aboutsummaryrefslogtreecommitdiffstats
path: root/include
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2015-05-25 17:12:49 -0400
committerMatt Caswell <matt@openssl.org>2015-05-28 16:05:01 +0100
commit858618e7e037559b75b0bfca4d30440f9515b888 (patch)
tree88e7816fd7353b59238fdf1c52ae37c6a352b7f1 /include
parent9ef175148b7da12cb09f5e78f32bc6ab58d78b83 (diff)
downloadopenssl-858618e7e037559b75b0bfca4d30440f9515b888.tar.gz
Add new functions to extract {client,server}_random, master_key
Tor uses these values to implement a low-rent clone of RFC 5705 (which, in our defense, we came up with before RFC 5705 existed). But now that ssl_st is opaque, we need another way to get at them. Includes documentation, with suitable warnings about not actually using these functions. Signed-off-by: Nick Mathewson <nickm@torproject.org> Signed-off-by: Matt Caswell <matt@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
Diffstat (limited to 'include')
-rw-r--r--include/openssl/ssl.h4
1 files changed, 4 insertions, 0 deletions
diff --git a/include/openssl/ssl.h b/include/openssl/ssl.h
index 5de33e9305..e52fbb5a13 100644
--- a/include/openssl/ssl.h
+++ b/include/openssl/ssl.h
@@ -1652,6 +1652,10 @@ void SSL_set_state(SSL *ssl, int state);
void SSL_set_verify_result(SSL *ssl, long v);
__owur long SSL_get_verify_result(const SSL *ssl);
+__owur int SSL_get_client_random(const SSL *ssl, unsigned char *out, int outlen);
+__owur int SSL_get_server_random(const SSL *ssl, unsigned char *out, int outlen);
+__owur int SSL_SESSION_get_master_key(const SSL_SESSION *ssl, unsigned char *out, int outlen);
+
__owur int SSL_set_ex_data(SSL *ssl, int idx, void *data);
void *SSL_get_ex_data(const SSL *ssl, int idx);
__owur int SSL_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func,