Mbed TLS v3.6.0
 All Data Structures Files Functions Variables Typedefs Enumerations Enumerator Macros Groups Pages
ssl.h
Go to the documentation of this file.
1 
6 /*
7  * Copyright The Mbed TLS Contributors
8  * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
9  */
10 #ifndef MBEDTLS_SSL_H
11 #define MBEDTLS_SSL_H
12 #include "mbedtls/platform_util.h"
13 #include "mbedtls/private_access.h"
14 
15 #include "mbedtls/build_info.h"
16 
17 #include "mbedtls/bignum.h"
18 #include "mbedtls/ecp.h"
19 
21 
22 #if defined(MBEDTLS_X509_CRT_PARSE_C)
23 #include "mbedtls/x509_crt.h"
24 #include "mbedtls/x509_crl.h"
25 #endif
26 
27 #if defined(MBEDTLS_DHM_C)
28 #include "mbedtls/dhm.h"
29 #endif
30 
31 #include "mbedtls/md.h"
32 
33 #if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_ANY_ENABLED)
34 #include "mbedtls/ecdh.h"
35 #endif
36 
37 #if defined(MBEDTLS_HAVE_TIME)
38 #include "mbedtls/platform_time.h"
39 #endif
40 
41 #include "mbedcrypto/psa/crypto.h"
42 
43 /*
44  * SSL Error codes
45  */
47 #define MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS -0x7000
48 
49 #define MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE -0x7080
50 
51 #define MBEDTLS_ERR_SSL_BAD_INPUT_DATA -0x7100
52 
53 #define MBEDTLS_ERR_SSL_INVALID_MAC -0x7180
54 
55 #define MBEDTLS_ERR_SSL_INVALID_RECORD -0x7200
56 
57 #define MBEDTLS_ERR_SSL_CONN_EOF -0x7280
58 
59 #define MBEDTLS_ERR_SSL_DECODE_ERROR -0x7300
60 /* Error space gap */
62 #define MBEDTLS_ERR_SSL_NO_RNG -0x7400
63 
64 #define MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE -0x7480
65 
66 #define MBEDTLS_ERR_SSL_UNSUPPORTED_EXTENSION -0x7500
67 
68 #define MBEDTLS_ERR_SSL_NO_APPLICATION_PROTOCOL -0x7580
69 
70 #define MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED -0x7600
71 
72 #define MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED -0x7680
73 
74 #define MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE -0x7700
75 
76 #define MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE -0x7780
77 
78 #define MBEDTLS_ERR_SSL_UNRECOGNIZED_NAME -0x7800
79 
80 #define MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY -0x7880
81 /* Error space gap */
82 /* Error space gap */
84 #define MBEDTLS_ERR_SSL_BAD_CERTIFICATE -0x7A00
85 /* Error space gap */
90 #define MBEDTLS_ERR_SSL_RECEIVED_NEW_SESSION_TICKET -0x7B00
91 
92 #define MBEDTLS_ERR_SSL_CANNOT_READ_EARLY_DATA -0x7B80
93 
102 #define MBEDTLS_ERR_SSL_RECEIVED_EARLY_DATA -0x7C00
103 
104 #define MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA -0x7C80
105 /* Error space gap */
106 /* Error space gap */
107 /* Error space gap */
108 /* Error space gap */
110 #define MBEDTLS_ERR_SSL_CACHE_ENTRY_NOT_FOUND -0x7E80
111 
112 #define MBEDTLS_ERR_SSL_ALLOC_FAILED -0x7F00
113 
114 #define MBEDTLS_ERR_SSL_HW_ACCEL_FAILED -0x7F80
115 
116 #define MBEDTLS_ERR_SSL_HW_ACCEL_FALLTHROUGH -0x6F80
117 
118 #define MBEDTLS_ERR_SSL_BAD_PROTOCOL_VERSION -0x6E80
119 
120 #define MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE -0x6E00
121 
122 #define MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED -0x6D80
123 
124 #define MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH -0x6D00
125 
126 #define MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY -0x6C80
127 
128 #define MBEDTLS_ERR_SSL_INTERNAL_ERROR -0x6C00
129 
130 #define MBEDTLS_ERR_SSL_COUNTER_WRAPPING -0x6B80
131 
132 #define MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO -0x6B00
133 
134 #define MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED -0x6A80
135 
136 #define MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL -0x6A00
137 /* Error space gap */
139 #define MBEDTLS_ERR_SSL_WANT_READ -0x6900
140 
141 #define MBEDTLS_ERR_SSL_WANT_WRITE -0x6880
142 
143 #define MBEDTLS_ERR_SSL_TIMEOUT -0x6800
144 
145 #define MBEDTLS_ERR_SSL_CLIENT_RECONNECT -0x6780
146 
147 #define MBEDTLS_ERR_SSL_UNEXPECTED_RECORD -0x6700
148 
149 #define MBEDTLS_ERR_SSL_NON_FATAL -0x6680
150 
151 #define MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER -0x6600
152 
153 #define MBEDTLS_ERR_SSL_CONTINUE_PROCESSING -0x6580
154 
155 #define MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS -0x6500
156 
157 #define MBEDTLS_ERR_SSL_EARLY_MESSAGE -0x6480
158 /* Error space gap */
159 /* Error space gap */
160 /* Error space gap */
161 /* Error space gap */
162 /* Error space gap */
163 /* Error space gap */
164 /* Error space gap */
165 /* Error space gap */
167 #define MBEDTLS_ERR_SSL_UNEXPECTED_CID -0x6000
168 
169 #define MBEDTLS_ERR_SSL_VERSION_MISMATCH -0x5F00
170 
171 #define MBEDTLS_ERR_SSL_BAD_CONFIG -0x5E80
172 
173 /*
174  * Constants from RFC 8446 for TLS 1.3 PSK modes
175  *
176  * Those are used in the Pre-Shared Key Exchange Modes extension.
177  * See Section 4.2.9 in RFC 8446.
178  */
179 #define MBEDTLS_SSL_TLS1_3_PSK_MODE_PURE 0 /* Pure PSK-based exchange */
180 #define MBEDTLS_SSL_TLS1_3_PSK_MODE_ECDHE 1 /* PSK+ECDHE-based exchange */
181 
182 /*
183  * TLS 1.3 NamedGroup values
184  *
185  * From RF 8446
186  * enum {
187  * // Elliptic Curve Groups (ECDHE)
188  * secp256r1(0x0017), secp384r1(0x0018), secp521r1(0x0019),
189  * x25519(0x001D), x448(0x001E),
190  * // Finite Field Groups (DHE)
191  * ffdhe2048(0x0100), ffdhe3072(0x0101), ffdhe4096(0x0102),
192  * ffdhe6144(0x0103), ffdhe8192(0x0104),
193  * // Reserved Code Points
194  * ffdhe_private_use(0x01FC..0x01FF),
195  * ecdhe_private_use(0xFE00..0xFEFF),
196  * (0xFFFF)
197  * } NamedGroup;
198  *
199  */
200 
201 /* Elliptic Curve Groups (ECDHE) */
202 #define MBEDTLS_SSL_IANA_TLS_GROUP_NONE 0
203 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP192K1 0x0012
204 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP192R1 0x0013
205 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP224K1 0x0014
206 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP224R1 0x0015
207 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP256K1 0x0016
208 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1 0x0017
209 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP384R1 0x0018
210 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP521R1 0x0019
211 #define MBEDTLS_SSL_IANA_TLS_GROUP_BP256R1 0x001A
212 #define MBEDTLS_SSL_IANA_TLS_GROUP_BP384R1 0x001B
213 #define MBEDTLS_SSL_IANA_TLS_GROUP_BP512R1 0x001C
214 #define MBEDTLS_SSL_IANA_TLS_GROUP_X25519 0x001D
215 #define MBEDTLS_SSL_IANA_TLS_GROUP_X448 0x001E
216 /* Finite Field Groups (DHE) */
217 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE2048 0x0100
218 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE3072 0x0101
219 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE4096 0x0102
220 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE6144 0x0103
221 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE8192 0x0104
222 
223 /*
224  * TLS 1.3 Key Exchange Modes
225  *
226  * Mbed TLS internal identifiers for use with the SSL configuration API
227  * mbedtls_ssl_conf_tls13_key_exchange_modes().
228  */
229 
230 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK (1u << 0)
233 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL (1u << 1)
236 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL (1u << 2)
240 /* Convenience macros for sets of key exchanges. */
241 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_ALL \
242  (MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK | \
243  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL | \
244  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL)
245 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_ALL \
246  (MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK | \
247  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL)
248 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ALL \
249  (MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL | \
250  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL)
252 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_NONE (0)
253 
254 /*
255  * Various constants
256  */
257 
258 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
259 /* These are the high and low bytes of ProtocolVersion as defined by:
260  * - RFC 5246: ProtocolVersion version = { 3, 3 }; // TLS v1.2
261  * - RFC 8446: see section 4.2.1
262  */
263 #define MBEDTLS_SSL_MAJOR_VERSION_3 3
264 #define MBEDTLS_SSL_MINOR_VERSION_3 3
265 #define MBEDTLS_SSL_MINOR_VERSION_4 4
266 #endif /* MBEDTLS_DEPRECATED_REMOVED */
267 
268 #define MBEDTLS_SSL_TRANSPORT_STREAM 0
269 #define MBEDTLS_SSL_TRANSPORT_DATAGRAM 1
271 #define MBEDTLS_SSL_MAX_HOST_NAME_LEN 255
272 #define MBEDTLS_SSL_MAX_ALPN_NAME_LEN 255
274 #define MBEDTLS_SSL_MAX_ALPN_LIST_LEN 65535
276 /* RFC 6066 section 4, see also mfl_code_to_length in ssl_tls.c
277  * NONE must be zero so that memset()ing structure to zero works */
278 #define MBEDTLS_SSL_MAX_FRAG_LEN_NONE 0
279 #define MBEDTLS_SSL_MAX_FRAG_LEN_512 1
280 #define MBEDTLS_SSL_MAX_FRAG_LEN_1024 2
281 #define MBEDTLS_SSL_MAX_FRAG_LEN_2048 3
282 #define MBEDTLS_SSL_MAX_FRAG_LEN_4096 4
283 #define MBEDTLS_SSL_MAX_FRAG_LEN_INVALID 5
285 #define MBEDTLS_SSL_IS_CLIENT 0
286 #define MBEDTLS_SSL_IS_SERVER 1
288 #define MBEDTLS_SSL_EXTENDED_MS_DISABLED 0
289 #define MBEDTLS_SSL_EXTENDED_MS_ENABLED 1
290 
291 #define MBEDTLS_SSL_CID_DISABLED 0
292 #define MBEDTLS_SSL_CID_ENABLED 1
293 
294 #define MBEDTLS_SSL_ETM_DISABLED 0
295 #define MBEDTLS_SSL_ETM_ENABLED 1
296 
297 #define MBEDTLS_SSL_COMPRESS_NULL 0
299 #define MBEDTLS_SSL_VERIFY_NONE 0
300 #define MBEDTLS_SSL_VERIFY_OPTIONAL 1
301 #define MBEDTLS_SSL_VERIFY_REQUIRED 2
302 #define MBEDTLS_SSL_VERIFY_UNSET 3 /* Used only for sni_authmode */
304 #define MBEDTLS_SSL_LEGACY_RENEGOTIATION 0
305 #define MBEDTLS_SSL_SECURE_RENEGOTIATION 1
307 #define MBEDTLS_SSL_RENEGOTIATION_DISABLED 0
308 #define MBEDTLS_SSL_RENEGOTIATION_ENABLED 1
309 
310 #define MBEDTLS_SSL_ANTI_REPLAY_DISABLED 0
311 #define MBEDTLS_SSL_ANTI_REPLAY_ENABLED 1
312 
313 #define MBEDTLS_SSL_RENEGOTIATION_NOT_ENFORCED -1
314 #define MBEDTLS_SSL_RENEGO_MAX_RECORDS_DEFAULT 16
315 
316 #define MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION 0
317 #define MBEDTLS_SSL_LEGACY_ALLOW_RENEGOTIATION 1
318 #define MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE 2
320 #define MBEDTLS_SSL_TRUNC_HMAC_DISABLED 0
321 #define MBEDTLS_SSL_TRUNC_HMAC_ENABLED 1
322 #define MBEDTLS_SSL_TRUNCATED_HMAC_LEN 10 /* 80 bits, rfc 6066 section 7 */
324 #define MBEDTLS_SSL_SESSION_TICKETS_DISABLED 0
325 #define MBEDTLS_SSL_SESSION_TICKETS_ENABLED 1
327 #define MBEDTLS_SSL_PRESET_DEFAULT 0
328 #define MBEDTLS_SSL_PRESET_SUITEB 2
329 
330 #define MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED 1
331 #define MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED 0
332 
333 #define MBEDTLS_SSL_EARLY_DATA_DISABLED 0
334 #define MBEDTLS_SSL_EARLY_DATA_ENABLED 1
335 
336 #define MBEDTLS_SSL_DTLS_SRTP_MKI_UNSUPPORTED 0
337 #define MBEDTLS_SSL_DTLS_SRTP_MKI_SUPPORTED 1
338 
339 #define MBEDTLS_SSL_SRV_CIPHERSUITE_ORDER_CLIENT 1
340 #define MBEDTLS_SSL_SRV_CIPHERSUITE_ORDER_SERVER 0
341 
342 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS)
343 #if defined(PSA_WANT_ALG_SHA_384)
344 #define MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN 48
345 #elif defined(PSA_WANT_ALG_SHA_256)
346 #define MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN 32
347 #endif
348 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 && MBEDTLS_SSL_SESSION_TICKETS */
349 /*
350  * Default range for DTLS retransmission timer value, in milliseconds.
