os/ossrv/ssl/libcrypto/inc/include/openssl/ssl.h
author sl@SLION-WIN7.fritz.box
Fri, 15 Jun 2012 03:10:57 +0200
changeset 0 bde4ae8d615e
permissions -rw-r--r--
First public contribution.
sl@0
     1
/* ssl/ssl.h */
sl@0
     2
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
sl@0
     3
 * All rights reserved.
sl@0
     4
 *
sl@0
     5
 * This package is an SSL implementation written
sl@0
     6
 * by Eric Young (eay@cryptsoft.com).
sl@0
     7
 * The implementation was written so as to conform with Netscapes SSL.
sl@0
     8
 * 
sl@0
     9
 * This library is free for commercial and non-commercial use as long as
sl@0
    10
 * the following conditions are aheared to.  The following conditions
sl@0
    11
 * apply to all code found in this distribution, be it the RC4, RSA,
sl@0
    12
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
sl@0
    13
 * included with this distribution is covered by the same copyright terms
sl@0
    14
 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
sl@0
    15
 * 
sl@0
    16
 * Copyright remains Eric Young's, and as such any Copyright notices in
sl@0
    17
 * the code are not to be removed.
sl@0
    18
 * If this package is used in a product, Eric Young should be given attribution
sl@0
    19
 * as the author of the parts of the library used.
sl@0
    20
 * This can be in the form of a textual message at program startup or
sl@0
    21
 * in documentation (online or textual) provided with the package.
sl@0
    22
 * 
sl@0
    23
 * Redistribution and use in source and binary forms, with or without
sl@0
    24
 * modification, are permitted provided that the following conditions
sl@0
    25
 * are met:
sl@0
    26
 * 1. Redistributions of source code must retain the copyright
sl@0
    27
 *    notice, this list of conditions and the following disclaimer.
sl@0
    28
 * 2. Redistributions in binary form must reproduce the above copyright
sl@0
    29
 *    notice, this list of conditions and the following disclaimer in the
sl@0
    30
 *    documentation and/or other materials provided with the distribution.
sl@0
    31
 * 3. All advertising materials mentioning features or use of this software
sl@0
    32
 *    must display the following acknowledgement:
sl@0
    33
 *    "This product includes cryptographic software written by
sl@0
    34
 *     Eric Young (eay@cryptsoft.com)"
sl@0
    35
 *    The word 'cryptographic' can be left out if the rouines from the library
sl@0
    36
 *    being used are not cryptographic related :-).
sl@0
    37
 * 4. If you include any Windows specific code (or a derivative thereof) from 
sl@0
    38
 *    the apps directory (application code) you must include an acknowledgement:
sl@0
    39
 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
sl@0
    40
 * 
sl@0
    41
 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
sl@0
    42
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
sl@0
    43
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
sl@0
    44
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
sl@0
    45
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
sl@0
    46
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
sl@0
    47
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
sl@0
    48
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
sl@0
    49
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
sl@0
    50
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
sl@0
    51
 * SUCH DAMAGE.
sl@0
    52
 * 
sl@0
    53
 * The licence and distribution terms for any publically available version or
sl@0
    54
 * derivative of this code cannot be changed.  i.e. this code cannot simply be
sl@0
    55
 * copied and put under another distribution licence
sl@0
    56
 * [including the GNU Public Licence.]
sl@0
    57
 */
sl@0
    58
/* ====================================================================
sl@0
    59
 * Copyright (c) 1998-2001 The OpenSSL Project.  All rights reserved.
sl@0
    60
 *
sl@0
    61
 * Redistribution and use in source and binary forms, with or without
sl@0
    62
 * modification, are permitted provided that the following conditions
sl@0
    63
 * are met:
sl@0
    64
 *
sl@0
    65
 * 1. Redistributions of source code must retain the above copyright
sl@0
    66
 *    notice, this list of conditions and the following disclaimer. 
sl@0
    67
 *
sl@0
    68
 * 2. Redistributions in binary form must reproduce the above copyright
sl@0
    69
 *    notice, this list of conditions and the following disclaimer in
sl@0
    70
 *    the documentation and/or other materials provided with the
sl@0
    71
 *    distribution.
sl@0
    72
 *
sl@0
    73
 * 3. All advertising materials mentioning features or use of this
sl@0
    74
 *    software must display the following acknowledgment:
sl@0
    75
 *    "This product includes software developed by the OpenSSL Project
sl@0
    76
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
sl@0
    77
 *
sl@0
    78
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
sl@0
    79
 *    endorse or promote products derived from this software without
sl@0
    80
 *    prior written permission. For written permission, please contact
sl@0
    81
 *    openssl-core@openssl.org.
sl@0
    82
 *
sl@0
    83
 * 5. Products derived from this software may not be called "OpenSSL"
sl@0
    84
 *    nor may "OpenSSL" appear in their names without prior written
sl@0
    85
 *    permission of the OpenSSL Project.
sl@0
    86
 *
sl@0
    87
 * 6. Redistributions of any form whatsoever must retain the following
sl@0
    88
 *    acknowledgment:
sl@0
    89
 *    "This product includes software developed by the OpenSSL Project
sl@0
    90
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
sl@0
    91
 *
sl@0
    92
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
sl@0
    93
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
sl@0
    94
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
sl@0
    95
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
sl@0
    96
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
sl@0
    97
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
sl@0
    98
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
sl@0
    99
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
sl@0
   100
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
sl@0
   101
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
sl@0
   102
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
sl@0
   103
 * OF THE POSSIBILITY OF SUCH DAMAGE.
sl@0
   104
 * ====================================================================
sl@0
   105
 *
sl@0
   106
 * This product includes cryptographic software written by Eric Young
sl@0
   107
 * (eay@cryptsoft.com).  This product includes software written by Tim
sl@0
   108
 * Hudson (tjh@cryptsoft.com).
sl@0
   109
 *
sl@0
   110
 */
sl@0
   111
/* ====================================================================
sl@0
   112
 * Copyright (c) 1998-2006 The OpenSSL Project.  All rights reserved.
sl@0
   113
 *
sl@0
   114
 * Redistribution and use in source and binary forms, with or without
sl@0
   115
 * modification, are permitted provided that the following conditions
sl@0
   116
 * are met:
sl@0
   117
 *
sl@0
   118
 * 1. Redistributions of source code must retain the above copyright
sl@0
   119
 *    notice, this list of conditions and the following disclaimer. 
sl@0
   120
 *
sl@0
   121
 * 2. Redistributions in binary form must reproduce the above copyright
sl@0
   122
 *    notice, this list of conditions and the following disclaimer in
sl@0
   123
 *    the documentation and/or other materials provided with the
sl@0
   124
 *    distribution.
sl@0
   125
 *
sl@0
   126
 * 3. All advertising materials mentioning features or use of this
sl@0
   127
 *    software must display the following acknowledgment:
sl@0
   128
 *    "This product includes software developed by the OpenSSL Project
sl@0
   129
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
sl@0
   130
 *
sl@0
   131
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
sl@0
   132
 *    endorse or promote products derived from this software without
sl@0
   133
 *    prior written permission. For written permission, please contact
sl@0
   134
 *    openssl-core@openssl.org.
sl@0
   135
 *
sl@0
   136
 * 5. Products derived from this software may not be called "OpenSSL"
sl@0
   137
 *    nor may "OpenSSL" appear in their names without prior written
sl@0
   138
 *    permission of the OpenSSL Project.
sl@0
   139
 *
sl@0
   140
 * 6. Redistributions of any form whatsoever must retain the following
sl@0
   141
 *    acknowledgment:
sl@0
   142
 *    "This product includes software developed by the OpenSSL Project
sl@0
   143
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
sl@0
   144
 *
sl@0
   145
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
sl@0
   146
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
sl@0
   147
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
sl@0
   148
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
sl@0
   149
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
sl@0
   150
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
sl@0
   151
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
sl@0
   152
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
sl@0
   153
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
sl@0
   154
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
sl@0
   155
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
sl@0
   156
 * OF THE POSSIBILITY OF SUCH DAMAGE.
sl@0
   157
 * ====================================================================
sl@0
   158
 *
sl@0
   159
 * This product includes cryptographic software written by Eric Young
sl@0
   160
 * (eay@cryptsoft.com).  This product includes software written by Tim
sl@0
   161
 * Hudson (tjh@cryptsoft.com).
sl@0
   162
 *
sl@0
   163
 */
sl@0
   164
/* ====================================================================
sl@0
   165
 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
sl@0
   166
 * ECC cipher suite support in OpenSSL originally developed by 
sl@0
   167
 * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
sl@0
   168
 */
sl@0
   169
sl@0
   170
#ifndef HEADER_SSL_H 
sl@0
   171
#define HEADER_SSL_H 
sl@0
   172
sl@0
   173
#if (defined(__SYMBIAN32__) && !defined(SYMBIAN))
sl@0
   174
#define SYMBIAN
sl@0
   175
#endif
sl@0
   176
sl@0
   177
#include <openssl/e_os2.h>
sl@0
   178
sl@0
   179
#ifndef OPENSSL_NO_COMP
sl@0
   180
#include <openssl/comp.h>
sl@0
   181
#endif
sl@0
   182
#ifndef OPENSSL_NO_BIO
sl@0
   183
#include <openssl/bio.h>
sl@0
   184
#endif
sl@0
   185
#ifndef OPENSSL_NO_DEPRECATED
sl@0
   186
#ifndef OPENSSL_NO_X509
sl@0
   187
#include <openssl/x509.h>
sl@0
   188
#endif
sl@0
   189
#include <openssl/crypto.h>
sl@0
   190
#include <openssl/lhash.h>
sl@0
   191
#include <openssl/buffer.h>
sl@0
   192
#endif
sl@0
   193
#include <openssl/pem.h>
sl@0
   194
sl@0
   195
#include <openssl/kssl.h>
sl@0
   196
#include <openssl/safestack.h>
sl@0
   197
#include <openssl/symhacks.h>
sl@0
   198
sl@0
   199
#ifdef  __cplusplus
sl@0
   200
extern "C" {
sl@0
   201
#endif
sl@0
   202
sl@0
   203
/* SSLeay version number for ASN.1 encoding of the session information */
sl@0
   204
/* Version 0 - initial version
sl@0
   205
 * Version 1 - added the optional peer certificate
sl@0
   206
 */
sl@0
   207
#define SSL_SESSION_ASN1_VERSION 0x0001
sl@0
   208
sl@0
   209
/* text strings for the ciphers */
sl@0
   210
#define SSL_TXT_NULL_WITH_MD5		SSL2_TXT_NULL_WITH_MD5			
sl@0
   211
#define SSL_TXT_RC4_128_WITH_MD5	SSL2_TXT_RC4_128_WITH_MD5		
sl@0
   212
#define SSL_TXT_RC4_128_EXPORT40_WITH_MD5 SSL2_TXT_RC4_128_EXPORT40_WITH_MD5	
sl@0
   213
#define SSL_TXT_RC2_128_CBC_WITH_MD5	SSL2_TXT_RC2_128_CBC_WITH_MD5		
sl@0
   214
#define SSL_TXT_RC2_128_CBC_EXPORT40_WITH_MD5 SSL2_TXT_RC2_128_CBC_EXPORT40_WITH_MD5	
sl@0
   215
#define SSL_TXT_IDEA_128_CBC_WITH_MD5	SSL2_TXT_IDEA_128_CBC_WITH_MD5		
sl@0
   216
#define SSL_TXT_DES_64_CBC_WITH_MD5	SSL2_TXT_DES_64_CBC_WITH_MD5		
sl@0
   217
#define SSL_TXT_DES_64_CBC_WITH_SHA	SSL2_TXT_DES_64_CBC_WITH_SHA		
sl@0
   218
#define SSL_TXT_DES_192_EDE3_CBC_WITH_MD5 SSL2_TXT_DES_192_EDE3_CBC_WITH_MD5	
sl@0
   219
#define SSL_TXT_DES_192_EDE3_CBC_WITH_SHA SSL2_TXT_DES_192_EDE3_CBC_WITH_SHA	
sl@0
   220
sl@0
   221
/*    VRS Additional Kerberos5 entries
sl@0
   222
 */
sl@0
   223
#define SSL_TXT_KRB5_DES_64_CBC_SHA   SSL3_TXT_KRB5_DES_64_CBC_SHA
sl@0
   224
#define SSL_TXT_KRB5_DES_192_CBC3_SHA SSL3_TXT_KRB5_DES_192_CBC3_SHA
sl@0
   225
#define SSL_TXT_KRB5_RC4_128_SHA      SSL3_TXT_KRB5_RC4_128_SHA
sl@0
   226
#define SSL_TXT_KRB5_IDEA_128_CBC_SHA SSL3_TXT_KRB5_IDEA_128_CBC_SHA
sl@0
   227
#define SSL_TXT_KRB5_DES_64_CBC_MD5   SSL3_TXT_KRB5_DES_64_CBC_MD5       
sl@0
   228
#define SSL_TXT_KRB5_DES_192_CBC3_MD5 SSL3_TXT_KRB5_DES_192_CBC3_MD5       
sl@0
   229
#define SSL_TXT_KRB5_RC4_128_MD5      SSL3_TXT_KRB5_RC4_128_MD5
sl@0
   230
#define SSL_TXT_KRB5_IDEA_128_CBC_MD5 SSL3_TXT_KRB5_IDEA_128_CBC_MD5 
sl@0
   231
sl@0
   232
#define SSL_TXT_KRB5_DES_40_CBC_SHA   SSL3_TXT_KRB5_DES_40_CBC_SHA 
sl@0
   233
#define SSL_TXT_KRB5_RC2_40_CBC_SHA   SSL3_TXT_KRB5_RC2_40_CBC_SHA 
sl@0
   234
#define SSL_TXT_KRB5_RC4_40_SHA	      SSL3_TXT_KRB5_RC4_40_SHA
sl@0
   235
#define SSL_TXT_KRB5_DES_40_CBC_MD5   SSL3_TXT_KRB5_DES_40_CBC_MD5 
sl@0
   236
#define SSL_TXT_KRB5_RC2_40_CBC_MD5   SSL3_TXT_KRB5_RC2_40_CBC_MD5 
sl@0
   237
#define SSL_TXT_KRB5_RC4_40_MD5	      SSL3_TXT_KRB5_RC4_40_MD5
sl@0
   238
sl@0
   239
#define SSL_TXT_KRB5_DES_40_CBC_SHA   SSL3_TXT_KRB5_DES_40_CBC_SHA
sl@0
   240
#define SSL_TXT_KRB5_DES_40_CBC_MD5   SSL3_TXT_KRB5_DES_40_CBC_MD5
sl@0
   241
#define SSL_TXT_KRB5_DES_64_CBC_SHA   SSL3_TXT_KRB5_DES_64_CBC_SHA
sl@0
   242
#define SSL_TXT_KRB5_DES_64_CBC_MD5   SSL3_TXT_KRB5_DES_64_CBC_MD5
sl@0
   243
#define SSL_TXT_KRB5_DES_192_CBC3_SHA SSL3_TXT_KRB5_DES_192_CBC3_SHA
sl@0
   244
#define SSL_TXT_KRB5_DES_192_CBC3_MD5 SSL3_TXT_KRB5_DES_192_CBC3_MD5
sl@0
   245
#define SSL_MAX_KRB5_PRINCIPAL_LENGTH  256
sl@0
   246
sl@0
   247
#define SSL_MAX_SSL_SESSION_ID_LENGTH		32
sl@0
   248
#define SSL_MAX_SID_CTX_LENGTH			32
sl@0
   249
sl@0
   250
#define SSL_MIN_RSA_MODULUS_LENGTH_IN_BYTES	(512/8)
sl@0
   251
#define SSL_MAX_KEY_ARG_LENGTH			8
sl@0
   252
#define SSL_MAX_MASTER_KEY_LENGTH		48
sl@0
   253
sl@0
   254
/* These are used to specify which ciphers to use and not to use */
sl@0
   255
#define SSL_TXT_LOW		"LOW"
sl@0
   256
#define SSL_TXT_MEDIUM		"MEDIUM"
sl@0
   257
#define SSL_TXT_HIGH		"HIGH"
sl@0
   258
#define SSL_TXT_kFZA		"kFZA"
sl@0
   259
#define	SSL_TXT_aFZA		"aFZA"
sl@0
   260
#define SSL_TXT_eFZA		"eFZA"
sl@0
   261
#define SSL_TXT_FZA		"FZA"
sl@0
   262
sl@0
   263
#define	SSL_TXT_aNULL		"aNULL"
sl@0
   264
#define	SSL_TXT_eNULL		"eNULL"
sl@0
   265
#define	SSL_TXT_NULL		"NULL"
sl@0
   266
sl@0
   267
#define SSL_TXT_kKRB5     	"kKRB5"
sl@0
   268
#define SSL_TXT_aKRB5     	"aKRB5"
sl@0
   269
#define SSL_TXT_KRB5      	"KRB5"
sl@0
   270
sl@0
   271
#define SSL_TXT_kRSA		"kRSA"
sl@0
   272
#define SSL_TXT_kDHr		"kDHr"
sl@0
   273
#define SSL_TXT_kDHd		"kDHd"
sl@0
   274
#define SSL_TXT_kEDH		"kEDH"
sl@0
   275
#define	SSL_TXT_aRSA		"aRSA"
sl@0
   276
#define	SSL_TXT_aDSS		"aDSS"
sl@0
   277
#define	SSL_TXT_aDH		"aDH"
sl@0
   278
#define	SSL_TXT_DSS		"DSS"
sl@0
   279
#define SSL_TXT_DH		"DH"
sl@0
   280
#define SSL_TXT_EDH		"EDH"
sl@0
   281
#define SSL_TXT_ADH		"ADH"
sl@0
   282
#define SSL_TXT_RSA		"RSA"
sl@0
   283
#define SSL_TXT_DES		"DES"
sl@0
   284
#define SSL_TXT_3DES		"3DES"
sl@0
   285
#define SSL_TXT_RC4		"RC4"
sl@0
   286
#define SSL_TXT_RC2		"RC2"
sl@0
   287
#define SSL_TXT_IDEA		"IDEA"
sl@0
   288
#define SSL_TXT_AES		"AES"
sl@0
   289
#define SSL_TXT_MD5		"MD5"
sl@0
   290
#define SSL_TXT_SHA1		"SHA1"
sl@0
   291
#define SSL_TXT_SHA		"SHA"
sl@0
   292
#define SSL_TXT_EXP		"EXP"
sl@0
   293
#define SSL_TXT_EXPORT		"EXPORT"
sl@0
   294
#define SSL_TXT_EXP40		"EXPORT40"
sl@0
   295
#define SSL_TXT_EXP56		"EXPORT56"
sl@0
   296
#define SSL_TXT_SSLV2		"SSLv2"
sl@0
   297
#define SSL_TXT_SSLV3		"SSLv3"
sl@0
   298
#define SSL_TXT_TLSV1		"TLSv1"
sl@0
   299
#define SSL_TXT_ALL		"ALL"
sl@0
   300
#define SSL_TXT_ECC		"ECCdraft" /* ECC ciphersuites are not yet official */
sl@0
   301
sl@0
   302
/*
sl@0
   303
 * COMPLEMENTOF* definitions. These identifiers are used to (de-select)
sl@0
   304
 * ciphers normally not being used.
sl@0
   305
 * Example: "RC4" will activate all ciphers using RC4 including ciphers
sl@0
   306
 * without authentication, which would normally disabled by DEFAULT (due
sl@0
   307
 * the "!ADH" being part of default). Therefore "RC4:!COMPLEMENTOFDEFAULT"
sl@0
   308
 * will make sure that it is also disabled in the specific selection.
sl@0
   309
 * COMPLEMENTOF* identifiers are portable between version, as adjustments
sl@0
   310
 * to the default cipher setup will also be included here.
sl@0
   311
 *
sl@0
   312
 * COMPLEMENTOFDEFAULT does not experience the same special treatment that
sl@0
   313
 * DEFAULT gets, as only selection is being done and no sorting as needed
sl@0
   314
 * for DEFAULT.
sl@0
   315
 */
sl@0
   316
#define SSL_TXT_CMPALL		"COMPLEMENTOFALL"
sl@0
   317
#define SSL_TXT_CMPDEF		"COMPLEMENTOFDEFAULT"
sl@0
   318
sl@0
   319
/* The following cipher list is used by default.
sl@0
   320
 * It also is substituted when an application-defined cipher list string
sl@0
   321
 * starts with 'DEFAULT'. */
sl@0
   322
#define SSL_DEFAULT_CIPHER_LIST	"AES:ALL:!aNULL:!eNULL:+RC4:@STRENGTH" /* low priority for RC4 */
sl@0
   323
sl@0
   324
/* Used in SSL_set_shutdown()/SSL_get_shutdown(); */
sl@0
   325
#define SSL_SENT_SHUTDOWN	1
sl@0
   326
#define SSL_RECEIVED_SHUTDOWN	2
sl@0
   327
sl@0
   328
#ifdef __cplusplus
sl@0
   329
}
sl@0
   330
#endif
sl@0
   331
sl@0
   332
#ifdef  __cplusplus
sl@0
   333
extern "C" {
sl@0
   334
#endif
sl@0
   335
sl@0
   336
#if (defined(OPENSSL_NO_RSA) || defined(OPENSSL_NO_MD5)) && !defined(OPENSSL_NO_SSL2)
sl@0
   337
#define OPENSSL_NO_SSL2
sl@0
   338
#endif
sl@0
   339
sl@0
   340
#define SSL_FILETYPE_ASN1	X509_FILETYPE_ASN1
sl@0
   341
#define SSL_FILETYPE_PEM	X509_FILETYPE_PEM
sl@0
   342
sl@0
   343
/* This is needed to stop compilers complaining about the
sl@0
   344
 * 'struct ssl_st *' function parameters used to prototype callbacks
sl@0
   345
 * in SSL_CTX. */
sl@0
   346
typedef struct ssl_st *ssl_crock_st;
sl@0
   347
sl@0
   348
/* used to hold info on the particular ciphers used */
sl@0
   349
typedef struct ssl_cipher_st
sl@0
   350
	{
sl@0
   351
	int valid;
sl@0
   352
	const char *name;		/* text name */
sl@0
   353
	unsigned long id;		/* id, 4 bytes, first is version */
sl@0
   354
	unsigned long algorithms;	/* what ciphers are used */
sl@0
   355
	unsigned long algo_strength;	/* strength and export flags */
sl@0
   356
	unsigned long algorithm2;	/* Extra flags */
sl@0
   357
	int strength_bits;		/* Number of bits really used */
sl@0
   358
	int alg_bits;			/* Number of bits for algorithm */
sl@0
   359
	unsigned long mask;		/* used for matching */
sl@0
   360
	unsigned long mask_strength;	/* also used for matching */
sl@0
   361
	} SSL_CIPHER;
sl@0
   362
sl@0
   363
DECLARE_STACK_OF(SSL_CIPHER)
sl@0
   364
sl@0
   365
typedef struct ssl_st SSL;
sl@0
   366
typedef struct ssl_ctx_st SSL_CTX;
sl@0
   367
sl@0
   368
/* Used to hold functions for SSLv2 or SSLv3/TLSv1 functions */
sl@0
   369
typedef struct ssl_method_st
sl@0
   370
	{
sl@0
   371
	int version;
sl@0
   372
	int (*ssl_new)(SSL *s);
sl@0
   373
	void (*ssl_clear)(SSL *s);
sl@0
   374
	void (*ssl_free)(SSL *s);
sl@0
   375
	int (*ssl_accept)(SSL *s);
sl@0
   376
	int (*ssl_connect)(SSL *s);
sl@0
   377
	int (*ssl_read)(SSL *s,void *buf,int len);
sl@0
   378
	int (*ssl_peek)(SSL *s,void *buf,int len);
sl@0
   379
	int (*ssl_write)(SSL *s,const void *buf,int len);
sl@0
   380
	int (*ssl_shutdown)(SSL *s);
sl@0
   381
	int (*ssl_renegotiate)(SSL *s);
sl@0
   382
	int (*ssl_renegotiate_check)(SSL *s);
sl@0
   383
	long (*ssl_get_message)(SSL *s, int st1, int stn, int mt, long
sl@0
   384
		max, int *ok);
sl@0
   385
	int (*ssl_read_bytes)(SSL *s, int type, unsigned char *buf, int len, 
sl@0
   386
		int peek);
sl@0
   387
	int (*ssl_write_bytes)(SSL *s, int type, const void *buf_, int len);
sl@0
   388
	int (*ssl_dispatch_alert)(SSL *s);
sl@0
   389
	long (*ssl_ctrl)(SSL *s,int cmd,long larg,void *parg);
sl@0
   390
	long (*ssl_ctx_ctrl)(SSL_CTX *ctx,int cmd,long larg,void *parg);
sl@0
   391
	SSL_CIPHER *(*get_cipher_by_char)(const unsigned char *ptr);
sl@0
   392
	int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr);
sl@0
   393
	int (*ssl_pending)(const SSL *s);
sl@0
   394
	int (*num_ciphers)(void);
sl@0
   395
	SSL_CIPHER *(*get_cipher)(unsigned ncipher);
sl@0
   396
	struct ssl_method_st *(*get_ssl_method)(int version);
sl@0
   397
	long (*get_timeout)(void);
sl@0
   398
	struct ssl3_enc_method *ssl3_enc; /* Extra SSLv3/TLS stuff */
sl@0
   399
	int (*ssl_version)(void);
sl@0
   400
	long (*ssl_callback_ctrl)(SSL *s, int cb_id, void (*fp)(void));
sl@0
   401
	long (*ssl_ctx_callback_ctrl)(SSL_CTX *s, int cb_id, void (*fp)(void));
sl@0
   402
	} SSL_METHOD;
sl@0
   403
sl@0
   404
/* Lets make this into an ASN.1 type structure as follows
sl@0
   405
 * SSL_SESSION_ID ::= SEQUENCE {
sl@0
   406
 *	version 		INTEGER,	-- structure version number
sl@0
   407
 *	SSLversion 		INTEGER,	-- SSL version number
sl@0
   408
 *	Cipher 			OCTET_STRING,	-- the 3 byte cipher ID
sl@0
   409
 *	Session_ID 		OCTET_STRING,	-- the Session ID
sl@0
   410
 *	Master_key 		OCTET_STRING,	-- the master key
sl@0
   411
 *	KRB5_principal		OCTET_STRING	-- optional Kerberos principal
sl@0
   412
 *	Key_Arg [ 0 ] IMPLICIT	OCTET_STRING,	-- the optional Key argument
sl@0
   413
 *	Time [ 1 ] EXPLICIT	INTEGER,	-- optional Start Time
sl@0
   414
 *	Timeout [ 2 ] EXPLICIT	INTEGER,	-- optional Timeout ins seconds
sl@0
   415
 *	Peer [ 3 ] EXPLICIT	X509,		-- optional Peer Certificate
sl@0
   416
 *	Session_ID_context [ 4 ] EXPLICIT OCTET_STRING,   -- the Session ID context
sl@0
   417
 *	Verify_result [ 5 ] EXPLICIT INTEGER    -- X509_V_... code for `Peer'
sl@0
   418
 *	Compression [6] IMPLICIT ASN1_OBJECT	-- compression OID XXXXX
sl@0
   419
 *	}
sl@0
   420
 * Look in ssl/ssl_asn1.c for more details
sl@0
   421
 * I'm using EXPLICIT tags so I can read the damn things using asn1parse :-).
sl@0
   422
 */
sl@0
   423
typedef struct ssl_session_st
sl@0
   424
	{
sl@0
   425
	int ssl_version;	/* what ssl version session info is
sl@0
   426
				 * being kept in here? */
sl@0
   427
sl@0
   428
	/* only really used in SSLv2 */
sl@0
   429
	unsigned int key_arg_length;
sl@0
   430
	unsigned char key_arg[SSL_MAX_KEY_ARG_LENGTH];
sl@0
   431
	int master_key_length;
sl@0
   432
	unsigned char master_key[SSL_MAX_MASTER_KEY_LENGTH];
sl@0
   433
	/* session_id - valid? */
sl@0
   434
	unsigned int session_id_length;
sl@0
   435
	unsigned char session_id[SSL_MAX_SSL_SESSION_ID_LENGTH];
sl@0
   436
	/* this is used to determine whether the session is being reused in
sl@0
   437
	 * the appropriate context. It is up to the application to set this,
sl@0
   438
	 * via SSL_new */
sl@0
   439
	unsigned int sid_ctx_length;
sl@0
   440
	unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH];
sl@0
   441
sl@0
   442
#ifndef OPENSSL_NO_KRB5
sl@0
   443
        unsigned int krb5_client_princ_len;
sl@0
   444
        unsigned char krb5_client_princ[SSL_MAX_KRB5_PRINCIPAL_LENGTH];
sl@0
   445
#endif /* OPENSSL_NO_KRB5 */
sl@0
   446
sl@0
   447
	int not_resumable;
sl@0
   448
sl@0
   449
	/* The cert is the certificate used to establish this connection */
sl@0
   450
	struct sess_cert_st /* SESS_CERT */ *sess_cert;
sl@0
   451
sl@0
   452
	/* This is the cert for the other end.
sl@0
   453
	 * On clients, it will be the same as sess_cert->peer_key->x509
sl@0
   454
	 * (the latter is not enough as sess_cert is not retained
sl@0
   455
	 * in the external representation of sessions, see ssl_asn1.c). */
sl@0
   456
	X509 *peer;
sl@0
   457
	/* when app_verify_callback accepts a session where the peer's certificate
sl@0
   458
	 * is not ok, we must remember the error for session reuse: */
sl@0
   459
	long verify_result; /* only for servers */
sl@0
   460
sl@0
   461
	int references;
sl@0
   462
	long timeout;
sl@0
   463
	long time;
sl@0
   464
sl@0
   465
	int compress_meth;		/* Need to lookup the method */
sl@0
   466
sl@0
   467
	SSL_CIPHER *cipher;
sl@0
   468
	unsigned long cipher_id;	/* when ASN.1 loaded, this
sl@0
   469
					 * needs to be used to load
sl@0
   470
					 * the 'cipher' structure */
sl@0
   471
sl@0
   472
	STACK_OF(SSL_CIPHER) *ciphers; /* shared ciphers? */
sl@0
   473
sl@0
   474
	CRYPTO_EX_DATA ex_data; /* application specific data */
sl@0
   475
sl@0
   476
	/* These are used to make removal of session-ids more
sl@0
   477
	 * efficient and to implement a maximum cache size. */
sl@0
   478
	struct ssl_session_st *prev,*next;
sl@0
   479
sl@0
   480
	} SSL_SESSION;
sl@0
   481
sl@0
   482
sl@0
   483
#define SSL_OP_MICROSOFT_SESS_ID_BUG			0x00000001L
sl@0
   484
#define SSL_OP_NETSCAPE_CHALLENGE_BUG			0x00000002L
sl@0
   485
#define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG		0x00000008L
sl@0
   486
#define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG		0x00000010L
sl@0
   487
#define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER		0x00000020L
sl@0
   488
#define SSL_OP_MSIE_SSLV2_RSA_PADDING			0x00000040L /* no effect since 0.9.7h and 0.9.8b */
sl@0
   489
#define SSL_OP_SSLEAY_080_CLIENT_DH_BUG			0x00000080L
sl@0
   490
#define SSL_OP_TLS_D5_BUG				0x00000100L
sl@0
   491
#define SSL_OP_TLS_BLOCK_PADDING_BUG			0x00000200L
sl@0
   492
sl@0
   493
/* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added
sl@0
   494
 * in OpenSSL 0.9.6d.  Usually (depending on the application protocol)
sl@0
   495
 * the workaround is not needed.  Unfortunately some broken SSL/TLS
sl@0
   496
 * implementations cannot handle it at all, which is why we include
sl@0
   497
 * it in SSL_OP_ALL. */
sl@0
   498
#define SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS              0x00000800L /* added in 0.9.6e */
sl@0
   499
sl@0
   500
/* SSL_OP_ALL: various bug workarounds that should be rather harmless.
sl@0
   501
 *             This used to be 0x000FFFFFL before 0.9.7. */
sl@0
   502
#define SSL_OP_ALL					0x00000FFFL
sl@0
   503
sl@0
   504
/* DTLS options */
sl@0
   505
#define SSL_OP_NO_QUERY_MTU                 0x00001000L
sl@0
   506
/* Turn on Cookie Exchange (on relevant for servers) */
sl@0
   507
#define SSL_OP_COOKIE_EXCHANGE              0x00002000L
sl@0
   508
/* Don't use RFC4507 ticket extension */
sl@0
   509
#define SSL_OP_NO_TICKET	            0x00004000L
sl@0
   510
sl@0
   511
/* As server, disallow session resumption on renegotiation */
sl@0
   512
#define SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION	0x00010000L
sl@0
   513
/* If set, always create a new key when using tmp_ecdh parameters */
sl@0
   514
#define SSL_OP_SINGLE_ECDH_USE				0x00080000L
sl@0
   515
/* If set, always create a new key when using tmp_dh parameters */
sl@0
   516
#define SSL_OP_SINGLE_DH_USE				0x00100000L
sl@0
   517
/* Set to always use the tmp_rsa key when doing RSA operations,
sl@0
   518
 * even when this violates protocol specs */
sl@0
   519
#define SSL_OP_EPHEMERAL_RSA				0x00200000L
sl@0
   520
/* Set on servers to choose the cipher according to the server's
sl@0
   521
 * preferences */
sl@0
   522
#define SSL_OP_CIPHER_SERVER_PREFERENCE			0x00400000L
sl@0
   523
/* If set, a server will allow a client to issue a SSLv3.0 version number
sl@0
   524
 * as latest version supported in the premaster secret, even when TLSv1.0
sl@0
   525
 * (version 3.1) was announced in the client hello. Normally this is
sl@0
   526
 * forbidden to prevent version rollback attacks. */
sl@0
   527
#define SSL_OP_TLS_ROLLBACK_BUG				0x00800000L
sl@0
   528
sl@0
   529
#define SSL_OP_NO_SSLv2					0x01000000L
sl@0
   530
#define SSL_OP_NO_SSLv3					0x02000000L
sl@0
   531
#define SSL_OP_NO_TLSv1					0x04000000L
sl@0
   532
sl@0
   533
/* The next flag deliberately changes the ciphertest, this is a check
sl@0
   534
 * for the PKCS#1 attack */
sl@0
   535
#define SSL_OP_PKCS1_CHECK_1				0x08000000L
sl@0
   536
#define SSL_OP_PKCS1_CHECK_2				0x10000000L
sl@0
   537
#define SSL_OP_NETSCAPE_CA_DN_BUG			0x20000000L
sl@0
   538
#define SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG		0x40000000L
sl@0
   539
sl@0
   540
sl@0
   541
/* Allow SSL_write(..., n) to return r with 0 < r < n (i.e. report success
sl@0
   542
 * when just a single record has been written): */
sl@0
   543
#define SSL_MODE_ENABLE_PARTIAL_WRITE       0x00000001L
sl@0
   544
/* Make it possible to retry SSL_write() with changed buffer location
sl@0
   545
 * (buffer contents must stay the same!); this is not the default to avoid
sl@0
   546
 * the misconception that non-blocking SSL_write() behaves like
sl@0
   547
 * non-blocking write(): */
sl@0
   548
#define SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER 0x00000002L
sl@0
   549
/* Never bother the application with retries if the transport
sl@0
   550
 * is blocking: */
sl@0
   551
#define SSL_MODE_AUTO_RETRY 0x00000004L
sl@0
   552
/* Don't attempt to automatically build certificate chain */
sl@0
   553
#define SSL_MODE_NO_AUTO_CHAIN 0x00000008L
sl@0
   554
sl@0
   555
sl@0
   556
/* Note: SSL[_CTX]_set_{options,mode} use |= op on the previous value,
sl@0
   557
 * they cannot be used to clear bits. */
sl@0
   558
sl@0
   559
#define SSL_CTX_set_options(ctx,op) \
sl@0
   560
	SSL_CTX_ctrl((ctx),SSL_CTRL_OPTIONS,(op),NULL)
sl@0
   561
#define SSL_CTX_get_options(ctx) \
sl@0
   562
	SSL_CTX_ctrl((ctx),SSL_CTRL_OPTIONS,0,NULL)
sl@0
   563
#define SSL_set_options(ssl,op) \
sl@0
   564
	SSL_ctrl((ssl),SSL_CTRL_OPTIONS,(op),NULL)
sl@0
   565
#define SSL_get_options(ssl) \
sl@0
   566
        SSL_ctrl((ssl),SSL_CTRL_OPTIONS,0,NULL)
sl@0
   567
sl@0
   568
#define SSL_CTX_set_mode(ctx,op) \
sl@0
   569
	SSL_CTX_ctrl((ctx),SSL_CTRL_MODE,(op),NULL)
sl@0
   570
#define SSL_CTX_get_mode(ctx) \
sl@0
   571
	SSL_CTX_ctrl((ctx),SSL_CTRL_MODE,0,NULL)
sl@0
   572
#define SSL_set_mode(ssl,op) \
sl@0
   573
	SSL_ctrl((ssl),SSL_CTRL_MODE,(op),NULL)
sl@0
   574
#define SSL_get_mode(ssl) \
sl@0
   575
        SSL_ctrl((ssl),SSL_CTRL_MODE,0,NULL)
sl@0
   576
#define SSL_set_mtu(ssl, mtu) \
sl@0
   577
        SSL_ctrl((ssl),SSL_CTRL_SET_MTU,(mtu),NULL)
sl@0
   578
sl@0
   579
sl@0
   580
IMPORT_C void SSL_CTX_set_msg_callback(SSL_CTX *ctx, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg));
sl@0
   581
IMPORT_C void SSL_set_msg_callback(SSL *ssl, void (*cb)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg));
sl@0
   582
#define SSL_CTX_set_msg_callback_arg(ctx, arg) SSL_CTX_ctrl((ctx), SSL_CTRL_SET_MSG_CALLBACK_ARG, 0, (arg))
sl@0
   583
#define SSL_set_msg_callback_arg(ssl, arg) SSL_ctrl((ssl), SSL_CTRL_SET_MSG_CALLBACK_ARG, 0, (arg))
sl@0
   584
sl@0
   585
sl@0
   586
sl@0
   587
#if defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_WIN32)
sl@0
   588
#define SSL_MAX_CERT_LIST_DEFAULT 1024*30 /* 30k max cert list :-) */
sl@0
   589
#else
sl@0
   590
#define SSL_MAX_CERT_LIST_DEFAULT 1024*100 /* 100k max cert list :-) */
sl@0
   591
#endif
sl@0
   592
sl@0
   593
#define SSL_SESSION_CACHE_MAX_SIZE_DEFAULT	(1024*20)
sl@0
   594
sl@0
   595
/* This callback type is used inside SSL_CTX, SSL, and in the functions that set
sl@0
   596
 * them. It is used to override the generation of SSL/TLS session IDs in a
sl@0
   597
 * server. Return value should be zero on an error, non-zero to proceed. Also,
sl@0
   598
 * callbacks should themselves check if the id they generate is unique otherwise
sl@0
   599
 * the SSL handshake will fail with an error - callbacks can do this using the
sl@0
   600
 * 'ssl' value they're passed by;
sl@0
   601
 *      SSL_has_matching_session_id(ssl, id, *id_len)
sl@0
   602
 * The length value passed in is set at the maximum size the session ID can be.
sl@0
   603
 * In SSLv2 this is 16 bytes, whereas SSLv3/TLSv1 it is 32 bytes. The callback
sl@0
   604
 * can alter this length to be less if desired, but under SSLv2 session IDs are
sl@0
   605
 * supposed to be fixed at 16 bytes so the id will be padded after the callback
sl@0
   606
 * returns in this case. It is also an error for the callback to set the size to
sl@0
   607
 * zero. */
sl@0
   608
typedef int (*GEN_SESSION_CB)(const SSL *ssl, unsigned char *id,
sl@0
   609
				unsigned int *id_len);
sl@0
   610
sl@0
   611
typedef struct ssl_comp_st
sl@0
   612
	{
sl@0
   613
	int id;
sl@0
   614
	const char *name;
sl@0
   615
#ifndef OPENSSL_NO_COMP
sl@0
   616
	COMP_METHOD *method;
sl@0
   617
#else
sl@0
   618
	char *method;
sl@0
   619
#endif
sl@0
   620
	} SSL_COMP;
sl@0
   621
sl@0
   622
DECLARE_STACK_OF(SSL_COMP)
sl@0
   623
sl@0
   624
struct ssl_ctx_st
sl@0
   625
	{
sl@0
   626
	SSL_METHOD *method;
sl@0
   627
sl@0
   628
	STACK_OF(SSL_CIPHER) *cipher_list;
sl@0
   629
	/* same as above but sorted for lookup */
sl@0
   630
	STACK_OF(SSL_CIPHER) *cipher_list_by_id;
sl@0
   631
sl@0
   632
	struct x509_store_st /* X509_STORE */ *cert_store;
sl@0
   633
	struct lhash_st /* LHASH */ *sessions;	/* a set of SSL_SESSIONs */
sl@0
   634
	/* Most session-ids that will be cached, default is
sl@0
   635
	 * SSL_SESSION_CACHE_MAX_SIZE_DEFAULT. 0 is unlimited. */
sl@0
   636
	unsigned long session_cache_size;
sl@0
   637
	struct ssl_session_st *session_cache_head;
sl@0
   638
	struct ssl_session_st *session_cache_tail;
sl@0
   639
sl@0
   640
	/* This can have one of 2 values, ored together,
sl@0
   641
	 * SSL_SESS_CACHE_CLIENT,
sl@0
   642
	 * SSL_SESS_CACHE_SERVER,
sl@0
   643
	 * Default is SSL_SESSION_CACHE_SERVER, which means only
sl@0
   644
	 * SSL_accept which cache SSL_SESSIONS. */
sl@0
   645
	int session_cache_mode;
sl@0
   646
sl@0
   647
	/* If timeout is not 0, it is the default timeout value set
sl@0
   648
	 * when SSL_new() is called.  This has been put in to make
sl@0
   649
	 * life easier to set things up */
sl@0
   650
	long session_timeout;
sl@0
   651
sl@0
   652
	/* If this callback is not null, it will be called each
sl@0
   653
	 * time a session id is added to the cache.  If this function
sl@0
   654
	 * returns 1, it means that the callback will do a
sl@0
   655
	 * SSL_SESSION_free() when it has finished using it.  Otherwise,
sl@0
   656
	 * on 0, it means the callback has finished with it.
sl@0
   657
	 * If remove_session_cb is not null, it will be called when
sl@0
   658
	 * a session-id is removed from the cache.  After the call,
sl@0
   659
	 * OpenSSL will SSL_SESSION_free() it. */
sl@0
   660
	int (*new_session_cb)(struct ssl_st *ssl,SSL_SESSION *sess);
sl@0
   661
	void (*remove_session_cb)(struct ssl_ctx_st *ctx,SSL_SESSION *sess);
sl@0
   662
	SSL_SESSION *(*get_session_cb)(struct ssl_st *ssl,
sl@0
   663
		unsigned char *data,int len,int *copy);
sl@0
   664
sl@0
   665
	struct
sl@0
   666
		{
sl@0
   667
		int sess_connect;	/* SSL new conn - started */
sl@0
   668
		int sess_connect_renegotiate;/* SSL reneg - requested */
sl@0
   669
		int sess_connect_good;	/* SSL new conne/reneg - finished */
sl@0
   670
		int sess_accept;	/* SSL new accept - started */
sl@0
   671
		int sess_accept_renegotiate;/* SSL reneg - requested */
sl@0
   672
		int sess_accept_good;	/* SSL accept/reneg - finished */
sl@0
   673
		int sess_miss;		/* session lookup misses  */
sl@0
   674
		int sess_timeout;	/* reuse attempt on timeouted session */
sl@0
   675
		int sess_cache_full;	/* session removed due to full cache */
sl@0
   676
		int sess_hit;		/* session reuse actually done */
sl@0
   677
		int sess_cb_hit;	/* session-id that was not
sl@0
   678
					 * in the cache was
sl@0
   679
					 * passed back via the callback.  This
sl@0
   680
					 * indicates that the application is
sl@0
   681
					 * supplying session-id's from other
sl@0
   682
					 * processes - spooky :-) */
sl@0
   683
		} stats;
sl@0
   684
sl@0
   685
	int references;
sl@0
   686
sl@0
   687
	/* if defined, these override the X509_verify_cert() calls */
sl@0
   688
	int (*app_verify_callback)(X509_STORE_CTX *, void *);
sl@0
   689
	void *app_verify_arg;
sl@0
   690
	/* before OpenSSL 0.9.7, 'app_verify_arg' was ignored
sl@0
   691
	 * ('app_verify_callback' was called with just one argument) */
sl@0
   692
sl@0
   693
	/* Default password callback. */
sl@0
   694
	pem_password_cb *default_passwd_callback;
sl@0
   695
sl@0
   696
	/* Default password callback user data. */
sl@0
   697
	void *default_passwd_callback_userdata;
sl@0
   698
sl@0
   699
	/* get client cert callback */
sl@0
   700
	int (*client_cert_cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey);
sl@0
   701
sl@0
   702
    /* cookie generate callback */
sl@0
   703
    int (*app_gen_cookie_cb)(SSL *ssl, unsigned char *cookie, 
sl@0
   704
        unsigned int *cookie_len);
sl@0
   705
sl@0
   706
    /* verify cookie callback */
sl@0
   707
    int (*app_verify_cookie_cb)(SSL *ssl, unsigned char *cookie, 
sl@0
   708
        unsigned int cookie_len);
sl@0
   709
sl@0
   710
	CRYPTO_EX_DATA ex_data;
sl@0
   711
sl@0
   712
	const EVP_MD *rsa_md5;/* For SSLv2 - name is 'ssl2-md5' */
sl@0
   713
	const EVP_MD *md5;	/* For SSLv3/TLSv1 'ssl3-md5' */
sl@0
   714
	const EVP_MD *sha1;   /* For SSLv3/TLSv1 'ssl3->sha1' */
sl@0
   715
sl@0
   716
	STACK_OF(X509) *extra_certs;
sl@0
   717
	STACK_OF(SSL_COMP) *comp_methods; /* stack of SSL_COMP, SSLv3/TLSv1 */
sl@0
   718
sl@0
   719
sl@0
   720
	/* Default values used when no per-SSL value is defined follow */
sl@0
   721
sl@0
   722
	void (*info_callback)(const SSL *ssl,int type,int val); /* used if SSL's info_callback is NULL */
sl@0
   723
sl@0
   724
	/* what we put in client cert requests */
sl@0
   725
	STACK_OF(X509_NAME) *client_CA;
sl@0
   726
sl@0
   727
sl@0
   728
	/* Default values to use in SSL structures follow (these are copied by SSL_new) */
sl@0
   729
sl@0
   730
	unsigned long options;
sl@0
   731
	unsigned long mode;
sl@0
   732
	long max_cert_list;
sl@0
   733
sl@0
   734
	struct cert_st /* CERT */ *cert;
sl@0
   735
	int read_ahead;
sl@0
   736
sl@0
   737
	/* callback that allows applications to peek at protocol messages */
sl@0
   738
	void (*msg_callback)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg);
sl@0
   739
	void *msg_callback_arg;
sl@0
   740
sl@0
   741
	int verify_mode;
sl@0
   742
	unsigned int sid_ctx_length;
sl@0
   743
	unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH];
sl@0
   744
	int (*default_verify_callback)(int ok,X509_STORE_CTX *ctx); /* called 'verify_callback' in the SSL */
sl@0
   745
sl@0
   746
	/* Default generate session ID callback. */
sl@0
   747
	GEN_SESSION_CB generate_session_id;
sl@0
   748
sl@0
   749
	X509_VERIFY_PARAM *param;
sl@0
   750
sl@0
   751
#if 0
sl@0
   752
	int purpose;		/* Purpose setting */
sl@0
   753
	int trust;		/* Trust setting */
sl@0
   754
#endif
sl@0
   755
sl@0
   756
	int quiet_shutdown;
sl@0
   757
sl@0
   758
sl@0
   759
sl@0
   760
	};
sl@0
   761
sl@0
   762
#define SSL_SESS_CACHE_OFF			0x0000
sl@0
   763
#define SSL_SESS_CACHE_CLIENT			0x0001
sl@0
   764
#define SSL_SESS_CACHE_SERVER			0x0002
sl@0
   765
#define SSL_SESS_CACHE_BOTH	(SSL_SESS_CACHE_CLIENT|SSL_SESS_CACHE_SERVER)
sl@0
   766
#define SSL_SESS_CACHE_NO_AUTO_CLEAR		0x0080
sl@0
   767
/* enough comments already ... see SSL_CTX_set_session_cache_mode(3) */
sl@0
   768
#define SSL_SESS_CACHE_NO_INTERNAL_LOOKUP	0x0100
sl@0
   769
#define SSL_SESS_CACHE_NO_INTERNAL_STORE	0x0200
sl@0
   770
#define SSL_SESS_CACHE_NO_INTERNAL \
sl@0
   771
	(SSL_SESS_CACHE_NO_INTERNAL_LOOKUP|SSL_SESS_CACHE_NO_INTERNAL_STORE)
sl@0
   772
sl@0
   773
IMPORT_C  struct lhash_st *SSL_CTX_sessions(SSL_CTX *ctx);
sl@0
   774
#define SSL_CTX_sess_number(ctx) \
sl@0
   775
	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_NUMBER,0,NULL)
sl@0
   776
#define SSL_CTX_sess_connect(ctx) \
sl@0
   777
	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CONNECT,0,NULL)
sl@0
   778
#define SSL_CTX_sess_connect_good(ctx) \
sl@0
   779
	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CONNECT_GOOD,0,NULL)
sl@0
   780
#define SSL_CTX_sess_connect_renegotiate(ctx) \
sl@0
   781
	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CONNECT_RENEGOTIATE,0,NULL)
sl@0
   782
#define SSL_CTX_sess_accept(ctx) \
sl@0
   783
	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_ACCEPT,0,NULL)
sl@0
   784
#define SSL_CTX_sess_accept_renegotiate(ctx) \
sl@0
   785
	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_ACCEPT_RENEGOTIATE,0,NULL)
sl@0
   786
#define SSL_CTX_sess_accept_good(ctx) \
sl@0
   787
	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_ACCEPT_GOOD,0,NULL)
sl@0
   788
#define SSL_CTX_sess_hits(ctx) \
sl@0
   789
	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_HIT,0,NULL)
sl@0
   790
#define SSL_CTX_sess_cb_hits(ctx) \
sl@0
   791
	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CB_HIT,0,NULL)
sl@0
   792
#define SSL_CTX_sess_misses(ctx) \
sl@0
   793
	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_MISSES,0,NULL)
sl@0
   794
#define SSL_CTX_sess_timeouts(ctx) \
sl@0
   795
	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_TIMEOUTS,0,NULL)
sl@0
   796
#define SSL_CTX_sess_cache_full(ctx) \
sl@0
   797
	SSL_CTX_ctrl(ctx,SSL_CTRL_SESS_CACHE_FULL,0,NULL)
sl@0
   798
sl@0
   799
void SSL_CTX_sess_set_new_cb(SSL_CTX *ctx, int (*new_session_cb)(struct ssl_st *ssl,SSL_SESSION *sess));
sl@0
   800
int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(struct ssl_st *ssl, SSL_SESSION *sess);
sl@0
   801
void SSL_CTX_sess_set_remove_cb(SSL_CTX *ctx, void (*remove_session_cb)(struct ssl_ctx_st *ctx,SSL_SESSION *sess));
sl@0
   802
void (*SSL_CTX_sess_get_remove_cb(SSL_CTX *ctx))(struct ssl_ctx_st *ctx, SSL_SESSION *sess);
sl@0
   803
void SSL_CTX_sess_set_get_cb(SSL_CTX *ctx, SSL_SESSION *(*get_session_cb)(struct ssl_st *ssl, unsigned char *data,int len,int *copy));
sl@0
   804
SSL_SESSION *(*SSL_CTX_sess_get_get_cb(SSL_CTX *ctx))(struct ssl_st *ssl, unsigned char *Data, int len, int *copy);
sl@0
   805
void SSL_CTX_set_info_callback(SSL_CTX *ctx, void (*cb)(const SSL *ssl,int type,int val));
sl@0
   806
void (*SSL_CTX_get_info_callback(SSL_CTX *ctx))(const SSL *ssl,int type,int val);
sl@0
   807
void SSL_CTX_set_client_cert_cb(SSL_CTX *ctx, int (*client_cert_cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey));
sl@0
   808
int (*SSL_CTX_get_client_cert_cb(SSL_CTX *ctx))(SSL *ssl, X509 **x509, EVP_PKEY **pkey);
sl@0
   809
void SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx, int (*app_gen_cookie_cb)(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len));
sl@0
   810
void SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx, int (*app_verify_cookie_cb)(SSL *ssl, unsigned char *cookie, unsigned int cookie_len));
sl@0
   811
sl@0
   812
#define SSL_NOTHING	1
sl@0
   813
#define SSL_WRITING	2
sl@0
   814
#define SSL_READING	3
sl@0
   815
#define SSL_X509_LOOKUP	4
sl@0
   816
sl@0
   817
/* These will only be used when doing non-blocking IO */
sl@0
   818
#define SSL_want_nothing(s)	(SSL_want(s) == SSL_NOTHING)
sl@0
   819
#define SSL_want_read(s)	(SSL_want(s) == SSL_READING)
sl@0
   820
#define SSL_want_write(s)	(SSL_want(s) == SSL_WRITING)
sl@0
   821
#define SSL_want_x509_lookup(s)	(SSL_want(s) == SSL_X509_LOOKUP)
sl@0
   822
sl@0
   823
struct ssl_st
sl@0
   824
	{
sl@0
   825
	/* protocol version
sl@0
   826
	 * (one of SSL2_VERSION, SSL3_VERSION, TLS1_VERSION, DTLS1_VERSION)
sl@0
   827
	 */
sl@0
   828
	int version;
sl@0
   829
	int type; /* SSL_ST_CONNECT or SSL_ST_ACCEPT */
sl@0
   830
sl@0
   831
	SSL_METHOD *method; /* SSLv3 */
sl@0
   832
sl@0
   833
	/* There are 2 BIO's even though they are normally both the
sl@0
   834
	 * same.  This is so data can be read and written to different
sl@0
   835
	 * handlers */
sl@0
   836
sl@0
   837
#ifndef OPENSSL_NO_BIO
sl@0
   838
	BIO *rbio; /* used by SSL_read */
sl@0
   839
	BIO *wbio; /* used by SSL_write */
sl@0
   840
	BIO *bbio; /* used during session-id reuse to concatenate
sl@0
   841
		    * messages */
sl@0
   842
#else
sl@0
   843
	char *rbio; /* used by SSL_read */
sl@0
   844
	char *wbio; /* used by SSL_write */
sl@0
   845
	char *bbio;
sl@0
   846
#endif
sl@0
   847
	/* This holds a variable that indicates what we were doing
sl@0
   848
	 * when a 0 or -1 is returned.  This is needed for
sl@0
   849
	 * non-blocking IO so we know what request needs re-doing when
sl@0
   850
	 * in SSL_accept or SSL_connect */
sl@0
   851
	int rwstate;
sl@0
   852
sl@0
   853
	/* true when we are actually in SSL_accept() or SSL_connect() */
sl@0
   854
	int in_handshake;
sl@0
   855
	int (*handshake_func)(SSL *);
sl@0
   856
sl@0
   857
	/* Imagine that here's a boolean member "init" that is
sl@0
   858
	 * switched as soon as SSL_set_{accept/connect}_state
sl@0
   859
	 * is called for the first time, so that "state" and
sl@0
   860
	 * "handshake_func" are properly initialized.  But as
sl@0
   861
	 * handshake_func is == 0 until then, we use this
sl@0
   862
	 * test instead of an "init" member.
sl@0
   863
	 */
sl@0
   864
sl@0
   865
	int server;	/* are we the server side? - mostly used by SSL_clear*/
sl@0
   866
sl@0
   867
	int new_session;/* 1 if we are to use a new session.
