Вы не можете выбрать более 25 тем Темы должны начинаться с буквы или цифры, могут содержать дефисы(-) и должны содержать не более 35 символов.

Tighten up EMS resumption behaviour. The client and server both have to decide on behaviour when resuming a session where the EMS state of the session doesn't match the EMS state as exchanged in the handshake. Original handshake | No Yes ------+-------------------------------------------------------------- | R | Server: ok [1] Server: abort [3] e No | Client: ok [2] Client: abort [4] s | u | m | e | Yes | Server: don't resume No problem | Client: abort; server | shouldn't have resumed [1] Servers want to accept legacy clients. The draft[5] says that resumptions SHOULD be rejected so that Triple-Handshake can't be done, but we'll rather enforce that EMS was used when using tls-unique etc. [2] The draft[5] says that even the initial handshake should be aborted if the server doesn't support EMS, but we need to be able to talk to the world. [3] This is a very weird case where a client has regressed without flushing the session cache. Hopefully we can be strict and reject these. [4] This can happen when a server-farm shares a session cache but frontends are not all updated at once. If Chrome is strict here then hopefully we can prevent any servers from existing that will try to resume an EMS session that they don't understand. OpenSSL appears to be ok here: https://www.ietf.org/mail-archive/web/tls/current/msg16570.html [5] https://tools.ietf.org/html/draft-ietf-tls-session-hash-05#section-5.2 BUG=492200 Change-Id: Ie1225a3960d49117b05eefa5a36263d8e556e467 Reviewed-on: https://boringssl-review.googlesource.com/4981 Reviewed-by: Adam Langley <agl@google.com>
9 лет назад
12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990
  1. /* ssl/ssl.h */
  2. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  3. * All rights reserved.
  4. *
  5. * This package is an SSL implementation written
  6. * by Eric Young (eay@cryptsoft.com).
  7. * The implementation was written so as to conform with Netscapes SSL.
  8. *
  9. * This library is free for commercial and non-commercial use as long as
  10. * the following conditions are aheared to. The following conditions
  11. * apply to all code found in this distribution, be it the RC4, RSA,
  12. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  13. * included with this distribution is covered by the same copyright terms
  14. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  15. *
  16. * Copyright remains Eric Young's, and as such any Copyright notices in
  17. * the code are not to be removed.
  18. * If this package is used in a product, Eric Young should be given attribution
  19. * as the author of the parts of the library used.
  20. * This can be in the form of a textual message at program startup or
  21. * in documentation (online or textual) provided with the package.
  22. *
  23. * Redistribution and use in source and binary forms, with or without
  24. * modification, are permitted provided that the following conditions
  25. * are met:
  26. * 1. Redistributions of source code must retain the copyright
  27. * notice, this list of conditions and the following disclaimer.
  28. * 2. Redistributions in binary form must reproduce the above copyright
  29. * notice, this list of conditions and the following disclaimer in the
  30. * documentation and/or other materials provided with the distribution.
  31. * 3. All advertising materials mentioning features or use of this software
  32. * must display the following acknowledgement:
  33. * "This product includes cryptographic software written by
  34. * Eric Young (eay@cryptsoft.com)"
  35. * The word 'cryptographic' can be left out if the rouines from the library
  36. * being used are not cryptographic related :-).
  37. * 4. If you include any Windows specific code (or a derivative thereof) from
  38. * the apps directory (application code) you must include an acknowledgement:
  39. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  40. *
  41. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  42. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  43. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  44. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  45. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  46. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  47. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  48. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  49. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  50. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  51. * SUCH DAMAGE.
  52. *
  53. * The licence and distribution terms for any publically available version or
  54. * derivative of this code cannot be changed. i.e. this code cannot simply be
  55. * copied and put under another distribution licence
  56. * [including the GNU Public Licence.]
  57. */
  58. /* ====================================================================
  59. * Copyright (c) 1998-2007 The OpenSSL Project. All rights reserved.
  60. *
  61. * Redistribution and use in source and binary forms, with or without
  62. * modification, are permitted provided that the following conditions
  63. * are met:
  64. *
  65. * 1. Redistributions of source code must retain the above copyright
  66. * notice, this list of conditions and the following disclaimer.
  67. *
  68. * 2. Redistributions in binary form must reproduce the above copyright
  69. * notice, this list of conditions and the following disclaimer in
  70. * the documentation and/or other materials provided with the
  71. * distribution.
  72. *
  73. * 3. All advertising materials mentioning features or use of this
  74. * software must display the following acknowledgment:
  75. * "This product includes software developed by the OpenSSL Project
  76. * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
  77. *
  78. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  79. * endorse or promote products derived from this software without
  80. * prior written permission. For written permission, please contact
  81. * openssl-core@openssl.org.
  82. *
  83. * 5. Products derived from this software may not be called "OpenSSL"
  84. * nor may "OpenSSL" appear in their names without prior written
  85. * permission of the OpenSSL Project.
  86. *
  87. * 6. Redistributions of any form whatsoever must retain the following
  88. * acknowledgment:
  89. * "This product includes software developed by the OpenSSL Project
  90. * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
  91. *
  92. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  93. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  94. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  95. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  96. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  97. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  98. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  99. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  100. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  101. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  102. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  103. * OF THE POSSIBILITY OF SUCH DAMAGE.
  104. * ====================================================================
  105. *
  106. * This product includes cryptographic software written by Eric Young
  107. * (eay@cryptsoft.com). This product includes software written by Tim
  108. * Hudson (tjh@cryptsoft.com).
  109. *
  110. */
  111. /* ====================================================================
  112. * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
  113. * ECC cipher suite support in OpenSSL originally developed by
  114. * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
  115. */
  116. /* ====================================================================
  117. * Copyright 2005 Nokia. All rights reserved.
  118. *
  119. * The portions of the attached software ("Contribution") is developed by
  120. * Nokia Corporation and is licensed pursuant to the OpenSSL open source
  121. * license.
  122. *
  123. * The Contribution, originally written by Mika Kousa and Pasi Eronen of
  124. * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
  125. * support (see RFC 4279) to OpenSSL.
  126. *
  127. * No patent licenses or other rights except those expressly stated in
  128. * the OpenSSL open source license shall be deemed granted or received
  129. * expressly, by implication, estoppel, or otherwise.
  130. *
  131. * No assurances are provided by Nokia that the Contribution does not
  132. * infringe the patent or other intellectual property rights of any third
  133. * party or that the license provides you with all the necessary rights
  134. * to make use of the Contribution.
  135. *
  136. * THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN
  137. * ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA
  138. * SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY
  139. * OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR
  140. * OTHERWISE.
  141. */
  142. #ifndef OPENSSL_HEADER_SSL_H
  143. #define OPENSSL_HEADER_SSL_H
  144. #include <openssl/base.h>
  145. #include <openssl/bio.h>
  146. #include <openssl/buf.h>
  147. #include <openssl/hmac.h>
  148. #include <openssl/lhash.h>
  149. #include <openssl/pem.h>
  150. #include <openssl/thread.h>
  151. #include <openssl/x509.h>
  152. #if !defined(OPENSSL_WINDOWS)
  153. #include <sys/time.h>
  154. #endif
  155. /* wpa_supplicant expects to get the version functions from ssl.h */
  156. #include <openssl/crypto.h>
  157. /* Forward-declare struct timeval. On Windows, it is defined in winsock2.h and
  158. * Windows headers define too many macros to be included in public headers.
  159. * However, only a forward declaration is needed. */
  160. struct timeval;
  161. #if defined(__cplusplus)
  162. extern "C" {
  163. #endif
  164. /* SSL implementation. */
  165. /* Initialization. */
  166. /* SSL_library_init initializes the crypto and SSL libraries and returns one. */
  167. OPENSSL_EXPORT int SSL_library_init(void);
  168. /* Cipher suites. */
  169. /* An SSL_CIPHER represents a cipher suite. */
  170. typedef struct ssl_cipher_st {
  171. /* name is the OpenSSL name for the cipher. */
  172. const char *name;
  173. /* id is the cipher suite value bitwise OR-d with 0x03000000. */
  174. uint32_t id;
  175. /* The following are internal fields. See ssl/internal.h for their values. */
  176. uint32_t algorithm_mkey;
  177. uint32_t algorithm_auth;
  178. uint32_t algorithm_enc;
  179. uint32_t algorithm_mac;
  180. uint32_t algorithm_ssl;
  181. uint32_t algo_strength;
  182. /* algorithm2 contains extra flags. See ssl/internal.h. */
  183. uint32_t algorithm2;
  184. /* strength_bits is the strength of the cipher in bits. */
  185. int strength_bits;
  186. /* alg_bits is the number of bits of key material used by the algorithm. */
  187. int alg_bits;
  188. } SSL_CIPHER;
  189. DECLARE_STACK_OF(SSL_CIPHER)
  190. /* SSL_get_cipher_by_value returns the structure representing a TLS cipher
  191. * suite based on its assigned number, or NULL if unknown. See
  192. * https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-4. */
  193. OPENSSL_EXPORT const SSL_CIPHER *SSL_get_cipher_by_value(uint16_t value);
  194. /* SSL_CIPHER_get_id returns |cipher|'s id. It may be cast to a |uint16_t| to
  195. * get the cipher suite value. */
  196. OPENSSL_EXPORT uint32_t SSL_CIPHER_get_id(const SSL_CIPHER *cipher);
  197. /* SSL_CIPHER_is_AES returns one if |cipher| uses AES (either GCM or CBC
  198. * mode). */
  199. OPENSSL_EXPORT int SSL_CIPHER_is_AES(const SSL_CIPHER *cipher);
  200. /* SSL_CIPHER_has_MD5_HMAC returns one if |cipher| uses HMAC-MD5. */
  201. OPENSSL_EXPORT int SSL_CIPHER_has_MD5_HMAC(const SSL_CIPHER *cipher);
  202. /* SSL_CIPHER_is_AESGCM returns one if |cipher| uses AES-GCM. */
  203. OPENSSL_EXPORT int SSL_CIPHER_is_AESGCM(const SSL_CIPHER *cipher);
  204. /* SSL_CIPHER_is_CHACHA20POLY1305 returns one if |cipher| uses
  205. * CHACHA20_POLY1305. */
  206. OPENSSL_EXPORT int SSL_CIPHER_is_CHACHA20POLY1305(const SSL_CIPHER *cipher);
  207. /* SSL_CIPHER_get_name returns the OpenSSL name of |cipher|. */
  208. OPENSSL_EXPORT const char *SSL_CIPHER_get_name(const SSL_CIPHER *cipher);
  209. /* SSL_CIPHER_get_kx_name returns a string that describes the key-exchange
  210. * method used by |cipher|. For example, "ECDHE_ECDSA". */
  211. OPENSSL_EXPORT const char *SSL_CIPHER_get_kx_name(const SSL_CIPHER *cipher);
  212. /* SSL_CIPHER_get_rfc_name returns a newly-allocated string with the standard
  213. * name for |cipher| or NULL on error. For example,
  214. * "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256". The caller is responsible for
  215. * calling |OPENSSL_free| on the result. */
  216. OPENSSL_EXPORT char *SSL_CIPHER_get_rfc_name(const SSL_CIPHER *cipher);
  217. /* SSL_CIPHER_get_bits returns the strength, in bits, of |cipher|. If
  218. * |out_alg_bits| is not NULL, it writes the number of bits consumed by the
  219. * symmetric algorithm to |*out_alg_bits|. */
  220. OPENSSL_EXPORT int SSL_CIPHER_get_bits(const SSL_CIPHER *cipher,
  221. int *out_alg_bits);
  222. /* SSL contexts. */
  223. /* An SSL_METHOD selects whether to use TLS or DTLS. */
  224. typedef struct ssl_method_st SSL_METHOD;
  225. /* TLS_method is the |SSL_METHOD| used for TLS (and SSLv3) connections. */
  226. OPENSSL_EXPORT const SSL_METHOD *TLS_method(void);
  227. /* DTLS_method is the |SSL_METHOD| used for DTLS connections. */
  228. OPENSSL_EXPORT const SSL_METHOD *DTLS_method(void);
  229. /* SSL_CTX_new returns a newly-allocated |SSL_CTX| with default settings or NULL
  230. * on error. An |SSL_CTX| manages shared state and configuration between
  231. * multiple TLS or DTLS connections. */
  232. OPENSSL_EXPORT SSL_CTX *SSL_CTX_new(const SSL_METHOD *method);
  233. /* SSL_CTX_free releases memory associated with |ctx|. */
  234. OPENSSL_EXPORT void SSL_CTX_free(SSL_CTX *ctx);
  235. /* SSL connections. */
  236. /* SSL_new returns a newly-allocated |SSL| using |ctx| or NULL on error. An
  237. * |SSL| object represents a single TLS or DTLS connection. It inherits settings
  238. * from |ctx| at the time of creation. Settings may also be individually
  239. * configured on the connection.
  240. *
  241. * On creation, an |SSL| is not configured to be either a client or server. Call
  242. * |SSL_set_connect_state| or |SSL_set_accept_state| to set this. */
  243. OPENSSL_EXPORT SSL *SSL_new(SSL_CTX *ctx);
  244. /* SSL_free releases memory associated with |ssl|. */
  245. OPENSSL_EXPORT void SSL_free(SSL *ssl);
  246. /* SSL_set_connect_state configures |ssl| to be a client. */
  247. OPENSSL_EXPORT void SSL_set_connect_state(SSL *ssl);
  248. /* SSL_set_accept_state configures |ssl| to be a server. */
  249. OPENSSL_EXPORT void SSL_set_accept_state(SSL *ssl);
  250. /* Protocol versions. */
  251. #define SSL3_VERSION_MAJOR 0x03
  252. #define SSL3_VERSION 0x0300
  253. #define TLS1_VERSION 0x0301
  254. #define TLS1_1_VERSION 0x0302
  255. #define TLS1_2_VERSION 0x0303
  256. #define DTLS1_VERSION 0xfeff
  257. #define DTLS1_2_VERSION 0xfefd
  258. /* SSL_CTX_set_min_version sets the minimum protocol version for |ctx| to
  259. * |version|. */
  260. OPENSSL_EXPORT void SSL_CTX_set_min_version(SSL_CTX *ctx, uint16_t version);
  261. /* SSL_CTX_set_max_version sets the maximum protocol version for |ctx| to
  262. * |version|. */
  263. OPENSSL_EXPORT void SSL_CTX_set_max_version(SSL_CTX *ctx, uint16_t version);
  264. /* SSL_set_min_version sets the minimum protocol version for |ssl| to
  265. * |version|. */
  266. OPENSSL_EXPORT void SSL_set_min_version(SSL *ssl, uint16_t version);
  267. /* SSL_set_max_version sets the maximum protocol version for |ssl| to
  268. * |version|. */
  269. OPENSSL_EXPORT void SSL_set_max_version(SSL *ssl, uint16_t version);
  270. /* Options.
  271. *
  272. * Options configure protocol behavior. */
  273. /* SSL_OP_LEGACY_SERVER_CONNECT allows initial connections to servers that don't
  274. * support the renegotiation_info extension (RFC 5746). It is on by default. */
  275. #define SSL_OP_LEGACY_SERVER_CONNECT 0x00000004L
  276. /* SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER allows for record sizes |SSL3_RT_MAX_EXTRA|
  277. * bytes above the maximum record size. */
  278. #define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L
  279. /* SSL_OP_TLS_D5_BUG accepts an RSAClientKeyExchange in TLS encoded as in SSL3
  280. * (i.e. without a length prefix). */
  281. #define SSL_OP_TLS_D5_BUG 0x00000100L
  282. /* SSL_OP_ALL enables the above bug workarounds that are enabled by many
  283. * consumers.
  284. * TODO(davidben): Determine which of the remaining may be removed now. */
  285. #define SSL_OP_ALL 0x00000BFFL
  286. /* SSL_OP_NO_QUERY_MTU, in DTLS, disables querying the MTU from the underlying
  287. * |BIO|. Instead, the MTU is configured with |SSL_set_mtu|. */
  288. #define SSL_OP_NO_QUERY_MTU 0x00001000L
  289. /* SSL_OP_NO_TICKET disables session ticket support (RFC 4507). */
  290. #define SSL_OP_NO_TICKET 0x00004000L
  291. /* SSL_OP_CIPHER_SERVER_PREFERENCE configures servers to select ciphers and
  292. * ECDHE curves according to the server's preferences instead of the
  293. * client's. */
  294. #define SSL_OP_CIPHER_SERVER_PREFERENCE 0x00400000L
  295. /* The following flags toggle individual protocol versions. This is deprecated.
  296. * Use |SSL_CTX_set_min_version| and |SSL_CTX_set_max_version| instead. */
  297. #define SSL_OP_NO_SSLv3 0x02000000L
  298. #define SSL_OP_NO_TLSv1 0x04000000L
  299. #define SSL_OP_NO_TLSv1_2 0x08000000L
  300. #define SSL_OP_NO_TLSv1_1 0x10000000L
  301. #define SSL_OP_NO_DTLSv1 SSL_OP_NO_TLSv1
  302. #define SSL_OP_NO_DTLSv1_2 SSL_OP_NO_TLSv1_2
  303. /* The following flags do nothing and are included only to make it easier to
  304. * compile code with BoringSSL. */
  305. #define SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS 0
  306. #define SSL_OP_MICROSOFT_SESS_ID_BUG 0
  307. #define SSL_OP_NETSCAPE_CHALLENGE_BUG 0
  308. #define SSL_OP_NO_COMPRESSION 0
  309. #define SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION 0
  310. #define SSL_OP_NO_SSLv2 0
  311. #define SSL_OP_SINGLE_DH_USE 0
  312. #define SSL_OP_SINGLE_ECDH_USE 0
  313. #define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0
  314. #define SSL_OP_TLS_BLOCK_PADDING_BUG 0
  315. #define SSL_OP_TLS_ROLLBACK_BUG 0
  316. #define SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION 0
  317. /* SSL_CTX_set_options enables all options set in |options| (which should be one
  318. * or more of the |SSL_OP_*| values, ORed together) in |ctx|. It returns a
  319. * bitmask representing the resulting enabled options. */
  320. OPENSSL_EXPORT uint32_t SSL_CTX_set_options(SSL_CTX *ctx, uint32_t options);
  321. /* SSL_CTX_clear_options disables all options set in |options| (which should be
  322. * one or more of the |SSL_OP_*| values, ORed together) in |ctx|. It returns a
  323. * bitmask representing the resulting enabled options. */
  324. OPENSSL_EXPORT uint32_t SSL_CTX_clear_options(SSL_CTX *ctx, uint32_t options);
  325. /* SSL_CTX_get_options returns a bitmask of |SSL_OP_*| values that represent all
  326. * the options enabled for |ctx|. */
  327. OPENSSL_EXPORT uint32_t SSL_CTX_get_options(const SSL_CTX *ctx);
  328. /* SSL_set_options enables all options set in |options| (which should be one or
  329. * more of the |SSL_OP_*| values, ORed together) in |ssl|. It returns a bitmask
  330. * representing the resulting enabled options. */
  331. OPENSSL_EXPORT uint32_t SSL_set_options(SSL *ssl, uint32_t options);
  332. /* SSL_clear_options disables all options set in |options| (which should be one
  333. * or more of the |SSL_OP_*| values, ORed together) in |ssl|. It returns a
  334. * bitmask representing the resulting enabled options. */
  335. OPENSSL_EXPORT uint32_t SSL_clear_options(SSL *ssl, uint32_t options);
  336. /* SSL_get_options returns a bitmask of |SSL_OP_*| values that represent all the
  337. * options enabled for |ssl|. */
  338. OPENSSL_EXPORT uint32_t SSL_get_options(const SSL *ssl);
  339. /* Modes.
  340. *
  341. * Modes configure API behavior. */
  342. /* SSL_MODE_ENABLE_PARTIAL_WRITE allows |SSL_write| to complete with a partial
  343. * result when the only part of the input was written in a single record. */
  344. #define SSL_MODE_ENABLE_PARTIAL_WRITE 0x00000001L
  345. /* SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER allows retrying an incomplete |SSL_write|
  346. * with a different buffer. However, |SSL_write| still assumes the buffer
  347. * contents are unchanged. This is not the default to avoid the misconception
  348. * that non-blocking |SSL_write| behaves like non-blocking |write|. */
  349. #define SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER 0x00000002L
  350. /* SSL_MODE_NO_AUTO_CHAIN disables automatically building a certificate chain
  351. * before sending certificates to the peer.
  352. * TODO(davidben): Remove this behavior. https://crbug.com/486295. */
  353. #define SSL_MODE_NO_AUTO_CHAIN 0x00000008L
  354. /* SSL_MODE_ENABLE_FALSE_START allows clients to send application data before
  355. * receipt of CCS and Finished. This mode enables full-handshakes to 'complete'
  356. * in one RTT. See draft-bmoeller-tls-falsestart-01. */
  357. #define SSL_MODE_ENABLE_FALSE_START 0x00000080L
  358. /* Deprecated: SSL_MODE_HANDSHAKE_CUTTHROUGH is the same as
  359. * SSL_MODE_ENABLE_FALSE_START. */
  360. #define SSL_MODE_HANDSHAKE_CUTTHROUGH SSL_MODE_ENABLE_FALSE_START
  361. /* SSL_MODE_CBC_RECORD_SPLITTING causes multi-byte CBC records in SSL 3.0 and
  362. * TLS 1.0 to be split in two: the first record will contain a single byte and
  363. * the second will contain the remainder. This effectively randomises the IV and
  364. * prevents BEAST attacks. */
  365. #define SSL_MODE_CBC_RECORD_SPLITTING 0x00000100L
  366. /* SSL_MODE_NO_SESSION_CREATION will cause any attempts to create a session to
  367. * fail with SSL_R_SESSION_MAY_NOT_BE_CREATED. This can be used to enforce that
  368. * session resumption is used for a given SSL*. */
  369. #define SSL_MODE_NO_SESSION_CREATION 0x00000200L
  370. /* SSL_MODE_SEND_FALLBACK_SCSV sends TLS_FALLBACK_SCSV in the ClientHello.
  371. * To be set only by applications that reconnect with a downgraded protocol
  372. * version; see https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-05
  373. * for details.
