Plasma GitLab Archive
Projects Blog Knowledge

(* $Id: netsys_crypto_types.mli 2208 2015-01-12 23:40:51Z gerd $ *)

(** Types for crypto providers *)


(** The exceptions the TLS provider may use (in addition to OCaml's built-in
    exception). In Ocamlnet, these exceptions are actually defined in 
    {!Netsys_types}.
 *)
module type TLS_EXCEPTIONS =
  sig
    exception EAGAIN_RD
    exception EAGAIN_WR
      (** A read or write cannot be done because the descriptor is in
      non-blocking mode and would block. This corresponds to the
      [Unix.EAGAIN] error but includes whether it was a read or write.

      When the read or write is possible, the interrupted function should
      simply be again called.

      These two exceptions are preferred by TLS providers.
      *)

    exception TLS_switch_request
      (** The server requested a rehandshake (this exception is thrown
          in the client)
       *)

    exception TLS_switch_response of bool
      (** The client accepted or denied a rehandshake (this exception is thrown
          in the server). [true] means acceptance.
       *)

    exception TLS_error of string
      (** A fatal error occurred (i.e. the session needs to be terminated).
          The string is a symbol identifying the error.
       *)

    exception TLS_warning of string
      (** A non-fatal error occurred. The interrupted function should be
          called again.
          The string is a symbol identifying the warning.
       *)
  end

module type TLS_PROVIDER =
  sig
    (** Provides TLS functionality.

        Users should not call functions of the provider directly, but use
        {!Netsys_tls}, or another higher-level layer.
     *)


    type config
    type credentials
    type endpoint

    module Exc : TLS_EXCEPTIONS
      (** Access to exceptions *)

    val error_message : string -> string
      (** Returns the message for humans (display, log files etc.) when
          called with an error or warning symbol.
       *)

    type dh_params =
        [ `PKCS3_PEM_file of string
        | `PKCS3_DER of string
        | `Generate of int
        ]
      (** Diffie-Hellman parameters:

           - [`PKCS3_PEM_file name]: points to a PEM-encoded PKCS3-file
             ("BEGIN DH PARAMETERS")
           - [`PKCS3_DER data]: the parameters are in a DER-encoded PKCS3
             structure
           - [`Generate bits]: the parameters are generated with the
             passed number of bits
       *)

    val create_config :
          ?algorithms : string ->
          ?dh_params : dh_params ->
          ?verify : (endpoint -> bool -> bool -> bool) ->
          peer_auth : [ `None | `Optional | `Required ] ->
          credentials : credentials ->
          unit ->
            config
      (** The configuration includes:

          - [algorithms]: a string specifying which cryptographic algorithms,
            protocols and protocol options
            are enabled, and in which priority they are used in the negotiation.
            (GnuTLS calls this "priority string".) The syntax is
            implementation-defined.
          - [dh_params]: parameters for Diffie-Hellman key exchange (used for
            DH-based authentication, but only on the server side)
          - [peer_auth]: controls whether the peer is requested to authenticate.
            This can be set to [`None] meaning not to request authentication
            and to ignore credentials, or to [`Optional] meaning not to request
            authentication but to check credentials if they are sent 
            nevertheless, or to [`Required] meaning to request and check
            credentials. For "standard clients" you should set this to
            [`Required], and for "standard servers" to [`None] or
            [`Required].
          - [credentials] describes our own credentials, and the accepted
            credentials of the peer.
          - [verify] is a function called to verify the peer certificate
            in addition to the actions of [peer_auth]. The function must
            return [true] in order to be successful. The arguments of the
            function are the TLS endpoint, and two bools indicating the
            success of previous checks. The first bool says whether the
            certificate is trusted (based on [peer_auth], [trust] and
            [system_trust]), and the second bool says whether the host name
            of the peer matches the name in the certificate. If not
            passed, [verify] defaults to [(fun _ cert_ok name_ok ->
            cert_ok && name_ok)], i.e. both bools must be true.

