Mbed TLS v2.28.10
Loading...
Searching...
No Matches
ssl.h
Go to the documentation of this file.
1
6/*
7 * Copyright The Mbed TLS Contributors
8 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
9 */
10#ifndef MBEDTLS_SSL_H
11#define MBEDTLS_SSL_H
12
13#if !defined(MBEDTLS_CONFIG_FILE)
14#include "mbedtls/config.h"
15#else
16#include MBEDTLS_CONFIG_FILE
17#endif
18
19#include "mbedtls/bignum.h"
20#include "mbedtls/ecp.h"
21
23
24#if defined(MBEDTLS_X509_CRT_PARSE_C)
25#include "mbedtls/x509_crt.h"
26#include "mbedtls/x509_crl.h"
27#endif
28
29#if defined(MBEDTLS_DHM_C)
30#include "mbedtls/dhm.h"
31#endif
32
33/* Adding guard for MBEDTLS_ECDSA_C to ensure no compile errors due
34 * to guards also being in ssl_srv.c and ssl_cli.c. There is a gap
35 * in functionality that access to ecdh_ctx structure is needed for
36 * MBEDTLS_ECDSA_C which does not seem correct.
37 */
38#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C)
39#include "mbedtls/ecdh.h"
40#endif
41
42#if defined(MBEDTLS_ZLIB_SUPPORT)
43
44#if defined(MBEDTLS_DEPRECATED_WARNING)
45#warning \
46 "Record compression support via MBEDTLS_ZLIB_SUPPORT is deprecated and will be removed in the next major revision of the library"
47#endif
48
49#if defined(MBEDTLS_DEPRECATED_REMOVED)
50#error \
51 "Record compression support via MBEDTLS_ZLIB_SUPPORT is deprecated and cannot be used if MBEDTLS_DEPRECATED_REMOVED is set"
52#endif
53
54#include "zlib.h"
55#endif
56
57#if defined(MBEDTLS_HAVE_TIME)
59#endif
60
61#if defined(MBEDTLS_USE_PSA_CRYPTO)
62#include "psa/crypto.h"
63#endif /* MBEDTLS_USE_PSA_CRYPTO */
64
65/*
66 * SSL Error codes
67 */
69#define MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE -0x7080
71#define MBEDTLS_ERR_SSL_BAD_INPUT_DATA -0x7100
73#define MBEDTLS_ERR_SSL_INVALID_MAC -0x7180
75#define MBEDTLS_ERR_SSL_INVALID_RECORD -0x7200
77#define MBEDTLS_ERR_SSL_CONN_EOF -0x7280
79#define MBEDTLS_ERR_SSL_UNKNOWN_CIPHER -0x7300
81#define MBEDTLS_ERR_SSL_NO_CIPHER_CHOSEN -0x7380
83#define MBEDTLS_ERR_SSL_NO_RNG -0x7400
85#define MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE -0x7480
87#define MBEDTLS_ERR_SSL_CERTIFICATE_TOO_LARGE -0x7500
89#define MBEDTLS_ERR_SSL_CERTIFICATE_REQUIRED -0x7580
91#define MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED -0x7600
93#define MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED -0x7680
95#define MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE -0x7700
97#define MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE -0x7780
99#define MBEDTLS_ERR_SSL_PEER_VERIFY_FAILED -0x7800
101#define MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY -0x7880
103#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_HELLO -0x7900
105#define MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO -0x7980
107#define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE -0x7A00
109#define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_REQUEST -0x7A80
111#define MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE -0x7B00
113#define MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO_DONE -0x7B80
115#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE -0x7C00
117#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_RP -0x7C80
119#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_CS -0x7D00
121#define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_VERIFY -0x7D80
123#define MBEDTLS_ERR_SSL_BAD_HS_CHANGE_CIPHER_SPEC -0x7E00
125#define MBEDTLS_ERR_SSL_BAD_HS_FINISHED -0x7E80
127#define MBEDTLS_ERR_SSL_ALLOC_FAILED -0x7F00
129#define MBEDTLS_ERR_SSL_HW_ACCEL_FAILED -0x7F80
131#define MBEDTLS_ERR_SSL_HW_ACCEL_FALLTHROUGH -0x6F80
133#define MBEDTLS_ERR_SSL_COMPRESSION_FAILED -0x6F00
135#define MBEDTLS_ERR_SSL_BAD_HS_PROTOCOL_VERSION -0x6E80
137#define MBEDTLS_ERR_SSL_BAD_HS_NEW_SESSION_TICKET -0x6E00
139#define MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED -0x6D80
141#define MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH -0x6D00
143#define MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY -0x6C80
145#define MBEDTLS_ERR_SSL_INTERNAL_ERROR -0x6C00
147#define MBEDTLS_ERR_SSL_COUNTER_WRAPPING -0x6B80
149#define MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO -0x6B00
151#define MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED -0x6A80
153#define MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL -0x6A00
155#define MBEDTLS_ERR_SSL_NO_USABLE_CIPHERSUITE -0x6980
157#define MBEDTLS_ERR_SSL_WANT_READ -0x6900
159#define MBEDTLS_ERR_SSL_WANT_WRITE -0x6880
161#define MBEDTLS_ERR_SSL_TIMEOUT -0x6800
163#define MBEDTLS_ERR_SSL_CLIENT_RECONNECT -0x6780
165#define MBEDTLS_ERR_SSL_UNEXPECTED_RECORD -0x6700
167#define MBEDTLS_ERR_SSL_NON_FATAL -0x6680
169#define MBEDTLS_ERR_SSL_INVALID_VERIFY_HASH -0x6600
171#define MBEDTLS_ERR_SSL_CONTINUE_PROCESSING -0x6580
173#define MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS -0x6500
175#define MBEDTLS_ERR_SSL_EARLY_MESSAGE -0x6480
177#define MBEDTLS_ERR_SSL_UNEXPECTED_CID -0x6000
179#define MBEDTLS_ERR_SSL_VERSION_MISMATCH -0x5F00
181#define MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS -0x7000
183#define MBEDTLS_ERR_SSL_BAD_CONFIG -0x5E80
185#define MBEDTLS_ERR_SSL_CACHE_ENTRY_NOT_FOUND -0x5E00
220#define MBEDTLS_ERR_SSL_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME -0x5D80
221
222/*
223 * Various constants
224 */
225#define MBEDTLS_SSL_MAJOR_VERSION_3 3
226#define MBEDTLS_SSL_MINOR_VERSION_0 0
227#define MBEDTLS_SSL_MINOR_VERSION_1 1
228#define MBEDTLS_SSL_MINOR_VERSION_2 2
229#define MBEDTLS_SSL_MINOR_VERSION_3 3
230#define MBEDTLS_SSL_MINOR_VERSION_4 4
232#define MBEDTLS_SSL_TRANSPORT_STREAM 0
233#define MBEDTLS_SSL_TRANSPORT_DATAGRAM 1
235#define MBEDTLS_SSL_MAX_HOST_NAME_LEN 255
236#define MBEDTLS_SSL_MAX_ALPN_NAME_LEN 255
238#define MBEDTLS_SSL_MAX_ALPN_LIST_LEN 65535
240/* RFC 6066 section 4, see also mfl_code_to_length in ssl_tls.c
241 * NONE must be zero so that memset()ing structure to zero works */
242#define MBEDTLS_SSL_MAX_FRAG_LEN_NONE 0
243#define MBEDTLS_SSL_MAX_FRAG_LEN_512 1
244#define MBEDTLS_SSL_MAX_FRAG_LEN_1024 2
245#define MBEDTLS_SSL_MAX_FRAG_LEN_2048 3
246#define MBEDTLS_SSL_MAX_FRAG_LEN_4096 4
247#define MBEDTLS_SSL_MAX_FRAG_LEN_INVALID 5
249#define MBEDTLS_SSL_IS_CLIENT 0
250#define MBEDTLS_SSL_IS_SERVER 1
251
252#define MBEDTLS_SSL_IS_NOT_FALLBACK 0
253#define MBEDTLS_SSL_IS_FALLBACK 1
254
255#define MBEDTLS_SSL_EXTENDED_MS_DISABLED 0
256#define MBEDTLS_SSL_EXTENDED_MS_ENABLED 1
257
258#define MBEDTLS_SSL_CID_DISABLED 0
259#define MBEDTLS_SSL_CID_ENABLED 1
260
261#define MBEDTLS_SSL_ETM_DISABLED 0
262#define MBEDTLS_SSL_ETM_ENABLED 1
263
264#define MBEDTLS_SSL_COMPRESS_NULL 0
265#define MBEDTLS_SSL_COMPRESS_DEFLATE 1
266
267#define MBEDTLS_SSL_VERIFY_NONE 0
268#define MBEDTLS_SSL_VERIFY_OPTIONAL 1
269#define MBEDTLS_SSL_VERIFY_REQUIRED 2
270#define MBEDTLS_SSL_VERIFY_UNSET 3 /* Used only for sni_authmode */
271
272#define MBEDTLS_SSL_LEGACY_RENEGOTIATION 0
273#define MBEDTLS_SSL_SECURE_RENEGOTIATION 1
274
275#define MBEDTLS_SSL_RENEGOTIATION_DISABLED 0
276#define MBEDTLS_SSL_RENEGOTIATION_ENABLED 1
277
278#define MBEDTLS_SSL_ANTI_REPLAY_DISABLED 0
279#define MBEDTLS_SSL_ANTI_REPLAY_ENABLED 1
280
281#define MBEDTLS_SSL_RENEGOTIATION_NOT_ENFORCED -1
282#define MBEDTLS_SSL_RENEGO_MAX_RECORDS_DEFAULT 16
283
284#define MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION 0
285#define MBEDTLS_SSL_LEGACY_ALLOW_RENEGOTIATION 1
286#define MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE 2
287
288#define MBEDTLS_SSL_TRUNC_HMAC_DISABLED 0
289#define MBEDTLS_SSL_TRUNC_HMAC_ENABLED 1
290#define MBEDTLS_SSL_TRUNCATED_HMAC_LEN 10 /* 80 bits, rfc 6066 section 7 */
291
292#define MBEDTLS_SSL_SESSION_TICKETS_DISABLED 0
293#define MBEDTLS_SSL_SESSION_TICKETS_ENABLED 1
294
295#define MBEDTLS_SSL_CBC_RECORD_SPLITTING_DISABLED 0
296#define MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED 1
297
298#define MBEDTLS_SSL_ARC4_ENABLED 0
299#define MBEDTLS_SSL_ARC4_DISABLED 1
300
301#define MBEDTLS_SSL_PRESET_DEFAULT 0
302#define MBEDTLS_SSL_PRESET_SUITEB 2
303
304#define MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED 1
305#define MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED 0
306
307#define MBEDTLS_SSL_DTLS_SRTP_MKI_UNSUPPORTED 0
308#define MBEDTLS_SSL_DTLS_SRTP_MKI_SUPPORTED 1
309
310/*
311 * Default range for DTLS retransmission timer value, in milliseconds.
