diff options
Diffstat (limited to 'src/lib/libssl/ssl_lib.c')
-rw-r--r-- | src/lib/libssl/ssl_lib.c | 437 |
1 files changed, 327 insertions, 110 deletions
diff --git a/src/lib/libssl/ssl_lib.c b/src/lib/libssl/ssl_lib.c index 1fe85b6cb7..df307a80c5 100644 --- a/src/lib/libssl/ssl_lib.c +++ b/src/lib/libssl/ssl_lib.c | |||
@@ -57,22 +57,73 @@ | |||
57 | * copied and put under another distribution licence | 57 | * copied and put under another distribution licence |
58 | * [including the GNU Public Licence.] | 58 | * [including the GNU Public Licence.] |
59 | */ | 59 | */ |
60 | /* ==================================================================== | ||
61 | * Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved. | ||
62 | * | ||
63 | * Redistribution and use in source and binary forms, with or without | ||
64 | * modification, are permitted provided that the following conditions | ||
65 | * are met: | ||
66 | * | ||
67 | * 1. Redistributions of source code must retain the above copyright | ||
68 | * notice, this list of conditions and the following disclaimer. | ||
69 | * | ||
70 | * 2. Redistributions in binary form must reproduce the above copyright | ||
71 | * notice, this list of conditions and the following disclaimer in | ||
72 | * the documentation and/or other materials provided with the | ||
73 | * distribution. | ||
74 | * | ||
75 | * 3. All advertising materials mentioning features or use of this | ||
76 | * software must display the following acknowledgment: | ||
77 | * "This product includes software developed by the OpenSSL Project | ||
78 | * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | ||
79 | * | ||
80 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
81 | * endorse or promote products derived from this software without | ||
82 | * prior written permission. For written permission, please contact | ||
83 | * openssl-core@openssl.org. | ||
84 | * | ||
85 | * 5. Products derived from this software may not be called "OpenSSL" | ||
86 | * nor may "OpenSSL" appear in their names without prior written | ||
87 | * permission of the OpenSSL Project. | ||
88 | * | ||
89 | * 6. Redistributions of any form whatsoever must retain the following | ||
90 | * acknowledgment: | ||
91 | * "This product includes software developed by the OpenSSL Project | ||
92 | * for use in the OpenSSL Toolkit (http://www.openssl.org/)" | ||
93 | * | ||
94 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
95 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
96 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
97 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
98 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
99 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
100 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
101 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
102 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
103 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
104 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
105 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
106 | * ==================================================================== | ||
107 | * | ||
108 | * This product includes cryptographic software written by Eric Young | ||
109 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
110 | * Hudson (tjh@cryptsoft.com). | ||
111 | * | ||
112 | */ | ||
60 | 113 | ||
61 | 114 | ||
62 | #include <assert.h> | 115 | #ifdef REF_CHECK |
116 | # include <assert.h> | ||
117 | #endif | ||
63 | #include <stdio.h> | 118 | #include <stdio.h> |
64 | #include <openssl/objects.h> | 119 | #include <openssl/objects.h> |
65 | #include <openssl/lhash.h> | 120 | #include <openssl/lhash.h> |
66 | #include <openssl/x509v3.h> | 121 | #include <openssl/x509v3.h> |
67 | #include "ssl_locl.h" | 122 | #include "ssl_locl.h" |
123 | #include "kssl_lcl.h" | ||
68 | 124 | ||
69 | const char *SSL_version_str=OPENSSL_VERSION_TEXT; | 125 | const char *SSL_version_str=OPENSSL_VERSION_TEXT; |
70 | 126 | ||
71 | static STACK_OF(CRYPTO_EX_DATA_FUNCS) *ssl_meth=NULL; | ||
72 | static STACK_OF(CRYPTO_EX_DATA_FUNCS) *ssl_ctx_meth=NULL; | ||
73 | static int ssl_meth_num=0; | ||
74 | static int ssl_ctx_meth_num=0; | ||
75 | |||
76 | OPENSSL_GLOBAL SSL3_ENC_METHOD ssl3_undef_enc_method={ | 127 | OPENSSL_GLOBAL SSL3_ENC_METHOD ssl3_undef_enc_method={ |
77 | /* evil casts, but these functions are only called if there's a library bug */ | 128 | /* evil casts, but these functions are only called if there's a library bug */ |
78 | (int (*)(SSL *,int))ssl_undefined_function, | 129 | (int (*)(SSL *,int))ssl_undefined_function, |
@@ -85,7 +136,6 @@ OPENSSL_GLOBAL SSL3_ENC_METHOD ssl3_undef_enc_method={ | |||
85 | 136 | ||
86 | int SSL_clear(SSL *s) | 137 | int SSL_clear(SSL *s) |
87 | { | 138 | { |
88 | int state; | ||
89 | 139 | ||
90 | if (s->method == NULL) | 140 | if (s->method == NULL) |
91 | { | 141 | { |
@@ -93,6 +143,12 @@ int SSL_clear(SSL *s) | |||
93 | return(0); | 143 | return(0); |
94 | } | 144 | } |
95 | 145 | ||
146 | if (ssl_clear_bad_session(s)) | ||
147 | { | ||
148 | SSL_SESSION_free(s->session); | ||
149 | s->session=NULL; | ||
150 | } | ||
151 | |||
96 | s->error=0; | 152 | s->error=0; |
97 | s->hit=0; | 153 | s->hit=0; |
98 | s->shutdown=0; | 154 | s->shutdown=0; |
