Mbed TLS v3.5.0
ssl.h
Go to the documentation of this file.
1
6/*
7 * Copyright The Mbed TLS Contributors
8 * SPDX-License-Identifier: Apache-2.0
9 *
10 * Licensed under the Apache License, Version 2.0 (the "License"); you may
11 * not use this file except in compliance with the License.
12 * You may obtain a copy of the License at
13 *
14 * http://www.apache.org/licenses/LICENSE-2.0
15 *
16 * Unless required by applicable law or agreed to in writing, software
17 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
18 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19 * See the License for the specific language governing permissions and
20 * limitations under the License.
21 */
22#ifndef MBEDTLS_SSL_H
23#define MBEDTLS_SSL_H
26
27#include "mbedtls/build_info.h"
28
29#include "mbedtls/bignum.h"
30#include "mbedtls/ecp.h"
31
33
34#if defined(MBEDTLS_X509_CRT_PARSE_C)
35#include "mbedtls/x509_crt.h"
36#include "mbedtls/x509_crl.h"
37#endif
38
39#if defined(MBEDTLS_DHM_C)
40#include "mbedtls/dhm.h"
41#endif
42
43#include "mbedtls/md.h"
44
45#if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_ANY_ENABLED)
46#include "mbedtls/ecdh.h"
47#endif
48
49#if defined(MBEDTLS_HAVE_TIME)
51#endif
52
53#include "psa/crypto.h"
54
55/*
56 * SSL Error codes
57 */
59#define MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS -0x7000
61#define MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE -0x7080
63#define MBEDTLS_ERR_SSL_BAD_INPUT_DATA -0x7100
65#define MBEDTLS_ERR_SSL_INVALID_MAC -0x7180
67#define MBEDTLS_ERR_SSL_INVALID_RECORD -0x7200
69#define MBEDTLS_ERR_SSL_CONN_EOF -0x7280
71#define MBEDTLS_ERR_SSL_DECODE_ERROR -0x7300
72/* Error space gap */
74#define MBEDTLS_ERR_SSL_NO_RNG -0x7400
76#define MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE -0x7480
78#define MBEDTLS_ERR_SSL_UNSUPPORTED_EXTENSION -0x7500
80#define MBEDTLS_ERR_SSL_NO_APPLICATION_PROTOCOL -0x7580
82#define MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED -0x7600
84#define MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED -0x7680
86#define MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE -0x7700
88#define MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE -0x7780
90#define MBEDTLS_ERR_SSL_UNRECOGNIZED_NAME -0x7800
92#define MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY -0x7880
93/* Error space gap */
94/* Error space gap */
96#define MBEDTLS_ERR_SSL_BAD_CERTIFICATE -0x7A00
97/* Error space gap */
102#define MBEDTLS_ERR_SSL_RECEIVED_NEW_SESSION_TICKET -0x7B00
104#define MBEDTLS_ERR_SSL_CANNOT_READ_EARLY_DATA -0x7B80
106#define MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA -0x7C00
107/* Error space gap */
108/* Error space gap */
109/* Error space gap */
110/* Error space gap */
112#define MBEDTLS_ERR_SSL_CACHE_ENTRY_NOT_FOUND -0x7E80
114#define MBEDTLS_ERR_SSL_ALLOC_FAILED -0x7F00
116#define MBEDTLS_ERR_SSL_HW_ACCEL_FAILED -0x7F80
118#define MBEDTLS_ERR_SSL_HW_ACCEL_FALLTHROUGH -0x6F80
120#define MBEDTLS_ERR_SSL_BAD_PROTOCOL_VERSION -0x6E80
122#define MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE -0x6E00
124#define MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED -0x6D80
126#define MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH -0x6D00
128#define MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY -0x6C80
130#define MBEDTLS_ERR_SSL_INTERNAL_ERROR -0x6C00
132#define MBEDTLS_ERR_SSL_COUNTER_WRAPPING -0x6B80
134#define MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO -0x6B00
136#define MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED -0x6A80
138#define MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL -0x6A00
139/* Error space gap */
141#define MBEDTLS_ERR_SSL_WANT_READ -0x6900
143#define MBEDTLS_ERR_SSL_WANT_WRITE -0x6880
145#define MBEDTLS_ERR_SSL_TIMEOUT -0x6800
147#define MBEDTLS_ERR_SSL_CLIENT_RECONNECT -0x6780
149#define MBEDTLS_ERR_SSL_UNEXPECTED_RECORD -0x6700
151#define MBEDTLS_ERR_SSL_NON_FATAL -0x6680
153#define MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER -0x6600
155#define MBEDTLS_ERR_SSL_CONTINUE_PROCESSING -0x6580
157#define MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS -0x6500
159#define MBEDTLS_ERR_SSL_EARLY_MESSAGE -0x6480
160/* Error space gap */
161/* Error space gap */
162/* Error space gap */
163/* Error space gap */
164/* Error space gap */
165/* Error space gap */
166/* Error space gap */
167/* Error space gap */
169#define MBEDTLS_ERR_SSL_UNEXPECTED_CID -0x6000
171#define MBEDTLS_ERR_SSL_VERSION_MISMATCH -0x5F00
173#define MBEDTLS_ERR_SSL_BAD_CONFIG -0x5E80
174
175/*
176 * Constants from RFC 8446 for TLS 1.3 PSK modes
177 *
178 * Those are used in the Pre-Shared Key Exchange Modes extension.
179 * See Section 4.2.9 in RFC 8446.
180 */
181#define MBEDTLS_SSL_TLS1_3_PSK_MODE_PURE 0 /* Pure PSK-based exchange */
182#define MBEDTLS_SSL_TLS1_3_PSK_MODE_ECDHE 1 /* PSK+ECDHE-based exchange */
183
184/*
185 * TLS 1.3 NamedGroup values
186 *
187 * From RF 8446
188 * enum {
189 * // Elliptic Curve Groups (ECDHE)
190 * secp256r1(0x0017), secp384r1(0x0018), secp521r1(0x0019),
191 * x25519(0x001D), x448(0x001E),
192 * // Finite Field Groups (DHE)
193 * ffdhe2048(0x0100), ffdhe3072(0x0101), ffdhe4096(0x0102),
194 * ffdhe6144(0x0103), ffdhe8192(0x0104),
195 * // Reserved Code Points
196 * ffdhe_private_use(0x01FC..0x01FF),
197 * ecdhe_private_use(0xFE00..0xFEFF),
198 * (0xFFFF)
199 * } NamedGroup;
200 *
201 */
202
203/* Elliptic Curve Groups (ECDHE) */
204#define MBEDTLS_SSL_IANA_TLS_GROUP_NONE 0
205#define MBEDTLS_SSL_IANA_TLS_GROUP_SECP192K1 0x0012
206#define MBEDTLS_SSL_IANA_TLS_GROUP_SECP192R1 0x0013
207#define MBEDTLS_SSL_IANA_TLS_GROUP_SECP224K1 0x0014
208#define MBEDTLS_SSL_IANA_TLS_GROUP_SECP224R1 0x0015
209#define MBEDTLS_SSL_IANA_TLS_GROUP_SECP256K1 0x0016
210#define MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1 0x0017
211#define MBEDTLS_SSL_IANA_TLS_GROUP_SECP384R1 0x0018
212#define MBEDTLS_SSL_IANA_TLS_GROUP_SECP521R1 0x0019
213#define MBEDTLS_SSL_IANA_TLS_GROUP_BP256R1 0x001A
214#define MBEDTLS_SSL_IANA_TLS_GROUP_BP384R1 0x001B
215#define MBEDTLS_SSL_IANA_TLS_GROUP_BP512R1 0x001C
216#define MBEDTLS_SSL_IANA_TLS_GROUP_X25519 0x001D
217#define MBEDTLS_SSL_IANA_TLS_GROUP_X448 0x001E
218/* Finite Field Groups (DHE) */
219#define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE2048 0x0100
220#define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE3072 0x0101
221#define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE4096 0x0102
222#define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE6144 0x0103
223#define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE8192 0x0104
224
225/*
226 * TLS 1.3 Key Exchange Modes
227 *
228 * Mbed TLS internal identifiers for use with the SSL configuration API
229 * mbedtls_ssl_conf_tls13_key_exchange_modes().
230 */
231
232#define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK (1u << 0)
235#define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL (1u << 1)
238#define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL (1u << 2)
242/* Convenience macros for sets of key exchanges. */
243#define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_ALL \
244 (MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK | \
245 MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL | \
246 MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL)
247#define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_ALL \
248 (MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK | \
249 MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL)
250#define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ALL \
251 (MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL | \
252 MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL)
254#define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_NONE (0)
255
256/*
257 * Various constants
258 */
259
260#if !defined(MBEDTLS_DEPRECATED_REMOVED)
261/* These are the high and low bytes of ProtocolVersion as defined by:
262 * - RFC 5246: ProtocolVersion version = { 3, 3 }; // TLS v1.2
263 * - RFC 8446: see section 4.2.1
264 */
265#define MBEDTLS_SSL_MAJOR_VERSION_3 3
266#define MBEDTLS_SSL_MINOR_VERSION_3 3
267#define MBEDTLS_SSL_MINOR_VERSION_4 4
268#endif /* MBEDTLS_DEPRECATED_REMOVED */
269
270#define MBEDTLS_SSL_TRANSPORT_STREAM 0
271#define MBEDTLS_SSL_TRANSPORT_DATAGRAM 1
273#define MBEDTLS_SSL_MAX_HOST_NAME_LEN 255
274#define MBEDTLS_SSL_MAX_ALPN_NAME_LEN 255
276#define MBEDTLS_SSL_MAX_ALPN_LIST_LEN 65535
278/* RFC 6066 section 4, see also mfl_code_to_length in ssl_tls.c
279 * NONE must be zero so that memset()ing structure to zero works */
280#define MBEDTLS_SSL_MAX_FRAG_LEN_NONE 0
281#define MBEDTLS_SSL_MAX_FRAG_LEN_512 1
282#define MBEDTLS_SSL_MAX_FRAG_LEN_1024 2
283#define MBEDTLS_SSL_MAX_FRAG_LEN_2048 3
284#define MBEDTLS_SSL_MAX_FRAG_LEN_4096 4
285#define MBEDTLS_SSL_MAX_FRAG_LEN_INVALID 5
287#define MBEDTLS_SSL_IS_CLIENT 0
288#define MBEDTLS_SSL_IS_SERVER 1
289
290#define MBEDTLS_SSL_EXTENDED_MS_DISABLED 0
291#define MBEDTLS_SSL_EXTENDED_MS_ENABLED 1
292
293#define MBEDTLS_SSL_CID_DISABLED 0
294#define MBEDTLS_SSL_CID_ENABLED 1
295
296#define MBEDTLS_SSL_ETM_DISABLED 0
297#define MBEDTLS_SSL_ETM_ENABLED 1
298
299#define MBEDTLS_SSL_COMPRESS_NULL 0
300
301#define MBEDTLS_SSL_VERIFY_NONE 0
302#define MBEDTLS_SSL_VERIFY_OPTIONAL 1
303#define MBEDTLS_SSL_VERIFY_REQUIRED 2
304#define MBEDTLS_SSL_VERIFY_UNSET 3 /* Used only for sni_authmode */
305
306#define MBEDTLS_SSL_LEGACY_RENEGOTIATION 0
307#define MBEDTLS_SSL_SECURE_RENEGOTIATION 1
308
309#define MBEDTLS_SSL_RENEGOTIATION_DISABLED 0
310#define MBEDTLS_SSL_RENEGOTIATION_ENABLED 1
311
312#define MBEDTLS_SSL_ANTI_REPLAY_DISABLED 0
313#define MBEDTLS_SSL_ANTI_REPLAY_ENABLED 1
314
315#define MBEDTLS_SSL_RENEGOTIATION_NOT_ENFORCED -1
316#define MBEDTLS_SSL_RENEGO_MAX_RECORDS_DEFAULT 16
317
318#define MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION 0
319#define MBEDTLS_SSL_LEGACY_ALLOW_RENEGOTIATION 1
320#define MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE 2
321
322#define MBEDTLS_SSL_TRUNC_HMAC_DISABLED 0
323#define MBEDTLS_SSL_TRUNC_HMAC_ENABLED 1
324#define MBEDTLS_SSL_TRUNCATED_HMAC_LEN 10 /* 80 bits, rfc 6066 section 7 */
325
326#define MBEDTLS_SSL_SESSION_TICKETS_DISABLED 0
327#define MBEDTLS_SSL_SESSION_TICKETS_ENABLED 1
328
329#define MBEDTLS_SSL_PRESET_DEFAULT 0
330#define MBEDTLS_SSL_PRESET_SUITEB 2
331
332#define MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED 1
333#define MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED 0
334
335#define MBEDTLS_SSL_EARLY_DATA_DISABLED 0
336#define MBEDTLS_SSL_EARLY_DATA_ENABLED 1
337
338#define MBEDTLS_SSL_DTLS_SRTP_MKI_UNSUPPORTED 0
339#define MBEDTLS_SSL_DTLS_SRTP_MKI_SUPPORTED 1
340
341#define MBEDTLS_SSL_SRV_CIPHERSUITE_ORDER_CLIENT 1
342#define MBEDTLS_SSL_SRV_CIPHERSUITE_ORDER_SERVER 0
343
344#if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS)
345#if defined(PSA_WANT_ALG_SHA_384)
346#define MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN 48
347#elif defined(PSA_WANT_ALG_SHA_256)
348#define MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN 32
349#endif
350#endif /* MBEDTLS_SSL_PROTO_TLS1_3 && MBEDTLS_SSL_SESSION_TICKETS */
351/*
352 * Default range for DTLS retransmission timer value, in milliseconds.
353 * RFC 6347 4.2.4.1 says from 1 second to 60 seconds.
354 */
355#define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MIN 1000
356#define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MAX 60000
357
366/*
367 * Maximum fragment length in bytes,
368 * determines the size of each of the two internal I/O buffers.
369 *
370 * Note: the RFC defines the default size of SSL / TLS messages. If you
371 * change the value here, other clients / servers may not be able to
372 * communicate with you anymore. Only change this value if you control
373 * both sides of the connection and have it reduced at both sides, or
374 * if you're using the Max Fragment Length extension and you know all your
375 * peers are using it too!
376 */
377#if !defined(MBEDTLS_SSL_IN_CONTENT_LEN)
378#define MBEDTLS_SSL_IN_CONTENT_LEN 16384
379#endif
380
381#if !defined(MBEDTLS_SSL_OUT_CONTENT_LEN)
382#define MBEDTLS_SSL_OUT_CONTENT_LEN 16384
383#endif
384
385/*
386 * Maximum number of heap-allocated bytes for the purpose of
387 * DTLS handshake message reassembly and future message buffering.
388 */
389#if !defined(MBEDTLS_SSL_DTLS_MAX_BUFFERING)
390#define MBEDTLS_SSL_DTLS_MAX_BUFFERING 32768
391#endif
392
393/*
394 * Maximum length of CIDs for incoming and outgoing messages.
395 */
396#if !defined(MBEDTLS_SSL_CID_IN_LEN_MAX)
397#define MBEDTLS_SSL_CID_IN_LEN_MAX 32
398#endif
399
400#if !defined(MBEDTLS_SSL_CID_OUT_LEN_MAX)
401#define MBEDTLS_SSL_CID_OUT_LEN_MAX 32
402#endif
403
404#if !defined(MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY)
405#define MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY 16
406#endif
407
408#if !defined(MBEDTLS_SSL_MAX_EARLY_DATA_SIZE)
409#define MBEDTLS_SSL_MAX_EARLY_DATA_SIZE 1024
410#endif
411
412#if !defined(MBEDTLS_SSL_TLS1_3_TICKET_AGE_TOLERANCE)
413#define MBEDTLS_SSL_TLS1_3_TICKET_AGE_TOLERANCE 6000
414#endif
415
416#if !defined(MBEDTLS_SSL_TLS1_3_TICKET_NONCE_LENGTH)
417#define MBEDTLS_SSL_TLS1_3_TICKET_NONCE_LENGTH 32
418#endif
419
420#if !defined(MBEDTLS_SSL_TLS1_3_DEFAULT_NEW_SESSION_TICKETS)
421#define MBEDTLS_SSL_TLS1_3_DEFAULT_NEW_SESSION_TICKETS 1
422#endif
423
426/*
427 * Default to standard CID mode
428 */
429#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID) && \
430 !defined(MBEDTLS_SSL_DTLS_CONNECTION_ID_COMPAT)
431#define MBEDTLS_SSL_DTLS_CONNECTION_ID_COMPAT 0
432#endif
433
434/*
435 * Length of the verify data for secure renegotiation
436 */
437#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 12
438
439/*
440 * Signaling ciphersuite values (SCSV)
441 */
442#define MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO 0xFF
444/*
445 * Supported Signature and Hash algorithms (For TLS 1.2)
446 * RFC 5246 section 7.4.1.4.1
447 */
448#define MBEDTLS_SSL_HASH_NONE 0
449#define MBEDTLS_SSL_HASH_MD5 1
450#define MBEDTLS_SSL_HASH_SHA1 2
451#define MBEDTLS_SSL_HASH_SHA224 3
452#define MBEDTLS_SSL_HASH_SHA256 4
453#define MBEDTLS_SSL_HASH_SHA384 5
454#define MBEDTLS_SSL_HASH_SHA512 6
455
456#define MBEDTLS_SSL_SIG_ANON 0
457#define MBEDTLS_SSL_SIG_RSA 1
458#define MBEDTLS_SSL_SIG_ECDSA 3
459
460/*
461 * TLS 1.3 signature algorithms
462 * RFC 8446, Section 4.2.2
463 */
464
465/* RSASSA-PKCS1-v1_5 algorithms */
466#define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA256 0x0401
467#define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA384 0x0501
468#define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA512 0x0601
469
470/* ECDSA algorithms */
471#define MBEDTLS_TLS1_3_SIG_ECDSA_SECP256R1_SHA256 0x0403
472#define MBEDTLS_TLS1_3_SIG_ECDSA_SECP384R1_SHA384 0x0503
473#define MBEDTLS_TLS1_3_SIG_ECDSA_SECP521R1_SHA512 0x0603
474
475/* RSASSA-PSS algorithms with public key OID rsaEncryption */
476#define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA256 0x0804
477#define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA384 0x0805
478#define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA512 0x0806
479
480/* EdDSA algorithms */
481#define MBEDTLS_TLS1_3_SIG_ED25519 0x0807
482#define MBEDTLS_TLS1_3_SIG_ED448 0x0808
483
484/* RSASSA-PSS algorithms with public key OID RSASSA-PSS */
485#define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA256 0x0809
486#define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA384 0x080A
487#define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA512 0x080B
488
489/* LEGACY ALGORITHMS */
490#define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA1 0x0201
491#define MBEDTLS_TLS1_3_SIG_ECDSA_SHA1 0x0203
492
493#define MBEDTLS_TLS1_3_SIG_NONE 0x0
494
495/*
496 * Client Certificate Types
497 * RFC 5246 section 7.4.4 plus RFC 4492 section 5.5
498 */
499#define MBEDTLS_SSL_CERT_TYPE_RSA_SIGN 1
500#define MBEDTLS_SSL_CERT_TYPE_ECDSA_SIGN 64
501
502/*
503 * Message, alert and handshake types
504 */
505#define MBEDTLS_SSL_MSG_CHANGE_CIPHER_SPEC 20
506#define MBEDTLS_SSL_MSG_ALERT 21
507#define MBEDTLS_SSL_MSG_HANDSHAKE 22
508#define MBEDTLS_SSL_MSG_APPLICATION_DATA 23
509#define MBEDTLS_SSL_MSG_CID 25
510
511#define MBEDTLS_SSL_ALERT_LEVEL_WARNING 1
512#define MBEDTLS_SSL_ALERT_LEVEL_FATAL 2
513
514#define MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY 0 /* 0x00 */
515#define MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE 10 /* 0x0A */
516#define MBEDTLS_SSL_ALERT_MSG_BAD_RECORD_MAC 20 /* 0x14 */
517#define MBEDTLS_SSL_ALERT_MSG_DECRYPTION_FAILED 21 /* 0x15 */
518#define MBEDTLS_SSL_ALERT_MSG_RECORD_OVERFLOW 22 /* 0x16 */
519#define MBEDTLS_SSL_ALERT_MSG_DECOMPRESSION_FAILURE 30 /* 0x1E */
520#define MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE 40 /* 0x28 */
521#define MBEDTLS_SSL_ALERT_MSG_NO_CERT 41 /* 0x29 */
522#define MBEDTLS_SSL_ALERT_MSG_BAD_CERT 42 /* 0x2A */
523#define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT 43 /* 0x2B */
524#define MBEDTLS_SSL_ALERT_MSG_CERT_REVOKED 44 /* 0x2C */
525#define MBEDTLS_SSL_ALERT_MSG_CERT_EXPIRED 45 /* 0x2D */
526#define MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN 46 /* 0x2E */
527#define MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER 47 /* 0x2F */
528#define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA 48 /* 0x30 */
529#define MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED 49 /* 0x31 */
530#define MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR 50 /* 0x32 */
531#define MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR 51 /* 0x33 */
532#define MBEDTLS_SSL_ALERT_MSG_EXPORT_RESTRICTION 60 /* 0x3C */
533#define MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION 70 /* 0x46 */
534#define MBEDTLS_SSL_ALERT_MSG_INSUFFICIENT_SECURITY 71 /* 0x47 */
535#define MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR 80 /* 0x50 */
536#define MBEDTLS_SSL_ALERT_MSG_INAPROPRIATE_FALLBACK 86 /* 0x56 */
537#define MBEDTLS_SSL_ALERT_MSG_USER_CANCELED 90 /* 0x5A */
538#define MBEDTLS_SSL_ALERT_MSG_NO_RENEGOTIATION 100 /* 0x64 */
539#define MBEDTLS_SSL_ALERT_MSG_MISSING_EXTENSION 109 /* 0x6d -- new in TLS 1.3 */
540#define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT 110 /* 0x6E */
541#define MBEDTLS_SSL_ALERT_MSG_UNRECOGNIZED_NAME 112 /* 0x70 */
542#define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_PSK_IDENTITY 115 /* 0x73 */
543#define MBEDTLS_SSL_ALERT_MSG_CERT_REQUIRED 116 /* 0x74 */
544#define MBEDTLS_SSL_ALERT_MSG_NO_APPLICATION_PROTOCOL 120 /* 0x78 */
545
546#define MBEDTLS_SSL_HS_HELLO_REQUEST 0
547#define MBEDTLS_SSL_HS_CLIENT_HELLO 1
548#define MBEDTLS_SSL_HS_SERVER_HELLO 2
549#define MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST 3
550#define MBEDTLS_SSL_HS_NEW_SESSION_TICKET 4
551#define MBEDTLS_SSL_HS_END_OF_EARLY_DATA 5
552#define MBEDTLS_SSL_HS_ENCRYPTED_EXTENSIONS 8
553#define MBEDTLS_SSL_HS_CERTIFICATE 11
554#define MBEDTLS_SSL_HS_SERVER_KEY_EXCHANGE 12
555#define MBEDTLS_SSL_HS_CERTIFICATE_REQUEST 13
556#define MBEDTLS_SSL_HS_SERVER_HELLO_DONE 14
557#define MBEDTLS_SSL_HS_CERTIFICATE_VERIFY 15
558#define MBEDTLS_SSL_HS_CLIENT_KEY_EXCHANGE 16
559#define MBEDTLS_SSL_HS_FINISHED 20
560#define MBEDTLS_SSL_HS_MESSAGE_HASH 254
561
562/*
563 * TLS extensions
564 */
565#define MBEDTLS_TLS_EXT_SERVERNAME 0
566#define MBEDTLS_TLS_EXT_SERVERNAME_HOSTNAME 0
567
568#define MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH 1
569
570#define MBEDTLS_TLS_EXT_TRUNCATED_HMAC 4
571#define MBEDTLS_TLS_EXT_STATUS_REQUEST 5 /* RFC 6066 TLS 1.2 and 1.3 */
572
573#define MBEDTLS_TLS_EXT_SUPPORTED_ELLIPTIC_CURVES 10
574#define MBEDTLS_TLS_EXT_SUPPORTED_GROUPS 10 /* RFC 8422,7919 TLS 1.2 and 1.3 */
575#define MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS 11
576
577#define MBEDTLS_TLS_EXT_SIG_ALG 13 /* RFC 8446 TLS 1.3 */
578#define MBEDTLS_TLS_EXT_USE_SRTP 14
579#define MBEDTLS_TLS_EXT_HEARTBEAT 15 /* RFC 6520 TLS 1.2 and 1.3 */
580#define MBEDTLS_TLS_EXT_ALPN 16
581
582#define MBEDTLS_TLS_EXT_SCT 18 /* RFC 6962 TLS 1.2 and 1.3 */
583#define MBEDTLS_TLS_EXT_CLI_CERT_TYPE 19 /* RFC 7250 TLS 1.2 and 1.3 */
584#define MBEDTLS_TLS_EXT_SERV_CERT_TYPE 20 /* RFC 7250 TLS 1.2 and 1.3 */
585#define MBEDTLS_TLS_EXT_PADDING 21 /* RFC 7685 TLS 1.2 and 1.3 */
586#define MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC 22 /* 0x16 */
587#define MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET 0x0017 /* 23 */
588
589#define MBEDTLS_TLS_EXT_RECORD_SIZE_LIMIT 28 /* RFC 8449 (implemented for TLS 1.3 only) */
590
591#define MBEDTLS_TLS_EXT_SESSION_TICKET 35
592
593#define MBEDTLS_TLS_EXT_PRE_SHARED_KEY 41 /* RFC 8446 TLS 1.3 */
594#define MBEDTLS_TLS_EXT_EARLY_DATA 42 /* RFC 8446 TLS 1.3 */
595#define MBEDTLS_TLS_EXT_SUPPORTED_VERSIONS 43 /* RFC 8446 TLS 1.3 */
596#define MBEDTLS_TLS_EXT_COOKIE 44 /* RFC 8446 TLS 1.3 */
597#define MBEDTLS_TLS_EXT_PSK_KEY_EXCHANGE_MODES 45 /* RFC 8446 TLS 1.3 */
598
599#define MBEDTLS_TLS_EXT_CERT_AUTH 47 /* RFC 8446 TLS 1.3 */
600#define MBEDTLS_TLS_EXT_OID_FILTERS 48 /* RFC 8446 TLS 1.3 */
601#define MBEDTLS_TLS_EXT_POST_HANDSHAKE_AUTH 49 /* RFC 8446 TLS 1.3 */
602#define MBEDTLS_TLS_EXT_SIG_ALG_CERT 50 /* RFC 8446 TLS 1.3 */
603#define MBEDTLS_TLS_EXT_KEY_SHARE 51 /* RFC 8446 TLS 1.3 */
604
605#if MBEDTLS_SSL_DTLS_CONNECTION_ID_COMPAT == 0
606#define MBEDTLS_TLS_EXT_CID 54 /* RFC 9146 DTLS 1.2 CID */
607#else
608#define MBEDTLS_TLS_EXT_CID 254 /* Pre-RFC 9146 DTLS 1.2 CID */
609#endif
610
611#define MBEDTLS_TLS_EXT_ECJPAKE_KKPP 256 /* experimental */
612
613#define MBEDTLS_TLS_EXT_RENEGOTIATION_INFO 0xFF01
614
615/*
616 * Size defines
617 */
618#if !defined(MBEDTLS_PSK_MAX_LEN)
619/*
620 * If the library supports TLS 1.3 tickets and the cipher suite
621 * TLS1-3-AES-256-GCM-SHA384, set the PSK maximum length to 48 instead of 32.
622 * That way, the TLS 1.3 client and server are able to resume sessions where
623 * the cipher suite is TLS1-3-AES-256-GCM-SHA384 (pre-shared keys are 48
624 * bytes long in that case).
625 */
626#if defined(MBEDTLS_SSL_PROTO_TLS1_3) && \
627 defined(MBEDTLS_SSL_SESSION_TICKETS) && \
628 defined(MBEDTLS_AES_C) && defined(MBEDTLS_GCM_C) && \
629 defined(MBEDTLS_MD_CAN_SHA384)
630#define MBEDTLS_PSK_MAX_LEN 48 /* 384 bits */
631#else
632#define MBEDTLS_PSK_MAX_LEN 32 /* 256 bits */
633#endif
634#endif /* !MBEDTLS_PSK_MAX_LEN */
635
636/* Dummy type used only for its size */
638 unsigned char dummy; /* Make the union non-empty even with SSL disabled */
639#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)
640 unsigned char _pms_rsa[48]; /* RFC 5246 8.1.1 */
641#endif
642#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)
643 unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]; /* RFC 5246 8.1.2 */
644#endif
645#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
646 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
647 defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
648 defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
649 unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]; /* RFC 4492 5.10 */
650#endif
651#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
652 unsigned char _pms_psk[4 + 2 * MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 2 */
653#endif
654#if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
656 + MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 3 */
657#endif
658#if defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)
659 unsigned char _pms_rsa_psk[52 + MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 4 */
660#endif
661#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
663 + MBEDTLS_PSK_MAX_LEN]; /* RFC 5489 2 */
664#endif
665#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
666 unsigned char _pms_ecjpake[32]; /* Thread spec: SHA-256 output */
667#endif
668};
669
670#define MBEDTLS_PREMASTER_SIZE sizeof(union mbedtls_ssl_premaster_secret)
671
672#define MBEDTLS_TLS1_3_MD_MAX_SIZE PSA_HASH_MAX_SIZE
673
674
675/* Length in number of bytes of the TLS sequence number */
676#define MBEDTLS_SSL_SEQUENCE_NUMBER_LEN 8
677
678#ifdef __cplusplus
679extern "C" {
680#endif
681
682/*
683 * SSL state machine
684 */
685typedef enum {
702
717}
719
737typedef int mbedtls_ssl_send_t(void *ctx,
738 const unsigned char *buf,
739 size_t len);
740
761typedef int mbedtls_ssl_recv_t(void *ctx,
762 unsigned char *buf,
763 size_t len);
764
787typedef int mbedtls_ssl_recv_timeout_t(void *ctx,
788 unsigned char *buf,
789 size_t len,
790 uint32_t timeout);
813typedef void mbedtls_ssl_set_timer_t(void *ctx,
814 uint32_t int_ms,
815 uint32_t fin_ms);
816
828typedef int mbedtls_ssl_get_timer_t(void *ctx);
829
830/* Defined below */
834
835/* Defined in library/ssl_misc.h */
839#if defined(MBEDTLS_X509_CRT_PARSE_C)
841#endif
842#if defined(MBEDTLS_SSL_PROTO_DTLS)
844#endif
845
846#if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS)
847#define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_RESUMPTION \
848 MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK /* 1U << 0 */
849#define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_EPHEMERAL_RESUMPTION \
850 MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL /* 1U << 2 */
851#define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA (1U << 3)
852
853#define MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK \
854 (MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_RESUMPTION | \
855 MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_EPHEMERAL_RESUMPTION | \
856 MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA)
857#endif /* MBEDTLS_SSL_PROTO_TLS1_3 && MBEDTLS_SSL_SESSION_TICKETS */
858
882typedef int mbedtls_ssl_cache_get_t(void *data,
883 unsigned char const *session_id,
884 size_t session_id_len,
885 mbedtls_ssl_session *session);
904typedef int mbedtls_ssl_cache_set_t(void *data,
905 unsigned char const *session_id,
906 size_t session_id_len,
907 const mbedtls_ssl_session *session);
908
909#if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
910#if defined(MBEDTLS_X509_CRT_PARSE_C)
982typedef int mbedtls_ssl_async_sign_t(mbedtls_ssl_context *ssl,
983 mbedtls_x509_crt *cert,
984 mbedtls_md_type_t md_alg,
985 const unsigned char *hash,
986 size_t hash_len);
987
1048typedef int mbedtls_ssl_async_decrypt_t(mbedtls_ssl_context *ssl,
1049 mbedtls_x509_crt *cert,
1050 const unsigned char *input,
1051 size_t input_len);
1052#endif /* MBEDTLS_X509_CRT_PARSE_C */
1053
1096typedef int mbedtls_ssl_async_resume_t(mbedtls_ssl_context *ssl,
1097 unsigned char *output,
1098 size_t *output_len,
1099 size_t output_size);
1100
1118typedef void mbedtls_ssl_async_cancel_t(mbedtls_ssl_context *ssl);
1119#endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
1120
1121#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
1122 !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
1123#define MBEDTLS_SSL_PEER_CERT_DIGEST_MAX_LEN 48
1124#if defined(MBEDTLS_MD_CAN_SHA256)
1125#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA256
1126#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 32
1127#elif defined(MBEDTLS_MD_CAN_SHA384)
1128#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA384
1129#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 48
1130#elif defined(MBEDTLS_MD_CAN_SHA1)
1131#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA1
1132#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 20
1133#else
1134/* This is already checked in check_config.h, but be sure. */
1135#error "Bad configuration - need SHA-1, SHA-256 or SHA-512 enabled to compute digest of peer CRT."
1136#endif
1137#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED &&
1138 !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1139
1140typedef struct {
1141 unsigned char client_application_traffic_secret_N[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1142 unsigned char server_application_traffic_secret_N[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1143 unsigned char exporter_master_secret[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1144 unsigned char resumption_master_secret[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1146
1147#if defined(MBEDTLS_SSL_DTLS_SRTP)
1148
1149#define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH 255
1150#define MBEDTLS_TLS_SRTP_MAX_PROFILE_LIST_LENGTH 4
1151/*
1152 * For code readability use a typedef for DTLS-SRTP profiles
1153 *
1154 * Use_srtp extension protection profiles values as defined in
1155 * http://www.iana.org/assignments/srtp-protection/srtp-protection.xhtml
1156 *
1157 * Reminder: if this list is expanded mbedtls_ssl_check_srtp_profile_value
1158 * must be updated too.
1159 */
1160#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80 ((uint16_t) 0x0001)
1161#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32 ((uint16_t) 0x0002)
1162#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80 ((uint16_t) 0x0005)
1163#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32 ((uint16_t) 0x0006)
1164/* This one is not iana defined, but for code readability. */
1165#define MBEDTLS_TLS_SRTP_UNSET ((uint16_t) 0x0000)
1166
1168
1173 uint16_t MBEDTLS_PRIVATE(mki_len);
1176}
1178
1179#endif /* MBEDTLS_SSL_DTLS_SRTP */
1180
1182typedef enum {
1187
1188/*
1189 * This structure is used for storing current session data.
1190 *
1191 * Note: when changing this definition, we need to check and update:
1192 * - in tests/suites/test_suite_ssl.function:
1193 * ssl_populate_session() and ssl_serialize_session_save_load()
1194 * - in library/ssl_tls.c:
1195 * mbedtls_ssl_session_init() and mbedtls_ssl_session_free()
1196 * mbedtls_ssl_session_save() and ssl_session_load()
1197 * ssl_session_copy()
1198 */
1200#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1201 unsigned char MBEDTLS_PRIVATE(mfl_code);
1202#endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
1203
1204 unsigned char MBEDTLS_PRIVATE(exported);
1205
1210
1211#if defined(MBEDTLS_HAVE_TIME)
1213#endif
1214 int MBEDTLS_PRIVATE(ciphersuite);
1215 size_t MBEDTLS_PRIVATE(id_len);
1216 unsigned char MBEDTLS_PRIVATE(id)[32];
1217 unsigned char MBEDTLS_PRIVATE(master)[48];
1219#if defined(MBEDTLS_X509_CRT_PARSE_C)
1220#if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
1222#else /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1225 unsigned char *MBEDTLS_PRIVATE(peer_cert_digest);
1226 size_t MBEDTLS_PRIVATE(peer_cert_digest_len);
1227 mbedtls_md_type_t MBEDTLS_PRIVATE(peer_cert_digest_type);
1228#endif /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1229#endif /* MBEDTLS_X509_CRT_PARSE_C */
1230 uint32_t MBEDTLS_PRIVATE(verify_result);
1232#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
1233 unsigned char *MBEDTLS_PRIVATE(ticket);
1234 size_t MBEDTLS_PRIVATE(ticket_len);
1235 uint32_t MBEDTLS_PRIVATE(ticket_lifetime);
1236#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_CLI_C */
1237
1238#if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS)
1239 uint8_t MBEDTLS_PRIVATE(endpoint);
1240 uint8_t MBEDTLS_PRIVATE(ticket_flags);
1241 uint32_t MBEDTLS_PRIVATE(ticket_age_add);
1242 uint8_t MBEDTLS_PRIVATE(resumption_key_len);
1243 unsigned char MBEDTLS_PRIVATE(resumption_key)[MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN];
1244
1245#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION) && defined(MBEDTLS_SSL_CLI_C)
1246 char *MBEDTLS_PRIVATE(hostname);
1247#endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION && MBEDTLS_SSL_CLI_C */
1248
1249#if defined(MBEDTLS_HAVE_TIME) && defined(MBEDTLS_SSL_CLI_C)
1250 mbedtls_time_t MBEDTLS_PRIVATE(ticket_received);
1251#endif /* MBEDTLS_HAVE_TIME && MBEDTLS_SSL_CLI_C */
1252
1253#endif /* MBEDTLS_SSL_PROTO_TLS1_3 && MBEDTLS_SSL_SESSION_TICKETS */
1254
1255#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1256 int MBEDTLS_PRIVATE(encrypt_then_mac);
1257#endif
1258
1259#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1261#endif
1262};
1263
1264/*
1265 * Identifiers for PRFs used in various versions of TLS.
1266 */
1267typedef enum {
1275
1276typedef enum {
1278#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1279 MBEDTLS_SSL_KEY_EXPORT_TLS1_3_CLIENT_EARLY_SECRET,
1280 MBEDTLS_SSL_KEY_EXPORT_TLS1_3_EARLY_EXPORTER_SECRET,
1281 MBEDTLS_SSL_KEY_EXPORT_TLS1_3_CLIENT_HANDSHAKE_TRAFFIC_SECRET,
1282 MBEDTLS_SSL_KEY_EXPORT_TLS1_3_SERVER_HANDSHAKE_TRAFFIC_SECRET,
1283 MBEDTLS_SSL_KEY_EXPORT_TLS1_3_CLIENT_APPLICATION_TRAFFIC_SECRET,
1284 MBEDTLS_SSL_KEY_EXPORT_TLS1_3_SERVER_APPLICATION_TRAFFIC_SECRET,
1285#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1287
1303typedef void mbedtls_ssl_export_keys_t(void *p_expkey,
1305 const unsigned char *secret,
1306 size_t secret_len,
1307 const unsigned char client_random[32],
1308 const unsigned char server_random[32],
1309 mbedtls_tls_prf_types tls_prf_type);
1310
1311#if defined(MBEDTLS_SSL_SRV_C)
1328#endif
1329
1330/* A type for storing user data in a library structure.
