BearSSL
Data Fields
br_ssl_client_certificate Struct Reference

Type for the client certificate, if requested by the server. More...

Data Fields

int auth_type
 Authentication type. More...
 
int hash_id
 Hash function for computing the CertificateVerify. More...
 
const br_x509_certificatechain
 Certificate chain to send to the server. More...
 
size_t chain_len
 Certificate chain length (number of certificates). More...
 

Detailed Description

Type for the client certificate, if requested by the server.

Field Documentation

◆ auth_type

int br_ssl_client_certificate::auth_type

Authentication type.

This is either BR_AUTH_RSA (RSA signature), BR_AUTH_ECDSA (ECDSA signature), or BR_AUTH_ECDH (static ECDH key exchange).

◆ chain

const br_x509_certificate* br_ssl_client_certificate::chain

Certificate chain to send to the server.

This is an array of br_x509_certificate objects, each normally containing a DER-encoded certificate. The client code does not try to decode these elements. If there is no chain to send to the server, then this pointer shall be set to NULL.

◆ chain_len

size_t br_ssl_client_certificate::chain_len

Certificate chain length (number of certificates).

If there is no chain to send to the server, then this value shall be set to 0.

◆ hash_id

int br_ssl_client_certificate::hash_id

Hash function for computing the CertificateVerify.

This is the symbolic identifier for the hash function that will be used to produce the hash of handshake messages, to be signed into the CertificateVerify. For full static ECDH (client and server certificates are both EC in the same curve, and static ECDH is used), this value is set to -1.

Take care that with TLS 1.0 and 1.1, that value MUST match the protocol requirements: value must be 0 (MD5+SHA-1) for a RSA signature, or 2 (SHA-1) for an ECDSA signature. Only TLS 1.2 allows for other hash functions.


The documentation for this struct was generated from the following file: