Mbed TLS v4.0.0
 All Data Structures Files Functions Variables Typedefs Enumerations Enumerator Macros Groups Pages
ssl.h
Go to the documentation of this file.
1 
6 /*
7  * Copyright The Mbed TLS Contributors
8  * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
9  */
10 #ifndef MBEDTLS_SSL_H
11 #define MBEDTLS_SSL_H
12 #include "mbedtls/platform_util.h"
13 #include "mbedtls/private_access.h"
14 
15 #include "mbedtls/build_info.h"
16 
17 #include "mbedtls/private/bignum.h"
18 #include "mbedtls/private/ecp.h"
19 
21 
22 #if defined(MBEDTLS_X509_CRT_PARSE_C)
23 #include "mbedtls/x509_crt.h"
24 #include "mbedtls/x509_crl.h"
25 #endif
26 
27 #include "mbedtls/md.h"
28 
29 #if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_ANY_ENABLED)
30 #include "mbedtls/private/ecdh.h"
31 #endif
32 
33 #if defined(MBEDTLS_HAVE_TIME)
34 #include "mbedtls/platform_time.h"
35 #endif
36 
37 #include "psa/crypto.h"
38 
39 /*
40  * SSL Error codes
41  */
43 #define MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS -0x7000
44 
45 #define MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE -0x7080
46 
47 #define MBEDTLS_ERR_SSL_BAD_INPUT_DATA PSA_ERROR_INVALID_ARGUMENT
48 
49 #define MBEDTLS_ERR_SSL_INVALID_MAC -0x7180
50 
51 #define MBEDTLS_ERR_SSL_INVALID_RECORD -0x7200
52 
53 #define MBEDTLS_ERR_SSL_CONN_EOF -0x7280
54 
55 #define MBEDTLS_ERR_SSL_DECODE_ERROR -0x7300
56 /* Error space gap */
58 #define MBEDTLS_ERR_SSL_NO_RNG -0x7400
59 
60 #define MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE -0x7480
61 
62 #define MBEDTLS_ERR_SSL_UNSUPPORTED_EXTENSION -0x7500
63 
64 #define MBEDTLS_ERR_SSL_NO_APPLICATION_PROTOCOL -0x7580
65 
66 #define MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED -0x7600
67 
68 #define MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED -0x7680
69 
70 #define MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE -0x7700
71 
72 #define MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE -0x7780
73 
74 #define MBEDTLS_ERR_SSL_UNRECOGNIZED_NAME -0x7800
75 
76 #define MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY -0x7880
77 /* Error space gap */
78 /* Error space gap */
80 #define MBEDTLS_ERR_SSL_BAD_CERTIFICATE -0x7A00
81 /* Error space gap */
86 #define MBEDTLS_ERR_SSL_RECEIVED_NEW_SESSION_TICKET -0x7B00
87 
88 #define MBEDTLS_ERR_SSL_CANNOT_READ_EARLY_DATA -0x7B80
89 
98 #define MBEDTLS_ERR_SSL_RECEIVED_EARLY_DATA -0x7C00
99 
100 #define MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA -0x7C80
101 /* Error space gap */
102 /* Error space gap */
103 /* Error space gap */
104 /* Error space gap */
106 #define MBEDTLS_ERR_SSL_CACHE_ENTRY_NOT_FOUND -0x7E80
107 
108 #define MBEDTLS_ERR_SSL_ALLOC_FAILED PSA_ERROR_INSUFFICIENT_MEMORY
109 
110 #define MBEDTLS_ERR_SSL_HW_ACCEL_FAILED -0x7F80
111 
112 #define MBEDTLS_ERR_SSL_HW_ACCEL_FALLTHROUGH -0x6F80
113 
114 #define MBEDTLS_ERR_SSL_BAD_PROTOCOL_VERSION -0x6E80
115 
116 #define MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE -0x6E00
117 
118 #define MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED -0x6D80
119 
120 #define MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH -0x6D00
121 
122 #define MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY -0x6C80
123 
124 #define MBEDTLS_ERR_SSL_INTERNAL_ERROR -0x6C00
125 
126 #define MBEDTLS_ERR_SSL_COUNTER_WRAPPING -0x6B80
127 
128 #define MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO -0x6B00
129 
130 #define MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED -0x6A80
131 
132 #define MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL PSA_ERROR_BUFFER_TOO_SMALL
133 /* Error space gap */
135 #define MBEDTLS_ERR_SSL_WANT_READ -0x6900
136 
137 #define MBEDTLS_ERR_SSL_WANT_WRITE -0x6880
138 
139 #define MBEDTLS_ERR_SSL_TIMEOUT -0x6800
140 
141 #define MBEDTLS_ERR_SSL_CLIENT_RECONNECT -0x6780
142 
143 #define MBEDTLS_ERR_SSL_UNEXPECTED_RECORD -0x6700
144 
145 #define MBEDTLS_ERR_SSL_NON_FATAL -0x6680
146 
147 #define MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER -0x6600
148 
149 #define MBEDTLS_ERR_SSL_CONTINUE_PROCESSING -0x6580
150 
151 #define MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS -0x6500
152 
153 #define MBEDTLS_ERR_SSL_EARLY_MESSAGE -0x6480
154 /* Error space gap */
155 /* Error space gap */
156 /* Error space gap */
157 /* Error space gap */
158 /* Error space gap */
159 /* Error space gap */
160 /* Error space gap */
161 /* Error space gap */
163 #define MBEDTLS_ERR_SSL_UNEXPECTED_CID -0x6000
164 
165 #define MBEDTLS_ERR_SSL_VERSION_MISMATCH -0x5F00
166 
167 #define MBEDTLS_ERR_SSL_BAD_CONFIG -0x5E80
168 /* Error space gap */
200 #define MBEDTLS_ERR_SSL_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME -0x5D80
201 
202 /*
203  * Constants from RFC 8446 for TLS 1.3 PSK modes
204  *
205  * Those are used in the Pre-Shared Key Exchange Modes extension.
206  * See Section 4.2.9 in RFC 8446.
207  */
208 #define MBEDTLS_SSL_TLS1_3_PSK_MODE_PURE 0 /* Pure PSK-based exchange */
209 #define MBEDTLS_SSL_TLS1_3_PSK_MODE_ECDHE 1 /* PSK+ECDHE-based exchange */
210 
211 /*
212  * TLS 1.3 NamedGroup values
213  *
214  * From RF 8446
215  * enum {
216  * // Elliptic Curve Groups (ECDHE)
217  * secp256r1(0x0017), secp384r1(0x0018), secp521r1(0x0019),
218  * x25519(0x001D), x448(0x001E),
219  * // Finite Field Groups (DHE)
220  * ffdhe2048(0x0100), ffdhe3072(0x0101), ffdhe4096(0x0102),
221  * ffdhe6144(0x0103), ffdhe8192(0x0104),
222  * // Reserved Code Points
223  * ffdhe_private_use(0x01FC..0x01FF),
224  * ecdhe_private_use(0xFE00..0xFEFF),
225  * (0xFFFF)
226  * } NamedGroup;
227  *
228  */
229 
230 /* Elliptic Curve Groups (ECDHE) */
231 #define MBEDTLS_SSL_IANA_TLS_GROUP_NONE 0
232 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP256K1 0x0016
233 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1 0x0017
234 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP384R1 0x0018
235 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP521R1 0x0019
236 #define MBEDTLS_SSL_IANA_TLS_GROUP_BP256R1 0x001A
237 #define MBEDTLS_SSL_IANA_TLS_GROUP_BP384R1 0x001B
238 #define MBEDTLS_SSL_IANA_TLS_GROUP_BP512R1 0x001C
239 #define MBEDTLS_SSL_IANA_TLS_GROUP_X25519 0x001D
240 #define MBEDTLS_SSL_IANA_TLS_GROUP_X448 0x001E
241 /* Finite Field Groups (DHE) */
242 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE2048 0x0100
243 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE3072 0x0101
244 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE4096 0x0102
245 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE6144 0x0103
246 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE8192 0x0104
247 
248 /*
249  * TLS 1.3 Key Exchange Modes
250  *
251  * Mbed TLS internal identifiers for use with the SSL configuration API
252  * mbedtls_ssl_conf_tls13_key_exchange_modes().
253  */
254 
255 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK (1u << 0)
258 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL (1u << 1)
261 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL (1u << 2)
265 /* Convenience macros for sets of key exchanges. */
266 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_ALL \
267  (MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK | \
268  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL | \
269  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL)
270 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_ALL \
271  (MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK | \
272  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL)
273 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ALL \
274  (MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL | \
275  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL)
277 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_NONE (0)
278 
279 /*
280  * Various constants
281  */
282 
284 #define MBEDTLS_SSL_TRANSPORT_STREAM 0
285 #define MBEDTLS_SSL_TRANSPORT_DATAGRAM 1
287 #define MBEDTLS_SSL_MAX_HOST_NAME_LEN 255
288 #define MBEDTLS_SSL_MAX_ALPN_NAME_LEN 255
290 #define MBEDTLS_SSL_MAX_ALPN_LIST_LEN 65535
292 /* RFC 6066 section 4, see also mfl_code_to_length in ssl_tls.c
293  * NONE must be zero so that memset()ing structure to zero works */
294 #define MBEDTLS_SSL_MAX_FRAG_LEN_NONE 0
295 #define MBEDTLS_SSL_MAX_FRAG_LEN_512 1
296 #define MBEDTLS_SSL_MAX_FRAG_LEN_1024 2
297 #define MBEDTLS_SSL_MAX_FRAG_LEN_2048 3
298 #define MBEDTLS_SSL_MAX_FRAG_LEN_4096 4
299 #define MBEDTLS_SSL_MAX_FRAG_LEN_INVALID 5
301 #define MBEDTLS_SSL_IS_CLIENT 0
302 #define MBEDTLS_SSL_IS_SERVER 1
304 #define MBEDTLS_SSL_EXTENDED_MS_DISABLED 0
305 #define MBEDTLS_SSL_EXTENDED_MS_ENABLED 1
306 
307 #define MBEDTLS_SSL_CID_DISABLED 0
308 #define MBEDTLS_SSL_CID_ENABLED 1
309 
310 #define MBEDTLS_SSL_ETM_DISABLED 0
311 #define MBEDTLS_SSL_ETM_ENABLED 1
312 
313 #define MBEDTLS_SSL_COMPRESS_NULL 0
315 #define MBEDTLS_SSL_VERIFY_NONE 0
316 #define MBEDTLS_SSL_VERIFY_OPTIONAL 1
317 #define MBEDTLS_SSL_VERIFY_REQUIRED 2
318 #define MBEDTLS_SSL_VERIFY_UNSET 3 /* Used only for sni_authmode */
320 #define MBEDTLS_SSL_LEGACY_RENEGOTIATION 0
321 #define MBEDTLS_SSL_SECURE_RENEGOTIATION 1
323 #define MBEDTLS_SSL_RENEGOTIATION_DISABLED 0
324 #define MBEDTLS_SSL_RENEGOTIATION_ENABLED 1
325 
326 #define MBEDTLS_SSL_ANTI_REPLAY_DISABLED 0
327 #define MBEDTLS_SSL_ANTI_REPLAY_ENABLED 1
328 
329 #define MBEDTLS_SSL_RENEGOTIATION_NOT_ENFORCED -1
330 #define MBEDTLS_SSL_RENEGO_MAX_RECORDS_DEFAULT 16
331 
332 #define MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION 0
333 #define MBEDTLS_SSL_LEGACY_ALLOW_RENEGOTIATION 1
334 #define MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE 2
336 #define MBEDTLS_SSL_TRUNC_HMAC_DISABLED 0
337 #define MBEDTLS_SSL_TRUNC_HMAC_ENABLED 1
338 #define MBEDTLS_SSL_TRUNCATED_HMAC_LEN 10 /* 80 bits, rfc 6066 section 7 */
340 #define MBEDTLS_SSL_SESSION_TICKETS_DISABLED 0
341 #define MBEDTLS_SSL_SESSION_TICKETS_ENABLED 1
343 #define MBEDTLS_SSL_PRESET_DEFAULT 0
344 #define MBEDTLS_SSL_PRESET_SUITEB 2
345 
346 #define MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED 1
347 #define MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED 0
348 
349 #define MBEDTLS_SSL_EARLY_DATA_DISABLED 0
350 #define MBEDTLS_SSL_EARLY_DATA_ENABLED 1
351 
352 #define MBEDTLS_SSL_DTLS_SRTP_MKI_UNSUPPORTED 0
353 #define MBEDTLS_SSL_DTLS_SRTP_MKI_SUPPORTED 1
354 
355 #define MBEDTLS_SSL_SRV_CIPHERSUITE_ORDER_CLIENT 1
356 #define MBEDTLS_SSL_SRV_CIPHERSUITE_ORDER_SERVER 0
357 
358 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS)
359 #if defined(PSA_WANT_ALG_SHA_384)
360 #define MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN 48
361 #elif defined(PSA_WANT_ALG_SHA_256)
362 #define MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN 32
363 #endif
364 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 && MBEDTLS_SSL_SESSION_TICKETS */
365 /*
366  * Default range for DTLS retransmission timer value, in milliseconds.
367  * RFC 6347 4.2.4.1 says from 1 second to 60 seconds.
368  */
369 #define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MIN 1000
370 #define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MAX 60000
371 
372 /*
373  * Whether early data record should be discarded or not and how.
374  *
375  * The client has indicated early data and the server has rejected them.
