PolarSSL
|
Public Attributes | |
int | state |
int | major_ver |
int | minor_ver |
int | max_major_ver |
int | max_minor_ver |
int(* | f_rng )(void *) |
void(* | f_dbg )(void *, int, const char *) |
int(* | f_recv )(void *, unsigned char *, int) |
int(* | f_send )(void *, unsigned char *, int) |
void * | p_rng |
void * | p_dbg |
void * | p_recv |
void * | p_send |
int | resume |
int | timeout |
ssl_session * | session |
int(* | s_get )(ssl_context *) |
int(* | s_set )(ssl_context *) |
unsigned char * | in_ctr |
unsigned char * | in_hdr |
unsigned char * | in_msg |
unsigned char * | in_offt |
int | in_msgtype |
int | in_msglen |
int | in_left |
int | in_hslen |
int | nb_zero |
unsigned char * | out_ctr |
unsigned char * | out_hdr |
unsigned char * | out_msg |
int | out_msgtype |
int | out_msglen |
int | out_left |
rsa_context * | rsa_key |
x509_cert * | own_cert |
x509_cert * | ca_chain |
x509_crl * | ca_crl |
x509_cert * | peer_cert |
const char * | peer_cn |
int | endpoint |
int | authmode |
int | client_auth |
int | verify_result |
dhm_context | dhm_ctx |
md5_context | fin_md5 |
sha1_context | fin_sha1 |
int | do_crypt |
int * | ciphers |
int | pmslen |
int | keylen |
int | minlen |
int | ivlen |
int | maclen |
unsigned char | randbytes [64] |
unsigned char | premaster [256] |
unsigned char | iv_enc [16] |
unsigned char | iv_dec [16] |
unsigned char | mac_enc [32] |
unsigned char | mac_dec [32] |
unsigned long | ctx_enc [128] |
unsigned long | ctx_dec [128] |
unsigned char * | hostname |
unsigned long | hostname_len |
verification mode
own trusted CA chain
trusted CA CRLs
allowed ciphersuites
flag for client auth.
unsigned long _ssl_context::ctx_dec[128] |
decryption context
unsigned long _ssl_context::ctx_enc[128] |
encryption context
DHM key exchange
en(de)cryption flag
0: client, 1: server
Finished MD5 checksum
Finished SHA-1 checksum
unsigned char* _ssl_context::in_ctr |
64-bit incoming message counter
unsigned char* _ssl_context::in_hdr |
5-byte record header (in_ctr+8)
current handshake message length
amount of data read so far
unsigned char* _ssl_context::in_msg |
the message contents (in_hdr+5)
record header: message length
record header: message type
unsigned char* _ssl_context::in_offt |
read offset in application data
unsigned char _ssl_context::iv_dec[16] |
IV (decryption)
unsigned char _ssl_context::iv_enc[16] |
IV (encryption)
IV length
symmetric key length
unsigned char _ssl_context::mac_dec[32] |
MAC (decryption)
unsigned char _ssl_context::mac_enc[32] |
MAC (encryption)
MAC length
equal to SSL_MAJOR_VERSION_3
max. major version from client
max. minor version from client
min. ciphertext length
either 0 (SSL3) or 1 (TLS1.0)
# of 0-length encrypted messages
unsigned char* _ssl_context::out_ctr |
64-bit outgoing message counter
unsigned char* _ssl_context::out_hdr |
5-byte record header (out_ctr+8)
amount of data not yet written
unsigned char* _ssl_context::out_msg |
the message contents (out_hdr+5)
record header: message length
record header: message type
own X.509 certificate
void* _ssl_context::p_dbg |
context for the debug function
void* _ssl_context::p_recv |
context for reading operations
void* _ssl_context::p_rng |
context for the RNG function
void* _ssl_context::p_send |
context for writing operations
peer X.509 cert chain
const char* _ssl_context::peer_cn |
expected peer CN
premaster length
unsigned char _ssl_context::premaster[256] |
premaster secret
unsigned char _ssl_context::randbytes[64] |
random bytes
session resuming flag
own RSA private key
int(* _ssl_context::s_get)(ssl_context *) |
(server) get callback
int(* _ssl_context::s_set)(ssl_context *) |
(server) set callback
current session data
SSL handshake: current state
sess. expiration time
verification result