13#if !defined(MBEDTLS_CONFIG_FILE)
16#include MBEDTLS_CONFIG_FILE
24#if defined(MBEDTLS_X509_CRT_PARSE_C)
29#if defined(MBEDTLS_DHM_C)
38#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C)
42#if defined(MBEDTLS_ZLIB_SUPPORT)
44#if defined(MBEDTLS_DEPRECATED_WARNING)
46 "Record compression support via MBEDTLS_ZLIB_SUPPORT is deprecated and will be removed in the next major revision of the library"
49#if defined(MBEDTLS_DEPRECATED_REMOVED)
51 "Record compression support via MBEDTLS_ZLIB_SUPPORT is deprecated and cannot be used if MBEDTLS_DEPRECATED_REMOVED is set"
57#if defined(MBEDTLS_HAVE_TIME)
61#if defined(MBEDTLS_USE_PSA_CRYPTO)
69#define MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE -0x7080
71#define MBEDTLS_ERR_SSL_BAD_INPUT_DATA -0x7100
73#define MBEDTLS_ERR_SSL_INVALID_MAC -0x7180
75#define MBEDTLS_ERR_SSL_INVALID_RECORD -0x7200
77#define MBEDTLS_ERR_SSL_CONN_EOF -0x7280
79#define MBEDTLS_ERR_SSL_UNKNOWN_CIPHER -0x7300
81#define MBEDTLS_ERR_SSL_NO_CIPHER_CHOSEN -0x7380
83#define MBEDTLS_ERR_SSL_NO_RNG -0x7400
85#define MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE -0x7480
87#define MBEDTLS_ERR_SSL_CERTIFICATE_TOO_LARGE -0x7500
89#define MBEDTLS_ERR_SSL_CERTIFICATE_REQUIRED -0x7580
91#define MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED -0x7600
93#define MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED -0x7680
95#define MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE -0x7700
97#define MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE -0x7780
99#define MBEDTLS_ERR_SSL_PEER_VERIFY_FAILED -0x7800
101#define MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY -0x7880
103#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_HELLO -0x7900
105#define MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO -0x7980
107#define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE -0x7A00
109#define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_REQUEST -0x7A80
111#define MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE -0x7B00
113#define MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO_DONE -0x7B80
115#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE -0x7C00
117#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_RP -0x7C80
119#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_CS -0x7D00
121#define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_VERIFY -0x7D80
123#define MBEDTLS_ERR_SSL_BAD_HS_CHANGE_CIPHER_SPEC -0x7E00
125#define MBEDTLS_ERR_SSL_BAD_HS_FINISHED -0x7E80
127#define MBEDTLS_ERR_SSL_ALLOC_FAILED -0x7F00
129#define MBEDTLS_ERR_SSL_HW_ACCEL_FAILED -0x7F80
131#define MBEDTLS_ERR_SSL_HW_ACCEL_FALLTHROUGH -0x6F80
133#define MBEDTLS_ERR_SSL_COMPRESSION_FAILED -0x6F00
135#define MBEDTLS_ERR_SSL_BAD_HS_PROTOCOL_VERSION -0x6E80
137#define MBEDTLS_ERR_SSL_BAD_HS_NEW_SESSION_TICKET -0x6E00
139#define MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED -0x6D80
141#define MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH -0x6D00
143#define MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY -0x6C80
145#define MBEDTLS_ERR_SSL_INTERNAL_ERROR -0x6C00
147#define MBEDTLS_ERR_SSL_COUNTER_WRAPPING -0x6B80
149#define MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO -0x6B00
151#define MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED -0x6A80
153#define MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL -0x6A00
155#define MBEDTLS_ERR_SSL_NO_USABLE_CIPHERSUITE -0x6980
157#define MBEDTLS_ERR_SSL_WANT_READ -0x6900
159#define MBEDTLS_ERR_SSL_WANT_WRITE -0x6880
161#define MBEDTLS_ERR_SSL_TIMEOUT -0x6800
163#define MBEDTLS_ERR_SSL_CLIENT_RECONNECT -0x6780
165#define MBEDTLS_ERR_SSL_UNEXPECTED_RECORD -0x6700
167#define MBEDTLS_ERR_SSL_NON_FATAL -0x6680
169#define MBEDTLS_ERR_SSL_INVALID_VERIFY_HASH -0x6600
171#define MBEDTLS_ERR_SSL_CONTINUE_PROCESSING -0x6580
173#define MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS -0x6500
175#define MBEDTLS_ERR_SSL_EARLY_MESSAGE -0x6480
177#define MBEDTLS_ERR_SSL_UNEXPECTED_CID -0x6000
179#define MBEDTLS_ERR_SSL_VERSION_MISMATCH -0x5F00
181#define MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS -0x7000
183#define MBEDTLS_ERR_SSL_BAD_CONFIG -0x5E80
185#define MBEDTLS_ERR_SSL_CACHE_ENTRY_NOT_FOUND -0x5E00
190#define MBEDTLS_SSL_MAJOR_VERSION_3 3
191#define MBEDTLS_SSL_MINOR_VERSION_0 0
192#define MBEDTLS_SSL_MINOR_VERSION_1 1
193#define MBEDTLS_SSL_MINOR_VERSION_2 2
194#define MBEDTLS_SSL_MINOR_VERSION_3 3
195#define MBEDTLS_SSL_MINOR_VERSION_4 4
197#define MBEDTLS_SSL_TRANSPORT_STREAM 0
198#define MBEDTLS_SSL_TRANSPORT_DATAGRAM 1
200#define MBEDTLS_SSL_MAX_HOST_NAME_LEN 255
201#define MBEDTLS_SSL_MAX_ALPN_NAME_LEN 255
203#define MBEDTLS_SSL_MAX_ALPN_LIST_LEN 65535
207#define MBEDTLS_SSL_MAX_FRAG_LEN_NONE 0
208#define MBEDTLS_SSL_MAX_FRAG_LEN_512 1
209#define MBEDTLS_SSL_MAX_FRAG_LEN_1024 2
210#define MBEDTLS_SSL_MAX_FRAG_LEN_2048 3
211#define MBEDTLS_SSL_MAX_FRAG_LEN_4096 4
212#define MBEDTLS_SSL_MAX_FRAG_LEN_INVALID 5
214#define MBEDTLS_SSL_IS_CLIENT 0
215#define MBEDTLS_SSL_IS_SERVER 1
217#define MBEDTLS_SSL_IS_NOT_FALLBACK 0
218#define MBEDTLS_SSL_IS_FALLBACK 1
220#define MBEDTLS_SSL_EXTENDED_MS_DISABLED 0
221#define MBEDTLS_SSL_EXTENDED_MS_ENABLED 1
223#define MBEDTLS_SSL_CID_DISABLED 0
224#define MBEDTLS_SSL_CID_ENABLED 1
226#define MBEDTLS_SSL_ETM_DISABLED 0
227#define MBEDTLS_SSL_ETM_ENABLED 1
229#define MBEDTLS_SSL_COMPRESS_NULL 0
230#define MBEDTLS_SSL_COMPRESS_DEFLATE 1
232#define MBEDTLS_SSL_VERIFY_NONE 0
233#define MBEDTLS_SSL_VERIFY_OPTIONAL 1
234#define MBEDTLS_SSL_VERIFY_REQUIRED 2
235#define MBEDTLS_SSL_VERIFY_UNSET 3
237#define MBEDTLS_SSL_LEGACY_RENEGOTIATION 0
238#define MBEDTLS_SSL_SECURE_RENEGOTIATION 1
240#define MBEDTLS_SSL_RENEGOTIATION_DISABLED 0
241#define MBEDTLS_SSL_RENEGOTIATION_ENABLED 1
243#define MBEDTLS_SSL_ANTI_REPLAY_DISABLED 0
244#define MBEDTLS_SSL_ANTI_REPLAY_ENABLED 1