376  * The server has then to skip past early data by either:
377  * - attempting to deprotect received records using the handshake traffic
378  * key, discarding records which fail deprotection (up to the configured
379  * max_early_data_size). Once a record is deprotected successfully,
380  * it is treated as the start of the client's second flight and the
381  * server proceeds as with an ordinary 1-RTT handshake.
382  * - skipping all records with an external content type of
383  * "application_data" (indicating that they are encrypted), up to the
384  * configured max_early_data_size. This is the expected behavior if the
385  * server has sent an HelloRetryRequest message. The server ignores
386  * application data message before 2nd ClientHello.
387  */
388 #define MBEDTLS_SSL_EARLY_DATA_NO_DISCARD 0
389 #define MBEDTLS_SSL_EARLY_DATA_TRY_TO_DEPROTECT_AND_DISCARD 1
390 #define MBEDTLS_SSL_EARLY_DATA_DISCARD 2
391 
400 /*
401  * Maximum fragment length in bytes,
402  * determines the size of each of the two internal I/O buffers.
403  *
404  * Note: the RFC defines the default size of SSL / TLS messages. If you
405  * change the value here, other clients / servers may not be able to
406  * communicate with you anymore. Only change this value if you control
407  * both sides of the connection and have it reduced at both sides, or
408  * if you're using the Max Fragment Length extension and you know all your
409  * peers are using it too!
410  */
411 #if !defined(MBEDTLS_SSL_IN_CONTENT_LEN)
412 #define MBEDTLS_SSL_IN_CONTENT_LEN 16384
413 #endif
414 
415 #if !defined(MBEDTLS_SSL_OUT_CONTENT_LEN)
416 #define MBEDTLS_SSL_OUT_CONTENT_LEN 16384
417 #endif
418 
419 /*
420  * Maximum number of heap-allocated bytes for the purpose of
421  * DTLS handshake message reassembly and future message buffering.
422  */
423 #if !defined(MBEDTLS_SSL_DTLS_MAX_BUFFERING)
424 #define MBEDTLS_SSL_DTLS_MAX_BUFFERING 32768
425 #endif
426 
427 /*
428  * Maximum length of CIDs for incoming and outgoing messages.
429  */
430 #if !defined(MBEDTLS_SSL_CID_IN_LEN_MAX)
431 #define MBEDTLS_SSL_CID_IN_LEN_MAX 32
432 #endif
433 
434 #if !defined(MBEDTLS_SSL_CID_OUT_LEN_MAX)
435 #define MBEDTLS_SSL_CID_OUT_LEN_MAX 32
436 #endif
437 
438 #if !defined(MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY)
439 #define MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY 16
440 #endif
441 
442 #if !defined(MBEDTLS_SSL_MAX_EARLY_DATA_SIZE)
443 #define MBEDTLS_SSL_MAX_EARLY_DATA_SIZE 1024
444 #endif
445 
446 #if !defined(MBEDTLS_SSL_TLS1_3_TICKET_AGE_TOLERANCE)
447 #define MBEDTLS_SSL_TLS1_3_TICKET_AGE_TOLERANCE 6000
448 #endif
449 
450 #if !defined(MBEDTLS_SSL_TLS1_3_TICKET_NONCE_LENGTH)
451 #define MBEDTLS_SSL_TLS1_3_TICKET_NONCE_LENGTH 32
452 #endif
453 
454 #if !defined(MBEDTLS_SSL_TLS1_3_DEFAULT_NEW_SESSION_TICKETS)
455 #define MBEDTLS_SSL_TLS1_3_DEFAULT_NEW_SESSION_TICKETS 1
456 #endif
457 
460 /*
461  * Length of the verify data for secure renegotiation
462  */
463 #define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 12
464 
465 /*
466  * Signaling ciphersuite values (SCSV)
467  */
468 #define MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO 0xFF
470 /*
471  * Supported Signature and Hash algorithms (For TLS 1.2)
472  * RFC 5246 section 7.4.1.4.1
473  */
474 #define MBEDTLS_SSL_HASH_NONE 0
475 #define MBEDTLS_SSL_HASH_MD5 1
476 #define MBEDTLS_SSL_HASH_SHA1 2
477 #define MBEDTLS_SSL_HASH_SHA224 3
478 #define MBEDTLS_SSL_HASH_SHA256 4
479 #define MBEDTLS_SSL_HASH_SHA384 5
480 #define MBEDTLS_SSL_HASH_SHA512 6
482 #define MBEDTLS_SSL_SIG_ANON 0
483 #define MBEDTLS_SSL_SIG_RSA 1
484 #define MBEDTLS_SSL_SIG_ECDSA 3
486 /*
487  * TLS 1.3 signature algorithms
488  * RFC 8446, Section 4.2.3
489  */
491 /* RSASSA-PKCS1-v1_5 algorithms */
492 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA256 0x0401
493 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA384 0x0501
494 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA512 0x0601
495 
496 /* ECDSA algorithms */
497 #define MBEDTLS_TLS1_3_SIG_ECDSA_SECP256R1_SHA256 0x0403
498 #define MBEDTLS_TLS1_3_SIG_ECDSA_SECP384R1_SHA384 0x0503
499 #define MBEDTLS_TLS1_3_SIG_ECDSA_SECP521R1_SHA512 0x0603
501 /* RSASSA-PSS algorithms with public key OID rsaEncryption */
502 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA256 0x0804
503 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA384 0x0805
504 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA512 0x0806
506 /* EdDSA algorithms */
507 #define MBEDTLS_TLS1_3_SIG_ED25519 0x0807
508 #define MBEDTLS_TLS1_3_SIG_ED448 0x0808
510 /* RSASSA-PSS algorithms with public key OID RSASSA-PSS */
511 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA256 0x0809
512 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA384 0x080A
513 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA512 0x080B
515 /* LEGACY ALGORITHMS */
516 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA1 0x0201
517 #define MBEDTLS_TLS1_3_SIG_ECDSA_SHA1 0x0203
519 #define MBEDTLS_TLS1_3_SIG_NONE 0x0
520 
521 /*
522  * Client Certificate Types
523  * RFC 5246 section 7.4.4 plus RFC 4492 section 5.5
524  */
525 #define MBEDTLS_SSL_CERT_TYPE_RSA_SIGN 1
526 #define MBEDTLS_SSL_CERT_TYPE_ECDSA_SIGN 64
527 
528 /*
529  * Message, alert and handshake types
530  */
531 #define MBEDTLS_SSL_MSG_CHANGE_CIPHER_SPEC 20
532 #define MBEDTLS_SSL_MSG_ALERT 21
533 #define MBEDTLS_SSL_MSG_HANDSHAKE 22
534 #define MBEDTLS_SSL_MSG_APPLICATION_DATA 23
535 #define MBEDTLS_SSL_MSG_CID 25
536 
537 #define MBEDTLS_SSL_ALERT_LEVEL_WARNING 1
538 #define MBEDTLS_SSL_ALERT_LEVEL_FATAL 2
540 #define MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY 0 /* 0x00 */
541 #define MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE 10 /* 0x0A */
542 #define MBEDTLS_SSL_ALERT_MSG_BAD_RECORD_MAC 20 /* 0x14 */
543 #define MBEDTLS_SSL_ALERT_MSG_DECRYPTION_FAILED 21 /* 0x15 */
544 #define MBEDTLS_SSL_ALERT_MSG_RECORD_OVERFLOW 22 /* 0x16 */
545 #define MBEDTLS_SSL_ALERT_MSG_DECOMPRESSION_FAILURE 30 /* 0x1E */
546 #define MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE 40 /* 0x28 */
547 #define MBEDTLS_SSL_ALERT_MSG_NO_CERT 41 /* 0x29 */
548 #define MBEDTLS_SSL_ALERT_MSG_BAD_CERT 42 /* 0x2A */
549 #define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT 43 /* 0x2B */
550 #define MBEDTLS_SSL_ALERT_MSG_CERT_REVOKED 44 /* 0x2C */
551 #define MBEDTLS_SSL_ALERT_MSG_CERT_EXPIRED 45 /* 0x2D */
552 #define MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN 46 /* 0x2E */
553 #define MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER 47 /* 0x2F */
554 #define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA 48 /* 0x30 */
555 #define MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED 49 /* 0x31 */
556 #define MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR 50 /* 0x32 */
557 #define MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR 51 /* 0x33 */
558 #define MBEDTLS_SSL_ALERT_MSG_EXPORT_RESTRICTION 60 /* 0x3C */
559 #define MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION 70 /* 0x46 */
560 #define MBEDTLS_SSL_ALERT_MSG_INSUFFICIENT_SECURITY 71 /* 0x47 */
561 #define MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR 80 /* 0x50 */
562 #define MBEDTLS_SSL_ALERT_MSG_INAPROPRIATE_FALLBACK 86 /* 0x56 */
563 #define MBEDTLS_SSL_ALERT_MSG_USER_CANCELED 90 /* 0x5A */
564 #define MBEDTLS_SSL_ALERT_MSG_NO_RENEGOTIATION 100 /* 0x64 */
565 #define MBEDTLS_SSL_ALERT_MSG_MISSING_EXTENSION 109 /* 0x6d -- new in TLS 1.3 */
566 #define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT 110 /* 0x6E */
567 #define MBEDTLS_SSL_ALERT_MSG_UNRECOGNIZED_NAME 112 /* 0x70 */
568 #define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_PSK_IDENTITY 115 /* 0x73 */
569 #define MBEDTLS_SSL_ALERT_MSG_CERT_REQUIRED 116 /* 0x74 */
570 #define MBEDTLS_SSL_ALERT_MSG_NO_APPLICATION_PROTOCOL 120 /* 0x78 */
572 #define MBEDTLS_SSL_HS_HELLO_REQUEST 0
573 #define MBEDTLS_SSL_HS_CLIENT_HELLO 1
574 #define MBEDTLS_SSL_HS_SERVER_HELLO 2
575 #define MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST 3
576 #define MBEDTLS_SSL_HS_NEW_SESSION_TICKET 4
577 #define MBEDTLS_SSL_HS_END_OF_EARLY_DATA 5
578 #define MBEDTLS_SSL_HS_ENCRYPTED_EXTENSIONS 8
579 #define MBEDTLS_SSL_HS_CERTIFICATE 11
580 #define MBEDTLS_SSL_HS_SERVER_KEY_EXCHANGE 12
581 #define MBEDTLS_SSL_HS_CERTIFICATE_REQUEST 13
582 #define MBEDTLS_SSL_HS_SERVER_HELLO_DONE 14
583 #define MBEDTLS_SSL_HS_CERTIFICATE_VERIFY 15
584 #define MBEDTLS_SSL_HS_CLIENT_KEY_EXCHANGE 16
585 #define MBEDTLS_SSL_HS_FINISHED 20
586 #define MBEDTLS_SSL_HS_MESSAGE_HASH 254
588 /*
589  * TLS extensions
590  */
591 #define MBEDTLS_TLS_EXT_SERVERNAME 0
592 #define MBEDTLS_TLS_EXT_SERVERNAME_HOSTNAME 0
593 
594 #define MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH 1
595 
596 #define MBEDTLS_TLS_EXT_TRUNCATED_HMAC 4
597 #define MBEDTLS_TLS_EXT_STATUS_REQUEST 5 /* RFC 6066 TLS 1.2 and 1.3 */
599 #define MBEDTLS_TLS_EXT_SUPPORTED_ELLIPTIC_CURVES 10
600 #define MBEDTLS_TLS_EXT_SUPPORTED_GROUPS 10 /* RFC 8422,7919 TLS 1.2 and 1.3 */
601 #define MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS 11
603 #define MBEDTLS_TLS_EXT_SIG_ALG 13 /* RFC 8446 TLS 1.3 */
604 #define MBEDTLS_TLS_EXT_USE_SRTP 14
605 #define MBEDTLS_TLS_EXT_HEARTBEAT 15 /* RFC 6520 TLS 1.2 and 1.3 */
606 #define MBEDTLS_TLS_EXT_ALPN 16
608 #define MBEDTLS_TLS_EXT_SCT 18 /* RFC 6962 TLS 1.2 and 1.3 */
609 #define MBEDTLS_TLS_EXT_CLI_CERT_TYPE 19 /* RFC 7250 TLS 1.2 and 1.3 */
610 #define MBEDTLS_TLS_EXT_SERV_CERT_TYPE 20 /* RFC 7250 TLS 1.2 and 1.3 */
611 #define MBEDTLS_TLS_EXT_PADDING 21 /* RFC 7685 TLS 1.2 and 1.3 */
612 #define MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC 22 /* 0x16 */
613 #define MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET 0x0017 /* 23 */
615 #define MBEDTLS_TLS_EXT_RECORD_SIZE_LIMIT 28 /* RFC 8449 (implemented for TLS 1.3 only) */
617 #define MBEDTLS_TLS_EXT_SESSION_TICKET 35
619 #define MBEDTLS_TLS_EXT_PRE_SHARED_KEY 41 /* RFC 8446 TLS 1.3 */
620 #define MBEDTLS_TLS_EXT_EARLY_DATA 42 /* RFC 8446 TLS 1.3 */
621 #define MBEDTLS_TLS_EXT_SUPPORTED_VERSIONS 43 /* RFC 8446 TLS 1.3 */
622 #define MBEDTLS_TLS_EXT_COOKIE 44 /* RFC 8446 TLS 1.3 */
623 #define MBEDTLS_TLS_EXT_PSK_KEY_EXCHANGE_MODES 45 /* RFC 8446 TLS 1.3 */
624 
625 #define MBEDTLS_TLS_EXT_CERT_AUTH 47 /* RFC 8446 TLS 1.3 */
626 #define MBEDTLS_TLS_EXT_OID_FILTERS 48 /* RFC 8446 TLS 1.3 */
627 #define MBEDTLS_TLS_EXT_POST_HANDSHAKE_AUTH 49 /* RFC 8446 TLS 1.3 */
628 #define MBEDTLS_TLS_EXT_SIG_ALG_CERT 50 /* RFC 8446 TLS 1.3 */
629 #define MBEDTLS_TLS_EXT_KEY_SHARE 51 /* RFC 8446 TLS 1.3 */
630 
631 #define MBEDTLS_TLS_EXT_CID 54 /* RFC 9146 DTLS 1.2 CID */
633 #define MBEDTLS_TLS_EXT_ECJPAKE_KKPP 256 /* experimental */
635 #define MBEDTLS_TLS_EXT_RENEGOTIATION_INFO 0xFF01
636 
637 /*
638  * Size defines
639  */
640 #if !defined(MBEDTLS_PSK_MAX_LEN)
641 /*
642  * If the library supports TLS 1.3 tickets and the cipher suite
643  * TLS1-3-AES-256-GCM-SHA384, set the PSK maximum length to 48 instead of 32.
644  * That way, the TLS 1.3 client and server are able to resume sessions where
645  * the cipher suite is TLS1-3-AES-256-GCM-SHA384 (pre-shared keys are 48
646  * bytes long in that case).
647  */
648 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && \
649  defined(MBEDTLS_SSL_SESSION_TICKETS) && \
650  defined(PSA_WANT_KEY_TYPE_AES) && defined(PSA_WANT_ALG_GCM) && \
651  defined(PSA_WANT_ALG_SHA_384)
652 #define MBEDTLS_PSK_MAX_LEN 48 /* 384 bits */
653 #else
654 #define MBEDTLS_PSK_MAX_LEN 32 /* 256 bits */
655 #endif
656 #endif /* !MBEDTLS_PSK_MAX_LEN */
657 
658 /* Dummy type used only for its size */
660  unsigned char dummy; /* Make the union non-empty even with SSL disabled */
661 #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
662  defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
663  unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]; /* RFC 4492 5.10 */
664 #endif
665 #if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
666  unsigned char _pms_psk[4 + 2 * MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 2 */
667 #endif
668 #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
669  unsigned char _pms_ecdhe_psk[4 + MBEDTLS_ECP_MAX_BYTES
670  + MBEDTLS_PSK_MAX_LEN]; /* RFC 5489 2 */
671 #endif
672 #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
673  unsigned char _pms_ecjpake[32]; /* Thread spec: SHA-256 output */
674 #endif
675 };
677 #define MBEDTLS_PREMASTER_SIZE sizeof(union mbedtls_ssl_premaster_secret)
678 
679 #define MBEDTLS_TLS1_3_MD_MAX_SIZE PSA_HASH_MAX_SIZE
680 
681 
682 /* Length in number of bytes of the TLS sequence number */
683 #define MBEDTLS_SSL_SEQUENCE_NUMBER_LEN 8
684 
685 /* Helper to state that client_random and server_random need to be stored
686  * after the handshake is complete. This is required for context serialization
687  * and for the keying material exporter in TLS 1.2. */
688 #if defined(MBEDTLS_SSL_CONTEXT_SERIALIZATION) || \
689  (defined(MBEDTLS_SSL_KEYING_MATERIAL_EXPORT) && defined(MBEDTLS_SSL_PROTO_TLS1_2))
690 #define MBEDTLS_SSL_KEEP_RANDBYTES
691 #endif
692 
693 #ifdef __cplusplus
694 extern "C" {
695 #endif
697 /*
698  * SSL state machine
699  */
700 typedef enum {
731 }
734 /*
735  * Early data status, client side only.
736  */
737 
738 #if defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_CLI_C)
739 typedef enum {
740 /*
741  * See documentation of mbedtls_ssl_get_early_data_status().
742  */
747 #endif /* MBEDTLS_SSL_EARLY_DATA && MBEDTLS_SSL_CLI_C */
748 
766 typedef int mbedtls_ssl_send_t(void *ctx,
767  const unsigned char *buf,
768  size_t len);
769 
790 typedef int mbedtls_ssl_recv_t(void *ctx,
791  unsigned char *buf,
792  size_t len);
793 
816 typedef int mbedtls_ssl_recv_timeout_t(void *ctx,
817  unsigned char *buf,
818  size_t len,
819  uint32_t timeout);
842 typedef void mbedtls_ssl_set_timer_t(void *ctx,
843  uint32_t int_ms,
844  uint32_t fin_ms);
845 
857 typedef int mbedtls_ssl_get_timer_t(void *ctx);
858 
859 /* Defined below */
864 /* Defined in library/ssl_misc.h */
867 #if defined(MBEDTLS_X509_CRT_PARSE_C)
869 #endif
870 #if defined(MBEDTLS_SSL_PROTO_DTLS)
872 #endif
873 
874 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS)
875 #define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_RESUMPTION \
876  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK /* 1U << 0 */
877 #define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_EPHEMERAL_RESUMPTION \
878  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL /* 1U << 2 */
879 #define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA (1U << 3)
880 
881 #define MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK \
882  (MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_RESUMPTION | \
883  MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_EPHEMERAL_RESUMPTION | \
884  MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA)
885 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 && MBEDTLS_SSL_SESSION_TICKETS */
886 
910 typedef int mbedtls_ssl_cache_get_t(void *data,
911  unsigned char const *session_id,
912  size_t session_id_len,
913  mbedtls_ssl_session *session);
932 typedef int mbedtls_ssl_cache_set_t(void *data,
933  unsigned char const *session_id,
934  size_t session_id_len,
935  const mbedtls_ssl_session *session);
936 
937 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
938 #if defined(MBEDTLS_X509_CRT_PARSE_C)
939 
1001  mbedtls_x509_crt *cert,
1002  mbedtls_md_type_t md_alg,
1003  const unsigned char *hash,
1004  size_t hash_len);
1005 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1049  unsigned char *output,
1050  size_t *output_len,
1051  size_t output_size);
1052 
1071 #endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
1072 
1073 #if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
1074  !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
1075 #define MBEDTLS_SSL_PEER_CERT_DIGEST_MAX_LEN 48
1076 #if defined(PSA_WANT_ALG_SHA_256)
1077 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA256
1078 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 32
1079 #elif defined(PSA_WANT_ALG_SHA_384)
1080 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA384
1081 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 48
1082 #elif defined(PSA_WANT_ALG_SHA_1)
1083 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA1
1084 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 20
1085 #else
1086 /* This is already checked in check_config.h, but be sure. */
1087 #error "Bad configuration - need SHA-1, SHA-256 or SHA-512 enabled to compute digest of peer CRT."
1088 #endif
1089 #endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED &&
1090  !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1091 
1092 typedef struct {
1093  unsigned char client_application_traffic_secret_N[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1094  unsigned char server_application_traffic_secret_N[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1095  unsigned char exporter_master_secret[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1096  unsigned char resumption_master_secret[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1099 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1101 #define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH 255
1102 #define MBEDTLS_TLS_SRTP_MAX_PROFILE_LIST_LENGTH 4
1103 /*
1104  * For code readability use a typedef for DTLS-SRTP profiles
1105  *
1106  * Use_srtp extension protection profiles values as defined in
1107  * http://www.iana.org/assignments/srtp-protection/srtp-protection.xhtml
1108  *
1109  * Reminder: if this list is expanded mbedtls_ssl_check_srtp_profile_value
1110  * must be updated too.
1111  */
1112 #define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80 ((uint16_t) 0x0001)
1113 #define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32 ((uint16_t) 0x0002)
1114 #define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80 ((uint16_t) 0x0005)
1115 #define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32 ((uint16_t) 0x0006)
1116 /* This one is not iana defined, but for code readability. */
1117 #define MBEDTLS_TLS_SRTP_UNSET ((uint16_t) 0x0000)
1119 typedef uint16_t mbedtls_ssl_srtp_profile;
1123  mbedtls_ssl_srtp_profile MBEDTLS_PRIVATE(chosen_dtls_srtp_profile);
1125  uint16_t MBEDTLS_PRIVATE(mki_len);
1127  unsigned char MBEDTLS_PRIVATE(mki_value)[MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH];
1128 }
1130 
1131 #endif /* MBEDTLS_SSL_DTLS_SRTP */
1132 
1134 typedef enum {
1136  MBEDTLS_SSL_VERSION_TLS1_2 = 0x0303,
1137  MBEDTLS_SSL_VERSION_TLS1_3 = 0x0304,
1139 
1140 /*
1141  * This structure is used for storing current session data.
1142  *
1143  * Note: when changing this definition, we need to check and update:
1144  * - in tests/suites/test_suite_ssl.function:
1145  * ssl_populate_session() and ssl_serialize_session_save_load()
1146  * - in library/ssl_tls.c:
1147  * mbedtls_ssl_session_init() and mbedtls_ssl_session_free()
1148  * mbedtls_ssl_session_save() and ssl_session_load()
1149  * ssl_session_copy()
1150  */
1151 struct mbedtls_ssl_session {
1152 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1153  unsigned char MBEDTLS_PRIVATE(mfl_code);
1154 #endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
1155 
1157 #if defined(MBEDTLS_SSL_RECORD_SIZE_LIMIT)
1158  uint16_t MBEDTLS_PRIVATE(record_size_limit);
1159 #endif /* MBEDTLS_SSL_RECORD_SIZE_LIMIT */
1160 
1161  unsigned char MBEDTLS_PRIVATE(exported);
1162  uint8_t MBEDTLS_PRIVATE(endpoint);
1167  mbedtls_ssl_protocol_version MBEDTLS_PRIVATE(tls_version);
1169 #if defined(MBEDTLS_HAVE_TIME)
1170  mbedtls_time_t MBEDTLS_PRIVATE(start);
1171 #endif
1172  int MBEDTLS_PRIVATE(ciphersuite);
1173  size_t MBEDTLS_PRIVATE(id_len);
1174  unsigned char MBEDTLS_PRIVATE(id)[32];
1175  unsigned char MBEDTLS_PRIVATE(master)[48];
1177 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1178 #if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
1179  mbedtls_x509_crt *MBEDTLS_PRIVATE(peer_cert);
1180 #else /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1183  unsigned char *MBEDTLS_PRIVATE(peer_cert_digest);
1184  size_t MBEDTLS_PRIVATE(peer_cert_digest_len);
1185  mbedtls_md_type_t MBEDTLS_PRIVATE(peer_cert_digest_type);
1186 #endif /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1187 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1188  uint32_t MBEDTLS_PRIVATE(verify_result);
1190 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
1191  unsigned char *MBEDTLS_PRIVATE(ticket);
1192  size_t MBEDTLS_PRIVATE(ticket_len);
1193  uint32_t MBEDTLS_PRIVATE(ticket_lifetime);
1194 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_CLI_C */
1195 
1196 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C) && \
1197  defined(MBEDTLS_HAVE_TIME)
1214  mbedtls_ms_time_t MBEDTLS_PRIVATE(ticket_creation_time);
1215 #endif
1216 
1217 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS)
1218  uint32_t MBEDTLS_PRIVATE(ticket_age_add);
1219  uint8_t MBEDTLS_PRIVATE(ticket_flags);
1220  uint8_t MBEDTLS_PRIVATE(resumption_key_len);
1221  unsigned char MBEDTLS_PRIVATE(resumption_key)[MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN];
1222 
1223 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION) && defined(MBEDTLS_SSL_CLI_C)
1224  char *MBEDTLS_PRIVATE(hostname);
1225 #endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION && MBEDTLS_SSL_CLI_C */
1227 #if defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_ALPN) && defined(MBEDTLS_SSL_SRV_C)
1228  char *MBEDTLS_PRIVATE(ticket_alpn);
1230 #endif
1231 
1232 #if defined(MBEDTLS_HAVE_TIME) && defined(MBEDTLS_SSL_CLI_C)
1233 
1234  mbedtls_ms_time_t MBEDTLS_PRIVATE(ticket_reception_time);
1235 #endif
1236 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 && MBEDTLS_SSL_SESSION_TICKETS */
1237 
1238 #if defined(MBEDTLS_SSL_EARLY_DATA)
1239  uint32_t MBEDTLS_PRIVATE(max_early_data_size);
1240 #endif
1241 
1242 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1243  int MBEDTLS_PRIVATE(encrypt_then_mac);
1244 #endif
1246 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1247  mbedtls_ssl_tls13_application_secrets MBEDTLS_PRIVATE(app_secrets);
1248 #endif
1249 };
1250 
1251 /*
1252  * Identifiers for PRFs used in various versions of TLS.
1253  */
1254 typedef enum {
1263 typedef enum {
1265 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1272 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1290 typedef void mbedtls_ssl_export_keys_t(void *p_expkey,
1292  const unsigned char *secret,
1293  size_t secret_len,
1294  const unsigned char client_random[32],
1295  const unsigned char server_random[32],
1296  mbedtls_tls_prf_types tls_prf_type);
1297 
1298 #if defined(MBEDTLS_SSL_SRV_C)
1299 
1314 typedef int (*mbedtls_ssl_hs_cb_t)(mbedtls_ssl_context *ssl);
1315 #endif
1316 
1317 /* A type for storing user data in a library structure.
