Move a few more functions to the catch-all 'obscure' bucket.
Change-Id: I493f26561db2bc8510963a0da5032a758bb1f3ef Reviewed-on: https://boringssl-review.googlesource.com/5960 Reviewed-by: Adam Langley <agl@google.com>
This commit is contained in:
parent
1cee7da07e
commit
0cfea3411a
@ -2162,6 +2162,51 @@ OPENSSL_EXPORT void SSL_get_structure_sizes(size_t *ssl_size,
|
|||||||
size_t *ssl_ctx_size,
|
size_t *ssl_ctx_size,
|
||||||
size_t *ssl_session_size);
|
size_t *ssl_session_size);
|
||||||
|
|
||||||
|
/* SSL_CTX_set_msg_callback installs |cb| as the message callback for |ctx|.
|
||||||
|
* This callback will be called when sending or receiving low-level record
|
||||||
|
* headers, complete handshake messages, ChangeCipherSpec, and alerts.
|
||||||
|
* |write_p| is one for outgoing messages and zero for incoming messages.
|
||||||
|
*
|
||||||
|
* For each record header, |cb| is called with |version| = 0 and |content_type|
|
||||||
|
* = |SSL3_RT_HEADER|. The |len| bytes from |buf| contain the header. Note that
|
||||||
|
* this does not include the record body. If the record is sealed, the length
|
||||||
|
* in the header is the length of the ciphertext.
|
||||||
|
*
|
||||||
|
* For each handshake message, ChangeCipherSpec, and alert, |version| is the
|
||||||
|
* protocol version and |content_type| is the corresponding record type. The
|
||||||
|
* |len| bytes from |buf| contain the handshake message, one-byte
|
||||||
|
* ChangeCipherSpec body, and two-byte alert, respectively. */
|
||||||
|
OPENSSL_EXPORT void SSL_CTX_set_msg_callback(
|
||||||
|
SSL_CTX *ctx, void (*cb)(int write_p, int version, int content_type,
|
||||||
|
const void *buf, size_t len, SSL *ssl, void *arg));
|
||||||
|
|
||||||
|
/* SSL_CTX_set_msg_callback_arg sets the |arg| parameter of the message
|
||||||
|
* callback. */
|
||||||
|
OPENSSL_EXPORT void SSL_CTX_set_msg_callback_arg(SSL_CTX *ctx, void *arg);
|
||||||
|
|
||||||
|
/* SSL_set_msg_callback installs |cb| as the message callback of |ssl|. See
|
||||||
|
* |SSL_CTX_set_msg_callback| for when this callback is called. */
|
||||||
|
OPENSSL_EXPORT void SSL_set_msg_callback(
|
||||||
|
SSL *ssl, void (*cb)(int write_p, int version, int content_type,
|
||||||
|
const void *buf, size_t len, SSL *ssl, void *arg));
|
||||||
|
|
||||||
|
/* SSL_set_msg_callback_arg sets the |arg| parameter of the message callback. */
|
||||||
|
OPENSSL_EXPORT void SSL_set_msg_callback_arg(SSL *ssl, void *arg);
|
||||||
|
|
||||||
|
/* SSL_CTX_set_keylog_bio sets configures all SSL objects attached to |ctx| to
|
||||||
|
* log session material to |keylog_bio|. This is intended for debugging use
|
||||||
|
* with tools like Wireshark. |ctx| takes ownership of |keylog_bio|.
|
||||||
|
*
|
||||||
|
* The format is described in
|
||||||
|
* https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/Key_Log_Format. */
|
||||||
|
OPENSSL_EXPORT void SSL_CTX_set_keylog_bio(SSL_CTX *ctx, BIO *keylog_bio);
|
||||||
|
|
||||||
|
/* SSL_set_reject_peer_renegotiations controls whether renegotiation attempts by
|
||||||
|
* the peer are rejected. It may be set at any point in a connection's lifetime
|
||||||
|
* to control future renegotiations programmatically. By default, renegotiations
|
||||||
|
* are rejected. (Renegotiations requested by a client are always rejected.) */
|
||||||
|
OPENSSL_EXPORT void SSL_set_reject_peer_renegotiations(SSL *ssl, int reject);
|
||||||
|
|
||||||
|
|
||||||
/* Underdocumented functions.
|
/* Underdocumented functions.
|
||||||
*
|
*
|
||||||
@ -2260,46 +2305,6 @@ typedef struct ssl3_enc_method SSL3_ENC_METHOD;
|
|||||||
* and zero on failure. */
|
* and zero on failure. */
|
||||||
OPENSSL_EXPORT int SSL_set_mtu(SSL *ssl, unsigned mtu);
|
OPENSSL_EXPORT int SSL_set_mtu(SSL *ssl, unsigned mtu);
|
||||||
|
|
||||||
/* SSL_CTX_set_msg_callback installs |cb| as the message callback for |ctx|.
