|
PolarSSL
|
Public Attributes | |
| int | state |
| int | major_ver |
| int | minor_ver |
| int | max_major_ver |
| int | max_minor_ver |
| int(* | f_rng )(void *) |
| void(* | f_dbg )(void *, int, const char *) |
| int(* | f_recv )(void *, unsigned char *, int) |
| int(* | f_send )(void *, unsigned char *, int) |
| void * | p_rng |
| void * | p_dbg |
| void * | p_recv |
| void * | p_send |
| int | resume |
| int | timeout |
| ssl_session * | session |
| int(* | s_get )(ssl_context *) |
| int(* | s_set )(ssl_context *) |
| unsigned char * | in_ctr |
| unsigned char * | in_hdr |
| unsigned char * | in_msg |
| unsigned char * | in_offt |
| int | in_msgtype |
| int | in_msglen |
| int | in_left |
| int | in_hslen |
| int | nb_zero |
| unsigned char * | out_ctr |
| unsigned char * | out_hdr |
| unsigned char * | out_msg |
| int | out_msgtype |
| int | out_msglen |
| int | out_left |
| rsa_context * | rsa_key |
| x509_cert * | own_cert |
| x509_cert * | ca_chain |
| x509_crl * | ca_crl |
| x509_cert * | peer_cert |
| const char * | peer_cn |
| int | endpoint |
| int | authmode |
| int | client_auth |
| int | verify_result |
| dhm_context | dhm_ctx |
| md5_context | fin_md5 |
| sha1_context | fin_sha1 |
| int | do_crypt |
| int * | ciphers |
| int | pmslen |
| int | keylen |
| int | minlen |
| int | ivlen |
| int | maclen |
| unsigned char | randbytes [64] |
| unsigned char | premaster [256] |
| unsigned char | iv_enc [16] |
| unsigned char | iv_dec [16] |
| unsigned char | mac_enc [32] |
| unsigned char | mac_dec [32] |
| unsigned long | ctx_enc [128] |
| unsigned long | ctx_dec [128] |
| unsigned char * | hostname |
| unsigned long | hostname_len |
verification mode
own trusted CA chain
trusted CA CRLs
allowed ciphersuites
flag for client auth.
| unsigned long _ssl_context::ctx_dec[128] |
decryption context
| unsigned long _ssl_context::ctx_enc[128] |
encryption context
DHM key exchange
en(de)cryption flag
0: client, 1: server
Finished MD5 checksum
Finished SHA-1 checksum
| unsigned char* _ssl_context::in_ctr |
64-bit incoming message counter
| unsigned char* _ssl_context::in_hdr |
5-byte record header (in_ctr+8)
current handshake message length
amount of data read so far
| unsigned char* _ssl_context::in_msg |
the message contents (in_hdr+5)
record header: message length
record header: message type
| unsigned char* _ssl_context::in_offt |
read offset in application data
| unsigned char _ssl_context::iv_dec[16] |
IV (decryption)
| unsigned char _ssl_context::iv_enc[16] |
IV (encryption)
IV length
symmetric key length
| unsigned char _ssl_context::mac_dec[32] |
MAC (decryption)
| unsigned char _ssl_context::mac_enc[32] |
MAC (encryption)
MAC length
equal to SSL_MAJOR_VERSION_3
max. major version from client
max. minor version from client
min. ciphertext length
either 0 (SSL3) or 1 (TLS1.0)
# of 0-length encrypted messages
| unsigned char* _ssl_context::out_ctr |
64-bit outgoing message counter
| unsigned char* _ssl_context::out_hdr |
5-byte record header (out_ctr+8)
amount of data not yet written
| unsigned char* _ssl_context::out_msg |
the message contents (out_hdr+5)
record header: message length
record header: message type
own X.509 certificate
| void* _ssl_context::p_dbg |
context for the debug function
| void* _ssl_context::p_recv |
context for reading operations
| void* _ssl_context::p_rng |
context for the RNG function
| void* _ssl_context::p_send |
context for writing operations
peer X.509 cert chain
| const char* _ssl_context::peer_cn |
expected peer CN
premaster length
| unsigned char _ssl_context::premaster[256] |
premaster secret
| unsigned char _ssl_context::randbytes[64] |
random bytes
session resuming flag
own RSA private key
| int(* _ssl_context::s_get)(ssl_context *) |
(server) get callback
| int(* _ssl_context::s_set)(ssl_context *) |
(server) set callback
current session data
SSL handshake: current state
sess. expiration time
verification result
1.7.3