27 #if !defined(MBEDTLS_CONFIG_FILE) 30 #include MBEDTLS_CONFIG_FILE 38 #if defined(MBEDTLS_X509_CRT_PARSE_C) 43 #if defined(MBEDTLS_DHM_C) 47 #if defined(MBEDTLS_ECDH_C) 51 #if defined(MBEDTLS_ZLIB_SUPPORT) 53 #if defined(MBEDTLS_DEPRECATED_WARNING) 54 #warning "Record compression support via MBEDTLS_ZLIB_SUPPORT is deprecated and will be removed in the next major revision of the library" 57 #if defined(MBEDTLS_DEPRECATED_REMOVED) 58 #error "Record compression support via MBEDTLS_ZLIB_SUPPORT is deprecated and cannot be used if MBEDTLS_DEPRECATED_REMOVED is set" 64 #if defined(MBEDTLS_HAVE_TIME) 71 #define MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE -0x7080 72 #define MBEDTLS_ERR_SSL_BAD_INPUT_DATA -0x7100 73 #define MBEDTLS_ERR_SSL_INVALID_MAC -0x7180 74 #define MBEDTLS_ERR_SSL_INVALID_RECORD -0x7200 75 #define MBEDTLS_ERR_SSL_CONN_EOF -0x7280 76 #define MBEDTLS_ERR_SSL_UNKNOWN_CIPHER -0x7300 77 #define MBEDTLS_ERR_SSL_NO_CIPHER_CHOSEN -0x7380 78 #define MBEDTLS_ERR_SSL_NO_RNG -0x7400 79 #define MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE -0x7480 80 #define MBEDTLS_ERR_SSL_CERTIFICATE_TOO_LARGE -0x7500 81 #define MBEDTLS_ERR_SSL_CERTIFICATE_REQUIRED -0x7580 82 #define MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED -0x7600 83 #define MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED -0x7680 84 #define MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE -0x7700 85 #define MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE -0x7780 86 #define MBEDTLS_ERR_SSL_PEER_VERIFY_FAILED -0x7800 87 #define MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY -0x7880 88 #define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_HELLO -0x7900 89 #define MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO -0x7980 90 #define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE -0x7A00 91 #define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_REQUEST -0x7A80 92 #define MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE -0x7B00 93 #define MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO_DONE -0x7B80 94 #define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE -0x7C00 95 #define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_RP -0x7C80 96 #define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_CS -0x7D00 97 #define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_VERIFY -0x7D80 98 #define MBEDTLS_ERR_SSL_BAD_HS_CHANGE_CIPHER_SPEC -0x7E00 99 #define MBEDTLS_ERR_SSL_BAD_HS_FINISHED -0x7E80 100 #define MBEDTLS_ERR_SSL_ALLOC_FAILED -0x7F00 101 #define MBEDTLS_ERR_SSL_HW_ACCEL_FAILED -0x7F80 102 #define MBEDTLS_ERR_SSL_HW_ACCEL_FALLTHROUGH -0x6F80 103 #define MBEDTLS_ERR_SSL_COMPRESSION_FAILED -0x6F00 104 #define MBEDTLS_ERR_SSL_BAD_HS_PROTOCOL_VERSION -0x6E80 105 #define MBEDTLS_ERR_SSL_BAD_HS_NEW_SESSION_TICKET -0x6E00 106 #define MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED -0x6D80 107 #define MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH -0x6D00 108 #define MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY -0x6C80 109 #define MBEDTLS_ERR_SSL_INTERNAL_ERROR -0x6C00 110 #define MBEDTLS_ERR_SSL_COUNTER_WRAPPING -0x6B80 111 #define MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO -0x6B00 112 #define MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED -0x6A80 113 #define MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL -0x6A00 114 #define MBEDTLS_ERR_SSL_NO_USABLE_CIPHERSUITE -0x6980 115 #define MBEDTLS_ERR_SSL_WANT_READ -0x6900 116 #define MBEDTLS_ERR_SSL_WANT_WRITE -0x6880 117 #define MBEDTLS_ERR_SSL_TIMEOUT -0x6800 118 #define MBEDTLS_ERR_SSL_CLIENT_RECONNECT -0x6780 119 #define MBEDTLS_ERR_SSL_UNEXPECTED_RECORD -0x6700 120 #define MBEDTLS_ERR_SSL_NON_FATAL -0x6680 121 #define MBEDTLS_ERR_SSL_INVALID_VERIFY_HASH -0x6600 122 #define MBEDTLS_ERR_SSL_CONTINUE_PROCESSING -0x6580 123 #define MBEDTLS_ERR_SSL_ASYNC_IN_PROGRESS -0x6500 124 #define MBEDTLS_ERR_SSL_EARLY_MESSAGE -0x6480 125 #define MBEDTLS_ERR_SSL_CRYPTO_IN_PROGRESS -0x7000 130 #define MBEDTLS_SSL_MAJOR_VERSION_3 3 131 #define MBEDTLS_SSL_MINOR_VERSION_0 0 132 #define MBEDTLS_SSL_MINOR_VERSION_1 1 133 #define MBEDTLS_SSL_MINOR_VERSION_2 2 134 #define MBEDTLS_SSL_MINOR_VERSION_3 3 136 #define MBEDTLS_SSL_TRANSPORT_STREAM 0 137 #define MBEDTLS_SSL_TRANSPORT_DATAGRAM 1 139 #define MBEDTLS_SSL_MAX_HOST_NAME_LEN 255 143 #define MBEDTLS_SSL_MAX_FRAG_LEN_NONE 0 144 #define MBEDTLS_SSL_MAX_FRAG_LEN_512 1 145 #define MBEDTLS_SSL_MAX_FRAG_LEN_1024 2 146 #define MBEDTLS_SSL_MAX_FRAG_LEN_2048 3 147 #define MBEDTLS_SSL_MAX_FRAG_LEN_4096 4 148 #define MBEDTLS_SSL_MAX_FRAG_LEN_INVALID 5 150 #define MBEDTLS_SSL_IS_CLIENT 0 151 #define MBEDTLS_SSL_IS_SERVER 1 153 #define MBEDTLS_SSL_IS_NOT_FALLBACK 0 154 #define MBEDTLS_SSL_IS_FALLBACK 1 156 #define MBEDTLS_SSL_EXTENDED_MS_DISABLED 0 157 #define