@@ -105,12 +161,11 @@ int SSL_clear(SSL *s) | |||
105 | #else | 161 | #else |
106 | if (s->new_session) | 162 | if (s->new_session) |
107 | { | 163 | { |
108 | SSLerr(SSL_F_SSL_CLEAR,SSL_R_INTERNAL_ERROR); | 164 | SSLerr(SSL_F_SSL_CLEAR,ERR_R_INTERNAL_ERROR); |
109 | return 0; | 165 | return 0; |
110 | } | 166 | } |
111 | #endif | 167 | #endif |
112 | 168 | ||
113 | state=s->state; /* Keep to check if we throw away the session-id */ | ||
114 | s->type=0; | 169 | s->type=0; |
115 | 170 | ||
116 | s->state=SSL_ST_BEFORE|((s->server)?SSL_ST_ACCEPT:SSL_ST_CONNECT); | 171 | s->state=SSL_ST_BEFORE|((s->server)?SSL_ST_ACCEPT:SSL_ST_CONNECT); |
@@ -131,18 +186,12 @@ int SSL_clear(SSL *s) | |||
131 | 186 | ||
132 | ssl_clear_cipher_ctx(s); | 187 | ssl_clear_cipher_ctx(s); |
133 | 188 | ||
134 | if (ssl_clear_bad_session(s)) | ||
135 | { | ||
136 | SSL_SESSION_free(s->session); | ||
137 | s->session=NULL; | ||
138 | } | ||
139 | |||
140 | s->first_packet=0; | 189 | s->first_packet=0; |
141 | 190 | ||
142 | #if 1 | 191 | #if 1 |
143 | /* Check to see if we were changed into a different method, if | 192 | /* Check to see if we were changed into a different method, if |
144 | * so, revert back if we are not doing session-id reuse. */ | 193 | * so, revert back if we are not doing session-id reuse. */ |
145 | if ((s->session == NULL) && (s->method != s->ctx->method)) | 194 | if (!s->in_handshake && (s->session == NULL) && (s->method != s->ctx->method)) |
146 | { | 195 | { |
147 | s->method->ssl_free(s); | 196 | s->method->ssl_free(s); |
148 | s->method=s->ctx->method; | 197 | s->method=s->ctx->method; |
@@ -191,6 +240,14 @@ SSL *SSL_new(SSL_CTX *ctx) | |||
191 | if (s == NULL) goto err; | 240 | if (s == NULL) goto err; |
192 | memset(s,0,sizeof(SSL)); | 241 | memset(s,0,sizeof(SSL)); |
193 | 242 | ||
243 | #ifndef OPENSSL_NO_KRB5 | ||
244 | s->kssl_ctx = kssl_ctx_new(); | ||
245 | #endif /* OPENSSL_NO_KRB5 */ | ||
246 | |||
247 | s->options=ctx->options; | ||
248 | s->mode=ctx->mode; | ||
249 | s->max_cert_list=ctx->max_cert_list; | ||
250 | |||
194 | if (ctx->cert != NULL) | 251 | if (ctx->cert != NULL) |
195 | { | 252 | { |
196 | /* Earlier library versions used to copy the pointer to | 253 | /* Earlier library versions used to copy the pointer to |
@@ -209,13 +266,20 @@ SSL *SSL_new(SSL_CTX *ctx) | |||
209 | } | 266 | } |
210 | else | 267 | else |
211 | s->cert=NULL; /* Cannot really happen (see SSL_CTX_new) */ | 268 | s->cert=NULL; /* Cannot really happen (see SSL_CTX_new) */ |
212 | s->sid_ctx_length=ctx->sid_ctx_length; | 269 | |
213 | memcpy(&s->sid_ctx,&ctx->sid_ctx,sizeof(s->sid_ctx)); | 270 | s->read_ahead=ctx->read_ahead; |
271 | s->msg_callback=ctx->msg_callback; | ||
272 | s->msg_callback_arg=ctx->msg_callback_arg; | ||
214 | s->verify_mode=ctx->verify_mode; | 273 | s->verify_mode=ctx->verify_mode; |
215 | s->verify_depth=ctx->verify_depth; | 274 | s->verify_depth=ctx->verify_depth; |
275 | s->sid_ctx_length=ctx->sid_ctx_length; | ||
276 | memcpy(&s->sid_ctx,&ctx->sid_ctx,sizeof(s->sid_ctx)); | ||
216 | s->verify_callback=ctx->default_verify_callback; | 277 | s->verify_callback=ctx->default_verify_callback; |
278 | s->generate_session_id=ctx->generate_session_id; | ||
217 | s->purpose = ctx->purpose; | 279 | s->purpose = ctx->purpose; |
218 | s->trust = ctx->trust; | 280 | s->trust = ctx->trust; |
281 | s->quiet_shutdown=ctx->quiet_shutdown; | ||
282 | |||
219 | CRYPTO_add(&ctx->references,1,CRYPTO_LOCK_SSL_CTX); | 283 | CRYPTO_add(&ctx->references,1,CRYPTO_LOCK_SSL_CTX); |
220 | s->ctx=ctx; | 284 | s->ctx=ctx; |
221 | 285 | ||
@@ -226,15 +290,12 @@ SSL *SSL_new(SSL_CTX *ctx) | |||
226 | if (!s->method->ssl_new(s)) | 290 | if (!s->method->ssl_new(s)) |
227 | goto err; | 291 | goto err; |
228 | 292 | ||
229 | s->quiet_shutdown=ctx->quiet_shutdown; | ||
230 | s->references=1; | 293 | s->references=1; |
231 | s->server=(ctx->method->ssl_accept == ssl_undefined_function)?0:1; | 294 | s->server=(ctx->method->ssl_accept == ssl_undefined_function)?0:1; |
232 | s->options=ctx->options; | 295 | |
233 | s->mode=ctx->mode; | ||
234 | s->read_ahead=ctx->read_ahead; /* used to happen in SSL_clear */ | ||
235 | SSL_clear(s); | 296 | SSL_clear(s); |
236 | 297 | ||
237 | CRYPTO_new_ex_data(ssl_meth,s,&s->ex_data); | 298 | CRYPTO_new_ex_data(CRYPTO_EX_INDEX_SSL, s, &s->ex_data); |
238 | 299 | ||
239 | return(s); | 300 | return(s); |
240 | err: | 301 | err: |
@@ -278,45 +339,71 @@ int SSL_set_session_id_context(SSL *ssl,const unsigned char *sid_ctx, | |||
278 | return 1; | 339 | return 1; |
279 | } | 340 | } |
280 | 341 | ||
281 | int SSL_CTX_set_purpose(SSL_CTX *s, int purpose) | 342 | int SSL_CTX_set_generate_session_id(SSL_CTX *ctx, GEN_SESSION_CB cb) |
282 | { | 343 | { |
283 | if(X509_PURPOSE_get_by_id(purpose) == -1) { | 344 | CRYPTO_w_lock(CRYPTO_LOCK_SSL_CTX); |
284 | SSLerr(SSL_F_SSL_CTX_SET_PURPOSE, SSL_R_INVALID_PURPOSE); | 345 | ctx->generate_session_id = cb; |
285 | return 0; | 346 | CRYPTO_w_unlock(CRYPTO_LOCK_SSL_CTX); |
347 | return 1; | ||
286 | } | 348 | } |
287 | s->purpose = purpose; | 349 | |
350 | int SSL_set_generate_session_id(SSL *ssl, GEN_SESSION_CB cb) | ||
351 | { | ||
352 | CRYPTO_w_lock(CRYPTO_LOCK_SSL); | ||
353 | ssl->generate_session_id = cb; | ||
