2 * Copyright 2015-2020 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
10 /*****************************************************************************
12 * The following definitions are PRIVATE to the state machine. They should *
13 * NOT be used outside of the state machine. *
15 *****************************************************************************/
17 /* Max message length definitions */
19 /* The spec allows for a longer length than this, but we limit it */
20 #define HELLO_VERIFY_REQUEST_MAX_LENGTH 258
21 #define END_OF_EARLY_DATA_MAX_LENGTH 0
22 #define HELLO_RETRY_REQUEST_MAX_LENGTH 20000
23 #define ENCRYPTED_EXTENSIONS_MAX_LENGTH 20000
24 #define SERVER_KEY_EXCH_MAX_LENGTH 102400
25 #define SERVER_HELLO_DONE_MAX_LENGTH 0
26 #define KEY_UPDATE_MAX_LENGTH 1
27 #define CCS_MAX_LENGTH 1
29 /* Max ServerHello size permitted by RFC 8446 */
30 #define SERVER_HELLO_MAX_LENGTH 65607
32 /* Max should actually be 36 but we are generous */
33 #define FINISHED_MAX_LENGTH 64
35 /* Dummy message type */
36 #define SSL3_MT_DUMMY -1
38 extern const unsigned char hrrrandom
[];
40 /* Message processing return codes */
42 /* Something bad happened */
44 /* We've finished reading - swap to writing */
45 MSG_PROCESS_FINISHED_READING
,
47 * We've completed the main processing of this message but there is some
48 * post processing to be done.
50 MSG_PROCESS_CONTINUE_PROCESSING
,
51 /* We've finished this message - read the next message */
52 MSG_PROCESS_CONTINUE_READING
55 typedef int (*confunc_f
) (SSL
*s
, WPACKET
*pkt
);
57 int ssl3_take_mac(SSL
*s
);
58 int check_in_list(SSL
*s
, uint16_t group_id
, const uint16_t *groups
,
59 size_t num_groups
, int checkallow
);
60 int create_synthetic_message_hash(SSL
*s
, const unsigned char *hashval
,
61 size_t hashlen
, const unsigned char *hrr
,
63 int parse_ca_names(SSL
*s
, PACKET
*pkt
);
64 const STACK_OF(X509_NAME
) *get_ca_names(SSL
*s
);
65 int construct_ca_names(SSL
*s
, const STACK_OF(X509_NAME
) *ca_sk
, WPACKET
*pkt
);
66 size_t construct_key_exchange_tbs(SSL
*s
, unsigned char **ptbs
,
67 const void *param
, size_t paramlen
);
70 * TLS/DTLS client state machine functions
72 int ossl_statem_client_read_transition(SSL
*s
, int mt
);
73 WRITE_TRAN
ossl_statem_client_write_transition(SSL
*s
);
74 WORK_STATE
ossl_statem_client_pre_work(SSL
*s
, WORK_STATE wst
);
75 WORK_STATE
ossl_statem_client_post_work(SSL
*s
, WORK_STATE wst
);
76 int ossl_statem_client_construct_message(SSL
*s
, WPACKET
*pkt
,
77 confunc_f
*confunc
, int *mt
);
78 size_t ossl_statem_client_max_message_size(SSL
*s
);
79 MSG_PROCESS_RETURN
ossl_statem_client_process_message(SSL
*s
, PACKET
*pkt
);
80 WORK_STATE
ossl_statem_client_post_process_message(SSL
*s
, WORK_STATE wst
);
83 * TLS/DTLS server state machine functions
85 int ossl_statem_server_read_transition(SSL
*s
, int mt
);
86 WRITE_TRAN
ossl_statem_server_write_transition(SSL
*s
);
87 WORK_STATE
ossl_statem_server_pre_work(SSL
*s
, WORK_STATE wst
);
88 WORK_STATE
ossl_statem_server_post_work(SSL
*s
, WORK_STATE wst