246#define MBEDTLS_SSL_RENEGOTIATION_NOT_ENFORCED -1
247#define MBEDTLS_SSL_RENEGO_MAX_RECORDS_DEFAULT 16
249#define MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION 0
250#define MBEDTLS_SSL_LEGACY_ALLOW_RENEGOTIATION 1
251#define MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE 2
253#define MBEDTLS_SSL_TRUNC_HMAC_DISABLED 0
254#define MBEDTLS_SSL_TRUNC_HMAC_ENABLED 1
255#define MBEDTLS_SSL_TRUNCATED_HMAC_LEN 10
257#define MBEDTLS_SSL_SESSION_TICKETS_DISABLED 0
258#define MBEDTLS_SSL_SESSION_TICKETS_ENABLED 1
260#define MBEDTLS_SSL_CBC_RECORD_SPLITTING_DISABLED 0
261#define MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED 1
263#define MBEDTLS_SSL_ARC4_ENABLED 0
264#define MBEDTLS_SSL_ARC4_DISABLED 1
266#define MBEDTLS_SSL_PRESET_DEFAULT 0
267#define MBEDTLS_SSL_PRESET_SUITEB 2
269#define MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED 1
270#define MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED 0
272#define MBEDTLS_SSL_DTLS_SRTP_MKI_UNSUPPORTED 0
273#define MBEDTLS_SSL_DTLS_SRTP_MKI_SUPPORTED 1
279#define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MIN 1000
280#define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MAX 60000
290#if !defined(MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME)
291#define MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME 86400
305#if !defined(MBEDTLS_SSL_MAX_CONTENT_LEN)
306#define MBEDTLS_SSL_MAX_CONTENT_LEN 16384
309#if !defined(MBEDTLS_SSL_IN_CONTENT_LEN)
310#define MBEDTLS_SSL_IN_CONTENT_LEN MBEDTLS_SSL_MAX_CONTENT_LEN
313#if !defined(MBEDTLS_SSL_OUT_CONTENT_LEN)
314#define MBEDTLS_SSL_OUT_CONTENT_LEN MBEDTLS_SSL_MAX_CONTENT_LEN
321#if !defined(MBEDTLS_SSL_DTLS_MAX_BUFFERING)
322#define MBEDTLS_SSL_DTLS_MAX_BUFFERING 32768
328#if !defined(MBEDTLS_SSL_CID_IN_LEN_MAX)
329#define MBEDTLS_SSL_CID_IN_LEN_MAX 32
332#if !defined(MBEDTLS_SSL_CID_OUT_LEN_MAX)
333#define MBEDTLS_SSL_CID_OUT_LEN_MAX 32
336#if !defined(MBEDTLS_SSL_CID_PADDING_GRANULARITY)
337#define MBEDTLS_SSL_CID_PADDING_GRANULARITY 16
340#if !defined(MBEDTLS_SSL_TLS1_3_PADDING_GRANULARITY)
341#define MBEDTLS_SSL_TLS1_3_PADDING_GRANULARITY 1
349#if defined(MBEDTLS_SSL_PROTO_SSL3)
350#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 36
352#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 12
358#define MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO 0xFF
359#define MBEDTLS_SSL_FALLBACK_SCSV_VALUE 0x5600
365#define MBEDTLS_SSL_HASH_NONE 0
366#define MBEDTLS_SSL_HASH_MD5 1
367#define MBEDTLS_SSL_HASH_SHA1 2
368#define MBEDTLS_SSL_HASH_SHA224 3
369#define MBEDTLS_SSL_HASH_SHA256 4
370#define MBEDTLS_SSL_HASH_SHA384 5
371#define MBEDTLS_SSL_HASH_SHA512 6
373#define MBEDTLS_SSL_SIG_ANON 0
374#define MBEDTLS_SSL_SIG_RSA 1
375#define MBEDTLS_SSL_SIG_ECDSA 3
381#define MBEDTLS_SSL_CERT_TYPE_RSA_SIGN 1
382#define MBEDTLS_SSL_CERT_TYPE_ECDSA_SIGN 64
387#define MBEDTLS_SSL_MSG_CHANGE_CIPHER_SPEC 20
388#define MBEDTLS_SSL_MSG_ALERT 21
389#define MBEDTLS_SSL_MSG_HANDSHAKE 22
390#define MBEDTLS_SSL_MSG_APPLICATION_DATA 23
391#define MBEDTLS_SSL_MSG_CID 25
393#define MBEDTLS_SSL_ALERT_LEVEL_WARNING 1
394#define MBEDTLS_SSL_ALERT_LEVEL_FATAL 2
396#define MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY 0
397#define MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE 10
398#define MBEDTLS_SSL_ALERT_MSG_BAD_RECORD_MAC 20
399#define MBEDTLS_SSL_ALERT_MSG_DECRYPTION_FAILED 21
400#define MBEDTLS_SSL_ALERT_MSG_RECORD_OVERFLOW 22
401#define MBEDTLS_SSL_ALERT_MSG_DECOMPRESSION_FAILURE 30
402#define MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE 40
403#define MBEDTLS_SSL_ALERT_MSG_NO_CERT 41
404#define MBEDTLS_SSL_ALERT_MSG_BAD_CERT 42
405#define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT 43
406#define MBEDTLS_SSL_ALERT_MSG_CERT_REVOKED 44
407#define MBEDTLS_SSL_ALERT_MSG_CERT_EXPIRED 45
408#define MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN 46
409#define MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER 47
410#define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA 48
411#define MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED 49
412#define MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR 50
413#define MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR 51
414#define MBEDTLS_SSL_ALERT_MSG_EXPORT_RESTRICTION 60
415#define MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION 70
416#define MBEDTLS_SSL_ALERT_MSG_INSUFFICIENT_SECURITY 71
417#define MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR 80
418#define MBEDTLS_SSL_ALERT_MSG_INAPROPRIATE_FALLBACK 86
419#define MBEDTLS_SSL_ALERT_MSG_USER_CANCELED 90
420#define MBEDTLS_SSL_ALERT_MSG_NO_RENEGOTIATION 100
421#define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT 110
422#define MBEDTLS_SSL_ALERT_MSG_UNRECOGNIZED_NAME 112
423#define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_PSK_IDENTITY 115
424#define MBEDTLS_SSL_ALERT_MSG_NO_APPLICATION_PROTOCOL 120
426#define MBEDTLS_SSL_HS_HELLO_REQUEST 0
427#define MBEDTLS_SSL_HS_CLIENT_HELLO 1
428#define MBEDTLS_SSL_HS_SERVER_HELLO 2
429#define MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST 3
430#define MBEDTLS_SSL_HS_NEW_SESSION_TICKET 4
431#define MBEDTLS_SSL_HS_CERTIFICATE 11
432#define MBEDTLS_SSL_HS_SERVER_KEY_EXCHANGE 12
433#define MBEDTLS_SSL_HS_CERTIFICATE_REQUEST 13
434#define MBEDTLS_SSL_HS_SERVER_HELLO_DONE 14
435#define MBEDTLS_SSL_HS_CERTIFICATE_VERIFY 15
436#define MBEDTLS_SSL_HS_CLIENT_KEY_EXCHANGE 16
437#define MBEDTLS_SSL_HS_FINISHED 20
442#define MBEDTLS_TLS_EXT_SERVERNAME 0
443#define MBEDTLS_TLS_EXT_SERVERNAME_HOSTNAME 0
445#define MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH 1
447#define MBEDTLS_TLS_EXT_TRUNCATED_HMAC 4
449#define MBEDTLS_TLS_EXT_SUPPORTED_ELLIPTIC_CURVES 10
450#define MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS 11
452#define MBEDTLS_TLS_EXT_SIG_ALG 13
454#define MBEDTLS_TLS_EXT_USE_SRTP 14
