xref: /openbsd-src/lib/libssl/ssl.h (revision db36e9515b6f9c330f9214a8af8a6a84be981a1e)
1*db36e951Sjsg /* $OpenBSD: ssl.h,v 1.245 2024/10/23 01:57:19 jsg Exp $ */
25b37fcf3Sryker /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
35b37fcf3Sryker  * All rights reserved.
45b37fcf3Sryker  *
55b37fcf3Sryker  * This package is an SSL implementation written
65b37fcf3Sryker  * by Eric Young (eay@cryptsoft.com).
75b37fcf3Sryker  * The implementation was written so as to conform with Netscapes SSL.
85b37fcf3Sryker  *
95b37fcf3Sryker  * This library is free for commercial and non-commercial use as long as
105b37fcf3Sryker  * the following conditions are aheared to.  The following conditions
115b37fcf3Sryker  * apply to all code found in this distribution, be it the RC4, RSA,
125b37fcf3Sryker  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
135b37fcf3Sryker  * included with this distribution is covered by the same copyright terms
145b37fcf3Sryker  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
155b37fcf3Sryker  *
165b37fcf3Sryker  * Copyright remains Eric Young's, and as such any Copyright notices in
175b37fcf3Sryker  * the code are not to be removed.
185b37fcf3Sryker  * If this package is used in a product, Eric Young should be given attribution
195b37fcf3Sryker  * as the author of the parts of the library used.
205b37fcf3Sryker  * This can be in the form of a textual message at program startup or
215b37fcf3Sryker  * in documentation (online or textual) provided with the package.
225b37fcf3Sryker  *
235b37fcf3Sryker  * Redistribution and use in source and binary forms, with or without
245b37fcf3Sryker  * modification, are permitted provided that the following conditions
255b37fcf3Sryker  * are met:
265b37fcf3Sryker  * 1. Redistributions of source code must retain the copyright
275b37fcf3Sryker  *    notice, this list of conditions and the following disclaimer.
285b37fcf3Sryker  * 2. Redistributions in binary form must reproduce the above copyright
295b37fcf3Sryker  *    notice, this list of conditions and the following disclaimer in the
305b37fcf3Sryker  *    documentation and/or other materials provided with the distribution.
315b37fcf3Sryker  * 3. All advertising materials mentioning features or use of this software
325b37fcf3Sryker  *    must display the following acknowledgement:
335b37fcf3Sryker  *    "This product includes cryptographic software written by
345b37fcf3Sryker  *     Eric Young (eay@cryptsoft.com)"
355b37fcf3Sryker  *    The word 'cryptographic' can be left out if the rouines from the library
365b37fcf3Sryker  *    being used are not cryptographic related :-).
375b37fcf3Sryker  * 4. If you include any Windows specific code (or a derivative thereof) from
385b37fcf3Sryker  *    the apps directory (application code) you must include an acknowledgement:
395b37fcf3Sryker  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
405b37fcf3Sryker  *
415b37fcf3Sryker  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
425b37fcf3Sryker  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
435b37fcf3Sryker  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
445b37fcf3Sryker  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
455b37fcf3Sryker  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
465b37fcf3Sryker  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
475b37fcf3Sryker  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
485b37fcf3Sryker  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
495b37fcf3Sryker  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
505b37fcf3Sryker  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
515b37fcf3Sryker  * SUCH DAMAGE.
525b37fcf3Sryker  *
535b37fcf3Sryker  * The licence and distribution terms for any publically available version or
545b37fcf3Sryker  * derivative of this code cannot be changed.  i.e. this code cannot simply be
555b37fcf3Sryker  * copied and put under another distribution licence
565b37fcf3Sryker  * [including the GNU Public Licence.]
575b37fcf3Sryker  */
58da347917Sbeck /* ====================================================================
590a5d6edeSdjm  * Copyright (c) 1998-2007 The OpenSSL Project.  All rights reserved.
60da347917Sbeck  *
61da347917Sbeck  * Redistribution and use in source and binary forms, with or without
62da347917Sbeck  * modification, are permitted provided that the following conditions
63da347917Sbeck  * are met:
64da347917Sbeck  *
65da347917Sbeck  * 1. Redistributions of source code must retain the above copyright
66da347917Sbeck  *    notice, this list of conditions and the following disclaimer.
67da347917Sbeck  *
68da347917Sbeck  * 2. Redistributions in binary form must reproduce the above copyright
69da347917Sbeck  *    notice, this list of conditions and the following disclaimer in
70da347917Sbeck  *    the documentation and/or other materials provided with the
71da347917Sbeck  *    distribution.
72da347917Sbeck  *
73da347917Sbeck  * 3. All advertising materials mentioning features or use of this
74da347917Sbeck  *    software must display the following acknowledgment:
75da347917Sbeck  *    "This product includes software developed by the OpenSSL Project
76da347917Sbeck  *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
77da347917Sbeck  *
78da347917Sbeck  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
79da347917Sbeck  *    endorse or promote products derived from this software without
80da347917Sbeck  *    prior written permission. For written permission, please contact
81da347917Sbeck  *    openssl-core@openssl.org.
82da347917Sbeck  *
83da347917Sbeck  * 5. Products derived from this software may not be called "OpenSSL"
84da347917Sbeck  *    nor may "OpenSSL" appear in their names without prior written
85da347917Sbeck  *    permission of the OpenSSL Project.
86da347917Sbeck  *
87da347917Sbeck  * 6. Redistributions of any form whatsoever must retain the following
88da347917Sbeck  *    acknowledgment:
89da347917Sbeck  *    "This product includes software developed by the OpenSSL Project
90da347917Sbeck  *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
91da347917Sbeck  *
92da347917Sbeck  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
93da347917Sbeck  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
94da347917Sbeck  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
95da347917Sbeck  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
96da347917Sbeck  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
97da347917Sbeck  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
98da347917Sbeck  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
99da347917Sbeck  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
100da347917Sbeck  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
101da347917Sbeck  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
102da347917Sbeck  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
103da347917Sbeck  * OF THE POSSIBILITY OF SUCH DAMAGE.
104da347917Sbeck  * ====================================================================
105da347917Sbeck  *
106da347917Sbeck  * This product includes cryptographic software written by Eric Young
107da347917Sbeck  * (eay@cryptsoft.com).  This product includes software written by Tim
108da347917Sbeck  * Hudson (tjh@cryptsoft.com).
109da347917Sbeck  *
110da347917Sbeck  */
1114fcf65c5Sdjm /* ====================================================================
1124fcf65c5Sdjm  * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
1134fcf65c5Sdjm  * ECC cipher suite support in OpenSSL originally developed by
1144fcf65c5Sdjm  * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
1154fcf65c5Sdjm  */
1160a5d6edeSdjm /* ====================================================================
1170a5d6edeSdjm  * Copyright 2005 Nokia. All rights reserved.
1180a5d6edeSdjm  *
1190a5d6edeSdjm  * The portions of the attached software ("Contribution") is developed by
1200a5d6edeSdjm  * Nokia Corporation and is licensed pursuant to the OpenSSL open source
1210a5d6edeSdjm  * license.
1220a5d6edeSdjm  *
1230a5d6edeSdjm  * The Contribution, originally written by Mika Kousa and Pasi Eronen of
1240a5d6edeSdjm  * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
1250a5d6edeSdjm  * support (see RFC 4279) to OpenSSL.
1260a5d6edeSdjm  *
1270a5d6edeSdjm  * No patent licenses or other rights except those expressly stated in
1280a5d6edeSdjm  * the OpenSSL open source license shall be deemed granted or received
1290a5d6edeSdjm  * expressly, by implication, estoppel, or otherwise.
1300a5d6edeSdjm  *
1310a5d6edeSdjm  * No assurances are provided by Nokia that the Contribution does not
1320a5d6edeSdjm  * infringe the patent or other intellectual property rights of any third
1330a5d6edeSdjm  * party or that the license provides you with all the necessary rights
1340a5d6edeSdjm  * to make use of the Contribution.
1350a5d6edeSdjm  *
1360a5d6edeSdjm  * THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN
1370a5d6edeSdjm  * ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA
1380a5d6edeSdjm  * SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY
1390a5d6edeSdjm  * OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR
1400a5d6edeSdjm  * OTHERWISE.
1410a5d6edeSdjm  */
1425b37fcf3Sryker 
1435b37fcf3Sryker #ifndef HEADER_SSL_H
1445b37fcf3Sryker #define HEADER_SSL_H
1455b37fcf3Sryker 
146c2e63fbdSbcook #include <stdint.h>
147c2e63fbdSbcook 
1486078dbb7Sjsing #include <openssl/opensslconf.h>
1495b669975Sjsing 
150c5899dbcSjsing #include <openssl/hmac.h>
151c5899dbcSjsing #include <openssl/pem.h>
152c5899dbcSjsing #include <openssl/safestack.h>
1536078dbb7Sjsing 
154c109e398Sbeck #include <openssl/bio.h>
155c5899dbcSjsing 
1564fcf65c5Sdjm #ifndef OPENSSL_NO_DEPRECATED
157c5899dbcSjsing #include <openssl/buffer.h>
158c5899dbcSjsing #include <openssl/crypto.h>
159c5899dbcSjsing #include <openssl/lhash.h>
160c5899dbcSjsing 
161da347917Sbeck #ifndef OPENSSL_NO_X509
162c109e398Sbeck #include <openssl/x509.h>
163c109e398Sbeck #endif
1644fcf65c5Sdjm #endif
165c109e398Sbeck 
1665b37fcf3Sryker #ifdef  __cplusplus
1675b37fcf3Sryker extern "C" {
1685b37fcf3Sryker #endif
1695b37fcf3Sryker 
1705b37fcf3Sryker /* SSLeay version number for ASN.1 encoding of the session information */
1715b37fcf3Sryker /* Version 0 - initial version
1725b37fcf3Sryker  * Version 1 - added the optional peer certificate
1735b37fcf3Sryker  */
1745b37fcf3Sryker #define SSL_SESSION_ASN1_VERSION 0x0001
1755b37fcf3Sryker 
1765b37fcf3Sryker /* text strings for the ciphers */
1775b37fcf3Sryker #define SSL_TXT_NULL_WITH_MD5		SSL2_TXT_NULL_WITH_MD5
1785b37fcf3Sryker #define SSL_TXT_RC4_128_WITH_MD5	SSL2_TXT_RC4_128_WITH_MD5
1795b37fcf3Sryker #define SSL_TXT_RC4_128_EXPORT40_WITH_MD5 SSL2_TXT_RC4_128_EXPORT40_WITH_MD5
1805b37fcf3Sryker #define SSL_TXT_RC2_128_CBC_WITH_MD5	SSL2_TXT_RC2_128_CBC_WITH_MD5
1815b37fcf3Sryker #define SSL_TXT_RC2_128_CBC_EXPORT40_WITH_MD5 SSL2_TXT_RC2_128_CBC_EXPORT40_WITH_MD5
1825b37fcf3Sryker #define SSL_TXT_IDEA_128_CBC_WITH_MD5	SSL2_TXT_IDEA_128_CBC_WITH_MD5
1835b37fcf3Sryker #define SSL_TXT_DES_64_CBC_WITH_MD5	SSL2_TXT_DES_64_CBC_WITH_MD5
1845b37fcf3Sryker #define SSL_TXT_DES_64_CBC_WITH_SHA	SSL2_TXT_DES_64_CBC_WITH_SHA
1855b37fcf3Sryker #define SSL_TXT_DES_192_EDE3_CBC_WITH_MD5 SSL2_TXT_DES_192_EDE3_CBC_WITH_MD5
1865b37fcf3Sryker #define SSL_TXT_DES_192_EDE3_CBC_WITH_SHA SSL2_TXT_DES_192_EDE3_CBC_WITH_SHA
1875b37fcf3Sryker 
188da347917Sbeck /*    VRS Additional Kerberos5 entries
189da347917Sbeck  */
190767fe2ffSmarkus #define SSL_TXT_KRB5_RC4_128_SHA      SSL3_TXT_KRB5_RC4_128_SHA
191767fe2ffSmarkus #define SSL_TXT_KRB5_IDEA_128_CBC_SHA SSL3_TXT_KRB5_IDEA_128_CBC_SHA
192767fe2ffSmarkus #define SSL_TXT_KRB5_RC4_128_MD5      SSL3_TXT_KRB5_RC4_128_MD5
193767fe2ffSmarkus #define SSL_TXT_KRB5_IDEA_128_CBC_MD5 SSL3_TXT_KRB5_IDEA_128_CBC_MD5
194767fe2ffSmarkus 
195767fe2ffSmarkus #define SSL_TXT_KRB5_RC2_40_CBC_SHA   SSL3_TXT_KRB5_RC2_40_CBC_SHA
196767fe2ffSmarkus #define SSL_TXT_KRB5_RC4_40_SHA	      SSL3_TXT_KRB5_RC4_40_SHA
197767fe2ffSmarkus #define SSL_TXT_KRB5_RC2_40_CBC_MD5   SSL3_TXT_KRB5_RC2_40_CBC_MD5
198767fe2ffSmarkus #define SSL_TXT_KRB5_RC4_40_MD5	      SSL3_TXT_KRB5_RC4_40_MD5
199767fe2ffSmarkus 
200da347917Sbeck #define SSL_TXT_KRB5_DES_40_CBC_SHA   SSL3_TXT_KRB5_DES_40_CBC_SHA
201da347917Sbeck #define SSL_TXT_KRB5_DES_40_CBC_MD5   SSL3_TXT_KRB5_DES_40_CBC_MD5
202da347917Sbeck #define SSL_TXT_KRB5_DES_64_CBC_SHA   SSL3_TXT_KRB5_DES_64_CBC_SHA
203da347917Sbeck #define SSL_TXT_KRB5_DES_64_CBC_MD5   SSL3_TXT_KRB5_DES_64_CBC_MD5
204da347917Sbeck #define SSL_TXT_KRB5_DES_192_CBC3_SHA SSL3_TXT_KRB5_DES_192_CBC3_SHA
205da347917Sbeck #define SSL_TXT_KRB5_DES_192_CBC3_MD5 SSL3_TXT_KRB5_DES_192_CBC3_MD5
206da347917Sbeck #define SSL_MAX_KRB5_PRINCIPAL_LENGTH  256
207da347917Sbeck 
2085b37fcf3Sryker #define SSL_MAX_SSL_SESSION_ID_LENGTH		32
209913ec974Sbeck #define SSL_MAX_SID_CTX_LENGTH			32
2105b37fcf3Sryker 
2115b37fcf3Sryker #define SSL_MIN_RSA_MODULUS_LENGTH_IN_BYTES	(512/8)
2125b37fcf3Sryker #define SSL_MAX_KEY_ARG_LENGTH			8
2135b37fcf3Sryker #define SSL_MAX_MASTER_KEY_LENGTH		48
2145b37fcf3Sryker 
2150a5d6edeSdjm 
2165b37fcf3Sryker /* These are used to specify which ciphers to use and not to use */
2170a5d6edeSdjm 
2185b37fcf3Sryker #define SSL_TXT_LOW		"LOW"
2195b37fcf3Sryker #define SSL_TXT_MEDIUM		"MEDIUM"
2205b37fcf3Sryker #define SSL_TXT_HIGH		"HIGH"
2210a5d6edeSdjm 
2220a5d6edeSdjm #define SSL_TXT_kFZA		"kFZA" /* unused! */
2230a5d6edeSdjm #define	SSL_TXT_aFZA		"aFZA" /* unused! */
2240a5d6edeSdjm #define SSL_TXT_eFZA		"eFZA" /* unused! */
2250a5d6edeSdjm #define SSL_TXT_FZA		"FZA"  /* unused! */
2265b37fcf3Sryker 
2275b37fcf3Sryker #define	SSL_TXT_aNULL		"aNULL"
2285b37fcf3Sryker #define	SSL_TXT_eNULL		"eNULL"
2295b37fcf3Sryker #define	SSL_TXT_NULL		"NULL"
2305b37fcf3Sryker 
2315b37fcf3Sryker #define SSL_TXT_kRSA		"kRSA"
2320a5d6edeSdjm #define SSL_TXT_kDHr		"kDHr" /* no such ciphersuites supported! */
2330a5d6edeSdjm #define SSL_TXT_kDHd		"kDHd" /* no such ciphersuites supported! */
2340a5d6edeSdjm #define SSL_TXT_kDH 		"kDH"  /* no such ciphersuites supported! */
2355b37fcf3Sryker #define SSL_TXT_kEDH		"kEDH"
2360a5d6edeSdjm #define SSL_TXT_kKRB5     	"kKRB5"
2370a5d6edeSdjm #define SSL_TXT_kECDHr		"kECDHr"
2380a5d6edeSdjm #define SSL_TXT_kECDHe		"kECDHe"
2390a5d6edeSdjm #define SSL_TXT_kECDH		"kECDH"
2400a5d6edeSdjm #define SSL_TXT_kEECDH		"kEECDH"
2410a5d6edeSdjm #define SSL_TXT_kPSK            "kPSK"
2425cdd308eSdjm #define SSL_TXT_kSRP		"kSRP"
2430a5d6edeSdjm 
2445b37fcf3Sryker #define	SSL_TXT_aRSA		"aRSA"
2455b37fcf3Sryker #define	SSL_TXT_aDSS		"aDSS"
2460a5d6edeSdjm #define	SSL_TXT_aDH		"aDH" /* no such ciphersuites supported! */
2470a5d6edeSdjm #define	SSL_TXT_aECDH		"aECDH"
2480a5d6edeSdjm #define SSL_TXT_aKRB5     	"aKRB5"
2490a5d6edeSdjm #define SSL_TXT_aECDSA		"aECDSA"
2500a5d6edeSdjm #define SSL_TXT_aPSK            "aPSK"
2510a5d6edeSdjm 
2525b37fcf3Sryker #define	SSL_TXT_DSS		"DSS"
2535b37fcf3Sryker #define SSL_TXT_DH		"DH"
254daffc75cSjsing #define SSL_TXT_DHE		"DHE" /* same as "kDHE:-ADH" */
255daffc75cSjsing #define SSL_TXT_EDH		"EDH" /* previous name for DHE */
2565b37fcf3Sryker #define SSL_TXT_ADH		"ADH"
2575b37fcf3Sryker #define SSL_TXT_RSA		"RSA"
2580a5d6edeSdjm #define SSL_TXT_ECDH		"ECDH"
259daffc75cSjsing #define SSL_TXT_ECDHE		"ECDHE" /* same as "kECDHE:-AECDH" */
260daffc75cSjsing #define SSL_TXT_EECDH		"EECDH" /* previous name for ECDHE */
2610a5d6edeSdjm #define SSL_TXT_AECDH		"AECDH"
2620a5d6edeSdjm #define SSL_TXT_ECDSA		"ECDSA"
2630a5d6edeSdjm #define SSL_TXT_KRB5      	"KRB5"
2640a5d6edeSdjm #define SSL_TXT_PSK             "PSK"
2655cdd308eSdjm #define SSL_TXT_SRP		"SRP"
2660a5d6edeSdjm 
2675b37fcf3Sryker #define SSL_TXT_DES		"DES"
2685b37fcf3Sryker #define SSL_TXT_3DES		"3DES"
2695b37fcf3Sryker #define SSL_TXT_RC4		"RC4"
2705b37fcf3Sryker #define SSL_TXT_RC2		"RC2"
2715b37fcf3Sryker #define SSL_TXT_IDEA		"IDEA"
2724fcf65c5Sdjm #define SSL_TXT_SEED		"SEED"
2730a5d6edeSdjm #define SSL_TXT_AES128		"AES128"
2740a5d6edeSdjm #define SSL_TXT_AES256		"AES256"
2751f9308f9Smarkus #define SSL_TXT_AES		"AES"
2765cdd308eSdjm #define SSL_TXT_AES_GCM		"AESGCM"
2770a5d6edeSdjm #define SSL_TXT_CAMELLIA128	"CAMELLIA128"
2780a5d6edeSdjm #define SSL_TXT_CAMELLIA256	"CAMELLIA256"
2794fcf65c5Sdjm #define SSL_TXT_CAMELLIA	"CAMELLIA"
28012fc33deSjsing #define SSL_TXT_CHACHA20	"CHACHA20"
2810a5d6edeSdjm 
28258162c98Sjsing #define SSL_TXT_AEAD		"AEAD"
2835b37fcf3Sryker #define SSL_TXT_MD5		"MD5"
2845b37fcf3Sryker #define SSL_TXT_SHA1		"SHA1"
2850a5d6edeSdjm #define SSL_TXT_SHA		"SHA" /* same as "SHA1" */
2865cdd308eSdjm #define SSL_TXT_SHA256		"SHA256"
2875cdd308eSdjm #define SSL_TXT_SHA384		"SHA384"
2880a5d6edeSdjm 
289f6f8cf51Sjsing #define SSL_TXT_DTLS1		"DTLSv1"
290c860c964Sjsing #define SSL_TXT_DTLS1_2		"DTLSv1.2"
2915b37fcf3Sryker #define SSL_TXT_SSLV2		"SSLv2"
2925b37fcf3Sryker #define SSL_TXT_SSLV3		"SSLv3"
293913ec974Sbeck #define SSL_TXT_TLSV1		"TLSv1"
2945cdd308eSdjm #define SSL_TXT_TLSV1_1		"TLSv1.1"
2955cdd308eSdjm #define SSL_TXT_TLSV1_2		"TLSv1.2"
296d3b2bb0dSjsing #if defined(LIBRESSL_HAS_TLS1_3) || defined(LIBRESSL_INTERNAL)
297d3b2bb0dSjsing #define SSL_TXT_TLSV1_3		"TLSv1.3"
298d3b2bb0dSjsing #endif
2990a5d6edeSdjm 
3000a5d6edeSdjm #define SSL_TXT_EXP		"EXP"
3010a5d6edeSdjm #define SSL_TXT_EXPORT		"EXPORT"
3020a5d6edeSdjm 
3035b37fcf3Sryker #define SSL_TXT_ALL		"ALL"
3045b37fcf3Sryker 
3051f9308f9Smarkus /*
3061f9308f9Smarkus  * COMPLEMENTOF* definitions. These identifiers are used to (de-select)
3071f9308f9Smarkus  * ciphers normally not being used.
3081f9308f9Smarkus  * Example: "RC4" will activate all ciphers using RC4 including ciphers
3091f9308f9Smarkus  * without authentication, which would normally disabled by DEFAULT (due
3101f9308f9Smarkus  * the "!ADH" being part of default). Therefore "RC4:!COMPLEMENTOFDEFAULT"
3111f9308f9Smarkus  * will make sure that it is also disabled in the specific selection.
3121f9308f9Smarkus  * COMPLEMENTOF* identifiers are portable between version, as adjustments
3131f9308f9Smarkus  * to the default cipher setup will also be included here.
3141f9308f9Smarkus  *
3151f9308f9Smarkus  * COMPLEMENTOFDEFAULT does not experience the same special treatment that
3161f9308f9Smarkus  * DEFAULT gets, as only selection is being done and no sorting as needed
3171f9308f9Smarkus  * for DEFAULT.
3181f9308f9Smarkus  */
3191f9308f9Smarkus #define SSL_TXT_CMPALL		"COMPLEMENTOFALL"
3201f9308f9Smarkus #define SSL_TXT_CMPDEF		"COMPLEMENTOFDEFAULT"
3211f9308f9Smarkus 
322da347917Sbeck /* The following cipher list is used by default.
323da347917Sbeck  * It also is substituted when an application-defined cipher list string
324da347917Sbeck  * starts with 'DEFAULT'. */
3250a5d6edeSdjm #define SSL_DEFAULT_CIPHER_LIST	"ALL:!aNULL:!eNULL:!SSLv2"
3260a5d6edeSdjm /* As of OpenSSL 1.0.0, ssl_create_cipher_list() in ssl/ssl_ciph.c always
3270a5d6edeSdjm  * starts with a reasonable order, and all we have to do for DEFAULT is
3280a5d6edeSdjm  * throwing out anonymous and unencrypted ciphersuites!
3290a5d6edeSdjm  * (The latter are not actually enabled by ALL, but "ALL:RSA" would enable
3300a5d6edeSdjm  * some of them.)
