OpenSSL 结构体

 

X509_STORE

头文件:x509_vfy.h

定义

typedef struct x509_store_st X509_STORE;
struct x509_store_st
{/* The following is a cache of trusted certs */int cache;     /* if true, stash any hits */STACK_OF(X509_OBJECT) *objs;    /* Cache of all objects *//* These are external lookup methods */STACK_OF(X509_LOOKUP) *get_cert_methods;X509_VERIFY_PARAM *param;/* Callbacks for various operations */int (*verify)(X509_STORE_CTX *ctx);    /* called to verify a certificate */int (*verify_cb)(int ok,X509_STORE_CTX *ctx);    /* error callback */int (*get_issuer)(X509 **issuer, X509_STORE_CTX *ctx, X509 *x);    /* get issuers cert from ctx */int (*check_issued)(X509_STORE_CTX *ctx, X509 *x, X509 *issuer); /* check issued */int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */int (*get_crl)(X509_STORE_CTX *ctx, X509_CRL **crl, X509 *x); /* retrieve CRL */int (*check_crl)(X509_STORE_CTX *ctx, X509_CRL *crl); /* Check CRL validity */int (*cert_crl)(X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x); /* Check certificate against CRL */STACK_OF(X509) * (*lookup_certs)(X509_STORE_CTX *ctx, X509_NAME *nm);STACK_OF(X509_CRL) * (*lookup_crls)(X509_STORE_CTX *ctx, X509_NAME *nm);int (*cleanup)(X509_STORE_CTX *ctx);CRYPTO_EX_DATA ex_data;int references;
} /* X509_STORE */;

 

SSL_METHOD

头文件:ssl.h

定义

typedef struct ssl_method_st SSL_METHOD;
struct ssl_method_st
{int version;int (*ssl_new)(SSL *s);void (*ssl_clear)(SSL *s);void (*ssl_free)(SSL *s);int (*ssl_accept)(SSL *s);int (*ssl_connect)(SSL *s);int (*ssl_read)(SSL *s,void *buf,int len);int (*ssl_peek)(SSL *s,void *buf,int len);int (*ssl_write)(SSL *s,const void *buf,int len);int (*ssl_shutdown)(SSL *s);int (*ssl_renegotiate)(SSL *s);int (*ssl_renegotiate_check)(SSL *s);long (*ssl_get_message)(SSL *s, int st1, int stn, int mt, longmax, int *ok);int (*ssl_read_bytes)(SSL *s, int type, unsigned char *buf, int len,int peek);int (*ssl_write_bytes)(SSL *s, int type, const void *buf_, int len);int (*ssl_dispatch_alert)(SSL *s);long (*ssl_ctrl)(SSL *s,int cmd,long larg,void *parg);long (*ssl_ctx_ctrl)(SSL_CTX *ctx,int cmd,long larg,void *parg);const SSL_CIPHER *(*get_cipher_by_char)(const unsigned char *ptr);int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr);int (*ssl_pending)(const SSL *s);int (*num_ciphers)(void);const SSL_CIPHER *(*get_cipher)(unsigned ncipher);const struct ssl_method_st *(*get_ssl_method)(int version);long (*get_timeout)(void);struct ssl3_enc_method *ssl3_enc; /* Extra SSLv3/TLS stuff */int (*ssl_version)(void);long (*ssl_callback_ctrl)(SSL *s, int cb_id, void (*fp)(void));long (*ssl_ctx_callback_ctrl)(SSL_CTX *s, int cb_id, void (*fp)(void));
};

 