  374. *
  375. * DO NOT ENABLE THIS if your application attempts a normal handshake. Only use
  376. * this in explicit fallback retries, following the guidance in
  377. * draft-ietf-tls-downgrade-scsv-05. */
  378. #define SSL_MODE_SEND_FALLBACK_SCSV 0x00000400L
  379. /* The following flags do nothing and are included only to make it easier to
  380. * compile code with BoringSSL. */
  381. #define SSL_MODE_AUTO_RETRY 0
  382. #define SSL_MODE_RELEASE_BUFFERS 0
  383. #define SSL_MODE_SEND_CLIENTHELLO_TIME 0
  384. #define SSL_MODE_SEND_SERVERHELLO_TIME 0
  385. /* SSL_CTX_set_mode enables all modes set in |mode| (which should be one or more
  386. * of the |SSL_MODE_*| values, ORed together) in |ctx|. It returns a bitmask
  387. * representing the resulting enabled modes. */
  388. OPENSSL_EXPORT uint32_t SSL_CTX_set_mode(SSL_CTX *ctx, uint32_t mode);
  389. /* SSL_CTX_clear_mode disables all modes set in |mode| (which should be one or
  390. * more of the |SSL_MODE_*| values, ORed together) in |ctx|. It returns a
  391. * bitmask representing the resulting enabled modes. */
  392. OPENSSL_EXPORT uint32_t SSL_CTX_clear_mode(SSL_CTX *ctx, uint32_t mode);
  393. /* SSL_CTX_get_mode returns a bitmask of |SSL_MODE_*| values that represent all
  394. * the modes enabled for |ssl|. */
  395. OPENSSL_EXPORT uint32_t SSL_CTX_get_mode(const SSL_CTX *ctx);
  396. /* SSL_set_mode enables all modes set in |mode| (which should be one or more of
  397. * the |SSL_MODE_*| values, ORed together) in |ssl|. It returns a bitmask
  398. * representing the resulting enabled modes. */
  399. OPENSSL_EXPORT uint32_t SSL_set_mode(SSL *ssl, uint32_t mode);
  400. /* SSL_clear_mode disables all modes set in |mode| (which should be one or more
  401. * of the |SSL_MODE_*| values, ORed together) in |ssl|. It returns a bitmask
  402. * representing the resulting enabled modes. */
  403. OPENSSL_EXPORT uint32_t SSL_clear_mode(SSL *ssl, uint32_t mode);
  404. /* SSL_get_mode returns a bitmask of |SSL_MODE_*| values that represent all the
  405. * modes enabled for |ssl|. */
  406. OPENSSL_EXPORT uint32_t SSL_get_mode(const SSL *ssl);
  407. /* Configuring certificates and private keys.
  408. *
  409. * These functions configure the connection's leaf certificate, private key, and
  410. * certificate chain. The certificate chain is ordered leaf to root (as sent on
  411. * the wire) but does not include the leaf. Both client and server certificates
  412. * use these functions.
  413. *
  414. * Certificates and keys may be configured before the handshake or dynamically
  415. * in the early callback and certificate callback. */
  416. /* SSL_CTX_use_certificate sets |ctx|'s leaf certificate to |x509|. It returns
  417. * one on success and zero on failure. */
  418. OPENSSL_EXPORT int SSL_CTX_use_certificate(SSL_CTX *ctx, X509 *x509);
  419. /* SSL_use_certificate sets |ssl|'s leaf certificate to |x509|. It returns one
  420. * on success and zero on failure. */
  421. OPENSSL_EXPORT int SSL_use_certificate(SSL *ssl, X509 *x509);
  422. /* SSL_CTX_use_PrivateKey sets |ctx|'s private key to |pkey|. It returns one on
  423. * success and zero on failure. */
  424. OPENSSL_EXPORT int SSL_CTX_use_PrivateKey(SSL_CTX *ctx, EVP_PKEY *pkey);
  425. /* SSL_use_PrivateKey sets |ssl|'s private key to |pkey|. It returns one on
  426. * success and zero on failure. */
  427. OPENSSL_EXPORT int SSL_use_PrivateKey(SSL *ssl, EVP_PKEY *pkey);
  428. /* SSL_CTX_set0_chain sets |ctx|'s certificate chain, excluding the leaf, to
  429. * |chain|. On success, it returns one and takes ownership of |chain|.
  430. * Otherwise, it returns zero. */
  431. OPENSSL_EXPORT int SSL_CTX_set0_chain(SSL_CTX *ctx, STACK_OF(X509) *chain);
  432. /* SSL_CTX_set1_chain sets |ctx|'s certificate chain, excluding the leaf, to
  433. * |chain|. It returns one on success and zero on failure. The caller retains
  434. * ownership of |chain| and may release it freely. */
  435. OPENSSL_EXPORT int SSL_CTX_set1_chain(SSL_CTX *ctx, STACK_OF(X509) *chain);
  436. /* SSL_set0_chain sets |ssl|'s certificate chain, excluding the leaf, to
  437. * |chain|. On success, it returns one and takes ownership of |chain|.
  438. * Otherwise, it returns zero. */
  439. OPENSSL_EXPORT int SSL_set0_chain(SSL *ssl, STACK_OF(X509) *chain);
  440. /* SSL_set1_chain sets |ssl|'s certificate chain, excluding the leaf, to
  441. * |chain|. It returns one on success and zero on failure. The caller retains
  442. * ownership of |chain| and may release it freely. */
  443. OPENSSL_EXPORT int SSL_set1_chain(SSL *ssl, STACK_OF(X509) *chain);
  444. /* SSL_CTX_add0_chain_cert appends |x509| to |ctx|'s certificate chain. On
  445. * success, it returns one and takes ownership of |x509|. Otherwise, it returns
  446. * zero. */
  447. OPENSSL_EXPORT int SSL_CTX_add0_chain_cert(SSL_CTX *ctx, X509 *x509);
  448. /* SSL_CTX_add1_chain_cert appends |x509| to |ctx|'s certificate chain. It
  449. * returns one on success and zero on failure. The caller retains ownership of
  450. * |x509| and may release it freely. */
  451. OPENSSL_EXPORT int SSL_CTX_add1_chain_cert(SSL_CTX *ctx, X509 *x509);
  452. /* SSL_add0_chain_cert appends |x509| to |ctx|'s certificate chain. On success,
  453. * it returns one and takes ownership of |x509|. Otherwise, it returns zero. */
  454. OPENSSL_EXPORT int SSL_add0_chain_cert(SSL *ssl, X509 *x509);
  455. /* SSL_CTX_add_extra_chain_cert calls |SSL_CTX_add0_chain_cert|. */
  456. OPENSSL_EXPORT int SSL_CTX_add_extra_chain_cert(SSL_CTX *ctx, X509 *x509);
  457. /* SSL_add1_chain_cert appends |x509| to |ctx|'s certificate chain. It returns
  458. * one on success and zero on failure. The caller retains ownership of |x509|
  459. * and may release it freely. */
  460. OPENSSL_EXPORT int SSL_add1_chain_cert(SSL *ssl, X509 *x509);
  461. /* SSL_CTX_clear_chain_certs clears |ctx|'s certificate chain and returns
  462. * one. */
  463. OPENSSL_EXPORT int SSL_CTX_clear_chain_certs(SSL_CTX *ctx);
  464. /* SSL_CTX_clear_extra_chain_certs calls |SSL_CTX_clear_chain_certs|. */
  465. OPENSSL_EXPORT int SSL_CTX_clear_extra_chain_certs(SSL_CTX *ctx);
  466. /* SSL_clear_chain_certs clears |ssl|'s certificate chain and returns one. */
  467. OPENSSL_EXPORT int SSL_clear_chain_certs(SSL *ssl);
  468. /* SSL_CTX_set_cert_cb sets a callback that is called to select a certificate.
  469. * The callback returns one on success, zero on internal error, and a negative
  470. * number on failure or to pause the handshake. If the handshake is paused,
  471. * |SSL_get_error| will return |SSL_ERROR_WANT_X509_LOOKUP|. */
  472. OPENSSL_EXPORT void SSL_CTX_set_cert_cb(SSL_CTX *ctx,
  473. int (*cb)(SSL *ssl, void *arg),
  474. void *arg);
  475. /* SSL_set_cert_cb sets a callback that is called to select a certificate. The
  476. * callback returns one on success, zero on internal error, and a negative
  477. * number on failure or to pause the handshake. If the handshake is paused,
  478. * |SSL_get_error| will return |SSL_ERROR_WANT_X509_LOOKUP|. */
  479. OPENSSL_EXPORT void SSL_set_cert_cb(SSL *ssl, int (*cb)(SSL *ssl, void *arg),
  480. void *arg);
  481. /* SSL_certs_clear resets the private key, leaf certificate, and certificate
  482. * chain of |ssl|. */
  483. OPENSSL_EXPORT void SSL_certs_clear(SSL *ssl);
  484. /* SSL_CTX_check_private_key returns one if the certificate and private key
  485. * configured in |ctx| are consistent and zero otherwise. */
  486. OPENSSL_EXPORT int SSL_CTX_check_private_key(const SSL_CTX *ctx);
  487. /* SSL_check_private_key returns one if the certificate and private key
  488. * configured in |ssl| are consistent and zero otherwise. */
  489. OPENSSL_EXPORT int SSL_check_private_key(const SSL *ssl);
  490. /* SSL_CTX_get0_certificate returns |ctx|'s leaf certificate. */
  491. OPENSSL_EXPORT X509 *SSL_CTX_get0_certificate(const SSL_CTX *ctx);
  492. /* SSL_get_certificate returns |ssl|'s leaf certificate. */
  493. OPENSSL_EXPORT X509 *SSL_get_certificate(const SSL *ssl);
  494. /* SSL_CTX_get0_privatekey returns |ctx|'s private key. */
  495. OPENSSL_EXPORT EVP_PKEY *SSL_CTX_get0_privatekey(const SSL_CTX *ctx);
  496. /* SSL_get_privatekey returns |ssl|'s private key. */
  497. OPENSSL_EXPORT EVP_PKEY *SSL_get_privatekey(const SSL *ssl);
  498. /* SSL_CTX_get0_chain_certs sets |*out_chain| to |ctx|'s certificate chain and
  499. * returns one. */
  500. OPENSSL_EXPORT int SSL_CTX_get0_chain_certs(const SSL_CTX *ctx,
  501. STACK_OF(X509) **out_chain);
  502. /* SSL_CTX_get_extra_chain_certs calls |SSL_CTX_get0_chain_certs|. */
  503. OPENSSL_EXPORT int SSL_CTX_get_extra_chain_certs(const SSL_CTX *ctx,
  504. STACK_OF(X509) **out_chain);
  505. /* SSL_get0_chain_certs sets |*out_chain| to |ssl|'s certificate chain and
  506. * returns one. */
  507. OPENSSL_EXPORT int SSL_get0_chain_certs(const SSL *ssl,
  508. STACK_OF(X509) **out_chain);
  509. /* Certificate and private key convenience functions. */
  510. /* SSL_CTX_use_RSAPrivateKey sets |ctx|'s private key to |rsa|. It returns one
  511. * on success and zero on failure. */
  512. OPENSSL_EXPORT int SSL_CTX_use_RSAPrivateKey(SSL_CTX *ctx, RSA *rsa);
  513. /* SSL_use_RSAPrivateKey sets |ctx|'s private key to |rsa|. It returns one on
  514. * success and zero on failure. */
  515. OPENSSL_EXPORT int SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa);
  516. /* The following functions configure certificates or private keys but take as
  517. * input DER-encoded structures. They return one on success and zero on
  518. * failure. */
  519. OPENSSL_EXPORT int SSL_CTX_use_certificate_ASN1(SSL_CTX *ctx, int len,
  520. const uint8_t *d);
  521. OPENSSL_EXPORT int SSL_use_certificate_ASN1(SSL *ssl, const uint8_t *der,
  522. int len);
  523. OPENSSL_EXPORT int SSL_CTX_use_PrivateKey_ASN1(int pk, SSL_CTX *ctx,
  524. const uint8_t *d, long len);
  525. OPENSSL_EXPORT int SSL_use_PrivateKey_ASN1(int type, SSL *ssl,
  526. const uint8_t *d, long len);
  527. OPENSSL_EXPORT int SSL_CTX_use_RSAPrivateKey_ASN1(SSL_CTX *ctx,
  528. const uint8_t *der,
  529. size_t der_len);
  530. OPENSSL_EXPORT int SSL_use_RSAPrivateKey_ASN1(SSL *ssl, const uint8_t *der,
  531. size_t der_len);
  532. /* The following functions configure certificates or private keys but take as
  533. * input files to read from. They return one on success and zero on failure. The
  534. * |type| parameter is one of the |SSL_FILETYPE_*| values and determines whether
  535. * the file's contents are read as PEM or DER. */
  536. #define SSL_FILETYPE_ASN1 X509_FILETYPE_ASN1
  537. #define SSL_FILETYPE_PEM X509_FILETYPE_PEM
  538. OPENSSL_EXPORT int SSL_CTX_use_RSAPrivateKey_file(SSL_CTX *ctx,
  539. const char *file,
  540. int type);
  541. OPENSSL_EXPORT int SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file,
  542. int type);
  543. OPENSSL_EXPORT int SSL_CTX_use_certificate_file(SSL_CTX *ctx, const char *file,
  544. int type);
  545. OPENSSL_EXPORT int SSL_use_certificate_file(SSL *ssl, const char *file,
  546. int type);
  547. OPENSSL_EXPORT int SSL_CTX_use_PrivateKey_file(SSL_CTX *ctx, const char *file,
  548. int type);
  549. OPENSSL_EXPORT int SSL_use_PrivateKey_file(SSL *ssl, const char *file,
  550. int type);
  551. /* SSL_CTX_use_certificate_file configures certificates for |ctx|. It reads the
  552. * contents of |file| as a PEM-encoded leaf certificate followed optionally by
  553. * the certificate chain to send to the peer. It returns one on success and zero
  554. * on failure. */
  555. OPENSSL_EXPORT int SSL_CTX_use_certificate_chain_file(SSL_CTX *ctx,
  556. const char *file);
  557. /* Custom private keys. */
  558. enum ssl_private_key_result_t {
  559. ssl_private_key_success,
  560. ssl_private_key_retry,
  561. ssl_private_key_failure,
  562. };
  563. /* SSL_PRIVATE_KEY_METHOD describes private key hooks. This is used to off-load
  564. * signing operations to a custom, potentially asynchronous, backend. */
  565. typedef struct ssl_private_key_method_st {
  566. /* type returns either |EVP_PKEY_RSA| or |EVP_PKEY_EC| to denote the type of
  567. * key used by |ssl|. */
  568. int (*type)(SSL *ssl);
  569. /* supports_digest returns one if the key used by |ssl| supports signing
  570. * digests of type |md| and zero otherwise. */
  571. int (*supports_digest)(SSL *ssl, const EVP_MD *md);
  572. /* max_signature_len returns the maximum length of a signature signed by the
  573. * key used by |ssl|. This must be a constant value for a given |ssl|. */
  574. size_t (*max_signature_len)(SSL *ssl);
  575. /* sign signs |in_len| bytes of digest from |in|. |md| is the hash function
  576. * used to calculate |in|. On success, it returns |ssl_private_key_success|
  577. * and writes at most |max_out| bytes of signature data to |out|. On failure,
  578. * it returns |ssl_private_key_failure|. If the operation has not completed,
  579. * it returns |ssl_private_key_retry|. |sign| should arrange for the
  580. * high-level operation on |ssl| to be retried when the operation is
  581. * completed. This will result in a call to |sign_complete|.
  582. *
  583. * If the key is an RSA key, implementations must use PKCS#1 padding. |in| is
  584. * the digest itself, so the DigestInfo prefix, if any, must be prepended by
  585. * |sign|. If |md| is |EVP_md5_sha1|, there is no prefix.
  586. *
  587. * It is an error to call |sign| while another private key operation is in
  588. * progress on |ssl|. */
  589. enum ssl_private_key_result_t (*sign)(SSL *ssl, uint8_t *out, size_t *out_len,
  590. size_t max_out, const EVP_MD *md,
  591. const uint8_t *in, size_t in_len);
  592. /* sign_complete completes a pending |sign| operation. If the operation has
  593. * completed, it returns |ssl_private_key_success| and writes the result to
  594. * |out| as in |sign|. Otherwise, it returns |ssl_private_key_failure| on
  595. * failure and |ssl_private_key_retry| if the operation is still in progress.
  596. *
  597. * |sign_complete| may be called arbitrarily many times before completion, but
  598. * it is an error to call |sign_complete| if there is no pending |sign|
  599. * operation in progress on |ssl|. */
  600. enum ssl_private_key_result_t (*sign_complete)(SSL *ssl, uint8_t *out,
  601. size_t *out_len, size_t max_out);
  602. } SSL_PRIVATE_KEY_METHOD;
  603. /* SSL_use_private_key_method configures a custom private key on |ssl|.
  604. * |key_method| must remain valid for the lifetime of |ssl|. */
  605. OPENSSL_EXPORT void SSL_set_private_key_method(
  606. SSL *ssl, const SSL_PRIVATE_KEY_METHOD *key_method);
  607. /* Connection information. */
  608. /* SSL_get_tls_unique writes at most |max_out| bytes of the tls-unique value
  609. * for |ssl| to |out| and sets |*out_len| to the number of bytes written. It
  610. * returns one on success or zero on error. In general |max_out| should be at
  611. * least 12.
  612. *
  613. * This function will always fail if the initial handshake has not completed.
  614. * The tls-unique value will change after a renegotiation but, since
  615. * renegotiations can be initiated by the server at any point, the higher-level
  616. * protocol must either leave them disabled or define states in which the
  617. * tls-unique value can be read.
  618. *
  619. * The tls-unique value is defined by
  620. * https://tools.ietf.org/html/rfc5929#section-3.1. Due to a weakness in the
  621. * TLS protocol, tls-unique is broken for resumed connections unless the
  622. * Extended Master Secret extension is negotiated. Thus this function will
  623. * return zero if |ssl| performed session resumption unless EMS was used when
  624. * negotiating the original session. */
  625. OPENSSL_EXPORT int SSL_get_tls_unique(const SSL *ssl, uint8_t *out,
  626. size_t *out_len, size_t max_out);
  627. /* Session tickets. */
  628. /* SSL_CTX_get_tlsext_ticket_keys writes |ctx|'s session ticket key material to
  629. * |len| bytes of |out|. It returns one on success and zero if |len| is not
  630. * 48. If |out| is NULL, it returns 48 instead. */
  631. OPENSSL_EXPORT int SSL_CTX_get_tlsext_ticket_keys(SSL_CTX *ctx, void *out,
  632. size_t len);
  633. /* SSL_CTX_set_tlsext_ticket_keys sets |ctx|'s session ticket key material to
  634. * |len| bytes of |in|. It returns one on success and zero if |len| is not
  635. * 48. If |in| is NULL, it returns 48 instead. */
  636. OPENSSL_EXPORT int SSL_CTX_set_tlsext_ticket_keys(SSL_CTX *ctx, const void *in,
  637. size_t len);
  638. /* SSL_TICKET_KEY_NAME_LEN is the length of the key name prefix of a session
  639. * ticket. */
  640. #define SSL_TICKET_KEY_NAME_LEN 16
  641. /* SSL_CTX_set_tlsext_ticket_key_cb sets the ticket callback to |callback| and
  642. * returns one. |callback| will be called when encrypting a new ticket and when
  643. * decrypting a ticket from the client.
  644. *
  645. * In both modes, |ctx| and |hmac_ctx| will already have been initialized with
  646. * |EVP_CIPHER_CTX_init| and |HMAC_CTX_init|, respectively. |callback|
  647. * configures |hmac_ctx| with an HMAC digest and key, and configures |ctx|
  648. * for encryption or decryption, based on the mode.
  649. *
  650. * When encrypting a new ticket, |encrypt| will be one. It writes a public
  651. * 16-byte key name to |key_name| and a fresh IV to |iv|. The output IV length
  652. * must match |EVP_CIPHER_CTX_iv_length| of the cipher selected. In this mode,
  653. * |callback| returns 1 on success and -1 on error.
  654. *
  655. * When decrypting a ticket, |encrypt| will be zero. |key_name| will point to a
  656. * 16-byte key name and |iv| points to an IV. The length of the IV consumed must
  657. * match |EVP_CIPHER_CTX_iv_length| of the cipher selected. In this mode,
  658. * |callback| returns -1 to abort the handshake, 0 if decrypting the ticket
  659. * failed, and 1 or 2 on success. If it returns 2, the ticket will be renewed.
  660. * This may be used to re-key the ticket.
  661. *
  662. * WARNING: |callback| wildly breaks the usual return value convention and is
  663. * called in two different modes. */
  664. OPENSSL_EXPORT int SSL_CTX_set_tlsext_ticket_key_cb(
  665. SSL_CTX *ctx, int (*callback)(SSL *ssl, uint8_t *key_name, uint8_t *iv,
  666. EVP_CIPHER_CTX *ctx, HMAC_CTX *hmac_ctx,
  667. int encrypt));
  668. /* Underdocumented functions.
  669. *
  670. * Functions below here haven't been touched up and may be underdocumented. */
  671. /* SSLeay version number for ASN.1 encoding of the session information */
  672. /* Version 0 - initial version
  673. * Version 1 - added the optional peer certificate. */
  674. #define SSL_SESSION_ASN1_VERSION 0x0001
  675. #define SSL_MAX_SSL_SESSION_ID_LENGTH 32
  676. #define SSL_MAX_SID_CTX_LENGTH 32
  677. #define SSL_MAX_MASTER_KEY_LENGTH 48
  678. /* These are used to specify which ciphers to use and not to use */
  679. #define SSL_TXT_MEDIUM "MEDIUM"
  680. #define SSL_TXT_HIGH "HIGH"
  681. #define SSL_TXT_FIPS "FIPS"
  682. #define SSL_TXT_kRSA "kRSA"
  683. #define SSL_TXT_kDHE "kDHE"
  684. #define SSL_TXT_kEDH "kEDH" /* same as "kDHE" */
  685. #define SSL_TXT_kECDHE "kECDHE"
  686. #define SSL_TXT_kEECDH "kEECDH" /* same as "kECDHE" */
  687. #define SSL_TXT_kPSK "kPSK"
  688. #define SSL_TXT_aRSA "aRSA"
  689. #define SSL_TXT_aECDSA "aECDSA"
  690. #define SSL_TXT_aPSK "aPSK"
  691. #define SSL_TXT_DH "DH"
  692. #define SSL_TXT_DHE "DHE" /* same as "kDHE" */
  693. #define SSL_TXT_EDH "EDH" /* same as "DHE" */
  694. #define SSL_TXT_RSA "RSA"
  695. #define SSL_TXT_ECDH "ECDH"
  696. #define SSL_TXT_ECDHE "ECDHE" /* same as "kECDHE" */
  697. #define SSL_TXT_EECDH "EECDH" /* same as "ECDHE" */
  698. #define SSL_TXT_ECDSA "ECDSA"
  699. #define SSL_TXT_PSK "PSK"
  700. #define SSL_TXT_3DES "3DES"
  701. #define SSL_TXT_RC4 "RC4"
  702. #define SSL_TXT_AES128 "AES128"
  703. #define SSL_TXT_AES256 "AES256"
  704. #define SSL_TXT_AES "AES"
  705. #define SSL_TXT_AES_GCM "AESGCM"
  706. #define SSL_TXT_CHACHA20 "CHACHA20"
  707. #define SSL_TXT_MD5 "MD5"
  708. #define SSL_TXT_SHA1 "SHA1"
  709. #define SSL_TXT_SHA "SHA" /* same as "SHA1" */
  710. #define SSL_TXT_SHA256 "SHA256"
  711. #define SSL_TXT_SHA384 "SHA384"
  712. #define SSL_TXT_SSLV3 "SSLv3"
  713. #define SSL_TXT_TLSV1 "TLSv1"
  714. #define SSL_TXT_TLSV1_1 "TLSv1.1"
  715. #define SSL_TXT_TLSV1_2 "TLSv1.2"
  716. #define SSL_TXT_ALL "ALL"
  717. /* COMPLEMENTOF* definitions. These identifiers are used to (de-select) ciphers
  718. * normally not being used.
  719. *
  720. * Example: "RC4" will activate all ciphers using RC4 including ciphers without
  721. * authentication, which would normally disabled by DEFAULT (due the "!ADH"
  722. * being part of default). Therefore "RC4:!COMPLEMENTOFDEFAULT" will make sure
  723. * that it is also disabled in the specific selection. COMPLEMENTOF*
  724. * identifiers are portable between version, as adjustments to the default
  725. * cipher setup will also be included here.
  726. *
  727. * COMPLEMENTOFDEFAULT does not experience the same special treatment that
  728. * DEFAULT gets, as only selection is being done and no sorting as needed for
  729. * DEFAULT. */
  730. #define SSL_TXT_CMPDEF "COMPLEMENTOFDEFAULT"
  731. /* The following cipher list is used by default. It also is substituted when an
  732. * application-defined cipher list string starts with 'DEFAULT'. */
  733. #define SSL_DEFAULT_CIPHER_LIST "ALL"
  734. /* As of OpenSSL 1.0.0, ssl_create_cipher_list() in ssl/ssl_ciph.c always
  735. * starts with a reasonable order, and all we have to do for DEFAULT is
  736. * throwing out anonymous and unencrypted ciphersuites! (The latter are not
  737. * actually enabled by ALL, but "ALL:RSA" would enable some of them.) */
  738. /* Used in SSL_set_shutdown()/SSL_get_shutdown(); */
  739. #define SSL_SENT_SHUTDOWN 1
  740. #define SSL_RECEIVED_SHUTDOWN 2
  741. typedef struct ssl_protocol_method_st SSL_PROTOCOL_METHOD;
  742. typedef struct ssl_session_st SSL_SESSION;
  743. typedef struct ssl_conf_ctx_st SSL_CONF_CTX;
  744. typedef struct ssl3_enc_method SSL3_ENC_METHOD;
  745. /* SRTP protection profiles for use with the use_srtp extension (RFC 5764). */
  746. typedef struct srtp_protection_profile_st {
  747. const char *name;
  748. unsigned long id;
  749. } SRTP_PROTECTION_PROFILE;
  750. DECLARE_STACK_OF(SRTP_PROTECTION_PROFILE)
  751. /* An SSL_SESSION represents an SSL session that may be resumed in an
  752. * abbreviated handshake. */
  753. struct ssl_session_st {
  754. int ssl_version; /* what ssl version session info is being kept in here? */
  755. int master_key_length;
  756. uint8_t master_key[SSL_MAX_MASTER_KEY_LENGTH];
  757. /* session_id - valid? */
  758. unsigned int session_id_length;
  759. uint8_t session_id[SSL_MAX_SSL_SESSION_ID_LENGTH];
  760. /* this is used to determine whether the session is being reused in
  761. * the appropriate context. It is up to the application to set this,
  762. * via SSL_new */
  763. unsigned int sid_ctx_length;
  764. uint8_t sid_ctx[SSL_MAX_SID_CTX_LENGTH];
  765. char *psk_identity;
  766. /* Used to indicate that session resumption is not allowed. Applications can
  767. * also set this bit for a new session via not_resumable_session_cb to
  768. * disable session caching and tickets. */
  769. int not_resumable;
  770. /* The cert is the certificate used to establish this connection
  771. *
  772. * TODO(davidben): Remove this field. It is not serialized as part of the
  773. * session, but some APIs access it. Certificate-related fields, where not
  774. * redundant with |peer|, should be added to the session. Others should
  775. * probably not be retained across resumptions. */
  776. struct sess_cert_st /* SESS_CERT */ *sess_cert;
  777. /* This is the cert for the other end. On clients, it will be the same as
  778. * sess_cert->peer_key->x509 (the latter is not enough as sess_cert is not
  779. * retained in the external representation of sessions, see ssl_asn1.c). */
  780. X509 *peer;
  781. /* when app_verify_callback accepts a session where the peer's certificate is
  782. * not ok, we must remember the error for session reuse: */
  783. long verify_result; /* only for servers */
  784. CRYPTO_refcount_t references;
  785. long timeout;
  786. long time;
  787. const SSL_CIPHER *cipher;
  788. CRYPTO_EX_DATA ex_data; /* application specific data */
  789. /* These are used to make removal of session-ids more efficient and to
  790. * implement a maximum cache size. */
  791. SSL_SESSION *prev, *next;
  792. char *tlsext_hostname;
  793. /* RFC4507 info */
  794. uint8_t *tlsext_tick; /* Session ticket */
  795. size_t tlsext_ticklen; /* Session ticket length */
  796. uint32_t tlsext_tick_lifetime_hint; /* Session lifetime hint in seconds */
  797. size_t tlsext_signed_cert_timestamp_list_length;
  798. uint8_t *tlsext_signed_cert_timestamp_list; /* Server's list. */
  799. /* The OCSP response that came with the session. */
  800. size_t ocsp_response_length;
  801. uint8_t *ocsp_response;
  802. char peer_sha256_valid; /* Non-zero if peer_sha256 is valid */
  803. uint8_t
  804. peer_sha256[SHA256_DIGEST_LENGTH]; /* SHA256 of peer certificate */
  805. /* original_handshake_hash contains the handshake hash (either SHA-1+MD5 or
  806. * SHA-2, depending on TLS version) for the original, full handshake that
  807. * created a session. This is used by Channel IDs during resumption. */
  808. uint8_t original_handshake_hash[EVP_MAX_MD_SIZE];
  809. unsigned int original_handshake_hash_len;
  810. /* extended_master_secret is true if the master secret in this session was
  811. * generated using EMS and thus isn't vulnerable to the Triple Handshake
  812. * attack. */
  813. char extended_master_secret;
  814. };
  815. /* SSL_set_mtu sets the |ssl|'s MTU in DTLS to |mtu|. It returns one on success
  816. * and zero on failure. */
  817. OPENSSL_EXPORT int SSL_set_mtu(SSL *ssl, unsigned mtu);
  818. /* SSL_get_secure_renegotiation_support returns one if the peer supports secure
  819. * renegotiation (RFC 5746) and zero otherwise. */
  820. OPENSSL_EXPORT int SSL_get_secure_renegotiation_support(const SSL *ssl);
  821. /* SSL_CTX_set_msg_callback installs |cb| as the message callback for |ctx|.
  822. * This callback will be called when sending or receiving low-level record
  823. * headers, complete handshake messages, ChangeCipherSpec, and alerts.
  824. * |write_p| is one for outgoing messages and zero for incoming messages.
  825. *
  826. * For each record header, |cb| is called with |version| = 0 and |content_type|
  827. * = |SSL3_RT_HEADER|. The |len| bytes from |buf| contain the header. Note that
  828. * this does not include the record body. If the record is sealed, the length
  829. * in the header is the length of the ciphertext.
  830. *
  831. * For each handshake message, ChangeCipherSpec, and alert, |version| is the
  832. * protocol version and |content_type| is the corresponding record type. The
  833. * |len| bytes from |buf| contain the handshake message, one-byte
  834. * ChangeCipherSpec body, and two-byte alert, respectively. */
  835. OPENSSL_EXPORT void SSL_CTX_set_msg_callback(
  836. SSL_CTX *ctx, void (*cb)(int write_p, int version, int content_type,
  837. const void *buf, size_t len, SSL *ssl, void *arg));
  838. /* SSL_CTX_set_msg_callback_arg sets the |arg| parameter of the message
  839. * callback. */
  840. OPENSSL_EXPORT void SSL_CTX_set_msg_callback_arg(SSL_CTX *ctx, void *arg);
  841. /* SSL_set_msg_callback installs |cb| as the message callback of |ssl|. See
  842. * |SSL_CTX_set_msg_callback| for when this callback is called. */
  843. OPENSSL_EXPORT void SSL_set_msg_callback(
  844. SSL *ssl, void (*cb)(int write_p, int version, int content_type,
  845. const void *buf, size_t len, SSL *ssl, void *arg));
  846. /* SSL_set_msg_callback_arg sets the |arg| parameter of the message callback. */
  847. OPENSSL_EXPORT void SSL_set_msg_callback_arg(SSL *ssl, void *arg);
  848. /* SSL_CTX_set_keylog_bio sets configures all SSL objects attached to |ctx| to
  849. * log session material to |keylog_bio|. This is intended for debugging use
  850. * with tools like Wireshark. |ctx| takes ownership of |keylog_bio|.
  851. *
  852. * The format is described in
  853. * https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/Key_Log_Format. */
  854. OPENSSL_EXPORT void SSL_CTX_set_keylog_bio(SSL_CTX *ctx, BIO *keylog_bio);
  855. struct ssl_aead_ctx_st;
  856. typedef struct ssl_aead_ctx_st SSL_AEAD_CTX;
  857. #define SSL_MAX_CERT_LIST_DEFAULT 1024 * 100 /* 100k max cert list */
  858. #define SSL_SESSION_CACHE_MAX_SIZE_DEFAULT (1024 * 20)
  859. #define SSL_DEFAULT_SESSION_TIMEOUT (2 * 60 * 60)
  860. /* This callback type is used inside SSL_CTX, SSL, and in the functions that
  861. * set them. It is used to override the generation of SSL/TLS session IDs in a
  862. * server. Return value should be zero on an error, non-zero to proceed. Also,
  863. * callbacks should themselves check if the id they generate is unique
  864. * otherwise the SSL handshake will fail with an error - callbacks can do this
  865. * using the 'ssl' value they're passed by;
  866. * SSL_has_matching_session_id(ssl, id, *id_len)
  867. * The length value passed in is set at the maximum size the session ID can be.
  868. * In SSLv2 this is 16 bytes, whereas SSLv3/TLSv1 it is 32 bytes. The callback
  869. * can alter this length to be less if desired, but under SSLv2 session IDs are
  870. * supposed to be fixed at 16 bytes so the id will be padded after the callback
  871. * returns in this case. It is also an error for the callback to set the size
  872. * to zero. */
  873. typedef int (*GEN_SESSION_CB)(const SSL *ssl, uint8_t *id,
  874. unsigned int *id_len);
  875. /* ssl_early_callback_ctx is passed to certain callbacks that are called very
  876. * early on during the server handshake. At this point, much of the SSL* hasn't
  877. * been filled out and only the ClientHello can be depended on. */
  878. struct ssl_early_callback_ctx {
  879. SSL *ssl;
  880. const uint8_t *client_hello;
  881. size_t client_hello_len;
  882. const uint8_t *session_id;
  883. size_t session_id_len;
  884. const uint8_t *cipher_suites;
  885. size_t cipher_suites_len;
  886. const uint8_t *compression_methods;
  887. size_t compression_methods_len;
  888. const uint8_t *extensions;
  889. size_t extensions_len;
  890. };
  891. /* SSL_early_callback_ctx_extension_get searches the extensions in |ctx| for an
  892. * extension of the given type. If not found, it returns zero. Otherwise it
  893. * sets |out_data| to point to the extension contents (not including the type
  894. * and length bytes), sets |out_len| to the length of the extension contents
  895. * and returns one. */
  896. OPENSSL_EXPORT char SSL_early_callback_ctx_extension_get(
  897. const struct ssl_early_callback_ctx *ctx, uint16_t extension_type,
  898. const uint8_t **out_data, size_t *out_len);
  899. typedef struct ssl_comp_st SSL_COMP;
  900. struct ssl_comp_st {
  901. int id;
  902. const char *name;
  903. char *method;
  904. };
  905. DECLARE_STACK_OF(SSL_COMP)
  906. DECLARE_LHASH_OF(SSL_SESSION)
  907. /* ssl_cipher_preference_list_st contains a list of SSL_CIPHERs with
  908. * equal-preference groups. For TLS clients, the groups are moot because the
  909. * server picks the cipher and groups cannot be expressed on the wire. However,
  910. * for servers, the equal-preference groups allow the client's preferences to
  911. * be partially respected. (This only has an effect with
  912. * SSL_OP_CIPHER_SERVER_PREFERENCE).
  913. *
  914. * The equal-preference groups are expressed by grouping SSL_CIPHERs together.
  915. * All elements of a group have the same priority: no ordering is expressed
  916. * within a group.
  917. *
  918. * The values in |ciphers| are in one-to-one correspondence with
  919. * |in_group_flags|. (That is, sk_SSL_CIPHER_num(ciphers) is the number of
  920. * bytes in |in_group_flags|.) The bytes in |in_group_flags| are either 1, to
  921. * indicate that the corresponding SSL_CIPHER is not the last element of a
  922. * group, or 0 to indicate that it is.
  923. *
  924. * For example, if |in_group_flags| contains all zeros then that indicates a
  925. * traditional, fully-ordered preference. Every SSL_CIPHER is the last element
  926. * of the group (i.e. they are all in a one-element group).
  927. *
  928. * For a more complex example, consider:
  929. * ciphers: A B C D E F
  930. * in_group_flags: 1 1 0 0 1 0
  931. *
  932. * That would express the following, order:
  933. *
  934. * A E
  935. * B -> D -> F
  936. * C
  937. */
  938. struct ssl_cipher_preference_list_st {
  939. STACK_OF(SSL_CIPHER) *ciphers;
  940. uint8_t *in_group_flags;
  941. };
  942. struct ssl_ctx_st {
  943. const SSL_PROTOCOL_METHOD *method;
  944. /* lock is used to protect various operations on this object. */
  945. CRYPTO_MUTEX lock;
  946. /* max_version is the maximum acceptable protocol version. If zero, the
  947. * maximum supported version, currently (D)TLS 1.2, is used. */
  948. uint16_t max_version;
  949. /* min_version is the minimum acceptable protocl version. If zero, the
  950. * minimum supported version, currently SSL 3.0 and DTLS 1.0, is used */
  951. uint16_t min_version;
  952. struct ssl_cipher_preference_list_st *cipher_list;
  953. /* same as above but sorted for lookup */
  954. STACK_OF(SSL_CIPHER) *cipher_list_by_id;
  955. /* cipher_list_tls11 is the list of ciphers when TLS 1.1 or greater is in
  956. * use. This only applies to server connections as, for clients, the version
  957. * number is known at connect time and so the cipher list can be set then. */
  958. struct ssl_cipher_preference_list_st *cipher_list_tls11;
  959. X509_STORE *cert_store;
  960. LHASH_OF(SSL_SESSION) *sessions;
  961. /* Most session-ids that will be cached, default is
  962. * SSL_SESSION_CACHE_MAX_SIZE_DEFAULT. 0 is unlimited. */
  963. unsigned long session_cache_size;
  964. SSL_SESSION *session_cache_head;
  965. SSL_SESSION *session_cache_tail;
  966. /* handshakes_since_cache_flush is the number of successful handshakes since
  967. * the last cache flush. */
  968. int handshakes_since_cache_flush;
  969. /* This can have one of 2 values, ored together,
  970. * SSL_SESS_CACHE_CLIENT,
  971. * SSL_SESS_CACHE_SERVER,
  972. * Default is SSL_SESSION_CACHE_SERVER, which means only
  973. * SSL_accept which cache SSL_SESSIONS. */
  974. int session_cache_mode;
  975. /* If timeout is not 0, it is the default timeout value set when SSL_new() is
  976. * called. This has been put in to make life easier to set things up */
  977. long session_timeout;
  978. /* If this callback is not null, it will be called each time a session id is
  979. * added to the cache. If this function returns 1, it means that the
  980. * callback will do a SSL_SESSION_free() when it has finished using it.
  981. * Otherwise, on 0, it means the callback has finished with it. If
  982. * remove_session_cb is not null, it will be called when a session-id is
  983. * removed from the cache. After the call, OpenSSL will SSL_SESSION_free()
  984. * it. */
  985. int (*new_session_cb)(SSL *ssl, SSL_SESSION *sess);
  986. void (*remove_session_cb)(SSL_CTX *ctx, SSL_SESSION *sess);
  987. SSL_SESSION *(*get_session_cb)(SSL *ssl, uint8_t *data, int len,
  988. int *copy);
  989. CRYPTO_refcount_t references;
  990. /* if defined, these override the X509_verify_cert() calls */
  991. int (*app_verify_callback)(X509_STORE_CTX *, void *);
  992. void *app_verify_arg;
  993. /* before OpenSSL 0.9.7, 'app_verify_arg' was ignored ('app_verify_callback'
  994. * was called with just one argument) */
  995. /* Default password callback. */
  996. pem_password_cb *default_passwd_callback;
  997. /* Default password callback user data. */
  998. void *default_passwd_callback_userdata;
  999. /* get client cert callback */
  1000. int (*client_cert_cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey);
  1001. /* get channel id callback */
  1002. void (*channel_id_cb)(SSL *ssl, EVP_PKEY **pkey);
  1003. CRYPTO_EX_DATA ex_data;
  1004. /* Default values used when no per-SSL value is defined follow */
  1005. void (*info_callback)(const SSL *ssl, int type,
  1006. int val); /* used if SSL's info_callback is NULL */
  1007. /* what we put in client cert requests */
  1008. STACK_OF(X509_NAME) *client_CA;
  1009. /* Default values to use in SSL structures follow (these are copied by
  1010. * SSL_new) */
  1011. uint32_t options;
  1012. uint32_t mode;
  1013. uint32_t max_cert_list;
  1014. struct cert_st /* CERT */ *cert;
  1015. /* callback that allows applications to peek at protocol messages */
  1016. void (*msg_callback)(int write_p, int version, int content_type,
  1017. const void *buf, size_t len, SSL *ssl, void *arg);
  1018. void *msg_callback_arg;
  1019. int verify_mode;
  1020. unsigned int sid_ctx_length;
  1021. uint8_t sid_ctx[SSL_MAX_SID_CTX_LENGTH];
  1022. int (*default_verify_callback)(
  1023. int ok, X509_STORE_CTX *ctx); /* called 'verify_callback' in the SSL */
  1024. /* Default generate session ID callback. */
  1025. GEN_SESSION_CB generate_session_id;
  1026. X509_VERIFY_PARAM *param;
  1027. /* select_certificate_cb is called before most ClientHello processing and
  1028. * before the decision whether to resume a session is made. It may return one
  1029. * to continue the handshake or zero to cause the handshake loop to return
  1030. * with an error and cause SSL_get_error to return
  1031. * SSL_ERROR_PENDING_CERTIFICATE. Note: when the handshake loop is resumed, it
  1032. * will not call the callback a second time. */
  1033. int (*select_certificate_cb)(const struct ssl_early_callback_ctx *);
  1034. /* dos_protection_cb is called once the resumption decision for a ClientHello
  1035. * has been made. It returns one to continue the handshake or zero to
  1036. * abort. */
  1037. int (*dos_protection_cb) (const struct ssl_early_callback_ctx *);
  1038. /* quiet_shutdown is true if the connection should not send a close_notify on
  1039. * shutdown. */
  1040. int quiet_shutdown;
  1041. /* Maximum amount of data to send in one fragment. actual record size can be
  1042. * more than this due to padding and MAC overheads. */
  1043. uint16_t max_send_fragment;
  1044. /* TLS extensions servername callback */
  1045. int (*tlsext_servername_callback)(SSL *, int *, void *);
  1046. void *tlsext_servername_arg;
  1047. /* RFC 4507 session ticket keys */
  1048. uint8_t tlsext_tick_key_name[SSL_TICKET_KEY_NAME_LEN];
  1049. uint8_t tlsext_tick_hmac_key[16];
  1050. uint8_t tlsext_tick_aes_key[16];
  1051. /* Callback to support customisation of ticket key setting */
  1052. int (*tlsext_ticket_key_cb)(SSL *ssl, uint8_t *name, uint8_t *iv,
  1053. EVP_CIPHER_CTX *ectx, HMAC_CTX *hctx, int enc);
  1054. /* Server-only: psk_identity_hint is the default identity hint to send in
  1055. * PSK-based key exchanges. */
  1056. char *psk_identity_hint;
  1057. unsigned int (*psk_client_callback)(SSL *ssl, const char *hint,
  1058. char *identity,
  1059. unsigned int max_identity_len,
  1060. uint8_t *psk, unsigned int max_psk_len);
  1061. unsigned int (*psk_server_callback)(SSL *ssl, const char *identity,
  1062. uint8_t *psk, unsigned int max_psk_len);
  1063. /* retain_only_sha256_of_client_certs is true if we should compute the SHA256
  1064. * hash of the peer's certifiate and then discard it to save memory and
  1065. * session space. Only effective on the server side. */
  1066. char retain_only_sha256_of_client_certs;
  1067. /* Next protocol negotiation information */
  1068. /* (for experimental NPN extension). */
  1069. /* For a server, this contains a callback function by which the set of
  1070. * advertised protocols can be provided. */
  1071. int (*next_protos_advertised_cb)(SSL *s, const uint8_t **buf,
  1072. unsigned int *len, void *arg);
  1073. void *next_protos_advertised_cb_arg;
  1074. /* For a client, this contains a callback function that selects the
  1075. * next protocol from the list provided by the server. */
  1076. int (*next_proto_select_cb)(SSL *s, uint8_t **out, uint8_t *outlen,
  1077. const uint8_t *in, unsigned int inlen, void *arg);
  1078. void *next_proto_select_cb_arg;
  1079. /* ALPN information
  1080. * (we are in the process of transitioning from NPN to ALPN.) */
  1081. /* For a server, this contains a callback function that allows the
  1082. * server to select the protocol for the connection.