456#define MBEDTLS_TLS_EXT_ALPN 16
458#define MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC 22
459#define MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET 0x0017
461#define MBEDTLS_TLS_EXT_SESSION_TICKET 35
470#if !defined(MBEDTLS_TLS_EXT_CID)
471#define MBEDTLS_TLS_EXT_CID 254
474#define MBEDTLS_TLS_EXT_ECJPAKE_KKPP 256
476#define MBEDTLS_TLS_EXT_RENEGOTIATION_INFO 0xFF01
481#if !defined(MBEDTLS_PSK_MAX_LEN)
482#define MBEDTLS_PSK_MAX_LEN 32
488#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)
491#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)
494#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
495 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
496 defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
497 defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
500#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
503#if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
507#if defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)
510#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
514#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
515 unsigned char _pms_ecjpake[32];
519#define MBEDTLS_PREMASTER_SIZE sizeof(union mbedtls_ssl_premaster_secret)
580 const unsigned char *buf,
681#if defined(MBEDTLS_X509_CRT_PARSE_C)
684#if defined(MBEDTLS_SSL_PROTO_DTLS)
688#if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
689#if defined(MBEDTLS_X509_CRT_PARSE_C)
764 const unsigned char *hash,
829 const unsigned char *input,
876 unsigned char *output,
900#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \
901 !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
902#define MBEDTLS_SSL_PEER_CERT_DIGEST_MAX_LEN 48
903#if defined(MBEDTLS_SHA256_C)
904#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA256
905#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 32
906#elif defined(MBEDTLS_SHA512_C)
907#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA384
908#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 48
909#elif defined(MBEDTLS_SHA1_C)
910#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA1
911#define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 20
914#error "Bad configuration - need SHA-1, SHA-256 or SHA-512 enabled to compute digest of peer CRT."
919#if defined(MBEDTLS_SSL_DTLS_SRTP)
921#define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH 255
922#define MBEDTLS_TLS_SRTP_MAX_PROFILE_LIST_LENGTH 4
932#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80 ((uint16_t) 0x0001)
933#define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32 ((uint16_t) 0x0002)
934#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80 ((uint16_t) 0x0005)
935#define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32 ((uint16_t) 0x0006)
937#define MBEDTLS_TLS_SRTP_UNSET ((uint16_t) 0x0000)
939typedef uint16_t mbedtls_ssl_srtp_profile;
941typedef struct mbedtls_dtls_srtp_info_t {
943 mbedtls_ssl_srtp_profile chosen_dtls_srtp_profile;
947 unsigned char mki_value[MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH];
949mbedtls_dtls_srtp_info;
965#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
969#if defined(MBEDTLS_HAVE_TIME)
975 unsigned char id[32];
978#if defined(MBEDTLS_X509_CRT_PARSE_C)
979#if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
984 unsigned char *peer_cert_digest;
985 size_t peer_cert_digest_len;
991#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
997#if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
1001#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1032#if defined(MBEDTLS_ARC4_C)
1035#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
1038#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
1041#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
1044#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1047#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
1050#if defined(MBEDTLS_SSL_RENEGOTIATION)
1053#if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
1056#if defined(MBEDTLS_SSL_SESSION_TICKETS)
1059#if defined(MBEDTLS_SSL_FALLBACK_SCSV) && defined(MBEDTLS_SSL_CLI_C)
1062#if defined(MBEDTLS_SSL_SRV_C)
1066#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1067 uint8_t ignore_unexpected_cid ;
1071#if defined(MBEDTLS_SSL_DTLS_SRTP)
1072 uint8_t dtls_srtp_mki_support ;
1082#if defined(MBEDTLS_SSL_PROTO_DTLS)
1089#if defined(MBEDTLS_SSL_RENEGOTIATION)
1095#if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT)
1099#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
1110 void (*
f_dbg)(
void *, int,
const char *, int,
const char *);
1114 int (*
f_rng)(
void *,
unsigned char *, size_t);
1123#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
1129#if defined(MBEDTLS_X509_CRT_PARSE_C)
1135#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
1141#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1144 const unsigned char *, size_t);
1147 const unsigned char *, size_t);
1151#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
1154 unsigned char *,
const unsigned char *,
size_t *, uint32_t *);
1160#if defined(MBEDTLS_SSL_EXPORT_KEYS)
1163 const unsigned char *, size_t, size_t, size_t);
1167 const unsigned char *, size_t, size_t, size_t,
1168 const unsigned char[32],
const unsigned char[32],
1173#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1177#if defined(MBEDTLS_X509_CRT_PARSE_C)
1182#if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
1188#if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
1189#if defined(MBEDTLS_X509_CRT_PARSE_C)
1190 mbedtls_ssl_async_sign_t *f_async_sign_start;
1191 mbedtls_ssl_async_decrypt_t *f_async_decrypt_start;
1193 mbedtls_ssl_async_resume_t *f_async_resume;
1194 mbedtls_ssl_async_cancel_t *f_async_cancel;
1195 void *p_async_config_data;
1198#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
1202#if defined(MBEDTLS_ECP_C)
1206#if defined(MBEDTLS_DHM_C)
1211#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