MBEDTLS_SSL_EXTENDED_MS_ENABLED 1 159 #define MBEDTLS_SSL_ETM_DISABLED 0 160 #define MBEDTLS_SSL_ETM_ENABLED 1 162 #define MBEDTLS_SSL_COMPRESS_NULL 0 163 #define MBEDTLS_SSL_COMPRESS_DEFLATE 1 165 #define MBEDTLS_SSL_VERIFY_NONE 0 166 #define MBEDTLS_SSL_VERIFY_OPTIONAL 1 167 #define MBEDTLS_SSL_VERIFY_REQUIRED 2 168 #define MBEDTLS_SSL_VERIFY_UNSET 3 170 #define MBEDTLS_SSL_LEGACY_RENEGOTIATION 0 171 #define MBEDTLS_SSL_SECURE_RENEGOTIATION 1 173 #define MBEDTLS_SSL_RENEGOTIATION_DISABLED 0 174 #define MBEDTLS_SSL_RENEGOTIATION_ENABLED 1 176 #define MBEDTLS_SSL_ANTI_REPLAY_DISABLED 0 177 #define MBEDTLS_SSL_ANTI_REPLAY_ENABLED 1 179 #define MBEDTLS_SSL_RENEGOTIATION_NOT_ENFORCED -1 180 #define MBEDTLS_SSL_RENEGO_MAX_RECORDS_DEFAULT 16 182 #define MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION 0 183 #define MBEDTLS_SSL_LEGACY_ALLOW_RENEGOTIATION 1 184 #define MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE 2 186 #define MBEDTLS_SSL_TRUNC_HMAC_DISABLED 0 187 #define MBEDTLS_SSL_TRUNC_HMAC_ENABLED 1 188 #define MBEDTLS_SSL_TRUNCATED_HMAC_LEN 10 190 #define MBEDTLS_SSL_SESSION_TICKETS_DISABLED 0 191 #define MBEDTLS_SSL_SESSION_TICKETS_ENABLED 1 193 #define MBEDTLS_SSL_CBC_RECORD_SPLITTING_DISABLED 0 194 #define MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED 1 196 #define MBEDTLS_SSL_ARC4_ENABLED 0 197 #define MBEDTLS_SSL_ARC4_DISABLED 1 199 #define MBEDTLS_SSL_PRESET_DEFAULT 0 200 #define MBEDTLS_SSL_PRESET_SUITEB 2 202 #define MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED 1 203 #define MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED 0 209 #define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MIN 1000 210 #define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MAX 60000 220 #if !defined(MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME) 221 #define MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME 86400 235 #if !defined(MBEDTLS_SSL_MAX_CONTENT_LEN) 236 #define MBEDTLS_SSL_MAX_CONTENT_LEN 16384 239 #if !defined(MBEDTLS_SSL_IN_CONTENT_LEN) 240 #define MBEDTLS_SSL_IN_CONTENT_LEN MBEDTLS_SSL_MAX_CONTENT_LEN 243 #if !defined(MBEDTLS_SSL_OUT_CONTENT_LEN) 244 #define MBEDTLS_SSL_OUT_CONTENT_LEN MBEDTLS_SSL_MAX_CONTENT_LEN 251 #if !defined(MBEDTLS_SSL_DTLS_MAX_BUFFERING) 252 #define MBEDTLS_SSL_DTLS_MAX_BUFFERING 32768 260 #if defined(MBEDTLS_SSL_PROTO_SSL3) 261 #define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 36 263 #define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 12 269 #define MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO 0xFF 270 #define MBEDTLS_SSL_FALLBACK_SCSV_VALUE 0x5600 276 #define MBEDTLS_SSL_HASH_NONE 0 277 #define MBEDTLS_SSL_HASH_MD5 1 278 #define MBEDTLS_SSL_HASH_SHA1 2 279 #define MBEDTLS_SSL_HASH_SHA224 3 280 #define MBEDTLS_SSL_HASH_SHA256 4 281 #define MBEDTLS_SSL_HASH_SHA384 5 282 #define MBEDTLS_SSL_HASH_SHA512 6 284 #define MBEDTLS_SSL_SIG_ANON 0 285 #define MBEDTLS_SSL_SIG_RSA 1 286 #define MBEDTLS_SSL_SIG_ECDSA 3 292 #define MBEDTLS_SSL_CERT_TYPE_RSA_SIGN 1 293 #define MBEDTLS_SSL_CERT_TYPE_ECDSA_SIGN 64 298 #define MBEDTLS_SSL_MSG_CHANGE_CIPHER_SPEC 20 299 #define MBEDTLS_SSL_MSG_ALERT 21 300 #define MBEDTLS_SSL_MSG_HANDSHAKE 22 301 #define MBEDTLS_SSL_MSG_APPLICATION_DATA 23 303 #define MBEDTLS_SSL_ALERT_LEVEL_WARNING 1 304 #define MBEDTLS_SSL_ALERT_LEVEL_FATAL 2 306 #define MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY 0 307 #define MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE 10 308 #define MBEDTLS_SSL_ALERT_MSG_BAD_RECORD_MAC 20 309 #define MBEDTLS_SSL_ALERT_MSG_DECRYPTION_FAILED 21 310 #define MBEDTLS_SSL_ALERT_MSG_RECORD_OVERFLOW 22 311 #define MBEDTLS_SSL_ALERT_MSG_DECOMPRESSION_FAILURE 30 312 #define MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE 40 313 #define MBEDTLS_SSL_ALERT_MSG_NO_CERT 41 314 #define MBEDTLS_SSL_ALERT_MSG_BAD_CERT 42 315 #define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT 43 316 #define MBEDTLS_SSL_ALERT_MSG_CERT_REVOKED 44 317 #define MBEDTLS_SSL_ALERT_MSG_CERT_EXPIRED 45 318 #define MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN 46 319 #define MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER 47 320 #define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA 48 321 #define MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED 49 322 #define MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR 50 323 #define MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR 51 324 #define MBEDTLS_SSL_ALERT_MSG_EXPORT_RESTRICTION 60 325 #define MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION 70 326 #define MBEDTLS_SSL_ALERT_MSG_INSUFFICIENT_SECURITY 71 327 #define MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR 80 328 #define MBEDTLS_SSL_ALERT_MSG_INAPROPRIATE_FALLBACK 86 329 #define MBEDTLS_SSL_ALERT_MSG_USER_CANCELED 90 330 #define MBEDTLS_SSL_ALERT_MSG_NO_RENEGOTIATION 