  1083. * out: on successful return, this must point to the raw protocol
  1084. * name (without the length prefix).
  1085. * outlen: on successful return, this contains the length of |*out|.
  1086. * in: points to the client's list of supported protocols in
  1087. * wire-format.
  1088. * inlen: the length of |in|. */
  1089. int (*alpn_select_cb)(SSL *s, const uint8_t **out, uint8_t *outlen,
  1090. const uint8_t *in, unsigned int inlen, void *arg);
  1091. void *alpn_select_cb_arg;
  1092. /* For a client, this contains the list of supported protocols in wire
  1093. * format. */
  1094. uint8_t *alpn_client_proto_list;
  1095. unsigned alpn_client_proto_list_len;
  1096. /* SRTP profiles we are willing to do from RFC 5764 */
  1097. STACK_OF(SRTP_PROTECTION_PROFILE) *srtp_profiles;
  1098. /* EC extension values inherited by SSL structure */
  1099. size_t tlsext_ecpointformatlist_length;
  1100. uint8_t *tlsext_ecpointformatlist;
  1101. size_t tlsext_ellipticcurvelist_length;
  1102. uint16_t *tlsext_ellipticcurvelist;
  1103. /* If true, a client will advertise the Channel ID extension and a server
  1104. * will echo it. */
  1105. char tlsext_channel_id_enabled;
  1106. /* tlsext_channel_id_enabled_new is a hack to support both old and new
  1107. * ChannelID signatures. It indicates that a client should advertise the new
  1108. * ChannelID extension number. */
  1109. char tlsext_channel_id_enabled_new;
  1110. /* The client's Channel ID private key. */
  1111. EVP_PKEY *tlsext_channel_id_private;
  1112. /* If true, a client will request certificate timestamps. */
  1113. char signed_cert_timestamps_enabled;
  1114. /* If true, a client will request a stapled OCSP response. */
  1115. char ocsp_stapling_enabled;
  1116. /* If not NULL, session key material will be logged to this BIO for debugging
  1117. * purposes. The format matches NSS's and is readable by Wireshark. */
  1118. BIO *keylog_bio;
  1119. /* current_time_cb, if not NULL, is the function to use to get the current
  1120. * time. It sets |*out_clock| to the current time. */
  1121. void (*current_time_cb)(const SSL *ssl, struct timeval *out_clock);
  1122. };
  1123. OPENSSL_EXPORT LHASH_OF(SSL_SESSION) *SSL_CTX_sessions(SSL_CTX *ctx);
  1124. /* SSL_CTX_sess_number returns the number of sessions in |ctx|'s internal
  1125. * session cache. */
  1126. OPENSSL_EXPORT size_t SSL_CTX_sess_number(const SSL_CTX *ctx);
  1127. OPENSSL_EXPORT void SSL_CTX_sess_set_new_cb(
  1128. SSL_CTX *ctx, int (*new_session_cb)(SSL *ssl, SSL_SESSION *sess));
  1129. OPENSSL_EXPORT int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(SSL *ssl,
  1130. SSL_SESSION *sess);
  1131. OPENSSL_EXPORT void SSL_CTX_sess_set_remove_cb(
  1132. SSL_CTX *ctx,
  1133. void (*remove_session_cb)(SSL_CTX *ctx, SSL_SESSION *sess));
  1134. OPENSSL_EXPORT void (*SSL_CTX_sess_get_remove_cb(SSL_CTX *ctx))(
  1135. SSL_CTX *ctx, SSL_SESSION *sess);
  1136. OPENSSL_EXPORT void SSL_CTX_sess_set_get_cb(
  1137. SSL_CTX *ctx,
  1138. SSL_SESSION *(*get_session_cb)(SSL *ssl, uint8_t *data, int len,
  1139. int *copy));
  1140. OPENSSL_EXPORT SSL_SESSION *(*SSL_CTX_sess_get_get_cb(SSL_CTX *ctx))(
  1141. SSL *ssl, uint8_t *data, int len, int *copy);
  1142. /* SSL_magic_pending_session_ptr returns a magic SSL_SESSION* which indicates
  1143. * that the session isn't currently unavailable. SSL_get_error will then return
  1144. * SSL_ERROR_PENDING_SESSION and the handshake can be retried later when the
  1145. * lookup has completed. */
  1146. OPENSSL_EXPORT SSL_SESSION *SSL_magic_pending_session_ptr(void);
  1147. OPENSSL_EXPORT void SSL_CTX_set_info_callback(SSL_CTX *ctx,
  1148. void (*cb)(const SSL *ssl,
  1149. int type, int val));
  1150. OPENSSL_EXPORT void (*SSL_CTX_get_info_callback(SSL_CTX *ctx))(const SSL *ssl,
  1151. int type,
  1152. int val);
  1153. OPENSSL_EXPORT void SSL_CTX_set_client_cert_cb(
  1154. SSL_CTX *ctx,
  1155. int (*client_cert_cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey));
  1156. OPENSSL_EXPORT int (*SSL_CTX_get_client_cert_cb(SSL_CTX *ctx))(SSL *ssl,
  1157. X509 **x509,
  1158. EVP_PKEY **pkey);
  1159. OPENSSL_EXPORT void SSL_CTX_set_channel_id_cb(
  1160. SSL_CTX *ctx, void (*channel_id_cb)(SSL *ssl, EVP_PKEY **pkey));
  1161. OPENSSL_EXPORT void (*SSL_CTX_get_channel_id_cb(SSL_CTX *ctx))(SSL *ssl,
  1162. EVP_PKEY **pkey);
  1163. /* SSL_enable_signed_cert_timestamps causes |ssl| (which must be the client end
  1164. * of a connection) to request SCTs from the server. See
  1165. * https://tools.ietf.org/html/rfc6962. It returns one. */
  1166. OPENSSL_EXPORT int SSL_enable_signed_cert_timestamps(SSL *ssl);
  1167. /* SSL_CTX_enable_signed_cert_timestamps enables SCT requests on all client SSL
  1168. * objects created from |ctx|. */
  1169. OPENSSL_EXPORT void SSL_CTX_enable_signed_cert_timestamps(SSL_CTX *ctx);
  1170. /* SSL_enable_ocsp_stapling causes |ssl| (which must be the client end of a
  1171. * connection) to request a stapled OCSP response from the server. It returns
  1172. * one. */
  1173. OPENSSL_EXPORT int SSL_enable_ocsp_stapling(SSL *ssl);
  1174. /* SSL_CTX_enable_ocsp_stapling enables OCSP stapling on all client SSL objects
  1175. * created from |ctx|. */
  1176. OPENSSL_EXPORT void SSL_CTX_enable_ocsp_stapling(SSL_CTX *ctx);
  1177. /* SSL_get0_signed_cert_timestamp_list sets |*out| and |*out_len| to point to
  1178. * |*out_len| bytes of SCT information from the server. This is only valid if
  1179. * |ssl| is a client. The SCT information is a SignedCertificateTimestampList
  1180. * (including the two leading length bytes).
  1181. * See https://tools.ietf.org/html/rfc6962#section-3.3
  1182. * If no SCT was received then |*out_len| will be zero on return.
  1183. *
  1184. * WARNING: the returned data is not guaranteed to be well formed. */
  1185. OPENSSL_EXPORT void SSL_get0_signed_cert_timestamp_list(const SSL *ssl,
  1186. const uint8_t **out,
  1187. size_t *out_len);
  1188. /* SSL_get0_ocsp_response sets |*out| and |*out_len| to point to |*out_len|
  1189. * bytes of an OCSP response from the server. This is the DER encoding of an
  1190. * OCSPResponse type as defined in RFC 2560.
  1191. *
  1192. * WARNING: the returned data is not guaranteed to be well formed. */
  1193. OPENSSL_EXPORT void SSL_get0_ocsp_response(const SSL *ssl, const uint8_t **out,
  1194. size_t *out_len);
  1195. OPENSSL_EXPORT void SSL_CTX_set_next_protos_advertised_cb(
  1196. SSL_CTX *s,
  1197. int (*cb)(SSL *ssl, const uint8_t **out, unsigned int *outlen, void *arg),
  1198. void *arg);
  1199. OPENSSL_EXPORT void SSL_CTX_set_next_proto_select_cb(
  1200. SSL_CTX *s, int (*cb)(SSL *ssl, uint8_t **out, uint8_t *outlen,
  1201. const uint8_t *in, unsigned int inlen, void *arg),
  1202. void *arg);
  1203. OPENSSL_EXPORT void SSL_get0_next_proto_negotiated(const SSL *s,
  1204. const uint8_t **data,
  1205. unsigned *len);
  1206. OPENSSL_EXPORT int SSL_select_next_proto(uint8_t **out, uint8_t *outlen,
  1207. const uint8_t *in, unsigned int inlen,
  1208. const uint8_t *client,
  1209. unsigned int client_len);
  1210. #define OPENSSL_NPN_UNSUPPORTED 0
  1211. #define OPENSSL_NPN_NEGOTIATED 1
  1212. #define OPENSSL_NPN_NO_OVERLAP 2
  1213. /* SSL_CTX_set_alpn_protos sets the ALPN protocol list on |ctx| to |protos|.
  1214. * |protos| must be in wire-format (i.e. a series of non-empty, 8-bit
  1215. * length-prefixed strings). It returns zero on success and one on failure.
  1216. *
  1217. * WARNING: this function is dangerous because it breaks the usual return value
  1218. * convention. */
  1219. OPENSSL_EXPORT int SSL_CTX_set_alpn_protos(SSL_CTX *ctx, const uint8_t *protos,
  1220. unsigned protos_len);
  1221. /* SSL_set_alpn_protos sets the ALPN protocol list on |ssl| to |protos|.
  1222. * |protos| must be in wire-format (i.e. a series of non-empty, 8-bit
  1223. * length-prefixed strings). It returns zero on success and one on failure.
  1224. *
  1225. * WARNING: this function is dangerous because it breaks the usual return value
  1226. * convention. */
  1227. OPENSSL_EXPORT int SSL_set_alpn_protos(SSL *ssl, const uint8_t *protos,
  1228. unsigned protos_len);
  1229. OPENSSL_EXPORT void SSL_CTX_set_alpn_select_cb(
  1230. SSL_CTX *ctx, int (*cb)(SSL *ssl, const uint8_t **out, uint8_t *outlen,
  1231. const uint8_t *in, unsigned int inlen, void *arg),
  1232. void *arg);
  1233. OPENSSL_EXPORT void SSL_get0_alpn_selected(const SSL *ssl, const uint8_t **data,
  1234. unsigned *len);
  1235. /* SSL_enable_fastradio_padding controls whether fastradio padding is enabled
  1236. * on |ssl|. If it is, ClientHello messages are padded to 1024 bytes. This
  1237. * causes 3G radios to switch to DCH mode (high data rate). */
  1238. OPENSSL_EXPORT void SSL_enable_fastradio_padding(SSL *ssl, char on_off);
  1239. /* SSL_set_reject_peer_renegotiations controls whether renegotiation attempts by
  1240. * the peer are rejected. It may be set at any point in a connection's lifetime
  1241. * to control future renegotiations programmatically. By default, renegotiations
  1242. * are rejected. (Renegotiations requested by a client are always rejected.) */
  1243. OPENSSL_EXPORT void SSL_set_reject_peer_renegotiations(SSL *ssl, int reject);
  1244. /* the maximum length of the buffer given to callbacks containing the resulting
  1245. * identity/psk */
  1246. #define PSK_MAX_IDENTITY_LEN 128
  1247. #define PSK_MAX_PSK_LEN 256
  1248. OPENSSL_EXPORT void SSL_CTX_set_psk_client_callback(
  1249. SSL_CTX *ctx,
  1250. unsigned int (*psk_client_callback)(
  1251. SSL *ssl, const char *hint, char *identity,
  1252. unsigned int max_identity_len, uint8_t *psk, unsigned int max_psk_len));
  1253. OPENSSL_EXPORT void SSL_set_psk_client_callback(
  1254. SSL *ssl, unsigned int (*psk_client_callback)(SSL *ssl, const char *hint,
  1255. char *identity,
  1256. unsigned int max_identity_len,
  1257. uint8_t *psk,
  1258. unsigned int max_psk_len));
  1259. OPENSSL_EXPORT void SSL_CTX_set_psk_server_callback(
  1260. SSL_CTX *ctx,
  1261. unsigned int (*psk_server_callback)(SSL *ssl, const char *identity,
  1262. uint8_t *psk,
  1263. unsigned int max_psk_len));
  1264. OPENSSL_EXPORT void SSL_set_psk_server_callback(
  1265. SSL *ssl,
  1266. unsigned int (*psk_server_callback)(SSL *ssl, const char *identity,
  1267. uint8_t *psk,
  1268. unsigned int max_psk_len));
  1269. OPENSSL_EXPORT int SSL_CTX_use_psk_identity_hint(SSL_CTX *ctx,
  1270. const char *identity_hint);
  1271. OPENSSL_EXPORT int SSL_use_psk_identity_hint(SSL *s, const char *identity_hint);
  1272. OPENSSL_EXPORT const char *SSL_get_psk_identity_hint(const SSL *s);
  1273. OPENSSL_EXPORT const char *SSL_get_psk_identity(const SSL *s);
  1274. #define SSL_NOTHING 1
  1275. #define SSL_WRITING 2
  1276. #define SSL_READING 3
  1277. #define SSL_X509_LOOKUP 4
  1278. #define SSL_CHANNEL_ID_LOOKUP 5
  1279. #define SSL_PENDING_SESSION 7
  1280. #define SSL_CERTIFICATE_SELECTION_PENDING 8
  1281. #define SSL_PRIVATE_KEY_OPERATION 9
  1282. /* These will only be used when doing non-blocking IO */
  1283. #define SSL_want_nothing(s) (SSL_want(s) == SSL_NOTHING)
  1284. #define SSL_want_read(s) (SSL_want(s) == SSL_READING)
  1285. #define SSL_want_write(s) (SSL_want(s) == SSL_WRITING)
  1286. #define SSL_want_x509_lookup(s) (SSL_want(s) == SSL_X509_LOOKUP)
  1287. #define SSL_want_channel_id_lookup(s) (SSL_want(s) == SSL_CHANNEL_ID_LOOKUP)
  1288. #define SSL_want_session(s) (SSL_want(s) == SSL_PENDING_SESSION)
  1289. #define SSL_want_certificate(s) \
  1290. (SSL_want(s) == SSL_CERTIFICATE_SELECTION_PENDING)
  1291. #define SSL_want_private_key_operation(s) \
  1292. (SSL_want(s) == SSL_PRIVATE_KEY_OPERATION)
  1293. struct ssl_st {
  1294. /* version is the protocol version. */
  1295. int version;
  1296. /* method is the method table corresponding to the current protocol (DTLS or
  1297. * TLS). */
  1298. const SSL_PROTOCOL_METHOD *method;
  1299. /* enc_method is the method table corresponding to the current protocol
  1300. * version. */
  1301. const SSL3_ENC_METHOD *enc_method;
  1302. /* max_version is the maximum acceptable protocol version. If zero, the
  1303. * maximum supported version, currently (D)TLS 1.2, is used. */
  1304. uint16_t max_version;
  1305. /* min_version is the minimum acceptable protocl version. If zero, the
  1306. * minimum supported version, currently SSL 3.0 and DTLS 1.0, is used */
  1307. uint16_t min_version;
  1308. /* There are 2 BIO's even though they are normally both the same. This is so
  1309. * data can be read and written to different handlers */
  1310. BIO *rbio; /* used by SSL_read */
  1311. BIO *wbio; /* used by SSL_write */
  1312. BIO *bbio; /* used during session-id reuse to concatenate
  1313. * messages */
  1314. /* This holds a variable that indicates what we were doing when a 0 or -1 is
  1315. * returned. This is needed for non-blocking IO so we know what request
  1316. * needs re-doing when in SSL_accept or SSL_connect */
  1317. int rwstate;
  1318. /* true when we are actually in SSL_accept() or SSL_connect() */
  1319. int in_handshake;
  1320. int (*handshake_func)(SSL *);
  1321. /* Imagine that here's a boolean member "init" that is switched as soon as
  1322. * SSL_set_{accept/connect}_state is called for the first time, so that
  1323. * "state" and "handshake_func" are properly initialized. But as
  1324. * handshake_func is == 0 until then, we use this test instead of an "init"
  1325. * member. */
  1326. /* server is true iff the this SSL* is the server half. Note: before the SSL*
  1327. * is initialized by either SSL_set_accept_state or SSL_set_connect_state,
  1328. * the side is not determined. In this state, server is always false. */
  1329. int server;
  1330. /* quiet_shutdown is true if the connection should not send a close_notify on
  1331. * shutdown. */
  1332. int quiet_shutdown;
  1333. int shutdown; /* we have shut things down, 0x01 sent, 0x02
  1334. * for received */
  1335. int state; /* where we are */
  1336. int rstate; /* where we are when reading */
  1337. BUF_MEM *init_buf; /* buffer used during init */
  1338. uint8_t *init_msg; /* pointer to handshake message body, set by
  1339. ssl3_get_message() */
  1340. int init_num; /* amount read/written */
  1341. int init_off; /* amount read/written */
  1342. /* used internally to point at a raw packet */
  1343. uint8_t *packet;
  1344. unsigned int packet_length;
  1345. struct ssl3_state_st *s3; /* SSLv3 variables */
  1346. struct dtls1_state_st *d1; /* DTLSv1 variables */
  1347. /* callback that allows applications to peek at protocol messages */
  1348. void (*msg_callback)(int write_p, int version, int content_type,
  1349. const void *buf, size_t len, SSL *ssl, void *arg);
  1350. void *msg_callback_arg;
  1351. int hit; /* reusing a previous session */
  1352. X509_VERIFY_PARAM *param;
  1353. /* crypto */
  1354. struct ssl_cipher_preference_list_st *cipher_list;
  1355. STACK_OF(SSL_CIPHER) *cipher_list_by_id;
  1356. SSL_AEAD_CTX *aead_read_ctx;
  1357. SSL_AEAD_CTX *aead_write_ctx;
  1358. /* session info */
  1359. /* client cert? */
  1360. /* This is used to hold the server certificate used */
  1361. struct cert_st /* CERT */ *cert;
  1362. /* the session_id_context is used to ensure sessions are only reused
  1363. * in the appropriate context */
  1364. unsigned int sid_ctx_length;
  1365. uint8_t sid_ctx[SSL_MAX_SID_CTX_LENGTH];
  1366. /* This can also be in the session once a session is established */
  1367. SSL_SESSION *session;
  1368. /* Default generate session ID callback. */
  1369. GEN_SESSION_CB generate_session_id;
  1370. /* Used in SSL2 and SSL3 */
  1371. int verify_mode; /* 0 don't care about verify failure.
  1372. * 1 fail if verify fails */
  1373. int (*verify_callback)(int ok,
  1374. X509_STORE_CTX *ctx); /* fail if callback returns 0 */
  1375. void (*info_callback)(const SSL *ssl, int type,
  1376. int val); /* optional informational callback */
  1377. /* Server-only: psk_identity_hint is the identity hint to send in
  1378. * PSK-based key exchanges. */
  1379. char *psk_identity_hint;
  1380. unsigned int (*psk_client_callback)(SSL *ssl, const char *hint,
  1381. char *identity,
  1382. unsigned int max_identity_len,
  1383. uint8_t *psk, unsigned int max_psk_len);
  1384. unsigned int (*psk_server_callback)(SSL *ssl, const char *identity,
  1385. uint8_t *psk, unsigned int max_psk_len);
  1386. SSL_CTX *ctx;
  1387. /* extra application data */
  1388. long verify_result;
  1389. CRYPTO_EX_DATA ex_data;
  1390. /* for server side, keep the list of CA_dn we can use */
  1391. STACK_OF(X509_NAME) *client_CA;
  1392. uint32_t options; /* protocol behaviour */
  1393. uint32_t mode; /* API behaviour */
  1394. uint32_t max_cert_list;
  1395. int client_version; /* what was passed, used for
  1396. * SSLv3/TLS rollback check */
  1397. uint16_t max_send_fragment;
  1398. char *tlsext_hostname;
  1399. /* RFC4507 session ticket expected to be received or sent */
  1400. int tlsext_ticket_expected;
  1401. size_t tlsext_ecpointformatlist_length;
  1402. uint8_t *tlsext_ecpointformatlist; /* our list */
  1403. size_t tlsext_ellipticcurvelist_length;
  1404. uint16_t *tlsext_ellipticcurvelist; /* our list */
  1405. SSL_CTX *initial_ctx; /* initial ctx, used to store sessions */
  1406. /* Next protocol negotiation. For the client, this is the protocol that we
  1407. * sent in NextProtocol and is set when handling ServerHello extensions.
  1408. *
  1409. * For a server, this is the client's selected_protocol from NextProtocol and
  1410. * is set when handling the NextProtocol message, before the Finished
  1411. * message. */
  1412. uint8_t *next_proto_negotiated;
  1413. size_t next_proto_negotiated_len;
  1414. /* srtp_profiles is the list of configured SRTP protection profiles for
  1415. * DTLS-SRTP. */
  1416. STACK_OF(SRTP_PROTECTION_PROFILE) *srtp_profiles;
  1417. /* srtp_profile is the selected SRTP protection profile for
  1418. * DTLS-SRTP. */
  1419. const SRTP_PROTECTION_PROFILE *srtp_profile;
  1420. /* Copied from the SSL_CTX. For a server, means that we'll accept Channel IDs
  1421. * from clients. For a client, means that we'll advertise support. */
  1422. char tlsext_channel_id_enabled;
  1423. /* The client's Channel ID private key. */
  1424. EVP_PKEY *tlsext_channel_id_private;
  1425. /* Enable signed certificate time stamps. Currently client only. */
  1426. char signed_cert_timestamps_enabled;
  1427. /* Enable OCSP stapling. Currently client only.
