22 #if defined(MBEDTLS_X509_CRT_PARSE_C)
27 #if defined(MBEDTLS_DHM_C)
33 #if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_ANY_ENABLED)
37 #if defined(MBEDTLS_HAVE_TIME)
47 #define MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS -0x7000
49 #define MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE -0x7080
51 #define MBEDTLS_ERR_SSL_BAD_INPUT_DATA -0x7100
53 #define MBEDTLS_ERR_SSL_INVALID_MAC -0x7180
55 #define MBEDTLS_ERR_SSL_INVALID_RECORD -0x7200
57 #define MBEDTLS_ERR_SSL_CONN_EOF -0x7280
59 #define MBEDTLS_ERR_SSL_DECODE_ERROR -0x7300
62 #define MBEDTLS_ERR_SSL_NO_RNG -0x7400
64 #define MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE -0x7480
66 #define MBEDTLS_ERR_SSL_UNSUPPORTED_EXTENSION -0x7500
68 #define MBEDTLS_ERR_SSL_NO_APPLICATION_PROTOCOL -0x7580
70 #define MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED -0x7600
72 #define MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED -0x7680
74 #define MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE -0x7700
76 #define MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE -0x7780
78 #define MBEDTLS_ERR_SSL_UNRECOGNIZED_NAME -0x7800
80 #define MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY -0x7880
84 #define MBEDTLS_ERR_SSL_BAD_CERTIFICATE -0x7A00
87 #define MBEDTLS_ERR_SSL_RECEIVED_NEW_SESSION_TICKET -0x7B00
89 #define MBEDTLS_ERR_SSL_CANNOT_READ_EARLY_DATA -0x7B80
99 #define MBEDTLS_ERR_SSL_RECEIVED_EARLY_DATA -0x7C00
101 #define MBEDTLS_ERR_SSL_CANNOT_WRITE_EARLY_DATA -0x7C80
107 #define MBEDTLS_ERR_SSL_CACHE_ENTRY_NOT_FOUND -0x7E80
109 #define MBEDTLS_ERR_SSL_ALLOC_FAILED -0x7F00
111 #define MBEDTLS_ERR_SSL_HW_ACCEL_FAILED -0x7F80
113 #define MBEDTLS_ERR_SSL_HW_ACCEL_FALLTHROUGH -0x6F80
115 #define MBEDTLS_ERR_SSL_BAD_PROTOCOL_VERSION -0x6E80
117 #define MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE -0x6E00
119 #define MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED -0x6D80
121 #define MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH -0x6D00
123 #define MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY -0x6C80
125 #define MBEDTLS_ERR_SSL_INTERNAL_ERROR -0x6C00
127 #define MBEDTLS_ERR_SSL_COUNTER_WRAPPING -0x6B80
129 #define MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO -0x6B00
131 #define MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED -0x6A80
133 #define MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL -0x6A00
136 #define MBEDTLS_ERR_SSL_WANT_READ -0x6900
138 #define MBEDTLS_ERR_SSL_WANT_WRITE -0x6880
140 #define MBEDTLS_ERR_SSL_TIMEOUT -0x6800
142 #define MBEDTLS_ERR_SSL_CLIENT_RECONNECT -0x6780
144 #define MBEDTLS_ERR_SSL_UNEXPECTED_RECORD -0x6700
146 #define MBEDTLS_ERR_SSL_NON_FATAL -0x6680
148 #define MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER -0x6600
150 #define MBEDTLS_ERR_SSL_CONTINUE_PROCESSING -0x6580
152 #define MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS -0x6500
154 #define MBEDTLS_ERR_SSL_EARLY_MESSAGE -0x6480
164 #define MBEDTLS_ERR_SSL_UNEXPECTED_CID -0x6000
166 #define MBEDTLS_ERR_SSL_VERSION_MISMATCH -0x5F00
168 #define MBEDTLS_ERR_SSL_BAD_CONFIG -0x5E80
204 #define MBEDTLS_ERR_SSL_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME -0x5D80
212 #define MBEDTLS_SSL_TLS1_3_PSK_MODE_PURE 0
213 #define MBEDTLS_SSL_TLS1_3_PSK_MODE_ECDHE 1
235 #define MBEDTLS_SSL_IANA_TLS_GROUP_NONE 0
236 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP192K1 0x0012
237 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP192R1 0x0013
238 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP224K1 0x0014
239 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP224R1 0x0015
240 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP256K1 0x0016
241 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP256R1 0x0017
242 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP384R1 0x0018
243 #define MBEDTLS_SSL_IANA_TLS_GROUP_SECP521R1 0x0019
244 #define MBEDTLS_SSL_IANA_TLS_GROUP_BP256R1 0x001A
245 #define MBEDTLS_SSL_IANA_TLS_GROUP_BP384R1 0x001B
246 #define MBEDTLS_SSL_IANA_TLS_GROUP_BP512R1 0x001C
247 #define MBEDTLS_SSL_IANA_TLS_GROUP_X25519 0x001D
248 #define MBEDTLS_SSL_IANA_TLS_GROUP_X448 0x001E
250 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE2048 0x0100
251 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE3072 0x0101
252 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE4096 0x0102
253 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE6144 0x0103
254 #define MBEDTLS_SSL_IANA_TLS_GROUP_FFDHE8192 0x0104
263 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK (1u << 0)
266 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL (1u << 1)
269 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL (1u << 2)
274 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_ALL \
275 (MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK | \
276 MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL | \
277 MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL)
278 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_ALL \
279 (MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK | \
280 MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL)
281 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ALL \
282 (MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL | \
283 MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL)
285 #define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_NONE (0)
291 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
296 #define MBEDTLS_SSL_MAJOR_VERSION_3 3
297 #define MBEDTLS_SSL_MINOR_VERSION_3 3
298 #define MBEDTLS_SSL_MINOR_VERSION_4 4
301 #define MBEDTLS_SSL_TRANSPORT_STREAM 0
302 #define MBEDTLS_SSL_TRANSPORT_DATAGRAM 1
304 #define MBEDTLS_SSL_MAX_HOST_NAME_LEN 255
305 #define MBEDTLS_SSL_MAX_ALPN_NAME_LEN 255
307 #define MBEDTLS_SSL_MAX_ALPN_LIST_LEN 65535
311 #define MBEDTLS_SSL_MAX_FRAG_LEN_NONE 0
312 #define MBEDTLS_SSL_MAX_FRAG_LEN_512 1
313 #define MBEDTLS_SSL_MAX_FRAG_LEN_1024 2
314 #define MBEDTLS_SSL_MAX_FRAG_LEN_2048 3
315 #define MBEDTLS_SSL_MAX_FRAG_LEN_4096 4
316 #define MBEDTLS_SSL_MAX_FRAG_LEN_INVALID 5
318 #define MBEDTLS_SSL_IS_CLIENT 0
319 #define MBEDTLS_SSL_IS_SERVER 1
321 #define MBEDTLS_SSL_EXTENDED_MS_DISABLED 0
322 #define MBEDTLS_SSL_EXTENDED_MS_ENABLED 1
324 #define MBEDTLS_SSL_CID_DISABLED 0
325 #define MBEDTLS_SSL_CID_ENABLED 1
327 #define MBEDTLS_SSL_ETM_DISABLED 0
328 #define MBEDTLS_SSL_ETM_ENABLED 1
330 #define MBEDTLS_SSL_COMPRESS_NULL 0
332 #define MBEDTLS_SSL_VERIFY_NONE 0
333 #define MBEDTLS_SSL_VERIFY_OPTIONAL 1
334 #define MBEDTLS_SSL_VERIFY_REQUIRED 2