100 331 #define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT 110 332 #define MBEDTLS_SSL_ALERT_MSG_UNRECOGNIZED_NAME 112 333 #define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_PSK_IDENTITY 115 334 #define MBEDTLS_SSL_ALERT_MSG_NO_APPLICATION_PROTOCOL 120 336 #define MBEDTLS_SSL_HS_HELLO_REQUEST 0 337 #define MBEDTLS_SSL_HS_CLIENT_HELLO 1 338 #define MBEDTLS_SSL_HS_SERVER_HELLO 2 339 #define MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST 3 340 #define MBEDTLS_SSL_HS_NEW_SESSION_TICKET 4 341 #define MBEDTLS_SSL_HS_CERTIFICATE 11 342 #define MBEDTLS_SSL_HS_SERVER_KEY_EXCHANGE 12 343 #define MBEDTLS_SSL_HS_CERTIFICATE_REQUEST 13 344 #define MBEDTLS_SSL_HS_SERVER_HELLO_DONE 14 345 #define MBEDTLS_SSL_HS_CERTIFICATE_VERIFY 15 346 #define MBEDTLS_SSL_HS_CLIENT_KEY_EXCHANGE 16 347 #define MBEDTLS_SSL_HS_FINISHED 20 352 #define MBEDTLS_TLS_EXT_SERVERNAME 0 353 #define MBEDTLS_TLS_EXT_SERVERNAME_HOSTNAME 0 355 #define MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH 1 357 #define MBEDTLS_TLS_EXT_TRUNCATED_HMAC 4 359 #define MBEDTLS_TLS_EXT_SUPPORTED_ELLIPTIC_CURVES 10 360 #define MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS 11 362 #define MBEDTLS_TLS_EXT_SIG_ALG 13 364 #define MBEDTLS_TLS_EXT_ALPN 16 366 #define MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC 22 367 #define MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET 0x0017 369 #define MBEDTLS_TLS_EXT_SESSION_TICKET 35 371 #define MBEDTLS_TLS_EXT_ECJPAKE_KKPP 256 373 #define MBEDTLS_TLS_EXT_RENEGOTIATION_INFO 0xFF01 378 #if !defined(MBEDTLS_PSK_MAX_LEN) 379 #define MBEDTLS_PSK_MAX_LEN 32 385 #if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) 388 #if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) 391 #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \ 392 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \ 393 defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \ 394 defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED) 397 #if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) 400 #if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED) 404 #if defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED) 407 #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) 411 #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) 412 unsigned char _pms_ecjpake[32];
416 #define MBEDTLS_PREMASTER_SIZE sizeof( union mbedtls_ssl_premaster_secret ) 467 const unsigned char *buf,
567 #if defined(MBEDTLS_X509_CRT_PARSE_C) 570 #if defined(MBEDTLS_SSL_PROTO_DTLS) 574 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE) 575 #if defined(MBEDTLS_X509_CRT_PARSE_C) 650 const unsigned char *hash,
715 const unsigned char *input,
762 unsigned char *output,
764 size_t output_size );
791 #if defined(MBEDTLS_HAVE_TIME) 797 unsigned char id[32];
800 #if defined(MBEDTLS_X509_CRT_PARSE_C) 805 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C) 811 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH) 815 #if defined(MBEDTLS_SSL_TRUNCATED_HMAC) 819 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC) 838 void (*
f_dbg)(
void *, int,
const char *, int,
const char *);
842 int (*
f_rng)(
void *,
unsigned char *, size_t);
851 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION) 857 #if defined(MBEDTLS_X509_CRT_PARSE_C) 863 #if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED) 869 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C) 872 const unsigned char *, size_t );
875 const unsigned char *, size_t );
879 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C) 882 unsigned char *,
const unsigned char *,
size_t *, uint32_t * );
888 #if defined(MBEDTLS_SSL_EXPORT_KEYS) 891 const unsigned char *, size_t, size_t, size_t );
895 #if defined(MBEDTLS_X509_CRT_PARSE_C) 902 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE) 903 #if defined(MBEDTLS_X509_CRT_PARSE_C) 904 mbedtls_ssl_async_sign_t *f_async_sign_start;
905 mbedtls_ssl_async_decrypt_t *f_async_decrypt_start;
907 mbedtls_ssl_async_resume_t *f_async_resume;
908 mbedtls_ssl_async_cancel_t *f_async_cancel;
909 void *p_async_config_data;
912 #if defined(MBEDTLS_KEY_EXCHANGE__WITH_CERT__ENABLED) 916 #if defined(MBEDTLS_ECP_C) 920 #if defined(MBEDTLS_DHM_C) 925 #if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED) 940 #if defined(MBEDTLS_SSL_ALPN) 950 #if defined(MBEDTLS_SSL_PROTO_DTLS) 957 #if defined(MBEDTLS_SSL_RENEGOTIATION) 963 #if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT) 967 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C) 985 #if defined(MBEDTLS_ARC4_C) 988 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH) 991 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC) 994 #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET) 997 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY) 1000 #if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING) 1003 #if defined(MBEDTLS_SSL_RENEGOTIATION) 1006 #if defined(MBEDTLS_SSL_TRUNCATED_HMAC) 1009 #if defined(MBEDTLS_SSL_SESSION_TICKETS) 1012 #if defined(MBEDTLS_SSL_FALLBACK_SCSV) && defined(MBEDTLS_SSL_CLI_C) 1015 #if defined(MBEDTLS_SSL_SRV_C) 1030 #if defined(MBEDTLS_SSL_RENEGOTIATION) 1040 #if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT) 1094 #if defined(MBEDTLS_SSL_PROTO_DTLS) 1099 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY) 1111 #if defined(MBEDTLS_SSL_PROTO_DTLS) 1132 #if defined(MBEDTLS_SSL_PROTO_DTLS) 1136 #if defined(MBEDTLS_ZLIB_SUPPORT) 1137 unsigned char *compress_buf;
