Mbed TLS v2.28.10
ssl.h
Go to the documentation of this file.
1 
6 /*
7  * Copyright The Mbed TLS Contributors
8  * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
9  */
10 #ifndef MBEDTLS_SSL_H
11 #define MBEDTLS_SSL_H
12 
13 #if !defined(MBEDTLS_CONFIG_FILE)
14 #include "mbedtls/config.h"
15 #else
16 #include MBEDTLS_CONFIG_FILE
17 #endif
18 
19 #include "mbedtls/bignum.h"
20 #include "mbedtls/ecp.h"
21 
23 
24 #if defined(MBEDTLS_X509_CRT_PARSE_C)
25 #include "mbedtls/x509_crt.h"
26 #include "mbedtls/x509_crl.h"
27 #endif
28 
29 #if defined(MBEDTLS_DHM_C)
30 #include "mbedtls/dhm.h"
31 #endif
32 
33 /* Adding guard for MBEDTLS_ECDSA_C to ensure no compile errors due
34  * to guards also being in ssl_srv.c and ssl_cli.c. There is a gap
35  * in functionality that access to ecdh_ctx structure is needed for
36  * MBEDTLS_ECDSA_C which does not seem correct.
37  */
38 #if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C)
39 #include "mbedtls/ecdh.h"
40 #endif
41 
42 #if defined(MBEDTLS_ZLIB_SUPPORT)
43 
44 #if defined(MBEDTLS_DEPRECATED_WARNING)
45 #warning \
46  "Record compression support via MBEDTLS_ZLIB_SUPPORT is deprecated and will be removed in the next major revision of the library"
47 #endif
48 
49 #if defined(MBEDTLS_DEPRECATED_REMOVED)
50 #error \
51  "Record compression support via MBEDTLS_ZLIB_SUPPORT is deprecated and cannot be used if MBEDTLS_DEPRECATED_REMOVED is set"
52 #endif
53 
54 #include "zlib.h"
55 #endif
56 
57 #if defined(MBEDTLS_HAVE_TIME)
58 #include "mbedtls/platform_time.h"
59 #endif
60 
61 #if defined(MBEDTLS_USE_PSA_CRYPTO)
62 #include "psa/crypto.h"
63 #endif /* MBEDTLS_USE_PSA_CRYPTO */
64 
65 /*
66  * SSL Error codes
67  */
69 #define MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE -0x7080
70 
71 #define MBEDTLS_ERR_SSL_BAD_INPUT_DATA -0x7100
72 
73 #define MBEDTLS_ERR_SSL_INVALID_MAC -0x7180
74 
75 #define MBEDTLS_ERR_SSL_INVALID_RECORD -0x7200
76 
77 #define MBEDTLS_ERR_SSL_CONN_EOF -0x7280
78 
79 #define MBEDTLS_ERR_SSL_UNKNOWN_CIPHER -0x7300
80 
81 #define MBEDTLS_ERR_SSL_NO_CIPHER_CHOSEN -0x7380
82 
83 #define MBEDTLS_ERR_SSL_NO_RNG -0x7400
84 
85 #define MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE -0x7480
86 
87 #define MBEDTLS_ERR_SSL_CERTIFICATE_TOO_LARGE -0x7500
88 
89 #define MBEDTLS_ERR_SSL_CERTIFICATE_REQUIRED -0x7580
90 
91 #define MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED -0x7600
92 
93 #define MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED -0x7680
94 
95 #define MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE -0x7700
96 
97 #define MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE -0x7780
98 
99 #define MBEDTLS_ERR_SSL_PEER_VERIFY_FAILED -0x7800
100 
101 #define MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY -0x7880
102 
103 #define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_HELLO -0x7900
104 
105 #define MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO -0x7980
106 
107 #define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE -0x7A00
108 
109 #define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_REQUEST -0x7A80
110 
111 #define MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE -0x7B00
112 
113 #define MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO_DONE -0x7B80
114 
115 #define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE -0x7C00
116 
117 #define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_RP -0x7C80
118 
119 #define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_CS -0x7D00
120 
121 #define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_VERIFY -0x7D80
122 
123 #define MBEDTLS_ERR_SSL_BAD_HS_CHANGE_CIPHER_SPEC -0x7E00
124 
125 #define MBEDTLS_ERR_SSL_BAD_HS_FINISHED -0x7E80
126 
127 #define MBEDTLS_ERR_SSL_ALLOC_FAILED -0x7F00
128 
129 #define MBEDTLS_ERR_SSL_HW_ACCEL_FAILED -0x7F80
130 
131 #define MBEDTLS_ERR_SSL_HW_ACCEL_FALLTHROUGH -0x6F80
132 
133 #define MBEDTLS_ERR_SSL_COMPRESSION_FAILED -0x6F00
134 
135 #define MBEDTLS_ERR_SSL_BAD_HS_PROTOCOL_VERSION -0x6E80
136 
137 #define MBEDTLS_ERR_SSL_BAD_HS_NEW_SESSION_TICKET -0x6E00
138 
139 #define MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED -0x6D80
140 
141 #define MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH -0x6D00
142 
143 #define MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY -0x6C80
144 
145 #define MBEDTLS_ERR_SSL_INTERNAL_ERROR -0x6C00
146 
147 #define MBEDTLS_ERR_SSL_COUNTER_WRAPPING -0x6B80
148 
149 #define MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO -0x6B00
150 
151 #define MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED -0x6A80
152 
153 #define MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL -0x6A00
154 
155 #define MBEDTLS_ERR_SSL_NO_USABLE_CIPHERSUITE -0x6980
156 
157 #define MBEDTLS_ERR_SSL_WANT_READ -0x6900
158 
159 #define MBEDTLS_ERR_SSL_WANT_WRITE -0x6880
160 
161 #define MBEDTLS_ERR_SSL_TIMEOUT -0x6800
162 
163 #define MBEDTLS_ERR_SSL_CLIENT_RECONNECT -0x6780
164 
165 #define MBEDTLS_ERR_SSL_UNEXPECTED_RECORD -0x6700
166 
167 #define MBEDTLS_ERR_SSL_NON_FATAL -0x6680
168 
169 #define MBEDTLS_ERR_SSL_INVALID_VERIFY_HASH -0x6600
170 
171 #define MBEDTLS_ERR_SSL_CONTINUE_PROCESSING -0x6580
172 
173 #define MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS -0x6500
174 
175 #define MBEDTLS_ERR_SSL_EARLY_MESSAGE -0x6480
176 
177 #define MBEDTLS_ERR_SSL_UNEXPECTED_CID -0x6000
178 
179 #define MBEDTLS_ERR_SSL_VERSION_MISMATCH -0x5F00
180 
181 #define MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS -0x7000
182 
183 #define MBEDTLS_ERR_SSL_BAD_CONFIG -0x5E80
184 
185 #define MBEDTLS_ERR_SSL_CACHE_ENTRY_NOT_FOUND -0x5E00
186 
220 #define MBEDTLS_ERR_SSL_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME -0x5D80
221 
222 /*
223  * Various constants
224  */
225 #define MBEDTLS_SSL_MAJOR_VERSION_3 3
226 #define MBEDTLS_SSL_MINOR_VERSION_0 0
227 #define MBEDTLS_SSL_MINOR_VERSION_1 1
228 #define MBEDTLS_SSL_MINOR_VERSION_2 2
229 #define MBEDTLS_SSL_MINOR_VERSION_3 3
230 #define MBEDTLS_SSL_MINOR_VERSION_4 4
232 #define MBEDTLS_SSL_TRANSPORT_STREAM 0
233 #define MBEDTLS_SSL_TRANSPORT_DATAGRAM 1
235 #define MBEDTLS_SSL_MAX_HOST_NAME_LEN 255
236 #define MBEDTLS_SSL_MAX_ALPN_NAME_LEN 255
238 #define MBEDTLS_SSL_MAX_ALPN_LIST_LEN 65535
240 /* RFC 6066 section 4, see also mfl_code_to_length in ssl_tls.c
241  * NONE must be zero so that memset()ing structure to zero works */
242 #define MBEDTLS_SSL_MAX_FRAG_LEN_NONE 0
243 #define MBEDTLS_SSL_MAX_FRAG_LEN_512 1
244 #define MBEDTLS_SSL_MAX_FRAG_LEN_1024 2
245 #define MBEDTLS_SSL_MAX_FRAG_LEN_2048 3
246 #define MBEDTLS_SSL_MAX_FRAG_LEN_4096 4
247 #define MBEDTLS_SSL_MAX_FRAG_LEN_INVALID 5
249 #define MBEDTLS_SSL_IS_CLIENT 0
250 #define MBEDTLS_SSL_IS_SERVER 1
251 
252 #define MBEDTLS_SSL_IS_NOT_FALLBACK 0
253 #define MBEDTLS_SSL_IS_FALLBACK 1
254 
255 #define MBEDTLS_SSL_EXTENDED_MS_DISABLED 0
256 #define MBEDTLS_SSL_EXTENDED_MS_ENABLED 1
257 
258 #define MBEDTLS_SSL_CID_DISABLED 0
259 #define MBEDTLS_SSL_CID_ENABLED 1
260 
261 #define MBEDTLS_SSL_ETM_DISABLED 0
262 #define MBEDTLS_SSL_ETM_ENABLED 1
263 
264 #define MBEDTLS_SSL_COMPRESS_NULL 0
265 #define MBEDTLS_SSL_COMPRESS_DEFLATE 1
266 
267 #define MBEDTLS_SSL_VERIFY_NONE 0
268 #define MBEDTLS_SSL_VERIFY_OPTIONAL 1
269 #define MBEDTLS_SSL_VERIFY_REQUIRED 2
270 #define MBEDTLS_SSL_VERIFY_UNSET 3 /* Used only for sni_authmode */
271 
272 #define MBEDTLS_SSL_LEGACY_RENEGOTIATION 0
273 #define MBEDTLS_SSL_SECURE_RENEGOTIATION 1
274 
275 #define MBEDTLS_SSL_RENEGOTIATION_DISABLED 0
276 #define MBEDTLS_SSL_RENEGOTIATION_ENABLED 1
277 
278 #define MBEDTLS_SSL_ANTI_REPLAY_DISABLED 0
279 #define MBEDTLS_SSL_ANTI_REPLAY_ENABLED 1
280 
281 #define MBEDTLS_SSL_RENEGOTIATION_NOT_ENFORCED -1
282 #define MBEDTLS_SSL_RENEGO_MAX_RECORDS_DEFAULT 16
283 
284 #define MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION 0
285 #define MBEDTLS_SSL_LEGACY_ALLOW_RENEGOTIATION 1
286 #define MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE 2
287 
288 #define MBEDTLS_SSL_TRUNC_HMAC_DISABLED 0
289 #define MBEDTLS_SSL_TRUNC_HMAC_ENABLED 1
290 #define MBEDTLS_SSL_TRUNCATED_HMAC_LEN 10 /* 80 bits, rfc 6066 section 7 */
291 
292 #define MBEDTLS_SSL_SESSION_TICKETS_DISABLED 0
293 #define MBEDTLS_SSL_SESSION_TICKETS_ENABLED 1
294 
295 #define MBEDTLS_SSL_CBC_RECORD_SPLITTING_DISABLED 0
296 #define MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED 1
297 
298 #define MBEDTLS_SSL_ARC4_ENABLED 0
299 #define MBEDTLS_SSL_ARC4_DISABLED 1
300 
301 #define MBEDTLS_SSL_PRESET_DEFAULT 0
302 #define MBEDTLS_SSL_PRESET_SUITEB 2
303 
304 #define MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED 1
305 #define MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED 0
306 
307 #define MBEDTLS_SSL_DTLS_SRTP_MKI_UNSUPPORTED 0
308 #define MBEDTLS_SSL_DTLS_SRTP_MKI_SUPPORTED 1
309 
310 /*
311  * Default range for DTLS retransmission timer value, in milliseconds.