1318  *
1319  * The representation of type may change in future versions of the library.
1320  * Only the behaviors guaranteed by documented accessor functions are
1321  * guaranteed to remain stable.
1322  */
1323 typedef union {
1324  uintptr_t n; /* typically a handle to an associated object */
1325  void *p; /* typically a pointer to extra data */
1327 
1332  /* Group items mostly by size. This helps to reduce memory wasted to
1333  * padding. It also helps to keep smaller fields early in the structure,
1334  * so that elements tend to be in the 128-element direct access window
1335  * on Arm Thumb, which reduces the code size. */
1336 
1337  mbedtls_ssl_protocol_version MBEDTLS_PRIVATE(max_tls_version);
1338  mbedtls_ssl_protocol_version MBEDTLS_PRIVATE(min_tls_version);
1340  /*
1341  * Flags (could be bit-fields to save RAM, but separate bytes make
1342  * the code smaller on architectures with an instruction for direct
1343  * byte access).
1344  */
1345 
1346  uint8_t MBEDTLS_PRIVATE(endpoint);
1347  uint8_t MBEDTLS_PRIVATE(transport);
1348  uint8_t MBEDTLS_PRIVATE(authmode);
1349  /* needed even with renego disabled for LEGACY_BREAK_HANDSHAKE */
1350  uint8_t MBEDTLS_PRIVATE(allow_legacy_renegotiation);
1351 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1352  uint8_t MBEDTLS_PRIVATE(mfl_code);
1354 #endif
1355 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1356  uint8_t MBEDTLS_PRIVATE(encrypt_then_mac);
1357 #endif
1358 #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
1359  uint8_t MBEDTLS_PRIVATE(extended_ms);
1360 #endif
1361 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1362  uint8_t MBEDTLS_PRIVATE(anti_replay);
1363 #endif
1364 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1365  uint8_t MBEDTLS_PRIVATE(disable_renegotiation);
1366 #endif
1367 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
1368  defined(MBEDTLS_SSL_CLI_C)
1369  uint8_t MBEDTLS_PRIVATE(session_tickets);
1370 #endif
1372 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
1373  defined(MBEDTLS_SSL_SRV_C) && \
1374  defined(MBEDTLS_SSL_PROTO_TLS1_3)
1375  uint16_t MBEDTLS_PRIVATE(new_session_tickets_count);
1376 #endif
1377 
1378 #if defined(MBEDTLS_SSL_SRV_C)
1379  uint8_t MBEDTLS_PRIVATE(cert_req_ca_list);
1381  uint8_t MBEDTLS_PRIVATE(respect_cli_pref);
1384 #endif
1385 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1386  uint8_t MBEDTLS_PRIVATE(ignore_unexpected_cid);
1389 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1390 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1391  uint8_t MBEDTLS_PRIVATE(dtls_srtp_mki_support); /* support having mki_value
1392  in the use_srtp extension? */
1393 #endif
1394 
1395  /*
1396  * Pointers
1397  */
1398 
1400  const int *MBEDTLS_PRIVATE(ciphersuite_list);
1401 
1402 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1403 
1404  int MBEDTLS_PRIVATE(tls13_kex_modes);
1405 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1408  void(*MBEDTLS_PRIVATE(f_dbg))(void *, int, const char *, int, const char *);
1409  void *MBEDTLS_PRIVATE(p_dbg);
1412  mbedtls_ssl_cache_get_t *MBEDTLS_PRIVATE(f_get_cache);
1414  mbedtls_ssl_cache_set_t *MBEDTLS_PRIVATE(f_set_cache);
1415  void *MBEDTLS_PRIVATE(p_cache);
1417 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
1419  int(*MBEDTLS_PRIVATE(f_sni))(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
1420  void *MBEDTLS_PRIVATE(p_sni);
1421 #endif
1422 
1423 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1424 
1425  int(*MBEDTLS_PRIVATE(f_vrfy))(void *, mbedtls_x509_crt *, int, uint32_t *);
1426  void *MBEDTLS_PRIVATE(p_vrfy);
1427 #endif
1428 
1429 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED)
1430 #if defined(MBEDTLS_SSL_SRV_C)
1432  int(*MBEDTLS_PRIVATE(f_psk))(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
1433  void *MBEDTLS_PRIVATE(p_psk);
1434 #endif
1435 #endif
1436 
1437 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1439  int(*MBEDTLS_PRIVATE(f_cookie_write))(void *, unsigned char **, unsigned char *,
1440  const unsigned char *, size_t);
1442  int(*MBEDTLS_PRIVATE(f_cookie_check))(void *, const unsigned char *, size_t,
1443  const unsigned char *, size_t);
1444  void *MBEDTLS_PRIVATE(p_cookie);
1445 #endif
1446 
1447 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
1449  int(*MBEDTLS_PRIVATE(f_ticket_write))(void *, const mbedtls_ssl_session *,
1450  unsigned char *, const unsigned char *, size_t *,
1451  uint32_t *);
1453  int(*MBEDTLS_PRIVATE(f_ticket_parse))(void *, mbedtls_ssl_session *, unsigned char *, size_t);
1454  void *MBEDTLS_PRIVATE(p_ticket);
1455 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
1456 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1457  size_t MBEDTLS_PRIVATE(cid_len);
1458 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1460 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1461  const mbedtls_x509_crt_profile *MBEDTLS_PRIVATE(cert_profile);
1462  mbedtls_ssl_key_cert *MBEDTLS_PRIVATE(key_cert);
1463  mbedtls_x509_crt *MBEDTLS_PRIVATE(ca_chain);
1464  mbedtls_x509_crl *MBEDTLS_PRIVATE(ca_crl);
1465 #if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
1466  mbedtls_x509_crt_ca_cb_t MBEDTLS_PRIVATE(f_ca_cb);
1467  void *MBEDTLS_PRIVATE(p_ca_cb);
1468 #endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
1469 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1471 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
1472 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1473  mbedtls_ssl_async_sign_t *MBEDTLS_PRIVATE(f_async_sign_start);
1474 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1475  mbedtls_ssl_async_resume_t *MBEDTLS_PRIVATE(f_async_resume);
1476  mbedtls_ssl_async_cancel_t *MBEDTLS_PRIVATE(f_async_cancel);
1477  void *MBEDTLS_PRIVATE(p_async_config_data);
1478 #endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
1480 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
1481  const uint16_t *MBEDTLS_PRIVATE(sig_algs);
1482 #endif /* MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
1484  const uint16_t *MBEDTLS_PRIVATE(group_list);
1486 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED)
1488  mbedtls_svc_key_id_t MBEDTLS_PRIVATE(psk_opaque);
1494  unsigned char *MBEDTLS_PRIVATE(psk);
1498  size_t MBEDTLS_PRIVATE(psk_len);
1504  unsigned char *MBEDTLS_PRIVATE(psk_identity);
1509  size_t MBEDTLS_PRIVATE(psk_identity_len);
1515 #endif /* MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED */
1516 
1517 #if defined(MBEDTLS_SSL_EARLY_DATA)
1518  int MBEDTLS_PRIVATE(early_data_enabled);
1522 #if defined(MBEDTLS_SSL_SRV_C)
1523  /* The maximum amount of 0-RTT data. RFC 8446 section 4.6.1 */
1524  uint32_t MBEDTLS_PRIVATE(max_early_data_size);
1525 #endif /* MBEDTLS_SSL_SRV_C */
1526 
1527 #endif /* MBEDTLS_SSL_EARLY_DATA */
1528 
1529 #if defined(MBEDTLS_SSL_ALPN)
1530  const char *const *MBEDTLS_PRIVATE(alpn_list);
1531 #endif
1532 
1533 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1534 
1535  const mbedtls_ssl_srtp_profile *MBEDTLS_PRIVATE(dtls_srtp_profile_list);
1537  size_t MBEDTLS_PRIVATE(dtls_srtp_profile_list_len);
1538 #endif /* MBEDTLS_SSL_DTLS_SRTP */
1539 
1540  /*
1541  * Numerical settings (int)
1542  */
1544  uint32_t MBEDTLS_PRIVATE(read_timeout);
1546 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1547  uint32_t MBEDTLS_PRIVATE(hs_timeout_min);
1549  uint32_t MBEDTLS_PRIVATE(hs_timeout_max);
1551 #endif
1552 
1553 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1554  int MBEDTLS_PRIVATE(renego_max_records);
1555  unsigned char MBEDTLS_PRIVATE(renego_period)[8];
1557 #endif
1558 
1559  unsigned int MBEDTLS_PRIVATE(badmac_limit);
1566  mbedtls_ssl_user_data_t MBEDTLS_PRIVATE(user_data);
1567 
1568 #if defined(MBEDTLS_SSL_SRV_C)
1569  mbedtls_ssl_hs_cb_t MBEDTLS_PRIVATE(f_cert_cb);
1570 #endif /* MBEDTLS_SSL_SRV_C */
1571 
1572 #if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
1573  const mbedtls_x509_crt *MBEDTLS_PRIVATE(dn_hints);
1574 #endif
1575 };
1576 
1577 struct mbedtls_ssl_context {
1578  const mbedtls_ssl_config *MBEDTLS_PRIVATE(conf);
1580  /*
1581  * Miscellaneous
1582  */
1583  int MBEDTLS_PRIVATE(state);
1590  uint32_t MBEDTLS_PRIVATE(flags);
1591 
1592 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1593  int MBEDTLS_PRIVATE(renego_status);
1594  int MBEDTLS_PRIVATE(renego_records_seen);
1597 #endif /* MBEDTLS_SSL_RENEGOTIATION */
1598 
1615  mbedtls_ssl_protocol_version MBEDTLS_PRIVATE(tls_version);
1616 
1617 #if defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_CLI_C)
1618 
1622  int MBEDTLS_PRIVATE(early_data_state);
1623 #endif
1624 
1625  unsigned MBEDTLS_PRIVATE(badmac_seen);
1627 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1629  int(*MBEDTLS_PRIVATE(f_vrfy))(void *, mbedtls_x509_crt *, int, uint32_t *);
1630  void *MBEDTLS_PRIVATE(p_vrfy);
1631 #endif
1632 
1633  mbedtls_ssl_send_t *MBEDTLS_PRIVATE(f_send);
1634  mbedtls_ssl_recv_t *MBEDTLS_PRIVATE(f_recv);
1635  mbedtls_ssl_recv_timeout_t *MBEDTLS_PRIVATE(f_recv_timeout);
1638  void *MBEDTLS_PRIVATE(p_bio);
1640  /*
1641  * Session layer
1642  */
1643  mbedtls_ssl_session *MBEDTLS_PRIVATE(session_in);
1644  mbedtls_ssl_session *MBEDTLS_PRIVATE(session_out);
1645  mbedtls_ssl_session *MBEDTLS_PRIVATE(session);
1646  mbedtls_ssl_session *MBEDTLS_PRIVATE(session_negotiate);
1648  mbedtls_ssl_handshake_params *MBEDTLS_PRIVATE(handshake);
1651  /*
1652  * Record layer transformations
1653  */
1654  mbedtls_ssl_transform *MBEDTLS_PRIVATE(transform_in);
1657  mbedtls_ssl_transform *MBEDTLS_PRIVATE(transform_out);
1660  mbedtls_ssl_transform *MBEDTLS_PRIVATE(transform);
1663 #if defined(MBEDTLS_SSL_PROTO_TLS1_2)
1664  mbedtls_ssl_transform *MBEDTLS_PRIVATE(transform_negotiate);
1667 #endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
1668 
1669 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1672  mbedtls_ssl_transform *MBEDTLS_PRIVATE(transform_application);
1673 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1674 
1675  /*
1676  * Timers
1677  */
1678  void *MBEDTLS_PRIVATE(p_timer);
1680  mbedtls_ssl_set_timer_t *MBEDTLS_PRIVATE(f_set_timer);
1681  mbedtls_ssl_get_timer_t *MBEDTLS_PRIVATE(f_get_timer);
1683  /*
1684  * Record layer (incoming data)
1685  */
1686  unsigned char *MBEDTLS_PRIVATE(in_buf);
1687  unsigned char *MBEDTLS_PRIVATE(in_ctr);
1690  unsigned char *MBEDTLS_PRIVATE(in_hdr);
1691 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1692  unsigned char *MBEDTLS_PRIVATE(in_cid);
1694 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1695  unsigned char *MBEDTLS_PRIVATE(in_len);
1696  unsigned char *MBEDTLS_PRIVATE(in_iv);
1697  unsigned char *MBEDTLS_PRIVATE(in_msg);
1698  unsigned char *MBEDTLS_PRIVATE(in_offt);
1700  int MBEDTLS_PRIVATE(in_msgtype);
1701  size_t MBEDTLS_PRIVATE(in_msglen);
1702  size_t MBEDTLS_PRIVATE(in_left);
1703 #if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1704  size_t MBEDTLS_PRIVATE(in_buf_len);
1705 #endif
1706 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1707  uint16_t MBEDTLS_PRIVATE(in_epoch);
1708  size_t MBEDTLS_PRIVATE(next_record_offset);
1710 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1711 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1712  uint64_t MBEDTLS_PRIVATE(in_window_top);
1713  uint64_t MBEDTLS_PRIVATE(in_window);
1714 #endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
1715 
1716  size_t MBEDTLS_PRIVATE(in_hslen);
1718  size_t MBEDTLS_PRIVATE(in_hsfraglen);
1720  int MBEDTLS_PRIVATE(nb_zero);
1722  int MBEDTLS_PRIVATE(keep_current_message);
1725  /* The following three variables indicate if and, if yes,
1726  * what kind of alert is pending to be sent.
