSv1_client_method(void); /* TLS 1.0*/ wolfTLSv1_1_client_method(void); /* TLS 1.1*/ wolfTLSv1_2_client_method(void); /* TLS 1.2*/ wolfSSLv23_client_method(void); /* Use highest possible version from SSLv3 - TLS 1.2*/ wolfSSL supports robust client downgrade with the wolfSSLv23_client_method() function. See section 4.2.3 for a details. For details on how to use these functions, please see Chapter 3, “Getting Started.” For a comparison between SSL 3.0, TLS 1.0, 1.1, 1.2, and DTLS, please see Appendix A. 4.2.3 Robust Client and Server Downgrade Both wolfSSL clients and servers have robust version downgrade capability. If a specific protocol version method is used on either side, then only that version will be negotiated or an error will be returned. For example, a client that uses TLS 1.0 and tries to connect to an SSL 3.0 only server, the connection will fail, likewise connecting to a TLS 1.1 will fail as well. To resolve this issue, a client that uses the wolfSSLv23_client_method() function will use the highest protocol version supported by the server and downgrade to TLS 1.0 if needed. In this case, the client will be able to connect to a server running TLS 1.0 - TLS 1.2. The only versions it can't connect to is SSL 2.0 which has been insecure for years, and SSL 3.0 which has been disabled by default. Similarly, a server using the wolfSSLv23_server_method() function can handle clients supporting protocol versions from TLS 1.0 - TLS 1.2. A wolfSSL server can't accept a connection from SSLv2 because no security is provided. 4.2.4 IPv6 Support If you are an adopter of IPv6 and want to use an embedded SSL implementation then you may have been wondering if wolfSSL supports IPv6. The answer is yes, we do support wolfSSL running on top of IPv6. wolfSSL was designed as IP neutral, and will work with both IPv4 and IPv6, but the current test applications default to IPv4 (so as to apply to a broader range of systems). To change the test applications to IPv6, use the --enable-ipv6 option while building wolfSSL. Further information on IPv6 can be found here: http://en.wikipedia.org/wiki/IPv6. 4.2.5 DTLS wolfSSL has support for DTLS (“Datagram” TLS) for both client and server. The current supported version is DTLS 1.0. The TLS protocol was designed to provide a secure transport channel across a reliable medium (such as TCP). As application layer protocols began to be developed using UDP transport (such as SIP and various electronic gaming protocols), a need arose for a way to provide communications security for applications which are delay sensitive. This need lead to the creation of the DTLS protocol. Many people believe the difference between TLS and DTLS is the same as TLS vs. UDP. This is incorrect. UDP has the benefit of having no handshake, no tear-down, and no delay in the middle if something gets lost (compared with TCP). DTLS on the other hand, has an extended SSL handshake and tear-down and must implement TCP-like behavior for the handshake. In essence, DTLS reverses the benefits that are offered by UDP in exchange for a secure connection. DTLS can be enabled when building wolfSSL by using the --enable-dtls build option. 4.2.6 LwIP (Lightweight Internet Protocol) wolfSSL supports the lightweight internet protocol implementation out of the box. To use this protocol all you need to do is define WOLFSSL_LWIP or navigate to the settings.h file and uncomment the line: /*#define WOLFSSL_LWIP*/ The focus of lwIP is to reduce RAM usage while still providing a full TCP stack. That focus makes lwIP great for use in embedded systems, an area where wolfSSL is an ideal match for SSL/TLS needs. 4.3 Cipher Support 4.3.1 Cipher Suite Strength and Choosing Proper Key Sizes To see what ciphers are currently being used you can call the method: wolfSSL_get_ciphers() This function will return the currently enabled cipher suites. Cipher suites come in a variety of strengths. Because they are made up of several different types of algorithms (authentication, encryption, and message authentication code (MAC)), the strength of each varies with the chosen key sizes. There can be many methods of grading the strength of a cipher suite - the specific method used seems to vary between different projects and companies and can include things such as symmetric and public key algorithm key sizes, type of algorithm, performance, and known weaknesses. NIST (National Institute of Standards and Technology) makes recommendations on choosing an acceptable cipher suite by providing comparable algorithm strengths for varying key sizes of each. The strength of a cryptographic algorithm depends on the algorithm and the key size used. The NIST Special Publication, SP800-57, states that two algorithms are considered to be of comparable strength as follows: … two algorithms are considered to be of comparable strength for the given key sizes (X and Y) if the amount of work needed to “break the algorithms” or determine the keys (with the given key sizes) is approximately the same using a given resource. The security strength of an algorithm for a given key size is traditionally described in terms of the amount of work it takes to try all keys for a symmetric algorithm with a key size of “X” that has no shortcut attacks (i.e., the most efficient attack is to try all possible keys). The following two tables are based off of both Table 2 (pg. 64) and Table 4 (pg. 66) from NIST SP800-57, and shows comparable security strength between algorithms as well as a strength measurement (based off of NIST’s suggested algorithm security lifetimes using bits of security). Note: In the following table “L” is the size of the public key for finite field cryptography (FFC), “N” is the size of the private key for FFC, “k” is considered the key size for integer factorization cryptography (IFC), and “f” is considered the key size for elliptic curve cryptography. Bits of Security Symmetric Key Algorithms FFC Key Size (DSA, DH, etc.) IFC Key Size (RSA, etc.) ECC Key Size (ECDSA, etc.) 80 2TDEA, etc. L = 1024 N = 160 k = 1024 f = 160-223 128 AES-128, etc. L = 3072 N = 256 k = 3072 f = 256-383 192 AES-192, etc. L = 7680 N = 384 k = 7680 f = 384-511 256 AES-256, etc. L = 15360 N = 512 k = 15360 f = 512+ (Table 2: Relative Bit and Key Strengths) Bits of Security Description 80 Security good through 2010 128 Security good through 2030 192 Long Term Protection 256 Secure for the foreseeable future (Table 3: Bit Strength Descriptions) Using this table as a guide, to begin to classify a cipher suite, we categorize it based on the strength of the symmetric encryption algorithm. In doing this, a rough grade classification can be devised to classify each cipher suite based on bits of security (only taking into account symmetric key size): LOW MEDIUM HIGH = bits of security smaller than 128 bits = bits of security equal to 128 bits = bits of security larger than 128 bits Outside of the symmetric encryption algorithm strength, the strength of a cipher suite will depend greatly on the key sizes of the key exchange and authentication algorithm keys. The strength is only as good as the cipher suite’s weakest link. Following the above grading methodology (and only basing it on symmetric encryption algorithm strength), wolfSSL 2.0.0 currently supports a total of 0 LOW strength cipher suites, 12 MEDIUM strength cipher suites, and 8 HIGH strength cipher suites – as listed below. The following strength classification could change depending on the chosen key sizes of the other algorithms involved. For a reference on hash function security strength, see Table 3 (pg. 64) of NIST SP800-57. In some cases, you will see ciphers referenced as “EXPORT” ciphers. These ciphers originated from the time period in US history (as late as 1992) when it was illegal to export software with strong encryption from the United States. Strong encryption was classified as “Munitions” by the US Government (under the same category as Nuclear Weapons, Tanks, and Ballistic Missiles). Because of this restriction, software being exported included “weakened” ciphers (mostly in smaller key sizes). In the current day, this restriction has been lifted, and as such, EXPORT ciphers are no longer a mandated necessity. 4.3.2 Supported Cipher Suites The following cipher suites are supported by wolfSSL. A cipher suite is a combination of authentication, encryption, and message authentication code (MAC) algorithms which are used during the TLS or SSL handshake to negotiate security settings for a connection. Each cipher suite defines a key exchange algorithm, a bulk encryption algorithm, and a message authentication code algorithm (MAC). The key exchange algorithm (RSA, DSS, DH, EDH) determines how the client and server will authenticate during the handshake process. The bulk encryption algorithm (DES, 3DES, AES, ARC4, RABBIT, HC-128), including block ciphers and stream ciphers, is used to encrypt the message stream. The message authentication code (MAC) algorithm (MD2, MD5, SHA-1, SHA-256, SHA-512, RIPEMD) is a hash function used to create the message digest. The table below matches up to the cipher suites (and categories) found in /wolfssl/internal.h (starting at about line 706). If you are looking for a cipher suite which is not in the following list, please contact us to discuss getting it added to wolfSSL. wolfSSL Cipher Suites (version 3.10.0) TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA TLS_DHE_RSA_WITH_AES_256_CBC_SHA TLS_DHE_RSA_WITH_AES_128_CBC_SHA TLS_DH_anon_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_NULL_SHA TLS_PSK_WITH_AES_256_CBC_SHA TLS_PSK_WITH_AES_128_CBC_SHA256 TLS_PSK_WITH_AES_256_CBC_SHA384 TLS_PSK_WITH_AES_128_CBC_SHA TLS_PSK_WITH_NULL_SHA256 TLS_PSK_WITH_NULL_SHA384 TLS_PSK_WITH_NULL_SHA SSL_RSA_WITH_RC4_128_SHA SSL_RSA_WITH_RC4_128_MD5 SSL_RSA_WITH_3DES_EDE_CBC_SHA SSL_RSA_WITH_IDEA_CBC_SHA TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_RC4_128_SHA TLS_ECDHE_ECDSA_WITH_RC4_128_SHA TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_PSK_WITH_NULL_SHA256 TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_NULL_SHA ECC cipher suites TLS_ECDH_RSA_WITH_AES_256_CBC_SHA TLS_ECDH_RSA_WITH_AES_128_CBC_SHA TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA TLS_ECDH_RSA_WITH_RC4_128_SHA TLS_ECDH_ECDSA_WITH_RC4_128_SHA TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 Static ECDH cipher suites TLS_RSA_WITH_HC_128_MD5 TLS_RSA_WITH_HC_128_SHA TLS_RSA_WITH_RABBIT_SHA TLS_RSA_WITH_AES_128_CBC_B2B256 TLS_RSA_WITH_AES_256_CBC_B2B256 TLS_RSA_WITH_HC_128_B2B256 TLS_QSH wolfSSL extension eSTREAM cipher suites Blake2b cipher suites wolfSSL extension - Quantum-Safe Handshake TLS_NTRU_RSA_WITH_RC4_128_SHA TLS_NTRU_RSA_WITH_3DES_EDE_CBC_SHA TLS_NTRU_RSA_WITH_AES_128_CBC_SHA TLS_NTRU_RSA_WITH_AES_256_CBC_SHA wolfSSL extension - NTRU cipher suites TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_256_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_NULL_SHA256 TLS_DHE_PSK_WITH_AES_128_CBC_SHA256 TLS_DHE_PSK_WITH_NULL_SHA256 SHA-256 cipher suites TLS_DHE_PSK_WITH_AES_256_CBC_SHA384 TLS_DHE_PSK_WITH_NULL_SHA384 SHA-384 cipher suites TLS_RSA_WITH_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS_PSK_WITH_AES_128_GCM_SHA256 TLS_PSK_WITH_AES_256_GCM_SHA384 TLS_DHE_PSK_WITH_AES_128_GCM_SHA256 TLS_DHE_PSK_WITH_AES_256_GCM_SHA384 AES-GCM cipher suites TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 ECC AES-GCM cipher suites TLS_RSA_WITH_AES_128_CCM_8 TLS_RSA_WITH_AES_256_CCM_8 TLS_ECDHE_ECDSA_WITH_AES_128_CCM TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 TLS_PSK_WITH_AES_128_CCM TLS_PSK_WITH_AES_256_CCM TLS_PSK_WITH_AES_128_CCM_8 TLS_PSK_WITH_AES_256_CCM_8 TLS_DHE_PSK_WITH_AES_128_CCM AES-CCM cipher suites TLS_DHE_PSK_WITH_AES_256_CCM TLS_RSA_WITH_CAMELLIA_128_CBC_SHA TLS_RSA_WITH_CAMELLIA_256_CBC_SHA TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 TLS_PSK_WITH_CHACHA20_POLY1305_SHA256 TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256 Camellia cipher suites ChaCha cipher suites TLS_ECDHE_RSA_WITH_CHACHA20_OLD_POLY1305_SHA25 6 TLS_ECDHE_ECDSA_WITH_CHACHA20_OLD_POLY1305_SH A256 TLS_DHE_RSA_WITH_CHACHA20_OLD_POLY1305_SHA256 TLS_EMPTY_RENEGOTIATION_INFO_SCSV Renegotiation Indication Extension Special Suite (Table 4: wolfSSL Cipher Suites) 4.3.3 AEAD Suites wolfSSL supports AEAD suites, including AES-GCM, AES-CCM, and CHACHAPOLY1305. The big difference between these AEAD suites and others is that they authenticate the encrypted data. This helps with mitigating man in the middle attacks that result in having data tampered with. AEAD suites use a combination of a block cipher (or more recently also a stream cipher) algorithm combined with a tag produced by a keyed hash algorithm. Combining these two algorithms is handled by the wolfSSL encrypt and decrypt process which makes it easier for users. All that is needed for using a specific AEAD suite is simply enabling the algorithms that are used in a supported suite. 4.3.4 Block and Stream Ciphers wolfSSL supports the AES, DES, 3DES, and Camellia block ciphers and the RC4, RABBIT, HC-128 and CHACHA20 stream ciphers. AES, DES, 3DES, RC4 and RABBIT are enabled by default. Camellia, HC-128, and ChaCha20 can be enabled when building wolfSSL (with the --enable-hc128, --enable-camellia, and --enablechacha build options, respectively). The default mode of AES is CBC mode. To enable GCM or CCM mode with AES, use the --enable-aesgcm and --enable-aesccm build options. Please see the examples for usage and the wolfCrypt Usage Reference (Chapter 10) for specific usage information. SSL uses RC4 as the default stream cipher. It's a good one, though it's getting a little old. wolfSSL has added two ciphers from the eStream project into the code base, RABBIT and HC-128. RABBIT is nearly twice as fast as RC4 and HC-128 is about 5 times as fast! So if you've ever decided not to use SSL because of speed concerns, using wolfSSL's stream ciphers should lessen or eliminate that performance doubt. Recently wolfSSL also added ChaCha20. While RC4 performs about .11 times faster than ChaCha, RC4 is generally considered less secure than ChaCha. ChaCha can put up very nice times of it’s own with added security as a tradeoff. To see a comparison of cipher performance, visit the wolfSSL Benchmark web page, located here: http://wolfssl.com/yaSSL/benchmarks-wolfssl.html. 4.3.4.1 What’s the Difference? A block cipher has to be encrypted in chunks that are the block size for the cipher. For example, AES has block size of 16 bytes. So if you're encrypting a bunch of small, 2 or 3 byte chunks back and forth, over 80% of the data is useless padding, decreasing the speed of the encryption/decryption process and needlessly wasting network bandwidth to boot. Basically block ciphers are designed for large chunks of data, have block sizes requiring padding, and use a fixed, unvarying transformation. Stream ciphers work well for large or small chunks of data. They are suitable for smaller data sizes because no block size is required. If speed is a concern, stream ciphers are your answer, because they use a simpler transformation that typically involves an xor'd keystream. So if you need to stream media, encrypt various data sizes including small ones, or have a need for a fast cipher then stream ciphers are your best bet. 4.3.5 Hashing Functions wolfSSL supports several different hashing functions, including MD2, MD4, MD5, SHA1, SHA-2 (SHA-224, SHA-256, SHA-384, SHA-512), SHA-3 (BLAKE2), and RIPEMD160. Detailed usage of these functions can be found in the wolfCrypt Usage Reference, Section 10.1. 4.3.6 Public Key Options wolfSSL supports the RSA, ECC, DSA/DSS, DH, and NTRU public key options, with support for EDH (Ephemeral Diffie-Hellman) on the wolfSSL server. Detailed usage of these functions can be found in the wolfCrypt Usage Reference, section 10.5. wolfSSL has support for four cipher suites utilizing NTRU public key: TLS_NTRU_RSA_WITH_3DES_EDE_CBC_SHA TLS_NTRU_RSA_WITH_RC4_128_SHA TLS_NTRU_RSA_WITH_AES_128_CBC_SHA TLS_NTRU_RSA_WITH_AES_256_CBC_SHA The strongest one, AES-256, is the default. If wolfSSL is enabled with NTRU and the NTRU library is available, these cipher suites are built into the wolfSSL library. A wolfSSL client will have these cipher suites available without any interaction needed by the user. On the other hand, a wolfSSL server application will need to load an NTRU private key and NTRU x509 certificate in order for those cipher suites to be available for use. The example servers, echoserver and server, both use the define HAVE_NTRU (which is turned on by enabling NTRU) to specify whether or not to load NTRU keys and certificates. The wolfSSL package comes with test keys and certificates in the /certs directory. ntru-cert.pem is the certificate and ntru-key.raw is the private key blob. The wolfSSL NTRU cipher suites are given the highest preference order when the protocol picks a suite. Their exact preference order is the reverse of the above listed suites, i.e., AES-256 will be picked first and 3DES last before moving onto the “standard” cipher suites. Basically, if a user builds NTRU into wolfSSL and both sides of the connection support NTRU then an NTRU cipher suite will be picked unless a user on one side has explicitly excluded them by stating to only use different cipher suites. Using NTRU over RSA can provide a 20 - 200X speed improvement. The improvement increases as the size of keys increases, meaning a much larger speed benefit when using large keys (8192-bit) versus smaller keys (1024-bit). 4.3.7 ECC Support wolfSSL has support for Elliptic Curve Cryptography (ECC) including but not limited to: ECDH-ECDSA, ECDHE-ECDSA, ECDH-RSA, ECDHE-PSK and ECDHE-RSA. wolfSSL’s ECC implementation can be found in the /wolfssl/wolfcrypt/ecc.h header file and the /wolfcrypt/src/ecc.c source file. Supported cipher suites are shown in the table above. ECC is disabled by default on non x86_64 builds, but can be turned on when building wolfSSL with the HAVE_ECC define or by using the autoconf system: ./configure --enable-ecc make make check When “make check” runs, note the numerous cipher suites that wolfSSL checks (if make check doesn’t produce a list of cipher suites run ./testsuite/testsuite.test on its own). Any of these cipher suites can be tested individually, e.g., to try ECDH-ECDSA with AES256-SHA, the example wolfSSL server can be started like this: ./examples/server/server -d -l ECDHE-ECDSA-AES256-SHA -c ./certs/server-ecc.pem -k ./certs/ecc-key.pem (-d) disables client cert check while (-l) specifies the cipher suite list. (-c) is the certificate to use and (-k) is the corresponding private key to use. To have the client connect try: ./examples/client/client -A ./certs/server-ecc.pem where (-A) is the CA certificate to use to verify the server. 4.3.8 PKCS Support PKCS (Public Key Cryptography Standards) refers to a group of standards created and published by RSA Security, Inc. wolfSSL has support for PKCS #5, PKCS #8, and PBKD from PKCS #12. 4.3.8.1 PKCS #5, PBKDF1, PBKDF2, PKCS #12 PKCS #5 is a password based key derivation method which combines a password, a salt, and an iteration count to generate a password-based key. wolfSSL supports both PBKDF1 and PBKDF2 key derivation functions. A key derivation function produces a derived key from a base key and other parameters (such as the salt and iteration count as explained above). PBKDF1 applies a hash function (MD5, SHA1, etc) to derive keys, where the derived key length is bounded by the length of the hash function output. With PBKDF2, a pseudorandom function is applied (such as HMAC-SHA-1) to derive the keys. In the case of PBKDF2, the derived key length is unbounded. wolfSSL also supports the PBKDF function from PKCS #12 in addition to PBKDF1 and PBKDF2. The function prototypes look like this: int PBKDF2(byte* output, const byte* passwd, int pLen, const byte* salt,int sLen, int iterations, int kLen, int hashType); int PKCS12_PBKDF(byte* output, const byte* passwd, int pLen, const byte* salt, int sLen, int iterations, int kLen, int hashType, int purpose); output contains the derived key, passwd holds the user password of length pLen, salt holds the salt input of length sLen, iterations is the number of iterations to perform, kLen is the desired derived key length, and hashType is the hash to use (which can be MD5, SHA1, or SHA2). If you are using ./configure to build wolfssl, the way to enable this functionality is to use the option --enable-pwdbased A full example can be found in /wolfcrypt/test.c. More information can be found on PKCS #5, PBKDF1, and PBKDF2 from the following specifications: PKCS#5, PBKDF1, PBKDF2: http://tools.ietf.org/html/rfc2898 4.3.8.2 PKCS #8 PKCS #8 is designed as the Private-Key Information Syntax Standard, which is used to store private key information - including a private key for some public-key algorithm and set of attributes. The PKCS #8 standard has two versions which describe the syntax to store both encrypted private keys and non-encrypted keys. wolfSSL supports both unencrypted and encrypted PKCS #8. Supported formats include PKCS #5 version 1 - version 2, and PKCS#12. Types of encryption available include DES, 3DES, RC4, and AES. PKCS#8: http://tools.ietf.org/html/rfc5208 4.3.9 Forcing the Use of a Specific Cipher By default, wolfSSL will pick the “best” (highest security) cipher suite that both sides of the connection can support. To force a specific cipher, such as 128 bit AES, add something similar to: wolfSSL_CTX_set_cipher_list(ctx, “AES128-SHA”); after the call to wolfSSL_CTX_new(); so that you have: ctx = wolfSSL_CTX_new(method); wolfSSL_CTX_set_cipher_list(ctx, “AES128-SHA”); 4.3.10 Quantum-Safe Handshake Ciphersuite wolfSSL has support for the cipher suite utilizing post quantum handshake cipher suite such as with NTRU: TLS_QSH If wolfSSL is enabled with NTRU and the NTRU package is available, the TLS_QSH cipher suite is built into the wolfSSL library. A wolfSSL client and server will have this cipher suite available without any interaction needed by the user. The wolfSSL quantum safe handshake ciphersuite is given the highest preference order when the protocol picks a suite. Basically, if a user builds NTRU into wolfSSL and both sides of the connection support NTRU then an NTRU cipher suite will be picked unless a user on one side has explicitly excluded them by stating to only use different cipher suites. Users can adjust what crypto algorithms and if the client sends across public keys by using the function examples wolfSSL_UseClientQSHKeys(ssl, 1); wolfSSL_UseSupportedQSH(ssl, WOLFSSL_NTRU_EESS439); To test if a QSH connection was established after a client has connected the following function example can be used. wolfSSL_isQSH(ssl); 4.4 Hardware Accelerated Crypto wolfSSL is able to take advantage of several hardware accelerated (or “assisted”) crypto functionalities in various processors and chips. The following sections explain which technologies wolfSSL supports out-of-the-box. 4.4.1 Intel AES-NI AES is a key encryption standard used by governments worldwide, which wolfSSL has always supported. Intel has released a new set of instructions that is a faster way to implement AES. wolfSSL is the first SSL library to fully support the new instruction set for production environments. Essentially, Intel has added AES instructions at the chip level that perform the computationally-intensive parts of the AES algorithm, boosting performance. For a list of Intel’s chips that currently have support for AES-NI, you can look here: http://ark.intel.com/search/advanced/?s=t&AESTech=true We have added the functionality to wolfSSL to allow it to call the instructions directly from the chip, instead of running the algorithm in software. This means that when you’re running wolfSSL on a chipset that supports AES-NI, you can run your AES crypto 5-10 times faster! If you are running on an AES-NI supported chipset, enable AES-NI with the --enableaesni build option. To build wolfSSL with AES-NI, GCC 4.4.3 or later is required to make use of the assembly code. References and further reading on AES-NI, ordered from general to specific, are listed below. For information about performance gains with AES-NI, please see the third link to the Intel Software Network page. AES (Wikipedia) http://en.wikipedia.org/wiki/Advanced_Encryption_Standard AES-NI (Wikipedia) http://en.wikipedia.org/wiki/AES_instruction_set AES-NI (Intel Software Network page) http://software.intel.com/en-us/articles/intel-advancedencryption-standard-instructions-aes-ni/ 4.4.2 STM32F2 wolfSSL is able to use the STM32F2 hardware-based cryptography and random number generator through the STM32F2 Standard Peripheral Library. For necessary defines, see the WOLFSSL_STM32F2 define in settings.h. The WOLFSSL_STM32F2 define enables STM32F2 hardware crypto and RNG support by default. The defines for enabling these individually are STM32F2_CRYPTO (for hardware crypto support) and STM32F2_RNG (for hardware RNG support). Documentation for the STM32F2 Standard Peripheral Library can be found in the following document: http://www.st.com/internet/com/TECHNICAL_RESOURCES/TECHNICAL_LITERATUR E/USER_MANUAL/DM00023896.pdf 4.4.3 Cavium NITROX wolfSSL has support for Cavium NITROX (http://www.cavium.com/processor_security.html). To enable Cavium NITROX support when building wolfSSL use the following configure option: ./configure --with-cavium=/home/user/cavium/software Where the “--with-cavium=” option is pointing to your licensed cavium/software directory. Since Cavium doesn't build a library wolfSSL pulls in the cavium_common.o file which gives a libtool warning about the portability of this. Also, if you're using the github source tree you'll need to remove the -Wredundant-decls warning from the generated Makefile because the cavium headers don't conform to this warning. Currently wolfSSL supports Cavium RNG, AES, 3DES, RC4, HMAC, and RSA directly at the crypto layer. Support at the SSL level is partial and currently just does AES, 3DES, and RC4. RSA and HMAC are slower until the Cavium calls can be utilized in non-blocking mode. The example client turns on cavium support as does the crypto test and benchmark. Please see the HAVE_CAVIUM define. 4.5 SSL Inspection (Sniffer) Beginning with the wolfSSL 1.5.0 release, wolfSSL has included a build option allowing it to be built with SSL Sniffer (SSL Inspection) functionality. This means that you can collect SSL traffic packets and with the correct key file, are able to decrypt them as well. The ability to “inspect” SSL traffic can be useful for several reasons, some of which include: ● ● ● ● Analyzing Network Problems Detecting network misuse by internal and external users Monitoring network usage and data in motion Debugging client/server communications To enable sniffer support, build wolfSSL with the --enable-sniffer option on *nix or use the vcproj files on Windows. You will need to have pcap installed on *nix or WinPcap on Windows. The main sniffer functions which can be found in sniffer.h are listed below with a short description of each: ssl_SetPrivateKey - Sets the private key for a specific server and port. ssl_SetNamedPrivateKey - Sets the private key for a specific server, port and domain name. ssl_DecodePacket - Passes in a TCP/IP packet for decoding. ssl_Trace - Enables / Disables debug tracing to the traceFile. ssl_InitSniffer - Initialize the overall sniffer. ssl_FreeSniffer - Free the overall sniffer. ssl_EnableRecovery - Enables option to attempt to pick up decoding of SSL traffic in the case of lost packets. ssl_GetSessionStats - Obtains memory usage for the sniffer sessions. To look at wolfSSL's sniffer support and see a complete example, please see the "snifftest" app in the "sslSniffer/sslSnifferTest" folder from the wolfSSL download. Keep in mind that because the encryption keys are setup in the SSL Handshake, the handshake needs to be decoded by the sniffer in order for future application data to be decoded. For example, if you are using "snifftest" with the wolfSSL example echoserver and echoclient, the snifftest application must be started before the handshake begins between the server and client. The sniffer can only decode streams encrypted with the following algorithms: AES-CBC, DES3-CBC, ARC4, HC-128, RABBIT, Camellia-CBC, and IDEA. If ECDHE or DHE key agreement is used the stream cannot be sniffed; only RSA key-exchange is supported. 4.6 Compression wolfSSL supports data compression with the zlib library. The ./configure build system detects the presence of this library, but if you're building in some other way define the constant HAVE_LIBZ and include the path to zlib.h for your includes. Compression is off by default for a given cipher. To turn it on, use the function wolfSSL_set_compression() before SSL connecting or accepting. Both the client and server must have compression turned on in order for compression to be used. Keep in mind that while compressing data before sending decreases the actual size of the messages being sent and received, the amount of data saved by compression usually takes longer in time to analyze than it does to send it raw on all but the slowest of networks. 4.7 Pre-Shared Keys wolfSSL has support for these ciphers with static pre-shared keys: TLS_PSK_WITH_AES_256_CBC_SHA TLS_PSK_WITH_AES_128_CBC_SHA256 TLS_PSK_WITH_AES_256_CBC_SHA384 TLS_PSK_WITH_AES_128_CBC_SHA TLS_PSK_WITH_NULL_SHA256 TLS_PSK_WITH_NULL_SHA384 TLS_PSK_WITH_NULL_SHA TLS_PSK_WITH_AES_128_GCM_SHA256 TLS_PSK_WITH_AES_256_GCM_SHA384 TLS_PSK_WITH_AES_128_CCM TLS_PSK_WITH_AES_256_CCM TLS_PSK_WITH_AES_128_CCM_8 TLS_PSK_WITH_AES_256_CCM_8 TLS_PSK_WITH_CHACHA20_POLY1305 These suites are built into wolfSSL with WOLFSSL_STATIC_PSK on, all PSK suites can be turned off at build time with the constant NO_PSK. To only use these ciphers at runtime use the function wolfSSL_CTX_set_cipher_list() with the desired ciphersuite. wolfSSL has support for ephemeral key PSK suites: ECDHE-PSK-AES128-CBC-SHA256 ECDHE-PSK-NULL-SHA256 ECDHE-PSK-CHACHA20-POLY1305 DHE-PSK-CHACHA20-POLY1305 DHE-PSK-AES256-GCM-SHA384 DHE-PSK-AES128-GCM-SHA256 DHE-PSK-AES256-CBC-SHA384 DHE-PSK-AES128-CBC-SHA256 DHE-PSK-AES128-CBC-SHA256 On the client, use the function wolfSSL_CTX_set_psk_client_callback() to setup the callback. The client example in /examples/client/client.c gives example usage for setting up the client identity and key, though the actual callback is implemented in wolfssl/test.h. On the server side two additional calls are required: wolfSSL_CTX_set_psk_server_callback() wolfSSL_CTX_use_psk_identity_hint() The server stores its identity hint to help the client with the 2nd call, in our server example that's "wolfssl server". An example server psk callback can also be found in my_psk_server_cb() in wolfssl/test.h. wolfSSL supports identities and hints up to 128 octets and pre-shared keys up to 64 octets. 4.8 Client Authentication Client authentication is a feature which enables the server to authenticate clients by requesting that the clients send a certificate to the server for authentication when they connect. Client authentication requires an X.509 client certificate from a CA (or selfsigned if generated by you or someone other than a CA). By default, wolfSSL validates all certificates that it receives - this includes both client and server. To set up client authentication, the server must load the list of trusted CA certificates to be used to verify the client certificate against: wolfSSL_CTX_load_verify_locations(ctx, caCert, 0); To turn on client verification and control its behavior, the wolfSSL_CTX_set_verify() function is used. In the following example, SSL_VERIFY_PEER turns on a certificate request from the server to the client. SSL_VERIFY_FAIL_IF_NO_PEER_CERT instructs the server to fail if the client does not present a certificate to validate on the server side. Other options to wolfSSL_CTX_set_verify() include SSL_VERIFY_NONE and SSL_VERIFY_CLIENT_ONCE. wolfSSL_CTX_set_verify(ctx,SSL_VERIFY_PEER | ((usePskPlus)? SSL_VERIFY_FAIL_EXCEPT_PSK : SSL_VERIFY_FAIL_IF_NO_PEER_CERT),0); An example of client authentication can be found in the example server (server.c) included in the wolfSSL download (/examples/server/server.c). 4.9 Server Name Indication SNI is useful when a server hosts multiple ‘virtual’ servers at a single underlying network address. It may be desirable for clients to provide the name of the server which it is contacting. To enable SNI with wolfSSL you can simply do: ./configure --enable-sni Using SNI on the client side requires an additional function call, which should be one of the following functions: wolfSSL_CTX_UseSNI() wolfSSL_UseSNI() wolfSSL_CTX_UseSNI() is most recommended when the client contacts the same server multiple times. Setting the SNI extension at the context level will enable the SNI usage in all SSL objects created from that same context from the moment of the call forward. wolfSSL_UseSNI() will enable SNI usage for one SSL object only, so it is recommended to use this function when the server name changes between sessions. On the server side one of the same function calls is required. Since the wolfSSL server doesn't host multiple 'virtual' servers, the SNI usage is useful when the termination of the connection is desired in the case of SNI mismatch. In this scenario, wolfSSL_CTX_UseSNI() will be more efficient, as the server will set it only once per context creating all subsequent SSL objects with SNI from that same context. 4.10 Handshake Modifications 4.10.1 Grouping Handshake Messages wolfSSL has the ability to group handshake messages if the user desires. This can be done at the context level with: wolfSSL_CTX_set_group_messages(ctx); or at the SSL object level with: wolfSSL_set_group_messages(ssl); 4.11 Truncated HMAC Currently defined TLS cipher suites use the HMAC to authenticate record-layer communications. In TLS, the entire output of the hash function is used as the MAC tag. However, it may be desirable in constrained environments to save bandwidth by truncating the output of the hash function to 80 bits when forming MAC tags. To enable the usage of Truncated HMAC at wolfSSL you can simply do: ./configure --enable-truncatedhmac Using Truncated HMAC on the client side requires an additional function call, which should be one of the following functions: wolfSSL_CTX_UseTruncatedHMAC(); wolfSSL_UseTruncatedHMAC(); wolfSSL_CTX_UseTruncatedHMAC() is most recommended when the client would like to enable Truncated HMAC for all sessions. Setting the Truncated HMAC extension at context level will enable it in all SSL objects created from that same context from the moment of the call forward. wolfSSL_UseTruncatedHMAC() will enable it for one SSL object only, so it's recommended to use this function when there is no need for Truncated HMAC on all sessions. On the server side no call is required. The server will automatically attend to the client's request for Truncated HMAC. All TLS extensions can also be enabled with: ./configure --enable-tlsx 4.12 User Crypto Module User Crypto Module allows for a user to plug in custom crypto that they want used during supported operations (Currently RSA operations are supported). An example of a module is located in the directory root_wolfssl/wolfcrypt/user-crypto/ using IPP libraries. Examples of the configure option when building wolfSSL to use a crypto module is as follows : ./configure --with-user-crypto or ./configure --with-user-crypto=/dir/to When creating a user crypto module that performs RSA operations, it is mandatory that there is a header file for RSA called user_rsa.h. For all user crypto operations it is mandatory that the users library be called libusercrypto. These are the names that wolfSSL autoconf tools will be looking for when linking and using a user crypto module. In the example provided with wolfSSL, the header file user_rsa.h can be found in the directory wolfcrypt/user-crypto/include/ and the library once created is located in the directory wolfcrypt/user-crypto/lib/ . For a list of required API look at the header file provided. To build the example, after having installed IPP libraries, the following commands from the root wolfSSL directory should be ran. cd wolfcrypt/user-crypto/ ./autogen.sh ./configure make sudo make install The included example in wolfSSL requires the use of IPP, which will need to be installed before the project can be built. Though even if not having IPP libraries to build the example it is intended to provide users with an example of file name choice and API interface. Once having made and installed both the library libusercrypto and header files, making wolfSSL use the crypto module does not require any extra steps. Simply using the configure flag --with-user-crypto will map all function calls from the typical wolfSSL crypto to the user crypto module. Memory allocations, if using wolfSSL’s XMALLOC, should be tagged with DYNAMIC_TYPE_USER_CRYPTO. Allowing for analyzing memory allocations used by the module. User crypto modules cannot be used in conjunction with the wolfSSL configure options fast-rsa and/or fips. Fips requires that specific, certified code be used and fast-rsa makes use of the example user crypto module to perform RSA operations. 4.13 Timing-Resistance in wolfSSL wolfSSL provides the function “ConstantCompare” which guarantees constant time when doing comparison operations that could potentially leak timing information. This API is used at both the TLS and crypto level in wolfSSL to deter against timing based, side-channel attacks. The wolfSSL ECC implementation has the define ECC_TIMING_RESISTANT to enable timing-resistance in the ECC algorithm. Similarly the define TFM_TIMING_RESISTANT is provided in the fast math libraries for RSA algorithm timing-resistance. The function exptmod uses the timing resistant Montgomery ladder. See also: --enable-harden Chapter 6: Callbacks Chapter 5: Portability 5.1 Abstraction Layers 5.1.1 C Standard Library Abstraction Layer wolfSSL (formerly CyaSSL) can be built without the C standard library to provide a higher level of portability and flexibility to developers. The user will have to map the functions they wish to use instead of the C standard ones. 5.1.1.1 Memory Use Most C programs use malloc() and free() for dynamic memory allocation. wolfSSL uses XMALLOC() and XFREE() instead. By default, these point to the C runtime versions. By defining XMALLOC_USER, the user can provide their own hooks. Each memory function takes two additional arguments over the standard ones, a heap hint, and an allocation type. The user is free to ignore these or use them in any way they like. You can find the wolfSSL memory functions in wolfssl/wolfcrypt/types.h. wolfSSL also provides the ability to register memory override functions at runtime instead of compile time. wolfssl/wolfcrypt/memory.h is the header for this functionality and the user can call the following function to set up the memory functions: int wolfSSL_SetAllocators(wolfSSL_Malloc_cb malloc_function, wolfSSL_Free_cb free_function, wolfSSL_Realloc_cb realloc_function); See the header wolfssl/wolfcrypt/memory.h for the callback prototypes and memory.c for the implementation. 5.1.1.2 string.h wolfSSL uses several functions that behave like string.h’s memcpy(), memset(), and memcmp() amongst others. They are abstracted to XMEMCPY(), XMEMSET(), and XMEMCMP() respectively. And by default, they point to the C standard library versions. Defining STRING_USER allows the user to provide their own hooks in types.h. For example, by default XMEMCPY() is: #define XMEMCPY(d,s,l) memcpy((d),(s),(l)) After defining STRING_USER you could do: #define XMEMCPY(d,s,l) Or if you prefer to avoid macros: my_memcpy((d),(s),(l)) external void* my_memcpy(void* d, const void* s, size_t n); to set wolfSSL’s abstraction layer to point to your version my_memcpy(). 5.1.1.3 math.h wolfSSL uses two functions that behave like math.h’s pow() and log(). They are only required by Diffie-Hellman, so if you exclude DH from the build, then you don’t have to provide your own. They are abstracted to XPOW() and XLOG() and found in wolfcrypt/src/dh.c. 5.1.1.4 File System Use By default, wolfSSL uses the system’s file system for the purpose of loading keys and certificates. This can be turned off by defining NO_FILESYSTEM, see item V. If instead, you’d like to use a file system but not the system one, you can use the XFILE() layer in ssl.c to point the file system calls to the ones you’d like to use. See the example provided by the MICRIUM define. 5.1.2 Custom Input/Output Abstraction Layer wolfSSL provides a custom I/O abstraction layer for those who wish to have higher control over I/O of their SSL connection or run SSL on top of a different transport medium other than TCP/IP. The user will need to define two functions: 1. The network Send function 2. The network Receive function These two functions are prototyped by CallbackIOSend and CallbackIORecv in ssl.h: typedef int (*CallbackIORecv)(WOLFSSL *ssl, char *buf, int sz, void *ctx); typedef int (*CallbackIOSend)(WOLFSSL *ssl, char *buf, int sz, void *ctx); The user needs to register these functions per WOLFSSL_CTX with wolfSSL_SetIOSend() and wolfSSL_SetIORecv(). For example, in the default case, CBIORecv() and CBIOSend() are registered at the bottom of io.c: void wolfSSL_SetIORecv(WOLFSSL_CTX *ctx, CallbackIORecv CBIORecv) { ctx->CBIORecv = CBIORecv; } void wolfSSL_SetIOSend(WOLFSSL_CTX *ctx, CallbackIOSend CBIOSend) { ctx->CBIOSend = CBIOSend; } The user can set a context per WOLFSSL object (session) with wolfSSL_SetIOWriteCtx() and wolfSSL_SetIOReadCtx(), as demonstrated at the bottom of io.c. For example, if the user is using memory buffers, the context may be a pointer to a structure describing where and how to access the memory buffers. The default case, with no user overrides, registers the socket as the context. The CBIORecv and CBIOSend function pointers can be pointed to your custom I/O functions. The default Send() and Receive() functions, EmbedSend() and EmbedReceive(), located in io.c, can be used as templates and guides. WOLFSSL_USER_IO can be defined to remove the automatic setting of the default I/O functions EmbedSend() and EmbedReceive(). 5.1.3 Operating System Abstraction Layer The wolfSSL OS abstraction layer helps facilitate easier porting of wolfSSL to a user’s operating system. The wolfssl/wolfcrypt/settings.h file contains settings which end up triggering the OS layer. OS-specific defines are located in wolfssl/wolfcrypt/types.h for wolfCrypt and wolfssl/internal.h for wolfSSL. 5.2 Supported Operating Systems One factor which defines wolfSSL is its ability to be easily ported to new platforms. As such, wolfSSL has support for a long list of operating systems out-of-the-box. Currently-supported operating systems include: Win32/64, Linux, Mac OS X, Solaris, ThreadX, VxWorks, FreeBSD, NetBSD, OpenBSD, embedded Linux, WinCE, Haiku, OpenWRT, iPhone (iOS), Android, Nintendo Wii and Gamecube through DevKitPro, QNX, MontaVista, NonStop, TRON/ITRON/µITRON, Micrium's µC/OS, FreeRTOS, SafeRTOS, Freescale MQX, Nucleus, TinyOS, HP/UX, TIRTOS, uTasker, embOS 5.3 Supported Chipmakers wolfSSL has support for chipsets including ARM, Intel, Motorola, mbed, Freescale, Microchip (PIC32), STMicro (STM32F2/F4), NXP, Analog Devices, Texas Instruments, and more. 5.4 C# Wrapper wolfSSL has limited support for use in C#. A Visual Studio project containing the port can be found in the directory “root_wolfSSL/wrapper/CSharp/”. After opening the Visual Studio project set the “Active solution configuration” and “Active solution platform” by clicking on BUILD->Configuration Manager… The supported “Active solution configuration”s are DLL Debug and DLL Release. The supported platforms are Win32 and x64. Once having set the solution and platform the preprocessor flag HAVE_CSHARP will need to be added. This turns on the options used by the C# wrapper and used by the examples included. To then build simply select build solution. This creates the wolfssl.dll, wolfSSL_CSharp.dll and examples. Examples can be ran by targeting them as an entry point and then running debug in Visual Studio. Adding the created C# wrapper to C# projects can be done a couple of ways. One way is to install the created wolfssl.dll and wolfSSL_CSharp.dll into the directory C:/Windows/System/. This will allow projects that have using wolfSSL.CSharp public some_class { public static main(){ wolfssl.Init() ... } ... to make calls to the wolfSSL C# wrapper. Another way is to create a Visual Studio project and have it reference the bundled C# wrapper solution in wolfSSL. 