312  * RFC 6347 4.2.4.1 says from 1 second to 60 seconds.
313  */
314 #define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MIN 1000
315 #define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MAX 60000
316 
325 #if !defined(MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME)
326 #define MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME 86400
327 #endif
328 
329 /*
330  * Maximum fragment length in bytes,
331  * determines the size of each of the two internal I/O buffers.
332  *
333  * Note: the RFC defines the default size of SSL / TLS messages. If you
334  * change the value here, other clients / servers may not be able to
335  * communicate with you anymore. Only change this value if you control
336  * both sides of the connection and have it reduced at both sides, or
337  * if you're using the Max Fragment Length extension and you know all your
338  * peers are using it too!
339  */
340 #if !defined(MBEDTLS_SSL_MAX_CONTENT_LEN)
341 #define MBEDTLS_SSL_MAX_CONTENT_LEN 16384
342 #endif
343 
344 #if !defined(MBEDTLS_SSL_IN_CONTENT_LEN)
345 #define MBEDTLS_SSL_IN_CONTENT_LEN MBEDTLS_SSL_MAX_CONTENT_LEN
346 #endif
347 
348 #if !defined(MBEDTLS_SSL_OUT_CONTENT_LEN)
349 #define MBEDTLS_SSL_OUT_CONTENT_LEN MBEDTLS_SSL_MAX_CONTENT_LEN
350 #endif
351 
352 /*
353  * Maximum number of heap-allocated bytes for the purpose of
354  * DTLS handshake message reassembly and future message buffering.
355  */
356 #if !defined(MBEDTLS_SSL_DTLS_MAX_BUFFERING)
357 #define MBEDTLS_SSL_DTLS_MAX_BUFFERING 32768
358 #endif
359 
360 /*
361  * Maximum length of CIDs for incoming and outgoing messages.
362  */
363 #if !defined(MBEDTLS_SSL_CID_IN_LEN_MAX)
364 #define MBEDTLS_SSL_CID_IN_LEN_MAX 32
365 #endif
366 
367 #if !defined(MBEDTLS_SSL_CID_OUT_LEN_MAX)
368 #define MBEDTLS_SSL_CID_OUT_LEN_MAX 32
369 #endif
370 
371 #if !defined(MBEDTLS_SSL_CID_PADDING_GRANULARITY)
372 #define MBEDTLS_SSL_CID_PADDING_GRANULARITY 16
373 #endif
374 
375 #if !defined(MBEDTLS_SSL_TLS1_3_PADDING_GRANULARITY)
376 #define MBEDTLS_SSL_TLS1_3_PADDING_GRANULARITY 1
377 #endif
378 
381 /*
382  * Length of the verify data for secure renegotiation
383  */
384 #if defined(MBEDTLS_SSL_PROTO_SSL3)
385 #define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 36
386 #else
387 #define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 12
388 #endif
389 
390 /*
391  * Signaling ciphersuite values (SCSV)
392  */
393 #define MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO 0xFF
394 #define MBEDTLS_SSL_FALLBACK_SCSV_VALUE 0x5600
396 /*
397  * Supported Signature and Hash algorithms (For TLS 1.2)
398  * RFC 5246 section 7.4.1.4.1
399  */
400 #define MBEDTLS_SSL_HASH_NONE 0
401 #define MBEDTLS_SSL_HASH_MD5 1
402 #define MBEDTLS_SSL_HASH_SHA1 2
403 #define MBEDTLS_SSL_HASH_SHA224 3
404 #define MBEDTLS_SSL_HASH_SHA256 4
405 #define MBEDTLS_SSL_HASH_SHA384 5
406 #define MBEDTLS_SSL_HASH_SHA512 6
407 
408 #define MBEDTLS_SSL_SIG_ANON 0
409 #define MBEDTLS_SSL_SIG_RSA 1
410 #define MBEDTLS_SSL_SIG_ECDSA 3
411 
412 /*
413  * Client Certificate Types
414  * RFC 5246 section 7.4.4 plus RFC 4492 section 5.5
415  */
416 #define MBEDTLS_SSL_CERT_TYPE_RSA_SIGN 1
417 #define MBEDTLS_SSL_CERT_TYPE_ECDSA_SIGN 64
418 
419 /*
420  * Message, alert and handshake types
421  */
422 #define MBEDTLS_SSL_MSG_CHANGE_CIPHER_SPEC 20
423 #define MBEDTLS_SSL_MSG_ALERT 21
424 #define MBEDTLS_SSL_MSG_HANDSHAKE 22
425 #define MBEDTLS_SSL_MSG_APPLICATION_DATA 23
426 #define MBEDTLS_SSL_MSG_CID 25
427 
428 #define MBEDTLS_SSL_ALERT_LEVEL_WARNING 1
429 #define MBEDTLS_SSL_ALERT_LEVEL_FATAL 2
430 
431 #define MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY 0 /* 0x00 */
432 #define MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE 10 /* 0x0A */
433 #define MBEDTLS_SSL_ALERT_MSG_BAD_RECORD_MAC 20 /* 0x14 */
434 #define MBEDTLS_SSL_ALERT_MSG_DECRYPTION_FAILED 21 /* 0x15 */
435 #define MBEDTLS_SSL_ALERT_MSG_RECORD_OVERFLOW 22 /* 0x16 */
436 #define MBEDTLS_SSL_ALERT_MSG_DECOMPRESSION_FAILURE 30 /* 0x1E */
437 #define MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE 40 /* 0x28 */
438 #define MBEDTLS_SSL_ALERT_MSG_NO_CERT 41 /* 0x29 */
439 #define MBEDTLS_SSL_ALERT_MSG_BAD_CERT 42 /* 0x2A */
440 #define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT 43 /* 0x2B */
441 #define MBEDTLS_SSL_ALERT_MSG_CERT_REVOKED 44 /* 0x2C */
442 #define MBEDTLS_SSL_ALERT_MSG_CERT_EXPIRED 45 /* 0x2D */
443 #define MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN 46 /* 0x2E */
444 #define MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER 47 /* 0x2F */
445 #define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA 48 /* 0x30 */
446 #define MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED 49 /* 0x31 */
447 #define MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR 50 /* 0x32 */
448 #define MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR 51 /* 0x33 */
449 #define MBEDTLS_SSL_ALERT_MSG_EXPORT_RESTRICTION 60 /* 0x3C */
450 #define MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION 70 /* 0x46 */
451 #define MBEDTLS_SSL_ALERT_MSG_INSUFFICIENT_SECURITY 71 /* 0x47 */
452 #define MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR 80 /* 0x50 */
453 #define MBEDTLS_SSL_ALERT_MSG_INAPROPRIATE_FALLBACK 86 /* 0x56 */
454 #define MBEDTLS_SSL_ALERT_MSG_USER_CANCELED 90 /* 0x5A */
455 #define MBEDTLS_SSL_ALERT_MSG_NO_RENEGOTIATION 100 /* 0x64 */
456 #define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT 110 /* 0x6E */
457 #define MBEDTLS_SSL_ALERT_MSG_UNRECOGNIZED_NAME 112 /* 0x70 */
458 #define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_PSK_IDENTITY 115 /* 0x73 */
459 #define MBEDTLS_SSL_ALERT_MSG_NO_APPLICATION_PROTOCOL 120 /* 0x78 */
460 
461 #define MBEDTLS_SSL_HS_HELLO_REQUEST 0
462 #define MBEDTLS_SSL_HS_CLIENT_HELLO 1
463 #define MBEDTLS_SSL_HS_SERVER_HELLO 2
464 #define MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST 3
465 #define MBEDTLS_SSL_HS_NEW_SESSION_TICKET 4
466 #define MBEDTLS_SSL_HS_CERTIFICATE 11
467 #define MBEDTLS_SSL_HS_SERVER_KEY_EXCHANGE 12
468 #define MBEDTLS_SSL_HS_CERTIFICATE_REQUEST 13
469 #define MBEDTLS_SSL_HS_SERVER_HELLO_DONE 14
470 #define MBEDTLS_SSL_HS_CERTIFICATE_VERIFY 15
471 #define MBEDTLS_SSL_HS_CLIENT_KEY_EXCHANGE 16
472 #define MBEDTLS_SSL_HS_FINISHED 20
473 
474 /*
475  * TLS extensions
476  */
477 #define MBEDTLS_TLS_EXT_SERVERNAME 0
478 #define MBEDTLS_TLS_EXT_SERVERNAME_HOSTNAME 0
479 
480 #define MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH 1
481 
482 #define MBEDTLS_TLS_EXT_TRUNCATED_HMAC 4
483 
484 #define MBEDTLS_TLS_EXT_SUPPORTED_ELLIPTIC_CURVES 10
485 #define MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS 11
486 
487 #define MBEDTLS_TLS_EXT_SIG_ALG 13
488 
489 #define MBEDTLS_TLS_EXT_USE_SRTP 14
490 
491 #define MBEDTLS_TLS_EXT_ALPN 16
492 
493 #define MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC 22 /* 0x16 */
494 #define MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET 0x0017 /* 23 */
495 
496 #define MBEDTLS_TLS_EXT_SESSION_TICKET 35
497 
498 /* The value of the CID extension is still TBD as of
499  * draft-ietf-tls-dtls-connection-id-05
500  * (https://tools.ietf.org/html/draft-ietf-tls-dtls-connection-id-05).
501  *
502  * A future minor revision of Mbed TLS may change the default value of
503  * this option to match evolving standards and usage.
504  */
505 #if !defined(MBEDTLS_TLS_EXT_CID)
506 #define MBEDTLS_TLS_EXT_CID 254 /* TBD */
507 #endif
508 
509 #define MBEDTLS_TLS_EXT_ECJPAKE_KKPP 256 /* experimental */
510 
511 #define MBEDTLS_TLS_EXT_RENEGOTIATION_INFO 0xFF01
512 
513 /*
514  * Size defines
515  */
516 #if !defined(MBEDTLS_PSK_MAX_LEN)
517 #define MBEDTLS_PSK_MAX_LEN 32 /* 256 bits */
518 #endif
519 
520 /* Dummy type used only for its size */
522  unsigned char dummy; /* Make the union non-empty even with SSL disabled */
523 #if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)
524  unsigned char _pms_rsa[48]; /* RFC 5246 8.1.1 */
525 #endif
526 #if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)
527  unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]; /* RFC 5246 8.1.2 */
528 #endif
529 #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
530  defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
531  defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
532  defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
533  unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]; /* RFC 4492 5.10 */
534 #endif
535 #if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
536  unsigned char _pms_psk[4 + 2 * MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 2 */
537 #endif
538 #if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
539  unsigned char _pms_dhe_psk[4 + MBEDTLS_MPI_MAX_SIZE
540  + MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 3 */
541 #endif
542 #if defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)
543  unsigned char _pms_rsa_psk[52 + MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 4 */
544 #endif
545 #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
546  unsigned char _pms_ecdhe_psk[4 + MBEDTLS_ECP_MAX_BYTES
547  + MBEDTLS_PSK_MAX_LEN]; /* RFC 5489 2 */
548 #endif
549 #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
550  unsigned char _pms_ecjpake[32]; /* Thread spec: SHA-256 output */
551 #endif
552 };
553 
554 #define MBEDTLS_PREMASTER_SIZE sizeof(union mbedtls_ssl_premaster_secret)
555 
556 #ifdef __cplusplus
557 extern "C" {
558 #endif
559 
560 /*
561  * SSL state machine
562  */
563 typedef enum {
583 }
585 
586 /*
587  * The tls_prf function types.