3310a5d6edeSdjm  */
3325b37fcf3Sryker 
3335b37fcf3Sryker /* Used in SSL_set_shutdown()/SSL_get_shutdown(); */
3345b37fcf3Sryker #define SSL_SENT_SHUTDOWN	1
3355b37fcf3Sryker #define SSL_RECEIVED_SHUTDOWN	2
3365b37fcf3Sryker 
337c109e398Sbeck 
3385b37fcf3Sryker #define SSL_FILETYPE_ASN1	X509_FILETYPE_ASN1
3395b37fcf3Sryker #define SSL_FILETYPE_PEM	X509_FILETYPE_PEM
3405b37fcf3Sryker 
3415b37fcf3Sryker /* This is needed to stop compilers complaining about the
3425b37fcf3Sryker  * 'struct ssl_st *' function parameters used to prototype callbacks
3435b37fcf3Sryker  * in SSL_CTX. */
3445b37fcf3Sryker typedef struct ssl_st *ssl_crock_st;
3458462f404Sjsing 
3465cdd308eSdjm typedef struct ssl_method_st SSL_METHOD;
3475cdd308eSdjm typedef struct ssl_cipher_st SSL_CIPHER;
3485cdd308eSdjm typedef struct ssl_session_st SSL_SESSION;
3495cdd308eSdjm 
3507ef96453Sjsing #if defined(LIBRESSL_HAS_QUIC) || defined(LIBRESSL_INTERNAL)
3517ef96453Sjsing typedef struct ssl_quic_method_st SSL_QUIC_METHOD;
3527ef96453Sjsing #endif
3537ef96453Sjsing 
3545cdd308eSdjm DECLARE_STACK_OF(SSL_CIPHER)
3555cdd308eSdjm 
3565cdd308eSdjm /* SRTP protection profiles for use with the use_srtp extension (RFC 5764)*/
357d6d77668Sjsing typedef struct srtp_protection_profile_st {
3585cdd308eSdjm 	const char *name;
3595cdd308eSdjm 	unsigned long id;
3605cdd308eSdjm } SRTP_PROTECTION_PROFILE;
3615cdd308eSdjm 
3625cdd308eSdjm DECLARE_STACK_OF(SRTP_PROTECTION_PROFILE)
3635cdd308eSdjm 
364d6d77668Sjsing typedef int (*tls_session_ticket_ext_cb_fn)(SSL *s, const unsigned char *data,
365d6d77668Sjsing     int len, void *arg);
366d6d77668Sjsing typedef int (*tls_session_secret_cb_fn)(SSL *s, void *secret, int *secret_len,
367d6d77668Sjsing     STACK_OF(SSL_CIPHER) *peer_ciphers, SSL_CIPHER **cipher, void *arg);
3685cdd308eSdjm 
3690a5d6edeSdjm /* Allow initial connection to servers that don't support RI */
3700a5d6edeSdjm #define SSL_OP_LEGACY_SERVER_CONNECT			0x00000004L
3715b37fcf3Sryker 
3721f9308f9Smarkus /* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added
3731f9308f9Smarkus  * in OpenSSL 0.9.6d.  Usually (depending on the application protocol)
374f4a3c3a2Stedu  * the workaround is not needed.
375f4a3c3a2Stedu  * Unfortunately some broken SSL/TLS implementations cannot handle it
376f4a3c3a2Stedu  * at all, which is why it was previously included in SSL_OP_ALL.
377f4a3c3a2Stedu  * Now it's not.
378f4a3c3a2Stedu  */
37938150a57Sjsing #define SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS		0x00000800L
3801f9308f9Smarkus 
3814fcf65c5Sdjm /* DTLS options */
3824fcf65c5Sdjm #define SSL_OP_NO_QUERY_MTU				0x00001000L
3834fcf65c5Sdjm /* Turn on Cookie Exchange (on relevant for servers) */
3844fcf65c5Sdjm #define SSL_OP_COOKIE_EXCHANGE				0x00002000L
3854fcf65c5Sdjm /* Don't use RFC4507 ticket extension */
3864fcf65c5Sdjm #define SSL_OP_NO_TICKET				0x00004000L
3874fcf65c5Sdjm 
3881f9308f9Smarkus /* As server, disallow session resumption on renegotiation */
3891f9308f9Smarkus #define SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION	0x00010000L
3900d3c1a50Sjsing /* Disallow client initiated renegotiation. */
3910d3c1a50Sjsing #define SSL_OP_NO_CLIENT_RENEGOTIATION			0x00020000L
392913ec974Sbeck /* If set, always create a new key when using tmp_dh parameters */
3935b37fcf3Sryker #define SSL_OP_SINGLE_DH_USE				0x00100000L
394da347917Sbeck /* Set on servers to choose the cipher according to the server's
395da347917Sbeck  * preferences */
396da347917Sbeck #define SSL_OP_CIPHER_SERVER_PREFERENCE			0x00400000L
3971f9308f9Smarkus 
3981f9308f9Smarkus #define SSL_OP_NO_TLSv1					0x04000000L
3995cdd308eSdjm #define SSL_OP_NO_TLSv1_2				0x08000000L
4005cdd308eSdjm #define SSL_OP_NO_TLSv1_1				0x10000000L
4015b37fcf3Sryker 
4025b669975Sjsing #if defined(LIBRESSL_HAS_TLS1_3) || defined(LIBRESSL_INTERNAL)
4035b669975Sjsing #define SSL_OP_NO_TLSv1_3				0x20000000L
4045b669975Sjsing #endif
4055b669975Sjsing 
406c860c964Sjsing #define SSL_OP_NO_DTLSv1				0x40000000L
407c860c964Sjsing #define SSL_OP_NO_DTLSv1_2				0x80000000L
408c860c964Sjsing 
40938150a57Sjsing /* SSL_OP_ALL: various bug workarounds that should be rather harmless. */
410f5213de9Sjsing #define SSL_OP_ALL \
411c5a6f470Sjsing     (SSL_OP_LEGACY_SERVER_CONNECT)
412fd17f5aaSdoug 
413fd17f5aaSdoug /* Obsolete flags kept for compatibility. No sane code should use them. */
414fd17f5aaSdoug #define SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION	0x0
415c076c9b5Sdoug #define SSL_OP_CISCO_ANYCONNECT				0x0
4164b2e33d9Sjsing #define SSL_OP_CRYPTOPRO_TLSEXT_BUG			0x0
417fd17f5aaSdoug #define SSL_OP_EPHEMERAL_RSA				0x0
418c076c9b5Sdoug #define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER		0x0
419fd17f5aaSdoug #define SSL_OP_MICROSOFT_SESS_ID_BUG			0x0
420fd17f5aaSdoug #define SSL_OP_MSIE_SSLV2_RSA_PADDING			0x0
421fd17f5aaSdoug #define SSL_OP_NETSCAPE_CA_DN_BUG			0x0
422fd17f5aaSdoug #define SSL_OP_NETSCAPE_CHALLENGE_BUG			0x0
423fd17f5aaSdoug #define SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG		0x0
424fd17f5aaSdoug #define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG		0x0
425c076c9b5Sdoug #define SSL_OP_NO_COMPRESSION				0x0
426c076c9b5Sdoug #define SSL_OP_NO_SSLv2					0x0
427c076c9b5Sdoug #define SSL_OP_NO_SSLv3					0x0
428fd17f5aaSdoug #define SSL_OP_PKCS1_CHECK_1				0x0
429fd17f5aaSdoug #define SSL_OP_PKCS1_CHECK_2				0x0
4300d55bee6Sdoug #define SSL_OP_SAFARI_ECDHE_ECDSA_BUG			0x0
431203d15d2Sjsing #define SSL_OP_SINGLE_ECDH_USE				0x0
432fd17f5aaSdoug #define SSL_OP_SSLEAY_080_CLIENT_DH_BUG			0x0
433fd17f5aaSdoug #define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG		0x0
434c5a6f470Sjsing #define SSL_OP_TLSEXT_PADDING				0x0
4354314af3eSdoug #define SSL_OP_TLS_BLOCK_PADDING_BUG			0x0
43611923ae7Sdoug #define SSL_OP_TLS_D5_BUG				0x0
437f4a08bf1Sjsing #define SSL_OP_TLS_ROLLBACK_BUG				0x0
438fd17f5aaSdoug 
439913ec974Sbeck /* Allow SSL_write(..., n) to return r with 0 < r < n (i.e. report success
440913ec974Sbeck  * when just a single record has been written): */
441913ec974Sbeck #define SSL_MODE_ENABLE_PARTIAL_WRITE       0x00000001L
442913ec974Sbeck /* Make it possible to retry SSL_write() with changed buffer location
443913ec974Sbeck  * (buffer contents must stay the same!); this is not the default to avoid
444913ec974Sbeck  * the misconception that non-blocking SSL_write() behaves like
445913ec974Sbeck  * non-blocking write(): */
446913ec974Sbeck #define SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER 0x00000002L
447c109e398Sbeck /* Never bother the application with retries if the transport
448c109e398Sbeck  * is blocking: */
449c109e398Sbeck #define SSL_MODE_AUTO_RETRY 0x00000004L
450767fe2ffSmarkus /* Don't attempt to automatically build certificate chain */
451767fe2ffSmarkus #define SSL_MODE_NO_AUTO_CHAIN 0x00000008L
4520a5d6edeSdjm /* Save RAM by releasing read and write buffers when they're empty. (SSL3 and
4530a5d6edeSdjm  * TLS only.)  "Released" buffers are put onto a free-list in the context
4540a5d6edeSdjm  * or just freed (depending on the context's setting for freelist_max_len). */
4550a5d6edeSdjm #define SSL_MODE_RELEASE_BUFFERS 0x00000010L
4561f9308f9Smarkus 
457913ec974Sbeck /* Note: SSL[_CTX]_set_{options,mode} use |= op on the previous value,
458913ec974Sbeck  * they cannot be used to clear bits. */
459913ec974Sbeck 
460913ec974Sbeck #define SSL_CTX_set_options(ctx,op) \
461da347917Sbeck 	SSL_CTX_ctrl((ctx),SSL_CTRL_OPTIONS,(op),NULL)
4620a5d6edeSdjm #define SSL_CTX_clear_options(ctx,op) \
4630a5d6edeSdjm 	SSL_CTX_ctrl((ctx),SSL_CTRL_CLEAR_OPTIONS,(op),NULL)
464913ec974Sbeck #define SSL_CTX_get_options(ctx) \
465da347917Sbeck 	SSL_CTX_ctrl((ctx),SSL_CTRL_OPTIONS,0,NULL)
466913ec974Sbeck #define SSL_set_options(ssl,op) \
467da347917Sbeck 	SSL_ctrl((ssl),SSL_CTRL_OPTIONS,(op),NULL)
4680a5d6edeSdjm #define SSL_clear_options(ssl,op) \
4690a5d6edeSdjm 	SSL_ctrl((ssl),SSL_CTRL_CLEAR_OPTIONS,(op),NULL)
470913ec974Sbeck #define SSL_get_options(ssl) \
471da347917Sbeck         SSL_ctrl((ssl),SSL_CTRL_OPTIONS,0,NULL)
472913ec974Sbeck 
473913ec974Sbeck #define SSL_CTX_set_mode(ctx,op) \
474da347917Sbeck 	SSL_CTX_ctrl((ctx),SSL_CTRL_MODE,(op),NULL)
4750a5d6edeSdjm #define SSL_CTX_clear_mode(ctx,op) \
4760a5d6edeSdjm 	SSL_CTX_ctrl((ctx),SSL_CTRL_CLEAR_MODE,(op),NULL)
477913ec974Sbeck #define SSL_CTX_get_mode(ctx) \
478da347917Sbeck 	SSL_CTX_ctrl((ctx),SSL_CTRL_MODE,0,NULL)
4790a5d6edeSdjm #define SSL_clear_mode(ssl,op) \
4800a5d6edeSdjm 	SSL_ctrl((ssl),SSL_CTRL_CLEAR_MODE,(op),NULL)
481913ec974Sbeck #define SSL_set_mode(ssl,op) \
482da347917Sbeck 	SSL_ctrl((ssl),SSL_CTRL_MODE,(op),NULL)
483913ec974Sbeck #define SSL_get_mode(ssl) \
484da347917Sbeck         SSL_ctrl((ssl),SSL_CTRL_MODE,0,NULL)
4854fcf65c5Sdjm #define SSL_set_mtu(ssl, mtu) \
4864fcf65c5Sdjm         SSL_ctrl((ssl),SSL_CTRL_SET_MTU,(mtu),NULL)
487da347917Sbeck 
4880a5d6edeSdjm #define SSL_get_secure_renegotiation_support(ssl) \
4890a5d6edeSdjm 	SSL_ctrl((ssl), SSL_CTRL_GET_RI_SUPPORT, 0, NULL)
490da347917Sbeck 
491d6d77668Sjsing void SSL_CTX_set_msg_callback(SSL_CTX *ctx, void (*cb)(int write_p,
492d6d77668Sjsing     int version, int content_type, const void *buf, size_t len, SSL *ssl,
493d6d77668Sjsing     void *arg));
494d6d77668Sjsing void SSL_set_msg_callback(SSL *ssl, void (*cb)(int write_p, int version,
495d6d77668Sjsing     int content_type, const void *buf, size_t len, SSL *ssl, void *arg));
496da347917Sbeck #define SSL_CTX_set_msg_callback_arg(ctx, arg) SSL_CTX_ctrl((ctx), SSL_CTRL_SET_MSG_CALLBACK_ARG, 0, (arg))
497da347917Sbeck #define SSL_set_msg_callback_arg(ssl, arg) SSL_ctrl((ssl), SSL_CTRL_SET_MSG_CALLBACK_ARG, 0, (arg))
498d1ec7c35Sbeck typedef void (*SSL_CTX_keylog_cb_func)(const SSL *ssl, const char *line);
499d1ec7c35Sbeck void SSL_CTX_set_keylog_callback(SSL_CTX *ctx, SSL_CTX_keylog_cb_func cb);
500d1ec7c35Sbeck SSL_CTX_keylog_cb_func SSL_CTX_get_keylog_callback(const SSL_CTX *ctx);
5018095b130Sbeck int SSL_set_num_tickets(SSL *s, size_t num_tickets);
5028095b130Sbeck size_t SSL_get_num_tickets(const SSL *s);
5038095b130Sbeck int SSL_CTX_set_num_tickets(SSL_CTX *ctx, size_t num_tickets);
5048095b130Sbeck size_t SSL_CTX_get_num_tickets(const SSL_CTX *ctx);
5054a18b5baSbeck STACK_OF(X509) *SSL_get0_verified_chain(const SSL *s);
506da347917Sbeck 
507da347917Sbeck #define SSL_MAX_CERT_LIST_DEFAULT 1024*100 /* 100k max cert list :-) */
5085b37fcf3Sryker 
5095b37fcf3Sryker #define SSL_SESSION_CACHE_MAX_SIZE_DEFAULT	(1024*20)
5105b37fcf3Sryker 
511da347917Sbeck /* This callback type is used inside SSL_CTX, SSL, and in the functions that set
512da347917Sbeck  * them. It is used to override the generation of SSL/TLS session IDs in a
513da347917Sbeck  * server. Return value should be zero on an error, non-zero to proceed. Also,
514da347917Sbeck  * callbacks should themselves check if the id they generate is unique otherwise
515da347917Sbeck  * the SSL handshake will fail with an error - callbacks can do this using the
516da347917Sbeck  * 'ssl' value they're passed by;
517da347917Sbeck  *      SSL_has_matching_session_id(ssl, id, *id_len)
518da347917Sbeck  * The length value passed in is set at the maximum size the session ID can be.
519da347917Sbeck  * In SSLv2 this is 16 bytes, whereas SSLv3/TLSv1 it is 32 bytes. The callback
520da347917Sbeck  * can alter this length to be less if desired, but under SSLv2 session IDs are
521da347917Sbeck  * supposed to be fixed at 16 bytes so the id will be padded after the callback
522da347917Sbeck  * returns in this case. It is also an error for the callback to set the size to
523da347917Sbeck  * zero. */
524da347917Sbeck typedef int (*GEN_SESSION_CB)(const SSL *ssl, unsigned char *id,
525da347917Sbeck     unsigned int *id_len);
526da347917Sbeck 
5275cdd308eSdjm typedef struct ssl_comp_st SSL_COMP;
5285cdd308eSdjm 
52934c047d7Stb #ifdef LIBRESSL_INTERNAL
530913ec974Sbeck DECLARE_STACK_OF(SSL_COMP)
5310ad2c245Sjsing struct lhash_st_SSL_SESSION {
5320ad2c245Sjsing 	int dummy;
5330ad2c245Sjsing };
5345cdd308eSdjm #endif
5355cdd308eSdjm 
5365b37fcf3Sryker #define SSL_SESS_CACHE_OFF			0x0000
5375b37fcf3Sryker #define SSL_SESS_CACHE_CLIENT			0x0001
5385b37fcf3Sryker #define SSL_SESS_CACHE_SERVER			0x0002
5395b37fcf3Sryker #define SSL_SESS_CACHE_BOTH	(SSL_SESS_CACHE_CLIENT|SSL_SESS_CACHE_SERVER)
5405b37fcf3Sryker #define SSL_SESS_CACHE_NO_AUTO_CLEAR		0x0080
541767fe2ffSmarkus /* enough comments already ... see SSL_CTX_set_session_cache_mode(3) */
5425b37fcf3Sryker #define SSL_SESS_CACHE_NO_INTERNAL_LOOKUP	0x0100
543767fe2ffSmarkus #define SSL_SESS_CACHE_NO_INTERNAL_STORE	0x0200
544767fe2ffSmarkus #define SSL_SESS_CACHE_NO_INTERNAL \
545767fe2ffSmarkus 	(SSL_SESS_CACHE_NO_INTERNAL_LOOKUP|SSL_SESS_CACHE_NO_INTERNAL_STORE)
5465b37fcf3Sryker 
547d6cb9086Sjsing struct lhash_st_SSL_SESSION *SSL_CTX_sessions(SSL_CTX *ctx);
548913ec974Sbeck #define SSL_CTX_sess_number(ctx) \
549913ec974Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_NUMBER,0,NULL)
550913ec974Sbeck #define SSL_CTX_sess_connect(ctx) \
551913ec974Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CONNECT,0,NULL)
552913ec974Sbeck #define SSL_CTX_sess_connect_good(ctx) \
553913ec974Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CONNECT_GOOD,0,NULL)
554913ec974Sbeck #define SSL_CTX_sess_connect_renegotiate(ctx) \
555913ec974Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CONNECT_RENEGOTIATE,0,NULL)
556913ec974Sbeck #define SSL_CTX_sess_accept(ctx) \
557913ec974Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_ACCEPT,0,NULL)
558913ec974Sbeck #define SSL_CTX_sess_accept_renegotiate(ctx) \
559913ec974Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_ACCEPT_RENEGOTIATE,0,NULL)
560913ec974Sbeck #define SSL_CTX_sess_accept_good(ctx) \
561913ec974Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_ACCEPT_GOOD,0,NULL)
562913ec974Sbeck #define SSL_CTX_sess_hits(ctx) \
563913ec974Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_HIT,0,NULL)
564913ec974Sbeck #define SSL_CTX_sess_cb_hits(ctx) \
565913ec974Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CB_HIT,0,NULL)
566913ec974Sbeck #define SSL_CTX_sess_misses(ctx) \
567913ec974Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_MISSES,0,NULL)
568913ec974Sbeck #define SSL_CTX_sess_timeouts(ctx) \
569913ec974Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_TIMEOUTS,0,NULL)
570913ec974Sbeck #define SSL_CTX_sess_cache_full(ctx) \
571913ec974Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CACHE_FULL,0,NULL)
5725b37fcf3Sryker 
573d6d77668Sjsing void SSL_CTX_sess_set_new_cb(SSL_CTX *ctx,
574d6d77668Sjsing     int (*new_session_cb)(struct ssl_st *ssl, SSL_SESSION *sess));
575d6d77668Sjsing int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(struct ssl_st *ssl,
576d6d77668Sjsing     SSL_SESSION *sess);
577d6d77668Sjsing void SSL_CTX_sess_set_remove_cb(SSL_CTX *ctx,
578d6d77668Sjsing     void (*remove_session_cb)(struct ssl_ctx_st *ctx, SSL_SESSION *sess));
579d6d77668Sjsing void (*SSL_CTX_sess_get_remove_cb(SSL_CTX *ctx))(struct ssl_ctx_st *ctx,
580d6d77668Sjsing     SSL_SESSION *sess);
581d6d77668Sjsing void SSL_CTX_sess_set_get_cb(SSL_CTX *ctx,
5820a4fabb9Stb     SSL_SESSION *(*get_session_cb)(struct ssl_st *ssl,
5830a4fabb9Stb     const unsigned char *data, int len, int *copy));
584d6d77668Sjsing SSL_SESSION *(*SSL_CTX_sess_get_get_cb(SSL_CTX *ctx))(struct ssl_st *ssl,
58508d36fa8Stb     const unsigned char *data, int len, int *copy);
586d6d77668Sjsing void SSL_CTX_set_info_callback(SSL_CTX *ctx, void (*cb)(const SSL *ssl,
587d6d77668Sjsing     int type, int val));
588d6d77668Sjsing void (*SSL_CTX_get_info_callback(SSL_CTX *ctx))(const SSL *ssl, int type,
589d6d77668Sjsing     int val);
590d6d77668Sjsing void SSL_CTX_set_client_cert_cb(SSL_CTX *ctx,
591d6d77668Sjsing     int (*client_cert_cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey));
592d6d77668Sjsing int (*SSL_CTX_get_client_cert_cb(SSL_CTX *ctx))(SSL *ssl, X509 **x509,
593d6d77668Sjsing     EVP_PKEY **pkey);
594d6d77668Sjsing void SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx,
595d6d77668Sjsing     int (*app_gen_cookie_cb)(SSL *ssl, unsigned char *cookie,
596d6d77668Sjsing     unsigned int *cookie_len));
597d6d77668Sjsing void SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx,
5980a4fabb9Stb     int (*app_verify_cookie_cb)(SSL *ssl, const unsigned char *cookie,
599d6d77668Sjsing     unsigned int cookie_len));
600918a0d98Sjsing void SSL_CTX_set_next_protos_advertised_cb(SSL_CTX *s, int (*cb)(SSL *ssl,
601918a0d98Sjsing     const unsigned char **out, unsigned int *outlen, void *arg), void *arg);
602918a0d98Sjsing void SSL_CTX_set_next_proto_select_cb(SSL_CTX *s, int (*cb)(SSL *ssl,
603918a0d98Sjsing     unsigned char **out, unsigned char *outlen, const unsigned char *in,
604918a0d98Sjsing     unsigned int inlen, void *arg), void *arg);
6055cdd308eSdjm 
6065cdd308eSdjm int SSL_select_next_proto(unsigned char **out, unsigned char *outlen,
607d6d77668Sjsing     const unsigned char *in, unsigned int inlen, const unsigned char *client,
608d6d77668Sjsing     unsigned int client_len);
609918a0d98Sjsing void SSL_get0_next_proto_negotiated(const SSL *s, const unsigned char **data,
610ab91a68dStb     unsigned int *len);
6115cdd308eSdjm 
6125cdd308eSdjm #define OPENSSL_NPN_UNSUPPORTED	0
6135cdd308eSdjm #define OPENSSL_NPN_NEGOTIATED	1
6145cdd308eSdjm #define OPENSSL_NPN_NO_OVERLAP	2
6155b37fcf3Sryker 
616d436807cSjsing int SSL_CTX_set_alpn_protos(SSL_CTX *ctx, const unsigned char *protos,
617d436807cSjsing     unsigned int protos_len);
618d436807cSjsing int SSL_set_alpn_protos(SSL *ssl, const unsigned char *protos,
619d436807cSjsing     unsigned int protos_len);
620d436807cSjsing void SSL_CTX_set_alpn_select_cb(SSL_CTX *ctx,
621d436807cSjsing     int (*cb)(SSL *ssl, const unsigned char **out, unsigned char *outlen,
622d436807cSjsing     const unsigned char *in, unsigned int inlen, void *arg), void *arg);
623d436807cSjsing void SSL_get0_alpn_selected(const SSL *ssl, const unsigned char **data,
624d436807cSjsing     unsigned int *len);
6250a5d6edeSdjm 
6265b7f4dd6Stb #if defined(LIBRESSL_HAS_TLS1_3) || defined(LIBRESSL_INTERNAL)
6275b7f4dd6Stb typedef int (*SSL_psk_use_session_cb_func)(SSL *ssl, const EVP_MD *md,
6285b7f4dd6Stb     const unsigned char **id, size_t *idlen, SSL_SESSION **sess);
6295b7f4dd6Stb void SSL_set_psk_use_session_callback(SSL *s, SSL_psk_use_session_cb_func cb);
6305b7f4dd6Stb #endif
6315b7f4dd6Stb 
6325b37fcf3Sryker #define SSL_NOTHING	1
6335b37fcf3Sryker #define SSL_WRITING	2
6345b37fcf3Sryker #define SSL_READING	3
6355b37fcf3Sryker #define SSL_X509_LOOKUP	4
6365b37fcf3Sryker 
6375b37fcf3Sryker /* These will only be used when doing non-blocking IO */
638913ec974Sbeck #define SSL_want_nothing(s)	(SSL_want(s) == SSL_NOTHING)
639913ec974Sbeck #define SSL_want_read(s)	(SSL_want(s) == SSL_READING)
640913ec974Sbeck #define SSL_want_write(s)	(SSL_want(s) == SSL_WRITING)
641913ec974Sbeck #define SSL_want_x509_lookup(s)	(SSL_want(s) == SSL_X509_LOOKUP)
6425b37fcf3Sryker 
6430a5d6edeSdjm #define SSL_MAC_FLAG_READ_MAC_STREAM 1
6440a5d6edeSdjm #define SSL_MAC_FLAG_WRITE_MAC_STREAM 2
6450a5d6edeSdjm 
646c109e398Sbeck #ifdef __cplusplus
647c109e398Sbeck }
648c109e398Sbeck #endif
649c109e398Sbeck 
650913ec974Sbeck #include <openssl/ssl3.h>
651913ec974Sbeck #include <openssl/tls1.h>	/* This is mostly sslv3 with a few tweaks */
6524fcf65c5Sdjm #include <openssl/dtls1.h>	/* Datagram TLS */
6535cdd308eSdjm #include <openssl/srtp.h>	/* Support for the use_srtp extension */
6545b37fcf3Sryker 
655c109e398Sbeck #ifdef  __cplusplus
656c109e398Sbeck extern "C" {
657c109e398Sbeck #endif
658c109e398Sbeck 
659ba5406e9Sbeck /* compatibility */
6605b37fcf3Sryker #define SSL_set_app_data(s,arg)		(SSL_set_ex_data(s,0,(char *)arg))
6615b37fcf3Sryker #define SSL_get_app_data(s)		(SSL_get_ex_data(s,0))
6625b37fcf3Sryker #define SSL_SESSION_set_app_data(s,a)	(SSL_SESSION_set_ex_data(s,0,(char *)a))
6635b37fcf3Sryker #define SSL_SESSION_get_app_data(s)	(SSL_SESSION_get_ex_data(s,0))
6645b37fcf3Sryker #define SSL_CTX_get_app_data(ctx)	(SSL_CTX_get_ex_data(ctx,0))
6655b37fcf3Sryker #define SSL_CTX_set_app_data(ctx,arg)	(SSL_CTX_set_ex_data(ctx,0,(char *)arg))
6665b37fcf3Sryker 
6675b37fcf3Sryker /* The following are the possible values for ssl->state are are
6685b37fcf3Sryker  * used to indicate where we are up to in the SSL connection establishment.
