mbed TLS v3.4.0
ssl.h
Go to the documentation of this file.
1 
6 /*
7  * Copyright The Mbed TLS Contributors
8  * SPDX-License-Identifier: Apache-2.0
9  *
10  * Licensed under the Apache License, Version 2.0 (the "License"); you may
11  * not use this file except in compliance with the License.
12  * You may obtain a copy of the License at
13  *
14  * http://www.apache.org/licenses/LICENSE-2.0
15  *
16  * Unless required by applicable law or agreed to in writing, software
17  * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
18  * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19  * See the License for the specific language governing permissions and
20  * limitations under the License.
21  */
22 #ifndef MBEDTLS_SSL_H
23 #define MBEDTLS_SSL_H
24 #include "mbedtls/platform_util.h"
25 #include "mbedtls/private_access.h"
26 
27 #include "mbedtls/build_info.h"
28 
29 #include "mbedtls/bignum.h"
30 #include "mbedtls/ecp.h"
31 
33 
34 #if defined(MBEDTLS_X509_CRT_PARSE_C)
35 #include "mbedtls/x509_crt.h"
36 #include "mbedtls/x509_crl.h"
37 #endif
38 
39 #if defined(MBEDTLS_DHM_C)
40 #include "mbedtls/dhm.h"
41 #endif
42 
43 /* Adding guard for MBEDTLS_ECDSA_C to ensure no compile errors due
44  * to guards in TLS code. There is a gap in functionality that access to
45  * ecdh_ctx structure is needed for MBEDTLS_ECDSA_C which does not seem correct.
46  */
47 #if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C)
48 #include "mbedtls/ecdh.h"
49 #endif
50 
51 #if defined(MBEDTLS_HAVE_TIME)
52 #include "mbedtls/platform_time.h"
53 #endif
54 
55 #include "psa/crypto.h"
56 
57 /*
58  * SSL Error codes
59  */
61 #define MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS -0x7000
62 
63 #define MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE -0x7080
64 
65 #define MBEDTLS_ERR_SSL_BAD_INPUT_DATA -0x7100
66 
67 #define MBEDTLS_ERR_SSL_INVALID_MAC -0x7180
68 
69 #define MBEDTLS_ERR_SSL_INVALID_RECORD -0x7200
70 
71 #define MBEDTLS_ERR_SSL_CONN_EOF -0x7280
72 
73 #define MBEDTLS_ERR_SSL_DECODE_ERROR -0x7300
74 /* Error space gap */
76 #define MBEDTLS_ERR_SSL_NO_RNG -0x7400
77 
78 #define MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE -0x7480
79 
80 #define MBEDTLS_ERR_SSL_UNSUPPORTED_EXTENSION -0x7500
81 
82 #define MBEDTLS_ERR_SSL_NO_APPLICATION_PROTOCOL -0x7580
83 
84 #define MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED -0x7600
85 
86 #define MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED -0x7680
87 
88 #define MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE -0x7700
89 
90 #define MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE -0x7780
91 
92 #define MBEDTLS_ERR_SSL_UNRECOGNIZED_NAME -0x7800
93 
94 #define MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY -0x7880
95 /* Error space gap */
96 /* Error space gap */
98 #define MBEDTLS_ERR_SSL_BAD_CERTIFICATE -0x7A00
99 /* Error space gap */
104 #define MBEDTLS_ERR_SSL_RECEIVED_NEW_SESSION_TICKET -0x7B00
105 
106 #define MBEDTLS_ERR_SSL_CANNOT_READ_EARLY_DATA -0x7B80
107 
108 #define MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA -0x7C00
109 /* Error space gap */
110 /* Error space gap */
111 /* Error space gap */
112 /* Error space gap */
113 /* Error space gap */
115 #define MBEDTLS_ERR_SSL_ALLOC_FAILED -0x7F00
116 
117 #define MBEDTLS_ERR_SSL_HW_ACCEL_FAILED -0x7F80
118 
119 #define MBEDTLS_ERR_SSL_HW_ACCEL_FALLTHROUGH -0x6F80
120 
121 #define MBEDTLS_ERR_SSL_BAD_PROTOCOL_VERSION -0x6E80
122 
123 #define MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE -0x6E00
124 
125 #define MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED -0x6D80
126 
127 #define MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH -0x6D00
128 
129 #define MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY -0x6C80
130 
131 #define MBEDTLS_ERR_SSL_INTERNAL_ERROR -0x6C00
132 
133 #define MBEDTLS_ERR_SSL_COUNTER_WRAPPING -0x6B80
134 
135 #define MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO -0x6B00
136 
137 #define MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED -0x6A80
138 
139 #define MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL -0x6A00
140 /* Error space gap */
142 #define MBEDTLS_ERR_SSL_WANT_READ -0x6900
143 
144 #define MBEDTLS_ERR_SSL_WANT_WRITE -0x6880
145 
146 #define MBEDTLS_ERR_SSL_TIMEOUT -0x6800
147 
148 #define MBEDTLS_ERR_SSL_CLIENT_RECONNECT -0x6780
149 
150 #define MBEDTLS_ERR_SSL_UNEXPECTED_RECORD -0x6700
151 
152 #define MBEDTLS_ERR_SSL_NON_FATAL -0x6680
153 
154 #define MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER -0x6600
155 
156 #define MBEDTLS_ERR_SSL_CONTINUE_PROCESSING -0x6580
157 
158 #define MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS -0x6500
159 
160 #define MBEDTLS_ERR_SSL_EARLY_MESSAGE -0x6480
161 /* Error space gap */
162 /* Error space gap */
163 /* Error space gap */
164 /* Error space gap */
165 /* Error space gap */
166 /* Error space gap */
167 /* Error space gap */
168 /* Error space gap */
170 #define MBEDTLS_ERR_SSL_UNEXPECTED_CID -0x6000
171 
172 #define MBEDTLS_ERR_SSL_VERSION_MISMATCH -0x5F00
173 
174 #define MBEDTLS_ERR_SSL_BAD_CONFIG -0x5E80
175 
176 /*
177  * Constants from RFC 8446 for TLS 1.3 PSK modes
178  *
179  * Those are used in the Pre-Shared Key Exchange Modes extension.
180  * See Section 4.2.9 in RFC 8446.
181  */
182 #define MBEDTLS_SSL_TLS1_3_PSK_MODE_PURE 0 /* Pure PSK-based exchange */
183 #define MBEDTLS_SSL_TLS1_3_PSK_MODE_ECDHE 1 /* PSK+ECDHE-based exchange */
184 
185 /*
186  * TLS 1.3 NamedGroup values
187  *
188  * From RF 8446
189  * enum {
190  * // Elliptic Curve Groups (ECDHE)
191  * secp256r1(0x0017), secp384r1(0x0018), secp521r1(0x0019),
192  * x25519(0x001D), x448(0x001E),
193  * // Finite Field Groups (DHE)
194  * ffdhe2048(0x0100), ffdhe3072(0x0101), ffdhe4096(0x0102),
195  * ffdhe6144(0x0103), ffdhe8192(0x0104),
196  * // Reserved Code Points
197  * ffdhe_private_use(0x01FC..0x01FF),
198  * ecdhe_private_use(0xFE00..0xFEFF),
199  * (0xFFFF)
200  * } NamedGroup;
201  *
202  */
203 
204 /* Elliptic Curve Groups (ECDHE) */
205 #define MBEDTLS_SSL_IANA_TLS_GROUP_NONE 0
206 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP192K1 0x0012
207 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP192R1 0x0013
208 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP224K1 0x0014
209 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP224R1 0x0015
210 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP256K1 0x0016
211 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1 0x0017
212 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP384R1 0x0018
213 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP521R1 0x0019
214 #define MBEDTLS_SSL_IANA_TLS_GROUP_BP256R1 0x001A
215 #define MBEDTLS_SSL_IANA_TLS_GROUP_BP384R1 0x001B
216 #define MBEDTLS_SSL_IANA_TLS_GROUP_BP512R1 0x001C
217 #define MBEDTLS_SSL_IANA_TLS_GROUP_X25519 0x001D
218 #define MBEDTLS_SSL_IANA_TLS_GROUP_X448 0x001E
219 /* Finite Field Groups (DHE) */
220 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE2048 0x0100
221 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE3072 0x0101
222 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE4096 0x0102
223 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE6144 0x0103
224 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE8192 0x0104
225 
226 /*
227  * TLS 1.3 Key Exchange Modes
228  *
229  * Mbed TLS internal identifiers for use with the SSL configuration API
230  * mbedtls_ssl_conf_tls13_key_exchange_modes().
231  */
232 
233 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK (1u << 0)
236 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL (1u << 1)
239 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL (1u << 2)
243 /* Convenience macros for sets of key exchanges. */
244 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_ALL \
245  (MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK | \
246  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL | \
247  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL)
248 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_ALL \
249  (MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK | \
250  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL)
251 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ALL \
252  (MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL | \
253  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL)
255 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_NONE (0)
256 
257 /*
258  * Various constants
259  */
260 
261 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
262 /* These are the high and low bytes of ProtocolVersion as defined by:
263  * - RFC 5246: ProtocolVersion version = { 3, 3 }; // TLS v1.2
264  * - RFC 8446: see section 4.2.1
265  */
266 #define MBEDTLS_SSL_MAJOR_VERSION_3 3
267 #define MBEDTLS_SSL_MINOR_VERSION_3 3
268 #define MBEDTLS_SSL_MINOR_VERSION_4 4
269 #endif /* MBEDTLS_DEPRECATED_REMOVED */
270 
271 #define MBEDTLS_SSL_TRANSPORT_STREAM 0
272 #define MBEDTLS_SSL_TRANSPORT_DATAGRAM 1
274 #define MBEDTLS_SSL_MAX_HOST_NAME_LEN 255
275 #define MBEDTLS_SSL_MAX_ALPN_NAME_LEN 255
277 #define MBEDTLS_SSL_MAX_ALPN_LIST_LEN 65535
279 /* RFC 6066 section 4, see also mfl_code_to_length in ssl_tls.c
280  * NONE must be zero so that memset()ing structure to zero works */
281 #define MBEDTLS_SSL_MAX_FRAG_LEN_NONE 0
282 #define MBEDTLS_SSL_MAX_FRAG_LEN_512 1
283 #define MBEDTLS_SSL_MAX_FRAG_LEN_1024 2
284 #define MBEDTLS_SSL_MAX_FRAG_LEN_2048 3
285 #define MBEDTLS_SSL_MAX_FRAG_LEN_4096 4
286 #define MBEDTLS_SSL_MAX_FRAG_LEN_INVALID 5
288 #define MBEDTLS_SSL_IS_CLIENT 0
289 #define MBEDTLS_SSL_IS_SERVER 1
291 #define MBEDTLS_SSL_EXTENDED_MS_DISABLED 0
292 #define MBEDTLS_SSL_EXTENDED_MS_ENABLED 1
293 
294 #define MBEDTLS_SSL_CID_DISABLED 0
295 #define MBEDTLS_SSL_CID_ENABLED 1
296 
297 #define MBEDTLS_SSL_ETM_DISABLED 0
298 #define MBEDTLS_SSL_ETM_ENABLED 1
299 
300 #define MBEDTLS_SSL_COMPRESS_NULL 0
302 #define MBEDTLS_SSL_VERIFY_NONE 0
303 #define MBEDTLS_SSL_VERIFY_OPTIONAL 1
304 #define MBEDTLS_SSL_VERIFY_REQUIRED 2
305 #define MBEDTLS_SSL_VERIFY_UNSET 3 /* Used only for sni_authmode */
307 #define MBEDTLS_SSL_LEGACY_RENEGOTIATION 0
308 #define MBEDTLS_SSL_SECURE_RENEGOTIATION 1
310 #define MBEDTLS_SSL_RENEGOTIATION_DISABLED 0
311 #define MBEDTLS_SSL_RENEGOTIATION_ENABLED 1
312 
313 #define MBEDTLS_SSL_ANTI_REPLAY_DISABLED 0
314 #define MBEDTLS_SSL_ANTI_REPLAY_ENABLED 1
315 
316 #define MBEDTLS_SSL_RENEGOTIATION_NOT_ENFORCED -1
317 #define MBEDTLS_SSL_RENEGO_MAX_RECORDS_DEFAULT 16
318 
319 #define MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION 0
320 #define MBEDTLS_SSL_LEGACY_ALLOW_RENEGOTIATION 1
321 #define MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE 2
323 #define MBEDTLS_SSL_TRUNC_HMAC_DISABLED 0
324 #define MBEDTLS_SSL_TRUNC_HMAC_ENABLED 1
325 #define MBEDTLS_SSL_TRUNCATED_HMAC_LEN 10 /* 80 bits, rfc 6066 section 7 */
327 #define MBEDTLS_SSL_SESSION_TICKETS_DISABLED 0
328 #define MBEDTLS_SSL_SESSION_TICKETS_ENABLED 1
330 #define MBEDTLS_SSL_PRESET_DEFAULT 0
331 #define MBEDTLS_SSL_PRESET_SUITEB 2
332 
333 #define MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED 1
334 #define MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED 0
335 
336 #define MBEDTLS_SSL_EARLY_DATA_DISABLED 0
337 #define MBEDTLS_SSL_EARLY_DATA_ENABLED 1
338 
339 #define MBEDTLS_SSL_DTLS_SRTP_MKI_UNSUPPORTED 0
340 #define MBEDTLS_SSL_DTLS_SRTP_MKI_SUPPORTED 1
341 
342 #define MBEDTLS_SSL_SRV_CIPHERSUITE_ORDER_CLIENT 1
343 #define MBEDTLS_SSL_SRV_CIPHERSUITE_ORDER_SERVER 0
344 
345 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS)
346 #if defined(PSA_WANT_ALG_SHA_384)
347 #define MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN 48
348 #elif defined(PSA_WANT_ALG_SHA_256)
349 #define MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN 32
350 #endif
351 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 && MBEDTLS_SSL_SESSION_TICKETS */
352 /*
353  * Default range for DTLS retransmission timer value, in milliseconds.