588  */
589 typedef enum {
595 }
614 typedef int mbedtls_ssl_send_t(void *ctx,
615  const unsigned char *buf,
616  size_t len);
617 
638 typedef int mbedtls_ssl_recv_t(void *ctx,
639  unsigned char *buf,
640  size_t len);
641 
664 typedef int mbedtls_ssl_recv_timeout_t(void *ctx,
665  unsigned char *buf,
666  size_t len,
667  uint32_t timeout);
690 typedef void mbedtls_ssl_set_timer_t(void *ctx,
691  uint32_t int_ms,
692  uint32_t fin_ms);
693 
705 typedef int mbedtls_ssl_get_timer_t(void *ctx);
706 
707 /* Defined below */
711 
712 /* Defined in ssl_internal.h */
716 #if defined(MBEDTLS_X509_CRT_PARSE_C)
718 #endif
719 #if defined(MBEDTLS_SSL_PROTO_DTLS)
721 #endif
722 
723 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
724 #if defined(MBEDTLS_X509_CRT_PARSE_C)
725 
796 typedef int mbedtls_ssl_async_sign_t(mbedtls_ssl_context *ssl,
797  mbedtls_x509_crt *cert,
798  mbedtls_md_type_t md_alg,
799  const unsigned char *hash,
800  size_t hash_len);
801 
862 typedef int mbedtls_ssl_async_decrypt_t(mbedtls_ssl_context *ssl,
863  mbedtls_x509_crt *cert,
864  const unsigned char *input,
865  size_t input_len);
866 #endif /* MBEDTLS_X509_CRT_PARSE_C */
867 
910 typedef int mbedtls_ssl_async_resume_t(mbedtls_ssl_context *ssl,
911  unsigned char *output,
912  size_t *output_len,
913  size_t output_size);
914 
932 typedef void mbedtls_ssl_async_cancel_t(mbedtls_ssl_context *ssl);
933 #endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
934 
935 #if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
936  !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
937 #define MBEDTLS_SSL_PEER_CERT_DIGEST_MAX_LEN 48
938 #if defined(MBEDTLS_SHA256_C)
939 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA256
940 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 32
941 #elif defined(MBEDTLS_SHA512_C)
942 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA384
943 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 48
944 #elif defined(MBEDTLS_SHA1_C)
945 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA1
946 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 20
947 #else
948 /* This is already checked in check_config.h, but be sure. */
949 #error "Bad configuration - need SHA-1, SHA-256 or SHA-512 enabled to compute digest of peer CRT."
950 #endif
951 #endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED &&
952  !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
953 
954 #if defined(MBEDTLS_SSL_DTLS_SRTP)
955 
956 #define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH 255
957 #define MBEDTLS_TLS_SRTP_MAX_PROFILE_LIST_LENGTH 4
958 /*
959  * For code readability use a typedef for DTLS-SRTP profiles
960  *
961  * Use_srtp extension protection profiles values as defined in
962  * http://www.iana.org/assignments/srtp-protection/srtp-protection.xhtml
963  *
964  * Reminder: if this list is expanded mbedtls_ssl_check_srtp_profile_value
965  * must be updated too.
966  */
967 #define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80 ((uint16_t) 0x0001)
968 #define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32 ((uint16_t) 0x0002)
969 #define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80 ((uint16_t) 0x0005)
970 #define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32 ((uint16_t) 0x0006)
971 /* This one is not iana defined, but for code readability. */
972 #define MBEDTLS_TLS_SRTP_UNSET ((uint16_t) 0x0000)
973 
974 typedef uint16_t mbedtls_ssl_srtp_profile;
975 
976 typedef struct mbedtls_dtls_srtp_info_t {
978  mbedtls_ssl_srtp_profile chosen_dtls_srtp_profile;
980  uint16_t mki_len;
983 }
985 
986 #endif /* MBEDTLS_SSL_DTLS_SRTP */
987 
988 /*
989  * This structure is used for storing current session data.
990  *
991  * Note: when changing this definition, we need to check and update:
992  * - in tests/suites/test_suite_ssl.function:
993  * ssl_populate_session() and ssl_serialize_session_save_load()
994  * - in library/ssl_tls.c:
995  * mbedtls_ssl_session_init() and mbedtls_ssl_session_free()
996  * mbedtls_ssl_session_save() and ssl_session_load()
997  * ssl_session_copy()
998  */
1000 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1001  unsigned char mfl_code;
1002 #endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
1003 
1004 #if defined(MBEDTLS_HAVE_TIME)
1006 #endif
1009  size_t id_len;
1010  unsigned char id[32];
1011  unsigned char master[48];
1013 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1014 #if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
1016 #else /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1017 
1019  unsigned char *peer_cert_digest;
1020  size_t peer_cert_digest_len;
1021  mbedtls_md_type_t peer_cert_digest_type;
1022 #endif /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
1023 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1024  uint32_t verify_result;
1026 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
1027  unsigned char *ticket;
1028  size_t ticket_len;
1029  uint32_t ticket_lifetime;
1030 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_CLI_C */
1031 
1032 #if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
1034 #endif /* MBEDTLS_SSL_TRUNCATED_HMAC */
1035 
1036 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1038 #endif
1039 };
1040 
1045  /* Group items by size and reorder them to maximize usage of immediate offset access. */
1046 
1047  /*
1048  * Numerical settings (char)
1049  */
1050 
1051  unsigned char max_major_ver;
1052  unsigned char max_minor_ver;
1053  unsigned char min_major_ver;
1054  unsigned char min_minor_ver;
1056  /*
1057  * Flags (could be bit-fields to save RAM, but separate bytes make
1058  * the code smaller on architectures with an instruction for direct
1059  * byte access).
1060  */
1061 
1062  uint8_t endpoint /*bool*/;
1063  uint8_t transport /*bool*/;
1064  uint8_t authmode /*2 bits*/;
1065  /* needed even with renego disabled for LEGACY_BREAK_HANDSHAKE */
1066  uint8_t allow_legacy_renegotiation /*2 bits*/;
1067 #if defined(MBEDTLS_ARC4_C)
1068  uint8_t arc4_disabled /*bool*/;
1069 #endif
1070 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1071  uint8_t mfl_code /*3 bits*/;
1072 #endif
1073 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1074  uint8_t encrypt_then_mac /*bool*/;
1075 #endif
1076 #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
1077  uint8_t extended_ms /*bool*/;
1078 #endif
1079 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1080  uint8_t anti_replay /*bool*/;
1081 #endif
1082 #if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
1083  uint8_t cbc_record_splitting /*bool*/;
1084 #endif
1085 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1086  uint8_t disable_renegotiation /*bool*/;
1087 #endif
1088 #if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
1089  uint8_t trunc_hmac /*bool*/;
1090 #endif
1091 #if defined(MBEDTLS_SSL_SESSION_TICKETS)
1092  uint8_t session_tickets /*bool*/;
1093 #endif
1094 #if defined(MBEDTLS_SSL_FALLBACK_SCSV) && defined(MBEDTLS_SSL_CLI_C)
1095  uint8_t fallback /*bool*/;
1096 #endif
1097 #if defined(MBEDTLS_SSL_SRV_C)
1098  uint8_t cert_req_ca_list /*bool*/;
1100 #endif
1101 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1102  uint8_t ignore_unexpected_cid /*bool*/;
1105 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1106 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1107  uint8_t dtls_srtp_mki_support /*bool*/;
1109 #endif
1110 
1111  /*
1112  * Numerical settings (int or larger)
1113  */
1114 
1115  uint32_t read_timeout;
1117 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1118  uint32_t hs_timeout_min;
1120  uint32_t hs_timeout_max;
1122 #endif
1123 
1124 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1126  unsigned char renego_period[8];
1128 #endif
1129 
1130 #if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT)
1131  unsigned int badmac_limit;
1132 #endif
1133 
1134 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
1135  unsigned int dhm_min_bitlen;
1136 #endif
1137 
1138  /*
1139  * Pointers
1140  */
1141 
1142  const int *ciphersuite_list[4];
1145  void (*f_dbg)(void *, int, const char *, int, const char *);
1146  void *p_dbg;
1149  int (*f_rng)(void *, unsigned char *, size_t);
1150  void *p_rng;
1155  int (*f_set_cache)(void *, const mbedtls_ssl_session *);
1156  void *p_cache;
1158 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
1159 
1160  int (*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
1161  void *p_sni;
1162 #endif
1163 
1164 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1165 
1166  int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *);
1167  void *p_vrfy;
1168 #endif
1169 
1170 #if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
1171 
1172  int (*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
1173  void *p_psk;
1174 #endif
1175 
1176 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1177 
1178  int (*f_cookie_write)(void *, unsigned char **, unsigned char *,
1179  const unsigned char *, size_t);
1181  int (*f_cookie_check)(void *, const unsigned char *, size_t,
1182  const unsigned char *, size_t);
1183  void *p_cookie;
1184 #endif
1185 
1186 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
1187 
1188  int (*f_ticket_write)(void *, const mbedtls_ssl_session *,
1189  unsigned char *, const unsigned char *, size_t *, uint32_t *);
1191  int (*f_ticket_parse)(void *, mbedtls_ssl_session *, unsigned char *, size_t);
1192  void *p_ticket;
1193 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
1194 
1195 #if defined(MBEDTLS_SSL_EXPORT_KEYS)
1196 
1197  int (*f_export_keys)(void *, const unsigned char *,
1198  const unsigned char *, size_t, size_t, size_t);
1201  int (*f_export_keys_ext)(void *, const unsigned char *,
1202  const unsigned char *, size_t, size_t, size_t,
1203  const unsigned char[32], const unsigned char[32],
1206 #endif
1207 
1208 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1209  size_t cid_len;
1210 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1211 
1212 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1215  mbedtls_x509_crt *ca_chain;
1217 #if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
1218  mbedtls_x509_crt_ca_cb_t f_ca_cb;
1219  void *p_ca_cb;
1220 #endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
1221 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1222 
1223 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
1224 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1225  mbedtls_ssl_async_sign_t *f_async_sign_start;
1226  mbedtls_ssl_async_decrypt_t *f_async_decrypt_start;
1227 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1228  mbedtls_ssl_async_resume_t *f_async_resume;