  1428. * TODO(davidben): Add a server-side implementation when it becomes
  1429. * necesary. */
  1430. char ocsp_stapling_enabled;
  1431. /* For a client, this contains the list of supported protocols in wire
  1432. * format. */
  1433. uint8_t *alpn_client_proto_list;
  1434. unsigned alpn_client_proto_list_len;
  1435. /* fastradio_padding, if true, causes ClientHellos to be padded to 1024
  1436. * bytes. This ensures that the cellular radio is fast forwarded to DCH (high
  1437. * data rate) state in 3G networks. */
  1438. char fastradio_padding;
  1439. /* accept_peer_renegotiations, if one, accepts renegotiation attempts from the
  1440. * peer. Otherwise, they will be rejected with a fatal error. */
  1441. char accept_peer_renegotiations;
  1442. /* These fields are always NULL and exist only to keep wpa_supplicant happy
  1443. * about the change to EVP_AEAD. They are only needed for EAP-FAST, which we
  1444. * don't support. */
  1445. EVP_CIPHER_CTX *enc_read_ctx;
  1446. EVP_MD_CTX *read_hash;
  1447. };
  1448. /* compatibility */
  1449. #define SSL_set_app_data(s, arg) (SSL_set_ex_data(s, 0, (char *)arg))
  1450. #define SSL_get_app_data(s) (SSL_get_ex_data(s, 0))
  1451. #define SSL_SESSION_set_app_data(s, a) \
  1452. (SSL_SESSION_set_ex_data(s, 0, (char *)a))
  1453. #define SSL_SESSION_get_app_data(s) (SSL_SESSION_get_ex_data(s, 0))
  1454. #define SSL_CTX_get_app_data(ctx) (SSL_CTX_get_ex_data(ctx, 0))
  1455. #define SSL_CTX_set_app_data(ctx, arg) \
  1456. (SSL_CTX_set_ex_data(ctx, 0, (char *)arg))
  1457. /* The following are the possible values for ssl->state are are used to
  1458. * indicate where we are up to in the SSL connection establishment. The macros
  1459. * that follow are about the only things you should need to use and even then,
  1460. * only when using non-blocking IO. It can also be useful to work out where you
  1461. * were when the connection failed */
  1462. #define SSL_ST_CONNECT 0x1000
  1463. #define SSL_ST_ACCEPT 0x2000
  1464. #define SSL_ST_MASK 0x0FFF
  1465. #define SSL_ST_INIT (SSL_ST_CONNECT | SSL_ST_ACCEPT)
  1466. #define SSL_ST_OK 0x03
  1467. #define SSL_ST_RENEGOTIATE (0x04 | SSL_ST_INIT)
  1468. #define SSL_CB_LOOP 0x01
  1469. #define SSL_CB_EXIT 0x02
  1470. #define SSL_CB_READ 0x04
  1471. #define SSL_CB_WRITE 0x08
  1472. #define SSL_CB_ALERT 0x4000 /* used in callback */
  1473. #define SSL_CB_READ_ALERT (SSL_CB_ALERT | SSL_CB_READ)
  1474. #define SSL_CB_WRITE_ALERT (SSL_CB_ALERT | SSL_CB_WRITE)
  1475. #define SSL_CB_ACCEPT_LOOP (SSL_ST_ACCEPT | SSL_CB_LOOP)
  1476. #define SSL_CB_ACCEPT_EXIT (SSL_ST_ACCEPT | SSL_CB_EXIT)
  1477. #define SSL_CB_CONNECT_LOOP (SSL_ST_CONNECT | SSL_CB_LOOP)
  1478. #define SSL_CB_CONNECT_EXIT (SSL_ST_CONNECT | SSL_CB_EXIT)
  1479. #define SSL_CB_HANDSHAKE_START 0x10
  1480. #define SSL_CB_HANDSHAKE_DONE 0x20
  1481. /* Is the SSL_connection established? */
  1482. #define SSL_get_state(a) SSL_state(a)
  1483. #define SSL_is_init_finished(a) (SSL_state(a) == SSL_ST_OK)
  1484. #define SSL_in_init(a) (SSL_state(a) & SSL_ST_INIT)
  1485. #define SSL_in_connect_init(a) (SSL_state(a) & SSL_ST_CONNECT)
  1486. #define SSL_in_accept_init(a) (SSL_state(a) & SSL_ST_ACCEPT)
  1487. /* SSL_in_false_start returns one if |s| has a pending unfinished handshake that
  1488. * is in False Start. |SSL_write| may be called at this point without waiting
  1489. * for the peer, but |SSL_read| will require the handshake to be completed. */
  1490. OPENSSL_EXPORT int SSL_in_false_start(const SSL *s);
  1491. /* The following 2 states are kept in ssl->rstate when reads fail,
  1492. * you should not need these */
  1493. #define SSL_ST_READ_HEADER 0xF0
  1494. #define SSL_ST_READ_BODY 0xF1
  1495. #define SSL_ST_READ_DONE 0xF2
  1496. /* Obtain latest Finished message
  1497. * -- that we sent (SSL_get_finished)
  1498. * -- that we expected from peer (SSL_get_peer_finished).
  1499. * Returns length (0 == no Finished so far), copies up to 'count' bytes. */
  1500. OPENSSL_EXPORT size_t SSL_get_finished(const SSL *s, void *buf, size_t count);
  1501. OPENSSL_EXPORT size_t SSL_get_peer_finished(const SSL *s, void *buf, size_t count);
  1502. /* use either SSL_VERIFY_NONE or SSL_VERIFY_PEER, the last 3 options
  1503. * are 'ored' with SSL_VERIFY_PEER if they are desired */
  1504. #define SSL_VERIFY_NONE 0x00
  1505. #define SSL_VERIFY_PEER 0x01
  1506. #define SSL_VERIFY_FAIL_IF_NO_PEER_CERT 0x02
  1507. /* SSL_VERIFY_CLIENT_ONCE does nothing. */
  1508. #define SSL_VERIFY_CLIENT_ONCE 0x04
  1509. #define SSL_VERIFY_PEER_IF_NO_OBC 0x08
  1510. #define OpenSSL_add_ssl_algorithms() SSL_library_init()
  1511. #define SSLeay_add_ssl_algorithms() SSL_library_init()
  1512. /* For backward compatibility */
  1513. #define SSL_get_cipher(s) SSL_CIPHER_get_name(SSL_get_current_cipher(s))
  1514. #define SSL_get_cipher_bits(s, np) \
  1515. SSL_CIPHER_get_bits(SSL_get_current_cipher(s), np)
  1516. #define SSL_get_cipher_version(s) \
  1517. SSL_CIPHER_get_version(SSL_get_current_cipher(s))
  1518. #define SSL_get_cipher_name(s) SSL_CIPHER_get_name(SSL_get_current_cipher(s))
  1519. #define SSL_get_time(a) SSL_SESSION_get_time(a)
  1520. #define SSL_set_time(a, b) SSL_SESSION_set_time((a), (b))
  1521. #define SSL_get_timeout(a) SSL_SESSION_get_timeout(a)
  1522. #define SSL_set_timeout(a, b) SSL_SESSION_set_timeout((a), (b))
  1523. #define d2i_SSL_SESSION_bio(bp, s_id) \
  1524. ASN1_d2i_bio_of(SSL_SESSION, SSL_SESSION_new, d2i_SSL_SESSION, bp, s_id)
  1525. #define i2d_SSL_SESSION_bio(bp, s_id) \
  1526. ASN1_i2d_bio_of(SSL_SESSION, i2d_SSL_SESSION, bp, s_id)
  1527. DECLARE_PEM_rw(SSL_SESSION, SSL_SESSION)
  1528. /* make_errors.go reserves error codes above 1000 for manually-assigned errors.
  1529. * This value must be kept in sync with reservedReasonCode in make_errors.h */
  1530. #define SSL_AD_REASON_OFFSET \
  1531. 1000 /* offset to get SSL_R_... value from SSL_AD_... */
  1532. /* These alert types are for SSLv3 and TLSv1 */
  1533. #define SSL_AD_CLOSE_NOTIFY SSL3_AD_CLOSE_NOTIFY
  1534. #define SSL_AD_UNEXPECTED_MESSAGE SSL3_AD_UNEXPECTED_MESSAGE /* fatal */
  1535. #define SSL_AD_BAD_RECORD_MAC SSL3_AD_BAD_RECORD_MAC /* fatal */
  1536. #define SSL_AD_DECRYPTION_FAILED TLS1_AD_DECRYPTION_FAILED
  1537. #define SSL_AD_RECORD_OVERFLOW TLS1_AD_RECORD_OVERFLOW
  1538. #define SSL_AD_DECOMPRESSION_FAILURE SSL3_AD_DECOMPRESSION_FAILURE /* fatal */
  1539. #define SSL_AD_HANDSHAKE_FAILURE SSL3_AD_HANDSHAKE_FAILURE /* fatal */
  1540. #define SSL_AD_NO_CERTIFICATE SSL3_AD_NO_CERTIFICATE /* Not for TLS */
  1541. #define SSL_AD_BAD_CERTIFICATE SSL3_AD_BAD_CERTIFICATE
  1542. #define SSL_AD_UNSUPPORTED_CERTIFICATE SSL3_AD_UNSUPPORTED_CERTIFICATE
  1543. #define SSL_AD_CERTIFICATE_REVOKED SSL3_AD_CERTIFICATE_REVOKED
  1544. #define SSL_AD_CERTIFICATE_EXPIRED SSL3_AD_CERTIFICATE_EXPIRED
  1545. #define SSL_AD_CERTIFICATE_UNKNOWN SSL3_AD_CERTIFICATE_UNKNOWN
  1546. #define SSL_AD_ILLEGAL_PARAMETER SSL3_AD_ILLEGAL_PARAMETER /* fatal */
  1547. #define SSL_AD_UNKNOWN_CA TLS1_AD_UNKNOWN_CA /* fatal */
  1548. #define SSL_AD_ACCESS_DENIED TLS1_AD_ACCESS_DENIED /* fatal */
  1549. #define SSL_AD_DECODE_ERROR TLS1_AD_DECODE_ERROR /* fatal */
  1550. #define SSL_AD_DECRYPT_ERROR TLS1_AD_DECRYPT_ERROR
  1551. #define SSL_AD_EXPORT_RESTRICTION TLS1_AD_EXPORT_RESTRICTION /* fatal */
  1552. #define SSL_AD_PROTOCOL_VERSION TLS1_AD_PROTOCOL_VERSION /* fatal */
  1553. #define SSL_AD_INSUFFICIENT_SECURITY TLS1_AD_INSUFFICIENT_SECURITY /* fatal */
  1554. #define SSL_AD_INTERNAL_ERROR TLS1_AD_INTERNAL_ERROR /* fatal */
  1555. #define SSL_AD_USER_CANCELLED TLS1_AD_USER_CANCELLED
  1556. #define SSL_AD_NO_RENEGOTIATION TLS1_AD_NO_RENEGOTIATION
  1557. #define SSL_AD_UNSUPPORTED_EXTENSION TLS1_AD_UNSUPPORTED_EXTENSION
  1558. #define SSL_AD_CERTIFICATE_UNOBTAINABLE TLS1_AD_CERTIFICATE_UNOBTAINABLE
  1559. #define SSL_AD_UNRECOGNIZED_NAME TLS1_AD_UNRECOGNIZED_NAME
  1560. #define SSL_AD_BAD_CERTIFICATE_STATUS_RESPONSE \
  1561. TLS1_AD_BAD_CERTIFICATE_STATUS_RESPONSE
  1562. #define SSL_AD_BAD_CERTIFICATE_HASH_VALUE TLS1_AD_BAD_CERTIFICATE_HASH_VALUE
  1563. #define SSL_AD_UNKNOWN_PSK_IDENTITY TLS1_AD_UNKNOWN_PSK_IDENTITY /* fatal */
  1564. #define SSL_AD_INAPPROPRIATE_FALLBACK SSL3_AD_INAPPROPRIATE_FALLBACK /* fatal */
  1565. #define SSL_ERROR_NONE 0
  1566. #define SSL_ERROR_SSL 1
  1567. #define SSL_ERROR_WANT_READ 2
  1568. #define SSL_ERROR_WANT_WRITE 3
  1569. #define SSL_ERROR_WANT_X509_LOOKUP 4
  1570. #define SSL_ERROR_SYSCALL 5 /* look at error stack/return value/errno */
  1571. #define SSL_ERROR_ZERO_RETURN 6
  1572. #define SSL_ERROR_WANT_CONNECT 7
  1573. #define SSL_ERROR_WANT_ACCEPT 8
  1574. #define SSL_ERROR_WANT_CHANNEL_ID_LOOKUP 9
  1575. #define SSL_ERROR_PENDING_SESSION 11
  1576. #define SSL_ERROR_PENDING_CERTIFICATE 12
  1577. #define SSL_ERROR_WANT_PRIVATE_KEY_OPERATION 13
  1578. #define SSL_CTRL_GET_CURVES 90
  1579. #define SSL_CTRL_SET_CURVES 91
  1580. #define SSL_CTRL_SET_CURVES_LIST 92
  1581. #define SSL_CTRL_SET_SIGALGS 97
  1582. #define SSL_CTRL_SET_SIGALGS_LIST 98
  1583. #define SSL_CTRL_SET_CLIENT_SIGALGS 101
  1584. #define SSL_CTRL_SET_CLIENT_SIGALGS_LIST 102
  1585. #define SSL_CTRL_GET_CLIENT_CERT_TYPES 103
  1586. #define SSL_CTRL_SET_CLIENT_CERT_TYPES 104
  1587. #define SSL_CTRL_SET_VERIFY_CERT_STORE 106
  1588. #define SSL_CTRL_SET_CHAIN_CERT_STORE 107
  1589. #define SSL_CTRL_GET_EC_POINT_FORMATS 111
  1590. /* DTLSv1_get_timeout queries the next DTLS handshake timeout. If there is a
  1591. * timeout in progress, it sets |*out| to the time remaining and returns one.
  1592. * Otherwise, it returns zero.
  1593. *
  1594. * When the timeout expires, call |DTLSv1_handle_timeout| to handle the
  1595. * retransmit behavior.
  1596. *
  1597. * NOTE: This function must be queried again whenever the handshake state
  1598. * machine changes, including when |DTLSv1_handle_timeout| is called. */
  1599. OPENSSL_EXPORT int DTLSv1_get_timeout(const SSL *ssl, struct timeval *out);
  1600. /* DTLSv1_handle_timeout is called when a DTLS handshake timeout expires. If no
  1601. * timeout had expired, it returns 0. Otherwise, it retransmits the previous
  1602. * flight of handshake messages and returns 1. If too many timeouts had expired
  1603. * without progress or an error occurs, it returns -1.
  1604. *
  1605. * NOTE: The caller's external timer should be compatible with the one |ssl|
  1606. * queries within some fudge factor. Otherwise, the call will be a no-op, but
  1607. * |DTLSv1_get_timeout| will return an updated timeout.
  1608. *
  1609. * WARNING: This function breaks the usual return value convention. */
  1610. OPENSSL_EXPORT int DTLSv1_handle_timeout(SSL *ssl);
  1611. /* SSL_session_reused returns one if |ssl| performed an abbreviated handshake
  1612. * and zero otherwise.
  1613. *
  1614. * TODO(davidben): Hammer down the semantics of this API while a handshake,
  1615. * initial or renego, is in progress. */
  1616. OPENSSL_EXPORT int SSL_session_reused(const SSL *ssl);
  1617. /* SSL_total_renegotiations returns the total number of renegotiation handshakes
  1618. * peformed by |ssl|. This includes the pending renegotiation, if any. */
  1619. OPENSSL_EXPORT int SSL_total_renegotiations(const SSL *ssl);
  1620. /* SSL_CTX_set_tmp_dh configures |ctx| to use the group from |dh| as the group
  1621. * for DHE. Only the group is used, so |dh| needn't have a keypair. It returns
  1622. * one on success and zero on error. */
  1623. OPENSSL_EXPORT int SSL_CTX_set_tmp_dh(SSL_CTX *ctx, const DH *dh);
  1624. /* SSL_set_tmp_dh configures |ssl| to use the group from |dh| as the group for
  1625. * DHE. Only the group is used, so |dh| needn't have a keypair. It returns one
  1626. * on success and zero on error. */
  1627. OPENSSL_EXPORT int SSL_set_tmp_dh(SSL *ssl, const DH *dh);
  1628. /* SSL_CTX_set_tmp_ecdh configures |ctx| to use the curve from |ecdh| as the
  1629. * curve for ephemeral ECDH keys. For historical reasons, this API expects an
  1630. * |EC_KEY|, but only the curve is used. It returns one on success and zero on
  1631. * error. If unset, an appropriate curve will be chosen automatically. (This is
  1632. * recommended.) */
  1633. OPENSSL_EXPORT int SSL_CTX_set_tmp_ecdh(SSL_CTX *ctx, const EC_KEY *ec_key);
  1634. /* SSL_set_tmp_ecdh configures |ssl| to use the curve from |ecdh| as the curve
  1635. * for ephemeral ECDH keys. For historical reasons, this API expects an
  1636. * |EC_KEY|, but only the curve is used. It returns one on success and zero on
  1637. * error. If unset, an appropriate curve will be chosen automatically. (This is
  1638. * recommended.) */
  1639. OPENSSL_EXPORT int SSL_set_tmp_ecdh(SSL *ssl, const EC_KEY *ec_key);
  1640. /* SSL_CTX_enable_tls_channel_id either configures a TLS server to accept TLS
  1641. * client IDs from clients, or configures a client to send TLS client IDs to
  1642. * a server. It returns one. */
  1643. OPENSSL_EXPORT int SSL_CTX_enable_tls_channel_id(SSL_CTX *ctx);
  1644. /* SSL_enable_tls_channel_id either configures a TLS server to accept TLS
  1645. * client IDs from clients, or configure a client to send TLS client IDs to
  1646. * server. It returns one. */
  1647. OPENSSL_EXPORT int SSL_enable_tls_channel_id(SSL *ssl);
  1648. /* SSL_CTX_set1_tls_channel_id configures a TLS client to send a TLS Channel ID
  1649. * to compatible servers. |private_key| must be a P-256 EC key. It returns one
  1650. * on success and zero on error. */
  1651. OPENSSL_EXPORT int SSL_CTX_set1_tls_channel_id(SSL_CTX *ctx,
  1652. EVP_PKEY *private_key);
  1653. /* SSL_set1_tls_channel_id configures a TLS client to send a TLS Channel ID to
  1654. * compatible servers. |private_key| must be a P-256 EC key. It returns one on
  1655. * success and zero on error. */
  1656. OPENSSL_EXPORT int SSL_set1_tls_channel_id(SSL *ssl, EVP_PKEY *private_key);
  1657. /* SSL_get_tls_channel_id gets the client's TLS Channel ID from a server SSL*
  1658. * and copies up to the first |max_out| bytes into |out|. The Channel ID
  1659. * consists of the client's P-256 public key as an (x,y) pair where each is a
  1660. * 32-byte, big-endian field element. It returns 0 if the client didn't offer a
  1661. * Channel ID and the length of the complete Channel ID otherwise. */
  1662. OPENSSL_EXPORT size_t SSL_get_tls_channel_id(SSL *ssl, uint8_t *out,
  1663. size_t max_out);
  1664. #define SSL_CTX_set0_verify_cert_store(ctx, st) \
  1665. SSL_CTX_ctrl(ctx, SSL_CTRL_SET_VERIFY_CERT_STORE, 0, (char *)st)
  1666. #define SSL_CTX_set1_verify_cert_store(ctx, st) \
  1667. SSL_CTX_ctrl(ctx, SSL_CTRL_SET_VERIFY_CERT_STORE, 1, (char *)st)
  1668. #define SSL_CTX_set0_chain_cert_store(ctx, st) \
  1669. SSL_CTX_ctrl(ctx, SSL_CTRL_SET_CHAIN_CERT_STORE, 0, (char *)st)
  1670. #define SSL_CTX_set1_chain_cert_store(ctx, st) \
  1671. SSL_CTX_ctrl(ctx, SSL_CTRL_SET_CHAIN_CERT_STORE, 1, (char *)st)
  1672. #define SSL_set0_verify_cert_store(s, st) \
  1673. SSL_ctrl(s, SSL_CTRL_SET_VERIFY_CERT_STORE, 0, (char *)st)
  1674. #define SSL_set1_verify_cert_store(s, st) \
  1675. SSL_ctrl(s, SSL_CTRL_SET_VERIFY_CERT_STORE, 1, (char *)st)
  1676. #define SSL_set0_chain_cert_store(s, st) \
  1677. SSL_ctrl(s, SSL_CTRL_SET_CHAIN_CERT_STORE, 0, (char *)st)
  1678. #define SSL_set1_chain_cert_store(s, st) \
  1679. SSL_ctrl(s, SSL_CTRL_SET_CHAIN_CERT_STORE, 1, (char *)st)
  1680. #define SSL_get1_curves(ctx, s) SSL_ctrl(ctx, SSL_CTRL_GET_CURVES, 0, (char *)s)
  1681. #define SSL_CTX_set1_curves(ctx, clist, clistlen) \
