Index: ChangeLog
==================================================================
--- ChangeLog
+++ ChangeLog
@@ -1,5 +1,26 @@
+2003-05-15  Dan Razzell	<research@starfishsystems.ca>
+
+	* tls.tcl:
+	* tlsInt.h:
+	* tls.c: add support for binding a password callback to the socket.
+	Now each socket can have its own command and password callbacks instead
+	of being forced to have all password management pass through a common
+	procedure.  The common password procedure is retained for compatibility
+	but its use should be DEPRECATED.
+	Add version command to return OpenSSL version string.
+	Remove unstable workarounds needed for verify in obsolete versions of
+	OpenSSL.
+	Fix memory leak. [Request #640660]
+	More casts to eliminate compiler warnings.
+
+	* tls.htm: document password callback.
+	Correct technical and typographic errors.
+
+	* README.txt: identify versions of OpenSSL which fix known problems.
+	General warning of security problems in older versions of OpenSSL.
+
 2002-02-04  Jeff Hobbs  <jeffh@ActiveState.com>
 
 	* tls.htm:
 	* tls.c: added support for local certificate status check, as well
 	as returning the # of bits in the session key. [Patch #505698] (rose)

Index: README.txt
==================================================================
--- README.txt
+++ README.txt
@@ -1,9 +1,9 @@
 Copyright (C) 1997-2000 Matt Newman <matt@novadigm.com>
 TLS 1.4.1 Copyright (C) 2000 Ajuba Solutions
 
-$Header: /home/rkeene/tmp/cvs2fossil/../tcltls/tls/tls/README.txt,v 1.3 2001/06/21 23:34:20 hobbs Exp $
+$Header: /home/rkeene/tmp/cvs2fossil/../tcltls/tls/tls/README.txt,v 1.4 2003/05/15 20:44:46 razzell Exp $
 
 TLS (aka SSL) Channel - can be layered on any bi-directional Tcl_Channel.
 
 Both client and server-side sockets are possible, and this code should work
 on any platform as it uses a generic mechanism for layering on SSL and Tcl.
@@ -19,11 +19,15 @@
 <jeff@hobbs.org>.
 
 Full filevent sematics should also be intact - see tests directory for
 blocking and non-blocking examples.
 
-This was built (almost) from scratch based upon observation of OpenSSL 0.9.2B
+This was built (almost) from scratch based upon observation of OpenSSL 0.9.2b.
+For correct functioning, use OpenSSL 0.9.6g or later.  This release contains
+important fixes to memory management, as well as incorporating the verify
+callback correction which appeared in OpenSSL 0.9.6c.  For best security, use
+the latest official release of OpenSSL.
 
 Addition credit is due for Andreas Kupries (a.kupries@westend.com), for
 providing the Tcl_ReplaceChannel mechanism and working closely with me
 to enhance it to support full fileevent semantics.
 

Index: tls.c
==================================================================
--- tls.c
+++ tls.c
@@ -1,12 +1,13 @@
 /*
  * Copyright (C) 1997-1999 Matt Newman <matt@novadigm.com>
  * some modifications:
  *	Copyright (C) 2000 Ajuba Solutions
  *	Copyright (C) 2002 ActiveState Corporation
+ *	Copyright (C) 2003 Starfish Systems
  *
- * $Header: /home/rkeene/tmp/cvs2fossil/../tcltls/tls/tls/tls.c,v 1.14 2002/02/04 22:46:31 hobbs Exp $
+ * $Header: /home/rkeene/tmp/cvs2fossil/../tcltls/tls/tls/tls.c,v 1.15 2003/05/15 20:44:46 razzell Exp $
  *
  * TLS (aka SSL) Channel - can be layered on any bi-directional
  * Tcl_Channel (Note: Requires Trf Core Patch)
  *
  * This was built (almost) from scratch based upon observation of
@@ -48,11 +49,15 @@
 static int	ImportObjCmd _ANSI_ARGS_ ((ClientData clientData,
 			Tcl_Interp *interp, int objc, Tcl_Obj *CONST objv[]));
 
 static int	StatusObjCmd _ANSI_ARGS_ ((ClientData clientData,
 			Tcl_Interp *interp, int objc, Tcl_Obj *CONST objv[]));
-static SSL_CTX *CTX_Init _ANSI_ARGS_((Tcl_Interp *interp, int proto, char *key,
+
+static int	VersionObjCmd _ANSI_ARGS_ ((ClientData clientData,
+			Tcl_Interp *interp, int objc, Tcl_Obj *CONST objv[]));
+
+static SSL_CTX *CTX_Init _ANSI_ARGS_((State *statePtr, int proto, char *key,
 			char *cert, char *CAdir, char *CAfile, char *ciphers));
 
 #define TLS_PROTO_SSL2	0x01
 #define TLS_PROTO_SSL3	0x02
 #define TLS_PROTO_TLS1	0x04
@@ -170,11 +175,10 @@
 	else if (where & SSL_CB_LOOP)		minor = "loop";
 	else if (where & SSL_CB_EXIT)		minor = "exit";
 	else					minor = "unknown";
     }
 
-
     Tcl_ListObjAppendElement( statePtr->interp, cmdPtr, 
 	    Tcl_NewStringObj( "info", -1));
 
     Tcl_ListObjAppendElement( statePtr->interp, cmdPtr, 
 	    Tcl_NewStringObj( Tcl_GetChannelName(statePtr->self), -1) );
@@ -187,11 +191,11 @@
 
     if (where & (SSL_CB_LOOP|SSL_CB_EXIT)) {
 	Tcl_ListObjAppendElement( statePtr->interp, cmdPtr,
 	    Tcl_NewStringObj( SSL_state_string_long(ssl), -1) );
     } else if (where & SSL_CB_ALERT) {
-	char *cp = SSL_alert_desc_string_long(ret);
+	char *cp = (char *) SSL_alert_desc_string_long(ret);
 
 	Tcl_ListObjAppendElement( statePtr->interp, cmdPtr,
 	    Tcl_NewStringObj( cp, -1) );
     } else {
 	Tcl_ListObjAppendElement( statePtr->interp, cmdPtr,
@@ -358,13 +362,13 @@
 /*
  *-------------------------------------------------------------------
  *
  * PasswordCallback -- 
  *
- *	Called when a password is needed to unpack RSA and PEM keys
- *	Evals the tcl proc:  tls::password and returns the result as
- *	the password
+ *	Called when a password is needed to unpack RSA and PEM keys.
+ *	Evals any bound password script and returns the result as
+ *	the password string.
  *-------------------------------------------------------------------
  */
 #ifdef PRE_OPENSSL_0_9_4
 /*
  * No way to handle user-data therefore no way without a global
@@ -377,14 +381,42 @@
 }
 #else
 static int
 PasswordCallback(char *buf, int size, int verify, void *udata)
 {
-    Tcl_Interp *interp = (Tcl_Interp*)udata;
+    State *statePtr	= (State *) udata;
+    Tcl_Interp *interp	= statePtr->interp;
+    Tcl_Obj *cmdPtr;
+    int result;
 
