line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
|
2
|
|
|
|
|
|
|
package Net::SSLeay::OO::SSL; |
3
|
|
|
|
|
|
|
|
4
|
2
|
|
|
2
|
|
28130
|
use Moose; |
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
5
|
|
|
|
|
|
|
use Net::SSLeay::OO::Context; |
6
|
|
|
|
|
|
|
|
7
|
|
|
|
|
|
|
=head1 NAME |
8
|
|
|
|
|
|
|
|
9
|
|
|
|
|
|
|
Net::SSLeay::OO::SSL - OO interface to Net::SSLeay methods |
10
|
|
|
|
|
|
|
|
11
|
|
|
|
|
|
|
=head1 SYNOPSIS |
12
|
|
|
|
|
|
|
|
13
|
|
|
|
|
|
|
use Net::SSLeay::OO::Constants qw(OP_ALL); |
14
|
|
|
|
|
|
|
use Net::SSLeay::OO::SSL; |
15
|
|
|
|
|
|
|
|
16
|
|
|
|
|
|
|
# basic (insecure!) use - see below |
17
|
|
|
|
|
|
|
my $ssl = Net::SSLeay::OO::SSL->new; |
18
|
|
|
|
|
|
|
$ssl->set_fd(fileno($socket)); |
19
|
|
|
|
|
|
|
$ssl->connect; |
20
|
|
|
|
|
|
|
|
21
|
|
|
|
|
|
|
=head1 DESCRIPTION |
22
|
|
|
|
|
|
|
|
23
|
|
|
|
|
|
|
This module adds some OO niceties to using the Net::SSLeay / OpenSSL |
24
|
|
|
|
|
|
|
SSL objects. |
25
|
|
|
|
|
|
|
|
26
|
|
|
|
|
|
|
This SSL object is a per-connection entity. In general you will |
27
|
|
|
|
|
|
|
create one of these from a L<Net::SSLeay::OO::Context> object which you |
28
|
|
|
|
|
|
|
set up for your process and perhaps configured more fully. |
29
|
|
|
|
|
|
|
|
30
|
|
|
|
|
|
|
If you do not do that, then you are not certifying the authenticity of |
31
|
|
|
|
|
|
|
the peer. This means that your program will be vulnerable to MITM |
32
|
|
|
|
|
|
|
(man in the middle) attacks. |
33
|
|
|
|
|
|
|
|
34
|
|
|
|
|
|
|
=cut |
35
|
|
|
|
|
|
|
|
36
|
|
|
|
|
|
|
=head1 ATTRIBUTES |
37
|
|
|
|
|
|
|
|
38
|
|
|
|
|
|
|
=over |
39
|
|
|
|
|
|
|
|
40
|
|
|
|
|
|
|
=item ssl : Int |
41
|
|
|
|
|
|
|
|
42
|
|
|
|
|
|
|
The raw *SSL pointer. Use at your own risk. |
43
|
|
|
|
|
|
|
|
44
|
|
|
|
|
|
|
=cut |
45
|
|
|
|
|
|
|
|
46
|
|
|
|
|
|
|
has 'ssl' => isa => "Int", |
47
|
|
|
|
|
|
|
is => "ro", |
48
|
|
|
|
|
|
|
required => 1, |
49
|
|
|
|
|
|
|
lazy => 1, |
50
|
|
|
|
|
|
|
default => sub { |
51
|
|
|
|
|
|
|
my $self = shift; |
52
|
|
|
|
|
|
|
Net::SSLeay::new( $self->ctx->ctx ); |
53
|
|
|
|
|
|
|
}, |
54
|
|
|
|
|
|
|
; |
55
|
|
|
|
|
|
|
|
56
|
|
|
|
|
|
|
=item ctx : Context |
57
|
|
|
|
|
|
|
|
58
|
|
|
|
|
|
|
A Net::SSLeay::OO::Context object. Automatically created if not assigned |
59
|
|
|
|
|
|
|
on creation of the Net::SSLeay::OO::SSL. |
60
|
|
|
|
|
|
|
|
61
|
|
|
|
|
|
|
=cut |
62
|
|
|
|
|
|
|
|
63
|
|
|
|
|
|
|
has 'ctx' => isa => "Net::SSLeay::OO::Context", |
64
|
|
|
|
|
|
|
is => "ro", |
65
|
|
|
|
|
|
|
required => 1, |
66
|
|
|
|
|
|
|
default => sub { |
