Lines Matching defs:ssl_st
1212 struct ssl_st { struct
1217 int version;
1219 const SSL_METHOD *method;
1225 BIO *rbio;
1227 BIO *wbio;
1229 BIO *bbio;
1235 int rwstate;
1236 int (*handshake_func) (SSL *);
1245 int server;
1252 int new_session;
1254 int quiet_shutdown;
1256 int shutdown;
1258 OSSL_STATEM statem;
1259 SSL_EARLY_DATA_STATE early_data_state;
1260 BUF_MEM *init_buf; /* buffer used during init */
1261 void *init_msg; /* pointer to handshake message body, set by
1263 size_t init_num; /* amount read/written */
1264 size_t init_off; /* amount read/written */
1266 struct {
1436 } s3;
1438 struct dtls1_state_st *d1; /* DTLSv1 variables */
1440 void (*msg_callback) (int write_p, int version, int content_type,
1442 void *msg_callback_arg;
1443 int hit; /* reusing a previous session */
1444 X509_VERIFY_PARAM *param;
1446 SSL_DANE dane;
1457 uint32_t mac_flags;
1461 unsigned char early_secret[EVP_MAX_MD_SIZE];
1462 unsigned char handshake_secret[EVP_MAX_MD_SIZE];
1463 unsigned char master_secret[EVP_MAX_MD_SIZE];
1464 unsigned char resumption_master_secret[EVP_MAX_MD_SIZE];
1465 unsigned char client_finished_secret[EVP_MAX_MD_SIZE];
1466 unsigned char server_finished_secret[EVP_MAX_MD_SIZE];
1467 unsigned char server_finished_hash[EVP_MAX_MD_SIZE];
1468 unsigned char handshake_traffic_hash[EVP_MAX_MD_SIZE];
1469 unsigned char client_app_traffic_secret[EVP_MAX_MD_SIZE];
1470 unsigned char server_app_traffic_secret[EVP_MAX_MD_SIZE];
1471 unsigned char exporter_master_secret[EVP_MAX_MD_SIZE];
1472 unsigned char early_exporter_master_secret[EVP_MAX_MD_SIZE];
1473 EVP_CIPHER_CTX *enc_read_ctx; /* cryptographic state */
1474 unsigned char read_iv[EVP_MAX_IV_LENGTH]; /* TLSv1.3 static read IV */
1475 EVP_MD_CTX *read_hash; /* used for mac generation */
1476 COMP_CTX *compress; /* compression */
1477 COMP_CTX *expand; /* uncompress */
1478 EVP_CIPHER_CTX *enc_write_ctx; /* cryptographic state */
1479 unsigned char write_iv[EVP_MAX_IV_LENGTH]; /* TLSv1.3 static write IV */
1480 EVP_MD_CTX *write_hash; /* used for mac generation */
1484 struct cert_st /* CERT */ *cert;
1490 unsigned char cert_verify_hash[EVP_MAX_MD_SIZE];
1491 size_t cert_verify_hash_len;
1494 enum {SSL_HRR_NONE = 0, SSL_HRR_PENDING, SSL_HRR_COMPLETE}
1495 hello_retry_request;
1501 size_t sid_ctx_length;
1502 unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH];
1504 SSL_SESSION *session;
1506 SSL_SESSION *psksession;
1507 unsigned char *psksession_id;
1508 size_t psksession_id_len;
1510 GEN_SESSION_CB generate_session_id;
1515 unsigned char tmp_session_id[SSL_MAX_SSL_SESSION_ID_LENGTH];
1516 size_t tmp_session_id_len;
1522 uint32_t verify_mode;
1524 int (*verify_callback) (int ok, X509_STORE_CTX *ctx);
1526 void (*info_callback) (const SSL *ssl, int type, int val);
1528 int error;
1530 int error_code;
1532 SSL_psk_client_cb_func psk_client_callback;
1533 SSL_psk_server_cb_func psk_server_callback;
1535 SSL_psk_find_session_cb_func psk_find_session_cb;
1536 SSL_psk_use_session_cb_func psk_use_session_cb;
1538 SSL_CTX *ctx;
1541 long verify_result;
1543 CRYPTO_EX_DATA ex_data;
1552 CRYPTO_REF_COUNT references;
1554 uint64_t options;
1556 uint32_t mode;
1557 int min_proto_version;
1558 int max_proto_version;
1559 size_t max_cert_list;
1560 int first_packet;
1565 int client_version;
1570 size_t split_send_fragment;
1575 size_t max_send_fragment;
1577 size_t max_pipelines;
1579 struct {
1683 } ext;
1689 CLIENTHELLO_MSG *clienthello;
1697 int servername_done;
1703 ssl_ct_validation_cb ct_validation_callback;
1705 void *ct_validation_callback_arg;
1712 int scts_parsed;
1714 SSL_CTX *session_ctx; /* initial ctx, used to store sessions */
1719 SRTP_PROTECTION_PROFILE *srtp_profile;
1726 int renegotiate;
1728 int key_update;
1730 SSL_PHA_STATE post_handshake_auth;
1731 int pha_enabled;
1732 uint8_t* pha_context;
1733 size_t pha_context_len;
1734 int certreqs_sent;
1735 EVP_MD_CTX *pha_dgst; /* this is just the digest through ClientFinished */
1739 SRP_CTX srp_ctx;
1745 int (*not_resumable_session_cb) (SSL *ssl, int is_forward_secure);
1746 RECORD_LAYER rlayer;
1748 pem_password_cb *default_passwd_callback;
1750 void *default_passwd_callback_userdata;
1752 ASYNC_JOB *job;
1753 ASYNC_WAIT_CTX *waitctx;
1754 size_t asyncrw;
1760 uint32_t max_early_data;
1765 uint32_t recv_max_early_data;
1772 uint32_t early_data_count;
1775 size_t (*record_padding_cb)(SSL *s, int type, size_t len, void *arg);
1776 void *record_padding_arg;
1777 size_t block_padding;
1779 CRYPTO_RWLOCK *lock;
1782 size_t num_tickets;
1784 size_t sent_tickets;
1786 uint64_t next_ticket_nonce;
1789 SSL_allow_early_data_cb_fn allow_early_data_cb;
1790 void *allow_early_data_cb_data;
1793 SSL_async_callback_fn async_cb;
1794 void *async_cb_arg;
1800 const struct sigalg_lookup_st **shared_sigalgs;
1801 size_t shared_sigalgslen;