351  * RFC 6347 4.2.4.1 says from 1 second to 60 seconds.
352  */
353 #define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MIN 1000
354 #define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MAX 60000
355 
356 /*
357  * Whether early data record should be discarded or not and how.
358  *
359  * The client has indicated early data and the server has rejected them.
360  * The server has then to skip past early data by either:
361  * - attempting to deprotect received records using the handshake traffic
362  * key, discarding records which fail deprotection (up to the configured
363  * max_early_data_size). Once a record is deprotected successfully,
364  * it is treated as the start of the client's second flight and the
365  * server proceeds as with an ordinary 1-RTT handshake.
366  * - skipping all records with an external content type of
367  * "application_data" (indicating that they are encrypted), up to the
368  * configured max_early_data_size. This is the expected behavior if the
369  * server has sent an HelloRetryRequest message. The server ignores
370  * application data message before 2nd ClientHello.
371  */
372 #define MBEDTLS_SSL_EARLY_DATA_NO_DISCARD 0
373 #define MBEDTLS_SSL_EARLY_DATA_TRY_TO_DEPROTECT_AND_DISCARD 1
374 #define MBEDTLS_SSL_EARLY_DATA_DISCARD 2
375 
384 /*
385  * Maximum fragment length in bytes,
386  * determines the size of each of the two internal I/O buffers.
387  *
388  * Note: the RFC defines the default size of SSL / TLS messages. If you
389  * change the value here, other clients / servers may not be able to
390  * communicate with you anymore. Only change this value if you control
391  * both sides of the connection and have it reduced at both sides, or
392  * if you're using the Max Fragment Length extension and you know all your
393  * peers are using it too!
394  */
395 #if !defined(MBEDTLS_SSL_IN_CONTENT_LEN)
396 #define MBEDTLS_SSL_IN_CONTENT_LEN 16384
397 #endif
398 
399 #if !defined(MBEDTLS_SSL_OUT_CONTENT_LEN)
400 #define MBEDTLS_SSL_OUT_CONTENT_LEN 16384
401 #endif
403 /*
404  * Maximum number of heap-allocated bytes for the purpose of
405  * DTLS handshake message reassembly and future message buffering.
406  */
407 #if !defined(MBEDTLS_SSL_DTLS_MAX_BUFFERING)
408 #define MBEDTLS_SSL_DTLS_MAX_BUFFERING 32768
409 #endif
410 
411 /*
412  * Maximum length of CIDs for incoming and outgoing messages.
413  */
414 #if !defined(MBEDTLS_SSL_CID_IN_LEN_MAX)
415 #define MBEDTLS_SSL_CID_IN_LEN_MAX 32
416 #endif
417 
418 #if !defined(MBEDTLS_SSL_CID_OUT_LEN_MAX)
419 #define MBEDTLS_SSL_CID_OUT_LEN_MAX 32
420 #endif
422 #if !defined(MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY)
423 #define MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY 16
424 #endif
426 #if !defined(MBEDTLS_SSL_MAX_EARLY_DATA_SIZE)
427 #define MBEDTLS_SSL_MAX_EARLY_DATA_SIZE 1024
428 #endif
430 #if !defined(MBEDTLS_SSL_TLS1_3_TICKET_AGE_TOLERANCE)
431 #define MBEDTLS_SSL_TLS1_3_TICKET_AGE_TOLERANCE 6000
432 #endif
434 #if !defined(MBEDTLS_SSL_TLS1_3_TICKET_NONCE_LENGTH)
435 #define MBEDTLS_SSL_TLS1_3_TICKET_NONCE_LENGTH 32
436 #endif
438 #if !defined(MBEDTLS_SSL_TLS1_3_DEFAULT_NEW_SESSION_TICKETS)
439 #define MBEDTLS_SSL_TLS1_3_DEFAULT_NEW_SESSION_TICKETS 1
440 #endif
444 /*
445  * Default to standard CID mode
446  */
447 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID) && \
448  !defined(MBEDTLS_SSL_DTLS_CONNECTION_ID_COMPAT)
449 #define MBEDTLS_SSL_DTLS_CONNECTION_ID_COMPAT 0
450 #endif
451 
452 /*
453  * Length of the verify data for secure renegotiation
454  */
455 #define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 12
456 
457 /*
458  * Signaling ciphersuite values (SCSV)
459  */
460 #define MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO 0xFF
462 /*
463  * Supported Signature and Hash algorithms (For TLS 1.2)
464  * RFC 5246 section 7.4.1.4.1
465  */
466 #define MBEDTLS_SSL_HASH_NONE 0
467 #define MBEDTLS_SSL_HASH_MD5 1
468 #define MBEDTLS_SSL_HASH_SHA1 2
469 #define MBEDTLS_SSL_HASH_SHA224 3
470 #define MBEDTLS_SSL_HASH_SHA256 4
471 #define MBEDTLS_SSL_HASH_SHA384 5
472 #define MBEDTLS_SSL_HASH_SHA512 6
474 #define MBEDTLS_SSL_SIG_ANON 0
475 #define MBEDTLS_SSL_SIG_RSA 1
476 #define MBEDTLS_SSL_SIG_ECDSA 3
478 /*
479  * TLS 1.3 signature algorithms
480  * RFC 8446, Section 4.2.3
481  */
483 /* RSASSA-PKCS1-v1_5 algorithms */
484 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA256 0x0401
485 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA384 0x0501
486 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA512 0x0601
487 
488 /* ECDSA algorithms */
489 #define MBEDTLS_TLS1_3_SIG_ECDSA_SECP256R1_SHA256 0x0403
490 #define MBEDTLS_TLS1_3_SIG_ECDSA_SECP384R1_SHA384 0x0503
491 #define MBEDTLS_TLS1_3_SIG_ECDSA_SECP521R1_SHA512 0x0603
493 /* RSASSA-PSS algorithms with public key OID rsaEncryption */
494 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA256 0x0804
495 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA384 0x0805
496 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA512 0x0806
498 /* EdDSA algorithms */
499 #define MBEDTLS_TLS1_3_SIG_ED25519 0x0807
500 #define MBEDTLS_TLS1_3_SIG_ED448 0x0808
502 /* RSASSA-PSS algorithms with public key OID RSASSA-PSS */
503 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA256 0x0809
504 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA384 0x080A
505 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA512 0x080B
507 /* LEGACY ALGORITHMS */
508 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA1 0x0201
509 #define MBEDTLS_TLS1_3_SIG_ECDSA_SHA1 0x0203
511 #define MBEDTLS_TLS1_3_SIG_NONE 0x0
512 
513 /*
514  * Client Certificate Types
515  * RFC 5246 section 7.4.4 plus RFC 4492 section 5.5
516  */
517 #define MBEDTLS_SSL_CERT_TYPE_RSA_SIGN 1
518 #define MBEDTLS_SSL_CERT_TYPE_ECDSA_SIGN 64
519 
520 /*
521  * Message, alert and handshake types
522  */
523 #define MBEDTLS_SSL_MSG_CHANGE_CIPHER_SPEC 20
524 #define MBEDTLS_SSL_MSG_ALERT 21
525 #define MBEDTLS_SSL_MSG_HANDSHAKE 22
526 #define MBEDTLS_SSL_MSG_APPLICATION_DATA 23
527 #define MBEDTLS_SSL_MSG_CID 25
528 
529 #define MBEDTLS_SSL_ALERT_LEVEL_WARNING 1
530 #define MBEDTLS_SSL_ALERT_LEVEL_FATAL 2
532 #define MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY 0 /* 0x00 */
533 #define MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE 10 /* 0x0A */
534 #define MBEDTLS_SSL_ALERT_MSG_BAD_RECORD_MAC 20 /* 0x14 */
535 #define MBEDTLS_SSL_ALERT_MSG_DECRYPTION_FAILED 21 /* 0x15 */
536 #define MBEDTLS_SSL_ALERT_MSG_RECORD_OVERFLOW 22 /* 0x16 */
537 #define MBEDTLS_SSL_ALERT_MSG_DECOMPRESSION_FAILURE 30 /* 0x1E */
538 #define MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE 40 /* 0x28 */
539 #define MBEDTLS_SSL_ALERT_MSG_NO_CERT 41 /* 0x29 */
540 #define MBEDTLS_SSL_ALERT_MSG_BAD_CERT 42 /* 0x2A */
541 #define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT 43 /* 0x2B */
542 #define MBEDTLS_SSL_ALERT_MSG_CERT_REVOKED 44 /* 0x2C */
543 #define MBEDTLS_SSL_ALERT_MSG_CERT_EXPIRED 45 /* 0x2D */
544 #define MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN 46 /* 0x2E */
545 #define MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER 47 /* 0x2F */
546 #define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA 48 /* 0x30 */
547 #define MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED 49 /* 0x31 */
548 #define MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR 50 /* 0x32 */
549 #define MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR 51 /* 0x33 */
550 #define MBEDTLS_SSL_ALERT_MSG_EXPORT_RESTRICTION 60 /* 0x3C */
551 #define MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION 70 /* 0x46 */
552 #define MBEDTLS_SSL_ALERT_MSG_INSUFFICIENT_SECURITY 71 /* 0x47 */
553 #define MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR 80 /* 0x50 */
554 #define MBEDTLS_SSL_ALERT_MSG_INAPROPRIATE_FALLBACK 86 /* 0x56 */
555 #define MBEDTLS_SSL_ALERT_MSG_USER_CANCELED 90 /* 0x5A */
556 #define MBEDTLS_SSL_ALERT_MSG_NO_RENEGOTIATION 100 /* 0x64 */
557 #define MBEDTLS_SSL_ALERT_MSG_MISSING_EXTENSION 109 /* 0x6d -- new in TLS 1.3 */
558 #define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT 110 /* 0x6E */
559 #define MBEDTLS_SSL_ALERT_MSG_UNRECOGNIZED_NAME 112 /* 0x70 */
560 #define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_PSK_IDENTITY 115 /* 0x73 */
561 #define MBEDTLS_SSL_ALERT_MSG_CERT_REQUIRED 116 /* 0x74 */
562 #define MBEDTLS_SSL_ALERT_MSG_NO_APPLICATION_PROTOCOL 120 /* 0x78 */
564 #define MBEDTLS_SSL_HS_HELLO_REQUEST 0
565 #define MBEDTLS_SSL_HS_CLIENT_HELLO 1
566 #define MBEDTLS_SSL_HS_SERVER_HELLO 2
567 #define MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST 3
568 #define MBEDTLS_SSL_HS_NEW_SESSION_TICKET 4
569 #define MBEDTLS_SSL_HS_END_OF_EARLY_DATA 5
570 #define MBEDTLS_SSL_HS_ENCRYPTED_EXTENSIONS 8
571 #define MBEDTLS_SSL_HS_CERTIFICATE 11
572 #define MBEDTLS_SSL_HS_SERVER_KEY_EXCHANGE 12
573 #define MBEDTLS_SSL_HS_CERTIFICATE_REQUEST 13
574 #define MBEDTLS_SSL_HS_SERVER_HELLO_DONE 14
575 #define MBEDTLS_SSL_HS_CERTIFICATE_VERIFY 15
576 #define MBEDTLS_SSL_HS_CLIENT_KEY_EXCHANGE 16
577 #define MBEDTLS_SSL_HS_FINISHED 20
578 #define MBEDTLS_SSL_HS_MESSAGE_HASH 254
580 /*
581  * TLS extensions
582  */
583 #define MBEDTLS_TLS_EXT_SERVERNAME 0
584 #define MBEDTLS_TLS_EXT_SERVERNAME_HOSTNAME 0
585 
586 #define MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH 1
587 
588 #define MBEDTLS_TLS_EXT_TRUNCATED_HMAC 4
589 #define MBEDTLS_TLS_EXT_STATUS_REQUEST 5 /* RFC 6066 TLS 1.2 and 1.3 */
591 #define MBEDTLS_TLS_EXT_SUPPORTED_ELLIPTIC_CURVES 10
592 #define MBEDTLS_TLS_EXT_SUPPORTED_GROUPS 10 /* RFC 8422,7919 TLS 1.2 and 1.3 */
593 #define MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS 11
595 #define MBEDTLS_TLS_EXT_SIG_ALG 13 /* RFC 8446 TLS 1.3 */
596 #define MBEDTLS_TLS_EXT_USE_SRTP 14
597 #define MBEDTLS_TLS_EXT_HEARTBEAT 15 /* RFC 6520 TLS 1.2 and 1.3 */
598 #define MBEDTLS_TLS_EXT_ALPN 16
600 #define MBEDTLS_TLS_EXT_SCT 18 /* RFC 6962 TLS 1.2 and 1.3 */
601 #define MBEDTLS_TLS_EXT_CLI_CERT_TYPE 19 /* RFC 7250 TLS 1.2 and 1.3 */
602 #define MBEDTLS_TLS_EXT_SERV_CERT_TYPE 20 /* RFC 7250 TLS 1.2 and 1.3 */
603 #define MBEDTLS_TLS_EXT_PADDING 21 /* RFC 7685 TLS 1.2 and 1.3 */
604 #define MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC 22 /* 0x16 */
605 #define MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET 0x0017 /* 23 */
607 #define MBEDTLS_TLS_EXT_RECORD_SIZE_LIMIT 28 /* RFC 8449 (implemented for TLS 1.3 only) */
609 #define MBEDTLS_TLS_EXT_SESSION_TICKET 35
611 #define MBEDTLS_TLS_EXT_PRE_SHARED_KEY 41 /* RFC 8446 TLS 1.3 */
612 #define MBEDTLS_TLS_EXT_EARLY_DATA 42 /* RFC 8446 TLS 1.3 */
613 #define MBEDTLS_TLS_EXT_SUPPORTED_VERSIONS 43 /* RFC 8446 TLS 1.3 */
614 #define MBEDTLS_TLS_EXT_COOKIE 44 /* RFC 8446 TLS 1.3 */
615 #define MBEDTLS_TLS_EXT_PSK_KEY_EXCHANGE_MODES 45 /* RFC 8446 TLS 1.3 */
616 
617 #define MBEDTLS_TLS_EXT_CERT_AUTH 47 /* RFC 8446 TLS 1.3 */
618 #define MBEDTLS_TLS_EXT_OID_FILTERS 48 /* RFC 8446 TLS 1.3 */
619 #define MBEDTLS_TLS_EXT_POST_HANDSHAKE_AUTH 49 /* RFC 8446 TLS 1.3 */
620 #define MBEDTLS_TLS_EXT_SIG_ALG_CERT 50 /* RFC 8446 TLS 1.3 */
621 #define MBEDTLS_TLS_EXT_KEY_SHARE 51 /* RFC 8446 TLS 1.3 */
622 
623 #if MBEDTLS_SSL_DTLS_CONNECTION_ID_COMPAT == 0
624 #define MBEDTLS_TLS_EXT_CID 54 /* RFC 9146 DTLS 1.2 CID */
625 #else
626 #define MBEDTLS_TLS_EXT_CID 254 /* Pre-RFC 9146 DTLS 1.2 CID */
627 #endif
628 
629 #define MBEDTLS_TLS_EXT_ECJPAKE_KKPP 256 /* experimental */
631 #define MBEDTLS_TLS_EXT_RENEGOTIATION_INFO 0xFF01
632 
633 /*
634  * Size defines
635  */
636 #if !defined(MBEDTLS_PSK_MAX_LEN)
637 /*
638  * If the library supports TLS 1.3 tickets and the cipher suite
639  * TLS1-3-AES-256-GCM-SHA384, set the PSK maximum length to 48 instead of 32.