67
|
|
|
|
|
|
|
Net::SSLeay::OO::Context->new(); |
68
|
|
|
|
|
|
|
}, |
69
|
|
|
|
|
|
|
; |
70
|
|
|
|
|
|
|
|
71
|
|
|
|
|
|
|
sub BUILD { |
72
|
|
|
|
|
|
|
my $self = shift; |
73
|
|
|
|
|
|
|
$self->ssl; |
74
|
|
|
|
|
|
|
} |
75
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
=back |
77
|
|
|
|
|
|
|
|
78
|
|
|
|
|
|
|
=cut |
79
|
|
|
|
|
|
|
|
80
|
|
|
|
|
|
|
sub DESTROY { |
81
|
|
|
|
|
|
|
my $self = shift; |
82
|
|
|
|
|
|
|
if ( $self->ssl ) { |
83
|
|
|
|
|
|
|
$self->free; |
84
|
|
|
|
|
|
|
delete $self->{ssl}; |
85
|
|
|
|
|
|
|
} |
86
|
|
|
|
|
|
|
} |
87
|
|
|
|
|
|
|
|
88
|
|
|
|
|
|
|
=head1 METHODS |
89
|
|
|
|
|
|
|
|
90
|
|
|
|
|
|
|
All of the methods in Net::SSLeay which are not obviously a part of |
91
|
|
|
|
|
|
|
some other class are converted to methods of the Net::SSLeay::OO::SSL |
92
|
|
|
|
|
|
|
class. |
93
|
|
|
|
|
|
|
|
94
|
|
|
|
|
|
|
The documentation that follows is a core set, sufficient for running |
95
|
|
|
|
|
|
|
up a server and verifying client certificates. However most functions |
96
|
|
|
|
|
|
|
from the OpenSSL library are actually imported. |
97
|
|
|
|
|
|
|
|
98
|
|
|
|
|
|
|
=cut |
99
|
|
|
|
|
|
|
|
100
|
|
|
|
|
|
|
=head2 Handshake configuration methods |
101
|
|
|
|
|
|
|
|
102
|
|
|
|
|
|
|
These options are all intended to control the handshake phase of SSL |
103
|
|
|
|
|
|
|
negotiations. |
104
|
|
|
|
|
|
|
|
105
|
|
|
|
|
|
|
=over |
106
|
|
|
|
|
|
|
|
107
|
|
|
|
|
|
|
=item B<set_options( OP_XXX & OP_XXX ... )> |
108
|
|
|
|
|
|
|
|
109
|
|
|
|
|
|
|
=item B<get_options()> |
110
|
|
|
|
|
|
|
|
111
|
|
|
|
|
|
|
=item B<set_verify( $mode, [$verify_callback] )> |
112
|
|
|
|
|
|
|
|
113
|
|
|
|
|
|
|
=item B<use_certificate( Net::SSLeay::OO::X509 $cert )> |
114
|
|
|
|
|
|
|
|
115
|
|
|
|
|
|
|
=item B<use_certificate_file( $filename, $type )> |
116
|
|
|
|
|
|
|
|
117
|
|
|
|
|
|
|
=item B<use_PrivateKey_file( $filename, $type )> |
118
|
|
|
|
|
|
|
|
119
|
|
|
|
|
|
|
These functions are all very much the same as in |
120
|
|
|
|
|
|
|
C<Net::SSLeay::OO::Context> but apply only to this SSL object. Note that |
121
|
|
|
|
|
|
|
some functions are not available, such as |
122
|
|
|
|
|
|
|
C<use_certificate_chain_file()> and C<set_default_cb_passwd()> |
123
|
|
|
|
|
|
|
|
124
|
|
|
|
|
|
|
=back |
125
|
|
|
|
|
|
|
|
126
|
|
|
|
|
|
|
=cut |
127
|
|
|
|
|
|
|
|
128
|
|
|
|
|
|
|
has 'verify_cb', is => "ro"; |
129
|
|
|
|
|
|
|
|
130
|
|
|
|
|
|
|
BEGIN { |
131
|
|
|
|
|
|
|
no strict 'refs'; |
132
|
|
|
|
|
|
|
*$_ = \&{"Net::SSLeay::OO::Context::$_"} |
133
|
|
|
|
|
|
|