1213#if defined(MBEDTLS_USE_PSA_CRYPTO)
1245#if defined(MBEDTLS_SSL_ALPN)
1249#if defined(MBEDTLS_SSL_DTLS_SRTP)
1251 const mbedtls_ssl_srtp_profile *dtls_srtp_profile_list;
1253 size_t dtls_srtp_profile_list_len;
1264#if defined(MBEDTLS_SSL_RENEGOTIATION)
1274#if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT)
1278#if defined(MBEDTLS_X509_CRT_PARSE_C)
1326#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1327 unsigned char *in_cid;
1338#if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1341#if defined(MBEDTLS_SSL_PROTO_DTLS)
1346#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
1358#if defined(MBEDTLS_SSL_PROTO_DTLS)
1369#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1370 unsigned char *out_cid;
1380#if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH)
1386#if defined(MBEDTLS_SSL_PROTO_DTLS)
1390#if defined(MBEDTLS_ZLIB_SUPPORT)
1391 unsigned char *compress_buf;
1393#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
1405#if defined(MBEDTLS_X509_CRT_PARSE_C)
1410#if defined(MBEDTLS_SSL_ALPN)
1414#if defined(MBEDTLS_SSL_DTLS_SRTP)
1418 mbedtls_dtls_srtp_info dtls_srtp_info;
1424#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
1435#if defined(MBEDTLS_SSL_RENEGOTIATION)
1441#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1449 uint8_t own_cid_len;
1450 uint8_t negotiate_cid;
1457#if defined(MBEDTLS_SSL_HW_RECORD_ACCEL)
1459#if !defined(MBEDTLS_DEPRECATED_REMOVED)
1461#define MBEDTLS_SSL_CHANNEL_OUTBOUND MBEDTLS_DEPRECATED_NUMERIC_CONSTANT(0)
1462#define MBEDTLS_SSL_CHANNEL_INBOUND MBEDTLS_DEPRECATED_NUMERIC_CONSTANT(1)
1464#if defined(MBEDTLS_DEPRECATED_WARNING)
1465#define MBEDTLS_DEPRECATED __attribute__((deprecated))
1467#define MBEDTLS_DEPRECATED
1472 const unsigned char *key_enc,
const unsigned char *key_dec,
1474 const unsigned char *iv_enc,
const unsigned char *iv_dec,
1476 const unsigned char *mac_enc,
const unsigned char *mac_dec,
1490#undef MBEDTLS_DEPRECATED
1615#if defined(MBEDTLS_X509_CRT_PARSE_C)
1644 int (*f_rng)(
void *,
unsigned char *,
size_t),
1662 void (*f_dbg)(
void *,
int,
const char *,
int,
const char *),
1701#if defined(MBEDTLS_SSL_PROTO_DTLS)
1703#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
1791 unsigned char const *own_cid,
1792 size_t own_cid_len);
1834 size_t *peer_cid_len);
1883#if defined(MBEDTLS_X509_CRT_PARSE_C)
1925#if defined(MBEDTLS_SSL_RECORD_CHECKING)
2021 unsigned char *start,
2022 const unsigned char *end,
2024 uint32_t *lifetime);
2026#if defined(MBEDTLS_SSL_EXPORT_KEYS)
2048 const unsigned char *ms,
2049 const unsigned char *kb,
2080 const unsigned char *ms,
2081 const unsigned char *kb,
2085 const unsigned char client_random[32],
2086 const unsigned char server_random[32],
2118#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C)
2139#if defined(MBEDTLS_SSL_EXPORT_KEYS)
2152 void *p_export_keys);
2168 void *p_export_keys);
2171#if defined(MBEDTLS_SSL_ASYNC_PRIVATE)
2203 mbedtls_ssl_async_sign_t *f_async_sign,
2204 mbedtls_ssl_async_decrypt_t *f_async_decrypt,
2205 mbedtls_ssl_async_resume_t *f_async_resume,
2206 mbedtls_ssl_async_cancel_t *f_async_cancel,
2265 unsigned char **p,
unsigned char *end,
2266 const unsigned char *info,
size_t ilen);
2282 const unsigned char *cookie,
size_t clen,
2283 const unsigned char *info,
size_t ilen);
2285#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C)
2339 const unsigned char *info,
2344#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY)
2363#if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT)
2390#if defined(MBEDTLS_SSL_PROTO_DTLS)
2421 unsigned allow_packing);
2457#if defined(MBEDTLS_SSL_SRV_C)
2501#if defined(MBEDTLS_SSL_CLI_C)
2552 const unsigned char *buf,
2619 const int *ciphersuites);
2621#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
2622#define MBEDTLS_SSL_UNEXPECTED_CID_IGNORE 0
2623#define MBEDTLS_SSL_UNEXPECTED_CID_FAIL 1
2657 int ignore_other_cids);
2680 const int *ciphersuites,
2681 int major,
int minor);
2683#if defined(MBEDTLS_X509_CRT_PARSE_C)
2712#if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK)
2810#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
2843 const unsigned char *psk,
size_t psk_len,
2844 const unsigned char *psk_identity,
size_t psk_identity_len);
2846#if defined(MBEDTLS_USE_PSA_CRYPTO)
2885 const unsigned char *psk_identity,
2886 size_t psk_identity_len);
2906 const unsigned char *psk,
size_t psk_len);
2908#if defined(MBEDTLS_USE_PSA_CRYPTO)
2977#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_SRV_C)
2979#if !defined(MBEDTLS_DEPRECATED_REMOVED)
2981#if defined(MBEDTLS_DEPRECATED_WARNING)
2982#define MBEDTLS_DEPRECATED __attribute__((deprecated))
2984#define MBEDTLS_DEPRECATED
3020 const unsigned char *dhm_P,
size_t P_len,
3021 const unsigned char *dhm_G,
size_t G_len);
3035#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C)
3045 unsigned int bitlen);
3048#if defined(MBEDTLS_ECP_C)
3082#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
3107#if defined(MBEDTLS_X509_CRT_PARSE_C)
3129#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION)
3203#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
3222 const unsigned char *pw,
3226#if defined(MBEDTLS_SSL_ALPN)
3253#if defined(MBEDTLS_SSL_DTLS_SRTP)
3254#if defined(MBEDTLS_DEBUG_C)
3255static inline const char *mbedtls_ssl_get_srtp_profile_as_string(mbedtls_ssl_srtp_profile profile)
3258 case MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80:
3259 return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80";
3260 case MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32:
3261 return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32";
3262 case MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80:
3263 return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80";
3264 case MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32:
3265 return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32";