640  * That way, the TLS 1.3 client and server are able to resume sessions where
641  * the cipher suite is TLS1-3-AES-256-GCM-SHA384 (pre-shared keys are 48
642  * bytes long in that case).
643  */
644 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && \
645  defined(MBEDTLS_SSL_SESSION_TICKETS) && \
646  defined(MBEDTLS_SSL_HAVE_AES) && defined(MBEDTLS_SSL_HAVE_GCM) && \
647  defined(MBEDTLS_MD_CAN_SHA384)
648 #define MBEDTLS_PSK_MAX_LEN 48 /* 384 bits */
649 #else
650 #define MBEDTLS_PSK_MAX_LEN 32 /* 256 bits */
651 #endif
652 #endif /* !MBEDTLS_PSK_MAX_LEN */
653 
654 /* Dummy type used only for its size */
656  unsigned char dummy; /* Make the union non-empty even with SSL disabled */
657 #if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)
658  unsigned char _pms_rsa[48]; /* RFC 5246 8.1.1 */
659 #endif
660 #if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)
661  unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]; /* RFC 5246 8.1.2 */
662 #endif
663 #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
664  defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
665  defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
666  defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
667  unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]; /* RFC 4492 5.10 */
668 #endif
669 #if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
670  unsigned char _pms_psk[4 + 2 * MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 2 */
671 #endif
672 #if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
674  + MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 3 */
675 #endif
676 #if defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)
677  unsigned char _pms_rsa_psk[52 + MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 4 */
678 #endif
679 #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
681  + MBEDTLS_PSK_MAX_LEN]; /* RFC 5489 2 */
682 #endif
683 #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
684  unsigned char _pms_ecjpake[32]; /* Thread spec: SHA-256 output */
685 #endif
686 };
688 #define MBEDTLS_PREMASTER_SIZE sizeof(union mbedtls_ssl_premaster_secret)
689 
690 #define MBEDTLS_TLS1_3_MD_MAX_SIZE PSA_HASH_MAX_SIZE
691 
692 
693 /* Length in number of bytes of the TLS sequence number */
694 #define MBEDTLS_SSL_SEQUENCE_NUMBER_LEN 8
695 
696 #ifdef __cplusplus
697 extern "C" {
698 #endif
699 
700 /*
701  * SSL state machine
702  */
703 typedef enum {
734 }
737 /*
738  * Early data status, client side only.
739  */
740 
741 #if defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_CLI_C)
742 typedef enum {
743 /*
744  * See documentation of mbedtls_ssl_get_early_data_status().
745  */
750 #endif /* MBEDTLS_SSL_EARLY_DATA && MBEDTLS_SSL_CLI_C */
751 
769 typedef int mbedtls_ssl_send_t(void *ctx,
770  const unsigned char *buf,
771  size_t len);
772 
793 typedef int mbedtls_ssl_recv_t(void *ctx,
794  unsigned char *buf,
795  size_t len);
796 
819 typedef int mbedtls_ssl_recv_timeout_t(void *ctx,
820  unsigned char *buf,
821  size_t len,
822  uint32_t timeout);
845 typedef void mbedtls_ssl_set_timer_t(void *ctx,
846  uint32_t int_ms,
847  uint32_t fin_ms);
848 
860 typedef int mbedtls_ssl_get_timer_t(void *ctx);
861 
862 /* Defined below */
867 /* Defined in library/ssl_misc.h */
871 #if defined(MBEDTLS_X509_CRT_PARSE_C)
873 #endif
874 #if defined(MBEDTLS_SSL_PROTO_DTLS)
876 #endif
877 
878 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS)
879 #define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_RESUMPTION \
880  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK /* 1U << 0 */
881 #define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_EPHEMERAL_RESUMPTION \
882  MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL /* 1U << 2 */
883 #define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA (1U << 3)
884 
885 #define MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK \
886  (MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_RESUMPTION | \
887  MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_EPHEMERAL_RESUMPTION | \
888  MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA)
889 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 && MBEDTLS_SSL_SESSION_TICKETS */
890 
914 typedef int mbedtls_ssl_cache_get_t(void *data,
915  unsigned char const *session_id,
916  size_t session_id_len,
917  mbedtls_ssl_session *session);
936 typedef int mbedtls_ssl_cache_set_t(void *data,
937  unsigned char const *session_id,
938  size_t session_id_len,
939  const mbedtls_ssl_session *session);
940 
941 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
942 #if defined(MBEDTLS_X509_CRT_PARSE_C)
943 
1015  mbedtls_x509_crt *cert,
1016  mbedtls_md_type_t md_alg,
1017  const unsigned char *hash,
1018  size_t hash_len);
1019 
1081  mbedtls_x509_crt *cert,
1082  const unsigned char *input,
1083  size_t input_len);
1084 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1085 
1129  unsigned char *output,
1130  size_t *output_len,
1131  size_t output_size);
1132 
1151 #endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
1152 
1153 #if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
1154  !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
1155 #define MBEDTLS_SSL_PEER_CERT_DIGEST_MAX_LEN 48
1156 #if defined(MBEDTLS_MD_CAN_SHA256)
1157 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA256
1158 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 32
1159 #elif defined(MBEDTLS_MD_CAN_SHA384)
1160 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA384
1161 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 48
1162 #elif defined(MBEDTLS_MD_CAN_SHA1)
1163 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA1
1164 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 20
1165 #else
1166 /* This is already checked in check_config.h, but be sure. */
1167 #error "Bad configuration - need SHA-1, SHA-256 or SHA-512 enabled to compute digest of peer CRT."
1168 #endif
1169 #endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED &&
1170  !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1171 
1172 typedef struct {
1173  unsigned char client_application_traffic_secret_N[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1174  unsigned char server_application_traffic_secret_N[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1175  unsigned char exporter_master_secret[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1176  unsigned char resumption_master_secret[MBEDTLS_TLS1_3_MD_MAX_SIZE];
1179 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1181 #define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH 255
1182 #define MBEDTLS_TLS_SRTP_MAX_PROFILE_LIST_LENGTH 4
1183 /*
1184  * For code readability use a typedef for DTLS-SRTP profiles
1185  *
1186  * Use_srtp extension protection profiles values as defined in
1187  * http://www.iana.org/assignments/srtp-protection/srtp-protection.xhtml
1188  *
1189  * Reminder: if this list is expanded mbedtls_ssl_check_srtp_profile_value
1190  * must be updated too.
1191  */
1192 #define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80 ((uint16_t) 0x0001)
1193 #define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32 ((uint16_t) 0x0002)
1194 #define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80 ((uint16_t) 0x0005)
1195 #define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32 ((uint16_t) 0x0006)
1196 /* This one is not iana defined, but for code readability. */
1197 #define MBEDTLS_TLS_SRTP_UNSET ((uint16_t) 0x0000)
1199 typedef uint16_t mbedtls_ssl_srtp_profile;
1203  mbedtls_ssl_srtp_profile MBEDTLS_PRIVATE(chosen_dtls_srtp_profile);
1205  uint16_t MBEDTLS_PRIVATE(mki_len);
1208 }
1210 
1211 #endif /* MBEDTLS_SSL_DTLS_SRTP */
1212 
1214 typedef enum {
1216  MBEDTLS_SSL_VERSION_TLS1_2 = 0x0303,
1217  MBEDTLS_SSL_VERSION_TLS1_3 = 0x0304,
1219 
1220 /*
1221  * This structure is used for storing current session data.
1222  *
1223  * Note: when changing this definition, we need to check and update:
1224  * - in tests/suites/test_suite_ssl.function:
1225  * ssl_populate_session() and ssl_serialize_session_save_load()
1226  * - in library/ssl_tls.c:
1227  * mbedtls_ssl_session_init() and mbedtls_ssl_session_free()
1228  * mbedtls_ssl_session_save() and ssl_session_load()
1229  * ssl_session_copy()
1230  */
1231 struct mbedtls_ssl_session {
1232 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1233  unsigned char MBEDTLS_PRIVATE(mfl_code);
1234 #endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
1235 
1237 #if defined(MBEDTLS_SSL_RECORD_SIZE_LIMIT)
1238  uint16_t MBEDTLS_PRIVATE(record_size_limit);
1239 #endif /* MBEDTLS_SSL_RECORD_SIZE_LIMIT */
1240 
1241  unsigned char MBEDTLS_PRIVATE(exported);
1242  uint8_t MBEDTLS_PRIVATE(endpoint);
1249 #if defined(MBEDTLS_HAVE_TIME)
1251 #endif
1252  int MBEDTLS_PRIVATE(ciphersuite);
1253  size_t MBEDTLS_PRIVATE(id_len);
1254  unsigned char MBEDTLS_PRIVATE(id)[32];
1255  unsigned char MBEDTLS_PRIVATE(master)[48];
1257 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1258 #if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
1260 #else /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1263  unsigned char *MBEDTLS_PRIVATE(peer_cert_digest);
1264  size_t MBEDTLS_PRIVATE(peer_cert_digest_len);
1265  mbedtls_md_type_t MBEDTLS_PRIVATE(peer_cert_digest_type);
1266 #endif /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1267 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1268  uint32_t MBEDTLS_PRIVATE(verify_result);
1270 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
1271  unsigned char *MBEDTLS_PRIVATE(ticket);
1272  size_t MBEDTLS_PRIVATE(ticket_len);
1273  uint32_t MBEDTLS_PRIVATE(ticket_lifetime);
1274 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_CLI_C */
1275 
1276 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C) && \
1277  defined(MBEDTLS_HAVE_TIME)
1294  mbedtls_ms_time_t MBEDTLS_PRIVATE(ticket_creation_time);
1295 #endif
1296 
1297 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS)
1298  uint32_t MBEDTLS_PRIVATE(ticket_age_add);
1299  uint8_t MBEDTLS_PRIVATE(ticket_flags);
1300  uint8_t MBEDTLS_PRIVATE(resumption_key_len);
1301  unsigned char MBEDTLS_PRIVATE(resumption_key)[MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN];
1302 
1303 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION) && defined(MBEDTLS_SSL_CLI_C)
1304  char *MBEDTLS_PRIVATE(hostname);
1305 #endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION && MBEDTLS_SSL_CLI_C */
1307 #if defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_ALPN) && defined(MBEDTLS_SSL_SRV_C)
1308  char *ticket_alpn;
1310 #endif
1311 
1312 #if defined(MBEDTLS_HAVE_TIME) && defined(MBEDTLS_SSL_CLI_C)
1313 
1314  mbedtls_ms_time_t MBEDTLS_PRIVATE(ticket_reception_time);
1315 #endif
1316 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 && MBEDTLS_SSL_SESSION_TICKETS */
1317 
1318 #if defined(MBEDTLS_SSL_EARLY_DATA)
1319  uint32_t MBEDTLS_PRIVATE(max_early_data_size);
1320 #endif
1321 
1322 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1323  int MBEDTLS_PRIVATE(encrypt_then_mac);
1324 #endif
1326 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1328 #endif
1329 };
1330 
1331 /*
1332  * Identifiers for PRFs used in various versions of TLS.
1333  */
1334 typedef enum {
1343 typedef enum {
1345 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1352 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1370 typedef void mbedtls_ssl_export_keys_t(void *p_expkey,
1372  const unsigned char *secret,
1373  size_t secret_len,
1374  const unsigned char client_random[32],
1375  const unsigned char server_random[32],
1376  mbedtls_tls_prf_types tls_prf_type);
1377 
1378 #if defined(MBEDTLS_SSL_SRV_C)
1379 
1394 typedef int (*mbedtls_ssl_hs_cb_t)(mbedtls_ssl_context *ssl);
1395 #endif
1396 
1397 /* A type for storing user data in a library structure.
1398  *
1399  * The representation of type may change in future versions of the library.
1400  * Only the behaviors guaranteed by documented accessor functions are
1401  * guaranteed to remain stable.
