2001-08-21 13:02:58 +00:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2015-05-08 20:06:50 +00:00
|
|
|
SSL_COMP_add_compression_method, SSL_COMP_free_compression_methods - handle SSL/TLS integrated compression methods
|
2001-08-21 13:02:58 +00:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/ssl.h>
|
|
|
|
|
|
|
|
int SSL_COMP_add_compression_method(int id, COMP_METHOD *cm);
|
|
|
|
|
2015-05-08 20:06:50 +00:00
|
|
|
+void SSL_COMP_free_compression_methods(void);
|
|
|
|
|
2001-08-21 13:02:58 +00:00
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
SSL_COMP_add_compression_method() adds the compression method B<cm> with
|
|
|
|
the identifier B<id> to the list of available compression methods. This
|
|
|
|
list is globally maintained for all SSL operations within this application.
|
|
|
|
It cannot be set for specific SSL_CTX or SSL objects.
|
|
|
|
|
2015-05-08 20:06:50 +00:00
|
|
|
SSL_COMP_free_compression_methods() frees the internal table of
|
|
|
|
compression methods that were built internally, and possibly
|
|
|
|
augmented by adding SSL_COMP_add_compression_method().
|
|
|
|
|
2001-08-21 13:02:58 +00:00
|
|
|
=head1 NOTES
|
|
|
|
|
|
|
|
The TLS standard (or SSLv3) allows the integration of compression methods
|
|
|
|
into the communication. The TLS RFC does however not specify compression
|
|
|
|
methods or their corresponding identifiers, so there is currently no compatible
|
|
|
|
way to integrate compression with unknown peers. It is therefore currently not
|
|
|
|
recommended to integrate compression into applications. Applications for
|
|
|
|
non-public use may agree on certain compression methods. Using different
|
|
|
|
compression methods with the same identifier will lead to connection failure.
|
|
|
|
|
|
|
|
An OpenSSL client speaking a protocol that allows compression (SSLv3, TLSv1)
|
|
|
|
will unconditionally send the list of all compression methods enabled with
|
|
|
|
SSL_COMP_add_compression_method() to the server during the handshake.
|
|
|
|
Unlike the mechanisms to set a cipher list, there is no method available to
|
|
|
|
restrict the list of compression method on a per connection basis.
|
|
|
|
|
|
|
|
An OpenSSL server will match the identifiers listed by a client against
|
|
|
|
its own compression methods and will unconditionally activate compression
|
|
|
|
when a matching identifier is found. There is no way to restrict the list
|
|
|
|
of compression methods supported on a per connection basis.
|
|
|
|
|
2015-05-08 20:06:50 +00:00
|
|
|
If enabled during compilation, the OpenSSL library will have the
|
|
|
|
COMP_zlib() compression method available.
|
2001-08-21 13:02:58 +00:00
|
|
|
|
2001-08-23 09:42:12 +00:00
|
|
|
=head1 WARNINGS
|
|
|
|
|
|
|
|
Once the identities of the compression methods for the TLS protocol have
|
|
|
|
been standardized, the compression API will most likely be changed. Using
|
|
|
|
it in the current state is not recommended.
|
|
|
|
|
2001-08-21 13:02:58 +00:00
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
|
|
|
SSL_COMP_add_compression_method() may return the following values:
|
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
2013-10-21 09:03:01 +00:00
|
|
|
=item Z<>0
|
2001-08-21 13:02:58 +00:00
|
|
|
|
|
|
|
The operation succeeded.
|
|
|
|
|
2013-10-21 09:03:01 +00:00
|
|
|
=item Z<>1
|
2001-08-21 13:02:58 +00:00
|
|
|
|
|
|
|
The operation failed. Check the error queue to find out the reason.
|
|
|
|
|
|
|
|
=back
|
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2015-08-17 19:21:33 +00:00
|
|
|
L<ssl(3)>
|
2001-08-21 13:02:58 +00:00
|
|
|
|
|
|
|
=cut
|