SSL_CTX_sess_set_get_cb.pod 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114
  1. =pod
  2. =head1 NAME
  3. SSL_CTX_sess_set_new_cb, SSL_CTX_sess_set_remove_cb, SSL_CTX_sess_set_get_cb, SSL_CTX_sess_get_new_cb, SSL_CTX_sess_get_remove_cb, SSL_CTX_sess_get_get_cb - provide callback functions for server side external session caching
  4. =head1 SYNOPSIS
  5. #include <openssl/ssl.h>
  6. void SSL_CTX_sess_set_new_cb(SSL_CTX *ctx,
  7. int (*new_session_cb)(SSL *, SSL_SESSION *));
  8. void SSL_CTX_sess_set_remove_cb(SSL_CTX *ctx,
  9. void (*remove_session_cb)(SSL_CTX *ctx,
  10. SSL_SESSION *));
  11. void SSL_CTX_sess_set_get_cb(SSL_CTX *ctx,
  12. SSL_SESSION (*get_session_cb)(SSL *,
  13. const unsigned char *,
  14. int, int *));
  15. int (*SSL_CTX_sess_get_new_cb(SSL_CTX *ctx))(struct ssl_st *ssl,
  16. SSL_SESSION *sess);
  17. void (*SSL_CTX_sess_get_remove_cb(SSL_CTX *ctx))(struct ssl_ctx_st *ctx,
  18. SSL_SESSION *sess);
  19. SSL_SESSION *(*SSL_CTX_sess_get_get_cb(SSL_CTX *ctx))(struct ssl_st *ssl,
  20. const unsigned char *data,
  21. int len, int *copy);
  22. =head1 DESCRIPTION
  23. SSL_CTX_sess_set_new_cb() sets the callback function, which is automatically
  24. called whenever a new session was negotiated.
  25. SSL_CTX_sess_set_remove_cb() sets the callback function, which is
  26. automatically called whenever a session is removed by the SSL engine,
  27. because it is considered faulty or the session has become obsolete because
  28. of exceeding the timeout value.
  29. SSL_CTX_sess_set_get_cb() sets the callback function which is called,
  30. whenever a SSL/TLS client proposed to resume a session but the session
  31. could not be found in the internal session cache (see
  32. L<SSL_CTX_set_session_cache_mode(3)>).
  33. (SSL/TLS server only.)
  34. SSL_CTX_sess_get_new_cb(), SSL_CTX_sess_get_remove_cb(), and
  35. SSL_CTX_sess_get_get_cb() retrieve the function pointers set by the
  36. corresponding set callback functions. If a callback function has not been
  37. set, the NULL pointer is returned.
  38. =head1 NOTES
  39. In order to allow external session caching, synchronization with the internal
  40. session cache is realized via callback functions. Inside these callback
  41. functions, session can be saved to disk or put into a database using the
  42. L<d2i_SSL_SESSION(3)> interface.
  43. The new_session_cb() is called, whenever a new session has been negotiated
  44. and session caching is enabled (see
  45. L<SSL_CTX_set_session_cache_mode(3)>).
  46. The new_session_cb() is passed the B<ssl> connection and the ssl session
  47. B<sess>. If the callback returns B<0>, the session will be immediately
  48. removed again. Note that in TLSv1.3, sessions are established after the main
  49. handshake has completed. The server decides when to send the client the session
  50. information and this may occur some time after the end of the handshake (or not
  51. at all). This means that applications should expect the new_session_cb()
  52. function to be invoked during the handshake (for <= TLSv1.2) or after the
  53. handshake (for TLSv1.3). It is also possible in TLSv1.3 for multiple sessions to
  54. be established with a single connection. In these case the new_session_cb()
  55. function will be invoked multiple times.
  56. In TLSv1.3 it is recommended that each SSL_SESSION object is only used for
  57. resumption once. One way of enforcing that is for applications to call
  58. L<SSL_CTX_remove_session(3)> after a session has been used.
  59. The remove_session_cb() is called, whenever the SSL engine removes a session
  60. from the internal cache. This happens when the session is removed because
  61. it is expired or when a connection was not shutdown cleanly. It also happens
  62. for all sessions in the internal session cache when
  63. L<SSL_CTX_free(3)> is called. The remove_session_cb() is passed
  64. the B<ctx> and the ssl session B<sess>. It does not provide any feedback.
  65. The get_session_cb() is only called on SSL/TLS servers with the session id
  66. proposed by the client. The get_session_cb() is always called, also when
  67. session caching was disabled. The get_session_cb() is passed the
  68. B<ssl> connection, the session id of length B<length> at the memory location
  69. B<data>. With the parameter B<copy> the callback can require the
  70. SSL engine to increment the reference count of the SSL_SESSION object,
  71. Normally the reference count is not incremented and therefore the
  72. session must not be explicitly freed with
  73. L<SSL_SESSION_free(3)>.
  74. =head1 RETURN VALUES
  75. SSL_CTX_sess_get_new_cb(), SSL_CTX_sess_get_remove_cb() and SSL_CTX_sess_get_get_cb()
  76. return different callback function pointers respectively.
  77. =head1 SEE ALSO
  78. L<ssl(7)>, L<d2i_SSL_SESSION(3)>,
  79. L<SSL_CTX_set_session_cache_mode(3)>,
  80. L<SSL_CTX_flush_sessions(3)>,
  81. L<SSL_SESSION_free(3)>,
  82. L<SSL_CTX_free(3)>
  83. =head1 COPYRIGHT
  84. Copyright 2001-2018 The OpenSSL Project Authors. All Rights Reserved.
  85. Licensed under the Apache License 2.0 (the "License"). You may not use
  86. this file except in compliance with the License. You can obtain a copy
  87. in the file LICENSE in the source distribution or at
  88. L<https://www.openssl.org/source/license.html>.
  89. =cut