          A configuration is read-only once created, and can be used for
          several endpoints. In particular, it does not cache TLS sessions.
       *)


    type crt_list =
        [`PEM_file of string | `DER of string list]
      (** Certificates are given either as:

          - [`PEM_file name]: The certs are stored in this file, and are
            PEM-encoded.
          - [`DER l]: The certs are given directly in their DER-encoded form

          See also {!Credentials.tls}.
       *)

    type crl_list =
        [`PEM_file of string | `DER of string list]
      (** Certificate revocation lists are given either as:

          - [`PEM_file name]: The CRLs are stored in this file, and are
            PEM-encoded.
          - [`DER l]: The CRLs are given directly in their DER-encoded form

          See also {!Credentials.tls}.
       *)

    type private_key =
        [ `PEM_file of string 
        | `RSA of string 
        | `DSA of string
        | `EC of string
        | `PKCS8 of string
        | `PKCS8_encrypted of string
        ]
      (** Private keys are given either as:

          - [`PEM_file name]: The key is stored PEM-encoded in this file.
            The PEM header indicates the format.
          - [`RSA data]: The key is a PKCS1 RSA key
          - [`DSA data]: The key is a DSA key
          - [`EC data]: The key is for an elliptic curve
          - [`PKCS8 data]: The key is in a PKCS8 data structure
          - [`PKCS8_encrypted data]: The key is in a PKCS8 data structure,
            and is additionally encrypted.

          See also {!Credentials.tls}.
       *)

    val create_x509_credentials :
          ?system_trust:bool ->
          ?trust : crt_list list ->
          ?revoke : crl_list list ->
          ?keys : (crt_list * private_key * string option) list ->
          unit ->
            credentials
      (** Create X.509 credentials from individual objects:
           - [system_trust]: if set, the system certificates are trusted
           - [trust] specifies the CAs of peers to trust (default: empty)
           - [revoke] specifies CRLs for revocation of peer certificates
             (default: empty)
           - [keys] are our own certificates, as triples
             [(cert_path, private_key, password)] (default: empty)

          A client should set [trust] to the list of CAs it can accept on
          the server side. It is not required to specify a key.

          A server must specify a key (but can also specify several keys).
          If a server requests authentication from the client, it must also
          set [trust].

          The keys must include the full certificate path [cert_path], starting
          with the endpoint certificate, followed by all middle certificates, and
          ending with the certificate of the CA. The [private_key]
          is the key of the endpoint. If it is password-encrypted, the
          password must be given.
       *)

    val create_endpoint :
          role : [ `Server | `Client ] ->
          recv : (Netsys_types.memory -> int) ->
          send : (Netsys_types.memory -> int -> int) ->
          peer_name : string option ->
          config ->
            endpoint
      (** Creates a new endpoint for this configuration.

          [peer_name] is the expected common name or DNS name of the
          peer.  [peer_name] has an option type as it is not always
          required to pass it. However, keep in mind that clients
          normally authenticate servers ([peer_auth=`Required]). In
          order to do so, they need to check whether the name in the
          server certificate equals the DNS name of the service they
          are connected to. This check is done by comparing [peer_name]
          with the name in the certificate.

          [peer_name] is also used for the SNI extension.

          Servers normally need not to set [peer_name]. You can also omit it
          when there is no name-driven authentication at all.

          The endpoint will use the functions [recv] and [send] for I/O, which
          must be user-supplied. [recv buf] is expected to read data into the
          buffer, and to return the number of bytes, or 0 for EOF. 
          [send buf n] is expected to send the [n] first bytes in [buf].

          Both functions may raise [Unix_error]. The codes [Unix.EAGAIN] and
          [Unix.EINTR] are specially interpreted.
       *)

    val stash_endpoint : endpoint -> exn
      (** The endpoint in "stashed" form, encapsulated as an exception.
          This form is intended for keeping the session alive in RAM, but
          without keeping references to the [recv] and [send] functions.

          The endpoint passed in to [stash_endpoint] must no longer be used!
       *)

    val restore_endpoint : 
          recv : (Netsys_types.memory -> int) ->
          send : (Netsys_types.memory -> int -> int) ->
          exn ->
            endpoint
      (** Reconnect the stashed endpoint with [recv] and [send] functions *)

    val resume_client :
          recv : (Netsys_types.memory -> int) ->
          send : (Netsys_types.memory -> int -> int) ->
          peer_name : string option ->
          config ->
          string ->
            endpoint
      (** Creates a new endpoint that will resume an old session. This implies
          the client role.

