]>
Commit | Line | Data |
---|---|---|
846e33c7 | 1 | /* |
fecb3aae | 2 | * Copyright 2015-2022 The OpenSSL Project Authors. All Rights Reserved. |
61ae935a | 3 | * |
2c18d164 | 4 | * Licensed under the Apache License 2.0 (the "License"). You may not use |
846e33c7 RS |
5 | * this file except in compliance with the License. You can obtain a copy |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
61ae935a MC |
8 | */ |
9 | ||
10 | /***************************************************************************** | |
11 | * * | |
12 | * The following definitions are PRIVATE to the state machine. They should * | |
13 | * NOT be used outside of the state machine. * | |
14 | * * | |
15 | *****************************************************************************/ | |
16 | ||
17 | /* Max message length definitions */ | |
18 | ||
19 | /* The spec allows for a longer length than this, but we limit it */ | |
20 | #define HELLO_VERIFY_REQUEST_MAX_LENGTH 258 | |
ef6c191b | 21 | #define END_OF_EARLY_DATA_MAX_LENGTH 0 |
3847d426 | 22 | #define HELLO_RETRY_REQUEST_MAX_LENGTH 20000 |
e46f2334 | 23 | #define ENCRYPTED_EXTENSIONS_MAX_LENGTH 20000 |
e54f0c9b MC |
24 | #define SESSION_TICKET_MAX_LENGTH_TLS13 131338 |
25 | #define SESSION_TICKET_MAX_LENGTH_TLS12 65541 | |
61ae935a MC |
26 | #define SERVER_KEY_EXCH_MAX_LENGTH 102400 |
27 | #define SERVER_HELLO_DONE_MAX_LENGTH 0 | |
e1c3de44 | 28 | #define KEY_UPDATE_MAX_LENGTH 1 |
61ae935a | 29 | #define CCS_MAX_LENGTH 1 |
3aff5b4b MB |
30 | |
31 | /* Max ServerHello size permitted by RFC 8446 */ | |
32 | #define SERVER_HELLO_MAX_LENGTH 65607 | |
33 | ||
61ae935a MC |
34 | /* Max should actually be 36 but we are generous */ |
35 | #define FINISHED_MAX_LENGTH 64 | |
36 | ||
f7e393be MC |
37 | /* Dummy message type */ |
38 | #define SSL3_MT_DUMMY -1 | |
39 | ||
597c51bc MC |
40 | extern const unsigned char hrrrandom[]; |
41 | ||
61ae935a | 42 | /* Message processing return codes */ |
be3583fa | 43 | typedef enum { |
61ae935a MC |
44 | /* Something bad happened */ |
45 | MSG_PROCESS_ERROR, | |
46 | /* We've finished reading - swap to writing */ | |
47 | MSG_PROCESS_FINISHED_READING, | |
48 | /* | |
49 | * We've completed the main processing of this message but there is some | |
50 | * post processing to be done. | |
51 | */ | |
52 | MSG_PROCESS_CONTINUE_PROCESSING, | |
53 | /* We've finished this message - read the next message */ | |
54 | MSG_PROCESS_CONTINUE_READING | |
be3583fa | 55 | } MSG_PROCESS_RETURN; |
61ae935a | 56 | |
a15c953f MC |
57 | typedef int (*confunc_f) (SSL *s, WPACKET *pkt); |
58 | ||
5d671101 | 59 | int ssl3_take_mac(SSL *s); |
9e84a42d | 60 | int check_in_list(SSL *s, uint16_t group_id, const uint16_t *groups, |
aff9929b | 61 | size_t num_groups, int checkallow); |
43054d3d MC |
62 | int create_synthetic_message_hash(SSL *s, const unsigned char *hashval, |
63 | size_t hashlen, const unsigned char *hrr, | |
64 | size_t hrrlen); | |
f63a17d6 | 65 | int parse_ca_names(SSL *s, PACKET *pkt); |
98732979 MC |
66 | const STACK_OF(X509_NAME) *get_ca_names(SSL *s); |