-    if (Tcl_Eval(interp, "tls::password") == TCL_OK) {
-	CONST char *ret = Tcl_GetStringResult(interp);
+    if (statePtr->password == NULL) {
+	if (Tcl_Eval(interp, "tls::password") == TCL_OK) {
+	    char *ret = (char *) Tcl_GetStringResult(interp);
+            strncpy(buf, ret, size);
+	    return strlen(ret);
+	} else {
+	    return -1;
+	}
+    }
+
+    cmdPtr = Tcl_DuplicateObj(statePtr->password);
+
+    Tcl_Preserve((ClientData) statePtr->interp);
+    Tcl_Preserve((ClientData) statePtr);
+
+    Tcl_IncrRefCount(cmdPtr);
+    result = Tcl_GlobalEvalObj(interp, cmdPtr);
+    if (result != TCL_OK) {
+	Tcl_BackgroundError(statePtr->interp);
+    }
+    Tcl_DecrRefCount(cmdPtr);
+
+    Tcl_Release((ClientData) statePtr);
+    Tcl_Release((ClientData) statePtr->interp);
+
+    if (result == TCL_OK) {
+	char *ret = (char *) Tcl_GetStringResult(interp);
         strncpy(buf, ret, size);
 	return strlen(ret);
     } else {
 	return -1;
     }
@@ -606,10 +638,11 @@
 {
     Tcl_Channel chan;		/* The channel to set a mode on. */
     State *statePtr;		/* client state for ssl socket */
     SSL_CTX *ctx	= NULL;
     Tcl_Obj *script	= NULL;
+    Tcl_Obj *password	= NULL;
     int idx;
     int flags		= TLS_TCL_INIT;
     int server		= 0;	/* is connection incoming or outgoing? */
     char *key		= NULL;
     char *cert		= NULL;
@@ -655,26 +688,27 @@
 	char *opt = Tcl_GetStringFromObj(objv[idx], NULL);
 
 	if (opt[0] != '-')
 	    break;
 
-	OPTSTR( "-cafile", CAfile);
 	OPTSTR( "-cadir", CAdir);
+	OPTSTR( "-cafile", CAfile);
 	OPTSTR( "-certfile", cert);
 	OPTSTR( "-cipher", ciphers);
 	OPTOBJ( "-command", script);
 	OPTSTR( "-keyfile", key);
 	OPTSTR( "-model", model);
+	OPTOBJ( "-password", password);
 	OPTBOOL( "-require", require);
 	OPTBOOL( "-request", request);
 	OPTBOOL( "-server", server);
 
 	OPTBOOL( "-ssl2", ssl2);
 	OPTBOOL( "-ssl3", ssl3);
 	OPTBOOL( "-tls1", tls1);
 
-	OPTBAD( "option", "-cafile, -cadir, -certfile, -cipher, -command, -keyfile, -model, -require, -request, -ssl2, -ssl3, -server, or -tls1");
+	OPTBAD( "option", "-cadir, -cafile, -certfile, -cipher, -command, -keyfile, -model, -password, -require, -request, -server, -ssl2, -ssl3, or -tls1");
 
 	return TCL_ERROR;
     }
     if (request)            verify |= SSL_VERIFY_CLIENT_ONCE | SSL_VERIFY_PEER;
     if (request && require) verify |= SSL_VERIFY_FAIL_IF_NO_PEER_CERT;
@@ -689,37 +723,10 @@
     if (key && !*key)		key	= NULL;
     if (ciphers && !*ciphers)	ciphers	= NULL;
     if (CAfile && !*CAfile)	CAfile	= NULL;
     if (CAdir && !*CAdir)	CAdir	= NULL;
 
-    if (model != NULL) {
-	int mode;
-	/* Get the "model" context */
-	chan = Tcl_GetChannel(interp, model, &mode);
-	if (chan == (Tcl_Channel) NULL) {
-	    return TCL_ERROR;
-	}
-	if (channelTypeVersion == TLS_CHANNEL_VERSION_2) {
-	    /*
-	     * Make sure to operate on the topmost channel
-	     */
-	    chan = Tcl_GetTopChannel(chan);
-	}
-	if (Tcl_GetChannelType(chan) != Tls_ChannelType()) {
-	    Tcl_AppendResult(interp, "bad channel \"",
-		    Tcl_GetChannelName(chan), "\": not a TLS channel", NULL);
-	    return TCL_ERROR;
-	}
-	statePtr = (State *) Tcl_GetChannelInstanceData(chan);
-	ctx = statePtr->ctx;
-    } else {
-	if ((ctx = CTX_Init(interp, proto, key, cert, CAdir, CAfile, ciphers))
-	    == (SSL_CTX*)0) {
-	    return TCL_ERROR;
-	}
-    }
-
     /* new SSL state */
     statePtr		= (State *) Tcl_Alloc((unsigned) sizeof(State));
     statePtr->self	= (Tcl_Channel)NULL;
     statePtr->timer	= (Tcl_TimerToken)NULL;
 
@@ -727,18 +734,68 @@
     statePtr->watchMask	= 0;
     statePtr->mode	= 0;
 
     statePtr->interp	= interp;
     statePtr->callback	= (Tcl_Obj *)0;
+    statePtr->password	= (Tcl_Obj *)0;
 
     statePtr->vflags	= verify;
     statePtr->ssl	= (SSL*)0;
-    statePtr->ctx	= ctx;
+    statePtr->ctx	= (SSL_CTX*)0;
     statePtr->bio	= (BIO*)0;
     statePtr->p_bio	= (BIO*)0;
 
     statePtr->err	= "";
+
+    /* allocate script */
+    if (script) {
+	char *tmp = Tcl_GetStringFromObj(script, NULL);
+	if (tmp && *tmp) {
+	    statePtr->callback = Tcl_DuplicateObj(script);
+	    Tcl_IncrRefCount(statePtr->callback);
+	}
+    }
+
+    /* allocate password */
+    if (password) {
+	char *tmp = Tcl_GetStringFromObj(password, NULL);
+	if (tmp && *tmp) {
+	    statePtr->password = Tcl_DuplicateObj(password);
+	    Tcl_IncrRefCount(statePtr->password);
+	}
+    }
+
+    if (model != NULL) {
+	int mode;
+	/* Get the "model" context */
+	chan = Tcl_GetChannel(interp, model, &mode);
+	if (chan == (Tcl_Channel) NULL) {
+	    Tls_Free((char *) statePtr);
+	    return TCL_ERROR;
+	}
+	if (channelTypeVersion == TLS_CHANNEL_VERSION_2) {
+	    /*
+	     * Make sure to operate on the topmost channel
+	     */
+	    chan = Tcl_GetTopChannel(chan);
+	}
+	if (Tcl_GetChannelType(chan) != Tls_ChannelType()) {
+	    Tcl_AppendResult(interp, "bad channel \"",
+		    Tcl_GetChannelName(chan), "\": not a TLS channel", NULL);
+	    Tls_Free((char *) statePtr);
+	    return TCL_ERROR;
+	}
+	ctx = ((State *)Tcl_GetChannelInstanceData(chan))->ctx;
+    } else {
+	if ((ctx = CTX_Init(statePtr, proto, key, cert, CAdir, CAfile, ciphers))
+	    == (SSL_CTX*)0) {
+	    Tls_Free((char *) statePtr);
+	    return TCL_ERROR;
+	}
+    }
+
+    statePtr->ctx = ctx;
 
