mbed TLS v3.1.0
ssl.h
Go to the documentation of this file.
1 
6 /*
7  * Copyright The Mbed TLS Contributors
8  * SPDX-License-Identifier: Apache-2.0
9  *
10  * Licensed under the Apache License, Version 2.0 (the "License"); you may
11  * not use this file except in compliance with the License.
12  * You may obtain a copy of the License at
13  *
14  * http://www.apache.org/licenses/LICENSE-2.0
15  *
16  * Unless required by applicable law or agreed to in writing, software
17  * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
18  * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19  * See the License for the specific language governing permissions and
20  * limitations under the License.
21  */
22 #ifndef MBEDTLS_SSL_H
23 #define MBEDTLS_SSL_H
24 #include "mbedtls/platform_util.h"
25 #include "mbedtls/private_access.h"
26 
27 #include "mbedtls/build_info.h"
28 
29 #include "mbedtls/bignum.h"
30 #include "mbedtls/ecp.h"
31 
33 
34 #if defined(MBEDTLS_X509_CRT_PARSE_C)
35 #include "mbedtls/x509_crt.h"
36 #include "mbedtls/x509_crl.h"
37 #endif
38 
39 #if defined(MBEDTLS_DHM_C)
40 #include "mbedtls/dhm.h"
41 #endif
42 
43 /* Adding guard for MBEDTLS_ECDSA_C to ensure no compile errors due
44  * to guards also being in ssl_srv.c and ssl_cli.c. There is a gap
45  * in functionality that access to ecdh_ctx structure is needed for
46  * MBEDTLS_ECDSA_C which does not seem correct.
47  */
48 #if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C)
49 #include "mbedtls/ecdh.h"
50 #endif
51 
52 #if defined(MBEDTLS_HAVE_TIME)
53 #include "mbedtls/platform_time.h"
54 #endif
55 
56 #if defined(MBEDTLS_USE_PSA_CRYPTO)
57 #include "psa/crypto.h"
58 #endif /* MBEDTLS_USE_PSA_CRYPTO */
59 
60 /*
61  * SSL Error codes
62  */
64 #define MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS -0x7000
65 
66 #define MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE -0x7080
67 
68 #define MBEDTLS_ERR_SSL_BAD_INPUT_DATA -0x7100
69 
70 #define MBEDTLS_ERR_SSL_INVALID_MAC -0x7180
71 
72 #define MBEDTLS_ERR_SSL_INVALID_RECORD -0x7200
73 
74 #define MBEDTLS_ERR_SSL_CONN_EOF -0x7280
75 
76 #define MBEDTLS_ERR_SSL_DECODE_ERROR -0x7300
77 /* Error space gap */
79 #define MBEDTLS_ERR_SSL_NO_RNG -0x7400
80 
81 #define MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE -0x7480
82 
83 #define MBEDTLS_ERR_SSL_UNSUPPORTED_EXTENSION -0x7500
84 
85 #define MBEDTLS_ERR_SSL_NO_APPLICATION_PROTOCOL -0x7580
86 
87 #define MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED -0x7600
88 
89 #define MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED -0x7680
90 
91 #define MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE -0x7700
92 
93 #define MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE -0x7780
94 
95 #define MBEDTLS_ERR_SSL_UNRECOGNIZED_NAME -0x7800
96 
97 #define MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY -0x7880
98 /* Error space gap */
99 /* Error space gap */
101 #define MBEDTLS_ERR_SSL_BAD_CERTIFICATE -0x7A00
102 /* Error space gap */
103 /* Error space gap */
104 /* Error space gap */
105 /* Error space gap */
106 /* Error space gap */
107 /* Error space gap */
108 /* Error space gap */
109 /* Error space gap */
110 /* Error space gap */
112 #define MBEDTLS_ERR_SSL_ALLOC_FAILED -0x7F00
113 
114 #define MBEDTLS_ERR_SSL_HW_ACCEL_FAILED -0x7F80
115 
116 #define MBEDTLS_ERR_SSL_HW_ACCEL_FALLTHROUGH -0x6F80
117 
118 #define MBEDTLS_ERR_SSL_BAD_PROTOCOL_VERSION -0x6E80
119 
120 #define MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE -0x6E00
121 
122 #define MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED -0x6D80
123 
124 #define MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH -0x6D00
125 
126 #define MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY -0x6C80
127 
128 #define MBEDTLS_ERR_SSL_INTERNAL_ERROR -0x6C00
129 
130 #define MBEDTLS_ERR_SSL_COUNTER_WRAPPING -0x6B80
131 
132 #define MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO -0x6B00
133 
134 #define MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED -0x6A80
135 
136 #define MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL -0x6A00
137 /* Error space gap */
139 #define MBEDTLS_ERR_SSL_WANT_READ -0x6900
140 
141 #define MBEDTLS_ERR_SSL_WANT_WRITE -0x6880
142 
143 #define MBEDTLS_ERR_SSL_TIMEOUT -0x6800
144 
145 #define MBEDTLS_ERR_SSL_CLIENT_RECONNECT -0x6780
146 
147 #define MBEDTLS_ERR_SSL_UNEXPECTED_RECORD -0x6700
148 
149 #define MBEDTLS_ERR_SSL_NON_FATAL -0x6680
150 
151 #define MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER -0x6600
152 
153 #define MBEDTLS_ERR_SSL_CONTINUE_PROCESSING -0x6580
154 
155 #define MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS -0x6500
156 
157 #define MBEDTLS_ERR_SSL_EARLY_MESSAGE -0x6480
158 /* Error space gap */
159 /* Error space gap */
160 /* Error space gap */
161 /* Error space gap */
162 /* Error space gap */
163 /* Error space gap */
164 /* Error space gap */
165 /* Error space gap */
167 #define MBEDTLS_ERR_SSL_UNEXPECTED_CID -0x6000
168 
169 #define MBEDTLS_ERR_SSL_VERSION_MISMATCH -0x5F00
170 
171 #define MBEDTLS_ERR_SSL_BAD_CONFIG -0x5E80
172 
173 /*
174  * TLS 1.3 NamedGroup values
175  *
176  * From RF 8446
177  * enum {
178  * // Elliptic Curve Groups (ECDHE)
179  * secp256r1(0x0017), secp384r1(0x0018), secp521r1(0x0019),
180  * x25519(0x001D), x448(0x001E),
181  * // Finite Field Groups (DHE)
182  * ffdhe2048(0x0100), ffdhe3072(0x0101), ffdhe4096(0x0102),
183  * ffdhe6144(0x0103), ffdhe8192(0x0104),
184  * // Reserved Code Points
185  * ffdhe_private_use(0x01FC..0x01FF),
186  * ecdhe_private_use(0xFE00..0xFEFF),
187  * (0xFFFF)
188  * } NamedGroup;
189  *
190  */
191 
192 /* Elliptic Curve Groups (ECDHE) */
193 #define MBEDTLS_SSL_IANA_TLS_GROUP_NONE 0
194 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP192K1 0x0012
195 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP192R1 0x0013
196 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP224K1 0x0014
197 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP224R1 0x0015
198 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP256K1 0x0016
199 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1 0x0017
200 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP384R1 0x0018
201 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP521R1 0x0019
202 #define MBEDTLS_SSL_IANA_TLS_GROUP_BP256R1 0x001A
203 #define MBEDTLS_SSL_IANA_TLS_GROUP_BP384R1 0x001B
204 #define MBEDTLS_SSL_IANA_TLS_GROUP_BP512R1 0x001C
205 #define MBEDTLS_SSL_IANA_TLS_GROUP_X25519 0x001D
206 #define MBEDTLS_SSL_IANA_TLS_GROUP_X448 0x001E
207 /* Finite Field Groups (DHE) */
208 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE2048 0x0100
209 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE3072 0x0101
210 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE4096 0x0102
211 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE6144 0x0103
212 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE8192 0x0104
213 
214 /*
215  * TLS 1.3 Key Exchange Modes
216  *
217  * Mbed TLS internal identifiers for use with the SSL configuration API
218  * mbedtls_ssl_conf_tls13_key_exchange_modes().
219  */
220 
221 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK ( 1u << 0 )
224 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL ( 1u << 1 )
227 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL ( 1u << 2 )
231 /* Convenience macros for sets of key exchanges. */
232 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_ALL \
233  ( MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK | \
234  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL | \
235  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL )
236 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_ALL \
237  ( MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK | \
238  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL )
239 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ALL \
240  ( MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL | \
241  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL )
243 /*
244  * Various constants
245  */
246 
247 /* These are the high an low bytes of ProtocolVersion as defined by:
248  * - RFC 5246: ProtocolVersion version = { 3, 3 }; // TLS v1.2
249  * - RFC 8446: see section 4.2.1
250  */
251 #define MBEDTLS_SSL_MAJOR_VERSION_3 3
252 #define MBEDTLS_SSL_MINOR_VERSION_3 3
253 #define MBEDTLS_SSL_MINOR_VERSION_4 4
255 #define MBEDTLS_SSL_TRANSPORT_STREAM 0
256 #define MBEDTLS_SSL_TRANSPORT_DATAGRAM 1
258 #define MBEDTLS_SSL_MAX_HOST_NAME_LEN 255
259 #define MBEDTLS_SSL_MAX_ALPN_NAME_LEN 255
261 #define MBEDTLS_SSL_MAX_ALPN_LIST_LEN 65535
263 /* RFC 6066 section 4, see also mfl_code_to_length in ssl_tls.c
264  * NONE must be zero so that memset()ing structure to zero works */
265 #define MBEDTLS_SSL_MAX_FRAG_LEN_NONE 0
266 #define MBEDTLS_SSL_MAX_FRAG_LEN_512 1
267 #define MBEDTLS_SSL_MAX_FRAG_LEN_1024 2
268 #define MBEDTLS_SSL_MAX_FRAG_LEN_2048 3
269 #define MBEDTLS_SSL_MAX_FRAG_LEN_4096 4
270 #define MBEDTLS_SSL_MAX_FRAG_LEN_INVALID 5
272 #define MBEDTLS_SSL_IS_CLIENT 0
273 #define MBEDTLS_SSL_IS_SERVER 1
275 #define MBEDTLS_SSL_EXTENDED_MS_DISABLED 0
276 #define MBEDTLS_SSL_EXTENDED_MS_ENABLED 1
277 
278 #define MBEDTLS_SSL_CID_DISABLED 0
279 #define MBEDTLS_SSL_CID_ENABLED 1
280 
281 #define MBEDTLS_SSL_ETM_DISABLED 0
282 #define MBEDTLS_SSL_ETM_ENABLED 1
283 
284 #define MBEDTLS_SSL_COMPRESS_NULL 0
286 #define MBEDTLS_SSL_VERIFY_NONE 0
287 #define MBEDTLS_SSL_VERIFY_OPTIONAL 1
288 #define MBEDTLS_SSL_VERIFY_REQUIRED 2
289 #define MBEDTLS_SSL_VERIFY_UNSET 3 /* Used only for sni_authmode */
291 #define MBEDTLS_SSL_LEGACY_RENEGOTIATION 0
292 #define MBEDTLS_SSL_SECURE_RENEGOTIATION 1
294 #define MBEDTLS_SSL_RENEGOTIATION_DISABLED 0
295 #define MBEDTLS_SSL_RENEGOTIATION_ENABLED 1
296 
297 #define MBEDTLS_SSL_ANTI_REPLAY_DISABLED 0
298 #define MBEDTLS_SSL_ANTI_REPLAY_ENABLED 1
299 
300 #define MBEDTLS_SSL_RENEGOTIATION_NOT_ENFORCED -1
301 #define MBEDTLS_SSL_RENEGO_MAX_RECORDS_DEFAULT 16
302 
303 #define MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION 0
304 #define MBEDTLS_SSL_LEGACY_ALLOW_RENEGOTIATION 1
305 #define MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE 2
307 #define MBEDTLS_SSL_TRUNC_HMAC_DISABLED 0
308 #define MBEDTLS_SSL_TRUNC_HMAC_ENABLED 1
309 #define MBEDTLS_SSL_TRUNCATED_HMAC_LEN 10 /* 80 bits, rfc 6066 section 7 */
311 #define MBEDTLS_SSL_SESSION_TICKETS_DISABLED 0
312 #define MBEDTLS_SSL_SESSION_TICKETS_ENABLED 1
314 #define MBEDTLS_SSL_PRESET_DEFAULT 0
315 #define MBEDTLS_SSL_PRESET_SUITEB 2
316 
317 #define MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED 1
318 #define MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED 0
319 
320 #define MBEDTLS_SSL_DTLS_SRTP_MKI_UNSUPPORTED 0
321 #define MBEDTLS_SSL_DTLS_SRTP_MKI_SUPPORTED 1
322 
323 #define MBEDTLS_SSL_SRV_CIPHERSUITE_ORDER_CLIENT 1
324 #define MBEDTLS_SSL_SRV_CIPHERSUITE_ORDER_SERVER 0
325 
326 /*
327  * Default range for DTLS retransmission timer value, in milliseconds.