67 | int construct_ca_names(SSL *s, const STACK_OF(X509_NAME) *ca_sk, WPACKET *pkt); | |
f63a17d6 | 68 | size_t construct_key_exchange_tbs(SSL *s, unsigned char **ptbs, |
72ceb6a6 | 69 | const void *param, size_t paramlen); |
5d6cca05 | 70 | |
61ae935a MC |
71 | /* |
72 | * TLS/DTLS client state machine functions | |
73 | */ | |
8481f583 MC |
74 | int ossl_statem_client_read_transition(SSL *s, int mt); |
75 | WRITE_TRAN ossl_statem_client_write_transition(SSL *s); | |
76 | WORK_STATE ossl_statem_client_pre_work(SSL *s, WORK_STATE wst); | |
77 | WORK_STATE ossl_statem_client_post_work(SSL *s, WORK_STATE wst); | |
e1c12271 | 78 | int ossl_statem_client_construct_message(SSL *s, |
a15c953f | 79 | confunc_f *confunc, int *mt); |
eda75751 | 80 | size_t ossl_statem_client_max_message_size(SSL *s); |
8481f583 MC |
81 | MSG_PROCESS_RETURN ossl_statem_client_process_message(SSL *s, PACKET *pkt); |
82 | WORK_STATE ossl_statem_client_post_process_message(SSL *s, WORK_STATE wst); | |
61ae935a MC |
83 | |
84 | /* | |
85 | * TLS/DTLS server state machine functions | |
86 | */ | |
8481f583 MC |
87 | int ossl_statem_server_read_transition(SSL *s, int mt); |
88 | WRITE_TRAN ossl_statem_server_write_transition(SSL *s); | |
89 | WORK_STATE ossl_statem_server_pre_work(SSL *s, WORK_STATE wst); | |
90 | WORK_STATE ossl_statem_server_post_work(SSL *s, WORK_STATE wst); | |
e1c12271 | 91 | int ossl_statem_server_construct_message(SSL *s, |
a15c953f | 92 | confunc_f *confunc,int *mt); |
eda75751 | 93 | size_t ossl_statem_server_max_message_size(SSL *s); |
8481f583 MC |
94 | MSG_PROCESS_RETURN ossl_statem_server_process_message(SSL *s, PACKET *pkt); |
95 | WORK_STATE ossl_statem_server_post_process_message(SSL *s, WORK_STATE wst); | |
61ae935a MC |
96 | |
97 | /* Functions for getting new message data */ | |
98 | __owur int tls_get_message_header(SSL *s, int *mt); | |
eda75751 | 99 | __owur int tls_get_message_body(SSL *s, size_t *len); |
f42e68dc MC |
100 | __owur int dtls_get_message(SSL *s, int *mt); |
101 | __owur int dtls_get_message_body(SSL *s, size_t *len); | |
61ae935a MC |
102 | |
103 | /* Message construction and processing functions */ | |
f63a17d6 | 104 | __owur int tls_process_initial_server_flight(SSL *s); |
be3583fa MC |
105 | __owur MSG_PROCESS_RETURN tls_process_change_cipher_spec(SSL *s, PACKET *pkt); |
106 | __owur MSG_PROCESS_RETURN tls_process_finished(SSL *s, PACKET *pkt); | |
7cea05dc MC |
107 | __owur int tls_construct_change_cipher_spec(SSL *s, WPACKET *pkt); |
108 | __owur int dtls_construct_change_cipher_spec(SSL *s, WPACKET *pkt); | |
61ae935a | 109 | |
229185e6 | 110 | __owur int tls_construct_finished(SSL *s, WPACKET *pkt); |
44c04a2e | 111 | __owur int tls_construct_key_update(SSL *s, WPACKET *pkt); |
e1c3de44 | 112 | __owur MSG_PROCESS_RETURN tls_process_key_update(SSL *s, PACKET *pkt); |
2a8db717 MC |
113 | __owur WORK_STATE tls_finish_handshake(SSL *s, WORK_STATE wst, int clearbufs, |
114 | int stop); | |
be3583fa | 115 | __owur WORK_STATE dtls_wait_for_dry(SSL *s); |
61ae935a MC |
116 | |
117 | /* some client-only functions */ | |