     /*
      * We need to make sure that the channel works in binary (for the
      * encryption not to get goofed up).
      * We only want to adjust the buffering in pre-v2 channels, where
@@ -763,24 +820,10 @@
 	 */
 	Tls_Free((char *) statePtr);
         return TCL_ERROR;
     }
 
-    /* allocate script */
-    if (script) {
-	char *tmp = Tcl_GetStringFromObj(script, NULL);
-	if (tmp && *tmp) {
-	    statePtr->callback = Tcl_DuplicateObj(script);
-	    Tcl_IncrRefCount(statePtr->callback);
-	}
-    }
-    /* This is only needed because of a bug in OpenSSL, where the
-     * ssl->verify_callback is not referenced!!! (Must be done
-     * *before* SSL_new() is called!
-     */
-    SSL_CTX_set_verify(statePtr->ctx, verify, VerifyCallback);
-
     /*
      * SSL Initialization
      */
 
     statePtr->ssl = SSL_new(statePtr->ctx);
@@ -796,15 +839,11 @@
      * SSL Callbacks
      */
 
     SSL_set_app_data(statePtr->ssl, (VOID *)statePtr);	/* point back to us */
 
-    /*
-     * The following is broken - we need is to set the
-     * verify_mode, but the library ignores the verify_callback!!!
-     */
-    /*SSL_set_verify(statePtr->ssl, verify, VerifyCallback);*/
+    SSL_set_verify(statePtr->ssl, verify, VerifyCallback);
 
     SSL_CTX_set_info_callback(statePtr->ctx, InfoCallback);
 
     /* Create Tcl_Channel BIO Handler */
     statePtr->p_bio	= BIO_new_tcl(statePtr, BIO_CLOSE);
@@ -840,19 +879,20 @@
  *
  *-------------------------------------------------------------------
  */
 
 static SSL_CTX *
-CTX_Init(interp, proto, key, cert, CAdir, CAfile, ciphers)
-    Tcl_Interp *interp;
+CTX_Init(statePtr, proto, key, cert, CAdir, CAfile, ciphers)
+    State *statePtr;
     int proto;
     char *key;
     char *cert;
     char *CAdir;
     char *CAfile;
     char *ciphers;
 {
+    Tcl_Interp *interp = statePtr->interp;
     SSL_CTX *ctx = NULL;
     Tcl_DString ds;
     Tcl_DString ds1;
     int off = 0;
 
@@ -897,11 +937,11 @@
 
     /* set some callbacks */
     SSL_CTX_set_default_passwd_cb(ctx, PasswordCallback);
 
 #ifndef BSAFE
-    SSL_CTX_set_default_passwd_cb_userdata(ctx, (void *)interp);
+    SSL_CTX_set_default_passwd_cb_userdata(ctx, (void *)statePtr);
 #endif
 
 #ifndef NO_DH
     {
 	DH* dh = get_dh512();
@@ -928,10 +968,12 @@
         if (key == NULL) key=cert;
 
         if (SSL_CTX_use_PrivateKey_file(ctx, F2N( key, &ds),
 					SSL_FILETYPE_PEM) <= 0) {
 	    Tcl_DStringFree(&ds);
+	    /* flush the passphrase which might be left in the result */
+	    Tcl_SetResult(interp, NULL, TCL_STATIC);
             Tcl_AppendResult(interp,
                              "unable to set public key file ", key, " ",
                              REASON(), (char *) NULL);
             SSL_CTX_free(ctx);
             return (SSL_CTX *)0;
@@ -1050,11 +1092,12 @@
 	objPtr = Tls_NewX509Obj(interp, peer);
     } else {
 	objPtr = Tcl_NewListObj(0, NULL);
     }
 
-    Tcl_ListObjAppendElement (interp, objPtr, Tcl_NewStringObj ("sbits", -1));
+    Tcl_ListObjAppendElement (interp, objPtr,
+	    Tcl_NewStringObj ("sbits", -1));
     Tcl_ListObjAppendElement (interp, objPtr,
 	    Tcl_NewIntObj (SSL_get_cipher_bits (statePtr->ssl, NULL)));
 
     ciphers = (char*)SSL_get_cipher(statePtr->ssl);
     if (ciphers != NULL && strcmp(ciphers, "(NONE)")!=0) {
@@ -1064,10 +1107,38 @@
 		Tcl_NewStringObj(SSL_get_cipher(statePtr->ssl), -1));
     }
     Tcl_SetObjResult( interp, objPtr);
     return TCL_OK;
 }
+
+/*
+ *-------------------------------------------------------------------
+ *
+ * VersionObjCmd -- return version string from OpenSSL.
+ *
+ * Results:
+ *	A standard Tcl result.
+ *
+ * Side effects:
+ *	None.
+ *
+ *-------------------------------------------------------------------
+ */
+static int
+VersionObjCmd(clientData, interp, objc, objv)
+    ClientData clientData;	/* Not used. */
+    Tcl_Interp *interp;
+    int objc;
+    Tcl_Obj	*CONST objv[];
+{
+    Tcl_Obj *objPtr;
+
+    objPtr = Tcl_NewStringObj(OPENSSL_VERSION_TEXT, -1);
+
+    Tcl_SetObjResult(interp, objPtr);
+    return TCL_OK;
+}
 
 /*
  *-------------------------------------------------------------------
  *
  * Tls_Free --
@@ -1124,14 +1195,22 @@
 
     if (statePtr->ssl) {
 	SSL_shutdown(statePtr->ssl);
 	SSL_free(statePtr->ssl);
 	statePtr->ssl = NULL;
+    }
+    if (statePtr->ctx) {
+	SSL_CTX_free(statePtr->ctx);
+	statePtr->ctx = NULL;
     }
     if (statePtr->callback) {
 	Tcl_DecrRefCount(statePtr->callback);
 	statePtr->callback = NULL;
+    }
+    if (statePtr->password) {
+	Tcl_DecrRefCount(statePtr->password);
+	statePtr->password = NULL;
     }
 }
 
