]> git.ipfire.org Git - thirdparty/openssl.git/blob - ssl/statem/statem_local.h
TLS client: allow cert verify callback return -1 for SSL_ERROR_WANT_RETRY_VERIFY
[thirdparty/openssl.git] / ssl / statem / statem_local.h
1 /*
2 * Copyright 2015-2020 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10 /*****************************************************************************
11 * *
12 * The following definitions are PRIVATE to the state machine. They should *
13 * NOT be used outside of the state machine. *
14 * *
15 *****************************************************************************/
16
17 /* Max message length definitions */
18
19 /* The spec allows for a longer length than this, but we limit it */
20 #define HELLO_VERIFY_REQUEST_MAX_LENGTH 258
21 #define END_OF_EARLY_DATA_MAX_LENGTH 0
22 #define HELLO_RETRY_REQUEST_MAX_LENGTH 20000
23 #define ENCRYPTED_EXTENSIONS_MAX_LENGTH 20000
24 #define SERVER_KEY_EXCH_MAX_LENGTH 102400
25 #define SERVER_HELLO_DONE_MAX_LENGTH 0
26 #define KEY_UPDATE_MAX_LENGTH 1
27 #define CCS_MAX_LENGTH 1
28
29 /* Max ServerHello size permitted by RFC 8446 */
30 #define SERVER_HELLO_MAX_LENGTH 65607
31
32 /* Max should actually be 36 but we are generous */
33 #define FINISHED_MAX_LENGTH 64
34
35 /* Dummy message type */
36 #define SSL3_MT_DUMMY -1
37
38 extern const unsigned char hrrrandom[];
39
40 /* Message processing return codes */
41 typedef enum {
42 /* Something bad happened */
43 MSG_PROCESS_ERROR,
44 /* We've finished reading - swap to writing */
45 MSG_PROCESS_FINISHED_READING,
46 /*
47 * We've completed the main processing of this message but there is some
48 * post processing to be done.
49 */
50 MSG_PROCESS_CONTINUE_PROCESSING,
51 /* We've finished this message - read the next message */
52 MSG_PROCESS_CONTINUE_READING
53 } MSG_PROCESS_RETURN;
54
55 typedef int (*confunc_f) (SSL *s, WPACKET *pkt);
56
57 int ssl3_take_mac(SSL *s);
58 int check_in_list(SSL *s, uint16_t group_id, const uint16_t *groups,
59 size_t num_groups, int checkallow);
60 int create_synthetic_message_hash(SSL *s, const unsigned char *hashval,
61 size_t hashlen, const unsigned char *hrr,
62 size_t hrrlen);
63 int parse_ca_names(SSL *s, PACKET *pkt);
64 const STACK_OF(X509_NAME) *get_ca_names(SSL *s);
65 int construct_ca_names(SSL *s, const STACK_OF(X509_NAME) *ca_sk, WPACKET *pkt);
66 size_t construct_key_exchange_tbs(SSL *s, unsigned char **ptbs,
67 const void *param, size_t paramlen);
68
69 /*
70 * TLS/DTLS client state machine functions
71 */
72 int ossl_statem_client_read_transition(SSL *s, int mt);
73 WRITE_TRAN ossl_statem_client_write_transition(SSL *s);
74 WORK_STATE ossl_statem_client_pre_work(SSL *s, WORK_STATE wst);
75 WORK_STATE ossl_statem_client_post_work(SSL *s, WORK_STATE wst);
76 int ossl_statem_client_construct_message(SSL *s, WPACKET *pkt,
77 confunc_f *confunc, int *mt);
78 size_t ossl_statem_client_max_message_size(SSL *s);
79 MSG_PROCESS_RETURN ossl_statem_client_process_message(SSL *s, PACKET *pkt);
80 WORK_STATE ossl_statem_client_post_process_message(SSL *s, WORK_STATE wst);
81
82 /*
83 * TLS/DTLS server state machine functions
84 */
85 int ossl_statem_server_read_transition(SSL *s, int mt);
86 WRITE_TRAN ossl_statem_server_write_transition(SSL *s);
87 WORK_STATE ossl_statem_server_pre_work(SSL *s, WORK_STATE wst);
88 WORK_STATE ossl_statem_server_post_work(SSL *s, WORK_STATE wst);
89 int ossl_statem_server_construct_message(SSL *s, WPACKET *pkt,
