summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl.h
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/ssl.h')
-rw-r--r--src/lib/libssl/ssl.h59
1 files changed, 1 insertions, 58 deletions
diff --git a/src/lib/libssl/ssl.h b/src/lib/libssl/ssl.h
index dce72d8c25..2d6a0e757d 100644
--- a/src/lib/libssl/ssl.h
+++ b/src/lib/libssl/ssl.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssl.h,v 1.109 2017/01/23 01:22:08 jsing Exp $ */ 1/* $OpenBSD: ssl.h,v 1.110 2017/01/23 04:15:28 jsing Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -712,42 +712,8 @@ struct ssl_ctx_st {
712 * life easier to set things up */ 712 * life easier to set things up */
713 long session_timeout; 713 long session_timeout;
714 714
715 /* If this callback is not null, it will be called each
716 * time a session id is added to the cache. If this function
717 * returns 1, it means that the callback will do a
718 * SSL_SESSION_free() when it has finished using it. Otherwise,
719 * on 0, it means the callback has finished with it.
720 * If remove_session_cb is not null, it will be called when
721 * a session-id is removed from the cache. After the call,
722 * OpenSSL will SSL_SESSION_free() it. */
723 int (*new_session_cb)(struct ssl_st *ssl, SSL_SESSION *sess);
724 void (*remove_session_cb)(struct ssl_ctx_st *ctx, SSL_SESSION *sess);
725 SSL_SESSION *(*get_session_cb)(struct ssl_st *ssl,
726 unsigned char *data, int len, int *copy);
727
728 int references; 715 int references;
729 716
730 /* if defined, these override the X509_verify_cert() calls */
731 int (*app_verify_callback)(X509_STORE_CTX *, void *);
732 void *app_verify_arg;
733
734 /* Default password callback. */
735 pem_password_cb *default_passwd_callback;
736
737 /* Default password callback user data. */
738 void *default_passwd_callback_userdata;
739
740 /* get client cert callback */
741 int (*client_cert_cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey);
742
743 /* cookie generate callback */
744 int (*app_gen_cookie_cb)(SSL *ssl, unsigned char *cookie,
745 unsigned int *cookie_len);
746
747 /* verify cookie callback */
748 int (*app_verify_cookie_cb)(SSL *ssl, unsigned char *cookie,
749 unsigned int cookie_len);
750
751 CRYPTO_EX_DATA ex_data; 717 CRYPTO_EX_DATA ex_data;
752 718
753 const EVP_MD *md5; /* For SSLv3/TLSv1 'ssl3-md5' */ 719 const EVP_MD *md5; /* For SSLv3/TLSv1 'ssl3-md5' */
@@ -757,12 +723,9 @@ struct ssl_ctx_st {
757 723
758 /* Default values used when no per-SSL value is defined follow */ 724 /* Default values used when no per-SSL value is defined follow */
759 725
760 void (*info_callback)(const SSL *ssl,int type,int val); /* used if SSL's info_callback is NULL */
761
762 /* what we put in client cert requests */ 726 /* what we put in client cert requests */
763 STACK_OF(X509_NAME) *client_CA; 727 STACK_OF(X509_NAME) *client_CA;
764 728
765
766 /* Default values to use in SSL structures follow (these are copied by SSL_new) */ 729 /* Default values to use in SSL structures follow (these are copied by SSL_new) */
767 730
768 unsigned long options; 731 unsigned long options;
@@ -772,18 +735,9 @@ struct ssl_ctx_st {
772 struct cert_st /* CERT */ *cert; 735 struct cert_st /* CERT */ *cert;
773 int read_ahead; 736 int read_ahead;
774 737
775 /* callback that allows applications to peek at protocol messages */
776 void (*msg_callback)(int write_p, int version, int content_type,
777 const void *buf, size_t len, SSL *ssl, void *arg);
778 void *msg_callback_arg;
779
780 int verify_mode; 738 int verify_mode;
781 unsigned int sid_ctx_length; 739 unsigned int sid_ctx_length;
782 unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH]; 740 unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH];
783 int (*default_verify_callback)(int ok,X509_STORE_CTX *ctx); /* called 'verify_callback' in the SSL */
784
785 /* Default generate session ID callback. */
786 GEN_SESSION_CB generate_session_id;
787 741
788 X509_VERIFY_PARAM *param; 742 X509_VERIFY_PARAM *param;
789 743
@@ -801,21 +755,10 @@ struct ssl_ctx_st {
801 ENGINE *client_cert_engine; 755 ENGINE *client_cert_engine;
802#endif 756#endif
803 757
804 /* TLS extensions servername callback */
805 int (*tlsext_servername_callback)(SSL*, int *, void *);
806 void *tlsext_servername_arg;
807 /* RFC 4507 session ticket keys */ 758 /* RFC 4507 session ticket keys */
808 unsigned char tlsext_tick_key_name[16]; 759 unsigned char tlsext_tick_key_name[16];
809 unsigned char tlsext_tick_hmac_key[16]; 760 unsigned char tlsext_tick_hmac_key[16];
810 unsigned char tlsext_tick_aes_key[16]; 761 unsigned char tlsext_tick_aes_key[16];
811 /* Callback to support customisation of ticket key setting */
812 int (*tlsext_ticket_key_cb)(SSL *ssl, unsigned char *name,
813 unsigned char *iv, EVP_CIPHER_CTX *ectx, HMAC_CTX *hctx, int enc);
814
815 /* certificate status request info */
816 /* Callback for status request */
817 int (*tlsext_status_cb)(SSL *ssl, void *arg);
818 void *tlsext_status_arg;
819 762
820 /* SRTP profiles we are willing to do from RFC 5764 */ 763 /* SRTP profiles we are willing to do from RFC 5764 */
821 STACK_OF(SRTP_PROTECTION_PROFILE) *srtp_profiles; 764 STACK_OF(SRTP_PROTECTION_PROFILE) *srtp_profiles;