312 * RFC 6347 4.2.4.1 says from 1 second to 60 seconds.
313 */
314#define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MIN 1000
315#define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MAX 60000
316
325#if !defined(MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME)
326#define MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME 86400
327#endif
328
329/*
330 * Maximum fragment length in bytes,
331 * determines the size of each of the two internal I/O buffers.
332 *
333 * Note: the RFC defines the default size of SSL / TLS messages. If you
334 * change the value here, other clients / servers may not be able to
335 * communicate with you anymore. Only change this value if you control
336 * both sides of the connection and have it reduced at both sides, or
337 * if you're using the Max Fragment Length extension and you know all your
338 * peers are using it too!
339 */
340#if !defined(MBEDTLS_SSL_MAX_CONTENT_LEN)
341#define MBEDTLS_SSL_MAX_CONTENT_LEN 16384
342#endif
343
344#if !defined(MBEDTLS_SSL_IN_CONTENT_LEN)
345#define MBEDTLS_SSL_IN_CONTENT_LEN MBEDTLS_SSL_MAX_CONTENT_LEN
346#endif
347
348#if !defined(MBEDTLS_SSL_OUT_CONTENT_LEN)
349#define MBEDTLS_SSL_OUT_CONTENT_LEN MBEDTLS_SSL_MAX_CONTENT_LEN
350#endif
351
352/*
353 * Maximum number of heap-allocated bytes for the purpose of
354 * DTLS handshake message reassembly and future message buffering.
355 */
356#if !defined(MBEDTLS_SSL_DTLS_MAX_BUFFERING)
357#define MBEDTLS_SSL_DTLS_MAX_BUFFERING 32768
358#endif
359
360/*
361 * Maximum length of CIDs for incoming and outgoing messages.
362 */
363#if !defined(MBEDTLS_SSL_CID_IN_LEN_MAX)
364#define MBEDTLS_SSL_CID_IN_LEN_MAX 32
365#endif
366
367#if !defined(MBEDTLS_SSL_CID_OUT_LEN_MAX)
368#define MBEDTLS_SSL_CID_OUT_LEN_MAX 32
369#endif
370
371#if !defined(MBEDTLS_SSL_CID_PADDING_GRANULARITY)
372#define MBEDTLS_SSL_CID_PADDING_GRANULARITY 16
373#endif
374
375#if !defined(MBEDTLS_SSL_TLS1_3_PADDING_GRANULARITY)
376#define MBEDTLS_SSL_TLS1_3_PADDING_GRANULARITY 1
377#endif
378
381/*
382 * Length of the verify data for secure renegotiation
383 */
384#if defined(MBEDTLS_SSL_PROTO_SSL3)
385#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 36
386#else
387#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 12
388#endif
389
390/*
391 * Signaling ciphersuite values (SCSV)
392 */
393#define MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO 0xFF
394#define MBEDTLS_SSL_FALLBACK_SCSV_VALUE 0x5600
396/*
397 * Supported Signature and Hash algorithms (For TLS 1.2)
398 * RFC 5246 section 7.4.1.4.1
399 */
400#define MBEDTLS_SSL_HASH_NONE 0
401#define MBEDTLS_SSL_HASH_MD5 1
402#define MBEDTLS_SSL_HASH_SHA1 2
403#define MBEDTLS_SSL_HASH_SHA224 3
404#define MBEDTLS_SSL_HASH_SHA256 4
405#define MBEDTLS_SSL_HASH_SHA384 5
406#define MBEDTLS_SSL_HASH_SHA512 6
407
408#define MBEDTLS_SSL_SIG_ANON 0
409#define MBEDTLS_SSL_SIG_RSA 1
410#define MBEDTLS_SSL_SIG_ECDSA 3
411
412/*
413 * Client Certificate Types
414 * RFC 5246 section 7.4.4 plus RFC 4492 section 5.5
415 */
416#define MBEDTLS_SSL_CERT_TYPE_RSA_SIGN 1
417#define MBEDTLS_SSL_CERT_TYPE_ECDSA_SIGN 64
418
419/*
420 * Message, alert and handshake types
421 */
422#define MBEDTLS_SSL_MSG_CHANGE_CIPHER_SPEC 20
423#define MBEDTLS_SSL_MSG_ALERT 21
424#define MBEDTLS_SSL_MSG_HANDSHAKE 22
425#define MBEDTLS_SSL_MSG_APPLICATION_DATA 23
426#define MBEDTLS_SSL_MSG_CID 25
427
428#define MBEDTLS_SSL_ALERT_LEVEL_WARNING 1
429#define MBEDTLS_SSL_ALERT_LEVEL_FATAL 2
430
431#define MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY 0 /* 0x00 */
432#define MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE 10 /* 0x0A */
433#define MBEDTLS_SSL_ALERT_MSG_BAD_RECORD_MAC 20 /* 0x14 */
434#define MBEDTLS_SSL_ALERT_MSG_DECRYPTION_FAILED 21 /* 0x15 */
435#define MBEDTLS_SSL_ALERT_MSG_RECORD_OVERFLOW 22 /* 0x16 */
436#define MBEDTLS_SSL_ALERT_MSG_DECOMPRESSION_FAILURE 30 /* 0x1E */
437#define MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE 40 /* 0x28 */
438#define MBEDTLS_SSL_ALERT_MSG_NO_CERT 41 /* 0x29 */
439#define MBEDTLS_SSL_ALERT_MSG_BAD_CERT 42 /* 0x2A */
440#define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT 43 /* 0x2B */
441#define MBEDTLS_SSL_ALERT_MSG_CERT_REVOKED 44 /* 0x2C */
442#define MBEDTLS_SSL_ALERT_MSG_CERT_EXPIRED 45 /* 0x2D */
443#define MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN 46 /* 0x2E */
444#define MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER 47 /* 0x2F */
445#define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA 48 /* 0x30 */
446#define MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED 49 /* 0x31 */
447#define MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR 50 /* 0x32 */
448#define MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR 51 /* 0x33 */
449#define MBEDTLS_SSL_ALERT_MSG_EXPORT_RESTRICTION 60 /* 0x3C */
450#define MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION 70 /* 0x46 */
451#define MBEDTLS_SSL_ALERT_MSG_INSUFFICIENT_SECURITY 71 /* 0x47 */
452#define MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR 80 /* 0x50 */
453#define MBEDTLS_SSL_ALERT_MSG_INAPROPRIATE_FALLBACK 86 /* 0x56 */
454#define MBEDTLS_SSL_ALERT_MSG_USER_CANCELED 90 /* 0x5A */
455#define MBEDTLS_SSL_ALERT_MSG_NO_RENEGOTIATION 100 /* 0x64 */
456#define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT 110 /* 0x6E */
457#define MBEDTLS_SSL_ALERT_MSG_UNRECOGNIZED_NAME 112 /* 0x70 */
458#define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_PSK_IDENTITY 115 /* 0x73 */
459#define MBEDTLS_SSL_ALERT_MSG_NO_APPLICATION_PROTOCOL 120 /* 0x78 */
460
461#define MBEDTLS_SSL_HS_HELLO_REQUEST 0
462#define MBEDTLS_SSL_HS_CLIENT_HELLO 1
463#define MBEDTLS_SSL_HS_SERVER_HELLO 2
464#define MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST 3
465#define MBEDTLS_SSL_HS_NEW_SESSION_TICKET 4
466#define MBEDTLS_SSL_HS_CERTIFICATE 11
467#define MBEDTLS_SSL_HS_SERVER_KEY_EXCHANGE 12
468#define MBEDTLS_SSL_HS_CERTIFICATE_REQUEST 13
469#define MBEDTLS_SSL_HS_SERVER_HELLO_DONE 14
470#define MBEDTLS_SSL_HS_CERTIFICATE_VERIFY 15
471#define MBEDTLS_SSL_HS_CLIENT_KEY_EXCHANGE 16
472#define MBEDTLS_SSL_HS_FINISHED 20
473
474/*
475 * TLS extensions
476 */
477#define MBEDTLS_TLS_EXT_SERVERNAME 0
478#define MBEDTLS_TLS_EXT_SERVERNAME_HOSTNAME 0
479
480#define MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH 1
481
482#define MBEDTLS_TLS_EXT_TRUNCATED_HMAC 4
483
484#define MBEDTLS_TLS_EXT_SUPPORTED_ELLIPTIC_CURVES 10
485#define MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS 11
486
487#define MBEDTLS_TLS_EXT_SIG_ALG 13
488
489#define MBEDTLS_TLS_EXT_USE_SRTP 14
490
491#define MBEDTLS_TLS_EXT_ALPN 16
492
493#define MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC 22 /* 0x16 */
494#define MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET 0x0017 /* 23 */
495
496#define MBEDTLS_TLS_EXT_SESSION_TICKET 35
497
498/* The value of the CID extension is still TBD as of
499 * draft-ietf-tls-dtls-connection-id-05
500 * (https://tools.ietf.org/html/draft-ietf-tls-dtls-connection-id-05).
501 *
502 * A future minor revision of Mbed TLS may change the default value of
503 * this option to match evolving standards and usage.
504 */
505#if !defined(MBEDTLS_TLS_EXT_CID)
506#define MBEDTLS_TLS_EXT_CID 254 /* TBD */
507#endif
508
509#define MBEDTLS_TLS_EXT_ECJPAKE_KKPP 256 /* experimental */
510
511#define MBEDTLS_TLS_EXT_RENEGOTIATION_INFO 0xFF01
512
513/*
514 * Size defines
515 */
516#if !defined(MBEDTLS_PSK_MAX_LEN)
517#define MBEDTLS_PSK_MAX_LEN 32 /* 256 bits */
518#endif
519
520/* Dummy type used only for its size */
522 unsigned char dummy; /* Make the union non-empty even with SSL disabled */
523#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)
524 unsigned char _pms_rsa[48]; /* RFC 5246 8.1.1 */
525#endif
526#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)
527 unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]; /* RFC 5246 8.1.2 */
528#endif
529#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
530 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
531 defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
532 defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
533 unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]; /* RFC 4492 5.10 */
534#endif
535#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
536 unsigned char _pms_psk[4 + 2 * MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 2 */
537#endif
538#if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
540 + MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 3 */
541#endif
542#if defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)
543 unsigned char _pms_rsa_psk[52 + MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 4 */
544#endif
545#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
547 + MBEDTLS_PSK_MAX_LEN]; /* RFC 5489 2 */
548#endif
549#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
550 unsigned char _pms_ecjpake[32]; /* Thread spec: SHA-256 output */
551#endif
552};
553
554#define MBEDTLS_PREMASTER_SIZE sizeof(union mbedtls_ssl_premaster_secret)
555
556#ifdef __cplusplus
557extern "C" {
558#endif
559
560/*
561 * SSL state machine
562 */
585
586/*
587 * The tls_prf function types.