  1682. SSL_CTX_ctrl(ctx, SSL_CTRL_SET_CURVES, clistlen, (char *)clist)
  1683. #define SSL_CTX_set1_curves_list(ctx, s) \
  1684. SSL_CTX_ctrl(ctx, SSL_CTRL_SET_CURVES_LIST, 0, (char *)s)
  1685. #define SSL_set1_curves(ctx, clist, clistlen) \
  1686. SSL_ctrl(ctx, SSL_CTRL_SET_CURVES, clistlen, (char *)clist)
  1687. #define SSL_set1_curves_list(ctx, s) \
  1688. SSL_ctrl(ctx, SSL_CTRL_SET_CURVES_LIST, 0, (char *)s)
  1689. #define SSL_CTX_set1_sigalgs(ctx, slist, slistlen) \
  1690. SSL_CTX_ctrl(ctx, SSL_CTRL_SET_SIGALGS, slistlen, (int *)slist)
  1691. #define SSL_CTX_set1_sigalgs_list(ctx, s) \
  1692. SSL_CTX_ctrl(ctx, SSL_CTRL_SET_SIGALGS_LIST, 0, (char *)s)
  1693. #define SSL_set1_sigalgs(ctx, slist, slistlen) \
  1694. SSL_ctrl(ctx, SSL_CTRL_SET_SIGALGS, clistlen, (int *)slist)
  1695. #define SSL_set1_sigalgs_list(ctx, s) \
  1696. SSL_ctrl(ctx, SSL_CTRL_SET_SIGALGS_LIST, 0, (char *)s)
  1697. #define SSL_CTX_set1_client_sigalgs(ctx, slist, slistlen) \
  1698. SSL_CTX_ctrl(ctx, SSL_CTRL_SET_CLIENT_SIGALGS, slistlen, (int *)slist)
  1699. #define SSL_CTX_set1_client_sigalgs_list(ctx, s) \
  1700. SSL_CTX_ctrl(ctx, SSL_CTRL_SET_CLIENT_SIGALGS_LIST, 0, (char *)s)
  1701. #define SSL_set1_client_sigalgs(ctx, slist, slistlen) \
  1702. SSL_ctrl(ctx, SSL_CTRL_SET_CLIENT_SIGALGS, clistlen, (int *)slist)
  1703. #define SSL_set1_client_sigalgs_list(ctx, s) \
  1704. SSL_ctrl(ctx, SSL_CTRL_SET_CLIENT_SIGALGS_LIST, 0, (char *)s)
  1705. #define SSL_get0_certificate_types(s, clist) \
  1706. SSL_ctrl(s, SSL_CTRL_GET_CLIENT_CERT_TYPES, 0, (char *)clist)
  1707. #define SSL_CTX_set1_client_certificate_types(ctx, clist, clistlen) \
  1708. SSL_CTX_ctrl(ctx, SSL_CTRL_SET_CLIENT_CERT_TYPES, clistlen, (char *)clist)
  1709. #define SSL_set1_client_certificate_types(s, clist, clistlen) \
  1710. SSL_ctrl(s, SSL_CTRL_SET_CLIENT_CERT_TYPES, clistlen, (char *)clist)
  1711. #define SSL_get0_ec_point_formats(s, plst) \
  1712. SSL_ctrl(s, SSL_CTRL_GET_EC_POINT_FORMATS, 0, (char *)plst)
  1713. OPENSSL_EXPORT int SSL_CTX_set_cipher_list(SSL_CTX *, const char *str);
  1714. OPENSSL_EXPORT int SSL_CTX_set_cipher_list_tls11(SSL_CTX *, const char *str);
  1715. OPENSSL_EXPORT long SSL_CTX_set_timeout(SSL_CTX *ctx, long t);
  1716. OPENSSL_EXPORT long SSL_CTX_get_timeout(const SSL_CTX *ctx);
  1717. OPENSSL_EXPORT X509_STORE *SSL_CTX_get_cert_store(const SSL_CTX *);
  1718. OPENSSL_EXPORT void SSL_CTX_set_cert_store(SSL_CTX *, X509_STORE *);
  1719. OPENSSL_EXPORT int SSL_want(const SSL *s);
  1720. OPENSSL_EXPORT void SSL_CTX_flush_sessions(SSL_CTX *ctx, long tm);
  1721. /* SSL_get_current_cipher returns the cipher used in the current outgoing
  1722. * connection state, or NULL if the null cipher is active. */
  1723. OPENSSL_EXPORT const SSL_CIPHER *SSL_get_current_cipher(const SSL *s);
  1724. OPENSSL_EXPORT int SSL_get_fd(const SSL *s);
  1725. OPENSSL_EXPORT int SSL_get_rfd(const SSL *s);
  1726. OPENSSL_EXPORT int SSL_get_wfd(const SSL *s);
  1727. OPENSSL_EXPORT const char *SSL_get_cipher_list(const SSL *s, int n);
  1728. OPENSSL_EXPORT int SSL_pending(const SSL *s);
  1729. OPENSSL_EXPORT int SSL_set_fd(SSL *s, int fd);
  1730. OPENSSL_EXPORT int SSL_set_rfd(SSL *s, int fd);
  1731. OPENSSL_EXPORT int SSL_set_wfd(SSL *s, int fd);
  1732. OPENSSL_EXPORT void SSL_set_bio(SSL *s, BIO *rbio, BIO *wbio);
  1733. OPENSSL_EXPORT BIO *SSL_get_rbio(const SSL *s);
  1734. OPENSSL_EXPORT BIO *SSL_get_wbio(const SSL *s);
  1735. OPENSSL_EXPORT int SSL_set_cipher_list(SSL *s, const char *str);
  1736. OPENSSL_EXPORT int SSL_get_verify_mode(const SSL *s);
  1737. OPENSSL_EXPORT int SSL_get_verify_depth(const SSL *s);
  1738. OPENSSL_EXPORT int (*SSL_get_verify_callback(const SSL *s))(int,
  1739. X509_STORE_CTX *);
  1740. OPENSSL_EXPORT void SSL_set_verify(SSL *s, int mode,
  1741. int (*callback)(int ok,
  1742. X509_STORE_CTX *ctx));
  1743. OPENSSL_EXPORT void SSL_set_verify_depth(SSL *s, int depth);
  1744. OPENSSL_EXPORT STACK_OF(X509_NAME) *SSL_load_client_CA_file(const char *file);
  1745. OPENSSL_EXPORT int SSL_add_file_cert_subjects_to_stack(STACK_OF(X509_NAME) *
  1746. stackCAs,
  1747. const char *file);
  1748. OPENSSL_EXPORT int SSL_add_dir_cert_subjects_to_stack(STACK_OF(X509_NAME) *
  1749. stackCAs,
  1750. const char *dir);
  1751. /* SSL_load_error_strings does nothing. */
  1752. OPENSSL_EXPORT void SSL_load_error_strings(void);
  1753. OPENSSL_EXPORT const char *SSL_state_string(const SSL *s);
  1754. OPENSSL_EXPORT const char *SSL_rstate_string(const SSL *s);
  1755. OPENSSL_EXPORT const char *SSL_state_string_long(const SSL *s);
  1756. OPENSSL_EXPORT const char *SSL_rstate_string_long(const SSL *s);
  1757. OPENSSL_EXPORT long SSL_SESSION_get_time(const SSL_SESSION *s);
  1758. OPENSSL_EXPORT long SSL_SESSION_set_time(SSL_SESSION *s, long t);
  1759. OPENSSL_EXPORT long SSL_SESSION_get_timeout(const SSL_SESSION *s);
  1760. OPENSSL_EXPORT long SSL_SESSION_set_timeout(SSL_SESSION *s, long t);
  1761. OPENSSL_EXPORT X509 *SSL_SESSION_get0_peer(SSL_SESSION *s);
  1762. OPENSSL_EXPORT int SSL_SESSION_set1_id_context(SSL_SESSION *s,
  1763. const uint8_t *sid_ctx,
  1764. unsigned int sid_ctx_len);
  1765. OPENSSL_EXPORT SSL_SESSION *SSL_SESSION_new(void);
  1766. OPENSSL_EXPORT const uint8_t *SSL_SESSION_get_id(const SSL_SESSION *s,
  1767. unsigned int *len);
  1768. OPENSSL_EXPORT int SSL_SESSION_print_fp(FILE *fp, const SSL_SESSION *ses);
  1769. OPENSSL_EXPORT int SSL_SESSION_print(BIO *fp, const SSL_SESSION *ses);
  1770. /* SSL_SESSION_up_ref, if |session| is not NULL, increments the reference count
  1771. * of |session|. It then returns |session|. */
  1772. OPENSSL_EXPORT SSL_SESSION *SSL_SESSION_up_ref(SSL_SESSION *session);
  1773. /* SSL_SESSION_free decrements the reference count of |session|. If it reaches
  1774. * zero, all data referenced by |session| and |session| itself are released. */
  1775. OPENSSL_EXPORT void SSL_SESSION_free(SSL_SESSION *session);
  1776. OPENSSL_EXPORT int SSL_set_session(SSL *to, SSL_SESSION *session);
  1777. OPENSSL_EXPORT int SSL_CTX_add_session(SSL_CTX *s, SSL_SESSION *c);
  1778. OPENSSL_EXPORT int SSL_CTX_remove_session(SSL_CTX *, SSL_SESSION *c);
  1779. OPENSSL_EXPORT int SSL_CTX_set_generate_session_id(SSL_CTX *, GEN_SESSION_CB);
  1780. OPENSSL_EXPORT int SSL_set_generate_session_id(SSL *, GEN_SESSION_CB);
  1781. OPENSSL_EXPORT int SSL_has_matching_session_id(const SSL *ssl,
  1782. const uint8_t *id,
  1783. unsigned int id_len);
  1784. /* SSL_SESSION_to_bytes serializes |in| into a newly allocated buffer and sets
  1785. * |*out_data| to that buffer and |*out_len| to its length. The caller takes
  1786. * ownership of the buffer and must call |OPENSSL_free| when done. It returns
  1787. * one on success and zero on error. */
  1788. OPENSSL_EXPORT int SSL_SESSION_to_bytes(SSL_SESSION *in, uint8_t **out_data,
  1789. size_t *out_len);
  1790. /* SSL_SESSION_to_bytes_for_ticket serializes |in|, but excludes the session
  1791. * identification information, namely the session ID and ticket. */
  1792. OPENSSL_EXPORT int SSL_SESSION_to_bytes_for_ticket(SSL_SESSION *in,
  1793. uint8_t **out_data,
  1794. size_t *out_len);
  1795. /* SSL_SESSION_from_bytes parses |in_len| bytes from |in| as an SSL_SESSION. It
  1796. * returns a newly-allocated |SSL_SESSION| on success or NULL on error. */
  1797. OPENSSL_EXPORT SSL_SESSION *SSL_SESSION_from_bytes(const uint8_t *in,
  1798. size_t in_len);
  1799. /* Deprecated: i2d_SSL_SESSION serializes |in| to the bytes pointed to by
  1800. * |*pp|. On success, it returns the number of bytes written and advances |*pp|
  1801. * by that many bytes. On failure, it returns -1. If |pp| is NULL, no bytes are
  1802. * written and only the length is returned.
  1803. *
  1804. * Use |SSL_SESSION_to_bytes| instead. */
  1805. OPENSSL_EXPORT int i2d_SSL_SESSION(SSL_SESSION *in, uint8_t **pp);
  1806. /* Deprecated: d2i_SSL_SESSION parses a serialized session from the |length|
  1807. * bytes pointed to by |*pp|. It returns the new |SSL_SESSION| and advances
  1808. * |*pp| by the number of bytes consumed on success and NULL on failure. The
  1809. * caller takes ownership of the new session and must call |SSL_SESSION_free|
  1810. * when done.
  1811. *
  1812. * If |a| is non-NULL, |*a| is released and set the new |SSL_SESSION|.
  1813. *
  1814. * Use |SSL_SESSION_from_bytes| instead. */
  1815. OPENSSL_EXPORT SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, const uint8_t **pp,
  1816. long length);
  1817. OPENSSL_EXPORT X509 *SSL_get_peer_certificate(const SSL *s);
  1818. OPENSSL_EXPORT STACK_OF(X509) *SSL_get_peer_cert_chain(const SSL *s);
  1819. OPENSSL_EXPORT int SSL_CTX_get_verify_mode(const SSL_CTX *ctx);
  1820. OPENSSL_EXPORT int SSL_CTX_get_verify_depth(const SSL_CTX *ctx);
  1821. OPENSSL_EXPORT int (*SSL_CTX_get_verify_callback(const SSL_CTX *ctx))(
  1822. int, X509_STORE_CTX *);
  1823. OPENSSL_EXPORT void SSL_CTX_set_verify(SSL_CTX *ctx, int mode,
  1824. int (*callback)(int, X509_STORE_CTX *));
  1825. OPENSSL_EXPORT void SSL_CTX_set_verify_depth(SSL_CTX *ctx, int depth);
  1826. OPENSSL_EXPORT void SSL_CTX_set_cert_verify_callback(
  1827. SSL_CTX *ctx, int (*cb)(X509_STORE_CTX *, void *), void *arg);
  1828. OPENSSL_EXPORT void SSL_CTX_set_default_passwd_cb(SSL_CTX *ctx,
  1829. pem_password_cb *cb);
  1830. OPENSSL_EXPORT void SSL_CTX_set_default_passwd_cb_userdata(SSL_CTX *ctx,
  1831. void *u);
  1832. OPENSSL_EXPORT int SSL_CTX_set_session_id_context(SSL_CTX *ctx,
  1833. const uint8_t *sid_ctx,
  1834. unsigned int sid_ctx_len);
  1835. OPENSSL_EXPORT int SSL_set_session_id_context(SSL *ssl, const uint8_t *sid_ctx,
  1836. unsigned int sid_ctx_len);
  1837. OPENSSL_EXPORT int SSL_CTX_set_purpose(SSL_CTX *s, int purpose);
  1838. OPENSSL_EXPORT int SSL_set_purpose(SSL *s, int purpose);
  1839. OPENSSL_EXPORT int SSL_CTX_set_trust(SSL_CTX *s, int trust);
  1840. OPENSSL_EXPORT int SSL_set_trust(SSL *s, int trust);
  1841. OPENSSL_EXPORT int SSL_CTX_set1_param(SSL_CTX *ctx, X509_VERIFY_PARAM *vpm);
  1842. OPENSSL_EXPORT int SSL_set1_param(SSL *ssl, X509_VERIFY_PARAM *vpm);
  1843. OPENSSL_EXPORT X509_VERIFY_PARAM *SSL_CTX_get0_param(SSL_CTX *ctx);
  1844. OPENSSL_EXPORT X509_VERIFY_PARAM *SSL_get0_param(SSL *ssl);
  1845. OPENSSL_EXPORT int SSL_accept(SSL *ssl);
  1846. OPENSSL_EXPORT int SSL_connect(SSL *ssl);
  1847. OPENSSL_EXPORT int SSL_read(SSL *ssl, void *buf, int num);
  1848. OPENSSL_EXPORT int SSL_peek(SSL *ssl, void *buf, int num);
  1849. OPENSSL_EXPORT int SSL_write(SSL *ssl, const void *buf, int num);
  1850. OPENSSL_EXPORT long SSL_ctrl(SSL *ssl, int cmd, long larg, void *parg);
  1851. OPENSSL_EXPORT long SSL_CTX_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg);
  1852. OPENSSL_EXPORT int SSL_get_error(const SSL *s, int ret_code);
  1853. /* SSL_get_version returns a string describing the TLS version used by |s|. For
  1854. * example, "TLSv1.2" or "SSLv3". */
  1855. OPENSSL_EXPORT const char *SSL_get_version(const SSL *s);
  1856. /* SSL_SESSION_get_version returns a string describing the TLS version used by
  1857. * |sess|. For example, "TLSv1.2" or "SSLv3". */
  1858. OPENSSL_EXPORT const char *SSL_SESSION_get_version(const SSL_SESSION *sess);
  1859. OPENSSL_EXPORT STACK_OF(SSL_CIPHER) *SSL_get_ciphers(const SSL *s);
  1860. OPENSSL_EXPORT int SSL_do_handshake(SSL *s);
  1861. /* SSL_renegotiate_pending returns one if |ssl| is in the middle of a
  1862. * renegotiation. */
  1863. OPENSSL_EXPORT int SSL_renegotiate_pending(SSL *ssl);
  1864. OPENSSL_EXPORT int SSL_shutdown(SSL *s);
  1865. OPENSSL_EXPORT const char *SSL_alert_type_string_long(int value);
  1866. OPENSSL_EXPORT const char *SSL_alert_type_string(int value);
  1867. OPENSSL_EXPORT const char *SSL_alert_desc_string_long(int value);
  1868. OPENSSL_EXPORT const char *SSL_alert_desc_string(int value);
  1869. OPENSSL_EXPORT void SSL_set_client_CA_list(SSL *s,
  1870. STACK_OF(X509_NAME) *name_list);
  1871. OPENSSL_EXPORT void SSL_CTX_set_client_CA_list(SSL_CTX *ctx,
  1872. STACK_OF(X509_NAME) *name_list);
  1873. OPENSSL_EXPORT STACK_OF(X509_NAME) *SSL_get_client_CA_list(const SSL *s);
  1874. OPENSSL_EXPORT STACK_OF(X509_NAME) *
  1875. SSL_CTX_get_client_CA_list(const SSL_CTX *s);
  1876. OPENSSL_EXPORT int SSL_add_client_CA(SSL *ssl, X509 *x);
  1877. OPENSSL_EXPORT int SSL_CTX_add_client_CA(SSL_CTX *ctx, X509 *x);
  1878. OPENSSL_EXPORT long SSL_get_default_timeout(const SSL *s);
  1879. OPENSSL_EXPORT STACK_OF(X509_NAME) *SSL_dup_CA_list(STACK_OF(X509_NAME) *sk);
  1880. OPENSSL_EXPORT void SSL_CTX_set_quiet_shutdown(SSL_CTX *ctx, int mode);
  1881. OPENSSL_EXPORT int SSL_CTX_get_quiet_shutdown(const SSL_CTX *ctx);
  1882. OPENSSL_EXPORT void SSL_set_quiet_shutdown(SSL *ssl, int mode);
  1883. OPENSSL_EXPORT int SSL_get_quiet_shutdown(const SSL *ssl);
  1884. OPENSSL_EXPORT void SSL_set_shutdown(SSL *ssl, int mode);
  1885. OPENSSL_EXPORT int SSL_get_shutdown(const SSL *ssl);
  1886. OPENSSL_EXPORT int SSL_version(const SSL *ssl);
  1887. OPENSSL_EXPORT int SSL_CTX_set_default_verify_paths(SSL_CTX *ctx);
  1888. OPENSSL_EXPORT int SSL_CTX_load_verify_locations(SSL_CTX *ctx,
  1889. const char *CAfile,
  1890. const char *CApath);
  1891. #define SSL_get0_session SSL_get_session /* just peek at pointer */
  1892. OPENSSL_EXPORT SSL_SESSION *SSL_get_session(const SSL *ssl);
  1893. OPENSSL_EXPORT SSL_SESSION *SSL_get1_session(
  1894. SSL *ssl); /* obtain a reference count */
  1895. OPENSSL_EXPORT SSL_CTX *SSL_get_SSL_CTX(const SSL *ssl);
  1896. OPENSSL_EXPORT SSL_CTX *SSL_set_SSL_CTX(SSL *ssl, SSL_CTX *ctx);
  1897. OPENSSL_EXPORT void SSL_set_info_callback(SSL *ssl,
  1898. void (*cb)(const SSL *ssl, int type,
  1899. int val));
  1900. OPENSSL_EXPORT void (*SSL_get_info_callback(const SSL *ssl))(const SSL *ssl,
  1901. int type, int val);
  1902. OPENSSL_EXPORT int SSL_state(const SSL *ssl);
  1903. OPENSSL_EXPORT void SSL_set_verify_result(SSL *ssl, long v);
  1904. OPENSSL_EXPORT long SSL_get_verify_result(const SSL *ssl);
  1905. OPENSSL_EXPORT int SSL_set_ex_data(SSL *ssl, int idx, void *data);
  1906. OPENSSL_EXPORT void *SSL_get_ex_data(const SSL *ssl, int idx);
  1907. OPENSSL_EXPORT int SSL_get_ex_new_index(long argl, void *argp,
  1908. CRYPTO_EX_new *new_func,
  1909. CRYPTO_EX_dup *dup_func,
  1910. CRYPTO_EX_free *free_func);
  1911. OPENSSL_EXPORT int SSL_SESSION_set_ex_data(SSL_SESSION *ss, int idx,
  1912. void *data);
  1913. OPENSSL_EXPORT void *SSL_SESSION_get_ex_data(const SSL_SESSION *ss, int idx);
  1914. OPENSSL_EXPORT int SSL_SESSION_get_ex_new_index(long argl, void *argp,
  1915. CRYPTO_EX_new *new_func,
  1916. CRYPTO_EX_dup *dup_func,
  1917. CRYPTO_EX_free *free_func);
  1918. OPENSSL_EXPORT int SSL_CTX_set_ex_data(SSL_CTX *ssl, int idx, void *data);
  1919. OPENSSL_EXPORT void *SSL_CTX_get_ex_data(const SSL_CTX *ssl, int idx);
  1920. OPENSSL_EXPORT int SSL_CTX_get_ex_new_index(long argl, void *argp,
  1921. CRYPTO_EX_new *new_func,
  1922. CRYPTO_EX_dup *dup_func,
  1923. CRYPTO_EX_free *free_func);
  1924. OPENSSL_EXPORT int SSL_get_ex_data_X509_STORE_CTX_idx(void);
  1925. /* SSL_CTX_sess_set_cache_size sets the maximum size of |ctx|'s session cache to
  1926. * |size|. It returns the previous value. */
  1927. OPENSSL_EXPORT unsigned long SSL_CTX_sess_set_cache_size(SSL_CTX *ctx,
  1928. unsigned long size);
  1929. /* SSL_CTX_sess_get_cache_size returns the maximum size of |ctx|'s session
  1930. * cache. */
  1931. OPENSSL_EXPORT unsigned long SSL_CTX_sess_get_cache_size(const SSL_CTX *ctx);
  1932. /* SSL_SESS_CACHE_* are the possible session cache mode bits.