90 confunc_f *confunc,int *mt);
91 size_t ossl_statem_server_max_message_size(SSL *s);
92 MSG_PROCESS_RETURN ossl_statem_server_process_message(SSL *s, PACKET *pkt);
93 WORK_STATE ossl_statem_server_post_process_message(SSL *s, WORK_STATE wst);
94
95 /* Functions for getting new message data */
96 __owur int tls_get_message_header(SSL *s, int *mt);
97 __owur int tls_get_message_body(SSL *s, size_t *len);
98 __owur int dtls_get_message(SSL *s, int *mt, size_t *len);
99
100 /* Message construction and processing functions */
101 __owur int tls_process_initial_server_flight(SSL *s);
102 __owur MSG_PROCESS_RETURN tls_process_change_cipher_spec(SSL *s, PACKET *pkt);
103 __owur MSG_PROCESS_RETURN tls_process_finished(SSL *s, PACKET *pkt);
104 __owur int tls_construct_change_cipher_spec(SSL *s, WPACKET *pkt);
105 __owur int dtls_construct_change_cipher_spec(SSL *s, WPACKET *pkt);
106
107 __owur int tls_construct_finished(SSL *s, WPACKET *pkt);
108 __owur int tls_construct_key_update(SSL *s, WPACKET *pkt);
109 __owur MSG_PROCESS_RETURN tls_process_key_update(SSL *s, PACKET *pkt);
110 __owur WORK_STATE tls_finish_handshake(SSL *s, WORK_STATE wst, int clearbufs,
111 int stop);
112 __owur WORK_STATE dtls_wait_for_dry(SSL *s);
113
114 /* some client-only functions */
115 __owur int tls_construct_client_hello(SSL *s, WPACKET *pkt);
116 __owur MSG_PROCESS_RETURN tls_process_server_hello(SSL *s, PACKET *pkt);
117 __owur MSG_PROCESS_RETURN tls_process_certificate_request(SSL *s, PACKET *pkt);
118 __owur MSG_PROCESS_RETURN tls_process_new_session_ticket(SSL *s, PACKET *pkt);
119 __owur int tls_process_cert_status_body(SSL *s, PACKET *pkt);
120 __owur MSG_PROCESS_RETURN tls_process_cert_status(SSL *s, PACKET *pkt);
121 __owur MSG_PROCESS_RETURN tls_process_server_done(SSL *s, PACKET *pkt);
122 __owur int tls_construct_cert_verify(SSL *s, WPACKET *pkt);
123 __owur WORK_STATE tls_prepare_client_certificate(SSL *s, WORK_STATE wst);
124 __owur int tls_construct_client_certificate(SSL *s, WPACKET *pkt);
125 __owur int ssl_do_client_cert_cb(SSL *s, X509 **px509, EVP_PKEY **ppkey);
126 __owur int tls_construct_client_key_exchange(SSL *s, WPACKET *pkt);
127 __owur int tls_client_key_exchange_post_work(SSL *s);
128 __owur int tls_construct_cert_status_body(SSL *s, WPACKET *pkt);
129 __owur int tls_construct_cert_status(SSL *s, WPACKET *pkt);
130 __owur MSG_PROCESS_RETURN tls_process_key_exchange(SSL *s, PACKET *pkt);
131 __owur MSG_PROCESS_RETURN tls_process_server_certificate(SSL *s, PACKET *pkt);
132 __owur WORK_STATE tls_post_process_server_certificate(SSL *s, WORK_STATE wst);
133 __owur int ssl3_check_cert_and_algorithm(SSL *s);
134 #ifndef OPENSSL_NO_NEXTPROTONEG
135 __owur int tls_construct_next_proto(SSL *s, WPACKET *pkt);
136 #endif
137 __owur MSG_PROCESS_RETURN tls_process_hello_req(SSL *s, PACKET *pkt);
138 __owur MSG_PROCESS_RETURN dtls_process_hello_verify(SSL *s, PACKET *pkt);
139 __owur int tls_construct_end_of_early_data(SSL *s, WPACKET *pkt);
140
141 /* some server-only functions */
142 __owur MSG_PROCESS_RETURN tls_process_client_hello(SSL *s, PACKET *pkt);
143 __owur WORK_STATE tls_post_process_client_hello(SSL *s, WORK_STATE wst);
144 __owur int tls_construct_server_hello(SSL *s, WPACKET *pkt);
145 __owur int dtls_construct_hello_verify_request(SSL *s, WPACKET *pkt);
146 __owur int tls_construct_server_certificate(SSL *s, WPACKET *pkt);
147 __owur int tls_construct_server_key_exchange(SSL *s, WPACKET *pkt);
