diff options
Diffstat (limited to 'src/lib/libssl/ssl.h')
-rw-r--r-- | src/lib/libssl/ssl.h | 21 |
1 files changed, 3 insertions, 18 deletions
diff --git a/src/lib/libssl/ssl.h b/src/lib/libssl/ssl.h index 7219a0e64b..8b0c2a2dac 100644 --- a/src/lib/libssl/ssl.h +++ b/src/lib/libssl/ssl.h | |||
@@ -493,9 +493,6 @@ struct ssl_session_st | |||
493 | char *psk_identity_hint; | 493 | char *psk_identity_hint; |
494 | char *psk_identity; | 494 | char *psk_identity; |
495 | #endif | 495 | #endif |
496 | /* Used to indicate that session resumption is not allowed. | ||
497 | * Applications can also set this bit for a new session via | ||
498 | * not_resumable_session_cb to disable session caching and tickets. */ | ||
499 | int not_resumable; | 496 | int not_resumable; |
500 | 497 | ||
501 | /* The cert is the certificate used to establish this connection */ | 498 | /* The cert is the certificate used to establish this connection */ |
@@ -538,7 +535,7 @@ struct ssl_session_st | |||
538 | #endif /* OPENSSL_NO_EC */ | 535 | #endif /* OPENSSL_NO_EC */ |
539 | /* RFC4507 info */ | 536 | /* RFC4507 info */ |
540 | unsigned char *tlsext_tick; /* Session ticket */ | 537 | unsigned char *tlsext_tick; /* Session ticket */ |
541 | size_t tlsext_ticklen; /* Session ticket length */ | 538 | size_t tlsext_ticklen; /* Session ticket length */ |
542 | long tlsext_tick_lifetime_hint; /* Session lifetime hint in seconds */ | 539 | long tlsext_tick_lifetime_hint; /* Session lifetime hint in seconds */ |
543 | #endif | 540 | #endif |
544 | #ifndef OPENSSL_NO_SRP | 541 | #ifndef OPENSSL_NO_SRP |
@@ -555,14 +552,11 @@ struct ssl_session_st | |||
555 | #define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x00000008L | 552 | #define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG 0x00000008L |
556 | #define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x00000010L | 553 | #define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG 0x00000010L |
557 | #define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L | 554 | #define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER 0x00000020L |
558 | #define SSL_OP_SAFARI_ECDHE_ECDSA_BUG 0x00000040L | 555 | #define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x00000040L /* no effect since 0.9.7h and 0.9.8b */ |
559 | #define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x00000080L | 556 | #define SSL_OP_SSLEAY_080_CLIENT_DH_BUG 0x00000080L |
560 | #define SSL_OP_TLS_D5_BUG 0x00000100L | 557 | #define SSL_OP_TLS_D5_BUG 0x00000100L |
561 | #define SSL_OP_TLS_BLOCK_PADDING_BUG 0x00000200L | 558 | #define SSL_OP_TLS_BLOCK_PADDING_BUG 0x00000200L |
562 | 559 | ||
563 | /* Hasn't done anything since OpenSSL 0.9.7h, retained for compatibility */ | ||
564 | #define SSL_OP_MSIE_SSLV2_RSA_PADDING 0x0 | ||
565 | |||
566 | /* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added | 560 | /* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added |
567 | * in OpenSSL 0.9.6d. Usually (depending on the application protocol) | 561 | * in OpenSSL 0.9.6d. Usually (depending on the application protocol) |
568 | * the workaround is not needed. Unfortunately some broken SSL/TLS | 562 | * the workaround is not needed. Unfortunately some broken SSL/TLS |
@@ -644,12 +638,6 @@ struct ssl_session_st | |||