6.1 HandShake Callback wolfSSL (formerly CyaSSL) has an extension that allows a HandShake Callback to be set for connect or accept. This can be useful in embedded systems for debugging support when another debugger isn’t available and sniffing is impractical. To use wolfSSL HandShake Callbacks, use the extended functions, wolfSSL_connect_ex() and wolfSSL_accept_ex(): int wolfSSL_connect_ex(WOLFSSL*, HandShakeCallBack, TimeoutCallBack, Timeval) int wolfSSL_accept_ex(WOLFSSL*, HandShakeCallBack, TimeoutCallBack, Timeval) HandShakeCallBack is defined as: typedef int (*HandShakeCallBack)(HandShakeInfo*); HandShakeInfo is defined in wolfssl/callbacks.h (which should be added to a nonstandard build): typedef struct handShakeInfo_st { char cipherName[MAX_CIPHERNAME_SZ + 1]; /*negotiated name */ char packetNames[MAX_PACKETS_HANDSHAKE][MAX_PACKETNAME_SZ+1]; /* SSL packet names */ int numberPackets; /*actual # of packets */ int negotiationError; /*cipher/parameter err */ } HandShakeInfo; No dynamic memory is used since the maximum number of SSL packets in a handshake exchange is known. Packet names can be accessed through packetNames[idx] up to numberPackets. The callback will be called whether or not a handshake error occurred. Example usage is also in the client example. 6.2 Timeout Callback The same extensions used with wolfSSL Handshake Callbacks can be used for wolfSSL Timeout Callbacks as well. These extensions can be called with either, both, or neither callbacks (Handshake and/or Timeout). TimeoutCallback is defined as: typedef int (*TimeoutCallBack)(TimeoutInfo*); Where TimeoutInfo looks like: typedef struct char int int PacketInfo Timeval } TimeoutInfo; timeoutInfo_st { timeoutName[MAX_TIMEOUT_NAME_SZ +1]; /*timeout Name*/ flags; /* for future use*/ numberPackets; /*actual # of packets */ packets[MAX_PACKETS_HANDSHAKE]; /*list of packets */ timeoutValue; /*timer that caused it */ Again, no dynamic memory is used for this structure since a maximum number of SSL packets is known for a handshake. Timeval is just a typedef for struct timeval. PacketInfo is defined like this: typedef struct packetInfo_st { char packetName[MAX_PACKETNAME_SZ + 1]; /* SSL name Timeval timestamp; /* when it occured unsigned char value[MAX_VALUE_SZ]; /* if fits, it's here unsigned char* bufferValue; /* otherwise here (non 0) int valueSz; /* sz of value or buffer } PacketInfo; */ */ */ */ */ Here, dynamic memory may be used. If the SSL packet can fit in value then that's where it's placed. valueSz holds the length and bufferValue is 0. If the packet is too big for value, only Certificate packets should cause this, then the packet is placed in bufferValue. valueSz still holds the size. If memory is allocated for a Certificate packet then it is reclaimed after the callback returns. The timeout is implemented using signals, specifically SIGALRM, and is thread safe. If a previous alarm is set of type ITIMER_REAL then it is reset, along with the correct handler, afterwards. The old timer will be time adjusted for any time wolfSSL spends processing. If an existing timer is shorter than the passed timer, the existing timer value is used. It is still reset afterwards. An existing timer that expires will be reset if has an interval associated with it. The callback will only be issued if a timeout occurs. See the client example for usage. 6.3 User Atomic Record Layer Processing wolfSSL provides Atomic Record Processing callbacks for users who wish to have more control over MAC/encrypt and decrypt/verify functionality during the SSL/TLS connection. The user will need to define 2 functions: 1. MAC/encrypt callback function 2. Decrypt/verify callback function These two functions are prototyped by CallbackMacEncrypt and CallbackDecryptVerify in ssl.h: typedef int (*CallbackMacEncrypt)(WOLFSSL* ssl, unsigned char* macOut,const unsigned char* macIn, unsigned int macInSz,int macContent, int macVerify, unsigned char* encOut, const unsigned char* encIn, unsigned int encSz,void* ctx); typedef int (*CallbackDecryptVerify)(WOLFSSL* ssl, unsigned char* decOut, const unsigned char* decIn, unsigned int decSz, int content, int verify, unsigned int* padSz, void* ctx); The user needs to write and register these functions per wolfSSL context (WOLFSSL_CTX) with wolfSSL_CTX_SetMacEncryptCb() and wolfSSL_CTX_SetDecryptVerifyCb(). The user can set a context per WOLFSSL object (session) with wolfSSL_SetMacEncryptCtx() and wolfSSL_SetDecryptVerifyCtx(). This context may be a pointer to any user-specified context, which will then in turn be passed back to the MAC/encrypt and decrypt/verify callbacks through the “void* ctx” parameter. 1. Example callbacks can be found in wolfssl/test.h, under myMacEncryptCb() and myDecryptVerifyCb(). Usage can be seen in the wolfSSL example client (examples/client/client.c), when using the “-U” command line option. To use Atomic Record Layer callbacks, wolfSSL needs to be compiled using the “--enable-atomicuser” configure option, or by defining the ATOMIC_USER preprocessor flag. 6.4 Public Key Callbacks wolfSSL provides Public Key callbacks for users who wish to have more control over ECC sign/verify functionality as well as RSA sign/verify and encrypt/decrypt functionality during the SSL/TLS connection. The user can optionally define 7 functions: 1. ECC sign callback 2. ECC verify callback 3. ECC shared secret callback 4. RSA sign callback 5. RSA verify callback 6. RSA encrypt callback 7. RSA decrypt callback These two functions are prototyped by CallbackEccSign, CallbackEccVerify, CallbackEccSharedSecret, CallbackRsaSign, CallbackRsaVerify, CallbackRsaEnc, and CallbackRsaDec in ssl.h: typedef int (*CallbackEccSign)(WOLFSSL* ssl, const unsigned char* in, unsigned int inSz, unsigned char* out, unsigned int* outSz, const unsigned char* keyDer, unsigned int keySz, void* ctx); typedef int (*CallbackEccVerify)(WOLFSSL* ssl, const unsigned char* sig, unsigned int sigSz, const unsigned char* hash, unsigned int hashSz, const unsigned char* keyDer, unsigned int keySz, int* result, void* ctx); typedef int (*CallbackEccSharedSecret)(WOLFSSL* ssl, struct ecc_key* otherKey, unsigned char* pubKeyDer, unsigned int* pubKeySz, unsigned char* out, unsigned int* outlen, int side, void* ctx); typedef int (*CallbackRsaSign)(WOLFSSL* ssl, const unsigned char* in, unsigned int inSz, unsigned char* out, unsigned int* outSz, const unsigned char* keyDer, unsigned int keySz, void* ctx); typedef int (*CallbackRsaVerify)(WOLFSSL* ssl, unsigned char* sig, unsigned int sigSz, unsigned char** out, const unsigned char* keyDer, unsigned int keySz, void* ctx); typedef int (*CallbackRsaEnc)(WOLFSSL* ssl, const unsigned char* in, unsigned int inSz, Unsigned char* out, unsigned int* outSz, const unsigned char* keyDer, unsigned int keySz, void* ctx); typedef int (*CallbackRsaDec)(WOLFSSL* ssl, unsigned char* in, unsigned int inSz, unsigned char** out, const unsigned char* keyDer, unsigned int keySz, void* ctx); The user needs to write and register these functions per wolfSSL context (WOLFSSL_CTX) with wolfSSL_CTX_SetEccSignCb(), wolfSSL_CTX_SetEccVerifyCb(), wolfSSL_CTX_SetEccSharedSecretCb(), wolfSSL_CTX_SetRsaSignCb(), wolfSSL_CTX_SetRsaVerifyCb(), wolfSSL_CTX_SetRsaEncCb(), and wolfSSL_CTX_SetRsaDecCb(). The user can set a context per WOLFSSL object (session) with wolfSSL_SetEccSignCtx(), wolfSSL_SetEccVerifyCtx(), wolfSSL_SetEccSharedSecretCtx(), wolfSSL_SetRsaSignCtx(), wolfSSL_SetRsaVerifyCtx(), wolfSSL_SetRsaEncCtx(), and wolfSSL_SetRsaDecCtx(). These contexts may be pointers to any user-specified context, which will then in turn be passed back to the respective public key callback through the “void* ctx” parameter. Example callbacks can be found in wolfssl/test.h, under myEccSign(), myEccVerify(), myEccSharedSecret(), myRsaSign(), myRsaVerify(), myRsaEnc(), and myRsaDec(). Usage can be seen in the wolfSSL example client (examples/client/client.c), when using the “-P” command line option. To use Atomic Record Layer callbacks, wolfSSL needs to be compiled using the --enable-pkcallbacks configure option, or by defining the HAVE_PK_CALLBACKS preprocessor flag. Chapter 7: Keys and Certificates For an introduction to X.509 certificates, as well as how they are used in SSL and TLS, please see Appendix A. 7.1 Supported Formats and Sizes wolfSSL (formerly CyaSSL) has support for PEM, and DER formats for certificates and keys, as well as PKCS#8 private keys (with PKCS#5 or PKCS#12 encryption). PEM, or “Privacy Enhanced Mail” is the most common format that certificates are issued in by certificate authorities. PEM files are Base64 encoded ASCII files which can include multiple server certificates, intermediate certificates, and private keys, and usually have a .pem, .crt, .cer, or .key file extension. Certificates inside PEM files are wrapped in the “-----BEGIN CERTIFICATE-----” and “-----END CERTIFICATE-----” statements. DER, or “Distinguished Encoding Rules”, is a binary format of a certificate. DER file extensions can include .der and .cer, and cannot be viewed with a text editor. 7.2 Certificate Loading Certificates are normally loaded using the file system (although loading from memory buffers is supported as well - see Section 7.5). 7.2.1 Loading CA Certificates CA certificate files can be loaded using the wolfSSL_CTX_load_verify_locations() function: int wolfSSL_CTX_load_verify_locations(WOLFSSL_CTX *ctx, const char *CAfile, const char *CApath);* CA loading can also parse multiple CA certificates per file using the above function by passing in a CAfile in PEM format with as many certs as possible. This makes initialization easier, and is useful when a client needs to load several root CAs at startup. This makes wolfSSL easier to port into tools that expect to be able to use a single file for CAs. 7.2.2 Loading Client or Server Certificates Loading single client or server certificates can be done with the wolfSSL_CTX_use_certificate_file() function. If this function is used with a certificate chain, only the actual, or “bottom” certificate will be sent. int wolfSSL_CTX_use_certificate_file(WOLFSSL_CTX *ctx, const char *CAfile, int type); CAfile is the CA certificate file, and type is the format of the certificate - such as SSL_FILETYPE_PEM. The server and client can send certificate chains using the wolfSSL_CTX_use_certificate_chain_file() function. The certificate chain file must be in PEM format and must be sorted starting with the subject's certificate (the actual client or server cert), followed by any intermediate certificates and ending (optionally) at the root "top" CA. The example server (/examples/server/server.c) uses this functionality. int wolfSSL_CTX_use_certificate_chain_file(WOLFSSL_CTX *ctx, const char *file); 7.2.3 Loading Private Keys Server private keys can be loaded using the wolfSSL_CTX_use_PrivateKey_file() function. int wolfSSL_CTX_use_PrivateKey_file(WOLFSSL_CTX *ctx, const char *keyFile, int type); keyFile is the private key file, and type is the format of the private key (e.g. SSL_FILETYPE_PEM). 7.2.4 Loading Trusted Peer Certificates Loading a trusted peer certificate to use can be done with wolfSSL_CTX_trust_peer_cert(). int wolfSSL_CTX_trust_peer_cert(WOLFSSL_CTX *ctx, const char *trustCert, int type); trustCert is the certificate file to load, and type is the format of the private key (i.e. SSL_FILETYPE_PEM). 7.3 Certificate Chain Verification wolfSSL requires that only the top or “root” certificate in a chain to be loaded as a trusted certificate in order to verify a certificate chain. This means that if you have a certificate chain (A -> B -> C), where C is signed by B, and B is signed by A, wolfSSL only requires that certificate A be loaded as a trusted certificate in order to verify the entire chain (A->B->C). For example, if a server certificate chain looks like: The wolfSSL client should already have at least the root cert (A) loaded as a trusted root (with wolfSSL_CTX_load_verify_locations()). When the client receives the server cert chain, it uses the signature of A to verify B, and if B has not been previously loaded into wolfSSL as a trusted root, B gets stored in wolfSSL's internal cert chain (wolfSSL just stores what is necessary to verify a certificate: common name hash, public key and key type, etc.). If B is valid, then it is used to verify C. Following this model, as long as root cert "A" has been loaded as a trusted root into the wolfSSL server, the server certificate chain will still be able to be verified if the server sends (A->B->C), or (B->C). If the server just sends (C), and not the intermediate certificate, the chain will not be able to be verified unless the wolfSSL client has already loaded B as a trusted root. 7.4 Domain Name Check for Server Certificates wolfSSL has an extension on the client that automatically checks the domain of the server certificate. In OpenSSL mode nearly a dozen function calls are needed to perform this. wolfSSL checks that the date of the certificate is in range, verifies the signature, and additionally verifies the domain if you call: wolfSSL_check_domain_name(WOLFSSL* ssl, const char* dn) before calling wolfSSL_connect(). wolfSSL will match the X.509 issuer name of peer's server certificate against dn (the expected domain name). If the names match wolfSSL_connect() will proceed normally, however if there is a name mismatch, wolfSSL_connect() will return a fatal error and wolfSSL_get_error() will return DOMAIN_NAME_MISMATCH. Checking the domain name of the certificate is an important step that verifies the server is actually who it claims to be. This extension is intended to ease the burden of performing the check. 7.5 No File System and using Certificates Normally a file system is used to load private keys, certificates, and CAs. Since wolfSSL is sometimes used in environments without a full file system an extension to use memory buffers instead is provided. To use the extension define the constant NO_FILESYSTEM and the following functions will be made available: int wolfSSL_CTX_load_verify_buffer(WOLFSSL_CTX* ctx, const unsigned char* in,long sz, int format); int wolfSSL_CTX_use_certificate_buffer(WOLFSSL_CTX* ctx, const unsigned char* in, long sz, int format); int wolfSSL_CTX_use_PrivateKey_buffer(WOLFSSL_CTX* ctx, const unsigned char* in, long sz, int format); int wolfSSL_CTX_use_certificate_chain_buffer(WOLFSSL_CTX* ctx, const unsigned char* in,long sz); int wolfSSL_CTX_trust_peer_buffer(WOLFSSL_CTX* ctx, const unsigned char* in, Long sz, int format); Use these functions exactly like their counterparts that are named “*_file” instead of “*_buffer”. And instead of providing a filename provide a memory buffer. See API documentation for usage details. 7.5.1 Test Certificate and Key Buffers wolfSSL has come bundled with test certificate and key files in the past. Now it also comes bundled with test certificate and key buffers for use in environments with no filesystem available. These buffers are available in certs_test.h when defining one or more of USE_CERT_BUFFERS_1024, USE_CERT_BUFFERS_2048, or USE_CERT_BUFFERS_256. 7.6 Serial Number Retrieval The serial number of an X.509 certificate can be extracted from wolfSSL using the following function. The serial number can be of any length. int wolfSSL_X509_get_serial_number(WOLFSSL_X509* x509, unsigned char* buffer, int* inOutSz) buffer will be written to with at most *inOutSz bytes on input. After the call, if successful (return of 0), *inOutSz will hold the actual number of bytes written to buffer. A full example is included wolfssl/test.h. 7.7 RSA Key Generation wolfSSL supports RSA key generation of varying lengths up to 4096 bits. Key generation is off by default but can be turned on during the ./configure process with: --enable-keygen or by defining WOLFSSL_KEY_GEN in Windows or non-standard environments. Creating a key is easy, only requiring one function from rsa.h: int MakeRsaKey(RsaKey* key, int size, long e, RNG* rng); Where size is the length in bits and e is the public exponent, using 65537 is usually a good choice for e. The following from wolfcrypt/test/test.c gives an example creating an RSA key of 1024 bits: RsaKey genKey; RNG rng; int ret; InitRng(&rng); InitRsaKey(&genKey, 0); ret = MakeRsaKey(&genKey, 1024, 65537, &rng); if (ret != 0) /* ret contains error */; The RsaKey genKey can now be used like any other RsaKey. If you need to export the key, wolfSSL provides both DER and PEM formatting in asn.h. Always convert the key to DER format first, and then if you need PEM use the generic DerToPem() function like this: byte der[4096]; int derSz = RsaKeyToDer(&genKey, der, sizeof(der)); if (derSz < 0) /* derSz contains error */; The buffer der now holds a DER format of the key. To convert the DER buffer to PEM use the conversion function: byte pem[4096]; int pemSz = DerToPem(der, derSz, pem, sizeof(pem), PRIVATEKEY_TYPE); if (pemSz < 0) /* pemSz contains error */; The last argument of DerToPem() takes a type parameter, usually either PRIVATEKEY_TYPE or CERT_TYPE. Now the buffer pem holds the PEM format of the key. 7.7.1 RSA Key Generation Notes Although an RSA private key contains the public key as well, wolfSSL doesn’t currently have the capability to generate a standalone RSA public key. The private key can be used as both a private and public key by wolfSSL as used in test.c. The reasoning behind the lack of individual RSA public key generation in wolfSSL is that the private key and the public key (in the form of a certificate) is all that is typically needed for SSL. A separate public key can be loaded into wolfSSL manually using the RsaPublicKeyDecode() function if need be. 7.8 Certificate Generation wolfSSL supports X.509 v3 certificate generation. Certificate generation is off by default but can be turned on during the ./configure process with: --enable-certgen or by defining WOLFSSL_CERT_GEN in Windows or non-standard environments. Before a certificate can be generated the user needs to provide information about the subject of the certificate. This information is contained in a structure from wolfssl/wolfcrypt/asn_public.h named Cert: /* for user to fill for certificate generation */ typedef struct Cert { int version; /* x509 version */ byte serial[CTC_SERIAL_SIZE]; /* serial number */ int sigType; /*signature algo type */ CertName int int CertName int ... } Cert; issuer; daysValid; selfSigned; subject; isCA; /* issuer info */ /* validity days */ /* self signed flag */ /* subject info */ /*is this going to be a CA*/ Where CertName looks like: typedef struct CertName { char country[CTC_NAME_SIZE]; char countryEnc; char state[CTC_NAME_SIZE]; char stateEnc; char locality[CTC_NAME_SIZE]; char localityEnc; char sur[CTC_NAME_SIZE]; char surEnc; char org[CTC_NAME_SIZE]; char orgEnc; char unit[CTC_NAME_SIZE]; char unitEnc; char commonName[CTC_NAME_SIZE]; char commonNameEnc; char email[CTC_NAME_SIZE]; /* !!!! email has to be last!!!! */ } CertName; Before filling in the subject information an initialization function needs to be called like this: Cert myCert; InitCert(&myCert); InitCert() sets defaults for some of the variables including setting the version to 3 (0x02), the serial number to 0 (randomly generated), the sigType to CTC_SHAwRSA, the daysValid to 500, and selfSigned to 1 (TRUE). Supported signature types include: CTC_SHAwDSA CTC_MD2wRSA CTC_MD5wRSA CTC_SHAwRSA CTC_SHAwECDSA CTC_SHA256wRSA CTC_SHA256wECDSA CTC_SHA384wRSA CTC_SHA384wECDSA CTC_SHA512wRSA CTC_SHA512wECDSA Now the user can initialize the subject information like this example from wolfcrypt/test/test.c: strncpy(myCert.subject.country, "US", CTC_NAME_SIZE); strncpy(myCert.subject.state, "OR", CTC_NAME_SIZE); strncpy(myCert.subject.locality, "Portland", CTC_NAME_SIZE); strncpy(myCert.subject.org, "yaSSL", CTC_NAME_SIZE); strncpy(myCert.subject.unit, "Development", CTC_NAME_SIZE); strncpy(myCert.subject.commonName, "www.wolfssl.com", CTC_NAME_SIZE); strncpy(myCert.subject.email, "info@wolfssl.com", CTC_NAME_SIZE); Then, a self-signed certificate can be generated using the variables genKey and rng from the above key generation example (of course any valid RsaKey or RNG can be used): byte derCert[4096]; int certSz = MakeSelfCert(&myCert, derCert, sizeof(derCert), &key, &rng); if (certSz < 0) /* certSz contains the error */; The buffer derCert now contains a DER format of the certificate. If you need a PEM format of the certificate you can use the generic DerToPem() function and specify the type to be CERT_TYPE like this: byte* pem; int pemSz = DerToPem(derCert, certSz, pem, sizeof(pemCert), CERT_TYPE); if (pemCertSz < 0) /* pemCertSz contains error */; Now the buffer pemCert holds the PEM format of the certificate. If you wish to create a CA signed certificate then a couple of steps are required. After filling in the subject information as before, you’ll need to set the issuer information from the CA certificate. This can be done with SetIssuer() like this: ret = SetIssuer(&myCert, “ca-cert.pem”); if (ret < 0) /* ret contains error */; Then you’ll need to perform the two-step process of creating the certificate and then signing it (MakeSelfCert() does these both in one step). You’ll need the private keys from both the issuer (caKey) and the subject (key). Please see the example in test.c for complete usage. byte derCert[4096]; int certSz = MakeCert(&myCert, derCert, sizeof(derCert), &key, NULL, &rng); if (certSz < 0); /*certSz contains the error*/; certSz = SignCert(myCert.bodySz, myCert.sigType, derCert, sizeof(derCert), &caKey, NULL, &rng); if (certSz < 0); /*certSz contains the error*/; The buffer derCert now contains a DER format of the CA signed certificate. If you need a PEM format of the certificate please see the self signed example above. Note that MakeCert() and SignCert() provide function parameters for either an RSA or ECC key to be used. The above example uses an RSA key and passes NULL for the ECC key parameter. 7.9 Convert to raw ECC key With our recently added support for raw ECC key import comes the ability to convert an ECC key from PEM to DER. Use the following with the specified arguments to accomplish this: EccKeyToDer(ecc_key*, byte* output, word32 inLen); Example: #define FOURK_BUF 4096 byte der[FOURK_BUF]; ecc_key userB; EccKeyToDer(&userB, der, FOURK_BUF); Chapter 8: Debugging 8.1 Debugging and Logging wolfSSL (formerly CyaSSL) has support for debugging through log messages in environments where debugging is limited. To turn logging on use the function wolfSSL_Debugging_ON() and to turn it off use wolfSSL_Debugging_OFF(). In a normal build (release mode) these functions will have no effect. In a debug build, define DEBUG_WOLFSSL to ensure these functions are turned on. As of wolfSSL 2.0, logging callback functions may be registered at runtime to provide more flexibility with how logging is done. The logging callback can be registered with the following function: int wolfSSL_SetLoggingCb(wolfSSL_Logging_cb log_function); typedef void (*wolfSSL_Logging_cb)(const int logLevel, const char *const logMessage); The log levels can be found in wolfssl/wolfcrypt/logging.h, and the implementation is located in logging.c. By default, wolfSSL logs to stderr with fprintf. 8.2 Error Codes wolfSSL tries to provide informative error messages in order to help with debugging. Each wolfSSL_read() and wolfSSL_write() call will return the number of bytes written upon success, 0 upon connection closure, and -1 for an error, just like read() and write(). In the event of an error you can use two calls to get more information about the error. The function wolfSSL_get_error() will return the current error code. It takes the current WOLFSSL object, and wolfSSL_read() or wolfSSL_write() result value as an arguments and returns the corresponding error code. int err = wolfSSL_get_error(ssl, result); To get a more human-readable error code description, the wolfSSL_ERR_error_string() function can be used. It takes the return code from wolfSSL_get_error and a storage buffer as arguments, and places the corresponding error description into the storage buffer (errorString in the example below). char errorString[80]; wolfSSL_ERR_error_string(err, errorString); If you are using non blocking sockets, you can test for errno EAGAIN/EWOULDBLOCK or more correctly you can test the specific error code for SSL_ERROR_WANT_READ or SSL_ERROR_WANT_WRITE. For a list of wolfSSL and wolfCrypt error codes, please see Appendix C (Error Codes). Chapter 9: Library Design 9.1 Library Headers With the release of wolfSSL 2.0.0 RC3, library header files are now located in the following locations: wolfSSL: wolfCrypt: wolfSSL OpenSSL Compatibility Layer: wolfssl/ wolfssl/wolfcrypt/ wolfssl/openssl/ When using the OpenSSL Compatibility layer (see Chapter 13), the /wolfssl/openssl/ssl.h header is required to be included: #include When using only the wolfSSL native API, only the /wolfssl/ssl.h header is required to be included: #include 9.2 Startup and Exit All applications should call wolfSSL_Init() before using the library and call wolfSSL_Cleanup() at program termination. Currently these functions only initialize and free the shared mutex for the session cache in multi-user mode but in the future they may do more so it's always a good idea to use them. 9.3 Structure Usage In addition to header file location changes, the release of wolfSSL 2.0.0 RC3 created a more visible distinction between the native wolfSSL API and the wolfSSL OpenSSL Compatibility Layer. With this distinction, the main SSL/TLS structures used by the native wolfSSL API have changed names. The new structures are as follows. The previous names are still used when using the OpenSSL Compatibility Layer (see Chapter 13). WOLFSSL WOLFSSL_CTX WOLFSSL_METHOD WOLFSSL_SESSION WOLFSSL_X509 WOLFSSL_X509_NAME WOLFSSL_X509_CHAIN 9.4 Thread Safety (previously (previously (previously (previously (previously (previously (previously SSL) SSL_CTX) SSL_METHOD) SSL_SESSION) X509) X509_NAME) X509_CHAIN) wolfSSL (formerly CyaSSL) is thread safe by design. Multiple threads can enter the library simultaneously without creating conflicts because wolfSSL avoids global data, static data, and the sharing of objects. The user must still take care to avoid potential problems in two areas. 1. A client may share an WOLFSSL object across multiple threads but access must be synchronized, i.e., trying to read/write at the same time from two different threads with the same SSL pointer is not supported. wolfSSL could take a more aggressive (constrictive) stance and lock out other users when a function is entered that cannot be shared but this level of granularity seems counter-intuitive. All users (even single threaded ones) will pay for the locking and multi-thread ones won't be able to re-enter the library even if they aren't sharing objects across threads. This penalty seems much too high and wolfSSL leaves the responsibility of synchronizing shared objects in the hands of the user. 2. Besides sharing WOLFSSL pointers, users must also take care to completely initialize an WOLFSSL_CTX before passing the structure to wolfSSL_new(). The same WOLFSSL_CTX can create multiple WOLFSSL structs but the WOLFSSL_CTX is only read during wolfSSL_new() creation and any future (or simultaneous changes) to the WOLFSSL_CTX will not be reflected once the WOLFSSL object is created. Again, multiple threads should synchronize writing access to a WOLFSSL_CTX and it is advised that a single thread initialize the WOLFSSL_CTX to avoid the synchronization and update problem described above. 9.5 Input and Output Buffers wolfSSL now uses dynamic buffers for input and output. They default to 0 bytes and are controlled by the RECORD_SIZE define in wolfssl/internal.h. If an input record is received that is greater in size than the static buffer, then a dynamic buffer is temporarily used to handle the request and then freed. You can set the static buffer size up to the MAX_RECORD_SIZE which is 2^16 or 16,384. If you prefer the previous way that wolfSSL operated, with 16Kb static buffers that will never need dynamic memory, you can still get that option by defining LARGE_STATIC_BUFFERS. If dynamic buffers are used and the user requests a wolfSSL_write() that is bigger than the buffer size, then a dynamic block up to MAX_RECORD_SIZE is used to send the data. Users wishing to only send the data in chunks of at most RECORD_SIZE size can do this by defining STATIC_CHUNKS_ONLY. This will cause wolfSSL to use I/O buffers which grow up to RECORD_SIZE, which is 128 bytes by default. Chapter 10: wolfCrypt (formerly CTaoCrypt) Usage Reference wolfCrypt is the cryptography library primarily used by wolfSSL. It is optimized for speed, small footprint, and portability. wolfSSL interchanges with other cryptography libraries as required. Types used in the examples: typedef unsigned char byte; typedef unsigned int word32; 10.1 Hash Functions 10.1.1 MD4 NOTE: MD4 is outdated and considered insecure. Please consider using a different hashing function if possible. To use MD4 include the MD4 header "wolfssl/wolfcrypt/md4.h". The structure to use is Md4, which is a typedef. Before using, the hash initialization must be done with the wc_InitMd4() call. Use wc_Md4Update() to update the hash and wc_Md4Final() to retrieve the final hash. byte md4sum[MD4_DIGEST_SIZE]; byte buffer[1024]; /* fill buffer with data to hash*/ Md4 md4; wc_InitMd4(&md4); wc_Md4Update(&md4, buffer, sizeof(buffer)); /*can be called again and again*/ wc_Md4Final(&md4, md4sum); md4sum now contains the digest of the hashed data in buffer. 10.1.2 MD5 NOTE: MD5 is outdated and considered insecure. Please consider using a different hashing function if possible. To use MD5 include the MD5 header "wolfssl/wolfcrypt/md5.h". The structure to use is Md5, which is a typedef. Before using, the hash initialization must be done with the wc_InitMd5() call. Use wc_Md5Update() to update the hash and wc_Md5Final() to retrieve the final hash byte md5sum[MD5_DIGEST_SIZE]; byte buffer[1024]; /*fill buffer with data to hash*/ Md5 md5; wc_InitMd5(&md5); wc_Md5Update(&md5, buffer, sizeof(buffer)); /*can be called again and again*/ wc_Md5Final(&md5, md5sum); md5sum now contains the digest of the hashed data in buffer. 10.1.3 SHA / SHA-224 / SHA-256 / SHA-384 / SHA-512 To use SHA include the SHA header "wolfssl/wolfcrypt/sha.h". The structure to use is Sha, which is a typedef. Before using, the hash initialization must be done with the wc_InitSha() call. Use wc_ShaUpdate() to update the hash and wc_ShaFinal() to retrieve the final hash: byte shaSum[SHA_DIGEST_SIZE]; byte buffer[1024]; /*fill buffer with data to hash*/ Sha sha; wc_InitSha(&sha); wc_ShaUpdate(&sha, buffer, sizeof(buffer)); /*can be called again and again*/ wc_ShaFinal(&sha, shaSum); shaSum now contains the digest of the hashed data in buffer. To use either SHA-224, SHA-256, SHA-384, or SHA-512, follow the same steps as shown above, but use either the “wolfssl/wolfcrypt/sha256.h” or “wolfssl/wolfcrypt/sha512.h” (for both SHA-384 and SHA-512). The SHA-256, SHA384, and SHA-512 functions are named similarly to the SHA functions. For SHA-224, the functions InitSha224(), Sha224Update(), and Sha224Final() will be used with the structure Sha224. For SHA-256, the functions InitSha256(), Sha256Update(), and Sha256Final() will be used with the structure Sha256. For SHA-384, the functions InitSha384(), Sha384Update(), and Sha384Final() will be used with the structure Sha384. For SHA-512, the functions InitSha512(), Sha512Update(), and Sha512Final() will be used with the structure Sha512. 10.1.4 BLAKE2b To use BLAKE2b (a SHA-3 finalist) include the BLAKE2b header "wolfssl/wolfcrypt/blake2.h". The structure to use is Blake2b, which is a typedef. Before using, the hash initialization must be done with the wc_InitBlake2b() call. Use wc_Blake2bUpdate() to update the hash and wc_Blake2bFinal() to retrieve the final hash: byte digest[64]; byte input[64]; /*fill input with data to hash*/ Blake2b b2b; wc_InitBlake2b(&b2b, 64); wc_Blake2bUpdate(&b2b, input, sizeof(input)); wc_Blake2bFinal(&b2b, digest, 64); The second parameter to wc_InitBlake2b() should be the final digest size. digest now contains the digest of the hashed data in buffer. Example usage can be found in the wolfCrypt test application (wolfcrypt/test/test.c), inside the blake2b_test() function. 10.1.5 RIPEMD-160 To use RIPEMD-160, include the header "wolfssl/wolfcrypt/ripemd.h". The structure to use is RipeMd, which is a typedef. Before using, the hash initialization must be done with the wc_InitRipeMd() call. Use wc_RipeMdUpdate() to update the hash and wc_RipeMdFinal() to retrieve the final hash byte ripeMdSum[RIPEMD_DIGEST_SIZE]; byte buffer[1024]; /*fill buffer with data to hash*/ RipeMd ripemd; wc_InitRipeMd(&ripemd); wc_RipeMdUpdate(&ripemd, buffer, sizeof(buffer)); /*can be called again and again*/ wc_RipeMdFinal(&ripemd, ripeMdSum); ripeMdSum now contains the digest of the hashed data in buffer. 10.2 Keyed Hash Functions 10.2.1 HMAC wolfCrypt currently provides HMAC for message digest needs. The structure Hmac is found in the header "wolfssl/wolfcrypt/hmac.h". HMAC initialization is done with wc_HmacSetKey(). 5 different types are supported with HMAC: MD5, SHA, SHA-256, SHA-384, and SHA-512. Here's an example with SHA-256. Hmac Byte byte byte hmac; key[24]; /*fill key with keying material*/ buffer[2048]; /*fill buffer with data to digest*/ hmacDigest[SHA256_DIGEST_SIZE]; wc_HmacSetKey(&hmac, SHA256, key, sizeof(key)); wc_HmacUpdate(&hmac, buffer, sizeof(buffer)); wc_HmacFinal(&hmac, hmacDigest); hmacDigest now contains the digest of the hashed data in buffer. 10.2.2 GMAC wolfCrypt also provides GMAC for message digest needs. The structure Gmac is found in the header "wolfssl/wolfcrypt/aes.h", as it is an application AES-GCM. GMAC initialization is done with wc_GmacSetKey(). Gmac byte byte byte byte gmac; key[16]; /*fill key with keying material*/ iv[12]; /*fill iv with an initialization vector*/ buffer[2048]; /*fill buffer with data to digest*/ gmacDigest[16]; wc_GmacSetKey(&gmac, key, sizeof(key)); wc_GmacUpdate(&gmac, iv, sizeof(iv), buffer, sizeof(buffer), gmacDigest, sizeof(gmacDigest)); gmacDigest now contains the digest of the hashed data in buffer. 10.2.3 Poly1305 wolfCrypt also provides Poly1305 for message digest needs. The structure Poly1305 is found in the header "wolfssl/wolfcrypt/poly1305.h". Poly1305 initialization is done with wc_Poly1305SetKey(). The process of setting a key in Poly1305 should be done again, with a new key, when next using Poly1305 after wc_Poly1305Final() has been called. Poly1305 pmac; byte byte byte key[32]; /*fill key with keying material*/ buffer[2048]; /*fill buffer with data to digest*/ pmacDigest[16]; wc_Poly1305SetKey(&pmac, key, sizeof(key)); wc_Poly1305Update(&pmac, buffer, sizeof(buffer)); wc_Poly1305Final(&pmac, pmacDigest); pmacDigest now contains the digest of the hashed data in buffer. 10.3 Block Ciphers 10.3.1 AES wolfCrypt provides support for AES with key sizes of 16 bytes (128 bits), 24 bytes (192 bits), or 32 bytes (256 bits). Supported AES modes include CBC, CTR, GCM, and CCM-8. CBC mode is supported for both encryption and decryption and is provided through the wc_AesSetKey(), wc_AesCbcEncrypt() and wc_AesCbcDecrypt() functions. Please include the header "wolfssl/wolfcrypt/aes.h" to use AES. AES has a block size of 16 bytes and the IV should also be 16 bytes. Function usage is usually as follows: Aes enc; Aes dec; const byte key[] = { /*some 24 byte key*/ }; const byte iv[] = { /*some 16 byte iv*/ }; byte plain[32]; byte cipher[32]; /*an increment of 16, fill with data*/ /*encrypt*/ wc_AesSetKey(&enc, key, sizeof(key), iv, AES_ENCRYPTION); wc_AesCbcEncrypt(&enc, cipher, plain, sizeof(plain)); cipher now contains the ciphertext from the plain text. /*decrypt*/ wc_AesSetKey(&dec, key, sizeof(key), iv, AES_DECRYPTION); wc_AesCbcDecrypt(&dec, plain, cipher, sizeof(cipher)); plain now contains the original plaintext from the ciphertext. wolfCrypt also supports CTR (Counter), GCM (Galois/Counter), and CCM-8 (Counter with CBC-MAC) modes of operation for AES. When using these modes, like CBC, include the “wolfssl/wolfcrypt/aes.h” header. CTR mode is available for encryption through the wc_AesCtrEncrypt() function. GCM mode is available for both encryption and decryption through the wc_AesGcmSetKey(), wc_AesGcmEncrypt(), and wc_AesGcmDecrypt() functions. For a usage example, see the aesgcm_test() function in /wolfcrypt/test/test.c. CCM-8 mode is supported for both encryption and decryption through the wc_AesCcmSetKey(), wc_AesCcmEncrypt(), and wc_AesCcmDecrypt() functions. For a usage example, see the aesccm_test() function in /wolfcrypt/test/test.c. 10.3.2 DES and 3DES wolfCrypt provides support for DES and 3DES (Des3 since 3 is an invalid leading C identifier). To use these include the header "wolfssl/wolfcrypt/des.h". The structures you can use are Des and Des3. Initialization is done through wc_Des_SetKey() or wc_Des3_SetKey(). CBC encryption/decryption is provided through wc_Des_CbcEnrypt() / wc_Des_CbcDecrypt() and wc_Des3_CbcEncrypt() / wc_Des3_CbcDecrypt(). Des has a key size of 8 bytes (24 for 3DES) and the block size is 8 bytes, so only pass increments of 8 bytes to encrypt/decrypt functions. If your data isn't in a block size increment you'll need to add padding to make sure it is. Each SetKey() also takes an IV (an initialization vector that is the same size as the key size). Usage is usually like the following: Des3 enc; Des3 dec; const byte key[] = { const byte iv[] = { byte plain[24]; /*some 24 byte key*/ }; /*some 24 byte iv*/ }; /*an increment of 8, fill with data*/ byte cipher[24]; /*encrypt*/ wc_Des3_SetKey(&enc, key, iv, DES_ENCRYPTION); wc_Des3_CbcEncrypt(&enc, cipher, plain, sizeof(plain)); cipher now contains the ciphertext from the plain text. /*decrypt*/ wc_Des3_SetKey(&dec, key, iv, DES_DECRYPTION); wc_Des3_CbcDecrypt(&dec, plain, cipher, sizeof(cipher)); plain now contains the original plaintext from the ciphertext. 10.3.3 Camellia wolfCrypt provides support for the Camellia block cipher. To use Camellia include the header "wolfssl/wolfcrypt/camellia.h". The structure you can use is called Camellia. Initialization is done through wc_CamelliaSetKey(). CBC encryption/decryption is provided through wc_CamelliaCbcEnrypt() and wc_CamelliaCbcDecrypt() while direct encryption/decryption is provided through wc_CamelliaEncryptDirect() and wc_CamelliaDecryptDirect(). For usage examples please see the camellia_test() function in /wolfcrypt/test/test.c. 10.4 Stream Ciphers 10.4.1 ARC4 The most common stream cipher used on the Internet is ARC4. wolfCrypt supports it through the header "wolfssl/wolfcrypt/arc4.h". Usage is simpler than block ciphers because there is no block size and the key length can be any length. The following is a typical usage of ARC4. Arc4 enc; Arc4 dec; const byte key[] = { byte plain[27]; byte cipher[27]; /*some key any length*/}; /*no size restriction, fill with data*/ /*encrypt*/ wc_Arc4SetKey(&enc, key, sizeof(key)); wc_Arc4Process(&enc, cipher, plain, sizeof(plain)); cipher now contains the ciphertext from the plain text. /*decrypt*/ wc_Arc4SetKey(&dec, key, sizeof(key)); wc_Arc4Process(&dec, plain, cipher, sizeof(cipher)); plain now contains the original plaintext from the ciphertext. 10.4.2 RABBIT A newer stream cipher gaining popularity is RABBIT. This stream cipher can be used through wolfCrypt by including the header "wolfssl/wolfcrypt/rabbit.h". RABBIT is very fast compared to ARC4, but has key constraints of 16 bytes (128 bits) and an optional IV of 8 bytes (64 bits). Otherwise usage is exactly like ARC4: Rabbit enc; Rabbit dec; const byte key[] = { const byte iv[] = { byte plain[27]; byte cipher[27]; /*some key 16 bytes*/}; /*some iv 8 bytes*/ }; /*no size restriction, fill with data*/ /*encrypt*/ wc_RabbitSetKey(&enc, key, iv); /*iv can be a NULL pointer*/ wc_RabbitProcess(&enc, cipher, plain, sizeof(plain)); cipher now contains the ciphertext from the plain text. /*decrypt*/ wc_RabbitSetKey(&dec, key, iv); wc_RabbitProcess(&dec, plain, cipher, sizeof(cipher)); plain now contains the original plaintext from the ciphertext. 10.4.3 HC-128 Another stream cipher in current use is HC-128, which is even faster than RABBIT (about 5 times faster than ARC4). To use it with wolfCrypt, please include the header "wolfssl/wolfcrypt/hc128.h". HC-128 also uses 16-byte keys (128 bits) but uses 16-byte IVs (128 bits) unlike RABBIT. HC128 enc; HC128 dec; const byte key[] = { const byte iv[] = { byte plain[37]; byte cipher[37]; /*some key 16 bytes*/}; /*some iv 16 bytes*/ }; /*no size restriction, fill with data*/ /*encrypt*/ wc_Hc128_SetKey(&enc, key, iv); /*iv can be a NULL pointer*/ wc_Hc128_Process(&enc, cipher, plain, sizeof(plain)); cipher now contains the ciphertext from the plain text. /*decrypt*/ wc_Hc128_SetKey(&dec, key, iv); wc_Hc128_Process(&dec, plain, cipher, sizeof(cipher)); plain now contains the original plaintext from the ciphertext. 10.4.4 ChaCha ChaCha with 20 rounds is slightly faster than ARC4 while maintaining a high level of security. To use it with wolfCrypt, please include the header "wolfssl/wolfcrypt/chacha.h". ChaCha typically uses 32 byte keys (256 bit) but can also use 16 byte keys (128 bits). CHACHA enc; CHACHA dec; const byte key[] = { const byte iv[] = { byte plain[37]; byte cipher[37]; /*some key 32 bytes*/}; /*some iv 12 bytes*/ }; /*no size restriction, fill with data*/ /*encrypt*/ wc_Chacha_SetKey(&enc, key, keySz); wc_Chacha_SetIV(&enc, iv, counter); /*counter is the start block counter is usually set as 0*/ wc_Chacha_Process(&enc, cipher, plain, sizeof(plain)); cipher now contains the ciphertext from the plain text. /*decrypt*/ wc_Chacha_SetKey(&enc, key, keySz); wc_Chacha_SetIV(&enc, iv, counter); wc_Chacha_Process(&enc, plain, cipher, sizeof(cipher)); plain now contains the original plaintext from the ciphertext. Chacha_SetKey only needs to be set once but for each packet of information sent Chacha_SetIV must be called with a new iv (nonce). Counter is set as an argument to allow for partially decrypting/encrypting information by starting at a different block when performing the encrypt/decrypt process, but in most cases is set to 0. ChaCha should not be used without a mac algorithm (e.g. Poly1305 , hmac). 10.5 Public Key Cryptography 10.5.1 RSA wolfCrypt provides support for RSA through the header "wolfssl/wolfcrypt/rsa.h". There are two types of RSA keys, public and private. A public key allows anyone to encrypt something that only the holder of the private key can decrypt. It also allows the private key holder to sign something and anyone with a public key can verify that only the private key holder actually signed it. Usage is usually like the following: RsaKey rsaPublicKey; byte publicKeyBuffer[] = { /*holds the raw data from the key, maybe word32 idx = 0; from a file like RsaPublicKey.der*/ }; /*where to start reading into the buffer*/ RsaPublicKeyDecode(publicKeyBuffer, &idx, &rsaPublicKey, sizeof(publicKeyBuffer)); byte in[] = { /*plain text to encrypt*/ }; byte out[128]; RNG rng; wc_InitRng(&rng); word32 outLen = RsaPublicEncrypt(in, sizeof(in), out, sizeof(out), &rsaPublicKey, &rng); Now ‘out’ holds the ciphertext from the plain text ‘in’. wc_RsaPublicEncrypt() will return the length in bytes written to out or a negative number in case of an error. wc_RsaPublicEncrypt() needs a RNG (Random Number Generator) for the padding used by the encryptor and it must be initialized before it can be used. To make sure that the output buffer is large enough to pass you can first call wc_RsaEncryptSize() which will return the number of bytes that a successful call to wc_RsaPublicEnrypt() will write. In the event of an error, a negative return from wc_RsaPublicEnrypt(), or Rwc_RsaPublicKeyDecode() for that matter, you can call wc_ErrorString() to get a string describing the error that occurred. void wc_ErrorString(int error, char* buffer); Make sure that buffer is at least MAX_ERROR_SZ bytes (80). Now to decrypt out: RsaKey rsaPrivateKey; byte privateKeyBuffer[] = { /*hold the raw data from the key, maybe from a file like RsaPrivateKey.der*/ }; word32 idx = 0; /*where to start reading into the buffer*/ wc_RsaPrivateKeyDecode(privateKeyBuffer, &idx, &rsaPrivateKey, sizeof(privateKeyBuffer)); byte plain[128]; word32 plainSz = wc_RsaPrivateDecrypt(out, outLen, plain, sizeof(plain), &rsaPrivateKey); Now plain will hold plainSz bytes or an error code. For complete examples of each type in wolfCrypt please see the file wolfcrypt/test/test.c. Note that the wc_RsaPrivateKeyDecode function only accepts keys in raw DER format. 