6695b37fcf3Sryker  * The macros that follow are about the only things you should need to use
6705b37fcf3Sryker  * and even then, only when using non-blocking IO.
6715b37fcf3Sryker  * It can also be useful to work out where you were when the connection
6725b37fcf3Sryker  * failed */
6735b37fcf3Sryker 
6745b37fcf3Sryker #define SSL_ST_CONNECT			0x1000
6755b37fcf3Sryker #define SSL_ST_ACCEPT			0x2000
6765b37fcf3Sryker #define SSL_ST_MASK			0x0FFF
6775b37fcf3Sryker #define SSL_ST_INIT			(SSL_ST_CONNECT|SSL_ST_ACCEPT)
6785b37fcf3Sryker #define SSL_ST_BEFORE			0x4000
6795b37fcf3Sryker #define SSL_ST_OK			0x03
6805b37fcf3Sryker #define SSL_ST_RENEGOTIATE		(0x04|SSL_ST_INIT)
6815b37fcf3Sryker 
6825b37fcf3Sryker #define SSL_CB_LOOP			0x01
6835b37fcf3Sryker #define SSL_CB_EXIT			0x02
6845b37fcf3Sryker #define SSL_CB_READ			0x04
6855b37fcf3Sryker #define SSL_CB_WRITE			0x08
6865b37fcf3Sryker #define SSL_CB_ALERT			0x4000 /* used in callback */
6875b37fcf3Sryker #define SSL_CB_READ_ALERT		(SSL_CB_ALERT|SSL_CB_READ)
6885b37fcf3Sryker #define SSL_CB_WRITE_ALERT		(SSL_CB_ALERT|SSL_CB_WRITE)
6895b37fcf3Sryker #define SSL_CB_ACCEPT_LOOP		(SSL_ST_ACCEPT|SSL_CB_LOOP)
6905b37fcf3Sryker #define SSL_CB_ACCEPT_EXIT		(SSL_ST_ACCEPT|SSL_CB_EXIT)
6915b37fcf3Sryker #define SSL_CB_CONNECT_LOOP		(SSL_ST_CONNECT|SSL_CB_LOOP)
6925b37fcf3Sryker #define SSL_CB_CONNECT_EXIT		(SSL_ST_CONNECT|SSL_CB_EXIT)
6935b37fcf3Sryker #define SSL_CB_HANDSHAKE_START		0x10
6945b37fcf3Sryker #define SSL_CB_HANDSHAKE_DONE		0x20
6955b37fcf3Sryker 
6965b37fcf3Sryker /* Is the SSL_connection established? */
697440bed4fSbeck #define SSL_get_state(a)		(SSL_state((a)))
698440bed4fSbeck #define SSL_is_init_finished(a)		(SSL_state((a)) == SSL_ST_OK)
699440bed4fSbeck #define SSL_in_init(a)			(SSL_state((a))&SSL_ST_INIT)
700440bed4fSbeck #define SSL_in_before(a)		(SSL_state((a))&SSL_ST_BEFORE)
701440bed4fSbeck #define SSL_in_connect_init(a)		(SSL_state((a))&SSL_ST_CONNECT)
702440bed4fSbeck #define SSL_in_accept_init(a)		(SSL_state((a))&SSL_ST_ACCEPT)
7035b37fcf3Sryker 
7045b37fcf3Sryker /* The following 2 states are kept in ssl->rstate when reads fail,
7055b37fcf3Sryker  * you should not need these */
7065b37fcf3Sryker #define SSL_ST_READ_HEADER		0xF0
7075b37fcf3Sryker #define SSL_ST_READ_BODY		0xF1
7085b37fcf3Sryker #define SSL_ST_READ_DONE		0xF2
7095b37fcf3Sryker 
710ba5406e9Sbeck /* Obtain latest Finished message
711ba5406e9Sbeck  *   -- that we sent (SSL_get_finished)
712ba5406e9Sbeck  *   -- that we expected from peer (SSL_get_peer_finished).
713ba5406e9Sbeck  * Returns length (0 == no Finished so far), copies up to 'count' bytes. */
71440d8aef3Sdjm size_t SSL_get_finished(const SSL *s, void *buf, size_t count);
71540d8aef3Sdjm size_t SSL_get_peer_finished(const SSL *s, void *buf, size_t count);
716ba5406e9Sbeck 
7175b37fcf3Sryker /* use either SSL_VERIFY_NONE or SSL_VERIFY_PEER, the last 2 options
7185b37fcf3Sryker  * are 'ored' with SSL_VERIFY_PEER if they are desired */
7195b37fcf3Sryker #define SSL_VERIFY_NONE			0x00
7205b37fcf3Sryker #define SSL_VERIFY_PEER			0x01
7215b37fcf3Sryker #define SSL_VERIFY_FAIL_IF_NO_PEER_CERT	0x02
7225b37fcf3Sryker #define SSL_VERIFY_CLIENT_ONCE		0x04
72345aea4dcStb #if defined(LIBRESSL_HAS_TLS1_3) || defined(LIBRESSL_INTERNAL)
72445aea4dcStb #define SSL_VERIFY_POST_HANDSHAKE	0x08
72545aea4dcStb 
72645aea4dcStb int SSL_verify_client_post_handshake(SSL *s);
72745aea4dcStb void SSL_CTX_set_post_handshake_auth(SSL_CTX *ctx, int val);
72845aea4dcStb void SSL_set_post_handshake_auth(SSL *s, int val);
72945aea4dcStb #endif
7305b37fcf3Sryker 
731ba5406e9Sbeck #define OpenSSL_add_ssl_algorithms()	SSL_library_init()
732913ec974Sbeck #define SSLeay_add_ssl_algorithms()	SSL_library_init()
733913ec974Sbeck 
734ba5406e9Sbeck /* More backward compatibility */
7355b37fcf3Sryker #define SSL_get_cipher(s) \
7365b37fcf3Sryker 		SSL_CIPHER_get_name(SSL_get_current_cipher(s))
7375b37fcf3Sryker #define SSL_get_cipher_bits(s,np) \
7385b37fcf3Sryker 		SSL_CIPHER_get_bits(SSL_get_current_cipher(s),np)
7395b37fcf3Sryker #define SSL_get_cipher_version(s) \
7405b37fcf3Sryker 		SSL_CIPHER_get_version(SSL_get_current_cipher(s))
7415b37fcf3Sryker #define SSL_get_cipher_name(s) \
7425b37fcf3Sryker 		SSL_CIPHER_get_name(SSL_get_current_cipher(s))
7435b37fcf3Sryker #define SSL_get_time(a)		SSL_SESSION_get_time(a)
7445b37fcf3Sryker #define SSL_set_time(a,b)	SSL_SESSION_set_time((a),(b))
7455b37fcf3Sryker #define SSL_get_timeout(a)	SSL_SESSION_get_timeout(a)
7465b37fcf3Sryker #define SSL_set_timeout(a,b)	SSL_SESSION_set_timeout((a),(b))
7475b37fcf3Sryker 
7484fcf65c5Sdjm #define d2i_SSL_SESSION_bio(bp,s_id) ASN1_d2i_bio_of(SSL_SESSION,SSL_SESSION_new,d2i_SSL_SESSION,bp,s_id)
7494fcf65c5Sdjm #define i2d_SSL_SESSION_bio(bp,s_id) ASN1_i2d_bio_of(SSL_SESSION,i2d_SSL_SESSION,bp,s_id)
7505b37fcf3Sryker 
751a9391b64Sjsing SSL_SESSION *PEM_read_bio_SSL_SESSION(BIO *bp, SSL_SESSION **x,
752a9391b64Sjsing     pem_password_cb *cb, void *u);
753a9391b64Sjsing SSL_SESSION *PEM_read_SSL_SESSION(FILE *fp, SSL_SESSION **x,
754a9391b64Sjsing     pem_password_cb *cb, void *u);
755a9391b64Sjsing int PEM_write_bio_SSL_SESSION(BIO *bp, SSL_SESSION *x);
756a9391b64Sjsing int PEM_write_SSL_SESSION(FILE *fp, SSL_SESSION *x);
7570a5d6edeSdjm 
7583c03665aSjsing /*
7593c03665aSjsing  * TLS Alerts.
7603c03665aSjsing  *
7613c03665aSjsing  * https://www.iana.org/assignments/tls-parameters/#tls-parameters-6
7623c03665aSjsing  */
7630a5d6edeSdjm 
7643c03665aSjsing /* Obsolete alerts. */
765550bdd61Sjsing #ifndef LIBRESSL_INTERNAL
7663c03665aSjsing #define SSL_AD_DECRYPTION_FAILED		21	/* Removed in TLSv1.1 */
7673c03665aSjsing #define SSL_AD_NO_CERTIFICATE			41	/* Removed in TLSv1.0 */
7683c03665aSjsing #define SSL_AD_EXPORT_RESTRICTION		60	/* Removed in TLSv1.1 */
769550bdd61Sjsing #endif
770550bdd61Sjsing 
7713c03665aSjsing #define SSL_AD_CLOSE_NOTIFY			0
7723c03665aSjsing #define SSL_AD_UNEXPECTED_MESSAGE		10
7733c03665aSjsing #define SSL_AD_BAD_RECORD_MAC			20
7743c03665aSjsing #define SSL_AD_RECORD_OVERFLOW			22
7753c03665aSjsing #define SSL_AD_DECOMPRESSION_FAILURE		30	/* Removed in TLSv1.3 */
7763c03665aSjsing #define SSL_AD_HANDSHAKE_FAILURE		40
7773c03665aSjsing #define SSL_AD_BAD_CERTIFICATE			42
7783c03665aSjsing #define SSL_AD_UNSUPPORTED_CERTIFICATE		43
7793c03665aSjsing #define SSL_AD_CERTIFICATE_REVOKED		44
7803c03665aSjsing #define SSL_AD_CERTIFICATE_EXPIRED		45
7813c03665aSjsing #define SSL_AD_CERTIFICATE_UNKNOWN		46
7823c03665aSjsing #define SSL_AD_ILLEGAL_PARAMETER		47
7833c03665aSjsing #define SSL_AD_UNKNOWN_CA			48
7843c03665aSjsing #define SSL_AD_ACCESS_DENIED			49
7853c03665aSjsing #define SSL_AD_DECODE_ERROR			50
7863c03665aSjsing #define SSL_AD_DECRYPT_ERROR			51
7873c03665aSjsing #define SSL_AD_PROTOCOL_VERSION			70
7883c03665aSjsing #define SSL_AD_INSUFFICIENT_SECURITY		71
7893c03665aSjsing #define SSL_AD_INTERNAL_ERROR			80
7903c03665aSjsing #define SSL_AD_INAPPROPRIATE_FALLBACK		86
7913c03665aSjsing #define SSL_AD_USER_CANCELLED			90
7923c03665aSjsing #define SSL_AD_NO_RENEGOTIATION			100	/* Removed in TLSv1.3 */
7938e83d273Sjsing #define SSL_AD_MISSING_EXTENSION		109	/* Added in TLSv1.3. */
7943c03665aSjsing #define SSL_AD_UNSUPPORTED_EXTENSION		110
7953c03665aSjsing #define SSL_AD_CERTIFICATE_UNOBTAINABLE		111	/* Removed in TLSv1.3 */
7963c03665aSjsing #define SSL_AD_UNRECOGNIZED_NAME		112
7973c03665aSjsing #define SSL_AD_BAD_CERTIFICATE_STATUS_RESPONSE	113
7983c03665aSjsing #define SSL_AD_BAD_CERTIFICATE_HASH_VALUE	114	/* Removed in TLSv1.3 */
7993c03665aSjsing #define SSL_AD_UNKNOWN_PSK_IDENTITY		115
8003c03665aSjsing #define SSL_AD_CERTIFICATE_REQUIRED		116
8013c03665aSjsing #define SSL_AD_NO_APPLICATION_PROTOCOL		120
8023c03665aSjsing 
8033c03665aSjsing /* Offset to get an SSL_R_... value from an SSL_AD_... value. */
8043c03665aSjsing #define SSL_AD_REASON_OFFSET			1000
8055b37fcf3Sryker 
8065b37fcf3Sryker #define SSL_ERROR_NONE				0
8075b37fcf3Sryker #define SSL_ERROR_SSL				1
8085b37fcf3Sryker #define SSL_ERROR_WANT_READ			2
8095b37fcf3Sryker #define SSL_ERROR_WANT_WRITE			3
8105b37fcf3Sryker #define SSL_ERROR_WANT_X509_LOOKUP		4
8111fd51421Sjsing #define SSL_ERROR_SYSCALL			5
8125b37fcf3Sryker #define SSL_ERROR_ZERO_RETURN			6
8135b37fcf3Sryker #define SSL_ERROR_WANT_CONNECT			7
814da347917Sbeck #define SSL_ERROR_WANT_ACCEPT			8
8151fd51421Sjsing #define SSL_ERROR_WANT_ASYNC			9
8161fd51421Sjsing #define SSL_ERROR_WANT_ASYNC_JOB		10
8171fd51421Sjsing #define SSL_ERROR_WANT_CLIENT_HELLO_CB		11
8185b37fcf3Sryker 
8195b37fcf3Sryker #define SSL_CTRL_NEED_TMP_RSA			1
8205b37fcf3Sryker #define SSL_CTRL_SET_TMP_RSA			2
8215b37fcf3Sryker #define SSL_CTRL_SET_TMP_DH			3
8224fcf65c5Sdjm #define SSL_CTRL_SET_TMP_ECDH			4
8234fcf65c5Sdjm #define SSL_CTRL_SET_TMP_RSA_CB			5
8244fcf65c5Sdjm #define SSL_CTRL_SET_TMP_DH_CB			6
8254fcf65c5Sdjm #define SSL_CTRL_SET_TMP_ECDH_CB		7
826da347917Sbeck 
8274fcf65c5Sdjm #define SSL_CTRL_GET_SESSION_REUSED		8
8284fcf65c5Sdjm #define SSL_CTRL_GET_CLIENT_CERT_REQUEST	9
8294fcf65c5Sdjm #define SSL_CTRL_GET_NUM_RENEGOTIATIONS		10
8304fcf65c5Sdjm #define SSL_CTRL_CLEAR_NUM_RENEGOTIATIONS	11
8314fcf65c5Sdjm #define SSL_CTRL_GET_TOTAL_RENEGOTIATIONS	12
8324fcf65c5Sdjm #define SSL_CTRL_GET_FLAGS			13
8334fcf65c5Sdjm #define SSL_CTRL_EXTRA_CHAIN_CERT		14
834913ec974Sbeck 
8354fcf65c5Sdjm #define SSL_CTRL_SET_MSG_CALLBACK               15
8364fcf65c5Sdjm #define SSL_CTRL_SET_MSG_CALLBACK_ARG           16
837da347917Sbeck 
8384fcf65c5Sdjm /* only applies to datagram connections */
8394fcf65c5Sdjm #define SSL_CTRL_SET_MTU                17
840913ec974Sbeck /* Stats */
841913ec974Sbeck #define SSL_CTRL_SESS_NUMBER			20
842913ec974Sbeck #define SSL_CTRL_SESS_CONNECT			21
843913ec974Sbeck #define SSL_CTRL_SESS_CONNECT_GOOD		22
844913ec974Sbeck #define SSL_CTRL_SESS_CONNECT_RENEGOTIATE	23
845913ec974Sbeck #define SSL_CTRL_SESS_ACCEPT			24
846913ec974Sbeck #define SSL_CTRL_SESS_ACCEPT_GOOD		25
847913ec974Sbeck #define SSL_CTRL_SESS_ACCEPT_RENEGOTIATE	26
848913ec974Sbeck #define SSL_CTRL_SESS_HIT			27
849913ec974Sbeck #define SSL_CTRL_SESS_CB_HIT			28
850913ec974Sbeck #define SSL_CTRL_SESS_MISSES			29
851913ec974Sbeck #define SSL_CTRL_SESS_TIMEOUTS			30
852913ec974Sbeck #define SSL_CTRL_SESS_CACHE_FULL		31
853913ec974Sbeck #define SSL_CTRL_OPTIONS			32
854913ec974Sbeck #define SSL_CTRL_MODE				33
855913ec974Sbeck 
856913ec974Sbeck #define SSL_CTRL_GET_READ_AHEAD			40
857913ec974Sbeck #define SSL_CTRL_SET_READ_AHEAD			41
858913ec974Sbeck #define SSL_CTRL_SET_SESS_CACHE_SIZE		42
859913ec974Sbeck #define SSL_CTRL_GET_SESS_CACHE_SIZE		43
860913ec974Sbeck #define SSL_CTRL_SET_SESS_CACHE_MODE		44
861913ec974Sbeck #define SSL_CTRL_GET_SESS_CACHE_MODE		45
8625b37fcf3Sryker 
863da347917Sbeck #define SSL_CTRL_GET_MAX_CERT_LIST		50
864da347917Sbeck #define SSL_CTRL_SET_MAX_CERT_LIST		51
865da347917Sbeck 
8660a5d6edeSdjm #define SSL_CTRL_SET_MAX_SEND_FRAGMENT		52
8670a5d6edeSdjm 
8684fcf65c5Sdjm /* see tls1.h for macros based on these */
8694fcf65c5Sdjm #define SSL_CTRL_SET_TLSEXT_SERVERNAME_CB	53
8704fcf65c5Sdjm #define SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG	54
8714fcf65c5Sdjm #define SSL_CTRL_SET_TLSEXT_HOSTNAME		55
8724fcf65c5Sdjm #define SSL_CTRL_SET_TLSEXT_DEBUG_CB		56
8734fcf65c5Sdjm #define SSL_CTRL_SET_TLSEXT_DEBUG_ARG		57
8744fcf65c5Sdjm #define SSL_CTRL_GET_TLSEXT_TICKET_KEYS		58
8754fcf65c5Sdjm #define SSL_CTRL_SET_TLSEXT_TICKET_KEYS		59
8767617119aSjsing #define SSL_CTRL_GET_TLSEXT_STATUS_REQ_CB	128
8774fcf65c5Sdjm #define SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB	63
8787617119aSjsing #define SSL_CTRL_GET_TLSEXT_STATUS_REQ_CB_ARG	129
8794fcf65c5Sdjm #define SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB_ARG	64
880a6ff6cd4Stb #define SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE	127
8814fcf65c5Sdjm #define SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE	65
8824fcf65c5Sdjm #define SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS	66
8834fcf65c5Sdjm #define SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS	67
8844fcf65c5Sdjm #define SSL_CTRL_GET_TLSEXT_STATUS_REQ_IDS	68
8854fcf65c5Sdjm #define SSL_CTRL_SET_TLSEXT_STATUS_REQ_IDS	69
8864fcf65c5Sdjm #define SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP	70
8874fcf65c5Sdjm #define SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP	71
8884fcf65c5Sdjm 
8894fcf65c5Sdjm #define SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB	72
8905cdd308eSdjm 
8915cdd308eSdjm #define SSL_CTRL_SET_TLS_EXT_SRP_USERNAME_CB	75
8925cdd308eSdjm #define SSL_CTRL_SET_SRP_VERIFY_PARAM_CB		76
8935cdd308eSdjm #define SSL_CTRL_SET_SRP_GIVE_CLIENT_PWD_CB		77
8945cdd308eSdjm 
8955cdd308eSdjm #define SSL_CTRL_SET_SRP_ARG		78
8965cdd308eSdjm #define SSL_CTRL_SET_TLS_EXT_SRP_USERNAME		79
8975cdd308eSdjm #define SSL_CTRL_SET_TLS_EXT_SRP_STRENGTH		80
8985cdd308eSdjm #define SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD		81
8994fcf65c5Sdjm 
9000a5d6edeSdjm #define DTLS_CTRL_GET_TIMEOUT		73
9010a5d6edeSdjm #define DTLS_CTRL_HANDLE_TIMEOUT	74
9020a5d6edeSdjm #define DTLS_CTRL_LISTEN			75
9030a5d6edeSdjm 
9040a5d6edeSdjm #define SSL_CTRL_GET_RI_SUPPORT			76
9050a5d6edeSdjm #define SSL_CTRL_CLEAR_OPTIONS			77
9060a5d6edeSdjm #define SSL_CTRL_CLEAR_MODE			78
9070a5d6edeSdjm 
9085cdd308eSdjm #define SSL_CTRL_GET_EXTRA_CHAIN_CERTS		82
9095cdd308eSdjm #define SSL_CTRL_CLEAR_EXTRA_CHAIN_CERTS	83
9105cdd308eSdjm 
9113ce15fffSjsing #define	SSL_CTRL_CHAIN					88
9123ce15fffSjsing #define	SSL_CTRL_CHAIN_CERT				89
9133ce15fffSjsing 
914468e1c08Sjsing #define SSL_CTRL_SET_GROUPS				91
915468e1c08Sjsing #define SSL_CTRL_SET_GROUPS_LIST			92
9161b6ff71bStb #define SSL_CTRL_GET_SHARED_GROUP			93
91797025b67Sjsing #define SSL_CTRL_SET_ECDH_AUTO				94
91897025b67Sjsing 
91999675379Sjsing #if defined(LIBRESSL_HAS_TLS1_3) || defined(LIBRESSL_INTERNAL)
9200b5e30a3Sjsing #define SSL_CTRL_GET_PEER_SIGNATURE_NID			108
92199675379Sjsing #define SSL_CTRL_GET_PEER_TMP_KEY			109
92299675379Sjsing #define SSL_CTRL_GET_SERVER_TMP_KEY SSL_CTRL_GET_PEER_TMP_KEY
92399675379Sjsing #else
924c640b633Sjsing #define SSL_CTRL_GET_SERVER_TMP_KEY		109
92599675379Sjsing #endif
926c640b633Sjsing 
9273ce15fffSjsing #define	SSL_CTRL_GET_CHAIN_CERTS			115
9283ce15fffSjsing 
92995986511Sjsing #define SSL_CTRL_SET_DH_AUTO			118
93095986511Sjsing 
93143a30d3dSjsing #define SSL_CTRL_SET_MIN_PROTO_VERSION			123
93243a30d3dSjsing #define SSL_CTRL_SET_MAX_PROTO_VERSION			124
933870628e8Sjca #define SSL_CTRL_GET_MIN_PROTO_VERSION			130
934870628e8Sjca #define SSL_CTRL_GET_MAX_PROTO_VERSION			131
93543a30d3dSjsing 
9360b5e30a3Sjsing #if defined(LIBRESSL_HAS_TLS1_3) || defined(LIBRESSL_INTERNAL)
9370b5e30a3Sjsing #define SSL_CTRL_GET_SIGNATURE_NID			132
9380b5e30a3Sjsing #endif
9390b5e30a3Sjsing 
9400a5d6edeSdjm #define DTLSv1_get_timeout(ssl, arg) \
9410a5d6edeSdjm 	SSL_ctrl(ssl,DTLS_CTRL_GET_TIMEOUT,0, (void *)arg)
9420a5d6edeSdjm #define DTLSv1_handle_timeout(ssl) \
9430a5d6edeSdjm 	SSL_ctrl(ssl,DTLS_CTRL_HANDLE_TIMEOUT,0, NULL)
9440a5d6edeSdjm #define DTLSv1_listen(ssl, peer) \
9450a5d6edeSdjm 	SSL_ctrl(ssl,DTLS_CTRL_LISTEN,0, (void *)peer)
9460a5d6edeSdjm 
9475b37fcf3Sryker #define SSL_session_reused(ssl) \
9485b37fcf3Sryker 	SSL_ctrl((ssl),SSL_CTRL_GET_SESSION_REUSED,0,NULL)
9495b37fcf3Sryker #define SSL_num_renegotiations(ssl) \
9505b37fcf3Sryker 	SSL_ctrl((ssl),SSL_CTRL_GET_NUM_RENEGOTIATIONS,0,NULL)
9515b37fcf3Sryker #define SSL_clear_num_renegotiations(ssl) \
9525b37fcf3Sryker 	SSL_ctrl((ssl),SSL_CTRL_CLEAR_NUM_RENEGOTIATIONS,0,NULL)
9535b37fcf3Sryker #define SSL_total_renegotiations(ssl) \
9545b37fcf3Sryker 	SSL_ctrl((ssl),SSL_CTRL_GET_TOTAL_RENEGOTIATIONS,0,NULL)
9555b37fcf3Sryker 
9565b37fcf3Sryker #define SSL_CTX_need_tmp_RSA(ctx) \
9575b37fcf3Sryker 	SSL_CTX_ctrl(ctx,SSL_CTRL_NEED_TMP_RSA,0,NULL)
9585b37fcf3Sryker #define SSL_CTX_set_tmp_rsa(ctx,rsa) \
9595b37fcf3Sryker 	SSL_CTX_ctrl(ctx,SSL_CTRL_SET_TMP_RSA,0,(char *)rsa)
9605b37fcf3Sryker #define SSL_CTX_set_tmp_dh(ctx,dh) \
9615b37fcf3Sryker 	SSL_CTX_ctrl(ctx,SSL_CTRL_SET_TMP_DH,0,(char *)dh)
9624fcf65c5Sdjm #define SSL_CTX_set_tmp_ecdh(ctx,ecdh) \
9634fcf65c5Sdjm 	SSL_CTX_ctrl(ctx,SSL_CTRL_SET_TMP_ECDH,0,(char *)ecdh)
96495986511Sjsing #define SSL_CTX_set_dh_auto(ctx, onoff) \
96595986511Sjsing 	SSL_CTX_ctrl(ctx,SSL_CTRL_SET_DH_AUTO,onoff,NULL)
96697025b67Sjsing #define SSL_CTX_set_ecdh_auto(ctx, onoff) \
96797025b67Sjsing 	SSL_CTX_ctrl(ctx,SSL_CTRL_SET_ECDH_AUTO,onoff,NULL)
9685b37fcf3Sryker 
969913ec974Sbeck #define SSL_need_tmp_RSA(ssl) \
970913ec974Sbeck 	SSL_ctrl(ssl,SSL_CTRL_NEED_TMP_RSA,0,NULL)
971913ec974Sbeck #define SSL_set_tmp_rsa(ssl,rsa) \
972913ec974Sbeck 	SSL_ctrl(ssl,SSL_CTRL_SET_TMP_RSA,0,(char *)rsa)
973913ec974Sbeck #define SSL_set_tmp_dh(ssl,dh) \
974913ec974Sbeck 	SSL_ctrl(ssl,SSL_CTRL_SET_TMP_DH,0,(char *)dh)
9754fcf65c5Sdjm #define SSL_set_tmp_ecdh(ssl,ecdh) \
