mbed TLS v2.28.4
Loading...
Searching...
No Matches
ssl.h
Go to the documentation of this file.
1
6/*
7 * Copyright The Mbed TLS Contributors
8 * SPDX-License-Identifier: Apache-2.0
9 *
10 * Licensed under the Apache License, Version 2.0 (the "License"); you may
11 * not use this file except in compliance with the License.
12 * You may obtain a copy of the License at
13 *
14 * http://www.apache.org/licenses/LICENSE-2.0
15 *
16 * Unless required by applicable law or agreed to in writing, software
17 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
18 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19 * See the License for the specific language governing permissions and
20 * limitations under the License.
21 */
22#ifndef MBEDTLS_SSL_H
23#define MBEDTLS_SSL_H
24
25#if !defined(MBEDTLS_CONFIG_FILE)
26#include "mbedtls/config.h"
27#else
28#include MBEDTLS_CONFIG_FILE
29#endif
30
31#include "mbedtls/bignum.h"
32#include "mbedtls/ecp.h"
33
35
36#if defined(MBEDTLS_X509_CRT_PARSE_C)
37#include "mbedtls/x509_crt.h"
38#include "mbedtls/x509_crl.h"
39#endif
40
41#if defined(MBEDTLS_DHM_C)
42#include "mbedtls/dhm.h"
43#endif
44
45/* Adding guard for MBEDTLS_ECDSA_C to ensure no compile errors due
46 * to guards also being in ssl_srv.c and ssl_cli.c. There is a gap
47 * in functionality that access to ecdh_ctx structure is needed for
48 * MBEDTLS_ECDSA_C which does not seem correct.
49 */
50#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C)
51#include "mbedtls/ecdh.h"
52#endif
53
54#if defined(MBEDTLS_ZLIB_SUPPORT)
55
56#if defined(MBEDTLS_DEPRECATED_WARNING)
57#warning \
58 "Record compression support via MBEDTLS_ZLIB_SUPPORT is deprecated and will be removed in the next major revision of the library"
59#endif
60
61#if defined(MBEDTLS_DEPRECATED_REMOVED)
62#error \
63 "Record compression support via MBEDTLS_ZLIB_SUPPORT is deprecated and cannot be used if MBEDTLS_DEPRECATED_REMOVED is set"
64#endif
65
66#include "zlib.h"
67#endif
68
69#if defined(MBEDTLS_HAVE_TIME)
71#endif
72
73#if defined(MBEDTLS_USE_PSA_CRYPTO)
74#include "psa/crypto.h"
75#endif /* MBEDTLS_USE_PSA_CRYPTO */
76
77/*
78 * SSL Error codes
79 */
81#define MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE -0x7080
83#define MBEDTLS_ERR_SSL_BAD_INPUT_DATA -0x7100
85#define MBEDTLS_ERR_SSL_INVALID_MAC -0x7180
87#define MBEDTLS_ERR_SSL_INVALID_RECORD -0x7200
89#define MBEDTLS_ERR_SSL_CONN_EOF -0x7280
91#define MBEDTLS_ERR_SSL_UNKNOWN_CIPHER -0x7300
93#define MBEDTLS_ERR_SSL_NO_CIPHER_CHOSEN -0x7380
95#define MBEDTLS_ERR_SSL_NO_RNG -0x7400
97#define MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE -0x7480
99#define MBEDTLS_ERR_SSL_CERTIFICATE_TOO_LARGE -0x7500
101#define MBEDTLS_ERR_SSL_CERTIFICATE_REQUIRED -0x7580
103#define MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED -0x7600
105#define MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED -0x7680
107#define MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE -0x7700
109#define MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE -0x7780
111#define MBEDTLS_ERR_SSL_PEER_VERIFY_FAILED -0x7800
113#define MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY -0x7880
115#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_HELLO -0x7900
117#define MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO -0x7980
119#define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE -0x7A00
121#define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_REQUEST -0x7A80
123#define MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE -0x7B00
125#define MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO_DONE -0x7B80
127#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE -0x7C00
129#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_RP -0x7C80
131#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_CS -0x7D00
133#define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_VERIFY -0x7D80
135#define MBEDTLS_ERR_SSL_BAD_HS_CHANGE_CIPHER_SPEC -0x7E00
137#define MBEDTLS_ERR_SSL_BAD_HS_FINISHED -0x7E80
139#define MBEDTLS_ERR_SSL_ALLOC_FAILED -0x7F00
141#define MBEDTLS_ERR_SSL_HW_ACCEL_FAILED -0x7F80
143#define MBEDTLS_ERR_SSL_HW_ACCEL_FALLTHROUGH -0x6F80
145#define MBEDTLS_ERR_SSL_COMPRESSION_FAILED -0x6F00
147#define MBEDTLS_ERR_SSL_BAD_HS_PROTOCOL_VERSION -0x6E80
149#define MBEDTLS_ERR_SSL_BAD_HS_NEW_SESSION_TICKET -0x6E00
151#define MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED -0x6D80
153#define MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH -0x6D00
155#define MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY -0x6C80
157#define MBEDTLS_ERR_SSL_INTERNAL_ERROR -0x6C00
159#define MBEDTLS_ERR_SSL_COUNTER_WRAPPING -0x6B80
161#define MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO -0x6B00
163#define MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED -0x6A80
165#define MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL -0x6A00
167#define MBEDTLS_ERR_SSL_NO_USABLE_CIPHERSUITE -0x6980
169#define MBEDTLS_ERR_SSL_WANT_READ -0x6900
171#define MBEDTLS_ERR_SSL_WANT_WRITE -0x6880
173#define MBEDTLS_ERR_SSL_TIMEOUT -0x6800
175#define MBEDTLS_ERR_SSL_CLIENT_RECONNECT -0x6780
177#define MBEDTLS_ERR_SSL_UNEXPECTED_RECORD -0x6700
179#define MBEDTLS_ERR_SSL_NON_FATAL -0x6680
181#define MBEDTLS_ERR_SSL_INVALID_VERIFY_HASH -0x6600
183#define MBEDTLS_ERR_SSL_CONTINUE_PROCESSING -0x6580
185#define MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS -0x6500
187#define MBEDTLS_ERR_SSL_EARLY_MESSAGE -0x6480
189#define MBEDTLS_ERR_SSL_UNEXPECTED_CID -0x6000
191#define MBEDTLS_ERR_SSL_VERSION_MISMATCH -0x5F00
193#define MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS -0x7000
195#define MBEDTLS_ERR_SSL_BAD_CONFIG -0x5E80
196
197/*
198 * Various constants
199 */
200#define MBEDTLS_SSL_MAJOR_VERSION_3 3
201#define MBEDTLS_SSL_MINOR_VERSION_0 0
202#define MBEDTLS_SSL_MINOR_VERSION_1 1
203#define MBEDTLS_SSL_MINOR_VERSION_2 2
204#define MBEDTLS_SSL_MINOR_VERSION_3 3
205#define MBEDTLS_SSL_MINOR_VERSION_4 4
207#define MBEDTLS_SSL_TRANSPORT_STREAM 0
208#define MBEDTLS_SSL_TRANSPORT_DATAGRAM 1
210#define MBEDTLS_SSL_MAX_HOST_NAME_LEN 255
211#define MBEDTLS_SSL_MAX_ALPN_NAME_LEN 255
213#define MBEDTLS_SSL_MAX_ALPN_LIST_LEN 65535
215/* RFC 6066 section 4, see also mfl_code_to_length in ssl_tls.c
216 * NONE must be zero so that memset()ing structure to zero works */
217#define MBEDTLS_SSL_MAX_FRAG_LEN_NONE 0
218#define MBEDTLS_SSL_MAX_FRAG_LEN_512 1
219#define MBEDTLS_SSL_MAX_FRAG_LEN_1024 2
220#define MBEDTLS_SSL_MAX_FRAG_LEN_2048 3
221#define MBEDTLS_SSL_MAX_FRAG_LEN_4096 4
222#define MBEDTLS_SSL_MAX_FRAG_LEN_INVALID 5
224#define MBEDTLS_SSL_IS_CLIENT 0
225#define MBEDTLS_SSL_IS_SERVER 1
226
227#define MBEDTLS_SSL_IS_NOT_FALLBACK 0
228#define MBEDTLS_SSL_IS_FALLBACK 1
229
230#define MBEDTLS_SSL_EXTENDED_MS_DISABLED 0
231#define MBEDTLS_SSL_EXTENDED_MS_ENABLED 1
232
233#define MBEDTLS_SSL_CID_DISABLED 0
234#define MBEDTLS_SSL_CID_ENABLED 1
235
236#define MBEDTLS_SSL_ETM_DISABLED 0
237#define MBEDTLS_SSL_ETM_ENABLED 1
238
239#define MBEDTLS_SSL_COMPRESS_NULL 0
240#define MBEDTLS_SSL_COMPRESS_DEFLATE 1
241
242#define MBEDTLS_SSL_VERIFY_NONE 0
243#define MBEDTLS_SSL_VERIFY_OPTIONAL 1
244#define MBEDTLS_SSL_VERIFY_REQUIRED 2
245#define MBEDTLS_SSL_VERIFY_UNSET 3 /* Used only for sni_authmode */
246
247#define MBEDTLS_SSL_LEGACY_RENEGOTIATION 0
248#define MBEDTLS_SSL_SECURE_RENEGOTIATION 1
249
250#define MBEDTLS_SSL_RENEGOTIATION_DISABLED 0
251#define MBEDTLS_SSL_RENEGOTIATION_ENABLED 1
252
253#define MBEDTLS_SSL_ANTI_REPLAY_DISABLED 0
254#define MBEDTLS_SSL_ANTI_REPLAY_ENABLED 1
255
256#define MBEDTLS_SSL_RENEGOTIATION_NOT_ENFORCED -1
257#define MBEDTLS_SSL_RENEGO_MAX_RECORDS_DEFAULT 16
258
259#define MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION 0
260#define MBEDTLS_SSL_LEGACY_ALLOW_RENEGOTIATION 1
261#define MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE 2
262
263#define MBEDTLS_SSL_TRUNC_HMAC_DISABLED 0
264#define MBEDTLS_SSL_TRUNC_HMAC_ENABLED 1
265#define MBEDTLS_SSL_TRUNCATED_HMAC_LEN 10 /* 80 bits, rfc 6066 section 7 */
266
267#define MBEDTLS_SSL_SESSION_TICKETS_DISABLED 0
268#define MBEDTLS_SSL_SESSION_TICKETS_ENABLED 1
269
270#define MBEDTLS_SSL_CBC_RECORD_SPLITTING_DISABLED 0
271#define MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED 1
272
273#define MBEDTLS_SSL_ARC4_ENABLED 0
274#define MBEDTLS_SSL_ARC4_DISABLED 1
275
276#define MBEDTLS_SSL_PRESET_DEFAULT 0
277#define MBEDTLS_SSL_PRESET_SUITEB 2
278
279#define MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED 1
280#define MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED 0
281
282#define MBEDTLS_SSL_DTLS_SRTP_MKI_UNSUPPORTED 0
283#define MBEDTLS_SSL_DTLS_SRTP_MKI_SUPPORTED 1
284
285/*
286 * Default range for DTLS retransmission timer value, in milliseconds.