148 __owur int tls_construct_certificate_request(SSL *s, WPACKET *pkt);
149 __owur int tls_construct_server_done(SSL *s, WPACKET *pkt);
150 __owur MSG_PROCESS_RETURN tls_process_client_certificate(SSL *s, PACKET *pkt);
151 __owur MSG_PROCESS_RETURN tls_process_client_key_exchange(SSL *s, PACKET *pkt);
152 __owur WORK_STATE tls_post_process_client_key_exchange(SSL *s, WORK_STATE wst);
153 __owur MSG_PROCESS_RETURN tls_process_cert_verify(SSL *s, PACKET *pkt);
154 #ifndef OPENSSL_NO_NEXTPROTONEG
155 __owur MSG_PROCESS_RETURN tls_process_next_proto(SSL *s, PACKET *pkt);
156 #endif
157 __owur int tls_construct_new_session_ticket(SSL *s, WPACKET *pkt);
158 MSG_PROCESS_RETURN tls_process_end_of_early_data(SSL *s, PACKET *pkt);
159
160 #ifndef OPENSSL_NO_GOST
161 /* These functions are used in GOST18 CKE, both for client and server */
162 int gost18_cke_cipher_nid(const SSL *s);
163 int gost_ukm(const SSL *s, unsigned char *dgst_buf);
164 #endif
165
166 /* Extension processing */
167
168 typedef enum ext_return_en {
169 EXT_RETURN_FAIL,
170 EXT_RETURN_SENT,
171 EXT_RETURN_NOT_SENT
172 } EXT_RETURN;
173
174 __owur int tls_validate_all_contexts(SSL *s, unsigned int thisctx,
175 RAW_EXTENSION *exts);
176 __owur int extension_is_relevant(SSL *s, unsigned int extctx,
177 unsigned int thisctx);
178 __owur int tls_collect_extensions(SSL *s, PACKET *packet, unsigned int context,
179 RAW_EXTENSION **res, size_t *len, int init);
180 __owur int tls_parse_extension(SSL *s, TLSEXT_INDEX idx, int context,
181 RAW_EXTENSION *exts, X509 *x, size_t chainidx);
182 __owur int tls_parse_all_extensions(SSL *s, int context, RAW_EXTENSION *exts,
183 X509 *x, size_t chainidx, int fin);
184 __owur int should_add_extension(SSL *s, unsigned int extctx,
185 unsigned int thisctx, int max_version);
186 __owur int tls_construct_extensions(SSL *s, WPACKET *pkt, unsigned int context,
187 X509 *x, size_t chainidx);
188
189 __owur int tls_psk_do_binder(SSL *s, const EVP_MD *md,
190 const unsigned char *msgstart,
191 size_t binderoffset, const unsigned char *binderin,
192 unsigned char *binderout,
193 SSL_SESSION *sess, int sign, int external);
194
195 /* Server Extension processing */
196 int tls_parse_ctos_renegotiate(SSL *s, PACKET *pkt, unsigned int context,
197 X509 *x, size_t chainidx);
198 int tls_parse_ctos_server_name(SSL *s, PACKET *pkt, unsigned int context,
199 X509 *x, size_t chainidx);
200 int tls_parse_ctos_maxfragmentlen(SSL *s, PACKET *pkt, unsigned int context,
201 X509 *x, size_t chainidx);
202 #ifndef OPENSSL_NO_SRP
203 int tls_parse_ctos_srp(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
204 size_t chainidx);
205 #endif
206 int tls_parse_ctos_early_data(SSL *s, PACKET *pkt, unsigned int context,
207 X509 *x, size_t chainidx);
208 #ifndef OPENSSL_NO_EC
209 int tls_parse_ctos_ec_pt_formats(SSL *s, PACKET *pkt, unsigned int context,
210 X509 *x, size_t chainidx);
211 #endif
212 int tls_parse_ctos_supported_groups(SSL *s, PACKET *pkt, unsigned int context,
213 X509 *x, size_t chainidxl);
214 int tls_parse_ctos_session_ticket(SSL *s, PACKET *pkt, unsigned int context,
215 X509 *x, size_t chainidx);
216 int tls_parse_ctos_sig_algs_cert(SSL *s, PACKET *pkt, unsigned int context,
217 X509 *x, size_t chainidx);
218 int tls_parse_ctos_sig_algs(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
219 size_t chainidx);
220 #ifndef OPENSSL_NO_OCSP
221 int tls_parse_ctos_status_request(SSL *s, PACKET *pkt, unsigned int context,