 /*
  *-------------------------------------------------------------------
@@ -1221,10 +1300,13 @@
     Tcl_CreateObjCommand(interp, "tls::import", ImportObjCmd,
 	    (ClientData) 0, (Tcl_CmdDeleteProc *) NULL);
 
     Tcl_CreateObjCommand(interp, "tls::status", StatusObjCmd,
 	    (ClientData) 0, (Tcl_CmdDeleteProc *) NULL);
+
+    Tcl_CreateObjCommand(interp, "tls::version", VersionObjCmd,
+	    (ClientData) 0, (Tcl_CmdDeleteProc *) NULL);
 
     return Tcl_PkgProvide(interp, PACKAGE, VERSION);
 }
 
 /*

Index: tls.htm
==================================================================
--- tls.htm
+++ tls.htm
@@ -1,269 +1,309 @@
-<html>
-
-<head>
-<meta http-equiv="Content-Type"
-content="text/html; charset=iso-8859-1">
-<meta name="Author"
-content="Matt Newman &lt;matt@novadigm.com&gt;">
-<meta name="Copyright" content="1999 Matt Newman.">
-<meta name="GENERATOR" content="Microsoft FrontPage Express 2.0">
-<title>TLS (SSL) Tcl Commands</title>
-</head>
-
-<body bgcolor="#FFFFFF">
-
-<dl>
-    <dd><a href="#NAME">NAME</a> <dl>
-            <dd><strong>tls</strong> - binding to <strong>OpenSSL</strong>
-                toolkit.</dd>
-        </dl>
-    </dd>
-    <dd><a href="#SYNOPSIS">SYNOPSIS</a> </dd>
-    <dd><dl>
-            <dd><b>package require Tcl </b><em>?8.2?</em></dd>
-            <dd><b>package require tls </b><em>?1.4?</em></dd>
-            <dt>&nbsp;</dt>
-            <dd><b>tls::init </b><i>?options?</i> </dd>
-            <dd><b>tls::socket </b><em>?options? host port</em></dd>
-            <dd><b>tls::socket</b><em> ?-server command?
-                ?options? port</em></dd>
-            <dd><b>tls::handshake</b><em> channel</em></dd>
-            <dd><b>tls::status </b><em>?-local? channel</em></dd>
-            <dd><b>tls::import</b><em> channel ?options?</em></dd>
-            <dd><b>tls::ciphers </b><em>protocol ?verbose?</em></dd>
-        </dl>
-    </dd>
-    <dd><a href="#COMMANDS">COMMANDS</a></dd>
-    <dd><a href="#CONFIGURATION OPTIONS">CONFIGURATION OPTIONS</a></dd>
-    <dd><a href="#HTTPS EXAMPLE">HTTPS EXAMPLE</a></dd>
-    <dd><a href="#SEE ALSO">SPECIAL CONSIDERATIONS</a></dd>
-    <dd><a href="#SEE ALSO">SEE ALSO</a></dd>
-</dl>
-
-<hr>
-
-<h3><a name="NAME">NAME</a></h3>
-
-<p><strong>tls</strong> - binding to <strong>OpenSSL</strong>
-toolkit.</p>
-
-<h3><a name="SYNOPSIS">SYNOPSIS</a></h3>
-
-<p><b>package require Tcl 8.2</b><br>
-<b>package require tls 1.4</b><br>
-<br>
-<a href="#tls::init"><b>tls::init </b><i>?options?</i><br>
-</a><a href="#tls::socket"><b>tls::socket </b><em>?options? host
-port</em><br>
-<b>tls::socket</b><em> ?-server command? ?options? port</em><br>
-</a><a href="#tls::status"><b>tls::status </b><em>?-local? channel</em><br>
-</a><a href="#tls::handshake"><b>tls::handshake</b><em> channel</em></a><br>
-<br>
-<a href="#tls::import"><b>tls::import </b><i>channel ?options?</i></a><br>
-<a href="#tls::ciphers protocol ?verbose?"><strong>tls::ciphers</strong>
-<em>protocol ?verbose?</em></a></p>
-
-<h3><a name="DESCRIPTION">DESCRIPTION</a></h3>
-
-<p>This extension provides a generic binding to <a
-href="http://www.openssl.org/">OpenSSL</a>, utilizing the
-<strong>Tcl_StackChannel</strong>
-API for Tcl 8.2 and higher. The sockets behave exactly the same
-as channels created using Tcl's built-in <strong>socket</strong>
-command with additional options for controlling the SSL session.
-To use TLS with an earlier version of Tcl than 8.2, please obtain
-TLS v1.3.  Please note that there are known limitations with the
-stacked channel implementation prior to 8.3.2, so it is recommended
-that TLS is used with an 8.3.2+ interpreter.  TLS v1.4 will work
-with 8.2+, it is just more stable with 8.3.2+.
-</p>
-
-<h3><a name="COMMANDS">COMMANDS</a></h3>
-
-<p>Typically one would use the <strong>tls::socket </strong>command
-which provides compatibility with the native Tcl <strong>socket</strong>
-command. In such cases <strong>tls::import</strong> should not be
-used directly.</p>
-
-<dl>
-    <dt><a name="tls::init"><b>tls::init </b><i>?options?</i></a></dt>
-    <dd>This routine sets the default options used by <strong>tls::socket</strong>
-        and is <em>optional</em>. If you call <strong>tls::import</strong>
-        directly this routine has no effect. Any of the options
-        that <strong>tls::socket</strong> accepts can be set
-        using this command, though you should limit your options
-        to only TLS related ones.</dd>
-    <dt>&nbsp;</dt>
-    <dt><a name="tls::socket"><b>tls::socket </b><em>?options?
-        host port</em></a></dt>
-    <dt><b>tls::socket</b><em> ?-server command? ?options? port</em></dt>
-    <dd>This is a helper function that utilizes the underlying
-        commands (<strong>tls::import</strong>). It behaves
-        exactly the same as the native Tcl <strong>socket</strong>
-        command except that the options can include any of the
-        applicable <a href="#tls::import"><strong>tls:import</strong></a>
-        options.</dd>
-    <dt>&nbsp;</dt>
-    <dt><a name="tls::handshake"><strong>tls::handshake</strong> <em>channel</em></a></dt>
-    <dd>Forces handshake to take place, and returns 0 if
-        handshake is still in progress (non-blocking), or 1 if
-        the handshake was successful. If the handshake failed
-        this routine will throw an error.</dd>
-    <dt>&nbsp;</dt>
-    <dt><a name="tls::status"><strong>tls::status</strong>
-    <em>?-local? channel</em></a></dt>
-    <dd>Returns the current security status of a SSL channel. The
-        result is a list of key value pairs describing the
-        connected peer. If the result is an empty list then the
-        SSL handshake has not yet completed.
-        If <em>-local</em> is given, then the certificate information
-        is the one used locally.</dd>
-</dl>
-
-<blockquote>
-    <dl>
-        <dt><strong>issuer</strong> <em>dn</em></dt>
-        <dd>The distinguished name (DN) of the certificate
-            issuer.</dd>
-        <dt><strong>subject</strong> <em>dn</em></dt>
-        <dd>The distinguished name (DN) of the certificate
-            subject.</dd>
-        <dt><strong>notBefore</strong> <em>date</em></dt>
-        <dd>The begin date for the validity of the certificate.</dd>
-        <dt><strong>notAfter</strong> <em>date</em></dt>
-        <dd>The expiry date for the certificate.</dd>
-        <dt><strong>serial</strong> <em>n</em></dt>
-        <dd>The serial number of the certificate.</dd>
-        <dt><strong>cipher</strong> <em>cipher</em></dt>
-        <dd>The current cipher in use between the client and