588 */
614typedef int mbedtls_ssl_send_t(void *ctx,
615 const unsigned char *buf,
616 size_t len);
617
638typedef int mbedtls_ssl_recv_t(void *ctx,
639 unsigned char *buf,
640 size_t len);
641
664typedef int mbedtls_ssl_recv_timeout_t(void *ctx,
665 unsigned char *buf,
666 size_t len,
667 uint32_t timeout);
690typedef void mbedtls_ssl_set_timer_t(void *ctx,
691 uint32_t int_ms,
692 uint32_t fin_ms);
693
705typedef int mbedtls_ssl_get_timer_t(void *ctx);
706
707/* Defined below */
711
712/* Defined in ssl_internal.h */
716#if defined(MBEDTLS_X509_CRT_PARSE_C)
718#endif
719#if defined(MBEDTLS_SSL_PROTO_DTLS)
721#endif
722
723#if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
724#if defined(MBEDTLS_X509_CRT_PARSE_C)
796typedef int mbedtls_ssl_async_sign_t(mbedtls_ssl_context *ssl,
797 mbedtls_x509_crt *cert,
798 mbedtls_md_type_t md_alg,
799 const unsigned char *hash,
800 size_t hash_len);
801
862typedef int mbedtls_ssl_async_decrypt_t(mbedtls_ssl_context *ssl,
863 mbedtls_x509_crt *cert,
864 const unsigned char *input,
865 size_t input_len);
866#endif /* MBEDTLS_X509_CRT_PARSE_C */
867
910typedef int mbedtls_ssl_async_resume_t(mbedtls_ssl_context *ssl,
911 unsigned char *output,
912 size_t *output_len,
913 size_t output_size);
914
932typedef void mbedtls_ssl_async_cancel_t(mbedtls_ssl_context *ssl);
933#endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
934
935#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
936 !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
937#define MBEDTLS_SSL_PEER_CERT_DIGEST_MAX_LEN 48
938#if defined(MBEDTLS_SHA256_C)
939#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA256
940#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 32
941#elif defined(MBEDTLS_SHA512_C)
942#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA384
943#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 48
944#elif defined(MBEDTLS_SHA1_C)
945#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA1
946#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 20
947#else
948/* This is already checked in check_config.h, but be sure. */
949#error "Bad configuration - need SHA-1, SHA-256 or SHA-512 enabled to compute digest of peer CRT."
950#endif
951#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED &&
952 !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
953
954#if defined(MBEDTLS_SSL_DTLS_SRTP)
955
956#define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH 255
957#define MBEDTLS_TLS_SRTP_MAX_PROFILE_LIST_LENGTH 4
958/*
959 * For code readability use a typedef for DTLS-SRTP profiles
960 *
961 * Use_srtp extension protection profiles values as defined in
962 * http://www.iana.org/assignments/srtp-protection/srtp-protection.xhtml
963 *
964 * Reminder: if this list is expanded mbedtls_ssl_check_srtp_profile_value
965 * must be updated too.
966 */
967#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80 ((uint16_t) 0x0001)
968#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32 ((uint16_t) 0x0002)
969#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80 ((uint16_t) 0x0005)
970#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32 ((uint16_t) 0x0006)
971/* This one is not iana defined, but for code readability. */
972#define MBEDTLS_TLS_SRTP_UNSET ((uint16_t) 0x0000)
973
975
985
986#endif /* MBEDTLS_SSL_DTLS_SRTP */
987
988/*
989 * This structure is used for storing current session data.
990 *
991 * Note: when changing this definition, we need to check and update:
992 * - in tests/suites/test_suite_ssl.function:
993 * ssl_populate_session() and ssl_serialize_session_save_load()
994 * - in library/ssl_tls.c:
995 * mbedtls_ssl_session_init() and mbedtls_ssl_session_free()
996 * mbedtls_ssl_session_save() and ssl_session_load()
997 * ssl_session_copy()
998 */
1000#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1001 unsigned char mfl_code;
1002#endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
1003
1004#if defined(MBEDTLS_HAVE_TIME)
1006#endif
1009 size_t id_len;
1010 unsigned char id[32];
1011 unsigned char master[48];
1013#if defined(MBEDTLS_X509_CRT_PARSE_C)
1014#if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
1016#else /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1019 unsigned char *peer_cert_digest;
1020 size_t peer_cert_digest_len;
1021 mbedtls_md_type_t peer_cert_digest_type;
1022#endif /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1023#endif /* MBEDTLS_X509_CRT_PARSE_C */
1024 uint32_t verify_result;
1026#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
1027 unsigned char *ticket;
1028 size_t ticket_len;
1030#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_CLI_C */
1031
1032#if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
1034#endif /* MBEDTLS_SSL_TRUNCATED_HMAC */
1035
1036#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1038#endif
1039};
1040
1045 /* Group items by size and reorder them to maximize usage of immediate offset access. */
1046
1047 /*
1048 * Numerical settings (char)
1049 */
1050
1051 unsigned char max_major_ver;
1052 unsigned char max_minor_ver;
1053 unsigned char min_major_ver;
1054 unsigned char min_minor_ver;
1056 /*
1057 * Flags (could be bit-fields to save RAM, but separate bytes make
1058 * the code smaller on architectures with an instruction for direct
1059 * byte access).
1060 */
1061
1062 uint8_t endpoint /*bool*/;
1063 uint8_t transport /*bool*/;
1064 uint8_t authmode /*2 bits*/;
1065 /* needed even with renego disabled for LEGACY_BREAK_HANDSHAKE */
1066 uint8_t allow_legacy_renegotiation /*2 bits*/;
1067#if defined(MBEDTLS_ARC4_C)
1068 uint8_t arc4_disabled /*bool*/;
1069#endif
1070#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1071 uint8_t mfl_code /*3 bits*/;
1072#endif
1073#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1074 uint8_t encrypt_then_mac /*bool*/;
1075#endif
1076#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
1077 uint8_t extended_ms /*bool*/;
1078#endif
1079#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1080 uint8_t anti_replay /*bool*/;
1081#endif
1082#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
1083 uint8_t cbc_record_splitting /*bool*/;
1084#endif
1085#if defined(MBEDTLS_SSL_RENEGOTIATION)
1086 uint8_t disable_renegotiation /*bool*/;
1087#endif
1088#if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
1089 uint8_t trunc_hmac /*bool*/;
1090#endif
1091#if defined(MBEDTLS_SSL_SESSION_TICKETS)
1092 uint8_t session_tickets /*bool*/;
1093#endif
1094#if defined(MBEDTLS_SSL_FALLBACK_SCSV) && defined(MBEDTLS_SSL_CLI_C)
1095 uint8_t fallback /*bool*/;
1096#endif
1097#if defined(MBEDTLS_SSL_SRV_C)
1098 uint8_t cert_req_ca_list /*bool*/;
1100#endif
1101#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1102 uint8_t ignore_unexpected_cid /*bool*/;
1105#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1106#if defined(MBEDTLS_SSL_DTLS_SRTP)
1107 uint8_t dtls_srtp_mki_support /*bool*/;
1109#endif
1110
1111 /*
1112 * Numerical settings (int or larger)
1113 */
1114
1115 uint32_t read_timeout;
1117#if defined(MBEDTLS_SSL_PROTO_DTLS)
1122#endif
1123
1124#if defined(MBEDTLS_SSL_RENEGOTIATION)
1126 unsigned char renego_period[8];
1128#endif
1129
1130#if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT)
1131 unsigned int badmac_limit;
1132#endif
1133
1134#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
1135 unsigned int dhm_min_bitlen;
1136#endif
1137
1138 /*
1139 * Pointers
1140 */
1141
1142 const int *ciphersuite_list[4];
1145 void (*f_dbg)(void *, int, const char *, int, const char *);
1146 void *p_dbg;
1149 int (*f_rng)(void *, unsigned char *, size_t);
1150 void *p_rng;
1155 int (*f_set_cache)(void *, const mbedtls_ssl_session *);
1156 void *p_cache;
1158#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
1160 int (*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
1161 void *p_sni;
1162#endif
1163
1164#if defined(MBEDTLS_X509_CRT_PARSE_C)
1166 int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *);
1167 void *p_vrfy;
1168#endif
1169
1170#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
1172 int (*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
1173 void *p_psk;
1174#endif
1175
1176#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1178 int (*f_cookie_write)(void *, unsigned char **, unsigned char *,
1179 const unsigned char *, size_t);
1181 int (*f_cookie_check)(void *, const unsigned char *, size_t,
1182 const unsigned char *, size_t);
1183 void *p_cookie;
1184#endif
1185
1186#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
1188 int (*f_ticket_write)(void *, const mbedtls_ssl_session *,
1189 unsigned char *, const unsigned char *, size_t *, uint32_t *);
1191 int (*f_ticket_parse)(void *, mbedtls_ssl_session *, unsigned char *, size_t);
1192 void *p_ticket;
1193#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
1194
1195#if defined(MBEDTLS_SSL_EXPORT_KEYS)
1197 int (*f_export_keys)(void *, const unsigned char *,
1198 const unsigned char *, size_t, size_t, size_t);
1201 int (*f_export_keys_ext)(void *, const unsigned char *,
1202 const unsigned char *, size_t, size_t, size_t,
1203 const unsigned char[32], const unsigned char[32],
1206#endif
1207
1208#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1209 size_t cid_len;
1210#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1211
1212#if defined(MBEDTLS_X509_CRT_PARSE_C)
1217#if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
1219 void *p_ca_cb;
1220#endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
1221#endif /* MBEDTLS_X509_CRT_PARSE_C */
1222
1223#if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