1331 *
1332 * The representation of type may change in future versions of the library.
1333 * Only the behaviors guaranteed by documented accessor functions are
1334 * guaranteed to remain stable.
1335 */
1336typedef union {
1337 uintptr_t n; /* typically a handle to an associated object */
1338 void *p; /* typically a pointer to extra data */
1340
1345 /* Group items mostly by size. This helps to reduce memory wasted to
1346 * padding. It also helps to keep smaller fields early in the structure,
1347 * so that elements tend to be in the 128-element direct access window
1348 * on Arm Thumb, which reduces the code size. */
1349
1353 /*
1354 * Flags (could be bit-fields to save RAM, but separate bytes make
1355 * the code smaller on architectures with an instruction for direct
1356 * byte access).
1357 */
1358
1359 uint8_t MBEDTLS_PRIVATE(endpoint);
1360 uint8_t MBEDTLS_PRIVATE(transport);
1361 uint8_t MBEDTLS_PRIVATE(authmode);
1362 /* needed even with renego disabled for LEGACY_BREAK_HANDSHAKE */
1363 uint8_t MBEDTLS_PRIVATE(allow_legacy_renegotiation);
1364#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1365 uint8_t MBEDTLS_PRIVATE(mfl_code);
1367#endif
1368#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1369 uint8_t MBEDTLS_PRIVATE(encrypt_then_mac);
1370#endif
1371#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
1372 uint8_t MBEDTLS_PRIVATE(extended_ms);
1373#endif
1374#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1375 uint8_t MBEDTLS_PRIVATE(anti_replay);
1376#endif
1377#if defined(MBEDTLS_SSL_RENEGOTIATION)
1378 uint8_t MBEDTLS_PRIVATE(disable_renegotiation);
1379#endif
1380#if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
1381 defined(MBEDTLS_SSL_CLI_C)
1382 uint8_t MBEDTLS_PRIVATE(session_tickets);
1383#endif
1384
1385#if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
1386 defined(MBEDTLS_SSL_SRV_C) && \
1387 defined(MBEDTLS_SSL_PROTO_TLS1_3)
1388 uint16_t MBEDTLS_PRIVATE(new_session_tickets_count);
1389#endif
1390
1391#if defined(MBEDTLS_SSL_SRV_C)
1392 uint8_t MBEDTLS_PRIVATE(cert_req_ca_list);
1394 uint8_t MBEDTLS_PRIVATE(respect_cli_pref);
1397#endif
1398#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1399 uint8_t MBEDTLS_PRIVATE(ignore_unexpected_cid);
1402#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1403#if defined(MBEDTLS_SSL_DTLS_SRTP)
1404 uint8_t MBEDTLS_PRIVATE(dtls_srtp_mki_support); /* support having mki_value
1405 in the use_srtp extension? */
1406#endif
1407
1408 /*
1409 * Pointers
1410 */
1411
1413 const int *MBEDTLS_PRIVATE(ciphersuite_list);
1414
1415#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1417 int MBEDTLS_PRIVATE(tls13_kex_modes);
1418#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1419
1421 void(*MBEDTLS_PRIVATE(f_dbg))(void *, int, const char *, int, const char *);
1422 void *MBEDTLS_PRIVATE(p_dbg);
1425 int(*MBEDTLS_PRIVATE(f_rng))(void *, unsigned char *, size_t);
1426 void *MBEDTLS_PRIVATE(p_rng);
1432 void *MBEDTLS_PRIVATE(p_cache);
1434#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
1436 int(*MBEDTLS_PRIVATE(f_sni))(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
1437 void *MBEDTLS_PRIVATE(p_sni);
1438#endif
1439
1440#if defined(MBEDTLS_X509_CRT_PARSE_C)
1442 int(*MBEDTLS_PRIVATE(f_vrfy))(void *, mbedtls_x509_crt *, int, uint32_t *);
1443 void *MBEDTLS_PRIVATE(p_vrfy);
1444#endif
1445
1446#if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED)
1447#if defined(MBEDTLS_SSL_SRV_C)
1449 int(*MBEDTLS_PRIVATE(f_psk))(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
1450 void *MBEDTLS_PRIVATE(p_psk);
1451#endif
1452#endif
1453
1454#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1456 int(*MBEDTLS_PRIVATE(f_cookie_write))(void *, unsigned char **, unsigned char *,
1457 const unsigned char *, size_t);
1459 int(*MBEDTLS_PRIVATE(f_cookie_check))(void *, const unsigned char *, size_t,
1460 const unsigned char *, size_t);
1461 void *MBEDTLS_PRIVATE(p_cookie);
1462#endif
1463
1464#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
1466 int(*MBEDTLS_PRIVATE(f_ticket_write))(void *, const mbedtls_ssl_session *,
1467 unsigned char *, const unsigned char *, size_t *,
1468 uint32_t *);
1470 int(*MBEDTLS_PRIVATE(f_ticket_parse))(void *, mbedtls_ssl_session *, unsigned char *, size_t);
1471 void *MBEDTLS_PRIVATE(p_ticket);
1472#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
1473#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1474 size_t MBEDTLS_PRIVATE(cid_len);
1475#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1476
1477#if defined(MBEDTLS_X509_CRT_PARSE_C)
1482#if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
1484 void *MBEDTLS_PRIVATE(p_ca_cb);
1485#endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
1486#endif /* MBEDTLS_X509_CRT_PARSE_C */
1487
1488#if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
1489#if defined(MBEDTLS_X509_CRT_PARSE_C)
1490 mbedtls_ssl_async_sign_t *MBEDTLS_PRIVATE(f_async_sign_start);
1491 mbedtls_ssl_async_decrypt_t *MBEDTLS_PRIVATE(f_async_decrypt_start);
1492#endif /* MBEDTLS_X509_CRT_PARSE_C */
1493 mbedtls_ssl_async_resume_t *MBEDTLS_PRIVATE(f_async_resume);
1494 mbedtls_ssl_async_cancel_t *MBEDTLS_PRIVATE(f_async_cancel);
1495 void *MBEDTLS_PRIVATE(p_async_config_data);
1496#endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
1497
1498#if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
1499
1500#if !defined(MBEDTLS_DEPRECATED_REMOVED)
1501 const int *MBEDTLS_PRIVATE(sig_hashes);
1502#endif
1503 const uint16_t *MBEDTLS_PRIVATE(sig_algs);
1504#endif /* MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
1505
1506#if defined(MBEDTLS_ECP_C) && !defined(MBEDTLS_DEPRECATED_REMOVED)
1508#endif
1509
1510 const uint16_t *MBEDTLS_PRIVATE(group_list);
1512#if defined(MBEDTLS_DHM_C)
1515#endif
1516
1517#if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED)
1518
1519#if defined(MBEDTLS_USE_PSA_CRYPTO)
1526#endif /* MBEDTLS_USE_PSA_CRYPTO */
1527 unsigned char *MBEDTLS_PRIVATE(psk);
1531 size_t MBEDTLS_PRIVATE(psk_len);
1537 unsigned char *MBEDTLS_PRIVATE(psk_identity);
1542 size_t MBEDTLS_PRIVATE(psk_identity_len);
1548#endif /* MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED */
1549
1550#if defined(MBEDTLS_SSL_EARLY_DATA)
1551 int MBEDTLS_PRIVATE(early_data_enabled);
1555#if defined(MBEDTLS_SSL_SRV_C)
1556 /* The maximum amount of 0-RTT data. RFC 8446 section 4.6.1 */
1557 uint32_t MBEDTLS_PRIVATE(max_early_data_size);
1558#endif /* MBEDTLS_SSL_SRV_C */
1559
1560#endif /* MBEDTLS_SSL_EARLY_DATA */
1561
1562#if defined(MBEDTLS_SSL_ALPN)
1563 const char **MBEDTLS_PRIVATE(alpn_list);
1564#endif
1565
1566#if defined(MBEDTLS_SSL_DTLS_SRTP)
1568 const mbedtls_ssl_srtp_profile *MBEDTLS_PRIVATE(dtls_srtp_profile_list);
1570 size_t MBEDTLS_PRIVATE(dtls_srtp_profile_list_len);
1571#endif /* MBEDTLS_SSL_DTLS_SRTP */
1572
1573 /*
1574 * Numerical settings (int)
1575 */
1576
1577 uint32_t MBEDTLS_PRIVATE(read_timeout);
1579#if defined(MBEDTLS_SSL_PROTO_DTLS)
1580 uint32_t MBEDTLS_PRIVATE(hs_timeout_min);
1582 uint32_t MBEDTLS_PRIVATE(hs_timeout_max);
1584#endif
1585
1586#if defined(MBEDTLS_SSL_RENEGOTIATION)
1587 int MBEDTLS_PRIVATE(renego_max_records);
1588 unsigned char MBEDTLS_PRIVATE(renego_period)[8];
1590#endif
1591
1592 unsigned int MBEDTLS_PRIVATE(badmac_limit);
1594#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
1595 unsigned int MBEDTLS_PRIVATE(dhm_min_bitlen);
1596#endif
1597
1604
1605#if defined(MBEDTLS_SSL_SRV_C)
1607#endif /* MBEDTLS_SSL_SRV_C */
1608
1609#if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
1611#endif
1612};
1613
1617 /*
1618 * Miscellaneous
1619 */
1620 int MBEDTLS_PRIVATE(state);
1621#if defined(MBEDTLS_SSL_RENEGOTIATION)
1622 int MBEDTLS_PRIVATE(renego_status);
1623 int MBEDTLS_PRIVATE(renego_records_seen);
1626#endif /* MBEDTLS_SSL_RENEGOTIATION */
1627
1645
1646 unsigned MBEDTLS_PRIVATE(badmac_seen);
1648#if defined(MBEDTLS_X509_CRT_PARSE_C)
1650 int(*MBEDTLS_PRIVATE(f_vrfy))(void *, mbedtls_x509_crt *, int, uint32_t *);
1651 void *MBEDTLS_PRIVATE(p_vrfy);
1652#endif
1653
1659 void *MBEDTLS_PRIVATE(p_bio);
1661 /*
1662 * Session layer
1663 */
1672 /*
1673 * Record layer transformations
1674 */
1684#if defined(MBEDTLS_SSL_PROTO_TLS1_2)
1688#endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
1689
1690#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1693 mbedtls_ssl_transform *MBEDTLS_PRIVATE(transform_application);
1694#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1695
1696 /*
1697 * Timers
1698 */
1699 void *MBEDTLS_PRIVATE(p_timer);
1704 /*
1705 * Record layer (incoming data)
1706 */
1707 unsigned char *MBEDTLS_PRIVATE(in_buf);
1708 unsigned char *MBEDTLS_PRIVATE(in_ctr);
1711 unsigned char *MBEDTLS_PRIVATE(in_hdr);
1712#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1713 unsigned char *MBEDTLS_PRIVATE(in_cid);
1715#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1716 unsigned char *MBEDTLS_PRIVATE(in_len);
1717 unsigned char *MBEDTLS_PRIVATE(in_iv);
1718 unsigned char *MBEDTLS_PRIVATE(in_msg);
1719 unsigned char *MBEDTLS_PRIVATE(in_offt);
1721 int MBEDTLS_PRIVATE(in_msgtype);
1722 size_t MBEDTLS_PRIVATE(in_msglen);
1723 size_t MBEDTLS_PRIVATE(in_left);
1724#if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1725 size_t MBEDTLS_PRIVATE(in_buf_len);
1726#endif
1727#if defined(MBEDTLS_SSL_PROTO_DTLS)
1728 uint16_t MBEDTLS_PRIVATE(in_epoch);
1729 size_t MBEDTLS_PRIVATE(next_record_offset);
1731#endif /* MBEDTLS_SSL_PROTO_DTLS */
1732#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1733 uint64_t MBEDTLS_PRIVATE(in_window_top);
1734 uint64_t MBEDTLS_PRIVATE(in_window);
1735#endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
1736
1737 size_t MBEDTLS_PRIVATE(in_hslen);
1739 int MBEDTLS_PRIVATE(nb_zero);
1741 int MBEDTLS_PRIVATE(keep_current_message);
1744 /* The following three variables indicate if and, if yes,
1745 * what kind of alert is pending to be sent.