for qw(set_verify use_certificate); |
134
|
|
|
|
|
|
|
} |
135
|
|
|
|
|
|
|
|
136
|
|
|
|
|
|
|
sub _set_verify { |
137
|
|
|
|
|
|
|
my $self = shift; |
138
|
|
|
|
|
|
|
my $mode = shift; |
139
|
|
|
|
|
|
|
my $real_cb = shift; |
140
|
|
|
|
|
|
|
my $ssl = $self->ssl; |
141
|
|
|
|
|
|
|
$self->{verify_cb} = $real_cb; |
142
|
|
|
|
|
|
|
Net::SSLeay::set_verify( $ssl, $mode, $real_cb ); |
143
|
|
|
|
|
|
|
} |
144
|
|
|
|
|
|
|
|
145
|
|
|
|
|
|
|
=head2 Setup methods |
146
|
|
|
|
|
|
|
|
147
|
|
|
|
|
|
|
These methods set up the SSL object within your process - connecting |
148
|
|
|
|
|
|
|
it to filehandles and so on. |
149
|
|
|
|
|
|
|
|
150
|
|
|
|
|
|
|
=over |
151
|
|
|
|
|
|
|
|
152
|
|
|
|
|
|
|
=item B<set_fd( fileno($fh) )> |
153
|
|
|
|
|
|
|
|
154
|
|
|
|
|
|
|
=item B<get_fd( fileno($fh) )> |
155
|
|
|
|
|
|
|
|
156
|
|
|
|
|
|
|
Sets/Gets the file descriptor number for send and receive. |
157
|
|
|
|
|
|
|
|
158
|
|
|
|
|
|
|
=item B<set_rfd( fileno($fh) )> |
159
|
|
|
|
|
|
|
|
160
|
|
|
|
|
|
|
=item set_wfd( fileno($fh) )> |
161
|
|
|
|
|
|
|
|
162
|
|
|
|
|
|
|
Specify the file descriptors for send and receive independently. |
163
|
|
|
|
|
|
|
Useful when dealing with non-socket entities such as pipes. |
164
|
|
|
|
|
|
|
|
165
|
|
|
|
|
|
|
=item B<set_read_ahead( $boolean )> |
166
|
|
|
|
|
|
|
|
167
|
|
|
|
|
|
|
=item B<get_read_ahead()> |
168
|
|
|
|
|
|
|
|
169
|
|
|
|
|
|
|
See L<SSL_set_read_ahead(3ssl)> |
170
|
|
|
|
|
|
|
|
171
|
|
|
|
|
|
|
=item B<set_mode( $mode )> |
172
|
|
|
|
|
|
|
|
173
|
|
|
|
|
|
|
=item B<get_mode()> |
174
|
|
|
|
|
|
|
|
175
|
|
|
|
|
|
|
Sets/gets the mode of the SSL object. See L<SSL_set_mode(3ssl)>. If |
176
|
|
|
|
|
|
|
you want non-blocking use, set: |
177
|
|
|
|
|
|
|
|
178
|
|
|
|
|
|
|
$ssl->set_mode( MODE_ENABLE_PARTIAL_WRITE | |
179
|
|
|
|
|
|
|
MODE_ACCEPT_MOVING_WRITE_BUFFER ); |
180
|
|
|
|
|
|
|
|
181
|
|
|
|
|
|
|
See F<t/05-non-blocking.t> for a more complete example of using this |
182
|
|
|
|
|
|
|
library in non-blocking mode. Note you still need to mark the |
183
|
|
|
|
|
|
|
underlying filehandle as non-blocking. |
184
|
|
|
|
|
|
|
|
185
|
|
|
|
|
|
|
=back |
186
|
|
|
|
|
|
|
|
187
|
|
|
|
|
|
|
=head2 Handshake/SSL session methods |
188
|
|
|
|
|
|
|
|
189
|
|
|
|
|
|
|
=over |
190
|
|
|
|
|
|
|
|
191
|
|
|
|
|
|
|
=item B<accept()> |
192
|
|
|
|
|
|
|
|
193
|
|
|
|
|
|
|
=item B<connect()> |
194
|
|
|
|
|
|
|
|
195
|
|
|
|
|
|
|
Initiate the SSL session, from the perspective of a server or a |
196
|
|
|
|
|
|
|
client, respectively. |
197
|
|
|
|
|
|
|
|
198
|
|
|
|
|
|
|
=item B<clear()> |