sl@0
   868
	                 * 2 if we are a server and are inside a handshake
sl@0
   869
	                 *   (i.e. not just sending a HelloRequest)
sl@0
   870
	                 * NB: For servers, the 'new' session may actually be a previously
sl@0
   871
	                 * cached session or even the previous session unless
sl@0
   872
	                 * SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION is set */
sl@0
   873
	int quiet_shutdown;/* don't send shutdown packets */
sl@0
   874
	int shutdown;	/* we have shut things down, 0x01 sent, 0x02
sl@0
   875
			 * for received */
sl@0
   876
	int state;	/* where we are */
sl@0
   877
	int rstate;	/* where we are when reading */
sl@0
   878
sl@0
   879
	BUF_MEM *init_buf;	/* buffer used during init */
sl@0
   880
	void *init_msg;   	/* pointer to handshake message body, set by ssl3_get_message() */
sl@0
   881
	int init_num;		/* amount read/written */
sl@0
   882
	int init_off;		/* amount read/written */
sl@0
   883
sl@0
   884
	/* used internally to point at a raw packet */
sl@0
   885
	unsigned char *packet;
sl@0
   886
	unsigned int packet_length;
sl@0
   887
sl@0
   888
	struct ssl2_state_st *s2; /* SSLv2 variables */
sl@0
   889
	struct ssl3_state_st *s3; /* SSLv3 variables */
sl@0
   890
	struct dtls1_state_st *d1; /* DTLSv1 variables */
sl@0
   891
sl@0
   892
	int read_ahead;		/* Read as many input bytes as possible
sl@0
   893
	               	 	 * (for non-blocking reads) */
sl@0
   894
sl@0
   895
	/* callback that allows applications to peek at protocol messages */
sl@0
   896
	void (*msg_callback)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg);
sl@0
   897
	void *msg_callback_arg;
sl@0
   898
sl@0
   899
	int hit;		/* reusing a previous session */
sl@0
   900
sl@0
   901
	X509_VERIFY_PARAM *param;
sl@0
   902
sl@0
   903
#if 0
sl@0
   904
	int purpose;		/* Purpose setting */
sl@0
   905
	int trust;		/* Trust setting */
sl@0
   906
#endif
sl@0
   907
sl@0
   908
	/* crypto */
sl@0
   909
	STACK_OF(SSL_CIPHER) *cipher_list;
sl@0
   910
	STACK_OF(SSL_CIPHER) *cipher_list_by_id;
sl@0
   911
sl@0
   912
	/* These are the ones being used, the ones in SSL_SESSION are
sl@0
   913
	 * the ones to be 'copied' into these ones */
sl@0
   914
sl@0
   915
	EVP_CIPHER_CTX *enc_read_ctx;		/* cryptographic state */
sl@0
   916
	const EVP_MD *read_hash;		/* used for mac generation */
sl@0
   917
#ifndef OPENSSL_NO_COMP
sl@0
   918
	COMP_CTX *expand;			/* uncompress */
sl@0
   919
#else
sl@0
   920
	char *expand;
sl@0
   921
#endif
sl@0
   922
sl@0
   923
	EVP_CIPHER_CTX *enc_write_ctx;		/* cryptographic state */
sl@0
   924
	const EVP_MD *write_hash;		/* used for mac generation */
sl@0
   925
#ifndef OPENSSL_NO_COMP
sl@0
   926
	COMP_CTX *compress;			/* compression */
sl@0
   927
#else
sl@0
   928
	char *compress;	
sl@0
   929
#endif
sl@0
   930
sl@0
   931
	/* session info */
sl@0
   932
sl@0
   933
	/* client cert? */
sl@0
   934
	/* This is used to hold the server certificate used */
sl@0
   935
	struct cert_st /* CERT */ *cert;
sl@0
   936
sl@0
   937
	/* the session_id_context is used to ensure sessions are only reused
sl@0
   938
	 * in the appropriate context */
sl@0
   939
	unsigned int sid_ctx_length;
sl@0
   940
	unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH];
sl@0
   941
sl@0
   942
	/* This can also be in the session once a session is established */
sl@0
   943
	SSL_SESSION *session;
sl@0
   944
sl@0
   945
	/* Default generate session ID callback. */
sl@0
   946
	GEN_SESSION_CB generate_session_id;
sl@0
   947
sl@0
   948
	/* Used in SSL2 and SSL3 */
sl@0
   949
	int verify_mode;	/* 0 don't care about verify failure.
sl@0
   950
				 * 1 fail if verify fails */
sl@0
   951
	int (*verify_callback)(int ok,X509_STORE_CTX *ctx); /* fail if callback returns 0 */
sl@0
   952
sl@0
   953
	void (*info_callback)(const SSL *ssl,int type,int val); /* optional informational callback */
sl@0
   954
sl@0
   955
	int error;		/* error bytes to be written */
sl@0
   956
	int error_code;		/* actual code */
sl@0
   957
sl@0
   958
#ifndef OPENSSL_NO_KRB5
sl@0
   959
	KSSL_CTX *kssl_ctx;     /* Kerberos 5 context */
sl@0
   960
#endif	/* OPENSSL_NO_KRB5 */
sl@0
   961
sl@0
   962
	SSL_CTX *ctx;
sl@0
   963
	/* set this flag to 1 and a sleep(1) is put into all SSL_read()
sl@0
   964
	 * and SSL_write() calls, good for nbio debuging :-) */
sl@0
   965
	int debug;	
sl@0
   966
sl@0
   967
	/* extra application data */
sl@0
   968
	long verify_result;
sl@0
   969
	CRYPTO_EX_DATA ex_data;
sl@0
   970
sl@0
   971
	/* for server side, keep the list of CA_dn we can use */
sl@0
   972
	STACK_OF(X509_NAME) *client_CA;
sl@0
   973
sl@0
   974
	int references;
sl@0
   975
	unsigned long options; /* protocol behaviour */
sl@0
   976
	unsigned long mode; /* API behaviour */
sl@0
   977
	long max_cert_list;
sl@0
   978
	int first_packet;
sl@0
   979
	int client_version;	/* what was passed, used for
sl@0
   980
				 * SSLv3/TLS rollback check */
sl@0
   981
sl@0
   982
	};
sl@0
   983
sl@0
   984
#ifdef __cplusplus
sl@0
   985
}
sl@0
   986
#endif
sl@0
   987
sl@0
   988
#include <openssl/ssl2.h>
sl@0
   989
#include <openssl/ssl3.h>
sl@0
   990
#include <openssl/tls1.h> /* This is mostly sslv3 with a few tweaks */
sl@0
   991
#include <openssl/dtls1.h> /* Datagram TLS */
sl@0
   992
#include <openssl/ssl23.h>
sl@0
   993
sl@0
   994
#ifdef  __cplusplus
sl@0
   995
extern "C" {
sl@0
   996
#endif
sl@0
   997
sl@0
   998
/* compatibility */
sl@0
   999
#define SSL_set_app_data(s,arg)		(SSL_set_ex_data(s,0,(char *)arg))
sl@0
  1000
#define SSL_get_app_data(s)		(SSL_get_ex_data(s,0))
sl@0
  1001
#define SSL_SESSION_set_app_data(s,a)	(SSL_SESSION_set_ex_data(s,0,(char *)a))
sl@0
  1002
#define SSL_SESSION_get_app_data(s)	(SSL_SESSION_get_ex_data(s,0))
sl@0
  1003
#define SSL_CTX_get_app_data(ctx)	(SSL_CTX_get_ex_data(ctx,0))
sl@0
  1004
#define SSL_CTX_set_app_data(ctx,arg)	(SSL_CTX_set_ex_data(ctx,0,(char *)arg))
sl@0
  1005
sl@0
  1006
/* The following are the possible values for ssl->state are are
sl@0
  1007
 * used to indicate where we are up to in the SSL connection establishment.
sl@0
  1008
 * The macros that follow are about the only things you should need to use
sl@0
  1009
 * and even then, only when using non-blocking IO.
sl@0
  1010
 * It can also be useful to work out where you were when the connection
sl@0
  1011
 * failed */
sl@0
  1012
sl@0
  1013
#define SSL_ST_CONNECT			0x1000
sl@0
  1014
#define SSL_ST_ACCEPT			0x2000
sl@0
  1015
#define SSL_ST_MASK			0x0FFF
sl@0
  1016
#define SSL_ST_INIT			(SSL_ST_CONNECT|SSL_ST_ACCEPT)
sl@0
  1017
#define SSL_ST_BEFORE			0x4000
sl@0
  1018
#define SSL_ST_OK			0x03
sl@0
  1019
#define SSL_ST_RENEGOTIATE		(0x04|SSL_ST_INIT)
sl@0
  1020
sl@0
  1021
#define SSL_CB_LOOP			0x01
sl@0
  1022
#define SSL_CB_EXIT			0x02
sl@0
  1023
#define SSL_CB_READ			0x04
sl@0
  1024
#define SSL_CB_WRITE			0x08
sl@0
  1025
#define SSL_CB_ALERT			0x4000 /* used in callback */
sl@0
  1026
#define SSL_CB_READ_ALERT		(SSL_CB_ALERT|SSL_CB_READ)
sl@0
  1027
#define SSL_CB_WRITE_ALERT		(SSL_CB_ALERT|SSL_CB_WRITE)
sl@0
  1028
#define SSL_CB_ACCEPT_LOOP		(SSL_ST_ACCEPT|SSL_CB_LOOP)
sl@0
  1029
#define SSL_CB_ACCEPT_EXIT		(SSL_ST_ACCEPT|SSL_CB_EXIT)
sl@0
  1030
#define SSL_CB_CONNECT_LOOP		(SSL_ST_CONNECT|SSL_CB_LOOP)
sl@0
  1031
#define SSL_CB_CONNECT_EXIT		(SSL_ST_CONNECT|SSL_CB_EXIT)
sl@0
  1032
#define SSL_CB_HANDSHAKE_START		0x10
sl@0
  1033
#define SSL_CB_HANDSHAKE_DONE		0x20
sl@0
  1034
sl@0
  1035
/* Is the SSL_connection established? */
sl@0
  1036
#define SSL_get_state(a)		SSL_state(a)
sl@0
  1037
#define SSL_is_init_finished(a)		(SSL_state(a) == SSL_ST_OK)
sl@0
  1038
#define SSL_in_init(a)			(SSL_state(a)&SSL_ST_INIT)
sl@0
  1039
#define SSL_in_before(a)		(SSL_state(a)&SSL_ST_BEFORE)
sl@0
  1040
#define SSL_in_connect_init(a)		(SSL_state(a)&SSL_ST_CONNECT)
sl@0
  1041
#define SSL_in_accept_init(a)		(SSL_state(a)&SSL_ST_ACCEPT)
sl@0
  1042
sl@0
  1043
/* The following 2 states are kept in ssl->rstate when reads fail,
sl@0
  1044
 * you should not need these */
sl@0
  1045
#define SSL_ST_READ_HEADER			0xF0
sl@0
  1046
#define SSL_ST_READ_BODY			0xF1
sl@0
  1047
#define SSL_ST_READ_DONE			0xF2
sl@0
  1048
sl@0
  1049
/* Obtain latest Finished message
sl@0
  1050
 *   -- that we sent (SSL_get_finished)
sl@0
  1051
 *   -- that we expected from peer (SSL_get_peer_finished).
sl@0
  1052
 * Returns length (0 == no Finished so far), copies up to 'count' bytes. */
sl@0
  1053
IMPORT_C size_t SSL_get_finished(const SSL *s, void *buf, size_t count);
sl@0
  1054
IMPORT_C size_t SSL_get_peer_finished(const SSL *s, void *buf, size_t count);
sl@0
  1055
sl@0
  1056
/* use either SSL_VERIFY_NONE or SSL_VERIFY_PEER, the last 2 options
sl@0
  1057
 * are 'ored' with SSL_VERIFY_PEER if they are desired */
sl@0
  1058
#define SSL_VERIFY_NONE			0x00
sl@0
  1059
#define SSL_VERIFY_PEER			0x01
sl@0
  1060
#define SSL_VERIFY_FAIL_IF_NO_PEER_CERT	0x02
sl@0
  1061
#define SSL_VERIFY_CLIENT_ONCE		0x04
sl@0
  1062
sl@0
  1063
#define OpenSSL_add_ssl_algorithms()	SSL_library_init()
sl@0
  1064
#define SSLeay_add_ssl_algorithms()	SSL_library_init()
sl@0
  1065
sl@0
  1066
/* this is for backward compatibility */
sl@0
  1067
#if 0 /* NEW_SSLEAY */
sl@0
  1068
#define SSL_CTX_set_default_verify(a,b,c) SSL_CTX_set_verify(a,b,c)
sl@0
  1069
#define SSL_set_pref_cipher(c,n)	SSL_set_cipher_list(c,n)
sl@0
  1070
#define SSL_add_session(a,b)            SSL_CTX_add_session((a),(b))
sl@0
  1071
#define SSL_remove_session(a,b)		SSL_CTX_remove_session((a),(b))
sl@0
  1072
#define SSL_flush_sessions(a,b)		SSL_CTX_flush_sessions((a),(b))
sl@0
  1073
#endif
sl@0
  1074
/* More backward compatibility */
sl@0
  1075
#define SSL_get_cipher(s) \
sl@0
  1076
		SSL_CIPHER_get_name(SSL_get_current_cipher(s))
sl@0
  1077
#define SSL_get_cipher_bits(s,np) \
sl@0
  1078
		SSL_CIPHER_get_bits(SSL_get_current_cipher(s),np)
sl@0
  1079
#define SSL_get_cipher_version(s) \
sl@0
  1080
		SSL_CIPHER_get_version(SSL_get_current_cipher(s))
sl@0
  1081
#define SSL_get_cipher_name(s) \
sl@0
  1082
		SSL_CIPHER_get_name(SSL_get_current_cipher(s))
sl@0
  1083
#define SSL_get_time(a)		SSL_SESSION_get_time(a)
sl@0
  1084
#define SSL_set_time(a,b)	SSL_SESSION_set_time((a),(b))
sl@0
  1085
#define SSL_get_timeout(a)	SSL_SESSION_get_timeout(a)
sl@0
  1086
#define SSL_set_timeout(a,b)	SSL_SESSION_set_timeout((a),(b))
sl@0
  1087
sl@0
  1088
#if 1 /*SSLEAY_MACROS*/
sl@0
  1089
#define d2i_SSL_SESSION_bio(bp,s_id) ASN1_d2i_bio_of(SSL_SESSION,SSL_SESSION_new,d2i_SSL_SESSION,bp,s_id)
sl@0
  1090
#define i2d_SSL_SESSION_bio(bp,s_id) ASN1_i2d_bio_of(SSL_SESSION,i2d_SSL_SESSION,bp,s_id)
sl@0
  1091
#define PEM_read_SSL_SESSION(fp,x,cb,u) (SSL_SESSION *)PEM_ASN1_read( \
sl@0
  1092
	(char *(*)())d2i_SSL_SESSION,PEM_STRING_SSL_SESSION,fp,(char **)x,cb,u)
sl@0
  1093
#define PEM_read_bio_SSL_SESSION(bp,x,cb,u) PEM_ASN1_read_bio_of(SSL_SESSION,d2i_SSL_SESSION,PEM_STRING_SSL_SESSION,bp,x,cb,u)
sl@0
  1094
#define PEM_write_SSL_SESSION(fp,x) \
sl@0
  1095
	PEM_ASN1_write((int (*)())i2d_SSL_SESSION, \
sl@0
  1096
		PEM_STRING_SSL_SESSION,fp, (char *)x, NULL,NULL,0,NULL,NULL)
sl@0
  1097
#define PEM_write_bio_SSL_SESSION(bp,x) \
sl@0
  1098
	PEM_ASN1_write_bio_of(SSL_SESSION,i2d_SSL_SESSION,PEM_STRING_SSL_SESSION,bp,x,NULL,NULL,0,NULL,NULL)
sl@0
  1099
#endif
sl@0
  1100
sl@0
  1101
#define SSL_AD_REASON_OFFSET		1000
sl@0
  1102
/* These alert types are for SSLv3 and TLSv1 */
sl@0
  1103
#define SSL_AD_CLOSE_NOTIFY		SSL3_AD_CLOSE_NOTIFY
sl@0
  1104
#define SSL_AD_UNEXPECTED_MESSAGE	SSL3_AD_UNEXPECTED_MESSAGE /* fatal */
sl@0
  1105
#define SSL_AD_BAD_RECORD_MAC		SSL3_AD_BAD_RECORD_MAC     /* fatal */
sl@0
  1106
#define SSL_AD_DECRYPTION_FAILED	TLS1_AD_DECRYPTION_FAILED
sl@0
  1107
#define SSL_AD_RECORD_OVERFLOW		TLS1_AD_RECORD_OVERFLOW
sl@0
  1108
#define SSL_AD_DECOMPRESSION_FAILURE	SSL3_AD_DECOMPRESSION_FAILURE/* fatal */
sl@0
  1109
#define SSL_AD_HANDSHAKE_FAILURE	SSL3_AD_HANDSHAKE_FAILURE/* fatal */
sl@0
  1110
#define SSL_AD_NO_CERTIFICATE		SSL3_AD_NO_CERTIFICATE /* Not for TLS */
sl@0
  1111
#define SSL_AD_BAD_CERTIFICATE		SSL3_AD_BAD_CERTIFICATE
sl@0
  1112
#define SSL_AD_UNSUPPORTED_CERTIFICATE	SSL3_AD_UNSUPPORTED_CERTIFICATE
sl@0
  1113
#define SSL_AD_CERTIFICATE_REVOKED	SSL3_AD_CERTIFICATE_REVOKED
sl@0
  1114
#define SSL_AD_CERTIFICATE_EXPIRED	SSL3_AD_CERTIFICATE_EXPIRED
sl@0
  1115
#define SSL_AD_CERTIFICATE_UNKNOWN	SSL3_AD_CERTIFICATE_UNKNOWN
sl@0
  1116
#define SSL_AD_ILLEGAL_PARAMETER	SSL3_AD_ILLEGAL_PARAMETER   /* fatal */
sl@0
  1117
#define SSL_AD_UNKNOWN_CA		TLS1_AD_UNKNOWN_CA	/* fatal */
sl@0
  1118
#define SSL_AD_ACCESS_DENIED		TLS1_AD_ACCESS_DENIED	/* fatal */
sl@0
  1119
#define SSL_AD_DECODE_ERROR		TLS1_AD_DECODE_ERROR	/* fatal */
sl@0
  1120
#define SSL_AD_DECRYPT_ERROR		TLS1_AD_DECRYPT_ERROR
sl@0
  1121
#define SSL_AD_EXPORT_RESTRICTION	TLS1_AD_EXPORT_RESTRICTION/* fatal */