354 | CRYPTO_w_unlock(CRYPTO_LOCK_SSL); | ||
288 | return 1; | 355 | return 1; |
289 | } | 356 | } |
357 | |||
358 | int SSL_has_matching_session_id(const SSL *ssl, const unsigned char *id, | ||
359 | unsigned int id_len) | ||
360 | { | ||
361 | /* A quick examination of SSL_SESSION_hash and SSL_SESSION_cmp shows how | ||
362 | * we can "construct" a session to give us the desired check - ie. to | ||
363 | * find if there's a session in the hash table that would conflict with | ||
364 | * any new session built out of this id/id_len and the ssl_version in | ||
365 | * use by this SSL. */ | ||
366 | SSL_SESSION r, *p; | ||
367 | r.ssl_version = ssl->version; | ||
368 | r.session_id_length = id_len; | ||
369 | memcpy(r.session_id, id, id_len); | ||
370 | /* NB: SSLv2 always uses a fixed 16-byte session ID, so even if a | ||
371 | * callback is calling us to check the uniqueness of a shorter ID, it | ||
372 | * must be compared as a padded-out ID because that is what it will be | ||
373 | * converted to when the callback has finished choosing it. */ | ||
374 | if((r.ssl_version == SSL2_VERSION) && | ||
375 | (id_len < SSL2_SSL_SESSION_ID_LENGTH)) | ||
376 | { | ||
377 | memset(r.session_id + id_len, 0, | ||
378 | SSL2_SSL_SESSION_ID_LENGTH - id_len); | ||
379 | r.session_id_length = SSL2_SSL_SESSION_ID_LENGTH; | ||
380 | } | ||
381 | |||
382 | CRYPTO_r_lock(CRYPTO_LOCK_SSL_CTX); | ||
383 | p = (SSL_SESSION *)lh_retrieve(ssl->ctx->sessions, &r); | ||
384 | CRYPTO_r_unlock(CRYPTO_LOCK_SSL_CTX); | ||
385 | return (p != NULL); | ||
386 | } | ||
387 | |||
388 | int SSL_CTX_set_purpose(SSL_CTX *s, int purpose) | ||
389 | { | ||
390 | return X509_PURPOSE_set(&s->purpose, purpose); | ||
391 | } | ||
290 | 392 | ||
291 | int SSL_set_purpose(SSL *s, int purpose) | 393 | int SSL_set_purpose(SSL *s, int purpose) |
292 | { | 394 | { |
293 | if(X509_PURPOSE_get_by_id(purpose) == -1) { | 395 | return X509_PURPOSE_set(&s->purpose, purpose); |
294 | SSLerr(SSL_F_SSL_SET_PURPOSE, SSL_R_INVALID_PURPOSE); | ||
295 | return 0; | ||
296 | } | 396 | } |
297 | s->purpose = purpose; | 397 | |
298 | return 1; | ||
299 | } | ||
300 | |||
301 | int SSL_CTX_set_trust(SSL_CTX *s, int trust) | 398 | int SSL_CTX_set_trust(SSL_CTX *s, int trust) |
302 | { | 399 | { |
303 | if(X509_TRUST_get_by_id(trust) == -1) { | 400 | return X509_TRUST_set(&s->trust, trust); |
304 | SSLerr(SSL_F_SSL_CTX_SET_TRUST, SSL_R_INVALID_TRUST); | ||
305 | return 0; | ||
306 | } | 401 | } |
307 | s->trust = trust; | ||
308 | return 1; | ||
309 | } | ||
310 | 402 | ||
311 | int SSL_set_trust(SSL *s, int trust) | 403 | int SSL_set_trust(SSL *s, int trust) |
312 | { | 404 | { |
313 | if(X509_TRUST_get_by_id(trust) == -1) { | 405 | return X509_TRUST_set(&s->trust, trust); |
314 | SSLerr(SSL_F_SSL_SET_TRUST, SSL_R_INVALID_TRUST); | ||
315 | return 0; | ||
316 | } | 406 | } |
317 | s->trust = trust; | ||
318 | return 1; | ||
319 | } | ||
320 | 407 | ||
321 | void SSL_free(SSL *s) | 408 | void SSL_free(SSL *s) |
322 | { | 409 | { |
@@ -338,7 +425,7 @@ void SSL_free(SSL *s) | |||
338 | } | 425 | } |
339 | #endif | 426 | #endif |
340 | 427 | ||
341 | CRYPTO_free_ex_data(ssl_meth,(char *)s,&s->ex_data); | 428 | CRYPTO_free_ex_data(CRYPTO_EX_INDEX_SSL, s, &s->ex_data); |
342 | 429 | ||
343 | if (s->bbio != NULL) | 430 | if (s->bbio != NULL) |
344 | { | 431 | { |
@@ -411,6 +498,11 @@ BIO *SSL_get_wbio(SSL *s) | |||
411 | 498 | ||
412 | int SSL_get_fd(SSL *s) | 499 | int SSL_get_fd(SSL *s) |
413 | { | 500 | { |
501 | return(SSL_get_rfd(s)); | ||
502 | } | ||
503 | |||
504 | int SSL_get_rfd(SSL *s) | ||
505 | { | ||
414 | int ret= -1; | 506 | int ret= -1; |
415 | BIO *b,*r; | 507 | BIO *b,*r; |
416 | 508 | ||
@@ -421,7 +513,19 @@ int SSL_get_fd(SSL *s) | |||
421 | return(ret); | 513 | return(ret); |
422 | } | 514 | } |
423 | 515 | ||
424 | #ifndef NO_SOCK | 516 | int SSL_get_wfd(SSL *s) |
517 | { | ||
518 | int ret= -1; | ||
519 | BIO *b,*r; | ||
520 | |||
521 | b=SSL_get_wbio(s); | ||
522 | r=BIO_find_type(b,BIO_TYPE_DESCRIPTOR); | ||
523 | if (r != NULL) | ||
524 | BIO_get_fd(r,&ret); | ||
525 | return(ret); | ||
526 | } | ||
527 | |||
528 | #ifndef OPENSSL_NO_SOCK | ||
425 | int SSL_set_fd(SSL *s,int fd) | 529 | int SSL_set_fd(SSL *s,int fd) |
426 | { | 530 | { |
427 | int ret=0; | 531 | int ret=0; |
@@ -576,6 +680,13 @@ int SSL_get_read_ahead(SSL *s) | |||
576 | 680 | ||
577 | int SSL_pending(SSL *s) | 681 | int SSL_pending(SSL *s) |
578 | { | 682 | { |
683 | /* SSL_pending cannot work properly if read-ahead is enabled | ||
684 | * (SSL_[CTX_]ctrl(..., SSL_CTRL_SET_READ_AHEAD, 1, NULL)), | ||
685 | * and it is impossible to fix since SSL_pending cannot report | ||
686 | * errors that may be observed while scanning the new data. | ||
687 | * (Note that SSL_pending() is often used as a boolean value, | ||
688 | * so we'd better not return -1.) | ||
689 | */ | ||
579 | return(s->method->ssl_pending(s)); | 690 | return(s->method->ssl_pending(s)); |
580 | } | 691 | } |
581 | 692 | ||
@@ -778,11 +889,21 @@ int SSL_shutdown(SSL *s) | |||
778 | 889 | ||
779 | int SSL_renegotiate(SSL *s) | 890 | int SSL_renegotiate(SSL *s) |
780 | { | 891 | { |
781 | s->new_session=1; | 892 | if (s->new_session == 0) |
893 | { | ||
894 | s->new_session=1; | ||
895 | } | ||
