diff options
Diffstat (limited to 'src/lib/libssl/ssl3.h')
-rw-r--r-- | src/lib/libssl/ssl3.h | 70 |
1 files changed, 34 insertions, 36 deletions
diff --git a/src/lib/libssl/ssl3.h b/src/lib/libssl/ssl3.h index cb8b2492ec..2b25357917 100644 --- a/src/lib/libssl/ssl3.h +++ b/src/lib/libssl/ssl3.h | |||
@@ -163,13 +163,13 @@ extern "C" { | |||
163 | #define SSL3_CK_ADH_DES_192_CBC_SHA 0x0300001B | 163 | #define SSL3_CK_ADH_DES_192_CBC_SHA 0x0300001B |
164 | 164 | ||
165 | #if 0 | 165 | #if 0 |
166 | #define SSL3_CK_FZA_DMS_NULL_SHA 0x0300001C | 166 | #define SSL3_CK_FZA_DMS_NULL_SHA 0x0300001C |
167 | #define SSL3_CK_FZA_DMS_FZA_SHA 0x0300001D | 167 | #define SSL3_CK_FZA_DMS_FZA_SHA 0x0300001D |
168 | #if 0 /* Because it clashes with KRB5, is never used any more, and is safe | 168 | #if 0 /* Because it clashes with KRB5, is never used any more, and is safe |
169 | to remove according to David Hopwood <david.hopwood@zetnet.co.uk> | 169 | to remove according to David Hopwood <david.hopwood@zetnet.co.uk> |
170 | of the ietf-tls list */ | 170 | of the ietf-tls list */ |
171 | #define SSL3_CK_FZA_DMS_RC4_SHA 0x0300001E | 171 | #define SSL3_CK_FZA_DMS_RC4_SHA 0x0300001E |
172 | #endif | 172 | #endif |
173 | #endif | 173 | #endif |
174 | 174 | ||
175 | /* VRS Additional Kerberos5 entries | 175 | /* VRS Additional Kerberos5 entries |
@@ -222,9 +222,9 @@ extern "C" { | |||
222 | #define SSL3_TXT_ADH_DES_192_CBC_SHA "ADH-DES-CBC3-SHA" | 222 | #define SSL3_TXT_ADH_DES_192_CBC_SHA "ADH-DES-CBC3-SHA" |
223 | 223 | ||
224 | #if 0 | 224 | #if 0 |
225 | #define SSL3_TXT_FZA_DMS_NULL_SHA "FZA-NULL-SHA" | 225 | #define SSL3_TXT_FZA_DMS_NULL_SHA "FZA-NULL-SHA" |
226 | #define SSL3_TXT_FZA_DMS_FZA_SHA "FZA-FZA-CBC-SHA" | 226 | #define SSL3_TXT_FZA_DMS_FZA_SHA "FZA-FZA-CBC-SHA" |
227 | #define SSL3_TXT_FZA_DMS_RC4_SHA "FZA-RC4-SHA" | 227 | #define SSL3_TXT_FZA_DMS_RC4_SHA "FZA-RC4-SHA" |
228 | #endif | 228 | #endif |
229 | 229 | ||
230 | #define SSL3_TXT_KRB5_DES_64_CBC_SHA "KRB5-DES-CBC-SHA" | 230 | #define SSL3_TXT_KRB5_DES_64_CBC_SHA "KRB5-DES-CBC-SHA" |
@@ -342,11 +342,10 @@ extern "C" { | |||
342 | 342 | ||
343 | #define TLS1_HB_REQUEST 1 | 343 | #define TLS1_HB_REQUEST 1 |
344 | #define TLS1_HB_RESPONSE 2 | 344 | #define TLS1_HB_RESPONSE 2 |
345 | 345 | ||
346 | #ifndef OPENSSL_NO_SSL_INTERN | 346 | #ifndef OPENSSL_NO_SSL_INTERN |
347 | 347 | ||
348 | typedef struct ssl3_record_st | 348 | typedef struct ssl3_record_st { |
349 | { | ||
350 | /*r */ int type; /* type of record */ | 349 | /*r */ int type; /* type of record */ |
351 | /*rw*/ unsigned int length; /* How many bytes available */ | 350 | /*rw*/ unsigned int length; /* How many bytes available */ |
352 | /*r */ unsigned int off; /* read/write offset into 'buf' */ | 351 | /*r */ unsigned int off; /* read/write offset into 'buf' */ |
@@ -355,16 +354,15 @@ typedef struct ssl3_record_st | |||
355 | /*r */ unsigned char *comp; /* only used with decompression - malloc()ed */ | 354 | /*r */ unsigned char *comp; /* only used with decompression - malloc()ed */ |
356 | /*r */ unsigned long epoch; /* epoch number, needed by DTLS1 */ | 355 | /*r */ unsigned long epoch; /* epoch number, needed by DTLS1 */ |
357 | /*r */ unsigned char seq_num[8]; /* sequence number, needed by DTLS1 */ | 356 | /*r */ unsigned char seq_num[8]; /* sequence number, needed by DTLS1 */ |
358 | } SSL3_RECORD; | 357 | } SSL3_RECORD; |
359 | 358 | ||
360 | typedef struct ssl3_buffer_st | 359 | typedef struct ssl3_buffer_st { |
361 | { | 360 | unsigned char *buf; /* at least SSL3_RT_MAX_PACKET_SIZE bytes, |
362 | unsigned char *buf; /* at least SSL3_RT_MAX_PACKET_SIZE bytes, | ||
363 | * see ssl3_setup_buffers() */ | 361 | * see ssl3_setup_buffers() */ |
364 | size_t len; /* buffer size */ | 362 | size_t len; /* buffer size */ |
365 | int offset; /* where to 'copy from' */ | 363 | int offset; /* where to 'copy from' */ |
366 | int left; /* how many bytes left */ | 364 | int left; /* how many bytes left */ |
367 | } SSL3_BUFFER; | 365 | } SSL3_BUFFER; |
368 | 366 | ||
369 | #endif | 367 | #endif |
370 | 368 | ||
