mirror of
https://github.com/openssl/openssl.git
synced 2024-12-03 05:41:46 +08:00
5d67110173
In <= TLSv1.2 a Finished message always comes immediately after a CCS except in the case of NPN where there is an additional message between the CCS and Finished. Historically we always calculated the Finished MAC when we processed the CCS. However to deal with NPN we also calculated it when we receive the Finished message. Really this should only have been done if we hand negotiated NPN. This simplifies the code to only calculate the MAC when we receive the Finished. In 1.1.1 we need to do it this way anyway because there is no CCS (except in middlebox compat mode) in TLSv1.3. Coincidentally, this commit also fixes the fact that no-nextprotoneg does not currently work in master. Reviewed-by: Andy Polyakov <appro@openssl.org> (Merged from https://github.com/openssl/openssl/pull/5285)
423 lines
22 KiB
C
423 lines
22 KiB
C
/*
|
|
* Copyright 2015-2018 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
/*****************************************************************************
|
|
* *
|
|
* The following definitions are PRIVATE to the state machine. They should *
|
|
* NOT be used outside of the state machine. *
|
|
* *
|
|
*****************************************************************************/
|
|
|
|
/* Max message length definitions */
|
|
|
|
/* The spec allows for a longer length than this, but we limit it */
|
|
#define HELLO_VERIFY_REQUEST_MAX_LENGTH 258
|
|
#define END_OF_EARLY_DATA_MAX_LENGTH 0
|
|
#define SERVER_HELLO_MAX_LENGTH 20000
|
|
#define HELLO_RETRY_REQUEST_MAX_LENGTH 20000
|
|
#define ENCRYPTED_EXTENSIONS_MAX_LENGTH 20000
|
|
#define SERVER_KEY_EXCH_MAX_LENGTH 102400
|
|
#define SERVER_HELLO_DONE_MAX_LENGTH 0
|
|
#define KEY_UPDATE_MAX_LENGTH 1
|
|
#define CCS_MAX_LENGTH 1
|
|
/* Max should actually be 36 but we are generous */
|
|
#define FINISHED_MAX_LENGTH 64
|
|
|
|
/* The maximum number of incoming KeyUpdate messages we will accept */
|
|
#define MAX_KEY_UPDATE_MESSAGES 32
|
|
|
|
/* Dummy message type */
|
|
#define SSL3_MT_DUMMY -1
|
|
|
|
extern const unsigned char hrrrandom[];
|
|
|
|
/* Message processing return codes */
|
|
typedef enum {
|
|
/* Something bad happened */
|
|
MSG_PROCESS_ERROR,
|
|
/* We've finished reading - swap to writing */
|
|
MSG_PROCESS_FINISHED_READING,
|
|
/*
|
|
* We've completed the main processing of this message but there is some
|
|
* post processing to be done.
