_pms_rsa[48];
696 #if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) 699 #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \ 700 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \ 701 defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \ 702 defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED) 705 #if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) 708 #if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED) 712 #if defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED) 715 #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) 719 #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) 720 unsigned char_pms_ecjpake[32];
724 #define MBEDTLS_PREMASTER_SIZE sizeof(union mbedtls_ssl_premaster_secret) 726 #define MBEDTLS_TLS1_3_MD_MAX_SIZE PSA_HASH_MAX_SIZE 730 #define MBEDTLS_SSL_SEQUENCE_NUMBER_LEN 8 735 #if defined(MBEDTLS_SSL_CONTEXT_SERIALIZATION) || \ 736 (defined(MBEDTLS_SSL_KEYING_MATERIAL_EXPORT) && defined(MBEDTLS_SSL_PROTO_TLS1_2)) 737 #define MBEDTLS_SSL_KEEP_RANDBYTES 785 #if defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_CLI_C) 790MBEDTLS_SSL_EARLY_DATA_STATUS_NOT_INDICATED,
791MBEDTLS_SSL_EARLY_DATA_STATUS_ACCEPTED,
792MBEDTLS_SSL_EARLY_DATA_STATUS_REJECTED,
793} mbedtls_ssl_early_data_status;
814 const unsigned char*
buf,
838 unsigned char*
buf,
864 unsigned char*
buf,
915 #if defined(MBEDTLS_X509_CRT_PARSE_C) 916 typedef structmbedtls_ssl_key_cert mbedtls_ssl_key_cert;
918 #if defined(MBEDTLS_SSL_PROTO_DTLS) 919 typedef structmbedtls_ssl_flight_item mbedtls_ssl_flight_item;
922 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS) 923 #define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_RESUMPTION \ 924 MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK 925 #define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_EPHEMERAL_RESUMPTION \ 926 MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL 927 #define MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA (1U << 3) 929 #define MBEDTLS_SSL_TLS1_3_TICKET_FLAGS_MASK \ 930 (MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_RESUMPTION | \ 931 MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_PSK_EPHEMERAL_RESUMPTION | \ 932 MBEDTLS_SSL_TLS1_3_TICKET_ALLOW_EARLY_DATA) 959 unsigned char const*session_id,
960 size_tsession_id_len,
981 unsigned char const*session_id,
982 size_tsession_id_len,
985 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE) 986 #if defined(MBEDTLS_X509_CRT_PARSE_C) 1061 const unsigned char*
hash,
1126 const unsigned char*
input,
1175 size_toutput_size);
1197 #if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) && \ 1198 !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE) 1199 #define MBEDTLS_SSL_PEER_CERT_DIGEST_MAX_LEN 48 1200 #if defined(MBEDTLS_MD_CAN_SHA256) 1201 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA256 1202 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 32 1203 #elif defined(MBEDTLS_MD_CAN_SHA384) 1204 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA384 1205 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 48 1206 #elif defined(MBEDTLS_MD_CAN_SHA1) 1207 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_TYPE MBEDTLS_MD_SHA1 1208 #define MBEDTLS_SSL_PEER_CERT_DIGEST_DFL_LEN 20 1211 #error "Bad configuration - need SHA-1, SHA-256 or SHA-512 enabled to compute digest of peer CRT." 1223 #if defined(MBEDTLS_SSL_DTLS_SRTP) 1225 #define MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH 255 1226 #define MBEDTLS_TLS_SRTP_MAX_PROFILE_LIST_LENGTH 4 1236 #define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80 ((uint16_t) 0x0001) 1237 #define MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32 ((uint16_t) 0x0002) 1238 #define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80 ((uint16_t) 0x0005) 1239 #define MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32 ((uint16_t) 0x0006) 1241 #define MBEDTLS_TLS_SRTP_UNSET ((uint16_t) 0x0000) 1243 typedef uint16_tmbedtls_ssl_srtp_profile;
1245 typedef structmbedtls_dtls_srtp_info_t {
1251 unsigned char MBEDTLS_PRIVATE(mki_value)[MBEDTLS_TLS_SRTP_MAX_MKI_LENGTH];
1253mbedtls_dtls_srtp_info;
1276 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH) 1281 #if defined(MBEDTLS_SSL_RECORD_SIZE_LIMIT) 1293 #if defined(MBEDTLS_HAVE_TIME) 1301 #if defined(MBEDTLS_X509_CRT_PARSE_C) 1302 #if defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE) 1314 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C) 1320 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C) && \ 1321 defined(MBEDTLS_HAVE_TIME) 1341 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) && defined(MBEDTLS_SSL_SESSION_TICKETS) 1345 unsigned char MBEDTLS_PRIVATE(resumption_key)[MBEDTLS_SSL_TLS1_3_TICKET_RESUMPTION_KEY_LEN];
1347 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION) && defined(MBEDTLS_SSL_CLI_C) 1351 #if defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_ALPN) && defined(MBEDTLS_SSL_SRV_C) 1356 #if defined(MBEDTLS_HAVE_TIME) && defined(MBEDTLS_SSL_CLI_C) 1362 #if defined(MBEDTLS_SSL_EARLY_DATA) 1366 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC) 1370 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) 1389 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) 1390MBEDTLS_SSL_KEY_EXPORT_TLS1_3_CLIENT_EARLY_SECRET,