328  * RFC 6347 4.2.4.1 says from 1 second to 60 seconds.
329  */
330 #define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MIN 1000
331 #define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MAX 60000
332 
341 /*
342  * Maximum fragment length in bytes,
343  * determines the size of each of the two internal I/O buffers.
344  *
345  * Note: the RFC defines the default size of SSL / TLS messages. If you
346  * change the value here, other clients / servers may not be able to
347  * communicate with you anymore. Only change this value if you control
348  * both sides of the connection and have it reduced at both sides, or
349  * if you're using the Max Fragment Length extension and you know all your
350  * peers are using it too!
351  */
352 #if !defined(MBEDTLS_SSL_IN_CONTENT_LEN)
353 #define MBEDTLS_SSL_IN_CONTENT_LEN 16384
354 #endif
355 
356 #if !defined(MBEDTLS_SSL_OUT_CONTENT_LEN)
357 #define MBEDTLS_SSL_OUT_CONTENT_LEN 16384
358 #endif
360 /*
361  * Maximum number of heap-allocated bytes for the purpose of
362  * DTLS handshake message reassembly and future message buffering.
363  */
364 #if !defined(MBEDTLS_SSL_DTLS_MAX_BUFFERING)
365 #define MBEDTLS_SSL_DTLS_MAX_BUFFERING 32768
366 #endif
367 
368 /*
369  * Maximum length of CIDs for incoming and outgoing messages.
370  */
371 #if !defined(MBEDTLS_SSL_CID_IN_LEN_MAX)
372 #define MBEDTLS_SSL_CID_IN_LEN_MAX 32
373 #endif
374 
375 #if !defined(MBEDTLS_SSL_CID_OUT_LEN_MAX)
376 #define MBEDTLS_SSL_CID_OUT_LEN_MAX 32
377 #endif
379 #if !defined(MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY)
380 #define MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY 16
381 #endif
383 /* \} name SECTION: Module settings */
384 
385 /*
386  * Length of the verify data for secure renegotiation
387  */
388 #define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 12
389 
390 /*
391  * Signaling ciphersuite values (SCSV)
392  */
393 #define MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO 0xFF
395 /*
396  * Supported Signature and Hash algorithms (For TLS 1.2)
397  * RFC 5246 section 7.4.1.4.1
398  */
399 #define MBEDTLS_SSL_HASH_NONE 0
400 #define MBEDTLS_SSL_HASH_MD5 1
401 #define MBEDTLS_SSL_HASH_SHA1 2
402 #define MBEDTLS_SSL_HASH_SHA224 3
403 #define MBEDTLS_SSL_HASH_SHA256 4
404 #define MBEDTLS_SSL_HASH_SHA384 5
405 #define MBEDTLS_SSL_HASH_SHA512 6
407 #define MBEDTLS_SSL_SIG_ANON 0
408 #define MBEDTLS_SSL_SIG_RSA 1
409 #define MBEDTLS_SSL_SIG_ECDSA 3
411 /*
412  * TLS 1.3 signature algorithms
413  * RFC 8446, Section 4.2.2
414  */
416 /* RSASSA-PKCS1-v1_5 algorithms */
417 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA256 0x0401
418 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA384 0x0501
419 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA512 0x0601
420 
421 /* ECDSA algorithms */
422 #define MBEDTLS_TLS1_3_SIG_ECDSA_SECP256R1_SHA256 0x0403
423 #define MBEDTLS_TLS1_3_SIG_ECDSA_SECP384R1_SHA384 0x0503
424 #define MBEDTLS_TLS1_3_SIG_ECDSA_SECP521R1_SHA512 0x0603
426 /* RSASSA-PSS algorithms with public key OID rsaEncryption */
427 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA256 0x0804
428 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA384 0x0805
429 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA512 0x0806
431 /* EdDSA algorithms */
432 #define MBEDTLS_TLS1_3_SIG_ED25519 0x0807
433 #define MBEDTLS_TLS1_3_SIG_ED448 0x0808
435 /* RSASSA-PSS algorithms with public key OID RSASSA-PSS */
436 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA256 0x0809
437 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA384 0x080A
438 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA512 0x080B
440 /* LEGACY ALGORITHMS */
441 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA1 0x0201
442 #define MBEDTLS_TLS1_3_SIG_ECDSA_SHA1 0x0203
444 #define MBEDTLS_TLS1_3_SIG_NONE 0x0
445 
446 /*
447  * Client Certificate Types
448  * RFC 5246 section 7.4.4 plus RFC 4492 section 5.5
449  */
450 #define MBEDTLS_SSL_CERT_TYPE_RSA_SIGN 1
451 #define MBEDTLS_SSL_CERT_TYPE_ECDSA_SIGN 64
452 
453 /*
454  * Message, alert and handshake types
455  */
456 #define MBEDTLS_SSL_MSG_CHANGE_CIPHER_SPEC 20
457 #define MBEDTLS_SSL_MSG_ALERT 21
458 #define MBEDTLS_SSL_MSG_HANDSHAKE 22
459 #define MBEDTLS_SSL_MSG_APPLICATION_DATA 23
460 #define MBEDTLS_SSL_MSG_CID 25
461 
462 #define MBEDTLS_SSL_ALERT_LEVEL_WARNING 1
463 #define MBEDTLS_SSL_ALERT_LEVEL_FATAL 2
465 #define MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY 0 /* 0x00 */
466 #define MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE 10 /* 0x0A */
467 #define MBEDTLS_SSL_ALERT_MSG_BAD_RECORD_MAC 20 /* 0x14 */
468 #define MBEDTLS_SSL_ALERT_MSG_DECRYPTION_FAILED 21 /* 0x15 */
469 #define MBEDTLS_SSL_ALERT_MSG_RECORD_OVERFLOW 22 /* 0x16 */
470 #define MBEDTLS_SSL_ALERT_MSG_DECOMPRESSION_FAILURE 30 /* 0x1E */
471 #define MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE 40 /* 0x28 */
472 #define MBEDTLS_SSL_ALERT_MSG_NO_CERT 41 /* 0x29 */
473 #define MBEDTLS_SSL_ALERT_MSG_BAD_CERT 42 /* 0x2A */
474 #define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT 43 /* 0x2B */
475 #define MBEDTLS_SSL_ALERT_MSG_CERT_REVOKED 44 /* 0x2C */
476 #define MBEDTLS_SSL_ALERT_MSG_CERT_EXPIRED 45 /* 0x2D */
477 #define MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN 46 /* 0x2E */
478 #define MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER 47 /* 0x2F */
479 #define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA 48 /* 0x30 */
480 #define MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED 49 /* 0x31 */
481 #define MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR 50 /* 0x32 */
482 #define MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR 51 /* 0x33 */
483 #define MBEDTLS_SSL_ALERT_MSG_EXPORT_RESTRICTION 60 /* 0x3C */
484 #define MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION 70 /* 0x46 */
485 #define MBEDTLS_SSL_ALERT_MSG_INSUFFICIENT_SECURITY 71 /* 0x47 */
486 #define MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR 80 /* 0x50 */
487 #define MBEDTLS_SSL_ALERT_MSG_INAPROPRIATE_FALLBACK 86 /* 0x56 */
488 #define MBEDTLS_SSL_ALERT_MSG_USER_CANCELED 90 /* 0x5A */
489 #define MBEDTLS_SSL_ALERT_MSG_NO_RENEGOTIATION 100 /* 0x64 */
490 #define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT 110 /* 0x6E */
491 #define MBEDTLS_SSL_ALERT_MSG_UNRECOGNIZED_NAME 112 /* 0x70 */
492 #define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_PSK_IDENTITY 115 /* 0x73 */
493 #define MBEDTLS_SSL_ALERT_MSG_NO_APPLICATION_PROTOCOL 120 /* 0x78 */
495 #define MBEDTLS_SSL_HS_HELLO_REQUEST 0
496 #define MBEDTLS_SSL_HS_CLIENT_HELLO 1
497 #define MBEDTLS_SSL_HS_SERVER_HELLO 2
498 #define MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST 3
499 #define MBEDTLS_SSL_HS_NEW_SESSION_TICKET 4
500 #define MBEDTLS_SSL_HS_ENCRYPTED_EXTENSIONS 8 // NEW IN TLS 1.3
501 #define MBEDTLS_SSL_HS_CERTIFICATE 11
502 #define MBEDTLS_SSL_HS_SERVER_KEY_EXCHANGE 12
503 #define MBEDTLS_SSL_HS_CERTIFICATE_REQUEST 13
504 #define MBEDTLS_SSL_HS_SERVER_HELLO_DONE 14
505 #define MBEDTLS_SSL_HS_CERTIFICATE_VERIFY 15
506 #define MBEDTLS_SSL_HS_CLIENT_KEY_EXCHANGE 16
507 #define MBEDTLS_SSL_HS_FINISHED 20
509 /*
510  * TLS extensions
511  */
512 #define MBEDTLS_TLS_EXT_SERVERNAME 0
513 #define MBEDTLS_TLS_EXT_SERVERNAME_HOSTNAME 0
514 
515 #define MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH 1
516 
517 #define MBEDTLS_TLS_EXT_TRUNCATED_HMAC 4
518 #define MBEDTLS_TLS_EXT_STATUS_REQUEST 5 /* RFC 6066 TLS 1.2 and 1.3 */
520 #define MBEDTLS_TLS_EXT_SUPPORTED_ELLIPTIC_CURVES 10
521 #define MBEDTLS_TLS_EXT_SUPPORTED_GROUPS 10 /* RFC 8422,7919 TLS 1.2 and 1.3 */
522 #define MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS 11
524 #define MBEDTLS_TLS_EXT_SIG_ALG 13 /* RFC 8446 TLS 1.3 */
525 #define MBEDTLS_TLS_EXT_USE_SRTP 14
526 #define MBEDTLS_TLS_EXT_HEARTBEAT 15 /* RFC 6520 TLS 1.2 and 1.3 */
527 #define MBEDTLS_TLS_EXT_ALPN 16
529 #define MBEDTLS_TLS_EXT_SCT 18 /* RFC 6962 TLS 1.2 and 1.3 */
530 #define MBEDTLS_TLS_EXT_CLI_CERT_TYPE 19 /* RFC 7250 TLS 1.2 and 1.3 */
531 #define MBEDTLS_TLS_EXT_SERV_CERT_TYPE 20 /* RFC 7250 TLS 1.2 and 1.3 */
532 #define MBEDTLS_TLS_EXT_PADDING 21 /* RFC 7685 TLS 1.2 and 1.3 */
533 #define MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC 22 /* 0x16 */
534 #define MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET 0x0017 /* 23 */
536 #define MBEDTLS_TLS_EXT_SESSION_TICKET 35
538 #define MBEDTLS_TLS_EXT_PRE_SHARED_KEY 41 /* RFC 8446 TLS 1.3 */
539 #define MBEDTLS_TLS_EXT_EARLY_DATA 42 /* RFC 8446 TLS 1.3 */
540 #define MBEDTLS_TLS_EXT_SUPPORTED_VERSIONS 43 /* RFC 8446 TLS 1.3 */
541 #define MBEDTLS_TLS_EXT_COOKIE 44 /* RFC 8446 TLS 1.3 */
542 #define MBEDTLS_TLS_EXT_PSK_KEY_EXCHANGE_MODES 45 /* RFC 8446 TLS 1.3 */
543 
544 #define MBEDTLS_TLS_EXT_CERT_AUTH 47 /* RFC 8446 TLS 1.3 */
545 #define MBEDTLS_TLS_EXT_OID_FILTERS 48 /* RFC 8446 TLS 1.3 */
546 #define MBEDTLS_TLS_EXT_POST_HANDSHAKE_AUTH 49 /* RFC 8446 TLS 1.3 */
547 #define MBEDTLS_TLS_EXT_SIG_ALG_CERT 50 /* RFC 8446 TLS 1.3 */
548 #define MBEDTLS_TLS_EXT_KEY_SHARE 51 /* RFC 8446 TLS 1.3 */
549 
550 /* The value of the CID extension is still TBD as of
551  * draft-ietf-tls-dtls-connection-id-05
552  * (https://tools.ietf.org/html/draft-ietf-tls-dtls-connection-id-05).
