mbed TLS v2.26.0
ssl.h
Go to the documentation of this file.
1
6/*
7 * Copyright The Mbed TLS Contributors
8 * SPDX-License-Identifier: Apache-2.0
9 *
10 * Licensed under the Apache License, Version 2.0 (the "License"); you may
11 * not use this file except in compliance with the License.
12 * You may obtain a copy of the License at
13 *
14 * http://www.apache.org/licenses/LICENSE-2.0
15 *
16 * Unless required by applicable law or agreed to in writing, software
17 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
18 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19 * See the License for the specific language governing permissions and
20 * limitations under the License.
21 */
22#ifndef MBEDTLS_SSL_H
23#define MBEDTLS_SSL_H
24
25#if !defined(MBEDTLS_CONFIG_FILE)
26#include "mbedtls/config.h"
27#else
28#include MBEDTLS_CONFIG_FILE
29#endif
30
31#include "mbedtls/bignum.h"
32#include "mbedtls/ecp.h"
33
35
36#if defined(MBEDTLS_X509_CRT_PARSE_C)
37#include "mbedtls/x509_crt.h"
38#include "mbedtls/x509_crl.h"
39#endif
40
41#if defined(MBEDTLS_DHM_C)
42#include "mbedtls/dhm.h"
43#endif
44
45/* Adding guard for MBEDTLS_ECDSA_C to ensure no compile errors due
46 * to guards also being in ssl_srv.c and ssl_cli.c. There is a gap
47 * in functionality that access to ecdh_ctx structure is needed for
48 * MBEDTLS_ECDSA_C which does not seem correct.
49 */
50#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C)
51#include "mbedtls/ecdh.h"
52#endif
53
54#if defined(MBEDTLS_ZLIB_SUPPORT)
55
56#if defined(MBEDTLS_DEPRECATED_WARNING)
57#warning "Record compression support via MBEDTLS_ZLIB_SUPPORT is deprecated and will be removed in the next major revision of the library"
58#endif
59
60#if defined(MBEDTLS_DEPRECATED_REMOVED)
61#error "Record compression support via MBEDTLS_ZLIB_SUPPORT is deprecated and cannot be used if MBEDTLS_DEPRECATED_REMOVED is set"
62#endif
63
64#include "zlib.h"
65#endif
66
67#if defined(MBEDTLS_HAVE_TIME)
69#endif
70
71#if defined(MBEDTLS_USE_PSA_CRYPTO)
72#include "psa/crypto.h"
73#endif /* MBEDTLS_USE_PSA_CRYPTO */
74
75/*
76 * SSL Error codes
77 */
78#define MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE -0x7080
79#define MBEDTLS_ERR_SSL_BAD_INPUT_DATA -0x7100
80#define MBEDTLS_ERR_SSL_INVALID_MAC -0x7180
81#define MBEDTLS_ERR_SSL_INVALID_RECORD -0x7200
82#define MBEDTLS_ERR_SSL_CONN_EOF -0x7280
83#define MBEDTLS_ERR_SSL_UNKNOWN_CIPHER -0x7300
84#define MBEDTLS_ERR_SSL_NO_CIPHER_CHOSEN -0x7380
85#define MBEDTLS_ERR_SSL_NO_RNG -0x7400
86#define MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE -0x7480
87#define MBEDTLS_ERR_SSL_CERTIFICATE_TOO_LARGE -0x7500
88#define MBEDTLS_ERR_SSL_CERTIFICATE_REQUIRED -0x7580
89#define MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED -0x7600
90#define MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED -0x7680
91#define MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE -0x7700
92#define MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE -0x7780
93#define MBEDTLS_ERR_SSL_PEER_VERIFY_FAILED -0x7800
94#define MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY -0x7880
95#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_HELLO -0x7900
96#define MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO -0x7980
97#define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE -0x7A00
98#define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_REQUEST -0x7A80
99#define MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE -0x7B00
100#define MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO_DONE -0x7B80
101#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE -0x7C00
102#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_RP -0x7C80
103#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_CS -0x7D00
104#define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_VERIFY -0x7D80
105#define MBEDTLS_ERR_SSL_BAD_HS_CHANGE_CIPHER_SPEC -0x7E00
106#define MBEDTLS_ERR_SSL_BAD_HS_FINISHED -0x7E80
107#define MBEDTLS_ERR_SSL_ALLOC_FAILED -0x7F00
108#define MBEDTLS_ERR_SSL_HW_ACCEL_FAILED -0x7F80
109#define MBEDTLS_ERR_SSL_HW_ACCEL_FALLTHROUGH -0x6F80
110#define MBEDTLS_ERR_SSL_COMPRESSION_FAILED -0x6F00
111#define MBEDTLS_ERR_SSL_BAD_HS_PROTOCOL_VERSION -0x6E80
112#define MBEDTLS_ERR_SSL_BAD_HS_NEW_SESSION_TICKET -0x6E00
113#define MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED -0x6D80
114#define MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH -0x6D00
115#define MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY -0x6C80
116#define MBEDTLS_ERR_SSL_INTERNAL_ERROR -0x6C00
117#define MBEDTLS_ERR_SSL_COUNTER_WRAPPING -0x6B80
118#define MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO -0x6B00
119#define MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED -0x6A80
120#define MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL -0x6A00
121#define MBEDTLS_ERR_SSL_NO_USABLE_CIPHERSUITE -0x6980
122#define MBEDTLS_ERR_SSL_WANT_READ -0x6900
123#define MBEDTLS_ERR_SSL_WANT_WRITE -0x6880
124#define MBEDTLS_ERR_SSL_TIMEOUT -0x6800
125#define MBEDTLS_ERR_SSL_CLIENT_RECONNECT -0x6780
126#define MBEDTLS_ERR_SSL_UNEXPECTED_RECORD -0x6700
127#define MBEDTLS_ERR_SSL_NON_FATAL -0x6680
128#define MBEDTLS_ERR_SSL_INVALID_VERIFY_HASH -0x6600
129#define MBEDTLS_ERR_SSL_CONTINUE_PROCESSING -0x6580
130#define MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS -0x6500
131#define MBEDTLS_ERR_SSL_EARLY_MESSAGE -0x6480
132#define MBEDTLS_ERR_SSL_UNEXPECTED_CID -0x6000
133#define MBEDTLS_ERR_SSL_VERSION_MISMATCH -0x5F00
134#define MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS -0x7000
135#define MBEDTLS_ERR_SSL_BAD_CONFIG -0x5E80
137/*
138 * Various constants
139 */
140#define MBEDTLS_SSL_MAJOR_VERSION_3 3
141#define MBEDTLS_SSL_MINOR_VERSION_0 0
142#define MBEDTLS_SSL_MINOR_VERSION_1 1
143#define MBEDTLS_SSL_MINOR_VERSION_2 2
144#define MBEDTLS_SSL_MINOR_VERSION_3 3
145#define MBEDTLS_SSL_MINOR_VERSION_4 4
147#define MBEDTLS_SSL_TRANSPORT_STREAM 0
148#define MBEDTLS_SSL_TRANSPORT_DATAGRAM 1
150#define MBEDTLS_SSL_MAX_HOST_NAME_LEN 255
151#define MBEDTLS_SSL_MAX_ALPN_NAME_LEN 255
153#define MBEDTLS_SSL_MAX_ALPN_LIST_LEN 65535
155/* RFC 6066 section 4, see also mfl_code_to_length in ssl_tls.c
156 * NONE must be zero so that memset()ing structure to zero works */
157#define MBEDTLS_SSL_MAX_FRAG_LEN_NONE 0
158#define MBEDTLS_SSL_MAX_FRAG_LEN_512 1
159#define MBEDTLS_SSL_MAX_FRAG_LEN_1024 2
160#define MBEDTLS_SSL_MAX_FRAG_LEN_2048 3
161#define MBEDTLS_SSL_MAX_FRAG_LEN_4096 4
162#define MBEDTLS_SSL_MAX_FRAG_LEN_INVALID 5
164#define MBEDTLS_SSL_IS_CLIENT 0
165#define MBEDTLS_SSL_IS_SERVER 1
166
167#define MBEDTLS_SSL_IS_NOT_FALLBACK 0
168#define MBEDTLS_SSL_IS_FALLBACK 1
169
170#define MBEDTLS_SSL_EXTENDED_MS_DISABLED 0
171#define MBEDTLS_SSL_EXTENDED_MS_ENABLED 1
172
173#define MBEDTLS_SSL_CID_DISABLED 0
174#define MBEDTLS_SSL_CID_ENABLED 1
175
176#define MBEDTLS_SSL_ETM_DISABLED 0
177#define MBEDTLS_SSL_ETM_ENABLED 1
178
179#define MBEDTLS_SSL_COMPRESS_NULL 0
180#define MBEDTLS_SSL_COMPRESS_DEFLATE 1
181
182#define MBEDTLS_SSL_VERIFY_NONE 0
183#define MBEDTLS_SSL_VERIFY_OPTIONAL 1
184#define MBEDTLS_SSL_VERIFY_REQUIRED 2
185#define MBEDTLS_SSL_VERIFY_UNSET 3 /* Used only for sni_authmode */
186
187#define MBEDTLS_SSL_LEGACY_RENEGOTIATION 0
188#define MBEDTLS_SSL_SECURE_RENEGOTIATION 1
189
190#define MBEDTLS_SSL_RENEGOTIATION_DISABLED 0
191#define MBEDTLS_SSL_RENEGOTIATION_ENABLED 1
192
193#define MBEDTLS_SSL_ANTI_REPLAY_DISABLED 0
194#define MBEDTLS_SSL_ANTI_REPLAY_ENABLED 1
195
196#define MBEDTLS_SSL_RENEGOTIATION_NOT_ENFORCED -1
197#define MBEDTLS_SSL_RENEGO_MAX_RECORDS_DEFAULT 16
198
199#define MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION 0
200#define MBEDTLS_SSL_LEGACY_ALLOW_RENEGOTIATION 1
201#define MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE 2
202
203#define MBEDTLS_SSL_TRUNC_HMAC_DISABLED 0
204#define MBEDTLS_SSL_TRUNC_HMAC_ENABLED 1
205#define MBEDTLS_SSL_TRUNCATED_HMAC_LEN 10 /* 80 bits, rfc 6066 section 7 */
206
207#define MBEDTLS_SSL_SESSION_TICKETS_DISABLED 0
208#define MBEDTLS_SSL_SESSION_TICKETS_ENABLED 1
209
210#define MBEDTLS_SSL_CBC_RECORD_SPLITTING_DISABLED 0
211#define MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED 1
212
213#define MBEDTLS_SSL_ARC4_ENABLED 0
214#define MBEDTLS_SSL_ARC4_DISABLED 1
215
216#define MBEDTLS_SSL_PRESET_DEFAULT 0
217#define MBEDTLS_SSL_PRESET_SUITEB 2
218
219#define MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED 1
220#define MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED 0
221
222#define MBEDTLS_SSL_DTLS_SRTP_MKI_UNSUPPORTED 0
223#define MBEDTLS_SSL_DTLS_SRTP_MKI_SUPPORTED 1
224
225/*
226 * Default range for DTLS retransmission timer value, in milliseconds.