644 | * TLS only.) "Released" buffers are put onto a free-list in the context | 638 | * TLS only.) "Released" buffers are put onto a free-list in the context |
645 | * or just freed (depending on the context's setting for freelist_max_len). */ | 639 | * or just freed (depending on the context's setting for freelist_max_len). */ |
646 | #define SSL_MODE_RELEASE_BUFFERS 0x00000010L | 640 | #define SSL_MODE_RELEASE_BUFFERS 0x00000010L |
647 | /* Send the current time in the Random fields of the ClientHello and | ||
648 | * ServerHello records for compatibility with hypothetical implementations | ||
649 | * that require it. | ||
650 | */ | ||
651 | #define SSL_MODE_SEND_CLIENTHELLO_TIME 0x00000020L | ||
652 | #define SSL_MODE_SEND_SERVERHELLO_TIME 0x00000040L | ||
653 | 641 | ||
654 | /* Note: SSL[_CTX]_set_{options,mode} use |= op on the previous value, | 642 | /* Note: SSL[_CTX]_set_{options,mode} use |= op on the previous value, |
655 | * they cannot be used to clear bits. */ | 643 | * they cannot be used to clear bits. */ |
@@ -915,7 +903,7 @@ struct ssl_ctx_st | |||
915 | */ | 903 | */ |
916 | unsigned int max_send_fragment; | 904 | unsigned int max_send_fragment; |
917 | 905 | ||
918 | #ifndef OPENSSL_NO_ENGINE | 906 | #ifndef OPENSSL_ENGINE |
919 | /* Engine to pass requests for client certs to | 907 | /* Engine to pass requests for client certs to |
920 | */ | 908 | */ |
921 | ENGINE *client_cert_engine; | 909 | ENGINE *client_cert_engine; |
@@ -939,7 +927,6 @@ struct ssl_ctx_st | |||
939 | /* Callback for status request */ | 927 | /* Callback for status request */ |
940 | int (*tlsext_status_cb)(SSL *ssl, void *arg); | 928 | int (*tlsext_status_cb)(SSL *ssl, void *arg); |
941 | void *tlsext_status_arg; | 929 | void *tlsext_status_arg; |
942 | |||
943 | /* draft-rescorla-tls-opaque-prf-input-00.txt information */ | 930 | /* draft-rescorla-tls-opaque-prf-input-00.txt information */ |
944 | int (*tlsext_opaque_prf_input_callback)(SSL *, void *peerinput, size_t len, void *arg); | 931 | int (*tlsext_opaque_prf_input_callback)(SSL *, void *peerinput, size_t len, void *arg); |
945 | void *tlsext_opaque_prf_input_callback_arg; | 932 | void *tlsext_opaque_prf_input_callback_arg; |
@@ -965,7 +952,6 @@ struct ssl_ctx_st | |||
965 | #endif | 952 | #endif |
966 | 953 | ||
967 | #ifndef OPENSSL_NO_TLSEXT | 954 | #ifndef OPENSSL_NO_TLSEXT |
968 | |||
969 | # ifndef OPENSSL_NO_NEXTPROTONEG | 955 | # ifndef OPENSSL_NO_NEXTPROTONEG |
970 | /* Next protocol negotiation information */ | 956 | /* Next protocol negotiation information */ |
971 | /* (for experimental NPN extension). */ | 957 | /* (for experimental NPN extension). */ |
@@ -2220,7 +2206,6 @@ void ERR_load_SSL_strings(void); | |||
2220 | #define SSL_F_SSL_GET_NEW_SESSION 181 | 2206 | #define SSL_F_SSL_GET_NEW_SESSION 181 |
2221 | #define SSL_F_SSL_GET_PREV_SESSION 217 | 2207 | #define SSL_F_SSL_GET_PREV_SESSION 217 |
2222 | #define SSL_F_SSL_GET_SERVER_SEND_CERT 182 | 2208 | #define SSL_F_SSL_GET_SERVER_SEND_CERT 182 |
2223 | #define SSL_F_SSL_GET_SERVER_SEND_PKEY 317 | ||
2224 | #define SSL_F_SSL_GET_SIGN_PKEY 183 | 2209 | #define SSL_F_SSL_GET_SIGN_PKEY 183 |
2225 | #define SSL_F_SSL_INIT_WBIO_BUFFER 184 | 2210 | #define SSL_F_SSL_INIT_WBIO_BUFFER 184 |
2226 | #define SSL_F_SSL_LOAD_CLIENT_CA_FILE 185 | 2211 | #define SSL_F_SSL_LOAD_CLIENT_CA_FILE 185 |