287 * RFC 6347 4.2.4.1 says from 1 second to 60 seconds.
288 */
289#define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MIN 1000
290#define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MAX 60000
291
300#if !defined(MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME)
301#define MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME 86400
302#endif
303
304/*
305 * Maximum fragment length in bytes,
306 * determines the size of each of the two internal I/O buffers.
307 *
308 * Note: the RFC defines the default size of SSL / TLS messages. If you
309 * change the value here, other clients / servers may not be able to
310 * communicate with you anymore. Only change this value if you control
311 * both sides of the connection and have it reduced at both sides, or
312 * if you're using the Max Fragment Length extension and you know all your
313 * peers are using it too!
314 */
315#if !defined(MBEDTLS_SSL_MAX_CONTENT_LEN)
316#define MBEDTLS_SSL_MAX_CONTENT_LEN 16384
317#endif
318
319#if !defined(MBEDTLS_SSL_IN_CONTENT_LEN)
320#define MBEDTLS_SSL_IN_CONTENT_LEN MBEDTLS_SSL_MAX_CONTENT_LEN
321#endif
322
323#if !defined(MBEDTLS_SSL_OUT_CONTENT_LEN)
324#define MBEDTLS_SSL_OUT_CONTENT_LEN MBEDTLS_SSL_MAX_CONTENT_LEN
325#endif
326
327/*
328 * Maximum number of heap-allocated bytes for the purpose of
329 * DTLS handshake message reassembly and future message buffering.
330 */
331#if !defined(MBEDTLS_SSL_DTLS_MAX_BUFFERING)
332#define MBEDTLS_SSL_DTLS_MAX_BUFFERING 32768
333#endif
334
335/*
336 * Maximum length of CIDs for incoming and outgoing messages.
337 */
338#if !defined(MBEDTLS_SSL_CID_IN_LEN_MAX)
339#define MBEDTLS_SSL_CID_IN_LEN_MAX 32
340#endif
341
342#if !defined(MBEDTLS_SSL_CID_OUT_LEN_MAX)
343#define MBEDTLS_SSL_CID_OUT_LEN_MAX 32
344#endif
345
346#if !defined(MBEDTLS_SSL_CID_PADDING_GRANULARITY)
347#define MBEDTLS_SSL_CID_PADDING_GRANULARITY 16
348#endif
349
350#if !defined(MBEDTLS_SSL_TLS1_3_PADDING_GRANULARITY)
351#define MBEDTLS_SSL_TLS1_3_PADDING_GRANULARITY 1
352#endif
353
356/*
357 * Length of the verify data for secure renegotiation
358 */
359#if defined(MBEDTLS_SSL_PROTO_SSL3)
360#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 36
361#else
362#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 12
363#endif
364
365/*
366 * Signaling ciphersuite values (SCSV)
367 */
368#define MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO 0xFF
369#define MBEDTLS_SSL_FALLBACK_SCSV_VALUE 0x5600
371/*
372 * Supported Signature and Hash algorithms (For TLS 1.2)
373 * RFC 5246 section 7.4.1.4.1
374 */
375#define MBEDTLS_SSL_HASH_NONE 0
376#define MBEDTLS_SSL_HASH_MD5 1
377#define MBEDTLS_SSL_HASH_SHA1 2
378#define MBEDTLS_SSL_HASH_SHA224 3
379#define MBEDTLS_SSL_HASH_SHA256 4
380#define MBEDTLS_SSL_HASH_SHA384 5
381#define MBEDTLS_SSL_HASH_SHA512 6
382
383#define MBEDTLS_SSL_SIG_ANON 0
384#define MBEDTLS_SSL_SIG_RSA 1
385#define MBEDTLS_SSL_SIG_ECDSA 3
386
387/*
388 * Client Certificate Types
389 * RFC 5246 section 7.4.4 plus RFC 4492 section 5.5
390 */
391#define MBEDTLS_SSL_CERT_TYPE_RSA_SIGN 1
392#define MBEDTLS_SSL_CERT_TYPE_ECDSA_SIGN 64
393
394/*
395 * Message, alert and handshake types
396 */
397#define MBEDTLS_SSL_MSG_CHANGE_CIPHER_SPEC 20
398#define MBEDTLS_SSL_MSG_ALERT 21
399#define MBEDTLS_SSL_MSG_HANDSHAKE 22
400#define MBEDTLS_SSL_MSG_APPLICATION_DATA 23
401#define MBEDTLS_SSL_MSG_CID 25
402
403#define MBEDTLS_SSL_ALERT_LEVEL_WARNING 1
404#define MBEDTLS_SSL_ALERT_LEVEL_FATAL 2
405
406#define MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY 0 /* 0x00 */
407#define MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE 10 /* 0x0A */
408#define MBEDTLS_SSL_ALERT_MSG_BAD_RECORD_MAC 20 /* 0x14 */
409#define MBEDTLS_SSL_ALERT_MSG_DECRYPTION_FAILED 21 /* 0x15 */
410#define MBEDTLS_SSL_ALERT_MSG_RECORD_OVERFLOW 22 /* 0x16 */
411#define MBEDTLS_SSL_ALERT_MSG_DECOMPRESSION_FAILURE 30 /* 0x1E */
412#define MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE 40 /* 0x28 */
413#define MBEDTLS_SSL_ALERT_MSG_NO_CERT 41 /* 0x29 */
414#define MBEDTLS_SSL_ALERT_MSG_BAD_CERT 42 /* 0x2A */
415#define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT 43 /* 0x2B */
416#define MBEDTLS_SSL_ALERT_MSG_CERT_REVOKED 44 /* 0x2C */
417#define MBEDTLS_SSL_ALERT_MSG_CERT_EXPIRED 45 /* 0x2D */
418#define MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN 46 /* 0x2E */
419#define MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER 47 /* 0x2F */
420#define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA 48 /* 0x30 */
421#define MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED 49 /* 0x31 */
422#define MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR 50 /* 0x32 */
423#define MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR 51 /* 0x33 */
424#define MBEDTLS_SSL_ALERT_MSG_EXPORT_RESTRICTION 60 /* 0x3C */
425#define MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION 70 /* 0x46 */
426#define MBEDTLS_SSL_ALERT_MSG_INSUFFICIENT_SECURITY 71 /* 0x47 */
427#define MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR 80 /* 0x50 */
428#define MBEDTLS_SSL_ALERT_MSG_INAPROPRIATE_FALLBACK 86 /* 0x56 */
429#define MBEDTLS_SSL_ALERT_MSG_USER_CANCELED 90 /* 0x5A */
430#define MBEDTLS_SSL_ALERT_MSG_NO_RENEGOTIATION 100 /* 0x64 */
431#define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT 110 /* 0x6E */
432#define MBEDTLS_SSL_ALERT_MSG_UNRECOGNIZED_NAME 112 /* 0x70 */
433#define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_PSK_IDENTITY 115 /* 0x73 */
434#define MBEDTLS_SSL_ALERT_MSG_NO_APPLICATION_PROTOCOL 120 /* 0x78 */
435
436#define MBEDTLS_SSL_HS_HELLO_REQUEST 0
437#define MBEDTLS_SSL_HS_CLIENT_HELLO 1
438#define MBEDTLS_SSL_HS_SERVER_HELLO 2
439#define MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST 3
440#define MBEDTLS_SSL_HS_NEW_SESSION_TICKET 4
441#define MBEDTLS_SSL_HS_CERTIFICATE 11
442#define MBEDTLS_SSL_HS_SERVER_KEY_EXCHANGE 12
443#define MBEDTLS_SSL_HS_CERTIFICATE_REQUEST 13
444#define MBEDTLS_SSL_HS_SERVER_HELLO_DONE 14
445#define MBEDTLS_SSL_HS_CERTIFICATE_VERIFY 15
446#define MBEDTLS_SSL_HS_CLIENT_KEY_EXCHANGE 16
447#define MBEDTLS_SSL_HS_FINISHED 20
448
449/*
450 * TLS extensions
451 */
452#define MBEDTLS_TLS_EXT_SERVERNAME 0
453#define MBEDTLS_TLS_EXT_SERVERNAME_HOSTNAME 0
454
455#define MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH 1
456
457#define MBEDTLS_TLS_EXT_TRUNCATED_HMAC 4
458
459#define MBEDTLS_TLS_EXT_SUPPORTED_ELLIPTIC_CURVES 10
460#define MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS 11
461
462#define MBEDTLS_TLS_EXT_SIG_ALG 13
463
464#define MBEDTLS_TLS_EXT_USE_SRTP 14
465
466#define MBEDTLS_TLS_EXT_ALPN 16
467
468#define MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC 22 /* 0x16 */
469#define MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET 0x0017 /* 23 */
470
471#define MBEDTLS_TLS_EXT_SESSION_TICKET 35
472
473/* The value of the CID extension is still TBD as of
474 * draft-ietf-tls-dtls-connection-id-05
475 * (https://tools.ietf.org/html/draft-ietf-tls-dtls-connection-id-05).
476 *
477 * A future minor revision of Mbed TLS may change the default value of
478 * this option to match evolving standards and usage.
479 */
480#if !defined(MBEDTLS_TLS_EXT_CID)
481#define MBEDTLS_TLS_EXT_CID 254 /* TBD */
482#endif
483
484#define MBEDTLS_TLS_EXT_ECJPAKE_KKPP 256 /* experimental */
485
486#define MBEDTLS_TLS_EXT_RENEGOTIATION_INFO 0xFF01
487
488/*
489 * Size defines
490 */
491#if !defined(MBEDTLS_PSK_MAX_LEN)
492#define MBEDTLS_PSK_MAX_LEN 32 /* 256 bits */
493#endif
494
495/* Dummy type used only for its size */
497 unsigned char dummy; /* Make the union non-empty even with SSL disabled */
498#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)
499 unsigned char _pms_rsa[48]; /* RFC 5246 8.1.1 */
500#endif
501#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)
502 unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]; /* RFC 5246 8.1.2 */
503#endif
504#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
505 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
506 defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
507 defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
508 unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]; /* RFC 4492 5.10 */
509#endif
510#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
511 unsigned char _pms_psk[4 + 2 * MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 2 */
512#endif
513#if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
515 + MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 3 */
516#endif
517#if defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)
518 unsigned char _pms_rsa_psk[52 + MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 4 */
519#endif
520#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
522 + MBEDTLS_PSK_MAX_LEN]; /* RFC 5489 2 */
523#endif
524#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
525 unsigned char _pms_ecjpake[32]; /* Thread spec: SHA-256 output */
526#endif
527};
528
529#define MBEDTLS_PREMASTER_SIZE sizeof(union mbedtls_ssl_premaster_secret)
530
531#ifdef __cplusplus
532extern "C" {
533#endif
534
535/*
536 * SSL state machine
537 */
538typedef enum {
558}
560
561/*
562 * The tls_prf function types.