SSL_METHOD

头文件:ssl.h

定义

typedef struct ssl_method_st SSL_METHOD;
struct ssl_method_st
{int version;int (*ssl_new)(SSL *s);void (*ssl_clear)(SSL *s);void (*ssl_free)(SSL *s);int (*ssl_accept)(SSL *s);int (*ssl_connect)(SSL *s);int (*ssl_read)(SSL *s,void *buf,int len);int (*ssl_peek)(SSL *s,void *buf,int len);int (*ssl_write)(SSL *s,const void *buf,int len);int (*ssl_shutdown)(SSL *s);int (*ssl_renegotiate)(SSL *s);int (*ssl_renegotiate_check)(SSL *s);long (*ssl_get_message)(SSL *s, int st1, int stn, int mt, longmax, int *ok);int (*ssl_read_bytes)(SSL *s, int type, unsigned char *buf, int len,int peek);int (*ssl_write_bytes)(SSL *s, int type, const void *buf_, int len);int (*ssl_dispatch_alert)(SSL *s);long (*ssl_ctrl)(SSL *s,int cmd,long larg,void *parg);long (*ssl_ctx_ctrl)(SSL_CTX *ctx,int cmd,long larg,void *parg);const SSL_CIPHER *(*get_cipher_by_char)(const unsigned char *ptr);int (*put_cipher_by_char)(const SSL_CIPHER *cipher,unsigned char *ptr);int (*ssl_pending)(const SSL *s);int (*num_ciphers)(void);const SSL_CIPHER *(*get_cipher)(unsigned ncipher);const struct ssl_method_st *(*get_ssl_method)(int version);long (*get_timeout)(void);struct ssl3_enc_method *ssl3_enc; /* Extra SSLv3/TLS stuff */int (*ssl_version)(void);long (*ssl_callback_ctrl)(SSL *s, int cb_id, void (*fp)(void));long (*ssl_ctx_callback_ctrl)(SSL_CTX *s, int cb_id, void (*fp)(void));
};

 