1402  */
1403 typedef union {
1404  uintptr_t n; /* typically a handle to an associated object */
1405  void *p; /* typically a pointer to extra data */
1407 
1412  /* Group items mostly by size. This helps to reduce memory wasted to
1413  * padding. It also helps to keep smaller fields early in the structure,
1414  * so that elements tend to be in the 128-element direct access window
1415  * on Arm Thumb, which reduces the code size. */
1416 
1420  /*
1421  * Flags (could be bit-fields to save RAM, but separate bytes make
1422  * the code smaller on architectures with an instruction for direct
1423  * byte access).
1424  */
1425 
1426  uint8_t MBEDTLS_PRIVATE(endpoint);
1427  uint8_t MBEDTLS_PRIVATE(transport);
1428  uint8_t MBEDTLS_PRIVATE(authmode);
1429  /* needed even with renego disabled for LEGACY_BREAK_HANDSHAKE */
1430  uint8_t MBEDTLS_PRIVATE(allow_legacy_renegotiation);
1431 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1432  uint8_t MBEDTLS_PRIVATE(mfl_code);
1434 #endif
1435 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1436  uint8_t MBEDTLS_PRIVATE(encrypt_then_mac);
1437 #endif
1438 #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
1439  uint8_t MBEDTLS_PRIVATE(extended_ms);
1440 #endif
1441 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1442  uint8_t MBEDTLS_PRIVATE(anti_replay);
1443 #endif
1444 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1445  uint8_t MBEDTLS_PRIVATE(disable_renegotiation);
1446 #endif
1447 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
1448  defined(MBEDTLS_SSL_CLI_C)
1449  uint8_t MBEDTLS_PRIVATE(session_tickets);
1450 #endif
1452 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
1453  defined(MBEDTLS_SSL_SRV_C) && \
1454  defined(MBEDTLS_SSL_PROTO_TLS1_3)
1455  uint16_t MBEDTLS_PRIVATE(new_session_tickets_count);
1456 #endif
1457 
1458 #if defined(MBEDTLS_SSL_SRV_C)
1459  uint8_t MBEDTLS_PRIVATE(cert_req_ca_list);
1461  uint8_t MBEDTLS_PRIVATE(respect_cli_pref);
1464 #endif
1465 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1466  uint8_t MBEDTLS_PRIVATE(ignore_unexpected_cid);
1469 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1470 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1471  uint8_t MBEDTLS_PRIVATE(dtls_srtp_mki_support); /* support having mki_value
1472  in the use_srtp extension? */
1473 #endif
1474 
1475  /*
1476  * Pointers
1477  */
1478 
1480  const int *MBEDTLS_PRIVATE(ciphersuite_list);
1481 
1482 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1483 
1484  int MBEDTLS_PRIVATE(tls13_kex_modes);
1485 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1488  void(*MBEDTLS_PRIVATE(f_dbg))(void *, int, const char *, int, const char *);
1489  void *MBEDTLS_PRIVATE(p_dbg);
1492  int(*MBEDTLS_PRIVATE(f_rng))(void *, unsigned char *, size_t);
1493  void *MBEDTLS_PRIVATE(p_rng);
1499  void *MBEDTLS_PRIVATE(p_cache);
1501 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
1503  int(*MBEDTLS_PRIVATE(f_sni))(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
1504  void *MBEDTLS_PRIVATE(p_sni);
1505 #endif
1506 
1507 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1508 
1509  int(*MBEDTLS_PRIVATE(f_vrfy))(void *, mbedtls_x509_crt *, int, uint32_t *);
1510  void *MBEDTLS_PRIVATE(p_vrfy);
1511 #endif
1512 
1513 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED)
1514 #if defined(MBEDTLS_SSL_SRV_C)
1516  int(*MBEDTLS_PRIVATE(f_psk))(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
1517  void *MBEDTLS_PRIVATE(p_psk);
1518 #endif
1519 #endif
1520 
1521 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1523  int(*MBEDTLS_PRIVATE(f_cookie_write))(void *, unsigned char **, unsigned char *,
1524  const unsigned char *, size_t);
1526  int(*MBEDTLS_PRIVATE(f_cookie_check))(void *, const unsigned char *, size_t,
1527  const unsigned char *, size_t);
1528  void *MBEDTLS_PRIVATE(p_cookie);
1529 #endif
1530 
1531 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
1533  int(*MBEDTLS_PRIVATE(f_ticket_write))(void *, const mbedtls_ssl_session *,
1534  unsigned char *, const unsigned char *, size_t *,
1535  uint32_t *);
1537  int(*MBEDTLS_PRIVATE(f_ticket_parse))(void *, mbedtls_ssl_session *, unsigned char *, size_t);
1538  void *MBEDTLS_PRIVATE(p_ticket);
1539 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
1540 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1541  size_t MBEDTLS_PRIVATE(cid_len);
1542 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1544 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1545  const mbedtls_x509_crt_profile *MBEDTLS_PRIVATE(cert_profile);
1549 #if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
1551  void *MBEDTLS_PRIVATE(p_ca_cb);
1552 #endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
1553 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1555 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
1556 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1558  mbedtls_ssl_async_decrypt_t *MBEDTLS_PRIVATE(f_async_decrypt_start);
1559 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1560  mbedtls_ssl_async_resume_t *MBEDTLS_PRIVATE(f_async_resume);
1561  mbedtls_ssl_async_cancel_t *MBEDTLS_PRIVATE(f_async_cancel);
1562  void *MBEDTLS_PRIVATE(p_async_config_data);
1563 #endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
1565 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
1567 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
1568  const int *MBEDTLS_PRIVATE(sig_hashes);
1569 #endif
1570  const uint16_t *MBEDTLS_PRIVATE(sig_algs);
1571 #endif /* MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
1572 
1573 #if defined(MBEDTLS_ECP_C) && !defined(MBEDTLS_DEPRECATED_REMOVED)
1574  const mbedtls_ecp_group_id *MBEDTLS_PRIVATE(curve_list);
1575 #endif
1577  const uint16_t *MBEDTLS_PRIVATE(group_list);
1579 #if defined(MBEDTLS_DHM_C)
1580  mbedtls_mpi MBEDTLS_PRIVATE(dhm_P);
1581  mbedtls_mpi MBEDTLS_PRIVATE(dhm_G);
1582 #endif
1584 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED)
1585 
1586 #if defined(MBEDTLS_USE_PSA_CRYPTO)
1593 #endif /* MBEDTLS_USE_PSA_CRYPTO */
1594  unsigned char *MBEDTLS_PRIVATE(psk);
1598  size_t MBEDTLS_PRIVATE(psk_len);
1604  unsigned char *MBEDTLS_PRIVATE(psk_identity);
1609  size_t MBEDTLS_PRIVATE(psk_identity_len);
1615 #endif /* MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED */
1616 
1617 #if defined(MBEDTLS_SSL_EARLY_DATA)
1618  int MBEDTLS_PRIVATE(early_data_enabled);
1622 #if defined(MBEDTLS_SSL_SRV_C)
1623  /* The maximum amount of 0-RTT data. RFC 8446 section 4.6.1 */
1624  uint32_t MBEDTLS_PRIVATE(max_early_data_size);
1625 #endif /* MBEDTLS_SSL_SRV_C */
1626 
1627 #endif /* MBEDTLS_SSL_EARLY_DATA */
1628 
1629 #if defined(MBEDTLS_SSL_ALPN)
1630  const char **MBEDTLS_PRIVATE(alpn_list);
1631 #endif
1632 
1633 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1634 
1635  const mbedtls_ssl_srtp_profile *MBEDTLS_PRIVATE(dtls_srtp_profile_list);
1637  size_t MBEDTLS_PRIVATE(dtls_srtp_profile_list_len);
1638 #endif /* MBEDTLS_SSL_DTLS_SRTP */
1639 
1640  /*
1641  * Numerical settings (int)
1642  */
1644  uint32_t MBEDTLS_PRIVATE(read_timeout);
1646 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1647  uint32_t MBEDTLS_PRIVATE(hs_timeout_min);
1649  uint32_t MBEDTLS_PRIVATE(hs_timeout_max);
1651 #endif
1652 
1653 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1654  int MBEDTLS_PRIVATE(renego_max_records);
1655  unsigned char MBEDTLS_PRIVATE(renego_period)[8];
1657 #endif
1658 
1659  unsigned int MBEDTLS_PRIVATE(badmac_limit);
1661 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
1662  unsigned int MBEDTLS_PRIVATE(dhm_min_bitlen);
1663 #endif
1664 
1671 
1672 #if defined(MBEDTLS_SSL_SRV_C)
1674 #endif /* MBEDTLS_SSL_SRV_C */
1675 
1676 #if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
1677  const mbedtls_x509_crt *MBEDTLS_PRIVATE(dn_hints);
1678 #endif
1679 };
1680 
1681 struct mbedtls_ssl_context {
1682  const mbedtls_ssl_config *MBEDTLS_PRIVATE(conf);
1684  /*
1685  * Miscellaneous
1686  */
1687  int MBEDTLS_PRIVATE(state);
1688 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1689  int MBEDTLS_PRIVATE(renego_status);
1690  int MBEDTLS_PRIVATE(renego_records_seen);
1693 #endif /* MBEDTLS_SSL_RENEGOTIATION */
1694 
1712 
1713 #if defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_CLI_C)
1714 
1718  int MBEDTLS_PRIVATE(early_data_state);
1719 #endif
1720 
1721  unsigned MBEDTLS_PRIVATE(badmac_seen);
1723 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1725  int(*MBEDTLS_PRIVATE(f_vrfy))(void *, mbedtls_x509_crt *, int, uint32_t *);
1726  void *MBEDTLS_PRIVATE(p_vrfy);
1727 #endif
1728 
1734  void *MBEDTLS_PRIVATE(p_bio);
1736  /*
1737  * Session layer
1738  */
1739  mbedtls_ssl_session *MBEDTLS_PRIVATE(session_in);
1742  mbedtls_ssl_session *MBEDTLS_PRIVATE(session_negotiate);
1747  /*
1748  * Record layer transformations
1749  */
1753  mbedtls_ssl_transform *MBEDTLS_PRIVATE(transform_out);
1759 #if defined(MBEDTLS_SSL_PROTO_TLS1_2)
1760  mbedtls_ssl_transform *MBEDTLS_PRIVATE(transform_negotiate);
1763 #endif /* MBEDTLS_SSL_PROTO_TLS1_2 */
1764 
1765 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1768  mbedtls_ssl_transform *MBEDTLS_PRIVATE(transform_application);
1769 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
1770 
1771  /*
1772  * Timers
1773  */
1774  void *MBEDTLS_PRIVATE(p_timer);
1779  /*
1780  * Record layer (incoming data)
1781  */
1782  unsigned char *MBEDTLS_PRIVATE(in_buf);
1783  unsigned char *MBEDTLS_PRIVATE(in_ctr);
1786  unsigned char *MBEDTLS_PRIVATE(in_hdr);
1787 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1788  unsigned char *MBEDTLS_PRIVATE(in_cid);
1790 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1791  unsigned char *MBEDTLS_PRIVATE(in_len);
1792  unsigned char *MBEDTLS_PRIVATE(in_iv);
1793  unsigned char *MBEDTLS_PRIVATE(in_msg);
1794  unsigned char *MBEDTLS_PRIVATE(in_offt);
1796  int MBEDTLS_PRIVATE(in_msgtype);
1797  size_t MBEDTLS_PRIVATE(in_msglen);
1798  size_t MBEDTLS_PRIVATE(in_left);
1799 #if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1800  size_t MBEDTLS_PRIVATE(in_buf_len);
1801 #endif
1802 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1803  uint16_t MBEDTLS_PRIVATE(in_epoch);
1804  size_t MBEDTLS_PRIVATE(next_record_offset);
1806 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1807 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1808  uint64_t MBEDTLS_PRIVATE(in_window_top);
1809  uint64_t MBEDTLS_PRIVATE(in_window);
1810 #endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
1811 
1812  size_t MBEDTLS_PRIVATE(in_hslen);
1814  int MBEDTLS_PRIVATE(nb_zero);
1816  int MBEDTLS_PRIVATE(keep_current_message);
1819  /* The following three variables indicate if and, if yes,
1820  * what kind of alert is pending to be sent.