563 */
564typedef enum {
589typedef int mbedtls_ssl_send_t(void *ctx,
590 const unsigned char *buf,
591 size_t len);
592
613typedef int mbedtls_ssl_recv_t(void *ctx,
614 unsigned char *buf,
615 size_t len);
616
639typedef int mbedtls_ssl_recv_timeout_t(void *ctx,
640 unsigned char *buf,
641 size_t len,
642 uint32_t timeout);
665typedef void mbedtls_ssl_set_timer_t(void *ctx,
666 uint32_t int_ms,
667 uint32_t fin_ms);
668
680typedef int mbedtls_ssl_get_timer_t(void *ctx);
681
682/* Defined below */
686
687/* Defined in ssl_internal.h */
691#if defined(MBEDTLS_X509_CRT_PARSE_C)
693#endif
694#if defined(MBEDTLS_SSL_PROTO_DTLS)
696#endif
697
698#if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
699#if defined(MBEDTLS_X509_CRT_PARSE_C)
771typedef int mbedtls_ssl_async_sign_t(mbedtls_ssl_context *ssl,
772 mbedtls_x509_crt *cert,
773 mbedtls_md_type_t md_alg,
774 const unsigned char *hash,
775 size_t hash_len);
776
837typedef int mbedtls_ssl_async_decrypt_t(mbedtls_ssl_context *ssl,
838 mbedtls_x509_crt *cert,
839 const unsigned char *input,
840 size_t input_len);
841#endif /* MBEDTLS_X509_CRT_PARSE_C */
842
885typedef int mbedtls_ssl_async_resume_t(mbedtls_ssl_context *ssl,
886 unsigned char *output,
887 size_t *output_len,
888 size_t output_size);
889
907typedef void mbedtls_ssl_async_cancel_t(mbedtls_ssl_context *ssl);
908#endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
909
910#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
911 !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
912#define MBEDTLS_SSL_PEER_CERT_DIGEST_MAX_LEN 48
913#if defined(MBEDTLS_SHA256_C)
914#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA256
915#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 32
916#elif defined(MBEDTLS_SHA512_C)
917#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA384
918#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 48
919#elif defined(MBEDTLS_SHA1_C)
920#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA1
921#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 20
922#else
923/* This is already checked in check_config.h, but be sure. */
924#error "Bad configuration - need SHA-1, SHA-256 or SHA-512 enabled to compute digest of peer CRT."
925#endif
926#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED &&
927 !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
928
929#if defined(MBEDTLS_SSL_DTLS_SRTP)
930
931#define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH 255
932#define MBEDTLS_TLS_SRTP_MAX_PROFILE_LIST_LENGTH 4
933/*
934 * For code readability use a typedef for DTLS-SRTP profiles
935 *
936 * Use_srtp extension protection profiles values as defined in
937 * http://www.iana.org/assignments/srtp-protection/srtp-protection.xhtml
938 *
939 * Reminder: if this list is expanded mbedtls_ssl_check_srtp_profile_value
940 * must be updated too.
941 */
942#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80 ((uint16_t) 0x0001)
943#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32 ((uint16_t) 0x0002)
944#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80 ((uint16_t) 0x0005)
945#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32 ((uint16_t) 0x0006)
946/* This one is not iana defined, but for code readability. */
947#define MBEDTLS_TLS_SRTP_UNSET ((uint16_t) 0x0000)
948
949typedef uint16_t mbedtls_ssl_srtp_profile;
950
951typedef struct mbedtls_dtls_srtp_info_t {
953 mbedtls_ssl_srtp_profile chosen_dtls_srtp_profile;
955 uint16_t mki_len;
957 unsigned char mki_value[MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH];
958}
959mbedtls_dtls_srtp_info;
960
961#endif /* MBEDTLS_SSL_DTLS_SRTP */
962
963/*
964 * This structure is used for storing current session data.
965 *
966 * Note: when changing this definition, we need to check and update:
967 * - in tests/suites/test_suite_ssl.function:
968 * ssl_populate_session() and ssl_serialize_session_save_load()
969 * - in library/ssl_tls.c:
970 * mbedtls_ssl_session_init() and mbedtls_ssl_session_free()
971 * mbedtls_ssl_session_save() and ssl_session_load()
972 * ssl_session_copy()
973 */
975#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
976 unsigned char mfl_code;
977#endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
978
979#if defined(MBEDTLS_HAVE_TIME)
981#endif
984 size_t id_len;
985 unsigned char id[32];
986 unsigned char master[48];
988#if defined(MBEDTLS_X509_CRT_PARSE_C)
989#if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
991#else /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
994 unsigned char *peer_cert_digest;
995 size_t peer_cert_digest_len;
996 mbedtls_md_type_t peer_cert_digest_type;
997#endif /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
998#endif /* MBEDTLS_X509_CRT_PARSE_C */
999 uint32_t verify_result;
1001#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
1002 unsigned char *ticket;
1003 size_t ticket_len;
1005#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_CLI_C */
1006
1007#if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
1009#endif /* MBEDTLS_SSL_TRUNCATED_HMAC */
1010
1011#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1013#endif
1014};
1015
1020 /* Group items by size and reorder them to maximize usage of immediate offset access. */
1021
1022 /*
1023 * Numerical settings (char)
1024 */
1025
1026 unsigned char max_major_ver;
1027 unsigned char max_minor_ver;
1028 unsigned char min_major_ver;
1029 unsigned char min_minor_ver;
1031 /*
1032 * Flags (could be bit-fields to save RAM, but separate bytes make
1033 * the code smaller on architectures with an instruction for direct
1034 * byte access).
1035 */
1036
1037 uint8_t endpoint /*bool*/;
1038 uint8_t transport /*bool*/;
1039 uint8_t authmode /*2 bits*/;
1040 /* needed even with renego disabled for LEGACY_BREAK_HANDSHAKE */
1041 uint8_t allow_legacy_renegotiation /*2 bits*/;
1042#if defined(MBEDTLS_ARC4_C)
1043 uint8_t arc4_disabled /*bool*/;
1044#endif
1045#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1046 uint8_t mfl_code /*3 bits*/;
1047#endif
1048#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1049 uint8_t encrypt_then_mac /*bool*/;
1050#endif
1051#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
1052 uint8_t extended_ms /*bool*/;
1053#endif
1054#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1055 uint8_t anti_replay /*bool*/;
1056#endif
1057#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
1058 uint8_t cbc_record_splitting /*bool*/;
1059#endif
1060#if defined(MBEDTLS_SSL_RENEGOTIATION)
1061 uint8_t disable_renegotiation /*bool*/;
1062#endif
1063#if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
1064 uint8_t trunc_hmac /*bool*/;
1065#endif
1066#if defined(MBEDTLS_SSL_SESSION_TICKETS)
1067 uint8_t session_tickets /*bool*/;
1068#endif
1069#if defined(MBEDTLS_SSL_FALLBACK_SCSV) && defined(MBEDTLS_SSL_CLI_C)
1070 uint8_t fallback /*bool*/;
1071#endif
1072#if defined(MBEDTLS_SSL_SRV_C)
1073 uint8_t cert_req_ca_list /*bool*/;
1075#endif
1076#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1077 uint8_t ignore_unexpected_cid /*bool*/;
1080#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1081#if defined(MBEDTLS_SSL_DTLS_SRTP)
1082 uint8_t dtls_srtp_mki_support /*bool*/;
1084#endif
1085
1086 /*
1087 * Numerical settings (int or larger)
1088 */
1089
1090 uint32_t read_timeout;
1092#if defined(MBEDTLS_SSL_PROTO_DTLS)
1097#endif
1098
1099#if defined(MBEDTLS_SSL_RENEGOTIATION)
1101 unsigned char renego_period[8];
1103#endif
1104
1105#if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT)
1106 unsigned int badmac_limit;
1107#endif
1108
1109#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
1110 unsigned int dhm_min_bitlen;
1111#endif
1112
1113 /*
1114 * Pointers
1115 */
1116
1117 const int *ciphersuite_list[4];
1120 void (*f_dbg)(void *, int, const char *, int, const char *);
1121 void *p_dbg;
1124 int (*f_rng)(void *, unsigned char *, size_t);
1125 void *p_rng;
1130 int (*f_set_cache)(void *, const mbedtls_ssl_session *);
1131 void *p_cache;
1133#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
1135 int (*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
1136 void *p_sni;
1137#endif
1138
1139#if defined(MBEDTLS_X509_CRT_PARSE_C)
1141 int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *);
1142 void *p_vrfy;
1143#endif
1144
1145#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
1147 int (*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
1148 void *p_psk;
1149#endif
1150
1151#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1153 int (*f_cookie_write)(void *, unsigned char **, unsigned char *,
1154 const unsigned char *, size_t);
1156 int (*f_cookie_check)(void *, const unsigned char *, size_t,
1157 const unsigned char *, size_t);
1158 void *p_cookie;
1159#endif
1160
1161#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
1163 int (*f_ticket_write)(void *, const mbedtls_ssl_session *,
1164 unsigned char *, const unsigned char *, size_t *, uint32_t *);
1166 int (*f_ticket_parse)(void *, mbedtls_ssl_session *, unsigned char *, size_t);
1167 void *p_ticket;
1168#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
1169
1170#if defined(MBEDTLS_SSL_EXPORT_KEYS)
1172 int (*f_export_keys)(void *, const unsigned char *,
1173 const unsigned char *, size_t, size_t, size_t);
1176 int (*f_export_keys_ext)(void *, const unsigned char *,
1177 const unsigned char *, size_t, size_t, size_t,
1178 const unsigned char[32], const unsigned char[32],
1181#endif
1182
1183#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1184 size_t cid_len;
1185#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1186
1187#if defined(MBEDTLS_X509_CRT_PARSE_C)
1192#if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
1194 void *p_ca_cb;
1195#endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