SSL_CTX

头文件:ssl.h

定义

typedef struct ssl_ctx_st SSL_CTX;
struct ssl_ctx_st
{const SSL_METHOD *method;STACK_OF(SSL_CIPHER) *cipher_list;/* same as above but sorted for lookup */STACK_OF(SSL_CIPHER) *cipher_list_by_id;struct x509_store_st /* X509_STORE */ *cert_store;LHASH_OF(SSL_SESSION) *sessions;/* Most session-ids that will be cached, default is* SSL_SESSION_CACHE_MAX_SIZE_DEFAULT. 0 is unlimited. */unsigned long session_cache_size;struct ssl_session_st *session_cache_head;struct ssl_session_st *session_cache_tail;/* This can have one of 2 values, ored together,* SSL_SESS_CACHE_CLIENT,* SSL_SESS_CACHE_SERVER,* Default is SSL_SESSION_CACHE_SERVER, which means only* SSL_accept which cache SSL_SESSIONS. */int session_cache_mode;/* If timeout is not 0, it is the default timeout value set* when SSL_new() is called.  This has been put in to make* life easier to set things up */long session_timeout;/* If this callback is not null, it will be called each* time a session id is added to the cache.  If this function* returns 1, it means that the callback will do a* SSL_SESSION_free() when it has finished using it.  Otherwise,* on 0, it means the callback has finished with it.* If remove_session_cb is not null, it will be called when* a session-id is removed from the cache.  After the call,* OpenSSL will SSL_SESSION_free() it. */int (*new_session_cb)(struct ssl_st *ssl,SSL_SESSION *sess);void (*remove_session_cb)(struct ssl_ctx_st *ctx,SSL_SESSION *sess);SSL_SESSION *(*get_session_cb)(struct ssl_st *ssl,unsigned char *data,int len,int *copy);struct{int sess_connect;    /* SSL new conn - started */int sess_connect_renegotiate;/* SSL reneg - requested */int sess_connect_good;    /* SSL new conne/reneg - finished */int sess_accept;    /* SSL new accept - started */int sess_accept_renegotiate;/* SSL reneg - requested */int sess_accept_good;    /* SSL accept/reneg - finished */int sess_miss;        /* session lookup misses  */int sess_timeout;    /* reuse attempt on timeouted session */int sess_cache_full;    /* session removed due to full cache */int sess_hit;        /* session reuse actually done */int sess_cb_hit;    /* session-id that was not* in the cache was* passed back via the callback.  This* indicates that the application is* supplying session-id's from other* processes - spooky :-) */} stats;int references;/* if defined, these override the X509_verify_cert() calls */int (*app_verify_callback)(X509_STORE_CTX *, void *);void *app_verify_arg;/* before OpenSSL 0.9.7, 'app_verify_arg' was ignored* ('app_verify_callback' was called with just one argument) *//* Default password callback. */pem_password_cb *default_passwd_callback;/* Default password callback user data. */void *default_passwd_callback_userdata;/* get client cert callback */int (*client_cert_cb)(SSL *ssl, X509 **x509, EVP_PKEY **pkey);/* cookie generate callback */int (*app_gen_cookie_cb)(SSL *ssl, unsigned char *cookie,unsigned int *cookie_len);/* verify cookie callback */int (*app_verify_cookie_cb)(SSL *ssl, unsigned char *cookie,unsigned int cookie_len);CRYPTO_EX_DATA ex_data;const EVP_MD *rsa_md5;/* For SSLv2 - name is 'ssl2-md5' */const EVP_MD *md5;    /* For SSLv3/TLSv1 'ssl3-md5' */const EVP_MD *sha1;   /* For SSLv3/TLSv1 'ssl3->sha1' */STACK_OF(X509) *extra_certs;STACK_OF(SSL_COMP) *comp_methods; /* stack of SSL_COMP, SSLv3/TLSv1 *//* Default values used when no per-SSL value is defined follow */void (*info_callback)(const SSL *ssl,int type,int val); /* used if SSL's info_callback is NULL *//* what we put in client cert requests */STACK_OF(X509_NAME) *client_CA;/* Default values to use in SSL structures follow (these are copied by SSL_new) */unsigned long options;unsigned long mode;long max_cert_list;struct cert_st /* CERT */ *cert;int read_ahead;/* callback that allows applications to peek at protocol messages */void (*msg_callback)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg);void *msg_callback_arg;int verify_mode;unsigned int sid_ctx_length;unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH];int (*default_verify_callback)(int ok,X509_STORE_CTX *ctx); /* called 'verify_callback' in the SSL *//* Default generate session ID callback. */GEN_SESSION_CB generate_session_id;X509_VERIFY_PARAM *param;#if 0int purpose;        /* Purpose setting */int trust;        /* Trust setting */
#endifint quiet_shutdown;/* Maximum amount of data to send in one fragment.* actual record size can be more than this due to* padding and MAC overheads.*/unsigned int max_send_fragment;#ifndef OPENSSL_ENGINE/* Engine to pass requests for client certs to*/ENGINE *client_cert_engine;
#endif#ifndef OPENSSL_NO_TLSEXT/* TLS extensions servername callback */int (*tlsext_servername_callback)(SSL*, int *, void *);void *tlsext_servername_arg;/* RFC 4507 session ticket keys */unsigned char tlsext_tick_key_name[16];unsigned char tlsext_tick_hmac_key[16];unsigned char tlsext_tick_aes_key[16];/* Callback to support customisation of ticket key setting */int (*tlsext_ticket_key_cb)(SSL *ssl,unsigned char *name, unsigned char *iv,EVP_CIPHER_CTX *ectx,HMAC_CTX *hctx, int enc);/* certificate status request info *//* Callback for status request */int (*tlsext_status_cb)(SSL *ssl, void *arg);void *tlsext_status_arg;/* draft-rescorla-tls-opaque-prf-input-00.txt information */int (*tlsext_opaque_prf_input_callback)(SSL *, void *peerinput, size_t len, void *arg);void *tlsext_opaque_prf_input_callback_arg;
#endif#ifndef OPENSSL_NO_PSKchar *psk_identity_hint;unsigned int (*psk_client_callback)(SSL *ssl, const char *hint, char *identity,unsigned int max_identity_len, unsigned char *psk,unsigned int max_psk_len);unsigned int (*psk_server_callback)(SSL *ssl, const char *identity,unsigned char *psk, unsigned int max_psk_len);
#endif#ifndef OPENSSL_NO_BUF_FREELISTS
#define SSL_MAX_BUF_FREELIST_LEN_DEFAULT 32unsigned int freelist_max_len;struct ssl3_buf_freelist_st *wbuf_freelist;struct ssl3_buf_freelist_st *rbuf_freelist;
#endif#ifndef OPENSSL_NO_TLSEXT# ifndef OPENSSL_NO_NEXTPROTONEG/* Next protocol negotiation information *//* (for experimental NPN extension). *//* For a server, this contains a callback function by which the set of* advertised protocols can be provided. */int (*next_protos_advertised_cb)(SSL *s, const unsigned char **buf,unsigned int *len, void *arg);void *next_protos_advertised_cb_arg;/* For a client, this contains a callback function that selects the* next protocol from the list provided by the server. */int (*next_proto_select_cb)(SSL *s, unsigned char **out,unsigned char *outlen,const unsigned char *in,unsigned int inlen,void *arg);void *next_proto_select_cb_arg;
# endif/* SRTP profiles we are willing to do from RFC 5764 */STACK_OF(SRTP_PROTECTION_PROFILE) *srtp_profiles;
#endif
};

 