9764fcf65c5Sdjm 	SSL_ctrl(ssl,SSL_CTRL_SET_TMP_ECDH,0,(char *)ecdh)
97795986511Sjsing #define SSL_set_dh_auto(s, onoff) \
97895986511Sjsing 	SSL_ctrl(s,SSL_CTRL_SET_DH_AUTO,onoff,NULL)
97997025b67Sjsing #define SSL_set_ecdh_auto(s, onoff) \
98097025b67Sjsing 	SSL_ctrl(s,SSL_CTRL_SET_ECDH_AUTO,onoff,NULL)
9815b37fcf3Sryker 
9823ce15fffSjsing int SSL_CTX_set0_chain(SSL_CTX *ctx, STACK_OF(X509) *chain);
9833ce15fffSjsing int SSL_CTX_set1_chain(SSL_CTX *ctx, STACK_OF(X509) *chain);
9843ce15fffSjsing int SSL_CTX_add0_chain_cert(SSL_CTX *ctx, X509 *x509);
9853ce15fffSjsing int SSL_CTX_add1_chain_cert(SSL_CTX *ctx, X509 *x509);
9863ce15fffSjsing int SSL_CTX_get0_chain_certs(const SSL_CTX *ctx, STACK_OF(X509) **out_chain);
9873ce15fffSjsing int SSL_CTX_clear_chain_certs(SSL_CTX *ctx);
9883ce15fffSjsing 
9893ce15fffSjsing int SSL_set0_chain(SSL *ssl, STACK_OF(X509) *chain);
9903ce15fffSjsing int SSL_set1_chain(SSL *ssl, STACK_OF(X509) *chain);
9913ce15fffSjsing int SSL_add0_chain_cert(SSL *ssl, X509 *x509);
9923ce15fffSjsing int SSL_add1_chain_cert(SSL *ssl, X509 *x509);
9933ce15fffSjsing int SSL_get0_chain_certs(const SSL *ssl, STACK_OF(X509) **out_chain);
9943ce15fffSjsing int SSL_clear_chain_certs(SSL *ssl);
9953ce15fffSjsing 
99667f294b8Sjsing int SSL_CTX_set1_groups(SSL_CTX *ctx, const int *groups, size_t groups_len);
99767f294b8Sjsing int SSL_CTX_set1_groups_list(SSL_CTX *ctx, const char *groups);
99867f294b8Sjsing 
99967f294b8Sjsing int SSL_set1_groups(SSL *ssl, const int *groups, size_t groups_len);
100067f294b8Sjsing int SSL_set1_groups_list(SSL *ssl, const char *groups);
100167f294b8Sjsing 
1002870628e8Sjca int SSL_CTX_get_min_proto_version(SSL_CTX *ctx);
1003870628e8Sjca int SSL_CTX_get_max_proto_version(SSL_CTX *ctx);
100443a30d3dSjsing int SSL_CTX_set_min_proto_version(SSL_CTX *ctx, uint16_t version);
100543a30d3dSjsing int SSL_CTX_set_max_proto_version(SSL_CTX *ctx, uint16_t version);
100643a30d3dSjsing 
1007870628e8Sjca int SSL_get_min_proto_version(SSL *ssl);
1008870628e8Sjca int SSL_get_max_proto_version(SSL *ssl);
100943a30d3dSjsing int SSL_set_min_proto_version(SSL *ssl, uint16_t version);
101043a30d3dSjsing int SSL_set_max_proto_version(SSL *ssl, uint16_t version);
101143a30d3dSjsing 
1012418e1009Stb const SSL_METHOD *SSL_CTX_get_ssl_method(const SSL_CTX *ctx);
1013418e1009Stb 
101467f294b8Sjsing #ifndef LIBRESSL_INTERNAL
1015468e1c08Sjsing #define SSL_CTRL_SET_CURVES			SSL_CTRL_SET_GROUPS
1016468e1c08Sjsing #define SSL_CTRL_SET_CURVES_LIST		SSL_CTRL_SET_GROUPS_LIST
10171fbdfa16Sjsing 
101867f294b8Sjsing #define SSL_CTX_set1_curves SSL_CTX_set1_groups
101967f294b8Sjsing #define SSL_CTX_set1_curves_list SSL_CTX_set1_groups_list
102067f294b8Sjsing #define SSL_set1_curves SSL_set1_groups
102167f294b8Sjsing #define SSL_set1_curves_list SSL_set1_groups_list
102267f294b8Sjsing #endif
102367f294b8Sjsing 
1024913ec974Sbeck #define SSL_CTX_add_extra_chain_cert(ctx, x509) \
1025913ec974Sbeck 	SSL_CTX_ctrl(ctx, SSL_CTRL_EXTRA_CHAIN_CERT, 0, (char *)x509)
10265cdd308eSdjm #define SSL_CTX_get_extra_chain_certs(ctx, px509) \
10275cdd308eSdjm 	SSL_CTX_ctrl(ctx, SSL_CTRL_GET_EXTRA_CHAIN_CERTS, 0, px509)
10288c9e35fdSjsing #define SSL_CTX_get_extra_chain_certs_only(ctx, px509) \
10298c9e35fdSjsing 	SSL_CTX_ctrl(ctx, SSL_CTRL_GET_EXTRA_CHAIN_CERTS, 1, px509)
10305cdd308eSdjm #define SSL_CTX_clear_extra_chain_certs(ctx) \
10315cdd308eSdjm 	SSL_CTX_ctrl(ctx, SSL_CTRL_CLEAR_EXTRA_CHAIN_CERTS, 0, NULL)
1032913ec974Sbeck 
10331b6ff71bStb #define SSL_get_shared_group(s, n) \
10341b6ff71bStb 	SSL_ctrl((s), SSL_CTRL_GET_SHARED_GROUP, (n), NULL)
10351b6ff71bStb #define SSL_get_shared_curve SSL_get_shared_group
10361b6ff71bStb 
1037c640b633Sjsing #define SSL_get_server_tmp_key(s, pk) \
1038c640b633Sjsing 	SSL_ctrl(s,SSL_CTRL_GET_SERVER_TMP_KEY,0,pk)
1039c640b633Sjsing 
104099675379Sjsing #if defined(LIBRESSL_HAS_TLS1_3) || defined(LIBRESSL_INTERNAL)
10410b5e30a3Sjsing #define SSL_get_signature_nid(s, pn) \
10420b5e30a3Sjsing 	SSL_ctrl(s, SSL_CTRL_GET_SIGNATURE_NID, 0, pn)
10430b5e30a3Sjsing 
10440b5e30a3Sjsing #define SSL_get_peer_signature_nid(s, pn) \
10450b5e30a3Sjsing 	SSL_ctrl(s, SSL_CTRL_GET_PEER_SIGNATURE_NID, 0, pn)
104699675379Sjsing #define SSL_get_peer_tmp_key(s, pk) \
104799675379Sjsing 	SSL_ctrl(s, SSL_CTRL_GET_PEER_TMP_KEY, 0, pk)
104899675379Sjsing #endif /* LIBRESSL_HAS_TLS1_3 || LIBRESSL_INTERNAL */
104999675379Sjsing 
10507208ea37Sjca #ifndef LIBRESSL_INTERNAL
10517208ea37Sjca /*
10527208ea37Sjca  * Also provide those functions as macros for compatibility with
10537208ea37Sjca  * existing users.
10547208ea37Sjca  */
10553ce15fffSjsing #define SSL_CTX_set0_chain		SSL_CTX_set0_chain
10563ce15fffSjsing #define SSL_CTX_set1_chain		SSL_CTX_set1_chain
10573ce15fffSjsing #define SSL_CTX_add0_chain_cert		SSL_CTX_add0_chain_cert
10583ce15fffSjsing #define SSL_CTX_add1_chain_cert		SSL_CTX_add1_chain_cert
10593ce15fffSjsing #define SSL_CTX_get0_chain_certs	SSL_CTX_get0_chain_certs
10603ce15fffSjsing #define SSL_CTX_clear_chain_certs	SSL_CTX_clear_chain_certs
10613ce15fffSjsing 
10623ce15fffSjsing #define SSL_add0_chain_cert		SSL_add0_chain_cert
10633ce15fffSjsing #define SSL_add1_chain_cert		SSL_add1_chain_cert
10643ce15fffSjsing #define SSL_set0_chain			SSL_set0_chain
10653ce15fffSjsing #define SSL_set1_chain			SSL_set1_chain
10663ce15fffSjsing #define SSL_get0_chain_certs		SSL_get0_chain_certs
10673ce15fffSjsing #define SSL_clear_chain_certs		SSL_clear_chain_certs
10683ce15fffSjsing 
10697208ea37Sjca #define SSL_CTX_set1_groups		SSL_CTX_set1_groups
10707208ea37Sjca #define SSL_CTX_set1_groups_list	SSL_CTX_set1_groups_list
10717208ea37Sjca #define SSL_set1_groups			SSL_set1_groups
10727208ea37Sjca #define SSL_set1_groups_list		SSL_set1_groups_list
10733ce15fffSjsing 
1074870628e8Sjca #define SSL_CTX_get_min_proto_version	SSL_CTX_get_min_proto_version
1075870628e8Sjca #define SSL_CTX_get_max_proto_version	SSL_CTX_get_max_proto_version
10767208ea37Sjca #define SSL_CTX_set_min_proto_version	SSL_CTX_set_min_proto_version
10777208ea37Sjca #define SSL_CTX_set_max_proto_version	SSL_CTX_set_max_proto_version
10783ce15fffSjsing 
1079870628e8Sjca #define SSL_get_min_proto_version	SSL_get_min_proto_version
1080870628e8Sjca #define SSL_get_max_proto_version	SSL_get_max_proto_version
10817208ea37Sjca #define SSL_set_min_proto_version	SSL_set_min_proto_version
10827208ea37Sjca #define SSL_set_max_proto_version	SSL_set_max_proto_version
10837208ea37Sjca #endif
10847208ea37Sjca 
1085daf0add4Stb const BIO_METHOD *BIO_f_ssl(void);
10865b37fcf3Sryker BIO *BIO_new_ssl(SSL_CTX *ctx, int client);
10875b37fcf3Sryker BIO *BIO_new_ssl_connect(SSL_CTX *ctx);
10885b37fcf3Sryker BIO *BIO_new_buffer_ssl_connect(SSL_CTX *ctx);
10895b37fcf3Sryker int BIO_ssl_copy_session_id(BIO *to, BIO *from);
10905b37fcf3Sryker void BIO_ssl_shutdown(BIO *ssl_bio);
10915b37fcf3Sryker 
10923730db37Sjsing STACK_OF(SSL_CIPHER) *SSL_CTX_get_ciphers(const SSL_CTX *ctx);
1093ba5406e9Sbeck int	SSL_CTX_set_cipher_list(SSL_CTX *, const char *str);
109461a9dc01Sjsing #if defined(LIBRESSL_HAS_TLS1_3) || defined(LIBRESSL_INTERNAL)
109561a9dc01Sjsing int SSL_CTX_set_ciphersuites(SSL_CTX *ctx, const char *str);
109661a9dc01Sjsing #endif
10970a5d6edeSdjm SSL_CTX *SSL_CTX_new(const SSL_METHOD *meth);
10985b37fcf3Sryker void	SSL_CTX_free(SSL_CTX *);
1099540ad3efSjsing int SSL_CTX_up_ref(SSL_CTX *ctx);
1100913ec974Sbeck long SSL_CTX_set_timeout(SSL_CTX *ctx, long t);
110140d8aef3Sdjm long SSL_CTX_get_timeout(const SSL_CTX *ctx);
110240d8aef3Sdjm X509_STORE *SSL_CTX_get_cert_store(const SSL_CTX *);
1103913ec974Sbeck void SSL_CTX_set_cert_store(SSL_CTX *, X509_STORE *);
1104dcd96ea6Stb void SSL_CTX_set1_cert_store(SSL_CTX *ctx, X509_STORE *store);
110599b96162Sjsing X509 *SSL_CTX_get0_certificate(const SSL_CTX *ctx);
110681b25e49Stb EVP_PKEY *SSL_CTX_get0_privatekey(const SSL_CTX *ctx);
110740d8aef3Sdjm int SSL_want(const SSL *s);
1108913ec974Sbeck int	SSL_clear(SSL *s);
1109913ec974Sbeck 
11105b37fcf3Sryker void	SSL_CTX_flush_sessions(SSL_CTX *ctx, long tm);
11115b37fcf3Sryker 
11120a5d6edeSdjm const SSL_CIPHER *SSL_get_current_cipher(const SSL *s);
111340d8aef3Sdjm int	SSL_CIPHER_get_bits(const SSL_CIPHER *c, int *alg_bits);
11140a4fabb9Stb const char *	SSL_CIPHER_get_version(const SSL_CIPHER *c);
111540d8aef3Sdjm const char *	SSL_CIPHER_get_name(const SSL_CIPHER *c);
11165cdd308eSdjm unsigned long 	SSL_CIPHER_get_id(const SSL_CIPHER *c);
1117907dbca0Sjsing uint16_t SSL_CIPHER_get_value(const SSL_CIPHER *c);
111892b883b3Stb const SSL_CIPHER *SSL_CIPHER_find(SSL *ssl, const unsigned char *ptr);
1119f9321272Sjsing int SSL_CIPHER_get_cipher_nid(const SSL_CIPHER *c);
1120f9321272Sjsing int SSL_CIPHER_get_digest_nid(const SSL_CIPHER *c);
1121f9321272Sjsing int SSL_CIPHER_get_kx_nid(const SSL_CIPHER *c);
1122f9321272Sjsing int SSL_CIPHER_get_auth_nid(const SSL_CIPHER *c);
112339d7e165Stb const EVP_MD *SSL_CIPHER_get_handshake_digest(const SSL_CIPHER *c);
1124f9321272Sjsing int SSL_CIPHER_is_aead(const SSL_CIPHER *c);
11255b37fcf3Sryker 
112640d8aef3Sdjm int	SSL_get_fd(const SSL *s);
112740d8aef3Sdjm int	SSL_get_rfd(const SSL *s);
112840d8aef3Sdjm int	SSL_get_wfd(const SSL *s);
112940d8aef3Sdjm const char  * SSL_get_cipher_list(const SSL *s, int n);
113040d8aef3Sdjm char *	SSL_get_shared_ciphers(const SSL *s, char *buf, int len);
113140d8aef3Sdjm int	SSL_get_read_ahead(const SSL * s);
113240d8aef3Sdjm int	SSL_pending(const SSL *s);
11335b37fcf3Sryker int	SSL_set_fd(SSL *s, int fd);
11345b37fcf3Sryker int	SSL_set_rfd(SSL *s, int fd);
11355b37fcf3Sryker int	SSL_set_wfd(SSL *s, int fd);
11365b37fcf3Sryker void	SSL_set_bio(SSL *s, BIO *rbio, BIO *wbio);
113740d8aef3Sdjm BIO *	SSL_get_rbio(const SSL *s);
11380ebaf169Stb void	SSL_set0_rbio(SSL *s, BIO *rbio);
113940d8aef3Sdjm BIO *	SSL_get_wbio(const SSL *s);
1140ba5406e9Sbeck int	SSL_set_cipher_list(SSL *s, const char *str);
114161a9dc01Sjsing #if defined(LIBRESSL_HAS_TLS1_3) || defined(LIBRESSL_INTERNAL)
114261a9dc01Sjsing int	SSL_set_ciphersuites(SSL *s, const char *str);
114361a9dc01Sjsing #endif
11445b37fcf3Sryker void	SSL_set_read_ahead(SSL *s, int yes);
114540d8aef3Sdjm int	SSL_get_verify_mode(const SSL *s);
114640d8aef3Sdjm int	SSL_get_verify_depth(const SSL *s);
114740d8aef3Sdjm int	(*SSL_get_verify_callback(const SSL *s))(int, X509_STORE_CTX *);
1148913ec974Sbeck void	SSL_set_verify(SSL *s, int mode,
1149913ec974Sbeck 	    int (*callback)(int ok, X509_STORE_CTX *ctx));
1150913ec974Sbeck void	SSL_set_verify_depth(SSL *s, int depth);
11515b37fcf3Sryker int	SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa);
11520a4fabb9Stb int	SSL_use_RSAPrivateKey_ASN1(SSL *ssl, const unsigned char *d, long len);
11535b37fcf3Sryker int	SSL_use_PrivateKey(SSL *ssl, EVP_PKEY *pkey);
11544fcf65c5Sdjm int	SSL_use_PrivateKey_ASN1(int pk, SSL *ssl, const unsigned char *d, long len);
11555b37fcf3Sryker int	SSL_use_certificate(SSL *ssl, X509 *x);
11564fcf65c5Sdjm int	SSL_use_certificate_ASN1(SSL *ssl, const unsigned char *d, int len);
11575b37fcf3Sryker 
1158913ec974Sbeck int	SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, int type);
1159913ec974Sbeck int	SSL_use_PrivateKey_file(SSL *ssl, const char *file, int type);
1160913ec974Sbeck int	SSL_use_certificate_file(SSL *ssl, const char *file, int type);
11612be1b120Stb int	SSL_use_certificate_chain_file(SSL *ssl, const char *file);
1162913ec974Sbeck int	SSL_CTX_use_RSAPrivateKey_file(SSL_CTX *ctx, const char *file, int type);
1163913ec974Sbeck int	SSL_CTX_use_PrivateKey_file(SSL_CTX *ctx, const char *file, int type);
1164913ec974Sbeck int	SSL_CTX_use_certificate_file(SSL_CTX *ctx, const char *file, int type);
1165913ec974Sbeck int	SSL_CTX_use_certificate_chain_file(SSL_CTX *ctx, const char *file); /* PEM type */
1166642f72f1Sreyk int	SSL_CTX_use_certificate_chain_mem(SSL_CTX *ctx, void *buf, int len);
1167913ec974Sbeck STACK_OF(X509_NAME) *SSL_load_client_CA_file(const char *file);
1168913ec974Sbeck int	SSL_add_file_cert_subjects_to_stack(STACK_OF(X509_NAME) *stackCAs,
1169913ec974Sbeck 	    const char *file);
1170913ec974Sbeck int	SSL_add_dir_cert_subjects_to_stack(STACK_OF(X509_NAME) *stackCAs,
1171913ec974Sbeck 	    const char *dir);
1172da347917Sbeck 
11735b37fcf3Sryker void	SSL_load_error_strings(void );
1174da347917Sbeck const char *SSL_state_string(const SSL *s);
1175da347917Sbeck const char *SSL_rstate_string(const SSL *s);
1176da347917Sbeck const char *SSL_state_string_long(const SSL *s);
1177da347917Sbeck const char *SSL_rstate_string_long(const SSL *s);
11782d36c056Stb const SSL_CIPHER *SSL_SESSION_get0_cipher(const SSL_SESSION *ss);
117929e4fea2Sjsing size_t	SSL_SESSION_get_master_key(const SSL_SESSION *ss,
118029e4fea2Sjsing 	    unsigned char *out, size_t max_out);
11815d90759aStb int	SSL_SESSION_get_protocol_version(const SSL_SESSION *s);
118240d8aef3Sdjm long	SSL_SESSION_get_time(const SSL_SESSION *s);
11835b37fcf3Sryker long	SSL_SESSION_set_time(SSL_SESSION *s, long t);
118440d8aef3Sdjm long	SSL_SESSION_get_timeout(const SSL_SESSION *s);
11855b37fcf3Sryker long	SSL_SESSION_set_timeout(SSL_SESSION *s, long t);
11861e7a28f3Stb int	SSL_copy_session_id(SSL *to, const SSL *from);
11875cdd308eSdjm X509	*SSL_SESSION_get0_peer(SSL_SESSION *s);
118825ba64d1Stb int	SSL_SESSION_set1_id(SSL_SESSION *s, const unsigned char *sid,
118925ba64d1Stb 	    unsigned int sid_len);
1190991039d4Sguenther int	SSL_SESSION_set1_id_context(SSL_SESSION *s,
1191991039d4Sguenther 	    const unsigned char *sid_ctx, unsigned int sid_ctx_len);
11925b7f4dd6Stb #if defined(LIBRESSL_HAS_TLS1_3) || defined(LIBRESSL_INTERNAL)
11935b7f4dd6Stb int SSL_SESSION_is_resumable(const SSL_SESSION *s);
11945b7f4dd6Stb #endif
11955b37fcf3Sryker 
11965b37fcf3Sryker SSL_SESSION *SSL_SESSION_new(void);
1197c6d61022Sjsing void	SSL_SESSION_free(SSL_SESSION *ses);
1198c6d61022Sjsing int	SSL_SESSION_up_ref(SSL_SESSION *ss);
119905ce10daSjsing const unsigned char *SSL_SESSION_get_id(const SSL_SESSION *ss,
12000a5d6edeSdjm 	    unsigned int *len);
120105ce10daSjsing const unsigned char *SSL_SESSION_get0_id_context(const SSL_SESSION *ss,
120205ce10daSjsing 	    unsigned int *len);
1203d309fe46Stb #if defined(LIBRESSL_HAS_TLS1_3) || defined(LIBRESSL_INTERNAL)
1204d309fe46Stb uint32_t SSL_SESSION_get_max_early_data(const SSL_SESSION *sess);
1205d309fe46Stb int SSL_SESSION_set_max_early_data(SSL_SESSION *sess, uint32_t max_early_data);
1206d309fe46Stb #endif
12071a87ffccStb unsigned long SSL_SESSION_get_ticket_lifetime_hint(const SSL_SESSION *s);
12081a87ffccStb int	SSL_SESSION_has_ticket(const SSL_SESSION *s);
120905ce10daSjsing unsigned int SSL_SESSION_get_compress_id(const SSL_SESSION *ss);
121040d8aef3Sdjm int	SSL_SESSION_print_fp(FILE *fp, const SSL_SESSION *ses);
121140d8aef3Sdjm int	SSL_SESSION_print(BIO *fp, const SSL_SESSION *ses);
12125b37fcf3Sryker int	i2d_SSL_SESSION(SSL_SESSION *in, unsigned char **pp);
12135b37fcf3Sryker int	SSL_set_session(SSL *to, SSL_SESSION *session);
12145b37fcf3Sryker int	SSL_CTX_add_session(SSL_CTX *s, SSL_SESSION *c);
12155b37fcf3Sryker int	SSL_CTX_remove_session(SSL_CTX *, SSL_SESSION *c);
1216da347917Sbeck int	SSL_CTX_set_generate_session_id(SSL_CTX *, GEN_SESSION_CB);
1217da347917Sbeck int	SSL_set_generate_session_id(SSL *, GEN_SESSION_CB);
1218da347917Sbeck int	SSL_has_matching_session_id(const SSL *ssl, const unsigned char *id,
1219da347917Sbeck 	    unsigned int id_len);
12204fcf65c5Sdjm SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a, const unsigned char **pp,
122140d8aef3Sdjm 	    long length);
12225b37fcf3Sryker 
12235b37fcf3Sryker #ifdef HEADER_X509_H
122440d8aef3Sdjm X509 *	SSL_get_peer_certificate(const SSL *s);
12255b37fcf3Sryker #endif
12265b37fcf3Sryker 
122740d8aef3Sdjm STACK_OF(X509) *SSL_get_peer_cert_chain(const SSL *s);
1228913ec974Sbeck 
122940d8aef3Sdjm int SSL_CTX_get_verify_mode(const SSL_CTX *ctx);
123040d8aef3Sdjm int SSL_CTX_get_verify_depth(const SSL_CTX *ctx);
123140d8aef3Sdjm int (*SSL_CTX_get_verify_callback(const SSL_CTX *ctx))(int, X509_STORE_CTX *);
1232913ec974Sbeck void SSL_CTX_set_verify(SSL_CTX *ctx, int mode,
1233913ec974Sbeck     int (*callback)(int, X509_STORE_CTX *));
1234913ec974Sbeck void SSL_CTX_set_verify_depth(SSL_CTX *ctx, int depth);
1235da347917Sbeck void SSL_CTX_set_cert_verify_callback(SSL_CTX *ctx, int (*cb)(X509_STORE_CTX *, void *), void *arg);
12365b37fcf3Sryker int SSL_CTX_use_RSAPrivateKey(SSL_CTX *ctx, RSA *rsa);
12374fcf65c5Sdjm int SSL_CTX_use_RSAPrivateKey_ASN1(SSL_CTX *ctx, const unsigned char *d, long len);
12385b37fcf3Sryker int SSL_CTX_use_PrivateKey(SSL_CTX *ctx, EVP_PKEY *pkey);
1239d6d77668Sjsing int SSL_CTX_use_PrivateKey_ASN1(int pk, SSL_CTX *ctx, const unsigned char *d, long len);
12405b37fcf3Sryker int SSL_CTX_use_certificate(SSL_CTX *ctx, X509 *x);
12414fcf65c5Sdjm int SSL_CTX_use_certificate_ASN1(SSL_CTX *ctx, int len, const unsigned char *d);
12425b37fcf3Sryker 