10.5.2 DH (Diffie-Hellman) wolfCrypt provides support for Diffie-Hellman through the header "wolfssl/wolfrypt/dh.h". The Diffie-Hellman key exchange algorithm allows two parties to establish a shared secret key. Usage is usually similar to the following example, where sideA and sideB designate the two parties. In the following example, dhPublicKey contains the Diffie-Hellman public parameters signed by a Certificate Authority (or self-signed). privA holds the generated private key for sideA, pubA holds the generated public key for sideA, and agreeA holds the mutual key that both sides have agreed on. DhKey dhPublicKey; word32 idx = 0; /*where to start reading into the publicKeyBuffer*/ word32 pubASz, pubBSz, agreeASz; byte tmp[1024]; RNG rng; byte privA[128]; byte pubA[128]; byte agreeA[128]; wc_InitDhKey(&dhPublicKey); byte publicKeyBuffer[] = { /*holds the raw data from the public key parameters, maybe from a file like dh1024.der*/ } wc_DhKeyDecode(tmp, &idx, &dhPublicKey, publicKeyBuffer); wc_InitRng(&rng); /*Initialize random number generator*/ wc_DhGenerateKeyPair() will generate a public and private DH key based on the initial public parameters in dhPublicKey. wc_DhGenerateKeyPair(&dhPublicKey, &rng, privA, &privASz, pubA, &pubASz); After sideB sends their public key (pubB) to sideA, sideA can then generate the mutually-agreed key(agreeA) using the wc_DhAgree() function. wc_DhAgree(&dhPublicKey, agreeA, &agreeASz, privA, privASz, pubB, pubBSz); Now, agreeA holds sideA’s mutually-generated key (of size agreeASz bytes). The same process will have been done on sideB. For a complete example of Diffie-Hellman in wolfCrypt, see the file wolfcrypt/test/test.c. 10.5.3 EDH (Ephemeral Diffie-Hellman) A wolfSSL server can do Ephemeral Diffie-Hellman. No build changes are needed to add this feature, though an application will have to register the ephemeral group parameters on the server side to enable the EDH cipher suites. A new API can be used to do this: int wolfSSL_SetTmpDH(WOLFSSL* ssl, unsigned char* p, int pSz,unsigned char* g,int gSz); The example server and echoserver use this function from SetDH(). 10.5.4 DSA (Digital Signature Algorithm) wolfCrypt provides support for DSA and DSS through the header "wolfssl/wolfcrypt/dsa.h". DSA allows for the creation of a digital signature based on a given data hash. DSA uses the SHA hash algorithm to generate a hash of a block of data, then signs that hash using the signer’s private key. Standard usage is similar to the following. We first declare our DSA key structure (key), initialize our initial message (message) to be signed, and initialize our DSA key buffer (dsaKeyBuffer). DsaKey key; Byte message[] = { /*message data to sign*/ } byte dsaKeyBuffer[] = { /*holds the raw data from the DSA key, maybe from a file like dsa512.der*/ } We then declare our SHA structure (sha), random number generator (rng), array to store our SHA hash (hash), array to store our signature (signature), idx (to mark where to start reading in our dsaKeyBuffer), and an int (answer) to hold our return value after verification. Sha RNG byte byte word32 int sha; rng; hash[SHA_DIGEST_SIZE]; signature[40]; idx = 0; answer; Set up and create the SHA hash. For more information on wolfCrypt’s SHA algorithm, see section 10.1.3. The SHA hash of “message” is stored in the variable “hash”. wc_InitSha(&sha); wc_ShaUpdate(&sha, message, sizeof(message)); wc_ShaFinal(&sha, hash); Initialize the DSA key structure, populate the structure key value, and initialize the random number generator (rng). wc_InitDsaKey(&key); wc_DsaPrivateKeyDecode(dsaKeyBuffer, &idx, &key, sizeof(dsaKeyBuffer)); wc_InitRng(&rng); The wc_DsaSign() function creates a signature (signature) using the DSA private key, hash value, and random number generator. wc_DsaSign(hash, signature, &key, &rng); To verify the signature, use wc_DsaVerify(). If verification is successful, answer will be equal to “1”. Once finished, free the DSA key structure using wc_FreeDsaKey(). wc_DsaVerify(hash, signature, &key, &answer); wc_FreeDsaKey(&key); Chapter 11: SSL Tutorial 11.1 Introduction The wolfSSL (formerly CyaSSL) embedded SSL library can easily be integrated into your existing application or device to provide enhanced communication security through the addition of SSL and TLS. wolfSSL has been targeted at embedded and RTOS environments, and as such, offers a minimal footprint while maintaining excellent performance. Minimum build sizes for wolfSSL range between 20-100kB depending on the selected build options and platform being used. The goal of this tutorial is to walk through the integration of SSL and TLS into a simple application. Hopefully the process of going through this tutorial will also lead to a better understanding of SSL in general. This tutorial uses wolfSSL in conjunction with simple echoserver and echoclient examples to keep things as simple as possible while still demonstrating the general procedure of adding SSL support to an application. The echoserver and echoclient examples have been taken from the popular book titled “Unix Network Programming, Volume 1, 3rd Edition” by Richard Stevens, Bill Fenner, and Andrew Rudoff. This tutorial assumes that the reader is comfortable with editing and compiling C code using the GNU GCC compiler as well as familiar with the concepts of public key encryption. Please note that access to the Unix Network Programming book is not required for this tutorial. Examples Used in this Tutorial echoclient - Figure 5.4, Page 124 echoserver - Figure 5.12, Page 139 Unix Network Programming Volume 1, 3rd Edition www.unpbook.com 11.2 Quick Summary of SSL/TLS TLS (Transport Layer Security) and SSL (Secure Sockets Layer) are cryptographic protocols that allow for secure communication across a number of different transport protocols. The primary transport protocol used is TCP/IP. The most recent version of SSL/TLS is TLS 1.2. wolfSSL supports SSL 3.0, TLS 1.0, 1.1, and 1.2 in addition to DTLS 1.0 and 1.2. SSL and TLS sit between the Transport and Application layers of the OSI model, where any number of protocols (including TCP/IP, Bluetooth, etc.) may act as the underlying transport medium. Application protocols are layered on top of SSL and can include protocols such as HTTP, FTP, and SMTP. A diagram of how SSL fits into the OSI model, as well as a simple diagram of the SSL handshake process can be found in Appendix A. 11.3 Getting the Source Code All of the source code used in this tutorial can be downloaded from the wolfSSL website, specifically from the following location. The download contains both the original and completed source code for both the echoserver and echoclient used in this tutorial. Specific contents are listed below the link. http://www.wolfssl.com/documentation/ssl-tutorial-2.2.zip The downloaded ZIP file has the following structure: /finished_src /echoclient /echoserver /include /lib /original_src /echoclient /echoserver /include /lib README (Completed echoclient code) (Completed echoserver code) (Modified unp.h) (Library functions) (Starting echoclient code) (Starting echoserver code) (Modified unp.h) (Library functions) 11.4 Base Example Modifications This tutorial, and the source code that accompanies it, have been designed to be as portable as possible across platforms. Because of this, and because we want to focus on how to add SSL and TLS into an application, the base examples have been kept as simple as possible. Several modifications have been made to the examples taken from Unix Network Programming in order to either remove unnecessary complexity or increase the range of platforms supported. If you believe there is something we could do to increase the portability of this tutorial, please let us know at support@wolfssl.com. The following is a list of modifications that were made to the original echoserver and echoclient examples found in the above listed book. Modifications to the echoserver (tcpserv04.c) ● Removed call to the Fork() function because fork() is not supported by Windows. The result of this is an echoserver which only accepts one client simultaneously. Along with this removal, Signal handling was removed. ● Moved str_echo() function from str_echo.c file into tcpserv04.c file ● Added a printf statement to view the client address and the port we have connected through: printf("Connection from %s, port %d\n", inet_ntop(AF_INET, &cliaddr.sin_addr, buff, sizeof(buff)), ntohs(cliaddr.sin_port)); ● Added a call to setsockopt() after creating the listening socket to eliminate the “Address already in use” bind error. ● Minor adjustments to clean up newer compiler warnings Modifications to the echoclient (tcpcli01.c) ● Moved str_cli() function from str_cli.c file into tcpcli01.c file ● Minor adjustments to clean up newer compiler warnings Modifications to unp.h header ● This header was simplified to contain only what is needed for this example. Please note that in these source code examples, certain functions will be capitalized. For example, Fputs() and Writen(). The authors of Unix Network Programming have written custom wrapper functions for normal functions in order to cleanly handle error checking. For a more thorough explanation of this, please see Section 1.4 (page 11) in the Unix Network Programming book. 11.5 Building and Installing wolfSSL Before we begin, download the example code (echoserver and echoclient) from the Getting the Source Code section, above. This section will explain how to download, configure, and install the wolfSSL embedded SSL library on your system. You will need to download and install the most recent version of wolfSSL from the wolfSSL download page. For a full list of available build options, see the Building wolfSSL guide. wolfSSL was written with portability in mind, and should generally be easy to build on most systems. If you have difficulty building wolfSSL, please feel free to ask for support on the wolfSSL product support forums. When building wolfSSL on Linux, *BSD, OS X, Solaris, or other *nix like systems, you can use the autoconf system. For windows-specific instructions, please refer to the Building wolfSSL section of the wolfSSL Manual. To configure and build wolfSSL, run the following two commands from the terminal. Any desired build options may be appended to ./configure (ex: ./configure –enable-opensslextra): ./configure make To install wolfSSL, run: sudo make install This will install wolfSSL headers into /usr/local/include/wolfssl and the wolfSSL libraries into /usr/local/lib on your system. To test the build, run the testsuite application from the wolfSSL root directory: ./testsuite/testsuite.test A set of tests will be run on wolfCrypt and wolfSSL to verify it has been installed correctly. After a successful run of the testsuite application, you should see output similar to the following: MD5 test passed! SHA test passed! SHA-224 test passed! SHA-256 test passed! SHA-384 test passed! SHA-512 test passed! HMAC-MD5 test passed! HMAC-SHA test passed! HMAC-SHA224 test passed! HMAC-SHA256 test passed! HMAC-SHA384 test passed! HMAC-SHA512 test passed! GMAC test passed! Chacha test passed! POLY1305 test passed! ChaCha20-Poly1305 AEAD test passed! AES test passed! AES-GCM test passed! RANDOM test passed! RSA test passed! DH test passed! ECC test passed! SSL version is TLSv1.2 SSL cipher suite is TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 SSL version is TLSv1.2 SSL cipher suite is TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Client message: hello wolfssl! Server response: I hear you fa shizzle! sending server shutdown command: quit! client sent quit command: shutting down! ciphers = DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:ECDHERSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128SHA256:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCMSHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSAAES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES128SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256SHA384:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-CHACHA20-POLY1305:DHE-RSACHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305-OLD:ECDHE-ECDSA-CHACHA20POLY1305-OLD:DHE-RSA-CHACHA20-POLY1305-OLD 33bc1a4570f4f1abccd5c48aace529b01a42ab51293954a297796e90d20970f0 input 33bc1a4570f4f1abccd5c48aace529b01a42ab51293954a297796e90d20970f0 /tmp/output-N0Xq9c All tests passed! Now that wolfSSL has been installed, we can begin modifying the example code to add SSL functionality. We will first begin by adding SSL to the echoclient and subsequently move on to the echoserver. 11.6 Initial Compilation To compile and run the example echoclient and echoserver code from the SSL Tutorial source bundle, you can use the included Makefiles. Change directory (cd) to either the echoclient or echoserver directory and run: make This will compile the example code and produce an executable named either echoserver or echoclient depending on which one is being built. The GCC command which is used in the Makefile can be seen below. If you want to build one of the examples without using the supplied Makefile, change directory to the example directory and replace tcpcli01.c (echoclient) or tcpserv04.c (echoserver) in the following command with correct source file for the example: gcc -‐o echoserver ../lib/*.c tcpserv04.c -‐I ../include This will compile the current example into an executable, creating either an “echoserver” or “echoclient” application. To run one of the examples after it has been compiled, change your current directory to the desired example directory and start the application. For example, to start the echoserver use: ./echoserver You may open a second terminal window to test the echoclient on your local host and you will need to supply the IP address of the server when starting the application, which in our case will be 127.0.0.1. Change your current directory to the “echoclient” directory and run the following command. Note that the echoserver must already be running: ./echoclient 127.0.0.1 Once you have both the echoserver and echoclient running, the echoserver should echo back any input that it receives from the echoclient. To exit either the echoserver or echoclient, use [Ctrl + C] to quit the application. Currently, the data being echoed back and forth between these two examples is being sent in the clear - easily allowing anyone with a little bit of skill to inject themselves in between the client and server and listen to your communication. 11.7 Libraries The wolfSSL library, once compiled, is named libwolfssl, and unless otherwise configured the wolfSSL build and install process creates only a shared library under the following directory. Both shared and static libraries may be enabled or disabled by using the appropriate build options: /usr/local/lib The first step we need to do is link the wolfSSL library to our example applications. Modifying the GCC command (using the echoserver as an example), gives us the following new command. Since wolfSSL installs header files and libraries in standard locations, the compiler should be able to find them without explicit instructions (using -l or -L). Note that by using -lwolfssl the compiler will automatically choose the correct type of library (static or shared): gcc -‐o echoserver ../lib/*.c tcpserv04.c -‐I ../include -‐lm -‐lwolfssl 11.8 Headers The first thing we will need to do is include the wolfSSL native API header in both the client and the server. In the tcpcli01.c file for the client and the tcpserv04.c file for the server add the following line near the top: #include 11.9 Startup/Shutdown Before we can use wolfSSL in our code, we need to initialize the library and the WOLFSSL_CTX. wolfSSL is initialized by calling wolfSSL_Init(). This must be done first before anything else can be done with the library. The WOLFSSL_CTX structure (wolfSSL Context) contains global values for each SSL connection, including certificate information. A single WOLFSSL_CTX can be used with any number of WOLFSSL objects created. This allows us to load certain information, such as a list of trusted CA certificates only once. To create a new WOLFSSL_CTX, use wolfSSL_CTX_new(). This function requires an argument which defines the SSL or TLS protocol for the client or server to use. There are several options for selecting the desired protocol. wolfSSL currently supports SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2, DTLS 1.0, and DTLS 1.2. Each of these protocols have a corresponding function that can be used as an argument to wolfSSL_CTX_new(). The possible client and server protocol options are shown below. SSL 2.0 is not supported by wolfSSL because it has been insecure for several years. EchoClient: wolfSSLv3_client_method(); wolfTLSv1_client_method(); wolfTLSv1_1_client_method(); wolfTLSv1_2_client_method(); wolfSSLv23_client_method(); wolfDTLSv1_client_method(); wolfDTLSv1_2_client_method(); // // // // // // // // SSL 3.0 TLS 1.0 TLS 1.1 TLS 1.2 Use highest version possible from SSLv3 - TLS 1.2 DTLS 1.0 DTLS 1.2 // // // // // // SSLv3 TLSv1 TLSv1.1 TLSv1.2 Allow clients to connect with TLSv1+ EchoServer: wolfSSLv3_server_method(); wolfTLSv1_server_method(); wolfTLSv1_1_server_method(); wolfTLSv1_2_server_method(); wolfSSLv23_server_method(); wolfDTLSv1_server_method(); wolfDTLSv1_2_server_method(); // DTLS // DTLS 1.2 We need to load our CA (Certificate Authority) certificate into the WOLFSSL_CTX so that the when the echoclient connects to the echoserver, it is able to verify the server’s identity. To load the CA certificates into the WOLFSSL_CTX, use wolfSSL_CTX_load_verify_locations(). This function requires three arguments: a WOLFSSL_CTX pointer, a certificate file, and a path value. The path value points to a directory which should contain CA certificates in PEM format. When looking up certificates, wolfSSL will look at the certificate file value before looking in the path location. In this case, we don’t need to specify a certificate path because we will specify one CA file - as such we use the value 0 for the path argument. The wolfSSL_CTX_load_verify_locations function returns either SSL_SUCCESS or SSL_FAILURE: wolfSSL_CTX_load_verify_locations(WOLFSSL_CTX* ctx, const char* file, const char* path) Putting these things together (library initialization, protocol selection, and CA certificate), we have the following. Here, we choose to use TLS 1.2: EchoClient: WOLFSSL_CTX* ctx; wolfSSL_Init();/* Initialize wolfSSL */ /* Create the WOLFSSL_CTX */ if ( (ctx = wolfSSL_CTX_new(wolfTLSv1_2_client_method())) == NULL){ fprintf(stderr, "wolfSSL_CTX_new error.\n"); exit(EXIT_FAILURE); } /* Load CA certificates into WOLFSSL_CTX */ if (wolfSSL_CTX_load_verify_locations(ctx,"../certs/ca-‐cert.pem",0) != SSL_SUCCESS) { fprintf(stderr, "Error loading ../certs/ca-‐cert.pem, please check the file.\n"); exit(EXIT_FAILURE); } EchoServer: When loading certificates into the WOLFSSL_CTX, the server certificate and key file should be loaded in addition to the CA certificate. This will allow the server to send the client its certificate for identification verification: WOLFSSL_CTX* ctx; wolfSSL_Init();/* Initialize wolfSSL */ /* Create the WOLFSSL_CTX */ if ( (ctx = wolfSSL_CTX_new(wolfTLSv1_2_server_method())) == NULL){ fprintf(stderr, "wolfSSL_CTX_new error.\n"); exit(EXIT_FAILURE); } /* Load CA certificates into CYASSL_CTX */ if (wolfSSL_CTX_load_verify_locations(ctx, "../certs/ca-‐cert.pem", 0) != SSL_SUCCESS) { fprintf(stderr, "Error loading ../certs/ca-‐cert.pem, " "please check the file.\n"); exit(EXIT_FAILURE); } /* Load server certificates into WOLFSSL_CTX */ if (wolfSSL_CTX_use_certificate_file(ctx,"../certs/server-‐cert.pem", SSL_FILETYPE_PEM) != SSL_SUCCESS){ fprintf(stderr, "Error loading ../certs/server-‐cert.pem, please check the file.\n"); exit(EXIT_FAILURE); } /* Load keys */ if (wolfSSL_CTX_use_PrivateKey_file(ctx,"../certs/server-‐key.pem", SSL_FILETYPE_PEM) != SSL_SUCCESS){ fprintf(stderr, "Error loading ../certs/server-‐key.pem, please check the file.\n"); exit(EXIT_FAILURE); } The code shown above should be added to the beginning of tcpcli01.c and tcpserv04.c, after both the variable definitions and the check that the user has started the client with an IP address (client). A version of the finished code is included in the SSL tutorial ZIP file for reference. Now that wolfSSL and the WOLFSSL_CTX have been initialized, make sure that the WOLFSSL_CTX object and the wolfSSL library are freed when the application is completely done using SSL/TLS. In both the client and the server, the following two lines should be placed at the end of the main() function (in the client right before the call to exit() ): wolfSSL_CTX_free(ctx); wolfSSL_Cleanup(); 11.10 WOLFSSL Object EchoClient A WOLFSSL object needs to be created after each TCP Connect and the socket file descriptor needs to be associated with the session. In the echoclient example, we will do this after the call to Connect(), shown below: /* Connect to socket file descriptor */ Connect(sockfd, (SA *) &servaddr, sizeof(servaddr)); Directly after connecting, create a new WOLFSSL object using the wolfSSL_new() function. This function returns a pointer to the WOLFSSL object if successful or NULL in the case of failure. We can then associate the socket file descriptor (sockfd) with the new WOLFSSL object (ssl): /* Create WOLFSSL object */ WOLFSSL* ssl; if( (ssl = wolfSSL_new(ctx)) == NULL) { fprintf(stderr, "wolfSSL_new error.\n"); exit(EXIT_FAILURE); } wolfSSL_set_fd(ssl, sockfd); One thing to notice here is we haven’t made a call to the wolfSSL_connect() function. wolfSSL_connect() initiates the SSL/TLS handshake with the server, and is called during wolfSSL_read() if it hasn’t been called previously. In our case, we don’t explicitly call wolfSSL_connect(), as we let our first wolfSSL_read() do it for us. EchoServer At the end of the for loop in the main method, insert the WOLFSSL object and associate the socket file descriptor (connfd) with the WOLFSSL object (ssl), just as with the client: /* Create WOLFSSL object */ WOLFSSL* ssl; if ( (ssl = wolfSSL_new(ctx)) == NULL) { fprintf(stderr, "wolfSSL_new error.\n"); exit(EXIT_FAILURE); } wolfSSL_set_fd(ssl, connfd); A WOLFSSL object needs to be created after each TCP Connect and the socket file descriptor needs to be associated with the session. Create a new WOLFSSL object using the wolfSSL_new() function. This function returns a pointer to the WOLFSSL object if successful or NULL in the case of failure. We can then associate the socket file descriptor (sockfd) with the new WOLFSSL object (ssl): /* Create WOLFSSL object */ WOLFSSL* ssl; if( (ssl = wolfSSL_new(ctx)) == NULL) { fprintf(stderr, "wolfSSL_new error.\n"); exit(EXIT_FAILURE); } wolfSSL_set_fd(ssl, sockfd); 11.11 Sending/Receiving Data EchoClient The next step is to begin sending data securely. Take note that in the echoclient example, the main() function hands off the sending and receiving work to str_cli(). The str_cli() function is where our function replacements will be made. First we need access to our WOLFSSL object in the str_cli() function, so we add another argument and pass the ssl variable to str_cli(). Because the WOLFSSL object is now going to be used inside of the str_cli() function, we remove the sockfd parameter. The new str_cli() function signature after this modification is shown below: void str_cli(FILE *fp, WOLFSSL* ssl) In the main() function, the new argument (ssl) is passed to str_cli(): str_cli(stdin, ssl); Inside the str_cli() function, Writen() and Readline() are replaced with calls to wolfSSL_write() and wolfSSL_read() functions, and the WOLFSSL object (ssl) is used instead of the original file descriptor(sockfd). The new str_cli() function is shown below. Notice that we now need to check if our calls to wolfSSL_write and wolfSSL_read were successful. The authors of the Unix Programming book wrote error checking into their Writen() function which we must make up for after it has been replaced. We add a new int variable, “n”, to monitor the return value of wolfSSL_read and before printing out the contents of the buffer, recvline, the end of our read data is marked with a ‘\0’: void str_cli(FILE *fp, WOLFSSL* ssl) { char sendline[MAXLINE], recvline[MAXLINE]; int n = 0; while (Fgets(sendline, MAXLINE, fp) != NULL) { if(wolfSSL_write(ssl, sendline, strlen(sendline)) != strlen(sendline)){ err_sys("wolfSSL_write failed"); } if ((n = wolfSSL_read(ssl, recvline, MAXLINE)) <= 0) err_quit("wolfSSL_read error"); recvline[n] = '\0'; Fputs(recvline, stdout); } } The last thing to do is free the WOLFSSL object when we are completely done with it. In the main() function, right before the line to free the WOLFSSL_CTX, call to wolfSSL_free(): str_cli(stdin, ssl); wolfSSL_free(ssl); wolfSSL_CTX_free(ctx); wolfSSL_Cleanup(); /* Free WOLFSSL object */ /* Free WOLFSSL_CTX object */ /* Free wolfSSL */ EchoServer The echo server makes a call to str_echo() to handle reading and writing (whereas the client made a call to str_cli()). As with the client, modify str_echo() by replacing the sockfd parameter with a WOLFSSL object (ssl) parameter in the function signature: void str_echo(WOLFSSL* ssl) Replace the calls to Read() and Writen() with calls to the wolfSSL_read() and wolfSSL_write() functions. The modified str_echo() function, including error checking of return values, is shown below. Note that the type of the variable “n” has been changed from ssize_t to int in order to accommodate for the change from read() to wolfSSL_read(): void str_echo(WOLFSSL* ssl) { int n; char buf[MAXLINE]; while ( (n = wolfSSL_read(ssl, buf, MAXLINE)) > 0) { if(wolfSSL_write(ssl, buf, n) != n) { err_sys("wolfSSL_write failed"); } } if( n < 0 ) printf("wolfSSL_read error = %d\n", wolfSSL_get_error(ssl,n)); else if( n == 0 ) printf("The peer has closed the connection.\n"); } In main() call the str_echo() function at the end of the for loop (soon to be changed to a while loop). After this function, inside the loop, make calls to free the WOLFSSL object and close the connfd socket: str_echo(ssl); /* process the request */ wolfSSL_free(ssl); /* Free WOLFSSL object */ Close(connfd); We will free the ctx and cleanup before the call to exit. 11.12 Signal Handling Echoclient / Echoserver In the echoclient and echoserver, we will need to add a signal handler for when the user closes the app by using “Ctrl+C”. The echo server is continually running in a loop. Because of this, we need to provide a way to break that loop when the user presses “Ctrl+C”. To do this, the first thing we need to do is change our loop to a while loop which terminates when an exit variable (cleanup) is set to true. First, define a new static int variable called cleanup at the top of tcpserv04.c right after the #include statements: static int cleanup; /* To handle shutdown */ Modify the echoserver loop by changing it from a for loop to a while loop: while(cleanup != 1) { /* echo server code here */ } For the echoserver we need to disable the operating system from restarting calls which were being executed before the signal was handled after our handler has finished. By disabling these, the operating system will not restart calls to accept() after the signal has been handled. If we didn’t do this, we would have to wait for another client to connect and disconnect before the echoserver would clean up resources and exit. To define the signal handler and turn off SA_RESTART, first define act and oact structures in the echoserver’s main() function: struct sigaction act, oact; Insert the following code after variable declarations, before the call to wolfSSL_Init() in the main function: /* Signal handling code */ struct sigaction act, oact; act.sa_handler = sig_handler; sigemptyset(&act.sa_mask); act.sa_flags = 0; sigaction(SIGINT, &act, &oact); /* /* /* * * /* * /* * Declare the sigaction structs Tell act to use sig_handler Tells act to exclude all sa_mask signals during execution of sig_handler. States that act has a special flag of 0 Tells the program to use (o)act on a signal or interrupt */ */ * * */ * */ * */ The echoserver’s sig_handler function is shown below: void sig_handler(const int sig) { printf("\nSIGINT handled.\n"); cleanup = 1; return; } That’s it - the echoclient and echoserver are now enabled with TLSv1.2!! What we did: ● Included the wolfSSL headers ● Initialized wolfSSL ● Created a WOLFSSL_CTX structure in which we chose what protocol we wanted to use ● Created a WOLFSSL object to use for sending and receiving data ● Replaced calls to Writen() and Readline() with wolfSSL_write() and wolfSSL_read() ● Freed WOLFSSL, WOLFSSL_CTX ● Made sure we handled client and server shutdown with signal handler There are many more aspects and methods to configure and control the behavior of your SSL connections. For more detailed information, please see additional wolfSSL documentation and resources. Once again, the completed source code can be found in the downloaded ZIP file at the top of this section. 11.13 Certificates For testing purposes, you may use the certificates provided by wolfSSL. These can be found in the wolfSSL download, and specifically for this tutorial, they can be found in the finished_src folder. For production applications, you should obtain correct and legitimate certificates from a trusted certificate authority. 11.14 Conclusion This tutorial walked through the process of integrating the wolfSSL embedded SSL library into a simple client and server application. Although this example is simple, the same principles may be applied for adding SSL or TLS into your own application. The wolfSSL embedded SSL library provides all the features you would need in a compact and efficient package that has been optimized for both size and speed. Being dual licensed under GPLv2 and standard commercial licensing, you are free to download the wolfSSL source code directly from our website. Feel free to post to our support forums (www.wolfssl.com/forums) with any questions or comments you might have. If you would like more information about our products, please contact info@wolfssl.com. We welcome any feedback you have on this SSL tutorial. If you believe it could be improved or enhanced in order to make it either more useful, easier to understand, or more portable, please let us know at support@wolfssl.com. Chapter 12: Best Practices for Embedded Devices 12.1 Creating Private Keys Embedding a private key into firmware allows anyone to extract the key and turns an otherwise secure connection into something nothing more secure than TCP. We have a few ideas about creating private keys for SSL enabled devices. 1. Each device acting as a server should have a unique private key, just like in the non-embedded world. 2. If the key can't be placed onto the device before delivery, have it generated during setup. 3. If the device lacks the power to generate it's own key during setup, have the client setting up the device generate the key and send it to the device. 4. If the client lacks the ability to generate a private key, have the client retrieve a unique private key over an SSL/TLS connection from the devices known website (for example). wolfSSL (formerly CyaSSL) can be used in all of these steps to help ensure an embedded device has a secure unique private key. Taking these steps will go a long ways towards securing the SSL connection itself. 12.2 Digitally Signing and Authenticating with wolfSSL wolfSSL is a popular tool for digitally signing applications, libraries, or files prior to loading them on embedded devices. Most desktop and server operating systems allow creation of this type of functionality through system libraries, but stripped down embedded operating systems do not. The reason that embedded RTOS environments do not include digital signature functionality is because it has historically not been a requirement for most embedded applications. In today’s world of connected devices and heightened security concerns, digitally signing what is loaded onto your embedded or mobile device has become a top priority. Examples of embedded connected devices where this requirement was not found in years past include set top boxes, DVR’s, POS systems, both VoIP and mobile phones, connected home, and even automobile-based computing systems. Because wolfSSL supports the key embedded and real time operating systems, encryption standards, and authentication functionality, it is a natural choice for embedded systems developers to use when adding digital signature functionality. Generally, the process for setting up code and file signing on an embedded device are as follows: 1. The embedded systems developer will generate an RSA key pair. 2. A server-side script-based tool is developed a. The server side tool will create a hash of the code to be loaded on the device (with SHA-256 for example). b. The hash is then digitally signed, also called RSA private encrypt. c. A package is created that contains the code along with the digital signature. 3. The package is loaded on the device along with a way to get the RSA public key. The hash is re-created on the device then digitally verified (also called RSA public decrypt) against the existing digital signature. Benefits to enabling digital signatures on your device include: 1. Easily enable a secure method for allowing third parties to load files to your device. 2. Ensure against malicious files finding their way onto your device. 3. Digitally secure firmware updates 4. Ensure against firmware updates from unauthorized parties General information on code signing: http://en.wikipedia.org/wiki/Code_signing Chapter 13: OpenSSL Compatibility 13.1 Compatibility with OpenSSL wolfSSL (formerly CyaSSL) provides an OpenSSL compatibility header, wolfssl/openssl/ssl.h, in addition to the wolfSSL native API, to ease the transition into using wolfSSL or to aid in porting an existing OpenSSL application over to wolfSSL. For an overview of the OpenSSL Compatibility Layer, please continue reading below. To view the complete set of OpenSSL functions supported by wolfSSL, please see the wolfssl/openssl/ssl.h file. The OpenSSL Compatibility Layer maps a subset of the most commonly-used OpenSSL commands to wolfSSL’s native API functions. This should allow for an easy replacement of OpenSSL by wolfSSL in your application or project without changing much code. Our test beds for OpenSSL compatibility are stunnel and Lighttpd, which means that we build both of them with wolfSSL as a way to test our OpenSSL compatibility API. 13.2 Differences Between wolfSSL and OpenSSL Many people are curious how wolfSSL compares to OpenSSL and what benefits there are to using an SSL/TLS library that has been optimized to run on embedded platforms. Obviously, OpenSSL is free and presents no initial costs to begin using, but we believe that wolfSSL will provide you with more flexibility, an easier integration of SSL/TLS into your existing platform, current standards support, and much more – all provided under a very easy-to-use license model. The points below outline several of the main differences between wolfSSL and OpenSSL. 1. With a 20-100 kB build size, wolfSSL is up to 20 times smaller than OpenSSL. wolfSSL is a better choice for resource constrained environments – where every byte matters. 2. wolfSSL is up to date with the most current standards of TLS 1.3 with DTLS. The wolfSSL team is dedicated to continually keeping wolfSSL up-to-date with current standards. 3. wolfSSL offers the best current ciphers and standards available today, including ciphers for streaming media support. In addition, the recently-introduced NTRU cipher allows speed increases of 20-200x over standard RSA. 4. wolfSSL is dual licensed under both the GPLv2 as well as a commercial license, where OpenSSL is available only under their unique license from multiple sources. 5. wolfSSL is backed by an outstanding company who cares about its users and about their security, and is always willing to help. The team actively works to improve and expand wolfSSL. The wolfSSL team is based primarily out of Bozeman, MT, Portland, OR, and Seattle, WA, along with other team members located around the globe. 6. wolfSSL is the leading SSL/TLS library for real time, mobile, and embedded systems by virtue of its breadth of platform support and successful implementations on embedded environments. Chances are we’ve already been ported to your environment. If not, let us know and we’ll be glad to help. 7. wolfSSL offers several abstraction layers to make integrating SSL into your environment and platform as easy as possible. With an OS layer, a custom I/O layer, and a C Standard Library abstraction layer, integration has never been so easy. 8. wolfSSL offers several support packages for wolfSSL. Available directly through phone, email or the wolfSSL product support forums, your questions are answered quickly and accurately to help you make progress on your project as quickly as possible. 13.3 Supported OpenSSL Structures SSL_METHOD holds SSL version information and is either a client or server method. (Same as WOLFSSL_METHOD in the native wolfSSL API). SSL_CTX holds context information including certificates. (Same as WOLFSSL_CTX in the native wolfSSL API). SSL holds session information for a secure connection. (Same as WOLFSSL in the native wolfSSL API). 13.4 Supported OpenSSL Functions The three structures shown above are usually initialized in the following way: SSL_METHOD* method = SSLv3_client_method(); SSL_CTX* ctx = SSL_CTX_new(method); SSL* ssl = SSL_new(ctx); This establishes a client side SSL version 3 method, creates a context based on the method, and initializes the SSL session with the context. A server side program is no different except that the SSL_METHOD is created using SSLv3_server_method(), or one of the available functions. For a list of supported functions, please see Section 4.2. When using the OpenSSL Compatibility layer, the functions in 4.2 should be modified by removing the “wolf” prefix. For example, the native wolfSSL API function: wolfTLSv1_client_method() Becomes TLSv1_client_method() When an SSL connection is no longer needed the following calls free the structures created during initialization. SSL_CTX_free(ctx); SSL_free(ssl); SSL_CTX_free() has the additional responsibility of freeing the associated SSL_METHOD. Failing to use the XXX_free() functions will result in a resource leak. Using the system's free() instead of the SSL ones results in undefined behavior. Once an application has a valid SSL pointer from SSL_new(), the SSL handshake process can begin. From the client's view, SSL_connect() will attempt to establish a secure connection. SSL_set_fd(ssl, sockfd); SSL_connect(ssl); Before the SSL_connect() can be issued, the user must supply wolfSSL with a valid socket file descriptor, sockfd in the example above. sockfd is typically the result of the TCP function socket() which is later established using TCP connect(). The following creates a valid client side socket descriptor for use with a local wolfSSL server on port 11111, error handling is omitted for simplicity. int sockfd = socket(AF_INET, SOCK_STREAM, 0); sockaddr_in servaddr; memset(&servaddr, 0, sizeof(servaddr)); servaddr.sin_family = AF_INET; servaddr.sin_port = htons(11111); servaddr.sin_addr.s_addr = inet_addr("127.0.0.1"); connect(sockfd, (const sockaddr*)&servaddr, sizeof(servaddr)); Once a connection is established, the client may read and write to the server. Instead of using the TCP functions send() and receive(), wolfSSL and yaSSL use the SSL functions SSL_write() and SSL_read(). Here is a simple example from the client demo: char msg[] = "hello wolfssl!"; int wrote = SSL_write(ssl, msg, sizeof(msg)); char reply[1024]; int read = SSL_read(ssl, reply, sizeof(reply)); reply[read] = 0; printf("Server response: %s\n", reply); The server connects in the same way except that it uses SSL_accept() instead of SSL_connect(), analogous to the TCP API. See the server example for a complete server demo program. 13.5 x509 Certificates Both the server and client can provide wolfSSL with certificates in either PEM or DER. Typical usage is like this: SSL_CTX_use_certificate_file(ctx, "certs/cert.pem", SSL_FILETYPE_PEM); SSL_CTX_use_PrivateKey_file(ctx, "certs/key.der", SSL_FILETYPE_ASN1); A key file can also be presented to the Context in either format. SSL_FILETYPE_PEM signifies the file is PEM formatted while SSL_FILETYPE_ASN1 declares the file to be in DER format. To verify that the key file is appropriate for use with the certificate the following function can be used: SSL_CTX_check_private_key(ctx); Chapter 14: Licensing 14.1 Open Source wolfSSL (formerly CyaSSL), yaSSL, wolfCrypt, yaSSH and TaoCrypt software are free software downloads and may be modified to the needs of the user as long as the user adheres to version two of the GPL License. The GPLv2 license can be found on the gnu.org website (http://www.gnu.org/licenses/old-licenses/gpl-2.0.html). wolfSSH software is a free software download and may be modified to the needs of the user as long as the user adheres to version three of the GPL license. The GPLv3 license can be found on the gnu.org website (https://www.gnu.org/licenses/gpl.html). 14.2 Commercial Licensing Businesses and enterprises who wish to incorporate wolfSSL products into proprietary appliances or other commercial software products for re-distribution must license commercial versions. Commercial licenses for wolfSSL, yaSSL, and wolfCrypt are available for $5,000 USD per end product or SKU. Licenses are generally issued for one product and include unlimited royalty-free distribution. Custom licensing terms are also available. Commercial licenses are also available for wolfMQTT and wolfSSH. Please contact licensing@wolfssl.com with inquiries. 14.3 Support Packages Support packages for wolfSSL products are available on an annual basis directly from wolfSSL. With three different package options, you can compare them side-by-side and choose the package that best fits your specific needs. Please see our Support Packages page (https://www.wolfssl.com/wolfSSL/Support/support_tiers.php) for more details. Chapter 15: Support and Consulting 15.1 How to Get Support For general product support, wolfSSL (formerly CyaSSL) maintains an online forum for the wolfSSL product family. Please post to the forums or contact wolfSSL directly with any questions. wolfSSL (yaSSL) Forums: https://www.wolfssl.com/forums Email Support: support@wolfssl.com For information regarding wolfSSL products, questions regarding licensing, or general comments, please contact wolfSSL by emailing info@wolfssl.com. For support packages, please see Chapter 14. 15.1.1 Bugs Reports and Support Issues If you are submitting a bug report or asking about a problem, please include the following information with your submission: 1. 2. 3. 4. 5. wolfSSL version number Operating System version Compiler version The exact error you are seeing A description of how we can reproduce or try to replicate this problem With the above information, we will do our best to resolve your problems. Without this information, it is very hard to pinpoint the source of the problem. wolfSSL values your feedback and makes it a top priority to get back to you as soon as possible. 15.2 Consulting wolfSSL offers both on and off site consulting - providing feature additions, porting, a Competitive Upgrade Program (see section 15.2.2), and design consulting. 15.2.1 Feature Additions and Porting We can add additional features that you may need which are not currently offered in our products on a contract or co-development basis. We also offer porting services on our products to new host languages or new operating environments. 15.2.2 Competitive Upgrade Program We will help you move from an outdated or expensive SSL/TLS library to wolfSSL with low cost and minimal disturbance to your code base. Program Outline: 1. You need to currently be using a commercial competitor to wolfSSL. 2. You will receive up to one week of on-site consulting to switch out your old SSL library for wolfSSL. Travel expenses are not included. 3. Normally, up to one week is the right amount of time for us to make the replacement in your code and do initial testing. Additional consulting on a replacement is available as needed. 4. You will receive the standard wolfSSL royalty free license to ship with your product. 