sl@0
  1122
#define SSL_AD_PROTOCOL_VERSION		TLS1_AD_PROTOCOL_VERSION /* fatal */
sl@0
  1123
#define SSL_AD_INSUFFICIENT_SECURITY	TLS1_AD_INSUFFICIENT_SECURITY/* fatal */
sl@0
  1124
#define SSL_AD_INTERNAL_ERROR		TLS1_AD_INTERNAL_ERROR	/* fatal */
sl@0
  1125
#define SSL_AD_USER_CANCELLED		TLS1_AD_USER_CANCELLED
sl@0
  1126
#define SSL_AD_NO_RENEGOTIATION		TLS1_AD_NO_RENEGOTIATION
sl@0
  1127
#define SSL_AD_UNSUPPORTED_EXTENSION	TLS1_AD_UNSUPPORTED_EXTENSION
sl@0
  1128
#define SSL_AD_CERTIFICATE_UNOBTAINABLE TLS1_AD_CERTIFICATE_UNOBTAINABLE
sl@0
  1129
#define SSL_AD_UNRECOGNIZED_NAME	TLS1_AD_UNRECOGNIZED_NAME
sl@0
  1130
sl@0
  1131
#define SSL_ERROR_NONE			0
sl@0
  1132
#define SSL_ERROR_SSL			1
sl@0
  1133
#define SSL_ERROR_WANT_READ		2
sl@0
  1134
#define SSL_ERROR_WANT_WRITE		3
sl@0
  1135
#define SSL_ERROR_WANT_X509_LOOKUP	4
sl@0
  1136
#define SSL_ERROR_SYSCALL		5 /* look at error stack/return value/errno */
sl@0
  1137
#define SSL_ERROR_ZERO_RETURN		6
sl@0
  1138
#define SSL_ERROR_WANT_CONNECT		7
sl@0
  1139
#define SSL_ERROR_WANT_ACCEPT		8
sl@0
  1140
sl@0
  1141
#define SSL_CTRL_NEED_TMP_RSA			1
sl@0
  1142
#define SSL_CTRL_SET_TMP_RSA			2
sl@0
  1143
#define SSL_CTRL_SET_TMP_DH			3
sl@0
  1144
#define SSL_CTRL_SET_TMP_ECDH			4
sl@0
  1145
#define SSL_CTRL_SET_TMP_RSA_CB			5
sl@0
  1146
#define SSL_CTRL_SET_TMP_DH_CB			6
sl@0
  1147
#define SSL_CTRL_SET_TMP_ECDH_CB		7
sl@0
  1148
sl@0
  1149
#define SSL_CTRL_GET_SESSION_REUSED		8
sl@0
  1150
#define SSL_CTRL_GET_CLIENT_CERT_REQUEST	9
sl@0
  1151
#define SSL_CTRL_GET_NUM_RENEGOTIATIONS		10
sl@0
  1152
#define SSL_CTRL_CLEAR_NUM_RENEGOTIATIONS	11
sl@0
  1153
#define SSL_CTRL_GET_TOTAL_RENEGOTIATIONS	12
sl@0
  1154
#define SSL_CTRL_GET_FLAGS			13
sl@0
  1155
#define SSL_CTRL_EXTRA_CHAIN_CERT		14
sl@0
  1156
sl@0
  1157
#define SSL_CTRL_SET_MSG_CALLBACK               15
sl@0
  1158
#define SSL_CTRL_SET_MSG_CALLBACK_ARG           16
sl@0
  1159
sl@0
  1160
/* only applies to datagram connections */
sl@0
  1161
#define SSL_CTRL_SET_MTU                17
sl@0
  1162
/* Stats */
sl@0
  1163
#define SSL_CTRL_SESS_NUMBER			20
sl@0
  1164
#define SSL_CTRL_SESS_CONNECT			21
sl@0
  1165
#define SSL_CTRL_SESS_CONNECT_GOOD		22
sl@0
  1166
#define SSL_CTRL_SESS_CONNECT_RENEGOTIATE	23
sl@0
  1167
#define SSL_CTRL_SESS_ACCEPT			24
sl@0
  1168
#define SSL_CTRL_SESS_ACCEPT_GOOD		25
sl@0
  1169
#define SSL_CTRL_SESS_ACCEPT_RENEGOTIATE	26
sl@0
  1170
#define SSL_CTRL_SESS_HIT			27
sl@0
  1171
#define SSL_CTRL_SESS_CB_HIT			28
sl@0
  1172
#define SSL_CTRL_SESS_MISSES			29
sl@0
  1173
#define SSL_CTRL_SESS_TIMEOUTS			30
sl@0
  1174
#define SSL_CTRL_SESS_CACHE_FULL		31
sl@0
  1175
#define SSL_CTRL_OPTIONS			32
sl@0
  1176
#define SSL_CTRL_MODE				33
sl@0
  1177
sl@0
  1178
#define SSL_CTRL_GET_READ_AHEAD			40
sl@0
  1179
#define SSL_CTRL_SET_READ_AHEAD			41
sl@0
  1180
#define SSL_CTRL_SET_SESS_CACHE_SIZE		42
sl@0
  1181
#define SSL_CTRL_GET_SESS_CACHE_SIZE		43
sl@0
  1182
#define SSL_CTRL_SET_SESS_CACHE_MODE		44
sl@0
  1183
#define SSL_CTRL_GET_SESS_CACHE_MODE		45
sl@0
  1184
sl@0
  1185
#define SSL_CTRL_GET_MAX_CERT_LIST		50
sl@0
  1186
#define SSL_CTRL_SET_MAX_CERT_LIST		51
sl@0
  1187
sl@0
  1188
#define SSL_session_reused(ssl) \
sl@0
  1189
	SSL_ctrl((ssl),SSL_CTRL_GET_SESSION_REUSED,0,NULL)
sl@0
  1190
#define SSL_num_renegotiations(ssl) \
sl@0
  1191
	SSL_ctrl((ssl),SSL_CTRL_GET_NUM_RENEGOTIATIONS,0,NULL)
sl@0
  1192
#define SSL_clear_num_renegotiations(ssl) \
sl@0
  1193
	SSL_ctrl((ssl),SSL_CTRL_CLEAR_NUM_RENEGOTIATIONS,0,NULL)
sl@0
  1194
#define SSL_total_renegotiations(ssl) \
sl@0
  1195
	SSL_ctrl((ssl),SSL_CTRL_GET_TOTAL_RENEGOTIATIONS,0,NULL)
sl@0
  1196
sl@0
  1197
#define SSL_CTX_need_tmp_RSA(ctx) \
sl@0
  1198
	SSL_CTX_ctrl(ctx,SSL_CTRL_NEED_TMP_RSA,0,NULL)
sl@0
  1199
#define SSL_CTX_set_tmp_rsa(ctx,rsa) \
sl@0
  1200
	SSL_CTX_ctrl(ctx,SSL_CTRL_SET_TMP_RSA,0,(char *)rsa)
sl@0
  1201
#define SSL_CTX_set_tmp_dh(ctx,dh) \
sl@0
  1202
	SSL_CTX_ctrl(ctx,SSL_CTRL_SET_TMP_DH,0,(char *)dh)
sl@0
  1203
#define SSL_CTX_set_tmp_ecdh(ctx,ecdh) \
sl@0
  1204
	SSL_CTX_ctrl(ctx,SSL_CTRL_SET_TMP_ECDH,0,(char *)ecdh)
sl@0
  1205
sl@0
  1206
#define SSL_need_tmp_RSA(ssl) \
sl@0
  1207
	SSL_ctrl(ssl,SSL_CTRL_NEED_TMP_RSA,0,NULL)
sl@0
  1208
#define SSL_set_tmp_rsa(ssl,rsa) \
sl@0
  1209
	SSL_ctrl(ssl,SSL_CTRL_SET_TMP_RSA,0,(char *)rsa)
sl@0
  1210
#define SSL_set_tmp_dh(ssl,dh) \
sl@0
  1211
	SSL_ctrl(ssl,SSL_CTRL_SET_TMP_DH,0,(char *)dh)
sl@0
  1212
#define SSL_set_tmp_ecdh(ssl,ecdh) \
sl@0
  1213
	SSL_ctrl(ssl,SSL_CTRL_SET_TMP_ECDH,0,(char *)ecdh)
sl@0
  1214
sl@0
  1215
#define SSL_CTX_add_extra_chain_cert(ctx,x509) \
sl@0
  1216
	SSL_CTX_ctrl(ctx,SSL_CTRL_EXTRA_CHAIN_CERT,0,(char *)x509)
sl@0
  1217
sl@0
  1218
#ifndef OPENSSL_NO_BIO
sl@0
  1219
IMPORT_C BIO_METHOD *BIO_f_ssl(void);
sl@0
  1220
IMPORT_C BIO *BIO_new_ssl(SSL_CTX *ctx,int client);
sl@0
  1221
IMPORT_C BIO *BIO_new_ssl_connect(SSL_CTX *ctx);
sl@0
  1222
IMPORT_C BIO *BIO_new_buffer_ssl_connect(SSL_CTX *ctx);
sl@0
  1223
IMPORT_C int BIO_ssl_copy_session_id(BIO *to,BIO *from);
sl@0
  1224
IMPORT_C void BIO_ssl_shutdown(BIO *ssl_bio);
sl@0
  1225
sl@0
  1226
#endif
sl@0
  1227
sl@0
  1228
IMPORT_C int	SSL_CTX_set_cipher_list(SSL_CTX *,const char *str);
sl@0
  1229
IMPORT_C SSL_CTX *SSL_CTX_new(SSL_METHOD *meth);
sl@0
  1230
IMPORT_C void	SSL_CTX_free(SSL_CTX *);
sl@0
  1231
IMPORT_C long SSL_CTX_set_timeout(SSL_CTX *ctx,long t);
sl@0
  1232
IMPORT_C long SSL_CTX_get_timeout(const SSL_CTX *ctx);
sl@0
  1233
IMPORT_C X509_STORE *SSL_CTX_get_cert_store(const SSL_CTX *);
sl@0
  1234
IMPORT_C void SSL_CTX_set_cert_store(SSL_CTX *,X509_STORE *);
sl@0
  1235
IMPORT_C int SSL_want(const SSL *s);
sl@0
  1236
IMPORT_C int	SSL_clear(SSL *s);
sl@0
  1237
sl@0
  1238
IMPORT_C void	SSL_CTX_flush_sessions(SSL_CTX *ctx,long tm);
sl@0
  1239
IMPORT_C void SSL_CTX_sess_set_new_cb(SSL_CTX *ctx,
sl@0
  1240
	int (*cb)(struct ssl_st *ssl,SSL_SESSION *sess));
sl@0
  1241
IMPORT_C int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(SSL *ssl, SSL_SESSION *sess);
sl@0
  1242
sl@0
  1243
IMPORT_C void SSL_CTX_sess_set_remove_cb(SSL_CTX *ctx,
sl@0
  1244
	void (*cb)(SSL_CTX *ctx,SSL_SESSION *sess));
sl@0
  1245
IMPORT_C void (*SSL_CTX_sess_get_remove_cb(SSL_CTX *ctx))(SSL_CTX * ctx,SSL_SESSION *sess);	
sl@0
  1246
IMPORT_C void SSL_CTX_sess_set_get_cb(SSL_CTX *ctx,
sl@0
  1247
	SSL_SESSION *(*cb)(struct ssl_st *ssl,
sl@0
  1248
	         unsigned char *data,int len,int *copy));
sl@0
  1249
IMPORT_C SSL_SESSION * (*SSL_CTX_sess_get_get_cb(SSL_CTX *ctx))(SSL *ssl,
sl@0
  1250
	unsigned char *data,int len,int *copy);
sl@0
  1251
IMPORT_C void SSL_CTX_set_info_callback(SSL_CTX *ctx, 
sl@0
  1252
	void (*cb)(const SSL *ssl,int type,int val));
sl@0
  1253
IMPORT_C void (*SSL_CTX_get_info_callback(SSL_CTX *ctx))(const SSL *ssl,int type,int val);
sl@0
  1254
IMPORT_C void SSL_CTX_set_client_cert_cb(SSL_CTX *ctx,
sl@0
  1255
	int (*cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey));
sl@0
  1256
IMPORT_C int (*SSL_CTX_get_client_cert_cb(SSL_CTX *ctx))(SSL * ssl, X509 ** x509 , EVP_PKEY **pkey);
sl@0
  1257
IMPORT_C void SSL_CTX_set_cookie_generate_cb(SSL_CTX *ctx,
sl@0
  1258
	int (*cb)(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len));
sl@0
  1259
IMPORT_C void SSL_CTX_set_cookie_verify_cb(SSL_CTX *ctx,
sl@0
  1260
	int (*cb)(SSL *ssl, unsigned char *cookie, unsigned int cookie_len));
sl@0
  1261
sl@0
  1262
sl@0
  1263
IMPORT_C SSL_CIPHER *SSL_get_current_cipher(const SSL *s);
sl@0
  1264
IMPORT_C int	SSL_CIPHER_get_bits(const SSL_CIPHER *c,int *alg_bits);
sl@0
  1265
IMPORT_C char *	SSL_CIPHER_get_version(const SSL_CIPHER *c);
sl@0
  1266
IMPORT_C const char *	SSL_CIPHER_get_name(const SSL_CIPHER *c);
sl@0
  1267
sl@0
  1268
IMPORT_C int	SSL_get_fd(const SSL *s);
sl@0
  1269
IMPORT_C int	SSL_get_rfd(const SSL *s);
sl@0
  1270
IMPORT_C int	SSL_get_wfd(const SSL *s);
sl@0
  1271
IMPORT_C const char  * SSL_get_cipher_list(const SSL *s,int n);
sl@0
  1272
IMPORT_C char *	SSL_get_shared_ciphers(const SSL *s, char *buf, int len);
sl@0
  1273
IMPORT_C int	SSL_get_read_ahead(const SSL * s);
sl@0
  1274
IMPORT_C int	SSL_pending(const SSL *s);
sl@0
  1275
#ifndef OPENSSL_NO_SOCK
sl@0
  1276
IMPORT_C int	SSL_set_fd(SSL *s, int fd);
sl@0
  1277
IMPORT_C int	SSL_set_rfd(SSL *s, int fd);
sl@0
  1278
IMPORT_C int	SSL_set_wfd(SSL *s, int fd);
sl@0
  1279
#endif
sl@0
  1280
#ifndef OPENSSL_NO_BIO
sl@0
  1281
IMPORT_C void	SSL_set_bio(SSL *s, BIO *rbio,BIO *wbio);
sl@0
  1282
IMPORT_C BIO *	SSL_get_rbio(const SSL *s);
sl@0
  1283
IMPORT_C BIO *	SSL_get_wbio(const SSL *s);
sl@0
  1284
#endif
sl@0
  1285
IMPORT_C int	SSL_set_cipher_list(SSL *s, const char *str);
sl@0
  1286
IMPORT_C void	SSL_set_read_ahead(SSL *s, int yes);
sl@0
  1287
IMPORT_C int	SSL_get_verify_mode(const SSL *s);
sl@0
  1288
IMPORT_C int	SSL_get_verify_depth(const SSL *s);
sl@0
  1289
IMPORT_C int	(*SSL_get_verify_callback(const SSL *s))(int,X509_STORE_CTX *);
sl@0
  1290
IMPORT_C void	SSL_set_verify(SSL *s, int mode,
sl@0
  1291
		       int (*callback)(int ok,X509_STORE_CTX *ctx));
sl@0
  1292
IMPORT_C void	SSL_set_verify_depth(SSL *s, int depth);
sl@0
  1293
#ifndef OPENSSL_NO_RSA
sl@0
  1294
IMPORT_C int	SSL_use_RSAPrivateKey(SSL *ssl, RSA *rsa);
sl@0
  1295
#endif
sl@0
  1296
IMPORT_C int	SSL_use_RSAPrivateKey_ASN1(SSL *ssl, unsigned char *d, long len);
sl@0
  1297
IMPORT_C int	SSL_use_PrivateKey(SSL *ssl, EVP_PKEY *pkey);
sl@0
  1298
IMPORT_C int	SSL_use_PrivateKey_ASN1(int pk,SSL *ssl, const unsigned char *d, long len);
sl@0
  1299
IMPORT_C int	SSL_use_certificate(SSL *ssl, X509 *x);
sl@0
  1300
IMPORT_C int	SSL_use_certificate_ASN1(SSL *ssl, const unsigned char *d, int len);
sl@0
  1301
sl@0
  1302
#ifndef OPENSSL_NO_STDIO
sl@0
  1303
IMPORT_C int	SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, int type);
sl@0
  1304
IMPORT_C int	SSL_use_PrivateKey_file(SSL *ssl, const char *file, int type);
sl@0
  1305
IMPORT_C int	SSL_use_certificate_file(SSL *ssl, const char *file, int type);
sl@0
  1306
IMPORT_C int	SSL_CTX_use_RSAPrivateKey_file(SSL_CTX *ctx, const char *file, int type);
sl@0
  1307
IMPORT_C int	SSL_CTX_use_PrivateKey_file(SSL_CTX *ctx, const char *file, int type);
sl@0
  1308
IMPORT_C int	SSL_CTX_use_certificate_file(SSL_CTX *ctx, const char *file, int type);
sl@0
  1309
IMPORT_C int	SSL_CTX_use_certificate_chain_file(SSL_CTX *ctx, const char *file); /* PEM type */
sl@0
  1310
IMPORT_C STACK_OF(X509_NAME) *SSL_load_client_CA_file(const char *file);
sl@0
  1311
IMPORT_C int	SSL_add_file_cert_subjects_to_stack(STACK_OF(X509_NAME) *stackCAs,
sl@0
  1312
					    const char *file);
sl@0
  1313
#ifndef OPENSSL_SYS_VMS
sl@0
  1314
#ifndef OPENSSL_SYS_MACINTOSH_CLASSIC /* XXXXX: Better scheme needed! [was: #ifndef MAC_OS_pre_X] */
sl@0
  1315
IMPORT_C int	SSL_add_dir_cert_subjects_to_stack(STACK_OF(X509_NAME) *stackCAs,
sl@0
  1316
					   const char *dir);
sl@0
  1317
#endif
sl@0
  1318
#endif
sl@0
  1319
sl@0
  1320
#endif
sl@0
  1321
sl@0
  1322
IMPORT_C void	SSL_load_error_strings(void );
sl@0
  1323
IMPORT_C const char *SSL_state_string(const SSL *s);
sl@0
  1324
IMPORT_C const char *SSL_rstate_string(const SSL *s);
sl@0
  1325
IMPORT_C const char *SSL_state_string_long(const SSL *s);
sl@0
  1326
IMPORT_C const char *SSL_rstate_string_long(const SSL *s);
sl@0
  1327
IMPORT_C long	SSL_SESSION_get_time(const SSL_SESSION *s);
sl@0
  1328
IMPORT_C long	SSL_SESSION_set_time(SSL_SESSION *s, long t);
sl@0
  1329
IMPORT_C long	SSL_SESSION_get_timeout(const SSL_SESSION *s);
sl@0
  1330
IMPORT_C long	SSL_SESSION_set_timeout(SSL_SESSION *s, long t);
sl@0
  1331
IMPORT_C void	SSL_copy_session_id(SSL *to,const SSL *from);
sl@0
  1332
sl@0
  1333
IMPORT_C SSL_SESSION *SSL_SESSION_new(void);
sl@0
  1334
IMPORT_C unsigned long SSL_SESSION_hash(const SSL_SESSION *a);
sl@0
  1335
IMPORT_C const char *SSL_get_servername(const SSL *s, const int type);
sl@0
  1336
IMPORT_C int SSL_get_servername_type(const SSL *s);
sl@0
  1337
IMPORT_C int	SSL_SESSION_cmp(const SSL_SESSION *a,const SSL_SESSION *b);
sl@0
  1338
IMPORT_C const unsigned char *SSL_SESSION_get_id(const SSL_SESSION *s, unsigned int *len);
sl@0
  1339
#ifndef OPENSSL_NO_FP_API
sl@0
  1340
IMPORT_C int	SSL_SESSION_print_fp(FILE *fp,const SSL_SESSION *ses);
sl@0
  1341
#endif
sl@0
  1342
#ifndef OPENSSL_NO_BIO
sl@0
  1343
IMPORT_C int	SSL_SESSION_print(BIO *fp,const SSL_SESSION *ses);
sl@0
  1344
#endif
sl@0
  1345
IMPORT_C void	SSL_SESSION_free(SSL_SESSION *ses);
sl@0
  1346
IMPORT_C int	i2d_SSL_SESSION(SSL_SESSION *in,unsigned char **pp);
sl@0
  1347
IMPORT_C int	SSL_set_session(SSL *to, SSL_SESSION *session);
sl@0
  1348
IMPORT_C int	SSL_CTX_add_session(SSL_CTX *s, SSL_SESSION *c);
sl@0
  1349
IMPORT_C int	SSL_CTX_remove_session(SSL_CTX *,SSL_SESSION *c);
sl@0
  1350
IMPORT_C int	SSL_CTX_set_generate_session_id(SSL_CTX *, GEN_SESSION_CB);
sl@0
  1351
