diff options
Diffstat (limited to 'src/lib/libssl/ssl.h')
-rw-r--r-- | src/lib/libssl/ssl.h | 59 |
1 files changed, 1 insertions, 58 deletions
diff --git a/src/lib/libssl/ssl.h b/src/lib/libssl/ssl.h index dce72d8c25..2d6a0e757d 100644 --- a/src/lib/libssl/ssl.h +++ b/src/lib/libssl/ssl.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssl.h,v 1.109 2017/01/23 01:22:08 jsing Exp $ */ | 1 | /* $OpenBSD: ssl.h,v 1.110 2017/01/23 04:15:28 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -712,42 +712,8 @@ struct ssl_ctx_st { | |||
712 | * life easier to set things up */ | 712 | * life easier to set things up */ |
713 | long session_timeout; | 713 | long session_timeout; |
714 | 714 | ||
715 | /* If this callback is not null, it will be called each | ||
716 | * time a session id is added to the cache. If this function | ||
717 | * returns 1, it means that the callback will do a | ||
718 | * SSL_SESSION_free() when it has finished using it. Otherwise, | ||
719 | * on 0, it means the callback has finished with it. | ||
720 | * If remove_session_cb is not null, it will be called when | ||
721 | * a session-id is removed from the cache. After the call, | ||
722 | * OpenSSL will SSL_SESSION_free() it. */ | ||
723 | int (*new_session_cb)(struct ssl_st *ssl, SSL_SESSION *sess); | ||
724 | void (*remove_session_cb)(struct ssl_ctx_st *ctx, SSL_SESSION *sess); | ||
725 | SSL_SESSION *(*get_session_cb)(struct ssl_st *ssl, | ||
726 | unsigned char *data, int len, int *copy); | ||
727 | |||
728 | int references; | 715 | int references; |
729 | 716 | ||
730 | /* if defined, these override the X509_verify_cert() calls */ | ||
731 | int (*app_verify_callback)(X509_STORE_CTX *, void *); | ||
732 | void *app_verify_arg; | ||
733 | |||
734 | /* Default password callback. */ | ||
735 | pem_password_cb *default_passwd_callback; | ||
736 | |||
737 | /* Default password callback user data. */ | ||
738 | void *default_passwd_callback_userdata; | ||
739 | |||
740 | /* get client cert callback */ | ||
741 | int (*client_cert_cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey); | ||
742 | |||
743 | /* cookie generate callback */ | ||
744 | int (*app_gen_cookie_cb)(SSL *ssl, unsigned char *cookie, | ||
745 | unsigned int *cookie_len); | ||
746 | |||
747 | /* verify cookie callback */ | ||
748 | int (*app_verify_cookie_cb)(SSL *ssl, unsigned char *cookie, | ||
749 | unsigned int cookie_len); | ||
750 | |||
751 | CRYPTO_EX_DATA ex_data; | 717 | CRYPTO_EX_DATA ex_data; |
752 | 718 | ||
753 | const EVP_MD *md5; /* For SSLv3/TLSv1 'ssl3-md5' */ | 719 | const EVP_MD *md5; /* For SSLv3/TLSv1 'ssl3-md5' */ |
@@ -757,12 +723,9 @@ struct ssl_ctx_st { | |||
757 | 723 | ||
758 | /* Default values used when no per-SSL value is defined follow */ | 724 | /* Default values used when no per-SSL value is defined follow */ |
759 | 725 | ||
760 | void (*info_callback)(const SSL *ssl,int type,int val); /* used if SSL's info_callback is NULL */ | ||
761 | |||
762 | /* what we put in client cert requests */ | 726 | /* what we put in client cert requests */ |
763 | STACK_OF(X509_NAME) *client_CA; | 727 | STACK_OF(X509_NAME) *client_CA; |
764 | 728 | ||
765 | |||
766 | /* Default values to use in SSL structures follow (these are copied by SSL_new) */ | 729 | /* Default values to use in SSL structures follow (these are copied by SSL_new) */ |
767 | 730 | ||
768 | unsigned long options; | 731 | unsigned long options; |
@@ -772,18 +735,9 @@ struct ssl_ctx_st { | |||
772 | struct cert_st /* CERT */ *cert; | 735 | struct cert_st /* CERT */ *cert; |
773 | int read_ahead; | 736 | int read_ahead; |
774 | 737 | ||
775 | /* callback that allows applications to peek at protocol messages */ | ||
776 | void (*msg_callback)(int write_p, int version, int content_type, | ||
777 | const void *buf, size_t len, SSL *ssl, void *arg); | ||
778 | void *msg_callback_arg; | ||
779 | |||
780 | int verify_mode; | 738 | int verify_mode; |
781 | unsigned int sid_ctx_length; | 739 | unsigned int sid_ctx_length; |
782 | unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; | 740 | unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; |
783 | int (*default_verify_callback)(int ok,X509_STORE_CTX *ctx); /* called 'verify_callback' in the SSL */ | ||
784 | |||
785 | /* Default generate session ID callback. */ | ||
786 | GEN_SESSION_CB generate_session_id; | ||
787 | 741 | ||
788 | X509_VERIFY_PARAM *param; | 742 | X509_VERIFY_PARAM *param; |
789 | 743 | ||
@@ -801,21 +755,10 @@ struct ssl_ctx_st { | |||
801 | ENGINE *client_cert_engine; | 755 | ENGINE *client_cert_engine; |
802 | #endif | 756 | #endif |
803 | 757 | ||
804 | /* TLS extensions servername callback */ | ||
805 | int (*tlsext_servername_callback)(SSL*, int *, void *); | ||
806 | void *tlsext_servername_arg; | ||
807 | /* RFC 4507 session ticket keys */ | 758 | /* RFC 4507 session ticket keys */ |
808 | unsigned char tlsext_tick_key_name[16]; | 759 | unsigned char tlsext_tick_key_name[16]; |
809 | unsigned char tlsext_tick_hmac_key[16]; | 760 | unsigned char tlsext_tick_hmac_key[16]; |
810 | unsigned char tlsext_tick_aes_key[16]; | 761 | unsigned char tlsext_tick_aes_key[16]; |
811 | /* Callback to support customisation of ticket key setting */ | ||
812 | int (*tlsext_ticket_key_cb)(SSL *ssl, unsigned char *name, | ||
813 | unsigned char *iv, EVP_CIPHER_CTX *ectx, HMAC_CTX *hctx, int enc); | ||
814 | |||
815 | /* certificate status request info */ | ||
816 | /* Callback for status request */ | ||
817 | int (*tlsext_status_cb)(SSL *ssl, void *arg); | ||
818 | void *tlsext_status_arg; | ||
819 | 762 | ||
820 | /* SRTP profiles we are willing to do from RFC 5764 */ | 763 | /* SRTP profiles we are willing to do from RFC 5764 */ |
821 | STACK_OF(SRTP_PROTECTION_PROFILE) *srtp_profiles; | 764 | STACK_OF(SRTP_PROTECTION_PROFILE) *srtp_profiles; |