-            server channels.</dd>
-        <dt><strong>sbits</strong> <em>n</em></dt>
-        <dd>The number of bits used for the session key.</dd>
-    </dl>
-</blockquote>
-
-<dl>
-    <dt><a name="tls::import"><b>tls::import </b><i>channel
-        ?options?</i></a></dt>
-    <dd>SSL-enable a regular Tcl channel - it need not be a
-        socket, but must provide bi-directional flow. Also
-        setting session parameters for SSL handshake.</dd>
-</dl>
-
-<blockquote>
-    <dl>
-        <dt><strong>-cafile </strong><em>filename</em></dt>
-        <dd>Provide the CA file.</dd>
-        <dt>-<strong>cadir</strong> <em>dir</em></dt>
-        <dd>Provide the directory containing the CA certificates.</dd>
-        <dt><strong>-certfile</strong> <em>filename</em></dt>
-        <dd>Provide the certificate to use.</dd>
-        <dt><strong>-cipher </strong><em>string</em></dt>
-        <dd>Provide the cipher suites to use. Syntax is as per
-            OpenSSL.</dd>
-        <dt><strong>-command</strong><em> callback</em></dt>
-        <dd>This callback is invoked to pass errors, tracing
-            information and to allow Tcl scripts to perform
-            additional verification of the certificate, which can
-            override the default validation in OpenSSL.</dd>
-        <dt><strong>-keyfile</strong> <em>filename</em></dt>
-        <dd>Provide the private key file. (<strong>default</strong>:
-            value of -certfile)</dd>
-        <dt><strong>-model</strong> <em>channel</em></dt>
-        <dd>This will force this channel to share the same <em><strong>SSL_CTX</strong></em>
-            structure as the specified <em>channel</em>, and
-            therefore share callbacks etc.</dd>
-        <dt><strong>-request </strong><em>bool</em></dt>
-        <dd>Request a certificate from peer during SSL handshake.
-            (<strong>default</strong>: <em>true</em>)</dd>
-        <dt><strong>-require</strong> <em>bool</em></dt>
-        <dd>Require a valid certificate from peer during SSL
-            handshake. If this is set to true then <strong>-request</strong>
-            must also be set to true. (<strong>default</strong>: <em>false</em>)</dd>
-        <dt><strong>-server</strong> <em>bool</em></dt>
-        <dd>Handshake as server if true, else handshake as
-            client.(<strong>default</strong>: <em>false</em>) <em>[Not
-            available to tls::socket]</em></dd>
-        <dt><strong>-ssl2</strong> <em>bool</em></dt>
-        <dd>Enable use of SSL v2. (<strong>default</strong>: <em>true</em>
-            unless -DNO_PATENTS was specified in build)</dd>
-        <dt><strong>-ssl3 </strong><em>bool</em></dt>
-        <dd>Enable use of SSL v3. (<strong>default</strong>: <em>true</em>)</dd>
-        <dt>-<strong>tls1</strong> <em>bool</em></dt>
-        <dd>Enable use of TLS v1. (<strong>default</strong>: <em>false</em>)</dd>
-    </dl>
-</blockquote>
-
-<dl>
-    <dt><a name="tls::ciphers protocol ?verbose?"><strong>tls::ciphers</strong>
-        <em>protocol ?verbose?</em></a></dt>
-    <dd>Returns list of supported ciphers based on the <em>protocol</em>
-        you supply, which must be one of <em>ssl2, ssl3, or tls1</em>.
-        If <em>verbose</em> is specified as true then a verbose,
-        semi-human readable list is returned providing additional
-        information on the nature of the cipher support. In each
-        case the result is a Tcl list.</dd>
-</dl>
-
-<h3><a name="CONFIGURATION OPTIONS">CONFIGURATION OPTIONS</a></h3>
-
-<p>In addition to the options listed above you can set the <strong>tls::debug</strong>
-flag to a non-zero value to see the output from the default
-command callback (<strong>tls::callback</strong>) which shows the
-progression of the SSL handshake. Setting this value to greated
-than 1 will cause the default verify method in <strong>tls::callback</strong>
-to always accept the certificate, even if it is invalid.</p>
-
-<p>In a real-world deployment you should substitute your own
-callback in place of <strong>tls::callback</strong>, via the <em>-command
-</em>option to <strong>tls::socket</strong> or <strong>tls::import</strong>.</p>
-
-<p>When the TLS layer needs to obtain a password, typically for a
-certificate, the software will invoke a Tcl command called <strong>tls::password</strong>,
-which should return a string which represents the password to be
-used. A default implementation is provided, which simply returns<em>
-&quot;secret&quot;</em> - you should redefine this procedure
-after issuing the <em>package require tls</em>.</p>
-
-<h3><a name="HTTPS EXAMPLE">HTTPS EXAMPLE</a></h3>
-
-<p>This example requires a patch to the <strong>http</strong>
-module that ships with Tcl - this patch has been submitted for
-inclusion in Tcl 8.2.1, but is also provided in the tls directory
-if needed. A sample server.pem is provided with the TLS release,
-courtesy of the <strong>OpenSSL</strong> project.</p>
-
-<pre><code>package require http
-package require tls
-
-http::register https 443 [list ::tls::socket -require 1 -cafile ./server.pem]
-
-set tok [http::geturl https://developer.netscape.com/]
-</code></pre>
-
-<h3><a name="SPECIAL CONSIDERATIONS">SPECIAL CONSIDERATIONS</a></h3>
-
-<p>The capabilities of this package can vary enormously based
-upon how your OpenSSL library was configured and built. At the
-most macro-level OpenSSL supports a &quot;no patents&quot; build,
-which disables RSA, IDEA, RC(2,4,5) and SSL2 - if your OpenSSL is
-configured this way then you will need to build TLS with the
--DNO_PATENTS option - and the resultant module will function
-correctly and also support ADH certificate-less encryption,
-however you will be unable to utilize this to speak to normal Web
-Servers, which typically require RSA support. Please see <a
-href="http://www.openssl.org/">http://www.openssl.org/</a> for
-more information on the whole issue of patents and US export
-restrictions. </p>
-
-<h3><a name="SEE ALSO">SEE ALSO</a></h3>
-
-<p><strong>socket</strong>, <strong>fileevent, </strong><a
-href="http://www.openssl.org/"><strong>OpenSSL</strong></a></p>
-
-<hr>
-
-<pre>
-Copyright � 1999 Matt Newman.</pre>
-</body>
-</html>
+<!doctype html public "-//W3C//DTD HTML 4.0 Transitional//EN">
+
+<html>
+
+<head>
+<meta http-equiv="Content-Type"
+content="text/html; charset=iso-8859-1">
+<meta name="Author"
+content="Matt Newman &lt;matt@novadigm.com&gt;">
+<meta name="Copyright" content="1999 Matt Newman.">
+<title>TLS (SSL) Tcl Commands</title>
+</head>
+
+<body bgcolor="#FFFFFF">
+
+<dl>
+    <dd><a href="#NAME">NAME</a> <dl>