335 #define MBEDTLS_SSL_VERIFY_UNSET 3
337 #define MBEDTLS_SSL_LEGACY_RENEGOTIATION 0
338 #define MBEDTLS_SSL_SECURE_RENEGOTIATION 1
340 #define MBEDTLS_SSL_RENEGOTIATION_DISABLED 0
341 #define MBEDTLS_SSL_RENEGOTIATION_ENABLED 1
343 #define MBEDTLS_SSL_ANTI_REPLAY_DISABLED 0
344 #define MBEDTLS_SSL_ANTI_REPLAY_ENABLED 1
346 #define MBEDTLS_SSL_RENEGOTIATION_NOT_ENFORCED -1
347 #define MBEDTLS_SSL_RENEGO_MAX_RECORDS_DEFAULT 16
349 #define MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION 0
350 #define MBEDTLS_SSL_LEGACY_ALLOW_RENEGOTIATION 1
351 #define MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE 2
353 #define MBEDTLS_SSL_TRUNC_HMAC_DISABLED 0
354 #define MBEDTLS_SSL_TRUNC_HMAC_ENABLED 1
355 #define MBEDTLS_SSL_TRUNCATED_HMAC_LEN 10
357 #define MBEDTLS_SSL_SESSION_TICKETS_DISABLED 0
358 #define MBEDTLS_SSL_SESSION_TICKETS_ENABLED 1
360 #define MBEDTLS_SSL_TLS1_3_SIGNAL_NEW_SESSION_TICKETS_DISABLED 0
361 #define MBEDTLS_SSL_TLS1_3_SIGNAL_NEW_SESSION_TICKETS_ENABLED 1
363 #define MBEDTLS_SSL_PRESET_DEFAULT 0
364 #define MBEDTLS_SSL_PRESET_SUITEB 2
366 #define MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED 1
367 #define MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED 0
369 #define MBEDTLS_SSL_EARLY_DATA_DISABLED 0
370 #define MBEDTLS_SSL_EARLY_DATA_ENABLED 1
372 #define MBEDTLS_SSL_DTLS_SRTP_MKI_UNSUPPORTED 0
373 #define MBEDTLS_SSL_DTLS_SRTP_MKI_SUPPORTED 1
375 #define MBEDTLS_SSL_SRV_CIPHERSUITE_ORDER_CLIENT 1
376 #define MBEDTLS_SSL_SRV_CIPHERSUITE_ORDER_SERVER 0
378 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS)
379 #if defined(PSA_WANT_ALG_SHA_384)
380 #define MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN 48
381 #elif defined(PSA_WANT_ALG_SHA_256)
382 #define MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN 32
389 #define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MIN 1000
390 #define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MAX 60000
408 #define MBEDTLS_SSL_EARLY_DATA_NO_DISCARD 0
409 #define MBEDTLS_SSL_EARLY_DATA_TRY_TO_DEPROTECT_AND_DISCARD 1
410 #define MBEDTLS_SSL_EARLY_DATA_DISCARD 2
431 #if !defined(MBEDTLS_SSL_IN_CONTENT_LEN)
432 #define MBEDTLS_SSL_IN_CONTENT_LEN 16384
435 #if !defined(MBEDTLS_SSL_OUT_CONTENT_LEN)
436 #define MBEDTLS_SSL_OUT_CONTENT_LEN 16384
443 #if !defined(MBEDTLS_SSL_DTLS_MAX_BUFFERING)
444 #define MBEDTLS_SSL_DTLS_MAX_BUFFERING 32768
450 #if !defined(MBEDTLS_SSL_CID_IN_LEN_MAX)
451 #define MBEDTLS_SSL_CID_IN_LEN_MAX 32
454 #if !defined(MBEDTLS_SSL_CID_OUT_LEN_MAX)
455 #define MBEDTLS_SSL_CID_OUT_LEN_MAX 32
458 #if !defined(MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY)
459 #define MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY 16
462 #if !defined(MBEDTLS_SSL_MAX_EARLY_DATA_SIZE)
463 #define MBEDTLS_SSL_MAX_EARLY_DATA_SIZE 1024
466 #if !defined(MBEDTLS_SSL_TLS1_3_TICKET_AGE_TOLERANCE)
467 #define MBEDTLS_SSL_TLS1_3_TICKET_AGE_TOLERANCE 6000
470 #if !defined(MBEDTLS_SSL_TLS1_3_TICKET_NONCE_LENGTH)
471 #define MBEDTLS_SSL_TLS1_3_TICKET_NONCE_LENGTH 32
474 #if !defined(MBEDTLS_SSL_TLS1_3_DEFAULT_NEW_SESSION_TICKETS)
475 #define MBEDTLS_SSL_TLS1_3_DEFAULT_NEW_SESSION_TICKETS 1
483 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID) && \
484 !defined(MBEDTLS_SSL_DTLS_CONNECTION_ID_COMPAT)
485 #define MBEDTLS_SSL_DTLS_CONNECTION_ID_COMPAT 0
491 #define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 12
496 #define MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO 0xFF
502 #define MBEDTLS_SSL_HASH_NONE 0
503 #define MBEDTLS_SSL_HASH_MD5 1
504 #define MBEDTLS_SSL_HASH_SHA1 2
505 #define MBEDTLS_SSL_HASH_SHA224 3
506 #define MBEDTLS_SSL_HASH_SHA256 4
507 #define MBEDTLS_SSL_HASH_SHA384 5
508 #define MBEDTLS_SSL_HASH_SHA512 6
510 #define MBEDTLS_SSL_SIG_ANON 0
511 #define MBEDTLS_SSL_SIG_RSA 1
512 #define MBEDTLS_SSL_SIG_ECDSA 3
520 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA256 0x0401
521 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA384 0x0501
522 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA512 0x0601
525 #define MBEDTLS_TLS1_3_SIG_ECDSA_SECP256R1_SHA256 0x0403
526 #define MBEDTLS_TLS1_3_SIG_ECDSA_SECP384R1_SHA384 0x0503
527 #define MBEDTLS_TLS1_3_SIG_ECDSA_SECP521R1_SHA512 0x0603
530 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA256 0x0804
531 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA384 0x0805
532 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_RSAE_SHA512 0x0806
535 #define MBEDTLS_TLS1_3_SIG_ED25519 0x0807
536 #define MBEDTLS_TLS1_3_SIG_ED448 0x0808
539 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA256 0x0809
540 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA384 0x080A
541 #define MBEDTLS_TLS1_3_SIG_RSA_PSS_PSS_SHA512 0x080B
544 #define MBEDTLS_TLS1_3_SIG_RSA_PKCS1_SHA1 0x0201
545 #define MBEDTLS_TLS1_3_SIG_ECDSA_SHA1 0x0203
547 #define MBEDTLS_TLS1_3_SIG_NONE 0x0
553 #define MBEDTLS_SSL_CERT_TYPE_RSA_SIGN 1
554 #define MBEDTLS_SSL_CERT_TYPE_ECDSA_SIGN 64
559 #define MBEDTLS_SSL_MSG_CHANGE_CIPHER_SPEC 20
560 #define MBEDTLS_SSL_MSG_ALERT 21
561 #define MBEDTLS_SSL_MSG_HANDSHAKE 22
562 #define MBEDTLS_SSL_MSG_APPLICATION_DATA 23
563 #define MBEDTLS_SSL_MSG_CID 25
565 #define MBEDTLS_SSL_ALERT_LEVEL_WARNING 1
566 #define MBEDTLS_SSL_ALERT_LEVEL_FATAL 2
568 #define MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY 0
569 #define MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE 10
570 #define MBEDTLS_SSL_ALERT_MSG_BAD_RECORD_MAC 20
571 #define MBEDTLS_SSL_ALERT_MSG_DECRYPTION_FAILED 21
572 #define MBEDTLS_SSL_ALERT_MSG_RECORD_OVERFLOW 22
573 #define MBEDTLS_SSL_ALERT_MSG_DECOMPRESSION_FAILURE 30
574 #define MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE 40
575 #define MBEDTLS_SSL_ALERT_MSG_NO_CERT 41
576 #define MBEDTLS_SSL_ALERT_MSG_BAD_CERT 42
577 #define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT 43
578 #define MBEDTLS_SSL_ALERT_MSG_CERT_REVOKED 44
579 #define MBEDTLS_SSL_ALERT_MSG_CERT_EXPIRED 45
580 #define MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN 46
581 #define MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER 47
582 #define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA 48
583 #define MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED 49
584 #define MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR 50
585 #define MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR 51
586 #define MBEDTLS_SSL_ALERT_MSG_EXPORT_RESTRICTION 60
587 #define MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION 70
588 #define MBEDTLS_SSL_ALERT_MSG_INSUFFICIENT_SECURITY 71