1243bc7da7f0Stb pem_password_cb *SSL_CTX_get_default_passwd_cb(SSL_CTX *ctx);
1244913ec974Sbeck void SSL_CTX_set_default_passwd_cb(SSL_CTX *ctx, pem_password_cb *cb);
1245bc7da7f0Stb void *SSL_CTX_get_default_passwd_cb_userdata(SSL_CTX *ctx);
1246913ec974Sbeck void SSL_CTX_set_default_passwd_cb_userdata(SSL_CTX *ctx, void *u);
12475b37fcf3Sryker 
124840d8aef3Sdjm int SSL_CTX_check_private_key(const SSL_CTX *ctx);
124940d8aef3Sdjm int SSL_check_private_key(const SSL *ctx);
12505b37fcf3Sryker 
1251d6d77668Sjsing int SSL_CTX_set_session_id_context(SSL_CTX *ctx, const unsigned char *sid_ctx, unsigned int sid_ctx_len);
1252913ec974Sbeck 
1253d6d77668Sjsing int SSL_set_session_id_context(SSL *ssl, const unsigned char *sid_ctx, unsigned int sid_ctx_len);
1254ba5406e9Sbeck 
1255ba5406e9Sbeck int SSL_CTX_set_purpose(SSL_CTX *s, int purpose);
1256ba5406e9Sbeck int SSL_set_purpose(SSL *s, int purpose);
1257ba5406e9Sbeck int SSL_CTX_set_trust(SSL_CTX *s, int trust);
1258ba5406e9Sbeck int SSL_set_trust(SSL *s, int trust);
1259ca8dce7bStb int SSL_set1_host(SSL *s, const char *hostname);
1260cef7ca0dStb void SSL_set_hostflags(SSL *s, unsigned int flags);
1261970f9889Stb const char *SSL_get0_peername(SSL *s);
1262ba5406e9Sbeck 
126359c79d9dSjsing X509_VERIFY_PARAM *SSL_CTX_get0_param(SSL_CTX *ctx);
12640a5d6edeSdjm int SSL_CTX_set1_param(SSL_CTX *ctx, X509_VERIFY_PARAM *vpm);
126559c79d9dSjsing X509_VERIFY_PARAM *SSL_get0_param(SSL *ssl);
12660a5d6edeSdjm int SSL_set1_param(SSL *ssl, X509_VERIFY_PARAM *vpm);
12670a5d6edeSdjm 
1268d17a9405Sjsing SSL *SSL_new(SSL_CTX *ctx);
12695b37fcf3Sryker void	SSL_free(SSL *ssl);
1270d17a9405Sjsing int	SSL_up_ref(SSL *ssl);
12715b37fcf3Sryker int 	SSL_accept(SSL *ssl);
12725b37fcf3Sryker int 	SSL_connect(SSL *ssl);
1273d4fdd934Sjsing int	SSL_is_dtls(const SSL *s);
127461a9c69bSjsing int	SSL_is_server(const SSL *s);
1275ce6fc090Sbeck int 	SSL_read(SSL *ssl, void *buf, int num);
1276ce6fc090Sbeck int 	SSL_peek(SSL *ssl, void *buf, int num);
1277ce6fc090Sbeck int 	SSL_write(SSL *ssl, const void *buf, int num);
1278b5b7f1d2Sbeck int 	SSL_read_ex(SSL *ssl, void *buf, size_t num, size_t *bytes_read);
1279b5b7f1d2Sbeck int 	SSL_peek_ex(SSL *ssl, void *buf, size_t num, size_t *bytes_peeked);
1280b5b7f1d2Sbeck int 	SSL_write_ex(SSL *ssl, const void *buf, size_t num, size_t *bytes_written);
1281fde73d25Stb 
1282fde73d25Stb #if defined(LIBRESSL_HAS_TLS1_3) || defined(LIBRESSL_INTERNAL)
1283fde73d25Stb uint32_t SSL_CTX_get_max_early_data(const SSL_CTX *ctx);
1284fde73d25Stb int SSL_CTX_set_max_early_data(SSL_CTX *ctx, uint32_t max_early_data);
1285fde73d25Stb 
1286fde73d25Stb uint32_t SSL_get_max_early_data(const SSL *s);
1287fde73d25Stb int SSL_set_max_early_data(SSL *s, uint32_t max_early_data);
1288d9e525caStb 
1289d9e525caStb #define SSL_EARLY_DATA_NOT_SENT		0
1290d9e525caStb #define SSL_EARLY_DATA_REJECTED		1
1291d9e525caStb #define SSL_EARLY_DATA_ACCEPTED		2
1292d9e525caStb int SSL_get_early_data_status(const SSL *s);
1293d9e525caStb 
1294d9e525caStb #define SSL_READ_EARLY_DATA_ERROR	0
1295d9e525caStb #define SSL_READ_EARLY_DATA_SUCCESS	1
1296d9e525caStb #define SSL_READ_EARLY_DATA_FINISH	2
1297d9e525caStb int SSL_read_early_data(SSL *s, void *buf, size_t num, size_t *readbytes);
1298d9e525caStb int SSL_write_early_data(SSL *s, const void *buf, size_t num, size_t *written);
1299fde73d25Stb #endif
1300fde73d25Stb 
1301da347917Sbeck long	SSL_ctrl(SSL *ssl, int cmd, long larg, void *parg);
13024fcf65c5Sdjm long	SSL_callback_ctrl(SSL *, int, void (*)(void));
1303da347917Sbeck long	SSL_CTX_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg);
13044fcf65c5Sdjm long	SSL_CTX_callback_ctrl(SSL_CTX *, int, void (*)(void));
13055b37fcf3Sryker 
130640d8aef3Sdjm int	SSL_get_error(const SSL *s, int ret_code);
130740d8aef3Sdjm const char *SSL_get_version(const SSL *s);
13085b37fcf3Sryker 
13095b37fcf3Sryker /* This sets the 'default' SSL version that SSL_new() will create */
13100a5d6edeSdjm int SSL_CTX_set_ssl_version(SSL_CTX *ctx, const SSL_METHOD *meth);
13115b37fcf3Sryker 
1312aa8444d1Sguenther const SSL_METHOD *SSLv23_method(void);		/* SSLv3 or TLSv1.* */
1313aa8444d1Sguenther const SSL_METHOD *SSLv23_server_method(void);	/* SSLv3 or TLSv1.* */
1314aa8444d1Sguenther const SSL_METHOD *SSLv23_client_method(void);	/* SSLv3 or TLSv1.* */
13155b37fcf3Sryker 
13160a5d6edeSdjm const SSL_METHOD *TLSv1_method(void);		/* TLSv1.0 */
13170a5d6edeSdjm const SSL_METHOD *TLSv1_server_method(void);	/* TLSv1.0 */
13180a5d6edeSdjm const SSL_METHOD *TLSv1_client_method(void);	/* TLSv1.0 */
13195b37fcf3Sryker 
13205cdd308eSdjm const SSL_METHOD *TLSv1_1_method(void);		/* TLSv1.1 */
13215cdd308eSdjm const SSL_METHOD *TLSv1_1_server_method(void);	/* TLSv1.1 */
13225cdd308eSdjm const SSL_METHOD *TLSv1_1_client_method(void);	/* TLSv1.1 */
13235cdd308eSdjm 
13245cdd308eSdjm const SSL_METHOD *TLSv1_2_method(void);		/* TLSv1.2 */
13255cdd308eSdjm const SSL_METHOD *TLSv1_2_server_method(void);	/* TLSv1.2 */
13265cdd308eSdjm const SSL_METHOD *TLSv1_2_client_method(void);	/* TLSv1.2 */
13275cdd308eSdjm 
13286dca9abdSdoug const SSL_METHOD *TLS_method(void);		/* TLS v1.0 or later */
13296dca9abdSdoug const SSL_METHOD *TLS_server_method(void);	/* TLS v1.0 or later */
13306dca9abdSdoug const SSL_METHOD *TLS_client_method(void);	/* TLS v1.0 or later */
13315cdd308eSdjm 
13320a5d6edeSdjm const SSL_METHOD *DTLSv1_method(void);		/* DTLSv1.0 */
13330a5d6edeSdjm const SSL_METHOD *DTLSv1_server_method(void);	/* DTLSv1.0 */
13340a5d6edeSdjm const SSL_METHOD *DTLSv1_client_method(void);	/* DTLSv1.0 */
13354fcf65c5Sdjm 
1336a48e0dedSjsing const SSL_METHOD *DTLSv1_2_method(void);	/* DTLSv1.2 */
1337a48e0dedSjsing const SSL_METHOD *DTLSv1_2_server_method(void);	/* DTLSv1.2 */
1338a48e0dedSjsing const SSL_METHOD *DTLSv1_2_client_method(void);	/* DTLSv1.2 */
1339a48e0dedSjsing 
134071023d34Sjsing const SSL_METHOD *DTLS_method(void);		/* DTLS v1.0 or later */
134171023d34Sjsing const SSL_METHOD *DTLS_server_method(void);	/* DTLS v1.0 or later */
134271023d34Sjsing const SSL_METHOD *DTLS_client_method(void);	/* DTLS v1.0 or later */
134371023d34Sjsing 
134440d8aef3Sdjm STACK_OF(SSL_CIPHER) *SSL_get_ciphers(const SSL *s);
13456e429577Stb STACK_OF(SSL_CIPHER) *SSL_get_client_ciphers(const SSL *s);
1346bb553201Stb STACK_OF(SSL_CIPHER) *SSL_get1_supported_ciphers(SSL *s);
13475b37fcf3Sryker 
13485b37fcf3Sryker int SSL_do_handshake(SSL *s);
13495b37fcf3Sryker int SSL_renegotiate(SSL *s);
13505cdd308eSdjm int SSL_renegotiate_abbreviated(SSL *s);
1351da347917Sbeck int SSL_renegotiate_pending(SSL *s);
13525b37fcf3Sryker int SSL_shutdown(SSL *s);
13535b37fcf3Sryker 
13540a5d6edeSdjm const SSL_METHOD *SSL_get_ssl_method(SSL *s);
13550a5d6edeSdjm int SSL_set_ssl_method(SSL *s, const SSL_METHOD *method);
1356da347917Sbeck const char *SSL_alert_type_string_long(int value);
1357da347917Sbeck const char *SSL_alert_type_string(int value);
1358da347917Sbeck const char *SSL_alert_desc_string_long(int value);
1359da347917Sbeck const char *SSL_alert_desc_string(int value);
13605b37fcf3Sryker 
13616278d030Smarkus void SSL_set_client_CA_list(SSL *s, STACK_OF(X509_NAME) *name_list);
13626278d030Smarkus void SSL_CTX_set_client_CA_list(SSL_CTX *ctx, STACK_OF(X509_NAME) *name_list);
136340d8aef3Sdjm STACK_OF(X509_NAME) *SSL_get_client_CA_list(const SSL *s);
136440d8aef3Sdjm STACK_OF(X509_NAME) *SSL_CTX_get_client_CA_list(const SSL_CTX *s);
13655b37fcf3Sryker int SSL_add_client_CA(SSL *ssl, X509 *x);
13665b37fcf3Sryker int SSL_CTX_add_client_CA(SSL_CTX *ctx, X509 *x);
13675b37fcf3Sryker 
13685b37fcf3Sryker void SSL_set_connect_state(SSL *s);
13695b37fcf3Sryker void SSL_set_accept_state(SSL *s);
13705b37fcf3Sryker 
137140d8aef3Sdjm long SSL_get_default_timeout(const SSL *s);
13725b37fcf3Sryker 
13730a5d6edeSdjm char *SSL_CIPHER_description(const SSL_CIPHER *, char *buf, int size);
13740a4fabb9Stb STACK_OF(X509_NAME) *SSL_dup_CA_list(const STACK_OF(X509_NAME) *sk);
13755b37fcf3Sryker 
13765b37fcf3Sryker SSL *SSL_dup(SSL *ssl);
13775b37fcf3Sryker 
137840d8aef3Sdjm X509 *SSL_get_certificate(const SSL *ssl);
13790a4fabb9Stb /* EVP_PKEY */ struct evp_pkey_st *SSL_get_privatekey(const SSL *ssl);
13805b37fcf3Sryker 
13815b37fcf3Sryker void SSL_CTX_set_quiet_shutdown(SSL_CTX *ctx,int mode);
138240d8aef3Sdjm int SSL_CTX_get_quiet_shutdown(const SSL_CTX *ctx);
13835b37fcf3Sryker void SSL_set_quiet_shutdown(SSL *ssl,int mode);
138440d8aef3Sdjm int SSL_get_quiet_shutdown(const SSL *ssl);
13855b37fcf3Sryker void SSL_set_shutdown(SSL *ssl,int mode);
138640d8aef3Sdjm int SSL_get_shutdown(const SSL *ssl);
138740d8aef3Sdjm int SSL_version(const SSL *ssl);
13885b37fcf3Sryker int SSL_CTX_set_default_verify_paths(SSL_CTX *ctx);
1389913ec974Sbeck int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,
1390913ec974Sbeck     const char *CApath);
13913c243a36Sreyk int SSL_CTX_load_verify_mem(SSL_CTX *ctx, void *buf, int len);
1392ba5406e9Sbeck #define SSL_get0_session SSL_get_session /* just peek at pointer */
139340d8aef3Sdjm SSL_SESSION *SSL_get_session(const SSL *ssl);
1394ba5406e9Sbeck SSL_SESSION *SSL_get1_session(SSL *ssl); /* obtain a reference count */
139540d8aef3Sdjm SSL_CTX *SSL_get_SSL_CTX(const SSL *ssl);
13964fcf65c5Sdjm SSL_CTX *SSL_set_SSL_CTX(SSL *ssl, SSL_CTX* ctx);
1397da347917Sbeck void SSL_set_info_callback(SSL *ssl,
1398da347917Sbeck     void (*cb)(const SSL *ssl, int type, int val));
139940d8aef3Sdjm void (*SSL_get_info_callback(const SSL *ssl))(const SSL *ssl, int type, int val);
140040d8aef3Sdjm int SSL_state(const SSL *ssl);
14015cdd308eSdjm void SSL_set_state(SSL *ssl, int state);
14025b37fcf3Sryker 
14035b37fcf3Sryker void SSL_set_verify_result(SSL *ssl, long v);
140440d8aef3Sdjm long SSL_get_verify_result(const SSL *ssl);
14055b37fcf3Sryker 
1406913ec974Sbeck int SSL_set_ex_data(SSL *ssl, int idx, void *data);
140740d8aef3Sdjm void *SSL_get_ex_data(const SSL *ssl, int idx);
1408ba5406e9Sbeck int SSL_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func,
1409ba5406e9Sbeck     CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func);
14105b37fcf3Sryker 
1411913ec974Sbeck int SSL_SESSION_set_ex_data(SSL_SESSION *ss, int idx, void *data);
141240d8aef3Sdjm void *SSL_SESSION_get_ex_data(const SSL_SESSION *ss, int idx);
1413d6d77668Sjsing int SSL_SESSION_get_ex_new_index(long argl, void *argp,
1414d6d77668Sjsing     CRYPTO_EX_new *new_func, CRYPTO_EX_dup *dup_func,
1415d6d77668Sjsing     CRYPTO_EX_free *free_func);
14165b37fcf3Sryker 
1417913ec974Sbeck int SSL_CTX_set_ex_data(SSL_CTX *ssl, int idx, void *data);
141840d8aef3Sdjm void *SSL_CTX_get_ex_data(const SSL_CTX *ssl, int idx);
1419ba5406e9Sbeck int SSL_CTX_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func,
1420ba5406e9Sbeck     CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func);
14215b37fcf3Sryker 
1422913ec974Sbeck int SSL_get_ex_data_X509_STORE_CTX_idx(void );
1423913ec974Sbeck 
1424913ec974Sbeck #define SSL_CTX_sess_set_cache_size(ctx,t) \
1425913ec974Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_SET_SESS_CACHE_SIZE,t,NULL)
1426913ec974Sbeck #define SSL_CTX_sess_get_cache_size(ctx) \
1427913ec974Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_GET_SESS_CACHE_SIZE,0,NULL)
1428913ec974Sbeck #define SSL_CTX_set_session_cache_mode(ctx,m) \
1429913ec974Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_SET_SESS_CACHE_MODE,m,NULL)
1430913ec974Sbeck #define SSL_CTX_get_session_cache_mode(ctx) \
1431913ec974Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_GET_SESS_CACHE_MODE,0,NULL)
1432913ec974Sbeck 
1433913ec974Sbeck #define SSL_CTX_get_default_read_ahead(ctx) SSL_CTX_get_read_ahead(ctx)
1434913ec974Sbeck #define SSL_CTX_set_default_read_ahead(ctx,m) SSL_CTX_set_read_ahead(ctx,m)
1435913ec974Sbeck #define SSL_CTX_get_read_ahead(ctx) \
1436913ec974Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_GET_READ_AHEAD,0,NULL)
1437913ec974Sbeck #define SSL_CTX_set_read_ahead(ctx,m) \
1438ce6fc090Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_SET_READ_AHEAD,m,NULL)
1439da347917Sbeck #define SSL_CTX_get_max_cert_list(ctx) \
1440da347917Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_GET_MAX_CERT_LIST,0,NULL)
1441da347917Sbeck #define SSL_CTX_set_max_cert_list(ctx,m) \
1442da347917Sbeck 	SSL_CTX_ctrl(ctx,SSL_CTRL_SET_MAX_CERT_LIST,m,NULL)
1443da347917Sbeck #define SSL_get_max_cert_list(ssl) \
1444da347917Sbeck 	SSL_ctrl(ssl,SSL_CTRL_GET_MAX_CERT_LIST,0,NULL)
1445da347917Sbeck #define SSL_set_max_cert_list(ssl,m) \
1446da347917Sbeck 	SSL_ctrl(ssl,SSL_CTRL_SET_MAX_CERT_LIST,m,NULL)
1447913ec974Sbeck 
14480a5d6edeSdjm #define SSL_CTX_set_max_send_fragment(ctx,m) \
14490a5d6edeSdjm 	SSL_CTX_ctrl(ctx,SSL_CTRL_SET_MAX_SEND_FRAGMENT,m,NULL)
14500a5d6edeSdjm #define SSL_set_max_send_fragment(ssl,m) \
14510a5d6edeSdjm 	SSL_ctrl(ssl,SSL_CTRL_SET_MAX_SEND_FRAGMENT,m,NULL)
14520a5d6edeSdjm 
1453913ec974Sbeck /* NB: the keylength is only applicable when is_export is true */
1454913ec974Sbeck void SSL_CTX_set_tmp_rsa_callback(SSL_CTX *ctx,
1455d6d77668Sjsing     RSA *(*cb)(SSL *ssl, int is_export, int keylength));
1456913ec974Sbeck 
1457913ec974Sbeck void SSL_set_tmp_rsa_callback(SSL *ssl,
1458d6d77668Sjsing     RSA *(*cb)(SSL *ssl, int is_export, int keylength));
1459913ec974Sbeck void SSL_CTX_set_tmp_dh_callback(SSL_CTX *ctx,
1460d6d77668Sjsing     DH *(*dh)(SSL *ssl, int is_export, int keylength));
1461913ec974Sbeck void SSL_set_tmp_dh_callback(SSL *ssl,
1462d6d77668Sjsing     DH *(*dh)(SSL *ssl, int is_export, int keylength));
14634fcf65c5Sdjm void SSL_CTX_set_tmp_ecdh_callback(SSL_CTX *ctx,
1464d6d77668Sjsing     EC_KEY *(*ecdh)(SSL *ssl, int is_export, int keylength));
14654fcf65c5Sdjm void SSL_set_tmp_ecdh_callback(SSL *ssl,
1466d6d77668Sjsing     EC_KEY *(*ecdh)(SSL *ssl, int is_export, int keylength));
1467913ec974Sbeck 
1468d4fca8d7Sjsing size_t SSL_get_client_random(const SSL *s, unsigned char *out, size_t max_out);
1469d4fca8d7Sjsing size_t SSL_get_server_random(const SSL *s, unsigned char *out, size_t max_out);
1470d4fca8d7Sjsing 
14715caf3b5aSjsing const void *SSL_get_current_compression(SSL *s);
14725caf3b5aSjsing const void *SSL_get_current_expansion(SSL *s);
14735caf3b5aSjsing 
14745caf3b5aSjsing const char *SSL_COMP_get_name(const void *comp);
14755caf3b5aSjsing void *SSL_COMP_get_compression_methods(void);
14765caf3b5aSjsing 
14770a5d6edeSdjm /* TLS extensions functions */
14780a5d6edeSdjm int SSL_set_session_ticket_ext(SSL *s, void *ext_data, int ext_len);
14790a5d6edeSdjm 
1480d6d77668Sjsing int SSL_set_session_ticket_ext_cb(SSL *s,
1481d6d77668Sjsing     tls_session_ticket_ext_cb_fn cb, void *arg);
14820a5d6edeSdjm 
14830a5d6edeSdjm /* Pre-shared secret session resumption functions */
1484d6d77668Sjsing int SSL_set_session_secret_cb(SSL *s,
1485d6d77668Sjsing     tls_session_secret_cb_fn tls_session_secret_cb, void *arg);
14860a5d6edeSdjm 
14875cdd308eSdjm int SSL_cache_hit(SSL *s);
14885cdd308eSdjm 
148963d2e891Stb /* What the "other" parameter contains in security callback */
149063d2e891Stb /* Mask for type */
149163d2e891Stb #define SSL_SECOP_OTHER_TYPE		0xffff0000
149263d2e891Stb #define SSL_SECOP_OTHER_NONE		0
149363d2e891Stb #define SSL_SECOP_OTHER_CIPHER		(1 << 16)
149463d2e891Stb #define SSL_SECOP_OTHER_CURVE		(2 << 16)
149563d2e891Stb #define SSL_SECOP_OTHER_DH		(3 << 16)
149663d2e891Stb #define SSL_SECOP_OTHER_PKEY		(4 << 16)
149763d2e891Stb #define SSL_SECOP_OTHER_SIGALG		(5 << 16)
149863d2e891Stb #define SSL_SECOP_OTHER_CERT		(6 << 16)
149963d2e891Stb 
150063d2e891Stb /* Indicated operation refers to peer key or certificate */
150163d2e891Stb #define SSL_SECOP_PEER			0x1000
150263d2e891Stb 
150363d2e891Stb /* Values for "op" parameter in security callback */
150463d2e891Stb 
150563d2e891Stb /* Called to filter ciphers */
150663d2e891Stb /* Ciphers client supports */
150763d2e891Stb #define SSL_SECOP_CIPHER_SUPPORTED	(1 | SSL_SECOP_OTHER_CIPHER)
150863d2e891Stb /* Cipher shared by client/server */
150963d2e891Stb #define SSL_SECOP_CIPHER_SHARED		(2 | SSL_SECOP_OTHER_CIPHER)
151063d2e891Stb /* Sanity check of cipher server selects */
151163d2e891Stb #define SSL_SECOP_CIPHER_CHECK		(3 | SSL_SECOP_OTHER_CIPHER)
151263d2e891Stb /* Curves supported by client */
151363d2e891Stb #define SSL_SECOP_CURVE_SUPPORTED	(4 | SSL_SECOP_OTHER_CURVE)
151463d2e891Stb /* Curves shared by client/server */
151563d2e891Stb #define SSL_SECOP_CURVE_SHARED		(5 | SSL_SECOP_OTHER_CURVE)
151663d2e891Stb /* Sanity check of curve server selects */
151763d2e891Stb #define SSL_SECOP_CURVE_CHECK		(6 | SSL_SECOP_OTHER_CURVE)
151863d2e891Stb /* Temporary DH key */
151963d2e891Stb /*
152063d2e891Stb  * XXX: changed in OpenSSL e2b420fdd70 to (7 | SSL_SECOP_OTHER_PKEY)
152163d2e891Stb  * Needs switching internal use of DH to EVP_PKEY. The code is not reachable
152263d2e891Stb  * from outside the library as long as we do not expose the callback in the API.