1746 */
1747 unsigned char MBEDTLS_PRIVATE(send_alert);
1751 unsigned char MBEDTLS_PRIVATE(alert_type);
1753 int MBEDTLS_PRIVATE(alert_reason);
1757#if defined(MBEDTLS_SSL_PROTO_DTLS)
1758 uint8_t MBEDTLS_PRIVATE(disable_datagram_packing);
1760#endif /* MBEDTLS_SSL_PROTO_DTLS */
1761
1762 /*
1763 * Record layer (outgoing data)
1764 */
1765 unsigned char *MBEDTLS_PRIVATE(out_buf);
1766 unsigned char *MBEDTLS_PRIVATE(out_ctr);
1767 unsigned char *MBEDTLS_PRIVATE(out_hdr);
1768#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1769 unsigned char *MBEDTLS_PRIVATE(out_cid);
1771#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1772 unsigned char *MBEDTLS_PRIVATE(out_len);
1773 unsigned char *MBEDTLS_PRIVATE(out_iv);
1774 unsigned char *MBEDTLS_PRIVATE(out_msg);
1776 int MBEDTLS_PRIVATE(out_msgtype);
1777 size_t MBEDTLS_PRIVATE(out_msglen);
1778 size_t MBEDTLS_PRIVATE(out_left);
1779#if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1780 size_t MBEDTLS_PRIVATE(out_buf_len);
1781#endif
1782
1785#if defined(MBEDTLS_SSL_PROTO_DTLS)
1786 uint16_t MBEDTLS_PRIVATE(mtu);
1787#endif /* MBEDTLS_SSL_PROTO_DTLS */
1788
1789 /*
1790 * User settings
1791 */
1792#if defined(MBEDTLS_X509_CRT_PARSE_C)
1793 char *MBEDTLS_PRIVATE(hostname);
1795#endif /* MBEDTLS_X509_CRT_PARSE_C */
1796
1797#if defined(MBEDTLS_SSL_ALPN)
1798 const char *MBEDTLS_PRIVATE(alpn_chosen);
1799#endif /* MBEDTLS_SSL_ALPN */
1800
1801#if defined(MBEDTLS_SSL_DTLS_SRTP)
1802 /*
1803 * use_srtp extension
1804 */
1806#endif /* MBEDTLS_SSL_DTLS_SRTP */
1807
1808 /*
1809 * Information for DTLS hello verify
1810 */
1811#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1812 unsigned char *MBEDTLS_PRIVATE(cli_id);
1813 size_t MBEDTLS_PRIVATE(cli_id_len);
1814#endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
1815
1816 /*
1817 * Secure renegotiation
1818 */
1819 /* needed to know when to send extension on server */
1820 int MBEDTLS_PRIVATE(secure_renegotiation);
1822#if defined(MBEDTLS_SSL_RENEGOTIATION)
1823 size_t MBEDTLS_PRIVATE(verify_data_len);
1826#endif /* MBEDTLS_SSL_RENEGOTIATION */
1827
1828#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1829 /* CID configuration to use in subsequent handshakes. */
1830
1836 uint8_t MBEDTLS_PRIVATE(own_cid_len);
1837 uint8_t MBEDTLS_PRIVATE(negotiate_cid);
1841#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1842
1843#if defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_CLI_C)
1844 int MBEDTLS_PRIVATE(early_data_status);
1845#endif /* MBEDTLS_SSL_EARLY_DATA && MBEDTLS_SSL_CLI_C */
1846
1849 void *MBEDTLS_PRIVATE(p_export_keys);
1861};
1862
1871const char *mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id);
1872
1881int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name);
1882
1891
1917 const mbedtls_ssl_config *conf);
1918
1929
1937
1947{
1948 return conf->MBEDTLS_PRIVATE(endpoint);
1949}
1950
1966
1994
1995#if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_EARLY_DATA)
2015void mbedtls_ssl_tls13_conf_early_data(mbedtls_ssl_config *conf,
2016 int early_data_enabled);
2017
2018#if defined(MBEDTLS_SSL_SRV_C)
2042void mbedtls_ssl_tls13_conf_max_early_data_size(
2043 mbedtls_ssl_config *conf, uint32_t max_early_data_size);
2044#endif /* MBEDTLS_SSL_SRV_C */
2045
2046#endif /* MBEDTLS_SSL_PROTO_TLS1_3 && MBEDTLS_SSL_EARLY_DATA */
2047
2048#if defined(MBEDTLS_X509_CRT_PARSE_C)
2065 int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
2066 void *p_vrfy);
2067#endif /* MBEDTLS_X509_CRT_PARSE_C */
2068
2077 int (*f_rng)(void *, unsigned char *, size_t),
2078 void *p_rng);
2079
2095 void (*f_dbg)(void *, int, const char *, int, const char *),
2096 void *p_dbg);
2097
2109 const mbedtls_ssl_context *ssl)
2110{
2111 return ssl->MBEDTLS_PRIVATE(conf);
2112}
2113
2145 void *p_bio,
2146 mbedtls_ssl_send_t *f_send,
2147 mbedtls_ssl_recv_t *f_recv,
2148 mbedtls_ssl_recv_timeout_t *f_recv_timeout);
2149
2150#if defined(MBEDTLS_SSL_PROTO_DTLS)
2151
2152#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
2153
2154
2240 int enable,
2241 unsigned char const *own_cid,
2242 size_t own_cid_len);
2243
2274 int *enabled,
2275 unsigned char own_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX],
2276 size_t *own_cid_len);
2277
2316 int *enabled,
2317 unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX],
2318 size_t *peer_cid_len);
2319
2320#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
2321
2362#endif /* MBEDTLS_SSL_PROTO_DTLS */
2363
2364#if defined(MBEDTLS_X509_CRT_PARSE_C)
2384 int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
2385 void *p_vrfy);
2386#endif /* MBEDTLS_X509_CRT_PARSE_C */
2387
2405
2451 unsigned char *buf,
2452 size_t buflen);
2453
2475 void *p_timer,
2476 mbedtls_ssl_set_timer_t *f_set_timer,
2477 mbedtls_ssl_get_timer_t *f_get_timer);
2478
2479#if defined(MBEDTLS_SSL_SRV_C)
2491 mbedtls_ssl_hs_cb_t f_cert_cb)
2492{
2493 conf->MBEDTLS_PRIVATE(f_cert_cb) = f_cert_cb;
2494}
2495#endif /* MBEDTLS_SSL_SRV_C */
2496
2516typedef int mbedtls_ssl_ticket_write_t(void *p_ticket,
2517 const mbedtls_ssl_session *session,
2518 unsigned char *start,
2519 const unsigned char *end,
2520 size_t *tlen,
2521 uint32_t *lifetime);
2522
2546typedef int mbedtls_ssl_ticket_parse_t(void *p_ticket,
2547 mbedtls_ssl_session *session,
2548 unsigned char *buf,
2549 size_t len);
2550
2551#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
2567 mbedtls_ssl_ticket_write_t *f_ticket_write,
2568 mbedtls_ssl_ticket_parse_t *f_ticket_parse,
2569 void *p_ticket);
2570#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
2571
2591 mbedtls_ssl_export_keys_t *f_export_keys,
2592 void *p_export_keys);
2593
2605 mbedtls_ssl_config *conf,
2606 void *p)
2607{
2608 conf->MBEDTLS_PRIVATE(user_data).p = p;
2609}
2610
2619 mbedtls_ssl_config *conf,
2620 uintptr_t n)
2621{
2622 conf->MBEDTLS_PRIVATE(user_data).n = n;
2623}
2624
2636 mbedtls_ssl_config *conf)
2637{
2638 return conf->MBEDTLS_PRIVATE(user_data).p;
2639}
2640
2651static inline uintptr_t mbedtls_ssl_conf_get_user_data_n(
2652 mbedtls_ssl_config *conf)
2653{
2654 return conf->MBEDTLS_PRIVATE(user_data).n;
2655}
2656
2669 void *p)
2670{
2671 ssl->MBEDTLS_PRIVATE(user_data).p = p;
2672}
2673
2683 uintptr_t n)
2684{
2685 ssl->MBEDTLS_PRIVATE(user_data).n = n;
2686}
2687
2700{
2701 return ssl->MBEDTLS_PRIVATE(user_data).p;
2702}
2703
2714static inline uintptr_t mbedtls_ssl_get_user_data_n(
2716{
2717 return ssl->MBEDTLS_PRIVATE(user_data).n;
2718}
2719
2720#if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
2751void mbedtls_ssl_conf_async_private_cb(mbedtls_ssl_config *conf,
2752 mbedtls_ssl_async_sign_t *f_async_sign,
2753 mbedtls_ssl_async_decrypt_t *f_async_decrypt,
2754 mbedtls_ssl_async_resume_t *f_async_resume,
2755 mbedtls_ssl_async_cancel_t *f_async_cancel,
2756 void *config_data);
2757
2766void *mbedtls_ssl_conf_get_async_config_data(const mbedtls_ssl_config *conf);
2767
2782void *mbedtls_ssl_get_async_operation_data(const mbedtls_ssl_context *ssl);
2783
2795void mbedtls_ssl_set_async_operation_data(mbedtls_ssl_context *ssl,
2796 void *ctx);
2797#endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
2798
2813typedef int mbedtls_ssl_cookie_write_t(void *ctx,
2814 unsigned char **p, unsigned char *end,
2815 const unsigned char *info, size_t ilen);
2816
2830typedef int mbedtls_ssl_cookie_check_t(void *ctx,
2831 const unsigned char *cookie, size_t clen,
2832 const unsigned char *info, size_t ilen);
2833
2834#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
2864 mbedtls_ssl_cookie_write_t *f_cookie_write,
2865 mbedtls_ssl_cookie_check_t *f_cookie_check,
2866 void *p_cookie);
2867
2888 const unsigned char *info,
2889 size_t ilen);
2890
2891#endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
2892
2893#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
2910#endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
2911
2936
2937#if defined(MBEDTLS_SSL_PROTO_DTLS)
2938
2968 unsigned allow_packing);
2969
3001void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max);
3002#endif /* MBEDTLS_SSL_PROTO_DTLS */
3003
3004#if defined(MBEDTLS_SSL_SRV_C)
3043 void *p_cache,
3044 mbedtls_ssl_cache_get_t *f_get_cache,
3045 mbedtls_ssl_cache_set_t *f_set_cache);
3046#endif /* MBEDTLS_SSL_SRV_C */
3047
3048#if defined(MBEDTLS_SSL_CLI_C)
3095#endif /* MBEDTLS_SSL_CLI_C */
3096
3130 const unsigned char *buf,
3131 size_t len);
3132
3159 unsigned char *buf,
3160 size_t buf_len,
3161 size_t *olen);
3162
3205 const int *ciphersuites);
3206
3207#if defined(MBEDTLS_SSL_PROTO_TLS1_3)
3250void mbedtls_ssl_conf_tls13_key_exchange_modes(mbedtls_ssl_config *conf,
3251 const int kex_modes);
3252#endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
3253
3254#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
3255#define MBEDTLS_SSL_UNEXPECTED_CID_IGNORE 0
3256#define MBEDTLS_SSL_UNEXPECTED_CID_FAIL 1
3290 int ignore_other_cids);
3291#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
3292
3293#if defined(MBEDTLS_X509_CRT_PARSE_C)
3305 const mbedtls_x509_crt_profile *profile);
3306
3319 mbedtls_x509_crt *ca_chain,
3320 mbedtls_x509_crl *ca_crl);
3321
3322#if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
3334static inline
3336 const mbedtls_x509_crt *crt)
3337{
3338 conf->MBEDTLS_PRIVATE(dn_hints) = crt;
3339}
3340#endif /* MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
3341
3342#if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
3394void mbedtls_ssl_conf_ca_cb(mbedtls_ssl_config *conf,
3396 void *p_ca_cb);
3397#endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
3398
3436 mbedtls_x509_crt *own_cert,
3437 mbedtls_pk_context *pk_key);
3438#endif /* MBEDTLS_X509_CRT_PARSE_C */
3439
3440#if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED)
3474 const unsigned char *psk, size_t psk_len,
3475 const unsigned char *psk_identity, size_t psk_identity_len);
3476
3477#if defined(MBEDTLS_USE_PSA_CRYPTO)
3515int mbedtls_ssl_conf_psk_opaque(mbedtls_ssl_config *conf,
3517 const unsigned char *psk_identity,
3518 size_t psk_identity_len);
3519#endif /* MBEDTLS_USE_PSA_CRYPTO */
3520
3538 const unsigned char *psk, size_t psk_len);
3539
3540#if defined(MBEDTLS_USE_PSA_CRYPTO)
3561int mbedtls_ssl_set_hs_psk_opaque(mbedtls_ssl_context *ssl,
3563#endif /* MBEDTLS_USE_PSA_CRYPTO */
3564
3565#if defined(MBEDTLS_SSL_SRV_C)
3605 int (*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *,
3606 size_t),
3607 void *p_psk);
3608#endif /* MBEDTLS_SSL_SRV_C */
3609#endif /* MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED */
3610
3611#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_SRV_C)
3626 const unsigned char *dhm_P, size_t P_len,
3627 const unsigned char *dhm_G, size_t G_len);
3628
3639#endif /* MBEDTLS_DHM_C && defined(MBEDTLS_SSL_SRV_C) */
3640
3641#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