1391MBEDTLS_SSL_KEY_EXPORT_TLS1_3_EARLY_EXPORTER_SECRET,
1392MBEDTLS_SSL_KEY_EXPORT_TLS1_3_CLIENT_HANDSHAKE_TRAFFIC_SECRET,
1393MBEDTLS_SSL_KEY_EXPORT_TLS1_3_SERVER_HANDSHAKE_TRAFFIC_SECRET,
1394MBEDTLS_SSL_KEY_EXPORT_TLS1_3_CLIENT_APPLICATION_TRAFFIC_SECRET,
1395MBEDTLS_SSL_KEY_EXPORT_TLS1_3_SERVER_APPLICATION_TRAFFIC_SECRET,
1416 const unsigned char*secret,
1418 const unsigned charclient_random[32],
1419 const unsigned charserver_random[32],
1422 #if defined(MBEDTLS_SSL_SRV_C) 1475 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH) 1479 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC) 1482 #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET) 1485 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY) 1488 #if defined(MBEDTLS_SSL_RENEGOTIATION) 1491 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \ 1492 defined(MBEDTLS_SSL_CLI_C) 1502 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \ 1503 defined(MBEDTLS_SSL_SRV_C) && \ 1504 defined(MBEDTLS_SSL_PROTO_TLS1_3) 1508 #if defined(MBEDTLS_SSL_SRV_C) 1515 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID) 1520 #if defined(MBEDTLS_SSL_DTLS_SRTP) 1532 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) 1551 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION) 1557 #if defined(MBEDTLS_X509_CRT_PARSE_C) 1563 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED) 1564 #if defined(MBEDTLS_SSL_SRV_C) 1571 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C) 1574 const unsigned char*, size_t);
1577 const unsigned char*, size_t);
1581 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C) 1584 unsigned char*,
const unsigned char*,
size_t*,
1590 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID) 1594 #if defined(MBEDTLS_X509_CRT_PARSE_C) 1599 #if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK) 1605 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE) 1606 #if defined(MBEDTLS_X509_CRT_PARSE_C) 1608mbedtls_ssl_async_decrypt_t *
MBEDTLS_PRIVATE(f_async_decrypt_start);
1615 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED) 1617 #if !defined(MBEDTLS_DEPRECATED_REMOVED) 1623 #if defined(MBEDTLS_ECP_C) && !defined(MBEDTLS_DEPRECATED_REMOVED) 1629 #if defined(MBEDTLS_DHM_C) 1634 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED) 1636 #if defined(MBEDTLS_USE_PSA_CRYPTO) 1667 #if defined(MBEDTLS_SSL_EARLY_DATA) 1672 #if defined(MBEDTLS_SSL_SRV_C) 1679 #if defined(MBEDTLS_SSL_ALPN) 1683 #if defined(MBEDTLS_SSL_DTLS_SRTP) 1685 constmbedtls_ssl_srtp_profile *
MBEDTLS_PRIVATE(dtls_srtp_profile_list);
1696 #if defined(MBEDTLS_SSL_PROTO_DTLS) 1703 #if defined(MBEDTLS_SSL_RENEGOTIATION) 1711 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C) 1722 #if defined(MBEDTLS_SSL_SRV_C) 1726 #if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED) 1738 #if defined(MBEDTLS_SSL_RENEGOTIATION) 1763 #if defined(MBEDTLS_SSL_EARLY_DATA) && defined(MBEDTLS_SSL_CLI_C) 1782 #if defined(MBEDTLS_X509_CRT_PARSE_C) 1818 #if defined(MBEDTLS_SSL_PROTO_TLS1_2) 1824 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) 1846 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID) 1858 #if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH) 1861 #if defined(MBEDTLS_SSL_PROTO_DTLS) 1866 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY) 1891 #if defined(MBEDTLS_SSL_PROTO_DTLS) 1896 #if defined(MBEDTLS_SSL_EARLY_DATA) 1897 #if defined(MBEDTLS_SSL_SRV_C) 1915 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID) 1926 #if defined(MBEDTLS_SSL_VARIABLE_BUFFER_LENGTH) 1932 #if defined(MBEDTLS_SSL_PROTO_DTLS) 1939 #if defined(MBEDTLS_X509_CRT_PARSE_C) 1971 #if defined(MBEDTLS_SSL_ALPN) 1975 #if defined(MBEDTLS_SSL_DTLS_SRTP) 1985 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C) 1996 #if defined(MBEDTLS_SSL_RENEGOTIATION) 2002 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID) 2173 #if defined(MBEDTLS_SSL_EARLY_DATA) 2201 intearly_data_enabled);
2203 #if defined(MBEDTLS_SSL_SRV_C) 2228 voidmbedtls_ssl_conf_max_early_data_size(
2234 #if defined(MBEDTLS_X509_CRT_PARSE_C) 2285 void(*f_dbg)(
void*,
int,
const char*,
int,
const char*),
2340 #if defined(MBEDTLS_SSL_PROTO_DTLS) 2342 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID) 2431 unsigned char const*own_cid,
2432 size_town_cid_len);
2466 size_t*own_cid_len);
2508 size_t*peer_cid_len);
2554 #if defined(MBEDTLS_X509_CRT_PARSE_C) 2641 unsigned char*
buf,
2669 #if defined(MBEDTLS_SSL_SRV_C) 2681mbedtls_ssl_hs_cb_t f_cert_cb)
2708 unsigned char*start,
2709 const unsigned char*end,
2738 unsigned char*
buf,
2741 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C) 2761 #if defined(MBEDTLS_HAVE_TIME) 2775 static inline intmbedtls_ssl_session_get_ticket_creation_time(
2778 if(session ==
NULL|| ticket_creation_time ==
NULL||
2783*ticket_creation_time = session->
MBEDTLS_PRIVATE(ticket_creation_time);
2847 void*p_export_keys);
