diff options
Diffstat (limited to 'src/lib/libssl/ssl.h')
| -rw-r--r-- | src/lib/libssl/ssl.h | 59 |
1 files changed, 1 insertions, 58 deletions
diff --git a/src/lib/libssl/ssl.h b/src/lib/libssl/ssl.h index dce72d8c25..2d6a0e757d 100644 --- a/src/lib/libssl/ssl.h +++ b/src/lib/libssl/ssl.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl.h,v 1.109 2017/01/23 01:22:08 jsing Exp $ */ | 1 | /* $OpenBSD: ssl.h,v 1.110 2017/01/23 04:15:28 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -712,42 +712,8 @@ struct ssl_ctx_st { | |||
| 712 | * life easier to set things up */ | 712 | * life easier to set things up */ |
| 713 | long session_timeout; | 713 | long session_timeout; |
| 714 | 714 | ||
| 715 | /* If this callback is not null, it will be called each | ||
| 716 | * time a session id is added to the cache. If this function | ||
| 717 | * returns 1, it means that the callback will do a | ||
| 718 | * SSL_SESSION_free() when it has finished using it. Otherwise, | ||
| 719 | * on 0, it means the callback has finished with it. | ||
| 720 | * If remove_session_cb is not null, it will be called when | ||
| 721 | * a session-id is removed from the cache. After the call, | ||
| 722 | * OpenSSL will SSL_SESSION_free() it. */ | ||
| 723 | int (*new_session_cb)(struct ssl_st *ssl, SSL_SESSION *sess); | ||
| 724 | void (*remove_session_cb)(struct ssl_ctx_st *ctx, SSL_SESSION *sess); | ||
| 725 | SSL_SESSION *(*get_session_cb)(struct ssl_st *ssl, | ||
| 726 | unsigned char *data, int len, int *copy); | ||
| 727 | |||
| 728 | int references; | 715 | int references; |
| 729 | 716 | ||
| 730 | /* if defined, these override the X509_verify_cert() calls */ | ||
| 731 | int (*app_verify_callback)(X509_STORE_CTX *, void *); | ||
| 732 | void *app_verify_arg; | ||
| 733 | |||
| 734 | /* Default password callback. */ | ||
| 735 | pem_password_cb *default_passwd_callback; | ||
| 736 | |||
| 737 | /* Default password callback user data. */ | ||
| 738 | void *default_passwd_callback_userdata; | ||
| 739 | |||
| 740 | /* get client cert callback */ | ||
| 741 | int (*client_cert_cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey); | ||
| 742 | |||
| 743 | /* cookie generate callback */ | ||
| 744 | int (*app_gen_cookie_cb)(SSL *ssl, unsigned char *cookie, | ||
| 745 | unsigned int *cookie_len); | ||
| 746 | |||
| 747 | /* verify cookie callback */ | ||
| 748 | int (*app_verify_cookie_cb)(SSL *ssl, unsigned char *cookie, | ||
| 749 | unsigned int cookie_len); | ||
| 750 | |||
| 751 | CRYPTO_EX_DATA ex_data; | 717 | CRYPTO_EX_DATA ex_data; |
| 752 | 718 | ||
| 753 | const EVP_MD *md5; /* For SSLv3/TLSv1 'ssl3-md5' */ | 719 | const EVP_MD *md5; /* For SSLv3/TLSv1 'ssl3-md5' */ |
| @@ -757,12 +723,9 @@ struct ssl_ctx_st { | |||
| 757 | 723 | ||
| 758 | /* Default values used when no per-SSL value is defined follow */ | 724 | /* Default values used when no per-SSL value is defined follow */ |
| 759 | 725 | ||
| 760 | void (*info_callback)(const SSL *ssl,int type,int val); /* used if SSL's info_callback is NULL */ | ||
| 761 | |||
| 762 | /* what we put in client cert requests */ | 726 | /* what we put in client cert requests */ |
| 763 | STACK_OF(X509_NAME) *client_CA; | 727 | STACK_OF(X509_NAME) *client_CA; |
| 764 | 728 | ||
| 765 | |||
| 766 | /* Default values to use in SSL structures follow (these are copied by SSL_new) */ | 729 | /* Default values to use in SSL structures follow (these are copied by SSL_new) */ |
| 767 | 730 | ||
| 768 | unsigned long options; | 731 | unsigned long options; |
| @@ -772,18 +735,9 @@ struct ssl_ctx_st { | |||
| 772 | struct cert_st /* CERT */ *cert; | 735 | struct cert_st /* CERT */ *cert; |
| 773 | int read_ahead; | 736 | int read_ahead; |
| 774 | 737 | ||
| 775 | /* callback that allows applications to peek at protocol messages */ | ||
| 776 | void (*msg_callback)(int write_p, int version, int content_type, | ||
| 777 | const void *buf, size_t len, SSL *ssl, void *arg); | ||
| 778 | void *msg_callback_arg; | ||
| 779 | |||
| 780 | int verify_mode; | 738 | int verify_mode; |
| 781 | unsigned int sid_ctx_length; | 739 | unsigned int sid_ctx_length; |
| 782 | unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; | 740 | unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; |
| 783 | int (*default_verify_callback)(int ok,X509_STORE_CTX *ctx); /* called 'verify_callback' in the SSL */ | ||
| 784 | |||
| 785 | /* Default generate session ID callback. */ | ||
| 786 | GEN_SESSION_CB generate_session_id; | ||
| 787 | 741 | ||
| 788 | X509_VERIFY_PARAM *param; | 742 | X509_VERIFY_PARAM *param; |
| 789 | 743 | ||
| @@ -801,21 +755,10 @@ struct ssl_ctx_st { | |||
| 801 | ENGINE *client_cert_engine; | 755 | ENGINE *client_cert_engine; |
| 802 | #endif | 756 | #endif |
| 803 | 757 | ||
| 804 | /* TLS extensions servername callback */ | ||
| 805 | int (*tlsext_servername_callback)(SSL*, int *, void *); | ||
| 806 | void *tlsext_servername_arg; | ||
| 807 | /* RFC 4507 session ticket keys */ | 758 | /* RFC 4507 session ticket keys */ |
| 808 | unsigned char tlsext_tick_key_name[16]; | 759 | unsigned char tlsext_tick_key_name[16]; |
| 809 | unsigned char tlsext_tick_hmac_key[16]; | 760 | unsigned char tlsext_tick_hmac_key[16]; |
| 810 | unsigned char tlsext_tick_aes_key[16]; | 761 | unsigned char tlsext_tick_aes_key[16]; |
| 811 | /* Callback to support customisation of ticket key setting */ | ||
| 812 | int (*tlsext_ticket_key_cb)(SSL *ssl, unsigned char *name, | ||
| 813 | unsigned char *iv, EVP_CIPHER_CTX *ectx, HMAC_CTX *hctx, int enc); | ||
| 814 | |||
| 815 | /* certificate status request info */ | ||
| 816 | /* Callback for status request */ | ||
| 817 | int (*tlsext_status_cb)(SSL *ssl, void *arg); | ||
| 818 | void *tlsext_status_arg; | ||
| 819 | 762 | ||
| 820 | /* SRTP profiles we are willing to do from RFC 5764 */ | 763 | /* SRTP profiles we are willing to do from RFC 5764 */ |
| 821 | STACK_OF(SRTP_PROTECTION_PROFILE) *srtp_profiles; | 764 | STACK_OF(SRTP_PROTECTION_PROFILE) *srtp_profiles; |
