diff options
| author | jsing <> | 2018-02-10 04:41:24 +0000 |
|---|---|---|
| committer | jsing <> | 2018-02-10 04:41:24 +0000 |
| commit | 7f2c0ca878baa76136bb91e6e42ba28feb243a6b (patch) | |
| tree | d414866dbbe43d007a4873fb2dc7e6cb637f7bce /src/lib/libtls/tls.h | |
| parent | 8bb2c697afde11037803819ad6589618da0b6552 (diff) | |
| download | openbsd-7f2c0ca878baa76136bb91e6e42ba28feb243a6b.tar.gz openbsd-7f2c0ca878baa76136bb91e6e42ba28feb243a6b.tar.bz2 openbsd-7f2c0ca878baa76136bb91e6e42ba28feb243a6b.zip | |
Add support to libtls for client-side TLS session resumption.
A libtls client can specify a session file descriptor (a regular file
with appropriate ownership and permissions) and libtls will manage reading
and writing of session data across TLS handshakes.
Discussed at length with deraadt@ and tedu@.
Rides previous minor bump.
ok beck@
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libtls/tls.h | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/src/lib/libtls/tls.h b/src/lib/libtls/tls.h index cc8627f2af..8d66c2fbaa 100644 --- a/src/lib/libtls/tls.h +++ b/src/lib/libtls/tls.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: tls.h,v 1.51 2017/08/10 18:18:30 jsing Exp $ */ | 1 | /* $OpenBSD: tls.h,v 1.52 2018/02/10 04:41:24 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> |
| 4 | * | 4 | * |
| @@ -128,6 +128,7 @@ int tls_config_set_ocsp_staple_mem(struct tls_config *_config, | |||
| 128 | int tls_config_set_ocsp_staple_file(struct tls_config *_config, | 128 | int tls_config_set_ocsp_staple_file(struct tls_config *_config, |
| 129 | const char *_staple_file); | 129 | const char *_staple_file); |
| 130 | int tls_config_set_protocols(struct tls_config *_config, uint32_t _protocols); | 130 | int tls_config_set_protocols(struct tls_config *_config, uint32_t _protocols); |
| 131 | int tls_config_set_session_fd(struct tls_config *_config, int _session_fd); | ||
| 131 | int tls_config_set_verify_depth(struct tls_config *_config, int _verify_depth); | 132 | int tls_config_set_verify_depth(struct tls_config *_config, int _verify_depth); |
| 132 | 133 | ||
| 133 | void tls_config_prefer_ciphers_client(struct tls_config *_config); | 134 | void tls_config_prefer_ciphers_client(struct tls_config *_config); |
| @@ -188,6 +189,7 @@ const uint8_t *tls_peer_cert_chain_pem(struct tls *_ctx, size_t *_len); | |||
| 188 | const char *tls_conn_alpn_selected(struct tls *_ctx); | 189 | const char *tls_conn_alpn_selected(struct tls *_ctx); |
| 189 | const char *tls_conn_cipher(struct tls *_ctx); | 190 | const char *tls_conn_cipher(struct tls *_ctx); |
| 190 | const char *tls_conn_servername(struct tls *_ctx); | 191 | const char *tls_conn_servername(struct tls *_ctx); |
| 192 | int tls_conn_session_resumed(struct tls *_ctx); | ||
| 191 | const char *tls_conn_version(struct tls *_ctx); | 193 | const char *tls_conn_version(struct tls *_ctx); |
| 192 | 194 | ||
| 193 | uint8_t *tls_load_file(const char *_file, size_t *_len, char *_password); | 195 | uint8_t *tls_load_file(const char *_file, size_t *_len, char *_password); |