2975 #if defined(MBEDTLS_SSL_ASYNC_PRIVATE) 3007mbedtls_ssl_async_sign_t *f_async_sign,
3008mbedtls_ssl_async_decrypt_t *f_async_decrypt,
3009mbedtls_ssl_async_resume_t *f_async_resume,
3010mbedtls_ssl_async_cancel_t *f_async_cancel,
3069 unsigned char**p,
unsigned char*end,
3070 const unsigned char*
info,
size_tilen);
3086 const unsigned char*cookie,
size_tclen,
3087 const unsigned char*
info,
size_tilen);
3089 #if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C) 3143 const unsigned char*
info,
3148 #if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY) 3192 #if defined(MBEDTLS_SSL_PROTO_DTLS) 3223 unsignedallow_packing);
3259 #if defined(MBEDTLS_SSL_SRV_C) 3303 #if defined(MBEDTLS_SSL_CLI_C) 3386 const unsigned char*
buf,
3423 unsigned char*
buf,
3469 const int*ciphersuites);
3471 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) 3515 const intkex_modes);
3518 #if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID) 3519 #define MBEDTLS_SSL_UNEXPECTED_CID_IGNORE 0 3520 #define MBEDTLS_SSL_UNEXPECTED_CID_FAIL 1 3554 intignore_other_cids);
3557 #if defined(MBEDTLS_X509_CRT_PARSE_C) 3586 #if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED) 3606 #if defined(MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK) 3659mbedtls_x509_crt_ca_cb_t f_ca_cb,
3704 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED) 3738 const unsigned char*psk,
size_tpsk_len,
3739 const unsigned char*psk_identity,
size_tpsk_identity_len);
3741 #if defined(MBEDTLS_USE_PSA_CRYPTO) 3781 const unsigned char*psk_identity,
3782 size_tpsk_identity_len);
3802 const unsigned char*psk,
size_tpsk_len);
3804 #if defined(MBEDTLS_USE_PSA_CRYPTO) 3829 #if defined(MBEDTLS_SSL_SRV_C) 3875 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_SRV_C) 3890 const unsigned char*dhm_P,
size_tP_len,
3891 const unsigned char*dhm_G,
size_tG_len);
3905 #if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C) 3915 unsigned intbitlen);
3918 #if defined(MBEDTLS_ECP_C) 3919 #if !defined(MBEDTLS_DEPRECATED_REMOVED) 4006 #if defined(MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED) 4007 #if !defined(MBEDTLS_DEPRECATED_REMOVED) && defined(MBEDTLS_SSL_PROTO_TLS1_2) 4059 #if defined(MBEDTLS_X509_CRT_PARSE_C) 4109 #if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION) 4165 #if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED) 4221 #if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) 4241 const unsigned char*pw,
4262 #if defined(MBEDTLS_SSL_ALPN) 4289 #if defined(MBEDTLS_SSL_DTLS_SRTP) 4290 #if defined(MBEDTLS_DEBUG_C) 4291 static inline const char*mbedtls_ssl_get_srtp_profile_as_string(mbedtls_ssl_srtp_profile profile)
4294 caseMBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80:
4295 return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_80";
4296 caseMBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32:
4297 return "MBEDTLS_TLS_SRTP_AES128_CM_HMAC_SHA1_32";
4298 caseMBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80:
4299 return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_80";
4300 caseMBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32:
4301 return "MBEDTLS_TLS_SRTP_NULL_HMAC_SHA1_32";
4321 intsupport_mki_value);
4342 intmbedtls_ssl_conf_dtls_srtp_protection_profiles
4344 constmbedtls_ssl_srtp_profile *profiles);
4363 unsigned char*mki_value,
4384mbedtls_dtls_srtp_info *dtls_srtp_info);
4387 #if !defined(MBEDTLS_DEPRECATED_REMOVED) 4427 #if !defined(MBEDTLS_DEPRECATED_REMOVED) 4484 #if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC) 4499 #if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET) 4514 #if defined(MBEDTLS_SSL_SRV_C) 4525 charcert_req_ca_list);
4528 #if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH) 4570 #if defined(MBEDTLS_SSL_SRV_C) 4583 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C) 4596 #if defined(MBEDTLS_SSL_PROTO_TLS1_3) 4628 #if defined(MBEDTLS_SSL_SESSION_TICKETS) && \ 4629 defined(MBEDTLS_SSL_SRV_C) && \ 4630 defined(MBEDTLS_SSL_PROTO_TLS1_3) 4654 #if defined(MBEDTLS_SSL_RENEGOTIATION) 4704 #if defined(MBEDTLS_SSL_RENEGOTIATION) 4770 const unsigned charperiod[8]);
4946 #if defined(MBEDTLS_X509_CRT_PARSE_C) 4980 #if defined(MBEDTLS_SSL_CLI_C) 5156 #if defined(MBEDTLS_SSL_RENEGOTIATION) 5374 unsigned charlevel,
5375 unsigned charmessage);
5391 #if defined(MBEDTLS_SSL_EARLY_DATA) 5393 #if defined(MBEDTLS_SSL_SRV_C) 5442 unsigned char*
buf,
size_t len);
5445 #if defined(MBEDTLS_SSL_CLI_C) 5531 const unsigned char*
buf,
size_t len);
5571 #if defined(MBEDTLS_SSL_CONTEXT_SERIALIZATION) 5629 unsigned char*
buf,
5702 const unsigned char*
buf,
5734 intendpoint,
inttransport,
intpreset);
5777 const unsigned char*secret,
size_tslen,
5778 const char*
label,
5779 const unsigned char*random,
size_trlen,
5780 unsigned char*dstbuf,
size_tdlen);
5782 #if defined(MBEDTLS_SSL_KEYING_MATERIAL_EXPORT) 5787 #define MBEDTLS_SSL_EXPORT_MAX_KEY_LEN 8160 5813 const char*
label,
const size_tlabel_len,
5814 const unsigned char*
context,
const size_tcontext_len,
5815 const intuse_context);
Multi-precision integer library.