1139 #if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING) 1151 #if defined(MBEDTLS_X509_CRT_PARSE_C) 1156 #if defined(MBEDTLS_SSL_ALPN) 1163 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C) 1174 #if defined(MBEDTLS_SSL_RENEGOTIATION) 1181 #if defined(MBEDTLS_SSL_HW_RECORD_ACCEL) 1183 #define MBEDTLS_SSL_CHANNEL_OUTBOUND 0 1184 #define MBEDTLS_SSL_CHANNEL_INBOUND 1 1187 const unsigned char *key_enc,
const unsigned char *key_dec,
1189 const unsigned char *iv_enc,
const unsigned char *iv_dec,
1191 const unsigned char *mac_enc,
const unsigned char *mac_dec,
1316 #if defined(MBEDTLS_X509_CRT_PARSE_C) 1341 int (*f_rng)(
void *,
unsigned char *,
size_t),
1359 void (*f_dbg)(
void *,
int,
const char *,
int,
const char *),
1398 #if defined(MBEDTLS_SSL_PROTO_DTLS) 1508 unsigned char *start,
1509 const unsigned char *end,
1511 uint32_t *lifetime );
1513 #if defined(MBEDTLS_SSL_EXPORT_KEYS) 1535 const unsigned char *ms,
1536 const unsigned char *kb,
1570 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C) 1591 #if defined(MBEDTLS_SSL_EXPORT_KEYS) 1604 void *p_export_keys );
1607 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE) 1639 mbedtls_ssl_async_sign_t *f_async_sign,
1640 mbedtls_ssl_async_decrypt_t *f_async_decrypt,
1641 mbedtls_ssl_async_resume_t *f_async_resume,
1642 mbedtls_ssl_async_cancel_t *f_async_cancel,
1643 void *config_data );
1701 unsigned char **p,
unsigned char *end,
1702 const unsigned char *info,
size_t ilen );
1718 const unsigned char *cookie,
size_t clen,
1719 const unsigned char *info,
size_t ilen );
1721 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C) 1775 const unsigned char *info,
1780 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY) 1799 #if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT) 1826 #if defined(MBEDTLS_SSL_PROTO_DTLS) 1857 unsigned allow_packing );
1893 #if defined(MBEDTLS_SSL_SRV_C) 1937 #if defined(MBEDTLS_SSL_CLI_C) 1971 const int *ciphersuites );
1993 const int *ciphersuites,
1994 int major,
int minor );
1996 #if defined(MBEDTLS_X509_CRT_PARSE_C) 2058 #if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED) 2080 const unsigned char *psk,
size_t psk_len,
2081 const unsigned char *psk_identity,
size_t psk_identity_len );
2097 const unsigned char *psk,
size_t psk_len );
2129 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_SRV_C) 2131 #if !defined(MBEDTLS_DEPRECATED_REMOVED) 2133 #if defined(MBEDTLS_DEPRECATED_WARNING) 2134 #define MBEDTLS_DEPRECATED __attribute__((deprecated)) 2136 #define MBEDTLS_DEPRECATED 2154 const char *dhm_G );
2172 const unsigned char *dhm_P,
size_t P_len,
2173 const unsigned char *dhm_G,
size_t G_len );
2187 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C) 2197 unsigned int bitlen );
2200 #if defined(MBEDTLS_ECP_C) 2232 #if defined(MBEDTLS_KEY_EXCHANGE__WITH_CERT__ENABLED) 2252 const int *hashes );
2255 #if defined(MBEDTLS_X509_CRT_PARSE_C) 2277 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION) 2351 #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) 2370 const unsigned char *pw,
2374 #if defined(MBEDTLS_SSL_ALPN) 2439 #if defined(MBEDTLS_SSL_FALLBACK_SCSV) && defined(MBEDTLS_SSL_CLI_C) 2462 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC) 2477 #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET) 2492 #if defined(MBEDTLS_ARC4_C) 2511 #if defined(MBEDTLS_SSL_SRV_C) 2522 char cert_req_ca_list );
2525 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH) 2557 #if defined(MBEDTLS_SSL_TRUNCATED_HMAC) 2569 #if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING) 2584 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C) 2598 #if defined(MBEDTLS_SSL_RENEGOTIATION) 2648 #if defined(MBEDTLS_SSL_RENEGOTIATION) 2714 const unsigned char period[8] );
2821 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH) 2865 #if defined(MBEDTLS_X509_CRT_PARSE_C) 2883 #if defined(MBEDTLS_SSL_CLI_C) 2987 #if defined(MBEDTLS_SSL_RENEGOTIATION) 3165 unsigned char level,
3166 unsigned char message );
3217 int endpoint,
int transport,
int preset );
mbedtls_ssl_send_t * f_send
mbedtls_x509_crt * peer_cert
void mbedtls_ssl_set_hs_ca_chain(mbedtls_ssl_context *ssl, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate for the current handshake.