1229  mbedtls_ssl_async_cancel_t *f_async_cancel;
1230  void *p_async_config_data;
1231 #endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
1232 
1233 #if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
1234  const int *sig_hashes;
1235 #endif
1236 
1237 #if defined(MBEDTLS_ECP_C)
1239 #endif
1240 
1241 #if defined(MBEDTLS_DHM_C)
1244 #endif
1245 
1246 #if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
1247 
1248 #if defined(MBEDTLS_USE_PSA_CRYPTO)
1249  psa_key_id_t psk_opaque;
1255 #endif /* MBEDTLS_USE_PSA_CRYPTO */
1256 
1257  unsigned char *psk;
1261  size_t psk_len;
1267  unsigned char *psk_identity;
1278 #endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
1279 
1280 #if defined(MBEDTLS_SSL_ALPN)
1281  const char **alpn_list;
1282 #endif
1283 
1284 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1285 
1286  const mbedtls_ssl_srtp_profile *dtls_srtp_profile_list;
1289 #endif /* MBEDTLS_SSL_DTLS_SRTP */
1290 };
1291 
1295  /*
1296  * Miscellaneous
1297  */
1298  int state;
1299 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1304 #endif /* MBEDTLS_SSL_RENEGOTIATION */
1305 
1309 #if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT)
1310  unsigned badmac_seen;
1311 #endif /* MBEDTLS_SSL_DTLS_BADMAC_LIMIT */
1312 
1313 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1314 
1315  int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *);
1316  void *p_vrfy;
1317 #endif
1318 
1324  void *p_bio;
1326  /*
1327  * Session layer
1328  */
1337  /*
1338  * Record layer transformations
1339  */
1345  /*
1346  * Timers
1347  */
1348  void *p_timer;
1353  /*
1354  * Record layer (incoming data)
1355  */
1356  unsigned char *in_buf;
1357  unsigned char *in_ctr;
1360  unsigned char *in_hdr;
1361 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1362  unsigned char *in_cid;
1364 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1365  unsigned char *in_len;
1366  unsigned char *in_iv;
1367  unsigned char *in_msg;
1368  unsigned char *in_offt;
1371  size_t in_msglen;
1372  size_t in_left;
1373 #if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1374  size_t in_buf_len;
1375 #endif
1376 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1377  uint16_t in_epoch;
1380 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1381 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1382  uint64_t in_window_top;
1383  uint64_t in_window;
1384 #endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
1385 
1386  size_t in_hslen;
1388  int nb_zero;
1393 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1396 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1397 
1398  /*
1399  * Record layer (outgoing data)
1400  */
1401  unsigned char *out_buf;
1402  unsigned char *out_ctr;
1403  unsigned char *out_hdr;
1404 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1405  unsigned char *out_cid;
1407 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1408  unsigned char *out_len;
1409  unsigned char *out_iv;
1410  unsigned char *out_msg;
1413  size_t out_msglen;
1414  size_t out_left;
1415 #if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1416  size_t out_buf_len;
1417 #endif
1418 
1419  unsigned char cur_out_ctr[8];
1421 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1422  uint16_t mtu;
1423 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1424 
1425 #if defined(MBEDTLS_ZLIB_SUPPORT)
1426  unsigned char *compress_buf;
1427 #endif /* MBEDTLS_ZLIB_SUPPORT */
1428 #if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
1429  signed char split_done;
1430 #endif /* MBEDTLS_SSL_CBC_RECORD_SPLITTING */
1431 
1432  /*
1433  * PKI layer
1434  */
1437  /*
1438  * User settings
1439  */
1440 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1441 
1470  char *hostname;
1471 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1472 
1473 #if defined(MBEDTLS_SSL_ALPN)
1474  const char *alpn_chosen;
1475 #endif /* MBEDTLS_SSL_ALPN */
1476 
1477 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1478  /*
1479  * use_srtp extension
1480  */
1482 #endif /* MBEDTLS_SSL_DTLS_SRTP */
1483 
1484  /*
1485  * Information for DTLS hello verify
1486  */
1487 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1488  unsigned char *cli_id;
1489  size_t cli_id_len;
1490 #endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
1491 
1492  /*
1493  * Secure renegotiation
1494  */
1495  /* needed to know when to send extension on server */
1498 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1502 #endif /* MBEDTLS_SSL_RENEGOTIATION */
1503 
1504 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1505  /* CID configuration to use in subsequent handshakes. */
1506 
1511  unsigned char own_cid[MBEDTLS_SSL_CID_IN_LEN_MAX];
1512  uint8_t own_cid_len;
1513  uint8_t negotiate_cid;
1517 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1518 };
1519 
1520 #if defined(MBEDTLS_SSL_HW_RECORD_ACCEL)
1521 
1522 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
1523 
1524 #define MBEDTLS_SSL_CHANNEL_OUTBOUND MBEDTLS_DEPRECATED_NUMERIC_CONSTANT(0)
1525 #define MBEDTLS_SSL_CHANNEL_INBOUND MBEDTLS_DEPRECATED_NUMERIC_CONSTANT(1)
1526 
1527 #if defined(MBEDTLS_DEPRECATED_WARNING)
1528 #define MBEDTLS_DEPRECATED __attribute__((deprecated))
1529 #else
1530 #define MBEDTLS_DEPRECATED
1531 #endif /* MBEDTLS_DEPRECATED_WARNING */
1532 
1533 MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_init)(
1534  mbedtls_ssl_context *ssl,
1535  const unsigned char *key_enc, const unsigned char *key_dec,
1536  size_t keylen,
1537  const unsigned char *iv_enc, const unsigned char *iv_dec,
1538  size_t ivlen,
1539  const unsigned char *mac_enc, const unsigned char *mac_dec,
1540  size_t maclen);
1541 MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_activate)(
1542  mbedtls_ssl_context *ssl,
1543  int direction);
1544 MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_reset)(
1545  mbedtls_ssl_context *ssl);
1546 MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_write)(
1547  mbedtls_ssl_context *ssl);
1548 MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_read)(
1549  mbedtls_ssl_context *ssl);
1550 MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_finish)(
1551  mbedtls_ssl_context *ssl);
1552 
1553 #undef MBEDTLS_DEPRECATED
1554 #endif /* !MBEDTLS_DEPRECATED_REMOVED */
1555 
1556 #endif /* MBEDTLS_SSL_HW_RECORD_ACCEL */
1557 
1566 const char *mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id);
1567 
1576 int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name);
1577 
1586 
1620  const mbedtls_ssl_config *conf);
1621 
1633 
1640 void mbedtls_ssl_conf_endpoint(mbedtls_ssl_config *conf, int endpoint);
1641 
1656 void mbedtls_ssl_conf_transport(mbedtls_ssl_config *conf, int transport);
1657 
1684 void mbedtls_ssl_conf_authmode(mbedtls_ssl_config *conf, int authmode);
1685 
1686 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1687 
1703  int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
1704  void *p_vrfy);
1705 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1706 
1715  int (*f_rng)(void *, unsigned char *, size_t),
1716  void *p_rng);
1717 
1733  void (*f_dbg)(void *, int, const char *, int, const char *),
1734  void *p_dbg);
1735 
1767  void *p_bio,
1768  mbedtls_ssl_send_t *f_send,
1769  mbedtls_ssl_recv_t *f_recv,
1770  mbedtls_ssl_recv_timeout_t *f_recv_timeout);
1771 
1772 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1773 
1774 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1775 
1776 
1860 int mbedtls_ssl_set_cid(mbedtls_ssl_context *ssl,
1861  int enable,
1862  unsigned char const *own_cid,
1863  size_t own_cid_len);
1864 
1902 int mbedtls_ssl_get_peer_cid(mbedtls_ssl_context *ssl,
1903  int *enabled,
1904  unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX],
1905  size_t *peer_cid_len);
1906 
1907 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1908 
1951 void mbedtls_ssl_set_mtu(mbedtls_ssl_context *ssl, uint16_t mtu);
1952 #endif /* MBEDTLS_SSL_PROTO_DTLS */
1953 
1954 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1955 
1974  int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
1975  void *p_vrfy);
1976 #endif /* MBEDTLS_X509_CRT_PARSE_C */
1977 
1994 void mbedtls_ssl_conf_read_timeout(mbedtls_ssl_config *conf, uint32_t timeout);
1995 
1996 #if defined(MBEDTLS_SSL_RECORD_CHECKING)
1997 
2042  unsigned char *buf,
2043  size_t buflen);
2044 #endif /* MBEDTLS_SSL_RECORD_CHECKING */
2045 
2067  void *p_timer,
2068  mbedtls_ssl_set_timer_t *f_set_timer,
2069  mbedtls_ssl_get_timer_t *f_get_timer);
2070 
2090 typedef int mbedtls_ssl_ticket_write_t(void *p_ticket,
2091  const mbedtls_ssl_session *session,
2092  unsigned char *start,
2093  const unsigned char *end,
2094  size_t *tlen,
2095  uint32_t *lifetime);
2096 
2097 #if defined(MBEDTLS_SSL_EXPORT_KEYS)
2098 
2118 typedef int mbedtls_ssl_export_keys_t(void *p_expkey,
2119  const unsigned char *ms,
2120  const unsigned char *kb,
2121  size_t maclen,
2122  size_t keylen,
2123  size_t ivlen);
2124 
2150 typedef int mbedtls_ssl_export_keys_ext_t(void *p_expkey,
2151  const unsigned char *ms,
2152  const unsigned char *kb,
2153  size_t maclen,
2154  size_t keylen,
2155  size_t ivlen,
2156  const unsigned char client_random[32],
2157  const unsigned char server_random[32],
2158  mbedtls_tls_prf_types tls_prf_type);
2159 #endif /* MBEDTLS_SSL_EXPORT_KEYS */
2160 
2184 typedef int mbedtls_ssl_ticket_parse_t(void *p_ticket,
2185  mbedtls_ssl_session *session,
2186  unsigned char *buf,
2187  size_t len);
2188 
2189 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
2190 
2205  mbedtls_ssl_ticket_write_t *f_ticket_write,
2206  mbedtls_ssl_ticket_parse_t *f_ticket_parse,
2207  void *p_ticket);
2208 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
2209 
2210 #if defined(MBEDTLS_SSL_EXPORT_KEYS)
2211 
2222  mbedtls_ssl_export_keys_t *f_export_keys,
2223  void *p_export_keys);
2224 
2238  mbedtls_ssl_export_keys_ext_t *f_export_keys_ext,
2239  void *p_export_keys);
2240 #endif /* MBEDTLS_SSL_EXPORT_KEYS */
2241 
2242 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
2243 
2273 void mbedtls_ssl_conf_async_private_cb(mbedtls_ssl_config *conf,
2274  mbedtls_ssl_async_sign_t *f_async_sign,
2275  mbedtls_ssl_async_decrypt_t *f_async_decrypt,
2276  mbedtls_ssl_async_resume_t *f_async_resume,
2277  mbedtls_ssl_async_cancel_t *f_async_cancel,
2278  void *config_data);
2279 
2288 void *mbedtls_ssl_conf_get_async_config_data(const mbedtls_ssl_config *conf);
2289 
2304 void *mbedtls_ssl_get_async_operation_data(const mbedtls_ssl_context *ssl);
2305 
2317 void mbedtls_ssl_set_async_operation_data(mbedtls_ssl_context *ssl,
2318  void *ctx);
2319 #endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