#define MBEDTLS_MPI_MAX_SIZE
Maximum number of bytes for usable MPIs.
void transform(Container &c, UnaryFunction *op)
Platform Security Architecture cryptography module.
This file contains Diffie-Hellman-Merkle (DHM) key exchange definitions and functions.
This file contains ECDH definitions and functions.
This file provides an API for Elliptic Curves over GF(P) (ECP).
#define MBEDTLS_ECP_MAX_BYTES
mbedtls_ecp_group_id
Domain-parameter identifiers: curve, subgroup, and generator.
std::ofstream out("events_result.xml")
main entry point for tests
static SQLCHAR output[256]
static const char label[]
psa_key_id_t mbedtls_svc_key_id_t
Encoding of key identifiers as seen inside the PSA Crypto implementation.
unsigned int
A callback function used to compare two keys in a database.
Build-time configuration info.
This file contains the generic functions for message-digest (hashing) and HMAC.
mbedtls_md_type_t
Supported message digests.
#define mbedtls_ssl_conf_renegotiation
#define mbedtls_ssl_conf_sni
#define mbedtls_ssl_conf_cert_req_ca_list
#define mbedtls_ssl_conf_dh_param_ctx
#define mbedtls_ssl_conf_psk_cb
#define mbedtls_ssl_conf_curves
#define mbedtls_ssl_conf_extended_master_secret
#define mbedtls_ssl_set_cid
#define mbedtls_ssl_conf_ca_chain
#define mbedtls_ssl_conf_tls13_key_exchange_modes
#define mbedtls_ssl_conf_own_cert
#define mbedtls_ssl_set_verify
#define mbedtls_ssl_set_hostname
#define mbedtls_ssl_conf_session_tickets_cb
#define mbedtls_ssl_conf_psk
#define mbedtls_ssl_set_hs_authmode
#define mbedtls_ssl_set_client_transport_id
#define mbedtls_ssl_conf_session_cache
#define mbedtls_ssl_get_session
#define mbedtls_ssl_conf_cid
#define mbedtls_ssl_context_save
#define mbedtls_ssl_conf_new_session_tickets
#define mbedtls_ssl_conf_encrypt_then_mac
#define mbedtls_ssl_get_alpn_protocol
#define mbedtls_ssl_conf_renegotiation_period
#define mbedtls_ssl_conf_dtls_cookies
#define mbedtls_ssl_get_hs_sni
#define mbedtls_ssl_get_own_cid
#define mbedtls_ssl_conf_sig_hashes
#define mbedtls_ssl_conf_renegotiation_enforced
#define mbedtls_ssl_conf_dh_param_bin
#define mbedtls_ssl_get_peer_cid
#define mbedtls_ssl_export_keying_material
#define mbedtls_ssl_set_session
#define mbedtls_ssl_conf_preference_order
#define mbedtls_ssl_context_load
#define mbedtls_ssl_conf_cert_profile
#define mbedtls_ssl_set_hs_own_cert
#define mbedtls_ssl_set_datagram_packing
#define mbedtls_ssl_conf_dtls_anti_replay
#define mbedtls_ssl_conf_max_frag_len
#define mbedtls_ssl_conf_session_tickets
#define mbedtls_ssl_conf_verify
#define mbedtls_ssl_get_peer_cert
#define mbedtls_ssl_conf_handshake_timeout
#define mbedtls_ssl_conf_sig_algs
#define mbedtls_ssl_set_hs_ca_chain
#define mbedtls_ssl_renegotiate
#define mbedtls_ssl_conf_alpn_protocols
#define mbedtls_ssl_conf_tls13_enable_signal_new_session_tickets
#define mbedtls_ssl_set_hs_dn_hints
#define mbedtls_ssl_conf_dhm_min_bitlen
#define mbedtls_ssl_set_mtu
#define mbedtls_ssl_set_hs_psk
Mbed TLS Platform time abstraction.
int64_t mbedtls_ms_time_t
Common and shared functions used by multiple modules in the Mbed TLS library.
int mbedtls_f_rng_t(void *p_rng, unsigned char *output, size_t output_size)
The type of custom random generator (RNG) callbacks.
#define MBEDTLS_DEPRECATED
Macro wrapper for struct's members.
#define MBEDTLS_PRIVATE(member)
#define MBEDTLS_PSK_MAX_LEN
void mbedtls_ssl_conf_read_timeout(mbedtls_ssl_config *conf, uint32_t timeout)
Set the timeout period for mbedtls_ssl_read() (Default: no timeout.)
int mbedtls_ssl_cache_get_t(void *data, unsigned char const *session_id, size_t session_id_len, mbedtls_ssl_session *session)
Callback type: server-side session cache getter.
int mbedtls_ssl_ticket_write_t(void *p_ticket, const mbedtls_ssl_session *session, unsigned char *start, const unsigned char *end, size_t *tlen, uint32_t *lifetime)
Callback type: generate and write session ticket.
#define MBEDTLS_SSL_CID_OUT_LEN_MAX
The maximum length of CIDs used for outgoing DTLS messages.
const char * mbedtls_ssl_get_ciphersuite(const mbedtls_ssl_context *ssl)
Return the name of the current ciphersuite.
void mbedtls_ssl_conf_legacy_renegotiation(mbedtls_ssl_config *conf, int allow_legacy)
Prevent or allow legacy renegotiation.
void mbedtls_ssl_export_keys_t(void *p_expkey, mbedtls_ssl_key_export_type type, const unsigned char *secret, size_t secret_len, const unsigned char client_random[32], const unsigned char server_random[32], mbedtls_tls_prf_types tls_prf_type)
Callback type: Export key alongside random values for session identification, and PRF for implementat...
const char * mbedtls_ssl_get_version(const mbedtls_ssl_context *ssl)
Return the current TLS version.
int mbedtls_ssl_session_save(const mbedtls_ssl_session *session, unsigned char *buf, size_t buf_len, size_t *olen)
Save session structure as serialized data in a buffer.
int mbedtls_ssl_session_reset(mbedtls_ssl_context *ssl)
Reset an already initialized SSL context for re-use while retaining application-set variables,...
static uintptr_t mbedtls_ssl_get_user_data_n(mbedtls_ssl_context *ssl)
Retrieve the user data in an SSL context as an integer.
static void mbedtls_ssl_conf_set_user_data_n(mbedtls_ssl_config *conf, uintptr_t n)
Set the user data in an SSL configuration to an integer.
int mbedtls_ssl_check_record(mbedtls_ssl_context const *ssl, unsigned char *buf, size_t buflen)
Check whether a buffer contains a valid and authentic record that has not been seen before.
void mbedtls_ssl_free(mbedtls_ssl_context *ssl)
Free referenced items in an SSL context and clear memory.
void mbedtls_ssl_conf_transport(mbedtls_ssl_config *conf, int transport)
Set the transport type (TLS or DTLS).
#define MBEDTLS_SSL_CID_IN_LEN_MAX
The maximum length of CIDs used for incoming DTLS messages.
void mbedtls_ssl_set_timer_cb(mbedtls_ssl_context *ssl, void *p_timer, mbedtls_ssl_set_timer_t *f_set_timer, mbedtls_ssl_get_timer_t *f_get_timer)
Set the timer callbacks (Mandatory for DTLS.)
@ MBEDTLS_SSL_TLS_PRF_SHA384
@ MBEDTLS_SSL_HKDF_EXPAND_SHA256
@ MBEDTLS_SSL_TLS_PRF_SHA256
@ MBEDTLS_SSL_TLS_PRF_NONE
@ MBEDTLS_SSL_HKDF_EXPAND_SHA384
int mbedtls_ssl_send_t(void *ctx, const unsigned char *buf, size_t len)
Callback type: send data on the network.
@ MBEDTLS_SSL_CERTIFICATE_VERIFY
@ MBEDTLS_SSL_HANDSHAKE_OVER
@ MBEDTLS_SSL_SERVER_HELLO_DONE
@ MBEDTLS_SSL_END_OF_EARLY_DATA
@ MBEDTLS_SSL_NEW_SESSION_TICKET
@ MBEDTLS_SSL_SERVER_FINISHED
@ MBEDTLS_SSL_SERVER_KEY_EXCHANGE
@ MBEDTLS_SSL_ENCRYPTED_EXTENSIONS
@ MBEDTLS_SSL_SERVER_HELLO
@ MBEDTLS_SSL_SERVER_CCS_AFTER_HELLO_RETRY_REQUEST
@ MBEDTLS_SSL_CLIENT_KEY_EXCHANGE
@ MBEDTLS_SSL_CLIENT_CCS_BEFORE_2ND_CLIENT_HELLO
@ MBEDTLS_SSL_CLIENT_HELLO
@ MBEDTLS_SSL_SERVER_CERTIFICATE
@ MBEDTLS_SSL_CERTIFICATE_REQUEST
@ MBEDTLS_SSL_CLIENT_FINISHED
@ MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC
@ MBEDTLS_SSL_SERVER_HELLO_VERIFY_REQUEST_SENT
@ MBEDTLS_SSL_HANDSHAKE_WRAPUP
@ MBEDTLS_SSL_CLIENT_CCS_AFTER_SERVER_FINISHED
@ MBEDTLS_SSL_CLIENT_CHANGE_CIPHER_SPEC
@ MBEDTLS_SSL_CLIENT_CERTIFICATE_VERIFY
@ MBEDTLS_SSL_HELLO_REQUEST
@ MBEDTLS_SSL_CLIENT_CERTIFICATE
@ MBEDTLS_SSL_TLS1_3_NEW_SESSION_TICKET_FLUSH
@ MBEDTLS_SSL_FLUSH_BUFFERS
@ MBEDTLS_SSL_CLIENT_CCS_AFTER_CLIENT_HELLO
@ MBEDTLS_SSL_TLS1_3_NEW_SESSION_TICKET
@ MBEDTLS_SSL_HELLO_RETRY_REQUEST
@ MBEDTLS_SSL_SERVER_CCS_AFTER_SERVER_HELLO
void mbedtls_ssl_conf_endpoint(mbedtls_ssl_config *conf, int endpoint)
Set the current endpoint type.
int mbedtls_ssl_check_pending(const mbedtls_ssl_context *ssl)
Check if there is data already read from the underlying transport but not yet processed.
mbedtls_ssl_protocol_version
Human-friendly representation of the (D)TLS protocol version.
@ MBEDTLS_SSL_VERSION_TLS1_2
@ MBEDTLS_SSL_VERSION_TLS1_3
@ MBEDTLS_SSL_VERSION_UNKNOWN
int mbedtls_ssl_send_alert_message(mbedtls_ssl_context *ssl, unsigned char level, unsigned char message)
Send an alert message.
static int mbedtls_ssl_is_handshake_over(mbedtls_ssl_context *ssl)
After calling mbedtls_ssl_handshake() to start the SSL handshake you can call this function to check ...
int mbedtls_ssl_ticket_parse_t(void *p_ticket, mbedtls_ssl_session *session, unsigned char *buf, size_t len)
Callback type: parse and load session ticket.
int mbedtls_ssl_handshake(mbedtls_ssl_context *ssl)
Perform the SSL handshake.
struct mbedtls_ssl_sig_hash_set_t mbedtls_ssl_sig_hash_set_t
static void * mbedtls_ssl_conf_get_user_data_p(mbedtls_ssl_config *conf)
Retrieve the user data in an SSL configuration as a pointer.
uint32_t mbedtls_ssl_get_verify_result(const mbedtls_ssl_context *ssl)
Return the result of the certificate verification.
#define MBEDTLS_SSL_SEQUENCE_NUMBER_LEN
mbedtls_ssl_key_export_type
@ MBEDTLS_SSL_KEY_EXPORT_TLS12_MASTER_SECRET
int mbedtls_ssl_session_load(mbedtls_ssl_session *session, const unsigned char *buf, size_t len)
Load serialized session data into a session structure.
int mbedtls_ssl_cookie_write_t(void *ctx, unsigned char **p, unsigned char *end, const unsigned char *info, size_t ilen)
Callback type: generate a cookie.
static mbedtls_ssl_protocol_version mbedtls_ssl_get_version_number(const mbedtls_ssl_context *ssl)
Return the (D)TLS protocol version negotiated in the given connection.
void mbedtls_ssl_conf_authmode(mbedtls_ssl_config *conf, int authmode)
Set the certificate verification mode Default: NONE on server, REQUIRED on client.
int mbedtls_ssl_get_max_out_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum outgoing record payload in bytes.
int mbedtls_ssl_write(mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len)
Try to write exactly 'len' application data bytes.
int mbedtls_ssl_get_max_in_record_payload(const mbedtls_ssl_context *ssl)
Return the current maximum incoming record payload in bytes.
void mbedtls_ssl_set_timer_t(void *ctx, uint32_t int_ms, uint32_t fin_ms)
Callback type: set a pair of timers/delays to watch.
#define MBEDTLS_ERR_SSL_BAD_INPUT_DATA
Bad input parameters to function.
int mbedtls_ssl_recv_timeout_t(void *ctx, unsigned char *buf, size_t len, uint32_t timeout)
Callback type: receive data from the network, with timeout.
#define MBEDTLS_SSL_IS_SERVER
void mbedtls_ssl_config_free(mbedtls_ssl_config *conf)
Free an SSL configuration context.
void mbedtls_ssl_session_init(mbedtls_ssl_session *session)
Initialize SSL session structure.
#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN
void mbedtls_ssl_init(mbedtls_ssl_context *ssl)
Initialize an SSL context Just makes the context ready for mbedtls_ssl_setup() or mbedtls_ssl_free()
static uintptr_t mbedtls_ssl_conf_get_user_data_n(mbedtls_ssl_config *conf)
Retrieve the user data in an SSL configuration as an integer.
void mbedtls_ssl_set_bio(mbedtls_ssl_context *ssl, void *p_bio, mbedtls_ssl_send_t *f_send, mbedtls_ssl_recv_t *f_recv, mbedtls_ssl_recv_timeout_t *f_recv_timeout)
Set the underlying BIO callbacks for write, read and read-with-timeout.
int mbedtls_ssl_get_record_expansion(const mbedtls_ssl_context *ssl)
Return the (maximum) number of bytes added by the record layer: header + encryption/MAC overhead (inc...
static void * mbedtls_ssl_get_user_data_p(mbedtls_ssl_context *ssl)
Retrieve the user data in an SSL context as a pointer.
int mbedtls_ssl_get_ciphersuite_id(const char *ciphersuite_name)
Return the ID of the ciphersuite associated with the given name.
void mbedtls_ssl_conf_dtls_badmac_limit(mbedtls_ssl_config *conf, unsigned limit)
Set a limit on the number of records with a bad MAC before terminating the connection.
int mbedtls_ssl_cookie_check_t(void *ctx, const unsigned char *cookie, size_t clen, const unsigned char *info, size_t ilen)
Callback type: verify a cookie.
static int mbedtls_ssl_session_get_ciphersuite_id(const mbedtls_ssl_session *session)
Get the ciphersuite-id.
int mbedtls_ssl_config_defaults(mbedtls_ssl_config *conf, int endpoint, int transport, int preset)
Load reasonable default SSL configuration values.
int mbedtls_ssl_read(mbedtls_ssl_context *ssl, unsigned char *buf, size_t len)
Read at most 'len' application data bytes.
void mbedtls_ssl_conf_groups(mbedtls_ssl_config *conf, const uint16_t *groups)
Set the allowed groups in order of preference.