354  * RFC 6347 4.2.4.1 says from 1 second to 60 seconds.
355  */
356 #define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MIN 1000
357 #define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MAX 60000
358 
367 /*
368  * Maximum fragment length in bytes,
369  * determines the size of each of the two internal I/O buffers.
370  *
371  * Note: the RFC defines the default size of SSL / TLS messages. If you
372  * change the value here, other clients / servers may not be able to
373  * communicate with you anymore. Only change this value if you control
374  * both sides of the connection and have it reduced at both sides, or
375  * if you're using the Max Fragment Length extension and you know all your
376  * peers are using it too!
377  */
378 #if !defined(MBEDTLS_SSL_IN_CONTENT_LEN)
379 #define MBEDTLS_SSL_IN_CONTENT_LEN 16384
380 #endif
381 
382 #if !defined(MBEDTLS_SSL_OUT_CONTENT_LEN)
383 #define MBEDTLS_SSL_OUT_CONTENT_LEN 16384
384 #endif
386 /*
387  * Maximum number of heap-allocated bytes for the purpose of
388  * DTLS handshake message reassembly and future message buffering.
389  */
390 #if !defined(MBEDTLS_SSL_DTLS_MAX_BUFFERING)
391 #define MBEDTLS_SSL_DTLS_MAX_BUFFERING 32768
392 #endif
393 
394 /*
395  * Maximum length of CIDs for incoming and outgoing messages.
396  */
397 #if !defined(MBEDTLS_SSL_CID_IN_LEN_MAX)
398 #define MBEDTLS_SSL_CID_IN_LEN_MAX 32
399 #endif
400 
401 #if !defined(MBEDTLS_SSL_CID_OUT_LEN_MAX)
402 #define MBEDTLS_SSL_CID_OUT_LEN_MAX 32
403 #endif
405 #if !defined(MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY)
406 #define MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY 16
407 #endif
411 /*
412  * Default to standard CID mode
413  */
414 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID) && \
415  !defined(MBEDTLS_SSL_DTLS_CONNECTION_ID_COMPAT)
416 #define MBEDTLS_SSL_DTLS_CONNECTION_ID_COMPAT 0
417 #endif
418 
419 /*
420  * Length of the verify data for secure renegotiation
421  */
422 #define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 12
423 
424 /*
425  * Signaling ciphersuite values (SCSV)
426  */
427 #define MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO 0xFF
429 /*
430  * Supported Signature and Hash algorithms (For TLS 1.2)
431  * RFC 5246 section 7.4.1.4.1
432  */
433 #define MBEDTLS_SSL_HASH_NONE 0
434 #define MBEDTLS_SSL_HASH_MD5 1
435 #define MBEDTLS_SSL_HASH_SHA1 2
436 #define MBEDTLS_SSL_HASH_SHA224 3
437 #define MBEDTLS_SSL_HASH_SHA256 4
438 #define MBEDTLS_SSL_HASH_SHA384 5
439 #define MBEDTLS_SSL_HASH_SHA512 6
441 #define MBEDTLS_SSL_SIG_ANON 0
442 #define MBEDTLS_SSL_SIG_RSA 1
443 #define MBEDTLS_SSL_SIG_ECDSA 3
445 /*
446  * TLS 1.3 signature algorithms
447  * RFC 8446, Section 4.2.2
448  */
450 /* RSASSA-PKCS1-v1_5 algorithms */
451 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA256 0x0401
452 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA384 0x0501
453 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA512 0x0601
454 
455 /* ECDSA algorithms */
456 #define MBEDTLS_TLS1_3_SIG_ECDSA_SECP256R1_SHA256 0x0403
457 #define MBEDTLS_TLS1_3_SIG_ECDSA_SECP384R1_SHA384 0x0503
458 #define MBEDTLS_TLS1_3_SIG_ECDSA_SECP521R1_SHA512 0x0603
460 /* RSASSA-PSS algorithms with public key OID rsaEncryption */
461 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA256 0x0804
462 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA384 0x0805
463 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA512 0x0806
465 /* EdDSA algorithms */
466 #define MBEDTLS_TLS1_3_SIG_ED25519 0x0807
467 #define MBEDTLS_TLS1_3_SIG_ED448 0x0808
469 /* RSASSA-PSS algorithms with public key OID RSASSA-PSS */
470 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA256 0x0809
471 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA384 0x080A
472 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA512 0x080B
474 /* LEGACY ALGORITHMS */
475 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA1 0x0201
476 #define MBEDTLS_TLS1_3_SIG_ECDSA_SHA1 0x0203
478 #define MBEDTLS_TLS1_3_SIG_NONE 0x0
479 
480 /*
481  * Client Certificate Types
482  * RFC 5246 section 7.4.4 plus RFC 4492 section 5.5
483  */
484 #define MBEDTLS_SSL_CERT_TYPE_RSA_SIGN 1
485 #define MBEDTLS_SSL_CERT_TYPE_ECDSA_SIGN 64
486 
487 /*
488  * Message, alert and handshake types
489  */
490 #define MBEDTLS_SSL_MSG_CHANGE_CIPHER_SPEC 20
491 #define MBEDTLS_SSL_MSG_ALERT 21
492 #define MBEDTLS_SSL_MSG_HANDSHAKE 22
493 #define MBEDTLS_SSL_MSG_APPLICATION_DATA 23
494 #define MBEDTLS_SSL_MSG_CID 25
495 
496 #define MBEDTLS_SSL_ALERT_LEVEL_WARNING 1
497 #define MBEDTLS_SSL_ALERT_LEVEL_FATAL 2
499 #define MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY 0 /* 0x00 */
500 #define MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE 10 /* 0x0A */
501 #define MBEDTLS_SSL_ALERT_MSG_BAD_RECORD_MAC 20 /* 0x14 */
502 #define MBEDTLS_SSL_ALERT_MSG_DECRYPTION_FAILED 21 /* 0x15 */
503 #define MBEDTLS_SSL_ALERT_MSG_RECORD_OVERFLOW 22 /* 0x16 */
504 #define MBEDTLS_SSL_ALERT_MSG_DECOMPRESSION_FAILURE 30 /* 0x1E */
505 #define MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE 40 /* 0x28 */
506 #define MBEDTLS_SSL_ALERT_MSG_NO_CERT 41 /* 0x29 */
507 #define MBEDTLS_SSL_ALERT_MSG_BAD_CERT 42 /* 0x2A */
508 #define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT 43 /* 0x2B */
509 #define MBEDTLS_SSL_ALERT_MSG_CERT_REVOKED 44 /* 0x2C */
510 #define MBEDTLS_SSL_ALERT_MSG_CERT_EXPIRED 45 /* 0x2D */
511 #define MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN 46 /* 0x2E */
512 #define MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER 47 /* 0x2F */
513 #define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA 48 /* 0x30 */
514 #define MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED 49 /* 0x31 */
515 #define MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR 50 /* 0x32 */
516 #define MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR 51 /* 0x33 */
517 #define MBEDTLS_SSL_ALERT_MSG_EXPORT_RESTRICTION 60 /* 0x3C */
518 #define MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION 70 /* 0x46 */
519 #define MBEDTLS_SSL_ALERT_MSG_INSUFFICIENT_SECURITY 71 /* 0x47 */
520 #define MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR 80 /* 0x50 */
521 #define MBEDTLS_SSL_ALERT_MSG_INAPROPRIATE_FALLBACK 86 /* 0x56 */
522 #define MBEDTLS_SSL_ALERT_MSG_USER_CANCELED 90 /* 0x5A */
523 #define MBEDTLS_SSL_ALERT_MSG_NO_RENEGOTIATION 100 /* 0x64 */
524 #define MBEDTLS_SSL_ALERT_MSG_MISSING_EXTENSION 109 /* 0x6d -- new in TLS 1.3 */
525 #define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT 110 /* 0x6E */
526 #define MBEDTLS_SSL_ALERT_MSG_UNRECOGNIZED_NAME 112 /* 0x70 */
527 #define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_PSK_IDENTITY 115 /* 0x73 */
528 #define MBEDTLS_SSL_ALERT_MSG_CERT_REQUIRED 116 /* 0x74 */
529 #define MBEDTLS_SSL_ALERT_MSG_NO_APPLICATION_PROTOCOL 120 /* 0x78 */
531 #define MBEDTLS_SSL_HS_HELLO_REQUEST 0
532 #define MBEDTLS_SSL_HS_CLIENT_HELLO 1
533 #define MBEDTLS_SSL_HS_SERVER_HELLO 2
534 #define MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST 3
535 #define MBEDTLS_SSL_HS_NEW_SESSION_TICKET 4
536 #define MBEDTLS_SSL_HS_END_OF_EARLY_DATA 5
537 #define MBEDTLS_SSL_HS_ENCRYPTED_EXTENSIONS 8
538 #define MBEDTLS_SSL_HS_CERTIFICATE 11
539 #define MBEDTLS_SSL_HS_SERVER_KEY_EXCHANGE 12
540 #define MBEDTLS_SSL_HS_CERTIFICATE_REQUEST 13
541 #define MBEDTLS_SSL_HS_SERVER_HELLO_DONE 14
542 #define MBEDTLS_SSL_HS_CERTIFICATE_VERIFY 15
543 #define MBEDTLS_SSL_HS_CLIENT_KEY_EXCHANGE 16
544 #define MBEDTLS_SSL_HS_FINISHED 20
545 #define MBEDTLS_SSL_HS_MESSAGE_HASH 254
547 /*
548  * TLS extensions
549  */
550 #define MBEDTLS_TLS_EXT_SERVERNAME 0
551 #define MBEDTLS_TLS_EXT_SERVERNAME_HOSTNAME 0
552 
553 #define MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH 1
554 
555 #define MBEDTLS_TLS_EXT_TRUNCATED_HMAC 4
556 #define MBEDTLS_TLS_EXT_STATUS_REQUEST 5 /* RFC 6066 TLS 1.2 and 1.3 */
558 #define MBEDTLS_TLS_EXT_SUPPORTED_ELLIPTIC_CURVES 10
559 #define MBEDTLS_TLS_EXT_SUPPORTED_GROUPS 10 /* RFC 8422,7919 TLS 1.2 and 1.3 */
560 #define MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS 11
562 #define MBEDTLS_TLS_EXT_SIG_ALG 13 /* RFC 8446 TLS 1.3 */
563 #define MBEDTLS_TLS_EXT_USE_SRTP 14
564 #define MBEDTLS_TLS_EXT_HEARTBEAT 15 /* RFC 6520 TLS 1.2 and 1.3 */
565 #define MBEDTLS_TLS_EXT_ALPN 16
567 #define MBEDTLS_TLS_EXT_SCT 18 /* RFC 6962 TLS 1.2 and 1.3 */
568 #define MBEDTLS_TLS_EXT_CLI_CERT_TYPE 19 /* RFC 7250 TLS 1.2 and 1.3 */
569 #define MBEDTLS_TLS_EXT_SERV_CERT_TYPE 20 /* RFC 7250 TLS 1.2 and 1.3 */
570 #define MBEDTLS_TLS_EXT_PADDING 21 /* RFC 7685 TLS 1.2 and 1.3 */
571 #define MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC 22 /* 0x16 */
572 #define MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET 0x0017 /* 23 */
574 #define MBEDTLS_TLS_EXT_RECORD_SIZE_LIMIT 28 /* RFC 8449 (implemented for TLS 1.3 only) */
576 #define MBEDTLS_TLS_EXT_SESSION_TICKET 35
578 #define MBEDTLS_TLS_EXT_PRE_SHARED_KEY 41 /* RFC 8446 TLS 1.3 */
579 #define MBEDTLS_TLS_EXT_EARLY_DATA 42 /* RFC 8446 TLS 1.3 */
580 #define MBEDTLS_TLS_EXT_SUPPORTED_VERSIONS 43 /* RFC 8446 TLS 1.3 */
581 #define MBEDTLS_TLS_EXT_COOKIE 44 /* RFC 8446 TLS 1.3 */
582 #define MBEDTLS_TLS_EXT_PSK_KEY_EXCHANGE_MODES 45 /* RFC 8446 TLS 1.3 */
583 
584 #define MBEDTLS_TLS_EXT_CERT_AUTH 47 /* RFC 8446 TLS 1.3 */
585 #define MBEDTLS_TLS_EXT_OID_FILTERS 48 /* RFC 8446 TLS 1.3 */
586 #define MBEDTLS_TLS_EXT_POST_HANDSHAKE_AUTH 49 /* RFC 8446 TLS 1.3 */
587 #define MBEDTLS_TLS_EXT_SIG_ALG_CERT 50 /* RFC 8446 TLS 1.3 */
588 #define MBEDTLS_TLS_EXT_KEY_SHARE 51 /* RFC 8446 TLS 1.3 */
589 
590 #if MBEDTLS_SSL_DTLS_CONNECTION_ID_COMPAT == 0
591 #define MBEDTLS_TLS_EXT_CID 54 /* RFC 9146 DTLS 1.2 CID */
592 #else
593 #define MBEDTLS_TLS_EXT_CID 254 /* Pre-RFC 9146 DTLS 1.2 CID */
594 #endif
595 
596 #define MBEDTLS_TLS_EXT_ECJPAKE_KKPP 256 /* experimental */
598 #define MBEDTLS_TLS_EXT_RENEGOTIATION_INFO 0xFF01
599 
600 /*
601  * Size defines
602  */
603 #if !defined(MBEDTLS_PSK_MAX_LEN)
604 /*
605  * If the library supports TLS 1.3 tickets and the cipher suite
606  * TLS1-3-AES-256-GCM-SHA384, set the PSK maximum length to 48 instead of 32.
