Fix "JAP-client" hideous ASN1 bug, twice. (Fix1: check more thoroughly for TLS errors...
[tor.git] / src / common / tortls.h
blob4d8aba264babc75753d3e6375a18d529efd77846
1 /* Copyright 2003 Roger Dingledine
2 * Copyright 2004-2005 Roger Dingledine, Nick Mathewson */
3 /* See LICENSE for licensing information */
4 /* $Id$ */
6 #ifndef _TORTLS_H
7 #define _TORTLS_H
8 #define TORTLS_H_ID "$Id$"
10 /**
11 * \file tortls.h
12 * \brief Headers for tortls.c
13 **/
15 #include "../common/crypto.h"
16 #include "../common/compat.h"
18 /* Opaque structure to hold a TLS connection. */
19 typedef struct tor_tls_st tor_tls;
21 /* Possible return values for most tor_tls_* functions. */
22 #define TOR_TLS_ERROR -4
23 #define TOR_TLS_CLOSE -3
24 #define TOR_TLS_WANTREAD -2
25 #define TOR_TLS_WANTWRITE -1
26 #define TOR_TLS_DONE 0
28 void tor_tls_free_all(void);
29 int tor_tls_context_new(crypto_pk_env_t *rsa, int isServer,
30 const char *nickname, unsigned int key_lifetime);
31 tor_tls *tor_tls_new(int sock, int is_server, int use_no_cert);
32 int tor_tls_is_server(tor_tls *tls);
33 void tor_tls_free(tor_tls *tls);
34 int tor_tls_peer_has_cert(tor_tls *tls);
35 int tor_tls_get_peer_cert_nickname(tor_tls *tls, char *buf, size_t buflen);
36 int tor_tls_verify(tor_tls *tls, crypto_pk_env_t **identity);
37 int tor_tls_check_lifetime(tor_tls *tls, int tolerance);
38 int tor_tls_read(tor_tls *tls, char *cp, size_t len);
39 int tor_tls_write(tor_tls *tls, char *cp, size_t n);
40 int tor_tls_handshake(tor_tls *tls);
41 int tor_tls_shutdown(tor_tls *tls);
42 int tor_tls_get_pending_bytes(tor_tls *tls);
44 unsigned long tor_tls_get_n_bytes_read(tor_tls *tls);
45 unsigned long tor_tls_get_n_bytes_written(tor_tls *tls);
47 /* Log and abort if there are unhandled TLS errors in OpenSSL's error stack.
49 #define check_no_tls_errors() _check_no_tls_errors(_SHORT_FILE_,__LINE__)
51 void _check_no_tls_errors(const char *fname, int line);
53 #endif