1196#endif /* MBEDTLS_X509_CRT_PARSE_C */
1197
1198#if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
1199#if defined(MBEDTLS_X509_CRT_PARSE_C)
1200 mbedtls_ssl_async_sign_t *f_async_sign_start;
1201 mbedtls_ssl_async_decrypt_t *f_async_decrypt_start;
1202#endif /* MBEDTLS_X509_CRT_PARSE_C */
1203 mbedtls_ssl_async_resume_t *f_async_resume;
1204 mbedtls_ssl_async_cancel_t *f_async_cancel;
1205 void *p_async_config_data;
1206#endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
1207
1208#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
1209 const int *sig_hashes;
1210#endif
1211
1212#if defined(MBEDTLS_ECP_C)
1214#endif
1215
1216#if defined(MBEDTLS_DHM_C)
1219#endif
1220
1221#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
1222
1223#if defined(MBEDTLS_USE_PSA_CRYPTO)
1224 psa_key_id_t psk_opaque;
1230#endif /* MBEDTLS_USE_PSA_CRYPTO */
1231
1232 unsigned char *psk;
1236 size_t psk_len;
1242 unsigned char *psk_identity;
1253#endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
1254
1255#if defined(MBEDTLS_SSL_ALPN)
1256 const char **alpn_list;
1257#endif
1258
1259#if defined(MBEDTLS_SSL_DTLS_SRTP)
1261 const mbedtls_ssl_srtp_profile *dtls_srtp_profile_list;
1263 size_t dtls_srtp_profile_list_len;
1264#endif /* MBEDTLS_SSL_DTLS_SRTP */
1265};
1266
1270 /*
1271 * Miscellaneous
1272 */
1273 int state;
1274#if defined(MBEDTLS_SSL_RENEGOTIATION)
1279#endif /* MBEDTLS_SSL_RENEGOTIATION */
1280
1284#if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT)
1285 unsigned badmac_seen;
1286#endif /* MBEDTLS_SSL_DTLS_BADMAC_LIMIT */
1287
1288#if defined(MBEDTLS_X509_CRT_PARSE_C)
1290 int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *);
1291 void *p_vrfy;
1292#endif
1293
1299 void *p_bio;
1301 /*
1302 * Session layer
1303 */
1312 /*
1313 * Record layer transformations
1314 */
1320 /*
1321 * Timers
1322 */
1323 void *p_timer;
1328 /*
1329 * Record layer (incoming data)
1330 */
1331 unsigned char *in_buf;
1332 unsigned char *in_ctr;
1335 unsigned char *in_hdr;
1336#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1337 unsigned char *in_cid;
1339#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1340 unsigned char *in_len;
1341 unsigned char *in_iv;
1342 unsigned char *in_msg;
1343 unsigned char *in_offt;
1346 size_t in_msglen;
1347 size_t in_left;
1348#if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1349 size_t in_buf_len;
1350#endif
1351#if defined(MBEDTLS_SSL_PROTO_DTLS)
1352 uint16_t in_epoch;
1355#endif /* MBEDTLS_SSL_PROTO_DTLS */
1356#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1357 uint64_t in_window_top;
1358 uint64_t in_window;
1359#endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
1360
1361 size_t in_hslen;
1368#if defined(MBEDTLS_SSL_PROTO_DTLS)
1371#endif /* MBEDTLS_SSL_PROTO_DTLS */
1372
1373 /*
1374 * Record layer (outgoing data)
1375 */
1376 unsigned char *out_buf;
1377 unsigned char *out_ctr;
1378 unsigned char *out_hdr;
1379#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1380 unsigned char *out_cid;
1382#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1383 unsigned char *out_len;
1384 unsigned char *out_iv;
1385 unsigned char *out_msg;
1388 size_t out_msglen;
1389 size_t out_left;
1390#if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1391 size_t out_buf_len;
1392#endif
1393
1394 unsigned char cur_out_ctr[8];
1396#if defined(MBEDTLS_SSL_PROTO_DTLS)
1397 uint16_t mtu;
1398#endif /* MBEDTLS_SSL_PROTO_DTLS */
1399
1400#if defined(MBEDTLS_ZLIB_SUPPORT)
1401 unsigned char *compress_buf;
1402#endif /* MBEDTLS_ZLIB_SUPPORT */
1403#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
1404 signed char split_done;
1405#endif /* MBEDTLS_SSL_CBC_RECORD_SPLITTING */
1406
1407 /*
1408 * PKI layer
1409 */
1412 /*
1413 * User settings
1414 */
1415#if defined(MBEDTLS_X509_CRT_PARSE_C)
1416 char *hostname;
1418#endif /* MBEDTLS_X509_CRT_PARSE_C */
1419
1420#if defined(MBEDTLS_SSL_ALPN)
1421 const char *alpn_chosen;
1422#endif /* MBEDTLS_SSL_ALPN */
1423
1424#if defined(MBEDTLS_SSL_DTLS_SRTP)
1425 /*
1426 * use_srtp extension
1427 */
1428 mbedtls_dtls_srtp_info dtls_srtp_info;
1429#endif /* MBEDTLS_SSL_DTLS_SRTP */
1430
1431 /*
1432 * Information for DTLS hello verify
1433 */
1434#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1435 unsigned char *cli_id;
1436 size_t cli_id_len;
1437#endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
1438
1439 /*
1440 * Secure renegotiation
1441 */
1442 /* needed to know when to send extension on server */
1445#if defined(MBEDTLS_SSL_RENEGOTIATION)
1449#endif /* MBEDTLS_SSL_RENEGOTIATION */
1450
1451#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1452 /* CID configuration to use in subsequent handshakes. */
1453
1458 unsigned char own_cid[MBEDTLS_SSL_CID_IN_LEN_MAX];
1459 uint8_t own_cid_len;
1460 uint8_t negotiate_cid;
1464#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1465};
1466
1467#if defined(MBEDTLS_SSL_HW_RECORD_ACCEL)
1468
1469#if !defined(MBEDTLS_DEPRECATED_REMOVED)
1470
1471#define MBEDTLS_SSL_CHANNEL_OUTBOUND MBEDTLS_DEPRECATED_NUMERIC_CONSTANT(0)
1472#define MBEDTLS_SSL_CHANNEL_INBOUND MBEDTLS_DEPRECATED_NUMERIC_CONSTANT(1)
1473
1474#if defined(MBEDTLS_DEPRECATED_WARNING)
1475#define MBEDTLS_DEPRECATED __attribute__((deprecated))
1476#else
1477#define MBEDTLS_DEPRECATED
1478#endif /* MBEDTLS_DEPRECATED_WARNING */
1479
1480MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_init)(
1482 const unsigned char *key_enc, const unsigned char *key_dec,
1483 size_t keylen,
1484 const unsigned char *iv_enc, const unsigned char *iv_dec,
1485 size_t ivlen,
1486 const unsigned char *mac_enc, const unsigned char *mac_dec,
1487 size_t maclen);
1488MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_activate)(
1490 int direction);
1491MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_reset)(
1492 mbedtls_ssl_context *ssl);
1493MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_write)(
1494 mbedtls_ssl_context *ssl);
1495MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_read)(
1496 mbedtls_ssl_context *ssl);
1497MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_finish)(
1498 mbedtls_ssl_context *ssl);
1499
1500#undef MBEDTLS_DEPRECATED
1501#endif /* !MBEDTLS_DEPRECATED_REMOVED */
1502
1503#endif /* MBEDTLS_SSL_HW_RECORD_ACCEL */
1504
1513const char *mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id);
1514
1523int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name);
1524
1533
1559 const mbedtls_ssl_config *conf);
1560
1572
1580
1596
1624
1625#if defined(MBEDTLS_X509_CRT_PARSE_C)
1642 int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
1643 void *p_vrfy);
1644#endif /* MBEDTLS_X509_CRT_PARSE_C */
1645
1654 int (*f_rng)(void *, unsigned char *, size_t),
1655 void *p_rng);
1656
1672 void (*f_dbg)(void *, int, const char *, int, const char *),
1673 void *p_dbg);
1674
1706 void *p_bio,
1707 mbedtls_ssl_send_t *f_send,
1708 mbedtls_ssl_recv_t *f_recv,
1709 mbedtls_ssl_recv_timeout_t *f_recv_timeout);
1710
1711#if defined(MBEDTLS_SSL_PROTO_DTLS)
1712
1713#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1714
1715
1799int mbedtls_ssl_set_cid(mbedtls_ssl_context *ssl,
1800 int enable,
1801 unsigned char const *own_cid,
1802 size_t own_cid_len);
1803
1841int mbedtls_ssl_get_peer_cid(mbedtls_ssl_context *ssl,
1842 int *enabled,
1843 unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX],
1844 size_t *peer_cid_len);
1845
1846#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1847
1891#endif /* MBEDTLS_SSL_PROTO_DTLS */
1892
1893#if defined(MBEDTLS_X509_CRT_PARSE_C)
1913 int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
1914 void *p_vrfy);
1915#endif /* MBEDTLS_X509_CRT_PARSE_C */
1916
1934
1935#if defined(MBEDTLS_SSL_RECORD_CHECKING)
1981 unsigned char *buf,
1982 size_t buflen);
1983#endif /* MBEDTLS_SSL_RECORD_CHECKING */
1984
2006 void *p_timer,
2007 mbedtls_ssl_set_timer_t *f_set_timer,
2008 mbedtls_ssl_get_timer_t *f_get_timer);
2009
2029typedef int mbedtls_ssl_ticket_write_t(void *p_ticket,
2030 const mbedtls_ssl_session *session,
2031 unsigned char *start,
2032 const unsigned char *end,
2033 size_t *tlen,
2034 uint32_t *lifetime);
2035
2036#if defined(MBEDTLS_SSL_EXPORT_KEYS)
2057typedef int mbedtls_ssl_export_keys_t(void *p_expkey,
2058 const unsigned char *ms,
2059 const unsigned char *kb,
2060 size_t maclen,
2061 size_t keylen,
2062 size_t ivlen);
2063
2089typedef int mbedtls_ssl_export_keys_ext_t(void *p_expkey,
2090 const unsigned char *ms,
2091 const unsigned char *kb,
2092 size_t maclen,
2093 size_t keylen,
2094 size_t ivlen,
2095 const unsigned char client_random[32],
2096 const unsigned char server_random[32],
2097 mbedtls_tls_prf_types tls_prf_type);
2098#endif /* MBEDTLS_SSL_EXPORT_KEYS */
2099
2123typedef int mbedtls_ssl_ticket_parse_t(void *p_ticket,
2124 mbedtls_ssl_session *session,
2125 unsigned char *buf,
2126 size_t len);
2127
2128#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
2144 mbedtls_ssl_ticket_write_t *f_ticket_write,
2145 mbedtls_ssl_ticket_parse_t *f_ticket_parse,
2146 void *p_ticket);
2147#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
2148
2149#if defined(MBEDTLS_SSL_EXPORT_KEYS)
2161 mbedtls_ssl_export_keys_t *f_export_keys,
2162 void *p_export_keys);
2163
2177 mbedtls_ssl_export_keys_ext_t *f_export_keys_ext,
2178 void *p_export_keys);
2179#endif /* MBEDTLS_SSL_EXPORT_KEYS */
2180
2181#if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
2212void mbedtls_ssl_conf_async_private_cb(mbedtls_ssl_config *conf,
2213 mbedtls_ssl_async_sign_t *f_async_sign,
2214 mbedtls_ssl_async_decrypt_t *f_async_decrypt,
2215 mbedtls_ssl_async_resume_t *f_async_resume,
2216 mbedtls_ssl_async_cancel_t *f_async_cancel,
2217 void *config_data);