3285 int support_mki_value);
3306int mbedtls_ssl_conf_dtls_srtp_protection_profiles
3308 const mbedtls_ssl_srtp_profile *profiles);
3327 unsigned char *mki_value,
3348 mbedtls_dtls_srtp_info *dtls_srtp_info);
3389#if defined(MBEDTLS_SSL_FALLBACK_SCSV) && defined(MBEDTLS_SSL_CLI_C)
3412#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC)
3427#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET)
3442#if defined(MBEDTLS_ARC4_C)
3461#if defined(MBEDTLS_SSL_SRV_C)
3472 char cert_req_ca_list);
3475#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
3513#if defined(MBEDTLS_SSL_TRUNCATED_HMAC)
3525#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING)
3540#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C)
3554#if defined(MBEDTLS_SSL_RENEGOTIATION)
3604#if defined(MBEDTLS_SSL_RENEGOTIATION)
3670 const unsigned char period[8]);
3777#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH)
3809#if !defined(MBEDTLS_DEPRECATED_REMOVED)
3811#if defined(MBEDTLS_DEPRECATED_WARNING)
3812#define MBEDTLS_DEPRECATED __attribute__((deprecated))
3814#define MBEDTLS_DEPRECATED
3865#if defined(MBEDTLS_X509_CRT_PARSE_C)
3899#if defined(MBEDTLS_SSL_CLI_C)
4007#if defined(MBEDTLS_SSL_RENEGOTIATION)
4192 unsigned char level,
4193 unsigned char message);
4216#if defined(MBEDTLS_SSL_CONTEXT_SERIALIZATION)
4336 const unsigned char *buf,
4368 int endpoint,
int transport,
int preset);
4411 const unsigned char *secret,
size_t slen,
4413 const unsigned char *random,
size_t rlen,
4414 unsigned char *dstbuf,
size_t dlen);
Multi-precision integer library.
#define MBEDTLS_MPI_MAX_SIZE
Configuration options (set of defines)
Platform Security Architecture cryptography module.
This file contains Diffie-Hellman-Merkle (DHM) key exchange definitions and functions.
This file contains ECDH definitions and functions.
This file provides an API for Elliptic Curves over GF(P) (ECP).
#define MBEDTLS_ECP_MAX_BYTES
int(* mbedtls_x509_crt_ca_cb_t)(void *p_ctx, mbedtls_x509_crt const *child, mbedtls_x509_crt **candidate_cas)
The type of trusted certificate callbacks.
mbedtls_md_type_t
Supported message digests.
MBEDTLS_DEPRECATED size_t mbedtls_ssl_get_max_frag_len(const mbedtls_ssl_context *ssl)
This function is a deprecated approach to getting the max fragment length. Its an alias for mbedtls_s...
void mbedtls_ssl_conf_cert_req_ca_list(mbedtls_ssl_config *conf, char cert_req_ca_list)
Whether to send a list of acceptable CAs in CertificateRequest messages. (Default: do send)
#define MBEDTLS_PSK_MAX_LEN
const mbedtls_x509_crt * mbedtls_ssl_get_peer_cert(const mbedtls_ssl_context *ssl)
Return the peer certificate from the current connection.
void mbedtls_ssl_conf_read_timeout(mbedtls_ssl_config *conf, uint32_t timeout)
Set the timeout period for mbedtls_ssl_read() (Default: no timeout.)
void mbedtls_ssl_conf_min_version(mbedtls_ssl_config *conf, int major, int minor)
Set the minimum accepted SSL/TLS protocol version (Default: TLS 1.0)
int mbedtls_ssl_ticket_write_t(void *p_ticket, const mbedtls_ssl_session *session, unsigned char *start, const unsigned char *end, size_t *tlen, uint32_t *lifetime)
Callback type: generate and write session ticket.
void mbedtls_ssl_conf_extended_master_secret(mbedtls_ssl_config *conf, char ems)
Enable or disable Extended Master Secret negotiation. (Default: MBEDTLS_SSL_EXTENDED_MS_ENABLED)
void mbedtls_ssl_set_mtu(mbedtls_ssl_context *ssl, uint16_t mtu)
Set the Maximum Transport Unit (MTU). Special value: 0 means unset (no limit). This represents the ma...
int mbedtls_ssl_set_client_transport_id(mbedtls_ssl_context *ssl, const unsigned char *info, size_t ilen)
Set client's transport-level identification info. (Server only. DTLS only.)
void mbedtls_ssl_conf_renegotiation_period(mbedtls_ssl_config *conf, const unsigned char period[8])
Set record counter threshold for periodic renegotiation. (Default: 2^48 - 1)
#define MBEDTLS_SSL_CID_OUT_LEN_MAX
void mbedtls_ssl_conf_legacy_renegotiation(mbedtls_ssl_config *conf, int allow_legacy)
Prevent or allow legacy renegotiation. (Default: MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION)
void mbedtls_ssl_conf_psk_cb(mbedtls_ssl_config *conf, int(*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_psk)
Set the PSK callback (server-side only).
int mbedtls_ssl_conf_psk(mbedtls_ssl_config *conf, const unsigned char *psk, size_t psk_len, const unsigned char *psk_identity, size_t psk_identity_len)
Configure a pre-shared key (PSK) and identity to be used in PSK-based ciphersuites.
int mbedtls_ssl_session_save(const mbedtls_ssl_session *session, unsigned char *buf, size_t buf_len, size_t *olen)
Save session structure as serialized data in a buffer. On client, this can be used for saving session...
int mbedtls_ssl_session_reset(mbedtls_ssl_context *ssl)
Reset an already initialized SSL context for re-use while retaining application-set variables,...
int mbedtls_ssl_check_record(mbedtls_ssl_context const *ssl, unsigned char *buf, size_t buflen)
Check whether a buffer contains a valid and authentic record that has not been seen before....
const char * mbedtls_ssl_get_alpn_protocol(const mbedtls_ssl_context *ssl)
Get the name of the negotiated Application Layer Protocol. This function should be called after the h...
struct mbedtls_ssl_transform mbedtls_ssl_transform
void mbedtls_ssl_conf_cbc_record_splitting(mbedtls_ssl_config *conf, char split)
Enable / Disable 1/n-1 record splitting (Default: MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED)
void mbedtls_ssl_conf_renegotiation_enforced(mbedtls_ssl_config *conf, int max_records)
Enforce renegotiation requests. (Default: enforced, max_records = 16)
void mbedtls_ssl_free(mbedtls_ssl_context *ssl)
Free referenced items in an SSL context and clear memory.
void mbedtls_ssl_conf_transport(mbedtls_ssl_config *conf, int transport)
Set the transport type (TLS or DTLS). Default: TLS.