1821  */
1822  unsigned char MBEDTLS_PRIVATE(send_alert);
1826  unsigned char MBEDTLS_PRIVATE(alert_type);
1828  int MBEDTLS_PRIVATE(alert_reason);
1832 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1833  uint8_t MBEDTLS_PRIVATE(disable_datagram_packing);
1835 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1836 
1837 #if defined(MBEDTLS_SSL_EARLY_DATA)
1838 #if defined(MBEDTLS_SSL_SRV_C)
1839  /*
1840  * One of:
1841  * MBEDTLS_SSL_EARLY_DATA_NO_DISCARD
1842  * MBEDTLS_SSL_EARLY_DATA_TRY_TO_DEPROTECT_AND_DISCARD
1843  * MBEDTLS_SSL_EARLY_DATA_DISCARD
1844  */
1845  uint8_t MBEDTLS_PRIVATE(discard_early_data_record);
1846 #endif
1847  uint32_t MBEDTLS_PRIVATE(total_early_data_size);
1848 #endif /* MBEDTLS_SSL_EARLY_DATA */
1849 
1850  /*
1851  * Record layer (outgoing data)
1852  */
1853  unsigned char *MBEDTLS_PRIVATE(out_buf);
1854  unsigned char *MBEDTLS_PRIVATE(out_ctr);
1855  unsigned char *MBEDTLS_PRIVATE(out_hdr);
1856 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1857  unsigned char *MBEDTLS_PRIVATE(out_cid);
1859 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1860  unsigned char *MBEDTLS_PRIVATE(out_len);
1861  unsigned char *MBEDTLS_PRIVATE(out_iv);
1862  unsigned char *MBEDTLS_PRIVATE(out_msg);
1864  int MBEDTLS_PRIVATE(out_msgtype);
1865  size_t MBEDTLS_PRIVATE(out_msglen);
1866  size_t MBEDTLS_PRIVATE(out_left);
1867 #if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1868  size_t MBEDTLS_PRIVATE(out_buf_len);
1869 #endif
1871  unsigned char MBEDTLS_PRIVATE(cur_out_ctr)[MBEDTLS_SSL_SEQUENCE_NUMBER_LEN];
1873 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1874  uint16_t MBEDTLS_PRIVATE(mtu);
1875 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1876 
1877  /*
1878  * User settings
1879  */
1880 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1881  char *MBEDTLS_PRIVATE(hostname);
1883 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1884 
1885 #if defined(MBEDTLS_SSL_ALPN)
1886  const char *MBEDTLS_PRIVATE(alpn_chosen);
1887 #endif /* MBEDTLS_SSL_ALPN */
1888 
1889 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1890  /*
1891  * use_srtp extension
1892  */
1893  mbedtls_dtls_srtp_info MBEDTLS_PRIVATE(dtls_srtp_info);
1894 #endif /* MBEDTLS_SSL_DTLS_SRTP */
1895 
1896  /*
1897  * Information for DTLS hello verify
1898  */
1899 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1900  unsigned char *MBEDTLS_PRIVATE(cli_id);
1901  size_t MBEDTLS_PRIVATE(cli_id_len);
1902 #endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
1903 
1904  /*
1905  * Secure renegotiation
1906  */
1907  /* needed to know when to send extension on server */
1908  int MBEDTLS_PRIVATE(secure_renegotiation);
1910 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1911  size_t MBEDTLS_PRIVATE(verify_data_len);
1912  char MBEDTLS_PRIVATE(own_verify_data)[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN];
1913  char MBEDTLS_PRIVATE(peer_verify_data)[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN];
1914 #endif /* MBEDTLS_SSL_RENEGOTIATION */
1915 
1916 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1917  /* CID configuration to use in subsequent handshakes. */
1923  unsigned char MBEDTLS_PRIVATE(own_cid)[MBEDTLS_SSL_CID_IN_LEN_MAX];
1924  uint8_t MBEDTLS_PRIVATE(own_cid_len);
1925  uint8_t MBEDTLS_PRIVATE(negotiate_cid);
1929 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1933  void *MBEDTLS_PRIVATE(p_export_keys);
1945 };
1946 
1955 const char *mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id);
1956 
1965 int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name);
1966 
1975 
2001  const mbedtls_ssl_config *conf);
2002 
2013 
2020 void mbedtls_ssl_conf_endpoint(mbedtls_ssl_config *conf, int endpoint);
2021 
2030 static inline int mbedtls_ssl_conf_get_endpoint(const mbedtls_ssl_config *conf)
2031 {
2032  return conf->MBEDTLS_PRIVATE(endpoint);
2033 }
2034 
2049 void mbedtls_ssl_conf_transport(mbedtls_ssl_config *conf, int transport);
2050 
2077 void mbedtls_ssl_conf_authmode(mbedtls_ssl_config *conf, int authmode);
2078 
2079 #if defined(MBEDTLS_SSL_EARLY_DATA)
2080 
2107  int early_data_enabled);
2108 
2109 #if defined(MBEDTLS_SSL_SRV_C)
2110 
2135  mbedtls_ssl_config *conf, uint32_t max_early_data_size);
2136 #endif /* MBEDTLS_SSL_SRV_C */
2137 
2138 #endif /* MBEDTLS_SSL_EARLY_DATA */
2139 
2140 #if defined(MBEDTLS_X509_CRT_PARSE_C)
2141 
2157  int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
2158  void *p_vrfy);
2159 #endif /* MBEDTLS_X509_CRT_PARSE_C */
2160 
2169  int (*f_rng)(void *, unsigned char *, size_t),
2170  void *p_rng);
2171 
2187  void (*f_dbg)(void *, int, const char *, int, const char *),
2188  void *p_dbg);
2189 
2201  const mbedtls_ssl_context *ssl)
2202 {
2203  return ssl->MBEDTLS_PRIVATE(conf);
2204 }
2205 
2237  void *p_bio,
2238  mbedtls_ssl_send_t *f_send,
2239  mbedtls_ssl_recv_t *f_recv,
2240  mbedtls_ssl_recv_timeout_t *f_recv_timeout);
2241 
2242 #if defined(MBEDTLS_SSL_PROTO_DTLS)
2243 
2244 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
2245 
2246 
2332  int enable,
2333  unsigned char const *own_cid,
2334  size_t own_cid_len);
2335 
2366  int *enabled,
2367  unsigned char own_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX],
2368  size_t *own_cid_len);
2369 
2408  int *enabled,
2409  unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX],
2410  size_t *peer_cid_len);
2411 
2412 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
2413 
2453 void mbedtls_ssl_set_mtu(mbedtls_ssl_context *ssl, uint16_t mtu);
2454 #endif /* MBEDTLS_SSL_PROTO_DTLS */
2455 
2456 #if defined(MBEDTLS_X509_CRT_PARSE_C)
2457 
2476  int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
2477  void *p_vrfy);
2478 #endif /* MBEDTLS_X509_CRT_PARSE_C */
2479 
2496 void mbedtls_ssl_conf_read_timeout(mbedtls_ssl_config *conf, uint32_t timeout);
2497 
2543  unsigned char *buf,
2544  size_t buflen);
2545 
2567  void *p_timer,
2568  mbedtls_ssl_set_timer_t *f_set_timer,
2569  mbedtls_ssl_get_timer_t *f_get_timer);
2570 
2571 #if defined(MBEDTLS_SSL_SRV_C)
2572 
2582 static inline void mbedtls_ssl_conf_cert_cb(mbedtls_ssl_config *conf,
2583  mbedtls_ssl_hs_cb_t f_cert_cb)
2584 {
2585  conf->MBEDTLS_PRIVATE(f_cert_cb) = f_cert_cb;
2586 }
2587 #endif /* MBEDTLS_SSL_SRV_C */
2608 typedef int mbedtls_ssl_ticket_write_t(void *p_ticket,
2609  const mbedtls_ssl_session *session,
2610  unsigned char *start,
2611  const unsigned char *end,
2612  size_t *tlen,
2613  uint32_t *lifetime);
2638 typedef int mbedtls_ssl_ticket_parse_t(void *p_ticket,
2639  mbedtls_ssl_session *session,
2640  unsigned char *buf,
2641  size_t len);
2642 
2643 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
2659  mbedtls_ssl_ticket_write_t *f_ticket_write,
2660  mbedtls_ssl_ticket_parse_t *f_ticket_parse,
2661  void *p_ticket);
2662 
2663 #if defined(MBEDTLS_HAVE_TIME)
2664 
2678  mbedtls_ssl_session *session, mbedtls_ms_time_t *ticket_creation_time)
2679 {
2680  if (session == NULL || ticket_creation_time == NULL ||
2681  session->MBEDTLS_PRIVATE(endpoint) != MBEDTLS_SSL_IS_SERVER) {
2683  }
2684 
2685  *ticket_creation_time = session->MBEDTLS_PRIVATE(ticket_creation_time);
2686 
2687  return 0;
2688 }
2689 #endif /* MBEDTLS_HAVE_TIME */
2690 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
2691 
2699 static inline unsigned const char (*mbedtls_ssl_session_get_id(const mbedtls_ssl_session *
2700  session))[32]
2701 {
2702  return &session->MBEDTLS_PRIVATE(id);
2703 }
2704 
2712 static inline size_t mbedtls_ssl_session_get_id_len(const mbedtls_ssl_session *session)
2713 {
2714  return session->MBEDTLS_PRIVATE(id_len);
2715 }
2716 
2724 static inline int mbedtls_ssl_session_get_ciphersuite_id(const mbedtls_ssl_session *session)
2725 {
2726  return session->MBEDTLS_PRIVATE(ciphersuite);
2727 }
2728 
2748  mbedtls_ssl_export_keys_t *f_export_keys,
2749  void *p_export_keys);
2750 
2761 static inline void mbedtls_ssl_conf_set_user_data_p(
2762  mbedtls_ssl_config *conf,
2763  void *p)
2764 {
2765  conf->MBEDTLS_PRIVATE(user_data).p = p;
2766 }
2775 static inline void mbedtls_ssl_conf_set_user_data_n(
2776  mbedtls_ssl_config *conf,
2777  uintptr_t n)
2778 {
2779  conf->MBEDTLS_PRIVATE(user_data).n = n;
2780 }
2792 static inline void *mbedtls_ssl_conf_get_user_data_p(
2793  mbedtls_ssl_config *conf)
2794 {
2795  return conf->MBEDTLS_PRIVATE(user_data).p;
2796 }
2797 
2808 static inline uintptr_t mbedtls_ssl_conf_get_user_data_n(
2809  mbedtls_ssl_config *conf)
2810 {
2811  return conf->MBEDTLS_PRIVATE(user_data).n;
2812 }
2813 
2824 static inline void mbedtls_ssl_set_user_data_p(
2825  mbedtls_ssl_context *ssl,
2826  void *p)
2827 {
2828  ssl->MBEDTLS_PRIVATE(user_data).p = p;
2829 }
2838 static inline void mbedtls_ssl_set_user_data_n(
2839  mbedtls_ssl_context *ssl,
2840  uintptr_t n)
2841 {
2842  ssl->MBEDTLS_PRIVATE(user_data).n = n;
2843 }
2855 static inline void *mbedtls_ssl_get_user_data_p(
2856  mbedtls_ssl_context *ssl)
2857 {
2858  return ssl->MBEDTLS_PRIVATE(user_data).p;
2859 }
2860 
2871 static inline uintptr_t mbedtls_ssl_get_user_data_n(
2872  mbedtls_ssl_context *ssl)
2873 {
2874  return ssl->MBEDTLS_PRIVATE(user_data).n;
2875 }
2876 
2877 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
2878 
2909  mbedtls_ssl_async_sign_t *f_async_sign,
2910  mbedtls_ssl_async_decrypt_t *f_async_decrypt,
2911  mbedtls_ssl_async_resume_t *f_async_resume,
2912  mbedtls_ssl_async_cancel_t *f_async_cancel,
2913  void *config_data);
2914 
2924 
2940 
2953  void *ctx);
2954 #endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
2955 
2970 typedef int mbedtls_ssl_cookie_write_t(void *ctx,
2971  unsigned char **p, unsigned char *end,
2972  const unsigned char *info, size_t ilen);
2973 
2987 typedef int mbedtls_ssl_cookie_check_t(void *ctx,
2988  const unsigned char *cookie, size_t clen,
2989  const unsigned char *info, size_t ilen);
2990 
2991 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
2992 
3021  mbedtls_ssl_cookie_write_t *f_cookie_write,
3022  mbedtls_ssl_cookie_check_t *f_cookie_check,
3023  void *p_cookie);
3024 
3045  const unsigned char *info,
3046  size_t ilen);
3047 
3048 #endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
3049 
3050 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
3051 
3067 #endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
3068 
3092 void mbedtls_ssl_conf_dtls_badmac_limit(mbedtls_ssl_config *conf, unsigned limit);
3093 
3094 #if defined(MBEDTLS_SSL_PROTO_DTLS)
3095 
3125  unsigned allow_packing);
3126 
3158 void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max);
3159 #endif /* MBEDTLS_SSL_PROTO_DTLS */
3160 
3161 #if defined(MBEDTLS_SSL_SRV_C)
3162 
3200  void *p_cache,
3201  mbedtls_ssl_cache_get_t *f_get_cache,
3202  mbedtls_ssl_cache_set_t *f_set_cache);
3203 #endif /* MBEDTLS_SSL_SRV_C */
3204 
3205 #if defined(MBEDTLS_SSL_CLI_C)
3206 
3252 #endif /* MBEDTLS_SSL_CLI_C */
3253 
3287  const unsigned char *buf,
3288  size_t len);
3289 
3316  unsigned char *buf,
3317  size_t buf_len,
3318  size_t *olen);
3319 
3362  const int *ciphersuites);
3363 
3364 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
3365 
3408  const int kex_modes);
3409 #endif /* MBEDTLS_SSL_PROTO_TLS1_3 */
3410 
3411 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
3412 #define MBEDTLS_SSL_UNEXPECTED_CID_IGNORE 0
3413 #define MBEDTLS_SSL_UNEXPECTED_CID_FAIL 1
3414 
3446 int mbedtls_ssl_conf_cid(mbedtls_ssl_config *conf, size_t len,
3447  int ignore_other_cids);
3448 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
3449 
3450 #if defined(MBEDTLS_X509_CRT_PARSE_C)
3451 
3462  const mbedtls_x509_crt_profile *profile);
3463 
3476  mbedtls_x509_crt *ca_chain,
3477  mbedtls_x509_crl *ca_crl);
3478 
3479 #if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
3480 
3491 static inline
3493  const mbedtls_x509_crt *crt)
3494 {
3495  conf->MBEDTLS_PRIVATE(dn_hints) = crt;
3496 }
3497 #endif /* MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
3499 #if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
3500 
3552  mbedtls_x509_crt_ca_cb_t f_ca_cb,
3553  void *p_ca_cb);
3554 #endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
3555 
