mirror of
https://github.com/openssl/openssl.git
synced 2024-11-21 01:15:20 +08:00
da1c088f59
Reviewed-by: Richard Levitte <levitte@openssl.org> Release: yes
115 lines
4.8 KiB
C
115 lines
4.8 KiB
C
/*
|
|
* Copyright 1995-2023 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <openssl/opensslconf.h>
|
|
|
|
#include <openssl/ssl.h>
|
|
#include <openssl/srp.h>
|
|
|
|
#define PORT "4433"
|
|
#define PROTOCOL "tcp"
|
|
|
|
#define SSL_VERSION_ALLOWS_RENEGOTIATION(s) \
|
|
(SSL_is_dtls(s) || (SSL_version(s) < TLS1_3_VERSION))
|
|
|
|
typedef int (*do_server_cb)(int s, int stype, int prot, unsigned char *context);
|
|
void get_sock_info_address(int asock, char **hostname, char **service);
|
|
int report_server_accept(BIO *out, int asock, int with_address, int with_pid);
|
|
int do_server(int *accept_sock, const char *host, const char *port,
|
|
int family, int type, int protocol, do_server_cb cb,
|
|
unsigned char *context, int naccept, BIO *bio_s_out,
|
|
int tfo);
|
|
int verify_callback(int ok, X509_STORE_CTX *ctx);
|
|
|
|
int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
|
|
int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key,
|
|
STACK_OF(X509) *chain, int build_chain);
|
|
int ssl_print_sigalgs(BIO *out, SSL *s);
|
|
int ssl_print_point_formats(BIO *out, SSL *s);
|
|
int ssl_print_groups(BIO *out, SSL *s, int noshared);
|
|
int ssl_print_tmp_key(BIO *out, SSL *s);
|
|
int init_client(int *sock, const char *host, const char *port,
|
|
const char *bindhost, const char *bindport,
|
|
int family, int type, int protocol, int tfo, int doconn,
|
|
BIO_ADDR **ba_ret);
|
|
int should_retry(int i);
|
|
void do_ssl_shutdown(SSL *ssl);
|
|
|
|
long bio_dump_callback(BIO *bio, int cmd, const char *argp, size_t len,
|
|
int argi, long argl, int ret, size_t *processed);
|
|
|
|
void apps_ssl_info_callback(const SSL *s, int where, int ret);
|
|
void msg_cb(int write_p, int version, int content_type, const void *buf,
|
|
size_t len, SSL *ssl, void *arg);
|
|
void tlsext_cb(SSL *s, int client_server, int type, const unsigned char *data,
|
|
int len, void *arg);
|
|
|
|
int generate_cookie_callback(SSL *ssl, unsigned char *cookie,
|
|
unsigned int *cookie_len);
|
|
int verify_cookie_callback(SSL *ssl, const unsigned char *cookie,
|
|
unsigned int cookie_len);
|
|
|
|
#ifdef __VMS /* 31 char symbol name limit */
|
|
# define generate_stateless_cookie_callback generate_stateless_cookie_cb
|
|
# define verify_stateless_cookie_callback verify_stateless_cookie_cb
|
|
#endif
|
|
|
|
int generate_stateless_cookie_callback(SSL *ssl, unsigned char *cookie,
|
|
size_t *cookie_len);
|
|
int verify_stateless_cookie_callback(SSL *ssl, const unsigned char *cookie,
|
|
size_t cookie_len);
|
|
|
|
typedef struct ssl_excert_st SSL_EXCERT;
|
|
|
|
void ssl_ctx_set_excert(SSL_CTX *ctx, SSL_EXCERT *exc);
|
|
void ssl_excert_free(SSL_EXCERT *exc);
|
|
int args_excert(int option, SSL_EXCERT **pexc);
|
|
int load_excert(SSL_EXCERT **pexc);
|
|
void print_verify_detail(SSL *s, BIO *bio);
|
|
void print_ssl_summary(SSL *s);
|
|
int config_ctx(SSL_CONF_CTX *cctx, STACK_OF(OPENSSL_STRING) *str, SSL_CTX *ctx);
|
|
int ssl_ctx_add_crls(SSL_CTX *ctx, STACK_OF(X509_CRL) *crls,
|
|
int crl_download);
|
|
int ssl_load_stores(SSL_CTX *ctx, const char *vfyCApath,
|
|
const char *vfyCAfile, const char *vfyCAstore,
|
|
const char *chCApath, const char *chCAfile,
|
|
const char *chCAstore, STACK_OF(X509_CRL) *crls,
|
|
int crl_download);
|
|
void ssl_ctx_security_debug(SSL_CTX *ctx, int verbose);
|
|
int set_keylog_file(SSL_CTX *ctx, const char *keylog_file);
|
|
void print_ca_names(BIO *bio, SSL *s);
|
|
void ssl_print_secure_renegotiation_notes(BIO *bio, SSL *s);
|
|
|
|
#ifndef OPENSSL_NO_SRP
|
|
/* The client side SRP context that we pass to all SRP related callbacks */
|
|
typedef struct srp_arg_st {
|
|
char *srppassin;
|
|
char *srplogin;
|
|
int msg; /* copy from c_msg */
|
|
int debug; /* copy from c_debug */
|
|
int amp; /* allow more groups */
|
|
int strength; /* minimal size for N */
|
|
} SRP_ARG;
|
|
|
|
int set_up_srp_arg(SSL_CTX *ctx, SRP_ARG *srp_arg, int srp_lateuser, int c_msg,
|
|
int c_debug);
|
|
void set_up_dummy_srp(SSL_CTX *ctx);
|
|
|
|
/* The server side SRP context that we pass to all SRP related callbacks */
|
|
typedef struct srpsrvparm_st {
|
|
char *login;
|
|
SRP_VBASE *vb;
|
|
SRP_user_pwd *user;
|
|
} srpsrvparm;
|
|
|
|
int set_up_srp_verifier_file(SSL_CTX *ctx, srpsrvparm *srp_callback_parm,
|
|
char *srpuserseed, char *srp_verifier_file);
|
|
void lookup_srp_user(srpsrvparm *srp_callback_parm, BIO *bio_s_out);
|
|
#endif /* OPENSSL_NO_SRP */
|