#define MBEDTLS_SSL_CID_IN_LEN_MAX
void mbedtls_ssl_set_timer_cb(mbedtls_ssl_context *ssl, void *p_timer, mbedtls_ssl_set_timer_t *f_set_timer, mbedtls_ssl_get_timer_t *f_get_timer)
Set the timer callbacks (Mandatory for DTLS.)
void mbedtls_ssl_set_hs_ca_chain(mbedtls_ssl_context *ssl, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate for the current handshake.
@ MBEDTLS_SSL_TLS_PRF_SHA384
@ MBEDTLS_SSL_TLS_PRF_SHA256
@ MBEDTLS_SSL_TLS_PRF_NONE
@ MBEDTLS_SSL_TLS_PRF_TLS1
@ MBEDTLS_SSL_TLS_PRF_SSL3
int mbedtls_ssl_send_t(void *ctx, const unsigned char *buf, size_t len)
Callback type: send data on the network.
void mbedtls_ssl_conf_sni(mbedtls_ssl_config *conf, int(*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_sni)
Set server side ServerName TLS extension callback (optional, server-side only).
@ MBEDTLS_SSL_CERTIFICATE_VERIFY
@ MBEDTLS_SSL_HANDSHAKE_OVER
@ MBEDTLS_SSL_SERVER_HELLO_DONE
@ MBEDTLS_SSL_SERVER_FINISHED
@ MBEDTLS_SSL_SERVER_KEY_EXCHANGE
@ MBEDTLS_SSL_SERVER_HELLO
@ MBEDTLS_SSL_CLIENT_KEY_EXCHANGE
@ MBEDTLS_SSL_CLIENT_HELLO
@ MBEDTLS_SSL_SERVER_CERTIFICATE
@ MBEDTLS_SSL_CERTIFICATE_REQUEST
@ MBEDTLS_SSL_SERVER_NEW_SESSION_TICKET
@ MBEDTLS_SSL_CLIENT_FINISHED
@ MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC
@ MBEDTLS_SSL_SERVER_HELLO_VERIFY_REQUEST_SENT
@ MBEDTLS_SSL_HANDSHAKE_WRAPUP
@ MBEDTLS_SSL_CLIENT_CHANGE_CIPHER_SPEC
@ MBEDTLS_SSL_HELLO_REQUEST
@ MBEDTLS_SSL_CLIENT_CERTIFICATE
@ MBEDTLS_SSL_FLUSH_BUFFERS
void mbedtls_ssl_set_verify(mbedtls_ssl_context *ssl, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set a connection-specific verification callback (optional).
void mbedtls_ssl_conf_endpoint(mbedtls_ssl_config *conf, int endpoint)
Set the current endpoint type.
int mbedtls_ssl_check_pending(const mbedtls_ssl_context *ssl)
Check if there is data already read from the underlying transport but not yet processed.
size_t mbedtls_ssl_get_input_max_frag_len(const mbedtls_ssl_context *ssl)
Return the maximum fragment length (payload, in bytes) for the input buffer. This is the negotiated m...
int mbedtls_ssl_send_alert_message(mbedtls_ssl_context *ssl, unsigned char level, unsigned char message)
Send an alert message.
const char * mbedtls_ssl_get_version(const mbedtls_ssl_context *ssl)
Return the current SSL version (SSLv3/TLSv1/etc)
int mbedtls_ssl_conf_dh_param_bin(mbedtls_ssl_config *conf, const unsigned char *dhm_P, size_t P_len, const unsigned char *dhm_G, size_t G_len)
Set the Diffie-Hellman public P and G values from big-endian binary presentations....
void mbedtls_ssl_conf_rng(mbedtls_ssl_config *conf, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Set the random number generator callback.
void mbedtls_ssl_conf_dtls_anti_replay(mbedtls_ssl_config *conf, char mode)
Enable or disable anti-replay protection for DTLS. (DTLS only, no effect on TLS.) Default: enabled.
int mbedtls_ssl_ticket_parse_t(void *p_ticket, mbedtls_ssl_session *session, unsigned char *buf, size_t len)
Callback type: parse and load session ticket.
int mbedtls_ssl_renegotiate(mbedtls_ssl_context *ssl)
Initiate an SSL renegotiation on the running connection. Client: perform the renegotiation right now....
int mbedtls_ssl_handshake(mbedtls_ssl_context *ssl)
Perform the SSL handshake.
int mbedtls_ssl_conf_own_cert(mbedtls_ssl_config *conf, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate chain and private key.
struct mbedtls_ssl_sig_hash_set_t mbedtls_ssl_sig_hash_set_t
int mbedtls_ssl_set_hs_psk(mbedtls_ssl_context *ssl, const unsigned char *psk, size_t psk_len)
Set the pre-shared Key (PSK) for the current handshake.
uint32_t mbedtls_ssl_get_verify_result(const mbedtls_ssl_context *ssl)
Return the result of the certificate verification.
int mbedtls_ssl_session_load(mbedtls_ssl_session *session, const unsigned char *buf, size_t len)
Load serialized session data into a session structure. On client, this can be used for loading saved ...
int mbedtls_ssl_cookie_write_t(void *ctx, unsigned char **p, unsigned char *end, const unsigned char *info, size_t ilen)
Callback type: generate a cookie.
void mbedtls_ssl_conf_authmode(mbedtls_ssl_config *conf, int authmode)
Set the certificate verification mode Default: NONE on server, REQUIRED on client.
void mbedtls_ssl_conf_dtls_cookies(mbedtls_ssl_config *conf, mbedtls_ssl_cookie_write_t *f_cookie_write, mbedtls_ssl_cookie_check_t *f_cookie_check, void *p_cookie)
Register callbacks for DTLS cookies (Server only. DTLS only.)
int mbedtls_ssl_get_max_out_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum outgoing record payload in bytes. This takes into account the config....