589 #define MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR 80
590 #define MBEDTLS_SSL_ALERT_MSG_INAPROPRIATE_FALLBACK 86
591 #define MBEDTLS_SSL_ALERT_MSG_USER_CANCELED 90
592 #define MBEDTLS_SSL_ALERT_MSG_NO_RENEGOTIATION 100
593 #define MBEDTLS_SSL_ALERT_MSG_MISSING_EXTENSION 109
594 #define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT 110
595 #define MBEDTLS_SSL_ALERT_MSG_UNRECOGNIZED_NAME 112
596 #define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_PSK_IDENTITY 115
597 #define MBEDTLS_SSL_ALERT_MSG_CERT_REQUIRED 116
598 #define MBEDTLS_SSL_ALERT_MSG_NO_APPLICATION_PROTOCOL 120
600 #define MBEDTLS_SSL_HS_HELLO_REQUEST 0
601 #define MBEDTLS_SSL_HS_CLIENT_HELLO 1
602 #define MBEDTLS_SSL_HS_SERVER_HELLO 2
603 #define MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST 3
604 #define MBEDTLS_SSL_HS_NEW_SESSION_TICKET 4
605 #define MBEDTLS_SSL_HS_END_OF_EARLY_DATA 5
606 #define MBEDTLS_SSL_HS_ENCRYPTED_EXTENSIONS 8
607 #define MBEDTLS_SSL_HS_CERTIFICATE 11
608 #define MBEDTLS_SSL_HS_SERVER_KEY_EXCHANGE 12
609 #define MBEDTLS_SSL_HS_CERTIFICATE_REQUEST 13
610 #define MBEDTLS_SSL_HS_SERVER_HELLO_DONE 14
611 #define MBEDTLS_SSL_HS_CERTIFICATE_VERIFY 15
612 #define MBEDTLS_SSL_HS_CLIENT_KEY_EXCHANGE 16
613 #define MBEDTLS_SSL_HS_FINISHED 20
614 #define MBEDTLS_SSL_HS_MESSAGE_HASH 254
619 #define MBEDTLS_TLS_EXT_SERVERNAME 0
620 #define MBEDTLS_TLS_EXT_SERVERNAME_HOSTNAME 0
622 #define MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH 1
624 #define MBEDTLS_TLS_EXT_TRUNCATED_HMAC 4
625 #define MBEDTLS_TLS_EXT_STATUS_REQUEST 5
627 #define MBEDTLS_TLS_EXT_SUPPORTED_ELLIPTIC_CURVES 10
628 #define MBEDTLS_TLS_EXT_SUPPORTED_GROUPS 10
629 #define MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS 11
631 #define MBEDTLS_TLS_EXT_SIG_ALG 13
632 #define MBEDTLS_TLS_EXT_USE_SRTP 14
633 #define MBEDTLS_TLS_EXT_HEARTBEAT 15
634 #define MBEDTLS_TLS_EXT_ALPN 16
636 #define MBEDTLS_TLS_EXT_SCT 18
637 #define MBEDTLS_TLS_EXT_CLI_CERT_TYPE 19
638 #define MBEDTLS_TLS_EXT_SERV_CERT_TYPE 20
639 #define MBEDTLS_TLS_EXT_PADDING 21
640 #define MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC 22
641 #define MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET 0x0017
643 #define MBEDTLS_TLS_EXT_RECORD_SIZE_LIMIT 28
645 #define MBEDTLS_TLS_EXT_SESSION_TICKET 35
647 #define MBEDTLS_TLS_EXT_PRE_SHARED_KEY 41
648 #define MBEDTLS_TLS_EXT_EARLY_DATA 42
649 #define MBEDTLS_TLS_EXT_SUPPORTED_VERSIONS 43
650 #define MBEDTLS_TLS_EXT_COOKIE 44
651 #define MBEDTLS_TLS_EXT_PSK_KEY_EXCHANGE_MODES 45
653 #define MBEDTLS_TLS_EXT_CERT_AUTH 47
654 #define MBEDTLS_TLS_EXT_OID_FILTERS 48
655 #define MBEDTLS_TLS_EXT_POST_HANDSHAKE_AUTH 49
656 #define MBEDTLS_TLS_EXT_SIG_ALG_CERT 50
657 #define MBEDTLS_TLS_EXT_KEY_SHARE 51
659 #if MBEDTLS_SSL_DTLS_CONNECTION_ID_COMPAT == 0
660 #define MBEDTLS_TLS_EXT_CID 54
662 #define MBEDTLS_TLS_EXT_CID 254
665 #define MBEDTLS_TLS_EXT_ECJPAKE_KKPP 256
667 #define MBEDTLS_TLS_EXT_RENEGOTIATION_INFO 0xFF01
672 #if !defined(MBEDTLS_PSK_MAX_LEN)
680 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && \
681 defined(MBEDTLS_SSL_SESSION_TICKETS) && \
682 defined(MBEDTLS_SSL_HAVE_AES) && defined(MBEDTLS_SSL_HAVE_GCM) && \
683 defined(MBEDTLS_MD_CAN_SHA384)
684 #define MBEDTLS_PSK_MAX_LEN 48
686 #define MBEDTLS_PSK_MAX_LEN 32
693 #if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)
696 #if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)
699 #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
700 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
701 defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
702 defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
705 #if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
708 #if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
712 #if defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)
715 #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
719 #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
720 unsigned char _pms_ecjpake[32];
724 #define MBEDTLS_PREMASTER_SIZE sizeof(union mbedtls_ssl_premaster_secret)
726 #define MBEDTLS_TLS1_3_MD_MAX_SIZE PSA_HASH_MAX_SIZE
730 #define MBEDTLS_SSL_SEQUENCE_NUMBER_LEN 8
735 #if defined(MBEDTLS_SSL_CONTEXT_SERIALIZATION) || \
736 (defined(MBEDTLS_SSL_KEYING_MATERIAL_EXPORT) && defined(MBEDTLS_SSL_PROTO_TLS1_2))
737 #define MBEDTLS_SSL_KEEP_RANDBYTES
785 #if defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_CLI_C)
790 MBEDTLS_SSL_EARLY_DATA_STATUS_NOT_INDICATED,
791 MBEDTLS_SSL_EARLY_DATA_STATUS_ACCEPTED,
792 MBEDTLS_SSL_EARLY_DATA_STATUS_REJECTED,
793 } mbedtls_ssl_early_data_status;
814 const unsigned char *buf,
915 #if defined(MBEDTLS_X509_CRT_PARSE_C)
918 #if defined(MBEDTLS_SSL_PROTO_DTLS)
922 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS)
923 #define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_RESUMPTION \
924 MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK
925 #define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_EPHEMERAL_RESUMPTION \
926 MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL
927 #define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA (1U << 3)
929 #define MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK \
930 (MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_RESUMPTION | \
931 MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_EPHEMERAL_RESUMPTION | \
932 MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA)
959 unsigned char const *session_id,
960 size_t session_id_len,
981 unsigned char const *session_id,
982 size_t session_id_len,
985 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
986 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1061 const unsigned char *hash,
1126 const unsigned char *input,
1173 unsigned char *output,
1175 size_t output_size);
1197 #if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
1198 !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
1199 #define MBEDTLS_SSL_PEER_CERT_DIGEST_MAX_LEN 48
1200 #if defined(MBEDTLS_MD_CAN_SHA256)
1201 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA256
1202 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 32
1203 #elif defined(MBEDTLS_MD_CAN_SHA384)
1204 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA384
1205 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 48
1206 #elif defined(MBEDTLS_MD_CAN_SHA1)
1207 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA1
1208 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 20
1211 #error "Bad configuration - need SHA-1, SHA-256 or SHA-512 enabled to compute digest of peer CRT."
