aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorFedor Brunner <fedor.brunner@azet.sk>2014-02-25 14:43:17 +0100
committerFedor Brunner <fedor.brunner@azet.sk>2014-02-25 14:48:30 +0100
commitb25bdcc95c9482c56a26d16f7984e824a543c977 (patch)
tree3721df5ddc01f552b90e40ba210d9fce4b8dac71
parentdae879525fd62f724e2b0d59e26fadf53de3865a (diff)
downloadcryptography-b25bdcc95c9482c56a26d16f7984e824a543c977.tar.gz
cryptography-b25bdcc95c9482c56a26d16f7984e824a543c977.tar.bz2
cryptography-b25bdcc95c9482c56a26d16f7984e824a543c977.zip
Add OpenSSL bindings for TLS Finished message.
Add OpenSSL binding socket type. Add OpenSSL binding to check if TLS session is reused.
-rw-r--r--cryptography/hazmat/bindings/openssl/ssl.py10
1 files changed, 10 insertions, 0 deletions
diff --git a/cryptography/hazmat/bindings/openssl/ssl.py b/cryptography/hazmat/bindings/openssl/ssl.py
index ca3e96c8..7eff50d4 100644
--- a/cryptography/hazmat/bindings/openssl/ssl.py
+++ b/cryptography/hazmat/bindings/openssl/ssl.py
@@ -136,6 +136,7 @@ typedef struct {
typedef struct {
SSL3_STATE *s3;
SSL_SESSION *session;
+ int type; /* SSL_ST_CONNECT or SSL_ST_ACCEPT */
...;
} SSL;
@@ -219,6 +220,13 @@ void SSL_SESSION_free(SSL_SESSION *);
const char *SSL_CIPHER_get_name(const SSL_CIPHER *);
int SSL_CIPHER_get_bits(const SSL_CIPHER *, int *);
char *SSL_CIPHER_get_version(const SSL_CIPHER *);
+
+/* Obtain latest Finished message
+ * -- that we sent (SSL_get_finished)
+ * -- that we expected from peer (SSL_get_peer_finished).
+ * Returns length (0 == no Finished so far), copies up to 'count' bytes. */
+size_t SSL_get_finished(const SSL *, void *, size_t);
+size_t SSL_get_peer_finished(const SSL *, void *, size_t);
"""
MACROS = """
@@ -298,6 +306,8 @@ void SSL_set_tlsext_host_name(SSL *, char *);
void SSL_CTX_set_tlsext_servername_callback(
SSL_CTX *,
int (*)(const SSL *, int *, void *));
+
+int SSL_session_reused(SSL *);
"""
CUSTOMIZATIONS = """