+            <dd><strong>tls</strong> - binding to <strong>OpenSSL</strong>
+                toolkit.</dd>
+        </dl>
+    </dd>
+    <dd><a href="#SYNOPSIS">SYNOPSIS</a> </dd>
+    <dd><dl>
+            <dd><b>package require Tcl </b><em>?8.2?</em></dd>
+            <dd><b>package require tls </b><em>?1.4?</em></dd>
+            <dt>&nbsp;</dt>
+            <dd><b>tls::init </b><i>?options?</i> </dd>
+            <dd><b>tls::socket </b><em>?options? host port</em></dd>
+            <dd><b>tls::socket</b><em> ?-server command?
+                ?options? port</em></dd>
+            <dd><b>tls::handshake</b><em> channel</em></dd>
+            <dd><b>tls::status </b><em>?-local? channel</em></dd>
+            <dd><b>tls::import</b><em> channel ?options?</em></dd>
+            <dd><b>tls::ciphers </b><em>protocol ?verbose?</em></dd>
+            <dd><b>tls::version</b></dd>
+        </dl>
+    </dd>
+    <dd><a href="#COMMANDS">COMMANDS</a></dd>
+    <dd><a href="#CALLBACK OPTIONS">CALLBACK OPTIONS</a></dd>
+    <dd><a href="#HTTPS EXAMPLE">HTTPS EXAMPLE</a></dd>
+    <dd><a href="#SEE ALSO">SPECIAL CONSIDERATIONS</a></dd>
+    <dd><a href="#SEE ALSO">SEE ALSO</a></dd>
+</dl>
+
+<hr>
+
+<h3><a name="NAME">NAME</a></h3>
+
+<p><strong>tls</strong> - binding to <strong>OpenSSL</strong>
+toolkit.</p>
+
+<h3><a name="SYNOPSIS">SYNOPSIS</a></h3>
+
+<p><b>package require Tcl 8.2</b><br>
+<b>package require tls 1.4</b><br>
+<br>
+<a href="#tls::init"><b>tls::init </b><i>?options?</i><br>
+</a><a href="#tls::socket"><b>tls::socket </b><em>?options? host
+port</em><br>
+<b>tls::socket</b><em> ?-server command? ?options? port</em><br>
+</a><a href="#tls::status"><b>tls::status </b><em>?-local? channel</em><br>
+</a><a href="#tls::handshake"><b>tls::handshake</b><em> channel</em></a><br>
+<br>
+<a href="#tls::import"><b>tls::import </b><i>channel ?options?</i></a><br>
+<a href="#tls::ciphers protocol ?verbose?"><strong>tls::ciphers</strong>
+<em>protocol ?verbose?</em></a><br>
+<a href="#tls::version"><b>tls::version</b></a>
+</p>
+
+<h3><a name="DESCRIPTION">DESCRIPTION</a></h3>
+
+<p>This extension provides a generic binding to <a
+href="http://www.openssl.org/">OpenSSL</a>, utilizing the
+<strong>Tcl_StackChannel</strong>
+API for Tcl 8.2 and higher. The sockets behave exactly the same
+as channels created using Tcl's built-in <strong>socket</strong>
+command with additional options for controlling the SSL session.
+To use TLS with an earlier version of Tcl than 8.2, please obtain
+TLS v1.3.  Please note that there are known limitations with the
+stacked channel implementation prior to 8.3.2, so it is recommended
+that TLS is used with an 8.3.2+ interpreter.  TLS v1.4 will work
+with 8.2+, it is just more stable with 8.3.2+.
+</p>
+
+<h3><a name="COMMANDS">COMMANDS</a></h3>
+
+<p>Typically one would use the <strong>tls::socket </strong>command
+which provides compatibility with the native Tcl <strong>socket</strong>
+command. In such cases <strong>tls::import</strong> should not be
+used directly.</p>
+
+<dl>
+    <dt><a name="tls::init"><b>tls::init </b><i>?options?</i></a></dt>
+    <dd>This routine sets the default options used by <strong>tls::socket</strong>
+        and is <em>optional</em>. If you call <strong>tls::import</strong>
+        directly this routine has no effect. Any of the options
+        that <strong>tls::socket</strong> accepts can be set
+        using this command, though you should limit your options
+        to only TLS related ones.</dd>
+    <dt>&nbsp;</dt>
+    <dt><a name="tls::socket"><b>tls::socket </b><em>?options?
+        host port</em></a></dt>
+    <dt><b>tls::socket</b><em> ?-server command? ?options? port</em></dt>
+    <dd>This is a helper function that utilizes the underlying
+        commands (<strong>tls::import</strong>). It behaves
+        exactly the same as the native Tcl <strong>socket</strong>
+        command except that the options can include any of the
+        applicable <a href="#tls::import"><strong>tls:import</strong></a>
+        options.</dd>
+    <dt>&nbsp;</dt>
+    <dt><a name="tls::handshake"><strong>tls::handshake</strong> <em>channel</em></a></dt>
+    <dd>Forces handshake to take place, and returns 0 if
+        handshake is still in progress (non-blocking), or 1 if
+        the handshake was successful. If the handshake failed
+        this routine will throw an error.</dd>
+    <dt>&nbsp;</dt>
+    <dt><a name="tls::status"><strong>tls::status</strong>
+    <em>?-local? channel</em></a></dt>
+    <dd>Returns the current security status of a SSL channel. The
+        result is a list of key value pairs describing the
+        connected peer. If the result is an empty list then the
+        SSL handshake has not yet completed.
+        If <em>-local</em> is given, then the certificate information
+        is the one used locally.</dd>
+</dl>
+
+<blockquote>
+    <dl>
+        <dt><strong>issuer</strong> <em>dn</em></dt>
+        <dd>The distinguished name (DN) of the certificate
+            issuer.</dd>
+        <dt><strong>subject</strong> <em>dn</em></dt>
+        <dd>The distinguished name (DN) of the certificate
+            subject.</dd>
+        <dt><strong>notBefore</strong> <em>date</em></dt>
+        <dd>The begin date for the validity of the certificate.</dd>
+        <dt><strong>notAfter</strong> <em>date</em></dt>
+        <dd>The expiry date for the certificate.</dd>
+        <dt><strong>serial</strong> <em>n</em></dt>
+        <dd>The serial number of the certificate.</dd>
+        <dt><strong>cipher</strong> <em>cipher</em></dt>
+        <dd>The current cipher in use between the client and
+            server channels.</dd>
+        <dt><strong>sbits</strong> <em>n</em></dt>
+        <dd>The number of bits used for the session key.</dd>
+    </dl>
+</blockquote>
+
+<dl>
+    <dt><a name="tls::import"><b>tls::import </b><i>channel
+        ?options?</i></a></dt>
+    <dd>SSL-enable a regular Tcl channel - it need not be a
+        socket, but must provide bi-directional flow. Also
+        setting session parameters for SSL handshake.</dd>
+</dl>
+
+<blockquote>
+    <dl>
+        <dt>-<strong>cadir</strong> <em>dir</em></dt>
+        <dd>Provide the directory containing the CA certificates.</dd>
+        <dt><strong>-cafile </strong><em>filename</em></dt>
+        <dd>Provide the CA file.</dd>
+        <dt><strong>-certfile</strong> <em>filename</em></dt>
+        <dd>Provide the certificate to use.</dd>
+        <dt><strong>-cipher </strong><em>string</em></dt>
+        <dd>Provide the cipher suites to use. Syntax is as per
+            OpenSSL.</dd>