607  * That way, the TLS 1.3 client and server are able to resume sessions where
608  * the cipher suite is TLS1-3-AES-256-GCM-SHA384 (pre-shared keys are 48
609  * bytes long in that case).
610  */
611 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && \
612  defined(MBEDTLS_SSL_SESSION_TICKETS) && \
613  defined(MBEDTLS_AES_C) && defined(MBEDTLS_GCM_C) && \
614  defined(MBEDTLS_HAS_ALG_SHA_384_VIA_MD_OR_PSA_BASED_ON_USE_PSA)
615 #define MBEDTLS_PSK_MAX_LEN 48 /* 384 bits */
616 #else
617 #define MBEDTLS_PSK_MAX_LEN 32 /* 256 bits */
618 #endif
619 #endif /* !MBEDTLS_PSK_MAX_LEN */
620 
621 /* Dummy type used only for its size */
623 #if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)
624  unsigned char _pms_rsa[48]; /* RFC 5246 8.1.1 */
625 #endif
626 #if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)
627  unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]; /* RFC 5246 8.1.2 */
628 #endif
629 #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
630  defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
631  defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
632  defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
633  unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]; /* RFC 4492 5.10 */
634 #endif
635 #if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
636  unsigned char _pms_psk[4 + 2 * MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 2 */
637 #endif
638 #if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
640  + MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 3 */
641 #endif
642 #if defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)
643  unsigned char _pms_rsa_psk[52 + MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 4 */
644 #endif
645 #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
647  + MBEDTLS_PSK_MAX_LEN]; /* RFC 5489 2 */
648 #endif
649 #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
650  unsigned char _pms_ecjpake[32]; /* Thread spec: SHA-256 output */
651 #endif
652 };
654 #define MBEDTLS_PREMASTER_SIZE sizeof(union mbedtls_ssl_premaster_secret)
655 
656 #define MBEDTLS_TLS1_3_MD_MAX_SIZE PSA_HASH_MAX_SIZE
657 
658 
659 /* Length in number of bytes of the TLS sequence number */
660 #define MBEDTLS_SSL_SEQUENCE_NUMBER_LEN 8
661 
662 #ifdef __cplusplus
663 extern "C" {
664 #endif
665 
666 /*
667  * SSL state machine
668  */
669 typedef enum {
701 }
721 typedef int mbedtls_ssl_send_t(void *ctx,
722  const unsigned char *buf,
723  size_t len);
724 
745 typedef int mbedtls_ssl_recv_t(void *ctx,
746  unsigned char *buf,
747  size_t len);
748 
771 typedef int mbedtls_ssl_recv_timeout_t(void *ctx,
772  unsigned char *buf,
773  size_t len,
774  uint32_t timeout);
797 typedef void mbedtls_ssl_set_timer_t(void *ctx,
798  uint32_t int_ms,
799  uint32_t fin_ms);
800 
812 typedef int mbedtls_ssl_get_timer_t(void *ctx);
813 
814 /* Defined below */
819 /* Defined in library/ssl_misc.h */
823 #if defined(MBEDTLS_X509_CRT_PARSE_C)
825 #endif
826 #if defined(MBEDTLS_SSL_PROTO_DTLS)
828 #endif
829 
830 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS)
831 #define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_RESUMPTION \
832  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK /* 1U << 0 */
833 #define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_EPHEMERAL_RESUMPTION \
834  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL /* 1U << 2 */
835 #define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA (1U << 3)
836 
837 #define MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK \
838  (MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_RESUMPTION | \
839  MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_EPHEMERAL_RESUMPTION | \
840  MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA)
841 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 && MBEDTLS_SSL_SESSION_TICKETS */
842 
866 typedef int mbedtls_ssl_cache_get_t(void *data,
867  unsigned char const *session_id,
868  size_t session_id_len,
869  mbedtls_ssl_session *session);
888 typedef int mbedtls_ssl_cache_set_t(void *data,
889  unsigned char const *session_id,
890  size_t session_id_len,
891  const mbedtls_ssl_session *session);
892 
893 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
894 #if defined(MBEDTLS_X509_CRT_PARSE_C)
895 
966 typedef int mbedtls_ssl_async_sign_t(mbedtls_ssl_context *ssl,
967  mbedtls_x509_crt *cert,
968  mbedtls_md_type_t md_alg,
969  const unsigned char *hash,
970  size_t hash_len);
971 
1032 typedef int mbedtls_ssl_async_decrypt_t(mbedtls_ssl_context *ssl,
1033  mbedtls_x509_crt *cert,
1034  const unsigned char *input,
1035  size_t input_len);
1036 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1037 
1080 typedef int mbedtls_ssl_async_resume_t(mbedtls_ssl_context *ssl,
1081  unsigned char *output,
1082  size_t *output_len,
1083  size_t output_size);
1084 
1102 typedef void mbedtls_ssl_async_cancel_t(mbedtls_ssl_context *ssl);
1103 #endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
1104 
1105 #if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
1106  !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
1107 #define MBEDTLS_SSL_PEER_CERT_DIGEST_MAX_LEN 48
1108 #if defined(MBEDTLS_SHA256_C)
1109 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA256
1110 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 32
1111 #elif defined(MBEDTLS_SHA384_C)
1112 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA384
1113 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 48
1114 #elif defined(MBEDTLS_SHA1_C)
1115 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA1
1116 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 20
1117 #else
1118 /* This is already checked in check_config.h, but be sure. */
1119 #error "Bad configuration - need SHA-1, SHA-256 or SHA-512 enabled to compute digest of peer CRT."
1120 #endif
1121 #endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED &&
1122  !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1123 
1124 typedef struct {
1125  unsigned char client_application_traffic_secret_N[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1126  unsigned char server_application_traffic_secret_N[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1127  unsigned char exporter_master_secret[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1128  unsigned char resumption_master_secret[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1131 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1133 #define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH 255
1134 #define MBEDTLS_TLS_SRTP_MAX_PROFILE_LIST_LENGTH 4
1135 /*
1136  * For code readability use a typedef for DTLS-SRTP profiles
1137  *
1138  * Use_srtp extension protection profiles values as defined in
1139  * http://www.iana.org/assignments/srtp-protection/srtp-protection.xhtml
1140  *
1141  * Reminder: if this list is expanded mbedtls_ssl_check_srtp_profile_value
1142  * must be updated too.
1143  */
1144 #define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80 ((uint16_t) 0x0001)
1145 #define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32 ((uint16_t) 0x0002)
1146 #define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80 ((uint16_t) 0x0005)
1147 #define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32 ((uint16_t) 0x0006)
1148 /* This one is not iana defined, but for code readability. */
1149 #define MBEDTLS_TLS_SRTP_UNSET ((uint16_t) 0x0000)
1151 typedef uint16_t mbedtls_ssl_srtp_profile;
1155  mbedtls_ssl_srtp_profile MBEDTLS_PRIVATE(chosen_dtls_srtp_profile);
1157  uint16_t MBEDTLS_PRIVATE(mki_len);
1160 }
1162 
1163 #endif /* MBEDTLS_SSL_DTLS_SRTP */
1164 
1166 typedef enum {
1168  MBEDTLS_SSL_VERSION_TLS1_2 = 0x0303,
1169  MBEDTLS_SSL_VERSION_TLS1_3 = 0x0304,
1171 
1172 /*
1173  * This structure is used for storing current session data.
1174  *
1175  * Note: when changing this definition, we need to check and update:
1176  * - in tests/suites/test_suite_ssl.function:
1177  * ssl_populate_session() and ssl_serialize_session_save_load()
1178  * - in library/ssl_tls.c:
1179  * mbedtls_ssl_session_init() and mbedtls_ssl_session_free()
1180  * mbedtls_ssl_session_save() and ssl_session_load()
1181  * ssl_session_copy()
1182  */
1183 struct mbedtls_ssl_session {
1184 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1185  unsigned char MBEDTLS_PRIVATE(mfl_code);
1186 #endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
1187 
1188  unsigned char MBEDTLS_PRIVATE(exported);
1195 #if defined(MBEDTLS_HAVE_TIME)
1197 #endif
1198  int MBEDTLS_PRIVATE(ciphersuite);
1199  size_t MBEDTLS_PRIVATE(id_len);
1200  unsigned char MBEDTLS_PRIVATE(id)[32];
1201  unsigned char MBEDTLS_PRIVATE(master)[48];
1203 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1204 #if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
1206 #else /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1209  unsigned char *MBEDTLS_PRIVATE(peer_cert_digest);
1210  size_t MBEDTLS_PRIVATE(peer_cert_digest_len);
1211  mbedtls_md_type_t MBEDTLS_PRIVATE(peer_cert_digest_type);
1212 #endif /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1213 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1214  uint32_t MBEDTLS_PRIVATE(verify_result);
1216 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
1217  unsigned char *MBEDTLS_PRIVATE(ticket);
1218  size_t MBEDTLS_PRIVATE(ticket_len);
1219  uint32_t MBEDTLS_PRIVATE(ticket_lifetime);
1220 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_CLI_C */
1221 
1222 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS)
1223  uint8_t MBEDTLS_PRIVATE(endpoint);
1224  uint8_t MBEDTLS_PRIVATE(ticket_flags);
1225  uint32_t MBEDTLS_PRIVATE(ticket_age_add);
1226  uint8_t MBEDTLS_PRIVATE(resumption_key_len);
1227  unsigned char MBEDTLS_PRIVATE(resumption_key)[MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN];
1228 
1229 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION) && defined(MBEDTLS_SSL_CLI_C)
1230  char *MBEDTLS_PRIVATE(hostname);
1231 #endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION && MBEDTLS_SSL_CLI_C */
1232 
1233 #if defined(MBEDTLS_HAVE_TIME) && defined(MBEDTLS_SSL_CLI_C)
1234  mbedtls_time_t MBEDTLS_PRIVATE(ticket_received);
1235 #endif /* MBEDTLS_HAVE_TIME && MBEDTLS_SSL_CLI_C */
1236 
1237 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 && MBEDTLS_SSL_SESSION_TICKETS */
1238 
1239 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1240  int MBEDTLS_PRIVATE(encrypt_then_mac);
1241 #endif
1242 
1243 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1245 #endif
1246 };
1247 
1248 /*
1249  * Identifiers for PRFs used in various versions of TLS.
1250  */
1251 typedef enum {
1260 typedef enum {
1262 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1263  MBEDTLS_SSL_KEY_EXPORT_TLS1_3_CLIENT_EARLY_SECRET,
1264  MBEDTLS_SSL_KEY_EXPORT_TLS1_3_EARLY_EXPORTER_SECRET,
1265  MBEDTLS_SSL_KEY_EXPORT_TLS1_3_CLIENT_HANDSHAKE_TRAFFIC_SECRET,
1266  MBEDTLS_SSL_KEY_EXPORT_TLS1_3_SERVER_HANDSHAKE_TRAFFIC_SECRET,
1267  MBEDTLS_SSL_KEY_EXPORT_TLS1_3_CLIENT_APPLICATION_TRAFFIC_SECRET,
1268  MBEDTLS_SSL_KEY_EXPORT_TLS1_3_SERVER_APPLICATION_TRAFFIC_SECRET,
1269 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1271 
1287 typedef void mbedtls_ssl_export_keys_t(void *p_expkey,
1289  const unsigned char *secret,
1290  size_t secret_len,
1291  const unsigned char client_random[32],
1292  const unsigned char server_random[32],
1293  mbedtls_tls_prf_types tls_prf_type);
1294 
1295 #if defined(MBEDTLS_SSL_SRV_C)
1296 
1311 typedef int (*mbedtls_ssl_hs_cb_t)(mbedtls_ssl_context *ssl);
1312 #endif
1313 
1314 /* A type for storing user data in a library structure.
1315  *
1316  * The representation of type may change in future versions of the library.
1317  * Only the behaviors guaranteed by documented accessor functions are
1318  * guaranteed to remain stable.
1319  */
1320 typedef union {
1321  uintptr_t n; /* typically a handle to an associated object */
1322  void *p; /* typically a pointer to extra data */
1324 
1329  /* Group items mostly by size. This helps to reduce memory wasted to
1330  * padding. It also helps to keep smaller fields early in the structure,
1331  * so that elements tend to be in the 128-element direct access window
1332  * on Arm Thumb, which reduces the code size. */
1333 
1337  /*
1338  * Flags (could be bit-fields to save RAM, but separate bytes make
1339  * the code smaller on architectures with an instruction for direct
1340  * byte access).
