26typedef struct ssl_ctx_st tor_tls_context_impl_t;
27typedef struct ssl_st tor_tls_impl_t;
30typedef struct PRFileDesc tor_tls_context_impl_t;
31typedef struct PRFileDesc tor_tls_impl_t;
35struct tor_x509_cert_t;
38#define MIN_TOR_TLS_ERROR_VAL_ -9
39#define TOR_TLS_ERROR_MISC -9
41#define TOR_TLS_ERROR_IO -8
42#define TOR_TLS_ERROR_CONNREFUSED -7
43#define TOR_TLS_ERROR_CONNRESET -6
44#define TOR_TLS_ERROR_NO_ROUTE -5
45#define TOR_TLS_ERROR_TIMEOUT -4
46#define TOR_TLS_CLOSE -3
47#define TOR_TLS_WANTREAD -2
48#define TOR_TLS_WANTWRITE -1
53#define CASE_TOR_TLS_ERROR_ANY_NONIO \
54 case TOR_TLS_ERROR_MISC: \
55 case TOR_TLS_ERROR_CONNREFUSED: \
56 case TOR_TLS_ERROR_CONNRESET: \
57 case TOR_TLS_ERROR_NO_ROUTE: \
58 case TOR_TLS_ERROR_TIMEOUT
62#define CASE_TOR_TLS_ERROR_ANY \
63 CASE_TOR_TLS_ERROR_ANY_NONIO: \
66#define TOR_TLS_IS_ERROR(rv) ((rv) < TOR_TLS_CLOSE)
77#define TOR_TLS_CTX_IS_PUBLIC_SERVER (1u<<0)
86 unsigned int key_lifetime);
95#define tor_tls_free(tls) FREE_AND_NULL(tor_tls_t, tor_tls_free_, (tls))
106 size_t *n_read,
size_t *n_written);
109 size_t *rbuf_capacity,
size_t *rbuf_bytes,
110 size_t *wbuf_capacity,
size_t *wbuf_bytes);
114int tor_tls_get_num_server_handshakes(
tor_tls_t *tls);
116 const struct tor_x509_cert_t *cert));
119 const uint8_t *context,
126#define check_no_tls_errors() check_no_tls_errors_(__FILE__,__LINE__)
127void check_no_tls_errors_(
const char *fname,
int line);
129void tor_tls_log_one_error(
tor_tls_t *tls,
unsigned long err,
130 int severity,
int domain,
const char *doing);
132#define check_no_tls_errors() STMT_NIL
136 const struct tor_x509_cert_t **link_cert_out,
137 const struct tor_x509_cert_t **id_cert_out);
139const char *tor_tls_get_ciphersuite_name(
tor_tls_t *tls);
Headers for crypto_rsa.c.
Declarations for types used throughout the Tor networking system.
Macros to implement mocking and selective exposure for the test code.
#define MOCK_DECL(rv, funcname, arglist)
int tor_tls_get_my_certs(int server, const tor_x509_cert_t **link_cert_out, const tor_x509_cert_t **id_cert_out)
int tor_tls_peer_has_cert(tor_tls_t *tls)
int tor_tls_context_init(unsigned flags, crypto_pk_t *client_identity, crypto_pk_t *server_identity, unsigned int key_lifetime)
void tor_tls_get_n_raw_bytes(tor_tls_t *tls, size_t *n_read, size_t *n_written)
void tor_tls_context_incref(tor_tls_context_t *ctx)
int tor_tls_read(tor_tls_t *tls, char *cp, size_t len)
tor_tls_context_t * tor_tls_context_get(int is_server)
double tls_get_write_overhead_ratio(void)
int evaluate_ecgroup_for_tls(const char *ecgroup)
void tor_tls_context_decref(tor_tls_context_t *ctx)
int tor_tls_write(tor_tls_t *tls, const char *cp, size_t n)
void tor_tls_free_(tor_tls_t *tls)
int tor_tls_get_buffer_sizes(tor_tls_t *tls, size_t *rbuf_capacity, size_t *rbuf_bytes, size_t *wbuf_capacity, size_t *wbuf_bytes)
struct tor_x509_cert_t * tor_tls_get_peer_cert(tor_tls_t *tls)
int tor_tls_is_server(tor_tls_t *tls)
void tor_tls_set_logged_address(tor_tls_t *tls, const char *address)
int tor_tls_get_pending_bytes(tor_tls_t *tls)
int tor_tls_handshake(tor_tls_t *tls)
const char * tor_tls_err_to_string(int err)
tor_tls_t * tor_tls_new(tor_socket_t sock, int is_server)
const char * tor_tls_get_last_error_msg(const tor_tls_t *tls)
void tls_log_errors(tor_tls_t *tls, int severity, int domain, const char *doing)
struct tor_x509_cert_t * tor_tls_get_own_cert(tor_tls_t *tls)
void tor_tls_free_all(void)
void tor_tls_get_state_description(tor_tls_t *tls, char *buf, size_t sz)
void tor_tls_release_socket(tor_tls_t *tls)
int tor_tls_export_key_material(tor_tls_t *tls, uint8_t *secrets_out, const uint8_t *context, size_t context_len, const char *label)
size_t tor_tls_get_forced_write_size(tor_tls_t *tls)