1727  */
1728  unsigned char MBEDTLS_PRIVATE(send_alert);
1732  unsigned char MBEDTLS_PRIVATE(alert_type);
1734  int MBEDTLS_PRIVATE(alert_reason);
1738 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1739  uint8_t MBEDTLS_PRIVATE(disable_datagram_packing);
1741 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1742 
1743 #if defined(MBEDTLS_SSL_EARLY_DATA)
1744 #if defined(MBEDTLS_SSL_SRV_C)
1745  /*
1746  * One of:
1747  * MBEDTLS_SSL_EARLY_DATA_NO_DISCARD
1748  * MBEDTLS_SSL_EARLY_DATA_TRY_TO_DEPROTECT_AND_DISCARD
1749  * MBEDTLS_SSL_EARLY_DATA_DISCARD
1750  */
1751  uint8_t MBEDTLS_PRIVATE(discard_early_data_record);
1752 #endif
1753  uint32_t MBEDTLS_PRIVATE(total_early_data_size);
1754 #endif /* MBEDTLS_SSL_EARLY_DATA */
1755 
1756  /*
1757  * Record layer (outgoing data)
1758  */
1759  unsigned char *MBEDTLS_PRIVATE(out_buf);
1760  unsigned char *MBEDTLS_PRIVATE(out_ctr);
1761  unsigned char *MBEDTLS_PRIVATE(out_hdr);
1762 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1763  unsigned char *MBEDTLS_PRIVATE(out_cid);
1765 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1766  unsigned char *MBEDTLS_PRIVATE(out_len);
1767  unsigned char *MBEDTLS_PRIVATE(out_iv);
1768  unsigned char *MBEDTLS_PRIVATE(out_msg);
1770  int MBEDTLS_PRIVATE(out_msgtype);
1771  size_t MBEDTLS_PRIVATE(out_msglen);
1772  size_t MBEDTLS_PRIVATE(out_left);
1773 #if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1774  size_t MBEDTLS_PRIVATE(out_buf_len);
1775 #endif
1777  unsigned char MBEDTLS_PRIVATE(cur_out_ctr)[MBEDTLS_SSL_SEQUENCE_NUMBER_LEN];
1779 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1780  uint16_t MBEDTLS_PRIVATE(mtu);
1781 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1782 
1783  /*
1784  * User settings
1785  */
1786 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1787  char *MBEDTLS_PRIVATE(hostname);
1789 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1790 
1791 #if defined(MBEDTLS_SSL_ALPN)
1792  const char *MBEDTLS_PRIVATE(alpn_chosen);
1793 #endif /* MBEDTLS_SSL_ALPN */
1794 
1795 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1796  /*
1797  * use_srtp extension
1798  */
1799  mbedtls_dtls_srtp_info MBEDTLS_PRIVATE(dtls_srtp_info);
1800 #endif /* MBEDTLS_SSL_DTLS_SRTP */
1801 
1802  /*
1803  * Information for DTLS hello verify
1804  */
1805 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1806  unsigned char *MBEDTLS_PRIVATE(cli_id);
1807  size_t MBEDTLS_PRIVATE(cli_id_len);
1808 #endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
1809 
1810  /*
1811  * Secure renegotiation
1812  */
1813  /* needed to know when to send extension on server */
1814  int MBEDTLS_PRIVATE(secure_renegotiation);
1816 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1817  size_t MBEDTLS_PRIVATE(verify_data_len);
1818  char MBEDTLS_PRIVATE(own_verify_data)[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN];
1819  char MBEDTLS_PRIVATE(peer_verify_data)[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN];
1820 #endif /* MBEDTLS_SSL_RENEGOTIATION */
1821 
1822 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1823  /* CID configuration to use in subsequent handshakes. */
1829  unsigned char MBEDTLS_PRIVATE(own_cid)[MBEDTLS_SSL_CID_IN_LEN_MAX];
1830  uint8_t MBEDTLS_PRIVATE(own_cid_len);
1831  uint8_t MBEDTLS_PRIVATE(negotiate_cid);
1835 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1838  mbedtls_ssl_export_keys_t *MBEDTLS_PRIVATE(f_export_keys);
1839  void *MBEDTLS_PRIVATE(p_export_keys);
1850  mbedtls_ssl_user_data_t MBEDTLS_PRIVATE(user_data);
1851 };
1852 
1861 const char *mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id);
1862 
1871 int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name);
1872 
1881 
1917  const mbedtls_ssl_config *conf);
1918 
1929 
1936 void mbedtls_ssl_conf_endpoint(mbedtls_ssl_config *conf, int endpoint);
1937 
1946 static inline int mbedtls_ssl_conf_get_endpoint(const mbedtls_ssl_config *conf)
1947 {
1948  return conf->MBEDTLS_PRIVATE(endpoint);
1949 }
1950 
1965 void mbedtls_ssl_conf_transport(mbedtls_ssl_config *conf, int transport);
1966 
1993 void mbedtls_ssl_conf_authmode(mbedtls_ssl_config *conf, int authmode);
1994 
1995 #if defined(MBEDTLS_SSL_EARLY_DATA)
1996 
2023  int early_data_enabled);
2024 
2025 #if defined(MBEDTLS_SSL_SRV_C)
2026 
2051  mbedtls_ssl_config *conf, uint32_t max_early_data_size);
2052 #endif /* MBEDTLS_SSL_SRV_C */
2053 
2054 #endif /* MBEDTLS_SSL_EARLY_DATA */
2055 
2056 #if defined(MBEDTLS_X509_CRT_PARSE_C)
2057 
2073  int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
2074  void *p_vrfy);
2075 #endif /* MBEDTLS_X509_CRT_PARSE_C */
2076 
2092  void (*f_dbg)(void *, int, const char *, int, const char *),
2093  void *p_dbg);
2094 
2106  const mbedtls_ssl_context *ssl)
2107 {
2108  return ssl->MBEDTLS_PRIVATE(conf);
2109 }
2110 
2142  void *p_bio,
2143  mbedtls_ssl_send_t *f_send,
2144  mbedtls_ssl_recv_t *f_recv,
2145  mbedtls_ssl_recv_timeout_t *f_recv_timeout);
2146 
2147 #if defined(MBEDTLS_SSL_PROTO_DTLS)
2148 
2149 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
2150 
2151 
2237  int enable,
2238  unsigned char const *own_cid,
2239  size_t own_cid_len);
2240 
2271  int *enabled,
2272  unsigned char own_cid[MBEDTLS_SSL_CID_IN_LEN_MAX],
2273  size_t *own_cid_len);
2274 
2313  int *enabled,
2314  unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX],
2315  size_t *peer_cid_len);
2316 
2317 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
2318 
2358 void mbedtls_ssl_set_mtu(mbedtls_ssl_context *ssl, uint16_t mtu);
2359 #endif /* MBEDTLS_SSL_PROTO_DTLS */
2360 
2361 #if defined(MBEDTLS_X509_CRT_PARSE_C)
2362 
2381  int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
2382  void *p_vrfy);
2383 #endif /* MBEDTLS_X509_CRT_PARSE_C */
2384 
2401 void mbedtls_ssl_conf_read_timeout(mbedtls_ssl_config *conf, uint32_t timeout);
2402 
2448  unsigned char *buf,
2449  size_t buflen);
2450 
2472  void *p_timer,
2473  mbedtls_ssl_set_timer_t *f_set_timer,
2474  mbedtls_ssl_get_timer_t *f_get_timer);
2475 
2476 #if defined(MBEDTLS_SSL_SRV_C)
2477 
2487 static inline void mbedtls_ssl_conf_cert_cb(mbedtls_ssl_config *conf,
2488  mbedtls_ssl_hs_cb_t f_cert_cb)
2489 {
2490  conf->MBEDTLS_PRIVATE(f_cert_cb) = f_cert_cb;
2491 }
2492 #endif /* MBEDTLS_SSL_SRV_C */
2513 typedef int mbedtls_ssl_ticket_write_t(void *p_ticket,
2514  const mbedtls_ssl_session *session,
2515  unsigned char *start,
2516  const unsigned char *end,
2517  size_t *tlen,
2518  uint32_t *lifetime);
2543 typedef int mbedtls_ssl_ticket_parse_t(void *p_ticket,
2544  mbedtls_ssl_session *session,
2545  unsigned char *buf,
2546  size_t len);
2547 
2548 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
2564  mbedtls_ssl_ticket_write_t *f_ticket_write,
2565  mbedtls_ssl_ticket_parse_t *f_ticket_parse,
2566  void *p_ticket);
2567 
2568 #if defined(MBEDTLS_HAVE_TIME)
2569 
2583  mbedtls_ssl_session *session, mbedtls_ms_time_t *ticket_creation_time)
2584 {
2585  if (session == NULL || ticket_creation_time == NULL ||
2586  session->MBEDTLS_PRIVATE(endpoint) != MBEDTLS_SSL_IS_SERVER) {
2588  }
2589 
2590  *ticket_creation_time = session->MBEDTLS_PRIVATE(ticket_creation_time);
2591 
2592  return 0;
2593 }
2594 #endif /* MBEDTLS_HAVE_TIME */
2595 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
2596 
2604 static inline unsigned const char (*mbedtls_ssl_session_get_id(const mbedtls_ssl_session *
2605  session))[32]
2606 {
2607  return &session->MBEDTLS_PRIVATE(id);
2608 }
2609 
2617 static inline size_t mbedtls_ssl_session_get_id_len(const mbedtls_ssl_session *session)
2618 {
2619  return session->MBEDTLS_PRIVATE(id_len);
2620 }
2621 
2629 static inline int mbedtls_ssl_session_get_ciphersuite_id(const mbedtls_ssl_session *session)
2630 {
2631  return session->MBEDTLS_PRIVATE(ciphersuite);
2632 }
2633 
2653  mbedtls_ssl_export_keys_t *f_export_keys,
2654  void *p_export_keys);
2655 
2666 static inline void mbedtls_ssl_conf_set_user_data_p(
2667  mbedtls_ssl_config *conf,
2668  void *p)
2669 {
2670  conf->MBEDTLS_PRIVATE(user_data).p = p;
2671 }
2680 static inline void mbedtls_ssl_conf_set_user_data_n(
2681  mbedtls_ssl_config *conf,
2682  uintptr_t n)
2683 {
2684  conf->MBEDTLS_PRIVATE(user_data).n = n;
2685 }
2697 static inline void *mbedtls_ssl_conf_get_user_data_p(
2698  mbedtls_ssl_config *conf)
2699 {
2700  return conf->MBEDTLS_PRIVATE(user_data).p;
2701 }
2702 
2713 static inline uintptr_t mbedtls_ssl_conf_get_user_data_n(
2714  mbedtls_ssl_config *conf)
2715 {
2716  return conf->MBEDTLS_PRIVATE(user_data).n;
2717 }
2718 
2729 static inline void mbedtls_ssl_set_user_data_p(
2730  mbedtls_ssl_context *ssl,
2731  void *p)
2732 {
2733  ssl->MBEDTLS_PRIVATE(user_data).p = p;
2734 }
2743 static inline void mbedtls_ssl_set_user_data_n(
2744  mbedtls_ssl_context *ssl,
2745  uintptr_t n)
2746 {
2747  ssl->MBEDTLS_PRIVATE(user_data).n = n;
2748 }
2760 static inline void *mbedtls_ssl_get_user_data_p(
2761  mbedtls_ssl_context *ssl)
2762 {
2763  return ssl->MBEDTLS_PRIVATE(user_data).p;
2764 }
2765 
2776 static inline uintptr_t mbedtls_ssl_get_user_data_n(
2777  mbedtls_ssl_context *ssl)
2778 {
2779  return ssl->MBEDTLS_PRIVATE(user_data).n;
2780 }
2781 
2782 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
2783 
2807  mbedtls_ssl_async_sign_t *f_async_sign,
2808  mbedtls_ssl_async_resume_t *f_async_resume,
2809  mbedtls_ssl_async_cancel_t *f_async_cancel,
2810  void *config_data);
2811 
2821 
2837 
2850  void *ctx);
2851 #endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
2852 
2867 typedef int mbedtls_ssl_cookie_write_t(void *ctx,
2868  unsigned char **p, unsigned char *end,
2869  const unsigned char *info, size_t ilen);
2870 
2884 typedef int mbedtls_ssl_cookie_check_t(void *ctx,
2885  const unsigned char *cookie, size_t clen,
2886  const unsigned char *info, size_t ilen);
2887 
2888 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
2889 
2918  mbedtls_ssl_cookie_write_t *f_cookie_write,
2919  mbedtls_ssl_cookie_check_t *f_cookie_check,
2920  void *p_cookie);
2921 
2942  const unsigned char *info,
2943  size_t ilen);
2944 
2945 #endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
2946 
2947 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
2948 
2964 #endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
2965 
2989 void mbedtls_ssl_conf_dtls_badmac_limit(mbedtls_ssl_config *conf, unsigned limit);
2990 
2991 #if defined(MBEDTLS_SSL_PROTO_DTLS)
2992 
3022  unsigned allow_packing);
3023 
3055 void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max);
3056 #endif /* MBEDTLS_SSL_PROTO_DTLS */
3057 
3058 #if defined(MBEDTLS_SSL_SRV_C)
3059 
3097  void *p_cache,
3098  mbedtls_ssl_cache_get_t *f_get_cache,
3099  mbedtls_ssl_cache_set_t *f_set_cache);
3100 #endif /* MBEDTLS_SSL_SRV_C */
3101 
3102 #if defined(MBEDTLS_SSL_CLI_C)
3103 
3150 #endif /* MBEDTLS_SSL_CLI_C */
3151 
3185  const unsigned char *buf,
3186  size_t len);
3187 
3222  unsigned char *buf,
3223  size_t buf_len,
3224  size_t *olen);
3225 
3268  const int *ciphersuites);
3269 
3270 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