199
|
|
|
|
|
|
|
|
200
|
|
|
|
|
|
|
Forget the current SSL session. You probably don't want to use this. |
201
|
|
|
|
|
|
|
|
202
|
|
|
|
|
|
|
=item B<shutdown()> |
203
|
|
|
|
|
|
|
|
204
|
|
|
|
|
|
|
Sends a "close notify" shutdown alert to the peer. You should do this |
205
|
|
|
|
|
|
|
before you shut down the underlying socket. |
206
|
|
|
|
|
|
|
|
207
|
|
|
|
|
|
|
=back |
208
|
|
|
|
|
|
|
|
209
|
|
|
|
|
|
|
=head2 IO functions |
210
|
|
|
|
|
|
|
|
211
|
|
|
|
|
|
|
=over |
212
|
|
|
|
|
|
|
|
213
|
|
|
|
|
|
|
=item B<ssl_read_all> |
214
|
|
|
|
|
|
|
|
215
|
|
|
|
|
|
|
=item B<ssl_read_CRLF( $max_length? )> |
216
|
|
|
|
|
|
|
|
217
|
|
|
|
|
|
|
=item B<ssl_read_until( $delimit?, $max_length? )> |
218
|
|
|
|
|
|
|
|
219
|
|
|
|
|
|
|
These are L<Net::SSLeay> wrappers to the OpenSSL read methods; use |
220
|
|
|
|
|
|
|
these if you are not sure how to use the other ones. These are |
221
|
|
|
|
|
|
|
blocking calls. Note that C<ssl_read_all> will read from the socket |
222
|
|
|
|
|
|
|
until the remote end shuts down. C<ssl_read_CRLF> and |
223
|
|
|
|
|
|
|
C<ssl_read_until> use the undocumented OpenSSL function C<SSL_peek> to |
224
|
|
|
|
|
|
|
read the entire pending buffer, figure out at what point the delimiter |
225
|
|
|
|
|
|
|
appears and then C<SSL_read> just enough to clear that. |
226
|
|
|
|
|
|
|
|
227
|
|
|
|
|
|
|
=item B<read($max?)> |
228
|
|
|
|
|
|
|
|
229
|
|
|
|
|
|
|
Perform and return read of the rest of the next SSL record, or C<$max> |
230
|
|
|
|
|
|
|
bytes, whichever is smaller. How large that record is depends on the |
231
|
|
|
|
|
|
|
sender, but you need to receive an entire record before you can |
232
|
|
|
|
|
|
|
extract any data from it anyway. |
233
|
|
|
|
|
|
|
|
234
|
|
|
|
|
|
|
=item B<peek($max?)> |
235
|
|
|
|
|
|
|
|
236
|
|
|
|
|
|
|
Like C<read()>, but doesn't clear the data from the session buffer. |
237
|
|
|
|
|
|
|
|
238
|
|
|
|
|
|
|
=item B<ssl_write_all($message)> |
239
|
|
|
|
|
|
|
|
240
|
|
|
|
|
|
|
=item B<ssl_write_CRLF($line)> |
241
|
|
|
|
|
|
|
|
242
|
|
|
|
|
|
|
Convenience wrappers for writing a message or a single line to the |
243
|
|
|
|
|
|
|
socket via SSL. Note that C<ssl_write_CRLF> sends the CRLF two-byte |
244
|
|
|
|
|
|
|
sequence to OpenSSL in its own C<SSL_write> function call, with a |
245
|
|
|
|
|
|
|
comment warning that this "uses less memory but might use more network |
246
|
|
|
|
|
|
|
packets". |
247
|
|
|
|
|
|
|
|
248
|
|
|
|
|
|
|
=item B<write($message)> |
249
|
|
|
|
|
|
|
|
250
|
|
|
|
|
|
|
Pretty much a direct method for C<SSL_write>; writes the message and |