1223 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1225 #define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH 255
1226 #define MBEDTLS_TLS_SRTP_MAX_PROFILE_LIST_LENGTH 4
1236 #define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80 ((uint16_t) 0x0001)
1237 #define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32 ((uint16_t) 0x0002)
1238 #define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80 ((uint16_t) 0x0005)
1239 #define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32 ((uint16_t) 0x0006)
1241 #define MBEDTLS_TLS_SRTP_UNSET ((uint16_t) 0x0000)
1276 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1281 #if defined(MBEDTLS_SSL_RECORD_SIZE_LIMIT)
1293 #if defined(MBEDTLS_HAVE_TIME)
1301 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1302 #if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
1314 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
1320 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C) && \
1321 defined(MBEDTLS_HAVE_TIME)
1341 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS)
1347 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION) && defined(MBEDTLS_SSL_CLI_C)
1351 #if defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_ALPN) && defined(MBEDTLS_SSL_SRV_C)
1356 #if defined(MBEDTLS_HAVE_TIME) && defined(MBEDTLS_SSL_CLI_C)
1362 #if defined(MBEDTLS_SSL_EARLY_DATA)
1366 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1370 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1389 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1416 const unsigned char *secret,
1418 const unsigned char client_random[32],
1419 const unsigned char server_random[32],
1422 #if defined(MBEDTLS_SSL_SRV_C)
1475 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1479 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1482 #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
1485 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1488 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1491 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
1492 defined(MBEDTLS_SSL_CLI_C)
1502 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
1503 defined(MBEDTLS_SSL_SRV_C) && \
1504 defined(MBEDTLS_SSL_PROTO_TLS1_3)
1508 #if defined(MBEDTLS_SSL_SRV_C)
1515 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1520 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1532 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1538 void(*
MBEDTLS_PRIVATE(f_dbg))(
void *, int,
const char *, int,
const char *);
1551 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
1557 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1563 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED)
1564 #if defined(MBEDTLS_SSL_SRV_C)
1566 int(*
MBEDTLS_PRIVATE(f_psk))(
void *, mbedtls_ssl_context *,
const unsigned char *, size_t);
1571 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1574 const unsigned char *, size_t);
1576 int(*
MBEDTLS_PRIVATE(f_cookie_check))(
void *,
const unsigned char *, size_t,
1577 const unsigned char *, size_t);
1581 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
1584 unsigned char *,
const unsigned char *,
size_t *,
1587 int(*
MBEDTLS_PRIVATE(f_ticket_parse))(
void *, mbedtls_ssl_session *,
unsigned char *, size_t);
1590 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1594 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1599 #if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
1605 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
1606 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1615 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
1617 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
1623 #if defined(MBEDTLS_ECP_C) && !defined(MBEDTLS_DEPRECATED_REMOVED)
1629 #if defined(MBEDTLS_DHM_C)
1634 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED)
1636 #if defined(MBEDTLS_USE_PSA_CRYPTO)
1667 #if defined(MBEDTLS_SSL_EARLY_DATA)
1672 #if defined(MBEDTLS_SSL_SRV_C)
1679 #if defined(MBEDTLS_SSL_ALPN)
1683 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1685 const mbedtls_ssl_srtp_profile *
MBEDTLS_PRIVATE(dtls_srtp_profile_list);
1696 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1703 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1711 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
1722 #if defined(MBEDTLS_SSL_SRV_C)
1726 #if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
1731 struct mbedtls_ssl_context {
1738 #if defined(MBEDTLS_SSL_RENEGOTIATION)
1763 #if defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_CLI_C)
1782 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1784 int(*
MBEDTLS_PRIVATE(f_vrfy))(
void *, mbedtls_x509_crt *, int, uint32_t *);
1818 #if defined(MBEDTLS_SSL_PROTO_TLS1_2)
1824 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
1846 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1858 #if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1861 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1866 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1891 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1896 #if defined(MBEDTLS_SSL_EARLY_DATA)
1897 #if defined(MBEDTLS_SSL_SRV_C)
1915 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1926 #if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1932 #if defined(MBEDTLS_SSL_PROTO_DTLS)
1939 #if defined(MBEDTLS_X509_CRT_PARSE_C)
1971 #if defined(MBEDTLS_SSL_ALPN)
1975 #if defined(MBEDTLS_SSL_DTLS_SRTP)
1985 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1996 #if defined(MBEDTLS_SSL_RENEGOTIATION)
2002 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
2126 return conf->MBEDTLS_PRIVATE(endpoint);
2173 #if defined(MBEDTLS_SSL_EARLY_DATA)
2201 int early_data_enabled);
2203 #if defined(MBEDTLS_SSL_SRV_C)
2228 void mbedtls_ssl_conf_max_early_data_size(
2234 #if defined(MBEDTLS_X509_CRT_PARSE_C)
2251 int (*f_vrfy)(
void *, mbedtls_x509_crt *,
int, uint32_t *),
2285 void (*f_dbg)(
void *,
int,
const char *,
int,
const char *),
2299 const mbedtls_ssl_context *ssl)
2301 return ssl->MBEDTLS_PRIVATE(conf);
2340 #if defined(MBEDTLS_SSL_PROTO_DTLS)
2342 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
2431 unsigned char const *own_cid,
2432 size_t own_cid_len);
2466 size_t *own_cid_len);
2508 size_t *peer_cid_len);
2554 #if defined(MBEDTLS_X509_CRT_PARSE_C)
2574 int (*f_vrfy)(
void *, mbedtls_x509_crt *,
int, uint32_t *),
2669 #if defined(MBEDTLS_SSL_SRV_C)
2683 conf->MBEDTLS_PRIVATE(f_cert_cb) = f_cert_cb;
2707 const mbedtls_ssl_session *session,
2708 unsigned char *start,
2709 const unsigned char *end,
2711 uint32_t *lifetime);
2737 mbedtls_ssl_session *session,
2741 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
2761 #if defined(MBEDTLS_HAVE_TIME)
2778 if (session == NULL || ticket_creation_time == NULL ||
2783 *ticket_creation_time = session->MBEDTLS_PRIVATE(ticket_creation_time);
2800 return &session->MBEDTLS_PRIVATE(
id);
2812 return session->MBEDTLS_PRIVATE(id_len);
2824 return session->MBEDTLS_PRIVATE(ciphersuite);
2847 void *p_export_keys);
2863 conf->MBEDTLS_PRIVATE(user_data).p = p;
2877 conf->MBEDTLS_PRIVATE(user_data).n = n;
2893 return conf->MBEDTLS_PRIVATE(user_data).p;
2909 return conf->MBEDTLS_PRIVATE(user_data).n;
2923 mbedtls_ssl_context *ssl,
2926 ssl->MBEDTLS_PRIVATE(user_data).p = p;
2937 mbedtls_ssl_context *ssl,
2940 ssl->MBEDTLS_PRIVATE(user_data).n = n;
2954 mbedtls_ssl_context *ssl)
2956 return ssl->MBEDTLS_PRIVATE(user_data).p;
2970 mbedtls_ssl_context *ssl)
2972 return ssl->MBEDTLS_PRIVATE(user_data).n;
2975 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
3007 mbedtls_ssl_async_sign_t *f_async_sign,
3008 mbedtls_ssl_async_decrypt_t *f_async_decrypt,
3009 mbedtls_ssl_async_resume_t *f_async_resume,
3010 mbedtls_ssl_async_cancel_t *f_async_cancel,
3037 void *mbedtls_ssl_get_async_operation_data(
const mbedtls_ssl_context *ssl);
3050 void mbedtls_ssl_set_async_operation_data(mbedtls_ssl_context *ssl,
3069 unsigned char **p,