782 | return(s->method->ssl_renegotiate(s)); | 896 | return(s->method->ssl_renegotiate(s)); |
783 | } | 897 | } |
784 | 898 | ||
785 | long SSL_ctrl(SSL *s,int cmd,long larg,char *parg) | 899 | int SSL_renegotiate_pending(SSL *s) |
900 | { | ||
901 | /* becomes true when negotiation is requested; | ||
902 | * false again once a handshake has finished */ | ||
903 | return (s->new_session != 0); | ||
904 | } | ||
905 | |||
906 | long SSL_ctrl(SSL *s,int cmd,long larg,void *parg) | ||
786 | { | 907 | { |
787 | long l; | 908 | long l; |
788 | 909 | ||
@@ -794,10 +915,21 @@ long SSL_ctrl(SSL *s,int cmd,long larg,char *parg) | |||
794 | l=s->read_ahead; | 915 | l=s->read_ahead; |
795 | s->read_ahead=larg; | 916 | s->read_ahead=larg; |
796 | return(l); | 917 | return(l); |
918 | |||
919 | case SSL_CTRL_SET_MSG_CALLBACK_ARG: | ||
920 | s->msg_callback_arg = parg; | ||
921 | return 1; | ||
922 | |||
797 | case SSL_CTRL_OPTIONS: | 923 | case SSL_CTRL_OPTIONS: |
798 | return(s->options|=larg); | 924 | return(s->options|=larg); |
799 | case SSL_CTRL_MODE: | 925 | case SSL_CTRL_MODE: |
800 | return(s->mode|=larg); | 926 | return(s->mode|=larg); |
927 | case SSL_CTRL_GET_MAX_CERT_LIST: | ||
928 | return(s->max_cert_list); | ||
929 | case SSL_CTRL_SET_MAX_CERT_LIST: | ||
930 | l=s->max_cert_list; | ||
931 | s->max_cert_list=larg; | ||
932 | return(l); | ||
801 | default: | 933 | default: |
802 | return(s->method->ssl_ctrl(s,cmd,larg,parg)); | 934 | return(s->method->ssl_ctrl(s,cmd,larg,parg)); |
803 | } | 935 | } |
@@ -807,6 +939,10 @@ long SSL_callback_ctrl(SSL *s, int cmd, void (*fp)()) | |||
807 | { | 939 | { |
808 | switch(cmd) | 940 | switch(cmd) |
809 | { | 941 | { |
942 | case SSL_CTRL_SET_MSG_CALLBACK: | ||
943 | s->msg_callback = (void (*)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg))(fp); | ||
944 | return 1; | ||
945 | |||
810 | default: | 946 | default: |
811 | return(s->method->ssl_callback_ctrl(s,cmd,fp)); | 947 | return(s->method->ssl_callback_ctrl(s,cmd,fp)); |
812 | } | 948 | } |
@@ -817,7 +953,7 @@ struct lhash_st *SSL_CTX_sessions(SSL_CTX *ctx) | |||
817 | return ctx->sessions; | 953 | return ctx->sessions; |
818 | } | 954 | } |
819 | 955 | ||
820 | long SSL_CTX_ctrl(SSL_CTX *ctx,int cmd,long larg,char *parg) | 956 | long SSL_CTX_ctrl(SSL_CTX *ctx,int cmd,long larg,void *parg) |
821 | { | 957 | { |
822 | long l; | 958 | long l; |
823 | 959 | ||
@@ -829,6 +965,17 @@ long SSL_CTX_ctrl(SSL_CTX *ctx,int cmd,long larg,char *parg) | |||
829 | l=ctx->read_ahead; | 965 | l=ctx->read_ahead; |
830 | ctx->read_ahead=larg; | 966 | ctx->read_ahead=larg; |
831 | return(l); | 967 | return(l); |
968 | |||
969 | case SSL_CTRL_SET_MSG_CALLBACK_ARG: | ||
970 | ctx->msg_callback_arg = parg; | ||
971 | return 1; | ||
972 | |||
973 | case SSL_CTRL_GET_MAX_CERT_LIST: | ||
974 | return(ctx->max_cert_list); | ||
975 | case SSL_CTRL_SET_MAX_CERT_LIST: | ||
976 | l=ctx->max_cert_list; | ||
977 | ctx->max_cert_list=larg; | ||
978 | return(l); | ||
832 | 979 | ||
833 | case SSL_CTRL_SET_SESS_CACHE_SIZE: | 980 | case SSL_CTRL_SET_SESS_CACHE_SIZE: |
834 | l=ctx->session_cache_size; | 981 | l=ctx->session_cache_size; |
@@ -880,6 +1027,10 @@ long SSL_CTX_callback_ctrl(SSL_CTX *ctx, int cmd, void (*fp)()) | |||
880 | { | 1027 | { |
881 | switch(cmd) | 1028 | switch(cmd) |
882 | { | 1029 | { |
1030 | case SSL_CTRL_SET_MSG_CALLBACK: | ||
1031 | ctx->msg_callback = (void (*)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg))(fp); | ||
1032 | return 1; | ||
1033 | |||
883 | default: | 1034 | default: |
884 | return(ctx->method->ssl_ctx_callback_ctrl(ctx,cmd,fp)); | 1035 | return(ctx->method->ssl_ctx_callback_ctrl(ctx,cmd,fp)); |
885 | } | 1036 | } |
@@ -1018,6 +1169,9 @@ int ssl_cipher_list_to_bytes(SSL *s,STACK_OF(SSL_CIPHER) *sk,unsigned char *p) | |||
1018 | int i,j=0; | 1169 | int i,j=0; |
1019 | SSL_CIPHER *c; | 1170 | SSL_CIPHER *c; |
1020 | unsigned char *q; | 1171 | unsigned char *q; |
1172 | #ifndef OPENSSL_NO_KRB5 | ||
1173 | int nokrb5 = !kssl_tgt_is_available(s->kssl_ctx); | ||
1174 | #endif /* OPENSSL_NO_KRB5 */ | ||
1021 | 1175 | ||
1022 | if (sk == NULL) return(0); | 1176 | if (sk == NULL) return(0); |
1023 | q=p; | 1177 | q=p; |
@@ -1025,6 +1179,10 @@ int ssl_cipher_list_to_bytes(SSL *s,STACK_OF(SSL_CIPHER) *sk,unsigned char *p) | |||
1025 | for (i=0; i<sk_SSL_CIPHER_num(sk); i++) | 1179 | for (i=0; i<sk_SSL_CIPHER_num(sk); i++) |
1026 | { | 1180 | { |
1027 | c=sk_SSL_CIPHER_value(sk,i); | 1181 | c=sk_SSL_CIPHER_value(sk,i); |
1182 | #ifndef OPENSSL_NO_KRB5 | ||
1183 | if ((c->algorithms & SSL_KRB5) && nokrb5) | ||
1184 | continue; | ||
1185 | #endif /* OPENSSL_NO_KRB5 */ | ||
1028 | j=ssl_put_cipher_by_char(s,c,p); | 1186 | j=ssl_put_cipher_by_char(s,c,p); |
1029 | p+=j; | 1187 | p+=j; |
1030 | } | 1188 | } |
@@ -1087,6 +1245,11 @@ unsigned long SSL_SESSION_hash(SSL_SESSION *a) | |||
1087 | return(l); | 1245 | return(l); |
1088 | } | 1246 | } |
1089 | 1247 | ||
1248 | /* NB: If this function (or indeed the hash function which uses a sort of | ||
1249 | * coarser function than this one) is changed, ensure | ||
1250 | * SSL_CTX_has_matching_session_id() is checked accordingly. It relies on being | ||
1251 | * able to construct an SSL_SESSION that will collide with any existing session | ||
1252 | * with a matching session ID. */ | ||
