提交 4a192c77 编写于 作者: M Matt Caswell

Update documentation for the new PSK behaviour

Reviewed-by: NRich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5554)
上级 f3d40db1
...@@ -14,48 +14,33 @@ SSL_set_psk_use_session_callback ...@@ -14,48 +14,33 @@ SSL_set_psk_use_session_callback
#include <openssl/ssl.h> #include <openssl/ssl.h>
typedef unsigned int (*SSL_psk_client_cb_func)(SSL *ssl,
const char *hint,
char *identity,
unsigned int max_identity_len,
unsigned char *psk,
unsigned int max_psk_len);
typedef int (*SSL_psk_use_session_cb_func)(SSL *ssl, const EVP_MD *md, typedef int (*SSL_psk_use_session_cb_func)(SSL *ssl, const EVP_MD *md,
const unsigned char **id, const unsigned char **id,
size_t *idlen, size_t *idlen,
SSL_SESSION **sess); SSL_SESSION **sess);
void SSL_CTX_set_psk_client_callback(SSL_CTX *ctx, SSL_psk_client_cb_func cb);
void SSL_set_psk_client_callback(SSL *ssl, SSL_psk_client_cb_func cb);
void SSL_CTX_set_psk_use_session_callback(SSL_CTX *ctx, void SSL_CTX_set_psk_use_session_callback(SSL_CTX *ctx,
SSL_psk_use_session_cb_func cb); SSL_psk_use_session_cb_func cb);
void SSL_set_psk_use_session_callback(SSL *s, SSL_psk_use_session_cb_func cb); void SSL_set_psk_use_session_callback(SSL *s, SSL_psk_use_session_cb_func cb);
=head1 DESCRIPTION
TLSv1.3 Pre-Shared Keys (PSKs) and PSKs for TLSv1.2 and below are not typedef unsigned int (*SSL_psk_client_cb_func)(SSL *ssl,
compatible. const char *hint,
char *identity,
unsigned int max_identity_len,
unsigned char *psk,
unsigned int max_psk_len);
A client application wishing to use PSK ciphersuites for TLSv1.2 and below must void SSL_CTX_set_psk_client_callback(SSL_CTX *ctx, SSL_psk_client_cb_func cb);
provide a callback function. This function will be called when the client is void SSL_set_psk_client_callback(SSL *ssl, SSL_psk_client_cb_func cb);
sending the ClientKeyExchange message to the server.
The purpose of the callback function is to select the PSK identity and
the pre-shared key to use during the connection setup phase.
The callback is set using functions SSL_CTX_set_psk_client_callback() =head1 DESCRIPTION
or SSL_set_psk_client_callback(). The callback function is given the
connection in parameter B<ssl>, a B<NULL>-terminated PSK identity hint
sent by the server in parameter B<hint>, a buffer B<identity> of
length B<max_identity_len> bytes where the resulting
B<NULL>-terminated identity is to be stored, and a buffer B<psk> of
length B<max_psk_len> bytes where the resulting pre-shared key is to
be stored.
A client application wishing to use TLSv1.3 PSKs must set a different callback A client application wishing to use TLSv1.3 PSKs should use either
using either SSL_CTX_set_psk_use_session_callback() or SSL_CTX_set_psk_use_session_callback() or SSL_set_psk_use_session_callback() as
SSL_set_psk_use_session_callback() as appropriate. appropriate. These functions cannot be used for TLSv1.2 and below PSKs.
The callback function is given a pointer to the SSL connection in B<ssl>. The callback function is given a pointer to the SSL connection in B<ssl>.
...@@ -113,6 +98,33 @@ case no PSK will be sent to the server but the handshake will continue. To do ...@@ -113,6 +98,33 @@ case no PSK will be sent to the server but the handshake will continue. To do
this the callback should return successfully and ensure that B<*sess> is this the callback should return successfully and ensure that B<*sess> is
NULL. The contents of B<*id> and B<*idlen> will be ignored. NULL. The contents of B<*id> and B<*idlen> will be ignored.