227 * RFC 6347 4.2.4.1 says from 1 second to 60 seconds.
228 */
229#define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MIN 1000
230#define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MAX 60000
231
240#if !defined(MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME)
241#define MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME 86400
242#endif
243
244/*
245 * Maximum fragment length in bytes,
246 * determines the size of each of the two internal I/O buffers.
247 *
248 * Note: the RFC defines the default size of SSL / TLS messages. If you
249 * change the value here, other clients / servers may not be able to
250 * communicate with you anymore. Only change this value if you control
251 * both sides of the connection and have it reduced at both sides, or
252 * if you're using the Max Fragment Length extension and you know all your
253 * peers are using it too!
254 */
255#if !defined(MBEDTLS_SSL_MAX_CONTENT_LEN)
256#define MBEDTLS_SSL_MAX_CONTENT_LEN 16384
257#endif
258
259#if !defined(MBEDTLS_SSL_IN_CONTENT_LEN)
260#define MBEDTLS_SSL_IN_CONTENT_LEN MBEDTLS_SSL_MAX_CONTENT_LEN
261#endif
262
263#if !defined(MBEDTLS_SSL_OUT_CONTENT_LEN)
264#define MBEDTLS_SSL_OUT_CONTENT_LEN MBEDTLS_SSL_MAX_CONTENT_LEN
265#endif
266
267/*
268 * Maximum number of heap-allocated bytes for the purpose of
269 * DTLS handshake message reassembly and future message buffering.
270 */
271#if !defined(MBEDTLS_SSL_DTLS_MAX_BUFFERING)
272#define MBEDTLS_SSL_DTLS_MAX_BUFFERING 32768
273#endif
274
275/*
276 * Maximum length of CIDs for incoming and outgoing messages.
277 */
278#if !defined(MBEDTLS_SSL_CID_IN_LEN_MAX)
279#define MBEDTLS_SSL_CID_IN_LEN_MAX 32
280#endif
281
282#if !defined(MBEDTLS_SSL_CID_OUT_LEN_MAX)
283#define MBEDTLS_SSL_CID_OUT_LEN_MAX 32
284#endif
285
286#if !defined(MBEDTLS_SSL_CID_PADDING_GRANULARITY)
287#define MBEDTLS_SSL_CID_PADDING_GRANULARITY 16
288#endif
289
290#if !defined(MBEDTLS_SSL_TLS1_3_PADDING_GRANULARITY)
291#define MBEDTLS_SSL_TLS1_3_PADDING_GRANULARITY 1
292#endif
293
294/* \} name SECTION: Module settings */
295
296/*
297 * Length of the verify data for secure renegotiation
298 */
299#if defined(MBEDTLS_SSL_PROTO_SSL3)
300#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 36
301#else
302#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 12
303#endif
304
305/*
306 * Signaling ciphersuite values (SCSV)
307 */
308#define MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO 0xFF
309#define MBEDTLS_SSL_FALLBACK_SCSV_VALUE 0x5600
311/*
312 * Supported Signature and Hash algorithms (For TLS 1.2)
313 * RFC 5246 section 7.4.1.4.1
314 */
315#define MBEDTLS_SSL_HASH_NONE 0
316#define MBEDTLS_SSL_HASH_MD5 1
317#define MBEDTLS_SSL_HASH_SHA1 2
318#define MBEDTLS_SSL_HASH_SHA224 3
319#define MBEDTLS_SSL_HASH_SHA256 4
320#define MBEDTLS_SSL_HASH_SHA384 5
321#define MBEDTLS_SSL_HASH_SHA512 6
322
323#define MBEDTLS_SSL_SIG_ANON 0
324#define MBEDTLS_SSL_SIG_RSA 1
325#define MBEDTLS_SSL_SIG_ECDSA 3
326
327/*
328 * Client Certificate Types
329 * RFC 5246 section 7.4.4 plus RFC 4492 section 5.5
330 */
331#define MBEDTLS_SSL_CERT_TYPE_RSA_SIGN 1
332#define MBEDTLS_SSL_CERT_TYPE_ECDSA_SIGN 64
333
334/*
335 * Message, alert and handshake types
336 */
337#define MBEDTLS_SSL_MSG_CHANGE_CIPHER_SPEC 20
338#define MBEDTLS_SSL_MSG_ALERT 21
339#define MBEDTLS_SSL_MSG_HANDSHAKE 22
340#define MBEDTLS_SSL_MSG_APPLICATION_DATA 23
341#define MBEDTLS_SSL_MSG_CID 25
342
343#define MBEDTLS_SSL_ALERT_LEVEL_WARNING 1
344#define MBEDTLS_SSL_ALERT_LEVEL_FATAL 2
345
346#define MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY 0 /* 0x00 */
347#define MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE 10 /* 0x0A */
348#define MBEDTLS_SSL_ALERT_MSG_BAD_RECORD_MAC 20 /* 0x14 */
349#define MBEDTLS_SSL_ALERT_MSG_DECRYPTION_FAILED 21 /* 0x15 */
350#define MBEDTLS_SSL_ALERT_MSG_RECORD_OVERFLOW 22 /* 0x16 */
351#define MBEDTLS_SSL_ALERT_MSG_DECOMPRESSION_FAILURE 30 /* 0x1E */
352#define MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE 40 /* 0x28 */
353#define MBEDTLS_SSL_ALERT_MSG_NO_CERT 41 /* 0x29 */
354#define MBEDTLS_SSL_ALERT_MSG_BAD_CERT 42 /* 0x2A */
355#define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT 43 /* 0x2B */
356#define MBEDTLS_SSL_ALERT_MSG_CERT_REVOKED 44 /* 0x2C */
357#define MBEDTLS_SSL_ALERT_MSG_CERT_EXPIRED 45 /* 0x2D */
358#define MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN 46 /* 0x2E */
359#define MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER 47 /* 0x2F */
360#define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA 48 /* 0x30 */
361#define MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED 49 /* 0x31 */
362#define MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR 50 /* 0x32 */
363#define MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR 51 /* 0x33 */
364#define MBEDTLS_SSL_ALERT_MSG_EXPORT_RESTRICTION 60 /* 0x3C */
365#define MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION 70 /* 0x46 */
366#define MBEDTLS_SSL_ALERT_MSG_INSUFFICIENT_SECURITY 71 /* 0x47 */
367#define MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR 80 /* 0x50 */
368#define MBEDTLS_SSL_ALERT_MSG_INAPROPRIATE_FALLBACK 86 /* 0x56 */
369#define MBEDTLS_SSL_ALERT_MSG_USER_CANCELED 90 /* 0x5A */
370#define MBEDTLS_SSL_ALERT_MSG_NO_RENEGOTIATION 100 /* 0x64 */
371#define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT 110 /* 0x6E */
372#define MBEDTLS_SSL_ALERT_MSG_UNRECOGNIZED_NAME 112 /* 0x70 */
373#define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_PSK_IDENTITY 115 /* 0x73 */
374#define MBEDTLS_SSL_ALERT_MSG_NO_APPLICATION_PROTOCOL 120 /* 0x78 */
375
376#define MBEDTLS_SSL_HS_HELLO_REQUEST 0
377#define MBEDTLS_SSL_HS_CLIENT_HELLO 1
378#define MBEDTLS_SSL_HS_SERVER_HELLO 2
379#define MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST 3
380#define MBEDTLS_SSL_HS_NEW_SESSION_TICKET 4
381#define MBEDTLS_SSL_HS_CERTIFICATE 11
382#define MBEDTLS_SSL_HS_SERVER_KEY_EXCHANGE 12
383#define MBEDTLS_SSL_HS_CERTIFICATE_REQUEST 13
384#define MBEDTLS_SSL_HS_SERVER_HELLO_DONE 14
385#define MBEDTLS_SSL_HS_CERTIFICATE_VERIFY 15
386#define MBEDTLS_SSL_HS_CLIENT_KEY_EXCHANGE 16
387#define MBEDTLS_SSL_HS_FINISHED 20
388
389/*
390 * TLS extensions
391 */
392#define MBEDTLS_TLS_EXT_SERVERNAME 0
393#define MBEDTLS_TLS_EXT_SERVERNAME_HOSTNAME 0
394
395#define MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH 1
396
397#define MBEDTLS_TLS_EXT_TRUNCATED_HMAC 4
398
399#define MBEDTLS_TLS_EXT_SUPPORTED_ELLIPTIC_CURVES 10
400#define MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS 11
401
402#define MBEDTLS_TLS_EXT_SIG_ALG 13
403
404#define MBEDTLS_TLS_EXT_USE_SRTP 14
405
406#define MBEDTLS_TLS_EXT_ALPN 16
407
408#define MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC 22 /* 0x16 */
409#define MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET 0x0017 /* 23 */
410
411#define MBEDTLS_TLS_EXT_SESSION_TICKET 35
412
413/* The value of the CID extension is still TBD as of
414 * draft-ietf-tls-dtls-connection-id-05
415 * (https://tools.ietf.org/html/draft-ietf-tls-dtls-connection-id-05) */
416#define MBEDTLS_TLS_EXT_CID 254 /* TBD */
417
418#define MBEDTLS_TLS_EXT_ECJPAKE_KKPP 256 /* experimental */
419
420#define MBEDTLS_TLS_EXT_RENEGOTIATION_INFO 0xFF01
421
422/*
423 * Size defines
424 */
425#if !defined(MBEDTLS_PSK_MAX_LEN)
426#define MBEDTLS_PSK_MAX_LEN 32 /* 256 bits */
427#endif
428
429/* Dummy type used only for its size */
431{
432#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)
433 unsigned char _pms_rsa[48]; /* RFC 5246 8.1.1 */
434#endif
435#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)
436 unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]; /* RFC 5246 8.1.2 */
437#endif
438#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
439 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
440 defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
441 defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
442 unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]; /* RFC 4492 5.10 */
443#endif
444#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
445 unsigned char _pms_psk[4 + 2 * MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 2 */
446#endif
447#if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
449 + MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 3 */
450#endif
451#if defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)
452 unsigned char _pms_rsa_psk[52 + MBEDTLS_PSK_MAX_LEN]; /* RFC 4279 4 */
453#endif
454#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
456 + MBEDTLS_PSK_MAX_LEN]; /* RFC 5489 2 */
457#endif
458#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
459 unsigned char _pms_ecjpake[32]; /* Thread spec: SHA-256 output */
460#endif
461};
462
463#define MBEDTLS_PREMASTER_SIZE sizeof( union mbedtls_ssl_premaster_secret )
464
465#ifdef __cplusplus
466extern "C" {
467#endif
468
469/*
470 * SSL state machine
471 */
472typedef enum
473{
493}
495
496/*
497 * The tls_prf function types.
