1*9a8e282dSjsing.\" $OpenBSD: tls_config_set_session_id.3,v 1.5 2018/02/10 06:07:43 jsing Exp $ 2e690d60fSschwarze.\" 34801fc0bSschwarze.\" Copyright (c) 2017 Claudio Jeker <claudio@openbsd.org> 4940f9ff5Sjsing.\" Copyright (c) 2018 Joel Sing <jsing@openbsd.org> 5e690d60fSschwarze.\" 6e690d60fSschwarze.\" Permission to use, copy, modify, and distribute this software for any 7e690d60fSschwarze.\" purpose with or without fee is hereby granted, provided that the above 8e690d60fSschwarze.\" copyright notice and this permission notice appear in all copies. 9e690d60fSschwarze.\" 10e690d60fSschwarze.\" THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 11e690d60fSschwarze.\" WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 12e690d60fSschwarze.\" MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 13e690d60fSschwarze.\" ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 14e690d60fSschwarze.\" WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 15e690d60fSschwarze.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 16e690d60fSschwarze.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 17e690d60fSschwarze.\" 18940f9ff5Sjsing.Dd $Mdocdate: February 10 2018 $ 19e690d60fSschwarze.Dt TLS_CONFIG_SET_SESSION_ID 3 20e690d60fSschwarze.Os 21e690d60fSschwarze.Sh NAME 22940f9ff5Sjsing.Nm tls_config_set_session_fd , 23e690d60fSschwarze.Nm tls_config_set_session_id , 24e690d60fSschwarze.Nm tls_config_set_session_lifetime , 25e690d60fSschwarze.Nm tls_config_add_ticket_key 26e690d60fSschwarze.Nd configure resuming of TLS handshakes 27e690d60fSschwarze.Sh SYNOPSIS 28e690d60fSschwarze.In tls.h 29e690d60fSschwarze.Ft int 30940f9ff5Sjsing.Fo tls_config_set_session_fd 31940f9ff5Sjsing.Fa "struct tls_config *config" 32940f9ff5Sjsing.Fa "int session_fd" 33940f9ff5Sjsing.Fc 34940f9ff5Sjsing.Ft int 35e690d60fSschwarze.Fo tls_config_set_session_id 36e690d60fSschwarze.Fa "struct tls_config *config" 37e690d60fSschwarze.Fa "const unsigned char *session_id" 38e690d60fSschwarze.Fa "size_t len" 39e690d60fSschwarze.Fc 40e690d60fSschwarze.Ft int 41e690d60fSschwarze.Fo tls_config_set_session_lifetime 42e690d60fSschwarze.Fa "struct tls_config *config" 43e690d60fSschwarze.Fa "int lifetime" 44e690d60fSschwarze.Fc 45e690d60fSschwarze.Ft int 46e690d60fSschwarze.Fo tls_config_add_ticket_key 47e690d60fSschwarze.Fa "struct tls_config *config" 48e690d60fSschwarze.Fa "uint32_t keyrev" 49e690d60fSschwarze.Fa "unsigned char *key" 50e690d60fSschwarze.Fa "size_t keylen" 51e690d60fSschwarze.Fc 52e690d60fSschwarze.Sh DESCRIPTION 53940f9ff5Sjsing.Fn tls_config_set_session_fd 54940f9ff5Sjsingsets a file descriptor to be used to manage data for TLS sessions (client only). 55940f9ff5SjsingThe given file descriptor must be a regular file and be owned by the current 56940f9ff5Sjsinguser, with permissions being restricted to only allow the owner to read and 57940f9ff5Sjsingwrite the file (0600). 58940f9ff5SjsingIf the file has a non-zero length, the client will attempt to read session 59940f9ff5Sjsingdata from this file and resume the previous TLS session with the server. 60940f9ff5SjsingUpon a successful handshake the file will be updated with current session 61*9a8e282dSjsingdata, if available. 62940f9ff5SjsingThe caller is responsible for closing this file descriptor, after all TLS 63940f9ff5Sjsingcontexts that have been configured to use it have been freed via 64940f9ff5Sjsing.Fn tls_free . 65940f9ff5Sjsing.Pp 66e690d60fSschwarze.Fn tls_config_set_session_id 67e690d60fSschwarzesets the session identifier that will be used by the TLS server when 68940f9ff5Sjsingsessions are enabled (server only). 69e690d60fSschwarzeBy default a random value is used. 70e690d60fSschwarze.Pp 71e690d60fSschwarze.Fn tls_config_set_session_lifetime 72940f9ff5Sjsingsets the lifetime to be used for TLS sessions (server only). 73e690d60fSschwarzeSession support is disabled if a lifetime of zero is specified, which is the 74e690d60fSschwarzedefault. 75e690d60fSschwarze.Pp 76e690d60fSschwarze.Fn tls_config_add_ticket_key 77940f9ff5Sjsingadds a key used for the encryption and authentication of TLS tickets 78940f9ff5Sjsing(server only). 79e690d60fSschwarzeBy default keys are generated and rotated automatically based on their lifetime. 80e690d60fSschwarzeThis function should only be used to synchronise ticket encryption key across 81e690d60fSschwarzemultiple processes. 82e690d60fSschwarzeRe-adding a known key will result in an error, unless it is the most recently 83e690d60fSschwarzeadded key. 84e690d60fSschwarze.Sh RETURN VALUES 85e690d60fSschwarzeThese functions return 0 on success or -1 on error. 86e690d60fSschwarze.Sh SEE ALSO 87e690d60fSschwarze.Xr tls_accept_socket 3 , 88e690d60fSschwarze.Xr tls_config_set_protocols 3 , 89e690d60fSschwarze.Xr tls_init 3 , 90e690d60fSschwarze.Xr tls_load_file 3 , 91e690d60fSschwarze.Xr tls_server 3 928b02f64eSschwarze.Sh HISTORY 93940f9ff5Sjsing.Fn tls_config_set_session_id , 94940f9ff5Sjsing.Fn tls_config_set_session_lifetime 95940f9ff5Sjsingand 96940f9ff5Sjsing.Fn tls_config_add_ticket_key 97940f9ff5Sjsingappeared in 988b02f64eSschwarze.Ox 6.1 . 99940f9ff5Sjsing.Pp 100940f9ff5Sjsing.Fn tls_config_set_session_fd 101940f9ff5Sjsingappeared in 102940f9ff5Sjsing.Ox 6.3 . 1038b02f64eSschwarze.Sh AUTHORS 1048b02f64eSschwarze.An Claudio Jeker Aq Mt claudio@openbsd.org 105940f9ff5Sjsing.An Joel Sing Aq Mt jsing@openbsd.org 106