);
89 int ossl_statem_server_construct_message(SSL
*s
, WPACKET
*pkt
,
90 confunc_f
*confunc
,int *mt
);
91 size_t ossl_statem_server_max_message_size(SSL
*s
);
92 MSG_PROCESS_RETURN
ossl_statem_server_process_message(SSL
*s
, PACKET
*pkt
);
93 WORK_STATE
ossl_statem_server_post_process_message(SSL
*s
, WORK_STATE wst
);
95 /* Functions for getting new message data */
96 __owur
int tls_get_message_header(SSL
*s
, int *mt
);
97 __owur
int tls_get_message_body(SSL
*s
, size_t *len
);
98 __owur
int dtls_get_message(SSL
*s
, int *mt
, size_t *len
);
100 /* Message construction and processing functions */
101 __owur
int tls_process_initial_server_flight(SSL
*s
);
102 __owur MSG_PROCESS_RETURN
tls_process_change_cipher_spec(SSL
*s
, PACKET
*pkt
);
103 __owur MSG_PROCESS_RETURN
tls_process_finished(SSL
*s
, PACKET
*pkt
);
104 __owur
int tls_construct_change_cipher_spec(SSL
*s
, WPACKET
*pkt
);
105 __owur
int dtls_construct_change_cipher_spec(SSL
*s
, WPACKET
*pkt
);
107 __owur
int tls_construct_finished(SSL
*s
, WPACKET
*pkt
);
108 __owur
int tls_construct_key_update(SSL
*s
, WPACKET
*pkt
);
109 __owur MSG_PROCESS_RETURN
tls_process_key_update(SSL
*s
, PACKET
*pkt
);
110 __owur WORK_STATE
tls_finish_handshake(SSL
*s
, WORK_STATE wst
, int clearbufs
,
112 __owur WORK_STATE
dtls_wait_for_dry(SSL
*s
);
114 /* some client-only functions */
115 __owur
int tls_construct_client_hello(SSL
*s
, WPACKET
*pkt
);
116 __owur MSG_PROCESS_RETURN
tls_process_server_hello(SSL
*s
, PACKET
*pkt
);
117 __owur MSG_PROCESS_RETURN
tls_process_certificate_request(SSL
*s
, PACKET
*pkt
);
118 __owur MSG_PROCESS_RETURN
tls_process_new_session_ticket(SSL
*s
, PACKET
*pkt
);
119 __owur
int tls_process_cert_status_body(SSL
*s
, PACKET
*pkt
);
120 __owur MSG_PROCESS_RETURN
tls_process_cert_status(SSL
*s
, PACKET
*pkt
);
121 __owur MSG_PROCESS_RETURN
tls_process_server_done(SSL
*s
, PACKET
*pkt
);
122 __owur
int tls_construct_cert_verify(SSL
*s
, WPACKET
*pkt
);
123 __owur WORK_STATE
tls_prepare_client_certificate(SSL
*s
, WORK_STATE wst
);
124 __owur
int tls_construct_client_certificate(SSL
*s
, WPACKET
*pkt
);
125 __owur
int ssl_do_client_cert_cb(SSL
*s
, X509
**px509
, EVP_PKEY
**ppkey
);
126 __owur
int tls_construct_client_key_exchange(SSL
*s
, WPACKET
*pkt
);
127 __owur
int tls_client_key_exchange_post_work(SSL
*s
);
128 __owur
int tls_construct_cert_status_body(SSL
*s
, WPACKET
*pkt
);
129 __owur
int tls_construct_cert_status(SSL
*s
, WPACKET
*pkt
);
130 __owur MSG_PROCESS_RETURN
tls_process_key_exchange(SSL
*s
, PACKET
*pkt
);
131 __owur MSG_PROCESS_RETURN
tls_process_server_certificate(SSL
*s
, PACKET
*pkt
);
132 __owur WORK_STATE
tls_post_process_server_certificate(SSL
*s
, WORK_STATE wst
);
133 __owur
int ssl3_check_cert_and_algorithm(SSL
*s
);
134 #ifndef OPENSSL_NO_NEXTPROTONEG
135 __owur
int tls_construct_next_proto(SSL
*s
, WPACKET
*pkt
);
137 __owur MSG_PROCESS_RETURN
tls_process_hello_req(SSL
*s
, PACKET
*pkt
);
138 __owur MSG_PROCESS_RETURN
dtls_process_hello_verify(SSL
*s
, PACKET
*pkt
);
139 __owur
