diff options
Diffstat (limited to 'thirdparty/mbedtls/include')
71 files changed, 28810 insertions, 0 deletions
diff --git a/thirdparty/mbedtls/include/mbedtls/aes.h b/thirdparty/mbedtls/include/mbedtls/aes.h new file mode 100644 index 0000000000..46016dcb7f --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/aes.h @@ -0,0 +1,417 @@ +/** + * \file aes.h + * + * \brief   The Advanced Encryption Standard (AES) specifies a FIPS-approved + *          cryptographic algorithm that can be used to protect electronic + *          data. + * + *          The AES algorithm is a symmetric block cipher that can + *          encrypt and decrypt information. For more information, see + *          <em>FIPS Publication 197: Advanced Encryption Standard</em> and + *          <em>ISO/IEC 18033-2:2006: Information technology -- Security + *          techniques -- Encryption algorithms -- Part 2: Asymmetric + *          ciphers</em>. + */ +/*  Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved. + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of Mbed TLS (https://tls.mbed.org) + */ + +#ifndef MBEDTLS_AES_H +#define MBEDTLS_AES_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> +#include <stdint.h> + +/* padlock.c and aesni.c rely on these values! */ +#define MBEDTLS_AES_ENCRYPT     1 /**< AES encryption. */ +#define MBEDTLS_AES_DECRYPT     0 /**< AES decryption. */ + +/* Error codes in range 0x0020-0x0022 */ +#define MBEDTLS_ERR_AES_INVALID_KEY_LENGTH                -0x0020  /**< Invalid key length. */ +#define MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH              -0x0022  /**< Invalid data input length. */ + +/* Error codes in range 0x0023-0x0025 */ +#define MBEDTLS_ERR_AES_FEATURE_UNAVAILABLE               -0x0023  /**< Feature not available. For example, an unsupported AES key size. */ +#define MBEDTLS_ERR_AES_HW_ACCEL_FAILED                   -0x0025  /**< AES hardware accelerator failed. */ + +#if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \ +    !defined(inline) && !defined(__cplusplus) +#define inline __inline +#endif + +#if !defined(MBEDTLS_AES_ALT) +// Regular implementation +// + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief The AES context-type definition. + */ +typedef struct +{ +    int nr;                     /*!< The number of rounds. */ +    uint32_t *rk;               /*!< AES round keys. */ +    uint32_t buf[68];           /*!< Unaligned data buffer. This buffer can +                                     hold 32 extra Bytes, which can be used for +                                     one of the following purposes: +                                     <ul><li>Alignment if VIA padlock is +                                             used.</li> +                                     <li>Simplifying key expansion in the 256-bit +                                         case by generating an extra round key. +                                         </li></ul> */ +} +mbedtls_aes_context; + +/** + * \brief          This function initializes the specified AES context. + * + *                 It must be the first API called before using + *                 the context. + * + * \param ctx      The AES context to initialize. + */ +void mbedtls_aes_init( mbedtls_aes_context *ctx ); + +/** + * \brief          This function releases and clears the specified AES context. + * + * \param ctx      The AES context to clear. + */ +void mbedtls_aes_free( mbedtls_aes_context *ctx ); + +/** + * \brief          This function sets the encryption key. + * + * \param ctx      The AES context to which the key should be bound. + * \param key      The encryption key. + * \param keybits  The size of data passed in bits. Valid options are: + *                 <ul><li>128 bits</li> + *                 <li>192 bits</li> + *                 <li>256 bits</li></ul> + * + * \return         \c 0 on success or #MBEDTLS_ERR_AES_INVALID_KEY_LENGTH + *                 on failure. + */ +int mbedtls_aes_setkey_enc( mbedtls_aes_context *ctx, const unsigned char *key, +                    unsigned int keybits ); + +/** + * \brief          This function sets the decryption key. + * + * \param ctx      The AES context to which the key should be bound. + * \param key      The decryption key. + * \param keybits  The size of data passed. Valid options are: + *                 <ul><li>128 bits</li> + *                 <li>192 bits</li> + *                 <li>256 bits</li></ul> + * + * \return         \c 0 on success, or #MBEDTLS_ERR_AES_INVALID_KEY_LENGTH on failure. + */ +int mbedtls_aes_setkey_dec( mbedtls_aes_context *ctx, const unsigned char *key, +                    unsigned int keybits ); + +/** + * \brief          This function performs an AES single-block encryption or + *                 decryption operation. + * + *                 It performs the operation defined in the \p mode parameter + *                 (encrypt or decrypt), on the input data buffer defined in + *                 the \p input parameter. + * + *                 mbedtls_aes_init(), and either mbedtls_aes_setkey_enc() or + *                 mbedtls_aes_setkey_dec() must be called before the first + *                 call to this API with the same context. + * + * \param ctx      The AES context to use for encryption or decryption. + * \param mode     The AES operation: #MBEDTLS_AES_ENCRYPT or + *                 #MBEDTLS_AES_DECRYPT. + * \param input    The 16-Byte buffer holding the input data. + * \param output   The 16-Byte buffer holding the output data. + + * \return         \c 0 on success. + */ +int mbedtls_aes_crypt_ecb( mbedtls_aes_context *ctx, +                    int mode, +                    const unsigned char input[16], +                    unsigned char output[16] ); + +#if defined(MBEDTLS_CIPHER_MODE_CBC) +/** + * \brief  This function performs an AES-CBC encryption or decryption operation + *         on full blocks. + * + *         It performs the operation defined in the \p mode + *         parameter (encrypt/decrypt), on the input data buffer defined in + *         the \p input parameter. + * + *         It can be called as many times as needed, until all the input + *         data is processed. mbedtls_aes_init(), and either + *         mbedtls_aes_setkey_enc() or mbedtls_aes_setkey_dec() must be called + *         before the first call to this API with the same context. + * + * \note   This function operates on aligned blocks, that is, the input size + *         must be a multiple of the AES block size of 16 Bytes. + * + * \note   Upon exit, the content of the IV is updated so that you can + *         call the same function again on the next + *         block(s) of data and get the same result as if it was + *         encrypted in one call. This allows a "streaming" usage. + *         If you need to retain the contents of the IV, you should + *         either save it manually or use the cipher module instead. + * + * + * \param ctx      The AES context to use for encryption or decryption. + * \param mode     The AES operation: #MBEDTLS_AES_ENCRYPT or + *                 #MBEDTLS_AES_DECRYPT. + * \param length   The length of the input data in Bytes. This must be a + *                 multiple of the block size (16 Bytes). + * \param iv       Initialization vector (updated after use). + * \param input    The buffer holding the input data. + * \param output   The buffer holding the output data. + * + * \return         \c 0 on success, or #MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH + *                 on failure. + */ +int mbedtls_aes_crypt_cbc( mbedtls_aes_context *ctx, +                    int mode, +                    size_t length, +                    unsigned char iv[16], +                    const unsigned char *input, +                    unsigned char *output ); +#endif /* MBEDTLS_CIPHER_MODE_CBC */ + +#if defined(MBEDTLS_CIPHER_MODE_CFB) +/** + * \brief This function performs an AES-CFB128 encryption or decryption + *        operation. + * + *        It performs the operation defined in the \p mode + *        parameter (encrypt or decrypt), on the input data buffer + *        defined in the \p input parameter. + * + *        For CFB, you must set up the context with mbedtls_aes_setkey_enc(), + *        regardless of whether you are performing an encryption or decryption + *        operation, that is, regardless of the \p mode parameter. This is + *        because CFB mode uses the same key schedule for encryption and + *        decryption. + * + * \note  Upon exit, the content of the IV is updated so that you can + *        call the same function again on the next + *        block(s) of data and get the same result as if it was + *        encrypted in one call. This allows a "streaming" usage. + *        If you need to retain the contents of the + *        IV, you must either save it manually or use the cipher + *        module instead. + * + * + * \param ctx      The AES context to use for encryption or decryption. + * \param mode     The AES operation: #MBEDTLS_AES_ENCRYPT or + *                 #MBEDTLS_AES_DECRYPT. + * \param length   The length of the input data. + * \param iv_off   The offset in IV (updated after use). + * \param iv       The initialization vector (updated after use). + * \param input    The buffer holding the input data. + * \param output   The buffer holding the output data. + * + * \return         \c 0 on success. + */ +int mbedtls_aes_crypt_cfb128( mbedtls_aes_context *ctx, +                       int mode, +                       size_t length, +                       size_t *iv_off, +                       unsigned char iv[16], +                       const unsigned char *input, +                       unsigned char *output ); + +/** + * \brief This function performs an AES-CFB8 encryption or decryption + *        operation. + * + *        It performs the operation defined in the \p mode + *        parameter (encrypt/decrypt), on the input data buffer defined + *        in the \p input parameter. + * + *        Due to the nature of CFB, you must use the same key schedule for + *        both encryption and decryption operations. Therefore, you must + *        use the context initialized with mbedtls_aes_setkey_enc() for + *        both #MBEDTLS_AES_ENCRYPT and #MBEDTLS_AES_DECRYPT. + * + * \note  Upon exit, the content of the IV is updated so that you can + *        call the same function again on the next + *        block(s) of data and get the same result as if it was + *        encrypted in one call. This allows a "streaming" usage. + *        If you need to retain the contents of the + *        IV, you should either save it manually or use the cipher + *        module instead. + * + * + * \param ctx      The AES context to use for encryption or decryption. + * \param mode     The AES operation: #MBEDTLS_AES_ENCRYPT or + *                 #MBEDTLS_AES_DECRYPT + * \param length   The length of the input data. + * \param iv       The initialization vector (updated after use). + * \param input    The buffer holding the input data. + * \param output   The buffer holding the output data. + * + * \return         \c 0 on success. + */ +int mbedtls_aes_crypt_cfb8( mbedtls_aes_context *ctx, +                    int mode, +                    size_t length, +                    unsigned char iv[16], +                    const unsigned char *input, +                    unsigned char *output ); +#endif /*MBEDTLS_CIPHER_MODE_CFB */ + +#if defined(MBEDTLS_CIPHER_MODE_CTR) +/** + * \brief      This function performs an AES-CTR encryption or decryption + *             operation. + * + *             This function performs the operation defined in the \p mode + *             parameter (encrypt/decrypt), on the input data buffer + *             defined in the \p input parameter. + * + *             Due to the nature of CTR, you must use the same key schedule + *             for both encryption and decryption operations. Therefore, you + *             must use the context initialized with mbedtls_aes_setkey_enc() + *             for both #MBEDTLS_AES_ENCRYPT and #MBEDTLS_AES_DECRYPT. + * + * \warning    You must keep the maximum use of your counter in mind. + * + * \param ctx              The AES context to use for encryption or decryption. + * \param length           The length of the input data. + * \param nc_off           The offset in the current \p stream_block, for + *                         resuming within the current cipher stream. The + *                         offset pointer should be 0 at the start of a stream. + * \param nonce_counter    The 128-bit nonce and counter. + * \param stream_block     The saved stream block for resuming. This is + *                         overwritten by the function. + * \param input            The buffer holding the input data. + * \param output           The buffer holding the output data. + * + * \return     \c 0 on success. + */ +int mbedtls_aes_crypt_ctr( mbedtls_aes_context *ctx, +                       size_t length, +                       size_t *nc_off, +                       unsigned char nonce_counter[16], +                       unsigned char stream_block[16], +                       const unsigned char *input, +                       unsigned char *output ); +#endif /* MBEDTLS_CIPHER_MODE_CTR */ + +/** + * \brief           Internal AES block encryption function. This is only + *                  exposed to allow overriding it using + *                  \c MBEDTLS_AES_ENCRYPT_ALT. + * + * \param ctx       The AES context to use for encryption. + * \param input     The plaintext block. + * \param output    The output (ciphertext) block. + * + * \return          \c 0 on success. + */ +int mbedtls_internal_aes_encrypt( mbedtls_aes_context *ctx, +                                  const unsigned char input[16], +                                  unsigned char output[16] ); + +/** + * \brief           Internal AES block decryption function. This is only + *                  exposed to allow overriding it using see + *                  \c MBEDTLS_AES_DECRYPT_ALT. + * + * \param ctx       The AES context to use for decryption. + * \param input     The ciphertext block. + * \param output    The output (plaintext) block. + * + * \return          \c 0 on success. + */ +int mbedtls_internal_aes_decrypt( mbedtls_aes_context *ctx, +                                  const unsigned char input[16], +                                  unsigned char output[16] ); + +#if !defined(MBEDTLS_DEPRECATED_REMOVED) +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED      __attribute__((deprecated)) +#else +#define MBEDTLS_DEPRECATED +#endif +/** + * \brief           Deprecated internal AES block encryption function + *                  without return value. + * + * \deprecated      Superseded by mbedtls_aes_encrypt_ext() in 2.5.0. + * + * \param ctx       The AES context to use for encryption. + * \param input     Plaintext block. + * \param output    Output (ciphertext) block. + */ +MBEDTLS_DEPRECATED void mbedtls_aes_encrypt( mbedtls_aes_context *ctx, +                                             const unsigned char input[16], +                                             unsigned char output[16] ); + +/** + * \brief           Deprecated internal AES block decryption function + *                  without return value. + * + * \deprecated      Superseded by mbedtls_aes_decrypt_ext() in 2.5.0. + * + * \param ctx       The AES context to use for decryption. + * \param input     Ciphertext block. + * \param output    Output (plaintext) block. + */ +MBEDTLS_DEPRECATED void mbedtls_aes_decrypt( mbedtls_aes_context *ctx, +                                             const unsigned char input[16], +                                             unsigned char output[16] ); + +#undef MBEDTLS_DEPRECATED +#endif /* !MBEDTLS_DEPRECATED_REMOVED */ + +#ifdef __cplusplus +} +#endif + +#else  /* MBEDTLS_AES_ALT */ +#include "aes_alt.h" +#endif /* MBEDTLS_AES_ALT */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          Checkup routine. + * + * \return         \c 0 on success, or \c 1 on failure. + */ +int mbedtls_aes_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + +#endif /* aes.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/aesni.h b/thirdparty/mbedtls/include/mbedtls/aesni.h new file mode 100644 index 0000000000..746baa0e17 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/aesni.h @@ -0,0 +1,112 @@ +/** + * \file aesni.h + * + * \brief AES-NI for hardware AES acceleration on some Intel processors + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_AESNI_H +#define MBEDTLS_AESNI_H + +#include "aes.h" + +#define MBEDTLS_AESNI_AES      0x02000000u +#define MBEDTLS_AESNI_CLMUL    0x00000002u + +#if defined(MBEDTLS_HAVE_ASM) && defined(__GNUC__) &&  \ +    ( defined(__amd64__) || defined(__x86_64__) )   &&  \ +    ! defined(MBEDTLS_HAVE_X86_64) +#define MBEDTLS_HAVE_X86_64 +#endif + +#if defined(MBEDTLS_HAVE_X86_64) + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          AES-NI features detection routine + * + * \param what     The feature to detect + *                 (MBEDTLS_AESNI_AES or MBEDTLS_AESNI_CLMUL) + * + * \return         1 if CPU has support for the feature, 0 otherwise + */ +int mbedtls_aesni_has_support( unsigned int what ); + +/** + * \brief          AES-NI AES-ECB block en(de)cryption + * + * \param ctx      AES context + * \param mode     MBEDTLS_AES_ENCRYPT or MBEDTLS_AES_DECRYPT + * \param input    16-byte input block + * \param output   16-byte output block + * + * \return         0 on success (cannot fail) + */ +int mbedtls_aesni_crypt_ecb( mbedtls_aes_context *ctx, +                     int mode, +                     const unsigned char input[16], +                     unsigned char output[16] ); + +/** + * \brief          GCM multiplication: c = a * b in GF(2^128) + * + * \param c        Result + * \param a        First operand + * \param b        Second operand + * + * \note           Both operands and result are bit strings interpreted as + *                 elements of GF(2^128) as per the GCM spec. + */ +void mbedtls_aesni_gcm_mult( unsigned char c[16], +                     const unsigned char a[16], +                     const unsigned char b[16] ); + +/** + * \brief           Compute decryption round keys from encryption round keys + * + * \param invkey    Round keys for the equivalent inverse cipher + * \param fwdkey    Original round keys (for encryption) + * \param nr        Number of rounds (that is, number of round keys minus one) + */ +void mbedtls_aesni_inverse_key( unsigned char *invkey, +                        const unsigned char *fwdkey, int nr ); + +/** + * \brief           Perform key expansion (for encryption) + * + * \param rk        Destination buffer where the round keys are written + * \param key       Encryption key + * \param bits      Key size in bits (must be 128, 192 or 256) + * + * \return          0 if successful, or MBEDTLS_ERR_AES_INVALID_KEY_LENGTH + */ +int mbedtls_aesni_setkey_enc( unsigned char *rk, +                      const unsigned char *key, +                      size_t bits ); + +#ifdef __cplusplus +} +#endif + +#endif /* MBEDTLS_HAVE_X86_64 */ + +#endif /* MBEDTLS_AESNI_H */ diff --git a/thirdparty/mbedtls/include/mbedtls/arc4.h b/thirdparty/mbedtls/include/mbedtls/arc4.h new file mode 100644 index 0000000000..f9d93f822f --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/arc4.h @@ -0,0 +1,149 @@ +/** + * \file arc4.h + * + * \brief The ARCFOUR stream cipher + * + * \warning   ARC4 is considered a weak cipher and its use constitutes a + *            security risk. We recommend considering stronger ciphers instead. + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + * + */ +#ifndef MBEDTLS_ARC4_H +#define MBEDTLS_ARC4_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> + +#define MBEDTLS_ERR_ARC4_HW_ACCEL_FAILED                  -0x0019  /**< ARC4 hardware accelerator failed. */ + +#if !defined(MBEDTLS_ARC4_ALT) +// Regular implementation +// + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief     ARC4 context structure + * + * \warning   ARC4 is considered a weak cipher and its use constitutes a + *            security risk. We recommend considering stronger ciphers instead. + * + */ +typedef struct +{ +    int x;                      /*!< permutation index */ +    int y;                      /*!< permutation index */ +    unsigned char m[256];       /*!< permutation table */ +} +mbedtls_arc4_context; + +/** + * \brief          Initialize ARC4 context + * + * \param ctx      ARC4 context to be initialized + * + * \warning        ARC4 is considered a weak cipher and its use constitutes a + *                 security risk. We recommend considering stronger ciphers + *                 instead. + * + */ +void mbedtls_arc4_init( mbedtls_arc4_context *ctx ); + +/** + * \brief          Clear ARC4 context + * + * \param ctx      ARC4 context to be cleared + * + * \warning        ARC4 is considered a weak cipher and its use constitutes a + *                 security risk. We recommend considering stronger ciphers + *                 instead. + * + */ +void mbedtls_arc4_free( mbedtls_arc4_context *ctx ); + +/** + * \brief          ARC4 key schedule + * + * \param ctx      ARC4 context to be setup + * \param key      the secret key + * \param keylen   length of the key, in bytes + * + * \warning        ARC4 is considered a weak cipher and its use constitutes a + *                 security risk. We recommend considering stronger ciphers + *                 instead. + * + */ +void mbedtls_arc4_setup( mbedtls_arc4_context *ctx, const unsigned char *key, +                 unsigned int keylen ); + +/** + * \brief          ARC4 cipher function + * + * \param ctx      ARC4 context + * \param length   length of the input data + * \param input    buffer holding the input data + * \param output   buffer for the output data + * + * \return         0 if successful + * + * \warning        ARC4 is considered a weak cipher and its use constitutes a + *                 security risk. We recommend considering stronger ciphers + *                 instead. + * + */ +int mbedtls_arc4_crypt( mbedtls_arc4_context *ctx, size_t length, const unsigned char *input, +                unsigned char *output ); + +#ifdef __cplusplus +} +#endif + +#else  /* MBEDTLS_ARC4_ALT */ +#include "arc4_alt.h" +#endif /* MBEDTLS_ARC4_ALT */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          Checkup routine + * + * \return         0 if successful, or 1 if the test failed + * + * \warning        ARC4 is considered a weak cipher and its use constitutes a + *                 security risk. We recommend considering stronger ciphers + *                 instead. + * + */ +int mbedtls_arc4_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + +#endif /* arc4.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/asn1.h b/thirdparty/mbedtls/include/mbedtls/asn1.h new file mode 100644 index 0000000000..fde328a128 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/asn1.h @@ -0,0 +1,343 @@ +/** + * \file asn1.h + * + * \brief Generic ASN.1 parsing + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_ASN1_H +#define MBEDTLS_ASN1_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> + +#if defined(MBEDTLS_BIGNUM_C) +#include "bignum.h" +#endif + +/** + * \addtogroup asn1_module + * \{ + */ + +/** + * \name ASN1 Error codes + * These error codes are OR'ed to X509 error codes for + * higher error granularity. + * ASN1 is a standard to specify data structures. + * \{ + */ +#define MBEDTLS_ERR_ASN1_OUT_OF_DATA                      -0x0060  /**< Out of data when parsing an ASN1 data structure. */ +#define MBEDTLS_ERR_ASN1_UNEXPECTED_TAG                   -0x0062  /**< ASN1 tag was of an unexpected value. */ +#define MBEDTLS_ERR_ASN1_INVALID_LENGTH                   -0x0064  /**< Error when trying to determine the length or invalid length. */ +#define MBEDTLS_ERR_ASN1_LENGTH_MISMATCH                  -0x0066  /**< Actual length differs from expected length. */ +#define MBEDTLS_ERR_ASN1_INVALID_DATA                     -0x0068  /**< Data is invalid. (not used) */ +#define MBEDTLS_ERR_ASN1_ALLOC_FAILED                     -0x006A  /**< Memory allocation failed */ +#define MBEDTLS_ERR_ASN1_BUF_TOO_SMALL                    -0x006C  /**< Buffer too small when writing ASN.1 data structure. */ + +/* \} name */ + +/** + * \name DER constants + * These constants comply with the DER encoded ASN.1 type tags. + * DER encoding uses hexadecimal representation. + * An example DER sequence is:\n + * - 0x02 -- tag indicating INTEGER + * - 0x01 -- length in octets + * - 0x05 -- value + * Such sequences are typically read into \c ::mbedtls_x509_buf. + * \{ + */ +#define MBEDTLS_ASN1_BOOLEAN                 0x01 +#define MBEDTLS_ASN1_INTEGER                 0x02 +#define MBEDTLS_ASN1_BIT_STRING              0x03 +#define MBEDTLS_ASN1_OCTET_STRING            0x04 +#define MBEDTLS_ASN1_NULL                    0x05 +#define MBEDTLS_ASN1_OID                     0x06 +#define MBEDTLS_ASN1_UTF8_STRING             0x0C +#define MBEDTLS_ASN1_SEQUENCE                0x10 +#define MBEDTLS_ASN1_SET                     0x11 +#define MBEDTLS_ASN1_PRINTABLE_STRING        0x13 +#define MBEDTLS_ASN1_T61_STRING              0x14 +#define MBEDTLS_ASN1_IA5_STRING              0x16 +#define MBEDTLS_ASN1_UTC_TIME                0x17 +#define MBEDTLS_ASN1_GENERALIZED_TIME        0x18 +#define MBEDTLS_ASN1_UNIVERSAL_STRING        0x1C +#define MBEDTLS_ASN1_BMP_STRING              0x1E +#define MBEDTLS_ASN1_PRIMITIVE               0x00 +#define MBEDTLS_ASN1_CONSTRUCTED             0x20 +#define MBEDTLS_ASN1_CONTEXT_SPECIFIC        0x80 +/* \} name */ +/* \} addtogroup asn1_module */ + +/** Returns the size of the binary string, without the trailing \\0 */ +#define MBEDTLS_OID_SIZE(x) (sizeof(x) - 1) + +/** + * Compares an mbedtls_asn1_buf structure to a reference OID. + * + * Only works for 'defined' oid_str values (MBEDTLS_OID_HMAC_SHA1), you cannot use a + * 'unsigned char *oid' here! + */ +#define MBEDTLS_OID_CMP(oid_str, oid_buf)                                   \ +        ( ( MBEDTLS_OID_SIZE(oid_str) != (oid_buf)->len ) ||                \ +          memcmp( (oid_str), (oid_buf)->p, (oid_buf)->len) != 0 ) + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \name Functions to parse ASN.1 data structures + * \{ + */ + +/** + * Type-length-value structure that allows for ASN1 using DER. + */ +typedef struct mbedtls_asn1_buf +{ +    int tag;                /**< ASN1 type, e.g. MBEDTLS_ASN1_UTF8_STRING. */ +    size_t len;             /**< ASN1 length, in octets. */ +    unsigned char *p;       /**< ASN1 data, e.g. in ASCII. */ +} +mbedtls_asn1_buf; + +/** + * Container for ASN1 bit strings. + */ +typedef struct mbedtls_asn1_bitstring +{ +    size_t len;                 /**< ASN1 length, in octets. */ +    unsigned char unused_bits;  /**< Number of unused bits at the end of the string */ +    unsigned char *p;           /**< Raw ASN1 data for the bit string */ +} +mbedtls_asn1_bitstring; + +/** + * Container for a sequence of ASN.1 items + */ +typedef struct mbedtls_asn1_sequence +{ +    mbedtls_asn1_buf buf;                   /**< Buffer containing the given ASN.1 item. */ +    struct mbedtls_asn1_sequence *next;    /**< The next entry in the sequence. */ +} +mbedtls_asn1_sequence; + +/** + * Container for a sequence or list of 'named' ASN.1 data items + */ +typedef struct mbedtls_asn1_named_data +{ +    mbedtls_asn1_buf oid;                   /**< The object identifier. */ +    mbedtls_asn1_buf val;                   /**< The named value. */ +    struct mbedtls_asn1_named_data *next;  /**< The next entry in the sequence. */ +    unsigned char next_merged;      /**< Merge next item into the current one? */ +} +mbedtls_asn1_named_data; + +/** + * \brief       Get the length of an ASN.1 element. + *              Updates the pointer to immediately behind the length. + * + * \param p     The position in the ASN.1 data + * \param end   End of data + * \param len   The variable that will receive the value + * + * \return      0 if successful, MBEDTLS_ERR_ASN1_OUT_OF_DATA on reaching + *              end of data, MBEDTLS_ERR_ASN1_INVALID_LENGTH if length is + *              unparseable. + */ +int mbedtls_asn1_get_len( unsigned char **p, +                  const unsigned char *end, +                  size_t *len ); + +/** + * \brief       Get the tag and length of the tag. Check for the requested tag. + *              Updates the pointer to immediately behind the tag and length. + * + * \param p     The position in the ASN.1 data + * \param end   End of data + * \param len   The variable that will receive the length + * \param tag   The expected tag + * + * \return      0 if successful, MBEDTLS_ERR_ASN1_UNEXPECTED_TAG if tag did + *              not match requested tag, or another specific ASN.1 error code. + */ +int mbedtls_asn1_get_tag( unsigned char **p, +                  const unsigned char *end, +                  size_t *len, int tag ); + +/** + * \brief       Retrieve a boolean ASN.1 tag and its value. + *              Updates the pointer to immediately behind the full tag. + * + * \param p     The position in the ASN.1 data + * \param end   End of data + * \param val   The variable that will receive the value + * + * \return      0 if successful or a specific ASN.1 error code. + */ +int mbedtls_asn1_get_bool( unsigned char **p, +                   const unsigned char *end, +                   int *val ); + +/** + * \brief       Retrieve an integer ASN.1 tag and its value. + *              Updates the pointer to immediately behind the full tag. + * + * \param p     The position in the ASN.1 data + * \param end   End of data + * \param val   The variable that will receive the value + * + * \return      0 if successful or a specific ASN.1 error code. + */ +int mbedtls_asn1_get_int( unsigned char **p, +                  const unsigned char *end, +                  int *val ); + +/** + * \brief       Retrieve a bitstring ASN.1 tag and its value. + *              Updates the pointer to immediately behind the full tag. + * + * \param p     The position in the ASN.1 data + * \param end   End of data + * \param bs    The variable that will receive the value + * + * \return      0 if successful or a specific ASN.1 error code. + */ +int mbedtls_asn1_get_bitstring( unsigned char **p, const unsigned char *end, +                        mbedtls_asn1_bitstring *bs); + +/** + * \brief       Retrieve a bitstring ASN.1 tag without unused bits and its + *              value. + *              Updates the pointer to the beginning of the bit/octet string. + * + * \param p     The position in the ASN.1 data + * \param end   End of data + * \param len   Length of the actual bit/octect string in bytes + * + * \return      0 if successful or a specific ASN.1 error code. + */ +int mbedtls_asn1_get_bitstring_null( unsigned char **p, const unsigned char *end, +                             size_t *len ); + +/** + * \brief       Parses and splits an ASN.1 "SEQUENCE OF <tag>" + *              Updated the pointer to immediately behind the full sequence tag. + * + * \param p     The position in the ASN.1 data + * \param end   End of data + * \param cur   First variable in the chain to fill + * \param tag   Type of sequence + * + * \return      0 if successful or a specific ASN.1 error code. + */ +int mbedtls_asn1_get_sequence_of( unsigned char **p, +                          const unsigned char *end, +                          mbedtls_asn1_sequence *cur, +                          int tag); + +#if defined(MBEDTLS_BIGNUM_C) +/** + * \brief       Retrieve a MPI value from an integer ASN.1 tag. + *              Updates the pointer to immediately behind the full tag. + * + * \param p     The position in the ASN.1 data + * \param end   End of data + * \param X     The MPI that will receive the value + * + * \return      0 if successful or a specific ASN.1 or MPI error code. + */ +int mbedtls_asn1_get_mpi( unsigned char **p, +                  const unsigned char *end, +                  mbedtls_mpi *X ); +#endif /* MBEDTLS_BIGNUM_C */ + +/** + * \brief       Retrieve an AlgorithmIdentifier ASN.1 sequence. + *              Updates the pointer to immediately behind the full + *              AlgorithmIdentifier. + * + * \param p     The position in the ASN.1 data + * \param end   End of data + * \param alg   The buffer to receive the OID + * \param params The buffer to receive the params (if any) + * + * \return      0 if successful or a specific ASN.1 or MPI error code. + */ +int mbedtls_asn1_get_alg( unsigned char **p, +                  const unsigned char *end, +                  mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params ); + +/** + * \brief       Retrieve an AlgorithmIdentifier ASN.1 sequence with NULL or no + *              params. + *              Updates the pointer to immediately behind the full + *              AlgorithmIdentifier. + * + * \param p     The position in the ASN.1 data + * \param end   End of data + * \param alg   The buffer to receive the OID + * + * \return      0 if successful or a specific ASN.1 or MPI error code. + */ +int mbedtls_asn1_get_alg_null( unsigned char **p, +                       const unsigned char *end, +                       mbedtls_asn1_buf *alg ); + +/** + * \brief       Find a specific named_data entry in a sequence or list based on + *              the OID. + * + * \param list  The list to seek through + * \param oid   The OID to look for + * \param len   Size of the OID + * + * \return      NULL if not found, or a pointer to the existing entry. + */ +mbedtls_asn1_named_data *mbedtls_asn1_find_named_data( mbedtls_asn1_named_data *list, +                                       const char *oid, size_t len ); + +/** + * \brief       Free a mbedtls_asn1_named_data entry + * + * \param entry The named data entry to free + */ +void mbedtls_asn1_free_named_data( mbedtls_asn1_named_data *entry ); + +/** + * \brief       Free all entries in a mbedtls_asn1_named_data list + *              Head will be set to NULL + * + * \param head  Pointer to the head of the list of named data entries to free + */ +void mbedtls_asn1_free_named_data_list( mbedtls_asn1_named_data **head ); + +#ifdef __cplusplus +} +#endif + +#endif /* asn1.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/asn1write.h b/thirdparty/mbedtls/include/mbedtls/asn1write.h new file mode 100644 index 0000000000..f76fc807d0 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/asn1write.h @@ -0,0 +1,240 @@ +/** + * \file asn1write.h + * + * \brief ASN.1 buffer writing functionality + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_ASN1_WRITE_H +#define MBEDTLS_ASN1_WRITE_H + +#include "asn1.h" + +#define MBEDTLS_ASN1_CHK_ADD(g, f) do { if( ( ret = f ) < 0 ) return( ret ); else   \ +                                g += ret; } while( 0 ) + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief           Write a length field in ASN.1 format + *                  Note: function works backwards in data buffer + * + * \param p         reference to current position pointer + * \param start     start of the buffer (for bounds-checking) + * \param len       the length to write + * + * \return          the length written or a negative error code + */ +int mbedtls_asn1_write_len( unsigned char **p, unsigned char *start, size_t len ); + +/** + * \brief           Write a ASN.1 tag in ASN.1 format + *                  Note: function works backwards in data buffer + * + * \param p         reference to current position pointer + * \param start     start of the buffer (for bounds-checking) + * \param tag       the tag to write + * + * \return          the length written or a negative error code + */ +int mbedtls_asn1_write_tag( unsigned char **p, unsigned char *start, +                    unsigned char tag ); + +/** + * \brief           Write raw buffer data + *                  Note: function works backwards in data buffer + * + * \param p         reference to current position pointer + * \param start     start of the buffer (for bounds-checking) + * \param buf       data buffer to write + * \param size      length of the data buffer + * + * \return          the length written or a negative error code + */ +int mbedtls_asn1_write_raw_buffer( unsigned char **p, unsigned char *start, +                           const unsigned char *buf, size_t size ); + +#if defined(MBEDTLS_BIGNUM_C) +/** + * \brief           Write a big number (MBEDTLS_ASN1_INTEGER) in ASN.1 format + *                  Note: function works backwards in data buffer + * + * \param p         reference to current position pointer + * \param start     start of the buffer (for bounds-checking) + * \param X         the MPI to write + * + * \return          the length written or a negative error code + */ +int mbedtls_asn1_write_mpi( unsigned char **p, unsigned char *start, const mbedtls_mpi *X ); +#endif /* MBEDTLS_BIGNUM_C */ + +/** + * \brief           Write a NULL tag (MBEDTLS_ASN1_NULL) with zero data in ASN.1 format + *                  Note: function works backwards in data buffer + * + * \param p         reference to current position pointer + * \param start     start of the buffer (for bounds-checking) + * + * \return          the length written or a negative error code + */ +int mbedtls_asn1_write_null( unsigned char **p, unsigned char *start ); + +/** + * \brief           Write an OID tag (MBEDTLS_ASN1_OID) and data in ASN.1 format + *                  Note: function works backwards in data buffer + * + * \param p         reference to current position pointer + * \param start     start of the buffer (for bounds-checking) + * \param oid       the OID to write + * \param oid_len   length of the OID + * + * \return          the length written or a negative error code + */ +int mbedtls_asn1_write_oid( unsigned char **p, unsigned char *start, +                    const char *oid, size_t oid_len ); + +/** + * \brief           Write an AlgorithmIdentifier sequence in ASN.1 format + *                  Note: function works backwards in data buffer + * + * \param p         reference to current position pointer + * \param start     start of the buffer (for bounds-checking) + * \param oid       the OID of the algorithm + * \param oid_len   length of the OID + * \param par_len   length of parameters, which must be already written. + *                  If 0, NULL parameters are added + * + * \return          the length written or a negative error code + */ +int mbedtls_asn1_write_algorithm_identifier( unsigned char **p, unsigned char *start, +                                     const char *oid, size_t oid_len, +                                     size_t par_len ); + +/** + * \brief           Write a boolean tag (MBEDTLS_ASN1_BOOLEAN) and value in ASN.1 format + *                  Note: function works backwards in data buffer + * + * \param p         reference to current position pointer + * \param start     start of the buffer (for bounds-checking) + * \param boolean   0 or 1 + * + * \return          the length written or a negative error code + */ +int mbedtls_asn1_write_bool( unsigned char **p, unsigned char *start, int boolean ); + +/** + * \brief           Write an int tag (MBEDTLS_ASN1_INTEGER) and value in ASN.1 format + *                  Note: function works backwards in data buffer + * + * \param p         reference to current position pointer + * \param start     start of the buffer (for bounds-checking) + * \param val       the integer value + * + * \return          the length written or a negative error code + */ +int mbedtls_asn1_write_int( unsigned char **p, unsigned char *start, int val ); + +/** + * \brief           Write a printable string tag (MBEDTLS_ASN1_PRINTABLE_STRING) and + *                  value in ASN.1 format + *                  Note: function works backwards in data buffer + * + * \param p         reference to current position pointer + * \param start     start of the buffer (for bounds-checking) + * \param text      the text to write + * \param text_len  length of the text + * + * \return          the length written or a negative error code + */ +int mbedtls_asn1_write_printable_string( unsigned char **p, unsigned char *start, +                                 const char *text, size_t text_len ); + +/** + * \brief           Write an IA5 string tag (MBEDTLS_ASN1_IA5_STRING) and + *                  value in ASN.1 format + *                  Note: function works backwards in data buffer + * + * \param p         reference to current position pointer + * \param start     start of the buffer (for bounds-checking) + * \param text      the text to write + * \param text_len  length of the text + * + * \return          the length written or a negative error code + */ +int mbedtls_asn1_write_ia5_string( unsigned char **p, unsigned char *start, +                           const char *text, size_t text_len ); + +/** + * \brief           Write a bitstring tag (MBEDTLS_ASN1_BIT_STRING) and + *                  value in ASN.1 format + *                  Note: function works backwards in data buffer + * + * \param p         reference to current position pointer + * \param start     start of the buffer (for bounds-checking) + * \param buf       the bitstring + * \param bits      the total number of bits in the bitstring + * + * \return          the length written or a negative error code + */ +int mbedtls_asn1_write_bitstring( unsigned char **p, unsigned char *start, +                          const unsigned char *buf, size_t bits ); + +/** + * \brief           Write an octet string tag (MBEDTLS_ASN1_OCTET_STRING) and + *                  value in ASN.1 format + *                  Note: function works backwards in data buffer + * + * \param p         reference to current position pointer + * \param start     start of the buffer (for bounds-checking) + * \param buf       data buffer to write + * \param size      length of the data buffer + * + * \return          the length written or a negative error code + */ +int mbedtls_asn1_write_octet_string( unsigned char **p, unsigned char *start, +                             const unsigned char *buf, size_t size ); + +/** + * \brief           Create or find a specific named_data entry for writing in a + *                  sequence or list based on the OID. If not already in there, + *                  a new entry is added to the head of the list. + *                  Warning: Destructive behaviour for the val data! + * + * \param list      Pointer to the location of the head of the list to seek + *                  through (will be updated in case of a new entry) + * \param oid       The OID to look for + * \param oid_len   Size of the OID + * \param val       Data to store (can be NULL if you want to fill it by hand) + * \param val_len   Minimum length of the data buffer needed + * + * \return      NULL if if there was a memory allocation error, or a pointer + *              to the new / existing entry. + */ +mbedtls_asn1_named_data *mbedtls_asn1_store_named_data( mbedtls_asn1_named_data **list, +                                        const char *oid, size_t oid_len, +                                        const unsigned char *val, +                                        size_t val_len ); + +#ifdef __cplusplus +} +#endif + +#endif /* MBEDTLS_ASN1_WRITE_H */ diff --git a/thirdparty/mbedtls/include/mbedtls/base64.h b/thirdparty/mbedtls/include/mbedtls/base64.h new file mode 100644 index 0000000000..7a64f52163 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/base64.h @@ -0,0 +1,89 @@ +/** + * \file base64.h + * + * \brief RFC 1521 base64 encoding/decoding + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_BASE64_H +#define MBEDTLS_BASE64_H + +#include <stddef.h> + +#define MBEDTLS_ERR_BASE64_BUFFER_TOO_SMALL               -0x002A  /**< Output buffer too small. */ +#define MBEDTLS_ERR_BASE64_INVALID_CHARACTER              -0x002C  /**< Invalid character in input. */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          Encode a buffer into base64 format + * + * \param dst      destination buffer + * \param dlen     size of the destination buffer + * \param olen     number of bytes written + * \param src      source buffer + * \param slen     amount of data to be encoded + * + * \return         0 if successful, or MBEDTLS_ERR_BASE64_BUFFER_TOO_SMALL. + *                 *olen is always updated to reflect the amount + *                 of data that has (or would have) been written. + *                 If that length cannot be represented, then no data is + *                 written to the buffer and *olen is set to the maximum + *                 length representable as a size_t. + * + * \note           Call this function with dlen = 0 to obtain the + *                 required buffer size in *olen + */ +int mbedtls_base64_encode( unsigned char *dst, size_t dlen, size_t *olen, +                   const unsigned char *src, size_t slen ); + +/** + * \brief          Decode a base64-formatted buffer + * + * \param dst      destination buffer (can be NULL for checking size) + * \param dlen     size of the destination buffer + * \param olen     number of bytes written + * \param src      source buffer + * \param slen     amount of data to be decoded + * + * \return         0 if successful, MBEDTLS_ERR_BASE64_BUFFER_TOO_SMALL, or + *                 MBEDTLS_ERR_BASE64_INVALID_CHARACTER if the input data is + *                 not correct. *olen is always updated to reflect the amount + *                 of data that has (or would have) been written. + * + * \note           Call this function with *dst = NULL or dlen = 0 to obtain + *                 the required buffer size in *olen + */ +int mbedtls_base64_decode( unsigned char *dst, size_t dlen, size_t *olen, +                   const unsigned char *src, size_t slen ); + +/** + * \brief          Checkup routine + * + * \return         0 if successful, or 1 if the test failed + */ +int mbedtls_base64_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + +#endif /* base64.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/bignum.h b/thirdparty/mbedtls/include/mbedtls/bignum.h new file mode 100644 index 0000000000..3bf02a7ee1 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/bignum.h @@ -0,0 +1,766 @@ +/** + * \file bignum.h + * + * \brief Multi-precision integer library + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_BIGNUM_H +#define MBEDTLS_BIGNUM_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> +#include <stdint.h> + +#if defined(MBEDTLS_FS_IO) +#include <stdio.h> +#endif + +#define MBEDTLS_ERR_MPI_FILE_IO_ERROR                     -0x0002  /**< An error occurred while reading from or writing to a file. */ +#define MBEDTLS_ERR_MPI_BAD_INPUT_DATA                    -0x0004  /**< Bad input parameters to function. */ +#define MBEDTLS_ERR_MPI_INVALID_CHARACTER                 -0x0006  /**< There is an invalid character in the digit string. */ +#define MBEDTLS_ERR_MPI_BUFFER_TOO_SMALL                  -0x0008  /**< The buffer is too small to write to. */ +#define MBEDTLS_ERR_MPI_NEGATIVE_VALUE                    -0x000A  /**< The input arguments are negative or result in illegal output. */ +#define MBEDTLS_ERR_MPI_DIVISION_BY_ZERO                  -0x000C  /**< The input argument for division is zero, which is not allowed. */ +#define MBEDTLS_ERR_MPI_NOT_ACCEPTABLE                    -0x000E  /**< The input arguments are not acceptable. */ +#define MBEDTLS_ERR_MPI_ALLOC_FAILED                      -0x0010  /**< Memory allocation failed. */ + +#define MBEDTLS_MPI_CHK(f) do { if( ( ret = f ) != 0 ) goto cleanup; } while( 0 ) + +/* + * Maximum size MPIs are allowed to grow to in number of limbs. + */ +#define MBEDTLS_MPI_MAX_LIMBS                             10000 + +#if !defined(MBEDTLS_MPI_WINDOW_SIZE) +/* + * Maximum window size used for modular exponentiation. Default: 6 + * Minimum value: 1. Maximum value: 6. + * + * Result is an array of ( 2 << MBEDTLS_MPI_WINDOW_SIZE ) MPIs used + * for the sliding window calculation. (So 64 by default) + * + * Reduction in size, reduces speed. + */ +#define MBEDTLS_MPI_WINDOW_SIZE                           6        /**< Maximum windows size used. */ +#endif /* !MBEDTLS_MPI_WINDOW_SIZE */ + +#if !defined(MBEDTLS_MPI_MAX_SIZE) +/* + * Maximum size of MPIs allowed in bits and bytes for user-MPIs. + * ( Default: 512 bytes => 4096 bits, Maximum tested: 2048 bytes => 16384 bits ) + * + * Note: Calculations can temporarily result in larger MPIs. So the number + * of limbs required (MBEDTLS_MPI_MAX_LIMBS) is higher. + */ +#define MBEDTLS_MPI_MAX_SIZE                              1024     /**< Maximum number of bytes for usable MPIs. */ +#endif /* !MBEDTLS_MPI_MAX_SIZE */ + +#define MBEDTLS_MPI_MAX_BITS                              ( 8 * MBEDTLS_MPI_MAX_SIZE )    /**< Maximum number of bits for usable MPIs. */ + +/* + * When reading from files with mbedtls_mpi_read_file() and writing to files with + * mbedtls_mpi_write_file() the buffer should have space + * for a (short) label, the MPI (in the provided radix), the newline + * characters and the '\0'. + * + * By default we assume at least a 10 char label, a minimum radix of 10 + * (decimal) and a maximum of 4096 bit numbers (1234 decimal chars). + * Autosized at compile time for at least a 10 char label, a minimum radix + * of 10 (decimal) for a number of MBEDTLS_MPI_MAX_BITS size. + * + * This used to be statically sized to 1250 for a maximum of 4096 bit + * numbers (1234 decimal chars). + * + * Calculate using the formula: + *  MBEDTLS_MPI_RW_BUFFER_SIZE = ceil(MBEDTLS_MPI_MAX_BITS / ln(10) * ln(2)) + + *                                LabelSize + 6 + */ +#define MBEDTLS_MPI_MAX_BITS_SCALE100          ( 100 * MBEDTLS_MPI_MAX_BITS ) +#define MBEDTLS_LN_2_DIV_LN_10_SCALE100                 332 +#define MBEDTLS_MPI_RW_BUFFER_SIZE             ( ((MBEDTLS_MPI_MAX_BITS_SCALE100 + MBEDTLS_LN_2_DIV_LN_10_SCALE100 - 1) / MBEDTLS_LN_2_DIV_LN_10_SCALE100) + 10 + 6 ) + +/* + * Define the base integer type, architecture-wise. + * + * 32 or 64-bit integer types can be forced regardless of the underlying + * architecture by defining MBEDTLS_HAVE_INT32 or MBEDTLS_HAVE_INT64 + * respectively and undefining MBEDTLS_HAVE_ASM. + * + * Double-width integers (e.g. 128-bit in 64-bit architectures) can be + * disabled by defining MBEDTLS_NO_UDBL_DIVISION. + */ +#if !defined(MBEDTLS_HAVE_INT32) +    #if defined(_MSC_VER) && defined(_M_AMD64) +        /* Always choose 64-bit when using MSC */ +        #if !defined(MBEDTLS_HAVE_INT64) +            #define MBEDTLS_HAVE_INT64 +        #endif /* !MBEDTLS_HAVE_INT64 */ +        typedef  int64_t mbedtls_mpi_sint; +        typedef uint64_t mbedtls_mpi_uint; +    #elif defined(__GNUC__) && (                         \ +        defined(__amd64__) || defined(__x86_64__)     || \ +        defined(__ppc64__) || defined(__powerpc64__)  || \ +        defined(__ia64__)  || defined(__alpha__)      || \ +        ( defined(__sparc__) && defined(__arch64__) ) || \ +        defined(__s390x__) || defined(__mips64) ) +        #if !defined(MBEDTLS_HAVE_INT64) +            #define MBEDTLS_HAVE_INT64 +        #endif /* MBEDTLS_HAVE_INT64 */ +        typedef  int64_t mbedtls_mpi_sint; +        typedef uint64_t mbedtls_mpi_uint; +        #if !defined(MBEDTLS_NO_UDBL_DIVISION) +            /* mbedtls_t_udbl defined as 128-bit unsigned int */ +            typedef unsigned int mbedtls_t_udbl __attribute__((mode(TI))); +            #define MBEDTLS_HAVE_UDBL +        #endif /* !MBEDTLS_NO_UDBL_DIVISION */ +    #elif defined(__ARMCC_VERSION) && defined(__aarch64__) +        /* +         * __ARMCC_VERSION is defined for both armcc and armclang and +         * __aarch64__ is only defined by armclang when compiling 64-bit code +         */ +        #if !defined(MBEDTLS_HAVE_INT64) +            #define MBEDTLS_HAVE_INT64 +        #endif /* !MBEDTLS_HAVE_INT64 */ +        typedef  int64_t mbedtls_mpi_sint; +        typedef uint64_t mbedtls_mpi_uint; +        #if !defined(MBEDTLS_NO_UDBL_DIVISION) +            /* mbedtls_t_udbl defined as 128-bit unsigned int */ +            typedef __uint128_t mbedtls_t_udbl; +            #define MBEDTLS_HAVE_UDBL +        #endif /* !MBEDTLS_NO_UDBL_DIVISION */ +    #elif defined(MBEDTLS_HAVE_INT64) +        /* Force 64-bit integers with unknown compiler */ +        typedef  int64_t mbedtls_mpi_sint; +        typedef uint64_t mbedtls_mpi_uint; +    #endif +#endif /* !MBEDTLS_HAVE_INT32 */ + +#if !defined(MBEDTLS_HAVE_INT64) +    /* Default to 32-bit compilation */ +    #if !defined(MBEDTLS_HAVE_INT32) +        #define MBEDTLS_HAVE_INT32 +    #endif /* !MBEDTLS_HAVE_INT32 */ +    typedef  int32_t mbedtls_mpi_sint; +    typedef uint32_t mbedtls_mpi_uint; +    #if !defined(MBEDTLS_NO_UDBL_DIVISION) +        typedef uint64_t mbedtls_t_udbl; +        #define MBEDTLS_HAVE_UDBL +    #endif /* !MBEDTLS_NO_UDBL_DIVISION */ +#endif /* !MBEDTLS_HAVE_INT64 */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          MPI structure + */ +typedef struct +{ +    int s;              /*!<  integer sign      */ +    size_t n;           /*!<  total # of limbs  */ +    mbedtls_mpi_uint *p;          /*!<  pointer to limbs  */ +} +mbedtls_mpi; + +/** + * \brief           Initialize one MPI (make internal references valid) + *                  This just makes it ready to be set or freed, + *                  but does not define a value for the MPI. + * + * \param X         One MPI to initialize. + */ +void mbedtls_mpi_init( mbedtls_mpi *X ); + +/** + * \brief          Unallocate one MPI + * + * \param X        One MPI to unallocate. + */ +void mbedtls_mpi_free( mbedtls_mpi *X ); + +/** + * \brief          Enlarge to the specified number of limbs + * + * \param X        MPI to grow + * \param nblimbs  The target number of limbs + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_mpi_grow( mbedtls_mpi *X, size_t nblimbs ); + +/** + * \brief          Resize down, keeping at least the specified number of limbs + * + * \param X        MPI to shrink + * \param nblimbs  The minimum number of limbs to keep + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_mpi_shrink( mbedtls_mpi *X, size_t nblimbs ); + +/** + * \brief          Copy the contents of Y into X + * + * \param X        Destination MPI + * \param Y        Source MPI + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_mpi_copy( mbedtls_mpi *X, const mbedtls_mpi *Y ); + +/** + * \brief          Swap the contents of X and Y + * + * \param X        First MPI value + * \param Y        Second MPI value + */ +void mbedtls_mpi_swap( mbedtls_mpi *X, mbedtls_mpi *Y ); + +/** + * \brief          Safe conditional assignement X = Y if assign is 1 + * + * \param X        MPI to conditionally assign to + * \param Y        Value to be assigned + * \param assign   1: perform the assignment, 0: keep X's original value + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed, + * + * \note           This function is equivalent to + *                      if( assign ) mbedtls_mpi_copy( X, Y ); + *                 except that it avoids leaking any information about whether + *                 the assignment was done or not (the above code may leak + *                 information through branch prediction and/or memory access + *                 patterns analysis). + */ +int mbedtls_mpi_safe_cond_assign( mbedtls_mpi *X, const mbedtls_mpi *Y, unsigned char assign ); + +/** + * \brief          Safe conditional swap X <-> Y if swap is 1 + * + * \param X        First mbedtls_mpi value + * \param Y        Second mbedtls_mpi value + * \param assign   1: perform the swap, 0: keep X and Y's original values + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed, + * + * \note           This function is equivalent to + *                      if( assign ) mbedtls_mpi_swap( X, Y ); + *                 except that it avoids leaking any information about whether + *                 the assignment was done or not (the above code may leak + *                 information through branch prediction and/or memory access + *                 patterns analysis). + */ +int mbedtls_mpi_safe_cond_swap( mbedtls_mpi *X, mbedtls_mpi *Y, unsigned char assign ); + +/** + * \brief          Set value from integer + * + * \param X        MPI to set + * \param z        Value to use + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_mpi_lset( mbedtls_mpi *X, mbedtls_mpi_sint z ); + +/** + * \brief          Get a specific bit from X + * + * \param X        MPI to use + * \param pos      Zero-based index of the bit in X + * + * \return         Either a 0 or a 1 + */ +int mbedtls_mpi_get_bit( const mbedtls_mpi *X, size_t pos ); + +/** + * \brief          Set a bit of X to a specific value of 0 or 1 + * + * \note           Will grow X if necessary to set a bit to 1 in a not yet + *                 existing limb. Will not grow if bit should be set to 0 + * + * \param X        MPI to use + * \param pos      Zero-based index of the bit in X + * \param val      The value to set the bit to (0 or 1) + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed, + *                 MBEDTLS_ERR_MPI_BAD_INPUT_DATA if val is not 0 or 1 + */ +int mbedtls_mpi_set_bit( mbedtls_mpi *X, size_t pos, unsigned char val ); + +/** + * \brief          Return the number of zero-bits before the least significant + *                 '1' bit + * + * Note: Thus also the zero-based index of the least significant '1' bit + * + * \param X        MPI to use + */ +size_t mbedtls_mpi_lsb( const mbedtls_mpi *X ); + +/** + * \brief          Return the number of bits up to and including the most + *                 significant '1' bit' + * + * Note: Thus also the one-based index of the most significant '1' bit + * + * \param X        MPI to use + */ +size_t mbedtls_mpi_bitlen( const mbedtls_mpi *X ); + +/** + * \brief          Return the total size in bytes + * + * \param X        MPI to use + */ +size_t mbedtls_mpi_size( const mbedtls_mpi *X ); + +/** + * \brief          Import from an ASCII string + * + * \param X        Destination MPI + * \param radix    Input numeric base + * \param s        Null-terminated string buffer + * + * \return         0 if successful, or a MBEDTLS_ERR_MPI_XXX error code + */ +int mbedtls_mpi_read_string( mbedtls_mpi *X, int radix, const char *s ); + +/** + * \brief          Export into an ASCII string + * + * \param X        Source MPI + * \param radix    Output numeric base + * \param buf      Buffer to write the string to + * \param buflen   Length of buf + * \param olen     Length of the string written, including final NUL byte + * + * \return         0 if successful, or a MBEDTLS_ERR_MPI_XXX error code. + *                 *olen is always updated to reflect the amount + *                 of data that has (or would have) been written. + * + * \note           Call this function with buflen = 0 to obtain the + *                 minimum required buffer size in *olen. + */ +int mbedtls_mpi_write_string( const mbedtls_mpi *X, int radix, +                              char *buf, size_t buflen, size_t *olen ); + +#if defined(MBEDTLS_FS_IO) +/** + * \brief          Read MPI from a line in an opened file + * + * \param X        Destination MPI + * \param radix    Input numeric base + * \param fin      Input file handle + * + * \return         0 if successful, MBEDTLS_ERR_MPI_BUFFER_TOO_SMALL if + *                 the file read buffer is too small or a + *                 MBEDTLS_ERR_MPI_XXX error code + * + * \note           On success, this function advances the file stream + *                 to the end of the current line or to EOF. + * + *                 The function returns 0 on an empty line. + * + *                 Leading whitespaces are ignored, as is a + *                 '0x' prefix for radix 16. + * + */ +int mbedtls_mpi_read_file( mbedtls_mpi *X, int radix, FILE *fin ); + +/** + * \brief          Write X into an opened file, or stdout if fout is NULL + * + * \param p        Prefix, can be NULL + * \param X        Source MPI + * \param radix    Output numeric base + * \param fout     Output file handle (can be NULL) + * + * \return         0 if successful, or a MBEDTLS_ERR_MPI_XXX error code + * + * \note           Set fout == NULL to print X on the console. + */ +int mbedtls_mpi_write_file( const char *p, const mbedtls_mpi *X, int radix, FILE *fout ); +#endif /* MBEDTLS_FS_IO */ + +/** + * \brief          Import X from unsigned binary data, big endian + * + * \param X        Destination MPI + * \param buf      Input buffer + * \param buflen   Input buffer size + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_mpi_read_binary( mbedtls_mpi *X, const unsigned char *buf, size_t buflen ); + +/** + * \brief          Export X into unsigned binary data, big endian. + *                 Always fills the whole buffer, which will start with zeros + *                 if the number is smaller. + * + * \param X        Source MPI + * \param buf      Output buffer + * \param buflen   Output buffer size + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_BUFFER_TOO_SMALL if buf isn't large enough + */ +int mbedtls_mpi_write_binary( const mbedtls_mpi *X, unsigned char *buf, size_t buflen ); + +/** + * \brief          Left-shift: X <<= count + * + * \param X        MPI to shift + * \param count    Amount to shift + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_mpi_shift_l( mbedtls_mpi *X, size_t count ); + +/** + * \brief          Right-shift: X >>= count + * + * \param X        MPI to shift + * \param count    Amount to shift + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_mpi_shift_r( mbedtls_mpi *X, size_t count ); + +/** + * \brief          Compare unsigned values + * + * \param X        Left-hand MPI + * \param Y        Right-hand MPI + * + * \return         1 if |X| is greater than |Y|, + *                -1 if |X| is lesser  than |Y| or + *                 0 if |X| is equal to |Y| + */ +int mbedtls_mpi_cmp_abs( const mbedtls_mpi *X, const mbedtls_mpi *Y ); + +/** + * \brief          Compare signed values + * + * \param X        Left-hand MPI + * \param Y        Right-hand MPI + * + * \return         1 if X is greater than Y, + *                -1 if X is lesser  than Y or + *                 0 if X is equal to Y + */ +int mbedtls_mpi_cmp_mpi( const mbedtls_mpi *X, const mbedtls_mpi *Y ); + +/** + * \brief          Compare signed values + * + * \param X        Left-hand MPI + * \param z        The integer value to compare to + * + * \return         1 if X is greater than z, + *                -1 if X is lesser  than z or + *                 0 if X is equal to z + */ +int mbedtls_mpi_cmp_int( const mbedtls_mpi *X, mbedtls_mpi_sint z ); + +/** + * \brief          Unsigned addition: X = |A| + |B| + * + * \param X        Destination MPI + * \param A        Left-hand MPI + * \param B        Right-hand MPI + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_mpi_add_abs( mbedtls_mpi *X, const mbedtls_mpi *A, const mbedtls_mpi *B ); + +/** + * \brief          Unsigned subtraction: X = |A| - |B| + * + * \param X        Destination MPI + * \param A        Left-hand MPI + * \param B        Right-hand MPI + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_NEGATIVE_VALUE if B is greater than A + */ +int mbedtls_mpi_sub_abs( mbedtls_mpi *X, const mbedtls_mpi *A, const mbedtls_mpi *B ); + +/** + * \brief          Signed addition: X = A + B + * + * \param X        Destination MPI + * \param A        Left-hand MPI + * \param B        Right-hand MPI + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_mpi_add_mpi( mbedtls_mpi *X, const mbedtls_mpi *A, const mbedtls_mpi *B ); + +/** + * \brief          Signed subtraction: X = A - B + * + * \param X        Destination MPI + * \param A        Left-hand MPI + * \param B        Right-hand MPI + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_mpi_sub_mpi( mbedtls_mpi *X, const mbedtls_mpi *A, const mbedtls_mpi *B ); + +/** + * \brief          Signed addition: X = A + b + * + * \param X        Destination MPI + * \param A        Left-hand MPI + * \param b        The integer value to add + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_mpi_add_int( mbedtls_mpi *X, const mbedtls_mpi *A, mbedtls_mpi_sint b ); + +/** + * \brief          Signed subtraction: X = A - b + * + * \param X        Destination MPI + * \param A        Left-hand MPI + * \param b        The integer value to subtract + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_mpi_sub_int( mbedtls_mpi *X, const mbedtls_mpi *A, mbedtls_mpi_sint b ); + +/** + * \brief          Baseline multiplication: X = A * B + * + * \param X        Destination MPI + * \param A        Left-hand MPI + * \param B        Right-hand MPI + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_mpi_mul_mpi( mbedtls_mpi *X, const mbedtls_mpi *A, const mbedtls_mpi *B ); + +/** + * \brief          Baseline multiplication: X = A * b + * + * \param X        Destination MPI + * \param A        Left-hand MPI + * \param b        The unsigned integer value to multiply with + * + * \note           b is unsigned + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_mpi_mul_int( mbedtls_mpi *X, const mbedtls_mpi *A, mbedtls_mpi_uint b ); + +/** + * \brief          Division by mbedtls_mpi: A = Q * B + R + * + * \param Q        Destination MPI for the quotient + * \param R        Destination MPI for the rest value + * \param A        Left-hand MPI + * \param B        Right-hand MPI + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed, + *                 MBEDTLS_ERR_MPI_DIVISION_BY_ZERO if B == 0 + * + * \note           Either Q or R can be NULL. + */ +int mbedtls_mpi_div_mpi( mbedtls_mpi *Q, mbedtls_mpi *R, const mbedtls_mpi *A, const mbedtls_mpi *B ); + +/** + * \brief          Division by int: A = Q * b + R + * + * \param Q        Destination MPI for the quotient + * \param R        Destination MPI for the rest value + * \param A        Left-hand MPI + * \param b        Integer to divide by + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed, + *                 MBEDTLS_ERR_MPI_DIVISION_BY_ZERO if b == 0 + * + * \note           Either Q or R can be NULL. + */ +int mbedtls_mpi_div_int( mbedtls_mpi *Q, mbedtls_mpi *R, const mbedtls_mpi *A, mbedtls_mpi_sint b ); + +/** + * \brief          Modulo: R = A mod B + * + * \param R        Destination MPI for the rest value + * \param A        Left-hand MPI + * \param B        Right-hand MPI + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed, + *                 MBEDTLS_ERR_MPI_DIVISION_BY_ZERO if B == 0, + *                 MBEDTLS_ERR_MPI_NEGATIVE_VALUE if B < 0 + */ +int mbedtls_mpi_mod_mpi( mbedtls_mpi *R, const mbedtls_mpi *A, const mbedtls_mpi *B ); + +/** + * \brief          Modulo: r = A mod b + * + * \param r        Destination mbedtls_mpi_uint + * \param A        Left-hand MPI + * \param b        Integer to divide by + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed, + *                 MBEDTLS_ERR_MPI_DIVISION_BY_ZERO if b == 0, + *                 MBEDTLS_ERR_MPI_NEGATIVE_VALUE if b < 0 + */ +int mbedtls_mpi_mod_int( mbedtls_mpi_uint *r, const mbedtls_mpi *A, mbedtls_mpi_sint b ); + +/** + * \brief          Sliding-window exponentiation: X = A^E mod N + * + * \param X        Destination MPI + * \param A        Left-hand MPI + * \param E        Exponent MPI + * \param N        Modular MPI + * \param _RR      Speed-up MPI used for recalculations + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed, + *                 MBEDTLS_ERR_MPI_BAD_INPUT_DATA if N is negative or even or + *                 if E is negative + * + * \note           _RR is used to avoid re-computing R*R mod N across + *                 multiple calls, which speeds up things a bit. It can + *                 be set to NULL if the extra performance is unneeded. + */ +int mbedtls_mpi_exp_mod( mbedtls_mpi *X, const mbedtls_mpi *A, const mbedtls_mpi *E, const mbedtls_mpi *N, mbedtls_mpi *_RR ); + +/** + * \brief          Fill an MPI X with size bytes of random + * + * \param X        Destination MPI + * \param size     Size in bytes + * \param f_rng    RNG function + * \param p_rng    RNG parameter + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + * + * \note           The bytes obtained from the PRNG are interpreted + *                 as a big-endian representation of an MPI; this can + *                 be relevant in applications like deterministic ECDSA. + */ +int mbedtls_mpi_fill_random( mbedtls_mpi *X, size_t size, +                     int (*f_rng)(void *, unsigned char *, size_t), +                     void *p_rng ); + +/** + * \brief          Greatest common divisor: G = gcd(A, B) + * + * \param G        Destination MPI + * \param A        Left-hand MPI + * \param B        Right-hand MPI + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_mpi_gcd( mbedtls_mpi *G, const mbedtls_mpi *A, const mbedtls_mpi *B ); + +/** + * \brief          Modular inverse: X = A^-1 mod N + * + * \param X        Destination MPI + * \param A        Left-hand MPI + * \param N        Right-hand MPI + * + * \return         0 if successful, + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed, + *                 MBEDTLS_ERR_MPI_BAD_INPUT_DATA if N is <= 1, +                   MBEDTLS_ERR_MPI_NOT_ACCEPTABLE if A has no inverse mod N. + */ +int mbedtls_mpi_inv_mod( mbedtls_mpi *X, const mbedtls_mpi *A, const mbedtls_mpi *N ); + +/** + * \brief          Miller-Rabin primality test + * + * \param X        MPI to check + * \param f_rng    RNG function + * \param p_rng    RNG parameter + * + * \return         0 if successful (probably prime), + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed, + *                 MBEDTLS_ERR_MPI_NOT_ACCEPTABLE if X is not prime + */ +int mbedtls_mpi_is_prime( const mbedtls_mpi *X, +                  int (*f_rng)(void *, unsigned char *, size_t), +                  void *p_rng ); + +/** + * \brief          Prime number generation + * + * \param X        Destination MPI + * \param nbits    Required size of X in bits + *                 ( 3 <= nbits <= MBEDTLS_MPI_MAX_BITS ) + * \param dh_flag  If 1, then (X-1)/2 will be prime too + * \param f_rng    RNG function + * \param p_rng    RNG parameter + * + * \return         0 if successful (probably prime), + *                 MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed, + *                 MBEDTLS_ERR_MPI_BAD_INPUT_DATA if nbits is < 3 + */ +int mbedtls_mpi_gen_prime( mbedtls_mpi *X, size_t nbits, int dh_flag, +                   int (*f_rng)(void *, unsigned char *, size_t), +                   void *p_rng ); + +/** + * \brief          Checkup routine + * + * \return         0 if successful, or 1 if the test failed + */ +int mbedtls_mpi_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + +#endif /* bignum.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/blowfish.h b/thirdparty/mbedtls/include/mbedtls/blowfish.h new file mode 100644 index 0000000000..c0ef5a04cc --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/blowfish.h @@ -0,0 +1,205 @@ +/** + * \file blowfish.h + * + * \brief Blowfish block cipher + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_BLOWFISH_H +#define MBEDTLS_BLOWFISH_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> +#include <stdint.h> + +#define MBEDTLS_BLOWFISH_ENCRYPT     1 +#define MBEDTLS_BLOWFISH_DECRYPT     0 +#define MBEDTLS_BLOWFISH_MAX_KEY_BITS     448 +#define MBEDTLS_BLOWFISH_MIN_KEY_BITS     32 +#define MBEDTLS_BLOWFISH_ROUNDS      16         /**< Rounds to use. When increasing this value, make sure to extend the initialisation vectors */ +#define MBEDTLS_BLOWFISH_BLOCKSIZE   8          /* Blowfish uses 64 bit blocks */ + +#define MBEDTLS_ERR_BLOWFISH_INVALID_KEY_LENGTH                -0x0016  /**< Invalid key length. */ +#define MBEDTLS_ERR_BLOWFISH_HW_ACCEL_FAILED                   -0x0017  /**< Blowfish hardware accelerator failed. */ +#define MBEDTLS_ERR_BLOWFISH_INVALID_INPUT_LENGTH              -0x0018  /**< Invalid data input length. */ + +#if !defined(MBEDTLS_BLOWFISH_ALT) +// Regular implementation +// + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          Blowfish context structure + */ +typedef struct +{ +    uint32_t P[MBEDTLS_BLOWFISH_ROUNDS + 2];    /*!<  Blowfish round keys    */ +    uint32_t S[4][256];                 /*!