@@ -1698,14 +1698,19 @@ OPENSSL_EXPORT size_t SSL_get_all_standard_cipher_names(const char **out,
16981698// substituted when a cipher string starts with 'DEFAULT'.
16991699#define SSL_DEFAULT_CIPHER_LIST "ALL "
17001700
1701+
17011702// SSL_CTX_set_strict_cipher_list configures the cipher list for |ctx|,
17021703// evaluating |str| as a cipher string and returning error if |str| contains
1703- // anything meaningless. It returns one on success and zero on failure.
1704+ // anything meaningless. It updates |ctx->cipher_list| with any values in
1705+ // |ctx->tls13_cipher_list|.
1706+ //
1707+ // It returns one on success and zero on failure.
17041708OPENSSL_EXPORT int SSL_CTX_set_strict_cipher_list (SSL_CTX * ctx ,
17051709 const char * str );
17061710
17071711// SSL_CTX_set_cipher_list configures the cipher list for |ctx|, evaluating
1708- // |str| as a cipher string. It returns one on success and zero on failure.
1712+ // |str| as a cipher string. It updates |ctx->cipher_list| with any values in
1713+ // |ctx->tls13_cipher_list|. It returns one on success and zero on failure.
17091714//
17101715// Prefer to use |SSL_CTX_set_strict_cipher_list|. This function tolerates
17111716// garbage inputs, unless an empty cipher list results. However, an empty
@@ -1719,24 +1724,34 @@ OPENSSL_EXPORT int SSL_CTX_set_cipher_list(SSL_CTX *ctx, const char *str);
17191724
17201725// SSL_set_strict_cipher_list configures the cipher list for |ssl|, evaluating
17211726// |str| as a cipher string and returning error if |str| contains anything
1722- // meaningless. It returns one on success and zero on failure.
1727+ // meaningless.
1728+ // It updates the cipher list |ssl->config->cipher_list| with any configured
1729+ // TLS 1.3 cipher suites by first checking |ssl->config->tls13_cipher_list| and
1730+ // otherwise falling back to |ssl->ctx->tls13_cipher_list|.
1731+ //
1732+ // It returns one on success and zero on failure.
17231733OPENSSL_EXPORT int SSL_set_strict_cipher_list (SSL * ssl , const char * str );
17241734
1725- // SSL_CTX_set_ciphersuites configure the available TLSv1.3 ciphersuites for
1726- // |ctx|, evaluating |str| as a cipher string. It returns one on success and
1735+ // SSL_CTX_set_ciphersuites configures the available TLSv1.3 ciphersuites on
1736+ // |ctx|, evaluating |str| as a cipher string. It updates |ctx->cipher_list|
1737+ // with any values in |ctx->tls13_cipher_list|. It returns one on success and
17271738// zero on failure.
17281739OPENSSL_EXPORT int SSL_CTX_set_ciphersuites (SSL_CTX * ctx , const char * str );
17291740
1730- // SSL_set_ciphersuites sets the available TLSv1.3 ciphersuites on an |ssl|,
1731- // returning one on success and zero on failure. In OpenSSL, the only
1732- // difference between |SSL_CTX_set_ciphersuites| and |SSL_set_ciphersuites| is
1733- // that the latter copies the |SSL|'s |cipher_list| to its associated
1734- // |SSL_CONNECTION|. In AWS-LC, we track everything on the |ssl|'s |config| so
1735- // duplication is not necessary.
1741+ // SSL_set_ciphersuites configures the available TLSv1.3 ciphersuites on
1742+ // |ssl|, evaluating |str| as a cipher string. It updates
1743+ // |ssl->config->cipher_list| with any values in
1744+ // |ssl->config->tls13_cipher_list|. It returns one on success and zero on
1745+ // failure.
17361746OPENSSL_EXPORT int SSL_set_ciphersuites (SSL * ssl , const char * str );
17371747
17381748// SSL_set_cipher_list configures the cipher list for |ssl|, evaluating |str| as
1739- // a cipher string. It returns one on success and zero on failure.
1749+ // a cipher string. It updates the cipher list |ssl->config->cipher_list| with
1750+ // any configured TLS 1.3 cipher suites by first checking
1751+ // |ssl->config->tls13_cipher_list| and otherwise falling back to
1752+ // |ssl->ctx->tls13_cipher_list|.
1753+ //
1754+ // It returns one on success and zero on failure.
17401755//
17411756// Prefer to use |SSL_set_strict_cipher_list|. This function tolerates garbage
17421757// inputs, unless an empty cipher list results. However, an empty string which
0 commit comments