5. The price is $10,000. The purpose of this program is to enable users who are currently spending too much on their embedded SSL implementation to move to wolfSSL with ease. If you are interested in learning more, then please contact us at info@wolfssl.com. 15.2.3 Design Consulting If your application or framework needs to be secured with SSL/TLS but you are uncertain about how the optimal design of a secured system would be structured, we can help! We offer design consulting for building SSL/TLS security into devices using wolfSSL. Our consultants can provide you with the following services: 1. Assessment: An evaluation of your current SSL/TLS implementation. We can give you advice on your current setup and how we think you could improve upon this by using wolfSSL. 2. Design: Looking at your system requirements and parameters, we'll work closely with you to make recommendations on how to implement wolfSSL into your application such that it provides you with optimal security. If you would like to learn more about design consulting for building SSL into your application or device, please contact info@wolfssl.com for more information. Chapter 16: wolfSSL (formerly CyaSSL) Updates 16.1 Product Release Information We regularly post update information on Twitter. For additional release information, you can keep track of our projects on GitHub, follow us on Facebook, or follow our daily blog. wolfSSL on GitHub wolfSSL on Twitter wolfSSL on Facebook wolfSSL on Reddit Daily Blog https://www.github.com/wolfssl/wolfssl http://twitter.com/wolfSSL http://www.facebook.com/wolfSSL https://www.reddit.com/r/wolfssl/ https://wolfssl.com/wolfSSL/Blog/Blog.html Chapter 17: wolfSSL (formerly CyaSSL) API Reference 17.1 Initialization / Shutdown The functions in this section have to do with initializing the wolfSSL library and shutting it down (freeing resources) after it is no longer needed by the application. wolfSSL_Init Synopsis: #include int wolfSSL_Init(void); Description: Initializes the wolfSSL library for use. Must be called once per application and before any other call to the library. Return Values: If successful the call will return SSL_SUCCESS. BAD_MUTEX_E is an error that may be returned. WC_INIT_E wolfCrypt initialization error returned. Parameters: This function has no parameters. Example: int ret = 0; ret = wolfSSL_Init(); if (ret != SSL_SUCCESS) { /*failed to initialize wolfSSL library*/ } See Also: wolfSSL_Cleanup wolfSSL_library_init Synopsis: #include int wolfSSL_library_init(void) Description: This function is called internally in wolfSSL_CTX_new(). This function is a wrapper around wolfSSL_Init() and exists for OpenSSL compatibility (SSL_library_init) when wolfSSL has been compiled with OpenSSL compatibility layer. wolfSSL_Init() is the more typically-used wolfSSL initialization function. Return Values: If successful the call will return SSL_SUCCESS. SSL_FATAL_ERROR is returned upon failure. Parameters: This function takes no parameters. Example: int ret = 0; ret = wolfSSL_library_init(); if (ret != SSL_SUCCESS) { /*failed to initialize wolfSSL*/ } ... See Also: wolfSSL_Init wolfSSL_Cleanup wolfSSL_Cleanup Synopsis: #include int wolfSSL_Cleanup(void); Description: Un-initializes the wolfSSL library from further use. Doesn’t have to be called, though it will free any resources used by the library. Return Values: SSL_SUCCESS return no errors. BAD_MUTEX_E a mutex error return. Parameters: There are no parameters for this function. Example: wolfSSL_Cleanup(); See Also: wolfSSL_Init wolfSSL_shutdown Synopsis: #include int wolfSSL_shutdown(WOLFSSL* ssl); Description: This function shuts down an active SSL/TLS connection using the SSL session, ssl. This function will try to send a “close notify” alert to the peer. The calling application can choose to wait for the peer to send its “close notify” alert in response or just go ahead and shut down the underlying connection after directly calling wolfSSL_shutdown (to save resources). Either option is allowed by the TLS specification. If the underlying connection will be used again in the future, the complete two-directional shutdown procedure must be performed to keep synchronization intact between the peers. wolfSSL_shutdown() works with both blocking and non-blocking I/O. When the underlying I/O is non-blocking, wolfSSL_shutdown() will return an error if the underlying I/O could not satisfy the needs of wolfSSL_shutdown() to continue. In this case, a call to wolfSSL_get_error() will yield either SSL_ERROR_WANT_READ or SSL_ERROR_WANT_WRITE. The calling process must then repeat the call to wolfSSL_shutdown() when the underlying I/O is ready. Return Values: SSL_SUCCESS - will be returned upon success. SSL_SHUTDOWN_NOT_DONE - will be returned when shutdown has not finished, and the function should be called again. SSL_FATAL_ERROR - will be returned upon failure. Call wolfSSL_get_error() for a more specific error code. Parameters: ssl - pointer to the SSL session, created with wolfSSL_new(). Example: int ret = 0; WOLFSSL* ssl = 0; ... ret = wolfSSL_shutdown(ssl); if (ret != 0) { /*failed to shut down SSL connection*/ } See Also: wolfSSL_free wolfSSL_CTX_free wolfSSL_get_shutdown Synopsis: #include int wolfSSL_get_shutdown(WOLFSSL* ssl); Description: This function checks the shutdown conditions in closeNotify or connReset or sentNotify members of the Options structure. The Options structure is within the WOLFSSL structure. Return Values: 1 - SSL_SENT_SHUTDOWN is returned. 2 - SSL_RECEIVED_SHUTDOWN is returned. Parameters: ssl - a constant pointer to a WOLFSSL structure, created using wolfSSL_new(). Example: WOLFSSL_CTX* ctx = WOLFSSL_CTX_new(/*protocol method*/); WOLFSSL* ssl = WOLFSSL_new(ctx); … int ret; ret = wolfSSL_get_shutdown(ssl); if(ret == 1){ /*SSL_SENT_SHUTDOWN */ } else if(ret == 2){ /*SSL_RECEIVED_SHUTDOWN */ } else { /*Fatal error.*/ } See Also: wolfSSL_SESSION_free wolfSSL_is_init_finished Synopsis: #include int wolfSSL_is_init_finished(WOLFSSL* ssl); Description: This function checks to see if the connection is established. Return Values: 0 - returned if the connection is not established, i.e. the WOLFSSL struct is NULL or the handshake is not done. 1 - returned if the handshake is done. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*protocol method*/); WOLFSSL* ssl = wolfSSL_new(ctx); ... if(wolfSSL_is_init_finished(ssl)){ /*Handshake is done and connection is established*/ } See Also: wolfSSL_set_accept_state wolfSSL_get_keys wolfSSL_set_shutdown wolfSSL_ALPN_GetPeerProtocol Synopsis: #include int wolfSSL_ALPN_GetPeerProtocol(WOLFSSL* ssl, char** list, word16* listSz); Description: This function copies the alpn_client_list data from the SSL object to the buffer. Return Values: SSL_SUCCESS - returned if the function executed without error. The alpn_client_list member of the SSL object has been copied to the list parameter. BAD_FUNC_ARG - returned if the list or listSz parameter is NULL. BUFFER_ERROR - returned if there will be a problem with the list buffer (either it’s NULL or the size is 0). MEMORY_ERROR - returned if there was a problem dynamically allocating memory. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). list - a pointer to the buffer. The data from the SSL object will be copied into it. listSz - the buffer size. Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*protocol method*/); WOLFSSL* ssl = wolfSSL_new(ctx); … #ifdef HAVE_ALPN char* list = NULL; word16 listSz = 0; … err = wolfSSL_ALPN_GetPeerProtocol(ssl, &list, &listSz); if(err == SSL_SUCCESS){ /*List of protocols names sent by client */ } See Also: wolfSSL_UseALPN wolfSSL_SetMinVersion Synopsis: #include int wolfSSL_SetMinVersion(WOLFSSL* ssl, int version); Description: This function sets the minimum downgrade version allowed. Applicable only when the connection allows downgrade using (wolfSSLv23_client_method or wolfSSLv23_server_method). Return Values: SSL_SUCCESS - returned if this function and its subroutine executes without error. BAD_FUNC_ARG - returned if the SSL object is NULL. In the subroutine this error is thrown if there is not a good version match. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). version - an integer representation of the version to be set as the minimum: WOLFSSL_SSLV3 = 0, WOLFSSL_TLSV1 = 1, WOLFSSL_TLSV1_1 = 2 or WOLFSSL_TLSV1_2 = 3. Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*protocol method*/); WOLFSSL* ssl = wolfSSL_new(ctx); int version = /*version id (see internal.h enum Misc)*/ … if(version != SSL_SUCCESS){ /*The minimum version failed to set properly */ } else { /*You have successfully set the min version */ } See Also: SetMinVersionHelper wolfSSL_CTX_SetMinVersion wolfSSL_MakeTlsMasterSecret Synopsis: #include int wolfSSL_MakeTlsMasterSecret(byte* ms, word32 msLen, const byte* pms, word32 pmsLen, const byte* cr, const byte* sr, int tls1_2, int hash_type); Description: This function copies the values of cr and sr then passes through to PRF (pseudo random function) and returns that value. Return Values: This function returns 0 on success. BUFFER_E - returned if there will be an error with the size of the buffer. MEMORY_E - returned if a subroutine failed to allocate dynamic memory. Parameters: ms - the master secret held in the Arrays structure. msLen - the length of the master secret. pms - the pre-master secret held in the Arrays structure. pmsLen - the length of the pre-master secret. cr - the client random. sr - the server random. tls1_2 - signifies that the version is at least tls version 1.2. hash_type - signifies the hash type. Example: WOLFSSL* ssl; /*Initialize*/ /*called in MakeTlsMasterSecret and retrieves the necessary information as follows:*/ int MakeTlsMasterSecret(WOLFSSL* ssl){ int ret; ret = wolfSSL_makeTlsMasterSecret(ssl->arrays->masterSecret, SECRET_LEN, ssl->arrays->preMasterSecret, ssl->arrays>preMasterSz, ssl->arrays->clientRandom, ssl->arrays->serverRandom, IsAtLeastTLSv1_2(ssl), ssl->specs.mac_algorithm); … return ret; } See Also: PRF doPRF p_hash MakeTlsMasterSecret wolfSSL_SetServerID Synopsis: #include int wolfSSL_SetServerID(WOLFSSL* ssl, const byte* id, int len, int newSession); Description: This function associates the client session with the server id. If the newSession flag is on, an existing session won’t be reused. Return Values: SSL_SUCCESS - returned if the function executed without an error. BAD_FUNC_ARG - returned if the WOLFSSL struct or id parameter is NULL or if len is not greater than zero. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). id - a constant byte pointer that will be copied to the serverID member of the WOLFSSL_SESSION structure. len - an int type representing the length of the session id parameter. newSession - an int type representing the flag to denote whether to reuse a session or not. Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*protocol*/); WOLFSSL* ssl = WOLFSSL_new(ctx); const byte id[MAX_SIZE]; /*or dynamically create space*/ int len = 0; /*initialize length*/ int newSession = 0; /*flag to allow*/ … int ret = wolfSSL_SetServerID(ssl, id, len, newSession); if(ret){ /*The Id was successfully set*/ } See Also: GetSessionClient wolfSSL_ALPN_GetProtocol Synopsis: #include int wolfSSL_ALPN_GetProtocol(WOLFSSL* ssl, char** protocol_name, word16* size); Description: This function gets the protocol name set by the server. Return Values: SSL_SUCCESS - returned on successful execution where no errors were thrown. SSL_FATAL_ERROR - returned if the extension was not found or if there was no protocol match with peer. There will also be an error thrown if there is more than one protocol name accepted. SSL_ALPN_NOT_FOUND - returned signifying that no protocol match with peer was found. BAD_FUNC_ARG - returned if there was a NULL argument passed into the function. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). protocol_name - a pointer to a char that represents the protocol name and will be held in the ALPN structure. size - a word16 type that represents the size of the protocol_name. Example: WOLFSSL_CTX* ctx = WOLFSSL_CTX_new(/*protocol method*/); WOLFSSL* ssl = WOLFSSL_new(ctx); ... int err; char* protocol_name = NULL; Word16 protocol_nameSz = 0; err = wolfSSL_ALPN_GetProtocol(ssl, &protocol_name, &protocol_nameSz); if(err == SSL_SUCCESS){ /*Sent ALPN protocol*/ } See Also: TLSX_ALPN_GetRequest TLSX_Find 17.2 Certificates and Keys The functions in this section have to do with loading certificates and keys into wolfSSL. wolfSSL_CTX_load_verify_buffer Synopsis: int wolfSSL_CTX_load_verify_buffer(WOLFSSL_CTX* ctx, const unsigned char* in, long sz, int format); Description: This function loads a CA certificate buffer into the WOLFSSL Context. It behaves like the non-buffered version, only differing in its ability to be called with a buffer as input instead of a file. The buffer is provided by the in argument of size sz. format specifies the format type of the buffer; SSL_FILETYPE_ASN1 or SSL_FILETYPE_PEM. More than one CA certificate may be loaded per buffer as long as the format is in PEM. Please see the examples for proper usage. Return Values: If successful the call will return SSL_SUCCESS. SSL_BAD_FILETYPE will be returned if the file is the wrong format. SSL_BAD_FILE will be returned if the file doesn’t exist, can’t be read, or is corrupted. MEMORY_E will be returned if an out of memory condition occurs. ASN_INPUT_E will be returned if Base16 decoding fails on the file. BUFFER_E will be returned if a chain buffer is bigger than the receiving buffer. Parameters: ctx - pointer to the SSL context, created with wolfSSL_CTX_new(). in - pointer to the CA certificate buffer sz - size of the input CA certificate buffer, in. format - format of the buffer certificate, either SSL_FILETYPE_ASN1 or SSL_FILETYPE_PEM. Example: int ret = 0; int sz = 0; WOLFSSL_CTX* ctx; byte certBuff[...]; ... ret = wolfSSL_CTX_load_verify_buffer(ctx, certBuff, sz, SSL_FILETYPE_PEM); if (ret != SSL_SUCCESS) { /*error loading CA certs from buffer*/ } ... See Also: wolfSSL_CTX_load_verify_locations wolfSSL_CTX_use_certificate_buffer wolfSSL_CTX_use_PrivateKey_buffer wolfSSL_CTX_use_NTRUPrivateKey_file wolfSSL_CTX_use_certificate_chain_buffer wolfSSL_use_certificate_buffer wolfSSL_use_PrivateKey_buffer wolfSSL_use_certificate_chain_buffer wolfSSL_CTX_load_verify_locations Synopsis: int wolfSSL_CTX_load_verify_locations(WOLFSSL_CTX* ctx, const char* file, const char* path); Description: This function loads PEM-formatted CA certificate files into the SSL context (WOLFSSL_CTX). These certificates will be treated as trusted root certificates and used to verify certs received from peers during the SSL handshake. The root certificate file, provided by the file argument, may be a single certificate or a file containing multiple certificates. If multiple CA certs are included in the same file, wolfSSL will load them in the same order they are presented in the file. The path argument is a pointer to the name of a directory that contains certificates of trusted root CAs. If the value of file is not NULL, path may be specified as NULL if not needed. If path is specified and NO_WOLFSSL_DIR was not defined when building the library, wolfSSL will load all CA certificates located in the given directory. This function will attempt to load all files in the directory and locate any files with the PEM header “----BEGIN CERTIFICATE-----”. Please see the examples for proper usage. Return Values: If successful the call will return SSL_SUCCESS. SSL_FAILURE will be returned if ctx is NULL, or if both file and path are NULL. SSL_BAD_FILETYPE will be returned if the file is the wrong format. SSL_BAD_FILE will be returned if the file doesn’t exist, can’t be read, or is corrupted. MEMORY_E will be returned if an out of memory condition occurs. ASN_INPUT_E will be returned if Base16 decoding fails on the file. BUFFER_E will be returned if a chain buffer is bigger than the receiving buffer. BAD_PATH_ERROR will be returned if opendir() fails when trying to open path. Parameters: ctx - pointer to the SSL context, created with wolfSSL_CTX_new(). file - pointer to name of the file containing PEM-formatted CA certificates path - pointer to the name of a directory to load PEM-formatted certificates from. Example: int ret = 0; WOLFSSL_CTX* ctx; ... ret = wolfSSL_CTX_load_verify_locations(ctx, “./ca-cert.pem”, 0); if (ret != SSL_SUCCESS) { /*error loading CA certs*/ } ... See Also: wolfSSL_CTX_load_verify_buffer wolfSSL_CTX_use_certificate_file wolfSSL_CTX_use_PrivateKey_file wolfSSL_CTX_use_NTRUPrivateKey_file wolfSSL_CTX_use_certificate_chain_file wolfSSL_use_certificate_file wolfSSL_use_PrivateKey_file wolfSSL_use_certificate_chain_file wolfSSL_CTX_use_PrivateKey_buffer Synopsis: int wolfSSL_CTX_use_PrivateKey_buffer(WOLFSSL_CTX* ctx, const unsigned char* in, long sz, int format); Description: This function loads a private key buffer into the SSL Context. It behaves like the nonbuffered version, only differing in its ability to be called with a buffer as input instead of a file. The buffer is provided by the in argument of size sz. format specifies the format type of the buffer; SSL_FILETYPE_ASN1or SSL_FILETYPE_PEM. Please see the examples for proper usage. Return Values: If successful the call will return SSL_SUCCESS. SSL_BAD_FILETYPE will be returned if the file is the wrong format. SSL_BAD_FILE will be returned if the file doesn’t exist, can’t be read, or is corrupted. MEMORY_E will be returned if an out of memory condition occurs. ASN_INPUT_E will be returned if Base16 decoding fails on the file. NO_PASSWORD will be returned if the key file is encrypted but no password is provided. Parameters: ctx - pointer to the SSL context, created with wolfSSL_CTX_new(). in - the input buffer containing the private key to be loaded. sz - the size of the input buffer. format - the format of the private key located in the input buffer (in). Possible values are SSL_FILETYPE_ASN1 or SSL_FILETYPE_PEM. Example: int ret = 0; int sz = 0; WOLFSSL_CTX* ctx; byte keyBuff[...]; ... ret = wolfSSL_CTX_use_PrivateKey_buffer(ctx, keyBuff, sz, SSL_FILETYPE_PEM); if (ret != SSL_SUCCESS) { /*error loading private key from buffer*/ } ... See Also: wolfSSL_CTX_load_verify_buffer wolfSSL_CTX_use_certificate_buffer wolfSSL_CTX_use_NTRUPrivateKey_file wolfSSL_CTX_use_certificate_chain_buffer wolfSSL_use_certificate_buffer wolfSSL_use_PrivateKey_buffer wolfSSL_use_certificate_chain_buffer wolfSSL_CTX_use_PrivateKey_file Synopsis: int wolfSSL_CTX_use_PrivateKey_file(WOLFSSL_CTX* ctx, const char* file, int format); Description: This function loads a private key file into the SSL context (WOLFSSL_CTX). The file is provided by the file argument. The format argument specifies the format type of the file - SSL_FILETYPE_ASN1or SSL_FILETYPE_PEM. Please see the examples for proper usage. Return Values: If successful the call will return SSL_SUCCESS, otherwise SSL_FAILURE will be returned. If the function call fails, possible causes might include: - The file is in the wrong format, or the wrong format has been given using the “format” argument - The file doesn’t exist, can’t be read, or is corrupted - An out of memory condition occurs - Base16 decoding fails on the file - The key file is encrypted but no password is provided Example: int ret = 0; WOLFSSL_CTX* ctx; ... ret = wolfSSL_CTX_use_PrivateKey_file(ctx, “./server-key.pem”, SSL_FILETYPE_PEM); if (ret != SSL_SUCCESS) { /*error loading key file*/ } ... See Also: wolfSSL_CTX_use_PrivateKey_buffer wolfSSL_use_PrivateKey_file wolfSSL_use_PrivateKey_buffer wolfSSL_get_privateKey Synopsis: WOLFSSL_EVP_PKEY *wolfSSL_get_privatekey(const WOLFSSL *ssl) Description: This function gets a pointer to a private-key of the X.509 certificate in the SSL. Return Values: If successful the call will return EVP_PKEY of the SSL, otherwise NULL will be returned when No private key is loaded and getting a private key failed. Example: WOLFSSL* ssl; WOLFSSL_EVP_PKEY* evp_key; ... evp_key = wolfSSL_get_privatekey(ssl); ... See Also: wolfSSL_CTX_new wolfSSL_CTX_use_PrivateKey_file wolfSSL_CTX_use_PrivateKey_buffer wolfSSL_new wolfSSL_EVP_PKEY_free wolfSSL_free wolfSSL_CTX_free wolfSSL_CTX_use_certificate_buffer Synopsis: int wolfSSL_CTX_use_certificate_buffer(WOLFSSL_CTX* ctx, const unsigned char* in, long sz, int format); Description: This function loads a certificate buffer into the WOLFSSL Context. It behaves like the non-buffered version, only differing in its ability to be called with a buffer as input instead of a file. The buffer is provided by the in argument of size sz. format specifies the format type of the buffer; SSL_FILETYPE_ASN1 or SSL_FILETYPE_PEM. Please see the examples for proper usage. Return Values: If successful the call will return SSL_SUCCESS. SSL_BAD_FILETYPE will be returned if the file is the wrong format. SSL_BAD_FILE will be returned if the file doesn’t exist, can’t be read, or is corrupted. MEMORY_E will be returned if an out of memory condition occurs. ASN_INPUT_E will be returned if Base16 decoding fails on the file. Parameters: ctx - pointer to the SSL context, created with wolfSSL_CTX_new(). in - the input buffer containing the certificate to be loaded. sz - the size of the input buffer. format - the format of the certificate located in the input buffer (in). Possible values are SSL_FILETYPE_ASN1 or SSL_FILETYPE_PEM. Example: int ret = 0; int sz = 0; WOLFSSL_CTX* ctx; byte certBuff[...]; ... ret = wolfSSL_CTX_use_certificate_buffer(ctx, certBuff, sz, SSL_FILETYPE_PEM); if (ret != SSL_SUCCESS) { /*error loading certificate from buffer*/ } ... See Also: wolfSSL_CTX_load_verify_buffer wolfSSL_CTX_use_PrivateKey_buffer wolfSSL_CTX_use_NTRUPrivateKey_file wolfSSL_CTX_use_certificate_chain_buffer wolfSSL_use_certificate_buffer wolfSSL_use_PrivateKey_buffer wolfSSL_use_certificate_chain_buffer wolfSSL_CTX_use_certificate_chain_buffer Synopsis: int wolfSSL_CTX_use_certificate_chain_buffer(WOLFSSL_CTX* ctx, const unsigned char* in, long sz); Description: This function loads a certificate chain buffer into the WOLFSSL Context. It behaves like the non-buffered version, only differing in its ability to be called with a buffer as input instead of a file. The buffer is provided by the in argument of size sz. The buffer must be in PEM format and start with the subject’s certificate, ending with the root certificate. Please see the examples for proper usage. Return Values: If successful the call will return SSL_SUCCESS. SSL_BAD_FILETYPE will be returned if the file is the wrong format. SSL_BAD_FILE will be returned if the file doesn’t exist, can’t be read, or is corrupted. MEMORY_E will be returned if an out of memory condition occurs. ASN_INPUT_E will be returned if Base16 decoding fails on the file. BUFFER_E will be returned if a chain buffer is bigger than the receiving buffer. Parameters: ctx - pointer to the SSL context, created with wolfSSL_CTX_new(). in - the input buffer containing the PEM-formatted certificate chain to be loaded. sz - the size of the input buffer. Example: int ret = 0; int sz = 0; WOLFSSL_CTX* ctx; byte certChainBuff[...]; ... ret = wolfSSL_CTX_use_certificate_chain_buffer(ctx, certChainBuff, sz); if (ret != SSL_SUCCESS) { /*error loading certificate chain from buffer*/ } ... See Also: wolfSSL_CTX_load_verify_buffer wolfSSL_CTX_use_certificate_buffer wolfSSL_CTX_use_PrivateKey_buffer wolfSSL_CTX_use_NTRUPrivateKey_file wolfSSL_use_certificate_buffer wolfSSL_use_PrivateKey_buffer wolfSSL_use_certificate_chain_buffer wolfSSL_CTX_use_certificate_chain_file Synopsis: int wolfSSL_CTX_use_certificate_chain_file(WOLFSSL_CTX* ctx, const char* file); Description: This function loads a chain of certificates into the SSL context (WOLFSSL_CTX). The file containing the certificate chain is provided by the file argument, and must contain PEM-formatted certificates. This function will process up to MAX_CHAIN_DEPTH (default = 9, defined in internal.h) certificates, plus the subject cert. Return Values: If successful the call will return SSL_SUCCESS, otherwise SSL_FAILURE will be returned. If the function call fails, possible causes might include: - The file is in the wrong format, or the wrong format has been given using the “format” argument - file doesn’t exist, can’t be read, or is corrupted - an out of memory condition occurs Parameters: ctx - a pointer to a WOLFSSL_CTX structure, created using wolfSSL_CTX_new() file - a pointer to the name of the file containing the chain of certificates to be loaded into the wolfSSL SSL context. Certificates must be in PEM format. Example: int ret = 0; WOLFSSL_CTX* ctx; ... ret = wolfSSL_CTX_use_certificate_chain_file(ctx, “./cert-chain.pem”); if (ret != SSL_SUCCESS) { /*error loading cert file*/ } ... See Also: wolfSSL_CTX_use_certificate_file wolfSSL_CTX_use_certificate_buffer wolfSSL_use_certificate_file wolfSSL_use_certificate_buffer wolfSSL_CTX_use_certificate_file Synopsis: int wolfSSL_CTX_use_certificate_file(WOLFSSL_CTX* ctx, const char* file, int format); Description: This function loads a certificate file into the SSL context (WOLFSSL_CTX). The file is provided by the file argument. The format argument specifies the format type of the file, either SSL_FILETYPE_ASN1 or SSL_FILETYPE_PEM. Please see the examples for proper usage. Return Values: If successful the call will return SSL_SUCCESS, otherwise SSL_FAILURE will be returned. If the function call fails, possible causes might include: - The file is in the wrong format, or the wrong format has been given using the “format” argument - file doesn’t exist, can’t be read, or is corrupted - an out of memory condition occurs - Base16 decoding fails on the file Parameters: ctx - a pointer to a WOLFSSL_CTX structure, created using wolfSSL_CTX_new() file - a pointer to the name of the file containing the certificate to be loaded into the wolfSSL SSL context. format - format of the certificates pointed to by file. Possible options are SSL_FILETYPE_ASN1 or SSL_FILETYPE_PEM. Example: int ret = 0; WOLFSSL_CTX* ctx; ... ret = wolfSSL_CTX_use_certificate_file(ctx, “./client-cert.pem”, SSL_FILETYPE_PEM); if (ret != SSL_SUCCESS) { /*error loading cert file*/ } ... See Also: wolfSSL_CTX_use_certificate_buffer wolfSSL_use_certificate_file wolfSSL_use_certificate_buffer wolfSSL_SetTmpDH Synopsis: #include int wolfSSL_SetTmpDH(WOLFSSL* ssl, unsigned char* p, int pSz, unsigned char* g, int gSz); Description: Server Diffie-Hellman Ephemeral parameters setting. This function sets up the group parameters to be used if the server negotiates a cipher suite that uses DHE. Return Values: If successful the call will return SSL_SUCCESS. MEMORY_ERROR will be returned if a memory error was encountered. SIDE_ERROR will be returned if this function is called on an SSL client instead of an SSL server. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). p - Diffie-Hellman prime number parameter. pSz - size of p. g - Diffie-Hellman “generator” parameter. gSz - size of g. Example: WOLFSSL* ssl; static unsigned char p[] = {...}; static unsigned char g[] = {...}; ... wolfSSL_SetTmpDH(ssl, p, sizeof(p), g, sizeof(g)); See Also: SSL_accept wolfSSL_use_PrivateKey Synopsis: #include SSL_use_PrivateKey -> int wolfSSL_use_PrivateKey(WOLFSSL* ssl, WOLFSSL_EVP_PKEY* pkey); Description: This is used to set the private key for the WOLFSSL structure. Return Values: SSL_SUCCESS: On successful setting argument. SSL_FAILURE: If an NULL ssl passed in. All error cases will be negative values. Parameters: ssl - WOLFSSL structure to set argument in. pkey - private key to use. Example: WOLFSSL* ssl; WOLFSSL_EVP_PKEY* pkey; int ret; // create ssl object and set up private key ret = wolfSSL_use_PrivateKey(ssl, pkey); // check ret value See Also: wolfSSL_new, wolfSSL_free, wolfSSL_use_PrivateKey wolfSSL_use_PrivateKey_ASN1 Synopsis: #include SSL_use_PrivateKey_ASN1 -> int wolfSSL_use_PrivateKey_ASN1(int pri, WOLFSSL* ssl, unsigned char* der, long derSz); Description: This is used to set the private key for the WOLFSSL structure. A DER formatted key buffer is expected Return Values: SSL_SUCCESS: On successful setting parsing and setting the private key. SSL_FAILURE: If an NULL ssl passed in. All error cases will be negative values. Parameters: pri - type of private key. ssl - WOLFSSL structure to set argument in. der -buffer holding DER key. derSz - size of der buffer. Example: WOLFSSL* ssl; unsigned char* pkey; long pkeySz; int ret; // create ssl object and set up private key ret = wolfSSL_use_PrivateKey_ASN1(1, ssl, pkey, pkeySz); // check ret value See Also: wolfSSL_new, wolfSSL_free, wolfSSL_use_PrivateKey wolfSSL_use_RSAPrivateKey_ASN1 Synopsis: #include SSL_use_RSAPrivateKey_ASN1 -> int wolfSSL_use_RSAPrivateKey_ASN1(WOLFSSL* ssl, unsigned char* der, long derSz); Description: This is used to set the private key for the WOLFSSL structure. A DER formatted RSA key buffer is expected Return Values: SSL_SUCCESS: On successful setting parsing and setting the private key. SSL_FAILURE: If an NULL ssl passed in. All error cases will be negative values. Parameters: ssl - WOLFSSL structure to set argument in. der -buffer holding DER key. derSz - size of der buffer. Example: WOLFSSL* ssl; unsigned char* pkey; long pkeySz; int ret; // create ssl object and set up RSA private key ret = wolfSSL_use_RSAPrivateKey_ASN1(ssl, pkey, pkeySz); // check ret value See Also: wolfSSL_new, wolfSSL_free, wolfSSL_use_PrivateKey wolfSSL_use_PrivateKey_buffer Synopsis: #include int wolfSSL_use_PrivateKey_buffer(WOLFSSL* ssl, const unsigned char* in, long sz, int format); Description: This function loads a private key buffer into the WOLFSSL object. It behaves like the non-buffered version, only differing in its ability to be called with a buffer as input instead of a file. The buffer is provided by the in argument of size sz. format specifies the format type of the buffer; SSL_FILETYPE_ASN1 or SSL_FILETYPE_PEM. Please see the examples for proper usage. Return Values: If successful the call will return SSL_SUCCESS. SSL_BAD_FILETYPE will be returned if the file is the wrong format. SSL_BAD_FILE will be returned if the file doesn’t exist, can’t be read, or is corrupted. MEMORY_E will be returned if an out of memory condition occurs. ASN_INPUT_E will be returned if Base16 decoding fails on the file. NO_PASSWORD will be returned if the key file is encrypted but no password is provided. Parameters: ssl - pointer to the SSL session, created with wolfSSL_new(). in - buffer containing private key to load. sz - size of the private key located in buffer. format - format of the private key to be loaded. Possible values are SSL_FILETYPE_ASN1 or SSL_FILETYPE_PEM. Example: int buffSz; int ret; byte keyBuff[...]; WOLFSSL* ssl = 0; ... ret = wolfSSL_use_PrivateKey_buffer(ssl, keyBuff, buffSz, SSL_FILETYPE_PEM); if (ret != SSL_SUCCESS) { /*failed to load private key from buffer*/ } See Also: wolfSSL_use_PrivateKey wolfSSL_CTX_load_verify_buffer wolfSSL_CTX_use_certificate_buffer wolfSSL_CTX_use_PrivateKey_buffer wolfSSL_CTX_use_NTRUPrivateKey_file wolfSSL_CTX_use_certificate_chain_buffer wolfSSL_use_certificate_buffer wolfSSL_use_certificate_chain_buffer wolfSSL_use_certificate_buffer Synopsis: #include int wolfSSL_use_certificate_buffer(WOLFSSL* ssl, const unsigned char* in, long sz, int format); Description: This function loads a certificate buffer into the WOLFSSL object. It behaves like the non-buffered version, only differing in its ability to be called with a buffer as input instead of a file. The buffer is provided by the in argument of size sz. format specifies the format type of the buffer; SSL_FILETYPE_ASN1 or SSL_FILETYPE_PEM. Please see the examples for proper usage. Return Values: If successful the call will return SSL_SUCCESS. SSL_BAD_FILETYPE will be returned if the file is the wrong format. SSL_BAD_FILE will be returned if the file doesn’t exist, can’t be read, or is corrupted. MEMORY_E will be returned if an out of memory condition occurs. ASN_INPUT_E will be returned if Base16 decoding fails on the file. Parameters: ssl - pointer to the SSL session, created with wolfSSL_new(). in - buffer containing certificate to load. sz - size of the certificate located in buffer. format - format of the certificate to be loaded. Possible values are SSL_FILETYPE_ASN1 or SSL_FILETYPE_PEM. Example: int buffSz; int ret; byte certBuff[...]; WOLFSSL* ssl = 0; ... ret = wolfSSL_use_certificate_buffer(ssl, certBuff, buffSz, SSL_FILETYPE_PEM); if (ret != SSL_SUCCESS) { /*failed to load certificate from buffer*/ } See Also: wolfSSL_CTX_load_verify_buffer wolfSSL_CTX_use_certificate_buffer wolfSSL_CTX_use_PrivateKey_buffer wolfSSL_CTX_use_NTRUPrivateKey_file wolfSSL_CTX_use_certificate_chain_buffer wolfSSL_use_PrivateKey_buffer wolfSSL_use_certificate_chain_buffer wolfSSL_use_certificate_chain_buffer Synopsis: #include int wolfSSL_use_certificate_chain_buffer(WOLFSSL* ssl, const unsigned char* in, long sz); Description: This function loads a certificate chain buffer into the WOLFSSL object. It behaves like the non-buffered version, only differing in its ability to be called with a buffer as input instead of a file. The buffer is provided by the in argument of size sz. The buffer must be in PEM format and start with the subject’s certificate, ending with the root certificate. Please see the examples for proper usage. Return Values: If successful the call will return SSL_SUCCESS. SSL_BAD_FILETYPE will be returned if the file is the wrong format. SSL_BAD_FILE will be returned if the file doesn’t exist, can’t be read, or is corrupted. MEMORY_E will be returned if an out of memory condition occurs. ASN_INPUT_E will be returned if Base16 decoding fails on the file. BUFFER_E will be returned if a chain buffer is bigger than the receiving buffer. Parameters: ssl - pointer to the SSL session, created with wolfSSL_new(). in - buffer containing certificate to load. sz - size of the certificate located in buffer. Example: int buffSz; int ret; byte certChainBuff[...]; WOLFSSL* ssl = 0; ... ret = wolfSSL_use_certificate_chain_buffer(ssl, certChainBuff, buffSz); if (ret != SSL_SUCCESS) { /*failed to load certificate chain from buffer*/ } See Also: wolfSSL_CTX_load_verify_buffer wolfSSL_CTX_use_certificate_buffer wolfSSL_CTX_use_PrivateKey_buffer wolfSSL_CTX_use_NTRUPrivateKey_file wolfSSL_CTX_use_certificate_chain_buffer wolfSSL_use_certificate_buffer wolfSSL_use_PrivateKey_buffer wolfSSL_CTX_der_load_verify_locations Synopsis: #include int wolfSSL_CTX_der_load_verify_locations(WOLFSSL_CTX* ctx, const char* file, int format); Description: This function is similar to wolfSSL_CTX_load_verify_locations, but allows the loading of DER-formatted CA files into the SSL context (WOLFSSL_CTX). It may still be used to load PEM-formatted CA files as well. These certificates will be treated as trusted root certificates and used to verify certs received from peers during the SSL handshake. The root certificate file, provided by the file argument, may be a single certificate or a file containing multiple certificates. If multiple CA certs are included in the same file, wolfSSL will load them in the same order they are presented in the file. The format argument specifies the format which the certificates are in either, SSL_FILETYPE_PEM or SSL_FILETYPE_ASN1 (DER). Unlike wolfSSL_CTX_load_verify_locations, this function does not allow the loading of CA certificates from a given directory path. Note that this function is only available when the wolfSSL library was compiled with WOLFSSL_DER_LOAD defined. Return Values: If successful the call will return SSL_SUCCESS, otherwise SSL_FAILURE will be returned upon failure. Parameters: ctx - a pointer to a WOLFSSL_CTX structure, created using wolfSSL_CTX_new() file - a pointer to the name of the file containing the CA certificates to be loaded into the wolfSSL SSL context, with format as specified by format. format - the encoding type of the certificates specified by file. Possible values include SSL_FILETYPE_PEM and SSL_FILETYPE_ASN1. Example: int ret = 0; WOLFSSL_CTX* ctx; ... ret = wolfSSL_CTX_der_load_verify_locations(ctx, “./ca-cert.der”, SSL_FILETYPE_ASN1); if (ret != SSL_SUCCESS) { /*error loading CA certs*/ } ... See Also: wolfSSL_CTX_load_verify_locations wolfSSL_CTX_load_verify_buffer wolfSSL_CTX_use_NTRUPrivateKey_file Synopsis: #include int wolfSSL_CTX_use_NTRUPrivateKey_file(WOLFSSL_CTX* ctx, const char* file); Description: This function loads an NTRU private key file into the WOLFSSL Context. It behaves like the normal version, only differing in its ability to accept an NTRU raw key file. This function is needed since the format of the file is different than the normal key file (buffer) functions. Please see the examples for proper usage. Return Values: If successful the call will return SSL_SUCCESS. SSL_BAD_FILE will be returned if the file doesn’t exist, can’t be read, or is corrupted. MEMORY_E will be returned if an out of memory condition occurs. ASN_INPUT_E will be returned if Base16 decoding fails on the file. BUFFER_E will be returned if a chain buffer is bigger than the receiving buffer. NO_PASSWORD will be returned if the key file is encrypted but no password is provided. Parameters: ctx - a pointer to a WOLFSSL_CTX structure, created using wolfSSL_CTX_new() file - a pointer to the name of the file containing the NTRU private key to be loaded into the wolfSSL SSL context. Example: int ret = 0; WOLFSSL_CTX* ctx; ... ret = wolfSSL_CTX_use_NTRUPrivateKey_file(ctx, “./ntru-key.raw”); if (ret != SSL_SUCCESS) { /*error loading NTRU private key*/ } ... See Also: wolfSSL_CTX_load_verify_buffer wolfSSL_CTX_use_certificate_buffer wolfSSL_CTX_use_PrivateKey_buffer wolfSSL_CTX_use_certificate_chain_buffer wolfSSL_use_certificate_buffer wolfSSL_use_PrivateKey_buffer wolfSSL_use_certificate_chain_buffer wolfSSL_KeepArrays Synopsis: #include void wolfSSL_KeepArrays(WOLFSSL* ssl); Description: Normally, at the end of the SSL handshake, wolfSSL frees temporary arrays. Calling this function before the handshake begins will prevent wolfSSL from freeing temporary arrays. Temporary arrays may be needed for things such as wolfSSL_get_keys() or PSK hints. When the user is done with temporary arrays, either wolfSSL_FreeArrays() may be called to free the resources immediately, or alternatively the resources will be freed when the associated SSL object is freed. Return Values: This function has no return value. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). Example: WOLFSSL* ssl; ... wolfSSL_KeepArrays(ssl); See Also: wolfSSL_FreeArrays wolfSSL_FreeArrays Synopsis: #include void wolfSSL_FreeArrays(WOLFSSL* ssl); Description: Normally, at the end of the SSL handshake, wolfSSL frees temporary arrays. If wolfSSL_KeepArrays() has been called before the handshake, wolfSSL will not free temporary arrays. This function explicitly frees temporary arrays and should be called when the user is done with temporary arrays and does not want to wait for the SSL object to be freed to free these resources. Return Values: This function has no return value. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). Example: WOLFSSL* ssl; ... wolfSSL_FreeArrays(ssl); See Also: wolfSSL_KeepArrays wolfSSL_UnloadCertsKeys Synopsis: #include int wolfSSL_UnloadCertsKeys(WOLFSSL* ssl); Description: This function unloads any certificates or keys that SSL owns. Return Values: SSL_SUCCESS - returned if the function executed successfully. BAD_FUNC_ARG - returned if the WOLFSSL object is NULL. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). Example: WOLFSSL* ssl = wolfSSL_new(ctx); … int unloadKeys = wolfSSL_UnloadCertsKeys(ssl); if(unloadKeys != SSL_SUCCESS){ /*Failure case. */ } See Also: wolfSSL_CTX_UnloadCAs wolfSSL_CTX_get_cert_cache_memsize Synopsis: #include int wolfSSL_CTX_get_cert_cache_memsize(WOLFSSL_CTX* ctx); Description: Returns the size the certificate cache save buffer needs to be. Return Values: If the funciton is successful an INTEGER value is returned representing the memory size. BAD_FUNC_ARG is returned if the WOLFSSL_CTX struct is NULL. BAD_MUTEX_E - returned if there was a mutex lock error. Parameters: ctx - a pointer to a wolfSSL_CTX structure, created using wolfSSL_CTX_new(). Example: WOLFSSL_CTX* ctx = WOLFSSL_CTX_new(/*protocol*/); … int certCacheSize = wolfSSL_CTX_get_cert_cache_memsize(ctx); if(certCacheSize != BAD_FUNC_ARG || certCacheSize != BAD_MUTEX_E){ /*Successfully retrieved the memory size. */ } See Also: CM_GetCertCacheMemSize wolfSSL_X509_get_signature_type Synopsis: #include int wolfSSL_X509_get_signature_type(WOLFSSL_X509* x509); Description: This function returns the value stored in the sigOID member of the WOLFSSL_X509 structure. Return Values: 0 - returned if the WOLFSSL_X509 structure is NULL. An Integer value is returned which was retrieved from the x509 object. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). Example: WOLFSSL_X509 x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL, DYNAMIC_TYPE_X509); … int x509SigType = wolfSSL_X509_get_signature_type(x509); if(x509SigType != EXPECTED){ /*Deal with an unexpected value*/ } See Also: wolfSSL_X509_get_signature wolfSSL_X509_version wolfSSL_X509_get_der wolfSSL_X509_get_serial_number wolfSSL_X509_notBefore wolfSSL_X509_notAfter wolfSSL_X509_free wolfSSL_X509_get_next_altname Synopsis: #include char* wolfSSL_X509_get_next_altname(WOLFSSL_X509* cert); Description: This function returns the next, if any, altname from the peer certificate. Return Values: NULL if there is not a next altname. cert->altNamesNext->name from the WOLFSSL_X509 structure that is a string value from the altName list is returned if it exists. Parameters: cert - a pointer to the wolfSSL_X509 structure. Example: WOLFSSL_X509 x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL, DYNAMIC_TYPE_X509); … int x509NextAltName = wolfSSL_X509_get_next_altname(x509); if(x509NextAltName == NULL){ /*There isn’t another alt name*/ } See Also: wolfSSL_X509_get_issuer_name wolfSSL_X509_get_subject_name wolfSSL_X509_get_subjectCN Synopsis: #include char* wolfSSL_X509_get_subjectCN(WOLFSSL_X509* x509); Description: Returns the common name of the subject from the certificate. Return Values: NULL - returned if the x509 structure is null A string representation of the subject’s common name is returned if the function executes successfully. Parameters: x509 - a pointer to a WOLFSSL_X509 structure containing certificate information. Example: WOLFSSL_X509 x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL, DYNAMIC_TYPE_X509); … int x509Cn = wolfSSL_X509_get_subjectCN(x509); if(x509Cn == NULL){ /*Deal with NULL case*/ } else { /*x509Cn contains the common name*/ } See Also: wolfSSL_X509_Name_get_entry wolfSSL_X509_get_next_altname wolfSSL_X509_get_issuer_name wolfSSL_X509_get_subject_name wolfSSL_X509_get_der Synopsis: #include const byte* wolfSSL_X509_get_der(WOLFSSL_X509* x509, int* outSz); Description: This function gets the DER encoded certificate in the WOLFSSL_X509 struct. Return Values: This function returns the DerBuffer structure’s buffer member, which is of type byte. NULL - returned if the x509 or outSz parameter is NULL. Parameters: x509 - a pointer to a WOLFSSL_X509 structure containing certificate information. outSz - length of the derBuffer member of the WOLFSSL_X509 struct. Example: WOLFSSL_X509 x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL, DYNAMIC_TYPE_X509); int* outSz; /*initialize*/ … byte* x509Der = wolfSSL_X509_get_der(x509, outSz); if(x509Der == NULL){ /*Failure case one of the parameters was NULL */ } See Also: wolfSSL_X509_version wolfSSL_X509_Name_get_entry wolfSSL_X509_get_next_altname wolfSSL_X509_get_issuer_name wolfSSL_X509_get_subject_name wolfSSL_X509_get_hw_type Synopsis: #include byte* wolfSSL_X509_get_hw_type(WOLFSSL_X509* x509, byte* in, int* inOutSz); Description: The function copies the hwType member of the WOLFSSL_X509 structure to the buffer. Return Values: The function returns a byte type of the data previously held in the hwType member of the WOLFSSL_X509 structure. NULL - returned if inOutSz is NULL. Parameters: x509 - a pointer to a WOLFSSL_X509 structure containing certificate information. in - pointer to type byte that represents the buffer. inOutSz - pointer to type int that represents the size of the buffer. Example: WOLFSSL_X509* x509; /*X509 certificate*/ byte* in; /*initialize the buffer*/ int* inOutSz; /*holds the size of the buffer*/ ... byte* hwType = wolfSSL_X509_get_hw_type(x509, in, inOutSz); if(hwType == NULL){ /*Failure case function returned NULL. */ } See Also: wolfSSL_X509_get_hw_serial_number wolfSSL_X509_get_device_type wolfSSL_X509_d2i_fp Synopsis: #include WOLFSSL_X509* wolfSSL_X509_d2i_fp(WOLFSSL_X509** x509, XFILE file); Description: If NO_STDIO_FILESYSTEM is defined this function will allocate heap memory, initialize a WOLFSSL_X509 structure and return a pointer to it. Return Values: WOLFSSL_X509 structure pointer is returned if the function executes successfully. NULL - if the call to XFTELL macro returns a negative value. Parameters: x509 - a pointer to a WOLFSSL_X509 pointer. file - a defined type that is a pointer to a FILE. Example: WOLFSSL_X509* x509a = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL, DYNAMIC_TYPE_X509); WOLFSSL_X509** x509 = x509a; XFILE file; (mapped to struct fs_file*) ... WOLFSSL_X509* newX509 = wolfSSL_X509_d2i_fp(x509, file); if(newX509 == NULL){ /*The function returned NULL */ } See Also: wolfSSL_X509_d2i XFTELL XREWIND XFSEEK wolfSSL_SetCertCbCtx Synopsis: #include void wolfSSL_SetCertCbCtx(WOLFSSL* ssl, void* ctx); Description: This function stores user CTX object information for verify callback. Return Values: This function has no return value. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). ctx - a void pointer that is set to WOLFSSL structure’s verifyCbCtx member’s value. Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*method*/); WOLFSSL* ssl = wolfSSL_new(ctx); (void*)ctx; … if(ssl != NULL){ wolfSSL_SetCertCbCtx(ssl, ctx); } else { /*Error case, the SSL is not initialized properly. */ } See Also: wolfSSL_CTX_save_cert_cache wolfSSL_CTX_restore_cert_cache wolfSSL_CTX_set_verify wolfSSL_CertPemToDer Synopsis: #include int wolfSSL_CertPemToDer(const unsigned char* pem, int pemSz, Unsigned char* buff, int buffSz, int type); Description: This function converts a PEM formatted certificate to DER format. Calls OpenSSL function PemToDer. Return Values: Returns the bytes written to the buffer. Parameters: pem - pointer PEM formatted certificate. pemSz - size of the certificate. buff - buffer to be copied to DER format. buffSz - size of the buffer. type - Certificate file type found in asn_public.h enum CertType. Example: const unsigned char* pem; int pemSz; unsigned char buff[BUFSIZE]; int buffSz = sizeof(buff)/sizeof(char); int type; ... if(wolfSSL_CertPemToDer(pem, pemSz, buff, buffSz, type) <= 0) { /*There were bytes written to buffer*/ } See Also: PemToDer (OpenSSL) wolfSSL_X509_notAfter Synopsis: #include const byte* wolfSSL_X509_notAfter(wolfSSL_X509* x509); Description: This function checks to see if x509 is NULL and if it’s not, it returns the notAfter member of the x509 struct. Return Values: The function returns a constant byte pointer to the notAfter member of the x509 struct. NULL - returned if the x509 object is NULL. Parameters: x509 - a pointer to the WOLFSSL_X509 struct. Example: WOLFSSL_X509* x509 = (WOLFSSL_X509)XMALOC(sizeof(WOLFSSL_X509), NULL, DYNAMIC_TYPE_X509) ; ... byte* notAfter = wolfSSL_X509_notAfter(x509); if(notAfter == NULL){ /*Failure case, the x509 object is null. */ } See Also: wolfssl/openssl/ssl.h cyassl/ssl.h wolfSSL_get_peer_certificate Synopsis: #include WOLFSSL_X509* wolfSSL_get_peer_certificate(WOLFSSL* ssl); Description: This function gets the peer’s certificate. Return Values: Returns a pointer to the peerCert member of the WOLFSSL_X509 structure if it exists. 0 - returned if the peer certificate issuer size is not defined. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*method*/); WOLFSSL* ssl = wolfSSL_new(ctx); ... WOLFSSL_X509* peerCert = wolfSSL_get_peer_certificate(ssl); if(peerCert){ /*You have a pointer peerCert to the peer certification*/ } See Also: wolfSSL_X509_get_issuer_name wolfSSL_X509_get_subject_name wolfSSL_X509_get_isCA wolfSSL_get_peer_cert_chain Synopsis: #include STACK_OF(WOLFSSL_X509)* wolfSSL_get_peer_cert_chain(const WOLFSSL* ssl); Description: This function gets the peer’s certificate chain. Return Values: Returns a pointer to the peer’s Certificate stack. NULL - returned if no peer certificate. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*method*/); WOLFSSL* ssl = wolfSSL_new(ctx); … wolfSSL_connect(ssl); STACK_OF(WOLFSSL_X509)* chain = wolfSSL_get_peer_cert_chain(ssl); ifchain){ /*You have a pointer to the peer certificate chain*/ } See Also: wolfSSL_X509_get_issuer_name wolfSSL_X509_get_subject_name wolfSSL_X509_get_isCA wolfSSL_X509_get_isCA Synopsis: #include int wolfSSL_X509_get_isCA(WOLFSSL_X509* x509); Description: Checks the isCa member of the WOLFSSL_X509 structure and returns the value. Return Values: The value in the isCA member of the WOLFSSL_X509 structure is returned. 0 - returned if there is not a valid x509 structure passed in. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). Example: WOLFSSL* ssl; … WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*method*/); WOLFSSL* ssl = wolfSSL_new(ctx); … if(wolfSSL_X509_get_isCA(ssl)){ /*This is the CA*/ }else { /*Failure case*/ } See Also: wolfSSL_X509_get_issuer_name wolfSSL_X509_get_isCA wolfSSL_CTX_save_cert_cache Synopsis: #include int wolfSSL_CTX_save_cert_cache(WOLFSSL_CTX* ctx, const char* fname); Description: This function writes the cert cache from memory to file. Return Values: SSL_SUCCESS - if CM_SaveCertCache exits normally. BAD_FUNC_ARG - is returned if either of the arguments are NULL. SSL_BAD_FILE - if the cert cache save file could not be opened. BAD_MUTEX_E - if the lock mutex failed. MEMORY_E - the allocation of memory failed. FWRITE_ERROR - Certificate cache file write failed. Parameters: ctx - a pointer to a WOLFSSL_CTX structure, holding the certificate information. fname - the cert cache buffer. Example: WOLFSSL_CTX* ctx = WOLFSSL_CTX_new(/*protocol def*/); const char* fname; ... if(wolfSSL_CTX_save_cert_cache(ctx, fname)){ /*file was written. */ } See Also: CM_SaveCertCache DoMemSaveCertCache wolfSSL_CTX_restore_cert_cache Synopsis: #include int wolfSSL_CTX_restore_cert_cache(WOLFSSL_CTX* ctx, const char* fname) ; Description: This function persistes certificate cache from a file. Return Values: SSL_SUCCESS - returned if the function, CM_RestoreCertCache, executes normally. SSL_BAD_FILE - returned if XFOPEN returns XBADFILE. The file is corrupted. MEMORY_E - returned if the allocated memory for the temp buffer fails. BAD_FUNC_ARG - returned if fname or ctx have a NULL value. Parameters: ctx - a pointer to a WOLFSSL_CTX structure, holding the certificate information. fname - the cert cache buffer. Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*protocol method*/); WOLFSSL* ssl = wolfSSL_new(ctx); const char* fname = /*path to file*/; ... if(wolfSSL_CTX_restore_cert_cache(ctx, fname)){ /*check to see if the execution was successful */ } See Also: CM_RestoreCertCache XFOPEN wolfSSL_get_chain_X509 Synopsis: #include WOLFSSL_X509* wolfSSL_get_chain_X509(WOLFSSL_X509_CHAIN* chain, int idx); Description: This function gets the peer’s wolfSSL_X509_certificate at index (idx) from the chain of certificates. Return Values: The function returns a pointer to a WOLFSSL_X509 structure. Parameters: chain - a pointer to the WOLFSSL_X509_CHAIN used for no dynamic memory SESSION_CACHE. idx - the index of the WOLFSSL_X509 certificate. Example: WOLFSSL_X509_CHAIN* chain = &session->chain; int idx = /*set idx*/; … WOLFSSL_X509_CHAIN ptr; prt = wolfSSL_get_chain_X509(chain, idx); if(ptr != NULL){ /*ptr contains the cert at the index specified*/ } else { /*ptr is NULL*/ } See Also: InitDecodedCert ParseCertRelative CopyDecodedToX509 wolfSSL_wolfSSL_X509_notBefore Synopsis: #include const byte* wolfSSL_X509_notBefore(WOLFSSL_X509* x509); Description: The function checks to see if x509 is NULL and if it’s not, it returns the notBefore member of the x509 struct. Return Values: This function returns a constant byte pointer to the x509’s member notAfter. NULL - the function returns NULL if the x509 structure is NULL. Parameters: x509 - a pointer to the WOLFSSL_X509 struct. Example: WOLFSSL_X509* x509 = (WOLFSSL_X509)XMALLOC(sizeof(WOLFSSL_X509), NULL, DYNAMIC_TYPE_X509) ; … byte* notAfter = wolfSSL_X509_notAfter(x509); if(notAfter == NULL){ /*The x509 object was NULL */ } See Also: wolfSSL_X509_notAfter wolfSSL_X509_get_signature Synopsis: #include int wolfSSL_X509_get_signature(WOLFSSL_X509* x509, unsigned char* buf, int bufSz); Description: Gets the X509 signature and stores it in the buffer. Return Values: SSL_SUCCESS - returned if the function successfully executes. The signature is loaded into the buffer. SSL_FATAL_ERRROR - returns if the x509 struct or the bufSz member is NULL. There is also a check for the length member of the sig structure (sig is a member of x509). Parameters: x509 - pointer to a WOLFSSL_X509 structure.. buf - a char pointer to the buffer. bufSz - an integer pointer to the size of the buffer. Example: WOLFSSL_X509* x509 = (WOLFSSL_X509)XMALLOC(sizeof(WOLFSSL_X509), NULL, DYNAMIC_TYPE_X509); unsigned char* buf; /*Initialize*/ int* bufSz = sizeof(buf)/sizeof(unsigned char); ... if(wolfSSL_X509_get_signature(x509, buf, bufSz) != SSL_SUCCESS){ /*The function did not execute successfully. */ } else{ /*The buffer was written to correctly. */ } See Also: wolfSSL_X509_get_serial_number wolfSSL_X509_get_signature_type wolfSSL_X509_get_device_type wolfSSL_X509_get_device_type Synopsis: #include byte* wolfSSL_X509_get_device_type(WOLFSSL_X509* x509, byte* in, int* inOutSz); Description: This function copies the device type from the x509 structure to the buffer. Return Values: Returns a byte pointer holding the device type from the x509 structure. NULL - returned if the buffer size is NULL. Parameters: x509 - pointer to a WOLFSSL_X509 structure, created with WOLFSSL_X509_new(). in - a pointer to a byte type that will hold the device type (the buffer). inOutSz - the minimum of either the parameter inOutSz or the deviceTypeSz member of the x509 structure. Example: WOLFSSL_X509* x509 = (WOLFSSL_X509)XMALLOC(sizeof(WOLFSSL_X509), NULL, DYNAMIC_TYPE_X509); byte* in; int* inOutSz; ... byte* deviceType = wolfSSL_X509_get_device_type(x509, in, inOutSz); if(!deviceType){ /*Failure case, NULL was returned. */ } See Also: wolfSSL_X509_get_hw_type wolfSSL_X509_get_hw_serial_number wolfSSL_X509_d2i wolfSSL_CTX_memsave_cert_cache Synopsis: #include int wolfSSL_CTX_memsave_cert_cache(WOLFSSL_CTX* ctx, void* mem, int sz, int* used); Description: This function persists the certificate cache to memory. Return Values: SSL_SUCCESS - returned on successful execution of the function. No errors were thrown. BAD_MUTEX_E - mutex error where the WOLFSSL_CERT_MANAGER member caLock was not 0 (zero). BAD_FUNC_ARG - returned if ctx, mem, or used is NULL or if sz is less than or equal to 0 (zero). BUFFER_E - output buffer mem was too small. Parameters: ctx - a pointer to a WOLFSSL_CTX structure, created using wolfSSL_CTX_new(). mem - a void pointer to the destination (output buffer). sz - the size of the output buffer. used - a pointer to size of the cert cache header. Example: WOLFSSL_CTX* ctx = WOLFSSL_CTX_new(/*protocol*/); void* mem; /*initialize */ int sz; /*sizeof mem*/ int* used; /*cert cache header*/ ... if(wolfSSL_CTX_memsave_cert_cache(ctx, mem, sz, used) != SSL_SUCCESS){ /*The function returned with an error*/ } See Also: DoMemSaveCertCache GetCertCacheMemSize CM_MemRestoreCertCache CM_GetCertCacheMemSize wolfSSL_KeyPemToDer Synopsis: #include int wolfSSL_KeyPemToDer(const unsigned char* pem, int pemSz, unsigned char* buff, int buffSz, const char* pass); Description: Converts a key in PEM format to DER format. Return Values: The function returns the number of bytes written to the buffer on successful execution. < 0 returned indicating an error. Parameters: pem - a pointer to the PEM encoded certificate. pemSz - the size of the PEM buffer (pem). buff - a pointer to the copy of the buffer member of the DerBuffer struct. buffSz - size of the buffer space allocated in the DerBuffer struct. pass - password passed into the function. Example: byte* loadBuf; /*Initialize */ long fileSz = 0; byte* bufSz; /*Initialize */ static int LoadKeyFile(byte** keyBuf, word32* keyBufSz, const char* keyFile, int typeKey, const char* pasword); … bufSz = wolfSSL_KeyPemToDer(loadBuf, (int)fileSz, saveBuf, (int)fileSz, password); if(saveBufSz > 0){ /*Bytes were written to the buffer. */ } See Also: PemToDer wolfssl_decrypt_buffer_key wolfSSL_X509_load_certificate_file Synopsis: #include WOLFSSL_X509* wolfSSL_X509_load_certificate_file(const char* fname, int format); Description: The function loads the x509 certificate into memory. Return Values: A successful execution returns pointer to a WOLFSSL_X509 structure. NULL - returned if the certificate was not able to be written. Parameters: fname - the certificate file to be loaded. format - the format of the certificate. Example: #define cliCert “certs/client-cert.pem” … X509* x509; … x509 = wolfSSL_X509_load_certificate_file(cliCert, SSL_FILETYPE_PEM); AssertNotNull(x509); See Also: InitDecodedCert PemToDer wolfSSL_get_certificate AssertNotNull wolfSSL_X509_get_issuer_name Synopsis: #include WOLFSSL_X509_NAME* wolfSSL_X509_get_issuer_name(WOLFSSL_X509* cert); Description: This function returns the name of the certificate issuer. Return Values: A pointer to the WOLFSSL_X509 struct’s issuer member is returned. NULL - if the cert passed in is NULL. Parameters: cert - a pointer to a WOLFSSL_X509 structure. Example: WOLFSSL_X509* x509; WOLFSSL_X509_NAME issuer; ... issuer = wolfSSL_X509_NAME_oneline(wolfSSL_X509_get_issuer_name(x509), 0, 0); if(!issuer){ /*NULL was returned*/ } else { /*issuer hods the name of the certificate issuer. */ } See Also: wolfSSL_X509_get_subject_name wolfSSL_X509_get_isCA wolfSSL_get_peer_certificate wolfSSL_X509_NAME_oneline wolfSSL_X509_NAME_oneline Synopsis: #include char* wolfSSL_X509_NAME_oneline(WOLFSSL_X509* name, char* in, int sz); Description: This function copies the name of the x509 into a buffer. Return Values: A char pointer to the buffer with the WOLFSSL_X509_NAME structures name member’s data is returned if the function executed normally. Parameters: name - a pointer to a WOLFSSL_X509 structure. in - a buffer to hold the name copied from the WOLFSSL_X509_NAME structure. sz - the maximum size of the buffer. Example: WOLFSSL_X509 x509; /*Initialize */ char* name; ... name = wolfSSL_X509_NAME_oneline(wolfSSL_X509_get_issuer_name(x509), 0, 0); if(name <= 0){ /*There’s nothing in the buffer. */ } See Also: wolfSSL_X509_get_subject_name wolfSSL_X509_get_issuer_name wolfSSL_X509_get_isCA wolfSSL_get_peer_certificate wolfSSL_X509_version wolfSSL_X509_get_hw_serial_number Synopsis: #include byte* wolfSSL_X509_get_hw_serial_number(WOLFSSL_X509 x509, byte* in, int* inOutSz); Description: This function returns the hwSerialNum member of the x509 object. Return Values: The function returns a byte pointer to the in buffer that will contain the serial number loaded from the x509 object. Parameters: x509 - pointer to a WOLFSSL_X509 structure containing certificate information. in - a pointer to the buffer that will be copied to. inOutSz - a pointer to the size of the buffer. Example: char* serial; byte* in; /*Initialize*/ int* inOutSz; /*Initialize to max size of buffer*/ WOLFSSL_X509 x509; ... serial = wolfSSL_X509_get_hw_serial_number(x509, in, inOutSz); if(serial == NULL || serial <= 0){ /*Failure case */ } See Also: wolfSSL_X509_get_subject_name wolfSSL_X509_get_issuer_name wolfSSL_X509_get_isCA wolfSSL_get_peer_certificate wolfSSL_X509_version wolfSSL_X509_get_subject_name Synopsis: #include WOLFSSL_X509_NAME* wolfSSL_X509_get_subject_name(WOLFSSL_X509* cert); Description: This function returns the subject member of the WOLFSSL_X509 structure. Return Values: A pointer to the WOLFSSL_X509_NAME structure. The pointer may be NULL if the WOLFSSL_X509 struct is NULL or if the subject member of the structure is NULL. Parameters: cert - a pointer to a WOLFSSL_X509 structure. Example: WOLFSSL_X509* cert; /* Will be initialized */ WOLFSSL_X509_NAME name; … name = wolfSSL_X509_get_subject_name(cert); if(name == NULL){ /*Deal with the NULL case */ } See Also: wolfSSL_X509_get_issuer_name wolfSSL_X509_get_isCA wolfSSL_get_peer_certificate wolfSSL_X509_version Synopsis: #include int wolfSSL_X509_version(WOLFSSL_X509* x509); Description: This function retrieves the version of the X509 certificate. Return Values: 0 - returned if the x509 structure is NULL. The version stored in the x509 structure will be returned. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). Example: WOLFSSL_X509* x509; int version; ... /*Initialize */ version = wolfSSL_X509_version(x509); if(!version){ /*The function returned 0, failure case. */ } See Also: wolfSSL_X509_get_subject_name wolfSSL_X509_get_issuer_name wolfSSL_X509_get_isCA wolfSSL_get_peer_certificate wolfSSL_DeriveTlsKeys Synopsis: #include int wolfSSL_DeriveTlsKeys(byte* key_data, word32 keyLen, const byte* ms, word32 msLen, const byte* sr, const byte* cr, int tls1_2, int hash_type); Description: An external facing wrapper to derive TLS Keys. Return Values: 0 - returned on success. BUFFER_E - returned if the sum of labLen and seedLen (computes total size) exceeds the maximum size. MEMORY_E - returned if the allocation of memory failed. Parameters: key_data - a byte pointer that is allocateded in DeriveTlsKeys and passed through to PRF to hold the final hash. keyLen - a word32 type that is derived in DeriveTlsKeys from the WOLFSSL structure’s specs member. ms - a constant pointer type holding the master secret held in the arrays structure within the WOLFSSL structure. msLen - a word32 type that holds the length of the master secret in an enumerated define, SECRET_LEN. sr - a constant byte pointer to the serverRandom member of the arrays structure within the WOLFSSL structure. cr - a constant byte pointer to the clientRandom member of the arrays structure within the WOLFSSL structure. tls1_2 - an integer type returned from IsAtLeastTLSv1_2(). hash_type - an integer type held in the WOLFSSL structure. Example: int DeriveTlsKeys(WOLFSSL* ssl){ int ret; … ret = wolfSSL_DeriveTlsKeys(key_data, length, ssl->arrays->masterSecret, SECRET_LEN, ssl->arrays->clientRandom, IsAtLeastTLSv1_2(ssl), ssl->specs.mac_algorithm); … } See Also: PRF doPRF DeriveTlsKeys IsAtLeastTLSv1_2 wolfSSL_get_psk_identity Synopsis: #include const char* wolfSSL_get_psk_identity(const WOLFSSL* ssl); Description: The function returns a constant pointer to the client_identity member of the Arrays structure. Return Values: The string value of the client_identity member of the Arrays structure. NULL - if the WOLFSSL structure is NULL or if the Arrays member of the WOLFSSL structure is NULL. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*method*/); WOLFSSL* ssl = wolfSSL_new(ctx); const char* pskID; ... pskID = wolfSSL_get_psk_identity(ssl); if(pskID == NULL){ /*There is not a value in pskID*/ } See Also: wolfSSL_get_psk_identity_hint wolfSSL_use_psk_identity_hint wolfSSL_SetMinEccKey_Sz Synopsis: #include int wolfSSL_SetMinEccKey_Sz(WOLFSSL* ssl, short keySz); Description: Sets the value of the minEccKeySz member of the options structure. The options struct is a member of the WOLFSSL structure and is accessed through the ssl parameter. Return Values: SSL_SUCCESS - if the function successfully set the minEccKeySz member of the options structure. BAD_FUNC_ARG - if the WOLFSSL_CTX structure is NULL or if the key size (keySz) is less than 0 (zero) or not divisible by 8. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). keySz - value used to set the minimum ECC key size. Sets value in the options structure. Example: WOLFSSL* ssl = wolfSSL_new(ctx); /*New session */ short keySz = /*min key size allowable*/; ... if(wolfSSL_SetMinEccKey_Sz(ssl, keySz) != SSL_SUCCESS){ /*Failure case. */ } See Also: wolfSSL_CTX_SetMinEccKey_Sz wolfSSL_CTX_SetMinRsaKey_Sz wolfSSL_SetMinRsaKey_Sz wolfSSL_UseClientQSHKeys Synopsis: #include int wolfSSL_UseClientQSHKeys(WOLFSSL* ssl, unsigned char flag); Description: If the flag is 1 keys will be sent in hello. If flag is 0 then the keys will not be sent during hello. Return Values: 0 - on success. BAD_FUNC_ARG - if the WOLFSSL structure is NULL. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). flag - an unsigned char input to determine if the keys will be sent during hello. Example: WOLFSSL* ssl; unsigned char flag = 1; /*send keys*/ ... if(!wolfSSL_UseClientQSHKeys(ssl, flag)){ /*The keys will be sent during hello. */ } See Also: wolfSSL_UseALPN wolfSSL_UseSupportedQSH wolfSSL_isQSH wolfSSL_CTX_SetMinDhKey_Sz Synopsis: #include int wolfSSL_CTX_SetMinDhKey_Sz(WOLFSSL_CTX* ctx, word16 keySz); Description: This function sets the minimum size of the Diffie Hellman key size by accessing the minDhKeySz member in the WOLFSSL_CTX structure. Return Values: SSL_SUCCESS - returned if the function completes successfully. BAD_FUNC_ARG - returned if the WOLFSSL_CTX struct is NULL or if the keySz is greater than 16,000 or not divisible by 8. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). keySz - a word16 type used to set the minimum DH key size. The WOLFSSL_CTX struct holds this information in the minDhKeySz member. Example: public static int CTX_SetMinDhKey_Sz(IntPtr ctx, short minDhKey){ … return wolfSSL_CTX_SetMinDhKey_Sz(local_ctx, minDhKey); See Also: wolfSSL_SetMinDhKey_Sz CTX_SetMinDhKey_Sz wolfSSL_GetDhKey_Sz wolfSSL_CTX_SetTMpDH_file wolfSSL_CTX_SetTmpDH_buffer Synopsis: #include int wolfSSL_CTX_SetTmpDH_buffer(WOLFSSL_CTX* ctx, const unsigned char* buf, long sz, int format); Description: A wrapper function that calls wolfSSL_SetTmpDH_buffer_wrapper Return Values: 0 - returned for a successful execution. BAD_FUNC_ARG - returned if the ctx or buf parameters are NULL. MEMORY_E - if there is a memory allocation error. SSL_BAD_FILETYPE - returned if format is not correct. Parameters: ctx - a pointer to a WOLFSSL structure, created using wolfSSL_CTX_new(). buf - a pointer to a constant unsigned char type that is allocated as the buffer and passed through to wolfSSL_SetTmpDH_buffer_wrapper. sz - a long integer type that is derived from the fname parameter in wolfSSL_SetTmpDH_file_wrapper(). format - an integer type passed through from wolfSSL_SetTmpDH_file_wrapper(). Example: static int wolfSSL_SetTmpDH_file_wrapper(WOLFSSL_CTX* ctx, WOLFSSL* ssl, Const char* fname, int format); #ifdef WOLFSSL_SMALL_STACK byte staticBuffer[1]; /*force heap usage*/ #else byte* staticBuffer; /*Initialize */ long sz = 0; … if(ssl){ ret = wolfSSL_SetTmpDH_buffer(ssl, myBuffer, sz, format); } else { ret = wolfSSL_CTX_SetTmpDH_buffer(ctx, myBuffer, sz, format); } See Also: wolfSSL_SetTmpDH_buffer_wrapper wolfSSL_SetTMpDH_buffer wolfSSL_SetTmpDH_file_wrapper wolfSSL_CTX_SetTmpDH_file wolfSSL_GetIVSize Synopsis: #include int wolfSSL_GetIVSize(WOLFSSL* ssl); Description: Returns the iv_size member of the specs structure held in the WOLFSSL struct. Return Values: Returns the value held in ssl->specs.iv_size. BAD_FUNC_ARG - returned if the WOLFSSL structure is NULL. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*method*/); WOLFSSL* ssl = wolfSSL_new(ctx); int ivSize; ... ivSize = wolfSSL_GetIVSize(ssl); if(ivSize > 0){ /*ivSize holds the specs.iv_size value. */ } See Also: wolfSSL_GetKeySize wolfSSL_GetClientWriteIV wolfSSL_GetServerWriteIV wolfSSL_GetDhKey_Sz Synopsis: #include int wolfSSL_GetDhKey_Sz(WOLFSSL* ssl); Description: Returns the value of dhKeySz that is a member of the options structure. This value represents the Diffie-Hellman key size in bytes. Return Values: Returns the value held in ssl->options.dhKeySz which is an integer value. BAD_FUNC_ARG - returns if the WOLFSSL struct is NULL. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*protocol method*/); WOLFSSL* ssl = wolfSSL_new(ctx); int dhKeySz; ... dhKeySz = wolfSSL_GetDhKey_Sz(ssl); if(dhKeySz == BAD_FUNC_ARG || dhKeySz <= 0){ /*Failure case */ } else { /*dhKeySz holds the size of the key. */ } See Also: wolfSSL_SetMinDhKey_sz wolfSSL_CTX_SetMinDhKey_Sz wolfSSL_CTX_SetTmpDH wolfSSL_SetTmpDH wolfSSL_CTX_SetTmpDH_file wolfSSL_SetTmpDH_buffer Synopsis: #include int wolfSSL_SetTmpDH_buffer(WOLFSSL* ssl, const unsigned char* buf, long sz, int format); Description: The function calls the wolfSSL_SetTMpDH_buffer_wrapper, which is a wrapper for Diffie-Hellman parameters. Return Values: SSL_SUCCESS - on successful execution. SSL_BAD_FILETYPE - if the file type is not PEM and is not ASN.1. It will also be returned if the wc_DhParamsLoad does not return normally. SSL_NO_PEM_HEADER - returns from PemToDer if there is not a PEM header. SSL_BAD_FILE - returned if there is a file error in PemToDer. SSL_FATAL_ERROR - returned from PemToDer if there was a copy error. MEMORY_E - if there was a memory allocation error. BAD_FUNC_ARG - returned if the WOLFSSL struct is NULL or if there was otherwise a NULL argument passed to a subroutine. DH_KEY_SIZE_E - is returned if their is a key size error in wolfSSL_SetTmpDH() or in wolfSSL_CTX_SetTmpDH(). SIDE_ERROR - returned if it is not the server side in wolfSSL_SetTmpDH. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). buf - allocated buffer passed in from wolfSSL_SetTMpDH_file_wrapper. sz - a long int that holds the size of the file (fname within wolfSSL_SetTmpDH_file_wrapper). format - an integer type passed through from wolfSSL_SetTmpDH_file_wrapper() that is a representation of the certificate format. Example: Static int wolfSSL_SetTmpDH_file_wrapper(WOLFSSL_CTX* ctx, WOLFSSL* ssl, Const char* fname, int format); long sz = 0; byte* myBuffer = staticBuffer[FILE_BUFFER_SIZE]; … if(ssl) ret = wolfSSL_SetTmpDH_buffer(ssl, myBuffer, sz, format); See Also: wolfSSL_SetTmpDH_buffer_wrapper wc_DhParamsLoad wolfSSL_SetTmpDH PemToDer wolfSSL_CTX_SetTmpDH wolfSSL_CTX_SetTmpDH_file wolfSSL_CTX_SetMinRsaKey_Sz Synopsis: #include int wolfSSL_CTX_SetMinRsaKey_Sz(WOLFSSL_CTX* ctx, short keySz); Description: Sets the minimum RSA key size in both the WOLFSSL_CTX structure and the WOLFSSL_CERT_MANAGER structure. Return Values: SSL_SUCCESS - returned on successful execution of the function. BAD_FUNC_ARG - returned if the ctx structure is NULL or the keySz is less than zero or not divisible by 8. Parameters: ctx - a pointer to a WOLFSSL_CTX structure, created using wolfSSL_CTX_new(). keySz - a short integer type stored in minRsaKeySz in the ctx structure and the cm structure converted to bytes. Example: WOLFSSL_CTX* ctx = SSL_CTX_new(method); (void)minDhKeyBits; ourCert = myoptarg; … minDhKeyBits = atoi(myoptarg); … if(wolfSSL_CTX_SetMinRsaKey_Sz(ctx, minRsaKeyBits) != SSL_SUCCESS){ … See Also: wolfSSL_SetMinRsaKey_Sz wolfSSL_CTX_SetTmpDH_file Synopsis: #include int wolfSSL_CTX_SetTmpDH(WOLFSSL_CTX* ctx, const char* fname, int format); Description: The function calls wolfSSL_SetTmpDH_file_wrapper to set the server Diffie-Hellman parameters. Return Values: SSL_SUCCESS - returned if the wolfSSL_SetTmpDH_file_wrapper or any of its subroutines return successfully. MEMORY_E - returned if an allocation of dynamic memory fails in a subroutine. BAD_FUNC_ARG - returned if the ctx or fname parameters are NULL or if a subroutine is passed a NULL argument. SSL_BAD_FILE - returned if the certificate file is unable to open or if the a set of checks on the file fail from wolfSSL_SetTmpDH_file_wrapper. SSL_BAD_FILETYPE - returned if teh format is not PEM or ASN.1 from wolfSSL_SetTmpDH_buffer_wrapper(). DH_KEY_SIZE_E - returned from wolfSSL_SetTmpDH() if the ctx minDhKeySz member exceeds maximum size allowed for DH. SIDE_ERROR - returned in wolfSSL_SetTmpDH() if the side is not the server end. SSL_NO_PEM_HEADER - returned from PemToDer if there is no PEM header. SSL_FATAL_ERROR - returned from PemToDer if there is a memory copy failure. Parameters: ctx - a pointer to a WOLFSSL_CTX structure, created using wolfSSL_CTX_new(). fname - a constant character pointer to a certificate file. format - an integer type passed through from wolfSSL_SetTmpDH_file_wrapper() that is a representation of the certificate format. Example: #define dhParam “certs/dh2048.pem” #DEFINE aSSERTiNTne(x, y) AssertInt(x, y, !=, ==) WOLFSSL_CTX* ctx; … AssertNotNull(ctx = wolfSSL_CTX_new(wolfSSLv23_client_method())) … AssertIntNE(SSL_SUCCESS, wolfSSL_CTX_SetTmpDH_file(NULL, dhParam, SSL_FILETYPE_PEM)); See Also: wolfSSL_SetTmpDH_buffer_wrapper wolfSSL_SetTmpDH wolfSSL_CTX_SetTmpDH wolfSSL_SetTmpDH_buffer wolfSSL_CTX_SetTmpDH_buffer wolfSSL_SetTmpDH_file_wrapper AllocDer PemToDer wolfSSL_get_psk_identity_hint Synopsis: #include const char* wolfSSL_get_psk_identity_hint(const WOLFSSL* ssl); Description: This function returns the psk identity hint. Return Values: const char pointer - the value that was stored in the arrays member of the WOLFSSL structure is returned. NULL - returned if the WOLFSSL or Arrays structures are NULL. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). Example: WOLFSSL* ssl = wolfSSL_new(ctx); char* idHint; ... idHint = wolfSSL_get_psk_identity_hint(ssl); if(idHint){ /*The hint was retrieved*/ return idHint; } else { /*Hint wasn’t successfully retrieved */ } See Also: wolfSSL_get_psk_identity wolfSSL_SetMinRsaKey_Sz Synopsis: #include int wolfSSL_SetMinRsaKey_Sz(WOLFSSL* ssl, short keySz); Description: Sets the minimum allowable key size in bytes for RSA located in the WOLFSSL structure. Return Values: SSL_SUCCESS - the minimum was set successfully. BAD_FUNC_ARG - returned if the ssl structure is NULL or if the ksySz is less than zero or not divisible by 8. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). keySz - a short integer value representing the the minimum key in bits. Example: WOLFSSL* ssl = wolfSSL_new(ctx); short keySz; … int isSet = wolfSSL_SetMinRsaKey_Sz(ssl, keySz); if(isSet != SSL_SUCCESS){ /*Failed to set. */ } See Also: wolfSSL_CTX_SetMinRsaKey_Sz wolfSSL_SetMinDhKey_Sz Synopsis: #include int wolfSSL_SetMinDhKey_Sz(WOLFSSL* ssl, word16 keySz); Description: Sets the minimum size for a Diffie-Hellman key in the WOLFSSL structure in bytes. Return Values: SSL_SUCCESS - the minimum size was successfully set. BAD_FUNC_ARG - the WOLFSSL structure was NULL or the keySz parameter was greater than the allowable size or not divisible by 8. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). keySz - a word16 type representing the bit size of the minimum DH key. Example: WOLFSSL* ssl = wolfSSL_new(ctx); word16 keySz; ... if(wolfSSL_SetMinDhKey(ssl, keySz) != SSL_SUCCESS){ /*Failed to set. */ } See Also: wolfSSL_GetDhKey_Sz wolfSSL_CTX_set_tmp_dh Synopsis: #include long wolfSSL_CTX_set_tmp_dh(WOLFSSL_CTX* ctx, WOLFSSL_DH* dh); Description: Initializes the WOLFSSL_CTX structure’s dh member with the Diffie-Hellman parameters. Return Values: SSL_SUCCESS - returned if the function executed successfully. BAD_FUNC_ARG - returned if the ctx or dh structures are NULL. SSL_FATAL_ERROR - returned if there was an error setting a structure value. MEMORY_E - returned if their was a failure to allocate memory. Parameters: ctx - a pointer to a WOLFSSL_CTX structure, created using wolfSSL_CTX_new(). dh - a pointer to a WOLFSSL_DH structure. Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*protocol method*/); WOLFSSL_DH* dh; … return wolfSSL_CTX_set_tmp_dh(ctx, dh); See Also: wolfSSL_BN_bn2bin wolfSSL_CTX_use_psk_identity_hint Synopsis: #include int wolfSSL_CTX_use_psk_identity_hint(WOLFSSL_CTX* ctx, const char* hint); Description: This function stores the hint argument in the server_hint member of the WOLFSSL_CTX structure. Return Values: SSL_SUCCESS - returned for successful execution of the function. Parameters: ctx - a pointer to a WOLFSSL_CTX structure, created using wolfSSL_CTX_new(). hint - a constant char pointer that will be copied to the WOLFSSL_CTX structure. Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*protocol method*/); const char* hint; int ret; … ret = wolfSSL_CTX_use_psk_identity_hint(ctx, hint); if(ret == SSL_SUCCESS){ /* Function was successful. */ return ret; } else { /*Failure case. */ } See Also: wolfSSL_use_psk_identity_hint wolfSSL_use_psk_identity_hint Synopsis: #include void wolfSSL_use_psk_identity_hint(WOLFSSL* ssl, const char* hint); Description: This function stores the hint argument in the server_hint member of the Arrays structure within the WOLFSSL structure. Return Values: SSL_SUCCESS - returned if the hint was successfully stored in the WOLFSSL structure. SSL_FAILURE - returned if the WOLFSSL or Arrays structures are NULL. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). hint - a constant character pointer that holds the hint to be saved in memory. Example: WOLFSSL* ssl = wolfSSL_new(ctx); const char* hint; /*pass in valid hint*/ ... if(wolfSSL_use_psk_identity_hint(ssl, hint) != SSL_SUCCESS){ /*Handle failure case. */ } See Also: wolfSSL_CTX_use_psk_identity_hint wolfSSL_make_eap_keys Synopsis: #include int wolfSSL_make_eap_keys(WOLFSSL* ssl, void* msk, unsigned int len, const char* label); Description: This function is used by EAP_TLS and EAP-TTLS to derive keying material from the master secret. Return Values: BUFFER_E - returned if the actual size of the buffer exceeds the maximum size allowable. MEMORY_E - returned if there is an error with memory allocation. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). msk - a void pointer variable that will hold the result of the p_hash function. len - an unsigned integer that represents the length of the msk variable. label - a constant char pointer that is copied from in PRF() . Example: WOLFSSL* ssl = wolfSSL_new(ctx);; void* msk; unsigned int len; const char* label; … return wolfSSL_make_eap_keys(ssl, msk, len, label); See Also: PRF doPRF p_hash wc_HmacFinal wc_HmacUpdate wolfSSL_CTX_SetMinEccKey_Sz Synopsis: #include int wolfSSL_CTX_SetMinEccKey_Sz(WOLFSSL_CTX* ctx, short keySz); Description: Sets the minimum size in bytes for the ECC key in the WOLF_CTX structure and the WOLFSSL_CERT_MANAGER structure. Return Values: SSL_SUCCESS - returned for a successful execution and the minEccKeySz member is set. BAD_FUNC_ARG - returned if the WOLFSSL_CTX struct is NULL or if the keySz is negative or not divisible by 8. Parameters: ctx - a pointer to a WOLFSSL_CTX structure, created using wolfSSL_CTX_new(). keySz - a short integer type that represents the minimum ECC key size in bits. Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*protocol method*/); short keySz; /*minimum key size*/ … if(wolfSSL_CTX_SetMinEccKey(ctx, keySz) != SSL_SUCCESS){ /*Failed to set min key size */ } See Also: wolfSSL_SetMinEccKey_Sz wolfSSL_SetTmpDH_file Synopsis: #include int wolfSSL_SetTmpDH_file(WOLFSSL* ssl, const char* fname, int format); Description: This function calls wolfSSL_SetTmpDH_file_wrapper to set server Diffie-Hellman parameters. Return Values: SSL_SUCCESS - returned on successful completion of this function and its subroutines. MEMORY_E - returned if a memory allocation failed in this function or a subroutine. SIDE_ERROR - if the side member of the Options structure found in the WOLFSSL struct is not the server side. SSL_BAD_FILETYPE - returns if the certificate fails a set of checks. BAD_FUNC_ARG - returns if an argument value is NULL that is not permitted such as, the WOLFSSL structure. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). fname - a constant char pointer holding the certificate. format - an integer type that holds the format of the certification. Example: WOLFSSL* ssl = wolfSSL_new(ctx); const char* dhParam; … AssertIntNE(SSL_SUCCESS, wolfSSL_SetTmpDH_file(ssl, dhParam, SSL_FILETYPE_PEM)); See Also: wolfSSL_CTX_SetTmpDH_file wolfSSL_SetTmpDH_file_wrapper wolfSSL_SetTmpDH_buffer wolfSSL_CTX_SetTmpDH_buffer wolfSSL_SetTmpDH_buffer_wrapper wolfSSL_SetTmpDH wolfSSL_CTX_SetTmpDH wolfSSL_PubKeyPemToDer Synopsis: #include int wolfSSL_PubKeyPemToDer(const unsigned char* pem, int pemSz, unsigned char* buff, int buffSz); Description: Converts the PEM format to DER format. Return Values: An int type representing the bytes written to buffer. < 0 - returned for an error. BAD_FUNC_ARG - returned if the DER length is incorrect or if the pem buff, or buffSz arguments are NULL. Parameters: pem - the PEM certificate. pemSz - the size of the PEM certificate. buff - the buffer that will be written to from the DerBuffer. buffSz - the size of the buffer. Example: unsigned char* pem = “/*pem file*/”; int pemSz = sizeof(pem)/sizeof(char); unsigned char* buff; /*The buffer*/ int buffSz; /*Initialize*/ ... if(wolfSSL_PubKeyPemToDer(pem, pemSz, buff, buffSz)!= SSL_SUCCESS){ /*Conversion was not successful */ } See Also: wolfSSL_PubKeyPemToDer wolfSSL_PemPubKeyToDer PemToDer wolfSSL_CTX_SetTmpDH Synopsis: #include int wolfSSL_CTX_SetTmpDH(WOLFSSL_CTX* ctx, const unsigned char* p, int pSz, Const unsigned char* g, int gSz); Description: Sets the parameters for the server CTX Diffie-Hellman. Return Values: SSL_SUCCESS - returned if the function and all subroutines return without error. BAD_FUNC_ARG - returned if the CTX, p or g parameters are NULL. DH_KEY_SIZE_E - returned if the minDhKeySz member of the WOLFSSL_CTX struct is not the correct size. MEMORY_E - returned if the allocation of memory failed in this function or a subroutine. Parameters: ctx - a pointer to a WOLFSSL_CTX structure, created using wolfSSL_CTX_new(). p - a constant unsigned char pointer loaded into the buffer member of the serverDH_P struct. pSz - an int type representing the size of p, initialized to MAX_DH_SIZE. g - a constant unsigned char pointer loaded into the buffer member of the serverDH_G struct. gSz - an int type representing the size of g, initialized ot MAX_DH_SIZE. Example: WOLFSSL_CTX* ctx = WOLFSSL_CTX_new(/*protocol def*/); byte* p; /*Initialize / Allocate size*/ byte* g; /*Initialize / Allocate size*/ word32 pSz = (word32)sizeof(p)/sizeof(byte); word32 gSz = (word32)sizeof(g)/sizeof(byte); … int ret = wolfSSL_CTX_SetTmpDH(ctx, p, pSz, g, gSz); if(ret != SSL_SUCCESS){ /*Failure case*/ } See Also: wolfSSL_SetTmpDH wc_DhParamsLoad wolfSSL_d2i_X509_bio Synopsis: #include d2i_X509_bio -> WOLFSSL_X509* wolfSSL_d2i_X509_bio(WOLFSSL_BIO* bio, WOLFSSL_X509** x509); Description: This function get the DER buffer from bio and converts it to a WOLFSSL_X509 structure. Return Values: Returns NULL on failure and a new WOLFSSL_X509 structure pointer on success. Parameters: bio - pointer to the WOLFSSL_BIO structure that has the DER certificate buffer. x509 - pointer that get set to new WOLFSSL_X509 structure created. Example: WOLFSSL_BIO* bio; WOLFSSL_X509* x509; // load DER into bio x509 = wolfSSL_d2i_X509_bio(bio, NULL); Or wolfSSL_d2i_X509_bio(bio, &x509); // use x509 returned (check for NULL) See Also: wolfSSL_PEM_read_bio_DSAparams Synopsis: #include PEM_read_bio_DSAparams -> WOLFSSL_DSA* wolfSSL_PEM_read_bio_DSAparams(WOLFSSL_BIO* bio, WOLFSSL_DSA** x, pem_password_cb* cb, void* u); Description: This function get the DSA parameters from a PEM buffer in bio. Return Values: On successfully parsing the PEM buffer a WOLFSSL_DSA structure is created and returned. If failing to parse the PEM buffer NULL is returned. Parameters: bio - pointer to the WOLFSSL_BIO structure for getting PEM memory pointer. x - pointer to be set to new WOLFSSL_DSA structure. cb - password callback function. u - null terminated password string. Example: WOLFSSL_BIO* bio; WOLFSSL_DSA* dsa; // setup bio dsa = wolfSSL_PEM_read_bio_DSAparams(bio, NULL, NULL, NULL); // check dsa is not NULL and then use dsa See Also: wolfSSL_PEM_read_bio_X509_AUX Synopsis: #include PEM_read_bio_X509_AUX-> WOLFSSL_X509* wolfSSL_PEM_read_bio_X509_AUX(WOLFSSL_BIO* bp, WOLFSSL_X509** x, pem_password_cb* cb, void* u); Description: This function behaves the same as wolfSSL_PEM_read_bio_X509. AUX signifies containing extra information such as trusted/rejected use cases and friendly name for human readability. Return Values: On successfully parsing the PEM buffer a WOLFSSL_X509 structure is returned. If unsuccessful NULL is returned. Parameters: bp - WOLFSSL_BIO structure to get PEM buffer from. x - if setting WOLFSSL_X509 by function side effect. cb - password callback. u - NULL terminated user password. Example: WOLFSSL_BIO* bio; WOLFSSL_X509* x509; // setup bio X509 = wolfSSL_PEM_read_bio_X509_AUX(bio, NULL, NULL, NULL); //check x509 is not null and then use it See Also: wolfSSL_PEM_read_bio_X509 wolfSSL_PEM_write_bio_PrivateKey Synopsis: #include PEM_write_bio_PrivateKey -> int wolfSSL_PEM_write_bio_PrivateKey(WOLFSSL_BIO* bio, WOLFSSL_EVP_PKEY* key, const WOLFSSL_EVP_CIPHER* cipher, unsigned char* passwd, int len, pem_password_cb* cb, void* arg); Description: This function writes a key into a WOLFSSL_BIO structure in PEM format. Return Values: On successfully creating the PEM buffer SSL_SUCCESS is returned. If unsuccessful SSL_FAILURE is returned. Parameters: bio - WOLFSSL_BIO structure to get PEM buffer from. key - key to convert to PEM format. cipher- EVP cipher structure. passwd - password. len - length of password. cb - password callback. arg - optional argument. Example: WOLFSSL_BIO* bio; WOLFSSL_EVP_PKEY* key; int ret; // create bio and setup key ret = wolfSSL_PEM_write_bio_PrivateKey(bio, key, NULL, NULL, 0, NULL, NULL); //check ret value See Also: wolfSSL_PEM_read_bio_X509_AUX wolfSSL_X509_digest Synopsis: #include X509_digest -> int wolfSSL_X509_digest( const WOLFSSL_X509* x509, const WOLFSSL_EVP_MD* digest, unsigned char* buf, unsigned int* len) Description: This function returns the hash of the DER certificate. Return Values: SSL_SUCCESS: On successfully creating a hash. SSL_FAILURE: Returned on bad input or unsuccessful hash. Parameters: x509 - certificate to get the hash of. digest - the hash algorithm to use. buf - buffer to hold hash. len - length of buffer. Example: WOLFSSL_X509* x509; unsigned char buffer[64]; unsigned int bufferSz; int ret; ret = wolfSSL_X509_digest(x509, wolfSSL_EVP_sha256(), buffer, &bufferSz); //check ret value See Also: wolfSSL_X509_get_ext_d2i Synopsis: #include X509_get_ext_d2i -> void*wolfSSL_X509_get_ext_d2i( const WOLFSSL_X509* x509, int nid, int* c, int* idx) Description: This function looks for and returns the extension matching the passed in NID value. Return Values: NULL: If extension is not found or error is encountered. If successful a STACK_OF(WOLFSSL_ASN1_OBJECT) pointer is returned. Parameters: x509 - certificate to get parse through for extension. nid - extension OID to be found. c - if not NULL is set to -2 for multiple extensions found -1 if not found, 0 if found and not critical and 1 if found and critical. idx - if NULL return first extension matched otherwise if not stored in x509 start at idx. Example: const WOLFSSL_X509* x509; int c; int idx = 0; STACK_OF(WOLFSSL_ASN1_OBJECT)* sk; sk = wolfSSL_X509_get_ext_d2i(x509, NID_basic_constraints, &c, &idx); //check sk for NULL and then use it. sk needs freed after done. See Also: wolfSSL_sk_ASN1_OBJECT_free wolfSSL_X509_NAME_get_text_by_NID Synopsis: #include X509_NAME_get_text_by_NID -> int wolfSSL_X509_NAME_get_text_by_NID(WOLFSSL_X509_NAME* name, int nid, char* buf, int len); Description: This function gets the text related to the passed in NID value. Return Values: Returns the size of text buffer. Parameters: name - WOLFSSL_X509_NAME to search for text. nid - NID to search for. buf - buffer to hold text when found. len - length of buffer. Example: WOLFSSL_X509_NAME* name; char buffer[100]; int bufferSz; int ret; // get WOLFSSL_X509_NAME ret = wolfSSL_X509_NAME_get_text_by_NID(name, NID_commonName, buffer, bufferSz); //check ret value See Also: wolfSSL_X509_STORE_add_cert Synopsis: #include X509_STORE_add_cert -> int wolfSSL_X509_STORE_add_cert(WOLFSSL_X509_STORE* str, WOLFSSL_X509* x509); Description: This function adds a certificate to the WOLFSSL_X509_STRE structure. Return Values: SSL_SUCCESS: If certificate is added successfully. SSL_FATAL_ERROR: If certificate is not added successfully. Parameters: str - certificate store to add the certificate to. x509 - certificate to add. Example: WOLFSSL_X509_STORE* str; WOLFSSL_X509* x509; int ret; ret = wolfSSL_X509_STORE_add_cert(str, x509); //check ret value See Also: wolfSSL_X509_free wolfSSL_X509_STORE_CTX_get_chain Synopsis: #include X509_STORE_CTX_get_chain -> int wolfSSL_X509_STORE_CTX_get_chain(WOLFSSL_X509_STORE_CTX* ctx); Description: This function is a getter function for chain variable in WOLFSSL_X509_STORE_CTX structure. Currently chain is not populated. Return Values: If successful returns WOLFSSL_STACK (same as STACK_OF(WOLFSSL_X509)) pointer otherwise NULL. Parameters: ctx - certificate store ctx to get parse chain from. Example: WOLFSSL_STACK* sk; WOLFSSL_X509_STORE_CTX* ctx; sk = wolfSSL_X509_STORE_CTX_get_chain(ctx); //check sk for NULL and then use it. sk needs freed after done. See Also: wolfSSL_sk_X509_free wolfSSL_X509_STORE_set_flags Synopsis: #include X509_STORE_set_flags -> int wolfSSL_X509_STORE_set_flags(WOLFSSL_X509_STORE* str, unsigned long flag); Description: This function takes in a flag to change the behavior of the WOLFSSL_X509_STORE structure passed in. An example of a flag used is WOLFSSL_CRL_CHECK. Return Values: SSL_SUCCESS: If no errors were encountered when setting the flag. If unsuccessful a negative error value is returned. Parameters: str - certificate store to set flag in. flag - flag for behavior. Example: WOLFSSL_X509_STORE* str; int ret; // create and set up str ret = wolfSSL_X509_STORE_set_flags(str, WOLFSSL_CRL_CHECKALL); If (ret != SSL_SUCCESS) { //check ret value and handle error case } See Also: wolfSSL_X509_STORE_new, wolfSSL_X509_STORE_free wolfSSL_X509_STORE_CTX_set_flags Synopsis: #include X509_STORE_CTX_set_flags -> void wolfSSL_X509_STORE_CTX_set_flags(WOLFSSL_X509_STORE_CTX* ctx, unsigned long flags) Description: This function takes in a flag to change the behavior of the WOLFSSL_X509_STORE_CTX. structure passed in. Return Values: None Parameters: ctx - certificate store CTX to set flag in. flag - flag for behavior. Example: WOLFSSL_X509_STORE_CTX* ctx; // create and set up ctx and flag wolfSSL_X509_STORE_CTX, set_flags(ctx, flag); See Also: wolfSSL_X509_STORE_CTX_new, wolfSSL_X509_STORE_CTX_free wolfSSL_DES_set_key Synopsis: #include DES_set_key -> int wolfSSL_DES_set_key(WOLFSSL_const_DES_cblock* myDes, WOLFSSL_DES_key_schedule* key); Description: This function sets the key schedule. If the macro WOLFSSL_CHECK_DESKEY is defined then acts like wolfSSL_DES_set_key_checked if not then acts like wolfSSL_DES_set_key_unchecked. Return Values: If WOLFSSL_CHECK_DESKEY set then -1 if parity error, -2 for weak/null key, and 0 for success. If macro WOLFSSL_CHECK_DESKEY is not defined then always returns 0. Parameters: myDes - DES key key - key to set from myDes. Example: WOLFSSL_const_DES_cblock* myDes; WOLFSSL_DES_key_schedule* key; int ret; // load DES key ret = wolfSSL_DES_set_key(myDes, key); // check ret value See Also: wolfSSL_DES_set_key_checked, wolfSSL_DES_set_key_unchecked wolfSSL_DSA_dup_DH Synopsis: #include DSA_dup_DH -> WOLFSSL_DH* wolfSSL_DSA_dup_DH(const WOLFSSL_DSA* dsa); Description: This function duplicates the parameters in dsa to a newly created WOLFSSL_DH structure. Return Values: If duplicated returns WOLFSSL_DH structure if function failed NULL is returned. Parameters: dsa - WOLFSSL_DSA structure to duplicate. Example: WOLFSSL_DH* dh; WOLFSSL_DSA* dsa; // set up dsa dh = wolfSSL_DSA_dup_DH(dsa); // check dh is not null See Also: 17.3 Context and Session Setup The functions in this section have to do with creating and setting up SSL/TLS context objects (WOLFSSL_CTX) and SSL/TLS session objects (WOLFSSL). wolfSSLv3_client_method Synopsis: #include WOLFSSL_METHOD *wolfSSLv3_client_method(void); Description: The wolfSSLv3_client_method() function is used to indicate that the application is a client and will only support the SSL 3.0 protocol. This function allocates memory for and initializes a new WOLFSSL_METHOD structure to be used when creating the SSL/TLS context with wolfSSL_CTX_new(). Return Values: If successful, the call will return a pointer to the newly created WOLFSSL_METHOD structure. If memory allocation fails when calling XMALLOC, the failure value of the underlying malloc() implementation will be returned (typically NULL with errno will be set to ENOMEM). Parameters: This function has no parameters. Example: WOLFSSL_METHOD* method; WOLFSSL_CTX* ctx; method = wolfSSLv3_client_method(); if (method == NULL) { /*unable to get method*/ } ctx = wolfSSL_CTX_new(method); ... See Also: wolfTLSv1_client_method wolfTLSv1_1_client_method wolfTLSv1_2_client_method wolfDTLSv1_client_method wolfSSLv23_client_method wolfSSL_CTX_new wolfSSLv3_server_method Synopsis: #include WOLFSSL_METHOD *wolfSSLv3_server_method(void); Description: The wolfSSLv3_server_method() function is used to indicate that the application is a server and will only support the SSL 3.0 protocol. This function allocates memory for and initializes a new WOLFSSL_METHOD structure to be used when creating the SSL/TLS context with wolfSSL_CTX_new(). Return Values: If successful, the call will return a pointer to the newly created WOLFSSL_METHOD structure. If memory allocation fails when calling XMALLOC, the failure value of the underlying malloc() implementation will be returned (typically NULL with errno will be set to ENOMEM). Parameters: This function has no parameters. Example: WOLFSSL_METHOD* method; WOLFSSL_CTX* ctx; method = wolfSSLv3_server_method(); if (method == NULL) { /*unable to get method*/ } ctx = wolfSSL_CTX_new(method); ... See Also: wolfTLSv1_server_method wolfTLSv1_1_server_method wolfTLSv1_2_server_method wolfDTLSv1_server_method wolfSSLv23_server_method wolfSSL_CTX_new wolfSSLv23_client_method Synopsis: #include WOLFSSL_METHOD *wolfSSLv23_client_method(void); Description: The wolfSSLv23_client_method() function is used to indicate that the application is a client and will support the highest protocol version supported by the server between SSL 3.0 - TLS 1.2. This function allocates memory for and initializes a new WOLFSSL_METHOD structure to be used when creating the SSL/TLS context with wolfSSL_CTX_new(). Both wolfSSL clients and servers have robust version downgrade capability. If a specific protocol version method is used on either side, then only that version will be negotiated or an error will be returned. For example, a client that uses TLSv1 and tries to connect to a SSLv3 only server will fail, likewise connecting to a TLSv1.1 will fail as well. To resolve this issue, a client that uses the wolfSSLv23_client_method() function will use the highest protocol version supported by the server and downgrade to SSLv3 if needed. In this case, the client will be able to connect to a server running SSLv3 TLSv1.2. Return Values: If successful, the call will return a pointer to the newly created WOLFSSL_METHOD structure. If memory allocation fails when calling XMALLOC, the failure value of the underlying malloc() implementation will be returned (typically NULL with errno will be set to ENOMEM). Parameters: This function has no parameters. Example: WOLFSSL_METHOD* method; WOLFSSL_CTX* ctx; method = wolfSSLv23_client_method(); if (method == NULL) { /*unable to get method*/ } ctx = wolfSSL_CTX_new(method); ... See Also: wolfSSLv3_client_method wolfTLSv1_client_method wolfTLSv1_1_client_method wolfTLSv1_2_client_method wolfDTLSv1_client_method wolfSSL_CTX_new wolfSSLv23_server_method Synopsis: #include WOLFSSL_METHOD *wolfSSLv23_server_method(void); Description: The wolfSSLv23_server_method() function is used to indicate that the application is a server and will support clients connecting with protocol version from SSL 3.0 - TLS 1.2. This function allocates memory for and initializes a new WOLFSSL_METHOD structure to be used when creating the SSL/TLS context with wolfSSL_CTX_new(). Return Values: If successful, the call will return a pointer to the newly created WOLFSSL_METHOD structure. If memory allocation fails when calling XMALLOC, the failure value of the underlying malloc() implementation will be returned (typically NULL with errno will be set to ENOMEM). Parameters: This function has no parameters. Example: WOLFSSL_METHOD* method; WOLFSSL_CTX* ctx; method = wolfSSLv23_server_method(); if (method == NULL) { /*unable to get method*/ } ctx = wolfSSL_CTX_new(method); ... See Also: wolfSSLv3_server_method wolfTLSv1_server_method wolfTLSv1_1_server_method wolfTLSv1_2_server_method wolfDTLSv1_server_method wolfSSL_CTX_new wolfTLSv1_client_method Synopsis: WOLFSSL_METHOD *wolfTLSv1_client_method(void); Description: The wolfTLSv1_client_method() function is used to indicate that the application is a client and will only support the TLS 1.0 protocol. This function allocates memory for and initializes a new WOLFSSL_METHOD structure to be used when creating the SSL/TLS context with wolfSSL_CTX_new(). Return Values: If successful, the call will return a pointer to the newly created WOLFSSL_METHOD structure. If memory allocation fails when calling XMALLOC, the failure value of the underlying malloc() implementation will be returned (typically NULL with errno will be set to ENOMEM). Example: WOLFSSL_METHOD* method; WOLFSSL_CTX* ctx; method = wolfTLSv1_client_method(); if (method == NULL) { /*unable to get method*/ } ctx = wolfSSL_CTX_new(method); ... See Also: wolfSSLv3_client_method wolfTLSv1_1_client_method wolfTLSv1_2_client_method wolfDTLSv1_client_method wolfSSLv23_client_method wolfSSL_CTX_new wolfTLSv1_server_method Synopsis: WOLFSSL_METHOD *wolfTLSv1_server_method(void); Description: The wolfTLSv1_server_method() function is used to indicate that the application is a server and will only support the TLS 1.0 protocol. This function allocates memory for and initializes a new WOLFSSL_METHOD structure to be used when creating the SSL/TLS context with wolfSSL_CTX_new(). Return Values: If successful, the call will return a pointer to the newly created WOLFSSL_METHOD structure. If memory allocation fails when calling XMALLOC, the failure value of the underlying malloc() implementation will be returned (typically NULL with errno will be set to ENOMEM). Example: WOLFSSL_METHOD* method; WOLFSSL_CTX* ctx; method = wolfTLSv1_server_method(); if (method == NULL) { /*nable to get method*/ } ctx = wolfSSL_CTX_new(method); ... See Also: wolfSSLv3_server_method wolfTLSv1_1_server_method wolfTLSv1_2_server_method wolfDTLSv1_server_method wolfSSLv23_server_method wolfSSL_CTX_new wolfTLSv1_1_client_method Synopsis: WOLFSSL_METHOD *wolfTLSv1_1_client_method(void); Description: The wolfTLSv1_1_client_method() function is used to indicate that the application is a client and will only support the TLS 1.0 protocol. This function allocates memory for and initializes a new WOLFSSL_METHOD structure to be used when creating the SSL/TLS context with wolfSSL_CTX_new(). Return Values: If successful, the call will return a pointer to the newly created WOLFSSL_METHOD structure. If memory allocation fails when calling XMALLOC, the failure value of the underlying malloc() implementation will be returned (typically NULL with errno will be set to ENOMEM). Example: WOLFSSL_METHOD* method; WOLFSSL_CTX* ctx; method = wolfTLSv1_1_client_method(); if (method == NULL) { /*unable to get method*/ } ctx = wolfSSL_CTX_new(method); ... See Also: wolfSSLv3_client_method wolfTLSv1_client_method wolfTLSv1_2_client_method wolfDTLSv1_client_method wolfSSLv23_client_method wolfSSL_CTX_new wolfTLSv1_1_server_method Synopsis: WOLFSSL_METHOD *wolfTLSv1_1_server_method(void); Description: The wolfTLSv1_1_server_method() function is used to indicate that the application is a server and will only support the TLS 1.1 protocol. This function allocates memory for and initializes a new WOLFSSL_METHOD structure to be used when creating the SSL/TLS context with wolfSSL_CTX_new(). Return Values: If successful, the call will return a pointer to the newly created WOLFSSL_METHOD structure. If memory allocation fails when calling XMALLOC, the failure value of the underlying malloc() implementation will be returned (typically NULL with errno will be set to ENOMEM). Example: WOLFSSL_METHOD* method; WOLFSSL_CTX* ctx; method = wolfTLSv1_1_server_method(); if (method == NULL) { /*unable to get method*/ } ctx = wolfSSL_CTX_new(method); ... See Also: wolfSSLv3_server_method wolfTLSv1_server_method wolfTLSv1_2_server_method wolfDTLSv1_server_method wolfSSLv23_server_method wolfSSL_CTX_new wolfTLSv1_2_client_method Synopsis: WOLFSSL_METHOD *wolfTLSv1_2_client_method(void); Description: The wolfTLSv1_2_client_method() function is used to indicate that the application is a client and will only support the TLS 1.2 protocol. This function allocates memory for and initializes a new WOLFSSL_METHOD structure to be used when creating the SSL/TLS context with wolfSSL_CTX_new(). Return Values: If successful, the call will return a pointer to the newly created WOLFSSL_METHOD structure. If memory allocation fails when calling XMALLOC, the failure value of the underlying malloc() implementation will be returned (typically NULL with errno will be set to ENOMEM). Example: WOLFSSL_METHOD* method; WOLFSSL_CTX* ctx; method = wolfTLSv1_2_client_method(); if (method == NULL) { /*unable to get method*/ } ctx = wolfSSL_CTX_new(method); ... See Also: wolfSSLv3_client_method wolfTLSv1_client_method wolfTLSv1_1_client_method wolfDTLSv1_client_method wolfSSLv23_client_method wolfSSL_CTX_new wolfTLSv1_2_server_method Synopsis: WOLFSSL_METHOD *wolfTLSv1_2_server_method(void); Description: The wolfTLSv1_2_server_method() function is used to indicate that the application is a server and will only support the TLS 1.2 protocol. This function allocates memory for and initializes a new WOLFSSL_METHOD structure to be used when creating the SSL/TLS context with wolfSSL_CTX_new(). Return Values: If successful, the call will return a pointer to the newly created WOLFSSL_METHOD structure. If memory allocation fails when calling XMALLOC, the failure value of the underlying malloc() implementation will be returned (typically NULL with errno will be set to ENOMEM). Example: WOLFSSL_METHOD* method; WOLFSSL_CTX* ctx; method = wolfTLSv1_2_server_method(); if (method == NULL) { /*unable to get method*/ } ctx = wolfSSL_CTX_new(method); ... See Also: wolfSSLv3_server_method wolfTLSv1_server_method wolfTLSv1_1_server_method wolfDTLSv1_server_method wolfSSLv23_server_method wolfSSL_CTX_new wolfSSLv3_server_method_ex; wolfSSLv3_client_method_ex; wolfTLSv1_server_method_ex; wolfTLSv1_client_method_ex; wolfTLSv1_1_server_method_ex; wolfTLSv1_1_client_method_ex; wolfTLSv1_2_server_method_ex; wolfTLSv1_2_client_method_ex; wolfSSLv23_server_method_ex; wolfSSLv23_client_method_ex; Synopsis: #include WOLFSSL_METHOD* (*wolfSSL_method_func)(void* heap) Description: These functions have the same behavior as their counterparts (functions with not having _ex) except that they do not create WOLFSSL_METHOD* using dynamic memory. The functions will use the heap hint passed in to create a new WOLFSSL_METHOD struct. Return Values: A value of WOLFSSL_METHOD pointer if success. NULL is returned in error cases. Parameters: heap - a pointer to a heap hint for creating WOLFSSL_METHOD struct. Example: WOLFSSL_CTX* ctx; int ret; ... ctx = NULL: ret = wolfSSL_CTX_load_static_memory(&ctx, wolfSSLv23_server_method_ex, memory, memorySz, 0, MAX_CONCURRENT_HANDSHAKES); if (ret != SSL_SUCCESS) { // handle error case } ... See Also: wolfSSL_new wolfSSL_CTX_new wolfSSL_CTX_free wolfDTLSv1_client_method Synopsis: WOLFSSL_METHOD *wolfDTLSv1_client_method(void); Description: The wolfDTLSv1_client_method() function is used to indicate that the application is a client and will only support the DTLS 1.0 protocol. This function allocates memory for and initializes a new WOLFSSL_METHOD structure to be used when creating the SSL/TLS context with wolfSSL_CTX_new(). Return Values: If successful, the call will return a pointer to the newly created WOLFSSL_METHOD structure. If memory allocation fails when calling XMALLOC, the failure value of the underlying malloc() implementation will be returned (typically NULL with errno will be set to ENOMEM). Example: WOLFSSL_METHOD* method; WOLFSSL_CTX* ctx; method = wolfDTLSv1_client_method(); if (method == NULL) { /*unable to get method*/ } ctx = wolfSSL_CTX_new(method); ... See Also: wolfSSLv3_client_method wolfTLSv1_client_method wolfTLSv1_1_client_method wolfTLSv1_2_client_method wolfSSLv23_client_method wolfSSL_CTX_new wolfDTLSv1_server_method Synopsis: #include WOLFSSL_METHOD *wolfDTLSv1_server_method(void); Description: The wolfDTLSv1_server_method() function is used to indicate that the application is a server and will only support the DTLS 1.0 protocol. This function allocates memory for and initializes a new WOLFSSL_METHOD structure to be used when creating the SSL/TLS context with wolfSSL_CTX_new(). Return Values: If successful, the call will return a pointer to the newly created WOLFSSL_METHOD structure. If memory allocation fails when calling XMALLOC, the failure value of the underlying malloc() implementation will be returned (typically NULL with errno will be set to ENOMEM). Example: WOLFSSL_METHOD* method; WOLFSSL_CTX* ctx; method = wolfDTLSv1_server_method(); if (method == NULL) { /*unable to get method*/ } ctx = wolfSSL_CTX_new(method); ... See Also: wolfSSLv3_server_method wolfTLSv1_server_method wolfTLSv1_1_server_method wolfTLSv1_2_server_method wolfSSLv23_server_method wolfSSL_CTX_new wolfSSL_new Synopsis: #include WOLFSSL* wolfSSL_new(WOLFSSL_CTX* ctx); Description: This function creates a new SSL session, taking an already created SSL context as input. Return Values: If successful the call will return a pointer to the newly-created WOLFSSL structure. Upon failure, NULL will be returned. Parameters: ctx - pointer to the SSL context, created with wolfSSL_CTX_new(). Example: WOLFSSL* ssl = NULL; WOLFSSL_CTX* ctx = 0; ctx = wolfSSL_CTX_new(method); if (ctx == NULL) { /*context creation failed*/ } ssl = wolfSSL_new(ctx); if (ssl == NULL) { /*SSL object creation failed*/ } See Also: wolfSSL_CTX_new wolfSSL_free Synopsis: #include void wolfSSL_free(WOLFSSL* ssl); Description: This function frees an allocated WOLFSSL object. Return Values: No return values are used for this function. Parameters: ssl - pointer to the SSL object, created with wolfSSL_new(). Example: WOLFSSL* ssl = 0; ... wolfSSL_free(ssl); See Also: wolfSSL_CTX_new wolfSSL_new wolfSSL_CTX_free wolfSSL_ASN1_INTEGER_to_BN Synopsis: #include ASN1_INTEGER_to_BN -> WOLFSSL_BIGNUM* wolfSSL_ASN1_INTEGER_to_BN(const WOLFSSL_ASN1_INTEGER* ai, WOLFSSL_BIGNUM* bn); Description: This function is used to copy a WOLFSSL_ASN1_INTEGER value to a WOLFSSL_BIGNUM structure. Return Values: On successfully copying the WOLFSSL_ASN1_INTEGER value a WOLFSSL_BIGNUM pointer is returned. If a failure occured NULL is returned. Parameters: ai - WOLFSSL_ASN1_INTEGER structure to copy from. bn - if wanting to copy into an already existing WOLFSSL_BIGNUM struct then pass in a pointer to it. Optionally this can be NULL and a new WOLFSSL_BIGNUM structure will be created. Example: WOLFSSL_ASN1_INTEGER* ai; WOLFSSL_BIGNUM* bn; // create ai bn = wolfSSL_ASN1_INTEGER_to_BN(ai, NULL); // or if having already created bn and wanting to reuse structure // wolfSSL_ASN1_INTEGER_to_BN(ai, bn); // check bn is or return value is not NULL See Also: wolfSSL_ASN1_INTEGER_get Synopsis: #include #include ASN1_INTEGER_get -> long wolfSSL_ASN1_INTEGER_get(const WOLFSSL_ASN1_INTEGER* i) Description: This functions convert ASN1_INTEGER structure to the value. Return Values: ASN1_INTEGER_get() returns the value of i but it returns 0 if a is NULL and -1 on error. Parameters: i - WOLFSSL_ASN1_INTEGER structure Example: WOLFSSL_ASN1_INTEGER* i; long a; // create ai a = wolfSSL_ASN1_INTEGER_get(ai); // check a is or return value is not NULL wolfSSL_BN_mod_exp Synopsis: #include BN_mod_exp -> int wolfSSL_BN_mod_exp(WOLFSSL_BIGNUM* r, const WOLFSSL_BIGNUM* a, const WOLFSSL_BIGNUM* p, const WOLFSSL_BIGNUM* m, WOLFSSL_BN_CTX* ctx); Description: This function performs the following math “r = (a^p) % m”. Return Values: SSL_SUCCESS: On successfully performing math operation. SSL_FAILURE: If an error case was encountered. Parameters: r - structure to hold result. a - value to be raised by a power. p - power to raise a by. m - modulus to use. ctx -currently not used with wolfSSL can be NULL. Example: WOLFSSL_BIGNUM r,a,p,m; int ret; // set big number values ret = wolfSSL_BN_mod_exp(r, a, p, m, NULL); // check ret value See Also: wolfSSL_BN_new, wolfSSL_BN_free wolfSSL_BN_mod_mul Synopsis: #include BN_mod_mul -> nt wolfSSL_BN_mod_mul(WOLFSSL_BIGNUM *r, const WOLFSSL_BIGNUM *a, const WOLFSSL_BIGNUM *b, const WOLFSSL_BIGNUM *m, WOLFSSL_BN_CTX *ctx) Description: This function performs the following math “"r=(a*b) mod m”. Return Values: SSL_SUCCESS: On successfully performing math operation. SSL_FAILURE: If an error case was encountered. Parameters: r - structure to hold result. a - value to be multiplied b - value to multiply m - modulus to use ctx -currently not used with wolfSSL can be NULL. Example: WOLFSSL_BIGNUM r,a,b, m; int ret; // set big number values ret = wolfSSL_BN_mod_mul(r, a, b, m, NULL); // check ret value See Also: wolfSSL_BN_new, wolfSSL_BN_free wolfSSL_check_private_key Synopsis: #include SSL_check_private_key -> int wolfSSL_check_private_key(const WOLFSSL* ssl); Description: This function checks that the private key is a match with the certificate being used. Return Values: SSL_SUCCESS: On successfully match. SSL_FAILURE: If an error case was encountered. All error cases other than SSL_FAILURE are negative values. Parameters: ssl - WOLFSSL structure to check. Example: WOLFSSL* ssl; int ret; // create and set up ssl ret = wolfSSL_check_private_key(ssl); // check ret value See Also: wolfSSL_new, wolfSSL_free wolfSSL_get_client_random Synopsis: #include SSL_get_client_random -> size_t wolfSSL_get_client_random(const WOLFSSL* ssl, unsigned char* out, size_t outSz); Description: This is used to get the random data sent by the client during the handshake. Return Values: On successfully getting data returns a value greater than 0. If no random data buffer or an error state returns 0. If outSz passed in is 0 then the maximum buffer size needed is returned. Parameters: ssl - WOLFSSL structure to get clients random data buffer from. out -buffer to hold random data. outSz -size of out buffer passed in. (if 0 function will return max buffer size needed) Example: WOLFSSL ssl; unsigned char* buffer; size_t bufferSz; size_t ret; bufferSz = wolfSSL_get_client_random(ssl, NULL, 0); buffer = malloc(bufferSz); ret = wolfSSL_get_client_random(ssl, buffer, bufferSz); // check ret value See Also: wolfSSL_new, wolfSSL_free wolfSSL_get_server_random Synopsis: #include SSL_get_server_random -> size_t wolfSSL_get_server_random(const WOLFSSL* ssl, unsigned char* out, size_t outSz); Description: This is used to get the random data sent by the server during the handshake. Return Values: On successfully getting data returns a value greater than 0. If no random data buffer or an error state returns 0. If outSz passed in is 0 then the maximum buffer size needed is returned. Parameters: ssl - WOLFSSL structure to get clients random data buffer from. out -buffer to hold random data. outSz -size of out buffer passed in. (if 0 function will return max buffer size needed) Example: WOLFSSL ssl; unsigned char* buffer; size_t bufferSz; size_t ret; bufferSz = wolfSSL_get_server_random(ssl, NULL, 0); buffer = malloc(bufferSz); ret = wolfSSL_get_server_random(ssl, buffer, bufferSz); // check ret value See Also: wolfSSL_new, wolfSSL_free wolfSSL_SESSION_get_master_key Synopsis: #include SSL_SESSION_get_master_key -> int wolfSSL_SESSION_get_master_key(const WOLFSSL_SESSION* ses, unsigned char* out, int outSz); Description: This is used to get the master key after completing a handshake. Return Values: On successfully getting data returns a value greater than 0. If no data or an error state is hit then the function returns 0. If the outSz passed in is 0 then the maximum buffer size needed is returned. Parameters: ses - WOLFSSL_SESSION structure to get master secret buffer from. out -buffer to hold data. outSz -size of out buffer passed in. (if 0 function will return max buffer size needed) Example: WOLFSSL_SESSION ssl; unsigned char* buffer; size_t bufferSz; size_t ret; // complete handshake and get session structure bufferSz = wolfSSL_SESSION_get_master_secret(ses, NULL, 0); buffer = malloc(bufferSz); ret = wolfSSL_SESSION_get_master_secret(ses, buffer, bufferSz); // check ret value See Also: wolfSSL_new, wolfSSL_free wolfSSL_SESSION_get_master_key_length Synopsis: #include SSL_SESSION_get_master_key_length -> int wolfSSL_SESSION_get_master_key_length(const WOLFSSL_SESSION* ses); Description: This is used to get the master secret key length. Return Values: Returns master secret key size. Parameters: ses - WOLFSSL_SESSION structure to get master secret buffer from. Example: WOLFSSL_SESSION ssl; unsigned char* buffer; size_t bufferSz; size_t ret; // complete handshake and get session structure bufferSz = wolfSSL_SESSION_get_master_secret_length(ses); buffer = malloc(bufferSz); // check ret value See Also: wolfSSL_new, wolfSSL_free wolfSSL_get_options Synopsis: #include SSL_get_options -> unsigned long wolfSSL_get_options(const WOLFSSL* ssl); Description: This function returns the current options mask. Return Values: Returns the mask value stored in ssl. Parameters: ssl - WOLFSSL structure to get options mask from. Example: WOLFSSL* ssl; unsigned long mask; mask = wolfSSL_get_options(ssl); // check mask See Also: wolfSSL_new, wolfSSL_free, wolfSSL_set_options wolfSSL_set_options Synopsis: #include SSL_set_options -> unsigned long wolfSSL_get_options(const WOLFSSL* ssl, unsigned long op); Description: This function sets the options mask in the ssl. Some valid options are: SSL_OP_ALL SSL_OP_COOKIE_EXCHANGE SSL_OP_NO_SSLv2 SSL_OP_NO_SSLv3 SSL_OP_NO_TLSv1 SSL_OP_NO_TLSv1_1 SSL_OP_NO_TLSv1_2 SSL_OP_NO_COMPRESSION Return Values: Returns the updated options mask value stored in ssl. Parameters: ssl - WOLFSSL structure to set options mask. Example: WOLFSSL* ssl; unsigned long mask; mask = SSL_OP_NO_TLSv1 mask = wolfSSL_set_options(ssl, mask); // check mask See Also: wolfSSL_new, wolfSSL_free, wolfSSL_get_options wolfSSL_set_msg_callback Synopsis: #include SSL_set_msg_callback -> int wolfSSL_set_msg_callback(WOLFSSL *ssl, SSL_Msg_Cb cb); Description: This function sets a callback in the ssl. The callback is to observe handshake messages. NULL value of cb resets the callback. Callback function prototype: typedef void (*SSL_Msg_Cb)(int write_p, int version, int content_type, const void *buf, size_t len, WOLFSSL *ssl, void *arg); Return Values: SSL_SUCCESS: On success. SSL_FAILURE: If an NULL ssl passed in. Parameters: ssl - WOLFSSL structure to set callback argument. Example: static cb(int write_p, int version, int content_type, const void *buf, size_t len, WOLFSSL *ssl, void *arg) { … } WOLFSSL* ssl; ret = wolfSSL_set_msg_callback(ssl, cb); // check ret See Also: wolfSSL_set_msg_callback_arg wolfSSL_set_msg_callback_arg Synopsis: #include SSL_set_msg_callback_arg -> void wolfSSL_set_msg_callback_arg(WOLFSSL *ssl, void *arg); Description: This function sets associated callback context value in the ssl. The value is handed over to the callback argument. Return Values: None Parameters: ssl - WOLFSSL structure to set callback argument. Example: static cb(int write_p, int version, int content_type, const void *buf, size_t len, WOLFSSL *ssl, void *arg) { … } WOLFSSL* ssl; ret = wolfSSL_set_msg_callback(ssl, cb); // check ret wolfSSL_set_msg_callback(ssl, arg); See Also: wolfSSL_set_msg_callback wolfSSL_get_verify_result Synopsis: #include SSL_get_verify_result -> long wolfSSL_get_verify_result(const WOLFSSL* ssl); Description: This is used to get the results after trying to verify the peer's certificate. Copyright 2017 wolfSSL Inc. All rights reserved. 266 Return Values: X509_V_OK: On successful verification. SSL_FAILURE: If an NULL ssl passed in. Parameters: ssl - WOLFSSL structure to get verification results from. Example: WOLFSSL* ssl; long ret; // attempt/complete handshake ret = wolfSSL_get_verify_result(ssl); // check ret value See Also: wolfSSL_new, wolfSSL_free wolfSSL_get1_session Synopsis: #include SSL_get1_session -> WOLFSSL_SESSION* wolfSSL_get1_session(WOLFSSL* ssl) Description: This function returns the WOLFSSL_SESSION from the WOLFSSL structure. Return Values: WOLFSSL_SESSION: On success return session pointer. NULL: on failure returns NULL. Copyright 2017 wolfSSL Inc. All rights reserved. 267 Parameters: ssl - WOLFSSL structure to get session from. Example: WOLFSSL* ssl; WOLFSSL_SESSION* ses; // attempt/complete handshake ses = wolfSSL_get1_session(ssl); // check ses information See Also: wolfSSL_new, wolfSSL_free wolfSSL_set_tlsext_debug_arg Synopsis: #include SSL_set_tlsext_debug_arg -> long wolfSSL_set_tlsext_debug_arg(WOLFSSL* ssl, void* arg); Description: This is used to set the debug argument passed around. Return Values: SSL_SUCCESS: On successful setting argument. SSL_FAILURE: If an NULL ssl passed in. Parameters: ssl - WOLFSSL structure to set argument in. arg - argument to use. Example: Copyright 2017 wolfSSL Inc. All rights reserved. 268 WOLFSSL* ssl; void* args; int ret; // create ssl object ret = wolfSSL_set_tlsext_debug_arg(ssl, args); // check ret value See Also: wolfSSL_new, wolfSSL_free wolfSSL_set_tmp_dh Synopsis: #include SSL_set_tmp_dh -> long wolfSSL_set_tmp_dh(WOLFSSL* ssl, WOLFSSL_DH* dh); Description: This function sets the temporary DH to use during the handshake. Return Values: SSL_SUCCESS: On successful setting DH. SSL_FAILURE, MEMORY_E, SSL_FATAL_ERROR, BAD_FUNC_ARG: in error cases Parameters: ssl - WOLFSSL structure to set temporary DH. dh - DH to use. Example: WOLFSSL* ssl; WOLFSSL_DH* dh; int ret; Copyright 2017 wolfSSL Inc. All rights reserved. 269 // create ssl object ret = wolfSSL_set_tmp_dh(ssl, dh); // check ret value See Also: wolfSSL_new, wolfSSL_free wolfSSL_state Synopsis: #include SSL_state -> int wolfSSL_state(WOLFSSL* ssl); Description: This is used to get the internal error state of the WOLFSSL structure. Return Values: Returns ssl error state or BAD_FUNC_ARG if ssl is NULL. Parameters: ssl - WOLFSSL structure to get state from. Example: WOLFSSL* ssl; int ret; // create ssl object ret = wolfSSL_state(ssl); // check ret value See Also: wolfSSL_new, wolfSSL_free Copyright 2017 wolfSSL Inc. All rights reserved. 270 wolfSSL_use_certificate Synopsis: #include SSL_use_certificate -> int wolfSSL_use_certificate(WOLFSSL* ssl, WOLFSSL_X509* x509); Description: This is used to set the certificate for WOLFSSL structure to use during a handshake. Return Values: SSL_SUCCESS: On successful setting argument. SSL_FAILURE: If a NULL argument passed in. Parameters: ssl - WOLFSSL structure to set certificate in. x509 - certificate to use. Example: WOLFSSL* ssl; WOLFSSL_X509* x509 int ret; // create ssl object and x509 ret = wolfSSL_use_certificate(ssl, x509); // check ret value See Also: wolfSSL_new, wolfSSL_free wolfSSL_use_certificate_ASN1 Synopsis: #include Copyright 2017 wolfSSL Inc. All rights reserved. 271 SSL_use_certificate_ASN1 -> int wolfSSL_use_certificate_ASN1(WOLFSSL* ssl, unsigned char* der, int derSz); Description: This is used to set the certificate for WOLFSSL structure to use during a handshake. A DER formatted buffer is expected. Return Values: SSL_SUCCESS: On successful setting argument. SSL_FAILURE: If a NULL argument passed in. Parameters: ssl - WOLFSSL structure to set certificate in. der - DER certificate to use. derSz - size of the DER buffer passed in. Example: WOLFSSL* ssl; unsigned char* der; int derSz; int ret; // create ssl object and set DER variables ret = wolfSSL_use_certificate_ASN1(ssl, der, derSz); // check ret value See Also: wolfSSL_new, wolfSSL_free wolfSSLv23_method Synopsis: #include Copyright 2017 wolfSSL Inc. All rights reserved. 272 SSLv23_method -> WOLFSSL_METHOD* wolfSSLv23_method(void); Description: This function returns a WOLFSSL_METHOD similar to wolfSSLv23_client_method except that it is not determined which side yet (server/client). Return Values: WOLFSSL_METHOD*: On successful creation returns a WOLFSSL_METHOD pointer. NULL: NULL if memory allocation error or failure to create method. Parameters: None Example: WOLFSSL* ctx; ctx = wolfSSL_CTX_new(wolfSSLv23_method()); // check ret value See Also: wolfSSL_new, wolfSSL_free wolfSSL_CTX_new Synopsis: WOLFSSL_CTX* wolfSSL_CTX_new(WOLFSSL_METHOD* method); Description: This function creates a new SSL context, taking a desired SSL/TLS protocol method for input. Return Values: If successful the call will return a pointer to the newly-created WOLFSSL_CTX. Upon failure, NULL will be returned. Copyright 2017 wolfSSL Inc. All rights reserved. 273 Parameters: method - pointer to the desired WOLFSSL_METHOD to use for the SSL context. This is created using one of the wolfSSLvXX_XXXX_method() functions to specify SSL/TLS/DTLS protocol level. Example: WOLFSSL_CTX* ctx = 0; WOLFSSL_METHOD* method = 0; method = wolfSSLv3_client_method(); if (method == NULL) { /*unable to get method*/ } ctx = wolfSSL_CTX_new(method); if (ctx == NULL) { /*context creation failed*/ } See Also: wolfSSL_new wolfSSL_CTX_free Synopsis: void wolfSSL_CTX_free(WOLFSSL_CTX* ctx); Description: This function frees an allocated WOLFSSL_CTX object. This function decrements the CTX reference count and only frees the context when the reference count has reached 0. Return Values: No return values are used for this function. Parameters: Copyright 2017 wolfSSL Inc. All rights reserved. 274 ctx - pointer to the SSL context, created with wolfSSL_CTX_new(). Example: WOLFSSL_CTX* ctx = 0; ... wolfSSL_CTX_free(ctx); See Also: wolfSSL_CTX_new wolfSSL_new wolfSSL_free wolfSSL_CTX_clear_options Synopsis: long wolfSSL_CTX_clear_options(WOLFSSL_CTX* ctx, long opt); Description: This function resets option bits of WOLFSSL_CTX object. Return Values: New option bits Parameters: ctx - pointer to the SSL context. Example: WOLFSSL_CTX* ctx = 0; ... wolfSSL_CTX_clear_options(ctx, SSL_OP_NO_TLSv1); See Also: wolfSSL_CTX_new wolfSSL_new wolfSSL_free Copyright 2017 wolfSSL Inc. All rights reserved. 275 wolfSSL_CTX_add_extra_chain_cert Synopsis: #include SSL_CTX_add_extra_chain_cert -> long wolfSSL_CTX_add_extra_chain_cert(WOLFSSL_CTX* ctx, WOLFSSL_X509* x509); Description: This function adds the certificate to the internal chain being built in the WOLFSSL_CTX structure. Return Values: SSL_SUCCESS: after successfully adding the certificate. SSL_FAILURE: if failing to add the certificate to the chain. Parameters: ctx - WOLFSSL_CTX structure to add certificate to. x509 - certificate to add to the chain. Example: WOLFSSL_CTX* ctx; WOLFSSL_X509* x509; int ret; // create ctx ret = wolfSSL_CTX_add_extra_chain_cert(ctx, x509); // check ret value See Also: wolfSSL_CTX_new, wolfSSL_CTX_free Copyright 2017 wolfSSL Inc. All rights reserved. 276 wolfSSL_CTX_get_cert_store Synopsis: #include SSL_CTX_get_cert_store -> WOLFSSL_X509_STORE* wolfSSL_CTX_get_cert_store(WOLFSSL_CTX* ctx); Description: This is a getter function for the WOLFSSL_X509_STORE structure in ctx. Return Values: WOLFSSL_X509_STORE*: On successfully getting the pointer. NULL: Returned if NULL arguments are passed in. Parameters: ctx - pointer to the WOLFSSL_CTX structure for getting cert store pointer. Example: WOLFSSL_CTX ctx; WOLFSSL_X509_STORE* st; // setup ctx st = wolfSSL_CTX_get_cert_store(ctx); //use st See Also: wolfSSL_CTX_new, wolfSSL_CTX_free, wolfSSL_CTX_set_cert_store wolfSSL_CTX_set_cert_store Synopsis: #include Copyright 2017 wolfSSL Inc. All rights reserved. 277 SSL_CTX_set_cert_store -> void wolfSSL_CTX_set_cert_store(WOLFSSL_CTX* ctx, WOLFSSL_X509_STORE* str); Description: This is a setter function for the WOLFSSL_X509_STORE structure in ctx. Return Values: None Parameters: ctx - pointer to the WOLFSSL_CTX structure for setting cert store pointer. str - pointer to the WOLFSSL_X509_STORE to set in ctx. Example: WOLFSSL_CTX ctx; WOLFSSL_X509_STORE* st; // setup ctx and st st = wolfSSL_CTX_set_cert_store(ctx, st); //use st See Also: wolfSSL_CTX_new, wolfSSL_CTX_free, wolfSSL_CTX_get_cert_store wolfSSL_CTX_get_default_passwd_cb Synopsis: #include SSL_CTX_get_default_passwd_cb -> int wolfSSL_CTX_get_default_passwd_cb(WOLFSSL_CTX* ctx) Copyright 2017 wolfSSL Inc. All rights reserved. 278 Description: This is a getter function for the password callback set in ctx. Return Values: On success returns the callback function. NULL: If ctx is NULL then NULL is returned. Parameters: ctx - WOLFSSL_CTX structure to get call back from. Example: WOLFSSL_CTX* ctx; Pem_password_cb cb; // setup ctx cb = wolfSSL_CTX_get_default_passwd_cb(ctx); //use cb See Also: wolfSSL_CTX_new, wolfSSL_CTX_free wolfSSL_CTX_get_default_passwd_cb_userdata Synopsis: #include SSL_CTX_get_default_passwd_cb_userdata -> void* wolfSSL_CTX_get_default_passwd_cb_userdata(WOLFSSL_CTX* ctx) Description: This is a getter function for the password callback user data set in ctx. Return Values: On success returns the user data pointer. Copyright 2017 wolfSSL Inc. All rights reserved. 279 NULL: If ctx is NULL then NULL is returned. Parameters: ctx - WOLFSSL_CTX structure to get user data from. Example: WOLFSSL_CTX* ctx; void* data; // setup ctx data = wolfSSL_CTX_get_default_passwd_cb(ctx); //use data See Also: wolfSSL_CTX_new, wolfSSL_CTX_free wolfSSL_CTX_get_read_ahead Synopsis: #include SSL_CTX_get_read_ahead -> int wolfSSL_CTX_get_read_ahead(WOLFSSL_CTX* ctx); Description: This function returns the get read ahead flag from a WOLFSSL_CTX structure; Return Values: On success returns the read ahead flag. SSL_FAILURE: If ctx is NULL then SSL_FAILURE is returned. Parameters: ctx - WOLFSSL_CTX structure to get read ahead flag from. Copyright 2017 wolfSSL Inc. All rights reserved. 280 Example: WOLFSSL_CTX* ctx; int flag; // setup ctx flag = wolfSSL_CTX_get_read_ahead(ctx); //check flag See Also: wolfSSL_CTX_new, wolfSSL_CTX_free, wolfSSL_CTX_set_read_ahead wolfSSL_CTX_set_read_ahead Synopsis: #include SSL_CTX_set_read_ahead -> int wolfSSL_CTX_set_read_ahead(WOLFSSL_CTX* ctx, int v); Description: This function sets the read ahead flag in the WOLFSSL_CTX structure; Return Values: SSL_SUCCESS: If ctx read ahead flag set. SSL_FAILURE: If ctx is NULL then SSL_FAILURE is returned. Parameters: ctx - WOLFSSL_CTX structure to set read ahead flag. Example: WOLFSSL_CTX* ctx; int flag; int ret; // setup ctx Copyright 2017 wolfSSL Inc. All rights reserved. 281 ret = wolfSSL_CTX_set_read_ahead(ctx, flag); // check return value See Also: wolfSSL_CTX_new, wolfSSL_CTX_free, wolfSSL_CTX_get_read_ahead wolfSSL_CTX_set_tlsext_status_arg Synopsis: #include SSL_CTX_set_tlsext_status_arg -> long wolfSSL_CTX_set_tlsext_status_arg(WOLFSSL_CTX* ctx, void* arg); Description: This function sets the options argument to use with OCSP. Return Values: SSL_FAILURE: If ctx or it’s cert manager is NULL. SSL_SUCCESS: If successfully set. Parameters: ctx - WOLFSSL_CTX structure to set user argument. arg - user argument. Example: WOLFSSL_CTX* ctx; void* data; int ret; // setup ctx ret = wolfSSL_CTX_set_tlsext_status_arg(ctx, data); //check ret value Copyright 2017 wolfSSL Inc. All rights reserved. 282 See Also: wolfSSL_CTX_new, wolfSSL_CTX_free wolfSSL_CTX_set_tlsext_opaque_prf_input_callback_arg Synopsis: #include SSL_CTX_set_tlsext_opaque_prf_input_callback_arg -> long wolfSSL_CTX_set_tlsext_opaque_prf_input_callback_arg(WOLFSSL_CTX* ctx, void* arg); Description: This function sets the optional argument to be passed to the PRF callback. Return Values: SSL_FAILURE: If ctx is NULL. SSL_SUCCESS: If successfully set. Parameters: ctx - WOLFSSL_CTX structure to set user argument. arg - user argument. Example: WOLFSSL_CTX* ctx; void* data; int ret; // setup ctx ret = wolfSSL_CTX_set_tlsext_opaques_prf_input_callback_arg(ctx, data); //check ret value See Also: Copyright 2017 wolfSSL Inc. All rights reserved. 283 wolfSSL_CTX_new, wolfSSL_CTX_free wolfSSL_SetVersion Synopsis: #include int wolfSSL_SetVersion(WOLFSSL* ssl, int version); Description: This function sets the SSL/TLS protocol version for the specified SSL session (WOLFSSL object) using the version as specified by version. This will override the protocol setting for the SSL session (ssl) - originally defined and set by the SSL context (wolfSSL_CTX_new()) method type. Return Values: If successful the call will return SSL_SUCCESS. BAD_FUNC_ARG will be returned if the input SSL object is NULL or an incorrect protocol version is given for version. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). version - SSL/TLS protocol version. Possible values include WOLFSSL_SSLV3, WOLFSSL_TLSV1, WOLFSSL_TLSV1_1, WOLFSSL_TLSV1_2. Example: int ret = 0; WOLFSSL* ssl; ... ret = wolfSSL_SetVersion(ssl, WOLFSSL_TLSV1); if (ret != SSL_SUCCESS) { /*failed to set SSL session protocol version*/ } See Also: Copyright 2017 wolfSSL Inc. All rights reserved. 284 wolfSSL_CTX_new wolfSSL_use_old_poly Synopsis: #include int wolfSSL_use_old_poly(WOLFSSL* ssl, int value); Description: Since there is some differences between the first release and newer versions of chacha-poly AEAD construction we have added an option to communicate with servers/clients using the older version. By default wolfSSL uses the new version. Return Values: If successful the call will return 0. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). value - whether or not to use the older version of setting up the information for poly1305. Passing a flag value of 1 indicates yes use the old poly AEAD, to switch back to using the new version pass a flag value of 0. Example: int ret = 0; WOLFSSL* ssl; ... ret = wolfSSL_use_old_poly(ssl, 1); if (ret != 0) { /*failed to set poly1305 AEAD version*/ } wolfSSL_check_domain_name Synopsis: #include Copyright 2017 wolfSSL Inc. All rights reserved. 285 int wolfSSL_check_domain_name(WOLFSSL* ssl, const char* dn); Description: wolfSSL by default checks the peer certificate for a valid date range and a verified signature. Calling this function before wolfSSL_connect() or wolfSSL_accept() will add a domain name check to the list of checks to perform. dn holds the domain name to check against the peer certificate when it’s received. Return Values: If successful the call will return SSL_SUCCESS. SSL_FAILURE will be returned if a memory error was encountered. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). dn - domain name to check against the peer certificate when received. Example: int ret = 0; WOLFSSL* ssl; char* domain = (char*) “www.yassl.com”; ... ret = wolfSSL_check_domain_name(ssl, domain); if (ret != SSL_SUCCESS) { /*failed to enable domain name check*/ } See Also: NA wolfSSL_set_cipher_list Synopsis: #include Copyright 2017 wolfSSL Inc. All rights reserved. 286 int wolfSSL_set_cipher_list(WOLFSSL* ssl, const char* list); Description: This function sets cipher suite list for a given WOLFSSL object (SSL session). The ciphers in the list should be sorted in order of preference from highest to lowest. Each call to wolfSSL_set_cipher_list() resets the cipher suite list for the specific SSL session to the provided list each time the function is called. The cipher suite list, list, is a null-terminated text string, and a colon-delimited list. For example, one value for list may be "DHE-RSA-AES256-SHA256:DHE-RSA-AES128-SHA256:AES256-SHA256" Valid cipher values are the full name values from the cipher_names[] array in src/internal.c (for a definite list of valid cipher values check src/internal.c): RC4-SHA RC4-MD5 DES-CBC3-SHA AES128-SHA AES256-SHA NULL-SHA NULL-SHA256 DHE-RSA-AES128-SHA DHE-RSA-AES256-SHA PSK-AES128-CBC-SHA256 PSK-AES128-CBC-SHA PSK-AES256-CBC-SHA PSK-NULL-SHA256 PSK-NULL-SHA HC128-MD5 HC128-SHA HC128-B2B256 AES128-B2B256 AES256-B2B256 RABBIT-SHA NTRU-RC4-SHA NTRU-DES-CBC3-SHA NTRU-AES128-SHA NTRU-AES256-SHA Copyright 2017 wolfSSL Inc. All rights reserved. 287 QSH AES128-CCM-8 AES256-CCM-8 ECDHE-ECDSA-AES128-CCM-8 ECDHE-ECDSA-AES256-CCM-8 ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA ECDHE-RSA-RC4-SHA ECDHE-RSA-DES-CBC3-SHA ECDHE-ECDSA-RC4-SHA ECDHE-ECDSA-DES-CBC3-SHA AES128-SHA256 AES256-SHA256 DHE-RSA-AES128-SHA256 DHE-RSA-AES256-SHA256 ECDH-RSA-AES128-SHA ECDH-RSA-AES256-SHA ECDH-ECDSA-AES128-SHA ECDH-ECDSA-AES256-SHA ECDH-RSA-RC4-SHA ECDH-RSA-DES-CBC3-SHA ECDH-ECDSA-RC4-SHA ECDH-ECDSA-DES-CBC3-SHA AES128-GCM-SHA256 AES256-GCM-SHA384 DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES256-GCM-SHA384 ECDH-RSA-AES128-GCM-SHA256 ECDH-RSA-AES256-GCM-SHA384 ECDH-ECDSA-AES128-GCM-SHA256 ECDH-ECDSA-AES256-GCM-SHA384 CAMELLIA128-SHA DHE-RSA-CAMELLIA128-SHA CAMELLIA256-SHA Copyright 2017 wolfSSL Inc. All rights reserved. 288 DHE-RSA-CAMELLIA256-SHA CAMELLIA128-SHA256 DHE-RSA-CAMELLIA128-SHA256 CAMELLIA256-SHA256 DHE-RSA-CAMELLIA256-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-ECDSA-AES128-SHA256 ECDH-RSA-AES128-SHA256 ECDH-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES256-SHA384 ECDH-RSA-AES256-SHA384 ECDH-ECDSA-AES256-SHA384 Return Values: SSL_SUCCESS will be returned upon successful function completion, otherwise SSL_FAILURE will be returned on failure. Parameters: ssl - pointer to the SSL session, created with wolfSSL_new(). list - null-terminated text string and a colon-delimited list of cipher suites to use with the specified SSL session. Example: int ret = 0; WOLFSSL* ssl = 0; ... ret = wolfSSL_set_cipher_list(ssl, “DHE-RSA-AES256-SHA256:DHE-RSA-AES128-SHA256:AES256-SHA256”); if (ret != SSL_SUCCESS) { /*failed to set cipher suite list*/ } See Also: wolfSSL_CTX_set_cipher_list wolfSSL_new wolfSSL_CTX_set_cipher_list Copyright 2017 wolfSSL Inc. All rights reserved. 