1090 | int SSL_SESSION_cmp(SSL_SESSION *a,SSL_SESSION *b) | 1253 | int SSL_SESSION_cmp(SSL_SESSION *a,SSL_SESSION *b) |
1091 | { | 1254 | { |
1092 | if (a->ssl_version != b->ssl_version) | 1255 | if (a->ssl_version != b->ssl_version) |
@@ -1096,6 +1259,13 @@ int SSL_SESSION_cmp(SSL_SESSION *a,SSL_SESSION *b) | |||
1096 | return(memcmp(a->session_id,b->session_id,a->session_id_length)); | 1259 | return(memcmp(a->session_id,b->session_id,a->session_id_length)); |
1097 | } | 1260 | } |
1098 | 1261 | ||
1262 | /* These wrapper functions should remain rather than redeclaring | ||
1263 | * SSL_SESSION_hash and SSL_SESSION_cmp for void* types and casting each | ||
1264 | * variable. The reason is that the functions aren't static, they're exposed via | ||
1265 | * ssl.h. */ | ||
1266 | static IMPLEMENT_LHASH_HASH_FN(SSL_SESSION_hash, SSL_SESSION *) | ||
1267 | static IMPLEMENT_LHASH_COMP_FN(SSL_SESSION_cmp, SSL_SESSION *) | ||
1268 | |||
1099 | SSL_CTX *SSL_CTX_new(SSL_METHOD *meth) | 1269 | SSL_CTX *SSL_CTX_new(SSL_METHOD *meth) |
1100 | { | 1270 | { |
1101 | SSL_CTX *ret=NULL; | 1271 | SSL_CTX *ret=NULL; |
@@ -1128,9 +1298,10 @@ SSL_CTX *SSL_CTX_new(SSL_METHOD *meth) | |||
1128 | /* We take the system default */ | 1298 | /* We take the system default */ |
1129 | ret->session_timeout=meth->get_timeout(); | 1299 | ret->session_timeout=meth->get_timeout(); |
1130 | 1300 | ||
1131 | ret->new_session_cb=NULL; | 1301 | ret->new_session_cb=0; |
1132 | ret->remove_session_cb=NULL; | 1302 | ret->remove_session_cb=0; |
1133 | ret->get_session_cb=NULL; | 1303 | ret->get_session_cb=0; |
1304 | ret->generate_session_id=0; | ||
1134 | 1305 | ||
1135 | memset((char *)&ret->stats,0,sizeof(ret->stats)); | 1306 | memset((char *)&ret->stats,0,sizeof(ret->stats)); |
1136 | 1307 | ||
@@ -1145,21 +1316,26 @@ SSL_CTX *SSL_CTX_new(SSL_METHOD *meth) | |||
1145 | 1316 | ||
1146 | ret->info_callback=NULL; | 1317 | ret->info_callback=NULL; |
1147 | 1318 | ||
1148 | ret->app_verify_callback=NULL; | 1319 | ret->app_verify_callback=0; |
1149 | ret->app_verify_arg=NULL; | 1320 | ret->app_verify_arg=NULL; |
1150 | 1321 | ||
1322 | ret->max_cert_list=SSL_MAX_CERT_LIST_DEFAULT; | ||
1151 | ret->read_ahead=0; | 1323 | ret->read_ahead=0; |
1324 | ret->msg_callback=0; | ||
1325 | ret->msg_callback_arg=NULL; | ||
1152 | ret->verify_mode=SSL_VERIFY_NONE; | 1326 | ret->verify_mode=SSL_VERIFY_NONE; |
1153 | ret->verify_depth=-1; /* Don't impose a limit (but x509_lu.c does) */ | 1327 | ret->verify_depth=-1; /* Don't impose a limit (but x509_lu.c does) */ |
1328 | ret->sid_ctx_length=0; | ||
1154 | ret->default_verify_callback=NULL; | 1329 | ret->default_verify_callback=NULL; |
1155 | if ((ret->cert=ssl_cert_new()) == NULL) | 1330 | if ((ret->cert=ssl_cert_new()) == NULL) |
1156 | goto err; | 1331 | goto err; |
1157 | 1332 | ||
1158 | ret->default_passwd_callback=NULL; | 1333 | ret->default_passwd_callback=0; |
1159 | ret->default_passwd_callback_userdata=NULL; | 1334 | ret->default_passwd_callback_userdata=NULL; |
1160 | ret->client_cert_cb=NULL; | 1335 | ret->client_cert_cb=0; |
1161 | 1336 | ||
1162 | ret->sessions=lh_new(SSL_SESSION_hash,SSL_SESSION_cmp); | 1337 | ret->sessions=lh_new(LHASH_HASH_FN(SSL_SESSION_hash), |
1338 | LHASH_COMP_FN(SSL_SESSION_cmp)); | ||
1163 | if (ret->sessions == NULL) goto err; | 1339 | if (ret->sessions == NULL) goto err; |
1164 | ret->cert_store=X509_STORE_new(); | 1340 | ret->cert_store=X509_STORE_new(); |
1165 | if (ret->cert_store == NULL) goto err; | 1341 | if (ret->cert_store == NULL) goto err; |
@@ -1193,7 +1369,7 @@ SSL_CTX *SSL_CTX_new(SSL_METHOD *meth) | |||
1193 | if ((ret->client_CA=sk_X509_NAME_new_null()) == NULL) | 1369 | if ((ret->client_CA=sk_X509_NAME_new_null()) == NULL) |
1194 | goto err; | 1370 | goto err; |
1195 | 1371 | ||
1196 | CRYPTO_new_ex_data(ssl_ctx_meth,(char *)ret,&ret->ex_data); | 1372 | CRYPTO_new_ex_data(CRYPTO_EX_INDEX_SSL_CTX, ret, &ret->ex_data); |
1197 | 1373 | ||
1198 | ret->extra_certs=NULL; | 1374 | ret->extra_certs=NULL; |
1199 | ret->comp_methods=SSL_COMP_get_compression_methods(); | 1375 | ret->comp_methods=SSL_COMP_get_compression_methods(); |
@@ -1206,8 +1382,10 @@ err2: | |||
1206 | return(NULL); | 1382 | return(NULL); |
1207 | } | 1383 | } |
1208 | 1384 | ||
1385 | #if 0 | ||
1209 | static void SSL_COMP_free(SSL_COMP *comp) | 1386 | static void SSL_COMP_free(SSL_COMP *comp) |
1210 | { OPENSSL_free(comp); } | 1387 | { OPENSSL_free(comp); } |
1388 | #endif | ||
1211 | 1389 | ||
1212 | void SSL_CTX_free(SSL_CTX *a) | 1390 | void SSL_CTX_free(SSL_CTX *a) |
1213 | { | 1391 | { |
@@ -1227,7 +1405,7 @@ void SSL_CTX_free(SSL_CTX *a) | |||
1227 | abort(); /* ok */ | 1405 | abort(); /* ok */ |
1228 | } | 1406 | } |
1229 | #endif | 1407 | #endif |
1230 | CRYPTO_free_ex_data(ssl_ctx_meth,(char *)a,&a->ex_data); | 1408 | CRYPTO_free_ex_data(CRYPTO_EX_INDEX_SSL_CTX, a, &a->ex_data); |
1231 | 1409 | ||
1232 | if (a->sessions != NULL) | 1410 | if (a->sessions != NULL) |
1233 | { | 1411 | { |
@@ -1246,8 +1424,12 @@ void SSL_CTX_free(SSL_CTX *a) | |||
1246 | sk_X509_NAME_pop_free(a->client_CA,X509_NAME_free); | 1424 | sk_X509_NAME_pop_free(a->client_CA,X509_NAME_free); |
1247 | if (a->extra_certs != NULL) | 1425 | if (a->extra_certs != NULL) |