1224#if defined(MBEDTLS_X509_CRT_PARSE_C)
1225 mbedtls_ssl_async_sign_t *f_async_sign_start;
1226 mbedtls_ssl_async_decrypt_t *f_async_decrypt_start;
1227#endif /* MBEDTLS_X509_CRT_PARSE_C */
1228 mbedtls_ssl_async_resume_t *f_async_resume;
1229 mbedtls_ssl_async_cancel_t *f_async_cancel;
1230 void *p_async_config_data;
1231#endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
1232
1233#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
1234 const int *sig_hashes;
1235#endif
1236
1237#if defined(MBEDTLS_ECP_C)
1239#endif
1240
1241#if defined(MBEDTLS_DHM_C)
1244#endif
1245
1246#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
1247
1248#if defined(MBEDTLS_USE_PSA_CRYPTO)
1249 psa_key_id_t psk_opaque;
1255#endif /* MBEDTLS_USE_PSA_CRYPTO */
1256
1257 unsigned char *psk;
1261 size_t psk_len;
1267 unsigned char *psk_identity;
1278#endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
1279
1280#if defined(MBEDTLS_SSL_ALPN)
1281 const char **alpn_list;
1282#endif
1283
1284#if defined(MBEDTLS_SSL_DTLS_SRTP)
1289#endif /* MBEDTLS_SSL_DTLS_SRTP */
1290};
1291
1295 /*
1296 * Miscellaneous
1297 */
1298 int state;
1299#if defined(MBEDTLS_SSL_RENEGOTIATION)
1304#endif /* MBEDTLS_SSL_RENEGOTIATION */
1305
1309#if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT)
1310 unsigned badmac_seen;
1311#endif /* MBEDTLS_SSL_DTLS_BADMAC_LIMIT */
1312
1313#if defined(MBEDTLS_X509_CRT_PARSE_C)
1315 int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *);
1316 void *p_vrfy;
1317#endif
1318
1324 void *p_bio;
1326 /*
1327 * Session layer
1328 */
1337 /*
1338 * Record layer transformations
1339 */
1345 /*
1346 * Timers
1347 */
1348 void *p_timer;
1353 /*
1354 * Record layer (incoming data)
1355 */
1356 unsigned char *in_buf;
1357 unsigned char *in_ctr;
1360 unsigned char *in_hdr;
1361#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1362 unsigned char *in_cid;
1364#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1365 unsigned char *in_len;
1366 unsigned char *in_iv;
1367 unsigned char *in_msg;
1368 unsigned char *in_offt;
1371 size_t in_msglen;
1372 size_t in_left;
1373#if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1374 size_t in_buf_len;
1375#endif
1376#if defined(MBEDTLS_SSL_PROTO_DTLS)
1377 uint16_t in_epoch;
1380#endif /* MBEDTLS_SSL_PROTO_DTLS */
1381#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1382 uint64_t in_window_top;
1383 uint64_t in_window;
1384#endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
1385
1386 size_t in_hslen;
1393#if defined(MBEDTLS_SSL_PROTO_DTLS)
1396#endif /* MBEDTLS_SSL_PROTO_DTLS */
1397
1398 /*
1399 * Record layer (outgoing data)
1400 */
1401 unsigned char *out_buf;
1402 unsigned char *out_ctr;
1403 unsigned char *out_hdr;
1404#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1405 unsigned char *out_cid;
1407#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1408 unsigned char *out_len;
1409 unsigned char *out_iv;
1410 unsigned char *out_msg;
1413 size_t out_msglen;
1414 size_t out_left;
1415#if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1416 size_t out_buf_len;
1417#endif
1418
1419 unsigned char cur_out_ctr[8];
1421#if defined(MBEDTLS_SSL_PROTO_DTLS)
1422 uint16_t mtu;
1423#endif /* MBEDTLS_SSL_PROTO_DTLS */
1424
1425#if defined(MBEDTLS_ZLIB_SUPPORT)
1426 unsigned char *compress_buf;
1427#endif /* MBEDTLS_ZLIB_SUPPORT */
1428#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
1429 signed char split_done;
1430#endif /* MBEDTLS_SSL_CBC_RECORD_SPLITTING */
1431
1432 /*
1433 * PKI layer
1434 */
1437 /*
1438 * User settings
1439 */
1440#if defined(MBEDTLS_X509_CRT_PARSE_C)
1471#endif /* MBEDTLS_X509_CRT_PARSE_C */
1472
1473#if defined(MBEDTLS_SSL_ALPN)
1474 const char *alpn_chosen;
1475#endif /* MBEDTLS_SSL_ALPN */
1476
1477#if defined(MBEDTLS_SSL_DTLS_SRTP)
1478 /*
1479 * use_srtp extension
1480 */
1482#endif /* MBEDTLS_SSL_DTLS_SRTP */
1483
1484 /*
1485 * Information for DTLS hello verify
1486 */
1487#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1488 unsigned char *cli_id;
1489 size_t cli_id_len;
1490#endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
1491
1492 /*
1493 * Secure renegotiation
1494 */
1495 /* needed to know when to send extension on server */
1498#if defined(MBEDTLS_SSL_RENEGOTIATION)
1502#endif /* MBEDTLS_SSL_RENEGOTIATION */
1503
1504#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1505 /* CID configuration to use in subsequent handshakes. */
1506
1511 unsigned char own_cid[MBEDTLS_SSL_CID_IN_LEN_MAX];
1512 uint8_t own_cid_len;
1513 uint8_t negotiate_cid;
1517#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1518};
1519
1520#if defined(MBEDTLS_SSL_HW_RECORD_ACCEL)
1521
1522#if !defined(MBEDTLS_DEPRECATED_REMOVED)
1523
1524#define MBEDTLS_SSL_CHANNEL_OUTBOUND MBEDTLS_DEPRECATED_NUMERIC_CONSTANT(0)
1525#define MBEDTLS_SSL_CHANNEL_INBOUND MBEDTLS_DEPRECATED_NUMERIC_CONSTANT(1)
1526
1527#if defined(MBEDTLS_DEPRECATED_WARNING)
1528#define MBEDTLS_DEPRECATED __attribute__((deprecated))
1529#else
1530#define MBEDTLS_DEPRECATED
1531#endif /* MBEDTLS_DEPRECATED_WARNING */
1532
1533MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_init)(
1535 const unsigned char *key_enc, const unsigned char *key_dec,
1536 size_t keylen,
1537 const unsigned char *iv_enc, const unsigned char *iv_dec,
1538 size_t ivlen,
1539 const unsigned char *mac_enc, const unsigned char *mac_dec,
1540 size_t maclen);
1541MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_activate)(
1543 int direction);
1544MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_reset)(
1545 mbedtls_ssl_context *ssl);
1546MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_write)(
1547 mbedtls_ssl_context *ssl);
1548MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_read)(
1549 mbedtls_ssl_context *ssl);
1550MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_finish)(
1551 mbedtls_ssl_context *ssl);
1552
1553#undef MBEDTLS_DEPRECATED
1554#endif /* !MBEDTLS_DEPRECATED_REMOVED */
1555
1556#endif /* MBEDTLS_SSL_HW_RECORD_ACCEL */
1557
1566const char *mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id);
1567
1576int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name);
1577
1586
1620 const mbedtls_ssl_config *conf);
1621
1633
1641
1657
1685
1686#if defined(MBEDTLS_X509_CRT_PARSE_C)
1703 int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
1704 void *p_vrfy);
1705#endif /* MBEDTLS_X509_CRT_PARSE_C */
1706
1715 int (*f_rng)(void *, unsigned char *, size_t),
1716 void *p_rng);
1717
1733 void (*f_dbg)(void *, int, const char *, int, const char *),
1734 void *p_dbg);
1735
1767 void *p_bio,
1768 mbedtls_ssl_send_t *f_send,
1769 mbedtls_ssl_recv_t *f_recv,
1770 mbedtls_ssl_recv_timeout_t *f_recv_timeout);
1771
1772#if defined(MBEDTLS_SSL_PROTO_DTLS)
1773
1774#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1775
1776
1860int mbedtls_ssl_set_cid(mbedtls_ssl_context *ssl,
1861 int enable,
1862 unsigned char const *own_cid,
1863 size_t own_cid_len);
1864
1902int mbedtls_ssl_get_peer_cid(mbedtls_ssl_context *ssl,
1903 int *enabled,
1904 unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX],
1905 size_t *peer_cid_len);
1906
1907#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1908
1952#endif /* MBEDTLS_SSL_PROTO_DTLS */
1953
1954#if defined(MBEDTLS_X509_CRT_PARSE_C)
1974 int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
1975 void *p_vrfy);
1976#endif /* MBEDTLS_X509_CRT_PARSE_C */
1977
1995
1996#if defined(MBEDTLS_SSL_RECORD_CHECKING)
2042 unsigned char *buf,
2043 size_t buflen);
2044#endif /* MBEDTLS_SSL_RECORD_CHECKING */
2045
2067 void *p_timer,
2068 mbedtls_ssl_set_timer_t *f_set_timer,
2069 mbedtls_ssl_get_timer_t *f_get_timer);
2070
2090typedef int mbedtls_ssl_ticket_write_t(void *p_ticket,
2091 const mbedtls_ssl_session *session,
2092 unsigned char *start,
2093 const unsigned char *end,
2094 size_t *tlen,
2095 uint32_t *lifetime);
2096
2097#if defined(MBEDTLS_SSL_EXPORT_KEYS)
2118typedef int mbedtls_ssl_export_keys_t(void *p_expkey,
2119 const unsigned char *ms,
2120 const unsigned char *kb,
2121 size_t maclen,
2122 size_t keylen,
2123 size_t ivlen);
2124
2150typedef int mbedtls_ssl_export_keys_ext_t(void *p_expkey,
2151 const unsigned char *ms,
2152 const unsigned char *kb,
2153 size_t maclen,
2154 size_t keylen,
2155 size_t ivlen,
2156 const unsigned char client_random[32],
2157 const unsigned char server_random[32],
2158 mbedtls_tls_prf_types tls_prf_type);
2159#endif /* MBEDTLS_SSL_EXPORT_KEYS */
2160
2184typedef int mbedtls_ssl_ticket_parse_t(void *p_ticket,
2185 mbedtls_ssl_session *session,
2186 unsigned char *buf,
2187 size_t len);
2188
2189#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
2205 mbedtls_ssl_ticket_write_t *f_ticket_write,
2206 mbedtls_ssl_ticket_parse_t *f_ticket_parse,
2207 void *p_ticket);
2208#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
2209
2210#if defined(MBEDTLS_SSL_EXPORT_KEYS)
2222 mbedtls_ssl_export_keys_t *f_export_keys,
2223 void *p_export_keys);
2224
2238 mbedtls_ssl_export_keys_ext_t *f_export_keys_ext,
2239 void *p_export_keys);
2240#endif /* MBEDTLS_SSL_EXPORT_KEYS */
2241
2242#if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
2273void mbedtls_ssl_conf_async_private_cb(mbedtls_ssl_config *conf,
2274 mbedtls_ssl_async_sign_t *f_async_sign,
2275 mbedtls_ssl_async_decrypt_t *f_async_decrypt,
2276 mbedtls_ssl_async_resume_t *f_async_resume,
2277 mbedtls_ssl_async_cancel_t *f_async_cancel,
2278 void *config_data);
2279
2288void *mbedtls_ssl_conf_get_async_config_data(const mbedtls_ssl_config *conf);
2289
2304void *mbedtls_ssl_get_async_operation_data(const mbedtls_ssl_context *ssl);