unsigned char *end,
3070 const unsigned char *info,
size_t ilen);
3086 const unsigned char *cookie,
size_t clen,
3087 const unsigned char *info,
size_t ilen);
3089 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
3143 const unsigned char *info,
3148 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
3192 #if defined(MBEDTLS_SSL_PROTO_DTLS)
3223 unsigned allow_packing);
3259 #if defined(MBEDTLS_SSL_SRV_C)
3303 #if defined(MBEDTLS_SSL_CLI_C)
3386 const unsigned char *buf,
3469 const int *ciphersuites);
3471 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
3515 const int kex_modes);
3518 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
3519 #define MBEDTLS_SSL_UNEXPECTED_CID_IGNORE 0
3520 #define MBEDTLS_SSL_UNEXPECTED_CID_FAIL 1
3554 int ignore_other_cids);
3557 #if defined(MBEDTLS_X509_CRT_PARSE_C)
3583 mbedtls_x509_crt *ca_chain,
3586 #if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
3600 const mbedtls_x509_crt *crt)
3602 conf->MBEDTLS_PRIVATE(dn_hints) = crt;
3606 #if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
3700 mbedtls_x509_crt *own_cert,
3704 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED)
3738 const unsigned char *psk,
size_t psk_len,
3739 const unsigned char *psk_identity,
size_t psk_identity_len);
3741 #if defined(MBEDTLS_USE_PSA_CRYPTO)
3781 const unsigned char *psk_identity,
3782 size_t psk_identity_len);
3802 const unsigned char *psk,
size_t psk_len);
3804 #if defined(MBEDTLS_USE_PSA_CRYPTO)
3825 int mbedtls_ssl_set_hs_psk_opaque(mbedtls_ssl_context *ssl,
3829 #if defined(MBEDTLS_SSL_SRV_C)
3869 int (*f_psk)(
void *, mbedtls_ssl_context *,
const unsigned char *,
3875 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_SRV_C)
3890 const unsigned char *dhm_P,
size_t P_len,
3891 const unsigned char *dhm_G,
size_t G_len);
3905 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
3915 unsigned int bitlen);
3918 #if defined(MBEDTLS_ECP_C)
3919 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
4004 const uint16_t *groups);
4006 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED)
4007 #if !defined(MBEDTLS_DEPRECATED_REMOVED) && defined(MBEDTLS_SSL_PROTO_TLS1_2)
4056 const uint16_t *sig_algs);
4059 #if defined(MBEDTLS_X509_CRT_PARSE_C)
4105 return ssl->MBEDTLS_PRIVATE(hostname);
4109 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
4147 mbedtls_x509_crt *own_cert,
4162 mbedtls_x509_crt *ca_chain,
4165 #if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED)
4177 const mbedtls_x509_crt *crt);
4216 int (*f_sni)(
void *, mbedtls_ssl_context *,
const unsigned char *,
4221 #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
4240 int mbedtls_ssl_set_hs_ecjpake_password(mbedtls_ssl_context *ssl,
4241 const unsigned char *pw,
4258 int mbedtls_ssl_set_hs_ecjpake_password_opaque(mbedtls_ssl_context *ssl,
4262 #if defined(MBEDTLS_SSL_ALPN)
4289 #if defined(MBEDTLS_SSL_DTLS_SRTP)
4290 #if defined(MBEDTLS_DEBUG_C)
4295 return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80";
4297 return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32";
4299 return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80";
4301 return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32";
4321 int support_mki_value);
4344 const mbedtls_ssl_srtp_profile *profiles);
4363 unsigned char *mki_value,
4387 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
4424 conf->MBEDTLS_PRIVATE(max_tls_version) = tls_version;
4427 #if !defined(MBEDTLS_DEPRECATED_REMOVED)
4481 conf->MBEDTLS_PRIVATE(min_tls_version) = tls_version;
4484 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
4499 #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
4514 #if defined(MBEDTLS_SSL_SRV_C)
4525 char cert_req_ca_list);
4528 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
4570 #if defined(MBEDTLS_SSL_SRV_C)
4583 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
4596 #if defined(MBEDTLS_SSL_PROTO_TLS1_3)
4628 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \
4629 defined(MBEDTLS_SSL_SRV_C) && \
4630 defined(MBEDTLS_SSL_PROTO_TLS1_3)
4649 uint16_t num_tickets);
4654 #if defined(MBEDTLS_SSL_RENEGOTIATION)
4704 #if defined(MBEDTLS_SSL_RENEGOTIATION)
4770 const unsigned char period[8]);
4875 const mbedtls_ssl_context *ssl)
4877 return ssl->MBEDTLS_PRIVATE(tls_version);
4946 #if defined(MBEDTLS_X509_CRT_PARSE_C)
4980 #if defined(MBEDTLS_SSL_CLI_C)
5009 mbedtls_ssl_session *session);
5156 #if defined(MBEDTLS_SSL_RENEGOTIATION)
5280 int mbedtls_ssl_read(mbedtls_ssl_context *ssl,
unsigned char *buf,
size_t len);
5355 int mbedtls_ssl_write(mbedtls_ssl_context *ssl,
const unsigned char *buf,
size_t len);
5374 unsigned char level,
5375 unsigned char message);
5391 #if defined(MBEDTLS_SSL_EARLY_DATA)
5393 #if defined(MBEDTLS_SSL_SRV_C)
5441 int mbedtls_ssl_read_early_data(mbedtls_ssl_context *ssl,
5442 unsigned char *buf,
size_t len);
5445 #if defined(MBEDTLS_SSL_CLI_C)
5530 int mbedtls_ssl_write_early_data(mbedtls_ssl_context *ssl,
5531 const unsigned char *buf,
size_t len);
5559 int mbedtls_ssl_get_early_data_status(mbedtls_ssl_context *ssl);
5571 #if defined(MBEDTLS_SSL_CONTEXT_SERIALIZATION)
5702 const unsigned char *buf,
5734 int endpoint,
int transport,
int preset);
5777 const unsigned char *secret,
size_t slen,
5779 const unsigned char *random,
size_t rlen,
5780 unsigned char *dstbuf,
size_t dlen);
5782 #if defined(MBEDTLS_SSL_KEYING_MATERIAL_EXPORT)
5787 #define MBEDTLS_SSL_EXPORT_MAX_KEY_LEN 8160
5812 uint8_t *out,
const size_t key_len,
5813 const char *label,
const size_t label_len,
5814 const unsigned char *context,
const size_t context_len,
5815 const int use_context);
unsigned char _pms_ecdhe_psk[4+MBEDTLS_ECP_MAX_BYTES +MBEDTLS_PSK_MAX_LEN]
int mbedtls_ssl_tls_prf(const mbedtls_tls_prf_types prf, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen)
TLS-PRF function for key derivation.
const unsigned char * mbedtls_ssl_get_hs_sni(mbedtls_ssl_context *ssl, size_t *name_len)
Retrieve SNI extension value for the current handshake. Available in f_cert_cb of mbedtls_ssl_conf_ce...
#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80
void mbedtls_ssl_set_hs_ca_chain(mbedtls_ssl_context *ssl, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate for the current handshake.
int mbedtls_ssl_ticket_parse_t(void *p_ticket, mbedtls_ssl_session *session, unsigned char *buf, size_t len)
Callback type: parse and load session ticket.
const char * mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id)
Return the name of the ciphersuite associated with the given ID.
void mbedtls_ssl_conf_encrypt_then_mac(mbedtls_ssl_config *conf, char etm)
Enable or disable Encrypt-then-MAC (Default: MBEDTLS_SSL_ETM_ENABLED)
int mbedtls_ssl_cookie_write_t(void *ctx, unsigned char **p, unsigned char *end, const unsigned char *info, size_t ilen)
Callback type: generate a cookie.
int mbedtls_ssl_dtls_srtp_set_mki_value(mbedtls_ssl_context *ssl, unsigned char *mki_value, uint16_t mki_len)
Set the mki_value for the current DTLS-SRTP session.
int mbedtls_ssl_cookie_check_t(void *ctx, const unsigned char *cookie, size_t clen, const unsigned char *info, size_t ilen)
Callback type: verify a cookie.
void mbedtls_ssl_set_timer_cb(mbedtls_ssl_context *ssl, void *p_timer, mbedtls_ssl_set_timer_t *f_set_timer, mbedtls_ssl_get_timer_t *f_get_timer)
Set the timer callbacks (Mandatory for DTLS.)
struct mbedtls_ssl_sig_hash_set_t mbedtls_ssl_sig_hash_set_t
uint16_t mbedtls_ssl_srtp_profile
static int mbedtls_ssl_session_get_ciphersuite_id(const mbedtls_ssl_session *session)
Get the ciphersuite-id.
void mbedtls_ssl_conf_extended_master_secret(mbedtls_ssl_config *conf, char ems)
Enable or disable Extended Master Secret negotiation. (Default: MBEDTLS_SSL_EXTENDED_MS_ENABLED) ...
int mbedtls_ssl_get_max_in_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum incoming record payload in bytes.
int mbedtls_ssl_send_t(void *ctx, const unsigned char *buf, size_t len)
Callback type: send data on the network.