3593  mbedtls_x509_crt *own_cert,
3594  mbedtls_pk_context *pk_key);
3595 #endif /* MBEDTLS_X509_CRT_PARSE_C */
3596 
3597 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED)
3598 
3631  const unsigned char *psk, size_t psk_len,
3632  const unsigned char *psk_identity, size_t psk_identity_len);
3633 
3634 #if defined(MBEDTLS_USE_PSA_CRYPTO)
3635 
3674  const unsigned char *psk_identity,
3675  size_t psk_identity_len);
3676 #endif /* MBEDTLS_USE_PSA_CRYPTO */
3677 
3695  const unsigned char *psk, size_t psk_len);
3696 
3697 #if defined(MBEDTLS_USE_PSA_CRYPTO)
3698 
3719  mbedtls_svc_key_id_t psk);
3720 #endif /* MBEDTLS_USE_PSA_CRYPTO */
3721 
3722 #if defined(MBEDTLS_SSL_SRV_C)
3723 
3762  int (*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *,
3763  size_t),
3764  void *p_psk);
3765 #endif /* MBEDTLS_SSL_SRV_C */
3766 #endif /* MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED */
3767 
3768 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_SRV_C)
3769 
3783  const unsigned char *dhm_P, size_t P_len,
3784  const unsigned char *dhm_G, size_t G_len);
3785 
3796 #endif /* MBEDTLS_DHM_C && defined(MBEDTLS_SSL_SRV_C) */
3797 
3798 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
3799 
3808  unsigned int bitlen);
3809 #endif /* MBEDTLS_DHM_C && MBEDTLS_SSL_CLI_C */
3810 
3811 #if defined(MBEDTLS_ECP_C)
3812 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
3813 
3854 void MBEDTLS_DEPRECATED mbedtls_ssl_conf_curves(mbedtls_ssl_config *conf,
3855  const mbedtls_ecp_group_id *curves);
3856 #endif /* MBEDTLS_DEPRECATED_REMOVED */
3857 #endif /* MBEDTLS_ECP_C */
3858 
3897  const uint16_t *groups);
3898 
3899 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
3900 #if !defined(MBEDTLS_DEPRECATED_REMOVED) && defined(MBEDTLS_SSL_PROTO_TLS1_2)
3901 
3932 void MBEDTLS_DEPRECATED mbedtls_ssl_conf_sig_hashes(mbedtls_ssl_config *conf,
3933  const int *hashes);
3934 #endif /* !MBEDTLS_DEPRECATED_REMOVED && MBEDTLS_SSL_PROTO_TLS1_2 */
3935 
3949  const uint16_t *sig_algs);
3950 #endif /* MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED */
3951 
3952 #if defined(MBEDTLS_X509_CRT_PARSE_C)
3953 
3971 int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname);
3972 
3983 static inline const char *mbedtls_ssl_get_hostname(mbedtls_ssl_context *ssl)
3984 {
3985  return ssl->MBEDTLS_PRIVATE(hostname);
3986 }
3987 #endif /* MBEDTLS_X509_CRT_PARSE_C */
3988 
3989 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
3990 
4008 const unsigned char *mbedtls_ssl_get_hs_sni(mbedtls_ssl_context *ssl,
4009  size_t *name_len);
4010 
4027  mbedtls_x509_crt *own_cert,
4028  mbedtls_pk_context *pk_key);
4029 
4042  mbedtls_x509_crt *ca_chain,
4043  mbedtls_x509_crl *ca_crl);
4044 
4045 #if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
4046 
4057  const mbedtls_x509_crt *crt);
4058 #endif /* MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
4059 
4071  int authmode);
4072 
4096  int (*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *,
4097  size_t),
4098  void *p_sni);
4099 #endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION */
4100 
4101 #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
4102 
4121  const unsigned char *pw,
4122  size_t pw_len);
4123 
4139  mbedtls_svc_key_id_t pwd);
4140 #endif /*MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
4141 
4142 #if defined(MBEDTLS_SSL_ALPN)
4143 
4155 int mbedtls_ssl_conf_alpn_protocols(mbedtls_ssl_config *conf, const char **protos);
4156 
4166 const char *mbedtls_ssl_get_alpn_protocol(const mbedtls_ssl_context *ssl);
4167 #endif /* MBEDTLS_SSL_ALPN */
4168 
4169 #if defined(MBEDTLS_SSL_DTLS_SRTP)
4170 #if defined(MBEDTLS_DEBUG_C)
4171 static inline const char *mbedtls_ssl_get_srtp_profile_as_string(mbedtls_ssl_srtp_profile profile)
4172 {
4173  switch (profile) {
4175  return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80";
4177  return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32";
4179  return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80";
4181  return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32";
4182  default: break;
4183  }
4184  return "";
4185 }
4186 #endif /* MBEDTLS_DEBUG_C */
4187 
4201  int support_mki_value);
4202 
4223  (mbedtls_ssl_config *conf,
4224  const mbedtls_ssl_srtp_profile *profiles);
4225 
4243  unsigned char *mki_value,
4244  uint16_t mki_len);
4264  mbedtls_dtls_srtp_info *dtls_srtp_info);
4265 #endif /* MBEDTLS_SSL_DTLS_SRTP */
4266 
4267 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
4268 
4285 void MBEDTLS_DEPRECATED mbedtls_ssl_conf_max_version(mbedtls_ssl_config *conf, int major,
4286  int minor);
4287 #endif /* MBEDTLS_DEPRECATED_REMOVED */
4288 
4301 static inline void mbedtls_ssl_conf_max_tls_version(mbedtls_ssl_config *conf,
4302  mbedtls_ssl_protocol_version tls_version)
4303 {
4304  conf->MBEDTLS_PRIVATE(max_tls_version) = tls_version;
4305 }
4306 
4307 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
4308 
4342 void MBEDTLS_DEPRECATED mbedtls_ssl_conf_min_version(mbedtls_ssl_config *conf, int major,
4343  int minor);
4344 #endif /* MBEDTLS_DEPRECATED_REMOVED */
4345 
4358 static inline void mbedtls_ssl_conf_min_tls_version(mbedtls_ssl_config *conf,
4359  mbedtls_ssl_protocol_version tls_version)
4360 {
4361  conf->MBEDTLS_PRIVATE(min_tls_version) = tls_version;
4362 }
4363 
4364 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
4365 
4377 #endif /* MBEDTLS_SSL_ENCRYPT_THEN_MAC */
4378 
4379 #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
4380 
4392 #endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */
4393 
4394 #if defined(MBEDTLS_SSL_SRV_C)
4395 
4405  char cert_req_ca_list);
4406 #endif /* MBEDTLS_SSL_SRV_C */
4407 
4408 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
4409 
4443 int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code);
4444 #endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
4445 
4446 #if defined(MBEDTLS_SSL_SRV_C)
4447 
4457 #endif /* MBEDTLS_SSL_SRV_C */
4458 
4459 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
4460  defined(MBEDTLS_SSL_CLI_C)
4461 
4471 void mbedtls_ssl_conf_session_tickets(mbedtls_ssl_config *conf, int use_tickets);
4472 #endif /* MBEDTLS_SSL_SESSION_TICKETS &&
4473  MBEDTLS_SSL_CLI_C */
4474 
4475 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
4476  defined(MBEDTLS_SSL_SRV_C) && \
4477  defined(MBEDTLS_SSL_PROTO_TLS1_3)
4478 
4496  uint16_t num_tickets);
4497 #endif /* MBEDTLS_SSL_SESSION_TICKETS &&
4498  MBEDTLS_SSL_SRV_C &&
4499  MBEDTLS_SSL_PROTO_TLS1_3*/
4500 
4501 #if defined(MBEDTLS_SSL_RENEGOTIATION)
4502 
4519 void mbedtls_ssl_conf_renegotiation(mbedtls_ssl_config *conf, int renegotiation);
4520 #endif /* MBEDTLS_SSL_RENEGOTIATION */
4521 
4549 void mbedtls_ssl_conf_legacy_renegotiation(mbedtls_ssl_config *conf, int allow_legacy);
4550 
4551 #if defined(MBEDTLS_SSL_RENEGOTIATION)
4552 
4589 void mbedtls_ssl_conf_renegotiation_enforced(mbedtls_ssl_config *conf, int max_records);
4590 
4617  const unsigned char period[8]);
4618 #endif /* MBEDTLS_SSL_RENEGOTIATION */
4619 
4659 
4676 
4690 
4699 
4707 const char *mbedtls_ssl_get_ciphersuite(const mbedtls_ssl_context *ssl);
4708 
4709 
4722  const mbedtls_ssl_context *ssl)
4723 {
4724  return ssl->MBEDTLS_PRIVATE(tls_version);
4725 }
4726 
4734 const char *mbedtls_ssl_get_version(const mbedtls_ssl_context *ssl);
4735 
4745 
4772 
4792 
4793 #if defined(MBEDTLS_X509_CRT_PARSE_C)
4794 
4825 #endif /* MBEDTLS_X509_CRT_PARSE_C */
4826 
4827 #if defined(MBEDTLS_SSL_CLI_C)
4828 
4863  mbedtls_ssl_session *session);
4864 #endif /* MBEDTLS_SSL_CLI_C */
4865 
4930 
4942 static inline int mbedtls_ssl_is_handshake_over(mbedtls_ssl_context *ssl)
4943 {
4944  return ssl->MBEDTLS_PRIVATE(state) >= MBEDTLS_SSL_HANDSHAKE_OVER;
4945 }
4946 
4982 
4983 #if defined(MBEDTLS_SSL_RENEGOTIATION)
4984 
5008 #endif /* MBEDTLS_SSL_RENEGOTIATION */
5009 
5095 int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len);
5096 
5165 int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len);
5166 
5184  unsigned char level,
5185  unsigned char message);
5200 
5201 #if defined(MBEDTLS_SSL_EARLY_DATA)
5202 
5203 #if defined(MBEDTLS_SSL_SRV_C)
5204 
5252  unsigned char *buf, size_t len);
5253 #endif /* MBEDTLS_SSL_SRV_C */
5254 
5255 #if defined(MBEDTLS_SSL_CLI_C)
5256 
5341  const unsigned char *buf, size_t len);
5342 
5370 #endif /* MBEDTLS_SSL_CLI_C */
5371 
5372 #endif /* MBEDTLS_SSL_EARLY_DATA */
5373 
5380 
5381 #if defined(MBEDTLS_SSL_CONTEXT_SERIALIZATION)
5382 
5439  unsigned char *buf,
5440  size_t buf_len,
5441  size_t *olen);
5442 
5512  const unsigned char *buf,
5513  size_t len);
5514 #endif /* MBEDTLS_SSL_CONTEXT_SERIALIZATION */
5515 
5527 
5544  int endpoint, int transport, int preset);
5545 
5552 
5559 
5570 
5587  const unsigned char *secret, size_t slen,
5588  const char *label,
5589  const unsigned char *random, size_t rlen,
5590  unsigned char *dstbuf, size_t dlen);
5591 
5592 #ifdef __cplusplus
5593 }
5594 #endif
5595 
5596 #endif /* ssl.h */
int mbedtls_ssl_tls_prf(const mbedtls_tls_prf_types prf, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen)
TLS-PRF function for key derivation.
const unsigned char * mbedtls_ssl_get_hs_sni(mbedtls_ssl_context *ssl, size_t *name_len)
Retrieve SNI extension value for the current handshake. Available in f_cert_cb of mbedtls_ssl_conf_ce...
void * mbedtls_ssl_conf_get_async_config_data(const mbedtls_ssl_config *conf)
Retrieve the configuration data set by mbedtls_ssl_conf_async_private_cb().
Public key container.
Definition: pk.h:220
#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80
Definition: ssl.h:1200
void mbedtls_ssl_set_hs_ca_chain(mbedtls_ssl_context *ssl, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate for the current handshake.
int mbedtls_ssl_ticket_parse_t(void *p_ticket, mbedtls_ssl_session *session, unsigned char *buf, size_t len)
Callback type: parse and load session ticket.
Definition: ssl.h:2644
const char * mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id)
Return the name of the ciphersuite associated with the given ID.
void mbedtls_ssl_conf_encrypt_then_mac(mbedtls_ssl_config *conf, char etm)
Enable or disable Encrypt-then-MAC (Default: MBEDTLS_SSL_ETM_ENABLED)
int mbedtls_ssl_cookie_write_t(void *ctx, unsigned char **p, unsigned char *end, const unsigned char *info, size_t ilen)
Callback type: generate a cookie.
Definition: ssl.h:2976
int mbedtls_ssl_write_early_data(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Try to write exactly 'len' application data bytes while performing the handshake (early data)...
int mbedtls_ssl_dtls_srtp_set_mki_value(mbedtls_ssl_context *ssl, unsigned char *mki_value, uint16_t mki_len)
Set the mki_value for the current DTLS-SRTP session.
int mbedtls_ssl_cookie_check_t(void *ctx, const unsigned char *cookie, size_t clen, const unsigned char *info, size_t ilen)
Callback type: verify a cookie.
Definition: ssl.h:2993
void mbedtls_ssl_set_timer_cb(mbedtls_ssl_context *ssl, void *p_timer, mbedtls_ssl_set_timer_t *f_set_timer, mbedtls_ssl_get_timer_t *f_get_timer)
Set the timer callbacks (Mandatory for DTLS.)
struct mbedtls_ssl_sig_hash_set_t mbedtls_ssl_sig_hash_set_t
Definition: ssl.h:876
uint16_t mbedtls_ssl_srtp_profile
Definition: ssl.h:1205
static int mbedtls_ssl_session_get_ciphersuite_id(const mbedtls_ssl_session *session)
Get the ciphersuite-id.
Definition: ssl.h:2730
void mbedtls_ssl_conf_extended_master_secret(mbedtls_ssl_config *conf, char ems)
Enable or disable Extended Master Secret negotiation. (Default: MBEDTLS_SSL_EXTENDED_MS_ENABLED) ...
int mbedtls_ssl_get_max_in_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum incoming record payload in bytes.
int mbedtls_ssl_send_t(void *ctx, const unsigned char *buf, size_t len)
Callback type: send data on the network.
Definition: ssl.h:775
#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32
Definition: ssl.h:1201
void mbedtls_ssl_set_verify(mbedtls_ssl_context *ssl, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set a connection-specific verification callback (optional).
int mbedtls_ssl_recv_t(void *ctx, unsigned char *buf, size_t len)
Callback type: receive data from the network.