X509_VERIFY_PARAM

头文件:x509_vfy.h

定义

/* This structure hold all parameters associated with a verify operation* by including an X509_VERIFY_PARAM structure in related structures the* parameters used can be customized*/typedef struct X509_VERIFY_PARAM_st
{char *name;time_t check_time;    /* Time to use */unsigned long inh_flags; /* Inheritance flags */unsigned long flags;    /* Various verify flags */int purpose;        /* purpose to check untrusted certificates */int trust;        /* trust setting to check */int depth;        /* Verify depth */STACK_OF(ASN1_OBJECT) *policies;    /* Permissible policies */
} X509_VERIFY_PARAM;

 

_STACK

头文件:stack.h

定义

typedef struct stack_st
{int num;char **data;int sorted;int num_alloc;int (*comp)(const void *, const void *);
} _STACK;  /* Use STACK_OF(...) instead */

 

X509_LOOKUP

头文件:x509_vfy.h

定义

typedef struct x509_lookup_st X509_LOOKUP;/* This is the functions plus an instance of the local variables. */
struct x509_lookup_st
{int init;            /* have we been started */int skip;            /* don't use us. */X509_LOOKUP_METHOD *method;    /* the functions */char *method_data;        /* method data */X509_STORE *store_ctx;    /* who owns us */
} /* X509_LOOKUP */;

 

X509_LOOKUP_METHOD

头文件:x509_vfy.h

定义

/* This is a static that defines the function interface */
typedef struct x509_lookup_method_st
{const char *name;int (*new_item)(X509_LOOKUP *ctx);void (*free)(X509_LOOKUP *ctx);int (*init)(X509_LOOKUP *ctx);int (*shutdown)(X509_LOOKUP *ctx);int (*ctrl)(X509_LOOKUP *ctx,int cmd,const char *argc,long argl,char **ret);int (*get_by_subject)(X509_LOOKUP *ctx,int type,X509_NAME *name,X509_OBJECT *ret);int (*get_by_issuer_serial)(X509_LOOKUP *ctx,int type,X509_NAME *name,ASN1_INTEGER *serial,X509_OBJECT *ret);int (*get_by_fingerprint)(X509_LOOKUP *ctx,int type,unsigned char *bytes,int len,X509_OBJECT *ret);int (*get_by_alias)(X509_LOOKUP *ctx,int type,char *str,int len,X509_OBJECT *ret);
} X509_LOOKUP_METHOD;

 

X509

头文件:x509.h

定义

typedef struct x509_st X509;
struct x509_st
{X509_CINF *cert_info;X509_ALGOR *sig_alg;ASN1_BIT_STRING *signature;int valid;int references;char *name;CRYPTO_EX_DATA ex_data;/* These contain copies of various extension values */long ex_pathlen;long ex_pcpathlen;unsigned long ex_flags;unsigned long ex_kusage;unsigned long ex_xkusage;unsigned long ex_nscert;ASN1_OCTET_STRING *skid;AUTHORITY_KEYID *akid;X509_POLICY_CACHE *policy_cache;STACK_OF(DIST_POINT) *crldp;STACK_OF(GENERAL_NAME) *altname;NAME_CONSTRAINTS *nc;
#ifndef OPENSSL_NO_RFC3779STACK_OF(IPAddressFamily) *rfc3779_addr;struct ASIdentifiers_st *rfc3779_asid;
#endif
#ifndef OPENSSL_NO_SHAunsigned char sha1_hash[SHA_DIGEST_LENGTH];
#endifX509_CERT_AUX *aux;
} /* X509 */;

 

X509_NAME

头文件:x509.h

定义

typedef struct X509_name_st X509_NAME;
struct X509_name_st
{STACK_OF(X509_NAME_ENTRY) *entries;int modified;    /* true if 'bytes' needs to be built */
#ifndef OPENSSL_NO_BUFFERBUF_MEM *bytes;
#elsechar *bytes;
#endif/*    unsigned long hash; Keep the hash around for lookups */unsigned char *canon_enc;int canon_enclen;
} /* X509_NAME */;

 

X509_CINF

头文件:x509.h

定义

typedef struct x509_cinf_st
{ASN1_INTEGER *version;        /* [ 0 ] default of v1 */ASN1_INTEGER *serialNumber;X509_ALGOR *signature;X509_NAME *issuer;X509_VAL *validity;X509_NAME *subject;X509_PUBKEY *key;ASN1_BIT_STRING *issuerUID;        /* [ 1 ] optional in v2 */ASN1_BIT_STRING *subjectUID;        /* [ 2 ] optional in v2 */STACK_OF(X509_EXTENSION) *extensions;    /* [ 3 ] optional in v3 */ASN1_ENCODING enc;
} X509_CINF;

 