|
|
||||||
* This callback will be called when sending or receiving low-level record
|
|
||||||
* headers, complete handshake messages, ChangeCipherSpec, and alerts.
|
|
||||||
* |write_p| is one for outgoing messages and zero for incoming messages.
|
|
||||||
*
|
|
||||||
* For each record header, |cb| is called with |version| = 0 and |content_type|
|
|
||||||
* = |SSL3_RT_HEADER|. The |len| bytes from |buf| contain the header. Note that
|
|
||||||
* this does not include the record body. If the record is sealed, the length
|
|
||||||
* in the header is the length of the ciphertext.
|
|
||||||
*
|
|
||||||
* For each handshake message, ChangeCipherSpec, and alert, |version| is the
|
|
||||||
* protocol version and |content_type| is the corresponding record type. The
|
|
||||||
* |len| bytes from |buf| contain the handshake message, one-byte
|
|
||||||
* ChangeCipherSpec body, and two-byte alert, respectively. */
|
|
||||||
OPENSSL_EXPORT void SSL_CTX_set_msg_callback(
|
|
||||||
SSL_CTX *ctx, void (*cb)(int write_p, int version, int content_type,
|
|
||||||
const void *buf, size_t len, SSL *ssl, void *arg));
|
|
||||||
|
|
||||||
/* SSL_CTX_set_msg_callback_arg sets the |arg| parameter of the message
|
|
||||||
* callback. */
|
|
||||||
OPENSSL_EXPORT void SSL_CTX_set_msg_callback_arg(SSL_CTX *ctx, void *arg);
|
|
||||||
|
|
||||||
/* SSL_set_msg_callback installs |cb| as the message callback of |ssl|. See
|
|
||||||
* |SSL_CTX_set_msg_callback| for when this callback is called. */
|
|
||||||
OPENSSL_EXPORT void SSL_set_msg_callback(
|
|
||||||
SSL *ssl, void (*cb)(int write_p, int version, int content_type,
|
|
||||||
const void *buf, size_t len, SSL *ssl, void *arg));
|
|
||||||
|
|
||||||
/* SSL_set_msg_callback_arg sets the |arg| parameter of the message callback. */
|
|
||||||
OPENSSL_EXPORT void SSL_set_msg_callback_arg(SSL *ssl, void *arg);
|
|
||||||
|
|
||||||
/* SSL_CTX_set_keylog_bio sets configures all SSL objects attached to |ctx| to
|
|
||||||
* log session material to |keylog_bio|. This is intended for debugging use
|
|
||||||
* with tools like Wireshark. |ctx| takes ownership of |keylog_bio|.
|
|
||||||
*
|
|
||||||
* The format is described in
|
|
||||||
* https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/Key_Log_Format. */
|
|
||||||
OPENSSL_EXPORT void SSL_CTX_set_keylog_bio(SSL_CTX *ctx, BIO *keylog_bio);
|
|
||||||
|
|
||||||
|
|
||||||
struct ssl_aead_ctx_st;
|
struct ssl_aead_ctx_st;
|
||||||
typedef struct ssl_aead_ctx_st SSL_AEAD_CTX;
|
typedef struct ssl_aead_ctx_st SSL_AEAD_CTX;
|
||||||
|
|
||||||
@ -2381,12 +2386,6 @@ OPENSSL_EXPORT void SSL_get0_signed_cert_timestamp_list(const SSL *ssl,
|
|||||||
OPENSSL_EXPORT void SSL_get0_ocsp_response(const SSL *ssl, const uint8_t **out,
|
OPENSSL_EXPORT void SSL_get0_ocsp_response(const SSL *ssl, const uint8_t **out,
|
||||||
size_t *out_len);
|
size_t *out_len);
|
||||||
|
|
||||||
/* SSL_set_reject_peer_renegotiations controls whether renegotiation attempts by
|
|
||||||
* the peer are rejected. It may be set at any point in a connection's lifetime
|
|
||||||
* to control future renegotiations programmatically. By default, renegotiations
|
|
||||||
* are rejected. (Renegotiations requested by a client are always rejected.) */
|
|
||||||
OPENSSL_EXPORT void SSL_set_reject_peer_renegotiations(SSL *ssl, int reject);
|
|
||||||
|
|
||||||
#define SSL_NOTHING 1
|
#define SSL_NOTHING 1
|
||||||
#define SSL_WRITING 2
|
#define SSL_WRITING 2
|
||||||
#define SSL_READING 3
|
#define SSL_READING 3
|
||||||
|
Loading…
Reference in New Issue
Block a user