7cea05dc | 118 | __owur int tls_construct_client_hello(SSL *s, WPACKET *pkt); |
be3583fa MC |
119 | __owur MSG_PROCESS_RETURN tls_process_server_hello(SSL *s, PACKET *pkt); |
120 | __owur MSG_PROCESS_RETURN tls_process_certificate_request(SSL *s, PACKET *pkt); | |
121 | __owur MSG_PROCESS_RETURN tls_process_new_session_ticket(SSL *s, PACKET *pkt); | |
f63a17d6 | 122 | __owur int tls_process_cert_status_body(SSL *s, PACKET *pkt); |
be3583fa MC |
123 | __owur MSG_PROCESS_RETURN tls_process_cert_status(SSL *s, PACKET *pkt); |
124 | __owur MSG_PROCESS_RETURN tls_process_server_done(SSL *s, PACKET *pkt); | |
d8bc1399 | 125 | __owur int tls_construct_cert_verify(SSL *s, WPACKET *pkt); |
be3583fa | 126 | __owur WORK_STATE tls_prepare_client_certificate(SSL *s, WORK_STATE wst); |
7cea05dc | 127 | __owur int tls_construct_client_certificate(SSL *s, WPACKET *pkt); |
61ae935a | 128 | __owur int ssl_do_client_cert_cb(SSL *s, X509 **px509, EVP_PKEY **ppkey); |
7cea05dc | 129 | __owur int tls_construct_client_key_exchange(SSL *s, WPACKET *pkt); |
61ae935a | 130 | __owur int tls_client_key_exchange_post_work(SSL *s); |
f63e4288 | 131 | __owur int tls_construct_cert_status_body(SSL *s, WPACKET *pkt); |
7cea05dc | 132 | __owur int tls_construct_cert_status(SSL *s, WPACKET *pkt); |
a230b26e | 133 | __owur MSG_PROCESS_RETURN tls_process_key_exchange(SSL *s, PACKET *pkt); |
be3583fa | 134 | __owur MSG_PROCESS_RETURN tls_process_server_certificate(SSL *s, PACKET *pkt); |
0c3eb279 | 135 | __owur WORK_STATE tls_post_process_server_certificate(SSL *s, WORK_STATE wst); |
61ae935a | 136 | __owur int ssl3_check_cert_and_algorithm(SSL *s); |
a230b26e | 137 | #ifndef OPENSSL_NO_NEXTPROTONEG |
7cea05dc | 138 | __owur int tls_construct_next_proto(SSL *s, WPACKET *pkt); |
a230b26e | 139 | #endif |
c7f47786 | 140 | __owur MSG_PROCESS_RETURN tls_process_hello_req(SSL *s, PACKET *pkt); |
be3583fa | 141 | __owur MSG_PROCESS_RETURN dtls_process_hello_verify(SSL *s, PACKET *pkt); |
ef6c191b | 142 | __owur int tls_construct_end_of_early_data(SSL *s, WPACKET *pkt); |
61ae935a MC |
143 | |
144 | /* some server-only functions */ | |
be3583fa MC |
145 | __owur MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt); |
146 | __owur WORK_STATE tls_post_process_client_hello(SSL *s, WORK_STATE wst); | |
7cea05dc | 147 | __owur int tls_construct_server_hello(SSL *s, WPACKET *pkt); |
7cea05dc MC |
148 | __owur int dtls_construct_hello_verify_request(SSL *s, WPACKET *pkt); |
149 | __owur int tls_construct_server_certificate(SSL *s, WPACKET *pkt); | |
150 | __owur int tls_construct_server_key_exchange(SSL *s, WPACKET *pkt); | |
151 | __owur int tls_construct_certificate_request(SSL *s, WPACKET *pkt); | |
152 | __owur int tls_construct_server_done(SSL *s, WPACKET *pkt); | |
be3583fa MC |
153 | __owur MSG_PROCESS_RETURN tls_process_client_certificate(SSL *s, PACKET *pkt); |
154 | __owur MSG_PROCESS_RETURN tls_process_client_key_exchange(SSL *s, PACKET *pkt); | |
155 | __owur WORK_STATE tls_post_process_client_key_exchange(SSL *s, WORK_STATE wst); | |
