SSL_CTX_sess_set_get_cb.pod 4.7 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11
=pod

=head1 NAME

SSL_CTX_sess_set_new_cb, SSL_CTX_sess_set_remove_cb, SSL_CTX_sess_set_get_cb, SSL_CTX_sess_get_new_cb, SSL_CTX_sess_get_remove_cb, SSL_CTX_sess_get_get_cb - provide callback functions for server side external session caching

=head1 SYNOPSIS

 #include <openssl/ssl.h>

 void SSL_CTX_sess_set_new_cb(SSL_CTX *ctx,
R
Rich Salz 已提交
12
                              int (*new_session_cb)(SSL *, SSL_SESSION *));
13
 void SSL_CTX_sess_set_remove_cb(SSL_CTX *ctx,
R
Rich Salz 已提交
14
           void (*remove_session_cb)(SSL_CTX *ctx, SSL_SESSION *));
15
 void SSL_CTX_sess_set_get_cb(SSL_CTX *ctx,
R
Rich Salz 已提交
16
           SSL_SESSION (*get_session_cb)(SSL *, const unsigned char *, int, int *));
17 18 19

 int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(struct ssl_st *ssl, SSL_SESSION *sess);
 void (*SSL_CTX_sess_get_remove_cb(SSL_CTX *ctx))(struct ssl_ctx_st *ctx, SSL_SESSION *sess);
E
Emilia Kasper 已提交
20
 SSL_SESSION *(*SSL_CTX_sess_get_get_cb(SSL_CTX *ctx))(struct ssl_st *ssl, const unsigned char *data, int len, int *copy);
21 22 23 24

 int (*new_session_cb)(struct ssl_st *ssl, SSL_SESSION *sess);
 void (*remove_session_cb)(struct ssl_ctx_st *ctx, SSL_SESSION *sess);
 SSL_SESSION *(*get_session_cb)(struct ssl_st *ssl, unsigned char *data,
R
Rich Salz 已提交
25
               int len, int *copy);
26 27 28 29 30 31 32 33 34 35 36 37 38 39

=head1 DESCRIPTION

SSL_CTX_sess_set_new_cb() sets the callback function, which is automatically
called whenever a new session was negotiated.

SSL_CTX_sess_set_remove_cb() sets the callback function, which is
automatically called whenever a session is removed by the SSL engine,
because it is considered faulty or the session has become obsolete because
of exceeding the timeout value.

SSL_CTX_sess_set_get_cb() sets the callback function which is called,
whenever a SSL/TLS client proposed to resume a session but the session
could not be found in the internal session cache (see
R
Rich Salz 已提交
40
L<SSL_CTX_set_session_cache_mode(3)>).
41 42 43
(SSL/TLS server only.)

SSL_CTX_sess_get_new_cb(), SSL_CTX_sess_get_remove_cb(), and
44
SSL_CTX_sess_get_get_cb() allow to retrieve the function pointers of the
45 46 47 48 49 50 51 52
provided callback functions. If a callback function has not been set,
the NULL pointer is returned.

=head1 NOTES

In order to allow external session caching, synchronization with the internal
session cache is realized via callback functions. Inside these callback
functions, session can be saved to disk or put into a database using the
R
Rich Salz 已提交
53
L<d2i_SSL_SESSION(3)> interface.
54 55 56

The new_session_cb() is called, whenever a new session has been negotiated
and session caching is enabled (see
R
Rich Salz 已提交
57
L<SSL_CTX_set_session_cache_mode(3)>).
58
The new_session_cb() is passed the B<ssl> connection and the ssl session
59
B<sess>. If the callback returns B<0>, the session will be immediately
60
removed again. Note that in TLSv1.3, sessions are established after the main
61 62 63 64 65 66 67 68 69 70
handshake has completed. The server decides when to send the client the session
information and this may occur some time after the end of the handshake (or not
at all). This means that applications should expect the new_session_cb()
function to be invoked during the handshake (for <= TLSv1.2) or after the
handshake (for TLSv1.3). It is also possible in TLSv1.3 for multiple sessions to
be established with a single connection. In these case the new_session_cb()
function will be invoked multiple times.

In TLSv1.3 it is recommended that each SSL_SESSION object is only used for
resumption once.
71 72

The remove_session_cb() is called, whenever the SSL engine removes a session
73 74 75
from the internal cache. This happens when the session is removed because
it is expired or when a connection was not shutdown cleanly. It also happens
for all sessions in the internal session cache when
R
Rich Salz 已提交
76
L<SSL_CTX_free(3)> is called. The remove_session_cb() is passed
77
the B<ctx> and the ssl session B<sess>. It does not provide any feedback.
78 79 80 81 82 83

The get_session_cb() is only called on SSL/TLS servers with the session id
proposed by the client. The get_session_cb() is always called, also when
session caching was disabled. The get_session_cb() is passed the
B<ssl> connection, the session id of length B<length> at the memory location
B<data>. With the parameter B<copy> the callback can require the
84 85 86
SSL engine to increment the reference count of the SSL_SESSION object,
Normally the reference count is not incremented and therefore the
session must not be explicitly freed with
R
Rich Salz 已提交
87
L<SSL_SESSION_free(3)>.
88 89 90

=head1 SEE ALSO

91
L<ssl(7)>, L<d2i_SSL_SESSION(3)>,
R
Rich Salz 已提交
92 93 94 95
L<SSL_CTX_set_session_cache_mode(3)>,
L<SSL_CTX_flush_sessions(3)>,
L<SSL_SESSION_free(3)>,
L<SSL_CTX_free(3)>
96

R
Rich Salz 已提交
97 98 99 100 101 102 103 104 105 106
=head1 COPYRIGHT

Copyright 2001-2016 The OpenSSL Project Authors. All Rights Reserved.

Licensed under the OpenSSL license (the "License").  You may not use
this file except in compliance with the License.  You can obtain a copy
in the file LICENSE in the source distribution or at
L<https://www.openssl.org/source/license.html>.

=cut