IMPORT_C int	SSL_set_generate_session_id(SSL *, GEN_SESSION_CB);
sl@0
  1352
IMPORT_C int	SSL_has_matching_session_id(const SSL *ssl, const unsigned char *id,
sl@0
  1353
					unsigned int id_len);
sl@0
  1354
IMPORT_C SSL_SESSION *d2i_SSL_SESSION(SSL_SESSION **a,const unsigned char **pp,
sl@0
  1355
			     long length);
sl@0
  1356
sl@0
  1357
#ifdef HEADER_X509_H
sl@0
  1358
IMPORT_C X509 *	SSL_get_peer_certificate(const SSL *s);
sl@0
  1359
#endif
sl@0
  1360
sl@0
  1361
IMPORT_C STACK_OF(X509) *SSL_get_peer_cert_chain(const SSL *s);
sl@0
  1362
sl@0
  1363
IMPORT_C int SSL_CTX_get_verify_mode(const SSL_CTX *ctx);
sl@0
  1364
IMPORT_C int SSL_CTX_get_verify_depth(const SSL_CTX *ctx);
sl@0
  1365
IMPORT_C int (*SSL_CTX_get_verify_callback(const SSL_CTX *ctx))(int,X509_STORE_CTX *);
sl@0
  1366
IMPORT_C void SSL_CTX_set_verify(SSL_CTX *ctx,int mode,
sl@0
  1367
			int (*callback)(int, X509_STORE_CTX *));
sl@0
  1368
IMPORT_C void SSL_CTX_set_verify_depth(SSL_CTX *ctx,int depth);
sl@0
  1369
IMPORT_C void SSL_CTX_set_cert_verify_callback(SSL_CTX *ctx, int (*cb)(X509_STORE_CTX *,void *), void *arg);
sl@0
  1370
#ifndef OPENSSL_NO_RSA
sl@0
  1371
IMPORT_C int SSL_CTX_use_RSAPrivateKey(SSL_CTX *ctx, RSA *rsa);
sl@0
  1372
#endif
sl@0
  1373
IMPORT_C int SSL_CTX_use_RSAPrivateKey_ASN1(SSL_CTX *ctx, const unsigned char *d, long len);
sl@0
  1374
IMPORT_C int SSL_CTX_use_PrivateKey(SSL_CTX *ctx, EVP_PKEY *pkey);
sl@0
  1375
IMPORT_C int SSL_CTX_use_PrivateKey_ASN1(int pk,SSL_CTX *ctx,
sl@0
  1376
	const unsigned char *d, long len);
sl@0
  1377
IMPORT_C int SSL_CTX_use_certificate(SSL_CTX *ctx, X509 *x);
sl@0
  1378
IMPORT_C int SSL_CTX_use_certificate_ASN1(SSL_CTX *ctx, int len, const unsigned char *d);
sl@0
  1379
sl@0
  1380
IMPORT_C void SSL_CTX_set_default_passwd_cb(SSL_CTX *ctx, pem_password_cb *cb);
sl@0
  1381
IMPORT_C void SSL_CTX_set_default_passwd_cb_userdata(SSL_CTX *ctx, void *u);
sl@0
  1382
sl@0
  1383
IMPORT_C int SSL_CTX_check_private_key(const SSL_CTX *ctx);
sl@0
  1384
IMPORT_C int SSL_check_private_key(const SSL *ctx);
sl@0
  1385
sl@0
  1386
IMPORT_C int	SSL_CTX_set_session_id_context(SSL_CTX *ctx,const unsigned char *sid_ctx,
sl@0
  1387
				       unsigned int sid_ctx_len);
sl@0
  1388
sl@0
  1389
IMPORT_C SSL *	SSL_new(SSL_CTX *ctx);
sl@0
  1390
IMPORT_C int	SSL_set_session_id_context(SSL *ssl,const unsigned char *sid_ctx,
sl@0
  1391
				   unsigned int sid_ctx_len);
sl@0
  1392
sl@0
  1393
IMPORT_C int SSL_CTX_set_purpose(SSL_CTX *s, int purpose);
sl@0
  1394
IMPORT_C int SSL_set_purpose(SSL *s, int purpose);
sl@0
  1395
IMPORT_C int SSL_CTX_set_trust(SSL_CTX *s, int trust);
sl@0
  1396
IMPORT_C int SSL_set_trust(SSL *s, int trust);
sl@0
  1397
sl@0
  1398
IMPORT_C void	SSL_free(SSL *ssl);
sl@0
  1399
IMPORT_C int 	SSL_accept(SSL *ssl);
sl@0
  1400
IMPORT_C int 	SSL_connect(SSL *ssl);
sl@0
  1401
IMPORT_C int 	SSL_read(SSL *ssl,void *buf,int num);
sl@0
  1402
IMPORT_C int 	SSL_peek(SSL *ssl,void *buf,int num);
sl@0
  1403
IMPORT_C int 	SSL_write(SSL *ssl,const void *buf,int num);
sl@0
  1404
IMPORT_C long	SSL_ctrl(SSL *ssl,int cmd, long larg, void *parg);
sl@0
  1405
IMPORT_C long	SSL_callback_ctrl(SSL *, int, void (*)(void));
sl@0
  1406
IMPORT_C long	SSL_CTX_ctrl(SSL_CTX *ctx,int cmd, long larg, void *parg);
sl@0
  1407
IMPORT_C long	SSL_CTX_callback_ctrl(SSL_CTX *, int, void (*)(void));
sl@0
  1408
sl@0
  1409
IMPORT_C int	SSL_get_error(const SSL *s,int ret_code);
sl@0
  1410
IMPORT_C const char *SSL_get_version(const SSL *s);
sl@0
  1411
sl@0
  1412
/* This sets the 'default' SSL version that SSL_new() will create */
sl@0
  1413
IMPORT_C int SSL_CTX_set_ssl_version(SSL_CTX *ctx,SSL_METHOD *meth);
sl@0
  1414
sl@0
  1415
IMPORT_C SSL_METHOD *SSLv2_method(void);		/* SSLv2 */
sl@0
  1416
IMPORT_C SSL_METHOD *SSLv2_server_method(void);	/* SSLv2 */
sl@0
  1417
IMPORT_C SSL_METHOD *SSLv2_client_method(void);	/* SSLv2 */
sl@0
  1418
sl@0
  1419
IMPORT_C SSL_METHOD *SSLv3_method(void);		/* SSLv3 */
sl@0
  1420
IMPORT_C SSL_METHOD *SSLv3_server_method(void);	/* SSLv3 */
sl@0
  1421
IMPORT_C SSL_METHOD *SSLv3_client_method(void);	/* SSLv3 */
sl@0
  1422
sl@0
  1423
IMPORT_C SSL_METHOD *SSLv23_method(void);	/* SSLv3 but can rollback to v2 */
sl@0
  1424
IMPORT_C SSL_METHOD *SSLv23_server_method(void);	/* SSLv3 but can rollback to v2 */
sl@0
  1425
IMPORT_C SSL_METHOD *SSLv23_client_method(void);	/* SSLv3 but can rollback to v2 */
sl@0
  1426
sl@0
  1427
IMPORT_C SSL_METHOD *TLSv1_method(void);		/* TLSv1.0 */
sl@0
  1428
IMPORT_C SSL_METHOD *TLSv1_server_method(void);	/* TLSv1.0 */
sl@0
  1429
IMPORT_C SSL_METHOD *TLSv1_client_method(void);	/* TLSv1.0 */
sl@0
  1430
sl@0
  1431
IMPORT_C SSL_METHOD *DTLSv1_method(void);		/* DTLSv1.0 */
sl@0
  1432
IMPORT_C SSL_METHOD *DTLSv1_server_method(void);	/* DTLSv1.0 */
sl@0
  1433
IMPORT_C SSL_METHOD *DTLSv1_client_method(void);	/* DTLSv1.0 */
sl@0
  1434
sl@0
  1435
IMPORT_C STACK_OF(SSL_CIPHER) *SSL_get_ciphers(const SSL *s);
sl@0
  1436
sl@0
  1437
IMPORT_C int SSL_do_handshake(SSL *s);
sl@0
  1438
IMPORT_C int SSL_renegotiate(SSL *s);
sl@0
  1439
IMPORT_C int SSL_renegotiate_pending(SSL *s);
sl@0
  1440
IMPORT_C int SSL_shutdown(SSL *s);
sl@0
  1441
sl@0
  1442
IMPORT_C SSL_METHOD *SSL_get_ssl_method(SSL *s);
sl@0
  1443
IMPORT_C int SSL_set_ssl_method(SSL *s,SSL_METHOD *method);
sl@0
  1444
IMPORT_C const char *SSL_alert_type_string_long(int value);
sl@0
  1445
IMPORT_C const char *SSL_alert_type_string(int value);
sl@0
  1446
IMPORT_C const char *SSL_alert_desc_string_long(int value);
sl@0
  1447
IMPORT_C const char *SSL_alert_desc_string(int value);
sl@0
  1448
sl@0
  1449
IMPORT_C void SSL_set_client_CA_list(SSL *s, STACK_OF(X509_NAME) *name_list);
sl@0
  1450
IMPORT_C void SSL_CTX_set_client_CA_list(SSL_CTX *ctx, STACK_OF(X509_NAME) *name_list);
sl@0
  1451
IMPORT_C STACK_OF(X509_NAME) *SSL_get_client_CA_list(const SSL *s);
sl@0
  1452
IMPORT_C STACK_OF(X509_NAME) *SSL_CTX_get_client_CA_list(const SSL_CTX *s);
sl@0
  1453
IMPORT_C int SSL_add_client_CA(SSL *ssl,X509 *x);
sl@0
  1454
IMPORT_C int SSL_CTX_add_client_CA(SSL_CTX *ctx,X509 *x);
sl@0
  1455
sl@0
  1456
IMPORT_C void SSL_set_connect_state(SSL *s);
sl@0
  1457
IMPORT_C void SSL_set_accept_state(SSL *s);
sl@0
  1458
sl@0
  1459
IMPORT_C long SSL_get_default_timeout(const SSL *s);
sl@0
  1460
sl@0
  1461
IMPORT_C int SSL_library_init(void );
sl@0
  1462
sl@0
  1463
IMPORT_C char *SSL_CIPHER_description(SSL_CIPHER *,char *buf,int size);
sl@0
  1464
IMPORT_C STACK_OF(X509_NAME) *SSL_dup_CA_list(STACK_OF(X509_NAME) *sk);
sl@0
  1465
sl@0
  1466
IMPORT_C SSL *SSL_dup(SSL *ssl);
sl@0
  1467
sl@0
  1468
IMPORT_C X509 *SSL_get_certificate(const SSL *ssl);
sl@0
  1469
IMPORT_C /* EVP_PKEY */ struct evp_pkey_st *SSL_get_privatekey(SSL *ssl);
sl@0
  1470
sl@0
  1471
IMPORT_C void SSL_CTX_set_quiet_shutdown(SSL_CTX *ctx,int mode);
sl@0
  1472
IMPORT_C int SSL_CTX_get_quiet_shutdown(const SSL_CTX *ctx);
sl@0
  1473
IMPORT_C void SSL_set_quiet_shutdown(SSL *ssl,int mode);
sl@0
  1474
IMPORT_C int SSL_get_quiet_shutdown(const SSL *ssl);
sl@0
  1475
IMPORT_C void SSL_set_shutdown(SSL *ssl,int mode);
sl@0
  1476
IMPORT_C int SSL_get_shutdown(const SSL *ssl);
sl@0
  1477
IMPORT_C int SSL_version(const SSL *ssl);
sl@0
  1478
IMPORT_C int SSL_CTX_set_default_verify_paths(SSL_CTX *ctx);
sl@0
  1479
IMPORT_C int SSL_CTX_load_verify_locations(SSL_CTX *ctx, const char *CAfile,
sl@0
  1480
	const char *CApath);
sl@0
  1481
#define SSL_get0_session SSL_get_session /* just peek at pointer */
sl@0
  1482
IMPORT_C SSL_SESSION *SSL_get_session(const SSL *ssl);
sl@0
  1483
IMPORT_C SSL_SESSION *SSL_get1_session(SSL *ssl); /* obtain a reference count */
sl@0
  1484
IMPORT_C SSL_CTX *SSL_get_SSL_CTX(const SSL *ssl);
sl@0
  1485
IMPORT_C SSL_CTX *SSL_set_SSL_CTX(SSL *ssl, SSL_CTX* ctx);
sl@0
  1486
IMPORT_C void SSL_set_info_callback(SSL *ssl,
sl@0
  1487
			   void (*cb)(const SSL *ssl,int type,int val));
sl@0
  1488
IMPORT_C void (*SSL_get_info_callback(const SSL *ssl))(const SSL *ssl,int type,int val);
sl@0
  1489
IMPORT_C int SSL_state(const SSL *ssl);
sl@0
  1490
sl@0
  1491
IMPORT_C void SSL_set_verify_result(SSL *ssl,long v);
sl@0
  1492
IMPORT_C long SSL_get_verify_result(const SSL *ssl);
sl@0
  1493
sl@0
  1494
IMPORT_C int SSL_set_ex_data(SSL *ssl,int idx,void *data);
sl@0
  1495
IMPORT_C void *SSL_get_ex_data(const SSL *ssl,int idx);
sl@0
  1496
IMPORT_C int SSL_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func,
sl@0
  1497
	CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func);
sl@0
  1498
sl@0
  1499
IMPORT_C int SSL_SESSION_set_ex_data(SSL_SESSION *ss,int idx,void *data);
sl@0
  1500
IMPORT_C void *SSL_SESSION_get_ex_data(const SSL_SESSION *ss,int idx);
sl@0
  1501
IMPORT_C int SSL_SESSION_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func,
sl@0
  1502
	CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func);
sl@0
  1503
sl@0
  1504
IMPORT_C int SSL_CTX_set_ex_data(SSL_CTX *ssl,int idx,void *data);
sl@0
  1505
IMPORT_C void *SSL_CTX_get_ex_data(const SSL_CTX *ssl,int idx);
sl@0
  1506
IMPORT_C int SSL_CTX_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func,
sl@0
  1507
	CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func);
sl@0
  1508
sl@0
  1509
IMPORT_C int SSL_get_ex_data_X509_STORE_CTX_idx(void );
sl@0
  1510
sl@0
  1511
#define SSL_CTX_sess_set_cache_size(ctx,t) \
sl@0
  1512
	SSL_CTX_ctrl(ctx,SSL_CTRL_SET_SESS_CACHE_SIZE,t,NULL)
sl@0
  1513
#define SSL_CTX_sess_get_cache_size(ctx) \
sl@0
  1514
	SSL_CTX_ctrl(ctx,SSL_CTRL_GET_SESS_CACHE_SIZE,0,NULL)
sl@0
  1515
#define SSL_CTX_set_session_cache_mode(ctx,m) \
sl@0
  1516
	SSL_CTX_ctrl(ctx,SSL_CTRL_SET_SESS_CACHE_MODE,m,NULL)
sl@0
  1517
#define SSL_CTX_get_session_cache_mode(ctx) \
sl@0
  1518
	SSL_CTX_ctrl(ctx,SSL_CTRL_GET_SESS_CACHE_MODE,0,NULL)
sl@0
  1519
sl@0
  1520
#define SSL_CTX_get_default_read_ahead(ctx) SSL_CTX_get_read_ahead(ctx)
sl@0
  1521
#define SSL_CTX_set_default_read_ahead(ctx,m) SSL_CTX_set_read_ahead(ctx,m)
sl@0
  1522
#define SSL_CTX_get_read_ahead(ctx) \
sl@0
  1523
	SSL_CTX_ctrl(ctx,SSL_CTRL_GET_READ_AHEAD,0,NULL)
sl@0
  1524
#define SSL_CTX_set_read_ahead(ctx,m) \
sl@0
  1525
	SSL_CTX_ctrl(ctx,SSL_CTRL_SET_READ_AHEAD,m,NULL)
sl@0
  1526
#define SSL_CTX_get_max_cert_list(ctx) \
sl@0
  1527
	SSL_CTX_ctrl(ctx,SSL_CTRL_GET_MAX_CERT_LIST,0,NULL)
sl@0
  1528
#define SSL_CTX_set_max_cert_list(ctx,m) \
sl@0
  1529
	SSL_CTX_ctrl(ctx,SSL_CTRL_SET_MAX_CERT_LIST,m,NULL)
sl@0
  1530
#define SSL_get_max_cert_list(ssl) \
sl@0
  1531
	SSL_ctrl(ssl,SSL_CTRL_GET_MAX_CERT_LIST,0,NULL)
sl@0
  1532
#define SSL_set_max_cert_list(ssl,m) \
sl@0
  1533
	SSL_ctrl(ssl,SSL_CTRL_SET_MAX_CERT_LIST,m,NULL)
sl@0
  1534
sl@0
  1535
     /* NB: the keylength is only applicable when is_export is true */
sl@0
  1536
#ifndef OPENSSL_NO_RSA
sl@0
  1537
IMPORT_C void SSL_CTX_set_tmp_rsa_callback(SSL_CTX *ctx,
sl@0
  1538
				  RSA *(*cb)(SSL *ssl,int is_export,
sl@0
  1539
					     int keylength));
sl@0
  1540
sl@0
  1541
IMPORT_C void SSL_set_tmp_rsa_callback(SSL *ssl,
sl@0
  1542
				  RSA *(*cb)(SSL *ssl,int is_export,
sl@0
  1543
					     int keylength));
sl@0
  1544
#endif
sl@0
  1545
#ifndef OPENSSL_NO_DH
sl@0
  1546
IMPORT_C void SSL_CTX_set_tmp_dh_callback(SSL_CTX *ctx,
sl@0
  1547
				 DH *(*dh)(SSL *ssl,int is_export,
sl@0
  1548
					   int keylength));
sl@0
  1549
IMPORT_C void SSL_set_tmp_dh_callback(SSL *ssl,
sl@0
  1550
				 DH *(*dh)(SSL *ssl,int is_export,
sl@0
  1551
					   int keylength));
sl@0
  1552
#endif
sl@0
  1553
#ifndef OPENSSL_NO_ECDH
sl@0
  1554
IMPORT_C void SSL_CTX_set_tmp_ecdh_callback(SSL_CTX *ctx,
sl@0
  1555
				 EC_KEY *(*ecdh)(SSL *ssl,int is_export,
sl@0
  1556
					   int keylength));
sl@0
  1557
IMPORT_C void SSL_set_tmp_ecdh_callback(SSL *ssl,
sl@0
  1558
				 EC_KEY *(*ecdh)(SSL *ssl,int is_export,
sl@0
  1559
					   int keylength));
sl@0
  1560
#endif
sl@0
  1561
sl@0
  1562
#ifndef OPENSSL_NO_COMP
sl@0
  1563
IMPORT_C const COMP_METHOD *SSL_get_current_compression(SSL *s);
sl@0
  1564
IMPORT_C const COMP_METHOD *SSL_get_current_expansion(SSL *s);
sl@0
  1565
IMPORT_C const char *SSL_COMP_get_name(const COMP_METHOD *comp);
sl@0
  1566
IMPORT_C STACK_OF(SSL_COMP) *SSL_COMP_get_compression_methods(void);
sl@0
  1567
IMPORT_C int SSL_COMP_add_compression_method(int id,COMP_METHOD *cm);
sl@0
  1568
#else
sl@0
  1569
IMPORT_C const void *SSL_get_current_compression(SSL *s);
sl@0
  1570
IMPORT_C const void *SSL_get_current_expansion(SSL *s);
sl@0
  1571
IMPORT_C const char *SSL_COMP_get_name(const void *comp);
sl@0
  1572
IMPORT_C void *SSL_COMP_get_compression_methods(void);
sl@0
  1573
IMPORT_C int SSL_COMP_add_compression_method(int id,void *cm);
sl@0
  1574
#endif
sl@0
  1575
sl@0
  1576
/* BEGIN ERROR CODES */
sl@0
  1577
/* The following lines are auto generated by the script mkerr.pl. Any changes
sl@0
  1578
 * made after this point may be overwritten when the script is next run.
