diff options
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libssl/ssl.h | 55 |
1 files changed, 24 insertions, 31 deletions
diff --git a/src/lib/libssl/ssl.h b/src/lib/libssl/ssl.h index 73d007400f..99271b5cb6 100644 --- a/src/lib/libssl/ssl.h +++ b/src/lib/libssl/ssl.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl.h,v 1.83 2015/02/22 15:54:27 jsing Exp $ */ | 1 | /* $OpenBSD: ssl.h,v 1.84 2015/06/17 06:49:27 doug Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -517,24 +517,14 @@ struct ssl_session_st { | |||
| 517 | 517 | ||
| 518 | #endif | 518 | #endif |
| 519 | 519 | ||
| 520 | #define SSL_OP_MICROSOFT_SESS_ID_BUG 0x00000001L | ||
| 521 | #define SSL_OP_NETSCAPE_CHALLENGE_BUG 0x00000002L | ||
| 522 | /* Allow initial connection to servers that don't support RI */ | 520 | /* Allow initial connection to servers that don't support RI */ |
| 523 | #define SSL_OP_LEGACY_SERVER_CONNECT 0x00000004L | 521 | #define SSL_OP_LEGACY_SERVER_CONNECT 0x00000004L |
| 524 | #define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x00000008L | ||
| 525 | #define SSL_OP_TLSEXT_PADDING 0x00000010L | 522 | #define SSL_OP_TLSEXT_PADDING 0x00000010L |
| 526 | #define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L | 523 | #define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L |
| 527 | #define SSL_OP_SAFARI_ECDHE_ECDSA_BUG 0x00000040L | 524 | #define SSL_OP_SAFARI_ECDHE_ECDSA_BUG 0x00000040L |
| 528 | #define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x00000080L | ||
| 529 | #define SSL_OP_TLS_D5_BUG 0x00000100L | 525 | #define SSL_OP_TLS_D5_BUG 0x00000100L |
| 530 | #define SSL_OP_TLS_BLOCK_PADDING_BUG 0x00000200L | 526 | #define SSL_OP_TLS_BLOCK_PADDING_BUG 0x00000200L |
| 531 | 527 | ||
| 532 | /* Hasn't done anything since OpenSSL 0.9.7h, retained for compatibility */ | ||
| 533 | #define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x0 | ||
| 534 | |||
| 535 | /* Refers to ancient SSLREF and SSLv2, retained for compatibility */ | ||
| 536 | #define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x0 | ||
| 537 | |||
| 538 | /* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added | 528 | /* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added |
| 539 | * in OpenSSL 0.9.6d. Usually (depending on the application protocol) | 529 | * in OpenSSL 0.9.6d. Usually (depending on the application protocol) |
| 540 | * the workaround is not needed. | 530 | * the workaround is not needed. |
| @@ -542,34 +532,25 @@ struct ssl_session_st { | |||
| 542 | * at all, which is why it was previously included in SSL_OP_ALL. | 532 | * at all, which is why it was previously included in SSL_OP_ALL. |
| 543 | * Now it's not. | 533 | * Now it's not. |
| 544 | */ | 534 | */ |
| 545 | #define SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS 0x00000800L /* added in 0.9.6e */ | 535 | #define SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS 0x00000800L /* added in 0.9.6e */ |
| 546 | |||
| 547 | /* SSL_OP_ALL: various bug workarounds that should be rather harmless. | ||
| 548 | * This used to be 0x000FFFFFL before 0.9.7. */ | ||
| 549 | #define SSL_OP_ALL 0x800003FFL | ||
| 550 | 536 | ||
| 551 | /* DTLS options */ | 537 | /* DTLS options */ |
| 552 | #define SSL_OP_NO_QUERY_MTU 0x00001000L | 538 | #define SSL_OP_NO_QUERY_MTU 0x00001000L |
| 553 | /* Turn on Cookie Exchange (on relevant for servers) */ | 539 | /* Turn on Cookie Exchange (on relevant for servers) */ |
| 554 | #define SSL_OP_COOKIE_EXCHANGE 0x00002000L | 540 | #define SSL_OP_COOKIE_EXCHANGE 0x00002000L |
| 555 | /* Don't use RFC4507 ticket extension */ | 541 | /* Don't use RFC4507 ticket extension */ |
| 556 | #define SSL_OP_NO_TICKET 0x00004000L | 542 | #define SSL_OP_NO_TICKET 0x00004000L |
| 557 | /* Use Cisco's "speshul" version of DTLS_BAD_VER (as client) */ | 543 | /* Use Cisco's "speshul" version of DTLS_BAD_VER (as client) */ |
| 558 | #define SSL_OP_CISCO_ANYCONNECT 0x00008000L | 544 | #define SSL_OP_CISCO_ANYCONNECT 0x00008000L |
| 559 | 545 | ||
| 560 | /* As server, disallow session resumption on renegotiation */ | 546 | /* As server, disallow session resumption on renegotiation */ |