553  *
554  * A future minor revision of Mbed TLS may change the default value of
555  * this option to match evolving standards and usage.
556  */
557 #if !defined(MBEDTLS_TLS_EXT_CID)
558 #define MBEDTLS_TLS_EXT_CID 254 /* TBD */
559 #endif
560 
561 #define MBEDTLS_TLS_EXT_ECJPAKE_KKPP 256 /* experimental */
562 
563 #define MBEDTLS_TLS_EXT_RENEGOTIATION_INFO 0xFF01
565 /*
566  * Size defines
567  */
568 #if !defined(MBEDTLS_PSK_MAX_LEN)
569 #define MBEDTLS_PSK_MAX_LEN 32 /* 256 bits */
570 #endif
571 
572 /* Dummy type used only for its size */
574 {
575 #if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)
576  unsigned char _pms_rsa[48]; /* RFC 5246 8.1.1 */
577 #endif
578 #if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)
579  unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]; /* RFC 5246 8.1.2 */
580 #endif
581 #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
582  defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
583  defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
584  defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
585  unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]; /* RFC 4492 5.10 */
586 #endif
587 #if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
588  unsigned char _pms_psk[4 + 2 * MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 2 */
589 #endif
590 #if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
592  + MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 3 */
593 #endif
594 #if defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)
595  unsigned char _pms_rsa_psk[52 + MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 4 */
596 #endif
597 #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
599  + MBEDTLS_PSK_MAX_LEN]; /* RFC 5489 2 */
600 #endif
601 #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
602  unsigned char _pms_ecjpake[32]; /* Thread spec: SHA-256 output */
603 #endif
604 };
606 #define MBEDTLS_PREMASTER_SIZE sizeof( union mbedtls_ssl_premaster_secret )
607 
608 #define MBEDTLS_TLS1_3_MD_MAX_SIZE MBEDTLS_MD_MAX_SIZE
609 
610 /* Length in number of bytes of the TLS sequence number */
611 #define MBEDTLS_SSL_SEQUENCE_NUMBER_LEN 8
613 #ifdef __cplusplus
614 extern "C" {
615 #endif
616 
617 /*
618  * SSL state machine
619  */
620 typedef enum
621 {
641 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
644 #if defined(MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE)
646 #endif /* MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE */
647 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
648 }
650 
668 typedef int mbedtls_ssl_send_t( void *ctx,
669  const unsigned char *buf,
670  size_t len );
671 
692 typedef int mbedtls_ssl_recv_t( void *ctx,
693  unsigned char *buf,
694  size_t len );
695 
718 typedef int mbedtls_ssl_recv_timeout_t( void *ctx,
719  unsigned char *buf,
720  size_t len,
721  uint32_t timeout );
744 typedef void mbedtls_ssl_set_timer_t( void * ctx,
745  uint32_t int_ms,
746  uint32_t fin_ms );
747 
759 typedef int mbedtls_ssl_get_timer_t( void * ctx );
760 
761 /* Defined below */
766 /* Defined in library/ssl_misc.h */
770 #if defined(MBEDTLS_X509_CRT_PARSE_C)
772 #endif
773 #if defined(MBEDTLS_SSL_PROTO_DTLS)
775 #endif
776 
800 typedef int mbedtls_ssl_cache_get_t( void *data,
801  unsigned char const *session_id,
802  size_t session_id_len,
803  mbedtls_ssl_session *session );
822 typedef int mbedtls_ssl_cache_set_t( void *data,
823  unsigned char const *session_id,
824  size_t session_id_len,
825  const mbedtls_ssl_session *session );
826 
827 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
828 #if defined(MBEDTLS_X509_CRT_PARSE_C)
829 
901  mbedtls_x509_crt *cert,
902  mbedtls_md_type_t md_alg,
903  const unsigned char *hash,
904  size_t hash_len );
905 
967  mbedtls_x509_crt *cert,
968  const unsigned char *input,
969  size_t input_len );
970 #endif /* MBEDTLS_X509_CRT_PARSE_C */
971 
1015  unsigned char *output,
1016  size_t *output_len,
1017  size_t output_size );
1018 
1036 typedef void mbedtls_ssl_async_cancel_t( mbedtls_ssl_context *ssl );
1037 #endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
1038 
1039 #if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
1040  !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
1041 #define MBEDTLS_SSL_PEER_CERT_DIGEST_MAX_LEN 48
1042 #if defined(MBEDTLS_SHA256_C)
1043 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA256
1044 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 32
1045 #elif defined(MBEDTLS_SHA384_C)
1046 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA384
1047 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 48
1048 #elif defined(MBEDTLS_SHA1_C)
1049 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA1
1050 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 20
1051 #else
1052 /* This is already checked in check_config.h, but be sure. */
1053 #error "Bad configuration - need SHA-1, SHA-256 or SHA-512 enabled to compute digest of peer CRT."
1054 #endif
1055 #endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED &&
1056  !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1057 
1058 typedef struct
1059 {
1060  unsigned char client_application_traffic_secret_N[ MBEDTLS_TLS1_3_MD_MAX_SIZE ];
1061  unsigned char server_application_traffic_secret_N[ MBEDTLS_TLS1_3_MD_MAX_SIZE ];
1062  unsigned char exporter_master_secret [ MBEDTLS_TLS1_3_MD_MAX_SIZE ];
1063  unsigned char resumption_master_secret [ MBEDTLS_TLS1_3_MD_MAX_SIZE ];
1065 
1066 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1068 #define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH 255
1069 #define MBEDTLS_TLS_SRTP_MAX_PROFILE_LIST_LENGTH 4
1070 /*
1071  * For code readability use a typedef for DTLS-SRTP profiles
1072  *
1073  * Use_srtp extension protection profiles values as defined in
1074  * http://www.iana.org/assignments/srtp-protection/srtp-protection.xhtml
1075  *
1076  * Reminder: if this list is expanded mbedtls_ssl_check_srtp_profile_value
1077  * must be updated too.
1078  */
1079 #define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80 ( (uint16_t) 0x0001)
1080 #define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32 ( (uint16_t) 0x0002)
1081 #define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80 ( (uint16_t) 0x0005)
1082 #define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32 ( (uint16_t) 0x0006)
1083 /* This one is not iana defined, but for code readability. */
1084 #define MBEDTLS_TLS_SRTP_UNSET ( (uint16_t) 0x0000)
1086 typedef uint16_t mbedtls_ssl_srtp_profile;
1089 {
1091  mbedtls_ssl_srtp_profile MBEDTLS_PRIVATE(chosen_dtls_srtp_profile);
1093  uint16_t MBEDTLS_PRIVATE(mki_len);
1095  unsigned char MBEDTLS_PRIVATE(mki_value)[MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH];
1096 }
1098 
1099 #endif /* MBEDTLS_SSL_DTLS_SRTP */
1100 
1101 /*
1102  * This structure is used for storing current session data.
1103  *
1104  * Note: when changing this definition, we need to check and update:
1105  * - in tests/suites/test_suite_ssl.function:
1106  * ssl_populate_session() and ssl_serialize_session_save_load()
1107  * - in library/ssl_tls.c:
1108  * mbedtls_ssl_session_init() and mbedtls_ssl_session_free()
1109  * mbedtls_ssl_session_save() and ssl_session_load()
1110  * ssl_session_copy()
1111  */
1112 struct mbedtls_ssl_session
1113 {
1114 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1115  unsigned char MBEDTLS_PRIVATE(mfl_code);
1116 #endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
1117 
1118  unsigned char MBEDTLS_PRIVATE(exported);
1119 
1120  /* This field is temporarily duplicated with mbedtls_ssl_context.minor_ver.
