SSL_HdskStateReady, /* Handshake is done */
SSL_HdskStateGracefulClose,
SSL_HdskStateErrorClose,
- SSL_HdskStateNoNotifyClose, /* server disconnected with no
- * notify msg */
+ SSL_HdskStateNoNotifyClose, /* Server disconnected with no notify msg */
+ SSL_HdskStateOutOfBandError, /* The caller encountered an error with out-of-band message processing */
} SSLHandshakeState;
#define SSLChangeHdskState(ctx, newState) { ctx->state=newState; }
int writeCipher_ready;
SSLHandshakeState state;
+ OSStatus outOfBandError;
/*
* Prior to successful protocol negotiation, negProtocolVersion
Boolean signalCertRequest;
Boolean signalClientAuth;
Boolean breakOnClientHello;
+ Boolean allowServerIdentityChange;
+ Boolean allowRenegotiation;
+ Boolean enableSessionTickets;
+
+ /* cached configuration buffer */
+ SSLBuffer contextConfigurationBuffer;
/* List of peer-specified supported_signature_algorithms */
unsigned numPeerSigAlgs;
Boolean sslIsSessionActive(const SSLContext *ctx);
-static inline bool sslVersionIsLikeTls12(SSLContext *ctx)
-{
- check(ctx->negProtocolVersion!=SSL_Version_Undetermined);
- return ctx->isDTLS ? ctx->negProtocolVersion > DTLS_Version_1_0 : ctx->negProtocolVersion >= TLS_Version_1_2;
-}
+OSStatus SSLGetSessionConfigurationIdentifier(SSLContext *ctx, SSLBuffer *buffer);
/* This is implemented in tls_callbacks.c */
- int sslGetSessionID(SSLContext *myCtx, SSLBuffer *sessionID);
+int sslGetSessionID(SSLContext *myCtx, SSLBuffer *sessionID);
#ifdef __cplusplus
}