1341  */
1342 
1343  uint8_t MBEDTLS_PRIVATE(endpoint);
1344  uint8_t MBEDTLS_PRIVATE(transport);
1345  uint8_t MBEDTLS_PRIVATE(authmode);
1346  /* needed even with renego disabled for LEGACY_BREAK_HANDSHAKE */
1347  uint8_t MBEDTLS_PRIVATE(allow_legacy_renegotiation);
1348 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1349  uint8_t MBEDTLS_PRIVATE(mfl_code);
1351 #endif
1352 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1353  uint8_t MBEDTLS_PRIVATE(encrypt_then_mac);
1354 #endif
1355 #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
1356  uint8_t MBEDTLS_PRIVATE(extended_ms);
1357 #endif
1358 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1359  uint8_t MBEDTLS_PRIVATE(anti_replay);
1360 #endif
1361 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1362  uint8_t MBEDTLS_PRIVATE(disable_renegotiation);
1363 #endif
1364 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
1365  defined(MBEDTLS_SSL_CLI_C)
1366  uint8_t MBEDTLS_PRIVATE(session_tickets);
1367 #endif
1369 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
1370  defined(MBEDTLS_SSL_SRV_C) && \
1371  defined(MBEDTLS_SSL_PROTO_TLS1_3)
1372  uint16_t MBEDTLS_PRIVATE(new_session_tickets_count);
1373 #endif
1374 
1375 #if defined(MBEDTLS_SSL_SRV_C)
1376  uint8_t MBEDTLS_PRIVATE(cert_req_ca_list);
1378  uint8_t MBEDTLS_PRIVATE(respect_cli_pref);
1381 #endif
1382 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1383  uint8_t MBEDTLS_PRIVATE(ignore_unexpected_cid);
1386 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1387 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1388  uint8_t MBEDTLS_PRIVATE(dtls_srtp_mki_support); /* support having mki_value
1389  in the use_srtp extension? */
1390 #endif
1391 
1392  /*
1393  * Pointers
1394  */
1395 
1397  const int *MBEDTLS_PRIVATE(ciphersuite_list);
1398 
1399 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1400 
1401  int MBEDTLS_PRIVATE(tls13_kex_modes);
1402 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1405  void(*MBEDTLS_PRIVATE(f_dbg))(void *, int, const char *, int, const char *);
1406  void *MBEDTLS_PRIVATE(p_dbg);
1409  int(*MBEDTLS_PRIVATE(f_rng))(void *, unsigned char *, size_t);
1410  void *MBEDTLS_PRIVATE(p_rng);
1416  void *MBEDTLS_PRIVATE(p_cache);
1418 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
1420  int(*MBEDTLS_PRIVATE(f_sni))(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
1421  void *MBEDTLS_PRIVATE(p_sni);
1422 #endif
1423 
1424 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1425 
1426  int(*MBEDTLS_PRIVATE(f_vrfy))(void *, mbedtls_x509_crt *, int, uint32_t *);
1427  void *MBEDTLS_PRIVATE(p_vrfy);
1428 #endif
1429 
1430 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED)
1431 #if defined(MBEDTLS_SSL_SRV_C)
1433  int(*MBEDTLS_PRIVATE(f_psk))(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
1434  void *MBEDTLS_PRIVATE(p_psk);
1435 #endif
1436 #endif
1437 
1438 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1440  int(*MBEDTLS_PRIVATE(f_cookie_write))(void *, unsigned char **, unsigned char *,
1441  const unsigned char *, size_t);
1443  int(*MBEDTLS_PRIVATE(f_cookie_check))(void *, const unsigned char *, size_t,
1444  const unsigned char *, size_t);
1445  void *MBEDTLS_PRIVATE(p_cookie);
1446 #endif
1447 
1448 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
1450  int(*MBEDTLS_PRIVATE(f_ticket_write))(void *, const mbedtls_ssl_session *,
1451  unsigned char *, const unsigned char *, size_t *,
1452  uint32_t *);
1454  int(*MBEDTLS_PRIVATE(f_ticket_parse))(void *, mbedtls_ssl_session *, unsigned char *, size_t);
1455  void *MBEDTLS_PRIVATE(p_ticket);
1456 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
1457 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1458  size_t MBEDTLS_PRIVATE(cid_len);
1459 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1461 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1462  const mbedtls_x509_crt_profile *MBEDTLS_PRIVATE(cert_profile);
1464  mbedtls_x509_crt *MBEDTLS_PRIVATE(ca_chain);
1466 #if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
1468  void *MBEDTLS_PRIVATE(p_ca_cb);
1469 #endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
1470 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1472 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
1473 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1474  mbedtls_ssl_async_sign_t *MBEDTLS_PRIVATE(f_async_sign_start);
1475  mbedtls_ssl_async_decrypt_t *MBEDTLS_PRIVATE(f_async_decrypt_start);
1476 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1477  mbedtls_ssl_async_resume_t *MBEDTLS_PRIVATE(f_async_resume);
1478  mbedtls_ssl_async_cancel_t *MBEDTLS_PRIVATE(f_async_cancel);
1479  void *MBEDTLS_PRIVATE(p_async_config_data);
1480 #endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
1481 
1482 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
1483 
1484 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
1485  const int *MBEDTLS_PRIVATE(sig_hashes);
1486 #endif
1487  const uint16_t *MBEDTLS_PRIVATE(sig_algs);
1488 #endif /* MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
1489 
1490 #if defined(MBEDTLS_ECP_C) && !defined(MBEDTLS_DEPRECATED_REMOVED)
1492 #endif
1494  const uint16_t *MBEDTLS_PRIVATE(group_list);
1496 #if defined(MBEDTLS_DHM_C)
1498  mbedtls_mpi MBEDTLS_PRIVATE(dhm_G);
1499 #endif
1501 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED)
1502 
1503 #if defined(MBEDTLS_USE_PSA_CRYPTO)
1510 #endif /* MBEDTLS_USE_PSA_CRYPTO */
1511  unsigned char *MBEDTLS_PRIVATE(psk);
1515  size_t MBEDTLS_PRIVATE(psk_len);
1521  unsigned char *MBEDTLS_PRIVATE(psk_identity);
1526  size_t MBEDTLS_PRIVATE(psk_identity_len);
1532 #endif /* MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED */
1533 
1534 #if defined(MBEDTLS_SSL_EARLY_DATA)
1535  int MBEDTLS_PRIVATE(early_data_enabled);
1539 #if defined(MBEDTLS_SSL_SRV_C)
1540  /* The maximum amount of 0-RTT data. RFC 8446 section 4.6.1 */
1541  uint32_t MBEDTLS_PRIVATE(max_early_data_size);
1542 #endif /* MBEDTLS_SSL_SRV_C */
1543 
1544 #endif /* MBEDTLS_SSL_EARLY_DATA */
1545 
1546 #if defined(MBEDTLS_SSL_ALPN)
1547  const char **MBEDTLS_PRIVATE(alpn_list);
1548 #endif
1549 
1550 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1551 
1552  const mbedtls_ssl_srtp_profile *MBEDTLS_PRIVATE(dtls_srtp_profile_list);
1554  size_t MBEDTLS_PRIVATE(dtls_srtp_profile_list_len);
1555 #endif /* MBEDTLS_SSL_DTLS_SRTP */
1556 
1557  /*
1558  * Numerical settings (int)
1559  */
1561  uint32_t MBEDTLS_PRIVATE(read_timeout);
1563 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1564  uint32_t MBEDTLS_PRIVATE(hs_timeout_min);
1566  uint32_t MBEDTLS_PRIVATE(hs_timeout_max);
1568 #endif
1569 
1570 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1571  int MBEDTLS_PRIVATE(renego_max_records);
1572  unsigned char MBEDTLS_PRIVATE(renego_period)[8];
1574 #endif
1575 
1576  unsigned int MBEDTLS_PRIVATE(badmac_limit);
1578 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
1579  unsigned int MBEDTLS_PRIVATE(dhm_min_bitlen);
1580 #endif
1581 
1588 
1589 #if defined(MBEDTLS_SSL_SRV_C)
1591 #endif /* MBEDTLS_SSL_SRV_C */
1592 
1593 #if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
1594  const mbedtls_x509_crt *MBEDTLS_PRIVATE(dn_hints);
1595 #endif
1596 };
1597 
1598 struct mbedtls_ssl_context {
1599  const mbedtls_ssl_config *MBEDTLS_PRIVATE(conf);
1601  /*
1602  * Miscellaneous
1603  */
1604  int MBEDTLS_PRIVATE(state);
1605 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1606  int MBEDTLS_PRIVATE(renego_status);
1607  int MBEDTLS_PRIVATE(renego_records_seen);
1610 #endif /* MBEDTLS_SSL_RENEGOTIATION */
1611 
1627 
1628  unsigned MBEDTLS_PRIVATE(badmac_seen);
1630 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1631 
1632  int(*MBEDTLS_PRIVATE(f_vrfy))(void *, mbedtls_x509_crt *, int, uint32_t *);
1633  void *MBEDTLS_PRIVATE(p_vrfy);
1634 #endif
1635 
1641  void *MBEDTLS_PRIVATE(p_bio);
1643  /*
1644  * Session layer
1645  */
1646  mbedtls_ssl_session *MBEDTLS_PRIVATE(session_in);
1647  mbedtls_ssl_session *MBEDTLS_PRIVATE(session_out);
1648  mbedtls_ssl_session *MBEDTLS_PRIVATE(session);
1649  mbedtls_ssl_session *MBEDTLS_PRIVATE(session_negotiate);
1654  /*
1655  * Record layer transformations
1656  */
1660  mbedtls_ssl_transform *MBEDTLS_PRIVATE(transform_out);
1666 #if defined(MBEDTLS_SSL_PROTO_TLS1_2)
1667  mbedtls_ssl_transform *MBEDTLS_PRIVATE(transform_negotiate);
1670 #endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
1671 
1672 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1675  mbedtls_ssl_transform *MBEDTLS_PRIVATE(transform_application);
1676 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1677 
1678  /*
1679  * Timers
1680  */
1681  void *MBEDTLS_PRIVATE(p_timer);
1686  /*
1687  * Record layer (incoming data)
1688  */
1689  unsigned char *MBEDTLS_PRIVATE(in_buf);
1690  unsigned char *MBEDTLS_PRIVATE(in_ctr);
1693  unsigned char *MBEDTLS_PRIVATE(in_hdr);
1694 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1695  unsigned char *MBEDTLS_PRIVATE(in_cid);
1697 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1698  unsigned char *MBEDTLS_PRIVATE(in_len);
1699  unsigned char *MBEDTLS_PRIVATE(in_iv);
1700  unsigned char *MBEDTLS_PRIVATE(in_msg);
1701  unsigned char *MBEDTLS_PRIVATE(in_offt);
1703  int MBEDTLS_PRIVATE(in_msgtype);
1704  size_t MBEDTLS_PRIVATE(in_msglen);
1705  size_t MBEDTLS_PRIVATE(in_left);
1706 #if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1707  size_t MBEDTLS_PRIVATE(in_buf_len);
1708 #endif
1709 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1710  uint16_t MBEDTLS_PRIVATE(in_epoch);
1711  size_t MBEDTLS_PRIVATE(next_record_offset);
1713 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1714 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1715  uint64_t MBEDTLS_PRIVATE(in_window_top);
1716  uint64_t MBEDTLS_PRIVATE(in_window);
1717 #endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
1718 
1719  size_t MBEDTLS_PRIVATE(in_hslen);
1721  int MBEDTLS_PRIVATE(nb_zero);
1723  int MBEDTLS_PRIVATE(keep_current_message);
1726  /* The following three variables indicate if and, if yes,
1727  * what kind of alert is pending to be sent.