251
|
|
|
|
|
|
|
returns the number of bytes written. |
252
|
|
|
|
|
|
|
|
253
|
|
|
|
|
|
|
=item B<write_partial($from, $count, $message)> |
254
|
|
|
|
|
|
|
|
255
|
|
|
|
|
|
|
Writes a substring of the message and returns the number of bytes |
256
|
|
|
|
|
|
|
written. |
257
|
|
|
|
|
|
|
|
258
|
|
|
|
|
|
|
This interface is probably unnecessary since about Perl 5.8.1, as on |
259
|
|
|
|
|
|
|
those perls C<substr()> can refer to substrings of other strings. |
260
|
|
|
|
|
|
|
|
261
|
|
|
|
|
|
|
=back |
262
|
|
|
|
|
|
|
|
263
|
|
|
|
|
|
|
=head2 Informative methods |
264
|
|
|
|
|
|
|
|
265
|
|
|
|
|
|
|
These methods return information about the current SSL object |
266
|
|
|
|
|
|
|
|
267
|
|
|
|
|
|
|
=over |
268
|
|
|
|
|
|
|
|
269
|
|
|
|
|
|
|
=item B<get_error> |
270
|
|
|
|
|
|
|
|
271
|
|
|
|
|
|
|
Returns the error from the last IO operation, you can match this |
272
|
|
|
|
|
|
|
against various constants as described on L<SSL_get_error(3ssl)>. |
273
|
|
|
|
|
|
|
|
274
|
|
|
|
|
|
|
=item B<want> |
275
|
|
|
|
|
|
|
|
276
|
|
|
|
|
|
|
A simpler version of C<get_error>, see C<SSL_want(3ssl)>. |
277
|
|
|
|
|
|
|
|
278
|
|
|
|
|
|
|
=item B<get_cipher> |
279
|
|
|
|
|
|
|
|
280
|
|
|
|
|
|
|
The cipher of the current session |
281
|
|
|
|
|
|
|
|
282
|
|
|
|
|
|
|
=item B<get_peer_certificate> |
283
|
|
|
|
|
|
|
|
284
|
|
|
|
|
|
|
Returns a L<Net::SSLeay::OO::X509> object corresponding to the peer |
285
|
|
|
|
|
|
|
certificate; if you're a client, it's the server certificate. If |
286
|
|
|
|
|
|
|
you're a server, it's the client certificate, if you requested it |
287
|
|
|
|
|
|
|
during handshake with C<set_verify>. |
288
|
|
|
|
|
|
|
|
289
|
|
|
|
|
|
|
=cut |
290
|
|
|
|
|
|
|
|
291
|
|
|
|
|
|
|
sub get_peer_certificate { |
292
|
|
|
|
|
|
|
my $self = shift; |
293
|
|
|
|
|
|
|
my $x509 = Net::SSLeay::get_peer_certificate( $self->ssl ); |
294
|
|
|
|
|
|
|
&Net::SSLeay::OO::Error::die_if_ssl_error("get_peer_certificate"); |
295
|
|
|
|
|
|
|
if ($x509) { |
296
|
|
|
|
|
|
|
Net::SSLeay::OO::X509->new( x509 => $x509 ); |
297
|
|
|
|
|
|
|
} |
298
|
|
|
|
|
|
|
} |
299
|
|
|
|
|
|
|
|
300
|
|
|
|
|
|
|
=item B<get_session> |
301
|
|
|
|
|
|
|
|
302
|
|
|
|
|
|
|
Returns a Net::SSLeay::OO::Session object corresponding to the SSL |
303
|
|
|
|
|
|
|
session. This actually calls C<SSL_get1_session> to try to help save |
304
|
|
|
|
|
|
|
you from segfaults. |
305
|
|
|
|
|
|
|
|
306
|
|
|
|
|
|
|
=item B<set_session($session)> |
307
|
|
|
|
|
|
|
|
308
|
|
|
|
|
|
|
If for some reason you want to set the session, call this method, |