#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32
void mbedtls_ssl_set_verify(mbedtls_ssl_context *ssl, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set a connection-specific verification callback (optional).
int mbedtls_ssl_recv_t(void *ctx, unsigned char *buf, size_t len)
Callback type: receive data from the network.
This file provides an API for Elliptic Curves over GF(P) (ECP).
static void mbedtls_ssl_set_user_data_n(mbedtls_ssl_context *ssl, uintptr_t n)
Set the user data in an SSL context to an integer.
#define MBEDTLS_ERR_SSL_BAD_INPUT_DATA
void mbedtls_ssl_conf_preference_order(mbedtls_ssl_config *conf, int order)
Pick the ciphersuites order according to the second parameter in the SSL Server module (MBEDTLS_SSL_S...
void mbedtls_ssl_export_keys_t(void *p_expkey, mbedtls_ssl_key_export_type type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type)
Callback type: Export key alongside random values for session identification, and PRF for implementat...
Platform Security Architecture cryptography module.
unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]
void mbedtls_ssl_conf_verify(mbedtls_ssl_config *conf, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set the verification callback (Optional).
unsigned char _pms_rsa[48]
unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]
static const mbedtls_ssl_config * mbedtls_ssl_context_get_config(const mbedtls_ssl_context *ssl)
Return the SSL configuration structure associated with the given SSL context.
static const char * mbedtls_ssl_get_hostname(mbedtls_ssl_context *ssl)
Get the hostname that checked against the received server certificate. It is used to set the ServerNa...
int mbedtls_ssl_get_max_out_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum outgoing record payload in bytes.
void mbedtls_ssl_conf_renegotiation(mbedtls_ssl_config *conf, int renegotiation)
Enable / Disable renegotiation support for connection when initiated by peer (Default: MBEDTLS_SSL_RE...
static void mbedtls_ssl_conf_cert_cb(mbedtls_ssl_config *conf, mbedtls_ssl_hs_cb_t f_cert_cb)
Set the certificate selection callback (server-side only).
int mbedtls_ssl_conf_dh_param_bin(mbedtls_ssl_config *conf, const unsigned char *dhm_P, size_t P_len, const unsigned char *dhm_G, size_t G_len)
Set the Diffie-Hellman public P and G values from big-endian binary presentations. (Default values: MBEDTLS_DHM_RFC3526_MODP_2048_[PG]_BIN)
void mbedtls_ssl_conf_sni(mbedtls_ssl_config *conf, int(*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_sni)
Set server side ServerName TLS extension callback (optional, server-side only).
#define MBEDTLS_PRIVATE(member)
void mbedtls_ssl_conf_dtls_anti_replay(mbedtls_ssl_config *conf, char mode)
Enable or disable anti-replay protection for DTLS. (DTLS only, no effect on TLS.) Default: enabled...
int(* mbedtls_x509_crt_ca_cb_t)(void *p_ctx, mbedtls_x509_crt const *child, mbedtls_x509_crt **candidate_cas)
The type of trusted certificate callbacks.
void mbedtls_ssl_conf_srtp_mki_value_supported(mbedtls_ssl_config *conf, int support_mki_value)
Manage support for mki(master key id) value in use_srtp extension. MKI is an optional part of SRTP us...
#define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH
uint32_t mbedtls_ssl_get_verify_result(const mbedtls_ssl_context *ssl)
Return the result of the certificate verification.
void mbedtls_ssl_conf_session_tickets_cb(mbedtls_ssl_config *conf, mbedtls_ssl_ticket_write_t *f_ticket_write, mbedtls_ssl_ticket_parse_t *f_ticket_parse, void *p_ticket)
Configure SSL session ticket callbacks (server only). (Default: none.)
int mbedtls_ssl_set_cid(mbedtls_ssl_context *ssl, int enable, unsigned char const *own_cid, size_t own_cid_len)
Configure the use of the Connection ID (CID) extension in the next handshake.
int mbedtls_ssl_check_pending(const mbedtls_ssl_context *ssl)
Check if there is data already read from the underlying transport but not yet processed.
static uintptr_t mbedtls_ssl_get_user_data_n(mbedtls_ssl_context *ssl)
Retrieve the user data in an SSL context as an integer.
const mbedtls_x509_crt * mbedtls_ssl_get_peer_cert(const mbedtls_ssl_context *ssl)
Return the peer certificate from the current connection.
int mbedtls_ssl_session_save(const mbedtls_ssl_session *session, unsigned char *buf, size_t buf_len, size_t *olen)
Save session structure as serialized data in a buffer. On client, this can be used for saving session...
int mbedtls_ssl_send_alert_message(mbedtls_ssl_context *ssl, unsigned char level, unsigned char message)
Send an alert message.
int mbedtls_ssl_recv_timeout_t(void *ctx, unsigned char *buf, size_t len, uint32_t timeout)
Callback type: receive data from the network, with timeout.
SSL Ciphersuites for Mbed TLS.
void mbedtls_ssl_conf_session_cache(mbedtls_ssl_config *conf, void *p_cache, mbedtls_ssl_cache_get_t *f_get_cache, mbedtls_ssl_cache_set_t *f_set_cache)
Set the session cache callbacks (server-side only) If not set, no session resuming is done (except if...
void mbedtls_ssl_conf_renegotiation_period(mbedtls_ssl_config *conf, const unsigned char period[8])
Set record counter threshold for periodic renegotiation. (Default: 2^48 - 1)
unsigned char _pms_dhe_psk[4+MBEDTLS_MPI_MAX_SIZE +MBEDTLS_PSK_MAX_LEN]
void mbedtls_ssl_conf_sig_algs(mbedtls_ssl_config *conf, const uint16_t *sig_algs)
Configure allowed signature algorithms for use in TLS.
int mbedtls_ssl_cache_set_t(void *data, unsigned char const *session_id, size_t session_id_len, const mbedtls_ssl_session *session)
Callback type: server-side session cache setter.
Multi-precision integer library.
int mbedtls_ssl_conf_psk(mbedtls_ssl_config *conf, const unsigned char *psk, size_t psk_len, const unsigned char *psk_identity, size_t psk_identity_len)
Configure pre-shared keys (PSKs) and their identities to be used in PSK-based ciphersuites.
int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code)
Set the maximum fragment length to emit and/or negotiate. (Typical: the smaller of MBEDTLS_SSL_IN_CON...
int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Try to write exactly 'len' application data bytes.
void mbedtls_ssl_conf_cert_req_ca_list(mbedtls_ssl_config *conf, char cert_req_ca_list)
Whether to send a list of acceptable CAs in CertificateRequest messages. (Default: do send) ...
