]>
Commit | Line | Data |
---|---|---|
453dfd8d EK |
1 | /* |
2 | * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. | |
3 | * | |
440e5d80 RS |
4 | * Licensed under the OpenSSL license (the "License"). You may not use |
5 | * this file except in compliance with the License. You can obtain a copy | |
6 | * in the file LICENSE in the source distribution or at | |
453dfd8d | 7 | * https://www.openssl.org/source/license.html |
453dfd8d EK |
8 | */ |
9 | ||
10 | #ifndef HEADER_HANDSHAKE_HELPER_H | |
11 | #define HEADER_HANDSHAKE_HELPER_H | |
12 | ||
13 | #include "ssl_test_ctx.h" | |
14 | ||
15 | typedef struct handshake_result { | |
16 | ssl_test_result_t result; | |
17 | /* These alerts are in the 2-byte format returned by the info_callback. */ | |
dd8e5a57 | 18 | /* (Latest) alert sent by the client; 0 if no alert. */ |
453dfd8d | 19 | int client_alert_sent; |
dd8e5a57 EK |
20 | /* Number of fatal or close_notify alerts sent. */ |
21 | int client_num_fatal_alerts_sent; | |
22 | /* (Latest) alert received by the server; 0 if no alert. */ | |
453dfd8d | 23 | int client_alert_received; |
dd8e5a57 | 24 | /* (Latest) alert sent by the server; 0 if no alert. */ |
453dfd8d | 25 | int server_alert_sent; |
dd8e5a57 EK |
26 | /* Number of fatal or close_notify alerts sent. */ |
27 | int server_num_fatal_alerts_sent; | |
28 | /* (Latest) alert received by the client; 0 if no alert. */ | |
453dfd8d EK |
29 | int server_alert_received; |
30 | /* Negotiated protocol. On success, these should always match. */ | |
31 | int server_protocol; | |
32 | int client_protocol; | |
5c753de6 | 33 | /* Server connection */ |
81fc33c9 | 34 | ssl_servername_t servername; |
5c753de6 | 35 | /* Session ticket status */ |
81fc33c9 | 36 | ssl_session_ticket_t session_ticket; |
5c753de6 TS |
37 | /* Was this called on the second context? */ |
38 | int session_ticket_do_not_call; | |
ce2cdac2 EK |
39 | char *client_npn_negotiated; |
40 | char *server_npn_negotiated; | |
41 | char *client_alpn_negotiated; | |
42 | char *server_alpn_negotiated; | |
590ed3d7 EK |
43 | /* Was the handshake resumed? */ |
44 | int client_resumed; | |
45 | int server_resumed; | |
b93ad05d DSH |
46 | /* Temporary key type */ |
47 | int tmp_key_type; | |
453dfd8d EK |
48 | } HANDSHAKE_RESULT; |
49 | ||
ce2cdac2 EK |
50 | HANDSHAKE_RESULT *HANDSHAKE_RESULT_new(void); |
51 | void HANDSHAKE_RESULT_free(HANDSHAKE_RESULT *result); | |
52 | ||
453dfd8d | 53 | /* Do a handshake and report some information about the result. */ |
ce2cdac2 | 54 | HANDSHAKE_RESULT *do_handshake(SSL_CTX *server_ctx, SSL_CTX *server2_ctx, |
590ed3d7 | 55 | SSL_CTX *client_ctx, SSL_CTX *resume_server_ctx, |
11279b13 | 56 | SSL_CTX *resume_client_ctx, |
590ed3d7 | 57 | const SSL_TEST_CTX *test_ctx); |
5c753de6 | 58 | |
453dfd8d | 59 | #endif /* HEADER_HANDSHAKE_HELPER_H */ |