1121  * Once runtime negotiation of TLS 1.2 and TLS 1.3 is implemented, it needs
1122  * to be studied whether one of them can be removed. */
1123  unsigned char MBEDTLS_PRIVATE(minor_ver);
1125 #if defined(MBEDTLS_HAVE_TIME)
1127 #endif
1128  int MBEDTLS_PRIVATE(ciphersuite);
1129  int MBEDTLS_PRIVATE(compression);
1130  size_t MBEDTLS_PRIVATE(id_len);
1131  unsigned char MBEDTLS_PRIVATE(id)[32];
1132  unsigned char MBEDTLS_PRIVATE(master)[48];
1134 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1135 #if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
1137 #else /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1140  unsigned char *MBEDTLS_PRIVATE(peer_cert_digest);
1141  size_t MBEDTLS_PRIVATE(peer_cert_digest_len);
1142  mbedtls_md_type_t MBEDTLS_PRIVATE(peer_cert_digest_type);
1143 #endif /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1144 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1145  uint32_t MBEDTLS_PRIVATE(verify_result);
1147 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
1148  unsigned char *MBEDTLS_PRIVATE(ticket);
1149  size_t MBEDTLS_PRIVATE(ticket_len);
1150  uint32_t MBEDTLS_PRIVATE(ticket_lifetime);
1151 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_CLI_C */
1152 
1153 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1154  int MBEDTLS_PRIVATE(encrypt_then_mac);
1155 #endif
1157 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1159 #endif
1160 };
1161 
1162 /*
1163  * Identifiers for PRFs used in various versions of TLS.
1164  */
1165 typedef enum
1166 {
1172 }
1175 typedef enum
1178 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1185 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1203 typedef void mbedtls_ssl_export_keys_t( void *p_expkey,
1205  const unsigned char *secret,
1206  size_t secret_len,
1207  const unsigned char client_random[32],
1208  const unsigned char server_random[32],
1209  mbedtls_tls_prf_types tls_prf_type );
1210 
1214 struct mbedtls_ssl_config
1215 {
1216  /* Group items mostly by size. This helps to reduce memory wasted to
1217  * padding. It also helps to keep smaller fields early in the structure,
1218  * so that elements tend to be in the 128-element direct access window
1219  * on Arm Thumb, which reduces the code size. */
1221  unsigned char MBEDTLS_PRIVATE(max_major_ver);
1222  unsigned char MBEDTLS_PRIVATE(max_minor_ver);
1223  unsigned char MBEDTLS_PRIVATE(min_major_ver);
1224  unsigned char MBEDTLS_PRIVATE(min_minor_ver);
1226  /*
1227  * Flags (could be bit-fields to save RAM, but separate bytes make
1228  * the code smaller on architectures with an instruction for direct
1229  * byte access).
1230  */
1231 
1232  uint8_t MBEDTLS_PRIVATE(endpoint);
1233  uint8_t MBEDTLS_PRIVATE(transport);
1234  uint8_t MBEDTLS_PRIVATE(authmode);
1235  /* needed even with renego disabled for LEGACY_BREAK_HANDSHAKE */
1236  uint8_t MBEDTLS_PRIVATE(allow_legacy_renegotiation);
1237 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1238  uint8_t MBEDTLS_PRIVATE(mfl_code);
1240 #endif
1241 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1242  uint8_t MBEDTLS_PRIVATE(encrypt_then_mac);
1243 #endif
1244 #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
1245  uint8_t MBEDTLS_PRIVATE(extended_ms);
1246 #endif
1247 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1248  uint8_t MBEDTLS_PRIVATE(anti_replay);
1249 #endif
1250 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1251  uint8_t MBEDTLS_PRIVATE(disable_renegotiation);
1252 #endif
1253 #if defined(MBEDTLS_SSL_SESSION_TICKETS)
1254  uint8_t MBEDTLS_PRIVATE(session_tickets);
1255 #endif
1256 #if defined(MBEDTLS_SSL_SRV_C)
1257  uint8_t MBEDTLS_PRIVATE(cert_req_ca_list);
1259  uint8_t MBEDTLS_PRIVATE(respect_cli_pref);
1262 #endif
1263 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1264  uint8_t MBEDTLS_PRIVATE(ignore_unexpected_cid);
1267 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1268 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1269  uint8_t MBEDTLS_PRIVATE(dtls_srtp_mki_support); /* support having mki_value
1270  in the use_srtp extension? */
1271 #endif
1272 
1273  /*
1274  * Pointers
1275  */
1276 
1278  const int *MBEDTLS_PRIVATE(ciphersuite_list);
1279 
1280 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1281 
1282  int MBEDTLS_PRIVATE(tls13_kex_modes);
1283 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1286  void (*MBEDTLS_PRIVATE(f_dbg))(void *, int, const char *, int, const char *);
1287  void *MBEDTLS_PRIVATE(p_dbg);
1290  int (*MBEDTLS_PRIVATE(f_rng))(void *, unsigned char *, size_t);
1291  void *MBEDTLS_PRIVATE(p_rng);
1297  void *MBEDTLS_PRIVATE(p_cache);
1299 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
1301  int (*MBEDTLS_PRIVATE(f_sni))(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
1302  void *MBEDTLS_PRIVATE(p_sni);
1303 #endif
1304 
1305 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1306 
1307  int (*MBEDTLS_PRIVATE(f_vrfy))(void *, mbedtls_x509_crt *, int, uint32_t *);
1308  void *MBEDTLS_PRIVATE(p_vrfy);
1309 #endif
1310 
1311 #if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
1312 
1313  int (*MBEDTLS_PRIVATE(f_psk))(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
1314  void *MBEDTLS_PRIVATE(p_psk);
1315 #endif
1316 
1317 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1318 
1319  int (*MBEDTLS_PRIVATE(f_cookie_write))( void *, unsigned char **, unsigned char *,
1320  const unsigned char *, size_t );
1322  int (*MBEDTLS_PRIVATE(f_cookie_check))( void *, const unsigned char *, size_t,
1323  const unsigned char *, size_t );
1324  void *MBEDTLS_PRIVATE(p_cookie);
1325 #endif
1326 
1327 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
1329  int (*MBEDTLS_PRIVATE(f_ticket_write))( void *, const mbedtls_ssl_session *,
1330  unsigned char *, const unsigned char *, size_t *, uint32_t * );
1332  int (*MBEDTLS_PRIVATE(f_ticket_parse))( void *, mbedtls_ssl_session *, unsigned char *, size_t);
1333  void *MBEDTLS_PRIVATE(p_ticket);
1334 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
1336 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1337  size_t MBEDTLS_PRIVATE(cid_len);
1338 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1340 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1341  const mbedtls_x509_crt_profile *MBEDTLS_PRIVATE(cert_profile);
1345 #if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
1347  void *MBEDTLS_PRIVATE(p_ca_cb);
1348 #endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
1349 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1351 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
1352 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1354  mbedtls_ssl_async_decrypt_t *MBEDTLS_PRIVATE(f_async_decrypt_start);
1355 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1356  mbedtls_ssl_async_resume_t *MBEDTLS_PRIVATE(f_async_resume);
1357  mbedtls_ssl_async_cancel_t *MBEDTLS_PRIVATE(f_async_cancel);
1358  void *MBEDTLS_PRIVATE(p_async_config_data);
1359 #endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
1361 #if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
1362  const int *MBEDTLS_PRIVATE(sig_hashes);
1364 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1365  const uint16_t *MBEDTLS_PRIVATE(tls13_sig_algs);
1366 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1367 #endif
1369 #if defined(MBEDTLS_ECP_C) && !defined(MBEDTLS_DEPRECATED_REMOVED)
1370  const mbedtls_ecp_group_id *MBEDTLS_PRIVATE(curve_list);
1371 #endif
1372 
1373  const uint16_t *MBEDTLS_PRIVATE(group_list);
1375 #if defined(MBEDTLS_DHM_C)
1376  mbedtls_mpi MBEDTLS_PRIVATE(dhm_P);
1377  mbedtls_mpi MBEDTLS_PRIVATE(dhm_G);
1378 #endif
1380 #if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
1381 
1382 #if defined(MBEDTLS_USE_PSA_CRYPTO)
1389 #endif /* MBEDTLS_USE_PSA_CRYPTO */
1390 
1391  unsigned char *MBEDTLS_PRIVATE(psk);
1395  size_t MBEDTLS_PRIVATE(psk_len);
1401  unsigned char *MBEDTLS_PRIVATE(psk_identity);
1406  size_t MBEDTLS_PRIVATE(psk_identity_len);
1412 #endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
1413 
1414 #if defined(MBEDTLS_SSL_ALPN)
1415  const char **MBEDTLS_PRIVATE(alpn_list);
1416 #endif
1417 
1418 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1419 
1420  const mbedtls_ssl_srtp_profile *MBEDTLS_PRIVATE(dtls_srtp_profile_list);
1422  size_t MBEDTLS_PRIVATE(dtls_srtp_profile_list_len);
1423 #endif /* MBEDTLS_SSL_DTLS_SRTP */
1424 
1425  /*
1426  * Numerical settings (int)
1427  */
1429  uint32_t MBEDTLS_PRIVATE(read_timeout);
1431 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1432  uint32_t MBEDTLS_PRIVATE(hs_timeout_min);
1434  uint32_t MBEDTLS_PRIVATE(hs_timeout_max);
1436 #endif
1437 
1438 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1439  int MBEDTLS_PRIVATE(renego_max_records);
1440  unsigned char MBEDTLS_PRIVATE(renego_period)[8];
1442 #endif
1443 
1444  unsigned int MBEDTLS_PRIVATE(badmac_limit);
1446 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
1447  unsigned int MBEDTLS_PRIVATE(dhm_min_bitlen);
1448 #endif
1449 };
1451 struct mbedtls_ssl_context
1452 {
1455  /*
1456  * Miscellaneous
1457  */
1458  int MBEDTLS_PRIVATE(state);
1459 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1460  int MBEDTLS_PRIVATE(renego_status);
1461  int MBEDTLS_PRIVATE(renego_records_seen);
1464 #endif /* MBEDTLS_SSL_RENEGOTIATION */
1465 
1466  int MBEDTLS_PRIVATE(major_ver);
1468  /* This field is temporarily duplicated with mbedtls_ssl_context.minor_ver.