int mbedtls_ssl_ticket_parse_t(void *p_ticket, mbedtls_ssl_session *session, unsigned char *buf, size_t len)
Callback type: parse and load session ticket.
char peer_verify_data[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN]
unsigned char max_minor_ver
const char * mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id)
Return the name of the ciphersuite associated with the given ID.
void mbedtls_ssl_conf_encrypt_then_mac(mbedtls_ssl_config *conf, char etm)
Enable or disable Encrypt-then-MAC (Default: MBEDTLS_SSL_ETM_ENABLED)
unsigned char min_minor_ver
int mbedtls_ssl_cookie_write_t(void *ctx, unsigned char **p, unsigned char *end, const unsigned char *info, size_t ilen)
Callback type: generate a cookie.
unsigned int dhm_min_bitlen
int mbedtls_ssl_cookie_check_t(void *ctx, const unsigned char *cookie, size_t clen, const unsigned char *info, size_t ilen)
Callback type: verify a cookie.
void mbedtls_ssl_set_timer_cb(mbedtls_ssl_context *ssl, void *p_timer, mbedtls_ssl_set_timer_t *f_set_timer, mbedtls_ssl_get_timer_t *f_get_timer)
Set the timer callbacks (Mandatory for DTLS.)
struct mbedtls_ssl_sig_hash_set_t mbedtls_ssl_sig_hash_set_t
void mbedtls_ssl_conf_extended_master_secret(mbedtls_ssl_config *conf, char ems)
Enable or disable Extended Master Secret negotiation. (Default: MBEDTLS_SSL_EXTENDED_MS_ENABLED) ...
mbedtls_ssl_transform * transform_in
int mbedtls_ssl_send_t(void *ctx, const unsigned char *buf, size_t len)
Callback type: send data on the network.
unsigned int badmac_limit
void mbedtls_ssl_conf_fallback(mbedtls_ssl_config *conf, char fallback)
Set the fallback flag (client-side only). (Default: MBEDTLS_SSL_IS_NOT_FALLBACK). ...
int mbedtls_ssl_recv_t(void *ctx, unsigned char *buf, size_t len)
Callback type: receive data from the network.
const mbedtls_ecp_group_id * curve_list
This file provides an API for Elliptic Curves over GF(P) (ECP).
void mbedtls_ssl_conf_cbc_record_splitting(mbedtls_ssl_config *conf, char split)
Enable / Disable 1/n-1 record splitting (Default: MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED) ...
int(* f_cookie_write)(void *, unsigned char **, unsigned char *, const unsigned char *, size_t)
int(* f_export_keys)(void *, const unsigned char *, const unsigned char *, size_t, size_t, size_t)
int(* f_get_cache)(void *, mbedtls_ssl_session *)
unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE]
void(* f_dbg)(void *, int, const char *, int, const char *)
int(* f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t)
void mbedtls_ssl_conf_verify(mbedtls_ssl_config *conf, int(*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), void *p_vrfy)
Set the verification callback (Optional).
unsigned int cert_req_ca_list
unsigned char _pms_rsa[48]
unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]
unsigned char renego_period[8]
int mbedtls_ssl_get_max_out_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum outgoing record payload in bytes. This takes into account the config...
void mbedtls_ssl_conf_renegotiation(mbedtls_ssl_config *conf, int renegotiation)
Enable / Disable renegotiation support for connection when initiated by peer (Default: MBEDTLS_SSL_RE...
mbedtls_ssl_session * session_in
uint8_t disable_datagram_packing
int mbedtls_ssl_conf_dh_param_bin(mbedtls_ssl_config *conf, const unsigned char *dhm_P, size_t P_len, const unsigned char *dhm_G, size_t G_len)
Set the Diffie-Hellman public P and G values from big-endian binary presentations. (Default values: MBEDTLS_DHM_RFC3526_MODP_2048_[PG]_BIN)
void mbedtls_ssl_conf_dtls_anti_replay(mbedtls_ssl_config *conf, char mode)
Enable or disable anti-replay protection for DTLS. (DTLS only, no effect on TLS.) Default: enabled...
mbedtls_ssl_get_timer_t * f_get_timer
Configuration options (set of defines)
void mbedtls_ssl_conf_max_version(mbedtls_ssl_config *conf, int major, int minor)
Set the maximum supported version sent from the client side and/or accepted at the server side (Defau...
