diff options
Diffstat (limited to 'src/lib/libssl/ssl.h')
-rw-r--r-- | src/lib/libssl/ssl.h | 313 |
1 files changed, 22 insertions, 291 deletions
diff --git a/src/lib/libssl/ssl.h b/src/lib/libssl/ssl.h index 8b0c2a2dac..8f922eea72 100644 --- a/src/lib/libssl/ssl.h +++ b/src/lib/libssl/ssl.h | |||
@@ -252,7 +252,6 @@ extern "C" { | |||
252 | #define SSL_TXT_kEECDH "kEECDH" | 252 | #define SSL_TXT_kEECDH "kEECDH" |
253 | #define SSL_TXT_kPSK "kPSK" | 253 | #define SSL_TXT_kPSK "kPSK" |
254 | #define SSL_TXT_kGOST "kGOST" | 254 | #define SSL_TXT_kGOST "kGOST" |
255 | #define SSL_TXT_kSRP "kSRP" | ||
256 | 255 | ||
257 | #define SSL_TXT_aRSA "aRSA" | 256 | #define SSL_TXT_aRSA "aRSA" |
258 | #define SSL_TXT_aDSS "aDSS" | 257 | #define SSL_TXT_aDSS "aDSS" |
@@ -276,7 +275,6 @@ extern "C" { | |||
276 | #define SSL_TXT_ECDSA "ECDSA" | 275 | #define SSL_TXT_ECDSA "ECDSA" |
277 | #define SSL_TXT_KRB5 "KRB5" | 276 | #define SSL_TXT_KRB5 "KRB5" |
278 | #define SSL_TXT_PSK "PSK" | 277 | #define SSL_TXT_PSK "PSK" |
279 | #define SSL_TXT_SRP "SRP" | ||
280 | 278 | ||
281 | #define SSL_TXT_DES "DES" | 279 | #define SSL_TXT_DES "DES" |
282 | #define SSL_TXT_3DES "3DES" | 280 | #define SSL_TXT_3DES "3DES" |
@@ -287,7 +285,6 @@ extern "C" { | |||
287 | #define SSL_TXT_AES128 "AES128" | 285 | #define SSL_TXT_AES128 "AES128" |
288 | #define SSL_TXT_AES256 "AES256" | 286 | #define SSL_TXT_AES256 "AES256" |
289 | #define SSL_TXT_AES "AES" | 287 | #define SSL_TXT_AES "AES" |
290 | #define SSL_TXT_AES_GCM "AESGCM" | ||
291 | #define SSL_TXT_CAMELLIA128 "CAMELLIA128" | 288 | #define SSL_TXT_CAMELLIA128 "CAMELLIA128" |
292 | #define SSL_TXT_CAMELLIA256 "CAMELLIA256" | 289 | #define SSL_TXT_CAMELLIA256 "CAMELLIA256" |
293 | #define SSL_TXT_CAMELLIA "CAMELLIA" | 290 | #define SSL_TXT_CAMELLIA "CAMELLIA" |
@@ -297,14 +294,10 @@ extern "C" { | |||
297 | #define SSL_TXT_SHA "SHA" /* same as "SHA1" */ | 294 | #define SSL_TXT_SHA "SHA" /* same as "SHA1" */ |
298 | #define SSL_TXT_GOST94 "GOST94" | 295 | #define SSL_TXT_GOST94 "GOST94" |
299 | #define SSL_TXT_GOST89MAC "GOST89MAC" | 296 | #define SSL_TXT_GOST89MAC "GOST89MAC" |
300 | #define SSL_TXT_SHA256 "SHA256" | ||
301 | #define SSL_TXT_SHA384 "SHA384" | ||
302 | 297 | ||
303 | #define SSL_TXT_SSLV2 "SSLv2" | 298 | #define SSL_TXT_SSLV2 "SSLv2" |
304 | #define SSL_TXT_SSLV3 "SSLv3" | 299 | #define SSL_TXT_SSLV3 "SSLv3" |
305 | #define SSL_TXT_TLSV1 "TLSv1" | 300 | #define SSL_TXT_TLSV1 "TLSv1" |
306 | #define SSL_TXT_TLSV1_1 "TLSv1.1" | ||
307 | #define SSL_TXT_TLSV1_2 "TLSv1.2" | ||
308 | 301 | ||
309 | #define SSL_TXT_EXP "EXP" | 302 | #define SSL_TXT_EXP "EXP" |
310 | #define SSL_TXT_EXPORT "EXPORT" | 303 | #define SSL_TXT_EXPORT "EXPORT" |
@@ -363,29 +356,9 @@ extern "C" { | |||
363 | * in SSL_CTX. */ | 356 | * in SSL_CTX. */ |
364 | typedef struct ssl_st *ssl_crock_st; | 357 | typedef struct ssl_st *ssl_crock_st; |
365 | typedef struct tls_session_ticket_ext_st TLS_SESSION_TICKET_EXT; | 358 | typedef struct tls_session_ticket_ext_st TLS_SESSION_TICKET_EXT; |
366 | typedef struct ssl_method_st SSL_METHOD; | ||
367 | typedef struct ssl_cipher_st SSL_CIPHER; | ||
368 | typedef struct ssl_session_st SSL_SESSION; | ||
369 | |||
370 | DECLARE_STACK_OF(SSL_CIPHER) | ||
371 | |||
372 | /* SRTP protection profiles for use with the use_srtp extension (RFC 5764)*/ | ||
373 | typedef struct srtp_protection_profile_st | ||
374 | { | ||
375 | const char *name; | ||
376 | unsigned long id; | ||
377 | } SRTP_PROTECTION_PROFILE; | ||
378 | |||
379 | DECLARE_STACK_OF(SRTP_PROTECTION_PROFILE) | ||
380 | |||
381 | typedef int (*tls_session_ticket_ext_cb_fn)(SSL *s, const unsigned char *data, int len, void *arg); | ||
382 | typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg); | ||
383 | |||
384 | |||
385 | #ifndef OPENSSL_NO_SSL_INTERN | ||
386 | 359 | ||
387 | /* used to hold info on the particular ciphers used */ | 360 | /* used to hold info on the particular ciphers used */ |
388 | struct ssl_cipher_st | 361 | typedef struct ssl_cipher_st |
389 | { | 362 | { |
390 | int valid; | 363 | int valid; |
391 | const char *name; /* text name */ | 364 | const char *name; /* text name */ |
@@ -402,11 +375,15 @@ struct ssl_cipher_st | |||
402 | unsigned long algorithm2; /* Extra flags */ | 375 | unsigned long algorithm2; /* Extra flags */ |
403 | int strength_bits; /* Number of bits really used */ | 376 | int strength_bits; /* Number of bits really used */ |
404 | int alg_bits; /* Number of bits for algorithm */ | 377 | int alg_bits; /* Number of bits for algorithm */ |
405 | }; | 378 | } SSL_CIPHER; |
379 | |||
380 | DECLARE_STACK_OF(SSL_CIPHER) | ||
406 | 381 | ||
382 | typedef int (*tls_session_ticket_ext_cb_fn)(SSL *s, const unsigned char *data, int len, void *arg); | ||
383 | typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len, STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg); | ||
407 | 384 | ||
408 | /* Used to hold functions for SSLv2 or SSLv3/TLSv1 functions */ | 385 | /* Used to hold functions for SSLv2 or SSLv3/TLSv1 functions */ |
409 | struct ssl_method_st | 386 | typedef struct ssl_method_st |
410 | { | 387 | { |
411 | int version; | 388 | int version; |
412 | int (*ssl_new)(SSL *s); | 389 | int (*ssl_new)(SSL *s); |
@@ -439,7 +416,7 @@ struct ssl_method_st | |||
439 | int (*ssl_version)(void); | 416 | int (*ssl_version)(void); |
440 | long (*ssl_callback_ctrl)(SSL *s, int cb_id, void (*fp)(void)); | 417 | long (*ssl_callback_ctrl)(SSL *s, int cb_id, void (*fp)(void)); |
441 | long (*ssl_ctx_callback_ctrl)(SSL_CTX *s, int cb_id, void (*fp)(void)); | 418 | long (*ssl_ctx_callback_ctrl)(SSL_CTX *s, int cb_id, void (*fp)(void)); |
442 | }; | 419 | } SSL_METHOD; |
443 | 420 | ||
444 | /* Lets make this into an ASN.1 type structure as follows | 421 | /* Lets make this into an ASN.1 type structure as follows |
445 | * SSL_SESSION_ID ::= SEQUENCE { | 422 | * SSL_SESSION_ID ::= SEQUENCE { |
@@ -456,17 +433,14 @@ struct ssl_method_st | |||
456 | * Session_ID_context [ 4 ] EXPLICIT OCTET STRING, -- the Session ID context | 433 | * Session_ID_context [ 4 ] EXPLICIT OCTET STRING, -- the Session ID context |