int tls_construct_end_of_early_data(SSL
*s
, WPACKET
*pkt
);
141 /* some server-only functions */
142 __owur MSG_PROCESS_RETURN
tls_process_client_hello(SSL
*s
, PACKET
*pkt
);
143 __owur WORK_STATE
tls_post_process_client_hello(SSL
*s
, WORK_STATE wst
);
144 __owur
int tls_construct_server_hello(SSL
*s
, WPACKET
*pkt
);
145 __owur
int dtls_construct_hello_verify_request(SSL
*s
, WPACKET
*pkt
);
146 __owur
int tls_construct_server_certificate(SSL
*s
, WPACKET
*pkt
);
147 __owur
int tls_construct_server_key_exchange(SSL
*s
, WPACKET
*pkt
);
148 __owur
int tls_construct_certificate_request(SSL
*s
, WPACKET
*pkt
);
149 __owur
int tls_construct_server_done(SSL
*s
, WPACKET
*pkt
);
150 __owur MSG_PROCESS_RETURN
tls_process_client_certificate(SSL
*s
, PACKET
*pkt
);
151 __owur MSG_PROCESS_RETURN
tls_process_client_key_exchange(SSL
*s
, PACKET
*pkt
);
152 __owur WORK_STATE
tls_post_process_client_key_exchange(SSL
*s
, WORK_STATE wst
);
153 __owur MSG_PROCESS_RETURN
tls_process_cert_verify(SSL
*s
, PACKET
*pkt
);
154 #ifndef OPENSSL_NO_NEXTPROTONEG
155 __owur MSG_PROCESS_RETURN
tls_process_next_proto(SSL
*s
, PACKET
*pkt
);
157 __owur
int tls_construct_new_session_ticket(SSL
*s
, WPACKET
*pkt
);
158 MSG_PROCESS_RETURN
tls_process_end_of_early_data(SSL
*s
, PACKET
*pkt
);
160 #ifndef OPENSSL_NO_GOST
161 /* These functions are used in GOST18 CKE, both for client and server */
162 int gost18_cke_cipher_nid(const SSL
*s
);
163 int gost_ukm(const SSL
*s
, unsigned char *dgst_buf
);
166 /* Extension processing */
168 typedef enum ext_return_en
{
174 __owur
int tls_validate_all_contexts(SSL
*s
, unsigned int thisctx
,
175 RAW_EXTENSION
*exts
);
176 __owur
int extension_is_relevant(SSL
*s
, unsigned int extctx
,
177 unsigned int thisctx
);
178 __owur
int tls_collect_extensions(SSL
*s
, PACKET
*packet
, unsigned int context
,
179 RAW_EXTENSION
**res
, size_t *len
, int init
);
180 __owur
int tls_parse_extension(SSL
*s
, TLSEXT_INDEX idx
, int context
,
181 RAW_EXTENSION
*exts
, X509
*x
, size_t chainidx
);
182 __owur
int tls_parse_all_extensions(SSL
*s
, int context
, RAW_EXTENSION
*exts
,
183 X509
*x
, size_t chainidx
, int fin
);
184 __owur
int should_add_extension(SSL
*s
, unsigned int extctx
,
185 unsigned int thisctx
, int max_version
);
186 __owur
int tls_construct_extensions(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
187 X509
*x
, size_t chainidx
);
189 __owur
int tls_psk_do_binder(SSL
*s
, const EVP_MD
*md
,
190 const unsigned char *msgstart
,
191 size_t binderoffset
, const unsigned char *binderin
,
192 unsigned char *binderout
,
193 SSL_SESSION
*sess
, int sign
, int external
);
195 /* Server Extension processing */
196 int tls_parse_ctos_renegotiate(SSL
*s
, PACKET
*pkt
, unsigned int context
,
197 X509
*x
, size_t chainidx
);
198 int tls_parse_ctos_server_name(SSL
*s
, PACKET
*pkt
, unsigned int context
,
199 X509
*x
, size_t chainidx
);
200 int tls_parse_ctos_maxfragmentlen(SSL
*s
, PACKET
*pkt
, unsigned int context
,
201 X509
*x
, size_t chainidx
);
202 #ifndef OPENSSL_NO_SRP