1469  * Once runtime negotiation of TLS 1.2 and TLS 1.3 is implemented, it needs
1470  * to be studied whether one of them can be removed. */
1471  int MBEDTLS_PRIVATE(minor_ver);
1472  unsigned MBEDTLS_PRIVATE(badmac_seen);
1474 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1475 
1476  int (*MBEDTLS_PRIVATE(f_vrfy))(void *, mbedtls_x509_crt *, int, uint32_t *);
1477  void *MBEDTLS_PRIVATE(p_vrfy);
1478 #endif
1479 
1485  void *MBEDTLS_PRIVATE(p_bio);
1487  /*
1488  * Session layer
1489  */
1490  mbedtls_ssl_session *MBEDTLS_PRIVATE(session_in);
1493  mbedtls_ssl_session *MBEDTLS_PRIVATE(session_negotiate);
1498  /*
1499  * Record layer transformations
1500  */
1504  mbedtls_ssl_transform *MBEDTLS_PRIVATE(transform_out);
1510  mbedtls_ssl_transform *MBEDTLS_PRIVATE(transform_negotiate);
1514 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1515 
1517  mbedtls_ssl_transform *MBEDTLS_PRIVATE(transform_application);
1518 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1519 
1520  /*
1521  * Timers
1522  */
1523  void *MBEDTLS_PRIVATE(p_timer);
1528  /*
1529  * Record layer (incoming data)
1530  */
1531  unsigned char *MBEDTLS_PRIVATE(in_buf);
1532  unsigned char *MBEDTLS_PRIVATE(in_ctr);
1535  unsigned char *MBEDTLS_PRIVATE(in_hdr);
1536 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1537  unsigned char *MBEDTLS_PRIVATE(in_cid);
1539 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1540  unsigned char *MBEDTLS_PRIVATE(in_len);
1541  unsigned char *MBEDTLS_PRIVATE(in_iv);
1542  unsigned char *MBEDTLS_PRIVATE(in_msg);
1543  unsigned char *MBEDTLS_PRIVATE(in_offt);
1545  int MBEDTLS_PRIVATE(in_msgtype);
1546  size_t MBEDTLS_PRIVATE(in_msglen);
1547  size_t MBEDTLS_PRIVATE(in_left);
1548 #if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1549  size_t MBEDTLS_PRIVATE(in_buf_len);
1550 #endif
1551 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1552  uint16_t MBEDTLS_PRIVATE(in_epoch);
1553  size_t MBEDTLS_PRIVATE(next_record_offset);
1555 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1556 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1557  uint64_t MBEDTLS_PRIVATE(in_window_top);
1558  uint64_t MBEDTLS_PRIVATE(in_window);
1559 #endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
1560 
1561  size_t MBEDTLS_PRIVATE(in_hslen);
1563  int MBEDTLS_PRIVATE(nb_zero);
1565  int MBEDTLS_PRIVATE(keep_current_message);
1568  /* The following three variables indicate if and, if yes,
1569  * what kind of alert is pending to be sent.
1570  */
1571  unsigned char MBEDTLS_PRIVATE(send_alert);
1575  unsigned char MBEDTLS_PRIVATE(alert_type);
1577  int MBEDTLS_PRIVATE(alert_reason);
1581 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1582  uint8_t MBEDTLS_PRIVATE(disable_datagram_packing);
1584 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1585 
1586  /*
1587  * Record layer (outgoing data)
1588  */
1589  unsigned char *MBEDTLS_PRIVATE(out_buf);
1590  unsigned char *MBEDTLS_PRIVATE(out_ctr);
1591  unsigned char *MBEDTLS_PRIVATE(out_hdr);
1592 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1593  unsigned char *MBEDTLS_PRIVATE(out_cid);
1595 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1596  unsigned char *MBEDTLS_PRIVATE(out_len);
1597  unsigned char *MBEDTLS_PRIVATE(out_iv);
1598  unsigned char *MBEDTLS_PRIVATE(out_msg);
1600  int MBEDTLS_PRIVATE(out_msgtype);
1601  size_t MBEDTLS_PRIVATE(out_msglen);
1602  size_t MBEDTLS_PRIVATE(out_left);
1603 #if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1604  size_t MBEDTLS_PRIVATE(out_buf_len);
1605 #endif
1607  unsigned char MBEDTLS_PRIVATE(cur_out_ctr)[MBEDTLS_SSL_SEQUENCE_NUMBER_LEN];
1609 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1610  uint16_t MBEDTLS_PRIVATE(mtu);
1611 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1612 
1613  /*
1614  * PKI layer
1615  */
1616  int MBEDTLS_PRIVATE(client_auth);
1618  /*
1619  * User settings
1620  */
1621 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1622  char *MBEDTLS_PRIVATE(hostname);
1624 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1625 
1626 #if defined(MBEDTLS_SSL_ALPN)
1627  const char *MBEDTLS_PRIVATE(alpn_chosen);
1628 #endif /* MBEDTLS_SSL_ALPN */
1629 
1630 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1631  /*
1632  * use_srtp extension
1633  */
1634  mbedtls_dtls_srtp_info MBEDTLS_PRIVATE(dtls_srtp_info);
1635 #endif /* MBEDTLS_SSL_DTLS_SRTP */
1636 
1637  /*
1638  * Information for DTLS hello verify
1639  */
1640 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1641  unsigned char *MBEDTLS_PRIVATE(cli_id);
1642  size_t MBEDTLS_PRIVATE(cli_id_len);
1643 #endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
1644 
1645  /*
1646  * Secure renegotiation
1647  */
1648  /* needed to know when to send extension on server */
1649  int MBEDTLS_PRIVATE(secure_renegotiation);
1651 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1652  size_t MBEDTLS_PRIVATE(verify_data_len);
1653  char MBEDTLS_PRIVATE(own_verify_data)[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN];
1654  char MBEDTLS_PRIVATE(peer_verify_data)[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN];
1655 #endif /* MBEDTLS_SSL_RENEGOTIATION */
1656 
1657 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1658  /* CID configuration to use in subsequent handshakes. */
1664  unsigned char MBEDTLS_PRIVATE(own_cid)[ MBEDTLS_SSL_CID_IN_LEN_MAX ];
1665  uint8_t MBEDTLS_PRIVATE(own_cid_len);
1666  uint8_t MBEDTLS_PRIVATE(negotiate_cid);
1670 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1674  void *MBEDTLS_PRIVATE(p_export_keys);
1675 };
1676 
1685 const char *mbedtls_ssl_get_ciphersuite_name( const int ciphersuite_id );
1686 
1695 int mbedtls_ssl_get_ciphersuite_id( const char *ciphersuite_name );
1696 
1705 
1727  const mbedtls_ssl_config *conf );
1728 
1739 
1746 void mbedtls_ssl_conf_endpoint( mbedtls_ssl_config *conf, int endpoint );
1747 
1762 void mbedtls_ssl_conf_transport( mbedtls_ssl_config *conf, int transport );
1763 
1790 void mbedtls_ssl_conf_authmode( mbedtls_ssl_config *conf, int authmode );
1791 
1792 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1793 
1809  int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
1810  void *p_vrfy );
1811 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1812 
1821  int (*f_rng)(void *, unsigned char *, size_t),
1822  void *p_rng );
1823 
1839  void (*f_dbg)(void *, int, const char *, int, const char *),
1840  void *p_dbg );
1841 
1873  void *p_bio,
1874  mbedtls_ssl_send_t *f_send,
1875  mbedtls_ssl_recv_t *f_recv,
1876  mbedtls_ssl_recv_timeout_t *f_recv_timeout );
1877 
1878 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1879 
1880 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1881 
1882 
1967  int enable,
1968  unsigned char const *own_cid,
1969  size_t own_cid_len );
1970 
2009  int *enabled,
2010  unsigned char peer_cid[ MBEDTLS_SSL_CID_OUT_LEN_MAX ],
2011  size_t *peer_cid_len );
2012 
2013 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
2014 
2054 void mbedtls_ssl_set_mtu( mbedtls_ssl_context *ssl, uint16_t mtu );
2055 #endif /* MBEDTLS_SSL_PROTO_DTLS */
2056 
2057 #if defined(MBEDTLS_X509_CRT_PARSE_C)
2058 
2077  int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
2078  void *p_vrfy );
2079 #endif /* MBEDTLS_X509_CRT_PARSE_C */
2080 
2097 void mbedtls_ssl_conf_read_timeout( mbedtls_ssl_config *conf, uint32_t timeout );
2098 
2144  unsigned char *buf,
2145  size_t buflen );
2146 
2168  void *p_timer,
2169  mbedtls_ssl_set_timer_t *f_set_timer,
2170  mbedtls_ssl_get_timer_t *f_get_timer );
2171 
2191 typedef int mbedtls_ssl_ticket_write_t( void *p_ticket,
2192  const mbedtls_ssl_session *session,
2193  unsigned char *start,
2194  const unsigned char *end,
2195  size_t *tlen,
2196  uint32_t *lifetime );
2221 typedef int mbedtls_ssl_ticket_parse_t( void *p_ticket,
2222  mbedtls_ssl_session *session,
2223  unsigned char *buf,
2224  size_t len );
2225 
2226 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
2242  mbedtls_ssl_ticket_write_t *f_ticket_write,
2243  mbedtls_ssl_ticket_parse_t *f_ticket_parse,
2244  void *p_ticket );
2245 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
2246 
2266  mbedtls_ssl_export_keys_t *f_export_keys,
2267  void *p_export_keys );
2268 
2269 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
2270 
2301  mbedtls_ssl_async_sign_t *f_async_sign,
2302  mbedtls_ssl_async_decrypt_t *f_async_decrypt,
2303  mbedtls_ssl_async_resume_t *f_async_resume,
2304  mbedtls_ssl_async_cancel_t *f_async_cancel,
2305  void *config_data );
2306 
2316 
2332 
2345  void *ctx );
2346 #endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
2347 
2362 typedef int mbedtls_ssl_cookie_write_t( void *ctx,
2363  unsigned char **p, unsigned char *end,
2364  const unsigned char *info, size_t ilen );
2365 
2379 typedef int mbedtls_ssl_cookie_check_t( void *ctx,
2380  const unsigned char *cookie, size_t clen,
2381  const unsigned char *info, size_t ilen );
2382 
2383 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
2384 
2413  mbedtls_ssl_cookie_write_t *f_cookie_write,
2414  mbedtls_ssl_cookie_check_t *f_cookie_check,
2415  void *p_cookie );
2416 
2437  const unsigned char *info,
2438  size_t ilen );
2439 
2440 #endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
2441 
2442 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
2443 
2458 void mbedtls_ssl_conf_dtls_anti_replay( mbedtls_ssl_config *conf, char mode );
2459 #endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
2460 
2484 void mbedtls_ssl_conf_dtls_badmac_limit( mbedtls_ssl_config *conf, unsigned limit );
2485 
2486 #if defined(MBEDTLS_SSL_PROTO_DTLS)
2487 
2517  unsigned allow_packing );
2518 
2550 void mbedtls_ssl_conf_handshake_timeout( mbedtls_ssl_config *conf, uint32_t min, uint32_t max );
2551 #endif /* MBEDTLS_SSL_PROTO_DTLS */
2552 
2553 #if defined(MBEDTLS_SSL_SRV_C)
2554 
2592  void *p_cache,
2593  mbedtls_ssl_cache_get_t *f_get_cache,
2594  mbedtls_ssl_cache_set_t *f_set_cache );
2595 #endif /* MBEDTLS_SSL_SRV_C */
2596 
2597 #if defined(MBEDTLS_SSL_CLI_C)
2598 
2644 #endif /* MBEDTLS_SSL_CLI_C */
2645 
2679  const unsigned char *buf,
2680  size_t len );
2681 
2707 int mbedtls_ssl_session_save( const mbedtls_ssl_session *session,
2708  unsigned char *buf,
2709  size_t buf_len,