2305
2317void mbedtls_ssl_set_async_operation_data(mbedtls_ssl_context *ssl,
2318 void *ctx);
2319#endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
2320
2335typedef int mbedtls_ssl_cookie_write_t(void *ctx,
2336 unsigned char **p, unsigned char *end,
2337 const unsigned char *info, size_t ilen);
2338
2352typedef int mbedtls_ssl_cookie_check_t(void *ctx,
2353 const unsigned char *cookie, size_t clen,
2354 const unsigned char *info, size_t ilen);
2355
2356#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
2386 mbedtls_ssl_cookie_write_t *f_cookie_write,
2387 mbedtls_ssl_cookie_check_t *f_cookie_check,
2388 void *p_cookie);
2389
2410 const unsigned char *info,
2411 size_t ilen);
2412
2413#endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
2414
2415#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
2432#endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
2433
2434#if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT)
2459#endif /* MBEDTLS_SSL_DTLS_BADMAC_LIMIT */
2460
2461#if defined(MBEDTLS_SSL_PROTO_DTLS)
2462
2492 unsigned allow_packing);
2493
2525void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max);
2526#endif /* MBEDTLS_SSL_PROTO_DTLS */
2527
2528#if defined(MBEDTLS_SSL_SRV_C)
2567 void *p_cache,
2568 int (*f_get_cache)(void *, mbedtls_ssl_session *),
2569 int (*f_set_cache)(void *, const mbedtls_ssl_session *));
2570#endif /* MBEDTLS_SSL_SRV_C */
2571
2572#if defined(MBEDTLS_SSL_CLI_C)
2588#endif /* MBEDTLS_SSL_CLI_C */
2589
2623 const unsigned char *buf,
2624 size_t len);
2625
2653 unsigned char *buf,
2654 size_t buf_len,
2655 size_t *olen);
2656
2673
2690 const int *ciphersuites);
2691
2692#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
2693#define MBEDTLS_SSL_UNEXPECTED_CID_IGNORE 0
2694#define MBEDTLS_SSL_UNEXPECTED_CID_FAIL 1
2727int mbedtls_ssl_conf_cid(mbedtls_ssl_config *conf, size_t len,
2728 int ignore_other_cids);
2729#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
2730
2751 const int *ciphersuites,
2752 int major, int minor);
2753
2754#if defined(MBEDTLS_X509_CRT_PARSE_C)
2766 const mbedtls_x509_crt_profile *profile);
2767
2780 mbedtls_x509_crt *ca_chain,
2781 mbedtls_x509_crl *ca_crl);
2782
2783#if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
2835void mbedtls_ssl_conf_ca_cb(mbedtls_ssl_config *conf,
2837 void *p_ca_cb);
2838#endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
2839
2877 mbedtls_x509_crt *own_cert,
2878 mbedtls_pk_context *pk_key);
2879#endif /* MBEDTLS_X509_CRT_PARSE_C */
2880
2881#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
2914 const unsigned char *psk, size_t psk_len,
2915 const unsigned char *psk_identity, size_t psk_identity_len);
2916
2917#if defined(MBEDTLS_USE_PSA_CRYPTO)
2954int mbedtls_ssl_conf_psk_opaque(mbedtls_ssl_config *conf,
2955 psa_key_id_t psk,
2956 const unsigned char *psk_identity,
2957 size_t psk_identity_len);
2958#endif /* MBEDTLS_USE_PSA_CRYPTO */
2959
2977 const unsigned char *psk, size_t psk_len);
2978
2979#if defined(MBEDTLS_USE_PSA_CRYPTO)
3000int mbedtls_ssl_set_hs_psk_opaque(mbedtls_ssl_context *ssl,
3001 psa_key_id_t psk);
3002#endif /* MBEDTLS_USE_PSA_CRYPTO */
3003
3043 int (*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *,
3044 size_t),
3045 void *p_psk);
3046#endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
3047
3048#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_SRV_C)
3049
3050#if !defined(MBEDTLS_DEPRECATED_REMOVED)
3051
3052#if defined(MBEDTLS_DEPRECATED_WARNING)
3053#define MBEDTLS_DEPRECATED __attribute__((deprecated))
3054#else
3055#define MBEDTLS_DEPRECATED
3056#endif
3057
3072 const char *dhm_P,
3073 const char *dhm_G);
3074
3075#endif /* MBEDTLS_DEPRECATED_REMOVED */
3076
3091 const unsigned char *dhm_P, size_t P_len,
3092 const unsigned char *dhm_G, size_t G_len);
3093
3104#endif /* MBEDTLS_DHM_C && defined(MBEDTLS_SSL_SRV_C) */
3105
3106#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
3116 unsigned int bitlen);
3117#endif /* MBEDTLS_DHM_C && MBEDTLS_SSL_CLI_C */
3118
3119#if defined(MBEDTLS_ECP_C)
3150 const mbedtls_ecp_group_id *curves);
3151#endif /* MBEDTLS_ECP_C */
3152
3153#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
3175 const int *hashes);
3176#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
3177
3178#if defined(MBEDTLS_X509_CRT_PARSE_C)
3210int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname);
3211#endif /* MBEDTLS_X509_CRT_PARSE_C */
3212
3213#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
3227 mbedtls_x509_crt *own_cert,
3228 mbedtls_pk_context *pk_key);
3229
3242 mbedtls_x509_crt *ca_chain,
3243 mbedtls_x509_crl *ca_crl);
3244
3256 int authmode);
3257
3282 int (*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *,
3283 size_t),
3284 void *p_sni);
3285#endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION */
3286
3287#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
3305int mbedtls_ssl_set_hs_ecjpake_password(mbedtls_ssl_context *ssl,
3306 const unsigned char *pw,
3307 size_t pw_len);
3308#endif /*MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
3309
3310#if defined(MBEDTLS_SSL_ALPN)
3324
3335#endif /* MBEDTLS_SSL_ALPN */
3336
3337#if defined(MBEDTLS_SSL_DTLS_SRTP)
3338#if defined(MBEDTLS_DEBUG_C)
3340{
3341 switch (profile) {
3343 return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80";
3345 return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32";
3347 return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80";
3349 return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32";
3350 default: break;
3351 }
3352 return "";
3353}
3354#endif /* MBEDTLS_DEBUG_C */
3369 int support_mki_value);
3370
3391 (mbedtls_ssl_config *conf,
3392 const mbedtls_ssl_srtp_profile *profiles);
3393
3411 unsigned char *mki_value,
3412 uint16_t mki_len);
3432 mbedtls_dtls_srtp_info *dtls_srtp_info);
3433#endif /* MBEDTLS_SSL_DTLS_SRTP */
3434
3451void mbedtls_ssl_conf_max_version(mbedtls_ssl_config *conf, int major, int minor);
3452
3471void mbedtls_ssl_conf_min_version(mbedtls_ssl_config *conf, int major, int minor);
3472
3473#if defined(MBEDTLS_SSL_FALLBACK_SCSV) && defined(MBEDTLS_SSL_CLI_C)
3494#endif /* MBEDTLS_SSL_FALLBACK_SCSV && MBEDTLS_SSL_CLI_C */
3495
3496#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
3509#endif /* MBEDTLS_SSL_ENCRYPT_THEN_MAC */
3510
3511#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
3524#endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */
3525
3526#if defined(MBEDTLS_ARC4_C)
3543#endif /* MBEDTLS_ARC4_C */
3544
3545#if defined(MBEDTLS_SSL_SRV_C)
3556 char cert_req_ca_list);
3557#endif /* MBEDTLS_SSL_SRV_C */
3558
3559#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
3594int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code);
3595#endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
3596
3597#if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
3607#endif /* MBEDTLS_SSL_TRUNCATED_HMAC */
3608
3609#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
3622#endif /* MBEDTLS_SSL_CBC_RECORD_SPLITTING */
3623
3624#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
3636#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_CLI_C */
3637
3638#if defined(MBEDTLS_SSL_RENEGOTIATION)
3657#endif /* MBEDTLS_SSL_RENEGOTIATION */
3658
3687
3688#if defined(MBEDTLS_SSL_RENEGOTIATION)
3727
3754 const unsigned char period[8]);
3755#endif /* MBEDTLS_SSL_RENEGOTIATION */
3756
3796
3813
3827
3836
3845
3860
3861#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
3876
3892
3893#if !defined(MBEDTLS_DEPRECATED_REMOVED)
3894
3895#if defined(MBEDTLS_DEPRECATED_WARNING)
3896#define MBEDTLS_DEPRECATED __attribute__((deprecated))
3897#else
3898#define MBEDTLS_DEPRECATED
3899#endif
3900
3916 const mbedtls_ssl_context *ssl);
3917#endif /* MBEDTLS_DEPRECATED_REMOVED */
3918#endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
3919
3948
3949#if defined(MBEDTLS_X509_CRT_PARSE_C)
3981#endif /* MBEDTLS_X509_CRT_PARSE_C */
3982
3983#if defined(MBEDTLS_SSL_CLI_C)
4011#endif /* MBEDTLS_SSL_CLI_C */
4012
4068
4090
4091#if defined(MBEDTLS_SSL_RENEGOTIATION)
4116#endif /* MBEDTLS_SSL_RENEGOTIATION */
4117
4195int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len);
4196
4257int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len);
4258
4276 unsigned char level,
4277 unsigned char message);
4292
4299
4300#if defined(MBEDTLS_SSL_CONTEXT_SERIALIZATION)
4350 unsigned char *buf,
4351 size_t buf_len,
4352 size_t *olen);
4353
4420 const unsigned char *buf,
4421 size_t len);
4422#endif /* MBEDTLS_SSL_CONTEXT_SERIALIZATION */
4423
4435
4452 int endpoint, int transport, int preset);
4453
4460
4467
4478
4495 const unsigned char *secret, size_t slen,
4496 const char *label,
4497 const unsigned char *random, size_t rlen,
4498 unsigned char *dstbuf, size_t dlen);
4499
4500#ifdef __cplusplus
4501}
4502#endif
4503
4504#endif /* ssl.h */
Multi-precision integer library.
#define MBEDTLS_MPI_MAX_SIZE
Definition bignum.h:76
Configuration options (set of defines)
Platform Security Architecture cryptography module.
This file contains Diffie-Hellman-Merkle (DHM) key exchange definitions and functions.
This file contains ECDH definitions and functions.
This file provides an API for Elliptic Curves over GF(P) (ECP).
#define MBEDTLS_ECP_MAX_BYTES
Definition ecp.h:324
mbedtls_ecp_group_id
Definition ecp.h:113
uint32_t psa_key_id_t
int(* mbedtls_x509_crt_ca_cb_t)(void *p_ctx, mbedtls_x509_crt const *child, mbedtls_x509_crt **candidate_cas)
The type of trusted certificate callbacks.
Definition x509_crt.h:732
mbedtls_md_type_t
Supported message digests.