457 | * Verify_result [ 5 ] EXPLICIT INTEGER, -- X509_V_... code for `Peer' | 434 | * Verify_result [ 5 ] EXPLICIT INTEGER, -- X509_V_... code for `Peer' |
458 | * HostName [ 6 ] EXPLICIT OCTET STRING, -- optional HostName from servername TLS extension | 435 | * HostName [ 6 ] EXPLICIT OCTET STRING, -- optional HostName from servername TLS extension |
459 | * PSK_identity_hint [ 7 ] EXPLICIT OCTET STRING, -- optional PSK identity hint | 436 | * ECPointFormatList [ 7 ] OCTET STRING, -- optional EC point format list from TLS extension |
460 | * PSK_identity [ 8 ] EXPLICIT OCTET STRING, -- optional PSK identity | 437 | * PSK_identity_hint [ 8 ] EXPLICIT OCTET STRING, -- optional PSK identity hint |
461 | * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket | 438 | * PSK_identity [ 9 ] EXPLICIT OCTET STRING -- optional PSK identity |
462 | * Ticket [10] EXPLICIT OCTET STRING, -- session ticket (clients only) | ||
463 | * Compression_meth [11] EXPLICIT OCTET STRING, -- optional compression method | ||
464 | * SRP_username [ 12 ] EXPLICIT OCTET STRING -- optional SRP username | ||
465 | * } | 439 | * } |
466 | * Look in ssl/ssl_asn1.c for more details | 440 | * Look in ssl/ssl_asn1.c for more details |
467 | * I'm using EXPLICIT tags so I can read the damn things using asn1parse :-). | 441 | * I'm using EXPLICIT tags so I can read the damn things using asn1parse :-). |
468 | */ | 442 | */ |
469 | struct ssl_session_st | 443 | typedef struct ssl_session_st |
470 | { | 444 | { |
471 | int ssl_version; /* what ssl version session info is | 445 | int ssl_version; /* what ssl version session info is |
472 | * being kept in here? */ | 446 | * being kept in here? */ |
@@ -538,12 +512,8 @@ struct ssl_session_st | |||
538 | size_t tlsext_ticklen; /* Session ticket length */ | 512 | size_t tlsext_ticklen; /* Session ticket length */ |
539 | long tlsext_tick_lifetime_hint; /* Session lifetime hint in seconds */ | 513 | long tlsext_tick_lifetime_hint; /* Session lifetime hint in seconds */ |
540 | #endif | 514 | #endif |
541 | #ifndef OPENSSL_NO_SRP | 515 | } SSL_SESSION; |
542 | char *srp_username; | ||
543 | #endif | ||
544 | }; | ||
545 | 516 | ||
546 | #endif | ||
547 | 517 | ||
548 | #define SSL_OP_MICROSOFT_SESS_ID_BUG 0x00000001L | 518 | #define SSL_OP_MICROSOFT_SESS_ID_BUG 0x00000001L |
549 | #define SSL_OP_NETSCAPE_CHALLENGE_BUG 0x00000002L | 519 | #define SSL_OP_NETSCAPE_CHALLENGE_BUG 0x00000002L |
@@ -566,7 +536,7 @@ struct ssl_session_st | |||
566 | 536 | ||
567 | /* SSL_OP_ALL: various bug workarounds that should be rather harmless. | 537 | /* SSL_OP_ALL: various bug workarounds that should be rather harmless. |
568 | * This used to be 0x000FFFFFL before 0.9.7. */ | 538 | * This used to be 0x000FFFFFL before 0.9.7. */ |
569 | #define SSL_OP_ALL 0x80000BFFL | 539 | #define SSL_OP_ALL 0x80000FFFL |
570 | 540 | ||
571 | /* DTLS options */ | 541 | /* DTLS options */ |
572 | #define SSL_OP_NO_QUERY_MTU 0x00001000L | 542 | #define SSL_OP_NO_QUERY_MTU 0x00001000L |
@@ -602,17 +572,11 @@ struct ssl_session_st | |||
602 | #define SSL_OP_NO_SSLv2 0x01000000L | 572 | #define SSL_OP_NO_SSLv2 0x01000000L |
603 | #define SSL_OP_NO_SSLv3 0x02000000L | 573 | #define SSL_OP_NO_SSLv3 0x02000000L |
604 | #define SSL_OP_NO_TLSv1 0x04000000L | 574 | #define SSL_OP_NO_TLSv1 0x04000000L |
605 | #define SSL_OP_NO_TLSv1_2 0x08000000L | ||
606 | #define SSL_OP_NO_TLSv1_1 0x10000000L | ||
607 | 575 | ||
608 | /* These next two were never actually used for anything since SSLeay | ||
609 | * zap so we have some more flags. | ||
610 | */ | ||
611 | /* The next flag deliberately changes the ciphertest, this is a check | 576 | /* The next flag deliberately changes the ciphertest, this is a check |
612 | * for the PKCS#1 attack */ | 577 | * for the PKCS#1 attack */ |
613 | #define SSL_OP_PKCS1_CHECK_1 0x0 | 578 | #define SSL_OP_PKCS1_CHECK_1 0x08000000L |
614 | #define SSL_OP_PKCS1_CHECK_2 0x0 | 579 | #define SSL_OP_PKCS1_CHECK_2 0x10000000L |
615 | |||
616 | #define SSL_OP_NETSCAPE_CA_DN_BUG 0x20000000L | 580 | #define SSL_OP_NETSCAPE_CA_DN_BUG 0x20000000L |
617 | #define SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG 0x40000000L | 581 | #define SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG 0x40000000L |
618 | /* Make server add server-hello extension from early version of | 582 | /* Make server add server-hello extension from early version of |
@@ -673,53 +637,12 @@ struct ssl_session_st | |||
673 | #define SSL_get_secure_renegotiation_support(ssl) \ | 637 | #define SSL_get_secure_renegotiation_support(ssl) \ |
674 | SSL_ctrl((ssl), SSL_CTRL_GET_RI_SUPPORT, 0, NULL) | 638 | SSL_ctrl((ssl), SSL_CTRL_GET_RI_SUPPORT, 0, NULL) |
675 | 639 | ||
676 | #ifndef OPENSSL_NO_HEARTBEATS | ||
677 | #define SSL_heartbeat(ssl) \ | ||
678 | SSL_ctrl((ssl),SSL_CTRL_TLS_EXT_SEND_HEARTBEAT,0,NULL) | ||
679 | #endif | ||
680 | |||
681 | void SSL_CTX_set_msg_callback(SSL_CTX *ctx, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)); | 640 | void SSL_CTX_set_msg_callback(SSL_CTX *ctx, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)); |
682 | void SSL_set_msg_callback(SSL *ssl, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)); | 641 | void SSL_set_msg_callback(SSL *ssl, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)); |
683 | #define SSL_CTX_set_msg_callback_arg(ctx, arg) SSL_CTX_ctrl((ctx), SSL_CTRL_SET_MSG_CALLBACK_ARG, 0, (arg)) | 642 | #define SSL_CTX_set_msg_callback_arg(ctx, arg) SSL_CTX_ctrl((ctx), SSL_CTRL_SET_MSG_CALLBACK_ARG, 0, (arg)) |
684 | #define SSL_set_msg_callback_arg(ssl, arg) SSL_ctrl((ssl), SSL_CTRL_SET_MSG_CALLBACK_ARG, 0, (arg)) | 643 | #define SSL_set_msg_callback_arg(ssl, arg) SSL_ctrl((ssl), SSL_CTRL_SET_MSG_CALLBACK_ARG, 0, (arg)) |
685 | 644 | ||
686 | #ifndef OPENSSL_NO_SRP | ||
687 | 645 | ||
688 | #ifndef OPENSSL_NO_SSL_INTERN | ||
689 | |||
690 | typedef struct srp_ctx_st | ||
691 | { | ||
692 | /* param for all the callbacks */ | ||
693 | void *SRP_cb_arg; | ||
694 | /* set client Hello login callback */ | ||