309
|
|
|
|
|
|
|
passing a Net::SSLeay::OO::Session object. |
310
|
|
|
|
|
|
|
|
311
|
|
|
|
|
|
|
=cut |
312
|
|
|
|
|
|
|
|
313
|
|
|
|
|
|
|
sub get_session { |
314
|
|
|
|
|
|
|
my $self = shift; |
315
|
|
|
|
|
|
|
require Net::SSLeay::OO::Session; |
316
|
|
|
|
|
|
|
my $sessid = Net::SSLeay::get1_session( $self->ssl ); |
317
|
|
|
|
|
|
|
&Net::SSLeay::OO::Error::die_if_ssl_error("get_session"); |
318
|
|
|
|
|
|
|
if ($sessid) { |
319
|
|
|
|
|
|
|
Net::SSLeay::OO::Session->new( session => $sessid ); |
320
|
|
|
|
|
|
|
} |
321
|
|
|
|
|
|
|
} |
322
|
|
|
|
|
|
|
|
323
|
|
|
|
|
|
|
sub set_session { |
324
|
|
|
|
|
|
|
my $self = shift; |
325
|
|
|
|
|
|
|
my $session = shift; |
326
|
|
|
|
|
|
|
Net::SSLeay::set_session( $self->ssl, $session->session ); |
327
|
|
|
|
|
|
|
&Net::SSLeay::OO::Error::die_if_ssl_error("set_session"); |
328
|
|
|
|
|
|
|
} |
329
|
|
|
|
|
|
|
|
330
|
|
|
|
|
|
|
=item B<state_string> |
331
|
|
|
|
|
|
|
|
332
|
|
|
|
|
|
|
=item B<state_string_long> |
333
|
|
|
|
|
|
|
|
334
|
|
|
|
|
|
|
Return a codified or human-readable string 'indicating the current |
335
|
|
|
|
|
|
|
state of the SSL object'. |
336
|
|
|
|
|
|
|
|
337
|
|
|
|
|
|
|
L<SSL_state_string(3ssl)> sez ''Detailed description of possible |
338
|
|
|
|
|
|
|
states to be included later'' |
339
|
|
|
|
|
|
|
|
340
|
|
|
|
|
|
|
=item B<rstate_string> |
341
|
|
|
|
|
|
|
|
342
|
|
|
|
|
|
|
=item B<rstate_string_long> |
343
|
|
|
|
|
|
|
|
344
|
|
|
|
|
|
|
Return information about the read state. In a blocking environment, |
345
|
|
|
|
|
|
|
this should always return "RD" or "read done". Otherwise, you'll get |
346
|
|
|
|
|
|
|
something else possibly informative. |
347
|
|
|
|
|
|
|
|
348
|
|
|
|
|
|
|
=back |
349
|
|
|
|
|
|
|
|
350
|
|
|
|
|
|
|
=head2 Un-triaged |
351
|
|
|
|
|
|
|
|
352
|
|
|
|
|
|
|
The following methods I haven't looked at at all; if you use them in a |
353
|
|
|
|
|
|
|
program, please submit a patch which moves them into one of the above |
354
|
|
|
|
|
|
|
categories. The best information about them will be found on the |
355
|
|
|
|
|
|
|
relevant SSL man page - use C<man -k> or C<apropros> to find a useful |
356
|
|
|
|
|
|
|
man page. |
357
|
|
|
|
|
|
|
|
358
|
|
|
|
|
|
|
My policy on these is that no function should take an unwrapped |
359
|
|
|
|
|
|
|
pointer argument or return an unwrapped pointer. So long as the |
360
|
|
|
|
|
|
|
function you use doesn't do that, you can reasonably expect its call |
361
|
|
|
|
|
|
|
interface not to change; but of course I place no guarantees should |
362
|
|
|
|
|
|
|
OpenSSL or Net::SSLeay ruin your day. |