152363d2e891Stb  */
152463d2e891Stb #define SSL_SECOP_TMP_DH		(7 | SSL_SECOP_OTHER_DH)
152563d2e891Stb /* SSL/TLS version */
152663d2e891Stb #define SSL_SECOP_VERSION		(9 | SSL_SECOP_OTHER_NONE)
152763d2e891Stb /* Session tickets */
152863d2e891Stb #define SSL_SECOP_TICKET		(10 | SSL_SECOP_OTHER_NONE)
152963d2e891Stb /* Supported signature algorithms sent to peer */
153063d2e891Stb #define SSL_SECOP_SIGALG_SUPPORTED	(11 | SSL_SECOP_OTHER_SIGALG)
153163d2e891Stb /* Shared signature algorithm */
153263d2e891Stb #define SSL_SECOP_SIGALG_SHARED		(12 | SSL_SECOP_OTHER_SIGALG)
153363d2e891Stb /* Sanity check signature algorithm allowed */
153463d2e891Stb #define SSL_SECOP_SIGALG_CHECK		(13 | SSL_SECOP_OTHER_SIGALG)
153563d2e891Stb /* Used to get mask of supported public key signature algorithms */
153663d2e891Stb #define SSL_SECOP_SIGALG_MASK		(14 | SSL_SECOP_OTHER_SIGALG)
153763d2e891Stb /* Use to see if compression is allowed */
153863d2e891Stb #define SSL_SECOP_COMPRESSION		(15 | SSL_SECOP_OTHER_NONE)
153963d2e891Stb /* EE key in certificate */
154063d2e891Stb #define SSL_SECOP_EE_KEY		(16 | SSL_SECOP_OTHER_CERT)
154163d2e891Stb /* CA key in certificate */
154263d2e891Stb #define SSL_SECOP_CA_KEY		(17 | SSL_SECOP_OTHER_CERT)
154363d2e891Stb /* CA digest algorithm in certificate */
154463d2e891Stb #define SSL_SECOP_CA_MD			(18 | SSL_SECOP_OTHER_CERT)
154563d2e891Stb /* Peer EE key in certificate */
154663d2e891Stb #define SSL_SECOP_PEER_EE_KEY		(SSL_SECOP_EE_KEY | SSL_SECOP_PEER)
154763d2e891Stb /* Peer CA key in certificate */
154863d2e891Stb #define SSL_SECOP_PEER_CA_KEY		(SSL_SECOP_CA_KEY | SSL_SECOP_PEER)
154963d2e891Stb /* Peer CA digest algorithm in certificate */
155063d2e891Stb #define SSL_SECOP_PEER_CA_MD		(SSL_SECOP_CA_MD | SSL_SECOP_PEER)
155163d2e891Stb 
155263d2e891Stb void SSL_set_security_level(SSL *ssl, int level);
155363d2e891Stb int SSL_get_security_level(const SSL *ssl);
155463d2e891Stb 
155563d2e891Stb void SSL_CTX_set_security_level(SSL_CTX *ctx, int level);
155663d2e891Stb int SSL_CTX_get_security_level(const SSL_CTX *ctx);
155763d2e891Stb 
1558a3da52a5Sjsing #if defined(LIBRESSL_HAS_QUIC) || defined(LIBRESSL_INTERNAL)
15596ea83a9dSjsing /*
15607ef96453Sjsing  * QUIC integration.
15617ef96453Sjsing  *
15627ef96453Sjsing  * QUIC acts as an underlying transport for the TLS 1.3 handshake. The following
15637ef96453Sjsing  * functions allow a QUIC implementation to serve as the underlying transport as
15647ef96453Sjsing  * described in RFC 9001.
15657ef96453Sjsing  *
15667ef96453Sjsing  * When configured for QUIC, |SSL_do_handshake| will drive the handshake as
15677ef96453Sjsing  * before, but it will not use the configured |BIO|. It will call functions on
15687ef96453Sjsing  * |SSL_QUIC_METHOD| to configure secrets and send data. If data is needed from
15697ef96453Sjsing  * the peer, it will return |SSL_ERROR_WANT_READ|. As the caller receives data
15707ef96453Sjsing  * it can decrypt, it calls |SSL_provide_quic_data|. Subsequent
15717ef96453Sjsing  * |SSL_do_handshake| calls will then consume that data and progress the
15727ef96453Sjsing  * handshake. After the handshake is complete, the caller should continue to
15737ef96453Sjsing  * call |SSL_provide_quic_data| for any post-handshake data, followed by
15747ef96453Sjsing  * |SSL_process_quic_post_handshake| to process it. It is an error to call
15757ef96453Sjsing  * |SSL_peek|, |SSL_read| and |SSL_write| in QUIC.
15767ef96453Sjsing  *
15777ef96453Sjsing  * To avoid DoS attacks, the QUIC implementation must limit the amount of data
15787ef96453Sjsing  * being queued up. The implementation can call
15797ef96453Sjsing  * |SSL_quic_max_handshake_flight_len| to get the maximum buffer length at each
15807ef96453Sjsing  * encryption level.
15817ef96453Sjsing  *
15827ef96453Sjsing  * QUIC implementations must additionally configure transport parameters with
15837ef96453Sjsing  * |SSL_set_quic_transport_params|. |SSL_get_peer_quic_transport_params| may be
15847ef96453Sjsing  * used to query the value received from the peer. This extension is handled
15857ef96453Sjsing  * as an opaque byte string, which the caller is responsible for serializing
15867ef96453Sjsing  * and parsing. See RFC 9000 section 7.4 for further details.
15877ef96453Sjsing  */
15887ef96453Sjsing 
15897ef96453Sjsing /*
15906ea83a9dSjsing  * ssl_encryption_level_t specifies the QUIC encryption level used to transmit
15916ea83a9dSjsing  * handshake messages.
15926ea83a9dSjsing  */
15936ea83a9dSjsing typedef enum ssl_encryption_level_t {
15946ea83a9dSjsing 	ssl_encryption_initial = 0,
15956ea83a9dSjsing 	ssl_encryption_early_data,
15966ea83a9dSjsing 	ssl_encryption_handshake,
15976ea83a9dSjsing 	ssl_encryption_application,
15986ea83a9dSjsing } OSSL_ENCRYPTION_LEVEL;
15996ea83a9dSjsing 
16007ef96453Sjsing /*
16017ef96453Sjsing  * ssl_quic_method_st (aka |SSL_QUIC_METHOD|) describes custom QUIC hooks.
16027ef96453Sjsing  *
16037ef96453Sjsing  * Note that we provide both the new (BoringSSL) secrets interface
16047ef96453Sjsing  * (set_read_secret/set_write_secret) along with the old interface
16057ef96453Sjsing  * (set_encryption_secrets), which quictls is still using.
16067ef96453Sjsing  *
16077ef96453Sjsing  * Since some consumers fail to use named initialisers, the order of these
16087ef96453Sjsing  * functions is important. Hopefully all of these consumers use the old version.
16097ef96453Sjsing  */
16107ef96453Sjsing struct ssl_quic_method_st {
16117ef96453Sjsing 	/*
16127ef96453Sjsing 	 * set_encryption_secrets configures the read and write secrets for the
16137ef96453Sjsing 	 * given encryption level. This function will always be called before an
16147ef96453Sjsing 	 * encryption level other than |ssl_encryption_initial| is used.
16157ef96453Sjsing 	 *
16167ef96453Sjsing 	 * When reading packets at a given level, the QUIC implementation must
16177ef96453Sjsing 	 * send ACKs at the same level, so this function provides read and write
16187ef96453Sjsing 	 * secrets together. The exception is |ssl_encryption_early_data|, where
16197ef96453Sjsing 	 * secrets are only available in the client to server direction. The
16207ef96453Sjsing 	 * other secret will be NULL. The server acknowledges such data at
16217ef96453Sjsing 	 * |ssl_encryption_application|, which will be configured in the same
16227ef96453Sjsing 	 * |SSL_do_handshake| call.
16237ef96453Sjsing 	 *
16247ef96453Sjsing 	 * This function should use |SSL_get_current_cipher| to determine the TLS
16257ef96453Sjsing 	 * cipher suite.
16267ef96453Sjsing 	 */
16277ef96453Sjsing 	int (*set_encryption_secrets)(SSL *ssl, enum ssl_encryption_level_t level,
16287ef96453Sjsing 	    const uint8_t *read_secret, const uint8_t *write_secret,
16297ef96453Sjsing 	    size_t secret_len);
16307ef96453Sjsing 
16317ef96453Sjsing 	/*
16327ef96453Sjsing 	 * add_handshake_data adds handshake data to the current flight at the
16337ef96453Sjsing 	 * given encryption level. It returns one on success and zero on error.
16347ef96453Sjsing 	 * Callers should defer writing data to the network until |flush_flight|
16357ef96453Sjsing 	 * to better pack QUIC packets into transport datagrams.
16367ef96453Sjsing 	 *
16377ef96453Sjsing 	 * If |level| is not |ssl_encryption_initial|, this function will not be
16387ef96453Sjsing 	 * called before |level| is initialized with |set_write_secret|.
16397ef96453Sjsing 	 */
16407ef96453Sjsing 	int (*add_handshake_data)(SSL *ssl, enum ssl_encryption_level_t level,
16417ef96453Sjsing 	    const uint8_t *data, size_t len);
16427ef96453Sjsing 
16437ef96453Sjsing 	/*
16447ef96453Sjsing 	 * flush_flight is called when the current flight is complete and should
16457ef96453Sjsing 	 * be written to the transport. Note a flight may contain data at
16467ef96453Sjsing 	 * several encryption levels. It returns one on success and zero on
16477ef96453Sjsing 	 * error.
16487ef96453Sjsing 	 */
16497ef96453Sjsing 	int (*flush_flight)(SSL *ssl);
16507ef96453Sjsing 
16517ef96453Sjsing 	/*
16527ef96453Sjsing 	 * send_alert sends a fatal alert at the specified encryption level. It
16537ef96453Sjsing 	 * returns one on success and zero on error.
16547ef96453Sjsing 	 *
16557ef96453Sjsing 	 * If |level| is not |ssl_encryption_initial|, this function will not be
16567ef96453Sjsing 	 * called before |level| is initialized with |set_write_secret|.
16577ef96453Sjsing 	 */
16587ef96453Sjsing 	int (*send_alert)(SSL *ssl, enum ssl_encryption_level_t level,
16597ef96453Sjsing 	    uint8_t alert);
16607ef96453Sjsing 
16617ef96453Sjsing 	/*
16627ef96453Sjsing 	 * set_read_secret configures the read secret and cipher suite for the
16637ef96453Sjsing 	 * given encryption level. It returns one on success and zero to
16647ef96453Sjsing 	 * terminate the handshake with an error. It will be called at most once
16657ef96453Sjsing 	 * per encryption level.
16667ef96453Sjsing 	 *
16677ef96453Sjsing 	 * Read keys will not be released before QUIC may use them. Once a level
16687ef96453Sjsing 	 * has been initialized, QUIC may begin processing data from it.
16697ef96453Sjsing 	 * Handshake data should be passed to |SSL_provide_quic_data| and
16707ef96453Sjsing 	 * application data (if |level| is |ssl_encryption_early_data| or
16717ef96453Sjsing 	 * |ssl_encryption_application|) may be processed according to the rules
16727ef96453Sjsing 	 * of the QUIC protocol.
16737ef96453Sjsing 	 */
16747ef96453Sjsing 	int (*set_read_secret)(SSL *ssl, enum ssl_encryption_level_t level,
16757ef96453Sjsing 	    const SSL_CIPHER *cipher, const uint8_t *secret, size_t secret_len);
16767ef96453Sjsing 
16777ef96453Sjsing 	/*
16787ef96453Sjsing 	 * set_write_secret behaves like |set_read_secret| but configures the
16797ef96453Sjsing 	 * write secret and cipher suite for the given encryption level. It will
16807ef96453Sjsing 	 * be called at most once per encryption level.
16817ef96453Sjsing 	 *
16827ef96453Sjsing 	 * Write keys will not be released before QUIC may use them. If |level|
16837ef96453Sjsing 	 * is |ssl_encryption_early_data| or |ssl_encryption_application|, QUIC
16847ef96453Sjsing 	 * may begin sending application data at |level|.
16857ef96453Sjsing 	 */
16867ef96453Sjsing 	int (*set_write_secret)(SSL *ssl, enum ssl_encryption_level_t level,
16877ef96453Sjsing 	    const SSL_CIPHER *cipher, const uint8_t *secret, size_t secret_len);
16887ef96453Sjsing };
16897ef96453Sjsing 
16907ef96453Sjsing /*
16917ef96453Sjsing  * SSL_CTX_set_quic_method configures the QUIC hooks. This should only be
16927ef96453Sjsing  * configured with a minimum version of TLS 1.3. |quic_method| must remain valid
16937ef96453Sjsing  * for the lifetime of |ctx|. It returns one on success and zero on error.
16947ef96453Sjsing  */
16957ef96453Sjsing int SSL_CTX_set_quic_method(SSL_CTX *ctx, const SSL_QUIC_METHOD *quic_method);
16967ef96453Sjsing 
16977ef96453Sjsing /*
16987ef96453Sjsing  * SSL_set_quic_method configures the QUIC hooks. This should only be
16997ef96453Sjsing  * configured with a minimum version of TLS 1.3. |quic_method| must remain valid
17007ef96453Sjsing  * for the lifetime of |ssl|. It returns one on success and zero on error.
17017ef96453Sjsing  */
17027ef96453Sjsing int SSL_set_quic_method(SSL *ssl, const SSL_QUIC_METHOD *quic_method);
17037ef96453Sjsing 
17047ef96453Sjsing /* SSL_is_quic returns true if an SSL has been configured for use with QUIC. */
1705a3da52a5Sjsing int SSL_is_quic(const SSL *ssl);
1706a3da52a5Sjsing 
17078385bbf8Sbeck /*
1708af994640Sjsing  * SSL_quic_max_handshake_flight_len returns returns the maximum number of bytes
1709af994640Sjsing  * that may be received at the given encryption level. This function should be
1710af994640Sjsing  * used to limit buffering in the QUIC implementation. See RFC 9000 section 7.5.
1711af994640Sjsing  */
1712af994640Sjsing size_t SSL_quic_max_handshake_flight_len(const SSL *ssl,
1713af994640Sjsing     enum ssl_encryption_level_t level);
1714af994640Sjsing 
1715af994640Sjsing /*
1716af994640Sjsing  * SSL_quic_read_level returns the current read encryption level.
1717af994640Sjsing  */
1718af994640Sjsing enum ssl_encryption_level_t SSL_quic_read_level(const SSL *ssl);
1719af994640Sjsing 
1720af994640Sjsing /*
1721af994640Sjsing  * SSL_quic_write_level returns the current write encryption level.
1722af994640Sjsing  */
1723af994640Sjsing enum ssl_encryption_level_t SSL_quic_write_level(const SSL *ssl);
1724af994640Sjsing 
1725af994640Sjsing /*
1726af994640Sjsing  * SSL_provide_quic_data provides data from QUIC at a particular encryption
1727af994640Sjsing  * level |level|. It returns one on success and zero on error. Note this
1728af994640Sjsing  * function will return zero if the handshake is not expecting data from |level|
1729af994640Sjsing  * at this time. The QUIC implementation should then close the connection with
1730af994640Sjsing  * an error.
1731af994640Sjsing  */
1732af994640Sjsing int SSL_provide_quic_data(SSL *ssl, enum ssl_encryption_level_t level,
1733af994640Sjsing     const uint8_t *data, size_t len);
1734af994640Sjsing 
1735af994640Sjsing /*
1736af994640Sjsing  * SSL_process_quic_post_handshake processes any data that QUIC has provided
1737af994640Sjsing  * after the handshake has completed. This includes NewSessionTicket messages
1738af994640Sjsing  * sent by the server. It returns one on success and zero on error.
1739af994640Sjsing  */
1740af994640Sjsing int SSL_process_quic_post_handshake(SSL *ssl);
1741af994640Sjsing 
1742af994640Sjsing /*
17438385bbf8Sbeck  * SSL_set_quic_transport_params configures |ssl| to send |params| (of length
17448385bbf8Sbeck  * |params_len|) in the quic_transport_parameters extension in either the
17457ef96453Sjsing  * ClientHello or EncryptedExtensions handshake message. It is an error to set
17467ef96453Sjsing  * transport parameters if |ssl| is not configured for QUIC. The buffer pointed
17477ef96453Sjsing  * to by |params| only need be valid for the duration of the call to this
17487ef96453Sjsing  * function. This function returns 1 on success and 0 on failure.
17498385bbf8Sbeck  */
17508385bbf8Sbeck int SSL_set_quic_transport_params(SSL *ssl, const uint8_t *params,
17518385bbf8Sbeck     size_t params_len);
17528385bbf8Sbeck 
17538385bbf8Sbeck /*
17548385bbf8Sbeck  * SSL_get_peer_quic_transport_params provides the caller with the value of the
17558385bbf8Sbeck  * quic_transport_parameters extension sent by the peer. A pointer to the buffer
17568385bbf8Sbeck  * containing the TransportParameters will be put in |*out_params|, and its
17578385bbf8Sbeck  * length in |*params_len|. This buffer will be valid for the lifetime of the
17588385bbf8Sbeck  * |SSL|. If no params were received from the peer, |*out_params_len| will be 0.
17598385bbf8Sbeck  */
17608385bbf8Sbeck void SSL_get_peer_quic_transport_params(const SSL *ssl,
17618385bbf8Sbeck     const uint8_t **out_params, size_t *out_params_len);
17627ef96453Sjsing 
1763af994640Sjsing /*
1764af994640Sjsing  * SSL_set_quic_use_legacy_codepoint configures whether to use the legacy QUIC
1765af994640Sjsing  * extension codepoint 0xffa5 as opposed to the official value 57. This is
1766af994640Sjsing  * unsupported in LibreSSL.