2320 
2335 typedef int mbedtls_ssl_cookie_write_t(void *ctx,
2336  unsigned char **p, unsigned char *end,
2337  const unsigned char *info, size_t ilen);
2338 
2352 typedef int mbedtls_ssl_cookie_check_t(void *ctx,
2353  const unsigned char *cookie, size_t clen,
2354  const unsigned char *info, size_t ilen);
2355 
2356 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
2357 
2386  mbedtls_ssl_cookie_write_t *f_cookie_write,
2387  mbedtls_ssl_cookie_check_t *f_cookie_check,
2388  void *p_cookie);
2389 
2410  const unsigned char *info,
2411  size_t ilen);
2412 
2413 #endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
2414 
2415 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
2416 
2432 #endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
2433 
2434 #if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT)
2435 
2458 void mbedtls_ssl_conf_dtls_badmac_limit(mbedtls_ssl_config *conf, unsigned limit);
2459 #endif /* MBEDTLS_SSL_DTLS_BADMAC_LIMIT */
2460 
2461 #if defined(MBEDTLS_SSL_PROTO_DTLS)
2462 
2492  unsigned allow_packing);
2493 
2525 void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max);
2526 #endif /* MBEDTLS_SSL_PROTO_DTLS */
2527 
2528 #if defined(MBEDTLS_SSL_SRV_C)
2529 
2567  void *p_cache,
2568  int (*f_get_cache)(void *, mbedtls_ssl_session *),
2569  int (*f_set_cache)(void *, const mbedtls_ssl_session *));
2570 #endif /* MBEDTLS_SSL_SRV_C */
2571 
2572 #if defined(MBEDTLS_SSL_CLI_C)
2573 
2588 #endif /* MBEDTLS_SSL_CLI_C */
2589 
2623  const unsigned char *buf,
2624  size_t len);
2625 
2653  unsigned char *buf,
2654  size_t buf_len,
2655  size_t *olen);
2656 
2673 
2690  const int *ciphersuites);
2691 
2692 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
2693 #define MBEDTLS_SSL_UNEXPECTED_CID_IGNORE 0
2694 #define MBEDTLS_SSL_UNEXPECTED_CID_FAIL 1
2695 
2727 int mbedtls_ssl_conf_cid(mbedtls_ssl_config *conf, size_t len,
2728  int ignore_other_cids);
2729 #endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
2730 
2751  const int *ciphersuites,
2752  int major, int minor);
2753 
2754 #if defined(MBEDTLS_X509_CRT_PARSE_C)
2755 
2766  const mbedtls_x509_crt_profile *profile);
2767 
2780  mbedtls_x509_crt *ca_chain,
2781  mbedtls_x509_crl *ca_crl);
2782 
2783 #if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
2784 
2835 void mbedtls_ssl_conf_ca_cb(mbedtls_ssl_config *conf,
2836  mbedtls_x509_crt_ca_cb_t f_ca_cb,
2837  void *p_ca_cb);
2838 #endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
2839 
2877  mbedtls_x509_crt *own_cert,
2878  mbedtls_pk_context *pk_key);
2879 #endif /* MBEDTLS_X509_CRT_PARSE_C */
2880 
2881 #if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
2882 
2914  const unsigned char *psk, size_t psk_len,
2915  const unsigned char *psk_identity, size_t psk_identity_len);
2916 
2917 #if defined(MBEDTLS_USE_PSA_CRYPTO)
2918 
2954 int mbedtls_ssl_conf_psk_opaque(mbedtls_ssl_config *conf,
2955  psa_key_id_t psk,
2956  const unsigned char *psk_identity,
2957  size_t psk_identity_len);
2958 #endif /* MBEDTLS_USE_PSA_CRYPTO */
2959 
2977  const unsigned char *psk, size_t psk_len);
2978 
2979 #if defined(MBEDTLS_USE_PSA_CRYPTO)
2980 
3000 int mbedtls_ssl_set_hs_psk_opaque(mbedtls_ssl_context *ssl,
3001  psa_key_id_t psk);
3002 #endif /* MBEDTLS_USE_PSA_CRYPTO */
3003 
3043  int (*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *,
3044  size_t),
3045  void *p_psk);
3046 #endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
3047 
3048 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_SRV_C)
3049 
3050 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
3051 
3052 #if defined(MBEDTLS_DEPRECATED_WARNING)
3053 #define MBEDTLS_DEPRECATED __attribute__((deprecated))
3054 #else
3055 #define MBEDTLS_DEPRECATED
3056 #endif
3057 
3072  const char *dhm_P,
3073  const char *dhm_G);
3074 
3075 #endif /* MBEDTLS_DEPRECATED_REMOVED */
3076 
3091  const unsigned char *dhm_P, size_t P_len,
3092  const unsigned char *dhm_G, size_t G_len);
3093 
3104 #endif /* MBEDTLS_DHM_C && defined(MBEDTLS_SSL_SRV_C) */
3105 
3106 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
3107 
3116  unsigned int bitlen);
3117 #endif /* MBEDTLS_DHM_C && MBEDTLS_SSL_CLI_C */
3118 
3119 #if defined(MBEDTLS_ECP_C)
3120 
3150  const mbedtls_ecp_group_id *curves);
3151 #endif /* MBEDTLS_ECP_C */
3152 
3153 #if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
3154 
3175  const int *hashes);
3176 #endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
3177 
3178 #if defined(MBEDTLS_X509_CRT_PARSE_C)
3179 
3210 int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname);
3211 #endif /* MBEDTLS_X509_CRT_PARSE_C */
3212 
3213 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
3214 
3227  mbedtls_x509_crt *own_cert,
3228  mbedtls_pk_context *pk_key);
3229 
3242  mbedtls_x509_crt *ca_chain,
3243  mbedtls_x509_crl *ca_crl);
3244 
3256  int authmode);
3257 
3282  int (*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *,
3283  size_t),
3284  void *p_sni);
3285 #endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION */
3286 
3287 #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
3288 
3305 int mbedtls_ssl_set_hs_ecjpake_password(mbedtls_ssl_context *ssl,
3306  const unsigned char *pw,
3307  size_t pw_len);
3308 #endif /*MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
3309 
3310 #if defined(MBEDTLS_SSL_ALPN)
3311 
3323 int mbedtls_ssl_conf_alpn_protocols(mbedtls_ssl_config *conf, const char **protos);
3324 
3334 const char *mbedtls_ssl_get_alpn_protocol(const mbedtls_ssl_context *ssl);
3335 #endif /* MBEDTLS_SSL_ALPN */
3336 
3337 #if defined(MBEDTLS_SSL_DTLS_SRTP)
3338 #if defined(MBEDTLS_DEBUG_C)
3339 static inline const char *mbedtls_ssl_get_srtp_profile_as_string(mbedtls_ssl_srtp_profile profile)
3340 {
3341  switch (profile) {
3343  return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80";
3345  return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32";
3347  return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80";
3349  return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32";
3350  default: break;
3351  }
3352  return "";
3353 }
3354 #endif /* MBEDTLS_DEBUG_C */
3355 
3369  int support_mki_value);
3370 
3391  (mbedtls_ssl_config *conf,
3392  const mbedtls_ssl_srtp_profile *profiles);
3393 
3411  unsigned char *mki_value,
3412  uint16_t mki_len);
3432  mbedtls_dtls_srtp_info *dtls_srtp_info);
3433 #endif /* MBEDTLS_SSL_DTLS_SRTP */
3434 
3451 void mbedtls_ssl_conf_max_version(mbedtls_ssl_config *conf, int major, int minor);
3452 
3471 void mbedtls_ssl_conf_min_version(mbedtls_ssl_config *conf, int major, int minor);
3472 
3473 #if defined(MBEDTLS_SSL_FALLBACK_SCSV) && defined(MBEDTLS_SSL_CLI_C)
3474 
3493 void mbedtls_ssl_conf_fallback(mbedtls_ssl_config *conf, char fallback);
3494 #endif /* MBEDTLS_SSL_FALLBACK_SCSV && MBEDTLS_SSL_CLI_C */
3495 
3496 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
3497 
3509 #endif /* MBEDTLS_SSL_ENCRYPT_THEN_MAC */
3510 
3511 #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
3512 
3524 #endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */
3525 
3526 #if defined(MBEDTLS_ARC4_C)
3527 
3542 void mbedtls_ssl_conf_arc4_support(mbedtls_ssl_config *conf, char arc4);
3543 #endif /* MBEDTLS_ARC4_C */
3544 
3545 #if defined(MBEDTLS_SSL_SRV_C)
3546 
3556  char cert_req_ca_list);
3557 #endif /* MBEDTLS_SSL_SRV_C */
3558 
3559 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
3560 
3594 int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code);
3595 #endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
3596 
3597 #if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
3598 
3606 void mbedtls_ssl_conf_truncated_hmac(mbedtls_ssl_config *conf, int truncate);
3607 #endif /* MBEDTLS_SSL_TRUNCATED_HMAC */
3608 
3609 #if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
3610 
3622 #endif /* MBEDTLS_SSL_CBC_RECORD_SPLITTING */
3623 
3624 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
3625 
3635 void mbedtls_ssl_conf_session_tickets(mbedtls_ssl_config *conf, int use_tickets);
3636 #endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_CLI_C */
3637 
3638 #if defined(MBEDTLS_SSL_RENEGOTIATION)
3639 
3656 void mbedtls_ssl_conf_renegotiation(mbedtls_ssl_config *conf, int renegotiation);
3657 #endif /* MBEDTLS_SSL_RENEGOTIATION */
3658 
3686 void mbedtls_ssl_conf_legacy_renegotiation(mbedtls_ssl_config *conf, int allow_legacy);
3687 
3688 #if defined(MBEDTLS_SSL_RENEGOTIATION)
3689 
3726 void mbedtls_ssl_conf_renegotiation_enforced(mbedtls_ssl_config *conf, int max_records);
3727 
3754  const unsigned char period[8]);
3755 #endif /* MBEDTLS_SSL_RENEGOTIATION */
3756 
3796 
3813 
3827 
3835 const char *mbedtls_ssl_get_ciphersuite(const mbedtls_ssl_context *ssl);
3836 
3844 const char *mbedtls_ssl_get_version(const mbedtls_ssl_context *ssl);
3845 
3860 
3861 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
3862 
3876 
3892 
3893 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
3894 
3895 #if defined(MBEDTLS_DEPRECATED_WARNING)
3896 #define MBEDTLS_DEPRECATED __attribute__((deprecated))
3897 #else
3898 #define MBEDTLS_DEPRECATED
3899 #endif
3900 
3916  const mbedtls_ssl_context *ssl);
3917 #endif /* MBEDTLS_DEPRECATED_REMOVED */
3918 #endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
3919 
3948 
3949 #if defined(MBEDTLS_X509_CRT_PARSE_C)
3950 
3981 #endif /* MBEDTLS_X509_CRT_PARSE_C */
3982 
3983 #if defined(MBEDTLS_SSL_CLI_C)
3984 
4011 #endif /* MBEDTLS_SSL_CLI_C */
4012 
4068 
4090 
4091 #if defined(MBEDTLS_SSL_RENEGOTIATION)
4092 
4116 #endif /* MBEDTLS_SSL_RENEGOTIATION */
4117 
4195 int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len);
4196 
4257 int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len);
4258 
4276  unsigned char level,
4277  unsigned char message);
4292 
4299 
4300 #if defined(MBEDTLS_SSL_CONTEXT_SERIALIZATION)
4301 
4350  unsigned char *buf,
4351  size_t buf_len,
4352  size_t *olen);
4353 
4420  const unsigned char *buf,
4421  size_t len);
4422 #endif /* MBEDTLS_SSL_CONTEXT_SERIALIZATION */
4423 
4435 
4452  int endpoint, int transport, int preset);
4453 
4460 
4467 
4478 
4495  const unsigned char *secret, size_t slen,
4496  const char *label,
4497  const unsigned char *random, size_t rlen,
4498  unsigned char *dstbuf, size_t dlen);
4499 
4500 #ifdef __cplusplus
4501 }
4502 #endif
4503 
4504 #endif /* ssl.h */
uint64_t in_window_top
Definition: ssl.h:1382
unsigned char _pms_ecdhe_psk[4+MBEDTLS_ECP_MAX_BYTES +MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:547
int mbedtls_ssl_tls_prf(const mbedtls_tls_prf_types prf, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen)
TLS-PRF function for key derivation.