156 | __owur MSG_PROCESS_RETURN tls_process_cert_verify(SSL *s, PACKET *pkt); | |
a230b26e | 157 | #ifndef OPENSSL_NO_NEXTPROTONEG |
be3583fa | 158 | __owur MSG_PROCESS_RETURN tls_process_next_proto(SSL *s, PACKET *pkt); |
a230b26e | 159 | #endif |
7cea05dc | 160 | __owur int tls_construct_new_session_ticket(SSL *s, WPACKET *pkt); |
ef6c191b | 161 | MSG_PROCESS_RETURN tls_process_end_of_early_data(SSL *s, PACKET *pkt); |
6b473aca | 162 | |
5a5530a2 DB |
163 | #ifndef OPENSSL_NO_GOST |
164 | /* These functions are used in GOST18 CKE, both for client and server */ | |
6dd4b77a SL |
165 | int ossl_gost18_cke_cipher_nid(const SSL *s); |
166 | int ossl_gost_ukm(const SSL *s, unsigned char *dgst_buf); | |
5a5530a2 | 167 | #endif |
70af3d8e MC |
168 | |
169 | /* Extension processing */ | |
170 | ||
355a0d10 | 171 | typedef enum ext_return_en { |
b186a592 MC |
172 | EXT_RETURN_FAIL, |
173 | EXT_RETURN_SENT, | |
174 | EXT_RETURN_NOT_SENT | |
175 | } EXT_RETURN; | |
176 | ||
88050dd1 MC |
177 | __owur int tls_validate_all_contexts(SSL *s, unsigned int thisctx, |
178 | RAW_EXTENSION *exts); | |
43ae5eed MC |
179 | __owur int extension_is_relevant(SSL *s, unsigned int extctx, |
180 | unsigned int thisctx); | |
70af3d8e | 181 | __owur int tls_collect_extensions(SSL *s, PACKET *packet, unsigned int context, |
f63a17d6 | 182 | RAW_EXTENSION **res, size_t *len, int init); |
7d152a3c | 183 | __owur int tls_parse_extension(SSL *s, TLSEXT_INDEX idx, int context, |
f63a17d6 | 184 | RAW_EXTENSION *exts, X509 *x, size_t chainidx); |
4b299b8e | 185 | __owur int tls_parse_all_extensions(SSL *s, int context, RAW_EXTENSION *exts, |
f63a17d6 | 186 | X509 *x, size_t chainidx, int fin); |
43ae5eed MC |
187 | __owur int should_add_extension(SSL *s, unsigned int extctx, |
188 | unsigned int thisctx, int max_version); | |
4b299b8e | 189 | __owur int tls_construct_extensions(SSL *s, WPACKET *pkt, unsigned int context, |
f63a17d6 | 190 | X509 *x, size_t chainidx); |
25670f3e | 191 | |
1053a6e2 MC |
192 | __owur int tls_psk_do_binder(SSL *s, const EVP_MD *md, |
193 | const unsigned char *msgstart, | |
194 | size_t binderoffset, const unsigned char *binderin, | |
195 | unsigned char *binderout, | |
3a7c56b2 | 196 | SSL_SESSION *sess, int sign, int external); |
1053a6e2 | 197 | |
25670f3e | 198 | /* Server Extension processing */ |
61138358 | 199 | int tls_parse_ctos_renegotiate(SSL *s, PACKET *pkt, unsigned int context, |
f63a17d6 | 200 | X509 *x, size_t chainidx); |
61138358 | 201 | int tls_parse_ctos_server_name(SSL *s, PACKET *pkt, unsigned int context, |
f63a17d6 | 202 | X509 *x, size_t chainidx); |
cf72c757 | 203 | int tls_parse_ctos_maxfragmentlen(SSL *s, PACKET *pkt, unsigned int context, |
f63a17d6 | 204 | X509 *x, size_t chainidx); |
25670f3e | 205 | #ifndef OPENSSL_NO_SRP |
61138358 | 206 | int tls_parse_ctos_srp(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 207 | size_t chainidx); |
25670f3e | 208 | #endif |
0a87d0ac | 209 | int tls_parse_ctos_early_data(SSL *s, PACKET *pkt, unsigned int context, |
f63a17d6 | 210 | X509 *x, size_t chainidx); |