1248 | sk_X509_pop_free(a->extra_certs,X509_free); | 1426 | sk_X509_pop_free(a->extra_certs,X509_free); |
1427 | #if 0 /* This should never be done, since it removes a global database */ | ||
1249 | if (a->comp_methods != NULL) | 1428 | if (a->comp_methods != NULL) |
1250 | sk_SSL_COMP_pop_free(a->comp_methods,SSL_COMP_free); | 1429 | sk_SSL_COMP_pop_free(a->comp_methods,SSL_COMP_free); |
1430 | #else | ||
1431 | a->comp_methods = NULL; | ||
1432 | #endif | ||
1251 | OPENSSL_free(a); | 1433 | OPENSSL_free(a); |
1252 | } | 1434 | } |
1253 | 1435 | ||
@@ -1261,23 +1443,16 @@ void SSL_CTX_set_default_passwd_cb_userdata(SSL_CTX *ctx,void *u) | |||
1261 | ctx->default_passwd_callback_userdata=u; | 1443 | ctx->default_passwd_callback_userdata=u; |
1262 | } | 1444 | } |
1263 | 1445 | ||
1264 | void SSL_CTX_set_cert_verify_callback(SSL_CTX *ctx,int (*cb)(),char *arg) | 1446 | void SSL_CTX_set_cert_verify_callback(SSL_CTX *ctx, int (*cb)(X509_STORE_CTX *,void *), void *arg) |
1265 | { | 1447 | { |
1266 | /* now | ||
1267 | * int (*cb)(X509_STORE_CTX *), | ||
1268 | * but should be | ||
1269 | * int (*cb)(X509_STORE_CTX *, void *arg) | ||
1270 | */ | ||
1271 | ctx->app_verify_callback=cb; | 1448 | ctx->app_verify_callback=cb; |
1272 | ctx->app_verify_arg=arg; /* never used */ | 1449 | ctx->app_verify_arg=arg; |
1273 | } | 1450 | } |
1274 | 1451 | ||
1275 | void SSL_CTX_set_verify(SSL_CTX *ctx,int mode,int (*cb)(int, X509_STORE_CTX *)) | 1452 | void SSL_CTX_set_verify(SSL_CTX *ctx,int mode,int (*cb)(int, X509_STORE_CTX *)) |
1276 | { | 1453 | { |
1277 | ctx->verify_mode=mode; | 1454 | ctx->verify_mode=mode; |
1278 | ctx->default_verify_callback=cb; | 1455 | ctx->default_verify_callback=cb; |
1279 | /* This needs cleaning up EAY EAY EAY */ | ||
1280 | X509_STORE_set_verify_cb_func(ctx->cert_store,cb); | ||
1281 | } | 1456 | } |
1282 | 1457 | ||
1283 | void SSL_CTX_set_verify_depth(SSL_CTX *ctx,int depth) | 1458 | void SSL_CTX_set_verify_depth(SSL_CTX *ctx,int depth) |
@@ -1297,14 +1472,14 @@ void ssl_set_cert_masks(CERT *c, SSL_CIPHER *cipher) | |||
1297 | 1472 | ||
1298 | kl=SSL_C_EXPORT_PKEYLENGTH(cipher); | 1473 | kl=SSL_C_EXPORT_PKEYLENGTH(cipher); |
1299 | 1474 | ||
1300 | #ifndef NO_RSA | 1475 | #ifndef OPENSSL_NO_RSA |
1301 | rsa_tmp=(c->rsa_tmp != NULL || c->rsa_tmp_cb != NULL); | 1476 | rsa_tmp=(c->rsa_tmp != NULL || c->rsa_tmp_cb != NULL); |
1302 | rsa_tmp_export=(c->rsa_tmp_cb != NULL || | 1477 | rsa_tmp_export=(c->rsa_tmp_cb != NULL || |
1303 | (rsa_tmp && RSA_size(c->rsa_tmp)*8 <= kl)); | 1478 | (rsa_tmp && RSA_size(c->rsa_tmp)*8 <= kl)); |
1304 | #else | 1479 | #else |
1305 | rsa_tmp=rsa_tmp_export=0; | 1480 | rsa_tmp=rsa_tmp_export=0; |
1306 | #endif | 1481 | #endif |
1307 | #ifndef NO_DH | 1482 | #ifndef OPENSSL_NO_DH |
1308 | dh_tmp=(c->dh_tmp != NULL || c->dh_tmp_cb != NULL); | 1483 | dh_tmp=(c->dh_tmp != NULL || c->dh_tmp_cb != NULL); |
1309 | dh_tmp_export=(c->dh_tmp_cb != NULL || | 1484 | dh_tmp_export=(c->dh_tmp_cb != NULL || |
1310 | (dh_tmp && DH_size(c->dh_tmp)*8 <= kl)); | 1485 | (dh_tmp && DH_size(c->dh_tmp)*8 <= kl)); |
@@ -1378,6 +1553,11 @@ void ssl_set_cert_masks(CERT *c, SSL_CIPHER *cipher) | |||
1378 | mask|=SSL_aNULL; | 1553 | mask|=SSL_aNULL; |
1379 | emask|=SSL_aNULL; | 1554 | emask|=SSL_aNULL; |
1380 | 1555 | ||
1556 | #ifndef OPENSSL_NO_KRB5 | ||
1557 | mask|=SSL_kKRB5|SSL_aKRB5; | ||
1558 | emask|=SSL_kKRB5|SSL_aKRB5; | ||
1559 | #endif | ||
1560 | |||
1381 | c->mask=mask; | 1561 | c->mask=mask; |
1382 | c->export_mask=emask; | 1562 | c->export_mask=emask; |
1383 | c->valid=1; | 1563 | c->valid=1; |
@@ -1410,9 +1590,14 @@ X509 *ssl_get_server_send_cert(SSL *s) | |||
1410 | else | 1590 | else |
1411 | i=SSL_PKEY_RSA_ENC; | 1591 | i=SSL_PKEY_RSA_ENC; |
1412 | } | 1592 | } |
1593 | else if (kalg & SSL_aKRB5) | ||
1594 | { | ||
1595 | /* VRS something else here? */ | ||
1596 | return(NULL); | ||
1597 | } | ||
1413 | else /* if (kalg & SSL_aNULL) */ | 1598 | else /* if (kalg & SSL_aNULL) */ |
1414 | { | 1599 | { |
1415 | SSLerr(SSL_F_SSL_GET_SERVER_SEND_CERT,SSL_R_INTERNAL_ERROR); | 1600 | SSLerr(SSL_F_SSL_GET_SERVER_SEND_CERT,ERR_R_INTERNAL_ERROR); |
1416 | return(NULL); | 1601 | return(NULL); |
1417 | } | 1602 | } |
1418 | if (c->pkeys[i].x509 == NULL) return(NULL); | 1603 | if (c->pkeys[i].x509 == NULL) return(NULL); |
@@ -1441,7 +1626,7 @@ EVP_PKEY *ssl_get_sign_pkey(SSL *s,SSL_CIPHER *cipher) | |||
1441 | } | 1626 | } |
1442 | else /* if (alg & SSL_aNULL) */ | 1627 | else /* if (alg & SSL_aNULL) */ |
1443 | { | 1628 | { |
1444 | SSLerr(SSL_F_SSL_GET_SIGN_PKEY,SSL_R_INTERNAL_ERROR); | 1629 | SSLerr(SSL_F_SSL_GET_SIGN_PKEY,ERR_R_INTERNAL_ERROR); |
1445 | return(NULL); | 1630 | return(NULL); |
1446 | } | 1631 | } |
1447 | } | 1632 | } |
@@ -1454,9 +1639,10 @@ void ssl_update_cache(SSL *s,int mode) | |||
1454 | * and it would be rather hard to do anyway :-) */ | 1639 | * and it would be rather hard to do anyway :-) */ |
1455 | if (s->session->session_id_length == 0) return; | 1640 | if (s->session->session_id_length == 0) return; |
1456 | 1641 | ||
1457 | if ((s->ctx->session_cache_mode & mode) | 1642 | i=s->ctx->session_cache_mode; |
1458 | && (!s->hit) | 1643 | if ((i & mode) && (!s->hit) |
1459 | && SSL_CTX_add_session(s->ctx,s->session) | 1644 | && ((i & SSL_SESS_CACHE_NO_INTERNAL_LOOKUP) |