203 int tls_parse_ctos_srp(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
206 int tls_parse_ctos_early_data(SSL
*s
, PACKET
*pkt
, unsigned int context
,
207 X509
*x
, size_t chainidx
);
208 #ifndef OPENSSL_NO_EC
209 int tls_parse_ctos_ec_pt_formats(SSL
*s
, PACKET
*pkt
, unsigned int context
,
210 X509
*x
, size_t chainidx
);
212 int tls_parse_ctos_supported_groups(SSL
*s
, PACKET
*pkt
, unsigned int context
,
213 X509
*x
, size_t chainidxl
);
214 int tls_parse_ctos_session_ticket(SSL
*s
, PACKET
*pkt
, unsigned int context
,
215 X509
*x
, size_t chainidx
);
216 int tls_parse_ctos_sig_algs_cert(SSL
*s
, PACKET
*pkt
, unsigned int context
,
217 X509
*x
, size_t chainidx
);
218 int tls_parse_ctos_sig_algs(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
220 #ifndef OPENSSL_NO_OCSP
221 int tls_parse_ctos_status_request(SSL
*s
, PACKET
*pkt
, unsigned int context
,
222 X509
*x
, size_t chainidx
);
224 #ifndef OPENSSL_NO_NEXTPROTONEG
225 int tls_parse_ctos_npn(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
228 int tls_parse_ctos_alpn(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
230 #ifndef OPENSSL_NO_SRTP
231 int tls_parse_ctos_use_srtp(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
234 int tls_parse_ctos_etm(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
236 int tls_parse_ctos_key_share(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
238 int tls_parse_ctos_cookie(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
240 int tls_parse_ctos_ems(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
242 int tls_parse_ctos_psk_kex_modes(SSL
*s
, PACKET
*pkt
, unsigned int context
,
243 X509
*x
, size_t chainidx
);
244 int tls_parse_ctos_psk(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
246 int tls_parse_ctos_post_handshake_auth(SSL
*, PACKET
*pkt
, unsigned int context
,
247 X509
*x
, size_t chainidx
);
249 EXT_RETURN
tls_construct_stoc_renegotiate(SSL
*s
, WPACKET
*pkt
,
250 unsigned int context
, X509
*x
,
252 EXT_RETURN
tls_construct_stoc_server_name(SSL
*s
, WPACKET
*pkt
,
253 unsigned int context
, X509
*x
,
255 EXT_RETURN
tls_construct_stoc_early_data(SSL
*s
, WPACKET
*pkt
,
256 unsigned int context
, X509
*x
,
258 EXT_RETURN
tls_construct_stoc_maxfragmentlen(SSL
*s
, WPACKET
*pkt
,
259 unsigned int context
, X509
*x
,
261 #ifndef OPENSSL_NO_EC
262 EXT_RETURN
tls_construct_stoc_ec_pt_formats(SSL
*s
, WPACKET
*pkt
,
263 unsigned int context
, X509
*x
,
266 EXT_RETURN
tls_construct_stoc_supported_groups(SSL
*s
, WPACKET
*pkt
,
267 unsigned int context
, X509
*x
,
269 EXT_RETURN
tls_construct_stoc_session_ticket(SSL
*s
, WPACKET
*pkt
,
270 unsigned int context
, X509
*x
,
272 #ifndef OPENSSL_NO_OCSP
273 EXT_RETURN
tls_construct_stoc_status_request(SSL
*s
, WPACKET
*pkt
,
274 unsigned int context
, X509
*x
,
277 #ifndef OPENSSL_NO_NEXTPROTONEG
278 EXT_RETURN
tls_construct_stoc_next_proto_neg(SSL
*s
, WPACKET
*pkt
,
279 unsigned int context
, X509
*x
,
282 EXT_RETURN
tls_construct_stoc_alpn(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