498 */
499typedef enum
500{
525typedef int mbedtls_ssl_send_t( void *ctx,
526 const unsigned char *buf,
527 size_t len );
528
548typedef int mbedtls_ssl_recv_t( void *ctx,
549 unsigned char *buf,
550 size_t len );
551
574typedef int mbedtls_ssl_recv_timeout_t( void *ctx,
575 unsigned char *buf,
576 size_t len,
577 uint32_t timeout );
600typedef void mbedtls_ssl_set_timer_t( void * ctx,
601 uint32_t int_ms,
602 uint32_t fin_ms );
603
615typedef int mbedtls_ssl_get_timer_t( void * ctx );
616
617/* Defined below */
621
622/* Defined in ssl_internal.h */
626#if defined(MBEDTLS_X509_CRT_PARSE_C)
628#endif
629#if defined(MBEDTLS_SSL_PROTO_DTLS)
631#endif
632
633#if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
634#if defined(MBEDTLS_X509_CRT_PARSE_C)
706typedef int mbedtls_ssl_async_sign_t( mbedtls_ssl_context *ssl,
707 mbedtls_x509_crt *cert,
708 mbedtls_md_type_t md_alg,
709 const unsigned char *hash,
710 size_t hash_len );
711
772typedef int mbedtls_ssl_async_decrypt_t( mbedtls_ssl_context *ssl,
773 mbedtls_x509_crt *cert,
774 const unsigned char *input,
775 size_t input_len );
776#endif /* MBEDTLS_X509_CRT_PARSE_C */
777
820typedef int mbedtls_ssl_async_resume_t( mbedtls_ssl_context *ssl,
821 unsigned char *output,
822 size_t *output_len,
823 size_t output_size );
824
842typedef void mbedtls_ssl_async_cancel_t( mbedtls_ssl_context *ssl );
843#endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
844
845#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
846 !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
847#define MBEDTLS_SSL_PEER_CERT_DIGEST_MAX_LEN 48
848#if defined(MBEDTLS_SHA256_C)
849#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA256
850#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 32
851#elif defined(MBEDTLS_SHA512_C)
852#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA384
853#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 48
854#elif defined(MBEDTLS_SHA1_C)
855#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA1
856#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 20
857#else
858/* This is already checked in check_config.h, but be sure. */
859#error "Bad configuration - need SHA-1, SHA-256 or SHA-512 enabled to compute digest of peer CRT."
860#endif
861#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED &&
862 !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
863
864#if defined(MBEDTLS_SSL_DTLS_SRTP)
865
866#define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH 255
867#define MBEDTLS_TLS_SRTP_MAX_PROFILE_LIST_LENGTH 4
868/*
869 * For code readability use a typedef for DTLS-SRTP profiles
870 *
871 * Use_srtp extension protection profiles values as defined in
872 * http://www.iana.org/assignments/srtp-protection/srtp-protection.xhtml
873 *
874 * Reminder: if this list is expanded mbedtls_ssl_check_srtp_profile_value
875 * must be updated too.
876 */
877#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80 ( (uint16_t) 0x0001)
878#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32 ( (uint16_t) 0x0002)
879#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80 ( (uint16_t) 0x0005)
880#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32 ( (uint16_t) 0x0006)
881/* This one is not iana defined, but for code readability. */
882#define MBEDTLS_TLS_SRTP_UNSET ( (uint16_t) 0x0000)
883
884typedef uint16_t mbedtls_ssl_srtp_profile;
885
886typedef struct mbedtls_dtls_srtp_info_t
887{
889 mbedtls_ssl_srtp_profile chosen_dtls_srtp_profile;
891 uint16_t mki_len;
893 unsigned char mki_value[MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH];
894}
895mbedtls_dtls_srtp_info;
896
897#endif /* MBEDTLS_SSL_DTLS_SRTP */
898
899/*
900 * This structure is used for storing current session data.
901 *
902 * Note: when changing this definition, we need to check and update:
903 * - in tests/suites/test_suite_ssl.function:
904 * ssl_populate_session() and ssl_serialize_session_save_load()
905 * - in library/ssl_tls.c:
906 * mbedtls_ssl_session_init() and mbedtls_ssl_session_free()
907 * mbedtls_ssl_session_save() and ssl_session_load()
908 * ssl_session_copy()
909 */
911{
912#if defined(MBEDTLS_HAVE_TIME)
914#endif
917 size_t id_len;
918 unsigned char id[32];
919 unsigned char master[48];
921#if defined(MBEDTLS_X509_CRT_PARSE_C)
922#if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
924#else /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
927 unsigned char *peer_cert_digest;
928 size_t peer_cert_digest_len;
929 mbedtls_md_type_t peer_cert_digest_type;
930#endif /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
931#endif /* MBEDTLS_X509_CRT_PARSE_C */
932 uint32_t verify_result;
934#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
935 unsigned char *ticket;
936 size_t ticket_len;
938#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_CLI_C */
939
940#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
941 unsigned char mfl_code;
942#endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
943
944#if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
946#endif /* MBEDTLS_SSL_TRUNCATED_HMAC */
947
948#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
950#endif
951};
952
957{
958 /* Group items by size (largest first) to minimize padding overhead */
959
960 /*
961 * Pointers
962 */
963
964 const int *ciphersuite_list[4];
967 void (*f_dbg)(void *, int, const char *, int, const char *);
968 void *p_dbg;
971 int (*f_rng)(void *, unsigned char *, size_t);
972 void *p_rng;
977 int (*f_set_cache)(void *, const mbedtls_ssl_session *);
978 void *p_cache;
980#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
982 int (*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
983 void *p_sni;
984#endif
985
986#if defined(MBEDTLS_X509_CRT_PARSE_C)
988 int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *);
989 void *p_vrfy;
990#endif
991
992#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
994 int (*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t);
995 void *p_psk;
996#endif
997
998#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1000 int (*f_cookie_write)( void *, unsigned char **, unsigned char *,
1001 const unsigned char *, size_t );
1003 int (*f_cookie_check)( void *, const unsigned char *, size_t,
1004 const unsigned char *, size_t );
1005 void *p_cookie;
1006#endif
1007
1008#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
1010 int (*f_ticket_write)( void *, const mbedtls_ssl_session *,
1011 unsigned char *, const unsigned char *, size_t *, uint32_t * );
1013 int (*f_ticket_parse)( void *, mbedtls_ssl_session *, unsigned char *, size_t);
1014 void *p_ticket;
1015#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
1016
1017#if defined(MBEDTLS_SSL_EXPORT_KEYS)
1019 int (*f_export_keys)( void *, const unsigned char *,
1020 const unsigned char *, size_t, size_t, size_t );
1023 int (*f_export_keys_ext)( void *, const unsigned char *,
1024 const unsigned char *, size_t, size_t, size_t,
1025 const unsigned char[32], const unsigned char[32],
1028#endif
1029
1030#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1031 size_t cid_len;
1032#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1033
1034#if defined(MBEDTLS_X509_CRT_PARSE_C)
1039#if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
1041 void *p_ca_cb;
1042#endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
1043#endif /* MBEDTLS_X509_CRT_PARSE_C */
1044
1045#if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
1046#if defined(MBEDTLS_X509_CRT_PARSE_C)
1047 mbedtls_ssl_async_sign_t *f_async_sign_start;
1048 mbedtls_ssl_async_decrypt_t *f_async_decrypt_start;
1049#endif /* MBEDTLS_X509_CRT_PARSE_C */
1050 mbedtls_ssl_async_resume_t *f_async_resume;
1051 mbedtls_ssl_async_cancel_t *f_async_cancel;
1052 void *p_async_config_data;
1053#endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
1054
1055#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
1056 const int *sig_hashes;
1057#endif
1058
1059#if defined(MBEDTLS_ECP_C)
1061#endif
1062
1063#if defined(MBEDTLS_DHM_C)
1066#endif
1067
1068#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
1069
1070#if defined(MBEDTLS_USE_PSA_CRYPTO)
1071 psa_key_id_t psk_opaque;
1077#endif /* MBEDTLS_USE_PSA_CRYPTO */
1078
1079 unsigned char *psk;
1083 size_t psk_len;
1089 unsigned char *psk_identity;
1100#endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
1101
1102#if defined(MBEDTLS_SSL_ALPN)
1103 const char **alpn_list;
1104#endif
1105
1106#if defined(MBEDTLS_SSL_DTLS_SRTP)
1108 const mbedtls_ssl_srtp_profile *dtls_srtp_profile_list;
1110 size_t dtls_srtp_profile_list_len;
1111#endif /* MBEDTLS_SSL_DTLS_SRTP */
1112
1113 /*
1114 * Numerical settings (int then char)
1115 */
1116
1117 uint32_t read_timeout;
1119#if defined(MBEDTLS_SSL_PROTO_DTLS)
1124#endif
1125
1126#if defined(MBEDTLS_SSL_RENEGOTIATION)
1128 unsigned char renego_period[8];
1130#endif
1131
1132#if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT)
1133 unsigned int badmac_limit;
1134#endif
1135
1136#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
1137 unsigned int dhm_min_bitlen;
1138#endif
1139
1140 unsigned char max_major_ver;
1141 unsigned char max_minor_ver;
1142 unsigned char min_major_ver;
1143 unsigned char min_minor_ver;
1145 /*
1146 * Flags (bitfields)
1147 */
1148
1149 unsigned int endpoint : 1;
1150 unsigned int transport : 1;
1151 unsigned int authmode : 2;
1152 /* needed even with renego disabled for LEGACY_BREAK_HANDSHAKE */
1153 unsigned int allow_legacy_renegotiation : 2 ;
1154#if defined(MBEDTLS_ARC4_C)
1155 unsigned int arc4_disabled : 1;
1156#endif
1157#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1158 unsigned int mfl_code : 3;
1159#endif
1160#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1161 unsigned int encrypt_then_mac : 1 ;
1162#endif
1163#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