695 | int (*TLS_ext_srp_username_callback)(SSL *, int *, void *); | ||
696 | /* set SRP N/g param callback for verification */ | ||
697 | int (*SRP_verify_param_callback)(SSL *, void *); | ||
698 | /* set SRP client passwd callback */ | ||
699 | char *(*SRP_give_srp_client_pwd_callback)(SSL *, void *); | ||
700 | |||
701 | char *login; | ||
702 | BIGNUM *N,*g,*s,*B,*A; | ||
703 | BIGNUM *a,*b,*v; | ||
704 | char *info; | ||
705 | int strength; | ||
706 | |||
707 | unsigned long srp_Mask; | ||
708 | } SRP_CTX; | ||
709 | |||
710 | #endif | ||
711 | |||
712 | /* see tls_srp.c */ | ||
713 | int SSL_SRP_CTX_init(SSL *s); | ||
714 | int SSL_CTX_SRP_CTX_init(SSL_CTX *ctx); | ||
715 | int SSL_SRP_CTX_free(SSL *ctx); | ||
716 | int SSL_CTX_SRP_CTX_free(SSL_CTX *ctx); | ||
717 | int SSL_srp_server_param_with_username(SSL *s, int *ad); | ||
718 | int SRP_generate_server_master_secret(SSL *s,unsigned char *master_key); | ||
719 | int SRP_Calc_A_param(SSL *s); | ||
720 | int SRP_generate_client_master_secret(SSL *s,unsigned char *master_key); | ||
721 | |||
722 | #endif | ||
723 | 646 | ||
724 | #if defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_WIN32) | 647 | #if defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_WIN32) |
725 | #define SSL_MAX_CERT_LIST_DEFAULT 1024*30 /* 30k max cert list :-) */ | 648 | #define SSL_MAX_CERT_LIST_DEFAULT 1024*30 /* 30k max cert list :-) */ |
@@ -745,11 +668,7 @@ int SRP_generate_client_master_secret(SSL *s,unsigned char *master_key); | |||
745 | typedef int (*GEN_SESSION_CB)(const SSL *ssl, unsigned char *id, | 668 | typedef int (*GEN_SESSION_CB)(const SSL *ssl, unsigned char *id, |
746 | unsigned int *id_len); | 669 | unsigned int *id_len); |
747 | 670 | ||
748 | typedef struct ssl_comp_st SSL_COMP; | 671 | typedef struct ssl_comp_st |
749 | |||
750 | #ifndef OPENSSL_NO_SSL_INTERN | ||
751 | |||
752 | struct ssl_comp_st | ||
753 | { | 672 | { |
754 | int id; | 673 | int id; |
755 | const char *name; | 674 | const char *name; |
@@ -758,7 +677,7 @@ struct ssl_comp_st | |||
758 | #else | 677 | #else |
759 | char *method; | 678 | char *method; |
760 | #endif | 679 | #endif |
761 | }; | 680 | } SSL_COMP; |
762 | 681 | ||
763 | DECLARE_STACK_OF(SSL_COMP) | 682 | DECLARE_STACK_OF(SSL_COMP) |
764 | DECLARE_LHASH_OF(SSL_SESSION); | 683 | DECLARE_LHASH_OF(SSL_SESSION); |
@@ -927,6 +846,7 @@ struct ssl_ctx_st | |||
927 | /* Callback for status request */ | 846 | /* Callback for status request */ |
928 | int (*tlsext_status_cb)(SSL *ssl, void *arg); | 847 | int (*tlsext_status_cb)(SSL *ssl, void *arg); |
929 | void *tlsext_status_arg; | 848 | void *tlsext_status_arg; |
849 | |||
930 | /* draft-rescorla-tls-opaque-prf-input-00.txt information */ | 850 | /* draft-rescorla-tls-opaque-prf-input-00.txt information */ |
931 | int (*tlsext_opaque_prf_input_callback)(SSL *, void *peerinput, size_t len, void *arg); | 851 | int (*tlsext_opaque_prf_input_callback)(SSL *, void *peerinput, size_t len, void *arg); |
932 | void *tlsext_opaque_prf_input_callback_arg; | 852 | void *tlsext_opaque_prf_input_callback_arg; |
@@ -947,36 +867,8 @@ struct ssl_ctx_st | |||
947 | struct ssl3_buf_freelist_st *wbuf_freelist; | 867 | struct ssl3_buf_freelist_st *wbuf_freelist; |
948 | struct ssl3_buf_freelist_st *rbuf_freelist; | 868 | struct ssl3_buf_freelist_st *rbuf_freelist; |
949 | #endif | 869 | #endif |
950 | #ifndef OPENSSL_NO_SRP | ||
951 | SRP_CTX srp_ctx; /* ctx for SRP authentication */ | ||
952 | #endif | ||
953 | |||
954 | #ifndef OPENSSL_NO_TLSEXT | ||
955 | # ifndef OPENSSL_NO_NEXTPROTONEG | ||
956 | /* Next protocol negotiation information */ | ||
957 | /* (for experimental NPN extension). */ | ||
958 | |||
959 | /* For a server, this contains a callback function by which the set of | ||
960 | * advertised protocols can be provided. */ | ||
961 | int (*next_protos_advertised_cb)(SSL *s, const unsigned char **buf, | ||
962 | unsigned int *len, void *arg); | ||
963 | void *next_protos_advertised_cb_arg; | ||
964 | /* For a client, this contains a callback function that selects the | ||
965 | * next protocol from the list provided by the server. */ | ||
966 | int (*next_proto_select_cb)(SSL *s, unsigned char **out, | ||
967 | unsigned char *outlen, | ||
968 | const unsigned char *in, | ||
969 | unsigned int inlen, | ||
970 | void *arg); | ||
971 | void *next_proto_select_cb_arg; | ||
972 | # endif | ||
973 | /* SRTP profiles we are willing to do from RFC 5764 */ | ||
974 | STACK_OF(SRTP_PROTECTION_PROFILE) *srtp_profiles; | ||
975 | #endif | ||
976 | }; | 870 | }; |
977 | 871 | ||
978 | #endif | ||
979 | |||
980 | #define SSL_SESS_CACHE_OFF 0x0000 | 872 | #define SSL_SESS_CACHE_OFF 0x0000 |
981 | #define SSL_SESS_CACHE_CLIENT 0x0001 | 873 | #define SSL_SESS_CACHE_CLIENT 0x0001 |
982 | #define SSL_SESS_CACHE_SERVER 0x0002 | 874 | #define SSL_SESS_CACHE_SERVER 0x0002 |
@@ -1029,32 +921,6 @@ int SSL_CTX_set_client_cert_engine(SSL_CTX *ctx, ENGINE *e); | |||
1029 | #endif | 921 | #endif |
1030 | void SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*app_gen_cookie_cb)(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len)); | 922 | void SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*app_gen_cookie_cb)(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len)); |
1031 | void SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*app_verify_cookie_cb)(SSL *ssl, unsigned char *cookie, unsigned int cookie_len)); | 923 | void SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*app_verify_cookie_cb)(SSL *ssl, unsigned char *cookie, unsigned int cookie_len)); |
1032 | #ifndef OPENSSL_NO_NEXTPROTONEG | ||
1033 | void SSL_CTX_set_next_protos_advertised_cb(SSL_CTX *s, | ||
1034 | int (*cb) (SSL *ssl, | ||
1035 | const unsigned char **out, | ||
1036 | unsigned int *outlen, | ||
1037 | void *arg), | ||
1038 | void *arg); | ||
1039 | void SSL_CTX_set_next_proto_select_cb(SSL_CTX *s, | ||
1040 | int (*cb) (SSL *ssl, | ||
1041 | unsigned char **out, | ||
1042 | unsigned char *outlen, | ||
1043 | const unsigned char *in, | ||
1044 | unsigned int inlen, | ||
1045 | void *arg), | ||
1046 | void *arg); | ||