3271 
3314  const int kex_modes);
3315 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
3316 
3317 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
3318 #define MBEDTLS_SSL_UNEXPECTED_CID_IGNORE 0
3319 #define MBEDTLS_SSL_UNEXPECTED_CID_FAIL 1
3320 
3352 int mbedtls_ssl_conf_cid(mbedtls_ssl_config *conf, size_t len,
3353  int ignore_other_cids);
3354 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
3355 
3356 #if defined(MBEDTLS_X509_CRT_PARSE_C)
3357 
3368  const mbedtls_x509_crt_profile *profile);
3369 
3382  mbedtls_x509_crt *ca_chain,
3383  mbedtls_x509_crl *ca_crl);
3384 
3385 #if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
3386 
3397 static inline
3399  const mbedtls_x509_crt *crt)
3400 {
3401  conf->MBEDTLS_PRIVATE(dn_hints) = crt;
3402 }
3403 #endif /* MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
3405 #if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
3406 
3458  mbedtls_x509_crt_ca_cb_t f_ca_cb,
3459  void *p_ca_cb);
3460 #endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
3461 
3499  mbedtls_x509_crt *own_cert,
3500  mbedtls_pk_context *pk_key);
3501 #endif /* MBEDTLS_X509_CRT_PARSE_C */
3502 
3503 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED)
3504 
3537  const unsigned char *psk, size_t psk_len,
3538  const unsigned char *psk_identity, size_t psk_identity_len);
3539 
3579  const unsigned char *psk_identity,
3580  size_t psk_identity_len);
3581 
3599  const unsigned char *psk, size_t psk_len);
3600 
3622  mbedtls_svc_key_id_t psk);
3623 
3624 #if defined(MBEDTLS_SSL_SRV_C)
3625 
3664  int (*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *,
3665  size_t),
3666  void *p_psk);
3667 #endif /* MBEDTLS_SSL_SRV_C */
3668 #endif /* MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED */
3669 
3701  const uint16_t *groups);
3702 
3703 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
3704 
3718  const uint16_t *sig_algs);
3719 #endif /* MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
3720 
3721 #if defined(MBEDTLS_X509_CRT_PARSE_C)
3722 
3753 int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname);
3754 
3765 static inline const char *mbedtls_ssl_get_hostname(mbedtls_ssl_context *ssl)
3766 {
3767  return ssl->MBEDTLS_PRIVATE(hostname);
3768 }
3769 #endif /* MBEDTLS_X509_CRT_PARSE_C */
3770 
3771 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
3772 
3790 const unsigned char *mbedtls_ssl_get_hs_sni(mbedtls_ssl_context *ssl,
3791  size_t *name_len);
3792 
3809  mbedtls_x509_crt *own_cert,
3810  mbedtls_pk_context *pk_key);
3811 
3824  mbedtls_x509_crt *ca_chain,
3825  mbedtls_x509_crl *ca_crl);
3826 
3827 #if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
3828 
3839  const mbedtls_x509_crt *crt);
3840 #endif /* MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
3841 
3853  int authmode);
3854 
3878  int (*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *,
3879  size_t),
3880  void *p_sni);
3881 #endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION */
3882 
3883 #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
3884 
3903  const unsigned char *pw,
3904  size_t pw_len);
3905 
3921  mbedtls_svc_key_id_t pwd);
3922 #endif /*MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
3923 
3924 #if defined(MBEDTLS_SSL_ALPN)
3925 
3938  const char *const *protos);
3939 
3949 const char *mbedtls_ssl_get_alpn_protocol(const mbedtls_ssl_context *ssl);
3950 #endif /* MBEDTLS_SSL_ALPN */
3951 
3952 #if defined(MBEDTLS_SSL_DTLS_SRTP)
3953 #if defined(MBEDTLS_DEBUG_C)
3954 static inline const char *mbedtls_ssl_get_srtp_profile_as_string(mbedtls_ssl_srtp_profile profile)
3955 {
3956  switch (profile) {
3958  return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80";
3960  return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32";
3962  return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80";
3964  return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32";
3965  default: break;
3966  }
3967  return "";
3968 }
3969 #endif /* MBEDTLS_DEBUG_C */
3970 
3984  int support_mki_value);
3985 
4006  (mbedtls_ssl_config *conf,
4007  const mbedtls_ssl_srtp_profile *profiles);
4008 
4026  unsigned char *mki_value,
4027  uint16_t mki_len);
4047  mbedtls_dtls_srtp_info *dtls_srtp_info);
4048 #endif /* MBEDTLS_SSL_DTLS_SRTP */
4049 
4062 static inline void mbedtls_ssl_conf_max_tls_version(mbedtls_ssl_config *conf,
4063  mbedtls_ssl_protocol_version tls_version)
4064 {
4065  conf->MBEDTLS_PRIVATE(max_tls_version) = tls_version;
4066 }
4067 
4080 static inline void mbedtls_ssl_conf_min_tls_version(mbedtls_ssl_config *conf,
4081  mbedtls_ssl_protocol_version tls_version)
4082 {
4083  conf->MBEDTLS_PRIVATE(min_tls_version) = tls_version;
4084 }
4085 
4086 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
4087 
4099 #endif /* MBEDTLS_SSL_ENCRYPT_THEN_MAC */
4100 
4101 #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
4102 
4114 #endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */
4115 
4116 #if defined(MBEDTLS_SSL_SRV_C)
4117 
4127  char cert_req_ca_list);
4128 #endif /* MBEDTLS_SSL_SRV_C */
4129 
4130 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
4131 
4169 int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code);
4170 #endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
4171 
4172 #if defined(MBEDTLS_SSL_SRV_C)
4173 
4183 #endif /* MBEDTLS_SSL_SRV_C */
4184 
4185 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
4186  defined(MBEDTLS_SSL_CLI_C)
4187 
4197 void mbedtls_ssl_conf_session_tickets(mbedtls_ssl_config *conf, int use_tickets);
4198 #endif /* MBEDTLS_SSL_SESSION_TICKETS &&
4199  MBEDTLS_SSL_CLI_C */
4200 
4201 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
4202  defined(MBEDTLS_SSL_SRV_C) && \
4203  defined(MBEDTLS_SSL_PROTO_TLS1_3)
4204 
4222  uint16_t num_tickets);
4223 #endif /* MBEDTLS_SSL_SESSION_TICKETS &&
4224  MBEDTLS_SSL_SRV_C &&
4225  MBEDTLS_SSL_PROTO_TLS1_3*/
4226 
4227 #if defined(MBEDTLS_SSL_RENEGOTIATION)
4228 
4245 void mbedtls_ssl_conf_renegotiation(mbedtls_ssl_config *conf, int renegotiation);
4246 #endif /* MBEDTLS_SSL_RENEGOTIATION */
4247 
4275 void mbedtls_ssl_conf_legacy_renegotiation(mbedtls_ssl_config *conf, int allow_legacy);
4276 
4277 #if defined(MBEDTLS_SSL_RENEGOTIATION)
4278 
4315 void mbedtls_ssl_conf_renegotiation_enforced(mbedtls_ssl_config *conf, int max_records);
4316 
4343  const unsigned char period[8]);
4344 #endif /* MBEDTLS_SSL_RENEGOTIATION */
4345 
4385 
4402 
4416 
4425 
4433 const char *mbedtls_ssl_get_ciphersuite(const mbedtls_ssl_context *ssl);
4434 
4435 
4448  const mbedtls_ssl_context *ssl)
4449 {
4450  return ssl->MBEDTLS_PRIVATE(tls_version);
4451 }
4452 
4460 const char *mbedtls_ssl_get_version(const mbedtls_ssl_context *ssl);
4461 
4471 
4498 
4518 
4519 #if defined(MBEDTLS_X509_CRT_PARSE_C)
4520 
4551 #endif /* MBEDTLS_X509_CRT_PARSE_C */
4552 
4553 #if defined(MBEDTLS_SSL_CLI_C)
4554 
4582  mbedtls_ssl_session *session);
4583 #endif /* MBEDTLS_SSL_CLI_C */
4584 
4665 
4677 static inline int mbedtls_ssl_is_handshake_over(mbedtls_ssl_context *ssl)
4678 {
4679  return ssl->MBEDTLS_PRIVATE(state) >= MBEDTLS_SSL_HANDSHAKE_OVER;
4680 }
4681 
4717 
4718 #if defined(MBEDTLS_SSL_RENEGOTIATION)
4719 
4743 #endif /* MBEDTLS_SSL_RENEGOTIATION */
4744 
4830 int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len);
4831 
4900 int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len);
4901 
4919  unsigned char level,
4920  unsigned char message);
4935 
4936 #if defined(MBEDTLS_SSL_EARLY_DATA)
4937 
4938 #if defined(MBEDTLS_SSL_SRV_C)
4939 
4987  unsigned char *buf, size_t len);
4988 #endif /* MBEDTLS_SSL_SRV_C */
4989 
4990 #if defined(MBEDTLS_SSL_CLI_C)
4991 
5076  const unsigned char *buf, size_t len);
5077 
5105 #endif /* MBEDTLS_SSL_CLI_C */
5106 
5107 #endif /* MBEDTLS_SSL_EARLY_DATA */
5108 
5115 
5116 #if defined(MBEDTLS_SSL_CONTEXT_SERIALIZATION)
5117 
5174  unsigned char *buf,
5175  size_t buf_len,
5176  size_t *olen);
5177 
5247  const unsigned char *buf,
5248  size_t len);
5249 #endif /* MBEDTLS_SSL_CONTEXT_SERIALIZATION */
5250 
5262 
5279  int endpoint, int transport, int preset);
5280 
5287 
5294 
5305 
5322  const unsigned char *secret, size_t slen,
5323  const char *label,
5324  const unsigned char *random, size_t rlen,
5325  unsigned char *dstbuf, size_t dlen);
5326 
5327 #if defined(MBEDTLS_SSL_KEYING_MATERIAL_EXPORT)
5328 /* Maximum value for key_len in mbedtls_ssl_export_keying material. Depending on the TLS
5329  * version and the negotiated ciphersuite, larger keys could in principle be exported,
5330  * but for simplicity, we define one limit that works in all cases. TLS 1.3 with SHA256
5331  * has the strictest limit: 255 blocks of SHA256 output, or 8160 bytes. */
5332 #define MBEDTLS_SSL_EXPORT_MAX_KEY_LEN 8160
5333 
5357  uint8_t *out, const size_t key_len,
5358  const char *label, const size_t label_len,
5359  const unsigned char *context, const size_t context_len,
5360  const int use_context);
5361 #endif
5362 #ifdef __cplusplus
5363 }
5364 #endif
5365 
5366 #endif /* ssl.h */
int mbedtls_ssl_tls_prf(const mbedtls_tls_prf_types prf, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen)
TLS-PRF function for key derivation.
MBEDTLS_PLATFORM_MS_TIME_TYPE_MACRO mbedtls_ms_time_t
Definition: platform_time.h:31
const unsigned char * mbedtls_ssl_get_hs_sni(mbedtls_ssl_context *ssl, size_t *name_len)
Retrieve SNI extension value for the current handshake. Available in f_cert_cb of mbedtls_ssl_conf_ce...
void * mbedtls_ssl_conf_get_async_config_data(const mbedtls_ssl_config *conf)
Retrieve the configuration data set by mbedtls_ssl_conf_async_private_cb().
Public key container.
Definition: pk.h:142
#define MBEDTLS_PSK_MAX_LEN
#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80
Definition: ssl.h:1120
void mbedtls_ssl_set_hs_ca_chain(mbedtls_ssl_context *ssl, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate for the current handshake.
int mbedtls_ssl_ticket_parse_t(void *p_ticket, mbedtls_ssl_session *session, unsigned char *buf, size_t len)
Callback type: parse and load session ticket.
Definition: ssl.h:2549
const char * mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id)
Return the name of the ciphersuite associated with the given ID.
void mbedtls_ssl_conf_encrypt_then_mac(mbedtls_ssl_config *conf, char etm)
Enable or disable Encrypt-then-MAC (Default: MBEDTLS_SSL_ETM_ENABLED)
int mbedtls_ssl_cookie_write_t(void *ctx, unsigned char **p, unsigned char *end, const unsigned char *info, size_t ilen)
Callback type: generate a cookie.
Definition: ssl.h:2873
int mbedtls_ssl_write_early_data(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Try to write exactly 'len' application data bytes while performing the handshake (early data)...
int mbedtls_ssl_dtls_srtp_set_mki_value(mbedtls_ssl_context *ssl, unsigned char *mki_value, uint16_t mki_len)
Set the mki_value for the current DTLS-SRTP session.
int mbedtls_ssl_cookie_check_t(void *ctx, const unsigned char *cookie, size_t clen, const unsigned char *info, size_t ilen)
Callback type: verify a cookie.
