|
Mbed TLS v2.28.10
|
#include <ssl.h>

| const char* mbedtls_ssl_context::alpn_chosen |
| unsigned mbedtls_ssl_context::badmac_seen |
| unsigned char* mbedtls_ssl_context::cli_id |
| const mbedtls_ssl_config* mbedtls_ssl_context::conf |
| unsigned char mbedtls_ssl_context::cur_out_ctr[8] |
| uint8_t mbedtls_ssl_context::disable_datagram_packing |
| mbedtls_dtls_srtp_info mbedtls_ssl_context::dtls_srtp_info |
| mbedtls_ssl_get_timer_t* mbedtls_ssl_context::f_get_timer |
| mbedtls_ssl_recv_t* mbedtls_ssl_context::f_recv |
| mbedtls_ssl_recv_timeout_t* mbedtls_ssl_context::f_recv_timeout |
| mbedtls_ssl_send_t* mbedtls_ssl_context::f_send |
| mbedtls_ssl_set_timer_t* mbedtls_ssl_context::f_set_timer |
| int(* mbedtls_ssl_context::f_vrfy) (void *, mbedtls_x509_crt *, int, uint32_t *) |
| mbedtls_ssl_handshake_params* mbedtls_ssl_context::handshake |
| char* mbedtls_ssl_context::hostname |
Expected peer CN for verification.
Also used on clients for SNI.
The value of this field can be:
NULL in a newly initialized or reset context.hostname argument.NULL (as opposed to never having been called).If you need to obtain the value passed to mbedtls_ssl_set_hostname() even if it may have been called with NULL, call mbedtls_ssl_get_hostname_pointer().
If this field contains the value NULL and the configuration option #MBEDTLS_SSL_CLI_ALLOW_WEAK_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME is unset, on a TLS client, attempting to verify a server certificate results in the error MBEDTLS_ERR_SSL_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME.
If this field contains the special value described above, or if the value is NULL and the configuration option #MBEDTLS_SSL_CLI_ALLOW_WEAK_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME is set, then the peer name verification is skipped, which may be insecure, especially on a client. Furthermore, on a client, the server_name extension is not sent.
| unsigned char* mbedtls_ssl_context::in_ctr |
| uint16_t mbedtls_ssl_context::in_epoch |
| unsigned char* mbedtls_ssl_context::in_hdr |
| size_t mbedtls_ssl_context::in_hslen |
| size_t mbedtls_ssl_context::in_left |
| unsigned char* mbedtls_ssl_context::in_len |
| unsigned char* mbedtls_ssl_context::in_msg |
| size_t mbedtls_ssl_context::in_msglen |
| int mbedtls_ssl_context::in_msgtype |
| unsigned char* mbedtls_ssl_context::in_offt |
| uint64_t mbedtls_ssl_context::in_window |
| uint64_t mbedtls_ssl_context::in_window_top |
| int mbedtls_ssl_context::keep_current_message |
| int mbedtls_ssl_context::major_ver |
| int mbedtls_ssl_context::minor_ver |
| uint16_t mbedtls_ssl_context::mtu |
| int mbedtls_ssl_context::nb_zero |
| size_t mbedtls_ssl_context::next_record_offset |
| unsigned char* mbedtls_ssl_context::out_ctr |
| unsigned char* mbedtls_ssl_context::out_hdr |
| size_t mbedtls_ssl_context::out_left |
| unsigned char* mbedtls_ssl_context::out_len |
| unsigned char* mbedtls_ssl_context::out_msg |
| size_t mbedtls_ssl_context::out_msglen |
| int mbedtls_ssl_context::out_msgtype |
| char mbedtls_ssl_context::own_verify_data[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN] |
| void* mbedtls_ssl_context::p_timer |
| void* mbedtls_ssl_context::p_vrfy |
| char mbedtls_ssl_context::peer_verify_data[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN] |
| int mbedtls_ssl_context::renego_records_seen |
| int mbedtls_ssl_context::renego_status |
| int mbedtls_ssl_context::secure_renegotiation |
| mbedtls_ssl_session* mbedtls_ssl_context::session |
| mbedtls_ssl_session* mbedtls_ssl_context::session_in |
| mbedtls_ssl_session* mbedtls_ssl_context::session_negotiate |
| mbedtls_ssl_session* mbedtls_ssl_context::session_out |
| signed char mbedtls_ssl_context::split_done |
| mbedtls_ssl_transform* mbedtls_ssl_context::transform |
| mbedtls_ssl_transform* mbedtls_ssl_context::transform_in |
| mbedtls_ssl_transform* mbedtls_ssl_context::transform_negotiate |
| mbedtls_ssl_transform* mbedtls_ssl_context::transform_out |
| size_t mbedtls_ssl_context::verify_data_len |