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_max_version(mbedtls_ssl_config *conf, int major, int minor)
Set the maximum supported version sent from the client side and/or accepted at the server side.
int mbedtls_ssl_handshake_step(mbedtls_ssl_context *ssl)
Perform a single step of the SSL handshake.
int mbedtls_ssl_cache_set_t(void *data, unsigned char const *session_id, size_t session_id_len, const mbedtls_ssl_session *session)
Callback type: server-side session cache setter.
void mbedtls_ssl_conf_dbg(mbedtls_ssl_config *conf, void(*f_dbg)(void *, int, const char *, int, const char *), void *p_dbg)
Set the debug callback.
static const mbedtls_ssl_config * mbedtls_ssl_context_get_config(const mbedtls_ssl_context *ssl)
Return the SSL configuration structure associated with the given SSL context.
#define MBEDTLS_TLS1_3_MD_MAX_SIZE
void mbedtls_ssl_config_init(mbedtls_ssl_config *conf)
Initialize an SSL configuration context Just makes the context ready for mbedtls_ssl_config_defaults(...
static void mbedtls_ssl_conf_max_tls_version(mbedtls_ssl_config *conf, mbedtls_ssl_protocol_version tls_version)
Set the maximum supported version sent from the client side and/or accepted at the server side.
int mbedtls_ssl_tls_prf(const mbedtls_tls_prf_types prf, const unsigned char *secret, size_t slen, const char *label, const unsigned char *random, size_t rlen, unsigned char *dstbuf, size_t dlen)
TLS-PRF function for key derivation.
int mbedtls_ssl_recv_t(void *ctx, unsigned char *buf, size_t len)
Callback type: receive data from the network.
void mbedtls_ssl_session_free(mbedtls_ssl_session *session)
Free referenced items in an SSL session including the peer certificate and clear memory.
static unsigned const char(* mbedtls_ssl_session_get_id(const mbedtls_ssl_session *session))[32]
Get the session-id buffer.
int mbedtls_ssl_close_notify(mbedtls_ssl_context *ssl)
Notify the peer that the connection is being closed.
int mbedtls_ssl_get_ciphersuite_id_from_ssl(const mbedtls_ssl_context *ssl)
Return the id of the current ciphersuite.
void mbedtls_ssl_conf_ciphersuites(mbedtls_ssl_config *conf, const int *ciphersuites)
Set the list of allowed ciphersuites and the preference order.
size_t mbedtls_ssl_get_bytes_avail(const mbedtls_ssl_context *ssl)
Return the number of application data bytes remaining to be read from the current record.
void MBEDTLS_DEPRECATED mbedtls_ssl_conf_min_version(mbedtls_ssl_config *conf, int major, int minor)
Set the minimum accepted SSL/TLS protocol version.
static void mbedtls_ssl_conf_set_user_data_p(mbedtls_ssl_config *conf, void *p)
Set the user data in an SSL configuration to a pointer.
const char * mbedtls_ssl_get_ciphersuite_name(const int ciphersuite_id)
Return the name of the ciphersuite associated with the given ID.
int mbedtls_ssl_get_timer_t(void *ctx)
Callback type: get status of timers/delays.
static void mbedtls_ssl_set_user_data_n(mbedtls_ssl_context *ssl, uintptr_t n)
Set the user data in an SSL context to an integer.
void mbedtls_ssl_conf_rng(mbedtls_ssl_config *conf, mbedtls_f_rng_t *f_rng, void *p_rng)
Set the random number generator callback.
static void mbedtls_ssl_conf_min_tls_version(mbedtls_ssl_config *conf, mbedtls_ssl_protocol_version tls_version)
Set the minimum supported version sent from the client side and/or accepted at the server side.
static size_t mbedtls_ssl_session_get_id_len(const mbedtls_ssl_session *session)
Get the size of the session-id.
int mbedtls_ssl_setup(mbedtls_ssl_context *ssl, const mbedtls_ssl_config *conf)
Set up an SSL context for use.
static void mbedtls_ssl_set_user_data_p(mbedtls_ssl_context *ssl, void *p)
Set the user data in an SSL context to a pointer.
static int mbedtls_ssl_conf_get_endpoint(const mbedtls_ssl_config *conf)
Get the current endpoint type.
void mbedtls_ssl_set_export_keys_cb(mbedtls_ssl_context *ssl, mbedtls_ssl_export_keys_t *f_export_keys, void *p_export_keys)
Configure a key export callback.
SSL Ciphersuites for Mbed TLS.
The DHM context structure.
