Lines Matching defs:options
606 struct options { struct
607 const char *server_addr; /* address on which the ssl service runs */
608 const char *server_port; /* port on which the ssl service runs */
609 int debug_level; /* level of debugging */
610 int nbio; /* should I/O be blocking? */
611 int event; /* loop or event-driven IO? level or edge triggered? */
612 uint32_t read_timeout; /* timeout on mbedtls_ssl_read() in milliseconds */
613 int response_size; /* pad response with header to requested size */
614 uint16_t buffer_size; /* IO buffer size */
615 const char *ca_file; /* the file with the CA certificate(s) */
616 const char *ca_path; /* the path with the CA certificate(s) reside */
617 const char *crt_file; /* the file with the server certificate */
618 const char *key_file; /* the file with the server key */
619 int key_opaque; /* handle private key as if it were opaque */
620 const char *key_pwd; /* the password for the server key */
621 const char *crt_file2; /* the file with the 2nd server certificate */
622 const char *key_file2; /* the file with the 2nd server key */
623 const char *key_pwd2; /* the password for the 2nd server key */
624 const char *async_operations; /* supported SSL asynchronous operations */
625 …ate_delay1; /* number of times f_async_resume needs to be called for key 1, or -1 for no async */
626 …ate_delay2; /* number of times f_async_resume needs to be called for key 2, or -1 for no async */
627 int async_private_error; /* inject error in async private callback */
629 int psk_opaque;
630 int psk_list_opaque;
633 int ca_callback; /* Use callback for trusted certificate list */
635 const char *psk; /* the pre-shared key */
636 const char *psk_identity; /* the pre-shared key identity */
637 char *psk_list; /* list of PSK id/key pairs for callback */
638 const char *ecjpake_pw; /* the EC J-PAKE password */
640 int ecjpake_pw_opaque; /* set to 1 to use the opaque method for setting the password */
642 int force_ciphersuite[2]; /* protocol/ciphersuite to use, or all */
644 int tls13_kex_modes; /* supported TLS 1.3 key exchange modes */
646 int renegotiation; /* enable / disable renegotiation */
647 int allow_legacy; /* allow legacy renegotiation */
648 int renegotiate; /* attempt renegotiation? */
649 int renego_delay; /* delay before enforcing renegotiation */
650 uint64_t renego_period; /* period for automatic renegotiation */
651 int exchanges; /* number of data exchanges */
652 int min_version; /* minimum protocol version accepted */
653 int max_version; /* maximum protocol version accepted */
654 int allow_sha1; /* flag for SHA-1 support */
655 int auth_mode; /* verify mode for connection */
656 int cert_req_ca_list; /* should we send the CA list? */
657 int cert_req_dn_hint; /* mode to set DN hints for CA list to send */
658 unsigned char mfl_code; /* code for maximum fragment length */
659 int trunc_hmac; /* accept truncated hmac? */
660 int tickets; /* enable / disable session tickets */
661 int dummy_ticket; /* enable / disable dummy ticket generator */
662 int ticket_rotate; /* session ticket rotate (code coverage) */
663 int ticket_timeout; /* session ticket lifetime */
664 int ticket_aead; /* session ticket protection */
665 int cache_max; /* max number of session cache entries */
667 int cache_timeout; /* expiration delay of session cache entries*/
669 int cache_remove; /* enable / disable cache entry removal */
670 char *sni; /* string describing sni information */
671 const char *groups; /* list of supported groups */
672 const char *sig_algs; /* supported TLS 1.3 signature algorithms */
673 const char *alpn_string; /* ALPN supported protocols */
674 const char *dhm_file; /* the file with the DH parameters */
675 int extended_ms; /* allow negotiation of extended MS? */
676 int etm; /* allow negotiation of encrypt-then-MAC? */
677 int transport; /* TLS or DTLS? */
678 int cookies; /* Use cookies for DTLS? -1 to break them */
679 int anti_replay; /* Use anti-replay for DTLS? -1 for default */
680 uint32_t hs_to_min; /* Initial value of DTLS handshake timer */
681 uint32_t hs_to_max; /* Max value of DTLS handshake timer */
682 int dtls_mtu; /* UDP Maximum transport unit for DTLS */
683 int dgram_packing; /* allow/forbid datagram packing */
684 int badmac_limit; /* Limit of records with bad MAC */
685 int eap_tls; /* derive EAP-TLS keying material? */
686 int nss_keylog; /* export NSS key log material */
687 const char *nss_keylog_file; /* NSS key log file */
688 int cid_enabled; /* whether to use the CID extension or not */
689 int cid_enabled_renego; /* whether to use the CID extension or not
691 const char *cid_val; /* the CID to use for incoming messages */
692 int serialize; /* serialize/deserialize connection */
693 const char *context_file; /* the file to write a serialized connection
696 const char *cid_val_renego; /* the CID to use for incoming messages
698 int reproducible; /* make communication reproducible */
700 int early_data; /* early data enablement flag */
701 uint32_t max_early_data_size; /* max amount of early data */
703 int query_config_mode; /* whether to read config */
704 int use_srtp; /* Support SRTP */
705 int force_srtp_profile; /* SRTP protection profile to use or all */
706 int support_mki; /* The dtls mki mki support */
707 const char *key1_opaque_alg1; /* Allowed opaque key 1 alg 1 */
708 const char *key1_opaque_alg2; /* Allowed opaque key 1 alg 2 */
709 const char *key2_opaque_alg1; /* Allowed opaque key 2 alg 1 */
710 const char *key2_opaque_alg2; /* Allowed opaque key 2 alg 2 */