tls.h
Go to the documentation of this file.
1 /**
2  * @file tls.h
3  * @brief TLS (Transport Layer Security)
4  *
5  * @section License
6  *
7  * SPDX-License-Identifier: GPL-2.0-or-later
8  *
9  * Copyright (C) 2010-2025 Oryx Embedded SARL. All rights reserved.
10  *
11  * This file is part of CycloneSSL Open.
12  *
13  * This program is free software; you can redistribute it and/or
14  * modify it under the terms of the GNU General Public License
15  * as published by the Free Software Foundation; either version 2
16  * of the License, or (at your option) any later version.
17  *
18  * This program is distributed in the hope that it will be useful,
19  * but WITHOUT ANY WARRANTY; without even the implied warranty of
20  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21  * GNU General Public License for more details.
22  *
23  * You should have received a copy of the GNU General Public License
24  * along with this program; if not, write to the Free Software Foundation,
25  * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
26  *
27  * @author Oryx Embedded SARL (www.oryx-embedded.com)
28  * @version 2.5.0
29  **/
30 
31 #ifndef _TLS_H
32 #define _TLS_H
33 
34 //Forward declaration of TlsContext structure
35 struct _TlsContext;
36 #define TlsContext struct _TlsContext
37 
38 //Forward declaration of TlsEncryptionEngine structure
40 #define TlsEncryptionEngine struct _TlsEncryptionEngine
41 
42 //Dependencies
43 #include "core/crypto.h"
44 #include "mac/hmac.h"
45 #include "aead/aead_algorithms.h"
47 #include "pkc/rsa.h"
48 #include "pkc/dsa.h"
49 #include "ecc/ecdsa.h"
50 #include "pkix/x509_common.h"
51 #include "tls_config.h"
52 #include "tls_legacy.h"
53 #include "tls13_misc.h"
54 #include "dtls_misc.h"
55 
56 
57 /*
58  * CycloneSSL Open is licensed under GPL version 2. In particular:
59  *
60  * - If you link your program to CycloneSSL Open, the result is a derivative
61  * work that can only be distributed under the same GPL license terms.
62  *
63  * - If additions or changes to CycloneSSL Open are made, the result is a
64  * derivative work that can only be distributed under the same license terms.
65  *
66  * - The GPL license requires that you make the source code available to
67  * whoever you make the binary available to.
68  *
69  * - If you sell or distribute a hardware product that runs CycloneSSL Open,
70  * the GPL license requires you to provide public and full access to all
71  * source code on a nondiscriminatory basis.
72  *
73  * If you fully understand and accept the terms of the GPL license, then edit
74  * the os_port_config.h header and add the following directive:
75  *
76  * #define GPL_LICENSE_TERMS_ACCEPTED
77  */
78 
79 #ifndef GPL_LICENSE_TERMS_ACCEPTED
80  #error Before compiling CycloneSSL Open, you must accept the terms of the GPL license
81 #endif
82 
83 //Version string
84 #define CYCLONE_SSL_VERSION_STRING "2.5.0"
85 //Major version
86 #define CYCLONE_SSL_MAJOR_VERSION 2
87 //Minor version
88 #define CYCLONE_SSL_MINOR_VERSION 5
89 //Revision number
90 #define CYCLONE_SSL_REV_NUMBER 0
91 
92 //TLS version numbers
93 #define SSL_VERSION_3_0 0x0300
94 #define TLS_VERSION_1_0 0x0301
95 #define TLS_VERSION_1_1 0x0302
96 #define TLS_VERSION_1_2 0x0303
97 #define TLS_VERSION_1_3 0x0304
98 
99 //TLS support
100 #ifndef TLS_SUPPORT
101  #define TLS_SUPPORT ENABLED
102 #elif (TLS_SUPPORT != ENABLED && TLS_SUPPORT != DISABLED)
103  #error TLS_SUPPORT parameter is not valid
104 #endif
105 
106 //Client mode of operation
107 #ifndef TLS_CLIENT_SUPPORT
108  #define TLS_CLIENT_SUPPORT ENABLED
109 #elif (TLS_CLIENT_SUPPORT != ENABLED && TLS_CLIENT_SUPPORT != DISABLED)
110  #error TLS_CLIENT_SUPPORT parameter is not valid
111 #endif
112 
113 //Server mode of operation
114 #ifndef TLS_SERVER_SUPPORT
115  #define TLS_SERVER_SUPPORT ENABLED
116 #elif (TLS_SERVER_SUPPORT != ENABLED && TLS_SERVER_SUPPORT != DISABLED)
117  #error TLS_SERVER_SUPPORT parameter is not valid
118 #endif
119 
120 //Minimum TLS version that can be negotiated
121 #ifndef TLS_MIN_VERSION
122  #define TLS_MIN_VERSION TLS_VERSION_1_2
123 #elif (TLS_MIN_VERSION < TLS_VERSION_1_0)
124  #error TLS_MIN_VERSION parameter is not valid
125 #endif
126 
127 //Maximum TLS version that can be negotiated
128 #ifndef TLS_MAX_VERSION
129  #define TLS_MAX_VERSION TLS_VERSION_1_3
130 #elif (TLS_MAX_VERSION > TLS_VERSION_1_3 || TLS_MAX_VERSION < TLS_MIN_VERSION)
131  #error TLS_MAX_VERSION parameter is not valid
132 #endif
133 
134 //Session resumption mechanism
135 #ifndef TLS_SESSION_RESUME_SUPPORT
136  #define TLS_SESSION_RESUME_SUPPORT ENABLED
137 #elif (TLS_SESSION_RESUME_SUPPORT != ENABLED && TLS_SESSION_RESUME_SUPPORT != DISABLED)
138  #error TLS_SESSION_RESUME_SUPPORT parameter is not valid
139 #endif
140 
141 //Lifetime of session cache entries
142 #ifndef TLS_SESSION_CACHE_LIFETIME
143  #define TLS_SESSION_CACHE_LIFETIME 3600000
144 #elif (TLS_SESSION_CACHE_LIFETIME < 1000)
145  #error TLS_SESSION_CACHE_LIFETIME parameter is not valid
146 #endif
147 
148 //Session ticket mechanism
149 #ifndef TLS_TICKET_SUPPORT
150  #define TLS_TICKET_SUPPORT DISABLED
151 #elif (TLS_TICKET_SUPPORT != ENABLED && TLS_TICKET_SUPPORT != DISABLED)
152  #error TLS_TICKET_SUPPORT parameter is not valid
153 #endif
154 
155 //Maximum size for session tickets
156 #ifndef TLS_MAX_TICKET_SIZE
157  #define TLS_MAX_TICKET_SIZE 1024
158 #elif (TLS_MAX_TICKET_SIZE < 32)
159  #error TLS_MAX_TICKET_SIZE parameter is not valid
160 #endif
161 
162 //Lifetime of session tickets
163 #ifndef TLS_TICKET_LIFETIME
164  #define TLS_TICKET_LIFETIME 3600000
165 #elif (TLS_TICKET_LIFETIME < 0)
166  #error TLS_TICKET_LIFETIME parameter is not valid
167 #endif
168 
169 //SNI (Server Name Indication) extension
170 #ifndef TLS_SNI_SUPPORT
171  #define TLS_SNI_SUPPORT ENABLED
172 #elif (TLS_SNI_SUPPORT != ENABLED && TLS_SNI_SUPPORT != DISABLED)
173  #error TLS_SNI_SUPPORT parameter is not valid
174 #endif
175 
176 //Maximum Fragment Length extension
177 #ifndef TLS_MAX_FRAG_LEN_SUPPORT
178  #define TLS_MAX_FRAG_LEN_SUPPORT DISABLED
179 #elif (TLS_MAX_FRAG_LEN_SUPPORT != ENABLED && TLS_MAX_FRAG_LEN_SUPPORT != DISABLED)
180  #error TLS_MAX_FRAG_LEN_SUPPORT parameter is not valid
181 #endif
182 
183 //Record Size Limit extension
184 #ifndef TLS_RECORD_SIZE_LIMIT_SUPPORT
185  #define TLS_RECORD_SIZE_LIMIT_SUPPORT ENABLED
186 #elif (TLS_RECORD_SIZE_LIMIT_SUPPORT != ENABLED && TLS_RECORD_SIZE_LIMIT_SUPPORT != DISABLED)
187  #error TLS_RECORD_SIZE_LIMIT_SUPPORT parameter is not valid
188 #endif
189 
190 //ALPN (Application-Layer Protocol Negotiation) extension
191 #ifndef TLS_ALPN_SUPPORT
192  #define TLS_ALPN_SUPPORT DISABLED
193 #elif (TLS_ALPN_SUPPORT != ENABLED && TLS_ALPN_SUPPORT != DISABLED)
194  #error TLS_ALPN_SUPPORT parameter is not valid
195 #endif
196 
197 //Encrypt-then-MAC extension
198 #ifndef TLS_ENCRYPT_THEN_MAC_SUPPORT
199  #define TLS_ENCRYPT_THEN_MAC_SUPPORT DISABLED
200 #elif (TLS_ENCRYPT_THEN_MAC_SUPPORT != ENABLED && TLS_ENCRYPT_THEN_MAC_SUPPORT != DISABLED)
201  #error TLS_ENCRYPT_THEN_MAC_SUPPORT parameter is not valid
202 #endif
203 
204 //Extended Master Secret extension
205 #ifndef TLS_EXT_MASTER_SECRET_SUPPORT
206  #define TLS_EXT_MASTER_SECRET_SUPPORT ENABLED
207 #elif (TLS_EXT_MASTER_SECRET_SUPPORT != ENABLED && TLS_EXT_MASTER_SECRET_SUPPORT != DISABLED)
208  #error TLS_EXT_MASTER_SECRET_SUPPORT parameter is not valid
209 #endif
210 
211 //ClientHello Padding extension
212 #ifndef TLS_CLIENT_HELLO_PADDING_SUPPORT
213  #define TLS_CLIENT_HELLO_PADDING_SUPPORT ENABLED
214 #elif (TLS_CLIENT_HELLO_PADDING_SUPPORT != ENABLED && TLS_CLIENT_HELLO_PADDING_SUPPORT != DISABLED)
215  #error TLS_CLIENT_HELLO_PADDING_SUPPORT parameter is not valid
216 #endif
217 
218 //Certificate Authorities extension
219 #ifndef TLS_CERT_AUTHORITIES_SUPPORT
220  #define TLS_CERT_AUTHORITIES_SUPPORT DISABLED
221 #elif (TLS_CERT_AUTHORITIES_SUPPORT != ENABLED && TLS_CERT_AUTHORITIES_SUPPORT != DISABLED)
222  #error TLS_CERT_AUTHORITIES_SUPPORT parameter is not valid
223 #endif
224 
225 //Signature Algorithms Certificate extension
226 #ifndef TLS_SIGN_ALGOS_CERT_SUPPORT
227  #define TLS_SIGN_ALGOS_CERT_SUPPORT DISABLED
228 #elif (TLS_SIGN_ALGOS_CERT_SUPPORT != ENABLED && TLS_SIGN_ALGOS_CERT_SUPPORT != DISABLED)
229  #error TLS_SIGN_ALGOS_CERT_SUPPORT parameter is not valid
230 #endif
231 
232 //RPK (Raw Public Key) support
233 #ifndef TLS_RAW_PUBLIC_KEY_SUPPORT
234  #define TLS_RAW_PUBLIC_KEY_SUPPORT DISABLED
235 #elif (TLS_RAW_PUBLIC_KEY_SUPPORT != ENABLED && TLS_RAW_PUBLIC_KEY_SUPPORT != DISABLED)
236  #error TLS_RAW_PUBLIC_KEY_SUPPORT parameter is not valid
237 #endif
238 
239 //Secure renegotiation support
240 #ifndef TLS_SECURE_RENEGOTIATION_SUPPORT
241  #define TLS_SECURE_RENEGOTIATION_SUPPORT ENABLED
242 #elif (TLS_SECURE_RENEGOTIATION_SUPPORT != ENABLED && TLS_SECURE_RENEGOTIATION_SUPPORT != DISABLED)
243  #error TLS_SECURE_RENEGOTIATION_SUPPORT parameter is not valid
244 #endif
245 
246 //Fallback SCSV support
247 #ifndef TLS_FALLBACK_SCSV_SUPPORT
248  #define TLS_FALLBACK_SCSV_SUPPORT DISABLED
249 #elif (TLS_FALLBACK_SCSV_SUPPORT != ENABLED && TLS_FALLBACK_SCSV_SUPPORT != DISABLED)
250  #error TLS_FALLBACK_SCSV_SUPPORT parameter is not valid
251 #endif
252 
253 //ECC callback functions
254 #ifndef TLS_ECC_CALLBACK_SUPPORT
255  #define TLS_ECC_CALLBACK_SUPPORT DISABLED
256 #elif (TLS_ECC_CALLBACK_SUPPORT != ENABLED && TLS_ECC_CALLBACK_SUPPORT != DISABLED)
257  #error TLS_ECC_CALLBACK_SUPPORT parameter is not valid
258 #endif
259 
260 //Maximum number of certificates the end entity can load
261 #ifndef TLS_MAX_CERTIFICATES
262  #define TLS_MAX_CERTIFICATES 3
263 #elif (TLS_MAX_CERTIFICATES < 1)
264  #error TLS_MAX_CERTIFICATES parameter is not valid
265 #endif
266 
267 //RSA key exchange support
268 #ifndef TLS_RSA_KE_SUPPORT
269  #define TLS_RSA_KE_SUPPORT ENABLED
270 #elif (TLS_RSA_KE_SUPPORT != ENABLED && TLS_RSA_KE_SUPPORT != DISABLED)
271  #error TLS_RSA_KE_SUPPORT parameter is not valid
272 #endif
273 
274 //DHE_RSA key exchange support
275 #ifndef TLS_DHE_RSA_KE_SUPPORT
276  #define TLS_DHE_RSA_KE_SUPPORT ENABLED
277 #elif (TLS_DHE_RSA_KE_SUPPORT != ENABLED && TLS_DHE_RSA_KE_SUPPORT != DISABLED)
278  #error TLS_DHE_RSA_KE_SUPPORT parameter is not valid
279 #endif
280 
281 //DHE_DSS key exchange support
282 #ifndef TLS_DHE_DSS_KE_SUPPORT
283  #define TLS_DHE_DSS_KE_SUPPORT DISABLED
284 #elif (TLS_DHE_DSS_KE_SUPPORT != ENABLED && TLS_DHE_DSS_KE_SUPPORT != DISABLED)
285  #error TLS_DHE_DSS_KE_SUPPORT parameter is not valid
286 #endif
287 
288 //DH_anon key exchange support (insecure)
289 #ifndef TLS_DH_ANON_KE_SUPPORT
290  #define TLS_DH_ANON_KE_SUPPORT DISABLED
291 #elif (TLS_DH_ANON_KE_SUPPORT != ENABLED && TLS_DH_ANON_KE_SUPPORT != DISABLED)
292  #error TLS_DH_ANON_KE_SUPPORT parameter is not valid
293 #endif
294 
295 //ECDHE_RSA key exchange support
296 #ifndef TLS_ECDHE_RSA_KE_SUPPORT
297  #define TLS_ECDHE_RSA_KE_SUPPORT ENABLED
298 #elif (TLS_ECDHE_RSA_KE_SUPPORT != ENABLED && TLS_ECDHE_RSA_KE_SUPPORT != DISABLED)
299  #error TLS_ECDHE_RSA_KE_SUPPORT parameter is not valid
300 #endif
301 
302 //ECDHE_ECDSA key exchange support
303 #ifndef TLS_ECDHE_ECDSA_KE_SUPPORT
304  #define TLS_ECDHE_ECDSA_KE_SUPPORT ENABLED
305 #elif (TLS_ECDHE_ECDSA_KE_SUPPORT != ENABLED && TLS_ECDHE_ECDSA_KE_SUPPORT != DISABLED)
306  #error TLS_ECDHE_ECDSA_KE_SUPPORT parameter is not valid
307 #endif
308 
309 //ECDH_anon key exchange support (insecure)
310 #ifndef TLS_ECDH_ANON_KE_SUPPORT
311  #define TLS_ECDH_ANON_KE_SUPPORT DISABLED
312 #elif (TLS_ECDH_ANON_KE_SUPPORT != ENABLED && TLS_ECDH_ANON_KE_SUPPORT != DISABLED)
313  #error TLS_ECDH_ANON_KE_SUPPORT parameter is not valid
314 #endif
315 
316 //PSK key exchange support
317 #ifndef TLS_PSK_KE_SUPPORT
318  #define TLS_PSK_KE_SUPPORT DISABLED
319 #elif (TLS_PSK_KE_SUPPORT != ENABLED && TLS_PSK_KE_SUPPORT != DISABLED)
320  #error TLS_PSK_KE_SUPPORT parameter is not valid
321 #endif
322 
323 //RSA_PSK key exchange support
324 #ifndef TLS_RSA_PSK_KE_SUPPORT
325  #define TLS_RSA_PSK_KE_SUPPORT DISABLED
326 #elif (TLS_RSA_PSK_KE_SUPPORT != ENABLED && TLS_RSA_PSK_KE_SUPPORT != DISABLED)
327  #error TLS_RSA_PSK_KE_SUPPORT parameter is not valid
328 #endif
329 
330 //DHE_PSK key exchange support
331 #ifndef TLS_DHE_PSK_KE_SUPPORT
332  #define TLS_DHE_PSK_KE_SUPPORT DISABLED
333 #elif (TLS_DHE_PSK_KE_SUPPORT != ENABLED && TLS_DHE_PSK_KE_SUPPORT != DISABLED)
334  #error TLS_DHE_PSK_KE_SUPPORT parameter is not valid
335 #endif
336 
337 //ECDHE_PSK key exchange support
338 #ifndef TLS_ECDHE_PSK_KE_SUPPORT
339  #define TLS_ECDHE_PSK_KE_SUPPORT DISABLED
340 #elif (TLS_ECDHE_PSK_KE_SUPPORT != ENABLED && TLS_ECDHE_PSK_KE_SUPPORT != DISABLED)
341  #error TLS_ECDHE_PSK_KE_SUPPORT parameter is not valid
342 #endif
343 
344 //RSA signature capability
345 #ifndef TLS_RSA_SIGN_SUPPORT
346  #define TLS_RSA_SIGN_SUPPORT ENABLED
347 #elif (TLS_RSA_SIGN_SUPPORT != ENABLED && TLS_RSA_SIGN_SUPPORT != DISABLED)
348  #error TLS_RSA_SIGN_SUPPORT parameter is not valid
349 #endif
350 
351 //RSA-PSS signature capability
352 #ifndef TLS_RSA_PSS_SIGN_SUPPORT
353  #define TLS_RSA_PSS_SIGN_SUPPORT ENABLED
354 #elif (TLS_RSA_PSS_SIGN_SUPPORT != ENABLED && TLS_RSA_PSS_SIGN_SUPPORT != DISABLED)
355  #error TLS_RSA_PSS_SIGN_SUPPORT parameter is not valid
356 #endif
357 
358 //DSA signature capability
359 #ifndef TLS_DSA_SIGN_SUPPORT
360  #define TLS_DSA_SIGN_SUPPORT DISABLED
361 #elif (TLS_DSA_SIGN_SUPPORT != ENABLED && TLS_DSA_SIGN_SUPPORT != DISABLED)
362  #error TLS_DSA_SIGN_SUPPORT parameter is not valid
363 #endif
364 
365 //ECDSA signature capability
366 #ifndef TLS_ECDSA_SIGN_SUPPORT
367  #define TLS_ECDSA_SIGN_SUPPORT ENABLED
368 #elif (TLS_ECDSA_SIGN_SUPPORT != ENABLED && TLS_ECDSA_SIGN_SUPPORT != DISABLED)
369  #error TLS_ECDSA_SIGN_SUPPORT parameter is not valid
370 #endif
371 
372 //SM2 signature capability (not recommended by the IETF)
373 #ifndef TLS_SM2_SIGN_SUPPORT
374  #define TLS_SM2_SIGN_SUPPORT DISABLED
375 #elif (TLS_SM2_SIGN_SUPPORT != ENABLED && TLS_SM2_SIGN_SUPPORT != DISABLED)
376  #error TLS_SM2_SIGN_SUPPORT parameter is not valid
377 #endif
378 
379 //Ed25519 signature capability
380 #ifndef TLS_ED25519_SIGN_SUPPORT
381  #define TLS_ED25519_SIGN_SUPPORT DISABLED
382 #elif (TLS_ED25519_SIGN_SUPPORT != ENABLED && TLS_ED25519_SIGN_SUPPORT != DISABLED)
383  #error TLS_ED25519_SIGN_SUPPORT parameter is not valid
384 #endif
385 
386 //Ed448 signature capability
387 #ifndef TLS_ED448_SIGN_SUPPORT
388  #define TLS_ED448_SIGN_SUPPORT DISABLED
389 #elif (TLS_ED448_SIGN_SUPPORT != ENABLED && TLS_ED448_SIGN_SUPPORT != DISABLED)
390  #error TLS_ED448_SIGN_SUPPORT parameter is not valid
391 #endif
392 
393 //NULL cipher support (insecure)
394 #ifndef TLS_NULL_CIPHER_SUPPORT
395  #define TLS_NULL_CIPHER_SUPPORT DISABLED
396 #elif (TLS_NULL_CIPHER_SUPPORT != ENABLED && TLS_NULL_CIPHER_SUPPORT != DISABLED)
397  #error TLS_NULL_CIPHER_SUPPORT parameter is not valid
398 #endif
399 
400 //Stream cipher support
401 #ifndef TLS_STREAM_CIPHER_SUPPORT
402  #define TLS_STREAM_CIPHER_SUPPORT DISABLED
403 #elif (TLS_STREAM_CIPHER_SUPPORT != ENABLED && TLS_STREAM_CIPHER_SUPPORT != DISABLED)
404  #error TLS_STREAM_CIPHER_SUPPORT parameter is not valid
405 #endif
406 
407 //CBC block cipher support
408 #ifndef TLS_CBC_CIPHER_SUPPORT
409  #define TLS_CBC_CIPHER_SUPPORT ENABLED
410 #elif (TLS_CBC_CIPHER_SUPPORT != ENABLED && TLS_CBC_CIPHER_SUPPORT != DISABLED)
411  #error TLS_CBC_CIPHER_SUPPORT parameter is not valid
412 #endif
413 
414 //CCM AEAD support
415 #ifndef TLS_CCM_CIPHER_SUPPORT
416  #define TLS_CCM_CIPHER_SUPPORT DISABLED
417 #elif (TLS_CCM_CIPHER_SUPPORT != ENABLED && TLS_CCM_CIPHER_SUPPORT != DISABLED)
418  #error TLS_CCM_CIPHER_SUPPORT parameter is not valid
419 #endif
420 
421 //CCM_8 AEAD support
422 #ifndef TLS_CCM_8_CIPHER_SUPPORT
423  #define TLS_CCM_8_CIPHER_SUPPORT DISABLED
424 #elif (TLS_CCM_8_CIPHER_SUPPORT != ENABLED && TLS_CCM_8_CIPHER_SUPPORT != DISABLED)
425  #error TLS_CCM_8_CIPHER_SUPPORT parameter is not valid
426 #endif
427 
428 //GCM AEAD support
429 #ifndef TLS_GCM_CIPHER_SUPPORT
430  #define TLS_GCM_CIPHER_SUPPORT ENABLED
431 #elif (TLS_GCM_CIPHER_SUPPORT != ENABLED && TLS_GCM_CIPHER_SUPPORT != DISABLED)
432  #error TLS_GCM_CIPHER_SUPPORT parameter is not valid
433 #endif
434 
435 //ChaCha20Poly1305 AEAD support
436 #ifndef TLS_CHACHA20_POLY1305_SUPPORT
437  #define TLS_CHACHA20_POLY1305_SUPPORT DISABLED
438 #elif (TLS_CHACHA20_POLY1305_SUPPORT != ENABLED && TLS_CHACHA20_POLY1305_SUPPORT != DISABLED)
439  #error TLS_CHACHA20_POLY1305_SUPPORT parameter is not valid
440 #endif
441 
442 //RC4 cipher support (insecure)
443 #ifndef TLS_RC4_SUPPORT
444  #define TLS_RC4_SUPPORT DISABLED
445 #elif (TLS_RC4_SUPPORT != ENABLED && TLS_RC4_SUPPORT != DISABLED)
446  #error TLS_RC4_SUPPORT parameter is not valid
447 #endif
448 
449 //IDEA cipher support (insecure)
450 #ifndef TLS_IDEA_SUPPORT
451  #define TLS_IDEA_SUPPORT DISABLED
452 #elif (TLS_IDEA_SUPPORT != ENABLED && TLS_IDEA_SUPPORT != DISABLED)
453  #error TLS_IDEA_SUPPORT parameter is not valid
454 #endif
455 
456 //DES cipher support (insecure)
457 #ifndef TLS_DES_SUPPORT
458  #define TLS_DES_SUPPORT DISABLED
459 #elif (TLS_DES_SUPPORT != ENABLED && TLS_DES_SUPPORT != DISABLED)
460  #error TLS_DES_SUPPORT parameter is not valid
461 #endif
462 
463 //Triple DES cipher support (weak)
464 #ifndef TLS_3DES_SUPPORT
465  #define TLS_3DES_SUPPORT DISABLED
466 #elif (TLS_3DES_SUPPORT != ENABLED && TLS_3DES_SUPPORT != DISABLED)
467  #error TLS_3DES_SUPPORT parameter is not valid
468 #endif
469 
470 //AES 128-bit cipher support
471 #ifndef TLS_AES_128_SUPPORT
472  #define TLS_AES_128_SUPPORT ENABLED
473 #elif (TLS_AES_128_SUPPORT != ENABLED && TLS_AES_128_SUPPORT != DISABLED)
474  #error TLS_AES_128_SUPPORT parameter is not valid
475 #endif
476 
477 //AES 256-bit cipher support
478 #ifndef TLS_AES_256_SUPPORT
479  #define TLS_AES_256_SUPPORT ENABLED
480 #elif (TLS_AES_256_SUPPORT != ENABLED && TLS_AES_256_SUPPORT != DISABLED)
481  #error TLS_AES_256_SUPPORT parameter is not valid
482 #endif
483 
484 //Camellia 128-bit cipher support
485 #ifndef TLS_CAMELLIA_128_SUPPORT
486  #define TLS_CAMELLIA_128_SUPPORT DISABLED
487 #elif (TLS_CAMELLIA_128_SUPPORT != ENABLED && TLS_CAMELLIA_128_SUPPORT != DISABLED)
488  #error TLS_CAMELLIA_128_SUPPORT parameter is not valid
489 #endif
490 
491 //Camellia 256-bit cipher support
492 #ifndef TLS_CAMELLIA_256_SUPPORT
493  #define TLS_CAMELLIA_256_SUPPORT DISABLED
494 #elif (TLS_CAMELLIA_256_SUPPORT != ENABLED && TLS_CAMELLIA_256_SUPPORT != DISABLED)
495  #error TLS_CAMELLIA_256_SUPPORT parameter is not valid
496 #endif
497 
498 //ARIA 128-bit cipher support
499 #ifndef TLS_ARIA_128_SUPPORT
500  #define TLS_ARIA_128_SUPPORT DISABLED
501 #elif (TLS_ARIA_128_SUPPORT != ENABLED && TLS_ARIA_128_SUPPORT != DISABLED)
502  #error TLS_ARIA_128_SUPPORT parameter is not valid
503 #endif
504 
505 //ARIA 256-bit cipher support
506 #ifndef TLS_ARIA_256_SUPPORT
507  #define TLS_ARIA_256_SUPPORT DISABLED
508 #elif (TLS_ARIA_256_SUPPORT != ENABLED && TLS_ARIA_256_SUPPORT != DISABLED)
509  #error TLS_ARIA_256_SUPPORT parameter is not valid
510 #endif
511 
512 //SEED cipher support
513 #ifndef TLS_SEED_SUPPORT
514  #define TLS_SEED_SUPPORT DISABLED
515 #elif (TLS_SEED_SUPPORT != ENABLED && TLS_SEED_SUPPORT != DISABLED)
516  #error TLS_SEED_SUPPORT parameter is not valid
517 #endif
518 
519 //SM4 cipher support (not recommended by the IETF)
520 #ifndef TLS_SM4_SUPPORT
521  #define TLS_SM4_SUPPORT DISABLED
522 #elif (TLS_SM4_SUPPORT != ENABLED && TLS_SM4_SUPPORT != DISABLED)
523  #error TLS_SM4_SUPPORT parameter is not valid
524 #endif
525 
526 //MD5 hash support (insecure)
527 #ifndef TLS_MD5_SUPPORT
528  #define TLS_MD5_SUPPORT DISABLED
529 #elif (TLS_MD5_SUPPORT != ENABLED && TLS_MD5_SUPPORT != DISABLED)
530  #error TLS_MD5_SUPPORT parameter is not valid
531 #endif
532 
533 //SHA-1 hash support (weak)
534 #ifndef TLS_SHA1_SUPPORT
535  #define TLS_SHA1_SUPPORT ENABLED
536 #elif (TLS_SHA1_SUPPORT != ENABLED && TLS_SHA1_SUPPORT != DISABLED)
537  #error TLS_SHA1_SUPPORT parameter is not valid
538 #endif
539 
540 //SHA-224 hash support (weak)
541 #ifndef TLS_SHA224_SUPPORT
542  #define TLS_SHA224_SUPPORT DISABLED
543 #elif (TLS_SHA224_SUPPORT != ENABLED && TLS_SHA224_SUPPORT != DISABLED)
544  #error TLS_SHA224_SUPPORT parameter is not valid
545 #endif
546 
547 //SHA-256 hash support
548 #ifndef TLS_SHA256_SUPPORT
549  #define TLS_SHA256_SUPPORT ENABLED
550 #elif (TLS_SHA256_SUPPORT != ENABLED && TLS_SHA256_SUPPORT != DISABLED)
551  #error TLS_SHA256_SUPPORT parameter is not valid
552 #endif
553 
554 //SHA-384 hash support
555 #ifndef TLS_SHA384_SUPPORT
556  #define TLS_SHA384_SUPPORT ENABLED
557 #elif (TLS_SHA384_SUPPORT != ENABLED && TLS_SHA384_SUPPORT != DISABLED)
558  #error TLS_SHA384_SUPPORT parameter is not valid
559 #endif
560 
561 //SHA-512 hash support
562 #ifndef TLS_SHA512_SUPPORT
563  #define TLS_SHA512_SUPPORT DISABLED
564 #elif (TLS_SHA512_SUPPORT != ENABLED && TLS_SHA512_SUPPORT != DISABLED)
565  #error TLS_SHA512_SUPPORT parameter is not valid
566 #endif
567 
568 //SM3 hash support (not recommended by the IETF)
569 #ifndef TLS_SM3_SUPPORT
570  #define TLS_SM3_SUPPORT DISABLED
571 #elif (TLS_SM3_SUPPORT != ENABLED && TLS_SM3_SUPPORT != DISABLED)
572  #error TLS_SM3_SUPPORT parameter is not valid
573 #endif
574 
575 //FFDHE key exchange mechanism
576 #ifndef TLS_FFDHE_SUPPORT
577  #define TLS_FFDHE_SUPPORT DISABLED
578 #elif (TLS_FFDHE_SUPPORT != ENABLED && TLS_FFDHE_SUPPORT != DISABLED)
579  #error TLS_FFDHE_SUPPORT parameter is not valid
580 #endif
581 
582 //ffdhe2048 group support
583 #ifndef TLS_FFDHE2048_SUPPORT
584  #define TLS_FFDHE2048_SUPPORT ENABLED
585 #elif (TLS_FFDHE2048_SUPPORT != ENABLED && TLS_FFDHE2048_SUPPORT != DISABLED)
586  #error TLS_FFDHE2048_SUPPORT parameter is not valid
587 #endif
588 
589 //ffdhe3072 group support
590 #ifndef TLS_FFDHE3072_SUPPORT
591  #define TLS_FFDHE3072_SUPPORT DISABLED
592 #elif (TLS_FFDHE3072_SUPPORT != ENABLED && TLS_FFDHE3072_SUPPORT != DISABLED)
593  #error TLS_FFDHE3072_SUPPORT parameter is not valid
594 #endif
595 
596 //ffdhe4096 group support
597 #ifndef TLS_FFDHE4096_SUPPORT
598  #define TLS_FFDHE4096_SUPPORT DISABLED
599 #elif (TLS_FFDHE4096_SUPPORT != ENABLED && TLS_FFDHE4096_SUPPORT != DISABLED)
600  #error TLS_FFDHE4096_SUPPORT parameter is not valid
601 #endif
602 
603 //secp160k1 elliptic curve support (weak)
604 #ifndef TLS_SECP160K1_SUPPORT
605  #define TLS_SECP160K1_SUPPORT DISABLED
606 #elif (TLS_SECP160K1_SUPPORT != ENABLED && TLS_SECP160K1_SUPPORT != DISABLED)
607  #error TLS_SECP160K1_SUPPORT parameter is not valid
608 #endif
609 
610 //secp160r1 elliptic curve support (weak)
611 #ifndef TLS_SECP160R1_SUPPORT
612  #define TLS_SECP160R1_SUPPORT DISABLED
613 #elif (TLS_SECP160R1_SUPPORT != ENABLED && TLS_SECP160R1_SUPPORT != DISABLED)
614  #error TLS_SECP160R1_SUPPORT parameter is not valid
615 #endif
616 
617 //secp160r2 elliptic curve support (weak)
618 #ifndef TLS_SECP160R2_SUPPORT
619  #define TLS_SECP160R2_SUPPORT DISABLED
620 #elif (TLS_SECP160R2_SUPPORT != ENABLED && TLS_SECP160R2_SUPPORT != DISABLED)
621  #error TLS_SECP160R2_SUPPORT parameter is not valid
622 #endif
623 
624 //secp192k1 elliptic curve support
625 #ifndef TLS_SECP192K1_SUPPORT
626  #define TLS_SECP192K1_SUPPORT DISABLED
627 #elif (TLS_SECP192K1_SUPPORT != ENABLED && TLS_SECP192K1_SUPPORT != DISABLED)
628  #error TLS_SECP192K1_SUPPORT parameter is not valid
629 #endif
630 
631 //secp192r1 elliptic curve support (NIST P-192)
632 #ifndef TLS_SECP192R1_SUPPORT
633  #define TLS_SECP192R1_SUPPORT DISABLED
634 #elif (TLS_SECP192R1_SUPPORT != ENABLED && TLS_SECP192R1_SUPPORT != DISABLED)
635  #error TLS_SECP192R1_SUPPORT parameter is not valid
636 #endif
637 
638 //secp224k1 elliptic curve support
639 #ifndef TLS_SECP224K1_SUPPORT
640  #define TLS_SECP224K1_SUPPORT DISABLED
641 #elif (TLS_SECP224K1_SUPPORT != ENABLED && TLS_SECP224K1_SUPPORT != DISABLED)
642  #error TLS_SECP224K1_SUPPORT parameter is not valid
643 #endif
644 
645 //secp224r1 elliptic curve support (NIST P-224)
646 #ifndef TLS_SECP224R1_SUPPORT
647  #define TLS_SECP224R1_SUPPORT DISABLED
648 #elif (TLS_SECP224R1_SUPPORT != ENABLED && TLS_SECP224R1_SUPPORT != DISABLED)
649  #error TLS_SECP224R1_SUPPORT parameter is not valid
650 #endif
651 
652 //secp256k1 elliptic curve support
653 #ifndef TLS_SECP256K1_SUPPORT
654  #define TLS_SECP256K1_SUPPORT DISABLED
655 #elif (TLS_SECP256K1_SUPPORT != ENABLED && TLS_SECP256K1_SUPPORT != DISABLED)
656  #error TLS_SECP256K1_SUPPORT parameter is not valid
657 #endif
658 
659 //secp256r1 elliptic curve support (NIST P-256)
660 #ifndef TLS_SECP256R1_SUPPORT
661  #define TLS_SECP256R1_SUPPORT ENABLED
662 #elif (TLS_SECP256R1_SUPPORT != ENABLED && TLS_SECP256R1_SUPPORT != DISABLED)
663  #error TLS_SECP256R1_SUPPORT parameter is not valid
664 #endif
665 
666 //secp384r1 elliptic curve support (NIST P-384)
667 #ifndef TLS_SECP384R1_SUPPORT
668  #define TLS_SECP384R1_SUPPORT ENABLED
669 #elif (TLS_SECP384R1_SUPPORT != ENABLED && TLS_SECP384R1_SUPPORT != DISABLED)
670  #error TLS_SECP384R1_SUPPORT parameter is not valid
671 #endif
672 
673 //secp521r1 elliptic curve support (NIST P-521)
674 #ifndef TLS_SECP521R1_SUPPORT
675  #define TLS_SECP521R1_SUPPORT DISABLED
676 #elif (TLS_SECP521R1_SUPPORT != ENABLED && TLS_SECP521R1_SUPPORT != DISABLED)
677  #error TLS_SECP521R1_SUPPORT parameter is not valid
678 #endif
679 
680 //brainpoolP256r1 elliptic curve support
681 #ifndef TLS_BRAINPOOLP256R1_SUPPORT
682  #define TLS_BRAINPOOLP256R1_SUPPORT DISABLED
683 #elif (TLS_BRAINPOOLP256R1_SUPPORT != ENABLED && TLS_BRAINPOOLP256R1_SUPPORT != DISABLED)
684  #error TLS_BRAINPOOLP256R1_SUPPORT parameter is not valid
685 #endif
686 
687 //brainpoolP384r1 elliptic curve support
688 #ifndef TLS_BRAINPOOLP384R1_SUPPORT
689  #define TLS_BRAINPOOLP384R1_SUPPORT DISABLED
690 #elif (TLS_BRAINPOOLP384R1_SUPPORT != ENABLED && TLS_BRAINPOOLP384R1_SUPPORT != DISABLED)
691  #error TLS_BRAINPOOLP384R1_SUPPORT parameter is not valid
692 #endif
693 
694 //brainpoolP512r1 elliptic curve support
695 #ifndef TLS_BRAINPOOLP512R1_SUPPORT
696  #define TLS_BRAINPOOLP512R1_SUPPORT DISABLED
697 #elif (TLS_BRAINPOOLP512R1_SUPPORT != ENABLED && TLS_BRAINPOOLP512R1_SUPPORT != DISABLED)
698  #error TLS_BRAINPOOLP512R1_SUPPORT parameter is not valid
699 #endif
700 
701 //SM2 elliptic curve support (not recommended by the IETF)
702 #ifndef TLS_SM2_SUPPORT
703  #define TLS_SM2_SUPPORT DISABLED
704 #elif (TLS_SM2_SUPPORT != ENABLED && TLS_SM2_SUPPORT != DISABLED)
705  #error TLS_SM2_SUPPORT parameter is not valid
706 #endif
707 
708 //Curve25519 elliptic curve support
709 #ifndef TLS_X25519_SUPPORT
710  #define TLS_X25519_SUPPORT DISABLED
711 #elif (TLS_X25519_SUPPORT != ENABLED && TLS_X25519_SUPPORT != DISABLED)
712  #error TLS_X25519_SUPPORT parameter is not valid
713 #endif
714 
715 //Curve448 elliptic curve support
716 #ifndef TLS_X448_SUPPORT
717  #define TLS_X448_SUPPORT DISABLED
718 #elif (TLS_X448_SUPPORT != ENABLED && TLS_X448_SUPPORT != DISABLED)
719  #error TLS_X448_SUPPORT parameter is not valid
720 #endif
721 
722 //ML-KEM-512 key encapsulation mechanism support
723 #ifndef TLS_MLKEM512_SUPPORT
724  #define TLS_MLKEM512_SUPPORT DISABLED
725 #elif (TLS_MLKEM512_SUPPORT != ENABLED && TLS_MLKEM512_SUPPORT != DISABLED)
726  #error TLS_MLKEM512_SUPPORT parameter is not valid
727 #endif
728 
729 //ML-KEM-768 key encapsulation mechanism support
730 #ifndef TLS_MLKEM768_SUPPORT
731  #define TLS_MLKEM768_SUPPORT DISABLED
732 #elif (TLS_MLKEM768_SUPPORT != ENABLED && TLS_MLKEM768_SUPPORT != DISABLED)
733  #error TLS_MLKEM768_SUPPORT parameter is not valid
734 #endif
735 
736 //ML-KEM-1024 key encapsulation mechanism support
737 #ifndef TLS_MLKEM1024_SUPPORT
738  #define TLS_MLKEM1024_SUPPORT DISABLED
739 #elif (TLS_MLKEM1024_SUPPORT != ENABLED && TLS_MLKEM1024_SUPPORT != DISABLED)
740  #error TLS_MLKEM1024_SUPPORT parameter is not valid
741 #endif
742 
743 //Certificate key usage verification
744 #ifndef TLS_CERT_KEY_USAGE_SUPPORT
745  #define TLS_CERT_KEY_USAGE_SUPPORT ENABLED
746 #elif (TLS_CERT_KEY_USAGE_SUPPORT != ENABLED && TLS_CERT_KEY_USAGE_SUPPORT != DISABLED)
747  #error TLS_CERT_KEY_USAGE_SUPPORT parameter is not valid
748 #endif
749 
750 //Key logging (for debugging purpose only)
751 #ifndef TLS_KEY_LOG_SUPPORT
752  #define TLS_KEY_LOG_SUPPORT DISABLED
753 #elif (TLS_KEY_LOG_SUPPORT != ENABLED && TLS_KEY_LOG_SUPPORT != DISABLED)
754  #error TLS_KEY_LOG_SUPPORT parameter is not valid
755 #endif
756 
757 //Maximum length of server name
758 #ifndef TLS_MAX_SERVER_NAME_LEN
759  #define TLS_MAX_SERVER_NAME_LEN 255
760 #elif (TLS_MAX_SERVER_NAME_LEN < 1)
761  #error TLS_MAX_SERVER_NAME_LEN parameter is not valid
762 #endif
763 
764 //Maximum length of password
765 #ifndef TLS_MAX_PASSWORD_LEN
766  #define TLS_MAX_PASSWORD_LEN 32
767 #elif (TLS_MAX_PASSWORD_LEN < 0)
768  #error TLS_MAX_PASSWORD_LEN parameter is not valid
769 #endif
770 
771 //Minimum acceptable size for Diffie-Hellman prime modulus
772 #ifndef TLS_MIN_DH_MODULUS_SIZE
773  #define TLS_MIN_DH_MODULUS_SIZE 1024
774 #elif (TLS_MIN_DH_MODULUS_SIZE < 512)
775  #error TLS_MIN_DH_MODULUS_SIZE parameter is not valid
776 #endif
777 
778 //Maximum acceptable size for Diffie-Hellman prime modulus
779 #ifndef TLS_MAX_DH_MODULUS_SIZE
780  #define TLS_MAX_DH_MODULUS_SIZE 2048
781 #elif (TLS_MAX_DH_MODULUS_SIZE < TLS_MIN_DH_MODULUS_SIZE)
782  #error TLS_MAX_DH_MODULUS_SIZE parameter is not valid
783 #endif
784 
785 //Minimum acceptable size for RSA modulus
786 #ifndef TLS_MIN_RSA_MODULUS_SIZE
787  #define TLS_MIN_RSA_MODULUS_SIZE 1024
788 #elif (TLS_MIN_RSA_MODULUS_SIZE < 512)
789  #error TLS_MIN_RSA_MODULUS_SIZE parameter is not valid
790 #endif
791 
792 //Maximum acceptable size for RSA modulus
793 #ifndef TLS_MAX_RSA_MODULUS_SIZE
794  #define TLS_MAX_RSA_MODULUS_SIZE 4096
795 #elif (TLS_MAX_RSA_MODULUS_SIZE < TLS_MIN_RSA_MODULUS_SIZE)
796  #error TLS_MAX_RSA_MODULUS_SIZE parameter is not valid
797 #endif
798 
799 //Minimum acceptable size for DSA prime modulus
800 #ifndef TLS_MIN_DSA_MODULUS_SIZE
801  #define TLS_MIN_DSA_MODULUS_SIZE 1024
802 #elif (TLS_MIN_DSA_MODULUS_SIZE < 512)
803  #error TLS_MIN_DSA_MODULUS_SIZE parameter is not valid
804 #endif
805 
806 //Maximum acceptable size for DSA prime modulus
807 #ifndef TLS_MAX_DSA_MODULUS_SIZE
808  #define TLS_MAX_DSA_MODULUS_SIZE 4096
809 #elif (TLS_MAX_DSA_MODULUS_SIZE < TLS_MIN_DSA_MODULUS_SIZE)
810  #error TLS_MAX_DSA_MODULUS_SIZE parameter is not valid
811 #endif
812 
813 //Master secret size
814 #ifndef TLS_MASTER_SECRET_SIZE
815  #define TLS_MASTER_SECRET_SIZE 48
816 #elif (TLS_MASTER_SECRET_SIZE < 48)
817  #error TLS_MASTER_SECRET_SIZE parameter is not valid
818 #endif
819 
820 //Maximum size for premaster secret
821 #ifndef TLS_PREMASTER_SECRET_SIZE
822  #define TLS_PREMASTER_SECRET_SIZE (TLS_MAX_DH_MODULUS_SIZE / 8)
823 #elif (TLS_PREMASTER_SECRET_SIZE < 48)
824  #error TLS_PREMASTER_SECRET_SIZE parameter is not valid
825 #endif
826 
827 //Maximum number of consecutive warning alerts
828 #ifndef TLS_MAX_WARNING_ALERTS
829  #define TLS_MAX_WARNING_ALERTS 5
830 #elif (TLS_MAX_WARNING_ALERTS < 0)
831  #error TLS_MAX_WARNING_ALERTS parameter is not valid
832 #endif
833 
834 //Maximum number of consecutive empty records
835 #ifndef TLS_MAX_EMPTY_RECORDS
836  #define TLS_MAX_EMPTY_RECORDS 10
837 #elif (TLS_MAX_EMPTY_RECORDS < 0)
838  #error TLS_MAX_EMPTY_RECORDS parameter is not valid
839 #endif
840 
841 //Maximum number of consecutive ChangeCipherSpec messages
842 #ifndef TLS_MAX_CHANGE_CIPHER_SPEC_MESSAGES
843  #define TLS_MAX_CHANGE_CIPHER_SPEC_MESSAGES 5
844 #elif (TLS_MAX_CHANGE_CIPHER_SPEC_MESSAGES < 0)
845  #error TLS_MAX_CHANGE_CIPHER_SPEC_MESSAGES parameter is not valid
846 #endif
847 
848 //Maximum number of consecutive KeyUpdate messages
849 #ifndef TLS_MAX_KEY_UPDATE_MESSAGES
850  #define TLS_MAX_KEY_UPDATE_MESSAGES 5
851 #elif (TLS_MAX_KEY_UPDATE_MESSAGES < 0)
852  #error TLS_MAX_KEY_UPDATE_MESSAGES parameter is not valid
853 #endif
854 
855 //Application specific context (TLS context)
856 #ifndef TLS_PRIVATE_CONTEXT
857  #define TLS_PRIVATE_CONTEXT
858 #endif
859 
860 //Application specific context (encryption engine)
861 #ifndef TLS_PRIVATE_ENCRYPTION_ENGINE
862  #define TLS_PRIVATE_ENCRYPTION_ENGINE
863 #endif
864 
865 //Allocate memory block
866 #ifndef tlsAllocMem
867  #define tlsAllocMem(size) osAllocMem(size)
868 #endif
869 
870 //Deallocate memory block
871 #ifndef tlsFreeMem
872  #define tlsFreeMem(p) osFreeMem(p)
873 #endif
874 
875 //Support for Diffie-Hellman key exchange?