|
|
*/
|
|
MSG_PROCESS_CONTINUE_PROCESSING,
|
|
/* We've finished this message - read the next message */
|
|
MSG_PROCESS_CONTINUE_READING
|
|
} MSG_PROCESS_RETURN;
|
|
|
|
typedef int (*confunc_f) (SSL *s, WPACKET *pkt);
|
|
|
|
int ssl3_take_mac(SSL *s);
|
|
int check_in_list(SSL *s, uint16_t group_id, const uint16_t *groups,
|
|
size_t num_groups, int checkallow);
|
|
int create_synthetic_message_hash(SSL *s, const unsigned char *hashval,
|
|
size_t hashlen, const unsigned char *hrr,
|
|
size_t hrrlen);
|
|
int parse_ca_names(SSL *s, PACKET *pkt);
|
|
int construct_ca_names(SSL *s, WPACKET *pkt);
|
|
size_t construct_key_exchange_tbs(SSL *s, unsigned char **ptbs,
|
|
const void *param, size_t paramlen);
|
|
|
|
/*
|
|
* TLS/DTLS client state machine functions
|
|
*/
|
|
int ossl_statem_client_read_transition(SSL *s, int mt);
|
|
WRITE_TRAN ossl_statem_client_write_transition(SSL *s);
|
|
WORK_STATE ossl_statem_client_pre_work(SSL *s, WORK_STATE wst);
|
|
WORK_STATE ossl_statem_client_post_work(SSL *s, WORK_STATE wst);
|
|
int ossl_statem_client_construct_message(SSL *s, WPACKET *pkt,
|
|
confunc_f *confunc, int *mt);
|
|
size_t ossl_statem_client_max_message_size(SSL *s);
|
|
MSG_PROCESS_RETURN ossl_statem_client_process_message(SSL *s, PACKET *pkt);
|
|
WORK_STATE ossl_statem_client_post_process_message(SSL *s, WORK_STATE wst);
|
|
|
|
/*
|
|
* TLS/DTLS server state machine functions
|
|
*/
|
|
int ossl_statem_server_read_transition(SSL *s, int mt);
|
|
WRITE_TRAN ossl_statem_server_write_transition(SSL *s);
|
|
WORK_STATE ossl_statem_server_pre_work(SSL *s, WORK_STATE wst);
|
|
WORK_STATE ossl_statem_server_post_work(SSL *s, WORK_STATE wst);
|
|
int ossl_statem_server_construct_message(SSL *s, WPACKET *pkt,
|
|
confunc_f *confunc,int *mt);
|
|
size_t ossl_statem_server_max_message_size(SSL *s);
|
|
MSG_PROCESS_RETURN ossl_statem_server_process_message(SSL *s, PACKET *pkt);
|
|
WORK_STATE ossl_statem_server_post_process_message(SSL *s, WORK_STATE wst);
|
|
|
|
/* Functions for getting new message data */
|
|
__owur int tls_get_message_header(SSL *s, int *mt);
|
|
__owur int tls_get_message_body(SSL *s, size_t *len);
|
|
__owur int dtls_get_message(SSL *s, int *mt, size_t *len);
|
|
|
|
/* Message construction and processing functions */
|
|
__owur int tls_process_initial_server_flight(SSL *s);
|
|
__owur MSG_PROCESS_RETURN tls_process_change_cipher_spec(SSL *s, PACKET *pkt);
|
|
__owur MSG_PROCESS_RETURN tls_process_finished(SSL *s, PACKET *pkt);
|
|
__owur int tls_construct_change_cipher_spec(SSL *s, WPACKET *pkt);
|
|
__owur int dtls_construct_change_cipher_spec(SSL *s, WPACKET *pkt);
|
|
|
|
__owur int tls_construct_finished(SSL *s, WPACKET *pkt);
|
|
__owur int tls_construct_key_update(SSL *s, WPACKET *pkt);
|
|
__owur MSG_PROCESS_RETURN tls_process_key_update(SSL *s, PACKET *pkt);
|
|
__owur WORK_STATE tls_finish_handshake(SSL *s, WORK_STATE wst, int clearbufs,
|
|
int stop);
|
|
__owur WORK_STATE dtls_wait_for_dry(SSL *s);
|
|
|
|
/* some client-only functions */
|
|
__owur int tls_construct_client_hello(SSL *s, WPACKET *pkt);
|
|
__owur MSG_PROCESS_RETURN tls_process_server_hello(SSL *s, PACKET *pkt);
|
|
__owur MSG_PROCESS_RETURN tls_process_certificate_request(SSL *s, PACKET *pkt);
|
|
__owur MSG_PROCESS_RETURN tls_process_new_session_ticket(SSL *s, PACKET *pkt);
|
|
__owur int tls_process_cert_status_body(SSL *s, PACKET *pkt);
|
|
__owur MSG_PROCESS_RETURN tls_process_cert_status(SSL *s, PACKET *pkt);
|
|
__owur MSG_PROCESS_RETURN tls_process_server_done(SSL *s, PACKET *pkt);
|
|
__owur int tls_construct_cert_verify(SSL *s, WPACKET *pkt);
|
|
