Lines Matching defs:mbedtls_ssl_handshake_params

641 struct mbedtls_ssl_handshake_params {  struct
644 uint8_t resume; /*!< session resume indicator*/
645 uint8_t cli_exts; /*!< client extension presence*/
648 uint8_t sni_authmode; /*!< authmode from SNI callback */
654 uint8_t certificate_request_sent;
657 uint8_t early_data_accepted;
662 uint8_t new_session_ticket; /*!< use NewSessionTicket? */
684 mbedtls_ssl_protocol_version min_tls_version;
688 uint8_t extended_ms; /*!< use Extended Master Secret? */
692 uint8_t async_in_progress; /*!< an asynchronous operation is in progress */
696 unsigned char retransmit_state; /*!< Retransmission state */
700 unsigned char group_list_heap_allocated;
701 unsigned char sig_algs_heap_allocated;
705 uint8_t ecrs_enabled; /*!< Handshake supports EC restart? */
706 enum { /* this complements ssl->state with info on intra-state operations */
712 } ecrs_state; /*!< current (or last) operation */
713 mbedtls_x509_crt *ecrs_peer_cert; /*!< The peer's CRT chain. */
714 size_t ecrs_n; /*!< place for saving a length */
717 mbedtls_ssl_ciphersuite_t const *ciphersuite_info;
720 int (*update_checksum)(mbedtls_ssl_context *, const unsigned char *, size_t);
722 int (*calc_verify)(const mbedtls_ssl_context *, unsigned char *, size_t *);
724 int (*calc_finished)(mbedtls_ssl_context *, unsigned char *, int);
725 mbedtls_ssl_tls_prf_cb *tls_prf;
731 uint8_t key_exchange_mode; /*!< Selected key exchange mode */
738 uint8_t hello_retry_request_flag;
747 uint8_t ccs_sent;
752 uint8_t tls13_kex_modes; /*!< Key exchange modes supported by the client */
755 uint16_t hrr_selected_group;
757 uint16_t new_session_tickets_count; /*!< number of session tickets */
764 uint16_t received_sig_algs[MBEDTLS_RECEIVED_SIG_ALGS_SIZE];
768 const uint16_t *group_list;
769 const uint16_t *sig_algs;
773 mbedtls_dhm_context dhm_ctx; /*!< DHM key exchange */
778 mbedtls_ecdh_context ecdh_ctx; /*!< ECDH key exchange */
783 psa_key_type_t xxdh_psa_type;
784 size_t xxdh_psa_bits;
785 mbedtls_svc_key_id_t xxdh_psa_privkey;
786 uint8_t xxdh_psa_privkey_is_external;
787 unsigned char xxdh_psa_peerkey[PSA_EXPORT_PUBLIC_KEY_MAX_SIZE];
788 size_t xxdh_psa_peerkey_len;
793 psa_pake_operation_t psa_pake_ctx; /*!< EC J-PAKE key exchange */
794 mbedtls_svc_key_id_t psa_pake_password;
795 uint8_t psa_pake_ctx_is_ok;
797 mbedtls_ecjpake_context ecjpake_ctx; /*!< EC J-PAKE key exchange */
800 unsigned char *ecjpake_cache; /*!< Cache for ClientHello ext */
801 size_t ecjpake_cache_len; /*!< Length of cached data */
808 uint16_t *curves_tls_id; /*!< List of TLS IDs of supported elliptic curves */
813 mbedtls_svc_key_id_t psk_opaque; /*!< Opaque PSK from the callback */
814 uint8_t psk_opaque_is_internal;
816 unsigned char *psk; /*!< PSK from the callback */
817 size_t psk_len; /*!< Length of PSK from callback */
819 uint16_t selected_identity;
823 mbedtls_x509_crt_restart_ctx ecrs_ctx; /*!< restart context */
827 mbedtls_ssl_key_cert *key_cert; /*!< chosen key/cert pair (server) */
829 mbedtls_ssl_key_cert *sni_key_cert; /*!< key/cert list from SNI */
830 mbedtls_x509_crt *sni_ca_chain; /*!< trusted CAs from SNI callback */
831 mbedtls_x509_crl *sni_ca_crl; /*!< trusted CAs CRLs from SNI */
837 mbedtls_pk_context peer_pubkey; /*!< The public key from the peer. */
840 struct {
861 } buffering;
866 unsigned char *cookie; /*!< HelloVerifyRequest cookie for DTLS
874 uint8_t cookie_len;
882 uint16_t cookie_len; /*!< DTLS: HelloVerifyRequest cookie length
889 unsigned char cookie_verify_result; /*!< Srv: flag for sending a cookie */
893 unsigned int out_msg_seq; /*!< Outgoing handshake sequence number */
894 unsigned int in_msg_seq; /*!< Incoming handshake sequence number */
896 uint32_t retransmit_timeout; /*!< Current value of timeout */
897 mbedtls_ssl_flight_item *flight; /*!< Current outgoing flight */
898 mbedtls_ssl_flight_item *cur_msg; /*!< Current message in flight */
899 unsigned char *cur_msg_p; /*!< Position in current message */
900 unsigned int in_flight_start_seq; /*!< Minimum message sequence in the
902 mbedtls_ssl_transform *alt_transform_out; /*!< Alternative transform for
904 … unsigned char alt_out_ctr[MBEDTLS_SSL_SEQUENCE_NUMBER_LEN]; /*!< Alternative record epoch/counter
910 uint8_t cid_in_use; /*!< This indicates whether the use of the CID extension
914 unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX]; /*! The peer's CID */
915 uint8_t peer_cid_len; /*!< The length of
919 uint16_t mtu; /*!< Handshake mtu, used to fragment outgoing messages */
927 psa_hash_operation_t fin_sha256_psa;
929 mbedtls_md_context_t fin_sha256;
934 psa_hash_operation_t fin_sha384_psa;
936 mbedtls_md_context_t fin_sha384;
941 uint16_t offered_group_id; /* The NamedGroup value for the group
951 uint8_t client_auth; /*!< used to check if CertificateRequest has been
960 union {
981 } state_local;
985 unsigned char randbytes[MBEDTLS_CLIENT_HELLO_RANDOM_LEN +
989 unsigned char premaster[MBEDTLS_PREMASTER_SIZE];
991 size_t pmslen; /*!< premaster length */
995 uint32_t sent_extensions; /*!< extensions sent by endpoint */
996 uint32_t received_extensions; /*!< extensions received by endpoint */
999 unsigned char certificate_request_context_len;
1000 unsigned char *certificate_request_context;
1004 mbedtls_ssl_transform *transform_handshake;
1005 union {
1009 } tls13_master_secrets;
1011 mbedtls_ssl_tls13_handshake_secrets tls13_hs_secrets;
1014 mbedtls_ssl_transform *transform_earlydata;
1024 void *user_async_ctx;
1028 const unsigned char *sni_name; /*!< raw SNI */
1029 size_t sni_name_len; /*!< raw SNI len */
1031 const mbedtls_x509_crt *dn_hints; /*!< acceptable client cert issuers */