          The session data is passed as string, which must have been retrieved
          with [get_session_data].
       *)

    type state =
        [ `Start | `Handshake | `Data_rw | `Data_r | `Data_w | `Data_rs
        | `Switching | `Accepting | `Refusing | `End
        ]
      (** The state of a session:

          - [`Start]: Before the session is started
          - [`Handshake]: The handshake is being done (and [hello] needs to
            be called again)
          - [`Data_rw]: The connection exists, and is read/write
          - [`Data_r]: The connection exists, and is read-only
          - [`Data_w]: The connection exists, and is write-only
          - [`Data_rs]: The connection exists, and data can be read.
            There was a switch request (initiated by us), and a response
            is awaited. No data can be sent in the moment.
          - [`Switching]: A rehandshake is being negotiated (and [switch]
            needs to be called again)
          - [`Accepting]: A rehandshake is being accepted (and [accept_switch]
            needs to be called again)
          - [`Refusing]: A rehandshake is being refused (and [refuse_switch]
            needs to be called again)
          - [`End]: After finishing the session
       *)

    val get_state : endpoint -> state
      (** Return the recorded state *)

    type raw_credentials =
      [ `X509 of string
      | `Anonymous
      ]
      (** The encoded credentials:
           - [`X509 s]: The X509 certificate in DER encoding
           - [`Anonymous]: no certificate or other key is available
       *)

    val at_transport_eof : endpoint -> bool
    (** Whether the underlying transport channel has seen the end of
        input. Use this after [recv] or [mem_recv] returned 0 to
        check whether only the TLS enf-of-input message has been read,
       or the underlying channel (usually the file descriptor) has
        indicated EOF.
     *)

    val hello : endpoint -> unit
      (** Performs the initial handshake (exchanges credentials and establishes
          a session).

          [hello] doesn't verify the peer. Use [verify] for that.

          May raise [EAGAIN_RD], [EAGAIN_WR],
          [Unix_error(EINTR,_,_)], [Error] or [Warning].
       *)

    val bye : endpoint -> Unix.shutdown_command -> unit
      (** Performs the final handshake (exchanges close requests).

          If [SHUTDOWN_SEND] is set, the close request is sent to the peer, and
          the TLS tunnel is considered as closed for writing. The application
          can receive further data until [recv] returns zero bytes meaning
          that the peer responded with another close request.

          If [SHUTDOWN_ALL] is passed, it is additionally waited until the peer
          responds with a close request.

          A simple [SHUTDOWN_RECEIVE] is unimplemented and ignored.

          In no case the underlying transport is closed or shut down!

          May raise [EAGAIN_RD], [EAGAIN_WR],
          [Unix_error(EINTR,_,_)], [Error] or [Warning].
       *)

    val verify : endpoint -> unit
      (** [verify ep peer_name]: Checks that:
           - there is a trust chain for the peer's certificate
           - that [peer_name] is the common name of the certificate subject,
             or an alternate name

          {b These checks are not performed if [peer_auth=`None] is set in the
          configuration!}

          Additionally, the [verify] function in the endpoint configuration
          is called back, and a failure is indicated if this function returns
          [false]. This callback is useful to get the certificate of the peer
          and to perform further checks.

          The [verify] function will raise [Failure] on failed checks
          (and [Error]
          for internal processing errors).
       *)

    val get_config : endpoint -> config
      (** Get the current config (possibly modified because of a rehandshake)
       *)

    val get_endpoint_creds : endpoint -> raw_credentials
      (** Get the credentials that was actually used in the handshake, in raw
          format.
       *)

    val get_peer_creds : endpoint -> raw_credentials
      (** Get the credentials of the peer, in raw format. Raises [Not_found]
          if not applicable/no credentials present.
       *)

    val get_peer_creds_list : endpoint -> raw_credentials list
      (** Get the chain that was actually used in the handshake.
       *)

    val switch : endpoint -> config -> unit
      (** The server can use this to request a rehandshake and to use the
          new configuration for cert verification. This function sends the
          request, and expects a soon response from the client. The
          state enters [`Data_rs] meaning that we can still read data,
          and at some point [recv] will raise [TLS_switch_response].

          On the client side, the request will by returned as exception
          [TLS_switch_request] by [recv]. The client should respond with
          [accept_switch] if it accepts the handshake, or [refuse_switch] if
          not.

          May raise [EAGAIN_RD], [EAGAIN_WR],
          [Unix_error(EINTR,_,_)], [Error] or [Warning].
       *)

    val accept_switch : endpoint -> config -> unit
      (** On the client: Enter another handshake round with new configuration
          data.

          May raise [EAGAIN_RD], [EAGAIN_WR],
          [Unix_error(EINTR,_,_)], [Error] or [Warning].
       *)

    val refuse_switch : endpoint -> unit
      (** On the client: Refuse a handshake

          May raise [EAGAIN_RD], [EAGAIN_WR],
          [Unix_error(EINTR,_,_)], [Error] or [Warning].
       *)

    val send : endpoint -> Netsys_types.memory -> int -> int
      (** [send ep buffer n]: Sends the first [n] bytes in the buffer over
          the endpoint, and returns the actual number of processed bytes.