  1933. * TODO(davidben): Document. */
  1934. #define SSL_SESS_CACHE_OFF 0x0000
  1935. #define SSL_SESS_CACHE_CLIENT 0x0001
  1936. #define SSL_SESS_CACHE_SERVER 0x0002
  1937. #define SSL_SESS_CACHE_BOTH (SSL_SESS_CACHE_CLIENT | SSL_SESS_CACHE_SERVER)
  1938. #define SSL_SESS_CACHE_NO_AUTO_CLEAR 0x0080
  1939. #define SSL_SESS_CACHE_NO_INTERNAL_LOOKUP 0x0100
  1940. #define SSL_SESS_CACHE_NO_INTERNAL_STORE 0x0200
  1941. #define SSL_SESS_CACHE_NO_INTERNAL \
  1942. (SSL_SESS_CACHE_NO_INTERNAL_LOOKUP | SSL_SESS_CACHE_NO_INTERNAL_STORE)
  1943. /* SSL_CTX_set_session_cache_mode sets the session cache mode bits for |ctx| to
  1944. * |mode|. It returns the previous value. */
  1945. OPENSSL_EXPORT int SSL_CTX_set_session_cache_mode(SSL_CTX *ctx, int mode);
  1946. /* SSL_CTX_get_session_cache_mode returns the session cache mode bits for
  1947. * |ctx| */
  1948. OPENSSL_EXPORT int SSL_CTX_get_session_cache_mode(const SSL_CTX *ctx);
  1949. /* SSL_CTX_get_max_cert_list returns the maximum length, in bytes, of a peer
  1950. * certificate chain accepted by |ctx|. */
  1951. OPENSSL_EXPORT size_t SSL_CTX_get_max_cert_list(const SSL_CTX *ctx);
  1952. /* SSL_CTX_set_max_cert_list sets the maximum length, in bytes, of a peer
  1953. * certificate chain to |max_cert_list|. This affects how much memory may be
  1954. * consumed during the handshake. */
  1955. OPENSSL_EXPORT void SSL_CTX_set_max_cert_list(SSL_CTX *ctx,
  1956. size_t max_cert_list);
  1957. /* SSL_get_max_cert_list returns the maximum length, in bytes, of a peer
  1958. * certificate chain accepted by |ssl|. */
  1959. OPENSSL_EXPORT size_t SSL_get_max_cert_list(const SSL *ssl);
  1960. /* SSL_set_max_cert_list sets the maximum length, in bytes, of a peer
  1961. * certificate chain to |max_cert_list|. This affects how much memory may be
  1962. * consumed during the handshake. */
  1963. OPENSSL_EXPORT void SSL_set_max_cert_list(SSL *ssl, size_t max_cert_list);
  1964. /* SSL_CTX_set_max_send_fragment sets the maximum length, in bytes, of records
  1965. * sent by |ctx|. Beyond this length, handshake messages and application data
  1966. * will be split into multiple records. */
  1967. OPENSSL_EXPORT void SSL_CTX_set_max_send_fragment(SSL_CTX *ctx,
  1968. size_t max_send_fragment);
  1969. /* SSL_set_max_send_fragment sets the maximum length, in bytes, of records
  1970. * sent by |ssl|. Beyond this length, handshake messages and application data
  1971. * will be split into multiple records. */
  1972. OPENSSL_EXPORT void SSL_set_max_send_fragment(SSL *ssl,
  1973. size_t max_send_fragment);
  1974. /* SSL_CTX_set_tmp_dh_callback configures |ctx| to use |callback| to determine
  1975. * the group for DHE ciphers. |callback| should ignore |is_export| and
  1976. * |keylength| and return a |DH| of the selected group or NULL on error. Only
  1977. * the parameters are used, so the |DH| needn't have a generated keypair.
  1978. *
  1979. * WARNING: The caller does not take ownership of the resulting |DH|, so
  1980. * |callback| must save and release the object elsewhere. */
  1981. OPENSSL_EXPORT void SSL_CTX_set_tmp_dh_callback(
  1982. SSL_CTX *ctx, DH *(*callback)(SSL *ssl, int is_export, int keylength));
  1983. /* SSL_set_tmp_dh_callback configures |ssl| to use |callback| to determine the
  1984. * group for DHE ciphers. |callback| should ignore |is_export| and |keylength|
  1985. * and return a |DH| of the selected group or NULL on error. Only the
  1986. * parameters are used, so the |DH| needn't have a generated keypair.
  1987. *
  1988. * WARNING: The caller does not take ownership of the resulting |DH|, so
  1989. * |callback| must save and release the object elsewhere. */
  1990. OPENSSL_EXPORT void SSL_set_tmp_dh_callback(SSL *ssl,
  1991. DH *(*dh)(SSL *ssl, int is_export,
  1992. int keylength));
  1993. /* SSL_CTX_set_tmp_ecdh_callback configures |ctx| to use |callback| to determine
  1994. * the curve for ephemeral ECDH keys. |callback| should ignore |is_export| and
  1995. * |keylength| and return an |EC_KEY| of the selected curve or NULL on
  1996. * error. Only the curve is used, so the |EC_KEY| needn't have a generated
  1997. * keypair.
  1998. *
  1999. * If the callback is unset, an appropriate curve will be chosen automatically.
  2000. * (This is recommended.)
  2001. *
  2002. * WARNING: The caller does not take ownership of the resulting |EC_KEY|, so
  2003. * |callback| must save and release the object elsewhere. */
  2004. OPENSSL_EXPORT void SSL_CTX_set_tmp_ecdh_callback(
  2005. SSL_CTX *ctx, EC_KEY *(*callback)(SSL *ssl, int is_export, int keylength));
  2006. /* SSL_set_tmp_ecdh_callback configures |ssl| to use |callback| to determine the
  2007. * curve for ephemeral ECDH keys. |callback| should ignore |is_export| and
  2008. * |keylength| and return an |EC_KEY| of the selected curve or NULL on
  2009. * error. Only the curve is used, so the |EC_KEY| needn't have a generated
  2010. * keypair.
  2011. *
  2012. * If the callback is unset, an appropriate curve will be chosen automatically.
  2013. * (This is recommended.)
  2014. *
  2015. * WARNING: The caller does not take ownership of the resulting |EC_KEY|, so
  2016. * |callback| must save and release the object elsewhere. */
  2017. OPENSSL_EXPORT void SSL_set_tmp_ecdh_callback(
  2018. SSL *ssl, EC_KEY *(*callback)(SSL *ssl, int is_export, int keylength));
  2019. typedef void COMP_METHOD;
  2020. /* SSL_get_current_compression returns NULL. */
  2021. OPENSSL_EXPORT const COMP_METHOD *SSL_get_current_compression(SSL *s);
  2022. /* SSL_get_current_expansion returns NULL. */
  2023. OPENSSL_EXPORT const COMP_METHOD *SSL_get_current_expansion(SSL *s);
  2024. OPENSSL_EXPORT int SSL_cache_hit(SSL *s);
  2025. OPENSSL_EXPORT int SSL_is_server(SSL *s);
  2026. /* SSL_CTX_set_dos_protection_cb sets a callback that is called once the
  2027. * resumption decision for a ClientHello has been made. It can return 1 to
  2028. * allow the handshake to continue or zero to cause the handshake to abort. */
  2029. OPENSSL_EXPORT void SSL_CTX_set_dos_protection_cb(
  2030. SSL_CTX *ctx, int (*cb)(const struct ssl_early_callback_ctx *));
  2031. /* SSL_get_structure_sizes returns the sizes of the SSL, SSL_CTX and
  2032. * SSL_SESSION structures so that a test can ensure that outside code agrees on
  2033. * these values. */
  2034. OPENSSL_EXPORT void SSL_get_structure_sizes(size_t *ssl_size,
  2035. size_t *ssl_ctx_size,
  2036. size_t *ssl_session_size);
  2037. OPENSSL_EXPORT void ERR_load_SSL_strings(void);
  2038. /* SSL_get_rc4_state sets |*read_key| and |*write_key| to the RC4 states for
  2039. * the read and write directions. It returns one on success or zero if |ssl|
  2040. * isn't using an RC4-based cipher suite. */
  2041. OPENSSL_EXPORT int SSL_get_rc4_state(const SSL *ssl, const RC4_KEY **read_key,
  2042. const RC4_KEY **write_key);
  2043. /* Deprecated functions. */
  2044. /* SSL_CIPHER_description writes a description of |cipher| into |buf| and
  2045. * returns |buf|. If |buf| is NULL, it returns a newly allocated string, to be
  2046. * freed with |OPENSSL_free|, or NULL on error.
  2047. *
  2048. * The description includes a trailing newline and has the form:
  2049. * AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1
  2050. *
  2051. * Consider |SSL_CIPHER_get_name| or |SSL_CIPHER_get_rfc_name| instead. */
  2052. OPENSSL_EXPORT const char *SSL_CIPHER_description(const SSL_CIPHER *cipher,
  2053. char *buf, int len);
  2054. /* SSL_CIPHER_get_version returns the string "TLSv1/SSLv3". */
  2055. OPENSSL_EXPORT const char *SSL_CIPHER_get_version(const SSL_CIPHER *cipher);
  2056. /* SSL_COMP_get_compression_methods returns NULL. */
  2057. OPENSSL_EXPORT COMP_METHOD *SSL_COMP_get_compression_methods(void);
  2058. /* SSL_COMP_add_compression_method returns one. */
  2059. OPENSSL_EXPORT int SSL_COMP_add_compression_method(int id, COMP_METHOD *cm);
  2060. /* SSL_COMP_get_name returns NULL. */
  2061. OPENSSL_EXPORT const char *SSL_COMP_get_name(const COMP_METHOD *comp);
  2062. /* SSLv23_method calls |TLS_method|. */
  2063. OPENSSL_EXPORT const SSL_METHOD *SSLv23_method(void);
  2064. /* Version-specific methods behave exactly like |TLS_method| and |DTLS_method|
  2065. * except they also call |SSL_CTX_set_min_version| and |SSL_CTX_set_max_version|
  2066. * to lock connections to that protocol version. */
  2067. OPENSSL_EXPORT const SSL_METHOD *SSLv3_method(void);
  2068. OPENSSL_EXPORT const SSL_METHOD *TLSv1_method(void);
  2069. OPENSSL_EXPORT const SSL_METHOD *TLSv1_1_method(void);
  2070. OPENSSL_EXPORT const SSL_METHOD *TLSv1_2_method(void);
  2071. OPENSSL_EXPORT const SSL_METHOD *DTLSv1_method(void);
  2072. OPENSSL_EXPORT const SSL_METHOD *DTLSv1_2_method(void);
  2073. /* Client- and server-specific methods call their corresponding generic
  2074. * methods. */
  2075. OPENSSL_EXPORT const SSL_METHOD *SSLv23_server_method(void);
  2076. OPENSSL_EXPORT const SSL_METHOD *SSLv23_client_method(void);
  2077. OPENSSL_EXPORT const SSL_METHOD *SSLv3_server_method(void);
  2078. OPENSSL_EXPORT const SSL_METHOD *SSLv3_client_method(void);
  2079. OPENSSL_EXPORT const SSL_METHOD *TLSv1_server_method(void);
  2080. OPENSSL_EXPORT const SSL_METHOD *TLSv1_client_method(void);
  2081. OPENSSL_EXPORT const SSL_METHOD *TLSv1_1_server_method(void);
  2082. OPENSSL_EXPORT const SSL_METHOD *TLSv1_1_client_method(void);
  2083. OPENSSL_EXPORT const SSL_METHOD *TLSv1_2_server_method(void);
  2084. OPENSSL_EXPORT const SSL_METHOD *TLSv1_2_client_method(void);
  2085. OPENSSL_EXPORT const SSL_METHOD *DTLS_server_method(void);
  2086. OPENSSL_EXPORT const SSL_METHOD *DTLS_client_method(void);
  2087. OPENSSL_EXPORT const SSL_METHOD *DTLSv1_server_method(void);
  2088. OPENSSL_EXPORT const SSL_METHOD *DTLSv1_client_method(void);
  2089. OPENSSL_EXPORT const SSL_METHOD *DTLSv1_2_server_method(void);
  2090. OPENSSL_EXPORT const SSL_METHOD *DTLSv1_2_client_method(void);
  2091. /* SSL_clear resets |ssl| to allow another connection and returns one on success
  2092. * or zero on failure. It returns most configuration state but releases memory
  2093. * associated with the current connection.
  2094. *
  2095. * Free |ssl| and create a new one instead. */
  2096. OPENSSL_EXPORT int SSL_clear(SSL *ssl);
  2097. /* SSL_CTX_set_tmp_rsa_callback does nothing. */
  2098. OPENSSL_EXPORT void SSL_CTX_set_tmp_rsa_callback(
  2099. SSL_CTX *ctx, RSA *(*cb)(SSL *ssl, int is_export, int keylength));
  2100. /* SSL_set_tmp_rsa_callback does nothing. */
  2101. OPENSSL_EXPORT void SSL_set_tmp_rsa_callback(SSL *ssl,
  2102. RSA *(*cb)(SSL *ssl, int is_export,
  2103. int keylength));
  2104. /* SSL_CTX_sess_connect returns zero. */
  2105. OPENSSL_EXPORT int SSL_CTX_sess_connect(const SSL_CTX *ctx);
  2106. /* SSL_CTX_sess_connect_good returns zero. */
  2107. OPENSSL_EXPORT int SSL_CTX_sess_connect_good(const SSL_CTX *ctx);
  2108. /* SSL_CTX_sess_connect_renegotiate returns zero. */
  2109. OPENSSL_EXPORT int SSL_CTX_sess_connect_renegotiate(const SSL_CTX *ctx);
  2110. /* SSL_CTX_sess_accept returns zero. */
  2111. OPENSSL_EXPORT int SSL_CTX_sess_accept(const SSL_CTX *ctx);
  2112. /* SSL_CTX_sess_accept_renegotiate returns zero. */
  2113. OPENSSL_EXPORT int SSL_CTX_sess_accept_renegotiate(const SSL_CTX *ctx);
  2114. /* SSL_CTX_sess_accept_good returns zero. */
  2115. OPENSSL_EXPORT int SSL_CTX_sess_accept_good(const SSL_CTX *ctx);
  2116. /* SSL_CTX_sess_hits returns zero. */
  2117. OPENSSL_EXPORT int SSL_CTX_sess_hits(const SSL_CTX *ctx);
  2118. /* SSL_CTX_sess_cb_hits returns zero. */
  2119. OPENSSL_EXPORT int SSL_CTX_sess_cb_hits(const SSL_CTX *ctx);
  2120. /* SSL_CTX_sess_misses returns zero. */
  2121. OPENSSL_EXPORT int SSL_CTX_sess_misses(const SSL_CTX *ctx);
  2122. /* SSL_CTX_sess_timeouts returns zero. */
  2123. OPENSSL_EXPORT int SSL_CTX_sess_timeouts(const SSL_CTX *ctx);
  2124. /* SSL_CTX_sess_cache_full returns zero. */
  2125. OPENSSL_EXPORT int SSL_CTX_sess_cache_full(const SSL_CTX *ctx);
  2126. /* SSL_cutthrough_complete calls |SSL_in_false_start|. */
  2127. OPENSSL_EXPORT int SSL_cutthrough_complete(const SSL *s);
  2128. /* SSL_num_renegotiations calls |SSL_total_renegotiations|. */
  2129. OPENSSL_EXPORT int SSL_num_renegotiations(const SSL *ssl);
  2130. /* SSL_CTX_need_tmp_RSA returns zero. */
  2131. OPENSSL_EXPORT int SSL_CTX_need_tmp_RSA(const SSL_CTX *ctx);
  2132. /* SSL_need_tmp_RSA returns zero. */
  2133. OPENSSL_EXPORT int SSL_need_tmp_RSA(const SSL *ssl);
  2134. /* SSL_CTX_set_tmp_rsa returns one. */
  2135. OPENSSL_EXPORT int SSL_CTX_set_tmp_rsa(SSL_CTX *ctx, const RSA *rsa);
  2136. /* SSL_set_tmp_rsa returns one. */
  2137. OPENSSL_EXPORT int SSL_set_tmp_rsa(SSL *ssl, const RSA *rsa);
  2138. /* SSL_CTX_get_read_ahead returns zero. */
  2139. OPENSSL_EXPORT int SSL_CTX_get_read_ahead(const SSL_CTX *ctx);
  2140. /* SSL_CTX_set_read_ahead does nothing. */
  2141. OPENSSL_EXPORT void SSL_CTX_set_read_ahead(SSL_CTX *ctx, int yes);
  2142. /* SSL_get_read_ahead returns zero. */
  2143. OPENSSL_EXPORT int SSL_get_read_ahead(const SSL *s);
  2144. /* SSL_set_read_ahead does nothing. */
  2145. OPENSSL_EXPORT void SSL_set_read_ahead(SSL *s, int yes);
  2146. /* SSL_renegotiate put an error on the error queue and returns zero. */
  2147. OPENSSL_EXPORT int SSL_renegotiate(SSL *ssl);
  2148. /* SSL_set_state does nothing. */
  2149. OPENSSL_EXPORT void SSL_set_state(SSL *ssl, int state);
  2150. /* Android compatibility section.
  2151. *
  2152. * These functions are declared, temporarily, for Android because
  2153. * wpa_supplicant will take a little time to sync with upstream. Outside of
  2154. * Android they'll have no definition. */
  2155. #define SSL_F_SSL_SET_SESSION_TICKET_EXT doesnt_exist
  2156. OPENSSL_EXPORT int SSL_set_session_ticket_ext(SSL *s, void *ext_data,
  2157. int ext_len);
  2158. OPENSSL_EXPORT int SSL_set_session_secret_cb(SSL *s, void *cb, void *arg);
  2159. OPENSSL_EXPORT int SSL_set_session_ticket_ext_cb(SSL *s, void *cb, void *arg);
  2160. OPENSSL_EXPORT int SSL_set_ssl_method(SSL *s, const SSL_METHOD *method);
  2161. #define OPENSSL_VERSION_TEXT "BoringSSL"
  2162. #define SSLEAY_VERSION 0
  2163. /* SSLeay_version is a compatibility function that returns the string
  2164. * "BoringSSL". */
  2165. OPENSSL_EXPORT const char *SSLeay_version(int unused);
  2166. /* Preprocessor compatibility section.
  2167. *
  2168. * Historically, a number of APIs were implemented in OpenSSL as macros and
  2169. * constants to 'ctrl' functions. To avoid breaking #ifdefs in consumers, this
  2170. * section defines a number of legacy macros.