1047 | |||
1048 | int SSL_select_next_proto(unsigned char **out, unsigned char *outlen, | ||
1049 | const unsigned char *in, unsigned int inlen, | ||
1050 | const unsigned char *client, unsigned int client_len); | ||
1051 | void SSL_get0_next_proto_negotiated(const SSL *s, | ||
1052 | const unsigned char **data, unsigned *len); | ||
1053 | |||
1054 | #define OPENSSL_NPN_UNSUPPORTED 0 | ||
1055 | #define OPENSSL_NPN_NEGOTIATED 1 | ||
1056 | #define OPENSSL_NPN_NO_OVERLAP 2 | ||
1057 | #endif | ||
1058 | 924 | ||
1059 | #ifndef OPENSSL_NO_PSK | 925 | #ifndef OPENSSL_NO_PSK |
1060 | /* the maximum length of the buffer given to callbacks containing the | 926 | /* the maximum length of the buffer given to callbacks containing the |
@@ -1095,8 +961,6 @@ const char *SSL_get_psk_identity(const SSL *s); | |||
1095 | #define SSL_MAC_FLAG_READ_MAC_STREAM 1 | 961 | #define SSL_MAC_FLAG_READ_MAC_STREAM 1 |
1096 | #define SSL_MAC_FLAG_WRITE_MAC_STREAM 2 | 962 | #define SSL_MAC_FLAG_WRITE_MAC_STREAM 2 |
1097 | 963 | ||
1098 | #ifndef OPENSSL_NO_SSL_INTERN | ||
1099 | |||
1100 | struct ssl_st | 964 | struct ssl_st |
1101 | { | 965 | { |
1102 | /* protocol version | 966 | /* protocol version |
@@ -1141,7 +1005,9 @@ struct ssl_st | |||
1141 | 1005 | ||
1142 | int server; /* are we the server side? - mostly used by SSL_clear*/ | 1006 | int server; /* are we the server side? - mostly used by SSL_clear*/ |
1143 | 1007 | ||
1144 | int new_session;/* Generate a new session or reuse an old one. | 1008 | int new_session;/* 1 if we are to use a new session. |
1009 | * 2 if we are a server and are inside a handshake | ||
1010 | * (i.e. not just sending a HelloRequest) | ||
1145 | * NB: For servers, the 'new' session may actually be a previously | 1011 | * NB: For servers, the 'new' session may actually be a previously |
1146 | * cached session or even the previous session unless | 1012 | * cached session or even the previous session unless |
1147 | * SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION is set */ | 1013 | * SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION is set */ |
@@ -1311,46 +1177,12 @@ struct ssl_st | |||
1311 | void *tls_session_secret_cb_arg; | 1177 | void *tls_session_secret_cb_arg; |
1312 | 1178 | ||
1313 | SSL_CTX * initial_ctx; /* initial ctx, used to store sessions */ | 1179 | SSL_CTX * initial_ctx; /* initial ctx, used to store sessions */ |
1314 | |||
1315 | #ifndef OPENSSL_NO_NEXTPROTONEG | ||
1316 | /* Next protocol negotiation. For the client, this is the protocol that | ||
1317 | * we sent in NextProtocol and is set when handling ServerHello | ||
1318 | * extensions. | ||
1319 | * | ||
1320 | * For a server, this is the client's selected_protocol from | ||
1321 | * NextProtocol and is set when handling the NextProtocol message, | ||
1322 | * before the Finished message. */ | ||
1323 | unsigned char *next_proto_negotiated; | ||
1324 | unsigned char next_proto_negotiated_len; | ||
1325 | #endif | ||
1326 | |||
1327 | #define session_ctx initial_ctx | 1180 | #define session_ctx initial_ctx |
1328 | |||
1329 | STACK_OF(SRTP_PROTECTION_PROFILE) *srtp_profiles; /* What we'll do */ | ||
1330 | SRTP_PROTECTION_PROFILE *srtp_profile; /* What's been chosen */ | ||
1331 | |||
1332 | unsigned int tlsext_heartbeat; /* Is use of the Heartbeat extension negotiated? | ||
1333 | 0: disabled | ||
1334 | 1: enabled | ||
1335 | 2: enabled, but not allowed to send Requests | ||
1336 | */ | ||
1337 | unsigned int tlsext_hb_pending; /* Indicates if a HeartbeatRequest is in flight */ | ||
1338 | unsigned int tlsext_hb_seq; /* HeartbeatRequest sequence number */ | ||
1339 | #else | 1181 | #else |
1340 | #define session_ctx ctx | 1182 | #define session_ctx ctx |
1341 | #endif /* OPENSSL_NO_TLSEXT */ | 1183 | #endif /* OPENSSL_NO_TLSEXT */ |
1342 | |||
1343 | int renegotiate;/* 1 if we are renegotiating. | ||
1344 | * 2 if we are a server and are inside a handshake | ||
1345 | * (i.e. not just sending a HelloRequest) */ | ||
1346 | |||
1347 | #ifndef OPENSSL_NO_SRP | ||
1348 | SRP_CTX srp_ctx; /* ctx for SRP authentication */ | ||
1349 | #endif | ||
1350 | }; | 1184 | }; |
1351 | 1185 | ||
1352 | #endif | ||
1353 | |||
1354 | #ifdef __cplusplus | 1186 | #ifdef __cplusplus |
1355 | } | 1187 | } |
1356 | #endif | 1188 | #endif |
@@ -1360,7 +1192,6 @@ struct ssl_st | |||
1360 | #include <openssl/tls1.h> /* This is mostly sslv3 with a few tweaks */ | 1192 | #include <openssl/tls1.h> /* This is mostly sslv3 with a few tweaks */ |
1361 | #include <openssl/dtls1.h> /* Datagram TLS */ | 1193 | #include <openssl/dtls1.h> /* Datagram TLS */ |
1362 | #include <openssl/ssl23.h> | 1194 | #include <openssl/ssl23.h> |
1363 | #include <openssl/srtp.h> /* Support for the use_srtp extension */ | ||
1364 | 1195 | ||
1365 | #ifdef __cplusplus | 1196 | #ifdef __cplusplus |
1366 | extern "C" { | 1197 | extern "C" { |
@@ -1577,20 +1408,6 @@ DECLARE_PEM_rw(SSL_SESSION, SSL_SESSION) | |||
1577 | #define SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP 71 | 1408 | #define SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP 71 |
1578 | 1409 | ||
1579 | #define SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB 72 | 1410 | #define SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB 72 |
1580 | |||
1581 | #define SSL_CTRL_SET_TLS_EXT_SRP_USERNAME_CB 75 | ||
1582 | #define SSL_CTRL_SET_SRP_VERIFY_PARAM_CB 76 | ||
1583 | #define SSL_CTRL_SET_SRP_GIVE_CLIENT_PWD_CB 77 | ||
1584 | |||
1585 | #define SSL_CTRL_SET_SRP_ARG 78 | ||
1586 | #define SSL_CTRL_SET_TLS_EXT_SRP_USERNAME 79 | ||
1587 | #define SSL_CTRL_SET_TLS_EXT_SRP_STRENGTH 80 | ||
1588 | #define SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD 81 | ||
1589 | #ifndef OPENSSL_NO_HEARTBEATS | ||
1590 | #define SSL_CTRL_TLS_EXT_SEND_HEARTBEAT 85 | ||
1591 | #define SSL_CTRL_GET_TLS_EXT_HEARTBEAT_PENDING 86 | ||
1592 | #define SSL_CTRL_SET_TLS_EXT_HEARTBEAT_NO_REQUESTS 87 | ||
1593 | #endif | ||
1594 | #endif | 1411 | #endif |
1595 | 1412 | ||
1596 | #define DTLS_CTRL_GET_TIMEOUT 73 | 1413 | #define DTLS_CTRL_GET_TIMEOUT 73 |
