summaryrefslogtreecommitdiff
path: root/static/netbsd/man3/SSL_CTX_set_client_hello_cb.3
blob: 5f7ec082bf12c1b96494a602b5da300741b9f3cd (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
.\"	$NetBSD: SSL_CTX_set_client_hello_cb.3,v 1.5 2026/04/08 17:06:47 christos Exp $
.\"
.\" -*- mode: troff; coding: utf-8 -*-
.\" Automatically generated by Pod::Man v6.0.2 (Pod::Simple 3.45)
.\"
.\" Standard preamble:
.\" ========================================================================
.de Sp \" Vertical space (when we can't use .PP)
.if t .sp .5v
.if n .sp
..
.de Vb \" Begin verbatim text
.ft CW
.nf
.ne \\$1
..
.de Ve \" End verbatim text
.ft R
.fi
..
.\" \*(C` and \*(C' are quotes in nroff, nothing in troff, for use with C<>.
.ie n \{\
.    ds C` ""
.    ds C' ""
'br\}
.el\{\
.    ds C`
.    ds C'
'br\}
.\"
.\" Escape single quotes in literal strings from groff's Unicode transform.
.ie \n(.g .ds Aq \(aq
.el       .ds Aq '
.\"
.\" If the F register is >0, we'll generate index entries on stderr for
.\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
.\" entries marked with X<> in POD.  Of course, you'll have to process the
.\" output yourself in some meaningful fashion.
.\"
.\" Avoid warning from groff about undefined register 'F'.
.de IX
..
.nr rF 0
.if \n(.g .if rF .nr rF 1
.if (\n(rF:(\n(.g==0)) \{\
.    if \nF \{\
.        de IX
.        tm Index:\\$1\t\\n%\t"\\$2"
..
.        if !\nF==2 \{\
.            nr % 0
.            nr F 2
.        \}
.    \}
.\}
.rr rF
.\"
.\" Required to disable full justification in groff 1.23.0.
.if n .ds AD l
.\" ========================================================================
.\"
.IX Title "SSL_CTX_set_client_hello_cb 3"
.TH SSL_CTX_set_client_hello_cb 3 2026-04-07 3.5.6 OpenSSL
.\" For nroff, turn off justification.  Always turn off hyphenation; it makes
.\" way too many mistakes in technical documents.
.if n .ad l
.nh
.SH NAME
SSL_CTX_set_client_hello_cb, SSL_client_hello_cb_fn, SSL_client_hello_isv2, SSL_client_hello_get0_legacy_version, SSL_client_hello_get0_random, SSL_client_hello_get0_session_id, SSL_client_hello_get0_ciphers, SSL_client_hello_get0_compression_methods, SSL_client_hello_get1_extensions_present, SSL_client_hello_get_extension_order, SSL_client_hello_get0_ext \- callback functions for early server\-side ClientHello processing
.SH SYNOPSIS
.IX Header "SYNOPSIS"
.Vb 10
\& typedef int (*SSL_client_hello_cb_fn)(SSL *s, int *al, void *arg);
\& void SSL_CTX_set_client_hello_cb(SSL_CTX *c, SSL_client_hello_cb_fn *f,
\&                                  void *arg);
\& int SSL_client_hello_isv2(SSL *s);
\& unsigned int SSL_client_hello_get0_legacy_version(SSL *s);
\& size_t SSL_client_hello_get0_random(SSL *s, const unsigned char **out);
\& size_t SSL_client_hello_get0_session_id(SSL *s, const unsigned char **out);
\& size_t SSL_client_hello_get0_ciphers(SSL *s, const unsigned char **out);
\& size_t SSL_client_hello_get0_compression_methods(SSL *s,
\&                                                  const unsigned char **out);
\& int SSL_client_hello_get1_extensions_present(SSL *s, int **out,
\&                                              size_t *outlen);
\& int SSL_client_hello_get_extension_order(SSL *s, uint16_t *exts,
\&                                          size_t *num_exts);
\& int SSL_client_hello_get0_ext(SSL *s, unsigned int type, const unsigned char **out,
\&                               size_t *outlen);
.Ve
.SH DESCRIPTION
.IX Header "DESCRIPTION"
\&\fBSSL_CTX_set_client_hello_cb()\fR sets the callback function, which is automatically
called during the early stages of ClientHello processing on the server.