363
|
|
|
|
|
|
|
|
364
|
|
|
|
|
|
|
set_cipher_list($list) |
365
|
|
|
|
|
|
|
add_client_CA(ssl,x) |
366
|
|
|
|
|
|
|
alert_desc_string(value) |
367
|
|
|
|
|
|
|
alert_desc_string_long(value) |
368
|
|
|
|
|
|
|
alert_type_string(value) |
369
|
|
|
|
|
|
|
alert_type_string_long(value) |
370
|
|
|
|
|
|
|
callback_ctrl(ssl,i,fp) |
371
|
|
|
|
|
|
|
check_private_key(ctx) |
372
|
|
|
|
|
|
|
do_handshake(s) |
373
|
|
|
|
|
|
|
dup(ssl) |
374
|
|
|
|
|
|
|
get_current_cipher(s) |
375
|
|
|
|
|
|
|
get_default_timeout(s) |
376
|
|
|
|
|
|
|
get_ex_data(ssl,idx) |
377
|
|
|
|
|
|
|
get_finished(s,buf,count) |
378
|
|
|
|
|
|
|
get_peer_finished(s,buf,count) |
379
|
|
|
|
|
|
|
get_quiet_shutdown(ssl) |
380
|
|
|
|
|
|
|
get_shutdown(ssl) |
381
|
|
|
|
|
|
|
get_verify_depth(s) |
382
|
|
|
|
|
|
|
get_verify_mode(s) |
383
|
|
|
|
|
|
|
get_verify_result(ssl) |
384
|
|
|
|
|
|
|
renegotiate(s) |
385
|
|
|
|
|
|
|
set_accept_state(s) |
386
|
|
|
|
|
|
|
set_client_CA_list(s,list) |
387
|
|
|
|
|
|
|
set_connect_state(s) |
388
|
|
|
|
|
|
|
set_ex_data(ssl,idx,data) |
389
|
|
|
|
|
|
|
set_info_callback(ssl,cb) |
390
|
|
|
|
|
|
|
set_purpose(s,purpose) |
391
|
|
|
|
|
|
|
set_quiet_shutdown(ssl,mode) |
392
|
|
|
|
|
|
|
set_shutdown(ssl,mode) |
393
|
|
|
|
|
|
|
set_trust(s,trust) |
394
|
|
|
|
|
|
|
set_verify_depth(s,depth) |
395
|
|
|
|
|
|
|
set_verify_result(ssl,v) |
396
|
|
|
|
|
|
|
version(ssl) |
397
|
|
|
|
|
|
|
load_client_CA_file(file) |
398
|
|
|
|
|
|
|
add_file_cert_subjects_to_stack(stackCAs,file) |
399
|
|
|
|
|
|
|
add_dir_cert_subjects_to_stack(stackCAs,dir) |
400
|
|
|
|
|
|
|
set_session_id_context(ssl,sid_ctx,sid_ctx_len) |
401
|
|
|
|
|
|
|
set_tmp_rsa_callback(ssl, cb) |
402
|
|
|
|
|
|
|
set_tmp_dh_callback(ssl,dh) |
403
|
|
|
|
|
|
|
get_ex_new_index(argl, argp, new_func, dup_func, free_func) |
404
|
|
|
|
|
|
|
clear_num_renegotiations(ssl) |
405
|
|
|
|
|
|
|
get_app_data(s) |
406
|
|
|
|
|
|
|
get_cipher_bits(s,np) |
407
|
|
|
|
|
|
|
get_mode(ssl) |
408
|
|
|
|
|
|
|
get_state(ssl) |
409
|
|
|
|
|
|
|
need_tmp_RSA(ssl) |
410
|
|
|
|
|
|
|
num_renegotiations(ssl) |
411
|
|
|
|
|
|
|
session_reused(ssl) |
412
|
|
|
|
|
|
|
set_app_data(s,arg) |
413
|
|
|
|
|
|
|
set_mode(ssl,op) |
414
|
|
|
|
|
|
|
set_pref_cipher(s,n) |
415
|
|
|
|
|
|
|
set_tmp_dh(ssl,dh) |
416
|
|
|
|
|
|
|
set_tmp_rsa(ssl,rsa) |
417
|
|
|
|
|
|
|
total_renegotiations(ssl) |
418
|
|
|
|
|
|
|
get_client_random(s) |
419
|
|
|
|
|
|
|
get_server_random(s) |
420
|
|
|
|
|
|
|
get_keyblock_size(s) |
421
|
|
|
|
|
|
|
set_hello_extension(s, type, data) |
422
|
|
|