283 X509
*x
, size_t chainidx
);
284 #ifndef OPENSSL_NO_SRTP
285 EXT_RETURN
tls_construct_stoc_use_srtp(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
286 X509
*x
, size_t chainidx
);
288 EXT_RETURN
tls_construct_stoc_etm(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
289 X509
*x
, size_t chainidx
);
290 EXT_RETURN
tls_construct_stoc_ems(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
291 X509
*x
, size_t chainidx
);
292 EXT_RETURN
tls_construct_stoc_supported_versions(SSL
*s
, WPACKET
*pkt
,
293 unsigned int context
, X509
*x
,
295 EXT_RETURN
tls_construct_stoc_key_share(SSL
*s
, WPACKET
*pkt
,
296 unsigned int context
, X509
*x
,
298 EXT_RETURN
tls_construct_stoc_cookie(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
299 X509
*x
, size_t chainidx
);
301 * Not in public headers as this is not an official extension. Only used when
302 * SSL_OP_CRYPTOPRO_TLSEXT_BUG is set.
304 #define TLSEXT_TYPE_cryptopro_bug 0xfde8
305 EXT_RETURN
tls_construct_stoc_cryptopro_bug(SSL
*s
, WPACKET
*pkt
,
306 unsigned int context
, X509
*x
,
308 EXT_RETURN
tls_construct_stoc_psk(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
309 X509
*x
, size_t chainidx
);
311 /* Client Extension processing */
312 EXT_RETURN
tls_construct_ctos_renegotiate(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
313 X509
*x
, size_t chainidx
);
314 EXT_RETURN
tls_construct_ctos_server_name(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
315 X509
*x
, size_t chainidx
);
316 EXT_RETURN
tls_construct_ctos_maxfragmentlen(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
317 X509
*x
, size_t chainidx
);
318 #ifndef OPENSSL_NO_SRP
319 EXT_RETURN
tls_construct_ctos_srp(SSL
*s
, WPACKET
*pkt
, unsigned int context
, X509
*x
,
322 #ifndef OPENSSL_NO_EC
323 EXT_RETURN
tls_construct_ctos_ec_pt_formats(SSL
*s
, WPACKET
*pkt
,
324 unsigned int context
, X509
*x
,
327 EXT_RETURN
tls_construct_ctos_supported_groups(SSL
*s
, WPACKET
*pkt
,
328 unsigned int context
, X509
*x
,
331 EXT_RETURN
tls_construct_ctos_early_data(SSL
*s
, WPACKET
*pkt
,
332 unsigned int context
, X509
*x
,
334 EXT_RETURN
tls_construct_ctos_session_ticket(SSL
*s
, WPACKET
*pkt
,
335 unsigned int context
, X509
*x
,
337 EXT_RETURN
tls_construct_ctos_sig_algs(SSL
*s
, WPACKET
*pkt
,
338 unsigned int context
, X509
*x
,
340 #ifndef OPENSSL_NO_OCSP
341 EXT_RETURN
tls_construct_ctos_status_request(SSL
*s
, WPACKET
*pkt
,
342 unsigned int context
, X509
*x
,
345 #ifndef OPENSSL_NO_NEXTPROTONEG
346 EXT_RETURN
tls_construct_ctos_npn(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
347 X509
*x
, size_t chainidx
);
349 EXT_RETURN
tls_construct_ctos_alpn(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
350 X509
*x
, size_t chainidx
);
351 #ifndef OPENSSL_NO_SRTP
352 EXT_RETURN
tls_construct_ctos_use_srtp(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
353 X509
*x
, size_t chainidx
);
355 EXT_RETURN
tls_construct_ctos_etm(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
356 X509
*x
, size_t chainidx
);
357 #ifndef OPENSSL_NO_CT