61138358 | 211 | int tls_parse_ctos_ec_pt_formats(SSL *s, PACKET *pkt, unsigned int context, |
f63a17d6 | 212 | X509 *x, size_t chainidx); |
61138358 | 213 | int tls_parse_ctos_supported_groups(SSL *s, PACKET *pkt, unsigned int context, |
f63a17d6 | 214 | X509 *x, size_t chainidxl); |
61138358 | 215 | int tls_parse_ctos_session_ticket(SSL *s, PACKET *pkt, unsigned int context, |
f63a17d6 | 216 | X509 *x, size_t chainidx); |
c589c34e BK |
217 | int tls_parse_ctos_sig_algs_cert(SSL *s, PACKET *pkt, unsigned int context, |
218 | X509 *x, size_t chainidx); | |
61138358 | 219 | int tls_parse_ctos_sig_algs(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 220 | size_t chainidx); |
ab83e314 | 221 | #ifndef OPENSSL_NO_OCSP |
61138358 | 222 | int tls_parse_ctos_status_request(SSL *s, PACKET *pkt, unsigned int context, |
f63a17d6 | 223 | X509 *x, size_t chainidx); |
ab83e314 | 224 | #endif |
25670f3e | 225 | #ifndef OPENSSL_NO_NEXTPROTONEG |
61138358 | 226 | int tls_parse_ctos_npn(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 227 | size_t chainidx); |
25670f3e | 228 | #endif |
61138358 | 229 | int tls_parse_ctos_alpn(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 230 | size_t chainidx); |
25670f3e | 231 | #ifndef OPENSSL_NO_SRTP |
61138358 | 232 | int tls_parse_ctos_use_srtp(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 233 | size_t chainidx); |
25670f3e | 234 | #endif |
61138358 | 235 | int tls_parse_ctos_etm(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 236 | size_t chainidx); |
61138358 | 237 | int tls_parse_ctos_key_share(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 238 | size_t chainidx); |
43054d3d MC |
239 | int tls_parse_ctos_cookie(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
240 | size_t chainidx); | |
61138358 | 241 | int tls_parse_ctos_ems(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 242 | size_t chainidx); |
61138358 | 243 | int tls_parse_ctos_psk_kex_modes(SSL *s, PACKET *pkt, unsigned int context, |
f63a17d6 | 244 | X509 *x, size_t chainidx); |
61138358 | 245 | int tls_parse_ctos_psk(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 246 | size_t chainidx); |
9d75dce3 TS |
247 | int tls_parse_ctos_post_handshake_auth(SSL *, PACKET *pkt, unsigned int context, |
248 | X509 *x, size_t chainidx); | |
7da160b0 | 249 | |
b186a592 MC |
250 | EXT_RETURN tls_construct_stoc_renegotiate(SSL *s, WPACKET *pkt, |
251 | unsigned int context, X509 *x, | |
f63a17d6 | 252 | size_t chainidx); |
b186a592 MC |
253 | EXT_RETURN tls_construct_stoc_server_name(SSL *s, WPACKET *pkt, |
254 | unsigned int context, X509 *x, | |
f63a17d6 | 255 | size_t chainidx); |
b186a592 MC |
256 | EXT_RETURN tls_construct_stoc_early_data(SSL *s, WPACKET *pkt, |
257 | unsigned int context, X509 *x, | |
f63a17d6 | 258 | size_t chainidx); |
cf72c757 F |
259 | EXT_RETURN tls_construct_stoc_maxfragmentlen(SSL *s, WPACKET *pkt, |
260 | unsigned int context, X509 *x, | |
f63a17d6 | 261 | size_t chainidx); |
b186a592 MC |
262 | EXT_RETURN tls_construct_stoc_ec_pt_formats(SSL *s, WPACKET *pkt, |