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_curves(mbedtls_ssl_config *conf, const mbedtls_ecp_group_id *curves)
Set the allowed curves in order of preference.
int mbedtls_ssl_close_notify(mbedtls_ssl_context *ssl)
Notify the peer that the connection is being closed.
struct mbedtls_ssl_flight_item mbedtls_ssl_flight_item
int mbedtls_ssl_cache_get_t(void *data, unsigned char const *session_id, size_t session_id_len, mbedtls_ssl_session *session)
Callback type: server-side session cache getter.
void mbedtls_ssl_conf_session_tickets(mbedtls_ssl_config *conf, int use_tickets)
Enable / Disable TLS 1.2 session tickets (client only, TLS 1.2 only). Enabled by default.
static void mbedtls_ssl_conf_dn_hints(mbedtls_ssl_config *conf, const mbedtls_x509_crt *crt)
Set DN hints sent to client in CertificateRequest message.
void mbedtls_ssl_free(mbedtls_ssl_context *ssl)
Free referenced items in an SSL context and clear memory.
void mbedtls_ssl_conf_endpoint(mbedtls_ssl_config *conf, int endpoint)
Set the current endpoint type.
void mbedtls_ssl_session_free(mbedtls_ssl_session *session)
Free referenced items in an SSL session including the peer certificate and clear memory.
mbedtls_ssl_protocol_version
static void * mbedtls_ssl_get_user_data_p(mbedtls_ssl_context *ssl)
Retrieve the user data in an SSL context as a pointer.
struct mbedtls_ssl_transform mbedtls_ssl_transform
#define MBEDTLS_TLS1_3_MD_MAX_SIZE
const char * mbedtls_ssl_get_alpn_protocol(const mbedtls_ssl_context *ssl)
Get the name of the negotiated Application Layer Protocol. This function should be called after the h...
void mbedtls_ssl_conf_dhm_min_bitlen(mbedtls_ssl_config *conf, unsigned int bitlen)
Set the minimum length for Diffie-Hellman parameters. (Client-side only.) (Default: 1024 bits...
int mbedtls_ssl_get_ciphersuite_id_from_ssl(const mbedtls_ssl_context *ssl)
Return the id of the current ciphersuite.
void mbedtls_ssl_conf_dtls_cookies(mbedtls_ssl_config *conf, mbedtls_ssl_cookie_write_t *f_cookie_write, mbedtls_ssl_cookie_check_t *f_cookie_check, void *p_cookie)
Register callbacks for DTLS cookies (Server only. DTLS only.)
int mbedtls_ssl_conf_cid(mbedtls_ssl_config *conf, size_t len, int ignore_other_cids)
Specify the length of Connection IDs for incoming encrypted DTLS records, as well as the behaviour on...
static int mbedtls_ssl_session_get_ticket_creation_time(mbedtls_ssl_session *session, mbedtls_ms_time_t *ticket_creation_time)
Get the creation time of a session ticket.
int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name)
Return the ID of the ciphersuite associated with the given name.
void mbedtls_ssl_conf_transport(mbedtls_ssl_config *conf, int transport)
Set the transport type (TLS or DTLS). Default: TLS.
mbedtls_ssl_key_export_type
void mbedtls_ssl_get_dtls_srtp_negotiation_result(const mbedtls_ssl_context *ssl, mbedtls_dtls_srtp_info *dtls_srtp_info)
Get the negotiated DTLS-SRTP information: Protection profile and MKI value.
#define MBEDTLS_SSL_IS_SERVER
#define MBEDTLS_SSL_SEQUENCE_NUMBER_LEN
void mbedtls_ssl_conf_renegotiation_enforced(mbedtls_ssl_config *conf, int max_records)
Enforce renegotiation requests. (Default: enforced, max_records = 16)
void mbedtls_ssl_set_mtu(mbedtls_ssl_context *ssl, uint16_t mtu)
Set the Maximum Transport Unit (MTU). Special value: 0 means unset (no limit). This represents the ma...
int mbedtls_ssl_set_client_transport_id(mbedtls_ssl_context *ssl, const unsigned char *info, size_t ilen)
Set client's transport-level identification info. (Server only. DTLS only.)
void mbedtls_ssl_set_bio(mbedtls_ssl_context *ssl, void *p_bio, mbedtls_ssl_send_t *f_send, mbedtls_ssl_recv_t *f_recv, mbedtls_ssl_recv_timeout_t *f_recv_timeout)
Set the underlying BIO callbacks for write, read and read-with-timeout.
Macro wrapper for struct's members.
static uintptr_t mbedtls_ssl_conf_get_user_data_n(mbedtls_ssl_config *conf)
Retrieve the user data in an SSL configuration as an integer.
void mbedtls_ssl_conf_new_session_tickets(mbedtls_ssl_config *conf, uint16_t num_tickets)
Number of NewSessionTicket messages for the server to send after handshake completion.
int mbedtls_ssl_context_save(mbedtls_ssl_context *ssl, unsigned char *buf, size_t buf_len, size_t *olen)
Save an active connection as serialized data in a buffer. This allows the freeing or re-using of the ...
int mbedtls_ssl_conf_alpn_protocols(mbedtls_ssl_config *conf, const char **protos)
Set the supported Application Layer Protocols.
void mbedtls_ssl_conf_cert_profile(mbedtls_ssl_config *conf, const mbedtls_x509_crt_profile *profile)
Set the X.509 security profile used for verification.
This file contains Diffie-Hellman-Merkle (DHM) key exchange definitions and functions.
X.509 certificate parsing and writing.
int mbedtls_ssl_context_load(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Load serialized connection data to an SSL context.
#define MBEDTLS_PSK_MAX_LEN
void mbedtls_ssl_init(mbedtls_ssl_context *ssl)
Initialize an SSL context Just makes the context ready for mbedtls_ssl_setup() or mbedtls_ssl_free() ...
const char * mbedtls_ssl_get_ciphersuite(const mbedtls_ssl_context *ssl)
Return the name of the current ciphersuite.
static unsigned const char(* mbedtls_ssl_session_get_id(const mbedtls_ssl_session *session))[32]
Get the session-id buffer.
void mbedtls_ssl_set_export_keys_cb(mbedtls_ssl_context *ssl, mbedtls_ssl_export_keys_t *f_export_keys, void *p_export_keys)
Configure a key export callback. (Default: none.)
int mbedtls_ssl_get_timer_t(void *ctx)
Callback type: get status of timers/delays.
The DHM context structure.
int mbedtls_ssl_get_own_cid(mbedtls_ssl_context *ssl, int *enabled, unsigned char own_cid[MBEDTLS_SSL_CID_IN_LEN_MAX], size_t *own_cid_len)
Get information about our request for usage of the CID extension in the current connection.
void mbedtls_ssl_conf_dbg(mbedtls_ssl_config *conf, void(*f_dbg)(void *, int, const char *, int, const char *), void *p_dbg)
Set the debug callback.
int(* mbedtls_ssl_hs_cb_t)(mbedtls_ssl_context *ssl)
Callback type: generic handshake callback.
void mbedtls_ssl_config_init(mbedtls_ssl_config *conf)
Initialize an SSL configuration context Just makes the context ready for mbedtls_ssl_config_defaults(...
static void mbedtls_ssl_conf_set_user_data_n(mbedtls_ssl_config *conf, uintptr_t n)
Set the user data in an SSL configuration to an integer.
int mbedtls_ssl_get_record_expansion(const mbedtls_ssl_context *ssl)
Return the (maximum) number of bytes added by the record layer: header + encryption/MAC overhead (inc...
Build-time configuration info.
This file contains ECDH definitions and functions.
int mbedtls_ssl_conf_dh_param_ctx(mbedtls_ssl_config *conf, mbedtls_dhm_context *dhm_ctx)
Set the Diffie-Hellman public P and G values, read from existing context (server-side only) ...
void mbedtls_ssl_conf_groups(mbedtls_ssl_config *conf, const uint16_t *groups)
Set the allowed groups in order of preference.
int mbedtls_ssl_set_session(mbedtls_ssl_context *ssl, const mbedtls_ssl_session *session)
Load a session for session resumption.
#define MBEDTLS_MPI_MAX_SIZE
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_sig_hashes(mbedtls_ssl_config *conf, const int *hashes)
Set the allowed hashes for signatures during the handshake.
void mbedtls_ssl_set_datagram_packing(mbedtls_ssl_context *ssl, unsigned allow_packing)
Allow or disallow packing of multiple handshake records within a single datagram. ...
static void * mbedtls_ssl_conf_get_user_data_p(mbedtls_ssl_config *conf)
Retrieve the user data in an SSL configuration as a pointer.
int mbedtls_ssl_set_hs_own_cert(mbedtls_ssl_context *ssl, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate and key for the current handshake.
This file contains the generic functions for message-digest (hashing) and HMAC.
int mbedtls_ssl_conf_own_cert(mbedtls_ssl_config *conf, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate chain and private key.
static const char * mbedtls_ssl_get_srtp_profile_as_string(mbedtls_ssl_srtp_profile profile)
psa_key_id_t mbedtls_svc_key_id_t
int mbedtls_ssl_setup(mbedtls_ssl_context *ssl, const mbedtls_ssl_config *conf)
Set up an SSL context for use.