2710  size_t *olen );
2711 
2754  const int *ciphersuites );
2755 
2756 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
2757 
2800  const int kex_modes );
2801 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
2802 
2803 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
2804 #define MBEDTLS_SSL_UNEXPECTED_CID_IGNORE 0
2805 #define MBEDTLS_SSL_UNEXPECTED_CID_FAIL 1
2806 
2838 int mbedtls_ssl_conf_cid( mbedtls_ssl_config *conf, size_t len,
2839  int ignore_other_cids );
2840 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
2841 
2842 #if defined(MBEDTLS_X509_CRT_PARSE_C)
2843 
2854  const mbedtls_x509_crt_profile *profile );
2855 
2868  mbedtls_x509_crt *ca_chain,
2869  mbedtls_x509_crl *ca_crl );
2870 
2871 #if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
2872 
2924  mbedtls_x509_crt_ca_cb_t f_ca_cb,
2925  void *p_ca_cb );
2926 #endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
2927 
2965  mbedtls_x509_crt *own_cert,
2966  mbedtls_pk_context *pk_key );
2967 #endif /* MBEDTLS_X509_CRT_PARSE_C */
2968 
2969 #if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
2970 
3003  const unsigned char *psk, size_t psk_len,
3004  const unsigned char *psk_identity, size_t psk_identity_len );
3005 
3006 #if defined(MBEDTLS_USE_PSA_CRYPTO)
3007 
3045  psa_key_id_t psk,
3046  const unsigned char *psk_identity,
3047  size_t psk_identity_len );
3048 #endif /* MBEDTLS_USE_PSA_CRYPTO */
3049 
3067  const unsigned char *psk, size_t psk_len );
3068 
3069 #if defined(MBEDTLS_USE_PSA_CRYPTO)
3070 
3091  psa_key_id_t psk );
3092 #endif /* MBEDTLS_USE_PSA_CRYPTO */
3093 
3133  int (*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *,
3134  size_t),
3135  void *p_psk );
3136 #endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
3137 
3138 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_SRV_C)
3139 
3153  const unsigned char *dhm_P, size_t P_len,
3154  const unsigned char *dhm_G, size_t G_len );
3155 
3165 int mbedtls_ssl_conf_dh_param_ctx( mbedtls_ssl_config *conf, mbedtls_dhm_context *dhm_ctx );
3166 #endif /* MBEDTLS_DHM_C && defined(MBEDTLS_SSL_SRV_C) */
3167 
3168 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
3169 
3178  unsigned int bitlen );
3179 #endif /* MBEDTLS_DHM_C && MBEDTLS_SSL_CLI_C */
3180 
3181 #if defined(MBEDTLS_ECP_C)
3182 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
3183 
3224 void MBEDTLS_DEPRECATED mbedtls_ssl_conf_curves( mbedtls_ssl_config *conf,
3225  const mbedtls_ecp_group_id *curves );
3226 #endif /* MBEDTLS_DEPRECATED_REMOVED */
3227 #endif /* MBEDTLS_ECP_C */
3228 
3267  const uint16_t *groups );
3268 
3269 #if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
3270 
3300  const int *hashes );
3301 
3302 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
3303 
3313  const uint16_t* sig_algs );
3314 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
3315 #endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
3316 
3317 #if defined(MBEDTLS_X509_CRT_PARSE_C)
3318 
3336 int mbedtls_ssl_set_hostname( mbedtls_ssl_context *ssl, const char *hostname );
3337 #endif /* MBEDTLS_X509_CRT_PARSE_C */
3338 
3339 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
3340 
3353  mbedtls_x509_crt *own_cert,
3354  mbedtls_pk_context *pk_key );
3355 
3368  mbedtls_x509_crt *ca_chain,
3369  mbedtls_x509_crl *ca_crl );
3370 
3382  int authmode );
3383 
3408  int (*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *,
3409  size_t),
3410  void *p_sni );
3411 #endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION */
3412 
3413 #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
3414 
3432  const unsigned char *pw,
3433  size_t pw_len );
3434 #endif /*MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
3435 
3436 #if defined(MBEDTLS_SSL_ALPN)
3437 
3449 int mbedtls_ssl_conf_alpn_protocols( mbedtls_ssl_config *conf, const char **protos );
3450 
3460 const char *mbedtls_ssl_get_alpn_protocol( const mbedtls_ssl_context *ssl );
3461 #endif /* MBEDTLS_SSL_ALPN */
3462 
3463 #if defined(MBEDTLS_SSL_DTLS_SRTP)
3464 #if defined(MBEDTLS_DEBUG_C)
3465 static inline const char *mbedtls_ssl_get_srtp_profile_as_string( mbedtls_ssl_srtp_profile profile )
3466 {
3467  switch( profile )
3468  {
3470  return( "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80" );
3472  return( "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32" );
3474  return( "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80" );
3476  return( "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32" );
3477  default: break;
3478  }
3479  return( "" );
3480 }
3481 #endif /* MBEDTLS_DEBUG_C */
3482 
3496  int support_mki_value );
3497 
3518  ( mbedtls_ssl_config *conf,
3519  const mbedtls_ssl_srtp_profile *profiles );
3520 
3538  unsigned char *mki_value,
3539  uint16_t mki_len );
3559  mbedtls_dtls_srtp_info *dtls_srtp_info );
3560 #endif /* MBEDTLS_SSL_DTLS_SRTP */
3561 
3575 void mbedtls_ssl_conf_max_version( mbedtls_ssl_config *conf, int major, int minor );
3576 
3590 void mbedtls_ssl_conf_min_version( mbedtls_ssl_config *conf, int major, int minor );
3591 
3592 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
3593 
3605 #endif /* MBEDTLS_SSL_ENCRYPT_THEN_MAC */
3606 
3607 #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
3608 
3620 #endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */
3621 
3622 #if defined(MBEDTLS_SSL_SRV_C)
3623 
3633  char cert_req_ca_list );
3634 #endif /* MBEDTLS_SSL_SRV_C */
3635 
3636 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
3637 
3671 int mbedtls_ssl_conf_max_frag_len( mbedtls_ssl_config *conf, unsigned char mfl_code );
3672 #endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
3673 
3674 #if defined(MBEDTLS_SSL_SRV_C)
3675 
3684 void mbedtls_ssl_conf_preference_order( mbedtls_ssl_config *conf, int order );
3685 #endif /* MBEDTLS_SSL_SRV_C */
3686 
3687 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
3688 
3698 void mbedtls_ssl_conf_session_tickets( mbedtls_ssl_config *conf, int use_tickets );
3699 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_CLI_C */
3700 
3701 #if defined(MBEDTLS_SSL_RENEGOTIATION)
3702 
3719 void mbedtls_ssl_conf_renegotiation( mbedtls_ssl_config *conf, int renegotiation );
3720 #endif /* MBEDTLS_SSL_RENEGOTIATION */
3721 
3749 void mbedtls_ssl_conf_legacy_renegotiation( mbedtls_ssl_config *conf, int allow_legacy );
3750 
3751 #if defined(MBEDTLS_SSL_RENEGOTIATION)
3752 
3789 void mbedtls_ssl_conf_renegotiation_enforced( mbedtls_ssl_config *conf, int max_records );
3790 
3817  const unsigned char period[8] );
3818 #endif /* MBEDTLS_SSL_RENEGOTIATION */
3819 
3859 
3876 
3889 uint32_t mbedtls_ssl_get_verify_result( const mbedtls_ssl_context *ssl );
3890 
3898 const char *mbedtls_ssl_get_ciphersuite( const mbedtls_ssl_context *ssl );
3899 
3907 const char *mbedtls_ssl_get_version( const mbedtls_ssl_context *ssl );
3908 
3918 
3945 
3965 
3966 #if defined(MBEDTLS_X509_CRT_PARSE_C)
3967 
3998 #endif /* MBEDTLS_X509_CRT_PARSE_C */
3999 
4000 #if defined(MBEDTLS_SSL_CLI_C)
4001 
4036  mbedtls_ssl_session *session );
4037 #endif /* MBEDTLS_SSL_CLI_C */
4038 
4090 
4112 
4113 #if defined(MBEDTLS_SSL_RENEGOTIATION)
4114 
4138 #endif /* MBEDTLS_SSL_RENEGOTIATION */
4139 
4217 int mbedtls_ssl_read( mbedtls_ssl_context *ssl, unsigned char *buf, size_t len );
4218 
4279 int mbedtls_ssl_write( mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len );
4280 
4298  unsigned char level,
4299  unsigned char message );
4314 
4321 
4322 #if defined(MBEDTLS_SSL_CONTEXT_SERIALIZATION)
4323 
4372  unsigned char *buf,
4373  size_t buf_len,
4374  size_t *olen );
4375 
4442  const unsigned char *buf,
4443  size_t len );
4444 #endif /* MBEDTLS_SSL_CONTEXT_SERIALIZATION */
4445 
4457 
4474  int endpoint, int transport, int preset );
4475 
4482 
4489 
4500 
4517  const unsigned char *secret, size_t slen,
4518  const char *label,
4519  const unsigned char *random, size_t rlen,
4520  unsigned char *dstbuf, size_t dlen );
4521 
4522 #ifdef __cplusplus
4523 }
4524 #endif
4525 
4526 #endif /* ssl.h */
int mbedtls_ssl_tls_prf(const mbedtls_tls_prf_types prf, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen)
TLS-PRF function for key derivation.
void * mbedtls_ssl_conf_get_async_config_data(const mbedtls_ssl_config *conf)
Retrieve the configuration data set by mbedtls_ssl_conf_async_private_cb().
Public key container.
Definition: pk.h:199
#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80
Definition: ssl.h:1087
void mbedtls_ssl_set_hs_ca_chain(mbedtls_ssl_context *ssl, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate for the current handshake.
int mbedtls_ssl_ticket_parse_t(void *p_ticket, mbedtls_ssl_session *session, unsigned char *buf, size_t len)
Callback type: parse and load session ticket.
Definition: ssl.h:2227
const char * mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id)
Return the name of the ciphersuite associated with the given ID.
void mbedtls_ssl_conf_encrypt_then_mac(mbedtls_ssl_config *conf, char etm)
Enable or disable Encrypt-then-MAC (Default: MBEDTLS_SSL_ETM_ENABLED)
int mbedtls_ssl_cookie_write_t(void *ctx, unsigned char **p, unsigned char *end, const unsigned char *info, size_t ilen)
Callback type: generate a cookie.
Definition: ssl.h:2368
int mbedtls_ssl_dtls_srtp_set_mki_value(mbedtls_ssl_context *ssl, unsigned char *mki_value, uint16_t mki_len)
Set the mki_value for the current DTLS-SRTP session.
int mbedtls_ssl_cookie_check_t(void *ctx, const unsigned char *cookie, size_t clen, const unsigned char *info, size_t ilen)
Callback type: verify a cookie.
Definition: ssl.h:2385
void mbedtls_ssl_set_timer_cb(mbedtls_ssl_context *ssl, void *p_timer, mbedtls_ssl_set_timer_t *f_set_timer, mbedtls_ssl_get_timer_t *f_get_timer)
Set the timer callbacks (Mandatory for DTLS.)
struct mbedtls_ssl_sig_hash_set_t mbedtls_ssl_sig_hash_set_t
Definition: ssl.h:775
uint16_t mbedtls_ssl_srtp_profile
Definition: ssl.h:1092
void mbedtls_ssl_conf_extended_master_secret(mbedtls_ssl_config *conf, char ems)
Enable or disable Extended Master Secret negotiation. (Default: MBEDTLS_SSL_EXTENDED_MS_ENABLED) ...
int mbedtls_ssl_get_max_in_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum incoming record payload in bytes.
int mbedtls_ssl_send_t(void *ctx, const unsigned char *buf, size_t len)
Callback type: send data on the network.
Definition: ssl.h:674
#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32
Definition: ssl.h:1088
void mbedtls_ssl_set_verify(mbedtls_ssl_context *ssl, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set a connection-specific verification callback (optional).
int mbedtls_ssl_recv_t(void *ctx, unsigned char *buf, size_t len)
Callback type: receive data from the network.
Definition: ssl.h:698
This file provides an API for Elliptic Curves over GF(P) (ECP).
void mbedtls_ssl_conf_preference_order(mbedtls_ssl_config *conf, int order)
Pick the ciphersuites order according to the second parameter in the SSL Server module (MBEDTLS_SSL_S...
void mbedtls_ssl_export_keys_t(void *p_expkey, mbedtls_ssl_key_export_type type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type)
Callback type: Export key alongside random values for session identification, and PRF for implementat...
Definition: ssl.h:1209
int mbedtls_ssl_async_decrypt_t(mbedtls_ssl_context *ssl, mbedtls_x509_crt *cert, const unsigned char *input, size_t input_len)
Callback type: start external decryption operation.
Definition: ssl.h:972
Platform Security Architecture cryptography module.
unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]
Definition: ssl.h:585
void mbedtls_ssl_conf_verify(mbedtls_ssl_config *conf, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set the verification callback (Optional).
unsigned char _pms_rsa[48]
Definition: ssl.h:582
unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]
Definition: ssl.h:591
int mbedtls_ssl_get_max_out_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum outgoing record payload in bytes.
void mbedtls_ssl_conf_renegotiation(mbedtls_ssl_config *conf, int renegotiation)
Enable / Disable renegotiation support for connection when initiated by peer (Default: MBEDTLS_SSL_RE...
int mbedtls_ssl_conf_dh_param_bin(mbedtls_ssl_config *conf, const unsigned char *dhm_P, size_t P_len, const unsigned char *dhm_G, size_t G_len)
Set the Diffie-Hellman public P and G values from big-endian binary presentations. (Default values: MBEDTLS_DHM_RFC3526_MODP_2048_[PG]_BIN)
#define MBEDTLS_PRIVATE(member)
void mbedtls_ssl_conf_dtls_anti_replay(mbedtls_ssl_config *conf, char mode)
Enable or disable anti-replay protection for DTLS. (DTLS only, no effect on TLS.) Default: enabled...
void mbedtls_ssl_conf_srtp_mki_value_supported(mbedtls_ssl_config *conf, int support_mki_value)
Manage support for mki(master key id) value in use_srtp extension. MKI is an optional part of SRTP us...
uint32_t psa_key_id_t
Definition: crypto_types.h:225
void mbedtls_ssl_conf_max_version(mbedtls_ssl_config *conf, int major, int minor)
Set the maximum supported version sent from the client side and/or accepted at the server side (Defau...
#define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH
Definition: ssl.h:1074
uint32_t mbedtls_ssl_get_verify_result(const mbedtls_ssl_context *ssl)
Return the result of the certificate verification.
void mbedtls_ssl_conf_session_tickets_cb(mbedtls_ssl_config *conf, mbedtls_ssl_ticket_write_t *f_ticket_write, mbedtls_ssl_ticket_parse_t *f_ticket_parse, void *p_ticket)
Configure SSL session ticket callbacks (server only). (Default: none.)
int mbedtls_ssl_set_cid(mbedtls_ssl_context *ssl, int enable, unsigned char const *own_cid, size_t own_cid_len)
Configure the use of the Connection ID (CID) extension in the next handshake.
int mbedtls_ssl_check_pending(const mbedtls_ssl_context *ssl)
Check if there is data already read from the underlying transport but not yet processed.
const mbedtls_x509_crt * mbedtls_ssl_get_peer_cert(const mbedtls_ssl_context *ssl)
Return the peer certificate from the current connection.
int mbedtls_ssl_session_save(const mbedtls_ssl_session *session, unsigned char *buf, size_t buf_len, size_t *olen)
Save session structure as serialized data in a buffer. On client, this can be used for saving session...
int mbedtls_ssl_send_alert_message(mbedtls_ssl_context *ssl, unsigned char level, unsigned char message)
Send an alert message.
int mbedtls_ssl_recv_timeout_t(void *ctx, unsigned char *buf, size_t len, uint32_t timeout)
Callback type: receive data from the network, with timeout.
Definition: ssl.h:724
SSL Ciphersuites for mbed TLS.
void mbedtls_ssl_conf_session_cache(mbedtls_ssl_config *conf, void *p_cache, mbedtls_ssl_cache_get_t *f_get_cache, mbedtls_ssl_cache_set_t *f_set_cache)
Set the session cache callbacks (server-side only) If not set, no session resuming is done (except if...
void mbedtls_ssl_conf_renegotiation_period(mbedtls_ssl_config *conf, const unsigned char period[8])
Set record counter threshold for periodic renegotiation. (Default: 2^48 - 1)
void mbedtls_ssl_conf_sig_algs(mbedtls_ssl_config *conf, const uint16_t *sig_algs)
Configure allowed signature algorithms for use in TLS 1.3.
int mbedtls_ssl_conf_psk_opaque(mbedtls_ssl_config *conf, psa_key_id_t psk, const unsigned char *psk_identity, size_t psk_identity_len)
Configure one or more opaque pre-shared keys (PSKs) and their identities to be used in PSK-based ciph...
int mbedtls_ssl_cache_set_t(void *data, unsigned char const *session_id, size_t session_id_len, const mbedtls_ssl_session *session)
Callback type: server-side session cache setter.
Definition: ssl.h:828
Multi-precision integer library.
int mbedtls_ssl_conf_psk(mbedtls_ssl_config *conf, const unsigned char *psk, size_t psk_len, const unsigned char *psk_identity, size_t psk_identity_len)
Configure pre-shared keys (PSKs) and their identities to be used in PSK-based ciphersuites.
int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code)
Set the maximum fragment length to emit and/or negotiate. (Typical: the smaller of MBEDTLS_SSL_IN_CON...
Common and shared functions used by multiple modules in the Mbed TLS library.
time_t mbedtls_time_t
Definition: platform_time.h:47
int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Try to write exactly 'len' application data bytes.
void mbedtls_ssl_conf_cert_req_ca_list(mbedtls_ssl_config *conf, char cert_req_ca_list)
Whether to send a list of acceptable CAs in CertificateRequest messages. (Default: do send) ...
void mbedtls_ssl_conf_min_version(mbedtls_ssl_config *conf, int major, int minor)
Set the minimum accepted SSL/TLS protocol version (Default: TLS 1.2)
int mbedtls_ssl_set_hs_psk_opaque(mbedtls_ssl_context *ssl, psa_key_id_t psk)
Set an opaque pre-shared Key (PSK) for the current handshake.
int mbedtls_ssl_close_notify(mbedtls_ssl_context *ssl)
Notify the peer that the connection is being closed.
struct mbedtls_ssl_flight_item mbedtls_ssl_flight_item
Definition: ssl.h:780
int mbedtls_ssl_cache_get_t(void *data, unsigned char const *session_id, size_t session_id_len, mbedtls_ssl_session *session)
Callback type: server-side session cache getter.
Definition: ssl.h:806
void mbedtls_ssl_conf_session_tickets(mbedtls_ssl_config *conf, int use_tickets)
Enable / Disable session tickets (client only). (Default: MBEDTLS_SSL_SESSION_TICKETS_ENABLED.)
void mbedtls_ssl_free(mbedtls_ssl_context *ssl)
Free referenced items in an SSL context and clear memory.
void mbedtls_ssl_conf_endpoint(mbedtls_ssl_config *conf, int endpoint)
Set the current endpoint type.
void mbedtls_ssl_session_free(mbedtls_ssl_session *session)
Free referenced items in an SSL session including the peer certificate and clear memory.
void mbedtls_ssl_conf_ca_cb(mbedtls_ssl_config *conf, mbedtls_x509_crt_ca_cb_t f_ca_cb, void *p_ca_cb)
Set the trusted certificate callback.
void mbedtls_ssl_conf_sig_hashes(mbedtls_ssl_config *conf, const int *hashes)
Set the allowed hashes for signatures during the handshake.
struct mbedtls_ssl_transform mbedtls_ssl_transform
Definition: ssl.h:773
#define MBEDTLS_TLS1_3_MD_MAX_SIZE
Definition: ssl.h:614
const char * mbedtls_ssl_get_alpn_protocol(const mbedtls_ssl_context *ssl)
Get the name of the negotiated Application Layer Protocol. This function should be called after the h...
unsigned char _pms_ecjpake[32]
Definition: ssl.h:608
void mbedtls_ssl_conf_dhm_min_bitlen(mbedtls_ssl_config *conf, unsigned int bitlen)
Set the minimum length for Diffie-Hellman parameters. (Client-side only.) (Default: 1024 bits...
void mbedtls_ssl_conf_dtls_cookies(mbedtls_ssl_config *conf, mbedtls_ssl_cookie_write_t *f_cookie_write, mbedtls_ssl_cookie_check_t *f_cookie_check, void *p_cookie)
Register callbacks for DTLS cookies (Server only. DTLS only.)
int mbedtls_ssl_conf_cid(mbedtls_ssl_config *conf, size_t len, int ignore_other_cids)
Specify the length of Connection IDs for incoming encrypted DTLS records, as well as the behaviour on...
int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name)
Return the ID of the ciphersuite associated with the given name.
void mbedtls_ssl_conf_transport(mbedtls_ssl_config *conf, int transport)
Set the transport type (TLS or DTLS). Default: TLS.
mbedtls_ssl_key_export_type
Definition: ssl.h:1181
void mbedtls_ssl_get_dtls_srtp_negotiation_result(const mbedtls_ssl_context *ssl, mbedtls_dtls_srtp_info *dtls_srtp_info)
Get the negotiated DTLS-SRTP informations: Protection profile and MKI value.
mbedtls_ssl_states
Definition: ssl.h:626
void mbedtls_ssl_conf_sni(mbedtls_ssl_config *conf, int(*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_sni)
Set server side ServerName TLS extension callback (optional, server-side only).
#define MBEDTLS_SSL_SEQUENCE_NUMBER_LEN
Definition: ssl.h:617
void mbedtls_ssl_conf_renegotiation_enforced(mbedtls_ssl_config *conf, int max_records)
Enforce renegotiation requests. (Default: enforced, max_records = 16)
void mbedtls_ssl_set_mtu(mbedtls_ssl_context *ssl, uint16_t mtu)
Set the Maximum Tranport Unit (MTU). Special value: 0 means unset (no limit). This represents the max...
int mbedtls_ssl_set_client_transport_id(mbedtls_ssl_context *ssl, const unsigned char *info, size_t ilen)
Set client's transport-level identification info. (Server only. DTLS only.)
void mbedtls_ssl_set_bio(mbedtls_ssl_context *ssl, void *p_bio, mbedtls_ssl_send_t *f_send, mbedtls_ssl_recv_t *f_recv, mbedtls_ssl_recv_timeout_t *f_recv_timeout)
Set the underlying BIO callbacks for write, read and read-with-timeout.
Macro wrapper for struct's memebrs.
int mbedtls_ssl_context_save(mbedtls_ssl_context *ssl, unsigned char *buf, size_t buf_len, size_t *olen)
Save an active connection as serialized data in a buffer. This allows the freeing or re-using of the ...
void mbedtls_ssl_conf_rng(mbedtls_ssl_config *conf, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Set the random number generator callback.
int mbedtls_ssl_conf_alpn_protocols(mbedtls_ssl_config *conf, const char **protos)
Set the supported Application Layer Protocols.
void mbedtls_ssl_conf_cert_profile(mbedtls_ssl_config *conf, const mbedtls_x509_crt_profile *profile)
Set the X.509 security profile used for verification.
unsigned char _pms_ecdhe_psk[4+MBEDTLS_ECP_MAX_BYTES+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:605
This file contains Diffie-Hellman-Merkle (DHM) key exchange definitions and functions.
X.509 certificate parsing and writing.
int mbedtls_ssl_context_load(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Load serialized connection data to an SSL context.
#define MBEDTLS_PSK_MAX_LEN
Definition: ssl.h:575
void mbedtls_ssl_init(mbedtls_ssl_context *ssl)
Initialize an SSL context Just makes the context ready for mbedtls_ssl_setup() or mbedtls_ssl_free() ...
const char * mbedtls_ssl_get_ciphersuite(const mbedtls_ssl_context *ssl)
Return the name of the current ciphersuite.
void mbedtls_ssl_set_export_keys_cb(mbedtls_ssl_context *ssl, mbedtls_ssl_export_keys_t *f_export_keys, void *p_export_keys)
Configure a key export callback. (Default: none.)
mbedtls_ecp_group_id
Definition: ecp.h:113
int mbedtls_ssl_get_timer_t(void *ctx)
Callback type: get status of timers/delays.
Definition: ssl.h:765
void mbedtls_ssl_conf_dbg(mbedtls_ssl_config *conf, void(*f_dbg)(void *, int, const char *, int, const char *), void *p_dbg)
Set the debug callback.
void mbedtls_ssl_config_init(mbedtls_ssl_config *conf)
Initialize an SSL configuration context Just makes the context ready for mbedtls_ssl_config_defaults(...
int mbedtls_ssl_get_record_expansion(const mbedtls_ssl_context *ssl)
Return the (maximum) number of bytes added by the record layer: header + encryption/MAC overhead (inc...
This file contains ECDH definitions and functions.
int mbedtls_ssl_conf_dh_param_ctx(mbedtls_ssl_config *conf, mbedtls_dhm_context *dhm_ctx)
Set the Diffie-Hellman public P and G values, read from existing context (server-side only) ...
Build-time configuration info.
void mbedtls_ssl_conf_groups(mbedtls_ssl_config *conf, const uint16_t *groups)
Set the allowed groups in order of preference.
int mbedtls_ssl_set_session(mbedtls_ssl_context *ssl, const mbedtls_ssl_session *session)
Load a session for session resumption.
#define MBEDTLS_MPI_MAX_SIZE
Definition: bignum.h:85
int mbedtls_ssl_async_sign_t(mbedtls_ssl_context *ssl, mbedtls_x509_crt *cert, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len)
Callback type: start external signature operation.
Definition: ssl.h:906
void mbedtls_ssl_set_datagram_packing(mbedtls_ssl_context *ssl, unsigned allow_packing)
Allow or disallow packing of multiple handshake records within a single datagram. ...
int mbedtls_ssl_set_hs_own_cert(mbedtls_ssl_context *ssl, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate and key for the current handshake.
int mbedtls_ssl_conf_own_cert(mbedtls_ssl_config *conf, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate chain and private key.
static const char * mbedtls_ssl_get_srtp_profile_as_string(mbedtls_ssl_srtp_profile profile)
Definition: ssl.h:3471
int mbedtls_ssl_setup(mbedtls_ssl_context *ssl, const mbedtls_ssl_config *conf)
Set up an SSL context for use.
void mbedtls_ssl_conf_legacy_renegotiation(mbedtls_ssl_config *conf, int allow_legacy)
Prevent or allow legacy renegotiation. (Default: MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION) ...
unsigned char _pms_rsa_psk[52+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:601
int mbedtls_ssl_renegotiate(mbedtls_ssl_context *ssl)
Initiate an SSL renegotiation on the running connection. Client: perform the renegotiation right now...
void mbedtls_ssl_async_cancel_t(mbedtls_ssl_context *ssl)
Callback type: cancel external operation.
Definition: ssl.h:1042
#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32
Definition: ssl.h:1086
int mbedtls_ssl_async_resume_t(mbedtls_ssl_context *ssl, unsigned char *output, size_t *output_len, size_t output_size)
Callback type: resume external operation.
Definition: ssl.h:1020
MPI structure.
Definition: bignum.h:189
X.509 certificate revocation list parsing.
void mbedtls_ssl_conf_async_private_cb(mbedtls_ssl_config *conf, mbedtls_ssl_async_sign_t *f_async_sign, mbedtls_ssl_async_decrypt_t *f_async_decrypt, mbedtls_ssl_async_resume_t *f_async_resume, mbedtls_ssl_async_cancel_t *f_async_cancel, void *config_data)
Configure asynchronous private key operation callbacks.
void mbedtls_ssl_conf_psk_cb(mbedtls_ssl_config *conf, int(*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_psk)
Set the PSK callback (server-side only).
int mbedtls_ssl_set_hs_ecjpake_password(mbedtls_ssl_context *ssl, const unsigned char *pw, size_t pw_len)
Set the EC J-PAKE password for current handshake.
void mbedtls_ssl_conf_read_timeout(mbedtls_ssl_config *conf, uint32_t timeout)
Set the timeout period for mbedtls_ssl_read() (Default: no timeout.)
void mbedtls_ssl_config_free(mbedtls_ssl_config *conf)
Free an SSL configuration context.
int mbedtls_ssl_conf_dtls_srtp_protection_profiles(mbedtls_ssl_config *conf, const mbedtls_ssl_srtp_profile *profiles)
Set the supported DTLS-SRTP protection profiles.
#define MBEDTLS_SSL_CID_OUT_LEN_MAX
Definition: ssl.h:382
int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len)
Read at most 'len' application data bytes.
struct mbedtls_ssl_key_cert mbedtls_ssl_key_cert
Definition: ssl.h:777
void mbedtls_ssl_set_timer_t(void *ctx, uint32_t int_ms, uint32_t fin_ms)
Callback type: set a pair of timers/delays to watch.
Definition: ssl.h:750
size_t mbedtls_ssl_get_bytes_avail(const mbedtls_ssl_context *ssl)
Return the number of application data bytes remaining to be read from the current record...
unsigned char _pms_dhe_psk[4+MBEDTLS_MPI_MAX_SIZE+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:598
#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80
Definition: ssl.h:1085
void mbedtls_ssl_conf_tls13_key_exchange_modes(mbedtls_ssl_config *conf, const int kex_modes)
Set the supported key exchange modes for TLS 1.3 connections.
#define MBEDTLS_SSL_CID_IN_LEN_MAX
Definition: ssl.h:378
int mbedtls_ssl_get_peer_cid(mbedtls_ssl_context *ssl, int *enabled, unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX], size_t *peer_cid_len)
Get information about the use of the CID extension in the current connection.
void mbedtls_ssl_session_init(mbedtls_ssl_session *session)
Initialize SSL session structure.
struct mbedtls_dtls_srtp_info_t mbedtls_dtls_srtp_info
int mbedtls_ssl_ticket_write_t(void *p_ticket, const mbedtls_ssl_session *session, unsigned char *start, const unsigned char *end, size_t *tlen, uint32_t *lifetime)
Callback type: generate and write session ticket.
Definition: ssl.h:2197
void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max)
Set retransmit timeout values for the DTLS handshake. (DTLS only, no effect on TLS.)
mbed TLS Platform time abstraction
int mbedtls_ssl_config_defaults(mbedtls_ssl_config *conf, int endpoint, int transport, int preset)
Load reasonnable default SSL configuration values. (You need to call mbedtls_ssl_config_init() first...
void mbedtls_ssl_conf_ca_chain(mbedtls_ssl_config *conf, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate.
void mbedtls_ssl_conf_dtls_badmac_limit(mbedtls_ssl_config *conf, unsigned limit)
Set a limit on the number of records with a bad MAC before terminating the connection. (DTLS only, no effect on TLS.) Default: 0 (disabled).
unsigned char _pms_psk[4+2 *MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:594
int mbedtls_ssl_handshake(mbedtls_ssl_context *ssl)
Perform the SSL handshake.
void mbedtls_ssl_set_hs_authmode(mbedtls_ssl_context *ssl, int authmode)
Set authmode for the current handshake.
mbedtls_md_type_t
Supported message digests.
Definition: md.h:55
int mbedtls_ssl_handshake_step(mbedtls_ssl_context *ssl)
Perform a single step of the SSL handshake.
const char * mbedtls_ssl_get_version(const mbedtls_ssl_context *ssl)
Return the current TLS version.
void * mbedtls_ssl_get_async_operation_data(const mbedtls_ssl_context *ssl)
Retrieve the asynchronous operation user context.
void mbedtls_ssl_conf_authmode(mbedtls_ssl_config *conf, int authmode)
Set the certificate verification mode Default: NONE on server, REQUIRED on client.
int mbedtls_ssl_session_reset(mbedtls_ssl_context *ssl)
Reset an already initialized SSL context for re-use while retaining application-set variables...
int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname)
Set or reset the hostname to check against the received server certificate. It sets the ServerName TL...
struct mbedtls_ssl_handshake_params mbedtls_ssl_handshake_params
Definition: ssl.h:774
#define MBEDTLS_ECP_MAX_BYTES
Definition: ecp.h:346
int mbedtls_ssl_session_load(mbedtls_ssl_session *session, const unsigned char *buf, size_t len)
Load serialized session data into a session structure. On client, this can be used for loading saved ...
int mbedtls_ssl_set_hs_psk(mbedtls_ssl_context *ssl, const unsigned char *psk, size_t psk_len)
Set the pre-shared Key (PSK) for the current handshake.
int mbedtls_ssl_get_session(const mbedtls_ssl_context *ssl, mbedtls_ssl_session *session)
Export a session in order to resume it later.
void mbedtls_ssl_conf_ciphersuites(mbedtls_ssl_config *conf, const int *ciphersuites)
Set the list of allowed ciphersuites and the preference order. First in the list has the highest pref...
#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN
Definition: ssl.h:394
int(* mbedtls_x509_crt_ca_cb_t)(void *p_ctx, mbedtls_x509_crt const *child, mbedtls_x509_crt **candidate_cas)
The type of trusted certificate callbacks.
Definition: x509_crt.h:840
mbedtls_tls_prf_types
Definition: ssl.h:1171
void mbedtls_ssl_set_async_operation_data(mbedtls_ssl_context *ssl, void *ctx)
Retrieve the asynchronous operation user context.
int mbedtls_ssl_check_record(mbedtls_ssl_context const *ssl, unsigned char *buf, size_t buflen)
Check whether a buffer contains a valid and authentic record that has not been seen before...