|
mbedtls_ssl_sig_hash_set_t | hash_algs |
|
mbedtls_dhm_context | dhm_ctx |
|
mbedtls_ecdh_context | ecdh_ctx |
|
const mbedtls_ecp_curve_info ** | curves |
|
unsigned char * | psk |
|
size_t | psk_len |
|
mbedtls_ssl_key_cert * | key_cert |
|
int | sni_authmode |
|
mbedtls_ssl_key_cert * | sni_key_cert |
|
mbedtls_x509_crt * | sni_ca_chain |
|
mbedtls_x509_crl * | sni_ca_crl |
|
unsigned int | out_msg_seq |
|
unsigned int | in_msg_seq |
|
unsigned char * | verify_cookie |
|
unsigned char | verify_cookie_len |
|
unsigned char * | hs_msg |
|
uint32_t | retransmit_timeout |
|
unsigned char | retransmit_state |
|
mbedtls_ssl_flight_item * | flight |
|
mbedtls_ssl_flight_item * | cur_msg |
|
unsigned int | in_flight_start_seq |
|
mbedtls_ssl_transform * | alt_transform_out |
|
unsigned char | alt_out_ctr [8] |
|
mbedtls_md5_context | fin_md5 |
|
mbedtls_sha1_context | fin_sha1 |
|
mbedtls_sha256_context | fin_sha256 |
|
mbedtls_sha512_context | fin_sha512 |
|
void(* | update_checksum )(mbedtls_ssl_context *, const unsigned char *, size_t) |
|
void(* | calc_verify )(mbedtls_ssl_context *, unsigned char *) |
|
void(* | calc_finished )(mbedtls_ssl_context *, unsigned char *, int) |
|
int(* | tls_prf )(const unsigned char *, size_t, const char *, const unsigned char *, size_t, unsigned char *, size_t) |
|
size_t | pmslen |
|
unsigned char | randbytes [64] |
|
unsigned char | premaster [MBEDTLS_PREMASTER_SIZE] |
|
int | resume |
|
int | max_major_ver |
|
int | max_minor_ver |
|
int | cli_exts |
|
int | new_session_ticket |
|
int | extended_ms |
|
unsigned char mbedtls_ssl_handshake_params::alt_out_ctr[8] |
Alternative record epoch/counter for resending messages
Alternative transform for resending messages
int mbedtls_ssl_handshake_params::cli_exts |
client extension presence
Current message in flight
Supported elliptic curves
int mbedtls_ssl_handshake_params::extended_ms |
use Extended Master Secret?
Set of suitable sig-hash pairs
unsigned char* mbedtls_ssl_handshake_params::hs_msg |
Reassembled handshake message
unsigned int mbedtls_ssl_handshake_params::in_flight_start_seq |
Minimum message sequence in the flight being received
unsigned int mbedtls_ssl_handshake_params::in_msg_seq |
Incoming handshake sequence number
chosen key/cert pair (server)
int mbedtls_ssl_handshake_params::max_major_ver |
max. major version client
int mbedtls_ssl_handshake_params::max_minor_ver |
max. minor version client
int mbedtls_ssl_handshake_params::new_session_ticket |
unsigned int mbedtls_ssl_handshake_params::out_msg_seq |
Outgoing handshake sequence number
size_t mbedtls_ssl_handshake_params::pmslen |
unsigned char mbedtls_ssl_handshake_params::premaster[MBEDTLS_PREMASTER_SIZE] |
unsigned char* mbedtls_ssl_handshake_params::psk |
size_t mbedtls_ssl_handshake_params::psk_len |
Length of PSK from callback
unsigned char mbedtls_ssl_handshake_params::randbytes[64] |
int mbedtls_ssl_handshake_params::resume |
unsigned char mbedtls_ssl_handshake_params::retransmit_state |
uint32_t mbedtls_ssl_handshake_params::retransmit_timeout |
int mbedtls_ssl_handshake_params::sni_authmode |
authmode from SNI callback
trusted CAs from SNI callback
trusted CAs CRLs from SNI
unsigned char* mbedtls_ssl_handshake_params::verify_cookie |
Cli: HelloVerifyRequest cookie Srv: unused
unsigned char mbedtls_ssl_handshake_params::verify_cookie_len |
Cli: cookie length Srv: flag for sending a cookie
The documentation for this struct was generated from the following file:
- external/openthread/include/mbedtls/ssl_internal.h