222 X509 *x, size_t chainidx);
223 #endif
224 #ifndef OPENSSL_NO_NEXTPROTONEG
225 int tls_parse_ctos_npn(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
226 size_t chainidx);
227 #endif
228 int tls_parse_ctos_alpn(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
229 size_t chainidx);
230 #ifndef OPENSSL_NO_SRTP
231 int tls_parse_ctos_use_srtp(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
232 size_t chainidx);
233 #endif
234 int tls_parse_ctos_etm(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
235 size_t chainidx);
236 int tls_parse_ctos_key_share(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
237 size_t chainidx);
238 int tls_parse_ctos_cookie(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
239 size_t chainidx);
240 int tls_parse_ctos_ems(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
241 size_t chainidx);
242 int tls_parse_ctos_psk_kex_modes(SSL *s, PACKET *pkt, unsigned int context,
243 X509 *x, size_t chainidx);
244 int tls_parse_ctos_psk(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
245 size_t chainidx);
246 int tls_parse_ctos_post_handshake_auth(SSL *, PACKET *pkt, unsigned int context,
247 X509 *x, size_t chainidx);
248
249 EXT_RETURN tls_construct_stoc_renegotiate(SSL *s, WPACKET *pkt,
250 unsigned int context, X509 *x,
251 size_t chainidx);
252 EXT_RETURN tls_construct_stoc_server_name(SSL *s, WPACKET *pkt,
253 unsigned int context, X509 *x,
254 size_t chainidx);
255 EXT_RETURN tls_construct_stoc_early_data(SSL *s, WPACKET *pkt,
256 unsigned int context, X509 *x,
257 size_t chainidx);
258 EXT_RETURN tls_construct_stoc_maxfragmentlen(SSL *s, WPACKET *pkt,
259 unsigned int context, X509 *x,
260 size_t chainidx);
261 #ifndef OPENSSL_NO_EC
262 EXT_RETURN tls_construct_stoc_ec_pt_formats(SSL *s, WPACKET *pkt,
263 unsigned int context, X509 *x,
264 size_t chainidx);
265 #endif
266 EXT_RETURN tls_construct_stoc_supported_groups(SSL *s, WPACKET *pkt,
267 unsigned int context, X509 *x,
268 size_t chainidx);
269 EXT_RETURN tls_construct_stoc_session_ticket(SSL *s, WPACKET *pkt,
270 unsigned int context, X509 *x,
271 size_t chainidx);
272 #ifndef OPENSSL_NO_OCSP
273 EXT_RETURN tls_construct_stoc_status_request(SSL *s, WPACKET *pkt,
274 unsigned int context, X509 *x,
275 size_t chainidx);
276 #endif
277 #ifndef OPENSSL_NO_NEXTPROTONEG
278 EXT_RETURN tls_construct_stoc_next_proto_neg(SSL *s, WPACKET *pkt,
279 unsigned int context, X509 *x,
280 size_t chainidx);
281 #endif
282 EXT_RETURN tls_construct_stoc_alpn(SSL *s, WPACKET *pkt, unsigned int context,
283 X509 *x, size_t chainidx);
284 #ifndef OPENSSL_NO_SRTP
285 EXT_RETURN tls_construct_stoc_use_srtp(SSL *s, WPACKET *pkt, unsigned int context,
286 X509 *x, size_t chainidx);
287 #endif
288 EXT_RETURN tls_construct_stoc_etm(SSL *s, WPACKET *pkt, unsigned int context,
289 X509 *x, size_t chainidx);
290 EXT_RETURN tls_construct_stoc_ems(SSL *s, WPACKET *pkt, unsigned int context,
291 X509 *x, size_t chainidx);
292 EXT_RETURN tls_construct_stoc_supported_versions(SSL *s, WPACKET *pkt,
293 unsigned int context, X509 *x,
294 size_t chainidx);
295 EXT_RETURN tls_construct_stoc_key_share(SSL *s, WPACKET *pkt,
296 unsigned int context, X509 *x,
297 size_t chainidx);
298 EXT_RETURN tls_construct_stoc_cookie(SSL *s, WPACKET *pkt, unsigned int context,
299 X509 *x, size_t chainidx);
300 /*
301 * Not in public headers as this is not an official extension. Only used when
302 * SSL_OP_CRYPTOPRO_TLSEXT_BUG is set.