uint32_t mbedtls_ssl_get_verify_result(const mbedtls_ssl_context *ssl)
Return the result of the certificate verification.
void mbedtls_ssl_conf_session_tickets_cb(mbedtls_ssl_config *conf, mbedtls_ssl_ticket_write_t *f_ticket_write, mbedtls_ssl_ticket_parse_t *f_ticket_parse, void *p_ticket)
Configure SSL session ticket callbacks (server only). (Default: none.)
mbedtls_x509_crl * ca_crl
int mbedtls_ssl_check_pending(const mbedtls_ssl_context *ssl)
Check if there is data already read from the underlying transport but not yet processed.
mbedtls_ssl_session * session_out
const mbedtls_x509_crt * mbedtls_ssl_get_peer_cert(const mbedtls_ssl_context *ssl)
Return the peer certificate from the current connection.
int mbedtls_ssl_send_alert_message(mbedtls_ssl_context *ssl, unsigned char level, unsigned char message)
Send an alert message.
int mbedtls_ssl_recv_timeout_t(void *ctx, unsigned char *buf, size_t len, uint32_t timeout)
Callback type: receive data from the network, with timeout.
SSL Ciphersuites for mbed TLS.
int(* f_ticket_write)(void *, const mbedtls_ssl_session *, unsigned char *, const unsigned char *, size_t *, uint32_t *)
mbedtls_ssl_transform * transform_out
void mbedtls_ssl_conf_renegotiation_period(mbedtls_ssl_config *conf, const unsigned char period[8])
Set record counter threshold for periodic renegotiation. (Default: 2^48 - 1)
int(* f_set_cache)(void *, const mbedtls_ssl_session *)
Multi-precision integer library.
int mbedtls_ssl_conf_psk(mbedtls_ssl_config *conf, const unsigned char *psk, size_t psk_len, const unsigned char *psk_identity, size_t psk_identity_len)
Set the Pre Shared Key (PSK) and the expected identity name.
int mbedtls_ssl_conf_max_frag_len(mbedtls_ssl_config *conf, unsigned char mfl_code)
Set the maximum fragment length to emit and/or negotiate (Default: the smaller of MBEDTLS_SSL_IN_CONT...
int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Try to write exactly 'len' application data bytes.
void mbedtls_ssl_conf_cert_req_ca_list(mbedtls_ssl_config *conf, char cert_req_ca_list)
Whether to send a list of acceptable CAs in CertificateRequest messages. (Default: do send) ...
void mbedtls_ssl_conf_min_version(mbedtls_ssl_config *conf, int major, int minor)
Set the minimum accepted SSL/TLS protocol version (Default: TLS 1.0)
int(* f_cookie_check)(void *, const unsigned char *, size_t, const unsigned char *, size_t)
int mbedtls_ssl_close_notify(mbedtls_ssl_context *ssl)
Notify the peer that the connection is being closed.
struct mbedtls_ssl_flight_item mbedtls_ssl_flight_item
void mbedtls_ssl_conf_session_tickets(mbedtls_ssl_config *conf, int use_tickets)
Enable / Disable session tickets (client only). (Default: MBEDTLS_SSL_SESSION_TICKETS_ENABLED.)
void mbedtls_ssl_conf_ciphersuites_for_version(mbedtls_ssl_config *conf, const int *ciphersuites, int major, int minor)
Set the list of allowed ciphersuites and the preference order for a specific version of the protocol...
mbedtls_ssl_transform * transform
mbedtls_ssl_handshake_params * handshake
void mbedtls_ssl_free(mbedtls_ssl_context *ssl)
Free referenced items in an SSL context and clear memory.
void mbedtls_ssl_conf_export_keys_cb(mbedtls_ssl_config *conf, mbedtls_ssl_export_keys_t *f_export_keys, void *p_export_keys)
Configure key export callback. (Default: none.)
void mbedtls_ssl_conf_endpoint(mbedtls_ssl_config *conf, int endpoint)
Set the current endpoint type.
void mbedtls_ssl_session_free(mbedtls_ssl_session *session)
Free referenced items in an SSL session including the peer certificate and clear memory.
void mbedtls_ssl_conf_arc4_support(mbedtls_ssl_config *conf, char arc4)
Disable or enable support for RC4 (Default: MBEDTLS_SSL_ARC4_DISABLED)
void mbedtls_ssl_conf_sig_hashes(mbedtls_ssl_config *conf, const int *hashes)
Set the allowed hashes for signatures during the handshake. (Default: all available hashes except MD5...
unsigned char min_major_ver
struct mbedtls_ssl_transform mbedtls_ssl_transform
mbedtls_ssl_set_timer_t * f_set_timer
const char * mbedtls_ssl_get_alpn_protocol(const mbedtls_ssl_context *ssl)
Get the name of the negotiated Application Layer Protocol. This function should be called after the h...
const int * ciphersuite_list[4]
int(* f_rng)(void *, unsigned char *, size_t)
void mbedtls_ssl_conf_dhm_min_bitlen(mbedtls_ssl_config *conf, unsigned int bitlen)
Set the minimum length for Diffie-Hellman parameters. (Client-side only.) (Default: 1024 bits...
void mbedtls_ssl_conf_dtls_cookies(mbedtls_ssl_config *conf, mbedtls_ssl_cookie_write_t *f_cookie_write, mbedtls_ssl_cookie_check_t *f_cookie_check, void *p_cookie)
Register callbacks for DTLS cookies (Server only. DTLS only.)