<  key dependent S-boxes  */ +} +mbedtls_blowfish_context; + +/** + * \brief          Initialize Blowfish context + * + * \param ctx      Blowfish context to be initialized + */ +void mbedtls_blowfish_init( mbedtls_blowfish_context *ctx ); + +/** + * \brief          Clear Blowfish context + * + * \param ctx      Blowfish context to be cleared + */ +void mbedtls_blowfish_free( mbedtls_blowfish_context *ctx ); + +/** + * \brief          Blowfish key schedule + * + * \param ctx      Blowfish context to be initialized + * \param key      encryption key + * \param keybits  must be between 32 and 448 bits + * + * \return         0 if successful, or MBEDTLS_ERR_BLOWFISH_INVALID_KEY_LENGTH + */ +int mbedtls_blowfish_setkey( mbedtls_blowfish_context *ctx, const unsigned char *key, +                     unsigned int keybits ); + +/** + * \brief          Blowfish-ECB block encryption/decryption + * + * \param ctx      Blowfish context + * \param mode     MBEDTLS_BLOWFISH_ENCRYPT or MBEDTLS_BLOWFISH_DECRYPT + * \param input    8-byte input block + * \param output   8-byte output block + * + * \return         0 if successful + */ +int mbedtls_blowfish_crypt_ecb( mbedtls_blowfish_context *ctx, +                        int mode, +                        const unsigned char input[MBEDTLS_BLOWFISH_BLOCKSIZE], +                        unsigned char output[MBEDTLS_BLOWFISH_BLOCKSIZE] ); + +#if defined(MBEDTLS_CIPHER_MODE_CBC) +/** + * \brief          Blowfish-CBC buffer encryption/decryption + *                 Length should be a multiple of the block + *                 size (8 bytes) + * + * \note           Upon exit, the content of the IV is updated so that you can + *                 call the function same function again on the following + *                 block(s) of data and get the same result as if it was + *                 encrypted in one call. This allows a "streaming" usage. + *                 If on the other hand you need to retain the contents of the + *                 IV, you should either save it manually or use the cipher + *                 module instead. + * + * \param ctx      Blowfish context + * \param mode     MBEDTLS_BLOWFISH_ENCRYPT or MBEDTLS_BLOWFISH_DECRYPT + * \param length   length of the input data + * \param iv       initialization vector (updated after use) + * \param input    buffer holding the input data + * \param output   buffer holding the output data + * + * \return         0 if successful, or + *                 MBEDTLS_ERR_BLOWFISH_INVALID_INPUT_LENGTH + */ +int mbedtls_blowfish_crypt_cbc( mbedtls_blowfish_context *ctx, +                        int mode, +                        size_t length, +                        unsigned char iv[MBEDTLS_BLOWFISH_BLOCKSIZE], +                        const unsigned char *input, +                        unsigned char *output ); +#endif /* MBEDTLS_CIPHER_MODE_CBC */ + +#if defined(MBEDTLS_CIPHER_MODE_CFB) +/** + * \brief          Blowfish CFB buffer encryption/decryption. + * + * \note           Upon exit, the content of the IV is updated so that you can + *                 call the function same function again on the following + *                 block(s) of data and get the same result as if it was + *                 encrypted in one call. This allows a "streaming" usage. + *                 If on the other hand you need to retain the contents of the + *                 IV, you should either save it manually or use the cipher + *                 module instead. + * + * \param ctx      Blowfish context + * \param mode     MBEDTLS_BLOWFISH_ENCRYPT or MBEDTLS_BLOWFISH_DECRYPT + * \param length   length of the input data + * \param iv_off   offset in IV (updated after use) + * \param iv       initialization vector (updated after use) + * \param input    buffer holding the input data + * \param output   buffer holding the output data + * + * \return         0 if successful + */ +int mbedtls_blowfish_crypt_cfb64( mbedtls_blowfish_context *ctx, +                          int mode, +                          size_t length, +                          size_t *iv_off, +                          unsigned char iv[MBEDTLS_BLOWFISH_BLOCKSIZE], +                          const unsigned char *input, +                          unsigned char *output ); +#endif /*MBEDTLS_CIPHER_MODE_CFB */ + +#if defined(MBEDTLS_CIPHER_MODE_CTR) +/** + * \brief               Blowfish-CTR buffer encryption/decryption + * + * Warning: You have to keep the maximum use of your counter in mind! + * + * \param ctx           Blowfish context + * \param length        The length of the data + * \param nc_off        The offset in the current stream_block (for resuming + *                      within current cipher stream). The offset pointer to + *                      should be 0 at the start of a stream. + * \param nonce_counter The 64-bit nonce and counter. + * \param stream_block  The saved stream-block for resuming. Is overwritten + *                      by the function. + * \param input         The input data stream + * \param output        The output data stream + * + * \return         0 if successful + */ +int mbedtls_blowfish_crypt_ctr( mbedtls_blowfish_context *ctx, +                        size_t length, +                        size_t *nc_off, +                        unsigned char nonce_counter[MBEDTLS_BLOWFISH_BLOCKSIZE], +                        unsigned char stream_block[MBEDTLS_BLOWFISH_BLOCKSIZE], +                        const unsigned char *input, +                        unsigned char *output ); +#endif /* MBEDTLS_CIPHER_MODE_CTR */ + +#ifdef __cplusplus +} +#endif + +#else  /* MBEDTLS_BLOWFISH_ALT */ +#include "blowfish_alt.h" +#endif /* MBEDTLS_BLOWFISH_ALT */ + +#endif /* blowfish.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/bn_mul.h b/thirdparty/mbedtls/include/mbedtls/bn_mul.h new file mode 100644 index 0000000000..354c1cc1ab --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/bn_mul.h @@ -0,0 +1,886 @@ +/** + * \file bn_mul.h + * + * \brief Multi-precision integer library + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +/* + *      Multiply source vector [s] with b, add result + *       to destination vector [d] and set carry c. + * + *      Currently supports: + * + *         . IA-32 (386+)         . AMD64 / EM64T + *         . IA-32 (SSE2)         . Motorola 68000 + *         . PowerPC, 32-bit      . MicroBlaze + *         . PowerPC, 64-bit      . TriCore + *         . SPARC v8             . ARM v3+ + *         . Alpha                . MIPS32 + *         . C, longlong          . C, generic + */ +#ifndef MBEDTLS_BN_MUL_H +#define MBEDTLS_BN_MUL_H + +#include "bignum.h" + +#if defined(MBEDTLS_HAVE_ASM) + +#ifndef asm +#define asm __asm +#endif + +/* armcc5 --gnu defines __GNUC__ but doesn't support GNU's extended asm */ +#if defined(__GNUC__) && \ +    ( !defined(__ARMCC_VERSION) || __ARMCC_VERSION >= 6000000 ) +#if defined(__i386__) + +#define MULADDC_INIT                        \ +    asm(                                    \ +        "movl   %%ebx, %0           \n\t"   \ +        "movl   %5, %%esi           \n\t"   \ +        "movl   %6, %%edi           \n\t"   \ +        "movl   %7, %%ecx           \n\t"   \ +        "movl   %8, %%ebx           \n\t" + +#define MULADDC_CORE                        \ +        "lodsl                      \n\t"   \ +        "mull   %%ebx               \n\t"   \ +        "addl   %%ecx,   %%eax      \n\t"   \ +        "adcl   $0,      %%edx      \n\t"   \ +        "addl   (%%edi), %%eax      \n\t"   \ +        "adcl   $0,      %%edx      \n\t"   \ +        "movl   %%edx,   %%ecx      \n\t"   \ +        "stosl                      \n\t" + +#if defined(MBEDTLS_HAVE_SSE2) + +#define MULADDC_HUIT                            \ +        "movd     %%ecx,     %%mm1      \n\t"   \ +        "movd     %%ebx,     %%mm0      \n\t"   \ +        "movd     (%%edi),   %%mm3      \n\t"   \ +        "paddq    %%mm3,     %%mm1      \n\t"   \ +        "movd     (%%esi),   %%mm2      \n\t"   \ +        "pmuludq  %%mm0,     %%mm2      \n\t"   \ +        "movd     4(%%esi),  %%mm4      \n\t"   \ +        "pmuludq  %%mm0,     %%mm4      \n\t"   \ +        "movd     8(%%esi),  %%mm6      \n\t"   \ +        "pmuludq  %%mm0,     %%mm6      \n\t"   \ +        "movd     12(%%esi), %%mm7      \n\t"   \ +        "pmuludq  %%mm0,     %%mm7      \n\t"   \ +        "paddq    %%mm2,     %%mm1      \n\t"   \ +        "movd     4(%%edi),  %%mm3      \n\t"   \ +        "paddq    %%mm4,     %%mm3      \n\t"   \ +        "movd     8(%%edi),  %%mm5      \n\t"   \ +        "paddq    %%mm6,     %%mm5      \n\t"   \ +        "movd     12(%%edi), %%mm4      \n\t"   \ +        "paddq    %%mm4,     %%mm7      \n\t"   \ +        "movd     %%mm1,     (%%edi)    \n\t"   \ +        "movd     16(%%esi), %%mm2      \n\t"   \ +        "pmuludq  %%mm0,     %%mm2      \n\t"   \ +        "psrlq    $32,       %%mm1      \n\t"   \ +        "movd     20(%%esi), %%mm4      \n\t"   \ +        "pmuludq  %%mm0,     %%mm4      \n\t"   \ +        "paddq    %%mm3,     %%mm1      \n\t"   \ +        "movd     24(%%esi), %%mm6      \n\t"   \ +        "pmuludq  %%mm0,     %%mm6      \n\t"   \ +        "movd     %%mm1,     4(%%edi)   \n\t"   \ +        "psrlq    $32,       %%mm1      \n\t"   \ +        "movd     28(%%esi), %%mm3      \n\t"   \ +        "pmuludq  %%mm0,     %%mm3      \n\t"   \ +        "paddq    %%mm5,     %%mm1      \n\t"   \ +        "movd     16(%%edi), %%mm5      \n\t"   \ +        "paddq    %%mm5,     %%mm2      \n\t"   \ +        "movd     %%mm1,     8(%%edi)   \n\t"   \ +        "psrlq    $32,       %%mm1      \n\t"   \ +        "paddq    %%mm7,     %%mm1      \n\t"   \ +        "movd     20(%%edi), %%mm5      \n\t"   \ +        "paddq    %%mm5,     %%mm4      \n\t"   \ +        "movd     %%mm1,     12(%%edi)  \n\t"   \ +        "psrlq    $32,       %%mm1      \n\t"   \ +        "paddq    %%mm2,     %%mm1      \n\t"   \ +        "movd     24(%%edi), %%mm5      \n\t"   \ +        "paddq    %%mm5,     %%mm6      \n\t"   \ +        "movd     %%mm1,     16(%%edi)  \n\t"   \ +        "psrlq    $32,       %%mm1      \n\t"   \ +        "paddq    %%mm4,     %%mm1      \n\t"   \ +        "movd     28(%%edi), %%mm5      \n\t"   \ +        "paddq    %%mm5,     %%mm3      \n\t"   \ +        "movd     %%mm1,     20(%%edi)  \n\t"   \ +        "psrlq    $32,       %%mm1      \n\t"   \ +        "paddq    %%mm6,     %%mm1      \n\t"   \ +        "movd     %%mm1,     24(%%edi)  \n\t"   \ +        "psrlq    $32,       %%mm1      \n\t"   \ +        "paddq    %%mm3,     %%mm1      \n\t"   \ +        "movd     %%mm1,     28(%%edi)  \n\t"   \ +        "addl     $32,       %%edi      \n\t"   \ +        "addl     $32,       %%esi      \n\t"   \ +        "psrlq    $32,       %%mm1      \n\t"   \ +        "movd     %%mm1,     %%ecx      \n\t" + +#define MULADDC_STOP                    \ +        "emms                   \n\t"   \ +        "movl   %4, %%ebx       \n\t"   \ +        "movl   %%ecx, %1       \n\t"   \ +        "movl   %%edi, %2       \n\t"   \ +        "movl   %%esi, %3       \n\t"   \ +        : "=m" (t), "=m" (c), "=m" (d), "=m" (s)        \ +        : "m" (t), "m" (s), "m" (d), "m" (c), "m" (b)   \ +        : "eax", "ecx", "edx", "esi", "edi"             \ +    ); + +#else + +#define MULADDC_STOP                    \ +        "movl   %4, %%ebx       \n\t"   \ +        "movl   %%ecx, %1       \n\t"   \ +        "movl   %%edi, %2       \n\t"   \ +        "movl   %%esi, %3       \n\t"   \ +        : "=m" (t), "=m" (c), "=m" (d), "=m" (s)        \ +        : "m" (t), "m" (s), "m" (d), "m" (c), "m" (b)   \ +        : "eax", "ecx", "edx", "esi", "edi"             \ +    ); +#endif /* SSE2 */ +#endif /* i386 */ + +#if defined(__amd64__) || defined (__x86_64__) + +#define MULADDC_INIT                        \ +    asm(                                    \ +        "xorq   %%r8, %%r8          \n\t" + +#define MULADDC_CORE                        \ +        "movq   (%%rsi), %%rax      \n\t"   \ +        "mulq   %%rbx               \n\t"   \ +        "addq   $8,      %%rsi      \n\t"   \ +        "addq   %%rcx,   %%rax      \n\t"   \ +        "movq   %%r8,    %%rcx      \n\t"   \ +        "adcq   $0,      %%rdx      \n\t"   \ +        "nop                        \n\t"   \ +        "addq   %%rax,   (%%rdi)    \n\t"   \ +        "adcq   %%rdx,   %%rcx      \n\t"   \ +        "addq   $8,      %%rdi      \n\t" + +#define MULADDC_STOP                        \ +        : "+c" (c), "+D" (d), "+S" (s)      \ +        : "b" (b)                           \ +        : "rax", "rdx", "r8"                \ +    ); + +#endif /* AMD64 */ + +#if defined(__mc68020__) || defined(__mcpu32__) + +#define MULADDC_INIT                    \ +    asm(                                \ +        "movl   %3, %%a2        \n\t"   \ +        "movl   %4, %%a3        \n\t"   \ +        "movl   %5, %%d3        \n\t"   \ +        "movl   %6, %%d2        \n\t"   \ +        "moveq  #0, %%d0        \n\t" + +#define MULADDC_CORE                    \ +        "movel  %%a2@+, %%d1    \n\t"   \ +        "mulul  %%d2, %%d4:%%d1 \n\t"   \ +        "addl   %%d3, %%d1      \n\t"   \ +        "addxl  %%d0, %%d4      \n\t"   \ +        "moveq  #0,   %%d3      \n\t"   \ +        "addl   %%d1, %%a3@+    \n\t"   \ +        "addxl  %%d4, %%d3      \n\t" + +#define MULADDC_STOP                    \ +        "movl   %%d3, %0        \n\t"   \ +        "movl   %%a3, %1        \n\t"   \ +        "movl   %%a2, %2        \n\t"   \ +        : "=m" (c), "=m" (d), "=m" (s)              \ +        : "m" (s), "m" (d), "m" (c), "m" (b)        \ +        : "d0", "d1", "d2", "d3", "d4", "a2", "a3"  \ +    ); + +#define MULADDC_HUIT                        \ +        "movel  %%a2@+,  %%d1       \n\t"   \ +        "mulul  %%d2,    %%d4:%%d1  \n\t"   \ +        "addxl  %%d3,    %%d1       \n\t"   \ +        "addxl  %%d0,    %%d4       \n\t"   \ +        "addl   %%d1,    %%a3@+     \n\t"   \ +        "movel  %%a2@+,  %%d1       \n\t"   \ +        "mulul  %%d2,    %%d3:%%d1  \n\t"   \ +        "addxl  %%d4,    %%d1       \n\t"   \ +        "addxl  %%d0,    %%d3       \n\t"   \ +        "addl   %%d1,    %%a3@+     \n\t"   \ +        "movel  %%a2@+,  %%d1       \n\t"   \ +        "mulul  %%d2,    %%d4:%%d1  \n\t"   \ +        "addxl  %%d3,    %%d1       \n\t"   \ +        "addxl  %%d0,    %%d4       \n\t"   \ +        "addl   %%d1,    %%a3@+     \n\t"   \ +        "movel  %%a2@+,  %%d1       \n\t"   \ +        "mulul  %%d2,    %%d3:%%d1  \n\t"   \ +        "addxl  %%d4,    %%d1       \n\t"   \ +        "addxl  %%d0,    %%d3       \n\t"   \ +        "addl   %%d1,    %%a3@+     \n\t"   \ +        "movel  %%a2@+,  %%d1       \n\t"   \ +        "mulul  %%d2,    %%d4:%%d1  \n\t"   \ +        "addxl  %%d3,    %%d1       \n\t"   \ +        "addxl  %%d0,    %%d4       \n\t"   \ +        "addl   %%d1,    %%a3@+     \n\t"   \ +        "movel  %%a2@+,  %%d1       \n\t"   \ +        "mulul  %%d2,    %%d3:%%d1  \n\t"   \ +        "addxl  %%d4,    %%d1       \n\t"   \ +        "addxl  %%d0,    %%d3       \n\t"   \ +        "addl   %%d1,    %%a3@+     \n\t"   \ +        "movel  %%a2@+,  %%d1       \n\t"   \ +        "mulul  %%d2,    %%d4:%%d1  \n\t"   \ +        "addxl  %%d3,    %%d1       \n\t"   \ +        "addxl  %%d0,    %%d4       \n\t"   \ +        "addl   %%d1,    %%a3@+     \n\t"   \ +        "movel  %%a2@+,  %%d1       \n\t"   \ +        "mulul  %%d2,    %%d3:%%d1  \n\t"   \ +        "addxl  %%d4,    %%d1       \n\t"   \ +        "addxl  %%d0,    %%d3       \n\t"   \ +        "addl   %%d1,    %%a3@+     \n\t"   \ +        "addxl  %%d0,    %%d3       \n\t" + +#endif /* MC68000 */ + +#if defined(__powerpc64__) || defined(__ppc64__) + +#if defined(__MACH__) && defined(__APPLE__) + +#define MULADDC_INIT                        \ +    asm(                                    \ +        "ld     r3, %3              \n\t"   \ +        "ld     r4, %4              \n\t"   \ +        "ld     r5, %5              \n\t"   \ +        "ld     r6, %6              \n\t"   \ +        "addi   r3, r3, -8          \n\t"   \ +        "addi   r4, r4, -8          \n\t"   \ +        "addic  r5, r5,  0          \n\t" + +#define MULADDC_CORE                        \ +        "ldu    r7, 8(r3)           \n\t"   \ +        "mulld  r8, r7, r6          \n\t"   \ +        "mulhdu r9, r7, r6          \n\t"   \ +        "adde   r8, r8, r5          \n\t"   \ +        "ld     r7, 8(r4)           \n\t"   \ +        "addze  r5, r9              \n\t"   \ +        "addc   r8, r8, r7          \n\t"   \ +        "stdu   r8, 8(r4)           \n\t" + +#define MULADDC_STOP                        \ +        "addze  r5, r5              \n\t"   \ +        "addi   r4, r4, 8           \n\t"   \ +        "addi   r3, r3, 8           \n\t"   \ +        "std    r5, %0              \n\t"   \ +        "std    r4, %1              \n\t"   \ +        "std    r3, %2              \n\t"   \ +        : "=m" (c), "=m" (d), "=m" (s)              \ +        : "m" (s), "m" (d), "m" (c), "m" (b)        \ +        : "r3", "r4", "r5", "r6", "r7", "r8", "r9"  \ +    ); + + +#else /* __MACH__ && __APPLE__ */ + +#define MULADDC_INIT                        \ +    asm(                                    \ +        "ld     %%r3, %3            \n\t"   \ +        "ld     %%r4, %4            \n\t"   \ +        "ld     %%r5, %5            \n\t"   \ +        "ld     %%r6, %6            \n\t"   \ +        "addi   %%r3, %%r3, -8      \n\t"   \ +        "addi   %%r4, %%r4, -8      \n\t"   \ +        "addic  %%r5, %%r5,  0      \n\t" + +#define MULADDC_CORE                        \ +        "ldu    %%r7, 8(%%r3)       \n\t"   \ +        "mulld  %%r8, %%r7, %%r6    \n\t"   \ +        "mulhdu %%r9, %%r7, %%r6    \n\t"   \ +        "adde   %%r8, %%r8, %%r5    \n\t"   \ +        "ld     %%r7, 8(%%r4)       \n\t"   \ +        "addze  %%r5, %%r9          \n\t"   \ +        "addc   %%r8, %%r8, %%r7    \n\t"   \ +        "stdu   %%r8, 8(%%r4)       \n\t" + +#define MULADDC_STOP                        \ +        "addze  %%r5, %%r5          \n\t"   \ +        "addi   %%r4, %%r4, 8       \n\t"   \ +        "addi   %%r3, %%r3, 8       \n\t"   \ +        "std    %%r5, %0            \n\t"   \ +        "std    %%r4, %1            \n\t"   \ +        "std    %%r3, %2            \n\t"   \ +        : "=m" (c), "=m" (d), "=m" (s)              \ +        : "m" (s), "m" (d), "m" (c), "m" (b)        \ +        : "r3", "r4", "r5", "r6", "r7", "r8", "r9"  \ +    ); + +#endif /* __MACH__ && __APPLE__ */ + +#elif defined(__powerpc__) || defined(__ppc__) /* end PPC64/begin PPC32  */ + +#if defined(__MACH__) && defined(__APPLE__) + +#define MULADDC_INIT                    \ +    asm(                                \ +        "lwz    r3, %3          \n\t"   \ +        "lwz    r4, %4          \n\t"   \ +        "lwz    r5, %5          \n\t"   \ +        "lwz    r6, %6          \n\t"   \ +        "addi   r3, r3, -4      \n\t"   \ +        "addi   r4, r4, -4      \n\t"   \ +        "addic  r5, r5,  0      \n\t" + +#define MULADDC_CORE                    \ +        "lwzu   r7, 4(r3)       \n\t"   \ +        "mullw  r8, r7, r6      \n\t"   \ +        "mulhwu r9, r7, r6      \n\t"   \ +        "adde   r8, r8, r5      \n\t"   \ +        "lwz    r7, 4(r4)       \n\t"   \ +        "addze  r5, r9          \n\t"   \ +        "addc   r8, r8, r7      \n\t"   \ +        "stwu   r8, 4(r4)       \n\t" + +#define MULADDC_STOP                    \ +        "addze  r5, r5          \n\t"   \ +        "addi   r4, r4, 4       \n\t"   \ +        "addi   r3, r3, 4       \n\t"   \ +        "stw    r5, %0          \n\t"   \ +        "stw    r4, %1          \n\t"   \ +        "stw    r3, %2          \n\t"   \ +        : "=m" (c), "=m" (d), "=m" (s)              \ +        : "m" (s), "m" (d), "m" (c), "m" (b)        \ +        : "r3", "r4", "r5", "r6", "r7", "r8", "r9"  \ +    ); + +#else /* __MACH__ && __APPLE__ */ + +#define MULADDC_INIT                        \ +    asm(                                    \ +        "lwz    %%r3, %3            \n\t"   \ +        "lwz    %%r4, %4            \n\t"   \ +        "lwz    %%r5, %5            \n\t"   \ +        "lwz    %%r6, %6            \n\t"   \ +        "addi   %%r3, %%r3, -4      \n\t"   \ +        "addi   %%r4, %%r4, -4      \n\t"   \ +        "addic  %%r5, %%r5,  0      \n\t" + +#define MULADDC_CORE                        \ +        "lwzu   %%r7, 4(%%r3)       \n\t"   \ +        "mullw  %%r8, %%r7, %%r6    \n\t"   \ +        "mulhwu %%r9, %%r7, %%r6    \n\t"   \ +        "adde   %%r8, %%r8, %%r5    \n\t"   \ +        "lwz    %%r7, 4(%%r4)       \n\t"   \ +        "addze  %%r5, %%r9          \n\t"   \ +        "addc   %%r8, %%r8, %%r7    \n\t"   \ +        "stwu   %%r8, 4(%%r4)       \n\t" + +#define MULADDC_STOP                        \ +        "addze  %%r5, %%r5          \n\t"   \ +        "addi   %%r4, %%r4, 4       \n\t"   \ +        "addi   %%r3, %%r3, 4       \n\t"   \ +        "stw    %%r5, %0            \n\t"   \ +        "stw    %%r4, %1            \n\t"   \ +        "stw    %%r3, %2            \n\t"   \ +        : "=m" (c), "=m" (d), "=m" (s)              \ +        : "m" (s), "m" (d), "m" (c), "m" (b)        \ +        : "r3", "r4", "r5", "r6", "r7", "r8", "r9"  \ +    ); + +#endif /* __MACH__ && __APPLE__ */ + +#endif /* PPC32 */ + +/* + * The Sparc(64) assembly is reported to be broken. + * Disable it for now, until we're able to fix it. + */ +#if 0 && defined(__sparc__) +#if defined(__sparc64__) + +#define MULADDC_INIT                                    \ +    asm(                                                \ +                "ldx     %3, %%o0               \n\t"   \ +                "ldx     %4, %%o1               \n\t"   \ +                "ld      %5, %%o2               \n\t"   \ +                "ld      %6, %%o3               \n\t" + +#define MULADDC_CORE                                    \ +                "ld      [%%o0], %%o4           \n\t"   \ +                "inc     4, %%o0                \n\t"   \ +                "ld      [%%o1], %%o5           \n\t"   \ +                "umul    %%o3, %%o4, %%o4       \n\t"   \ +                "addcc   %%o4, %%o2, %%o4       \n\t"   \ +                "rd      %%y, %%g1              \n\t"   \ +                "addx    %%g1, 0, %%g1          \n\t"   \ +                "addcc   %%o4, %%o5, %%o4       \n\t"   \ +                "st      %%o4, [%%o1]           \n\t"   \ +                "addx    %%g1, 0, %%o2          \n\t"   \ +                "inc     4, %%o1                \n\t" + +        #define MULADDC_STOP                            \ +                "st      %%o2, %0               \n\t"   \ +                "stx     %%o1, %1               \n\t"   \ +                "stx     %%o0, %2               \n\t"   \ +        : "=m" (c), "=m" (d), "=m" (s)          \ +        : "m" (s), "m" (d), "m" (c), "m" (b)    \ +        : "g1", "o0", "o1", "o2", "o3", "o4",   \ +          "o5"                                  \ +        ); + +#else /* __sparc64__ */ + +#define MULADDC_INIT                                    \ +    asm(                                                \ +                "ld      %3, %%o0               \n\t"   \ +                "ld      %4, %%o1               \n\t"   \ +                "ld      %5, %%o2               \n\t"   \ +                "ld      %6, %%o3               \n\t" + +#define MULADDC_CORE                                    \ +                "ld      [%%o0], %%o4           \n\t"   \ +                "inc     4, %%o0                \n\t"   \ +                "ld      [%%o1], %%o5           \n\t"   \ +                "umul    %%o3, %%o4, %%o4       \n\t"   \ +                "addcc   %%o4, %%o2, %%o4       \n\t"   \ +                "rd      %%y, %%g1              \n\t"   \ +                "addx    %%g1, 0, %%g1          \n\t"   \ +                "addcc   %%o4, %%o5, %%o4       \n\t"   \ +                "st      %%o4, [%%o1]           \n\t"   \ +                "addx    %%g1, 0, %%o2          \n\t"   \ +                "inc     4, %%o1                \n\t" + +#define MULADDC_STOP                                    \ +                "st      %%o2, %0               \n\t"   \ +                "st      %%o1, %1               \n\t"   \ +                "st      %%o0, %2               \n\t"   \ +        : "=m" (c), "=m" (d), "=m" (s)          \ +        : "m" (s), "m" (d), "m" (c), "m" (b)    \ +        : "g1", "o0", "o1", "o2", "o3", "o4",   \ +          "o5"                                  \ +        ); + +#endif /* __sparc64__ */ +#endif /* __sparc__ */ + +#if defined(__microblaze__) || defined(microblaze) + +#define MULADDC_INIT                    \ +    asm(                                \ +        "lwi   r3,   %3         \n\t"   \ +        "lwi   r4,   %4         \n\t"   \ +        "lwi   r5,   %5         \n\t"   \ +        "lwi   r6,   %6         \n\t"   \ +        "andi  r7,   r6, 0xffff \n\t"   \ +        "bsrli r6,   r6, 16     \n\t" + +#define MULADDC_CORE                    \ +        "lhui  r8,   r3,   0    \n\t"   \ +        "addi  r3,   r3,   2    \n\t"   \ +        "lhui  r9,   r3,   0    \n\t"   \ +        "addi  r3,   r3,   2    \n\t"   \ +        "mul   r10,  r9,  r6    \n\t"   \ +        "mul   r11,  r8,  r7    \n\t"   \ +        "mul   r12,  r9,  r7    \n\t"   \ +        "mul   r13,  r8,  r6    \n\t"   \ +        "bsrli  r8, r10,  16    \n\t"   \ +        "bsrli  r9, r11,  16    \n\t"   \ +        "add   r13, r13,  r8    \n\t"   \ +        "add   r13, r13,  r9    \n\t"   \ +        "bslli r10, r10,  16    \n\t"   \ +        "bslli r11, r11,  16    \n\t"   \ +        "add   r12, r12, r10    \n\t"   \ +        "addc  r13, r13,  r0    \n\t"   \ +        "add   r12, r12, r11    \n\t"   \ +        "addc  r13, r13,  r0    \n\t"   \ +        "lwi   r10,  r4,   0    \n\t"   \ +        "add   r12, r12, r10    \n\t"   \ +        "addc  r13, r13,  r0    \n\t"   \ +        "add   r12, r12,  r5    \n\t"   \ +        "addc   r5, r13,  r0    \n\t"   \ +        "swi   r12,  r4,   0    \n\t"   \ +        "addi   r4,  r4,   4    \n\t" + +#define MULADDC_STOP                    \ +        "swi   r5,   %0         \n\t"   \ +        "swi   r4,   %1         \n\t"   \ +        "swi   r3,   %2         \n\t"   \ +        : "=m" (c), "=m" (d), "=m" (s)              \ +        : "m" (s), "m" (d), "m" (c), "m" (b)        \ +        : "r3", "r4"  "r5", "r6", "r7", "r8",       \ +          "r9", "r10", "r11", "r12", "r13"          \ +    ); + +#endif /* MicroBlaze */ + +#if defined(__tricore__) + +#define MULADDC_INIT                            \ +    asm(                                        \ +        "ld.a   %%a2, %3                \n\t"   \ +        "ld.a   %%a3, %4                \n\t"   \ +        "ld.w   %%d4, %5                \n\t"   \ +        "ld.w   %%d1, %6                \n\t"   \ +        "xor    %%d5, %%d5              \n\t" + +#define MULADDC_CORE                            \ +        "ld.w   %%d0,   [%%a2+]         \n\t"   \ +        "madd.u %%e2, %%e4, %%d0, %%d1  \n\t"   \ +        "ld.w   %%d0,   [%%a3]          \n\t"   \ +        "addx   %%d2,    %%d2,  %%d0    \n\t"   \ +        "addc   %%d3,    %%d3,    0     \n\t"   \ +        "mov    %%d4,    %%d3           \n\t"   \ +        "st.w  [%%a3+],  %%d2           \n\t" + +#define MULADDC_STOP                            \ +        "st.w   %0, %%d4                \n\t"   \ +        "st.a   %1, %%a3                \n\t"   \ +        "st.a   %2, %%a2                \n\t"   \ +        : "=m" (c), "=m" (d), "=m" (s)          \ +        : "m" (s), "m" (d), "m" (c), "m" (b)    \ +        : "d0", "d1", "e2", "d4", "a2", "a3"    \ +    ); + +#endif /* TriCore */ + +/* + * gcc -O0 by default uses r7 for the frame pointer, so it complains about our + * use of r7 below, unless -fomit-frame-pointer is passed. Unfortunately, + * passing that option is not easy when building with yotta. + * + * On the other hand, -fomit-frame-pointer is implied by any -Ox options with + * x !=0, which we can detect using __OPTIMIZE__ (which is also defined by + * clang and armcc5 under the same conditions). + * + * So, only use the optimized assembly below for optimized build, which avoids + * the build error and is pretty reasonable anyway. + */ +#if defined(__GNUC__) && !defined(__OPTIMIZE__) +#define MULADDC_CANNOT_USE_R7 +#endif + +#if defined(__arm__) && !defined(MULADDC_CANNOT_USE_R7) + +#if defined(__thumb__) && !defined(__thumb2__) + +#define MULADDC_INIT                                    \ +    asm(                                                \ +            "ldr    r0, %3                      \n\t"   \ +            "ldr    r1, %4                      \n\t"   \ +            "ldr    r2, %5                      \n\t"   \ +            "ldr    r3, %6                      \n\t"   \ +            "lsr    r7, r3, #16                 \n\t"   \ +            "mov    r9, r7                      \n\t"   \ +            "lsl    r7, r3, #16                 \n\t"   \ +            "lsr    r7, r7, #16                 \n\t"   \ +            "mov    r8, r7                      \n\t" + +#define MULADDC_CORE                                    \ +            "ldmia  r0!, {r6}                   \n\t"   \ +            "lsr    r7, r6, #16                 \n\t"   \ +            "lsl    r6, r6, #16                 \n\t"   \ +            "lsr    r6, r6, #16                 \n\t"   \ +            "mov    r4, r8                      \n\t"   \ +            "mul    r4, r6                      \n\t"   \ +            "mov    r3, r9                      \n\t"   \ +            "mul    r6, r3                      \n\t"   \ +            "mov    r5, r9                      \n\t"   \ +            "mul    r5, r7                      \n\t"   \ +            "mov    r3, r8                      \n\t"   \ +            "mul    r7, r3                      \n\t"   \ +            "lsr    r3, r6, #16                 \n\t"   \ +            "add    r5, r5, r3                  \n\t"   \ +            "lsr    r3, r7, #16                 \n\t"   \ +            "add    r5, r5, r3                  \n\t"   \ +            "add    r4, r4, r2                  \n\t"   \ +            "mov    r2, #0                      \n\t"   \ +            "adc    r5, r2                      \n\t"   \ +            "lsl    r3, r6, #16                 \n\t"   \ +            "add    r4, r4, r3                  \n\t"   \ +            "adc    r5, r2                      \n\t"   \ +            "lsl    r3, r7, #16                 \n\t"   \ +            "add    r4, r4, r3                  \n\t"   \ +            "adc    r5, r2                      \n\t"   \ +            "ldr    r3, [r1]                    \n\t"   \ +            "add    r4, r4, r3                  \n\t"   \ +            "adc    r2, r5                      \n\t"   \ +            "stmia  r1!, {r4}                   \n\t" + +#define MULADDC_STOP                                    \ +            "str    r2, %0                      \n\t"   \ +            "str    r1, %1                      \n\t"   \ +            "str    r0, %2                      \n\t"   \ +         : "=m" (c),  "=m" (d), "=m" (s)        \ +         : "m" (s), "m" (d), "m" (c), "m" (b)   \ +         : "r0", "r1", "r2", "r3", "r4", "r5",  \ +           "r6", "r7", "r8", "r9", "cc"         \ +         ); + +#else + +#define MULADDC_INIT                                    \ +    asm(                                                \ +            "ldr    r0, %3                      \n\t"   \ +            "ldr    r1, %4                      \n\t"   \ +            "ldr    r2, %5                      \n\t"   \ +            "ldr    r3, %6                      \n\t" + +#define MULADDC_CORE                                    \ +            "ldr    r4, [r0], #4                \n\t"   \ +            "mov    r5, #0                      \n\t"   \ +            "ldr    r6, [r1]                    \n\t"   \ +            "umlal  r2, r5, r3, r4              \n\t"   \ +            "adds   r7, r6, r2                  \n\t"   \ +            "adc    r2, r5, #0                  \n\t"   \ +            "str    r7, [r1], #4                \n\t" + +#define MULADDC_STOP                                    \ +            "str    r2, %0                      \n\t"   \ +            "str    r1, %1                      \n\t"   \ +            "str    r0, %2                      \n\t"   \ +         : "=m" (c),  "=m" (d), "=m" (s)        \ +         : "m" (s), "m" (d), "m" (c), "m" (b)   \ +         : "r0", "r1", "r2", "r3", "r4", "r5",  \ +           "r6", "r7", "cc"                     \ +         ); + +#endif /* Thumb */ + +#endif /* ARMv3 */ + +#if defined(__alpha__) + +#define MULADDC_INIT                    \ +    asm(                                \ +        "ldq    $1, %3          \n\t"   \ +        "ldq    $2, %4          \n\t"   \ +        "ldq    $3, %5          \n\t"   \ +        "ldq    $4, %6          \n\t" + +#define MULADDC_CORE                    \ +        "ldq    $6,  0($1)      \n\t"   \ +        "addq   $1,  8, $1      \n\t"   \ +        "mulq   $6, $4, $7      \n\t"   \ +        "umulh  $6, $4, $6      \n\t"   \ +        "addq   $7, $3, $7      \n\t"   \ +        "cmpult $7, $3, $3      \n\t"   \ +        "ldq    $5,  0($2)      \n\t"   \ +        "addq   $7, $5, $7      \n\t"   \ +        "cmpult $7, $5, $5      \n\t"   \ +        "stq    $7,  0($2)      \n\t"   \ +        "addq   $2,  8, $2      \n\t"   \ +        "addq   $6, $3, $3      \n\t"   \ +        "addq   $5, $3, $3      \n\t" + +#define MULADDC_STOP                                    \ +        "stq    $3, %0          \n\t"   \ +        "stq    $2, %1          \n\t"   \ +        "stq    $1, %2          \n\t"   \ +        : "=m" (c), "=m" (d), "=m" (s)              \ +        : "m" (s), "m" (d), "m" (c), "m" (b)        \ +        : "$1", "$2", "$3", "$4", "$5", "$6", "$7"  \ +    ); +#endif /* Alpha */ + +#if defined(__mips__) && !defined(__mips64) + +#define MULADDC_INIT                    \ +    asm(                                \ +        "lw     $10, %3         \n\t"   \ +        "lw     $11, %4         \n\t"   \ +        "lw     $12, %5         \n\t"   \ +        "lw     $13, %6         \n\t" + +#define MULADDC_CORE                    \ +        "lw     $14, 0($10)     \n\t"   \ +        "multu  $13, $14        \n\t"   \ +        "addi   $10, $10, 4     \n\t"   \ +        "mflo   $14             \n\t"   \ +        "mfhi   $9              \n\t"   \ +        "addu   $14, $12, $14   \n\t"   \ +        "lw     $15, 0($11)     \n\t"   \ +        "sltu   $12, $14, $12   \n\t"   \ +        "addu   $15, $14, $15   \n\t"   \ +        "sltu   $14, $15, $14   \n\t"   \ +        "addu   $12, $12, $9    \n\t"   \ +        "sw     $15, 0($11)     \n\t"   \ +        "addu   $12, $12, $14   \n\t"   \ +        "addi   $11, $11, 4     \n\t" + +#define MULADDC_STOP                    \ +        "sw     $12, %0         \n\t"   \ +        "sw     $11, %1         \n\t"   \ +        "sw     $10, %2         \n\t"   \ +        : "=m" (c), "=m" (d), "=m" (s)                      \ +        : "m" (s), "m" (d), "m" (c), "m" (b)                \ +        : "$9", "$10", "$11", "$12", "$13", "$14", "$15"    \ +    ); + +#endif /* MIPS */ +#endif /* GNUC */ + +#if (defined(_MSC_VER) && defined(_M_IX86)) || defined(__WATCOMC__) + +#define MULADDC_INIT                            \ +    __asm   mov     esi, s                      \ +    __asm   mov     edi, d                      \ +    __asm   mov     ecx, c                      \ +    __asm   mov     ebx, b + +#define MULADDC_CORE                            \ +    __asm   lodsd                               \ +    __asm   mul     ebx                         \ +    __asm   add     eax, ecx                    \ +    __asm   adc     edx, 0                      \ +    __asm   add     eax, [edi]                  \ +    __asm   adc     edx, 0                      \ +    __asm   mov     ecx, edx                    \ +    __asm   stosd + +#if defined(MBEDTLS_HAVE_SSE2) + +#define EMIT __asm _emit + +#define MULADDC_HUIT                            \ +    EMIT 0x0F  EMIT 0x6E  EMIT 0xC9             \ +    EMIT 0x0F  EMIT 0x6E  EMIT 0xC3             \ +    EMIT 0x0F  EMIT 0x6E  EMIT 0x1F             \ +    EMIT 0x0F  EMIT 0xD4  EMIT 0xCB             \ +    EMIT 0x0F  EMIT 0x6E  EMIT 0x16             \ +    EMIT 0x0F  EMIT 0xF4  EMIT 0xD0             \ +    EMIT 0x0F  EMIT 0x6E  EMIT 0x66  EMIT 0x04  \ +    EMIT 0x0F  EMIT 0xF4  EMIT 0xE0             \ +    EMIT 0x0F  EMIT 0x6E  EMIT 0x76  EMIT 0x08  \ +    EMIT 0x0F  EMIT 0xF4  EMIT 0xF0             \ +    EMIT 0x0F  EMIT 0x6E  EMIT 0x7E  EMIT 0x0C  \ +    EMIT 0x0F  EMIT 0xF4  EMIT 0xF8             \ +    EMIT 0x0F  EMIT 0xD4  EMIT 0xCA             \ +    EMIT 0x0F  EMIT 0x6E  EMIT 0x5F  EMIT 0x04  \ +    EMIT 0x0F  EMIT 0xD4  EMIT 0xDC             \ +    EMIT 0x0F  EMIT 0x6E  EMIT 0x6F  EMIT 0x08  \ +    EMIT 0x0F  EMIT 0xD4  EMIT 0xEE             \ +    EMIT 0x0F  EMIT 0x6E  EMIT 0x67  EMIT 0x0C  \ +    EMIT 0x0F  EMIT 0xD4  EMIT 0xFC             \ +    EMIT 0x0F  EMIT 0x7E  EMIT 0x0F             \ +    EMIT 0x0F  EMIT 0x6E  EMIT 0x56  EMIT 0x10  \ +    EMIT 0x0F  EMIT 0xF4  EMIT 0xD0             \ +    EMIT 0x0F  EMIT 0x73  EMIT 0xD1  EMIT 0x20  \ +    EMIT 0x0F  EMIT 0x6E  EMIT 0x66  EMIT 0x14  \ +    EMIT 0x0F  EMIT 0xF4  EMIT 0xE0             \ +    EMIT 0x0F  EMIT 0xD4  EMIT 0xCB             \ +    EMIT 0x0F  EMIT 0x6E  EMIT 0x76  EMIT 0x18  \ +    EMIT 0x0F  EMIT 0xF4  EMIT 0xF0             \ +    EMIT 0x0F  EMIT 0x7E  EMIT 0x4F  EMIT 0x04  \ +    EMIT 0x0F  EMIT 0x73  EMIT 0xD1  EMIT 0x20  \ +    EMIT 0x0F  EMIT 0x6E  EMIT 0x5E  EMIT 0x1C  \ +    EMIT 0x0F  EMIT 0xF4  EMIT 0xD8             \ +    EMIT 0x0F  EMIT 0xD4  EMIT 0xCD             \ +    EMIT 0x0F  EMIT 0x6E  EMIT 0x6F  EMIT 0x10  \ +    EMIT 0x0F  EMIT 0xD4  EMIT 0xD5             \ +    EMIT 0x0F  EMIT 0x7E  EMIT 0x4F  EMIT 0x08  \ +    EMIT 0x0F  EMIT 0x73  EMIT 0xD1  EMIT 0x20  \ +    EMIT 0x0F  EMIT 0xD4  EMIT 0xCF             \ +    EMIT 0x0F  EMIT 0x6E  EMIT 0x6F  EMIT 0x14  \ +    EMIT 0x0F  EMIT 0xD4  EMIT 0xE5             \ +    EMIT 0x0F  EMIT 0x7E  EMIT 0x4F  EMIT 0x0C  \ +    EMIT 0x0F  EMIT 0x73  EMIT 0xD1  EMIT 0x20  \ +    EMIT 0x0F  EMIT 0xD4  EMIT 0xCA             \ +    EMIT 0x0F  EMIT 0x6E  EMIT 0x6F  EMIT 0x18  \ +    EMIT 0x0F  EMIT 0xD4  EMIT 0xF5             \ +    EMIT 0x0F  EMIT 0x7E  EMIT 0x4F  EMIT 0x10  \ +    EMIT 0x0F  EMIT 0x73  EMIT 0xD1  EMIT 0x20  \ +    EMIT 0x0F  EMIT 0xD4  EMIT 0xCC             \ +    EMIT 0x0F  EMIT 0x6E  EMIT 0x6F  EMIT 0x1C  \ +    EMIT 0x0F  EMIT 0xD4  EMIT 0xDD             \ +    EMIT 0x0F  EMIT 0x7E  EMIT 0x4F  EMIT 0x14  \ +    EMIT 0x0F  EMIT 0x73  EMIT 0xD1  EMIT 0x20  \ +    EMIT 0x0F  EMIT 0xD4  EMIT 0xCE             \ +    EMIT 0x0F  EMIT 0x7E  EMIT 0x4F  EMIT 0x18  \ +    EMIT 0x0F  EMIT 0x73  EMIT 0xD1  EMIT 0x20  \ +    EMIT 0x0F  EMIT 0xD4  EMIT 0xCB             \ +    EMIT 0x0F  EMIT 0x7E  EMIT 0x4F  EMIT 0x1C  \ +    EMIT 0x83  EMIT 0xC7  EMIT 0x20             \ +    EMIT 0x83  EMIT 0xC6  EMIT 0x20             \ +    EMIT 0x0F  EMIT 0x73  EMIT 0xD1  EMIT 0x20  \ +    EMIT 0x0F  EMIT 0x7E  EMIT 0xC9 + +#define MULADDC_STOP                            \ +    EMIT 0x0F  EMIT 0x77                        \ +    __asm   mov     c, ecx                      \ +    __asm   mov     d, edi                      \ +    __asm   mov     s, esi                      \ + +#else + +#define MULADDC_STOP                            \ +    __asm   mov     c, ecx                      \ +    __asm   mov     d, edi                      \ +    __asm   mov     s, esi                      \ + +#endif /* SSE2 */ +#endif /* MSVC */ + +#endif /* MBEDTLS_HAVE_ASM */ + +#if !defined(MULADDC_CORE) +#if defined(MBEDTLS_HAVE_UDBL) + +#define MULADDC_INIT                    \ +{                                       \ +    mbedtls_t_udbl r;                           \ +    mbedtls_mpi_uint r0, r1; + +#define MULADDC_CORE                    \ +    r   = *(s++) * (mbedtls_t_udbl) b;          \ +    r0  = (mbedtls_mpi_uint) r;                   \ +    r1  = (mbedtls_mpi_uint)( r >> biL );         \ +    r0 += c;  r1 += (r0 <  c);          \ +    r0 += *d; r1 += (r0 < *d);          \ +    c = r1; *(d++) = r0; + +#define MULADDC_STOP                    \ +} + +#else +#define MULADDC_INIT                    \ +{                                       \ +    mbedtls_mpi_uint s0, s1, b0, b1;              \ +    mbedtls_mpi_uint r0, r1, rx, ry;              \ +    b0 = ( b << biH ) >> biH;           \ +    b1 = ( b >> biH ); + +#define MULADDC_CORE                    \ +    s0 = ( *s << biH ) >> biH;          \ +    s1 = ( *s >> biH ); s++;            \ +    rx = s0 * b1; r0 = s0 * b0;         \ +    ry = s1 * b0; r1 = s1 * b1;         \ +    r1 += ( rx >> biH );                \ +    r1 += ( ry >> biH );                \ +    rx <<= biH; ry <<= biH;             \ +    r0 += rx; r1 += (r0 < rx);          \ +    r0 += ry; r1 += (r0 < ry);          \ +    r0 +=  c; r1 += (r0 <  c);          \ +    r0 += *d; r1 += (r0 < *d);          \ +    c = r1; *(d++) = r0; + +#define MULADDC_STOP                    \ +} + +#endif /* C (generic)  */ +#endif /* C (longlong) */ + +#endif /* bn_mul.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/camellia.h b/thirdparty/mbedtls/include/mbedtls/camellia.h new file mode 100644 index 0000000000..cf07629d9b --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/camellia.h @@ -0,0 +1,237 @@ +/** + * \file camellia.h + * + * \brief Camellia block cipher + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_CAMELLIA_H +#define MBEDTLS_CAMELLIA_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> +#include <stdint.h> + +#define MBEDTLS_CAMELLIA_ENCRYPT     1 +#define MBEDTLS_CAMELLIA_DECRYPT     0 + +#define MBEDTLS_ERR_CAMELLIA_INVALID_KEY_LENGTH           -0x0024  /**< Invalid key length. */ +#define MBEDTLS_ERR_CAMELLIA_INVALID_INPUT_LENGTH         -0x0026  /**< Invalid data input length. */ +#define MBEDTLS_ERR_CAMELLIA_HW_ACCEL_FAILED              -0x0027  /**< Camellia hardware accelerator failed. */ + +#if !defined(MBEDTLS_CAMELLIA_ALT) +// Regular implementation +// + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          CAMELLIA context structure + */ +typedef struct +{ +    int nr;                     /*!<  number of rounds  */ +    uint32_t rk[68];            /*!<  CAMELLIA round keys    */ +} +mbedtls_camellia_context; + +/** + * \brief          Initialize CAMELLIA context + * + * \param ctx      CAMELLIA context to be initialized + */ +void mbedtls_camellia_init( mbedtls_camellia_context *ctx ); + +/** + * \brief          Clear CAMELLIA context + * + * \param ctx      CAMELLIA context to be cleared + */ +void mbedtls_camellia_free( mbedtls_camellia_context *ctx ); + +/** + * \brief          CAMELLIA key schedule (encryption) + * + * \param ctx      CAMELLIA context to be initialized + * \param key      encryption key + * \param keybits  must be 128, 192 or 256 + * + * \return         0 if successful, or MBEDTLS_ERR_CAMELLIA_INVALID_KEY_LENGTH + */ +int mbedtls_camellia_setkey_enc( mbedtls_camellia_context *ctx, const unsigned char *key, +                         unsigned int keybits ); + +/** + * \brief          CAMELLIA key schedule (decryption) + * + * \param ctx      CAMELLIA context to be initialized + * \param key      decryption key + * \param keybits  must be 128, 192 or 256 + * + * \return         0 if successful, or MBEDTLS_ERR_CAMELLIA_INVALID_KEY_LENGTH + */ +int mbedtls_camellia_setkey_dec( mbedtls_camellia_context *ctx, const unsigned char *key, +                         unsigned int keybits ); + +/** + * \brief          CAMELLIA-ECB block encryption/decryption + * + * \param ctx      CAMELLIA context + * \param mode     MBEDTLS_CAMELLIA_ENCRYPT or MBEDTLS_CAMELLIA_DECRYPT + * \param input    16-byte input block + * \param output   16-byte output block + * + * \return         0 if successful + */ +int mbedtls_camellia_crypt_ecb( mbedtls_camellia_context *ctx, +                    int mode, +                    const unsigned char input[16], +                    unsigned char output[16] ); + +#if defined(MBEDTLS_CIPHER_MODE_CBC) +/** + * \brief          CAMELLIA-CBC buffer encryption/decryption + *                 Length should be a multiple of the block + *                 size (16 bytes) + * + * \note           Upon exit, the content of the IV is updated so that you can + *                 call the function same function again on the following + *                 block(s) of data and get the same result as if it was + *                 encrypted in one call. This allows a "streaming" usage. + *                 If on the other hand you need to retain the contents of the + *                 IV, you should either save it manually or use the cipher + *                 module instead. + * + * \param ctx      CAMELLIA context + * \param mode     MBEDTLS_CAMELLIA_ENCRYPT or MBEDTLS_CAMELLIA_DECRYPT + * \param length   length of the input data + * \param iv       initialization vector (updated after use) + * \param input    buffer holding the input data + * \param output   buffer holding the output data + * + * \return         0 if successful, or + *                 MBEDTLS_ERR_CAMELLIA_INVALID_INPUT_LENGTH + */ +int mbedtls_camellia_crypt_cbc( mbedtls_camellia_context *ctx, +                    int mode, +                    size_t length, +                    unsigned char iv[16], +                    const unsigned char *input, +                    unsigned char *output ); +#endif /* MBEDTLS_CIPHER_MODE_CBC */ + +#if defined(MBEDTLS_CIPHER_MODE_CFB) +/** + * \brief          CAMELLIA-CFB128 buffer encryption/decryption + * + * Note: Due to the nature of CFB you should use the same key schedule for + * both encryption and decryption. So a context initialized with + * mbedtls_camellia_setkey_enc() for both MBEDTLS_CAMELLIA_ENCRYPT and CAMELLIE_DECRYPT. + * + * \note           Upon exit, the content of the IV is updated so that you can + *                 call the function same function again on the following + *                 block(s) of data and get the same result as if it was + *                 encrypted in one call. This allows a "streaming" usage. + *                 If on the other hand you need to retain the contents of the + *                 IV, you should either save it manually or use the cipher + *                 module instead. + * + * \param ctx      CAMELLIA context + * \param mode     MBEDTLS_CAMELLIA_ENCRYPT or MBEDTLS_CAMELLIA_DECRYPT + * \param length   length of the input data + * \param iv_off   offset in IV (updated after use) + * \param iv       initialization vector (updated after use) + * \param input    buffer holding the input data + * \param output   buffer holding the output data + * + * \return         0 if successful, or + *                 MBEDTLS_ERR_CAMELLIA_INVALID_INPUT_LENGTH + */ +int mbedtls_camellia_crypt_cfb128( mbedtls_camellia_context *ctx, +                       int mode, +                       size_t length, +                       size_t *iv_off, +                       unsigned char iv[16], +                       const unsigned char *input, +                       unsigned char *output ); +#endif /* MBEDTLS_CIPHER_MODE_CFB */ + +#if defined(MBEDTLS_CIPHER_MODE_CTR) +/** + * \brief               CAMELLIA-CTR buffer encryption/decryption + * + * Warning: You have to keep the maximum use of your counter in mind! + * + * Note: Due to the nature of CTR you should use the same key schedule for + * both encryption and decryption. So a context initialized with + * mbedtls_camellia_setkey_enc() for both MBEDTLS_CAMELLIA_ENCRYPT and MBEDTLS_CAMELLIA_DECRYPT. + * + * \param ctx           CAMELLIA context + * \param length        The length of the data + * \param nc_off        The offset in the current stream_block (for resuming + *                      within current cipher stream). The offset pointer to + *                      should be 0 at the start of a stream. + * \param nonce_counter The 128-bit nonce and counter. + * \param stream_block  The saved stream-block for resuming. Is overwritten + *                      by the function. + * \param input         The input data stream + * \param output        The output data stream + * + * \return         0 if successful + */ +int mbedtls_camellia_crypt_ctr( mbedtls_camellia_context *ctx, +                       size_t length, +                       size_t *nc_off, +                       unsigned char nonce_counter[16], +                       unsigned char stream_block[16], +                       const unsigned char *input, +                       unsigned char *output ); +#endif /* MBEDTLS_CIPHER_MODE_CTR */ + +#ifdef __cplusplus +} +#endif + +#else  /* MBEDTLS_CAMELLIA_ALT */ +#include "camellia_alt.h" +#endif /* MBEDTLS_CAMELLIA_ALT */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          Checkup routine + * + * \return         0 if successful, or 1 if the test failed + */ +int mbedtls_camellia_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + +#endif /* camellia.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/ccm.h b/thirdparty/mbedtls/include/mbedtls/ccm.h new file mode 100644 index 0000000000..5a9ee4a1cd --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/ccm.h @@ -0,0 +1,173 @@ +/** + * \file ccm.h + * + * \brief CCM combines Counter mode encryption with CBC-MAC authentication + *        for 128-bit block ciphers. + * + * Input to CCM includes the following elements: + * <ul><li>Payload - data that is both authenticated and encrypted.</li> + * <li>Associated data (Adata) - data that is authenticated but not + * encrypted, For example, a header.</li> + * <li>Nonce - A unique value that is assigned to the payload and the + * associated data.</li></ul> + * + */ +/* + *  Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of Mbed TLS (https://tls.mbed.org) + */ + +#ifndef MBEDTLS_CCM_H +#define MBEDTLS_CCM_H + +#include "cipher.h" + +#define MBEDTLS_ERR_CCM_BAD_INPUT       -0x000D /**< Bad input parameters to the function. */ +#define MBEDTLS_ERR_CCM_AUTH_FAILED     -0x000F /**< Authenticated decryption failed. */ +#define MBEDTLS_ERR_CCM_HW_ACCEL_FAILED -0x0011 /**< CCM hardware accelerator failed. */ + +#if !defined(MBEDTLS_CCM_ALT) +// Regular implementation +// + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief    The CCM context-type definition. The CCM context is passed + *           to the APIs called. + */ +typedef struct { +    mbedtls_cipher_context_t cipher_ctx;    /*!< The cipher context used. */ +} +mbedtls_ccm_context; + +/** + * \brief           This function initializes the specified CCM context, + *                  to make references valid, and prepare the context + *                  for mbedtls_ccm_setkey() or mbedtls_ccm_free(). + * + * \param ctx       The CCM context to initialize. + */ +void mbedtls_ccm_init( mbedtls_ccm_context *ctx ); + +/** + * \brief           This function initializes the CCM context set in the + *                  \p ctx parameter and sets the encryption key. + * + * \param ctx       The CCM context to initialize. + * \param cipher    The 128-bit block cipher to use. + * \param key       The encryption key. + * \param keybits   The key size in bits. This must be acceptable by the cipher. + * + * \return          \c 0 on success, or a cipher-specific error code. + */ +int mbedtls_ccm_setkey( mbedtls_ccm_context *ctx, +                        mbedtls_cipher_id_t cipher, +                        const unsigned char *key, +                        unsigned int keybits ); + +/** + * \brief   This function releases and clears the specified CCM context + *          and underlying cipher sub-context. + * + * \param ctx       The CCM context to clear. + */ +void mbedtls_ccm_free( mbedtls_ccm_context *ctx ); + +/** + * \brief           This function encrypts a buffer using CCM. + * + * \param ctx       The CCM context to use for encryption. + * \param length    The length of the input data in Bytes. + * \param iv        Initialization vector (nonce). + * \param iv_len    The length of the IV in Bytes: 7, 8, 9, 10, 11, 12, or 13. + * \param add       The additional data field. + * \param add_len   The length of additional data in Bytes. + *                  Must be less than 2^16 - 2^8. + * \param input     The buffer holding the input data. + * \param output    The buffer holding the output data. + *                  Must be at least \p length Bytes wide. + * \param tag       The buffer holding the tag. + * \param tag_len   The length of the tag to generate in Bytes: + *                  4, 6, 8, 10, 14 or 16. + * + * \note            The tag is written to a separate buffer. To concatenate + *                  the \p tag with the \p output, as done in <em>RFC-3610: + *                  Counter with CBC-MAC (CCM)</em>, use + *                  \p tag = \p output + \p length, and make sure that the + *                  output buffer is at least \p length + \p tag_len wide. + * + * \return          \c 0 on success. + */ +int mbedtls_ccm_encrypt_and_tag( mbedtls_ccm_context *ctx, size_t length, +                         const unsigned char *iv, size_t iv_len, +                         const unsigned char *add, size_t add_len, +                         const unsigned char *input, unsigned char *output, +                         unsigned char *tag, size_t tag_len ); + +/** + * \brief           This function performs a CCM authenticated decryption of a + *                  buffer. + * + * \param ctx       The CCM context to use for decryption. + * \param length    The length of the input data in Bytes. + * \param iv        Initialization vector. + * \param iv_len    The length of the IV in Bytes: 7, 8, 9, 10, 11, 12, or 13. + * \param add       The additional data field. + * \param add_len   The length of additional data in Bytes. + * \param input     The buffer holding the input data. + * \param output    The buffer holding the output data. + * \param tag       The buffer holding the tag. + * \param tag_len   The length of the tag in Bytes. + * + * \return          0 if successful and authenticated, or + *                  #MBEDTLS_ERR_CCM_AUTH_FAILED if the tag does not match. + */ +int mbedtls_ccm_auth_decrypt( mbedtls_ccm_context *ctx, size_t length, +                      const unsigned char *iv, size_t iv_len, +                      const unsigned char *add, size_t add_len, +                      const unsigned char *input, unsigned char *output, +                      const unsigned char *tag, size_t tag_len ); + +#ifdef __cplusplus +} +#endif + +#else  /* MBEDTLS_CCM_ALT */ +#include "ccm_alt.h" +#endif /* MBEDTLS_CCM_ALT */ + +#ifdef __cplusplus +extern "C" { +#endif + +#if defined(MBEDTLS_SELF_TEST) && defined(MBEDTLS_AES_C) +/** + * \brief          The CCM checkup routine. + * + * \return         \c 0 on success, or \c 1 on failure. + */ +int mbedtls_ccm_self_test( int verbose ); +#endif /* MBEDTLS_SELF_TEST && MBEDTLS_AES_C */ + +#ifdef __cplusplus +} +#endif + +#endif /* MBEDTLS_CCM_H */ diff --git a/thirdparty/mbedtls/include/mbedtls/certs.h b/thirdparty/mbedtls/include/mbedtls/certs.h new file mode 100644 index 0000000000..8dab7b5ce8 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/certs.h @@ -0,0 +1,100 @@ +/** + * \file certs.h + * + * \brief Sample certificates and DHM parameters for testing + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_CERTS_H +#define MBEDTLS_CERTS_H + +#include <stddef.h> + +#ifdef __cplusplus +extern "C" { +#endif + +#if defined(MBEDTLS_PEM_PARSE_C) +/* Concatenation of all CA certificates in PEM format if available */ +extern const char   mbedtls_test_cas_pem[]; +extern const size_t mbedtls_test_cas_pem_len; +#endif + +/* List of all CA certificates, terminated by NULL */ +extern const char * mbedtls_test_cas[]; +extern const size_t mbedtls_test_cas_len[]; + +/* + * Convenience for users who just want a certificate: + * RSA by default, or ECDSA if RSA is not available + */ +extern const char * mbedtls_test_ca_crt; +extern const size_t mbedtls_test_ca_crt_len; +extern const char * mbedtls_test_ca_key; +extern const size_t mbedtls_test_ca_key_len; +extern const char * mbedtls_test_ca_pwd; +extern const size_t mbedtls_test_ca_pwd_len; +extern const char * mbedtls_test_srv_crt; +extern const size_t mbedtls_test_srv_crt_len; +extern const char * mbedtls_test_srv_key; +extern const size_t mbedtls_test_srv_key_len; +extern const char * mbedtls_test_cli_crt; +extern const size_t mbedtls_test_cli_crt_len; +extern const char * mbedtls_test_cli_key; +extern const size_t mbedtls_test_cli_key_len; + +#if defined(MBEDTLS_ECDSA_C) +extern const char   mbedtls_test_ca_crt_ec[]; +extern const size_t mbedtls_test_ca_crt_ec_len; +extern const char   mbedtls_test_ca_key_ec[]; +extern const size_t mbedtls_test_ca_key_ec_len; +extern const char   mbedtls_test_ca_pwd_ec[]; +extern const size_t mbedtls_test_ca_pwd_ec_len; +extern const char   mbedtls_test_srv_crt_ec[]; +extern const size_t mbedtls_test_srv_crt_ec_len; +extern const char   mbedtls_test_srv_key_ec[]; +extern const size_t mbedtls_test_srv_key_ec_len; +extern const char   mbedtls_test_cli_crt_ec[]; +extern const size_t mbedtls_test_cli_crt_ec_len; +extern const char   mbedtls_test_cli_key_ec[]; +extern const size_t mbedtls_test_cli_key_ec_len; +#endif + +#if defined(MBEDTLS_RSA_C) +extern const char   mbedtls_test_ca_crt_rsa[]; +extern const size_t mbedtls_test_ca_crt_rsa_len; +extern const char   mbedtls_test_ca_key_rsa[]; +extern const size_t mbedtls_test_ca_key_rsa_len; +extern const char   mbedtls_test_ca_pwd_rsa[]; +extern const size_t mbedtls_test_ca_pwd_rsa_len; +extern const char   mbedtls_test_srv_crt_rsa[]; +extern const size_t mbedtls_test_srv_crt_rsa_len; +extern const char   mbedtls_test_srv_key_rsa[]; +extern const size_t mbedtls_test_srv_key_rsa_len; +extern const char   mbedtls_test_cli_crt_rsa[]; +extern const size_t mbedtls_test_cli_crt_rsa_len; +extern const char   mbedtls_test_cli_key_rsa[]; +extern const size_t mbedtls_test_cli_key_rsa_len; +#endif + +#ifdef __cplusplus +} +#endif + +#endif /* certs.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/check_config.h b/thirdparty/mbedtls/include/mbedtls/check_config.h new file mode 100644 index 0000000000..1143aa2687 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/check_config.h @@ -0,0 +1,670 @@ +/** + * \file check_config.h + * + * \brief Consistency checks for configuration options + */ +/* + *  Copyright (C) 2006-2016, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ + +/* + * It is recommended to include this file from your config.h + * in order to catch dependency issues early. + */ + +#ifndef MBEDTLS_CHECK_CONFIG_H +#define MBEDTLS_CHECK_CONFIG_H + +/* + * We assume CHAR_BIT is 8 in many places. In practice, this is true on our + * target platforms, so not an issue, but let's just be extra sure. + */ +#include <limits.h> +#if CHAR_BIT != 8 +#error "mbed TLS requires a platform with 8-bit chars" +#endif + +#if defined(_WIN32) +#if !defined(MBEDTLS_PLATFORM_C) +#error "MBEDTLS_PLATFORM_C is required on Windows" +#endif + +/* Fix the config here. Not convenient to put an #ifdef _WIN32 in config.h as + * it would confuse config.pl. */ +#if !defined(MBEDTLS_PLATFORM_SNPRINTF_ALT) && \ +    !defined(MBEDTLS_PLATFORM_SNPRINTF_MACRO) +#define MBEDTLS_PLATFORM_SNPRINTF_ALT +#endif +#endif /* _WIN32 */ + +#if defined(TARGET_LIKE_MBED) && \ +    ( defined(MBEDTLS_NET_C) || defined(MBEDTLS_TIMING_C) ) +#error "The NET and TIMING modules are not available for mbed OS - please use the network and timing functions provided by mbed OS" +#endif + +#if defined(MBEDTLS_DEPRECATED_WARNING) && \ +    !defined(__GNUC__) && !defined(__clang__) +#error "MBEDTLS_DEPRECATED_WARNING only works with GCC and Clang" +#endif + +#if defined(MBEDTLS_HAVE_TIME_DATE) && !defined(MBEDTLS_HAVE_TIME) +#error "MBEDTLS_HAVE_TIME_DATE without MBEDTLS_HAVE_TIME does not make sense" +#endif + +#if defined(MBEDTLS_AESNI_C) && !defined(MBEDTLS_HAVE_ASM) +#error "MBEDTLS_AESNI_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_CTR_DRBG_C) && !defined(MBEDTLS_AES_C) +#error "MBEDTLS_CTR_DRBG_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_DHM_C) && !defined(MBEDTLS_BIGNUM_C) +#error "MBEDTLS_DHM_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_CMAC_C) && \ +    !defined(MBEDTLS_AES_C) && !defined(MBEDTLS_DES_C) +#error "MBEDTLS_CMAC_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_ECDH_C) && !defined(MBEDTLS_ECP_C) +#error "MBEDTLS_ECDH_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_ECDSA_C) &&            \ +    ( !defined(MBEDTLS_ECP_C) ||           \ +      !defined(MBEDTLS_ASN1_PARSE_C) ||    \ +      !defined(MBEDTLS_ASN1_WRITE_C) ) +#error "MBEDTLS_ECDSA_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_ECJPAKE_C) &&           \ +    ( !defined(MBEDTLS_ECP_C) || !defined(MBEDTLS_MD_C) ) +#error "MBEDTLS_ECJPAKE_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_ECDSA_DETERMINISTIC) && !defined(MBEDTLS_HMAC_DRBG_C) +#error "MBEDTLS_ECDSA_DETERMINISTIC defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_ECP_C) && ( !defined(MBEDTLS_BIGNUM_C) || (   \ +    !defined(MBEDTLS_ECP_DP_SECP192R1_ENABLED) &&                  \ +    !defined(MBEDTLS_ECP_DP_SECP224R1_ENABLED) &&                  \ +    !defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED) &&                  \ +    !defined(MBEDTLS_ECP_DP_SECP384R1_ENABLED) &&                  \ +    !defined(MBEDTLS_ECP_DP_SECP521R1_ENABLED) &&                  \ +    !defined(MBEDTLS_ECP_DP_BP256R1_ENABLED)   &&                  \ +    !defined(MBEDTLS_ECP_DP_BP384R1_ENABLED)   &&                  \ +    !defined(MBEDTLS_ECP_DP_BP512R1_ENABLED)   &&                  \ +    !defined(MBEDTLS_ECP_DP_SECP192K1_ENABLED) &&                  \ +    !defined(MBEDTLS_ECP_DP_SECP224K1_ENABLED) &&                  \ +    !defined(MBEDTLS_ECP_DP_SECP256K1_ENABLED) ) ) +#error "MBEDTLS_ECP_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_ENTROPY_C) && (!defined(MBEDTLS_SHA512_C) &&      \ +                                    !defined(MBEDTLS_SHA256_C)) +#error "MBEDTLS_ENTROPY_C defined, but not all prerequisites" +#endif +#if defined(MBEDTLS_ENTROPY_C) && defined(MBEDTLS_SHA512_C) &&         \ +    defined(MBEDTLS_CTR_DRBG_ENTROPY_LEN) && (MBEDTLS_CTR_DRBG_ENTROPY_LEN > 64) +#error "MBEDTLS_CTR_DRBG_ENTROPY_LEN value too high" +#endif +#if defined(MBEDTLS_ENTROPY_C) &&                                            \ +    ( !defined(MBEDTLS_SHA512_C) || defined(MBEDTLS_ENTROPY_FORCE_SHA256) ) \ +    && defined(MBEDTLS_CTR_DRBG_ENTROPY_LEN) && (MBEDTLS_CTR_DRBG_ENTROPY_LEN > 32) +#error "MBEDTLS_CTR_DRBG_ENTROPY_LEN value too high" +#endif +#if defined(MBEDTLS_ENTROPY_C) && \ +    defined(MBEDTLS_ENTROPY_FORCE_SHA256) && !defined(MBEDTLS_SHA256_C) +#error "MBEDTLS_ENTROPY_FORCE_SHA256 defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_TEST_NULL_ENTROPY) && \ +    ( !defined(MBEDTLS_ENTROPY_C) || !defined(MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES) ) +#error "MBEDTLS_TEST_NULL_ENTROPY defined, but not all prerequisites" +#endif +#if defined(MBEDTLS_TEST_NULL_ENTROPY) && \ +     ( defined(MBEDTLS_ENTROPY_NV_SEED) || defined(MBEDTLS_ENTROPY_HARDWARE_ALT) || \ +    defined(MBEDTLS_HAVEGE_C) ) +#error "MBEDTLS_TEST_NULL_ENTROPY defined, but entropy sources too" +#endif + +#if defined(MBEDTLS_GCM_C) && (                                        \ +        !defined(MBEDTLS_AES_C) && !defined(MBEDTLS_CAMELLIA_C) ) +#error "MBEDTLS_GCM_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_ECP_RANDOMIZE_JAC_ALT) && !defined(MBEDTLS_ECP_INTERNAL_ALT) +#error "MBEDTLS_ECP_RANDOMIZE_JAC_ALT defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_ECP_ADD_MIXED_ALT) && !defined(MBEDTLS_ECP_INTERNAL_ALT) +#error "MBEDTLS_ECP_ADD_MIXED_ALT defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_ECP_DOUBLE_JAC_ALT) && !defined(MBEDTLS_ECP_INTERNAL_ALT) +#error "MBEDTLS_ECP_DOUBLE_JAC_ALT defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_ECP_NORMALIZE_JAC_MANY_ALT) && !defined(MBEDTLS_ECP_INTERNAL_ALT) +#error "MBEDTLS_ECP_NORMALIZE_JAC_MANY_ALT defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_ECP_NORMALIZE_JAC_ALT) && !defined(MBEDTLS_ECP_INTERNAL_ALT) +#error "MBEDTLS_ECP_NORMALIZE_JAC_ALT defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT) && !defined(MBEDTLS_ECP_INTERNAL_ALT) +#error "MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_ECP_RANDOMIZE_MXZ_ALT) && !defined(MBEDTLS_ECP_INTERNAL_ALT) +#error "MBEDTLS_ECP_RANDOMIZE_MXZ_ALT defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_ECP_NORMALIZE_MXZ_ALT) && !defined(MBEDTLS_ECP_INTERNAL_ALT) +#error "MBEDTLS_ECP_NORMALIZE_MXZ_ALT defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_HAVEGE_C) && !defined(MBEDTLS_TIMING_C) +#error "MBEDTLS_HAVEGE_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_HMAC_DRBG_C) && !defined(MBEDTLS_MD_C) +#error "MBEDTLS_HMAC_DRBG_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED) &&                 \ +    ( !defined(MBEDTLS_ECDH_C) || !defined(MBEDTLS_X509_CRT_PARSE_C) ) +#error "MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) &&                 \ +    ( !defined(MBEDTLS_ECDH_C) || !defined(MBEDTLS_X509_CRT_PARSE_C) ) +#error "MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED) && !defined(MBEDTLS_DHM_C) +#error "MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) &&                     \ +    !defined(MBEDTLS_ECDH_C) +#error "MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) &&                   \ +    ( !defined(MBEDTLS_DHM_C) || !defined(MBEDTLS_RSA_C) ||           \ +      !defined(MBEDTLS_X509_CRT_PARSE_C) || !defined(MBEDTLS_PKCS1_V15) ) +#error "MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) &&                 \ +    ( !defined(MBEDTLS_ECDH_C) || !defined(MBEDTLS_RSA_C) ||          \ +      !defined(MBEDTLS_X509_CRT_PARSE_C) || !defined(MBEDTLS_PKCS1_V15) ) +#error "MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) &&                 \ +    ( !defined(MBEDTLS_ECDH_C) || !defined(MBEDTLS_ECDSA_C) ||          \ +      !defined(MBEDTLS_X509_CRT_PARSE_C) ) +#error "MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED) &&                   \ +    ( !defined(MBEDTLS_RSA_C) || !defined(MBEDTLS_X509_CRT_PARSE_C) || \ +      !defined(MBEDTLS_PKCS1_V15) ) +#error "MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) &&                       \ +    ( !defined(MBEDTLS_RSA_C) || !defined(MBEDTLS_X509_CRT_PARSE_C) || \ +      !defined(MBEDTLS_PKCS1_V15) ) +#error "MBEDTLS_KEY_EXCHANGE_RSA_ENABLED defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) &&                    \ +    ( !defined(MBEDTLS_ECJPAKE_C) || !defined(MBEDTLS_SHA256_C) ||      \ +      !defined(MBEDTLS_ECP_DP_SECP256R1_ENABLED) ) +#error "MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_MEMORY_BUFFER_ALLOC_C) &&                          \ +    ( !defined(MBEDTLS_PLATFORM_C) || !defined(MBEDTLS_PLATFORM_MEMORY) ) +#error "MBEDTLS_MEMORY_BUFFER_ALLOC_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PADLOCK_C) && !defined(MBEDTLS_HAVE_ASM) +#error "MBEDTLS_PADLOCK_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PEM_PARSE_C) && !defined(MBEDTLS_BASE64_C) +#error "MBEDTLS_PEM_PARSE_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PEM_WRITE_C) && !defined(MBEDTLS_BASE64_C) +#error "MBEDTLS_PEM_WRITE_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PK_C) && \ +    ( !defined(MBEDTLS_RSA_C) && !defined(MBEDTLS_ECP_C) ) +#error "MBEDTLS_PK_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PK_PARSE_C) && !defined(MBEDTLS_PK_C) +#error "MBEDTLS_PK_PARSE_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PK_WRITE_C) && !defined(MBEDTLS_PK_C) +#error "MBEDTLS_PK_WRITE_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PKCS11_C) && !defined(MBEDTLS_PK_C) +#error "MBEDTLS_PKCS11_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_EXIT_ALT) && !defined(MBEDTLS_PLATFORM_C) +#error "MBEDTLS_PLATFORM_EXIT_ALT defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_EXIT_MACRO) && !defined(MBEDTLS_PLATFORM_C) +#error "MBEDTLS_PLATFORM_EXIT_MACRO defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_EXIT_MACRO) &&\ +    ( defined(MBEDTLS_PLATFORM_STD_EXIT) ||\ +        defined(MBEDTLS_PLATFORM_EXIT_ALT) ) +#error "MBEDTLS_PLATFORM_EXIT_MACRO and MBEDTLS_PLATFORM_STD_EXIT/MBEDTLS_PLATFORM_EXIT_ALT cannot be defined simultaneously" +#endif + +#if defined(MBEDTLS_PLATFORM_TIME_ALT) &&\ +    ( !defined(MBEDTLS_PLATFORM_C) ||\ +        !defined(MBEDTLS_HAVE_TIME) ) +#error "MBEDTLS_PLATFORM_TIME_ALT defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_TIME_MACRO) &&\ +    ( !defined(MBEDTLS_PLATFORM_C) ||\ +        !defined(MBEDTLS_HAVE_TIME) ) +#error "MBEDTLS_PLATFORM_TIME_MACRO defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_TIME_TYPE_MACRO) &&\ +    ( !defined(MBEDTLS_PLATFORM_C) ||\ +        !defined(MBEDTLS_HAVE_TIME) ) +#error "MBEDTLS_PLATFORM_TIME_TYPE_MACRO defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_TIME_MACRO) &&\ +    ( defined(MBEDTLS_PLATFORM_STD_TIME) ||\ +        defined(MBEDTLS_PLATFORM_TIME_ALT) ) +#error "MBEDTLS_PLATFORM_TIME_MACRO and MBEDTLS_PLATFORM_STD_TIME/MBEDTLS_PLATFORM_TIME_ALT cannot be defined simultaneously" +#endif + +#if defined(MBEDTLS_PLATFORM_TIME_TYPE_MACRO) &&\ +    ( defined(MBEDTLS_PLATFORM_STD_TIME) ||\ +        defined(MBEDTLS_PLATFORM_TIME_ALT) ) +#error "MBEDTLS_PLATFORM_TIME_TYPE_MACRO and MBEDTLS_PLATFORM_STD_TIME/MBEDTLS_PLATFORM_TIME_ALT cannot be defined simultaneously" +#endif + +#if defined(MBEDTLS_PLATFORM_FPRINTF_ALT) && !defined(MBEDTLS_PLATFORM_C) +#error "MBEDTLS_PLATFORM_FPRINTF_ALT defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_FPRINTF_MACRO) && !defined(MBEDTLS_PLATFORM_C) +#error "MBEDTLS_PLATFORM_FPRINTF_MACRO defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_FPRINTF_MACRO) &&\ +    ( defined(MBEDTLS_PLATFORM_STD_FPRINTF) ||\ +        defined(MBEDTLS_PLATFORM_FPRINTF_ALT) ) +#error "MBEDTLS_PLATFORM_FPRINTF_MACRO and MBEDTLS_PLATFORM_STD_FPRINTF/MBEDTLS_PLATFORM_FPRINTF_ALT cannot be defined simultaneously" +#endif + +#if defined(MBEDTLS_PLATFORM_FREE_MACRO) &&\ +    ( !defined(MBEDTLS_PLATFORM_C) || !defined(MBEDTLS_PLATFORM_MEMORY) ) +#error "MBEDTLS_PLATFORM_FREE_MACRO defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_FREE_MACRO) &&\ +    defined(MBEDTLS_PLATFORM_STD_FREE) +#error "MBEDTLS_PLATFORM_FREE_MACRO and MBEDTLS_PLATFORM_STD_FREE cannot be defined simultaneously" +#endif + +#if defined(MBEDTLS_PLATFORM_FREE_MACRO) && !defined(MBEDTLS_PLATFORM_CALLOC_MACRO) +#error "MBEDTLS_PLATFORM_CALLOC_MACRO must be defined if MBEDTLS_PLATFORM_FREE_MACRO is" +#endif + +#if defined(MBEDTLS_PLATFORM_CALLOC_MACRO) &&\ +    ( !defined(MBEDTLS_PLATFORM_C) || !defined(MBEDTLS_PLATFORM_MEMORY) ) +#error "MBEDTLS_PLATFORM_CALLOC_MACRO defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_CALLOC_MACRO) &&\ +    defined(MBEDTLS_PLATFORM_STD_CALLOC) +#error "MBEDTLS_PLATFORM_CALLOC_MACRO and MBEDTLS_PLATFORM_STD_CALLOC cannot be defined simultaneously" +#endif + +#if defined(MBEDTLS_PLATFORM_CALLOC_MACRO) && !defined(MBEDTLS_PLATFORM_FREE_MACRO) +#error "MBEDTLS_PLATFORM_FREE_MACRO must be defined if MBEDTLS_PLATFORM_CALLOC_MACRO is" +#endif + +#if defined(MBEDTLS_PLATFORM_MEMORY) && !defined(MBEDTLS_PLATFORM_C) +#error "MBEDTLS_PLATFORM_MEMORY defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_PRINTF_ALT) && !defined(MBEDTLS_PLATFORM_C) +#error "MBEDTLS_PLATFORM_PRINTF_ALT defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_PRINTF_MACRO) && !defined(MBEDTLS_PLATFORM_C) +#error "MBEDTLS_PLATFORM_PRINTF_MACRO defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_PRINTF_MACRO) &&\ +    ( defined(MBEDTLS_PLATFORM_STD_PRINTF) ||\ +        defined(MBEDTLS_PLATFORM_PRINTF_ALT) ) +#error "MBEDTLS_PLATFORM_PRINTF_MACRO and MBEDTLS_PLATFORM_STD_PRINTF/MBEDTLS_PLATFORM_PRINTF_ALT cannot be defined simultaneously" +#endif + +#if defined(MBEDTLS_PLATFORM_SNPRINTF_ALT) && !defined(MBEDTLS_PLATFORM_C) +#error "MBEDTLS_PLATFORM_SNPRINTF_ALT defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_SNPRINTF_MACRO) && !defined(MBEDTLS_PLATFORM_C) +#error "MBEDTLS_PLATFORM_SNPRINTF_MACRO defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_SNPRINTF_MACRO) &&\ +    ( defined(MBEDTLS_PLATFORM_STD_SNPRINTF) ||\ +        defined(MBEDTLS_PLATFORM_SNPRINTF_ALT) ) +#error "MBEDTLS_PLATFORM_SNPRINTF_MACRO and MBEDTLS_PLATFORM_STD_SNPRINTF/MBEDTLS_PLATFORM_SNPRINTF_ALT cannot be defined simultaneously" +#endif + +#if defined(MBEDTLS_PLATFORM_STD_MEM_HDR) &&\ +    !defined(MBEDTLS_PLATFORM_NO_STD_FUNCTIONS) +#error "MBEDTLS_PLATFORM_STD_MEM_HDR defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_STD_CALLOC) && !defined(MBEDTLS_PLATFORM_MEMORY) +#error "MBEDTLS_PLATFORM_STD_CALLOC defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_STD_CALLOC) && !defined(MBEDTLS_PLATFORM_MEMORY) +#error "MBEDTLS_PLATFORM_STD_CALLOC defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_STD_FREE) && !defined(MBEDTLS_PLATFORM_MEMORY) +#error "MBEDTLS_PLATFORM_STD_FREE defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_STD_EXIT) &&\ +    !defined(MBEDTLS_PLATFORM_EXIT_ALT) +#error "MBEDTLS_PLATFORM_STD_EXIT defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_STD_TIME) &&\ +    ( !defined(MBEDTLS_PLATFORM_TIME_ALT) ||\ +        !defined(MBEDTLS_HAVE_TIME) ) +#error "MBEDTLS_PLATFORM_STD_TIME defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_STD_FPRINTF) &&\ +    !defined(MBEDTLS_PLATFORM_FPRINTF_ALT) +#error "MBEDTLS_PLATFORM_STD_FPRINTF defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_STD_PRINTF) &&\ +    !defined(MBEDTLS_PLATFORM_PRINTF_ALT) +#error "MBEDTLS_PLATFORM_STD_PRINTF defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_STD_SNPRINTF) &&\ +    !defined(MBEDTLS_PLATFORM_SNPRINTF_ALT) +#error "MBEDTLS_PLATFORM_STD_SNPRINTF defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_ENTROPY_NV_SEED) &&\ +    ( !defined(MBEDTLS_PLATFORM_C) || !defined(MBEDTLS_ENTROPY_C) ) +#error "MBEDTLS_ENTROPY_NV_SEED defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_NV_SEED_ALT) &&\ +    !defined(MBEDTLS_ENTROPY_NV_SEED) +#error "MBEDTLS_PLATFORM_NV_SEED_ALT defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_STD_NV_SEED_READ) &&\ +    !defined(MBEDTLS_PLATFORM_NV_SEED_ALT) +#error "MBEDTLS_PLATFORM_STD_NV_SEED_READ defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_STD_NV_SEED_WRITE) &&\ +    !defined(MBEDTLS_PLATFORM_NV_SEED_ALT) +#error "MBEDTLS_PLATFORM_STD_NV_SEED_WRITE defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_PLATFORM_NV_SEED_READ_MACRO) &&\ +    ( defined(MBEDTLS_PLATFORM_STD_NV_SEED_READ) ||\ +      defined(MBEDTLS_PLATFORM_NV_SEED_ALT) ) +#error "MBEDTLS_PLATFORM_NV_SEED_READ_MACRO and MBEDTLS_PLATFORM_STD_NV_SEED_READ cannot be defined simultaneously" +#endif + +#if defined(MBEDTLS_PLATFORM_NV_SEED_WRITE_MACRO) &&\ +    ( defined(MBEDTLS_PLATFORM_STD_NV_SEED_WRITE) ||\ +      defined(MBEDTLS_PLATFORM_NV_SEED_ALT) ) +#error "MBEDTLS_PLATFORM_NV_SEED_WRITE_MACRO and MBEDTLS_PLATFORM_STD_NV_SEED_WRITE cannot be defined simultaneously" +#endif + +#if defined(MBEDTLS_RSA_C) && ( !defined(MBEDTLS_BIGNUM_C) ||         \ +    !defined(MBEDTLS_OID_C) ) +#error "MBEDTLS_RSA_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_RSA_C) && ( !defined(MBEDTLS_PKCS1_V21) &&         \ +    !defined(MBEDTLS_PKCS1_V15) ) +#error "MBEDTLS_RSA_C defined, but none of the PKCS1 versions enabled" +#endif + +#if defined(MBEDTLS_X509_RSASSA_PSS_SUPPORT) &&                        \ +    ( !defined(MBEDTLS_RSA_C) || !defined(MBEDTLS_PKCS1_V21) ) +#error "MBEDTLS_X509_RSASSA_PSS_SUPPORT defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_SSL_PROTO_SSL3) && ( !defined(MBEDTLS_MD5_C) ||     \ +    !defined(MBEDTLS_SHA1_C) ) +#error "MBEDTLS_SSL_PROTO_SSL3 defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_SSL_PROTO_TLS1) && ( !defined(MBEDTLS_MD5_C) ||     \ +    !defined(MBEDTLS_SHA1_C) ) +#error "MBEDTLS_SSL_PROTO_TLS1 defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_SSL_PROTO_TLS1_1) && ( !defined(MBEDTLS_MD5_C) ||     \ +    !defined(MBEDTLS_SHA1_C) ) +#error "MBEDTLS_SSL_PROTO_TLS1_1 defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_SSL_PROTO_TLS1_2) && ( !defined(MBEDTLS_SHA1_C) &&     \ +    !defined(MBEDTLS_SHA256_C) && !defined(MBEDTLS_SHA512_C) ) +#error "MBEDTLS_SSL_PROTO_TLS1_2 defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_SSL_PROTO_DTLS)     && \ +    !defined(MBEDTLS_SSL_PROTO_TLS1_1)  && \ +    !defined(MBEDTLS_SSL_PROTO_TLS1_2) +#error "MBEDTLS_SSL_PROTO_DTLS defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_SSL_CLI_C) && !defined(MBEDTLS_SSL_TLS_C) +#error "MBEDTLS_SSL_CLI_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_SSL_TLS_C) && ( !defined(MBEDTLS_CIPHER_C) ||     \ +    !defined(MBEDTLS_MD_C) ) +#error "MBEDTLS_SSL_TLS_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_SSL_SRV_C) && !defined(MBEDTLS_SSL_TLS_C) +#error "MBEDTLS_SSL_SRV_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_SSL_TLS_C) && (!defined(MBEDTLS_SSL_PROTO_SSL3) && \ +    !defined(MBEDTLS_SSL_PROTO_TLS1) && !defined(MBEDTLS_SSL_PROTO_TLS1_1) && \ +    !defined(MBEDTLS_SSL_PROTO_TLS1_2)) +#error "MBEDTLS_SSL_TLS_C defined, but no protocols are active" +#endif + +#if defined(MBEDTLS_SSL_TLS_C) && (defined(MBEDTLS_SSL_PROTO_SSL3) && \ +    defined(MBEDTLS_SSL_PROTO_TLS1_1) && !defined(MBEDTLS_SSL_PROTO_TLS1)) +#error "Illegal protocol selection" +#endif + +#if defined(MBEDTLS_SSL_TLS_C) && (defined(MBEDTLS_SSL_PROTO_TLS1) && \ +    defined(MBEDTLS_SSL_PROTO_TLS1_2) && !defined(MBEDTLS_SSL_PROTO_TLS1_1)) +#error "Illegal protocol selection" +#endif + +#if defined(MBEDTLS_SSL_TLS_C) && (defined(MBEDTLS_SSL_PROTO_SSL3) && \ +    defined(MBEDTLS_SSL_PROTO_TLS1_2) && (!defined(MBEDTLS_SSL_PROTO_TLS1) || \ +    !defined(MBEDTLS_SSL_PROTO_TLS1_1))) +#error "Illegal protocol selection" +#endif + +#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && !defined(MBEDTLS_SSL_PROTO_DTLS) +#error "MBEDTLS_SSL_DTLS_HELLO_VERIFY  defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE) && \ +    !defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) +#error "MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE  defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY) &&                              \ +    ( !defined(MBEDTLS_SSL_TLS_C) || !defined(MBEDTLS_SSL_PROTO_DTLS) ) +#error "MBEDTLS_SSL_DTLS_ANTI_REPLAY  defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT) &&                              \ +    ( !defined(MBEDTLS_SSL_TLS_C) || !defined(MBEDTLS_SSL_PROTO_DTLS) ) +#error "MBEDTLS_SSL_DTLS_BADMAC_LIMIT  defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC) &&   \ +    !defined(MBEDTLS_SSL_PROTO_TLS1)   &&      \ +    !defined(MBEDTLS_SSL_PROTO_TLS1_1) &&      \ +    !defined(MBEDTLS_SSL_PROTO_TLS1_2) +#error "MBEDTLS_SSL_ENCRYPT_THEN_MAC defined, but not all prerequsites" +#endif + +#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET) && \ +    !defined(MBEDTLS_SSL_PROTO_TLS1)   &&          \ +    !defined(MBEDTLS_SSL_PROTO_TLS1_1) &&          \ +    !defined(MBEDTLS_SSL_PROTO_TLS1_2) +#error "MBEDTLS_SSL_EXTENDED_MASTER_SECRET defined, but not all prerequsites" +#endif + +#if defined(MBEDTLS_SSL_TICKET_C) && !defined(MBEDTLS_CIPHER_C) +#error "MBEDTLS_SSL_TICKET_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING) && \ +    !defined(MBEDTLS_SSL_PROTO_SSL3) && !defined(MBEDTLS_SSL_PROTO_TLS1) +#error "MBEDTLS_SSL_CBC_RECORD_SPLITTING defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION) && \ +        !defined(MBEDTLS_X509_CRT_PARSE_C) +#error "MBEDTLS_SSL_SERVER_NAME_INDICATION defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_THREADING_PTHREAD) +#if !defined(MBEDTLS_THREADING_C) || defined(MBEDTLS_THREADING_IMPL) +#error "MBEDTLS_THREADING_PTHREAD defined, but not all prerequisites" +#endif +#define MBEDTLS_THREADING_IMPL +#endif + +#if defined(MBEDTLS_THREADING_ALT) +#if !defined(MBEDTLS_THREADING_C) || defined(MBEDTLS_THREADING_IMPL) +#error "MBEDTLS_THREADING_ALT defined, but not all prerequisites" +#endif +#define MBEDTLS_THREADING_IMPL +#endif + +#if defined(MBEDTLS_THREADING_C) && !defined(MBEDTLS_THREADING_IMPL) +#error "MBEDTLS_THREADING_C defined, single threading implementation required" +#endif +#undef MBEDTLS_THREADING_IMPL + +#if defined(MBEDTLS_VERSION_FEATURES) && !defined(MBEDTLS_VERSION_C) +#error "MBEDTLS_VERSION_FEATURES defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_X509_USE_C) && ( !defined(MBEDTLS_BIGNUM_C) ||  \ +    !defined(MBEDTLS_OID_C) || !defined(MBEDTLS_ASN1_PARSE_C) ||      \ +    !defined(MBEDTLS_PK_PARSE_C) ) +#error "MBEDTLS_X509_USE_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_X509_CREATE_C) && ( !defined(MBEDTLS_BIGNUM_C) ||  \ +    !defined(MBEDTLS_OID_C) || !defined(MBEDTLS_ASN1_WRITE_C) ||       \ +    !defined(MBEDTLS_PK_WRITE_C) ) +#error "MBEDTLS_X509_CREATE_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_X509_CRT_PARSE_C) && ( !defined(MBEDTLS_X509_USE_C) ) +#error "MBEDTLS_X509_CRT_PARSE_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_X509_CRL_PARSE_C) && ( !defined(MBEDTLS_X509_USE_C) ) +#error "MBEDTLS_X509_CRL_PARSE_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_X509_CSR_PARSE_C) && ( !defined(MBEDTLS_X509_USE_C) ) +#error "MBEDTLS_X509_CSR_PARSE_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_X509_CRT_WRITE_C) && ( !defined(MBEDTLS_X509_CREATE_C) ) +#error "MBEDTLS_X509_CRT_WRITE_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_X509_CSR_WRITE_C) && ( !defined(MBEDTLS_X509_CREATE_C) ) +#error "MBEDTLS_X509_CSR_WRITE_C defined, but not all prerequisites" +#endif + +#if defined(MBEDTLS_HAVE_INT32) && defined(MBEDTLS_HAVE_INT64) +#error "MBEDTLS_HAVE_INT32 and MBEDTLS_HAVE_INT64 cannot be defined simultaneously" +#endif /* MBEDTLS_HAVE_INT32 && MBEDTLS_HAVE_INT64 */ + +#if ( defined(MBEDTLS_HAVE_INT32) || defined(MBEDTLS_HAVE_INT64) ) && \ +    defined(MBEDTLS_HAVE_ASM) +#error "MBEDTLS_HAVE_INT32/MBEDTLS_HAVE_INT64 and MBEDTLS_HAVE_ASM cannot be defined simultaneously" +#endif /* (MBEDTLS_HAVE_INT32 || MBEDTLS_HAVE_INT64) && MBEDTLS_HAVE_ASM */ + +/* + * Avoid warning from -pedantic. This is a convenient place for this + * workaround since this is included by every single file before the + * #if defined(MBEDTLS_xxx_C) that results in emtpy translation units. + */ +typedef int mbedtls_iso_c_forbids_empty_translation_units; + +#endif /* MBEDTLS_CHECK_CONFIG_H */ diff --git a/thirdparty/mbedtls/include/mbedtls/cipher.h b/thirdparty/mbedtls/include/mbedtls/cipher.h new file mode 100644 index 0000000000..d1f4efef8e --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/cipher.h @@ -0,0 +1,752 @@ +/** + * \file cipher.h + * + * \brief The generic cipher wrapper. + * + * \author Adriaan de Jong <dejong@fox-it.com> + */ +/* + *  Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of Mbed TLS (https://tls.mbed.org) + */ + +#ifndef MBEDTLS_CIPHER_H +#define MBEDTLS_CIPHER_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> + +#if defined(MBEDTLS_GCM_C) || defined(MBEDTLS_CCM_C) +#define MBEDTLS_CIPHER_MODE_AEAD +#endif + +#if defined(MBEDTLS_CIPHER_MODE_CBC) +#define MBEDTLS_CIPHER_MODE_WITH_PADDING +#endif + +#if defined(MBEDTLS_ARC4_C) +#define MBEDTLS_CIPHER_MODE_STREAM +#endif + +#if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \ +    !defined(inline) && !defined(__cplusplus) +#define inline __inline +#endif + +#define MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE  -0x6080  /**< The selected feature is not available. */ +#define MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA       -0x6100  /**< Bad input parameters. */ +#define MBEDTLS_ERR_CIPHER_ALLOC_FAILED         -0x6180  /**< Failed to allocate memory. */ +#define MBEDTLS_ERR_CIPHER_INVALID_PADDING      -0x6200  /**< Input data contains invalid padding and is rejected. */ +#define MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED  -0x6280  /**< Decryption of block requires a full block. */ +#define MBEDTLS_ERR_CIPHER_AUTH_FAILED          -0x6300  /**< Authentication failed (for AEAD modes). */ +#define MBEDTLS_ERR_CIPHER_INVALID_CONTEXT      -0x6380  /**< The context is invalid. For example, because it was freed. */ +#define MBEDTLS_ERR_CIPHER_HW_ACCEL_FAILED      -0x6400  /**< Cipher hardware accelerator failed. */ + +#define MBEDTLS_CIPHER_VARIABLE_IV_LEN     0x01    /**< Cipher accepts IVs of variable length. */ +#define MBEDTLS_CIPHER_VARIABLE_KEY_LEN    0x02    /**< Cipher accepts keys of variable length. */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief     An enumeration of supported ciphers. + * + * \warning   ARC4 and DES are considered weak ciphers and their use + *            constitutes a security risk. We recommend considering stronger + *            ciphers instead. + */ +typedef enum { +    MBEDTLS_CIPHER_ID_NONE = 0, +    MBEDTLS_CIPHER_ID_NULL, +    MBEDTLS_CIPHER_ID_AES, +    MBEDTLS_CIPHER_ID_DES, +    MBEDTLS_CIPHER_ID_3DES, +    MBEDTLS_CIPHER_ID_CAMELLIA, +    MBEDTLS_CIPHER_ID_BLOWFISH, +    MBEDTLS_CIPHER_ID_ARC4, +} mbedtls_cipher_id_t; + +/** + * \brief     An enumeration of supported (cipher, mode) pairs. + * + * \warning   ARC4 and DES are considered weak ciphers and their use + *            constitutes a security risk. We recommend considering stronger + *            ciphers instead. + */ +typedef enum { +    MBEDTLS_CIPHER_NONE = 0, +    MBEDTLS_CIPHER_NULL, +    MBEDTLS_CIPHER_AES_128_ECB, +    MBEDTLS_CIPHER_AES_192_ECB, +    MBEDTLS_CIPHER_AES_256_ECB, +    MBEDTLS_CIPHER_AES_128_CBC, +    MBEDTLS_CIPHER_AES_192_CBC, +    MBEDTLS_CIPHER_AES_256_CBC, +    MBEDTLS_CIPHER_AES_128_CFB128, +    MBEDTLS_CIPHER_AES_192_CFB128, +    MBEDTLS_CIPHER_AES_256_CFB128, +    MBEDTLS_CIPHER_AES_128_CTR, +    MBEDTLS_CIPHER_AES_192_CTR, +    MBEDTLS_CIPHER_AES_256_CTR, +    MBEDTLS_CIPHER_AES_128_GCM, +    MBEDTLS_CIPHER_AES_192_GCM, +    MBEDTLS_CIPHER_AES_256_GCM, +    MBEDTLS_CIPHER_CAMELLIA_128_ECB, +    MBEDTLS_CIPHER_CAMELLIA_192_ECB, +    MBEDTLS_CIPHER_CAMELLIA_256_ECB, +    MBEDTLS_CIPHER_CAMELLIA_128_CBC, +    MBEDTLS_CIPHER_CAMELLIA_192_CBC, +    MBEDTLS_CIPHER_CAMELLIA_256_CBC, +    MBEDTLS_CIPHER_CAMELLIA_128_CFB128, +    MBEDTLS_CIPHER_CAMELLIA_192_CFB128, +    MBEDTLS_CIPHER_CAMELLIA_256_CFB128, +    MBEDTLS_CIPHER_CAMELLIA_128_CTR, +    MBEDTLS_CIPHER_CAMELLIA_192_CTR, +    MBEDTLS_CIPHER_CAMELLIA_256_CTR, +    MBEDTLS_CIPHER_CAMELLIA_128_GCM, +    MBEDTLS_CIPHER_CAMELLIA_192_GCM, +    MBEDTLS_CIPHER_CAMELLIA_256_GCM, +    MBEDTLS_CIPHER_DES_ECB, +    MBEDTLS_CIPHER_DES_CBC, +    MBEDTLS_CIPHER_DES_EDE_ECB, +    MBEDTLS_CIPHER_DES_EDE_CBC, +    MBEDTLS_CIPHER_DES_EDE3_ECB, +    MBEDTLS_CIPHER_DES_EDE3_CBC, +    MBEDTLS_CIPHER_BLOWFISH_ECB, +    MBEDTLS_CIPHER_BLOWFISH_CBC, +    MBEDTLS_CIPHER_BLOWFISH_CFB64, +    MBEDTLS_CIPHER_BLOWFISH_CTR, +    MBEDTLS_CIPHER_ARC4_128, +    MBEDTLS_CIPHER_AES_128_CCM, +    MBEDTLS_CIPHER_AES_192_CCM, +    MBEDTLS_CIPHER_AES_256_CCM, +    MBEDTLS_CIPHER_CAMELLIA_128_CCM, +    MBEDTLS_CIPHER_CAMELLIA_192_CCM, +    MBEDTLS_CIPHER_CAMELLIA_256_CCM, +} mbedtls_cipher_type_t; + +/** Supported cipher modes. */ +typedef enum { +    MBEDTLS_MODE_NONE = 0, +    MBEDTLS_MODE_ECB, +    MBEDTLS_MODE_CBC, +    MBEDTLS_MODE_CFB, +    MBEDTLS_MODE_OFB, /* Unused! */ +    MBEDTLS_MODE_CTR, +    MBEDTLS_MODE_GCM, +    MBEDTLS_MODE_STREAM, +    MBEDTLS_MODE_CCM, +} mbedtls_cipher_mode_t; + +/** Supported cipher padding types. */ +typedef enum { +    MBEDTLS_PADDING_PKCS7 = 0,     /**< PKCS7 padding (default).        */ +    MBEDTLS_PADDING_ONE_AND_ZEROS, /**< ISO/IEC 7816-4 padding.         */ +    MBEDTLS_PADDING_ZEROS_AND_LEN, /**< ANSI X.923 padding.             */ +    MBEDTLS_PADDING_ZEROS,         /**< zero padding (not reversible). */ +    MBEDTLS_PADDING_NONE,          /**< never pad (full blocks only).   */ +} mbedtls_cipher_padding_t; + +/** Type of operation. */ +typedef enum { +    MBEDTLS_OPERATION_NONE = -1, +    MBEDTLS_DECRYPT = 0, +    MBEDTLS_ENCRYPT, +} mbedtls_operation_t; + +enum { +    /** Undefined key length. */ +    MBEDTLS_KEY_LENGTH_NONE = 0, +    /** Key length, in bits (including parity), for DES keys. */ +    MBEDTLS_KEY_LENGTH_DES  = 64, +    /** Key length in bits, including parity, for DES in two-key EDE. */ +    MBEDTLS_KEY_LENGTH_DES_EDE = 128, +    /** Key length in bits, including parity, for DES in three-key EDE. */ +    MBEDTLS_KEY_LENGTH_DES_EDE3 = 192, +}; + +/** Maximum length of any IV, in Bytes. */ +#define MBEDTLS_MAX_IV_LENGTH      16 +/** Maximum block size of any cipher, in Bytes. */ +#define MBEDTLS_MAX_BLOCK_LENGTH   16 + +/** + * Base cipher information (opaque struct). + */ +typedef struct mbedtls_cipher_base_t mbedtls_cipher_base_t; + +/** + * CMAC context (opaque struct). + */ +typedef struct mbedtls_cmac_context_t mbedtls_cmac_context_t; + +/** + * Cipher information. Allows calling cipher functions + * in a generic way. + */ +typedef struct { +    /** Full cipher identifier. For example, +     * MBEDTLS_CIPHER_AES_256_CBC. +     */ +    mbedtls_cipher_type_t type; + +    /** The cipher mode. For example, MBEDTLS_MODE_CBC. */ +    mbedtls_cipher_mode_t mode; + +    /** The cipher key length, in bits. This is the +     * default length for variable sized ciphers. +     * Includes parity bits for ciphers like DES. +     */ +    unsigned int key_bitlen; + +    /** Name of the cipher. */ +    const char * name; + +    /** IV or nonce size, in Bytes. +     * For ciphers that accept variable IV sizes, +     * this is the recommended size. +     */ +    unsigned int iv_size; + +    /** Flags to set. For example, if the cipher supports variable IV sizes or variable key sizes. */ +    int flags; + +    /** The block size, in Bytes. */ +    unsigned int block_size; + +    /** Struct for base cipher information and functions. */ +    const mbedtls_cipher_base_t *base; + +} mbedtls_cipher_info_t; + +/** + * Generic cipher context. + */ +typedef struct { +    /** Information about the associated cipher. */ +    const mbedtls_cipher_info_t *cipher_info; + +    /** Key length to use. */ +    int key_bitlen; + +    /** Operation that the key of the context has been +     * initialized for. +     */ +    mbedtls_operation_t operation; + +#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING) +    /** Padding functions to use, if relevant for +     * the specific cipher mode. +     */ +    void (*add_padding)( unsigned char *output, size_t olen, size_t data_len ); +    int (*get_padding)( unsigned char *input, size_t ilen, size_t *data_len ); +#endif + +    /** Buffer for input that has not been processed yet. */ +    unsigned char unprocessed_data[MBEDTLS_MAX_BLOCK_LENGTH]; + +    /** Number of Bytes that have not been processed yet. */ +    size_t unprocessed_len; + +    /** Current IV or NONCE_COUNTER for CTR-mode. */ +    unsigned char iv[MBEDTLS_MAX_IV_LENGTH]; + +    /** IV size in Bytes, for ciphers with variable-length IVs. */ +    size_t iv_size; + +    /** The cipher-specific context. */ +    void *cipher_ctx; + +#if defined(MBEDTLS_CMAC_C) +    /** CMAC-specific context. */ +    mbedtls_cmac_context_t *cmac_ctx; +#endif +} mbedtls_cipher_context_t; + +/** + * \brief This function retrieves the list of ciphers supported by the generic + * cipher module. + * + * \return      A statically-allocated array of ciphers. The last entry + *              is zero. + */ +const int *mbedtls_cipher_list( void ); + +/** + * \brief               This function retrieves the cipher-information + *                      structure associated with the given cipher name. + * + * \param cipher_name   Name of the cipher to search for. + * + * \return              The cipher information structure associated with the + *                      given \p cipher_name, or NULL if not found. + */ +const mbedtls_cipher_info_t *mbedtls_cipher_info_from_string( const char *cipher_name ); + +/** + * \brief               This function retrieves the cipher-information + *                      structure associated with the given cipher type. + * + * \param cipher_type   Type of the cipher to search for. + * + * \return              The cipher information structure associated with the + *                      given \p cipher_type, or NULL if not found. + */ +const mbedtls_cipher_info_t *mbedtls_cipher_info_from_type( const mbedtls_cipher_type_t cipher_type ); + +/** + * \brief               This function retrieves the cipher-information + *                      structure associated with the given cipher ID, + *                      key size and mode. + * + * \param cipher_id     The ID of the cipher to search for. For example, + *                      #MBEDTLS_CIPHER_ID_AES. + * \param key_bitlen    The length of the key in bits. + * \param mode          The cipher mode. For example, #MBEDTLS_MODE_CBC. + * + * \return              The cipher information structure associated with the + *                      given \p cipher_id, or NULL if not found. + */ +const mbedtls_cipher_info_t *mbedtls_cipher_info_from_values( const mbedtls_cipher_id_t cipher_id, +                                              int key_bitlen, +                                              const mbedtls_cipher_mode_t mode ); + +/** + * \brief               This function initializes a \p cipher_context as NONE. + */ +void mbedtls_cipher_init( mbedtls_cipher_context_t *ctx ); + +/** + * \brief               This function frees and clears the cipher-specific + *                      context of \p ctx. Freeing \p ctx itself remains the + *                      responsibility of the caller. + */ +void mbedtls_cipher_free( mbedtls_cipher_context_t *ctx ); + + +/** + * \brief               This function initializes and fills the cipher-context + *                      structure with the appropriate values. It also clears + *                      the structure. + * + * \param ctx           The context to initialize. May not be NULL. + * \param cipher_info   The cipher to use. + * + * \return              \c 0 on success, + *                      #MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA on parameter failure, + *                      #MBEDTLS_ERR_CIPHER_ALLOC_FAILED if allocation of the + *                      cipher-specific context failed. + * + * \internal Currently, the function also clears the structure. + * In future versions, the caller will be required to call + * mbedtls_cipher_init() on the structure first. + */ +int mbedtls_cipher_setup( mbedtls_cipher_context_t *ctx, const mbedtls_cipher_info_t *cipher_info ); + +/** + * \brief        This function returns the block size of the given cipher. + * + * \param ctx    The context of the cipher. Must be initialized. + * + * \return       The size of the blocks of the cipher, or zero if \p ctx + *               has not been initialized. + */ +static inline unsigned int mbedtls_cipher_get_block_size( const mbedtls_cipher_context_t *ctx ) +{ +    if( NULL == ctx || NULL == ctx->cipher_info ) +        return 0; + +    return ctx->cipher_info->block_size; +} + +/** + * \brief        This function returns the mode of operation for + *               the cipher. For example, MBEDTLS_MODE_CBC. + * + * \param ctx    The context of the cipher. Must be initialized. + * + * \return       The mode of operation, or #MBEDTLS_MODE_NONE if + *               \p ctx has not been initialized. + */ +static inline mbedtls_cipher_mode_t mbedtls_cipher_get_cipher_mode( const mbedtls_cipher_context_t *ctx ) +{ +    if( NULL == ctx || NULL == ctx->cipher_info ) +        return MBEDTLS_MODE_NONE; + +    return ctx->cipher_info->mode; +} + +/** + * \brief       This function returns the size of the IV or nonce + *              of the cipher, in Bytes. + * + * \param ctx   The context of the cipher. Must be initialized. + * + * \return      <ul><li>If no IV has been set: the recommended IV size. + *              0 for ciphers not using IV or nonce.</li> + *              <li>If IV has already been set: the actual size.</li></ul> + */ +static inline int mbedtls_cipher_get_iv_size( const mbedtls_cipher_context_t *ctx ) +{ +    if( NULL == ctx || NULL == ctx->cipher_info ) +        return 0; + +    if( ctx->iv_size != 0 ) +        return (int) ctx->iv_size; + +    return (int) ctx->cipher_info->iv_size; +} + +/** + * \brief               This function returns the type of the given cipher. + * + * \param ctx           The context of the cipher. Must be initialized. + * + * \return              The type of the cipher, or #MBEDTLS_CIPHER_NONE if + *                      \p ctx has not been initialized. + */ +static inline mbedtls_cipher_type_t mbedtls_cipher_get_type( const mbedtls_cipher_context_t *ctx ) +{ +    if( NULL == ctx || NULL == ctx->cipher_info ) +        return MBEDTLS_CIPHER_NONE; + +    return ctx->cipher_info->type; +} + +/** + * \brief               This function returns the name of the given cipher + *                      as a string. + * + * \param ctx           The context of the cipher. Must be initialized. + * + * \return              The name of the cipher, or NULL if \p ctx has not + *                      been not initialized. + */ +static inline const char *mbedtls_cipher_get_name( const mbedtls_cipher_context_t *ctx ) +{ +    if( NULL == ctx || NULL == ctx->cipher_info ) +        return 0; + +    return ctx->cipher_info->name; +} + +/** + * \brief               This function returns the key length of the cipher. + * + * \param ctx           The context of the cipher. Must be initialized. + * + * \return              The key length of the cipher in bits, or + *                      #MBEDTLS_KEY_LENGTH_NONE if ctx \p has not been + *                      initialized. + */ +static inline int mbedtls_cipher_get_key_bitlen( const mbedtls_cipher_context_t *ctx ) +{ +    if( NULL == ctx || NULL == ctx->cipher_info ) +        return MBEDTLS_KEY_LENGTH_NONE; + +    return (int) ctx->cipher_info->key_bitlen; +} + +/** + * \brief          This function returns the operation of the given cipher. + * + * \param ctx      The context of the cipher. Must be initialized. + * + * \return         The type of operation: #MBEDTLS_ENCRYPT or + *                 #MBEDTLS_DECRYPT, or #MBEDTLS_OPERATION_NONE if \p ctx + *                 has not been initialized. + */ +static inline mbedtls_operation_t mbedtls_cipher_get_operation( const mbedtls_cipher_context_t *ctx ) +{ +    if( NULL == ctx || NULL == ctx->cipher_info ) +        return MBEDTLS_OPERATION_NONE; + +    return ctx->operation; +} + +/** + * \brief               This function sets the key to use with the given context. + * + * \param ctx           The generic cipher context. May not be NULL. Must have + *                      been initialized using mbedtls_cipher_info_from_type() + *                      or mbedtls_cipher_info_from_string(). + * \param key           The key to use. + * \param key_bitlen    The key length to use, in bits. + * \param operation     The operation that the key will be used for: + *                      #MBEDTLS_ENCRYPT or #MBEDTLS_DECRYPT. + * + * \returns             \c 0 on success, #MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA if + *                      parameter verification fails, or a cipher-specific + *                      error code. + */ +int mbedtls_cipher_setkey( mbedtls_cipher_context_t *ctx, const unsigned char *key, +                   int key_bitlen, const mbedtls_operation_t operation ); + +#if defined(MBEDTLS_CIPHER_MODE_WITH_PADDING) +/** + * \brief               This function sets the padding mode, for cipher modes + *                      that use padding. + * + *                      The default passing mode is PKCS7 padding. + * + * \param ctx           The generic cipher context. + * \param mode          The padding mode. + * + * \returns             \c 0 on success, #MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE + *                      if the selected padding mode is not supported, or + *                      #MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA if the cipher mode + *                      does not support padding. + */ +int mbedtls_cipher_set_padding_mode( mbedtls_cipher_context_t *ctx, mbedtls_cipher_padding_t mode ); +#endif /* MBEDTLS_CIPHER_MODE_WITH_PADDING */ + +/** + * \brief           This function sets the initialization vector (IV) + *                  or nonce. + * + * \param ctx       The generic cipher context. + * \param iv        The IV to use, or NONCE_COUNTER for CTR-mode ciphers. + * \param iv_len    The IV length for ciphers with variable-size IV. + *                  This parameter is discarded by ciphers with fixed-size IV. + * + * \returns         \c 0 on success, or #MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA + * + * \note            Some ciphers do not use IVs nor nonce. For these + *                  ciphers, this function has no effect. + */ +int mbedtls_cipher_set_iv( mbedtls_cipher_context_t *ctx, +                   const unsigned char *iv, size_t iv_len ); + +/** + * \brief         This function resets the cipher state. + * + * \param ctx     The generic cipher context. + * + * \returns       \c 0 on success, #MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA + *                if parameter verification fails. + */ +int mbedtls_cipher_reset( mbedtls_cipher_context_t *ctx ); + +#if defined(MBEDTLS_GCM_C) +/** + * \brief               This function adds additional data for AEAD ciphers. + *                      Only supported with GCM. Must be called + *                      exactly once, after mbedtls_cipher_reset(). + * + * \param ctx           The generic cipher context. + * \param ad            The additional data to use. + * \param ad_len        the Length of \p ad. + * + * \return              \c 0 on success, or a specific error code on failure. + */ +int mbedtls_cipher_update_ad( mbedtls_cipher_context_t *ctx, +                      const unsigned char *ad, size_t ad_len ); +#endif /* MBEDTLS_GCM_C */ + +/** + * \brief               The generic cipher update function. It encrypts or + *                      decrypts using the given cipher context. Writes as + *                      many block-sized blocks of data as possible to output. + *                      Any data that cannot be written immediately is either + *                      added to the next block, or flushed when + *                      mbedtls_cipher_finish() is called. + *                      Exception: For MBEDTLS_MODE_ECB, expects a single block + *                      in size. For example, 16 Bytes for AES. + * + * \param ctx           The generic cipher context. + * \param input         The buffer holding the input data. + * \param ilen          The length of the input data. + * \param output        The buffer for the output data. Must be able to hold at + *                      least \p ilen + block_size. Must not be the same buffer + *                      as input. + * \param olen          The length of the output data, to be updated with the + *                      actual number of Bytes written. + * + * \returns             \c 0 on success, #MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA if + *                      parameter verification fails, + *                      #MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE on an + *                      unsupported mode for a cipher, or a cipher-specific + *                      error code. + * + * \note                If the underlying cipher is GCM, all calls to this + *                      function, except the last one before + *                      mbedtls_cipher_finish(). Must have \p ilen as a + *                      multiple of the block_size. + */ +int mbedtls_cipher_update( mbedtls_cipher_context_t *ctx, const unsigned char *input, +                   size_t ilen, unsigned char *output, size_t *olen ); + +/** + * \brief               The generic cipher finalization function. If data still + *                      needs to be flushed from an incomplete block, the data + *                      contained in it is padded to the size of + *                      the last block, and written to the \p output buffer. + * + * \param ctx           The generic cipher context. + * \param output        The buffer to write data to. Needs block_size available. + * \param olen          The length of the data written to the \p output buffer. + * + * \returns             \c 0 on success, #MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA if + *                      parameter verification fails, + *                      #MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED if decryption + *                      expected a full block but was not provided one, + *                      #MBEDTLS_ERR_CIPHER_INVALID_PADDING on invalid padding + *                      while decrypting, or a cipher-specific error code + *                      on failure for any other reason. + */ +int mbedtls_cipher_finish( mbedtls_cipher_context_t *ctx, +                   unsigned char *output, size_t *olen ); + +#if defined(MBEDTLS_GCM_C) +/** + * \brief               This function writes a tag for AEAD ciphers. + *                      Only supported with GCM. + *                      Must be called after mbedtls_cipher_finish(). + * + * \param ctx           The generic cipher context. + * \param tag           The buffer to write the tag to. + * \param tag_len       The length of the tag to write. + * + * \return              \c 0 on success, or a specific error code on failure. + */ +int mbedtls_cipher_write_tag( mbedtls_cipher_context_t *ctx, +                      unsigned char *tag, size_t tag_len ); + +/** + * \brief               This function checks the tag for AEAD ciphers. + *                      Only supported with GCM. + *                      Must be called after mbedtls_cipher_finish(). + * + * \param ctx           The generic cipher context. + * \param tag           The buffer holding the tag. + * \param tag_len       The length of the tag to check. + * + * \return              \c 0 on success, or a specific error code on failure. + */ +int mbedtls_cipher_check_tag( mbedtls_cipher_context_t *ctx, +                      const unsigned char *tag, size_t tag_len ); +#endif /* MBEDTLS_GCM_C */ + +/** + * \brief               The generic all-in-one encryption/decryption function, + *                      for all ciphers except AEAD constructs. + * + * \param ctx           The generic cipher context. + * \param iv            The IV to use, or NONCE_COUNTER for CTR-mode ciphers. + * \param iv_len        The IV length for ciphers with variable-size IV. + *                      This parameter is discarded by ciphers with fixed-size + *                      IV. + * \param input         The buffer holding the input data. + * \param ilen          The length of the input data. + * \param output        The buffer for the output data. Must be able to hold at + *                      least \p ilen + block_size. Must not be the same buffer + *                      as input. + * \param olen          The length of the output data, to be updated with the + *                      actual number of Bytes written. + * + * \note                Some ciphers do not use IVs nor nonce. For these + *                      ciphers, use \p iv = NULL and \p iv_len = 0. + * + * \returns             \c 0 on success, or + *                      #MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA, or + *                      #MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED if decryption + *                      expected a full block but was not provided one, or + *                      #MBEDTLS_ERR_CIPHER_INVALID_PADDING on invalid padding + *                      while decrypting, or a cipher-specific error code on + *                      failure for any other reason. + */ +int mbedtls_cipher_crypt( mbedtls_cipher_context_t *ctx, +                  const unsigned char *iv, size_t iv_len, +                  const unsigned char *input, size_t ilen, +                  unsigned char *output, size_t *olen ); + +#if defined(MBEDTLS_CIPHER_MODE_AEAD) +/** + * \brief               The generic autenticated encryption (AEAD) function. + * + * \param ctx           The generic cipher context. + * \param iv            The IV to use, or NONCE_COUNTER for CTR-mode ciphers. + * \param iv_len        The IV length for ciphers with variable-size IV. + *                      This parameter is discarded by ciphers with fixed-size IV. + * \param ad            The additional data to authenticate. + * \param ad_len        The length of \p ad. + * \param input         The buffer holding the input data. + * \param ilen          The length of the input data. + * \param output        The buffer for the output data. + *                      Must be able to hold at least \p ilen. + * \param olen          The length of the output data, to be updated with the + *                      actual number of Bytes written. + * \param tag           The buffer for the authentication tag. + * \param tag_len       The desired length of the authentication tag. + * + * \returns             \c 0 on success, or + *                      #MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA, or + *                      a cipher-specific error code. + */ +int mbedtls_cipher_auth_encrypt( mbedtls_cipher_context_t *ctx, +                         const unsigned char *iv, size_t iv_len, +                         const unsigned char *ad, size_t ad_len, +                         const unsigned char *input, size_t ilen, +                         unsigned char *output, size_t *olen, +                         unsigned char *tag, size_t tag_len ); + +/** + * \brief               The generic autenticated decryption (AEAD) function. + * + * \param ctx           The generic cipher context. + * \param iv            The IV to use, or NONCE_COUNTER for CTR-mode ciphers. + * \param iv_len        The IV length for ciphers with variable-size IV. + *                      This parameter is discarded by ciphers with fixed-size IV. + * \param ad            The additional data to be authenticated. + * \param ad_len        The length of \p ad. + * \param input         The buffer holding the input data. + * \param ilen          The length of the input data. + * \param output        The buffer for the output data. + *                      Must be able to hold at least \p ilen. + * \param olen          The length of the output data, to be updated with the + *                      actual number of Bytes written. + * \param tag           The buffer holding the authentication tag. + * \param tag_len       The length of the authentication tag. + * + * \returns             \c 0 on success, or + *                      #MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA, or + *                      #MBEDTLS_ERR_CIPHER_AUTH_FAILED if data is not authentic, + *                      or a cipher-specific error code on failure for any other reason. + * + * \note                If the data is not authentic, then the output buffer + *                      is zeroed out to prevent the unauthentic plaintext being + *                      used, making this interface safer. + */ +int mbedtls_cipher_auth_decrypt( mbedtls_cipher_context_t *ctx, +                         const unsigned char *iv, size_t iv_len, +                         const unsigned char *ad, size_t ad_len, +                         const unsigned char *input, size_t ilen, +                         unsigned char *output, size_t *olen, +                         const unsigned char *tag, size_t tag_len ); +#endif /* MBEDTLS_CIPHER_MODE_AEAD */ + +#ifdef __cplusplus +} +#endif + +#endif /* MBEDTLS_CIPHER_H */ diff --git a/thirdparty/mbedtls/include/mbedtls/cipher_internal.h b/thirdparty/mbedtls/include/mbedtls/cipher_internal.h new file mode 100644 index 0000000000..969ff9ccb8 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/cipher_internal.h @@ -0,0 +1,110 @@ +/** + * \file cipher_internal.h + * + * \brief Cipher wrappers. + * + * \author Adriaan de Jong <dejong@fox-it.com> + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_CIPHER_WRAP_H +#define MBEDTLS_CIPHER_WRAP_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include "cipher.h" + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * Base cipher information. The non-mode specific functions and values. + */ +struct mbedtls_cipher_base_t +{ +    /** Base Cipher type (e.g. MBEDTLS_CIPHER_ID_AES) */ +    mbedtls_cipher_id_t cipher; + +    /** Encrypt using ECB */ +    int (*ecb_func)( void *ctx, mbedtls_operation_t mode, +                     const unsigned char *input, unsigned char *output ); + +#if defined(MBEDTLS_CIPHER_MODE_CBC) +    /** Encrypt using CBC */ +    int (*cbc_func)( void *ctx, mbedtls_operation_t mode, size_t length, +                     unsigned char *iv, const unsigned char *input, +                     unsigned char *output ); +#endif + +#if defined(MBEDTLS_CIPHER_MODE_CFB) +    /** Encrypt using CFB (Full length) */ +    int (*cfb_func)( void *ctx, mbedtls_operation_t mode, size_t length, size_t *iv_off, +                     unsigned char *iv, const unsigned char *input, +                     unsigned char *output ); +#endif + +#if defined(MBEDTLS_CIPHER_MODE_CTR) +    /** Encrypt using CTR */ +    int (*ctr_func)( void *ctx, size_t length, size_t *nc_off, +                     unsigned char *nonce_counter, unsigned char *stream_block, +                     const unsigned char *input, unsigned char *output ); +#endif + +#if defined(MBEDTLS_CIPHER_MODE_STREAM) +    /** Encrypt using STREAM */ +    int (*stream_func)( void *ctx, size_t length, +                        const unsigned char *input, unsigned char *output ); +#endif + +    /** Set key for encryption purposes */ +    int (*setkey_enc_func)( void *ctx, const unsigned char *key, +                            unsigned int key_bitlen ); + +    /** Set key for decryption purposes */ +    int (*setkey_dec_func)( void *ctx, const unsigned char *key, +                            unsigned int key_bitlen); + +    /** Allocate a new context */ +    void * (*ctx_alloc_func)( void ); + +    /** Free the given context */ +    void (*ctx_free_func)( void *ctx ); + +}; + +typedef struct +{ +    mbedtls_cipher_type_t type; +    const mbedtls_cipher_info_t *info; +} mbedtls_cipher_definition_t; + +extern const mbedtls_cipher_definition_t mbedtls_cipher_definitions[]; + +extern int mbedtls_cipher_supported[]; + +#ifdef __cplusplus +} +#endif + +#endif /* MBEDTLS_CIPHER_WRAP_H */ diff --git a/thirdparty/mbedtls/include/mbedtls/cmac.h b/thirdparty/mbedtls/include/mbedtls/cmac.h new file mode 100644 index 0000000000..628c9daba2 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/cmac.h @@ -0,0 +1,208 @@ +/** + * \file cmac.h + * + * \brief The Cipher-based Message Authentication Code (CMAC) Mode for + *        Authentication. + */ +/* + *  Copyright (C) 2015-2018, Arm Limited (or its affiliates), All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of Mbed TLS (https://tls.mbed.org) + */ + +#ifndef MBEDTLS_CMAC_H +#define MBEDTLS_CMAC_H + +#include "mbedtls/cipher.h" + +#ifdef __cplusplus +extern "C" { +#endif + +#define MBEDTLS_ERR_CMAC_HW_ACCEL_FAILED -0x007A  /**< CMAC hardware accelerator failed. */ + +#define MBEDTLS_AES_BLOCK_SIZE          16 +#define MBEDTLS_DES3_BLOCK_SIZE         8 + +#if defined(MBEDTLS_AES_C) +#define MBEDTLS_CIPHER_BLKSIZE_MAX      16  /* The longest block used by CMAC is that of AES. */ +#else +#define MBEDTLS_CIPHER_BLKSIZE_MAX      8   /* The longest block used by CMAC is that of 3DES. */ +#endif + +#if !defined(MBEDTLS_CMAC_ALT) + +/** + * The CMAC context structure. + */ +struct mbedtls_cmac_context_t +{ +    /** The internal state of the CMAC algorithm.  */ +    unsigned char       state[MBEDTLS_CIPHER_BLKSIZE_MAX]; + +    /** Unprocessed data - either data that was not block aligned and is still +     *  pending processing, or the final block. */ +    unsigned char       unprocessed_block[MBEDTLS_CIPHER_BLKSIZE_MAX]; + +    /** The length of data pending processing. */ +    size_t              unprocessed_len; +}; + +/** + * \brief               This function sets the CMAC key, and prepares to authenticate + *                      the input data. + *                      Must be called with an initialized cipher context. + * + * \param ctx           The cipher context used for the CMAC operation, initialized + *                      as one of the following types:<ul> + *                      <li>MBEDTLS_CIPHER_AES_128_ECB</li> + *                      <li>MBEDTLS_CIPHER_AES_192_ECB</li> + *                      <li>MBEDTLS_CIPHER_AES_256_ECB</li> + *                      <li>MBEDTLS_CIPHER_DES_EDE3_ECB</li></ul> + * \param key           The CMAC key. + * \param keybits       The length of the CMAC key in bits. + *                      Must be supported by the cipher. + * + * \return              \c 0 on success, or a cipher-specific error code. + */ +int mbedtls_cipher_cmac_starts( mbedtls_cipher_context_t *ctx, +                                const unsigned char *key, size_t keybits ); + +/** + * \brief               This function feeds an input buffer into an ongoing CMAC + *                      computation. + * + *                      It is called between mbedtls_cipher_cmac_starts() or + *                      mbedtls_cipher_cmac_reset(), and mbedtls_cipher_cmac_finish(). + *                      Can be called repeatedly. + * + * \param ctx           The cipher context used for the CMAC operation. + * \param input         The buffer holding the input data. + * \param ilen          The length of the input data. + * + * \returns             \c 0 on success, or #MBEDTLS_ERR_MD_BAD_INPUT_DATA + *                      if parameter verification fails. + */ +int mbedtls_cipher_cmac_update( mbedtls_cipher_context_t *ctx, +                                const unsigned char *input, size_t ilen ); + +/** + * \brief               This function finishes the CMAC operation, and writes + *                      the result to the output buffer. + * + *                      It is called after mbedtls_cipher_cmac_update(). + *                      It can be followed by mbedtls_cipher_cmac_reset() and + *                      mbedtls_cipher_cmac_update(), or mbedtls_cipher_free(). + * + * \param ctx           The cipher context used for the CMAC operation. + * \param output        The output buffer for the CMAC checksum result. + * + * \returns             \c 0 on success, or #MBEDTLS_ERR_MD_BAD_INPUT_DATA + *                      if parameter verification fails. + */ +int mbedtls_cipher_cmac_finish( mbedtls_cipher_context_t *ctx, +                                unsigned char *output ); + +/** + * \brief               This function prepares the authentication of another + *                      message with the same key as the previous CMAC + *                      operation. + * + *                      It is called after mbedtls_cipher_cmac_finish() + *                      and before mbedtls_cipher_cmac_update(). + * + * \param ctx           The cipher context used for the CMAC operation. + * + * \returns             \c 0 on success, or #MBEDTLS_ERR_MD_BAD_INPUT_DATA + *                      if parameter verification fails. + */ +int mbedtls_cipher_cmac_reset( mbedtls_cipher_context_t *ctx ); + +/** + * \brief               This function calculates the full generic CMAC + *                      on the input buffer with the provided key. + * + *                      The function allocates the context, performs the + *                      calculation, and frees the context. + * + *                      The CMAC result is calculated as + *                      output = generic CMAC(cmac key, input buffer). + * + * + * \param cipher_info   The cipher information. + * \param key           The CMAC key. + * \param keylen        The length of the CMAC key in bits. + * \param input         The buffer holding the input data. + * \param ilen          The length of the input data. + * \param output        The buffer for the generic CMAC result. + * + * \returns             \c 0 on success, or #MBEDTLS_ERR_MD_BAD_INPUT_DATA + *                      if parameter verification fails. + */ +int mbedtls_cipher_cmac( const mbedtls_cipher_info_t *cipher_info, +                         const unsigned char *key, size_t keylen, +                         const unsigned char *input, size_t ilen, +                         unsigned char *output ); + +#if defined(MBEDTLS_AES_C) +/** + * \brief           This function implements the AES-CMAC-PRF-128 pseudorandom + *                  function, as defined in + *                  <em>RFC-4615: The Advanced Encryption Standard-Cipher-based + *                  Message Authentication Code-Pseudo-Random Function-128 + *                  (AES-CMAC-PRF-128) Algorithm for the Internet Key + *                  Exchange Protocol (IKE).</em> + * + * \param key       The key to use. + * \param key_len   The key length in Bytes. + * \param input     The buffer holding the input data. + * \param in_len    The length of the input data in Bytes. + * \param output    The buffer holding the generated 16 Bytes of + *                  pseudorandom output. + * + * \return          \c 0 on success. + */ +int mbedtls_aes_cmac_prf_128( const unsigned char *key, size_t key_len, +                              const unsigned char *input, size_t in_len, +                              unsigned char output[16] ); +#endif /* MBEDTLS_AES_C */ + +#ifdef __cplusplus +} +#endif + +#else  /* !MBEDTLS_CMAC_ALT */ +#include "cmac_alt.h" +#endif /* !MBEDTLS_CMAC_ALT */ + +#ifdef __cplusplus +extern "C" { +#endif + +#if defined(MBEDTLS_SELF_TEST) && ( defined(MBEDTLS_AES_C) || defined(MBEDTLS_DES_C) ) +/** + * \brief          The CMAC checkup routine. + * + * \return         \c 0 on success, or \c 1 on failure. + */ +int mbedtls_cmac_self_test( int verbose ); +#endif /* MBEDTLS_SELF_TEST && ( MBEDTLS_AES_C || MBEDTLS_DES_C ) */ + +#ifdef __cplusplus +} +#endif + +#endif /* MBEDTLS_CMAC_H */ diff --git a/thirdparty/mbedtls/include/mbedtls/compat-1.3.h b/thirdparty/mbedtls/include/mbedtls/compat-1.3.h new file mode 100644 index 0000000000..600a0f154c --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/compat-1.3.h @@ -0,0 +1,2524 @@ +/** + * \file compat-1.3.h + * + * \brief Compatibility definitions for using mbed TLS with client code written + *  for the PolarSSL naming conventions. + * + * \deprecated Use the new names directly instead + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ + +#if ! defined(MBEDTLS_DEPRECATED_REMOVED) + +#if defined(MBEDTLS_DEPRECATED_WARNING) +#warning "Including compat-1.3.h is deprecated" +#endif + +#ifndef MBEDTLS_COMPAT13_H +#define MBEDTLS_COMPAT13_H + +/* + * config.h options + */ +#if defined MBEDTLS_AESNI_C +#define POLARSSL_AESNI_C MBEDTLS_AESNI_C +#endif +#if defined MBEDTLS_AES_ALT +#define POLARSSL_AES_ALT MBEDTLS_AES_ALT +#endif +#if defined MBEDTLS_AES_C +#define POLARSSL_AES_C MBEDTLS_AES_C +#endif +#if defined MBEDTLS_AES_ROM_TABLES +#define POLARSSL_AES_ROM_TABLES MBEDTLS_AES_ROM_TABLES +#endif +#if defined MBEDTLS_ARC4_ALT +#define POLARSSL_ARC4_ALT MBEDTLS_ARC4_ALT +#endif +#if defined MBEDTLS_ARC4_C +#define POLARSSL_ARC4_C MBEDTLS_ARC4_C +#endif +#if defined MBEDTLS_ASN1_PARSE_C +#define POLARSSL_ASN1_PARSE_C MBEDTLS_ASN1_PARSE_C +#endif +#if defined MBEDTLS_ASN1_WRITE_C +#define POLARSSL_ASN1_WRITE_C MBEDTLS_ASN1_WRITE_C +#endif +#if defined MBEDTLS_BASE64_C +#define POLARSSL_BASE64_C MBEDTLS_BASE64_C +#endif +#if defined MBEDTLS_BIGNUM_C +#define POLARSSL_BIGNUM_C MBEDTLS_BIGNUM_C +#endif +#if defined MBEDTLS_BLOWFISH_ALT +#define POLARSSL_BLOWFISH_ALT MBEDTLS_BLOWFISH_ALT +#endif +#if defined MBEDTLS_BLOWFISH_C +#define POLARSSL_BLOWFISH_C MBEDTLS_BLOWFISH_C +#endif +#if defined MBEDTLS_CAMELLIA_ALT +#define POLARSSL_CAMELLIA_ALT MBEDTLS_CAMELLIA_ALT +#endif +#if defined MBEDTLS_CAMELLIA_C +#define POLARSSL_CAMELLIA_C MBEDTLS_CAMELLIA_C +#endif +#if defined MBEDTLS_CAMELLIA_SMALL_MEMORY +#define POLARSSL_CAMELLIA_SMALL_MEMORY MBEDTLS_CAMELLIA_SMALL_MEMORY +#endif +#if defined MBEDTLS_CCM_C +#define POLARSSL_CCM_C MBEDTLS_CCM_C +#endif +#if defined MBEDTLS_CERTS_C +#define POLARSSL_CERTS_C MBEDTLS_CERTS_C +#endif +#if defined MBEDTLS_CIPHER_C +#define POLARSSL_CIPHER_C MBEDTLS_CIPHER_C +#endif +#if defined MBEDTLS_CIPHER_MODE_CBC +#define POLARSSL_CIPHER_MODE_CBC MBEDTLS_CIPHER_MODE_CBC +#endif +#if defined MBEDTLS_CIPHER_MODE_CFB +#define POLARSSL_CIPHER_MODE_CFB MBEDTLS_CIPHER_MODE_CFB +#endif +#if defined MBEDTLS_CIPHER_MODE_CTR +#define POLARSSL_CIPHER_MODE_CTR MBEDTLS_CIPHER_MODE_CTR +#endif +#if defined MBEDTLS_CIPHER_NULL_CIPHER +#define POLARSSL_CIPHER_NULL_CIPHER MBEDTLS_CIPHER_NULL_CIPHER +#endif +#if defined MBEDTLS_CIPHER_PADDING_ONE_AND_ZEROS +#define POLARSSL_CIPHER_PADDING_ONE_AND_ZEROS MBEDTLS_CIPHER_PADDING_ONE_AND_ZEROS +#endif +#if defined MBEDTLS_CIPHER_PADDING_PKCS7 +#define POLARSSL_CIPHER_PADDING_PKCS7 MBEDTLS_CIPHER_PADDING_PKCS7 +#endif +#if defined MBEDTLS_CIPHER_PADDING_ZEROS +#define POLARSSL_CIPHER_PADDING_ZEROS MBEDTLS_CIPHER_PADDING_ZEROS +#endif +#if defined MBEDTLS_CIPHER_PADDING_ZEROS_AND_LEN +#define POLARSSL_CIPHER_PADDING_ZEROS_AND_LEN MBEDTLS_CIPHER_PADDING_ZEROS_AND_LEN +#endif +#if defined MBEDTLS_CTR_DRBG_C +#define POLARSSL_CTR_DRBG_C MBEDTLS_CTR_DRBG_C +#endif +#if defined MBEDTLS_DEBUG_C +#define POLARSSL_DEBUG_C MBEDTLS_DEBUG_C +#endif +#if defined MBEDTLS_DEPRECATED_REMOVED +#define POLARSSL_DEPRECATED_REMOVED MBEDTLS_DEPRECATED_REMOVED +#endif +#if defined MBEDTLS_DEPRECATED_WARNING +#define POLARSSL_DEPRECATED_WARNING MBEDTLS_DEPRECATED_WARNING +#endif +#if defined MBEDTLS_DES_ALT +#define POLARSSL_DES_ALT MBEDTLS_DES_ALT +#endif +#if defined MBEDTLS_DES_C +#define POLARSSL_DES_C MBEDTLS_DES_C +#endif +#if defined MBEDTLS_DHM_C +#define POLARSSL_DHM_C MBEDTLS_DHM_C +#endif +#if defined MBEDTLS_ECDH_C +#define POLARSSL_ECDH_C MBEDTLS_ECDH_C +#endif +#if defined MBEDTLS_ECDSA_C +#define POLARSSL_ECDSA_C MBEDTLS_ECDSA_C +#endif +#if defined MBEDTLS_ECDSA_DETERMINISTIC +#define POLARSSL_ECDSA_DETERMINISTIC MBEDTLS_ECDSA_DETERMINISTIC +#endif +#if defined MBEDTLS_ECP_C +#define POLARSSL_ECP_C MBEDTLS_ECP_C +#endif +#if defined MBEDTLS_ECP_DP_BP256R1_ENABLED +#define POLARSSL_ECP_DP_BP256R1_ENABLED MBEDTLS_ECP_DP_BP256R1_ENABLED +#endif +#if defined MBEDTLS_ECP_DP_BP384R1_ENABLED +#define POLARSSL_ECP_DP_BP384R1_ENABLED MBEDTLS_ECP_DP_BP384R1_ENABLED +#endif +#if defined MBEDTLS_ECP_DP_BP512R1_ENABLED +#define POLARSSL_ECP_DP_BP512R1_ENABLED MBEDTLS_ECP_DP_BP512R1_ENABLED +#endif +#if defined MBEDTLS_ECP_DP_CURVE25519_ENABLED +#define POLARSSL_ECP_DP_M255_ENABLED MBEDTLS_ECP_DP_CURVE25519_ENABLED +#endif +#if defined MBEDTLS_ECP_DP_SECP192K1_ENABLED +#define POLARSSL_ECP_DP_SECP192K1_ENABLED MBEDTLS_ECP_DP_SECP192K1_ENABLED +#endif +#if defined MBEDTLS_ECP_DP_SECP192R1_ENABLED +#define POLARSSL_ECP_DP_SECP192R1_ENABLED MBEDTLS_ECP_DP_SECP192R1_ENABLED +#endif +#if defined MBEDTLS_ECP_DP_SECP224K1_ENABLED +#define POLARSSL_ECP_DP_SECP224K1_ENABLED MBEDTLS_ECP_DP_SECP224K1_ENABLED +#endif +#if defined MBEDTLS_ECP_DP_SECP224R1_ENABLED +#define POLARSSL_ECP_DP_SECP224R1_ENABLED MBEDTLS_ECP_DP_SECP224R1_ENABLED +#endif +#if defined MBEDTLS_ECP_DP_SECP256K1_ENABLED +#define POLARSSL_ECP_DP_SECP256K1_ENABLED MBEDTLS_ECP_DP_SECP256K1_ENABLED +#endif +#if defined MBEDTLS_ECP_DP_SECP256R1_ENABLED +#define POLARSSL_ECP_DP_SECP256R1_ENABLED MBEDTLS_ECP_DP_SECP256R1_ENABLED +#endif +#if defined MBEDTLS_ECP_DP_SECP384R1_ENABLED +#define POLARSSL_ECP_DP_SECP384R1_ENABLED MBEDTLS_ECP_DP_SECP384R1_ENABLED +#endif +#if defined MBEDTLS_ECP_DP_SECP521R1_ENABLED +#define POLARSSL_ECP_DP_SECP521R1_ENABLED MBEDTLS_ECP_DP_SECP521R1_ENABLED +#endif +#if defined MBEDTLS_ECP_FIXED_POINT_OPTIM +#define POLARSSL_ECP_FIXED_POINT_OPTIM MBEDTLS_ECP_FIXED_POINT_OPTIM +#endif +#if defined MBEDTLS_ECP_MAX_BITS +#define POLARSSL_ECP_MAX_BITS MBEDTLS_ECP_MAX_BITS +#endif +#if defined MBEDTLS_ECP_NIST_OPTIM +#define POLARSSL_ECP_NIST_OPTIM MBEDTLS_ECP_NIST_OPTIM +#endif +#if defined MBEDTLS_ECP_WINDOW_SIZE +#define POLARSSL_ECP_WINDOW_SIZE MBEDTLS_ECP_WINDOW_SIZE +#endif +#if defined MBEDTLS_ENABLE_WEAK_CIPHERSUITES +#define POLARSSL_ENABLE_WEAK_CIPHERSUITES MBEDTLS_ENABLE_WEAK_CIPHERSUITES +#endif +#if defined MBEDTLS_ENTROPY_C +#define POLARSSL_ENTROPY_C MBEDTLS_ENTROPY_C +#endif +#if defined MBEDTLS_ENTROPY_FORCE_SHA256 +#define POLARSSL_ENTROPY_FORCE_SHA256 MBEDTLS_ENTROPY_FORCE_SHA256 +#endif +#if defined MBEDTLS_ERROR_C +#define POLARSSL_ERROR_C MBEDTLS_ERROR_C +#endif +#if defined MBEDTLS_ERROR_STRERROR_DUMMY +#define POLARSSL_ERROR_STRERROR_DUMMY MBEDTLS_ERROR_STRERROR_DUMMY +#endif +#if defined MBEDTLS_FS_IO +#define POLARSSL_FS_IO MBEDTLS_FS_IO +#endif +#if defined MBEDTLS_GCM_C +#define POLARSSL_GCM_C MBEDTLS_GCM_C +#endif +#if defined MBEDTLS_GENPRIME +#define POLARSSL_GENPRIME MBEDTLS_GENPRIME +#endif +#if defined MBEDTLS_HAVEGE_C +#define POLARSSL_HAVEGE_C MBEDTLS_HAVEGE_C +#endif +#if defined MBEDTLS_HAVE_ASM +#define POLARSSL_HAVE_ASM MBEDTLS_HAVE_ASM +#endif +#if defined MBEDTLS_HAVE_SSE2 +#define POLARSSL_HAVE_SSE2 MBEDTLS_HAVE_SSE2 +#endif +#if defined MBEDTLS_HAVE_TIME +#define POLARSSL_HAVE_TIME MBEDTLS_HAVE_TIME +#endif +#if defined MBEDTLS_HMAC_DRBG_C +#define POLARSSL_HMAC_DRBG_C MBEDTLS_HMAC_DRBG_C +#endif +#if defined MBEDTLS_HMAC_DRBG_MAX_INPUT +#define POLARSSL_HMAC_DRBG_MAX_INPUT MBEDTLS_HMAC_DRBG_MAX_INPUT +#endif +#if defined MBEDTLS_HMAC_DRBG_MAX_REQUEST +#define POLARSSL_HMAC_DRBG_MAX_REQUEST MBEDTLS_HMAC_DRBG_MAX_REQUEST +#endif +#if defined MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT +#define POLARSSL_HMAC_DRBG_MAX_SEED_INPUT MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT +#endif +#if defined MBEDTLS_HMAC_DRBG_RESEED_INTERVAL +#define POLARSSL_HMAC_DRBG_RESEED_INTERVAL MBEDTLS_HMAC_DRBG_RESEED_INTERVAL +#endif +#if defined MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED +#define POLARSSL_KEY_EXCHANGE_DHE_PSK_ENABLED MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED +#endif +#if defined MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED +#define POLARSSL_KEY_EXCHANGE_DHE_RSA_ENABLED MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED +#endif +#if defined MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED +#define POLARSSL_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED +#endif +#if defined MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED +#define POLARSSL_KEY_EXCHANGE_ECDHE_PSK_ENABLED MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED +#endif +#if defined MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED +#define POLARSSL_KEY_EXCHANGE_ECDHE_RSA_ENABLED MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED +#endif +#if defined MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED +#define POLARSSL_KEY_EXCHANGE_ECDH_ECDSA_ENABLED MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED +#endif +#if defined MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED +#define POLARSSL_KEY_EXCHANGE_ECDH_RSA_ENABLED MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED +#endif +#if defined MBEDTLS_KEY_EXCHANGE_PSK_ENABLED +#define POLARSSL_KEY_EXCHANGE_PSK_ENABLED MBEDTLS_KEY_EXCHANGE_PSK_ENABLED +#endif +#if defined MBEDTLS_KEY_EXCHANGE_RSA_ENABLED +#define POLARSSL_KEY_EXCHANGE_RSA_ENABLED MBEDTLS_KEY_EXCHANGE_RSA_ENABLED +#endif +#if defined MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED +#define POLARSSL_KEY_EXCHANGE_RSA_PSK_ENABLED MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED +#endif +#if defined MBEDTLS_MD2_ALT +#define POLARSSL_MD2_ALT MBEDTLS_MD2_ALT +#endif +#if defined MBEDTLS_MD2_C +#define POLARSSL_MD2_C MBEDTLS_MD2_C +#endif +#if defined MBEDTLS_MD2_PROCESS_ALT +#define POLARSSL_MD2_PROCESS_ALT MBEDTLS_MD2_PROCESS_ALT +#endif +#if defined MBEDTLS_MD4_ALT +#define POLARSSL_MD4_ALT MBEDTLS_MD4_ALT +#endif +#if defined MBEDTLS_MD4_C +#define POLARSSL_MD4_C MBEDTLS_MD4_C +#endif +#if defined MBEDTLS_MD4_PROCESS_ALT +#define POLARSSL_MD4_PROCESS_ALT MBEDTLS_MD4_PROCESS_ALT +#endif +#if defined MBEDTLS_MD5_ALT +#define POLARSSL_MD5_ALT MBEDTLS_MD5_ALT +#endif +#if defined MBEDTLS_MD5_C +#define POLARSSL_MD5_C MBEDTLS_MD5_C +#endif +#if defined MBEDTLS_MD5_PROCESS_ALT +#define POLARSSL_MD5_PROCESS_ALT MBEDTLS_MD5_PROCESS_ALT +#endif +#if defined MBEDTLS_MD_C +#define POLARSSL_MD_C MBEDTLS_MD_C +#endif +#if defined MBEDTLS_MEMORY_ALIGN_MULTIPLE +#define POLARSSL_MEMORY_ALIGN_MULTIPLE MBEDTLS_MEMORY_ALIGN_MULTIPLE +#endif +#if defined MBEDTLS_MEMORY_BACKTRACE +#define POLARSSL_MEMORY_BACKTRACE MBEDTLS_MEMORY_BACKTRACE +#endif +#if defined MBEDTLS_MEMORY_BUFFER_ALLOC_C +#define POLARSSL_MEMORY_BUFFER_ALLOC_C MBEDTLS_MEMORY_BUFFER_ALLOC_C +#endif +#if defined MBEDTLS_MEMORY_DEBUG +#define POLARSSL_MEMORY_DEBUG MBEDTLS_MEMORY_DEBUG +#endif +#if defined MBEDTLS_MPI_MAX_SIZE +#define POLARSSL_MPI_MAX_SIZE MBEDTLS_MPI_MAX_SIZE +#endif +#if defined MBEDTLS_MPI_WINDOW_SIZE +#define POLARSSL_MPI_WINDOW_SIZE MBEDTLS_MPI_WINDOW_SIZE +#endif +#if defined MBEDTLS_NET_C +#define POLARSSL_NET_C MBEDTLS_NET_C +#endif +#if defined MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES +#define POLARSSL_NO_DEFAULT_ENTROPY_SOURCES MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES +#endif +#if defined MBEDTLS_NO_PLATFORM_ENTROPY +#define POLARSSL_NO_PLATFORM_ENTROPY MBEDTLS_NO_PLATFORM_ENTROPY +#endif +#if defined MBEDTLS_OID_C +#define POLARSSL_OID_C MBEDTLS_OID_C +#endif +#if defined MBEDTLS_PADLOCK_C +#define POLARSSL_PADLOCK_C MBEDTLS_PADLOCK_C +#endif +#if defined MBEDTLS_PEM_PARSE_C +#define POLARSSL_PEM_PARSE_C MBEDTLS_PEM_PARSE_C +#endif +#if defined MBEDTLS_PEM_WRITE_C +#define POLARSSL_PEM_WRITE_C MBEDTLS_PEM_WRITE_C +#endif +#if defined MBEDTLS_PKCS11_C +#define POLARSSL_PKCS11_C MBEDTLS_PKCS11_C +#endif +#if defined MBEDTLS_PKCS12_C +#define POLARSSL_PKCS12_C MBEDTLS_PKCS12_C +#endif +#if defined MBEDTLS_PKCS1_V15 +#define POLARSSL_PKCS1_V15 MBEDTLS_PKCS1_V15 +#endif +#if defined MBEDTLS_PKCS1_V21 +#define POLARSSL_PKCS1_V21 MBEDTLS_PKCS1_V21 +#endif +#if defined MBEDTLS_PKCS5_C +#define POLARSSL_PKCS5_C MBEDTLS_PKCS5_C +#endif +#if defined MBEDTLS_PK_C +#define POLARSSL_PK_C MBEDTLS_PK_C +#endif +#if defined MBEDTLS_PK_PARSE_C +#define POLARSSL_PK_PARSE_C MBEDTLS_PK_PARSE_C +#endif +#if defined MBEDTLS_PK_PARSE_EC_EXTENDED +#define POLARSSL_PK_PARSE_EC_EXTENDED MBEDTLS_PK_PARSE_EC_EXTENDED +#endif +#if defined MBEDTLS_PK_RSA_ALT_SUPPORT +#define POLARSSL_PK_RSA_ALT_SUPPORT MBEDTLS_PK_RSA_ALT_SUPPORT +#endif +#if defined MBEDTLS_PK_WRITE_C +#define POLARSSL_PK_WRITE_C MBEDTLS_PK_WRITE_C +#endif +#if defined MBEDTLS_PLATFORM_C +#define POLARSSL_PLATFORM_C MBEDTLS_PLATFORM_C +#endif +#if defined MBEDTLS_PLATFORM_EXIT_ALT +#define POLARSSL_PLATFORM_EXIT_ALT MBEDTLS_PLATFORM_EXIT_ALT +#endif +#if defined MBEDTLS_PLATFORM_EXIT_MACRO +#define POLARSSL_PLATFORM_EXIT_MACRO MBEDTLS_PLATFORM_EXIT_MACRO +#endif +#if defined MBEDTLS_PLATFORM_FPRINTF_ALT +#define POLARSSL_PLATFORM_FPRINTF_ALT MBEDTLS_PLATFORM_FPRINTF_ALT +#endif +#if defined MBEDTLS_PLATFORM_FPRINTF_MACRO +#define POLARSSL_PLATFORM_FPRINTF_MACRO MBEDTLS_PLATFORM_FPRINTF_MACRO +#endif +#if defined MBEDTLS_PLATFORM_FREE_MACRO +#define POLARSSL_PLATFORM_FREE_MACRO MBEDTLS_PLATFORM_FREE_MACRO +#endif +#if defined MBEDTLS_PLATFORM_MEMORY +#define POLARSSL_PLATFORM_MEMORY MBEDTLS_PLATFORM_MEMORY +#endif +#if defined MBEDTLS_PLATFORM_NO_STD_FUNCTIONS +#define POLARSSL_PLATFORM_NO_STD_FUNCTIONS MBEDTLS_PLATFORM_NO_STD_FUNCTIONS +#endif +#if defined MBEDTLS_PLATFORM_PRINTF_ALT +#define POLARSSL_PLATFORM_PRINTF_ALT MBEDTLS_PLATFORM_PRINTF_ALT +#endif +#if defined MBEDTLS_PLATFORM_PRINTF_MACRO +#define POLARSSL_PLATFORM_PRINTF_MACRO MBEDTLS_PLATFORM_PRINTF_MACRO +#endif +#if defined MBEDTLS_PLATFORM_SNPRINTF_ALT +#define POLARSSL_PLATFORM_SNPRINTF_ALT MBEDTLS_PLATFORM_SNPRINTF_ALT +#endif +#if defined MBEDTLS_PLATFORM_SNPRINTF_MACRO +#define POLARSSL_PLATFORM_SNPRINTF_MACRO MBEDTLS_PLATFORM_SNPRINTF_MACRO +#endif +#if defined MBEDTLS_PLATFORM_STD_EXIT +#define POLARSSL_PLATFORM_STD_EXIT MBEDTLS_PLATFORM_STD_EXIT +#endif +#if defined MBEDTLS_PLATFORM_STD_FPRINTF +#define POLARSSL_PLATFORM_STD_FPRINTF MBEDTLS_PLATFORM_STD_FPRINTF +#endif +#if defined MBEDTLS_PLATFORM_STD_FREE +#define POLARSSL_PLATFORM_STD_FREE MBEDTLS_PLATFORM_STD_FREE +#endif +#if defined MBEDTLS_PLATFORM_STD_MEM_HDR +#define POLARSSL_PLATFORM_STD_MEM_HDR MBEDTLS_PLATFORM_STD_MEM_HDR +#endif +#if defined MBEDTLS_PLATFORM_STD_PRINTF +#define POLARSSL_PLATFORM_STD_PRINTF MBEDTLS_PLATFORM_STD_PRINTF +#endif +#if defined MBEDTLS_PLATFORM_STD_SNPRINTF +#define POLARSSL_PLATFORM_STD_SNPRINTF MBEDTLS_PLATFORM_STD_SNPRINTF +#endif +#if defined MBEDTLS_PSK_MAX_LEN +#define POLARSSL_PSK_MAX_LEN MBEDTLS_PSK_MAX_LEN +#endif +#if defined MBEDTLS_REMOVE_ARC4_CIPHERSUITES +#define POLARSSL_REMOVE_ARC4_CIPHERSUITES MBEDTLS_REMOVE_ARC4_CIPHERSUITES +#endif +#if defined MBEDTLS_RIPEMD160_ALT +#define POLARSSL_RIPEMD160_ALT MBEDTLS_RIPEMD160_ALT +#endif +#if defined MBEDTLS_RIPEMD160_C +#define POLARSSL_RIPEMD160_C MBEDTLS_RIPEMD160_C +#endif +#if defined MBEDTLS_RIPEMD160_PROCESS_ALT +#define POLARSSL_RIPEMD160_PROCESS_ALT MBEDTLS_RIPEMD160_PROCESS_ALT +#endif +#if defined MBEDTLS_RSA_C +#define POLARSSL_RSA_C MBEDTLS_RSA_C +#endif +#if defined MBEDTLS_RSA_NO_CRT +#define POLARSSL_RSA_NO_CRT MBEDTLS_RSA_NO_CRT +#endif +#if defined MBEDTLS_SELF_TEST +#define POLARSSL_SELF_TEST MBEDTLS_SELF_TEST +#endif +#if defined MBEDTLS_SHA1_ALT +#define POLARSSL_SHA1_ALT MBEDTLS_SHA1_ALT +#endif +#if defined MBEDTLS_SHA1_C +#define POLARSSL_SHA1_C MBEDTLS_SHA1_C +#endif +#if defined MBEDTLS_SHA1_PROCESS_ALT +#define POLARSSL_SHA1_PROCESS_ALT MBEDTLS_SHA1_PROCESS_ALT +#endif +#if defined MBEDTLS_SHA256_ALT +#define POLARSSL_SHA256_ALT MBEDTLS_SHA256_ALT +#endif +#if defined MBEDTLS_SHA256_C +#define POLARSSL_SHA256_C MBEDTLS_SHA256_C +#endif +#if defined MBEDTLS_SHA256_PROCESS_ALT +#define POLARSSL_SHA256_PROCESS_ALT MBEDTLS_SHA256_PROCESS_ALT +#endif +#if defined MBEDTLS_SHA512_ALT +#define POLARSSL_SHA512_ALT MBEDTLS_SHA512_ALT +#endif +#if defined MBEDTLS_SHA512_C +#define POLARSSL_SHA512_C MBEDTLS_SHA512_C +#endif +#if defined MBEDTLS_SHA512_PROCESS_ALT +#define POLARSSL_SHA512_PROCESS_ALT MBEDTLS_SHA512_PROCESS_ALT +#endif +#if defined MBEDTLS_SSL_ALL_ALERT_MESSAGES +#define POLARSSL_SSL_ALL_ALERT_MESSAGES MBEDTLS_SSL_ALL_ALERT_MESSAGES +#endif +#if defined MBEDTLS_SSL_ALPN +#define POLARSSL_SSL_ALPN MBEDTLS_SSL_ALPN +#endif +#if defined MBEDTLS_SSL_CACHE_C +#define POLARSSL_SSL_CACHE_C MBEDTLS_SSL_CACHE_C +#endif +#if defined MBEDTLS_SSL_CBC_RECORD_SPLITTING +#define POLARSSL_SSL_CBC_RECORD_SPLITTING MBEDTLS_SSL_CBC_RECORD_SPLITTING +#endif +#if defined MBEDTLS_SSL_CLI_C +#define POLARSSL_SSL_CLI_C MBEDTLS_SSL_CLI_C +#endif +#if defined MBEDTLS_SSL_COOKIE_C +#define POLARSSL_SSL_COOKIE_C MBEDTLS_SSL_COOKIE_C +#endif +#if defined MBEDTLS_SSL_COOKIE_TIMEOUT +#define POLARSSL_SSL_COOKIE_TIMEOUT MBEDTLS_SSL_COOKIE_TIMEOUT +#endif +#if defined MBEDTLS_SSL_DEBUG_ALL +#define POLARSSL_SSL_DEBUG_ALL MBEDTLS_SSL_DEBUG_ALL +#endif +#if defined MBEDTLS_SSL_DTLS_ANTI_REPLAY +#define POLARSSL_SSL_DTLS_ANTI_REPLAY MBEDTLS_SSL_DTLS_ANTI_REPLAY +#endif +#if defined MBEDTLS_SSL_DTLS_BADMAC_LIMIT +#define POLARSSL_SSL_DTLS_BADMAC_LIMIT MBEDTLS_SSL_DTLS_BADMAC_LIMIT +#endif +#if defined MBEDTLS_SSL_DTLS_HELLO_VERIFY +#define POLARSSL_SSL_DTLS_HELLO_VERIFY MBEDTLS_SSL_DTLS_HELLO_VERIFY +#endif +#if defined MBEDTLS_SSL_ENCRYPT_THEN_MAC +#define POLARSSL_SSL_ENCRYPT_THEN_MAC MBEDTLS_SSL_ENCRYPT_THEN_MAC +#endif +#if defined MBEDTLS_SSL_EXTENDED_MASTER_SECRET +#define POLARSSL_SSL_EXTENDED_MASTER_SECRET MBEDTLS_SSL_EXTENDED_MASTER_SECRET +#endif +#if defined MBEDTLS_SSL_FALLBACK_SCSV +#define POLARSSL_SSL_FALLBACK_SCSV MBEDTLS_SSL_FALLBACK_SCSV +#endif +#if defined MBEDTLS_SSL_HW_RECORD_ACCEL +#define POLARSSL_SSL_HW_RECORD_ACCEL MBEDTLS_SSL_HW_RECORD_ACCEL +#endif +#if defined MBEDTLS_SSL_MAX_FRAGMENT_LENGTH +#define POLARSSL_SSL_MAX_FRAGMENT_LENGTH MBEDTLS_SSL_MAX_FRAGMENT_LENGTH +#endif +#if defined MBEDTLS_SSL_PROTO_DTLS +#define POLARSSL_SSL_PROTO_DTLS MBEDTLS_SSL_PROTO_DTLS +#endif +#if defined MBEDTLS_SSL_PROTO_SSL3 +#define POLARSSL_SSL_PROTO_SSL3 MBEDTLS_SSL_PROTO_SSL3 +#endif +#if defined MBEDTLS_SSL_PROTO_TLS1 +#define POLARSSL_SSL_PROTO_TLS1 MBEDTLS_SSL_PROTO_TLS1 +#endif +#if defined MBEDTLS_SSL_PROTO_TLS1_1 +#define POLARSSL_SSL_PROTO_TLS1_1 MBEDTLS_SSL_PROTO_TLS1_1 +#endif +#if defined MBEDTLS_SSL_PROTO_TLS1_2 +#define POLARSSL_SSL_PROTO_TLS1_2 MBEDTLS_SSL_PROTO_TLS1_2 +#endif +#if defined MBEDTLS_SSL_RENEGOTIATION +#define POLARSSL_SSL_RENEGOTIATION MBEDTLS_SSL_RENEGOTIATION +#endif +#if defined MBEDTLS_SSL_SERVER_NAME_INDICATION +#define POLARSSL_SSL_SERVER_NAME_INDICATION MBEDTLS_SSL_SERVER_NAME_INDICATION +#endif +#if defined MBEDTLS_SSL_SESSION_TICKETS +#define POLARSSL_SSL_SESSION_TICKETS MBEDTLS_SSL_SESSION_TICKETS +#endif +#if defined MBEDTLS_SSL_SRV_C +#define POLARSSL_SSL_SRV_C MBEDTLS_SSL_SRV_C +#endif +#if defined MBEDTLS_SSL_SRV_RESPECT_CLIENT_PREFERENCE +#define POLARSSL_SSL_SRV_RESPECT_CLIENT_PREFERENCE MBEDTLS_SSL_SRV_RESPECT_CLIENT_PREFERENCE +#endif +#if defined MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO +#define POLARSSL_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO +#endif +#if defined MBEDTLS_SSL_TLS_C +#define POLARSSL_SSL_TLS_C MBEDTLS_SSL_TLS_C +#endif +#if defined MBEDTLS_SSL_TRUNCATED_HMAC +#define POLARSSL_SSL_TRUNCATED_HMAC MBEDTLS_SSL_TRUNCATED_HMAC +#endif +#if defined MBEDTLS_THREADING_ALT +#define POLARSSL_THREADING_ALT MBEDTLS_THREADING_ALT +#endif +#if defined MBEDTLS_THREADING_C +#define POLARSSL_THREADING_C MBEDTLS_THREADING_C +#endif +#if defined MBEDTLS_THREADING_PTHREAD +#define POLARSSL_THREADING_PTHREAD MBEDTLS_THREADING_PTHREAD +#endif +#if defined MBEDTLS_TIMING_ALT +#define POLARSSL_TIMING_ALT MBEDTLS_TIMING_ALT +#endif +#if defined MBEDTLS_TIMING_C +#define POLARSSL_TIMING_C MBEDTLS_TIMING_C +#endif +#if defined MBEDTLS_VERSION_C +#define POLARSSL_VERSION_C MBEDTLS_VERSION_C +#endif +#if defined MBEDTLS_VERSION_FEATURES +#define POLARSSL_VERSION_FEATURES MBEDTLS_VERSION_FEATURES +#endif +#if defined MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3 +#define POLARSSL_X509_ALLOW_EXTENSIONS_NON_V3 MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3 +#endif +#if defined MBEDTLS_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION +#define POLARSSL_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION MBEDTLS_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION +#endif +#if defined MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE +#define POLARSSL_X509_CHECK_EXTENDED_KEY_USAGE MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE +#endif +#if defined MBEDTLS_X509_CHECK_KEY_USAGE +#define POLARSSL_X509_CHECK_KEY_USAGE MBEDTLS_X509_CHECK_KEY_USAGE +#endif +#if defined MBEDTLS_X509_CREATE_C +#define POLARSSL_X509_CREATE_C MBEDTLS_X509_CREATE_C +#endif +#if defined MBEDTLS_X509_CRL_PARSE_C +#define POLARSSL_X509_CRL_PARSE_C MBEDTLS_X509_CRL_PARSE_C +#endif +#if defined MBEDTLS_X509_CRT_PARSE_C +#define POLARSSL_X509_CRT_PARSE_C MBEDTLS_X509_CRT_PARSE_C +#endif +#if defined MBEDTLS_X509_CRT_WRITE_C +#define POLARSSL_X509_CRT_WRITE_C MBEDTLS_X509_CRT_WRITE_C +#endif +#if defined MBEDTLS_X509_CSR_PARSE_C +#define POLARSSL_X509_CSR_PARSE_C MBEDTLS_X509_CSR_PARSE_C +#endif +#if defined MBEDTLS_X509_CSR_WRITE_C +#define POLARSSL_X509_CSR_WRITE_C MBEDTLS_X509_CSR_WRITE_C +#endif +#if defined MBEDTLS_X509_MAX_INTERMEDIATE_CA +#define POLARSSL_X509_MAX_INTERMEDIATE_CA MBEDTLS_X509_MAX_INTERMEDIATE_CA +#endif +#if defined MBEDTLS_X509_RSASSA_PSS_SUPPORT +#define POLARSSL_X509_RSASSA_PSS_SUPPORT MBEDTLS_X509_RSASSA_PSS_SUPPORT +#endif +#if defined MBEDTLS_X509_USE_C +#define POLARSSL_X509_USE_C MBEDTLS_X509_USE_C +#endif +#if defined MBEDTLS_XTEA_ALT +#define POLARSSL_XTEA_ALT MBEDTLS_XTEA_ALT +#endif +#if defined MBEDTLS_XTEA_C +#define POLARSSL_XTEA_C MBEDTLS_XTEA_C +#endif +#if defined MBEDTLS_ZLIB_SUPPORT +#define POLARSSL_ZLIB_SUPPORT MBEDTLS_ZLIB_SUPPORT +#endif + +/* + * Misc names (macros, types, functions, enum constants...) + */ +#define AES_DECRYPT MBEDTLS_AES_DECRYPT +#define AES_ENCRYPT MBEDTLS_AES_ENCRYPT +#define ASN1_BIT_STRING MBEDTLS_ASN1_BIT_STRING +#define ASN1_BMP_STRING MBEDTLS_ASN1_BMP_STRING +#define ASN1_BOOLEAN MBEDTLS_ASN1_BOOLEAN +#define ASN1_CHK_ADD MBEDTLS_ASN1_CHK_ADD +#define ASN1_CONSTRUCTED MBEDTLS_ASN1_CONSTRUCTED +#define ASN1_CONTEXT_SPECIFIC MBEDTLS_ASN1_CONTEXT_SPECIFIC +#define ASN1_GENERALIZED_TIME MBEDTLS_ASN1_GENERALIZED_TIME +#define ASN1_IA5_STRING MBEDTLS_ASN1_IA5_STRING +#define ASN1_INTEGER MBEDTLS_ASN1_INTEGER +#define ASN1_NULL MBEDTLS_ASN1_NULL +#define ASN1_OCTET_STRING MBEDTLS_ASN1_OCTET_STRING +#define ASN1_OID MBEDTLS_ASN1_OID +#define ASN1_PRIMITIVE MBEDTLS_ASN1_PRIMITIVE +#define ASN1_PRINTABLE_STRING MBEDTLS_ASN1_PRINTABLE_STRING +#define ASN1_SEQUENCE MBEDTLS_ASN1_SEQUENCE +#define ASN1_SET MBEDTLS_ASN1_SET +#define ASN1_T61_STRING MBEDTLS_ASN1_T61_STRING +#define ASN1_UNIVERSAL_STRING MBEDTLS_ASN1_UNIVERSAL_STRING +#define ASN1_UTC_TIME MBEDTLS_ASN1_UTC_TIME +#define ASN1_UTF8_STRING MBEDTLS_ASN1_UTF8_STRING +#define BADCERT_CN_MISMATCH MBEDTLS_X509_BADCERT_CN_MISMATCH +#define BADCERT_EXPIRED MBEDTLS_X509_BADCERT_EXPIRED +#define BADCERT_FUTURE MBEDTLS_X509_BADCERT_FUTURE +#define BADCERT_MISSING MBEDTLS_X509_BADCERT_MISSING +#define BADCERT_NOT_TRUSTED MBEDTLS_X509_BADCERT_NOT_TRUSTED +#define BADCERT_OTHER MBEDTLS_X509_BADCERT_OTHER +#define BADCERT_REVOKED MBEDTLS_X509_BADCERT_REVOKED +#define BADCERT_SKIP_VERIFY MBEDTLS_X509_BADCERT_SKIP_VERIFY +#define BADCRL_EXPIRED MBEDTLS_X509_BADCRL_EXPIRED +#define BADCRL_FUTURE MBEDTLS_X509_BADCRL_FUTURE +#define BADCRL_NOT_TRUSTED MBEDTLS_X509_BADCRL_NOT_TRUSTED +#define BLOWFISH_BLOCKSIZE MBEDTLS_BLOWFISH_BLOCKSIZE +#define BLOWFISH_DECRYPT MBEDTLS_BLOWFISH_DECRYPT +#define BLOWFISH_ENCRYPT MBEDTLS_BLOWFISH_ENCRYPT +#define BLOWFISH_MAX_KEY MBEDTLS_BLOWFISH_MAX_KEY_BITS +#define BLOWFISH_MIN_KEY MBEDTLS_BLOWFISH_MIN_KEY_BITS +#define BLOWFISH_ROUNDS MBEDTLS_BLOWFISH_ROUNDS +#define CAMELLIA_DECRYPT MBEDTLS_CAMELLIA_DECRYPT +#define CAMELLIA_ENCRYPT MBEDTLS_CAMELLIA_ENCRYPT +#define COLLECT_SIZE MBEDTLS_HAVEGE_COLLECT_SIZE +#define CTR_DRBG_BLOCKSIZE MBEDTLS_CTR_DRBG_BLOCKSIZE +#define CTR_DRBG_ENTROPY_LEN MBEDTLS_CTR_DRBG_ENTROPY_LEN +#define CTR_DRBG_KEYBITS MBEDTLS_CTR_DRBG_KEYBITS +#define CTR_DRBG_KEYSIZE MBEDTLS_CTR_DRBG_KEYSIZE +#define CTR_DRBG_MAX_INPUT MBEDTLS_CTR_DRBG_MAX_INPUT +#define CTR_DRBG_MAX_REQUEST MBEDTLS_CTR_DRBG_MAX_REQUEST +#define CTR_DRBG_MAX_SEED_INPUT MBEDTLS_CTR_DRBG_MAX_SEED_INPUT +#define CTR_DRBG_PR_OFF MBEDTLS_CTR_DRBG_PR_OFF +#define CTR_DRBG_PR_ON MBEDTLS_CTR_DRBG_PR_ON +#define CTR_DRBG_RESEED_INTERVAL MBEDTLS_CTR_DRBG_RESEED_INTERVAL +#define CTR_DRBG_SEEDLEN MBEDTLS_CTR_DRBG_SEEDLEN +#define DEPRECATED MBEDTLS_DEPRECATED +#define DES_DECRYPT MBEDTLS_DES_DECRYPT +#define DES_ENCRYPT MBEDTLS_DES_ENCRYPT +#define DES_KEY_SIZE MBEDTLS_DES_KEY_SIZE +#define ENTROPY_BLOCK_SIZE MBEDTLS_ENTROPY_BLOCK_SIZE +#define ENTROPY_MAX_GATHER MBEDTLS_ENTROPY_MAX_GATHER +#define ENTROPY_MAX_SEED_SIZE MBEDTLS_ENTROPY_MAX_SEED_SIZE +#define ENTROPY_MAX_SOURCES MBEDTLS_ENTROPY_MAX_SOURCES +#define ENTROPY_MIN_HARDCLOCK MBEDTLS_ENTROPY_MIN_HARDCLOCK +#define ENTROPY_MIN_HAVEGE MBEDTLS_ENTROPY_MIN_HAVEGE +#define ENTROPY_MIN_PLATFORM MBEDTLS_ENTROPY_MIN_PLATFORM +#define ENTROPY_SOURCE_MANUAL MBEDTLS_ENTROPY_SOURCE_MANUAL +#define EXT_AUTHORITY_KEY_IDENTIFIER MBEDTLS_X509_EXT_AUTHORITY_KEY_IDENTIFIER +#define EXT_BASIC_CONSTRAINTS MBEDTLS_X509_EXT_BASIC_CONSTRAINTS +#define EXT_CERTIFICATE_POLICIES MBEDTLS_X509_EXT_CERTIFICATE_POLICIES +#define EXT_CRL_DISTRIBUTION_POINTS MBEDTLS_X509_EXT_CRL_DISTRIBUTION_POINTS +#define EXT_EXTENDED_KEY_USAGE MBEDTLS_X509_EXT_EXTENDED_KEY_USAGE +#define EXT_FRESHEST_CRL MBEDTLS_X509_EXT_FRESHEST_CRL +#define EXT_INIHIBIT_ANYPOLICY MBEDTLS_X509_EXT_INIHIBIT_ANYPOLICY +#define EXT_ISSUER_ALT_NAME MBEDTLS_X509_EXT_ISSUER_ALT_NAME +#define EXT_KEY_USAGE MBEDTLS_X509_EXT_KEY_USAGE +#define EXT_NAME_CONSTRAINTS MBEDTLS_X509_EXT_NAME_CONSTRAINTS +#define EXT_NS_CERT_TYPE MBEDTLS_X509_EXT_NS_CERT_TYPE +#define EXT_POLICY_CONSTRAINTS MBEDTLS_X509_EXT_POLICY_CONSTRAINTS +#define EXT_POLICY_MAPPINGS MBEDTLS_X509_EXT_POLICY_MAPPINGS +#define EXT_SUBJECT_ALT_NAME MBEDTLS_X509_EXT_SUBJECT_ALT_NAME +#define EXT_SUBJECT_DIRECTORY_ATTRS MBEDTLS_X509_EXT_SUBJECT_DIRECTORY_ATTRS +#define EXT_SUBJECT_KEY_IDENTIFIER MBEDTLS_X509_EXT_SUBJECT_KEY_IDENTIFIER +#define GCM_DECRYPT MBEDTLS_GCM_DECRYPT +#define GCM_ENCRYPT MBEDTLS_GCM_ENCRYPT +#define KU_CRL_SIGN MBEDTLS_X509_KU_CRL_SIGN +#define KU_DATA_ENCIPHERMENT MBEDTLS_X509_KU_DATA_ENCIPHERMENT +#define KU_DIGITAL_SIGNATURE MBEDTLS_X509_KU_DIGITAL_SIGNATURE +#define KU_KEY_AGREEMENT MBEDTLS_X509_KU_KEY_AGREEMENT +#define KU_KEY_CERT_SIGN MBEDTLS_X509_KU_KEY_CERT_SIGN +#define KU_KEY_ENCIPHERMENT MBEDTLS_X509_KU_KEY_ENCIPHERMENT +#define KU_NON_REPUDIATION MBEDTLS_X509_KU_NON_REPUDIATION +#define LN_2_DIV_LN_10_SCALE100 MBEDTLS_LN_2_DIV_LN_10_SCALE100 +#define MEMORY_VERIFY_ALLOC MBEDTLS_MEMORY_VERIFY_ALLOC +#define MEMORY_VERIFY_ALWAYS MBEDTLS_MEMORY_VERIFY_ALWAYS +#define MEMORY_VERIFY_FREE MBEDTLS_MEMORY_VERIFY_FREE +#define MEMORY_VERIFY_NONE MBEDTLS_MEMORY_VERIFY_NONE +#define MPI_CHK MBEDTLS_MPI_CHK +#define NET_PROTO_TCP MBEDTLS_NET_PROTO_TCP +#define NET_PROTO_UDP MBEDTLS_NET_PROTO_UDP +#define NS_CERT_TYPE_EMAIL MBEDTLS_X509_NS_CERT_TYPE_EMAIL +#define NS_CERT_TYPE_EMAIL_CA MBEDTLS_X509_NS_CERT_TYPE_EMAIL_CA +#define NS_CERT_TYPE_OBJECT_SIGNING MBEDTLS_X509_NS_CERT_TYPE_OBJECT_SIGNING +#define NS_CERT_TYPE_OBJECT_SIGNING_CA MBEDTLS_X509_NS_CERT_TYPE_OBJECT_SIGNING_CA +#define NS_CERT_TYPE_RESERVED MBEDTLS_X509_NS_CERT_TYPE_RESERVED +#define NS_CERT_TYPE_SSL_CA MBEDTLS_X509_NS_CERT_TYPE_SSL_CA +#define NS_CERT_TYPE_SSL_CLIENT MBEDTLS_X509_NS_CERT_TYPE_SSL_CLIENT +#define NS_CERT_TYPE_SSL_SERVER MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER +#define OID_ANSI_X9_62 MBEDTLS_OID_ANSI_X9_62 +#define OID_ANSI_X9_62_FIELD_TYPE MBEDTLS_OID_ANSI_X9_62_FIELD_TYPE +#define OID_ANSI_X9_62_PRIME_FIELD MBEDTLS_OID_ANSI_X9_62_PRIME_FIELD +#define OID_ANSI_X9_62_SIG MBEDTLS_OID_ANSI_X9_62_SIG +#define OID_ANSI_X9_62_SIG_SHA2 MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 +#define OID_ANY_EXTENDED_KEY_USAGE MBEDTLS_OID_ANY_EXTENDED_KEY_USAGE +#define OID_AT MBEDTLS_OID_AT +#define OID_AT_CN MBEDTLS_OID_AT_CN +#define OID_AT_COUNTRY MBEDTLS_OID_AT_COUNTRY +#define OID_AT_DN_QUALIFIER MBEDTLS_OID_AT_DN_QUALIFIER +#define OID_AT_GENERATION_QUALIFIER MBEDTLS_OID_AT_GENERATION_QUALIFIER +#define OID_AT_GIVEN_NAME MBEDTLS_OID_AT_GIVEN_NAME +#define OID_AT_INITIALS MBEDTLS_OID_AT_INITIALS +#define OID_AT_LOCALITY MBEDTLS_OID_AT_LOCALITY +#define OID_AT_ORGANIZATION MBEDTLS_OID_AT_ORGANIZATION +#define OID_AT_ORG_UNIT MBEDTLS_OID_AT_ORG_UNIT +#define OID_AT_POSTAL_ADDRESS MBEDTLS_OID_AT_POSTAL_ADDRESS +#define OID_AT_POSTAL_CODE MBEDTLS_OID_AT_POSTAL_CODE +#define OID_AT_PSEUDONYM MBEDTLS_OID_AT_PSEUDONYM +#define OID_AT_SERIAL_NUMBER MBEDTLS_OID_AT_SERIAL_NUMBER +#define OID_AT_STATE MBEDTLS_OID_AT_STATE +#define OID_AT_SUR_NAME MBEDTLS_OID_AT_SUR_NAME +#define OID_AT_TITLE MBEDTLS_OID_AT_TITLE +#define OID_AT_UNIQUE_IDENTIFIER MBEDTLS_OID_AT_UNIQUE_IDENTIFIER +#define OID_AUTHORITY_KEY_IDENTIFIER MBEDTLS_OID_AUTHORITY_KEY_IDENTIFIER +#define OID_BASIC_CONSTRAINTS MBEDTLS_OID_BASIC_CONSTRAINTS +#define OID_CERTICOM MBEDTLS_OID_CERTICOM +#define OID_CERTIFICATE_POLICIES MBEDTLS_OID_CERTIFICATE_POLICIES +#define OID_CLIENT_AUTH MBEDTLS_OID_CLIENT_AUTH +#define OID_CMP MBEDTLS_OID_CMP +#define OID_CODE_SIGNING MBEDTLS_OID_CODE_SIGNING +#define OID_COUNTRY_US MBEDTLS_OID_COUNTRY_US +#define OID_CRL_DISTRIBUTION_POINTS MBEDTLS_OID_CRL_DISTRIBUTION_POINTS +#define OID_CRL_NUMBER MBEDTLS_OID_CRL_NUMBER +#define OID_DES_CBC MBEDTLS_OID_DES_CBC +#define OID_DES_EDE3_CBC MBEDTLS_OID_DES_EDE3_CBC +#define OID_DIGEST_ALG_MD2 MBEDTLS_OID_DIGEST_ALG_MD2 +#define OID_DIGEST_ALG_MD4 MBEDTLS_OID_DIGEST_ALG_MD4 +#define OID_DIGEST_ALG_MD5 MBEDTLS_OID_DIGEST_ALG_MD5 +#define OID_DIGEST_ALG_SHA1 MBEDTLS_OID_DIGEST_ALG_SHA1 +#define OID_DIGEST_ALG_SHA224 MBEDTLS_OID_DIGEST_ALG_SHA224 +#define OID_DIGEST_ALG_SHA256 MBEDTLS_OID_DIGEST_ALG_SHA256 +#define OID_DIGEST_ALG_SHA384 MBEDTLS_OID_DIGEST_ALG_SHA384 +#define OID_DIGEST_ALG_SHA512 MBEDTLS_OID_DIGEST_ALG_SHA512 +#define OID_DOMAIN_COMPONENT MBEDTLS_OID_DOMAIN_COMPONENT +#define OID_ECDSA_SHA1 MBEDTLS_OID_ECDSA_SHA1 +#define OID_ECDSA_SHA224 MBEDTLS_OID_ECDSA_SHA224 +#define OID_ECDSA_SHA256 MBEDTLS_OID_ECDSA_SHA256 +#define OID_ECDSA_SHA384 MBEDTLS_OID_ECDSA_SHA384 +#define OID_ECDSA_SHA512 MBEDTLS_OID_ECDSA_SHA512 +#define OID_EC_ALG_ECDH MBEDTLS_OID_EC_ALG_ECDH +#define OID_EC_ALG_UNRESTRICTED MBEDTLS_OID_EC_ALG_UNRESTRICTED +#define OID_EC_BRAINPOOL_V1 MBEDTLS_OID_EC_BRAINPOOL_V1 +#define OID_EC_GRP_BP256R1 MBEDTLS_OID_EC_GRP_BP256R1 +#define OID_EC_GRP_BP384R1 MBEDTLS_OID_EC_GRP_BP384R1 +#define OID_EC_GRP_BP512R1 MBEDTLS_OID_EC_GRP_BP512R1 +#define OID_EC_GRP_SECP192K1 MBEDTLS_OID_EC_GRP_SECP192K1 +#define OID_EC_GRP_SECP192R1 MBEDTLS_OID_EC_GRP_SECP192R1 +#define OID_EC_GRP_SECP224K1 MBEDTLS_OID_EC_GRP_SECP224K1 +#define OID_EC_GRP_SECP224R1 MBEDTLS_OID_EC_GRP_SECP224R1 +#define OID_EC_GRP_SECP256K1 MBEDTLS_OID_EC_GRP_SECP256K1 +#define OID_EC_GRP_SECP256R1 MBEDTLS_OID_EC_GRP_SECP256R1 +#define OID_EC_GRP_SECP384R1 MBEDTLS_OID_EC_GRP_SECP384R1 +#define OID_EC_GRP_SECP521R1 MBEDTLS_OID_EC_GRP_SECP521R1 +#define OID_EMAIL_PROTECTION MBEDTLS_OID_EMAIL_PROTECTION +#define OID_EXTENDED_KEY_USAGE MBEDTLS_OID_EXTENDED_KEY_USAGE +#define OID_FRESHEST_CRL MBEDTLS_OID_FRESHEST_CRL +#define OID_GOV MBEDTLS_OID_GOV +#define OID_HMAC_SHA1 MBEDTLS_OID_HMAC_SHA1 +#define OID_ID_CE MBEDTLS_OID_ID_CE +#define OID_INIHIBIT_ANYPOLICY MBEDTLS_OID_INIHIBIT_ANYPOLICY +#define OID_ISO_CCITT_DS MBEDTLS_OID_ISO_CCITT_DS +#define OID_ISO_IDENTIFIED_ORG MBEDTLS_OID_ISO_IDENTIFIED_ORG +#define OID_ISO_ITU_COUNTRY MBEDTLS_OID_ISO_ITU_COUNTRY +#define OID_ISO_ITU_US_ORG MBEDTLS_OID_ISO_ITU_US_ORG +#define OID_ISO_MEMBER_BODIES MBEDTLS_OID_ISO_MEMBER_BODIES +#define OID_ISSUER_ALT_NAME MBEDTLS_OID_ISSUER_ALT_NAME +#define OID_KEY_USAGE MBEDTLS_OID_KEY_USAGE +#define OID_KP MBEDTLS_OID_KP +#define OID_MGF1 MBEDTLS_OID_MGF1 +#define OID_NAME_CONSTRAINTS MBEDTLS_OID_NAME_CONSTRAINTS +#define OID_NETSCAPE MBEDTLS_OID_NETSCAPE +#define OID_NS_BASE_URL MBEDTLS_OID_NS_BASE_URL +#define OID_NS_CA_POLICY_URL MBEDTLS_OID_NS_CA_POLICY_URL +#define OID_NS_CA_REVOCATION_URL MBEDTLS_OID_NS_CA_REVOCATION_URL +#define OID_NS_CERT MBEDTLS_OID_NS_CERT +#define OID_NS_CERT_SEQUENCE MBEDTLS_OID_NS_CERT_SEQUENCE +#define OID_NS_CERT_TYPE MBEDTLS_OID_NS_CERT_TYPE +#define OID_NS_COMMENT MBEDTLS_OID_NS_COMMENT +#define OID_NS_DATA_TYPE MBEDTLS_OID_NS_DATA_TYPE +#define OID_NS_RENEWAL_URL MBEDTLS_OID_NS_RENEWAL_URL +#define OID_NS_REVOCATION_URL MBEDTLS_OID_NS_REVOCATION_URL +#define OID_NS_SSL_SERVER_NAME MBEDTLS_OID_NS_SSL_SERVER_NAME +#define OID_OCSP_SIGNING MBEDTLS_OID_OCSP_SIGNING +#define OID_OIW_SECSIG MBEDTLS_OID_OIW_SECSIG +#define OID_OIW_SECSIG_ALG MBEDTLS_OID_OIW_SECSIG_ALG +#define OID_OIW_SECSIG_SHA1 MBEDTLS_OID_OIW_SECSIG_SHA1 +#define OID_ORGANIZATION MBEDTLS_OID_ORGANIZATION +#define OID_ORG_ANSI_X9_62 MBEDTLS_OID_ORG_ANSI_X9_62 +#define OID_ORG_CERTICOM MBEDTLS_OID_ORG_CERTICOM +#define OID_ORG_DOD MBEDTLS_OID_ORG_DOD +#define OID_ORG_GOV MBEDTLS_OID_ORG_GOV +#define OID_ORG_NETSCAPE MBEDTLS_OID_ORG_NETSCAPE +#define OID_ORG_OIW MBEDTLS_OID_ORG_OIW +#define OID_ORG_RSA_DATA_SECURITY MBEDTLS_OID_ORG_RSA_DATA_SECURITY +#define OID_ORG_TELETRUST MBEDTLS_OID_ORG_TELETRUST +#define OID_PKCS MBEDTLS_OID_PKCS +#define OID_PKCS1 MBEDTLS_OID_PKCS1 +#define OID_PKCS12 MBEDTLS_OID_PKCS12 +#define OID_PKCS12_PBE MBEDTLS_OID_PKCS12_PBE +#define OID_PKCS12_PBE_SHA1_DES2_EDE_CBC MBEDTLS_OID_PKCS12_PBE_SHA1_DES2_EDE_CBC +#define OID_PKCS12_PBE_SHA1_DES3_EDE_CBC MBEDTLS_OID_PKCS12_PBE_SHA1_DES3_EDE_CBC +#define OID_PKCS12_PBE_SHA1_RC2_128_CBC MBEDTLS_OID_PKCS12_PBE_SHA1_RC2_128_CBC +#define OID_PKCS12_PBE_SHA1_RC2_40_CBC MBEDTLS_OID_PKCS12_PBE_SHA1_RC2_40_CBC +#define OID_PKCS12_PBE_SHA1_RC4_128 MBEDTLS_OID_PKCS12_PBE_SHA1_RC4_128 +#define OID_PKCS12_PBE_SHA1_RC4_40 MBEDTLS_OID_PKCS12_PBE_SHA1_RC4_40 +#define OID_PKCS1_MD2 MBEDTLS_OID_PKCS1_MD2 +#define OID_PKCS1_MD4 MBEDTLS_OID_PKCS1_MD4 +#define OID_PKCS1_MD5 MBEDTLS_OID_PKCS1_MD5 +#define OID_PKCS1_RSA MBEDTLS_OID_PKCS1_RSA +#define OID_PKCS1_SHA1 MBEDTLS_OID_PKCS1_SHA1 +#define OID_PKCS1_SHA224 MBEDTLS_OID_PKCS1_SHA224 +#define OID_PKCS1_SHA256 MBEDTLS_OID_PKCS1_SHA256 +#define OID_PKCS1_SHA384 MBEDTLS_OID_PKCS1_SHA384 +#define OID_PKCS1_SHA512 MBEDTLS_OID_PKCS1_SHA512 +#define OID_PKCS5 MBEDTLS_OID_PKCS5 +#define OID_PKCS5_PBES2 MBEDTLS_OID_PKCS5_PBES2 +#define OID_PKCS5_PBE_MD2_DES_CBC MBEDTLS_OID_PKCS5_PBE_MD2_DES_CBC +#define OID_PKCS5_PBE_MD2_RC2_CBC MBEDTLS_OID_PKCS5_PBE_MD2_RC2_CBC +#define OID_PKCS5_PBE_MD5_DES_CBC MBEDTLS_OID_PKCS5_PBE_MD5_DES_CBC +#define OID_PKCS5_PBE_MD5_RC2_CBC MBEDTLS_OID_PKCS5_PBE_MD5_RC2_CBC +#define OID_PKCS5_PBE_SHA1_DES_CBC MBEDTLS_OID_PKCS5_PBE_SHA1_DES_CBC +#define OID_PKCS5_PBE_SHA1_RC2_CBC MBEDTLS_OID_PKCS5_PBE_SHA1_RC2_CBC +#define OID_PKCS5_PBKDF2 MBEDTLS_OID_PKCS5_PBKDF2 +#define OID_PKCS5_PBMAC1 MBEDTLS_OID_PKCS5_PBMAC1 +#define OID_PKCS9 MBEDTLS_OID_PKCS9 +#define OID_PKCS9_CSR_EXT_REQ MBEDTLS_OID_PKCS9_CSR_EXT_REQ +#define OID_PKCS9_EMAIL MBEDTLS_OID_PKCS9_EMAIL +#define OID_PKIX MBEDTLS_OID_PKIX +#define OID_POLICY_CONSTRAINTS MBEDTLS_OID_POLICY_CONSTRAINTS +#define OID_POLICY_MAPPINGS MBEDTLS_OID_POLICY_MAPPINGS +#define OID_PRIVATE_KEY_USAGE_PERIOD MBEDTLS_OID_PRIVATE_KEY_USAGE_PERIOD +#define OID_RSASSA_PSS MBEDTLS_OID_RSASSA_PSS +#define OID_RSA_COMPANY MBEDTLS_OID_RSA_COMPANY +#define OID_RSA_SHA_OBS MBEDTLS_OID_RSA_SHA_OBS +#define OID_SERVER_AUTH MBEDTLS_OID_SERVER_AUTH +#define OID_SIZE MBEDTLS_OID_SIZE +#define OID_SUBJECT_ALT_NAME MBEDTLS_OID_SUBJECT_ALT_NAME +#define OID_SUBJECT_DIRECTORY_ATTRS MBEDTLS_OID_SUBJECT_DIRECTORY_ATTRS +#define OID_SUBJECT_KEY_IDENTIFIER MBEDTLS_OID_SUBJECT_KEY_IDENTIFIER +#define OID_TELETRUST MBEDTLS_OID_TELETRUST +#define OID_TIME_STAMPING MBEDTLS_OID_TIME_STAMPING +#define PADLOCK_ACE MBEDTLS_PADLOCK_ACE +#define PADLOCK_ALIGN16 MBEDTLS_PADLOCK_ALIGN16 +#define PADLOCK_PHE MBEDTLS_PADLOCK_PHE +#define PADLOCK_PMM MBEDTLS_PADLOCK_PMM +#define PADLOCK_RNG MBEDTLS_PADLOCK_RNG +#define PKCS12_DERIVE_IV MBEDTLS_PKCS12_DERIVE_IV +#define PKCS12_DERIVE_KEY MBEDTLS_PKCS12_DERIVE_KEY +#define PKCS12_DERIVE_MAC_KEY MBEDTLS_PKCS12_DERIVE_MAC_KEY +#define PKCS12_PBE_DECRYPT MBEDTLS_PKCS12_PBE_DECRYPT +#define PKCS12_PBE_ENCRYPT MBEDTLS_PKCS12_PBE_ENCRYPT +#define PKCS5_DECRYPT MBEDTLS_PKCS5_DECRYPT +#define PKCS5_ENCRYPT MBEDTLS_PKCS5_ENCRYPT +#define POLARSSL_AESNI_AES MBEDTLS_AESNI_AES +#define POLARSSL_AESNI_CLMUL MBEDTLS_AESNI_CLMUL +#define POLARSSL_AESNI_H MBEDTLS_AESNI_H +#define POLARSSL_AES_H MBEDTLS_AES_H +#define POLARSSL_ARC4_H MBEDTLS_ARC4_H +#define POLARSSL_ASN1_H MBEDTLS_ASN1_H +#define POLARSSL_ASN1_WRITE_H MBEDTLS_ASN1_WRITE_H +#define POLARSSL_BASE64_H MBEDTLS_BASE64_H +#define POLARSSL_BIGNUM_H MBEDTLS_BIGNUM_H +#define POLARSSL_BLOWFISH_H MBEDTLS_BLOWFISH_H +#define POLARSSL_BN_MUL_H MBEDTLS_BN_MUL_H +#define POLARSSL_CAMELLIA_H MBEDTLS_CAMELLIA_H +#define POLARSSL_CCM_H MBEDTLS_CCM_H +#define POLARSSL_CERTS_H MBEDTLS_CERTS_H +#define POLARSSL_CHECK_CONFIG_H MBEDTLS_CHECK_CONFIG_H +#define POLARSSL_CIPHERSUITE_NODTLS MBEDTLS_CIPHERSUITE_NODTLS +#define POLARSSL_CIPHERSUITE_SHORT_TAG MBEDTLS_CIPHERSUITE_SHORT_TAG +#define POLARSSL_CIPHERSUITE_WEAK MBEDTLS_CIPHERSUITE_WEAK +#define POLARSSL_CIPHER_AES_128_CBC MBEDTLS_CIPHER_AES_128_CBC +#define POLARSSL_CIPHER_AES_128_CCM MBEDTLS_CIPHER_AES_128_CCM +#define POLARSSL_CIPHER_AES_128_CFB128 MBEDTLS_CIPHER_AES_128_CFB128 +#define POLARSSL_CIPHER_AES_128_CTR MBEDTLS_CIPHER_AES_128_CTR +#define POLARSSL_CIPHER_AES_128_ECB MBEDTLS_CIPHER_AES_128_ECB +#define POLARSSL_CIPHER_AES_128_GCM MBEDTLS_CIPHER_AES_128_GCM +#define POLARSSL_CIPHER_AES_192_CBC MBEDTLS_CIPHER_AES_192_CBC +#define POLARSSL_CIPHER_AES_192_CCM MBEDTLS_CIPHER_AES_192_CCM +#define POLARSSL_CIPHER_AES_192_CFB128 MBEDTLS_CIPHER_AES_192_CFB128 +#define POLARSSL_CIPHER_AES_192_CTR MBEDTLS_CIPHER_AES_192_CTR +#define POLARSSL_CIPHER_AES_192_ECB MBEDTLS_CIPHER_AES_192_ECB +#define POLARSSL_CIPHER_AES_192_GCM MBEDTLS_CIPHER_AES_192_GCM +#define POLARSSL_CIPHER_AES_256_CBC MBEDTLS_CIPHER_AES_256_CBC +#define POLARSSL_CIPHER_AES_256_CCM MBEDTLS_CIPHER_AES_256_CCM +#define POLARSSL_CIPHER_AES_256_CFB128 MBEDTLS_CIPHER_AES_256_CFB128 +#define POLARSSL_CIPHER_AES_256_CTR MBEDTLS_CIPHER_AES_256_CTR +#define POLARSSL_CIPHER_AES_256_ECB MBEDTLS_CIPHER_AES_256_ECB +#define POLARSSL_CIPHER_AES_256_GCM MBEDTLS_CIPHER_AES_256_GCM +#define POLARSSL_CIPHER_ARC4_128 MBEDTLS_CIPHER_ARC4_128 +#define POLARSSL_CIPHER_BLOWFISH_CBC MBEDTLS_CIPHER_BLOWFISH_CBC +#define POLARSSL_CIPHER_BLOWFISH_CFB64 MBEDTLS_CIPHER_BLOWFISH_CFB64 +#define POLARSSL_CIPHER_BLOWFISH_CTR MBEDTLS_CIPHER_BLOWFISH_CTR +#define POLARSSL_CIPHER_BLOWFISH_ECB MBEDTLS_CIPHER_BLOWFISH_ECB +#define POLARSSL_CIPHER_CAMELLIA_128_CBC MBEDTLS_CIPHER_CAMELLIA_128_CBC +#define POLARSSL_CIPHER_CAMELLIA_128_CCM MBEDTLS_CIPHER_CAMELLIA_128_CCM +#define POLARSSL_CIPHER_CAMELLIA_128_CFB128 MBEDTLS_CIPHER_CAMELLIA_128_CFB128 +#define POLARSSL_CIPHER_CAMELLIA_128_CTR MBEDTLS_CIPHER_CAMELLIA_128_CTR +#define POLARSSL_CIPHER_CAMELLIA_128_ECB MBEDTLS_CIPHER_CAMELLIA_128_ECB +#define POLARSSL_CIPHER_CAMELLIA_128_GCM MBEDTLS_CIPHER_CAMELLIA_128_GCM +#define POLARSSL_CIPHER_CAMELLIA_192_CBC MBEDTLS_CIPHER_CAMELLIA_192_CBC +#define POLARSSL_CIPHER_CAMELLIA_192_CCM MBEDTLS_CIPHER_CAMELLIA_192_CCM +#define POLARSSL_CIPHER_CAMELLIA_192_CFB128 MBEDTLS_CIPHER_CAMELLIA_192_CFB128 +#define POLARSSL_CIPHER_CAMELLIA_192_CTR MBEDTLS_CIPHER_CAMELLIA_192_CTR +#define POLARSSL_CIPHER_CAMELLIA_192_ECB MBEDTLS_CIPHER_CAMELLIA_192_ECB +#define POLARSSL_CIPHER_CAMELLIA_192_GCM MBEDTLS_CIPHER_CAMELLIA_192_GCM +#define POLARSSL_CIPHER_CAMELLIA_256_CBC MBEDTLS_CIPHER_CAMELLIA_256_CBC +#define POLARSSL_CIPHER_CAMELLIA_256_CCM MBEDTLS_CIPHER_CAMELLIA_256_CCM +#define POLARSSL_CIPHER_CAMELLIA_256_CFB128 MBEDTLS_CIPHER_CAMELLIA_256_CFB128 +#define POLARSSL_CIPHER_CAMELLIA_256_CTR MBEDTLS_CIPHER_CAMELLIA_256_CTR +#define POLARSSL_CIPHER_CAMELLIA_256_ECB MBEDTLS_CIPHER_CAMELLIA_256_ECB +#define POLARSSL_CIPHER_CAMELLIA_256_GCM MBEDTLS_CIPHER_CAMELLIA_256_GCM +#define POLARSSL_CIPHER_DES_CBC MBEDTLS_CIPHER_DES_CBC +#define POLARSSL_CIPHER_DES_ECB MBEDTLS_CIPHER_DES_ECB +#define POLARSSL_CIPHER_DES_EDE3_CBC MBEDTLS_CIPHER_DES_EDE3_CBC +#define POLARSSL_CIPHER_DES_EDE3_ECB MBEDTLS_CIPHER_DES_EDE3_ECB +#define POLARSSL_CIPHER_DES_EDE_CBC MBEDTLS_CIPHER_DES_EDE_CBC +#define POLARSSL_CIPHER_DES_EDE_ECB MBEDTLS_CIPHER_DES_EDE_ECB +#define POLARSSL_CIPHER_H MBEDTLS_CIPHER_H +#define POLARSSL_CIPHER_ID_3DES MBEDTLS_CIPHER_ID_3DES +#define POLARSSL_CIPHER_ID_AES MBEDTLS_CIPHER_ID_AES +#define POLARSSL_CIPHER_ID_ARC4 MBEDTLS_CIPHER_ID_ARC4 +#define POLARSSL_CIPHER_ID_BLOWFISH MBEDTLS_CIPHER_ID_BLOWFISH +#define POLARSSL_CIPHER_ID_CAMELLIA MBEDTLS_CIPHER_ID_CAMELLIA +#define POLARSSL_CIPHER_ID_DES MBEDTLS_CIPHER_ID_DES +#define POLARSSL_CIPHER_ID_NONE MBEDTLS_CIPHER_ID_NONE +#define POLARSSL_CIPHER_ID_NULL MBEDTLS_CIPHER_ID_NULL +#define POLARSSL_CIPHER_MODE_AEAD MBEDTLS_CIPHER_MODE_AEAD +#define POLARSSL_CIPHER_MODE_STREAM MBEDTLS_CIPHER_MODE_STREAM +#define POLARSSL_CIPHER_MODE_WITH_PADDING MBEDTLS_CIPHER_MODE_WITH_PADDING +#define POLARSSL_CIPHER_NONE MBEDTLS_CIPHER_NONE +#define POLARSSL_CIPHER_NULL MBEDTLS_CIPHER_NULL +#define POLARSSL_CIPHER_VARIABLE_IV_LEN MBEDTLS_CIPHER_VARIABLE_IV_LEN +#define POLARSSL_CIPHER_VARIABLE_KEY_LEN MBEDTLS_CIPHER_VARIABLE_KEY_LEN +#define POLARSSL_CIPHER_WRAP_H MBEDTLS_CIPHER_WRAP_H +#define POLARSSL_CONFIG_H MBEDTLS_CONFIG_H +#define POLARSSL_CTR_DRBG_H MBEDTLS_CTR_DRBG_H +#define POLARSSL_DEBUG_H MBEDTLS_DEBUG_H +#define POLARSSL_DECRYPT MBEDTLS_DECRYPT +#define POLARSSL_DES_H MBEDTLS_DES_H +#define POLARSSL_DHM_H MBEDTLS_DHM_H +#define POLARSSL_DHM_RFC3526_MODP_2048_G MBEDTLS_DHM_RFC3526_MODP_2048_G +#define POLARSSL_DHM_RFC3526_MODP_2048_P MBEDTLS_DHM_RFC3526_MODP_2048_P +#define POLARSSL_DHM_RFC3526_MODP_3072_G MBEDTLS_DHM_RFC3526_MODP_3072_G +#define POLARSSL_DHM_RFC3526_MODP_3072_P MBEDTLS_DHM_RFC3526_MODP_3072_P +#define POLARSSL_DHM_RFC5114_MODP_2048_G MBEDTLS_DHM_RFC5114_MODP_2048_G +#define POLARSSL_DHM_RFC5114_MODP_2048_P MBEDTLS_DHM_RFC5114_MODP_2048_P +#define POLARSSL_ECDH_H MBEDTLS_ECDH_H +#define POLARSSL_ECDH_OURS MBEDTLS_ECDH_OURS +#define POLARSSL_ECDH_THEIRS MBEDTLS_ECDH_THEIRS +#define POLARSSL_ECDSA_H MBEDTLS_ECDSA_H +#define POLARSSL_ECP_DP_BP256R1 MBEDTLS_ECP_DP_BP256R1 +#define POLARSSL_ECP_DP_BP384R1 MBEDTLS_ECP_DP_BP384R1 +#define POLARSSL_ECP_DP_BP512R1 MBEDTLS_ECP_DP_BP512R1 +#define POLARSSL_ECP_DP_M255 MBEDTLS_ECP_DP_CURVE25519 +#define POLARSSL_ECP_DP_MAX MBEDTLS_ECP_DP_MAX +#define POLARSSL_ECP_DP_NONE MBEDTLS_ECP_DP_NONE +#define POLARSSL_ECP_DP_SECP192K1 MBEDTLS_ECP_DP_SECP192K1 +#define POLARSSL_ECP_DP_SECP192R1 MBEDTLS_ECP_DP_SECP192R1 +#define POLARSSL_ECP_DP_SECP224K1 MBEDTLS_ECP_DP_SECP224K1 +#define POLARSSL_ECP_DP_SECP224R1 MBEDTLS_ECP_DP_SECP224R1 +#define POLARSSL_ECP_DP_SECP256K1 MBEDTLS_ECP_DP_SECP256K1 +#define POLARSSL_ECP_DP_SECP256R1 MBEDTLS_ECP_DP_SECP256R1 +#define POLARSSL_ECP_DP_SECP384R1 MBEDTLS_ECP_DP_SECP384R1 +#define POLARSSL_ECP_DP_SECP521R1 MBEDTLS_ECP_DP_SECP521R1 +#define POLARSSL_ECP_H MBEDTLS_ECP_H +#define POLARSSL_ECP_MAX_BYTES MBEDTLS_ECP_MAX_BYTES +#define POLARSSL_ECP_MAX_PT_LEN MBEDTLS_ECP_MAX_PT_LEN +#define POLARSSL_ECP_PF_COMPRESSED MBEDTLS_ECP_PF_COMPRESSED +#define POLARSSL_ECP_PF_UNCOMPRESSED MBEDTLS_ECP_PF_UNCOMPRESSED +#define POLARSSL_ECP_TLS_NAMED_CURVE MBEDTLS_ECP_TLS_NAMED_CURVE +#define POLARSSL_ENCRYPT MBEDTLS_ENCRYPT +#define POLARSSL_ENTROPY_H MBEDTLS_ENTROPY_H +#define POLARSSL_ENTROPY_POLL_H MBEDTLS_ENTROPY_POLL_H +#define POLARSSL_ENTROPY_SHA256_ACCUMULATOR MBEDTLS_ENTROPY_SHA256_ACCUMULATOR +#define POLARSSL_ENTROPY_SHA512_ACCUMULATOR MBEDTLS_ENTROPY_SHA512_ACCUMULATOR +#define POLARSSL_ERROR_H MBEDTLS_ERROR_H +#define POLARSSL_ERR_AES_INVALID_INPUT_LENGTH MBEDTLS_ERR_AES_INVALID_INPUT_LENGTH +#define POLARSSL_ERR_AES_INVALID_KEY_LENGTH MBEDTLS_ERR_AES_INVALID_KEY_LENGTH +#define POLARSSL_ERR_ASN1_BUF_TOO_SMALL MBEDTLS_ERR_ASN1_BUF_TOO_SMALL +#define POLARSSL_ERR_ASN1_INVALID_DATA MBEDTLS_ERR_ASN1_INVALID_DATA +#define POLARSSL_ERR_ASN1_INVALID_LENGTH MBEDTLS_ERR_ASN1_INVALID_LENGTH +#define POLARSSL_ERR_ASN1_LENGTH_MISMATCH MBEDTLS_ERR_ASN1_LENGTH_MISMATCH +#define POLARSSL_ERR_ASN1_MALLOC_FAILED MBEDTLS_ERR_ASN1_ALLOC_FAILED +#define POLARSSL_ERR_ASN1_OUT_OF_DATA MBEDTLS_ERR_ASN1_OUT_OF_DATA +#define POLARSSL_ERR_ASN1_UNEXPECTED_TAG MBEDTLS_ERR_ASN1_UNEXPECTED_TAG +#define POLARSSL_ERR_BASE64_BUFFER_TOO_SMALL MBEDTLS_ERR_BASE64_BUFFER_TOO_SMALL +#define POLARSSL_ERR_BASE64_INVALID_CHARACTER MBEDTLS_ERR_BASE64_INVALID_CHARACTER +#define POLARSSL_ERR_BLOWFISH_INVALID_INPUT_LENGTH MBEDTLS_ERR_BLOWFISH_INVALID_INPUT_LENGTH +#define POLARSSL_ERR_BLOWFISH_INVALID_KEY_LENGTH MBEDTLS_ERR_BLOWFISH_INVALID_KEY_LENGTH +#define POLARSSL_ERR_CAMELLIA_INVALID_INPUT_LENGTH MBEDTLS_ERR_CAMELLIA_INVALID_INPUT_LENGTH +#define POLARSSL_ERR_CAMELLIA_INVALID_KEY_LENGTH MBEDTLS_ERR_CAMELLIA_INVALID_KEY_LENGTH +#define POLARSSL_ERR_CCM_AUTH_FAILED MBEDTLS_ERR_CCM_AUTH_FAILED +#define POLARSSL_ERR_CCM_BAD_INPUT MBEDTLS_ERR_CCM_BAD_INPUT +#define POLARSSL_ERR_CIPHER_ALLOC_FAILED MBEDTLS_ERR_CIPHER_ALLOC_FAILED +#define POLARSSL_ERR_CIPHER_AUTH_FAILED MBEDTLS_ERR_CIPHER_AUTH_FAILED +#define POLARSSL_ERR_CIPHER_BAD_INPUT_DATA MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA +#define POLARSSL_ERR_CIPHER_FEATURE_UNAVAILABLE MBEDTLS_ERR_CIPHER_FEATURE_UNAVAILABLE +#define POLARSSL_ERR_CIPHER_FULL_BLOCK_EXPECTED MBEDTLS_ERR_CIPHER_FULL_BLOCK_EXPECTED +#define POLARSSL_ERR_CIPHER_INVALID_PADDING MBEDTLS_ERR_CIPHER_INVALID_PADDING +#define POLARSSL_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED +#define POLARSSL_ERR_CTR_DRBG_FILE_IO_ERROR MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR +#define POLARSSL_ERR_CTR_DRBG_INPUT_TOO_BIG MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG +#define POLARSSL_ERR_CTR_DRBG_REQUEST_TOO_BIG MBEDTLS_ERR_CTR_DRBG_REQUEST_TOO_BIG +#define POLARSSL_ERR_DES_INVALID_INPUT_LENGTH MBEDTLS_ERR_DES_INVALID_INPUT_LENGTH +#define POLARSSL_ERR_DHM_BAD_INPUT_DATA MBEDTLS_ERR_DHM_BAD_INPUT_DATA +#define POLARSSL_ERR_DHM_CALC_SECRET_FAILED MBEDTLS_ERR_DHM_CALC_SECRET_FAILED +#define POLARSSL_ERR_DHM_FILE_IO_ERROR MBEDTLS_ERR_DHM_FILE_IO_ERROR +#define POLARSSL_ERR_DHM_INVALID_FORMAT MBEDTLS_ERR_DHM_INVALID_FORMAT +#define POLARSSL_ERR_DHM_MAKE_PARAMS_FAILED MBEDTLS_ERR_DHM_MAKE_PARAMS_FAILED +#define POLARSSL_ERR_DHM_MAKE_PUBLIC_FAILED MBEDTLS_ERR_DHM_MAKE_PUBLIC_FAILED +#define POLARSSL_ERR_DHM_MALLOC_FAILED MBEDTLS_ERR_DHM_ALLOC_FAILED +#define POLARSSL_ERR_DHM_READ_PARAMS_FAILED MBEDTLS_ERR_DHM_READ_PARAMS_FAILED +#define POLARSSL_ERR_DHM_READ_PUBLIC_FAILED MBEDTLS_ERR_DHM_READ_PUBLIC_FAILED +#define POLARSSL_ERR_ECP_BAD_INPUT_DATA MBEDTLS_ERR_ECP_BAD_INPUT_DATA +#define POLARSSL_ERR_ECP_BUFFER_TOO_SMALL MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL +#define POLARSSL_ERR_ECP_FEATURE_UNAVAILABLE MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE +#define POLARSSL_ERR_ECP_INVALID_KEY MBEDTLS_ERR_ECP_INVALID_KEY +#define POLARSSL_ERR_ECP_MALLOC_FAILED MBEDTLS_ERR_ECP_ALLOC_FAILED +#define POLARSSL_ERR_ECP_RANDOM_FAILED MBEDTLS_ERR_ECP_RANDOM_FAILED +#define POLARSSL_ERR_ECP_SIG_LEN_MISMATCH MBEDTLS_ERR_ECP_SIG_LEN_MISMATCH +#define POLARSSL_ERR_ECP_VERIFY_FAILED MBEDTLS_ERR_ECP_VERIFY_FAILED +#define POLARSSL_ERR_ENTROPY_FILE_IO_ERROR MBEDTLS_ERR_ENTROPY_FILE_IO_ERROR +#define POLARSSL_ERR_ENTROPY_MAX_SOURCES MBEDTLS_ERR_ENTROPY_MAX_SOURCES +#define POLARSSL_ERR_ENTROPY_NO_SOURCES_DEFINED MBEDTLS_ERR_ENTROPY_NO_SOURCES_DEFINED +#define POLARSSL_ERR_ENTROPY_SOURCE_FAILED MBEDTLS_ERR_ENTROPY_SOURCE_FAILED +#define POLARSSL_ERR_GCM_AUTH_FAILED MBEDTLS_ERR_GCM_AUTH_FAILED +#define POLARSSL_ERR_GCM_BAD_INPUT MBEDTLS_ERR_GCM_BAD_INPUT +#define POLARSSL_ERR_HMAC_DRBG_ENTROPY_SOURCE_FAILED MBEDTLS_ERR_HMAC_DRBG_ENTROPY_SOURCE_FAILED +#define POLARSSL_ERR_HMAC_DRBG_FILE_IO_ERROR MBEDTLS_ERR_HMAC_DRBG_FILE_IO_ERROR +#define POLARSSL_ERR_HMAC_DRBG_INPUT_TOO_BIG MBEDTLS_ERR_HMAC_DRBG_INPUT_TOO_BIG +#define POLARSSL_ERR_HMAC_DRBG_REQUEST_TOO_BIG MBEDTLS_ERR_HMAC_DRBG_REQUEST_TOO_BIG +#define POLARSSL_ERR_MD_ALLOC_FAILED MBEDTLS_ERR_MD_ALLOC_FAILED +#define POLARSSL_ERR_MD_BAD_INPUT_DATA MBEDTLS_ERR_MD_BAD_INPUT_DATA +#define POLARSSL_ERR_MD_FEATURE_UNAVAILABLE MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE +#define POLARSSL_ERR_MD_FILE_IO_ERROR MBEDTLS_ERR_MD_FILE_IO_ERROR +#define POLARSSL_ERR_MPI_BAD_INPUT_DATA MBEDTLS_ERR_MPI_BAD_INPUT_DATA +#define POLARSSL_ERR_MPI_BUFFER_TOO_SMALL MBEDTLS_ERR_MPI_BUFFER_TOO_SMALL +#define POLARSSL_ERR_MPI_DIVISION_BY_ZERO MBEDTLS_ERR_MPI_DIVISION_BY_ZERO +#define POLARSSL_ERR_MPI_FILE_IO_ERROR MBEDTLS_ERR_MPI_FILE_IO_ERROR +#define POLARSSL_ERR_MPI_INVALID_CHARACTER MBEDTLS_ERR_MPI_INVALID_CHARACTER +#define POLARSSL_ERR_MPI_MALLOC_FAILED MBEDTLS_ERR_MPI_ALLOC_FAILED +#define POLARSSL_ERR_MPI_NEGATIVE_VALUE MBEDTLS_ERR_MPI_NEGATIVE_VALUE +#define POLARSSL_ERR_MPI_NOT_ACCEPTABLE MBEDTLS_ERR_MPI_NOT_ACCEPTABLE +#define POLARSSL_ERR_NET_ACCEPT_FAILED MBEDTLS_ERR_NET_ACCEPT_FAILED +#define POLARSSL_ERR_NET_BIND_FAILED MBEDTLS_ERR_NET_BIND_FAILED +#define POLARSSL_ERR_NET_CONNECT_FAILED MBEDTLS_ERR_NET_CONNECT_FAILED +#define POLARSSL_ERR_NET_CONN_RESET MBEDTLS_ERR_NET_CONN_RESET +#define POLARSSL_ERR_NET_LISTEN_FAILED MBEDTLS_ERR_NET_LISTEN_FAILED +#define POLARSSL_ERR_NET_RECV_FAILED MBEDTLS_ERR_NET_RECV_FAILED +#define POLARSSL_ERR_NET_SEND_FAILED MBEDTLS_ERR_NET_SEND_FAILED +#define POLARSSL_ERR_NET_SOCKET_FAILED MBEDTLS_ERR_NET_SOCKET_FAILED +#define POLARSSL_ERR_NET_TIMEOUT MBEDTLS_ERR_SSL_TIMEOUT +#define POLARSSL_ERR_NET_UNKNOWN_HOST MBEDTLS_ERR_NET_UNKNOWN_HOST +#define POLARSSL_ERR_NET_WANT_READ MBEDTLS_ERR_SSL_WANT_READ +#define POLARSSL_ERR_NET_WANT_WRITE MBEDTLS_ERR_SSL_WANT_WRITE +#define POLARSSL_ERR_OID_BUF_TOO_SMALL MBEDTLS_ERR_OID_BUF_TOO_SMALL +#define POLARSSL_ERR_OID_NOT_FOUND MBEDTLS_ERR_OID_NOT_FOUND +#define POLARSSL_ERR_PADLOCK_DATA_MISALIGNED MBEDTLS_ERR_PADLOCK_DATA_MISALIGNED +#define POLARSSL_ERR_PEM_BAD_INPUT_DATA MBEDTLS_ERR_PEM_BAD_INPUT_DATA +#define POLARSSL_ERR_PEM_FEATURE_UNAVAILABLE MBEDTLS_ERR_PEM_FEATURE_UNAVAILABLE +#define POLARSSL_ERR_PEM_INVALID_DATA MBEDTLS_ERR_PEM_INVALID_DATA +#define POLARSSL_ERR_PEM_INVALID_ENC_IV MBEDTLS_ERR_PEM_INVALID_ENC_IV +#define POLARSSL_ERR_PEM_MALLOC_FAILED MBEDTLS_ERR_PEM_ALLOC_FAILED +#define POLARSSL_ERR_PEM_NO_HEADER_FOOTER_PRESENT MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT +#define POLARSSL_ERR_PEM_PASSWORD_MISMATCH MBEDTLS_ERR_PEM_PASSWORD_MISMATCH +#define POLARSSL_ERR_PEM_PASSWORD_REQUIRED MBEDTLS_ERR_PEM_PASSWORD_REQUIRED +#define POLARSSL_ERR_PEM_UNKNOWN_ENC_ALG MBEDTLS_ERR_PEM_UNKNOWN_ENC_ALG +#define POLARSSL_ERR_PKCS12_BAD_INPUT_DATA MBEDTLS_ERR_PKCS12_BAD_INPUT_DATA +#define POLARSSL_ERR_PKCS12_FEATURE_UNAVAILABLE MBEDTLS_ERR_PKCS12_FEATURE_UNAVAILABLE +#define POLARSSL_ERR_PKCS12_PASSWORD_MISMATCH MBEDTLS_ERR_PKCS12_PASSWORD_MISMATCH +#define POLARSSL_ERR_PKCS12_PBE_INVALID_FORMAT MBEDTLS_ERR_PKCS12_PBE_INVALID_FORMAT +#define POLARSSL_ERR_PKCS5_BAD_INPUT_DATA MBEDTLS_ERR_PKCS5_BAD_INPUT_DATA +#define POLARSSL_ERR_PKCS5_FEATURE_UNAVAILABLE MBEDTLS_ERR_PKCS5_FEATURE_UNAVAILABLE +#define POLARSSL_ERR_PKCS5_INVALID_FORMAT MBEDTLS_ERR_PKCS5_INVALID_FORMAT +#define POLARSSL_ERR_PKCS5_PASSWORD_MISMATCH MBEDTLS_ERR_PKCS5_PASSWORD_MISMATCH +#define POLARSSL_ERR_PK_BAD_INPUT_DATA MBEDTLS_ERR_PK_BAD_INPUT_DATA +#define POLARSSL_ERR_PK_FEATURE_UNAVAILABLE MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE +#define POLARSSL_ERR_PK_FILE_IO_ERROR MBEDTLS_ERR_PK_FILE_IO_ERROR +#define POLARSSL_ERR_PK_INVALID_ALG MBEDTLS_ERR_PK_INVALID_ALG +#define POLARSSL_ERR_PK_INVALID_PUBKEY MBEDTLS_ERR_PK_INVALID_PUBKEY +#define POLARSSL_ERR_PK_KEY_INVALID_FORMAT MBEDTLS_ERR_PK_KEY_INVALID_FORMAT +#define POLARSSL_ERR_PK_KEY_INVALID_VERSION MBEDTLS_ERR_PK_KEY_INVALID_VERSION +#define POLARSSL_ERR_PK_MALLOC_FAILED MBEDTLS_ERR_PK_ALLOC_FAILED +#define POLARSSL_ERR_PK_PASSWORD_MISMATCH MBEDTLS_ERR_PK_PASSWORD_MISMATCH +#define POLARSSL_ERR_PK_PASSWORD_REQUIRED MBEDTLS_ERR_PK_PASSWORD_REQUIRED +#define POLARSSL_ERR_PK_SIG_LEN_MISMATCH MBEDTLS_ERR_PK_SIG_LEN_MISMATCH +#define POLARSSL_ERR_PK_TYPE_MISMATCH MBEDTLS_ERR_PK_TYPE_MISMATCH +#define POLARSSL_ERR_PK_UNKNOWN_NAMED_CURVE MBEDTLS_ERR_PK_UNKNOWN_NAMED_CURVE +#define POLARSSL_ERR_PK_UNKNOWN_PK_ALG MBEDTLS_ERR_PK_UNKNOWN_PK_ALG +#define POLARSSL_ERR_RSA_BAD_INPUT_DATA MBEDTLS_ERR_RSA_BAD_INPUT_DATA +#define POLARSSL_ERR_RSA_INVALID_PADDING MBEDTLS_ERR_RSA_INVALID_PADDING +#define POLARSSL_ERR_RSA_KEY_CHECK_FAILED MBEDTLS_ERR_RSA_KEY_CHECK_FAILED +#define POLARSSL_ERR_RSA_KEY_GEN_FAILED MBEDTLS_ERR_RSA_KEY_GEN_FAILED +#define POLARSSL_ERR_RSA_OUTPUT_TOO_LARGE MBEDTLS_ERR_RSA_OUTPUT_TOO_LARGE +#define POLARSSL_ERR_RSA_PRIVATE_FAILED MBEDTLS_ERR_RSA_PRIVATE_FAILED +#define POLARSSL_ERR_RSA_PUBLIC_FAILED MBEDTLS_ERR_RSA_PUBLIC_FAILED +#define POLARSSL_ERR_RSA_RNG_FAILED MBEDTLS_ERR_RSA_RNG_FAILED +#define POLARSSL_ERR_RSA_VERIFY_FAILED MBEDTLS_ERR_RSA_VERIFY_FAILED +#define POLARSSL_ERR_SSL_BAD_HS_CERTIFICATE MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE +#define POLARSSL_ERR_SSL_BAD_HS_CERTIFICATE_REQUEST MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_REQUEST +#define POLARSSL_ERR_SSL_BAD_HS_CERTIFICATE_VERIFY MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_VERIFY +#define POLARSSL_ERR_SSL_BAD_HS_CHANGE_CIPHER_SPEC MBEDTLS_ERR_SSL_BAD_HS_CHANGE_CIPHER_SPEC +#define POLARSSL_ERR_SSL_BAD_HS_CLIENT_HELLO MBEDTLS_ERR_SSL_BAD_HS_CLIENT_HELLO +#define POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE +#define POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_CS MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_CS +#define POLARSSL_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_RP MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_RP +#define POLARSSL_ERR_SSL_BAD_HS_FINISHED MBEDTLS_ERR_SSL_BAD_HS_FINISHED +#define POLARSSL_ERR_SSL_BAD_HS_NEW_SESSION_TICKET MBEDTLS_ERR_SSL_BAD_HS_NEW_SESSION_TICKET +#define POLARSSL_ERR_SSL_BAD_HS_PROTOCOL_VERSION MBEDTLS_ERR_SSL_BAD_HS_PROTOCOL_VERSION +#define POLARSSL_ERR_SSL_BAD_HS_SERVER_HELLO MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO +#define POLARSSL_ERR_SSL_BAD_HS_SERVER_HELLO_DONE MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO_DONE +#define POLARSSL_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE +#define POLARSSL_ERR_SSL_BAD_INPUT_DATA MBEDTLS_ERR_SSL_BAD_INPUT_DATA +#define POLARSSL_ERR_SSL_BUFFER_TOO_SMALL MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL +#define POLARSSL_ERR_SSL_CA_CHAIN_REQUIRED MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED +#define POLARSSL_ERR_SSL_CERTIFICATE_REQUIRED MBEDTLS_ERR_SSL_CERTIFICATE_REQUIRED +#define POLARSSL_ERR_SSL_CERTIFICATE_TOO_LARGE MBEDTLS_ERR_SSL_CERTIFICATE_TOO_LARGE +#define POLARSSL_ERR_SSL_COMPRESSION_FAILED MBEDTLS_ERR_SSL_COMPRESSION_FAILED +#define POLARSSL_ERR_SSL_CONN_EOF MBEDTLS_ERR_SSL_CONN_EOF +#define POLARSSL_ERR_SSL_COUNTER_WRAPPING MBEDTLS_ERR_SSL_COUNTER_WRAPPING +#define POLARSSL_ERR_SSL_FATAL_ALERT_MESSAGE MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE +#define POLARSSL_ERR_SSL_FEATURE_UNAVAILABLE MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE +#define POLARSSL_ERR_SSL_HELLO_VERIFY_REQUIRED MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED +#define POLARSSL_ERR_SSL_HW_ACCEL_FAILED MBEDTLS_ERR_SSL_HW_ACCEL_FAILED +#define POLARSSL_ERR_SSL_HW_ACCEL_FALLTHROUGH MBEDTLS_ERR_SSL_HW_ACCEL_FALLTHROUGH +#define POLARSSL_ERR_SSL_INTERNAL_ERROR MBEDTLS_ERR_SSL_INTERNAL_ERROR +#define POLARSSL_ERR_SSL_INVALID_MAC MBEDTLS_ERR_SSL_INVALID_MAC +#define POLARSSL_ERR_SSL_INVALID_RECORD MBEDTLS_ERR_SSL_INVALID_RECORD +#define POLARSSL_ERR_SSL_MALLOC_FAILED MBEDTLS_ERR_SSL_ALLOC_FAILED +#define POLARSSL_ERR_SSL_NO_CIPHER_CHOSEN MBEDTLS_ERR_SSL_NO_CIPHER_CHOSEN +#define POLARSSL_ERR_SSL_NO_CLIENT_CERTIFICATE MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE +#define POLARSSL_ERR_SSL_NO_RNG MBEDTLS_ERR_SSL_NO_RNG +#define POLARSSL_ERR_SSL_NO_USABLE_CIPHERSUITE MBEDTLS_ERR_SSL_NO_USABLE_CIPHERSUITE +#define POLARSSL_ERR_SSL_PEER_CLOSE_NOTIFY MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY +#define POLARSSL_ERR_SSL_PEER_VERIFY_FAILED MBEDTLS_ERR_SSL_PEER_VERIFY_FAILED +#define POLARSSL_ERR_SSL_PK_TYPE_MISMATCH MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH +#define POLARSSL_ERR_SSL_PRIVATE_KEY_REQUIRED MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED +#define POLARSSL_ERR_SSL_SESSION_TICKET_EXPIRED MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED +#define POLARSSL_ERR_SSL_UNEXPECTED_MESSAGE MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE +#define POLARSSL_ERR_SSL_UNKNOWN_CIPHER MBEDTLS_ERR_SSL_UNKNOWN_CIPHER +#define POLARSSL_ERR_SSL_UNKNOWN_IDENTITY MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY +#define POLARSSL_ERR_SSL_WAITING_SERVER_HELLO_RENEGO MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO +#define POLARSSL_ERR_THREADING_BAD_INPUT_DATA MBEDTLS_ERR_THREADING_BAD_INPUT_DATA +#define POLARSSL_ERR_THREADING_FEATURE_UNAVAILABLE MBEDTLS_ERR_THREADING_FEATURE_UNAVAILABLE +#define POLARSSL_ERR_THREADING_MUTEX_ERROR MBEDTLS_ERR_THREADING_MUTEX_ERROR +#define POLARSSL_ERR_X509_BAD_INPUT_DATA MBEDTLS_ERR_X509_BAD_INPUT_DATA +#define POLARSSL_ERR_X509_CERT_UNKNOWN_FORMAT MBEDTLS_ERR_X509_CERT_UNKNOWN_FORMAT +#define POLARSSL_ERR_X509_CERT_VERIFY_FAILED MBEDTLS_ERR_X509_CERT_VERIFY_FAILED +#define POLARSSL_ERR_X509_FEATURE_UNAVAILABLE MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE +#define POLARSSL_ERR_X509_FILE_IO_ERROR MBEDTLS_ERR_X509_FILE_IO_ERROR +#define POLARSSL_ERR_X509_INVALID_ALG MBEDTLS_ERR_X509_INVALID_ALG +#define POLARSSL_ERR_X509_INVALID_DATE MBEDTLS_ERR_X509_INVALID_DATE +#define POLARSSL_ERR_X509_INVALID_EXTENSIONS MBEDTLS_ERR_X509_INVALID_EXTENSIONS +#define POLARSSL_ERR_X509_INVALID_FORMAT MBEDTLS_ERR_X509_INVALID_FORMAT +#define POLARSSL_ERR_X509_INVALID_NAME MBEDTLS_ERR_X509_INVALID_NAME +#define POLARSSL_ERR_X509_INVALID_SERIAL MBEDTLS_ERR_X509_INVALID_SERIAL +#define POLARSSL_ERR_X509_INVALID_SIGNATURE MBEDTLS_ERR_X509_INVALID_SIGNATURE +#define POLARSSL_ERR_X509_INVALID_VERSION MBEDTLS_ERR_X509_INVALID_VERSION +#define POLARSSL_ERR_X509_MALLOC_FAILED MBEDTLS_ERR_X509_ALLOC_FAILED +#define POLARSSL_ERR_X509_SIG_MISMATCH MBEDTLS_ERR_X509_SIG_MISMATCH +#define POLARSSL_ERR_X509_UNKNOWN_OID MBEDTLS_ERR_X509_UNKNOWN_OID +#define POLARSSL_ERR_X509_UNKNOWN_SIG_ALG MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG +#define POLARSSL_ERR_X509_UNKNOWN_VERSION MBEDTLS_ERR_X509_UNKNOWN_VERSION +#define POLARSSL_ERR_XTEA_INVALID_INPUT_LENGTH MBEDTLS_ERR_XTEA_INVALID_INPUT_LENGTH +#define POLARSSL_GCM_H MBEDTLS_GCM_H +#define POLARSSL_HAVEGE_H MBEDTLS_HAVEGE_H +#define POLARSSL_HAVE_INT32 MBEDTLS_HAVE_INT32 +#define POLARSSL_HAVE_INT64 MBEDTLS_HAVE_INT64 +#define POLARSSL_HAVE_UDBL MBEDTLS_HAVE_UDBL +#define POLARSSL_HAVE_X86 MBEDTLS_HAVE_X86 +#define POLARSSL_HAVE_X86_64 MBEDTLS_HAVE_X86_64 +#define POLARSSL_HMAC_DRBG_H MBEDTLS_HMAC_DRBG_H +#define POLARSSL_HMAC_DRBG_PR_OFF MBEDTLS_HMAC_DRBG_PR_OFF +#define POLARSSL_HMAC_DRBG_PR_ON MBEDTLS_HMAC_DRBG_PR_ON +#define POLARSSL_KEY_EXCHANGE_DHE_PSK MBEDTLS_KEY_EXCHANGE_DHE_PSK +#define POLARSSL_KEY_EXCHANGE_DHE_RSA MBEDTLS_KEY_EXCHANGE_DHE_RSA +#define POLARSSL_KEY_EXCHANGE_ECDHE_ECDSA MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA +#define POLARSSL_KEY_EXCHANGE_ECDHE_PSK MBEDTLS_KEY_EXCHANGE_ECDHE_PSK +#define POLARSSL_KEY_EXCHANGE_ECDHE_RSA MBEDTLS_KEY_EXCHANGE_ECDHE_RSA +#define POLARSSL_KEY_EXCHANGE_ECDH_ECDSA MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA +#define POLARSSL_KEY_EXCHANGE_ECDH_RSA MBEDTLS_KEY_EXCHANGE_ECDH_RSA +#define POLARSSL_KEY_EXCHANGE_NONE MBEDTLS_KEY_EXCHANGE_NONE +#define POLARSSL_KEY_EXCHANGE_PSK MBEDTLS_KEY_EXCHANGE_PSK +#define POLARSSL_KEY_EXCHANGE_RSA MBEDTLS_KEY_EXCHANGE_RSA +#define POLARSSL_KEY_EXCHANGE_RSA_PSK MBEDTLS_KEY_EXCHANGE_RSA_PSK +#define POLARSSL_KEY_EXCHANGE__SOME__ECDHE_ENABLED MBEDTLS_KEY_EXCHANGE__SOME__ECDHE_ENABLED +#define POLARSSL_KEY_EXCHANGE__SOME__PSK_ENABLED MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED +#define POLARSSL_KEY_EXCHANGE__WITH_CERT__ENABLED MBEDTLS_KEY_EXCHANGE__WITH_CERT__ENABLED +#define POLARSSL_KEY_LENGTH_DES MBEDTLS_KEY_LENGTH_DES +#define POLARSSL_KEY_LENGTH_DES_EDE MBEDTLS_KEY_LENGTH_DES_EDE +#define POLARSSL_KEY_LENGTH_DES_EDE3 MBEDTLS_KEY_LENGTH_DES_EDE3 +#define POLARSSL_KEY_LENGTH_NONE MBEDTLS_KEY_LENGTH_NONE +#define POLARSSL_MAX_BLOCK_LENGTH MBEDTLS_MAX_BLOCK_LENGTH +#define POLARSSL_MAX_IV_LENGTH MBEDTLS_MAX_IV_LENGTH +#define POLARSSL_MD2_H MBEDTLS_MD2_H +#define POLARSSL_MD4_H MBEDTLS_MD4_H +#define POLARSSL_MD5_H MBEDTLS_MD5_H +#define POLARSSL_MD_H MBEDTLS_MD_H +#define POLARSSL_MD_MAX_SIZE MBEDTLS_MD_MAX_SIZE +#define POLARSSL_MD_MD2 MBEDTLS_MD_MD2 +#define POLARSSL_MD_MD4 MBEDTLS_MD_MD4 +#define POLARSSL_MD_MD5 MBEDTLS_MD_MD5 +#define POLARSSL_MD_NONE MBEDTLS_MD_NONE +#define POLARSSL_MD_RIPEMD160 MBEDTLS_MD_RIPEMD160 +#define POLARSSL_MD_SHA1 MBEDTLS_MD_SHA1 +#define POLARSSL_MD_SHA224 MBEDTLS_MD_SHA224 +#define POLARSSL_MD_SHA256 MBEDTLS_MD_SHA256 +#define POLARSSL_MD_SHA384 MBEDTLS_MD_SHA384 +#define POLARSSL_MD_SHA512 MBEDTLS_MD_SHA512 +#define POLARSSL_MD_WRAP_H MBEDTLS_MD_WRAP_H +#define POLARSSL_MEMORY_BUFFER_ALLOC_H MBEDTLS_MEMORY_BUFFER_ALLOC_H +#define POLARSSL_MODE_CBC MBEDTLS_MODE_CBC +#define POLARSSL_MODE_CCM MBEDTLS_MODE_CCM +#define POLARSSL_MODE_CFB MBEDTLS_MODE_CFB +#define POLARSSL_MODE_CTR MBEDTLS_MODE_CTR +#define POLARSSL_MODE_ECB MBEDTLS_MODE_ECB +#define POLARSSL_MODE_GCM MBEDTLS_MODE_GCM +#define POLARSSL_MODE_NONE MBEDTLS_MODE_NONE +#define POLARSSL_MODE_OFB MBEDTLS_MODE_OFB +#define POLARSSL_MODE_STREAM MBEDTLS_MODE_STREAM +#define POLARSSL_MPI_MAX_BITS MBEDTLS_MPI_MAX_BITS +#define POLARSSL_MPI_MAX_BITS_SCALE100 MBEDTLS_MPI_MAX_BITS_SCALE100 +#define POLARSSL_MPI_MAX_LIMBS MBEDTLS_MPI_MAX_LIMBS +#define POLARSSL_MPI_RW_BUFFER_SIZE MBEDTLS_MPI_RW_BUFFER_SIZE +#define POLARSSL_NET_H MBEDTLS_NET_SOCKETS_H +#define POLARSSL_NET_LISTEN_BACKLOG MBEDTLS_NET_LISTEN_BACKLOG +#define POLARSSL_OID_H MBEDTLS_OID_H +#define POLARSSL_OPERATION_NONE MBEDTLS_OPERATION_NONE +#define POLARSSL_PADDING_NONE MBEDTLS_PADDING_NONE +#define POLARSSL_PADDING_ONE_AND_ZEROS MBEDTLS_PADDING_ONE_AND_ZEROS +#define POLARSSL_PADDING_PKCS7 MBEDTLS_PADDING_PKCS7 +#define POLARSSL_PADDING_ZEROS MBEDTLS_PADDING_ZEROS +#define POLARSSL_PADDING_ZEROS_AND_LEN MBEDTLS_PADDING_ZEROS_AND_LEN +#define POLARSSL_PADLOCK_H MBEDTLS_PADLOCK_H +#define POLARSSL_PEM_H MBEDTLS_PEM_H +#define POLARSSL_PKCS11_H MBEDTLS_PKCS11_H +#define POLARSSL_PKCS12_H MBEDTLS_PKCS12_H +#define POLARSSL_PKCS5_H MBEDTLS_PKCS5_H +#define POLARSSL_PK_DEBUG_ECP MBEDTLS_PK_DEBUG_ECP +#define POLARSSL_PK_DEBUG_MAX_ITEMS MBEDTLS_PK_DEBUG_MAX_ITEMS +#define POLARSSL_PK_DEBUG_MPI MBEDTLS_PK_DEBUG_MPI +#define POLARSSL_PK_DEBUG_NONE MBEDTLS_PK_DEBUG_NONE +#define POLARSSL_PK_ECDSA MBEDTLS_PK_ECDSA +#define POLARSSL_PK_ECKEY MBEDTLS_PK_ECKEY +#define POLARSSL_PK_ECKEY_DH MBEDTLS_PK_ECKEY_DH +#define POLARSSL_PK_H MBEDTLS_PK_H +#define POLARSSL_PK_NONE MBEDTLS_PK_NONE +#define POLARSSL_PK_RSA MBEDTLS_PK_RSA +#define POLARSSL_PK_RSASSA_PSS MBEDTLS_PK_RSASSA_PSS +#define POLARSSL_PK_RSA_ALT MBEDTLS_PK_RSA_ALT +#define POLARSSL_PK_WRAP_H MBEDTLS_PK_WRAP_H +#define POLARSSL_PLATFORM_H MBEDTLS_PLATFORM_H +#define POLARSSL_PREMASTER_SIZE MBEDTLS_PREMASTER_SIZE +#define POLARSSL_RIPEMD160_H MBEDTLS_RIPEMD160_H +#define POLARSSL_RSA_H MBEDTLS_RSA_H +#define POLARSSL_SHA1_H MBEDTLS_SHA1_H +#define POLARSSL_SHA256_H MBEDTLS_SHA256_H +#define POLARSSL_SHA512_H MBEDTLS_SHA512_H +#define POLARSSL_SSL_CACHE_H MBEDTLS_SSL_CACHE_H +#define POLARSSL_SSL_CIPHERSUITES_H MBEDTLS_SSL_CIPHERSUITES_H +#define POLARSSL_SSL_COOKIE_H MBEDTLS_SSL_COOKIE_H +#define POLARSSL_SSL_H MBEDTLS_SSL_H +#define POLARSSL_THREADING_H MBEDTLS_THREADING_H +#define POLARSSL_THREADING_IMPL MBEDTLS_THREADING_IMPL +#define POLARSSL_TIMING_H MBEDTLS_TIMING_H +#define POLARSSL_VERSION_H MBEDTLS_VERSION_H +#define POLARSSL_VERSION_MAJOR MBEDTLS_VERSION_MAJOR +#define POLARSSL_VERSION_MINOR MBEDTLS_VERSION_MINOR +#define POLARSSL_VERSION_NUMBER MBEDTLS_VERSION_NUMBER +#define POLARSSL_VERSION_PATCH MBEDTLS_VERSION_PATCH +#define POLARSSL_VERSION_STRING MBEDTLS_VERSION_STRING +#define POLARSSL_VERSION_STRING_FULL MBEDTLS_VERSION_STRING_FULL +#define POLARSSL_X509_CRL_H MBEDTLS_X509_CRL_H +#define POLARSSL_X509_CRT_H MBEDTLS_X509_CRT_H +#define POLARSSL_X509_CSR_H MBEDTLS_X509_CSR_H +#define POLARSSL_X509_H MBEDTLS_X509_H +#define POLARSSL_XTEA_H MBEDTLS_XTEA_H +#define RSA_CRYPT MBEDTLS_RSA_CRYPT +#define RSA_PKCS_V15 MBEDTLS_RSA_PKCS_V15 +#define RSA_PKCS_V21 MBEDTLS_RSA_PKCS_V21 +#define RSA_PRIVATE MBEDTLS_RSA_PRIVATE +#define RSA_PUBLIC MBEDTLS_RSA_PUBLIC +#define RSA_SALT_LEN_ANY MBEDTLS_RSA_SALT_LEN_ANY +#define RSA_SIGN MBEDTLS_RSA_SIGN +#define SSL_ALERT_LEVEL_FATAL MBEDTLS_SSL_ALERT_LEVEL_FATAL +#define SSL_ALERT_LEVEL_WARNING MBEDTLS_SSL_ALERT_LEVEL_WARNING +#define SSL_ALERT_MSG_ACCESS_DENIED MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED +#define SSL_ALERT_MSG_BAD_CERT MBEDTLS_SSL_ALERT_MSG_BAD_CERT +#define SSL_ALERT_MSG_BAD_RECORD_MAC MBEDTLS_SSL_ALERT_MSG_BAD_RECORD_MAC +#define SSL_ALERT_MSG_CERT_EXPIRED MBEDTLS_SSL_ALERT_MSG_CERT_EXPIRED +#define SSL_ALERT_MSG_CERT_REVOKED MBEDTLS_SSL_ALERT_MSG_CERT_REVOKED +#define SSL_ALERT_MSG_CERT_UNKNOWN MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN +#define SSL_ALERT_MSG_CLOSE_NOTIFY MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY +#define SSL_ALERT_MSG_DECODE_ERROR MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR +#define SSL_ALERT_MSG_DECOMPRESSION_FAILURE MBEDTLS_SSL_ALERT_MSG_DECOMPRESSION_FAILURE +#define SSL_ALERT_MSG_DECRYPTION_FAILED MBEDTLS_SSL_ALERT_MSG_DECRYPTION_FAILED +#define SSL_ALERT_MSG_DECRYPT_ERROR MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR +#define SSL_ALERT_MSG_EXPORT_RESTRICTION MBEDTLS_SSL_ALERT_MSG_EXPORT_RESTRICTION +#define SSL_ALERT_MSG_HANDSHAKE_FAILURE MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE +#define SSL_ALERT_MSG_ILLEGAL_PARAMETER MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER +#define SSL_ALERT_MSG_INAPROPRIATE_FALLBACK MBEDTLS_SSL_ALERT_MSG_INAPROPRIATE_FALLBACK +#define SSL_ALERT_MSG_INSUFFICIENT_SECURITY MBEDTLS_SSL_ALERT_MSG_INSUFFICIENT_SECURITY +#define SSL_ALERT_MSG_INTERNAL_ERROR MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR +#define SSL_ALERT_MSG_NO_APPLICATION_PROTOCOL MBEDTLS_SSL_ALERT_MSG_NO_APPLICATION_PROTOCOL +#define SSL_ALERT_MSG_NO_CERT MBEDTLS_SSL_ALERT_MSG_NO_CERT +#define SSL_ALERT_MSG_NO_RENEGOTIATION MBEDTLS_SSL_ALERT_MSG_NO_RENEGOTIATION +#define SSL_ALERT_MSG_PROTOCOL_VERSION MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION +#define SSL_ALERT_MSG_RECORD_OVERFLOW MBEDTLS_SSL_ALERT_MSG_RECORD_OVERFLOW +#define SSL_ALERT_MSG_UNEXPECTED_MESSAGE MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE +#define SSL_ALERT_MSG_UNKNOWN_CA MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA +#define SSL_ALERT_MSG_UNKNOWN_PSK_IDENTITY MBEDTLS_SSL_ALERT_MSG_UNKNOWN_PSK_IDENTITY +#define SSL_ALERT_MSG_UNRECOGNIZED_NAME MBEDTLS_SSL_ALERT_MSG_UNRECOGNIZED_NAME +#define SSL_ALERT_MSG_UNSUPPORTED_CERT MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT +#define SSL_ALERT_MSG_UNSUPPORTED_EXT MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT +#define SSL_ALERT_MSG_USER_CANCELED MBEDTLS_SSL_ALERT_MSG_USER_CANCELED +#define SSL_ANTI_REPLAY_DISABLED MBEDTLS_SSL_ANTI_REPLAY_DISABLED +#define SSL_ANTI_REPLAY_ENABLED MBEDTLS_SSL_ANTI_REPLAY_ENABLED +#define SSL_ARC4_DISABLED MBEDTLS_SSL_ARC4_DISABLED +#define SSL_ARC4_ENABLED MBEDTLS_SSL_ARC4_ENABLED +#define SSL_BUFFER_LEN MBEDTLS_SSL_BUFFER_LEN +#define SSL_CACHE_DEFAULT_MAX_ENTRIES MBEDTLS_SSL_CACHE_DEFAULT_MAX_ENTRIES +#define SSL_CACHE_DEFAULT_TIMEOUT MBEDTLS_SSL_CACHE_DEFAULT_TIMEOUT +#define SSL_CBC_RECORD_SPLITTING_DISABLED MBEDTLS_SSL_CBC_RECORD_SPLITTING_DISABLED +#define SSL_CBC_RECORD_SPLITTING_ENABLED MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED +#define SSL_CERTIFICATE_REQUEST MBEDTLS_SSL_CERTIFICATE_REQUEST +#define SSL_CERTIFICATE_VERIFY MBEDTLS_SSL_CERTIFICATE_VERIFY +#define SSL_CERT_TYPE_ECDSA_SIGN MBEDTLS_SSL_CERT_TYPE_ECDSA_SIGN +#define SSL_CERT_TYPE_RSA_SIGN MBEDTLS_SSL_CERT_TYPE_RSA_SIGN +#define SSL_CHANNEL_INBOUND MBEDTLS_SSL_CHANNEL_INBOUND +#define SSL_CHANNEL_OUTBOUND MBEDTLS_SSL_CHANNEL_OUTBOUND +#define SSL_CIPHERSUITES MBEDTLS_SSL_CIPHERSUITES +#define SSL_CLIENT_CERTIFICATE MBEDTLS_SSL_CLIENT_CERTIFICATE +#define SSL_CLIENT_CHANGE_CIPHER_SPEC MBEDTLS_SSL_CLIENT_CHANGE_CIPHER_SPEC +#define SSL_CLIENT_FINISHED MBEDTLS_SSL_CLIENT_FINISHED +#define SSL_CLIENT_HELLO MBEDTLS_SSL_CLIENT_HELLO +#define SSL_CLIENT_KEY_EXCHANGE MBEDTLS_SSL_CLIENT_KEY_EXCHANGE +#define SSL_COMPRESSION_ADD MBEDTLS_SSL_COMPRESSION_ADD +#define SSL_COMPRESS_DEFLATE MBEDTLS_SSL_COMPRESS_DEFLATE +#define SSL_COMPRESS_NULL MBEDTLS_SSL_COMPRESS_NULL +#define SSL_DEBUG_BUF MBEDTLS_SSL_DEBUG_BUF +#define SSL_DEBUG_CRT MBEDTLS_SSL_DEBUG_CRT +#define SSL_DEBUG_ECP MBEDTLS_SSL_DEBUG_ECP +#define SSL_DEBUG_MPI MBEDTLS_SSL_DEBUG_MPI +#define SSL_DEBUG_MSG MBEDTLS_SSL_DEBUG_MSG +#define SSL_DEBUG_RET MBEDTLS_SSL_DEBUG_RET +#define SSL_DEFAULT_TICKET_LIFETIME MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME +#define SSL_DTLS_TIMEOUT_DFL_MAX MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MAX +#define SSL_DTLS_TIMEOUT_DFL_MIN MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MIN +#define SSL_EMPTY_RENEGOTIATION_INFO MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO +#define SSL_ETM_DISABLED MBEDTLS_SSL_ETM_DISABLED +#define SSL_ETM_ENABLED MBEDTLS_SSL_ETM_ENABLED +#define SSL_EXTENDED_MS_DISABLED MBEDTLS_SSL_EXTENDED_MS_DISABLED +#define SSL_EXTENDED_MS_ENABLED MBEDTLS_SSL_EXTENDED_MS_ENABLED +#define SSL_FALLBACK_SCSV MBEDTLS_SSL_FALLBACK_SCSV +#define SSL_FLUSH_BUFFERS MBEDTLS_SSL_FLUSH_BUFFERS +#define SSL_HANDSHAKE_OVER MBEDTLS_SSL_HANDSHAKE_OVER +#define SSL_HANDSHAKE_WRAPUP MBEDTLS_SSL_HANDSHAKE_WRAPUP +#define SSL_HASH_MD5 MBEDTLS_SSL_HASH_MD5 +#define SSL_HASH_NONE MBEDTLS_SSL_HASH_NONE +#define SSL_HASH_SHA1 MBEDTLS_SSL_HASH_SHA1 +#define SSL_HASH_SHA224 MBEDTLS_SSL_HASH_SHA224 +#define SSL_HASH_SHA256 MBEDTLS_SSL_HASH_SHA256 +#define SSL_HASH_SHA384 MBEDTLS_SSL_HASH_SHA384 +#define SSL_HASH_SHA512 MBEDTLS_SSL_HASH_SHA512 +#define SSL_HELLO_REQUEST MBEDTLS_SSL_HELLO_REQUEST +#define SSL_HS_CERTIFICATE MBEDTLS_SSL_HS_CERTIFICATE +#define SSL_HS_CERTIFICATE_REQUEST MBEDTLS_SSL_HS_CERTIFICATE_REQUEST +#define SSL_HS_CERTIFICATE_VERIFY MBEDTLS_SSL_HS_CERTIFICATE_VERIFY +#define SSL_HS_CLIENT_HELLO MBEDTLS_SSL_HS_CLIENT_HELLO +#define SSL_HS_CLIENT_KEY_EXCHANGE MBEDTLS_SSL_HS_CLIENT_KEY_EXCHANGE +#define SSL_HS_FINISHED MBEDTLS_SSL_HS_FINISHED +#define SSL_HS_HELLO_REQUEST MBEDTLS_SSL_HS_HELLO_REQUEST +#define SSL_HS_HELLO_VERIFY_REQUEST MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST +#define SSL_HS_NEW_SESSION_TICKET MBEDTLS_SSL_HS_NEW_SESSION_TICKET +#define SSL_HS_SERVER_HELLO MBEDTLS_SSL_HS_SERVER_HELLO +#define SSL_HS_SERVER_HELLO_DONE MBEDTLS_SSL_HS_SERVER_HELLO_DONE +#define SSL_HS_SERVER_KEY_EXCHANGE MBEDTLS_SSL_HS_SERVER_KEY_EXCHANGE +#define SSL_INITIAL_HANDSHAKE MBEDTLS_SSL_INITIAL_HANDSHAKE +#define SSL_IS_CLIENT MBEDTLS_SSL_IS_CLIENT +#define SSL_IS_FALLBACK MBEDTLS_SSL_IS_FALLBACK +#define SSL_IS_NOT_FALLBACK MBEDTLS_SSL_IS_NOT_FALLBACK +#define SSL_IS_SERVER MBEDTLS_SSL_IS_SERVER +#define SSL_LEGACY_ALLOW_RENEGOTIATION MBEDTLS_SSL_LEGACY_ALLOW_RENEGOTIATION +#define SSL_LEGACY_BREAK_HANDSHAKE MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE +#define SSL_LEGACY_NO_RENEGOTIATION MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION +#define SSL_LEGACY_RENEGOTIATION MBEDTLS_SSL_LEGACY_RENEGOTIATION +#define SSL_MAC_ADD MBEDTLS_SSL_MAC_ADD +#define SSL_MAJOR_VERSION_3 MBEDTLS_SSL_MAJOR_VERSION_3 +#define SSL_MAX_CONTENT_LEN MBEDTLS_SSL_MAX_CONTENT_LEN +#define SSL_MAX_FRAG_LEN_1024 MBEDTLS_SSL_MAX_FRAG_LEN_1024 +#define SSL_MAX_FRAG_LEN_2048 MBEDTLS_SSL_MAX_FRAG_LEN_2048 +#define SSL_MAX_FRAG_LEN_4096 MBEDTLS_SSL_MAX_FRAG_LEN_4096 +#define SSL_MAX_FRAG_LEN_512 MBEDTLS_SSL_MAX_FRAG_LEN_512 +#define SSL_MAX_FRAG_LEN_INVALID MBEDTLS_SSL_MAX_FRAG_LEN_INVALID +#define SSL_MAX_FRAG_LEN_NONE MBEDTLS_SSL_MAX_FRAG_LEN_NONE +#define SSL_MAX_MAJOR_VERSION MBEDTLS_SSL_MAX_MAJOR_VERSION +#define SSL_MAX_MINOR_VERSION MBEDTLS_SSL_MAX_MINOR_VERSION +#define SSL_MINOR_VERSION_0 MBEDTLS_SSL_MINOR_VERSION_0 +#define SSL_MINOR_VERSION_1 MBEDTLS_SSL_MINOR_VERSION_1 +#define SSL_MINOR_VERSION_2 MBEDTLS_SSL_MINOR_VERSION_2 +#define SSL_MINOR_VERSION_3 MBEDTLS_SSL_MINOR_VERSION_3 +#define SSL_MIN_MAJOR_VERSION MBEDTLS_SSL_MIN_MAJOR_VERSION +#define SSL_MIN_MINOR_VERSION MBEDTLS_SSL_MIN_MINOR_VERSION +#define SSL_MSG_ALERT MBEDTLS_SSL_MSG_ALERT +#define SSL_MSG_APPLICATION_DATA MBEDTLS_SSL_MSG_APPLICATION_DATA +#define SSL_MSG_CHANGE_CIPHER_SPEC MBEDTLS_SSL_MSG_CHANGE_CIPHER_SPEC +#define SSL_MSG_HANDSHAKE MBEDTLS_SSL_MSG_HANDSHAKE +#define SSL_PADDING_ADD MBEDTLS_SSL_PADDING_ADD +#define SSL_RENEGOTIATION MBEDTLS_SSL_RENEGOTIATION +#define SSL_RENEGOTIATION_DISABLED MBEDTLS_SSL_RENEGOTIATION_DISABLED +#define SSL_RENEGOTIATION_DONE MBEDTLS_SSL_RENEGOTIATION_DONE +#define SSL_RENEGOTIATION_ENABLED MBEDTLS_SSL_RENEGOTIATION_ENABLED +#define SSL_RENEGOTIATION_NOT_ENFORCED MBEDTLS_SSL_RENEGOTIATION_NOT_ENFORCED +#define SSL_RENEGOTIATION_PENDING MBEDTLS_SSL_RENEGOTIATION_PENDING +#define SSL_RENEGO_MAX_RECORDS_DEFAULT MBEDTLS_SSL_RENEGO_MAX_RECORDS_DEFAULT +#define SSL_RETRANS_FINISHED MBEDTLS_SSL_RETRANS_FINISHED +#define SSL_RETRANS_PREPARING MBEDTLS_SSL_RETRANS_PREPARING +#define SSL_RETRANS_SENDING MBEDTLS_SSL_RETRANS_SENDING +#define SSL_RETRANS_WAITING MBEDTLS_SSL_RETRANS_WAITING +#define SSL_SECURE_RENEGOTIATION MBEDTLS_SSL_SECURE_RENEGOTIATION +#define SSL_SERVER_CERTIFICATE MBEDTLS_SSL_SERVER_CERTIFICATE +#define SSL_SERVER_CHANGE_CIPHER_SPEC MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC +#define SSL_SERVER_FINISHED MBEDTLS_SSL_SERVER_FINISHED +#define SSL_SERVER_HELLO MBEDTLS_SSL_SERVER_HELLO +#define SSL_SERVER_HELLO_DONE MBEDTLS_SSL_SERVER_HELLO_DONE +#define SSL_SERVER_HELLO_VERIFY_REQUEST_SENT MBEDTLS_SSL_SERVER_HELLO_VERIFY_REQUEST_SENT +#define SSL_SERVER_KEY_EXCHANGE MBEDTLS_SSL_SERVER_KEY_EXCHANGE +#define SSL_SERVER_NEW_SESSION_TICKET MBEDTLS_SSL_SERVER_NEW_SESSION_TICKET +#define SSL_SESSION_TICKETS_DISABLED MBEDTLS_SSL_SESSION_TICKETS_DISABLED +#define SSL_SESSION_TICKETS_ENABLED MBEDTLS_SSL_SESSION_TICKETS_ENABLED +#define SSL_SIG_ANON MBEDTLS_SSL_SIG_ANON +#define SSL_SIG_ECDSA MBEDTLS_SSL_SIG_ECDSA +#define SSL_SIG_RSA MBEDTLS_SSL_SIG_RSA +#define SSL_TRANSPORT_DATAGRAM MBEDTLS_SSL_TRANSPORT_DATAGRAM +#define SSL_TRANSPORT_STREAM MBEDTLS_SSL_TRANSPORT_STREAM +#define SSL_TRUNCATED_HMAC_LEN MBEDTLS_SSL_TRUNCATED_HMAC_LEN +#define SSL_TRUNC_HMAC_DISABLED MBEDTLS_SSL_TRUNC_HMAC_DISABLED +#define SSL_TRUNC_HMAC_ENABLED MBEDTLS_SSL_TRUNC_HMAC_ENABLED +#define SSL_VERIFY_DATA_MAX_LEN MBEDTLS_SSL_VERIFY_DATA_MAX_LEN +#define SSL_VERIFY_NONE MBEDTLS_SSL_VERIFY_NONE +#define SSL_VERIFY_OPTIONAL MBEDTLS_SSL_VERIFY_OPTIONAL +#define SSL_VERIFY_REQUIRED MBEDTLS_SSL_VERIFY_REQUIRED +#define TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA +#define TLS_DHE_PSK_WITH_AES_128_CBC_SHA MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA +#define TLS_DHE_PSK_WITH_AES_128_CBC_SHA256 MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256 +#define TLS_DHE_PSK_WITH_AES_128_CCM MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM +#define TLS_DHE_PSK_WITH_AES_128_CCM_8 MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM_8 +#define TLS_DHE_PSK_WITH_AES_128_GCM_SHA256 MBEDTLS_TLS_DHE_PSK_WITH_AES_128_GCM_SHA256 +#define TLS_DHE_PSK_WITH_AES_256_CBC_SHA MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA +#define TLS_DHE_PSK_WITH_AES_256_CBC_SHA384 MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384 +#define TLS_DHE_PSK_WITH_AES_256_CCM MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM +#define TLS_DHE_PSK_WITH_AES_256_CCM_8 MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM_8 +#define TLS_DHE_PSK_WITH_AES_256_GCM_SHA384 MBEDTLS_TLS_DHE_PSK_WITH_AES_256_GCM_SHA384 +#define TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 +#define TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256 MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256 +#define TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 +#define TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384 MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384 +#define TLS_DHE_PSK_WITH_NULL_SHA MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA +#define TLS_DHE_PSK_WITH_NULL_SHA256 MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA256 +#define TLS_DHE_PSK_WITH_NULL_SHA384 MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA384 +#define TLS_DHE_PSK_WITH_RC4_128_SHA MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA +#define TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA MBEDTLS_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA +#define TLS_DHE_RSA_WITH_AES_128_CBC_SHA MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA +#define TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 +#define TLS_DHE_RSA_WITH_AES_128_CCM MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM +#define TLS_DHE_RSA_WITH_AES_128_CCM_8 MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM_8 +#define TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 +#define TLS_DHE_RSA_WITH_AES_256_CBC_SHA MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA +#define TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 +#define TLS_DHE_RSA_WITH_AES_256_CCM MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM +#define TLS_DHE_RSA_WITH_AES_256_CCM_8 MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM_8 +#define TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 +#define TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA +#define TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 +#define TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 +#define TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA +#define TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 +#define TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 +#define TLS_DHE_RSA_WITH_DES_CBC_SHA MBEDTLS_TLS_DHE_RSA_WITH_DES_CBC_SHA +#define TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA +#define TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA +#define TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 +#define TLS_ECDHE_ECDSA_WITH_AES_128_CCM MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM +#define TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 +#define TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 +#define TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA +#define TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 +#define TLS_ECDHE_ECDSA_WITH_AES_256_CCM MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM +#define TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 +#define TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 +#define TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 +#define TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 +#define TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 +#define TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 +#define TLS_ECDHE_ECDSA_WITH_NULL_SHA MBEDTLS_TLS_ECDHE_ECDSA_WITH_NULL_SHA +#define TLS_ECDHE_ECDSA_WITH_RC4_128_SHA MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA +#define TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA +#define TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA +#define TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 +#define TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA +#define TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384 MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384 +#define TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 +#define TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 +#define TLS_ECDHE_PSK_WITH_NULL_SHA MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA +#define TLS_ECDHE_PSK_WITH_NULL_SHA256 MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA256 +#define TLS_ECDHE_PSK_WITH_NULL_SHA384 MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA384 +#define TLS_ECDHE_PSK_WITH_RC4_128_SHA MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA +#define TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA +#define TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA +#define TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 +#define TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 +#define TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA +#define TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 +#define TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 +#define TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 +#define TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 +#define TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 +#define TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 +#define TLS_ECDHE_RSA_WITH_NULL_SHA MBEDTLS_TLS_ECDHE_RSA_WITH_NULL_SHA +#define TLS_ECDHE_RSA_WITH_RC4_128_SHA MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA +#define TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA +#define TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA +#define TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 +#define TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 +#define TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA +#define TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 +#define TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 +#define TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 +#define TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 +#define TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 +#define TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 +#define TLS_ECDH_ECDSA_WITH_NULL_SHA MBEDTLS_TLS_ECDH_ECDSA_WITH_NULL_SHA +#define TLS_ECDH_ECDSA_WITH_RC4_128_SHA MBEDTLS_TLS_ECDH_ECDSA_WITH_RC4_128_SHA +#define TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA +#define TLS_ECDH_RSA_WITH_AES_128_CBC_SHA MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA +#define TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 +#define TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 +#define TLS_ECDH_RSA_WITH_AES_256_CBC_SHA MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA +#define TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 +#define TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 +#define TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 +#define TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256 MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256 +#define TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 +#define TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384 MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384 +#define TLS_ECDH_RSA_WITH_NULL_SHA MBEDTLS_TLS_ECDH_RSA_WITH_NULL_SHA +#define TLS_ECDH_RSA_WITH_RC4_128_SHA MBEDTLS_TLS_ECDH_RSA_WITH_RC4_128_SHA +#define TLS_EXT_ALPN MBEDTLS_TLS_EXT_ALPN +#define TLS_EXT_ENCRYPT_THEN_MAC MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC +#define TLS_EXT_EXTENDED_MASTER_SECRET MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET +#define TLS_EXT_MAX_FRAGMENT_LENGTH MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH +#define TLS_EXT_RENEGOTIATION_INFO MBEDTLS_TLS_EXT_RENEGOTIATION_INFO +#define TLS_EXT_SERVERNAME MBEDTLS_TLS_EXT_SERVERNAME +#define TLS_EXT_SERVERNAME_HOSTNAME MBEDTLS_TLS_EXT_SERVERNAME_HOSTNAME +#define TLS_EXT_SESSION_TICKET MBEDTLS_TLS_EXT_SESSION_TICKET +#define TLS_EXT_SIG_ALG MBEDTLS_TLS_EXT_SIG_ALG +#define TLS_EXT_SUPPORTED_ELLIPTIC_CURVES MBEDTLS_TLS_EXT_SUPPORTED_ELLIPTIC_CURVES +#define TLS_EXT_SUPPORTED_POINT_FORMATS MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS +#define TLS_EXT_SUPPORTED_POINT_FORMATS_PRESENT MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS_PRESENT +#define TLS_EXT_TRUNCATED_HMAC MBEDTLS_TLS_EXT_TRUNCATED_HMAC +#define TLS_PSK_WITH_3DES_EDE_CBC_SHA MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA +#define TLS_PSK_WITH_AES_128_CBC_SHA MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA +#define TLS_PSK_WITH_AES_128_CBC_SHA256 MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA256 +#define TLS_PSK_WITH_AES_128_CCM MBEDTLS_TLS_PSK_WITH_AES_128_CCM +#define TLS_PSK_WITH_AES_128_CCM_8 MBEDTLS_TLS_PSK_WITH_AES_128_CCM_8 +#define TLS_PSK_WITH_AES_128_GCM_SHA256 MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256 +#define TLS_PSK_WITH_AES_256_CBC_SHA MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA +#define TLS_PSK_WITH_AES_256_CBC_SHA384 MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA384 +#define TLS_PSK_WITH_AES_256_CCM MBEDTLS_TLS_PSK_WITH_AES_256_CCM +#define TLS_PSK_WITH_AES_256_CCM_8 MBEDTLS_TLS_PSK_WITH_AES_256_CCM_8 +#define TLS_PSK_WITH_AES_256_GCM_SHA384 MBEDTLS_TLS_PSK_WITH_AES_256_GCM_SHA384 +#define TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256 MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256 +#define TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256 MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256 +#define TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384 MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384 +#define TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384 MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384 +#define TLS_PSK_WITH_NULL_SHA MBEDTLS_TLS_PSK_WITH_NULL_SHA +#define TLS_PSK_WITH_NULL_SHA256 MBEDTLS_TLS_PSK_WITH_NULL_SHA256 +#define TLS_PSK_WITH_NULL_SHA384 MBEDTLS_TLS_PSK_WITH_NULL_SHA384 +#define TLS_PSK_WITH_RC4_128_SHA MBEDTLS_TLS_PSK_WITH_RC4_128_SHA +#define TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA +#define TLS_RSA_PSK_WITH_AES_128_CBC_SHA MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA +#define TLS_RSA_PSK_WITH_AES_128_CBC_SHA256 MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256 +#define TLS_RSA_PSK_WITH_AES_128_GCM_SHA256 MBEDTLS_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256 +#define TLS_RSA_PSK_WITH_AES_256_CBC_SHA MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA +#define TLS_RSA_PSK_WITH_AES_256_CBC_SHA384 MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384 +#define TLS_RSA_PSK_WITH_AES_256_GCM_SHA384 MBEDTLS_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384 +#define TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256 MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256 +#define TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256 MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256 +#define TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384 MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384 +#define TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384 MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384 +#define TLS_RSA_PSK_WITH_NULL_SHA MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA +#define TLS_RSA_PSK_WITH_NULL_SHA256 MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA256 +#define TLS_RSA_PSK_WITH_NULL_SHA384 MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA384 +#define TLS_RSA_PSK_WITH_RC4_128_SHA MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA +#define TLS_RSA_WITH_3DES_EDE_CBC_SHA MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA +#define TLS_RSA_WITH_AES_128_CBC_SHA MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA +#define TLS_RSA_WITH_AES_128_CBC_SHA256 MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 +#define TLS_RSA_WITH_AES_128_CCM MBEDTLS_TLS_RSA_WITH_AES_128_CCM +#define TLS_RSA_WITH_AES_128_CCM_8 MBEDTLS_TLS_RSA_WITH_AES_128_CCM_8 +#define TLS_RSA_WITH_AES_128_GCM_SHA256 MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 +#define TLS_RSA_WITH_AES_256_CBC_SHA MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA +#define TLS_RSA_WITH_AES_256_CBC_SHA256 MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 +#define TLS_RSA_WITH_AES_256_CCM MBEDTLS_TLS_RSA_WITH_AES_256_CCM +#define TLS_RSA_WITH_AES_256_CCM_8 MBEDTLS_TLS_RSA_WITH_AES_256_CCM_8 +#define TLS_RSA_WITH_AES_256_GCM_SHA384 MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 +#define TLS_RSA_WITH_CAMELLIA_128_CBC_SHA MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA +#define TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 +#define TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256 MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256 +#define TLS_RSA_WITH_CAMELLIA_256_CBC_SHA MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA +#define TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 +#define TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384 MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384 +#define TLS_RSA_WITH_DES_CBC_SHA MBEDTLS_TLS_RSA_WITH_DES_CBC_SHA +#define TLS_RSA_WITH_NULL_MD5 MBEDTLS_TLS_RSA_WITH_NULL_MD5 +#define TLS_RSA_WITH_NULL_SHA MBEDTLS_TLS_RSA_WITH_NULL_SHA +#define TLS_RSA_WITH_NULL_SHA256 MBEDTLS_TLS_RSA_WITH_NULL_SHA256 +#define TLS_RSA_WITH_RC4_128_MD5 MBEDTLS_TLS_RSA_WITH_RC4_128_MD5 +#define TLS_RSA_WITH_RC4_128_SHA MBEDTLS_TLS_RSA_WITH_RC4_128_SHA +#define X509_CRT_VERSION_1 MBEDTLS_X509_CRT_VERSION_1 +#define X509_CRT_VERSION_2 MBEDTLS_X509_CRT_VERSION_2 +#define X509_CRT_VERSION_3 MBEDTLS_X509_CRT_VERSION_3 +#define X509_FORMAT_DER MBEDTLS_X509_FORMAT_DER +#define X509_FORMAT_PEM MBEDTLS_X509_FORMAT_PEM +#define X509_MAX_DN_NAME_SIZE MBEDTLS_X509_MAX_DN_NAME_SIZE +#define X509_RFC5280_MAX_SERIAL_LEN MBEDTLS_X509_RFC5280_MAX_SERIAL_LEN +#define X509_RFC5280_UTC_TIME_LEN MBEDTLS_X509_RFC5280_UTC_TIME_LEN +#define XTEA_DECRYPT MBEDTLS_XTEA_DECRYPT +#define XTEA_ENCRYPT MBEDTLS_XTEA_ENCRYPT +#define _asn1_bitstring mbedtls_asn1_bitstring +#define _asn1_buf mbedtls_asn1_buf +#define _asn1_named_data mbedtls_asn1_named_data +#define _asn1_sequence mbedtls_asn1_sequence +#define _ssl_cache_context mbedtls_ssl_cache_context +#define _ssl_cache_entry mbedtls_ssl_cache_entry +#define _ssl_ciphersuite_t mbedtls_ssl_ciphersuite_t +#define _ssl_context mbedtls_ssl_context +#define _ssl_flight_item mbedtls_ssl_flight_item +#define _ssl_handshake_params mbedtls_ssl_handshake_params +#define _ssl_key_cert mbedtls_ssl_key_cert +#define _ssl_premaster_secret mbedtls_ssl_premaster_secret +#define _ssl_session mbedtls_ssl_session +#define _ssl_transform mbedtls_ssl_transform +#define _x509_crl mbedtls_x509_crl +#define _x509_crl_entry mbedtls_x509_crl_entry +#define _x509_crt mbedtls_x509_crt +#define _x509_csr mbedtls_x509_csr +#define _x509_time mbedtls_x509_time +#define _x509write_cert mbedtls_x509write_cert +#define _x509write_csr mbedtls_x509write_csr +#define aes_context mbedtls_aes_context +#define aes_crypt_cbc mbedtls_aes_crypt_cbc +#define aes_crypt_cfb128 mbedtls_aes_crypt_cfb128 +#define aes_crypt_cfb8 mbedtls_aes_crypt_cfb8 +#define aes_crypt_ctr mbedtls_aes_crypt_ctr +#define aes_crypt_ecb mbedtls_aes_crypt_ecb +#define aes_free mbedtls_aes_free +#define aes_init mbedtls_aes_init +#define aes_self_test mbedtls_aes_self_test +#define aes_setkey_dec mbedtls_aes_setkey_dec +#define aes_setkey_enc mbedtls_aes_setkey_enc +#define aesni_crypt_ecb mbedtls_aesni_crypt_ecb +#define aesni_gcm_mult mbedtls_aesni_gcm_mult +#define aesni_inverse_key mbedtls_aesni_inverse_key +#define aesni_setkey_enc mbedtls_aesni_setkey_enc +#define aesni_supports mbedtls_aesni_has_support +#define alarmed mbedtls_timing_alarmed +#define arc4_context mbedtls_arc4_context +#define arc4_crypt mbedtls_arc4_crypt +#define arc4_free mbedtls_arc4_free +#define arc4_init mbedtls_arc4_init +#define arc4_self_test mbedtls_arc4_self_test +#define arc4_setup mbedtls_arc4_setup +#define asn1_bitstring mbedtls_asn1_bitstring +#define asn1_buf mbedtls_asn1_buf +#define asn1_find_named_data mbedtls_asn1_find_named_data +#define asn1_free_named_data mbedtls_asn1_free_named_data +#define asn1_free_named_data_list mbedtls_asn1_free_named_data_list +#define asn1_get_alg mbedtls_asn1_get_alg +#define asn1_get_alg_null mbedtls_asn1_get_alg_null +#define asn1_get_bitstring mbedtls_asn1_get_bitstring +#define asn1_get_bitstring_null mbedtls_asn1_get_bitstring_null +#define asn1_get_bool mbedtls_asn1_get_bool +#define asn1_get_int mbedtls_asn1_get_int +#define asn1_get_len mbedtls_asn1_get_len +#define asn1_get_mpi mbedtls_asn1_get_mpi +#define asn1_get_sequence_of mbedtls_asn1_get_sequence_of +#define asn1_get_tag mbedtls_asn1_get_tag +#define asn1_named_data mbedtls_asn1_named_data +#define asn1_sequence mbedtls_asn1_sequence +#define asn1_store_named_data mbedtls_asn1_store_named_data +#define asn1_write_algorithm_identifier mbedtls_asn1_write_algorithm_identifier +#define asn1_write_bitstring mbedtls_asn1_write_bitstring +#define asn1_write_bool mbedtls_asn1_write_bool +#define asn1_write_ia5_string mbedtls_asn1_write_ia5_string +#define asn1_write_int mbedtls_asn1_write_int +#define asn1_write_len mbedtls_asn1_write_len +#define asn1_write_mpi mbedtls_asn1_write_mpi +#define asn1_write_null mbedtls_asn1_write_null +#define asn1_write_octet_string mbedtls_asn1_write_octet_string +#define asn1_write_oid mbedtls_asn1_write_oid +#define asn1_write_printable_string mbedtls_asn1_write_printable_string +#define asn1_write_raw_buffer mbedtls_asn1_write_raw_buffer +#define asn1_write_tag mbedtls_asn1_write_tag +#define base64_decode mbedtls_base64_decode +#define base64_encode mbedtls_base64_encode +#define base64_self_test mbedtls_base64_self_test +#define blowfish_context mbedtls_blowfish_context +#define blowfish_crypt_cbc mbedtls_blowfish_crypt_cbc +#define blowfish_crypt_cfb64 mbedtls_blowfish_crypt_cfb64 +#define blowfish_crypt_ctr mbedtls_blowfish_crypt_ctr +#define blowfish_crypt_ecb mbedtls_blowfish_crypt_ecb +#define blowfish_free mbedtls_blowfish_free +#define blowfish_init mbedtls_blowfish_init +#define blowfish_setkey mbedtls_blowfish_setkey +#define camellia_context mbedtls_camellia_context +#define camellia_crypt_cbc mbedtls_camellia_crypt_cbc +#define camellia_crypt_cfb128 mbedtls_camellia_crypt_cfb128 +#define camellia_crypt_ctr mbedtls_camellia_crypt_ctr +#define camellia_crypt_ecb mbedtls_camellia_crypt_ecb +#define camellia_free mbedtls_camellia_free +#define camellia_init mbedtls_camellia_init +#define camellia_self_test mbedtls_camellia_self_test +#define camellia_setkey_dec mbedtls_camellia_setkey_dec +#define camellia_setkey_enc mbedtls_camellia_setkey_enc +#define ccm_auth_decrypt mbedtls_ccm_auth_decrypt +#define ccm_context mbedtls_ccm_context +#define ccm_encrypt_and_tag mbedtls_ccm_encrypt_and_tag +#define ccm_free mbedtls_ccm_free +#define ccm_init mbedtls_ccm_init +#define ccm_self_test mbedtls_ccm_self_test +#define cipher_auth_decrypt mbedtls_cipher_auth_decrypt +#define cipher_auth_encrypt mbedtls_cipher_auth_encrypt +#define cipher_base_t mbedtls_cipher_base_t +#define cipher_check_tag mbedtls_cipher_check_tag +#define cipher_context_t mbedtls_cipher_context_t +#define cipher_crypt mbedtls_cipher_crypt +#define cipher_definition_t mbedtls_cipher_definition_t +#define cipher_definitions mbedtls_cipher_definitions +#define cipher_finish mbedtls_cipher_finish +#define cipher_free mbedtls_cipher_free +#define cipher_get_block_size mbedtls_cipher_get_block_size +#define cipher_get_cipher_mode mbedtls_cipher_get_cipher_mode +#define cipher_get_iv_size mbedtls_cipher_get_iv_size +#define cipher_get_key_size mbedtls_cipher_get_key_bitlen +#define cipher_get_name mbedtls_cipher_get_name +#define cipher_get_operation mbedtls_cipher_get_operation +#define cipher_get_type mbedtls_cipher_get_type +#define cipher_id_t mbedtls_cipher_id_t +#define cipher_info_from_string mbedtls_cipher_info_from_string +#define cipher_info_from_type mbedtls_cipher_info_from_type +#define cipher_info_from_values mbedtls_cipher_info_from_values +#define cipher_info_t mbedtls_cipher_info_t +#define cipher_init mbedtls_cipher_init +#define cipher_init_ctx mbedtls_cipher_setup +#define cipher_list mbedtls_cipher_list +#define cipher_mode_t mbedtls_cipher_mode_t +#define cipher_padding_t mbedtls_cipher_padding_t +#define cipher_reset mbedtls_cipher_reset +#define cipher_set_iv mbedtls_cipher_set_iv +#define cipher_set_padding_mode mbedtls_cipher_set_padding_mode +#define cipher_setkey mbedtls_cipher_setkey +#define cipher_type_t mbedtls_cipher_type_t +#define cipher_update mbedtls_cipher_update +#define cipher_update_ad mbedtls_cipher_update_ad +#define cipher_write_tag mbedtls_cipher_write_tag +#define ctr_drbg_context mbedtls_ctr_drbg_context +#define ctr_drbg_free mbedtls_ctr_drbg_free +#define ctr_drbg_init mbedtls_ctr_drbg_init +#define ctr_drbg_random mbedtls_ctr_drbg_random +#define ctr_drbg_random_with_add mbedtls_ctr_drbg_random_with_add +#define ctr_drbg_reseed mbedtls_ctr_drbg_reseed +#define ctr_drbg_self_test mbedtls_ctr_drbg_self_test +#define ctr_drbg_set_entropy_len mbedtls_ctr_drbg_set_entropy_len +#define ctr_drbg_set_prediction_resistance mbedtls_ctr_drbg_set_prediction_resistance +#define ctr_drbg_set_reseed_interval mbedtls_ctr_drbg_set_reseed_interval +#define ctr_drbg_update mbedtls_ctr_drbg_update +#define ctr_drbg_update_seed_file mbedtls_ctr_drbg_update_seed_file +#define ctr_drbg_write_seed_file mbedtls_ctr_drbg_write_seed_file +#define debug_print_buf mbedtls_debug_print_buf +#define debug_print_crt mbedtls_debug_print_crt +#define debug_print_ecp mbedtls_debug_print_ecp +#define debug_print_mpi mbedtls_debug_print_mpi +#define debug_print_msg mbedtls_debug_print_msg +#define debug_print_ret mbedtls_debug_print_ret +#define debug_set_threshold mbedtls_debug_set_threshold +#define des3_context mbedtls_des3_context +#define des3_crypt_cbc mbedtls_des3_crypt_cbc +#define des3_crypt_ecb mbedtls_des3_crypt_ecb +#define des3_free mbedtls_des3_free +#define des3_init mbedtls_des3_init +#define des3_set2key_dec mbedtls_des3_set2key_dec +#define des3_set2key_enc mbedtls_des3_set2key_enc +#define des3_set3key_dec mbedtls_des3_set3key_dec +#define des3_set3key_enc mbedtls_des3_set3key_enc +#define des_context mbedtls_des_context +#define des_crypt_cbc mbedtls_des_crypt_cbc +#define des_crypt_ecb mbedtls_des_crypt_ecb +#define des_free mbedtls_des_free +#define des_init mbedtls_des_init +#define des_key_check_key_parity mbedtls_des_key_check_key_parity +#define des_key_check_weak mbedtls_des_key_check_weak +#define des_key_set_parity mbedtls_des_key_set_parity +#define des_self_test mbedtls_des_self_test +#define des_setkey_dec mbedtls_des_setkey_dec +#define des_setkey_enc mbedtls_des_setkey_enc +#define dhm_calc_secret mbedtls_dhm_calc_secret +#define dhm_context mbedtls_dhm_context +#define dhm_free mbedtls_dhm_free +#define dhm_init mbedtls_dhm_init +#define dhm_make_params mbedtls_dhm_make_params +#define dhm_make_public mbedtls_dhm_make_public +#define dhm_parse_dhm mbedtls_dhm_parse_dhm +#define dhm_parse_dhmfile mbedtls_dhm_parse_dhmfile +#define dhm_read_params mbedtls_dhm_read_params +#define dhm_read_public mbedtls_dhm_read_public +#define dhm_self_test mbedtls_dhm_self_test +#define ecdh_calc_secret mbedtls_ecdh_calc_secret +#define ecdh_compute_shared mbedtls_ecdh_compute_shared +#define ecdh_context mbedtls_ecdh_context +#define ecdh_free mbedtls_ecdh_free +#define ecdh_gen_public mbedtls_ecdh_gen_public +#define ecdh_get_params mbedtls_ecdh_get_params +#define ecdh_init mbedtls_ecdh_init +#define ecdh_make_params mbedtls_ecdh_make_params +#define ecdh_make_public mbedtls_ecdh_make_public +#define ecdh_read_params mbedtls_ecdh_read_params +#define ecdh_read_public mbedtls_ecdh_read_public +#define ecdh_side mbedtls_ecdh_side +#define ecdsa_context mbedtls_ecdsa_context +#define ecdsa_free mbedtls_ecdsa_free +#define ecdsa_from_keypair mbedtls_ecdsa_from_keypair +#define ecdsa_genkey mbedtls_ecdsa_genkey +#define ecdsa_info mbedtls_ecdsa_info +#define ecdsa_init mbedtls_ecdsa_init +#define ecdsa_read_signature mbedtls_ecdsa_read_signature +#define ecdsa_sign mbedtls_ecdsa_sign +#define ecdsa_sign_det mbedtls_ecdsa_sign_det +#define ecdsa_verify mbedtls_ecdsa_verify +#define ecdsa_write_signature mbedtls_ecdsa_write_signature +#define ecdsa_write_signature_det mbedtls_ecdsa_write_signature_det +#define eckey_info mbedtls_eckey_info +#define eckeydh_info mbedtls_eckeydh_info +#define ecp_check_privkey mbedtls_ecp_check_privkey +#define ecp_check_pub_priv mbedtls_ecp_check_pub_priv +#define ecp_check_pubkey mbedtls_ecp_check_pubkey +#define ecp_copy mbedtls_ecp_copy +#define ecp_curve_info mbedtls_ecp_curve_info +#define ecp_curve_info_from_grp_id mbedtls_ecp_curve_info_from_grp_id +#define ecp_curve_info_from_name mbedtls_ecp_curve_info_from_name +#define ecp_curve_info_from_tls_id mbedtls_ecp_curve_info_from_tls_id +#define ecp_curve_list mbedtls_ecp_curve_list +#define ecp_gen_key mbedtls_ecp_gen_key +#define ecp_gen_keypair mbedtls_ecp_gen_keypair +#define ecp_group mbedtls_ecp_group +#define ecp_group_copy mbedtls_ecp_group_copy +#define ecp_group_free mbedtls_ecp_group_free +#define ecp_group_id mbedtls_ecp_group_id +#define ecp_group_init mbedtls_ecp_group_init +#define ecp_grp_id_list mbedtls_ecp_grp_id_list +#define ecp_is_zero mbedtls_ecp_is_zero +#define ecp_keypair mbedtls_ecp_keypair +#define ecp_keypair_free mbedtls_ecp_keypair_free +#define ecp_keypair_init mbedtls_ecp_keypair_init +#define ecp_mul mbedtls_ecp_mul +#define ecp_point mbedtls_ecp_point +#define ecp_point_free mbedtls_ecp_point_free +#define ecp_point_init mbedtls_ecp_point_init +#define ecp_point_read_binary mbedtls_ecp_point_read_binary +#define ecp_point_read_string mbedtls_ecp_point_read_string +#define ecp_point_write_binary mbedtls_ecp_point_write_binary +#define ecp_self_test mbedtls_ecp_self_test +#define ecp_set_zero mbedtls_ecp_set_zero +#define ecp_tls_read_group mbedtls_ecp_tls_read_group +#define ecp_tls_read_point mbedtls_ecp_tls_read_point +#define ecp_tls_write_group mbedtls_ecp_tls_write_group +#define ecp_tls_write_point mbedtls_ecp_tls_write_point +#define ecp_use_known_dp mbedtls_ecp_group_load +#define entropy_add_source mbedtls_entropy_add_source +#define entropy_context mbedtls_entropy_context +#define entropy_free mbedtls_entropy_free +#define entropy_func mbedtls_entropy_func +#define entropy_gather mbedtls_entropy_gather +#define entropy_init mbedtls_entropy_init +#define entropy_self_test mbedtls_entropy_self_test +#define entropy_update_manual mbedtls_entropy_update_manual +#define entropy_update_seed_file mbedtls_entropy_update_seed_file +#define entropy_write_seed_file mbedtls_entropy_write_seed_file +#define error_strerror mbedtls_strerror +#define f_source_ptr mbedtls_entropy_f_source_ptr +#define gcm_auth_decrypt mbedtls_gcm_auth_decrypt +#define gcm_context mbedtls_gcm_context +#define gcm_crypt_and_tag mbedtls_gcm_crypt_and_tag +#define gcm_finish mbedtls_gcm_finish +#define gcm_free mbedtls_gcm_free +#define gcm_init mbedtls_gcm_init +#define gcm_self_test mbedtls_gcm_self_test +#define gcm_starts mbedtls_gcm_starts +#define gcm_update mbedtls_gcm_update +#define get_timer mbedtls_timing_get_timer +#define hardclock mbedtls_timing_hardclock +#define hardclock_poll mbedtls_hardclock_poll +#define havege_free mbedtls_havege_free +#define havege_init mbedtls_havege_init +#define havege_poll mbedtls_havege_poll +#define havege_random mbedtls_havege_random +#define havege_state mbedtls_havege_state +#define hmac_drbg_context mbedtls_hmac_drbg_context +#define hmac_drbg_free mbedtls_hmac_drbg_free +#define hmac_drbg_init mbedtls_hmac_drbg_init +#define hmac_drbg_random mbedtls_hmac_drbg_random +#define hmac_drbg_random_with_add mbedtls_hmac_drbg_random_with_add +#define hmac_drbg_reseed mbedtls_hmac_drbg_reseed +#define hmac_drbg_self_test mbedtls_hmac_drbg_self_test +#define hmac_drbg_set_entropy_len mbedtls_hmac_drbg_set_entropy_len +#define hmac_drbg_set_prediction_resistance mbedtls_hmac_drbg_set_prediction_resistance +#define hmac_drbg_set_reseed_interval mbedtls_hmac_drbg_set_reseed_interval +#define hmac_drbg_update mbedtls_hmac_drbg_update +#define hmac_drbg_update_seed_file mbedtls_hmac_drbg_update_seed_file +#define hmac_drbg_write_seed_file mbedtls_hmac_drbg_write_seed_file +#define hr_time mbedtls_timing_hr_time +#define key_exchange_type_t mbedtls_key_exchange_type_t +#define md mbedtls_md +#define md2 mbedtls_md2 +#define md2_context mbedtls_md2_context +#define md2_finish mbedtls_md2_finish +#define md2_free mbedtls_md2_free +#define md2_info mbedtls_md2_info +#define md2_init mbedtls_md2_init +#define md2_process mbedtls_md2_process +#define md2_self_test mbedtls_md2_self_test +#define md2_starts mbedtls_md2_starts +#define md2_update mbedtls_md2_update +#define md4 mbedtls_md4 +#define md4_context mbedtls_md4_context +#define md4_finish mbedtls_md4_finish +#define md4_free mbedtls_md4_free +#define md4_info mbedtls_md4_info +#define md4_init mbedtls_md4_init +#define md4_process mbedtls_md4_process +#define md4_self_test mbedtls_md4_self_test +#define md4_starts mbedtls_md4_starts +#define md4_update mbedtls_md4_update +#define md5 mbedtls_md5 +#define md5_context mbedtls_md5_context +#define md5_finish mbedtls_md5_finish +#define md5_free mbedtls_md5_free +#define md5_info mbedtls_md5_info +#define md5_init mbedtls_md5_init +#define md5_process mbedtls_md5_process +#define md5_self_test mbedtls_md5_self_test +#define md5_starts mbedtls_md5_starts +#define md5_update mbedtls_md5_update +#define md_context_t mbedtls_md_context_t +#define md_file mbedtls_md_file +#define md_finish mbedtls_md_finish +#define md_free mbedtls_md_free +#define md_get_name mbedtls_md_get_name +#define md_get_size mbedtls_md_get_size +#define md_get_type mbedtls_md_get_type +#define md_hmac mbedtls_md_hmac +#define md_hmac_finish mbedtls_md_hmac_finish +#define md_hmac_reset mbedtls_md_hmac_reset +#define md_hmac_starts mbedtls_md_hmac_starts +#define md_hmac_update mbedtls_md_hmac_update +#define md_info_from_string mbedtls_md_info_from_string +#define md_info_from_type mbedtls_md_info_from_type +#define md_info_t mbedtls_md_info_t +#define md_init mbedtls_md_init +#define md_init_ctx mbedtls_md_init_ctx +#define md_list mbedtls_md_list +#define md_process mbedtls_md_process +#define md_starts mbedtls_md_starts +#define md_type_t mbedtls_md_type_t +#define md_update mbedtls_md_update +#define memory_buffer_alloc_cur_get mbedtls_memory_buffer_alloc_cur_get +#define memory_buffer_alloc_free mbedtls_memory_buffer_alloc_free +#define memory_buffer_alloc_init mbedtls_memory_buffer_alloc_init +#define memory_buffer_alloc_max_get mbedtls_memory_buffer_alloc_max_get +#define memory_buffer_alloc_max_reset mbedtls_memory_buffer_alloc_max_reset +#define memory_buffer_alloc_self_test mbedtls_memory_buffer_alloc_self_test +#define memory_buffer_alloc_status mbedtls_memory_buffer_alloc_status +#define memory_buffer_alloc_verify mbedtls_memory_buffer_alloc_verify +#define memory_buffer_set_verify mbedtls_memory_buffer_set_verify +#define mpi mbedtls_mpi +#define mpi_add_abs mbedtls_mpi_add_abs +#define mpi_add_int mbedtls_mpi_add_int +#define mpi_add_mpi mbedtls_mpi_add_mpi +#define mpi_cmp_abs mbedtls_mpi_cmp_abs +#define mpi_cmp_int mbedtls_mpi_cmp_int +#define mpi_cmp_mpi mbedtls_mpi_cmp_mpi +#define mpi_copy mbedtls_mpi_copy +#define mpi_div_int mbedtls_mpi_div_int +#define mpi_div_mpi mbedtls_mpi_div_mpi +#define mpi_exp_mod mbedtls_mpi_exp_mod +#define mpi_fill_random mbedtls_mpi_fill_random +#define mpi_free mbedtls_mpi_free +#define mpi_gcd mbedtls_mpi_gcd +#define mpi_gen_prime mbedtls_mpi_gen_prime +#define mpi_get_bit mbedtls_mpi_get_bit +#define mpi_grow mbedtls_mpi_grow +#define mpi_init mbedtls_mpi_init +#define mpi_inv_mod mbedtls_mpi_inv_mod +#define mpi_is_prime mbedtls_mpi_is_prime +#define mpi_lsb mbedtls_mpi_lsb +#define mpi_lset mbedtls_mpi_lset +#define mpi_mod_int mbedtls_mpi_mod_int +#define mpi_mod_mpi mbedtls_mpi_mod_mpi +#define mpi_msb mbedtls_mpi_bitlen +#define mpi_mul_int mbedtls_mpi_mul_int +#define mpi_mul_mpi mbedtls_mpi_mul_mpi +#define mpi_read_binary mbedtls_mpi_read_binary +#define mpi_read_file mbedtls_mpi_read_file +#define mpi_read_string mbedtls_mpi_read_string +#define mpi_safe_cond_assign mbedtls_mpi_safe_cond_assign +#define mpi_safe_cond_swap mbedtls_mpi_safe_cond_swap +#define mpi_self_test mbedtls_mpi_self_test +#define mpi_set_bit mbedtls_mpi_set_bit +#define mpi_shift_l mbedtls_mpi_shift_l +#define mpi_shift_r mbedtls_mpi_shift_r +#define mpi_shrink mbedtls_mpi_shrink +#define mpi_size mbedtls_mpi_size +#define mpi_sub_abs mbedtls_mpi_sub_abs +#define mpi_sub_int mbedtls_mpi_sub_int +#define mpi_sub_mpi mbedtls_mpi_sub_mpi +#define mpi_swap mbedtls_mpi_swap +#define mpi_write_binary mbedtls_mpi_write_binary +#define mpi_write_file mbedtls_mpi_write_file +#define mpi_write_string mbedtls_mpi_write_string +#define net_accept mbedtls_net_accept +#define net_bind mbedtls_net_bind +#define net_close mbedtls_net_free +#define net_connect mbedtls_net_connect +#define net_recv mbedtls_net_recv +#define net_recv_timeout mbedtls_net_recv_timeout +#define net_send mbedtls_net_send +#define net_set_block mbedtls_net_set_block +#define net_set_nonblock mbedtls_net_set_nonblock +#define net_usleep mbedtls_net_usleep +#define oid_descriptor_t mbedtls_oid_descriptor_t +#define oid_get_attr_short_name mbedtls_oid_get_attr_short_name +#define oid_get_cipher_alg mbedtls_oid_get_cipher_alg +#define oid_get_ec_grp mbedtls_oid_get_ec_grp +#define oid_get_extended_key_usage mbedtls_oid_get_extended_key_usage +#define oid_get_md_alg mbedtls_oid_get_md_alg +#define oid_get_numeric_string mbedtls_oid_get_numeric_string +#define oid_get_oid_by_ec_grp mbedtls_oid_get_oid_by_ec_grp +#define oid_get_oid_by_md mbedtls_oid_get_oid_by_md +#define oid_get_oid_by_pk_alg mbedtls_oid_get_oid_by_pk_alg +#define oid_get_oid_by_sig_alg mbedtls_oid_get_oid_by_sig_alg +#define oid_get_pk_alg mbedtls_oid_get_pk_alg +#define oid_get_pkcs12_pbe_alg mbedtls_oid_get_pkcs12_pbe_alg +#define oid_get_sig_alg mbedtls_oid_get_sig_alg +#define oid_get_sig_alg_desc mbedtls_oid_get_sig_alg_desc +#define oid_get_x509_ext_type mbedtls_oid_get_x509_ext_type +#define operation_t mbedtls_operation_t +#define padlock_supports mbedtls_padlock_has_support +#define padlock_xcryptcbc mbedtls_padlock_xcryptcbc +#define padlock_xcryptecb mbedtls_padlock_xcryptecb +#define pem_context mbedtls_pem_context +#define pem_free mbedtls_pem_free +#define pem_init mbedtls_pem_init +#define pem_read_buffer mbedtls_pem_read_buffer +#define pem_write_buffer mbedtls_pem_write_buffer +#define pk_can_do mbedtls_pk_can_do +#define pk_check_pair mbedtls_pk_check_pair +#define pk_context mbedtls_pk_context +#define pk_debug mbedtls_pk_debug +#define pk_debug_item mbedtls_pk_debug_item +#define pk_debug_type mbedtls_pk_debug_type +#define pk_decrypt mbedtls_pk_decrypt +#define pk_ec mbedtls_pk_ec +#define pk_encrypt mbedtls_pk_encrypt +#define pk_free mbedtls_pk_free +#define pk_get_len mbedtls_pk_get_len +#define pk_get_name mbedtls_pk_get_name +#define pk_get_size mbedtls_pk_get_bitlen +#define pk_get_type mbedtls_pk_get_type +#define pk_info_from_type mbedtls_pk_info_from_type +#define pk_info_t mbedtls_pk_info_t +#define pk_init mbedtls_pk_init +#define pk_init_ctx mbedtls_pk_setup +#define pk_init_ctx_rsa_alt mbedtls_pk_setup_rsa_alt +#define pk_load_file mbedtls_pk_load_file +#define pk_parse_key mbedtls_pk_parse_key +#define pk_parse_keyfile mbedtls_pk_parse_keyfile +#define pk_parse_public_key mbedtls_pk_parse_public_key +#define pk_parse_public_keyfile mbedtls_pk_parse_public_keyfile +#define pk_parse_subpubkey mbedtls_pk_parse_subpubkey +#define pk_rsa mbedtls_pk_rsa +#define pk_rsa_alt_decrypt_func mbedtls_pk_rsa_alt_decrypt_func +#define pk_rsa_alt_key_len_func mbedtls_pk_rsa_alt_key_len_func +#define pk_rsa_alt_sign_func mbedtls_pk_rsa_alt_sign_func +#define pk_rsassa_pss_options mbedtls_pk_rsassa_pss_options +#define pk_sign mbedtls_pk_sign +#define pk_type_t mbedtls_pk_type_t +#define pk_verify mbedtls_pk_verify +#define pk_verify_ext mbedtls_pk_verify_ext +#define pk_write_key_der mbedtls_pk_write_key_der +#define pk_write_key_pem mbedtls_pk_write_key_pem +#define pk_write_pubkey mbedtls_pk_write_pubkey +#define pk_write_pubkey_der mbedtls_pk_write_pubkey_der +#define pk_write_pubkey_pem mbedtls_pk_write_pubkey_pem +#define pkcs11_context mbedtls_pkcs11_context +#define pkcs11_decrypt mbedtls_pkcs11_decrypt +#define pkcs11_priv_key_free mbedtls_pkcs11_priv_key_free +#define pkcs11_priv_key_init mbedtls_pkcs11_priv_key_bind +#define pkcs11_sign mbedtls_pkcs11_sign +#define pkcs11_x509_cert_init mbedtls_pkcs11_x509_cert_bind +#define pkcs12_derivation mbedtls_pkcs12_derivation +#define pkcs12_pbe mbedtls_pkcs12_pbe +#define pkcs12_pbe_sha1_rc4_128 mbedtls_pkcs12_pbe_sha1_rc4_128 +#define pkcs5_pbes2 mbedtls_pkcs5_pbes2 +#define pkcs5_pbkdf2_hmac mbedtls_pkcs5_pbkdf2_hmac +#define pkcs5_self_test mbedtls_pkcs5_self_test +#define platform_entropy_poll mbedtls_platform_entropy_poll +#define platform_set_exit mbedtls_platform_set_exit +#define platform_set_fprintf mbedtls_platform_set_fprintf +#define platform_set_printf mbedtls_platform_set_printf +#define platform_set_snprintf mbedtls_platform_set_snprintf +#define polarssl_exit mbedtls_exit +#define polarssl_fprintf mbedtls_fprintf +#define polarssl_free mbedtls_free +#define polarssl_mutex_free mbedtls_mutex_free +#define polarssl_mutex_init mbedtls_mutex_init +#define polarssl_mutex_lock mbedtls_mutex_lock +#define polarssl_mutex_unlock mbedtls_mutex_unlock +#define polarssl_printf mbedtls_printf +#define polarssl_snprintf mbedtls_snprintf +#define polarssl_strerror mbedtls_strerror +#define ripemd160 mbedtls_ripemd160 +#define ripemd160_context mbedtls_ripemd160_context +#define ripemd160_finish mbedtls_ripemd160_finish +#define ripemd160_free mbedtls_ripemd160_free +#define ripemd160_info mbedtls_ripemd160_info +#define ripemd160_init mbedtls_ripemd160_init +#define ripemd160_process mbedtls_ripemd160_process +#define ripemd160_self_test mbedtls_ripemd160_self_test +#define ripemd160_starts mbedtls_ripemd160_starts +#define ripemd160_update mbedtls_ripemd160_update +#define rsa_alt_context mbedtls_rsa_alt_context +#define rsa_alt_info mbedtls_rsa_alt_info +#define rsa_check_privkey mbedtls_rsa_check_privkey +#define rsa_check_pub_priv mbedtls_rsa_check_pub_priv +#define rsa_check_pubkey mbedtls_rsa_check_pubkey +#define rsa_context mbedtls_rsa_context +#define rsa_copy mbedtls_rsa_copy +#define rsa_free mbedtls_rsa_free +#define rsa_gen_key mbedtls_rsa_gen_key +#define rsa_info mbedtls_rsa_info +#define rsa_init mbedtls_rsa_init +#define rsa_pkcs1_decrypt mbedtls_rsa_pkcs1_decrypt +#define rsa_pkcs1_encrypt mbedtls_rsa_pkcs1_encrypt +#define rsa_pkcs1_sign mbedtls_rsa_pkcs1_sign +#define rsa_pkcs1_verify mbedtls_rsa_pkcs1_verify +#define rsa_private mbedtls_rsa_private +#define rsa_public mbedtls_rsa_public +#define rsa_rsaes_oaep_decrypt mbedtls_rsa_rsaes_oaep_decrypt +#define rsa_rsaes_oaep_encrypt mbedtls_rsa_rsaes_oaep_encrypt +#define rsa_rsaes_pkcs1_v15_decrypt mbedtls_rsa_rsaes_pkcs1_v15_decrypt +#define rsa_rsaes_pkcs1_v15_encrypt mbedtls_rsa_rsaes_pkcs1_v15_encrypt +#define rsa_rsassa_pkcs1_v15_sign mbedtls_rsa_rsassa_pkcs1_v15_sign +#define rsa_rsassa_pkcs1_v15_verify mbedtls_rsa_rsassa_pkcs1_v15_verify +#define rsa_rsassa_pss_sign mbedtls_rsa_rsassa_pss_sign +#define rsa_rsassa_pss_verify mbedtls_rsa_rsassa_pss_verify +#define rsa_rsassa_pss_verify_ext mbedtls_rsa_rsassa_pss_verify_ext +#define rsa_self_test mbedtls_rsa_self_test +#define rsa_set_padding mbedtls_rsa_set_padding +#define safer_memcmp mbedtls_ssl_safer_memcmp +#define set_alarm mbedtls_set_alarm +#define sha1 mbedtls_sha1 +#define sha1_context mbedtls_sha1_context +#define sha1_finish mbedtls_sha1_finish +#define sha1_free mbedtls_sha1_free +#define sha1_info mbedtls_sha1_info +#define sha1_init mbedtls_sha1_init +#define sha1_process mbedtls_sha1_process +#define sha1_self_test mbedtls_sha1_self_test +#define sha1_starts mbedtls_sha1_starts +#define sha1_update mbedtls_sha1_update +#define sha224_info mbedtls_sha224_info +#define sha256 mbedtls_sha256 +#define sha256_context mbedtls_sha256_context +#define sha256_finish mbedtls_sha256_finish +#define sha256_free mbedtls_sha256_free +#define sha256_info mbedtls_sha256_info +#define sha256_init mbedtls_sha256_init +#define sha256_process mbedtls_sha256_process +#define sha256_self_test mbedtls_sha256_self_test +#define sha256_starts mbedtls_sha256_starts +#define sha256_update mbedtls_sha256_update +#define sha384_info mbedtls_sha384_info +#define sha512 mbedtls_sha512 +#define sha512_context mbedtls_sha512_context +#define sha512_finish mbedtls_sha512_finish +#define sha512_free mbedtls_sha512_free +#define sha512_info mbedtls_sha512_info +#define sha512_init mbedtls_sha512_init +#define sha512_process mbedtls_sha512_process +#define sha512_self_test mbedtls_sha512_self_test +#define sha512_starts mbedtls_sha512_starts +#define sha512_update mbedtls_sha512_update +#define source_state mbedtls_entropy_source_state +#define ssl_cache_context mbedtls_ssl_cache_context +#define ssl_cache_entry mbedtls_ssl_cache_entry +#define ssl_cache_free mbedtls_ssl_cache_free +#define ssl_cache_get mbedtls_ssl_cache_get +#define ssl_cache_init mbedtls_ssl_cache_init +#define ssl_cache_set mbedtls_ssl_cache_set +#define ssl_cache_set_max_entries mbedtls_ssl_cache_set_max_entries +#define ssl_cache_set_timeout mbedtls_ssl_cache_set_timeout +#define ssl_check_cert_usage mbedtls_ssl_check_cert_usage +#define ssl_ciphersuite_from_id mbedtls_ssl_ciphersuite_from_id +#define ssl_ciphersuite_from_string mbedtls_ssl_ciphersuite_from_string +#define ssl_ciphersuite_t mbedtls_ssl_ciphersuite_t +#define ssl_ciphersuite_uses_ec mbedtls_ssl_ciphersuite_uses_ec +#define ssl_ciphersuite_uses_psk mbedtls_ssl_ciphersuite_uses_psk +#define ssl_close_notify mbedtls_ssl_close_notify +#define ssl_context mbedtls_ssl_context +#define ssl_cookie_check mbedtls_ssl_cookie_check +#define ssl_cookie_check_t mbedtls_ssl_cookie_check_t +#define ssl_cookie_ctx mbedtls_ssl_cookie_ctx +#define ssl_cookie_free mbedtls_ssl_cookie_free +#define ssl_cookie_init mbedtls_ssl_cookie_init +#define ssl_cookie_set_timeout mbedtls_ssl_cookie_set_timeout +#define ssl_cookie_setup mbedtls_ssl_cookie_setup +#define ssl_cookie_write mbedtls_ssl_cookie_write +#define ssl_cookie_write_t mbedtls_ssl_cookie_write_t +#define ssl_derive_keys mbedtls_ssl_derive_keys +#define ssl_dtls_replay_check mbedtls_ssl_dtls_replay_check +#define ssl_dtls_replay_update mbedtls_ssl_dtls_replay_update +#define ssl_fetch_input mbedtls_ssl_fetch_input +#define ssl_flight_item mbedtls_ssl_flight_item +#define ssl_flush_output mbedtls_ssl_flush_output +#define ssl_free mbedtls_ssl_free +#define ssl_get_alpn_protocol mbedtls_ssl_get_alpn_protocol +#define ssl_get_bytes_avail mbedtls_ssl_get_bytes_avail +#define ssl_get_ciphersuite mbedtls_ssl_get_ciphersuite +#define ssl_get_ciphersuite_id mbedtls_ssl_get_ciphersuite_id +#define ssl_get_ciphersuite_name mbedtls_ssl_get_ciphersuite_name +#define ssl_get_ciphersuite_sig_pk_alg mbedtls_ssl_get_ciphersuite_sig_pk_alg +#define ssl_get_peer_cert mbedtls_ssl_get_peer_cert +#define ssl_get_record_expansion mbedtls_ssl_get_record_expansion +#define ssl_get_session mbedtls_ssl_get_session +#define ssl_get_verify_result mbedtls_ssl_get_verify_result +#define ssl_get_version mbedtls_ssl_get_version +#define ssl_handshake mbedtls_ssl_handshake +#define ssl_handshake_client_step mbedtls_ssl_handshake_client_step +#define ssl_handshake_free mbedtls_ssl_handshake_free +#define ssl_handshake_params mbedtls_ssl_handshake_params +#define ssl_handshake_server_step mbedtls_ssl_handshake_server_step +#define ssl_handshake_step mbedtls_ssl_handshake_step +#define ssl_handshake_wrapup mbedtls_ssl_handshake_wrapup +#define ssl_hdr_len mbedtls_ssl_hdr_len +#define ssl_hs_hdr_len mbedtls_ssl_hs_hdr_len +#define ssl_hw_record_activate mbedtls_ssl_hw_record_activate +#define ssl_hw_record_finish mbedtls_ssl_hw_record_finish +#define ssl_hw_record_init mbedtls_ssl_hw_record_init +#define ssl_hw_record_read mbedtls_ssl_hw_record_read +#define ssl_hw_record_reset mbedtls_ssl_hw_record_reset +#define ssl_hw_record_write mbedtls_ssl_hw_record_write +#define ssl_init mbedtls_ssl_init +#define ssl_key_cert mbedtls_ssl_key_cert +#define ssl_legacy_renegotiation mbedtls_ssl_conf_legacy_renegotiation +#define ssl_list_ciphersuites mbedtls_ssl_list_ciphersuites +#define ssl_md_alg_from_hash mbedtls_ssl_md_alg_from_hash +#define ssl_optimize_checksum mbedtls_ssl_optimize_checksum +#define ssl_own_cert mbedtls_ssl_own_cert +#define ssl_own_key mbedtls_ssl_own_key +#define ssl_parse_certificate mbedtls_ssl_parse_certificate +#define ssl_parse_change_cipher_spec mbedtls_ssl_parse_change_cipher_spec +#define ssl_parse_finished mbedtls_ssl_parse_finished +#define ssl_pk_alg_from_sig mbedtls_ssl_pk_alg_from_sig +#define ssl_pkcs11_decrypt mbedtls_ssl_pkcs11_decrypt +#define ssl_pkcs11_key_len mbedtls_ssl_pkcs11_key_len +#define ssl_pkcs11_sign mbedtls_ssl_pkcs11_sign +#define ssl_psk_derive_premaster mbedtls_ssl_psk_derive_premaster +#define ssl_read mbedtls_ssl_read +#define ssl_read_record mbedtls_ssl_read_record +#define ssl_read_version mbedtls_ssl_read_version +#define ssl_recv_flight_completed mbedtls_ssl_recv_flight_completed +#define ssl_renegotiate mbedtls_ssl_renegotiate +#define ssl_resend mbedtls_ssl_resend +#define ssl_reset_checksum mbedtls_ssl_reset_checksum +#define ssl_send_alert_message mbedtls_ssl_send_alert_message +#define ssl_send_fatal_handshake_failure mbedtls_ssl_send_fatal_handshake_failure +#define ssl_send_flight_completed mbedtls_ssl_send_flight_completed +#define ssl_session mbedtls_ssl_session +#define ssl_session_free mbedtls_ssl_session_free +#define ssl_session_init mbedtls_ssl_session_init +#define ssl_session_reset mbedtls_ssl_session_reset +#define ssl_set_alpn_protocols mbedtls_ssl_conf_alpn_protocols +#define ssl_set_arc4_support mbedtls_ssl_conf_arc4_support +#define ssl_set_authmode mbedtls_ssl_conf_authmode +#define ssl_set_bio mbedtls_ssl_set_bio +#define ssl_set_ca_chain mbedtls_ssl_conf_ca_chain +#define ssl_set_cbc_record_splitting mbedtls_ssl_conf_cbc_record_splitting +#define ssl_set_ciphersuites mbedtls_ssl_conf_ciphersuites +#define ssl_set_ciphersuites_for_version mbedtls_ssl_conf_ciphersuites_for_version +#define ssl_set_client_transport_id mbedtls_ssl_set_client_transport_id +#define ssl_set_curves mbedtls_ssl_conf_curves +#define ssl_set_dbg mbedtls_ssl_conf_dbg +#define ssl_set_dh_param mbedtls_ssl_conf_dh_param +#define ssl_set_dh_param_ctx mbedtls_ssl_conf_dh_param_ctx +#define ssl_set_dtls_anti_replay mbedtls_ssl_conf_dtls_anti_replay +#define ssl_set_dtls_badmac_limit mbedtls_ssl_conf_dtls_badmac_limit +#define ssl_set_dtls_cookies mbedtls_ssl_conf_dtls_cookies +#define ssl_set_encrypt_then_mac mbedtls_ssl_conf_encrypt_then_mac +#define ssl_set_endpoint mbedtls_ssl_conf_endpoint +#define ssl_set_extended_master_secret mbedtls_ssl_conf_extended_master_secret +#define ssl_set_fallback mbedtls_ssl_conf_fallback +#define ssl_set_handshake_timeout mbedtls_ssl_conf_handshake_timeout +#define ssl_set_hostname mbedtls_ssl_set_hostname +#define ssl_set_max_frag_len mbedtls_ssl_conf_max_frag_len +#define ssl_set_max_version mbedtls_ssl_conf_max_version +#define ssl_set_min_version mbedtls_ssl_conf_min_version +#define ssl_set_own_cert mbedtls_ssl_conf_own_cert +#define ssl_set_psk mbedtls_ssl_conf_psk +#define ssl_set_psk_cb mbedtls_ssl_conf_psk_cb +#define ssl_set_renegotiation mbedtls_ssl_conf_renegotiation +#define ssl_set_renegotiation_enforced mbedtls_ssl_conf_renegotiation_enforced +#define ssl_set_renegotiation_period mbedtls_ssl_conf_renegotiation_period +#define ssl_set_rng mbedtls_ssl_conf_rng +#define ssl_set_session mbedtls_ssl_set_session +#define ssl_set_session_cache mbedtls_ssl_conf_session_cache +#define ssl_set_session_tickets mbedtls_ssl_conf_session_tickets +#define ssl_set_sni mbedtls_ssl_conf_sni +#define ssl_set_transport mbedtls_ssl_conf_transport +#define ssl_set_truncated_hmac mbedtls_ssl_conf_truncated_hmac +#define ssl_set_verify mbedtls_ssl_conf_verify +#define ssl_sig_from_pk mbedtls_ssl_sig_from_pk +#define ssl_states mbedtls_ssl_states +#define ssl_transform mbedtls_ssl_transform +#define ssl_transform_free mbedtls_ssl_transform_free +#define ssl_write mbedtls_ssl_write +#define ssl_write_certificate mbedtls_ssl_write_certificate +#define ssl_write_change_cipher_spec mbedtls_ssl_write_change_cipher_spec +#define ssl_write_finished mbedtls_ssl_write_finished +#define ssl_write_record mbedtls_ssl_write_record +#define ssl_write_version mbedtls_ssl_write_version +#define supported_ciphers mbedtls_cipher_supported +#define t_sint mbedtls_mpi_sint +#define t_udbl mbedtls_t_udbl +#define t_uint mbedtls_mpi_uint +#define test_ca_crt mbedtls_test_ca_crt +#define test_ca_crt_ec mbedtls_test_ca_crt_ec +#define test_ca_crt_rsa mbedtls_test_ca_crt_rsa +#define test_ca_key mbedtls_test_ca_key +#define test_ca_key_ec mbedtls_test_ca_key_ec +#define test_ca_key_rsa mbedtls_test_ca_key_rsa +#define test_ca_list mbedtls_test_cas_pem +#define test_ca_pwd mbedtls_test_ca_pwd +#define test_ca_pwd_ec mbedtls_test_ca_pwd_ec +#define test_ca_pwd_rsa mbedtls_test_ca_pwd_rsa +#define test_cli_crt mbedtls_test_cli_crt +#define test_cli_crt_ec mbedtls_test_cli_crt_ec +#define test_cli_crt_rsa mbedtls_test_cli_crt_rsa +#define test_cli_key mbedtls_test_cli_key +#define test_cli_key_ec mbedtls_test_cli_key_ec +#define test_cli_key_rsa mbedtls_test_cli_key_rsa +#define test_srv_crt mbedtls_test_srv_crt +#define test_srv_crt_ec mbedtls_test_srv_crt_ec +#define test_srv_crt_rsa mbedtls_test_srv_crt_rsa +#define test_srv_key mbedtls_test_srv_key +#define test_srv_key_ec mbedtls_test_srv_key_ec +#define test_srv_key_rsa mbedtls_test_srv_key_rsa +#define threading_mutex_t mbedtls_threading_mutex_t +#define threading_set_alt mbedtls_threading_set_alt +#define timing_self_test mbedtls_timing_self_test +#define version_check_feature mbedtls_version_check_feature +#define version_get_number mbedtls_version_get_number +#define version_get_string mbedtls_version_get_string +#define version_get_string_full mbedtls_version_get_string_full +#define x509_bitstring mbedtls_x509_bitstring +#define x509_buf mbedtls_x509_buf +#define x509_crl mbedtls_x509_crl +#define x509_crl_entry mbedtls_x509_crl_entry +#define x509_crl_free mbedtls_x509_crl_free +#define x509_crl_info mbedtls_x509_crl_info +#define x509_crl_init mbedtls_x509_crl_init +#define x509_crl_parse mbedtls_x509_crl_parse +#define x509_crl_parse_der mbedtls_x509_crl_parse_der +#define x509_crl_parse_file mbedtls_x509_crl_parse_file +#define x509_crt mbedtls_x509_crt +#define x509_crt_check_extended_key_usage mbedtls_x509_crt_check_extended_key_usage +#define x509_crt_check_key_usage mbedtls_x509_crt_check_key_usage +#define x509_crt_free mbedtls_x509_crt_free +#define x509_crt_info mbedtls_x509_crt_info +#define x509_crt_init mbedtls_x509_crt_init +#define x509_crt_parse mbedtls_x509_crt_parse +#define x509_crt_parse_der mbedtls_x509_crt_parse_der +#define x509_crt_parse_file mbedtls_x509_crt_parse_file +#define x509_crt_parse_path mbedtls_x509_crt_parse_path +#define x509_crt_revoked mbedtls_x509_crt_is_revoked +#define x509_crt_verify mbedtls_x509_crt_verify +#define x509_csr mbedtls_x509_csr +#define x509_csr_free mbedtls_x509_csr_free +#define x509_csr_info mbedtls_x509_csr_info +#define x509_csr_init mbedtls_x509_csr_init +#define x509_csr_parse mbedtls_x509_csr_parse +#define x509_csr_parse_der mbedtls_x509_csr_parse_der +#define x509_csr_parse_file mbedtls_x509_csr_parse_file +#define x509_dn_gets mbedtls_x509_dn_gets +#define x509_get_alg mbedtls_x509_get_alg +#define x509_get_alg_null mbedtls_x509_get_alg_null +#define x509_get_ext mbedtls_x509_get_ext +#define x509_get_name mbedtls_x509_get_name +#define x509_get_rsassa_pss_params mbedtls_x509_get_rsassa_pss_params +#define x509_get_serial mbedtls_x509_get_serial +#define x509_get_sig mbedtls_x509_get_sig +#define x509_get_sig_alg mbedtls_x509_get_sig_alg +#define x509_get_time mbedtls_x509_get_time +#define x509_key_size_helper mbedtls_x509_key_size_helper +#define x509_name mbedtls_x509_name +#define x509_self_test mbedtls_x509_self_test +#define x509_sequence mbedtls_x509_sequence +#define x509_serial_gets mbedtls_x509_serial_gets +#define x509_set_extension mbedtls_x509_set_extension +#define x509_sig_alg_gets mbedtls_x509_sig_alg_gets +#define x509_string_to_names mbedtls_x509_string_to_names +#define x509_time mbedtls_x509_time +#define x509_time_expired mbedtls_x509_time_is_past +#define x509_time_future mbedtls_x509_time_is_future +#define x509_write_extensions mbedtls_x509_write_extensions +#define x509_write_names mbedtls_x509_write_names +#define x509_write_sig mbedtls_x509_write_sig +#define x509write_cert mbedtls_x509write_cert +#define x509write_crt_der mbedtls_x509write_crt_der +#define x509write_crt_free mbedtls_x509write_crt_free +#define x509write_crt_init mbedtls_x509write_crt_init +#define x509write_crt_pem mbedtls_x509write_crt_pem +#define x509write_crt_set_authority_key_identifier mbedtls_x509write_crt_set_authority_key_identifier +#define x509write_crt_set_basic_constraints mbedtls_x509write_crt_set_basic_constraints +#define x509write_crt_set_extension mbedtls_x509write_crt_set_extension +#define x509write_crt_set_issuer_key mbedtls_x509write_crt_set_issuer_key +#define x509write_crt_set_issuer_name mbedtls_x509write_crt_set_issuer_name +#define x509write_crt_set_key_usage mbedtls_x509write_crt_set_key_usage +#define x509write_crt_set_md_alg mbedtls_x509write_crt_set_md_alg +#define x509write_crt_set_ns_cert_type mbedtls_x509write_crt_set_ns_cert_type +#define x509write_crt_set_serial mbedtls_x509write_crt_set_serial +#define x509write_crt_set_subject_key mbedtls_x509write_crt_set_subject_key +#define x509write_crt_set_subject_key_identifier mbedtls_x509write_crt_set_subject_key_identifier +#define x509write_crt_set_subject_name mbedtls_x509write_crt_set_subject_name +#define x509write_crt_set_validity mbedtls_x509write_crt_set_validity +#define x509write_crt_set_version mbedtls_x509write_crt_set_version +#define x509write_csr mbedtls_x509write_csr +#define x509write_csr_der mbedtls_x509write_csr_der +#define x509write_csr_free mbedtls_x509write_csr_free +#define x509write_csr_init mbedtls_x509write_csr_init +#define x509write_csr_pem mbedtls_x509write_csr_pem +#define x509write_csr_set_extension mbedtls_x509write_csr_set_extension +#define x509write_csr_set_key mbedtls_x509write_csr_set_key +#define x509write_csr_set_key_usage mbedtls_x509write_csr_set_key_usage +#define x509write_csr_set_md_alg mbedtls_x509write_csr_set_md_alg +#define x509write_csr_set_ns_cert_type mbedtls_x509write_csr_set_ns_cert_type +#define x509write_csr_set_subject_name mbedtls_x509write_csr_set_subject_name +#define xtea_context mbedtls_xtea_context +#define xtea_crypt_cbc mbedtls_xtea_crypt_cbc +#define xtea_crypt_ecb mbedtls_xtea_crypt_ecb +#define xtea_free mbedtls_xtea_free +#define xtea_init mbedtls_xtea_init +#define xtea_self_test mbedtls_xtea_self_test +#define xtea_setup mbedtls_xtea_setup + +#endif /* compat-1.3.h */ +#endif /* MBEDTLS_DEPRECATED_REMOVED */ diff --git a/thirdparty/mbedtls/include/mbedtls/config.h b/thirdparty/mbedtls/include/mbedtls/config.h new file mode 100644 index 0000000000..79eedffddd --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/config.h @@ -0,0 +1,2817 @@ +/** + * \file config.h + * + * \brief Configuration options (set of defines) + * + *  This set of compile-time options may be used to enable + *  or disable features selectively, and reduce the global + *  memory footprint. + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ + +#ifndef MBEDTLS_CONFIG_H +#define MBEDTLS_CONFIG_H + +#if defined(_MSC_VER) && !defined(_CRT_SECURE_NO_DEPRECATE) +#define _CRT_SECURE_NO_DEPRECATE 1 +#endif + +/** + * \name SECTION: System support + * + * This section sets system specific settings. + * \{ + */ + +/** + * \def MBEDTLS_HAVE_ASM + * + * The compiler has support for asm(). + * + * Requires support for asm() in compiler. + * + * Used in: + *      library/timing.c + *      library/padlock.c + *      include/mbedtls/bn_mul.h + * + * Comment to disable the use of assembly code. + */ +#define MBEDTLS_HAVE_ASM + +/** + * \def MBEDTLS_NO_UDBL_DIVISION + * + * The platform lacks support for double-width integer division (64-bit + * division on a 32-bit platform, 128-bit division on a 64-bit platform). + * + * Used in: + *      include/mbedtls/bignum.h + *      library/bignum.c + * + * The bignum code uses double-width division to speed up some operations. + * Double-width division is often implemented in software that needs to + * be linked with the program. The presence of a double-width integer + * type is usually detected automatically through preprocessor macros, + * but the automatic detection cannot know whether the code needs to + * and can be linked with an implementation of division for that type. + * By default division is assumed to be usable if the type is present. + * Uncomment this option to prevent the use of double-width division. + * + * Note that division for the native integer type is always required. + * Furthermore, a 64-bit type is always required even on a 32-bit + * platform, but it need not support multiplication or division. In some + * cases it is also desirable to disable some double-width operations. For + * example, if double-width division is implemented in software, disabling + * it can reduce code size in some embedded targets. + */ +//#define MBEDTLS_NO_UDBL_DIVISION + +/** + * \def MBEDTLS_HAVE_SSE2 + * + * CPU supports SSE2 instruction set. + * + * Uncomment if the CPU supports SSE2 (IA-32 specific). + */ +//#define MBEDTLS_HAVE_SSE2 + +/** + * \def MBEDTLS_HAVE_TIME + * + * System has time.h and time(). + * The time does not need to be correct, only time differences are used, + * by contrast with MBEDTLS_HAVE_TIME_DATE + * + * Defining MBEDTLS_HAVE_TIME allows you to specify MBEDTLS_PLATFORM_TIME_ALT, + * MBEDTLS_PLATFORM_TIME_MACRO, MBEDTLS_PLATFORM_TIME_TYPE_MACRO and + * MBEDTLS_PLATFORM_STD_TIME. + * + * Comment if your system does not support time functions + */ +#define MBEDTLS_HAVE_TIME + +/** + * \def MBEDTLS_HAVE_TIME_DATE + * + * System has time.h and time(), gmtime() and the clock is correct. + * The time needs to be correct (not necesarily very accurate, but at least + * the date should be correct). This is used to verify the validity period of + * X.509 certificates. + * + * Comment if your system does not have a correct clock. + */ +#define MBEDTLS_HAVE_TIME_DATE + +/** + * \def MBEDTLS_PLATFORM_MEMORY + * + * Enable the memory allocation layer. + * + * By default mbed TLS uses the system-provided calloc() and free(). + * This allows different allocators (self-implemented or provided) to be + * provided to the platform abstraction layer. + * + * Enabling MBEDTLS_PLATFORM_MEMORY without the + * MBEDTLS_PLATFORM_{FREE,CALLOC}_MACROs will provide + * "mbedtls_platform_set_calloc_free()" allowing you to set an alternative calloc() and + * free() function pointer at runtime. + * + * Enabling MBEDTLS_PLATFORM_MEMORY and specifying + * MBEDTLS_PLATFORM_{CALLOC,FREE}_MACROs will allow you to specify the + * alternate function at compile time. + * + * Requires: MBEDTLS_PLATFORM_C + * + * Enable this layer to allow use of alternative memory allocators. + */ +//#define MBEDTLS_PLATFORM_MEMORY + +/** + * \def MBEDTLS_PLATFORM_NO_STD_FUNCTIONS + * + * Do not assign standard functions in the platform layer (e.g. calloc() to + * MBEDTLS_PLATFORM_STD_CALLOC and printf() to MBEDTLS_PLATFORM_STD_PRINTF) + * + * This makes sure there are no linking errors on platforms that do not support + * these functions. You will HAVE to provide alternatives, either at runtime + * via the platform_set_xxx() functions or at compile time by setting + * the MBEDTLS_PLATFORM_STD_XXX defines, or enabling a + * MBEDTLS_PLATFORM_XXX_MACRO. + * + * Requires: MBEDTLS_PLATFORM_C + * + * Uncomment to prevent default assignment of standard functions in the + * platform layer. + */ +//#define MBEDTLS_PLATFORM_NO_STD_FUNCTIONS + +/** + * \def MBEDTLS_PLATFORM_EXIT_ALT + * + * MBEDTLS_PLATFORM_XXX_ALT: Uncomment a macro to let mbed TLS support the + * function in the platform abstraction layer. + * + * Example: In case you uncomment MBEDTLS_PLATFORM_PRINTF_ALT, mbed TLS will + * provide a function "mbedtls_platform_set_printf()" that allows you to set an + * alternative printf function pointer. + * + * All these define require MBEDTLS_PLATFORM_C to be defined! + * + * \note MBEDTLS_PLATFORM_SNPRINTF_ALT is required on Windows; + * it will be enabled automatically by check_config.h + * + * \warning MBEDTLS_PLATFORM_XXX_ALT cannot be defined at the same time as + * MBEDTLS_PLATFORM_XXX_MACRO! + * + * Requires: MBEDTLS_PLATFORM_TIME_ALT requires MBEDTLS_HAVE_TIME + * + * Uncomment a macro to enable alternate implementation of specific base + * platform function + */ +//#define MBEDTLS_PLATFORM_EXIT_ALT +//#define MBEDTLS_PLATFORM_TIME_ALT +//#define MBEDTLS_PLATFORM_FPRINTF_ALT +//#define MBEDTLS_PLATFORM_PRINTF_ALT +//#define MBEDTLS_PLATFORM_SNPRINTF_ALT +//#define MBEDTLS_PLATFORM_NV_SEED_ALT +//#define MBEDTLS_PLATFORM_SETUP_TEARDOWN_ALT + +/** + * \def MBEDTLS_DEPRECATED_WARNING + * + * Mark deprecated functions so that they generate a warning if used. + * Functions deprecated in one version will usually be removed in the next + * version. You can enable this to help you prepare the transition to a new + * major version by making sure your code is not using these functions. + * + * This only works with GCC and Clang. With other compilers, you may want to + * use MBEDTLS_DEPRECATED_REMOVED + * + * Uncomment to get warnings on using deprecated functions. + */ +//#define MBEDTLS_DEPRECATED_WARNING + +/** + * \def MBEDTLS_DEPRECATED_REMOVED + * + * Remove deprecated functions so that they generate an error if used. + * Functions deprecated in one version will usually be removed in the next + * version. You can enable this to help you prepare the transition to a new + * major version by making sure your code is not using these functions. + * + * Uncomment to get errors on using deprecated functions. + */ +//#define MBEDTLS_DEPRECATED_REMOVED + +/* \} name SECTION: System support */ + +/** + * \name SECTION: mbed TLS feature support + * + * This section sets support for features that are or are not needed + * within the modules that are enabled. + * \{ + */ + +/** + * \def MBEDTLS_TIMING_ALT + * + * Uncomment to provide your own alternate implementation for mbedtls_timing_hardclock(), + * mbedtls_timing_get_timer(), mbedtls_set_alarm(), mbedtls_set/get_delay() + * + * Only works if you have MBEDTLS_TIMING_C enabled. + * + * You will need to provide a header "timing_alt.h" and an implementation at + * compile time. + */ +//#define MBEDTLS_TIMING_ALT + +/** + * \def MBEDTLS_AES_ALT + * + * MBEDTLS__MODULE_NAME__ALT: Uncomment a macro to let mbed TLS use your + * alternate core implementation of a symmetric crypto, an arithmetic or hash + * module (e.g. platform specific assembly optimized implementations). Keep + * in mind that the function prototypes should remain the same. + * + * This replaces the whole module. If you only want to replace one of the + * functions, use one of the MBEDTLS__FUNCTION_NAME__ALT flags. + * + * Example: In case you uncomment MBEDTLS_AES_ALT, mbed TLS will no longer + * provide the "struct mbedtls_aes_context" definition and omit the base + * function declarations and implementations. "aes_alt.h" will be included from + * "aes.h" to include the new function definitions. + * + * Uncomment a macro to enable alternate implementation of the corresponding + * module. + * + * \warning   MD2, MD4, MD5, ARC4, DES and SHA-1 are considered weak and their + *            use constitutes a security risk. If possible, we recommend + *            avoiding dependencies on them, and considering stronger message + *            digests and ciphers instead. + * + */ +//#define MBEDTLS_AES_ALT +//#define MBEDTLS_ARC4_ALT +//#define MBEDTLS_BLOWFISH_ALT +//#define MBEDTLS_CAMELLIA_ALT +//#define MBEDTLS_CCM_ALT +//#define MBEDTLS_CMAC_ALT +//#define MBEDTLS_DES_ALT +//#define MBEDTLS_DHM_ALT +//#define MBEDTLS_ECJPAKE_ALT +//#define MBEDTLS_GCM_ALT +//#define MBEDTLS_MD2_ALT +//#define MBEDTLS_MD4_ALT +//#define MBEDTLS_MD5_ALT +//#define MBEDTLS_RIPEMD160_ALT +//#define MBEDTLS_RSA_ALT +//#define MBEDTLS_SHA1_ALT +//#define MBEDTLS_SHA256_ALT +//#define MBEDTLS_SHA512_ALT +//#define MBEDTLS_XTEA_ALT +/* + * When replacing the elliptic curve module, pleace consider, that it is + * implemented with two .c files: + *      - ecp.c + *      - ecp_curves.c + * You can replace them very much like all the other MBEDTLS__MODULE_NAME__ALT + * macros as described above. The only difference is that you have to make sure + * that you provide functionality for both .c files. + */ +//#define MBEDTLS_ECP_ALT + +/** + * \def MBEDTLS_MD2_PROCESS_ALT + * + * MBEDTLS__FUNCTION_NAME__ALT: Uncomment a macro to let mbed TLS use you + * alternate core implementation of symmetric crypto or hash function. Keep in + * mind that function prototypes should remain the same. + * + * This replaces only one function. The header file from mbed TLS is still + * used, in contrast to the MBEDTLS__MODULE_NAME__ALT flags. + * + * Example: In case you uncomment MBEDTLS_SHA256_PROCESS_ALT, mbed TLS will + * no longer provide the mbedtls_sha1_process() function, but it will still provide + * the other function (using your mbedtls_sha1_process() function) and the definition + * of mbedtls_sha1_context, so your implementation of mbedtls_sha1_process must be compatible + * with this definition. + * + * \note Because of a signature change, the core AES encryption and decryption routines are + *       currently named mbedtls_aes_internal_encrypt and mbedtls_aes_internal_decrypt, + *       respectively. When setting up alternative implementations, these functions should + *       be overriden, but the wrapper functions mbedtls_aes_decrypt and mbedtls_aes_encrypt + *       must stay untouched. + * + * \note If you use the AES_xxx_ALT macros, then is is recommended to also set + *       MBEDTLS_AES_ROM_TABLES in order to help the linker garbage-collect the AES + *       tables. + * + * Uncomment a macro to enable alternate implementation of the corresponding + * function. + * + * \warning   MD2, MD4, MD5, DES and SHA-1 are considered weak and their use + *            constitutes a security risk. If possible, we recommend avoiding + *            dependencies on them, and considering stronger message digests + *            and ciphers instead. + * + */ +//#define MBEDTLS_MD2_PROCESS_ALT +//#define MBEDTLS_MD4_PROCESS_ALT +//#define MBEDTLS_MD5_PROCESS_ALT +//#define MBEDTLS_RIPEMD160_PROCESS_ALT +//#define MBEDTLS_SHA1_PROCESS_ALT +//#define MBEDTLS_SHA256_PROCESS_ALT +//#define MBEDTLS_SHA512_PROCESS_ALT +//#define MBEDTLS_DES_SETKEY_ALT +//#define MBEDTLS_DES_CRYPT_ECB_ALT +//#define MBEDTLS_DES3_CRYPT_ECB_ALT +//#define MBEDTLS_AES_SETKEY_ENC_ALT +//#define MBEDTLS_AES_SETKEY_DEC_ALT +//#define MBEDTLS_AES_ENCRYPT_ALT +//#define MBEDTLS_AES_DECRYPT_ALT +//#define MBEDTLS_ECDH_GEN_PUBLIC_ALT +//#define MBEDTLS_ECDH_COMPUTE_SHARED_ALT +//#define MBEDTLS_ECDSA_VERIFY_ALT +//#define MBEDTLS_ECDSA_SIGN_ALT +//#define MBEDTLS_ECDSA_GENKEY_ALT + +/** + * \def MBEDTLS_ECP_INTERNAL_ALT + * + * Expose a part of the internal interface of the Elliptic Curve Point module. + * + * MBEDTLS_ECP__FUNCTION_NAME__ALT: Uncomment a macro to let mbed TLS use your + * alternative core implementation of elliptic curve arithmetic. Keep in mind + * that function prototypes should remain the same. + * + * This partially replaces one function. The header file from mbed TLS is still + * used, in contrast to the MBEDTLS_ECP_ALT flag. The original implementation + * is still present and it is used for group structures not supported by the + * alternative. + * + * Any of these options become available by defining MBEDTLS_ECP_INTERNAL_ALT + * and implementing the following functions: + *      unsigned char mbedtls_internal_ecp_grp_capable( + *          const mbedtls_ecp_group *grp ) + *      int  mbedtls_internal_ecp_init( const mbedtls_ecp_group *grp ) + *      void mbedtls_internal_ecp_deinit( const mbedtls_ecp_group *grp ) + * The mbedtls_internal_ecp_grp_capable function should return 1 if the + * replacement functions implement arithmetic for the given group and 0 + * otherwise. + * The functions mbedtls_internal_ecp_init and mbedtls_internal_ecp_deinit are + * called before and after each point operation and provide an opportunity to + * implement optimized set up and tear down instructions. + * + * Example: In case you uncomment MBEDTLS_ECP_INTERNAL_ALT and + * MBEDTLS_ECP_DOUBLE_JAC_ALT, mbed TLS will still provide the ecp_double_jac + * function, but will use your mbedtls_internal_ecp_double_jac if the group is + * supported (your mbedtls_internal_ecp_grp_capable function returns 1 when + * receives it as an argument). If the group is not supported then the original + * implementation is used. The other functions and the definition of + * mbedtls_ecp_group and mbedtls_ecp_point will not change, so your + * implementation of mbedtls_internal_ecp_double_jac and + * mbedtls_internal_ecp_grp_capable must be compatible with this definition. + * + * Uncomment a macro to enable alternate implementation of the corresponding + * function. + */ +/* Required for all the functions in this section */ +//#define MBEDTLS_ECP_INTERNAL_ALT +/* Support for Weierstrass curves with Jacobi representation */ +//#define MBEDTLS_ECP_RANDOMIZE_JAC_ALT +//#define MBEDTLS_ECP_ADD_MIXED_ALT +//#define MBEDTLS_ECP_DOUBLE_JAC_ALT +//#define MBEDTLS_ECP_NORMALIZE_JAC_MANY_ALT +//#define MBEDTLS_ECP_NORMALIZE_JAC_ALT +/* Support for curves with Montgomery arithmetic */ +//#define MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT +//#define MBEDTLS_ECP_RANDOMIZE_MXZ_ALT +//#define MBEDTLS_ECP_NORMALIZE_MXZ_ALT + +/** + * \def MBEDTLS_TEST_NULL_ENTROPY + * + * Enables testing and use of mbed TLS without any configured entropy sources. + * This permits use of the library on platforms before an entropy source has + * been integrated (see for example the MBEDTLS_ENTROPY_HARDWARE_ALT or the + * MBEDTLS_ENTROPY_NV_SEED switches). + * + * WARNING! This switch MUST be disabled in production builds, and is suitable + * only for development. + * Enabling the switch negates any security provided by the library. + * + * Requires MBEDTLS_ENTROPY_C, MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES + * + */ +//#define MBEDTLS_TEST_NULL_ENTROPY + +/** + * \def MBEDTLS_ENTROPY_HARDWARE_ALT + * + * Uncomment this macro to let mbed TLS use your own implementation of a + * hardware entropy collector. + * + * Your function must be called \c mbedtls_hardware_poll(), have the same + * prototype as declared in entropy_poll.h, and accept NULL as first argument. + * + * Uncomment to use your own hardware entropy collector. + */ +//#define MBEDTLS_ENTROPY_HARDWARE_ALT + +/** + * \def MBEDTLS_AES_ROM_TABLES + * + * Store the AES tables in ROM. + * + * Uncomment this macro to store the AES tables in ROM. + */ +//#define MBEDTLS_AES_ROM_TABLES + +/** + * \def MBEDTLS_CAMELLIA_SMALL_MEMORY + * + * Use less ROM for the Camellia implementation (saves about 768 bytes). + * + * Uncomment this macro to use less memory for Camellia. + */ +//#define MBEDTLS_CAMELLIA_SMALL_MEMORY + +/** + * \def MBEDTLS_CIPHER_MODE_CBC + * + * Enable Cipher Block Chaining mode (CBC) for symmetric ciphers. + */ +#define MBEDTLS_CIPHER_MODE_CBC + +/** + * \def MBEDTLS_CIPHER_MODE_CFB + * + * Enable Cipher Feedback mode (CFB) for symmetric ciphers. + */ +#define MBEDTLS_CIPHER_MODE_CFB + +/** + * \def MBEDTLS_CIPHER_MODE_CTR + * + * Enable Counter Block Cipher mode (CTR) for symmetric ciphers. + */ +#define MBEDTLS_CIPHER_MODE_CTR + +/** + * \def MBEDTLS_CIPHER_NULL_CIPHER + * + * Enable NULL cipher. + * Warning: Only do so when you know what you are doing. This allows for + * encryption or channels without any security! + * + * Requires MBEDTLS_ENABLE_WEAK_CIPHERSUITES as well to enable + * the following ciphersuites: + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_NULL_SHA + *      MBEDTLS_TLS_ECDH_RSA_WITH_NULL_SHA + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_NULL_SHA + *      MBEDTLS_TLS_ECDHE_RSA_WITH_NULL_SHA + *      MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA384 + *      MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA256 + *      MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA + *      MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA384 + *      MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA256 + *      MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA + *      MBEDTLS_TLS_RSA_WITH_NULL_SHA256 + *      MBEDTLS_TLS_RSA_WITH_NULL_SHA + *      MBEDTLS_TLS_RSA_WITH_NULL_MD5 + *      MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA384 + *      MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA256 + *      MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA + *      MBEDTLS_TLS_PSK_WITH_NULL_SHA384 + *      MBEDTLS_TLS_PSK_WITH_NULL_SHA256 + *      MBEDTLS_TLS_PSK_WITH_NULL_SHA + * + * Uncomment this macro to enable the NULL cipher and ciphersuites + */ +//#define MBEDTLS_CIPHER_NULL_CIPHER + +/** + * \def MBEDTLS_CIPHER_PADDING_PKCS7 + * + * MBEDTLS_CIPHER_PADDING_XXX: Uncomment or comment macros to add support for + * specific padding modes in the cipher layer with cipher modes that support + * padding (e.g. CBC) + * + * If you disable all padding modes, only full blocks can be used with CBC. + * + * Enable padding modes in the cipher layer. + */ +#define MBEDTLS_CIPHER_PADDING_PKCS7 +#define MBEDTLS_CIPHER_PADDING_ONE_AND_ZEROS +#define MBEDTLS_CIPHER_PADDING_ZEROS_AND_LEN +#define MBEDTLS_CIPHER_PADDING_ZEROS + +/** + * \def MBEDTLS_ENABLE_WEAK_CIPHERSUITES + * + * Enable weak ciphersuites in SSL / TLS. + * Warning: Only do so when you know what you are doing. This allows for + * channels with virtually no security at all! + * + * This enables the following ciphersuites: + *      MBEDTLS_TLS_RSA_WITH_DES_CBC_SHA + *      MBEDTLS_TLS_DHE_RSA_WITH_DES_CBC_SHA + * + * Uncomment this macro to enable weak ciphersuites + * + * \warning   DES is considered a weak cipher and its use constitutes a + *            security risk. We recommend considering stronger ciphers instead. + */ +//#define MBEDTLS_ENABLE_WEAK_CIPHERSUITES + +/** + * \def MBEDTLS_REMOVE_ARC4_CIPHERSUITES + * + * Remove RC4 ciphersuites by default in SSL / TLS. + * This flag removes the ciphersuites based on RC4 from the default list as + * returned by mbedtls_ssl_list_ciphersuites(). However, it is still possible to + * enable (some of) them with mbedtls_ssl_conf_ciphersuites() by including them + * explicitly. + * + * Uncomment this macro to remove RC4 ciphersuites by default. + */ +#define MBEDTLS_REMOVE_ARC4_CIPHERSUITES + +/** + * \def MBEDTLS_ECP_DP_SECP192R1_ENABLED + * + * MBEDTLS_ECP_XXXX_ENABLED: Enables specific curves within the Elliptic Curve + * module.  By default all supported curves are enabled. + * + * Comment macros to disable the curve and functions for it + */ +#define MBEDTLS_ECP_DP_SECP192R1_ENABLED +#define MBEDTLS_ECP_DP_SECP224R1_ENABLED +#define MBEDTLS_ECP_DP_SECP256R1_ENABLED +#define MBEDTLS_ECP_DP_SECP384R1_ENABLED +#define MBEDTLS_ECP_DP_SECP521R1_ENABLED +#define MBEDTLS_ECP_DP_SECP192K1_ENABLED +#define MBEDTLS_ECP_DP_SECP224K1_ENABLED +#define MBEDTLS_ECP_DP_SECP256K1_ENABLED +#define MBEDTLS_ECP_DP_BP256R1_ENABLED +#define MBEDTLS_ECP_DP_BP384R1_ENABLED +#define MBEDTLS_ECP_DP_BP512R1_ENABLED +#define MBEDTLS_ECP_DP_CURVE25519_ENABLED + +/** + * \def MBEDTLS_ECP_NIST_OPTIM + * + * Enable specific 'modulo p' routines for each NIST prime. + * Depending on the prime and architecture, makes operations 4 to 8 times + * faster on the corresponding curve. + * + * Comment this macro to disable NIST curves optimisation. + */ +#define MBEDTLS_ECP_NIST_OPTIM + +/** + * \def MBEDTLS_ECDSA_DETERMINISTIC + * + * Enable deterministic ECDSA (RFC 6979). + * Standard ECDSA is "fragile" in the sense that lack of entropy when signing + * may result in a compromise of the long-term signing key. This is avoided by + * the deterministic variant. + * + * Requires: MBEDTLS_HMAC_DRBG_C + * + * Comment this macro to disable deterministic ECDSA. + */ +#define MBEDTLS_ECDSA_DETERMINISTIC + +/** + * \def MBEDTLS_KEY_EXCHANGE_PSK_ENABLED + * + * Enable the PSK based ciphersuite modes in SSL / TLS. + * + * This enables the following ciphersuites (if other requisites are + * enabled as well): + *      MBEDTLS_TLS_PSK_WITH_AES_256_GCM_SHA384 + *      MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA384 + *      MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384 + *      MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384 + *      MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256 + *      MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256 + *      MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA + *      MBEDTLS_TLS_PSK_WITH_RC4_128_SHA + */ +#define MBEDTLS_KEY_EXCHANGE_PSK_ENABLED + +/** + * \def MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED + * + * Enable the DHE-PSK based ciphersuite modes in SSL / TLS. + * + * Requires: MBEDTLS_DHM_C + * + * This enables the following ciphersuites (if other requisites are + * enabled as well): + *      MBEDTLS_TLS_DHE_PSK_WITH_AES_256_GCM_SHA384 + *      MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384 + *      MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384 + *      MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 + *      MBEDTLS_TLS_DHE_PSK_WITH_AES_128_GCM_SHA256 + *      MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256 + *      MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA + *      MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA + * + * \warning    Using DHE constitutes a security risk as it + *             is not possible to validate custom DH parameters. + *             If possible, it is recommended users should consider + *             preferring other methods of key exchange. + *             See dhm.h for more details. + * + */ +#define MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED + +/** + * \def MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED + * + * Enable the ECDHE-PSK based ciphersuite modes in SSL / TLS. + * + * Requires: MBEDTLS_ECDH_C + * + * This enables the following ciphersuites (if other requisites are + * enabled as well): + *      MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384 + *      MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 + *      MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA + *      MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA + */ +#define MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED + +/** + * \def MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED + * + * Enable the RSA-PSK based ciphersuite modes in SSL / TLS. + * + * Requires: MBEDTLS_RSA_C, MBEDTLS_PKCS1_V15, + *           MBEDTLS_X509_CRT_PARSE_C + * + * This enables the following ciphersuites (if other requisites are + * enabled as well): + *      MBEDTLS_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384 + *      MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384 + *      MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384 + *      MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384 + *      MBEDTLS_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256 + *      MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256 + *      MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA + *      MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA + */ +#define MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED + +/** + * \def MBEDTLS_KEY_EXCHANGE_RSA_ENABLED + * + * Enable the RSA-only based ciphersuite modes in SSL / TLS. + * + * Requires: MBEDTLS_RSA_C, MBEDTLS_PKCS1_V15, + *           MBEDTLS_X509_CRT_PARSE_C + * + * This enables the following ciphersuites (if other requisites are + * enabled as well): + *      MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 + *      MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 + *      MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384 + *      MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 + *      MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA + *      MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 + *      MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256 + *      MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA + *      MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA + *      MBEDTLS_TLS_RSA_WITH_RC4_128_SHA + *      MBEDTLS_TLS_RSA_WITH_RC4_128_MD5 + */ +#define MBEDTLS_KEY_EXCHANGE_RSA_ENABLED + +/** + * \def MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED + * + * Enable the DHE-RSA based ciphersuite modes in SSL / TLS. + * + * Requires: MBEDTLS_DHM_C, MBEDTLS_RSA_C, MBEDTLS_PKCS1_V15, + *           MBEDTLS_X509_CRT_PARSE_C + * + * This enables the following ciphersuites (if other requisites are + * enabled as well): + *      MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 + *      MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 + *      MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 + *      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 + *      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA + *      MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 + *      MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 + *      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA + *      MBEDTLS_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA + * + * \warning    Using DHE constitutes a security risk as it + *             is not possible to validate custom DH parameters. + *             If possible, it is recommended users should consider + *             preferring other methods of key exchange. + *             See dhm.h for more details. + * + */ +#define MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED + +/** + * \def MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED + * + * Enable the ECDHE-RSA based ciphersuite modes in SSL / TLS. + * + * Requires: MBEDTLS_ECDH_C, MBEDTLS_RSA_C, MBEDTLS_PKCS1_V15, + *           MBEDTLS_X509_CRT_PARSE_C + * + * This enables the following ciphersuites (if other requisites are + * enabled as well): + *      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + *      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 + *      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 + *      MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 + *      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 + *      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 + *      MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA + *      MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA + */ +#define MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED + +/** + * \def MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED + * + * Enable the ECDHE-ECDSA based ciphersuite modes in SSL / TLS. + * + * Requires: MBEDTLS_ECDH_C, MBEDTLS_ECDSA_C, MBEDTLS_X509_CRT_PARSE_C, + * + * This enables the following ciphersuites (if other requisites are + * enabled as well): + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA + */ +#define MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED + +/** + * \def MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED + * + * Enable the ECDH-ECDSA based ciphersuite modes in SSL / TLS. + * + * Requires: MBEDTLS_ECDH_C, MBEDTLS_X509_CRT_PARSE_C + * + * This enables the following ciphersuites (if other requisites are + * enabled as well): + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_RC4_128_SHA + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 + */ +#define MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED + +/** + * \def MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED + * + * Enable the ECDH-RSA based ciphersuite modes in SSL / TLS. + * + * Requires: MBEDTLS_ECDH_C, MBEDTLS_X509_CRT_PARSE_C + * + * This enables the following ciphersuites (if other requisites are + * enabled as well): + *      MBEDTLS_TLS_ECDH_RSA_WITH_RC4_128_SHA + *      MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA + *      MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 + *      MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 + *      MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 + *      MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 + *      MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256 + *      MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384 + */ +#define MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED + +/** + * \def MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED + * + * Enable the ECJPAKE based ciphersuite modes in SSL / TLS. + * + * \warning This is currently experimental. EC J-PAKE support is based on the + * Thread v1.0.0 specification; incompatible changes to the specification + * might still happen. For this reason, this is disabled by default. + * + * Requires: MBEDTLS_ECJPAKE_C + *           MBEDTLS_SHA256_C + *           MBEDTLS_ECP_DP_SECP256R1_ENABLED + * + * This enables the following ciphersuites (if other requisites are + * enabled as well): + *      MBEDTLS_TLS_ECJPAKE_WITH_AES_128_CCM_8 + */ +//#define MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED + +/** + * \def MBEDTLS_PK_PARSE_EC_EXTENDED + * + * Enhance support for reading EC keys using variants of SEC1 not allowed by + * RFC 5915 and RFC 5480. + * + * Currently this means parsing the SpecifiedECDomain choice of EC + * parameters (only known groups are supported, not arbitrary domains, to + * avoid validation issues). + * + * Disable if you only need to support RFC 5915 + 5480 key formats. + */ +#define MBEDTLS_PK_PARSE_EC_EXTENDED + +/** + * \def MBEDTLS_ERROR_STRERROR_DUMMY + * + * Enable a dummy error function to make use of mbedtls_strerror() in + * third party libraries easier when MBEDTLS_ERROR_C is disabled + * (no effect when MBEDTLS_ERROR_C is enabled). + * + * You can safely disable this if MBEDTLS_ERROR_C is enabled, or if you're + * not using mbedtls_strerror() or error_strerror() in your application. + * + * Disable if you run into name conflicts and want to really remove the + * mbedtls_strerror() + */ +#define MBEDTLS_ERROR_STRERROR_DUMMY + +/** + * \def MBEDTLS_GENPRIME + * + * Enable the prime-number generation code. + * + * Requires: MBEDTLS_BIGNUM_C + */ +#define MBEDTLS_GENPRIME + +/** + * \def MBEDTLS_FS_IO + * + * Enable functions that use the filesystem. + */ +#define MBEDTLS_FS_IO + +/** + * \def MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES + * + * Do not add default entropy sources. These are the platform specific, + * mbedtls_timing_hardclock and HAVEGE based poll functions. + * + * This is useful to have more control over the added entropy sources in an + * application. + * + * Uncomment this macro to prevent loading of default entropy functions. + */ +//#define MBEDTLS_NO_DEFAULT_ENTROPY_SOURCES + +/** + * \def MBEDTLS_NO_PLATFORM_ENTROPY + * + * Do not use built-in platform entropy functions. + * This is useful if your platform does not support + * standards like the /dev/urandom or Windows CryptoAPI. + * + * Uncomment this macro to disable the built-in platform entropy functions. + */ +//#define MBEDTLS_NO_PLATFORM_ENTROPY + +/** + * \def MBEDTLS_ENTROPY_FORCE_SHA256 + * + * Force the entropy accumulator to use a SHA-256 accumulator instead of the + * default SHA-512 based one (if both are available). + * + * Requires: MBEDTLS_SHA256_C + * + * On 32-bit systems SHA-256 can be much faster than SHA-512. Use this option + * if you have performance concerns. + * + * This option is only useful if both MBEDTLS_SHA256_C and + * MBEDTLS_SHA512_C are defined. Otherwise the available hash module is used. + */ +//#define MBEDTLS_ENTROPY_FORCE_SHA256 + +/** + * \def MBEDTLS_ENTROPY_NV_SEED + * + * Enable the non-volatile (NV) seed file-based entropy source. + * (Also enables the NV seed read/write functions in the platform layer) + * + * This is crucial (if not required) on systems that do not have a + * cryptographic entropy source (in hardware or kernel) available. + * + * Requires: MBEDTLS_ENTROPY_C, MBEDTLS_PLATFORM_C + * + * \note The read/write functions that are used by the entropy source are + *       determined in the platform layer, and can be modified at runtime and/or + *       compile-time depending on the flags (MBEDTLS_PLATFORM_NV_SEED_*) used. + * + * \note If you use the default implementation functions that read a seedfile + *       with regular fopen(), please make sure you make a seedfile with the + *       proper name (defined in MBEDTLS_PLATFORM_STD_NV_SEED_FILE) and at + *       least MBEDTLS_ENTROPY_BLOCK_SIZE bytes in size that can be read from + *       and written to or you will get an entropy source error! The default + *       implementation will only use the first MBEDTLS_ENTROPY_BLOCK_SIZE + *       bytes from the file. + * + * \note The entropy collector will write to the seed file before entropy is + *       given to an external source, to update it. + */ +//#define MBEDTLS_ENTROPY_NV_SEED + +/** + * \def MBEDTLS_MEMORY_DEBUG + * + * Enable debugging of buffer allocator memory issues. Automatically prints + * (to stderr) all (fatal) messages on memory allocation issues. Enables + * function for 'debug output' of allocated memory. + * + * Requires: MBEDTLS_MEMORY_BUFFER_ALLOC_C + * + * Uncomment this macro to let the buffer allocator print out error messages. + */ +//#define MBEDTLS_MEMORY_DEBUG + +/** + * \def MBEDTLS_MEMORY_BACKTRACE + * + * Include backtrace information with each allocated block. + * + * Requires: MBEDTLS_MEMORY_BUFFER_ALLOC_C + *           GLIBC-compatible backtrace() an backtrace_symbols() support + * + * Uncomment this macro to include backtrace information + */ +//#define MBEDTLS_MEMORY_BACKTRACE + +/** + * \def MBEDTLS_PK_RSA_ALT_SUPPORT + * + * Support external private RSA keys (eg from a HSM) in the PK layer. + * + * Comment this macro to disable support for external private RSA keys. + */ +#define MBEDTLS_PK_RSA_ALT_SUPPORT + +/** + * \def MBEDTLS_PKCS1_V15 + * + * Enable support for PKCS#1 v1.5 encoding. + * + * Requires: MBEDTLS_RSA_C + * + * This enables support for PKCS#1 v1.5 operations. + */ +#define MBEDTLS_PKCS1_V15 + +/** + * \def MBEDTLS_PKCS1_V21 + * + * Enable support for PKCS#1 v2.1 encoding. + * + * Requires: MBEDTLS_MD_C, MBEDTLS_RSA_C + * + * This enables support for RSAES-OAEP and RSASSA-PSS operations. + */ +#define MBEDTLS_PKCS1_V21 + +/** + * \def MBEDTLS_RSA_NO_CRT + * + * Do not use the Chinese Remainder Theorem for the RSA private operation. + * + * Uncomment this macro to disable the use of CRT in RSA. + * + */ +//#define MBEDTLS_RSA_NO_CRT + +/** + * \def MBEDTLS_SELF_TEST + * + * Enable the checkup functions (*_self_test). + */ +#define MBEDTLS_SELF_TEST + +/** + * \def MBEDTLS_SHA256_SMALLER + * + * Enable an implementation of SHA-256 that has lower ROM footprint but also + * lower performance. + * + * The default implementation is meant to be a reasonnable compromise between + * performance and size. This version optimizes more aggressively for size at + * the expense of performance. Eg on Cortex-M4 it reduces the size of + * mbedtls_sha256_process() from ~2KB to ~0.5KB for a performance hit of about + * 30%. + * + * Uncomment to enable the smaller implementation of SHA256. + */ +//#define MBEDTLS_SHA256_SMALLER + +/** + * \def MBEDTLS_SSL_ALL_ALERT_MESSAGES + * + * Enable sending of alert messages in case of encountered errors as per RFC. + * If you choose not to send the alert messages, mbed TLS can still communicate + * with other servers, only debugging of failures is harder. + * + * The advantage of not sending alert messages, is that no information is given + * about reasons for failures thus preventing adversaries of gaining intel. + * + * Enable sending of all alert messages + */ +#define MBEDTLS_SSL_ALL_ALERT_MESSAGES + +/** + * \def MBEDTLS_SSL_DEBUG_ALL + * + * Enable the debug messages in SSL module for all issues. + * Debug messages have been disabled in some places to prevent timing + * attacks due to (unbalanced) debugging function calls. + * + * If you need all error reporting you should enable this during debugging, + * but remove this for production servers that should log as well. + * + * Uncomment this macro to report all debug messages on errors introducing + * a timing side-channel. + * + */ +//#define MBEDTLS_SSL_DEBUG_ALL + +/** \def MBEDTLS_SSL_ENCRYPT_THEN_MAC + * + * Enable support for Encrypt-then-MAC, RFC 7366. + * + * This allows peers that both support it to use a more robust protection for + * ciphersuites using CBC, providing deep resistance against timing attacks + * on the padding or underlying cipher. + * + * This only affects CBC ciphersuites, and is useless if none is defined. + * + * Requires: MBEDTLS_SSL_PROTO_TLS1    or + *           MBEDTLS_SSL_PROTO_TLS1_1  or + *           MBEDTLS_SSL_PROTO_TLS1_2 + * + * Comment this macro to disable support for Encrypt-then-MAC + */ +#define MBEDTLS_SSL_ENCRYPT_THEN_MAC + +/** \def MBEDTLS_SSL_EXTENDED_MASTER_SECRET + * + * Enable support for Extended Master Secret, aka Session Hash + * (draft-ietf-tls-session-hash-02). + * + * This was introduced as "the proper fix" to the Triple Handshake familiy of + * attacks, but it is recommended to always use it (even if you disable + * renegotiation), since it actually fixes a more fundamental issue in the + * original SSL/TLS design, and has implications beyond Triple Handshake. + * + * Requires: MBEDTLS_SSL_PROTO_TLS1    or + *           MBEDTLS_SSL_PROTO_TLS1_1  or + *           MBEDTLS_SSL_PROTO_TLS1_2 + * + * Comment this macro to disable support for Extended Master Secret. + */ +#define MBEDTLS_SSL_EXTENDED_MASTER_SECRET + +/** + * \def MBEDTLS_SSL_FALLBACK_SCSV + * + * Enable support for FALLBACK_SCSV (draft-ietf-tls-downgrade-scsv-00). + * + * For servers, it is recommended to always enable this, unless you support + * only one version of TLS, or know for sure that none of your clients + * implements a fallback strategy. + * + * For clients, you only need this if you're using a fallback strategy, which + * is not recommended in the first place, unless you absolutely need it to + * interoperate with buggy (version-intolerant) servers. + * + * Comment this macro to disable support for FALLBACK_SCSV + */ +#define MBEDTLS_SSL_FALLBACK_SCSV + +/** + * \def MBEDTLS_SSL_HW_RECORD_ACCEL + * + * Enable hooking functions in SSL module for hardware acceleration of + * individual records. + * + * Uncomment this macro to enable hooking functions. + */ +//#define MBEDTLS_SSL_HW_RECORD_ACCEL + +/** + * \def MBEDTLS_SSL_CBC_RECORD_SPLITTING + * + * Enable 1/n-1 record splitting for CBC mode in SSLv3 and TLS 1.0. + * + * This is a countermeasure to the BEAST attack, which also minimizes the risk + * of interoperability issues compared to sending 0-length records. + * + * Comment this macro to disable 1/n-1 record splitting. + */ +#define MBEDTLS_SSL_CBC_RECORD_SPLITTING + +/** + * \def MBEDTLS_SSL_RENEGOTIATION + * + * Disable support for TLS renegotiation. + * + * The two main uses of renegotiation are (1) refresh keys on long-lived + * connections and (2) client authentication after the initial handshake. + * If you don't need renegotiation, it's probably better to disable