/* If we are using DSA, we can copy the parameters from
* the private key */
-
-
+
+
/* Now we know that a key and cert have been set against
* the SSL context */
if (!SSL_CTX_check_private_key(ctx))
}
}
- case TLSEXT_TYPE_renegotiate:
- extname = "renegotiate";
- break;
void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)
{
case TLS1_VERSION:
str_version = "TLS 1.0 ";
break;
+ case TLS1_1_VERSION:
+ str_version = "TLS 1.1 ";
+ break;
+ case TLS1_2_VERSION:
+ str_version = "TLS 1.2 ";
+ break;
case DTLS1_VERSION:
str_version = "DTLS 1.0 ";
break;
if (version == SSL3_VERSION ||
version == TLS1_VERSION ||
+ version == TLS1_1_VERSION ||
+ version == TLS1_2_VERSION ||
version == DTLS1_VERSION ||
version == DTLS1_BAD_VER)
{
case 114:
str_details2 = " bad_certificate_hash_value";
break;
+ case 115:
+ str_details2 = " unknown_psk_identity";
+ break;
}
}
}
}
}
}
+
+#ifndef OPENSSL_NO_HEARTBEATS
+ if (content_type == 24) /* Heartbeat */
+ {
+ str_details1 = ", Heartbeat";
+
+ if (len > 0)
+ {
+ switch (((const unsigned char*)buf)[0])
+ {
+ case 1:
+ str_details1 = ", HeartbeatRequest";
+ break;
+ case 2:
+ str_details1 = ", HeartbeatResponse";
+ break;
+ }
+ }
+ }
+#endif
}
BIO_printf(bio, "%s %s%s [length %04lx]%s%s\n", str_write_p, str_version, str_content_type, (unsigned long)len, str_details1, str_details2);
extname = "status request";
break;
+ case TLSEXT_TYPE_user_mapping:
+ extname = "user mapping";
+ break;
+
+ case TLSEXT_TYPE_client_authz:
+ extname = "client authz";
+ break;
+
+ case TLSEXT_TYPE_server_authz:
+ extname = "server authz";
+ break;
+
+ case TLSEXT_TYPE_cert_type:
+ extname = "cert type";
+ break;
+
case TLSEXT_TYPE_elliptic_curves:
extname = "elliptic curves";
break;
extname = "EC point formats";
break;
+ case TLSEXT_TYPE_srp:
+ extname = "SRP";
+ break;
+
+ case TLSEXT_TYPE_signature_algorithms:
+ extname = "signature algorithms";
+ break;
+
+ case TLSEXT_TYPE_use_srtp:
+ extname = "use SRTP";
+ break;
+
+ case TLSEXT_TYPE_heartbeat:
+ extname = "heartbeat";
+ break;
+
case TLSEXT_TYPE_session_ticket:
- extname = "server ticket";
+ extname = "session ticket";
+ break;
+
+ case TLSEXT_TYPE_renegotiate:
+ extname = "renegotiation info";
break;
#ifdef TLSEXT_TYPE_opaque_prf_input
extname = "opaque PRF input";
break;
#endif
+#ifdef TLSEXT_TYPE_next_proto_neg
+ case TLSEXT_TYPE_next_proto_neg:
+ extname = "next protocol";
+ break;
+#endif
default:
extname = "unknown";
{
unsigned char *buffer, result[EVP_MAX_MD_SIZE];
unsigned int length, resultlength;
-#if OPENSSL_USE_IPV6
union {
- struct sockaddr_storage ss;
- struct sockaddr_in6 s6;
+ struct sockaddr sa;
struct sockaddr_in s4;
- } peer;
-#else
- struct sockaddr_in peer;
+#if OPENSSL_USE_IPV6
+ struct sockaddr_in6 s6;
#endif
+ } peer;
/* Initialize a random secret */
if (!cookie_initialized)
(void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer);
/* Create buffer with peer's address and port */
-#if OPENSSL_USE_IPV6
length = 0;
- switch (peer.ss.ss_family)
+ switch (peer.sa.sa_family)
{
case AF_INET:
length += sizeof(struct in_addr);
length += sizeof(peer.s4.sin_port);
break;
+#if OPENSSL_USE_IPV6
case AF_INET6:
length += sizeof(struct in6_addr);
length += sizeof(peer.s6.sin6_port);
break;
+#endif
default:
OPENSSL_assert(0);
break;
}
-#else
- length = sizeof(peer.sin_addr);
- length += sizeof(peer.sin_port);
-#endif
buffer = OPENSSL_malloc(length);
if (buffer == NULL)
return 0;
}
-#if OPENSSL_USE_IPV6
- switch (peer.ss.ss_family)
+ switch (peer.sa.sa_family)
{
case AF_INET:
memcpy(buffer,
&peer.s4.sin_addr,
sizeof(struct in_addr));
break;
+#if OPENSSL_USE_IPV6
case AF_INET6:
memcpy(buffer,
&peer.s6.sin6_port,
&peer.s6.sin6_addr,
sizeof(struct in6_addr));
break;
+#endif
default:
OPENSSL_assert(0);
break;
}
-#else
- memcpy(buffer, &peer.sin_port, sizeof(peer.sin_port));
- memcpy(buffer + sizeof(peer.sin_port), &peer.sin_addr, sizeof(peer.sin_addr));
-#endif
/* Calculate HMAC of buffer using the secret */
HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH,
{
unsigned char *buffer, result[EVP_MAX_MD_SIZE];
unsigned int length, resultlength;
-#if OPENSSL_USE_IPV6
union {
- struct sockaddr_storage ss;
- struct sockaddr_in6 s6;
+ struct sockaddr sa;
struct sockaddr_in s4;
- } peer;
-#else
- struct sockaddr_in peer;
+#if OPENSSL_USE_IPV6
+ struct sockaddr_in6 s6;
#endif
+ } peer;
/* If secret isn't initialized yet, the cookie can't be valid */
if (!cookie_initialized)
(void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer);
/* Create buffer with peer's address and port */
-#if OPENSSL_USE_IPV6
length = 0;
- switch (peer.ss.ss_family)
+ switch (peer.sa.sa_family)
{
case AF_INET:
length += sizeof(struct in_addr);
length += sizeof(peer.s4.sin_port);
break;
+#if OPENSSL_USE_IPV6
case AF_INET6:
length += sizeof(struct in6_addr);
length += sizeof(peer.s6.sin6_port);
break;
+#endif
default:
OPENSSL_assert(0);
break;
}
-#else
- length = sizeof(peer.sin_addr);
- length += sizeof(peer.sin_port);
-#endif
buffer = OPENSSL_malloc(length);
if (buffer == NULL)
return 0;
}
-#if OPENSSL_USE_IPV6
- switch (peer.ss.ss_family)
+ switch (peer.sa.sa_family)
{
case AF_INET:
memcpy(buffer,
&peer.s4.sin_addr,
sizeof(struct in_addr));
break;
+#if OPENSSL_USE_IPV6
case AF_INET6:
memcpy(buffer,
&peer.s6.sin6_port,
&peer.s6.sin6_addr,
sizeof(struct in6_addr));
break;
+#endif
default:
OPENSSL_assert(0);
break;
}
-#else
- memcpy(buffer, &peer.sin_port, sizeof(peer.sin_port));
- memcpy(buffer + sizeof(peer.sin_port), &peer.sin_addr, sizeof(peer.sin_addr));
-#endif
/* Calculate HMAC of buffer using the secret */
HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH,