summaryrefslogtreecommitdiff
path: root/src/lib/libssl/ssl3.h
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/libssl/ssl3.h')
-rw-r--r--src/lib/libssl/ssl3.h70
1 files changed, 34 insertions, 36 deletions
diff --git a/src/lib/libssl/ssl3.h b/src/lib/libssl/ssl3.h
index cb8b2492ec..2b25357917 100644
--- a/src/lib/libssl/ssl3.h
+++ b/src/lib/libssl/ssl3.h
@@ -163,13 +163,13 @@ extern "C" {
163#define SSL3_CK_ADH_DES_192_CBC_SHA 0x0300001B 163#define SSL3_CK_ADH_DES_192_CBC_SHA 0x0300001B
164 164
165#if 0 165#if 0
166 #define SSL3_CK_FZA_DMS_NULL_SHA 0x0300001C 166#define SSL3_CK_FZA_DMS_NULL_SHA 0x0300001C
167 #define SSL3_CK_FZA_DMS_FZA_SHA 0x0300001D 167#define SSL3_CK_FZA_DMS_FZA_SHA 0x0300001D
168 #if 0 /* Because it clashes with KRB5, is never used any more, and is safe 168#if 0 /* Because it clashes with KRB5, is never used any more, and is safe
169 to remove according to David Hopwood <david.hopwood@zetnet.co.uk> 169 to remove according to David Hopwood <david.hopwood@zetnet.co.uk>
170 of the ietf-tls list */ 170 of the ietf-tls list */
171 #define SSL3_CK_FZA_DMS_RC4_SHA 0x0300001E 171#define SSL3_CK_FZA_DMS_RC4_SHA 0x0300001E
172 #endif 172#endif
173#endif 173#endif
174 174
175/* VRS Additional Kerberos5 entries 175/* VRS Additional Kerberos5 entries
@@ -222,9 +222,9 @@ extern "C" {
222#define SSL3_TXT_ADH_DES_192_CBC_SHA "ADH-DES-CBC3-SHA" 222#define SSL3_TXT_ADH_DES_192_CBC_SHA "ADH-DES-CBC3-SHA"
223 223
224#if 0 224#if 0
225 #define SSL3_TXT_FZA_DMS_NULL_SHA "FZA-NULL-SHA" 225#define SSL3_TXT_FZA_DMS_NULL_SHA "FZA-NULL-SHA"
226 #define SSL3_TXT_FZA_DMS_FZA_SHA "FZA-FZA-CBC-SHA" 226#define SSL3_TXT_FZA_DMS_FZA_SHA "FZA-FZA-CBC-SHA"
227 #define SSL3_TXT_FZA_DMS_RC4_SHA "FZA-RC4-SHA" 227#define SSL3_TXT_FZA_DMS_RC4_SHA "FZA-RC4-SHA"
228#endif 228#endif
229 229
230#define SSL3_TXT_KRB5_DES_64_CBC_SHA "KRB5-DES-CBC-SHA" 230#define SSL3_TXT_KRB5_DES_64_CBC_SHA "KRB5-DES-CBC-SHA"
@@ -342,11 +342,10 @@ extern "C" {
342 342
343#define TLS1_HB_REQUEST 1 343#define TLS1_HB_REQUEST 1
344#define TLS1_HB_RESPONSE 2 344#define TLS1_HB_RESPONSE 2
345 345
346#ifndef OPENSSL_NO_SSL_INTERN 346#ifndef OPENSSL_NO_SSL_INTERN
347 347
348typedef struct ssl3_record_st 348typedef struct ssl3_record_st {
349 {
350/*r */ int type; /* type of record */ 349/*r */ int type; /* type of record */
351/*rw*/ unsigned int length; /* How many bytes available */ 350/*rw*/ unsigned int length; /* How many bytes available */
352/*r */ unsigned int off; /* read/write offset into 'buf' */ 351/*r */ unsigned int off; /* read/write offset into 'buf' */
@@ -355,16 +354,15 @@ typedef struct ssl3_record_st
355/*r */ unsigned char *comp; /* only used with decompression - malloc()ed */ 354/*r */ unsigned char *comp; /* only used with decompression - malloc()ed */
356/*r */ unsigned long epoch; /* epoch number, needed by DTLS1 */ 355/*r */ unsigned long epoch; /* epoch number, needed by DTLS1 */
357/*r */ unsigned char seq_num[8]; /* sequence number, needed by DTLS1 */ 356/*r */ unsigned char seq_num[8]; /* sequence number, needed by DTLS1 */
358 } SSL3_RECORD; 357} SSL3_RECORD;
359 358
360typedef struct ssl3_buffer_st 359typedef struct ssl3_buffer_st {
361 { 360 unsigned char *buf; /* at least SSL3_RT_MAX_PACKET_SIZE bytes,
362 unsigned char *buf; /* at least SSL3_RT_MAX_PACKET_SIZE bytes,
363 * see ssl3_setup_buffers() */ 361 * see ssl3_setup_buffers() */
364 size_t len; /* buffer size */ 362 size_t len; /* buffer size */
365 int offset; /* where to 'copy from' */ 363 int offset; /* where to 'copy from' */
366 int left; /* how many bytes left */ 364 int left; /* how many bytes left */