1164 unsigned int extended_ms : 1;
1165#endif
1166#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1167 unsigned int anti_replay : 1;
1168#endif
1169#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
1170 unsigned int cbc_record_splitting : 1;
1171#endif
1172#if defined(MBEDTLS_SSL_RENEGOTIATION)
1173 unsigned int disable_renegotiation : 1;
1174#endif
1175#if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
1176 unsigned int trunc_hmac : 1;
1177#endif
1178#if defined(MBEDTLS_SSL_SESSION_TICKETS)
1179 unsigned int session_tickets : 1;
1180#endif
1181#if defined(MBEDTLS_SSL_FALLBACK_SCSV) && defined(MBEDTLS_SSL_CLI_C)
1182 unsigned int fallback : 1;
1183#endif
1184#if defined(MBEDTLS_SSL_SRV_C)
1185 unsigned int cert_req_ca_list : 1;
1187#endif
1188#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1189 unsigned int ignore_unexpected_cid : 1;
1192#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1193#if defined(MBEDTLS_SSL_DTLS_SRTP)
1194 unsigned int dtls_srtp_mki_support : 1; /* support having mki_value
1195 in the use_srtp extension */
1196#endif
1197};
1198
1200{
1203 /*
1204 * Miscellaneous
1205 */
1206 int state;
1207#if defined(MBEDTLS_SSL_RENEGOTIATION)
1212#endif /* MBEDTLS_SSL_RENEGOTIATION */
1213
1217#if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT)
1218 unsigned badmac_seen;
1219#endif /* MBEDTLS_SSL_DTLS_BADMAC_LIMIT */
1220
1221#if defined(MBEDTLS_X509_CRT_PARSE_C)
1223 int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *);
1224 void *p_vrfy;
1225#endif
1226
1232 void *p_bio;
1234 /*
1235 * Session layer
1236 */
1245 /*
1246 * Record layer transformations
1247 */
1253 /*
1254 * Timers
1255 */
1256 void *p_timer;
1261 /*
1262 * Record layer (incoming data)
1263 */
1264 unsigned char *in_buf;
1265 unsigned char *in_ctr;
1268 unsigned char *in_hdr;
1269#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1270 unsigned char *in_cid;
1272#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1273 unsigned char *in_len;
1274 unsigned char *in_iv;
1275 unsigned char *in_msg;
1276 unsigned char *in_offt;
1279 size_t in_msglen;
1280 size_t in_left;
1281#if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1282 size_t in_buf_len;
1283#endif
1284#if defined(MBEDTLS_SSL_PROTO_DTLS)
1285 uint16_t in_epoch;
1288#endif /* MBEDTLS_SSL_PROTO_DTLS */
1289#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1290 uint64_t in_window_top;
1291 uint64_t in_window;
1292#endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
1293
1294 size_t in_hslen;
1301#if defined(MBEDTLS_SSL_PROTO_DTLS)
1304#endif /* MBEDTLS_SSL_PROTO_DTLS */
1305
1306 /*
1307 * Record layer (outgoing data)
1308 */
1309 unsigned char *out_buf;
1310 unsigned char *out_ctr;
1311 unsigned char *out_hdr;
1312#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1313 unsigned char *out_cid;
1315#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1316 unsigned char *out_len;
1317 unsigned char *out_iv;
1318 unsigned char *out_msg;
1321 size_t out_msglen;
1322 size_t out_left;
1323#if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1324 size_t out_buf_len;
1325#endif
1326
1327 unsigned char cur_out_ctr[8];
1329#if defined(MBEDTLS_SSL_PROTO_DTLS)
1330 uint16_t mtu;
1331#endif /* MBEDTLS_SSL_PROTO_DTLS */
1332
1333#if defined(MBEDTLS_ZLIB_SUPPORT)
1334 unsigned char *compress_buf;
1335#endif /* MBEDTLS_ZLIB_SUPPORT */
1336#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
1337 signed char split_done;
1338#endif /* MBEDTLS_SSL_CBC_RECORD_SPLITTING */
1339
1340 /*
1341 * PKI layer
1342 */
1345 /*
1346 * User settings
1347 */
1348#if defined(MBEDTLS_X509_CRT_PARSE_C)
1349 char *hostname;
1351#endif /* MBEDTLS_X509_CRT_PARSE_C */
1352
1353#if defined(MBEDTLS_SSL_ALPN)
1354 const char *alpn_chosen;
1355#endif /* MBEDTLS_SSL_ALPN */
1356
1357#if defined(MBEDTLS_SSL_DTLS_SRTP)
1358 /*
1359 * use_srtp extension
1360 */
1361 mbedtls_dtls_srtp_info dtls_srtp_info;
1362#endif /* MBEDTLS_SSL_DTLS_SRTP */
1363
1364 /*
1365 * Information for DTLS hello verify
1366 */
1367#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1368 unsigned char *cli_id;
1369 size_t cli_id_len;
1370#endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
1371
1372 /*
1373 * Secure renegotiation
1374 */
1375 /* needed to know when to send extension on server */
1378#if defined(MBEDTLS_SSL_RENEGOTIATION)
1382#endif /* MBEDTLS_SSL_RENEGOTIATION */
1383
1384#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1385 /* CID configuration to use in subsequent handshakes. */
1386
1391 unsigned char own_cid[ MBEDTLS_SSL_CID_IN_LEN_MAX ];
1392 uint8_t own_cid_len;
1393 uint8_t negotiate_cid;
1397#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1398};
1399
1400#if defined(MBEDTLS_SSL_HW_RECORD_ACCEL)
1401
1402#if !defined(MBEDTLS_DEPRECATED_REMOVED)
1403
1404#define MBEDTLS_SSL_CHANNEL_OUTBOUND MBEDTLS_DEPRECATED_NUMERIC_CONSTANT( 0 )
1405#define MBEDTLS_SSL_CHANNEL_INBOUND MBEDTLS_DEPRECATED_NUMERIC_CONSTANT( 1 )
1406
1407#if defined(MBEDTLS_DEPRECATED_WARNING)
1408#define MBEDTLS_DEPRECATED __attribute__((deprecated))
1409#else
1410#define MBEDTLS_DEPRECATED
1411#endif /* MBEDTLS_DEPRECATED_WARNING */
1412
1413MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_init)(
1415 const unsigned char *key_enc, const unsigned char *key_dec,
1416 size_t keylen,
1417 const unsigned char *iv_enc, const unsigned char *iv_dec,
1418 size_t ivlen,
1419 const unsigned char *mac_enc, const unsigned char *mac_dec,
1420 size_t maclen);
1421MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_activate)(
1423 int direction );
1424MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_reset)(
1425 mbedtls_ssl_context *ssl );
1426MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_write)(
1427 mbedtls_ssl_context *ssl );
1428MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_read)(
1429 mbedtls_ssl_context *ssl );
1430MBEDTLS_DEPRECATED extern int (*mbedtls_ssl_hw_record_finish)(
1431 mbedtls_ssl_context *ssl );
1432
1433#undef MBEDTLS_DEPRECATED
1434#endif /* !MBEDTLS_DEPRECATED_REMOVED */
1435
1436#endif /* MBEDTLS_SSL_HW_RECORD_ACCEL */
1437
1446const char *mbedtls_ssl_get_ciphersuite_name( const int ciphersuite_id );
1447
1456int mbedtls_ssl_get_ciphersuite_id( const char *ciphersuite_name );
1457
1466
1488 const mbedtls_ssl_config *conf );
1489
1501
1509
1525
1553
1554#if defined(MBEDTLS_X509_CRT_PARSE_C)
1571 int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
1572 void *p_vrfy );
1573#endif /* MBEDTLS_X509_CRT_PARSE_C */
1574
1583 int (*f_rng)(void *, unsigned char *, size_t),
1584 void *p_rng );
1585
1601 void (*f_dbg)(void *, int, const char *, int, const char *),
1602 void *p_dbg );
1603
1635 void *p_bio,
1636 mbedtls_ssl_send_t *f_send,
1637 mbedtls_ssl_recv_t *f_recv,
1638 mbedtls_ssl_recv_timeout_t *f_recv_timeout );
1639
1640#if defined(MBEDTLS_SSL_PROTO_DTLS)
1641
1642#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1643
1644
1728int mbedtls_ssl_set_cid( mbedtls_ssl_context *ssl,
1729 int enable,
1730 unsigned char const *own_cid,
1731 size_t own_cid_len );
1732
1770int mbedtls_ssl_get_peer_cid( mbedtls_ssl_context *ssl,
1771 int *enabled,
1772 unsigned char peer_cid[ MBEDTLS_SSL_CID_OUT_LEN_MAX ],
1773 size_t *peer_cid_len );
1774
1775#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
1776
1819void mbedtls_ssl_set_mtu( mbedtls_ssl_context *ssl, uint16_t mtu );
1820#endif /* MBEDTLS_SSL_PROTO_DTLS */
1821
1822#if defined(MBEDTLS_X509_CRT_PARSE_C)
1842 int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *),
1843 void *p_vrfy );
1844#endif /* MBEDTLS_X509_CRT_PARSE_C */
1845
1863
1864#if defined(MBEDTLS_SSL_RECORD_CHECKING)
1910 unsigned char *buf,
1911 size_t buflen );
1912#endif /* MBEDTLS_SSL_RECORD_CHECKING */
1913
1935 void *p_timer,
1936 mbedtls_ssl_set_timer_t *f_set_timer,
1937 mbedtls_ssl_get_timer_t *f_get_timer );
1938
1958typedef int mbedtls_ssl_ticket_write_t( void *p_ticket,
1959 const mbedtls_ssl_session *session,
1960 unsigned char *start,
1961 const unsigned char *end,
1962 size_t *tlen,
1963 uint32_t *lifetime );
1964
1965#if defined(MBEDTLS_SSL_EXPORT_KEYS)
1986typedef int mbedtls_ssl_export_keys_t( void *p_expkey,
1987 const unsigned char *ms,
1988 const unsigned char *kb,
1989 size_t maclen,
1990 size_t keylen,
1991 size_t ivlen );
1992
2018typedef int mbedtls_ssl_export_keys_ext_t( void *p_expkey,
2019 const unsigned char *ms,
2020 const unsigned char *kb,
2021 size_t maclen,
2022 size_t keylen,
2023 size_t ivlen,
2024 const unsigned char client_random[32],
2025 const unsigned char server_random[32],
2026 mbedtls_tls_prf_types tls_prf_type );
2027#endif /* MBEDTLS_SSL_EXPORT_KEYS */
2028
2052typedef int mbedtls_ssl_ticket_parse_t( void *p_ticket,
2053 mbedtls_ssl_session *session,
2054 unsigned char *buf,
2055 size_t len );
2056
2057#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
2073 mbedtls_ssl_ticket_write_t *f_ticket_write,
2074 mbedtls_ssl_ticket_parse_t *f_ticket_parse,
2075 void *p_ticket );
2076#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */
2077
2078#if defined(MBEDTLS_SSL_EXPORT_KEYS)
2090 mbedtls_ssl_export_keys_t *f_export_keys,
2091 void *p_export_keys );
2092
2106 mbedtls_ssl_export_keys_ext_t *f_export_keys_ext,
2107 void *p_export_keys );
2108#endif /* MBEDTLS_SSL_EXPORT_KEYS */
2109
2110#if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
2141void mbedtls_ssl_conf_async_private_cb( mbedtls_ssl_config *conf,
2142 mbedtls_ssl_async_sign_t *f_async_sign,
2143 mbedtls_ssl_async_decrypt_t *f_async_decrypt,
2144 mbedtls_ssl_async_resume_t *f_async_resume,
2145 mbedtls_ssl_async_cancel_t *f_async_cancel,
2146 void *config_data );
2147
2156void *mbedtls_ssl_conf_get_async_config_data( const mbedtls_ssl_config *conf );
2157
2172void *mbedtls_ssl_get_async_operation_data( const mbedtls_ssl_context *ssl );
2173