289 Synopsis: int wolfSSL_CTX_set_cipher_list(WOLFSSL_CTX* ctx, const char* list); Description: This function sets cipher suite list for a given WOLFSSL_CTX. This cipher suite list becomes the default list for any new SSL sessions (WOLFSSL) created using this context. The ciphers in the list should be sorted in order of preference from highest to lowest. Each call to wolfSSL_CTX_set_cipher_list() resets the cipher suite list for the specific SSL context to the provided list each time the function is called. The cipher suite list, list, is a null-terminated text string, and a colon-delimited list. For example, one value for list may be "DHE-RSA-AES256-SHA256:DHE-RSA-AES128-SHA256:AES256-SHA256" Valid cipher values are the full name values from the cipher_names[] array in src/internal.c (for a definite list of valid cipher values check src/internal.c): RC4-SHA RC4-MD5 DES-CBC3-SHA AES128-SHA AES256-SHA NULL-SHA NULL-SHA256 DHE-RSA-AES128-SHA DHE-RSA-AES256-SHA PSK-AES128-CBC-SHA256 PSK-AES128-CBC-SHA PSK-AES256-CBC-SHA PSK-NULL-SHA256 PSK-NULL-SHA HC128-MD5 HC128-SHA HC128-B2B256 AES128-B2B256 AES256-B2B256 RABBIT-SHA Copyright 2017 wolfSSL Inc. All rights reserved. 290 QSH AES128-CCM-8 AES256-CCM-8 ECDHE-ECDSA-AES128-CCM-8 ECDHE-ECDSA-AES256-CCM-8 ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-SHA ECDHE-RSA-RC4-SHA ECDHE-RSA-DES-CBC3-SHA ECDHE-ECDSA-RC4-SHA ECDHE-ECDSA-DES-CBC3-SHA AES128-SHA256 AES256-SHA256 DHE-RSA-AES128-SHA256 DHE-RSA-AES256-SHA256 ECDH-RSA-AES128-SHA ECDH-RSA-AES256-SHA ECDH-ECDSA-AES128-SHA ECDH-ECDSA-AES256-SHA ECDH-RSA-RC4-SHA ECDH-RSA-DES-CBC3-SHA ECDH-ECDSA-RC4-SHA ECDH-ECDSA-DES-CBC3-SHA AES128-GCM-SHA256 AES256-GCM-SHA384 DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES256-GCM-SHA384 ECDH-RSA-AES128-GCM-SHA256 ECDH-RSA-AES256-GCM-SHA384 ECDH-ECDSA-AES128-GCM-SHA256 ECDH-ECDSA-AES256-GCM-SHA384 CAMELLIA128-SHA DHE-RSA-CAMELLIA128-SHA CAMELLIA256-SHA Copyright 2017 wolfSSL Inc. All rights reserved. 291 DHE-RSA-CAMELLIA256-SHA CAMELLIA128-SHA256 DHE-RSA-CAMELLIA128-SHA256 CAMELLIA256-SHA256 DHE-RSA-CAMELLIA256-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-ECDSA-AES128-SHA256 ECDH-RSA-AES128-SHA256 ECDH-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES256-SHA384 ECDH-RSA-AES256-SHA384 ECDH-ECDSA-AES256-SHA384 Return Values: SSL_SUCCESS will be returned upon successful function completion, otherwise SSL_FAILURE will be returned on failure. Parameters: ctx - pointer to the SSL context, created with wolfSSL_CTX_new(). list - null-terminated text string and a colon-delimited list of cipher suites to use with the specified SSL context. Example: WOLFSSL_CTX* ctx = 0; ... ret = wolfSSL_CTX_set_cipher_list(ctx, “DHE-RSA-AES256-SHA256:DHE-RSA-AES128-SHA256:AES256-SHA256”); if (ret != SSL_SUCCESS) { /*failed to set cipher suite list*/ } See Also: wolfSSL_set_cipher_list wolfSSL_CTX_new Copyright 2017 wolfSSL Inc. All rights reserved. 292 Synopsis: #include EVP_aes_128_ecb -> const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_128_ecb(void); EVP_aes_192_ecb -> const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_192_ecb(void); EVP_aes_256_ecb -> const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_aes_256_ecb(void); Description: Getter functions for the respective WOLFSSL_EVP_CIPHER pointers. wolfSSL_EVP_init() must be called once in the program first to populate these cipher strings. Return Values: Returns a WOLFSSL_EVP_CIPHER pointer. Parameters: None Example: WOLFSSL_EVP_CIPHER* cipher; cipher = wolfSSL_EVP_aes_192_ecb(); …. Copyright 2017 wolfSSL Inc. All rights reserved. 293 See Also: wolfSSL_EVP_CIPHER_CTX_init wolfSSL_EVP_CIPHER_block_size Synopsis: #include EVP_CIPHER_block_size -> int wolfSSL_EVP_CIPHER_block_size(const WOLFSSL_EVP_CIPHER* cipher); Description: This is a getter function for the block size of cipher. Return Values: Returns the block size. Parameters: cipher - cipher to get block size of. Example: printf(“block size = %d\n”, wolfSSL_EVP_CIPHER_block_size(wolfSSL_EVP_aes_256_ecb())); See Also: wolfSSL_EVP_aes_256_ctr wolfSSL_EVP_CIPHER_CTX_block_size Synopsis: #include EVP_CIPHER_CTX_block_size -> Copyright 2017 wolfSSL Inc. All rights reserved. 294 int wolfSSL_EVP_CIPHER_CTX_block_size(const WOLFSSL_EVP_CIPHER_CTX* ctx); Description: This is a getter function for the ctx block size. Return Values: Returns ctx->block_size. Parameters: ctx - the cipher ctx to get block size of. Example: const WOLFSSL_CVP_CIPHER_CTX* ctx; //set up ctx printf(“block size = %d\n”, wolfSSL_EVP_CIPHER_CTX_block_size(ctx)); See Also: wolfSSL_EVP_CIPHER_block_size wolfSSL_EVP_CIPHER_CTX_set_flags Synopsis: #include EVP_CIPHER_CTX_set_flags -> void wolfSSL_EVP_CIPHER_CTX_set_flags(WOLFSSL_EVP_CIPHER_CTX* ctx, int flags); Description: Setter function for WOLFSSL_EVP_CIPHER_CTX structure. Copyright 2017 wolfSSL Inc. All rights reserved. 295 Return Values: None Parameters: ctx - structure to set flag. flag - flag to set in structure. Example: WOLFSSL_EVP_CIPHER_CTX* ctx; int flag; // create ctx wolfSSL_EVP_CIPHER_CTX_set_flags(ctx, flag); See Also: wolfSSL_EVP_CIPHER_flags wolfSSL_EVP_CIPHER_CTX_set_key_length Synopsis: #include EVP_CIPHER_CTX_set_key_length -> int wolfSSL_EVP_CIPHER_CTX_set_key_length(WOLFSSL_EVP_CIPHER_CTX* ctx, int keylen); Description: Setter function for WOLFSSL_EVP_CIPHER_CTX structure key length. Return Values: SSL_SUCCESS: If successfully set. SSL_FAILURE: If failed to set key length/ Copyright 2017 wolfSSL Inc. All rights reserved. 296 Parameters: ctx - structure to set key length. keylen - key length. Example: WOLFSSL_EVP_CIPHER_CTX* ctx; int keylen; // create ctx wolfSSL_EVP_CIPHER_CTX_set_key_length(ctx, keylen); See Also: wolfSSL_EVP_CIPHER_flags wolfSSL_EVP_CIPHER_CTX_set_padding Synopsis: #include EVP_CIPHER_CTX_set_padding -> int wolfSSL_EVP_CIPHER_CTX_set_padding(WOLFSSL_EVP_CIPHER_CTX* ctx, int padding); Description: Setter function for WOLFSSL_EVP_CIPHER_CTX structure to use padding. Return Values: SSL_SUCCESS: If successfully set. BAD_FUNC_ARG: If null argument passed in. Parameters: ctx - structure to set padding flag. Copyright 2017 wolfSSL Inc. All rights reserved. 297 padding - 0 for not setting padding, 1 for setting padding. Example: WOLFSSL_EVP_CIPHER_CTX* ctx; // create ctx wolfSSL_EVP_CIPHER_CTX_set_padding(ctx, 1); See Also: wolfSSL_EVP_CIPHER_flags wolfSSL_EVP_CipherFinal Synopsis: #include EVP_CipherFinal -> int wolfSSL_EVP_CipherFinal(WOLFSSL_EVP_CIPHER_CTX* ctx, unsigned char* out, int* out1); Description: This function performs the final cipher operations adding in padding. If WOLFSSL_EVP_CIPH_NO_PADDING flag is set in WOLFSSL_EVP_CIPHER_CTX structure then 1 is returned and no encryption/decryption is done. If padding flag is seti padding is added and encrypted when ctx is set to encrypt, padding values are checked when set to decrypt. Return Values: 1:Returned on success 0: If encountering a failure. Parameters: ctx - structure to decrypt/encrypt with. Copyright 2017 wolfSSL Inc. All rights reserved. 298 out - buffer for final decrypt/encrypt. out1 - size of out buffer when data has been added by function. Example: WOLFSSL_EVP_CIPHER_CTX* ctx; int out1; unsigned char out[64]; // create ctx wolfSSL_EVP_CipherFinal(ctx, out, &out1); See Also: wolfSSL_EVP_CIPHER_CTX_new wolfSSL_CipherInit_ex Synopsis: #include EVP_CipherInit_ex -> int wolfSSL_CipherInit_ex(WOLFSSL_EVP_CIPHER_CTX* ctx, const WOLFSSL_EVP_CIPHER* type, WOLFSSL_ENGINE* impl, unsigned char* key, unsigned char* iv, int enc); Description: Function for initializing WOLFSSL_EVP_CIPHER_CTX. This function is a wrapper for wolfSSL_CipherInit() because wolfSSL does not use WOLFSSL_ENGINE. Return Values: SSL_SUCCESS: If successfully set. SSL_FAILURE: If not successful. Parameters: ctx - structure to initialize. Copyright 2017 wolfSSL Inc. All rights reserved. 299 type - type of encryption/decryption to do, for example AES. impl - engine to use. N/A for wolfSSL, can be NULL. key - key to set . iv - iv if needed by algorithm. enc - encryption (1) or decryption (0) flag. Example: WOLFSSL_EVP_CIPHER_CTX* ctx = NULL; WOLFSSL_ENGINE* e = NULL; unsigned char key[16]; unsigned char iv[12]; wolfCrypt_Init(); ctx = wolfSSL_EVP_CIPHER_CTX_new(); if (ctx == NULL) { printf("issue creating ctx\n"); return -1; } printf("cipher init ex error ret = %d\n", wolfSSL_EVP_CipherInit_ex(NULL, EVP_aes_128_ cbc(), e, key, iv, 1)); printf("cipher init ex success ret = %d\n", wolfSSL_EVP_CipherInit_ex(ctx, EVP_aes_128_c bc(), e, key, iv, 1)); // free resources See Also: wolfSSL_EVP_CIPHER_CTX_new, wolfCrypt_Init, wolfSSL_EVP_CIPHER_CTX_free wolfSSL_EVP_CipherUpdate Synopsis: #include EVP_CipherUpdate -> Copyright 2017 wolfSSL Inc. All rights reserved. 300 int wolfSSL_EVP_CipherUpdate(WOLFSSL_EVP_CIPHER_CTX* ctx, unsigned char* out, int *outl, const unsigned char* in, int inl); Description: Function for encrypting/decrypting data. In buffer is added to be encrypted or decrypted and out buffer holds the results. outl will be the length of encrypted/decrypted information. Return Values: SSL_SUCCESS: If successfull. SSL_FAILURE: If not successful. Parameters: ctx - structure to get cipher type from. out - buffer to hold output. outl - adjusted to be size of output. in - buffer to perform operation on. inl - length of input buffer. Example: WOLFSSL_EVP_CIPHER_CTX* ctx = NULL; unsigned char out[100]; int outl; unsigned char in[100]; int inl = 100; ctx = wolfSSL_EVP_CIPHER_CTX_new(); // set up ctx ret = wolfSSL_EVP_CipherUpdate(ctx, out, outl, in, inl); // check ret value // buffer out holds outl bytes of data // free resources Copyright 2017 wolfSSL Inc. All rights reserved. 301 See Also: wolfSSL_EVP_CIPHER_CTX_new, wolfCrypt_Init, wolfSSL_EVP_CIPHER_CTX_free wolfSSL_EVP_DecryptInit_ex Synopsis: #include EVP_DecryptInit_ex -> int wolfSSL_EVP_DecryptInit_ex Description: Function for initializing WOLFSSL_EVP_CIPHER_CTX. This function is a wrapper for wolfSSL_EVP_CipherInit() because wolfSSL does not use WOLFSSL_ENGINE. Sets encrypt flag to be decrypt. Return Values: SSL_SUCCESS: If successfully set. SSL_FAILURE: If not successful. Parameters: ctx - structure to initialize. type - type of encryption/decryption to do, for example AES. impl - engine to use. N/A for wolfSSL, can be NULL. key - key to set . iv - iv if needed by algorithm. enc - encryption (1) or decryption (0) flag. Example: WOLFSSL_EVP_CIPHER_CTX* ctx = NULL; Copyright 2017 wolfSSL Inc. All rights reserved. 302 WOLFSSL_ENGINE* e = NULL; unsigned char key[16]; unsigned char iv[12]; wolfCrypt_Init(); ctx = wolfSSL_EVP_CIPHER_CTX_new(); if (ctx == NULL) { printf("issue creating ctx\n"); return -1; } printf("cipher init ex error ret = %d\n", wolfSSL_EVP_DecryptInit_ex(NULL, EVP_aes_128_ cbc(), e, key, iv, 1)); printf("cipher init ex success ret = %d\n", wolfSSL_EVP_DecryptInit_ex(ctx, EVP_aes_128_c bc(), e, key, iv, 1)); // free resources See Also: wolfSSL_EVP_CIPHER_CTX_new, wolfCrypt_Init, wolfSSL_EVP_CIPHER_CTX_free wolfSSL_EVP_des_cbc, wolfSSL_EVP_des_ecb Synopsis: #include EVP_des_cbc -> const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_des_cbc(void); EVP_des_ecb -> const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_des_ecb(void); Copyright 2017 wolfSSL Inc. All rights reserved. 303 Description: Getter functions for the respective WOLFSSL_EVP_CIPHER pointers. wolfSSL_EVP_init() must be called once in the program first to populate these cipher strings. WOLFSSL_DES_ECB macro must be defined for wolfSSL_EVP_des_ecb(). Return Values: Returns a WOLFSSL_EVP_CIPHER pointer for DES operations. Parameters: None Example: WOLFSSL_EVP_CIPHER* cipher; cipher = wolfSSL_EVP_des_ecb(); …. See Also: wolfSSL_EVP_CIPHER_CTX_init wolfSSL_EVP_des_cbc, wolfSSL_EVP_des_ecb Synopsis: #include EVP_des_ede3_cbc -> const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_des_ede_cbc(void); EVP_des_ede3_ecb -> const WOLFSSL_EVP_CIPHER* wolfSSL_EVP_des_ede3_ecb(void); Copyright 2017 wolfSSL Inc. All rights reserved. 304 Description: Getter functions for the respective WOLFSSL_EVP_CIPHER pointers. wolfSSL_EVP_init() must be called once in the program first to populate these cipher strings. WOLFSSL_DES_ECB macro must be defined for wolfSSL_EVP_des_ede3_ecb(). Return Values: Returns a WOLFSSL_EVP_CIPHER pointer for DES EDE3 operations. Parameters: None Example: printf("block size des ede3 cbc = %d\n", wolfSSL_EVP_CIPHER_block_size(wolfSSL_EVP_des_ede3_cbc())); printf("block size des ede3 ecb = %d\n", wolfSSL_EVP_CIPHER_block_size(wolfSSL_EVP_des_ede3_ecb())); See Also: wolfSSL_EVP_CIPHER_CTX_init wolfSSL_EVP_DigestInit_ex Synopsis: #include EVP_DigestInit_ex -> int wolfSSL_EVP_DigestInit_ex(WOLFSSL_EVP_MD_CTX* ctx, const WOLFSSL_EVP_MD* type, WOLFSSL_ENGINE* impl); Description: Copyright 2017 wolfSSL Inc. All rights reserved. 305 Function for initializing WOLFSSL_EVP_MD_CTX. This function is a wrapper for wolfSSL_EVP_DigestInit() because wolfSSL does not use WOLFSSL_ENGINE. Return Values: SSL_SUCCESS: If successfully set. SSL_FAILURE: If not successful. Parameters: ctx - structure to initialize. type - type of hash to do, for example SHA. impl - engine to use. N/A for wolfSSL, can be NULL. Example: WOLFSSL_EVP_MD_CTX* md = NULL; wolfCrypt_Init(); md = wolfSSL_EVP_MD_CTX_new(); if (md == NULL) { printf("error setting md\n"); return -1; } printf("cipher md init ret = %d\n", wolfSSL_EVP_DigestInit_ex(md, wolfSSL_EVP_sha1(), e)); //free resources See Also: wolfSSL_EVP_MD_CTX_new, wolfCrypt_Init, wolfSSL_EVP_MD_CTX_free wolfSSL_EVP_EncryptInit_ex Synopsis: #include Copyright 2017 wolfSSL Inc. All rights reserved. 306 EVP_EncryptInit_ex -> int wolfSSL_EVP_EncryptInit_ex(WOLFSSL_EVP_CIPHER_CTX* ctx, const WOLFSSL_EVP_Cipher* type, WOLFSSL_ENGINE* impl, unsigned char* key, unsigned char* iv); Description: Function for initializing WOLFSSL_EVP_CIPHER_CTX. This function is a wrapper for wolfSSL_EVP_CipherInit() because wolfSSL does not use WOLFSSL_ENGINE. Sets encrypt flag to be encrypt. Return Values: SSL_SUCCESS: If successfully set. SSL_FAILURE: If not successful. Parameters: ctx - structure to initialize. type - type of encryption to do, for example AES. impl - engine to use. N/A for wolfSSL, can be NULL. key - key to use. iv - iv to use. Example: WOLFSSL_EVP_CIPHER_CTX* ctx = NULL; wolfCrypt_Init(); ctx = wolfSSL_EVP_CIPHER_CTX_new(); if (ctx == NULL) { printf("error setting ctx\n"); return -1; } Copyright 2017 wolfSSL Inc. All rights reserved. 307 printf("cipher ctx init ret = %d\n", wolfSSL_EVP_EncryptInit_ex(ctx, wolfSSL_EVP_aes_128_cbc(), e, key, iv)); //free resources See Also: wolfSSL_EVP_CIPHER_CTX_new, wolfCrypt_Init, wolfSSL_EVP_CIPHER_CTX_free wolfSSL_set_compression Synopsis: #include int wolfSSL_set_compression(WOLFSSL* ssl); Description: Turns on the ability to use compression for the SSL connection. Both sides must have compression turned on otherwise compression will not be used. The zlib library performs the actual data compression. To compile into the library use --with-libz for the configure system and define HAVE_LIBZ otherwise. Keep in mind that while compressing data before sending decreases the actual size of the messages being sent and received, the amount of data saved by compression usually takes longer in time to analyze than it does to send it raw on all but the slowest of networks. Return Values: If successful the call will return SSL_SUCCESS. NOT_COMPILED_IN will be returned if compression support wasn’t built into the library. Parameters: ssl - pointer to the SSL session, created with wolfSSL_new(). Example: int ret = 0; Copyright 2017 wolfSSL Inc. All rights reserved. 308 WOLFSSL* ssl = 0; ... ret = wolfSSL_set_compression(ssl); if (ret == SSL_SUCCESS) { /*successfully enabled compression for SSL session*/ } See Also: NA wolfSSL_set_fd Synopsis: #include int wolfSSL_set_fd(WOLFSSL* ssl, int fd); Description: This function assigns a file descriptor (fd) as the input/output facility for the SSL connection. Typically this will be a socket file descriptor. Return Values: If successful the call will return SSL_SUCCESS, otherwise, Bad_FUNC_ARG will be returned. Parameters: ssl - pointer to the SSL session, created with wolfSSL_new(). fd - file descriptor to use with SSL/TLS connection. Example: int sockfd; WOLFSSL* ssl = 0; ... ret = wolfSSL_set_fd(ssl, sockfd); if (ret != SSL_SUCCESS) { /*failed to set SSL file descriptor*/ Copyright 2017 wolfSSL Inc. All rights reserved. 309 } See Also: wolfSSL_SetIOSend wolfSSL_SetIORecv wolfSSL_SetIOReadCtx wolfSSL_SetIOWriteCtx wolfSSL_set_group_messages Synopsis: int wolfSSL_set_group_messages(WOLFSSL* ssl); Description: This function turns on grouping of handshake messages where possible. Return Values: SSL_SUCCESS will be returned upon success. BAD_FUNC_ARG will be returned if the input context is null. Parameters: ssl - pointer to the SSL session, created with wolfSSL_new(). Example: WOLFSSL* ssl = 0; ... ret = wolfSSL_set_group_messages(ssl); if (ret != SSL_SUCCESS) { // failed to set handshake message grouping } See Also: wolfSSL_CTX_set_group_messages wolfSSL_new Copyright 2017 wolfSSL Inc. All rights reserved. 310 wolfSSL_CTX_set_group_messages Synopsis: int wolfSSL_CTX_set_group_messages(WOLFSSL_CTX* ctx); Description: This function turns on grouping of handshake messages where possible. Return Values: SSL_SUCCESS will be returned upon success. BAD_FUNC_ARG will be returned if the input context is null. Parameters: ctx - pointer to the SSL context, created with wolfSSL_CTX_new(). Example: WOLFSSL_CTX* ctx = 0; ... ret = wolfSSL_CTX_set_group_messages(ctx); if (ret != SSL_SUCCESS) { /*failed to set handshake message grouping*/ } See Also: wolfSSL_set_group_messages wolfSSL_CTX_new wolfSSL_set_session Synopsis: #include int wolfSSL_set_session(WOLFSSL* ssl, WOLFSSL_SESSION* session); Copyright 2017 wolfSSL Inc. All rights reserved. 311 Description: This function sets the session to be used when the SSL object, ssl, is used to establish a SSL/TLS connection. For session resumption, before calling wolfSSL_shutdown() with your session object, an application should save the session ID from the object with a call to wolfSSL_get_session(), which returns a pointer to the session. Later, the application should create a new WOLFSSL object and assign the saved session with wolfSSL_set_session(). At this point, the application may call wolfSSL_connect() and wolfSSL will try to resume the session. The wolfSSL server code allows session resumption by default. Return Values: SSL_SUCCESS will be returned upon successfully setting the session. SSL_FAILURE will be returned on failure. This could be caused by the session cache being disabled, or if the session has timed out. Parameters: ssl - pointer to the SSL object, created with wolfSSL_new(). session - pointer to the WOLFSSL_SESSION used to set the session for ssl. Example: int ret = 0; WOLFSSL* ssl = 0; WOLFSSL_SESSION* session; ... ret = wolfSSL_get_session(ssl, session); if (ret != SSL_SUCCESS) { /*failed to set the SSL session*/ } ... See Also: Copyright 2017 wolfSSL Inc. All rights reserved. 312 wolfSSL_get_session wolfSSL_CTX_set_session_cache_mode Synopsis: long wolfSSL_CTX_set_session_cache_mode(WOLFSSL_CTX* ctx, long mode); Description: This function enables or disables SSL session caching. Behavior depends on the value used for mode. The following values for mode are available: SSL_SESS_CACHE_OFF - disable session caching. Session caching is turned on by default. SSL_SESS_CACHE_NO_AUTO_CLEAR - Disable auto-flushing of the session cache. Auto-flushing is turned on by default. Return Values: SSL_SUCCESS will be returned upon success. Parameters: ctx - pointer to the SSL context, created with wolfSSL_CTX_new(). mode - modifier used to change behavior of the session cache. Example: WOLFSSL_CTX* ctx = 0; ... ret = wolfSSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_OFF); if (ret != SSL_SUCCESS) { /*failed to turn SSL session caching off*/ } See Also: wolfSSL_flush_sessions wolfSSL_get_session Copyright 2017 wolfSSL Inc. All rights reserved. 313 wolfSSL_set_session wolfSSL_get_sessionID wolfSSL_CTX_set_timeout wolfSSL_set_timeout Synopsis: #include int wolfSSL_set_timeout(WOLFSSL* ssl, unsigned int to); Description: This function sets the SSL session timeout value in seconds. Return Values: SSL_SUCCESS will be returned upon successfully setting the session. BAD_FUNC_ARG will be returned if ssl is NULL. Parameters: ssl - pointer to the SSL object, created with wolfSSL_new(). to - value, in seconds, used to set the SSL session timeout. Example: int ret = 0; WOLFSSL* ssl = 0; ... ret = wolfSSL_set_timeout(ssl, 500); if (ret != SSL_SUCCESS) { /*failed to set session timeout value*/ } ... See Also: wolfSSL_get_session wolfSSL_set_session Copyright 2017 wolfSSL Inc. All rights reserved. 314 wolfSSL_CTX_set_timeout Synopsis: int wolfSSL_CTX_set_timeout(WOLFSSL_CTX* ctx, unsigned int to); Description: This function sets the timeout value for SSL sessions, in seconds, for the specified SSL context. Return Values: SSL_SUCCESS will be returned upon success. BAD_FUNC_ARG will be returned when the input context (ctx) is null. Parameters: ctx - pointer to the SSL context, created with wolfSSL_CTX_new(). to - session timeout value in seconds Example: WOLFSSL_CTX* ctx = 0; ... ret = wolfSSL_CTX_set_timeout(ctx, 500); if (ret != SSL_SUCCESS) { /*failed to set session timeout value*/ } See Also: wolfSSL_flush_sessions wolfSSL_get_session wolfSSL_set_session wolfSSL_get_sessionID wolfSSL_CTX_set_session_cache_mode Copyright 2017 wolfSSL Inc. All rights reserved. 315 wolfSSL_set_using_nonblock Synopsis: #include void wolfSSL_set_using_nonblock(WOLFSSL* ssl, int nonblock); Description: This function informs the WOLFSSL object that the underlying I/O is non-blocking. After an application creates a WOLFSSL object, if it will be used with a non-blocking socket, call wolfSSL_set_using_nonblock() on it. This lets the WOLFSSL object know that receiving EWOULDBLOCK means that the recvfrom call would block rather than that it timed out. Return Values: This function does not have a return value. Parameters: ssl - pointer to the SSL session, created with wolfSSL_new(). nonblock - value used to set non-blocking flag on WOLFSSL object. Use 1 to specify non-blocking, otherwise 0. Example: WOLFSSL* ssl = 0; ... wolfSSL_set_using_nonblock(ssl, 1); See Also: wolfSSL_get_using_nonblock wolfSSL_dtls_got_timeout wolfSSL_dtls_get_current_timeout Copyright 2017 wolfSSL Inc. All rights reserved. 316 wolfSSL_set_verify Synopsis: #include void wolfSSL_set_verify(WOLFSSL* ssl, int mode, VerifyCallback vc); typedef int (*VerifyCallback)(int, WOLFSSL_X509_STORE_CTX*); Description: This function sets the verification method for remote peers and also allows a verify callback to be registered with the SSL session. The verify callback will be called only when a verification failure has occurred. If no verify callback is desired, the NULL pointer can be used for verify_callback. The verification mode of peer certificates is a logically OR’d list of flags. The possible flag values include: SSL_VERIFY_NONE Client mode: the client will not verify the certificate received from the server and the handshake will continue as normal. Server mode: the server will not send a certificate request to the client. As such, client verification will not be enabled. SSL_VERIFY_PEER Client mode: the client will verify the certificate received from the server during the handshake. This is turned on by default in wolfSSL, therefore, using this option has no effect. Server mode: the server will send a certificate request to the client and verify the client certificate received. SSL_VERIFY_FAIL_IF_NO_PEER_CERT Client mode: no effect when used on the client side. Server mode: the verification will fail on the server side if the client fails to send Copyright 2017 wolfSSL Inc. All rights reserved. 317 a certificate when requested to do so (when using SSL_VERIFY_PEER on the SSL server). SSL_VERIFY_FAIL_EXCEPT_PSK Client mode: no effect when used on the client side. Server mode: the verification is the same as SSL_VERIFY_FAIL_IF_NO_PEER_CERT except in the case of a PSK connection. If a PSK connection is being made then the connection will go through without a peer cert. Return Values: This function has no return value. Parameters: ssl - pointer to the SSL session, created with wolfSSL_new(). mode - session timeout value in seconds verify_callback - callback to be called when verification fails. If no callback is desired, the NULL pointer can be used for verify_callback. Example: WOLFSSL* ssl = 0; ... wolfSSL_set_verify(ssl, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT, 0); See Also: wolfSSL_CTX_set_verify wolfSSL_CTX_set_verify Copyright 2017 wolfSSL Inc. All rights reserved. 318 Synopsis: void wolfSSL_CTX_set_verify(WOLFSSL_CTX* ctx, int mode, VerifyCallback vc); typedef int (*VerifyCallback)(int, WOLFSSL_X509_STORE_CTX*); Description: This function sets the verification method for remote peers and also allows a verify callback to be registered with the SSL context. The verify callback will be called only when a verification failure has occurred. If no verify callback is desired, the NULL pointer can be used for verify_callback. The verification mode of peer certificates is a logically OR’d list of flags. The possible flag values include: SSL_VERIFY_NONE Client mode: the client will not verify the certificate received from the server and the handshake will continue as normal. Server mode: the server will not send a certificate request to the client. As such, client verification will not be enabled. SSL_VERIFY_PEER Client mode: the client will verify the certificate received from the server during the handshake. This is turned on by default in wolfSSL, therefore, using this option has no effect. Server mode: the server will send a certificate request to the client and verify the client certificate received. SSL_VERIFY_FAIL_IF_NO_PEER_CERT Client mode: no effect when used on the client side. Server mode: the verification will fail on the server side if the client fails to send a certificate when requested to do so (when using SSL_VERIFY_PEER on the SSL server). Copyright 2017 wolfSSL Inc. All rights reserved. 319 SSL_VERIFY_FAIL_EXCEPT_PSK Client mode: no effect when used on the client side. Server mode: the verification is the same as SSL_VERIFY_FAIL_IF_NO_PEER_CERT except in the case of a PSK connection. If a PSK connection is being made then the connection will go through without a peer cert. Return Values: This function has no return value. Parameters: ctx - pointer to the SSL context, created with wolfSSL_CTX_new(). mode - session timeout value in seconds verify_callback - callback to be called when verification fails. If no callback is desired, the NULL pointer can be used for verify_callback. Example: WOLFSSL_CTX* ctx = 0; ... wolfSSL_CTX_set_verify(ctx, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT, 0); See Also: wolfSSL_set_verify wolfSSL_CTX_get_verify_depth Synopsis: #include Copyright 2017 wolfSSL Inc. All rights reserved. 320 long wolfSSL_CTX_get_verify_depth(WOLFSSL_CTX* ctx); Description: This function gets the certificate chaining depth using the CTX structure. Return Values: MAX_CHAIN_DEPTH - returned if the CTX struct is not NULL. The constant representation of the max certificate chain peer depth. BAD_FUNC_ARG - returned if the CTX structure is NULL. Parameters: ctx - a pointer to a WOLFSSL_CTX structure, created using wolfSSL_CTX_new(). Example: WOLFSSL_METHOD method; /*protocol method*/ WOLFSSL_CTX* ctx = WOLFSSL_CTX_new(method); … long ret = wolfSSL_CTX_get_verify_depth(ctx); if(ret == EXPECTED){ /*You have the expected value*/ } else { /*Handle an unexpected depth*/ } See Also: wolfSSL_CTX_use_certificate_chain_file wolfSSL_get_verify_depth wolfSSL_CTX_UnloadCAs Synopsis: #include int wolfSSL_CTX_UnloadCAs(WOLFSSL_CTX* ctx); Copyright 2017 wolfSSL Inc. All rights reserved. 321 Description: This function unloads the CA signer list and frees the whole signer table. Return Values: SSL_SUCCESS - returned on successful execution of the function. BAD_FUNC_ARG - returned if the WOLFSSL_CTX struct is NULL or there are otherwise unpermitted argument values passed in a subroutine. BAD_MUTEX_E - returned if there was a mutex error. The LockMutex() did not return 0. Parameters: ctx - a pointer to a WOLFSSL_CTX structure, created using wolfSSL_CTX_new(). Example: WOLFSSL_METHOD method = wolfTLSv1_2_client_method(); WOLFSSL_CTX* ctx = WOLFSSL_CTX_new(method); … if(!wolfSSL_CTX_UnloadCAs(ctx)){ /*The function did not unload CAs*/ } See Also: wolfSSL_CertManagerUnloadCAs LockMutex FreeSignerTable UnlockMutex wolfSSL_dtls_set_timeout_init Synopsis: #include Copyright 2017 wolfSSL Inc. All rights reserved. 322 int wolfSSL_dtls_set_timeout_init(WOLFSSL* ssl, int timeout); Description: This function sets the dtls timeout. Return Values: SSL_SUCCESS - returned if the function executes without an error. The dtls_timeout_init and the dtls_timeout members of SSL have been set. BAD_FUNC_ARG - returned if the WOLFSSL struct is NULL or if the timeout is not greater than 0. It will also return if the timeout argument exceeds the maximum value allowed. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). timeout - an int type that will be set to the dtls_timeout_init member of the WOLFSSL structure. Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*method*/); WOLFSSL* ssl = wolfSSL_new(ctx); int timeout = TIMEOUT; /*timeout value*/ ... if(wolfSSL_dtls_set_timeout_init(ssl, timeout)){ /*the dtls timeout was set*/ } else { /*Failed to set DTLS timeout. */ } See Also: wolfSSL_dtls_set_timeout_max wolfSSL_dtls_got_timeout wolfSSL_GetCookieCtx Synopsis: #include Copyright 2017 wolfSSL Inc. All rights reserved. 323 void* wolfSSL_GetCookieCtx(WOLFSSL* ssl); Description: This function returns the IOCB_CookieCtx member of the WOLFSSL structure. Return Values: The function returns a void pointer value stored in the IOCB_CookieCtx. NULL - if the WOLFSSL struct is NULL. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*method*/); WOLFSSL* ssl = wolfSSL_new(ctx); void* cookie; ... cookie = wolfSSL_GetCookieCtx(ssl); if(cookie != NULL){ /*You have the cookie */ } See Also: wolfSSL_SetCookieCtx wolfSSL_CTX_SetGenCookie wolfSSL_CTX_UseSessionTicket Synopsis: #include int wolfSSL_CTX_UseSessionTicket(WOLFSSL_CTX* ctx) Description: This function sets wolfSSL context to use a session ticket. Copyright 2017 wolfSSL Inc. All rights reserved. 324 Return Values: SSL_SUCCESS: Function executed successfully. BAD_FUNC_ARG: Returned if ctx is null. MEMORY_E: Error allocating memory in internal function. Parameters: ctx - The WOLFSSL_CTX structure to use. Example: wolfSSL_Init(); WOLFSSL_CTX* ctx; WOLFSSL_METHOD method = /* Some wolfSSL method */ ctx = wolfSSL_CTX_new(method); if(wolfSSL_CTX_UseSessionTicket(ctx) != SSL_SUCCESS) { /* Error setting session ticket */ } See Also: TLSX_UseSessionTicket wolfSSL_UseSupportedQSH Synopsis: #include int wolfSSL_UseSupportedQSH(WOLFSSL* ssl, word16 name) Description: This function sets the ssl session to use supported QSH provided by name. Copyright 2017 wolfSSL Inc. All rights reserved. 325 Return Values: SSL_SUCCESS: Successfully set supported QSH. BAD_FUNC_ARG: ssl is null or name is invalid. MEMORY_E: Error allocating memory for operation. Parameters: ssl - Pointer to ssl session to use. name - Name of a supported QSH. Valid names are WOLFSSL_NTRU_EESS439, WOLFSSL_NTRU_EESS593, or WOLFSSL_NTRU_EESS743. Example: wolfSSL_Init(); WOLFSSL_CTX* ctx; WOLFSSL* ssl; WOLFSSL_METHOD method = /* Some wolfSSL method */ ctx = wolfSSL_CTX_new(method); ssl = wolfSSL_new(ctx); word16 qsh_name = WOLFSSL_NTRU_EESS439; if(wolfSSL_UseSupportedQSH(ssl,qsh_name) != SSL_SUCCESS) { /* Error setting QSH */ } See Also: TLSX_UseQSHScheme wolfSSL_UseALPN Synopsis: Copyright 2017 wolfSSL Inc. All rights reserved. 326 #include int wolfSSL_UseALPN(WOLFSSL* ssl, char *protocol_name_list, word32 protocol_name_listSz, byte options) Description: Setup ALPN use for a wolfSSL session. Return Values: SSL_SUCCESS: Success BAD_FUNC_ARG: Returned if ssl or protocol_name_list is null or protocol_name_listSz is too large or options contain something not supported. MEMORY_ERROR: Error allocating memory for protocol list. SSL_FAILURE: Error Parameters: ssl - The wolfSSL session to use. protocol_name_list - List of protocol names to use. Comma delimited string is required. protocol_name_listSz - Size of the list of protocol names. options - WOLFSSL_ALPN_CONTINUE_ON_MISMATCH or WOLFSSL_ALPN_FAILED_ON_MISMATCH. Example: wolfSSL_Init(); WOLFSSL_CTX* ctx; WOLFSSL* ssl; WOLFSSL_METHOD method = /* Some wolfSSL method */ ctx = wolfSSL_CTX_new(method); ssl = wolfSSL_new(ctx); char alpn_list[] = { /* ALPN List */ } Copyright 2017 wolfSSL Inc. All rights reserved. 327 if(wolfSSL_UseALPN(ssl, alpn_list, sizeof(alpn_list), WOLFSSL_APN_FAILED_ON_MISMATCH) != SSL_SUCCESS) { /* Error setting session ticket */ } See Also: TLSX_UseALPN wolfSSL_CTX_trust_peer_cert Synopsis: #include int wolfSSL_CTX_trust_peer_cert(WOLFSSL_CTX* ctx, const char* file, int type); Description: This function loads a certificate to use for verifying a peer when performing a TLS/SSL handshake. The peer certificate sent during the handshake is compared by using the SKID when available and the signature. If these two things do not match then any loaded CAs are used. Feature is enabled by defining the macro WOLFSSL_TRUST_PEER_CERT Please see the examples for proper usage. Return Values: If successful the call will return SSL_SUCCESS. SSL_FAILURE will be returned if ctx is NULL, or if both file and type are invalid. SSL_BAD_FILETYPE will be returned if the file is the wrong format. Copyright 2017 wolfSSL Inc. All rights reserved. 328 SSL_BAD_FILE will be returned if the file doesn’t exist, can’t be read, or is corrupted. MEMORY_E will be returned if an out of memory condition occurs. ASN_INPUT_E will be returned if Base16 decoding fails on the file. Parameters: ctx - pointer to the SSL context, created with wolfSSL_CTX_new(). file - pointer to name of the file containing certificates type - type of certificate being loaded ie SSL_FILETYPE_ASN1 or SSL_FILETYPE_PEM. Example: int ret = 0; WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*protocol method*/); ... ret = wolfSSL_CTX_trust_peer_cert(ctx, “./peer-cert.pem”, SSL_FILETYPE_PEM); if (ret != SSL_SUCCESS) { /* error loading trusted peer cert */ } ... See Also: wolfSSL_CTX_load_verify_buffer wolfSSL_CTX_use_certificate_file wolfSSL_CTX_use_PrivateKey_file wolfSSL_CTX_use_NTRUPrivateKey_file wolfSSL_CTX_use_certificate_chain_file wolfSSL_CTX_trust_peer_buffer wolfSSL_CTX_Unload_trust_peers Copyright 2017 wolfSSL Inc. All rights reserved. 329 wolfSSL_use_certificate_file wolfSSL_use_PrivateKey_file wolfSSL_use_certificate_chain_file wolfSSL_CTX_trust_peer_buffer Synopsis: #include int wolfSSL_CTX_trust_peer_buffer(WOLFSSL_CTX* ctx, const unsigned char* buffer, long sz, int type); Description: This function loads a certificate to use for verifying a peer when performing a TLS/SSL handshake. The peer certificate sent during the handshake is compared by using the SKID when available and the signature. If these two things do not match then any loaded CAs are used. Is the same functionality as wolfSSL_CTX_trust_peer_cert except is from a buffer instead of a file. Feature is enabled by defining the macro WOLFSSL_TRUST_PEER_CERT Please see the examples for proper usage. Return Values: If successful the call will return SSL_SUCCESS. SSL_FAILURE will be returned if ctx is NULL, or if both file and type are invalid. SSL_BAD_FILETYPE will be returned if the file is the wrong format. SSL_BAD_FILE will be returned if the file doesn’t exist, can’t be read, or is corrupted. MEMORY_E will be returned if an out of memory condition occurs. Copyright 2017 wolfSSL Inc. All rights reserved. 330 ASN_INPUT_E will be returned if Base16 decoding fails on the file. Parameters: ctx - pointer to the SSL context, created with wolfSSL_CTX_new(). buffer - pointer to the buffer containing certificates sz - length of the buffer input type - type of certificate being loaded i.e. SSL_FILETYPE_ASN1 or SSL_FILETYPE_PEM. Example: int ret = 0; WOLFSSL_CTX* ctx; ... ret = wolfSSL_CTX_trust_peer_buffer(ctx, bufferPtr, bufferSz, SSL_FILETYPE_PEM); if (ret != SSL_SUCCESS) { // error loading trusted peer cert } ... See Also: wolfSSL_CTX_load_verify_buffer wolfSSL_CTX_use_certificate_file wolfSSL_CTX_use_PrivateKey_file wolfSSL_CTX_use_NTRUPrivateKey_file wolfSSL_CTX_use_certificate_chain_file wolfSSL_CTX_trust_peer_cert wolfSSL_CTX_Unload_trust_peers wolfSSL_use_certificate_file wolfSSL_use_PrivateKey_file Copyright 2017 wolfSSL Inc. All rights reserved. 331 wolfSSL_use_certificate_chain_file wolfSSL_CTX_Unload_trust_peers Synopsis: #include int wolfSSL_CTX_Unload_trust_peers(WOLFSSL_CTX* ctx); Description: This function is used to unload all previously loaded trusted peer certificates. Feature is enabled by defining the macro WOLFSSL_TRUST_PEER_CERT. Return Values: If successful the call will return SSL_SUCCESS. BAD_FUNC_ARG will be returned if ctx is NULL. SSL_BAD_FILE will be returned if the file doesn’t exist, can’t be read, or is corrupted. MEMORY_E will be returned if an out of memory condition occurs. Parameters: ctx - pointer to the SSL context, created with wolfSSL_CTX_new(). Example: int ret = 0; WOLFSSL_CTX* ctx; Copyright 2017 wolfSSL Inc. All rights reserved. 332 ... ret = wolfSSL_CTX_Unload_trust_peers(ctx); if (ret != SSL_SUCCESS) { // error unloading trusted peer certs } ... See Also: wolfSSL_CTX_trust_peer_buffer wolfSSL_CTX_trust_peer_cert wolfSSL_CTX_allow_anon_cipher Synopsis: #include int wolfSSL_CTX_allow_anon_cipher(WOLFSSL_CTX* ctx); Description: This function enables the havAnon member of the CTX structure if HAVE_ANON is defined during compilation. Return Values: SSL_SUCCESS - returned if the function executed successfully and the haveAnnon member of the CTX is set to 1. SSL_FAILURE - returned if the CTX structure was NULL. Parameters: ctx - a pointer to a WOLFSSL_CTX structure, created using wolfSSL_CTX_new(). Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*protocol method*/); WOLFSSL* ssl = wolfSSL_new(ctx); ... Copyright 2017 wolfSSL Inc. All rights reserved. 333 #ifdef HAVE_ANON if(cipherList == NULL){ wolfSSL_CTX_allow_anon_cipher(ctx); if(wolfSSL_CTX_set_cipher_list(ctx, “ADH_AES128_SHA”) != SSL_SUCCESS){ /*failure case*/ } } #endif See Also: wolfSSL_CTX_memrestore_cert_cache Synopsis: #include void wolfSSL_CTX_memrestore_cert_cache(WOLFSSL* ssl); Description: This function restores the certificate cache from memory. Return Values: SSL_SUCCESS - returned if the function and subroutines executed without an error. BAD_FUNC_ARG - returned if the ctx or mem parameters are NULL or if the sz parameter is less than or equal to zero. BUFFER_E - returned if the cert cache memory buffer is too small. CACHE_MATCH_ERROR - returned if there was a cert cache header mismatch. BAD_MUTEX_E - returned if the lock mutex on failed. Parameters: ctx - a pointer to a WOLFSSL_CTX structure, created using wolfSSL_CTX_new(). mem - a void pointer with a value that will be restored to the certificate cache. Copyright 2017 wolfSSL Inc. All rights reserved. 334 sz - an int type that represents the size of the mem parameter. Example: WOLFSSL_CTX* ctx = WOLFSSL_CTX_new(/*protocol method*/); WOLFSSL* ssl = WOLFSSL_new(ctx); void* mem; int sz = (*int) sizeof(mem); … if(wolfSSL_CTX_memrestore_cert_cache(ssl->ctx, mem, sz)){ /*The success case*/ } See Also: CM_MemRestoreCertCache wolfSSL_CTX_SetMinVersion Synopsis: #include int wolfSSL_CTX_SetMinVersion(WOLFSSL_CTX* ctx, int version); Description: This function sets the minimum downgrade version allowed. Applicable only when the connection allows downgrade using (wolfSSLv23_client_method or wolfSSLv23_server_method). Return Values: SSL_SUCCESS - returned if the function returned without error and the minimum version is set. BAD_FUNC_ARG - returned if the WOLFSSL_CTX structure was NULL or if the minimum version is not supported. Parameters: ctx - a pointer to a WOLFSSL_CTX structure, created using wolfSSL_CTX_new(). version - an integer representation of the version to be set as the minimum: Copyright 2017 wolfSSL Inc. All rights reserved. 335 WOLFSSL_SSLV3 = 0, WOLFSSL_TLSV1 = 1, WOLFSSL_TLSV1_1 = 2 or WOLFSSL_TLSV1_2 = 3. Example: WOLFSSL_CTX* ctx = WOLFSSL_CTX_new(/*protocol method*/); WOLFSSL* ssl = WOLFSSL_new(ctx); int version; /*macro representation */ … if(wolfSSL_CTX_SetMinVersion(ssl->ctx, version) != SSL_SUCCESS){ /*Failed to set min version*/ } See Also: SetMinVersionHelper 17.4 Callbacks The functions in this section have to do with callbacks which the application is able to set in relation to wolfSSL. wolfSSL_SetIOReadCtx Synopsis: void wolfSSL_SetIOReadCtx(WOLFSSL* ssl, void *rctx); Description: This function registers a context for the SSL session’s receive callback function. By default, wolfSSL sets the file descriptor passed to wolfSSL_set_fd() as the context when wolfSSL is using the system’s TCP library. If you’ve registered your own receive callback you may want to set a specific context for the session. For example, if you’re using memory buffers the context may be a pointer to a structure describing where and how to access the memory buffers. Return Values: No return values are used for this function. Parameters: Copyright 2017 wolfSSL Inc. All rights reserved. 336 ssl - pointer to the SSL session, created with wolfSSL_new(). rctx - pointer to the context to be registered with the SSL session’s (ssl) receive callback function. Example: int sockfd; WOLFSSL* ssl = 0; ... /*Manually setting the socket fd as the receive CTX, for example*/ wolfSSL_SetIOReadCtx(ssl, &sockfd); ... See Also: wolfSSL_SetIORecv wolfSSL_SetIOSend wolfSSL_SetIOWriteCtx wolfSSL_SetIOWriteCtx Synopsis: void wolfSSL_SetIOWriteCtx(WOLFSSL* ssl, void *wctx); Description: This function registers a context for the SSL session’s send callback function. By default, wolfSSL sets the file descriptor passed to wolfSSL_set_fd() as the context when wolfSSL is using the system’s TCP library. If you’ve registered your own send callback you may want to set a specific context for the session. For example, if you’re using memory buffers the context may be a pointer to a structure describing where and how to access the memory buffers. Return Values: No return values are used for this function. Parameters: ssl - pointer to the SSL session, created with wolfSSL_new(). wctx - pointer to the context to be registered with the SSL session’s (ssl) send callback Copyright 2017 wolfSSL Inc. All rights reserved. 337 function. Example: int sockfd; WOLFSSL* ssl = 0; ... /*Manually setting the socket fd as the send CTX, for example*/ wolfSSL_SetIOSendCtx(ssl, &sockfd); ... See Also: wolfSSL_SetIORecv wolfSSL_SetIOSend wolfSSL_SetIOReadCtx wolfSSL_SetIOReadFlags Synopsis: void wolfSSL_SetIOReadFlags( WOLFSSL* ssl, int flags); Description: This function sets the flags for the receive callback to use for the given SSL session. The receive callback could be either the default wolfSSL EmbedReceive callback, or a custom callback specified by the user (see wolfSSL_SetIORecv). The default flag value is set internally by wolfSSL to the value of 0. The default wolfSSL receive callback uses the recv() function to receive data from the socket. From the recv() man page: “The flags argument to a recv() function is formed by or'ing one or more of the values: MSG_OOB MSG_PEEK MSG_WAITALL process out-of-band data peek at incoming message wait for full request or error The MSG_OOB flag requests receipt of out-of-band data that would not be received in the normal data stream. Some protocols place expedited data at the head of the normal data queue, and thus this flag cannot be used with such protocols. The MSG_PEEK Copyright 2017 wolfSSL Inc. All rights reserved. 