mbedtls_ssl_key_cert * key_cert
MBEDTLS_DEPRECATED int mbedtls_ssl_conf_dh_param(mbedtls_ssl_config *conf, const char *dhm_P, const char *dhm_G)
Set the Diffie-Hellman public P and G values, read as hexadecimal strings (server-side only) (Default...
mbedtls_ssl_recv_t * f_recv
int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name)
Return the ID of the ciphersuite associated with the given name.
void mbedtls_ssl_conf_transport(mbedtls_ssl_config *conf, int transport)
Set the transport type (TLS or DTLS). Default: TLS.
mbedtls_ssl_session * session_negotiate
void mbedtls_ssl_conf_sni(mbedtls_ssl_config *conf, int(*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_sni)
Set server side ServerName TLS extension callback (optional, server-side only).
void mbedtls_ssl_conf_renegotiation_enforced(mbedtls_ssl_config *conf, int max_records)
Enforce renegotiation requests. (Default: enforced, max_records = 16)
void mbedtls_ssl_set_mtu(mbedtls_ssl_context *ssl, uint16_t mtu)
Set the Maximum Tranport Unit (MTU). Special value: 0 means unset (no limit). This represents the max...
#define MBEDTLS_DEPRECATED
int mbedtls_ssl_set_client_transport_id(mbedtls_ssl_context *ssl, const unsigned char *info, size_t ilen)
Set client's transport-level identification info. (Server only. DTLS only.)
void mbedtls_ssl_set_bio(mbedtls_ssl_context *ssl, void *p_bio, mbedtls_ssl_send_t *f_send, mbedtls_ssl_recv_t *f_recv, mbedtls_ssl_recv_timeout_t *f_recv_timeout)
Set the underlying BIO callbacks for write, read and read-with-timeout.
unsigned int encrypt_then_mac
unsigned int cbc_record_splitting
void mbedtls_ssl_conf_rng(mbedtls_ssl_config *conf, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)
Set the random number generator callback.
int mbedtls_ssl_conf_alpn_protocols(mbedtls_ssl_config *conf, const char **protos)
Set the supported Application Layer Protocols.
void mbedtls_ssl_conf_cert_profile(mbedtls_ssl_config *conf, const mbedtls_x509_crt_profile *profile)
Set the X.509 security profile used for verification.
unsigned char _pms_ecdhe_psk[4+MBEDTLS_ECP_MAX_BYTES+MBEDTLS_PSK_MAX_LEN]
const mbedtls_x509_crt_profile * cert_profile
This file contains Diffie-Hellman-Merkle (DHM) key exchange definitions and functions.
X.509 certificate parsing and writing.
void mbedtls_ssl_conf_session_cache(mbedtls_ssl_config *conf, void *p_cache, int(*f_get_cache)(void *, mbedtls_ssl_session *), int(*f_set_cache)(void *, const mbedtls_ssl_session *))
Set the session cache callbacks (server-side only) If not set, no session resuming is done (except if...
#define MBEDTLS_PSK_MAX_LEN
unsigned int session_tickets
void mbedtls_ssl_conf_truncated_hmac(mbedtls_ssl_config *conf, int truncate)
Activate negotiation of truncated HMAC (Default: MBEDTLS_SSL_TRUNC_HMAC_DISABLED) ...
mbedtls_ssl_session * session
char own_verify_data[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN]
void mbedtls_ssl_init(mbedtls_ssl_context *ssl)
Initialize an SSL context Just makes the context ready for mbedtls_ssl_setup() or mbedtls_ssl_free() ...
mbedtls_ssl_transform * transform_negotiate
const char * mbedtls_ssl_get_ciphersuite(const mbedtls_ssl_context *ssl)
Return the name of the current ciphersuite.
int mbedtls_ssl_get_timer_t(void *ctx)
Callback type: get status of timers/delays.
The DHM context structure.
const mbedtls_ssl_config * conf
void mbedtls_ssl_conf_dbg(mbedtls_ssl_config *conf, void(*f_dbg)(void *, int, const char *, int, const char *), void *p_dbg)
Set the debug callback.
int(* f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t)
unsigned char max_major_ver
void mbedtls_ssl_config_init(mbedtls_ssl_config *conf)
Initialize an SSL configuration context Just makes the context ready for mbedtls_ssl_config_defaults(...
int mbedtls_ssl_get_record_expansion(const mbedtls_ssl_context *ssl)
Return the (maximum) number of bytes added by the record layer: header + encryption/MAC overhead (inc...
This file contains ECDH definitions and functions.
int mbedtls_ssl_conf_dh_param_ctx(mbedtls_ssl_config *conf, mbedtls_dhm_context *dhm_ctx)
Set the Diffie-Hellman public P and G values, read from existing context (server-side only) ...
int mbedtls_ssl_set_session(mbedtls_ssl_context *ssl, const mbedtls_ssl_session *session)
Request resumption of session (client-side only) Session data is copied from presented session struct...