2185void mbedtls_ssl_set_async_operation_data( mbedtls_ssl_context *ssl,
2186 void *ctx );
2187#endif /* MBEDTLS_SSL_ASYNC_PRIVATE */
2188
2203typedef int mbedtls_ssl_cookie_write_t( void *ctx,
2204 unsigned char **p, unsigned char *end,
2205 const unsigned char *info, size_t ilen );
2206
2220typedef int mbedtls_ssl_cookie_check_t( void *ctx,
2221 const unsigned char *cookie, size_t clen,
2222 const unsigned char *info, size_t ilen );
2223
2224#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
2254 mbedtls_ssl_cookie_write_t *f_cookie_write,
2255 mbedtls_ssl_cookie_check_t *f_cookie_check,
2256 void *p_cookie );
2257
2278 const unsigned char *info,
2279 size_t ilen );
2280
2281#endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */
2282
2283#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
2300#endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */
2301
2302#if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT)
2327#endif /* MBEDTLS_SSL_DTLS_BADMAC_LIMIT */
2328
2329#if defined(MBEDTLS_SSL_PROTO_DTLS)
2330
2360 unsigned allow_packing );
2361
2393void mbedtls_ssl_conf_handshake_timeout( mbedtls_ssl_config *conf, uint32_t min, uint32_t max );
2394#endif /* MBEDTLS_SSL_PROTO_DTLS */
2395
2396#if defined(MBEDTLS_SSL_SRV_C)
2435 void *p_cache,
2436 int (*f_get_cache)(void *, mbedtls_ssl_session *),
2437 int (*f_set_cache)(void *, const mbedtls_ssl_session *) );
2438#endif /* MBEDTLS_SSL_SRV_C */
2439
2440#if defined(MBEDTLS_SSL_CLI_C)
2456#endif /* MBEDTLS_SSL_CLI_C */
2457
2491 const unsigned char *buf,
2492 size_t len );
2493
2521 unsigned char *buf,
2522 size_t buf_len,
2523 size_t *olen );
2524
2541
2558 const int *ciphersuites );
2559
2560#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
2561#define MBEDTLS_SSL_UNEXPECTED_CID_IGNORE 0
2562#define MBEDTLS_SSL_UNEXPECTED_CID_FAIL 1
2595int mbedtls_ssl_conf_cid( mbedtls_ssl_config *conf, size_t len,
2596 int ignore_other_cids );
2597#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
2598
2619 const int *ciphersuites,
2620 int major, int minor );
2621
2622#if defined(MBEDTLS_X509_CRT_PARSE_C)
2634 const mbedtls_x509_crt_profile *profile );
2635
2648 mbedtls_x509_crt *ca_chain,
2649 mbedtls_x509_crl *ca_crl );
2650
2651#if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
2703void mbedtls_ssl_conf_ca_cb( mbedtls_ssl_config *conf,
2705 void *p_ca_cb );
2706#endif /* MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK */
2707
2745 mbedtls_x509_crt *own_cert,
2746 mbedtls_pk_context *pk_key );
2747#endif /* MBEDTLS_X509_CRT_PARSE_C */
2748
2749#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
2782 const unsigned char *psk, size_t psk_len,
2783 const unsigned char *psk_identity, size_t psk_identity_len );
2784
2785#if defined(MBEDTLS_USE_PSA_CRYPTO)
2822int mbedtls_ssl_conf_psk_opaque( mbedtls_ssl_config *conf,
2823 psa_key_id_t psk,
2824 const unsigned char *psk_identity,
2825 size_t psk_identity_len );
2826#endif /* MBEDTLS_USE_PSA_CRYPTO */
2827
2845 const unsigned char *psk, size_t psk_len );
2846
2847#if defined(MBEDTLS_USE_PSA_CRYPTO)
2868int mbedtls_ssl_set_hs_psk_opaque( mbedtls_ssl_context *ssl,
2869 psa_key_id_t psk );
2870#endif /* MBEDTLS_USE_PSA_CRYPTO */
2871
2911 int (*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *,
2912 size_t),
2913 void *p_psk );
2914#endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
2915
2916#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_SRV_C)
2917
2918#if !defined(MBEDTLS_DEPRECATED_REMOVED)
2919
2920#if defined(MBEDTLS_DEPRECATED_WARNING)
2921#define MBEDTLS_DEPRECATED __attribute__((deprecated))
2922#else
2923#define MBEDTLS_DEPRECATED
2924#endif
2925
2940 const char *dhm_P,
2941 const char *dhm_G );
2942
2943#endif /* MBEDTLS_DEPRECATED_REMOVED */
2944
2959 const unsigned char *dhm_P, size_t P_len,
2960 const unsigned char *dhm_G, size_t G_len );
2961
2972#endif /* MBEDTLS_DHM_C && defined(MBEDTLS_SSL_SRV_C) */
2973
2974#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
2984 unsigned int bitlen );
2985#endif /* MBEDTLS_DHM_C && MBEDTLS_SSL_CLI_C */
2986
2987#if defined(MBEDTLS_ECP_C)
3016 const mbedtls_ecp_group_id *curves );
3017#endif /* MBEDTLS_ECP_C */
3018
3019#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
3039 const int *hashes );
3040#endif /* MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED */
3041
3042#if defined(MBEDTLS_X509_CRT_PARSE_C)
3061int mbedtls_ssl_set_hostname( mbedtls_ssl_context *ssl, const char *hostname );
3062#endif /* MBEDTLS_X509_CRT_PARSE_C */
3063
3064#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
3078 mbedtls_x509_crt *own_cert,
3079 mbedtls_pk_context *pk_key );
3080
3093 mbedtls_x509_crt *ca_chain,
3094 mbedtls_x509_crl *ca_crl );
3095
3107 int authmode );
3108
3133 int (*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *,
3134 size_t),
3135 void *p_sni );
3136#endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION */
3137
3138#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
3156int mbedtls_ssl_set_hs_ecjpake_password( mbedtls_ssl_context *ssl,
3157 const unsigned char *pw,
3158 size_t pw_len );
3159#endif /*MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
3160
3161#if defined(MBEDTLS_SSL_ALPN)
3174int mbedtls_ssl_conf_alpn_protocols( mbedtls_ssl_config *conf, const char **protos );
3175
3186#endif /* MBEDTLS_SSL_ALPN */
3187
3188#if defined(MBEDTLS_SSL_DTLS_SRTP)
3189#if defined(MBEDTLS_DEBUG_C)
3190static inline const char *mbedtls_ssl_get_srtp_profile_as_string( mbedtls_ssl_srtp_profile profile )
3191{
3192 switch( profile )
3193 {
3194 case MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80:
3195 return( "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80" );
3196 case MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32:
3197 return( "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32" );
3198 case MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80:
3199 return( "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80" );
3200 case MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32:
3201 return( "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32" );
3202 default: break;
3203 }
3204 return( "" );
3205}
3206#endif /* MBEDTLS_DEBUG_C */
3220void mbedtls_ssl_conf_srtp_mki_value_supported( mbedtls_ssl_config *conf,
3221 int support_mki_value );
3222
3242int mbedtls_ssl_conf_dtls_srtp_protection_profiles
3243 ( mbedtls_ssl_config *conf,
3244 const mbedtls_ssl_srtp_profile *profiles );
3245
3262int mbedtls_ssl_dtls_srtp_set_mki_value( mbedtls_ssl_context *ssl,
3263 unsigned char *mki_value,
3264 uint16_t mki_len );
3283void mbedtls_ssl_get_dtls_srtp_negotiation_result( const mbedtls_ssl_context *ssl,
3284 mbedtls_dtls_srtp_info *dtls_srtp_info );
3285#endif /* MBEDTLS_SSL_DTLS_SRTP */
3286
3303void mbedtls_ssl_conf_max_version( mbedtls_ssl_config *conf, int major, int minor );
3304
3323void mbedtls_ssl_conf_min_version( mbedtls_ssl_config *conf, int major, int minor );
3324
3325#if defined(MBEDTLS_SSL_FALLBACK_SCSV) && defined(MBEDTLS_SSL_CLI_C)
3346#endif /* MBEDTLS_SSL_FALLBACK_SCSV && MBEDTLS_SSL_CLI_C */
3347
3348#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
3361#endif /* MBEDTLS_SSL_ENCRYPT_THEN_MAC */
3362
3363#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
3376#endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */
3377
3378#if defined(MBEDTLS_ARC4_C)
3395#endif /* MBEDTLS_ARC4_C */
3396
3397#if defined(MBEDTLS_SSL_SRV_C)
3408 char cert_req_ca_list );
3409#endif /* MBEDTLS_SSL_SRV_C */
3410
3411#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
3446int mbedtls_ssl_conf_max_frag_len( mbedtls_ssl_config *conf, unsigned char mfl_code );
3447#endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
3448
3449#if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
3459#endif /* MBEDTLS_SSL_TRUNCATED_HMAC */
3460
3461#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
3474#endif /* MBEDTLS_SSL_CBC_RECORD_SPLITTING */
3475
3476#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
3488#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_CLI_C */
3489
3490#if defined(MBEDTLS_SSL_RENEGOTIATION)
3509#endif /* MBEDTLS_SSL_RENEGOTIATION */
3510
3539
3540#if defined(MBEDTLS_SSL_RENEGOTIATION)
3579
3606 const unsigned char period[8] );
3607#endif /* MBEDTLS_SSL_RENEGOTIATION */
3608
3648
3665
3679
3688
3697
3712
3713#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
3728
3744
3745#if !defined(MBEDTLS_DEPRECATED_REMOVED)
3746
3747#if defined(MBEDTLS_DEPRECATED_WARNING)
3748#define MBEDTLS_DEPRECATED __attribute__((deprecated))
3749#else
3750#define MBEDTLS_DEPRECATED
3751#endif
3752
3768 const mbedtls_ssl_context *ssl );
3769#endif /* MBEDTLS_DEPRECATED_REMOVED */
3770#endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */
3771
3800
3801#if defined(MBEDTLS_X509_CRT_PARSE_C)
3833#endif /* MBEDTLS_X509_CRT_PARSE_C */
3834
3835#if defined(MBEDTLS_SSL_CLI_C)
3863#endif /* MBEDTLS_SSL_CLI_C */
3864
3916
3938
3939#if defined(MBEDTLS_SSL_RENEGOTIATION)
3964#endif /* MBEDTLS_SSL_RENEGOTIATION */
3965
4043int mbedtls_ssl_read( mbedtls_ssl_context *ssl, unsigned char *buf, size_t len );
4044
4105int mbedtls_ssl_write( mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len );
4106
4124 unsigned char level,
4125 unsigned char message );
4140
4147
4148#if defined(MBEDTLS_SSL_CONTEXT_SERIALIZATION)
4198 unsigned char *buf,
4199 size_t buf_len,
4200 size_t *olen );
4201
4268 const unsigned char *buf,
4269 size_t len );
4270#endif /* MBEDTLS_SSL_CONTEXT_SERIALIZATION */
4271
4283
4300 int endpoint, int transport, int preset );
4301
4308
4315
4326
4343 const unsigned char *secret, size_t slen,
4344 const char *label,
4345 const unsigned char *random, size_t rlen,
4346 unsigned char *dstbuf, size_t dlen );
4347
4348#ifdef __cplusplus
4349}
4350#endif
4351
4352#endif /* ssl.h */
Multi-precision integer library.
#define MBEDTLS_MPI_MAX_SIZE
Definition: bignum.h:80
Configuration options (set of defines)
Platform Security Architecture cryptography module.
This file contains Diffie-Hellman-Merkle (DHM) key exchange definitions and functions.
This file contains ECDH definitions and functions.
This file provides an API for Elliptic Curves over GF(P) (ECP).
#define MBEDTLS_ECP_MAX_BYTES
Definition: ecp.h:255
mbedtls_ecp_group_id
Definition: ecp.h:110
uint32_t psa_key_id_t
Definition: crypto_types.h:224
int(* mbedtls_x509_crt_ca_cb_t)(void *p_ctx, mbedtls_x509_crt const *child, mbedtls_x509_crt **candidate_cas)
The type of trusted certificate callbacks.
Definition: x509_crt.h:722
mbedtls_md_type_t
Supported message digests.
Definition: md.h:56
mbed TLS Platform time abstraction
time_t mbedtls_time_t
Definition: platform_time.h:51
MBEDTLS_DEPRECATED size_t mbedtls_ssl_get_max_frag_len(const mbedtls_ssl_context *ssl)
This function is a deprecated approach to getting the max fragment length. Its an alias for mbedtls_s...
void mbedtls_ssl_conf_cert_req_ca_list(mbedtls_ssl_config *conf, char cert_req_ca_list)
Whether to send a list of acceptable CAs in CertificateRequest messages. (Default: do send)
#define MBEDTLS_PSK_MAX_LEN
Definition: ssl.h:426
const mbedtls_x509_crt * mbedtls_ssl_get_peer_cert(const mbedtls_ssl_context *ssl)
Return the peer certificate from the current connection.
void mbedtls_ssl_conf_read_timeout(mbedtls_ssl_config *conf, uint32_t timeout)
Set the timeout period for mbedtls_ssl_read() (Default: no timeout.)
void mbedtls_ssl_conf_min_version(mbedtls_ssl_config *conf, int major, int minor)
Set the minimum accepted SSL/TLS protocol version (Default: TLS 1.0)
int mbedtls_ssl_ticket_write_t(void *p_ticket, const mbedtls_ssl_session *session, unsigned char *start, const unsigned char *end, size_t *tlen, uint32_t *lifetime)
Callback type: generate and write session ticket.
Definition: ssl.h:1958
void mbedtls_ssl_conf_extended_master_secret(mbedtls_ssl_config *conf, char ems)
Enable or disable Extended Master Secret negotiation. (Default: MBEDTLS_SSL_EXTENDED_MS_ENABLED)
void mbedtls_ssl_set_mtu(mbedtls_ssl_context *ssl, uint16_t mtu)
Set the Maximum Tranport Unit (MTU). Special value: 0 means unset (no limit). This represents the max...
int mbedtls_ssl_set_client_transport_id(mbedtls_ssl_context *ssl, const unsigned char *info, size_t ilen)
Set client's transport-level identification info. (Server only. DTLS only.)
void mbedtls_ssl_conf_renegotiation_period(mbedtls_ssl_config *conf, const unsigned char period[8])
Set record counter threshold for periodic renegotiation. (Default: 2^48 - 1)
#define MBEDTLS_SSL_CID_OUT_LEN_MAX
Definition: ssl.h:283
void mbedtls_ssl_conf_legacy_renegotiation(mbedtls_ssl_config *conf, int allow_legacy)
Prevent or allow legacy renegotiation. (Default: MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION)
void mbedtls_ssl_conf_psk_cb(mbedtls_ssl_config *conf, int(*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_psk)
Set the PSK callback (server-side only).
int mbedtls_ssl_conf_psk(mbedtls_ssl_config *conf, const unsigned char *psk, size_t psk_len, const unsigned char *psk_identity, size_t psk_identity_len)
Configure a pre-shared key (PSK) and identity to be used in PSK-based ciphersuites.
int mbedtls_ssl_session_save(const mbedtls_ssl_session *session, unsigned char *buf, size_t buf_len, size_t *olen)
Save session structure as serialized data in a buffer. On client, this can be used for saving session...
int mbedtls_ssl_session_reset(mbedtls_ssl_context *ssl)
Reset an already initialized SSL context for re-use while retaining application-set variables,...
int mbedtls_ssl_check_record(mbedtls_ssl_context const *ssl, unsigned char *buf, size_t buflen)
Check whether a buffer contains a valid and authentic record that has not been seen before....
const char * mbedtls_ssl_get_alpn_protocol(const mbedtls_ssl_context *ssl)
Get the name of the negotiated Application Layer Protocol. This function should be called after the h...
struct mbedtls_ssl_transform mbedtls_ssl_transform
Definition: ssl.h:623
void mbedtls_ssl_conf_cbc_record_splitting(mbedtls_ssl_config *conf, char split)
Enable / Disable 1/n-1 record splitting (Default: MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED)
void mbedtls_ssl_conf_renegotiation_enforced(mbedtls_ssl_config *conf, int max_records)
Enforce renegotiation requests. (Default: enforced, max_records = 16)
void mbedtls_ssl_free(mbedtls_ssl_context *ssl)
Free referenced items in an SSL context and clear memory.
void mbedtls_ssl_conf_transport(mbedtls_ssl_config *conf, int transport)
Set the transport type (TLS or DTLS). Default: TLS.
#define MBEDTLS_SSL_CID_IN_LEN_MAX
Definition: ssl.h:279
void mbedtls_ssl_set_timer_cb(mbedtls_ssl_context *ssl, void *p_timer, mbedtls_ssl_set_timer_t *f_set_timer, mbedtls_ssl_get_timer_t *f_get_timer)
Set the timer callbacks (Mandatory for DTLS.)
void mbedtls_ssl_set_hs_ca_chain(mbedtls_ssl_context *ssl, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate for the current handshake.
mbedtls_tls_prf_types
Definition: ssl.h:500
@ MBEDTLS_SSL_TLS_PRF_SHA384
Definition: ssl.h:504
@ MBEDTLS_SSL_TLS_PRF_SHA256
Definition: ssl.h:505
@ MBEDTLS_SSL_TLS_PRF_NONE
Definition: ssl.h:501
@ MBEDTLS_SSL_TLS_PRF_TLS1
Definition: ssl.h:503
@ MBEDTLS_SSL_TLS_PRF_SSL3
Definition: ssl.h:502
int mbedtls_ssl_send_t(void *ctx, const unsigned char *buf, size_t len)
Callback type: send data on the network.
Definition: ssl.h:525
void mbedtls_ssl_conf_sni(mbedtls_ssl_config *conf, int(*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_sni)
Set server side ServerName TLS extension callback (optional, server-side only).
mbedtls_ssl_states
Definition: ssl.h:473
@ MBEDTLS_SSL_CERTIFICATE_VERIFY
Definition: ssl.h:483
@ MBEDTLS_SSL_HANDSHAKE_OVER
Definition: ssl.h:490
@ MBEDTLS_SSL_SERVER_HELLO_DONE
Definition: ssl.h:480
@ MBEDTLS_SSL_SERVER_FINISHED
Definition: ssl.h:487
@ MBEDTLS_SSL_SERVER_KEY_EXCHANGE
Definition: ssl.h:478
@ MBEDTLS_SSL_SERVER_HELLO
Definition: ssl.h:476
@ MBEDTLS_SSL_CLIENT_KEY_EXCHANGE
Definition: ssl.h:482
@ MBEDTLS_SSL_CLIENT_HELLO
Definition: ssl.h:475
@ MBEDTLS_SSL_SERVER_CERTIFICATE
Definition: ssl.h:477
@ MBEDTLS_SSL_CERTIFICATE_REQUEST
Definition: ssl.h:479
@ MBEDTLS_SSL_SERVER_NEW_SESSION_TICKET
Definition: ssl.h:491
@ MBEDTLS_SSL_CLIENT_FINISHED
Definition: ssl.h:485
@ MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC
Definition: ssl.h:486
@ MBEDTLS_SSL_SERVER_HELLO_VERIFY_REQUEST_SENT
Definition: ssl.h:492
@ MBEDTLS_SSL_HANDSHAKE_WRAPUP
Definition: ssl.h:489
@ MBEDTLS_SSL_CLIENT_CHANGE_CIPHER_SPEC
Definition: ssl.h:484
@ MBEDTLS_SSL_HELLO_REQUEST
Definition: ssl.h:474
@ MBEDTLS_SSL_CLIENT_CERTIFICATE
Definition: ssl.h:481
@ MBEDTLS_SSL_FLUSH_BUFFERS
Definition: ssl.h:488
void mbedtls_ssl_set_verify(mbedtls_ssl_context *ssl, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set a connection-specific verification callback (optional).
void mbedtls_ssl_conf_endpoint(mbedtls_ssl_config *conf, int endpoint)
Set the current endpoint type.
int mbedtls_ssl_check_pending(const mbedtls_ssl_context *ssl)
Check if there is data already read from the underlying transport but not yet processed.
size_t mbedtls_ssl_get_input_max_frag_len(const mbedtls_ssl_context *ssl)
Return the maximum fragment length (payload, in bytes) for the input buffer. This is the negotiated m...
int mbedtls_ssl_send_alert_message(mbedtls_ssl_context *ssl, unsigned char level, unsigned char message)
Send an alert message.
const char * mbedtls_ssl_get_version(const mbedtls_ssl_context *ssl)
Return the current SSL version (SSLv3/TLSv1/etc)
int mbedtls_ssl_conf_dh_param_bin(mbedtls_ssl_config *conf, const unsigned char *dhm_P, size_t P_len, const unsigned char *dhm_G, size_t G_len)
Set the Diffie-Hellman public P and G values from big-endian binary presentations....
void mbedtls_ssl_conf_rng(mbedtls_ssl_config *conf, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Set the random number generator callback.
void mbedtls_ssl_conf_dtls_anti_replay(mbedtls_ssl_config *conf, char mode)
Enable or disable anti-replay protection for DTLS. (DTLS only, no effect on TLS.) Default: enabled.
int mbedtls_ssl_ticket_parse_t(void *p_ticket, mbedtls_ssl_session *session, unsigned char *buf, size_t len)
Callback type: parse and load session ticket.
