diff options
author | Nick Mathewson <nickm@torproject.org> | 2007-12-01 08:09:46 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2007-12-01 08:09:46 +0000 |
commit | 1789f94668f8da029d18efb51bc3d0652488f706 (patch) | |
tree | eda08e0e6866bd45859f43acb422efe595e3f918 /src/common/tortls.h | |
parent | f8df8d791e4a58ab65d8903a0522b4cfa55cc163 (diff) | |
download | tor-1789f94668f8da029d18efb51bc3d0652488f706.tar.gz tor-1789f94668f8da029d18efb51bc3d0652488f706.zip |
r15087@tombo: nickm | 2007-11-30 22:32:26 -0500
Start getting freaky with openssl callbacks in tortls.c: detect client ciphers, and if the list doesn't look like the list current Tors use, present only a single cert do not ask for a client cert. Also, support for client-side renegotiation. None of this is enabled unless you define V2_HANDSHAKE_SERVER.
svn:r12622
Diffstat (limited to 'src/common/tortls.h')
-rw-r--r-- | src/common/tortls.h | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/src/common/tortls.h b/src/common/tortls.h index 63380f54eb..c8155de2f8 100644 --- a/src/common/tortls.h +++ b/src/common/tortls.h @@ -62,6 +62,7 @@ char *tor_tls_encode_my_certificate(tor_tls_t *tls, size_t *size_out, crypto_pk_env_t *tor_tls_dup_private_key(tor_tls_t *tls); int tor_tls_verify_v1(int severity, tor_tls_t *tls, crypto_pk_env_t **identity); +#if 0 int tor_tls_verify_certs_v2(int severity, tor_tls_t *tls, const char *cert_str, size_t cert_len, const char *id_cert_str, size_t id_cert_len, @@ -69,10 +70,12 @@ int tor_tls_verify_certs_v2(int severity, tor_tls_t *tls, char *conn_cert_digest_out, crypto_pk_env_t **id_key_out, char *id_digest_out); +#endif int tor_tls_check_lifetime(tor_tls_t *tls, int tolerance); int tor_tls_read(tor_tls_t *tls, char *cp, size_t len); int tor_tls_write(tor_tls_t *tls, const char *cp, size_t n); int tor_tls_handshake(tor_tls_t *tls); +int tor_tls_renegotiate(tor_tls_t *tls); int tor_tls_shutdown(tor_tls_t *tls); int tor_tls_get_pending_bytes(tor_tls_t *tls); size_t tor_tls_get_forced_write_size(tor_tls_t *tls); |