xref: /openbsd-src/lib/libtls/man/tls_config_set_session_id.3 (revision 9a8e282d80b67705b56e2337379efe453d78c9a3)
1*9a8e282dSjsing.\" $OpenBSD: tls_config_set_session_id.3,v 1.5 2018/02/10 06:07:43 jsing Exp $
2e690d60fSschwarze.\"
34801fc0bSschwarze.\" Copyright (c) 2017 Claudio Jeker <claudio@openbsd.org>
4940f9ff5Sjsing.\" Copyright (c) 2018 Joel Sing <jsing@openbsd.org>
5e690d60fSschwarze.\"
6e690d60fSschwarze.\" Permission to use, copy, modify, and distribute this software for any
7e690d60fSschwarze.\" purpose with or without fee is hereby granted, provided that the above
8e690d60fSschwarze.\" copyright notice and this permission notice appear in all copies.
9e690d60fSschwarze.\"
10e690d60fSschwarze.\" THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11e690d60fSschwarze.\" WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12e690d60fSschwarze.\" MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13e690d60fSschwarze.\" ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14e690d60fSschwarze.\" WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15e690d60fSschwarze.\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16e690d60fSschwarze.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17e690d60fSschwarze.\"
18940f9ff5Sjsing.Dd $Mdocdate: February 10 2018 $
19e690d60fSschwarze.Dt TLS_CONFIG_SET_SESSION_ID 3
20e690d60fSschwarze.Os
21e690d60fSschwarze.Sh NAME
22940f9ff5Sjsing.Nm tls_config_set_session_fd ,
23e690d60fSschwarze.Nm tls_config_set_session_id ,
24e690d60fSschwarze.Nm tls_config_set_session_lifetime ,
25e690d60fSschwarze.Nm tls_config_add_ticket_key
26e690d60fSschwarze.Nd configure resuming of TLS handshakes
27e690d60fSschwarze.Sh SYNOPSIS
28e690d60fSschwarze.In tls.h
29e690d60fSschwarze.Ft int
30940f9ff5Sjsing.Fo tls_config_set_session_fd
31940f9ff5Sjsing.Fa "struct tls_config *config"
32940f9ff5Sjsing.Fa "int session_fd"
33940f9ff5Sjsing.Fc
34940f9ff5Sjsing.Ft int
35e690d60fSschwarze.Fo tls_config_set_session_id
36e690d60fSschwarze.Fa "struct tls_config *config"
37e690d60fSschwarze.Fa "const unsigned char *session_id"
38e690d60fSschwarze.Fa "size_t len"
39e690d60fSschwarze.Fc
40e690d60fSschwarze.Ft int
41e690d60fSschwarze.Fo tls_config_set_session_lifetime
42e690d60fSschwarze.Fa "struct tls_config *config"
43e690d60fSschwarze.Fa "int lifetime"
44e690d60fSschwarze.Fc
45e690d60fSschwarze.Ft int
46e690d60fSschwarze.Fo tls_config_add_ticket_key
47e690d60fSschwarze.Fa "struct tls_config *config"
48e690d60fSschwarze.Fa "uint32_t keyrev"
49e690d60fSschwarze.Fa "unsigned char *key"
50e690d60fSschwarze.Fa "size_t keylen"
51e690d60fSschwarze.Fc
52e690d60fSschwarze.Sh DESCRIPTION
53940f9ff5Sjsing.Fn tls_config_set_session_fd
54940f9ff5Sjsingsets a file descriptor to be used to manage data for TLS sessions (client only).
55940f9ff5SjsingThe given file descriptor must be a regular file and be owned by the current
56940f9ff5Sjsinguser, with permissions being restricted to only allow the owner to read and
57940f9ff5Sjsingwrite the file (0600).
58940f9ff5SjsingIf the file has a non-zero length, the client will attempt to read session
59940f9ff5Sjsingdata from this file and resume the previous TLS session with the server.
60940f9ff5SjsingUpon a successful handshake the file will be updated with current session
61*9a8e282dSjsingdata, if available.
62940f9ff5SjsingThe caller is responsible for closing this file descriptor, after all TLS
63940f9ff5Sjsingcontexts that have been configured to use it have been freed via
64940f9ff5Sjsing.Fn tls_free .
65940f9ff5Sjsing.Pp
66e690d60fSschwarze.Fn tls_config_set_session_id
67e690d60fSschwarzesets the session identifier that will be used by the TLS server when
68940f9ff5Sjsingsessions are enabled (server only).
69e690d60fSschwarzeBy default a random value is used.
70e690d60fSschwarze.Pp
71e690d60fSschwarze.Fn tls_config_set_session_lifetime
72940f9ff5Sjsingsets the lifetime to be used for TLS sessions (server only).
73e690d60fSschwarzeSession support is disabled if a lifetime of zero is specified, which is the
74e690d60fSschwarzedefault.
75e690d60fSschwarze.Pp
76e690d60fSschwarze.Fn tls_config_add_ticket_key
77940f9ff5Sjsingadds a key used for the encryption and authentication of TLS tickets
78940f9ff5Sjsing(server only).
79e690d60fSschwarzeBy default keys are generated and rotated automatically based on their lifetime.
80e690d60fSschwarzeThis function should only be used to synchronise ticket encryption key across
81e690d60fSschwarzemultiple processes.
82e690d60fSschwarzeRe-adding a known key will result in an error, unless it is the most recently
83e690d60fSschwarzeadded key.
84e690d60fSschwarze.Sh RETURN VALUES
85e690d60fSschwarzeThese functions return 0 on success or -1 on error.
86e690d60fSschwarze.Sh SEE ALSO
87e690d60fSschwarze.Xr tls_accept_socket 3 ,
88e690d60fSschwarze.Xr tls_config_set_protocols 3 ,
89e690d60fSschwarze.Xr tls_init 3 ,
90e690d60fSschwarze.Xr tls_load_file 3 ,
91e690d60fSschwarze.Xr tls_server 3
928b02f64eSschwarze.Sh HISTORY
93940f9ff5Sjsing.Fn tls_config_set_session_id ,
94940f9ff5Sjsing.Fn tls_config_set_session_lifetime
95940f9ff5Sjsingand
96940f9ff5Sjsing.Fn tls_config_add_ticket_key
97940f9ff5Sjsingappeared in
988b02f64eSschwarze.Ox 6.1 .
99940f9ff5Sjsing.Pp
100940f9ff5Sjsing.Fn tls_config_set_session_fd
101940f9ff5Sjsingappeared in
102940f9ff5Sjsing.Ox 6.3 .
1038b02f64eSschwarze.Sh AUTHORS
1048b02f64eSschwarze.An Claudio Jeker Aq Mt claudio@openbsd.org
105940f9ff5Sjsing.An Joel Sing Aq Mt jsing@openbsd.org
106