Definition: ssl.h:2052
int mbedtls_ssl_renegotiate(mbedtls_ssl_context *ssl)
Initiate an SSL renegotiation on the running connection. Client: perform the renegotiation right now....
int mbedtls_ssl_handshake(mbedtls_ssl_context *ssl)
Perform the SSL handshake.
int mbedtls_ssl_conf_own_cert(mbedtls_ssl_config *conf, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate chain and private key.
struct mbedtls_ssl_sig_hash_set_t mbedtls_ssl_sig_hash_set_t
Definition: ssl.h:625
int mbedtls_ssl_set_hs_psk(mbedtls_ssl_context *ssl, const unsigned char *psk, size_t psk_len)
Set the pre-shared Key (PSK) for the current handshake.
uint32_t mbedtls_ssl_get_verify_result(const mbedtls_ssl_context *ssl)
Return the result of the certificate verification.
int mbedtls_ssl_session_load(mbedtls_ssl_session *session, const unsigned char *buf, size_t len)
Load serialized session data into a session structure. On client, this can be used for loading saved ...
int mbedtls_ssl_cookie_write_t(void *ctx, unsigned char **p, unsigned char *end, const unsigned char *info, size_t ilen)
Callback type: generate a cookie.
Definition: ssl.h:2203
void mbedtls_ssl_conf_authmode(mbedtls_ssl_config *conf, int authmode)
Set the certificate verification mode Default: NONE on server, REQUIRED on client.
void mbedtls_ssl_conf_dtls_cookies(mbedtls_ssl_config *conf, mbedtls_ssl_cookie_write_t *f_cookie_write, mbedtls_ssl_cookie_check_t *f_cookie_check, void *p_cookie)
Register callbacks for DTLS cookies (Server only. DTLS only.)
int mbedtls_ssl_get_max_out_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum outgoing record payload in bytes. This takes into account the config....
MBEDTLS_DEPRECATED int mbedtls_ssl_conf_dh_param(mbedtls_ssl_config *conf, const char *dhm_P, const char *dhm_G)
Set the Diffie-Hellman public P and G values, read as hexadecimal strings (server-side only) (Default...
int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Try to write exactly 'len' application data bytes.
struct mbedtls_ssl_handshake_params mbedtls_ssl_handshake_params
Definition: ssl.h:624
void mbedtls_ssl_set_timer_t(void *ctx, uint32_t int_ms, uint32_t fin_ms)
Callback type: set a pair of timers/delays to watch.
Definition: ssl.h:600
void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max)
Set retransmit timeout values for the DTLS handshake. (DTLS only, no effect on TLS....
int mbedtls_ssl_recv_timeout_t(void *ctx, unsigned char *buf, size_t len, uint32_t timeout)
Callback type: receive data from the network, with timeout.
Definition: ssl.h:574
void mbedtls_ssl_conf_sig_hashes(mbedtls_ssl_config *conf, const int *hashes)
Set the allowed hashes for signatures during the handshake. (Default: all available hashes except MD5...
void mbedtls_ssl_conf_truncated_hmac(mbedtls_ssl_config *conf, int truncate)
Activate negotiation of truncated HMAC (Default: MBEDTLS_SSL_TRUNC_HMAC_DISABLED)
void mbedtls_ssl_conf_session_tickets_cb(mbedtls_ssl_config *conf, mbedtls_ssl_ticket_write_t *f_ticket_write, mbedtls_ssl_ticket_parse_t *f_ticket_parse, void *p_ticket)
Configure SSL session ticket callbacks (server only). (Default: none.)
void mbedtls_ssl_config_free(mbedtls_ssl_config *conf)
Free an SSL configuration context.
void mbedtls_ssl_conf_cert_profile(mbedtls_ssl_config *conf, const mbedtls_x509_crt_profile *profile)
Set the X.509 security profile used for verification.
void mbedtls_ssl_session_init(mbedtls_ssl_session *session)
Initialize SSL session structure.
#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN
Definition: ssl.h:302
int mbedtls_ssl_context_load(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Load serialized connection data to an SSL context.
void mbedtls_ssl_set_hs_authmode(mbedtls_ssl_context *ssl, int authmode)
Set authmode for the current handshake.
void mbedtls_ssl_set_datagram_packing(mbedtls_ssl_context *ssl, unsigned allow_packing)
Allow or disallow packing of multiple handshake records within a single datagram.
void mbedtls_ssl_init(mbedtls_ssl_context *ssl)
Initialize an SSL context Just makes the context ready for mbedtls_ssl_setup() or mbedtls_ssl_free()
void mbedtls_ssl_conf_ca_chain(mbedtls_ssl_config *conf, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate.
void mbedtls_ssl_set_bio(mbedtls_ssl_context *ssl, void *p_bio, mbedtls_ssl_send_t *f_send, mbedtls_ssl_recv_t *f_recv, mbedtls_ssl_recv_timeout_t *f_recv_timeout)
Set the underlying BIO callbacks for write, read and read-with-timeout.
int mbedtls_ssl_export_keys_t(void *p_expkey, const unsigned char *ms, const unsigned char *kb, size_t maclen, size_t keylen, size_t ivlen)
Callback type: Export key block and master secret.
Definition: ssl.h:1986
const char * mbedtls_ssl_get_ciphersuite(const mbedtls_ssl_context *ssl)
Return the name of the current ciphersuite.
int mbedtls_ssl_set_session(mbedtls_ssl_context *ssl, const mbedtls_ssl_session *session)
Request resumption of session (client-side only) Session data is copied from presented session struct...
int mbedtls_ssl_get_record_expansion(const mbedtls_ssl_context *ssl)
Return the (maximum) number of bytes added by the record layer: header + encryption/MAC overhead (inc...
void mbedtls_ssl_conf_session_tickets(mbedtls_ssl_config *conf, int use_tickets)
Enable / Disable session tickets (client only). (Default: MBEDTLS_SSL_SESSION_TICKETS_ENABLED....
int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name)
Return the ID of the ciphersuite associated with the given name.
void mbedtls_ssl_conf_session_cache(mbedtls_ssl_config *conf, void *p_cache, int(*f_get_cache)(void *, mbedtls_ssl_session *), int(*f_set_cache)(void *, const mbedtls_ssl_session *))
Set the session cache callbacks (server-side only) If not set, no session resuming is done (except if...
void mbedtls_ssl_conf_dtls_badmac_limit(mbedtls_ssl_config *conf, unsigned limit)
Set a limit on the number of records with a bad MAC before terminating the connection....
int mbedtls_ssl_cookie_check_t(void *ctx, const unsigned char *cookie, size_t clen, const unsigned char *info, size_t ilen)
Callback type: verify a cookie.
Definition: ssl.h:2220
void mbedtls_ssl_conf_dhm_min_bitlen(mbedtls_ssl_config *conf, unsigned int bitlen)
Set the minimum length for Diffie-Hellman parameters. (Client-side only.) (Default: 1024 bits....
void mbedtls_ssl_conf_arc4_support(mbedtls_ssl_config *conf, char arc4)
Disable or enable support for RC4 (Default: MBEDTLS_SSL_ARC4_DISABLED)
int mbedtls_ssl_set_hs_own_cert(mbedtls_ssl_context *ssl, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate and key for the current handshake.
int mbedtls_ssl_config_defaults(mbedtls_ssl_config *conf, int endpoint, int transport, int preset)
Load reasonnable default SSL configuration values. (You need to call mbedtls_ssl_config_init() first....
int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len)
Read at most 'len' application data bytes.
void mbedtls_ssl_conf_ciphersuites_for_version(mbedtls_ssl_config *conf, const int *ciphersuites, int major, int minor)
Set the list of allowed ciphersuites and the preference order for a specific version of the protocol....
int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname)
Set or reset the hostname to check against the received server certificate. It sets the ServerName TL...
#define MBEDTLS_DEPRECATED
Definition: ssl.h:3750
int mbedtls_ssl_handshake_step(mbedtls_ssl_context *ssl)
Perform a single step of the SSL handshake.
void mbedtls_ssl_conf_renegotiation(mbedtls_ssl_config *conf, int renegotiation)
Enable / Disable renegotiation support for connection when initiated by peer (Default: MBEDTLS_SSL_RE...
void mbedtls_ssl_conf_dbg(mbedtls_ssl_config *conf, void(*f_dbg)(void *, int, const char *, int, const char *), void *p_dbg)
Set the debug callback.
void mbedtls_ssl_conf_export_keys_cb(mbedtls_ssl_config *conf, mbedtls_ssl_export_keys_t *f_export_keys, void *p_export_keys)
Configure key export callback. (Default: none.)
const char * mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id)
Return the name of the ciphersuite associated with the given ID.
int mbedtls_ssl_export_keys_ext_t(void *p_expkey, const unsigned char *ms, const unsigned char *kb, size_t maclen, size_t keylen, size_t ivlen, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type)
Callback type: Export key block, master secret, handshake randbytes and the tls_prf function used to ...
Definition: ssl.h:2018
void mbedtls_ssl_config_init(mbedtls_ssl_config *conf)
Initialize an SSL configuration context Just makes the context ready for mbedtls_ssl_config_defaults(...
const mbedtls_ssl_session * mbedtls_ssl_get_session_pointer(const mbedtls_ssl_context *ssl)
Get a pointer to the current session structure, for example to serialize it.
void mbedtls_ssl_conf_fallback(mbedtls_ssl_config *conf, char fallback)
Set the fallback flag (client-side only). (Default: MBEDTLS_SSL_IS_NOT_FALLBACK).
int mbedtls_ssl_context_save(mbedtls_ssl_context *ssl, unsigned char *buf, size_t buf_len, size_t *olen)
Save an active connection as serialized data in a buffer. This allows the freeing or re-using of the ...
int mbedtls_ssl_tls_prf(const mbedtls_tls_prf_types prf, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen)
TLS-PRF function for key derivation.
struct mbedtls_ssl_flight_item mbedtls_ssl_flight_item
Definition: ssl.h:630
size_t mbedtls_ssl_get_output_max_frag_len(const mbedtls_ssl_context *ssl)
Return the maximum fragment length (payload, in bytes) for the output buffer. For the client,...
int mbedtls_ssl_recv_t(void *ctx, unsigned char *buf, size_t len)
Callback type: receive data from the network.
Definition: ssl.h:548
void mbedtls_ssl_session_free(mbedtls_ssl_session *session)
Free referenced items in an SSL session including the peer certificate and clear memory.
int mbedtls_ssl_close_notify(mbedtls_ssl_context *ssl)
Notify the peer that the connection is being closed.
int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code)
Set the maximum fragment length to emit and/or negotiate. (Typical: the smaller of MBEDTLS_SSL_IN_CON...
void mbedtls_ssl_conf_ciphersuites(mbedtls_ssl_config *conf, const int *ciphersuites)
Set the list of allowed ciphersuites and the preference order. First in the list has the highest pref...
size_t mbedtls_ssl_get_bytes_avail(const mbedtls_ssl_context *ssl)
Return the number of application data bytes remaining to be read from the current record.
void mbedtls_ssl_conf_export_keys_ext_cb(mbedtls_ssl_config *conf, mbedtls_ssl_export_keys_ext_t *f_export_keys_ext, void *p_export_keys)
Configure extended key export callback. (Default: none.)
int mbedtls_ssl_get_session(const mbedtls_ssl_context *ssl, mbedtls_ssl_session *session)
Save session in order to resume it later (client-side only) Session data is copied to presented sessi...
int mbedtls_ssl_get_timer_t(void *ctx)
Callback type: get status of timers/delays.