Definition md.h:50
Mbed TLS Platform time abstraction.
time_t mbedtls_time_t
MBEDTLS_DEPRECATED size_t mbedtls_ssl_get_max_frag_len(const mbedtls_ssl_context *ssl)
This function is a deprecated approach to getting the max fragment length. Its an alias for mbedtls_s...
void mbedtls_ssl_conf_cert_req_ca_list(mbedtls_ssl_config *conf, char cert_req_ca_list)
Whether to send a list of acceptable CAs in CertificateRequest messages. (Default: do send)
#define MBEDTLS_PSK_MAX_LEN
Definition ssl.h:517
const mbedtls_x509_crt * mbedtls_ssl_get_peer_cert(const mbedtls_ssl_context *ssl)
Return the peer certificate from the current connection.
void mbedtls_ssl_conf_read_timeout(mbedtls_ssl_config *conf, uint32_t timeout)
Set the timeout period for mbedtls_ssl_read() (Default: no timeout.)
void mbedtls_ssl_conf_min_version(mbedtls_ssl_config *conf, int major, int minor)
Set the minimum accepted SSL/TLS protocol version (Default: TLS 1.0)
int mbedtls_ssl_ticket_write_t(void *p_ticket, const mbedtls_ssl_session *session, unsigned char *start, const unsigned char *end, size_t *tlen, uint32_t *lifetime)
Callback type: generate and write session ticket.
Definition ssl.h:2090
void mbedtls_ssl_conf_extended_master_secret(mbedtls_ssl_config *conf, char ems)
Enable or disable Extended Master Secret negotiation. (Default: MBEDTLS_SSL_EXTENDED_MS_ENABLED)
void mbedtls_ssl_set_mtu(mbedtls_ssl_context *ssl, uint16_t mtu)
Set the Maximum Transport Unit (MTU). Special value: 0 means unset (no limit). This represents the ma...
int mbedtls_ssl_set_client_transport_id(mbedtls_ssl_context *ssl, const unsigned char *info, size_t ilen)
Set client's transport-level identification info. (Server only. DTLS only.)
void mbedtls_ssl_conf_renegotiation_period(mbedtls_ssl_config *conf, const unsigned char period[8])
Set record counter threshold for periodic renegotiation. (Default: 2^48 - 1)
#define MBEDTLS_SSL_CID_OUT_LEN_MAX
Definition ssl.h:368
void mbedtls_ssl_conf_legacy_renegotiation(mbedtls_ssl_config *conf, int allow_legacy)
Prevent or allow legacy renegotiation. (Default: MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION)
void mbedtls_ssl_conf_psk_cb(mbedtls_ssl_config *conf, int(*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_psk)
Set the PSK callback (server-side only).
int mbedtls_ssl_conf_psk(mbedtls_ssl_config *conf, const unsigned char *psk, size_t psk_len, const unsigned char *psk_identity, size_t psk_identity_len)
Configure a pre-shared key (PSK) and identity to be used in PSK-based ciphersuites.
int mbedtls_ssl_session_save(const mbedtls_ssl_session *session, unsigned char *buf, size_t buf_len, size_t *olen)
Save session structure as serialized data in a buffer. On client, this can be used for saving session...
int mbedtls_ssl_session_reset(mbedtls_ssl_context *ssl)
Reset an already initialized SSL context for re-use while retaining application-set variables,...
int mbedtls_ssl_check_record(mbedtls_ssl_context const *ssl, unsigned char *buf, size_t buflen)
Check whether a buffer contains a valid and authentic record that has not been seen before....
const char * mbedtls_ssl_get_alpn_protocol(const mbedtls_ssl_context *ssl)
Get the name of the negotiated Application Layer Protocol. This function should be called after the h...
struct mbedtls_ssl_transform mbedtls_ssl_transform
Definition ssl.h:713
void mbedtls_ssl_conf_cbc_record_splitting(mbedtls_ssl_config *conf, char split)
Enable / Disable 1/n-1 record splitting (Default: MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED)
void mbedtls_ssl_conf_renegotiation_enforced(mbedtls_ssl_config *conf, int max_records)
Enforce renegotiation requests. (Default: enforced, max_records = 16)
void mbedtls_ssl_free(mbedtls_ssl_context *ssl)
Free referenced items in an SSL context and clear memory.
void mbedtls_ssl_conf_transport(mbedtls_ssl_config *conf, int transport)
Set the transport type (TLS or DTLS). Default: TLS.
#define MBEDTLS_SSL_CID_IN_LEN_MAX
Definition ssl.h:364
void mbedtls_ssl_set_timer_cb(mbedtls_ssl_context *ssl, void *p_timer, mbedtls_ssl_set_timer_t *f_set_timer, mbedtls_ssl_get_timer_t *f_get_timer)
Set the timer callbacks (Mandatory for DTLS.)
void mbedtls_ssl_set_hs_ca_chain(mbedtls_ssl_context *ssl, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate for the current handshake.
mbedtls_tls_prf_types
Definition ssl.h:589
@ MBEDTLS_SSL_TLS_PRF_SHA384
Definition ssl.h:593
@ MBEDTLS_SSL_TLS_PRF_SHA256
Definition ssl.h:594
@ MBEDTLS_SSL_TLS_PRF_NONE
Definition ssl.h:590
@ MBEDTLS_SSL_TLS_PRF_TLS1
Definition ssl.h:592
@ MBEDTLS_SSL_TLS_PRF_SSL3
Definition ssl.h:591
int mbedtls_ssl_send_t(void *ctx, const unsigned char *buf, size_t len)
Callback type: send data on the network.
Definition ssl.h:614
void mbedtls_ssl_conf_sni(mbedtls_ssl_config *conf, int(*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_sni)
Set server side ServerName TLS extension callback (optional, server-side only).
mbedtls_ssl_states
Definition ssl.h:563
@ MBEDTLS_SSL_CERTIFICATE_VERIFY
Definition ssl.h:573
@ MBEDTLS_SSL_HANDSHAKE_OVER
Definition ssl.h:580
@ MBEDTLS_SSL_SERVER_HELLO_DONE
Definition ssl.h:570
@ MBEDTLS_SSL_SERVER_FINISHED
Definition ssl.h:577
@ MBEDTLS_SSL_SERVER_KEY_EXCHANGE
Definition ssl.h:568
@ MBEDTLS_SSL_SERVER_HELLO
Definition ssl.h:566
@ MBEDTLS_SSL_CLIENT_KEY_EXCHANGE
Definition ssl.h:572
@ MBEDTLS_SSL_CLIENT_HELLO
Definition ssl.h:565
@ MBEDTLS_SSL_SERVER_CERTIFICATE
Definition ssl.h:567
@ MBEDTLS_SSL_CERTIFICATE_REQUEST
Definition ssl.h:569
@ MBEDTLS_SSL_SERVER_NEW_SESSION_TICKET
Definition ssl.h:581
@ MBEDTLS_SSL_CLIENT_FINISHED
Definition ssl.h:575
@ MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC
Definition ssl.h:576
@ MBEDTLS_SSL_SERVER_HELLO_VERIFY_REQUEST_SENT
Definition ssl.h:582
@ MBEDTLS_SSL_HANDSHAKE_WRAPUP
Definition ssl.h:579
@ MBEDTLS_SSL_CLIENT_CHANGE_CIPHER_SPEC
Definition ssl.h:574
@ MBEDTLS_SSL_HELLO_REQUEST
Definition ssl.h:564
@ MBEDTLS_SSL_CLIENT_CERTIFICATE
Definition ssl.h:571
@ MBEDTLS_SSL_FLUSH_BUFFERS
Definition ssl.h:578
void mbedtls_ssl_set_verify(mbedtls_ssl_context *ssl, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set a connection-specific verification callback (optional).
void mbedtls_ssl_conf_endpoint(mbedtls_ssl_config *conf, int endpoint)
Set the current endpoint type.
#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80
Definition ssl.h:969
#define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH
Definition ssl.h:956
int mbedtls_ssl_check_pending(const mbedtls_ssl_context *ssl)
Check if there is data already read from the underlying transport but not yet processed.
size_t mbedtls_ssl_get_input_max_frag_len(const mbedtls_ssl_context *ssl)
Return the maximum fragment length (payload, in bytes) for the input buffer. This is the negotiated m...
int mbedtls_ssl_send_alert_message(mbedtls_ssl_context *ssl, unsigned char level, unsigned char message)
Send an alert message.
const char * mbedtls_ssl_get_version(const mbedtls_ssl_context *ssl)
Return the current SSL version (SSLv3/TLSv1/etc)
int mbedtls_ssl_conf_dh_param_bin(mbedtls_ssl_config *conf, const unsigned char *dhm_P, size_t P_len, const unsigned char *dhm_G, size_t G_len)
Set the Diffie-Hellman public P and G values from big-endian binary presentations....
#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32
Definition ssl.h:970
void mbedtls_ssl_conf_rng(mbedtls_ssl_config *conf, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Set the random number generator callback.
void mbedtls_ssl_conf_dtls_anti_replay(mbedtls_ssl_config *conf, char mode)
Enable or disable anti-replay protection for DTLS. (DTLS only, no effect on TLS.) Default: enabled.
int mbedtls_ssl_ticket_parse_t(void *p_ticket, mbedtls_ssl_session *session, unsigned char *buf, size_t len)
Callback type: parse and load session ticket.
Definition ssl.h:2184
int mbedtls_ssl_renegotiate(mbedtls_ssl_context *ssl)
Initiate an SSL renegotiation on the running connection. Client: perform the renegotiation right now....
int mbedtls_ssl_handshake(mbedtls_ssl_context *ssl)
Perform the SSL handshake.
int mbedtls_ssl_conf_own_cert(mbedtls_ssl_config *conf, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate chain and private key.
struct mbedtls_ssl_sig_hash_set_t mbedtls_ssl_sig_hash_set_t
Definition ssl.h:715
int mbedtls_ssl_set_hs_psk(mbedtls_ssl_context *ssl, const unsigned char *psk, size_t psk_len)
Set the pre-shared Key (PSK) for the current handshake.
uint32_t mbedtls_ssl_get_verify_result(const mbedtls_ssl_context *ssl)
Return the result of the certificate verification.
int mbedtls_ssl_session_load(mbedtls_ssl_session *session, const unsigned char *buf, size_t len)
Load serialized session data into a session structure. On client, this can be used for loading saved ...
int mbedtls_ssl_cookie_write_t(void *ctx, unsigned char **p, unsigned char *end, const unsigned char *info, size_t ilen)
Callback type: generate a cookie.
Definition ssl.h:2335
void mbedtls_ssl_conf_authmode(mbedtls_ssl_config *conf, int authmode)
Set the certificate verification mode Default: NONE on server, REQUIRED on client.
void mbedtls_ssl_conf_dtls_cookies(mbedtls_ssl_config *conf, mbedtls_ssl_cookie_write_t *f_cookie_write, mbedtls_ssl_cookie_check_t *f_cookie_check, void *p_cookie)
Register callbacks for DTLS cookies (Server only. DTLS only.)
int mbedtls_ssl_get_max_out_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum outgoing record payload in bytes. This takes into account the config....