mbedtls_ssl_send_t * f_send
Definition: ssl.h:1319
void * p_rng
Definition: ssl.h:1150
uint8_t allow_legacy_renegotiation
Definition: ssl.h:1066
const char ** alpn_list
Definition: ssl.h:1281
unsigned char * in_ctr
Definition: ssl.h:1357
mbedtls_x509_crt * peer_cert
Definition: ssl.h:1015
unsigned char * out_msg
Definition: ssl.h:1410
unsigned char master[48]
Definition: ssl.h:1011
unsigned char * in_len
Definition: ssl.h:1365
unsigned char * in_buf
Definition: ssl.h:1356
Public key container.
Definition: pk.h:185
#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80
Definition: ssl.h:969
void mbedtls_ssl_set_hs_ca_chain(mbedtls_ssl_context *ssl, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate for the current handshake.
int mbedtls_ssl_ticket_parse_t(void *p_ticket, mbedtls_ssl_session *session, unsigned char *buf, size_t len)
Callback type: parse and load session ticket.
Definition: ssl.h:2184
mbedtls_mpi dhm_P
Definition: ssl.h:1242
char peer_verify_data[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN]
Definition: ssl.h:1501
unsigned char max_minor_ver
Definition: ssl.h:1052
uint8_t disable_renegotiation
Definition: ssl.h:1086
const char * mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id)
Return the name of the ciphersuite associated with the given ID.
void mbedtls_ssl_conf_encrypt_then_mac(mbedtls_ssl_config *conf, char etm)
Enable or disable Encrypt-then-MAC (Default: MBEDTLS_SSL_ETM_ENABLED)
unsigned char min_minor_ver
Definition: ssl.h:1054
uint8_t authmode
Definition: ssl.h:1064
int mbedtls_ssl_cookie_write_t(void *ctx, unsigned char **p, unsigned char *end, const unsigned char *info, size_t ilen)
Callback type: generate a cookie.
Definition: ssl.h:2335
unsigned char * in_hdr
Definition: ssl.h:1360
int mbedtls_ssl_dtls_srtp_set_mki_value(mbedtls_ssl_context *ssl, unsigned char *mki_value, uint16_t mki_len)
Set the mki_value for the current DTLS-SRTP session.
size_t psk_identity_len
Definition: ssl.h:1272
unsigned int dhm_min_bitlen
Definition: ssl.h:1135
int mbedtls_ssl_cookie_check_t(void *ctx, const unsigned char *cookie, size_t clen, const unsigned char *info, size_t ilen)
Callback type: verify a cookie.
Definition: ssl.h:2352
void * p_sni
Definition: ssl.h:1161
void mbedtls_ssl_set_timer_cb(mbedtls_ssl_context *ssl, void *p_timer, mbedtls_ssl_set_timer_t *f_set_timer, mbedtls_ssl_get_timer_t *f_get_timer)
Set the timer callbacks (Mandatory for DTLS.)
unsigned char * ticket
Definition: ssl.h:1027
uint16_t mki_len
Definition: ssl.h:980
struct mbedtls_ssl_sig_hash_set_t mbedtls_ssl_sig_hash_set_t
Definition: ssl.h:715
uint16_t mbedtls_ssl_srtp_profile
Definition: ssl.h:974
size_t ticket_len
Definition: ssl.h:1028
void mbedtls_ssl_conf_extended_master_secret(mbedtls_ssl_config *conf, char ems)
Enable or disable Extended Master Secret negotiation. (Default: MBEDTLS_SSL_EXTENDED_MS_ENABLED) ...
unsigned char * out_iv
Definition: ssl.h:1409
uint8_t transport
Definition: ssl.h:1063
mbedtls_ssl_transform * transform_in
Definition: ssl.h:1340
size_t in_left
Definition: ssl.h:1372
int mbedtls_ssl_send_t(void *ctx, const unsigned char *buf, size_t len)
Callback type: send data on the network.
Definition: ssl.h:614
uint8_t extended_ms
Definition: ssl.h:1077
unsigned int badmac_limit
Definition: ssl.h:1131
#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32
Definition: ssl.h:970
void * p_psk
Definition: ssl.h:1173
void mbedtls_ssl_conf_fallback(mbedtls_ssl_config *conf, char fallback)
Set the fallback flag (client-side only). (Default: MBEDTLS_SSL_IS_NOT_FALLBACK). ...
void mbedtls_ssl_set_verify(mbedtls_ssl_context *ssl, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set a connection-specific verification callback (optional).
int mbedtls_ssl_recv_t(void *ctx, unsigned char *buf, size_t len)
Callback type: receive data from the network.
Definition: ssl.h:638
uint8_t fallback
Definition: ssl.h:1095
const mbedtls_ecp_group_id * curve_list
Definition: ssl.h:1238
This file provides an API for Elliptic Curves over GF(P) (ECP).
void mbedtls_ssl_conf_cbc_record_splitting(mbedtls_ssl_config *conf, char split)
Enable / Disable 1/n-1 record splitting (Default: MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED) ...
int(* f_cookie_write)(void *, unsigned char **, unsigned char *, const unsigned char *, size_t)
Definition: ssl.h:1178
int(* f_export_keys)(void *, const unsigned char *, const unsigned char *, size_t, size_t, size_t)
Definition: ssl.h:1197
const mbedtls_ssl_srtp_profile * dtls_srtp_profile_list
Definition: ssl.h:1286
int mbedtls_ssl_export_keys_ext_t(void *p_expkey, const unsigned char *ms, const unsigned char *kb, size_t maclen, size_t keylen, size_t ivlen, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type)
Callback type: Export key block, master secret, handshake randbytes and the tls_prf function used to ...
Definition: ssl.h:2150
int(* f_get_cache)(void *, mbedtls_ssl_session *)
Definition: ssl.h:1153
Platform Security Architecture cryptography module.
uint8_t encrypt_then_mac
Definition: ssl.h:1074
unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]
Definition: ssl.h:527
void(* f_dbg)(void *, int, const char *, int, const char *)
Definition: ssl.h:1145
void * p_cache
Definition: ssl.h:1156
int(* f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t)
Definition: ssl.h:1160
void mbedtls_ssl_conf_verify(mbedtls_ssl_config *conf, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set the verification callback (Optional).
unsigned char _pms_rsa[48]
Definition: ssl.h:524
unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]
Definition: ssl.h:533
unsigned char renego_period[8]
Definition: ssl.h:1126
uint32_t ticket_lifetime
Definition: ssl.h:1029
int mbedtls_ssl_get_max_out_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum outgoing record payload in bytes. This takes into account the config...
void mbedtls_ssl_conf_renegotiation(mbedtls_ssl_config *conf, int renegotiation)
Enable / Disable renegotiation support for connection when initiated by peer (Default: MBEDTLS_SSL_RE...
mbedtls_ssl_session * session_in
Definition: ssl.h:1329
uint8_t disable_datagram_packing
Definition: ssl.h:1394
int mbedtls_ssl_conf_dh_param_bin(mbedtls_ssl_config *conf, const unsigned char *dhm_P, size_t P_len, const unsigned char *dhm_G, size_t G_len)
Set the Diffie-Hellman public P and G values from big-endian binary presentations. (Default values: MBEDTLS_DHM_RFC3526_MODP_2048_[PG]_BIN)
void mbedtls_ssl_conf_sni(mbedtls_ssl_config *conf, int(*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_sni)
Set server side ServerName TLS extension callback (optional, server-side only).
unsigned badmac_seen
Definition: ssl.h:1310
void mbedtls_ssl_conf_dtls_anti_replay(mbedtls_ssl_config *conf, char mode)
Enable or disable anti-replay protection for DTLS. (DTLS only, no effect on TLS.) Default: enabled...
mbedtls_ssl_get_timer_t * f_get_timer
Definition: ssl.h:1351
int(* mbedtls_x509_crt_ca_cb_t)(void *p_ctx, mbedtls_x509_crt const *child, mbedtls_x509_crt **candidate_cas)
The type of trusted certificate callbacks.
Definition: x509_crt.h:732
void mbedtls_ssl_conf_srtp_mki_value_supported(mbedtls_ssl_config *conf, int support_mki_value)
Manage support for mki(master key id) value in use_srtp extension. MKI is an optional part of SRTP us...
Configuration options (set of defines)
uint32_t psa_key_id_t
Definition: crypto_types.h:266
void mbedtls_ssl_conf_max_version(mbedtls_ssl_config *conf, int major, int minor)
Set the maximum supported version sent from the client side and/or accepted at the server side (Defau...
#define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH
Definition: ssl.h:956
uint32_t mbedtls_ssl_get_verify_result(const mbedtls_ssl_context *ssl)
Return the result of the certificate verification.
void mbedtls_ssl_conf_session_tickets_cb(mbedtls_ssl_config *conf, mbedtls_ssl_ticket_write_t *f_ticket_write, mbedtls_ssl_ticket_parse_t *f_ticket_parse, void *p_ticket)
Configure SSL session ticket callbacks (server only). (Default: none.)
mbedtls_x509_crl * ca_crl
Definition: ssl.h:1216
int mbedtls_ssl_check_pending(const mbedtls_ssl_context *ssl)
Check if there is data already read from the underlying transport but not yet processed.
mbedtls_ssl_session * session_out
Definition: ssl.h:1330
const mbedtls_x509_crt * mbedtls_ssl_get_peer_cert(const mbedtls_ssl_context *ssl)
Return the peer certificate from the current connection.
int mbedtls_ssl_session_save(const mbedtls_ssl_session *session, unsigned char *buf, size_t buf_len, size_t *olen)
Save session structure as serialized data in a buffer. On client, this can be used for saving session...
int mbedtls_ssl_send_alert_message(mbedtls_ssl_context *ssl, unsigned char level, unsigned char message)
Send an alert message.
int mbedtls_ssl_recv_timeout_t(void *ctx, unsigned char *buf, size_t len, uint32_t timeout)
Callback type: receive data from the network, with timeout.