Definition: ssl.h:799
This file provides an API for Elliptic Curves over GF(P) (ECP).
static void mbedtls_ssl_set_user_data_n(mbedtls_ssl_context *ssl, uintptr_t n)
Set the user data in an SSL context to an integer.
Definition: ssl.h:2844
#define MBEDTLS_ERR_SSL_BAD_INPUT_DATA
Definition: ssl.h:51
void mbedtls_ssl_conf_preference_order(mbedtls_ssl_config *conf, int order)
Pick the ciphersuites order according to the second parameter in the SSL Server module (MBEDTLS_SSL_S...
void mbedtls_ssl_export_keys_t(void *p_expkey, mbedtls_ssl_key_export_type type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type)
Callback type: Export key alongside random values for session identification, and PRF for implementat...
Definition: ssl.h:1376
int mbedtls_ssl_async_decrypt_t(mbedtls_ssl_context *ssl, mbedtls_x509_crt *cert, const unsigned char *input, size_t input_len)
Callback type: start external decryption operation.
Definition: ssl.h:1086
Platform Security Architecture cryptography module.
unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]
Definition: ssl.h:667
void mbedtls_ssl_conf_verify(mbedtls_ssl_config *conf, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set the verification callback (Optional).
unsigned char _pms_rsa[48]
Definition: ssl.h:664
unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]
Definition: ssl.h:673
int mbedtls_ssl_get_own_cid(mbedtls_ssl_context *ssl, int *enabled, unsigned char own_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX], size_t *own_cid_len)
Get information about our request for usage of the CID extension in the current connection.
static const mbedtls_ssl_config * mbedtls_ssl_context_get_config(const mbedtls_ssl_context *ssl)
Return the SSL configuration structure associated with the given SSL context.
Definition: ssl.h:2206
static const char * mbedtls_ssl_get_hostname(mbedtls_ssl_context *ssl)
Get the hostname that checked against the received server certificate. It is used to set the ServerNa...
Definition: ssl.h:3989
int mbedtls_ssl_get_max_out_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum outgoing record payload in bytes.
void mbedtls_ssl_conf_renegotiation(mbedtls_ssl_config *conf, int renegotiation)
Enable / Disable renegotiation support for connection when initiated by peer (Default: MBEDTLS_SSL_RE...
static void mbedtls_ssl_conf_cert_cb(mbedtls_ssl_config *conf, mbedtls_ssl_hs_cb_t f_cert_cb)
Set the certificate selection callback (server-side only).
Definition: ssl.h:2588
void mbedtls_ssl_conf_early_data(mbedtls_ssl_config *conf, int early_data_enabled)
Set the early data mode Default: disabled on server and client.
int mbedtls_ssl_conf_dh_param_bin(mbedtls_ssl_config *conf, const unsigned char *dhm_P, size_t P_len, const unsigned char *dhm_G, size_t G_len)
Set the Diffie-Hellman public P and G values from big-endian binary presentations. (Default values: MBEDTLS_DHM_RFC3526_MODP_2048_[PG]_BIN)
#define MBEDTLS_PRIVATE(member)
void mbedtls_ssl_conf_dtls_anti_replay(mbedtls_ssl_config *conf, char mode)
Enable or disable anti-replay protection for DTLS. (DTLS only, no effect on TLS.) Default: enabled...
void mbedtls_ssl_conf_srtp_mki_value_supported(mbedtls_ssl_config *conf, int support_mki_value)
Manage support for mki(master key id) value in use_srtp extension. MKI is an optional part of SRTP us...
int mbedtls_ssl_read_early_data(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len)
Read at most 'len' bytes of early data.
#define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH
Definition: ssl.h:1187
uint32_t mbedtls_ssl_get_verify_result(const mbedtls_ssl_context *ssl)
Return the result of the certificate verification.
void mbedtls_ssl_conf_session_tickets_cb(mbedtls_ssl_config *conf, mbedtls_ssl_ticket_write_t *f_ticket_write, mbedtls_ssl_ticket_parse_t *f_ticket_parse, void *p_ticket)
Configure SSL session ticket callbacks (server only). (Default: none.)
int mbedtls_ssl_set_cid(mbedtls_ssl_context *ssl, int enable, unsigned char const *own_cid, size_t own_cid_len)
Configure the use of the Connection ID (CID) extension in the next handshake.
int mbedtls_ssl_check_pending(const mbedtls_ssl_context *ssl)
Check if there is data already read from the underlying transport but not yet processed.
static uintptr_t mbedtls_ssl_get_user_data_n(mbedtls_ssl_context *ssl)
Retrieve the user data in an SSL context as an integer.
Definition: ssl.h:2877
const mbedtls_x509_crt * mbedtls_ssl_get_peer_cert(const mbedtls_ssl_context *ssl)
Return the peer certificate from the current connection.
int mbedtls_ssl_session_save(const mbedtls_ssl_session *session, unsigned char *buf, size_t buf_len, size_t *olen)
Save session structure as serialized data in a buffer. On client, this can be used for saving session...
int mbedtls_ssl_set_hs_ecjpake_password_opaque(mbedtls_ssl_context *ssl, mbedtls_svc_key_id_t pwd)
Set the EC J-PAKE opaque password for current handshake.
int mbedtls_ssl_send_alert_message(mbedtls_ssl_context *ssl, unsigned char level, unsigned char message)
Send an alert message.
int mbedtls_ssl_recv_timeout_t(void *ctx, unsigned char *buf, size_t len, uint32_t timeout)
Callback type: receive data from the network, with timeout.
Definition: ssl.h:825
SSL Ciphersuites for Mbed TLS.
void mbedtls_ssl_conf_session_cache(mbedtls_ssl_config *conf, void *p_cache, mbedtls_ssl_cache_get_t *f_get_cache, mbedtls_ssl_cache_set_t *f_set_cache)
Set the session cache callbacks (server-side only) If not set, no session resuming is done (except if...
void mbedtls_ssl_conf_renegotiation_period(mbedtls_ssl_config *conf, const unsigned char period[8])
Set record counter threshold for periodic renegotiation. (Default: 2^48 - 1)
void mbedtls_ssl_conf_sig_algs(mbedtls_ssl_config *conf, const uint16_t *sig_algs)
Configure allowed signature algorithms for use in TLS.
int mbedtls_ssl_cache_set_t(void *data, unsigned char const *session_id, size_t session_id_len, const mbedtls_ssl_session *session)
Callback type: server-side session cache setter.
Definition: ssl.h:942
Multi-precision integer library.
int mbedtls_ssl_conf_psk(mbedtls_ssl_config *conf, const unsigned char *psk, size_t psk_len, const unsigned char *psk_identity, size_t psk_identity_len)
Configure pre-shared keys (PSKs) and their identities to be used in PSK-based ciphersuites.
int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code)
Set the maximum fragment length to emit and/or negotiate. (Typical: the smaller of MBEDTLS_SSL_IN_CON...
Common and shared functions used by multiple modules in the Mbed TLS library.
time_t mbedtls_time_t
Definition: platform_time.h:27
int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Try to write exactly 'len' application data bytes.
void mbedtls_ssl_conf_cert_req_ca_list(mbedtls_ssl_config *conf, char cert_req_ca_list)
Whether to send a list of acceptable CAs in CertificateRequest messages. (Default: do send) ...
int mbedtls_ssl_close_notify(mbedtls_ssl_context *ssl)
Notify the peer that the connection is being closed.
struct mbedtls_ssl_flight_item mbedtls_ssl_flight_item
Definition: ssl.h:881
int mbedtls_ssl_cache_get_t(void *data, unsigned char const *session_id, size_t session_id_len, mbedtls_ssl_session *session)
Callback type: server-side session cache getter.
Definition: ssl.h:920
void mbedtls_ssl_conf_session_tickets(mbedtls_ssl_config *conf, int use_tickets)
Enable / Disable session tickets (client only). (Default: MBEDTLS_SSL_SESSION_TICKETS_ENABLED.)
static void mbedtls_ssl_conf_dn_hints(mbedtls_ssl_config *conf, const mbedtls_x509_crt *crt)
Set DN hints sent to client in CertificateRequest message.
Definition: ssl.h:3498
char * ticket_alpn
Definition: ssl.h:1314
void mbedtls_ssl_free(mbedtls_ssl_context *ssl)
Free referenced items in an SSL context and clear memory.
void mbedtls_ssl_conf_endpoint(mbedtls_ssl_config *conf, int endpoint)
Set the current endpoint type.
void mbedtls_ssl_session_free(mbedtls_ssl_session *session)
Free referenced items in an SSL session including the peer certificate and clear memory.
mbedtls_ssl_protocol_version
Definition: ssl.h:1220
int(* mbedtls_ssl_hs_cb_t)(mbedtls_ssl_context *ssl)
Callback type: generic handshake callback.
Definition: ssl.h:1400
void mbedtls_ssl_conf_ca_cb(mbedtls_ssl_config *conf, mbedtls_x509_crt_ca_cb_t f_ca_cb, void *p_ca_cb)
Set the trusted certificate callback.
static void * mbedtls_ssl_get_user_data_p(mbedtls_ssl_context *ssl)
Retrieve the user data in an SSL context as a pointer.
Definition: ssl.h:2861
struct mbedtls_ssl_transform mbedtls_ssl_transform
Definition: ssl.h:874
#define MBEDTLS_TLS1_3_MD_MAX_SIZE
Definition: ssl.h:696
const char * mbedtls_ssl_get_alpn_protocol(const mbedtls_ssl_context *ssl)
Get the name of the negotiated Application Layer Protocol. This function should be called after the h...
unsigned char _pms_ecjpake[32]
Definition: ssl.h:690
void mbedtls_ssl_conf_dhm_min_bitlen(mbedtls_ssl_config *conf, unsigned int bitlen)
Set the minimum length for Diffie-Hellman parameters. (Client-side only.) (Default: 1024 bits...
int mbedtls_ssl_get_ciphersuite_id_from_ssl(const mbedtls_ssl_context *ssl)
Return the id of the current ciphersuite.
void mbedtls_ssl_conf_dtls_cookies(mbedtls_ssl_config *conf, mbedtls_ssl_cookie_write_t *f_cookie_write, mbedtls_ssl_cookie_check_t *f_cookie_check, void *p_cookie)
Register callbacks for DTLS cookies (Server only. DTLS only.)
int mbedtls_ssl_conf_cid(mbedtls_ssl_config *conf, size_t len, int ignore_other_cids)
Specify the length of Connection IDs for incoming encrypted DTLS records, as well as the behaviour on...
static int mbedtls_ssl_session_get_ticket_creation_time(mbedtls_ssl_session *session, mbedtls_ms_time_t *ticket_creation_time)
Get the creation time of a session ticket.
Definition: ssl.h:2683
int mbedtls_ssl_get_early_data_status(mbedtls_ssl_context *ssl)
Get the status of the negotiation of the use of early data.
int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name)
Return the ID of the ciphersuite associated with the given name.
void mbedtls_ssl_conf_transport(mbedtls_ssl_config *conf, int transport)
Set the transport type (TLS or DTLS). Default: TLS.
int mbedtls_ssl_set_hs_psk_opaque(mbedtls_ssl_context *ssl, mbedtls_svc_key_id_t psk)
Set an opaque pre-shared Key (PSK) for the current handshake.
mbedtls_ssl_key_export_type
Definition: ssl.h:1349
void mbedtls_ssl_get_dtls_srtp_negotiation_result(const mbedtls_ssl_context *ssl, mbedtls_dtls_srtp_info *dtls_srtp_info)
Get the negotiated DTLS-SRTP information: Protection profile and MKI value.
mbedtls_ssl_states
Definition: ssl.h:709
#define MBEDTLS_SSL_IS_SERVER
Definition: ssl.h:292
void mbedtls_ssl_conf_sni(mbedtls_ssl_config *conf, int(*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_sni)
Set server side ServerName TLS extension callback (optional, server-side only).
#define MBEDTLS_SSL_SEQUENCE_NUMBER_LEN
Definition: ssl.h:700
void mbedtls_ssl_conf_renegotiation_enforced(mbedtls_ssl_config *conf, int max_records)
Enforce renegotiation requests. (Default: enforced, max_records = 16)
void mbedtls_ssl_set_mtu(mbedtls_ssl_context *ssl, uint16_t mtu)
Set the Maximum Transport Unit (MTU). Special value: 0 means unset (no limit). This represents the ma...
int mbedtls_ssl_set_client_transport_id(mbedtls_ssl_context *ssl, const unsigned char *info, size_t ilen)
Set client's transport-level identification info. (Server only. DTLS only.)
void mbedtls_ssl_set_bio(mbedtls_ssl_context *ssl, void *p_bio, mbedtls_ssl_send_t *f_send, mbedtls_ssl_recv_t *f_recv, mbedtls_ssl_recv_timeout_t *f_recv_timeout)
Set the underlying BIO callbacks for write, read and read-with-timeout.
Macro wrapper for struct's members.
static uintptr_t mbedtls_ssl_conf_get_user_data_n(mbedtls_ssl_config *conf)
Retrieve the user data in an SSL configuration as an integer.
Definition: ssl.h:2814
void mbedtls_ssl_conf_new_session_tickets(mbedtls_ssl_config *conf, uint16_t num_tickets)
Number of NewSessionTicket messages for the server to send after handshake completion.
int mbedtls_ssl_context_save(mbedtls_ssl_context *ssl, unsigned char *buf, size_t buf_len, size_t *olen)
Save an active connection as serialized data in a buffer. This allows the freeing or re-using of the ...
void mbedtls_ssl_conf_rng(mbedtls_ssl_config *conf, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Set the random number generator callback.
void mbedtls_ssl_conf_max_early_data_size(mbedtls_ssl_config *conf, uint32_t max_early_data_size)
Set the maximum amount of 0-RTT data in bytes Default: MBEDTLS_SSL_MAX_EARLY_DATA_SIZE.
int mbedtls_ssl_conf_alpn_protocols(mbedtls_ssl_config *conf, const char **protos)
Set the supported Application Layer Protocols.
void mbedtls_ssl_conf_cert_profile(mbedtls_ssl_config *conf, const mbedtls_x509_crt_profile *profile)
Set the X.509 security profile used for verification.
unsigned char _pms_ecdhe_psk[4+MBEDTLS_ECP_MAX_BYTES+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:687
This file contains Diffie-Hellman-Merkle (DHM) key exchange definitions and functions.