367 } SSL3_BUFFER; 365} SSL3_BUFFER;
368 366
369#endif 367#endif
370 368
@@ -388,7 +386,7 @@ typedef struct ssl3_buffer_st
388#define TLS1_FLAGS_TLS_PADDING_BUG 0x0008 386#define TLS1_FLAGS_TLS_PADDING_BUG 0x0008
389#define TLS1_FLAGS_SKIP_CERT_VERIFY 0x0010 387#define TLS1_FLAGS_SKIP_CERT_VERIFY 0x0010
390#define TLS1_FLAGS_KEEP_HANDSHAKE 0x0020 388#define TLS1_FLAGS_KEEP_HANDSHAKE 0x0020
391 389
392/* SSL3_FLAGS_SGC_RESTART_DONE is set when we 390/* SSL3_FLAGS_SGC_RESTART_DONE is set when we
393 * restart a handshake because of MS SGC and so prevents us 391 * restart a handshake because of MS SGC and so prevents us
394 * from restarting the handshake in a loop. It's reset on a 392 * from restarting the handshake in a loop. It's reset on a
@@ -402,8 +400,7 @@ typedef struct ssl3_buffer_st
402 400
403#ifndef OPENSSL_NO_SSL_INTERN 401#ifndef OPENSSL_NO_SSL_INTERN
404 402
405typedef struct ssl3_state_st 403typedef struct ssl3_state_st {
406 {
407 long flags; 404 long flags;
408 int delay_buf_pop_ret; 405 int delay_buf_pop_ret;
409 406
@@ -471,7 +468,8 @@ typedef struct ssl3_state_st
471 468
472 /* Opaque PRF input as used for the current handshake. 469 /* Opaque PRF input as used for the current handshake.
473 * These fields are used only if TLSEXT_TYPE_opaque_prf_input is defined 470 * These fields are used only if TLSEXT_TYPE_opaque_prf_input is defined
474 * (otherwise, they are merely present to improve binary compatibility) */ 471 * (otherwise, they are merely present to improve binary compatibility)
472 */
475 void *client_opaque_prf_input; 473 void *client_opaque_prf_input;
476 size_t client_opaque_prf_input_len; 474 size_t client_opaque_prf_input_len;
477 void *server_opaque_prf_input; 475 void *server_opaque_prf_input;
@@ -501,7 +499,7 @@ typedef struct ssl3_state_st
501#endif 499#endif
502 500
503 /* used when SSL_ST_FLUSH_DATA is entered */ 501 /* used when SSL_ST_FLUSH_DATA is entered */
504 int next_state; 502 int next_state;
505 503
506 int reuse_message; 504 int reuse_message;
507 505
@@ -526,17 +524,18 @@ typedef struct ssl3_state_st
526 char *new_compression; 524 char *new_compression;
527#endif 525#endif
528 int cert_request; 526 int cert_request;
529 } tmp; 527 } tmp;
530 528
531 /* Connection binding to prevent renegotiation attacks */ 529 /* Connection binding to prevent renegotiation attacks */
532 unsigned char previous_client_finished[EVP_MAX_MD_SIZE]; 530 unsigned char previous_client_finished[EVP_MAX_MD_SIZE];
533 unsigned char previous_client_finished_len; 531 unsigned char previous_client_finished_len;
534 unsigned char previous_server_finished[EVP_MAX_MD_SIZE]; 532 unsigned char previous_server_finished[EVP_MAX_MD_SIZE];
535 unsigned char previous_server_finished_len; 533 unsigned char previous_server_finished_len;
536 int send_connection_binding; /* TODOEKR */ 534 int send_connection_binding; /* TODOEKR */
537 535
538#ifndef OPENSSL_NO_NEXTPROTONEG 536#ifndef OPENSSL_NO_NEXTPROTONEG
539 /* Set if we saw the Next Protocol Negotiation extension from our peer. */ 537 /* Set if we saw the Next Protocol Negotiation extension from our peer.
538 */
540 int next_proto_neg_seen; 539 int next_proto_neg_seen;
541#endif 540#endif
542 541
@@ -548,7 +547,7 @@ typedef struct ssl3_state_st
548 char is_probably_safari; 547 char is_probably_safari;
549#endif /* !OPENSSL_NO_EC */ 548#endif /* !OPENSSL_NO_EC */
550#endif /* !OPENSSL_NO_TLSEXT */ 549#endif /* !OPENSSL_NO_TLSEXT */
551 } SSL3_STATE; 550} SSL3_STATE;
552 551
553#endif 552#endif
554 553
@@ -690,4 +689,3 @@ typedef struct ssl3_state_st
690} 689}
691#endif 690#endif
692#endif 691#endif
693