Definition: ssl.h:2890
void mbedtls_ssl_set_timer_cb(mbedtls_ssl_context *ssl, void *p_timer, mbedtls_ssl_set_timer_t *f_set_timer, mbedtls_ssl_get_timer_t *f_get_timer)
Set the timer callbacks (Mandatory for DTLS.)
uint16_t mbedtls_ssl_srtp_profile
Definition: ssl.h:1125
static int mbedtls_ssl_session_get_ciphersuite_id(const mbedtls_ssl_session *session)
Get the ciphersuite-id.
Definition: ssl.h:2635
void mbedtls_ssl_conf_extended_master_secret(mbedtls_ssl_config *conf, char ems)
Enable or disable Extended Master Secret negotiation. (Default: MBEDTLS_SSL_EXTENDED_MS_ENABLED) ...
int mbedtls_ssl_get_max_in_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum incoming record payload in bytes.
int mbedtls_ssl_send_t(void *ctx, const unsigned char *buf, size_t len)
Callback type: send data on the network.
Definition: ssl.h:772
#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32
Definition: ssl.h:1121
void mbedtls_ssl_set_verify(mbedtls_ssl_context *ssl, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set a connection-specific verification callback (optional).
int mbedtls_ssl_recv_t(void *ctx, unsigned char *buf, size_t len)
Callback type: receive data from the network.
Definition: ssl.h:796
static void mbedtls_ssl_set_user_data_n(mbedtls_ssl_context *ssl, uintptr_t n)
Set the user data in an SSL context to an integer.
Definition: ssl.h:2749
void mbedtls_ssl_conf_preference_order(mbedtls_ssl_config *conf, int order)
Pick the ciphersuites order according to the second parameter in the SSL Server module (MBEDTLS_SSL_S...
void mbedtls_ssl_export_keys_t(void *p_expkey, mbedtls_ssl_key_export_type type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type)
Callback type: Export key alongside random values for session identification, and PRF for implementat...
Definition: ssl.h:1296
Platform Security Architecture cryptography module.
void mbedtls_ssl_conf_verify(mbedtls_ssl_config *conf, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set the verification callback (Optional).
unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]
Definition: ssl.h:669
static const mbedtls_ssl_config * mbedtls_ssl_context_get_config(const mbedtls_ssl_context *ssl)
Return the SSL configuration structure associated with the given SSL context.
Definition: ssl.h:2111
static const char * mbedtls_ssl_get_hostname(mbedtls_ssl_context *ssl)
Get the hostname that checked against the received server certificate. It is used to set the ServerNa...
Definition: ssl.h:3771
int mbedtls_ssl_get_max_out_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum outgoing record payload in bytes.
void mbedtls_ssl_conf_renegotiation(mbedtls_ssl_config *conf, int renegotiation)
Enable / Disable renegotiation support for connection when initiated by peer (Default: MBEDTLS_SSL_RE...
static void mbedtls_ssl_conf_cert_cb(mbedtls_ssl_config *conf, mbedtls_ssl_hs_cb_t f_cert_cb)
Set the certificate selection callback (server-side only).
Definition: ssl.h:2493
void mbedtls_ssl_conf_early_data(mbedtls_ssl_config *conf, int early_data_enabled)
Set the early data mode Default: disabled on server and client.
void mbedtls_ssl_conf_dtls_anti_replay(mbedtls_ssl_config *conf, char mode)
Enable or disable anti-replay protection for DTLS. (DTLS only, no effect on TLS.) Default: enabled...
void mbedtls_ssl_conf_srtp_mki_value_supported(mbedtls_ssl_config *conf, int support_mki_value)
Manage support for mki(master key id) value in use_srtp extension. MKI is an optional part of SRTP us...
int mbedtls_ssl_read_early_data(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len)
Read at most 'len' bytes of early data.
#define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH
Definition: ssl.h:1107
uint32_t mbedtls_ssl_get_verify_result(const mbedtls_ssl_context *ssl)
Return the result of the certificate verification.
void mbedtls_ssl_conf_session_tickets_cb(mbedtls_ssl_config *conf, mbedtls_ssl_ticket_write_t *f_ticket_write, mbedtls_ssl_ticket_parse_t *f_ticket_parse, void *p_ticket)
Configure SSL session ticket callbacks (server only). (Default: none.)
int mbedtls_ssl_set_cid(mbedtls_ssl_context *ssl, int enable, unsigned char const *own_cid, size_t own_cid_len)
Configure the use of the Connection ID (CID) extension in the next handshake.
int mbedtls_ssl_check_pending(const mbedtls_ssl_context *ssl)
Check if there is data already read from the underlying transport but not yet processed.
static uintptr_t mbedtls_ssl_get_user_data_n(mbedtls_ssl_context *ssl)
Retrieve the user data in an SSL context as an integer.
Definition: ssl.h:2782
const mbedtls_x509_crt * mbedtls_ssl_get_peer_cert(const mbedtls_ssl_context *ssl)
Return the peer certificate from the current connection.
int mbedtls_ssl_session_save(const mbedtls_ssl_session *session, unsigned char *buf, size_t buf_len, size_t *olen)
Save session structure as serialized data in a buffer. On client, this can be used for saving session...
int mbedtls_ssl_set_hs_ecjpake_password_opaque(mbedtls_ssl_context *ssl, mbedtls_svc_key_id_t pwd)
Set the EC J-PAKE opaque password for current handshake.
int mbedtls_ssl_send_alert_message(mbedtls_ssl_context *ssl, unsigned char level, unsigned char message)
Send an alert message.
int mbedtls_ssl_recv_timeout_t(void *ctx, unsigned char *buf, size_t len, uint32_t timeout)
Callback type: receive data from the network, with timeout.
Definition: ssl.h:822
SSL Ciphersuites for Mbed TLS.
void mbedtls_ssl_conf_session_cache(mbedtls_ssl_config *conf, void *p_cache, mbedtls_ssl_cache_get_t *f_get_cache, mbedtls_ssl_cache_set_t *f_set_cache)
Set the session cache callbacks (server-side only) If not set, no session resuming is done (except if...
void mbedtls_ssl_conf_renegotiation_period(mbedtls_ssl_config *conf, const unsigned char period[8])
Set record counter threshold for periodic renegotiation. (Default: 2^48 - 1)
void mbedtls_ssl_conf_sig_algs(mbedtls_ssl_config *conf, const uint16_t *sig_algs)
Configure allowed signature algorithms for use in TLS.
int mbedtls_ssl_cache_set_t(void *data, unsigned char const *session_id, size_t session_id_len, const mbedtls_ssl_session *session)
Callback type: server-side session cache setter.
Definition: ssl.h:938
int mbedtls_ssl_conf_psk(mbedtls_ssl_config *conf, const unsigned char *psk, size_t psk_len, const unsigned char *psk_identity, size_t psk_identity_len)
Configure pre-shared keys (PSKs) and their identities to be used in PSK-based ciphersuites.
int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code)
Set the maximum fragment length to emit and/or negotiate. (Typical: the smaller of MBEDTLS_SSL_IN_CON...
Common and shared functions used by multiple modules in the Mbed TLS library.
int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Try to write exactly 'len' application data bytes.
void mbedtls_ssl_conf_cert_req_ca_list(mbedtls_ssl_config *conf, char cert_req_ca_list)
Whether to send a list of acceptable CAs in CertificateRequest messages. (Default: do send) ...
int mbedtls_ssl_close_notify(mbedtls_ssl_context *ssl)
Notify the peer that the connection is being closed.
struct mbedtls_ssl_flight_item mbedtls_ssl_flight_item
Definition: ssl.h:877
int mbedtls_ssl_cache_get_t(void *data, unsigned char const *session_id, size_t session_id_len, mbedtls_ssl_session *session)
Callback type: server-side session cache getter.
Definition: ssl.h:916
void mbedtls_ssl_conf_session_tickets(mbedtls_ssl_config *conf, int use_tickets)
Enable / Disable session tickets (client only). (Default: MBEDTLS_SSL_SESSION_TICKETS_ENABLED.)
static void mbedtls_ssl_conf_dn_hints(mbedtls_ssl_config *conf, const mbedtls_x509_crt *crt)
Set DN hints sent to client in CertificateRequest message.
Definition: ssl.h:3404
void mbedtls_ssl_free(mbedtls_ssl_context *ssl)
Free referenced items in an SSL context and clear memory.
void mbedtls_ssl_conf_async_private_cb(mbedtls_ssl_config *conf, mbedtls_ssl_async_sign_t *f_async_sign, mbedtls_ssl_async_resume_t *f_async_resume, mbedtls_ssl_async_cancel_t *f_async_cancel, void *config_data)
Configure asynchronous private key operation callbacks.
void mbedtls_ssl_conf_endpoint(mbedtls_ssl_config *conf, int endpoint)
Set the current endpoint type.
void mbedtls_ssl_session_free(mbedtls_ssl_session *session)
Free referenced items in an SSL session including the peer certificate and clear memory.
mbedtls_ssl_protocol_version
Definition: ssl.h:1140
int(* mbedtls_ssl_hs_cb_t)(mbedtls_ssl_context *ssl)
Callback type: generic handshake callback.
Definition: ssl.h:1320
void mbedtls_ssl_conf_ca_cb(mbedtls_ssl_config *conf, mbedtls_x509_crt_ca_cb_t f_ca_cb, void *p_ca_cb)
Set the trusted certificate callback.
static void * mbedtls_ssl_get_user_data_p(mbedtls_ssl_context *ssl)
Retrieve the user data in an SSL context as a pointer.
Definition: ssl.h:2766
struct mbedtls_ssl_transform mbedtls_ssl_transform
Definition: ssl.h:871
#define MBEDTLS_TLS1_3_MD_MAX_SIZE
Definition: ssl.h:685
const char * mbedtls_ssl_get_alpn_protocol(const mbedtls_ssl_context *ssl)
Get the name of the negotiated Application Layer Protocol. This function should be called after the h...
#define MBEDTLS_SSL_CID_IN_LEN_MAX
unsigned char _pms_ecjpake[32]
Definition: ssl.h:679
int mbedtls_ssl_get_ciphersuite_id_from_ssl(const mbedtls_ssl_context *ssl)
Return the id of the current ciphersuite.
#define PSA_ERROR_INVALID_ARGUMENT
void mbedtls_ssl_conf_dtls_cookies(mbedtls_ssl_config *conf, mbedtls_ssl_cookie_write_t *f_cookie_write, mbedtls_ssl_cookie_check_t *f_cookie_check, void *p_cookie)
Register callbacks for DTLS cookies (Server only. DTLS only.)
int mbedtls_ssl_conf_cid(mbedtls_ssl_config *conf, size_t len, int ignore_other_cids)
Specify the length of Connection IDs for incoming encrypted DTLS records, as well as the behaviour on...
static int mbedtls_ssl_session_get_ticket_creation_time(mbedtls_ssl_session *session, mbedtls_ms_time_t *ticket_creation_time)
Get the creation time of a session ticket.
Definition: ssl.h:2588
int mbedtls_ssl_get_early_data_status(mbedtls_ssl_context *ssl)
Get the status of the negotiation of the use of early data.
int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name)
Return the ID of the ciphersuite associated with the given name.
void mbedtls_ssl_conf_transport(mbedtls_ssl_config *conf, int transport)
Set the transport type (TLS or DTLS). Default: TLS.
int mbedtls_ssl_set_hs_psk_opaque(mbedtls_ssl_context *ssl, mbedtls_svc_key_id_t psk)
Set an opaque pre-shared Key (PSK) for the current handshake.
mbedtls_ssl_key_export_type
Definition: ssl.h:1269
void mbedtls_ssl_get_dtls_srtp_negotiation_result(const mbedtls_ssl_context *ssl, mbedtls_dtls_srtp_info *dtls_srtp_info)
Get the negotiated DTLS-SRTP information: Protection profile and MKI value.
mbedtls_ssl_states
Definition: ssl.h:706
#define MBEDTLS_SSL_IS_SERVER
Definition: ssl.h:308
void mbedtls_ssl_conf_sni(mbedtls_ssl_config *conf, int(*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_sni)
Set server side ServerName TLS extension callback (optional, server-side only).
#define MBEDTLS_SSL_SEQUENCE_NUMBER_LEN
Definition: ssl.h:689
MBEDTLS_PLATFORM_TIME_TYPE_MACRO mbedtls_time_t
Definition: platform_time.h:23
void mbedtls_ssl_conf_renegotiation_enforced(mbedtls_ssl_config *conf, int max_records)
Enforce renegotiation requests. (Default: enforced, max_records = 16)
void mbedtls_ssl_set_mtu(mbedtls_ssl_context *ssl, uint16_t mtu)
Set the Maximum Transport Unit (MTU). Special value: 0 means unset (no limit). This represents the ma...
int mbedtls_ssl_set_client_transport_id(mbedtls_ssl_context *ssl, const unsigned char *info, size_t ilen)
Set client's transport-level identification info. (Server only. DTLS only.)
void mbedtls_ssl_set_bio(mbedtls_ssl_context *ssl, void *p_bio, mbedtls_ssl_send_t *f_send, mbedtls_ssl_recv_t *f_recv, mbedtls_ssl_recv_timeout_t *f_recv_timeout)
Set the underlying BIO callbacks for write, read and read-with-timeout.
static uintptr_t mbedtls_ssl_conf_get_user_data_n(mbedtls_ssl_config *conf)
Retrieve the user data in an SSL configuration as an integer.
Definition: ssl.h:2719
void mbedtls_ssl_conf_new_session_tickets(mbedtls_ssl_config *conf, uint16_t num_tickets)
Number of NewSessionTicket messages for the server to send after handshake completion.
int mbedtls_ssl_context_save(mbedtls_ssl_context *ssl, unsigned char *buf, size_t buf_len, size_t *olen)
Save an active connection as serialized data in a buffer. This allows the freeing or re-using of the ...
void mbedtls_ssl_conf_max_early_data_size(mbedtls_ssl_config *conf, uint32_t max_early_data_size)
Set the maximum amount of 0-RTT data in bytes Default: MBEDTLS_SSL_MAX_EARLY_DATA_SIZE.
void mbedtls_ssl_conf_cert_profile(mbedtls_ssl_config *conf, const mbedtls_x509_crt_profile *profile)
Set the X.509 security profile used for verification.
unsigned char _pms_ecdhe_psk[4+MBEDTLS_ECP_MAX_BYTES+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:676
Build-time configuration info.
X.509 certificate parsing and writing.
int mbedtls_ssl_context_load(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Load serialized connection data to an SSL context.
int mbedtls_ssl_conf_alpn_protocols(mbedtls_ssl_config *conf, const char *const *protos)
Set the supported Application Layer Protocols.
void mbedtls_ssl_init(mbedtls_ssl_context *ssl)
Initialize an SSL context Just makes the context ready for mbedtls_ssl_setup() or mbedtls_ssl_free() ...
const char * mbedtls_ssl_get_ciphersuite(const mbedtls_ssl_context *ssl)
Return the name of the current ciphersuite.
static unsigned const char(* mbedtls_ssl_session_get_id(const mbedtls_ssl_session *session))[32]
Get the session-id buffer.
Definition: ssl.h:2610
void mbedtls_ssl_set_export_keys_cb(mbedtls_ssl_context *ssl, mbedtls_ssl_export_keys_t *f_export_keys, void *p_export_keys)
Configure a key export callback. (Default: none.)
int mbedtls_ssl_get_timer_t(void *ctx)
Callback type: get status of timers/delays.
Definition: ssl.h:863
int mbedtls_ssl_get_own_cid(mbedtls_ssl_context *ssl, int *enabled, unsigned char own_cid[MBEDTLS_SSL_CID_IN_LEN_MAX], size_t *own_cid_len)
Get information about our request for usage of the CID extension in the current connection.
void mbedtls_ssl_conf_dbg(mbedtls_ssl_config *conf, void(*f_dbg)(void *, int, const char *, int, const char *), void *p_dbg)
Set the debug callback.
void mbedtls_ssl_config_init(mbedtls_ssl_config *conf)
Initialize an SSL configuration context Just makes the context ready for mbedtls_ssl_config_defaults(...
static void mbedtls_ssl_conf_set_user_data_n(mbedtls_ssl_config *conf, uintptr_t n)
Set the user data in an SSL configuration to an integer.
Definition: ssl.h:2686
#define MBEDTLS_SSL_CID_OUT_LEN_MAX
int mbedtls_ssl_get_record_expansion(const mbedtls_ssl_context *ssl)
Return the (maximum) number of bytes added by the record layer: header + encryption/MAC overhead (inc...
void mbedtls_ssl_conf_groups(mbedtls_ssl_config *conf, const uint16_t *groups)
Set the allowed groups in order of preference.
int mbedtls_ssl_set_session(mbedtls_ssl_context *ssl, const mbedtls_ssl_session *session)
Load a session for session resumption.
int mbedtls_ssl_async_sign_t(mbedtls_ssl_context *ssl, mbedtls_x509_crt *cert, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len)
Callback type: start external signature operation.
Definition: ssl.h:1006
void mbedtls_ssl_set_datagram_packing(mbedtls_ssl_context *ssl, unsigned allow_packing)
Allow or disallow packing of multiple handshake records within a single datagram. ...
static void * mbedtls_ssl_conf_get_user_data_p(mbedtls_ssl_config *conf)
Retrieve the user data in an SSL configuration as a pointer.
Definition: ssl.h:2703
int mbedtls_ssl_set_hs_own_cert(mbedtls_ssl_context *ssl, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate and key for the current handshake.
This file contains the generic functions for message-digest (hashing) and HMAC.
int mbedtls_ssl_conf_own_cert(mbedtls_ssl_config *conf, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate chain and private key.
static const char * mbedtls_ssl_get_srtp_profile_as_string(mbedtls_ssl_srtp_profile profile)
Definition: ssl.h:3960
int mbedtls_ssl_setup(mbedtls_ssl_context *ssl, const mbedtls_ssl_config *conf)
Set up an SSL context for use.
void mbedtls_ssl_conf_legacy_renegotiation(mbedtls_ssl_config *conf, int allow_legacy)
Prevent or allow legacy renegotiation. (Default: MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION) ...
int mbedtls_ssl_conf_psk_opaque(mbedtls_ssl_config *conf, mbedtls_svc_key_id_t psk, const unsigned char *psk_identity, size_t psk_identity_len)
Configure one or more opaque pre-shared keys (PSKs) and their identities to be used in PSK-based ciph...
static void mbedtls_ssl_set_user_data_p(mbedtls_ssl_context *ssl, void *p)
Set the user data in an SSL context to a pointer.
Definition: ssl.h:2735
int mbedtls_ssl_renegotiate(mbedtls_ssl_context *ssl)
Initiate an SSL renegotiation on the running connection. Client: perform the renegotiation right now...
void mbedtls_ssl_async_cancel_t(mbedtls_ssl_context *ssl)
Callback type: cancel external operation.
Definition: ssl.h:1076
#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32
Definition: ssl.h:1119
int mbedtls_ssl_async_resume_t(mbedtls_ssl_context *ssl, unsigned char *output, size_t *output_len, size_t output_size)
Callback type: resume external operation.
Definition: ssl.h:1054
static void mbedtls_ssl_conf_set_user_data_p(mbedtls_ssl_config *conf, void *p)
Set the user data in an SSL configuration to a pointer.
Definition: ssl.h:2672
X.509 certificate revocation list parsing.
void mbedtls_ssl_conf_psk_cb(mbedtls_ssl_config *conf, int(*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_psk)
Set the PSK callback (server-side only).
int mbedtls_ssl_set_hs_ecjpake_password(mbedtls_ssl_context *ssl, const unsigned char *pw, size_t pw_len)
Set the EC J-PAKE password for current handshake.
void mbedtls_ssl_conf_read_timeout(mbedtls_ssl_config *conf, uint32_t timeout)
Set the timeout period for mbedtls_ssl_read() (Default: no timeout.)
void mbedtls_ssl_config_free(mbedtls_ssl_config *conf)
Free an SSL configuration context.
int mbedtls_ssl_conf_dtls_srtp_protection_profiles(mbedtls_ssl_config *conf, const mbedtls_ssl_srtp_profile *profiles)
Set the supported DTLS-SRTP protection profiles.
int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len)
Read at most 'len' application data bytes.
unsigned char dummy
Definition: ssl.h:666
struct mbedtls_ssl_key_cert mbedtls_ssl_key_cert
Definition: ssl.h:874
static mbedtls_ssl_protocol_version mbedtls_ssl_get_version_number(const mbedtls_ssl_context *ssl)
Return the (D)TLS protocol version negotiated in the given connection.
Definition: ssl.h:4453
void mbedtls_ssl_set_timer_t(void *ctx, uint32_t int_ms, uint32_t fin_ms)
Callback type: set a pair of timers/delays to watch.
Definition: ssl.h:848
static int mbedtls_ssl_conf_get_endpoint(const mbedtls_ssl_config *conf)
Get the current endpoint type.
Definition: ssl.h:1952
size_t mbedtls_ssl_get_bytes_avail(const mbedtls_ssl_context *ssl)
Return the number of application data bytes remaining to be read from the current record...
#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80
Definition: ssl.h:1118
void mbedtls_ssl_conf_tls13_key_exchange_modes(mbedtls_ssl_config *conf, const int kex_modes)
Set the supported key exchange modes for TLS 1.3 connections.
int mbedtls_ssl_get_peer_cid(mbedtls_ssl_context *ssl, int *enabled, unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX], size_t *peer_cid_len)
Get information about the use of the CID extension in the current connection.
void mbedtls_ssl_session_init(mbedtls_ssl_session *session)
Initialize SSL session structure.
struct mbedtls_dtls_srtp_info_t mbedtls_dtls_srtp_info
int mbedtls_ssl_ticket_write_t(void *p_ticket, const mbedtls_ssl_session *session, unsigned char *start, const unsigned char *end, size_t *tlen, uint32_t *lifetime)
Callback type: generate and write session ticket.
Definition: ssl.h:2519
static int mbedtls_ssl_is_handshake_over(mbedtls_ssl_context *ssl)
After calling mbedtls_ssl_handshake() to start the SSL handshake you can call this function to check ...
Definition: ssl.h:4683
void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max)
Set retransmit timeout values for the DTLS handshake. (DTLS only, no effect on TLS.)
Mbed TLS Platform time abstraction.
int mbedtls_ssl_config_defaults(mbedtls_ssl_config *conf, int endpoint, int transport, int preset)
Load reasonable default SSL configuration values. (You need to call mbedtls_ssl_config_init() first...
void mbedtls_ssl_conf_ca_chain(mbedtls_ssl_config *conf, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate.
static size_t mbedtls_ssl_session_get_id_len(const mbedtls_ssl_session *session)
Get the size of the session-id.
Definition: ssl.h:2623
void mbedtls_ssl_conf_dtls_badmac_limit(mbedtls_ssl_config *conf, unsigned limit)
Set a limit on the number of records with a bad MAC before terminating the connection. (DTLS only, no effect on TLS.) Default: 0 (disabled).
unsigned char _pms_psk[4+2 *MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:672
int mbedtls_ssl_handshake(mbedtls_ssl_context *ssl)
Perform the SSL handshake.
mbedtls_ssl_early_data_status
Definition: ssl.h:745
int mbedtls_ssl_export_keying_material(mbedtls_ssl_context *ssl, uint8_t *out, const size_t key_len, const char *label, const size_t label_len, const unsigned char *context, const size_t context_len, const int use_context)
TLS-Exporter to derive shared symmetric keys between server and client.
void mbedtls_ssl_set_hs_authmode(mbedtls_ssl_context *ssl, int authmode)
Set authmode for the current handshake.
mbedtls_md_type_t
Supported message digests.
Definition: md.h:50
int mbedtls_ssl_handshake_step(mbedtls_ssl_context *ssl)
Perform a single step of the SSL handshake.
const char * mbedtls_ssl_get_version(const mbedtls_ssl_context *ssl)
Return the current TLS version.
void * mbedtls_ssl_get_async_operation_data(const mbedtls_ssl_context *ssl)
Retrieve the asynchronous operation user context.
void mbedtls_ssl_conf_authmode(mbedtls_ssl_config *conf, int authmode)
Set the certificate verification mode Default: NONE on server, REQUIRED on client.
#define MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN
Definition: ssl.h:366
int mbedtls_ssl_session_reset(mbedtls_ssl_context *ssl)
Reset an already initialized SSL context for re-use while retaining application-set variables...
int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname)
Set or reset the hostname to check against the received peer certificate. On a client, this also sets the ServerName TLS extension, if that extension is enabled. On a TLS 1.3 client, this also sets the server name in the session resumption ticket, if that feature is enabled.
struct mbedtls_ssl_handshake_params mbedtls_ssl_handshake_params
Definition: ssl.h:872
static void mbedtls_ssl_conf_min_tls_version(mbedtls_ssl_config *conf, mbedtls_ssl_protocol_version tls_version)
Set the minimum supported version sent from the client side and/or accepted at the server side...
Definition: ssl.h:4086
static void mbedtls_ssl_conf_max_tls_version(mbedtls_ssl_config *conf, mbedtls_ssl_protocol_version tls_version)
Set the maximum supported version sent from the client side and/or accepted at the server side...
Definition: ssl.h:4068
int mbedtls_ssl_session_load(mbedtls_ssl_session *session, const unsigned char *buf, size_t len)
Load serialized session data into a session structure. On client, this can be used for loading saved ...
int mbedtls_ssl_set_hs_psk(mbedtls_ssl_context *ssl, const unsigned char *psk, size_t psk_len)
Set the pre-shared Key (PSK) for the current handshake.
int mbedtls_ssl_get_session(const mbedtls_ssl_context *ssl, mbedtls_ssl_session *session)
Export a session in order to resume it later.
void mbedtls_ssl_conf_ciphersuites(mbedtls_ssl_config *conf, const int *ciphersuites)
Set the list of allowed ciphersuites and the preference order. First in the list has the highest pref...
#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN
Definition: ssl.h:469
void mbedtls_ssl_set_hs_dn_hints(mbedtls_ssl_context *ssl, const mbedtls_x509_crt *crt)
Set DN hints sent to client in CertificateRequest message.
int(* mbedtls_x509_crt_ca_cb_t)(void *p_ctx, mbedtls_x509_crt const *child, mbedtls_x509_crt **candidate_cas)
The type of trusted certificate callbacks.
Definition: x509_crt.h:778
mbedtls_tls_prf_types
Definition: ssl.h:1260
void mbedtls_ssl_set_async_operation_data(mbedtls_ssl_context *ssl, void *ctx)
Retrieve the asynchronous operation user context.
int mbedtls_ssl_check_record(mbedtls_ssl_context const *ssl, unsigned char *buf, size_t buflen)
Check whether a buffer contains a valid and authentic record that has not been seen before...