2
0

SSL_get_ciphers.pod 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117
  1. =pod
  2. =head1 NAME
  3. SSL_get1_supported_ciphers,
  4. SSL_get_client_ciphers,
  5. SSL_get_ciphers,
  6. SSL_CTX_get_ciphers,
  7. SSL_bytes_to_cipher_list,
  8. SSL_get_cipher_list,
  9. SSL_get_shared_ciphers
  10. - get list of available SSL_CIPHERs
  11. =head1 SYNOPSIS
  12. #include <openssl/ssl.h>
  13. STACK_OF(SSL_CIPHER) *SSL_get_ciphers(const SSL *ssl);
  14. STACK_OF(SSL_CIPHER) *SSL_CTX_get_ciphers(const SSL_CTX *ctx);
  15. STACK_OF(SSL_CIPHER) *SSL_get1_supported_ciphers(SSL *s);
  16. STACK_OF(SSL_CIPHER) *SSL_get_client_ciphers(const SSL *ssl);
  17. int SSL_bytes_to_cipher_list(SSL *s, const unsigned char *bytes, size_t len,
  18. int isv2format, STACK_OF(SSL_CIPHER) **sk,
  19. STACK_OF(SSL_CIPHER) **scsvs);
  20. const char *SSL_get_cipher_list(const SSL *ssl, int priority);
  21. char *SSL_get_shared_ciphers(const SSL *s, char *buf, int size);
  22. =head1 DESCRIPTION
  23. SSL_get_ciphers() returns the stack of available SSL_CIPHERs for B<ssl>,
  24. sorted by preference. If B<ssl> is NULL or no ciphers are available, NULL
  25. is returned.
  26. SSL_CTX_get_ciphers() returns the stack of available SSL_CIPHERs for B<ctx>.
  27. SSL_get1_supported_ciphers() returns the stack of enabled SSL_CIPHERs for
  28. B<ssl> as would be sent in a ClientHello (that is, sorted by preference).
  29. The list depends on settings like the cipher list, the supported protocol
  30. versions, the security level, and the enabled signature algorithms.
  31. SRP and PSK ciphers are only enabled if the appropriate callbacks or settings
  32. have been applied.
  33. The list of ciphers that would be sent in a ClientHello can differ from
  34. the list of ciphers that would be acceptable when acting as a server.
  35. For example, additional ciphers may be usable by a server if there is
  36. a gap in the list of supported protocols, and some ciphers may not be
  37. usable by a server if there is not a suitable certificate configured.
  38. If B<ssl> is NULL or no ciphers are available, NULL is returned.
  39. SSL_get_client_ciphers() returns the stack of available SSL_CIPHERs matching the
  40. list received from the client on B<ssl>. If B<ssl> is NULL, no ciphers are
  41. available, or B<ssl> is not operating in server mode, NULL is returned.
  42. SSL_bytes_to_cipher_list() treats the supplied B<len> octets in B<bytes>
  43. as a wire-protocol cipher suite specification (in the three-octet-per-cipher
  44. SSLv2 wire format if B<isv2format> is nonzero; otherwise the two-octet
  45. SSLv3/TLS wire format), and parses the cipher suites supported by the library
  46. into the returned stacks of SSL_CIPHER objects sk and Signalling Cipher-Suite
  47. Values scsvs. Unsupported cipher suites are ignored. Returns 1 on success
  48. and 0 on failure.
  49. SSL_get_cipher_list() returns a pointer to the name of the SSL_CIPHER
  50. listed for B<ssl> with B<priority>. If B<ssl> is NULL, no ciphers are
  51. available, or there are less ciphers than B<priority> available, NULL
  52. is returned.
  53. SSL_get_shared_ciphers() creates a colon separated and NUL terminated list of
  54. SSL_CIPHER names that are available in both the client and the server. B<buf> is
  55. the buffer that should be populated with the list of names and B<size> is the
  56. size of that buffer. A pointer to B<buf> is returned on success or NULL on
  57. error. If the supplied buffer is not large enough to contain the complete list
  58. of names then a truncated list of names will be returned. Note that just because
  59. a ciphersuite is available (i.e. it is configured in the cipher list) and shared
  60. by both the client and the server it does not mean that it is enabled (see the
  61. description of SSL_get1_supported_ciphers() above). This function will return
  62. available shared ciphersuites whether or not they are enabled. This is a server
  63. side function only and must only be called after the completion of the initial
  64. handshake.
  65. =head1 NOTES
  66. The details of the ciphers obtained by SSL_get_ciphers(), SSL_CTX_get_ciphers()
  67. SSL_get1_supported_ciphers() and SSL_get_client_ciphers() can be obtained using
  68. the L<SSL_CIPHER_get_name(3)> family of functions.
  69. Call SSL_get_cipher_list() with B<priority> starting from 0 to obtain the
  70. sorted list of available ciphers, until NULL is returned.
  71. Note: SSL_get_ciphers(), SSL_CTX_get_ciphers() and SSL_get_client_ciphers()
  72. return a pointer to an internal cipher stack, which will be freed later on when
  73. the SSL or SSL_SESSION object is freed. Therefore, the calling code B<MUST NOT>
  74. free the return value itself.
  75. The stack returned by SSL_get1_supported_ciphers() should be freed using
  76. sk_SSL_CIPHER_free().
  77. The stacks returned by SSL_bytes_to_cipher_list() should be freed using
  78. sk_SSL_CIPHER_free().
  79. =head1 RETURN VALUES
  80. See DESCRIPTION
  81. =head1 SEE ALSO
  82. L<ssl(7)>, L<SSL_CTX_set_cipher_list(3)>,
  83. L<SSL_CIPHER_get_name(3)>
  84. =head1 COPYRIGHT
  85. Copyright 2000-2018 The OpenSSL Project Authors. All Rights Reserved.
  86. Licensed under the OpenSSL license (the "License"). You may not use
  87. this file except in compliance with the License. You can obtain a copy
  88. in the file LICENSE in the source distribution or at
  89. L<https://www.openssl.org/source/license.html>.
  90. =cut