+        <dt><strong>-command</strong><em> callback</em></dt>
+        <dd>If specified, this callback will be invoked at several points
+            during the OpenSSL handshake.  It can pass errors and tracing
+            information, and it can allow Tcl scripts to perform
+            their own validation of the certificate in place of the
+            default validation provided by OpenSSL.
+            The callback should return an integer whose interpretation
+            depends on context.
+            <br>
+            See <a href="#CALLBACK OPTIONS">CALLBACK OPTIONS</a> for
+            further discussion.</dd>
+        <dt><strong>-keyfile</strong> <em>filename</em></dt>
+        <dd>Provide the private key file. (<strong>default</strong>:
+            value of -certfile)</dd>
+        <dt><strong>-model</strong> <em>channel</em></dt>
+        <dd>This will force this channel to share the same <em><strong>SSL_CTX</strong></em>
+            structure as the specified <em>channel</em>, and
+            therefore share callbacks etc.</dd>
+        <dt><strong>-password</strong><em> callback</em></dt>
+        <dd>If supplied, this callback will be invoked when OpenSSL needs
+            to obtain a password, typically for a certificate.
+            The callback should return a string which represents the
+            password to be used.
+            <br>
+            See <a href="#CALLBACK OPTIONS">CALLBACK OPTIONS</a> for
+            further discussion.</dd>
+        <dt><strong>-request </strong><em>bool</em></dt>
+        <dd>Request a certificate from peer during SSL handshake.
+            (<strong>default</strong>: <em>true</em>)</dd>
+        <dt><strong>-require</strong> <em>bool</em></dt>
+        <dd>Require a valid certificate from peer during SSL
+            handshake. If this is set to true then <strong>-request</strong>
+            must also be set to true. (<strong>default</strong>: <em>false</em>)</dd>
+        <dt><strong>-server</strong> <em>bool</em></dt>
+        <dd>Handshake as server if true, else handshake as
+            client.(<strong>default</strong>: <em>false</em>)</dd>
+        <dt><strong>-ssl2</strong> <em>bool</em></dt>
+        <dd>Enable use of SSL v2. (<strong>default</strong>: <em>true</em>
+            unless -DNO_PATENTS was specified in build)</dd>
+        <dt><strong>-ssl3 </strong><em>bool</em></dt>
+        <dd>Enable use of SSL v3. (<strong>default</strong>: <em>true</em>)</dd>
+        <dt>-<strong>tls1</strong> <em>bool</em></dt>
+        <dd>Enable use of TLS v1. (<strong>default</strong>: <em>false</em>)</dd>
+    </dl>
+</blockquote>
+
+<dl>
+    <dt><a name="tls::ciphers protocol ?verbose?"><strong>tls::ciphers</strong>
+        <em>protocol ?verbose?</em></a></dt>
+    <dd>Returns list of supported ciphers based on the <em>protocol</em>
+        you supply, which must be one of <em>ssl2, ssl3, or tls1</em>.
+        If <em>verbose</em> is specified as true then a verbose,
+        semi-human readable list is returned providing additional
+        information on the nature of the cipher support. In each
+        case the result is a Tcl list.</dd>
+</dl>
+
+<dl>
+    <dt><a name="tls::version"><strong>tls::version</strong></a></dt>
+    <dd>Returns the version string defined by OpenSSL.</dd>
+</dl>
+
+<h3><a name="CALLBACK OPTIONS">CALLBACK OPTIONS</a></h3>
+
+<p>
+As indicated above, individual channels can be given their own callbacks
+to handle intermediate processing by the OpenSSL library, using the
+<em>-command</em> and <em>-password</em> options passed to either of
+<strong>tls::socket</strong> or <strong>tls::import</strong>.
+</p>
+
+<p>
+Reference implementations of these callbacks are provided in the distribution
+as <strong>tls::callback</strong> and <strong>tls::password</strong>.
+Note that these are <em>sample</em> implementations only.  In a more realistic
+deployment you would substitute your own callbacks, typically by configuring
+the <em>-command</em> and <em>-password</em> options on each channel with
+scripts to be executed when the callbacks are invoked.
+</p>
+
+<p>
+The default behavior when the <em>-command</em> option is not specified is for
+TLS to process the associated library callbacks internally.
+The default behavior when the <em>-password</em> option is not specified is for
+TLS to process the associated library callbacks by attempting to call
+<strong>tls::password</strong>.
+The difference between these two behaviors is a consequence of maintaining
+compatibility with earlier implementations.  The use of implied callbacks
+is not recommended.
+</p>
+
+<p>
+The <strong>tls::debug</strong> variable provides some additional control
+over the default commands.  Its value is zero by default.  Higher values
+produce more diagnostic output.  Setting this value greater than zero
+will also force the default verify method in <strong>tls::callback</strong>
+to accept the certificate, even if it is invalid.
+</p>
+
+<h3><a name="HTTPS EXAMPLE">HTTPS EXAMPLE</a></h3>
+
+<p>This example requires a patch to the <strong>http</strong>
+module that ships with Tcl - this patch has been submitted for
+inclusion in Tcl 8.2.1, but is also provided in the tls directory
+if needed. A sample server.pem is provided with the TLS release,
+courtesy of the <strong>OpenSSL</strong> project.</p>
+
+<pre><code>package require http
+package require tls
+
+http::register https 443 [list ::tls::socket -require 1 -cafile ./server.pem]
+
+set tok [http::geturl https://developer.netscape.com/]
+</code></pre>
+
+<h3><a name="SPECIAL CONSIDERATIONS">SPECIAL CONSIDERATIONS</a></h3>
+
+<p>The capabilities of this package can vary enormously based
+upon how your OpenSSL library was configured and built. At the
+most macro-level OpenSSL supports a &quot;no patents&quot; build,
+which disables RSA, IDEA, RC(2,4,5) and SSL2 - if your OpenSSL is
+configured this way then you will need to build TLS with the
+-DNO_PATENTS option - and the resultant module will function
+correctly and also support ADH certificate-less encryption,
+however you will be unable to utilize this to speak to normal Web
+Servers, which typically require RSA support. Please see <a
+href="http://www.openssl.org/">http://www.openssl.org/</a> for
+more information on the whole issue of patents and US export
+restrictions. </p>
+
+<h3><a name="SEE ALSO">SEE ALSO</a></h3>
+
+<p><strong>socket</strong>, <strong>fileevent, </strong><a
+href="http://www.openssl.org/"><strong>OpenSSL</strong></a></p>
+
+<hr>
+
+<pre>
+Copyright &copy; 1999 Matt Newman.
+</pre>
+</body>
+</html>