|
|
|
|
set_session_secret_cb(s,func,data=NULL) |
423
|
|
|
|
|
|
|
|
424
|
|
|
|
|
|
|
=cut |
425
|
|
|
|
|
|
|
|
426
|
|
|
|
|
|
|
# excluded because they were either named badly for their argument |
427
|
|
|
|
|
|
|
# types, because I didn't want to implement versions which would have |
428
|
|
|
|
|
|
|
# to take pointers directly as integers, because there was no OpenSSL |
429
|
|
|
|
|
|
|
# man page for them, or because they were marked as not for general |
430
|
|
|
|
|
|
|
# consumption. |
431
|
|
|
|
|
|
|
|
432
|
|
|
|
|
|
|
use Net::SSLeay::OO::Functions 'ssl', -exclude => [ |
433
|
|
|
|
|
|
|
qw( get_time set_time get_timeout set_timeout |
434
|
|
|
|
|
|
|
set_bio get_rbio get_wbio get0_session |
435
|
|
|
|
|
|
|
get1_session ctrl callback_ctrl state |
436
|
|
|
|
|
|
|
set_ssl_method get_ssl_method set_cert_and_key |
437
|
|
|
|
|
|
|
) |
438
|
|
|
|
|
|
|
]; |
439
|
|
|
|
|
|
|
|
440
|
|
|
|
|
|
|
1; |
441
|
|
|
|
|
|
|
|
442
|
|
|
|
|
|
|
__END__ |
443
|
|
|
|
|
|
|
|
444
|
|
|
|
|
|
|
=head1 AUTHOR |
445
|
|
|
|
|
|
|
|
446
|
|
|
|
|
|
|
Sam Vilain, L<samv@cpan.org> |
447
|
|
|
|
|
|
|
|
448
|
|
|
|
|
|
|
=head1 COPYRIGHT |
449
|
|
|
|
|
|
|
|
450
|
|
|
|
|
|
|
Copyright (C) 2009 NZ Registry Services |
451
|
|
|
|
|
|
|
|
452
|
|
|
|
|
|
|
This program is free software: you can redistribute it and/or modify |
453
|
|
|
|
|
|
|
it under the terms of the Artistic License 2.0 or later. You should |
454
|
|
|
|
|
|
|
have received a copy of the Artistic License the file COPYING.txt. If |
455
|
|
|
|
|
|
|
not, see <http://www.perlfoundation.org/artistic_license_2_0> |
456
|
|
|
|
|
|
|
|
457
|
|
|
|
|
|
|
=head1 SEE ALSO |
458
|
|
|
|
|
|
|
|
459
|
|
|
|
|
|
|
L<Net::SSLeay::OO>, L<Net::SSLeay::OO::Context>, L<Net::SSLeay::Session> |
460
|
|
|
|
|
|
|
|
461
|
|
|
|
|
|
|
=cut |
462
|
|
|
|
|
|
|
|
463
|
|
|
|
|
|
|
# Local Variables: |
464
|
|
|
|
|
|
|
# mode:cperl |
465
|
|
|
|
|
|
|
# indent-tabs-mode: t |
466
|
|
|
|
|
|
|
# cperl-continued-statement-offset: 8 |
467
|
|
|
|
|
|
|
# cperl-brace-offset: 0 |
468
|
|
|
|
|
|
|
# cperl-close-paren-offset: 0 |
469
|
|
|
|
|
|
|
# cperl-continued-brace-offset: 0 |
470
|
|
|
|
|
|
|
# cperl-continued-statement-offset: 8 |
471
|
|
|
|
|
|
|
# cperl-extra-newline-before-brace: nil |
472
|
|
|
|
|
|
|
# cperl-indent-level: 8 |
473
|
|
|
|
|
|
|
# cperl-indent-parens-as-block: t |
474
|
|
|
|
|
|
|
# cperl-indent-wrt-brace: nil |
475
|
|
|
|
|
|
|
# cperl-label-offset: -8 |
476
|
|
|
|
|
|
|
# cperl-merge-trailing-else: t |
477
|
|
|
|
|
|
|
# End: |
478
|
|
|
|
|
|
|
# vim: filetype=perl:noexpandtab:ts=3:sw=3 |