1728  */
1729  unsigned char MBEDTLS_PRIVATE(send_alert);
1733  unsigned char MBEDTLS_PRIVATE(alert_type);
1735  int MBEDTLS_PRIVATE(alert_reason);
1739 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1740  uint8_t MBEDTLS_PRIVATE(disable_datagram_packing);
1742 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1743 
1744  /*
1745  * Record layer (outgoing data)
1746  */
1747  unsigned char *MBEDTLS_PRIVATE(out_buf);
1748  unsigned char *MBEDTLS_PRIVATE(out_ctr);
1749  unsigned char *MBEDTLS_PRIVATE(out_hdr);
1750 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1751  unsigned char *MBEDTLS_PRIVATE(out_cid);
1753 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1754  unsigned char *MBEDTLS_PRIVATE(out_len);
1755  unsigned char *MBEDTLS_PRIVATE(out_iv);
1756  unsigned char *MBEDTLS_PRIVATE(out_msg);
1758  int MBEDTLS_PRIVATE(out_msgtype);
1759  size_t MBEDTLS_PRIVATE(out_msglen);
1760  size_t MBEDTLS_PRIVATE(out_left);
1761 #if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1762  size_t MBEDTLS_PRIVATE(out_buf_len);
1763 #endif
1765  unsigned char MBEDTLS_PRIVATE(cur_out_ctr)[MBEDTLS_SSL_SEQUENCE_NUMBER_LEN];
1767 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1768  uint16_t MBEDTLS_PRIVATE(mtu);
1769 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1770 
1771  /*
1772  * User settings
1773  */
1774 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1775  char *MBEDTLS_PRIVATE(hostname);
1777 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1778 
1779 #if defined(MBEDTLS_SSL_ALPN)
1780  const char *MBEDTLS_PRIVATE(alpn_chosen);
1781 #endif /* MBEDTLS_SSL_ALPN */
1782 
1783 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1784  /*
1785  * use_srtp extension
1786  */
1787  mbedtls_dtls_srtp_info MBEDTLS_PRIVATE(dtls_srtp_info);
1788 #endif /* MBEDTLS_SSL_DTLS_SRTP */
1789 
1790  /*
1791  * Information for DTLS hello verify
1792  */
1793 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1794  unsigned char *MBEDTLS_PRIVATE(cli_id);
1795  size_t MBEDTLS_PRIVATE(cli_id_len);
1796 #endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
1797 
1798  /*
1799  * Secure renegotiation
1800  */
1801  /* needed to know when to send extension on server */
1802  int MBEDTLS_PRIVATE(secure_renegotiation);
1804 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1805  size_t MBEDTLS_PRIVATE(verify_data_len);
1806  char MBEDTLS_PRIVATE(own_verify_data)[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN];
1807  char MBEDTLS_PRIVATE(peer_verify_data)[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN];
1808 #endif /* MBEDTLS_SSL_RENEGOTIATION */
1809 
1810 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1811  /* CID configuration to use in subsequent handshakes. */
1817  unsigned char MBEDTLS_PRIVATE(own_cid)[MBEDTLS_SSL_CID_IN_LEN_MAX];
1818  uint8_t MBEDTLS_PRIVATE(own_cid_len);
1819  uint8_t MBEDTLS_PRIVATE(negotiate_cid);
1823 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1825 #if defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_CLI_C)
1826  int MBEDTLS_PRIVATE(early_data_status);
1827 #endif /* MBEDTLS_SSL_EARLY_DATA && MBEDTLS_SSL_CLI_C */
1828 
1831  void *MBEDTLS_PRIVATE(p_export_keys);
1843 };
1844 
1853 const char *mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id);
1854 
1863 int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name);
1864 
1872 void mbedtls_ssl_init(mbedtls_ssl_context *ssl);
1873 
1898 int mbedtls_ssl_setup(mbedtls_ssl_context *ssl,
1899  const mbedtls_ssl_config *conf);
1900 
1910 int mbedtls_ssl_session_reset(mbedtls_ssl_context *ssl);
1911 
1918 void mbedtls_ssl_conf_endpoint(mbedtls_ssl_config *conf, int endpoint);
1919 
1934 void mbedtls_ssl_conf_transport(mbedtls_ssl_config *conf, int transport);
1935 
1962 void mbedtls_ssl_conf_authmode(mbedtls_ssl_config *conf, int authmode);
1963 
1964 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_EARLY_DATA)
1965 
1984 void mbedtls_ssl_tls13_conf_early_data(mbedtls_ssl_config *conf,
1985  int early_data_enabled);
1986 
1987 #if defined(MBEDTLS_SSL_SRV_C)
1988 
2011 void mbedtls_ssl_tls13_conf_max_early_data_size(
2012  mbedtls_ssl_config *conf, uint32_t max_early_data_size);
2013 #endif /* MBEDTLS_SSL_SRV_C */
2014 
2015 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 && MBEDTLS_SSL_EARLY_DATA */
2016 
2017 #if defined(MBEDTLS_X509_CRT_PARSE_C)
2018 
2034  int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
2035  void *p_vrfy);
2036 #endif /* MBEDTLS_X509_CRT_PARSE_C */
2037 
2046  int (*f_rng)(void *, unsigned char *, size_t),
2047  void *p_rng);
2048 
2064  void (*f_dbg)(void *, int, const char *, int, const char *),
2065  void *p_dbg);
2066 
2078  const mbedtls_ssl_context *ssl)
2079 {
2080  return ssl->MBEDTLS_PRIVATE(conf);
2081 }
2082 
2113 void mbedtls_ssl_set_bio(mbedtls_ssl_context *ssl,
2114  void *p_bio,
2115  mbedtls_ssl_send_t *f_send,
2116  mbedtls_ssl_recv_t *f_recv,
2117  mbedtls_ssl_recv_timeout_t *f_recv_timeout);
2118 
2119 #if defined(MBEDTLS_SSL_PROTO_DTLS)
2120 
2121 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
2122 
2123 
2208 int mbedtls_ssl_set_cid(mbedtls_ssl_context *ssl,
2209  int enable,
2210  unsigned char const *own_cid,
2211  size_t own_cid_len);
2212 
2242 int mbedtls_ssl_get_own_cid(mbedtls_ssl_context *ssl,
2243  int *enabled,
2244  unsigned char own_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX],
2245  size_t *own_cid_len);
2246 
2284 int mbedtls_ssl_get_peer_cid(mbedtls_ssl_context *ssl,
2285  int *enabled,
2286  unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX],
2287  size_t *peer_cid_len);
2288 
2289 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
2290 
2330 void mbedtls_ssl_set_mtu(mbedtls_ssl_context *ssl, uint16_t mtu);
2331 #endif /* MBEDTLS_SSL_PROTO_DTLS */
2332 
2333 #if defined(MBEDTLS_X509_CRT_PARSE_C)
2334 
2352 void mbedtls_ssl_set_verify(mbedtls_ssl_context *ssl,
2353  int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
2354  void *p_vrfy);
2355 #endif /* MBEDTLS_X509_CRT_PARSE_C */
2356 
2373 void mbedtls_ssl_conf_read_timeout(mbedtls_ssl_config *conf, uint32_t timeout);
2374 
2419 int mbedtls_ssl_check_record(mbedtls_ssl_context const *ssl,
2420  unsigned char *buf,
2421  size_t buflen);
2422 
2443 void mbedtls_ssl_set_timer_cb(mbedtls_ssl_context *ssl,
2444  void *p_timer,
2445  mbedtls_ssl_set_timer_t *f_set_timer,
2446  mbedtls_ssl_get_timer_t *f_get_timer);
2447 
2448 #if defined(MBEDTLS_SSL_SRV_C)
2449 
2459 static inline void mbedtls_ssl_conf_cert_cb(mbedtls_ssl_config *conf,
2460  mbedtls_ssl_hs_cb_t f_cert_cb)
2461 {
2462  conf->MBEDTLS_PRIVATE(f_cert_cb) = f_cert_cb;
2463 }
2464 #endif /* MBEDTLS_SSL_SRV_C */
2485 typedef int mbedtls_ssl_ticket_write_t(void *p_ticket,
2486  const mbedtls_ssl_session *session,
2487  unsigned char *start,
2488  const unsigned char *end,
2489  size_t *tlen,
2490  uint32_t *lifetime);
2515 typedef int mbedtls_ssl_ticket_parse_t(void *p_ticket,
2516  mbedtls_ssl_session *session,
2517  unsigned char *buf,
2518  size_t len);
2519 
2520 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
2536  mbedtls_ssl_ticket_write_t *f_ticket_write,
2537  mbedtls_ssl_ticket_parse_t *f_ticket_parse,
2538  void *p_ticket);
2539 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
2540 
2559 void mbedtls_ssl_set_export_keys_cb(mbedtls_ssl_context *ssl,
2560  mbedtls_ssl_export_keys_t *f_export_keys,
2561  void *p_export_keys);
2562 
2573 static inline void mbedtls_ssl_conf_set_user_data_p(
2574  mbedtls_ssl_config *conf,
2575  void *p)
2576 {
2577  conf->MBEDTLS_PRIVATE(user_data).p = p;
2578 }
2587 static inline void mbedtls_ssl_conf_set_user_data_n(
2588  mbedtls_ssl_config *conf,
2589  uintptr_t n)
2590 {
2591  conf->MBEDTLS_PRIVATE(user_data).n = n;
2592 }
2604 static inline void *mbedtls_ssl_conf_get_user_data_p(
2605  mbedtls_ssl_config *conf)
2606 {
2607  return conf->MBEDTLS_PRIVATE(user_data).p;
2608 }
2609 
2620 static inline uintptr_t mbedtls_ssl_conf_get_user_data_n(
2621  mbedtls_ssl_config *conf)
2622 {
2623  return conf->MBEDTLS_PRIVATE(user_data).n;
2624 }
2625 
2636 static inline void mbedtls_ssl_set_user_data_p(
2637  mbedtls_ssl_context *ssl,
2638  void *p)
2639 {
2640  ssl->MBEDTLS_PRIVATE(user_data).p = p;
2641 }
2650 static inline void mbedtls_ssl_set_user_data_n(
2651  mbedtls_ssl_context *ssl,
2652  uintptr_t n)
2653 {
2654  ssl->MBEDTLS_PRIVATE(user_data).n = n;
2655 }
2667 static inline void *mbedtls_ssl_get_user_data_p(
2668  mbedtls_ssl_context *ssl)
2669 {
2670  return ssl->MBEDTLS_PRIVATE(user_data).p;
2671 }
2672 
2683 static inline uintptr_t mbedtls_ssl_get_user_data_n(
2684  mbedtls_ssl_context *ssl)
2685 {
2686  return ssl->MBEDTLS_PRIVATE(user_data).n;
2687 }
2688 
2689 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
2690 
2720 void mbedtls_ssl_conf_async_private_cb(mbedtls_ssl_config *conf,
2721  mbedtls_ssl_async_sign_t *f_async_sign,
2722  mbedtls_ssl_async_decrypt_t *f_async_decrypt,
2723  mbedtls_ssl_async_resume_t *f_async_resume,
2724  mbedtls_ssl_async_cancel_t *f_async_cancel,
2725  void *config_data);
2726 
2735 void *mbedtls_ssl_conf_get_async_config_data(const mbedtls_ssl_config *conf);
2736 
2751 void *mbedtls_ssl_get_async_operation_data(const mbedtls_ssl_context *ssl);
2752 
2764 void mbedtls_ssl_set_async_operation_data(mbedtls_ssl_context *ssl,
2765  void *ctx);
2766 #endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
2767 
2782 typedef int mbedtls_ssl_cookie_write_t(void *ctx,
2783  unsigned char **p, unsigned char *end,
2784  const unsigned char *info, size_t ilen);
2785 
2799 typedef int mbedtls_ssl_cookie_check_t(void *ctx,
2800  const unsigned char *cookie, size_t clen,
2801  const unsigned char *info, size_t ilen);
2802 
2803 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
2804 
2833  mbedtls_ssl_cookie_write_t *f_cookie_write,
2834  mbedtls_ssl_cookie_check_t *f_cookie_check,
2835  void *p_cookie);
2836 
2856 int mbedtls_ssl_set_client_transport_id(mbedtls_ssl_context *ssl,
2857  const unsigned char *info,
2858  size_t ilen);
2859 
2860 #endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
2861 
2862 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
2863 
2879 #endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
2880 
2904 void mbedtls_ssl_conf_dtls_badmac_limit(mbedtls_ssl_config *conf, unsigned limit);
2905 
2906 #if defined(MBEDTLS_SSL_PROTO_DTLS)
2907 
2936 void mbedtls_ssl_set_datagram_packing(mbedtls_ssl_context *ssl,
2937  unsigned allow_packing);
2938 
2970 void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max);
2971 #endif /* MBEDTLS_SSL_PROTO_DTLS */
2972 
2973 #if defined(MBEDTLS_SSL_SRV_C)
2974 
3012  void *p_cache,
3013  mbedtls_ssl_cache_get_t *f_get_cache,
3014  mbedtls_ssl_cache_set_t *f_set_cache);
3015 #endif /* MBEDTLS_SSL_SRV_C */
3016 
3017 #if defined(MBEDTLS_SSL_CLI_C)
3018 
3063 int mbedtls_ssl_set_session(mbedtls_ssl_context *ssl, const mbedtls_ssl_session *session);
3064 #endif /* MBEDTLS_SSL_CLI_C */
3065 
3098 int mbedtls_ssl_session_load(mbedtls_ssl_session *session,
3099  const unsigned char *buf,
3100  size_t len);
3101 
3127 int mbedtls_ssl_session_save(const mbedtls_ssl_session *session,
3128  unsigned char *buf,
3129  size_t buf_len,
3130  size_t *olen);
3131 
3174  const int *ciphersuites);
3175 
3176 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
3177 
3219 void mbedtls_ssl_conf_tls13_key_exchange_modes(mbedtls_ssl_config *conf,
3220  const int kex_modes);
3221 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
3222 
3223 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
3224 #define MBEDTLS_SSL_UNEXPECTED_CID_IGNORE 0
3225 #define MBEDTLS_SSL_UNEXPECTED_CID_FAIL 1
3226 
3258 int mbedtls_ssl_conf_cid(mbedtls_ssl_config *conf, size_t len,
3259  int ignore_other_cids);
3260 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
3261 
3262 #if defined(MBEDTLS_X509_CRT_PARSE_C)
3263 
3274  const mbedtls_x509_crt_profile *profile);
3275 
3288  mbedtls_x509_crt *ca_chain,