Definition: ssl.h:664
uint16_t mtu
Definition: ssl.h:1422
SSL Ciphersuites for Mbed TLS.
int(* f_ticket_write)(void *, const mbedtls_ssl_session *, unsigned char *, const unsigned char *, size_t *, uint32_t *)
Definition: ssl.h:1188
mbedtls_ssl_transform * transform_out
Definition: ssl.h:1341
unsigned char mfl_code
Definition: ssl.h:1001
void mbedtls_ssl_conf_renegotiation_period(mbedtls_ssl_config *conf, const unsigned char period[8])
Set record counter threshold for periodic renegotiation. (Default: 2^48 - 1)
unsigned char _pms_dhe_psk[4+MBEDTLS_MPI_MAX_SIZE +MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:540
int(* f_set_cache)(void *, const mbedtls_ssl_session *)
Definition: ssl.h:1155
Multi-precision integer library.
int encrypt_then_mac
Definition: ssl.h:1037
size_t in_hslen
Definition: ssl.h:1386
int mbedtls_ssl_conf_psk(mbedtls_ssl_config *conf, const unsigned char *psk, size_t psk_len, const unsigned char *psk_identity, size_t psk_identity_len)
Configure a pre-shared key (PSK) and identity to be used in PSK-based ciphersuites.
int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code)
Set the maximum fragment length to emit and/or negotiate. (Typical: the smaller of MBEDTLS_SSL_IN_CON...
time_t mbedtls_time_t
Definition: platform_time.h:31
int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Try to write exactly 'len' application data bytes.
void mbedtls_ssl_conf_cert_req_ca_list(mbedtls_ssl_config *conf, char cert_req_ca_list)
Whether to send a list of acceptable CAs in CertificateRequest messages. (Default: do send) ...
void mbedtls_ssl_conf_min_version(mbedtls_ssl_config *conf, int major, int minor)
Set the minimum accepted SSL/TLS protocol version (Default: TLS 1.0)
int(* f_cookie_check)(void *, const unsigned char *, size_t, const unsigned char *, size_t)
Definition: ssl.h:1181
uint64_t in_window
Definition: ssl.h:1383
int mbedtls_ssl_close_notify(mbedtls_ssl_context *ssl)
Notify the peer that the connection is being closed.
struct mbedtls_ssl_flight_item mbedtls_ssl_flight_item
Definition: ssl.h:720
mbedtls_ssl_srtp_profile chosen_dtls_srtp_profile
Definition: ssl.h:978
void * p_cookie
Definition: ssl.h:1183
void mbedtls_ssl_conf_export_keys_ext_cb(mbedtls_ssl_config *conf, mbedtls_ssl_export_keys_ext_t *f_export_keys_ext, void *p_export_keys)
Configure extended key export callback. (Default: none.)
void mbedtls_ssl_conf_session_tickets(mbedtls_ssl_config *conf, int use_tickets)
Enable / Disable session tickets (client only). (Default: MBEDTLS_SSL_SESSION_TICKETS_ENABLED.)
int(* f_export_keys_ext)(void *, const unsigned char *, const unsigned char *, size_t, size_t, size_t, const unsigned char[32], const unsigned char[32], mbedtls_tls_prf_types)
Definition: ssl.h:1201
void mbedtls_ssl_conf_ciphersuites_for_version(mbedtls_ssl_config *conf, const int *ciphersuites, int major, int minor)
Set the list of allowed ciphersuites and the preference order for a specific version of the protocol...
mbedtls_ssl_transform * transform
Definition: ssl.h:1342
mbedtls_dtls_srtp_info dtls_srtp_info
Definition: ssl.h:1481
uint32_t hs_timeout_min
Definition: ssl.h:1118
mbedtls_ssl_handshake_params * handshake
Definition: ssl.h:1334
void mbedtls_ssl_free(mbedtls_ssl_context *ssl)
Free referenced items in an SSL context and clear memory.
void mbedtls_ssl_conf_export_keys_cb(mbedtls_ssl_config *conf, mbedtls_ssl_export_keys_t *f_export_keys, void *p_export_keys)
Configure key export callback. (Default: none.)
void mbedtls_ssl_conf_endpoint(mbedtls_ssl_config *conf, int endpoint)
Set the current endpoint type.
MBEDTLS_DEPRECATED size_t mbedtls_ssl_get_max_frag_len(const mbedtls_ssl_context *ssl)
This function is a deprecated approach to getting the max fragment length. Its an alias for mbedtls_s...
size_t mbedtls_ssl_get_input_max_frag_len(const mbedtls_ssl_context *ssl)
Return the maximum fragment length (payload, in bytes) for the input buffer. This is the negotiated m...
size_t out_left
Definition: ssl.h:1414
void mbedtls_ssl_session_free(mbedtls_ssl_session *session)
Free referenced items in an SSL session including the peer certificate and clear memory.
void mbedtls_ssl_conf_arc4_support(mbedtls_ssl_config *conf, char arc4)
Disable or enable support for RC4 (Default: MBEDTLS_SSL_ARC4_DISABLED)
unsigned char * in_msg
Definition: ssl.h:1367
void mbedtls_ssl_conf_sig_hashes(mbedtls_ssl_config *conf, const int *hashes)
Set the allowed hashes for signatures during the handshake. (Default: all SHA-2 hashes, largest first. Also SHA-1 if the compile-time option MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_KEY_EXCHANGE is enabled.)
unsigned char min_major_ver
Definition: ssl.h:1053
struct mbedtls_ssl_transform mbedtls_ssl_transform
Definition: ssl.h:713
mbedtls_ssl_set_timer_t * f_set_timer
Definition: ssl.h:1350
uint8_t anti_replay
Definition: ssl.h:1080
const char * mbedtls_ssl_get_alpn_protocol(const mbedtls_ssl_context *ssl)
Get the name of the negotiated Application Layer Protocol. This function should be called after the h...
uint8_t dtls_srtp_mki_support
Definition: ssl.h:1107
uint8_t endpoint
Definition: ssl.h:1062
const int * ciphersuite_list[4]
Definition: ssl.h:1142
int(* f_rng)(void *, unsigned char *, size_t)
Definition: ssl.h:1149
void mbedtls_ssl_conf_dhm_min_bitlen(mbedtls_ssl_config *conf, unsigned int bitlen)
Set the minimum length for Diffie-Hellman parameters. (Client-side only.) (Default: 1024 bits...
void mbedtls_ssl_conf_dtls_cookies(mbedtls_ssl_config *conf, mbedtls_ssl_cookie_write_t *f_cookie_write, mbedtls_ssl_cookie_check_t *f_cookie_check, void *p_cookie)
Register callbacks for DTLS cookies (Server only. DTLS only.)
mbedtls_ssl_key_cert * key_cert
Definition: ssl.h:1214
MBEDTLS_DEPRECATED int mbedtls_ssl_conf_dh_param(mbedtls_ssl_config *conf, const char *dhm_P, const char *dhm_G)
Set the Diffie-Hellman public P and G values, read as hexadecimal strings (server-side only) (Default...
mbedtls_ssl_recv_t * f_recv
Definition: ssl.h:1320
int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name)
Return the ID of the ciphersuite associated with the given name.
void mbedtls_ssl_conf_transport(mbedtls_ssl_config *conf, int transport)
Set the transport type (TLS or DTLS). Default: TLS.
void mbedtls_ssl_get_dtls_srtp_negotiation_result(const mbedtls_ssl_context *ssl, mbedtls_dtls_srtp_info *dtls_srtp_info)
Get the negotiated DTLS-SRTP information: Protection profile and MKI value.
mbedtls_ssl_session * session_negotiate
Definition: ssl.h:1332
mbedtls_ssl_states
Definition: ssl.h:563
const int * sig_hashes
Definition: ssl.h:1234
void mbedtls_ssl_conf_renegotiation_enforced(mbedtls_ssl_config *conf, int max_records)
Enforce renegotiation requests. (Default: enforced, max_records = 16)
void mbedtls_ssl_set_mtu(mbedtls_ssl_context *ssl, uint16_t mtu)
Set the Maximum Transport Unit (MTU). Special value: 0 means unset (no limit). This represents the ma...
#define MBEDTLS_DEPRECATED
Definition: ssl.h:3898
int mbedtls_ssl_set_client_transport_id(mbedtls_ssl_context *ssl, const unsigned char *info, size_t ilen)
Set client's transport-level identification info. (Server only. DTLS only.)
uint8_t cert_req_ca_list
Definition: ssl.h:1098
void mbedtls_ssl_set_bio(mbedtls_ssl_context *ssl, void *p_bio, mbedtls_ssl_send_t *f_send, mbedtls_ssl_recv_t *f_recv, mbedtls_ssl_recv_timeout_t *f_recv_timeout)
Set the underlying BIO callbacks for write, read and read-with-timeout.
size_t id_len
Definition: ssl.h:1009
void * p_bio
Definition: ssl.h:1324
int mbedtls_ssl_context_save(mbedtls_ssl_context *ssl, unsigned char *buf, size_t buf_len, size_t *olen)
Save an active connection as serialized data in a buffer. This allows the freeing or re-using of the ...
void mbedtls_ssl_conf_rng(mbedtls_ssl_config *conf, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Set the random number generator callback.
int mbedtls_ssl_conf_alpn_protocols(mbedtls_ssl_config *conf, const char **protos)
Set the supported Application Layer Protocols.
void mbedtls_ssl_conf_cert_profile(mbedtls_ssl_config *conf, const mbedtls_x509_crt_profile *profile)
Set the X.509 security profile used for verification.
uint8_t session_tickets
Definition: ssl.h:1092
void * p_vrfy
Definition: ssl.h:1167
const mbedtls_x509_crt_profile * cert_profile
Definition: ssl.h:1213
void * p_timer
Definition: ssl.h:1348
This file contains Diffie-Hellman-Merkle (DHM) key exchange definitions and functions.
X.509 certificate parsing and writing.
int mbedtls_ssl_context_load(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Load serialized connection data to an SSL context.
void mbedtls_ssl_conf_session_cache(mbedtls_ssl_config *conf, void *p_cache, int(*f_get_cache)(void *, mbedtls_ssl_session *), int(*f_set_cache)(void *, const mbedtls_ssl_session *))
Set the session cache callbacks (server-side only) If not set, no session resuming is done (except if...
#define MBEDTLS_PSK_MAX_LEN
Definition: ssl.h:517
void mbedtls_ssl_conf_truncated_hmac(mbedtls_ssl_config *conf, int truncate)
Activate negotiation of truncated HMAC (Default: MBEDTLS_SSL_TRUNC_HMAC_DISABLED) ...
mbedtls_ssl_session * session
Definition: ssl.h:1331
unsigned char * in_iv
Definition: ssl.h:1366
char own_verify_data[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN]
Definition: ssl.h:1500
void mbedtls_ssl_init(mbedtls_ssl_context *ssl)
Initialize an SSL context Just makes the context ready for mbedtls_ssl_setup() or mbedtls_ssl_free() ...
mbedtls_ssl_transform * transform_negotiate
Definition: ssl.h:1343
const char * mbedtls_ssl_get_ciphersuite(const mbedtls_ssl_context *ssl)
Return the name of the current ciphersuite.
mbedtls_ecp_group_id
Definition: ecp.h:113
unsigned char * out_ctr
Definition: ssl.h:1402
int secure_renegotiation
Definition: ssl.h:1496
int mbedtls_ssl_get_timer_t(void *ctx)
Callback type: get status of timers/delays.
