X-Git-Url: http://git.code-monkey.de/?a=blobdiff_plain;f=src%2Fssl.h;h=3c59f440b109611174571e07e6f178781bd92b8d;hb=2ce951c559f61bdae2a424e378e40bfd6fc815ec;hp=f88e3017a8f80606623ba1206e28043a7bb38db5;hpb=59d006faba0b4f526010c66e9d4b8d3768450a6b;p=umurmur.git diff --git a/src/ssl.h b/src/ssl.h index f88e301..3c59f44 100644 --- a/src/ssl.h +++ b/src/ssl.h @@ -1,6 +1,6 @@ /* Copyright (C) 2009-2014, Martin Johansson - Copyright (C) 2005-2014, Thorvald Natvig + Copyright (C) 2005-2014, Thorvald Natvig All rights reserved. Redistribution and use in source and binary forms, with or without @@ -33,12 +33,16 @@ #define SSL_H_987698 #include "config.h" +#include "types.h" -#ifdef USE_POLARSSL +#include +#include + +#if defined(USE_POLARSSL) #include #include -#ifdef POLARSSL_VERSION_MAJOR +#if defined(POLARSSL_VERSION_MAJOR) #if (POLARSSL_VERSION_MAJOR < 1) #error PolarSSL version 1.0.0 or greater is required! #endif @@ -46,7 +50,7 @@ #error PolarSSL version 1.0.0 or greater is required! #endif -#ifdef USE_POLARSSL_HAVEGE +#if defined(USE_POLARSSL_HAVEGE) #include #if (POLARSSL_VERSION_MINOR >= 1) #define HAVEGE_RAND (havege_random) @@ -74,15 +78,6 @@ int urandom_bytes(void *ctx, unsigned char *dest, size_t len); #define POLARSSL_API_V1_3_ABOVE #endif -#else /* OpenSSL */ -#include -#include -#endif - -#include "types.h" -#include - -#ifdef USE_POLARSSL #define SSLI_ERROR_WANT_READ -0x0F300 /* PolarSSL v0.x.x uses -0x0f00 -> --0x0f90, v1.x.x uses -0x7080 -> -0x7e80 */ #define SSLI_ERROR_WANT_WRITE -0x0F310 @@ -92,7 +87,55 @@ int urandom_bytes(void *ctx, unsigned char *dest, size_t len); typedef ssl_context SSL_handle_t; +#elif defined(USE_MBEDTLS) +#include + +#if !defined(MBEDTLS_VERSION_MAJOR) || (MBEDTLS_VERSION_MAJOR < 2) +#error mbedTLS version 2.0.0 or greater is required! +#endif + +#include +#if (MBEDTLS_VERSION_MINOR > 3) +#include +#else +#include +#endif + +#if defined(USE_MBEDTLS_HAVEGE) +#include + #define HAVEGE_RAND (havege_random) + #define RAND_bytes(_dst_, _size_) do { \ + mbedtls_havege_random(&hs, _dst_, _size_); \ + } while (0) #else +#define RAND_bytes(_dst_, _size_) do { urandom_bytes(NULL, _dst_, _size_); } while (0) +int urandom_bytes(void *ctx, unsigned char *dest, size_t len); +#endif + +#define SSLI_ERROR_WANT_READ -0x0F300 /* mbedTLS v0.x.x uses -0x0f00 -> --0x0f90, v1.x.x uses -0x7080 -> -0x7e80 */ +#define SSLI_ERROR_WANT_WRITE -0x0F310 + +#define SSLI_ERROR_ZERO_RETURN 0 +#define SSLI_ERROR_CONNRESET MBEDTLS_ERR_NET_CONN_RESET +#define SSLI_ERROR_SYSCALL MBEDTLS_ERR_NET_RECV_FAILED + +typedef mbedtls_ssl_context SSL_handle_t; + +#elif defined(USE_GNUTLS) + +#include + +#define SSLI_ERROR_WANT_READ GNUTLS_E_AGAIN +#define SSLI_ERROR_WANT_WRITE GNUTLS_E_AGAIN +#define SSLI_ERROR_ZERO_RETURN GNUTLS_E_PREMATURE_TERMINATION +#define SSLI_ERROR_CONNRESET GNUTLS_E_PREMATURE_TERMINATION +#define SSLI_ERROR_SYSCALL GNUTLS_E_PREMATURE_TERMINATION + +typedef gnutls_session_t SSL_handle_t; + +#else /* OpenSSL */ +#include +#include #define SSLI_ERROR_WANT_READ SSL_ERROR_WANT_READ #define SSLI_ERROR_WANT_WRITE SSL_ERROR_WANT_WRITE @@ -119,21 +162,41 @@ void SSLi_free(SSL_handle_t *ssl); static inline void SSLi_hash2hex(uint8_t *hash, char *out) { + const char hexdigits[] = "0123456789abcdef"; int i, offset = 0; - for (i = 0; i < 20; i++) - offset += sprintf(out + offset, "%02x", hash[i]); + for (i = 0; i < 20; i++) { + out[offset++] = hexdigits[hash[i] >> 4]; + out[offset++] = hexdigits[hash[i] & 0x0f]; + } + + out[offset] = '\0'; } + +static inline uint8_t nibble(char c) +{ + if (c >= '0' && c <= '9') + return c - '0'; + + /* Force lower case so we don't need to check + * for upper case characters. + */ + c |= 32; + + return c - 'a' + 10; +} + static inline void SSLi_hex2hash(char *in, uint8_t *hash) { int i, offset = 0; - char byte[3]; - int scanned; - byte[2] = '\0'; for (i = 0; i < 20; i++) { - memcpy(byte, &in[i * 2], 2); - sscanf(byte, "%02x", &scanned); - hash[i] = scanned; + uint8_t upper, lower; + + upper = nibble(in[offset++]); + lower = nibble(in[offset++]); + + hash[i] = (upper << 4) | lower; } } #endif +