A client application wishing to use PSK ciphersuites for TLSv1.2 and below must
provide a different callback function. This function will be called when the
client is sending the ClientKeyExchange message to the server.
The purpose of the callback function is to select the PSK identity and
the pre-shared key to use during the connection setup phase.
The callback is set using functions SSL_CTX_set_psk_client_callback()
or SSL_set_psk_client_callback(). The callback function is given the
connection in parameter B<ssl>, a B<NULL>-terminated PSK identity hint
sent by the server in parameter B<hint>, a buffer B<identity> of
length B<max_identity_len> bytes where the resulting
B<NUL>-terminated identity is to be stored, and a buffer B<psk> of
length B<max_psk_len> bytes where the resulting pre-shared key is to
be stored.
The callback for use in TLSv1.2 will also work in TLSv1.3 although it is
recommended to use SSL_CTX_set_psk_use_session_callback()
or SSL_set_psk_use_session_callback() for this purpose instead. If TLSv1.3 has
been negotiated then OpenSSL will first check to see if a callback has been set
via SSL_CTX_set_psk_use_session_callback() or SSL_set_psk_use_session_callback()
and it will use that in preference. If no such callback is present then it will
check to see if a callback has been set via SSL_CTX_set_psk_client_callback() or
SSL_set_psk_client_callback() and use that. In this case the B<hint> value will
always be NULL and the handshake digest will default to SHA-256 for any returned
PSK.
=head1 NOTES =head1 NOTES
Note that parameter B<hint> given to the callback may be B<NULL>. Note that parameter B<hint> given to the callback may be B<NULL>.
......
...@@ -16,30 +16,44 @@ SSL_set_psk_find_session_callback ...@@ -16,30 +16,44 @@ SSL_set_psk_find_session_callback
#include <openssl/ssl.h> #include <openssl/ssl.h>
typedef unsigned int (*SSL_psk_server_cb_func)(SSL *ssl,
const char *identity,
unsigned char *psk,
unsigned int max_psk_len);
typedef int (*SSL_psk_find_session_cb_func)(SSL *ssl, typedef int (*SSL_psk_find_session_cb_func)(SSL *ssl,
const unsigned char *identity, const unsigned char *identity,
size_t identity_len, size_t identity_len,
SSL_SESSION **sess); SSL_SESSION **sess);
void SSL_CTX_set_psk_find_session_callback(SSL_CTX *ctx,
SSL_psk_find_session_cb_func cb);
void SSL_set_psk_find_session_callback(SSL *s, SSL_psk_find_session_cb_func cb);
typedef unsigned int (*SSL_psk_server_cb_func)(SSL *ssl,
const char *identity,
unsigned char *psk,
unsigned int max_psk_len);
int SSL_CTX_use_psk_identity_hint(SSL_CTX *ctx, const char *hint); int SSL_CTX_use_psk_identity_hint(SSL_CTX *ctx, const char *hint);
int SSL_use_psk_identity_hint(SSL *ssl, const char *hint); int SSL_use_psk_identity_hint(SSL *ssl, const char *hint);
void SSL_CTX_set_psk_server_callback(SSL_CTX *ctx, SSL_psk_server_cb_func cb); void SSL_CTX_set_psk_server_callback(SSL_CTX *ctx, SSL_psk_server_cb_func cb);
void SSL_set_psk_server_callback(SSL *ssl, SSL_psk_server_cb_func cb); void SSL_set_psk_server_callback(SSL *ssl, SSL_psk_server_cb_func cb);
void SSL_CTX_set_psk_find_session_callback(SSL_CTX *ctx,
SSL_psk_find_session_cb_func cb);
void SSL_set_psk_find_session_callback(SSL *s, SSL_psk_find_session_cb_func cb);
=head1 DESCRIPTION =head1 DESCRIPTION
TLSv1.3 Pre-Shared Keys (PSKs) and PSKs for TLSv1.2 and below are not A client application wishing to use TLSv1.3 PSKs should set a callback
compatible. using either SSL_CTX_set_psk_use_session_callback() or
SSL_set_psk_use_session_callback() as appropriate.