MBEDTLS_DEPRECATED int mbedtls_ssl_conf_dh_param(mbedtls_ssl_config *conf, const char *dhm_P, const char *dhm_G)
Set the Diffie-Hellman public P and G values, read as hexadecimal strings (server-side only) (Default...
int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Try to write exactly 'len' application data bytes.
struct mbedtls_ssl_handshake_params mbedtls_ssl_handshake_params
Definition ssl.h:714
int mbedtls_ssl_conf_dtls_srtp_protection_profiles(mbedtls_ssl_config *conf, const mbedtls_ssl_srtp_profile *profiles)
Set the supported DTLS-SRTP protection profiles.
void mbedtls_ssl_set_timer_t(void *ctx, uint32_t int_ms, uint32_t fin_ms)
Callback type: set a pair of timers/delays to watch.
Definition ssl.h:690
void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max)
Set retransmit timeout values for the DTLS handshake. (DTLS only, no effect on TLS....
void mbedtls_ssl_conf_srtp_mki_value_supported(mbedtls_ssl_config *conf, int support_mki_value)
Manage support for mki(master key id) value in use_srtp extension. MKI is an optional part of SRTP us...
int mbedtls_ssl_recv_timeout_t(void *ctx, unsigned char *buf, size_t len, uint32_t timeout)
Callback type: receive data from the network, with timeout.
Definition ssl.h:664
void mbedtls_ssl_get_dtls_srtp_negotiation_result(const mbedtls_ssl_context *ssl, mbedtls_dtls_srtp_info *dtls_srtp_info)
Get the negotiated DTLS-SRTP information: Protection profile and MKI value.
void mbedtls_ssl_conf_sig_hashes(mbedtls_ssl_config *conf, const int *hashes)
Set the allowed hashes for signatures during the handshake. (Default: all SHA-2 hashes,...
void mbedtls_ssl_conf_truncated_hmac(mbedtls_ssl_config *conf, int truncate)
Activate negotiation of truncated HMAC (Default: MBEDTLS_SSL_TRUNC_HMAC_DISABLED)
void mbedtls_ssl_conf_session_tickets_cb(mbedtls_ssl_config *conf, mbedtls_ssl_ticket_write_t *f_ticket_write, mbedtls_ssl_ticket_parse_t *f_ticket_parse, void *p_ticket)
Configure SSL session ticket callbacks (server only). (Default: none.)
void mbedtls_ssl_config_free(mbedtls_ssl_config *conf)
Free an SSL configuration context.
void mbedtls_ssl_conf_cert_profile(mbedtls_ssl_config *conf, const mbedtls_x509_crt_profile *profile)
Set the X.509 security profile used for verification.
void mbedtls_ssl_session_init(mbedtls_ssl_session *session)
Initialize SSL session structure.
#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN
Definition ssl.h:387
int mbedtls_ssl_context_load(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Load serialized connection data to an SSL context.
void mbedtls_ssl_set_hs_authmode(mbedtls_ssl_context *ssl, int authmode)
Set authmode for the current handshake.
void mbedtls_ssl_set_datagram_packing(mbedtls_ssl_context *ssl, unsigned allow_packing)
Allow or disallow packing of multiple handshake records within a single datagram.
void mbedtls_ssl_init(mbedtls_ssl_context *ssl)
Initialize an SSL context Just makes the context ready for mbedtls_ssl_setup() or mbedtls_ssl_free()
void mbedtls_ssl_conf_ca_chain(mbedtls_ssl_config *conf, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate.
void mbedtls_ssl_set_bio(mbedtls_ssl_context *ssl, void *p_bio, mbedtls_ssl_send_t *f_send, mbedtls_ssl_recv_t *f_recv, mbedtls_ssl_recv_timeout_t *f_recv_timeout)
Set the underlying BIO callbacks for write, read and read-with-timeout.
int mbedtls_ssl_export_keys_t(void *p_expkey, const unsigned char *ms, const unsigned char *kb, size_t maclen, size_t keylen, size_t ivlen)
Callback type: Export key block and master secret.
Definition ssl.h:2118
const char * mbedtls_ssl_get_ciphersuite(const mbedtls_ssl_context *ssl)
Return the name of the current ciphersuite.
int mbedtls_ssl_set_session(mbedtls_ssl_context *ssl, const mbedtls_ssl_session *session)
Request resumption of session (client-side only) Session data is copied from presented session struct...
int mbedtls_ssl_get_record_expansion(const mbedtls_ssl_context *ssl)
Return the (maximum) number of bytes added by the record layer: header + encryption/MAC overhead (inc...
void mbedtls_ssl_conf_session_tickets(mbedtls_ssl_config *conf, int use_tickets)
Enable / Disable session tickets (client only). (Default: MBEDTLS_SSL_SESSION_TICKETS_ENABLED....
int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name)
Return the ID of the ciphersuite associated with the given name.
void mbedtls_ssl_conf_session_cache(mbedtls_ssl_config *conf, void *p_cache, int(*f_get_cache)(void *, mbedtls_ssl_session *), int(*f_set_cache)(void *, const mbedtls_ssl_session *))
Set the session cache callbacks (server-side only) If not set, no session resuming is done (except if...
void mbedtls_ssl_conf_dtls_badmac_limit(mbedtls_ssl_config *conf, unsigned limit)
Set a limit on the number of records with a bad MAC before terminating the connection....
int mbedtls_ssl_cookie_check_t(void *ctx, const unsigned char *cookie, size_t clen, const unsigned char *info, size_t ilen)
Callback type: verify a cookie.
Definition ssl.h:2352
void mbedtls_ssl_conf_dhm_min_bitlen(mbedtls_ssl_config *conf, unsigned int bitlen)
Set the minimum length for Diffie-Hellman parameters. (Client-side only.) (Default: 1024 bits....
void mbedtls_ssl_conf_arc4_support(mbedtls_ssl_config *conf, char arc4)
Disable or enable support for RC4 (Default: MBEDTLS_SSL_ARC4_DISABLED)
int mbedtls_ssl_set_hs_own_cert(mbedtls_ssl_context *ssl, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate and key for the current handshake.
int mbedtls_ssl_config_defaults(mbedtls_ssl_config *conf, int endpoint, int transport, int preset)
Load reasonable default SSL configuration values. (You need to call mbedtls_ssl_config_init() first....
static const char * mbedtls_ssl_get_srtp_profile_as_string(mbedtls_ssl_srtp_profile profile)
Definition ssl.h:3339
int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len)
Read at most 'len' application data bytes.
void mbedtls_ssl_conf_ciphersuites_for_version(mbedtls_ssl_config *conf, const int *ciphersuites, int major, int minor)
Set the list of allowed ciphersuites and the preference order for a specific version of the protocol....
int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname)
Set or reset the hostname to check against the received peer certificate. On a client,...
#define MBEDTLS_DEPRECATED
Definition ssl.h:3053
int mbedtls_ssl_handshake_step(mbedtls_ssl_context *ssl)
Perform a single step of the SSL handshake.
void mbedtls_ssl_conf_renegotiation(mbedtls_ssl_config *conf, int renegotiation)
Enable / Disable renegotiation support for connection when initiated by peer (Default: MBEDTLS_SSL_RE...
struct mbedtls_dtls_srtp_info_t mbedtls_dtls_srtp_info
void mbedtls_ssl_conf_dbg(mbedtls_ssl_config *conf, void(*f_dbg)(void *, int, const char *, int, const char *), void *p_dbg)
Set the debug callback.
void mbedtls_ssl_conf_export_keys_cb(mbedtls_ssl_config *conf, mbedtls_ssl_export_keys_t *f_export_keys, void *p_export_keys)
Configure key export callback. (Default: none.)
const char * mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id)
Return the name of the ciphersuite associated with the given ID.
int mbedtls_ssl_export_keys_ext_t(void *p_expkey, const unsigned char *ms, const unsigned char *kb, size_t maclen, size_t keylen, size_t ivlen, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type)
Callback type: Export key block, master secret, handshake randbytes and the tls_prf function used to ...
Definition ssl.h:2150
#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32
Definition ssl.h:968
void mbedtls_ssl_config_init(mbedtls_ssl_config *conf)
Initialize an SSL configuration context Just makes the context ready for mbedtls_ssl_config_defaults(...
const mbedtls_ssl_session * mbedtls_ssl_get_session_pointer(const mbedtls_ssl_context *ssl)
Get a pointer to the current session structure, for example to serialize it.
void mbedtls_ssl_conf_fallback(mbedtls_ssl_config *conf, char fallback)
Set the fallback flag (client-side only). (Default: MBEDTLS_SSL_IS_NOT_FALLBACK).
int mbedtls_ssl_context_save(mbedtls_ssl_context *ssl, unsigned char *buf, size_t buf_len, size_t *olen)
Save an active connection as serialized data in a buffer. This allows the freeing or re-using of the ...
int mbedtls_ssl_tls_prf(const mbedtls_tls_prf_types prf, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen)
TLS-PRF function for key derivation.
struct mbedtls_ssl_flight_item mbedtls_ssl_flight_item
Definition ssl.h:720
size_t mbedtls_ssl_get_output_max_frag_len(const mbedtls_ssl_context *ssl)
Return the maximum fragment length (payload, in bytes) for the output buffer. For the client,...
int mbedtls_ssl_recv_t(void *ctx, unsigned char *buf, size_t len)
Callback type: receive data from the network.
Definition ssl.h:638
void mbedtls_ssl_session_free(mbedtls_ssl_session *session)
Free referenced items in an SSL session including the peer certificate and clear memory.
int mbedtls_ssl_close_notify(mbedtls_ssl_context *ssl)
Notify the peer that the connection is being closed.
int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code)
Set the maximum fragment length to emit and/or negotiate. (Typical: the smaller of MBEDTLS_SSL_IN_CON...
int mbedtls_ssl_dtls_srtp_set_mki_value(mbedtls_ssl_context *ssl, unsigned char *mki_value, uint16_t mki_len)
Set the mki_value for the current DTLS-SRTP session.
void mbedtls_ssl_conf_ciphersuites(mbedtls_ssl_config *conf, const int *ciphersuites)
Set the list of allowed ciphersuites and the preference order. First in the list has the highest pref...
#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80
Definition ssl.h:967
size_t mbedtls_ssl_get_bytes_avail(const mbedtls_ssl_context *ssl)
Return the number of application data bytes remaining to be read from the current record.
void mbedtls_ssl_conf_export_keys_ext_cb(mbedtls_ssl_config *conf, mbedtls_ssl_export_keys_ext_t *f_export_keys_ext, void *p_export_keys)
Configure extended key export callback. (Default: none.)
uint16_t mbedtls_ssl_srtp_profile
Definition ssl.h:974
int mbedtls_ssl_get_session(const mbedtls_ssl_context *ssl, mbedtls_ssl_session *session)
Save session in order to resume it later (client-side only) Session data is copied to presented sessi...
int mbedtls_ssl_get_timer_t(void *ctx)
Callback type: get status of timers/delays.