SSL

头文件:ssl.h

定义

typedef struct ssl_st SSL;
struct ssl_st
{/* protocol version* (one of SSL2_VERSION, SSL3_VERSION, TLS1_VERSION, DTLS1_VERSION)*/int version;int type; /* SSL_ST_CONNECT or SSL_ST_ACCEPT */const SSL_METHOD *method; /* SSLv3 *//* There are 2 BIO's even though they are normally both the* same.  This is so data can be read and written to different* handlers */#ifndef OPENSSL_NO_BIOBIO *rbio; /* used by SSL_read */BIO *wbio; /* used by SSL_write */BIO *bbio; /* used during session-id reuse to concatenate* messages */
#elsechar *rbio; /* used by SSL_read */char *wbio; /* used by SSL_write */char *bbio;
#endif/* This holds a variable that indicates what we were doing* when a 0 or -1 is returned.  This is needed for* non-blocking IO so we know what request needs re-doing when* in SSL_accept or SSL_connect */int rwstate;/* true when we are actually in SSL_accept() or SSL_connect() */int in_handshake;int (*handshake_func)(SSL *);/* Imagine that here's a boolean member "init" that is* switched as soon as SSL_set_{accept/connect}_state* is called for the first time, so that "state" and* "handshake_func" are properly initialized.  But as* handshake_func is == 0 until then, we use this* test instead of an "init" member.*/int server;    /* are we the server side? - mostly used by SSL_clear*/int new_session;/* Generate a new session or reuse an old one.* NB: For servers, the 'new' session may actually be a previously* cached session or even the previous session unless* SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION is set */int quiet_shutdown;/* don't send shutdown packets */int shutdown;    /* we have shut things down, 0x01 sent, 0x02* for received */int state;    /* where we are */int rstate;    /* where we are when reading */BUF_MEM *init_buf;    /* buffer used during init */void *init_msg;       /* pointer to handshake message body, set by ssl3_get_message() */int init_num;        /* amount read/written */int init_off;        /* amount read/written *//* used internally to point at a raw packet */unsigned char *packet;unsigned int packet_length;struct ssl2_state_st *s2; /* SSLv2 variables */struct ssl3_state_st *s3; /* SSLv3 variables */struct dtls1_state_st *d1; /* DTLSv1 variables */int read_ahead;        /* Read as many input bytes as possible* (for non-blocking reads) *//* callback that allows applications to peek at protocol messages */void (*msg_callback)(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg);void *msg_callback_arg;int hit;        /* reusing a previous session */X509_VERIFY_PARAM *param;#if 0int purpose;        /* Purpose setting */int trust;        /* Trust setting */
#endif/* crypto */STACK_OF(SSL_CIPHER) *cipher_list;STACK_OF(SSL_CIPHER) *cipher_list_by_id;/* These are the ones being used, the ones in SSL_SESSION are* the ones to be 'copied' into these ones */int mac_flags;EVP_CIPHER_CTX *enc_read_ctx;        /* cryptographic state */EVP_MD_CTX *read_hash;        /* used for mac generation */
#ifndef OPENSSL_NO_COMPCOMP_CTX *expand;            /* uncompress */
#elsechar *expand;
#endifEVP_CIPHER_CTX *enc_write_ctx;        /* cryptographic state */EVP_MD_CTX *write_hash;        /* used for mac generation */
#ifndef OPENSSL_NO_COMPCOMP_CTX *compress;            /* compression */
#elsechar *compress;
#endif/* session info *//* client cert? *//* This is used to hold the server certificate used */struct cert_st /* CERT */ *cert;/* the session_id_context is used to ensure sessions are only reused* in the appropriate context */unsigned int sid_ctx_length;unsigned char sid_ctx[SSL_MAX_SID_CTX_LENGTH];/* This can also be in the session once a session is established */SSL_SESSION *session;/* Default generate session ID callback. */GEN_SESSION_CB generate_session_id;/* Used in SSL2 and SSL3 */int verify_mode;    /* 0 don't care about verify failure.* 1 fail if verify fails */int (*verify_callback)(int ok,X509_STORE_CTX *ctx); /* fail if callback returns 0 */void (*info_callback)(const SSL *ssl,int type,int val); /* optional informational callback */int error;        /* error bytes to be written */int error_code;        /* actual code */#ifndef OPENSSL_NO_KRB5KSSL_CTX *kssl_ctx;     /* Kerberos 5 context */