876 #if ((TLS_MAX_VERSION >= TLS_VERSION_1_0 && TLS_MIN_VERSION <= TLS_VERSION_1_2) && \
877  (TLS_DH_ANON_KE_SUPPORT == ENABLED || TLS_DHE_RSA_KE_SUPPORT == ENABLED || \
878  TLS_DHE_DSS_KE_SUPPORT == ENABLED || TLS_DHE_PSK_KE_SUPPORT == ENABLED))
879  #define TLS_DH_SUPPORT ENABLED
880 #elif ((TLS_MAX_VERSION >= TLS_VERSION_1_3 && TLS_MIN_VERSION <= TLS_VERSION_1_3) && \
881  (TLS13_DHE_KE_SUPPORT == ENABLED || TLS13_PSK_DHE_KE_SUPPORT == ENABLED))
882  #define TLS_DH_SUPPORT ENABLED
883 #else
884  #define TLS_DH_SUPPORT DISABLED
885 #endif
886 
887 //Support for ECDH key exchange?
888 #if ((TLS_MAX_VERSION >= TLS_VERSION_1_0 && TLS_MIN_VERSION <= TLS_VERSION_1_2) && \
889  (TLS_ECDH_ANON_KE_SUPPORT == ENABLED || TLS_ECDHE_RSA_KE_SUPPORT == ENABLED || \
890  TLS_ECDHE_ECDSA_KE_SUPPORT == ENABLED || TLS_ECDHE_PSK_KE_SUPPORT == ENABLED))
891  #define TLS_ECDH_SUPPORT ENABLED
892 #elif ((TLS_MAX_VERSION >= TLS_VERSION_1_3 && TLS_MIN_VERSION <= TLS_VERSION_1_3) && \
893  (TLS13_ECDHE_KE_SUPPORT == ENABLED || TLS13_PSK_ECDHE_KE_SUPPORT == ENABLED))
894  #define TLS_ECDH_SUPPORT ENABLED
895 #else
896  #define TLS_ECDH_SUPPORT DISABLED
897 #endif
898 
899 //Support for ML-KEM key exchange?
900 #if ((TLS_MAX_VERSION >= TLS_VERSION_1_3 && TLS_MIN_VERSION <= TLS_VERSION_1_3) && \
901  (TLS13_MLKEM_KE_SUPPORT == ENABLED || TLS13_PSK_MLKEM_KE_SUPPORT == ENABLED))
902  #define TLS_MLKEM_SUPPORT ENABLED
903 #else
904  #define TLS_MLKEM_SUPPORT DISABLED
905 #endif
906 
907 //Support for hybrid key exchange?
908 #if ((TLS_MAX_VERSION >= TLS_VERSION_1_3 && TLS_MIN_VERSION <= TLS_VERSION_1_3) && \
909  (TLS13_HYBRID_KE_SUPPORT == ENABLED || TLS13_PSK_HYBRID_KE_SUPPORT == ENABLED))
910  #define TLS_HYBRID_SUPPORT ENABLED
911 #else
912  #define TLS_HYBRID_SUPPORT DISABLED
913 #endif
914 
915 //Support for RSA?
916 #if ((TLS_MAX_VERSION >= TLS_VERSION_1_0 && TLS_MIN_VERSION <= TLS_VERSION_1_2) && \
917  (TLS_RSA_SIGN_SUPPORT == ENABLED || TLS_RSA_PSS_SIGN_SUPPORT == ENABLED || \
918  TLS_RSA_KE_SUPPORT == ENABLED || TLS_DHE_RSA_KE_SUPPORT == ENABLED || \
919  TLS_ECDHE_RSA_KE_SUPPORT == ENABLED || TLS_RSA_PSK_KE_SUPPORT == ENABLED))
920  #define TLS_RSA_SUPPORT ENABLED
921 #elif ((TLS_MAX_VERSION >= TLS_VERSION_1_3 && TLS_MIN_VERSION <= TLS_VERSION_1_3) && \
922  (TLS_RSA_SIGN_SUPPORT == ENABLED || TLS_RSA_PSS_SIGN_SUPPORT == ENABLED))
923  #define TLS_RSA_SUPPORT ENABLED
924 #else
925  #define TLS_RSA_SUPPORT DISABLED
926 #endif
927 
928 //Support for PSK?
929 #if ((TLS_MAX_VERSION >= TLS_VERSION_1_0 && TLS_MIN_VERSION <= TLS_VERSION_1_2) && \
930  (TLS_PSK_KE_SUPPORT == ENABLED || TLS_RSA_PSK_KE_SUPPORT == ENABLED || \
931  TLS_DHE_PSK_KE_SUPPORT == ENABLED || TLS_ECDHE_PSK_KE_SUPPORT == ENABLED))
932  #define TLS_PSK_SUPPORT ENABLED
933 #elif ((TLS_MAX_VERSION >= TLS_VERSION_1_3 && TLS_MIN_VERSION <= TLS_VERSION_1_3) && \
934  (TLS13_PSK_KE_SUPPORT == ENABLED || TLS13_PSK_DHE_KE_SUPPORT == ENABLED || \
935  TLS13_PSK_ECDHE_KE_SUPPORT == ENABLED || TLS13_PSK_HYBRID_KE_SUPPORT == ENABLED))
936  #define TLS_PSK_SUPPORT ENABLED
937 #else
938  #define TLS_PSK_SUPPORT DISABLED
939 #endif
940 
941 //Maximum size for HKDF digests
942 #if (TLS_SHA384_SUPPORT == ENABLED)
943  #define TLS_MAX_HKDF_DIGEST_SIZE 48
944 #else
945  #define TLS_MAX_HKDF_DIGEST_SIZE 32
946 #endif
947 
948 //Bind TLS to a particular socket
949 #define tlsSetSocket(context, socket) tlsSetSocketCallbacks(context, \
950  (TlsSocketSendCallback) socketSend, (TlsSocketReceiveCallback) socketReceive, \
951  (TlsSocketHandle) socket)
952 
953 //Minimum plaintext record length
954 #define TLS_MIN_RECORD_LENGTH 512
955 //Maximum plaintext record length
956 #define TLS_MAX_RECORD_LENGTH 16384
957 //Data overhead caused by record encryption
958 #define TLS_MAX_RECORD_OVERHEAD 512
959 //Size of client and server random values
960 #define TLS_RANDOM_SIZE 32
961 
962 //TLS signature scheme definition
963 #define TLS_SIGN_SCHEME(signAlgo, hashAlgo) \
964  ((TlsSignatureScheme) (((hashAlgo) << 8) | (signAlgo)))
965 
966 //C++ guard
967 #ifdef __cplusplus
968 extern "C" {
969 #endif
970 
971 
972 /**
973  * @brief TLS transport protocols
974  **/
975 
976 typedef enum
977 {
982 
983 
984 /**
985  * @brief TLS connection end
986  **/
987 
988 typedef enum
989 {
993 
994 
995 /**
996  * @brief Client authentication mode
997  **/
998 
999 typedef enum
1000 {
1005 
1006 
1007 /**
1008  * @brief Early data status
1009  **/
1010 
1011 typedef enum
1012 {
1016 
1017 
1018 /**
1019  * @brief Flags used by read and write functions
1020  **/
1021 
1022 typedef enum
1023 {
1024  TLS_FLAG_PEEK = 0x0200,
1030  TLS_FLAG_DELAY = 0x8000
1032 
1033 
1034 //The TLS_FLAG_BREAK macro causes the read function to stop reading
1035 //data whenever the specified break character is encountered
1036 #define TLS_FLAG_BREAK(c) (TLS_FLAG_BREAK_CHAR | LSB(c))
1037 
1038 
1039 /**
1040  * @brief Content type
1041  **/
1042 
1043 typedef enum
1044 {
1052  TLS_TYPE_ACK = 26
1054 
1055 
1056 /**
1057  * @brief Handshake message type
1058  **/
1059 
1060 typedef enum
1061 {
1085  TLS_TYPE_MESSAGE_HASH = 254
1087 
1088 
1089 /**
1090  * @brief Alert level
1091  **/
1092 
1093 typedef enum
1094 {
1097 } TlsAlertLevel;
1098 
1099 
1100 /**
1101  * @brief Alert description
1102  **/
1103 
1104 typedef enum
1105 {
1142 
1143 
1144 /**
1145  * @brief Compression methods
1146  **/
1147 
1148 typedef enum
1149 {
1153 
1154 
1155 /**
1156  * @brief Key exchange methods
1157  **/
1158 
1159 typedef enum
1160 {
1190 
1191 
1192 /**
1193  * @brief Certificate formats
1194  **/
1195 
1196 typedef enum
1197 {
1203 
1204 
1205 /**
1206  * @brief Certificate types
1207  **/
1208 
1209 typedef enum
1210 {
1224  TLS_CERT_RSA_PSS_SIGN = 256, //For internal use only
1225  TLS_CERT_SM2_SIGN = 257, //For internal use only
1226  TLS_CERT_ED25519_SIGN = 258, //For internal use only
1227  TLS_CERT_ED448_SIGN = 259 //For internal use only
1229 
1230 
1231 /**
1232  * @brief Hash algorithms
1233  **/
1234 
1235 typedef enum
1236 {
1245  TLS_HASH_ALGO_SM3 = 256 //For internal use only
1247 
1248 
1249 /**
1250  * @brief Signature algorithms
1251  **/
1252 
1253 typedef enum
1254 {
1264 
1265 
1266 /**
1267  * @brief Signature schemes
1268  **/
1269 
1270 typedef enum
1271 {
1311 
1312 
1313 /**
1314  * @brief TLS extension types
1315  **/
1316 
1317 typedef enum
1318 {
1373 
1374 
1375 /**
1376  * @brief Name type
1377  **/
1378 
1379 typedef enum
1380 {
1383 
1384 
1385 /**
1386  * @brief Maximum fragment length
1387  **/
1388 
1389 typedef enum
1390 {
1396 
1397 
1398 /**
1399  * @brief Named groups
1400  **/
1401 
1402 typedef enum
1403 {
1405  TLS_GROUP_SECT163K1 = 1, //RFC 4492
1406  TLS_GROUP_SECT163R1 = 2, //RFC 4492
1407  TLS_GROUP_SECT163R2 = 3, //RFC 4492
1408  TLS_GROUP_SECT193R1 = 4, //RFC 4492
1409  TLS_GROUP_SECT193R2 = 5, //RFC 4492
1410  TLS_GROUP_SECT233K1 = 6, //RFC 4492
1411  TLS_GROUP_SECT233R1 = 7, //RFC 4492
1412  TLS_GROUP_SECT239K1 = 8, //RFC 4492
1413  TLS_GROUP_SECT283K1 = 9, //RFC 4492
1414  TLS_GROUP_SECT283R1 = 10, //RFC 4492
1415  TLS_GROUP_SECT409K1 = 11, //RFC 4492
1416  TLS_GROUP_SECT409R1 = 12, //RFC 4492
1417  TLS_GROUP_SECT571K1 = 13, //RFC 4492
1418  TLS_GROUP_SECT571R1 = 14, //RFC 4492
1419  TLS_GROUP_SECP160K1 = 15, //RFC 4492
1420  TLS_GROUP_SECP160R1 = 16, //RFC 4492
1421  TLS_GROUP_SECP160R2 = 17, //RFC 4492
1422  TLS_GROUP_SECP192K1 = 18, //RFC 4492
1423  TLS_GROUP_SECP192R1 = 19, //RFC 4492
1424  TLS_GROUP_SECP224K1 = 20, //RFC 4492
1425  TLS_GROUP_SECP224R1 = 21, //RFC 4492
1426  TLS_GROUP_SECP256K1 = 22, //RFC 4492
1427  TLS_GROUP_SECP256R1 = 23, //RFC 4492
1428  TLS_GROUP_SECP384R1 = 24, //RFC 4492
1429  TLS_GROUP_SECP521R1 = 25, //RFC 4492
1430  TLS_GROUP_BRAINPOOLP256R1 = 26, //RFC 7027
1431  TLS_GROUP_BRAINPOOLP384R1 = 27, //RFC 7027
1432  TLS_GROUP_BRAINPOOLP512R1 = 28, //RFC 7027
1433  TLS_GROUP_X25519 = 29, //RFC 8422
1434  TLS_GROUP_X448 = 30, //RFC 8422
1438  TLS_GROUP_GC256A = 34, //RFC 9189
1439  TLS_GROUP_GC256B = 35, //RFC 9189
1440  TLS_GROUP_GC256C = 36, //RFC 9189
1441  TLS_GROUP_GC256D = 37, //RFC 9189
1442  TLS_GROUP_GC512A = 38, //RFC 9189
1443  TLS_GROUP_GC512B = 39, //RFC 9189
1444  TLS_GROUP_GC512C = 40, //RFC 9189
1445  TLS_GROUP_CURVE_SM2 = 41, //RFC 8998
1446  TLS_GROUP_FFDHE2048 = 256, //RFC 7919
1447  TLS_GROUP_FFDHE3072 = 257, //RFC 7919
1448  TLS_GROUP_FFDHE4096 = 258, //RFC 7919
1449  TLS_GROUP_FFDHE6144 = 259, //RFC 7919
1450  TLS_GROUP_FFDHE8192 = 260, //RFC 7919
1451  TLS_GROUP_FFDHE_MAX = 511, //RFC 7919
1452  TLS_GROUP_MLKEM512 = 512, //Draft
1453  TLS_GROUP_MLKEM768 = 513, //Draft
1454  TLS_GROUP_MLKEM1024 = 514, //Draft
1459  TLS_GROUP_EXPLICIT_CHAR2_CURVE = 65282 //RFC 4492
1461 
1462 
1463 /**
1464  * @brief EC point formats
1465  **/
1466 
1467 typedef enum
1468 {
1473 
1474 
1475 /**
1476  * @brief EC curve types
1477  **/
1478 
1479 typedef enum
1480 {
1485 
1486 
1487 /**
1488  * @brief TLS FSM states
1489  **/
1490 
1491 typedef enum
1492 {
1525  TLS_STATE_CLOSED = 32
1527 
1528 
1529 //CC-RX, CodeWarrior or Win32 compiler?
1530 #if defined(__CCRX__)
1531  #pragma pack
1532 #elif defined(__CWCC__) || defined(_WIN32)
1533  #pragma pack(push, 1)
1534 #endif
1535 
1536 
1537 /**
1538  * @brief Sequence number
1539  **/
1540 
1542 {
1543  uint8_t b[8];
1545 
1546 
1547 /**
1548  * @brief Cipher suites
1549  **/
1550 
1551 typedef __packed_struct
1552 {
1553  uint16_t length; //0-1
1554  uint16_t value[]; //2
1556 
1557 
1558 /**
1559  * @brief Compression methods
1560  **/
1561 
1562 typedef __packed_struct
1563 {
1564  uint8_t length; //0
1565  uint8_t value[]; //1
1567 
1568 
1569 /**
1570  * @brief List of signature schemes
1571  **/
1572 
1573 typedef __packed_struct
1574 {
1575  uint16_t length; //0-1
1576  uint16_t value[]; //2
1578 
1579 
1580 /**
1581  * @brief List of certificates
1582  **/
1583 
1584 typedef __packed_struct
1585 {
1586  uint8_t length[3]; //0-2
1587  uint8_t value[]; //3
1589 
1590 
1591 /**
1592  * @brief List of certificate authorities
1593  **/
1594 
1595 typedef __packed_struct
1596 {
1597  uint16_t length; //0-1
1598  uint8_t value[]; //2
1600 
1601 
1602 /**
1603  * @brief TLS extension
1604  **/
1605 
1606 typedef __packed_struct
1607 {
1608  uint16_t type; //0-1
1609  uint16_t length; //2-3
1610  uint8_t value[]; //4
1612 
1613 
1614 /**
1615  * @brief List of TLS extensions
1616  **/
1617 
1618 typedef __packed_struct
1619 {
1620  uint16_t length; //0-1
1621  uint8_t value[]; //2
1623 
1624 
1625 /**
1626  * @brief List of supported versions
1627  **/
1628 
1629 typedef __packed_struct
1630 {
1631  uint8_t length; //0
1632  uint16_t value[]; //1
1634 
1635 
1636 /**
1637  * @brief Server name
1638  **/
1639 
1640 typedef __packed_struct
1641 {
1642  uint8_t type; //0
1643  uint16_t length; //1-2
1646 
1647 
1648 /**
1649  * @brief List of server names
1650  **/
1651 
1652 typedef __packed_struct
1653 {
1654  uint16_t length; //0-1
1655  uint8_t value[]; //2
1657 
1658 
1659 /**
1660  * @brief Protocol name
1661  **/
1662 
1663 typedef __packed_struct
1664 {
1665  uint8_t length; //0
1666  char_t value[]; //1
1668 
1669 
1670 /**
1671  * @brief List of protocol names
1672  **/
1673 
1674 typedef __packed_struct
1675 {
1676  uint16_t length; //0-1
1677  uint8_t value[]; //2
1679 
1680 
1681 /**
1682  * @brief List of supported groups
1683  **/
1684 
1685 typedef __packed_struct
1686 {
1687  uint16_t length; //0-1
1688  uint16_t value[]; //2
1690 
1691 
1692 /**
1693  * @brief List of supported EC point formats
1694  **/
1695 
1696 typedef __packed_struct
1697 {
1698  uint8_t length; //0
1699  uint8_t value[]; //1
1701 
1702 
1703 /**
1704  * @brief List of supported certificate types
1705  **/
1706 
1707 typedef __packed_struct
1708 {
1709  uint8_t length; //0
1710  uint8_t value[]; //1
1712 
1713 
1714 /**
1715  * @brief Renegotiated connection
1716  **/
1717 
1718 typedef __packed_struct
1719 {
1720  uint8_t length; //0
1721  uint8_t value[]; //1
1723 
1724 
1725 /**
1726  * @brief PSK identity
1727  **/
1728 
1729 typedef __packed_struct
1730 {
1731  uint16_t length; //0-1
1732  uint8_t value[]; //2
1734 
1735 
1736 /**
1737  * @brief PSK identity hint
1738  **/
1739 
1740 typedef __packed_struct
1741 {
1742  uint16_t length; //0-1
1743  uint8_t value[]; //2
1745 
1746 
1747 /**
1748  * @brief Digitally-signed element (TLS 1.0 and TLS 1.1)
1749  **/
1750 
1751 typedef __packed_struct
1752 {
1753  uint16_t length; //0-1
1754  uint8_t value[]; //2
1756 
1757 
1758 /**
1759  * @brief Digitally-signed element (TLS 1.2)
1760  **/
1761 
1762 typedef __packed_struct
1763 {
1764  uint16_t algorithm; //0-1
1765  uint16_t length; //2-3
1766  uint8_t value[]; //4
1768 
1769 
1770 /**
1771  * @brief TLS record
1772  **/
1773 
1774 typedef __packed_struct
1775 {
1776  uint8_t type; //0
1777  uint16_t version; //1-2
1778  uint16_t length; //3-4
1779  uint8_t data[]; //5
1781 
1782 
1783 /**
1784  * @brief TLS handshake message
1785  **/
1786 
1787 typedef __packed_struct
1788 {
1789  uint8_t msgType; //0
1790  uint8_t length[3]; //1-3
1791  uint8_t data[]; //4
1793 
1794 
1795 /**
1796  * @brief HelloRequest message
1797  **/
1798 
1799 typedef void TlsHelloRequest;
1800 
1801 
1802 /**
1803  * @brief ClientHello message
1804  **/
1805 
1806 typedef __packed_struct
1807 {
1808  uint16_t clientVersion; //0-1
1809  uint8_t random[32]; //2-33
1810  uint8_t sessionIdLen; //34
1811  uint8_t sessionId[]; //35
1813 
1814 
1815 /**
1816  * @brief ServerHello message
1817  **/
1818 
1819 typedef __packed_struct
1820 {
1821  uint16_t serverVersion; //0-1
1822  uint8_t random[32]; //2-33
1823  uint8_t sessionIdLen; //34
1824  uint8_t sessionId[]; //35
1826 
1827 
1828 /**
1829  * @brief Certificate message
1830  **/
1831 
1832 typedef void TlsCertificate;
1833 
1834 
1835 /**
1836  * @brief ServerKeyExchange message
1837  **/
1838 
1840 
1841 
1842 /**
1843  * @brief CertificateRequest message
1844  **/
1845 
1846 typedef __packed_struct
1847 {
1848  uint8_t certificateTypesLen; //0
1849  uint8_t certificateTypes[]; //1
1851 
1852 
1853 /**
1854  * @brief ServerHelloDone message
1855  **/
1856 
1857 typedef void TlsServerHelloDone;
1858 
1859 
1860 /**
1861  * @brief ClientKeyExchange message
1862  **/
1863 
1865 
1866 
1867 /**
1868  * @brief CertificateVerify message
1869  **/
1870 
1872 
1873 
1874 /**
1875  * @brief NewSessionTicket message
1876  **/
1877 
1878 typedef __packed_struct
1879 {
1880  uint32_t ticketLifetimeHint; //0-3
1881  uint16_t ticketLen; //4-5
1882  uint8_t ticket[]; //6
1884 
1885 
1886 /**
1887  * @brief Finished message
1888  **/
1889 
1890 typedef void TlsFinished;
1891 
1892 
1893 /**
1894  * @brief ChangeCipherSpec message
1895  **/
1896 
1897 typedef __packed_struct
1898 {
1899  uint8_t type; //0
1901 
1902 
1903 /**
1904  * @brief Alert message
1905  **/
1906 
1907 typedef __packed_struct
1908 {
1909  uint8_t level; //0
1910  uint8_t description; //1
1912 
1913 
1914 /**
1915  * @brief Session state information
1916  **/
1917 
1918 typedef __packed_struct
1919 {
1920  uint16_t version; ///<Protocol version
1921  uint16_t cipherSuite; ///<Cipher suite identifier
1922  uint8_t secret[TLS_MASTER_SECRET_SIZE]; ///<Master secret
1923  systime_t ticketTimestamp; ///<Timestamp to manage ticket lifetime
1924  uint32_t ticketLifetime; ///<Lifetime of the ticket
1925 #if (TLS_EXT_MASTER_SECRET_SUPPORT == ENABLED)
1926  bool_t extendedMasterSecret; ///<Extended master secret computation
1927 #endif
1929 
1930 
1931 //CC-RX, CodeWarrior or Win32 compiler?