Index: tls.tcl
==================================================================
--- tls.tcl
+++ tls.tcl
@@ -1,9 +1,9 @@
 #
 # Copyright (C) 1997-2000 Matt Newman <matt@novadigm.com>
 #
-# $Header: /home/rkeene/tmp/cvs2fossil/../tcltls/tls/tls/tls.tcl,v 1.3 2000/07/27 01:58:18 hobbs Exp $
+# $Header: /home/rkeene/tmp/cvs2fossil/../tcltls/tls/tls/tls.tcl,v 1.4 2003/05/15 20:44:46 razzell Exp $
 #
 namespace eval tls {
     variable logcmd tclLog
     variable debug 0
  
@@ -32,33 +32,34 @@
 	set server 1
 	set callback [lindex $args [expr {$idx+1}]]
 	set args [lreplace $args $idx [expr {$idx+1}]]
 
 	set usage "wrong # args: should be \"tls::socket -server command ?options? port\""
-	set options "-cadir, -cafile, -certfile, -cipher, -keyfile, -myaddr, -request, -require, -ssl2, -ssl3, or -tls1"
+	set options "-cadir, -cafile, -certfile, -cipher, -command, -keyfile, -myaddr, -password, -request, -require, -ssl2, -ssl3, or -tls1"
     } else {
 	set server 0
 
 	set usage "wrong # args: should be \"tls::socket ?options? host port\""
-	set options "-async, -cadir, -cafile, -certfile, -cipher, -keyfile, -myaddr, -myport, -request, -require, -ssl2, -ssl3, or -tls1"
+	set options "-async, -cadir, -cafile, -certfile, -cipher, -command, -keyfile, -myaddr, -myport, -password, -request, -require, -ssl2, -ssl3, or -tls1"
     }
     set argc [llength $args]
     set sopts {}
     set iopts [concat [list -server $server] ${tls::defaults}]	;# Import options
 
     for {set idx 0} {$idx < $argc} {incr idx} {
 	set arg [lindex $args $idx]
 	switch -glob -- $server,$arg {
-	    0,-myport	-
-	    *,-myaddr	{lappend sopts $arg [lindex $args [incr idx]]}
 	    0,-async	{lappend sopts $arg}
-	    *,-cipher	-
+	    0,-myaddr	-
+	    *,-myport	{lappend sopts $arg [lindex $args [incr idx]]}
 	    *,-cadir	-
 	    *,-cafile	-
 	    *,-certfile	-
-	    *,-keyfile	-
+	    *,-cipher	-
 	    *,-command	-
+	    *,-keyfile	-
+	    *,-password	-
 	    *,-request	-
 	    *,-require	-
 	    *,-ssl2	-
 	    *,-ssl3	-
 	    *,-tls1	{lappend iopts $arg [lindex $args [incr idx]]}
@@ -135,13 +136,12 @@
 }
 #
 # Sample callback for hooking: -
 #
 # error
-# info
-# password
 # verify
+# info
 #
 proc tls::callback {option args} {
     variable debug
 
     #log 2 [concat $option $args]
@@ -204,15 +204,17 @@
 	if {$cb(handshake) == "done"} {
 	    return 1
 	}
     }
 }
+
 proc tls::password {} {
     log 0 "TLS/Password: did you forget to set your passwd!"
     # Return the worlds best kept secret password.
     return "secret"
 }
+
 proc tls::log {level msg} {
     variable debug
     variable logcmd
 
     if {$level > $debug || $logcmd == ""} {

Index: tlsInt.h
==================================================================
--- tlsInt.h
+++ tlsInt.h
@@ -1,9 +1,9 @@
 /*
  * Copyright (C) 1997-2000 Matt Newman <matt@novadigm.com>
  *
- * $Header: /home/rkeene/tmp/cvs2fossil/../tcltls/tls/tls/tlsInt.h,v 1.8 2000/08/18 19:17:14 hobbs Exp $
+ * $Header: /home/rkeene/tmp/cvs2fossil/../tcltls/tls/tls/tlsInt.h,v 1.9 2003/05/15 20:44:46 razzell Exp $
  *
  * TLS (aka SSL) Channel - can be layered on any bi-directional
  * Tcl_Channel (Note: Requires Trf Core Patch)
  *
  * This was built from scratch based upon observation of OpenSSL 0.9.2B
@@ -93,10 +93,11 @@
     int watchMask;	/* current WatchProc mask */
     int mode;		/* current mode of parent channel */
 
     Tcl_Interp *interp;	/* interpreter in which this resides */
     Tcl_Obj *callback;	/* script called for tracing, verifying and errors */
+    Tcl_Obj *password;	/* script called for certificate password */
 
     int vflags;		/* verify flags */
     SSL *ssl;		/* Struct for SSL processing */
     SSL_CTX *ctx;	/* SSL Context */
     BIO *bio;		/* Struct for SSL processing */