1645 | || SSL_CTX_add_session(s->ctx,s->session)) | ||
1460 | && (s->ctx->new_session_cb != NULL)) | 1646 | && (s->ctx->new_session_cb != NULL)) |
1461 | { | 1647 | { |
1462 | CRYPTO_add(&s->session->references,1,CRYPTO_LOCK_SSL_SESSION); | 1648 | CRYPTO_add(&s->session->references,1,CRYPTO_LOCK_SSL_SESSION); |
@@ -1465,7 +1651,6 @@ void ssl_update_cache(SSL *s,int mode) | |||
1465 | } | 1651 | } |
1466 | 1652 | ||
1467 | /* auto flush every 255 connections */ | 1653 | /* auto flush every 255 connections */ |
1468 | i=s->ctx->session_cache_mode; | ||
1469 | if ((!(i & SSL_SESS_CACHE_NO_AUTO_CLEAR)) && | 1654 | if ((!(i & SSL_SESS_CACHE_NO_AUTO_CLEAR)) && |
1470 | ((i & mode) == mode)) | 1655 | ((i & mode) == mode)) |
1471 | { | 1656 | { |
@@ -1549,6 +1734,8 @@ int SSL_get_error(SSL *s,int i) | |||
1549 | reason=BIO_get_retry_reason(bio); | 1734 | reason=BIO_get_retry_reason(bio); |
1550 | if (reason == BIO_RR_CONNECT) | 1735 | if (reason == BIO_RR_CONNECT) |
1551 | return(SSL_ERROR_WANT_CONNECT); | 1736 | return(SSL_ERROR_WANT_CONNECT); |
1737 | else if (reason == BIO_RR_ACCEPT) | ||
1738 | return(SSL_ERROR_WANT_ACCEPT); | ||
1552 | else | 1739 | else |
1553 | return(SSL_ERROR_SYSCALL); /* unknown */ | 1740 | return(SSL_ERROR_SYSCALL); /* unknown */ |
1554 | } | 1741 | } |
@@ -1567,6 +1754,8 @@ int SSL_get_error(SSL *s,int i) | |||
1567 | reason=BIO_get_retry_reason(bio); | 1754 | reason=BIO_get_retry_reason(bio); |
1568 | if (reason == BIO_RR_CONNECT) | 1755 | if (reason == BIO_RR_CONNECT) |
1569 | return(SSL_ERROR_WANT_CONNECT); | 1756 | return(SSL_ERROR_WANT_CONNECT); |
1757 | else if (reason == BIO_RR_ACCEPT) | ||
1758 | return(SSL_ERROR_WANT_ACCEPT); | ||
1570 | else | 1759 | else |
1571 | return(SSL_ERROR_SYSCALL); | 1760 | return(SSL_ERROR_SYSCALL); |
1572 | } | 1761 | } |
@@ -1667,7 +1856,11 @@ SSL *SSL_dup(SSL *s) | |||
1667 | 1856 | ||
1668 | if ((ret=SSL_new(SSL_get_SSL_CTX(s))) == NULL) | 1857 | if ((ret=SSL_new(SSL_get_SSL_CTX(s))) == NULL) |
1669 | return(NULL); | 1858 | return(NULL); |
1670 | 1859 | ||
1860 | ret->version = s->version; | ||
1861 | ret->type = s->type; | ||
1862 | ret->method = s->method; | ||
1863 | |||
1671 | if (s->session != NULL) | 1864 | if (s->session != NULL) |
1672 | { | 1865 | { |
1673 | /* This copies session-id, SSL_METHOD, sid_ctx, and 'cert' */ | 1866 | /* This copies session-id, SSL_METHOD, sid_ctx, and 'cert' */ |
@@ -1698,18 +1891,23 @@ SSL *SSL_dup(SSL *s) | |||
1698 | s->sid_ctx, s->sid_ctx_length); | 1891 | s->sid_ctx, s->sid_ctx_length); |
1699 | } | 1892 | } |
1700 | 1893 | ||
1894 | ret->options=s->options; | ||
1895 | ret->mode=s->mode; | ||
1896 | SSL_set_max_cert_list(ret,SSL_get_max_cert_list(s)); | ||
1701 | SSL_set_read_ahead(ret,SSL_get_read_ahead(s)); | 1897 | SSL_set_read_ahead(ret,SSL_get_read_ahead(s)); |
1898 | ret->msg_callback = s->msg_callback; | ||
1899 | ret->msg_callback_arg = s->msg_callback_arg; | ||
1702 | SSL_set_verify(ret,SSL_get_verify_mode(s), | 1900 | SSL_set_verify(ret,SSL_get_verify_mode(s), |
1703 | SSL_get_verify_callback(s)); | 1901 | SSL_get_verify_callback(s)); |
1704 | SSL_set_verify_depth(ret,SSL_get_verify_depth(s)); | 1902 | SSL_set_verify_depth(ret,SSL_get_verify_depth(s)); |
1903 | ret->generate_session_id = s->generate_session_id; | ||
1705 | 1904 | ||
1706 | SSL_set_info_callback(ret,SSL_get_info_callback(s)); | 1905 | SSL_set_info_callback(ret,SSL_get_info_callback(s)); |
1707 | 1906 | ||
1708 | ret->debug=s->debug; | 1907 | ret->debug=s->debug; |
1709 | ret->options=s->options; | ||
1710 | 1908 | ||
1711 | /* copy app data, a little dangerous perhaps */ | 1909 | /* copy app data, a little dangerous perhaps */ |
1712 | if (!CRYPTO_dup_ex_data(ssl_meth,&ret->ex_data,&s->ex_data)) | 1910 | if (!CRYPTO_dup_ex_data(CRYPTO_EX_INDEX_SSL, &ret->ex_data, &s->ex_data)) |
1713 | goto err; | 1911 | goto err; |
1714 | 1912 | ||
1715 | /* setup rbio, and wbio */ | 1913 | /* setup rbio, and wbio */ |
@@ -1728,6 +1926,19 @@ SSL *SSL_dup(SSL *s) | |||
1728 | else | 1926 | else |
1729 | ret->wbio=ret->rbio; | 1927 | ret->wbio=ret->rbio; |
1730 | } | 1928 | } |
1929 | ret->rwstate = s->rwstate; | ||
1930 | ret->in_handshake = s->in_handshake; | ||
1931 | ret->handshake_func = s->handshake_func; | ||
1932 | ret->server = s->server; | ||
1933 | ret->new_session = s->new_session; | ||
1934 | ret->quiet_shutdown = s->quiet_shutdown; | ||
1935 | ret->shutdown=s->shutdown; | ||
1936 | ret->state=s->state; /* SSL_dup does not really work at any state, though */ | ||
1937 | ret->rstate=s->rstate; | ||
1938 | ret->init_num = 0; /* would have to copy ret->init_buf, ret->init_msg, ret->init_num, ret->init_off */ | ||
1939 | ret->hit=s->hit; | ||
1940 | ret->purpose=s->purpose; | ||
1941 | ret->trust=s->trust; | ||
1731 | 1942 | ||
1732 | /* dup the cipher_list and cipher_list_by_id stacks */ | 1943 | /* dup the cipher_list and cipher_list_by_id stacks */ |
1733 | if (s->cipher_list != NULL) | 1944 | if (s->cipher_list != NULL) |
@@ -1756,11 +1967,6 @@ SSL *SSL_dup(SSL *s) | |||
1756 | } | 1967 | } |
1757 | } | 1968 | } |
1758 | 1969 | ||
1759 | ret->shutdown=s->shutdown; | ||
1760 | ret->state=s->state; | ||
1761 | ret->handshake_func=s->handshake_func; | ||
1762 | ret->server=s->server; | ||
1763 | |||