it, since + * it has been associated with security issues in the past and is easy to + * misuse/misunderstand. + * + * Comment this to disable support for renegotiation. + * + * \note   Even if this option is disabled, both client and server are aware + *         of the Renegotiation Indication Extension (RFC 5746) used to + *         prevent the SSL renegotiation attack (see RFC 5746 Sect. 1). + *         (See \c mbedtls_ssl_conf_legacy_renegotiation for the + *          configuration of this extension). + * + */ +#define MBEDTLS_SSL_RENEGOTIATION + +/** + * \def MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO + * + * Enable support for receiving and parsing SSLv2 Client Hello messages for the + * SSL Server module (MBEDTLS_SSL_SRV_C). + * + * Uncomment this macro to enable support for SSLv2 Client Hello messages. + */ +//#define MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO + +/** + * \def MBEDTLS_SSL_SRV_RESPECT_CLIENT_PREFERENCE + * + * Pick the ciphersuite according to the client's preferences rather than ours + * in the SSL Server module (MBEDTLS_SSL_SRV_C). + * + * Uncomment this macro to respect client's ciphersuite order + */ +//#define MBEDTLS_SSL_SRV_RESPECT_CLIENT_PREFERENCE + +/** + * \def MBEDTLS_SSL_MAX_FRAGMENT_LENGTH + * + * Enable support for RFC 6066 max_fragment_length extension in SSL. + * + * Comment this macro to disable support for the max_fragment_length extension + */ +#define MBEDTLS_SSL_MAX_FRAGMENT_LENGTH + +/** + * \def MBEDTLS_SSL_PROTO_SSL3 + * + * Enable support for SSL 3.0. + * + * Requires: MBEDTLS_MD5_C + *           MBEDTLS_SHA1_C + * + * Comment this macro to disable support for SSL 3.0 + */ +//#define MBEDTLS_SSL_PROTO_SSL3 + +/** + * \def MBEDTLS_SSL_PROTO_TLS1 + * + * Enable support for TLS 1.0. + * + * Requires: MBEDTLS_MD5_C + *           MBEDTLS_SHA1_C + * + * Comment this macro to disable support for TLS 1.0 + */ +#define MBEDTLS_SSL_PROTO_TLS1 + +/** + * \def MBEDTLS_SSL_PROTO_TLS1_1 + * + * Enable support for TLS 1.1 (and DTLS 1.0 if DTLS is enabled). + * + * Requires: MBEDTLS_MD5_C + *           MBEDTLS_SHA1_C + * + * Comment this macro to disable support for TLS 1.1 / DTLS 1.0 + */ +#define MBEDTLS_SSL_PROTO_TLS1_1 + +/** + * \def MBEDTLS_SSL_PROTO_TLS1_2 + * + * Enable support for TLS 1.2 (and DTLS 1.2 if DTLS is enabled). + * + * Requires: MBEDTLS_SHA1_C or MBEDTLS_SHA256_C or MBEDTLS_SHA512_C + *           (Depends on ciphersuites) + * + * Comment this macro to disable support for TLS 1.2 / DTLS 1.2 + */ +#define MBEDTLS_SSL_PROTO_TLS1_2 + +/** + * \def MBEDTLS_SSL_PROTO_DTLS + * + * Enable support for DTLS (all available versions). + * + * Enable this and MBEDTLS_SSL_PROTO_TLS1_1 to enable DTLS 1.0, + * and/or this and MBEDTLS_SSL_PROTO_TLS1_2 to enable DTLS 1.2. + * + * Requires: MBEDTLS_SSL_PROTO_TLS1_1 + *        or MBEDTLS_SSL_PROTO_TLS1_2 + * + * Comment this macro to disable support for DTLS + */ +#define MBEDTLS_SSL_PROTO_DTLS + +/** + * \def MBEDTLS_SSL_ALPN + * + * Enable support for RFC 7301 Application Layer Protocol Negotiation. + * + * Comment this macro to disable support for ALPN. + */ +#define MBEDTLS_SSL_ALPN + +/** + * \def MBEDTLS_SSL_DTLS_ANTI_REPLAY + * + * Enable support for the anti-replay mechanism in DTLS. + * + * Requires: MBEDTLS_SSL_TLS_C + *           MBEDTLS_SSL_PROTO_DTLS + * + * \warning Disabling this is often a security risk! + * See mbedtls_ssl_conf_dtls_anti_replay() for details. + * + * Comment this to disable anti-replay in DTLS. + */ +#define MBEDTLS_SSL_DTLS_ANTI_REPLAY + +/** + * \def MBEDTLS_SSL_DTLS_HELLO_VERIFY + * + * Enable support for HelloVerifyRequest on DTLS servers. + * + * This feature is highly recommended to prevent DTLS servers being used as + * amplifiers in DoS attacks against other hosts. It should always be enabled + * unless you know for sure amplification cannot be a problem in the + * environment in which your server operates. + * + * \warning Disabling this can ba a security risk! (see above) + * + * Requires: MBEDTLS_SSL_PROTO_DTLS + * + * Comment this to disable support for HelloVerifyRequest. + */ +#define MBEDTLS_SSL_DTLS_HELLO_VERIFY + +/** + * \def MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE + * + * Enable server-side support for clients that reconnect from the same port. + * + * Some clients unexpectedly close the connection and try to reconnect using the + * same source port. This needs special support from the server to handle the + * new connection securely, as described in section 4.2.8 of RFC 6347. This + * flag enables that support. + * + * Requires: MBEDTLS_SSL_DTLS_HELLO_VERIFY + * + * Comment this to disable support for clients reusing the source port. + */ +#define MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE + +/** + * \def MBEDTLS_SSL_DTLS_BADMAC_LIMIT + * + * Enable support for a limit of records with bad MAC. + * + * See mbedtls_ssl_conf_dtls_badmac_limit(). + * + * Requires: MBEDTLS_SSL_PROTO_DTLS + */ +#define MBEDTLS_SSL_DTLS_BADMAC_LIMIT + +/** + * \def MBEDTLS_SSL_SESSION_TICKETS + * + * Enable support for RFC 5077 session tickets in SSL. + * Client-side, provides full support for session tickets (maintainance of a + * session store remains the responsibility of the application, though). + * Server-side, you also need to provide callbacks for writing and parsing + * tickets, including authenticated encryption and key management. Example + * callbacks are provided by MBEDTLS_SSL_TICKET_C. + * + * Comment this macro to disable support for SSL session tickets + */ +#define MBEDTLS_SSL_SESSION_TICKETS + +/** + * \def MBEDTLS_SSL_EXPORT_KEYS + * + * Enable support for exporting key block and master secret. + * This is required for certain users of TLS, e.g. EAP-TLS. + * + * Comment this macro to disable support for key export + */ +#define MBEDTLS_SSL_EXPORT_KEYS + +/** + * \def MBEDTLS_SSL_SERVER_NAME_INDICATION + * + * Enable support for RFC 6066 server name indication (SNI) in SSL. + * + * Requires: MBEDTLS_X509_CRT_PARSE_C + * + * Comment this macro to disable support for server name indication in SSL + */ +#define MBEDTLS_SSL_SERVER_NAME_INDICATION + +/** + * \def MBEDTLS_SSL_TRUNCATED_HMAC + * + * Enable support for RFC 6066 truncated HMAC in SSL. + * + * Comment this macro to disable support for truncated HMAC in SSL + */ +#define MBEDTLS_SSL_TRUNCATED_HMAC + +/** + * \def MBEDTLS_THREADING_ALT + * + * Provide your own alternate threading implementation. + * + * Requires: MBEDTLS_THREADING_C + * + * Uncomment this to allow your own alternate threading implementation. + */ +//#define MBEDTLS_THREADING_ALT + +/** + * \def MBEDTLS_THREADING_PTHREAD + * + * Enable the pthread wrapper layer for the threading layer. + * + * Requires: MBEDTLS_THREADING_C + * + * Uncomment this to enable pthread mutexes. + */ +//#define MBEDTLS_THREADING_PTHREAD + +/** + * \def MBEDTLS_VERSION_FEATURES + * + * Allow run-time checking of compile-time enabled features. Thus allowing users + * to check at run-time if the library is for instance compiled with threading + * support via mbedtls_version_check_feature(). + * + * Requires: MBEDTLS_VERSION_C + * + * Comment this to disable run-time checking and save ROM space + */ +#define MBEDTLS_VERSION_FEATURES + +/** + * \def MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3 + * + * If set, the X509 parser will not break-off when parsing an X509 certificate + * and encountering an extension in a v1 or v2 certificate. + * + * Uncomment to prevent an error. + */ +//#define MBEDTLS_X509_ALLOW_EXTENSIONS_NON_V3 + +/** + * \def MBEDTLS_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION + * + * If set, the X509 parser will not break-off when parsing an X509 certificate + * and encountering an unknown critical extension. + * + * \warning Depending on your PKI use, enabling this can be a security risk! + * + * Uncomment to prevent an error. + */ +//#define MBEDTLS_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION + +/** + * \def MBEDTLS_X509_CHECK_KEY_USAGE + * + * Enable verification of the keyUsage extension (CA and leaf certificates). + * + * Disabling this avoids problems with mis-issued and/or misused + * (intermediate) CA and leaf certificates. + * + * \warning Depending on your PKI use, disabling this can be a security risk! + * + * Comment to skip keyUsage checking for both CA and leaf certificates. + */ +#define MBEDTLS_X509_CHECK_KEY_USAGE + +/** + * \def MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE + * + * Enable verification of the extendedKeyUsage extension (leaf certificates). + * + * Disabling this avoids problems with mis-issued and/or misused certificates. + * + * \warning Depending on your PKI use, disabling this can be a security risk! + * + * Comment to skip extendedKeyUsage checking for certificates. + */ +#define MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE + +/** + * \def MBEDTLS_X509_RSASSA_PSS_SUPPORT + * + * Enable parsing and verification of X.509 certificates, CRLs and CSRS + * signed with RSASSA-PSS (aka PKCS#1 v2.1). + * + * Comment this macro to disallow using RSASSA-PSS in certificates. + */ +#define MBEDTLS_X509_RSASSA_PSS_SUPPORT + +/** + * \def MBEDTLS_ZLIB_SUPPORT + * + * If set, the SSL/TLS module uses ZLIB to support compression and + * decompression of packet data. + * + * \warning TLS-level compression MAY REDUCE SECURITY! See for example the + * CRIME attack. Before enabling this option, you should examine with care if + * CRIME or similar exploits may be a applicable to your use case. + * + * \note Currently compression can't be used with DTLS. + * + * Used in: library/ssl_tls.c + *          library/ssl_cli.c + *          library/ssl_srv.c + * + * This feature requires zlib library and headers to be present. + * + * Uncomment to enable use of ZLIB + */ +//#define MBEDTLS_ZLIB_SUPPORT +/* \} name SECTION: mbed TLS feature support */ + +/** + * \name SECTION: mbed TLS modules + * + * This section enables or disables entire modules in mbed TLS + * \{ + */ + +/** + * \def MBEDTLS_AESNI_C + * + * Enable AES-NI support on x86-64. + * + * Module:  library/aesni.c + * Caller:  library/aes.c + * + * Requires: MBEDTLS_HAVE_ASM + * + * This modules adds support for the AES-NI instructions on x86-64 + */ +#define MBEDTLS_AESNI_C + +/** + * \def MBEDTLS_AES_C + * + * Enable the AES block cipher. + * + * Module:  library/aes.c + * Caller:  library/ssl_tls.c + *          library/pem.c + *          library/ctr_drbg.c + * + * This module enables the following ciphersuites (if other requisites are + * enabled as well): + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 + *      MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 + *      MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 + *      MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 + *      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + *      MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 + *      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 + *      MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 + *      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 + *      MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_DHE_PSK_WITH_AES_256_GCM_SHA384 + *      MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384 + *      MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384 + *      MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_DHE_PSK_WITH_AES_128_GCM_SHA256 + *      MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 + *      MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 + *      MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 + *      MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384 + *      MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384 + *      MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256 + *      MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA + *      MBEDTLS_TLS_PSK_WITH_AES_256_GCM_SHA384 + *      MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA384 + *      MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA + *      MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256 + *      MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA256 + *      MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA + * + * PEM_PARSE uses AES for decrypting encrypted keys. + */ +#define MBEDTLS_AES_C + +/** + * \def MBEDTLS_ARC4_C + * + * Enable the ARCFOUR stream cipher. + * + * Module:  library/arc4.c + * Caller:  library/ssl_tls.c + * + * This module enables the following ciphersuites (if other requisites are + * enabled as well): + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_RC4_128_SHA + *      MBEDTLS_TLS_ECDH_RSA_WITH_RC4_128_SHA + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA + *      MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA + *      MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA + *      MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA + *      MBEDTLS_TLS_RSA_WITH_RC4_128_SHA + *      MBEDTLS_TLS_RSA_WITH_RC4_128_MD5 + *      MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA + *      MBEDTLS_TLS_PSK_WITH_RC4_128_SHA + * + * \warning   ARC4 is considered a weak cipher and its use constitutes a + *            security risk. If possible, we recommend avoidng dependencies on + *            it, and considering stronger ciphers instead. + * + */ +#define MBEDTLS_ARC4_C + +/** + * \def MBEDTLS_ASN1_PARSE_C + * + * Enable the generic ASN1 parser. + * + * Module:  library/asn1.c + * Caller:  library/x509.c + *          library/dhm.c + *          library/pkcs12.c + *          library/pkcs5.c + *          library/pkparse.c + */ +#define MBEDTLS_ASN1_PARSE_C + +/** + * \def MBEDTLS_ASN1_WRITE_C + * + * Enable the generic ASN1 writer. + * + * Module:  library/asn1write.c + * Caller:  library/ecdsa.c + *          library/pkwrite.c + *          library/x509_create.c + *          library/x509write_crt.c + *          library/x509write_csr.c + */ +#define MBEDTLS_ASN1_WRITE_C + +/** + * \def MBEDTLS_BASE64_C + * + * Enable the Base64 module. + * + * Module:  library/base64.c + * Caller:  library/pem.c + * + * This module is required for PEM support (required by X.509). + */ +#define MBEDTLS_BASE64_C + +/** + * \def MBEDTLS_BIGNUM_C + * + * Enable the multi-precision integer library. + * + * Module:  library/bignum.c + * Caller:  library/dhm.c + *          library/ecp.c + *          library/ecdsa.c + *          library/rsa.c + *          library/rsa_internal.c + *          library/ssl_tls.c + * + * This module is required for RSA, DHM and ECC (ECDH, ECDSA) support. + */ +#define MBEDTLS_BIGNUM_C + +/** + * \def MBEDTLS_BLOWFISH_C + * + * Enable the Blowfish block cipher. + * + * Module:  library/blowfish.c + */ +#define MBEDTLS_BLOWFISH_C + +/** + * \def MBEDTLS_CAMELLIA_C + * + * Enable the Camellia block cipher. + * + * Module:  library/camellia.c + * Caller:  library/ssl_tls.c + * + * This module enables the following ciphersuites (if other requisites are + * enabled as well): + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 + *      MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 + *      MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256 + *      MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384 + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 + *      MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 + *      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 + *      MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 + *      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 + *      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 + *      MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 + *      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA + *      MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384 + *      MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 + *      MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 + *      MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256 + *      MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384 + *      MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 + *      MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA + *      MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256 + *      MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA + *      MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384 + *      MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384 + *      MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256 + *      MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256 + *      MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384 + *      MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384 + *      MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256 + *      MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256 + */ +#define MBEDTLS_CAMELLIA_C + +/** + * \def MBEDTLS_CCM_C + * + * Enable the Counter with CBC-MAC (CCM) mode for 128-bit block cipher. + * + * Module:  library/ccm.c + * + * Requires: MBEDTLS_AES_C or MBEDTLS_CAMELLIA_C + * + * This module enables the AES-CCM ciphersuites, if other requisites are + * enabled as well. + */ +#define MBEDTLS_CCM_C + +/** + * \def MBEDTLS_CERTS_C + * + * Enable the test certificates. + * + * Module:  library/certs.c + * Caller: + * + * This module is used for testing (ssl_client/server). + */ +#define MBEDTLS_CERTS_C + +/** + * \def MBEDTLS_CIPHER_C + * + * Enable the generic cipher layer. + * + * Module:  library/cipher.c + * Caller:  library/ssl_tls.c + * + * Uncomment to enable generic cipher wrappers. + */ +#define MBEDTLS_CIPHER_C + +/** + * \def MBEDTLS_CMAC_C + * + * Enable the CMAC (Cipher-based Message Authentication Code) mode for block + * ciphers. + * + * Module:  library/cmac.c + * + * Requires: MBEDTLS_AES_C or MBEDTLS_DES_C + * + */ +//#define MBEDTLS_CMAC_C + +/** + * \def MBEDTLS_CTR_DRBG_C + * + * Enable the CTR_DRBG AES-256-based random generator. + * + * Module:  library/ctr_drbg.c + * Caller: + * + * Requires: MBEDTLS_AES_C + * + * This module provides the CTR_DRBG AES-256 random number generator. + */ +#define MBEDTLS_CTR_DRBG_C + +/** + * \def MBEDTLS_DEBUG_C + * + * Enable the debug functions. + * + * Module:  library/debug.c + * Caller:  library/ssl_cli.c + *          library/ssl_srv.c + *          library/ssl_tls.c + * + * This module provides debugging functions. + */ +#define MBEDTLS_DEBUG_C + +/** + * \def MBEDTLS_DES_C + * + * Enable the DES block cipher. + * + * Module:  library/des.c + * Caller:  library/pem.c + *          library/ssl_tls.c + * + * This module enables the following ciphersuites (if other requisites are + * enabled as well): + *      MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA + *      MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA + *      MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA + *      MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA + *      MBEDTLS_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA + *      MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA + *      MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA + *      MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA + *      MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA + *      MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA + * + * PEM_PARSE uses DES/3DES for decrypting encrypted keys. + * + * \warning   DES is considered a weak cipher and its use constitutes a + *            security risk. We recommend considering stronger ciphers instead. + */ +#define MBEDTLS_DES_C + +/** + * \def MBEDTLS_DHM_C + * + * Enable the Diffie-Hellman-Merkle module. + * + * Module:  library/dhm.c + * Caller:  library/ssl_cli.c + *          library/ssl_srv.c + * + * This module is used by the following key exchanges: + *      DHE-RSA, DHE-PSK + * + * \warning    Using DHE constitutes a security risk as it + *             is not possible to validate custom DH parameters. + *             If possible, it is recommended users should consider + *             preferring other methods of key exchange. + *             See dhm.h for more details. + * + */ +#define MBEDTLS_DHM_C + +/** + * \def MBEDTLS_ECDH_C + * + * Enable the elliptic curve Diffie-Hellman library. + * + * Module:  library/ecdh.c + * Caller:  library/ssl_cli.c + *          library/ssl_srv.c + * + * This module is used by the following key exchanges: + *      ECDHE-ECDSA, ECDHE-RSA, DHE-PSK + * + * Requires: MBEDTLS_ECP_C + */ +#define MBEDTLS_ECDH_C + +/** + * \def MBEDTLS_ECDSA_C + * + * Enable the elliptic curve DSA library. + * + * Module:  library/ecdsa.c + * Caller: + * + * This module is used by the following key exchanges: + *      ECDHE-ECDSA + * + * Requires: MBEDTLS_ECP_C, MBEDTLS_ASN1_WRITE_C, MBEDTLS_ASN1_PARSE_C + */ +#define MBEDTLS_ECDSA_C + +/** + * \def MBEDTLS_ECJPAKE_C + * + * Enable the elliptic curve J-PAKE library. + * + * \warning This is currently experimental. EC J-PAKE support is based on the + * Thread v1.0.0 specification; incompatible changes to the specification + * might still happen. For this reason, this is disabled by default. + * + * Module:  library/ecjpake.c + * Caller: + * + * This module is used by the following key exchanges: + *      ECJPAKE + * + * Requires: MBEDTLS_ECP_C, MBEDTLS_MD_C + */ +//#define MBEDTLS_ECJPAKE_C + +/** + * \def MBEDTLS_ECP_C + * + * Enable the elliptic curve over GF(p) library. + * + * Module:  library/ecp.c + * Caller:  library/ecdh.c + *          library/ecdsa.c + *          library/ecjpake.c + * + * Requires: MBEDTLS_BIGNUM_C and at least one MBEDTLS_ECP_DP_XXX_ENABLED + */ +#define MBEDTLS_ECP_C + +/** + * \def MBEDTLS_ENTROPY_C + * + * Enable the platform-specific entropy code. + * + * Module:  library/entropy.c + * Caller: + * + * Requires: MBEDTLS_SHA512_C or MBEDTLS_SHA256_C + * + * This module provides a generic entropy pool + */ +#define MBEDTLS_ENTROPY_C + +/** + * \def MBEDTLS_ERROR_C + * + * Enable error code to error string conversion. + * + * Module:  library/error.c + * Caller: + * + * This module enables mbedtls_strerror(). + */ +#define MBEDTLS_ERROR_C + +/** + * \def MBEDTLS_GCM_C + * + * Enable the Galois/Counter Mode (GCM) for AES. + * + * Module:  library/gcm.c + * + * Requires: MBEDTLS_AES_C or MBEDTLS_CAMELLIA_C + * + * This module enables the AES-GCM and CAMELLIA-GCM ciphersuites, if other + * requisites are enabled as well. + */ +#define MBEDTLS_GCM_C + +/** + * \def MBEDTLS_HAVEGE_C + * + * Enable the HAVEGE random generator. + * + * Warning: the HAVEGE random generator is not suitable for virtualized + *          environments + * + * Warning: the HAVEGE random generator is dependent on timing and specific + *          processor traits. It is therefore not advised to use HAVEGE as + *          your applications primary random generator or primary entropy pool + *          input. As a secondary input to your entropy pool, it IS able add + *          the (limited) extra entropy it provides. + * + * Module:  library/havege.c + * Caller: + * + * Requires: MBEDTLS_TIMING_C + * + * Uncomment to enable the HAVEGE random generator. + */ +//#define MBEDTLS_HAVEGE_C + +/** + * \def MBEDTLS_HMAC_DRBG_C + * + * Enable the HMAC_DRBG random generator. + * + * Module:  library/hmac_drbg.c + * Caller: + * + * Requires: MBEDTLS_MD_C + * + * Uncomment to enable the HMAC_DRBG random number geerator. + */ +#define MBEDTLS_HMAC_DRBG_C + +/** + * \def MBEDTLS_MD_C + * + * Enable the generic message digest layer. + * + * Module:  library/md.c + * Caller: + * + * Uncomment to enable generic message digest wrappers. + */ +#define MBEDTLS_MD_C + +/** + * \def MBEDTLS_MD2_C + * + * Enable the MD2 hash algorithm. + * + * Module:  library/md2.c + * Caller: + * + * Uncomment to enable support for (rare) MD2-signed X.509 certs. + * + * \warning   MD2 is considered a weak message digest and its use constitutes a + *            security risk. If possible, we recommend avoiding dependencies on + *            it, and considering stronger message digests instead. + * + */ +//#define MBEDTLS_MD2_C + +/** + * \def MBEDTLS_MD4_C + * + * Enable the MD4 hash algorithm. + * + * Module:  library/md4.c + * Caller: + * + * Uncomment to enable support for (rare) MD4-signed X.509 certs. + * + * \warning   MD4 is considered a weak message digest and its use constitutes a + *            security risk. If possible, we recommend avoiding dependencies on + *            it, and considering stronger message digests instead. + * + */ +//#define MBEDTLS_MD4_C + +/** + * \def MBEDTLS_MD5_C + * + * Enable the MD5 hash algorithm. + * + * Module:  library/md5.c + * Caller:  library/md.c + *          library/pem.c + *          library/ssl_tls.c + * + * This module is required for SSL/TLS up to version 1.1, and for TLS 1.2 + * depending on the handshake parameters. Further, it is used for checking + * MD5-signed certificates, and for PBKDF1 when decrypting PEM-encoded + * encrypted keys. + * + * \warning   MD5 is considered a weak message digest and its use constitutes a + *            security risk. If possible, we recommend avoiding dependencies on + *            it, and considering stronger message digests instead. + * + */ +#define MBEDTLS_MD5_C + +/** + * \def MBEDTLS_MEMORY_BUFFER_ALLOC_C + * + * Enable the buffer allocator implementation that makes use of a (stack) + * based buffer to 'allocate' dynamic memory. (replaces calloc() and free() + * calls) + * + * Module:  library/memory_buffer_alloc.c + * + * Requires: MBEDTLS_PLATFORM_C + *           MBEDTLS_PLATFORM_MEMORY (to use it within mbed TLS) + * + * Enable this module to enable the buffer memory allocator. + */ +//#define MBEDTLS_MEMORY_BUFFER_ALLOC_C + +/** + * \def MBEDTLS_NET_C + * + * Enable the TCP and UDP over IPv6/IPv4 networking routines. + * + * \note This module only works on POSIX/Unix (including Linux, BSD and OS X) + * and Windows. For other platforms, you'll want to disable it, and write your + * own networking callbacks to be passed to \c mbedtls_ssl_set_bio(). + * + * \note See also our Knowledge Base article about porting to a new + * environment: + * https://tls.mbed.org/kb/how-to/how-do-i-port-mbed-tls-to-a-new-environment-OS + * + * Module:  library/net_sockets.c + * + * This module provides networking routines. + */ +#define MBEDTLS_NET_C + +/** + * \def MBEDTLS_OID_C + * + * Enable the OID database. + * + * Module:  library/oid.c + * Caller:  library/asn1write.c + *          library/pkcs5.c + *          library/pkparse.c + *          library/pkwrite.c + *          library/rsa.c + *          library/x509.c + *          library/x509_create.c + *          library/x509_crl.c + *          library/x509_crt.c + *          library/x509_csr.c + *          library/x509write_crt.c + *          library/x509write_csr.c + * + * This modules translates between OIDs and internal values. + */ +#define MBEDTLS_OID_C + +/** + * \def MBEDTLS_PADLOCK_C + * + * Enable VIA Padlock support on x86. + * + * Module:  library/padlock.c + * Caller:  library/aes.c + * + * Requires: MBEDTLS_HAVE_ASM + * + * This modules adds support for the VIA PadLock on x86. + */ +#define MBEDTLS_PADLOCK_C + +/** + * \def MBEDTLS_PEM_PARSE_C + * + * Enable PEM decoding / parsing. + * + * Module:  library/pem.c + * Caller:  library/dhm.c + *          library/pkparse.c + *          library/x509_crl.c + *          library/x509_crt.c + *          library/x509_csr.c + * + * Requires: MBEDTLS_BASE64_C + * + * This modules adds support for decoding / parsing PEM files. + */ +#define MBEDTLS_PEM_PARSE_C + +/** + * \def MBEDTLS_PEM_WRITE_C + * + * Enable PEM encoding / writing. + * + * Module:  library/pem.c + * Caller:  library/pkwrite.c + *          library/x509write_crt.c + *          library/x509write_csr.c + * + * Requires: MBEDTLS_BASE64_C + * + * This modules adds support for encoding / writing PEM files. + */ +#define MBEDTLS_PEM_WRITE_C + +/** + * \def MBEDTLS_PK_C + * + * Enable the generic public (asymetric) key layer. + * + * Module:  library/pk.c + * Caller:  library/ssl_tls.c + *          library/ssl_cli.c + *          library/ssl_srv.c + * + * Requires: MBEDTLS_RSA_C or MBEDTLS_ECP_C + * + * Uncomment to enable generic public key wrappers. + */ +#define MBEDTLS_PK_C + +/** + * \def MBEDTLS_PK_PARSE_C + * + * Enable the generic public (asymetric) key parser. + * + * Module:  library/pkparse.c + * Caller:  library/x509_crt.c + *          library/x509_csr.c + * + * Requires: MBEDTLS_PK_C + * + * Uncomment to enable generic public key parse functions. + */ +#define MBEDTLS_PK_PARSE_C + +/** + * \def MBEDTLS_PK_WRITE_C + * + * Enable the generic public (asymetric) key writer. + * + * Module:  library/pkwrite.c + * Caller:  library/x509write.c + * + * Requires: MBEDTLS_PK_C + * + * Uncomment to enable generic public key write functions. + */ +#define MBEDTLS_PK_WRITE_C + +/** + * \def MBEDTLS_PKCS5_C + * + * Enable PKCS#5 functions. + * + * Module:  library/pkcs5.c + * + * Requires: MBEDTLS_MD_C + * + * This module adds support for the PKCS#5 functions. + */ +#define MBEDTLS_PKCS5_C + +/** + * \def MBEDTLS_PKCS11_C + * + * Enable wrapper for PKCS#11 smartcard support. + * + * Module:  library/pkcs11.c + * Caller:  library/pk.c + * + * Requires: MBEDTLS_PK_C + * + * This module enables SSL/TLS PKCS #11 smartcard support. + * Requires the presence of the PKCS#11 helper library (libpkcs11-helper) + */ +//#define MBEDTLS_PKCS11_C + +/** + * \def MBEDTLS_PKCS12_C + * + * Enable PKCS#12 PBE functions. + * Adds algorithms for parsing PKCS#8 encrypted private keys + * + * Module:  library/pkcs12.c + * Caller:  library/pkparse.c + * + * Requires: MBEDTLS_ASN1_PARSE_C, MBEDTLS_CIPHER_C, MBEDTLS_MD_C + * Can use:  MBEDTLS_ARC4_C + * + * This module enables PKCS#12 functions. + */ +#define MBEDTLS_PKCS12_C + +/** + * \def MBEDTLS_PLATFORM_C + * + * Enable the platform abstraction layer that allows you to re-assign + * functions like calloc(), free(), snprintf(), printf(), fprintf(), exit(). + * + * Enabling MBEDTLS_PLATFORM_C enables to use of MBEDTLS_PLATFORM_XXX_ALT + * or MBEDTLS_PLATFORM_XXX_MACRO directives, allowing the functions mentioned + * above to be specified at runtime or compile time respectively. + * + * \note This abstraction layer must be enabled on Windows (including MSYS2) + * as other module rely on it for a fixed snprintf implementation. + * + * Module:  library/platform.c + * Caller:  Most other .c files + * + * This module enables abstraction of common (libc) functions. + */ +#define MBEDTLS_PLATFORM_C + +/** + * \def MBEDTLS_RIPEMD160_C + * + * Enable the RIPEMD-160 hash algorithm. + * + * Module:  library/ripemd160.c + * Caller:  library/md.c + * + */ +#define MBEDTLS_RIPEMD160_C + +/** + * \def MBEDTLS_RSA_C + * + * Enable the RSA public-key cryptosystem. + * + * Module:  library/rsa.c + *          library/rsa_internal.c + * Caller:  library/ssl_cli.c + *          library/ssl_srv.c + *          library/ssl_tls.c + *          library/x509.c + * + * This module is used by the following key exchanges: + *      RSA, DHE-RSA, ECDHE-RSA, RSA-PSK + * + * Requires: MBEDTLS_BIGNUM_C, MBEDTLS_OID_C + */ +#define MBEDTLS_RSA_C + +/** + * \def MBEDTLS_SHA1_C + * + * Enable the SHA1 cryptographic hash algorithm. + * + * Module:  library/sha1.c + * Caller:  library/md.c + *          library/ssl_cli.c + *          library/ssl_srv.c + *          library/ssl_tls.c + *          library/x509write_crt.c + * + * This module is required for SSL/TLS up to version 1.1, for TLS 1.2 + * depending on the handshake parameters, and for SHA1-signed certificates. + * + * \warning   SHA-1 is considered a weak message digest and its use constitutes + *            a security risk. If possible, we recommend avoiding dependencies + *            on it, and considering stronger message digests instead. + * + */ +#define MBEDTLS_SHA1_C + +/** + * \def MBEDTLS_SHA256_C + * + * Enable the SHA-224 and SHA-256 cryptographic hash algorithms. + * + * Module:  library/sha256.c + * Caller:  library/entropy.c + *          library/md.c + *          library/ssl_cli.c + *          library/ssl_srv.c + *          library/ssl_tls.c + * + * This module adds support for SHA-224 and SHA-256. + * This module is required for the SSL/TLS 1.2 PRF function. + */ +#define MBEDTLS_SHA256_C + +/** + * \def MBEDTLS_SHA512_C + * + * Enable the SHA-384 and SHA-512 cryptographic hash algorithms. + * + * Module:  library/sha512.c + * Caller:  library/entropy.c + *          library/md.c + *          library/ssl_cli.c + *          library/ssl_srv.c + * + * This module adds support for SHA-384 and SHA-512. + */ +#define MBEDTLS_SHA512_C + +/** + * \def MBEDTLS_SSL_CACHE_C + * + * Enable simple SSL cache implementation. + * + * Module:  library/ssl_cache.c + * Caller: + * + * Requires: MBEDTLS_SSL_CACHE_C + */ +#define MBEDTLS_SSL_CACHE_C + +/** + * \def MBEDTLS_SSL_COOKIE_C + * + * Enable basic implementation of DTLS cookies for hello verification. + * + * Module:  library/ssl_cookie.c + * Caller: + */ +#define MBEDTLS_SSL_COOKIE_C + +/** + * \def MBEDTLS_SSL_TICKET_C + * + * Enable an implementation of TLS server-side callbacks for session tickets. + * + * Module:  library/ssl_ticket.c + * Caller: + * + * Requires: MBEDTLS_CIPHER_C + */ +#define MBEDTLS_SSL_TICKET_C + +/** + * \def MBEDTLS_SSL_CLI_C + * + * Enable the SSL/TLS client code. + * + * Module:  library/ssl_cli.c + * Caller: + * + * Requires: MBEDTLS_SSL_TLS_C + * + * This module is required for SSL/TLS client support. + */ +#define MBEDTLS_SSL_CLI_C + +/** + * \def MBEDTLS_SSL_SRV_C + * + * Enable the SSL/TLS server code. + * + * Module:  library/ssl_srv.c + * Caller: + * + * Requires: MBEDTLS_SSL_TLS_C + * + * This module is required for SSL/TLS server support. + */ +#define MBEDTLS_SSL_SRV_C + +/** + * \def MBEDTLS_SSL_TLS_C + * + * Enable the generic SSL/TLS code. + * + * Module:  library/ssl_tls.c + * Caller:  library/ssl_cli.c + *          library/ssl_srv.c + * + * Requires: MBEDTLS_CIPHER_C, MBEDTLS_MD_C + *           and at least one of the MBEDTLS_SSL_PROTO_XXX defines + * + * This module is required for SSL/TLS. + */ +#define MBEDTLS_SSL_TLS_C + +/** + * \def MBEDTLS_THREADING_C + * + * Enable the threading abstraction layer. + * By default mbed TLS assumes it is used in a non-threaded environment or that + * contexts are not shared between threads. If you do intend to use contexts + * between threads, you will need to enable this layer to prevent race + * conditions. See also our Knowledge Base article about threading: + * https://tls.mbed.org/kb/development/thread-safety-and-multi-threading + * + * Module:  library/threading.c + * + * This allows different threading implementations (self-implemented or + * provided). + * + * You will have to enable either MBEDTLS_THREADING_ALT or + * MBEDTLS_THREADING_PTHREAD. + * + * Enable this layer to allow use of mutexes within mbed TLS + */ +//#define MBEDTLS_THREADING_C + +/** + * \def MBEDTLS_TIMING_C + * + * Enable the semi-portable timing interface. + * + * \note The provided implementation only works on POSIX/Unix (including Linux, + * BSD and OS X) and Windows. On other platforms, you can either disable that + * module and provide your own implementations of the callbacks needed by + * \c mbedtls_ssl_set_timer_cb() for DTLS, or leave it enabled and provide + * your own implementation of the whole module by setting + * \c MBEDTLS_TIMING_ALT in the current file. + * + * \note See also our Knowledge Base article about porting to a new + * environment: + * https://tls.mbed.org/kb/how-to/how-do-i-port-mbed-tls-to-a-new-environment-OS + * + * Module:  library/timing.c + * Caller:  library/havege.c + * + * This module is used by the HAVEGE random number generator. + */ +#define MBEDTLS_TIMING_C + +/** + * \def MBEDTLS_VERSION_C + * + * Enable run-time version information. + * + * Module:  library/version.c + * + * This module provides run-time version information. + */ +#define MBEDTLS_VERSION_C + +/** + * \def MBEDTLS_X509_USE_C + * + * Enable X.509 core for using certificates. + * + * Module:  library/x509.c + * Caller:  library/x509_crl.c + *          library/x509_crt.c + *          library/x509_csr.c + * + * Requires: MBEDTLS_ASN1_PARSE_C, MBEDTLS_BIGNUM_C, MBEDTLS_OID_C, + *           MBEDTLS_PK_PARSE_C + * + * This module is required for the X.509 parsing modules. + */ +#define MBEDTLS_X509_USE_C + +/** + * \def MBEDTLS_X509_CRT_PARSE_C + * + * Enable X.509 certificate parsing. + * + * Module:  library/x509_crt.c + * Caller:  library/ssl_cli.c + *          library/ssl_srv.c + *          library/ssl_tls.c + * + * Requires: MBEDTLS_X509_USE_C + * + * This module is required for X.509 certificate parsing. + */ +#define MBEDTLS_X509_CRT_PARSE_C + +/** + * \def MBEDTLS_X509_CRL_PARSE_C + * + * Enable X.509 CRL parsing. + * + * Module:  library/x509_crl.c + * Caller:  library/x509_crt.c + * + * Requires: MBEDTLS_X509_USE_C + * + * This module is required for X.509 CRL parsing. + */ +#define MBEDTLS_X509_CRL_PARSE_C + +/** + * \def MBEDTLS_X509_CSR_PARSE_C + * + * Enable X.509 Certificate Signing Request (CSR) parsing. + * + * Module:  library/x509_csr.c + * Caller:  library/x509_crt_write.c + * + * Requires: MBEDTLS_X509_USE_C + * + * This module is used for reading X.509 certificate request. + */ +#define MBEDTLS_X509_CSR_PARSE_C + +/** + * \def MBEDTLS_X509_CREATE_C + * + * Enable X.509 core for creating certificates. + * + * Module:  library/x509_create.c + * + * Requires: MBEDTLS_BIGNUM_C, MBEDTLS_OID_C, MBEDTLS_PK_WRITE_C + * + * This module is the basis for creating X.509 certificates and CSRs. + */ +#define MBEDTLS_X509_CREATE_C + +/** + * \def MBEDTLS_X509_CRT_WRITE_C + * + * Enable creating X.509 certificates. + * + * Module:  library/x509_crt_write.c + * + * Requires: MBEDTLS_X509_CREATE_C + * + * This module is required for X.509 certificate creation. + */ +#define MBEDTLS_X509_CRT_WRITE_C + +/** + * \def MBEDTLS_X509_CSR_WRITE_C + * + * Enable creating X.509 Certificate Signing Requests (CSR). + * + * Module:  library/x509_csr_write.c + * + * Requires: MBEDTLS_X509_CREATE_C + * + * This module is required for X.509 certificate request writing. + */ +#define MBEDTLS_X509_CSR_WRITE_C + +/** + * \def MBEDTLS_XTEA_C + * + * Enable the XTEA block cipher. + * + * Module:  library/xtea.c + * Caller: + */ +#define MBEDTLS_XTEA_C + +/* \} name SECTION: mbed TLS modules */ + +/** + * \name SECTION: Module configuration options + * + * This section allows for the setting of module specific sizes and + * configuration options. The default values are already present in the + * relevant header files and should suffice for the regular use cases. + * + * Our advice is to enable options and change their values here + * only if you have a good reason and know the consequences. + * + * Please check the respective header file for documentation on these + * parameters (to prevent duplicate documentation). + * \{ + */ + +/* MPI / BIGNUM options */ +//#define MBEDTLS_MPI_WINDOW_SIZE            6 /**< Maximum windows size used. */ +//#define MBEDTLS_MPI_MAX_SIZE            1024 /**< Maximum number of bytes for usable MPIs. */ + +/* CTR_DRBG options */ +//#define MBEDTLS_CTR_DRBG_ENTROPY_LEN               48 /**< Amount of entropy used per seed by default (48 with SHA-512, 32 with SHA-256) */ +//#define MBEDTLS_CTR_DRBG_RESEED_INTERVAL        10000 /**< Interval before reseed is performed by default */ +//#define MBEDTLS_CTR_DRBG_MAX_INPUT                256 /**< Maximum number of additional input bytes */ +//#define MBEDTLS_CTR_DRBG_MAX_REQUEST             1024 /**< Maximum number of requested bytes per call */ +//#define MBEDTLS_CTR_DRBG_MAX_SEED_INPUT           384 /**< Maximum size of (re)seed buffer */ + +/* HMAC_DRBG options */ +//#define MBEDTLS_HMAC_DRBG_RESEED_INTERVAL   10000 /**< Interval before reseed is performed by default */ +//#define MBEDTLS_HMAC_DRBG_MAX_INPUT           256 /**< Maximum number of additional input bytes */ +//#define MBEDTLS_HMAC_DRBG_MAX_REQUEST        1024 /**< Maximum number of requested bytes per call */ +//#define MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT      384 /**< Maximum size of (re)seed buffer */ + +/* ECP options */ +//#define MBEDTLS_ECP_MAX_BITS             521 /**< Maximum bit size of groups */ +//#define MBEDTLS_ECP_WINDOW_SIZE            6 /**< Maximum window size used */ +//#define MBEDTLS_ECP_FIXED_POINT_OPTIM      1 /**< Enable fixed-point speed-up */ + +/* Entropy options */ +//#define MBEDTLS_ENTROPY_MAX_SOURCES                20 /**< Maximum number of sources supported */ +//#define MBEDTLS_ENTROPY_MAX_GATHER                128 /**< Maximum amount requested from entropy sources */ +//#define MBEDTLS_ENTROPY_MIN_HARDWARE               32 /**< Default minimum number of bytes required for the hardware entropy source mbedtls_hardware_poll() before entropy is released */ + +/* Memory buffer allocator options */ +//#define MBEDTLS_MEMORY_ALIGN_MULTIPLE      4 /**< Align on multiples of this value */ + +/* Platform options */ +//#define MBEDTLS_PLATFORM_STD_MEM_HDR   <stdlib.h> /**< Header to include if MBEDTLS_PLATFORM_NO_STD_FUNCTIONS is defined. Don't define if no header is needed. */ +//#define MBEDTLS_PLATFORM_STD_CALLOC        calloc /**< Default allocator to use, can be undefined */ +//#define MBEDTLS_PLATFORM_STD_FREE            free /**< Default free to use, can be undefined */ +//#define MBEDTLS_PLATFORM_STD_EXIT            exit /**< Default exit to use, can be undefined */ +//#define MBEDTLS_PLATFORM_STD_TIME            time /**< Default time to use, can be undefined. MBEDTLS_HAVE_TIME must be enabled */ +//#define MBEDTLS_PLATFORM_STD_FPRINTF      fprintf /**< Default fprintf to use, can be undefined */ +//#define MBEDTLS_PLATFORM_STD_PRINTF        printf /**< Default printf to use, can be undefined */ +/* Note: your snprintf must correclty zero-terminate the buffer! */ +//#define MBEDTLS_PLATFORM_STD_SNPRINTF    snprintf /**< Default snprintf to use, can be undefined */ +//#define MBEDTLS_PLATFORM_STD_EXIT_SUCCESS       0 /**< Default exit value to use, can be undefined */ +//#define MBEDTLS_PLATFORM_STD_EXIT_FAILURE       1 /**< Default exit value to use, can be undefined */ +//#define MBEDTLS_PLATFORM_STD_NV_SEED_READ   mbedtls_platform_std_nv_seed_read /**< Default nv_seed_read function to use, can be undefined */ +//#define MBEDTLS_PLATFORM_STD_NV_SEED_WRITE  mbedtls_platform_std_nv_seed_write /**< Default nv_seed_write function to use, can be undefined */ +//#define MBEDTLS_PLATFORM_STD_NV_SEED_FILE  "seedfile" /**< Seed file to read/write with default implementation */ + +/* To Use Function Macros MBEDTLS_PLATFORM_C must be enabled */ +/* MBEDTLS_PLATFORM_XXX_MACRO and MBEDTLS_PLATFORM_XXX_ALT cannot both be defined */ +//#define MBEDTLS_PLATFORM_CALLOC_MACRO        calloc /**< Default allocator macro to use, can be undefined */ +//#define MBEDTLS_PLATFORM_FREE_MACRO            free /**< Default free macro to use, can be undefined */ +//#define MBEDTLS_PLATFORM_EXIT_MACRO            exit /**< Default exit macro to use, can be undefined */ +//#define MBEDTLS_PLATFORM_TIME_MACRO            time /**< Default time macro to use, can be undefined. MBEDTLS_HAVE_TIME must be enabled */ +//#define MBEDTLS_PLATFORM_TIME_TYPE_MACRO       time_t /**< Default time macro to use, can be undefined. MBEDTLS_HAVE_TIME must be enabled */ +//#define MBEDTLS_PLATFORM_FPRINTF_MACRO      fprintf /**< Default fprintf macro to use, can be undefined */ +//#define MBEDTLS_PLATFORM_PRINTF_MACRO        printf /**< Default printf macro to use, can be undefined */ +/* Note: your snprintf must correclty zero-terminate the buffer! */ +//#define MBEDTLS_PLATFORM_SNPRINTF_MACRO    snprintf /**< Default snprintf macro to use, can be undefined */ +//#define MBEDTLS_PLATFORM_NV_SEED_READ_MACRO   mbedtls_platform_std_nv_seed_read /**< Default nv_seed_read function to use, can be undefined */ +//#define MBEDTLS_PLATFORM_NV_SEED_WRITE_MACRO  mbedtls_platform_std_nv_seed_write /**< Default nv_seed_write function to use, can be undefined */ + +/* SSL Cache options */ +//#define MBEDTLS_SSL_CACHE_DEFAULT_TIMEOUT       86400 /**< 1 day  */ +//#define MBEDTLS_SSL_CACHE_DEFAULT_MAX_ENTRIES      50 /**< Maximum entries in cache */ + +/* SSL options */ +//#define MBEDTLS_SSL_MAX_CONTENT_LEN             16384 /**< Maxium fragment length in bytes, determines the size of each of the two internal I/O buffers */ +//#define MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME     86400 /**< Lifetime of session tickets (if enabled) */ +//#define MBEDTLS_PSK_MAX_LEN               32 /**< Max size of TLS pre-shared keys, in bytes (default 256 bits) */ +//#define MBEDTLS_SSL_COOKIE_TIMEOUT        60 /**< Default expiration delay of DTLS cookies, in seconds if HAVE_TIME, or in number of cookies issued */ + +/** + * Complete list of ciphersuites to use, in order of preference. + * + * \warning No dependency checking is done on that field! This option can only + * be used to restrict the set of available ciphersuites. It is your + * responsibility to make sure the needed modules are active. + * + * Use this to save a few hundred bytes of ROM (default ordering of all + * available ciphersuites) and a few to a few hundred bytes of RAM. + * + * The value below is only an example, not the default. + */ +//#define MBEDTLS_SSL_CIPHERSUITES MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 + +/* X509 options */ +//#define MBEDTLS_X509_MAX_INTERMEDIATE_CA   8   /**< Maximum number of intermediate CAs in a verification chain. */ +//#define MBEDTLS_X509_MAX_FILE_PATH_LEN     512 /**< Maximum length of a path/filename string in bytes including the null terminator character ('\0'). */ + +/** + * Allow SHA-1 in the default TLS configuration for certificate signing. + * Without this build-time option, SHA-1 support must be activated explicitly + * through mbedtls_ssl_conf_cert_profile. Turning on this option is not + * recommended because of it is possible to generate SHA-1 collisions, however + * this may be safe for legacy infrastructure where additional controls apply. + * + * \warning   SHA-1 is considered a weak message digest and its use constitutes + *            a security risk. If possible, we recommend avoiding dependencies + *            on it, and considering stronger message digests instead. + * + */ +// #define MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES + +/** + * Allow SHA-1 in the default TLS configuration for TLS 1.2 handshake + * signature and ciphersuite selection. Without this build-time option, SHA-1 + * support must be activated explicitly through mbedtls_ssl_conf_sig_hashes. + * The use of SHA-1 in TLS <= 1.1 and in HMAC-SHA-1 is always allowed by + * default. At the time of writing, there is no practical attack on the use + * of SHA-1 in handshake signatures, hence this option is turned on by default + * to preserve compatibility with existing peers, but the general + * warning applies nonetheless: + * + * \warning   SHA-1 is considered a weak message digest and its use constitutes + *            a security risk. If possible, we recommend avoiding dependencies + *            on it, and considering stronger message digests instead. + * + */ +#define MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_KEY_EXCHANGE + +/* \} name SECTION: Customisation configuration options */ + +/* Target and application specific configurations */ +//#define YOTTA_CFG_MBEDTLS_TARGET_CONFIG_FILE "mbedtls/target_config.h" + +#if defined(TARGET_LIKE_MBED) && defined(YOTTA_CFG_MBEDTLS_TARGET_CONFIG_FILE) +#include YOTTA_CFG_MBEDTLS_TARGET_CONFIG_FILE +#endif + +/* + * Allow user to override any previous default. + * + * Use two macro names for that, as: + * - with yotta the prefix YOTTA_CFG_ is forced + * - without yotta is looks weird to have a YOTTA prefix. + */ +#if defined(YOTTA_CFG_MBEDTLS_USER_CONFIG_FILE) +#include YOTTA_CFG_MBEDTLS_USER_CONFIG_FILE +#elif defined(MBEDTLS_USER_CONFIG_FILE) +#include MBEDTLS_USER_CONFIG_FILE +#endif + +#include "check_config.h" + +#endif /* MBEDTLS_CONFIG_H */ diff --git a/thirdparty/mbedtls/include/mbedtls/ctr_drbg.h b/thirdparty/mbedtls/include/mbedtls/ctr_drbg.h new file mode 100644 index 0000000000..121575a51b --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/ctr_drbg.h @@ -0,0 +1,322 @@ +/** + * \file ctr_drbg.h + * + * \brief    CTR_DRBG is based on AES-256, as defined in <em>NIST SP 800-90A: + *           Recommendation for Random Number Generation Using Deterministic + *           Random Bit Generators</em>. + * + */ +/* + *  Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of Mbed TLS (https://tls.mbed.org) + */ + +#ifndef MBEDTLS_CTR_DRBG_H +#define MBEDTLS_CTR_DRBG_H + +#include "aes.h" + +#if defined(MBEDTLS_THREADING_C) +#include "mbedtls/threading.h" +#endif + +#define MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED        -0x0034  /**< The entropy source failed. */ +#define MBEDTLS_ERR_CTR_DRBG_REQUEST_TOO_BIG              -0x0036  /**< The requested random buffer length is too big. */ +#define MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG                -0x0038  /**< The input (entropy + additional data) is too large. */ +#define MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR                -0x003A  /**< Read or write error in file. */ + +#define MBEDTLS_CTR_DRBG_BLOCKSIZE          16 /**< The block size used by the cipher. */ +#define MBEDTLS_CTR_DRBG_KEYSIZE            32 /**< The key size used by the cipher. */ +#define MBEDTLS_CTR_DRBG_KEYBITS            ( MBEDTLS_CTR_DRBG_KEYSIZE * 8 ) /**< The key size for the DRBG operation, in bits. */ +#define MBEDTLS_CTR_DRBG_SEEDLEN            ( MBEDTLS_CTR_DRBG_KEYSIZE + MBEDTLS_CTR_DRBG_BLOCKSIZE ) /**< The seed length, calculated as (counter + AES key). */ + +/** + * \name SECTION: Module settings + * + * The configuration options you can set for this module are in this section. + * Either change them in config.h or define them using the compiler command + * line. + * \{ + */ + +#if !defined(MBEDTLS_CTR_DRBG_ENTROPY_LEN) +#if defined(MBEDTLS_SHA512_C) && !defined(MBEDTLS_ENTROPY_FORCE_SHA256) +#define MBEDTLS_CTR_DRBG_ENTROPY_LEN        48 +/**< The amount of entropy used per seed by default: + * <ul><li>48 with SHA-512.</li> + * <li>32 with SHA-256.</li></ul> + */ +#else +#define MBEDTLS_CTR_DRBG_ENTROPY_LEN        32 +/**< Amount of entropy used per seed by default: + * <ul><li>48 with SHA-512.</li> + * <li>32 with SHA-256.</li></ul> + */ +#endif +#endif + +#if !defined(MBEDTLS_CTR_DRBG_RESEED_INTERVAL) +#define MBEDTLS_CTR_DRBG_RESEED_INTERVAL    10000 +/**< The interval before reseed is performed by default. */ +#endif + +#if !defined(MBEDTLS_CTR_DRBG_MAX_INPUT) +#define MBEDTLS_CTR_DRBG_MAX_INPUT          256 +/**< The maximum number of additional input Bytes. */ +#endif + +#if !defined(MBEDTLS_CTR_DRBG_MAX_REQUEST) +#define MBEDTLS_CTR_DRBG_MAX_REQUEST        1024 +/**< The maximum number of requested Bytes per call. */ +#endif + +#if !defined(MBEDTLS_CTR_DRBG_MAX_SEED_INPUT) +#define MBEDTLS_CTR_DRBG_MAX_SEED_INPUT     384 +/**< The maximum size of seed or reseed buffer. */ +#endif + +/* \} name SECTION: Module settings */ + +#define MBEDTLS_CTR_DRBG_PR_OFF             0 +/**< Prediction resistance is disabled. */ +#define MBEDTLS_CTR_DRBG_PR_ON              1 +/**< Prediction resistance is enabled. */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          The CTR_DRBG context structure. + */ +typedef struct +{ +    unsigned char counter[16];  /*!< The counter (V). */ +    int reseed_counter;         /*!< The reseed counter. */ +    int prediction_resistance;  /*!< This determines whether prediction +                                     resistance is enabled, that is +                                     whether to systematically reseed before +                                     each random generation. */ +    size_t entropy_len;         /*!< The amount of entropy grabbed on each +                                     seed or reseed operation. */ +    int reseed_interval;        /*!< The reseed interval. */ + +    mbedtls_aes_context aes_ctx;        /*!< The AES context. */ + +    /* +     * Callbacks (Entropy) +     */ +    int (*f_entropy)(void *, unsigned char *, size_t); +                                /*!< The entropy callback function. */ + +    void *p_entropy;            /*!< The context for the entropy function. */ + +#if defined(MBEDTLS_THREADING_C) +    mbedtls_threading_mutex_t mutex; +#endif +} +mbedtls_ctr_drbg_context; + +/** + * \brief               This function initializes the CTR_DRBG context, + *                      and prepares it for mbedtls_ctr_drbg_seed() + *                      or mbedtls_ctr_drbg_free(). + * + * \param ctx           The CTR_DRBG context to initialize. + */ +void mbedtls_ctr_drbg_init( mbedtls_ctr_drbg_context *ctx ); + +/** + * \brief               This function seeds and sets up the CTR_DRBG + *                      entropy source for future reseeds. + * + * \note Personalization data can be provided in addition to the more generic + *       entropy source, to make this instantiation as unique as possible. + * + * \param ctx           The CTR_DRBG context to seed. + * \param f_entropy     The entropy callback, taking as arguments the + *                      \p p_entropy context, the buffer to fill, and the +                        length of the buffer. + * \param p_entropy     The entropy context. + * \param custom        Personalization data, that is device-specific +                        identifiers. Can be NULL. + * \param len           The length of the personalization data. + * + * \return              \c 0 on success, or + *                      #MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED on failure. + */ +int mbedtls_ctr_drbg_seed( mbedtls_ctr_drbg_context *ctx, +                   int (*f_entropy)(void *, unsigned char *, size_t), +                   void *p_entropy, +                   const unsigned char *custom, +                   size_t len ); + +/** + * \brief               This function clears CTR_CRBG context data. + * + * \param ctx           The CTR_DRBG context to clear. + */ +void mbedtls_ctr_drbg_free( mbedtls_ctr_drbg_context *ctx ); + +/** + * \brief               This function turns prediction resistance on or off. + *                      The default value is off. + * + * \note                If enabled, entropy is gathered at the beginning of + *                      every call to mbedtls_ctr_drbg_random_with_add(). + *                      Only use this if your entropy source has sufficient + *                      throughput. + * + * \param ctx           The CTR_DRBG context. + * \param resistance    #MBEDTLS_CTR_DRBG_PR_ON or #MBEDTLS_CTR_DRBG_PR_OFF. + */ +void mbedtls_ctr_drbg_set_prediction_resistance( mbedtls_ctr_drbg_context *ctx, +                                         int resistance ); + +/** + * \brief               This function sets the amount of entropy grabbed on each + *                      seed or reseed. The default value is + *                      #MBEDTLS_CTR_DRBG_ENTROPY_LEN. + * + * \param ctx           The CTR_DRBG context. + * \param len           The amount of entropy to grab. + */ +void mbedtls_ctr_drbg_set_entropy_len( mbedtls_ctr_drbg_context *ctx, +                               size_t len ); + +/** + * \brief               This function sets the reseed interval. + *                      The default value is #MBEDTLS_CTR_DRBG_RESEED_INTERVAL. + * + * \param ctx           The CTR_DRBG context. + * \param interval      The reseed interval. + */ +void mbedtls_ctr_drbg_set_reseed_interval( mbedtls_ctr_drbg_context *ctx, +                                   int interval ); + +/** + * \brief               This function reseeds the CTR_DRBG context, that is + *                      extracts data from the entropy source. + * + * \param ctx           The CTR_DRBG context. + * \param additional    Additional data to add to the state. Can be NULL. + * \param len           The length of the additional data. + * + * \return   \c 0 on success, or + *           #MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED on failure. + */ +int mbedtls_ctr_drbg_reseed( mbedtls_ctr_drbg_context *ctx, +                     const unsigned char *additional, size_t len ); + +/** + * \brief               This function updates the state of the CTR_DRBG context. + * + * \param ctx           The CTR_DRBG context. + * \param additional    The data to update the state with. + * \param add_len       Length of \p additional data. + * + * \note     If \p add_len is greater than #MBEDTLS_CTR_DRBG_MAX_SEED_INPUT, + *           only the first #MBEDTLS_CTR_DRBG_MAX_SEED_INPUT Bytes are used. + *           The remaining Bytes are silently discarded. + */ +void mbedtls_ctr_drbg_update( mbedtls_ctr_drbg_context *ctx, +                      const unsigned char *additional, size_t add_len ); + +/** + * \brief   This function updates a CTR_DRBG instance with additional + *          data and uses it to generate random data. + * + * \note    The function automatically reseeds if the reseed counter is exceeded. + * + * \param p_rng         The CTR_DRBG context. This must be a pointer to a + *                      #mbedtls_ctr_drbg_context structure. + * \param output        The buffer to fill. + * \param output_len    The length of the buffer. + * \param additional    Additional data to update. Can be NULL. + * \param add_len       The length of the additional data. + * + * \return    \c 0 on success, or + *            #MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED or + *            #MBEDTLS_ERR_CTR_DRBG_REQUEST_TOO_BIG on failure. + */ +int mbedtls_ctr_drbg_random_with_add( void *p_rng, +                              unsigned char *output, size_t output_len, +                              const unsigned char *additional, size_t add_len ); + +/** + * \brief   This function uses CTR_DRBG to generate random data. + * + * \note    The function automatically reseeds if the reseed counter is exceeded. + * + * \param p_rng         The CTR_DRBG context. This must be a pointer to a + *                      #mbedtls_ctr_drbg_context structure. + * \param output        The buffer to fill. + * \param output_len    The length of the buffer. + * + * \return              \c 0 on success, or + *                      #MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED or + *                      #MBEDTLS_ERR_CTR_DRBG_REQUEST_TOO_BIG on failure. + */ +int mbedtls_ctr_drbg_random( void *p_rng, +                     unsigned char *output, size_t output_len ); + +#if defined(MBEDTLS_FS_IO) +/** + * \brief               This function writes a seed file. + * + * \param ctx           The CTR_DRBG context. + * \param path          The name of the file. + * + * \return              \c 0 on success, + *                      #MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR on file error, or + *                      #MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED on + *                      failure. + */ +int mbedtls_ctr_drbg_write_seed_file( mbedtls_ctr_drbg_context *ctx, const char *path ); + +/** + * \brief               This function reads and updates a seed file. The seed + *                      is added to this instance. + * + * \param ctx           The CTR_DRBG context. + * \param path          The name of the file. + * + * \return              \c 0 on success, + *                      #MBEDTLS_ERR_CTR_DRBG_FILE_IO_ERROR on file error, + *                      #MBEDTLS_ERR_CTR_DRBG_ENTROPY_SOURCE_FAILED or + *                      #MBEDTLS_ERR_CTR_DRBG_INPUT_TOO_BIG on failure. + */ +int mbedtls_ctr_drbg_update_seed_file( mbedtls_ctr_drbg_context *ctx, const char *path ); +#endif /* MBEDTLS_FS_IO */ + +/** + * \brief               The CTR_DRBG checkup routine. + * + * \return              \c 0 on success, or \c 1 on failure. + */ +int mbedtls_ctr_drbg_self_test( int verbose ); + +/* Internal functions (do not call directly) */ +int mbedtls_ctr_drbg_seed_entropy_len( mbedtls_ctr_drbg_context *, +                               int (*)(void *, unsigned char *, size_t), void *, +                               const unsigned char *, size_t, size_t ); + +#ifdef __cplusplus +} +#endif + +#endif /* ctr_drbg.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/debug.h b/thirdparty/mbedtls/include/mbedtls/debug.h new file mode 100644 index 0000000000..ef8db67ff1 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/debug.h @@ -0,0 +1,229 @@ +/** + * \file debug.h + * + * \brief Functions for controlling and providing debug output from the library. + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_DEBUG_H +#define MBEDTLS_DEBUG_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include "ssl.h" + +#if defined(MBEDTLS_ECP_C) +#include "ecp.h" +#endif + +#if defined(MBEDTLS_DEBUG_C) + +#define MBEDTLS_DEBUG_STRIP_PARENS( ... )   __VA_ARGS__ + +#define MBEDTLS_SSL_DEBUG_MSG( level, args )                    \ +    mbedtls_debug_print_msg( ssl, level, __FILE__, __LINE__,    \ +                             MBEDTLS_DEBUG_STRIP_PARENS args ) + +#define MBEDTLS_SSL_DEBUG_RET( level, text, ret )                \ +    mbedtls_debug_print_ret( ssl, level, __FILE__, __LINE__, text, ret ) + +#define MBEDTLS_SSL_DEBUG_BUF( level, text, buf, len )           \ +    mbedtls_debug_print_buf( ssl, level, __FILE__, __LINE__, text, buf, len ) + +#if defined(MBEDTLS_BIGNUM_C) +#define MBEDTLS_SSL_DEBUG_MPI( level, text, X )                  \ +    mbedtls_debug_print_mpi( ssl, level, __FILE__, __LINE__, text, X ) +#endif + +#if defined(MBEDTLS_ECP_C) +#define MBEDTLS_SSL_DEBUG_ECP( level, text, X )                  \ +    mbedtls_debug_print_ecp( ssl, level, __FILE__, __LINE__, text, X ) +#endif + +#if defined(MBEDTLS_X509_CRT_PARSE_C) +#define MBEDTLS_SSL_DEBUG_CRT( level, text, crt )                \ +    mbedtls_debug_print_crt( ssl, level, __FILE__, __LINE__, text, crt ) +#endif + +#else /* MBEDTLS_DEBUG_C */ + +#define MBEDTLS_SSL_DEBUG_MSG( level, args )            do { } while( 0 ) +#define MBEDTLS_SSL_DEBUG_RET( level, text, ret )       do { } while( 0 ) +#define MBEDTLS_SSL_DEBUG_BUF( level, text, buf, len )  do { } while( 0 ) +#define MBEDTLS_SSL_DEBUG_MPI( level, text, X )         do { } while( 0 ) +#define MBEDTLS_SSL_DEBUG_ECP( level, text, X )         do { } while( 0 ) +#define MBEDTLS_SSL_DEBUG_CRT( level, text, crt )       do { } while( 0 ) + +#endif /* MBEDTLS_DEBUG_C */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief   Set the threshold error level to handle globally all debug output. + *          Debug messages that have a level over the threshold value are + *          discarded. + *          (Default value: 0 = No debug ) + * + * \param threshold     theshold level of messages to filter on. Messages at a + *                      higher level will be discarded. + *                          - Debug levels + *                              - 0 No debug + *                              - 1 Error + *                              - 2 State change + *                              - 3 Informational + *                              - 4 Verbose + */ +void mbedtls_debug_set_threshold( int threshold ); + +/** + * \brief    Print a message to the debug output. This function is always used + *          through the MBEDTLS_SSL_DEBUG_MSG() macro, which supplies the ssl + *          context, file and line number parameters. + * + * \param ssl       SSL context + * \param level     error level of the debug message + * \param file      file the message has occurred in + * \param line      line number the message has occurred at + * \param format    format specifier, in printf format + * \param ...       variables used by the format specifier + * + * \attention       This function is intended for INTERNAL usage within the + *                  library only. + */ +void mbedtls_debug_print_msg( const mbedtls_ssl_context *ssl, int level, +                              const char *file, int line, +                              const char *format, ... ); + +/** + * \brief   Print the return value of a function to the debug output. This + *          function is always used through the MBEDTLS_SSL_DEBUG_RET() macro, + *          which supplies the ssl context, file and line number parameters. + * + * \param ssl       SSL context + * \param level     error level of the debug message + * \param file      file the error has occurred in + * \param line      line number the error has occurred in + * \param text      the name of the function that returned the error + * \param ret       the return code value + * + * \attention       This function is intended for INTERNAL usage within the + *                  library only. + */ +void mbedtls_debug_print_ret( const mbedtls_ssl_context *ssl, int level, +                      const char *file, int line, +                      const char *text, int ret ); + +/** + * \brief   Output a buffer of size len bytes to the debug output. This function + *          is always used through the MBEDTLS_SSL_DEBUG_BUF() macro, + *          which supplies the ssl context, file and line number parameters. + * + * \param ssl       SSL context + * \param level     error level of the debug message + * \param file      file the error has occurred in + * \param line      line number the error has occurred in + * \param text      a name or label for the buffer being dumped. Normally the + *                  variable or buffer name + * \param buf       the buffer to be outputted + * \param len       length of the buffer + * + * \attention       This function is intended for INTERNAL usage within the + *                  library only. + */ +void mbedtls_debug_print_buf( const mbedtls_ssl_context *ssl, int level, +                      const char *file, int line, const char *text, +                      const unsigned char *buf, size_t len ); + +#if defined(MBEDTLS_BIGNUM_C) +/** + * \brief   Print a MPI variable to the debug output. This function is always + *          used through the MBEDTLS_SSL_DEBUG_MPI() macro, which supplies the + *          ssl context, file and line number parameters. + * + * \param ssl       SSL context + * \param level     error level of the debug message + * \param file      file the error has occurred in + * \param line      line number the error has occurred in + * \param text      a name or label for the MPI being output. Normally the + *                  variable name + * \param X         the MPI variable + * + * \attention       This function is intended for INTERNAL usage within the + *                  library only. + */ +void mbedtls_debug_print_mpi( const mbedtls_ssl_context *ssl, int level, +                      const char *file, int line, +                      const char *text, const mbedtls_mpi *X ); +#endif + +#if defined(MBEDTLS_ECP_C) +/** + * \brief   Print an ECP point to the debug output. This function is always + *          used through the MBEDTLS_SSL_DEBUG_ECP() macro, which supplies the + *          ssl context, file and line number parameters. + * + * \param ssl       SSL context + * \param level     error level of the debug message + * \param file      file the error has occurred in + * \param line      line number the error has occurred in + * \param text      a name or label for the ECP point being output. Normally the + *                  variable name + * \param X         the ECP point + * + * \attention       This function is intended for INTERNAL usage within the + *                  library only. + */ +void mbedtls_debug_print_ecp( const mbedtls_ssl_context *ssl, int level, +                      const char *file, int line, +                      const char *text, const mbedtls_ecp_point *X ); +#endif + +#if defined(MBEDTLS_X509_CRT_PARSE_C) +/** + * \brief   Print a X.509 certificate structure to the debug output. This + *          function is always used through the MBEDTLS_SSL_DEBUG_CRT() macro, + *          which supplies the ssl context, file and line number parameters. + * + * \param ssl       SSL context + * \param level     error level of the debug message + * \param file      file the error has occurred in + * \param line      line number the error has occurred in + * \param text      a name or label for the certificate being output + * \param crt       X.509 certificate structure + * + * \attention       This function is intended for INTERNAL usage within the + *                  library only. + */ +void mbedtls_debug_print_crt( const mbedtls_ssl_context *ssl, int level, +                      const char *file, int line, +                      const char *text, const mbedtls_x509_crt *crt ); +#endif + +#ifdef __cplusplus +} +#endif + +#endif /* debug.h */ + diff --git a/thirdparty/mbedtls/include/mbedtls/des.h b/thirdparty/mbedtls/include/mbedtls/des.h new file mode 100644 index 0000000000..5a1a636522 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/des.h @@ -0,0 +1,357 @@ +/** + * \file des.h + * + * \brief DES block cipher + * + * \warning   DES is considered a weak cipher and its use constitutes a + *            security risk. We recommend considering stronger ciphers + *            instead. + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + * + */ +#ifndef MBEDTLS_DES_H +#define MBEDTLS_DES_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> +#include <stdint.h> + +#define MBEDTLS_DES_ENCRYPT     1 +#define MBEDTLS_DES_DECRYPT     0 + +#define MBEDTLS_ERR_DES_INVALID_INPUT_LENGTH              -0x0032  /**< The data input has an invalid length. */ +#define MBEDTLS_ERR_DES_HW_ACCEL_FAILED                   -0x0033  /**< DES hardware accelerator failed. */ + +#define MBEDTLS_DES_KEY_SIZE    8 + +#if !defined(MBEDTLS_DES_ALT) +// Regular implementation +// + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          DES context structure + * + * \warning        DES is considered a weak cipher and its use constitutes a + *                 security risk. We recommend considering stronger ciphers + *                 instead. + */ +typedef struct +{ +    uint32_t sk[32];            /*!<  DES subkeys       */ +} +mbedtls_des_context; + +/** + * \brief          Triple-DES context structure + */ +typedef struct +{ +    uint32_t sk[96];            /*!