#define MBEDTLS_MPI_MAX_SIZE
unsigned int disable_renegotiation
void mbedtls_ssl_set_datagram_packing(mbedtls_ssl_context *ssl, unsigned allow_packing)
Allow or disallow packing of multiple handshake records within a single datagram. ...
int mbedtls_ssl_set_hs_own_cert(mbedtls_ssl_context *ssl, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate and key for the current handshake.
int mbedtls_ssl_conf_own_cert(mbedtls_ssl_config *conf, mbedtls_x509_crt *own_cert, mbedtls_pk_context *pk_key)
Set own certificate chain and private key.
int mbedtls_ssl_setup(mbedtls_ssl_context *ssl, const mbedtls_ssl_config *conf)
Set up an SSL context for use.
void mbedtls_ssl_conf_legacy_renegotiation(mbedtls_ssl_config *conf, int allow_legacy)
Prevent or allow legacy renegotiation. (Default: MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION) ...
unsigned char _pms_rsa_psk[52+MBEDTLS_PSK_MAX_LEN]
int mbedtls_ssl_renegotiate(mbedtls_ssl_context *ssl)
Initiate an SSL renegotiation on the running connection. Client: perform the renegotiation right now...
int(* f_ticket_parse)(void *, mbedtls_ssl_session *, unsigned char *, size_t)
int mbedtls_ssl_export_keys_t(void *p_expkey, const unsigned char *ms, const unsigned char *kb, size_t maclen, size_t keylen, size_t ivlen)
Callback type: Export key block and master secret.
int(* f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *)
unsigned int arc4_disabled
X.509 certificate revocation list parsing.
void mbedtls_ssl_conf_psk_cb(mbedtls_ssl_config *conf, int(*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t), void *p_psk)
Set the PSK callback (server-side only).
mbedtls_ssl_recv_timeout_t * f_recv_timeout
mbedtls_x509_crt * ca_chain
void mbedtls_ssl_conf_read_timeout(mbedtls_ssl_config *conf, uint32_t timeout)
Set the timeout period for mbedtls_ssl_read() (Default: no timeout.)
void mbedtls_ssl_config_free(mbedtls_ssl_config *conf)
Free an SSL configuration context.
unsigned char * psk_identity
int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len)
Read at most 'len' application data bytes.
struct mbedtls_ssl_key_cert mbedtls_ssl_key_cert
void mbedtls_ssl_set_timer_t(void *ctx, uint32_t int_ms, uint32_t fin_ms)
Callback type: set a pair of timers/delays to watch.
size_t mbedtls_ssl_get_bytes_avail(const mbedtls_ssl_context *ssl)
Return the number of application data bytes remaining to be read from the current record...
unsigned char _pms_dhe_psk[4+MBEDTLS_MPI_MAX_SIZE+MBEDTLS_PSK_MAX_LEN]
size_t next_record_offset
void mbedtls_ssl_session_init(mbedtls_ssl_session *session)
Initialize SSL session structure.
int mbedtls_ssl_ticket_write_t(void *p_ticket, const mbedtls_ssl_session *session, unsigned char *start, const unsigned char *end, size_t *tlen, uint32_t *lifetime)
Callback type: generate and write session ticket.
void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max)
Set retransmit timeout values for the DTLS handshake. (DTLS only, no effect on TLS.)
int mbedtls_ssl_config_defaults(mbedtls_ssl_config *conf, int endpoint, int transport, int preset)
Load reasonnable default SSL configuration values. (You need to call mbedtls_ssl_config_init() first...
void mbedtls_ssl_conf_ca_chain(mbedtls_ssl_config *conf, mbedtls_x509_crt *ca_chain, mbedtls_x509_crl *ca_crl)
Set the data required to verify peer certificate.
void mbedtls_ssl_conf_curves(mbedtls_ssl_config *conf, const mbedtls_ecp_group_id *curves)
Set the allowed curves in order of preference. (Default: all defined curves.)
void mbedtls_ssl_conf_dtls_badmac_limit(mbedtls_ssl_config *conf, unsigned limit)
Set a limit on the number of records with a bad MAC before terminating the connection. (DTLS only, no effect on TLS.) Default: 0 (disabled).
unsigned char _pms_psk[4+2 *MBEDTLS_PSK_MAX_LEN]
int mbedtls_ssl_handshake(mbedtls_ssl_context *ssl)
Perform the SSL handshake.
void mbedtls_ssl_set_hs_authmode(mbedtls_ssl_context *ssl, int authmode)
Set authmode for the current handshake.
unsigned int allow_legacy_renegotiation
mbedtls_md_type_t
Supported message digests.
int mbedtls_ssl_handshake_step(mbedtls_ssl_context *ssl)
Perform a single step of the SSL handshake.
unsigned char cur_out_ctr[8]
const char * mbedtls_ssl_get_version(const mbedtls_ssl_context *ssl)
Return the current SSL version (SSLv3/TLSv1/etc)
void mbedtls_ssl_conf_authmode(mbedtls_ssl_config *conf, int authmode)
Set the certificate verification mode Default: NONE on server, REQUIRED on client.
int mbedtls_ssl_session_reset(mbedtls_ssl_context *ssl)
Reset an already initialized SSL context for re-use while retaining application-set variables...
int mbedtls_ssl_set_hostname(mbedtls_ssl_context *ssl, const char *hostname)
Set or reset the hostname to check against the received server certificate. It sets the ServerName TL...
struct mbedtls_ssl_handshake_params mbedtls_ssl_handshake_params
#define MBEDTLS_ECP_MAX_BYTES
int mbedtls_ssl_set_hs_psk(mbedtls_ssl_context *ssl, const unsigned char *psk, size_t psk_len)
Set the Pre Shared Key (PSK) for the current handshake.
int mbedtls_ssl_get_session(const mbedtls_ssl_context *ssl, mbedtls_ssl_session *session)
Save session in order to resume it later (client-side only) Session data is copied to presented sessi...
void mbedtls_ssl_conf_ciphersuites(mbedtls_ssl_config *conf, const int *ciphersuites)
Set the list of allowed ciphersuites and the preference order. First in the list has the highest pref...
size_t mbedtls_ssl_get_max_frag_len(const mbedtls_ssl_context *ssl)
Return the maximum fragment length (payload, in bytes). This is the value negotiated with peer if any...
#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN