Mbed TLS v3.5.0
ssl.h
Go to the documentation of this file.
1 
6 /*
7  * Copyright The Mbed TLS Contributors
8  * SPDX-License-Identifier: Apache-2.0
9  *
10  * Licensed under the Apache License, Version 2.0 (the "License"); you may
11  * not use this file except in compliance with the License.
12  * You may obtain a copy of the License at
13  *
14  * http://www.apache.org/licenses/LICENSE-2.0
15  *
16  * Unless required by applicable law or agreed to in writing, software
17  * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
18  * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19  * See the License for the specific language governing permissions and
20  * limitations under the License.
21  */
22 #ifndef MBEDTLS_SSL_H
23 #define MBEDTLS_SSL_H
24 #include "mbedtls/platform_util.h"
25 #include "mbedtls/private_access.h"
26 
27 #include "mbedtls/build_info.h"
28 
29 #include "mbedtls/bignum.h"
30 #include "mbedtls/ecp.h"
31 
33 
34 #if defined(MBEDTLS_X509_CRT_PARSE_C)
35 #include "mbedtls/x509_crt.h"
36 #include "mbedtls/x509_crl.h"
37 #endif
38 
39 #if defined(MBEDTLS_DHM_C)
40 #include "mbedtls/dhm.h"
41 #endif
42 
43 #include "mbedtls/md.h"
44 
45 #if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_ANY_ENABLED)
46 #include "mbedtls/ecdh.h"
47 #endif
48 
49 #if defined(MBEDTLS_HAVE_TIME)
50 #include "mbedtls/platform_time.h"
51 #endif
52 
53 #include "psa/crypto.h"
54 
55 /*
56  * SSL Error codes
57  */
59 #define MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS -0x7000
61 #define MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE -0x7080
63 #define MBEDTLS_ERR_SSL_BAD_INPUT_DATA -0x7100
65 #define MBEDTLS_ERR_SSL_INVALID_MAC -0x7180
67 #define MBEDTLS_ERR_SSL_INVALID_RECORD -0x7200
69 #define MBEDTLS_ERR_SSL_CONN_EOF -0x7280
71 #define MBEDTLS_ERR_SSL_DECODE_ERROR -0x7300
72 /* Error space gap */
74 #define MBEDTLS_ERR_SSL_NO_RNG -0x7400
76 #define MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE -0x7480
78 #define MBEDTLS_ERR_SSL_UNSUPPORTED_EXTENSION -0x7500
80 #define MBEDTLS_ERR_SSL_NO_APPLICATION_PROTOCOL -0x7580
82 #define MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED -0x7600
84 #define MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED -0x7680
86 #define MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE -0x7700
88 #define MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE -0x7780
90 #define MBEDTLS_ERR_SSL_UNRECOGNIZED_NAME -0x7800
92 #define MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY -0x7880
93 /* Error space gap */
94 /* Error space gap */
96 #define MBEDTLS_ERR_SSL_BAD_CERTIFICATE -0x7A00
97 /* Error space gap */
102 #define MBEDTLS_ERR_SSL_RECEIVED_NEW_SESSION_TICKET -0x7B00
104 #define MBEDTLS_ERR_SSL_CANNOT_READ_EARLY_DATA -0x7B80
106 #define MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA -0x7C00
107 /* Error space gap */
108 /* Error space gap */
109 /* Error space gap */
110 /* Error space gap */
112 #define MBEDTLS_ERR_SSL_CACHE_ENTRY_NOT_FOUND -0x7E80
114 #define MBEDTLS_ERR_SSL_ALLOC_FAILED -0x7F00
116 #define MBEDTLS_ERR_SSL_HW_ACCEL_FAILED -0x7F80
118 #define MBEDTLS_ERR_SSL_HW_ACCEL_FALLTHROUGH -0x6F80
120 #define MBEDTLS_ERR_SSL_BAD_PROTOCOL_VERSION -0x6E80
122 #define MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE -0x6E00
124 #define MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED -0x6D80
126 #define MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH -0x6D00
128 #define MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY -0x6C80
130 #define MBEDTLS_ERR_SSL_INTERNAL_ERROR -0x6C00
132 #define MBEDTLS_ERR_SSL_COUNTER_WRAPPING -0x6B80
134 #define MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO -0x6B00
136 #define MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED -0x6A80
138 #define MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL -0x6A00
139 /* Error space gap */
141 #define MBEDTLS_ERR_SSL_WANT_READ -0x6900
143 #define MBEDTLS_ERR_SSL_WANT_WRITE -0x6880
145 #define MBEDTLS_ERR_SSL_TIMEOUT -0x6800
147 #define MBEDTLS_ERR_SSL_CLIENT_RECONNECT -0x6780
149 #define MBEDTLS_ERR_SSL_UNEXPECTED_RECORD -0x6700
151 #define MBEDTLS_ERR_SSL_NON_FATAL -0x6680
153 #define MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER -0x6600
155 #define MBEDTLS_ERR_SSL_CONTINUE_PROCESSING -0x6580
157 #define MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS -0x6500
159 #define MBEDTLS_ERR_SSL_EARLY_MESSAGE -0x6480
160 /* Error space gap */
161 /* Error space gap */
162 /* Error space gap */
163 /* Error space gap */
164 /* Error space gap */
165 /* Error space gap */
166 /* Error space gap */
167 /* Error space gap */
169 #define MBEDTLS_ERR_SSL_UNEXPECTED_CID -0x6000
171 #define MBEDTLS_ERR_SSL_VERSION_MISMATCH -0x5F00
173 #define MBEDTLS_ERR_SSL_BAD_CONFIG -0x5E80
174 
175 /*
176  * Constants from RFC 8446 for TLS 1.3 PSK modes
177  *
178  * Those are used in the Pre-Shared Key Exchange Modes extension.
179  * See Section 4.2.9 in RFC 8446.
180  */
181 #define MBEDTLS_SSL_TLS1_3_PSK_MODE_PURE 0 /* Pure PSK-based exchange */
182 #define MBEDTLS_SSL_TLS1_3_PSK_MODE_ECDHE 1 /* PSK+ECDHE-based exchange */
183 
184 /*
185  * TLS 1.3 NamedGroup values
186  *
187  * From RF 8446
188  * enum {
189  * // Elliptic Curve Groups (ECDHE)
190  * secp256r1(0x0017), secp384r1(0x0018), secp521r1(0x0019),
191  * x25519(0x001D), x448(0x001E),
192  * // Finite Field Groups (DHE)
193  * ffdhe2048(0x0100), ffdhe3072(0x0101), ffdhe4096(0x0102),
194  * ffdhe6144(0x0103), ffdhe8192(0x0104),
195  * // Reserved Code Points
196  * ffdhe_private_use(0x01FC..0x01FF),
197  * ecdhe_private_use(0xFE00..0xFEFF),
198  * (0xFFFF)
199  * } NamedGroup;
200  *
201  */
202 
203 /* Elliptic Curve Groups (ECDHE) */
204 #define MBEDTLS_SSL_IANA_TLS_GROUP_NONE 0
205 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP192K1 0x0012
206 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP192R1 0x0013
207 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP224K1 0x0014
208 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP224R1 0x0015
209 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP256K1 0x0016
210 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1 0x0017
211 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP384R1 0x0018
212 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP521R1 0x0019
213 #define MBEDTLS_SSL_IANA_TLS_GROUP_BP256R1 0x001A
214 #define MBEDTLS_SSL_IANA_TLS_GROUP_BP384R1 0x001B
215 #define MBEDTLS_SSL_IANA_TLS_GROUP_BP512R1 0x001C
216 #define MBEDTLS_SSL_IANA_TLS_GROUP_X25519 0x001D
217 #define MBEDTLS_SSL_IANA_TLS_GROUP_X448 0x001E
218 /* Finite Field Groups (DHE) */
219 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE2048 0x0100
220 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE3072 0x0101
221 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE4096 0x0102
222 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE6144 0x0103
223 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE8192 0x0104
224 
225 /*
226  * TLS 1.3 Key Exchange Modes
227  *
228  * Mbed TLS internal identifiers for use with the SSL configuration API
229  * mbedtls_ssl_conf_tls13_key_exchange_modes().
230  */
231 
232 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK (1u << 0)
235 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL (1u << 1)
238 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL (1u << 2)
242 /* Convenience macros for sets of key exchanges. */
243 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_ALL \
244  (MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK | \
245  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL | \
246  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL)
247 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_ALL \
248  (MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK | \
249  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL)
250 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ALL \
251  (MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL | \
252  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL)
254 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_NONE (0)
255 
256 /*
257  * Various constants
258  */
259 
260 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
261 /* These are the high and low bytes of ProtocolVersion as defined by:
262  * - RFC 5246: ProtocolVersion version = { 3, 3 }; // TLS v1.2
263  * - RFC 8446: see section 4.2.1
264  */
265 #define MBEDTLS_SSL_MAJOR_VERSION_3 3
266 #define MBEDTLS_SSL_MINOR_VERSION_3 3
267 #define MBEDTLS_SSL_MINOR_VERSION_4 4
268 #endif /* MBEDTLS_DEPRECATED_REMOVED */
269 
270 #define MBEDTLS_SSL_TRANSPORT_STREAM 0
271 #define MBEDTLS_SSL_TRANSPORT_DATAGRAM 1
273 #define MBEDTLS_SSL_MAX_HOST_NAME_LEN 255
274 #define MBEDTLS_SSL_MAX_ALPN_NAME_LEN 255
276 #define MBEDTLS_SSL_MAX_ALPN_LIST_LEN 65535
278 /* RFC 6066 section 4, see also mfl_code_to_length in ssl_tls.c
279  * NONE must be zero so that memset()ing structure to zero works */
280 #define MBEDTLS_SSL_MAX_FRAG_LEN_NONE 0
281 #define MBEDTLS_SSL_MAX_FRAG_LEN_512 1
282 #define MBEDTLS_SSL_MAX_FRAG_LEN_1024 2
283 #define MBEDTLS_SSL_MAX_FRAG_LEN_2048 3
284 #define MBEDTLS_SSL_MAX_FRAG_LEN_4096 4
285 #define MBEDTLS_SSL_MAX_FRAG_LEN_INVALID 5
287 #define MBEDTLS_SSL_IS_CLIENT 0
288 #define MBEDTLS_SSL_IS_SERVER 1
289 
290 #define MBEDTLS_SSL_EXTENDED_MS_DISABLED 0
291 #define MBEDTLS_SSL_EXTENDED_MS_ENABLED 1
292 
293 #define MBEDTLS_SSL_CID_DISABLED 0
294 #define MBEDTLS_SSL_CID_ENABLED 1
295 
296 #define MBEDTLS_SSL_ETM_DISABLED 0
297 #define MBEDTLS_SSL_ETM_ENABLED 1
298 
299 #define MBEDTLS_SSL_COMPRESS_NULL 0
300 
301 #define MBEDTLS_SSL_VERIFY_NONE 0
302 #define MBEDTLS_SSL_VERIFY_OPTIONAL 1
303 #define MBEDTLS_SSL_VERIFY_REQUIRED 2
304 #define MBEDTLS_SSL_VERIFY_UNSET 3 /* Used only for sni_authmode */
305 
306 #define MBEDTLS_SSL_LEGACY_RENEGOTIATION 0
307 #define MBEDTLS_SSL_SECURE_RENEGOTIATION 1
308 
309 #define MBEDTLS_SSL_RENEGOTIATION_DISABLED 0
310 #define MBEDTLS_SSL_RENEGOTIATION_ENABLED 1
311 
312 #define MBEDTLS_SSL_ANTI_REPLAY_DISABLED 0
313 #define MBEDTLS_SSL_ANTI_REPLAY_ENABLED 1
314 
315 #define MBEDTLS_SSL_RENEGOTIATION_NOT_ENFORCED -1
316 #define MBEDTLS_SSL_RENEGO_MAX_RECORDS_DEFAULT 16
317 
318 #define MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION 0
319 #define MBEDTLS_SSL_LEGACY_ALLOW_RENEGOTIATION 1
320 #define MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE 2
321 
322 #define MBEDTLS_SSL_TRUNC_HMAC_DISABLED 0
323 #define MBEDTLS_SSL_TRUNC_HMAC_ENABLED 1
324 #define MBEDTLS_SSL_TRUNCATED_HMAC_LEN 10 /* 80 bits, rfc 6066 section 7 */
325 
326 #define MBEDTLS_SSL_SESSION_TICKETS_DISABLED 0
327 #define MBEDTLS_SSL_SESSION_TICKETS_ENABLED 1
328 
329 #define MBEDTLS_SSL_PRESET_DEFAULT 0
330 #define MBEDTLS_SSL_PRESET_SUITEB 2
331 
332 #define MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED 1
333 #define MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED 0
334 
335 #define MBEDTLS_SSL_EARLY_DATA_DISABLED 0
336 #define MBEDTLS_SSL_EARLY_DATA_ENABLED 1
337 
338 #define MBEDTLS_SSL_DTLS_SRTP_MKI_UNSUPPORTED 0
339 #define MBEDTLS_SSL_DTLS_SRTP_MKI_SUPPORTED 1
340 
341 #define MBEDTLS_SSL_SRV_CIPHERSUITE_ORDER_CLIENT 1
342 #define MBEDTLS_SSL_SRV_CIPHERSUITE_ORDER_SERVER 0
343 
344 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS)
345 #if defined(PSA_WANT_ALG_SHA_384)
346 #define MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN 48
347 #elif defined(PSA_WANT_ALG_SHA_256)
348 #define MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN 32
349 #endif
350 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 && MBEDTLS_SSL_SESSION_TICKETS */
351 /*
352  * Default range for DTLS retransmission timer value, in milliseconds.
353  * RFC 6347 4.2.4.1 says from 1 second to 60 seconds.
354  */
355 #define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MIN 1000
356 #define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MAX 60000
357 
366 /*
367  * Maximum fragment length in bytes,
368  * determines the size of each of the two internal I/O buffers.
369  *
370  * Note: the RFC defines the default size of SSL / TLS messages. If you
371  * change the value here, other clients / servers may not be able to
372  * communicate with you anymore. Only change this value if you control
373  * both sides of the connection and have it reduced at both sides, or
374  * if you're using the Max Fragment Length extension and you know all your
375  * peers are using it too!
376  */
377 #if !defined(MBEDTLS_SSL_IN_CONTENT_LEN)
378 #define MBEDTLS_SSL_IN_CONTENT_LEN 16384
379 #endif
380 
381 #if !defined(MBEDTLS_SSL_OUT_CONTENT_LEN)
382 #define MBEDTLS_SSL_OUT_CONTENT_LEN 16384
383 #endif
384 
385 /*
386  * Maximum number of heap-allocated bytes for the purpose of
387  * DTLS handshake message reassembly and future message buffering.
388  */
389 #if !defined(MBEDTLS_SSL_DTLS_MAX_BUFFERING)
390 #define MBEDTLS_SSL_DTLS_MAX_BUFFERING 32768
391 #endif
392 
393 /*
394  * Maximum length of CIDs for incoming and outgoing messages.
395  */
396 #if !defined(MBEDTLS_SSL_CID_IN_LEN_MAX)
397 #define MBEDTLS_SSL_CID_IN_LEN_MAX 32
398 #endif
399 
400 #if !defined(MBEDTLS_SSL_CID_OUT_LEN_MAX)
401 #define MBEDTLS_SSL_CID_OUT_LEN_MAX 32
402 #endif
403 
404 #if !defined(MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY)
405 #define MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY 16
406 #endif
407 
408 #if !defined(MBEDTLS_SSL_MAX_EARLY_DATA_SIZE)
409 #define MBEDTLS_SSL_MAX_EARLY_DATA_SIZE 1024
410 #endif
411 
412 #if !defined(MBEDTLS_SSL_TLS1_3_TICKET_AGE_TOLERANCE)
413 #define MBEDTLS_SSL_TLS1_3_TICKET_AGE_TOLERANCE 6000
414 #endif
415 
416 #if !defined(MBEDTLS_SSL_TLS1_3_TICKET_NONCE_LENGTH)
417 #define MBEDTLS_SSL_TLS1_3_TICKET_NONCE_LENGTH 32
418 #endif
419 
420 #if !defined(MBEDTLS_SSL_TLS1_3_DEFAULT_NEW_SESSION_TICKETS)
421 #define MBEDTLS_SSL_TLS1_3_DEFAULT_NEW_SESSION_TICKETS 1
422 #endif
423 
426 /*
427  * Default to standard CID mode
428  */
429 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID) && \
430  !defined(MBEDTLS_SSL_DTLS_CONNECTION_ID_COMPAT)
431 #define MBEDTLS_SSL_DTLS_CONNECTION_ID_COMPAT 0
432 #endif
433 
434 /*
435  * Length of the verify data for secure renegotiation
436  */
437 #define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 12
438 
439 /*
440  * Signaling ciphersuite values (SCSV)
441  */
442 #define MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO 0xFF
444 /*
445  * Supported Signature and Hash algorithms (For TLS 1.2)
446  * RFC 5246 section 7.4.1.4.1
447  */
448 #define MBEDTLS_SSL_HASH_NONE 0
449 #define MBEDTLS_SSL_HASH_MD5 1
450 #define MBEDTLS_SSL_HASH_SHA1 2
451 #define MBEDTLS_SSL_HASH_SHA224 3
452 #define MBEDTLS_SSL_HASH_SHA256 4
453 #define MBEDTLS_SSL_HASH_SHA384 5
454 #define MBEDTLS_SSL_HASH_SHA512 6
455 
456 #define MBEDTLS_SSL_SIG_ANON 0
457 #define MBEDTLS_SSL_SIG_RSA 1
458 #define MBEDTLS_SSL_SIG_ECDSA 3
459 
460 /*
461  * TLS 1.3 signature algorithms
462  * RFC 8446, Section 4.2.2
463  */
464 
465 /* RSASSA-PKCS1-v1_5 algorithms */
466 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA256 0x0401
467 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA384 0x0501
468 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA512 0x0601
469 
470 /* ECDSA algorithms */
471 #define MBEDTLS_TLS1_3_SIG_ECDSA_SECP256R1_SHA256 0x0403
472 #define MBEDTLS_TLS1_3_SIG_ECDSA_SECP384R1_SHA384 0x0503
473 #define MBEDTLS_TLS1_3_SIG_ECDSA_SECP521R1_SHA512 0x0603
474 
475 /* RSASSA-PSS algorithms with public key OID rsaEncryption */
476 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA256 0x0804
477 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA384 0x0805
478 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA512 0x0806
479 
480 /* EdDSA algorithms */
481 #define MBEDTLS_TLS1_3_SIG_ED25519 0x0807
482 #define MBEDTLS_TLS1_3_SIG_ED448 0x0808
483 
484 /* RSASSA-PSS algorithms with public key OID RSASSA-PSS */
485 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA256 0x0809
486 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA384 0x080A
487 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA512 0x080B
488 
489 /* LEGACY ALGORITHMS */
490 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA1 0x0201
491 #define MBEDTLS_TLS1_3_SIG_ECDSA_SHA1 0x0203
492 
493 #define MBEDTLS_TLS1_3_SIG_NONE 0x0
494 
495 /*
496  * Client Certificate Types
497  * RFC 5246 section 7.4.4 plus RFC 4492 section 5.5
498  */
499 #define MBEDTLS_SSL_CERT_TYPE_RSA_SIGN 1
500 #define MBEDTLS_SSL_CERT_TYPE_ECDSA_SIGN 64
501 
502 /*
503  * Message, alert and handshake types
504  */
505 #define MBEDTLS_SSL_MSG_CHANGE_CIPHER_SPEC 20
506 #define MBEDTLS_SSL_MSG_ALERT 21
507 #define MBEDTLS_SSL_MSG_HANDSHAKE 22
508 #define MBEDTLS_SSL_MSG_APPLICATION_DATA 23
509 #define MBEDTLS_SSL_MSG_CID 25
510 
511 #define MBEDTLS_SSL_ALERT_LEVEL_WARNING 1
512 #define MBEDTLS_SSL_ALERT_LEVEL_FATAL 2
513 
514 #define MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY 0 /* 0x00 */
515 #define MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE 10 /* 0x0A */
516 #define MBEDTLS_SSL_ALERT_MSG_BAD_RECORD_MAC 20 /* 0x14 */
517 #define MBEDTLS_SSL_ALERT_MSG_DECRYPTION_FAILED 21 /* 0x15 */
518 #define MBEDTLS_SSL_ALERT_MSG_RECORD_OVERFLOW 22 /* 0x16 */
519 #define MBEDTLS_SSL_ALERT_MSG_DECOMPRESSION_FAILURE 30 /* 0x1E */
520 #define MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE 40 /* 0x28 */
521 #define MBEDTLS_SSL_ALERT_MSG_NO_CERT 41 /* 0x29 */
522 #define MBEDTLS_SSL_ALERT_MSG_BAD_CERT 42 /* 0x2A */
523 #define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT 43 /* 0x2B */
524 #define MBEDTLS_SSL_ALERT_MSG_CERT_REVOKED 44 /* 0x2C */
525 #define MBEDTLS_SSL_ALERT_MSG_CERT_EXPIRED 45 /* 0x2D */
526 #define MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN 46 /* 0x2E */
527 #define MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER 47 /* 0x2F */
528 #define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA 48 /* 0x30 */
529 #define MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED 49 /* 0x31 */
530 #define MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR 50 /* 0x32 */
531 #define MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR 51 /* 0x33 */
532 #define MBEDTLS_SSL_ALERT_MSG_EXPORT_RESTRICTION 60 /* 0x3C */
533 #define MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION 70 /* 0x46 */
534 #define MBEDTLS_SSL_ALERT_MSG_INSUFFICIENT_SECURITY 71 /* 0x47 */
535 #define MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR 80 /* 0x50 */
536 #define MBEDTLS_SSL_ALERT_MSG_INAPROPRIATE_FALLBACK 86 /* 0x56 */
537 #define MBEDTLS_SSL_ALERT_MSG_USER_CANCELED 90 /* 0x5A */
538 #define MBEDTLS_SSL_ALERT_MSG_NO_RENEGOTIATION 100 /* 0x64 */
539 #define MBEDTLS_SSL_ALERT_MSG_MISSING_EXTENSION 109 /* 0x6d -- new in TLS 1.3 */
540 #define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT 110 /* 0x6E */
541 #define MBEDTLS_SSL_ALERT_MSG_UNRECOGNIZED_NAME 112 /* 0x70 */
542 #define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_PSK_IDENTITY 115 /* 0x73 */
543 #define MBEDTLS_SSL_ALERT_MSG_CERT_REQUIRED 116 /* 0x74 */
544 #define MBEDTLS_SSL_ALERT_MSG_NO_APPLICATION_PROTOCOL 120 /* 0x78 */
545 
546 #define MBEDTLS_SSL_HS_HELLO_REQUEST 0
547 #define MBEDTLS_SSL_HS_CLIENT_HELLO 1
548 #define MBEDTLS_SSL_HS_SERVER_HELLO 2
549 #define MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST 3
550 #define MBEDTLS_SSL_HS_NEW_SESSION_TICKET 4
551 #define MBEDTLS_SSL_HS_END_OF_EARLY_DATA 5
552 #define MBEDTLS_SSL_HS_ENCRYPTED_EXTENSIONS 8
553 #define MBEDTLS_SSL_HS_CERTIFICATE 11
554 #define MBEDTLS_SSL_HS_SERVER_KEY_EXCHANGE 12
555 #define MBEDTLS_SSL_HS_CERTIFICATE_REQUEST 13
556 #define MBEDTLS_SSL_HS_SERVER_HELLO_DONE 14
557 #define MBEDTLS_SSL_HS_CERTIFICATE_VERIFY 15
558 #define MBEDTLS_SSL_HS_CLIENT_KEY_EXCHANGE 16
559 #define MBEDTLS_SSL_HS_FINISHED 20
560 #define MBEDTLS_SSL_HS_MESSAGE_HASH 254
561 
562 /*
563  * TLS extensions
564  */
565 #define MBEDTLS_TLS_EXT_SERVERNAME 0
566 #define MBEDTLS_TLS_EXT_SERVERNAME_HOSTNAME 0
567 
568 #define MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH 1
569 
570 #define MBEDTLS_TLS_EXT_TRUNCATED_HMAC 4
571 #define MBEDTLS_TLS_EXT_STATUS_REQUEST 5 /* RFC 6066 TLS 1.2 and 1.3 */
572 
573 #define MBEDTLS_TLS_EXT_SUPPORTED_ELLIPTIC_CURVES 10
574 #define MBEDTLS_TLS_EXT_SUPPORTED_GROUPS 10 /* RFC 8422,7919 TLS 1.2 and 1.3 */
575 #define MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS 11
576 
577 #define MBEDTLS_TLS_EXT_SIG_ALG 13 /* RFC 8446 TLS 1.3 */
578 #define MBEDTLS_TLS_EXT_USE_SRTP 14
579 #define MBEDTLS_TLS_EXT_HEARTBEAT 15 /* RFC 6520 TLS 1.2 and 1.3 */
580 #define MBEDTLS_TLS_EXT_ALPN 16
581 
582 #define MBEDTLS_TLS_EXT_SCT 18 /* RFC 6962 TLS 1.2 and 1.3 */
583 #define MBEDTLS_TLS_EXT_CLI_CERT_TYPE 19 /* RFC 7250 TLS 1.2 and 1.3 */
584 #define MBEDTLS_TLS_EXT_SERV_CERT_TYPE 20 /* RFC 7250 TLS 1.2 and 1.3 */
585 #define MBEDTLS_TLS_EXT_PADDING 21 /* RFC 7685 TLS 1.2 and 1.3 */
586 #define MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC 22 /* 0x16 */
587 #define MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET 0x0017 /* 23 */
588 
589 #define MBEDTLS_TLS_EXT_RECORD_SIZE_LIMIT 28 /* RFC 8449 (implemented for TLS 1.3 only) */
590 
591 #define MBEDTLS_TLS_EXT_SESSION_TICKET 35
592 
593 #define MBEDTLS_TLS_EXT_PRE_SHARED_KEY 41 /* RFC 8446 TLS 1.3 */
594 #define MBEDTLS_TLS_EXT_EARLY_DATA 42 /* RFC 8446 TLS 1.3 */
595 #define MBEDTLS_TLS_EXT_SUPPORTED_VERSIONS 43 /* RFC 8446 TLS 1.3 */
596 #define MBEDTLS_TLS_EXT_COOKIE 44 /* RFC 8446 TLS 1.3 */
597 #define MBEDTLS_TLS_EXT_PSK_KEY_EXCHANGE_MODES 45 /* RFC 8446 TLS 1.3 */
598 
599 #define MBEDTLS_TLS_EXT_CERT_AUTH 47 /* RFC 8446 TLS 1.3 */
600 #define MBEDTLS_TLS_EXT_OID_FILTERS 48 /* RFC 8446 TLS 1.3 */
601 #define MBEDTLS_TLS_EXT_POST_HANDSHAKE_AUTH 49 /* RFC 8446 TLS 1.3 */
602 #define MBEDTLS_TLS_EXT_SIG_ALG_CERT 50 /* RFC 8446 TLS 1.3 */
603 #define MBEDTLS_TLS_EXT_KEY_SHARE 51 /* RFC 8446 TLS 1.3 */
604 
605 #if MBEDTLS_SSL_DTLS_CONNECTION_ID_COMPAT == 0
606 #define MBEDTLS_TLS_EXT_CID 54 /* RFC 9146 DTLS 1.2 CID */
607 #else
608 #define MBEDTLS_TLS_EXT_CID 254 /* Pre-RFC 9146 DTLS 1.2 CID */
609 #endif
610 
611 #define MBEDTLS_TLS_EXT_ECJPAKE_KKPP 256 /* experimental */
612 
613 #define MBEDTLS_TLS_EXT_RENEGOTIATION_INFO 0xFF01
614 
615 /*
616  * Size defines
617  */
618 #if !defined(MBEDTLS_PSK_MAX_LEN)
619 /*
620  * If the library supports TLS 1.3 tickets and the cipher suite
621  * TLS1-3-AES-256-GCM-SHA384, set the PSK maximum length to 48 instead of 32.
622  * That way, the TLS 1.3 client and server are able to resume sessions where
623  * the cipher suite is TLS1-3-AES-256-GCM-SHA384 (pre-shared keys are 48
624  * bytes long in that case).
625  */
626 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && \
627  defined(MBEDTLS_SSL_SESSION_TICKETS) && \
628  defined(MBEDTLS_AES_C) && defined(MBEDTLS_GCM_C) && \
629  defined(MBEDTLS_MD_CAN_SHA384)
630 #define MBEDTLS_PSK_MAX_LEN 48 /* 384 bits */
631 #else
632 #define MBEDTLS_PSK_MAX_LEN 32 /* 256 bits */
633 #endif
634 #endif /* !MBEDTLS_PSK_MAX_LEN */
635 
636 /* Dummy type used only for its size */
638  unsigned char dummy; /* Make the union non-empty even with SSL disabled */
639 #if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)
640  unsigned char _pms_rsa[48]; /* RFC 5246 8.1.1 */
641 #endif
642 #if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)
643  unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]; /* RFC 5246 8.1.2 */
644 #endif
645 #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
646  defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
647  defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
648  defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
649  unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]; /* RFC 4492 5.10 */
650 #endif
651 #if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
652  unsigned char _pms_psk[4 + 2 * MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 2 */
653 #endif
654 #if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
656  + MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 3 */
657 #endif
658 #if defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)
659  unsigned char _pms_rsa_psk[52 + MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 4 */
660 #endif
661 #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
663  + MBEDTLS_PSK_MAX_LEN]; /* RFC 5489 2 */
664 #endif
665 #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
666  unsigned char _pms_ecjpake[32]; /* Thread spec: SHA-256 output */
667 #endif
668 };
669 
670 #define MBEDTLS_PREMASTER_SIZE sizeof(union mbedtls_ssl_premaster_secret)
671 
672 #define MBEDTLS_TLS1_3_MD_MAX_SIZE PSA_HASH_MAX_SIZE
673 
674 
675 /* Length in number of bytes of the TLS sequence number */
676 #define MBEDTLS_SSL_SEQUENCE_NUMBER_LEN 8
677 
678 #ifdef __cplusplus
679 extern "C" {
680 #endif
681 
682 /*
683  * SSL state machine
684  */
685 typedef enum {
702 
717 }
719 
737 typedef int mbedtls_ssl_send_t(void *ctx,
738  const unsigned char *buf,
739  size_t len);
740 
761 typedef int mbedtls_ssl_recv_t(void *ctx,
762  unsigned char *buf,
763  size_t len);
764 
787 typedef int mbedtls_ssl_recv_timeout_t(void *ctx,
788  unsigned char *buf,
789  size_t len,
790  uint32_t timeout);
813 typedef void mbedtls_ssl_set_timer_t(void *ctx,
814  uint32_t int_ms,
815  uint32_t fin_ms);
816 
828 typedef int mbedtls_ssl_get_timer_t(void *ctx);
829 
830 /* Defined below */
834 
835 /* Defined in library/ssl_misc.h */
839 #if defined(MBEDTLS_X509_CRT_PARSE_C)
841 #endif
842 #if defined(MBEDTLS_SSL_PROTO_DTLS)
844 #endif
845 
846 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS)
847 #define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_RESUMPTION \
848  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK /* 1U << 0 */
849 #define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_EPHEMERAL_RESUMPTION \
850  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL /* 1U << 2 */
851 #define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA (1U << 3)
852 
853 #define MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK \
854  (MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_RESUMPTION | \
855  MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_EPHEMERAL_RESUMPTION | \
856  MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA)
857 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 && MBEDTLS_SSL_SESSION_TICKETS */
858 
882 typedef int mbedtls_ssl_cache_get_t(void *data,
883  unsigned char const *session_id,
884  size_t session_id_len,
885  mbedtls_ssl_session *session);
904 typedef int mbedtls_ssl_cache_set_t(void *data,
905  unsigned char const *session_id,
906  size_t session_id_len,
907  const mbedtls_ssl_session *session);
908 
909 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
910 #if defined(MBEDTLS_X509_CRT_PARSE_C)
982 typedef int mbedtls_ssl_async_sign_t(mbedtls_ssl_context *ssl,
983  mbedtls_x509_crt *cert,
984  mbedtls_md_type_t md_alg,
985  const unsigned char *hash,
986  size_t hash_len);
987 
1048 typedef int mbedtls_ssl_async_decrypt_t(mbedtls_ssl_context *ssl,
1049  mbedtls_x509_crt *cert,
1050  const unsigned char *input,
1051  size_t input_len);
1052 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1053 
1096 typedef int mbedtls_ssl_async_resume_t(mbedtls_ssl_context *ssl,
1097  unsigned char *output,
1098  size_t *output_len,
1099  size_t output_size);
1100 
1118 typedef void mbedtls_ssl_async_cancel_t(mbedtls_ssl_context *ssl);
1119 #endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
1120 
1121 #if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
1122  !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
1123 #define MBEDTLS_SSL_PEER_CERT_DIGEST_MAX_LEN 48
1124 #if defined(MBEDTLS_MD_CAN_SHA256)
1125 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA256
1126 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 32
1127 #elif defined(MBEDTLS_MD_CAN_SHA384)
1128 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA384
1129 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 48
1130 #elif defined(MBEDTLS_MD_CAN_SHA1)
1131 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA1
1132 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 20
1133 #else
1134 /* This is already checked in check_config.h, but be sure. */
1135 #error "Bad configuration - need SHA-1, SHA-256 or SHA-512 enabled to compute digest of peer CRT."
1136 #endif
1137 #endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED &&
1138  !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1139 
1140 typedef struct {
1141  unsigned char client_application_traffic_secret_N[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1142  unsigned char server_application_traffic_secret_N[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1143  unsigned char exporter_master_secret[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1144  unsigned char resumption_master_secret[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1146 
1147 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1148 
1149 #define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH 255
1150 #define MBEDTLS_TLS_SRTP_MAX_PROFILE_LIST_LENGTH 4
1151 /*
1152  * For code readability use a typedef for DTLS-SRTP profiles
1153  *
1154  * Use_srtp extension protection profiles values as defined in
1155  * http://www.iana.org/assignments/srtp-protection/srtp-protection.xhtml
1156  *
1157  * Reminder: if this list is expanded mbedtls_ssl_check_srtp_profile_value
1158  * must be updated too.
1159  */
1160 #define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80 ((uint16_t) 0x0001)
1161 #define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32 ((uint16_t) 0x0002)
1162 #define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80 ((uint16_t) 0x0005)
1163 #define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32 ((uint16_t) 0x0006)
1164 /* This one is not iana defined, but for code readability. */
1165 #define MBEDTLS_TLS_SRTP_UNSET ((uint16_t) 0x0000)
1166 
1167 typedef uint16_t mbedtls_ssl_srtp_profile;
1168 
1171  mbedtls_ssl_srtp_profile MBEDTLS_PRIVATE(chosen_dtls_srtp_profile);
1173  uint16_t MBEDTLS_PRIVATE(mki_len);
1176 }
1178 
1179 #endif /* MBEDTLS_SSL_DTLS_SRTP */
1180 
1182 typedef enum {
1187 
1188 /*
1189  * This structure is used for storing current session data.
1190  *
1191  * Note: when changing this definition, we need to check and update:
1192  * - in tests/suites/test_suite_ssl.function:
1193  * ssl_populate_session() and ssl_serialize_session_save_load()
1194  * - in library/ssl_tls.c:
1195  * mbedtls_ssl_session_init() and mbedtls_ssl_session_free()
1196  * mbedtls_ssl_session_save() and ssl_session_load()
1197  * ssl_session_copy()
1198  */
1200 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1201  unsigned char MBEDTLS_PRIVATE(mfl_code);
1202 #endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
1203 
1204  unsigned char MBEDTLS_PRIVATE(exported);
1205 
1210 
1211 #if defined(MBEDTLS_HAVE_TIME)
1213 #endif
1214  int MBEDTLS_PRIVATE(ciphersuite);
1215  size_t MBEDTLS_PRIVATE(id_len);
1216  unsigned char MBEDTLS_PRIVATE(id)[32];
1217  unsigned char MBEDTLS_PRIVATE(master)[48];
1219 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1220 #if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
1222 #else /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1225  unsigned char *MBEDTLS_PRIVATE(peer_cert_digest);
1226  size_t MBEDTLS_PRIVATE(peer_cert_digest_len);
1227  mbedtls_md_type_t MBEDTLS_PRIVATE(peer_cert_digest_type);
1228 #endif /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1229 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1230  uint32_t MBEDTLS_PRIVATE(verify_result);
1232 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
1233  unsigned char *MBEDTLS_PRIVATE(ticket);
1234  size_t MBEDTLS_PRIVATE(ticket_len);
1235  uint32_t MBEDTLS_PRIVATE(ticket_lifetime);
1236 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_CLI_C */
1237 
1238 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS)
1239  uint8_t MBEDTLS_PRIVATE(endpoint);
1240  uint8_t MBEDTLS_PRIVATE(ticket_flags);
1241  uint32_t MBEDTLS_PRIVATE(ticket_age_add);
1242  uint8_t MBEDTLS_PRIVATE(resumption_key_len);
1243  unsigned char MBEDTLS_PRIVATE(resumption_key)[MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN];
1244 
1245 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION) && defined(MBEDTLS_SSL_CLI_C)
1246  char *MBEDTLS_PRIVATE(hostname);
1247 #endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION && MBEDTLS_SSL_CLI_C */
1248 
1249 #if defined(MBEDTLS_HAVE_TIME) && defined(MBEDTLS_SSL_CLI_C)
1250  mbedtls_time_t MBEDTLS_PRIVATE(ticket_received);
1251 #endif /* MBEDTLS_HAVE_TIME && MBEDTLS_SSL_CLI_C */
1252 
1253 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 && MBEDTLS_SSL_SESSION_TICKETS */
1254 
1255 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1256  int MBEDTLS_PRIVATE(encrypt_then_mac);
1257 #endif
1258 
1259 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1261 #endif
1262 };
1263 
1264 /*
1265  * Identifiers for PRFs used in various versions of TLS.
1266  */
1267 typedef enum {
1275 
1276 typedef enum {
1278 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1279  MBEDTLS_SSL_KEY_EXPORT_TLS1_3_CLIENT_EARLY_SECRET,
1280  MBEDTLS_SSL_KEY_EXPORT_TLS1_3_EARLY_EXPORTER_SECRET,
1281  MBEDTLS_SSL_KEY_EXPORT_TLS1_3_CLIENT_HANDSHAKE_TRAFFIC_SECRET,
1282  MBEDTLS_SSL_KEY_EXPORT_TLS1_3_SERVER_HANDSHAKE_TRAFFIC_SECRET,
1283  MBEDTLS_SSL_KEY_EXPORT_TLS1_3_CLIENT_APPLICATION_TRAFFIC_SECRET,
1284  MBEDTLS_SSL_KEY_EXPORT_TLS1_3_SERVER_APPLICATION_TRAFFIC_SECRET,
1285 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1287 
1303 typedef void mbedtls_ssl_export_keys_t(void *p_expkey,
1305  const unsigned char *secret,
1306  size_t secret_len,
1307  const unsigned char client_random[32],
1308  const unsigned char server_random[32],
1309  mbedtls_tls_prf_types tls_prf_type);
1310 
1311 #if defined(MBEDTLS_SSL_SRV_C)
1328 #endif
1329 
1330 /* A type for storing user data in a library structure.
1331  *
1332  * The representation of type may change in future versions of the library.
1333  * Only the behaviors guaranteed by documented accessor functions are
1334  * guaranteed to remain stable.
1335  */
1336 typedef union {
1337  uintptr_t n; /* typically a handle to an associated object */
1338  void *p; /* typically a pointer to extra data */
1340 
1345  /* Group items mostly by size. This helps to reduce memory wasted to
1346  * padding. It also helps to keep smaller fields early in the structure,
1347  * so that elements tend to be in the 128-element direct access window
1348  * on Arm Thumb, which reduces the code size. */
1349 
1353  /*
1354  * Flags (could be bit-fields to save RAM, but separate bytes make
1355  * the code smaller on architectures with an instruction for direct
1356  * byte access).
1357  */
1358 
1359  uint8_t MBEDTLS_PRIVATE(endpoint);
1360  uint8_t MBEDTLS_PRIVATE(transport);
1361  uint8_t MBEDTLS_PRIVATE(authmode);
1362  /* needed even with renego disabled for LEGACY_BREAK_HANDSHAKE */
1363  uint8_t MBEDTLS_PRIVATE(allow_legacy_renegotiation);
1364 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1365  uint8_t MBEDTLS_PRIVATE(mfl_code);
1367 #endif
1368 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1369  uint8_t MBEDTLS_PRIVATE(encrypt_then_mac);
1370 #endif
1371 #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
1372  uint8_t MBEDTLS_PRIVATE(extended_ms);
1373 #endif
1374 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1375  uint8_t MBEDTLS_PRIVATE(anti_replay);
1376 #endif
1377 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1378  uint8_t MBEDTLS_PRIVATE(disable_renegotiation);
1379 #endif
1380 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
1381  defined(MBEDTLS_SSL_CLI_C)
1382  uint8_t MBEDTLS_PRIVATE(session_tickets);
1383 #endif
1384 
1385 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
1386  defined(MBEDTLS_SSL_SRV_C) && \
1387  defined(MBEDTLS_SSL_PROTO_TLS1_3)
1388  uint16_t MBEDTLS_PRIVATE(new_session_tickets_count);
1389 #endif
1390 
1391 #if defined(MBEDTLS_SSL_SRV_C)
1392  uint8_t MBEDTLS_PRIVATE(cert_req_ca_list);
1394  uint8_t MBEDTLS_PRIVATE(respect_cli_pref);
1397 #endif
1398 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1399  uint8_t MBEDTLS_PRIVATE(ignore_unexpected_cid);
1402 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1403 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1404  uint8_t MBEDTLS_PRIVATE(dtls_srtp_mki_support); /* support having mki_value
1405  in the use_srtp extension? */
1406 #endif
1407 
1408  /*
1409  * Pointers
1410  */
1411 
1413  const int *MBEDTLS_PRIVATE(ciphersuite_list);
1414 
1415 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1417  int MBEDTLS_PRIVATE(tls13_kex_modes);
1418 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1419 
1421  void(*MBEDTLS_PRIVATE(f_dbg))(void *, int, const char *, int, const char *);
1422  void *MBEDTLS_PRIVATE(p_dbg);
1425  int(*MBEDTLS_PRIVATE(f_rng))(void *, unsigned char *, size_t);
1426  void *MBEDTLS_PRIVATE(p_rng);
1432  void *MBEDTLS_PRIVATE(p_cache);
1434 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
1436  int(*MBEDTLS_PRIVATE(f_sni))(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
1437  void *MBEDTLS_PRIVATE(p_sni);
1438 #endif
1439 
1440 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1442  int(*MBEDTLS_PRIVATE(f_vrfy))(void *, mbedtls_x509_crt *, int, uint32_t *);
1443  void *MBEDTLS_PRIVATE(p_vrfy);
1444 #endif
1445 
1446 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED)
1447 #if defined(MBEDTLS_SSL_SRV_C)
1449  int(*MBEDTLS_PRIVATE(f_psk))(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
1450  void *MBEDTLS_PRIVATE(p_psk);
1451 #endif
1452 #endif
1453 
1454 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1456  int(*MBEDTLS_PRIVATE(f_cookie_write))(void *, unsigned char **, unsigned char *,
1457  const unsigned char *, size_t);
1459  int(*MBEDTLS_PRIVATE(f_cookie_check))(void *, const unsigned char *, size_t,
1460  const unsigned char *, size_t);
1461  void *MBEDTLS_PRIVATE(p_cookie);
1462 #endif
1463 
1464 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
1466  int(*MBEDTLS_PRIVATE(f_ticket_write))(void *, const mbedtls_ssl_session *,
1467  unsigned char *, const unsigned char *, size_t *,
1468  uint32_t *);
1470  int(*MBEDTLS_PRIVATE(f_ticket_parse))(void *, mbedtls_ssl_session *, unsigned char *, size_t);
1471  void *MBEDTLS_PRIVATE(p_ticket);
1472 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
1473 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1474  size_t MBEDTLS_PRIVATE(cid_len);
1475 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1476 
1477 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1482 #if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
1484  void *MBEDTLS_PRIVATE(p_ca_cb);
1485 #endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
1486 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1487 
1488 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
1489 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1490  mbedtls_ssl_async_sign_t *MBEDTLS_PRIVATE(f_async_sign_start);
1491  mbedtls_ssl_async_decrypt_t *MBEDTLS_PRIVATE(f_async_decrypt_start);
1492 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1493  mbedtls_ssl_async_resume_t *MBEDTLS_PRIVATE(f_async_resume);
1494  mbedtls_ssl_async_cancel_t *MBEDTLS_PRIVATE(f_async_cancel);
1495  void *MBEDTLS_PRIVATE(p_async_config_data);
1496 #endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
1497 
1498 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
1499 
1500 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
1501  const int *MBEDTLS_PRIVATE(sig_hashes);
1502 #endif
1503  const uint16_t *MBEDTLS_PRIVATE(sig_algs);
1504 #endif /* MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
1505 
1506 #if defined(MBEDTLS_ECP_C) && !defined(MBEDTLS_DEPRECATED_REMOVED)
1508 #endif
1509 
1510  const uint16_t *MBEDTLS_PRIVATE(group_list);
1512 #if defined(MBEDTLS_DHM_C)
1515 #endif
1516 
1517 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED)
1518 
1519 #if defined(MBEDTLS_USE_PSA_CRYPTO)
1526 #endif /* MBEDTLS_USE_PSA_CRYPTO */
1527  unsigned char *MBEDTLS_PRIVATE(psk);
1531  size_t MBEDTLS_PRIVATE(psk_len);
1537  unsigned char *MBEDTLS_PRIVATE(psk_identity);
1542  size_t MBEDTLS_PRIVATE(psk_identity_len);
1548 #endif /* MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED */
1549 
1550 #if defined(MBEDTLS_SSL_EARLY_DATA)
1551  int MBEDTLS_PRIVATE(early_data_enabled);
1555 #if defined(MBEDTLS_SSL_SRV_C)
1556  /* The maximum amount of 0-RTT data. RFC 8446 section 4.6.1 */
1557  uint32_t MBEDTLS_PRIVATE(max_early_data_size);
1558 #endif /* MBEDTLS_SSL_SRV_C */
1559 
1560 #endif /* MBEDTLS_SSL_EARLY_DATA */
1561 
1562 #if defined(MBEDTLS_SSL_ALPN)
1563  const char **MBEDTLS_PRIVATE(alpn_list);
1564 #endif
1565 
1566 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1568  const mbedtls_ssl_srtp_profile *MBEDTLS_PRIVATE(dtls_srtp_profile_list);
1570  size_t MBEDTLS_PRIVATE(dtls_srtp_profile_list_len);
1571 #endif /* MBEDTLS_SSL_DTLS_SRTP */
1572 
1573  /*
1574  * Numerical settings (int)
1575  */
1576 
1577  uint32_t MBEDTLS_PRIVATE(read_timeout);
1579 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1580  uint32_t MBEDTLS_PRIVATE(hs_timeout_min);
1582  uint32_t MBEDTLS_PRIVATE(hs_timeout_max);
1584 #endif
1585 
1586 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1587  int MBEDTLS_PRIVATE(renego_max_records);
1588  unsigned char MBEDTLS_PRIVATE(renego_period)[8];
1590 #endif
1591 
1592  unsigned int MBEDTLS_PRIVATE(badmac_limit);
1594 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
1595  unsigned int MBEDTLS_PRIVATE(dhm_min_bitlen);
1596 #endif
1597 
1604 
1605 #if defined(MBEDTLS_SSL_SRV_C)
1607 #endif /* MBEDTLS_SSL_SRV_C */
1608 
1609 #if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
1611 #endif
1612 };
1613 
1617  /*
1618  * Miscellaneous
1619  */
1620  int MBEDTLS_PRIVATE(state);
1621 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1622  int MBEDTLS_PRIVATE(renego_status);
1623  int MBEDTLS_PRIVATE(renego_records_seen);
1626 #endif /* MBEDTLS_SSL_RENEGOTIATION */
1627 
1645 
1646  unsigned MBEDTLS_PRIVATE(badmac_seen);
1648 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1650  int(*MBEDTLS_PRIVATE(f_vrfy))(void *, mbedtls_x509_crt *, int, uint32_t *);
1651  void *MBEDTLS_PRIVATE(p_vrfy);
1652 #endif
1653 
1659  void *MBEDTLS_PRIVATE(p_bio);
1661  /*
1662  * Session layer
1663  */
1667  mbedtls_ssl_session *MBEDTLS_PRIVATE(session_negotiate);
1672  /*
1673  * Record layer transformations
1674  */
1684 #if defined(MBEDTLS_SSL_PROTO_TLS1_2)
1685  mbedtls_ssl_transform *MBEDTLS_PRIVATE(transform_negotiate);
1688 #endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
1689 
1690 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1693  mbedtls_ssl_transform *MBEDTLS_PRIVATE(transform_application);
1694 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1695 
1696  /*
1697  * Timers
1698  */
1699  void *MBEDTLS_PRIVATE(p_timer);
1704  /*
1705  * Record layer (incoming data)
1706  */
1707  unsigned char *MBEDTLS_PRIVATE(in_buf);
1708  unsigned char *MBEDTLS_PRIVATE(in_ctr);
1711  unsigned char *MBEDTLS_PRIVATE(in_hdr);
1712 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1713  unsigned char *MBEDTLS_PRIVATE(in_cid);
1715 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1716  unsigned char *MBEDTLS_PRIVATE(in_len);
1717  unsigned char *MBEDTLS_PRIVATE(in_iv);
1718  unsigned char *MBEDTLS_PRIVATE(in_msg);
1719  unsigned char *MBEDTLS_PRIVATE(in_offt);
1721  int MBEDTLS_PRIVATE(in_msgtype);
1722  size_t MBEDTLS_PRIVATE(in_msglen);
1723  size_t MBEDTLS_PRIVATE(in_left);
1724 #if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1725  size_t MBEDTLS_PRIVATE(in_buf_len);
1726 #endif
1727 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1728  uint16_t MBEDTLS_PRIVATE(in_epoch);
1729  size_t MBEDTLS_PRIVATE(next_record_offset);
1731 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1732 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1733  uint64_t MBEDTLS_PRIVATE(in_window_top);
1734  uint64_t MBEDTLS_PRIVATE(in_window);
1735 #endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
1736 
1737  size_t MBEDTLS_PRIVATE(in_hslen);
1739  int MBEDTLS_PRIVATE(nb_zero);
1741  int MBEDTLS_PRIVATE(keep_current_message);
1744  /* The following three variables indicate if and, if yes,
1745  * what kind of alert is pending to be sent.
1746  */
1747  unsigned char MBEDTLS_PRIVATE(send_alert);
1751  unsigned char MBEDTLS_PRIVATE(alert_type);
1753  int MBEDTLS_PRIVATE(alert_reason);
1757 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1758  uint8_t MBEDTLS_PRIVATE(disable_datagram_packing);
1760 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1761 
1762  /*
1763  * Record layer (outgoing data)
1764  */
1765  unsigned char *MBEDTLS_PRIVATE(out_buf);
1766  unsigned char *MBEDTLS_PRIVATE(out_ctr);
1767  unsigned char *MBEDTLS_PRIVATE(out_hdr);
1768 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1769  unsigned char *MBEDTLS_PRIVATE(out_cid);
1771 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1772  unsigned char *MBEDTLS_PRIVATE(out_len);
1773  unsigned char *MBEDTLS_PRIVATE(out_iv);
1774  unsigned char *MBEDTLS_PRIVATE(out_msg);
1776  int MBEDTLS_PRIVATE(out_msgtype);
1777  size_t MBEDTLS_PRIVATE(out_msglen);
1778  size_t MBEDTLS_PRIVATE(out_left);
1779 #if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1780  size_t MBEDTLS_PRIVATE(out_buf_len);
1781 #endif
1782 
1783  unsigned char MBEDTLS_PRIVATE(cur_out_ctr)[MBEDTLS_SSL_SEQUENCE_NUMBER_LEN];
1785 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1786  uint16_t MBEDTLS_PRIVATE(mtu);
1787 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1788 
1789  /*
1790  * User settings
1791  */
1792 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1793  char *MBEDTLS_PRIVATE(hostname);
1795 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1796 
1797 #if defined(MBEDTLS_SSL_ALPN)
1798  const char *MBEDTLS_PRIVATE(alpn_chosen);
1799 #endif /* MBEDTLS_SSL_ALPN */
1800 
1801 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1802  /*
1803  * use_srtp extension
1804  */
1806 #endif /* MBEDTLS_SSL_DTLS_SRTP */
1807 
1808  /*
1809  * Information for DTLS hello verify
1810  */
1811 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1812  unsigned char *MBEDTLS_PRIVATE(cli_id);
1813  size_t MBEDTLS_PRIVATE(cli_id_len);
1814 #endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
1815 
1816  /*
1817  * Secure renegotiation
1818  */
1819  /* needed to know when to send extension on server */
1820  int MBEDTLS_PRIVATE(secure_renegotiation);
1822 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1823  size_t MBEDTLS_PRIVATE(verify_data_len);
1826 #endif /* MBEDTLS_SSL_RENEGOTIATION */
1827 
1828 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1829  /* CID configuration to use in subsequent handshakes. */
1830 
1836  uint8_t MBEDTLS_PRIVATE(own_cid_len);
1837  uint8_t MBEDTLS_PRIVATE(negotiate_cid);
1841 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1842 
1843 #if defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_CLI_C)
1844  int MBEDTLS_PRIVATE(early_data_status);
1845 #endif /* MBEDTLS_SSL_EARLY_DATA && MBEDTLS_SSL_CLI_C */
1846 
1849  void *MBEDTLS_PRIVATE(p_export_keys);
1861 };
1862 
1871 const char *mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id);
1872 
1881 int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name);
1882 
1891 
1917  const mbedtls_ssl_config *conf);
1918 
1929 
1937 
1947 {
1948  return conf->MBEDTLS_PRIVATE(endpoint);
1949 }
1950 
1966 
1994 
1995 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_EARLY_DATA)
2015 void mbedtls_ssl_tls13_conf_early_data(mbedtls_ssl_config *conf,
2016  int early_data_enabled);
2017 
2018 #if defined(MBEDTLS_SSL_SRV_C)
2042 void mbedtls_ssl_tls13_conf_max_early_data_size(
2043  mbedtls_ssl_config *conf, uint32_t max_early_data_size);
2044 #endif /* MBEDTLS_SSL_SRV_C */
2045 
2046 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 && MBEDTLS_SSL_EARLY_DATA */
2047 
2048 #if defined(MBEDTLS_X509_CRT_PARSE_C)
2065  int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
2066  void *p_vrfy);
2067 #endif /* MBEDTLS_X509_CRT_PARSE_C */
2068 
2077  int (*f_rng)(void *, unsigned char *, size_t),
2078  void *p_rng);
2079 
2095  void (*f_dbg)(void *, int, const char *, int, const char *),
2096  void *p_dbg);
2097 
2109  const mbedtls_ssl_context *ssl)
2110 {
2111  return ssl->MBEDTLS_PRIVATE(conf);
2112 }
2113 
2145  void *p_bio,
2146  mbedtls_ssl_send_t *f_send,
2147  mbedtls_ssl_recv_t *f_recv,
2148  mbedtls_ssl_recv_timeout_t *f_recv_timeout);
2149 
2150 #if defined(MBEDTLS_SSL_PROTO_DTLS)
2151 
2152 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
2153 
2154 
2240  int enable,
2241  unsigned char const *own_cid,
2242  size_t own_cid_len);
2243 
2274  int *enabled,
2275  unsigned char own_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX],
2276  size_t *own_cid_len);
2277 
2316  int *enabled,
2317  unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX],
2318  size_t *peer_cid_len);
2319 
2320 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
2321 
2361 void mbedtls_ssl_set_mtu(mbedtls_ssl_context *ssl, uint16_t mtu);
2362 #endif /* MBEDTLS_SSL_PROTO_DTLS */
2363 
2364 #if defined(MBEDTLS_X509_CRT_PARSE_C)
2384  int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
2385  void *p_vrfy);
2386 #endif /* MBEDTLS_X509_CRT_PARSE_C */
2387 
2405 
2451  unsigned char *buf,
2452  size_t buflen);
2453 
2475  void *p_timer,
2476  mbedtls_ssl_set_timer_t *f_set_timer,
2477  mbedtls_ssl_get_timer_t *f_get_timer);
2478 
2479 #if defined(MBEDTLS_SSL_SRV_C)
2491  mbedtls_ssl_hs_cb_t f_cert_cb)
2492 {
2493  conf->MBEDTLS_PRIVATE(f_cert_cb) = f_cert_cb;
2494 }
2495 #endif /* MBEDTLS_SSL_SRV_C */
2496 
2516 typedef int mbedtls_ssl_ticket_write_t(void *p_ticket,
2517  const mbedtls_ssl_session *session,
2518  unsigned char *start,
2519  const unsigned char *end,
2520  size_t *tlen,
2521  uint32_t *lifetime);
2522 
2546 typedef int mbedtls_ssl_ticket_parse_t(void *p_ticket,
2547  mbedtls_ssl_session *session,
2548  unsigned char *buf,
2549  size_t len);
2550 
2551 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
2567  mbedtls_ssl_ticket_write_t *f_ticket_write,
2568  mbedtls_ssl_ticket_parse_t *f_ticket_parse,
2569  void *p_ticket);
2570 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
2571 
2591  mbedtls_ssl_export_keys_t *f_export_keys,
2592  void *p_export_keys);
2593 
2605  mbedtls_ssl_config *conf,
2606  void *p)
2607 {
2608  conf->MBEDTLS_PRIVATE(user_data).p = p;
2609 }
2610 
2619  mbedtls_ssl_config *conf,
2620  uintptr_t n)
2621 {
2622  conf->MBEDTLS_PRIVATE(user_data).n = n;
2623 }
2624 
2636  mbedtls_ssl_config *conf)
2637 {
2638  return conf->MBEDTLS_PRIVATE(user_data).p;
2639 }
2640 
2651 static inline uintptr_t mbedtls_ssl_conf_get_user_data_n(
2652  mbedtls_ssl_config *conf)
2653 {
2654  return conf->MBEDTLS_PRIVATE(user_data).n;
2655 }
2656 
2667 static inline void mbedtls_ssl_set_user_data_p(
2668  mbedtls_ssl_context *ssl,
2669  void *p)
2670 {
2671  ssl->MBEDTLS_PRIVATE(user_data).p = p;
2672 }
2673 
2681 static inline void mbedtls_ssl_set_user_data_n(
2682  mbedtls_ssl_context *ssl,
2683  uintptr_t n)
2684 {
2685  ssl->MBEDTLS_PRIVATE(user_data).n = n;
2686 }
2687 
2698 static inline void *mbedtls_ssl_get_user_data_p(
2699  mbedtls_ssl_context *ssl)
2700 {
2701  return ssl->MBEDTLS_PRIVATE(user_data).p;
2702 }
2703 
2714 static inline uintptr_t mbedtls_ssl_get_user_data_n(
2715  mbedtls_ssl_context *ssl)
2716 {
2717  return ssl->MBEDTLS_PRIVATE(user_data).n;
2718 }
2719 
2720 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
2751 void mbedtls_ssl_conf_async_private_cb(mbedtls_ssl_config *conf,
2752  mbedtls_ssl_async_sign_t *f_async_sign,
2753  mbedtls_ssl_async_decrypt_t *f_async_decrypt,
2754  mbedtls_ssl_async_resume_t *f_async_resume,
2755  mbedtls_ssl_async_cancel_t *f_async_cancel,
2756  void *config_data);
2757 
2766 void *mbedtls_ssl_conf_get_async_config_data(const mbedtls_ssl_config *conf);
2767 
2782 void *mbedtls_ssl_get_async_operation_data(const mbedtls_ssl_context *ssl);
2783 
2795 void mbedtls_ssl_set_async_operation_data(mbedtls_ssl_context *ssl,
2796  void *ctx);
2797 #endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
2798 
2813 typedef int mbedtls_ssl_cookie_write_t(void *ctx,
2814  unsigned char **p, unsigned char *end,
2815  const unsigned char *info, size_t ilen);
2816 
2830 typedef int mbedtls_ssl_cookie_check_t(void *ctx,
2831  const unsigned char *cookie, size_t clen,
2832  const unsigned char *info, size_t ilen);
2833 
2834 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
2864  mbedtls_ssl_cookie_write_t *f_cookie_write,
2865  mbedtls_ssl_cookie_check_t *f_cookie_check,
2866  void *p_cookie);
2867 
2888  const unsigned char *info,
2889  size_t ilen);
2890 
2891 #endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
2892 
2893 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
2910 #endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
2911 
2936 
2937 #if defined(MBEDTLS_SSL_PROTO_DTLS)
2938 
2968  unsigned allow_packing);
2969 
3001 void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max);
3002 #endif /* MBEDTLS_SSL_PROTO_DTLS */
3003 
3004 #if defined(MBEDTLS_SSL_SRV_C)
3043  void *p_cache,
3044  mbedtls_ssl_cache_get_t *f_get_cache,
3045  mbedtls_ssl_cache_set_t *f_set_cache);
3046 #endif /* MBEDTLS_SSL_SRV_C */
3047 
3048 #if defined(MBEDTLS_SSL_CLI_C)
3095 #endif /* MBEDTLS_SSL_CLI_C */
3096 
3130  const unsigned char *buf,
3131  size_t len);
3132 
3159  unsigned char *buf,
3160  size_t buf_len,
3161  size_t *olen);
3162 
3205  const int *ciphersuites);
3206 
3207 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
3250 void mbedtls_ssl_conf_tls13_key_exchange_modes(mbedtls_ssl_config *conf,
3251  const int kex_modes);
3252 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
3253 
3254 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
3255 #define MBEDTLS_SSL_UNEXPECTED_CID_IGNORE 0
3256 #define MBEDTLS_SSL_UNEXPECTED_CID_FAIL 1
3290  int ignore_other_cids);
3291 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
3292 
3293 #if defined(MBEDTLS_X509_CRT_PARSE_C)
3305  const mbedtls_x509_crt_profile *profile);
3306 
3319  mbedtls_x509_crt *ca_chain,
3320  mbedtls_x509_crl *ca_crl);
3321 
3322 #if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
3334 static inline
3336  const mbedtls_x509_crt *crt)
3337 {
3338  conf->MBEDTLS_PRIVATE(dn_hints) = crt;
3339 }
3340 #endif /* MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
3341 
3342 #if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
3394 void mbedtls_ssl_conf_ca_cb(mbedtls_ssl_config *conf,
3395  mbedtls_x509_crt_ca_cb_t f_ca_cb,
3396  void *p_ca_cb);
3397 #endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
3398 
3436  mbedtls_x509_crt *own_cert,
3437  mbedtls_pk_context *pk_key);
3438 #endif /* MBEDTLS_X509_CRT_PARSE_C */
3439 
3440 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED)
3474  const unsigned char *psk, size_t psk_len,
3475  const unsigned char *psk_identity, size_t psk_identity_len);
3476 
3477 #if defined(MBEDTLS_USE_PSA_CRYPTO)
3515 int mbedtls_ssl_conf_psk_opaque(mbedtls_ssl_config *conf,
3517  const unsigned char *psk_identity,
3518  size_t psk_identity_len);
3519 #endif /* MBEDTLS_USE_PSA_CRYPTO */
3520 
3538  const unsigned char *psk, size_t psk_len);
3539 
3540 #if defined(MBEDTLS_USE_PSA_CRYPTO)
3561 int mbedtls_ssl_set_hs_psk_opaque(mbedtls_ssl_context *ssl,
3562  mbedtls_svc_key_id_t psk);
3563 #endif /* MBEDTLS_USE_PSA_CRYPTO */
3564 
3565 #if defined(MBEDTLS_SSL_SRV_C)
3605  int (*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *,
3606  size_t),
3607  void *p_psk);
3608 #endif /* MBEDTLS_SSL_SRV_C */
3609 #endif /* MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED */
3610 
3611 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_SRV_C)
3626  const unsigned char *dhm_P, size_t P_len,
3627  const unsigned char *dhm_G, size_t G_len);
3628 
3639 #endif /* MBEDTLS_DHM_C && defined(MBEDTLS_SSL_SRV_C) */
3640 
3641 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
3651  unsigned int bitlen);
3652 #endif /* MBEDTLS_DHM_C && MBEDTLS_SSL_CLI_C */
3653 
3654 #if defined(MBEDTLS_ECP_C)
3655 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
3698  const mbedtls_ecp_group_id *curves);
3699 #endif /* MBEDTLS_DEPRECATED_REMOVED */
3700 #endif /* MBEDTLS_ECP_C */
3701 
3740  const uint16_t *groups);
3741 
3742 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
3743 #if !defined(MBEDTLS_DEPRECATED_REMOVED) && defined(MBEDTLS_SSL_PROTO_TLS1_2)
3774  const int *hashes);
3775 #endif /* !MBEDTLS_DEPRECATED_REMOVED && MBEDTLS_SSL_PROTO_TLS1_2 */
3776 
3787  const uint16_t *sig_algs);
3788 #endif /* MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
3789 
3790 #if defined(MBEDTLS_X509_CRT_PARSE_C)
3809 int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname);
3810 
3821 static inline const char *mbedtls_ssl_get_hostname(mbedtls_ssl_context *ssl)
3822 {
3823  return ssl->MBEDTLS_PRIVATE(hostname);
3824 }
3825 #endif /* MBEDTLS_X509_CRT_PARSE_C */
3826 
3827 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
3847  size_t *name_len);
3848 
3865  mbedtls_x509_crt *own_cert,
3866  mbedtls_pk_context *pk_key);
3867 
3880  mbedtls_x509_crt *ca_chain,
3881  mbedtls_x509_crl *ca_crl);
3882 
3883 #if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
3895  const mbedtls_x509_crt *crt);
3896 #endif /* MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
3897 
3909  int authmode);
3910 
3934  int (*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *,
3935  size_t),
3936  void *p_sni);
3937 #endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION */
3938 
3939 #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
3958 int mbedtls_ssl_set_hs_ecjpake_password(mbedtls_ssl_context *ssl,
3959  const unsigned char *pw,
3960  size_t pw_len);
3961 
3976 int mbedtls_ssl_set_hs_ecjpake_password_opaque(mbedtls_ssl_context *ssl,
3977  mbedtls_svc_key_id_t pwd);
3978 #endif /*MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
3979 
3980 #if defined(MBEDTLS_SSL_ALPN)
3993 int mbedtls_ssl_conf_alpn_protocols(mbedtls_ssl_config *conf, const char **protos);
3994 
4005 #endif /* MBEDTLS_SSL_ALPN */
4006 
4007 #if defined(MBEDTLS_SSL_DTLS_SRTP)
4008 #if defined(MBEDTLS_DEBUG_C)
4010 {
4011  switch (profile) {
4013  return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80";
4015  return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32";
4017  return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80";
4019  return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32";
4020  default: break;
4021  }
4022  return "";
4023 }
4024 #endif /* MBEDTLS_DEBUG_C */
4039  int support_mki_value);
4040 
4061  (mbedtls_ssl_config *conf,
4062  const mbedtls_ssl_srtp_profile *profiles);
4063 
4081  unsigned char *mki_value,
4082  uint16_t mki_len);
4102  mbedtls_dtls_srtp_info *dtls_srtp_info);
4103 #endif /* MBEDTLS_SSL_DTLS_SRTP */
4104 
4105 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
4124  int minor);
4125 #endif /* MBEDTLS_DEPRECATED_REMOVED */
4126 
4140  mbedtls_ssl_protocol_version tls_version)
4141 {
4142  conf->MBEDTLS_PRIVATE(max_tls_version) = tls_version;
4143 }
4144 
4145 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
4181  int minor);
4182 #endif /* MBEDTLS_DEPRECATED_REMOVED */
4183 
4197  mbedtls_ssl_protocol_version tls_version)
4198 {
4199  conf->MBEDTLS_PRIVATE(min_tls_version) = tls_version;
4200 }
4201 
4202 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
4215 #endif /* MBEDTLS_SSL_ENCRYPT_THEN_MAC */
4216 
4217 #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
4230 #endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */
4231 
4232 #if defined(MBEDTLS_SSL_SRV_C)
4243  char cert_req_ca_list);
4244 #endif /* MBEDTLS_SSL_SRV_C */
4245 
4246 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
4281 int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code);
4282 #endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
4283 
4284 #if defined(MBEDTLS_SSL_SRV_C)
4295 #endif /* MBEDTLS_SSL_SRV_C */
4296 
4297 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
4298  defined(MBEDTLS_SSL_CLI_C)
4310 #endif /* MBEDTLS_SSL_SESSION_TICKETS &&
4311  MBEDTLS_SSL_CLI_C */
4312 
4313 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
4314  defined(MBEDTLS_SSL_SRV_C) && \
4315  defined(MBEDTLS_SSL_PROTO_TLS1_3)
4333 void mbedtls_ssl_conf_new_session_tickets(mbedtls_ssl_config *conf,
4334  uint16_t num_tickets);
4335 #endif /* MBEDTLS_SSL_SESSION_TICKETS &&
4336  MBEDTLS_SSL_SRV_C &&
4337  MBEDTLS_SSL_PROTO_TLS1_3*/
4338 
4339 #if defined(MBEDTLS_SSL_RENEGOTIATION)
4358 #endif /* MBEDTLS_SSL_RENEGOTIATION */
4359 
4388 
4389 #if defined(MBEDTLS_SSL_RENEGOTIATION)
4428 
4455  const unsigned char period[8]);
4456 #endif /* MBEDTLS_SSL_RENEGOTIATION */
4457 
4497 
4514 
4528 
4537 
4546 
4547 
4560  const mbedtls_ssl_context *ssl)
4561 {
4562  return ssl->MBEDTLS_PRIVATE(tls_version);
4563 }
4564 
4573 
4583 
4610 
4630 
4631 #if defined(MBEDTLS_X509_CRT_PARSE_C)
4663 #endif /* MBEDTLS_X509_CRT_PARSE_C */
4664 
4665 #if defined(MBEDTLS_SSL_CLI_C)
4701  mbedtls_ssl_session *session);
4702 #endif /* MBEDTLS_SSL_CLI_C */
4703 
4760 
4773 {
4774  return ssl->MBEDTLS_PRIVATE(state) >= MBEDTLS_SSL_HANDSHAKE_OVER;
4775 }
4776 
4811 
4812 #if defined(MBEDTLS_SSL_RENEGOTIATION)
4837 #endif /* MBEDTLS_SSL_RENEGOTIATION */
4838 
4916 int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len);
4917 
4978 int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len);
4979 
4997  unsigned char level,
4998  unsigned char message);
5013 
5014 #if defined(MBEDTLS_SSL_EARLY_DATA)
5015 
5016 #if defined(MBEDTLS_SSL_SRV_C)
5061 int mbedtls_ssl_read_early_data(mbedtls_ssl_context *ssl,
5062  unsigned char *buf, size_t len);
5063 #endif /* MBEDTLS_SSL_SRV_C */
5064 
5065 #if defined(MBEDTLS_SSL_CLI_C)
5122 int mbedtls_ssl_write_early_data(mbedtls_ssl_context *ssl,
5123  const unsigned char *buf, size_t len);
5124 
5125 #define MBEDTLS_SSL_EARLY_DATA_STATUS_NOT_SENT 0
5126 #define MBEDTLS_SSL_EARLY_DATA_STATUS_ACCEPTED 1
5127 #define MBEDTLS_SSL_EARLY_DATA_STATUS_REJECTED 2
5154 int mbedtls_ssl_get_early_data_status(mbedtls_ssl_context *ssl);
5155 #endif /* MBEDTLS_SSL_CLI_C */
5156 
5157 #endif /* MBEDTLS_SSL_EARLY_DATA */
5158 
5165 
5166 #if defined(MBEDTLS_SSL_CONTEXT_SERIALIZATION)
5224  unsigned char *buf,
5225  size_t buf_len,
5226  size_t *olen);
5227 
5297  const unsigned char *buf,
5298  size_t len);
5299 #endif /* MBEDTLS_SSL_CONTEXT_SERIALIZATION */
5300 
5312 
5329  int endpoint, int transport, int preset);
5330 
5337 
5344 
5355 
5372  const unsigned char *secret, size_t slen,
5373  const char *label,
5374  const unsigned char *random, size_t rlen,
5375  unsigned char *dstbuf, size_t dlen);
5376 
5377 #ifdef __cplusplus
5378 }
5379 #endif
5380 
5381 #endif /* ssl.h */
Multi-precision integer library.
#define MBEDTLS_MPI_MAX_SIZE
Definition: bignum.h:85
Platform Security Architecture cryptography module.
This file contains Diffie-Hellman-Merkle (DHM) key exchange definitions and functions.
This file contains ECDH definitions and functions.
This file provides an API for Elliptic Curves over GF(P) (ECP).
#define MBEDTLS_ECP_MAX_BYTES
Definition: ecp.h:365
mbedtls_ecp_group_id
Definition: ecp.h:113
psa_key_id_t mbedtls_svc_key_id_t
Definition: crypto_types.h:297
int(* mbedtls_x509_crt_ca_cb_t)(void *p_ctx, mbedtls_x509_crt const *child, mbedtls_x509_crt **candidate_cas)
The type of trusted certificate callbacks.
Definition: x509_crt.h:796
Build-time configuration info.
This file contains the generic functions for message-digest (hashing) and HMAC.
mbedtls_md_type_t
Supported message digests.
Definition: md.h:173
Mbed TLS Platform time abstraction.
time_t mbedtls_time_t
Definition: platform_time.h:39
Common and shared functions used by multiple modules in the Mbed TLS library.
#define MBEDTLS_DEPRECATED
Definition: platform_util.h:45
Macro wrapper for struct's members.
#define MBEDTLS_PRIVATE(member)
void mbedtls_ssl_conf_cert_req_ca_list(mbedtls_ssl_config *conf, char cert_req_ca_list)
Whether to send a list of acceptable CAs in CertificateRequest messages. (Default: do send)
#define MBEDTLS_PSK_MAX_LEN
Definition: ssl.h:632
void mbedtls_ssl_set_hs_dn_hints(mbedtls_ssl_context *ssl, const mbedtls_x509_crt *crt)
Set DN hints sent to client in CertificateRequest message.
void mbedtls_ssl_conf_read_timeout(mbedtls_ssl_config *conf, uint32_t timeout)
Set the timeout period for mbedtls_ssl_read() (Default: no timeout.)
int mbedtls_ssl_cache_get_t(void *data, unsigned char const *session_id, size_t session_id_len, mbedtls_ssl_session *session)
Callback type: server-side session cache getter.
Definition: ssl.h:882
int mbedtls_ssl_ticket_write_t(void *p_ticket, const mbedtls_ssl_session *session, unsigned char *start, const unsigned char *end, size_t *tlen, uint32_t *lifetime)
Callback type: generate and write session ticket.
Definition: ssl.h:2516
void mbedtls_ssl_conf_extended_master_secret(mbedtls_ssl_config *conf, char ems)
Enable or disable Extended Master Secret negotiation. (Default: MBEDTLS_SSL_EXTENDED_MS_ENABLED)
void mbedtls_ssl_set_mtu(mbedtls_ssl_context *ssl, uint16_t mtu)
Set the Maximum Transport Unit (MTU). Special value: 0 means unset (no limit). This represents the ma...
int mbedtls_ssl_set_client_transport_id(mbedtls_ssl_context *ssl, const unsigned char *info, size_t ilen)
Set client's transport-level identification info. (Server only. DTLS only.)
void mbedtls_ssl_conf_renegotiation_period(mbedtls_ssl_config *conf, const unsigned char period[8])
Set record counter threshold for periodic renegotiation. (Default: 2^48 - 1)
#define MBEDTLS_SSL_CID_OUT_LEN_MAX
Definition: ssl.h:401
const char * mbedtls_ssl_get_ciphersuite(const mbedtls_ssl_context *ssl)
Return the name of the current ciphersuite.
void mbedtls_ssl_conf_legacy_renegotiation(mbedtls_ssl_config *conf, int allow_legacy)
Prevent or allow legacy renegotiation. (Default: MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION)
void mbedtls_ssl_conf_psk_cb(mbedtls_ssl_config *conf, int(*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_psk)
Set the PSK callback (server-side only).
void mbedtls_ssl_export_keys_t(void *p_expkey, mbedtls_ssl_key_export_type type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type)
Callback type: Export key alongside random values for session identification, and PRF for implementat...
Definition: ssl.h:1303
int mbedtls_ssl_conf_psk(mbedtls_ssl_config *conf, const unsigned char *psk, size_t psk_len, const unsigned char *psk_identity, size_t psk_identity_len)
Configure pre-shared keys (PSKs) and their identities to be used in PSK-based ciphersuites.
const char * mbedtls_ssl_get_version(const mbedtls_ssl_context *ssl)
Return the current TLS version.
int mbedtls_ssl_session_save(const mbedtls_ssl_session *session, unsigned char *buf, size_t buf_len, size_t *olen)
Save session structure as serialized data in a buffer. On client, this can be used for saving session...
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_sig_hashes(mbedtls_ssl_config *conf, const int *hashes)
Set the allowed hashes for signatures during the handshake.
int mbedtls_ssl_session_reset(mbedtls_ssl_context *ssl)
Reset an already initialized SSL context for re-use while retaining application-set variables,...
static uintptr_t mbedtls_ssl_get_user_data_n(mbedtls_ssl_context *ssl)
Retrieve the user data in an SSL context as an integer.
Definition: ssl.h:2714
static void mbedtls_ssl_conf_set_user_data_n(mbedtls_ssl_config *conf, uintptr_t n)
Set the user data in an SSL configuration to an integer.
Definition: ssl.h:2618
int mbedtls_ssl_check_record(mbedtls_ssl_context const *ssl, unsigned char *buf, size_t buflen)
Check whether a buffer contains a valid and authentic record that has not been seen before....
struct mbedtls_ssl_transform mbedtls_ssl_transform
Definition: ssl.h:836
void mbedtls_ssl_conf_renegotiation_enforced(mbedtls_ssl_config *conf, int max_records)
Enforce renegotiation requests. (Default: enforced, max_records = 16)
void mbedtls_ssl_free(mbedtls_ssl_context *ssl)
Free referenced items in an SSL context and clear memory.
void mbedtls_ssl_conf_transport(mbedtls_ssl_config *conf, int transport)
Set the transport type (TLS or DTLS). Default: TLS.
int mbedtls_ssl_get_own_cid(mbedtls_ssl_context *ssl, int *enabled, unsigned char own_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX], size_t *own_cid_len)
Get information about our request for usage of the CID extension in the current connection.
#define MBEDTLS_SSL_CID_IN_LEN_MAX
Definition: ssl.h:397
void mbedtls_ssl_set_timer_cb(mbedtls_ssl_context *ssl, void *p_timer, mbedtls_ssl_set_timer_t *f_set_timer, mbedtls_ssl_get_timer_t *f_get_timer)
Set the timer callbacks (Mandatory for DTLS.)
void mbedtls_ssl_set_hs_ca_chain(mbedtls_ssl_context *ssl, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate for the current handshake.
mbedtls_tls_prf_types
Definition: ssl.h:1267
@ MBEDTLS_SSL_TLS_PRF_SHA384
Definition: ssl.h:1269
@ MBEDTLS_SSL_HKDF_EXPAND_SHA256
Definition: ssl.h:1272
@ MBEDTLS_SSL_TLS_PRF_SHA256
Definition: ssl.h:1270
@ MBEDTLS_SSL_TLS_PRF_NONE
Definition: ssl.h:1268
@ MBEDTLS_SSL_HKDF_EXPAND_SHA384
Definition: ssl.h:1271
int mbedtls_ssl_send_t(void *ctx, const unsigned char *buf, size_t len)
Callback type: send data on the network.
Definition: ssl.h:737
void mbedtls_ssl_conf_sni(mbedtls_ssl_config *conf, int(*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_sni)
Set server side ServerName TLS extension callback (optional, server-side only).
mbedtls_ssl_states
Definition: ssl.h:685
@ MBEDTLS_SSL_CERTIFICATE_VERIFY
Definition: ssl.h:695
@ MBEDTLS_SSL_HANDSHAKE_OVER
Definition: ssl.h:714
@ MBEDTLS_SSL_SERVER_HELLO_DONE
Definition: ssl.h:692
@ MBEDTLS_SSL_END_OF_EARLY_DATA
Definition: ssl.h:707
@ MBEDTLS_SSL_NEW_SESSION_TICKET
Definition: ssl.h:703
@ MBEDTLS_SSL_SERVER_FINISHED
Definition: ssl.h:699
@ MBEDTLS_SSL_SERVER_KEY_EXCHANGE
Definition: ssl.h:690
@ MBEDTLS_SSL_ENCRYPTED_EXTENSIONS
Definition: ssl.h:706
@ MBEDTLS_SSL_SERVER_HELLO
Definition: ssl.h:688
@ MBEDTLS_SSL_SERVER_CCS_AFTER_HELLO_RETRY_REQUEST
Definition: ssl.h:713
@ MBEDTLS_SSL_CLIENT_KEY_EXCHANGE
Definition: ssl.h:694
@ MBEDTLS_SSL_CLIENT_CCS_BEFORE_2ND_CLIENT_HELLO
Definition: ssl.h:710
@ MBEDTLS_SSL_CLIENT_HELLO
Definition: ssl.h:687
@ MBEDTLS_SSL_SERVER_CERTIFICATE
Definition: ssl.h:689
@ MBEDTLS_SSL_CERTIFICATE_REQUEST
Definition: ssl.h:691
@ MBEDTLS_SSL_CLIENT_FINISHED
Definition: ssl.h:697
@ MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC
Definition: ssl.h:698
@ MBEDTLS_SSL_SERVER_HELLO_VERIFY_REQUEST_SENT
Definition: ssl.h:704
@ MBEDTLS_SSL_HANDSHAKE_WRAPUP
Definition: ssl.h:701
@ MBEDTLS_SSL_CLIENT_CCS_AFTER_SERVER_FINISHED
Definition: ssl.h:709
@ MBEDTLS_SSL_CLIENT_CHANGE_CIPHER_SPEC
Definition: ssl.h:696
@ MBEDTLS_SSL_CLIENT_CERTIFICATE_VERIFY
Definition: ssl.h:708
@ MBEDTLS_SSL_HELLO_REQUEST
Definition: ssl.h:686
@ MBEDTLS_SSL_CLIENT_CERTIFICATE
Definition: ssl.h:693
@ MBEDTLS_SSL_TLS1_3_NEW_SESSION_TICKET_FLUSH
Definition: ssl.h:716
@ MBEDTLS_SSL_FLUSH_BUFFERS
Definition: ssl.h:700
@ MBEDTLS_SSL_CLIENT_CCS_AFTER_CLIENT_HELLO
Definition: ssl.h:712
@ MBEDTLS_SSL_TLS1_3_NEW_SESSION_TICKET
Definition: ssl.h:715
@ MBEDTLS_SSL_HELLO_RETRY_REQUEST
Definition: ssl.h:705
@ MBEDTLS_SSL_SERVER_CCS_AFTER_SERVER_HELLO
Definition: ssl.h:711
void mbedtls_ssl_set_verify(mbedtls_ssl_context *ssl, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set a connection-specific verification callback (optional).
void mbedtls_ssl_conf_endpoint(mbedtls_ssl_config *conf, int endpoint)
Set the current endpoint type.
#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80
Definition: ssl.h:1162
#define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH
Definition: ssl.h:1149
int(* mbedtls_ssl_hs_cb_t)(mbedtls_ssl_context *ssl)
Callback type: generic handshake callback.
Definition: ssl.h:1327
int mbedtls_ssl_check_pending(const mbedtls_ssl_context *ssl)
Check if there is data already read from the underlying transport but not yet processed.
mbedtls_ssl_protocol_version
Definition: ssl.h:1182
@ MBEDTLS_SSL_VERSION_TLS1_2
Definition: ssl.h:1184
@ MBEDTLS_SSL_VERSION_TLS1_3
Definition: ssl.h:1185
@ MBEDTLS_SSL_VERSION_UNKNOWN
Definition: ssl.h:1183
int mbedtls_ssl_send_alert_message(mbedtls_ssl_context *ssl, unsigned char level, unsigned char message)
Send an alert message.
static const char * mbedtls_ssl_get_srtp_profile_as_string(mbedtls_ssl_srtp_profile profile)
Definition: ssl.h:4009
static int mbedtls_ssl_is_handshake_over(mbedtls_ssl_context *ssl)
After calling mbedtls_ssl_handshake() to start the SSL handshake you can call this function to check ...
Definition: ssl.h:4772
int mbedtls_ssl_conf_dh_param_bin(mbedtls_ssl_config *conf, const unsigned char *dhm_P, size_t P_len, const unsigned char *dhm_G, size_t G_len)
Set the Diffie-Hellman public P and G values from big-endian binary presentations....
#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32
Definition: ssl.h:1163
void mbedtls_ssl_conf_rng(mbedtls_ssl_config *conf, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Set the random number generator callback.
void mbedtls_ssl_conf_dtls_anti_replay(mbedtls_ssl_config *conf, char mode)
Enable or disable anti-replay protection for DTLS. (DTLS only, no effect on TLS.) Default: enabled.
int mbedtls_ssl_ticket_parse_t(void *p_ticket, mbedtls_ssl_session *session, unsigned char *buf, size_t len)
Callback type: parse and load session ticket.
Definition: ssl.h:2546
int mbedtls_ssl_renegotiate(mbedtls_ssl_context *ssl)
Initiate an SSL renegotiation on the running connection. Client: perform the renegotiation right now....
static void mbedtls_ssl_conf_cert_cb(mbedtls_ssl_config *conf, mbedtls_ssl_hs_cb_t f_cert_cb)
Set the certificate selection callback (server-side only).
Definition: ssl.h:2490
int mbedtls_ssl_handshake(mbedtls_ssl_context *ssl)
Perform the SSL handshake.
int mbedtls_ssl_conf_own_cert(mbedtls_ssl_config *conf, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate chain and private key.
struct mbedtls_ssl_sig_hash_set_t mbedtls_ssl_sig_hash_set_t
Definition: ssl.h:838
static void * mbedtls_ssl_conf_get_user_data_p(mbedtls_ssl_config *conf)
Retrieve the user data in an SSL configuration as a pointer.
Definition: ssl.h:2635
int mbedtls_ssl_set_hs_psk(mbedtls_ssl_context *ssl, const unsigned char *psk, size_t psk_len)
Set the pre-shared Key (PSK) for the current handshake.
uint32_t mbedtls_ssl_get_verify_result(const mbedtls_ssl_context *ssl)
Return the result of the certificate verification.
#define MBEDTLS_SSL_SEQUENCE_NUMBER_LEN
Definition: ssl.h:676
mbedtls_ssl_key_export_type
Definition: ssl.h:1276
@ MBEDTLS_SSL_KEY_EXPORT_TLS12_MASTER_SECRET
Definition: ssl.h:1277
int mbedtls_ssl_session_load(mbedtls_ssl_session *session, const unsigned char *buf, size_t len)
Load serialized session data into a session structure. On client, this can be used for loading saved ...
int mbedtls_ssl_cookie_write_t(void *ctx, unsigned char **p, unsigned char *end, const unsigned char *info, size_t ilen)
Callback type: generate a cookie.
Definition: ssl.h:2813
static mbedtls_ssl_protocol_version mbedtls_ssl_get_version_number(const mbedtls_ssl_context *ssl)
Return the (D)TLS protocol version negotiated in the given connection.
Definition: ssl.h:4559
void mbedtls_ssl_conf_authmode(mbedtls_ssl_config *conf, int authmode)
Set the certificate verification mode Default: NONE on server, REQUIRED on client.
void mbedtls_ssl_conf_dtls_cookies(mbedtls_ssl_config *conf, mbedtls_ssl_cookie_write_t *f_cookie_write, mbedtls_ssl_cookie_check_t *f_cookie_check, void *p_cookie)
Register callbacks for DTLS cookies (Server only. DTLS only.)
int mbedtls_ssl_get_max_out_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum outgoing record payload in bytes.
int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Try to write exactly 'len' application data bytes.
struct mbedtls_ssl_handshake_params mbedtls_ssl_handshake_params
Definition: ssl.h:837
int mbedtls_ssl_get_max_in_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum incoming record payload in bytes.
void mbedtls_ssl_conf_preference_order(mbedtls_ssl_config *conf, int order)
Pick the ciphersuites order according to the second parameter in the SSL Server module (MBEDTLS_SSL_S...
int mbedtls_ssl_conf_dtls_srtp_protection_profiles(mbedtls_ssl_config *conf, const mbedtls_ssl_srtp_profile *profiles)
Set the supported DTLS-SRTP protection profiles.
void mbedtls_ssl_set_timer_t(void *ctx, uint32_t int_ms, uint32_t fin_ms)
Callback type: set a pair of timers/delays to watch.
Definition: ssl.h:813
void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max)
Set retransmit timeout values for the DTLS handshake. (DTLS only, no effect on TLS....
void mbedtls_ssl_conf_srtp_mki_value_supported(mbedtls_ssl_config *conf, int support_mki_value)
Manage support for mki(master key id) value in use_srtp extension. MKI is an optional part of SRTP us...
void mbedtls_ssl_conf_sig_algs(mbedtls_ssl_config *conf, const uint16_t *sig_algs)
Configure allowed signature algorithms for use in TLS 1.3.
int mbedtls_ssl_recv_timeout_t(void *ctx, unsigned char *buf, size_t len, uint32_t timeout)
Callback type: receive data from the network, with timeout.
