aboutsummaryrefslogtreecommitdiff
path: root/src/daemon/https/tls/ext_oprfi.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/daemon/https/tls/ext_oprfi.c')
-rw-r--r--src/daemon/https/tls/ext_oprfi.c49
1 files changed, 0 insertions, 49 deletions
diff --git a/src/daemon/https/tls/ext_oprfi.c b/src/daemon/https/tls/ext_oprfi.c
index 8b245404..060155e4 100644
--- a/src/daemon/https/tls/ext_oprfi.c
+++ b/src/daemon/https/tls/ext_oprfi.c
@@ -215,52 +215,3 @@ MHD_gtls_oprfi_send_params (MHD_gtls_session_t session,
215 return oprfi_send_server (session, data, data_size); 215 return oprfi_send_server (session, data, data_size);
216} 216}
217 217
218/**
219 * MHD_gtls_oprfi_enable_client:
220 * @session: is a #MHD_gtls_session_t structure.
221 * @len: length of Opaque PRF data to use in client.
222 * @data: Opaque PRF data to use in client.
223 *
224 * Request that the client should attempt to negotiate the Opaque PRF
225 * Input TLS extension, using the given data as the client's Opaque
226 * PRF input.
227 *
228 * The data is copied into the session context after this call, so you
229 * may de-allocate it immediately after calling this function.
230 **/
231void
232MHD_gtls_oprfi_enable_client (MHD_gtls_session_t session,
233 size_t len, unsigned char *data)
234{
235 session->security_parameters.extensions.oprfi_client_len = len;
236 session->security_parameters.extensions.oprfi_client = data;
237}
238
239/**
240 * MHD_gtls_oprfi_enable_server:
241 * @session: is a #MHD_gtls_session_t structure.
242 * @cb: function pointer to Opaque PRF extension server callback.
243 * @userdata: hook passed to callback function for passing application state.
244 *
245 * Request that the server should attempt to accept the Opaque PRF
246 * Input TLS extension. If the client requests the extension, the
247 * provided callback @cb will be invoked. The callback must have the
248 * following prototype:
249 *
250 * int callback (MHD_gtls_session_t session, void *userdata,
251 * size_t oprfi_len, const unsigned char *in_oprfi,
252 * unsigned char *out_oprfi);
253 *
254 * The callback can inspect the client-provided data in the input
255 * parameters, and specify its own opaque prf input data in the output
256 * variable. The function must return 0 on success, otherwise the
257 * handshake will be aborted.
258 **/
259void
260MHD_gtls_oprfi_enable_server (MHD_gtls_session_t session,
261 MHD_gnutls_oprfi_callback_func cb,
262 void *userdata)
263{
264 session->security_parameters.extensions.oprfi_cb = cb;
265 session->security_parameters.extensions.oprfi_userdata = userdata;
266}