sl@0
  1579
 */
sl@0
  1580
IMPORT_C void ERR_load_SSL_strings(void);
sl@0
  1581
sl@0
  1582
/* Error codes for the SSL functions. */
sl@0
  1583
sl@0
  1584
/* Function codes. */
sl@0
  1585
#define SSL_F_CLIENT_CERTIFICATE			 100
sl@0
  1586
#define SSL_F_CLIENT_FINISHED				 167
sl@0
  1587
#define SSL_F_CLIENT_HELLO				 101
sl@0
  1588
#define SSL_F_CLIENT_MASTER_KEY				 102
sl@0
  1589
#define SSL_F_D2I_SSL_SESSION				 103
sl@0
  1590
#define SSL_F_DO_DTLS1_WRITE				 245
sl@0
  1591
#define SSL_F_DO_SSL3_WRITE				 104
sl@0
  1592
#define SSL_F_DTLS1_ACCEPT				 246
sl@0
  1593
#define SSL_F_DTLS1_BUFFER_RECORD			 247
sl@0
  1594
#define SSL_F_DTLS1_CLIENT_HELLO			 248
sl@0
  1595
#define SSL_F_DTLS1_CONNECT				 249
sl@0
  1596
#define SSL_F_DTLS1_ENC					 250
sl@0
  1597
#define SSL_F_DTLS1_GET_HELLO_VERIFY			 251
sl@0
  1598
#define SSL_F_DTLS1_GET_MESSAGE				 252
sl@0
  1599
#define SSL_F_DTLS1_GET_MESSAGE_FRAGMENT		 253
sl@0
  1600
#define SSL_F_DTLS1_GET_RECORD				 254
sl@0
  1601
#define SSL_F_DTLS1_OUTPUT_CERT_CHAIN			 255
sl@0
  1602
#define SSL_F_DTLS1_PREPROCESS_FRAGMENT			 277
sl@0
  1603
#define SSL_F_DTLS1_PROCESS_OUT_OF_SEQ_MESSAGE		 256
sl@0
  1604
#define SSL_F_DTLS1_PROCESS_RECORD			 257
sl@0
  1605
#define SSL_F_DTLS1_READ_BYTES				 258
sl@0
  1606
#define SSL_F_DTLS1_READ_FAILED				 259
sl@0
  1607
#define SSL_F_DTLS1_SEND_CERTIFICATE_REQUEST		 260
sl@0
  1608
#define SSL_F_DTLS1_SEND_CLIENT_CERTIFICATE		 261
sl@0
  1609
#define SSL_F_DTLS1_SEND_CLIENT_KEY_EXCHANGE		 262
sl@0
  1610
#define SSL_F_DTLS1_SEND_CLIENT_VERIFY			 263
sl@0
  1611
#define SSL_F_DTLS1_SEND_HELLO_VERIFY_REQUEST		 264
sl@0
  1612
#define SSL_F_DTLS1_SEND_SERVER_CERTIFICATE		 265
sl@0
  1613
#define SSL_F_DTLS1_SEND_SERVER_HELLO			 266
sl@0
  1614
#define SSL_F_DTLS1_SEND_SERVER_KEY_EXCHANGE		 267
sl@0
  1615
#define SSL_F_DTLS1_WRITE_APP_DATA_BYTES		 268
sl@0
  1616
#define SSL_F_GET_CLIENT_FINISHED			 105
sl@0
  1617
#define SSL_F_GET_CLIENT_HELLO				 106
sl@0
  1618
#define SSL_F_GET_CLIENT_MASTER_KEY			 107
sl@0
  1619
#define SSL_F_GET_SERVER_FINISHED			 108
sl@0
  1620
#define SSL_F_GET_SERVER_HELLO				 109
sl@0
  1621
#define SSL_F_GET_SERVER_VERIFY				 110
sl@0
  1622
#define SSL_F_I2D_SSL_SESSION				 111
sl@0
  1623
#define SSL_F_READ_N					 112
sl@0
  1624
#define SSL_F_REQUEST_CERTIFICATE			 113
sl@0
  1625
#define SSL_F_SERVER_FINISH				 239
sl@0
  1626
#define SSL_F_SERVER_HELLO				 114
sl@0
  1627
#define SSL_F_SERVER_VERIFY				 240
sl@0
  1628
#define SSL_F_SSL23_ACCEPT				 115
sl@0
  1629
#define SSL_F_SSL23_CLIENT_HELLO			 116
sl@0
  1630
#define SSL_F_SSL23_CONNECT				 117
sl@0
  1631
#define SSL_F_SSL23_GET_CLIENT_HELLO			 118
sl@0
  1632
#define SSL_F_SSL23_GET_SERVER_HELLO			 119
sl@0
  1633
#define SSL_F_SSL23_PEEK				 237
sl@0
  1634
#define SSL_F_SSL23_READ				 120
sl@0
  1635
#define SSL_F_SSL23_WRITE				 121
sl@0
  1636
#define SSL_F_SSL2_ACCEPT				 122
sl@0
  1637
#define SSL_F_SSL2_CONNECT				 123
sl@0
  1638
#define SSL_F_SSL2_ENC_INIT				 124
sl@0
  1639
#define SSL_F_SSL2_GENERATE_KEY_MATERIAL		 241
sl@0
  1640
#define SSL_F_SSL2_PEEK					 234
sl@0
  1641
#define SSL_F_SSL2_READ					 125
sl@0
  1642
#define SSL_F_SSL2_READ_INTERNAL			 236
sl@0
  1643
#define SSL_F_SSL2_SET_CERTIFICATE			 126
sl@0
  1644
#define SSL_F_SSL2_WRITE				 127
sl@0
  1645
#define SSL_F_SSL3_ACCEPT				 128
sl@0
  1646
#define SSL_F_SSL3_CALLBACK_CTRL			 233
sl@0
  1647
#define SSL_F_SSL3_CHANGE_CIPHER_STATE			 129
sl@0
  1648
#define SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM		 130
sl@0
  1649
#define SSL_F_SSL3_CLIENT_HELLO				 131
sl@0
  1650
#define SSL_F_SSL3_CONNECT				 132
sl@0
  1651
#define SSL_F_SSL3_CTRL					 213
sl@0
  1652
#define SSL_F_SSL3_CTX_CTRL				 133
sl@0
  1653
#define SSL_F_SSL3_ENC					 134
sl@0
  1654
#define SSL_F_SSL3_GENERATE_KEY_BLOCK			 238
sl@0
  1655
#define SSL_F_SSL3_GET_CERTIFICATE_REQUEST		 135
sl@0
  1656
#define SSL_F_SSL3_GET_CERT_VERIFY			 136
sl@0
  1657
#define SSL_F_SSL3_GET_CLIENT_CERTIFICATE		 137
sl@0
  1658
#define SSL_F_SSL3_GET_CLIENT_HELLO			 138
sl@0
  1659
#define SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE		 139
sl@0
  1660
#define SSL_F_SSL3_GET_FINISHED				 140
sl@0
  1661
#define SSL_F_SSL3_GET_KEY_EXCHANGE			 141
sl@0
  1662
#define SSL_F_SSL3_GET_MESSAGE				 142
sl@0
  1663
#define SSL_F_SSL3_GET_NEW_SESSION_TICKET		 283
sl@0
  1664
#define SSL_F_SSL3_GET_RECORD				 143
sl@0
  1665
#define SSL_F_SSL3_GET_SERVER_CERTIFICATE		 144
sl@0
  1666
#define SSL_F_SSL3_GET_SERVER_DONE			 145
sl@0
  1667
#define SSL_F_SSL3_GET_SERVER_HELLO			 146
sl@0
  1668
#define SSL_F_SSL3_NEW_SESSION_TICKET			 284
sl@0
  1669
#define SSL_F_SSL3_OUTPUT_CERT_CHAIN			 147
sl@0
  1670
#define SSL_F_SSL3_PEEK					 235
sl@0
  1671
#define SSL_F_SSL3_READ_BYTES				 148
sl@0
  1672
#define SSL_F_SSL3_READ_N				 149
sl@0
  1673
#define SSL_F_SSL3_SEND_CERTIFICATE_REQUEST		 150
sl@0
  1674
#define SSL_F_SSL3_SEND_CLIENT_CERTIFICATE		 151
sl@0
  1675
#define SSL_F_SSL3_SEND_CLIENT_KEY_EXCHANGE		 152
sl@0
  1676
#define SSL_F_SSL3_SEND_CLIENT_VERIFY			 153
sl@0
  1677
#define SSL_F_SSL3_SEND_SERVER_CERTIFICATE		 154
sl@0
  1678
#define SSL_F_SSL3_SEND_SERVER_HELLO			 242
sl@0
  1679
#define SSL_F_SSL3_SEND_SERVER_KEY_EXCHANGE		 155
sl@0
  1680
#define SSL_F_SSL3_SETUP_BUFFERS			 156
sl@0
  1681
#define SSL_F_SSL3_SETUP_KEY_BLOCK			 157
sl@0
  1682
#define SSL_F_SSL3_WRITE_BYTES				 158
sl@0
  1683
#define SSL_F_SSL3_WRITE_PENDING			 159
sl@0
  1684
#define SSL_F_SSL_ADD_CLIENTHELLO_TLSEXT		 272
sl@0
  1685
#define SSL_F_SSL_ADD_DIR_CERT_SUBJECTS_TO_STACK	 215
sl@0
  1686
#define SSL_F_SSL_ADD_FILE_CERT_SUBJECTS_TO_STACK	 216
sl@0
  1687
#define SSL_F_SSL_ADD_SERVERHELLO_TLSEXT		 273
sl@0
  1688
#define SSL_F_SSL_BAD_METHOD				 160
sl@0
  1689
#define SSL_F_SSL_BYTES_TO_CIPHER_LIST			 161
sl@0
  1690
#define SSL_F_SSL_CERT_DUP				 221
sl@0
  1691
#define SSL_F_SSL_CERT_INST				 222
sl@0
  1692
#define SSL_F_SSL_CERT_INSTANTIATE			 214
sl@0
  1693
#define SSL_F_SSL_CERT_NEW				 162
sl@0
  1694
#define SSL_F_SSL_CHECK_PRIVATE_KEY			 163
sl@0
  1695
#define SSL_F_SSL_CHECK_SERVERHELLO_TLSEXT		 274
sl@0
  1696
#define SSL_F_SSL_CIPHER_PROCESS_RULESTR		 230
sl@0
  1697
#define SSL_F_SSL_CIPHER_STRENGTH_SORT			 231
sl@0
  1698
#define SSL_F_SSL_CLEAR					 164
sl@0
  1699
#define SSL_F_SSL_COMP_ADD_COMPRESSION_METHOD		 165
sl@0
  1700
#define SSL_F_SSL_CREATE_CIPHER_LIST			 166
sl@0
  1701
#define SSL_F_SSL_CTRL					 232
sl@0
  1702
#define SSL_F_SSL_CTX_CHECK_PRIVATE_KEY			 168
sl@0
  1703
#define SSL_F_SSL_CTX_NEW				 169
sl@0
  1704
#define SSL_F_SSL_CTX_SET_CIPHER_LIST			 269
sl@0
  1705
#define SSL_F_SSL_CTX_SET_PURPOSE			 226
sl@0
  1706
#define SSL_F_SSL_CTX_SET_SESSION_ID_CONTEXT		 219
sl@0
  1707
#define SSL_F_SSL_CTX_SET_SSL_VERSION			 170
sl@0
  1708
#define SSL_F_SSL_CTX_SET_TRUST				 229
sl@0
  1709
#define SSL_F_SSL_CTX_USE_CERTIFICATE			 171
sl@0
  1710
#define SSL_F_SSL_CTX_USE_CERTIFICATE_ASN1		 172
sl@0
  1711
#define SSL_F_SSL_CTX_USE_CERTIFICATE_CHAIN_FILE	 220
sl@0
  1712
#define SSL_F_SSL_CTX_USE_CERTIFICATE_FILE		 173
sl@0
  1713
#define SSL_F_SSL_CTX_USE_PRIVATEKEY			 174
sl@0
  1714
#define SSL_F_SSL_CTX_USE_PRIVATEKEY_ASN1		 175
sl@0
  1715
#define SSL_F_SSL_CTX_USE_PRIVATEKEY_FILE		 176
sl@0
  1716
#define SSL_F_SSL_CTX_USE_RSAPRIVATEKEY			 177
sl@0
  1717
#define SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_ASN1		 178
sl@0
  1718
#define SSL_F_SSL_CTX_USE_RSAPRIVATEKEY_FILE		 179
sl@0
  1719
#define SSL_F_SSL_DO_HANDSHAKE				 180
sl@0
  1720
#define SSL_F_SSL_GET_NEW_SESSION			 181
sl@0
  1721
#define SSL_F_SSL_GET_PREV_SESSION			 217
sl@0
  1722
#define SSL_F_SSL_GET_SERVER_SEND_CERT			 182
sl@0
  1723
#define SSL_F_SSL_GET_SIGN_PKEY				 183
sl@0
  1724
#define SSL_F_SSL_INIT_WBIO_BUFFER			 184
sl@0
  1725
#define SSL_F_SSL_LOAD_CLIENT_CA_FILE			 185
sl@0
  1726
#define SSL_F_SSL_NEW					 186
sl@0
  1727
#define SSL_F_SSL_PEEK					 270
sl@0
  1728
#define SSL_F_SSL_PREPARE_CLIENTHELLO_TLSEXT		 275
sl@0
  1729
#define SSL_F_SSL_PREPARE_SERVERHELLO_TLSEXT		 276
sl@0
  1730
#define SSL_F_SSL_READ					 223
sl@0
  1731
#define SSL_F_SSL_RSA_PRIVATE_DECRYPT			 187
sl@0
  1732
#define SSL_F_SSL_RSA_PUBLIC_ENCRYPT			 188
sl@0
  1733
#define SSL_F_SSL_SESSION_NEW				 189
sl@0
  1734
#define SSL_F_SSL_SESSION_PRINT_FP			 190
sl@0
  1735
#define SSL_F_SSL_SESS_CERT_NEW				 225
sl@0
  1736
#define SSL_F_SSL_SET_CERT				 191
sl@0
  1737
#define SSL_F_SSL_SET_CIPHER_LIST			 271
sl@0
  1738
#define SSL_F_SSL_SET_FD				 192
sl@0
  1739
#define SSL_F_SSL_SET_PKEY				 193
sl@0
  1740
#define SSL_F_SSL_SET_PURPOSE				 227
sl@0
  1741
#define SSL_F_SSL_SET_RFD				 194
sl@0
  1742
#define SSL_F_SSL_SET_SESSION				 195
sl@0
  1743
#define SSL_F_SSL_SET_SESSION_ID_CONTEXT		 218
sl@0
  1744
#define SSL_F_SSL_SET_TRUST				 228
sl@0
  1745
#define SSL_F_SSL_SET_WFD				 196
sl@0
  1746
#define SSL_F_SSL_SHUTDOWN				 224
sl@0
  1747
#define SSL_F_SSL_UNDEFINED_CONST_FUNCTION		 243
sl@0
  1748
#define SSL_F_SSL_UNDEFINED_FUNCTION			 197
sl@0
  1749
#define SSL_F_SSL_UNDEFINED_VOID_FUNCTION		 244
sl@0
  1750
#define SSL_F_SSL_USE_CERTIFICATE			 198
sl@0
  1751
#define SSL_F_SSL_USE_CERTIFICATE_ASN1			 199
sl@0
  1752
#define SSL_F_SSL_USE_CERTIFICATE_FILE			 200
sl@0
  1753
#define SSL_F_SSL_USE_PRIVATEKEY			 201
sl@0
  1754
#define SSL_F_SSL_USE_PRIVATEKEY_ASN1			 202
sl@0
  1755
#define SSL_F_SSL_USE_PRIVATEKEY_FILE			 203
sl@0
  1756
#define SSL_F_SSL_USE_RSAPRIVATEKEY			 204
sl@0
  1757
#define SSL_F_SSL_USE_RSAPRIVATEKEY_ASN1		 205
sl@0
  1758
#define SSL_F_SSL_USE_RSAPRIVATEKEY_FILE		 206
sl@0
  1759
#define SSL_F_SSL_VERIFY_CERT_CHAIN			 207
sl@0
  1760
#define SSL_F_SSL_WRITE					 208
sl@0
  1761
#define SSL_F_TLS1_CHANGE_CIPHER_STATE			 209
sl@0
  1762
#define SSL_F_TLS1_ENC					 210
sl@0
  1763
#define SSL_F_TLS1_SETUP_KEY_BLOCK			 211
sl@0
  1764
#define SSL_F_WRITE_PENDING				 212
sl@0
  1765
sl@0
  1766
/* Reason codes. */
sl@0
  1767
#define SSL_R_APP_DATA_IN_HANDSHAKE			 100
sl@0
  1768
#define SSL_R_ATTEMPT_TO_REUSE_SESSION_IN_DIFFERENT_CONTEXT 272
sl@0
  1769
#define SSL_R_BAD_ALERT_RECORD				 101
sl@0
  1770
#define SSL_R_BAD_AUTHENTICATION_TYPE			 102
sl@0
  1771
#define SSL_R_BAD_CHANGE_CIPHER_SPEC			 103
sl@0
  1772
#define SSL_R_BAD_CHECKSUM				 104
sl@0
  1773
#define SSL_R_BAD_DATA_RETURNED_BY_CALLBACK		 106
sl@0
  1774
#define SSL_R_BAD_DECOMPRESSION				 107
sl@0
  1775
#define SSL_R_BAD_DH_G_LENGTH				 108
sl@0
  1776
#define SSL_R_BAD_DH_PUB_KEY_LENGTH			 109
sl@0
  1777
#define SSL_R_BAD_DH_P_LENGTH				 110
sl@0
  1778
#define SSL_R_BAD_DIGEST_LENGTH				 111
sl@0
  1779
#define SSL_R_BAD_DSA_SIGNATURE				 112
sl@0
  1780
#define SSL_R_BAD_ECC_CERT				 304
sl@0
  1781
#define SSL_R_BAD_ECDSA_SIGNATURE			 305
sl@0
  1782
#define SSL_R_BAD_ECPOINT				 306
sl@0
  1783
#define SSL_R_BAD_HELLO_REQUEST				 105
sl@0
  1784
#define SSL_R_BAD_LENGTH				 271
sl@0
  1785
#define SSL_R_BAD_MAC_DECODE				 113
sl@0
  1786
#define SSL_R_BAD_MESSAGE_TYPE				 114
sl@0
  1787
#define SSL_R_BAD_PACKET_LENGTH				 115
sl@0
  1788
#define SSL_R_BAD_PROTOCOL_VERSION_NUMBER		 116
sl@0
  1789
#define SSL_R_BAD_RESPONSE_ARGUMENT			 117
sl@0
  1790
#define SSL_R_BAD_RSA_DECRYPT				 118
sl@0
  1791
#define SSL_R_BAD_RSA_ENCRYPT				 119
sl@0
  1792
#define SSL_R_BAD_RSA_E_LENGTH				 120
sl@0
  1793
#define SSL_R_BAD_RSA_MODULUS_LENGTH			 121
sl@0
  1794
#define SSL_R_BAD_RSA_SIGNATURE				 122
sl@0
  1795
#define SSL_R_BAD_SIGNATURE				 123
sl@0
  1796
#define SSL_R_BAD_SSL_FILETYPE				 124
sl@0
  1797
#define SSL_R_BAD_SSL_SESSION_ID_LENGTH			 125
sl@0
  1798
#define SSL_R_BAD_STATE					 126
sl@0
  1799
#define SSL_R_BAD_WRITE_RETRY				 127
sl@0
  1800
#define SSL_R_BIO_NOT_SET				 128
sl@0
  1801
#define SSL_R_BLOCK_CIPHER_PAD_IS_WRONG			 129
sl@0