          May raise [EAGAIN_RD], [EAGAIN_WR],
          [Unix_error(EINTR,_,_)], [Error] or [Warning].
       *)

    val recv : endpoint -> Netsys_types.memory -> int
      (** [recv ep buffer n]: Receives data, and puts them into the memory
          buffer, and returns the actual number of received bytes. If 0
          is returned, a close request was received by the peer. For closing
          the tunnel properly this request should be responded by another
          close request with [bye] (unless this has already been done).

          May raise [EAGAIN_RD], [EAGAIN_WR],
          [Unix_error(EINTR,_,_)], [Error] or [Warning].

          The exception [TLS_switch_request] can only occur on the client
          side, and should be responded by [accept_switch] or [refuse_switch].

          The exception [TLS_switch_response] can only occur on the server
          side.
       *)

    val recv_will_not_block : endpoint -> bool
      (** If there is still unprocessed data in the endpoint buffer, 
          [recv] is guaranteed not to block or raise [EAGAIN].
       *)

    val get_session_id : endpoint -> string
      (** The (non-printable) session ID *)

    val get_session_data : endpoint -> string
      (** Get the (non-printable) marshalled session data, for later resumption
          with [resume_client]
       *)

    val get_cipher_suite_type : endpoint -> string
      (** The type of the cipher suite:
         - "X509": X509 certificates are used
         - "OPENPGP": OpenPGP certificates are used
         - "ANON": anonymous credentials
         - "SRP": SRP credentials
         - "PSK": PSK credentials
       *)

    (* TODO: get_cipher_suite_id : endpoint -> int * int
       = get the two bytes identifying the cipher suite
     *)

    val get_cipher_algo : endpoint -> string
      (** Get the name of the cipher *)

    val get_kx_algo : endpoint -> string
      (** Get the name of the key exchange method *)

    val get_mac_algo : endpoint -> string
      (** Get the name of the message authentication code *)

    val get_compression_algo : endpoint -> string
      (** Get the name of the record-level compression method *)

    val get_cert_type : endpoint -> string
      (** Get the type of the certificate *)

    val get_protocol : endpoint -> string
      (** Get the name of the tunnel protocol *)

    type server_name = [ `Domain of string ]

    val get_addressed_servers : endpoint -> server_name list
      (** To be used in servers: The client can address one of several virtual
          servers with the SNI extension, and this function returns which
          was requested. Raises
          [Not_found] if there is nothing appropriate. This information is
          only available after a handshake, and if the client submitted it.
       *)

    val set_session_cache : store:(string -> string -> unit) ->
                            remove:(string -> unit) ->
                            retrieve:(string -> string) ->
                            endpoint ->
                            unit
      (** Sets the three callbacks for storing, removing and retrieving
          sessions (on the server side)
       *)

    (* TODO: DTLS *)
    (* TODO: get channel binding token *)

    val implementation_name : string
      (** String name of the implementation. By convention this is the
          full OCaml module path, e.g. "Nettls_gnutls.TLS"
       *)

    val implementation : unit -> exn
      (** Implementation-defined additional functionality *)
  end


module type TLS_CONFIG =
  sig
    module TLS : TLS_PROVIDER
    val config : TLS.config
  end


module type TLS_ENDPOINT =
  sig
    module TLS : TLS_PROVIDER
    val endpoint : TLS.endpoint
  end


module type FILE_TLS_ENDPOINT =
  sig
    module TLS : TLS_PROVIDER
    val endpoint : TLS.endpoint
    val rd_file : Unix.file_descr
    val wr_file : Unix.file_descr
  end


module type SYMMETRIC_CRYPTO = sig
  (** Symmetric cryptographic ciphers.

       Users should not call functions of the provider directly, but use
      {!Netsys_ciphers}, or another higher-level layer.
   *)

  type scipher
    (** Describes a cipher *)

  val ciphers : scipher list
    (** List of supported ciphers. OCamlnet implements a number of modes
        anyway, and it is normally only required to implement "ECB" here.
        If there is special hardware acceleration, though, it is an option
        to provide accelerated modes too (e.g. some CPUs support AES-GCM
        specially).
     *)

  val find : (string * string) -> scipher
    (** [find (name,mode)]: Looks up a cipher by name and mode, or
        raises Not_found
     *)

  val name : scipher -> string
    (** Returns the name. This should follow the convention 
        [<uppercasestring>-<size>], e.g. 
        "AES-128" or "TWOFISH-128". The size is normally the key size.
     *)

  val mode : scipher -> string
    (** Returns the mode.  Modes are "ECB", "CBC", "OFB",
        "CTR", "STREAM", "GCM".