263 | unsigned int context, X509 *x, | |
f63a17d6 | 264 | size_t chainidx); |
b186a592 MC |
265 | EXT_RETURN tls_construct_stoc_supported_groups(SSL *s, WPACKET *pkt, |
266 | unsigned int context, X509 *x, | |
f63a17d6 | 267 | size_t chainidx); |
b186a592 MC |
268 | EXT_RETURN tls_construct_stoc_session_ticket(SSL *s, WPACKET *pkt, |
269 | unsigned int context, X509 *x, | |
f63a17d6 | 270 | size_t chainidx); |
ab83e314 | 271 | #ifndef OPENSSL_NO_OCSP |
b186a592 MC |
272 | EXT_RETURN tls_construct_stoc_status_request(SSL *s, WPACKET *pkt, |
273 | unsigned int context, X509 *x, | |
f63a17d6 | 274 | size_t chainidx); |
ab83e314 MC |
275 | #endif |
276 | #ifndef OPENSSL_NO_NEXTPROTONEG | |
b186a592 MC |
277 | EXT_RETURN tls_construct_stoc_next_proto_neg(SSL *s, WPACKET *pkt, |
278 | unsigned int context, X509 *x, | |
f63a17d6 | 279 | size_t chainidx); |
ab83e314 | 280 | #endif |
b186a592 | 281 | EXT_RETURN tls_construct_stoc_alpn(SSL *s, WPACKET *pkt, unsigned int context, |
f63a17d6 | 282 | X509 *x, size_t chainidx); |
ab83e314 | 283 | #ifndef OPENSSL_NO_SRTP |
b186a592 | 284 | EXT_RETURN tls_construct_stoc_use_srtp(SSL *s, WPACKET *pkt, unsigned int context, |
f63a17d6 | 285 | X509 *x, size_t chainidx); |
ab83e314 | 286 | #endif |
b186a592 | 287 | EXT_RETURN tls_construct_stoc_etm(SSL *s, WPACKET *pkt, unsigned int context, |
f63a17d6 | 288 | X509 *x, size_t chainidx); |
b186a592 | 289 | EXT_RETURN tls_construct_stoc_ems(SSL *s, WPACKET *pkt, unsigned int context, |
f63a17d6 | 290 | X509 *x, size_t chainidx); |
88050dd1 MC |
291 | EXT_RETURN tls_construct_stoc_supported_versions(SSL *s, WPACKET *pkt, |
292 | unsigned int context, X509 *x, | |
293 | size_t chainidx); | |
b186a592 MC |
294 | EXT_RETURN tls_construct_stoc_key_share(SSL *s, WPACKET *pkt, |
295 | unsigned int context, X509 *x, | |
f63a17d6 | 296 | size_t chainidx); |
43054d3d MC |
297 | EXT_RETURN tls_construct_stoc_cookie(SSL *s, WPACKET *pkt, unsigned int context, |
298 | X509 *x, size_t chainidx); | |
7da160b0 MC |
299 | /* |
300 | * Not in public headers as this is not an official extension. Only used when | |
301 | * SSL_OP_CRYPTOPRO_TLSEXT_BUG is set. | |
302 | */ | |
303 | #define TLSEXT_TYPE_cryptopro_bug 0xfde8 | |
b186a592 MC |
304 | EXT_RETURN tls_construct_stoc_cryptopro_bug(SSL *s, WPACKET *pkt, |
305 | unsigned int context, X509 *x, | |
f63a17d6 | 306 | size_t chainidx); |
b186a592 | 307 | EXT_RETURN tls_construct_stoc_psk(SSL *s, WPACKET *pkt, unsigned int context, |
f63a17d6 | 308 | X509 *x, size_t chainidx); |
6dd083fd MC |
309 | |
310 | /* Client Extension processing */ | |
b186a592 | 311 | EXT_RETURN tls_construct_ctos_renegotiate(SSL *s, WPACKET *pkt, unsigned int context, |
f63a17d6 | 312 | X509 *x, size_t chainidx); |
b186a592 | 313 | EXT_RETURN tls_construct_ctos_server_name(SSL *s, WPACKET *pkt, unsigned int context, |
f63a17d6 | 314 | X509 *x, size_t chainidx); |
cf72c757 | 315 | EXT_RETURN tls_construct_ctos_maxfragmentlen(SSL *s, WPACKET *pkt, unsigned int context, |
f63a17d6 | 316 | X509 *x, size_t chainidx); |
ab83e314 | 317 | #ifndef OPENSSL_NO_SRP |