Definition: ssl.h:705
The DHM context structure.
Definition: dhm.h:99
const mbedtls_ssl_config * conf
Definition: ssl.h:1293
void mbedtls_ssl_conf_dbg(mbedtls_ssl_config *conf, void(*f_dbg)(void *, int, const char *, int, const char *), void *p_dbg)
Set the debug callback.
int(* f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t)
Definition: ssl.h:1172
unsigned char * in_offt
Definition: ssl.h:1368
unsigned char max_major_ver
Definition: ssl.h:1051
unsigned char * psk
Definition: ssl.h:1257
void mbedtls_ssl_config_init(mbedtls_ssl_config *conf)
Initialize an SSL configuration context Just makes the context ready for mbedtls_ssl_config_defaults(...
int mbedtls_ssl_get_record_expansion(const mbedtls_ssl_context *ssl)
Return the (maximum) number of bytes added by the record layer: header + encryption/MAC overhead (inc...
const char * alpn_chosen
Definition: ssl.h:1474
This file contains ECDH definitions and functions.
int mbedtls_ssl_conf_dh_param_ctx(mbedtls_ssl_config *conf, mbedtls_dhm_context *dhm_ctx)
Set the Diffie-Hellman public P and G values, read from existing context (server-side only) ...
mbedtls_mpi dhm_G
Definition: ssl.h:1243
int mbedtls_ssl_set_session(mbedtls_ssl_context *ssl, const mbedtls_ssl_session *session)
Request resumption of session (client-side only) Session data is copied from presented session struct...
#define MBEDTLS_MPI_MAX_SIZE
Definition: bignum.h:76
void * p_export_keys
Definition: ssl.h:1205
char * hostname
Definition: ssl.h:1470
void mbedtls_ssl_set_datagram_packing(mbedtls_ssl_context *ssl, unsigned allow_packing)
Allow or disallow packing of multiple handshake records within a single datagram. ...
int mbedtls_ssl_set_hs_own_cert(mbedtls_ssl_context *ssl, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate and key for the current handshake.
int mbedtls_ssl_conf_own_cert(mbedtls_ssl_config *conf, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate chain and private key.
uint8_t arc4_disabled
Definition: ssl.h:1068
static const char * mbedtls_ssl_get_srtp_profile_as_string(mbedtls_ssl_srtp_profile profile)
Definition: ssl.h:3339
int mbedtls_ssl_setup(mbedtls_ssl_context *ssl, const mbedtls_ssl_config *conf)
Set up an SSL context for use.
size_t out_msglen
Definition: ssl.h:1413
uint32_t read_timeout
Definition: ssl.h:1115
void mbedtls_ssl_conf_legacy_renegotiation(mbedtls_ssl_config *conf, int allow_legacy)
Prevent or allow legacy renegotiation. (Default: MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION) ...
size_t mbedtls_ssl_get_output_max_frag_len(const mbedtls_ssl_context *ssl)
Return the maximum fragment length (payload, in bytes) for the output buffer. For the client...
unsigned char _pms_rsa_psk[52+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:543
uint8_t trunc_hmac
Definition: ssl.h:1089
int mbedtls_ssl_renegotiate(mbedtls_ssl_context *ssl)
Initiate an SSL renegotiation on the running connection. Client: perform the renegotiation right now...
int(* f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *)
Definition: ssl.h:1315
int(* f_ticket_parse)(void *, mbedtls_ssl_session *, unsigned char *, size_t)
Definition: ssl.h:1191
#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32
Definition: ssl.h:968
int mbedtls_ssl_export_keys_t(void *p_expkey, const unsigned char *ms, const unsigned char *kb, size_t maclen, size_t keylen, size_t ivlen)
Callback type: Export key block and master secret.
Definition: ssl.h:2118
unsigned char * out_len
Definition: ssl.h:1408
void * p_vrfy
Definition: ssl.h:1316
int(* f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *)
Definition: ssl.h:1166
uint32_t hs_timeout_max
Definition: ssl.h:1120
MPI structure.
Definition: bignum.h:196
X.509 certificate revocation list parsing.
unsigned char * cli_id
Definition: ssl.h:1488
int renego_max_records
Definition: ssl.h:1125
unsigned char mki_value[MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH]
Definition: ssl.h:982
mbedtls_ssl_recv_timeout_t * f_recv_timeout
Definition: ssl.h:1321
mbedtls_x509_crt * ca_chain
Definition: ssl.h:1215
void mbedtls_ssl_conf_read_timeout(mbedtls_ssl_config *conf, uint32_t timeout)
Set the timeout period for mbedtls_ssl_read() (Default: no timeout.)
size_t verify_data_len
Definition: ssl.h:1499
void mbedtls_ssl_config_free(mbedtls_ssl_config *conf)
Free an SSL configuration context.
unsigned char * psk_identity
Definition: ssl.h:1267
int mbedtls_ssl_conf_dtls_srtp_protection_profiles(mbedtls_ssl_config *conf, const mbedtls_ssl_srtp_profile *profiles)
Set the supported DTLS-SRTP protection profiles.
#define MBEDTLS_SSL_CID_OUT_LEN_MAX
Definition: ssl.h:368
int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len)
Read at most 'len' application data bytes.
unsigned char dummy
Definition: ssl.h:522
struct mbedtls_ssl_key_cert mbedtls_ssl_key_cert
Definition: ssl.h:717
uint8_t cbc_record_splitting
Definition: ssl.h:1083
void mbedtls_ssl_set_timer_t(void *ctx, uint32_t int_ms, uint32_t fin_ms)
Callback type: set a pair of timers/delays to watch.
Definition: ssl.h:690
size_t mbedtls_ssl_get_bytes_avail(const mbedtls_ssl_context *ssl)
Return the number of application data bytes remaining to be read from the current record...
#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80
Definition: ssl.h:967
size_t next_record_offset
Definition: ssl.h:1378
unsigned char * out_buf
Definition: ssl.h:1401
#define MBEDTLS_SSL_CID_IN_LEN_MAX
Definition: ssl.h:364
size_t psk_len
Definition: ssl.h:1261
void mbedtls_ssl_session_init(mbedtls_ssl_session *session)
Initialize SSL session structure.
struct mbedtls_dtls_srtp_info_t mbedtls_dtls_srtp_info
void * p_dbg
Definition: ssl.h:1146
int mbedtls_ssl_ticket_write_t(void *p_ticket, const mbedtls_ssl_session *session, unsigned char *start, const unsigned char *end, size_t *tlen, uint32_t *lifetime)
Callback type: generate and write session ticket.
Definition: ssl.h:2090
size_t cli_id_len
Definition: ssl.h:1489
void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max)
Set retransmit timeout values for the DTLS handshake. (DTLS only, no effect on TLS.)
Mbed TLS Platform time abstraction.
int mbedtls_ssl_config_defaults(mbedtls_ssl_config *conf, int endpoint, int transport, int preset)
Load reasonable default SSL configuration values. (You need to call mbedtls_ssl_config_init() first...
void mbedtls_ssl_conf_ca_chain(mbedtls_ssl_config *conf, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate.
void mbedtls_ssl_conf_curves(mbedtls_ssl_config *conf, const mbedtls_ecp_group_id *curves)
Set the allowed curves in order of preference. (Default: all defined curves in order of decreasing si...
int renego_records_seen
Definition: ssl.h:1301
uint8_t mfl_code
Definition: ssl.h:1071
unsigned char * out_hdr
Definition: ssl.h:1403
void mbedtls_ssl_conf_dtls_badmac_limit(mbedtls_ssl_config *conf, unsigned limit)
Set a limit on the number of records with a bad MAC before terminating the connection. (DTLS only, no effect on TLS.) Default: 0 (disabled).
unsigned char _pms_psk[4+2 *MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:536
uint32_t verify_result
Definition: ssl.h:1024
int mbedtls_ssl_handshake(mbedtls_ssl_context *ssl)
Perform the SSL handshake.
void mbedtls_ssl_set_hs_authmode(mbedtls_ssl_context *ssl, int authmode)
Set authmode for the current handshake.
mbedtls_md_type_t
Supported message digests.
Definition: md.h:50
int keep_current_message
Definition: ssl.h:1390
signed char split_done
Definition: ssl.h:1429
int mbedtls_ssl_handshake_step(mbedtls_ssl_context *ssl)
Perform a single step of the SSL handshake.
unsigned char cur_out_ctr[8]
Definition: ssl.h:1419
const char * mbedtls_ssl_get_version(const mbedtls_ssl_context *ssl)
Return the current SSL version (SSLv3/TLSv1/etc)
void mbedtls_ssl_conf_authmode(mbedtls_ssl_config *conf, int authmode)
Set the certificate verification mode Default: NONE on server, REQUIRED on client.
int mbedtls_ssl_session_reset(mbedtls_ssl_context *ssl)
Reset an already initialized SSL context for re-use while retaining application-set variables...
int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname)
Set or reset the hostname to check against the received peer certificate. On a client, this also sets the ServerName TLS extension, if that extension is enabled. On a TLS 1.3 client, this also sets the server name in the session resumption ticket, if that feature is enabled.
struct mbedtls_ssl_handshake_params mbedtls_ssl_handshake_params
Definition: ssl.h:714
#define MBEDTLS_ECP_MAX_BYTES
Definition: ecp.h:324
int mbedtls_ssl_session_load(mbedtls_ssl_session *session, const unsigned char *buf, size_t len)
Load serialized session data into a session structure. On client, this can be used for loading saved ...
int mbedtls_ssl_set_hs_psk(mbedtls_ssl_context *ssl, const unsigned char *psk, size_t psk_len)
Set the pre-shared Key (PSK) for the current handshake.
int mbedtls_ssl_get_session(const mbedtls_ssl_context *ssl, mbedtls_ssl_session *session)
Save session in order to resume it later (client-side only) Session data is copied to presented sessi...
void * p_ticket
Definition: ssl.h:1192
void mbedtls_ssl_conf_ciphersuites(mbedtls_ssl_config *conf, const int *ciphersuites)
Set the list of allowed ciphersuites and the preference order. First in the list has the highest pref...
#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN
Definition: ssl.h:387
const mbedtls_ssl_session * mbedtls_ssl_get_session_pointer(const mbedtls_ssl_context *ssl)
Get a pointer to the current session structure, for example to serialize it.
mbedtls_time_t start
Definition: ssl.h:1005
void mbedtls_ssl_conf_psk_cb(mbedtls_ssl_config *conf, int(*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_psk)
Set the PSK callback (server-side only).
size_t in_msglen
Definition: ssl.h:1371
size_t dtls_srtp_profile_list_len
Definition: ssl.h:1288
uint16_t in_epoch
Definition: ssl.h:1377
mbedtls_tls_prf_types
Definition: ssl.h:589
int mbedtls_ssl_check_record(mbedtls_ssl_context const *ssl, unsigned char *buf, size_t buflen)
Check whether a buffer contains a valid and authentic record that has not been seen before...