303 */
304 #define TLSEXT_TYPE_cryptopro_bug 0xfde8
305 EXT_RETURN tls_construct_stoc_cryptopro_bug(SSL *s, WPACKET *pkt,
306 unsigned int context, X509 *x,
307 size_t chainidx);
308 EXT_RETURN tls_construct_stoc_psk(SSL *s, WPACKET *pkt, unsigned int context,
309 X509 *x, size_t chainidx);
310
311 /* Client Extension processing */
312 EXT_RETURN tls_construct_ctos_renegotiate(SSL *s, WPACKET *pkt, unsigned int context,
313 X509 *x, size_t chainidx);
314 EXT_RETURN tls_construct_ctos_server_name(SSL *s, WPACKET *pkt, unsigned int context,
315 X509 *x, size_t chainidx);
316 EXT_RETURN tls_construct_ctos_maxfragmentlen(SSL *s, WPACKET *pkt, unsigned int context,
317 X509 *x, size_t chainidx);
318 #ifndef OPENSSL_NO_SRP
319 EXT_RETURN tls_construct_ctos_srp(SSL *s, WPACKET *pkt, unsigned int context, X509 *x,
320 size_t chainidx);
321 #endif
322 #ifndef OPENSSL_NO_EC
323 EXT_RETURN tls_construct_ctos_ec_pt_formats(SSL *s, WPACKET *pkt,
324 unsigned int context, X509 *x,
325 size_t chainidx);
326 #endif
327 EXT_RETURN tls_construct_ctos_supported_groups(SSL *s, WPACKET *pkt,
328 unsigned int context, X509 *x,
329 size_t chainidx);
330
331 EXT_RETURN tls_construct_ctos_early_data(SSL *s, WPACKET *pkt,
332 unsigned int context, X509 *x,
333 size_t chainidx);
334 EXT_RETURN tls_construct_ctos_session_ticket(SSL *s, WPACKET *pkt,
335 unsigned int context, X509 *x,
336 size_t chainidx);
337 EXT_RETURN tls_construct_ctos_sig_algs(SSL *s, WPACKET *pkt,
338 unsigned int context, X509 *x,
339 size_t chainidx);
340 #ifndef OPENSSL_NO_OCSP
341 EXT_RETURN tls_construct_ctos_status_request(SSL *s, WPACKET *pkt,
342 unsigned int context, X509 *x,
343 size_t chainidx);
344 #endif
345 #ifndef OPENSSL_NO_NEXTPROTONEG
346 EXT_RETURN tls_construct_ctos_npn(SSL *s, WPACKET *pkt, unsigned int context,
347 X509 *x, size_t chainidx);
348 #endif
349 EXT_RETURN tls_construct_ctos_alpn(SSL *s, WPACKET *pkt, unsigned int context,
350 X509 *x, size_t chainidx);
351 #ifndef OPENSSL_NO_SRTP
352 EXT_RETURN tls_construct_ctos_use_srtp(SSL *s, WPACKET *pkt, unsigned int context,
353 X509 *x, size_t chainidx);
354 #endif
355 EXT_RETURN tls_construct_ctos_etm(SSL *s, WPACKET *pkt, unsigned int context,
356 X509 *x, size_t chainidx);
357 #ifndef OPENSSL_NO_CT
358 EXT_RETURN tls_construct_ctos_sct(SSL *s, WPACKET *pkt, unsigned int context,
359 X509 *x, size_t chainidx);
360 #endif
361 EXT_RETURN tls_construct_ctos_ems(SSL *s, WPACKET *pkt, unsigned int context,
362 X509 *x, size_t chainidx);
363 EXT_RETURN tls_construct_ctos_supported_versions(SSL *s, WPACKET *pkt,
364 unsigned int context, X509 *x,
365 size_t chainidx);
366 EXT_RETURN tls_construct_ctos_key_share(SSL *s, WPACKET *pkt,
367 unsigned int context, X509 *x,
368 size_t chainidx);