1767af994640Sjsing  */
1768af994640Sjsing void SSL_set_quic_use_legacy_codepoint(SSL *ssl, int use_legacy);
1769af994640Sjsing 
17708385bbf8Sbeck #endif
17718385bbf8Sbeck 
1772ce6fc090Sbeck void ERR_load_SSL_strings(void);
1773913ec974Sbeck 
17745b37fcf3Sryker /* Error codes for the SSL functions. */
17755b37fcf3Sryker 
17765b37fcf3Sryker /* Function codes. */
17775b37fcf3Sryker #define SSL_F_CLIENT_CERTIFICATE			 100
17784fcf65c5Sdjm #define SSL_F_CLIENT_FINISHED				 167
17795b37fcf3Sryker #define SSL_F_CLIENT_HELLO				 101
17805b37fcf3Sryker #define SSL_F_CLIENT_MASTER_KEY				 102
17815b37fcf3Sryker #define SSL_F_D2I_SSL_SESSION				 103
17824fcf65c5Sdjm #define SSL_F_DO_DTLS1_WRITE				 245
17835b37fcf3Sryker #define SSL_F_DO_SSL3_WRITE				 104
17844fcf65c5Sdjm #define SSL_F_DTLS1_ACCEPT				 246
17850a5d6edeSdjm #define SSL_F_DTLS1_ADD_CERT_TO_BUF			 295
17864fcf65c5Sdjm #define SSL_F_DTLS1_BUFFER_RECORD			 247
17875cdd308eSdjm #define SSL_F_DTLS1_CHECK_TIMEOUT_NUM			 316
17884fcf65c5Sdjm #define SSL_F_DTLS1_CLIENT_HELLO			 248
17894fcf65c5Sdjm #define SSL_F_DTLS1_CONNECT				 249
17904fcf65c5Sdjm #define SSL_F_DTLS1_ENC					 250
17914fcf65c5Sdjm #define SSL_F_DTLS1_GET_HELLO_VERIFY			 251
17924fcf65c5Sdjm #define SSL_F_DTLS1_GET_MESSAGE				 252
17934fcf65c5Sdjm #define SSL_F_DTLS1_GET_MESSAGE_FRAGMENT		 253
17944fcf65c5Sdjm #define SSL_F_DTLS1_GET_RECORD				 254
17950a5d6edeSdjm #define SSL_F_DTLS1_HANDLE_TIMEOUT			 297
17965cdd308eSdjm #define SSL_F_DTLS1_HEARTBEAT				 305
17974fcf65c5Sdjm #define SSL_F_DTLS1_OUTPUT_CERT_CHAIN			 255
17980a5d6edeSdjm #define SSL_F_DTLS1_PREPROCESS_FRAGMENT			 288
17994fcf65c5Sdjm #define SSL_F_DTLS1_PROCESS_OUT_OF_SEQ_MESSAGE		 256
18004fcf65c5Sdjm #define SSL_F_DTLS1_PROCESS_RECORD			 257
18014fcf65c5Sdjm #define SSL_F_DTLS1_READ_BYTES				 258
18024fcf65c5Sdjm #define SSL_F_DTLS1_READ_FAILED				 259
18034fcf65c5Sdjm #define SSL_F_DTLS1_SEND_CERTIFICATE_REQUEST		 260
18044fcf65c5Sdjm #define SSL_F_DTLS1_SEND_CLIENT_CERTIFICATE		 261
18054fcf65c5Sdjm #define SSL_F_DTLS1_SEND_CLIENT_KEY_EXCHANGE		 262
18064fcf65c5Sdjm #define SSL_F_DTLS1_SEND_CLIENT_VERIFY			 263
18074fcf65c5Sdjm #define SSL_F_DTLS1_SEND_HELLO_VERIFY_REQUEST		 264
18084fcf65c5Sdjm #define SSL_F_DTLS1_SEND_SERVER_CERTIFICATE		 265
18094fcf65c5Sdjm #define SSL_F_DTLS1_SEND_SERVER_HELLO			 266
18104fcf65c5Sdjm #define SSL_F_DTLS1_SEND_SERVER_KEY_EXCHANGE		 267
18114fcf65c5Sdjm #define SSL_F_DTLS1_WRITE_APP_DATA_BYTES		 268
18125b37fcf3Sryker #define SSL_F_GET_CLIENT_FINISHED			 105
18135b37fcf3Sryker #define SSL_F_GET_CLIENT_HELLO				 106
18145b37fcf3Sryker #define SSL_F_GET_CLIENT_MASTER_KEY			 107
18155b37fcf3Sryker #define SSL_F_GET_SERVER_FINISHED			 108
18165b37fcf3Sryker #define SSL_F_GET_SERVER_HELLO				 109
18175b37fcf3Sryker #define SSL_F_GET_SERVER_VERIFY				 110
18185b37fcf3Sryker #define SSL_F_I2D_SSL_SESSION				 111
18195b37fcf3Sryker #define SSL_F_READ_N					 112
18205b37fcf3Sryker #define SSL_F_REQUEST_CERTIFICATE			 113
1821cf5de1f6Smarkus #define SSL_F_SERVER_FINISH				 239
18225b37fcf3Sryker #define SSL_F_SERVER_HELLO				 114
1823cf5de1f6Smarkus #define SSL_F_SERVER_VERIFY				 240
18245b37fcf3Sryker #define SSL_F_SSL23_ACCEPT				 115
18255b37fcf3Sryker #define SSL_F_SSL23_CLIENT_HELLO			 116
18265b37fcf3Sryker #define SSL_F_SSL23_CONNECT				 117
18275b37fcf3Sryker #define SSL_F_SSL23_GET_CLIENT_HELLO			 118
18285b37fcf3Sryker #define SSL_F_SSL23_GET_SERVER_HELLO			 119
1829ce6fc090Sbeck #define SSL_F_SSL23_PEEK				 237
18305b37fcf3Sryker #define SSL_F_SSL23_READ				 120
18315b37fcf3Sryker #define SSL_F_SSL23_WRITE				 121
18325b37fcf3Sryker #define SSL_F_SSL2_ACCEPT				 122
18335b37fcf3Sryker #define SSL_F_SSL2_CONNECT				 123
18345b37fcf3Sryker #define SSL_F_SSL2_ENC_INIT				 124
1835cf5de1f6Smarkus #define SSL_F_SSL2_GENERATE_KEY_MATERIAL		 241
1836ce6fc090Sbeck #define SSL_F_SSL2_PEEK					 234
18375b37fcf3Sryker #define SSL_F_SSL2_READ					 125
1838ce6fc090Sbeck #define SSL_F_SSL2_READ_INTERNAL			 236
18395b37fcf3Sryker #define SSL_F_SSL2_SET_CERTIFICATE			 126
18405b37fcf3Sryker #define SSL_F_SSL2_WRITE				 127
18415b37fcf3Sryker #define SSL_F_SSL3_ACCEPT				 128
18420a5d6edeSdjm #define SSL_F_SSL3_ADD_CERT_TO_BUF			 296
1843f6e3f262Sbeck #define SSL_F_SSL3_CALLBACK_CTRL			 233
18445b37fcf3Sryker #define SSL_F_SSL3_CHANGE_CIPHER_STATE			 129
18455b37fcf3Sryker #define SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM		 130
184617150393Sdjm #define SSL_F_SSL3_CHECK_CLIENT_HELLO			 304
18475b37fcf3Sryker #define SSL_F_SSL3_CLIENT_HELLO				 131
18485b37fcf3Sryker #define SSL_F_SSL3_CONNECT				 132
1849913ec974Sbeck #define SSL_F_SSL3_CTRL					 213
18505b37fcf3Sryker #define SSL_F_SSL3_CTX_CTRL				 133
18510a5d6edeSdjm #define SSL_F_SSL3_DIGEST_CACHED_RECORDS		 293
18520a5d6edeSdjm #define SSL_F_SSL3_DO_CHANGE_CIPHER_SPEC		 292
18535b37fcf3Sryker #define SSL_F_SSL3_ENC					 134
1854da347917Sbeck #define SSL_F_SSL3_GENERATE_KEY_BLOCK			 238
18555b37fcf3Sryker #define SSL_F_SSL3_GET_CERTIFICATE_REQUEST		 135
18560a5d6edeSdjm #define SSL_F_SSL3_GET_CERT_STATUS			 289
18575b37fcf3Sryker #define SSL_F_SSL3_GET_CERT_VERIFY			 136
18585b37fcf3Sryker #define SSL_F_SSL3_GET_CLIENT_CERTIFICATE		 137
18595b37fcf3Sryker #define SSL_F_SSL3_GET_CLIENT_HELLO			 138
18605b37fcf3Sryker #define SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE		 139
18615b37fcf3Sryker #define SSL_F_SSL3_GET_FINISHED				 140
18625b37fcf3Sryker #define SSL_F_SSL3_GET_KEY_EXCHANGE			 141
18635b37fcf3Sryker #define SSL_F_SSL3_GET_MESSAGE				 142
18644fcf65c5Sdjm #define SSL_F_SSL3_GET_NEW_SESSION_TICKET		 283
18655cdd308eSdjm #define SSL_F_SSL3_GET_NEXT_PROTO			 306
18665b37fcf3Sryker #define SSL_F_SSL3_GET_RECORD				 143
18675b37fcf3Sryker #define SSL_F_SSL3_GET_SERVER_CERTIFICATE		 144
18685b37fcf3Sryker #define SSL_F_SSL3_GET_SERVER_DONE			 145
18695b37fcf3Sryker #define SSL_F_SSL3_GET_SERVER_HELLO			 146
18700a5d6edeSdjm #define SSL_F_SSL3_HANDSHAKE_MAC			 285
18710a5d6edeSdjm #define SSL_F_SSL3_NEW_SESSION_TICKET			 287
18725b37fcf3Sryker #define SSL_F_SSL3_OUTPUT_CERT_CHAIN			 147
1873ce6fc090Sbeck #define SSL_F_SSL3_PEEK					 235
18745b37fcf3Sryker #define SSL_F_SSL3_READ_BYTES				 148
18755b37fcf3Sryker #define SSL_F_SSL3_READ_N				 149
18765b37fcf3Sryker #define SSL_F_SSL3_SEND_CERTIFICATE_REQUEST		 150
18775b37fcf3Sryker #define SSL_F_SSL3_SEND_CLIENT_CERTIFICATE		 151
18785b37fcf3Sryker #define SSL_F_SSL3_SEND_CLIENT_KEY_EXCHANGE		 152
18795b37fcf3Sryker #define SSL_F_SSL3_SEND_CLIENT_VERIFY			 153
18805b37fcf3Sryker #define SSL_F_SSL3_SEND_SERVER_CERTIFICATE		 154
1881cf5de1f6Smarkus #define SSL_F_SSL3_SEND_SERVER_HELLO			 242
18825b37fcf3Sryker #define SSL_F_SSL3_SEND_SERVER_KEY_EXCHANGE		 155
18835b37fcf3Sryker #define SSL_F_SSL3_SETUP_KEY_BLOCK			 157
18840a5d6edeSdjm #define SSL_F_SSL3_SETUP_READ_BUFFER			 156
18850a5d6edeSdjm #define SSL_F_SSL3_SETUP_WRITE_BUFFER			 291
18865b37fcf3Sryker #define SSL_F_SSL3_WRITE_BYTES				 158
18875b37fcf3Sryker #define SSL_F_SSL3_WRITE_PENDING			 159
18880a5d6edeSdjm #define SSL_F_SSL_ADD_CLIENTHELLO_RENEGOTIATE_EXT	 298
18890a5d6edeSdjm #define SSL_F_SSL_ADD_CLIENTHELLO_TLSEXT		 277
18905cdd308eSdjm #define SSL_F_SSL_ADD_CLIENTHELLO_USE_SRTP_EXT		 307
1891913ec974Sbeck #define SSL_F_SSL_ADD_DIR_CERT_SUBJECTS_TO_STACK	 215
1892913ec974Sbeck #define SSL_F_SSL_ADD_FILE_CERT_SUBJECTS_TO_STACK	 216
18930a5d6edeSdjm #define SSL_F_SSL_ADD_SERVERHELLO_RENEGOTIATE_EXT	 299
18940a5d6edeSdjm #define SSL_F_SSL_ADD_SERVERHELLO_TLSEXT		 278
18955cdd308eSdjm #define SSL_F_SSL_ADD_SERVERHELLO_USE_SRTP_EXT		 308
18965b37fcf3Sryker #define SSL_F_SSL_BAD_METHOD				 160
18975b37fcf3Sryker #define SSL_F_SSL_BYTES_TO_CIPHER_LIST			 161
1898913ec974Sbeck #define SSL_F_SSL_CERT_DUP				 221
1899913ec974Sbeck #define SSL_F_SSL_CERT_INST				 222
1900913ec974Sbeck #define SSL_F_SSL_CERT_INSTANTIATE			 214
19015b37fcf3Sryker #define SSL_F_SSL_CERT_NEW				 162
19025b37fcf3Sryker #define SSL_F_SSL_CHECK_PRIVATE_KEY			 163
19030a5d6edeSdjm #define SSL_F_SSL_CHECK_SERVERHELLO_TLSEXT		 280
19040a5d6edeSdjm #define SSL_F_SSL_CHECK_SRVR_ECC_CERT_AND_ALG		 279
1905ba5406e9Sbeck #define SSL_F_SSL_CIPHER_PROCESS_RULESTR		 230
1906ba5406e9Sbeck #define SSL_F_SSL_CIPHER_STRENGTH_SORT			 231
1907913ec974Sbeck #define SSL_F_SSL_CLEAR					 164
1908913ec974Sbeck #define SSL_F_SSL_COMP_ADD_COMPRESSION_METHOD		 165
1909913ec974Sbeck #define SSL_F_SSL_CREATE_CIPHER_LIST			 166
1910ba5406e9Sbeck #define SSL_F_SSL_CTRL					 232
1911913ec974Sbeck #define SSL_F_SSL_CTX_CHECK_PRIVATE_KEY			 168
19125cdd308eSdjm #define SSL_F_SSL_CTX_MAKE_PROFILES			 309
1913913ec974Sbeck #define SSL_F_SSL_CTX_NEW				 169
19146d388760Sdjm #define SSL_F_SSL_CTX_SET_CIPHER_LIST			 269
19150a5d6edeSdjm #define SSL_F_SSL_CTX_SET_CLIENT_CERT_ENGINE		 290
1916ba5406e9Sbeck #define SSL_F_SSL_CTX_SET_PURPOSE			 226
1917913ec974Sbeck #define SSL_F_SSL_CTX_SET_SESSION_ID_CONTEXT		 219
1918913ec974Sbeck #define SSL_F_SSL_CTX_SET_SSL_VERSION			 170
1919ba5406e9Sbeck #define SSL_F_SSL_CTX_SET_TRUST				 229
1920913ec974Sbeck #define SSL_F_SSL_CTX_USE_CERTIFICATE			 171
1921913ec974Sbeck #define SSL_F_SSL_CTX_USE_CERTIFICATE_ASN1		 172
1922913ec974Sbeck #define SSL_F_SSL_CTX_USE_CERTIFICATE_CHAIN_FILE	 220
1923913ec974Sbeck #define SSL_F_SSL_CTX_USE_CERTIFICATE_FILE		 173
1924913ec974Sbeck #define SSL_F_SSL_CTX_USE_PRIVATEKEY			 174
1925913ec974Sbeck #define SSL_F_SSL_CTX_USE_PRIVATEKEY_ASN1		 175
1926913ec974Sbeck #define SSL_F_SSL_CTX_USE_PRIVATEKEY_FILE		 176
19270a5d6edeSdjm #define SSL_F_SSL_CTX_USE_PSK_IDENTITY_HINT		 272
1928913ec974Sbeck #define SSL_F_SSL_CTX_USE_RSAPRIVATEKEY			 177
1929913ec974Sbeck #define SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_ASN1		 178
1930913ec974Sbeck #define SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_FILE		 179
1931913ec974Sbeck #define SSL_F_SSL_DO_HANDSHAKE				 180
1932913ec974Sbeck #define SSL_F_SSL_GET_NEW_SESSION			 181
1933913ec974Sbeck #define SSL_F_SSL_GET_PREV_SESSION			 217
1934913ec974Sbeck #define SSL_F_SSL_GET_SERVER_SEND_CERT			 182
193597222eddSmiod #define SSL_F_SSL_GET_SERVER_SEND_PKEY			 317
1936913ec974Sbeck #define SSL_F_SSL_GET_SIGN_PKEY				 183
1937913ec974Sbeck #define SSL_F_SSL_INIT_WBIO_BUFFER			 184
1938913ec974Sbeck #define SSL_F_SSL_LOAD_CLIENT_CA_FILE			 185
1939913ec974Sbeck #define SSL_F_SSL_NEW					 186
19400a5d6edeSdjm #define SSL_F_SSL_PARSE_CLIENTHELLO_RENEGOTIATE_EXT	 300
19410a5d6edeSdjm #define SSL_F_SSL_PARSE_CLIENTHELLO_TLSEXT		 302
19425cdd308eSdjm #define SSL_F_SSL_PARSE_CLIENTHELLO_USE_SRTP_EXT	 310
19430a5d6edeSdjm #define SSL_F_SSL_PARSE_SERVERHELLO_RENEGOTIATE_EXT	 301
19440a5d6edeSdjm #define SSL_F_SSL_PARSE_SERVERHELLO_TLSEXT		 303
19455cdd308eSdjm #define SSL_F_SSL_PARSE_SERVERHELLO_USE_SRTP_EXT	 311
19464fcf65c5Sdjm #define SSL_F_SSL_PEEK					 270
19470a5d6edeSdjm #define SSL_F_SSL_PREPARE_CLIENTHELLO_TLSEXT		 281
19480a5d6edeSdjm #define SSL_F_SSL_PREPARE_SERVERHELLO_TLSEXT		 282
1949913ec974Sbeck #define SSL_F_SSL_READ					 223
1950913ec974Sbeck #define SSL_F_SSL_RSA_PRIVATE_DECRYPT			 187
1951913ec974Sbeck #define SSL_F_SSL_RSA_PUBLIC_ENCRYPT			 188
1952913ec974Sbeck #define SSL_F_SSL_SESSION_NEW				 189
1953913ec974Sbeck #define SSL_F_SSL_SESSION_PRINT_FP			 190
19545cdd308eSdjm #define SSL_F_SSL_SESSION_SET1_ID_CONTEXT		 312
1955913ec974Sbeck #define SSL_F_SSL_SESS_CERT_NEW				 225
1956913ec974Sbeck #define SSL_F_SSL_SET_CERT				 191
19576d388760Sdjm #define SSL_F_SSL_SET_CIPHER_LIST			 271
1958913ec974Sbeck #define SSL_F_SSL_SET_FD				 192
1959913ec974Sbeck #define SSL_F_SSL_SET_PKEY				 193
1960ba5406e9Sbeck #define SSL_F_SSL_SET_PURPOSE				 227
1961913ec974Sbeck #define SSL_F_SSL_SET_RFD				 194
1962913ec974Sbeck #define SSL_F_SSL_SET_SESSION				 195
1963913ec974Sbeck #define SSL_F_SSL_SET_SESSION_ID_CONTEXT		 218
19640a5d6edeSdjm #define SSL_F_SSL_SET_SESSION_TICKET_EXT		 294
1965ba5406e9Sbeck #define SSL_F_SSL_SET_TRUST				 228
1966913ec974Sbeck #define SSL_F_SSL_SET_WFD				 196
1967913ec974Sbeck #define SSL_F_SSL_SHUTDOWN				 224
19685cdd308eSdjm #define SSL_F_SSL_SRP_CTX_INIT				 313
196940d8aef3Sdjm #define SSL_F_SSL_UNDEFINED_CONST_FUNCTION		 243
1970913ec974Sbeck #define SSL_F_SSL_UNDEFINED_FUNCTION			 197
19714fcf65c5Sdjm #define SSL_F_SSL_UNDEFINED_VOID_FUNCTION		 244
1972913ec974Sbeck #define SSL_F_SSL_USE_CERTIFICATE			 198
1973913ec974Sbeck #define SSL_F_SSL_USE_CERTIFICATE_ASN1			 199
1974913ec974Sbeck #define SSL_F_SSL_USE_CERTIFICATE_FILE			 200
1975913ec974Sbeck #define SSL_F_SSL_USE_PRIVATEKEY			 201
1976913ec974Sbeck #define SSL_F_SSL_USE_PRIVATEKEY_ASN1			 202
1977913ec974Sbeck #define SSL_F_SSL_USE_PRIVATEKEY_FILE			 203
19780a5d6edeSdjm #define SSL_F_SSL_USE_PSK_IDENTITY_HINT			 273
1979913ec974Sbeck #define SSL_F_SSL_USE_RSAPRIVATEKEY			 204
1980913ec974Sbeck #define SSL_F_SSL_USE_RSAPRIVATEKEY_ASN1		 205
1981913ec974Sbeck #define SSL_F_SSL_USE_RSAPRIVATEKEY_FILE		 206
1982913ec974Sbeck #define SSL_F_SSL_VERIFY_CERT_CHAIN			 207
1983913ec974Sbeck #define SSL_F_SSL_WRITE					 208
19842b8e1190Sjsing #define SSL_F_TLS1_AEAD_CTX_INIT			 339
19850a5d6edeSdjm #define SSL_F_TLS1_CERT_VERIFY_MAC			 286
1986913ec974Sbeck #define SSL_F_TLS1_CHANGE_CIPHER_STATE			 209
19872b8e1190Sjsing #define SSL_F_TLS1_CHANGE_CIPHER_STATE_AEAD		 340
19882b8e1190Sjsing #define SSL_F_TLS1_CHANGE_CIPHER_STATE_CIPHER		 338
19890a5d6edeSdjm #define SSL_F_TLS1_CHECK_SERVERHELLO_TLSEXT		 274
1990913ec974Sbeck #define SSL_F_TLS1_ENC					 210
19915cdd308eSdjm #define SSL_F_TLS1_EXPORT_KEYING_MATERIAL		 314
19925cdd308eSdjm #define SSL_F_TLS1_HEARTBEAT				 315
19930a5d6edeSdjm #define SSL_F_TLS1_PREPARE_CLIENTHELLO_TLSEXT		 275
19940a5d6edeSdjm #define SSL_F_TLS1_PREPARE_SERVERHELLO_TLSEXT		 276
19950a5d6edeSdjm #define SSL_F_TLS1_PRF					 284
1996913ec974Sbeck #define SSL_F_TLS1_SETUP_KEY_BLOCK			 211
1997913ec974Sbeck #define SSL_F_WRITE_PENDING				 212
19985b37fcf3Sryker 
19995b37fcf3Sryker /* Reason codes. */
20005b37fcf3Sryker #define SSL_R_APP_DATA_IN_HANDSHAKE			 100
2001913ec974Sbeck #define SSL_R_ATTEMPT_TO_REUSE_SESSION_IN_DIFFERENT_CONTEXT 272
20025b37fcf3Sryker #define SSL_R_BAD_ALERT_RECORD				 101
20035b37fcf3Sryker #define SSL_R_BAD_AUTHENTICATION_TYPE			 102
20045b37fcf3Sryker #define SSL_R_BAD_CHANGE_CIPHER_SPEC			 103
20055b37fcf3Sryker #define SSL_R_BAD_CHECKSUM				 104
20065b37fcf3Sryker #define SSL_R_BAD_DATA_RETURNED_BY_CALLBACK		 106
20075b37fcf3Sryker #define SSL_R_BAD_DECOMPRESSION				 107
20085b37fcf3Sryker #define SSL_R_BAD_DH_G_LENGTH				 108
20095b37fcf3Sryker #define SSL_R_BAD_DH_PUB_KEY_LENGTH			 109
20105b37fcf3Sryker #define SSL_R_BAD_DH_P_LENGTH				 110
20115b37fcf3Sryker #define SSL_R_BAD_DIGEST_LENGTH				 111
20125b37fcf3Sryker #define SSL_R_BAD_DSA_SIGNATURE				 112
20134fcf65c5Sdjm #define SSL_R_BAD_ECC_CERT				 304
20144fcf65c5Sdjm #define SSL_R_BAD_ECDSA_SIGNATURE			 305
20154fcf65c5Sdjm #define SSL_R_BAD_ECPOINT				 306
20160a5d6edeSdjm #define SSL_R_BAD_HANDSHAKE_LENGTH			 332
2017ba5406e9Sbeck #define SSL_R_BAD_HELLO_REQUEST				 105
2018913ec974Sbeck #define SSL_R_BAD_LENGTH				 271
20195b37fcf3Sryker #define SSL_R_BAD_MAC_DECODE				 113
20200a5d6edeSdjm #define SSL_R_BAD_MAC_LENGTH				 333
20215b37fcf3Sryker #define SSL_R_BAD_MESSAGE_TYPE				 114
20225b37fcf3Sryker #define SSL_R_BAD_PACKET_LENGTH				 115
20235b37fcf3Sryker #define SSL_R_BAD_PROTOCOL_VERSION_NUMBER		 116
20240a5d6edeSdjm #define SSL_R_BAD_PSK_IDENTITY_HINT_LENGTH		 316
20255b37fcf3Sryker #define SSL_R_BAD_RESPONSE_ARGUMENT			 117
20265b37fcf3Sryker #define SSL_R_BAD_RSA_DECRYPT				 118
20275b37fcf3Sryker #define SSL_R_BAD_RSA_ENCRYPT				 119
20285b37fcf3Sryker #define SSL_R_BAD_RSA_E_LENGTH				 120
20295b37fcf3Sryker #define SSL_R_BAD_RSA_MODULUS_LENGTH			 121
20305b37fcf3Sryker #define SSL_R_BAD_RSA_SIGNATURE				 122
20315b37fcf3Sryker #define SSL_R_BAD_SIGNATURE				 123
20325cdd308eSdjm #define SSL_R_BAD_SRP_A_LENGTH				 347
20335cdd308eSdjm #define SSL_R_BAD_SRP_B_LENGTH				 348
20345cdd308eSdjm #define SSL_R_BAD_SRP_G_LENGTH				 349
20355cdd308eSdjm #define SSL_R_BAD_SRP_N_LENGTH				 350
20365cdd308eSdjm #define SSL_R_BAD_SRP_S_LENGTH				 351
20375cdd308eSdjm #define SSL_R_BAD_SRTP_MKI_VALUE			 352
20385cdd308eSdjm #define SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST		 353
20395b37fcf3Sryker #define SSL_R_BAD_SSL_FILETYPE				 124
20405b37fcf3Sryker #define SSL_R_BAD_SSL_SESSION_ID_LENGTH			 125
20415b37fcf3Sryker #define SSL_R_BAD_STATE					 126
20425b37fcf3Sryker #define SSL_R_BAD_WRITE_RETRY				 127
20435b37fcf3Sryker #define SSL_R_BIO_NOT_SET				 128
20445b37fcf3Sryker #define SSL_R_BLOCK_CIPHER_PAD_IS_WRONG			 129
20455b37fcf3Sryker #define SSL_R_BN_LIB					 130
20465b37fcf3Sryker #define SSL_R_CA_DN_LENGTH_MISMATCH			 131
20475b37fcf3Sryker #define SSL_R_CA_DN_TOO_LONG				 132
2048f748f99bStb #define SSL_R_CA_KEY_TOO_SMALL				 397
2049f748f99bStb #define SSL_R_CA_MD_TOO_WEAK				 398
20505b37fcf3Sryker #define SSL_R_CCS_RECEIVED_EARLY			 133
20515b37fcf3Sryker #define SSL_R_CERTIFICATE_VERIFY_FAILED			 134
20525b37fcf3Sryker #define SSL_R_CERT_LENGTH_MISMATCH			 135
20535b37fcf3Sryker #define SSL_R_CHALLENGE_IS_DIFFERENT			 136
20545b37fcf3Sryker #define SSL_R_CIPHER_CODE_WRONG_LENGTH			 137
20554c360d9eSjsing #define SSL_R_CIPHER_COMPRESSION_UNAVAILABLE		 371
20565b37fcf3Sryker #define SSL_R_CIPHER_OR_HASH_UNAVAILABLE		 138
20575b37fcf3Sryker #define SSL_R_CIPHER_TABLE_SRC_ERROR			 139