MBEDTLS_DEPRECATED int mbedtls_ssl_conf_dh_param(mbedtls_ssl_config *conf, const char *dhm_P, const char *dhm_G)
Set the Diffie-Hellman public P and G values, read as hexadecimal strings (server-side only) (Default...
int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Try to write exactly 'len' application data bytes.
struct mbedtls_ssl_handshake_params mbedtls_ssl_handshake_params
void mbedtls_ssl_set_timer_t(void *ctx, uint32_t int_ms, uint32_t fin_ms)
Callback type: set a pair of timers/delays to watch.
void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max)
Set retransmit timeout values for the DTLS handshake. (DTLS only, no effect on TLS....
int mbedtls_ssl_recv_timeout_t(void *ctx, unsigned char *buf, size_t len, uint32_t timeout)
Callback type: receive data from the network, with timeout.
void mbedtls_ssl_conf_sig_hashes(mbedtls_ssl_config *conf, const int *hashes)
Set the allowed hashes for signatures during the handshake. (Default: all SHA-2 hashes,...
void mbedtls_ssl_conf_truncated_hmac(mbedtls_ssl_config *conf, int truncate)
Activate negotiation of truncated HMAC (Default: MBEDTLS_SSL_TRUNC_HMAC_DISABLED)
void mbedtls_ssl_conf_session_tickets_cb(mbedtls_ssl_config *conf, mbedtls_ssl_ticket_write_t *f_ticket_write, mbedtls_ssl_ticket_parse_t *f_ticket_parse, void *p_ticket)
Configure SSL session ticket callbacks (server only). (Default: none.)
void mbedtls_ssl_config_free(mbedtls_ssl_config *conf)
Free an SSL configuration context.
void mbedtls_ssl_conf_cert_profile(mbedtls_ssl_config *conf, const mbedtls_x509_crt_profile *profile)
Set the X.509 security profile used for verification.
void mbedtls_ssl_session_init(mbedtls_ssl_session *session)
Initialize SSL session structure.
#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN
int mbedtls_ssl_context_load(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Load serialized connection data to an SSL context.
void mbedtls_ssl_set_hs_authmode(mbedtls_ssl_context *ssl, int authmode)
Set authmode for the current handshake.
void mbedtls_ssl_set_datagram_packing(mbedtls_ssl_context *ssl, unsigned allow_packing)
Allow or disallow packing of multiple handshake records within a single datagram.
void mbedtls_ssl_init(mbedtls_ssl_context *ssl)
Initialize an SSL context Just makes the context ready for mbedtls_ssl_setup() or mbedtls_ssl_free()
void mbedtls_ssl_conf_ca_chain(mbedtls_ssl_config *conf, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate.
void mbedtls_ssl_set_bio(mbedtls_ssl_context *ssl, void *p_bio, mbedtls_ssl_send_t *f_send, mbedtls_ssl_recv_t *f_recv, mbedtls_ssl_recv_timeout_t *f_recv_timeout)
Set the underlying BIO callbacks for write, read and read-with-timeout.
int mbedtls_ssl_export_keys_t(void *p_expkey, const unsigned char *ms, const unsigned char *kb, size_t maclen, size_t keylen, size_t ivlen)
Callback type: Export key block and master secret.
const char * mbedtls_ssl_get_ciphersuite(const mbedtls_ssl_context *ssl)
Return the name of the current ciphersuite.
int mbedtls_ssl_set_session(mbedtls_ssl_context *ssl, const mbedtls_ssl_session *session)
Request resumption of session (client-side only) Session data is copied from presented session struct...
int mbedtls_ssl_get_record_expansion(const mbedtls_ssl_context *ssl)
Return the (maximum) number of bytes added by the record layer: header + encryption/MAC overhead (inc...
void mbedtls_ssl_conf_session_tickets(mbedtls_ssl_config *conf, int use_tickets)
Enable / Disable session tickets (client only). (Default: MBEDTLS_SSL_SESSION_TICKETS_ENABLED....
int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name)
Return the ID of the ciphersuite associated with the given name.
void mbedtls_ssl_conf_session_cache(mbedtls_ssl_config *conf, void *p_cache, int(*f_get_cache)(void *, mbedtls_ssl_session *), int(*f_set_cache)(void *, const mbedtls_ssl_session *))
Set the session cache callbacks (server-side only) If not set, no session resuming is done (except if...
void mbedtls_ssl_conf_dtls_badmac_limit(mbedtls_ssl_config *conf, unsigned limit)
Set a limit on the number of records with a bad MAC before terminating the connection....
int mbedtls_ssl_cookie_check_t(void *ctx, const unsigned char *cookie, size_t clen, const unsigned char *info, size_t ilen)
Callback type: verify a cookie.
void mbedtls_ssl_conf_dhm_min_bitlen(mbedtls_ssl_config *conf, unsigned int bitlen)
Set the minimum length for Diffie-Hellman parameters. (Client-side only.) (Default: 1024 bits....
void mbedtls_ssl_conf_arc4_support(mbedtls_ssl_config *conf, char arc4)
Disable or enable support for RC4 (Default: MBEDTLS_SSL_ARC4_DISABLED)
int mbedtls_ssl_set_hs_own_cert(mbedtls_ssl_context *ssl, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate and key for the current handshake.
int mbedtls_ssl_config_defaults(mbedtls_ssl_config *conf, int endpoint, int transport, int preset)
Load reasonable default SSL configuration values. (You need to call mbedtls_ssl_config_init() first....
int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len)
Read at most 'len' application data bytes.
void mbedtls_ssl_conf_ciphersuites_for_version(mbedtls_ssl_config *conf, const int *ciphersuites, int major, int minor)
Set the list of allowed ciphersuites and the preference order for a specific version of the protocol....
int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname)
Set or reset the hostname to check against the received server certificate. It sets the ServerName TL...
#define MBEDTLS_DEPRECATED
int mbedtls_ssl_handshake_step(mbedtls_ssl_context *ssl)
Perform a single step of the SSL handshake.
void mbedtls_ssl_conf_renegotiation(mbedtls_ssl_config *conf, int renegotiation)
Enable / Disable renegotiation support for connection when initiated by peer (Default: MBEDTLS_SSL_RE...
void mbedtls_ssl_conf_dbg(mbedtls_ssl_config *conf, void(*f_dbg)(void *, int, const char *, int, const char *), void *p_dbg)
Set the debug callback.
void mbedtls_ssl_conf_export_keys_cb(mbedtls_ssl_config *conf, mbedtls_ssl_export_keys_t *f_export_keys, void *p_export_keys)
Configure key export callback. (Default: none.)
const char * mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id)
Return the name of the ciphersuite associated with the given ID.
int mbedtls_ssl_export_keys_ext_t(void *p_expkey, const unsigned char *ms, const unsigned char *kb, size_t maclen, size_t keylen, size_t ivlen, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type)
Callback type: Export key block, master secret, handshake randbytes and the tls_prf function used to ...
void mbedtls_ssl_config_init(mbedtls_ssl_config *conf)
Initialize an SSL configuration context Just makes the context ready for mbedtls_ssl_config_defaults(...
const mbedtls_ssl_session * mbedtls_ssl_get_session_pointer(const mbedtls_ssl_context *ssl)
Get a pointer to the current session structure, for example to serialize it.
void mbedtls_ssl_conf_fallback(mbedtls_ssl_config *conf, char fallback)
Set the fallback flag (client-side only). (Default: MBEDTLS_SSL_IS_NOT_FALLBACK).