1932 #if defined(__CCRX__)
1933  #pragma unpack
1934 #elif defined(__CWCC__) || defined(_WIN32)
1935  #pragma pack(pop)
1936 #endif
1937 
1938 
1939 /**
1940  * @brief Socket handle
1941  **/
1942 
1943 typedef void *TlsSocketHandle;
1944 
1945 
1946 /**
1947  * @brief TLS state change callback
1948  **/
1949 
1950 typedef void (*TlsStateChangeCallback)(TlsContext *context, TlsState state);
1951 
1952 
1953 /**
1954  * @brief Socket send callback function
1955  **/
1956 
1958  const void *data, size_t length, size_t *written, uint_t flags);
1959 
1960 
1961 /**
1962  * @brief Socket receive callback function
1963  **/
1964 
1966  void *data, size_t size, size_t *received, uint_t flags);
1967 
1968 
1969 /**
1970  * @brief ALPN callback function
1971  **/
1972 
1973 typedef error_t (*TlsAlpnCallback)(TlsContext *context,
1974  const char_t *selectedProtocol);
1975 
1976 
1977 /**
1978  * @brief Pre-shared key callback function
1979  **/
1980 
1981 typedef error_t (*TlsPskCallback)(TlsContext *context,
1982  const uint8_t *pskIdentity, size_t pskIdentityLen);
1983 
1984 
1985 /**
1986  * @brief Certificate verification callback function
1987  **/
1988 
1990  const X509CertInfo *certInfo, uint_t pathLen, void *param);
1991 
1992 
1993 /**
1994  * @brief Raw public key verification callback function
1995  **/
1996 
1998  const uint8_t *rawPublicKey, size_t rawPublicKeyLen);
1999 
2000 
2001 /**
2002  * @brief Ticket encryption callback function
2003  **/
2004 
2006  const uint8_t *plaintext, size_t plaintextLen, uint8_t *ciphertext,
2007  size_t *ciphertextLen, void *param);
2008 
2009 
2010 /**
2011  * @brief Ticket decryption callback function
2012  **/
2013 
2015  const uint8_t *ciphertext, size_t ciphertextLen, uint8_t *plaintext,
2016  size_t *plaintextLen, void *param);
2017 
2018 
2019 /**
2020  * @brief ECDH key agreement callback function
2021  **/
2022 
2023 typedef error_t (*TlsEcdhCallback)(TlsContext *context);
2024 
2025 
2026 /**
2027  * @brief ECDSA signature generation callback function
2028  **/
2029 
2031  const uint8_t *digest, size_t digestLen, EcdsaSignature *signature);
2032 
2033 
2034 /**
2035  * @brief ECDSA signature verification callback function
2036  **/
2037 
2039  const uint8_t *digest, size_t digestLen, EcdsaSignature *signature);
2040 
2041 
2042 /**
2043  * @brief Key logging callback function (for debugging purpose only)
2044  **/
2045 
2046 typedef void (*TlsKeyLogCallback)(TlsContext *context, const char_t *key);
2047 
2048 
2049 /**
2050  * @brief Structure describing a cipher suite
2051  **/
2052 
2053 typedef struct
2054 {
2055  uint16_t identifier;
2056  const char_t *name;
2062  uint8_t macKeyLen;
2063  uint8_t encKeyLen;
2064  uint8_t fixedIvLen;
2065  uint8_t recordIvLen;
2066  uint8_t authTagLen;
2067  uint8_t verifyDataLen;
2069 
2070 
2071 /**
2072  * @brief TLS session state
2073  **/
2074 
2075 typedef struct
2076 {
2077  uint16_t version; ///<TLS protocol version
2078  uint16_t cipherSuite; ///<Cipher suite identifier
2079  systime_t timestamp; ///<Time stamp to manage entry lifetime
2080  uint8_t secret[TLS_MASTER_SECRET_SIZE]; ///<Master secret (TLS 1.2) or ticket PSK (TLS 1.3)
2081 #if (TLS_MAX_VERSION >= TLS_VERSION_1_0 && TLS_MIN_VERSION <= TLS_VERSION_1_2)
2082  uint8_t sessionId[32]; ///<Session identifier
2083  size_t sessionIdLen; ///<Length of the session identifier
2084  bool_t extendedMasterSecret; ///<Extended master secret computation
2085 #endif
2086  uint8_t *ticket; ///<Session ticket
2087  size_t ticketLen; ///<Length of the session ticket
2088 #if (TLS_MAX_VERSION >= TLS_VERSION_1_3 && TLS_MIN_VERSION <= TLS_VERSION_1_3)
2089  systime_t ticketTimestamp; ///<Timestamp to manage ticket lifetime
2090  uint32_t ticketLifetime; ///<Lifetime of the ticket
2091  uint32_t ticketAgeAdd; ///<Random value used to obscure the age of the ticket
2092  TlsHashAlgo ticketHashAlgo; ///<Hash algorithm associated with the ticket
2093  char_t *ticketAlpn; ///<ALPN protocol associated with the ticket
2094  uint32_t maxEarlyDataSize; ///<Maximum amount of 0-RTT data that the client is allowed to send
2095 #endif
2096 #if (TLS_SNI_SUPPORT == ENABLED)
2097  char_t *serverName; ///<ServerName extension
2098 #endif
2099 } TlsSessionState;
2100 
2101 
2102 /**
2103  * @brief Session cache
2104  **/
2105 
2106 typedef struct
2107 {
2108  OsMutex mutex; ///<Mutex preventing simultaneous access to the cache
2109  uint_t size; ///<Maximum number of entries
2110  TlsSessionState sessions[]; ///<Cache entries
2111 } TlsCache;
2112 
2113 
2114 /**
2115  * @brief Certificate descriptor
2116  **/
2117 
2118 typedef struct
2119 {
2120  const char_t *certChain; ///<End entity certificate chain (PEM format)
2121  size_t certChainLen; ///<Length of the certificate chain
2122  const char_t *privateKey; ///<Private key (PEM format)
2123  size_t privateKeyLen; ///<Length of the private key
2124  char_t password[TLS_MAX_PASSWORD_LEN + 1]; ///<Password used to decrypt the private key
2125  TlsCertificateType type; ///<End entity certificate type
2126  TlsSignatureScheme signScheme; ///<Signature scheme used to sign the end entity certificate
2127  TlsNamedGroup namedCurve; ///<Named curve used to generate the EC public key
2128 } TlsCertDesc;
2129 
2130 
2131 /**
2132  * @brief Hello extensions
2133  **/
2134 
2135 typedef struct
2136 {
2137  const TlsSupportedVersionList *supportedVersionList; ///<SupportedVersions extension (ClientHello)
2138  const TlsExtension *selectedVersion; ///<SupportedVersions extension (ServerHello)
2139  const TlsServerNameList *serverNameList; ///<ServerName extension
2140  const TlsSupportedGroupList *supportedGroupList; ///<SupportedGroups extension
2141  const TlsEcPointFormatList *ecPointFormatList; ///<EcPointFormats extension
2142  const TlsSignSchemeList *signAlgoList; ///<SignatureAlgorithms extension
2143  const TlsSignSchemeList *certSignAlgoList; ///<SignatureAlgorithmsCert extension
2144 #if (TLS_MAX_FRAG_LEN_SUPPORT == ENABLED)
2145  const TlsExtension *maxFragLen; ///<MaxFragmentLength extension
2146 #endif
2147 #if (TLS_RECORD_SIZE_LIMIT_SUPPORT == ENABLED)
2148  const TlsExtension *recordSizeLimit; ///<RecordSizeLimit extension
2149 #endif
2150 #if (TLS_ALPN_SUPPORT == ENABLED)
2151  const TlsProtocolNameList *protocolNameList; ///<ALPN extension
2152 #endif
2153 #if (TLS_RAW_PUBLIC_KEY_SUPPORT == ENABLED)
2154  const TlsCertTypeList *clientCertTypeList; ///<ClientCertType extension
2156  const TlsCertTypeList *serverCertTypeList; ///<ServerCertType extension
2158 #endif
2159 #if (TLS_ENCRYPT_THEN_MAC_SUPPORT == ENABLED)
2160  const TlsExtension *encryptThenMac; ///<EncryptThenMac extension
2161 #endif
2162 #if (TLS_EXT_MASTER_SECRET_SUPPORT == ENABLED)
2163  const TlsExtension *extendedMasterSecret; ///<ExtendedMasterSecret extension
2164 #endif
2165 #if (TLS_TICKET_SUPPORT == ENABLED)
2166  const TlsExtension *sessionTicket; ///<SessionTicket extension
2167 #endif
2168 #if (TLS_SECURE_RENEGOTIATION_SUPPORT == ENABLED)
2169  const TlsRenegoInfo *renegoInfo; ///<RenegotiationInfo extension
2170 #endif
2171 #if (TLS_MAX_VERSION >= TLS_VERSION_1_3 && TLS_MIN_VERSION <= TLS_VERSION_1_3)
2172  const Tls13Cookie *cookie; ///<Cookie extension
2173  const TlsCertAuthorities *certAuthorities; ///<CertificateAuthorities extension
2174  const Tls13KeyShareList *keyShareList; ///<KeyShare extension (ClientHello)
2175  const TlsExtension *selectedGroup; ///<KeyShare extension (HelloRetryRequest)
2176  const Tls13KeyShareEntry *serverShare; ///<KeyShare extension (ServerHello)
2177  const Tls13PskKeModeList *pskKeModeList; ///<PskKeyExchangeModes extension
2178  const Tls13PskIdentityList *identityList; ///<PreSharedKey extension (ClientHello)
2180  const TlsExtension *selectedIdentity; ///<PreSharedKey extension (ServerHello)
2181  const TlsExtension *earlyDataIndication; ///<EarlyData extension
2182 #endif
2184 
2185 
2186 /**
2187  * @brief Encryption engine
2188  **/
2189 
2191 {
2192  uint16_t version; ///<Negotiated TLS version
2193  uint8_t macKey[48]; ///<MAC key
2194  size_t macKeyLen; ///<Length of the MAC key
2195  uint8_t encKey[48]; ///<Encryption key
2196  size_t encKeyLen; ///<Length of the encryption key
2197  uint8_t iv[16]; ///<Initialization vector
2198  size_t fixedIvLen; ///<Length of the fixed part of the IV
2199  size_t recordIvLen; ///<Length of the IV
2200  size_t authTagLen; ///<Length of the authentication tag
2201  const CipherAlgo *cipherAlgo; ///<Cipher algorithm
2202  void *cipherContext; ///<Cipher context
2203  CipherMode cipherMode; ///<Cipher mode of operation
2204  const HashAlgo *hashAlgo; ///<Hash algorithm for MAC operations
2205  HmacContext *hmacContext; ///<HMAC context
2206 #if (TLS_GCM_CIPHER_SUPPORT == ENABLED)
2207  GcmContext *gcmContext; ///<GCM context
2208 #endif
2209  TlsSequenceNumber seqNum; ///<TLS sequence number
2210 #if (DTLS_SUPPORT == ENABLED)
2211  uint16_t epoch; ///<Counter value incremented on every cipher state change
2212  DtlsSequenceNumber dtlsSeqNum; ///<Record sequence number
2213 #endif
2214 #if (TLS_RECORD_SIZE_LIMIT_SUPPORT == ENABLED)
2215  size_t recordSizeLimit; ///<Maximum size of record in octets
2216 #endif
2217 #if (TLS_ENCRYPT_THEN_MAC_SUPPORT == ENABLED)
2218  bool_t encryptThenMac; ///<Encrypt-then-MAC construction
2219 #endif
2220  TLS_PRIVATE_ENCRYPTION_ENGINE ///<Application specific context
2221 };
2222 
2223 
2224 /**
2225  * @brief TLS context
2226  *
2227  * An opaque data structure that represents a TLS connection
2228  *
2229  **/
2230 
2232 {
2233  TlsState state; ///<TLS handshake finite state machine
2234  TlsTransportProtocol transportProtocol; ///<Transport protocol (stream or datagram)
2235  TlsConnectionEnd entity; ///<Client or server operation
2236 
2237  TlsStateChangeCallback stateChangeCallback; ///<TLS state change callback function
2238 
2239  TlsSocketHandle socketHandle; ///<Socket handle
2240  TlsSocketSendCallback socketSendCallback; ///<Socket send callback function
2241  TlsSocketReceiveCallback socketReceiveCallback; ///<Socket receive callback function
2242 
2243  const PrngAlgo *prngAlgo; ///<Pseudo-random number generator to be used
2244  void *prngContext; ///<Pseudo-random number generator context
2245 
2246  const uint16_t *cipherSuites; ///<List of supported cipher suites
2247  uint_t numCipherSuites; ///<Number of cipher suites in the list
2248 
2249  const uint16_t *supportedGroups; ///<List of supported named groups
2250  uint_t numSupportedGroups; ///<Number of named groups in the list
2251 
2252  char_t *serverName; ///<Fully qualified DNS hostname of the server
2253 
2254 #if (TLS_ECC_CALLBACK_SUPPORT == ENABLED)
2258 #endif
2259 
2260  TlsCertDesc certs[TLS_MAX_CERTIFICATES]; ///<End entity certificates (PEM format)
2261  const char_t *trustedCaList; ///<Trusted CA list (PEM format)
2262  size_t trustedCaListLen; ///<Total length of the trusted CA list
2263  TlsCertVerifyCallback certVerifyCallback; ///<Certificate verification callback function
2264  void *certVerifyParam; ///<Opaque pointer passed to the certificate verification callback
2265  TlsCertDesc *cert; ///<Pointer to the currently selected certificate
2266 
2267  TlsCache *cache; ///<TLS session cache
2268  uint8_t sessionId[32]; ///<Session identifier
2269  size_t sessionIdLen; ///<Length of the session identifier
2270 
2271  uint16_t clientVersion; ///<Latest version supported by the client
2272  uint16_t version; ///<Negotiated TLS version
2273  uint16_t versionMin; ///<Minimum version accepted by the implementation
2274  uint16_t versionMax; ///<Maximum version accepted by the implementation
2275 
2276  uint8_t *cookie; ///<Cookie
2277  size_t cookieLen; ///<Length of the cookie
2278 
2279  uint8_t *ticket; ///<Session ticket
2280  size_t ticketLen; ///<Length of the session ticket
2281  systime_t ticketTimestamp; ///<Timestamp to manage ticket lifetime
2282  uint32_t ticketLifetime; ///<Lifetime of the ticket
2283 
2284  uint_t cipherSuiteTypes; ///<Types of cipher suites proposed by the client
2285  TlsCipherSuiteInfo cipherSuite; ///<Negotiated cipher suite
2286  TlsKeyExchMethod keyExchMethod; ///<Key exchange method
2287  TlsSignatureScheme signScheme; ///<Signature scheme to be used
2288  uint16_t namedGroup; ///<ECDHE or FFDHE named group
2289 
2290  TlsCertificateType peerCertType; ///<Peer's certificate type
2291  TlsClientAuthMode clientAuthMode; ///<Client authentication mode
2292  bool_t clientCertRequested; ///<This flag tells whether the client certificate is requested
2293 
2294  bool_t resume; ///<The connection is established by resuming a session
2295  bool_t fatalAlertSent; ///<A fatal alert message has been sent
2296  bool_t fatalAlertReceived; ///<A fatal alert message has been received from the peer
2297  bool_t closeNotifySent; ///<A closure alert has been sent
2298  bool_t closeNotifyReceived; ///<A closure alert has been received from the peer
2299 
2300  uint8_t *txBuffer; ///<TX buffer
2301  size_t txBufferSize; ///<TX buffer size
2302  size_t txBufferMaxLen; ///<Maximum number of plaintext data the TX buffer can hold
2303  TlsContentType txBufferType; ///<Type of data that resides in the TX buffer
2304  size_t txBufferLen; ///<Number of bytes that are pending to be sent
2305  size_t txBufferPos; ///<Current position in TX buffer
2306  size_t txRecordLen; ///<Length of the TLS record
2307  size_t txRecordPos; ///<Current position in the TLS record
2308 
2309  uint8_t *rxBuffer; ///<RX buffer
2310  size_t rxBufferSize; ///<RX buffer size
2311  size_t rxBufferMaxLen; ///<Maximum number of plaintext data the RX buffer can hold
2312  TlsContentType rxBufferType; ///<Type of data that resides in the RX buffer
2313  size_t rxBufferLen; ///<Number of bytes available for reading
2314  size_t rxBufferPos; ///<Current position in RX buffer
2315  size_t rxRecordLen; ///<Length of the TLS record
2316  size_t rxRecordPos; ///<Current position in the TLS record
2317 
2318  uint8_t clientRandom[TLS_RANDOM_SIZE]; ///<Client random value
2319  uint8_t serverRandom[TLS_RANDOM_SIZE]; ///<Server random value
2320  uint8_t premasterSecret[TLS_PREMASTER_SECRET_SIZE]; ///<Premaster secret
2321  size_t premasterSecretLen; ///<Length of the premaster secret
2322  uint8_t clientVerifyData[64]; ///<Client verify data
2323  size_t clientVerifyDataLen; ///<Length of the client verify data
2324  uint8_t serverVerifyData[64]; ///<Server verify data
2325  size_t serverVerifyDataLen; ///<Length of the server verify data
2326 
2327  TlsEncryptionEngine encryptionEngine; ///<Encryption engine
2328  TlsEncryptionEngine decryptionEngine; ///<Decryption engine
2329 
2330 #if (TLS_MAX_VERSION >= TLS_VERSION_1_0 && TLS_MIN_VERSION <= TLS_VERSION_1_0)
2331  size_t txLastRecordLen; ///<Length of the previous TLS record
2332 #endif
2333 
2334 #if (TLS_MAX_VERSION >= TLS_VERSION_1_0 && TLS_MIN_VERSION <= TLS_VERSION_1_1)
2335  Md5Context *transcriptMd5Context; ///<MD5 context used to compute verify data
2336 #endif
2337 
2338 #if (TLS_MAX_VERSION >= TLS_VERSION_1_0 && TLS_MIN_VERSION <= TLS_VERSION_1_2)
2339  uint8_t masterSecret[TLS_MASTER_SECRET_SIZE]; ///<Master secret
2340  uint8_t keyBlock[192]; ///<Key material
2341  HmacContext hmacContext; ///<HMAC context
2342  Sha1Context *transcriptSha1Context; ///<SHA-1 context used to compute verify data
2343 #endif
2344 
2345 #if (TLS_MAX_VERSION >= TLS_VERSION_1_2 && TLS_MIN_VERSION <= TLS_VERSION_1_3)
2346  const uint16_t *supportedSignAlgos; ///<List of supported signature algorithms
2347  uint_t numSupportedSignAlgos; ///<Number of signature algorithms in the list
2348 
2349  HashContext *transcriptHashContext; ///<Hash context used to compute verify data
2350 #endif
2351 
2352 #if (TLS_MAX_VERSION >= TLS_VERSION_1_3 && TLS_MIN_VERSION <= TLS_VERSION_1_3)
2353  uint16_t preferredGroup; ///<Preferred ECDHE or FFDHE named group
2354  systime_t clientHelloTimestamp; ///<Time at which the ClientHello message was sent
2355  bool_t updatedClientHelloReceived; ///<An updated ClientHello message has been received
2356  uint8_t *certRequestContext; ///<Certificate request context
2357  size_t certRequestContextLen; ///<Length of the certificate request context
2358  int_t selectedIdentity; ///<Selected PSK identity
2359  bool_t pskKeModeSupported; ///<PSK key establishment supported by the client
2360 
2369 
2370  uint_t newSessionTicketCount; ///<Number of NewSessionTicket messages that have been sent
2371 
2372  uint8_t ticketPsk[TLS_MAX_HKDF_DIGEST_SIZE]; ///<PSK associated with the ticket
2373  size_t ticketPskLen; ///<Length of the PSK associated with the ticket
2374  uint32_t ticketAgeAdd; ///<Random value used to obscure the age of the ticket
2375  uint32_t ticketNonce; ///<A per-ticket value that is unique across all tickets issued
2376  uint16_t ticketCipherSuite; ///<Cipher suite associated with the ticket
2377  TlsHashAlgo ticketHashAlgo; ///<Hash algorithm associated with the ticket
2378  char_t *ticketAlpn; ///<ALPN protocol associated with the ticket
2379 
2380  size_t maxEarlyDataSize; ///<Maximum amount of 0-RTT data that the client is allowed to send
2381  size_t earlyDataLen; ///<Total amount of 0-RTT data that have been sent by the client
2382  bool_t earlyDataEnabled; ///<EarlyData is enabled
2383  bool_t earlyDataRejected; ///<The 0-RTT data have been rejected by the server
2384  bool_t earlyDataExtReceived; ///<The EarlyData extension has been received
2385  TlsSequenceNumber earlyDataSeqNum; ///<Early data sequence number
2386 #endif
2387 
2388 #if (TLS_DH_SUPPORT == ENABLED)
2389  DhContext dhContext; ///<Diffie-Hellman context
2390 #endif
2391 
2392 #if (TLS_ECDH_SUPPORT == ENABLED || TLS_HYBRID_SUPPORT == ENABLED)
2393  EcdhContext ecdhContext; ///<ECDH context
2394  bool_t ecPointFormatsExtReceived; ///<The EcPointFormats extension has been received
2395 #endif
2396 
2397 #if (TLS_MLKEM_SUPPORT == ENABLED || TLS_HYBRID_SUPPORT == ENABLED)
2398  KemContext kemContext; ///<KEM context
2399 #endif
2400 
2401 #if (TLS_RSA_SUPPORT == ENABLED)
2402  RsaPublicKey peerRsaPublicKey; ///<Peer's RSA public key
2403 #endif
2404 
2405 #if (TLS_DSA_SIGN_SUPPORT == ENABLED)
2406  DsaPublicKey peerDsaPublicKey; ///<Peer's DSA public key
2407 #endif
2408 
2409 #if (TLS_ECDSA_SIGN_SUPPORT == ENABLED || TLS_SM2_SIGN_SUPPORT == ENABLED)
2410  EcPublicKey peerEcPublicKey; ///<Peer's EC public key
2411 #endif
2412 
2413 #if (TLS_ED25519_SIGN_SUPPORT == ENABLED || TLS_ED448_SIGN_SUPPORT == ENABLED)
2414  EddsaPublicKey peerEddsaPublicKey; ///<Peer's EdDSA public key
2415 #endif
2416 
2417 #if (TLS_PSK_SUPPORT == ENABLED)
2418  uint8_t *psk; ///<Pre-shared key
2419  size_t pskLen; ///<Length of the pre-shared key, in bytes
2420  char_t *pskIdentity; ///<PSK identity
2421  char_t *pskIdentityHint; ///<PSK identity hint
2422  TlsPskCallback pskCallback; ///<PSK callback function
2423  uint16_t pskCipherSuite; ///<Cipher suite associated with the PSK
2424  TlsHashAlgo pskHashAlgo; ///<Hash algorithm associated with the PSK
2425 #endif
2426 
2427 #if (TLS_MAX_FRAG_LEN_SUPPORT == ENABLED)
2428  size_t maxFragLen; ///<Maximum plaintext fragment length
2429  bool_t maxFragLenExtReceived; ///<The MaxFragmentLength extension has been received
2430 #endif
2431 
2432 #if (TLS_RECORD_SIZE_LIMIT_SUPPORT == ENABLED)
2433  size_t recordSizeLimit; ///<Maximum record size the peer is willing to receive
2434  bool_t recordSizeLimitExtReceived; ///<The RecordSizeLimit extension has been received
2435 #endif
2436 
2437 #if (TLS_ALPN_SUPPORT == ENABLED)
2438  bool_t unknownProtocolsAllowed; ///<Unknown ALPN protocols allowed
2439  char_t *protocolList; ///<List of supported ALPN protocols
2440  char_t *selectedProtocol; ///<Selected ALPN protocol
2441  TlsAlpnCallback alpnCallback; ///<ALPN callback function
2442 #endif
2443 
2444 #if (TLS_ENCRYPT_THEN_MAC_SUPPORT == ENABLED)
2445  bool_t etmExtReceived; ///<The EncryptThenMac extension has been received
2446 #endif
2447 
2448 #if (TLS_EXT_MASTER_SECRET_SUPPORT == ENABLED)
2449  bool_t emsExtReceived; ///<The ExtendedMasterSecret extension has been received
2450 #endif
2451 
2452 #if (TLS_RAW_PUBLIC_KEY_SUPPORT == ENABLED)
2453  TlsCertificateFormat certFormat; ///<Certificate format
2454  TlsCertificateFormat peerCertFormat; ///<Peer's certificate format
2455  TlsRpkVerifyCallback rpkVerifyCallback; ///<Raw public key verification callback function
2456  bool_t clientCertTypeExtReceived; ///<The ClientCertType extension has been received
2457  bool_t serverCertTypeExtReceived; ///<The ServerCertType extension has been received
2458 #endif
2459 
2460 #if (TLS_TICKET_SUPPORT == ENABLED)
2461  bool_t sessionTicketEnabled; ///<Session ticket mechanism enabled
2462  bool_t sessionTicketExtReceived; ///<The SessionTicket extension has been received
2463  bool_t sessionTicketExtSent; ///<The SessionTicket extension has been sent
2464  TlsTicketEncryptCallback ticketEncryptCallback; ///<Ticket encryption callback function
2465  TlsTicketDecryptCallback ticketDecryptCallback; ///<Ticket decryption callback function
2466  void *ticketParam; ///<Opaque pointer passed to the ticket callbacks
2467 #endif
2468 
2469 #if (TLS_SECURE_RENEGOTIATION_SUPPORT == ENABLED)
2470  bool_t secureRenegoEnabled; ///<Secure renegotiation enabled
2471  bool_t secureRenegoFlag; ///<Secure renegotiation flag
2472 #endif
2473 
2474 #if (TLS_FALLBACK_SCSV_SUPPORT == ENABLED)
2475  bool_t fallbackScsvEnabled; ///<Support for FALLBACK_SCSV
2476 #endif
2477 
2478 #if (TLS_KEY_LOG_SUPPORT == ENABLED)
2479  TlsKeyLogCallback keyLogCallback; ///<Key logging callback (for debugging purpose only)
2480 #endif
2481 
2482 #if (TLS_MAX_WARNING_ALERTS > 0)
2483  uint_t alertCount; ///<Count of consecutive warning alerts
2484 #endif
2485 
2486 #if (TLS_MAX_EMPTY_RECORDS > 0)
2487  uint_t emptyRecordCount; ///<Count of consecutive empty records
2488 #endif
2489 
2490 #if (TLS_MAX_CHANGE_CIPHER_SPEC_MESSAGES > 0)
2491  uint_t changeCipherSpecCount; ///<Count of consecutive ChangeCipherSpec messages
2492 #endif
2493 
2494 #if (TLS_MAX_KEY_UPDATE_MESSAGES > 0)
2495  uint_t keyUpdateCount; ///<Count of consecutive KeyUpdate messages
2496 #endif
2497 
2498 #if (DTLS_SUPPORT == ENABLED)
2499  size_t pmtu; ///<PMTU value
2500  systime_t timeout; ///<Timeout for blocking calls
2502 
2503  DtlsCookieGenerateCallback cookieGenerateCallback; ///<Cookie generation callback function
2504  DtlsCookieVerifyCallback cookieVerifyCallback; ///<Cookie verification callback function
2505  void *cookieParam; ///<Opaque pointer passed to the cookie callbacks
2506 
2507  uint_t retransmitCount; ///<Retransmission counter
2508  systime_t retransmitTimestamp; ///<Time at which the datagram was sent
2509  systime_t retransmitTimeout; ///<Retransmission timeout
2510 
2511  uint16_t txMsgSeq; ///<Send sequence number
2512  size_t txDatagramLen; ///<Length of the outgoing datagram, in bytes
2513 
2514  uint16_t rxMsgSeq; ///<Next receive sequence number
2515  size_t rxFragQueueLen; ///<Length of the reassembly queue
2516  size_t rxDatagramLen; ///<Length of the incoming datagram, in bytes
2518  uint16_t rxRecordVersion; ///<Version of the incoming record
2519 
2521 #endif
2522 
2523 #if (DTLS_SUPPORT == ENABLED && DTLS_REPLAY_DETECTION_SUPPORT == ENABLED)
2524  bool_t replayDetectionEnabled; ///<Anti-replay mechanism enabled
2525  uint32_t replayWindow[(DTLS_REPLAY_WINDOW_SIZE + 31) / 32];
2526 #endif
2527 
2528  TLS_PRIVATE_CONTEXT ///<Application specific context
2529 };
2530 
2531 
2532 //TLS application programming interface (API)
2533 TlsContext *tlsInit(void);
2534 TlsState tlsGetState(TlsContext *context);
2535 
2537  TlsStateChangeCallback stateChangeCallback);
2538 
2540  TlsSocketSendCallback socketSendCallback,
2541  TlsSocketReceiveCallback socketReceiveCallback, TlsSocketHandle handle);
2542 
2543 error_t tlsSetVersion(TlsContext *context, uint16_t versionMin,
2544  uint16_t versionMax);
2545 
2547  TlsTransportProtocol transportProtocol);
2548 
2550 
2551 error_t tlsSetPrng(TlsContext *context, const PrngAlgo *prngAlgo,
2552  void *prngContext);
2553 
2554 error_t tlsSetServerName(TlsContext *context, const char_t *serverName);
2555 const char_t *tlsGetServerName(TlsContext *context);
2556 
2557 error_t tlsSetCache(TlsContext *context, TlsCache *cache);
2559 
2560 error_t tlsSetBufferSize(TlsContext *context, size_t txBufferSize,
2561  size_t rxBufferSize);
2562 
2563 error_t tlsSetMaxFragmentLength(TlsContext *context, size_t maxFragLen);
2564 
2565 error_t tlsSetCipherSuites(TlsContext *context, const uint16_t *cipherSuites,
2566  uint_t length);
2567 
2568 error_t tlsSetSupportedGroups(TlsContext *context, const uint16_t *groups,
2569  uint_t length);
2570 
2571 error_t tlsSetPreferredGroup(TlsContext *context, uint16_t group);
2572 
2574  const uint16_t *signAlgos, uint_t length);
2575 
2576 error_t tlsSetDhParameters(TlsContext *context, const char_t *params,
2577  size_t length);
2578 
2579 error_t tlsSetEcdhCallback(TlsContext *context, TlsEcdhCallback ecdhCallback);
2580 
2582  TlsEcdsaSignCallback ecdsaSignCallback);
2583 
2585  TlsEcdsaVerifyCallback ecdsaVerifyCallback);
2586 
2588  TlsKeyLogCallback keyLogCallback);
2589 
2591 error_t tlsSetAlpnProtocolList(TlsContext *context, const char_t *protocolList);
2592 error_t tlsSetAlpnCallback(TlsContext *context, TlsAlpnCallback alpnCallback);
2593 const char_t *tlsGetAlpnProtocol(TlsContext *context);
2594 
2595 error_t tlsSetPsk(TlsContext *context, const uint8_t *psk, size_t length);
2596 error_t tlsSetPskIdentity(TlsContext *context, const char_t *pskIdentity);
2597 error_t tlsSetPskIdentityHint(TlsContext *context, const char_t *pskIdentityHint);
2598 error_t tlsSetPskCallback(TlsContext *context, TlsPskCallback pskCallback);
2599 
2601  TlsRpkVerifyCallback rpkVerifyCallback);
2602 
2603 error_t tlsSetTrustedCaList(TlsContext *context, const char_t *trustedCaList,
2604  size_t length);
2605 
2606 error_t tlsAddCertificate(TlsContext *context, const char_t *certChain,
2607  size_t certChainLen, const char_t *privateKey, size_t privateKeyLen);
2608 
2610  const char_t *certChain, size_t certChainLen, const char_t *privateKey,
2611  size_t privateKeyLen, const char_t *password);
2612 
2614  TlsCertVerifyCallback certVerifyCallback, void *param);
2615 
2618 error_t tlsEnableFallbackScsv(TlsContext *context, bool_t enabled);
2619 
2621  TlsTicketEncryptCallback ticketEncryptCallback,
2622  TlsTicketDecryptCallback ticketDecryptCallback, void *param);
2623 
2624 error_t tlsSetPmtu(TlsContext *context, size_t pmtu);
2625 error_t tlsSetTimeout(TlsContext *context, systime_t timeout);
2626 
2628  DtlsCookieGenerateCallback cookieGenerateCallback,
2629  DtlsCookieVerifyCallback cookieVerifyCallback, void *param);
2630 
2632 
2633 error_t tlsSetMaxEarlyDataSize(TlsContext *context, size_t maxEarlyDataSize);
2634 
2635 error_t tlsWriteEarlyData(TlsContext *context, const void *data,
2636  size_t length, size_t *written, uint_t flags);
2637 
2638 error_t tlsConnect(TlsContext *context);
2639 
2641 
2642 error_t tlsExportKeyingMaterial(TlsContext *context, const char_t *label,
2643  bool_t useContextValue, const uint8_t *contextValue,
2644  size_t contextValueLen, uint8_t *output, size_t outputLen);
2645 
2646 error_t tlsWrite(TlsContext *context, const void *data, size_t length,
2647  size_t *written, uint_t flags);
2648 
2649 error_t tlsRead(TlsContext *context, void *data, size_t size, size_t *received,
2650  uint_t flags);
2651 
2652 bool_t tlsIsTxReady(TlsContext *context);
2653 bool_t tlsIsRxReady(TlsContext *context);
2654 
2655 error_t tlsShutdown(TlsContext *context);
2656 error_t tlsShutdownEx(TlsContext *context, bool_t waitForCloseNotify);
2657 
2658 void tlsFree(TlsContext *context);
2659 
2661 
2662 error_t tlsSaveSessionState(const TlsContext *context,
2663  TlsSessionState *session);
2664 
2666  const TlsSessionState *session);
2667 
2668 void tlsFreeSessionState(TlsSessionState *session);
2669 
2671 void tlsFreeCache(TlsCache *cache);
2672 
2673 //C++ guard
2674 #ifdef __cplusplus
2675 }
2676 #endif
2677 
2678 #endif
@ TLS_GROUP_X25519_MLKEM768
Definition: tls.h:1456
@ TLS_CERT_ECDSA_FIXED_ECDH
Definition: tls.h:1221
error_t tlsSetCertificateVerifyCallback(TlsContext *context, TlsCertVerifyCallback certVerifyCallback, void *param)
Register certificate verification callback function.
Definition: tls.c:1380
@ TLS13_KEY_EXCH_PSK
Definition: tls.h:1184
TlsRpkVerifyCallback rpkVerifyCallback
Raw public key verification callback function.
Definition: tls.h:2455
@ TLS_EXT_PSK_KEY_EXCHANGE_MODES
Definition: tls.h:1358
@ TLS_GROUP_BRAINPOOLP512R1_TLS13
Definition: tls.h:1437
size_t ticketLen
Length of the session ticket.
Definition: tls.h:2087
@ TLS_TYPE_MESSAGE_HASH
Definition: tls.h:1085
@ TLS_EXT_MAX_FRAGMENT_LENGTH
Definition: tls.h:1320
DTLS (Datagram Transport Layer Security)
ECDSA signature.
Definition: ecdsa.h:63
@ TLS_SIGN_ALGO_DSA
Definition: tls.h:1257
uint8_t sessionId[32]
Session identifier.
Definition: tls.h:2268
@ TLS_CERT_FORMAT_RAW_PUBLIC_KEY
Definition: tls.h:1200
X.509 common definitions.
uint8_t masterSecret[TLS_MASTER_SECRET_SIZE]
Master secret.
Definition: tls.h:2339
@ TLS_SIGN_SCHEME_ECDSA_BP256R1_TLS13_SHA256
Definition: tls.h:1287
TlsServerName
Definition: tls.h:1645
@ TLS_ALERT_DECODE_ERROR
Definition: tls.h:1122
@ TLS_GROUP_SECT163R2
Definition: tls.h:1407
size_t sessionIdLen
Length of the session identifier.
Definition: tls.h:2269
@ TLS_ALERT_UNEXPECTED_MESSAGE
Definition: tls.h:1107
EcPublicKey peerEcPublicKey
Peer's EC public key.
Definition: tls.h:2410
Collection of key exchange algorithms.
@ TLS_GROUP_BRAINPOOLP256R1_TLS13
Definition: tls.h:1435
bool_t ecPointFormatsExtReceived
The EcPointFormats extension has been received.
Definition: tls.h:2394
Generic hash algorithm context.
uint16_t length
Definition: tls.h:1609
TlsHashAlgo ticketHashAlgo
Hash algorithm associated with the ticket.
Definition: tls.h:2377
Tls13PskBinderList
Definition: tls13_misc.h:275
uint8_t secret[TLS_MAX_HKDF_DIGEST_SIZE]
Definition: tls.h:2361
@ TLS_SIGN_SCHEME_MLDSA44_ECDSA_SECP256R1_SHA256
Definition: tls.h:1300
@ TLS_STATE_HELLO_RETRY_REQUEST
Definition: tls.h:1498
int bool_t
Definition: compiler_port.h:61
uint8_t sessionId[]
Definition: tls.h:1811
uint8_t b
Definition: nbns_common.h:104
@ TLS_GROUP_SECP160R2
Definition: tls.h:1421
HMAC algorithm context.
Definition: hmac.h:59
uint_t numSupportedGroups
Number of named groups in the list.
Definition: tls.h:2250
uint8_t encKey[48]
Encryption key.
Definition: tls.h:2195
uint16_t cipherSuite
Cipher suite identifier.
Definition: tls.h:1921
@ TLS_EXT_OID_FILTERS
Definition: tls.h:1360
@ TLS_TYPE_NEW_CONNECTION_ID
Definition: tls.h:1071
@ TLS_ALERT_CERTIFICATE_REQUIRED
Definition: tls.h:1139
error_t(* TlsTicketEncryptCallback)(TlsContext *context, const uint8_t *plaintext, size_t plaintextLen, uint8_t *ciphertext, size_t *ciphertextLen, void *param)
Ticket encryption callback function.
Definition: tls.h:2005
uint8_t * cookie
Cookie.
Definition: tls.h:2276
char_t * pskIdentity
PSK identity.
Definition: tls.h:2420
const Tls13PskKeModeList * pskKeModeList
PskKeyExchangeModes extension.
Definition: tls.h:2177
@ TLS_ALERT_CLOSE_NOTIFY
Definition: tls.h:1106
error_t tlsConnect(TlsContext *context)
Initiate the TLS handshake.
Definition: tls.c:1730
TlsDigitalSignature
Definition: tls.h:1755
@ TLS_ALERT_NO_RENEGOTIATION
Definition: tls.h:1131
@ TLS13_KEY_EXCH_MLKEM
Definition: tls.h:1182
@ TLS_SIGN_ALGO_ANONYMOUS
Definition: tls.h:1255
systime_t ticketTimestamp
Timestamp to manage ticket lifetime.
Definition: tls.h:2089
void TlsServerHelloDone
ServerHelloDone message.
Definition: tls.h:1857
bool_t secureRenegoFlag
Secure renegotiation flag.
Definition: tls.h:2471
@ TLS13_KEY_EXCH_PSK_DHE
Definition: tls.h:1185
error_t(* TlsEcdsaVerifyCallback)(TlsContext *context, const uint8_t *digest, size_t digestLen, EcdsaSignature *signature)
ECDSA signature verification callback function.
Definition: tls.h:2038
Tls13Cookie
Definition: tls13_misc.h:197
@ TLS_SIGN_SCHEME_RSA_PSS_RSAE_SHA256
Definition: tls.h:1277
@ TLS_SIGN_SCHEME_MLDSA65_ED25519
Definition: tls.h:1304
error_t tlsSetEcdsaSignCallback(TlsContext *context, TlsEcdsaSignCallback ecdsaSignCallback)
Register ECDSA signature generation callback function.
Definition: tls.c:785
signed int int_t
Definition: compiler_port.h:56
DtlsSequenceNumber dtlsSeqNum
Record sequence number.
Definition: tls.h:2212
#define TLS_MAX_PASSWORD_LEN
Definition: tls.h:766
@ TLS_CERT_FORMAT_OPENPGP
Definition: tls.h:1199
@ TLS_STATE_SERVER_KEY_EXCHANGE
Definition: tls.h:1505
const TlsExtension * sessionTicket
SessionTicket extension.
Definition: tls.h:2166
@ TLS_TYPE_SERVER_HELLO_DONE
Definition: tls.h:1075
size_t premasterSecretLen
Length of the premaster secret.
Definition: tls.h:2321
@ TLS_COMPRESSION_METHOD_NULL
Definition: tls.h:1150
@ TLS_SIGN_ALGO_GOSTR34102012_256
Definition: tls.h:1261
@ TLS_ALERT_ILLEGAL_PARAMETER
Definition: tls.h:1119
@ TLS_GROUP_SECT571K1
Definition: tls.h:1417
TlsKeyExchMethod keyExchMethod
Key exchange method.
Definition: tls.h:2286
TlsEcPointFormat
EC point formats.
Definition: tls.h:1468
uint8_t * ticket
Session ticket.
Definition: tls.h:2086
#define PrngAlgo
Definition: crypto.h:973
@ TLS_EXT_CLIENT_AUTHZ
Definition: tls.h:1326
@ TLS_EARLY_DATA_REJECTED
Definition: tls.h:1013
uint32_t ticketLifetime
Lifetime of the ticket.
Definition: tls.h:2282
@ TLS_EXT_PWD_PROTECT
Definition: tls.h:1347
TlsCache * tlsInitCache(uint_t size)
Session cache initialization.
Definition: tls_cache.c:50
error_t tlsShutdownEx(TlsContext *context, bool_t waitForCloseNotify)
Gracefully close TLS session.
Definition: tls.c:2436
@ TLS_ALERT_UNSUPPORTED_EXTENSION
Definition: tls.h:1133
TlsState
TLS FSM states.