        Note that the mode needs not to deal with padding (this is done
        on a higher level).
     *)

  val key_lengths : scipher -> (int * int) list
    (** Supported key lengths as pairs [min,max]. If there is a recommended
        key length, this should be the first.
     *)

  val iv_lengths : scipher -> (int * int) list
    (** Supported iv lengths as pairs [min,max]. If there is a recommended
        iv length, this should be the first.
     *)

  val block_constraint : scipher -> int
    (** The buffers used with encrypt/decrypt must have a length that is a
        multiple of this number. (In ECB mode, this is the block size.)
     *)

  val supports_aead : scipher -> bool
    (** Whether this cipher integrates authentication *)

  type scipher_ctx
    (** A cipher context stores processing data while encrypting or
        decrypting data
     *)

  val create : scipher -> string -> scipher_ctx
    (** [create c key]: create a new cipher context for [key]. If not set,
        the initialization vector is zero, and the header the empty string.
     *)

  val set_iv : scipher_ctx -> string -> unit
    (** [set_iv cctx iv]: Sets the initialization vector. This is only allowed
        before encrypting or decrypting data
     *)

  val set_header : scipher_ctx -> string -> unit
    (** [set_header cctx data]: Sets the additional header that is authenticated
        for AEAD schemes. The header must have been set before starting the
        encryption or decryption (otherwise it is assumed to be the empty
        string).

        For non-AEAD schemes, the header is ignored for encryption, and must
        be empty for decryption.
     *)

  val encrypt : scipher_ctx -> 
                Netsys_types.memory ->
                Netsys_types.memory ->
                  unit
    (** [encrypt cctx inbuf outbuf]: Encrypts the data in [inbuf] and writes
        the result into [outbuf]. Both buffers must have the same size.
        It is not allowed to pass the same buffer as [inbuf] and [outbuf].

        In order to encrypt long texts, it is allowed to call [encrypt] several
        times in sequence.
     *)

  val decrypt : scipher_ctx -> 
                Netsys_types.memory ->
                Netsys_types.memory ->
                  bool
    (** [decrypt cctx inbuf outbuf]: Decrypts the data in [inbuf] and writes
        the result into [outbuf]. Both buffers must have the same size.
        It is not allowed to pass the same buffer as [inbuf] and [outbuf].

        The function returns [true] on success, and [false] if a problem
        is detected.

        In order to decrypt long texts, it is allowed to call [decrypt] several
        times in sequence.
     *)

  val mac : scipher_ctx -> string
    (** Returns the MAC for AEAD ciphers. This is updated after
        [encrypt]/[decrypt]. This function fails for non-AEAD ciphers.
     *)
end


module type DIGESTS = sig
  (** Cryptographic digests.

      Users should not call functions of the provider directly, but use
      {!Netsys_digests}, or another higher-level layer.
   *)

    type digest
      (** Describes a digest *)

    val digests : digest list
      (** returns digests *)

    val find : string -> digest
      (** Returns the digest of this name, or raises [Not_found] *)

    val name : digest -> string
      (** returns the name of the digest. The name follows the format
          [<uppercasename>-<size>], e.g. "MD5-128", "SHA1-160", "SHA2-256".
       *)

    val size : digest -> int
      (** returns the size of the hash output (in bytes) *)

    val block_length : digest -> int
      (** the block length (in bytes) *)

    type digest_ctx
      (** A digest context stores state while digesting data *)

    val create : digest -> digest_ctx
      (** Creates a fresh context *)

    val add : digest_ctx -> Netsys_types.memory -> unit
      (** Adds data *)

    val finish : digest_ctx -> string
      (** Returns the digest *)
end

type tls_provider = (module TLS_PROVIDER)
type tls_config = (module TLS_CONFIG)
type tls_endpoint = (module TLS_ENDPOINT)
type file_tls_endpoint = (module FILE_TLS_ENDPOINT)
type symmetric_crypto = (module SYMMETRIC_CRYPTO)
type digests = (module DIGESTS)

This web site is published by Informatikbüro Gerd Stolpmann
Powered by Caml