Lines Matching defs:options
467 struct options { struct
468 const char *server_name; /* hostname of the server (client only) */
469 const char *server_addr; /* address of the server (client only) */
470 const char *server_port; /* port on which the ssl service runs */
471 int debug_level; /* level of debugging */
472 int nbio; /* should I/O be blocking? */
473 int event; /* loop or event-driven IO? level or edge triggered? */
474 uint32_t read_timeout; /* timeout on mbedtls_ssl_read() in milliseconds */
475 int max_resend; /* DTLS times to resend on read timeout */
476 const char *request_page; /* page on server to request */
477 int request_size; /* pad request with header to requested size */
478 const char *ca_file; /* the file with the CA certificate(s) */
479 const char *ca_path; /* the path with the CA certificate(s) reside */
480 const char *crt_file; /* the file with the client certificate */
481 const char *key_file; /* the file with the client key */
482 int key_opaque; /* handle private key as if it were opaque */
484 int psk_opaque;
487 int ca_callback; /* Use callback for trusted certificate list */
489 const char *key_pwd; /* the password for the client key */
490 const char *psk; /* the pre-shared key */
491 const char *psk_identity; /* the pre-shared key identity */
492 const char *ecjpake_pw; /* the EC J-PAKE password */
494 int ecjpake_pw_opaque; /* set to 1 to use the opaque method for setting the password */
496 int ec_max_ops; /* EC consecutive operations limit */
497 int force_ciphersuite[2]; /* protocol/ciphersuite to use, or all */
499 int tls13_kex_modes; /* supported TLS 1.3 key exchange modes */
501 int renegotiation; /* enable / disable renegotiation */
502 int allow_legacy; /* allow legacy renegotiation */
503 int renegotiate; /* attempt renegotiation? */
504 int renego_delay; /* delay before enforcing renegotiation */
505 int exchanges; /* number of data exchanges */
506 int min_version; /* minimum protocol version accepted */
507 int max_version; /* maximum protocol version accepted */
508 int allow_sha1; /* flag for SHA-1 support */
509 int auth_mode; /* verify mode for connection */
510 unsigned char mfl_code; /* code for maximum fragment length */
511 int trunc_hmac; /* negotiate truncated hmac or not */
512 int recsplit; /* enable record splitting? */
513 int dhmlen; /* minimum DHM params len in bits */
514 int reconnect; /* attempt to resume session */
515 const char *reco_server_name; /* hostname of the server (re-connect) */
516 int reco_delay; /* delay in seconds before resuming session */
517 int reco_mode; /* how to keep the session around */
518 int reconnect_hard; /* unexpectedly reconnect from the same port */
519 int tickets; /* enable / disable session tickets (TLS 1.2) */
520 int new_session_tickets; /* enable / disable new session tickets (TLS 1.3) */
521 const char *groups; /* list of supported groups */
522 const char *sig_algs; /* supported TLS 1.3 signature algorithms */
523 const char *alpn_string; /* ALPN supported protocols */
524 int transport; /* TLS or DTLS? */
525 uint32_t hs_to_min; /* Initial value of DTLS handshake timer */
526 uint32_t hs_to_max; /* Max value of DTLS handshake timer */
527 int dtls_mtu; /* UDP Maximum transport unit for DTLS */
528 int fallback; /* is this a fallback connection? */
529 int dgram_packing; /* allow/forbid datagram packing */
530 int extended_ms; /* negotiate extended master secret? */
531 int etm; /* negotiate encrypt then mac? */
532 int context_crt_cb; /* use context-specific CRT verify callback */
533 int eap_tls; /* derive EAP-TLS keying material? */
534 int nss_keylog; /* export NSS key log material */
535 const char *nss_keylog_file; /* NSS key log file */
536 int cid_enabled; /* whether to use the CID extension or not */
537 int cid_enabled_renego; /* whether to use the CID extension or not
539 const char *cid_val; /* the CID to use for incoming messages */
540 int serialize; /* serialize/deserialize connection */
541 const char *context_file; /* the file to write a serialized connection
544 const char *cid_val_renego; /* the CID to use for incoming messages
546 int reproducible; /* make communication reproducible */
547 int skip_close_notify; /* skip sending the close_notify alert */
549 int early_data; /* early data enablement flag */
551 int query_config_mode; /* whether to read config */
552 int use_srtp; /* Support SRTP */
553 int force_srtp_profile; /* SRTP protection profile to use or all */
554 const char *mki; /* The dtls mki value to use */
555 const char *key_opaque_alg1; /* Allowed opaque key alg 1 */
556 const char *key_opaque_alg2; /* Allowed Opaque key alg 2 */