| 561 | #define SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION 0x00010000L | 547 | #define SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION 0x00010000L |
| 562 | /* Don't use compression even if supported */ | 548 | /* Don't use compression even if supported */ |
| 563 | #define SSL_OP_NO_COMPRESSION 0x00020000L | 549 | #define SSL_OP_NO_COMPRESSION 0x00020000L |
| 564 | /* Permit unsafe legacy renegotiation */ | ||
| 565 | #define SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION 0x00040000L | ||
| 566 | /* If set, always create a new key when using tmp_ecdh parameters */ | 550 | /* If set, always create a new key when using tmp_ecdh parameters */ |
| 567 | #define SSL_OP_SINGLE_ECDH_USE 0x00080000L | 551 | #define SSL_OP_SINGLE_ECDH_USE 0x00080000L |
| 568 | /* If set, always create a new key when using tmp_dh parameters */ | 552 | /* If set, always create a new key when using tmp_dh parameters */ |
| 569 | #define SSL_OP_SINGLE_DH_USE 0x00100000L | 553 | #define SSL_OP_SINGLE_DH_USE 0x00100000L |
| 570 | /* Set to always use the tmp_rsa key when doing RSA operations, | ||
| 571 | * even when this violates protocol specs */ | ||
| 572 | #define SSL_OP_EPHEMERAL_RSA 0x00200000L | ||
| 573 | /* Set on servers to choose the cipher according to the server's | 554 | /* Set on servers to choose the cipher according to the server's |
| 574 | * preferences */ | 555 | * preferences */ |
| 575 | #define SSL_OP_CIPHER_SERVER_PREFERENCE 0x00400000L | 556 | #define SSL_OP_CIPHER_SERVER_PREFERENCE 0x00400000L |
| @@ -585,18 +566,30 @@ struct ssl_session_st { | |||
| 585 | #define SSL_OP_NO_TLSv1_2 0x08000000L | 566 | #define SSL_OP_NO_TLSv1_2 0x08000000L |
| 586 | #define SSL_OP_NO_TLSv1_1 0x10000000L | 567 | #define SSL_OP_NO_TLSv1_1 0x10000000L |
| 587 | 568 | ||
| 588 | /* Obsolete flags kept for compatibility. No sane code should use them. */ | ||
| 589 | #define SSL_OP_PKCS1_CHECK_1 0x0 | ||
| 590 | #define SSL_OP_PKCS1_CHECK_2 0x0 | ||
| 591 | |||
| 592 | #define SSL_OP_NETSCAPE_CA_DN_BUG 0x20000000L | ||
| 593 | #define SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG 0x40000000L | ||
| 594 | /* Make server add server-hello extension from early version of | 569 | /* Make server add server-hello extension from early version of |
| 595 | * cryptopro draft, when GOST ciphersuite is negotiated. | 570 | * cryptopro draft, when GOST ciphersuite is negotiated. |
| 596 | * Required for interoperability with CryptoPro CSP 3.x | 571 | * Required for interoperability with CryptoPro CSP 3.x |
| 597 | */ | 572 | */ |
| 598 | #define SSL_OP_CRYPTOPRO_TLSEXT_BUG 0x80000000L | 573 | #define SSL_OP_CRYPTOPRO_TLSEXT_BUG 0x80000000L |
| 599 | 574 | ||
| 575 | /* SSL_OP_ALL: various bug workarounds that should be rather harmless. | ||
| 576 | * This used to be 0x000FFFFFL before 0.9.7. */ | ||
| 577 | #define SSL_OP_ALL 0x80000374L | ||
| 578 | |||
| 579 | /* Obsolete flags kept for compatibility. No sane code should use them. */ | ||
| 580 | #define SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION 0x0 | ||
| 581 | #define SSL_OP_EPHEMERAL_RSA 0x0 | ||
| 582 | #define SSL_OP_MICROSOFT_SESS_ID_BUG 0x0 | ||
| 583 | #define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x0 | ||
| 584 | #define SSL_OP_NETSCAPE_CA_DN_BUG 0x0 | ||
| 585 | #define SSL_OP_NETSCAPE_CHALLENGE_BUG 0x0 | ||
| 586 | #define SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG 0x0 | ||
| 587 | #define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x0 | ||
| 588 | #define SSL_OP_PKCS1_CHECK_1 0x0 | ||
| 589 | #define SSL_OP_PKCS1_CHECK_2 0x0 | ||
| 590 | #define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x0 | ||
| 591 | #define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x0 | ||
| 592 | |||
| 600 | /* Allow SSL_write(..., n) to return r with 0 < r < n (i.e. report success | 593 | /* Allow SSL_write(..., n) to return r with 0 < r < n (i.e. report success |
| 601 | * when just a single record has been written): */ | 594 | * when just a single record has been written): */ |
| 602 | #define SSL_MODE_ENABLE_PARTIAL_WRITE 0x00000001L | 595 | #define SSL_MODE_ENABLE_PARTIAL_WRITE 0x00000001L |