2218
2227void *mbedtls_ssl_conf_get_async_config_data(const mbedtls_ssl_config *conf);
2228
2243void *mbedtls_ssl_get_async_operation_data(const mbedtls_ssl_context *ssl);
2244
2256void mbedtls_ssl_set_async_operation_data(mbedtls_ssl_context *ssl,
2257 void *ctx);
2258#endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
2259
2274typedef int mbedtls_ssl_cookie_write_t(void *ctx,
2275 unsigned char **p, unsigned char *end,
2276 const unsigned char *info, size_t ilen);
2277
2291typedef int mbedtls_ssl_cookie_check_t(void *ctx,
2292 const unsigned char *cookie, size_t clen,
2293 const unsigned char *info, size_t ilen);
2294
2295#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
2325 mbedtls_ssl_cookie_write_t *f_cookie_write,
2326 mbedtls_ssl_cookie_check_t *f_cookie_check,
2327 void *p_cookie);
2328
2349 const unsigned char *info,
2350 size_t ilen);
2351
2352#endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
2353
2354#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
2371#endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
2372
2373#if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT)
2398#endif /* MBEDTLS_SSL_DTLS_BADMAC_LIMIT */
2399
2400#if defined(MBEDTLS_SSL_PROTO_DTLS)
2401
2431 unsigned allow_packing);
2432
2464void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max);
2465#endif /* MBEDTLS_SSL_PROTO_DTLS */
2466
2467#if defined(MBEDTLS_SSL_SRV_C)
2506 void *p_cache,
2507 int (*f_get_cache)(void *, mbedtls_ssl_session *),
2508 int (*f_set_cache)(void *, const mbedtls_ssl_session *));
2509#endif /* MBEDTLS_SSL_SRV_C */
2510
2511#if defined(MBEDTLS_SSL_CLI_C)
2527#endif /* MBEDTLS_SSL_CLI_C */
2528
2562 const unsigned char *buf,
2563 size_t len);
2564
2592 unsigned char *buf,
2593 size_t buf_len,
2594 size_t *olen);
2595
2612
2629 const int *ciphersuites);
2630
2631#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
2632#define MBEDTLS_SSL_UNEXPECTED_CID_IGNORE 0
2633#define MBEDTLS_SSL_UNEXPECTED_CID_FAIL 1
2666int mbedtls_ssl_conf_cid(mbedtls_ssl_config *conf, size_t len,
2667 int ignore_other_cids);
2668#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
2669
2690 const int *ciphersuites,
2691 int major, int minor);
2692
2693#if defined(MBEDTLS_X509_CRT_PARSE_C)
2705 const mbedtls_x509_crt_profile *profile);
2706
2719 mbedtls_x509_crt *ca_chain,
2720 mbedtls_x509_crl *ca_crl);
2721
2722#if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
2774void mbedtls_ssl_conf_ca_cb(mbedtls_ssl_config *conf,
2776 void *p_ca_cb);
2777#endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
2778
2816 mbedtls_x509_crt *own_cert,
2817 mbedtls_pk_context *pk_key);
2818#endif /* MBEDTLS_X509_CRT_PARSE_C */
2819
2820#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
2853 const unsigned char *psk, size_t psk_len,
2854 const unsigned char *psk_identity, size_t psk_identity_len);
2855
2856#if defined(MBEDTLS_USE_PSA_CRYPTO)
2893int mbedtls_ssl_conf_psk_opaque(mbedtls_ssl_config *conf,
2894 psa_key_id_t psk,
2895 const unsigned char *psk_identity,
2896 size_t psk_identity_len);
2897#endif /* MBEDTLS_USE_PSA_CRYPTO */
2898
2916 const unsigned char *psk, size_t psk_len);
2917
2918#if defined(MBEDTLS_USE_PSA_CRYPTO)
2939int mbedtls_ssl_set_hs_psk_opaque(mbedtls_ssl_context *ssl,
2940 psa_key_id_t psk);
2941#endif /* MBEDTLS_USE_PSA_CRYPTO */
2942
2982 int (*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *,
2983 size_t),
2984 void *p_psk);
2985#endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
2986
2987#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_SRV_C)
2988
2989#if !defined(MBEDTLS_DEPRECATED_REMOVED)
2990
2991#if defined(MBEDTLS_DEPRECATED_WARNING)
2992#define MBEDTLS_DEPRECATED __attribute__((deprecated))
2993#else
2994#define MBEDTLS_DEPRECATED
2995#endif
2996
3011 const char *dhm_P,
3012 const char *dhm_G);
3013
3014#endif /* MBEDTLS_DEPRECATED_REMOVED */
3015
3030 const unsigned char *dhm_P, size_t P_len,
3031 const unsigned char *dhm_G, size_t G_len);
3032
3043#endif /* MBEDTLS_DHM_C && defined(MBEDTLS_SSL_SRV_C) */
3044
3045#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
3055 unsigned int bitlen);
3056#endif /* MBEDTLS_DHM_C && MBEDTLS_SSL_CLI_C */
3057
3058#if defined(MBEDTLS_ECP_C)
3089 const mbedtls_ecp_group_id *curves);
3090#endif /* MBEDTLS_ECP_C */
3091
3092#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
3114 const int *hashes);
3115#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
3116
3117#if defined(MBEDTLS_X509_CRT_PARSE_C)
3136int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname);
3137#endif /* MBEDTLS_X509_CRT_PARSE_C */
3138
3139#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
3153 mbedtls_x509_crt *own_cert,
3154 mbedtls_pk_context *pk_key);
3155
3168 mbedtls_x509_crt *ca_chain,
3169 mbedtls_x509_crl *ca_crl);
3170
3182 int authmode);
3183
3208 int (*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *,
3209 size_t),
3210 void *p_sni);
3211#endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION */
3212
3213#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
3231int mbedtls_ssl_set_hs_ecjpake_password(mbedtls_ssl_context *ssl,
3232 const unsigned char *pw,
3233 size_t pw_len);
3234#endif /*MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
3235
3236#if defined(MBEDTLS_SSL_ALPN)
3250
3261#endif /* MBEDTLS_SSL_ALPN */
3262
3263#if defined(MBEDTLS_SSL_DTLS_SRTP)
3264#if defined(MBEDTLS_DEBUG_C)
3265static inline const char *mbedtls_ssl_get_srtp_profile_as_string(mbedtls_ssl_srtp_profile profile)
3266{
3267 switch (profile) {
3268 case MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80:
3269 return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80";
3270 case MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32:
3271 return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32";
3272 case MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80:
3273 return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80";
3274 case MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32:
3275 return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32";
3276 default: break;
3277 }
3278 return "";
3279}
3280#endif /* MBEDTLS_DEBUG_C */
3294void mbedtls_ssl_conf_srtp_mki_value_supported(mbedtls_ssl_config *conf,
3295 int support_mki_value);
3296
3316int mbedtls_ssl_conf_dtls_srtp_protection_profiles
3317 (mbedtls_ssl_config *conf,
3318 const mbedtls_ssl_srtp_profile *profiles);
3319
3336int mbedtls_ssl_dtls_srtp_set_mki_value(mbedtls_ssl_context *ssl,
3337 unsigned char *mki_value,
3338 uint16_t mki_len);
3357void mbedtls_ssl_get_dtls_srtp_negotiation_result(const mbedtls_ssl_context *ssl,
3358 mbedtls_dtls_srtp_info *dtls_srtp_info);
3359#endif /* MBEDTLS_SSL_DTLS_SRTP */
3360
3377void mbedtls_ssl_conf_max_version(mbedtls_ssl_config *conf, int major, int minor);
3378
3397void mbedtls_ssl_conf_min_version(mbedtls_ssl_config *conf, int major, int minor);
3398
3399#if defined(MBEDTLS_SSL_FALLBACK_SCSV) && defined(MBEDTLS_SSL_CLI_C)
3420#endif /* MBEDTLS_SSL_FALLBACK_SCSV && MBEDTLS_SSL_CLI_C */
3421
3422#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
3435#endif /* MBEDTLS_SSL_ENCRYPT_THEN_MAC */
3436
3437#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
3450#endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */
3451
3452#if defined(MBEDTLS_ARC4_C)
3469#endif /* MBEDTLS_ARC4_C */
3470
3471#if defined(MBEDTLS_SSL_SRV_C)
3482 char cert_req_ca_list);
3483#endif /* MBEDTLS_SSL_SRV_C */
3484
3485#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
3520int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code);
3521#endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
3522
3523#if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
3533#endif /* MBEDTLS_SSL_TRUNCATED_HMAC */
3534
3535#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
3548#endif /* MBEDTLS_SSL_CBC_RECORD_SPLITTING */
3549
3550#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
3562#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_CLI_C */
3563
3564#if defined(MBEDTLS_SSL_RENEGOTIATION)
3583#endif /* MBEDTLS_SSL_RENEGOTIATION */
3584
3613
3614#if defined(MBEDTLS_SSL_RENEGOTIATION)
3653
3680 const unsigned char period[8]);
3681#endif /* MBEDTLS_SSL_RENEGOTIATION */
3682
3722
3739
3753
3762
3771
3786
3787#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
3802
3818
3819#if !defined(MBEDTLS_DEPRECATED_REMOVED)
3820
3821#if defined(MBEDTLS_DEPRECATED_WARNING)
3822#define MBEDTLS_DEPRECATED __attribute__((deprecated))
3823#else
3824#define MBEDTLS_DEPRECATED
3825#endif
3826
3842 const mbedtls_ssl_context *ssl);
3843#endif /* MBEDTLS_DEPRECATED_REMOVED */
3844#endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
3845
3874
3875#if defined(MBEDTLS_X509_CRT_PARSE_C)
3907#endif /* MBEDTLS_X509_CRT_PARSE_C */
3908
3909#if defined(MBEDTLS_SSL_CLI_C)
3937#endif /* MBEDTLS_SSL_CLI_C */
3938
3994
4016
4017#if defined(MBEDTLS_SSL_RENEGOTIATION)
4042#endif /* MBEDTLS_SSL_RENEGOTIATION */
4043
4121int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len);
4122
4183int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len);
4184
4202 unsigned char level,
4203 unsigned char message);
4218
4225
4226#if defined(MBEDTLS_SSL_CONTEXT_SERIALIZATION)
4276 unsigned char *buf,
4277 size_t buf_len,
4278 size_t *olen);
4279
4346 const unsigned char *buf,
4347 size_t len);
4348#endif /* MBEDTLS_SSL_CONTEXT_SERIALIZATION */
4349
4361
4378 int endpoint, int transport, int preset);
4379
4386
4393
4404
4421 const unsigned char *secret, size_t slen,
4422 const char *label,
4423 const unsigned char *random, size_t rlen,
4424 unsigned char *dstbuf, size_t dlen);
4425
4426#ifdef __cplusplus
4427}
4428#endif
4429
4430#endif /* ssl.h */
Multi-precision integer library.
