• Home
  • Raw
  • Download

Lines Matching defs:ssl_st

971 struct ssl_st  struct
976 int version;
977 int type; /* SSL_ST_CONNECT or SSL_ST_ACCEPT */
979 const SSL_METHOD *method; /* SSLv3 */
986 BIO *rbio; /* used by SSL_read */
987 BIO *wbio; /* used by SSL_write */
988 BIO *bbio; /* used during session-id reuse to concatenate
991 char *rbio; /* used by SSL_read */
992 char *wbio; /* used by SSL_write */
993 char *bbio;
999 int rwstate;
1002 int in_handshake;
1003 int (*handshake_func)(SSL *);
1013 int server; /* are we the server side? - mostly used by SSL_clear*/
1015 int new_session;/* 1 if we are to use a new session.
1021 int quiet_shutdown;/* don't send shutdown packets */
1022 int shutdown; /* we have shut things down, 0x01 sent, 0x02
1024 int state; /* where we are */
1025 int rstate; /* where we are when reading */
1027 BUF_MEM *init_buf; /* buffer used during init */
1028 void *init_msg; /* pointer to handshake message body, set by ssl3_get_message() */
1029 int init_num; /* amount read/written */
1030 int init_off; /* amount read/written */
1033 unsigned char *packet;
1034 unsigned int packet_length;
1036 struct ssl2_state_st *s2; /* SSLv2 variables */
1037 struct ssl3_state_st *s3; /* SSLv3 variables */
1038 struct dtls1_state_st *d1; /* DTLSv1 variables */
1040 int read_ahead; /* Read as many input bytes as possible
1044 …ack)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg);
1045 void *msg_callback_arg;
1047 int hit; /* reusing a previous session */
1049 X509_VERIFY_PARAM *param;
1062 int mac_flags;
1063 EVP_CIPHER_CTX *enc_read_ctx; /* cryptographic state */
1064 EVP_MD_CTX *read_hash; /* used for mac generation */
1066 COMP_CTX *expand; /* uncompress */
1068 char *expand;
1071 EVP_CIPHER_CTX *enc_write_ctx; /* cryptographic state */
1072 EVP_MD_CTX *write_hash; /* used for mac generation */
1074 COMP_CTX *compress; /* compression */
1076 char *compress;
1083 struct cert_st /* CERT */ *cert;
1087 unsigned int sid_ctx_length;
1088 unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH];
1091 SSL_SESSION *session;
1094 int session_creation_enabled;
1097 GEN_SESSION_CB generate_session_id;
1100 int verify_mode; /* 0 don't care about verify failure.
1102 int (*verify_callback)(int ok,X509_STORE_CTX *ctx); /* fail if callback returns 0 */
1104 void (*info_callback)(const SSL *ssl,int type,int val); /* optional informational callback */
1106 int error; /* error bytes to be written */
1107 int error_code; /* actual code */
1110 KSSL_CTX *kssl_ctx; /* Kerberos 5 context */
1114 unsigned int (*psk_client_callback)(SSL *ssl, const char *hint, char *identity,
1117 unsigned int (*psk_server_callback)(SSL *ssl, const char *identity,
1121 SSL_CTX *ctx;
1124 int debug;
1127 long verify_result;
1128 CRYPTO_EX_DATA ex_data;
1133 int references;
1134 unsigned long options; /* protocol behaviour */
1135 unsigned long mode; /* API behaviour */
1136 long max_cert_list;
1137 int first_packet;
1138 int client_version; /* what was passed, used for
1140 unsigned int max_send_fragment;
1143 void (*tlsext_debug_cb)(SSL *s, int client_server, int type,
1146 void *tlsext_debug_arg;
1147 char *tlsext_hostname;
1148 int servername_done; /* no further mod of servername
1155 int tlsext_status_type;
1157 int tlsext_status_expected;
1160 X509_EXTENSIONS *tlsext_ocsp_exts;
1162 unsigned char *tlsext_ocsp_resp;
1163 int tlsext_ocsp_resplen;
1166 int tlsext_ticket_expected;
1168 size_t tlsext_ecpointformatlist_length;
1169 unsigned char *tlsext_ecpointformatlist; /* our list */
1170 size_t tlsext_ellipticcurvelist_length;
1171 unsigned char *tlsext_ellipticcurvelist; /* our list */
1175 void *tlsext_opaque_prf_input;
1176 size_t tlsext_opaque_prf_input_len;
1179 TLS_SESSION_TICKET_EXT *tlsext_session_ticket;
1182 tls_session_ticket_ext_cb_fn tls_session_ticket_ext_cb;
1183 void *tls_session_ticket_ext_cb_arg;
1186 tls_session_secret_cb_fn tls_session_secret_cb;
1187 void *tls_session_secret_cb_arg;
1189 SSL_CTX * initial_ctx; /* initial ctx, used to store sessions */