tlsv1_client_deinit - Deinitialize TLSv1 client connection @conn: TLSv1 client connection data from tlsv1_client_init()
tlsv1_client_established - Check whether connection has been established @conn: TLSv1 client connection data from tlsv1_client_init() Returns: 1 if connection is established, 0 if not
tlsv1_client_prf - Use TLS-PRF to derive keying material @conn: TLSv1 client connection data from tlsv1_client_init() @label: Label (e.g., description of the key) for PRF @context: Optional extra upper-layer context (max len 2^16) @context_len: The length of the context value @server_random_first: seed is 0 = client_random|server_random, 1 = server_random|client_random @out: Buffer for output data from TLS-PRF @out_len: Length of the output buffer Returns: 0 on success, -1 on failure
tlsv1_client_handshake - Process TLS handshake @conn: TLSv1 client connection data from tlsv1_client_init() @in_data: Input data from TLS peer @in_len: Input data length @out_len: Length of the output buffer. @appl_data: Pointer to application data pointer, or %NULL if dropped @appl_data_len: Pointer to variable that is set to appl_data length @need_more_data: Set to 1 if more data would be needed to complete processing Returns: Pointer to output data, %NULL on failure
tlsv1_client_encrypt - Encrypt data into TLS tunnel @conn: TLSv1 client connection data from tlsv1_client_init() @in_data: Pointer to plaintext data to be encrypted @in_len: Input buffer length @out_data: Pointer to output buffer (encrypted TLS data) @out_len: Maximum out_data length Returns: Number of bytes written to out_data, -1 on failure This function is used after TLS handshake has been completed successfully to send data in the encrypted tunnel.
tlsv1_client_get_cipher - Get current cipher name @conn: TLSv1 client connection data from tlsv1_client_init() @buf: Buffer for the cipher name @buflen: buf size Returns: 0 on success, -1 on failure Get the name of the currently used cipher.
tlsv1_client_shutdown - Shutdown TLS connection @conn: TLSv1 client connection data from tlsv1_client_init() Returns: 0 on success, -1 on failure
tlsv1_client_resumed - Was session resumption used @conn: TLSv1 client connection data from tlsv1_client_init() Returns: 1 if current session used session resumption, 0 if not
tlsv1_client_hello_ext - Set TLS extension for ClientHello @conn: TLSv1 client connection data from tlsv1_client_init() @ext_type: Extension type @data: Extension payload (%NULL to remove extension) @data_len: Extension payload length Returns: 0 on success, -1 on failure
tlsv1_client_get_random - Get random data from TLS connection @conn: TLSv1 client connection data from tlsv1_client_init() @keys: Structure of random data (filled on success) Returns: 0 on success, -1 on failure
tlsv1_client_get_keyblock_size - Get TLS key_block size @conn: TLSv1 client connection data from tlsv1_client_init() Returns: Size of the key_block for the negotiated cipher suite or -1 on failure
tlsv1_client_set_cipher_list - Configure acceptable cipher suites @conn: TLSv1 client connection data from tlsv1_client_init() @ciphers: Zero (TLS_CIPHER_NONE) terminated list of allowed ciphers (TLS_CIPHER_*). Returns: 0 on success, -1 on failure
tlsv1_client_set_cred - Set client credentials @conn: TLSv1 client connection data from tlsv1_client_init() @cred: Credentials from tlsv1_cred_alloc() Returns: 0 on success, -1 on failure On success, the client takes ownership of the credentials block and caller must not free it. On failure, caller is responsible for freeing the credential block.
tlsv1_client_set_flags - Set connection flags @conn: TLSv1 client connection data from tlsv1_client_init() @flags: TLS_CONN_* bitfield