338 flag causes the receive operation to return data from the beginning of the receive queue without removing that data from the queue. Thus, a subsequent receive call will return the same data. The MSG_WAITALL flag requests that the operation block until the full request is satisfied. However, the call may still return less data than requested if a signal is caught, an error or disconnect occurs, or the next data to be received is of a different type than that returned.” Return Values: No return values are used for this function. Parameters: ssl - pointer to the SSL session, created with wolfSSL_new(). flags - value of the I/O read flags for the specified SSL session (ssl). Example: WOLFSSL* ssl = 0; ... /*Manually setting recv flags to 0*/ wolfSSL_SetIOReadFlags(ssl, 0); ... See Also: wolfSSL_SetIORecv wolfSSL_SetIOSend wolfSSL_SetIOReadCtx wolfSSL_SetIOWriteFlags Synopsis: void wolfSSL_SetIOWriteFlags( WOLFSSL* ssl, int flags); Description: This function sets the flags for the send callback to use for the given SSL session. The send callback could be either the default wolfSSL EmbedSend callback, or a custom callback specified by the user (see wolfSSL_SetIOSend). The default flag value is set internally by wolfSSL to the value of 0. The default wolfSSL send callback uses the send() function to send data from the Copyright 2017 wolfSSL Inc. All rights reserved. 339 socket. From the send() man page: “The flags parameter may include one or more of the following: #define MSG_OOB 0x1 /* process out-of-band data */ #define MSG_DONTROUTE 0x4 /* bypass routing, use direct interface */ The flag MSG_OOB is used to send ``out-of-band'' data on sockets that support this notion (e.g. SOCK_STREAM); the underlying protocol must also support ``out-of-band'' data. MSG_DONTROUTE is usually used only by diagnostic or routing programs.” Return Values: No return values are used for this function. Parameters: ssl - pointer to the SSL session, created with wolfSSL_new(). flags - value of the I/O send flags for the specified SSL session (ssl). Example: WOLFSSL* ssl = 0; ... /*Manually setting send flags to 0*/ wolfSSL_SetIOSendFlags(ssl, 0); ... See Also: wolfSSL_SetIORecv wolfSSL_SetIOSend wolfSSL_SetIOReadCtx wolfSSL_SetIORecv Synopsis: void wolfSSL_SetIORecv(WOLFSSL_CTX* ctx, CallbackIORecv CBIORecv); typedef int (*CallbackIORecv)(WOLFSSL* ssl, char* buf, int sz, void* ctx); Description: Copyright 2017 wolfSSL Inc. All rights reserved. 340 This function registers a receive callback for wolfSSL to get input data. By default, wolfSSL uses EmbedReceive() as the callback which uses the system’s TCP recv() function. The user can register a function to get input from memory, some other network module, or from anywhere. Please see the EmbedReceive() function in src/io.c as a guide for how the function should work and for error codes. In particular, IO_ERR_WANT_READ should be returned for non blocking receive when no data is ready. Return Values: No return values are used for this function. Parameters: ctx - pointer to the SSL context, created with wolfSSL_CTX_new(). callback - function to be registered as the receive callback for the wolfSSL context, ctx. The signature of this function must follow that as shown above in the Synopsis section. Example: WOLFSSL_CTX* ctx = 0; /*Receive callback prototype*/ int MyEmbedReceive(WOLFSSL* ssl, char* buf, int sz, void* ctx); /*Register the custom receive callback with wolfSSL*/ wolfSSL_SetIORecv(ctx, MyEmbedReceive); int MyEmbedReceive(WOLFSSL* ssl, char* buf, int sz, void* ctx) { /*custom EmbedReceive function*/ } See Also: wolfSSL_SetIOSend wolfSSL_SetIOReadCtx wolfSSL_SetIOWriteCtx wolfSSL_SetIOSend Synopsis: void wolfSSL_SetIOSend(WOLFSSL_CTX* ctx, CallbackIOSend CBIOSend); Copyright 2017 wolfSSL Inc. All rights reserved. 341 typedef int (*CallbackIOSend)(WOLFSSL* ssl, char* buf, int sz, void* ctx); Description: This function registers a send callback for wolfSSL to write output data. By default, wolfSSL uses EmbedSend() as the callback which uses the system’s TCP send() function. The user can register a function to send output to memory, some other network module, or to anywhere. Please see the EmbedSend() function in src/io.c as a guide for how the function should work and for error codes. In particular, IO_ERR_WANT_WRITE should be returned for non blocking send when the action cannot be taken yet. Return Values: No return values are used for this function. Parameters: ctx - pointer to the SSL context, created with wolfSSL_CTX_new(). callback - function to be registered as the send callback for the wolfSSL context, ctx. The signature of this function must follow that as shown above in the Synopsis section. Example: WOLFSSL_CTX* ctx = 0; /*Receive callback prototype*/ int MyEmbedSend(WOLFSSL* ssl, char* buf, int sz, void* ctx); /*Register the custom receive callback with wolfSSL*/ wolfSSL_SetIOSend(ctx, MyEmbedSend); int MyEmbedSend(WOLFSSL* ssl, char* buf, int sz, void* ctx) { /*custom EmbedSend function*/ } See Also: wolfSSL_SetIORecv wolfSSL_SetIOReadCtx wolfSSL_SetIOWriteCtx Copyright 2017 wolfSSL Inc. All rights reserved. 342 wolfSSL_CTX_set_TicketEncCb Synopsis: #include typedef int (*SessionTicketEncCb)(WOLFSSL*, unsigned char key_name[WOLFSSL_TICKET_NAME_SZ], unsigned char iv[WOLFSSL_TICKET_IV_SZ], unsigned char mac[WOLFSSL_TICKET_MAC_SZ], int enc, unsigned char* ticket, int inLen, int* outLen, void* userCtx); int wolfSSL_CTX_set_TicketEncCb(WOLFSSL_CTX* ctx, SessionTicketEncCb); Description: This function sets the session ticket key encrypt callback function for a server to support session tickets as specified in RFC 5077. Return Values: SSL_SUCCESS will be returned upon successfully setting the session. BAD_FUNC_ARG will be returned on failure. This is caused by passing invalid arguments to the function. Parameters: ctx - pointer to the WOLFSSL_CTX object, created with wolfSSL_CTX_new(). cb - user callback function to encrypt/decrypt session tickets Callback Parameters: ssl - pointer to the WOLFSSL object, created with wolfSSL_new() key_name - unique key name for this ticket context, should be randomly generated iv - unique IV for this ticket, up to 128 bits, should be randomly generated Copyright 2017 wolfSSL Inc. All rights reserved. 343 mac - up to 256 bit mac for this ticket enc - if this encrypt parameter is true the user should fill in key_name, iv, mac, and encrypt the ticket in-place of length inLen and set the resulting output length in *outLen. Returning WOLFSSL_TICKET_RET_OK tells wolfSSL that the encryption was successful. If this encrypt parameter is false, the user should perform a decrypt of the ticket in-place of length inLen using key_name, iv, and mac. The resulting decrypt length should be set in *outLen. Returning WOLFSSL_TICKET_RET_OK tells wolfSSL to proceed using the decrypted ticket. Returning WOLFSSL_TICKET_RET_CREATE tells wolfSSL to use the decrypted ticket but also to generate a new one to send to the client, helpful if recently rolled keys and don’t want to force a full handshake. Returning WOLFSSL_TICKET_RET_REJECT tells wolfSSL to reject this ticket, perform a full handshake, and create a new standard session ID for normal session resumption. Returning WOLFSSL_TICKET_RET_FATAL tells wolfSSL to end the connection attempt with a fatal error. ticket - the input/output buffer for the encrypted ticket. See the enc parameter inLen - the input length of the ticket parameter outLen - the resulting output length of the ticket parameter. When entering the callback outLen will indicate the maximum size available in the ticket buffer. userCtx - the user context set with wolfSSL_CTX_set_TicketEncCtx() Example: See wolfssl/test.h myTicketEncCb() used by the example server and example echoserver. See Also: wolfSSL_CTX_set_TicketHint wolfSSL_CTX_set_TicketEncCtx wolfSSL_CTX_set_TicketEncCb Synopsis: #include typedef int (*SessionTicketEncCb)(WOLFSSL*, Copyright 2017 wolfSSL Inc. All rights reserved. 344 unsigned char key_name[WOLFSSL_TICKET_NAME_SZ], unsigned char iv[WOLFSSL_TICKET_IV_SZ], unsigned char mac[WOLFSSL_TICKET_MAC_SZ], int enc, unsigned char* ticket, int inLen, int* outLen, void* userCtx); int wolfSSL_CTX_set_TicketEncCb(WOLFSSL_CTX* ctx, SessionTicketEncCb); Description: This function sets the session ticket key encrypt callback function for a server to support session tickets as specified in RFC 5077. Return Values: SSL_SUCCESS will be returned upon successfully setting the session. BAD_FUNC_ARG will be returned on failure. This is caused by passing invalid arguments to the function. Parameters: ctx - pointer to the WOLFSSL_CTX object, created with wolfSSL_CTX_new(). cb - user callback function to encrypt/decrypt session tickets Callback Parameters: ssl - pointer to the WOLFSSL object, created with wolfSSL_new() key_name - unique key name for this ticket context, should be randomly generated iv - unique IV for this ticket, up to 128 bits, should be randomly generated mac - up to 256 bit mac for this ticket enc - if this encrypt parameter is true the user should fill in key_name, iv, mac, and encrypt the ticket in-place of length inLen and set the resulting output length in *outLen. Returning WOLFSSL_TICKET_RET_OK tells wolfSSL that the encryption was successful. If this encrypt parameter is false, the user should perform a decrypt of the ticket in-place of length inLen using key_name, iv, and mac. The resulting decrypt Copyright 2017 wolfSSL Inc. All rights reserved. 345 length should be set in *outLen. Returning WOLFSSL_TICKET_RET_OK tells wolfSSL to proceed using the decrypted ticket. Returning WOLFSSL_TICKET_RET_CREATE tells wolfSSL to use the decrypted ticket but also to generate a new one to send to the client, helpful if recently rolled keys and don’t want to force a full handshake. Returning WOLFSSL_TICKET_RET_REJECT tells wolfSSL to reject this ticket, perform a full handshake, and create a new standard session ID for normal session resumption. Returning WOLFSSL_TICKET_RET_FATAL tells wolfSSL to end the connection attempt with a fatal error. ticket - the input/output buffer for the encrypted ticket. See the enc parameter inLen - the input length of the ticket parameter outLen - the resulting output length of the ticket parameter. When entering the callback outLen will indicate the maximum size available in the ticket buffer. userCtx - the user context set with wolfSSL_CTX_set_TicketEncCtx() Example: See wolfssl/test.h myTicketEncCb() used by the example server and example echoserver. See Also: wolfSSL_CTX_set_TicketHint wolfSSL_CTX_set_TicketEncCtx wolfSSL_CTX_set_TicketHint Synopsis: #include int wolfSSL_CTX_set_TicketHint(WOLFSSL_CTX* ctx, int hint); Description: This function sets the session ticket hint relayed to the client. For server side use. Return Values: SSL_SUCCESS will be returned upon successfully setting the session. Copyright 2017 wolfSSL Inc. All rights reserved. 346 BAD_FUNC_ARG will be returned on failure. This is caused by passing invalid arguments to the function. Parameters: ctx - pointer to the WOLFSSL_CTX object, created with wolfSSL_CTX_new(). hint - number of seconds the ticket might be valid for. Hint to client. See Also: wolfSSL_CTX_set_TicketEncCb() wolfSSL_CTX_set_TicketEncCtx Synopsis: #include int wolfSSL_CTX_set_TicketEncCtx(WOLFSSL_CTX* ctx, void* userCtx); Description: This function sets the session ticket encrypt user context for the callback. For server side use. Return Values: SSL_SUCCESS will be returned upon successfully setting the session. BAD_FUNC_ARG will be returned on failure. This is caused by passing invalid arguments to the function. Parameters: ctx - pointer to the WOLFSSL_CTX object, created with wolfSSL_CTX_new(). userCtx - the user context for the callback Copyright 2017 wolfSSL Inc. All rights reserved. 347 See Also: wolfSSL_CTX_set_TicketEncCb() wolfSSL_CTX_SetCACb Synopsis: void wolfSSL_CTX_SetCACb(WOLFSSL_CTX* ctx, CallbackCACache cb); typedef void (*CallbackCACache)(unsigned char* der, int sz, int type); Description: This function registers a callback with the SSL context (WOLFSSL_CTX) to be called when a new CA certificate is loaded into wolfSSL. The callback is given a buffer with the DER-encoded certificate. Return Values: This function has no return value. Parameters: ctx - pointer to the SSL context, created with wolfSSL_CTX_new(). callback - function to be registered as the CA callback for the wolfSSL context, ctx. The signature of this function must follow that as shown above in the Synopsis section. Example: WOLFSSL_CTX* ctx = 0; /*CA callback prototype*/ int MyCACallback(unsigned char *der, int sz, int type); /*Register the custom CA callback with the SSL context*/ wolfSSL_CTX_SetCACb(ctx, MyCACallback); int MyCACallback(unsigned char* der, int sz, int type) { /* custom CA callback function, DER-encoded cert located in “der” of size “sz” with type “type” */ } Copyright 2017 wolfSSL Inc. All rights reserved. 348 See Also: wolfSSL_CTX_load_verify_locations wolfSSL_connect_ex Synopsis: #include int wolfSSL_connect_ex(WOLFSSL* ssl, HandShakeCallBack hsCb, TimeoutCallBack toCb, Timeval timeout); typedef int (*HandShakeCallBack)(HandShakeInfo*); typedef int (*TimeoutCallBack)(TimeoutInfo*); typedef struct timeval Timeval; typedef struct handShakeInfo_st { char cipherName[MAX_CIPHERNAME_SZ + 1]; /* negotiated name */ char packetNames[MAX_PACKETS_HANDSHAKE][MAX_PACKETNAME_SZ+1]; /* SSL packet names */ int numberPackets; /* actual # of packets */ int negotiationError; /* cipher/parameter err */ } HandShakeInfo; typedef struct timeoutInfo_st { char timeoutName[MAX_TIMEOUT_NAME_SZ +1]; /*timeout Name*/ int flags; /* for future use*/ int numberPackets; /* actual # of packets */ PacketInfo packets[MAX_PACKETS_HANDSHAKE]; /* list of packets */ Timeval timeoutValue; /* timer that caused Copyright 2017 wolfSSL Inc. All rights reserved. 349 it */ } TimeoutInfo; typedef struct packetInfo_st { char packetName[MAX_PACKETNAME_SZ + 1]; /*SSL name*/ Timeval timestamp; /*when it occured */ unsigned char value[MAX_VALUE_SZ]; /*if fits, it's here*/ unsigned char* bufferValue; /*otherwise here(non 0)*/ int valueSz; /*sz of value or buffer*/ } PacketInfo; Description: wolfSSL_connect_ex() is an extension that allows a HandShake Callback to be set. This can be useful in embedded systems for debugging support when a debugger isn’t available and sniffing is impractical. The HandShake Callback will be called whether or not a handshake error occurred. No dynamic memory is used since the maximum number of SSL packets is known. Packet names can be accessed through packetNames[]. The connect extension also allows a Timeout Callback to be set along with a timeout value. This is useful if the user doesn’t want to wait for the TCP stack to timeout. This extension can be called with either, both, or neither callbacks. Return Values: If successful the call will return SSL_SUCCESS. GETTIME_ERROR will be returned if gettimeofday() encountered an error. SETITIMER_ERROR will be returned if setitimer() encountered an error. SIGACT_ERROR will be returned if sigaction() encountered an error. SSL_FATAL_ERROR will be returned if the underlying SSL_connect() call encountered an error. See Also: wolfSSL_accept_ex Copyright 2017 wolfSSL Inc. All rights reserved. 350 wolfSSL_accept_ex Synopsis: #include int wolfSSL_accept_ex(WOLFSSL* ssl, HandShakeCallBack hsCb, TimeoutCallBack toCb, Timeval timeout); typedef int (*HandShakeCallBack)(HandShakeInfo*); typedef int (*TimeoutCallBack)(TimeoutInfo*); typedef struct timeval Timeval; typedef struct handShakeInfo_st { char cipherName[MAX_CIPHERNAME_SZ + 1]; /*negotiated name*/ char packetNames[MAX_PACKETS_HANDSHAKE][MAX_PACKETNAME_SZ+1]; /* SSL packet names */ int numberPackets; int negotiationError; } HandShakeInfo; /*actual # of packets */ /*cipher/parameter err */ typedef struct timeoutInfo_st { char timeoutName[MAX_TIMEOUT_NAME_SZ +1]; /*timeout Name*/ int flags; /*for future use*/ int numberPackets; /*actual # of packets */ PacketInfo packets[MAX_PACKETS_HANDSHAKE]; /*list of packets */ Timeval timeoutValue; /* timer that caused it*/ } TimeoutInfo; Copyright 2017 wolfSSL Inc. All rights reserved. 351 typedef struct packetInfo_st { char packetName[MAX_PACKETNAME_SZ + 1];/*SSL name */ Timeval timestamp; /*when it occured */ unsigned char value[MAX_VALUE_SZ]; /*if fits, it's here */ unsigned char* bufferValue; /*otherwise here(non 0)*/ int valueSz; /*sz of value or buffer*/ } PacketInfo; Description: wolfSSL_accept_ex() is an extension that allows a HandShake Callback to be set. This can be useful in embedded systems for debugging support when a debugger isn’t available and sniffing is impractical. The HandShake Callback will be called whether or not a handshake error occurred. No dynamic memory is used since the maximum number of SSL packets is known. Packet names can be accessed through packetNames[]. The connect extension also allows a Timeout Callback to be set along with a timeout value. This is useful if the user doesn’t want to wait for the TCP stack to timeout. This extension can be called with either, both, or neither callbacks. Return Values: If successful the call will return SSL_SUCCESS. GETTIME_ERROR will be returned if gettimeofday() encountered an error. SETITIMER_ERROR will be returned if setitimer() encountered an error. SIGACT_ERROR will be returned if sigaction() encountered an error. SSL_FATAL_ERROR will be returned if the underlying SSL_accept() call encountered an error. See Also: wolfSSL_connect_ex wolfSSL_SetLoggingCb Synopsis: #include Copyright 2017 wolfSSL Inc. All rights reserved. 352 int wolfSSL_SetLoggingCb(wolfSSL_Logging_cb log_function); typedef void (*wolfSSL_Logging_cb)(const int logLevel, const char *const logMessage); Description: This function registers a logging callback that will be used to handle the wolfSSL log message. By default, if the system supports it fprintf() to stderr is used but by using this function anything can be done by the user. Return Values: If successful this function will return 0. BAD_FUNC_ARG is the error that will be returned if a function pointer is not provided. Parameters: log_function - function to register as a logging callback. Function signature must follow the above prototype. Example: int ret = 0; /*Logging callback prototype*/ void MyLoggingCallback(const int logLevel, const char* const logMessage); /*Register the custom logging callback with wolfSSL*/ ret = wolfSSL_SetLoggingCb(MyLoggingCallback); if (ret != 0) { /*failed to set logging callback*/ } void MyLoggingCallback(const int logLevel, const char* const logMessage) { /*custom logging function*/ } See Also: wolfSSL_Debugging_ON wolfSSL_Debugging_OFF Copyright 2017 wolfSSL Inc. All rights reserved. 353 wolfSSL_SetTlsHmacInner Synopsis: #include int wolfSSL_SetTlsHmacInner(WOLFSSL* ssl, byte* inner, word32 sz, int content, int verify); Description: Allows caller to set the Hmac Inner vector for message sending/receiving. The result is written to inner which should be at least wolfSSL_GetHmacSize() bytes. The size of the message is specified by sz, content is the type of message, and verify specifies whether this is a verification of a peer message. Valid for cipher types excluding WOLFSSL_AEAD_TYPE. Return Values: If successful the call will return 1. BAD_FUNC_ARG will be returned for an error state. See Also: wolfSSL_GetBulkCipher() wolfSSL_GetHmacType() wolfSSL_CTX_SetMacEncryptCb Synopsis: #include void wolfSSL_CTX_SetMacEncryptCb(WOLFSSL_CTX*, CallbackMacEncrypt); typedef int (*CallbackMacEncrypt)(WOLFSSL* ssl, unsigned char* macOut, const unsigned char* macIn, unsigned int macInSz, int macContent, int macVerify, unsigned char* encOut, const unsigned char* encIn, unsigned int encSz, void* ctx); Description: Allows caller to set the Atomic User Record Processing Mac/Encrypt Callback. The callback should return 0 for success or < 0 for an error. The ssl and ctx pointers are Copyright 2017 wolfSSL Inc. All rights reserved. 354 available for the user’s convenience. macOut is the output buffer where the result of the mac should be stored. macIn is the mac input buffer and macInSz notes the size of the buffer. macContent and macVerify are needed for wolfSSL_SetTlsHmacInner() and be passed along as is. encOut is the output buffer where the result on the encryption should be stored. encIn is the input buffer to encrypt while encSz is the size of the input. An example callback can be found wolfssl/test.h myMacEncryptCb(). Return Values: NA See Also: wolfSSL_SetMacEncryptCtx() wolfSSL_GetMacEncryptCtx() wolfSSL_SetMacEncryptCtx Synopsis: #include void wolfSSL_SetMacEncryptCtx(WOLFSSL*, void* ctx); Description: Allows caller to set the Atomic User Record Processing Mac/Encrypt Callback Context to ctx. Return Values: NA See Also: wolfSSL_CTX_SetMacEncryptCb() wolfSSL_GetMacEncryptCtx() wolfSSL_GetMacEncryptCtx Synopsis: #include Copyright 2017 wolfSSL Inc. All rights reserved. 355 void* wolfSSL_GetMacEncryptCtx(WOLFSSL*); Description: Allows caller to retrieve the Atomic User Record Processing Mac/Encrypt Callback Context previously stored with wolfSSL_SetMacEncryptCtx(). Return Values: If successful the call will return a valid pointer to the context. NULL will be returned for a blank context. See Also: wolfSSL_CTX_SetMacEncryptCb() wolfSSL_SetMacEncryptCtx() wolfSSL_CTX_SetDecryptVerifyCb Synopsis: #include void wolfSSL_CTX_SetDecryptVerifyCb(WOLFSSL_CTX*, CallbackDecryptVerify); typedef int (*CallbackDecryptVerify)(WOLFSSL* ssl, unsigned char* decOut, const unsigned char* decIn, unsigned int decSz, int content, int verify, unsigned int* padSz, void* ctx); Description: Allows caller to set the Atomic User Record Processing Decrypt/Verify Callback. The callback should return 0 for success or < 0 for an error. The ssl and ctx pointers are available for the user’s convenience. decOut is the output buffer where the result of the decryption should be stored. decIn is the encrypted input buffer and decInSz notes the size of the buffer. content and verify are needed for wolfSSL_SetTlsHmacInner() and be passed along as is. padSz is an output variable that should be set with the total value of the padding. That is, the mac size plus any padding and pad bytes. An example callback can be found wolfssl/test.h myDecryptVerifyCb(). Return Values: Copyright 2017 wolfSSL Inc. All rights reserved. 356 NA See Also: wolfSSL_SetMacEncryptCtx() wolfSSL_GetMacEncryptCtx() wolfSSL_SetDecryptVerifyCtx Synopsis: #include void wolfSSL_SetDecryptVerifyCtx(WOLFSSL*, void* ctx); Description: Allows caller to set the Atomic User Record Processing Decrypt/Verify Callback Context to ctx. Return Values: NA See Also: wolfSSL_CTX_SetDecryptVerifyCb() wolfSSL_GetDecryptVerifyCtx() wolfSSL_GetDecryptVerifyCtx Synopsis: #include void* wolfSSL_GetDecryptVerifyCtx(WOLFSSL*); Description: Allows caller to retrieve the Atomic User Record Processing Decrypt/Verify Callback Context previously stored with wolfSSL_SetDecryptVerifyCtx(). Return Values: If successful the call will return a valid pointer to the context. Copyright 2017 wolfSSL Inc. All rights reserved. 357 NULL will be returned for a blank context. See Also: wolfSSL_CTX_SetDecryptVerifyCb() wolfSSL_SetDecryptVerifyCtx() wolfSSL_CTX_SetEccSignCb Synopsis: #include void wolfSSL_CTX_SetEccSignCb(WOLFSSL_CTX*, CallbackEccSign); typedef int (*CallbackEccSign)(WOLFSSL* ssl, const unsigned char* in, unsigned int inSz, unsigned char* out, unsigned int* outSz, const unsigned char* keyDer, unsigned int keySz, void* ctx); Description: Allows caller to set the Public Key Callback for ECC Signing. The callback should return 0 for success or < 0 for an error. The ssl and ctx pointers are available for the user’s convenience. in is the input buffer to sign while inSz denotes the length of the input. out is the output buffer where the result of the signature should be stored. outSz is an input/output variable that specifies the size of the output buffer upon invocation and the actual size of the signature should be stored there before returning. keyDer is the ECC Private key in ASN1 format and keySz is the length of the key in bytes. An example callback can be found wolfssl/test.h myEccSign(). Return Values: NA See Also: wolfSSL_SetEccSignCtx() wolfSSL_GetEccSignCtx() wolfSSL_SetEccSignCtx Copyright 2017 wolfSSL Inc. All rights reserved. 358 Synopsis: #include void wolfSSL_SetEccSignCtx(WOLFSSL*, void* ctx); Description: Allows caller to set the Public Key Ecc Signing Callback Context to ctx. Return Values: NA See Also: wolfSSL_CTX_SetEccSignCb() wolfSSL_GetEccSignCtx() wolfSSL_GetEccSignCtx Synopsis: #include void* wolfSSL_GetEccSignCtx(WOLFSSL*); Description: Allows caller to retrieve the Public Key Ecc Signing Callback Context previously stored with wolfSSL_SetEccSignCtx(). Return Values: If successful the call will return a valid pointer to the context. NULL will be returned for a blank context. See Also: wolfSSL_CTX_SetEccSignCb() wolfSSL_SetEccSignCtx() wolfSSL_CTX_SetEccVerifyCb Copyright 2017 wolfSSL Inc. All rights reserved. 359 Synopsis: #include void wolfSSL_CTX_SetEccVerifyCb(WOLFSSL_CTX*, CallbackEccVerify); typedef int (*CallbackEccVerify)(WOLFSSL* ssl, const unsigned char* sig, unsigned int sigSz, const unsigned char* hash, unsigned int hashSz, const unsigned char* keyDer, unsigned int keySz, int* result, void* ctx); Description: Allows caller to set the Public Key Callback for ECC Verification. The callback should return 0 for success or < 0 for an error. The ssl and ctx pointers are available for the user’s convenience. sig is the signature to verify and sigSz denotes the length of the signature. hash is an input buffer containing the digest of the message and hashSz denotes the length in bytes of the hash. result is an output variable where the result of the verification should be stored, 1 for success and 0 for failure. keyDer is the ECC Private key in ASN1 format and keySz is the length of the key in bytes. An example callback can be found wolfssl/test.h myEccVerify(). Return Values: NA See Also: wolfSSL_SetEccVerifyCtx() wolfSSL_GetEccVerifyCtx() wolfSSL_SetEccVerifyCtx Synopsis: #include void wolfSSL_SetEccVerifyCtx(WOLFSSL*, void* ctx); Description: Allows caller to set the Public Key Ecc Verification Callback Context to ctx. Copyright 2017 wolfSSL Inc. All rights reserved. 360 Return Values: NA See Also: wolfSSL_CTX_SetEccVerifyCb() wolfSSL_GetEccVerifyCtx() wolfSSL_GetEccVerifyCtx Synopsis: #include void* wolfSSL_GetEccVerifyCtx(WOLFSSL*); Description: Allows caller to retrieve the Public Key Ecc Verification Callback Context previously stored with wolfSSL_SetEccVerifyCtx(). Return Values: If successful the call will return a valid pointer to the context. NULL will be returned for a blank context. See Also: wolfSSL_CTX_SetEccVerifyCb() wolfSSL_SetEccVerifyCtx() wolfSSL_CTX_SetRsaSignCb Synopsis: #include void wolfSSL_CTX_SetEccRsaCb(WOLFSSL_CTX*, CallbackRsaSign); typedef int (*CallbackRsaSign)(WOLFSSL* ssl, const unsigned char* in, unsigned int inSz, unsigned char* out, unsigned int* outSz, Copyright 2017 wolfSSL Inc. All rights reserved. 361 const unsigned char* keyDer, unsigned int keySz, void* ctx); Description: Allows caller to set the Public Key Callback for RSA Signing. The callback should return 0 for success or < 0 for an error. The ssl and ctx pointers are available for the user’s convenience. in is the input buffer to sign while inSz denotes the length of the input. out is the output buffer where the result of the signature should be stored. outSz is an input/output variable that specifies the size of the output buffer upon invocation and the actual size of the signature should be stored there before returning. keyDer is the RSA Private key in ASN1 format and keySz is the length of the key in bytes. An example callback can be found wolfssl/test.h myRsaSign(). Return Values: NA See Also: wolfSSL_SetRsaSignCtx() wolfSSL_GetRsaSignCtx() wolfSSL_SetRsaSignCtx Synopsis: #include void wolfSSL_SetRsaSignCtx(WOLFSSL*, void* ctx); Description: Allows caller to set the Public Key RSA Signing Callback Context to ctx. Return Values: NA See Also: wolfSSL_CTX_SetRsaSignCb() wolfSSL_GetRsaSignCtx() Copyright 2017 wolfSSL Inc. All rights reserved. 362 wolfSSL_GetRsaSignCtx Synopsis: #include void* wolfSSL_GetRsaSignCtx(WOLFSSL*); Description: Allows caller to retrieve the Public Key RSA Signing Callback Context previously stored with wolfSSL_SetRsaSignCtx(). Return Values: If successful the call will return a valid pointer to the context. NULL will be returned for a blank context. See Also: wolfSSL_CTX_SetRsaSignCb() wolfSSL_SetRsaSignCtx() wolfSSL_CTX_SetRsaVerifyCb Synopsis: #include void wolfSSL_CTX_SetRsaVerifyCb(WOLFSSL_CTX*, CallbackRsaVerify); typedef int (*CallbackRsaVerify)(WOLFSSL* ssl, unsigned char* sig, unsigned int sigSz, unsigned char** out, const unsigned char* keyDer, unsigned int keySz, void* ctx); Description: Allows caller to set the Public Key Callback for RSA Verification. The callback should return the number of plaintext bytes for success or < 0 for an error. The ssl and ctx pointers are available for the user’s convenience. sig is the signature to verify and sigSz denotes the length of the signature. out should be set to the beginning of the verification buffer after the decryption process and any padding. keyDer is the RSA Copyright 2017 wolfSSL Inc. All rights reserved. 363 Public key in ASN1 format and keySz is the length of the key in bytes. An example callback can be found wolfssl/test.h myRsaVerify(). Return Values: NA Also: wolfSSL_SetRsaVerifyCtx() wolfSSL_GetRsaVerifyCtx() wolfSSL_SetRsaVerifyCtx Synopsis: #include void wolfSSL_SetRsaVerifyCtx(WOLFSSL*, void* ctx); Description: Allows caller to set the Public Key RSA Verification Callback Context to ctx. Return Values: NA See Also: wolfSSL_CTX_SetRsaVerifyCb() wolfSSL_GetRsaVerifyCtx() wolfSSL_GetRsaVerifyCtx Synopsis: #include void* wolfSSL_GetRsaVerifyCtx(WOLFSSL*); Description: Allows caller to retrieve the Public Key RSA Verification Callback Context previously Copyright 2017 wolfSSL Inc. All rights reserved. 364 stored with wolfSSL_SetRsaVerifyCtx(). Return Values: If successful the call will return a valid pointer to the context. NULL will be returned for a blank context. See Also: wolfSSL_CTX_SetRsaVerifyCb() wolfSSL_SetRsaVerifyCtx() wolfSSL_CTX_SetRsaEncCb Synopsis: #include void wolfSSL_CTX_SetRsaEncCb(WOLFSSL_CTX*, CallbackRsaEnc); typedef int (*CallbackRsaEnc)(WOLFSSL* ssl, const unsigned char* in, unsigned int inSz, unsigned char* out, unsigned int* outSz, const unsigned char* keyDer, unsigned int keySz, void* ctx); Description: Allows caller to set the Public Key Callback for RSA Public Encrypt. The callback should return 0 for success or < 0 for an error. The ssl and ctx pointers are available for the user’s convenience. in is the input buffer to encrypt while inSz denotes the length of the input. out is the output buffer where the result of the encryption should be stored. outSz is an input/output variable that specifies the size of the output buffer upon invocation and the actual size of the encryption should be stored there before returning. keyDer is the RSA Public key in ASN1 format and keySz is the length of the key in bytes. An example callback can be found wolfssl/test.h myRsaEnc(). Return Values: NA See Also: wolfSSL_SetRsaEncCtx() Copyright 2017 wolfSSL Inc. All rights reserved. 365 wolfSSL_GetRsaEncCtx() wolfSSL_SetRsaEncCtx Synopsis: #include void wolfSSL_SetRsaEncCtx(WOLFSSL*, void* ctx); Description: Allows caller to set the Public Key RSA Public Encrypt Callback Context to ctx. Return Values: NA See Also: wolfSSL_CTX_SetRsaEncCb() wolfSSL_GetRsaEncCtx() wolfSSL_GetRsaEncCtx Synopsis: #include void* wolfSSL_GetRsaEncCtx(WOLFSSL*); Description: Allows caller to retrieve the Public Key RSA Public Encrypt Callback Context previously stored with wolfSSL_SetRsaEncCtx(). Return Values: If successful the call will return a valid pointer to the context. NULL will be returned for a blank context. See Also: Copyright 2017 wolfSSL Inc. All rights reserved. 366 wolfSSL_CTX_SetRsaEncCb() wolfSSL_SetRsaEncCtx() wolfSSL_CTX_SetRsaDecCb Synopsis: #include void wolfSSL_CTX_SetRsaDecCb(WOLFSSL_CTX*, CallbackRsaDec); typedef int (*CallbackRsaDec)(WOLFSSL* ssl, unsigned char* in, unsigned int inSz, unsigned char** out, const unsigned char* keyDer, unsigned int keySz, void* ctx); Description: Allows caller to set the Public Key Callback for RSA Private Decrypt. The callback should return the number of plaintext bytes for success or < 0 for an error. The ssl and ctx pointers are available for the user’s convenience. in is the input buffer to decrypt and inSz denotes the length of the input. out should be set to the beginning of the decryption buffer after the decryption process and any padding. keyDer is the RSA Private key in ASN1 format and keySz is the length of the key in bytes. An example callback can be found wolfssl/test.h myRsaDec(). Return Values: NA See Also: wolfSSL_SetRsaDecCtx() wolfSSL_GetRsaDecCtx() wolfSSL_SetRsaDecCtx Synopsis: #include Copyright 2017 wolfSSL Inc. All rights reserved. 367 void wolfSSL_SetRsaDecCtx(WOLFSSL*, void* ctx); Description: Allows caller to set the Public Key RSA Private Decrypt Callback Context to ctx. Return Values: NA See Also: wolfSSL_CTX_SetRsaDecCb() wolfSSL_GetRsaDecCtx() wolfSSL_GetRsaDecCtx Synopsis: #include void* wolfSSL_GetRsaDecCtx(WOLFSSL*); Description: Allows caller to retrieve the Public Key RSA Private Decrypt Callback Context previously stored with wolfSSL_SetRsaDecCtx(). Return Values: If successful the call will return a valid pointer to the context. NULL will be returned for a blank context. See Also: wolfSSL_CTX_SetRsaDecCb() wolfSSL_SetRsaDecCtx() wolfSSL_set_SessionTicket_cb Synopsis: #include Copyright 2017 wolfSSL Inc. All rights reserved. 368 int wolfSSL_set_SessionTicket_cb(WOLFSSL* ssl, CallbackSessionTicket cb, void* ctx); Description: This function sets the session ticket callback. The type CallbackSessionTicket is a function pointer with the signature of: int (*CallbackSessionTicket)(WOLFSSL*, const unsigned char*, int, void*) Return Values: SSL_SUCCESS - returned if the function executed without error. BAD_FUNC_ARG - returned if the WOLFSSL structure is NULL. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). cb - a function pointer to the type CallbackSessionTicket. ctx - a void pointer to the session_ticket_ctx member of the WOLFSSL structure. Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*method*/); WOLFSSL* ssl = wolfSSL_new(ctx); … int sessionTicketCB(WOLFSSL* ssl, const unsigned char* ticket, int ticketSz, void* ctx){ … } wolfSSL_set_SessionTicket_cb(ssl, sessionTicketCB, (void*)”initial session”); See Also: wolfSSL_set_SessionTicket CallbackSessionTicket sessionTicketCB wolfSSL_set_session_secret_cb Synopsis: #include Copyright 2017 wolfSSL Inc. All rights reserved. 369 int wolfSSL_set_session_secret_cb(WOLFSSL* ssl, SessionSecretCb cb, void* ctx); Description: This function sets the session secret callback function. The SessionSecretCb type has the signature: int (*SessionSecretCb)(WOLFSSL* ssl, void* secret, int* secretSz, void* ctx). The sessionSecretCb member of the WOLFSSL struct is set to the parameter cb. Return Values: SSL_SUCCESS - returned if the execution of the function did not return an error. SSL_FATAL_ERROR - returned if the WOLFSSL structure is NULL. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). cb - a SessionSecretCb type that is a function pointer with the above signature. Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*method*/); WOLFSSL* ssl = wolfSSL_new(ctx); int SessionSecretCB (WOLFSSL* ssl, void* secret, int* secretSz, void* ctx) = SessionSecretCb; /*Signature of SessionSecretCb*/ … int wolfSSL_set_session_secret_cb(ssl, SessionSecretCB, (void*)ssl->ctx){ /*Function body. */ } See Also: SessionSecretCb wolfSSL_CTX_SetGenCookie Synopsis: #include void wolfSSL_CTX_SetGenCookie(WOLFSSL_CTX* ctx, CallbackGenCookie cb); Copyright 2017 wolfSSL Inc. All rights reserved. 370 Description: This function sets the callback for the CBIOCookie member of the WOLFSSL_CTX structure. The CallbackGenCookie type is a function pointer and has the signature: int (*CallbackGenCookie)(WOLFSSL* ssl, unsigned char* buf, int sz, void* ctx); Return Values: This function has no return value. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). cb - a CallbackGenCookie type function pointer with the signature of CallbackGenCookie. Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*method*/); WOLFSSL* ssl = wolfSSL_new(ctx); … int SetGenCookieCB(WOLFSSL* ssl, unsigned char* buf, int sz, void* ctx){ /*Callback function body. */ } … wolfSSL_CTX_SetGenCookie(ssl->ctx, SetGenCookieCB); See Also: CallbackGenCookie wolfSSL_SetHsDoneCb Synopsis: #include int wolfSSL_SetHsDoneCb(WOLFSSL* ssl, HandShakeDoneCb cb, void* user_ctx); Description: This function sets the handshake done callback. The hsDoneCb and hsDoneCtx members of the WOLFSSL structure are set in this function. Return Values: Copyright 2017 wolfSSL Inc. All rights reserved. 371 SSL_SUCCESS - returned if the function executed without an error. The hsDoneCb and hsDoneCtx members of the WOLFSSL struct are set. BAD_FUNC_ARG - returned if the WOLFSSL struct is NULL. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). cb - a function pointer of type HandShakeDoneCb with the signature of the form: int (*HandShakeDoneCb)(WOLFSSL*, void*); user_ctx - a void pointer to the user registered context. Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*method*/); WOLFSSL* ssl = wolfSSL_new(ctx); … int myHsDoneCb(WOLFSSL* ssl, void* user_ctx){ /*callback function */ } … wolfSSL_SetHsDoneCb(ssl, myHsDoneCb, NULL); See Also: HandShakeDoneCb wolfSSL_SetFuzzerCb Synopsis: #include void wolfSSL_SetFuzzerCb(WOLFSSL* ssl, CallbackFuzzer cbf, void* fCtx); Description: This function sets the fuzzer callback. Return Values: This function has no return value. Copyright 2017 wolfSSL Inc. All rights reserved. 372 Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). cbf - a CallbackFuzzer type that is a function pointer of the form: int (*CallbackFuzzer)(WOLFSSL* ssl, const unsigned char* buf, int sz, int type, void* fuzzCtx); fCtx - a void pointer type that will be set to the fuzzerCtx member of the WOLFSSL structure. Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*method*/); WOLFSSL* ssl = wolfSSL_new(ctx); void* fCtx; int callbackFuzzerCB(WOLFSSL* ssl, const unsigned char* buf, int sz, int type, void* fuzzCtx){ /*function definition*/ } … wolfSSL_SetFuzzerCb(ssl, callbackFuzzerCB, fCtx); See Also: CallbackFuzzer wolfSSL_CertManagerSetCRL_Cb Synopsis: #include int wolfSSL_CertManagerSetCRL_Cb(WOLFSSL_CERT_MANAGER* cm, CbMissingCRL cb); Description: This function sets the CRL Certificate Manager callback. If HAVE_CRL is defined and a matching CRL record is not found then the cbMissingCRL is called (set via wolfSSL_CertManagerSetCRL_Cb). This allows you to externally retrieve the CRL and load it. Return Values: Copyright 2017 wolfSSL Inc. All rights reserved. 373 SSL_SUCCESS - returned upon successful execution of the function and subroutines. BAD_FUNC_ARG - returned if the WOLFSSL_CERT_MANAGER structure is NULL. Parameters: cm - the WOLFSSL_CERT_MANAGER structure holding the information for the certificate. cb - a function pointer to (*CbMissingCRL) that is set to the cbMissingCRL member of the WOLFSSL_CERT_MANAGER. Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*protocol method*/); WOLFSSL* ssl = wolfSSL_new(ctx); … void cb(const char* url){ /*Function body. */ } … CbMissingCRL cb = CbMissingCRL; … if(ctx){ return wolfSSL_CertManagerSetCRL_Cb(ssl->ctx->cm, cb); } See Also: CbMissingCRL wolfSSL_SetCRL_Cb wolfSSL_SetOCSP_Cb Synopsis: #include int wolfSSL_SetOCSP_Cb(WOLFSSL* ssl, CbOCSPIO ioCb, CbOCSPRespFree respFreeCb, void* ioCbCtx); Description: This function sets the OCSP callback in the WOLFSSL_CERT_MANAGER structure. Copyright 2017 wolfSSL Inc. All rights reserved. 374 Return Values: SSL_SUCCESS - returned if the function executes without error. The ocspIOCb, ocspRespFreeCb, and ocspIOCtx memebers of the CM are set. BAD_FUNC_ARG - returned if the WOLFSSL or WOLFSSL_CERT_MANAGER structures are NULL. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). ioCb - a function pointer to type CbOCSPIO. respFreeCb - a function pointer to type CbOCSPRespFree which is the call to free the response memory. ioCbCtx - a void pointer that will be held in the ocspIOCtx member of the CM. Example: WOLFSSL* ssl = wolfSSL_new(ctx); … int OCSPIO_CB(void* , const char*, int , unsigned char* , int, unsigned char**){ /*must have this signature*/ /*Function Body*/ } … void OCSPRespFree_CB(void* , unsigned char* ){ /*must have this signature*/ /*function body*/ } … void* ioCbCtx; CbOCSPRespFree CB_OCSPRespFree; if(wolfSSL_SetOCSP_Cb(ssl, OCSPIO_CB(/*Pass args*/), CB_OCSPRespFree, ioCbCtx) != SSL_SUCCESS){ /*Callback not set */ } See Also: wolfSSL_CertManagerSetOCSP_Cb CbOCSPIO CbOCSPRespFree Copyright 2017 wolfSSL Inc. All rights reserved. 375 wolfSSL_SetCRL_Cb Synopsis: #include int wolfSSL_SetCRL_Cb(WOLFSSL* ssl, CbMissingCRL cb); Description: Sets the CRL callback in the WOLFSSL_CERT_MANAGER structure. Return Values: SSL_SUCCESS - returned if the function or subroutine executes without error. The cbMissingCRL member of the WOLFSSL_CERT_MANAGER is set. BAD_FUNC_ARG - returned if the WOLFSSL or WOLFSSL_CERT_MANAGER structure is NULL. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). cb - a function pointer to CbMissingCRL. Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*protocol method*/); WOLFSSL* ssl = wolfSSL_new(ctx); … void cb(const char* url)/*required signature */ { /*Function body */ } … int crlCb = wolfSSL_SetCRL_Cb(ssl, cb); if(crlCb != SSL_SUCCESS){ /*The callback was not set properly */ } See Also: CbMissingCRL wolfSSL_CertManagerSetCRL_Cb Copyright 2017 wolfSSL Inc. All rights reserved. 376 wolfSSL_CTX_SetOCSP_Cb Synopsis: #include int wolfSSL_CTX_SetOCSP_Cb(WOLFSSL_CTX* ctx, CbOCSPIO ioCb, CbOCSPRespFree respFreeCb, void* ioCbCtx); Description: Sets the callback for the OCSP in the WOLFSSL_CTX structure. Return Values: SSL_SUCCESS - returned if the function executed successfully. The ocspIOCb, ocspRespFreeCb, and ocspIOCtx members in the CM were successfully set. BAD_FUNC_ARG - returned if the WOLFSSL_CTX or WOLFSSL_CERT_MANAGER structure is NULL. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). ioCb - a CbOCSPIO type that is a function pointer. respFreeCb - a CbOCSPRespFree type that is a function pointer. ioCbCtx - a void pointer that will be held in the WOLFSSL_CERT_MANAGER. Example: WOLFSSL_CTX* ctx = wolfSSL_CTX_new(/*protocol method*/); … CbOCSPIO ocspIOCb; CbOCSPRespFree ocspRespFreeCb; … void* ioCbCtx; int isSetOCSP = wolfSSL_CTX_SetOCSP_Cb(ctx, ocspIOCb, ocspRespFreeCb, ioCbCtx); Copyright 2017 wolfSSL Inc. All rights reserved. 377 if(isSetOCSP != SSL_SUCCESS){ /*The function did not return successfully. */ } See Also: wolfSSL_CertManagerSetOCSP_Cb CbOCSPIO CbOCSPRespFree wolfSSL_CertManagerSetOCSP_Cb Synopsis: #include int wolfSSL_CertManagerSetOCSP_Cb(WOLFSSL_CERT_MANAGER* cm, CbOCSPIO ioCb, CbOCSPRespFree respFreeCb, void* ioCbCtx); Description: The function sets the OCSP callback in the WOLFSSL_CERT_MANAGER. Return Values: SSL_SUCCESS - returned on successful execution. The arguments are saved in the WOLFSSL_CERT_MANAGER structure. BAD_FUNC_ARG - returned if the WOLFSSL_CERT_MANAGER is NULL. Parameters: cm - a pointer to a WOLFSSL_CERT_MANAGER structure. ioCb - a function pointer of type CbOCSPIO. respFreeCb - a function pointer of type CbOCSPRespFree. ioCbCtx - a void pointer variable to the I/O callback user registered context. Example: wolfSSL_SetOCSP_Cb(WOLFSSL* ssl, CbOCSPIO ioCb, CbOCSPRespFree respFreeCb, void* ioCbCtx){ Copyright 2017 wolfSSL Inc. All rights reserved. 378 … return wolfSSL_CertManagerSetOCSP_Cb(ssl->ctx->cm, ioCb, respFreeCb, ioCbCtx); See Also: wolfSSL_CertManagerSetOCSPOverrideURL wolfSSL_CertManagerCheckOCSP wolfSSL_CertManagerEnableOCSPStapling wolfSSL_ENableOCSP wolfSSL_DisableOCSP wolfSSL_SetOCSP_Cb wolfSSL_set_psk_client_callback Synopsis: #include void wolfSSL_set_psk_client_callback(WOLFSSL* ssl, wc_psk_client_callback cb); Description: Sets the PSK client side callback. Return Values: This function has no return value. Parameters: ssl - a pointer to a WOLFSSL structure, created using wolfSSL_new(). cb - a function pointer to type wc_psk_client_callback. Example: WOLFSSL* ssl; unsigned int cb(WOLFSSL*, const char*, char*)/*Header of function* { /*Funciton body */ } … cb = wc_psk_client_callback; if(ssl){ wolfSSL_set_psk_client_callback(ssl, cb); Copyright 2017 wolfSSL Inc. All rights reserved. 379 } else { /*could not set callback */ } See Also: wolfSSL_CTX_set_psk_client_callback wolfSSL_CTX_set_psk_server_callback wolfSSL_set_psk_server_callback wolfSSL_CTX_SetCRL_Cb Synopsis: #include