20580a5d6edeSdjm #define SSL_R_CLIENTHELLO_TLSEXT			 226
20595b37fcf3Sryker #define SSL_R_COMPRESSED_LENGTH_TOO_LONG		 140
20600a5d6edeSdjm #define SSL_R_COMPRESSION_DISABLED			 343
20615b37fcf3Sryker #define SSL_R_COMPRESSION_FAILURE			 141
20624fcf65c5Sdjm #define SSL_R_COMPRESSION_ID_NOT_WITHIN_PRIVATE_RANGE	 307
2063913ec974Sbeck #define SSL_R_COMPRESSION_LIBRARY_ERROR			 142
2064913ec974Sbeck #define SSL_R_CONNECTION_ID_IS_DIFFERENT		 143
2065913ec974Sbeck #define SSL_R_CONNECTION_TYPE_NOT_SET			 144
20664fcf65c5Sdjm #define SSL_R_COOKIE_MISMATCH				 308
2067913ec974Sbeck #define SSL_R_DATA_BETWEEN_CCS_AND_FINISHED		 145
2068913ec974Sbeck #define SSL_R_DATA_LENGTH_TOO_LONG			 146
2069913ec974Sbeck #define SSL_R_DECRYPTION_FAILED				 147
20706d388760Sdjm #define SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC	 281
2071f748f99bStb #define SSL_R_DH_KEY_TOO_SMALL				 394
2072913ec974Sbeck #define SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG		 148
2073913ec974Sbeck #define SSL_R_DIGEST_CHECK_FAILED			 149
20740a5d6edeSdjm #define SSL_R_DTLS_MESSAGE_TOO_BIG			 334
20754fcf65c5Sdjm #define SSL_R_DUPLICATE_COMPRESSION_ID			 309
20760a5d6edeSdjm #define SSL_R_ECC_CERT_NOT_FOR_KEY_AGREEMENT		 317
20770a5d6edeSdjm #define SSL_R_ECC_CERT_NOT_FOR_SIGNING			 318
20780a5d6edeSdjm #define SSL_R_ECC_CERT_SHOULD_HAVE_RSA_SIGNATURE	 322
20790a5d6edeSdjm #define SSL_R_ECC_CERT_SHOULD_HAVE_SHA1_SIGNATURE	 323
20804fcf65c5Sdjm #define SSL_R_ECGROUP_TOO_LARGE_FOR_CIPHER		 310
2081f748f99bStb #define SSL_R_EE_KEY_TOO_SMALL				 399
20825cdd308eSdjm #define SSL_R_EMPTY_SRTP_PROTECTION_PROFILE_LIST	 354
2083913ec974Sbeck #define SSL_R_ENCRYPTED_LENGTH_TOO_LONG			 150
20846d388760Sdjm #define SSL_R_ERROR_GENERATING_TMP_RSA_KEY		 282
2085913ec974Sbeck #define SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST		 151
2086913ec974Sbeck #define SSL_R_EXCESSIVE_MESSAGE_SIZE			 152
2087913ec974Sbeck #define SSL_R_EXTRA_DATA_IN_MESSAGE			 153
2088913ec974Sbeck #define SSL_R_GOT_A_FIN_BEFORE_A_CCS			 154
20895cdd308eSdjm #define SSL_R_GOT_NEXT_PROTO_BEFORE_A_CCS		 355
20905cdd308eSdjm #define SSL_R_GOT_NEXT_PROTO_WITHOUT_EXTENSION		 356
2091913ec974Sbeck #define SSL_R_HTTPS_PROXY_REQUEST			 155
2092913ec974Sbeck #define SSL_R_HTTP_REQUEST				 156
20936d388760Sdjm #define SSL_R_ILLEGAL_PADDING				 283
20946877ad7fSjsing #define SSL_R_INAPPROPRIATE_FALLBACK			 373
20950a5d6edeSdjm #define SSL_R_INCONSISTENT_COMPRESSION			 340
2096913ec974Sbeck #define SSL_R_INVALID_CHALLENGE_LENGTH			 158
2097ba5406e9Sbeck #define SSL_R_INVALID_COMMAND				 280
20980a5d6edeSdjm #define SSL_R_INVALID_COMPRESSION_ALGORITHM		 341
2099ba5406e9Sbeck #define SSL_R_INVALID_PURPOSE				 278
21005cdd308eSdjm #define SSL_R_INVALID_SRP_USERNAME			 357
21010a5d6edeSdjm #define SSL_R_INVALID_STATUS_RESPONSE			 328
21020a5d6edeSdjm #define SSL_R_INVALID_TICKET_KEYS_LENGTH		 325
2103ba5406e9Sbeck #define SSL_R_INVALID_TRUST				 279
21046d388760Sdjm #define SSL_R_KEY_ARG_TOO_LONG				 284
21056d388760Sdjm #define SSL_R_KRB5					 285
21066d388760Sdjm #define SSL_R_KRB5_C_CC_PRINC				 286
21076d388760Sdjm #define SSL_R_KRB5_C_GET_CRED				 287
21086d388760Sdjm #define SSL_R_KRB5_C_INIT				 288
21096d388760Sdjm #define SSL_R_KRB5_C_MK_REQ				 289
21106d388760Sdjm #define SSL_R_KRB5_S_BAD_TICKET				 290
21116d388760Sdjm #define SSL_R_KRB5_S_INIT				 291
21126d388760Sdjm #define SSL_R_KRB5_S_RD_REQ				 292
21136d388760Sdjm #define SSL_R_KRB5_S_TKT_EXPIRED			 293
21146d388760Sdjm #define SSL_R_KRB5_S_TKT_NYV				 294
21156d388760Sdjm #define SSL_R_KRB5_S_TKT_SKEW				 295
2116913ec974Sbeck #define SSL_R_LENGTH_MISMATCH				 159
2117913ec974Sbeck #define SSL_R_LENGTH_TOO_SHORT				 160
2118913ec974Sbeck #define SSL_R_LIBRARY_BUG				 274
2119913ec974Sbeck #define SSL_R_LIBRARY_HAS_NO_CIPHERS			 161
21206d388760Sdjm #define SSL_R_MESSAGE_TOO_LONG				 296
2121913ec974Sbeck #define SSL_R_MISSING_DH_DSA_CERT			 162
2122913ec974Sbeck #define SSL_R_MISSING_DH_KEY				 163
2123913ec974Sbeck #define SSL_R_MISSING_DH_RSA_CERT			 164
2124913ec974Sbeck #define SSL_R_MISSING_DSA_SIGNING_CERT			 165
2125913ec974Sbeck #define SSL_R_MISSING_EXPORT_TMP_DH_KEY			 166
2126913ec974Sbeck #define SSL_R_MISSING_EXPORT_TMP_RSA_KEY		 167
2127913ec974Sbeck #define SSL_R_MISSING_RSA_CERTIFICATE			 168
2128913ec974Sbeck #define SSL_R_MISSING_RSA_ENCRYPTING_CERT		 169
2129913ec974Sbeck #define SSL_R_MISSING_RSA_SIGNING_CERT			 170
21305cdd308eSdjm #define SSL_R_MISSING_SRP_PARAM				 358
2131913ec974Sbeck #define SSL_R_MISSING_TMP_DH_KEY			 171
21324fcf65c5Sdjm #define SSL_R_MISSING_TMP_ECDH_KEY			 311
2133913ec974Sbeck #define SSL_R_MISSING_TMP_RSA_KEY			 172
2134913ec974Sbeck #define SSL_R_MISSING_TMP_RSA_PKEY			 173
2135913ec974Sbeck #define SSL_R_MISSING_VERIFY_MESSAGE			 174
213617150393Sdjm #define SSL_R_MULTIPLE_SGC_RESTARTS			 346
2137913ec974Sbeck #define SSL_R_NON_SSLV2_INITIAL_PACKET			 175
2138715d5aefStb #define SSL_R_NO_APPLICATION_PROTOCOL			 235
2139913ec974Sbeck #define SSL_R_NO_CERTIFICATES_RETURNED			 176
2140913ec974Sbeck #define SSL_R_NO_CERTIFICATE_ASSIGNED			 177
2141913ec974Sbeck #define SSL_R_NO_CERTIFICATE_RETURNED			 178
2142913ec974Sbeck #define SSL_R_NO_CERTIFICATE_SET			 179
2143913ec974Sbeck #define SSL_R_NO_CERTIFICATE_SPECIFIED			 180
2144913ec974Sbeck #define SSL_R_NO_CIPHERS_AVAILABLE			 181
2145913ec974Sbeck #define SSL_R_NO_CIPHERS_PASSED				 182
2146913ec974Sbeck #define SSL_R_NO_CIPHERS_SPECIFIED			 183
2147913ec974Sbeck #define SSL_R_NO_CIPHER_LIST				 184
2148913ec974Sbeck #define SSL_R_NO_CIPHER_MATCH				 185
21490a5d6edeSdjm #define SSL_R_NO_CLIENT_CERT_METHOD			 331
2150913ec974Sbeck #define SSL_R_NO_CLIENT_CERT_RECEIVED			 186
2151913ec974Sbeck #define SSL_R_NO_COMPRESSION_SPECIFIED			 187
2152913ec974Sbeck #define SSL_R_NO_METHOD_SPECIFIED			 188
2153913ec974Sbeck #define SSL_R_NO_PRIVATEKEY				 189
2154913ec974Sbeck #define SSL_R_NO_PRIVATE_KEY_ASSIGNED			 190
2155913ec974Sbeck #define SSL_R_NO_PROTOCOLS_AVAILABLE			 191
2156913ec974Sbeck #define SSL_R_NO_PUBLICKEY				 192
21570a5d6edeSdjm #define SSL_R_NO_RENEGOTIATION				 339
21580a5d6edeSdjm #define SSL_R_NO_REQUIRED_DIGEST			 324
2159913ec974Sbeck #define SSL_R_NO_SHARED_CIPHER				 193
21605cdd308eSdjm #define SSL_R_NO_SRTP_PROFILES				 359
2161913ec974Sbeck #define SSL_R_NO_VERIFY_CALLBACK			 194
2162913ec974Sbeck #define SSL_R_NULL_SSL_CTX				 195
2163913ec974Sbeck #define SSL_R_NULL_SSL_METHOD_PASSED			 196
2164913ec974Sbeck #define SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED		 197
21650a5d6edeSdjm #define SSL_R_OLD_SESSION_COMPRESSION_ALGORITHM_NOT_RETURNED 344
21666d388760Sdjm #define SSL_R_ONLY_TLS_ALLOWED_IN_FIPS_MODE		 297
2167913ec974Sbeck #define SSL_R_PACKET_LENGTH_TOO_LONG			 198
21680a5d6edeSdjm #define SSL_R_PARSE_TLSEXT				 227
2169913ec974Sbeck #define SSL_R_PATH_TOO_LONG				 270
2170913ec974Sbeck #define SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE		 199
2171913ec974Sbeck #define SSL_R_PEER_ERROR				 200
2172913ec974Sbeck #define SSL_R_PEER_ERROR_CERTIFICATE			 201
2173913ec974Sbeck #define SSL_R_PEER_ERROR_NO_CERTIFICATE			 202
2174913ec974Sbeck #define SSL_R_PEER_ERROR_NO_CIPHER			 203
2175913ec974Sbeck #define SSL_R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE	 204
2176913ec974Sbeck #define SSL_R_PRE_MAC_LENGTH_TOO_LONG			 205
2177913ec974Sbeck #define SSL_R_PROBLEMS_MAPPING_CIPHER_FUNCTIONS		 206
2178913ec974Sbeck #define SSL_R_PROTOCOL_IS_SHUTDOWN			 207
21790a5d6edeSdjm #define SSL_R_PSK_IDENTITY_NOT_FOUND			 223
21800a5d6edeSdjm #define SSL_R_PSK_NO_CLIENT_CB				 224
21810a5d6edeSdjm #define SSL_R_PSK_NO_SERVER_CB				 225
2182913ec974Sbeck #define SSL_R_PUBLIC_KEY_ENCRYPT_ERROR			 208
2183913ec974Sbeck #define SSL_R_PUBLIC_KEY_IS_NOT_RSA			 209
2184913ec974Sbeck #define SSL_R_PUBLIC_KEY_NOT_RSA			 210
2185913ec974Sbeck #define SSL_R_READ_BIO_NOT_SET				 211
21864fcf65c5Sdjm #define SSL_R_READ_TIMEOUT_EXPIRED			 312
2187913ec974Sbeck #define SSL_R_READ_WRONG_PACKET_TYPE			 212
2188913ec974Sbeck #define SSL_R_RECORD_LENGTH_MISMATCH			 213
2189913ec974Sbeck #define SSL_R_RECORD_TOO_LARGE				 214
21906d388760Sdjm #define SSL_R_RECORD_TOO_SMALL				 298
21910a5d6edeSdjm #define SSL_R_RENEGOTIATE_EXT_TOO_LONG			 335
21920a5d6edeSdjm #define SSL_R_RENEGOTIATION_ENCODING_ERR		 336
21930a5d6edeSdjm #define SSL_R_RENEGOTIATION_MISMATCH			 337
2194913ec974Sbeck #define SSL_R_REQUIRED_CIPHER_MISSING			 215
21950a5d6edeSdjm #define SSL_R_REQUIRED_COMPRESSSION_ALGORITHM_MISSING	 342
2196913ec974Sbeck #define SSL_R_REUSE_CERT_LENGTH_NOT_ZERO		 216
2197913ec974Sbeck #define SSL_R_REUSE_CERT_TYPE_NOT_ZERO			 217
2198913ec974Sbeck #define SSL_R_REUSE_CIPHER_LIST_NOT_ZERO		 218
21990a5d6edeSdjm #define SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING		 345
22000a5d6edeSdjm #define SSL_R_SERVERHELLO_TLSEXT			 275
2201913ec974Sbeck #define SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED		 277
2202913ec974Sbeck #define SSL_R_SHORT_READ				 219
22035cdd308eSdjm #define SSL_R_SIGNATURE_ALGORITHMS_ERROR		 360
2204913ec974Sbeck #define SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE	 220
22055cdd308eSdjm #define SSL_R_SRP_A_CALC				 361
22065cdd308eSdjm #define SSL_R_SRTP_COULD_NOT_ALLOCATE_PROFILES		 362
22075cdd308eSdjm #define SSL_R_SRTP_PROTECTION_PROFILE_LIST_TOO_LONG	 363
22085cdd308eSdjm #define SSL_R_SRTP_UNKNOWN_PROTECTION_PROFILE		 364
2209913ec974Sbeck #define SSL_R_SSL23_DOING_SESSION_ID_REUSE		 221
22106d388760Sdjm #define SSL_R_SSL2_CONNECTION_ID_TOO_LONG		 299
22110a5d6edeSdjm #define SSL_R_SSL3_EXT_INVALID_ECPOINTFORMAT		 321
22120a5d6edeSdjm #define SSL_R_SSL3_EXT_INVALID_SERVERNAME		 319
22130a5d6edeSdjm #define SSL_R_SSL3_EXT_INVALID_SERVERNAME_TYPE		 320
22146d388760Sdjm #define SSL_R_SSL3_SESSION_ID_TOO_LONG			 300
2215913ec974Sbeck #define SSL_R_SSL3_SESSION_ID_TOO_SHORT			 222
22165b37fcf3Sryker #define SSL_R_SSLV3_ALERT_BAD_CERTIFICATE		 1042
22175b37fcf3Sryker #define SSL_R_SSLV3_ALERT_BAD_RECORD_MAC		 1020
22185b37fcf3Sryker #define SSL_R_SSLV3_ALERT_CERTIFICATE_EXPIRED		 1045
22195b37fcf3Sryker #define SSL_R_SSLV3_ALERT_CERTIFICATE_REVOKED		 1044
22205b37fcf3Sryker #define SSL_R_SSLV3_ALERT_CERTIFICATE_UNKNOWN		 1046
22215b37fcf3Sryker #define SSL_R_SSLV3_ALERT_DECOMPRESSION_FAILURE		 1030
22225b37fcf3Sryker #define SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE		 1040
22235b37fcf3Sryker #define SSL_R_SSLV3_ALERT_ILLEGAL_PARAMETER		 1047
22245b37fcf3Sryker #define SSL_R_SSLV3_ALERT_NO_CERTIFICATE		 1041
22255b37fcf3Sryker #define SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE		 1010
22265b37fcf3Sryker #define SSL_R_SSLV3_ALERT_UNSUPPORTED_CERTIFICATE	 1043
2227913ec974Sbeck #define SSL_R_SSL_CTX_HAS_NO_DEFAULT_SSL_VERSION	 228
2228913ec974Sbeck #define SSL_R_SSL_HANDSHAKE_FAILURE			 229
2229913ec974Sbeck #define SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS		 230
22306d388760Sdjm #define SSL_R_SSL_SESSION_ID_CALLBACK_FAILED		 301
22316d388760Sdjm #define SSL_R_SSL_SESSION_ID_CONFLICT			 302
2232913ec974Sbeck #define SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG		 273
22336d388760Sdjm #define SSL_R_SSL_SESSION_ID_HAS_BAD_LENGTH		 303
2234913ec974Sbeck #define SSL_R_SSL_SESSION_ID_IS_DIFFERENT		 231
223525ba64d1Stb #define SSL_R_SSL_SESSION_ID_TOO_LONG			 408
223648d99288Stb #define SSL_R_TLSV13_ALERT_MISSING_EXTENSION		 1109
223748d99288Stb #define SSL_R_TLSV13_ALERT_CERTIFICATE_REQUIRED		 1116
2238913ec974Sbeck #define SSL_R_TLSV1_ALERT_ACCESS_DENIED			 1049
223948d99288Stb #define SSL_R_TLSV1_ALERT_NO_APPLICATION_PROTOCOL	 1120
2240913ec974Sbeck #define SSL_R_TLSV1_ALERT_DECODE_ERROR			 1050
2241913ec974Sbeck #define SSL_R_TLSV1_ALERT_DECRYPTION_FAILED		 1021
2242913ec974Sbeck #define SSL_R_TLSV1_ALERT_DECRYPT_ERROR			 1051
2243ba5406e9Sbeck #define SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION		 1060
22446877ad7fSjsing #define SSL_R_TLSV1_ALERT_INAPPROPRIATE_FALLBACK	 1086
2245913ec974Sbeck #define SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY		 1071
2246913ec974Sbeck #define SSL_R_TLSV1_ALERT_INTERNAL_ERROR		 1080
2247913ec974Sbeck #define SSL_R_TLSV1_ALERT_NO_RENEGOTIATION		 1100
2248913ec974Sbeck #define SSL_R_TLSV1_ALERT_PROTOCOL_VERSION		 1070
2249913ec974Sbeck #define SSL_R_TLSV1_ALERT_RECORD_OVERFLOW		 1022
2250913ec974Sbeck #define SSL_R_TLSV1_ALERT_UNKNOWN_CA			 1048
225148d99288Stb #define SSL_R_TLSV1_ALERT_UNKNOWN_PSK_IDENTITY		 1115
2252ba5406e9Sbeck #define SSL_R_TLSV1_ALERT_USER_CANCELLED		 1090
22530a5d6edeSdjm #define SSL_R_TLSV1_BAD_CERTIFICATE_HASH_VALUE		 1114
22540a5d6edeSdjm #define SSL_R_TLSV1_BAD_CERTIFICATE_STATUS_RESPONSE	 1113
22550a5d6edeSdjm #define SSL_R_TLSV1_CERTIFICATE_UNOBTAINABLE		 1111
22560a5d6edeSdjm #define SSL_R_TLSV1_UNRECOGNIZED_NAME			 1112
22570a5d6edeSdjm #define SSL_R_TLSV1_UNSUPPORTED_EXTENSION		 1110
2258913ec974Sbeck #define SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER	 232
22595cdd308eSdjm #define SSL_R_TLS_HEARTBEAT_PEER_DOESNT_ACCEPT		 365
22605cdd308eSdjm #define SSL_R_TLS_HEARTBEAT_PENDING			 366
22615cdd308eSdjm #define SSL_R_TLS_ILLEGAL_EXPORTER_LABEL		 367
22620a5d6edeSdjm #define SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST		 157
2263913ec974Sbeck #define SSL_R_TLS_PEER_DID_NOT_RESPOND_WITH_CERTIFICATE_LIST 233
2264913ec974Sbeck #define SSL_R_TLS_RSA_ENCRYPTED_VALUE_LENGTH_IS_WRONG	 234
2265913ec974Sbeck #define SSL_R_UNABLE_TO_DECODE_DH_CERTS			 236
22664fcf65c5Sdjm #define SSL_R_UNABLE_TO_DECODE_ECDH_CERTS		 313
2267913ec974Sbeck #define SSL_R_UNABLE_TO_EXTRACT_PUBLIC_KEY		 237
2268913ec974Sbeck #define SSL_R_UNABLE_TO_FIND_DH_PARAMETERS		 238
22694fcf65c5Sdjm #define SSL_R_UNABLE_TO_FIND_ECDH_PARAMETERS		 314
2270913ec974Sbeck #define SSL_R_UNABLE_TO_FIND_PUBLIC_KEY_PARAMETERS	 239
2271913ec974Sbeck #define SSL_R_UNABLE_TO_FIND_SSL_METHOD			 240
2272913ec974Sbeck #define SSL_R_UNABLE_TO_LOAD_SSL2_MD5_ROUTINES		 241
2273913ec974Sbeck #define SSL_R_UNABLE_TO_LOAD_SSL3_MD5_ROUTINES		 242
2274913ec974Sbeck #define SSL_R_UNABLE_TO_LOAD_SSL3_SHA1_ROUTINES		 243
2275913ec974Sbeck #define SSL_R_UNEXPECTED_MESSAGE			 244
2276913ec974Sbeck #define SSL_R_UNEXPECTED_RECORD				 245
2277913ec974Sbeck #define SSL_R_UNINITIALIZED				 276
2278913ec974Sbeck #define SSL_R_UNKNOWN_ALERT_TYPE			 246
2279913ec974Sbeck #define SSL_R_UNKNOWN_CERTIFICATE_TYPE			 247
2280913ec974Sbeck #define SSL_R_UNKNOWN_CIPHER_RETURNED			 248
2281913ec974Sbeck #define SSL_R_UNKNOWN_CIPHER_TYPE			 249
22825cdd308eSdjm #define SSL_R_UNKNOWN_DIGEST				 368
2283913ec974Sbeck #define SSL_R_UNKNOWN_KEY_EXCHANGE_TYPE			 250
2284913ec974Sbeck #define SSL_R_UNKNOWN_PKEY_TYPE				 251
2285913ec974Sbeck #define SSL_R_UNKNOWN_PROTOCOL				 252
2286913ec974Sbeck #define SSL_R_UNKNOWN_REMOTE_ERROR_TYPE			 253
2287913ec974Sbeck #define SSL_R_UNKNOWN_SSL_VERSION			 254
2288913ec974Sbeck #define SSL_R_UNKNOWN_STATE				 255
22890a5d6edeSdjm #define SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED	 338
2290913ec974Sbeck #define SSL_R_UNSUPPORTED_CIPHER			 256
2291913ec974Sbeck #define SSL_R_UNSUPPORTED_COMPRESSION_ALGORITHM		 257
22920a5d6edeSdjm #define SSL_R_UNSUPPORTED_DIGEST_TYPE			 326
22934fcf65c5Sdjm #define SSL_R_UNSUPPORTED_ELLIPTIC_CURVE		 315
2294913ec974Sbeck #define SSL_R_UNSUPPORTED_PROTOCOL			 258
2295913ec974Sbeck #define SSL_R_UNSUPPORTED_SSL_VERSION			 259
22964fcf65c5Sdjm #define SSL_R_UNSUPPORTED_STATUS_TYPE			 329
22975cdd308eSdjm #define SSL_R_USE_SRTP_NOT_NEGOTIATED			 369
2298f748f99bStb #define SSL_R_VERSION_TOO_LOW				 396
2299913ec974Sbeck #define SSL_R_WRITE_BIO_NOT_SET				 260
2300913ec974Sbeck #define SSL_R_WRONG_CIPHER_RETURNED			 261
230177897655Sjsing #define SSL_R_WRONG_CURVE				 378
2302913ec974Sbeck #define SSL_R_WRONG_MESSAGE_TYPE			 262
2303913ec974Sbeck #define SSL_R_WRONG_NUMBER_OF_KEY_BITS			 263
2304913ec974Sbeck #define SSL_R_WRONG_SIGNATURE_LENGTH			 264
2305913ec974Sbeck #define SSL_R_WRONG_SIGNATURE_SIZE			 265
23065cdd308eSdjm #define SSL_R_WRONG_SIGNATURE_TYPE			 370
2307913ec974Sbeck #define SSL_R_WRONG_SSL_VERSION				 266
2308913ec974Sbeck #define SSL_R_WRONG_VERSION_NUMBER			 267
2309913ec974Sbeck #define SSL_R_X509_LIB					 268
2310913ec974Sbeck #define SSL_R_X509_VERIFICATION_SETUP_PROBLEMS		 269
2311b6a22251Sbeck #define SSL_R_PEER_BEHAVING_BADLY			 666
2312cfa19c4eSjsing #define SSL_R_QUIC_INTERNAL_ERROR			 667
2313cfa19c4eSjsing #define SSL_R_WRONG_ENCRYPTION_LEVEL_RECEIVED		 668
2314b1af789cSjsing #define SSL_R_UNKNOWN					 999
23155b37fcf3Sryker 
2316e68eaf89Sbeck /*
2317e68eaf89Sbeck  * OpenSSL compatible OPENSSL_INIT options
2318e68eaf89Sbeck  */
2319e68eaf89Sbeck 
2320e68eaf89Sbeck /*
232140ca958bSjmc  * These are provided for compatibility, but have no effect
2322e68eaf89Sbeck  * on how LibreSSL is initialized.
2323e68eaf89Sbeck  */
2324e68eaf89Sbeck #define OPENSSL_INIT_LOAD_SSL_STRINGS	_OPENSSL_INIT_FLAG_NOOP
2325e68eaf89Sbeck #define OPENSSL_INIT_SSL_DEFAULT	_OPENSSL_INIT_FLAG_NOOP
2326e68eaf89Sbeck 
2327e68eaf89Sbeck int OPENSSL_init_ssl(uint64_t opts, const void *settings);
232862592c24Stb int SSL_library_init(void);
2329e68eaf89Sbeck 
233021053144Stb /*
233121053144Stb  * A few things still use this without #ifdef guard.
233221053144Stb  */
233321053144Stb 
233421053144Stb #define SSL2_VERSION	0x0002
233521053144Stb 
23365b37fcf3Sryker #ifdef  __cplusplus
23375b37fcf3Sryker }
23385b37fcf3Sryker #endif
23395b37fcf3Sryker #endif
2340