#define MBEDTLS_MPI_MAX_SIZE
Definition: bignum.h:88
Configuration options (set of defines)
Platform Security Architecture cryptography module.
This file contains Diffie-Hellman-Merkle (DHM) key exchange definitions and functions.
This file contains ECDH definitions and functions.
This file provides an API for Elliptic Curves over GF(P) (ECP).
#define MBEDTLS_ECP_MAX_BYTES
Definition: ecp.h:307
mbedtls_ecp_group_id
Definition: ecp.h:120
uint32_t psa_key_id_t
Definition: crypto_types.h:278
int(* mbedtls_x509_crt_ca_cb_t)(void *p_ctx, mbedtls_x509_crt const *child, mbedtls_x509_crt **candidate_cas)
The type of trusted certificate callbacks.
Definition: x509_crt.h:744
mbedtls_md_type_t
Supported message digests.
Definition: md.h:62
mbed TLS Platform time abstraction
time_t mbedtls_time_t
Definition: platform_time.h:43
MBEDTLS_DEPRECATED size_t mbedtls_ssl_get_max_frag_len(const mbedtls_ssl_context *ssl)
This function is a deprecated approach to getting the max fragment length. Its an alias for mbedtls_s...
void mbedtls_ssl_conf_cert_req_ca_list(mbedtls_ssl_config *conf, char cert_req_ca_list)
Whether to send a list of acceptable CAs in CertificateRequest messages. (Default: do send)
#define MBEDTLS_PSK_MAX_LEN
Definition: ssl.h:492
const mbedtls_x509_crt * mbedtls_ssl_get_peer_cert(const mbedtls_ssl_context *ssl)
Return the peer certificate from the current connection.
void mbedtls_ssl_conf_read_timeout(mbedtls_ssl_config *conf, uint32_t timeout)
Set the timeout period for mbedtls_ssl_read() (Default: no timeout.)
void mbedtls_ssl_conf_min_version(mbedtls_ssl_config *conf, int major, int minor)
Set the minimum accepted SSL/TLS protocol version (Default: TLS 1.0)
int mbedtls_ssl_ticket_write_t(void *p_ticket, const mbedtls_ssl_session *session, unsigned char *start, const unsigned char *end, size_t *tlen, uint32_t *lifetime)
Callback type: generate and write session ticket.
Definition: ssl.h:2029
void mbedtls_ssl_conf_extended_master_secret(mbedtls_ssl_config *conf, char ems)
Enable or disable Extended Master Secret negotiation. (Default: MBEDTLS_SSL_EXTENDED_MS_ENABLED)
void mbedtls_ssl_set_mtu(mbedtls_ssl_context *ssl, uint16_t mtu)
Set the Maximum Transport Unit (MTU). Special value: 0 means unset (no limit). This represents the ma...
int mbedtls_ssl_set_client_transport_id(mbedtls_ssl_context *ssl, const unsigned char *info, size_t ilen)
Set client's transport-level identification info. (Server only. DTLS only.)
void mbedtls_ssl_conf_renegotiation_period(mbedtls_ssl_config *conf, const unsigned char period[8])
Set record counter threshold for periodic renegotiation. (Default: 2^48 - 1)
#define MBEDTLS_SSL_CID_OUT_LEN_MAX
Definition: ssl.h:343
void mbedtls_ssl_conf_legacy_renegotiation(mbedtls_ssl_config *conf, int allow_legacy)
Prevent or allow legacy renegotiation. (Default: MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION)
void mbedtls_ssl_conf_psk_cb(mbedtls_ssl_config *conf, int(*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_psk)
Set the PSK callback (server-side only).
int mbedtls_ssl_conf_psk(mbedtls_ssl_config *conf, const unsigned char *psk, size_t psk_len, const unsigned char *psk_identity, size_t psk_identity_len)
Configure a pre-shared key (PSK) and identity to be used in PSK-based ciphersuites.
int mbedtls_ssl_session_save(const mbedtls_ssl_session *session, unsigned char *buf, size_t buf_len, size_t *olen)
Save session structure as serialized data in a buffer. On client, this can be used for saving session...
int mbedtls_ssl_session_reset(mbedtls_ssl_context *ssl)
Reset an already initialized SSL context for re-use while retaining application-set variables,...
int mbedtls_ssl_check_record(mbedtls_ssl_context const *ssl, unsigned char *buf, size_t buflen)
Check whether a buffer contains a valid and authentic record that has not been seen before....
const char * mbedtls_ssl_get_alpn_protocol(const mbedtls_ssl_context *ssl)
Get the name of the negotiated Application Layer Protocol. This function should be called after the h...
struct mbedtls_ssl_transform mbedtls_ssl_transform
Definition: ssl.h:688
void mbedtls_ssl_conf_cbc_record_splitting(mbedtls_ssl_config *conf, char split)
Enable / Disable 1/n-1 record splitting (Default: MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED)
void mbedtls_ssl_conf_renegotiation_enforced(mbedtls_ssl_config *conf, int max_records)
Enforce renegotiation requests. (Default: enforced, max_records = 16)
void mbedtls_ssl_free(mbedtls_ssl_context *ssl)
Free referenced items in an SSL context and clear memory.
void mbedtls_ssl_conf_transport(mbedtls_ssl_config *conf, int transport)
Set the transport type (TLS or DTLS). Default: TLS.
#define MBEDTLS_SSL_CID_IN_LEN_MAX
Definition: ssl.h:339
void mbedtls_ssl_set_timer_cb(mbedtls_ssl_context *ssl, void *p_timer, mbedtls_ssl_set_timer_t *f_set_timer, mbedtls_ssl_get_timer_t *f_get_timer)
Set the timer callbacks (Mandatory for DTLS.)
void mbedtls_ssl_set_hs_ca_chain(mbedtls_ssl_context *ssl, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate for the current handshake.
mbedtls_tls_prf_types
Definition: ssl.h:564
@ MBEDTLS_SSL_TLS_PRF_SHA384
Definition: ssl.h:568
@ MBEDTLS_SSL_TLS_PRF_SHA256
Definition: ssl.h:569
@ MBEDTLS_SSL_TLS_PRF_NONE
Definition: ssl.h:565
@ MBEDTLS_SSL_TLS_PRF_TLS1
Definition: ssl.h:567
@ MBEDTLS_SSL_TLS_PRF_SSL3
Definition: ssl.h:566
int mbedtls_ssl_send_t(void *ctx, const unsigned char *buf, size_t len)
Callback type: send data on the network.
Definition: ssl.h:589
void mbedtls_ssl_conf_sni(mbedtls_ssl_config *conf, int(*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_sni)
Set server side ServerName TLS extension callback (optional, server-side only).
mbedtls_ssl_states
Definition: ssl.h:538
@ MBEDTLS_SSL_CERTIFICATE_VERIFY
Definition: ssl.h:548
@ MBEDTLS_SSL_HANDSHAKE_OVER
Definition: ssl.h:555
@ MBEDTLS_SSL_SERVER_HELLO_DONE
Definition: ssl.h:545
@ MBEDTLS_SSL_SERVER_FINISHED
Definition: ssl.h:552
@ MBEDTLS_SSL_SERVER_KEY_EXCHANGE
Definition: ssl.h:543
@ MBEDTLS_SSL_SERVER_HELLO
Definition: ssl.h:541
@ MBEDTLS_SSL_CLIENT_KEY_EXCHANGE
Definition: ssl.h:547
@ MBEDTLS_SSL_CLIENT_HELLO
Definition: ssl.h:540
@ MBEDTLS_SSL_SERVER_CERTIFICATE
Definition: ssl.h:542
@ MBEDTLS_SSL_CERTIFICATE_REQUEST
Definition: ssl.h:544
@ MBEDTLS_SSL_SERVER_NEW_SESSION_TICKET
Definition: ssl.h:556
@ MBEDTLS_SSL_CLIENT_FINISHED
Definition: ssl.h:550
@ MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC
Definition: ssl.h:551
@ MBEDTLS_SSL_SERVER_HELLO_VERIFY_REQUEST_SENT
Definition: ssl.h:557
@ MBEDTLS_SSL_HANDSHAKE_WRAPUP
Definition: ssl.h:554
@ MBEDTLS_SSL_CLIENT_CHANGE_CIPHER_SPEC
Definition: ssl.h:549
@ MBEDTLS_SSL_HELLO_REQUEST
Definition: ssl.h:539
@ MBEDTLS_SSL_CLIENT_CERTIFICATE
Definition: ssl.h:546
@ MBEDTLS_SSL_FLUSH_BUFFERS
Definition: ssl.h:553
void mbedtls_ssl_set_verify(mbedtls_ssl_context *ssl, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set a connection-specific verification callback (optional).
void mbedtls_ssl_conf_endpoint(mbedtls_ssl_config *conf, int endpoint)
Set the current endpoint type.
int mbedtls_ssl_check_pending(const mbedtls_ssl_context *ssl)
Check if there is data already read from the underlying transport but not yet processed.
size_t mbedtls_ssl_get_input_max_frag_len(const mbedtls_ssl_context *ssl)
Return the maximum fragment length (payload, in bytes) for the input buffer. This is the negotiated m...
int mbedtls_ssl_send_alert_message(mbedtls_ssl_context *ssl, unsigned char level, unsigned char message)
Send an alert message.
const char * mbedtls_ssl_get_version(const mbedtls_ssl_context *ssl)
Return the current SSL version (SSLv3/TLSv1/etc)
int mbedtls_ssl_conf_dh_param_bin(mbedtls_ssl_config *conf, const unsigned char *dhm_P, size_t P_len, const unsigned char *dhm_G, size_t G_len)
Set the Diffie-Hellman public P and G values from big-endian binary presentations....
void mbedtls_ssl_conf_rng(mbedtls_ssl_config *conf, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Set the random number generator callback.
void mbedtls_ssl_conf_dtls_anti_replay(mbedtls_ssl_config *conf, char mode)
Enable or disable anti-replay protection for DTLS. (DTLS only, no effect on TLS.) Default: enabled.
int mbedtls_ssl_ticket_parse_t(void *p_ticket, mbedtls_ssl_session *session, unsigned char *buf, size_t len)
Callback type: parse and load session ticket.