<  3DES subkeys      */ +} +mbedtls_des3_context; + +/** + * \brief          Initialize DES context + * + * \param ctx      DES context to be initialized + * + * \warning        DES is considered a weak cipher and its use constitutes a + *                 security risk. We recommend considering stronger ciphers + *                 instead. + */ +void mbedtls_des_init( mbedtls_des_context *ctx ); + +/** + * \brief          Clear DES context + * + * \param ctx      DES context to be cleared + * + * \warning        DES is considered a weak cipher and its use constitutes a + *                 security risk. We recommend considering stronger ciphers + *                 instead. + */ +void mbedtls_des_free( mbedtls_des_context *ctx ); + +/** + * \brief          Initialize Triple-DES context + * + * \param ctx      DES3 context to be initialized + */ +void mbedtls_des3_init( mbedtls_des3_context *ctx ); + +/** + * \brief          Clear Triple-DES context + * + * \param ctx      DES3 context to be cleared + */ +void mbedtls_des3_free( mbedtls_des3_context *ctx ); + +/** + * \brief          Set key parity on the given key to odd. + * + *                 DES keys are 56 bits long, but each byte is padded with + *                 a parity bit to allow verification. + * + * \param key      8-byte secret key + * + * \warning        DES is considered a weak cipher and its use constitutes a + *                 security risk. We recommend considering stronger ciphers + *                 instead. + */ +void mbedtls_des_key_set_parity( unsigned char key[MBEDTLS_DES_KEY_SIZE] ); + +/** + * \brief          Check that key parity on the given key is odd. + * + *                 DES keys are 56 bits long, but each byte is padded with + *                 a parity bit to allow verification. + * + * \param key      8-byte secret key + * + * \return         0 is parity was ok, 1 if parity was not correct. + * + * \warning        DES is considered a weak cipher and its use constitutes a + *                 security risk. We recommend considering stronger ciphers + *                 instead. + */ +int mbedtls_des_key_check_key_parity( const unsigned char key[MBEDTLS_DES_KEY_SIZE] ); + +/** + * \brief          Check that key is not a weak or semi-weak DES key + * + * \param key      8-byte secret key + * + * \return         0 if no weak key was found, 1 if a weak key was identified. + * + * \warning        DES is considered a weak cipher and its use constitutes a + *                 security risk. We recommend considering stronger ciphers + *                 instead. + */ +int mbedtls_des_key_check_weak( const unsigned char key[MBEDTLS_DES_KEY_SIZE] ); + +/** + * \brief          DES key schedule (56-bit, encryption) + * + * \param ctx      DES context to be initialized + * \param key      8-byte secret key + * + * \return         0 + * + * \warning        DES is considered a weak cipher and its use constitutes a + *                 security risk. We recommend considering stronger ciphers + *                 instead. + */ +int mbedtls_des_setkey_enc( mbedtls_des_context *ctx, const unsigned char key[MBEDTLS_DES_KEY_SIZE] ); + +/** + * \brief          DES key schedule (56-bit, decryption) + * + * \param ctx      DES context to be initialized + * \param key      8-byte secret key + * + * \return         0 + * + * \warning        DES is considered a weak cipher and its use constitutes a + *                 security risk. We recommend considering stronger ciphers + *                 instead. + */ +int mbedtls_des_setkey_dec( mbedtls_des_context *ctx, const unsigned char key[MBEDTLS_DES_KEY_SIZE] ); + +/** + * \brief          Triple-DES key schedule (112-bit, encryption) + * + * \param ctx      3DES context to be initialized + * \param key      16-byte secret key + * + * \return         0 + */ +int mbedtls_des3_set2key_enc( mbedtls_des3_context *ctx, +                      const unsigned char key[MBEDTLS_DES_KEY_SIZE * 2] ); + +/** + * \brief          Triple-DES key schedule (112-bit, decryption) + * + * \param ctx      3DES context to be initialized + * \param key      16-byte secret key + * + * \return         0 + */ +int mbedtls_des3_set2key_dec( mbedtls_des3_context *ctx, +                      const unsigned char key[MBEDTLS_DES_KEY_SIZE * 2] ); + +/** + * \brief          Triple-DES key schedule (168-bit, encryption) + * + * \param ctx      3DES context to be initialized + * \param key      24-byte secret key + * + * \return         0 + */ +int mbedtls_des3_set3key_enc( mbedtls_des3_context *ctx, +                      const unsigned char key[MBEDTLS_DES_KEY_SIZE * 3] ); + +/** + * \brief          Triple-DES key schedule (168-bit, decryption) + * + * \param ctx      3DES context to be initialized + * \param key      24-byte secret key + * + * \return         0 + */ +int mbedtls_des3_set3key_dec( mbedtls_des3_context *ctx, +                      const unsigned char key[MBEDTLS_DES_KEY_SIZE * 3] ); + +/** + * \brief          DES-ECB block encryption/decryption + * + * \param ctx      DES context + * \param input    64-bit input block + * \param output   64-bit output block + * + * \return         0 if successful + * + * \warning        DES is considered a weak cipher and its use constitutes a + *                 security risk. We recommend considering stronger ciphers + *                 instead. + */ +int mbedtls_des_crypt_ecb( mbedtls_des_context *ctx, +                    const unsigned char input[8], +                    unsigned char output[8] ); + +#if defined(MBEDTLS_CIPHER_MODE_CBC) +/** + * \brief          DES-CBC buffer encryption/decryption + * + * \note           Upon exit, the content of the IV is updated so that you can + *                 call the function same function again on the following + *                 block(s) of data and get the same result as if it was + *                 encrypted in one call. This allows a "streaming" usage. + *                 If on the other hand you need to retain the contents of the + *                 IV, you should either save it manually or use the cipher + *                 module instead. + * + * \param ctx      DES context + * \param mode     MBEDTLS_DES_ENCRYPT or MBEDTLS_DES_DECRYPT + * \param length   length of the input data + * \param iv       initialization vector (updated after use) + * \param input    buffer holding the input data + * \param output   buffer holding the output data + * + * \warning        DES is considered a weak cipher and its use constitutes a + *                 security risk. We recommend considering stronger ciphers + *                 instead. + */ +int mbedtls_des_crypt_cbc( mbedtls_des_context *ctx, +                    int mode, +                    size_t length, +                    unsigned char iv[8], +                    const unsigned char *input, +                    unsigned char *output ); +#endif /* MBEDTLS_CIPHER_MODE_CBC */ + +/** + * \brief          3DES-ECB block encryption/decryption + * + * \param ctx      3DES context + * \param input    64-bit input block + * \param output   64-bit output block + * + * \return         0 if successful + */ +int mbedtls_des3_crypt_ecb( mbedtls_des3_context *ctx, +                     const unsigned char input[8], +                     unsigned char output[8] ); + +#if defined(MBEDTLS_CIPHER_MODE_CBC) +/** + * \brief          3DES-CBC buffer encryption/decryption + * + * \note           Upon exit, the content of the IV is updated so that you can + *                 call the function same function again on the following + *                 block(s) of data and get the same result as if it was + *                 encrypted in one call. This allows a "streaming" usage. + *                 If on the other hand you need to retain the contents of the + *                 IV, you should either save it manually or use the cipher + *                 module instead. + * + * \param ctx      3DES context + * \param mode     MBEDTLS_DES_ENCRYPT or MBEDTLS_DES_DECRYPT + * \param length   length of the input data + * \param iv       initialization vector (updated after use) + * \param input    buffer holding the input data + * \param output   buffer holding the output data + * + * \return         0 if successful, or MBEDTLS_ERR_DES_INVALID_INPUT_LENGTH + */ +int mbedtls_des3_crypt_cbc( mbedtls_des3_context *ctx, +                     int mode, +                     size_t length, +                     unsigned char iv[8], +                     const unsigned char *input, +                     unsigned char *output ); +#endif /* MBEDTLS_CIPHER_MODE_CBC */ + +/** + * \brief          Internal function for key expansion. + *                 (Only exposed to allow overriding it, + *                 see MBEDTLS_DES_SETKEY_ALT) + * + * \param SK       Round keys + * \param key      Base key + * + * \warning        DES is considered a weak cipher and its use constitutes a + *                 security risk. We recommend considering stronger ciphers + *                 instead. + */ +void mbedtls_des_setkey( uint32_t SK[32], +                         const unsigned char key[MBEDTLS_DES_KEY_SIZE] ); +#ifdef __cplusplus +} +#endif + +#else  /* MBEDTLS_DES_ALT */ +#include "des_alt.h" +#endif /* MBEDTLS_DES_ALT */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          Checkup routine + * + * \return         0 if successful, or 1 if the test failed + */ +int mbedtls_des_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + +#endif /* des.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/dhm.h b/thirdparty/mbedtls/include/mbedtls/dhm.h new file mode 100644 index 0000000000..da2e66b111 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/dhm.h @@ -0,0 +1,1061 @@ +/** + * \file dhm.h + * + * \brief Diffie-Hellman-Merkle key exchange. + * + * <em>RFC-3526: More Modular Exponential (MODP) Diffie-Hellman groups for + * Internet Key Exchange (IKE)</em> defines a number of standardized + * Diffie-Hellman groups for IKE. + * + * <em>RFC-5114: Additional Diffie-Hellman Groups for Use with IETF + * Standards</em> defines a number of standardized Diffie-Hellman + * groups that can be used. + * + * \warning  The security of the DHM key exchange relies on the proper choice + *           of prime modulus - optimally, it should be a safe prime. The usage + *           of non-safe primes both decreases the difficulty of the underlying + *           discrete logarithm problem and can lead to small subgroup attacks + *           leaking private exponent bits when invalid public keys are used + *           and not detected. This is especially relevant if the same DHM + *           parameters are reused for multiple key exchanges as in static DHM, + *           while the criticality of small-subgroup attacks is lower for + *           ephemeral DHM. + * + * \warning  For performance reasons, the code does neither perform primality + *           nor safe primality tests, nor the expensive checks for invalid + *           subgroups. Moreover, even if these were performed, non-standardized + *           primes cannot be trusted because of the possibility of backdoors + *           that can't be effectively checked for. + * + * \warning  Diffie-Hellman-Merkle is therefore a security risk when not using + *           standardized primes generated using a trustworthy ("nothing up + *           my sleeve") method, such as the RFC 3526 / 7919 primes. In the TLS + *           protocol, DH parameters need to be negotiated, so using the default + *           primes systematically is not always an option. If possible, use + *           Elliptic Curve Diffie-Hellman (ECDH), which has better performance, + *           and for which the TLS protocol mandates the use of standard + *           parameters. + * + */ +/* + *  Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of Mbed TLS (https://tls.mbed.org) + */ + +#ifndef MBEDTLS_DHM_H +#define MBEDTLS_DHM_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif +#include "bignum.h" +#if !defined(MBEDTLS_DHM_ALT) + +/* + * DHM Error codes + */ +#define MBEDTLS_ERR_DHM_BAD_INPUT_DATA                    -0x3080  /**< Bad input parameters. */ +#define MBEDTLS_ERR_DHM_READ_PARAMS_FAILED                -0x3100  /**< Reading of the DHM parameters failed. */ +#define MBEDTLS_ERR_DHM_MAKE_PARAMS_FAILED                -0x3180  /**< Making of the DHM parameters failed. */ +#define MBEDTLS_ERR_DHM_READ_PUBLIC_FAILED                -0x3200  /**< Reading of the public values failed. */ +#define MBEDTLS_ERR_DHM_MAKE_PUBLIC_FAILED                -0x3280  /**< Making of the public value failed. */ +#define MBEDTLS_ERR_DHM_CALC_SECRET_FAILED                -0x3300  /**< Calculation of the DHM secret failed. */ +#define MBEDTLS_ERR_DHM_INVALID_FORMAT                    -0x3380  /**< The ASN.1 data is not formatted correctly. */ +#define MBEDTLS_ERR_DHM_ALLOC_FAILED                      -0x3400  /**< Allocation of memory failed. */ +#define MBEDTLS_ERR_DHM_FILE_IO_ERROR                     -0x3480  /**< Read or write of file failed. */ +#define MBEDTLS_ERR_DHM_HW_ACCEL_FAILED                   -0x3500  /**< DHM hardware accelerator failed. */ +#define MBEDTLS_ERR_DHM_SET_GROUP_FAILED                  -0x3580  /**< Setting the modulus and generator failed. */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          The DHM context structure. + */ +typedef struct +{ +    size_t len;         /*!<  The size of \p P in Bytes. */ +    mbedtls_mpi P;      /*!<  The prime modulus. */ +    mbedtls_mpi G;      /*!<  The generator. */ +    mbedtls_mpi X;      /*!<  Our secret value. */ +    mbedtls_mpi GX;     /*!<  Our public key = \c G^X mod \c P. */ +    mbedtls_mpi GY;     /*!<  The public key of the peer = \c G^Y mod \c P. */ +    mbedtls_mpi K;      /*!<  The shared secret = \c G^(XY) mod \c P. */ +    mbedtls_mpi RP;     /*!<  The cached value = \c R^2 mod \c P. */ +    mbedtls_mpi Vi;     /*!<  The blinding value. */ +    mbedtls_mpi Vf;     /*!<  The unblinding value. */ +    mbedtls_mpi pX;     /*!<  The previous \c X. */ +} +mbedtls_dhm_context; + +/** + * \brief          This function initializes the DHM context. + * + * \param ctx      The DHM context to initialize. + */ +void mbedtls_dhm_init( mbedtls_dhm_context *ctx ); + +/** + * \brief          This function parses the ServerKeyExchange parameters. + * + * \param ctx      The DHM context. + * \param p        On input, *p must be the start of the input buffer. + *                 On output, *p is updated to point to the end of the data + *                 that has been read. On success, this is the first byte + *                 past the end of the ServerKeyExchange parameters. + *                 On error, this is the point at which an error has been + *                 detected, which is usually not useful except to debug + *                 failures. + * \param end      The end of the input buffer. + * + * \return         \c 0 on success, or an \c MBEDTLS_ERR_DHM_XXX error code + *                 on failure. + */ +int mbedtls_dhm_read_params( mbedtls_dhm_context *ctx, +                     unsigned char **p, +                     const unsigned char *end ); + +/** + * \brief          This function sets up and writes the ServerKeyExchange + *                 parameters. + * + * \param ctx      The DHM context. + * \param x_size   The private value size in Bytes. + * \param olen     The number of characters written. + * \param output   The destination buffer. + * \param f_rng    The RNG function. + * \param p_rng    The RNG parameter. + * + * \note           The destination buffer must be large enough to hold + *                 the reduced binary presentation of the modulus, the generator + *                 and the public key, each wrapped with a 2-byte length field. + *                 It is the responsibility of the caller to ensure that enough + *                 space is available. Refer to \c mbedtls_mpi_size to computing + *                 the byte-size of an MPI. + * + * \note           This function assumes that \c ctx->P and \c ctx->G + *                 have already been properly set. For that, use + *                 mbedtls_dhm_set_group() below in conjunction with + *                 mbedtls_mpi_read_binary() and mbedtls_mpi_read_string(). + * + * \return         \c 0 on success, or an \c MBEDTLS_ERR_DHM_XXX error code + *                 on failure. + */ +int mbedtls_dhm_make_params( mbedtls_dhm_context *ctx, int x_size, +                     unsigned char *output, size_t *olen, +                     int (*f_rng)(void *, unsigned char *, size_t), +                     void *p_rng ); + +/** + * \brief          Set prime modulus and generator + * + * \param ctx      The DHM context. + * \param P        The MPI holding DHM prime modulus. + * \param G        The MPI holding DHM generator. + * + * \note           This function can be used to set P, G + *                 in preparation for \c mbedtls_dhm_make_params. + * + * \return         \c 0 if successful, or an \c MBEDTLS_ERR_DHM_XXX error code + *                 on failure. + */ +int mbedtls_dhm_set_group( mbedtls_dhm_context *ctx, +                           const mbedtls_mpi *P, +                           const mbedtls_mpi *G ); + +/** + * \brief          This function imports the public value G^Y of the peer. + * + * \param ctx      The DHM context. + * \param input    The input buffer. + * \param ilen     The size of the input buffer. + * + * \return         \c 0 on success, or an \c MBEDTLS_ERR_DHM_XXX error code + *                 on failure. + */ +int mbedtls_dhm_read_public( mbedtls_dhm_context *ctx, +                     const unsigned char *input, size_t ilen ); + +/** + * \brief          This function creates its own private value \c X and + *                 exports \c G^X. + * + * \param ctx      The DHM context. + * \param x_size   The private value size in Bytes. + * \param output   The destination buffer. + * \param olen     The length of the destination buffer. Must be at least +                   equal to ctx->len (the size of \c P). + * \param f_rng    The RNG function. + * \param p_rng    The RNG parameter. + * + * \note           The destination buffer will always be fully written + *                 so as to contain a big-endian presentation of G^X mod P. + *                 If it is larger than ctx->len, it will accordingly be + *                 padded with zero-bytes in the beginning. + * + * \return         \c 0 on success, or an \c MBEDTLS_ERR_DHM_XXX error code + *                 on failure. + */ +int mbedtls_dhm_make_public( mbedtls_dhm_context *ctx, int x_size, +                     unsigned char *output, size_t olen, +                     int (*f_rng)(void *, unsigned char *, size_t), +                     void *p_rng ); + +/** + * \brief               This function derives and exports the shared secret + *                      \c (G^Y)^X mod \c P. + * + * \param ctx           The DHM context. + * \param output        The destination buffer. + * \param output_size   The size of the destination buffer. Must be at least + *                      the size of ctx->len. + * \param olen          On exit, holds the actual number of Bytes written. + * \param f_rng         The RNG function, for blinding purposes. + * \param p_rng         The RNG parameter. + * + * \return         \c 0 on success, or an \c MBEDTLS_ERR_DHM_XXX error code + *                 on failure. + * + * \note           If non-NULL, \p f_rng is used to blind the input as + *                 a countermeasure against timing attacks. Blinding is used + *                 only if our secret value \p X is re-used and omitted + *                 otherwise. Therefore, we recommend always passing a + *                 non-NULL \p f_rng argument. + */ +int mbedtls_dhm_calc_secret( mbedtls_dhm_context *ctx, +                     unsigned char *output, size_t output_size, size_t *olen, +                     int (*f_rng)(void *, unsigned char *, size_t), +                     void *p_rng ); + +/** + * \brief          This function frees and clears the components of a DHM key. + * + * \param ctx      The DHM context to free and clear. + */ +void mbedtls_dhm_free( mbedtls_dhm_context *ctx ); + +#if defined(MBEDTLS_ASN1_PARSE_C) +/** \ingroup x509_module */ +/** + * \brief             This function parses DHM parameters in PEM or DER format. + * + * \param dhm         The DHM context to initialize. + * \param dhmin       The input buffer. + * \param dhminlen    The size of the buffer, including the terminating null + *                    Byte for PEM data. + * + * \return            \c 0 on success, or a specific DHM or PEM error code + *                    on failure. + */ +int mbedtls_dhm_parse_dhm( mbedtls_dhm_context *dhm, const unsigned char *dhmin, +                   size_t dhminlen ); + +#if defined(MBEDTLS_FS_IO) +/** \ingroup x509_module */ +/** + * \brief          This function loads and parses DHM parameters from a file. + * + * \param dhm      The DHM context to load the parameters to. + * \param path     The filename to read the DHM parameters from. + * + * \return         \c 0 on success, or a specific DHM or PEM error code + *                 on failure. + */ +int mbedtls_dhm_parse_dhmfile( mbedtls_dhm_context *dhm, const char *path ); +#endif /* MBEDTLS_FS_IO */ +#endif /* MBEDTLS_ASN1_PARSE_C */ + +#ifdef __cplusplus +} +#endif + +#else /* MBEDTLS_DHM_ALT */ +#include "dhm_alt.h" +#endif /* MBEDTLS_DHM_ALT */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          The DMH checkup routine. + * + * \return         \c 0 on success, or \c 1 on failure. + */ +int mbedtls_dhm_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + +/** + * RFC 3526, RFC 5114 and RFC 7919 standardize a number of + * Diffie-Hellman groups, some of which are included here + * for use within the SSL/TLS module and the user's convenience + * when configuring the Diffie-Hellman parameters by hand + * through \c mbedtls_ssl_conf_dh_param. + * + * The following lists the source of the above groups in the standards: + * - RFC 5114 section 2.2:  2048-bit MODP Group with 224-bit Prime Order Subgroup + * - RFC 3526 section 3:    2048-bit MODP Group + * - RFC 3526 section 4:    3072-bit MODP Group + * - RFC 3526 section 5:    4096-bit MODP Group + * - RFC 7919 section A.1:  ffdhe2048 + * - RFC 7919 section A.2:  ffdhe3072 + * - RFC 7919 section A.3:  ffdhe4096 + * - RFC 7919 section A.4:  ffdhe6144 + * - RFC 7919 section A.5:  ffdhe8192 + * + * The constants with suffix "_p" denote the chosen prime moduli, while + * the constants with suffix "_g" denote the chosen generator + * of the associated prime field. + * + * The constants further suffixed with "_bin" are provided in binary format, + * while all other constants represent null-terminated strings holding the + * hexadecimal presentation of the respective numbers. + * + * The primes from RFC 3526 and RFC 7919 have been generating by the following + * trust-worthy procedure: + * - Fix N in { 2048, 3072, 4096, 6144, 8192 } and consider the N-bit number + *   the first and last 64 bits are all 1, and the remaining N - 128 bits of + *   which are 0x7ff...ff. + * - Add the smallest multiple of the first N - 129 bits of the binary expansion + *   of pi (for RFC 5236) or e (for RFC 7919) to this intermediate bit-string + *   such that the resulting integer is a safe-prime. + * - The result is the respective RFC 3526 / 7919 prime, and the corresponding + *   generator is always chosen to be 2 (which is a square for these prime, + *   hence the corresponding subgroup has order (p-1)/2 and avoids leaking a + *   bit in the private exponent). + * + */ + +#if !defined(MBEDTLS_DEPRECATED_REMOVED) + +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED __attribute__((deprecated)) +MBEDTLS_DEPRECATED typedef char const * mbedtls_deprecated_constant_t; +#define MBEDTLS_DEPRECATED_STRING_CONSTANT( VAL )       \ +    ( (mbedtls_deprecated_constant_t) ( VAL ) ) +#else +#define MBEDTLS_DEPRECATED_STRING_CONSTANT( VAL ) VAL +#endif /* ! MBEDTLS_DEPRECATED_WARNING */ + +/** + * \warning The origin of the primes in RFC 5114 is not documented and + *          their use therefore constitutes a security risk! + * + * \deprecated The hex-encoded primes from RFC 5114 are deprecated and are + *             likely to be removed in a future version of the library without + *             replacement. + */ + +/** + * The hexadecimal presentation of the prime underlying the + * 2048-bit MODP Group with 224-bit Prime Order Subgroup, as defined + * in <em>RFC-5114: Additional Diffie-Hellman Groups for Use with + * IETF Standards</em>. + */ +#define MBEDTLS_DHM_RFC5114_MODP_P                              \ +    MBEDTLS_DEPRECATED_STRING_CONSTANT(                         \ +        "AD107E1E9123A9D0D660FAA79559C51FA20D64E5683B9FD1"      \ +        "B54B1597B61D0A75E6FA141DF95A56DBAF9A3C407BA1DF15"      \ +        "EB3D688A309C180E1DE6B85A1274A0A66D3F8152AD6AC212"      \ +        "9037C9EDEFDA4DF8D91E8FEF55B7394B7AD5B7D0B6C12207"      \ +        "C9F98D11ED34DBF6C6BA0B2C8BBC27BE6A00E0A0B9C49708"      \ +        "B3BF8A317091883681286130BC8985DB1602E714415D9330"      \ +        "278273C7DE31EFDC7310F7121FD5A07415987D9ADC0A486D"      \ +        "CDF93ACC44328387315D75E198C641A480CD86A1B9E587E8"      \ +        "BE60E69CC928B2B9C52172E413042E9B23F10B0E16E79763"      \ +        "C9B53DCF4BA80A29E3FB73C16B8E75B97EF363E2FFA31F71"      \ +        "CF9DE5384E71B81C0AC4DFFE0C10E64F" ) + +/** + * The hexadecimal presentation of the chosen generator of the 2048-bit MODP + * Group with 224-bit Prime Order Subgroup, as defined in <em>RFC-5114: + * Additional Diffie-Hellman Groups for Use with IETF Standards</em>. + */ +#define MBEDTLS_DHM_RFC5114_MODP_2048_G                         \ +    MBEDTLS_DEPRECATED_STRING_CONSTANT(                         \ +        "AC4032EF4F2D9AE39DF30B5C8FFDAC506CDEBE7B89998CAF"      \ +        "74866A08CFE4FFE3A6824A4E10B9A6F0DD921F01A70C4AFA"      \ +        "AB739D7700C29F52C57DB17C620A8652BE5E9001A8D66AD7"      \ +        "C17669101999024AF4D027275AC1348BB8A762D0521BC98A"      \ +        "E247150422EA1ED409939D54DA7460CDB5F6C6B250717CBE"      \ +        "F180EB34118E98D119529A45D6F834566E3025E316A330EF"      \ +        "BB77A86F0C1AB15B051AE3D428C8F8ACB70A8137150B8EEB"      \ +        "10E183EDD19963DDD9E263E4770589EF6AA21E7F5F2FF381"      \ +        "B539CCE3409D13CD566AFBB48D6C019181E1BCFE94B30269"      \ +        "EDFE72FE9B6AA4BD7B5A0F1C71CFFF4C19C418E1F6EC0179"      \ +        "81BC087F2A7065B384B890D3191F2BFA" ) + +/** + * The hexadecimal presentation of the prime underlying the 2048-bit MODP + * Group, as defined in <em>RFC-3526: More Modular Exponential (MODP) + * Diffie-Hellman groups for Internet Key Exchange (IKE)</em>. + * + * \deprecated The hex-encoded primes from RFC 3625 are deprecated and + *             superseded by the corresponding macros providing them as + *             binary constants. Their hex-encoded constants are likely + *             to be removed in a future version of the library. + * + */ +#define MBEDTLS_DHM_RFC3526_MODP_2048_P                         \ +    MBEDTLS_DEPRECATED_STRING_CONSTANT(                         \ +        "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1"      \ +        "29024E088A67CC74020BBEA63B139B22514A08798E3404DD"      \ +        "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245"      \ +        "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED"      \ +        "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D"      \ +        "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F"      \ +        "83655D23DCA3AD961C62F356208552BB9ED529077096966D"      \ +        "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B"      \ +        "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9"      \ +        "DE2BCBF6955817183995497CEA956AE515D2261898FA0510"      \ +        "15728E5A8AACAA68FFFFFFFFFFFFFFFF" ) + +/** + * The hexadecimal presentation of the chosen generator of the 2048-bit MODP + * Group, as defined in <em>RFC-3526: More Modular Exponential (MODP) + * Diffie-Hellman groups for Internet Key Exchange (IKE)</em>. + */ +#define MBEDTLS_DHM_RFC3526_MODP_2048_G                         \ +    MBEDTLS_DEPRECATED_STRING_CONSTANT( "02" ) + +/** + * The hexadecimal presentation of the prime underlying the 3072-bit MODP + * Group, as defined in <em>RFC-3072: More Modular Exponential (MODP) + * Diffie-Hellman groups for Internet Key Exchange (IKE)</em>. + */ +#define MBEDTLS_DHM_RFC3526_MODP_3072_P                         \ +    MBEDTLS_DEPRECATED_STRING_CONSTANT(                         \ +        "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1"      \ +        "29024E088A67CC74020BBEA63B139B22514A08798E3404DD"      \ +        "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245"      \ +        "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED"      \ +        "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D"      \ +        "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F"      \ +        "83655D23DCA3AD961C62F356208552BB9ED529077096966D"      \ +        "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B"      \ +        "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9"      \ +        "DE2BCBF6955817183995497CEA956AE515D2261898FA0510"      \ +        "15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64"      \ +        "ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7"      \ +        "ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B"      \ +        "F12FFA06D98A0864D87602733EC86A64521F2B18177B200C"      \ +        "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31"      \ +        "43DB5BFCE0FD108E4B82D120A93AD2CAFFFFFFFFFFFFFFFF" ) + +/** + * The hexadecimal presentation of the chosen generator of the 3072-bit MODP + * Group, as defined in <em>RFC-3526: More Modular Exponential (MODP) + * Diffie-Hellman groups for Internet Key Exchange (IKE)</em>. + */ +#define MBEDTLS_DHM_RFC3526_MODP_3072_G                      \ +    MBEDTLS_DEPRECATED_STRING_CONSTANT( "02" ) + +/** + * The hexadecimal presentation of the prime underlying the 4096-bit MODP + * Group, as defined in <em>RFC-3526: More Modular Exponential (MODP) + * Diffie-Hellman groups for Internet Key Exchange (IKE)</em>. + */ +#define MBEDTLS_DHM_RFC3526_MODP_4096_P                      \ +    MBEDTLS_DEPRECATED_STRING_CONSTANT(                      \ +        "FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1"   \ +        "29024E088A67CC74020BBEA63B139B22514A08798E3404DD"   \ +        "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245"   \ +        "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED"   \ +        "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D"   \ +        "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F"   \ +        "83655D23DCA3AD961C62F356208552BB9ED529077096966D"   \ +        "670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B"   \ +        "E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9"   \ +        "DE2BCBF6955817183995497CEA956AE515D2261898FA0510"   \ +        "15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64"   \ +        "ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7"   \ +        "ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B"   \ +        "F12FFA06D98A0864D87602733EC86A64521F2B18177B200C"   \ +        "BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31"   \ +        "43DB5BFCE0FD108E4B82D120A92108011A723C12A787E6D7"   \ +        "88719A10BDBA5B2699C327186AF4E23C1A946834B6150BDA"   \ +        "2583E9CA2AD44CE8DBBBC2DB04DE8EF92E8EFC141FBECAA6"   \ +        "287C59474E6BC05D99B2964FA090C3A2233BA186515BE7ED"   \ +        "1F612970CEE2D7AFB81BDD762170481CD0069127D5B05AA9"   \ +        "93B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934063199"   \ +        "FFFFFFFFFFFFFFFF" ) + +/** + * The hexadecimal presentation of the chosen generator of the 4096-bit MODP + * Group, as defined in <em>RFC-3526: More Modular Exponential (MODP) + * Diffie-Hellman groups for Internet Key Exchange (IKE)</em>. + */ +#define MBEDTLS_DHM_RFC3526_MODP_4096_G                      \ +    MBEDTLS_DEPRECATED_STRING_CONSTANT( "02" ) + +#endif /* MBEDTLS_DEPRECATED_REMOVED */ + +/* + * Trustworthy DHM parameters in binary form + */ + +#define MBEDTLS_DHM_RFC3526_MODP_2048_P_BIN {        \ +     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \ +     0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, \ +     0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, \ +     0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, \ +     0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, \ +     0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, \ +     0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, \ +     0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, \ +     0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, \ +     0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, \ +     0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, \ +     0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, \ +     0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, \ +     0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, \ +     0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, \ +     0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, \ +     0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, \ +     0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, \ +     0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, \ +     0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, \ +     0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, \ +     0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, \ +     0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C, \ +     0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B, \ +     0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03, \ +     0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F, \ +     0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9, \ +     0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18, \ +     0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5, \ +     0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10, \ +     0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAC, 0xAA, 0x68, \ +     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF } + +#define MBEDTLS_DHM_RFC3526_MODP_2048_G_BIN { 0x02 } + +#define MBEDTLS_DHM_RFC3526_MODP_3072_P_BIN {       \ +    0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \ +    0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34, \ +    0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1, \ +    0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74, \ +    0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22, \ +    0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD, \ +    0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B, \ +    0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37, \ +    0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45, \ +    0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6, \ +    0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B, \ +    0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED, \ +    0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5, \ +    0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6, \ +    0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D, \ +    0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05, \ +    0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A, \ +    0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F, \ +    0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96, \ +    0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB, \ +    0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D, \ +    0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04, \ +    0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C, \ +    0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B, \ +    0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03, \ +    0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F, \ +    0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9, \ +    0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18, \ +    0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5, \ +    0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10, \ +    0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAA, 0xC4, 0x2D, \ +    0xAD, 0x33, 0x17, 0x0D, 0x04, 0x50, 0x7A, 0x33, \ +    0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64, \ +    0xEC, 0xFB, 0x85, 0x04, 0x58, 0xDB, 0xEF, 0x0A, \ +    0x8A, 0xEA, 0x71, 0x57, 0x5D, 0x06, 0x0C, 0x7D, \ +    0xB3, 0x97, 0x0F, 0x85, 0xA6, 0xE1, 0xE4, 0xC7, \ +    0xAB, 0xF5, 0xAE, 0x8C, 0xDB, 0x09, 0x33, 0xD7, \ +    0x1E, 0x8C, 0x94, 0xE0, 0x4A, 0x25, 0x61, 0x9D, \ +    0xCE, 0xE3, 0xD2, 0x26, 0x1A, 0xD2, 0xEE, 0x6B, \ +    0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64, \ +    0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64, \ +    0x52, 0x1F, 0x2B, 0x18, 0x17, 0x7B, 0x20, 0x0C, \ +    0xBB, 0xE1, 0x17, 0x57, 0x7A, 0x61, 0x5D, 0x6C, \ +    0x77, 0x09, 0x88, 0xC0, 0xBA, 0xD9, 0x46, 0xE2, \ +    0x08, 0xE2, 0x4F, 0xA0, 0x74, 0xE5, 0xAB, 0x31, \ +    0x43, 0xDB, 0x5B, 0xFC, 0xE0, 0xFD, 0x10, 0x8E, \ +    0x4B, 0x82, 0xD1, 0x20, 0xA9, 0x3A, 0xD2, 0xCA, \ +    0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF } + +#define MBEDTLS_DHM_RFC3526_MODP_3072_G_BIN { 0x02 } + +#define MBEDTLS_DHM_RFC3526_MODP_4096_P_BIN  {       \ +    0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,  \ +    0xC9, 0x0F, 0xDA, 0xA2, 0x21, 0x68, 0xC2, 0x34,  \ +    0xC4, 0xC6, 0x62, 0x8B, 0x80, 0xDC, 0x1C, 0xD1,  \ +    0x29, 0x02, 0x4E, 0x08, 0x8A, 0x67, 0xCC, 0x74,  \ +    0x02, 0x0B, 0xBE, 0xA6, 0x3B, 0x13, 0x9B, 0x22,  \ +    0x51, 0x4A, 0x08, 0x79, 0x8E, 0x34, 0x04, 0xDD,  \ +    0xEF, 0x95, 0x19, 0xB3, 0xCD, 0x3A, 0x43, 0x1B,  \ +    0x30, 0x2B, 0x0A, 0x6D, 0xF2, 0x5F, 0x14, 0x37,  \ +    0x4F, 0xE1, 0x35, 0x6D, 0x6D, 0x51, 0xC2, 0x45,  \ +    0xE4, 0x85, 0xB5, 0x76, 0x62, 0x5E, 0x7E, 0xC6,  \ +    0xF4, 0x4C, 0x42, 0xE9, 0xA6, 0x37, 0xED, 0x6B,  \ +    0x0B, 0xFF, 0x5C, 0xB6, 0xF4, 0x06, 0xB7, 0xED,  \ +    0xEE, 0x38, 0x6B, 0xFB, 0x5A, 0x89, 0x9F, 0xA5,  \ +    0xAE, 0x9F, 0x24, 0x11, 0x7C, 0x4B, 0x1F, 0xE6,  \ +    0x49, 0x28, 0x66, 0x51, 0xEC, 0xE4, 0x5B, 0x3D,  \ +    0xC2, 0x00, 0x7C, 0xB8, 0xA1, 0x63, 0xBF, 0x05,  \ +    0x98, 0xDA, 0x48, 0x36, 0x1C, 0x55, 0xD3, 0x9A,  \ +    0x69, 0x16, 0x3F, 0xA8, 0xFD, 0x24, 0xCF, 0x5F,  \ +    0x83, 0x65, 0x5D, 0x23, 0xDC, 0xA3, 0xAD, 0x96,  \ +    0x1C, 0x62, 0xF3, 0x56, 0x20, 0x85, 0x52, 0xBB,  \ +    0x9E, 0xD5, 0x29, 0x07, 0x70, 0x96, 0x96, 0x6D,  \ +    0x67, 0x0C, 0x35, 0x4E, 0x4A, 0xBC, 0x98, 0x04,  \ +    0xF1, 0x74, 0x6C, 0x08, 0xCA, 0x18, 0x21, 0x7C,  \ +    0x32, 0x90, 0x5E, 0x46, 0x2E, 0x36, 0xCE, 0x3B,  \ +    0xE3, 0x9E, 0x77, 0x2C, 0x18, 0x0E, 0x86, 0x03,  \ +    0x9B, 0x27, 0x83, 0xA2, 0xEC, 0x07, 0xA2, 0x8F,  \ +    0xB5, 0xC5, 0x5D, 0xF0, 0x6F, 0x4C, 0x52, 0xC9,  \ +    0xDE, 0x2B, 0xCB, 0xF6, 0x95, 0x58, 0x17, 0x18,  \ +    0x39, 0x95, 0x49, 0x7C, 0xEA, 0x95, 0x6A, 0xE5,  \ +    0x15, 0xD2, 0x26, 0x18, 0x98, 0xFA, 0x05, 0x10,  \ +    0x15, 0x72, 0x8E, 0x5A, 0x8A, 0xAA, 0xC4, 0x2D,  \ +    0xAD, 0x33, 0x17, 0x0D, 0x04, 0x50, 0x7A, 0x33,  \ +    0xA8, 0x55, 0x21, 0xAB, 0xDF, 0x1C, 0xBA, 0x64,  \ +    0xEC, 0xFB, 0x85, 0x04, 0x58, 0xDB, 0xEF, 0x0A,  \ +    0x8A, 0xEA, 0x71, 0x57, 0x5D, 0x06, 0x0C, 0x7D,  \ +    0xB3, 0x97, 0x0F, 0x85, 0xA6, 0xE1, 0xE4, 0xC7,  \ +    0xAB, 0xF5, 0xAE, 0x8C, 0xDB, 0x09, 0x33, 0xD7,  \ +    0x1E, 0x8C, 0x94, 0xE0, 0x4A, 0x25, 0x61, 0x9D,  \ +    0xCE, 0xE3, 0xD2, 0x26, 0x1A, 0xD2, 0xEE, 0x6B,  \ +    0xF1, 0x2F, 0xFA, 0x06, 0xD9, 0x8A, 0x08, 0x64,  \ +    0xD8, 0x76, 0x02, 0x73, 0x3E, 0xC8, 0x6A, 0x64,  \ +    0x52, 0x1F, 0x2B, 0x18, 0x17, 0x7B, 0x20, 0x0C,  \ +    0xBB, 0xE1, 0x17, 0x57, 0x7A, 0x61, 0x5D, 0x6C,  \ +    0x77, 0x09, 0x88, 0xC0, 0xBA, 0xD9, 0x46, 0xE2,  \ +    0x08, 0xE2, 0x4F, 0xA0, 0x74, 0xE5, 0xAB, 0x31,  \ +    0x43, 0xDB, 0x5B, 0xFC, 0xE0, 0xFD, 0x10, 0x8E,  \ +    0x4B, 0x82, 0xD1, 0x20, 0xA9, 0x21, 0x08, 0x01,  \ +    0x1A, 0x72, 0x3C, 0x12, 0xA7, 0x87, 0xE6, 0xD7,  \ +    0x88, 0x71, 0x9A, 0x10, 0xBD, 0xBA, 0x5B, 0x26,  \ +    0x99, 0xC3, 0x27, 0x18, 0x6A, 0xF4, 0xE2, 0x3C,  \ +    0x1A, 0x94, 0x68, 0x34, 0xB6, 0x15, 0x0B, 0xDA,  \ +    0x25, 0x83, 0xE9, 0xCA, 0x2A, 0xD4, 0x4C, 0xE8,  \ +    0xDB, 0xBB, 0xC2, 0xDB, 0x04, 0xDE, 0x8E, 0xF9,  \ +    0x2E, 0x8E, 0xFC, 0x14, 0x1F, 0xBE, 0xCA, 0xA6,  \ +    0x28, 0x7C, 0x59, 0x47, 0x4E, 0x6B, 0xC0, 0x5D,  \ +    0x99, 0xB2, 0x96, 0x4F, 0xA0, 0x90, 0xC3, 0xA2,  \ +    0x23, 0x3B, 0xA1, 0x86, 0x51, 0x5B, 0xE7, 0xED,  \ +    0x1F, 0x61, 0x29, 0x70, 0xCE, 0xE2, 0xD7, 0xAF,  \ +    0xB8, 0x1B, 0xDD, 0x76, 0x21, 0x70, 0x48, 0x1C,  \ +    0xD0, 0x06, 0x91, 0x27, 0xD5, 0xB0, 0x5A, 0xA9,  \ +    0x93, 0xB4, 0xEA, 0x98, 0x8D, 0x8F, 0xDD, 0xC1,  \ +    0x86, 0xFF, 0xB7, 0xDC, 0x90, 0xA6, 0xC0, 0x8F,  \ +    0x4D, 0xF4, 0x35, 0xC9, 0x34, 0x06, 0x31, 0x99,  \ +    0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF } + +#define MBEDTLS_DHM_RFC3526_MODP_4096_G_BIN { 0x02 } + +#define MBEDTLS_DHM_RFC7919_FFDHE2048_P_BIN {        \ +     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \ +     0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, \ +     0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, \ +     0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, \ +     0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, \ +     0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, \ +     0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, \ +     0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, \ +     0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, \ +     0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, \ +     0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, \ +     0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, \ +     0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, \ +     0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, \ +     0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, \ +     0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, \ +     0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, \ +     0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, \ +     0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, \ +     0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, \ +     0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, \ +     0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, \ +     0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, \ +     0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, \ +     0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, \ +     0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, \ +     0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, \ +     0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, \ +     0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, \ +     0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, \ +     0x88, 0x6B, 0x42, 0x38, 0x61, 0x28, 0x5C, 0x97, \ +     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, } + +#define MBEDTLS_DHM_RFC7919_FFDHE2048_G_BIN { 0x02 } + +#define MBEDTLS_DHM_RFC7919_FFDHE3072_P_BIN { \ +     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \ +     0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, \ +     0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, \ +     0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, \ +     0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, \ +     0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, \ +     0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, \ +     0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, \ +     0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, \ +     0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, \ +     0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, \ +     0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, \ +     0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, \ +     0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, \ +     0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, \ +     0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, \ +     0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, \ +     0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, \ +     0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, \ +     0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, \ +     0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, \ +     0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, \ +     0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, \ +     0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, \ +     0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, \ +     0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, \ +     0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, \ +     0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, \ +     0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, \ +     0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, \ +     0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, \ +     0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, \ +     0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, \ +     0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, \ +     0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, \ +     0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, \ +     0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, \ +     0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, \ +     0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, \ +     0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, \ +     0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, \ +     0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, \ +     0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, \ +     0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, \ +     0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, \ +     0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, \ +     0x25, 0xE4, 0x1D, 0x2B, 0x66, 0xC6, 0x2E, 0x37, \ +     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF } + +#define MBEDTLS_DHM_RFC7919_FFDHE3072_G_BIN { 0x02 } + +#define MBEDTLS_DHM_RFC7919_FFDHE4096_P_BIN {        \ +     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \ +     0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, \ +     0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, \ +     0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, \ +     0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, \ +     0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, \ +     0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, \ +     0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, \ +     0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, \ +     0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, \ +     0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, \ +     0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, \ +     0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, \ +     0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, \ +     0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, \ +     0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, \ +     0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, \ +     0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, \ +     0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, \ +     0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, \ +     0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, \ +     0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, \ +     0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, \ +     0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, \ +     0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, \ +     0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, \ +     0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, \ +     0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, \ +     0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, \ +     0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, \ +     0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, \ +     0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, \ +     0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, \ +     0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, \ +     0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, \ +     0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, \ +     0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, \ +     0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, \ +     0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, \ +     0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, \ +     0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, \ +     0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, \ +     0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, \ +     0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, \ +     0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, \ +     0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, \ +     0x25, 0xE4, 0x1D, 0x2B, 0x66, 0x9E, 0x1E, 0xF1, \ +     0x6E, 0x6F, 0x52, 0xC3, 0x16, 0x4D, 0xF4, 0xFB, \ +     0x79, 0x30, 0xE9, 0xE4, 0xE5, 0x88, 0x57, 0xB6, \ +     0xAC, 0x7D, 0x5F, 0x42, 0xD6, 0x9F, 0x6D, 0x18, \ +     0x77, 0x63, 0xCF, 0x1D, 0x55, 0x03, 0x40, 0x04, \ +     0x87, 0xF5, 0x5B, 0xA5, 0x7E, 0x31, 0xCC, 0x7A, \ +     0x71, 0x35, 0xC8, 0x86, 0xEF, 0xB4, 0x31, 0x8A, \ +     0xED, 0x6A, 0x1E, 0x01, 0x2D, 0x9E, 0x68, 0x32, \ +     0xA9, 0x07, 0x60, 0x0A, 0x91, 0x81, 0x30, 0xC4, \ +     0x6D, 0xC7, 0x78, 0xF9, 0x71, 0xAD, 0x00, 0x38, \ +     0x09, 0x29, 0x99, 0xA3, 0x33, 0xCB, 0x8B, 0x7A, \ +     0x1A, 0x1D, 0xB9, 0x3D, 0x71, 0x40, 0x00, 0x3C, \ +     0x2A, 0x4E, 0xCE, 0xA9, 0xF9, 0x8D, 0x0A, 0xCC, \ +     0x0A, 0x82, 0x91, 0xCD, 0xCE, 0xC9, 0x7D, 0xCF, \ +     0x8E, 0xC9, 0xB5, 0x5A, 0x7F, 0x88, 0xA4, 0x6B, \ +     0x4D, 0xB5, 0xA8, 0x51, 0xF4, 0x41, 0x82, 0xE1, \ +     0xC6, 0x8A, 0x00, 0x7E, 0x5E, 0x65, 0x5F, 0x6A, \ +     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF } + +#define MBEDTLS_DHM_RFC7919_FFDHE4096_G_BIN { 0x02 } + +#define MBEDTLS_DHM_RFC7919_FFDHE6144_P_BIN {        \ +     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \ +     0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, \ +     0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, \ +     0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, \ +     0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, \ +     0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, \ +     0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, \ +     0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, \ +     0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, \ +     0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, \ +     0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, \ +     0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, \ +     0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, \ +     0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, \ +     0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, \ +     0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, \ +     0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, \ +     0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, \ +     0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, \ +     0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, \ +     0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, \ +     0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, \ +     0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, \ +     0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, \ +     0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, \ +     0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, \ +     0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, \ +     0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, \ +     0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, \ +     0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, \ +     0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, \ +     0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, \ +     0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, \ +     0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, \ +     0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, \ +     0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, \ +     0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, \ +     0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, \ +     0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, \ +     0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, \ +     0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, \ +     0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, \ +     0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, \ +     0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, \ +     0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, \ +     0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, \ +     0x25, 0xE4, 0x1D, 0x2B, 0x66, 0x9E, 0x1E, 0xF1, \ +     0x6E, 0x6F, 0x52, 0xC3, 0x16, 0x4D, 0xF4, 0xFB, \ +     0x79, 0x30, 0xE9, 0xE4, 0xE5, 0x88, 0x57, 0xB6, \ +     0xAC, 0x7D, 0x5F, 0x42, 0xD6, 0x9F, 0x6D, 0x18, \ +     0x77, 0x63, 0xCF, 0x1D, 0x55, 0x03, 0x40, 0x04, \ +     0x87, 0xF5, 0x5B, 0xA5, 0x7E, 0x31, 0xCC, 0x7A, \ +     0x71, 0x35, 0xC8, 0x86, 0xEF, 0xB4, 0x31, 0x8A, \ +     0xED, 0x6A, 0x1E, 0x01, 0x2D, 0x9E, 0x68, 0x32, \ +     0xA9, 0x07, 0x60, 0x0A, 0x91, 0x81, 0x30, 0xC4, \ +     0x6D, 0xC7, 0x78, 0xF9, 0x71, 0xAD, 0x00, 0x38, \ +     0x09, 0x29, 0x99, 0xA3, 0x33, 0xCB, 0x8B, 0x7A, \ +     0x1A, 0x1D, 0xB9, 0x3D, 0x71, 0x40, 0x00, 0x3C, \ +     0x2A, 0x4E, 0xCE, 0xA9, 0xF9, 0x8D, 0x0A, 0xCC, \ +     0x0A, 0x82, 0x91, 0xCD, 0xCE, 0xC9, 0x7D, 0xCF, \ +     0x8E, 0xC9, 0xB5, 0x5A, 0x7F, 0x88, 0xA4, 0x6B, \ +     0x4D, 0xB5, 0xA8, 0x51, 0xF4, 0x41, 0x82, 0xE1, \ +     0xC6, 0x8A, 0x00, 0x7E, 0x5E, 0x0D, 0xD9, 0x02, \ +     0x0B, 0xFD, 0x64, 0xB6, 0x45, 0x03, 0x6C, 0x7A, \ +     0x4E, 0x67, 0x7D, 0x2C, 0x38, 0x53, 0x2A, 0x3A, \ +     0x23, 0xBA, 0x44, 0x42, 0xCA, 0xF5, 0x3E, 0xA6, \ +     0x3B, 0xB4, 0x54, 0x32, 0x9B, 0x76, 0x24, 0xC8, \ +     0x91, 0x7B, 0xDD, 0x64, 0xB1, 0xC0, 0xFD, 0x4C, \ +     0xB3, 0x8E, 0x8C, 0x33, 0x4C, 0x70, 0x1C, 0x3A, \ +     0xCD, 0xAD, 0x06, 0x57, 0xFC, 0xCF, 0xEC, 0x71, \ +     0x9B, 0x1F, 0x5C, 0x3E, 0x4E, 0x46, 0x04, 0x1F, \ +     0x38, 0x81, 0x47, 0xFB, 0x4C, 0xFD, 0xB4, 0x77, \ +     0xA5, 0x24, 0x71, 0xF7, 0xA9, 0xA9, 0x69, 0x10, \ +     0xB8, 0x55, 0x32, 0x2E, 0xDB, 0x63, 0x40, 0xD8, \ +     0xA0, 0x0E, 0xF0, 0x92, 0x35, 0x05, 0x11, 0xE3, \ +     0x0A, 0xBE, 0xC1, 0xFF, 0xF9, 0xE3, 0xA2, 0x6E, \ +     0x7F, 0xB2, 0x9F, 0x8C, 0x18, 0x30, 0x23, 0xC3, \ +     0x58, 0x7E, 0x38, 0xDA, 0x00, 0x77, 0xD9, 0xB4, \ +     0x76, 0x3E, 0x4E, 0x4B, 0x94, 0xB2, 0xBB, 0xC1, \ +     0x94, 0xC6, 0x65, 0x1E, 0x77, 0xCA, 0xF9, 0x92, \ +     0xEE, 0xAA, 0xC0, 0x23, 0x2A, 0x28, 0x1B, 0xF6, \ +     0xB3, 0xA7, 0x39, 0xC1, 0x22, 0x61, 0x16, 0x82, \ +     0x0A, 0xE8, 0xDB, 0x58, 0x47, 0xA6, 0x7C, 0xBE, \ +     0xF9, 0xC9, 0x09, 0x1B, 0x46, 0x2D, 0x53, 0x8C, \ +     0xD7, 0x2B, 0x03, 0x74, 0x6A, 0xE7, 0x7F, 0x5E, \ +     0x62, 0x29, 0x2C, 0x31, 0x15, 0x62, 0xA8, 0x46, \ +     0x50, 0x5D, 0xC8, 0x2D, 0xB8, 0x54, 0x33, 0x8A, \ +     0xE4, 0x9F, 0x52, 0x35, 0xC9, 0x5B, 0x91, 0x17, \ +     0x8C, 0xCF, 0x2D, 0xD5, 0xCA, 0xCE, 0xF4, 0x03, \ +     0xEC, 0x9D, 0x18, 0x10, 0xC6, 0x27, 0x2B, 0x04, \ +     0x5B, 0x3B, 0x71, 0xF9, 0xDC, 0x6B, 0x80, 0xD6, \ +     0x3F, 0xDD, 0x4A, 0x8E, 0x9A, 0xDB, 0x1E, 0x69, \ +     0x62, 0xA6, 0x95, 0x26, 0xD4, 0x31, 0x61, 0xC1, \ +     0xA4, 0x1D, 0x57, 0x0D, 0x79, 0x38, 0xDA, 0xD4, \ +     0xA4, 0x0E, 0x32, 0x9C, 0xD0, 0xE4, 0x0E, 0x65, \ +     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF } + +#define MBEDTLS_DHM_RFC7919_FFDHE6144_G_BIN { 0x02 } + +#define MBEDTLS_DHM_RFC7919_FFDHE8192_P_BIN {        \ +     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, \ +     0xAD, 0xF8, 0x54, 0x58, 0xA2, 0xBB, 0x4A, 0x9A, \ +     0xAF, 0xDC, 0x56, 0x20, 0x27, 0x3D, 0x3C, 0xF1, \ +     0xD8, 0xB9, 0xC5, 0x83, 0xCE, 0x2D, 0x36, 0x95, \ +     0xA9, 0xE1, 0x36, 0x41, 0x14, 0x64, 0x33, 0xFB, \ +     0xCC, 0x93, 0x9D, 0xCE, 0x24, 0x9B, 0x3E, 0xF9, \ +     0x7D, 0x2F, 0xE3, 0x63, 0x63, 0x0C, 0x75, 0xD8, \ +     0xF6, 0x81, 0xB2, 0x02, 0xAE, 0xC4, 0x61, 0x7A, \ +     0xD3, 0xDF, 0x1E, 0xD5, 0xD5, 0xFD, 0x65, 0x61, \ +     0x24, 0x33, 0xF5, 0x1F, 0x5F, 0x06, 0x6E, 0xD0, \ +     0x85, 0x63, 0x65, 0x55, 0x3D, 0xED, 0x1A, 0xF3, \ +     0xB5, 0x57, 0x13, 0x5E, 0x7F, 0x57, 0xC9, 0x35, \ +     0x98, 0x4F, 0x0C, 0x70, 0xE0, 0xE6, 0x8B, 0x77, \ +     0xE2, 0xA6, 0x89, 0xDA, 0xF3, 0xEF, 0xE8, 0x72, \ +     0x1D, 0xF1, 0x58, 0xA1, 0x36, 0xAD, 0xE7, 0x35, \ +     0x30, 0xAC, 0xCA, 0x4F, 0x48, 0x3A, 0x79, 0x7A, \ +     0xBC, 0x0A, 0xB1, 0x82, 0xB3, 0x24, 0xFB, 0x61, \ +     0xD1, 0x08, 0xA9, 0x4B, 0xB2, 0xC8, 0xE3, 0xFB, \ +     0xB9, 0x6A, 0xDA, 0xB7, 0x60, 0xD7, 0xF4, 0x68, \ +     0x1D, 0x4F, 0x42, 0xA3, 0xDE, 0x39, 0x4D, 0xF4, \ +     0xAE, 0x56, 0xED, 0xE7, 0x63, 0x72, 0xBB, 0x19, \ +     0x0B, 0x07, 0xA7, 0xC8, 0xEE, 0x0A, 0x6D, 0x70, \ +     0x9E, 0x02, 0xFC, 0xE1, 0xCD, 0xF7, 0xE2, 0xEC, \ +     0xC0, 0x34, 0x04, 0xCD, 0x28, 0x34, 0x2F, 0x61, \ +     0x91, 0x72, 0xFE, 0x9C, 0xE9, 0x85, 0x83, 0xFF, \ +     0x8E, 0x4F, 0x12, 0x32, 0xEE, 0xF2, 0x81, 0x83, \ +     0xC3, 0xFE, 0x3B, 0x1B, 0x4C, 0x6F, 0xAD, 0x73, \ +     0x3B, 0xB5, 0xFC, 0xBC, 0x2E, 0xC2, 0x20, 0x05, \ +     0xC5, 0x8E, 0xF1, 0x83, 0x7D, 0x16, 0x83, 0xB2, \ +     0xC6, 0xF3, 0x4A, 0x26, 0xC1, 0xB2, 0xEF, 0xFA, \ +     0x88, 0x6B, 0x42, 0x38, 0x61, 0x1F, 0xCF, 0xDC, \ +     0xDE, 0x35, 0x5B, 0x3B, 0x65, 0x19, 0x03, 0x5B, \ +     0xBC, 0x34, 0xF4, 0xDE, 0xF9, 0x9C, 0x02, 0x38, \ +     0x61, 0xB4, 0x6F, 0xC9, 0xD6, 0xE6, 0xC9, 0x07, \ +     0x7A, 0xD9, 0x1D, 0x26, 0x91, 0xF7, 0xF7, 0xEE, \ +     0x59, 0x8C, 0xB0, 0xFA, 0xC1, 0x86, 0xD9, 0x1C, \ +     0xAE, 0xFE, 0x13, 0x09, 0x85, 0x13, 0x92, 0x70, \ +     0xB4, 0x13, 0x0C, 0x93, 0xBC, 0x43, 0x79, 0x44, \ +     0xF4, 0xFD, 0x44, 0x52, 0xE2, 0xD7, 0x4D, 0xD3, \ +     0x64, 0xF2, 0xE2, 0x1E, 0x71, 0xF5, 0x4B, 0xFF, \ +     0x5C, 0xAE, 0x82, 0xAB, 0x9C, 0x9D, 0xF6, 0x9E, \ +     0xE8, 0x6D, 0x2B, 0xC5, 0x22, 0x36, 0x3A, 0x0D, \ +     0xAB, 0xC5, 0x21, 0x97, 0x9B, 0x0D, 0xEA, 0xDA, \ +     0x1D, 0xBF, 0x9A, 0x42, 0xD5, 0xC4, 0x48, 0x4E, \ +     0x0A, 0xBC, 0xD0, 0x6B, 0xFA, 0x53, 0xDD, 0xEF, \ +     0x3C, 0x1B, 0x20, 0xEE, 0x3F, 0xD5, 0x9D, 0x7C, \ +     0x25, 0xE4, 0x1D, 0x2B, 0x66, 0x9E, 0x1E, 0xF1, \ +     0x6E, 0x6F, 0x52, 0xC3, 0x16, 0x4D, 0xF4, 0xFB, \ +     0x79, 0x30, 0xE9, 0xE4, 0xE5, 0x88, 0x57, 0xB6, \ +     0xAC, 0x7D, 0x5F, 0x42, 0xD6, 0x9F, 0x6D, 0x18, \ +     0x77, 0x63, 0xCF, 0x1D, 0x55, 0x03, 0x40, 0x04, \ +     0x87, 0xF5, 0x5B, 0xA5, 0x7E, 0x31, 0xCC, 0x7A, \ +     0x71, 0x35, 0xC8, 0x86, 0xEF, 0xB4, 0x31, 0x8A, \ +     0xED, 0x6A, 0x1E, 0x01, 0x2D, 0x9E, 0x68, 0x32, \ +     0xA9, 0x07, 0x60, 0x0A, 0x91, 0x81, 0x30, 0xC4, \ +     0x6D, 0xC7, 0x78, 0xF9, 0x71, 0xAD, 0x00, 0x38, \ +     0x09, 0x29, 0x99, 0xA3, 0x33, 0xCB, 0x8B, 0x7A, \ +     0x1A, 0x1D, 0xB9, 0x3D, 0x71, 0x40, 0x00, 0x3C, \ +     0x2A, 0x4E, 0xCE, 0xA9, 0xF9, 0x8D, 0x0A, 0xCC, \ +     0x0A, 0x82, 0x91, 0xCD, 0xCE, 0xC9, 0x7D, 0xCF, \ +     0x8E, 0xC9, 0xB5, 0x5A, 0x7F, 0x88, 0xA4, 0x6B, \ +     0x4D, 0xB5, 0xA8, 0x51, 0xF4, 0x41, 0x82, 0xE1, \ +     0xC6, 0x8A, 0x00, 0x7E, 0x5E, 0x0D, 0xD9, 0x02, \ +     0x0B, 0xFD, 0x64, 0xB6, 0x45, 0x03, 0x6C, 0x7A, \ +     0x4E, 0x67, 0x7D, 0x2C, 0x38, 0x53, 0x2A, 0x3A, \ +     0x23, 0xBA, 0x44, 0x42, 0xCA, 0xF5, 0x3E, 0xA6, \ +     0x3B, 0xB4, 0x54, 0x32, 0x9B, 0x76, 0x24, 0xC8, \ +     0x91, 0x7B, 0xDD, 0x64, 0xB1, 0xC0, 0xFD, 0x4C, \ +     0xB3, 0x8E, 0x8C, 0x33, 0x4C, 0x70, 0x1C, 0x3A, \ +     0xCD, 0xAD, 0x06, 0x57, 0xFC, 0xCF, 0xEC, 0x71, \ +     0x9B, 0x1F, 0x5C, 0x3E, 0x4E, 0x46, 0x04, 0x1F, \ +     0x38, 0x81, 0x47, 0xFB, 0x4C, 0xFD, 0xB4, 0x77, \ +     0xA5, 0x24, 0x71, 0xF7, 0xA9, 0xA9, 0x69, 0x10, \ +     0xB8, 0x55, 0x32, 0x2E, 0xDB, 0x63, 0x40, 0xD8, \ +     0xA0, 0x0E, 0xF0, 0x92, 0x35, 0x05, 0x11, 0xE3, \ +     0x0A, 0xBE, 0xC1, 0xFF, 0xF9, 0xE3, 0xA2, 0x6E, \ +     0x7F, 0xB2, 0x9F, 0x8C, 0x18, 0x30, 0x23, 0xC3, \ +     0x58, 0x7E, 0x38, 0xDA, 0x00, 0x77, 0xD9, 0xB4, \ +     0x76, 0x3E, 0x4E, 0x4B, 0x94, 0xB2, 0xBB, 0xC1, \ +     0x94, 0xC6, 0x65, 0x1E, 0x77, 0xCA, 0xF9, 0x92, \ +     0xEE, 0xAA, 0xC0, 0x23, 0x2A, 0x28, 0x1B, 0xF6, \ +     0xB3, 0xA7, 0x39, 0xC1, 0x22, 0x61, 0x16, 0x82, \ +     0x0A, 0xE8, 0xDB, 0x58, 0x47, 0xA6, 0x7C, 0xBE, \ +     0xF9, 0xC9, 0x09, 0x1B, 0x46, 0x2D, 0x53, 0x8C, \ +     0xD7, 0x2B, 0x03, 0x74, 0x6A, 0xE7, 0x7F, 0x5E, \ +     0x62, 0x29, 0x2C, 0x31, 0x15, 0x62, 0xA8, 0x46, \ +     0x50, 0x5D, 0xC8, 0x2D, 0xB8, 0x54, 0x33, 0x8A, \ +     0xE4, 0x9F, 0x52, 0x35, 0xC9, 0x5B, 0x91, 0x17, \ +     0x8C, 0xCF, 0x2D, 0xD5, 0xCA, 0xCE, 0xF4, 0x03, \ +     0xEC, 0x9D, 0x18, 0x10, 0xC6, 0x27, 0x2B, 0x04, \ +     0x5B, 0x3B, 0x71, 0xF9, 0xDC, 0x6B, 0x80, 0xD6, \ +     0x3F, 0xDD, 0x4A, 0x8E, 0x9A, 0xDB, 0x1E, 0x69, \ +     0x62, 0xA6, 0x95, 0x26, 0xD4, 0x31, 0x61, 0xC1, \ +     0xA4, 0x1D, 0x57, 0x0D, 0x79, 0x38, 0xDA, 0xD4, \ +     0xA4, 0x0E, 0x32, 0x9C, 0xCF, 0xF4, 0x6A, 0xAA, \ +     0x36, 0xAD, 0x00, 0x4C, 0xF6, 0x00, 0xC8, 0x38, \ +     0x1E, 0x42, 0x5A, 0x31, 0xD9, 0x51, 0xAE, 0x64, \ +     0xFD, 0xB2, 0x3F, 0xCE, 0xC9, 0x50, 0x9D, 0x43, \ +     0x68, 0x7F, 0xEB, 0x69, 0xED, 0xD1, 0xCC, 0x5E, \ +     0x0B, 0x8C, 0xC3, 0xBD, 0xF6, 0x4B, 0x10, 0xEF, \ +     0x86, 0xB6, 0x31, 0x42, 0xA3, 0xAB, 0x88, 0x29, \ +     0x55, 0x5B, 0x2F, 0x74, 0x7C, 0x93, 0x26, 0x65, \ +     0xCB, 0x2C, 0x0F, 0x1C, 0xC0, 0x1B, 0xD7, 0x02, \ +     0x29, 0x38, 0x88, 0x39, 0xD2, 0xAF, 0x05, 0xE4, \ +     0x54, 0x50, 0x4A, 0xC7, 0x8B, 0x75, 0x82, 0x82, \ +     0x28, 0x46, 0xC0, 0xBA, 0x35, 0xC3, 0x5F, 0x5C, \ +     0x59, 0x16, 0x0C, 0xC0, 0x46, 0xFD, 0x82, 0x51, \ +     0x54, 0x1F, 0xC6, 0x8C, 0x9C, 0x86, 0xB0, 0x22, \ +     0xBB, 0x70, 0x99, 0x87, 0x6A, 0x46, 0x0E, 0x74, \ +     0x51, 0xA8, 0xA9, 0x31, 0x09, 0x70, 0x3F, 0xEE, \ +     0x1C, 0x21, 0x7E, 0x6C, 0x38, 0x26, 0xE5, 0x2C, \ +     0x51, 0xAA, 0x69, 0x1E, 0x0E, 0x42, 0x3C, 0xFC, \ +     0x99, 0xE9, 0xE3, 0x16, 0x50, 0xC1, 0x21, 0x7B, \ +     0x62, 0x48, 0x16, 0xCD, 0xAD, 0x9A, 0x95, 0xF9, \ +     0xD5, 0xB8, 0x01, 0x94, 0x88, 0xD9, 0xC0, 0xA0, \ +     0xA1, 0xFE, 0x30, 0x75, 0xA5, 0x77, 0xE2, 0x31, \ +     0x83, 0xF8, 0x1D, 0x4A, 0x3F, 0x2F, 0xA4, 0x57, \ +     0x1E, 0xFC, 0x8C, 0xE0, 0xBA, 0x8A, 0x4F, 0xE8, \ +     0xB6, 0x85, 0x5D, 0xFE, 0x72, 0xB0, 0xA6, 0x6E, \ +     0xDE, 0xD2, 0xFB, 0xAB, 0xFB, 0xE5, 0x8A, 0x30, \ +     0xFA, 0xFA, 0xBE, 0x1C, 0x5D, 0x71, 0xA8, 0x7E, \ +     0x2F, 0x74, 0x1E, 0xF8, 0xC1, 0xFE, 0x86, 0xFE, \ +     0xA6, 0xBB, 0xFD, 0xE5, 0x30, 0x67, 0x7F, 0x0D, \ +     0x97, 0xD1, 0x1D, 0x49, 0xF7, 0xA8, 0x44, 0x3D, \ +     0x08, 0x22, 0xE5, 0x06, 0xA9, 0xF4, 0x61, 0x4E, \ +     0x01, 0x1E, 0x2A, 0x94, 0x83, 0x8F, 0xF8, 0x8C, \ +     0xD6, 0x8C, 0x8B, 0xB7, 0xC5, 0xC6, 0x42, 0x4C, \ +     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF } + +#define MBEDTLS_DHM_RFC7919_FFDHE8192_G_BIN { 0x02 } + +#endif /* dhm.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/ecdh.h b/thirdparty/mbedtls/include/mbedtls/ecdh.h new file mode 100644 index 0000000000..99cfde00d0 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/ecdh.h @@ -0,0 +1,277 @@ +/** + * \file ecdh.h + * + * \brief The Elliptic Curve Diffie-Hellman (ECDH) protocol APIs. + * + * ECDH is an anonymous key agreement protocol allowing two parties to + * establish a shared secret over an insecure channel. Each party must have an + * elliptic-curve public–private key pair. + * + * For more information, see <em>NIST SP 800-56A Rev. 2: Recommendation for + * Pair-Wise Key Establishment Schemes Using Discrete Logarithm + * Cryptography</em>. + */ +/* + *  Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of Mbed TLS (https://tls.mbed.org) + */ + +#ifndef MBEDTLS_ECDH_H +#define MBEDTLS_ECDH_H + +#include "ecp.h" + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * Defines the source of the imported EC key: + * <ul><li>Our key.</li> + * <li>The key of the peer.</li></ul> + */ +typedef enum +{ +    MBEDTLS_ECDH_OURS, +    MBEDTLS_ECDH_THEIRS, +} mbedtls_ecdh_side; + +/** + * \brief           The ECDH context structure. + */ +typedef struct +{ +    mbedtls_ecp_group grp;   /*!< The elliptic curve used. */ +    mbedtls_mpi d;           /*!< The private key. */ +    mbedtls_ecp_point Q;     /*!< The public key. */ +    mbedtls_ecp_point Qp;    /*!< The value of the public key of the peer. */ +    mbedtls_mpi z;           /*!< The shared secret. */ +    int point_format;        /*!< The format of point export in TLS messages. */ +    mbedtls_ecp_point Vi;    /*!< The blinding value. */ +    mbedtls_ecp_point Vf;    /*!< The unblinding value. */ +    mbedtls_mpi _d;          /*!< The previous \p d. */ +} +mbedtls_ecdh_context; + +/** + * \brief           This function generates an ECDH keypair on an elliptic + *                  curve. + * + *                  This function performs the first of two core computations + *                  implemented during the ECDH key exchange. The second core + *                  computation is performed by mbedtls_ecdh_compute_shared(). + * + * \param grp       The ECP group. + * \param d         The destination MPI (private key). + * \param Q         The destination point (public key). + * \param f_rng     The RNG function. + * \param p_rng     The RNG parameter. + * + * \return          \c 0 on success, or an \c MBEDTLS_ERR_ECP_XXX or + *                  \c MBEDTLS_MPI_XXX error code on failure. + * + * \see             ecp.h + */ +int mbedtls_ecdh_gen_public( mbedtls_ecp_group *grp, mbedtls_mpi *d, mbedtls_ecp_point *Q, +                     int (*f_rng)(void *, unsigned char *, size_t), +                     void *p_rng ); + +/** + * \brief           This function computes the shared secret. + * + *                  This function performs the second of two core computations + *                  implemented during the ECDH key exchange. The first core + *                  computation is performed by mbedtls_ecdh_gen_public(). + * + * \param grp       The ECP group. + * \param z         The destination MPI (shared secret). + * \param Q         The public key from another party. + * \param d         Our secret exponent (private key). + * \param f_rng     The RNG function. + * \param p_rng     The RNG parameter. + * + * \return          \c 0 on success, or an \c MBEDTLS_ERR_ECP_XXX or + *                  \c MBEDTLS_MPI_XXX error code on failure. + * + * \see             ecp.h + * + * \note            If \p f_rng is not NULL, it is used to implement + *                  countermeasures against potential elaborate timing + *                  attacks. For more information, see mbedtls_ecp_mul(). + */ +int mbedtls_ecdh_compute_shared( mbedtls_ecp_group *grp, mbedtls_mpi *z, +                         const mbedtls_ecp_point *Q, const mbedtls_mpi *d, +                         int (*f_rng)(void *, unsigned char *, size_t), +                         void *p_rng ); + +/** + * \brief           This function initializes an ECDH context. + * + * \param ctx       The ECDH context to initialize. + */ +void mbedtls_ecdh_init( mbedtls_ecdh_context *ctx ); + +/** + * \brief           This function frees a context. + * + * \param ctx       The context to free. + */ +void mbedtls_ecdh_free( mbedtls_ecdh_context *ctx ); + +/** + * \brief           This function generates a public key and a TLS + *                  ServerKeyExchange payload. + * + *                  This is the first function used by a TLS server for ECDHE + *                  ciphersuites. + * + * \param ctx       The ECDH context. + * \param olen      The number of characters written. + * \param buf       The destination buffer. + * \param blen      The length of the destination buffer. + * \param f_rng     The RNG function. + * \param p_rng     The RNG parameter. + * + * \note            This function assumes that the ECP group (grp) of the + *                  \p ctx context has already been properly set, + *                  for example, using mbedtls_ecp_group_load(). + * + * \return          \c 0 on success, or an \c MBEDTLS_ERR_ECP_XXX error code + *                  on failure. + * + * \see             ecp.h + */ +int mbedtls_ecdh_make_params( mbedtls_ecdh_context *ctx, size_t *olen, +                      unsigned char *buf, size_t blen, +                      int (*f_rng)(void *, unsigned char *, size_t), +                      void *p_rng ); + +/** + * \brief           This function parses and processes a TLS ServerKeyExhange + *                  payload. + * + *                  This is the first function used by a TLS client for ECDHE + *                  ciphersuites. + * + * \param ctx       The ECDH context. + * \param buf       The pointer to the start of the input buffer. + * \param end       The address for one Byte past the end of the buffer. + * + * \return          \c 0 on success, or an \c MBEDTLS_ERR_ECP_XXX error code + *                  on failure. + * + * \see             ecp.h + */ +int mbedtls_ecdh_read_params( mbedtls_ecdh_context *ctx, +                      const unsigned char **buf, const unsigned char *end ); + +/** + * \brief           This function sets up an ECDH context from an EC key. + * + *                  It is used by clients and servers in place of the + *                  ServerKeyEchange for static ECDH, and imports ECDH + *                  parameters from the EC key information of a certificate. + * + * \param ctx       The ECDH context to set up. + * \param key       The EC key to use. + * \param side      Defines the source of the key: + *                  <ul><li>1: Our key.</li> +                    <li>0: The key of the peer.</li></ul> + * + * \return          \c 0 on success, or an \c MBEDTLS_ERR_ECP_XXX error code + *                  on failure. + * + * \see             ecp.h + */ +int mbedtls_ecdh_get_params( mbedtls_ecdh_context *ctx, const mbedtls_ecp_keypair *key, +                     mbedtls_ecdh_side side ); + +/** + * \brief           This function generates a public key and a TLS + *                  ClientKeyExchange payload. + * + *                  This is the second function used by a TLS client for ECDH(E) + *                  ciphersuites. + * + * \param ctx       The ECDH context. + * \param olen      The number of Bytes written. + * \param buf       The destination buffer. + * \param blen      The size of the destination buffer. + * \param f_rng     The RNG function. + * \param p_rng     The RNG parameter. + * + * \return          \c 0 on success, or an \c MBEDTLS_ERR_ECP_XXX error code + *                  on failure. + * + * \see             ecp.h + */ +int mbedtls_ecdh_make_public( mbedtls_ecdh_context *ctx, size_t *olen, +                      unsigned char *buf, size_t blen, +                      int (*f_rng)(void *, unsigned char *, size_t), +                      void *p_rng ); + +/** + * \brief       This function parses and processes a TLS ClientKeyExchange + *              payload. + * + *              This is the second function used by a TLS server for ECDH(E) + *              ciphersuites. + * + * \param ctx   The ECDH context. + * \param buf   The start of the input buffer. + * \param blen  The length of the input buffer. + * + * \return      \c 0 on success, or an \c MBEDTLS_ERR_ECP_XXX error code + *              on failure. + * + * \see         ecp.h + */ +int mbedtls_ecdh_read_public( mbedtls_ecdh_context *ctx, +                      const unsigned char *buf, size_t blen ); + +/** + * \brief           This function derives and exports the shared secret. + * + *                  This is the last function used by both TLS client + *                  and servers. + * + * \param ctx       The ECDH context. + * \param olen      The number of Bytes written. + * \param buf       The destination buffer. + * \param blen      The length of the destination buffer. + * \param f_rng     The RNG function. + * \param p_rng     The RNG parameter. + * + * \return          \c 0 on success, or an \c MBEDTLS_ERR_ECP_XXX error code + *                  on failure. + * + * \see             ecp.h + * + * \note            If \p f_rng is not NULL, it is used to implement + *                  countermeasures against potential elaborate timing + *                  attacks. For more information, see mbedtls_ecp_mul(). + */ +int mbedtls_ecdh_calc_secret( mbedtls_ecdh_context *ctx, size_t *olen, +                      unsigned char *buf, size_t blen, +                      int (*f_rng)(void *, unsigned char *, size_t), +                      void *p_rng ); + +#ifdef __cplusplus +} +#endif + +#endif /* ecdh.