#endif    /* OPENSSL_NO_KRB5 */#ifndef OPENSSL_NO_PSKunsigned int (*psk_client_callback)(SSL *ssl, const char *hint, char *identity,unsigned int max_identity_len, unsigned char *psk,unsigned int max_psk_len);unsigned int (*psk_server_callback)(SSL *ssl, const char *identity,unsigned char *psk, unsigned int max_psk_len);
#endifSSL_CTX *ctx;/* set this flag to 1 and a sleep(1) is put into all SSL_read()* and SSL_write() calls, good for nbio debuging :-) */int debug;/* extra application data */long verify_result;CRYPTO_EX_DATA ex_data;/* for server side, keep the list of CA_dn we can use */STACK_OF(X509_NAME) *client_CA;int references;unsigned long options; /* protocol behaviour */unsigned long mode; /* API behaviour */long max_cert_list;int first_packet;int client_version;    /* what was passed, used for* SSLv3/TLS rollback check */unsigned int max_send_fragment;
#ifndef OPENSSL_NO_TLSEXT/* TLS extension debug callback */void (*tlsext_debug_cb)(SSL *s, int client_server, int type,unsigned char *data, int len,void *arg);void *tlsext_debug_arg;char *tlsext_hostname;int servername_done;   /* no further mod of servername0 : call the servername extension callback.1 : prepare 2, allow last ack just after in server callback.2 : don't call servername callback, no ack in server hello*//* certificate status request info *//* Status type or -1 if no status type */int tlsext_status_type;/* Expect OCSP CertificateStatus message */int tlsext_status_expected;/* OCSP status request only */STACK_OF(OCSP_RESPID) *tlsext_ocsp_ids;X509_EXTENSIONS *tlsext_ocsp_exts;/* OCSP response received or to be sent */unsigned char *tlsext_ocsp_resp;int tlsext_ocsp_resplen;/* RFC4507 session ticket expected to be received or sent */int tlsext_ticket_expected;
#ifndef OPENSSL_NO_ECsize_t tlsext_ecpointformatlist_length;unsigned char *tlsext_ecpointformatlist; /* our list */size_t tlsext_ellipticcurvelist_length;unsigned char *tlsext_ellipticcurvelist; /* our list */
#endif /* OPENSSL_NO_EC *//* draft-rescorla-tls-opaque-prf-input-00.txt information to be used for handshakes */void *tlsext_opaque_prf_input;size_t tlsext_opaque_prf_input_len;/* TLS Session Ticket extension override */TLS_SESSION_TICKET_EXT *tlsext_session_ticket;/* TLS Session Ticket extension callback */tls_session_ticket_ext_cb_fn tls_session_ticket_ext_cb;void *tls_session_ticket_ext_cb_arg;/* TLS pre-shared secret session resumption */tls_session_secret_cb_fn tls_session_secret_cb;void *tls_session_secret_cb_arg;SSL_CTX * initial_ctx; /* initial ctx, used to store sessions */#ifndef OPENSSL_NO_NEXTPROTONEG/* Next protocol negotiation. For the client, this is the protocol that* we sent in NextProtocol and is set when handling ServerHello* extensions.** For a server, this is the client's selected_protocol from* NextProtocol and is set when handling the NextProtocol message,* before the Finished message. */unsigned char *next_proto_negotiated;unsigned char next_proto_negotiated_len;
#endif#define session_ctx initial_ctxSTACK_OF(SRTP_PROTECTION_PROFILE) *srtp_profiles;  /* What we'll do */SRTP_PROTECTION_PROFILE *srtp_profile;            /* What's been chosen */unsigned int tlsext_heartbeat;  /* Is use of the Heartbeat extension negotiated?0: disabled1: enabled2: enabled, but not allowed to send Requests*/unsigned int tlsext_hb_pending; /* Indicates if a HeartbeatRequest is in flight */unsigned int tlsext_hb_seq;     /* HeartbeatRequest sequence number */
#else
#define session_ctx ctx
#endif /* OPENSSL_NO_TLSEXT */int renegotiate;/* 1 if we are renegotiating.* 2 if we are a server and are inside a handshake* (i.e. not just sending a HelloRequest) */};

转载于:https://www.cnblogs.com/274914765qq/p/4513236.html


本文来自互联网用户投稿,文章观点仅代表作者本人,不代表本站立场,不承担相关法律责任。如若转载,请注明出处。 如若内容造成侵权/违法违规/事实不符,请点击【内容举报】进行投诉反馈!

相关文章

立即
投稿

微信公众账号

微信扫一扫加关注

返回
顶部