Definition: tls.h:1492
uint8_t algorithm
@ TLS_TYPE_CERTIFICATE_STATUS
Definition: tls.h:1080
const Tls13PskBinderList * binderList
Definition: tls.h:2179
uint8_t clientRandom[TLS_RANDOM_SIZE]
Client random value.
Definition: tls.h:2318
size_t rxBufferSize
RX buffer size.
Definition: tls.h:2310
bool_t closeNotifySent
A closure alert has been sent.
Definition: tls.h:2297
@ TLS_EXT_SUPPORTED_VERSIONS
Definition: tls.h:1356
ECDSA (Elliptic Curve Digital Signature Algorithm)
@ TLS_SIGN_SCHEME_MLDSA44_ED25519
Definition: tls.h:1303
uint16_t versionMin
Minimum version accepted by the implementation.
Definition: tls.h:2273
bool_t maxFragLenExtReceived
The MaxFragmentLength extension has been received.
Definition: tls.h:2429
TlsState tlsGetState(TlsContext *context)
Retrieve current TLS state.
Definition: tls.c:207
TlsCertificateRequest
Definition: tls.h:1850
@ TLS_ALERT_RECORD_OVERFLOW
Definition: tls.h:1110
uint16_t version
Definition: tls.h:1777
#define TLS_PRIVATE_CONTEXT
Definition: tls.h:857
TlsTransportProtocol transportProtocol
Transport protocol (stream or datagram)
Definition: tls.h:2234
size_t txRecordPos
Current position in the TLS record.
Definition: tls.h:2307
@ TLS_EXT_EXTERNAL_ID_HASH
Definition: tls.h:1366
const TlsSignSchemeList * signAlgoList
SignatureAlgorithms extension.
Definition: tls.h:2142
TlsConnectionEnd
TLS connection end.
Definition: tls.h:989
size_t rxDatagramPos
Definition: tls.h:2517
const TlsExtension * selectedGroup
KeyShare extension (HelloRetryRequest)
Definition: tls.h:2175
systime_t timestamp
Time stamp to manage entry lifetime.
Definition: tls.h:2079
@ TLS_GROUP_SECP256K1
Definition: tls.h:1426
uint8_t * txBuffer
TX buffer.
Definition: tls.h:2300
TlsContext * tlsInit(void)
TLS context initialization.
Definition: tls.c:67
error_t tlsSetStateChangeCallback(TlsContext *context, TlsStateChangeCallback stateChangeCallback)
Register TLS state change callback.
Definition: tls.c:233
bool_t fatalAlertSent
A fatal alert message has been sent.
Definition: tls.h:2295
HashContext * transcriptHashContext
Hash context used to compute verify data.
Definition: tls.h:2349
uint8_t clientHsTrafficSecret[TLS_MAX_HKDF_DIGEST_SIZE]
Definition: tls.h:2363
@ TLS_GROUP_EXPLICIT_CHAR2_CURVE
Definition: tls.h:1459
error_t(* DtlsCookieGenerateCallback)(TlsContext *context, const DtlsClientParameters *clientParams, uint8_t *cookie, size_t *length, void *param)
DTLS cookie generation callback function.
Definition: dtls_misc.h:240
TlsConnectionEnd entity
Client or server operation.
Definition: tls.h:2235
@ TLS_EXT_PWD_CLEAR
Definition: tls.h:1348
TlsCertificateFormat peerCertFormat
Peer's certificate format.
Definition: tls.h:2454
@ TLS_STATE_CERTIFICATE_REQUEST
Definition: tls.h:1507
void * cookieParam
Opaque pointer passed to the cookie callbacks.
Definition: tls.h:2505
@ TLS_TYPE_CHANGE_CIPHER_SPEC
Definition: tls.h:1046
size_t maxFragLen
Maximum plaintext fragment length.
Definition: tls.h:2428
const TlsProtocolNameList * protocolNameList
ALPN extension.
Definition: tls.h:2151
@ TLS_GROUP_SECP256R1
Definition: tls.h:1427
const TlsExtension * earlyDataIndication
EarlyData extension.
Definition: tls.h:2181
error_t tlsRestoreSessionState(TlsContext *context, const TlsSessionState *session)
Restore TLS session.
Definition: tls.c:2818
error_t tlsSetSupportedSignAlgos(TlsContext *context, const uint16_t *signAlgos, uint_t length)
Specify the list of allowed signature algorithms.
Definition: tls.c:697
@ TLS_TYPE_HANDSHAKE
Definition: tls.h:1048
TlsEcPointFormatList
Definition: tls.h:1700
@ TLS_GROUP_CURVE_SM2
Definition: tls.h:1445
error_t tlsSetAlpnCallback(TlsContext *context, TlsAlpnCallback alpnCallback)
Register ALPN callback function.
Definition: tls.c:941
#define TLS_PRIVATE_ENCRYPTION_ENGINE
Definition: tls.h:862
error_t(* TlsSocketReceiveCallback)(TlsSocketHandle handle, void *data, size_t size, size_t *received, uint_t flags)
Socket receive callback function.
Definition: tls.h:1965
@ TLS_GROUP_SECP224K1
Definition: tls.h:1424
@ TLS_EXT_CONNECTION_ID
Definition: tls.h:1365
TlsTicketDecryptCallback ticketDecryptCallback
Ticket decryption callback function.
Definition: tls.h:2465
TlsCertificateType type
End entity certificate type.
Definition: tls.h:2125
@ TLS_SIGN_SCHEME_GOSTR34102012_256A
Definition: tls.h:1293
@ TLS_GROUP_SECT239K1
Definition: tls.h:1412
bool_t clientCertTypeExtReceived
The ClientCertType extension has been received.
Definition: tls.h:2456
size_t pmtu
PMTU value.
Definition: tls.h:2499
@ TLS_TRANSPORT_PROTOCOL_DATAGRAM
Definition: tls.h:979
@ TLS_TYPE_COMPRESSED_CERTIFICATE
Definition: tls.h:1083
@ TLS_ALERT_ACCESS_DENIED
Definition: tls.h:1121
TlsRenegoInfo
Definition: tls.h:1722
@ TLS_KEY_EXCH_SRP_SHA_RSA
Definition: tls.h:1178
@ TLS_ALERT_INSUFFICIENT_SECURITY
Definition: tls.h:1127
#define DTLS_REPLAY_WINDOW_SIZE
Definition: dtls_misc.h:69
TlsPskIdentity
Definition: tls.h:1733
@ TLS_CERT_FORTEZZA_DMS
Definition: tls.h:1218
HmacContext * hmacContext
HMAC context.
Definition: tls.h:2205
TlsMessageType
Handshake message type.
Definition: tls.h:1061
@ TLS_SIGN_SCHEME_RSA_PSS_PSS_SHA512
Definition: tls.h:1282
TlsSocketHandle socketHandle
Socket handle.
Definition: tls.h:2239
@ TLS13_KEY_EXCH_PSK_MLKEM
Definition: tls.h:1187
const char_t * name
Definition: tls.h:2056
Structure describing a cipher suite.
Definition: tls.h:2054
@ TLS_ALERT_BAD_CERTIFICATE_HASH_VALUE
Definition: tls.h:1137
@ TLS_HASH_ALGO_SHA1
Definition: tls.h:1239
@ TLS_STATE_APPLICATION_DATA
Definition: tls.h:1523
@ TLS_COMPRESSION_METHOD_DEFLATE
Definition: tls.h:1151
size_t txDatagramLen
Length of the outgoing datagram, in bytes.
Definition: tls.h:2512
size_t sessionIdLen
Length of the session identifier.
Definition: tls.h:2083
size_t authTagLen
Length of the authentication tag.
Definition: tls.h:2200
@ TLS_GROUP_GC512A
Definition: tls.h:1442
@ TLS_ALERT_DECOMPRESSION_FAILURE
Definition: tls.h:1111
const TlsCertTypeList * clientCertTypeList
ClientCertType extension.
Definition: tls.h:2154
bool_t secureRenegoEnabled
Secure renegotiation enabled.
Definition: tls.h:2470
uint8_t type
Definition: coap_common.h:176
@ TLS_GROUP_GC256D
Definition: tls.h:1441
error_t tlsSetVersion(TlsContext *context, uint16_t versionMin, uint16_t versionMax)
Set minimum and maximum versions permitted.
Definition: tls.c:289
@ TLS_KEY_EXCH_DH_DSS
Definition: tls.h:1165
TlsHashAlgo
Hash algorithms.
Definition: tls.h:1236
bool_t closeNotifyReceived
A closure alert has been received from the peer.
Definition: tls.h:2298
error_t tlsSetMaxFragmentLength(TlsContext *context, size_t maxFragLen)
Set maximum fragment length.
Definition: tls.c:577
@ TLS_ALERT_CERTIFICATE_UNOBTAINABLE
Definition: tls.h:1134
const HashAlgo * hashAlgo
Hash algorithm for MAC operations.
Definition: tls.h:2204
@ TLS_ALERT_NO_CERTIFICATE
Definition: tls.h:1113
@ TLS_TYPE_ACK
Definition: tls.h:1052
TlsEncryptionEngine prevEncryptionEngine
Definition: tls.h:2520
TlsAlpnCallback alpnCallback
ALPN callback function.
Definition: tls.h:2441
TlsStateChangeCallback stateChangeCallback
TLS state change callback function.
Definition: tls.h:2237
@ TLS13_KEY_EXCH_ECDHE
Definition: tls.h:1181
@ TLS_STATE_SERVER_APP_TRAFFIC_KEYS
Definition: tls.h:1520
@ TLS_CERT_DSS_SIGN
Definition: tls.h:1213
@ TLS_KEY_EXCH_SRP_SHA_DSS
Definition: tls.h:1179
@ TLS_SIGN_SCHEME_RSA_PSS_RSAE_SHA512
Definition: tls.h:1279
@ TLS_SIGN_SCHEME_NONE
Definition: tls.h:1272
void * prngContext
Pseudo-random number generator context.
Definition: tls.h:2244
TlsAlertDescription
Alert description.
Definition: tls.h:1105
CipherMode cipherMode
Definition: tls.h:2059
error_t tlsSetAlpnProtocolList(TlsContext *context, const char_t *protocolList)
Set the list of supported ALPN protocols.
Definition: tls.c:892
uint16_t value[]
Definition: tls.h:1554
@ TLS_SIGN_SCHEME_ED25519
Definition: tls.h:1291
OsMutex mutex
Mutex preventing simultaneous access to the cache.
Definition: tls.h:2108
@ TLS_EXT_TICKET_PINNING
Definition: tls.h:1350
uint8_t clientVerifyData[64]
Client verify data.
Definition: tls.h:2322
DhContext dhContext
Diffie-Hellman context.
Definition: tls.h:2389
@ TLS_EXT_SERVER_AUTHZ
Definition: tls.h:1327
TlsProtocolNameList
Definition: tls.h:1678
Tls13KeyShareEntry
Definition: tls13_misc.h:209
@ TLS_ALERT_DECRYPT_ERROR
Definition: tls.h:1123
@ TLS_KEY_EXCH_ECDH_RSA
Definition: tls.h:1168
char_t * ticketAlpn
ALPN protocol associated with the ticket.
Definition: tls.h:2378
TlsContentType txBufferType
Type of data that resides in the TX buffer.
Definition: tls.h:2303
Session cache.
Definition: tls.h:2107
TlsTicketEncryptCallback ticketEncryptCallback
Ticket encryption callback function.
Definition: tls.h:2464
TlsChangeCipherSpec
Definition: tls.h:1900
size_t rxDatagramLen
Length of the incoming datagram, in bytes.
Definition: tls.h:2516
const TlsSupportedVersionList * supportedVersionList
SupportedVersions extension (ClientHello)
Definition: tls.h:2137
TlsExtension
Definition: tls.h:1611
systime_t retransmitTimeout
Retransmission timeout.
Definition: tls.h:2509
size_t pskLen
Length of the pre-shared key, in bytes.
Definition: tls.h:2419
uint16_t rxMsgSeq
Next receive sequence number.
Definition: tls.h:2514
uint_t cipherSuiteTypes
Types of cipher suites proposed by the client.
Definition: tls.h:2284
uint8_t certificateTypes[]
Definition: tls.h:1849
uint8_t * psk
Pre-shared key.
Definition: tls.h:2418
uint_t emptyRecordCount
Count of consecutive empty records.
Definition: tls.h:2487
size_t earlyDataLen
Total amount of 0-RTT data that have been sent by the client.
Definition: tls.h:2381
#define TLS_RANDOM_SIZE
Definition: tls.h:960
@ TLS_GROUP_BRAINPOOLP256R1
Definition: tls.h:1430
@ TLS_SIGN_SCHEME_GOSTR34102012_256B
Definition: tls.h:1294
@ TLS_EXT_COMPRESS_CERTIFICATE
Definition: tls.h:1345
size_t fixedIvLen
Length of the fixed part of the IV.
Definition: tls.h:2198
@ TLS_EXT_EARLY_DATA
Definition: tls.h:1355
@ TLS_EXT_TRUNCATED_HMAC
Definition: tls.h:1323
@ TLS_EXT_SESSION_TICKET
Definition: tls.h:1352
@ TLS_TYPE_END_OF_EARLY_DATA
Definition: tls.h:1067
uint8_t authTagLen
Definition: tls.h:2066
@ TLS_GROUP_X448
Definition: tls.h:1434
error_t(* TlsSocketSendCallback)(TlsSocketHandle handle, const void *data, size_t length, size_t *written, uint_t flags)
Socket send callback function.
Definition: tls.h:1957
@ TLS13_KEY_EXCH_PSK_HYBRID
Definition: tls.h:1188
@ TLS_GROUP_FFDHE6144
Definition: tls.h:1449
TlsPskIdentityHint
Definition: tls.h:1744
@ TLS_SIGN_SCHEME_RSA_PSS_PSS_SHA384
Definition: tls.h:1281
error_t tlsAllowUnknownAlpnProtocols(TlsContext *context, bool_t allowed)
Allow unknown ALPN protocols.
Definition: tls.c:866
@ TLS_SIGN_SCHEME_RSA_PSS_RSAE_SHA384
Definition: tls.h:1278
@ TLS_SIGN_ALGO_ED448
Definition: tls.h:1260
@ TLS_MAX_FRAGMENT_LENGTH_4096
Definition: tls.h:1394
@ TLS_HASH_ALGO_NONE
Definition: tls.h:1237
error_t tlsSetTimeout(TlsContext *context, systime_t timeout)
Set timeout for blocking calls (for DTLS only)
Definition: tls.c:1546
uint16_t preferredGroup
Preferred ECDHE or FFDHE named group.
Definition: tls.h:2353
size_t maxEarlyDataSize
Maximum amount of 0-RTT data that the client is allowed to send.
Definition: tls.h:2380
const Tls13Cookie * cookie
Cookie extension.
Definition: tls.h:2172
@ TLS_EXT_QUIC_TRANSPORT_PARAMETERS
Definition: tls.h:1368
TlsKeyExchMethod keyExchMethod
Definition: tls.h:2057
error_t tlsSetCache(TlsContext *context, TlsCache *cache)
Set session cache.
Definition: tls.c:486
uint8_t sessionIdLen
Definition: tls.h:1810
uint8_t serverVerifyData[64]
Server verify data.
Definition: tls.h:2324
@ TLS_STATE_CLIENT_HELLO
Definition: tls.h:1494
bool_t extendedMasterSecret
Extended master secret computation.
Definition: tls.h:1926
@ TLS_ALERT_EXPORT_RESTRICTION
Definition: tls.h:1125
error_t tlsSetPsk(TlsContext *context, const uint8_t *psk, size_t length)
Set the pre-shared key to be used.
Definition: tls.c:994
uint8_t * rxBuffer
RX buffer.
Definition: tls.h:2309
TLS 1.3 helper functions.
const Tls13KeyShareEntry * serverShare
KeyShare extension (ServerHello)
Definition: tls.h:2176
@ TLS_SIGN_SCHEME_MLDSA65_RSA_PKCS1_SHA384
Definition: tls.h:1306
@ TLS_EXT_SERVER_NAME
Definition: tls.h:1319
@ TLS_EXT_SIGNATURE_ALGORITHMS_CERT
Definition: tls.h:1362
@ TLS_HASH_ALGO_SHA224
Definition: tls.h:1240
@ TLS_KEY_EXCH_RSA
Definition: tls.h:1162
const Tls13KeyShareList * keyShareList
KeyShare extension (ClientHello)
Definition: tls.h:2174
uint8_t resumptionMasterSecret[TLS_MAX_HKDF_DIGEST_SIZE]
Definition: tls.h:2368
CipherMode cipherMode
Cipher mode of operation.
Definition: tls.h:2203
@ TLS_EXT_CERT_TYPE
Definition: tls.h:1328
error_t(* TlsAlpnCallback)(TlsContext *context, const char_t *selectedProtocol)
ALPN callback function.
Definition: tls.h:1973
@ TLS_EXT_SUPPORTED_EKT_CIPHERS
Definition: tls.h:1353
@ TLS_TYPE_CERTIFICATE
Definition: tls.h:1072
Encryption engine.
Definition: tls.h:2191
TlsExtensionList
Definition: tls.h:1622
@ TLS_CERT_RSA_EPHEMERAL_DH
Definition: tls.h:1216
@ TLS_ALERT_UNKNOWN_CA
Definition: tls.h:1120
void TlsFinished
Finished message.
Definition: tls.h:1890
TlsCipherSuites
Definition: tls.h:1555
@ TLS_STATE_SERVER_HELLO
Definition: tls.h:1499
@ TLS_STATE_HELLO_VERIFY_REQUEST
Definition: tls.h:1497
@ TLS_EXT_TRUSTED_CA_KEYS
Definition: tls.h:1322
@ TLS_SIGN_SCHEME_MLDSA44_RSA_PKCS1_SHA256
Definition: tls.h:1305
error_t(* TlsRpkVerifyCallback)(TlsContext *context, const uint8_t *rawPublicKey, size_t rawPublicKeyLen)
Raw public key verification callback function.
Definition: tls.h:1997
uint32_t ticketNonce
A per-ticket value that is unique across all tickets issued.
Definition: tls.h:2375
KemContext kemContext
KEM context.
Definition: tls.h:2398
const TlsCertTypeList * serverCertTypeList
ServerCertType extension.
Definition: tls.h:2156
size_t recordSizeLimit
Maximum record size the peer is willing to receive.
Definition: tls.h:2433
@ TLS_ALERT_LEVEL_WARNING
Definition: tls.h:1095
size_t txBufferSize
TX buffer size.
Definition: tls.h:2301
@ TLS_HASH_ALGO_SHA512
Definition: tls.h:1243
uint16_t cipherSuite
Cipher suite identifier.
Definition: tls.h:2078
@ TLS_ALERT_UNKNOWN_PSK_IDENTITY
Definition: tls.h:1138
const TlsExtension * maxFragLen
MaxFragmentLength extension.
Definition: tls.h:2145
@ TLS_KEY_EXCH_ECDHE_ECDSA
Definition: tls.h:1171
error_t tlsSetSocketCallbacks(TlsContext *context, TlsSocketSendCallback socketSendCallback, TlsSocketReceiveCallback socketReceiveCallback, TlsSocketHandle handle)
Set socket send and receive callbacks.
Definition: tls.c:257
TlsKeyLogCallback keyLogCallback
Key logging callback (for debugging purpose only)
Definition: tls.h:2479
@ TLS_STATE_KEY_UPDATE
Definition: tls.h:1522
@ TLS_CERT_FORMAT_1609DOT2
Definition: tls.h:1201
@ TLS_KEY_EXCH_ECDHE_RSA
Definition: tls.h:1169
const TlsEcPointFormatList * ecPointFormatList
EcPointFormats extension.
Definition: tls.h:2141
uint16_t version
Negotiated TLS version.
Definition: tls.h:2272
@ TLS_SIGN_SCHEME_RSA_PKCS1_SHA1
Definition: tls.h:1273
size_t certChainLen
Length of the certificate chain.
Definition: tls.h:2121
Diffie-Hellman context.
Definition: dh.h:60
TlsHandshake
Definition: tls.h:1792
@ TLS_KEY_EXCH_ECDH_ANON
Definition: tls.h:1172
uint8_t premasterSecret[TLS_PREMASTER_SECRET_SIZE]
Premaster secret.
Definition: tls.h:2320
size_t rxRecordLen
Length of the TLS record.
Definition: tls.h:2315
DSA public key.
Definition: dsa.h:61
HmacContext hmacContext
HMAC context.
Definition: tls.h:2341
uint8_t serverHsTrafficSecret[TLS_MAX_HKDF_DIGEST_SIZE]
Definition: tls.h:2364
@ TLS_FLAG_PEEK
Definition: tls.h:1024
const char_t * trustedCaList
Trusted CA list (PEM format)
Definition: tls.h:2261
uint32_t ticketAgeAdd
Random value used to obscure the age of the ticket.
Definition: tls.h:2374
TlsCertAuthorities
Definition: tls.h:1599
uint8_t * ticket
Session ticket.
Definition: tls.h:2279
@ TLS_GROUP_GC256B
Definition: tls.h:1439
size_t clientVerifyDataLen
Length of the client verify data.
Definition: tls.h:2323
X.509 certificate.
Definition: x509_common.h:1119
TlsCertificateFormat
Certificate formats.
Definition: tls.h:1197
@ TLS_EXT_CLIENT_CERT_TYPE
Definition: tls.h:1338
@ TLS_HASH_ALGO_SM3
Definition: tls.h:1245
#define TlsContext
Definition: tls.h:36
error_t
Error codes.
Definition: error.h:43
@ TLS_SIGN_SCHEME_RSA_PSS_PSS_SHA256
Definition: tls.h:1280
@ TLS_ALERT_BAD_RECORD_MAC
Definition: tls.h:1108
error_t tlsShutdown(TlsContext *context)
Gracefully close TLS session.
Definition: tls.c:2423
@ TLS_SIGN_SCHEME_ECDSA_SECP521R1_SHA512
Definition: tls.h:1286
size_t txRecordLen
Length of the TLS record.
Definition: tls.h:2306
@ TLS_EXT_EXTENDED_MASTER_SECRET
Definition: tls.h:1342
@ TLS_SIGN_SCHEME_MLDSA65_RSA_PSS_PSS_SHA384
Definition: tls.h:1308
KEM context.
Definition: kem.h:68
@ TLS_CERT_ED25519_SIGN
Definition: tls.h:1226
@ TLS_CONNECTION_END_SERVER
Definition: tls.h:991
size_t cookieLen
Length of the cookie.
Definition: tls.h:2277
void tlsFreeSessionState(TlsSessionState *session)
Properly dispose a session state.
Definition: tls.c:2871
@ TLS_GROUP_SECP256R1_MLKEM768
Definition: tls.h:1455
@ TLS_EXT_TOKEN_BINDING
Definition: tls.h:1343
void(* TlsStateChangeCallback)(TlsContext *context, TlsState state)
TLS state change callback.
Definition: tls.h:1950
EdDSA public key.
Definition: eddsa.h:64
TlsClientAuthMode
Client authentication mode.
Definition: tls.h:1000
TlsKeyExchMethod
Key exchange methods.
Definition: tls.h:1160
@ TLS_EXT_SUPPORTED_GROUPS
Definition: tls.h:1329
bool_t fallbackScsvEnabled
Support for FALLBACK_SCSV.
Definition: tls.h:2475
@ TLS_SIGN_SCHEME_MLDSA87_ED448
Definition: tls.h:1309
error_t tlsSetSupportedGroups(TlsContext *context, const uint16_t *groups, uint_t length)
Specify the list of allowed ECDHE and FFDHE groups.
Definition: tls.c:642
error_t tlsAddCertificate(TlsContext *context, const char_t *certChain, size_t certChainLen, const char_t *privateKey, size_t privateKeyLen)
@ TLS_EXT_HEARTBEAT
Definition: tls.h:1334
@ TLS_FLAG_WAIT_ALL
Definition: tls.h:1025
#define TLS_PREMASTER_SECRET_SIZE
Definition: tls.h:822
@ TLS_GROUP_NONE
Definition: tls.h:1404
@ TLS_GROUP_GC512B
Definition: tls.h:1443
void TlsCertificateVerify
CertificateVerify message.
Definition: tls.h:1871
uint8_t keyBlock[192]
Key material.
Definition: tls.h:2340
@ TLS_KEY_EXCH_DH_ANON
Definition: tls.h:1167
error_t(* TlsEcdhCallback)(TlsContext *context)
ECDH key agreement callback function.
Definition: tls.h:2023
const CipherAlgo * cipherAlgo
Definition: tls.h:2058
size_t rxBufferPos
Current position in RX buffer.
Definition: tls.h:2314
@ TLS_EXT_RENEGOTIATION_INFO
Definition: tls.h:1371
@ TLS_GROUP_SECT283K1
Definition: tls.h:1413
@ TLS_GROUP_SECT409K1
Definition: tls.h:1415
@ TLS_GROUP_EXPLICIT_PRIME_CURVE
Definition: tls.h:1458
error_t tlsSetClientAuthMode(TlsContext *context, TlsClientAuthMode mode)
Set client authentication mode (for servers only)
Definition: tls.c:507
@ TLS13_KEY_EXCH_DHE
Definition: tls.h:1180
bool_t encryptThenMac
Encrypt-then-MAC construction.
Definition: tls.h:2218
TlsAlert
Definition: tls.h:1911
TlsCertificateFormat certFormat
Certificate format.
Definition: tls.h:2453
@ TLS_HASH_ALGO_INTRINSIC
Definition: tls.h:1244
TlsEncryptionEngine decryptionEngine
Decryption engine.
Definition: tls.h:2328
@ TLS_KEY_EXCH_ECDH_ECDSA
Definition: tls.h:1170
const char_t * tlsGetAlpnProtocol(TlsContext *context)
Get the name of the selected ALPN protocol.
Definition: tls.c:966
@ TLS_EXT_ENCRYPT_THEN_MAC
Definition: tls.h:1341
@ TLS_GROUP_FFDHE4096
Definition: tls.h:1448
RSA public key.
Definition: rsa.h:57
@ TLS_TYPE_APPLICATION_DATA
Definition: tls.h:1049
@ TLS_TYPE_CLIENT_HELLO
Definition: tls.h:1063
uint8_t fixedIvLen
Definition: tls.h:2064
@ TLS_CERT_GOST_SIGN256
Definition: tls.h:1222
@ TLS_STATE_SERVER_FINISHED
Definition: tls.h:1518
@ TLS_EXT_KEY_SHARE
Definition: tls.h:1363
Tls12DigitalSignature
Definition: tls.h:1767
uint16_t identifier
Definition: tls.h:2055
error_t tlsEnableReplayDetection(TlsContext *context, bool_t enabled)
Enable anti-replay mechanism (for DTLS only)
Definition: tls.c:1610
@ TLS_GROUP_SECT163K1
Definition: tls.h:1405
@ TLS_SIGN_SCHEME_GOSTR34102012_512B
Definition: tls.h:1298
error_t tlsSetBufferSize(TlsContext *context, size_t txBufferSize, size_t rxBufferSize)
Set TLS buffer size.
Definition: tls.c:529
@ TLS_EC_CURVE_TYPE_EXPLICIT_PRIME
Definition: tls.h:1481
@ TLS_ALERT_UNSUPPORTED_CERTIFICATE
Definition: tls.h:1115
size_t serverVerifyDataLen
Length of the server verify data.
Definition: tls.h:2325
error_t tlsSetServerName(TlsContext *context, const char_t *serverName)
Set the server name.
Definition: tls.c:411
@ TLS_TYPE_REQUEST_CONNECTION_ID
Definition: tls.h:1070
uint16_t epoch
Counter value incremented on every cipher state change.
Definition: tls.h:2211
bool_t fatalAlertReceived
A fatal alert message has been received from the peer.
Definition: tls.h:2296
@ TLS_TYPE_ALERT
Definition: tls.h:1047
error_t tlsSetCookieCallbacks(TlsContext *context, DtlsCookieGenerateCallback cookieGenerateCallback, DtlsCookieVerifyCallback cookieVerifyCallback, void *param)
Set cookie generation/verification callbacks (for DTLS only)
Definition: tls.c:1574
@ TLS_STATE_EARLY_DATA
Definition: tls.h:1496
size_t txBufferPos
Current position in TX buffer.
Definition: tls.h:2305
@ TLS_TYPE_SERVER_HELLO
Definition: tls.h:1064
@ TLS_HASH_ALGO_SHA384
Definition: tls.h:1242
TlsServerNameList
Definition: tls.h:1656
TlsClientAuthMode clientAuthMode
Client authentication mode.
Definition: tls.h:2291
uint32_t ticketLifetime
Lifetime of the ticket.
Definition: tls.h:1924
@ TLS_CERT_RSA_PSS_SIGN
Definition: tls.h:1224
@ TLS_SIGN_SCHEME_ECDSA_SHA1
Definition: tls.h:1283
uint8_t ticketPsk[TLS_MAX_HKDF_DIGEST_SIZE]
PSK associated with the ticket.
Definition: tls.h:2372
@ TLS_GROUP_GC256C
Definition: tls.h:1440
error_t tlsSetPrng(TlsContext *context, const PrngAlgo *prngAlgo, void *prngContext)
Set the pseudo-random number generator to be used.
Definition: tls.c:383
TlsSignatureScheme signScheme
Signature scheme used to sign the end entity certificate.
Definition: tls.h:2126
const char_t * tlsGetServerName(TlsContext *context)
Get the server name.
Definition: tls.c:461
@ TLS_TYPE_ENCRYPTED_EXTENSIONS
Definition: tls.h:1069
@ TLS_GROUP_SECT233K1
Definition: tls.h:1410
TlsSequenceNumber earlyDataSeqNum
Early data sequence number.
Definition: tls.h:2385
@ TLS_MAX_FRAGMENT_LENGTH_2048
Definition: tls.h:1393
error_t tlsSetPmtu(TlsContext *context, size_t pmtu)
Set PMTU value (for DTLS only)
Definition: tls.c:1516
@ TLS_SIGN_SCHEME_RSA_PKCS1_SHA256
Definition: tls.h:1274
@ TLS_CERT_DSS_EPHEMERAL_DH
Definition: tls.h:1217
size_t ticketLen
Length of the session ticket.
Definition: tls.h:2280
@ TLS_GROUP_SECP384R1
Definition: tls.h:1428
General definitions for cryptographic algorithms.
@ TLS_GROUP_SECP192K1
Definition: tls.h:1422
uint8_t exporterMasterSecret[TLS_MAX_HKDF_DIGEST_SIZE]
Definition: tls.h:2367
RSA public-key cryptography standard.
size_t rxBufferMaxLen
Maximum number of plaintext data the RX buffer can hold.
Definition: tls.h:2311
uint16_t clientVersion
Latest version supported by the client.
Definition: tls.h:2271
@ TLS_FLAG_WAIT_ACK
Definition: tls.h:1028
@ TLS_ALERT_UNRECOGNIZED_NAME
Definition: tls.h:1135
@ TLS_EXT_COOKIE
Definition: tls.h:1357
error_t tlsSaveSessionState(const TlsContext *context, TlsSessionState *session)
Save TLS session.
Definition: tls.c:2749
@ TLS_STATE_CLIENT_CERTIFICATE_VERIFY
Definition: tls.h:1511
@ TLS_SIGN_SCHEME_ECDSA_BP512R1_TLS13_SHA512
Definition: tls.h:1289
@ TLS_TYPE_CERTIFICATE_VERIFY
Definition: tls.h:1076
@ TLS_STATE_SERVER_CHANGE_CIPHER_SPEC
Definition: tls.h:1516
EcdhContext ecdhContext
ECDH context.
Definition: tls.h:2393
const TlsRenegoInfo * renegoInfo
RenegotiationInfo extension.
Definition: tls.h:2169
@ TLS_EXT_CLIENT_CERTIFICATE_URL
Definition: tls.h:1321
@ TLS_ALERT_MISSING_EXTENSION
Definition: tls.h:1132
#define TLS_MAX_CERTIFICATES
Definition: tls.h:262
DsaPublicKey peerDsaPublicKey
Peer's DSA public key.
Definition: tls.h:2406
size_t recordSizeLimit
Maximum size of record in octets.
Definition: tls.h:2215
TlsSignSchemeList
Definition: tls.h:1577
uint8_t recordIvLen
Definition: tls.h:2065
@ TLS_SIGN_ALGO_ED25519
Definition: tls.h:1259
typedef __packed_struct
Sequence number.
Definition: tls.h:1542
MD5 algorithm context.
Definition: md5.h:62
DSA (Digital Signature Algorithm)
@ TLS_TRANSPORT_PROTOCOL_EAP
Definition: tls.h:980
@ TLS_GROUP_SECT283R1
Definition: tls.h:1414
uint_t numCipherSuites
Number of cipher suites in the list.
Definition: tls.h:2247
TlsProtocolName
Definition: tls.h:1667
@ TLS_STATE_SERVER_HELLO_3
Definition: tls.h:1501
@ TLS_HASH_ALGO_SHA256
Definition: tls.h:1241
TlsExtensionType
TLS extension types.
Definition: tls.h:1318
uint_t numSupportedSignAlgos
Number of signature algorithms in the list.
Definition: tls.h:2347
@ TLS_ALERT_USER_CANCELED
Definition: tls.h:1130
@ TLS_CERT_ED448_SIGN
Definition: tls.h:1227
systime_t ticketTimestamp
Timestamp to manage ticket lifetime.
Definition: tls.h:2281
@ TLS_EXT_CERTIFICATE_AUTHORITIES
Definition: tls.h:1359
@ TLS_STATE_END_OF_EARLY_DATA
Definition: tls.h:1519
@ TLS_FLAG_NO_DELAY
Definition: tls.h:1029
const uint16_t * supportedSignAlgos
List of supported signature algorithms.
Definition: tls.h:2346
error_t tlsSetEcdhCallback(TlsContext *context, TlsEcdhCallback ecdhCallback)
Register ECDH key agreement callback function.
Definition: tls.c:759
bool_t pskKeModeSupported
PSK key establishment supported by the client.
Definition: tls.h:2359
@ TLS_EXT_TICKET_REQUEST
Definition: tls.h:1369
@ TLS_EC_CURVE_TYPE_EXPLICIT_CHAR2
Definition: tls.h:1482
@ TLS_CERT_RSA_SIGN
Definition: tls.h:1212
@ TLS_EC_POINT_FORMAT_UNCOMPRESSED
Definition: tls.h:1469
@ TLS_EXT_DNSSEC_CHAIN
Definition: tls.h:1370
@ TLS_KEY_EXCH_SRP_SHA
Definition: tls.h:1177
error_t tlsSetTicketCallbacks(TlsContext *context, TlsTicketEncryptCallback ticketEncryptCallback, TlsTicketDecryptCallback ticketDecryptCallback, void *param)
Set ticket encryption/decryption callbacks.
Definition: tls.c:1484
@ TLS_GROUP_SECT409R1
Definition: tls.h:1416
@ TLS_FLAG_BREAK_CRLF
Definition: tls.h:1027
@ TLS_SIGN_SCHEME_GOSTR34102012_512C
Definition: tls.h:1299
@ TLS_GROUP_BRAINPOOLP512R1
Definition: tls.h:1432
TlsSocketReceiveCallback socketReceiveCallback
Socket receive callback function.
Definition: tls.h:2241
@ TLS_GROUP_FFDHE2048
Definition: tls.h:1446
error_t tlsWrite(TlsContext *context, const void *data, size_t length, size_t *written, uint_t flags)
Send application data to the remote host using TLS.
Definition: tls.c:1970
@ TLS_STATE_CLIENT_APP_TRAFFIC_KEYS
Definition: tls.h:1515
bool_t sessionTicketEnabled
Session ticket mechanism enabled.
Definition: tls.h:2461
const TlsExtension * extendedMasterSecret
ExtendedMasterSecret extension.
Definition: tls.h:2163
@ TLS_CLIENT_AUTH_NONE
Definition: tls.h:1001
@ TLS_TYPE_HELLO_VERIFY_REQUEST
Definition: tls.h:1065
@ TLS_GROUP_SECP160K1
Definition: tls.h:1419
@ TLS_TYPE_CLIENT_KEY_EXCHANGE
Definition: tls.h:1077
@ TLS_KEY_EXCH_DHE_PSK
Definition: tls.h:1175
uint_t keyUpdateCount
Count of consecutive KeyUpdate messages.
Definition: tls.h:2495
@ TLS_STATE_NEW_SESSION_TICKET
Definition: tls.h:1521
bool_t resume
The connection is established by resuming a session.
Definition: tls.h:2294
uint32_t ticketAgeAdd
Random value used to obscure the age of the ticket.
Definition: tls.h:2091
CipherMode
Cipher operation modes.
Definition: crypto.h:997
@ TLS_CERT_SM2_SIGN
Definition: tls.h:1225
@ TLS_FLAG_DELAY
Definition: tls.h:1030
TlsCompressMethods
Definition: tls.h:1566
systime_t ticketTimestamp
Timestamp to manage ticket lifetime.
Definition: tls.h:1923
@ TLS_EXT_TRANSPARENCY_INFO
Definition: tls.h:1364
@ TLS_EXT_STATUS_REQUEST_V2
Definition: tls.h:1336
size_t txBufferMaxLen
Maximum number of plaintext data the TX buffer can hold.
Definition: tls.h:2302
@ TLS_GROUP_MLKEM512
Definition: tls.h:1452
TlsMaxFragmentLength
Maximum fragment length.
Definition: tls.h:1390
@ TLS_STATE_CLIENT_CHANGE_CIPHER_SPEC
Definition: tls.h:1512
error_t(* TlsCertVerifyCallback)(TlsContext *context, const X509CertInfo *certInfo, uint_t pathLen, void *param)
Certificate verification callback function.
Definition: tls.h:1989
@ TLS_ALERT_TOO_MANY_CIDS_REQUESTED
Definition: tls.h:1124
TlsCertList
Definition: tls.h:1588
@ TLS_EXT_EC_POINT_FORMATS
Definition: tls.h:1330
TlsCompressMethod
Compression methods.
Definition: tls.h:1149
void * ticketParam
Opaque pointer passed to the ticket callbacks.
Definition: tls.h:2466
@ TLS_EXT_TLS_CERT_WITH_EXTERN_PSK
Definition: tls.h:1351
@ TLS_SIGN_ALGO_GOSTR34102012_512
Definition: tls.h:1262
@ TLS_GROUP_SECP521R1
Definition: tls.h:1429
@ TLS_GROUP_SECP192R1
Definition: tls.h:1423
@ TLS_CERT_GOST_SIGN512
Definition: tls.h:1223
@ TLS_EXT_ALPN
Definition: tls.h:1335
@ TLS_GROUP_FFDHE3072
Definition: tls.h:1447
@ TLS_ALERT_PROTOCOL_VERSION
Definition: tls.h:1126
Hello extensions.
Definition: tls.h:2136
Tls13KeyShareList
Definition: tls13_misc.h:220
@ TLS_GROUP_SECP160R1
Definition: tls.h:1420
@ TLS_ALERT_DECRYPTION_FAILED
Definition: tls.h:1109
TlsCertificateType
Certificate types.
Definition: tls.h:1210
TlsCertDesc * cert
Pointer to the currently selected certificate.
Definition: tls.h:2265
size_t encKeyLen
Length of the encryption key.
Definition: tls.h:2196
TlsEncryptionEngine encryptionEngine
Encryption engine.
Definition: tls.h:2327
#define TLS_MASTER_SECRET_SIZE
Definition: tls.h:815
size_t privateKeyLen
Length of the private key.
Definition: tls.h:2123
@ TLS_GROUP_BRAINPOOLP384R1_TLS13
Definition: tls.h:1436
@ TLS_HASH_ALGO_MD5
Definition: tls.h:1238
Certificate descriptor.
Definition: tls.h:2119
uint8_t secret[TLS_MASTER_SECRET_SIZE]
Master secret.
Definition: tls.h:1922
uint_t size
Maximum number of entries.
Definition: tls.h:2109
@ TLS_SIGN_SCHEME_GOSTR34102012_256C
Definition: tls.h:1295
TlsHashAlgo pskHashAlgo
Hash algorithm associated with the PSK.
Definition: tls.h:2424
uint8_t random[32]
Definition: tls.h:1809
@ TLS_STATE_HANDSHAKE_TRAFFIC_KEYS
Definition: tls.h:1502
@ TLS_KEY_EXCH_RSA_PSK
Definition: tls.h:1174
@ TLS_FLAG_BREAK_CHAR
Definition: tls.h:1026
Mutex object.
@ TLS_EXT_USER_MAPPING
Definition: tls.h:1325
Sha1Context * transcriptSha1Context
SHA-1 context used to compute verify data.
Definition: tls.h:2342
char_t * serverName
ServerName extension.
Definition: tls.h:2097
error_t tlsSetConnectionEnd(TlsContext *context, TlsConnectionEnd entity)
Set operation mode (client or server)
Definition: tls.c:357
uint32_t systime_t
System time.
@ TLS_CLIENT_AUTH_OPTIONAL
Definition: tls.h:1002
error_t tlsSetMaxEarlyDataSize(TlsContext *context, size_t maxEarlyDataSize)
Send the maximum amount of 0-RTT data the server can accept.
Definition: tls.c:1638
EC public key.
Definition: ec.h:421
size_t ticketPskLen
Length of the PSK associated with the ticket.
Definition: tls.h:2373
TlsRecord
Definition: tls.h:1780
@ TLS_TYPE_SERVER_KEY_EXCHANGE
Definition: tls.h:1073
@ TLS_GROUP_GC512C
Definition: tls.h:1444
DtlsCookieGenerateCallback cookieGenerateCallback
Cookie generation callback function.
Definition: tls.h:2503
TlsPskCallback pskCallback
PSK callback function.
Definition: tls.h:2422
@ TLS_EC_CURVE_TYPE_NAMED_CURVE
Definition: tls.h:1483
uint8_t flags
Definition: tcp.h:358
@ TLS_TYPE_NONE
Definition: tls.h:1045
uint32_t maxEarlyDataSize
Maximum amount of 0-RTT data that the client is allowed to send.
Definition: tls.h:2094
const TlsExtension * selectedIdentity
PreSharedKey extension (ServerHello)
Definition: tls.h:2180
@ TLS_TYPE_EKT_KEY
Definition: tls.h:1084
uint16_t namedGroup
ECDHE or FFDHE named group.
Definition: tls.h:2288
error_t(* TlsEcdsaSignCallback)(TlsContext *context, const uint8_t *digest, size_t digestLen, EcdsaSignature *signature)
ECDSA signature generation callback function.
Definition: tls.h:2030
const uint16_t * cipherSuites
List of supported cipher suites.
Definition: tls.h:2246
char char_t
Definition: compiler_port.h:55
uint16_t ticketCipherSuite
Cipher suite associated with the ticket.
Definition: tls.h:2376
uint16_t txMsgSeq
Send sequence number.
Definition: tls.h:2511
@ TLS_GROUP_SECP224R1
Definition: tls.h:1425
uint8_t iv[16]
Initialization vector.
Definition: tls.h:2197
GCM context.
Definition: gcm.h:64
uint8_t ticket[]
Definition: tls.h:1882
@ TLS_KEY_EXCH_NONE
Definition: tls.h:1161
TlsNameType
Name type.
Definition: tls.h:1380
const TlsExtension * clientCertType
Definition: tls.h:2155
@ TLS13_KEY_EXCH_PSK_ECDHE
Definition: tls.h:1186
@ TLS_STATE_CLIENT_HELLO_2
Definition: tls.h:1495
@ TLS_ALERT_BAD_CERTIFICATE
Definition: tls.h:1114
bool_t replayDetectionEnabled
Anti-replay mechanism enabled.
Definition: tls.h:2524
const HashAlgo * hashAlgo
Definition: tls.h:2060
TlsContentType
Content type.
Definition: tls.h:1044
@ TLS_STATE_CLOSING
Definition: tls.h:1524
@ TLS_STATE_SERVER_CERTIFICATE_VERIFY
Definition: tls.h:1506
size_t rxBufferLen
Number of bytes available for reading.
Definition: tls.h:2313
@ TLS_EXT_EXTERNAL_SESSION_ID
Definition: tls.h:1367
@ TLS_ALERT_INAPPROPRIATE_FALLBACK
Definition: tls.h:1129
uint8_t msgType
@ TLS_EARLY_DATA_ACCEPTED
Definition: tls.h:1014
error_t tlsSetRpkVerifyCallback(TlsContext *context, TlsRpkVerifyCallback rpkVerifyCallback)
Register the raw public key verification callback function.
Definition: tls.c:1179
uint8_t macKey[48]
MAC key.
Definition: tls.h:2193
TlsServerHello
Definition: tls.h:1825
void TlsClientKeyExchange
ClientKeyExchange message.
Definition: tls.h:1864
@ TLS_STATE_SERVER_CERTIFICATE
Definition: tls.h:1504
TlsEcCurveType
EC curve types.
Definition: tls.h:1480
TlsPlaintextSessionState
Definition: tls.h:1928
@ TLS_CLIENT_AUTH_REQUIRED
Definition: tls.h:1003
@ TLS_EXT_PADDING
Definition: tls.h:1340
@ TLS_ALERT_LEVEL_FATAL
Definition: tls.h:1096
TLS session state.
Definition: tls.h:2076
error_t tlsInitSessionState(TlsSessionState *session)
Initialize session state.
Definition: tls.c:2728
size_t rxFragQueueLen
Length of the reassembly queue.
Definition: tls.h:2515
@ TLS_GROUP_MLKEM1024
Definition: tls.h:1454
@ TLS_GROUP_SECT193R2
Definition: tls.h:1409
uint16_t versionMax
Maximum version accepted by the implementation.
Definition: tls.h:2274
const TlsSignSchemeList * certSignAlgoList
SignatureAlgorithmsCert extension.
Definition: tls.h:2143
uint32_t replayWindow[(DTLS_REPLAY_WINDOW_SIZE+31)/32]
Definition: tls.h:2525
@ TLS_STATE_CLIENT_KEY_EXCHANGE
Definition: tls.h:1510
const CipherAlgo * cipherAlgo
Cipher algorithm.
Definition: tls.h:2201
uint8_t verifyDataLen
Definition: tls.h:2067
error_t tlsSetCipherSuites(TlsContext *context, const uint16_t *cipherSuites, uint_t length)
Specify the list of allowed cipher suites.
Definition: tls.c:613
TlsTransportProtocol
TLS transport protocols.
Definition: tls.h:977
error_t(* DtlsCookieVerifyCallback)(TlsContext *context, const DtlsClientParameters *clientParams, const uint8_t *cookie, size_t length, void *param)
DTLS cookie verification callback function.
Definition: dtls_misc.h:249
@ TLS_SIGN_SCHEME_SM2SIG_SM3
Definition: tls.h:1290
@ TLS_TYPE_FINISHED
Definition: tls.h:1078
void TlsHelloRequest
HelloRequest message.
Definition: tls.h:1799
@ TLS_GROUP_SECT193R1
Definition: tls.h:1408
@ TLS_SIGN_SCHEME_RSA_PKCS1_SHA512
Definition: tls.h:1276
bool_t serverCertTypeExtReceived
The ServerCertType extension has been received.
Definition: tls.h:2457
@ TLS_STATE_CLIENT_CERTIFICATE
Definition: tls.h:1509
@ TLS_SIGN_SCHEME_ECDSA_BP384R1_TLS13_SHA384
Definition: tls.h:1288
TlsCertVerifyCallback certVerifyCallback
Certificate verification callback function.
Definition: tls.h:2263
void * certVerifyParam
Opaque pointer passed to the certificate verification callback.
Definition: tls.h:2264
@ TLS_SIGN_SCHEME_ED448
Definition: tls.h:1292
error_t tlsWriteEarlyData(TlsContext *context, const void *data, size_t length, size_t *written, uint_t flags)
Send early data to the remote TLS server.
Definition: tls.c:1667
@ TLS_STATE_CLIENT_CHANGE_CIPHER_SPEC_2
Definition: tls.h:1513
@ TLS13_KEY_EXCH_HYBRID
Definition: tls.h:1183
TlsHashAlgo ticketHashAlgo
Hash algorithm associated with the ticket.
Definition: tls.h:2092
uint_t alertCount
Count of consecutive warning alerts.
Definition: tls.h:2483
error_t tlsSetDhParameters(TlsContext *context, const char_t *params, size_t length)
Import Diffie-Hellman parameters.
Definition: tls.c:731
@ TLS_ALERT_CERTIFICATE_EXPIRED
Definition: tls.h:1117
@ TLS_STATE_ENCRYPTED_EXTENSIONS
Definition: tls.h:1503
@ TLS_EXT_SERVER_CERT_TYPE
Definition: tls.h:1339
@ TLS_KEY_EXCH_PSK
Definition: tls.h:1173
@ TLS_STATE_INIT
Definition: tls.h:1493
@ TLS_SIGN_SCHEME_MLDSA44_RSA_PSS_PSS_SHA256
Definition: tls.h:1307
uint8_t * certRequestContext
Certificate request context.
Definition: tls.h:2356
@ TLS_EXT_PASSWORD_SALT
Definition: tls.h:1349
@ TLS_KEY_EXCH_ECDHE_PSK
Definition: tls.h:1176
@ TLS_SIGN_SCHEME_RSA_PKCS1_SHA384
Definition: tls.h:1275
@ TLS_NAME_TYPE_HOSTNAME
Definition: tls.h:1381
TlsSocketSendCallback socketSendCallback
Socket send callback function.
Definition: tls.h:2240
@ TLS_ALERT_NO_APPLICATION_PROTOCOL
Definition: tls.h:1140
const PrngAlgo * prngAlgo
Pseudo-random number generator to be used.
Definition: tls.h:2243
@ TLS_CERT_RSA_FIXED_ECDH
Definition: tls.h:1220
TlsClientHello
Definition: tls.h:1812
#define TLS_MAX_HKDF_DIGEST_SIZE
Definition: tls.h:943
@ TLS_TYPE_HEARTBEAT
Definition: tls.h:1050
@ TLS_SIGN_SCHEME_ECDSA_SECP384R1_SHA384
Definition: tls.h:1285
systime_t clientHelloTimestamp
Time at which the ClientHello message was sent.
Definition: tls.h:2354
TlsSignatureAlgo
Signature algorithms.
Definition: tls.h:1254
uint8_t serverRandom[TLS_RANDOM_SIZE]
Server random value.
Definition: tls.h:2319
size_t certRequestContextLen
Length of the certificate request context.
Definition: tls.h:2357
Tls13PskKeModeList
Definition: tls13_misc.h:231
@ TLS_EXT_SRP
Definition: tls.h:1331
error_t tlsSetEcdsaVerifyCallback(TlsContext *context, TlsEcdsaVerifyCallback ecdsaVerifyCallback)
Register ECDSA signature verification callback function.
Definition: tls.c:812
@ TLS_CONNECTION_END_CLIENT
Definition: tls.h:990
char_t * pskIdentityHint
PSK identity hint.
Definition: tls.h:2421
TlsCipherSuiteInfo cipherSuite
Negotiated cipher suite.
Definition: tls.h:2285
bool_t tlsIsRxReady(TlsContext *context)
Check whether some data is available in the receive buffer.
Definition: tls.c:2378
uint8_t clientAppTrafficSecret[TLS_MAX_HKDF_DIGEST_SIZE]
Definition: tls.h:2365
@ TLS_MAX_FRAGMENT_LENGTH_1024
Definition: tls.h:1392
TlsAlertLevel
Alert level.
Definition: tls.h:1094
@ TLS_EXT_CACHED_INFO
Definition: tls.h:1344
uint_t changeCipherSpecCount
Count of consecutive ChangeCipherSpec messages.
Definition: tls.h:2491
Common interface for encryption algorithms.
Definition: crypto.h:1104
@ TLS_TYPE_CERTIFICATE_REQUEST
Definition: tls.h:1074
uint8_t encKeyLen
Definition: tls.h:2063
@ TLS_EXT_PRE_SHARED_KEY
Definition: tls.h:1354
@ TLS_EC_POINT_FORMAT_ANSI_X962_COMPRESSED_PRIME
Definition: tls.h:1470
void tlsFree(TlsContext *context)
Release TLS context.
Definition: tls.c:2585
@ TLS_GROUP_SECT571R1
Definition: tls.h:1418
error_t tlsRead(TlsContext *context, void *data, size_t size, size_t *received, uint_t flags)
Receive application data from a the remote host using TLS.
Definition: tls.c:2105
DtlsSequenceNumber
Definition: dtls_misc.h:143
@ TLS_GROUP_FFDHE_MAX
Definition: tls.h:1451
TlsCache * cache
TLS session cache.
Definition: tls.h:2267
TlsState state
TLS handshake finite state machine.
Definition: tls.h:2233
TlsContentType rxBufferType
Type of data that resides in the RX buffer.
Definition: tls.h:2312
char_t * serverName
Fully qualified DNS hostname of the server.
Definition: tls.h:2252
@ TLS_SIGN_ALGO_RSA
Definition: tls.h:1256
size_t rxRecordPos
Current position in the TLS record.
Definition: tls.h:2316
char_t hostname[]
Definition: tls.h:1644
@ TLS_TYPE_TLS12_CID
Definition: tls.h:1051
error_t tlsSetPskIdentity(TlsContext *context, const char_t *pskIdentity)
Set the PSK identity to be used by the client.
Definition: tls.c:1055
uint16_t version
TLS protocol version.
Definition: tls.h:2077
@ TLS_TYPE_SUPPLEMENTAL_DATA
Definition: tls.h:1081
bool_t sessionTicketExtSent
The SessionTicket extension has been sent.
Definition: tls.h:2463
SHA-1 algorithm context.
Definition: sha1.h:62
bool_t etmExtReceived
The EncryptThenMac extension has been received.
Definition: tls.h:2445
@ TLS_CERT_ECDSA_SIGN
Definition: tls.h:1219
@ TLS_ALERT_BAD_CERTIFICATE_STATUS_RESPONSE
Definition: tls.h:1136
const TlsExtension * recordSizeLimit
RecordSizeLimit extension.
Definition: tls.h:2148
@ TLS_GROUP_X25519
Definition: tls.h:1433
systime_t startTime
Definition: tls.h:2501
@ TLS_KEY_EXCH_DHE_DSS
Definition: tls.h:1166
bool_t clientCertRequested
This flag tells whether the client certificate is requested.
Definition: tls.h:2292
@ TLS_TRANSPORT_PROTOCOL_STREAM
Definition: tls.h:978
uint16_t version
Negotiated TLS version.
Definition: tls.h:2192
@ TLS_SIGN_SCHEME_GOSTR34102012_256D
Definition: tls.h:1296
uint_t newSessionTicketCount
Number of NewSessionTicket messages that have been sent.
Definition: tls.h:2370
EddsaPublicKey peerEddsaPublicKey
Peer's EdDSA public key.
Definition: tls.h:2414
error_t tlsSetTransportProtocol(TlsContext *context, TlsTransportProtocol transportProtocol)
Set the transport protocol to be used.
Definition: tls.c:327
TlsEcdhCallback ecdhCallback
Definition: tls.h:2255
bool_t earlyDataEnabled
EarlyData is enabled.
Definition: tls.h:2382
const char_t * certChain
End entity certificate chain (PEM format)
Definition: tls.h:2120
bool_t recordSizeLimitExtReceived
The RecordSizeLimit extension has been received.
Definition: tls.h:2434
RsaPublicKey peerRsaPublicKey
Peer's RSA public key.
Definition: tls.h:2402
bool_t unknownProtocolsAllowed
Unknown ALPN protocols allowed.
Definition: tls.h:2438
@ TLS_EXT_SIGNATURE_ALGORITHMS
Definition: tls.h:1332
uint32_t ticketLifetime
Lifetime of the ticket.
Definition: tls.h:2090
Common interface for hash algorithms.
Definition: crypto.h:1082
@ TLS_CERT_NONE
Definition: tls.h:1211
char_t * selectedProtocol
Selected ALPN protocol.
Definition: tls.h:2440
error_t(* TlsPskCallback)(TlsContext *context, const uint8_t *pskIdentity, size_t pskIdentityLen)
Pre-shared key callback function.
Definition: tls.h:1981
const TlsServerNameList * serverNameList
ServerName extension.
Definition: tls.h:2139
TlsEarlyDataStatus tlsGetEarlyDataStatus(TlsContext *context)
Check whether the server has accepted or rejected the early data.
Definition: tls.c:1778
@ TLS_GROUP_GC256A
Definition: tls.h:1438
size_t trustedCaListLen
Total length of the trusted CA list.
Definition: tls.h:2262
systime_t retransmitTimestamp
Time at which the datagram was sent.
Definition: tls.h:2508
const TlsExtension * selectedVersion
SupportedVersions extension (ServerHello)
Definition: tls.h:2138
@ TLS_EXT_POST_HANDSHAKE_AUTH
Definition: tls.h:1361
TlsSequenceNumber seqNum
TLS sequence number.
Definition: tls.h:2209
error_t tlsLoadCertificate(TlsContext *context, uint_t index, const char_t *certChain, size_t certChainLen, const char_t *privateKey, size_t privateKeyLen, const char_t *password)
Load entity's certificate.
Definition: tls.c:1242
uint8_t clientEarlyTrafficSecret[TLS_MAX_HKDF_DIGEST_SIZE]
Definition: tls.h:2362
@ TLS_SIGN_SCHEME_ECDSA_SECP256R1_SHA256
Definition: tls.h:1284
@ TLS_STATE_SERVER_CHANGE_CIPHER_SPEC_2
Definition: tls.h:1517
@ TLS_GROUP_SECT233R1
Definition: tls.h:1411
void * cipherContext
Cipher context.
Definition: tls.h:2202
@ TLS_TYPE_NEW_SESSION_TICKET
Definition: tls.h:1066
TlsEcdsaSignCallback ecdsaSignCallback
Definition: tls.h:2256
@ TLS_SIGN_SCHEME_MLDSA87_ECDSA_SECP384R1_SHA384
Definition: tls.h:1302
TlsNamedGroup
Named groups.
Definition: tls.h:1403
@ TLS_TYPE_HELLO_REQUEST
Definition: tls.h:1062
bool_t earlyDataRejected
The 0-RTT data have been rejected by the server.
Definition: tls.h:2383
uint16_t ticketLen
Definition: tls.h:1881
const char_t * privateKey
Private key (PEM format)
Definition: tls.h:2122
TlsSignatureScheme
Signature schemes.
Definition: tls.h:1271
error_t tlsSetPskIdentityHint(TlsContext *context, const char_t *pskIdentityHint)
Set the PSK identity hint to be used by the server.
Definition: tls.c:1104
@ TLS_EXT_STATUS_REQUEST
Definition: tls.h:1324
void(* TlsKeyLogCallback)(TlsContext *context, const char_t *key)
Key logging callback function (for debugging purpose only)
Definition: tls.h:2046
size_t macKeyLen
Length of the MAC key.
Definition: tls.h:2194
Tls13PskIdentityList
Definition: tls13_misc.h:253
@ TLS_TYPE_HELLO_RETRY_REQUEST
Definition: tls.h:1068
bool_t updatedClientHelloReceived
An updated ClientHello message has been received.
Definition: tls.h:2355
bool_t tlsIsTxReady(TlsContext *context)
Check whether some data is ready for transmission.
Definition: tls.c:2344
unsigned int uint_t
Definition: compiler_port.h:57
GcmContext * gcmContext
GCM context.
Definition: tls.h:2207
error_t tlsSetPreferredGroup(TlsContext *context, uint16_t group)
Specify the preferred ECDHE or FFDHE group.
Definition: tls.c:669
TlsFlags
Flags used by read and write functions.
Definition: tls.h:1023
@ TLS_GROUP_SECT163R1
Definition: tls.h:1406
@ TLS_ALERT_CERTIFICATE_REVOKED
Definition: tls.h:1116
error_t tlsEnableSecureRenegotiation(TlsContext *context, bool_t enabled)
Enable secure renegotiation.
Definition: tls.c:1430
size_t txBufferLen
Number of bytes that are pending to be sent.
Definition: tls.h:2304
@ TLS_GROUP_MLKEM768
Definition: tls.h:1453
TlsSupportedGroupList
Definition: tls.h:1689
uint_t retransmitCount
Retransmission counter.
Definition: tls.h:2507
uint16_t rxRecordVersion
Version of the incoming record.
Definition: tls.h:2518
@ TLS_STATE_SERVER_HELLO_DONE
Definition: tls.h:1508
size_t recordIvLen
Length of the IV.
Definition: tls.h:2199
@ TLS_STATE_SERVER_HELLO_2
Definition: tls.h:1500
@ TLS_EXT_USE_SRTP
Definition: tls.h:1333
@ TLS_ALERT_HANDSHAKE_FAILURE
Definition: tls.h:1112
@ TLS_STATE_CLIENT_FINISHED
Definition: tls.h:1514
int_t selectedIdentity
Selected PSK identity.
Definition: tls.h:2358
uint8_t macKeyLen
Definition: tls.h:2062
@ TLS_CERT_DSS_FIXED_DH
Definition: tls.h:1215
DtlsCookieVerifyCallback cookieVerifyCallback
Cookie verification callback function.
Definition: tls.h:2504
TlsSupportedVersionList
Definition: tls.h:1633
Legacy definitions.
@ TLS_ALERT_INTERNAL_ERROR
Definition: tls.h:1128
@ TLS_CERT_RSA_FIXED_DH
Definition: tls.h:1214
const uint16_t * supportedGroups
List of supported named groups.
Definition: tls.h:2249
error_t tlsEnableFallbackScsv(TlsContext *context, bool_t enabled)
Perform fallback retry (for clients only)
Definition: tls.c:1456
@ TLS_TYPE_KEY_UPDATE
Definition: tls.h:1082
@ TLS_SIGN_ALGO_ECDSA
Definition: tls.h:1258
const TlsExtension * encryptThenMac
EncryptThenMac extension.
Definition: tls.h:2160
TlsCertDesc certs[TLS_MAX_CERTIFICATES]
End entity certificates (PEM format)
Definition: tls.h:2260
error_t(* TlsTicketDecryptCallback)(TlsContext *context, const uint8_t *ciphertext, size_t ciphertextLen, uint8_t *plaintext, size_t *plaintextLen, void *param)
Ticket decryption callback function.
Definition: tls.h:2014
TlsNewSessionTicket
Definition: tls.h:1883
TlsSignatureScheme signScheme
Signature scheme to be used.
Definition: tls.h:2287
@ TLS_KEY_EXCH_DHE_RSA
Definition: tls.h:1164
error_t tlsEnableSessionTickets(TlsContext *context, bool_t enabled)
Enable session ticket mechanism.
Definition: tls.c:1404
#define TlsEncryptionEngine
Definition: tls.h:40
uint16_t pskCipherSuite
Cipher suite associated with the PSK.
Definition: tls.h:2423
bool_t extendedMasterSecret
Extended master secret computation.
Definition: tls.h:2084
@ TLS_SIGN_SCHEME_MLDSA65_ECDSA_SECP384R1_SHA384
Definition: tls.h:1301
error_t tlsSetTrustedCaList(TlsContext *context, const char_t *trustedCaList, size_t length)
Import a trusted CA list.
Definition: tls.c:1207
void TlsServerKeyExchange
ServerKeyExchange message.
Definition: tls.h:1839
bool_t earlyDataExtReceived
The EarlyData extension has been received.
Definition: tls.h:2384
const HashAlgo * prfHashAlgo
Definition: tls.h:2061
@ TLS_GROUP_FFDHE8192
Definition: tls.h:1450
TlsCertTypeList
Definition: tls.h:1711
uint8_t serverAppTrafficSecret[TLS_MAX_HKDF_DIGEST_SIZE]
Definition: tls.h:2366
const TlsSupportedGroupList * supportedGroupList
SupportedGroups extension.
Definition: tls.h:2140
TlsNamedGroup namedCurve
Named curve used to generate the EC public key.
Definition: tls.h:2127
ECDH context.
Definition: ecdh.h:60
systime_t timeout
Timeout for blocking calls.
Definition: tls.h:2500
TlsEcdsaVerifyCallback ecdsaVerifyCallback
Definition: tls.h:2257
const TlsExtension * serverCertType
Definition: tls.h:2157
TlsCertificateType peerCertType
Peer's certificate type.
Definition: tls.h:2290
@ TLS_EXT_RECORD_SIZE_LIMIT
Definition: tls.h:1346
HMAC (Keyed-Hashing for Message Authentication)
error_t tlsSetPskCallback(TlsContext *context, TlsPskCallback pskCallback)
Register PSK callback function.
Definition: tls.c:1153
bool_t sessionTicketExtReceived
The SessionTicket extension has been received.
Definition: tls.h:2462
@ TLS_KEY_EXCH_DH_RSA
Definition: tls.h:1163
@ TLS_CERT_FORMAT_X509
Definition: tls.h:1198
@ TLS_SIGN_SCHEME_GOSTR34102012_512A
Definition: tls.h:1297
TlsSequenceNumber
Definition: tls.h:1544
error_t tlsExportKeyingMaterial(TlsContext *context, const char_t *label, bool_t useContextValue, const uint8_t *contextValue, size_t contextValueLen, uint8_t *output, size_t outputLen)
Export keying material per RFC 5705 standard.
Definition: tls.c:1824
void * TlsSocketHandle
Socket handle.
Definition: tls.h:1943
TlsEarlyDataStatus
Early data status.
Definition: tls.h:1012
@ TLS_GROUP_BRAINPOOLP384R1
Definition: tls.h:1431
@ TLS_EXT_SIGNED_CERT_TIMESTAMP
Definition: tls.h:1337
char_t * ticketAlpn
ALPN protocol associated with the ticket.
Definition: tls.h:2093
@ TLS_MAX_FRAGMENT_LENGTH_512
Definition: tls.h:1391
error_t tlsSetKeyLogCallback(TlsContext *context, TlsKeyLogCallback keyLogCallback)
Register key logging callback function (for debugging purpose only)
Definition: tls.c:839
@ TLS_ALERT_CERTIFICATE_UNKNOWN
Definition: tls.h:1118
bool_t emsExtReceived
The ExtendedMasterSecret extension has been received.
Definition: tls.h:2449
void TlsCertificate
Certificate message.
Definition: tls.h:1832
@ TLS_EC_POINT_FORMAT_ANSI_X962_COMPRESSED_CHAR2
Definition: tls.h:1471
const TlsCertAuthorities * certAuthorities
CertificateAuthorities extension.
Definition: tls.h:2173
@ TLS_GROUP_SECP384R1_MLKEM1024
Definition: tls.h:1457
uint8_t description
Definition: tls.h:1910
const Tls13PskIdentityList * identityList
PreSharedKey extension (ClientHello)
Definition: tls.h:2178
TLS context.
Definition: tls.h:2232
char_t * protocolList
List of supported ALPN protocols.
Definition: tls.h:2439
@ TLS_TYPE_CERTIFICATE_URL
Definition: tls.h:1079
void tlsFreeCache(TlsCache *cache)
Properly dispose a session cache.
Definition: tls_cache.c:319
uint8_t data[]
Definition: tls.h:1779
@ TLS_STATE_CLOSED
Definition: tls.h:1525