3651 unsigned int bitlen);
3652#endif /* MBEDTLS_DHM_C && MBEDTLS_SSL_CLI_C */
3653
3654#if defined(MBEDTLS_ECP_C)
3655#if !defined(MBEDTLS_DEPRECATED_REMOVED)
3698 const mbedtls_ecp_group_id *curves);
3699#endif /* MBEDTLS_DEPRECATED_REMOVED */
3700#endif /* MBEDTLS_ECP_C */
3701
3740 const uint16_t *groups);
3741
3742#if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
3743#if !defined(MBEDTLS_DEPRECATED_REMOVED) && defined(MBEDTLS_SSL_PROTO_TLS1_2)
3774 const int *hashes);
3775#endif /* !MBEDTLS_DEPRECATED_REMOVED && MBEDTLS_SSL_PROTO_TLS1_2 */
3776
3787 const uint16_t *sig_algs);
3788#endif /* MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
3789
3790#if defined(MBEDTLS_X509_CRT_PARSE_C)
3809int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname);
3810
3821static inline const char *mbedtls_ssl_get_hostname(mbedtls_ssl_context *ssl)
3822{
3823 return ssl->MBEDTLS_PRIVATE(hostname);
3824}
3825#endif /* MBEDTLS_X509_CRT_PARSE_C */
3826
3827#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
3847 size_t *name_len);
3848
3865 mbedtls_x509_crt *own_cert,
3866 mbedtls_pk_context *pk_key);
3867
3880 mbedtls_x509_crt *ca_chain,
3881 mbedtls_x509_crl *ca_crl);
3882
3883#if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
3895 const mbedtls_x509_crt *crt);
3896#endif /* MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
3897
3909 int authmode);
3910
3934 int (*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *,
3935 size_t),
3936 void *p_sni);
3937#endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION */
3938
3939#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
3958int mbedtls_ssl_set_hs_ecjpake_password(mbedtls_ssl_context *ssl,
3959 const unsigned char *pw,
3960 size_t pw_len);
3961
3976int mbedtls_ssl_set_hs_ecjpake_password_opaque(mbedtls_ssl_context *ssl,
3978#endif /*MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
3979
3980#if defined(MBEDTLS_SSL_ALPN)
3994
4005#endif /* MBEDTLS_SSL_ALPN */
4006
4007#if defined(MBEDTLS_SSL_DTLS_SRTP)
4008#if defined(MBEDTLS_DEBUG_C)
4010{
4011 switch (profile) {
4013 return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80";
4015 return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32";
4017 return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80";
4019 return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32";
4020 default: break;
4021 }
4022 return "";
4023}
4024#endif /* MBEDTLS_DEBUG_C */
4039 int support_mki_value);
4040
4061 (mbedtls_ssl_config *conf,
4062 const mbedtls_ssl_srtp_profile *profiles);
4063
4081 unsigned char *mki_value,
4082 uint16_t mki_len);
4102 mbedtls_dtls_srtp_info *dtls_srtp_info);
4103#endif /* MBEDTLS_SSL_DTLS_SRTP */
4104
4105#if !defined(MBEDTLS_DEPRECATED_REMOVED)
4124 int minor);
4125#endif /* MBEDTLS_DEPRECATED_REMOVED */
4126
4140 mbedtls_ssl_protocol_version tls_version)
4141{
4142 conf->MBEDTLS_PRIVATE(max_tls_version) = tls_version;
4143}
4144
4145#if !defined(MBEDTLS_DEPRECATED_REMOVED)
4181 int minor);
4182#endif /* MBEDTLS_DEPRECATED_REMOVED */
4183
4197 mbedtls_ssl_protocol_version tls_version)
4198{
4199 conf->MBEDTLS_PRIVATE(min_tls_version) = tls_version;
4200}
4201
4202#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
4215#endif /* MBEDTLS_SSL_ENCRYPT_THEN_MAC */
4216
4217#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
4230#endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */
4231
4232#if defined(MBEDTLS_SSL_SRV_C)
4243 char cert_req_ca_list);
4244#endif /* MBEDTLS_SSL_SRV_C */
4245
4246#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
4281int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code);
4282#endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
4283
4284#if defined(MBEDTLS_SSL_SRV_C)
4295#endif /* MBEDTLS_SSL_SRV_C */
4296
4297#if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
4298 defined(MBEDTLS_SSL_CLI_C)
4310#endif /* MBEDTLS_SSL_SESSION_TICKETS &&
4311 MBEDTLS_SSL_CLI_C */
4312
4313#if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
4314 defined(MBEDTLS_SSL_SRV_C) && \
4315 defined(MBEDTLS_SSL_PROTO_TLS1_3)
4333void mbedtls_ssl_conf_new_session_tickets(mbedtls_ssl_config *conf,
4334 uint16_t num_tickets);
4335#endif /* MBEDTLS_SSL_SESSION_TICKETS &&
4336 MBEDTLS_SSL_SRV_C &&
4337 MBEDTLS_SSL_PROTO_TLS1_3*/
4338
4339#if defined(MBEDTLS_SSL_RENEGOTIATION)
4358#endif /* MBEDTLS_SSL_RENEGOTIATION */
4359
4388
4389#if defined(MBEDTLS_SSL_RENEGOTIATION)
4428
4455 const unsigned char period[8]);
4456#endif /* MBEDTLS_SSL_RENEGOTIATION */
4457
4497
4514
4528
4537
4546
4547
4560 const mbedtls_ssl_context *ssl)
4561{
4562 return ssl->MBEDTLS_PRIVATE(tls_version);
4563}
4564
4573
4583
4610
4630
4631#if defined(MBEDTLS_X509_CRT_PARSE_C)
4663#endif /* MBEDTLS_X509_CRT_PARSE_C */
4664
4665#if defined(MBEDTLS_SSL_CLI_C)
4701 mbedtls_ssl_session *session);
4702#endif /* MBEDTLS_SSL_CLI_C */
4703
4760
4773{
4774 return ssl->MBEDTLS_PRIVATE(state) >= MBEDTLS_SSL_HANDSHAKE_OVER;
4775}
4776
4811
4812#if defined(MBEDTLS_SSL_RENEGOTIATION)
4837#endif /* MBEDTLS_SSL_RENEGOTIATION */
4838
4916int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len);
4917
4978int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len);
4979
4997 unsigned char level,
4998 unsigned char message);
5013
5014#if defined(MBEDTLS_SSL_EARLY_DATA)
5015
5016#if defined(MBEDTLS_SSL_SRV_C)
5061int mbedtls_ssl_read_early_data(mbedtls_ssl_context *ssl,
5062 unsigned char *buf, size_t len);
5063#endif /* MBEDTLS_SSL_SRV_C */
5064
5065#if defined(MBEDTLS_SSL_CLI_C)
5122int mbedtls_ssl_write_early_data(mbedtls_ssl_context *ssl,
5123 const unsigned char *buf, size_t len);
5124
5125#define MBEDTLS_SSL_EARLY_DATA_STATUS_NOT_SENT 0
5126#define MBEDTLS_SSL_EARLY_DATA_STATUS_ACCEPTED 1
5127#define MBEDTLS_SSL_EARLY_DATA_STATUS_REJECTED 2
5154int mbedtls_ssl_get_early_data_status(mbedtls_ssl_context *ssl);
5155#endif /* MBEDTLS_SSL_CLI_C */
5156
5157#endif /* MBEDTLS_SSL_EARLY_DATA */
5158
5165
5166#if defined(MBEDTLS_SSL_CONTEXT_SERIALIZATION)
5224 unsigned char *buf,
5225 size_t buf_len,
5226 size_t *olen);
5227
5297 const unsigned char *buf,
5298 size_t len);
5299#endif /* MBEDTLS_SSL_CONTEXT_SERIALIZATION */
5300
5312
5329 int endpoint, int transport, int preset);
5330
5337
5344
5355
5372 const unsigned char *secret, size_t slen,
5373 const char *label,
5374 const unsigned char *random, size_t rlen,
5375 unsigned char *dstbuf, size_t dlen);
5376
5377#ifdef __cplusplus
5378}
5379#endif
5380
5381#endif /* ssl.h */
Multi-precision integer library.
#define MBEDTLS_MPI_MAX_SIZE
Definition: bignum.h:85
Platform Security Architecture cryptography module.
This file contains Diffie-Hellman-Merkle (DHM) key exchange definitions and functions.
This file contains ECDH definitions and functions.
This file provides an API for Elliptic Curves over GF(P) (ECP).
#define MBEDTLS_ECP_MAX_BYTES
Definition: ecp.h:365
mbedtls_ecp_group_id
Definition: ecp.h:113
psa_key_id_t mbedtls_svc_key_id_t
Definition: crypto_types.h:297
int(* mbedtls_x509_crt_ca_cb_t)(void *p_ctx, mbedtls_x509_crt const *child, mbedtls_x509_crt **candidate_cas)
The type of trusted certificate callbacks.
Definition: x509_crt.h:796
Build-time configuration info.
This file contains the generic functions for message-digest (hashing) and HMAC.
mbedtls_md_type_t
Supported message digests.
Definition: md.h:173
Mbed TLS Platform time abstraction.
time_t mbedtls_time_t
Definition: platform_time.h:39
Common and shared functions used by multiple modules in the Mbed TLS library.
#define MBEDTLS_DEPRECATED
Definition: platform_util.h:45
Macro wrapper for struct's members.
#define MBEDTLS_PRIVATE(member)
static const char * mbedtls_ssl_get_hostname(mbedtls_ssl_context *ssl)
Get the hostname that checked against the received server certificate. It is used to set the ServerNa...
Definition: ssl.h:3821
void mbedtls_ssl_conf_cert_req_ca_list(mbedtls_ssl_config *conf, char cert_req_ca_list)
Whether to send a list of acceptable CAs in CertificateRequest messages. (Default: do send)
#define MBEDTLS_PSK_MAX_LEN
Definition: ssl.h:632
void mbedtls_ssl_set_hs_dn_hints(mbedtls_ssl_context *ssl, const mbedtls_x509_crt *crt)
Set DN hints sent to client in CertificateRequest message.
const mbedtls_x509_crt * mbedtls_ssl_get_peer_cert(const mbedtls_ssl_context *ssl)
Return the peer certificate from the current connection.
void mbedtls_ssl_conf_read_timeout(mbedtls_ssl_config *conf, uint32_t timeout)
Set the timeout period for mbedtls_ssl_read() (Default: no timeout.)
int mbedtls_ssl_cache_get_t(void *data, unsigned char const *session_id, size_t session_id_len, mbedtls_ssl_session *session)
Callback type: server-side session cache getter.
Definition: ssl.h:882
int mbedtls_ssl_ticket_write_t(void *p_ticket, const mbedtls_ssl_session *session, unsigned char *start, const unsigned char *end, size_t *tlen, uint32_t *lifetime)
Callback type: generate and write session ticket.
Definition: ssl.h:2516
void mbedtls_ssl_conf_extended_master_secret(mbedtls_ssl_config *conf, char ems)
Enable or disable Extended Master Secret negotiation. (Default: MBEDTLS_SSL_EXTENDED_MS_ENABLED)
void mbedtls_ssl_set_mtu(mbedtls_ssl_context *ssl, uint16_t mtu)
Set the Maximum Transport Unit (MTU). Special value: 0 means unset (no limit). This represents the ma...
int mbedtls_ssl_set_client_transport_id(mbedtls_ssl_context *ssl, const unsigned char *info, size_t ilen)
Set client's transport-level identification info. (Server only. DTLS only.)
void mbedtls_ssl_conf_renegotiation_period(mbedtls_ssl_config *conf, const unsigned char period[8])
Set record counter threshold for periodic renegotiation. (Default: 2^48 - 1)
#define MBEDTLS_SSL_CID_OUT_LEN_MAX
Definition: ssl.h:401
void mbedtls_ssl_conf_legacy_renegotiation(mbedtls_ssl_config *conf, int allow_legacy)
Prevent or allow legacy renegotiation. (Default: MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION)
void mbedtls_ssl_conf_psk_cb(mbedtls_ssl_config *conf, int(*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_psk)
Set the PSK callback (server-side only).
void mbedtls_ssl_export_keys_t(void *p_expkey, mbedtls_ssl_key_export_type type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type)
Callback type: Export key alongside random values for session identification, and PRF for implementat...
Definition: ssl.h:1303
int mbedtls_ssl_conf_psk(mbedtls_ssl_config *conf, const unsigned char *psk, size_t psk_len, const unsigned char *psk_identity, size_t psk_identity_len)
Configure pre-shared keys (PSKs) and their identities to be used in PSK-based ciphersuites.
int mbedtls_ssl_session_save(const mbedtls_ssl_session *session, unsigned char *buf, size_t buf_len, size_t *olen)
Save session structure as serialized data in a buffer. On client, this can be used for saving session...