X.509 certificate parsing and writing.
int mbedtls_ssl_context_load(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Load serialized connection data to an SSL context.
#define MBEDTLS_PSK_MAX_LEN
Definition: ssl.h:656
void mbedtls_ssl_init(mbedtls_ssl_context *ssl)
Initialize an SSL context Just makes the context ready for mbedtls_ssl_setup() or mbedtls_ssl_free() ...
const char * mbedtls_ssl_get_ciphersuite(const mbedtls_ssl_context *ssl)
Return the name of the current ciphersuite.
static unsigned const char(* mbedtls_ssl_session_get_id(const mbedtls_ssl_session *session))[32]
Get the session-id buffer.
Definition: ssl.h:2705
void mbedtls_ssl_set_export_keys_cb(mbedtls_ssl_context *ssl, mbedtls_ssl_export_keys_t *f_export_keys, void *p_export_keys)
Configure a key export callback. (Default: none.)
mbedtls_ecp_group_id
Definition: ecp.h:102
int mbedtls_ssl_get_timer_t(void *ctx)
Callback type: get status of timers/delays.
Definition: ssl.h:866
void mbedtls_ssl_conf_dbg(mbedtls_ssl_config *conf, void(*f_dbg)(void *, int, const char *, int, const char *), void *p_dbg)
Set the debug callback.
void mbedtls_ssl_config_init(mbedtls_ssl_config *conf)
Initialize an SSL configuration context Just makes the context ready for mbedtls_ssl_config_defaults(...
static void mbedtls_ssl_conf_set_user_data_n(mbedtls_ssl_config *conf, uintptr_t n)
Set the user data in an SSL configuration to an integer.
Definition: ssl.h:2781
int mbedtls_ssl_get_record_expansion(const mbedtls_ssl_context *ssl)
Return the (maximum) number of bytes added by the record layer: header + encryption/MAC overhead (inc...
Build-time configuration info.
This file contains ECDH definitions and functions.
int mbedtls_ssl_conf_dh_param_ctx(mbedtls_ssl_config *conf, mbedtls_dhm_context *dhm_ctx)
Set the Diffie-Hellman public P and G values, read from existing context (server-side only) ...
void mbedtls_ssl_conf_groups(mbedtls_ssl_config *conf, const uint16_t *groups)
Set the allowed groups in order of preference.
int mbedtls_ssl_set_session(mbedtls_ssl_context *ssl, const mbedtls_ssl_session *session)
Load a session for session resumption.
#define MBEDTLS_MPI_MAX_SIZE
Definition: bignum.h:73
int mbedtls_ssl_async_sign_t(mbedtls_ssl_context *ssl, mbedtls_x509_crt *cert, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hash_len)
Callback type: start external signature operation.
Definition: ssl.h:1020
void mbedtls_ssl_set_datagram_packing(mbedtls_ssl_context *ssl, unsigned allow_packing)
Allow or disallow packing of multiple handshake records within a single datagram. ...
static void * mbedtls_ssl_conf_get_user_data_p(mbedtls_ssl_config *conf)
Retrieve the user data in an SSL configuration as a pointer.
Definition: ssl.h:2798
int mbedtls_ssl_set_hs_own_cert(mbedtls_ssl_context *ssl, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate and key for the current handshake.
This file contains the generic functions for message-digest (hashing) and HMAC.
int mbedtls_ssl_conf_own_cert(mbedtls_ssl_config *conf, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate chain and private key.
static const char * mbedtls_ssl_get_srtp_profile_as_string(mbedtls_ssl_srtp_profile profile)
Definition: ssl.h:4177
int mbedtls_ssl_setup(mbedtls_ssl_context *ssl, const mbedtls_ssl_config *conf)
Set up an SSL context for use.
void mbedtls_ssl_conf_legacy_renegotiation(mbedtls_ssl_config *conf, int allow_legacy)
Prevent or allow legacy renegotiation. (Default: MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION) ...
int mbedtls_ssl_conf_psk_opaque(mbedtls_ssl_config *conf, mbedtls_svc_key_id_t psk, const unsigned char *psk_identity, size_t psk_identity_len)
Configure one or more opaque pre-shared keys (PSKs) and their identities to be used in PSK-based ciph...
static void mbedtls_ssl_set_user_data_p(mbedtls_ssl_context *ssl, void *p)
Set the user data in an SSL context to a pointer.
Definition: ssl.h:2830
unsigned char _pms_rsa_psk[52+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:683
int mbedtls_ssl_renegotiate(mbedtls_ssl_context *ssl)
Initiate an SSL renegotiation on the running connection. Client: perform the renegotiation right now...
void mbedtls_ssl_async_cancel_t(mbedtls_ssl_context *ssl)
Callback type: cancel external operation.
Definition: ssl.h:1156
#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32
Definition: ssl.h:1199
int mbedtls_ssl_async_resume_t(mbedtls_ssl_context *ssl, unsigned char *output, size_t *output_len, size_t output_size)
Callback type: resume external operation.
Definition: ssl.h:1134
static void mbedtls_ssl_conf_set_user_data_p(mbedtls_ssl_config *conf, void *p)
Set the user data in an SSL configuration to a pointer.
Definition: ssl.h:2767
MPI structure.
Definition: bignum.h:207
X.509 certificate revocation list parsing.
void mbedtls_ssl_conf_async_private_cb(mbedtls_ssl_config *conf, mbedtls_ssl_async_sign_t *f_async_sign, mbedtls_ssl_async_decrypt_t *f_async_decrypt, mbedtls_ssl_async_resume_t *f_async_resume, mbedtls_ssl_async_cancel_t *f_async_cancel, void *config_data)
Configure asynchronous private key operation callbacks.
void mbedtls_ssl_conf_psk_cb(mbedtls_ssl_config *conf, int(*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_psk)
Set the PSK callback (server-side only).
int mbedtls_ssl_set_hs_ecjpake_password(mbedtls_ssl_context *ssl, const unsigned char *pw, size_t pw_len)
Set the EC J-PAKE password for current handshake.
void mbedtls_ssl_conf_read_timeout(mbedtls_ssl_config *conf, uint32_t timeout)
Set the timeout period for mbedtls_ssl_read() (Default: no timeout.)
void mbedtls_ssl_config_free(mbedtls_ssl_config *conf)
Free an SSL configuration context.
int mbedtls_ssl_conf_dtls_srtp_protection_profiles(mbedtls_ssl_config *conf, const mbedtls_ssl_srtp_profile *profiles)
Set the supported DTLS-SRTP protection profiles.
#define MBEDTLS_SSL_CID_OUT_LEN_MAX
Definition: ssl.h:425
int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len)
Read at most 'len' application data bytes.
unsigned char dummy
Definition: ssl.h:662
struct mbedtls_ssl_key_cert mbedtls_ssl_key_cert
Definition: ssl.h:878
static mbedtls_ssl_protocol_version mbedtls_ssl_get_version_number(const mbedtls_ssl_context *ssl)
Return the (D)TLS protocol version negotiated in the given connection.
Definition: ssl.h:4727
void mbedtls_ssl_set_timer_t(void *ctx, uint32_t int_ms, uint32_t fin_ms)
Callback type: set a pair of timers/delays to watch.
Definition: ssl.h:851
static int mbedtls_ssl_conf_get_endpoint(const mbedtls_ssl_config *conf)
Get the current endpoint type.
Definition: ssl.h:2036
size_t mbedtls_ssl_get_bytes_avail(const mbedtls_ssl_context *ssl)
Return the number of application data bytes remaining to be read from the current record...
unsigned char _pms_dhe_psk[4+MBEDTLS_MPI_MAX_SIZE+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:680
#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80
Definition: ssl.h:1198
void mbedtls_ssl_conf_tls13_key_exchange_modes(mbedtls_ssl_config *conf, const int kex_modes)
Set the supported key exchange modes for TLS 1.3 connections.
#define MBEDTLS_SSL_CID_IN_LEN_MAX
Definition: ssl.h:421
int mbedtls_ssl_get_peer_cid(mbedtls_ssl_context *ssl, int *enabled, unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX], size_t *peer_cid_len)
Get information about the use of the CID extension in the current connection.
void mbedtls_ssl_session_init(mbedtls_ssl_session *session)
Initialize SSL session structure.
struct mbedtls_dtls_srtp_info_t mbedtls_dtls_srtp_info
int mbedtls_ssl_ticket_write_t(void *p_ticket, const mbedtls_ssl_session *session, unsigned char *start, const unsigned char *end, size_t *tlen, uint32_t *lifetime)
Callback type: generate and write session ticket.
Definition: ssl.h:2614
static int mbedtls_ssl_is_handshake_over(mbedtls_ssl_context *ssl)
After calling mbedtls_ssl_handshake() to start the SSL handshake you can call this function to check ...
Definition: ssl.h:4948
void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max)
Set retransmit timeout values for the DTLS handshake. (DTLS only, no effect on TLS.)
Mbed TLS Platform time abstraction.
int mbedtls_ssl_config_defaults(mbedtls_ssl_config *conf, int endpoint, int transport, int preset)
Load reasonable default SSL configuration values. (You need to call mbedtls_ssl_config_init() first...
void mbedtls_ssl_conf_ca_chain(mbedtls_ssl_config *conf, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate.
static size_t mbedtls_ssl_session_get_id_len(const mbedtls_ssl_session *session)
Get the size of the session-id.
Definition: ssl.h:2718
int64_t mbedtls_ms_time_t
Definition: platform_time.h:35
void mbedtls_ssl_conf_dtls_badmac_limit(mbedtls_ssl_config *conf, unsigned limit)
Set a limit on the number of records with a bad MAC before terminating the connection. (DTLS only, no effect on TLS.) Default: 0 (disabled).
unsigned char _pms_psk[4+2 *MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:676
int mbedtls_ssl_handshake(mbedtls_ssl_context *ssl)
Perform the SSL handshake.
mbedtls_ssl_early_data_status
Definition: ssl.h:748
void mbedtls_ssl_set_hs_authmode(mbedtls_ssl_context *ssl, int authmode)
Set authmode for the current handshake.
mbedtls_md_type_t
Supported message digests.
Definition: md.h:47
int mbedtls_ssl_handshake_step(mbedtls_ssl_context *ssl)
Perform a single step of the SSL handshake.
const char * mbedtls_ssl_get_version(const mbedtls_ssl_context *ssl)
Return the current TLS version.
void * mbedtls_ssl_get_async_operation_data(const mbedtls_ssl_context *ssl)
Retrieve the asynchronous operation user context.
void mbedtls_ssl_conf_authmode(mbedtls_ssl_config *conf, int authmode)
Set the certificate verification mode Default: NONE on server, REQUIRED on client.
#define MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN
Definition: ssl.h:350
int mbedtls_ssl_session_reset(mbedtls_ssl_context *ssl)
Reset an already initialized SSL context for re-use while retaining application-set variables...
int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname)
Set or reset the hostname to check against the received server certificate. It sets the ServerName TL...
struct mbedtls_ssl_handshake_params mbedtls_ssl_handshake_params
Definition: ssl.h:875
static void mbedtls_ssl_conf_min_tls_version(mbedtls_ssl_config *conf, mbedtls_ssl_protocol_version tls_version)
Set the minimum supported version sent from the client side and/or accepted at the server side...
Definition: ssl.h:4364
static void mbedtls_ssl_conf_max_tls_version(mbedtls_ssl_config *conf, mbedtls_ssl_protocol_version tls_version)
Set the maximum supported version sent from the client side and/or accepted at the server side...
Definition: ssl.h:4307
#define MBEDTLS_ECP_MAX_BYTES
Definition: ecp.h:354
int mbedtls_ssl_session_load(mbedtls_ssl_session *session, const unsigned char *buf, size_t len)
Load serialized session data into a session structure. On client, this can be used for loading saved ...
int mbedtls_ssl_set_hs_psk(mbedtls_ssl_context *ssl, const unsigned char *psk, size_t psk_len)
Set the pre-shared Key (PSK) for the current handshake.
int mbedtls_ssl_get_session(const mbedtls_ssl_context *ssl, mbedtls_ssl_session *session)
Export a session in order to resume it later.
void mbedtls_ssl_conf_ciphersuites(mbedtls_ssl_config *conf, const int *ciphersuites)
Set the list of allowed ciphersuites and the preference order. First in the list has the highest pref...
#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN
Definition: ssl.h:461
void mbedtls_ssl_set_hs_dn_hints(mbedtls_ssl_context *ssl, const mbedtls_x509_crt *crt)
Set DN hints sent to client in CertificateRequest message.
int(* mbedtls_x509_crt_ca_cb_t)(void *p_ctx, mbedtls_x509_crt const *child, mbedtls_x509_crt **candidate_cas)
The type of trusted certificate callbacks.
Definition: x509_crt.h:784
mbedtls_tls_prf_types
Definition: ssl.h:1340
void mbedtls_ssl_set_async_operation_data(mbedtls_ssl_context *ssl, void *ctx)
Retrieve the asynchronous operation user context.
int mbedtls_ssl_check_record(mbedtls_ssl_context const *ssl, unsigned char *buf, size_t buflen)
Check whether a buffer contains a valid and authentic record that has not been seen before...