SSL/TLS configuration to be shared between mbedtls_ssl_context structures.
mbedtls_ssl_protocol_version MBEDTLS_PRIVATE(max_tls_version)
void * MBEDTLS_PRIVATE(p_dbg)
uint8_t MBEDTLS_PRIVATE(allow_legacy_renegotiation)
const uint16_t * MBEDTLS_PRIVATE(group_list)
void * MBEDTLS_PRIVATE(p_cache)
int(*)(void *, unsigned char *, size_t) MBEDTLS_PRIVATE(f_rng)
Callback for getting (pseudo-)random numbers.
uint8_t MBEDTLS_PRIVATE(endpoint)
uint32_t MBEDTLS_PRIVATE(read_timeout)
const int * MBEDTLS_PRIVATE(ciphersuite_list)
Allowed ciphersuites for (D)TLS 1.2 (0-terminated)
mbedtls_ssl_protocol_version MBEDTLS_PRIVATE(min_tls_version)
void * MBEDTLS_PRIVATE(p_rng)
void(*)(void *, int, const char *, int, const char *) MBEDTLS_PRIVATE(f_dbg)
Callback for printing debug output.
mbedtls_ssl_cache_set_t * MBEDTLS_PRIVATE(f_set_cache)
Callback to store a session into the cache.
unsigned int MBEDTLS_PRIVATE(badmac_limit)
uint8_t MBEDTLS_PRIVATE(transport)
uint8_t MBEDTLS_PRIVATE(authmode)
mbedtls_ssl_cache_get_t * MBEDTLS_PRIVATE(f_get_cache)
Callback to retrieve a session from the cache.
mbedtls_ssl_user_data_t MBEDTLS_PRIVATE(user_data)
User data pointer or handle.
unsigned char * MBEDTLS_PRIVATE(out_hdr)
int MBEDTLS_PRIVATE(nb_zero)
size_t MBEDTLS_PRIVATE(in_left)
int MBEDTLS_PRIVATE(secure_renegotiation)
mbedtls_ssl_handshake_params * MBEDTLS_PRIVATE(handshake)
unsigned char * MBEDTLS_PRIVATE(out_msg)
mbedtls_ssl_session * MBEDTLS_PRIVATE(session_out)
int MBEDTLS_PRIVATE(alert_reason)
mbedtls_ssl_transform * MBEDTLS_PRIVATE(transform_out)
int MBEDTLS_PRIVATE(state)
mbedtls_ssl_transform * MBEDTLS_PRIVATE(transform)
int MBEDTLS_PRIVATE(out_msgtype)
void * MBEDTLS_PRIVATE(p_timer)
int MBEDTLS_PRIVATE(keep_current_message)
int MBEDTLS_PRIVATE(in_msgtype)
unsigned char * MBEDTLS_PRIVATE(out_buf)
mbedtls_ssl_session * MBEDTLS_PRIVATE(session)
size_t MBEDTLS_PRIVATE(in_msglen)
mbedtls_ssl_transform * MBEDTLS_PRIVATE(transform_in)
mbedtls_ssl_send_t * MBEDTLS_PRIVATE(f_send)
unsigned char * MBEDTLS_PRIVATE(in_hdr)
unsigned char MBEDTLS_PRIVATE(cur_out_ctr)[8]
unsigned char * MBEDTLS_PRIVATE(out_ctr)
unsigned MBEDTLS_PRIVATE(badmac_seen_or_in_hsfraglen)
Multipurpose field.
void * MBEDTLS_PRIVATE(p_bio)
unsigned char * MBEDTLS_PRIVATE(in_buf)
unsigned char * MBEDTLS_PRIVATE(in_ctr)
mbedtls_ssl_user_data_t MBEDTLS_PRIVATE(user_data)
User data pointer or handle.
mbedtls_ssl_get_timer_t * MBEDTLS_PRIVATE(f_get_timer)
mbedtls_ssl_session * MBEDTLS_PRIVATE(session_negotiate)
unsigned char * MBEDTLS_PRIVATE(out_len)
mbedtls_ssl_recv_t * MBEDTLS_PRIVATE(f_recv)
mbedtls_ssl_recv_timeout_t * MBEDTLS_PRIVATE(f_recv_timeout)
unsigned char MBEDTLS_PRIVATE(send_alert)
mbedtls_ssl_protocol_version MBEDTLS_PRIVATE(tls_version)
Maximum TLS version to be negotiated, then negotiated TLS version.
unsigned char * MBEDTLS_PRIVATE(in_iv)
mbedtls_ssl_session * MBEDTLS_PRIVATE(session_in)
unsigned char * MBEDTLS_PRIVATE(in_msg)
mbedtls_ssl_export_keys_t * MBEDTLS_PRIVATE(f_export_keys)
Callback to export key block and master secret.
unsigned char * MBEDTLS_PRIVATE(in_len)
size_t MBEDTLS_PRIVATE(in_hslen)
mbedtls_ssl_set_timer_t * MBEDTLS_PRIVATE(f_set_timer)
unsigned char * MBEDTLS_PRIVATE(out_iv)
void * MBEDTLS_PRIVATE(p_export_keys)
unsigned char MBEDTLS_PRIVATE(alert_type)
size_t MBEDTLS_PRIVATE(out_msglen)
size_t MBEDTLS_PRIVATE(out_left)
const mbedtls_ssl_config * MBEDTLS_PRIVATE(conf)
unsigned char * MBEDTLS_PRIVATE(in_offt)
size_t MBEDTLS_PRIVATE(id_len)
uint32_t MBEDTLS_PRIVATE(verify_result)
unsigned char MBEDTLS_PRIVATE(master)[48]
int MBEDTLS_PRIVATE(ciphersuite)
uint8_t MBEDTLS_PRIVATE(endpoint)
unsigned char MBEDTLS_PRIVATE(id)[32]
mbedtls_ssl_protocol_version MBEDTLS_PRIVATE(tls_version)
TLS version negotiated in the session.
unsigned char MBEDTLS_PRIVATE(exported)
Certificate revocation list structure.
Security profile for certificate verification.
Container for an X.509 certificate.
static CS_CONTEXT * context
X.509 certificate revocation list parsing.
X.509 certificate parsing and writing.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4