3289  mbedtls_x509_crl *ca_crl);
3290 
3291 #if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
3292 
3303 static inline
3305  const mbedtls_x509_crt *crt)
3306 {
3307  conf->MBEDTLS_PRIVATE(dn_hints) = crt;
3308 }
3309 #endif /* MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
3311 #if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
3312 
3363 void mbedtls_ssl_conf_ca_cb(mbedtls_ssl_config *conf,
3364  mbedtls_x509_crt_ca_cb_t f_ca_cb,
3365  void *p_ca_cb);
3366 #endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
3367 
3405  mbedtls_x509_crt *own_cert,
3406  mbedtls_pk_context *pk_key);
3407 #endif /* MBEDTLS_X509_CRT_PARSE_C */
3408 
3409 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED)
3410 
3443  const unsigned char *psk, size_t psk_len,
3444  const unsigned char *psk_identity, size_t psk_identity_len);
3445 
3446 #if defined(MBEDTLS_USE_PSA_CRYPTO)
3447 
3484 int mbedtls_ssl_conf_psk_opaque(mbedtls_ssl_config *conf,
3486  const unsigned char *psk_identity,
3487  size_t psk_identity_len);
3488 #endif /* MBEDTLS_USE_PSA_CRYPTO */
3489 
3506 int mbedtls_ssl_set_hs_psk(mbedtls_ssl_context *ssl,
3507  const unsigned char *psk, size_t psk_len);
3508 
3509 #if defined(MBEDTLS_USE_PSA_CRYPTO)
3510 
3530 int mbedtls_ssl_set_hs_psk_opaque(mbedtls_ssl_context *ssl,
3531  mbedtls_svc_key_id_t psk);
3532 #endif /* MBEDTLS_USE_PSA_CRYPTO */
3533 
3534 #if defined(MBEDTLS_SSL_SRV_C)
3535 
3574  int (*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *,
3575  size_t),
3576  void *p_psk);
3577 #endif /* MBEDTLS_SSL_SRV_C */
3578 #endif /* MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED */
3579 
3580 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_SRV_C)
3581 
3595  const unsigned char *dhm_P, size_t P_len,
3596  const unsigned char *dhm_G, size_t G_len);
3597 
3608 #endif /* MBEDTLS_DHM_C && defined(MBEDTLS_SSL_SRV_C) */
3609 
3610 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
3611 
3620  unsigned int bitlen);
3621 #endif /* MBEDTLS_DHM_C && MBEDTLS_SSL_CLI_C */
3622 
3623 #if defined(MBEDTLS_ECP_C)
3624 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
3625 
3667  const mbedtls_ecp_group_id *curves);
3668 #endif /* MBEDTLS_DEPRECATED_REMOVED */
3669 #endif /* MBEDTLS_ECP_C */
3670 
3709  const uint16_t *groups);
3710 
3711 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
3712 #if !defined(MBEDTLS_DEPRECATED_REMOVED) && defined(MBEDTLS_SSL_PROTO_TLS1_2)
3713 
3743  const int *hashes);
3744 #endif /* !MBEDTLS_DEPRECATED_REMOVED && MBEDTLS_SSL_PROTO_TLS1_2 */
3745 
3756  const uint16_t *sig_algs);
3757 #endif /* MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
3758 
3759 #if defined(MBEDTLS_X509_CRT_PARSE_C)
3760 
3778 int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname);
3779 #endif /* MBEDTLS_X509_CRT_PARSE_C */
3780 
3781 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
3782 
3800 const unsigned char *mbedtls_ssl_get_hs_sni(mbedtls_ssl_context *ssl,
3801  size_t *name_len);
3802 
3818 int mbedtls_ssl_set_hs_own_cert(mbedtls_ssl_context *ssl,
3819  mbedtls_x509_crt *own_cert,
3820  mbedtls_pk_context *pk_key);
3821 
3833 void mbedtls_ssl_set_hs_ca_chain(mbedtls_ssl_context *ssl,
3834  mbedtls_x509_crt *ca_chain,
3835  mbedtls_x509_crl *ca_crl);
3836 
3837 #if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
3838 
3848 void mbedtls_ssl_set_hs_dn_hints(mbedtls_ssl_context *ssl,
3849  const mbedtls_x509_crt *crt);
3850 #endif /* MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
3851 
3862 void mbedtls_ssl_set_hs_authmode(mbedtls_ssl_context *ssl,
3863  int authmode);
3864 
3888  int (*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *,
3889  size_t),
3890  void *p_sni);
3891 #endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION */
3892 
3893 #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
3894 
3912 int mbedtls_ssl_set_hs_ecjpake_password(mbedtls_ssl_context *ssl,
3913  const unsigned char *pw,
3914  size_t pw_len);
3915 
3930 int mbedtls_ssl_set_hs_ecjpake_password_opaque(mbedtls_ssl_context *ssl,
3931  mbedtls_svc_key_id_t pwd);
3932 #endif /*MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
3933 
3934 #if defined(MBEDTLS_SSL_ALPN)
3935 
3947 int mbedtls_ssl_conf_alpn_protocols(mbedtls_ssl_config *conf, const char **protos);
3948 
3958 const char *mbedtls_ssl_get_alpn_protocol(const mbedtls_ssl_context *ssl);
3959 #endif /* MBEDTLS_SSL_ALPN */
3960 
3961 #if defined(MBEDTLS_SSL_DTLS_SRTP)
3962 #if defined(MBEDTLS_DEBUG_C)
3963 static inline const char *mbedtls_ssl_get_srtp_profile_as_string(mbedtls_ssl_srtp_profile profile)
3964 {
3965  switch (profile) {
3967  return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80";
3969  return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32";
3971  return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80";
3973  return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32";
3974  default: break;
3975  }
3976  return "";
3977 }
3978 #endif /* MBEDTLS_DEBUG_C */
3979 
3993  int support_mki_value);
3994 
4015  (mbedtls_ssl_config *conf,
4016  const mbedtls_ssl_srtp_profile *profiles);
4017 
4034 int mbedtls_ssl_dtls_srtp_set_mki_value(mbedtls_ssl_context *ssl,
4035  unsigned char *mki_value,
4036  uint16_t mki_len);
4055 void mbedtls_ssl_get_dtls_srtp_negotiation_result(const mbedtls_ssl_context *ssl,
4056  mbedtls_dtls_srtp_info *dtls_srtp_info);
4057 #endif /* MBEDTLS_SSL_DTLS_SRTP */
4058 
4059 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
4060 
4078  int minor);
4079 #endif /* MBEDTLS_DEPRECATED_REMOVED */
4080 
4093 static inline void mbedtls_ssl_conf_max_tls_version(mbedtls_ssl_config *conf,
4094  mbedtls_ssl_protocol_version tls_version)
4095 {
4096  conf->MBEDTLS_PRIVATE(max_tls_version) = tls_version;
4097 }
4098 
4099 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
4100 
4135  int minor);
4136 #endif /* MBEDTLS_DEPRECATED_REMOVED */
4137 
4150 static inline void mbedtls_ssl_conf_min_tls_version(mbedtls_ssl_config *conf,
4151  mbedtls_ssl_protocol_version tls_version)
4152 {
4153  conf->MBEDTLS_PRIVATE(min_tls_version) = tls_version;
4154 }
4155 
4156 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
4157 
4169 #endif /* MBEDTLS_SSL_ENCRYPT_THEN_MAC */
4170 
4171 #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
4172 
4184 #endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */
4185 
4186 #if defined(MBEDTLS_SSL_SRV_C)
4187 
4197  char cert_req_ca_list);
4198 #endif /* MBEDTLS_SSL_SRV_C */
4199 
4200 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
4201 
4235 int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code);
4236 #endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
4237 
4238 #if defined(MBEDTLS_SSL_SRV_C)
4239 
4249 #endif /* MBEDTLS_SSL_SRV_C */
4250 
4251 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
4252  defined(MBEDTLS_SSL_CLI_C)
4253 
4263 void mbedtls_ssl_conf_session_tickets(mbedtls_ssl_config *conf, int use_tickets);
4264 #endif /* MBEDTLS_SSL_SESSION_TICKETS &&
4265  MBEDTLS_SSL_CLI_C */
4266 
4267 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
4268  defined(MBEDTLS_SSL_SRV_C) && \
4269  defined(MBEDTLS_SSL_PROTO_TLS1_3)
4270 
4287 void mbedtls_ssl_conf_new_session_tickets(mbedtls_ssl_config *conf,
4288  uint16_t num_tickets);
4289 #endif /* MBEDTLS_SSL_SESSION_TICKETS &&
4290  MBEDTLS_SSL_SRV_C &&
4291  MBEDTLS_SSL_PROTO_TLS1_3*/
4292 
4293 #if defined(MBEDTLS_SSL_RENEGOTIATION)
4294 
4311 void mbedtls_ssl_conf_renegotiation(mbedtls_ssl_config *conf, int renegotiation);
4312 #endif /* MBEDTLS_SSL_RENEGOTIATION */
4313 
4341 void mbedtls_ssl_conf_legacy_renegotiation(mbedtls_ssl_config *conf, int allow_legacy);
4342 
4343 #if defined(MBEDTLS_SSL_RENEGOTIATION)
4344 
4381 void mbedtls_ssl_conf_renegotiation_enforced(mbedtls_ssl_config *conf, int max_records);
4382 
4409  const unsigned char period[8]);
4410 #endif /* MBEDTLS_SSL_RENEGOTIATION */
4411 
4450 int mbedtls_ssl_check_pending(const mbedtls_ssl_context *ssl);
4451 
4467 size_t mbedtls_ssl_get_bytes_avail(const mbedtls_ssl_context *ssl);
4468 
4481 uint32_t mbedtls_ssl_get_verify_result(const mbedtls_ssl_context *ssl);
4482 
4490 int mbedtls_ssl_get_ciphersuite_id_from_ssl(const mbedtls_ssl_context *ssl);
4491 
4499 const char *mbedtls_ssl_get_ciphersuite(const mbedtls_ssl_context *ssl);
4500 
4501 
4514  const mbedtls_ssl_context *ssl)
4515 {
4516  return ssl->MBEDTLS_PRIVATE(tls_version);
4517 }
4518 
4526 const char *mbedtls_ssl_get_version(const mbedtls_ssl_context *ssl);
4527 
4536 int mbedtls_ssl_get_record_expansion(const mbedtls_ssl_context *ssl);
4537 
4563 int mbedtls_ssl_get_max_out_record_payload(const mbedtls_ssl_context *ssl);
4564 
4583 int mbedtls_ssl_get_max_in_record_payload(const mbedtls_ssl_context *ssl);
4584 
4585 #if defined(MBEDTLS_X509_CRT_PARSE_C)
4586 
4616 const mbedtls_x509_crt *mbedtls_ssl_get_peer_cert(const mbedtls_ssl_context *ssl);
4617 #endif /* MBEDTLS_X509_CRT_PARSE_C */
4618 
4619 #if defined(MBEDTLS_SSL_CLI_C)
4620 
4654 int mbedtls_ssl_get_session(const mbedtls_ssl_context *ssl,
4655  mbedtls_ssl_session *session);
4656 #endif /* MBEDTLS_SSL_CLI_C */
4657 
4713 int mbedtls_ssl_handshake(mbedtls_ssl_context *ssl);
4714 
4726 static inline int mbedtls_ssl_is_handshake_over(mbedtls_ssl_context *ssl)
4727 {
4728  return ssl->MBEDTLS_PRIVATE(state) >= MBEDTLS_SSL_HANDSHAKE_OVER;
4729 }
4730 
4764 int mbedtls_ssl_handshake_step(mbedtls_ssl_context *ssl);
4765 
4766 #if defined(MBEDTLS_SSL_RENEGOTIATION)
4767 
4790 int mbedtls_ssl_renegotiate(mbedtls_ssl_context *ssl);
4791 #endif /* MBEDTLS_SSL_RENEGOTIATION */
4792 
4870 int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len);
4871 
4932 int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len);
4933 
4950 int mbedtls_ssl_send_alert_message(mbedtls_ssl_context *ssl,
4951  unsigned char level,
4952  unsigned char message);
4966 int mbedtls_ssl_close_notify(mbedtls_ssl_context *ssl);
4967 
4968 #if defined(MBEDTLS_SSL_EARLY_DATA)
4969 
4970 #if defined(MBEDTLS_SSL_SRV_C)
4971 
5015 int mbedtls_ssl_read_early_data(mbedtls_ssl_context *ssl,
5016  unsigned char *buf, size_t len);
5017 #endif /* MBEDTLS_SSL_SRV_C */
5018 
5019 #if defined(MBEDTLS_SSL_CLI_C)
5020 
5076 int mbedtls_ssl_write_early_data(mbedtls_ssl_context *ssl,
5077  const unsigned char *buf, size_t len);
5078 
5079 #define MBEDTLS_SSL_EARLY_DATA_STATUS_NOT_SENT 0
5080 #define MBEDTLS_SSL_EARLY_DATA_STATUS_ACCEPTED 1
5081 #define MBEDTLS_SSL_EARLY_DATA_STATUS_REJECTED 2
5082 
5108 int mbedtls_ssl_get_early_data_status(mbedtls_ssl_context *ssl);
5109 #endif /* MBEDTLS_SSL_CLI_C */
5110 
5111 #endif /* MBEDTLS_SSL_EARLY_DATA */
5112 
5118 void mbedtls_ssl_free(mbedtls_ssl_context *ssl);
5119 
5120 #if defined(MBEDTLS_SSL_CONTEXT_SERIALIZATION)
5121 
5177 int mbedtls_ssl_context_save(mbedtls_ssl_context *ssl,
5178  unsigned char *buf,
5179  size_t buf_len,
5180  size_t *olen);
5181 
5250 int mbedtls_ssl_context_load(mbedtls_ssl_context *ssl,
5251  const unsigned char *buf,
5252  size_t len);
5253 #endif /* MBEDTLS_SSL_CONTEXT_SERIALIZATION */
5254 
5266 
5283  int endpoint, int transport, int preset);
5284 
5291 
5297 void mbedtls_ssl_session_init(mbedtls_ssl_session *session);
5298 
5308 void mbedtls_ssl_session_free(mbedtls_ssl_session *session);
5309 
5326  const unsigned char *secret, size_t slen,
5327  const char *label,
5328  const unsigned char *random, size_t rlen,
5329  unsigned char *dstbuf, size_t dlen);
5330 
5331 #ifdef __cplusplus
5332 }
5333 #endif
5334 
5335 #endif /* ssl.h */
unsigned char _pms_ecdhe_psk[4+MBEDTLS_ECP_MAX_BYTES +MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:653
int mbedtls_ssl_tls_prf(const mbedtls_tls_prf_types prf, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen)
TLS-PRF function for key derivation.
const unsigned char * mbedtls_ssl_get_hs_sni(mbedtls_ssl_context *ssl, size_t *name_len)
Retrieve SNI extension value for the current handshake. Available in f_cert_cb of mbedtls_ssl_conf_ce...
Public key container.
Definition: pk.h:233
#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80
Definition: ssl.h:1152
void mbedtls_ssl_set_hs_ca_chain(mbedtls_ssl_context *ssl, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate for the current handshake.
int mbedtls_ssl_ticket_parse_t(void *p_ticket, mbedtls_ssl_session *session, unsigned char *buf, size_t len)
Callback type: parse and load session ticket.
Definition: ssl.h:2521
const char * mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id)
Return the name of the ciphersuite associated with the given ID.
void mbedtls_ssl_conf_encrypt_then_mac(mbedtls_ssl_config *conf, char etm)
Enable or disable Encrypt-then-MAC (Default: MBEDTLS_SSL_ETM_ENABLED)
int mbedtls_ssl_cookie_write_t(void *ctx, unsigned char **p, unsigned char *end, const unsigned char *info, size_t ilen)
Callback type: generate a cookie.
Definition: ssl.h:2788
int mbedtls_ssl_dtls_srtp_set_mki_value(mbedtls_ssl_context *ssl, unsigned char *mki_value, uint16_t mki_len)
Set the mki_value for the current DTLS-SRTP session.
int mbedtls_ssl_cookie_check_t(void *ctx, const unsigned char *cookie, size_t clen, const unsigned char *info, size_t ilen)
Callback type: verify a cookie.
Definition: ssl.h:2805
void mbedtls_ssl_set_timer_cb(mbedtls_ssl_context *ssl, void *p_timer, mbedtls_ssl_set_timer_t *f_set_timer, mbedtls_ssl_get_timer_t *f_get_timer)
Set the timer callbacks (Mandatory for DTLS.)
struct mbedtls_ssl_sig_hash_set_t mbedtls_ssl_sig_hash_set_t
Definition: ssl.h:828
uint16_t mbedtls_ssl_srtp_profile
Definition: ssl.h:1157
void mbedtls_ssl_conf_extended_master_secret(mbedtls_ssl_config *conf, char ems)
Enable or disable Extended Master Secret negotiation. (Default: MBEDTLS_SSL_EXTENDED_MS_ENABLED) ...
int mbedtls_ssl_get_max_in_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum incoming record payload in bytes.
int mbedtls_ssl_send_t(void *ctx, const unsigned char *buf, size_t len)
Callback type: send data on the network.
Definition: ssl.h:727
#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32
Definition: ssl.h:1153
void mbedtls_ssl_set_verify(mbedtls_ssl_context *ssl, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set a connection-specific verification callback (optional).
int mbedtls_ssl_recv_t(void *ctx, unsigned char *buf, size_t len)
Callback type: receive data from the network.
Definition: ssl.h:751
This file provides an API for Elliptic Curves over GF(P) (ECP).
static void mbedtls_ssl_set_user_data_n(mbedtls_ssl_context *ssl, uintptr_t n)
Set the user data in an SSL context to an integer.
Definition: ssl.h:2656
void mbedtls_ssl_conf_preference_order(mbedtls_ssl_config *conf, int order)
Pick the ciphersuites order according to the second parameter in the SSL Server module (MBEDTLS_SSL_S...
void mbedtls_ssl_export_keys_t(void *p_expkey, mbedtls_ssl_key_export_type type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type)
Callback type: Export key alongside random values for session identification, and PRF for implementat...
Definition: ssl.h:1293
Platform Security Architecture cryptography module.
unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]
Definition: ssl.h:633
void mbedtls_ssl_conf_verify(mbedtls_ssl_config *conf, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set the verification callback (Optional).
unsigned char _pms_rsa[48]
Definition: ssl.h:630
unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]
Definition: ssl.h:639
int mbedtls_ssl_get_own_cid(mbedtls_ssl_context *ssl, int *enabled, unsigned char own_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX], size_t *own_cid_len)
Get information about our request for usage of the CID extension in the current connection.
static const mbedtls_ssl_config * mbedtls_ssl_context_get_config(const mbedtls_ssl_context *ssl)
Return the SSL configuration structure associated with the given SSL context.
Definition: ssl.h:2083
int mbedtls_ssl_get_max_out_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum outgoing record payload in bytes.
void mbedtls_ssl_conf_renegotiation(mbedtls_ssl_config *conf, int renegotiation)
Enable / Disable renegotiation support for connection when initiated by peer (Default: MBEDTLS_SSL_RE...
static void mbedtls_ssl_conf_cert_cb(mbedtls_ssl_config *conf, mbedtls_ssl_hs_cb_t f_cert_cb)
Set the certificate selection callback (server-side only).
Definition: ssl.h:2465
int mbedtls_ssl_conf_dh_param_bin(mbedtls_ssl_config *conf, const unsigned char *dhm_P, size_t P_len, const unsigned char *dhm_G, size_t G_len)
Set the Diffie-Hellman public P and G values from big-endian binary presentations. (Default values: MBEDTLS_DHM_RFC3526_MODP_2048_[PG]_BIN)
void mbedtls_ssl_conf_sni(mbedtls_ssl_config *conf, int(*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_sni)
Set server side ServerName TLS extension callback (optional, server-side only).
#define MBEDTLS_PRIVATE(member)
void mbedtls_ssl_conf_dtls_anti_replay(mbedtls_ssl_config *conf, char mode)
Enable or disable anti-replay protection for DTLS. (DTLS only, no effect on TLS.) Default: enabled...
int(* mbedtls_x509_crt_ca_cb_t)(void *p_ctx, mbedtls_x509_crt const *child, mbedtls_x509_crt **candidate_cas)
The type of trusted certificate callbacks.
Definition: x509_crt.h:775
void mbedtls_ssl_conf_srtp_mki_value_supported(mbedtls_ssl_config *conf, int support_mki_value)
Manage support for mki(master key id) value in use_srtp extension. MKI is an optional part of SRTP us...
#define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH
Definition: ssl.h:1139
uint32_t mbedtls_ssl_get_verify_result(const mbedtls_ssl_context *ssl)
Return the result of the certificate verification.
void mbedtls_ssl_conf_session_tickets_cb(mbedtls_ssl_config *conf, mbedtls_ssl_ticket_write_t *f_ticket_write, mbedtls_ssl_ticket_parse_t *f_ticket_parse, void *p_ticket)
Configure SSL session ticket callbacks (server only). (Default: none.)
int mbedtls_ssl_set_cid(mbedtls_ssl_context *ssl, int enable, unsigned char const *own_cid, size_t own_cid_len)
Configure the use of the Connection ID (CID) extension in the next handshake.
int mbedtls_ssl_check_pending(const mbedtls_ssl_context *ssl)
Check if there is data already read from the underlying transport but not yet processed.
static uintptr_t mbedtls_ssl_get_user_data_n(mbedtls_ssl_context *ssl)
Retrieve the user data in an SSL context as an integer.
Definition: ssl.h:2689
const mbedtls_x509_crt * mbedtls_ssl_get_peer_cert(const mbedtls_ssl_context *ssl)
Return the peer certificate from the current connection.
int mbedtls_ssl_session_save(const mbedtls_ssl_session *session, unsigned char *buf, size_t buf_len, size_t *olen)
Save session structure as serialized data in a buffer. On client, this can be used for saving session...
int mbedtls_ssl_send_alert_message(mbedtls_ssl_context *ssl, unsigned char level, unsigned char message)
Send an alert message.
int mbedtls_ssl_recv_timeout_t(void *ctx, unsigned char *buf, size_t len, uint32_t timeout)
Callback type: receive data from the network, with timeout.
Definition: ssl.h:777
SSL Ciphersuites for mbed TLS.
void mbedtls_ssl_conf_session_cache(mbedtls_ssl_config *conf, void *p_cache, mbedtls_ssl_cache_get_t *f_get_cache, mbedtls_ssl_cache_set_t *f_set_cache)
Set the session cache callbacks (server-side only) If not set, no session resuming is done (except if...
void mbedtls_ssl_conf_renegotiation_period(mbedtls_ssl_config *conf, const unsigned char period[8])
Set record counter threshold for periodic renegotiation. (Default: 2^48 - 1)
unsigned char _pms_dhe_psk[4+MBEDTLS_MPI_MAX_SIZE +MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:646
void mbedtls_ssl_conf_sig_algs(mbedtls_ssl_config *conf, const uint16_t *sig_algs)
Configure allowed signature algorithms for use in TLS 1.3.
int mbedtls_ssl_cache_set_t(void *data, unsigned char const *session_id, size_t session_id_len, const mbedtls_ssl_session *session)
Callback type: server-side session cache setter.
Definition: ssl.h:894
Multi-precision integer library.
int mbedtls_ssl_conf_psk(mbedtls_ssl_config *conf, const unsigned char *psk, size_t psk_len, const unsigned char *psk_identity, size_t psk_identity_len)
Configure pre-shared keys (PSKs) and their identities to be used in PSK-based ciphersuites.
int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code)
Set the maximum fragment length to emit and/or negotiate. (Typical: the smaller of MBEDTLS_SSL_IN_CON...
Common and shared functions used by multiple modules in the Mbed TLS library.
time_t mbedtls_time_t
Definition: platform_time.h:39
int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Try to write exactly 'len' application data bytes.
void mbedtls_ssl_conf_cert_req_ca_list(mbedtls_ssl_config *conf, char cert_req_ca_list)
Whether to send a list of acceptable CAs in CertificateRequest messages. (Default: do send) ...
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_curves(mbedtls_ssl_config *conf, const mbedtls_ecp_group_id *curves)
Set the allowed curves in order of preference.
int mbedtls_ssl_close_notify(mbedtls_ssl_context *ssl)
Notify the peer that the connection is being closed.
struct mbedtls_ssl_flight_item mbedtls_ssl_flight_item
Definition: ssl.h:833
int mbedtls_ssl_cache_get_t(void *data, unsigned char const *session_id, size_t session_id_len, mbedtls_ssl_session *session)
Callback type: server-side session cache getter.
Definition: ssl.h:872
void mbedtls_ssl_conf_session_tickets(mbedtls_ssl_config *conf, int use_tickets)
Enable / Disable session tickets (client only). (Default: MBEDTLS_SSL_SESSION_TICKETS_ENABLED.)
static void mbedtls_ssl_conf_dn_hints(mbedtls_ssl_config *conf, const mbedtls_x509_crt *crt)
Set DN hints sent to client in CertificateRequest message.
Definition: ssl.h:3310
void mbedtls_ssl_free(mbedtls_ssl_context *ssl)
Free referenced items in an SSL context and clear memory.
void mbedtls_ssl_conf_endpoint(mbedtls_ssl_config *conf, int endpoint)
Set the current endpoint type.
void mbedtls_ssl_session_free(mbedtls_ssl_session *session)
Free referenced items in an SSL session including the peer certificate and clear memory.
mbedtls_ssl_protocol_version
Definition: ssl.h:1172
static void * mbedtls_ssl_get_user_data_p(mbedtls_ssl_context *ssl)
Retrieve the user data in an SSL context as a pointer.