@@ -388,7 +386,7 @@ typedef struct ssl3_buffer_st | |||
388 | #define TLS1_FLAGS_TLS_PADDING_BUG 0x0008 | 386 | #define TLS1_FLAGS_TLS_PADDING_BUG 0x0008 |
389 | #define TLS1_FLAGS_SKIP_CERT_VERIFY 0x0010 | 387 | #define TLS1_FLAGS_SKIP_CERT_VERIFY 0x0010 |
390 | #define TLS1_FLAGS_KEEP_HANDSHAKE 0x0020 | 388 | #define TLS1_FLAGS_KEEP_HANDSHAKE 0x0020 |
391 | 389 | ||
392 | /* SSL3_FLAGS_SGC_RESTART_DONE is set when we | 390 | /* SSL3_FLAGS_SGC_RESTART_DONE is set when we |
393 | * restart a handshake because of MS SGC and so prevents us | 391 | * restart a handshake because of MS SGC and so prevents us |
394 | * from restarting the handshake in a loop. It's reset on a | 392 | * from restarting the handshake in a loop. It's reset on a |
@@ -402,8 +400,7 @@ typedef struct ssl3_buffer_st | |||
402 | 400 | ||
403 | #ifndef OPENSSL_NO_SSL_INTERN | 401 | #ifndef OPENSSL_NO_SSL_INTERN |
404 | 402 | ||
405 | typedef struct ssl3_state_st | 403 | typedef struct ssl3_state_st { |
406 | { | ||
407 | long flags; | 404 | long flags; |
408 | int delay_buf_pop_ret; | 405 | int delay_buf_pop_ret; |
409 | 406 | ||
@@ -471,7 +468,8 @@ typedef struct ssl3_state_st | |||
471 | 468 | ||
472 | /* Opaque PRF input as used for the current handshake. | 469 | /* Opaque PRF input as used for the current handshake. |
473 | * These fields are used only if TLSEXT_TYPE_opaque_prf_input is defined | 470 | * These fields are used only if TLSEXT_TYPE_opaque_prf_input is defined |
474 | * (otherwise, they are merely present to improve binary compatibility) */ | 471 | * (otherwise, they are merely present to improve binary compatibility) |
472 | */ | ||
475 | void *client_opaque_prf_input; | 473 | void *client_opaque_prf_input; |
476 | size_t client_opaque_prf_input_len; | 474 | size_t client_opaque_prf_input_len; |
477 | void *server_opaque_prf_input; | 475 | void *server_opaque_prf_input; |
@@ -501,7 +499,7 @@ typedef struct ssl3_state_st | |||
501 | #endif | 499 | #endif |
502 | 500 | ||
503 | /* used when SSL_ST_FLUSH_DATA is entered */ | 501 | /* used when SSL_ST_FLUSH_DATA is entered */ |
504 | int next_state; | 502 | int next_state; |
505 | 503 | ||
506 | int reuse_message; | 504 | int reuse_message; |
507 | 505 | ||
@@ -526,17 +524,18 @@ typedef struct ssl3_state_st | |||
526 | char *new_compression; | 524 | char *new_compression; |
527 | #endif | 525 | #endif |
528 | int cert_request; | 526 | int cert_request; |
529 | } tmp; | 527 | } tmp; |
530 | 528 | ||
531 | /* Connection binding to prevent renegotiation attacks */ | 529 | /* Connection binding to prevent renegotiation attacks */ |
532 | unsigned char previous_client_finished[EVP_MAX_MD_SIZE]; | 530 | unsigned char previous_client_finished[EVP_MAX_MD_SIZE]; |
533 | unsigned char previous_client_finished_len; | 531 | unsigned char previous_client_finished_len; |
534 | unsigned char previous_server_finished[EVP_MAX_MD_SIZE]; | 532 | unsigned char previous_server_finished[EVP_MAX_MD_SIZE]; |
535 | unsigned char previous_server_finished_len; | 533 | unsigned char previous_server_finished_len; |
536 | int send_connection_binding; /* TODOEKR */ | 534 | int send_connection_binding; /* TODOEKR */ |
537 | 535 | ||
538 | #ifndef OPENSSL_NO_NEXTPROTONEG | 536 | #ifndef OPENSSL_NO_NEXTPROTONEG |
539 | /* Set if we saw the Next Protocol Negotiation extension from our peer. */ | 537 | /* Set if we saw the Next Protocol Negotiation extension from our peer. |
538 | */ | ||
540 | int next_proto_neg_seen; | 539 | int next_proto_neg_seen; |
541 | #endif | 540 | #endif |
542 | 541 | ||
@@ -548,7 +547,7 @@ typedef struct ssl3_state_st | |||
548 | char is_probably_safari; | 547 | char is_probably_safari; |
549 | #endif /* !OPENSSL_NO_EC */ | 548 | #endif /* !OPENSSL_NO_EC */ |
550 | #endif /* !OPENSSL_NO_TLSEXT */ | 549 | #endif /* !OPENSSL_NO_TLSEXT */ |
551 | } SSL3_STATE; | 550 | } SSL3_STATE; |
552 | 551 | ||
553 | #endif | 552 | #endif |
554 | 553 | ||
@@ -690,4 +689,3 @@ typedef struct ssl3_state_st | |||
690 | } | 689 | } |
691 | #endif | 690 | #endif |
692 | #endif | 691 | #endif |
693 | |||