__owur WORK_STATE tls_prepare_client_certificate(SSL *s, WORK_STATE wst);
|
|
__owur int tls_construct_client_certificate(SSL *s, WPACKET *pkt);
|
|
__owur int ssl_do_client_cert_cb(SSL *s, X509 **px509, EVP_PKEY **ppkey);
|
|
__owur int tls_construct_client_key_exchange(SSL *s, WPACKET *pkt);
|
|
__owur int tls_client_key_exchange_post_work(SSL *s);
|
|
__owur int tls_construct_cert_status_body(SSL *s, WPACKET *pkt);
|
|
__owur int tls_construct_cert_status(SSL *s, WPACKET *pkt);
|
|
__owur MSG_PROCESS_RETURN tls_process_key_exchange(SSL *s, PACKET *pkt);
|
|
__owur MSG_PROCESS_RETURN tls_process_server_certificate(SSL *s, PACKET *pkt);
|
|
__owur int ssl3_check_cert_and_algorithm(SSL *s);
|
|
#ifndef OPENSSL_NO_NEXTPROTONEG
|
|
__owur int tls_construct_next_proto(SSL *s, WPACKET *pkt);
|
|
#endif
|
|
__owur MSG_PROCESS_RETURN tls_process_hello_req(SSL *s, PACKET *pkt);
|
|
__owur MSG_PROCESS_RETURN dtls_process_hello_verify(SSL *s, PACKET *pkt);
|
|
__owur int tls_construct_end_of_early_data(SSL *s, WPACKET *pkt);
|
|
|
|
/* some server-only functions */
|
|
__owur MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt);
|
|
__owur WORK_STATE tls_post_process_client_hello(SSL *s, WORK_STATE wst);
|
|
__owur int tls_construct_server_hello(SSL *s, WPACKET *pkt);
|
|
__owur int dtls_construct_hello_verify_request(SSL *s, WPACKET *pkt);
|
|
__owur int tls_construct_server_certificate(SSL *s, WPACKET *pkt);
|
|
__owur int tls_construct_server_key_exchange(SSL *s, WPACKET *pkt);
|
|
__owur int tls_construct_certificate_request(SSL *s, WPACKET *pkt);
|
|
__owur int tls_construct_server_done(SSL *s, WPACKET *pkt);
|
|
__owur MSG_PROCESS_RETURN tls_process_client_certificate(SSL *s, PACKET *pkt);
|
|
__owur MSG_PROCESS_RETURN tls_process_client_key_exchange(SSL *s, PACKET *pkt);
|
|
__owur WORK_STATE tls_post_process_client_key_exchange(SSL *s, WORK_STATE wst);
|
|
__owur MSG_PROCESS_RETURN tls_process_cert_verify(SSL *s, PACKET *pkt);
|
|
#ifndef OPENSSL_NO_NEXTPROTONEG
|
|
__owur MSG_PROCESS_RETURN tls_process_next_proto(SSL *s, PACKET *pkt);
|
|
#endif
|
|
__owur int tls_construct_new_session_ticket(SSL *s, WPACKET *pkt);
|
|
MSG_PROCESS_RETURN tls_process_end_of_early_data(SSL *s, PACKET *pkt);
|
|
|
|
|
|
/* Extension processing */
|
|
|
|
typedef enum ext_return_en {
|
|
EXT_RETURN_FAIL,
|
|
EXT_RETURN_SENT,
|
|
EXT_RETURN_NOT_SENT
|
|
} EXT_RETURN;
|
|
|
|
__owur int tls_validate_all_contexts(SSL *s, unsigned int thisctx,
|
|
RAW_EXTENSION *exts);
|
|
__owur int extension_is_relevant(SSL *s, unsigned int extctx,
|
|
unsigned int thisctx);
|
|
__owur int tls_collect_extensions(SSL *s, PACKET *packet, unsigned int context,
|
|
RAW_EXTENSION **res, size_t *len, int init);
|
|
__owur int tls_parse_extension(SSL *s, TLSEXT_INDEX idx, int context,
|
|
RAW_EXTENSION *exts, X509 *x, size_t chainidx);
|
|
__owur int tls_parse_all_extensions(SSL *s, int context, RAW_EXTENSION *exts,
|
|
X509 *x, size_t chainidx, int fin);
|
|
__owur int should_add_extension(SSL *s, unsigned int extctx,
|
|
unsigned int thisctx, int max_version);
|
|
__owur int tls_construct_extensions(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
|
|
__owur int tls_psk_do_binder(SSL *s, const EVP_MD *md,
|
|
const unsigned char *msgstart,
|
|
size_t binderoffset, const unsigned char *binderin,
|
|
unsigned char *binderout,
|
|
SSL_SESSION *sess, int sign, int external);
|
|
|
|
/* Server Extension processing */
|
|
int tls_parse_ctos_renegotiate(SSL *s, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
int tls_parse_ctos_server_name(SSL *s, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