Definition: ssl.h:787
void mbedtls_ssl_get_dtls_srtp_negotiation_result(const mbedtls_ssl_context *ssl, mbedtls_dtls_srtp_info *dtls_srtp_info)
Get the negotiated DTLS-SRTP information: Protection profile and MKI value.
void mbedtls_ssl_conf_session_tickets_cb(mbedtls_ssl_config *conf, mbedtls_ssl_ticket_write_t *f_ticket_write, mbedtls_ssl_ticket_parse_t *f_ticket_parse, void *p_ticket)
Configure SSL session ticket callbacks (server only). (Default: none.)
void mbedtls_ssl_config_free(mbedtls_ssl_config *conf)
Free an SSL configuration context.
static void mbedtls_ssl_conf_dn_hints(mbedtls_ssl_config *conf, const mbedtls_x509_crt *crt)
Set DN hints sent to client in CertificateRequest message.
Definition: ssl.h:3335
void mbedtls_ssl_conf_cert_profile(mbedtls_ssl_config *conf, const mbedtls_x509_crt_profile *profile)
Set the X.509 security profile used for verification.
void mbedtls_ssl_session_init(mbedtls_ssl_session *session)
Initialize SSL session structure.
#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN
Definition: ssl.h:437
int mbedtls_ssl_get_peer_cid(mbedtls_ssl_context *ssl, int *enabled, unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX], size_t *peer_cid_len)
Get information about the use of the CID extension in the current connection.
int mbedtls_ssl_context_load(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Load serialized connection data to an SSL context.
void mbedtls_ssl_set_hs_authmode(mbedtls_ssl_context *ssl, int authmode)
Set authmode for the current handshake.
void mbedtls_ssl_set_datagram_packing(mbedtls_ssl_context *ssl, unsigned allow_packing)
Allow or disallow packing of multiple handshake records within a single datagram.
void mbedtls_ssl_init(mbedtls_ssl_context *ssl)
Initialize an SSL context Just makes the context ready for mbedtls_ssl_setup() or mbedtls_ssl_free()
void mbedtls_ssl_conf_ca_chain(mbedtls_ssl_config *conf, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate.
static uintptr_t mbedtls_ssl_conf_get_user_data_n(mbedtls_ssl_config *conf)
Retrieve the user data in an SSL configuration as an integer.
Definition: ssl.h:2651
int mbedtls_ssl_conf_cid(mbedtls_ssl_config *conf, size_t len, int ignore_other_cids)
Specify the length of Connection IDs for incoming encrypted DTLS records, as well as the behaviour on...
void mbedtls_ssl_set_bio(mbedtls_ssl_context *ssl, void *p_bio, mbedtls_ssl_send_t *f_send, mbedtls_ssl_recv_t *f_recv, mbedtls_ssl_recv_timeout_t *f_recv_timeout)
Set the underlying BIO callbacks for write, read and read-with-timeout.
int mbedtls_ssl_set_session(mbedtls_ssl_context *ssl, const mbedtls_ssl_session *session)
Load a session for session resumption.
int mbedtls_ssl_get_record_expansion(const mbedtls_ssl_context *ssl)
Return the (maximum) number of bytes added by the record layer: header + encryption/MAC overhead (inc...
static void * mbedtls_ssl_get_user_data_p(mbedtls_ssl_context *ssl)
Retrieve the user data in an SSL context as a pointer.
Definition: ssl.h:2698
void mbedtls_ssl_conf_session_cache(mbedtls_ssl_config *conf, void *p_cache, mbedtls_ssl_cache_get_t *f_get_cache, mbedtls_ssl_cache_set_t *f_set_cache)
Set the session cache callbacks (server-side only) If not set, no session resuming is done (except if...
void mbedtls_ssl_conf_session_tickets(mbedtls_ssl_config *conf, int use_tickets)
Enable / Disable session tickets (client only). (Default: MBEDTLS_SSL_SESSION_TICKETS_ENABLED....
int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name)
Return the ID of the ciphersuite associated with the given name.
static const char * mbedtls_ssl_get_hostname(mbedtls_ssl_context *ssl)
Get the hostname that checked against the received server certificate. It is used to set the ServerNa...
Definition: ssl.h:3821
void mbedtls_ssl_conf_dtls_badmac_limit(mbedtls_ssl_config *conf, unsigned limit)
Set a limit on the number of records with a bad MAC before terminating the connection....
int mbedtls_ssl_cookie_check_t(void *ctx, const unsigned char *cookie, size_t clen, const unsigned char *info, size_t ilen)
Callback type: verify a cookie.
Definition: ssl.h:2830
void mbedtls_ssl_conf_dhm_min_bitlen(mbedtls_ssl_config *conf, unsigned int bitlen)
Set the minimum length for Diffie-Hellman parameters. (Client-side only.) (Default: 1024 bits....
int mbedtls_ssl_set_hs_own_cert(mbedtls_ssl_context *ssl, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate and key for the current handshake.
int mbedtls_ssl_config_defaults(mbedtls_ssl_config *conf, int endpoint, int transport, int preset)
Load reasonable default SSL configuration values. (You need to call mbedtls_ssl_config_init() first....
int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len)
Read at most 'len' application data bytes.
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_curves(mbedtls_ssl_config *conf, const mbedtls_ecp_group_id *curves)
Set the allowed curves in order of preference.
int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname)
Set or reset the hostname to check against the received server certificate. It sets the ServerName TL...
const mbedtls_x509_crt * mbedtls_ssl_get_peer_cert(const mbedtls_ssl_context *ssl)
Return the peer certificate from the current connection.
void mbedtls_ssl_conf_groups(mbedtls_ssl_config *conf, const uint16_t *groups)
Set the allowed groups in order of preference.
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_max_version(mbedtls_ssl_config *conf, int major, int minor)
Set the maximum supported version sent from the client side and/or accepted at the server side.
int mbedtls_ssl_handshake_step(mbedtls_ssl_context *ssl)
Perform a single step of the SSL handshake.
int mbedtls_ssl_cache_set_t(void *data, unsigned char const *session_id, size_t session_id_len, const mbedtls_ssl_session *session)
Callback type: server-side session cache setter.
Definition: ssl.h:904
void mbedtls_ssl_conf_renegotiation(mbedtls_ssl_config *conf, int renegotiation)
Enable / Disable renegotiation support for connection when initiated by peer (Default: MBEDTLS_SSL_RE...
const unsigned char * mbedtls_ssl_get_hs_sni(mbedtls_ssl_context *ssl, size_t *name_len)
Retrieve SNI extension value for the current handshake. Available in f_cert_cb of mbedtls_ssl_conf_ce...
struct mbedtls_dtls_srtp_info_t mbedtls_dtls_srtp_info
void mbedtls_ssl_conf_dbg(mbedtls_ssl_config *conf, void(*f_dbg)(void *, int, const char *, int, const char *), void *p_dbg)
Set the debug callback.
static const mbedtls_ssl_config * mbedtls_ssl_context_get_config(const mbedtls_ssl_context *ssl)
Return the SSL configuration structure associated with the given SSL context.
Definition: ssl.h:2108
#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32
Definition: ssl.h:1161
#define MBEDTLS_TLS1_3_MD_MAX_SIZE
Definition: ssl.h:672
void mbedtls_ssl_config_init(mbedtls_ssl_config *conf)
Initialize an SSL configuration context Just makes the context ready for mbedtls_ssl_config_defaults(...
static void mbedtls_ssl_conf_max_tls_version(mbedtls_ssl_config *conf, mbedtls_ssl_protocol_version tls_version)
Set the maximum supported version sent from the client side and/or accepted at the server side.
Definition: ssl.h:4139
int mbedtls_ssl_context_save(mbedtls_ssl_context *ssl, unsigned char *buf, size_t buf_len, size_t *olen)
Save an active connection as serialized data in a buffer. This allows the freeing or re-using of the ...
int mbedtls_ssl_tls_prf(const mbedtls_tls_prf_types prf, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen)
TLS-PRF function for key derivation.
struct mbedtls_ssl_flight_item mbedtls_ssl_flight_item
Definition: ssl.h:843
int mbedtls_ssl_recv_t(void *ctx, unsigned char *buf, size_t len)
Callback type: receive data from the network.
Definition: ssl.h:761
void mbedtls_ssl_session_free(mbedtls_ssl_session *session)
Free referenced items in an SSL session including the peer certificate and clear memory.
int mbedtls_ssl_close_notify(mbedtls_ssl_context *ssl)
Notify the peer that the connection is being closed.
int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code)
Set the maximum fragment length to emit and/or negotiate. (Typical: the smaller of MBEDTLS_SSL_IN_CON...
int mbedtls_ssl_dtls_srtp_set_mki_value(mbedtls_ssl_context *ssl, unsigned char *mki_value, uint16_t mki_len)
Set the mki_value for the current DTLS-SRTP session.
int mbedtls_ssl_get_ciphersuite_id_from_ssl(const mbedtls_ssl_context *ssl)
Return the id of the current ciphersuite.
void mbedtls_ssl_conf_ciphersuites(mbedtls_ssl_config *conf, const int *ciphersuites)
Set the list of allowed ciphersuites and the preference order. First in the list has the highest pref...
#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80
Definition: ssl.h:1160
const char * mbedtls_ssl_get_alpn_protocol(const mbedtls_ssl_context *ssl)
Get the name of the negotiated Application Layer Protocol. This function should be called after the h...
size_t mbedtls_ssl_get_bytes_avail(const mbedtls_ssl_context *ssl)
Return the number of application data bytes remaining to be read from the current record.
uint16_t mbedtls_ssl_srtp_profile
Definition: ssl.h:1167
int mbedtls_ssl_get_session(const mbedtls_ssl_context *ssl, mbedtls_ssl_session *session)
Export a session in order to resume it later.
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_min_version(mbedtls_ssl_config *conf, int major, int minor)
Set the minimum accepted SSL/TLS protocol version.
static void mbedtls_ssl_conf_set_user_data_p(mbedtls_ssl_config *conf, void *p)
Set the user data in an SSL configuration to a pointer.
Definition: ssl.h:2604
const char * mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id)
Return the name of the ciphersuite associated with the given ID.
int mbedtls_ssl_get_timer_t(void *ctx)
Callback type: get status of timers/delays.
Definition: ssl.h:828
int mbedtls_ssl_conf_alpn_protocols(mbedtls_ssl_config *conf, const char **protos)
Set the supported Application Layer Protocols.
static void mbedtls_ssl_set_user_data_n(mbedtls_ssl_context *ssl, uintptr_t n)
Set the user data in an SSL context to an integer.
Definition: ssl.h:2681
int mbedtls_ssl_conf_dh_param_ctx(mbedtls_ssl_config *conf, mbedtls_dhm_context *dhm_ctx)
Set the Diffie-Hellman public P and G values, read from existing context (server-side only)
static void mbedtls_ssl_conf_min_tls_version(mbedtls_ssl_config *conf, mbedtls_ssl_protocol_version tls_version)
Set the minimum supported version sent from the client side and/or accepted at the server side.
Definition: ssl.h:4196
struct mbedtls_ssl_key_cert mbedtls_ssl_key_cert
Definition: ssl.h:840
int mbedtls_ssl_setup(mbedtls_ssl_context *ssl, const mbedtls_ssl_config *conf)
Set up an SSL context for use.
static void mbedtls_ssl_set_user_data_p(mbedtls_ssl_context *ssl, void *p)
Set the user data in an SSL context to a pointer.
Definition: ssl.h:2667
static int mbedtls_ssl_conf_get_endpoint(const mbedtls_ssl_config *conf)
Get the current endpoint type.
Definition: ssl.h:1946
void mbedtls_ssl_conf_encrypt_then_mac(mbedtls_ssl_config *conf, char etm)
Enable or disable Encrypt-then-MAC (Default: MBEDTLS_SSL_ETM_ENABLED)
void mbedtls_ssl_conf_verify(mbedtls_ssl_config *conf, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set the verification callback (Optional).
void mbedtls_ssl_set_export_keys_cb(mbedtls_ssl_context *ssl, mbedtls_ssl_export_keys_t *f_export_keys, void *p_export_keys)
Configure a key export callback. (Default: none.)
int mbedtls_ssl_set_cid(mbedtls_ssl_context *ssl, int enable, unsigned char const *own_cid, size_t own_cid_len)
Configure the use of the Connection ID (CID) extension in the next handshake.
SSL Ciphersuites for Mbed TLS.
The DHM context structure.
Definition: dhm.h:113
MPI structure.
Definition: bignum.h:219
Public key container.
Definition: pk.h:239
unsigned char _pms_ecdhe_psk[4+MBEDTLS_ECP_MAX_BYTES+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:663
unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]
Definition: ssl.h:643
unsigned char _pms_psk[4+2 *MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:652
unsigned char _pms_rsa_psk[52+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:659
unsigned char dummy
Definition: ssl.h:638
unsigned char _pms_rsa[48]
Definition: ssl.h:640
unsigned char _pms_dhe_psk[4+MBEDTLS_MPI_MAX_SIZE+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:656
unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]
Definition: ssl.h:649
X.509 certificate revocation list parsing.
X.509 certificate parsing and writing.