The callback function is given a pointer to the SSL connection in B<ssl> and
an identity in B<identity> of length B<identity_len>. The callback function
should identify an SSL_SESSION object that provides the PSK details and store it
in B<*sess>. The SSL_SESSION object should, as a minimum, set the master key,
the ciphersuite and the protocol version. See
L<SSL_CTX_set_psk_use_session_callback(3)> for details.
It is also possible for the callback to succeed but not supply a PSK. In this
case no PSK will be used but the handshake will continue. To do this the
callback should return successfully and ensure that B<*sess> is
NULL.
Identity hints are not relevant for TLSv1.3. A server application wishing to use Identity hints are not relevant for TLSv1.3. A server application wishing to use
PSK ciphersuites for TLSv1.2 and below may call SSL_CTX_use_psk_identity_hint() PSK ciphersuites for TLSv1.2 and below may call SSL_CTX_use_psk_identity_hint()
...@@ -51,31 +65,25 @@ B<NULL> the current hint from B<ctx> or B<ssl> is deleted. ...@@ -51,31 +65,25 @@ B<NULL> the current hint from B<ctx> or B<ssl> is deleted.
In the case where PSK identity hint is B<NULL>, the server does not send the In the case where PSK identity hint is B<NULL>, the server does not send the
ServerKeyExchange message to the client. ServerKeyExchange message to the client.
A server application for TLSv1.2 and below must provide a callback function A server application wishing to use PSKs for TLSv1.2 and below must provide a
which is called when the server receives the ClientKeyExchange message from the callback function which is called when the server receives the
client. The purpose of the callback function is to validate the ClientKeyExchange message from the client. The purpose of the callback function
received PSK identity and to fetch the pre-shared key used during the is to validate the received PSK identity and to fetch the pre-shared key used
connection setup phase. The callback is set using the functions during the connection setup phase. The callback is set using the functions
SSL_CTX_set_psk_server_callback() or SSL_set_psk_server_callback(). The callback SSL_CTX_set_psk_server_callback() or SSL_set_psk_server_callback(). The callback
function is given the connection in parameter B<ssl>, B<NUL>-terminated PSK function is given the connection in parameter B<ssl>, B<NUL>-terminated PSK
identity sent by the client in parameter B<identity>, and a buffer B<psk> of identity sent by the client in parameter B<identity>, and a buffer B<psk> of
length B<max_psk_len> bytes where the pre-shared key is to be stored. length B<max_psk_len> bytes where the pre-shared key is to be stored.
A client application wishing to use TLSv1.3 PSKs must set a different callback The callback for use in TLSv1.2 will also work in TLSv1.3 although it is
using either SSL_CTX_set_psk_use_session_callback() or recommended to use SSL_CTX_set_psk_find_session_callback()
SSL_set_psk_use_session_callback() as appropriate. or SSL_set_psk_find_session_callback() for this purpose instead. If TLSv1.3 has
been negotiated then OpenSSL will first check to see if a callback has been set
The callback function is given a pointer to the SSL connection in B<ssl> and via SSL_CTX_set_psk_find_session_callback() or SSL_set_psk_find_session_callback()
an identity in B<identity> of length B<identity_len>. The callback function and it will use that in preference. If no such callback is present then it will
should identify an SSL_SESSION object that provides the PSK details and store it check to see if a callback has been set via SSL_CTX_set_psk_server_callback() or
in B<*sess>. The SSL_SESSION object should, as a minimum, set the master key, SSL_set_psk_server_callback() and use that. In this case the handshake digest
the ciphersuite and the protocol version. See will default to SHA-256 for any returned PSK.
L<SSL_CTX_set_psk_use_session_callback(3)> for details.
It is also possible for the callback to succeed but not supply a PSK. In this
case no PSK will be used but the handshake will continue. To do this the
callback should return successfully and ensure that B<*sess> is
NULL.
=head1 NOTES =head1 NOTES
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册