int tls_parse_ctos_maxfragmentlen(SSL *s, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
#ifndef OPENSSL_NO_SRP
|
|
int tls_parse_ctos_srp(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
#endif
|
|
int tls_parse_ctos_early_data(SSL *s, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
#ifndef OPENSSL_NO_EC
|
|
int tls_parse_ctos_ec_pt_formats(SSL *s, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
int tls_parse_ctos_supported_groups(SSL *s, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidxl);
|
|
#endif
|
|
int tls_parse_ctos_session_ticket(SSL *s, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
int tls_parse_ctos_sig_algs_cert(SSL *s, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
int tls_parse_ctos_sig_algs(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
#ifndef OPENSSL_NO_OCSP
|
|
int tls_parse_ctos_status_request(SSL *s, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
#endif
|
|
#ifndef OPENSSL_NO_NEXTPROTONEG
|
|
int tls_parse_ctos_npn(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
#endif
|
|
int tls_parse_ctos_alpn(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
#ifndef OPENSSL_NO_SRTP
|
|
int tls_parse_ctos_use_srtp(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
#endif
|
|
int tls_parse_ctos_etm(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
int tls_parse_ctos_key_share(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
int tls_parse_ctos_cookie(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
int tls_parse_ctos_ems(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
int tls_parse_ctos_psk_kex_modes(SSL *s, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
int tls_parse_ctos_psk(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
int tls_parse_ctos_post_handshake_auth(SSL *, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
|
|
EXT_RETURN tls_construct_stoc_renegotiate(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
EXT_RETURN tls_construct_stoc_server_name(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
EXT_RETURN tls_construct_stoc_early_data(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
EXT_RETURN tls_construct_stoc_maxfragmentlen(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
#ifndef OPENSSL_NO_EC
|
|
EXT_RETURN tls_construct_stoc_ec_pt_formats(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
#endif
|
|
EXT_RETURN tls_construct_stoc_supported_groups(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
EXT_RETURN tls_construct_stoc_session_ticket(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
#ifndef OPENSSL_NO_OCSP
|
|
EXT_RETURN tls_construct_stoc_status_request(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
#endif
|
|
#ifndef OPENSSL_NO_NEXTPROTONEG
|
|
EXT_RETURN tls_construct_stoc_next_proto_neg(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
#endif
|
|
EXT_RETURN tls_construct_stoc_alpn(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
#ifndef OPENSSL_NO_SRTP
|
|
EXT_RETURN tls_construct_stoc_use_srtp(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
#endif
|
|
EXT_RETURN tls_construct_stoc_etm(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
EXT_RETURN tls_construct_stoc_ems(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
EXT_RETURN tls_construct_stoc_supported_versions(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
EXT_RETURN tls_construct_stoc_key_share(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
EXT_RETURN tls_construct_stoc_cookie(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
/*
|
|
* Not in public headers as this is not an official extension. Only used when
|
|
* SSL_OP_CRYPTOPRO_TLSEXT_BUG is set.
|
|
*/
|
|
#define TLSEXT_TYPE_cryptopro_bug 0xfde8
|
|
EXT_RETURN tls_construct_stoc_cryptopro_bug(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
EXT_RETURN tls_construct_stoc_psk(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
|
|
/* Client Extension processing */
|
|
EXT_RETURN tls_construct_ctos_renegotiate(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
EXT_RETURN tls_construct_ctos_server_name(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
EXT_RETURN tls_construct_ctos_maxfragmentlen(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
#ifndef OPENSSL_NO_SRP
|
|
EXT_RETURN tls_construct_ctos_srp(SSL *s, WPACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
#endif
|
|
#ifndef OPENSSL_NO_EC
|
|
EXT_RETURN tls_construct_ctos_ec_pt_formats(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
EXT_RETURN tls_construct_ctos_supported_groups(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
#endif
|
|
EXT_RETURN tls_construct_ctos_early_data(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
EXT_RETURN tls_construct_ctos_session_ticket(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
EXT_RETURN tls_construct_ctos_sig_algs(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
#ifndef OPENSSL_NO_OCSP
|
|
EXT_RETURN tls_construct_ctos_status_request(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
#endif
|
|
#ifndef OPENSSL_NO_NEXTPROTONEG
|
|
EXT_RETURN tls_construct_ctos_npn(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
#endif
|
|
EXT_RETURN tls_construct_ctos_alpn(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
#ifndef OPENSSL_NO_SRTP
|
|
EXT_RETURN tls_construct_ctos_use_srtp(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
#endif
|
|
EXT_RETURN tls_construct_ctos_etm(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
#ifndef OPENSSL_NO_CT
|
|
EXT_RETURN tls_construct_ctos_sct(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
#endif
|
|
EXT_RETURN tls_construct_ctos_ems(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
EXT_RETURN tls_construct_ctos_supported_versions(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
EXT_RETURN tls_construct_ctos_key_share(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
EXT_RETURN tls_construct_ctos_psk_kex_modes(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
EXT_RETURN tls_construct_ctos_cookie(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
EXT_RETURN tls_construct_ctos_padding(SSL *s, WPACKET *pkt,
|
|
unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
EXT_RETURN tls_construct_ctos_psk(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
EXT_RETURN tls_construct_ctos_post_handshake_auth(SSL *s, WPACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
|
|
int tls_parse_stoc_renegotiate(SSL *s, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
int tls_parse_stoc_server_name(SSL *s, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
int tls_parse_stoc_early_data(SSL *s, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
int tls_parse_stoc_maxfragmentlen(SSL *s, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
#ifndef OPENSSL_NO_EC
|
|
int tls_parse_stoc_ec_pt_formats(SSL *s, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
#endif
|
|
int tls_parse_stoc_session_ticket(SSL *s, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
#ifndef OPENSSL_NO_OCSP
|
|
int tls_parse_stoc_status_request(SSL *s, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
#endif
|
|
#ifndef OPENSSL_NO_CT
|
|
int tls_parse_stoc_sct(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
#endif
|
|
#ifndef OPENSSL_NO_NEXTPROTONEG
|
|
int tls_parse_stoc_npn(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
#endif
|
|
int tls_parse_stoc_alpn(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
#ifndef OPENSSL_NO_SRTP
|
|
int tls_parse_stoc_use_srtp(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
#endif
|
|
int tls_parse_stoc_etm(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
int tls_parse_stoc_ems(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
int tls_parse_stoc_supported_versions(SSL *s, PACKET *pkt, unsigned int context,
|
|
X509 *x, size_t chainidx);
|
|
int tls_parse_stoc_key_share(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
int tls_parse_stoc_cookie(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
int tls_parse_stoc_psk(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
|
|
size_t chainidx);
|
|
|
|
int tls_handle_alpn(SSL *s);
|
|
|
|
int tls13_save_handshake_digest_for_pha(SSL *s);
|
|
int tls13_restore_handshake_digest_for_pha(SSL *s);
|