  1802
#define SSL_R_BN_LIB					 130
sl@0
  1803
#define SSL_R_CA_DN_LENGTH_MISMATCH			 131
sl@0
  1804
#define SSL_R_CA_DN_TOO_LONG				 132
sl@0
  1805
#define SSL_R_CCS_RECEIVED_EARLY			 133
sl@0
  1806
#define SSL_R_CERTIFICATE_VERIFY_FAILED			 134
sl@0
  1807
#define SSL_R_CERT_LENGTH_MISMATCH			 135
sl@0
  1808
#define SSL_R_CHALLENGE_IS_DIFFERENT			 136
sl@0
  1809
#define SSL_R_CIPHER_CODE_WRONG_LENGTH			 137
sl@0
  1810
#define SSL_R_CIPHER_OR_HASH_UNAVAILABLE		 138
sl@0
  1811
#define SSL_R_CIPHER_TABLE_SRC_ERROR			 139
sl@0
  1812
#define SSL_R_CLIENTHELLO_TLSEXT			 157
sl@0
  1813
#define SSL_R_COMPRESSED_LENGTH_TOO_LONG		 140
sl@0
  1814
#define SSL_R_COMPRESSION_FAILURE			 141
sl@0
  1815
#define SSL_R_COMPRESSION_ID_NOT_WITHIN_PRIVATE_RANGE	 307
sl@0
  1816
#define SSL_R_COMPRESSION_LIBRARY_ERROR			 142
sl@0
  1817
#define SSL_R_CONNECTION_ID_IS_DIFFERENT		 143
sl@0
  1818
#define SSL_R_CONNECTION_TYPE_NOT_SET			 144
sl@0
  1819
#define SSL_R_COOKIE_MISMATCH				 308
sl@0
  1820
#define SSL_R_DATA_BETWEEN_CCS_AND_FINISHED		 145
sl@0
  1821
#define SSL_R_DATA_LENGTH_TOO_LONG			 146
sl@0
  1822
#define SSL_R_DECRYPTION_FAILED				 147
sl@0
  1823
#define SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC	 281
sl@0
  1824
#define SSL_R_DH_PUBLIC_VALUE_LENGTH_IS_WRONG		 148
sl@0
  1825
#define SSL_R_DIGEST_CHECK_FAILED			 149
sl@0
  1826
#define SSL_R_DUPLICATE_COMPRESSION_ID			 309
sl@0
  1827
#define SSL_R_ECGROUP_TOO_LARGE_FOR_CIPHER		 310
sl@0
  1828
#define SSL_R_ENCRYPTED_LENGTH_TOO_LONG			 150
sl@0
  1829
#define SSL_R_ERROR_GENERATING_TMP_RSA_KEY		 282
sl@0
  1830
#define SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST		 151
sl@0
  1831
#define SSL_R_EXCESSIVE_MESSAGE_SIZE			 152
sl@0
  1832
#define SSL_R_EXTRA_DATA_IN_MESSAGE			 153
sl@0
  1833
#define SSL_R_GOT_A_FIN_BEFORE_A_CCS			 154
sl@0
  1834
#define SSL_R_HTTPS_PROXY_REQUEST			 155
sl@0
  1835
#define SSL_R_HTTP_REQUEST				 156
sl@0
  1836
#define SSL_R_ILLEGAL_PADDING				 283
sl@0
  1837
#define SSL_R_INVALID_CHALLENGE_LENGTH			 158
sl@0
  1838
#define SSL_R_INVALID_COMMAND				 280
sl@0
  1839
#define SSL_R_INVALID_PURPOSE				 278
sl@0
  1840
#define SSL_R_INVALID_TICKET_KEYS_LENGTH		 275
sl@0
  1841
#define SSL_R_INVALID_TRUST				 279
sl@0
  1842
#define SSL_R_KEY_ARG_TOO_LONG				 284
sl@0
  1843
#define SSL_R_KRB5					 285
sl@0
  1844
#define SSL_R_KRB5_C_CC_PRINC				 286
sl@0
  1845
#define SSL_R_KRB5_C_GET_CRED				 287
sl@0
  1846
#define SSL_R_KRB5_C_INIT				 288
sl@0
  1847
#define SSL_R_KRB5_C_MK_REQ				 289
sl@0
  1848
#define SSL_R_KRB5_S_BAD_TICKET				 290
sl@0
  1849
#define SSL_R_KRB5_S_INIT				 291
sl@0
  1850
#define SSL_R_KRB5_S_RD_REQ				 292
sl@0
  1851
#define SSL_R_KRB5_S_TKT_EXPIRED			 293
sl@0
  1852
#define SSL_R_KRB5_S_TKT_NYV				 294
sl@0
  1853
#define SSL_R_KRB5_S_TKT_SKEW				 295
sl@0
  1854
#define SSL_R_LENGTH_MISMATCH				 159
sl@0
  1855
#define SSL_R_LENGTH_TOO_SHORT				 160
sl@0
  1856
#define SSL_R_LIBRARY_BUG				 274
sl@0
  1857
#define SSL_R_LIBRARY_HAS_NO_CIPHERS			 161
sl@0
  1858
#define SSL_R_MESSAGE_TOO_LONG				 296
sl@0
  1859
#define SSL_R_MISSING_DH_DSA_CERT			 162
sl@0
  1860
#define SSL_R_MISSING_DH_KEY				 163
sl@0
  1861
#define SSL_R_MISSING_DH_RSA_CERT			 164
sl@0
  1862
#define SSL_R_MISSING_DSA_SIGNING_CERT			 165
sl@0
  1863
#define SSL_R_MISSING_EXPORT_TMP_DH_KEY			 166
sl@0
  1864
#define SSL_R_MISSING_EXPORT_TMP_RSA_KEY		 167
sl@0
  1865
#define SSL_R_MISSING_RSA_CERTIFICATE			 168
sl@0
  1866
#define SSL_R_MISSING_RSA_ENCRYPTING_CERT		 169
sl@0
  1867
#define SSL_R_MISSING_RSA_SIGNING_CERT			 170
sl@0
  1868
#define SSL_R_MISSING_TMP_DH_KEY			 171
sl@0
  1869
#define SSL_R_MISSING_TMP_ECDH_KEY			 311
sl@0
  1870
#define SSL_R_MISSING_TMP_RSA_KEY			 172
sl@0
  1871
#define SSL_R_MISSING_TMP_RSA_PKEY			 173
sl@0
  1872
#define SSL_R_MISSING_VERIFY_MESSAGE			 174
sl@0
  1873
#define SSL_R_NON_SSLV2_INITIAL_PACKET			 175
sl@0
  1874
#define SSL_R_NO_CERTIFICATES_RETURNED			 176
sl@0
  1875
#define SSL_R_NO_CERTIFICATE_ASSIGNED			 177
sl@0
  1876
#define SSL_R_NO_CERTIFICATE_RETURNED			 178
sl@0
  1877
#define SSL_R_NO_CERTIFICATE_SET			 179
sl@0
  1878
#define SSL_R_NO_CERTIFICATE_SPECIFIED			 180
sl@0
  1879
#define SSL_R_NO_CIPHERS_AVAILABLE			 181
sl@0
  1880
#define SSL_R_NO_CIPHERS_PASSED				 182
sl@0
  1881
#define SSL_R_NO_CIPHERS_SPECIFIED			 183
sl@0
  1882
#define SSL_R_NO_CIPHER_LIST				 184
sl@0
  1883
#define SSL_R_NO_CIPHER_MATCH				 185
sl@0
  1884
#define SSL_R_NO_CLIENT_CERT_RECEIVED			 186
sl@0
  1885
#define SSL_R_NO_COMPRESSION_SPECIFIED			 187
sl@0
  1886
#define SSL_R_NO_METHOD_SPECIFIED			 188
sl@0
  1887
#define SSL_R_NO_PRIVATEKEY				 189
sl@0
  1888
#define SSL_R_NO_PRIVATE_KEY_ASSIGNED			 190
sl@0
  1889
#define SSL_R_NO_PROTOCOLS_AVAILABLE			 191
sl@0
  1890
#define SSL_R_NO_PUBLICKEY				 192
sl@0
  1891
#define SSL_R_NO_SHARED_CIPHER				 193
sl@0
  1892
#define SSL_R_NO_VERIFY_CALLBACK			 194
sl@0
  1893
#define SSL_R_NULL_SSL_CTX				 195
sl@0
  1894
#define SSL_R_NULL_SSL_METHOD_PASSED			 196
sl@0
  1895
#define SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED		 197
sl@0
  1896
#define SSL_R_ONLY_TLS_ALLOWED_IN_FIPS_MODE		 297
sl@0
  1897
#define SSL_R_PACKET_LENGTH_TOO_LONG			 198
sl@0
  1898
#define SSL_R_PARSE_TLSEXT				 223
sl@0
  1899
#define SSL_R_PATH_TOO_LONG				 270
sl@0
  1900
#define SSL_R_PEER_DID_NOT_RETURN_A_CERTIFICATE		 199
sl@0
  1901
#define SSL_R_PEER_ERROR				 200
sl@0
  1902
#define SSL_R_PEER_ERROR_CERTIFICATE			 201
sl@0
  1903
#define SSL_R_PEER_ERROR_NO_CERTIFICATE			 202
sl@0
  1904
#define SSL_R_PEER_ERROR_NO_CIPHER			 203
sl@0
  1905
#define SSL_R_PEER_ERROR_UNSUPPORTED_CERTIFICATE_TYPE	 204
sl@0
  1906
#define SSL_R_PRE_MAC_LENGTH_TOO_LONG			 205
sl@0
  1907
#define SSL_R_PROBLEMS_MAPPING_CIPHER_FUNCTIONS		 206
sl@0
  1908
#define SSL_R_PROTOCOL_IS_SHUTDOWN			 207
sl@0
  1909
#define SSL_R_PUBLIC_KEY_ENCRYPT_ERROR			 208
sl@0
  1910
#define SSL_R_PUBLIC_KEY_IS_NOT_RSA			 209
sl@0
  1911
#define SSL_R_PUBLIC_KEY_NOT_RSA			 210
sl@0
  1912
#define SSL_R_READ_BIO_NOT_SET				 211
sl@0
  1913
#define SSL_R_READ_TIMEOUT_EXPIRED			 312
sl@0
  1914
#define SSL_R_READ_WRONG_PACKET_TYPE			 212
sl@0
  1915
#define SSL_R_RECORD_LENGTH_MISMATCH			 213
sl@0
  1916
#define SSL_R_RECORD_TOO_LARGE				 214
sl@0
  1917
#define SSL_R_RECORD_TOO_SMALL				 298
sl@0
  1918
#define SSL_R_REQUIRED_CIPHER_MISSING			 215
sl@0
  1919
#define SSL_R_REUSE_CERT_LENGTH_NOT_ZERO		 216
sl@0
  1920
#define SSL_R_REUSE_CERT_TYPE_NOT_ZERO			 217
sl@0
  1921
#define SSL_R_REUSE_CIPHER_LIST_NOT_ZERO		 218
sl@0
  1922
#define SSL_R_SERVERHELLO_TLSEXT			 224
sl@0
  1923
#define SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED		 277
sl@0
  1924
#define SSL_R_SHORT_READ				 219
sl@0
  1925
#define SSL_R_SIGNATURE_FOR_NON_SIGNING_CERTIFICATE	 220
sl@0
  1926
#define SSL_R_SSL23_DOING_SESSION_ID_REUSE		 221
sl@0
  1927
#define SSL_R_SSL2_CONNECTION_ID_TOO_LONG		 299
sl@0
  1928
#define SSL_R_SSL3_EXT_INVALID_SERVERNAME		 225
sl@0
  1929
#define SSL_R_SSL3_EXT_INVALID_SERVERNAME_TYPE		 226
sl@0
  1930
#define SSL_R_SSL3_SESSION_ID_TOO_LONG			 300
sl@0
  1931
#define SSL_R_SSL3_SESSION_ID_TOO_SHORT			 222
sl@0
  1932
#define SSL_R_SSLV3_ALERT_BAD_CERTIFICATE		 1042
sl@0
  1933
#define SSL_R_SSLV3_ALERT_BAD_RECORD_MAC		 1020
sl@0
  1934
#define SSL_R_SSLV3_ALERT_CERTIFICATE_EXPIRED		 1045
sl@0
  1935
#define SSL_R_SSLV3_ALERT_CERTIFICATE_REVOKED		 1044
sl@0
  1936
#define SSL_R_SSLV3_ALERT_CERTIFICATE_UNKNOWN		 1046
sl@0
  1937
#define SSL_R_SSLV3_ALERT_DECOMPRESSION_FAILURE		 1030
sl@0
  1938
#define SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE		 1040
sl@0
  1939
#define SSL_R_SSLV3_ALERT_ILLEGAL_PARAMETER		 1047
sl@0
  1940
#define SSL_R_SSLV3_ALERT_NO_CERTIFICATE		 1041
sl@0
  1941
#define SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE		 1010
sl@0
  1942
#define SSL_R_SSLV3_ALERT_UNSUPPORTED_CERTIFICATE	 1043
sl@0
  1943
#define SSL_R_SSL_CTX_HAS_NO_DEFAULT_SSL_VERSION	 228
sl@0
  1944
#define SSL_R_SSL_HANDSHAKE_FAILURE			 229
sl@0
  1945
#define SSL_R_SSL_LIBRARY_HAS_NO_CIPHERS		 230
sl@0
  1946
#define SSL_R_SSL_SESSION_ID_CALLBACK_FAILED		 301
sl@0
  1947
#define SSL_R_SSL_SESSION_ID_CONFLICT			 302
sl@0
  1948
#define SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG		 273
sl@0
  1949
#define SSL_R_SSL_SESSION_ID_HAS_BAD_LENGTH		 303
sl@0
  1950
#define SSL_R_SSL_SESSION_ID_IS_DIFFERENT		 231
sl@0
  1951
#define SSL_R_TLSV1_ALERT_ACCESS_DENIED			 1049
sl@0
  1952
#define SSL_R_TLSV1_ALERT_DECODE_ERROR			 1050
sl@0
  1953
#define SSL_R_TLSV1_ALERT_DECRYPTION_FAILED		 1021
sl@0
  1954
#define SSL_R_TLSV1_ALERT_DECRYPT_ERROR			 1051
sl@0
  1955
#define SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION		 1060
sl@0
  1956
#define SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY		 1071
sl@0
  1957
#define SSL_R_TLSV1_ALERT_INTERNAL_ERROR		 1080
sl@0
  1958
#define SSL_R_TLSV1_ALERT_NO_RENEGOTIATION		 1100
sl@0
  1959
#define SSL_R_TLSV1_ALERT_PROTOCOL_VERSION		 1070
sl@0
  1960
#define SSL_R_TLSV1_ALERT_RECORD_OVERFLOW		 1022
sl@0
  1961
#define SSL_R_TLSV1_ALERT_UNKNOWN_CA			 1048
sl@0
  1962
#define SSL_R_TLSV1_ALERT_USER_CANCELLED		 1090
sl@0
  1963
#define SSL_R_TLS_CLIENT_CERT_REQ_WITH_ANON_CIPHER	 232
sl@0
  1964
#define SSL_R_TLS_INVALID_ECPOINTFORMAT_LIST		 227
sl@0
  1965
#define SSL_R_TLS_PEER_DID_NOT_RESPOND_WITH_CERTIFICATE_LIST 233
sl@0
  1966
#define SSL_R_TLS_RSA_ENCRYPTED_VALUE_LENGTH_IS_WRONG	 234
sl@0
  1967
#define SSL_R_TRIED_TO_USE_UNSUPPORTED_CIPHER		 235
sl@0
  1968
#define SSL_R_UNABLE_TO_DECODE_DH_CERTS			 236
sl@0
  1969
#define SSL_R_UNABLE_TO_DECODE_ECDH_CERTS		 313
sl@0
  1970
#define SSL_R_UNABLE_TO_EXTRACT_PUBLIC_KEY		 237
sl@0
  1971
#define SSL_R_UNABLE_TO_FIND_DH_PARAMETERS		 238
sl@0
  1972
#define SSL_R_UNABLE_TO_FIND_ECDH_PARAMETERS		 314
sl@0
  1973
#define SSL_R_UNABLE_TO_FIND_PUBLIC_KEY_PARAMETERS	 239
sl@0
  1974
#define SSL_R_UNABLE_TO_FIND_SSL_METHOD			 240
sl@0
  1975
#define SSL_R_UNABLE_TO_LOAD_SSL2_MD5_ROUTINES		 241
sl@0
  1976
#define SSL_R_UNABLE_TO_LOAD_SSL3_MD5_ROUTINES		 242
sl@0
  1977
#define SSL_R_UNABLE_TO_LOAD_SSL3_SHA1_ROUTINES		 243
sl@0
  1978
#define SSL_R_UNEXPECTED_MESSAGE			 244
sl@0
  1979
#define SSL_R_UNEXPECTED_RECORD				 245
sl@0
  1980
#define SSL_R_UNINITIALIZED				 276
sl@0
  1981
#define SSL_R_UNKNOWN_ALERT_TYPE			 246
sl@0
  1982
#define SSL_R_UNKNOWN_CERTIFICATE_TYPE			 247
sl@0
  1983
#define SSL_R_UNKNOWN_CIPHER_RETURNED			 248
sl@0
  1984
#define SSL_R_UNKNOWN_CIPHER_TYPE			 249
sl@0
  1985
#define SSL_R_UNKNOWN_KEY_EXCHANGE_TYPE			 250
sl@0
  1986
#define SSL_R_UNKNOWN_PKEY_TYPE				 251
sl@0
  1987
#define SSL_R_UNKNOWN_PROTOCOL				 252
sl@0
  1988
#define SSL_R_UNKNOWN_REMOTE_ERROR_TYPE			 253
sl@0
  1989
#define SSL_R_UNKNOWN_SSL_VERSION			 254
sl@0
  1990
#define SSL_R_UNKNOWN_STATE				 255
sl@0
  1991
#define SSL_R_UNSUPPORTED_CIPHER			 256
sl@0
  1992
#define SSL_R_UNSUPPORTED_COMPRESSION_ALGORITHM		 257
sl@0
  1993
#define SSL_R_UNSUPPORTED_ELLIPTIC_CURVE		 315
sl@0
  1994
#define SSL_R_UNSUPPORTED_PROTOCOL			 258
sl@0
  1995
#define SSL_R_UNSUPPORTED_SSL_VERSION			 259
sl@0
  1996
#define SSL_R_WRITE_BIO_NOT_SET				 260
sl@0
  1997
#define SSL_R_WRONG_CIPHER_RETURNED			 261
sl@0
  1998
#define SSL_R_WRONG_MESSAGE_TYPE			 262
sl@0
  1999
#define SSL_R_WRONG_NUMBER_OF_KEY_BITS			 263
sl@0
  2000
#define SSL_R_WRONG_SIGNATURE_LENGTH			 264
sl@0
  2001
#define SSL_R_WRONG_SIGNATURE_SIZE			 265
sl@0
  2002
#define SSL_R_WRONG_SSL_VERSION				 266
sl@0
  2003
#define SSL_R_WRONG_VERSION_NUMBER			 267
sl@0
  2004
#define SSL_R_X509_LIB					 268
sl@0
  2005
#define SSL_R_X509_VERIFICATION_SETUP_PROBLEMS		 269
sl@0
  2006
sl@0
  2007
#ifdef  __cplusplus
sl@0
  2008
}
sl@0
  2009
#endif
sl@0
  2010
#endif