3fa2812f32
These functions are similar to SSL_CTX_set_cookie_{generate,verify}_cb, but used for the application-controlled portion of TLS1.3 stateless handshake cookies rather than entire DTLSv1 cookies. Reviewed-by: Ben Kaduk <kaduk@mit.edu> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/5463)
85 lines
3.3 KiB
C
85 lines
3.3 KiB
C
/*
|
|
* Copyright 1995-2018 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <openssl/opensslconf.h>
|
|
|
|
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
|
|
# include <conio.h>
|
|
#endif
|
|
|
|
#if defined(OPENSSL_SYS_MSDOS) && !defined(_WIN32)
|
|
# define _kbhit kbhit
|
|
#endif
|
|
|
|
#define PORT "4433"
|
|
#define PROTOCOL "tcp"
|
|
|
|
typedef int (*do_server_cb)(int s, int stype, int prot, unsigned char *context);
|
|
int do_server(int *accept_sock, const char *host, const char *port,
|
|
int family, int type, int protocol,
|
|
do_server_cb cb,
|
|
unsigned char *context, int naccept);
|
|
#ifdef HEADER_X509_H
|
|
int verify_callback(int ok, X509_STORE_CTX *ctx);
|
|
#endif
|
|
#ifdef HEADER_SSL_H
|
|
int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
|
|
int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key,
|
|
STACK_OF(X509) *chain, int build_chain);
|
|
int ssl_print_sigalgs(BIO *out, SSL *s);
|
|
int ssl_print_point_formats(BIO *out, SSL *s);
|
|
int ssl_print_groups(BIO *out, SSL *s, int noshared);
|
|
#endif
|
|
int ssl_print_tmp_key(BIO *out, SSL *s);
|
|
int init_client(int *sock, const char *host, const char *port,
|
|
const char *bindhost, const char *bindport,
|
|
int family, int type, int protocol);
|
|
int should_retry(int i);
|
|
|
|
long bio_dump_callback(BIO *bio, int cmd, const char *argp,
|
|
int argi, long argl, long ret);
|
|
|
|
#ifdef HEADER_SSL_H
|
|
void apps_ssl_info_callback(const SSL *s, int where, int ret);
|
|
void msg_cb(int write_p, int version, int content_type, const void *buf,
|
|
size_t len, SSL *ssl, void *arg);
|
|
void tlsext_cb(SSL *s, int client_server, int type, const unsigned char *data,
|
|
int len, void *arg);
|
|
#endif
|
|
|
|
int generate_cookie_callback(SSL *ssl, unsigned char *cookie,
|
|
unsigned int *cookie_len);
|
|
int verify_cookie_callback(SSL *ssl, const unsigned char *cookie,
|
|
unsigned int cookie_len);
|
|
|
|
int generate_stateless_cookie_callback(SSL *ssl, unsigned char *cookie,
|
|
size_t *cookie_len);
|
|
int verify_stateless_cookie_callback(SSL *ssl, const unsigned char *cookie,
|
|
size_t cookie_len);
|
|
|
|
typedef struct ssl_excert_st SSL_EXCERT;
|
|
|
|
void ssl_ctx_set_excert(SSL_CTX *ctx, SSL_EXCERT *exc);
|
|
void ssl_excert_free(SSL_EXCERT *exc);
|
|
int args_excert(int option, SSL_EXCERT **pexc);
|
|
int load_excert(SSL_EXCERT **pexc);
|
|
void print_verify_detail(SSL *s, BIO *bio);
|
|
void print_ssl_summary(SSL *s);
|
|
#ifdef HEADER_SSL_H
|
|
int config_ctx(SSL_CONF_CTX *cctx, STACK_OF(OPENSSL_STRING) *str, SSL_CTX *ctx);
|
|
int ssl_ctx_add_crls(SSL_CTX *ctx, STACK_OF(X509_CRL) *crls,
|
|
int crl_download);
|
|
int ssl_load_stores(SSL_CTX *ctx, const char *vfyCApath,
|
|
const char *vfyCAfile, const char *chCApath,
|
|
const char *chCAfile, STACK_OF(X509_CRL) *crls,
|
|
int crl_download);
|
|
void ssl_ctx_security_debug(SSL_CTX *ctx, int verbose);
|
|
int set_keylog_file(SSL_CTX *ctx, const char *keylog_file);
|
|
void print_ca_names(BIO *bio, SSL *s);
|
|
#endif
|