358 EXT_RETURN
tls_construct_ctos_sct(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
359 X509
*x
, size_t chainidx
);
361 EXT_RETURN
tls_construct_ctos_ems(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
362 X509
*x
, size_t chainidx
);
363 EXT_RETURN
tls_construct_ctos_supported_versions(SSL
*s
, WPACKET
*pkt
,
364 unsigned int context
, X509
*x
,
366 EXT_RETURN
tls_construct_ctos_key_share(SSL
*s
, WPACKET
*pkt
,
367 unsigned int context
, X509
*x
,
369 EXT_RETURN
tls_construct_ctos_psk_kex_modes(SSL
*s
, WPACKET
*pkt
,
370 unsigned int context
, X509
*x
,
372 EXT_RETURN
tls_construct_ctos_cookie(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
373 X509
*x
, size_t chainidx
);
374 EXT_RETURN
tls_construct_ctos_padding(SSL
*s
, WPACKET
*pkt
,
375 unsigned int context
, X509
*x
,
377 EXT_RETURN
tls_construct_ctos_psk(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
378 X509
*x
, size_t chainidx
);
379 EXT_RETURN
tls_construct_ctos_post_handshake_auth(SSL
*s
, WPACKET
*pkt
, unsigned int context
,
380 X509
*x
, size_t chainidx
);
382 int tls_parse_stoc_renegotiate(SSL
*s
, PACKET
*pkt
, unsigned int context
,
383 X509
*x
, size_t chainidx
);
384 int tls_parse_stoc_server_name(SSL
*s
, PACKET
*pkt
, unsigned int context
,
385 X509
*x
, size_t chainidx
);
386 int tls_parse_stoc_early_data(SSL
*s
, PACKET
*pkt
, unsigned int context
,
387 X509
*x
, size_t chainidx
);
388 int tls_parse_stoc_maxfragmentlen(SSL
*s
, PACKET
*pkt
, unsigned int context
,
389 X509
*x
, size_t chainidx
);
390 #ifndef OPENSSL_NO_EC
391 int tls_parse_stoc_ec_pt_formats(SSL
*s
, PACKET
*pkt
, unsigned int context
,
392 X509
*x
, size_t chainidx
);
394 int tls_parse_stoc_session_ticket(SSL
*s
, PACKET
*pkt
, unsigned int context
,
395 X509
*x
, size_t chainidx
);
396 #ifndef OPENSSL_NO_OCSP
397 int tls_parse_stoc_status_request(SSL
*s
, PACKET
*pkt
, unsigned int context
,
398 X509
*x
, size_t chainidx
);
400 #ifndef OPENSSL_NO_CT
401 int tls_parse_stoc_sct(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
404 #ifndef OPENSSL_NO_NEXTPROTONEG
405 int tls_parse_stoc_npn(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
408 int tls_parse_stoc_alpn(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
410 #ifndef OPENSSL_NO_SRTP
411 int tls_parse_stoc_use_srtp(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
414 int tls_parse_stoc_etm(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
416 int tls_parse_stoc_ems(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
418 int tls_parse_stoc_supported_versions(SSL
*s
, PACKET
*pkt
, unsigned int context
,
419 X509
*x
, size_t chainidx
);
420 int tls_parse_stoc_key_share(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
422 int tls_parse_stoc_cookie(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
424 int tls_parse_stoc_psk(SSL
*s
, PACKET
*pkt
, unsigned int context
, X509
*x
,
427 int tls_handle_alpn(SSL
*s
);
429 int tls13_save_handshake_digest_for_pha(SSL
*s
);
430 int tls13_restore_handshake_digest_for_pha(SSL
*s
);