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_max_version(mbedtls_ssl_config *conf, int major, int minor)
Set the maximum supported version sent from the client side and/or accepted at the server side...
void mbedtls_ssl_conf_legacy_renegotiation(mbedtls_ssl_config *conf, int allow_legacy)
Prevent or allow legacy renegotiation. (Default: MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION) ...
static void mbedtls_ssl_set_user_data_p(mbedtls_ssl_context *ssl, void *p)
Set the user data in an SSL context to a pointer.
unsigned char _pms_rsa_psk[52+MBEDTLS_PSK_MAX_LEN]
int mbedtls_ssl_renegotiate(mbedtls_ssl_context *ssl)
Initiate an SSL renegotiation on the running connection. Client: perform the renegotiation right now...
#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32
static void mbedtls_ssl_conf_set_user_data_p(mbedtls_ssl_config *conf, void *p)
Set the user data in an SSL configuration to a pointer.
X.509 certificate revocation list parsing.
void mbedtls_ssl_conf_rng(mbedtls_ssl_config *conf, mbedtls_f_rng_t *f_rng, void *p_rng)
Set the random number generator callback.
void mbedtls_ssl_conf_read_timeout(mbedtls_ssl_config *conf, uint32_t timeout)
Set the timeout period for mbedtls_ssl_read() (Default: no timeout.)
void mbedtls_ssl_config_free(mbedtls_ssl_config *conf)
Free an SSL configuration context.
int mbedtls_ssl_conf_dtls_srtp_protection_profiles(mbedtls_ssl_config *conf, const mbedtls_ssl_srtp_profile *profiles)
Set the supported DTLS-SRTP protection profiles.
#define MBEDTLS_SSL_CID_OUT_LEN_MAX
int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len)
Read at most 'len' application data bytes.
struct mbedtls_ssl_key_cert mbedtls_ssl_key_cert
static mbedtls_ssl_protocol_version mbedtls_ssl_get_version_number(const mbedtls_ssl_context *ssl)
Return the (D)TLS protocol version negotiated in the given connection.
void mbedtls_ssl_set_timer_t(void *ctx, uint32_t int_ms, uint32_t fin_ms)
Callback type: set a pair of timers/delays to watch.
static int mbedtls_ssl_conf_get_endpoint(const mbedtls_ssl_config *conf)
Get the current endpoint type.
size_t mbedtls_ssl_get_bytes_avail(const mbedtls_ssl_context *ssl)
Return the number of application data bytes remaining to be read from the current record...
#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80
void mbedtls_ssl_conf_tls13_key_exchange_modes(mbedtls_ssl_config *conf, const int kex_modes)
Set the supported key exchange modes for TLS 1.3 connections.
#define MBEDTLS_SSL_CID_IN_LEN_MAX
int mbedtls_ssl_get_peer_cid(mbedtls_ssl_context *ssl, int *enabled, unsigned char peer_cid[MBEDTLS_SSL_CID_OUT_LEN_MAX], size_t *peer_cid_len)
Get information about the use of the CID extension in the current connection.
void mbedtls_ssl_session_init(mbedtls_ssl_session *session)
Initialize SSL session structure.
struct mbedtls_dtls_srtp_info_t mbedtls_dtls_srtp_info
void mbedtls_ssl_conf_tls13_enable_signal_new_session_tickets(mbedtls_ssl_config *conf, int signal_new_session_tickets)
Enable / Disable handling of TLS 1.3 NewSessionTicket messages (client only, TLS 1.3 only).
int mbedtls_ssl_ticket_write_t(void *p_ticket, const mbedtls_ssl_session *session, unsigned char *start, const unsigned char *end, size_t *tlen, uint32_t *lifetime)
Callback type: generate and write session ticket.
static int mbedtls_ssl_is_handshake_over(mbedtls_ssl_context *ssl)
After calling mbedtls_ssl_handshake() to start the SSL handshake you can call this function to check ...
void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max)
Set retransmit timeout values for the DTLS handshake. (DTLS only, no effect on TLS.)
int mbedtls_ssl_config_defaults(mbedtls_ssl_config *conf, int endpoint, int transport, int preset)
Load reasonable default SSL configuration values. (You need to call mbedtls_ssl_config_init() first...
void mbedtls_ssl_conf_ca_chain(mbedtls_ssl_config *conf, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate.
static size_t mbedtls_ssl_session_get_id_len(const mbedtls_ssl_session *session)
Get the size of the session-id.
void mbedtls_ssl_conf_dtls_badmac_limit(mbedtls_ssl_config *conf, unsigned limit)
Set a limit on the number of records with a bad MAC before terminating the connection. (DTLS only, no effect on TLS.) Default: 0 (disabled).
unsigned char _pms_psk[4+2 *MBEDTLS_PSK_MAX_LEN]
int mbedtls_ssl_handshake(mbedtls_ssl_context *ssl)
Perform the SSL handshake.
int mbedtls_ssl_export_keying_material(mbedtls_ssl_context *ssl, uint8_t *out, const size_t key_len, const char *label, const size_t label_len, const unsigned char *context, const size_t context_len, const int use_context)
TLS-Exporter to derive shared symmetric keys between server and client.
void mbedtls_ssl_set_hs_authmode(mbedtls_ssl_context *ssl, int authmode)
Set authmode for the current handshake.
mbedtls_md_type_t
Supported message digests.
int mbedtls_ssl_handshake_step(mbedtls_ssl_context *ssl)
Perform a single step of the SSL handshake.
const char * mbedtls_ssl_get_version(const mbedtls_ssl_context *ssl)
Return the current TLS version.
void mbedtls_ssl_conf_authmode(mbedtls_ssl_config *conf, int authmode)
Set the certificate verification mode Default: NONE on server, REQUIRED on client.
#define MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN
int mbedtls_ssl_session_reset(mbedtls_ssl_context *ssl)
Reset an already initialized SSL context for re-use while retaining application-set variables...
int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname)
Set or reset the hostname to check against the received peer certificate. On a client, this also sets the ServerName TLS extension, if that extension is enabled. On a TLS 1.3 client, this also sets the server name in the session resumption ticket, if that feature is enabled.
struct mbedtls_ssl_handshake_params mbedtls_ssl_handshake_params
static void mbedtls_ssl_conf_min_tls_version(mbedtls_ssl_config *conf, mbedtls_ssl_protocol_version tls_version)
Set the minimum supported version sent from the client side and/or accepted at the server side...
static void mbedtls_ssl_conf_max_tls_version(mbedtls_ssl_config *conf, mbedtls_ssl_protocol_version tls_version)
Set the maximum supported version sent from the client side and/or accepted at the server side...
#define MBEDTLS_ECP_MAX_BYTES
int mbedtls_ssl_session_load(mbedtls_ssl_session *session, const unsigned char *buf, size_t len)
Load serialized session data into a session structure. On client, this can be used for loading saved ...
int mbedtls_ssl_set_hs_psk(mbedtls_ssl_context *ssl, const unsigned char *psk, size_t psk_len)
Set the pre-shared Key (PSK) for the current handshake.
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_min_version(mbedtls_ssl_config *conf, int major, int minor)
Set the minimum accepted SSL/TLS protocol version.
int mbedtls_ssl_get_session(const mbedtls_ssl_context *ssl, mbedtls_ssl_session *session)
Export a session in order to resume it later.
void mbedtls_ssl_conf_ciphersuites(mbedtls_ssl_config *conf, const int *ciphersuites)
Set the list of allowed ciphersuites and the preference order. First in the list has the highest pref...
#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN
void mbedtls_ssl_set_hs_dn_hints(mbedtls_ssl_context *ssl, const mbedtls_x509_crt *crt)
Set DN hints sent to client in CertificateRequest message.
void mbedtls_ssl_conf_psk_cb(mbedtls_ssl_config *conf, int(*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_psk)
Set the PSK callback (server-side only).
int mbedtls_ssl_check_record(mbedtls_ssl_context const *ssl, unsigned char *buf, size_t buflen)
Check whether a buffer contains a valid and authentic record that has not been seen before...