369 EXT_RETURN tls_construct_ctos_psk_kex_modes(SSL *s, WPACKET *pkt,
370 unsigned int context, X509 *x,
371 size_t chainidx);
372 EXT_RETURN tls_construct_ctos_cookie(SSL *s, WPACKET *pkt, unsigned int context,
373 X509 *x, size_t chainidx);
374 EXT_RETURN tls_construct_ctos_padding(SSL *s, WPACKET *pkt,
375 unsigned int context, X509 *x,
376 size_t chainidx);
377 EXT_RETURN tls_construct_ctos_psk(SSL *s, WPACKET *pkt, unsigned int context,
378 X509 *x, size_t chainidx);
379 EXT_RETURN tls_construct_ctos_post_handshake_auth(SSL *s, WPACKET *pkt, unsigned int context,
380 X509 *x, size_t chainidx);
381
382 int tls_parse_stoc_renegotiate(SSL *s, PACKET *pkt, unsigned int context,
383 X509 *x, size_t chainidx);
384 int tls_parse_stoc_server_name(SSL *s, PACKET *pkt, unsigned int context,
385 X509 *x, size_t chainidx);
386 int tls_parse_stoc_early_data(SSL *s, PACKET *pkt, unsigned int context,
387 X509 *x, size_t chainidx);
388 int tls_parse_stoc_maxfragmentlen(SSL *s, PACKET *pkt, unsigned int context,
389 X509 *x, size_t chainidx);
390 #ifndef OPENSSL_NO_EC
391 int tls_parse_stoc_ec_pt_formats(SSL *s, PACKET *pkt, unsigned int context,
392 X509 *x, size_t chainidx);
393 #endif
394 int tls_parse_stoc_session_ticket(SSL *s, PACKET *pkt, unsigned int context,
395 X509 *x, size_t chainidx);
396 #ifndef OPENSSL_NO_OCSP
397 int tls_parse_stoc_status_request(SSL *s, PACKET *pkt, unsigned int context,
398 X509 *x, size_t chainidx);
399 #endif
400 #ifndef OPENSSL_NO_CT
401 int tls_parse_stoc_sct(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
402 size_t chainidx);
403 #endif
404 #ifndef OPENSSL_NO_NEXTPROTONEG
405 int tls_parse_stoc_npn(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
406 size_t chainidx);
407 #endif
408 int tls_parse_stoc_alpn(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
409 size_t chainidx);
410 #ifndef OPENSSL_NO_SRTP
411 int tls_parse_stoc_use_srtp(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
412 size_t chainidx);
413 #endif
414 int tls_parse_stoc_etm(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
415 size_t chainidx);
416 int tls_parse_stoc_ems(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
417 size_t chainidx);
418 int tls_parse_stoc_supported_versions(SSL *s, PACKET *pkt, unsigned int context,
419 X509 *x, size_t chainidx);
420 int tls_parse_stoc_key_share(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
421 size_t chainidx);
422 int tls_parse_stoc_cookie(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
423 size_t chainidx);
424 int tls_parse_stoc_psk(SSL *s, PACKET *pkt, unsigned int context, X509 *x,
425 size_t chainidx);
426
427 int tls_handle_alpn(SSL *s);
428
429 int tls13_save_handshake_digest_for_pha(SSL *s);
430 int tls13_restore_handshake_digest_for_pha(SSL *s);