Definition: ssl.h:2123
int mbedtls_ssl_renegotiate(mbedtls_ssl_context *ssl)
Initiate an SSL renegotiation on the running connection. Client: perform the renegotiation right now....
int mbedtls_ssl_handshake(mbedtls_ssl_context *ssl)
Perform the SSL handshake.
int mbedtls_ssl_conf_own_cert(mbedtls_ssl_config *conf, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate chain and private key.
struct mbedtls_ssl_sig_hash_set_t mbedtls_ssl_sig_hash_set_t
Definition: ssl.h:690
int mbedtls_ssl_set_hs_psk(mbedtls_ssl_context *ssl, const unsigned char *psk, size_t psk_len)
Set the pre-shared Key (PSK) for the current handshake.
uint32_t mbedtls_ssl_get_verify_result(const mbedtls_ssl_context *ssl)
Return the result of the certificate verification.
int mbedtls_ssl_session_load(mbedtls_ssl_session *session, const unsigned char *buf, size_t len)
Load serialized session data into a session structure. On client, this can be used for loading saved ...
int mbedtls_ssl_cookie_write_t(void *ctx, unsigned char **p, unsigned char *end, const unsigned char *info, size_t ilen)
Callback type: generate a cookie.
Definition: ssl.h:2274
void mbedtls_ssl_conf_authmode(mbedtls_ssl_config *conf, int authmode)
Set the certificate verification mode Default: NONE on server, REQUIRED on client.
void mbedtls_ssl_conf_dtls_cookies(mbedtls_ssl_config *conf, mbedtls_ssl_cookie_write_t *f_cookie_write, mbedtls_ssl_cookie_check_t *f_cookie_check, void *p_cookie)
Register callbacks for DTLS cookies (Server only. DTLS only.)
int mbedtls_ssl_get_max_out_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum outgoing record payload in bytes. This takes into account the config....
MBEDTLS_DEPRECATED int mbedtls_ssl_conf_dh_param(mbedtls_ssl_config *conf, const char *dhm_P, const char *dhm_G)
Set the Diffie-Hellman public P and G values, read as hexadecimal strings (server-side only) (Default...
int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Try to write exactly 'len' application data bytes.
struct mbedtls_ssl_handshake_params mbedtls_ssl_handshake_params
Definition: ssl.h:689
void mbedtls_ssl_set_timer_t(void *ctx, uint32_t int_ms, uint32_t fin_ms)
Callback type: set a pair of timers/delays to watch.
Definition: ssl.h:665
void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max)
Set retransmit timeout values for the DTLS handshake. (DTLS only, no effect on TLS....
int mbedtls_ssl_recv_timeout_t(void *ctx, unsigned char *buf, size_t len, uint32_t timeout)
Callback type: receive data from the network, with timeout.
Definition: ssl.h:639
void mbedtls_ssl_conf_sig_hashes(mbedtls_ssl_config *conf, const int *hashes)
Set the allowed hashes for signatures during the handshake. (Default: all SHA-2 hashes,...
void mbedtls_ssl_conf_truncated_hmac(mbedtls_ssl_config *conf, int truncate)
Activate negotiation of truncated HMAC (Default: MBEDTLS_SSL_TRUNC_HMAC_DISABLED)
void mbedtls_ssl_conf_session_tickets_cb(mbedtls_ssl_config *conf, mbedtls_ssl_ticket_write_t *f_ticket_write, mbedtls_ssl_ticket_parse_t *f_ticket_parse, void *p_ticket)
Configure SSL session ticket callbacks (server only). (Default: none.)
void mbedtls_ssl_config_free(mbedtls_ssl_config *conf)
Free an SSL configuration context.
void mbedtls_ssl_conf_cert_profile(mbedtls_ssl_config *conf, const mbedtls_x509_crt_profile *profile)
Set the X.509 security profile used for verification.
void mbedtls_ssl_session_init(mbedtls_ssl_session *session)
Initialize SSL session structure.
#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN
Definition: ssl.h:362
int mbedtls_ssl_context_load(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Load serialized connection data to an SSL context.
void mbedtls_ssl_set_hs_authmode(mbedtls_ssl_context *ssl, int authmode)
Set authmode for the current handshake.
void mbedtls_ssl_set_datagram_packing(mbedtls_ssl_context *ssl, unsigned allow_packing)
Allow or disallow packing of multiple handshake records within a single datagram.
void mbedtls_ssl_init(mbedtls_ssl_context *ssl)
Initialize an SSL context Just makes the context ready for mbedtls_ssl_setup() or mbedtls_ssl_free()
void mbedtls_ssl_conf_ca_chain(mbedtls_ssl_config *conf, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate.
void mbedtls_ssl_set_bio(mbedtls_ssl_context *ssl, void *p_bio, mbedtls_ssl_send_t *f_send, mbedtls_ssl_recv_t *f_recv, mbedtls_ssl_recv_timeout_t *f_recv_timeout)
Set the underlying BIO callbacks for write, read and read-with-timeout.
int mbedtls_ssl_export_keys_t(void *p_expkey, const unsigned char *ms, const unsigned char *kb, size_t maclen, size_t keylen, size_t ivlen)
Callback type: Export key block and master secret.
Definition: ssl.h:2057
const char * mbedtls_ssl_get_ciphersuite(const mbedtls_ssl_context *ssl)
Return the name of the current ciphersuite.
int mbedtls_ssl_set_session(mbedtls_ssl_context *ssl, const mbedtls_ssl_session *session)
Request resumption of session (client-side only) Session data is copied from presented session struct...
int mbedtls_ssl_get_record_expansion(const mbedtls_ssl_context *ssl)
Return the (maximum) number of bytes added by the record layer: header + encryption/MAC overhead (inc...
void mbedtls_ssl_conf_session_tickets(mbedtls_ssl_config *conf, int use_tickets)
Enable / Disable session tickets (client only). (Default: MBEDTLS_SSL_SESSION_TICKETS_ENABLED....
int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name)
Return the ID of the ciphersuite associated with the given name.
void mbedtls_ssl_conf_session_cache(mbedtls_ssl_config *conf, void *p_cache, int(*f_get_cache)(void *, mbedtls_ssl_session *), int(*f_set_cache)(void *, const mbedtls_ssl_session *))
Set the session cache callbacks (server-side only) If not set, no session resuming is done (except if...
void mbedtls_ssl_conf_dtls_badmac_limit(mbedtls_ssl_config *conf, unsigned limit)
Set a limit on the number of records with a bad MAC before terminating the connection....
int mbedtls_ssl_cookie_check_t(void *ctx, const unsigned char *cookie, size_t clen, const unsigned char *info, size_t ilen)
Callback type: verify a cookie.
Definition: ssl.h:2291
void mbedtls_ssl_conf_dhm_min_bitlen(mbedtls_ssl_config *conf, unsigned int bitlen)
Set the minimum length for Diffie-Hellman parameters. (Client-side only.) (Default: 1024 bits....
void mbedtls_ssl_conf_arc4_support(mbedtls_ssl_config *conf, char arc4)
Disable or enable support for RC4 (Default: MBEDTLS_SSL_ARC4_DISABLED)
int mbedtls_ssl_set_hs_own_cert(mbedtls_ssl_context *ssl, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate and key for the current handshake.
int mbedtls_ssl_config_defaults(mbedtls_ssl_config *conf, int endpoint, int transport, int preset)
Load reasonable default SSL configuration values. (You need to call mbedtls_ssl_config_init() first....
int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len)
Read at most 'len' application data bytes.
void mbedtls_ssl_conf_ciphersuites_for_version(mbedtls_ssl_config *conf, const int *ciphersuites, int major, int minor)
Set the list of allowed ciphersuites and the preference order for a specific version of the protocol....
int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname)
Set or reset the hostname to check against the received server certificate. It sets the ServerName TL...
#define MBEDTLS_DEPRECATED
Definition: ssl.h:3824
int mbedtls_ssl_handshake_step(mbedtls_ssl_context *ssl)
Perform a single step of the SSL handshake.
void mbedtls_ssl_conf_renegotiation(mbedtls_ssl_config *conf, int renegotiation)
Enable / Disable renegotiation support for connection when initiated by peer (Default: MBEDTLS_SSL_RE...
void mbedtls_ssl_conf_dbg(mbedtls_ssl_config *conf, void(*f_dbg)(void *, int, const char *, int, const char *), void *p_dbg)
Set the debug callback.
void mbedtls_ssl_conf_export_keys_cb(mbedtls_ssl_config *conf, mbedtls_ssl_export_keys_t *f_export_keys, void *p_export_keys)
Configure key export callback. (Default: none.)
const char * mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id)
Return the name of the ciphersuite associated with the given ID.
int mbedtls_ssl_export_keys_ext_t(void *p_expkey, const unsigned char *ms, const unsigned char *kb, size_t maclen, size_t keylen, size_t ivlen, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type)
Callback type: Export key block, master secret, handshake randbytes and the tls_prf function used to ...
Definition: ssl.h:2089
void mbedtls_ssl_config_init(mbedtls_ssl_config *conf)
Initialize an SSL configuration context Just makes the context ready for mbedtls_ssl_config_defaults(...
const mbedtls_ssl_session * mbedtls_ssl_get_session_pointer(const mbedtls_ssl_context *ssl)
Get a pointer to the current session structure, for example to serialize it.
void mbedtls_ssl_conf_fallback(mbedtls_ssl_config *conf, char fallback)
Set the fallback flag (client-side only). (Default: MBEDTLS_SSL_IS_NOT_FALLBACK).
int mbedtls_ssl_context_save(mbedtls_ssl_context *ssl, unsigned char *buf, size_t buf_len, size_t *olen)
Save an active connection as serialized data in a buffer. This allows the freeing or re-using of the ...
int mbedtls_ssl_tls_prf(const mbedtls_tls_prf_types prf, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen)
TLS-PRF function for key derivation.
struct mbedtls_ssl_flight_item mbedtls_ssl_flight_item
Definition: ssl.h:695
size_t mbedtls_ssl_get_output_max_frag_len(const mbedtls_ssl_context *ssl)
Return the maximum fragment length (payload, in bytes) for the output buffer. For the client,...
int mbedtls_ssl_recv_t(void *ctx, unsigned char *buf, size_t len)
Callback type: receive data from the network.
Definition: ssl.h:613
void mbedtls_ssl_session_free(mbedtls_ssl_session *session)
Free referenced items in an SSL session including the peer certificate and clear memory.
int mbedtls_ssl_close_notify(mbedtls_ssl_context *ssl)
Notify the peer that the connection is being closed.
int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code)
Set the maximum fragment length to emit and/or negotiate. (Typical: the smaller of MBEDTLS_SSL_IN_CON...
void mbedtls_ssl_conf_ciphersuites(mbedtls_ssl_config *conf, const int *ciphersuites)
Set the list of allowed ciphersuites and the preference order. First in the list has the highest pref...
size_t mbedtls_ssl_get_bytes_avail(const mbedtls_ssl_context *ssl)
Return the number of application data bytes remaining to be read from the current record.
void mbedtls_ssl_conf_export_keys_ext_cb(mbedtls_ssl_config *conf, mbedtls_ssl_export_keys_ext_t *f_export_keys_ext, void *p_export_keys)
Configure extended key export callback. (Default: none.)
int mbedtls_ssl_get_session(const mbedtls_ssl_context *ssl, mbedtls_ssl_session *session)
Save session in order to resume it later (client-side only) Session data is copied to presented sessi...
int mbedtls_ssl_get_timer_t(void *ctx)
Callback type: get status of timers/delays.