Definition: ssl.h:2673
struct mbedtls_ssl_transform mbedtls_ssl_transform
Definition: ssl.h:826
#define MBEDTLS_TLS1_3_MD_MAX_SIZE
Definition: ssl.h:662
const char * mbedtls_ssl_get_alpn_protocol(const mbedtls_ssl_context *ssl)
Get the name of the negotiated Application Layer Protocol. This function should be called after the h...
void mbedtls_ssl_conf_dhm_min_bitlen(mbedtls_ssl_config *conf, unsigned int bitlen)
Set the minimum length for Diffie-Hellman parameters. (Client-side only.) (Default: 1024 bits...
int mbedtls_ssl_get_ciphersuite_id_from_ssl(const mbedtls_ssl_context *ssl)
Return the id of the current ciphersuite.
void mbedtls_ssl_conf_dtls_cookies(mbedtls_ssl_config *conf, mbedtls_ssl_cookie_write_t *f_cookie_write, mbedtls_ssl_cookie_check_t *f_cookie_check, void *p_cookie)
Register callbacks for DTLS cookies (Server only. DTLS only.)
int mbedtls_ssl_conf_cid(mbedtls_ssl_config *conf, size_t len, int ignore_other_cids)
Specify the length of Connection IDs for incoming encrypted DTLS records, as well as the behaviour on...
int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name)
Return the ID of the ciphersuite associated with the given name.
void mbedtls_ssl_conf_transport(mbedtls_ssl_config *conf, int transport)
Set the transport type (TLS or DTLS). Default: TLS.
mbedtls_ssl_key_export_type
Definition: ssl.h:1266
void mbedtls_ssl_get_dtls_srtp_negotiation_result(const mbedtls_ssl_context *ssl, mbedtls_dtls_srtp_info *dtls_srtp_info)
Get the negotiated DTLS-SRTP information: Protection profile and MKI value.
mbedtls_ssl_states
Definition: ssl.h:675
#define MBEDTLS_SSL_SEQUENCE_NUMBER_LEN
Definition: ssl.h:666
void mbedtls_ssl_conf_renegotiation_enforced(mbedtls_ssl_config *conf, int max_records)
Enforce renegotiation requests. (Default: enforced, max_records = 16)
void mbedtls_ssl_set_mtu(mbedtls_ssl_context *ssl, uint16_t mtu)
Set the Maximum Transport Unit (MTU). Special value: 0 means unset (no limit). This represents the ma...
int mbedtls_ssl_set_client_transport_id(mbedtls_ssl_context *ssl, const unsigned char *info, size_t ilen)
Set client's transport-level identification info. (Server only. DTLS only.)
void mbedtls_ssl_set_bio(mbedtls_ssl_context *ssl, void *p_bio, mbedtls_ssl_send_t *f_send, mbedtls_ssl_recv_t *f_recv, mbedtls_ssl_recv_timeout_t *f_recv_timeout)
Set the underlying BIO callbacks for write, read and read-with-timeout.
Macro wrapper for struct's members.
static uintptr_t mbedtls_ssl_conf_get_user_data_n(mbedtls_ssl_config *conf)
Retrieve the user data in an SSL configuration as an integer.
Definition: ssl.h:2626
int mbedtls_ssl_context_save(mbedtls_ssl_context *ssl, unsigned char *buf, size_t buf_len, size_t *olen)
Save an active connection as serialized data in a buffer. This allows the freeing or re-using of the ...
void mbedtls_ssl_conf_rng(mbedtls_ssl_config *conf, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Set the random number generator callback.
int mbedtls_ssl_conf_alpn_protocols(mbedtls_ssl_config *conf, const char **protos)
Set the supported Application Layer Protocols.
void mbedtls_ssl_conf_cert_profile(mbedtls_ssl_config *conf, const mbedtls_x509_crt_profile *profile)
Set the X.509 security profile used for verification.
This file contains Diffie-Hellman-Merkle (DHM) key exchange definitions and functions.
X.509 certificate parsing and writing.
int mbedtls_ssl_context_load(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Load serialized connection data to an SSL context.
#define MBEDTLS_PSK_MAX_LEN
Definition: ssl.h:623
void mbedtls_ssl_init(mbedtls_ssl_context *ssl)
Initialize an SSL context Just makes the context ready for mbedtls_ssl_setup() or mbedtls_ssl_free() ...
const char * mbedtls_ssl_get_ciphersuite(const mbedtls_ssl_context *ssl)
Return the name of the current ciphersuite.
#define MBEDTLS_DEPRECATED
Definition: platform_util.h:53
void mbedtls_ssl_set_export_keys_cb(mbedtls_ssl_context *ssl, mbedtls_ssl_export_keys_t *f_export_keys, void *p_export_keys)
Configure a key export callback. (Default: none.)
mbedtls_ecp_group_id
Definition: ecp.h:113
int mbedtls_ssl_get_timer_t(void *ctx)
Callback type: get status of timers/delays.
Definition: ssl.h:818
The DHM context structure.
Definition: dhm.h:113
void mbedtls_ssl_conf_dbg(mbedtls_ssl_config *conf, void(*f_dbg)(void *, int, const char *, int, const char *), void *p_dbg)
Set the debug callback.
int(* mbedtls_ssl_hs_cb_t)(mbedtls_ssl_context *ssl)
Callback type: generic handshake callback.
Definition: ssl.h:1317
void mbedtls_ssl_config_init(mbedtls_ssl_config *conf)
Initialize an SSL configuration context Just makes the context ready for mbedtls_ssl_config_defaults(...
static void mbedtls_ssl_conf_set_user_data_n(mbedtls_ssl_config *conf, uintptr_t n)
Set the user data in an SSL configuration to an integer.
Definition: ssl.h:2593
int mbedtls_ssl_get_record_expansion(const mbedtls_ssl_context *ssl)
Return the (maximum) number of bytes added by the record layer: header + encryption/MAC overhead (inc...
This file contains ECDH definitions and functions.
int mbedtls_ssl_conf_dh_param_ctx(mbedtls_ssl_config *conf, mbedtls_dhm_context *dhm_ctx)
Set the Diffie-Hellman public P and G values, read from existing context (server-side only) ...
Build-time configuration info.
void mbedtls_ssl_conf_groups(mbedtls_ssl_config *conf, const uint16_t *groups)
Set the allowed groups in order of preference.
int mbedtls_ssl_set_session(mbedtls_ssl_context *ssl, const mbedtls_ssl_session *session)
Load a session for session resumption.
#define MBEDTLS_MPI_MAX_SIZE
Definition: bignum.h:85
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_sig_hashes(mbedtls_ssl_config *conf, const int *hashes)
Set the allowed hashes for signatures during the handshake.
void mbedtls_ssl_set_datagram_packing(mbedtls_ssl_context *ssl, unsigned allow_packing)
Allow or disallow packing of multiple handshake records within a single datagram. ...
static void * mbedtls_ssl_conf_get_user_data_p(mbedtls_ssl_config *conf)
Retrieve the user data in an SSL configuration as a pointer.
Definition: ssl.h:2610
int mbedtls_ssl_set_hs_own_cert(mbedtls_ssl_context *ssl, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate and key for the current handshake.
int mbedtls_ssl_conf_own_cert(mbedtls_ssl_config *conf, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate chain and private key.
static const char * mbedtls_ssl_get_srtp_profile_as_string(mbedtls_ssl_srtp_profile profile)
Definition: ssl.h:3969
psa_key_id_t mbedtls_svc_key_id_t
Definition: crypto_types.h:297
int mbedtls_ssl_setup(mbedtls_ssl_context *ssl, const mbedtls_ssl_config *conf)
Set up an SSL context for use.
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_max_version(mbedtls_ssl_config *conf, int major, int minor)
Set the maximum supported version sent from the client side and/or accepted at the server side...
void mbedtls_ssl_conf_legacy_renegotiation(mbedtls_ssl_config *conf, int allow_legacy)
Prevent or allow legacy renegotiation. (Default: MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION) ...
static void mbedtls_ssl_set_user_data_p(mbedtls_ssl_context *ssl, void *p)
Set the user data in an SSL context to a pointer.
Definition: ssl.h:2642
unsigned char _pms_rsa_psk[52+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:649
int mbedtls_ssl_renegotiate(mbedtls_ssl_context *ssl)
Initiate an SSL renegotiation on the running connection. Client: perform the renegotiation right now...
#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32
Definition: ssl.h:1151
static void mbedtls_ssl_conf_set_user_data_p(mbedtls_ssl_config *conf, void *p)
Set the user data in an SSL configuration to a pointer.
Definition: ssl.h:2579
MPI structure.
Definition: bignum.h:205
X.509 certificate revocation list parsing.
void mbedtls_ssl_conf_read_timeout(mbedtls_ssl_config *conf, uint32_t timeout)
Set the timeout period for mbedtls_ssl_read() (Default: no timeout.)
void mbedtls_ssl_config_free(mbedtls_ssl_config *conf)
Free an SSL configuration context.
int mbedtls_ssl_conf_dtls_srtp_protection_profiles(mbedtls_ssl_config *conf, const mbedtls_ssl_srtp_profile *profiles)
Set the supported DTLS-SRTP protection profiles.
#define MBEDTLS_SSL_CID_OUT_LEN_MAX
Definition: ssl.h:408
int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len)
Read at most 'len' application data bytes.
struct mbedtls_ssl_key_cert mbedtls_ssl_key_cert
Definition: ssl.h:830
static mbedtls_ssl_protocol_version mbedtls_ssl_get_version_number(const mbedtls_ssl_context *ssl)
Return the (D)TLS protocol version negotiated in the given connection.
Definition: ssl.h:4519
void mbedtls_ssl_set_timer_t(void *ctx, uint32_t int_ms, uint32_t fin_ms)
Callback type: set a pair of timers/delays to watch.
Definition: ssl.h:803
size_t mbedtls_ssl_get_bytes_avail(const mbedtls_ssl_context *ssl)
Return the number of application data bytes remaining to be read from the current record...
#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80
Definition: ssl.h:1150
#define MBEDTLS_SSL_CID_IN_LEN_MAX
Definition: ssl.h:404
int mbedtls_ssl_get_peer_cid(mbedtls_ssl_context *ssl, int *enabled, unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX], size_t *peer_cid_len)
Get information about the use of the CID extension in the current connection.
void mbedtls_ssl_session_init(mbedtls_ssl_session *session)
Initialize SSL session structure.
struct mbedtls_dtls_srtp_info_t mbedtls_dtls_srtp_info
int mbedtls_ssl_ticket_write_t(void *p_ticket, const mbedtls_ssl_session *session, unsigned char *start, const unsigned char *end, size_t *tlen, uint32_t *lifetime)
Callback type: generate and write session ticket.
Definition: ssl.h:2491
static int mbedtls_ssl_is_handshake_over(mbedtls_ssl_context *ssl)
After calling mbedtls_ssl_handshake() to start the SSL handshake you can call this function to check ...
Definition: ssl.h:4732
void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max)
Set retransmit timeout values for the DTLS handshake. (DTLS only, no effect on TLS.)
mbed TLS Platform time abstraction
int mbedtls_ssl_config_defaults(mbedtls_ssl_config *conf, int endpoint, int transport, int preset)
Load reasonable default SSL configuration values. (You need to call mbedtls_ssl_config_init() first...
void mbedtls_ssl_conf_ca_chain(mbedtls_ssl_config *conf, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate.
void mbedtls_ssl_conf_dtls_badmac_limit(mbedtls_ssl_config *conf, unsigned limit)
Set a limit on the number of records with a bad MAC before terminating the connection. (DTLS only, no effect on TLS.) Default: 0 (disabled).
unsigned char _pms_psk[4+2 *MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:642
int mbedtls_ssl_handshake(mbedtls_ssl_context *ssl)
Perform the SSL handshake.
void mbedtls_ssl_set_hs_authmode(mbedtls_ssl_context *ssl, int authmode)
Set authmode for the current handshake.
mbedtls_md_type_t
Supported message digests.
Definition: md.h:143
int mbedtls_ssl_handshake_step(mbedtls_ssl_context *ssl)
Perform a single step of the SSL handshake.
const char * mbedtls_ssl_get_version(const mbedtls_ssl_context *ssl)
Return the current TLS version.
void mbedtls_ssl_conf_authmode(mbedtls_ssl_config *conf, int authmode)
Set the certificate verification mode Default: NONE on server, REQUIRED on client.
int mbedtls_ssl_session_reset(mbedtls_ssl_context *ssl)
Reset an already initialized SSL context for re-use while retaining application-set variables...
int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname)
Set or reset the hostname to check against the received server certificate. It sets the ServerName TL...
struct mbedtls_ssl_handshake_params mbedtls_ssl_handshake_params
Definition: ssl.h:827
static void mbedtls_ssl_conf_min_tls_version(mbedtls_ssl_config *conf, mbedtls_ssl_protocol_version tls_version)
Set the minimum supported version sent from the client side and/or accepted at the server side...
Definition: ssl.h:4156
static void mbedtls_ssl_conf_max_tls_version(mbedtls_ssl_config *conf, mbedtls_ssl_protocol_version tls_version)
Set the maximum supported version sent from the client side and/or accepted at the server side...
Definition: ssl.h:4099
#define MBEDTLS_ECP_MAX_BYTES
Definition: ecp.h:350
int mbedtls_ssl_session_load(mbedtls_ssl_session *session, const unsigned char *buf, size_t len)
Load serialized session data into a session structure. On client, this can be used for loading saved ...
int mbedtls_ssl_set_hs_psk(mbedtls_ssl_context *ssl, const unsigned char *psk, size_t psk_len)
Set the pre-shared Key (PSK) for the current handshake.
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_min_version(mbedtls_ssl_config *conf, int major, int minor)
Set the minimum accepted SSL/TLS protocol version.
int mbedtls_ssl_get_session(const mbedtls_ssl_context *ssl, mbedtls_ssl_session *session)
Export a session in order to resume it later.
void mbedtls_ssl_conf_ciphersuites(mbedtls_ssl_config *conf, const int *ciphersuites)
Set the list of allowed ciphersuites and the preference order. First in the list has the highest pref...
#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN
Definition: ssl.h:428
void mbedtls_ssl_set_hs_dn_hints(mbedtls_ssl_context *ssl, const mbedtls_x509_crt *crt)
Set DN hints sent to client in CertificateRequest message.
void mbedtls_ssl_conf_psk_cb(mbedtls_ssl_config *conf, int(*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_psk)
Set the PSK callback (server-side only).
mbedtls_tls_prf_types
Definition: ssl.h:1257
int mbedtls_ssl_check_record(mbedtls_ssl_context const *ssl, unsigned char *buf, size_t buflen)
Check whether a buffer contains a valid and authentic record that has not been seen before...