@@ -1601,9 +1418,6 @@ DECLARE_PEM_rw(SSL_SESSION, SSL_SESSION) | |||
1601 | #define SSL_CTRL_CLEAR_OPTIONS 77 | 1418 | #define SSL_CTRL_CLEAR_OPTIONS 77 |
1602 | #define SSL_CTRL_CLEAR_MODE 78 | 1419 | #define SSL_CTRL_CLEAR_MODE 78 |
1603 | 1420 | ||
1604 | #define SSL_CTRL_GET_EXTRA_CHAIN_CERTS 82 | ||
1605 | #define SSL_CTRL_CLEAR_EXTRA_CHAIN_CERTS 83 | ||
1606 | |||
1607 | #define DTLSv1_get_timeout(ssl, arg) \ | 1421 | #define DTLSv1_get_timeout(ssl, arg) \ |
1608 | SSL_ctrl(ssl,DTLS_CTRL_GET_TIMEOUT,0, (void *)arg) | 1422 | SSL_ctrl(ssl,DTLS_CTRL_GET_TIMEOUT,0, (void *)arg) |
1609 | #define DTLSv1_handle_timeout(ssl) \ | 1423 | #define DTLSv1_handle_timeout(ssl) \ |
@@ -1640,10 +1454,6 @@ DECLARE_PEM_rw(SSL_SESSION, SSL_SESSION) | |||
1640 | 1454 | ||
1641 | #define SSL_CTX_add_extra_chain_cert(ctx,x509) \ | 1455 | #define SSL_CTX_add_extra_chain_cert(ctx,x509) \ |
1642 | SSL_CTX_ctrl(ctx,SSL_CTRL_EXTRA_CHAIN_CERT,0,(char *)x509) | 1456 | SSL_CTX_ctrl(ctx,SSL_CTRL_EXTRA_CHAIN_CERT,0,(char *)x509) |
1643 | #define SSL_CTX_get_extra_chain_certs(ctx,px509) \ | ||
1644 | SSL_CTX_ctrl(ctx,SSL_CTRL_GET_EXTRA_CHAIN_CERTS,0,px509) | ||
1645 | #define SSL_CTX_clear_extra_chain_certs(ctx) \ | ||
1646 | SSL_CTX_ctrl(ctx,SSL_CTRL_CLEAR_EXTRA_CHAIN_CERTS,0,NULL) | ||
1647 | 1457 | ||
1648 | #ifndef OPENSSL_NO_BIO | 1458 | #ifndef OPENSSL_NO_BIO |
1649 | BIO_METHOD *BIO_f_ssl(void); | 1459 | BIO_METHOD *BIO_f_ssl(void); |
@@ -1671,7 +1481,6 @@ const SSL_CIPHER *SSL_get_current_cipher(const SSL *s); | |||
1671 | int SSL_CIPHER_get_bits(const SSL_CIPHER *c,int *alg_bits); | 1481 | int SSL_CIPHER_get_bits(const SSL_CIPHER *c,int *alg_bits); |
1672 | char * SSL_CIPHER_get_version(const SSL_CIPHER *c); | 1482 | char * SSL_CIPHER_get_version(const SSL_CIPHER *c); |
1673 | const char * SSL_CIPHER_get_name(const SSL_CIPHER *c); | 1483 | const char * SSL_CIPHER_get_name(const SSL_CIPHER *c); |
1674 | unsigned long SSL_CIPHER_get_id(const SSL_CIPHER *c); | ||
1675 | 1484 | ||
1676 | int SSL_get_fd(const SSL *s); | 1485 | int SSL_get_fd(const SSL *s); |
1677 | int SSL_get_rfd(const SSL *s); | 1486 | int SSL_get_rfd(const SSL *s); |
@@ -1737,14 +1546,10 @@ long SSL_SESSION_set_time(SSL_SESSION *s, long t); | |||
1737 | long SSL_SESSION_get_timeout(const SSL_SESSION *s); | 1546 | long SSL_SESSION_get_timeout(const SSL_SESSION *s); |
1738 | long SSL_SESSION_set_timeout(SSL_SESSION *s, long t); | 1547 | long SSL_SESSION_set_timeout(SSL_SESSION *s, long t); |
1739 | void SSL_copy_session_id(SSL *to,const SSL *from); | 1548 | void SSL_copy_session_id(SSL *to,const SSL *from); |
1740 | X509 *SSL_SESSION_get0_peer(SSL_SESSION *s); | ||
1741 | int SSL_SESSION_set1_id_context(SSL_SESSION *s,const unsigned char *sid_ctx, | ||
1742 | unsigned int sid_ctx_len); | ||
1743 | 1549 | ||
1744 | SSL_SESSION *SSL_SESSION_new(void); | 1550 | SSL_SESSION *SSL_SESSION_new(void); |
1745 | const unsigned char *SSL_SESSION_get_id(const SSL_SESSION *s, | 1551 | const unsigned char *SSL_SESSION_get_id(const SSL_SESSION *s, |
1746 | unsigned int *len); | 1552 | unsigned int *len); |
1747 | unsigned int SSL_SESSION_get_compress_id(const SSL_SESSION *s); | ||
1748 | #ifndef OPENSSL_NO_FP_API | 1553 | #ifndef OPENSSL_NO_FP_API |
1749 | int SSL_SESSION_print_fp(FILE *fp,const SSL_SESSION *ses); | 1554 | int SSL_SESSION_print_fp(FILE *fp,const SSL_SESSION *ses); |
1750 | #endif | 1555 | #endif |
@@ -1807,30 +1612,6 @@ int SSL_set_trust(SSL *s, int trust); | |||
1807 | int SSL_CTX_set1_param(SSL_CTX *ctx, X509_VERIFY_PARAM *vpm); | 1612 | int SSL_CTX_set1_param(SSL_CTX *ctx, X509_VERIFY_PARAM *vpm); |
1808 | int SSL_set1_param(SSL *ssl, X509_VERIFY_PARAM *vpm); | 1613 | int SSL_set1_param(SSL *ssl, X509_VERIFY_PARAM *vpm); |
1809 | 1614 | ||
1810 | #ifndef OPENSSL_NO_SRP | ||
1811 | int SSL_CTX_set_srp_username(SSL_CTX *ctx,char *name); | ||
1812 | int SSL_CTX_set_srp_password(SSL_CTX *ctx,char *password); | ||
1813 | int SSL_CTX_set_srp_strength(SSL_CTX *ctx, int strength); | ||
1814 | int SSL_CTX_set_srp_client_pwd_callback(SSL_CTX *ctx, | ||
1815 | char *(*cb)(SSL *,void *)); | ||
1816 | int SSL_CTX_set_srp_verify_param_callback(SSL_CTX *ctx, | ||
1817 | int (*cb)(SSL *,void *)); | ||
1818 | int SSL_CTX_set_srp_username_callback(SSL_CTX *ctx, | ||
1819 | int (*cb)(SSL *,int *,void *)); | ||
1820 | int SSL_CTX_set_srp_cb_arg(SSL_CTX *ctx, void *arg); | ||
1821 | |||
1822 | int SSL_set_srp_server_param(SSL *s, const BIGNUM *N, const BIGNUM *g, | ||
1823 | BIGNUM *sa, BIGNUM *v, char *info); | ||
1824 | int SSL_set_srp_server_param_pw(SSL *s, const char *user, const char *pass, | ||
1825 | const char *grp); | ||
1826 | |||
1827 | BIGNUM *SSL_get_srp_g(SSL *s); | ||
1828 | BIGNUM *SSL_get_srp_N(SSL *s); | ||
1829 | |||
1830 | char *SSL_get_srp_username(SSL *s); | ||
1831 | char *SSL_get_srp_userinfo(SSL *s); | ||
1832 | #endif | ||
1833 | |||
1834 | void SSL_free(SSL *ssl); | 1615 | void SSL_free(SSL *ssl); |
1835 | int SSL_accept(SSL *ssl); | 1616 | int SSL_accept(SSL *ssl); |
1836 | int SSL_connect(SSL *ssl); | 1617 | int SSL_connect(SSL *ssl); |
@@ -1866,15 +1647,6 @@ const SSL_METHOD *TLSv1_method(void); /* TLSv1.0 */ | |||
1866 | const SSL_METHOD *TLSv1_server_method(void); /* TLSv1.0 */ | 1647 | const SSL_METHOD *TLSv1_server_method(void); /* TLSv1.0 */ |
1867 | const SSL_METHOD *TLSv1_client_method(void); /* TLSv1.0 */ | 1648 | const SSL_METHOD *TLSv1_client_method(void); /* TLSv1.0 */ |
1868 | 1649 | ||
1869 | const SSL_METHOD *TLSv1_1_method(void); /* TLSv1.1 */ | ||
1870 | const SSL_METHOD *TLSv1_1_server_method(void); /* TLSv1.1 */ | ||
1871 | const SSL_METHOD *TLSv1_1_client_method(void); /* TLSv1.1 */ | ||
1872 | |||
1873 | const SSL_METHOD *TLSv1_2_method(void); /* TLSv1.2 */ | ||
1874 | const SSL_METHOD *TLSv1_2_server_method(void); /* TLSv1.2 */ | ||
1875 | const SSL_METHOD *TLSv1_2_client_method(void); /* TLSv1.2 */ | ||
1876 | |||
1877 | |||
1878 | const SSL_METHOD *DTLSv1_method(void); /* DTLSv1.0 */ | 1650 | const SSL_METHOD *DTLSv1_method(void); /* DTLSv1.0 */ |
1879 | const SSL_METHOD *DTLSv1_server_method(void); /* DTLSv1.0 */ | 1651 | const SSL_METHOD *DTLSv1_server_method(void); /* DTLSv1.0 */ |
1880 | const SSL_METHOD *DTLSv1_client_method(void); /* DTLSv1.0 */ | 1652 | const SSL_METHOD *DTLSv1_client_method(void); /* DTLSv1.0 */ |
@@ -1883,7 +1655,6 @@ STACK_OF(SSL_CIPHER) *SSL_get_ciphers(const SSL *s); | |||
1883 | 1655 | ||
1884 | int SSL_do_handshake(SSL *s); | 1656 | int SSL_do_handshake(SSL *s); |
1885 | int SSL_renegotiate(SSL *s); | 1657 | int SSL_renegotiate(SSL *s); |
1886 | int SSL_renegotiate_abbreviated(SSL *s); | ||
1887 | int SSL_renegotiate_pending(SSL *s); | 1658 | int SSL_renegotiate_pending(SSL *s); |
1888 | int SSL_shutdown(SSL *s); | 1659 | int SSL_shutdown(SSL *s); |
1889 | 1660 | ||
@@ -1935,7 +1706,6 @@ void SSL_set_info_callback(SSL *ssl, | |||
1935 | void (*cb)(const SSL *ssl,int type,int val)); | 1706 | void (*cb)(const SSL *ssl,int type,int val)); |
1936 | void (*SSL_get_info_callback(const SSL *ssl))(const SSL *ssl,int type,int val); | 1707 | void (*SSL_get_info_callback(const SSL *ssl))(const SSL *ssl,int type,int val); |
1937 | int SSL_state(const SSL *ssl); | 1708 | int SSL_state(const SSL *ssl); |
1938 | void SSL_set_state(SSL *ssl, int state); | ||
1939 | 1709 | ||
1940 | void SSL_set_verify_result(SSL *ssl,long v); | 1710 | void SSL_set_verify_result(SSL *ssl,long v); |
1941 | long SSL_get_verify_result(const SSL *ssl); | 1711 | long SSL_get_verify_result(const SSL *ssl); |
@@ -2036,9 +1806,6 @@ int SSL_set_session_ticket_ext_cb(SSL *s, tls_session_ticket_ext_cb_fn cb, | |||
2036 | /* Pre-shared secret session resumption functions */ | 1806 | /* Pre-shared secret session resumption functions */ |
2037 | int SSL_set_session_secret_cb(SSL *s, tls_session_secret_cb_fn tls_session_secret_cb, void *arg); | 1807 | int SSL_set_session_secret_cb(SSL *s, tls_session_secret_cb_fn tls_session_secret_cb, void *arg); |
2038 | 1808 | ||
2039 | void SSL_set_debug(SSL *s, int debug); | ||
2040 | int SSL_cache_hit(SSL *s); | ||
2041 | |||
2042 | /* BEGIN ERROR CODES */ | 1809 | /* BEGIN ERROR CODES */ |
2043 | /* The following lines are auto generated by the script mkerr.pl. Any changes | 1810 | /* The following lines are auto generated by the script mkerr.pl. Any changes |
2044 | * made after this point may be overwritten when the script is next run. | 1811 | * made after this point may be overwritten when the script is next run. |
@@ -2058,7 +1825,6 @@ void ERR_load_SSL_strings(void); | |||
2058 | #define SSL_F_DTLS1_ACCEPT 246 | 1825 | #define SSL_F_DTLS1_ACCEPT 246 |
2059 | #define SSL_F_DTLS1_ADD_CERT_TO_BUF 295 | 1826 | #define SSL_F_DTLS1_ADD_CERT_TO_BUF 295 |
2060 | #define SSL_F_DTLS1_BUFFER_RECORD 247 | 1827 | #define SSL_F_DTLS1_BUFFER_RECORD 247 |
2061 | #define SSL_F_DTLS1_CHECK_TIMEOUT_NUM 316 | ||
2062 | #define SSL_F_DTLS1_CLIENT_HELLO 248 | 1828 | #define SSL_F_DTLS1_CLIENT_HELLO 248 |
2063 | #define SSL_F_DTLS1_CONNECT 249 | 1829 | #define SSL_F_DTLS1_CONNECT 249 |
2064 | #define SSL_F_DTLS1_ENC 250 | 1830 | #define SSL_F_DTLS1_ENC 250 |
@@ -2067,7 +1833,6 @@ void ERR_load_SSL_strings(void); | |||
2067 | #define SSL_F_DTLS1_GET_MESSAGE_FRAGMENT 253 | 1833 | #define SSL_F_DTLS1_GET_MESSAGE_FRAGMENT 253 |
2068 | #define SSL_F_DTLS1_GET_RECORD 254 | 1834 | #define SSL_F_DTLS1_GET_RECORD 254 |
2069 | #define SSL_F_DTLS1_HANDLE_TIMEOUT 297 | 1835 | #define SSL_F_DTLS1_HANDLE_TIMEOUT 297 |
2070 | #define SSL_F_DTLS1_HEARTBEAT 305 | ||
2071 | #define SSL_F_DTLS1_OUTPUT_CERT_CHAIN 255 | 1836 | #define SSL_F_DTLS1_OUTPUT_CERT_CHAIN 255 |
2072 | #define SSL_F_DTLS1_PREPROCESS_FRAGMENT 288 | 1837 | #define SSL_F_DTLS1_PREPROCESS_FRAGMENT 288 |
2073 | #define SSL_F_DTLS1_PROCESS_OUT_OF_SEQ_MESSAGE 256 | 1838 | #define SSL_F_DTLS1_PROCESS_OUT_OF_SEQ_MESSAGE 256 |
@@ -2136,7 +1901,6 @@ void ERR_load_SSL_strings(void); | |||
2136 | #define SSL_F_SSL3_GET_KEY_EXCHANGE 141 | 1901 | #define SSL_F_SSL3_GET_KEY_EXCHANGE 141 |
2137 | #define SSL_F_SSL3_GET_MESSAGE 142 | 1902 | #define SSL_F_SSL3_GET_MESSAGE 142 |
2138 | #define SSL_F_SSL3_GET_NEW_SESSION_TICKET 283 | 1903 | #define SSL_F_SSL3_GET_NEW_SESSION_TICKET 283 |
2139 | #define SSL_F_SSL3_GET_NEXT_PROTO 306 | ||
2140 | #define SSL_F_SSL3_GET_RECORD 143 | 1904 | #define SSL_F_SSL3_GET_RECORD 143 |
2141 | #define SSL_F_SSL3_GET_SERVER_CERTIFICATE 144 | 1905 | #define SSL_F_SSL3_GET_SERVER_CERTIFICATE 144 |
2142 | #define SSL_F_SSL3_GET_SERVER_DONE 145 | 1906 | #define SSL_F_SSL3_GET_SERVER_DONE 145 |
@@ -2161,12 +1925,10 @@ void ERR_load_SSL_strings(void); | |||
2161 | #define SSL_F_SSL3_WRITE_PENDING 159 | 1925 | #define SSL_F_SSL3_WRITE_PENDING 159 |
2162 | #define SSL_F_SSL_ADD_CLIENTHELLO_RENEGOTIATE_EXT 298 | 1926 | #define SSL_F_SSL_ADD_CLIENTHELLO_RENEGOTIATE_EXT 298 |
2163 | #define SSL_F_SSL_ADD_CLIENTHELLO_TLSEXT 277 | 1927 | #define SSL_F_SSL_ADD_CLIENTHELLO_TLSEXT 277 |
2164 | #define SSL_F_SSL_ADD_CLIENTHELLO_USE_SRTP_EXT 307 | ||
2165 | #define SSL_F_SSL_ADD_DIR_CERT_SUBJECTS_TO_STACK 215 | 1928 | #define SSL_F_SSL_ADD_DIR_CERT_SUBJECTS_TO_STACK 215 |
2166 | #define SSL_F_SSL_ADD_FILE_CERT_SUBJECTS_TO_STACK 216 | 1929 | #define SSL_F_SSL_ADD_FILE_CERT_SUBJECTS_TO_STACK 216 |
2167 | #define SSL_F_SSL_ADD_SERVERHELLO_RENEGOTIATE_EXT 299 | 1930 | #define SSL_F_SSL_ADD_SERVERHELLO_RENEGOTIATE_EXT 299 |
2168 | #define SSL_F_SSL_ADD_SERVERHELLO_TLSEXT 278 | 1931 | #define SSL_F_SSL_ADD_SERVERHELLO_TLSEXT 278 |
2169 | #define SSL_F_SSL_ADD_SERVERHELLO_USE_SRTP_EXT 308 | ||
2170 | #define SSL_F_SSL_BAD_METHOD 160 | 1932 | #define SSL_F_SSL_BAD_METHOD 160 |
2171 | #define SSL_F_SSL_BYTES_TO_CIPHER_LIST 161 | 1933 | #define SSL_F_SSL_BYTES_TO_CIPHER_LIST 161 |
2172 | #define SSL_F_SSL_CERT_DUP 221 | 1934 | #define SSL_F_SSL_CERT_DUP 221 |
@@ -2183,7 +1945,6 @@ void ERR_load_SSL_strings(void); | |||
2183 | #define SSL_F_SSL_CREATE_CIPHER_LIST 166 | 1945 | #define SSL_F_SSL_CREATE_CIPHER_LIST 166 |
2184 | #define SSL_F_SSL_CTRL 232 | 1946 | #define SSL_F_SSL_CTRL 232 |
2185 | #define SSL_F_SSL_CTX_CHECK_PRIVATE_KEY 168 | 1947 | #define SSL_F_SSL_CTX_CHECK_PRIVATE_KEY 168 |
2186 | #define SSL_F_SSL_CTX_MAKE_PROFILES 309 | ||
2187 | #define SSL_F_SSL_CTX_NEW 169 | 1948 | #define SSL_F_SSL_CTX_NEW 169 |
2188 | #define SSL_F_SSL_CTX_SET_CIPHER_LIST 269 | 1949 | #define SSL_F_SSL_CTX_SET_CIPHER_LIST 269 |
2189 | #define SSL_F_SSL_CTX_SET_CLIENT_CERT_ENGINE 290 | 1950 | #define SSL_F_SSL_CTX_SET_CLIENT_CERT_ENGINE 290 |
@@ -2212,10 +1973,8 @@ void ERR_load_SSL_strings(void); | |||
2212 | #define SSL_F_SSL_NEW 186 | 1973 | #define SSL_F_SSL_NEW 186 |
2213 | #define SSL_F_SSL_PARSE_CLIENTHELLO_RENEGOTIATE_EXT 300 | 1974 | #define SSL_F_SSL_PARSE_CLIENTHELLO_RENEGOTIATE_EXT 300 |
2214 | #define SSL_F_SSL_PARSE_CLIENTHELLO_TLSEXT 302 | 1975 | #define SSL_F_SSL_PARSE_CLIENTHELLO_TLSEXT 302 |
2215 | #define SSL_F_SSL_PARSE_CLIENTHELLO_USE_SRTP_EXT 310 | ||
2216 | #define SSL_F_SSL_PARSE_SERVERHELLO_RENEGOTIATE_EXT 301 | 1976 | #define SSL_F_SSL_PARSE_SERVERHELLO_RENEGOTIATE_EXT 301 |
2217 | #define SSL_F_SSL_PARSE_SERVERHELLO_TLSEXT 303 | 1977 | #define SSL_F_SSL_PARSE_SERVERHELLO_TLSEXT 303 |
2218 | #define SSL_F_SSL_PARSE_SERVERHELLO_USE_SRTP_EXT 311 | ||
2219 | #define SSL_F_SSL_PEEK 270 | 1978 | #define SSL_F_SSL_PEEK 270 |
2220 | #define SSL_F_SSL_PREPARE_CLIENTHELLO_TLSEXT 281 | 1979 | #define SSL_F_SSL_PREPARE_CLIENTHELLO_TLSEXT 281 |
2221 | #define SSL_F_SSL_PREPARE_SERVERHELLO_TLSEXT 282 | 1980 | #define SSL_F_SSL_PREPARE_SERVERHELLO_TLSEXT 282 |
@@ -2224,7 +1983,6 @@ void ERR_load_SSL_strings(void); | |||
2224 | #define SSL_F_SSL_RSA_PUBLIC_ENCRYPT 188 | 1983 | #define SSL_F_SSL_RSA_PUBLIC_ENCRYPT 188 |
2225 | #define SSL_F_SSL_SESSION_NEW 189 | 1984 | #define SSL_F_SSL_SESSION_NEW 189 |
2226 | #define SSL_F_SSL_SESSION_PRINT_FP 190 | 1985 | #define SSL_F_SSL_SESSION_PRINT_FP 190 |
2227 | #define SSL_F_SSL_SESSION_SET1_ID_CONTEXT 312 | ||
2228 | #define SSL_F_SSL_SESS_CERT_NEW 225 | 1986 | #define SSL_F_SSL_SESS_CERT_NEW 225 |
2229 | #define SSL_F_SSL_SET_CERT 191 | 1987 | #define SSL_F_SSL_SET_CERT 191 |
2230 | #define SSL_F_SSL_SET_CIPHER_LIST 271 | 1988 | #define SSL_F_SSL_SET_CIPHER_LIST 271 |
@@ -2238,7 +1996,6 @@ void ERR_load_SSL_strings(void); | |||
2238 | #define SSL_F_SSL_SET_TRUST 228 | 1996 | #define SSL_F_SSL_SET_TRUST 228 |
2239 | #define SSL_F_SSL_SET_WFD 196 | 1997 | #define SSL_F_SSL_SET_WFD 196 |
2240 | #define SSL_F_SSL_SHUTDOWN 224 | 1998 | #define SSL_F_SSL_SHUTDOWN 224 |
2241 | #define SSL_F_SSL_SRP_CTX_INIT 313 | ||
2242 | #define SSL_F_SSL_UNDEFINED_CONST_FUNCTION 243 | 1999 | #define SSL_F_SSL_UNDEFINED_CONST_FUNCTION 243 |
2243 | #define SSL_F_SSL_UNDEFINED_FUNCTION 197 | 2000 | #define SSL_F_SSL_UNDEFINED_FUNCTION 197 |
2244 | #define SSL_F_SSL_UNDEFINED_VOID_FUNCTION 244 | 2001 | #define SSL_F_SSL_UNDEFINED_VOID_FUNCTION 244 |
@@ -2258,8 +2015,6 @@ void ERR_load_SSL_strings(void); | |||
2258 | #define SSL_F_TLS1_CHANGE_CIPHER_STATE 209 | 2015 | #define SSL_F_TLS1_CHANGE_CIPHER_STATE 209 |
2259 | #define SSL_F_TLS1_CHECK_SERVERHELLO_TLSEXT 274 | 2016 | #define SSL_F_TLS1_CHECK_SERVERHELLO_TLSEXT 274 |
2260 | #define SSL_F_TLS1_ENC 210 | 2017 | #define SSL_F_TLS1_ENC 210 |
2261 | #define SSL_F_TLS1_EXPORT_KEYING_MATERIAL 314 | ||
2262 | #define SSL_F_TLS1_HEARTBEAT 315 | ||
2263 | #define SSL_F_TLS1_PREPARE_CLIENTHELLO_TLSEXT 275 | 2018 | #define SSL_F_TLS1_PREPARE_CLIENTHELLO_TLSEXT 275 |
2264 | #define SSL_F_TLS1_PREPARE_SERVERHELLO_TLSEXT 276 | 2019 | #define SSL_F_TLS1_PREPARE_SERVERHELLO_TLSEXT 276 |
2265 | #define SSL_F_TLS1_PRF 284 | 2020 | #define SSL_F_TLS1_PRF 284 |
@@ -2299,13 +2054,6 @@ void ERR_load_SSL_strings(void); | |||
2299 | #define SSL_R_BAD_RSA_MODULUS_LENGTH 121 | 2054 | #define SSL_R_BAD_RSA_MODULUS_LENGTH 121 |
2300 | #define SSL_R_BAD_RSA_SIGNATURE 122 | 2055 | #define SSL_R_BAD_RSA_SIGNATURE 122 |
2301 | #define SSL_R_BAD_SIGNATURE 123 | 2056 | #define SSL_R_BAD_SIGNATURE 123 |
2302 | #define SSL_R_BAD_SRP_A_LENGTH 347 | ||
2303 | #define SSL_R_BAD_SRP_B_LENGTH 348 | ||
2304 | #define SSL_R_BAD_SRP_G_LENGTH 349 | ||
2305 | #define SSL_R_BAD_SRP_N_LENGTH 350 | ||
2306 | #define SSL_R_BAD_SRP_S_LENGTH 351 | ||
2307 | #define SSL_R_BAD_SRTP_MKI_VALUE 352 | ||
2308 | #define SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST 353 | ||
2309 | #define SSL_R_BAD_SSL_FILETYPE 124 | 2057 | #define SSL_R_BAD_SSL_FILETYPE 124 |
2310 | #define SSL_R_BAD_SSL_SESSION_ID_LENGTH 125 | 2058 | #define SSL_R_BAD_SSL_SESSION_ID_LENGTH 125 |
2311 | #define SSL_R_BAD_STATE 126 | 2059 | #define SSL_R_BAD_STATE 126 |
@@ -2344,15 +2092,12 @@ void ERR_load_SSL_strings(void); | |||
2344 | #define SSL_R_ECC_CERT_SHOULD_HAVE_RSA_SIGNATURE 322 | 2092 | #define SSL_R_ECC_CERT_SHOULD_HAVE_RSA_SIGNATURE 322 |
2345 | #define SSL_R_ECC_CERT_SHOULD_HAVE_SHA1_SIGNATURE 323 | 2093 | #define SSL_R_ECC_CERT_SHOULD_HAVE_SHA1_SIGNATURE 323 |
2346 | #define SSL_R_ECGROUP_TOO_LARGE_FOR_CIPHER 310 | 2094 | #define SSL_R_ECGROUP_TOO_LARGE_FOR_CIPHER 310 |
2347 | #define SSL_R_EMPTY_SRTP_PROTECTION_PROFILE_LIST 354 | ||
2348 | #define SSL_R_ENCRYPTED_LENGTH_TOO_LONG 150 | 2095 | #define SSL_R_ENCRYPTED_LENGTH_TOO_LONG 150 |
2349 | #define SSL_R_ERROR_GENERATING_TMP_RSA_KEY 282 | 2096 | #define SSL_R_ERROR_GENERATING_TMP_RSA_KEY 282 |
2350 | #define SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST 151 | 2097 | #define SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST 151 |
2351 | #define SSL_R_EXCESSIVE_MESSAGE_SIZE 152 | 2098 | #define SSL_R_EXCESSIVE_MESSAGE_SIZE 152 |
2352 | #define SSL_R_EXTRA_DATA_IN_MESSAGE 153 | 2099 | #define SSL_R_EXTRA_DATA_IN_MESSAGE 153 |
2353 | #define SSL_R_GOT_A_FIN_BEFORE_A_CCS 154 | 2100 | #define SSL_R_GOT_A_FIN_BEFORE_A_CCS 154 |
2354 | #define SSL_R_GOT_NEXT_PROTO_BEFORE_A_CCS 355 | ||
2355 | #define SSL_R_GOT_NEXT_PROTO_WITHOUT_EXTENSION 356 | ||
2356 | #define SSL_R_HTTPS_PROXY_REQUEST 155 | 2101 | #define SSL_R_HTTPS_PROXY_REQUEST 155 |
2357 | #define SSL_R_HTTP_REQUEST 156 | 2102 | #define SSL_R_HTTP_REQUEST 156 |
2358 | #define SSL_R_ILLEGAL_PADDING 283 | 2103 | #define SSL_R_ILLEGAL_PADDING 283 |
@@ -2361,7 +2106,6 @@ void ERR_load_SSL_strings(void); | |||
2361 | #define SSL_R_INVALID_COMMAND 280 | 2106 | #define SSL_R_INVALID_COMMAND 280 |
2362 | #define SSL_R_INVALID_COMPRESSION_ALGORITHM 341 | 2107 | #define SSL_R_INVALID_COMPRESSION_ALGORITHM 341 |
2363 | #define SSL_R_INVALID_PURPOSE 278 | 2108 | #define SSL_R_INVALID_PURPOSE 278 |
2364 | #define SSL_R_INVALID_SRP_USERNAME 357 | ||
2365 | #define SSL_R_INVALID_STATUS_RESPONSE 328 | 2109 | #define SSL_R_INVALID_STATUS_RESPONSE 328 |
2366 | #define SSL_R_INVALID_TICKET_KEYS_LENGTH 325 | 2110 | #define SSL_R_INVALID_TICKET_KEYS_LENGTH 325 |
2367 | #define SSL_R_INVALID_TRUST 279 | 2111 | #define SSL_R_INVALID_TRUST 279 |
@@ -2391,7 +2135,6 @@ void ERR_load_SSL_strings(void); | |||
2391 | #define SSL_R_MISSING_RSA_CERTIFICATE 168 | 2135 | #define SSL_R_MISSING_RSA_CERTIFICATE 168 |
2392 | #define SSL_R_MISSING_RSA_ENCRYPTING_CERT 169 | 2136 | #define SSL_R_MISSING_RSA_ENCRYPTING_CERT 169 |
2393 | #define SSL_R_MISSING_RSA_SIGNING_CERT 170 | 2137 | #define SSL_R_MISSING_RSA_SIGNING_CERT 170 |
2394 | #define SSL_R_MISSING_SRP_PARAM 358 | ||
2395 | #define SSL_R_MISSING_TMP_DH_KEY 171 | 2138 | #define SSL_R_MISSING_TMP_DH_KEY 171 |
2396 | #define SSL_R_MISSING_TMP_ECDH_KEY 311 | 2139 | #define SSL_R_MISSING_TMP_ECDH_KEY 311 |
2397 | #define SSL_R_MISSING_TMP_RSA_KEY 172 | 2140 | #define SSL_R_MISSING_TMP_RSA_KEY 172 |
@@ -2421,7 +2164,6 @@ void ERR_load_SSL_strings(void); | |||
2421 | #define SSL_R_NO_RENEGOTIATION 339 | 2164 | #define SSL_R_NO_RENEGOTIATION 339 |
2422 | #define SSL_R_NO_REQUIRED_DIGEST 324 | 2165 | #define SSL_R_NO_REQUIRED_DIGEST 324 |
2423 | #define SSL_R_NO_SHARED_CIPHER 193 | 2166 | #define SSL_R_NO_SHARED_CIPHER 193 |
2424 | #define SSL_R_NO_SRTP_PROFILES 359 | ||
2425 | #define SSL_R_NO_VERIFY_CALLBACK 194 | 2167 | #define SSL_R_NO_VERIFY_CALLBACK 194 |
2426 | #define SSL_R_NULL_SSL_CTX 195 | 2168 | #define SSL_R_NULL_SSL_CTX 195 |
2427 | #define SSL_R_NULL_SSL_METHOD_PASSED 196 | 2169 | #define SSL_R_NULL_SSL_METHOD_PASSED 196 |
@@ -2465,12 +2207,7 @@ void ERR_load_SSL_strings(void); | |||
2465 | #define SSL_R_SERVERHELLO_TLSEXT 275 | 2207 | #define SSL_R_SERVERHELLO_TLSEXT 275 |
2466 | #define SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED 277 | 2208 | #define SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED 277 |
2467 | #define SSL_R_SHORT_READ 219 | 2209 | #define SSL_R_SHORT_READ 219 |
2468 | #define SSL_R_SIGNATURE_ALGORITHMS_ERROR 360 | ||
2469 | #define SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE 220 | 2210 | #define SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE 220 |
2470 | #define SSL_R_SRP_A_CALC 361 | ||
2471 | #define SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES 362 | ||
2472 | #define SSL_R_SRTP_PROTECTION_PROFILE_LIST_TOO_LONG 363 | ||
2473 | #define SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE 364 | ||
2474 | #define SSL_R_SSL23_DOING_SESSION_ID_REUSE 221 | 2211 | #define SSL_R_SSL23_DOING_SESSION_ID_REUSE 221 |
2475 | #define SSL_R_SSL2_CONNECTION_ID_TOO_LONG 299 | 2212 | #define SSL_R_SSL2_CONNECTION_ID_TOO_LONG 299 |
2476 | #define SSL_R_SSL3_EXT_INVALID_ECPOINTFORMAT 321 | 2213 | #define SSL_R_SSL3_EXT_INVALID_ECPOINTFORMAT 321 |
@@ -2515,9 +2252,6 @@ void ERR_load_SSL_strings(void); | |||
2515 | #define SSL_R_TLSV1_UNRECOGNIZED_NAME 1112 | 2252 | #define SSL_R_TLSV1_UNRECOGNIZED_NAME 1112 |
2516 | #define SSL_R_TLSV1_UNSUPPORTED_EXTENSION 1110 | 2253 | #define SSL_R_TLSV1_UNSUPPORTED_EXTENSION 1110 |
2517 | #define SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER 232 | 2254 | #define SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER 232 |
2518 | #define SSL_R_TLS_HEARTBEAT_PEER_DOESNT_ACCEPT 365 | ||
2519 | #define SSL_R_TLS_HEARTBEAT_PENDING 366 | ||
2520 | #define SSL_R_TLS_ILLEGAL_EXPORTER_LABEL 367 | ||
2521 | #define SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST 157 | 2255 | #define SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST 157 |
2522 | #define SSL_R_TLS_PEER_DID_NOT_RESPOND_WITH_CERTIFICATE_LIST 233 | 2256 | #define SSL_R_TLS_PEER_DID_NOT_RESPOND_WITH_CERTIFICATE_LIST 233 |
2523 | #define SSL_R_TLS_RSA_ENCRYPTED_VALUE_LENGTH_IS_WRONG 234 | 2257 | #define SSL_R_TLS_RSA_ENCRYPTED_VALUE_LENGTH_IS_WRONG 234 |
@@ -2539,7 +2273,6 @@ void ERR_load_SSL_strings(void); | |||
2539 | #define SSL_R_UNKNOWN_CERTIFICATE_TYPE 247 | 2273 | #define SSL_R_UNKNOWN_CERTIFICATE_TYPE 247 |
2540 | #define SSL_R_UNKNOWN_CIPHER_RETURNED 248 | 2274 | #define SSL_R_UNKNOWN_CIPHER_RETURNED 248 |
2541 | #define SSL_R_UNKNOWN_CIPHER_TYPE 249 | 2275 | #define SSL_R_UNKNOWN_CIPHER_TYPE 249 |
2542 | #define SSL_R_UNKNOWN_DIGEST 368 | ||
2543 | #define SSL_R_UNKNOWN_KEY_EXCHANGE_TYPE 250 | 2276 | #define SSL_R_UNKNOWN_KEY_EXCHANGE_TYPE 250 |
2544 | #define SSL_R_UNKNOWN_PKEY_TYPE 251 | 2277 | #define SSL_R_UNKNOWN_PKEY_TYPE 251 |
2545 | #define SSL_R_UNKNOWN_PROTOCOL 252 | 2278 | #define SSL_R_UNKNOWN_PROTOCOL 252 |
@@ -2554,14 +2287,12 @@ void ERR_load_SSL_strings(void); | |||
2554 | #define SSL_R_UNSUPPORTED_PROTOCOL 258 | 2287 | #define SSL_R_UNSUPPORTED_PROTOCOL 258 |
2555 | #define SSL_R_UNSUPPORTED_SSL_VERSION 259 | 2288 | #define SSL_R_UNSUPPORTED_SSL_VERSION 259 |
2556 | #define SSL_R_UNSUPPORTED_STATUS_TYPE 329 | 2289 | #define SSL_R_UNSUPPORTED_STATUS_TYPE 329 |
2557 | #define SSL_R_USE_SRTP_NOT_NEGOTIATED 369 | ||
2558 | #define SSL_R_WRITE_BIO_NOT_SET 260 | 2290 | #define SSL_R_WRITE_BIO_NOT_SET 260 |
2559 | #define SSL_R_WRONG_CIPHER_RETURNED 261 | 2291 | #define SSL_R_WRONG_CIPHER_RETURNED 261 |
2560 | #define SSL_R_WRONG_MESSAGE_TYPE 262 | 2292 | #define SSL_R_WRONG_MESSAGE_TYPE 262 |
2561 | #define SSL_R_WRONG_NUMBER_OF_KEY_BITS 263 | 2293 | #define SSL_R_WRONG_NUMBER_OF_KEY_BITS 263 |
2562 | #define SSL_R_WRONG_SIGNATURE_LENGTH 264 | 2294 | #define SSL_R_WRONG_SIGNATURE_LENGTH 264 |
2563 | #define SSL_R_WRONG_SIGNATURE_SIZE 265 | 2295 | #define SSL_R_WRONG_SIGNATURE_SIZE 265 |
2564 | #define SSL_R_WRONG_SIGNATURE_TYPE 370 | ||
2565 | #define SSL_R_WRONG_SSL_VERSION 266 | 2296 | #define SSL_R_WRONG_SSL_VERSION 266 |
2566 | #define SSL_R_WRONG_VERSION_NUMBER 267 | 2297 | #define SSL_R_WRONG_VERSION_NUMBER 267 |
2567 | #define SSL_R_X509_LIB 268 | 2298 | #define SSL_R_X509_LIB 268 |