Definition: ssl.h:680
void mbedtls_ssl_conf_curves(mbedtls_ssl_config *conf, const mbedtls_ecp_group_id *curves)
Set the allowed curves in order of preference. (Default: all defined curves in order of decreasing si...
int mbedtls_ssl_conf_alpn_protocols(mbedtls_ssl_config *conf, const char **protos)
Set the supported Application Layer Protocols.
int mbedtls_ssl_conf_dh_param_ctx(mbedtls_ssl_config *conf, mbedtls_dhm_context *dhm_ctx)
Set the Diffie-Hellman public P and G values, read from existing context (server-side only)
struct mbedtls_ssl_key_cert mbedtls_ssl_key_cert
Definition: ssl.h:692
int mbedtls_ssl_setup(mbedtls_ssl_context *ssl, const mbedtls_ssl_config *conf)
Set up an SSL context for use.
void mbedtls_ssl_conf_encrypt_then_mac(mbedtls_ssl_config *conf, char etm)
Enable or disable Encrypt-then-MAC (Default: MBEDTLS_SSL_ETM_ENABLED)
void mbedtls_ssl_conf_max_version(mbedtls_ssl_config *conf, int major, int minor)
Set the maximum supported version sent from the client side and/or accepted at the server side (Defau...
void mbedtls_ssl_conf_verify(mbedtls_ssl_config *conf, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set the verification callback (Optional).
SSL Ciphersuites for mbed TLS.
The DHM context structure.
Definition: dhm.h:111
MPI structure.
Definition: bignum.h:208
Public key container.
Definition: pk.h:197
int(* f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t)
Definition: ssl.h:1135
uint8_t cbc_record_splitting
Definition: ssl.h:1058
uint8_t anti_replay
Definition: ssl.h:1055
int(* f_cookie_check)(void *, const unsigned char *, size_t, const unsigned char *, size_t)
Definition: ssl.h:1156
size_t psk_identity_len
Definition: ssl.h:1247
void * p_ticket
Definition: ssl.h:1167
int renego_max_records
Definition: ssl.h:1100
unsigned char max_major_ver
Definition: ssl.h:1026
const int * ciphersuite_list[4]
Definition: ssl.h:1117
void * p_sni
Definition: ssl.h:1136
uint8_t arc4_disabled
Definition: ssl.h:1043
void * p_rng
Definition: ssl.h:1125
void * p_cookie
Definition: ssl.h:1158
int(* f_set_cache)(void *, const mbedtls_ssl_session *)
Definition: ssl.h:1130
uint32_t hs_timeout_min
Definition: ssl.h:1093
mbedtls_x509_crl * ca_crl
Definition: ssl.h:1191
uint8_t encrypt_then_mac
Definition: ssl.h:1049
int(* f_cookie_write)(void *, unsigned char **, unsigned char *, const unsigned char *, size_t)
Definition: ssl.h:1153
const mbedtls_ecp_group_id * curve_list
Definition: ssl.h:1213
unsigned char * psk_identity
Definition: ssl.h:1242
mbedtls_x509_crt * ca_chain
Definition: ssl.h:1190
int(* f_ticket_write)(void *, const mbedtls_ssl_session *, unsigned char *, const unsigned char *, size_t *, uint32_t *)
Definition: ssl.h:1163
unsigned char max_minor_ver
Definition: ssl.h:1027
void * p_export_keys
Definition: ssl.h:1180
unsigned char min_minor_ver
Definition: ssl.h:1029
unsigned char * psk
Definition: ssl.h:1232
const mbedtls_x509_crt_profile * cert_profile
Definition: ssl.h:1188
const int * sig_hashes
Definition: ssl.h:1209
uint32_t read_timeout
Definition: ssl.h:1090
uint8_t trunc_hmac
Definition: ssl.h:1064
uint8_t fallback
Definition: ssl.h:1070
int(* f_rng)(void *, unsigned char *, size_t)
Definition: ssl.h:1124
int(* f_get_cache)(void *, mbedtls_ssl_session *)
Definition: ssl.h:1128
uint8_t transport
Definition: ssl.h:1038
int(* f_ticket_parse)(void *, mbedtls_ssl_session *, unsigned char *, size_t)
Definition: ssl.h:1166
void(* f_dbg)(void *, int, const char *, int, const char *)
Definition: ssl.h:1120
unsigned char renego_period[8]
Definition: ssl.h:1101
uint8_t extended_ms
Definition: ssl.h:1052
unsigned int badmac_limit
Definition: ssl.h:1106
int(* f_export_keys_ext)(void *, const unsigned char *, const unsigned char *, size_t, size_t, size_t, const unsigned char[32], const unsigned char[32], mbedtls_tls_prf_types)
Definition: ssl.h:1176
int(* f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *)
Definition: ssl.h:1141
unsigned int dhm_min_bitlen
Definition: ssl.h:1110
const char ** alpn_list
Definition: ssl.h:1256
int(* f_export_keys)(void *, const unsigned char *, const unsigned char *, size_t, size_t, size_t)
Definition: ssl.h:1172
void * p_vrfy
Definition: ssl.h:1142
void * p_cache
Definition: ssl.h:1131
void * p_psk
Definition: ssl.h:1148
size_t psk_len
Definition: ssl.h:1236
uint8_t session_tickets
Definition: ssl.h:1067
void * p_dbg
Definition: ssl.h:1121
uint8_t mfl_code
Definition: ssl.h:1046
unsigned char min_major_ver
Definition: ssl.h:1028
uint8_t cert_req_ca_list
Definition: ssl.h:1073
uint8_t allow_legacy_renegotiation
Definition: ssl.h:1041
mbedtls_mpi dhm_G
Definition: ssl.h:1218
uint32_t hs_timeout_max
Definition: ssl.h:1095
mbedtls_mpi dhm_P
Definition: ssl.h:1217
uint8_t endpoint
Definition: ssl.h:1037
uint8_t disable_renegotiation
Definition: ssl.h:1061
uint8_t authmode
Definition: ssl.h:1039
mbedtls_ssl_key_cert * key_cert
Definition: ssl.h:1189
int(* f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t)
Definition: ssl.h:1147
unsigned char * out_hdr
Definition: ssl.h:1378
size_t verify_data_len
Definition: ssl.h:1446
mbedtls_ssl_transform * transform_out
Definition: ssl.h:1316
uint64_t in_window
Definition: ssl.h:1358
signed char split_done
Definition: ssl.h:1404
uint8_t disable_datagram_packing
Definition: ssl.h:1369
mbedtls_ssl_session * session_in
Definition: ssl.h:1304
mbedtls_ssl_set_timer_t * f_set_timer
Definition: ssl.h:1325
unsigned char * cli_id
Definition: ssl.h:1435
size_t cli_id_len
Definition: ssl.h:1436
mbedtls_ssl_session * session
Definition: ssl.h:1306
char * hostname
Definition: ssl.h:1416
unsigned char cur_out_ctr[8]
Definition: ssl.h:1394
unsigned char * out_len
Definition: ssl.h:1383
mbedtls_ssl_get_timer_t * f_get_timer
Definition: ssl.h:1326
mbedtls_ssl_transform * transform
Definition: ssl.h:1317
char own_verify_data[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN]
Definition: ssl.h:1447
mbedtls_ssl_send_t * f_send
Definition: ssl.h:1294
unsigned char * out_msg
Definition: ssl.h:1385
int(* f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *)
Definition: ssl.h:1290
void * p_vrfy
Definition: ssl.h:1291
mbedtls_ssl_session * session_negotiate
Definition: ssl.h:1307
char peer_verify_data[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN]
Definition: ssl.h:1448
unsigned char * in_iv
Definition: ssl.h:1341
unsigned char * out_buf
Definition: ssl.h:1376
unsigned char * in_buf
Definition: ssl.h:1331
const char * alpn_chosen
Definition: ssl.h:1421
size_t out_left
Definition: ssl.h:1389
size_t in_hslen
Definition: ssl.h:1361
mbedtls_ssl_session * session_out
Definition: ssl.h:1305
size_t next_record_offset
Definition: ssl.h:1353
uint64_t in_window_top
Definition: ssl.h:1357
unsigned char * in_msg
Definition: ssl.h:1342
size_t out_msglen
Definition: ssl.h:1388
mbedtls_ssl_recv_t * f_recv
Definition: ssl.h:1295
int renego_records_seen
Definition: ssl.h:1276
unsigned char * out_ctr
Definition: ssl.h:1377
unsigned char * out_iv
Definition: ssl.h:1384
unsigned char * in_ctr
Definition: ssl.h:1332
mbedtls_ssl_recv_timeout_t * f_recv_timeout
Definition: ssl.h:1296
unsigned char * in_hdr
Definition: ssl.h:1335
mbedtls_ssl_transform * transform_in
Definition: ssl.h:1315
mbedtls_ssl_handshake_params * handshake
Definition: ssl.h:1309
int secure_renegotiation
Definition: ssl.h:1443
mbedtls_ssl_transform * transform_negotiate
Definition: ssl.h:1318
unsigned badmac_seen
Definition: ssl.h:1285
size_t in_msglen
Definition: ssl.h:1346
void * p_timer
Definition: ssl.h:1323
uint16_t in_epoch
Definition: ssl.h:1352
size_t in_left
Definition: ssl.h:1347
void * p_bio
Definition: ssl.h:1299
unsigned char * in_offt
Definition: ssl.h:1343
unsigned char * in_len
Definition: ssl.h:1340
uint16_t mtu
Definition: ssl.h:1397
const mbedtls_ssl_config * conf
Definition: ssl.h:1268
int keep_current_message
Definition: ssl.h:1365
uint32_t ticket_lifetime
Definition: ssl.h:1004
mbedtls_x509_crt * peer_cert
Definition: ssl.h:990
size_t ticket_len
Definition: ssl.h:1003
uint32_t verify_result
Definition: ssl.h:999
mbedtls_time_t start
Definition: ssl.h:980
unsigned char mfl_code
Definition: ssl.h:976
int encrypt_then_mac
Definition: ssl.h:1012
size_t id_len
Definition: ssl.h:984
unsigned char * ticket
Definition: ssl.h:1002
unsigned char master[48]
Definition: ssl.h:986
unsigned char _pms_ecdhe_psk[4+MBEDTLS_ECP_MAX_BYTES+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:522
unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]
Definition: ssl.h:502
unsigned char _pms_psk[4+2 *MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:511
unsigned char _pms_rsa_psk[52+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:518
unsigned char dummy
Definition: ssl.h:497
unsigned char _pms_rsa[48]
Definition: ssl.h:499
unsigned char _pms_dhe_psk[4+MBEDTLS_MPI_MAX_SIZE+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:515
unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]
Definition: ssl.h:508
X.509 certificate revocation list parsing.
X.509 certificate parsing and writing.