int mbedtls_ssl_context_save(mbedtls_ssl_context *ssl, unsigned char *buf, size_t buf_len, size_t *olen)
Save an active connection as serialized data in a buffer. This allows the freeing or re-using of the ...
int mbedtls_ssl_tls_prf(const mbedtls_tls_prf_types prf, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen)
TLS-PRF function for key derivation.
struct mbedtls_ssl_flight_item mbedtls_ssl_flight_item
size_t mbedtls_ssl_get_output_max_frag_len(const mbedtls_ssl_context *ssl)
Return the maximum fragment length (payload, in bytes) for the output buffer. For the client,...
int mbedtls_ssl_recv_t(void *ctx, unsigned char *buf, size_t len)
Callback type: receive data from the network.
void mbedtls_ssl_session_free(mbedtls_ssl_session *session)
Free referenced items in an SSL session including the peer certificate and clear memory.
int mbedtls_ssl_close_notify(mbedtls_ssl_context *ssl)
Notify the peer that the connection is being closed.
int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code)
Set the maximum fragment length to emit and/or negotiate. (Typical: the smaller of MBEDTLS_SSL_IN_CON...
void mbedtls_ssl_conf_ciphersuites(mbedtls_ssl_config *conf, const int *ciphersuites)
Set the list of allowed ciphersuites and the preference order. First in the list has the highest pref...
size_t mbedtls_ssl_get_bytes_avail(const mbedtls_ssl_context *ssl)
Return the number of application data bytes remaining to be read from the current record.
void mbedtls_ssl_conf_export_keys_ext_cb(mbedtls_ssl_config *conf, mbedtls_ssl_export_keys_ext_t *f_export_keys_ext, void *p_export_keys)
Configure extended key export callback. (Default: none.)
int mbedtls_ssl_get_session(const mbedtls_ssl_context *ssl, mbedtls_ssl_session *session)
Save session in order to resume it later (client-side only) Session data is copied to presented sessi...
int mbedtls_ssl_get_timer_t(void *ctx)
Callback type: get status of timers/delays.
void mbedtls_ssl_conf_curves(mbedtls_ssl_config *conf, const mbedtls_ecp_group_id *curves)
Set the allowed curves in order of preference. (Default: all defined curves in order of decreasing si...
int mbedtls_ssl_conf_alpn_protocols(mbedtls_ssl_config *conf, const char **protos)
Set the supported Application Layer Protocols.
int mbedtls_ssl_conf_dh_param_ctx(mbedtls_ssl_config *conf, mbedtls_dhm_context *dhm_ctx)
Set the Diffie-Hellman public P and G values, read from existing context (server-side only)
struct mbedtls_ssl_key_cert mbedtls_ssl_key_cert
int mbedtls_ssl_setup(mbedtls_ssl_context *ssl, const mbedtls_ssl_config *conf)
Set up an SSL context for use.
void mbedtls_ssl_conf_encrypt_then_mac(mbedtls_ssl_config *conf, char etm)
Enable or disable Encrypt-then-MAC (Default: MBEDTLS_SSL_ETM_ENABLED)
void mbedtls_ssl_conf_max_version(mbedtls_ssl_config *conf, int major, int minor)
Set the maximum supported version sent from the client side and/or accepted at the server side (Defau...
void mbedtls_ssl_conf_verify(mbedtls_ssl_config *conf, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set the verification callback (Optional).
SSL Ciphersuites for Mbed TLS.
The DHM context structure.
int(* f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t)
uint8_t cbc_record_splitting
int(* f_cookie_check)(void *, const unsigned char *, size_t, const unsigned char *, size_t)
unsigned char max_major_ver
const int * ciphersuite_list[4]
int(* f_set_cache)(void *, const mbedtls_ssl_session *)
mbedtls_x509_crl * ca_crl
int(* f_cookie_write)(void *, unsigned char **, unsigned char *, const unsigned char *, size_t)
const mbedtls_ecp_group_id * curve_list
unsigned char * psk_identity
mbedtls_x509_crt * ca_chain
int(* f_ticket_write)(void *, const mbedtls_ssl_session *, unsigned char *, const unsigned char *, size_t *, uint32_t *)
unsigned char max_minor_ver
unsigned char min_minor_ver
const mbedtls_x509_crt_profile * cert_profile
int(* f_rng)(void *, unsigned char *, size_t)
int(* f_get_cache)(void *, mbedtls_ssl_session *)
int(* f_ticket_parse)(void *, mbedtls_ssl_session *, unsigned char *, size_t)
void(* f_dbg)(void *, int, const char *, int, const char *)
unsigned char renego_period[8]
unsigned int badmac_limit
int(* f_export_keys_ext)(void *, const unsigned char *, const unsigned char *, size_t, size_t, size_t, const unsigned char[32], const unsigned char[32], mbedtls_tls_prf_types)
int(* f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *)
unsigned int dhm_min_bitlen
int(* f_export_keys)(void *, const unsigned char *, const unsigned char *, size_t, size_t, size_t)
unsigned char min_major_ver
uint8_t allow_legacy_renegotiation
uint8_t disable_renegotiation
mbedtls_ssl_key_cert * key_cert
int(* f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t)
mbedtls_ssl_transform * transform_out
uint8_t disable_datagram_packing
mbedtls_ssl_session * session_in
mbedtls_ssl_set_timer_t * f_set_timer
mbedtls_ssl_session * session
unsigned char cur_out_ctr[8]
mbedtls_ssl_get_timer_t * f_get_timer
mbedtls_ssl_transform * transform
char own_verify_data[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN]
mbedtls_ssl_send_t * f_send
int(* f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *)
mbedtls_ssl_session * session_negotiate
char peer_verify_data[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN]
mbedtls_ssl_session * session_out
size_t next_record_offset
mbedtls_ssl_recv_t * f_recv
mbedtls_ssl_recv_timeout_t * f_recv_timeout
mbedtls_ssl_transform * transform_in
mbedtls_ssl_handshake_params * handshake
mbedtls_ssl_transform * transform_negotiate
const mbedtls_ssl_config * conf
mbedtls_x509_crt * peer_cert
unsigned char _pms_ecdhe_psk[4+MBEDTLS_ECP_MAX_BYTES+MBEDTLS_PSK_MAX_LEN]
unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]
unsigned char _pms_psk[4+2 *MBEDTLS_PSK_MAX_LEN]
unsigned char _pms_rsa_psk[52+MBEDTLS_PSK_MAX_LEN]
unsigned char _pms_rsa[48]
unsigned char _pms_dhe_psk[4+MBEDTLS_MPI_MAX_SIZE+MBEDTLS_PSK_MAX_LEN]
unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]
X.509 certificate revocation list parsing.
X.509 certificate parsing and writing.