The argument supplied when setting the callback is passed back to the
callback at run time.  A callback that returns failure (0) will cause the
connection to terminate, and callbacks returning failure should indicate
what alert value is to be sent in the \fBal\fR parameter.  A callback may
also return a negative value to suspend the handshake, and the handshake
function will return immediately.  \fBSSL_get_error\fR\|(3) will return
SSL_ERROR_WANT_CLIENT_HELLO_CB to indicate that the handshake was suspended.
It is the job of the ClientHello callback to store information about the state
of the last call if needed to continue.  On the next call into the handshake
function, the ClientHello callback will be called again, and, if it returns
success, normal handshake processing will continue from that point.
.PP
\&\fBSSL_client_hello_isv2()\fR indicates whether the ClientHello was carried in a
SSLv2 record and is in the SSLv2 format.  The SSLv2 format has substantial
differences from the normal SSLv3 format, including using three bytes per
cipher suite, and not allowing extensions.  Additionally, the SSLv2 format
\&\*(Aqchallenge\*(Aq field is exposed via \fBSSL_client_hello_get0_random()\fR, padded to
SSL3_RANDOM_SIZE bytes with zeros if needed.  For SSLv2 format ClientHellos,
\&\fBSSL_client_hello_get0_compression_methods()\fR returns a dummy list that only includes
the null compression method, since the SSLv2 format does not include a
mechanism by which to negotiate compression.
.PP
\&\fBSSL_client_hello_get0_random()\fR, \fBSSL_client_hello_get0_session_id()\fR,
\&\fBSSL_client_hello_get0_ciphers()\fR, and
\&\fBSSL_client_hello_get0_compression_methods()\fR provide access to the corresponding
ClientHello fields, returning the field length and optionally setting an out
pointer to the octets of that field.
.PP
Similarly, \fBSSL_client_hello_get0_ext()\fR provides access to individual extensions
from the ClientHello on a per\-extension basis.  For the provided wire
protocol extension type value, the extension value and length are returned
in the output parameters (if present).
.PP
\&\fBSSL_client_hello_get1_extensions_present()\fR can be used prior to
\&\fBSSL_client_hello_get0_ext()\fR, to determine which extensions are present in the
ClientHello before querying for them.  The \fBout\fR and \fBoutlen\fR parameters are
both required, and on success the caller must release the storage allocated for
\&\fB*out\fR using \fBOPENSSL_free()\fR.  The contents of \fB*out\fR is an array of integers
holding the numerical value of the TLS extension types in the order they appear
in the ClientHello.  \fB*outlen\fR contains the number of elements in the array.
In situations when the ClientHello has no extensions, the function will return
success with \fB*out\fR set to NULL and \fB*outlen\fR set to 0.
Note that \fBSSL_client_hello_get1_extensions_present()\fR returns only recognised
extensions; therefore, unrecognised (including GREASE) extensions will not
appear in the output.
.PP
\&\fBSSL_client_hello_get_extension_order()\fR is similar to
\&\fBSSL_client_hello_get1_extensions_present()\fR, without internal memory allocation.
When called with \fBexts\fR set to NULL, returns the number of extensions
(e.g., to allocate storage for a subsequent call).  Otherwise, \fB*exts\fR is populated
with the ExtensionType values in the order that the corresponding extensions
appeared in the ClientHello.  \fB*num_exts\fR is an input/output parameter, used
as input to supply the size of storage allocated by the caller, and as output to
indicate how many ExtensionType values were written.  If the input \fB*num_exts\fR
is smaller then the number of extensions in question, that is treated as an error.
