Mbed TLS v2.28.10
|
#include <ssl.h>
const char* mbedtls_ssl_context::alpn_chosen |
unsigned mbedtls_ssl_context::badmac_seen |
unsigned char* mbedtls_ssl_context::cli_id |
const mbedtls_ssl_config* mbedtls_ssl_context::conf |
unsigned char mbedtls_ssl_context::cur_out_ctr[8] |
uint8_t mbedtls_ssl_context::disable_datagram_packing |
mbedtls_ssl_get_timer_t* mbedtls_ssl_context::f_get_timer |
mbedtls_ssl_recv_t* mbedtls_ssl_context::f_recv |
mbedtls_ssl_recv_timeout_t* mbedtls_ssl_context::f_recv_timeout |
mbedtls_ssl_send_t* mbedtls_ssl_context::f_send |
mbedtls_ssl_set_timer_t* mbedtls_ssl_context::f_set_timer |
int(* mbedtls_ssl_context::f_vrfy) (void *, mbedtls_x509_crt *, int, uint32_t *) |
mbedtls_ssl_handshake_params* mbedtls_ssl_context::handshake |
char* mbedtls_ssl_context::hostname |
Expected peer CN for verification.
Also used on clients for SNI.
The value of this field can be:
NULL
in a newly initialized or reset context.hostname
argument.NULL
(as opposed to never having been called).If you need to obtain the value passed to mbedtls_ssl_set_hostname() even if it may have been called with NULL
, call mbedtls_ssl_get_hostname_pointer().
If this field contains the value NULL
and the configuration option #MBEDTLS_SSL_CLI_ALLOW_WEAK_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME is unset, on a TLS client, attempting to verify a server certificate results in the error MBEDTLS_ERR_SSL_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME.
If this field contains the special value described above, or if the value is NULL
and the configuration option #MBEDTLS_SSL_CLI_ALLOW_WEAK_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME is set, then the peer name verification is skipped, which may be insecure, especially on a client. Furthermore, on a client, the server_name extension is not sent.
unsigned char* mbedtls_ssl_context::in_ctr |
uint16_t mbedtls_ssl_context::in_epoch |
unsigned char* mbedtls_ssl_context::in_hdr |
size_t mbedtls_ssl_context::in_hslen |
size_t mbedtls_ssl_context::in_left |
unsigned char* mbedtls_ssl_context::in_len |
unsigned char* mbedtls_ssl_context::in_msg |
size_t mbedtls_ssl_context::in_msglen |
int mbedtls_ssl_context::in_msgtype |
unsigned char* mbedtls_ssl_context::in_offt |
uint64_t mbedtls_ssl_context::in_window |
uint64_t mbedtls_ssl_context::in_window_top |
int mbedtls_ssl_context::keep_current_message |
int mbedtls_ssl_context::major_ver |
int mbedtls_ssl_context::minor_ver |
uint16_t mbedtls_ssl_context::mtu |
int mbedtls_ssl_context::nb_zero |
size_t mbedtls_ssl_context::next_record_offset |
unsigned char* mbedtls_ssl_context::out_ctr |
unsigned char* mbedtls_ssl_context::out_hdr |
size_t mbedtls_ssl_context::out_left |
unsigned char* mbedtls_ssl_context::out_len |
unsigned char* mbedtls_ssl_context::out_msg |
size_t mbedtls_ssl_context::out_msglen |
int mbedtls_ssl_context::out_msgtype |
char mbedtls_ssl_context::own_verify_data[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN] |
void* mbedtls_ssl_context::p_timer |
void* mbedtls_ssl_context::p_vrfy |
char mbedtls_ssl_context::peer_verify_data[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN] |
int mbedtls_ssl_context::renego_records_seen |
int mbedtls_ssl_context::renego_status |
int mbedtls_ssl_context::secure_renegotiation |
mbedtls_ssl_session* mbedtls_ssl_context::session |
mbedtls_ssl_session* mbedtls_ssl_context::session_in |
mbedtls_ssl_session* mbedtls_ssl_context::session_negotiate |
mbedtls_ssl_session* mbedtls_ssl_context::session_out |
signed char mbedtls_ssl_context::split_done |
mbedtls_ssl_transform* mbedtls_ssl_context::transform |
mbedtls_ssl_transform* mbedtls_ssl_context::transform_in |
mbedtls_ssl_transform* mbedtls_ssl_context::transform_negotiate |
mbedtls_ssl_transform* mbedtls_ssl_context::transform_out |
size_t mbedtls_ssl_context::verify_data_len |