b186a592 | 318 | EXT_RETURN tls_construct_ctos_srp(SSL *s, WPACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 319 | size_t chainidx); |
ab83e314 | 320 | #endif |
b186a592 MC |
321 | EXT_RETURN tls_construct_ctos_ec_pt_formats(SSL *s, WPACKET *pkt, |
322 | unsigned int context, X509 *x, | |
f63a17d6 | 323 | size_t chainidx); |
b186a592 MC |
324 | EXT_RETURN tls_construct_ctos_supported_groups(SSL *s, WPACKET *pkt, |
325 | unsigned int context, X509 *x, | |
f63a17d6 | 326 | size_t chainidx); |
dbc6268f | 327 | |
b186a592 MC |
328 | EXT_RETURN tls_construct_ctos_early_data(SSL *s, WPACKET *pkt, |
329 | unsigned int context, X509 *x, | |
f63a17d6 | 330 | size_t chainidx); |
b186a592 MC |
331 | EXT_RETURN tls_construct_ctos_session_ticket(SSL *s, WPACKET *pkt, |
332 | unsigned int context, X509 *x, | |
f63a17d6 | 333 | size_t chainidx); |
b186a592 MC |
334 | EXT_RETURN tls_construct_ctos_sig_algs(SSL *s, WPACKET *pkt, |
335 | unsigned int context, X509 *x, | |
f63a17d6 | 336 | size_t chainidx); |
ab83e314 | 337 | #ifndef OPENSSL_NO_OCSP |
b186a592 MC |
338 | EXT_RETURN tls_construct_ctos_status_request(SSL *s, WPACKET *pkt, |
339 | unsigned int context, X509 *x, | |
f63a17d6 | 340 | size_t chainidx); |
ab83e314 MC |
341 | #endif |
342 | #ifndef OPENSSL_NO_NEXTPROTONEG | |
b186a592 | 343 | EXT_RETURN tls_construct_ctos_npn(SSL *s, WPACKET *pkt, unsigned int context, |
f63a17d6 | 344 | X509 *x, size_t chainidx); |
ab83e314 | 345 | #endif |
b186a592 | 346 | EXT_RETURN tls_construct_ctos_alpn(SSL *s, WPACKET *pkt, unsigned int context, |
f63a17d6 | 347 | X509 *x, size_t chainidx); |
ab83e314 | 348 | #ifndef OPENSSL_NO_SRTP |
b186a592 | 349 | EXT_RETURN tls_construct_ctos_use_srtp(SSL *s, WPACKET *pkt, unsigned int context, |
f63a17d6 | 350 | X509 *x, size_t chainidx); |
ab83e314 | 351 | #endif |
b186a592 | 352 | EXT_RETURN tls_construct_ctos_etm(SSL *s, WPACKET *pkt, unsigned int context, |
f63a17d6 | 353 | X509 *x, size_t chainidx); |
ab83e314 | 354 | #ifndef OPENSSL_NO_CT |
b186a592 | 355 | EXT_RETURN tls_construct_ctos_sct(SSL *s, WPACKET *pkt, unsigned int context, |
f63a17d6 | 356 | X509 *x, size_t chainidx); |
ab83e314 | 357 | #endif |
b186a592 | 358 | EXT_RETURN tls_construct_ctos_ems(SSL *s, WPACKET *pkt, unsigned int context, |
f63a17d6 | 359 | X509 *x, size_t chainidx); |
b186a592 MC |
360 | EXT_RETURN tls_construct_ctos_supported_versions(SSL *s, WPACKET *pkt, |
361 | unsigned int context, X509 *x, | |
f63a17d6 | 362 | size_t chainidx); |
b186a592 MC |
363 | EXT_RETURN tls_construct_ctos_key_share(SSL *s, WPACKET *pkt, |
364 | unsigned int context, X509 *x, | |
f63a17d6 | 365 | size_t chainidx); |
b186a592 MC |
366 | EXT_RETURN tls_construct_ctos_psk_kex_modes(SSL *s, WPACKET *pkt, |
367 | unsigned int context, X509 *x, | |
f63a17d6 | 368 | size_t chainidx); |
b186a592 | 369 | EXT_RETURN tls_construct_ctos_cookie(SSL *s, WPACKET *pkt, unsigned int context, |
f63a17d6 | 370 | X509 *x, size_t chainidx); |
b186a592 MC |
371 | EXT_RETURN tls_construct_ctos_padding(SSL *s, WPACKET *pkt, |