A subsequent call with \fBexts\fR set to NULL can retrieve the size of storage needed.
A ClientHello that contained no extensions is treated as success, with \fB*num_exts\fR
set to 0.
.SH NOTES
.IX Header "NOTES"
The ClientHello callback provides a vast window of possibilities for application
code to affect the TLS handshake.  A primary use of the callback is to
allow the server to examine the server name indication extension provided
by the client in order to select an appropriate certificate to present,
and make other configuration adjustments relevant to that server name
and its configuration.  Such configuration changes can include swapping out
the associated SSL_CTX pointer, modifying the server\*(Aqs list of permitted TLS
versions, changing the server\*(Aqs cipher list in response to the client\*(Aqs
cipher list, etc.
.PP
It is also recommended that applications utilize a ClientHello callback and
not use a servername callback, in order to avoid unexpected behavior that
occurs due to the relative order of processing between things like session
resumption and the historical servername callback.
.PP
The SSL_client_hello_* family of functions may only be called from code
executing within a ClientHello callback.
.PP
The SSL_client_hello_get0_*() functions return raw ClientHello data, whereas
\&\fBSSL_client_hello_get1_extensions_present()\fR returns only recognized extensions
(so unknown/GREASE\-extensions are not included).
.SH "RETURN VALUES"
.IX Header "RETURN VALUES"
The application\*(Aqs supplied ClientHello callback returns
SSL_CLIENT_HELLO_SUCCESS on success, SSL_CLIENT_HELLO_ERROR on failure, and
SSL_CLIENT_HELLO_RETRY to suspend processing.
.PP
\&\fBSSL_client_hello_isv2()\fR returns 1 for SSLv2\-format ClientHellos and 0 otherwise.
.PP
\&\fBSSL_client_hello_get0_random()\fR, \fBSSL_client_hello_get0_session_id()\fR,
\&\fBSSL_client_hello_get0_ciphers()\fR, and
\&\fBSSL_client_hello_get0_compression_methods()\fR return the length of the
corresponding ClientHello fields.  If zero is returned, the output pointer
should not be assumed to be valid.
.PP
\&\fBSSL_client_hello_get0_ext()\fR returns 1 if the extension of type \*(Aqtype\*(Aq is present, and
0 otherwise.
.PP
\&\fBSSL_client_hello_get1_extensions_present()\fR returns 1 on success and 0 on failure.
.PP
\&\fBSSL_client_hello_get_extension_order()\fR returns 1 on success and 0 on failure.
.SH "SEE ALSO"
.IX Header "SEE ALSO"
\&\fBssl\fR\|(7), \fBSSL_CTX_set_tlsext_servername_callback\fR\|(3),
\&\fBSSL_bytes_to_cipher_list\fR\|(3)
.SH HISTORY
.IX Header "HISTORY"
The SSL ClientHello callback, \fBSSL_client_hello_isv2()\fR,
\&\fBSSL_client_hello_get0_random()\fR, \fBSSL_client_hello_get0_session_id()\fR,
\&\fBSSL_client_hello_get0_ciphers()\fR, \fBSSL_client_hello_get0_compression_methods()\fR,
\&\fBSSL_client_hello_get0_ext()\fR, and \fBSSL_client_hello_get1_extensions_present()\fR
were added in OpenSSL 1.1.1.
\&\fBSSL_client_hello_get_extension_order()\fR
was added in OpenSSL 3.2.0.
.SH COPYRIGHT
.IX Header "COPYRIGHT"
Copyright 2017\-2022 The OpenSSL Project Authors. All Rights Reserved.
.PP
Licensed under the Apache License 2.0 (the "License").  You may not use
this file except in compliance with the License.  You can obtain a copy
in the file LICENSE in the source distribution or at
<https://www.openssl.org/source/license.html>.