Lines Matching defs:mbedtls_ssl_handshake_params
638 struct mbedtls_ssl_handshake_params { struct
641 uint8_t resume; /*!< session resume indicator*/
642 uint8_t cli_exts; /*!< client extension presence*/
645 uint8_t sni_authmode; /*!< authmode from SNI callback */
651 uint8_t certificate_request_sent;
655 uint8_t new_session_ticket; /*!< use NewSessionTicket? */
677 mbedtls_ssl_protocol_version min_tls_version;
681 uint8_t extended_ms; /*!< use Extended Master Secret? */
685 uint8_t async_in_progress; /*!< an asynchronous operation is in progress */
689 unsigned char retransmit_state; /*!< Retransmission state */
693 unsigned char group_list_heap_allocated;
694 unsigned char sig_algs_heap_allocated;
698 uint8_t ecrs_enabled; /*!< Handshake supports EC restart? */
699 enum { /* this complements ssl->state with info on intra-state operations */
705 } ecrs_state; /*!< current (or last) operation */
706 mbedtls_x509_crt *ecrs_peer_cert; /*!< The peer's CRT chain. */
707 size_t ecrs_n; /*!< place for saving a length */
710 mbedtls_ssl_ciphersuite_t const *ciphersuite_info;
713 int (*update_checksum)(mbedtls_ssl_context *, const unsigned char *, size_t);
715 int (*calc_verify)(const mbedtls_ssl_context *, unsigned char *, size_t *);
717 int (*calc_finished)(mbedtls_ssl_context *, unsigned char *, int);
718 mbedtls_ssl_tls_prf_cb *tls_prf;
724 uint8_t key_exchange_mode; /*!< Selected key exchange mode */
727 int hello_retry_request_count;
731 uint16_t hrr_selected_group;
733 uint8_t tls13_kex_modes; /*!< Key exchange modes supported by the client */
736 uint16_t new_session_tickets_count; /*!< number of session tickets */
743 uint16_t received_sig_algs[MBEDTLS_RECEIVED_SIG_ALGS_SIZE];
747 const uint16_t *group_list;
748 const uint16_t *sig_algs;
752 mbedtls_dhm_context dhm_ctx; /*!< DHM key exchange */
762 mbedtls_ecdh_context ecdh_ctx; /*!< ECDH key exchange */
766 psa_key_type_t ecdh_psa_type;
767 size_t ecdh_bits;
768 mbedtls_svc_key_id_t ecdh_psa_privkey;
769 uint8_t ecdh_psa_privkey_is_external;
770 unsigned char ecdh_psa_peerkey[MBEDTLS_PSA_MAX_EC_PUBKEY_LENGTH];
771 size_t ecdh_psa_peerkey_len;
777 psa_pake_operation_t psa_pake_ctx; /*!< EC J-PAKE key exchange */
778 mbedtls_svc_key_id_t psa_pake_password;
779 uint8_t psa_pake_ctx_is_ok;
781 mbedtls_ecjpake_context ecjpake_ctx; /*!< EC J-PAKE key exchange */
784 unsigned char *ecjpake_cache; /*!< Cache for ClientHello ext */
785 size_t ecjpake_cache_len; /*!< Length of cached data */
791 uint16_t *curves_tls_id; /*!< List of TLS IDs of supported elliptic curves */
796 mbedtls_svc_key_id_t psk_opaque; /*!< Opaque PSK from the callback */
797 uint8_t psk_opaque_is_internal;
799 unsigned char *psk; /*!< PSK from the callback */
800 size_t psk_len; /*!< Length of PSK from callback */
802 uint16_t selected_identity;
806 mbedtls_x509_crt_restart_ctx ecrs_ctx; /*!< restart context */
810 mbedtls_ssl_key_cert *key_cert; /*!< chosen key/cert pair (server) */
812 mbedtls_ssl_key_cert *sni_key_cert; /*!< key/cert list from SNI */
813 mbedtls_x509_crt *sni_ca_chain; /*!< trusted CAs from SNI callback */
814 mbedtls_x509_crl *sni_ca_crl; /*!< trusted CAs CRLs from SNI */
820 mbedtls_pk_context peer_pubkey; /*!< The public key from the peer. */
823 struct {
844 } buffering;
849 unsigned char *cookie; /*!< HelloVerifyRequest cookie for DTLS
857 uint8_t cookie_len;
865 uint16_t cookie_len; /*!< DTLS: HelloVerifyRequest cookie length
872 unsigned char cookie_verify_result; /*!< Srv: flag for sending a cookie */
876 unsigned int out_msg_seq; /*!< Outgoing handshake sequence number */
877 unsigned int in_msg_seq; /*!< Incoming handshake sequence number */
879 uint32_t retransmit_timeout; /*!< Current value of timeout */
880 mbedtls_ssl_flight_item *flight; /*!< Current outgoing flight */
881 mbedtls_ssl_flight_item *cur_msg; /*!< Current message in flight */
882 unsigned char *cur_msg_p; /*!< Position in current message */
883 unsigned int in_flight_start_seq; /*!< Minimum message sequence in the
885 mbedtls_ssl_transform *alt_transform_out; /*!< Alternative transform for
887 … unsigned char alt_out_ctr[MBEDTLS_SSL_SEQUENCE_NUMBER_LEN]; /*!< Alternative record epoch/counter
893 uint8_t cid_in_use; /*!< This indicates whether the use of the CID extension
897 unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX]; /*! The peer's CID */
898 uint8_t peer_cid_len; /*!< The length of
902 uint16_t mtu; /*!< Handshake mtu, used to fragment outgoing messages */
910 psa_hash_operation_t fin_sha256_psa;
912 mbedtls_md_context_t fin_sha256;
917 psa_hash_operation_t fin_sha384_psa;
919 mbedtls_md_context_t fin_sha384;
924 uint16_t offered_group_id; /* The NamedGroup value for the group
934 uint8_t client_auth; /*!< used to check if CertificateRequest has been
943 union {
964 } state_local;
968 unsigned char randbytes[MBEDTLS_CLIENT_HELLO_RANDOM_LEN +
972 unsigned char premaster[MBEDTLS_PREMASTER_SIZE];
974 size_t pmslen; /*!< premaster length */
978 uint32_t sent_extensions; /*!< extensions sent by endpoint */
979 uint32_t received_extensions; /*!< extensions received by endpoint */
982 unsigned char certificate_request_context_len;
983 unsigned char *certificate_request_context;
987 mbedtls_ssl_transform *transform_handshake;
988 union {
992 } tls13_master_secrets;
994 mbedtls_ssl_tls13_handshake_secrets tls13_hs_secrets;
997 mbedtls_ssl_transform *transform_earlydata;
1007 void *user_async_ctx;
1011 const unsigned char *sni_name; /*!< raw SNI */
1012 size_t sni_name_len; /*!< raw SNI len */
1014 const mbedtls_x509_crt *dn_hints; /*!< acceptable client cert issuers */