Definition: ssl.h:615
void mbedtls_ssl_conf_curves(mbedtls_ssl_config *conf, const mbedtls_ecp_group_id *curves)
Set the allowed curves in order of preference. (Default: all defined curves.)
int mbedtls_ssl_conf_alpn_protocols(mbedtls_ssl_config *conf, const char **protos)
Set the supported Application Layer Protocols.
int mbedtls_ssl_conf_dh_param_ctx(mbedtls_ssl_config *conf, mbedtls_dhm_context *dhm_ctx)
Set the Diffie-Hellman public P and G values, read from existing context (server-side only)
struct mbedtls_ssl_key_cert mbedtls_ssl_key_cert
Definition: ssl.h:627
int mbedtls_ssl_setup(mbedtls_ssl_context *ssl, const mbedtls_ssl_config *conf)
Set up an SSL context for use.
void mbedtls_ssl_conf_encrypt_then_mac(mbedtls_ssl_config *conf, char etm)
Enable or disable Encrypt-then-MAC (Default: MBEDTLS_SSL_ETM_ENABLED)
void mbedtls_ssl_conf_max_version(mbedtls_ssl_config *conf, int major, int minor)
Set the maximum supported version sent from the client side and/or accepted at the server side (Defau...
void mbedtls_ssl_conf_verify(mbedtls_ssl_config *conf, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set the verification callback (Optional).
SSL Ciphersuites for mbed TLS.
The DHM context structure.
Definition: dhm.h:101
MPI structure.
Definition: bignum.h:185
Public key container.
Definition: pk.h:186
int(* f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t)
Definition: ssl.h:982
unsigned int cbc_record_splitting
Definition: ssl.h:1170
int(* f_cookie_check)(void *, const unsigned char *, size_t, const unsigned char *, size_t)
Definition: ssl.h:1003
size_t psk_identity_len
Definition: ssl.h:1094
unsigned int fallback
Definition: ssl.h:1182
unsigned int authmode
Definition: ssl.h:1151
void * p_ticket
Definition: ssl.h:1014
int renego_max_records
Definition: ssl.h:1127
unsigned char max_major_ver
Definition: ssl.h:1140
const int * ciphersuite_list[4]
Definition: ssl.h:964
void * p_sni
Definition: ssl.h:983
unsigned int session_tickets
Definition: ssl.h:1179
void * p_rng
Definition: ssl.h:972
void * p_cookie
Definition: ssl.h:1005
unsigned int trunc_hmac
Definition: ssl.h:1176
int(* f_set_cache)(void *, const mbedtls_ssl_session *)
Definition: ssl.h:977
uint32_t hs_timeout_min
Definition: ssl.h:1120
mbedtls_x509_crl * ca_crl
Definition: ssl.h:1038
int(* f_cookie_write)(void *, unsigned char **, unsigned char *, const unsigned char *, size_t)
Definition: ssl.h:1000
const mbedtls_ecp_group_id * curve_list
Definition: ssl.h:1060
unsigned char * psk_identity
Definition: ssl.h:1089
mbedtls_x509_crt * ca_chain
Definition: ssl.h:1037
int(* f_ticket_write)(void *, const mbedtls_ssl_session *, unsigned char *, const unsigned char *, size_t *, uint32_t *)
Definition: ssl.h:1010
unsigned char max_minor_ver
Definition: ssl.h:1141
void * p_export_keys
Definition: ssl.h:1027
unsigned char min_minor_ver
Definition: ssl.h:1143
unsigned int transport
Definition: ssl.h:1150
unsigned int mfl_code
Definition: ssl.h:1158
unsigned char * psk
Definition: ssl.h:1079
unsigned int arc4_disabled
Definition: ssl.h:1155
const mbedtls_x509_crt_profile * cert_profile
Definition: ssl.h:1035
unsigned int endpoint
Definition: ssl.h:1149
const int * sig_hashes
Definition: ssl.h:1056
unsigned int cert_req_ca_list
Definition: ssl.h:1185
uint32_t read_timeout
Definition: ssl.h:1117
unsigned int encrypt_then_mac
Definition: ssl.h:1161
int(* f_rng)(void *, unsigned char *, size_t)
Definition: ssl.h:971
int(* f_get_cache)(void *, mbedtls_ssl_session *)
Definition: ssl.h:975
unsigned int disable_renegotiation
Definition: ssl.h:1173
int(* f_ticket_parse)(void *, mbedtls_ssl_session *, unsigned char *, size_t)
Definition: ssl.h:1013
void(* f_dbg)(void *, int, const char *, int, const char *)
Definition: ssl.h:967
unsigned char renego_period[8]
Definition: ssl.h:1128
unsigned int badmac_limit
Definition: ssl.h:1133
int(* f_export_keys_ext)(void *, const unsigned char *, const unsigned char *, size_t, size_t, size_t, const unsigned char[32], const unsigned char[32], mbedtls_tls_prf_types)
Definition: ssl.h:1023
int(* f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *)
Definition: ssl.h:988
unsigned int dhm_min_bitlen
Definition: ssl.h:1137
const char ** alpn_list
Definition: ssl.h:1103
int(* f_export_keys)(void *, const unsigned char *, const unsigned char *, size_t, size_t, size_t)
Definition: ssl.h:1019
void * p_vrfy
Definition: ssl.h:989
void * p_cache
Definition: ssl.h:978
unsigned int extended_ms
Definition: ssl.h:1164
void * p_psk
Definition: ssl.h:995
size_t psk_len
Definition: ssl.h:1083
void * p_dbg
Definition: ssl.h:968
unsigned char min_major_ver
Definition: ssl.h:1142
mbedtls_mpi dhm_G
Definition: ssl.h:1065
uint32_t hs_timeout_max
Definition: ssl.h:1122
mbedtls_mpi dhm_P
Definition: ssl.h:1064
unsigned int anti_replay
Definition: ssl.h:1167
mbedtls_ssl_key_cert * key_cert
Definition: ssl.h:1036
unsigned int allow_legacy_renegotiation
Definition: ssl.h:1153
int(* f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t)
Definition: ssl.h:994
unsigned char * out_hdr
Definition: ssl.h:1311
size_t verify_data_len
Definition: ssl.h:1379
mbedtls_ssl_transform * transform_out
Definition: ssl.h:1249
uint64_t in_window
Definition: ssl.h:1291
signed char split_done
Definition: ssl.h:1337
uint8_t disable_datagram_packing
Definition: ssl.h:1302
mbedtls_ssl_session * session_in
Definition: ssl.h:1237
mbedtls_ssl_set_timer_t * f_set_timer
Definition: ssl.h:1258
unsigned char * cli_id
Definition: ssl.h:1368
size_t cli_id_len
Definition: ssl.h:1369
mbedtls_ssl_session * session
Definition: ssl.h:1239
char * hostname
Definition: ssl.h:1349
unsigned char cur_out_ctr[8]
Definition: ssl.h:1327
unsigned char * out_len
Definition: ssl.h:1316
mbedtls_ssl_get_timer_t * f_get_timer
Definition: ssl.h:1259
mbedtls_ssl_transform * transform
Definition: ssl.h:1250
char own_verify_data[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN]
Definition: ssl.h:1380
mbedtls_ssl_send_t * f_send
Definition: ssl.h:1227
unsigned char * out_msg
Definition: ssl.h:1318
int(* f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *)
Definition: ssl.h:1223
void * p_vrfy
Definition: ssl.h:1224
mbedtls_ssl_session * session_negotiate
Definition: ssl.h:1240
char peer_verify_data[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN]
Definition: ssl.h:1381
unsigned char * in_iv
Definition: ssl.h:1274
unsigned char * out_buf
Definition: ssl.h:1309
unsigned char * in_buf
Definition: ssl.h:1264
const char * alpn_chosen
Definition: ssl.h:1354
size_t out_left
Definition: ssl.h:1322
size_t in_hslen
Definition: ssl.h:1294
mbedtls_ssl_session * session_out
Definition: ssl.h:1238
size_t next_record_offset
Definition: ssl.h:1286
uint64_t in_window_top
Definition: ssl.h:1290
unsigned char * in_msg
Definition: ssl.h:1275
size_t out_msglen
Definition: ssl.h:1321
mbedtls_ssl_recv_t * f_recv
Definition: ssl.h:1228
int renego_records_seen
Definition: ssl.h:1209
unsigned char * out_ctr
Definition: ssl.h:1310
unsigned char * out_iv
Definition: ssl.h:1317
unsigned char * in_ctr
Definition: ssl.h:1265
mbedtls_ssl_recv_timeout_t * f_recv_timeout
Definition: ssl.h:1229
unsigned char * in_hdr
Definition: ssl.h:1268
mbedtls_ssl_transform * transform_in
Definition: ssl.h:1248
mbedtls_ssl_handshake_params * handshake
Definition: ssl.h:1242
int secure_renegotiation
Definition: ssl.h:1376
mbedtls_ssl_transform * transform_negotiate
Definition: ssl.h:1251
unsigned badmac_seen
Definition: ssl.h:1218
size_t in_msglen
Definition: ssl.h:1279
void * p_timer
Definition: ssl.h:1256
uint16_t in_epoch
Definition: ssl.h:1285
size_t in_left
Definition: ssl.h:1280
void * p_bio
Definition: ssl.h:1232
unsigned char * in_offt
Definition: ssl.h:1276
unsigned char * in_len
Definition: ssl.h:1273
uint16_t mtu
Definition: ssl.h:1330
const mbedtls_ssl_config * conf
Definition: ssl.h:1201
int keep_current_message
Definition: ssl.h:1298
uint32_t ticket_lifetime
Definition: ssl.h:937
mbedtls_x509_crt * peer_cert
Definition: ssl.h:923
size_t ticket_len
Definition: ssl.h:936
uint32_t verify_result
Definition: ssl.h:932
mbedtls_time_t start
Definition: ssl.h:913
unsigned char mfl_code
Definition: ssl.h:941
int encrypt_then_mac
Definition: ssl.h:949
size_t id_len
Definition: ssl.h:917
unsigned char * ticket
Definition: ssl.h:935
unsigned char master[48]
Definition: ssl.h:919
unsigned char _pms_ecdhe_psk[4+MBEDTLS_ECP_MAX_BYTES+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:456
unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]
Definition: ssl.h:436
unsigned char _pms_psk[4+2 *MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:445
unsigned char _pms_rsa_psk[52+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:452
unsigned char _pms_rsa[48]
Definition: ssl.h:433
unsigned char _pms_dhe_psk[4+MBEDTLS_MPI_MAX_SIZE+MBEDTLS_PSK_MAX_LEN]
Definition: ssl.h:449
unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]
Definition: ssl.h:442
X.509 certificate revocation list parsing.
X.509 certificate parsing and writing.