  2171. *
  2172. * Although using either the CTRL values or their wrapper macros in #ifdefs is
  2173. * still supported, the CTRL values may not be passed to |SSL_ctrl| and
  2174. * |SSL_CTX_ctrl|. Call the functions (previously wrapper macros) instead. */
  2175. #define DTLS_CTRL_GET_TIMEOUT doesnt_exist
  2176. #define DTLS_CTRL_HANDLE_TIMEOUT doesnt_exist
  2177. #define SSL_CTRL_CHAIN doesnt_exist
  2178. #define SSL_CTRL_CHAIN_CERT doesnt_exist
  2179. #define SSL_CTRL_CHANNEL_ID doesnt_exist
  2180. #define SSL_CTRL_CLEAR_EXTRA_CHAIN_CERTS doesnt_exist
  2181. #define SSL_CTRL_CLEAR_MODE doesnt_exist
  2182. #define SSL_CTRL_CLEAR_OPTIONS doesnt_exist
  2183. #define SSL_CTRL_EXTRA_CHAIN_CERT doesnt_exist
  2184. #define SSL_CTRL_GET_CHAIN_CERTS doesnt_exist
  2185. #define SSL_CTRL_GET_CHANNEL_ID doesnt_exist
  2186. #define SSL_CTRL_GET_EXTRA_CHAIN_CERTS doesnt_exist
  2187. #define SSL_CTRL_GET_MAX_CERT_LIST doesnt_exist
  2188. #define SSL_CTRL_GET_NUM_RENEGOTIATIONS doesnt_exist
  2189. #define SSL_CTRL_GET_READ_AHEAD doesnt_exist
  2190. #define SSL_CTRL_GET_RI_SUPPORT doesnt_exist
  2191. #define SSL_CTRL_GET_SESSION_REUSED doesnt_exist
  2192. #define SSL_CTRL_GET_SESS_CACHE_MODE doesnt_exist
  2193. #define SSL_CTRL_GET_SESS_CACHE_SIZE doesnt_exist
  2194. #define SSL_CTRL_GET_TLSEXT_TICKET_KEYS doesnt_exist
  2195. #define SSL_CTRL_GET_TOTAL_RENEGOTIATIONS doesnt_exist
  2196. #define SSL_CTRL_MODE doesnt_exist
  2197. #define SSL_CTRL_NEED_TMP_RSA doesnt_exist
  2198. #define SSL_CTRL_OPTIONS doesnt_exist
  2199. #define SSL_CTRL_SESS_NUMBER doesnt_exist
  2200. #define SSL_CTRL_SET_CHANNEL_ID doesnt_exist
  2201. #define SSL_CTRL_SET_MAX_CERT_LIST doesnt_exist
  2202. #define SSL_CTRL_SET_MAX_SEND_FRAGMENT doesnt_exist
  2203. #define SSL_CTRL_SET_MSG_CALLBACK doesnt_exist
  2204. #define SSL_CTRL_SET_MSG_CALLBACK_ARG doesnt_exist
  2205. #define SSL_CTRL_SET_MTU doesnt_exist
  2206. #define SSL_CTRL_SET_READ_AHEAD doesnt_exist
  2207. #define SSL_CTRL_SET_SESS_CACHE_MODE doesnt_exist
  2208. #define SSL_CTRL_SET_SESS_CACHE_SIZE doesnt_exist
  2209. #define SSL_CTRL_SET_TLSEXT_HOSTNAME doesnt_exist
  2210. #define SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG doesnt_exist
  2211. #define SSL_CTRL_SET_TLSEXT_SERVERNAME_CB doesnt_exist
  2212. #define SSL_CTRL_SET_TLSEXT_TICKET_KEYS doesnt_exist
  2213. #define SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB doesnt_exist
  2214. #define SSL_CTRL_SET_TMP_DH doesnt_exist
  2215. #define SSL_CTRL_SET_TMP_DH_CB doesnt_exist
  2216. #define SSL_CTRL_SET_TMP_ECDH doesnt_exist
  2217. #define SSL_CTRL_SET_TMP_ECDH_CB doesnt_exist
  2218. #define SSL_CTRL_SET_TMP_RSA doesnt_exist
  2219. #define SSL_CTRL_SET_TMP_RSA_CB doesnt_exist
  2220. #define DTLSv1_get_timeout DTLSv1_get_timeout
  2221. #define DTLSv1_handle_timeout DTLSv1_handle_timeout
  2222. #define SSL_CTX_add0_chain_cert SSL_CTX_add0_chain_cert
  2223. #define SSL_CTX_add1_chain_cert SSL_CTX_add1_chain_cert
  2224. #define SSL_CTX_add_extra_chain_cert SSL_CTX_add_extra_chain_cert
  2225. #define SSL_CTX_clear_extra_chain_certs SSL_CTX_clear_extra_chain_certs
  2226. #define SSL_CTX_clear_chain_certs SSL_CTX_clear_chain_certs
  2227. #define SSL_CTX_clear_mode SSL_CTX_clear_mode
  2228. #define SSL_CTX_clear_options SSL_CTX_clear_options
  2229. #define SSL_CTX_enable_tls_channel_id SSL_CTX_enable_tls_channel_id
  2230. #define SSL_CTX_get0_chain_certs SSL_CTX_get0_chain_certs
  2231. #define SSL_CTX_get_extra_chain_certs SSL_CTX_get_extra_chain_certs
  2232. #define SSL_CTX_get_max_cert_list SSL_CTX_get_max_cert_list
  2233. #define SSL_CTX_get_mode SSL_CTX_get_mode
  2234. #define SSL_CTX_get_options SSL_CTX_get_options
  2235. #define SSL_CTX_get_read_ahead SSL_CTX_get_read_ahead
  2236. #define SSL_CTX_get_session_cache_mode SSL_CTX_get_session_cache_mode
  2237. #define SSL_CTX_get_tlsext_ticket_keys SSL_CTX_get_tlsext_ticket_keys
  2238. #define SSL_CTX_need_tmp_RSA SSL_CTX_need_tmp_RSA
  2239. #define SSL_CTX_sess_get_cache_size SSL_CTX_sess_get_cache_size
  2240. #define SSL_CTX_sess_number SSL_CTX_sess_number
  2241. #define SSL_CTX_sess_set_cache_size SSL_CTX_sess_set_cache_size
  2242. #define SSL_CTX_set0_chain SSL_CTX_set0_chain
  2243. #define SSL_CTX_set1_chain SSL_CTX_set1_chain
  2244. #define SSL_CTX_set1_tls_channel_id SSL_CTX_set1_tls_channel_id
  2245. #define SSL_CTX_set_max_cert_list SSL_CTX_set_max_cert_list
  2246. #define SSL_CTX_set_max_send_fragment SSL_CTX_set_max_send_fragment
  2247. #define SSL_CTX_set_mode SSL_CTX_set_mode
  2248. #define SSL_CTX_set_msg_callback_arg SSL_CTX_set_msg_callback_arg
  2249. #define SSL_CTX_set_options SSL_CTX_set_options
  2250. #define SSL_CTX_set_read_ahead SSL_CTX_set_read_ahead
  2251. #define SSL_CTX_set_session_cache_mode SSL_CTX_set_session_cache_mode
  2252. #define SSL_CTX_set_tlsext_servername_arg SSL_CTX_set_tlsext_servername_arg
  2253. #define SSL_CTX_set_tlsext_servername_callback \
  2254. SSL_CTX_set_tlsext_servername_callback
  2255. #define SSL_CTX_set_tlsext_ticket_key_cb SSL_CTX_set_tlsext_ticket_key_cb
  2256. #define SSL_CTX_set_tlsext_ticket_keys SSL_CTX_set_tlsext_ticket_keys
  2257. #define SSL_CTX_set_tmp_dh SSL_CTX_set_tmp_dh
  2258. #define SSL_CTX_set_tmp_ecdh SSL_CTX_set_tmp_ecdh
  2259. #define SSL_CTX_set_tmp_rsa SSL_CTX_set_tmp_rsa
  2260. #define SSL_add0_chain_cert SSL_add0_chain_cert
  2261. #define SSL_add1_chain_cert SSL_add1_chain_cert
  2262. #define SSL_clear_chain_certs SSL_clear_chain_certs
  2263. #define SSL_clear_mode SSL_clear_mode
  2264. #define SSL_clear_options SSL_clear_options
  2265. #define SSL_enable_tls_channel_id SSL_enable_tls_channel_id
  2266. #define SSL_get0_chain_certs SSL_get0_chain_certs
  2267. #define SSL_get_max_cert_list SSL_get_max_cert_list
  2268. #define SSL_get_mode SSL_get_mode
  2269. #define SSL_get_options SSL_get_options
  2270. #define SSL_get_secure_renegotiation_support \
  2271. SSL_get_secure_renegotiation_support
  2272. #define SSL_get_tls_channel_id SSL_get_tls_channel_id
  2273. #define SSL_need_tmp_RSA SSL_need_tmp_RSA
  2274. #define SSL_num_renegotiations SSL_num_renegotiations
  2275. #define SSL_session_reused SSL_session_reused
  2276. #define SSL_set0_chain SSL_set0_chain
  2277. #define SSL_set1_chain SSL_set1_chain
  2278. #define SSL_set1_tls_channel_id SSL_set1_tls_channel_id
  2279. #define SSL_set_max_cert_list SSL_set_max_cert_list
  2280. #define SSL_set_max_send_fragment SSL_set_max_send_fragment
  2281. #define SSL_set_mode SSL_set_mode
  2282. #define SSL_set_msg_callback_arg SSL_set_msg_callback_arg
  2283. #define SSL_set_mtu SSL_set_mtu
  2284. #define SSL_set_options SSL_set_options
  2285. #define SSL_set_tlsext_host_name SSL_set_tlsext_host_name
  2286. #define SSL_set_tmp_dh SSL_set_tmp_dh
  2287. #define SSL_set_tmp_ecdh SSL_set_tmp_ecdh
  2288. #define SSL_set_tmp_rsa SSL_set_tmp_rsa
  2289. #define SSL_total_renegotiations SSL_total_renegotiations
  2290. #if defined(__cplusplus)
  2291. } /* extern C */
  2292. #endif
  2293. /* Library consumers assume these headers are included by ssl.h, but they depend
  2294. * on ssl.h, so include them after all declarations.
  2295. *
  2296. * TODO(davidben): The separation between ssl.h and these version-specific
  2297. * headers introduces circular dependencies and is inconsistent. The function
  2298. * declarations should move to ssl.h. Many of the constants can probably be
  2299. * pruned or unexported. */
  2300. #include <openssl/ssl3.h>
  2301. #include <openssl/tls1.h> /* This is mostly sslv3 with a few tweaks */
  2302. #include <openssl/srtp.h> /* Support for the use_srtp extension */
  2303. /* BEGIN ERROR CODES */
  2304. /* The following lines are auto generated by the script make_errors.go. Any
  2305. * changes made after this point may be overwritten when the script is next run.
  2306. */
  2307. #define SSL_R_APP_DATA_IN_HANDSHAKE 100
  2308. #define SSL_R_ATTEMPT_TO_REUSE_SESSION_IN_DIFFERENT_CONTEXT 101
  2309. #define SSL_R_BAD_ALERT 102
  2310. #define SSL_R_BAD_CHANGE_CIPHER_SPEC 103
  2311. #define SSL_R_BAD_DATA_RETURNED_BY_CALLBACK 104
  2312. #define SSL_R_BAD_DH_P_LENGTH 105
  2313. #define SSL_R_BAD_DIGEST_LENGTH 106
  2314. #define SSL_R_BAD_ECC_CERT 107
  2315. #define SSL_R_BAD_ECPOINT 108
  2316. #define SSL_R_BAD_HANDSHAKE_LENGTH 109
  2317. #define SSL_R_BAD_HANDSHAKE_RECORD 110
  2318. #define SSL_R_BAD_HELLO_REQUEST 111
  2319. #define SSL_R_BAD_LENGTH 112
  2320. #define SSL_R_BAD_PACKET_LENGTH 113
  2321. #define SSL_R_BAD_RSA_ENCRYPT 114
  2322. #define SSL_R_BAD_SIGNATURE 115
  2323. #define SSL_R_BAD_SRTP_MKI_VALUE 116
  2324. #define SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST 117
  2325. #define SSL_R_BAD_SSL_FILETYPE 118
  2326. #define SSL_R_BAD_WRITE_RETRY 119
  2327. #define SSL_R_BIO_NOT_SET 120
  2328. #define SSL_R_BN_LIB 121
  2329. #define SSL_R_CANNOT_SERIALIZE_PUBLIC_KEY 122
  2330. #define SSL_R_CA_DN_LENGTH_MISMATCH 123
  2331. #define SSL_R_CA_DN_TOO_LONG 124
  2332. #define SSL_R_CCS_RECEIVED_EARLY 125
  2333. #define SSL_R_CERTIFICATE_VERIFY_FAILED 126
  2334. #define SSL_R_CERT_CB_ERROR 127
  2335. #define SSL_R_CERT_LENGTH_MISMATCH 128
  2336. #define SSL_R_CHANNEL_ID_NOT_P256 129
  2337. #define SSL_R_CHANNEL_ID_SIGNATURE_INVALID 130
  2338. #define SSL_R_CIPHER_CODE_WRONG_LENGTH 131
  2339. #define SSL_R_CIPHER_OR_HASH_UNAVAILABLE 132
  2340. #define SSL_R_CLIENTHELLO_PARSE_FAILED 133
  2341. #define SSL_R_CLIENTHELLO_TLSEXT 134
  2342. #define SSL_R_CONNECTION_REJECTED 135
  2343. #define SSL_R_CONNECTION_TYPE_NOT_SET 136
  2344. #define SSL_R_COOKIE_MISMATCH 137
  2345. #define SSL_R_D2I_ECDSA_SIG 138
  2346. #define SSL_R_DATA_BETWEEN_CCS_AND_FINISHED 139
  2347. #define SSL_R_DATA_LENGTH_TOO_LONG 140
  2348. #define SSL_R_DECODE_ERROR 141
  2349. #define SSL_R_DECRYPTION_FAILED 142
  2350. #define SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC 143
  2351. #define SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG 144
  2352. #define SSL_R_DIGEST_CHECK_FAILED 145
  2353. #define SSL_R_DTLS_MESSAGE_TOO_BIG 146
  2354. #define SSL_R_ECC_CERT_NOT_FOR_SIGNING 147
  2355. #define SSL_R_EMPTY_SRTP_PROTECTION_PROFILE_LIST 148
  2356. #define SSL_R_ENCRYPTED_LENGTH_TOO_LONG 149
  2357. #define SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST 150
  2358. #define SSL_R_EVP_DIGESTSIGNFINAL_FAILED 151
  2359. #define SSL_R_EVP_DIGESTSIGNINIT_FAILED 152
  2360. #define SSL_R_EXCESSIVE_MESSAGE_SIZE 153
  2361. #define SSL_R_EXTRA_DATA_IN_MESSAGE 154
  2362. #define SSL_R_GOT_A_FIN_BEFORE_A_CCS 155
  2363. #define SSL_R_GOT_CHANNEL_ID_BEFORE_A_CCS 156
  2364. #define SSL_R_GOT_NEXT_PROTO_BEFORE_A_CCS 157
  2365. #define SSL_R_GOT_NEXT_PROTO_WITHOUT_EXTENSION 158
  2366. #define SSL_R_HANDSHAKE_FAILURE_ON_CLIENT_HELLO 159
  2367. #define SSL_R_HANDSHAKE_RECORD_BEFORE_CCS 160
  2368. #define SSL_R_HTTPS_PROXY_REQUEST 161
  2369. #define SSL_R_HTTP_REQUEST 162
  2370. #define SSL_R_INAPPROPRIATE_FALLBACK 163
  2371. #define SSL_R_INVALID_COMMAND 164
  2372. #define SSL_R_INVALID_MESSAGE 165
  2373. #define SSL_R_INVALID_SSL_SESSION 166
  2374. #define SSL_R_INVALID_TICKET_KEYS_LENGTH 167
  2375. #define SSL_R_LENGTH_MISMATCH 168
  2376. #define SSL_R_LIBRARY_HAS_NO_CIPHERS 169
  2377. #define SSL_R_MISSING_DH_KEY 170
  2378. #define SSL_R_MISSING_ECDSA_SIGNING_CERT 171
  2379. #define SSL_R_MISSING_RSA_CERTIFICATE 172
  2380. #define SSL_R_MISSING_RSA_ENCRYPTING_CERT 173
  2381. #define SSL_R_MISSING_RSA_SIGNING_CERT 174
  2382. #define SSL_R_MISSING_TMP_DH_KEY 175
  2383. #define SSL_R_MISSING_TMP_ECDH_KEY 176
  2384. #define SSL_R_MIXED_SPECIAL_OPERATOR_WITH_GROUPS 177
  2385. #define SSL_R_MTU_TOO_SMALL 178
  2386. #define SSL_R_NESTED_GROUP 179
  2387. #define SSL_R_NO_CERTIFICATES_RETURNED 180
  2388. #define SSL_R_NO_CERTIFICATE_ASSIGNED 181
  2389. #define SSL_R_NO_CERTIFICATE_SET 182
  2390. #define SSL_R_NO_CIPHERS_AVAILABLE 183
  2391. #define SSL_R_NO_CIPHERS_PASSED 184
  2392. #define SSL_R_NO_CIPHERS_SPECIFIED 185
  2393. #define SSL_R_NO_CIPHER_MATCH 186
  2394. #define SSL_R_NO_COMPRESSION_SPECIFIED 187
  2395. #define SSL_R_NO_METHOD_SPECIFIED 188
  2396. #define SSL_R_NO_P256_SUPPORT 189
  2397. #define SSL_R_NO_PRIVATE_KEY_ASSIGNED 190
  2398. #define SSL_R_NO_RENEGOTIATION 191
  2399. #define SSL_R_NO_REQUIRED_DIGEST 192
  2400. #define SSL_R_NO_SHARED_CIPHER 193
  2401. #define SSL_R_NO_SHARED_SIGATURE_ALGORITHMS 194
  2402. #define SSL_R_NO_SRTP_PROFILES 195
  2403. #define SSL_R_NULL_SSL_CTX 196
  2404. #define SSL_R_NULL_SSL_METHOD_PASSED 197
  2405. #define SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED 198
  2406. #define SSL_R_PACKET_LENGTH_TOO_LONG 199
  2407. #define SSL_R_PARSE_TLSEXT 200
  2408. #define SSL_R_PATH_TOO_LONG 201
  2409. #define SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE 202
  2410. #define SSL_R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE 203
  2411. #define SSL_R_PROTOCOL_IS_SHUTDOWN 204
  2412. #define SSL_R_PSK_IDENTITY_NOT_FOUND 205
  2413. #define SSL_R_PSK_NO_CLIENT_CB 206
  2414. #define SSL_R_PSK_NO_SERVER_CB 207
  2415. #define SSL_R_READ_BIO_NOT_SET 208
  2416. #define SSL_R_READ_TIMEOUT_EXPIRED 209
  2417. #define SSL_R_RECORD_LENGTH_MISMATCH 210
  2418. #define SSL_R_RECORD_TOO_LARGE 211
  2419. #define SSL_R_RENEGOTIATE_EXT_TOO_LONG 212
  2420. #define SSL_R_RENEGOTIATION_ENCODING_ERR 213
  2421. #define SSL_R_RENEGOTIATION_MISMATCH 214
  2422. #define SSL_R_REQUIRED_CIPHER_MISSING 215
  2423. #define SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING 216
  2424. #define SSL_R_SERVERHELLO_TLSEXT 217
  2425. #define SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED 218
  2426. #define SSL_R_SESSION_MAY_NOT_BE_CREATED 219
  2427. #define SSL_R_SIGNATURE_ALGORITHMS_ERROR 220
  2428. #define SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES 221
  2429. #define SSL_R_SRTP_PROTECTION_PROFILE_LIST_TOO_LONG 222
  2430. #define SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE 223
  2431. #define SSL_R_SSL3_EXT_INVALID_SERVERNAME 224
  2432. #define SSL_R_SSL3_EXT_INVALID_SERVERNAME_TYPE 225
  2433. #define SSL_R_SSL_CTX_HAS_NO_DEFAULT_SSL_VERSION 226
  2434. #define SSL_R_SSL_HANDSHAKE_FAILURE 227
  2435. #define SSL_R_SSL_SESSION_ID_CALLBACK_FAILED 228
  2436. #define SSL_R_SSL_SESSION_ID_CONFLICT 229
  2437. #define SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG 230
  2438. #define SSL_R_SSL_SESSION_ID_HAS_BAD_LENGTH 231
  2439. #define SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER 232
  2440. #define SSL_R_TLS_ILLEGAL_EXPORTER_LABEL 233
  2441. #define SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST 234
  2442. #define SSL_R_TLS_PEER_DID_NOT_RESPOND_WITH_CERTIFICATE_LIST 235
  2443. #define SSL_R_TLS_RSA_ENCRYPTED_VALUE_LENGTH_IS_WRONG 236
  2444. #define SSL_R_TOO_MANY_EMPTY_FRAGMENTS 237
  2445. #define SSL_R_UNABLE_TO_FIND_ECDH_PARAMETERS 238
  2446. #define SSL_R_UNABLE_TO_FIND_PUBLIC_KEY_PARAMETERS 239
  2447. #define SSL_R_UNEXPECTED_GROUP_CLOSE 240
  2448. #define SSL_R_UNEXPECTED_MESSAGE 241
  2449. #define SSL_R_UNEXPECTED_OPERATOR_IN_GROUP 242
  2450. #define SSL_R_UNEXPECTED_RECORD 243
  2451. #define SSL_R_UNINITIALIZED 244
  2452. #define SSL_R_UNKNOWN_ALERT_TYPE 245
  2453. #define SSL_R_UNKNOWN_CERTIFICATE_TYPE 246
  2454. #define SSL_R_UNKNOWN_CIPHER_RETURNED 247
  2455. #define SSL_R_UNKNOWN_CIPHER_TYPE 248
  2456. #define SSL_R_UNKNOWN_DIGEST 249
  2457. #define SSL_R_UNKNOWN_KEY_EXCHANGE_TYPE 250
  2458. #define SSL_R_UNKNOWN_PROTOCOL 251
  2459. #define SSL_R_UNKNOWN_SSL_VERSION 252
  2460. #define SSL_R_UNKNOWN_STATE 253
  2461. #define SSL_R_UNPROCESSED_HANDSHAKE_DATA 254
  2462. #define SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED 255
  2463. #define SSL_R_UNSUPPORTED_CIPHER 256
  2464. #define SSL_R_UNSUPPORTED_COMPRESSION_ALGORITHM 257
  2465. #define SSL_R_UNSUPPORTED_ELLIPTIC_CURVE 258
  2466. #define SSL_R_UNSUPPORTED_PROTOCOL 259
  2467. #define SSL_R_UNSUPPORTED_SSL_VERSION 260
  2468. #define SSL_R_USE_SRTP_NOT_NEGOTIATED 261
  2469. #define SSL_R_WRONG_CERTIFICATE_TYPE 262
  2470. #define SSL_R_WRONG_CIPHER_RETURNED 263
  2471. #define SSL_R_WRONG_CURVE 264
  2472. #define SSL_R_WRONG_MESSAGE_TYPE 265
  2473. #define SSL_R_WRONG_SIGNATURE_TYPE 266
  2474. #define SSL_R_WRONG_SSL_VERSION 267
  2475. #define SSL_R_WRONG_VERSION_NUMBER 268
  2476. #define SSL_R_X509_LIB 269
  2477. #define SSL_R_X509_VERIFICATION_SETUP_PROBLEMS 270
  2478. #define SSL_R_FRAGMENT_MISMATCH 271
  2479. #define SSL_R_BUFFER_TOO_SMALL 272
  2480. #define SSL_R_OLD_SESSION_VERSION_NOT_RETURNED 273
  2481. #define SSL_R_OUTPUT_ALIASES_INPUT 274
  2482. #define SSL_R_RESUMED_EMS_SESSION_WITHOUT_EMS_EXTENSION 275
  2483. #define SSL_R_EMS_STATE_INCONSISTENT 276
  2484. #define SSL_R_RESUMED_NON_EMS_SESSION_WITH_EMS_EXTENSION 277
  2485. #define SSL_R_TOO_MANY_WARNING_ALERTS 278
  2486. #define SSL_R_UNEXPECTED_EXTENSION 279
  2487. #define SSL_R_SIGNATURE_ALGORITHMS_EXTENSION_SENT_BY_SERVER 280
  2488. #define SSL_R_SSLV3_ALERT_CLOSE_NOTIFY 1000
  2489. #define SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE 1010
  2490. #define SSL_R_SSLV3_ALERT_BAD_RECORD_MAC 1020
  2491. #define SSL_R_TLSV1_ALERT_DECRYPTION_FAILED 1021
  2492. #define SSL_R_TLSV1_ALERT_RECORD_OVERFLOW 1022
  2493. #define SSL_R_SSLV3_ALERT_DECOMPRESSION_FAILURE 1030
  2494. #define SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE 1040
  2495. #define SSL_R_SSLV3_ALERT_NO_CERTIFICATE 1041
  2496. #define SSL_R_SSLV3_ALERT_BAD_CERTIFICATE 1042
  2497. #define SSL_R_SSLV3_ALERT_UNSUPPORTED_CERTIFICATE 1043
  2498. #define SSL_R_SSLV3_ALERT_CERTIFICATE_REVOKED 1044
  2499. #define SSL_R_SSLV3_ALERT_CERTIFICATE_EXPIRED 1045
  2500. #define SSL_R_SSLV3_ALERT_CERTIFICATE_UNKNOWN 1046
  2501. #define SSL_R_SSLV3_ALERT_ILLEGAL_PARAMETER 1047
  2502. #define SSL_R_TLSV1_ALERT_UNKNOWN_CA 1048
  2503. #define SSL_R_TLSV1_ALERT_ACCESS_DENIED 1049
  2504. #define SSL_R_TLSV1_ALERT_DECODE_ERROR 1050
  2505. #define SSL_R_TLSV1_ALERT_DECRYPT_ERROR 1051
  2506. #define SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION 1060
  2507. #define SSL_R_TLSV1_ALERT_PROTOCOL_VERSION 1070
  2508. #define SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY 1071
  2509. #define SSL_R_TLSV1_ALERT_INTERNAL_ERROR 1080
  2510. #define SSL_R_TLSV1_ALERT_INAPPROPRIATE_FALLBACK 1086
  2511. #define SSL_R_TLSV1_ALERT_USER_CANCELLED 1090
  2512. #define SSL_R_TLSV1_ALERT_NO_RENEGOTIATION 1100
  2513. #define SSL_R_TLSV1_UNSUPPORTED_EXTENSION 1110
  2514. #define SSL_R_TLSV1_CERTIFICATE_UNOBTAINABLE 1111
  2515. #define SSL_R_TLSV1_UNRECOGNIZED_NAME 1112
  2516. #define SSL_R_TLSV1_BAD_CERTIFICATE_STATUS_RESPONSE 1113
  2517. #define SSL_R_TLSV1_BAD_CERTIFICATE_HASH_VALUE 1114
  2518. #endif /* OPENSSL_HEADER_SSL_H */