Definition ssl.h:705
void mbedtls_ssl_conf_curves(mbedtls_ssl_config *conf, const mbedtls_ecp_group_id *curves)
Set the allowed curves in order of preference. (Default: all defined curves in order of decreasing si...
int mbedtls_ssl_conf_alpn_protocols(mbedtls_ssl_config *conf, const char **protos)
Set the supported Application Layer Protocols.
int mbedtls_ssl_conf_dh_param_ctx(mbedtls_ssl_config *conf, mbedtls_dhm_context *dhm_ctx)
Set the Diffie-Hellman public P and G values, read from existing context (server-side only)
struct mbedtls_ssl_key_cert mbedtls_ssl_key_cert
Definition ssl.h:717
int mbedtls_ssl_setup(mbedtls_ssl_context *ssl, const mbedtls_ssl_config *conf)
Set up an SSL context for use.
void mbedtls_ssl_conf_encrypt_then_mac(mbedtls_ssl_config *conf, char etm)
Enable or disable Encrypt-then-MAC (Default: MBEDTLS_SSL_ETM_ENABLED)
void mbedtls_ssl_conf_max_version(mbedtls_ssl_config *conf, int major, int minor)
Set the maximum supported version sent from the client side and/or accepted at the server side (Defau...
void mbedtls_ssl_conf_verify(mbedtls_ssl_config *conf, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set the verification callback (Optional).
SSL Ciphersuites for Mbed TLS.
The DHM context structure.
Definition dhm.h:99
mbedtls_ssl_srtp_profile chosen_dtls_srtp_profile
Definition ssl.h:978
unsigned char mki_value[MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH]
Definition ssl.h:982
MPI structure.
Definition bignum.h:196
Public key container.
Definition pk.h:185
int(* f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t)
Definition ssl.h:1160
uint8_t cbc_record_splitting
Definition ssl.h:1083
uint8_t anti_replay
Definition ssl.h:1080
int(* f_cookie_check)(void *, const unsigned char *, size_t, const unsigned char *, size_t)
Definition ssl.h:1181
size_t psk_identity_len
Definition ssl.h:1272
void * p_ticket
Definition ssl.h:1192
int renego_max_records
Definition ssl.h:1125
unsigned char max_major_ver
Definition ssl.h:1051
const int * ciphersuite_list[4]
Definition ssl.h:1142
uint8_t arc4_disabled
Definition ssl.h:1068
void * p_cookie
Definition ssl.h:1183
int(* f_set_cache)(void *, const mbedtls_ssl_session *)
Definition ssl.h:1155
uint32_t hs_timeout_min
Definition ssl.h:1118
mbedtls_x509_crl * ca_crl
Definition ssl.h:1216
uint8_t encrypt_then_mac
Definition ssl.h:1074
int(* f_cookie_write)(void *, unsigned char **, unsigned char *, const unsigned char *, size_t)
Definition ssl.h:1178
const mbedtls_ecp_group_id * curve_list
Definition ssl.h:1238
unsigned char * psk_identity
Definition ssl.h:1267
mbedtls_x509_crt * ca_chain
Definition ssl.h:1215
int(* f_ticket_write)(void *, const mbedtls_ssl_session *, unsigned char *, const unsigned char *, size_t *, uint32_t *)
Definition ssl.h:1188
unsigned char max_minor_ver
Definition ssl.h:1052
void * p_export_keys
Definition ssl.h:1205
const mbedtls_ssl_srtp_profile * dtls_srtp_profile_list
Definition ssl.h:1286
unsigned char min_minor_ver
Definition ssl.h:1054
unsigned char * psk
Definition ssl.h:1257
const mbedtls_x509_crt_profile * cert_profile
Definition ssl.h:1213
uint8_t dtls_srtp_mki_support
Definition ssl.h:1107
const int * sig_hashes
Definition ssl.h:1234
uint32_t read_timeout
Definition ssl.h:1115
uint8_t trunc_hmac
Definition ssl.h:1089
uint8_t fallback
Definition ssl.h:1095
int(* f_rng)(void *, unsigned char *, size_t)
Definition ssl.h:1149
int(* f_get_cache)(void *, mbedtls_ssl_session *)
Definition ssl.h:1153
uint8_t transport
Definition ssl.h:1063
int(* f_ticket_parse)(void *, mbedtls_ssl_session *, unsigned char *, size_t)
Definition ssl.h:1191
void(* f_dbg)(void *, int, const char *, int, const char *)
Definition ssl.h:1145
unsigned char renego_period[8]
Definition ssl.h:1126
uint8_t extended_ms
Definition ssl.h:1077
unsigned int badmac_limit
Definition ssl.h:1131
int(* f_export_keys_ext)(void *, const unsigned char *, const unsigned char *, size_t, size_t, size_t, const unsigned char[32], const unsigned char[32], mbedtls_tls_prf_types)
Definition ssl.h:1201
int(* f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *)
Definition ssl.h:1166
unsigned int dhm_min_bitlen
Definition ssl.h:1135
const char ** alpn_list
Definition ssl.h:1281
int(* f_export_keys)(void *, const unsigned char *, const unsigned char *, size_t, size_t, size_t)
Definition ssl.h:1197
size_t dtls_srtp_profile_list_len
Definition ssl.h:1288
void * p_vrfy
Definition ssl.h:1167
void * p_cache
Definition ssl.h:1156
size_t psk_len
Definition ssl.h:1261
uint8_t session_tickets
Definition ssl.h:1092
uint8_t mfl_code
Definition ssl.h:1071
unsigned char min_major_ver
Definition ssl.h:1053
uint8_t cert_req_ca_list
Definition ssl.h:1098
uint8_t allow_legacy_renegotiation
Definition ssl.h:1066
mbedtls_mpi dhm_G
Definition ssl.h:1243
uint32_t hs_timeout_max
Definition ssl.h:1120
mbedtls_mpi dhm_P
Definition ssl.h:1242
uint8_t endpoint
Definition ssl.h:1062
uint8_t disable_renegotiation
Definition ssl.h:1086
uint8_t authmode
Definition ssl.h:1064
mbedtls_ssl_key_cert * key_cert
Definition ssl.h:1214
int(* f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t)
Definition ssl.h:1172
unsigned char * out_hdr
Definition ssl.h:1403
size_t verify_data_len
Definition ssl.h:1499
mbedtls_ssl_transform * transform_out
Definition ssl.h:1341
uint64_t in_window
Definition ssl.h:1383
signed char split_done
Definition ssl.h:1429
uint8_t disable_datagram_packing
Definition ssl.h:1394
mbedtls_ssl_session * session_in
Definition ssl.h:1329
mbedtls_ssl_set_timer_t * f_set_timer
Definition ssl.h:1350
unsigned char * cli_id
Definition ssl.h:1488
size_t cli_id_len
Definition ssl.h:1489
mbedtls_ssl_session * session
Definition ssl.h:1331
char * hostname
Definition ssl.h:1470
unsigned char cur_out_ctr[8]
Definition ssl.h:1419
unsigned char * out_len
Definition ssl.h:1408
mbedtls_ssl_get_timer_t * f_get_timer
Definition ssl.h:1351
mbedtls_ssl_transform * transform
Definition ssl.h:1342
char own_verify_data[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN]
Definition ssl.h:1500
mbedtls_ssl_send_t * f_send
Definition ssl.h:1319
unsigned char * out_msg
Definition ssl.h:1410
int(* f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *)
Definition ssl.h:1315
mbedtls_dtls_srtp_info dtls_srtp_info
Definition ssl.h:1481
mbedtls_ssl_session * session_negotiate
Definition ssl.h:1332
char peer_verify_data[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN]
Definition ssl.h:1501
unsigned char * in_iv
Definition ssl.h:1366
unsigned char * out_buf
Definition ssl.h:1401
unsigned char * in_buf
Definition ssl.h:1356
const char * alpn_chosen
Definition ssl.h:1474
size_t out_left
Definition ssl.h:1414
size_t in_hslen
Definition ssl.h:1386
mbedtls_ssl_session * session_out
Definition ssl.h:1330
size_t next_record_offset
Definition ssl.h:1378
uint64_t in_window_top
Definition ssl.h:1382
unsigned char * in_msg
Definition ssl.h:1367
size_t out_msglen
Definition ssl.h:1413
mbedtls_ssl_recv_t * f_recv
Definition ssl.h:1320
int renego_records_seen
Definition ssl.h:1301
unsigned char * out_ctr
Definition ssl.h:1402
unsigned char * out_iv
Definition ssl.h:1409
unsigned char * in_ctr
Definition ssl.h:1357
mbedtls_ssl_recv_timeout_t * f_recv_timeout
Definition ssl.h:1321
unsigned char * in_hdr
Definition ssl.h:1360
mbedtls_ssl_transform * transform_in
Definition ssl.h:1340
mbedtls_ssl_handshake_params * handshake
Definition ssl.h:1334
int secure_renegotiation
Definition ssl.h:1496
mbedtls_ssl_transform * transform_negotiate
Definition ssl.h:1343
unsigned badmac_seen
Definition ssl.h:1310
size_t in_msglen
Definition ssl.h:1371
uint16_t in_epoch
Definition ssl.h:1377
unsigned char * in_offt
Definition ssl.h:1368
unsigned char * in_len
Definition ssl.h:1365
uint16_t mtu
Definition ssl.h:1422
const mbedtls_ssl_config * conf
Definition ssl.h:1293
int keep_current_message
Definition ssl.h:1390
uint32_t ticket_lifetime
Definition ssl.h:1029
mbedtls_x509_crt * peer_cert
Definition ssl.h:1015
size_t ticket_len
Definition ssl.h:1028
uint32_t verify_result
Definition ssl.h:1024
mbedtls_time_t start
Definition ssl.h:1005
unsigned char mfl_code
Definition ssl.h:1001
unsigned char * ticket
Definition ssl.h:1027
unsigned char master[48]
Definition ssl.h:1011
unsigned char _pms_ecdhe_psk[4+MBEDTLS_ECP_MAX_BYTES+MBEDTLS_PSK_MAX_LEN]
Definition ssl.h:547
unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]
Definition ssl.h:527
unsigned char _pms_psk[4+2 *MBEDTLS_PSK_MAX_LEN]
Definition ssl.h:536
unsigned char _pms_rsa_psk[52+MBEDTLS_PSK_MAX_LEN]
Definition ssl.h:543
unsigned char dummy
Definition ssl.h:522
unsigned char _pms_rsa[48]
Definition ssl.h:524
unsigned char _pms_dhe_psk[4+MBEDTLS_MPI_MAX_SIZE+MBEDTLS_PSK_MAX_LEN]
Definition ssl.h:540
unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]
Definition ssl.h:533
X.509 certificate revocation list parsing.
X.509 certificate parsing and writing.