1764 | if (0) | 1970 | if (0) |
1765 | { | 1971 | { |
1766 | err: | 1972 | err: |
@@ -1913,7 +2119,7 @@ SSL_CTX *SSL_get_SSL_CTX(SSL *ssl) | |||
1913 | return(ssl->ctx); | 2119 | return(ssl->ctx); |
1914 | } | 2120 | } |
1915 | 2121 | ||
1916 | #ifndef NO_STDIO | 2122 | #ifndef OPENSSL_NO_STDIO |
1917 | int SSL_CTX_set_default_verify_paths(SSL_CTX *ctx) | 2123 | int SSL_CTX_set_default_verify_paths(SSL_CTX *ctx) |
1918 | { | 2124 | { |
1919 | return(X509_STORE_set_default_paths(ctx->cert_store)); | 2125 | return(X509_STORE_set_default_paths(ctx->cert_store)); |
@@ -1926,14 +2132,15 @@ int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile, | |||
1926 | } | 2132 | } |
1927 | #endif | 2133 | #endif |
1928 | 2134 | ||
1929 | void SSL_set_info_callback(SSL *ssl,void (*cb)()) | 2135 | void SSL_set_info_callback(SSL *ssl, |
2136 | void (*cb)(const SSL *ssl,int type,int val)) | ||
1930 | { | 2137 | { |
1931 | ssl->info_callback=cb; | 2138 | ssl->info_callback=cb; |
1932 | } | 2139 | } |
1933 | 2140 | ||
1934 | void (*SSL_get_info_callback(SSL *ssl))(void) | 2141 | void (*SSL_get_info_callback(SSL *ssl))(const SSL *ssl,int type,int val) |
1935 | { | 2142 | { |
1936 | return((void (*)())ssl->info_callback); | 2143 | return ssl->info_callback; |
1937 | } | 2144 | } |
1938 | 2145 | ||
1939 | int SSL_state(SSL *ssl) | 2146 | int SSL_state(SSL *ssl) |
@@ -1954,9 +2161,8 @@ long SSL_get_verify_result(SSL *ssl) | |||
1954 | int SSL_get_ex_new_index(long argl,void *argp,CRYPTO_EX_new *new_func, | 2161 | int SSL_get_ex_new_index(long argl,void *argp,CRYPTO_EX_new *new_func, |
1955 | CRYPTO_EX_dup *dup_func,CRYPTO_EX_free *free_func) | 2162 | CRYPTO_EX_dup *dup_func,CRYPTO_EX_free *free_func) |
1956 | { | 2163 | { |
1957 | ssl_meth_num++; | 2164 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_SSL, argl, argp, |
1958 | return(CRYPTO_get_ex_new_index(ssl_meth_num-1, | 2165 | new_func, dup_func, free_func); |
1959 | &ssl_meth,argl,argp,new_func,dup_func,free_func)); | ||
1960 | } | 2166 | } |
1961 | 2167 | ||
1962 | int SSL_set_ex_data(SSL *s,int idx,void *arg) | 2168 | int SSL_set_ex_data(SSL *s,int idx,void *arg) |
@@ -1972,9 +2178,8 @@ void *SSL_get_ex_data(SSL *s,int idx) | |||
1972 | int SSL_CTX_get_ex_new_index(long argl,void *argp,CRYPTO_EX_new *new_func, | 2178 | int SSL_CTX_get_ex_new_index(long argl,void *argp,CRYPTO_EX_new *new_func, |
1973 | CRYPTO_EX_dup *dup_func,CRYPTO_EX_free *free_func) | 2179 | CRYPTO_EX_dup *dup_func,CRYPTO_EX_free *free_func) |
1974 | { | 2180 | { |
1975 | ssl_ctx_meth_num++; | 2181 | return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_SSL_CTX, argl, argp, |
1976 | return(CRYPTO_get_ex_new_index(ssl_ctx_meth_num-1, | 2182 | new_func, dup_func, free_func); |
1977 | &ssl_ctx_meth,argl,argp,new_func,dup_func,free_func)); | ||
1978 | } | 2183 | } |
1979 | 2184 | ||
1980 | int SSL_CTX_set_ex_data(SSL_CTX *s,int idx,void *arg) | 2185 | int SSL_CTX_set_ex_data(SSL_CTX *s,int idx,void *arg) |
@@ -2015,7 +2220,7 @@ int SSL_want(SSL *s) | |||
2015 | * \param cb the callback | 2220 | * \param cb the callback |
2016 | */ | 2221 | */ |
2017 | 2222 | ||
2018 | #ifndef NO_RSA | 2223 | #ifndef OPENSSL_NO_RSA |
2019 | void SSL_CTX_set_tmp_rsa_callback(SSL_CTX *ctx,RSA *(*cb)(SSL *ssl, | 2224 | void SSL_CTX_set_tmp_rsa_callback(SSL_CTX *ctx,RSA *(*cb)(SSL *ssl, |
2020 | int is_export, | 2225 | int is_export, |
2021 | int keylength)) | 2226 | int keylength)) |
@@ -2052,21 +2257,33 @@ RSA *cb(SSL *ssl,int is_export,int keylength) | |||
2052 | * \param dh the callback | 2257 | * \param dh the callback |
2053 | */ | 2258 | */ |
2054 | 2259 | ||
2055 | #ifndef NO_DH | 2260 | #ifndef OPENSSL_NO_DH |
2056 | void SSL_CTX_set_tmp_dh_callback(SSL_CTX *ctx,DH *(*dh)(SSL *ssl,int is_export, | 2261 | void SSL_CTX_set_tmp_dh_callback(SSL_CTX *ctx,DH *(*dh)(SSL *ssl,int is_export, |
2057 | int keylength)) | 2262 | int keylength)) |
2058 | { | 2263 | { |
2059 | SSL_CTX_callback_ctrl(ctx,SSL_CTRL_SET_TMP_DH_CB,(void (*)())dh); | 2264 | SSL_CTX_callback_ctrl(ctx,SSL_CTRL_SET_TMP_DH_CB,(void (*)())dh); |
2060 | } | 2265 | } |
2061 | 2266 | ||
2062 | void SSL_set_tmp_dh_callback(SSL *ssl,DH *(*dh)(SSL *ssl,int is_export, | 2267 | void SSL_set_tmp_dh_callback(SSL *ssl,DH *(*dh)(SSL *ssl,int is_export, |
2063 | int keylength)) | 2268 | int keylength)) |
2064 | { | 2269 | { |
2065 | SSL_callback_ctrl(ssl,SSL_CTRL_SET_TMP_DH_CB,(void (*)())dh); | 2270 | SSL_callback_ctrl(ssl,SSL_CTRL_SET_TMP_DH_CB,(void (*)())dh); |
2066 | } | 2271 | } |
2067 | #endif | 2272 | #endif |
2068 | 2273 | ||
2069 | #if defined(_WINDLL) && defined(WIN16) | 2274 | |
2275 | void SSL_CTX_set_msg_callback(SSL_CTX *ctx, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)) | ||
2276 | { | ||
2277 | SSL_CTX_callback_ctrl(ctx, SSL_CTRL_SET_MSG_CALLBACK, (void (*)())cb); | ||
2278 | } | ||
2279 | void SSL_set_msg_callback(SSL *ssl, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)) | ||
2280 | { | ||
2281 | SSL_callback_ctrl(ssl, SSL_CTRL_SET_MSG_CALLBACK, (void (*)())cb); | ||
2282 | } | ||
2283 | |||
2284 | |||
2285 | |||
2286 | #if defined(_WINDLL) && defined(OPENSSL_SYS_WIN16) | ||
2070 | #include "../crypto/bio/bss_file.c" | 2287 | #include "../crypto/bio/bss_file.c" |
2071 | #endif | 2288 | #endif |
2072 | 2289 | ||