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_sig_hashes(mbedtls_ssl_config *conf, const int *hashes)
Set the allowed hashes for signatures during the handshake.
static void * mbedtls_ssl_conf_get_user_data_p(mbedtls_ssl_config *conf)
Retrieve the user data in an SSL configuration as a pointer.
Definition: ssl.h:2635
int mbedtls_ssl_session_reset(mbedtls_ssl_context *ssl)
Reset an already initialized SSL context for re-use while retaining application-set variables,...
static uintptr_t mbedtls_ssl_get_user_data_n(mbedtls_ssl_context *ssl)
Retrieve the user data in an SSL context as an integer.
Definition: ssl.h:2714
static void mbedtls_ssl_conf_set_user_data_n(mbedtls_ssl_config *conf, uintptr_t n)
Set the user data in an SSL configuration to an integer.
Definition: ssl.h:2618
int mbedtls_ssl_check_record(mbedtls_ssl_context const *ssl, unsigned char *buf, size_t buflen)
Check whether a buffer contains a valid and authentic record that has not been seen before....
const char * mbedtls_ssl_get_alpn_protocol(const mbedtls_ssl_context *ssl)
Get the name of the negotiated Application Layer Protocol. This function should be called after the h...
struct mbedtls_ssl_transform mbedtls_ssl_transform
Definition: ssl.h:836
void mbedtls_ssl_conf_renegotiation_enforced(mbedtls_ssl_config *conf, int max_records)
Enforce renegotiation requests. (Default: enforced, max_records = 16)
void mbedtls_ssl_free(mbedtls_ssl_context *ssl)
Free referenced items in an SSL context and clear memory.
void mbedtls_ssl_conf_transport(mbedtls_ssl_config *conf, int transport)
Set the transport type (TLS or DTLS). Default: TLS.
int mbedtls_ssl_get_own_cid(mbedtls_ssl_context *ssl, int *enabled, unsigned char own_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX], size_t *own_cid_len)
Get information about our request for usage of the CID extension in the current connection.
#define MBEDTLS_SSL_CID_IN_LEN_MAX
Definition: ssl.h:397
void mbedtls_ssl_set_timer_cb(mbedtls_ssl_context *ssl, void *p_timer, mbedtls_ssl_set_timer_t *f_set_timer, mbedtls_ssl_get_timer_t *f_get_timer)
Set the timer callbacks (Mandatory for DTLS.)
void mbedtls_ssl_set_hs_ca_chain(mbedtls_ssl_context *ssl, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate for the current handshake.
const unsigned char * mbedtls_ssl_get_hs_sni(mbedtls_ssl_context *ssl, size_t *name_len)
Retrieve SNI extension value for the current handshake. Available in f_cert_cb of mbedtls_ssl_conf_ce...
mbedtls_tls_prf_types
Definition: ssl.h:1267
@ MBEDTLS_SSL_TLS_PRF_SHA384
Definition: ssl.h:1269
@ MBEDTLS_SSL_HKDF_EXPAND_SHA256
Definition: ssl.h:1272
@ MBEDTLS_SSL_TLS_PRF_SHA256
Definition: ssl.h:1270
@ MBEDTLS_SSL_TLS_PRF_NONE
Definition: ssl.h:1268
@ MBEDTLS_SSL_HKDF_EXPAND_SHA384
Definition: ssl.h:1271
int mbedtls_ssl_send_t(void *ctx, const unsigned char *buf, size_t len)
Callback type: send data on the network.
Definition: ssl.h:737
void mbedtls_ssl_conf_sni(mbedtls_ssl_config *conf, int(*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_sni)
Set server side ServerName TLS extension callback (optional, server-side only).
mbedtls_ssl_states
Definition: ssl.h:685
@ MBEDTLS_SSL_CERTIFICATE_VERIFY
Definition: ssl.h:695
@ MBEDTLS_SSL_HANDSHAKE_OVER
Definition: ssl.h:714
@ MBEDTLS_SSL_SERVER_HELLO_DONE
Definition: ssl.h:692
@ MBEDTLS_SSL_END_OF_EARLY_DATA
Definition: ssl.h:707
@ MBEDTLS_SSL_NEW_SESSION_TICKET
Definition: ssl.h:703
@ MBEDTLS_SSL_SERVER_FINISHED
Definition: ssl.h:699
@ MBEDTLS_SSL_SERVER_KEY_EXCHANGE
Definition: ssl.h:690
@ MBEDTLS_SSL_ENCRYPTED_EXTENSIONS
Definition: ssl.h:706
@ MBEDTLS_SSL_SERVER_HELLO
Definition: ssl.h:688
@ MBEDTLS_SSL_SERVER_CCS_AFTER_HELLO_RETRY_REQUEST
Definition: ssl.h:713
@ MBEDTLS_SSL_CLIENT_KEY_EXCHANGE
Definition: ssl.h:694
@ MBEDTLS_SSL_CLIENT_CCS_BEFORE_2ND_CLIENT_HELLO
Definition: ssl.h:710
@ MBEDTLS_SSL_CLIENT_HELLO
Definition: ssl.h:687
@ MBEDTLS_SSL_SERVER_CERTIFICATE
Definition: ssl.h:689
@ MBEDTLS_SSL_CERTIFICATE_REQUEST
Definition: ssl.h:691
@ MBEDTLS_SSL_CLIENT_FINISHED
Definition: ssl.h:697
@ MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC
Definition: ssl.h:698
@ MBEDTLS_SSL_SERVER_HELLO_VERIFY_REQUEST_SENT
Definition: ssl.h:704
@ MBEDTLS_SSL_HANDSHAKE_WRAPUP
Definition: ssl.h:701
@ MBEDTLS_SSL_CLIENT_CCS_AFTER_SERVER_FINISHED
Definition: ssl.h:709
@ MBEDTLS_SSL_CLIENT_CHANGE_CIPHER_SPEC
Definition: ssl.h:696
@ MBEDTLS_SSL_CLIENT_CERTIFICATE_VERIFY
Definition: ssl.h:708
@ MBEDTLS_SSL_HELLO_REQUEST
Definition: ssl.h:686
@ MBEDTLS_SSL_CLIENT_CERTIFICATE
Definition: ssl.h:693
@ MBEDTLS_SSL_TLS1_3_NEW_SESSION_TICKET_FLUSH
Definition: ssl.h:716
@ MBEDTLS_SSL_FLUSH_BUFFERS
Definition: ssl.h:700
@ MBEDTLS_SSL_CLIENT_CCS_AFTER_CLIENT_HELLO
Definition: ssl.h:712
@ MBEDTLS_SSL_TLS1_3_NEW_SESSION_TICKET
Definition: ssl.h:715
@ MBEDTLS_SSL_HELLO_RETRY_REQUEST
Definition: ssl.h:705
@ MBEDTLS_SSL_SERVER_CCS_AFTER_SERVER_HELLO
Definition: ssl.h:711
void mbedtls_ssl_set_verify(mbedtls_ssl_context *ssl, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set a connection-specific verification callback (optional).
void mbedtls_ssl_conf_endpoint(mbedtls_ssl_config *conf, int endpoint)
Set the current endpoint type.
#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80
Definition: ssl.h:1162
#define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH
Definition: ssl.h:1149
int(* mbedtls_ssl_hs_cb_t)(mbedtls_ssl_context *ssl)
Callback type: generic handshake callback.
Definition: ssl.h:1327
int mbedtls_ssl_check_pending(const mbedtls_ssl_context *ssl)
Check if there is data already read from the underlying transport but not yet processed.
mbedtls_ssl_protocol_version
Definition: ssl.h:1182
@ MBEDTLS_SSL_VERSION_TLS1_2
Definition: ssl.h:1184
@ MBEDTLS_SSL_VERSION_TLS1_3
Definition: ssl.h:1185
@ MBEDTLS_SSL_VERSION_UNKNOWN
Definition: ssl.h:1183
int mbedtls_ssl_send_alert_message(mbedtls_ssl_context *ssl, unsigned char level, unsigned char message)
Send an alert message.
const char * mbedtls_ssl_get_version(const mbedtls_ssl_context *ssl)
Return the current TLS version.
static int mbedtls_ssl_is_handshake_over(mbedtls_ssl_context *ssl)
After calling mbedtls_ssl_handshake() to start the SSL handshake you can call this function to check ...
Definition: ssl.h:4772
int mbedtls_ssl_conf_dh_param_bin(mbedtls_ssl_config *conf, const unsigned char *dhm_P, size_t P_len, const unsigned char *dhm_G, size_t G_len)
Set the Diffie-Hellman public P and G values from big-endian binary presentations....
#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32
Definition: ssl.h:1163
void mbedtls_ssl_conf_rng(mbedtls_ssl_config *conf, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Set the random number generator callback.
void mbedtls_ssl_conf_dtls_anti_replay(mbedtls_ssl_config *conf, char mode)
Enable or disable anti-replay protection for DTLS. (DTLS only, no effect on TLS.) Default: enabled.
int mbedtls_ssl_ticket_parse_t(void *p_ticket, mbedtls_ssl_session *session, unsigned char *buf, size_t len)
Callback type: parse and load session ticket.
Definition: ssl.h:2546
int mbedtls_ssl_renegotiate(mbedtls_ssl_context *ssl)
Initiate an SSL renegotiation on the running connection. Client: perform the renegotiation right now....
static void mbedtls_ssl_conf_cert_cb(mbedtls_ssl_config *conf, mbedtls_ssl_hs_cb_t f_cert_cb)
Set the certificate selection callback (server-side only).
Definition: ssl.h:2490
int mbedtls_ssl_handshake(mbedtls_ssl_context *ssl)
Perform the SSL handshake.
int mbedtls_ssl_conf_own_cert(mbedtls_ssl_config *conf, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate chain and private key.
struct mbedtls_ssl_sig_hash_set_t mbedtls_ssl_sig_hash_set_t
Definition: ssl.h:838
int mbedtls_ssl_set_hs_psk(mbedtls_ssl_context *ssl, const unsigned char *psk, size_t psk_len)
Set the pre-shared Key (PSK) for the current handshake.
uint32_t mbedtls_ssl_get_verify_result(const mbedtls_ssl_context *ssl)
Return the result of the certificate verification.
#define MBEDTLS_SSL_SEQUENCE_NUMBER_LEN
Definition: ssl.h:676
mbedtls_ssl_key_export_type
Definition: ssl.h:1276
@ MBEDTLS_SSL_KEY_EXPORT_TLS12_MASTER_SECRET
Definition: ssl.h:1277
int mbedtls_ssl_session_load(mbedtls_ssl_session *session, const unsigned char *buf, size_t len)
Load serialized session data into a session structure. On client, this can be used for loading saved ...
int mbedtls_ssl_cookie_write_t(void *ctx, unsigned char **p, unsigned char *end, const unsigned char *info, size_t ilen)
Callback type: generate a cookie.
Definition: ssl.h:2813
static mbedtls_ssl_protocol_version mbedtls_ssl_get_version_number(const mbedtls_ssl_context *ssl)
Return the (D)TLS protocol version negotiated in the given connection.
Definition: ssl.h:4559
void mbedtls_ssl_conf_authmode(mbedtls_ssl_config *conf, int authmode)
Set the certificate verification mode Default: NONE on server, REQUIRED on client.
void mbedtls_ssl_conf_dtls_cookies(mbedtls_ssl_config *conf, mbedtls_ssl_cookie_write_t *f_cookie_write, mbedtls_ssl_cookie_check_t *f_cookie_check, void *p_cookie)
Register callbacks for DTLS cookies (Server only. DTLS only.)
int mbedtls_ssl_get_max_out_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum outgoing record payload in bytes.
int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Try to write exactly 'len' application data bytes.
struct mbedtls_ssl_handshake_params mbedtls_ssl_handshake_params
Definition: ssl.h:837
int mbedtls_ssl_get_max_in_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum incoming record payload in bytes.
void mbedtls_ssl_conf_preference_order(mbedtls_ssl_config *conf, int order)
Pick the ciphersuites order according to the second parameter in the SSL Server module (MBEDTLS_SSL_S...
int mbedtls_ssl_conf_dtls_srtp_protection_profiles(mbedtls_ssl_config *conf, const mbedtls_ssl_srtp_profile *profiles)
Set the supported DTLS-SRTP protection profiles.
void mbedtls_ssl_set_timer_t(void *ctx, uint32_t int_ms, uint32_t fin_ms)
Callback type: set a pair of timers/delays to watch.
Definition: ssl.h:813
void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max)
Set retransmit timeout values for the DTLS handshake. (DTLS only, no effect on TLS....
static const mbedtls_ssl_config * mbedtls_ssl_context_get_config(const mbedtls_ssl_context *ssl)
Return the SSL configuration structure associated with the given SSL context.
Definition: ssl.h:2108
void mbedtls_ssl_conf_srtp_mki_value_supported(mbedtls_ssl_config *conf, int support_mki_value)
Manage support for mki(master key id) value in use_srtp extension. MKI is an optional part of SRTP us...
void mbedtls_ssl_conf_sig_algs(mbedtls_ssl_config *conf, const uint16_t *sig_algs)
Configure allowed signature algorithms for use in TLS 1.3.
int mbedtls_ssl_recv_timeout_t(void *ctx, unsigned char *buf, size_t len, uint32_t timeout)
Callback type: receive data from the network, with timeout.
Definition: ssl.h:787
void mbedtls_ssl_get_dtls_srtp_negotiation_result(const mbedtls_ssl_context *ssl, mbedtls_dtls_srtp_info *dtls_srtp_info)
Get the negotiated DTLS-SRTP information: Protection profile and MKI value.
void mbedtls_ssl_conf_session_tickets_cb(mbedtls_ssl_config *conf, mbedtls_ssl_ticket_write_t *f_ticket_write, mbedtls_ssl_ticket_parse_t *f_ticket_parse, void *p_ticket)
Configure SSL session ticket callbacks (server only). (Default: none.)
void mbedtls_ssl_config_free(mbedtls_ssl_config *conf)
Free an SSL configuration context.
static void mbedtls_ssl_conf_dn_hints(mbedtls_ssl_config *conf, const mbedtls_x509_crt *crt)
Set DN hints sent to client in CertificateRequest message.
Definition: ssl.h:3335
void mbedtls_ssl_conf_cert_profile(mbedtls_ssl_config *conf, const mbedtls_x509_crt_profile *profile)
Set the X.509 security profile used for verification.
void mbedtls_ssl_session_init(mbedtls_ssl_session *session)
Initialize SSL session structure.
#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN
Definition: ssl.h:437
int mbedtls_ssl_get_peer_cid(mbedtls_ssl_context *ssl, int *enabled, unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX], size_t *peer_cid_len)
Get information about the use of the CID extension in the current connection.
int mbedtls_ssl_context_load(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Load serialized connection data to an SSL context.
void mbedtls_ssl_set_hs_authmode(mbedtls_ssl_context *ssl, int authmode)
Set authmode for the current handshake.
void mbedtls_ssl_set_datagram_packing(mbedtls_ssl_context *ssl, unsigned allow_packing)
Allow or disallow packing of multiple handshake records within a single datagram.
void mbedtls_ssl_init(mbedtls_ssl_context *ssl)
Initialize an SSL context Just makes the context ready for mbedtls_ssl_setup() or mbedtls_ssl_free()
void mbedtls_ssl_conf_ca_chain(mbedtls_ssl_config *conf, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate.
static uintptr_t mbedtls_ssl_conf_get_user_data_n(mbedtls_ssl_config *conf)
Retrieve the user data in an SSL configuration as an integer.
Definition: ssl.h:2651
int mbedtls_ssl_conf_cid(mbedtls_ssl_config *conf, size_t len, int ignore_other_cids)
Specify the length of Connection IDs for incoming encrypted DTLS records, as well as the behaviour on...
void mbedtls_ssl_set_bio(mbedtls_ssl_context *ssl, void *p_bio, mbedtls_ssl_send_t *f_send, mbedtls_ssl_recv_t *f_recv, mbedtls_ssl_recv_timeout_t *f_recv_timeout)
Set the underlying BIO callbacks for write, read and read-with-timeout.
const char * mbedtls_ssl_get_ciphersuite(const mbedtls_ssl_context *ssl)
Return the name of the current ciphersuite.
int mbedtls_ssl_set_session(mbedtls_ssl_context *ssl, const mbedtls_ssl_session *session)
Load a session for session resumption.
int mbedtls_ssl_get_record_expansion(const mbedtls_ssl_context *ssl)
Return the (maximum) number of bytes added by the record layer: header + encryption/MAC overhead (inc...
void mbedtls_ssl_conf_session_cache(mbedtls_ssl_config *conf, void *p_cache, mbedtls_ssl_cache_get_t *f_get_cache, mbedtls_ssl_cache_set_t *f_set_cache)
Set the session cache callbacks (server-side only) If not set, no session resuming is done (except if...
void mbedtls_ssl_conf_session_tickets(mbedtls_ssl_config *conf, int use_tickets)
Enable / Disable session tickets (client only). (Default: MBEDTLS_SSL_SESSION_TICKETS_ENABLED....
int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name)
Return the ID of the ciphersuite associated with the given name.
void mbedtls_ssl_conf_dtls_badmac_limit(mbedtls_ssl_config *conf, unsigned limit)
Set a limit on the number of records with a bad MAC before terminating the connection....
int mbedtls_ssl_cookie_check_t(void *ctx, const unsigned char *cookie, size_t clen, const unsigned char *info, size_t ilen)
Callback type: verify a cookie.
Definition: ssl.h:2830
void mbedtls_ssl_conf_dhm_min_bitlen(mbedtls_ssl_config *conf, unsigned int bitlen)
Set the minimum length for Diffie-Hellman parameters. (Client-side only.) (Default: 1024 bits....
int mbedtls_ssl_set_hs_own_cert(mbedtls_ssl_context *ssl, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate and key for the current handshake.
int mbedtls_ssl_config_defaults(mbedtls_ssl_config *conf, int endpoint, int transport, int preset)
Load reasonable default SSL configuration values. (You need to call mbedtls_ssl_config_init() first....
static const char * mbedtls_ssl_get_srtp_profile_as_string(mbedtls_ssl_srtp_profile profile)
Definition: ssl.h:4009
int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len)
Read at most 'len' application data bytes.
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_curves(mbedtls_ssl_config *conf, const mbedtls_ecp_group_id *curves)
Set the allowed curves in order of preference.
int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname)
Set or reset the hostname to check against the received server certificate. It sets the ServerName TL...
void mbedtls_ssl_conf_groups(mbedtls_ssl_config *conf, const uint16_t *groups)
Set the allowed groups in order of preference.
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_max_version(mbedtls_ssl_config *conf, int major, int minor)
Set the maximum supported version sent from the client side and/or accepted at the server side.
int mbedtls_ssl_handshake_step(mbedtls_ssl_context *ssl)
Perform a single step of the SSL handshake.
int mbedtls_ssl_cache_set_t(void *data, unsigned char const *session_id, size_t session_id_len, const mbedtls_ssl_session *session)
Callback type: server-side session cache setter.
Definition: ssl.h:904
void mbedtls_ssl_conf_renegotiation(mbedtls_ssl_config *conf, int renegotiation)
Enable / Disable renegotiation support for connection when initiated by peer (Default: MBEDTLS_SSL_RE...
struct mbedtls_dtls_srtp_info_t mbedtls_dtls_srtp_info
void mbedtls_ssl_conf_dbg(mbedtls_ssl_config *conf, void(*f_dbg)(void *, int, const char *, int, const char *), void *p_dbg)
Set the debug callback.
const char * mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id)
Return the name of the ciphersuite associated with the given ID.
#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32
Definition: ssl.h:1161
#define MBEDTLS_TLS1_3_MD_MAX_SIZE
Definition: ssl.h:672
void mbedtls_ssl_config_init(mbedtls_ssl_config *conf)
Initialize an SSL configuration context Just makes the context ready for mbedtls_ssl_config_defaults(...
static void mbedtls_ssl_conf_max_tls_version(mbedtls_ssl_config *conf, mbedtls_ssl_protocol_version tls_version)
Set the maximum supported version sent from the client side and/or accepted at the server side.
Definition: ssl.h:4139
int mbedtls_ssl_context_save(mbedtls_ssl_context *ssl, unsigned char *buf, size_t buf_len, size_t *olen)
Save an active connection as serialized data in a buffer. This allows the freeing or re-using of the ...
int mbedtls_ssl_tls_prf(const mbedtls_tls_prf_types prf, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen)
TLS-PRF function for key derivation.
struct mbedtls_ssl_flight_item mbedtls_ssl_flight_item
Definition: ssl.h:843
int mbedtls_ssl_recv_t(void *ctx, unsigned char *buf, size_t len)
Callback type: receive data from the network.
Definition: ssl.h:761
void mbedtls_ssl_session_free(mbedtls_ssl_session *session)
Free referenced items in an SSL session including the peer certificate and clear memory.
int mbedtls_ssl_close_notify(mbedtls_ssl_context *ssl)
Notify the peer that the connection is being closed.
int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code)
Set the maximum fragment length to emit and/or negotiate. (Typical: the smaller of MBEDTLS_SSL_IN_CON...
int mbedtls_ssl_dtls_srtp_set_mki_value(mbedtls_ssl_context *ssl, unsigned char *mki_value, uint16_t mki_len)
Set the mki_value for the current DTLS-SRTP session.
int mbedtls_ssl_get_ciphersuite_id_from_ssl(const mbedtls_ssl_context *ssl)
Return the id of the current ciphersuite.
void mbedtls_ssl_conf_ciphersuites(mbedtls_ssl_config *conf, const int *ciphersuites)
Set the list of allowed ciphersuites and the preference order. First in the list has the highest pref...
#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80
Definition: ssl.h:1160
size_t mbedtls_ssl_get_bytes_avail(const mbedtls_ssl_context *ssl)
Return the number of application data bytes remaining to be read from the current record.
uint16_t mbedtls_ssl_srtp_profile
Definition: ssl.h:1167
int mbedtls_ssl_get_session(const mbedtls_ssl_context *ssl, mbedtls_ssl_session *session)
Export a session in order to resume it later.
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_min_version(mbedtls_ssl_config *conf, int major, int minor)
Set the minimum accepted SSL/TLS protocol version.
static void mbedtls_ssl_conf_set_user_data_p(mbedtls_ssl_config *conf, void *p)
Set the user data in an SSL configuration to a pointer.
Definition: ssl.h:2604
static void * mbedtls_ssl_get_user_data_p(mbedtls_ssl_context *ssl)
Retrieve the user data in an SSL context as a pointer.
Definition: ssl.h:2698
int mbedtls_ssl_get_timer_t(void *ctx)
Callback type: get status of timers/delays.
Definition: ssl.h:828
int mbedtls_ssl_conf_alpn_protocols(mbedtls_ssl_config *conf, const char **protos)
Set the supported Application Layer Protocols.
static void mbedtls_ssl_set_user_data_n(mbedtls_ssl_context *ssl, uintptr_t n)
Set the user data in an SSL context to an integer.
Definition: ssl.h:2681
int mbedtls_ssl_conf_dh_param_ctx(mbedtls_ssl_config *conf, mbedtls_dhm_context *dhm_ctx)
Set the Diffie-Hellman public P and G values, read from existing context (server-side only)
static void mbedtls_ssl_conf_min_tls_version(mbedtls_ssl_config *conf, mbedtls_ssl_protocol_version tls_version)
Set the minimum supported version sent from the client side and/or accepted at the server side.
Definition: ssl.h:4196
struct mbedtls_ssl_key_cert mbedtls_ssl_key_cert
Definition: ssl.h:840
int mbedtls_ssl_setup(mbedtls_ssl_context *ssl, const mbedtls_ssl_config *conf)
Set up an SSL context for use.
static void mbedtls_ssl_set_user_data_p(mbedtls_ssl_context *ssl, void *p)
Set the user data in an SSL context to a pointer.
Definition: ssl.h:2667
static int mbedtls_ssl_conf_get_endpoint(const mbedtls_ssl_config *conf)
Get the current endpoint type.
Definition: ssl.h:1946
void mbedtls_ssl_conf_encrypt_then_mac(mbedtls_ssl_config *conf, char etm)
Enable or disable Encrypt-then-MAC (Default: MBEDTLS_SSL_ETM_ENABLED)
void mbedtls_ssl_conf_verify(mbedtls_ssl_config *conf, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set the verification callback (Optional).
void mbedtls_ssl_set_export_keys_cb(mbedtls_ssl_context *ssl, mbedtls_ssl_export_keys_t *f_export_keys, void *p_export_keys)
Configure a key export callback. (Default: none.)
int mbedtls_ssl_set_cid(mbedtls_ssl_context *ssl, int enable, unsigned char const *own_cid, size_t own_cid_len)
Configure the use of the Connection ID (CID) extension in the next handshake.
SSL Ciphersuites for Mbed TLS.
The DHM context structure.
Definition: dhm.h:113
MPI structure.
Definition: bignum.h:219
Public key container.
Definition: pk.h:239
unsigned char _pms_ecdhe_psk[4+MBEDTLS_ECP_MAX_BYTES+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:663
unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]
Definition: ssl.h:643
unsigned char _pms_psk[4+2 *MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:652
unsigned char _pms_rsa_psk[52+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:659
unsigned char dummy
Definition: ssl.h:638
unsigned char _pms_rsa[48]
Definition: ssl.h:640
unsigned char _pms_dhe_psk[4+MBEDTLS_MPI_MAX_SIZE+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:656
unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]
Definition: ssl.h:649
X.509 certificate revocation list parsing.
X.509 certificate parsing and writing.