372 | unsigned int context, X509 *x, | |
f63a17d6 | 373 | size_t chainidx); |
b186a592 | 374 | EXT_RETURN tls_construct_ctos_psk(SSL *s, WPACKET *pkt, unsigned int context, |
f63a17d6 | 375 | X509 *x, size_t chainidx); |
9d75dce3 TS |
376 | EXT_RETURN tls_construct_ctos_post_handshake_auth(SSL *s, WPACKET *pkt, unsigned int context, |
377 | X509 *x, size_t chainidx); | |
378 | ||
61138358 | 379 | int tls_parse_stoc_renegotiate(SSL *s, PACKET *pkt, unsigned int context, |
f63a17d6 | 380 | X509 *x, size_t chainidx); |
61138358 | 381 | int tls_parse_stoc_server_name(SSL *s, PACKET *pkt, unsigned int context, |
f63a17d6 | 382 | X509 *x, size_t chainidx); |
b2cc7f31 | 383 | int tls_parse_stoc_early_data(SSL *s, PACKET *pkt, unsigned int context, |
f63a17d6 | 384 | X509 *x, size_t chainidx); |
cf72c757 | 385 | int tls_parse_stoc_maxfragmentlen(SSL *s, PACKET *pkt, unsigned int context, |
f63a17d6 | 386 | X509 *x, size_t chainidx); |
61138358 | 387 | int tls_parse_stoc_ec_pt_formats(SSL *s, PACKET *pkt, unsigned int context, |
f63a17d6 | 388 | X509 *x, size_t chainidx); |
61138358 | 389 | int tls_parse_stoc_session_ticket(SSL *s, PACKET *pkt, unsigned int context, |
f63a17d6 | 390 | X509 *x, size_t chainidx); |
ab83e314 | 391 | #ifndef OPENSSL_NO_OCSP |
61138358 | 392 | int tls_parse_stoc_status_request(SSL *s, PACKET *pkt, unsigned int context, |
f63a17d6 | 393 | X509 *x, size_t chainidx); |
ab83e314 | 394 | #endif |
6dd083fd | 395 | #ifndef OPENSSL_NO_CT |
61138358 | 396 | int tls_parse_stoc_sct(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 397 | size_t chainidx); |
6dd083fd MC |
398 | #endif |
399 | #ifndef OPENSSL_NO_NEXTPROTONEG | |
61138358 | 400 | int tls_parse_stoc_npn(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 401 | size_t chainidx); |
6dd083fd | 402 | #endif |
61138358 | 403 | int tls_parse_stoc_alpn(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 404 | size_t chainidx); |
6dd083fd | 405 | #ifndef OPENSSL_NO_SRTP |
61138358 | 406 | int tls_parse_stoc_use_srtp(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 407 | size_t chainidx); |
6dd083fd | 408 | #endif |
61138358 | 409 | int tls_parse_stoc_etm(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 410 | size_t chainidx); |
61138358 | 411 | int tls_parse_stoc_ems(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 412 | size_t chainidx); |
88050dd1 MC |
413 | int tls_parse_stoc_supported_versions(SSL *s, PACKET *pkt, unsigned int context, |
414 | X509 *x, size_t chainidx); | |
61138358 | 415 | int tls_parse_stoc_key_share(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 416 | size_t chainidx); |
cfef5027 | 417 | int tls_parse_stoc_cookie(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 418 | size_t chainidx); |
61138358 | 419 | int tls_parse_stoc_psk(SSL *s, PACKET *pkt, unsigned int context, X509 *x, |
f63a17d6 | 420 | size_t chainidx); |
630369d9 | 421 | |
f63a17d6 | 422 | int tls_handle_alpn(SSL *s); |
9d75dce3 TS |
423 | |
424 | int tls13_save_handshake_digest_for_pha(SSL *s); | |
425 | int tls13_restore_handshake_digest_for_pha(SSL *s); |