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/ecdsa.h b/thirdparty/mbedtls/include/mbedtls/ecdsa.h new file mode 100644 index 0000000000..aa23d67f99 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/ecdsa.h @@ -0,0 +1,334 @@ +/** + * \file ecdsa.h + * + * \brief The Elliptic Curve Digital Signature Algorithm (ECDSA). + * + * ECDSA is defined in <em>Standards for Efficient Cryptography Group (SECG): + * SEC1 Elliptic Curve Cryptography</em>. + * The use of ECDSA for TLS is defined in <em>RFC-4492: Elliptic Curve + * Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)</em>. + * + */ +/* + *  Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of Mbed TLS (https://tls.mbed.org) + */ + +#ifndef MBEDTLS_ECDSA_H +#define MBEDTLS_ECDSA_H + +#include "ecp.h" +#include "md.h" + +/* + * RFC-4492 page 20: + * + *     Ecdsa-Sig-Value ::= SEQUENCE { + *         r       INTEGER, + *         s       INTEGER + *     } + * + * Size is at most + *    1 (tag) + 1 (len) + 1 (initial 0) + ECP_MAX_BYTES for each of r and s, + *    twice that + 1 (tag) + 2 (len) for the sequence + * (assuming ECP_MAX_BYTES is less than 126 for r and s, + * and less than 124 (total len <= 255) for the sequence) + */ +#if MBEDTLS_ECP_MAX_BYTES > 124 +#error "MBEDTLS_ECP_MAX_BYTES bigger than expected, please fix MBEDTLS_ECDSA_MAX_LEN" +#endif +/** The maximal size of an ECDSA signature in Bytes. */ +#define MBEDTLS_ECDSA_MAX_LEN  ( 3 + 2 * ( 3 + MBEDTLS_ECP_MAX_BYTES ) ) + +/** + * \brief           The ECDSA context structure. + */ +typedef mbedtls_ecp_keypair mbedtls_ecdsa_context; + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief           This function computes the ECDSA signature of a + *                  previously-hashed message. + * + * \note            The deterministic version is usually preferred. + * + * \param grp       The ECP group. + * \param r         The first output integer. + * \param s         The second output integer. + * \param d         The private signing key. + * \param buf       The message hash. + * \param blen      The length of \p buf. + * \param f_rng     The RNG function. + * \param p_rng     The RNG parameter. + * + * \note            If the bitlength of the message hash is larger than the + *                  bitlength of the group order, then the hash is truncated + *                  as defined in <em>Standards for Efficient Cryptography Group + *                  (SECG): SEC1 Elliptic Curve Cryptography</em>, section + *                  4.1.3, step 5. + * + * \return          \c 0 on success, or an \c MBEDTLS_ERR_ECP_XXX + *                  or \c MBEDTLS_MPI_XXX error code on failure. + * + * \see             ecp.h + */ +int mbedtls_ecdsa_sign( mbedtls_ecp_group *grp, mbedtls_mpi *r, mbedtls_mpi *s, +                const mbedtls_mpi *d, const unsigned char *buf, size_t blen, +                int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ); + +#if defined(MBEDTLS_ECDSA_DETERMINISTIC) +/** + * \brief           This function computes the ECDSA signature of a + *                  previously-hashed message, deterministic version. + *                  For more information, see <em>RFC-6979: Deterministic + *                  Usage of the Digital Signature Algorithm (DSA) and Elliptic + *                  Curve Digital Signature Algorithm (ECDSA)</em>. + * + * \param grp       The ECP group. + * \param r         The first output integer. + * \param s         The second output integer. + * \param d         The private signing key. + * \param buf       The message hash. + * \param blen      The length of \p buf. + * \param md_alg    The MD algorithm used to hash the message. + * + * \note            If the bitlength of the message hash is larger than the + *                  bitlength of the group order, then the hash is truncated as + *                  defined in <em>Standards for Efficient Cryptography Group + *                  (SECG): SEC1 Elliptic Curve Cryptography</em>, section + *                  4.1.3, step 5. + * + * \return          \c 0 on success, + *                  or an \c MBEDTLS_ERR_ECP_XXX or \c MBEDTLS_MPI_XXX + *                  error code on failure. + * + * \see             ecp.h + */ +int mbedtls_ecdsa_sign_det( mbedtls_ecp_group *grp, mbedtls_mpi *r, mbedtls_mpi *s, +                    const mbedtls_mpi *d, const unsigned char *buf, size_t blen, +                    mbedtls_md_type_t md_alg ); +#endif /* MBEDTLS_ECDSA_DETERMINISTIC */ + +/** + * \brief           This function verifies the ECDSA signature of a + *                  previously-hashed message. + * + * \param grp       The ECP group. + * \param buf       The message hash. + * \param blen      The length of \p buf. + * \param Q         The public key to use for verification. + * \param r         The first integer of the signature. + * \param s         The second integer of the signature. + * + * \note            If the bitlength of the message hash is larger than the + *                  bitlength of the group order, then the hash is truncated as + *                  defined in <em>Standards for Efficient Cryptography Group + *                  (SECG): SEC1 Elliptic Curve Cryptography</em>, section + *                  4.1.4, step 3. + * + * \return          \c 0 on success, + *                  #MBEDTLS_ERR_ECP_BAD_INPUT_DATA if signature is invalid, + *                  or an \c MBEDTLS_ERR_ECP_XXX or \c MBEDTLS_MPI_XXX + *                  error code on failure for any other reason. + * + * \see             ecp.h + */ +int mbedtls_ecdsa_verify( mbedtls_ecp_group *grp, +                  const unsigned char *buf, size_t blen, +                  const mbedtls_ecp_point *Q, const mbedtls_mpi *r, const mbedtls_mpi *s); + +/** + * \brief           This function computes the ECDSA signature and writes it + *                  to a buffer, serialized as defined in <em>RFC-4492: + *                  Elliptic Curve Cryptography (ECC) Cipher Suites for + *                  Transport Layer Security (TLS)</em>. + * + * \warning         It is not thread-safe to use the same context in + *                  multiple threads. + * + * \note            The deterministic version is used if + *                  #MBEDTLS_ECDSA_DETERMINISTIC is defined. For more + *                  information, see <em>RFC-6979: Deterministic Usage + *                  of the Digital Signature Algorithm (DSA) and Elliptic + *                  Curve Digital Signature Algorithm (ECDSA)</em>. + * + * \param ctx       The ECDSA context. + * \param md_alg    The message digest that was used to hash the message. + * \param hash      The message hash. + * \param hlen      The length of the hash. + * \param sig       The buffer that holds the signature. + * \param slen      The length of the signature written. + * \param f_rng     The RNG function. + * \param p_rng     The RNG parameter. + * + * \note            The \p sig buffer must be at least twice as large as the + *                  size of the curve used, plus 9. For example, 73 Bytes if + *                  a 256-bit curve is used. A buffer length of + *                  #MBEDTLS_ECDSA_MAX_LEN is always safe. + * + * \note            If the bitlength of the message hash is larger than the + *                  bitlength of the group order, then the hash is truncated as + *                  defined in <em>Standards for Efficient Cryptography Group + *                  (SECG): SEC1 Elliptic Curve Cryptography</em>, section + *                  4.1.3, step 5. + * + * \return          \c 0 on success, + *                  or an \c MBEDTLS_ERR_ECP_XXX, \c MBEDTLS_ERR_MPI_XXX or + *                  \c MBEDTLS_ERR_ASN1_XXX error code on failure. + * + * \see             ecp.h + */ +int mbedtls_ecdsa_write_signature( mbedtls_ecdsa_context *ctx, mbedtls_md_type_t md_alg, +                           const unsigned char *hash, size_t hlen, +                           unsigned char *sig, size_t *slen, +                           int (*f_rng)(void *, unsigned char *, size_t), +                           void *p_rng ); + +#if defined(MBEDTLS_ECDSA_DETERMINISTIC) +#if ! defined(MBEDTLS_DEPRECATED_REMOVED) +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED    __attribute__((deprecated)) +#else +#define MBEDTLS_DEPRECATED +#endif +/** + * \brief   This function computes an ECDSA signature and writes it to a buffer, + *          serialized as defined in <em>RFC-4492: Elliptic Curve Cryptography + *          (ECC) Cipher Suites for Transport Layer Security (TLS)</em>. + * + *          The deterministic version is defined in <em>RFC-6979: + *          Deterministic Usage of the Digital Signature Algorithm (DSA) and + *          Elliptic Curve Digital Signature Algorithm (ECDSA)</em>. + * + * \warning         It is not thread-safe to use the same context in + *                  multiple threads. + + * + * \deprecated      Superseded by mbedtls_ecdsa_write_signature() in 2.0.0 + * + * \param ctx       The ECDSA context. + * \param hash      The Message hash. + * \param hlen      The length of the hash. + * \param sig       The buffer that holds the signature. + * \param slen      The length of the signature written. + * \param md_alg    The MD algorithm used to hash the message. + * + * \note            The \p sig buffer must be at least twice as large as the + *                  size of the curve used, plus 9. For example, 73 Bytes if a + *                  256-bit curve is used. A buffer length of + *                  #MBEDTLS_ECDSA_MAX_LEN is always safe. + * + * \note            If the bitlength of the message hash is larger than the + *                  bitlength of the group order, then the hash is truncated as + *                  defined in <em>Standards for Efficient Cryptography Group + *                  (SECG): SEC1 Elliptic Curve Cryptography</em>, section + *                  4.1.3, step 5. + * + * \return          \c 0 on success, + *                  or an \c MBEDTLS_ERR_ECP_XXX, \c MBEDTLS_ERR_MPI_XXX or + *                  \c MBEDTLS_ERR_ASN1_XXX error code on failure. + * + * \see             ecp.h + */ +int mbedtls_ecdsa_write_signature_det( mbedtls_ecdsa_context *ctx, +                               const unsigned char *hash, size_t hlen, +                               unsigned char *sig, size_t *slen, +                               mbedtls_md_type_t md_alg ) MBEDTLS_DEPRECATED; +#undef MBEDTLS_DEPRECATED +#endif /* MBEDTLS_DEPRECATED_REMOVED */ +#endif /* MBEDTLS_ECDSA_DETERMINISTIC */ + +/** + * \brief           This function reads and verifies an ECDSA signature. + * + * \param ctx       The ECDSA context. + * \param hash      The message hash. + * \param hlen      The size of the hash. + * \param sig       The signature to read and verify. + * \param slen      The size of \p sig. + * + * \note            If the bitlength of the message hash is larger than the + *                  bitlength of the group order, then the hash is truncated as + *                  defined in <em>Standards for Efficient Cryptography Group + *                  (SECG): SEC1 Elliptic Curve Cryptography</em>, section + *                  4.1.4, step 3. + * + * \return          \c 0 on success, + *                  #MBEDTLS_ERR_ECP_BAD_INPUT_DATA if signature is invalid, + *                  #MBEDTLS_ERR_ECP_SIG_LEN_MISMATCH if the signature is + *                  valid but its actual length is less than \p siglen, + *                  or an \c MBEDTLS_ERR_ECP_XXX or \c MBEDTLS_ERR_MPI_XXX + *                  error code on failure for any other reason. + * + * \see             ecp.h + */ +int mbedtls_ecdsa_read_signature( mbedtls_ecdsa_context *ctx, +                          const unsigned char *hash, size_t hlen, +                          const unsigned char *sig, size_t slen ); + +/** + * \brief          This function generates an ECDSA keypair on the given curve. + * + * \param ctx      The ECDSA context to store the keypair in. + * \param gid      The elliptic curve to use. One of the various + *                 \c MBEDTLS_ECP_DP_XXX macros depending on configuration. + * \param f_rng    The RNG function. + * \param p_rng    The RNG parameter. + * + * \return         \c 0 on success, or an \c MBEDTLS_ERR_ECP_XXX code on + *                 failure. + * + * \see            ecp.h + */ +int mbedtls_ecdsa_genkey( mbedtls_ecdsa_context *ctx, mbedtls_ecp_group_id gid, +                  int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ); + +/** + * \brief           This function sets an ECDSA context from an EC key pair. + * + * \param ctx       The ECDSA context to set. + * \param key       The EC key to use. + * + * \return          \c 0 on success, or an \c MBEDTLS_ERR_ECP_XXX code on + *                  failure. + * + * \see             ecp.h + */ +int mbedtls_ecdsa_from_keypair( mbedtls_ecdsa_context *ctx, const mbedtls_ecp_keypair *key ); + +/** + * \brief           This function initializes an ECDSA context. + * + * \param ctx       The ECDSA context to initialize. + */ +void mbedtls_ecdsa_init( mbedtls_ecdsa_context *ctx ); + +/** + * \brief           This function frees an ECDSA context. + * + * \param ctx       The ECDSA context to free. + */ +void mbedtls_ecdsa_free( mbedtls_ecdsa_context *ctx ); + +#ifdef __cplusplus +} +#endif + +#endif /* ecdsa.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/ecjpake.h b/thirdparty/mbedtls/include/mbedtls/ecjpake.h new file mode 100644 index 0000000000..d86e8207f1 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/ecjpake.h @@ -0,0 +1,255 @@ +/** + * \file ecjpake.h + * + * \brief Elliptic curve J-PAKE + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_ECJPAKE_H +#define MBEDTLS_ECJPAKE_H + +/* + * J-PAKE is a password-authenticated key exchange that allows deriving a + * strong shared secret from a (potentially low entropy) pre-shared + * passphrase, with forward secrecy and mutual authentication. + * https://en.wikipedia.org/wiki/Password_Authenticated_Key_Exchange_by_Juggling + * + * This file implements the Elliptic Curve variant of J-PAKE, + * as defined in Chapter 7.4 of the Thread v1.0 Specification, + * available to members of the Thread Group http://threadgroup.org/ + * + * As the J-PAKE algorithm is inherently symmetric, so is our API. + * Each party needs to send its first round message, in any order, to the + * other party, then each sends its second round message, in any order. + * The payloads are serialized in a way suitable for use in TLS, but could + * also be use outside TLS. + */ + +#include "ecp.h" +#include "md.h" + +#if !defined(MBEDTLS_ECJPAKE_ALT) + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * Roles in the EC J-PAKE exchange + */ +typedef enum { +    MBEDTLS_ECJPAKE_CLIENT = 0,         /**< Client                         */ +    MBEDTLS_ECJPAKE_SERVER,             /**< Server                         */ +} mbedtls_ecjpake_role; + +/** + * EC J-PAKE context structure. + * + * J-PAKE is a symmetric protocol, except for the identifiers used in + * Zero-Knowledge Proofs, and the serialization of the second message + * (KeyExchange) as defined by the Thread spec. + * + * In order to benefit from this symmetry, we choose a different naming + * convetion from the Thread v1.0 spec. Correspondance is indicated in the + * description as a pair C: client name, S: server name + */ +typedef struct +{ +    const mbedtls_md_info_t *md_info;   /**< Hash to use                    */ +    mbedtls_ecp_group grp;              /**< Elliptic curve                 */ +    mbedtls_ecjpake_role role;          /**< Are we client or server?       */ +    int point_format;                   /**< Format for point export        */ + +    mbedtls_ecp_point Xm1;              /**< My public key 1   C: X1, S: X3 */ +    mbedtls_ecp_point Xm2;              /**< My public key 2   C: X2, S: X4 */ +    mbedtls_ecp_point Xp1;              /**< Peer public key 1 C: X3, S: X1 */ +    mbedtls_ecp_point Xp2;              /**< Peer public key 2 C: X4, S: X2 */ +    mbedtls_ecp_point Xp;               /**< Peer public key   C: Xs, S: Xc */ + +    mbedtls_mpi xm1;                    /**< My private key 1  C: x1, S: x3 */ +    mbedtls_mpi xm2;                    /**< My private key 2  C: x2, S: x4 */ + +    mbedtls_mpi s;                      /**< Pre-shared secret (passphrase) */ +} mbedtls_ecjpake_context; + +/** + * \brief           Initialize a context + *                  (just makes it ready for setup() or free()). + * + * \param ctx       context to initialize + */ +void mbedtls_ecjpake_init( mbedtls_ecjpake_context *ctx ); + +/** + * \brief           Set up a context for use + * + * \note            Currently the only values for hash/curve allowed by the + *                  standard are MBEDTLS_MD_SHA256/MBEDTLS_ECP_DP_SECP256R1. + * + * \param ctx       context to set up + * \param role      Our role: client or server + * \param hash      hash function to use (MBEDTLS_MD_XXX) + * \param curve     elliptic curve identifier (MBEDTLS_ECP_DP_XXX) + * \param secret    pre-shared secret (passphrase) + * \param len       length of the shared secret + * + * \return          0 if successfull, + *                  a negative error code otherwise + */ +int mbedtls_ecjpake_setup( mbedtls_ecjpake_context *ctx, +                           mbedtls_ecjpake_role role, +                           mbedtls_md_type_t hash, +                           mbedtls_ecp_group_id curve, +                           const unsigned char *secret, +                           size_t len ); + +/** + * \brief           Check if a context is ready for use + * + * \param ctx       Context to check + * + * \return          0 if the context is ready for use, + *                  MBEDTLS_ERR_ECP_BAD_INPUT_DATA otherwise + */ +int mbedtls_ecjpake_check( const mbedtls_ecjpake_context *ctx ); + +/** + * \brief           Generate and write the first round message + *                  (TLS: contents of the Client/ServerHello extension, + *                  excluding extension type and length bytes) + * + * \param ctx       Context to use + * \param buf       Buffer to write the contents to + * \param len       Buffer size + * \param olen      Will be updated with the number of bytes written + * \param f_rng     RNG function + * \param p_rng     RNG parameter + * + * \return          0 if successfull, + *                  a negative error code otherwise + */ +int mbedtls_ecjpake_write_round_one( mbedtls_ecjpake_context *ctx, +                            unsigned char *buf, size_t len, size_t *olen, +                            int (*f_rng)(void *, unsigned char *, size_t), +                            void *p_rng ); + +/** + * \brief           Read and process the first round message + *                  (TLS: contents of the Client/ServerHello extension, + *                  excluding extension type and length bytes) + * + * \param ctx       Context to use + * \param buf       Pointer to extension contents + * \param len       Extension length + * + * \return          0 if successfull, + *                  a negative error code otherwise + */ +int mbedtls_ecjpake_read_round_one( mbedtls_ecjpake_context *ctx, +                                    const unsigned char *buf, +                                    size_t len ); + +/** + * \brief           Generate and write the second round message + *                  (TLS: contents of the Client/ServerKeyExchange) + * + * \param ctx       Context to use + * \param buf       Buffer to write the contents to + * \param len       Buffer size + * \param olen      Will be updated with the number of bytes written + * \param f_rng     RNG function + * \param p_rng     RNG parameter + * + * \return          0 if successfull, + *                  a negative error code otherwise + */ +int mbedtls_ecjpake_write_round_two( mbedtls_ecjpake_context *ctx, +                            unsigned char *buf, size_t len, size_t *olen, +                            int (*f_rng)(void *, unsigned char *, size_t), +                            void *p_rng ); + +/** + * \brief           Read and process the second round message + *                  (TLS: contents of the Client/ServerKeyExchange) + * + * \param ctx       Context to use + * \param buf       Pointer to the message + * \param len       Message length + * + * \return          0 if successfull, + *                  a negative error code otherwise + */ +int mbedtls_ecjpake_read_round_two( mbedtls_ecjpake_context *ctx, +                                    const unsigned char *buf, +                                    size_t len ); + +/** + * \brief           Derive the shared secret + *                  (TLS: Pre-Master Secret) + * + * \param ctx       Context to use + * \param buf       Buffer to write the contents to + * \param len       Buffer size + * \param olen      Will be updated with the number of bytes written + * \param f_rng     RNG function + * \param p_rng     RNG parameter + * + * \return          0 if successfull, + *                  a negative error code otherwise + */ +int mbedtls_ecjpake_derive_secret( mbedtls_ecjpake_context *ctx, +                            unsigned char *buf, size_t len, size_t *olen, +                            int (*f_rng)(void *, unsigned char *, size_t), +                            void *p_rng ); + +/** + * \brief           Free a context's content + * + * \param ctx       context to free + */ +void mbedtls_ecjpake_free( mbedtls_ecjpake_context *ctx ); + +#ifdef __cplusplus +} +#endif + +#else  /* MBEDTLS_ECJPAKE_ALT */ +#include "ecjpake_alt.h" +#endif /* MBEDTLS_ECJPAKE_ALT */ + +#if defined(MBEDTLS_SELF_TEST) + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          Checkup routine + * + * \return         0 if successful, or 1 if a test failed + */ +int mbedtls_ecjpake_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + +#endif /* MBEDTLS_SELF_TEST */ + +#endif /* ecjpake.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/ecp.h b/thirdparty/mbedtls/include/mbedtls/ecp.h new file mode 100644 index 0000000000..b00ba4da87 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/ecp.h @@ -0,0 +1,686 @@ +/** + * \file ecp.h + * + * \brief Elliptic curves over GF(p) + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_ECP_H +#define MBEDTLS_ECP_H + +#include "bignum.h" + +/* + * ECP error codes + */ +#define MBEDTLS_ERR_ECP_BAD_INPUT_DATA                    -0x4F80  /**< Bad input parameters to function. */ +#define MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL                  -0x4F00  /**< The buffer is too small to write to. */ +#define MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE               -0x4E80  /**< Requested curve not available. */ +#define MBEDTLS_ERR_ECP_VERIFY_FAILED                     -0x4E00  /**< The signature is not valid. */ +#define MBEDTLS_ERR_ECP_ALLOC_FAILED                      -0x4D80  /**< Memory allocation failed. */ +#define MBEDTLS_ERR_ECP_RANDOM_FAILED                     -0x4D00  /**< Generation of random value, such as (ephemeral) key, failed. */ +#define MBEDTLS_ERR_ECP_INVALID_KEY                       -0x4C80  /**< Invalid private or public key. */ +#define MBEDTLS_ERR_ECP_SIG_LEN_MISMATCH                  -0x4C00  /**< Signature is valid but shorter than the user-supplied length. */ +#define MBEDTLS_ERR_ECP_HW_ACCEL_FAILED                   -0x4B80  /**< ECP hardware accelerator failed. */ + +#if !defined(MBEDTLS_ECP_ALT) +/* + * default mbed TLS elliptic curve arithmetic implementation + * + * (in case MBEDTLS_ECP_ALT is defined then the developer has to provide an + * alternative implementation for the whole module and it will replace this + * one.) + */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * Domain parameters (curve, subgroup and generator) identifiers. + * + * Only curves over prime fields are supported. + * + * \warning This library does not support validation of arbitrary domain + * parameters. Therefore, only well-known domain parameters from trusted + * sources should be used. See mbedtls_ecp_group_load(). + */ +typedef enum +{ +    MBEDTLS_ECP_DP_NONE = 0, +    MBEDTLS_ECP_DP_SECP192R1,      /*!< 192-bits NIST curve  */ +    MBEDTLS_ECP_DP_SECP224R1,      /*!< 224-bits NIST curve  */ +    MBEDTLS_ECP_DP_SECP256R1,      /*!< 256-bits NIST curve  */ +    MBEDTLS_ECP_DP_SECP384R1,      /*!< 384-bits NIST curve  */ +    MBEDTLS_ECP_DP_SECP521R1,      /*!< 521-bits NIST curve  */ +    MBEDTLS_ECP_DP_BP256R1,        /*!< 256-bits Brainpool curve */ +    MBEDTLS_ECP_DP_BP384R1,        /*!< 384-bits Brainpool curve */ +    MBEDTLS_ECP_DP_BP512R1,        /*!< 512-bits Brainpool curve */ +    MBEDTLS_ECP_DP_CURVE25519,           /*!< Curve25519               */ +    MBEDTLS_ECP_DP_SECP192K1,      /*!< 192-bits "Koblitz" curve */ +    MBEDTLS_ECP_DP_SECP224K1,      /*!< 224-bits "Koblitz" curve */ +    MBEDTLS_ECP_DP_SECP256K1,      /*!< 256-bits "Koblitz" curve */ +} mbedtls_ecp_group_id; + +/** + * Number of supported curves (plus one for NONE). + * + * (Montgomery curves excluded for now.) + */ +#define MBEDTLS_ECP_DP_MAX     12 + +/** + * Curve information for use by other modules + */ +typedef struct +{ +    mbedtls_ecp_group_id grp_id;    /*!< Internal identifier        */ +    uint16_t tls_id;                /*!< TLS NamedCurve identifier  */ +    uint16_t bit_size;              /*!< Curve size in bits         */ +    const char *name;               /*!< Human-friendly name        */ +} mbedtls_ecp_curve_info; + +/** + * \brief           ECP point structure (jacobian coordinates) + * + * \note            All functions expect and return points satisfying + *                  the following condition: Z == 0 or Z == 1. (Other + *                  values of Z are used by internal functions only.) + *                  The point is zero, or "at infinity", if Z == 0. + *                  Otherwise, X and Y are its standard (affine) coordinates. + */ +typedef struct +{ +    mbedtls_mpi X;          /*!<  the point's X coordinate  */ +    mbedtls_mpi Y;          /*!<  the point's Y coordinate  */ +    mbedtls_mpi Z;          /*!<  the point's Z coordinate  */ +} +mbedtls_ecp_point; + +/** + * \brief           ECP group structure + * + * We consider two types of curves equations: + * 1. Short Weierstrass y^2 = x^3 + A x + B     mod P   (SEC1 + RFC 4492) + * 2. Montgomery,       y^2 = x^3 + A x^2 + x   mod P   (Curve25519 + draft) + * In both cases, a generator G for a prime-order subgroup is fixed. In the + * short weierstrass, this subgroup is actually the whole curve, and its + * cardinal is denoted by N. + * + * In the case of Short Weierstrass curves, our code requires that N is an odd + * prime. (Use odd in mbedtls_ecp_mul() and prime in mbedtls_ecdsa_sign() for blinding.) + * + * In the case of Montgomery curves, we don't store A but (A + 2) / 4 which is + * the quantity actually used in the formulas. Also, nbits is not the size of N + * but the required size for private keys. + * + * If modp is NULL, reduction modulo P is done using a generic algorithm. + * Otherwise, it must point to a function that takes an mbedtls_mpi in the range + * 0..2^(2*pbits)-1 and transforms it in-place in an integer of little more + * than pbits, so that the integer may be efficiently brought in the 0..P-1 + * range by a few additions or substractions. It must return 0 on success and + * non-zero on failure. + */ +typedef struct +{ +    mbedtls_ecp_group_id id;    /*!<  internal group identifier                     */ +    mbedtls_mpi P;              /*!<  prime modulus of the base field               */ +    mbedtls_mpi A;              /*!<  1. A in the equation, or 2. (A + 2) / 4       */ +    mbedtls_mpi B;              /*!<  1. B in the equation, or 2. unused            */ +    mbedtls_ecp_point G;        /*!<  generator of the (sub)group used              */ +    mbedtls_mpi N;              /*!<  1. the order of G, or 2. unused               */ +    size_t pbits;       /*!<  number of bits in P                           */ +    size_t nbits;       /*!<  number of bits in 1. P, or 2. private keys    */ +    unsigned int h;     /*!<  internal: 1 if the constants are static       */ +    int (*modp)(mbedtls_mpi *); /*!<  function for fast reduction mod P             */ +    int (*t_pre)(mbedtls_ecp_point *, void *);  /*!< unused                         */ +    int (*t_post)(mbedtls_ecp_point *, void *); /*!< unused                         */ +    void *t_data;                       /*!< unused                         */ +    mbedtls_ecp_point *T;       /*!<  pre-computed points for ecp_mul_comb()        */ +    size_t T_size;      /*!<  number for pre-computed points                */ +} +mbedtls_ecp_group; + +/** + * \brief           ECP key pair structure + * + * A generic key pair that could be used for ECDSA, fixed ECDH, etc. + * + * \note Members purposefully in the same order as struc mbedtls_ecdsa_context. + */ +typedef struct +{ +    mbedtls_ecp_group grp;      /*!<  Elliptic curve and base point     */ +    mbedtls_mpi d;              /*!<  our secret value                  */ +    mbedtls_ecp_point Q;        /*!<  our public value                  */ +} +mbedtls_ecp_keypair; + +/** + * \name SECTION: Module settings + * + * The configuration options you can set for this module are in this section. + * Either change them in config.h or define them on the compiler command line. + * \{ + */ + +#if !defined(MBEDTLS_ECP_MAX_BITS) +/** + * Maximum size of the groups (that is, of N and P) + */ +#define MBEDTLS_ECP_MAX_BITS     521   /**< Maximum bit size of groups */ +#endif + +#define MBEDTLS_ECP_MAX_BYTES    ( ( MBEDTLS_ECP_MAX_BITS + 7 ) / 8 ) +#define MBEDTLS_ECP_MAX_PT_LEN   ( 2 * MBEDTLS_ECP_MAX_BYTES + 1 ) + +#if !defined(MBEDTLS_ECP_WINDOW_SIZE) +/* + * Maximum "window" size used for point multiplication. + * Default: 6. + * Minimum value: 2. Maximum value: 7. + * + * Result is an array of at most ( 1 << ( MBEDTLS_ECP_WINDOW_SIZE - 1 ) ) + * points used for point multiplication. This value is directly tied to EC + * peak memory usage, so decreasing it by one should roughly cut memory usage + * by two (if large curves are in use). + * + * Reduction in size may reduce speed, but larger curves are impacted first. + * Sample performances (in ECDHE handshakes/s, with FIXED_POINT_OPTIM = 1): + *      w-size:     6       5       4       3       2 + *      521       145     141     135     120      97 + *      384       214     209     198     177     146 + *      256       320     320     303     262     226 + + *      224       475     475     453     398     342 + *      192       640     640     633     587     476 + */ +#define MBEDTLS_ECP_WINDOW_SIZE    6   /**< Maximum window size used */ +#endif /* MBEDTLS_ECP_WINDOW_SIZE */ + +#if !defined(MBEDTLS_ECP_FIXED_POINT_OPTIM) +/* + * Trade memory for speed on fixed-point multiplication. + * + * This speeds up repeated multiplication of the generator (that is, the + * multiplication in ECDSA signatures, and half of the multiplications in + * ECDSA verification and ECDHE) by a factor roughly 3 to 4. + * + * The cost is increasing EC peak memory usage by a factor roughly 2. + * + * Change this value to 0 to reduce peak memory usage. + */ +#define MBEDTLS_ECP_FIXED_POINT_OPTIM  1   /**< Enable fixed-point speed-up */ +#endif /* MBEDTLS_ECP_FIXED_POINT_OPTIM */ + +/* \} name SECTION: Module settings */ + +/* + * Point formats, from RFC 4492's enum ECPointFormat + */ +#define MBEDTLS_ECP_PF_UNCOMPRESSED    0   /**< Uncompressed point format */ +#define MBEDTLS_ECP_PF_COMPRESSED      1   /**< Compressed point format */ + +/* + * Some other constants from RFC 4492 + */ +#define MBEDTLS_ECP_TLS_NAMED_CURVE    3   /**< ECCurveType's named_curve */ + +/** + * \brief           Get the list of supported curves in order of preferrence + *                  (full information) + * + * \return          A statically allocated array, the last entry is 0. + */ +const mbedtls_ecp_curve_info *mbedtls_ecp_curve_list( void ); + +/** + * \brief           Get the list of supported curves in order of preferrence + *                  (grp_id only) + * + * \return          A statically allocated array, + *                  terminated with MBEDTLS_ECP_DP_NONE. + */ +const mbedtls_ecp_group_id *mbedtls_ecp_grp_id_list( void ); + +/** + * \brief           Get curve information from an internal group identifier + * + * \param grp_id    A MBEDTLS_ECP_DP_XXX value + * + * \return          The associated curve information or NULL + */ +const mbedtls_ecp_curve_info *mbedtls_ecp_curve_info_from_grp_id( mbedtls_ecp_group_id grp_id ); + +/** + * \brief           Get curve information from a TLS NamedCurve value + * + * \param tls_id    A MBEDTLS_ECP_DP_XXX value + * + * \return          The associated curve information or NULL + */ +const mbedtls_ecp_curve_info *mbedtls_ecp_curve_info_from_tls_id( uint16_t tls_id ); + +/** + * \brief           Get curve information from a human-readable name + * + * \param name      The name + * + * \return          The associated curve information or NULL + */ +const mbedtls_ecp_curve_info *mbedtls_ecp_curve_info_from_name( const char *name ); + +/** + * \brief           Initialize a point (as zero) + */ +void mbedtls_ecp_point_init( mbedtls_ecp_point *pt ); + +/** + * \brief           Initialize a group (to something meaningless) + */ +void mbedtls_ecp_group_init( mbedtls_ecp_group *grp ); + +/** + * \brief           Initialize a key pair (as an invalid one) + */ +void mbedtls_ecp_keypair_init( mbedtls_ecp_keypair *key ); + +/** + * \brief           Free the components of a point + */ +void mbedtls_ecp_point_free( mbedtls_ecp_point *pt ); + +/** + * \brief           Free the components of an ECP group + */ +void mbedtls_ecp_group_free( mbedtls_ecp_group *grp ); + +/** + * \brief           Free the components of a key pair + */ +void mbedtls_ecp_keypair_free( mbedtls_ecp_keypair *key ); + +/** + * \brief           Copy the contents of point Q into P + * + * \param P         Destination point + * \param Q         Source point + * + * \return          0 if successful, + *                  MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_ecp_copy( mbedtls_ecp_point *P, const mbedtls_ecp_point *Q ); + +/** + * \brief           Copy the contents of a group object + * + * \param dst       Destination group + * \param src       Source group + * + * \return          0 if successful, + *                  MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_ecp_group_copy( mbedtls_ecp_group *dst, const mbedtls_ecp_group *src ); + +/** + * \brief           Set a point to zero + * + * \param pt        Destination point + * + * \return          0 if successful, + *                  MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_ecp_set_zero( mbedtls_ecp_point *pt ); + +/** + * \brief           Tell if a point is zero + * + * \param pt        Point to test + * + * \return          1 if point is zero, 0 otherwise + */ +int mbedtls_ecp_is_zero( mbedtls_ecp_point *pt ); + +/** + * \brief           Compare two points + * + * \note            This assumes the points are normalized. Otherwise, + *                  they may compare as "not equal" even if they are. + * + * \param P         First point to compare + * \param Q         Second point to compare + * + * \return          0 if the points are equal, + *                  MBEDTLS_ERR_ECP_BAD_INPUT_DATA otherwise + */ +int mbedtls_ecp_point_cmp( const mbedtls_ecp_point *P, +                           const mbedtls_ecp_point *Q ); + +/** + * \brief           Import a non-zero point from two ASCII strings + * + * \param P         Destination point + * \param radix     Input numeric base + * \param x         First affine coordinate as a null-terminated string + * \param y         Second affine coordinate as a null-terminated string + * + * \return          0 if successful, or a MBEDTLS_ERR_MPI_XXX error code + */ +int mbedtls_ecp_point_read_string( mbedtls_ecp_point *P, int radix, +                           const char *x, const char *y ); + +/** + * \brief           Export a point into unsigned binary data + * + * \param grp       Group to which the point should belong + * \param P         Point to export + * \param format    Point format, should be a MBEDTLS_ECP_PF_XXX macro + * \param olen      Length of the actual output + * \param buf       Output buffer + * \param buflen    Length of the output buffer + * + * \return          0 if successful, + *                  or MBEDTLS_ERR_ECP_BAD_INPUT_DATA + *                  or MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL + */ +int mbedtls_ecp_point_write_binary( const mbedtls_ecp_group *grp, const mbedtls_ecp_point *P, +                            int format, size_t *olen, +                            unsigned char *buf, size_t buflen ); + +/** + * \brief           Import a point from unsigned binary data + * + * \param grp       Group to which the point should belong + * \param P         Point to import + * \param buf       Input buffer + * \param ilen      Actual length of input + * + * \return          0 if successful, + *                  MBEDTLS_ERR_ECP_BAD_INPUT_DATA if input is invalid, + *                  MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed, + *                  MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE if the point format + *                  is not implemented. + * + * \note            This function does NOT check that the point actually + *                  belongs to the given group, see mbedtls_ecp_check_pubkey() for + *                  that. + */ +int mbedtls_ecp_point_read_binary( const mbedtls_ecp_group *grp, mbedtls_ecp_point *P, +                           const unsigned char *buf, size_t ilen ); + +/** + * \brief           Import a point from a TLS ECPoint record + * + * \param grp       ECP group used + * \param pt        Destination point + * \param buf       $(Start of input buffer) + * \param len       Buffer length + * + * \note            buf is updated to point right after the ECPoint on exit + * + * \return          0 if successful, + *                  MBEDTLS_ERR_MPI_XXX if initialization failed + *                  MBEDTLS_ERR_ECP_BAD_INPUT_DATA if input is invalid + */ +int mbedtls_ecp_tls_read_point( const mbedtls_ecp_group *grp, mbedtls_ecp_point *pt, +                        const unsigned char **buf, size_t len ); + +/** + * \brief           Export a point as a TLS ECPoint record + * + * \param grp       ECP group used + * \param pt        Point to export + * \param format    Export format + * \param olen      length of data written + * \param buf       Buffer to write to + * \param blen      Buffer length + * + * \return          0 if successful, + *                  or MBEDTLS_ERR_ECP_BAD_INPUT_DATA + *                  or MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL + */ +int mbedtls_ecp_tls_write_point( const mbedtls_ecp_group *grp, const mbedtls_ecp_point *pt, +                         int format, size_t *olen, +                         unsigned char *buf, size_t blen ); + +/** + * \brief           Set a group using well-known domain parameters + * + * \param grp       Destination group + * \param id        Index in the list of well-known domain parameters + * + * \return          0 if successful, + *                  MBEDTLS_ERR_MPI_XXX if initialization failed + *                  MBEDTLS_ERR_ECP_FEATURE_UNAVAILABLE for unkownn groups + * + * \note            Index should be a value of RFC 4492's enum NamedCurve, + *                  usually in the form of a MBEDTLS_ECP_DP_XXX macro. + */ +int mbedtls_ecp_group_load( mbedtls_ecp_group *grp, mbedtls_ecp_group_id id ); + +/** + * \brief           Set a group from a TLS ECParameters record + * + * \param grp       Destination group + * \param buf       &(Start of input buffer) + * \param len       Buffer length + * + * \note            buf is updated to point right after ECParameters on exit + * + * \return          0 if successful, + *                  MBEDTLS_ERR_MPI_XXX if initialization failed + *                  MBEDTLS_ERR_ECP_BAD_INPUT_DATA if input is invalid + */ +int mbedtls_ecp_tls_read_group( mbedtls_ecp_group *grp, const unsigned char **buf, size_t len ); + +/** + * \brief           Write the TLS ECParameters record for a group + * + * \param grp       ECP group used + * \param olen      Number of bytes actually written + * \param buf       Buffer to write to + * \param blen      Buffer length + * + * \return          0 if successful, + *                  or MBEDTLS_ERR_ECP_BUFFER_TOO_SMALL + */ +int mbedtls_ecp_tls_write_group( const mbedtls_ecp_group *grp, size_t *olen, +                         unsigned char *buf, size_t blen ); + +/** + * \brief           Multiplication by an integer: R = m * P + *                  (Not thread-safe to use same group in multiple threads) + * + * \note            In order to prevent timing attacks, this function + *                  executes the exact same sequence of (base field) + *                  operations for any valid m. It avoids any if-branch or + *                  array index depending on the value of m. + * + * \note            If f_rng is not NULL, it is used to randomize intermediate + *                  results in order to prevent potential timing attacks + *                  targeting these results. It is recommended to always + *                  provide a non-NULL f_rng (the overhead is negligible). + * + * \param grp       ECP group + * \param R         Destination point + * \param m         Integer by which to multiply + * \param P         Point to multiply + * \param f_rng     RNG function (see notes) + * \param p_rng     RNG parameter + * + * \return          0 if successful, + *                  MBEDTLS_ERR_ECP_INVALID_KEY if m is not a valid privkey + *                  or P is not a valid pubkey, + *                  MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_ecp_mul( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, +             const mbedtls_mpi *m, const mbedtls_ecp_point *P, +             int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ); + +/** + * \brief           Multiplication and addition of two points by integers: + *                  R = m * P + n * Q + *                  (Not thread-safe to use same group in multiple threads) + * + * \note            In contrast to mbedtls_ecp_mul(), this function does not guarantee + *                  a constant execution flow and timing. + * + * \param grp       ECP group + * \param R         Destination point + * \param m         Integer by which to multiply P + * \param P         Point to multiply by m + * \param n         Integer by which to multiply Q + * \param Q         Point to be multiplied by n + * + * \return          0 if successful, + *                  MBEDTLS_ERR_ECP_INVALID_KEY if m or n is not a valid privkey + *                  or P or Q is not a valid pubkey, + *                  MBEDTLS_ERR_MPI_ALLOC_FAILED if memory allocation failed + */ +int mbedtls_ecp_muladd( mbedtls_ecp_group *grp, mbedtls_ecp_point *R, +             const mbedtls_mpi *m, const mbedtls_ecp_point *P, +             const mbedtls_mpi *n, const mbedtls_ecp_point *Q ); + +/** + * \brief           Check that a point is a valid public key on this curve + * + * \param grp       Curve/group the point should belong to + * \param pt        Point to check + * + * \return          0 if point is a valid public key, + *                  MBEDTLS_ERR_ECP_INVALID_KEY otherwise. + * + * \note            This function only checks the point is non-zero, has valid + *                  coordinates and lies on the curve, but not that it is + *                  indeed a multiple of G. This is additional check is more + *                  expensive, isn't required by standards, and shouldn't be + *                  necessary if the group used has a small cofactor. In + *                  particular, it is useless for the NIST groups which all + *                  have a cofactor of 1. + * + * \note            Uses bare components rather than an mbedtls_ecp_keypair structure + *                  in order to ease use with other structures such as + *                  mbedtls_ecdh_context of mbedtls_ecdsa_context. + */ +int mbedtls_ecp_check_pubkey( const mbedtls_ecp_group *grp, const mbedtls_ecp_point *pt ); + +/** + * \brief           Check that an mbedtls_mpi is a valid private key for this curve + * + * \param grp       Group used + * \param d         Integer to check + * + * \return          0 if point is a valid private key, + *                  MBEDTLS_ERR_ECP_INVALID_KEY otherwise. + * + * \note            Uses bare components rather than an mbedtls_ecp_keypair structure + *                  in order to ease use with other structures such as + *                  mbedtls_ecdh_context of mbedtls_ecdsa_context. + */ +int mbedtls_ecp_check_privkey( const mbedtls_ecp_group *grp, const mbedtls_mpi *d ); + +/** + * \brief           Generate a keypair with configurable base point + * + * \param grp       ECP group + * \param G         Chosen base point + * \param d         Destination MPI (secret part) + * \param Q         Destination point (public part) + * \param f_rng     RNG function + * \param p_rng     RNG parameter + * + * \return          0 if successful, + *                  or a MBEDTLS_ERR_ECP_XXX or MBEDTLS_MPI_XXX error code + * + * \note            Uses bare components rather than an mbedtls_ecp_keypair structure + *                  in order to ease use with other structures such as + *                  mbedtls_ecdh_context of mbedtls_ecdsa_context. + */ +int mbedtls_ecp_gen_keypair_base( mbedtls_ecp_group *grp, +                     const mbedtls_ecp_point *G, +                     mbedtls_mpi *d, mbedtls_ecp_point *Q, +                     int (*f_rng)(void *, unsigned char *, size_t), +                     void *p_rng ); + +/** + * \brief           Generate a keypair + * + * \param grp       ECP group + * \param d         Destination MPI (secret part) + * \param Q         Destination point (public part) + * \param f_rng     RNG function + * \param p_rng     RNG parameter + * + * \return          0 if successful, + *                  or a MBEDTLS_ERR_ECP_XXX or MBEDTLS_MPI_XXX error code + * + * \note            Uses bare components rather than an mbedtls_ecp_keypair structure + *                  in order to ease use with other structures such as + *                  mbedtls_ecdh_context of mbedtls_ecdsa_context. + */ +int mbedtls_ecp_gen_keypair( mbedtls_ecp_group *grp, mbedtls_mpi *d, mbedtls_ecp_point *Q, +                     int (*f_rng)(void *, unsigned char *, size_t), +                     void *p_rng ); + +/** + * \brief           Generate a keypair + * + * \param grp_id    ECP group identifier + * \param key       Destination keypair + * \param f_rng     RNG function + * \param p_rng     RNG parameter + * + * \return          0 if successful, + *                  or a MBEDTLS_ERR_ECP_XXX or MBEDTLS_MPI_XXX error code + */ +int mbedtls_ecp_gen_key( mbedtls_ecp_group_id grp_id, mbedtls_ecp_keypair *key, +                int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ); + +/** + * \brief           Check a public-private key pair + * + * \param pub       Keypair structure holding a public key + * \param prv       Keypair structure holding a private (plus public) key + * + * \return          0 if successful (keys are valid and match), or + *                  MBEDTLS_ERR_ECP_BAD_INPUT_DATA, or + *                  a MBEDTLS_ERR_ECP_XXX or MBEDTLS_ERR_MPI_XXX code. + */ +int mbedtls_ecp_check_pub_priv( const mbedtls_ecp_keypair *pub, const mbedtls_ecp_keypair *prv ); + +#if defined(MBEDTLS_SELF_TEST) + +/** + * \brief          Checkup routine + * + * \return         0 if successful, or 1 if a test failed + */ +int mbedtls_ecp_self_test( int verbose ); + +#endif /* MBEDTLS_SELF_TEST */ + +#ifdef __cplusplus +} +#endif + +#else  /* MBEDTLS_ECP_ALT */ +#include "ecp_alt.h" +#endif /* MBEDTLS_ECP_ALT */ + +#endif /* ecp.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/ecp_internal.h b/thirdparty/mbedtls/include/mbedtls/ecp_internal.h new file mode 100644 index 0000000000..8a6d517ed0 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/ecp_internal.h @@ -0,0 +1,293 @@ +/** + * \file ecp_internal.h + * + * \brief Function declarations for alternative implementation of elliptic curve + * point arithmetic. + */ +/* + *  Copyright (C) 2016, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ + +/* + * References: + * + * [1] BERNSTEIN, Daniel J. Curve25519: new Diffie-Hellman speed records. + *     <http://cr.yp.to/ecdh/curve25519-20060209.pdf> + * + * [2] CORON, Jean-S'ebastien. Resistance against differential power analysis + *     for elliptic curve cryptosystems. In : Cryptographic Hardware and + *     Embedded Systems. Springer Berlin Heidelberg, 1999. p. 292-302. + *     <http://link.springer.com/chapter/10.1007/3-540-48059-5_25> + * + * [3] HEDABOU, Mustapha, PINEL, Pierre, et B'EN'ETEAU, Lucien. A comb method to + *     render ECC resistant against Side Channel Attacks. IACR Cryptology + *     ePrint Archive, 2004, vol. 2004, p. 342. + *     <http://eprint.iacr.org/2004/342.pdf> + * + * [4] Certicom Research. SEC 2: Recommended Elliptic Curve Domain Parameters. + *     <http://www.secg.org/sec2-v2.pdf> + * + * [5] HANKERSON, Darrel, MENEZES, Alfred J., VANSTONE, Scott. Guide to Elliptic + *     Curve Cryptography. + * + * [6] Digital Signature Standard (DSS), FIPS 186-4. + *     <http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf> + * + * [7] Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer  + *     Security (TLS), RFC 4492. + *     <https://tools.ietf.org/search/rfc4492> + * + * [8] <http://www.hyperelliptic.org/EFD/g1p/auto-shortw-jacobian.html> + * + * [9] COHEN, Henri. A Course in Computational Algebraic Number Theory. + *     Springer Science & Business Media, 1 Aug 2000 + */ + +#ifndef MBEDTLS_ECP_INTERNAL_H +#define MBEDTLS_ECP_INTERNAL_H + +#if defined(MBEDTLS_ECP_INTERNAL_ALT) + +/** + * \brief           Indicate if the Elliptic Curve Point module extension can + *                  handle the group. + * + * \param grp       The pointer to the elliptic curve group that will be the + *                  basis of the cryptographic computations. + * + * \return          Non-zero if successful. + */ +unsigned char mbedtls_internal_ecp_grp_capable( const mbedtls_ecp_group *grp ); + +/** + * \brief           Initialise the Elliptic Curve Point module extension. + * + *                  If mbedtls_internal_ecp_grp_capable returns true for a + *                  group, this function has to be able to initialise the + *                  module for it. + * + *                  This module can be a driver to a crypto hardware + *                  accelerator, for which this could be an initialise function. + * + * \param grp       The pointer to the group the module needs to be + *                  initialised for. + * + * \return          0 if successful. + */ +int mbedtls_internal_ecp_init( const mbedtls_ecp_group *grp ); + +/** + * \brief           Frees and deallocates the Elliptic Curve Point module + *                  extension. + * + * \param grp       The pointer to the group the module was initialised for. + */ +void mbedtls_internal_ecp_free( const mbedtls_ecp_group *grp ); + +#if defined(ECP_SHORTWEIERSTRASS) + +#if defined(MBEDTLS_ECP_RANDOMIZE_JAC_ALT) +/** + * \brief           Randomize jacobian coordinates: + *                  (X, Y, Z) -> (l^2 X, l^3 Y, l Z) for random l. + * + * \param grp       Pointer to the group representing the curve. + * + * \param pt        The point on the curve to be randomised, given with Jacobian + *                  coordinates. + * + * \param f_rng     A function pointer to the random number generator. + * + * \param p_rng     A pointer to the random number generator state. + * + * \return          0 if successful. + */ +int mbedtls_internal_ecp_randomize_jac( const mbedtls_ecp_group *grp, +        mbedtls_ecp_point *pt, int (*f_rng)(void *, unsigned char *, size_t), +        void *p_rng ); +#endif + +#if defined(MBEDTLS_ECP_ADD_MIXED_ALT) +/** + * \brief           Addition: R = P + Q, mixed affine-Jacobian coordinates. + * + *                  The coordinates of Q must be normalized (= affine), + *                  but those of P don't need to. R is not normalized. + * + *                  This function is used only as a subrutine of + *                  ecp_mul_comb(). + * + *                  Special cases: (1) P or Q is zero, (2) R is zero, + *                      (3) P == Q. + *                  None of these cases can happen as intermediate step in + *                  ecp_mul_comb(): + *                      - at each step, P, Q and R are multiples of the base + *                      point, the factor being less than its order, so none of + *                      them is zero; + *                      - Q is an odd multiple of the base point, P an even + *                      multiple, due to the choice of precomputed points in the + *                      modified comb method. + *                  So branches for these cases do not leak secret information. + * + *                  We accept Q->Z being unset (saving memory in tables) as + *                  meaning 1. + * + *                  Cost in field operations if done by [5] 3.22: + *                      1A := 8M + 3S + * + * \param grp       Pointer to the group representing the curve. + * + * \param R         Pointer to a point structure to hold the result. + * + * \param P         Pointer to the first summand, given with Jacobian + *                  coordinates + * + * \param Q         Pointer to the second summand, given with affine + *                  coordinates. + * + * \return          0 if successful. + */ +int mbedtls_internal_ecp_add_mixed( const mbedtls_ecp_group *grp, +        mbedtls_ecp_point *R, const mbedtls_ecp_point *P, +        const mbedtls_ecp_point *Q ); +#endif + +/** + * \brief           Point doubling R = 2 P, Jacobian coordinates. + * + *                  Cost:   1D := 3M + 4S    (A ==  0) + *                          4M + 4S          (A == -3) + *                          3M + 6S + 1a     otherwise + *                  when the implementation is based on the "dbl-1998-cmo-2" + *                  doubling formulas in [8] and standard optimizations are + *                  applied when curve parameter A is one of { 0, -3 }. + * + * \param grp       Pointer to the group representing the curve. + * + * \param R         Pointer to a point structure to hold the result. + * + * \param P         Pointer to the point that has to be doubled, given with + *                  Jacobian coordinates. + * + * \return          0 if successful. + */ +#if defined(MBEDTLS_ECP_DOUBLE_JAC_ALT) +int mbedtls_internal_ecp_double_jac( const mbedtls_ecp_group *grp, +        mbedtls_ecp_point *R, const mbedtls_ecp_point *P ); +#endif + +/** + * \brief           Normalize jacobian coordinates of an array of (pointers to) + *                  points. + * + *                  Using Montgomery's trick to perform only one inversion mod P + *                  the cost is: + *                      1N(t) := 1I + (6t - 3)M + 1S + *                  (See for example Algorithm 10.3.4. in [9]) + * + *                  This function is used only as a subrutine of + *                  ecp_mul_comb(). + * + *                  Warning: fails (returning an error) if one of the points is + *                  zero! + *                  This should never happen, see choice of w in ecp_mul_comb(). + * + * \param grp       Pointer to the group representing the curve. + * + * \param T         Array of pointers to the points to normalise. + * + * \param t_len     Number of elements in the array. + * + * \return          0 if successful, + *                      an error if one of the points is zero. + */ +#if defined(MBEDTLS_ECP_NORMALIZE_JAC_MANY_ALT) +int mbedtls_internal_ecp_normalize_jac_many( const mbedtls_ecp_group *grp, +        mbedtls_ecp_point *T[], size_t t_len ); +#endif + +/** + * \brief           Normalize jacobian coordinates so that Z == 0 || Z == 1. + * + *                  Cost in field operations if done by [5] 3.2.1: + *                      1N := 1I + 3M + 1S + * + * \param grp       Pointer to the group representing the curve. + * + * \param pt        pointer to the point to be normalised. This is an + *                  input/output parameter. + * + * \return          0 if successful. + */ +#if defined(MBEDTLS_ECP_NORMALIZE_JAC_ALT) +int mbedtls_internal_ecp_normalize_jac( const mbedtls_ecp_group *grp, +        mbedtls_ecp_point *pt ); +#endif + +#endif /* ECP_SHORTWEIERSTRASS */ + +#if defined(ECP_MONTGOMERY) + +#if defined(MBEDTLS_ECP_DOUBLE_ADD_MXZ_ALT) +int mbedtls_internal_ecp_double_add_mxz( const mbedtls_ecp_group *grp, +        mbedtls_ecp_point *R, mbedtls_ecp_point *S, const mbedtls_ecp_point *P, +        const mbedtls_ecp_point *Q, const mbedtls_mpi *d ); +#endif + +/** + * \brief           Randomize projective x/z coordinates: + *                      (X, Z) -> (l X, l Z) for random l + * + * \param grp       pointer to the group representing the curve + * + * \param P         the point on the curve to be randomised given with + *                  projective coordinates. This is an input/output parameter. + * + * \param f_rng     a function pointer to the random number generator + * + * \param p_rng     a pointer to the random number generator state + * + * \return          0 if successful + */ +#if defined(MBEDTLS_ECP_RANDOMIZE_MXZ_ALT) +int mbedtls_internal_ecp_randomize_mxz( const mbedtls_ecp_group *grp, +        mbedtls_ecp_point *P, int (*f_rng)(void *, unsigned char *, size_t), +        void *p_rng ); +#endif + +/** + * \brief           Normalize Montgomery x/z coordinates: X = X/Z, Z = 1. + * + * \param grp       pointer to the group representing the curve + * + * \param P         pointer to the point to be normalised. This is an + *                  input/output parameter. + * + * \return          0 if successful + */ +#if defined(MBEDTLS_ECP_NORMALIZE_MXZ_ALT) +int mbedtls_internal_ecp_normalize_mxz( const mbedtls_ecp_group *grp, +        mbedtls_ecp_point *P ); +#endif + +#endif /* ECP_MONTGOMERY */ + +#endif /* MBEDTLS_ECP_INTERNAL_ALT */ + +#endif /* ecp_internal.h */ + diff --git a/thirdparty/mbedtls/include/mbedtls/entropy.h b/thirdparty/mbedtls/include/mbedtls/entropy.h new file mode 100644 index 0000000000..fcb4d02557 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/entropy.h @@ -0,0 +1,289 @@ +/** + * \file entropy.h + * + * \brief Entropy accumulator implementation + */ +/* + *  Copyright (C) 2006-2016, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_ENTROPY_H +#define MBEDTLS_ENTROPY_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> + +#if defined(MBEDTLS_SHA512_C) && !defined(MBEDTLS_ENTROPY_FORCE_SHA256) +#include "sha512.h" +#define MBEDTLS_ENTROPY_SHA512_ACCUMULATOR +#else +#if defined(MBEDTLS_SHA256_C) +#define MBEDTLS_ENTROPY_SHA256_ACCUMULATOR +#include "sha256.h" +#endif +#endif + +#if defined(MBEDTLS_THREADING_C) +#include "threading.h" +#endif + +#if defined(MBEDTLS_HAVEGE_C) +#include "havege.h" +#endif + +#define MBEDTLS_ERR_ENTROPY_SOURCE_FAILED                 -0x003C  /**< Critical entropy source failure. */ +#define MBEDTLS_ERR_ENTROPY_MAX_SOURCES                   -0x003E  /**< No more sources can be added. */ +#define MBEDTLS_ERR_ENTROPY_NO_SOURCES_DEFINED            -0x0040  /**< No sources have been added to poll. */ +#define MBEDTLS_ERR_ENTROPY_NO_STRONG_SOURCE              -0x003D  /**< No strong sources have been added to poll. */ +#define MBEDTLS_ERR_ENTROPY_FILE_IO_ERROR                 -0x003F  /**< Read/write error in file. */ + +/** + * \name SECTION: Module settings + * + * The configuration options you can set for this module are in this section. + * Either change them in config.h or define them on the compiler command line. + * \{ + */ + +#if !defined(MBEDTLS_ENTROPY_MAX_SOURCES) +#define MBEDTLS_ENTROPY_MAX_SOURCES     20      /**< Maximum number of sources supported */ +#endif + +#if !defined(MBEDTLS_ENTROPY_MAX_GATHER) +#define MBEDTLS_ENTROPY_MAX_GATHER      128     /**< Maximum amount requested from entropy sources */ +#endif + +/* \} name SECTION: Module settings */ + +#if defined(MBEDTLS_ENTROPY_SHA512_ACCUMULATOR) +#define MBEDTLS_ENTROPY_BLOCK_SIZE      64      /**< Block size of entropy accumulator (SHA-512) */ +#else +#define MBEDTLS_ENTROPY_BLOCK_SIZE      32      /**< Block size of entropy accumulator (SHA-256) */ +#endif + +#define MBEDTLS_ENTROPY_MAX_SEED_SIZE   1024    /**< Maximum size of seed we read from seed file */ +#define MBEDTLS_ENTROPY_SOURCE_MANUAL   MBEDTLS_ENTROPY_MAX_SOURCES + +#define MBEDTLS_ENTROPY_SOURCE_STRONG   1       /**< Entropy source is strong   */ +#define MBEDTLS_ENTROPY_SOURCE_WEAK     0       /**< Entropy source is weak     */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief           Entropy poll callback pointer + * + * \param data      Callback-specific data pointer + * \param output    Data to fill + * \param len       Maximum size to provide + * \param olen      The actual amount of bytes put into the buffer (Can be 0) + * + * \return          0 if no critical failures occurred, + *                  MBEDTLS_ERR_ENTROPY_SOURCE_FAILED otherwise + */ +typedef int (*mbedtls_entropy_f_source_ptr)(void *data, unsigned char *output, size_t len, +                            size_t *olen); + +/** + * \brief           Entropy source state + */ +typedef struct +{ +    mbedtls_entropy_f_source_ptr    f_source;   /**< The entropy source callback */ +    void *          p_source;   /**< The callback data pointer */ +    size_t          size;       /**< Amount received in bytes */ +    size_t          threshold;  /**< Minimum bytes required before release */ +    int             strong;     /**< Is the source strong? */ +} +mbedtls_entropy_source_state; + +/** + * \brief           Entropy context structure + */ +typedef struct +{ +    int accumulator_started; +#if defined(MBEDTLS_ENTROPY_SHA512_ACCUMULATOR) +    mbedtls_sha512_context  accumulator; +#else +    mbedtls_sha256_context  accumulator; +#endif +    int             source_count; +    mbedtls_entropy_source_state    source[MBEDTLS_ENTROPY_MAX_SOURCES]; +#if defined(MBEDTLS_HAVEGE_C) +    mbedtls_havege_state    havege_data; +#endif +#if defined(MBEDTLS_THREADING_C) +    mbedtls_threading_mutex_t mutex;    /*!< mutex                  */ +#endif +#if defined(MBEDTLS_ENTROPY_NV_SEED) +    int initial_entropy_run; +#endif +} +mbedtls_entropy_context; + +/** + * \brief           Initialize the context + * + * \param ctx       Entropy context to initialize + */ +void mbedtls_entropy_init( mbedtls_entropy_context *ctx ); + +/** + * \brief           Free the data in the context + * + * \param ctx       Entropy context to free + */ +void mbedtls_entropy_free( mbedtls_entropy_context *ctx ); + +/** + * \brief           Adds an entropy source to poll + *                  (Thread-safe if MBEDTLS_THREADING_C is enabled) + * + * \param ctx       Entropy context + * \param f_source  Entropy function + * \param p_source  Function data + * \param threshold Minimum required from source before entropy is released + *                  ( with mbedtls_entropy_func() ) (in bytes) + * \param strong    MBEDTLS_ENTROPY_SOURCE_STRONG or + *                  MBEDTSL_ENTROPY_SOURCE_WEAK. + *                  At least one strong source needs to be added. + *                  Weaker sources (such as the cycle counter) can be used as + *                  a complement. + * + * \return          0 if successful or MBEDTLS_ERR_ENTROPY_MAX_SOURCES + */ +int mbedtls_entropy_add_source( mbedtls_entropy_context *ctx, +                        mbedtls_entropy_f_source_ptr f_source, void *p_source, +                        size_t threshold, int strong ); + +/** + * \brief           Trigger an extra gather poll for the accumulator + *                  (Thread-safe if MBEDTLS_THREADING_C is enabled) + * + * \param ctx       Entropy context + * + * \return          0 if successful, or MBEDTLS_ERR_ENTROPY_SOURCE_FAILED + */ +int mbedtls_entropy_gather( mbedtls_entropy_context *ctx ); + +/** + * \brief           Retrieve entropy from the accumulator + *                  (Maximum length: MBEDTLS_ENTROPY_BLOCK_SIZE) + *                  (Thread-safe if MBEDTLS_THREADING_C is enabled) + * + * \param data      Entropy context + * \param output    Buffer to fill + * \param len       Number of bytes desired, must be at most MBEDTLS_ENTROPY_BLOCK_SIZE + * + * \return          0 if successful, or MBEDTLS_ERR_ENTROPY_SOURCE_FAILED + */ +int mbedtls_entropy_func( void *data, unsigned char *output, size_t len ); + +/** + * \brief           Add data to the accumulator manually + *                  (Thread-safe if MBEDTLS_THREADING_C is enabled) + * + * \param ctx       Entropy context + * \param data      Data to add + * \param len       Length of data + * + * \return          0 if successful + */ +int mbedtls_entropy_update_manual( mbedtls_entropy_context *ctx, +                           const unsigned char *data, size_t len ); + +#if defined(MBEDTLS_ENTROPY_NV_SEED) +/** + * \brief           Trigger an update of the seed file in NV by using the + *                  current entropy pool. + * + * \param ctx       Entropy context + * + * \return          0 if successful + */ +int mbedtls_entropy_update_nv_seed( mbedtls_entropy_context *ctx ); +#endif /* MBEDTLS_ENTROPY_NV_SEED */ + +#if defined(MBEDTLS_FS_IO) +/** + * \brief               Write a seed file + * + * \param ctx           Entropy context + * \param path          Name of the file + * + * \return              0 if successful, + *                      MBEDTLS_ERR_ENTROPY_FILE_IO_ERROR on file error, or + *                      MBEDTLS_ERR_ENTROPY_SOURCE_FAILED + */ +int mbedtls_entropy_write_seed_file( mbedtls_entropy_context *ctx, const char *path ); + +/** + * \brief               Read and update a seed file. Seed is added to this + *                      instance. No more than MBEDTLS_ENTROPY_MAX_SEED_SIZE bytes are + *                      read from the seed file. The rest is ignored. + * + * \param ctx           Entropy context + * \param path          Name of the file + * + * \return              0 if successful, + *                      MBEDTLS_ERR_ENTROPY_FILE_IO_ERROR on file error, + *                      MBEDTLS_ERR_ENTROPY_SOURCE_FAILED + */ +int mbedtls_entropy_update_seed_file( mbedtls_entropy_context *ctx, const char *path ); +#endif /* MBEDTLS_FS_IO */ + +#if defined(MBEDTLS_SELF_TEST) +/** + * \brief          Checkup routine + * + *                 This module self-test also calls the entropy self-test, + *                 mbedtls_entropy_source_self_test(); + * + * \return         0 if successful, or 1 if a test failed + */ +int mbedtls_entropy_self_test( int verbose ); + +#if defined(MBEDTLS_ENTROPY_HARDWARE_ALT) +/** + * \brief          Checkup routine + * + *                 Verifies the integrity of the hardware entropy source + *                 provided by the function 'mbedtls_hardware_poll()'. + * + *                 Note this is the only hardware entropy source that is known + *                 at link time, and other entropy sources configured + *                 dynamically at runtime by the function + *                 mbedtls_entropy_add_source() will not be tested. + * + * \return         0 if successful, or 1 if a test failed + */ +int mbedtls_entropy_source_self_test( int verbose ); +#endif /* MBEDTLS_ENTROPY_HARDWARE_ALT */ +#endif /* MBEDTLS_SELF_TEST */ + +#ifdef __cplusplus +} +#endif + +#endif /* entropy.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/entropy_poll.h b/thirdparty/mbedtls/include/mbedtls/entropy_poll.h new file mode 100644 index 0000000000..94dd657eb9 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/entropy_poll.h @@ -0,0 +1,110 @@ +/** + * \file entropy_poll.h + * + * \brief Platform-specific and custom entropy polling functions + */ +/* + *  Copyright (C) 2006-2016, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_ENTROPY_POLL_H +#define MBEDTLS_ENTROPY_POLL_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> + +#ifdef __cplusplus +extern "C" { +#endif + +/* + * Default thresholds for built-in sources, in bytes + */ +#define MBEDTLS_ENTROPY_MIN_PLATFORM     32     /**< Minimum for platform source    */ +#define MBEDTLS_ENTROPY_MIN_HAVEGE       32     /**< Minimum for HAVEGE             */ +#define MBEDTLS_ENTROPY_MIN_HARDCLOCK     4     /**< Minimum for mbedtls_timing_hardclock()        */ +#if !defined(MBEDTLS_ENTROPY_MIN_HARDWARE) +#define MBEDTLS_ENTROPY_MIN_HARDWARE     32     /**< Minimum for the hardware source */ +#endif + +/** + * \brief           Entropy poll callback that provides 0 entropy. + */ +#if defined(MBEDTLS_TEST_NULL_ENTROPY) +    int mbedtls_null_entropy_poll( void *data, +                                unsigned char *output, size_t len, size_t *olen ); +#endif + +#if !defined(MBEDTLS_NO_PLATFORM_ENTROPY) +/** + * \brief           Platform-specific entropy poll callback + */ +int mbedtls_platform_entropy_poll( void *data, +                           unsigned char *output, size_t len, size_t *olen ); +#endif + +#if defined(MBEDTLS_HAVEGE_C) +/** + * \brief           HAVEGE based entropy poll callback + * + * Requires an HAVEGE state as its data pointer. + */ +int mbedtls_havege_poll( void *data, +                 unsigned char *output, size_t len, size_t *olen ); +#endif + +#if defined(MBEDTLS_TIMING_C) +/** + * \brief           mbedtls_timing_hardclock-based entropy poll callback + */ +int mbedtls_hardclock_poll( void *data, +                    unsigned char *output, size_t len, size_t *olen ); +#endif + +#if defined(MBEDTLS_ENTROPY_HARDWARE_ALT) +/** + * \brief           Entropy poll callback for a hardware source + * + * \warning         This is not provided by mbed TLS! + *                  See \c MBEDTLS_ENTROPY_HARDWARE_ALT in config.h. + * + * \note            This must accept NULL as its first argument. + */ +int mbedtls_hardware_poll( void *data, +                           unsigned char *output, size_t len, size_t *olen ); +#endif + +#if defined(MBEDTLS_ENTROPY_NV_SEED) +/** + * \brief           Entropy poll callback for a non-volatile seed file + * + * \note            This must accept NULL as its first argument. + */ +int mbedtls_nv_seed_poll( void *data, +                          unsigned char *output, size_t len, size_t *olen ); +#endif + +#ifdef __cplusplus +} +#endif + +#endif /* entropy_poll.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/error.h b/thirdparty/mbedtls/include/mbedtls/error.h new file mode 100644 index 0000000000..8b4d3a8755 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/error.h @@ -0,0 +1,117 @@ +/** + * \file error.h + * + * \brief Error to string translation + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_ERROR_H +#define MBEDTLS_ERROR_H + +#include <stddef.h> + +/** + * Error code layout. + * + * Currently we try to keep all error codes within the negative space of 16 + * bits signed integers to support all platforms (-0x0001 - -0x7FFF). In + * addition we'd like to give two layers of information on the error if + * possible. + * + * For that purpose the error codes are segmented in the following manner: + * + * 16 bit error code bit-segmentation + * + * 1 bit  - Unused (sign bit) + * 3 bits - High level module ID + * 5 bits - Module-dependent error code + * 7 bits - Low level module errors + * + * For historical reasons, low-level error codes are divided in even and odd, + * even codes were assigned first, and -1 is reserved for other errors. + * + * Low-level module errors (0x0002-0x007E, 0x0003-0x007F) + * + * Module   Nr  Codes assigned + * MPI       7  0x0002-0x0010 + * GCM       3  0x0012-0x0014   0x0013-0x0013 + * BLOWFISH  3  0x0016-0x0018   0x0017-0x0017 + * THREADING 3  0x001A-0x001E + * AES       4  0x0020-0x0022   0x0023-0x0025 + * CAMELLIA  3  0x0024-0x0026   0x0027-0x0027 + * XTEA      2  0x0028-0x0028   0x0029-0x0029 + * BASE64    2  0x002A-0x002C + * OID       1  0x002E-0x002E   0x000B-0x000B + * PADLOCK   1  0x0030-0x0030 + * DES       2  0x0032-0x0032   0x0033-0x0033 + * CTR_DBRG  4  0x0034-0x003A + * ENTROPY   3  0x003C-0x0040   0x003D-0x003F + * NET      11  0x0042-0x0052   0x0043-0x0045 + * ASN1      7  0x0060-0x006C + * CMAC      1  0x007A-0x007A + * PBKDF2    1  0x007C-0x007C + * HMAC_DRBG 4                  0x0003-0x0009 + * CCM       3                  0x000D-0x0011 + * ARC4      1                  0x0019-0x0019 + * MD2       1                  0x002B-0x002B + * MD4       1                  0x002D-0x002D + * MD5       1                  0x002F-0x002F + * RIPEMD160 1                  0x0031-0x0031 + * SHA1      1                  0x0035-0x0035 + * SHA256    1                  0x0037-0x0037 + * SHA512    1                  0x0039-0x0039 + * + * High-level module nr (3 bits - 0x0...-0x7...) + * Name      ID  Nr of Errors + * PEM       1   9 + * PKCS#12   1   4 (Started from top) + * X509      2   20 + * PKCS5     2   4 (Started from top) + * DHM       3   11 + * PK        3   15 (Started from top) + * RSA       4   11 + * ECP       4   9 (Started from top) + * MD        5   5 + * CIPHER    6   8 + * SSL       6   17 (Started from top) + * SSL       7   31 + * + * Module dependent error code (5 bits 0x.00.-0x.F8.) + */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief Translate a mbed TLS error code into a string representation, + *        Result is truncated if necessary and always includes a terminating + *        null byte. + * + * \param errnum    error code + * \param buffer    buffer to place representation in + * \param buflen    length of the buffer + */ +void mbedtls_strerror( int errnum, char *buffer, size_t buflen ); + +#ifdef __cplusplus +} +#endif + +#endif /* error.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/gcm.h b/thirdparty/mbedtls/include/mbedtls/gcm.h new file mode 100644 index 0000000000..1e5a507a26 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/gcm.h @@ -0,0 +1,263 @@ +/** + * \file gcm.h + * + * \brief Galois/Counter Mode (GCM) for 128-bit block ciphers, as defined + *        in <em>D. McGrew, J. Viega, The Galois/Counter Mode of Operation + *        (GCM), Natl. Inst. Stand. Technol.</em> + * + * For more information on GCM, see <em>NIST SP 800-38D: Recommendation for + * Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC</em>. + * + */ +/* + *  Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of Mbed TLS (https://tls.mbed.org) + */ + +#ifndef MBEDTLS_GCM_H +#define MBEDTLS_GCM_H + +#include "cipher.h" + +#include <stdint.h> + +#define MBEDTLS_GCM_ENCRYPT     1 +#define MBEDTLS_GCM_DECRYPT     0 + +#define MBEDTLS_ERR_GCM_AUTH_FAILED                       -0x0012  /**< Authenticated decryption failed. */ +#define MBEDTLS_ERR_GCM_HW_ACCEL_FAILED                   -0x0013  /**< GCM hardware accelerator failed. */ +#define MBEDTLS_ERR_GCM_BAD_INPUT                         -0x0014  /**< Bad input parameters to function. */ + +#if !defined(MBEDTLS_GCM_ALT) + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          The GCM context structure. + */ +typedef struct { +    mbedtls_cipher_context_t cipher_ctx;  /*!< The cipher context used. */ +    uint64_t HL[16];                      /*!< Precalculated HTable low. */ +    uint64_t HH[16];                      /*!< Precalculated HTable high. */ +    uint64_t len;                         /*!< The total length of the encrypted data. */ +    uint64_t add_len;                     /*!< The total length of the additional data. */ +    unsigned char base_ectr[16];          /*!< The first ECTR for tag. */ +    unsigned char y[16];                  /*!< The Y working value. */ +    unsigned char buf[16];                /*!< The buf working value. */ +    int mode;                             /*!< The operation to perform: +                                               #MBEDTLS_GCM_ENCRYPT or +                                               #MBEDTLS_GCM_DECRYPT. */ +} +mbedtls_gcm_context; + +/** + * \brief           This function initializes the specified GCM context, + *                  to make references valid, and prepares the context + *                  for mbedtls_gcm_setkey() or mbedtls_gcm_free(). + * + *                  The function does not bind the GCM context to a particular + *                  cipher, nor set the key. For this purpose, use + *                  mbedtls_gcm_setkey(). + * + * \param ctx       The GCM context to initialize. + */ +void mbedtls_gcm_init( mbedtls_gcm_context *ctx ); + +/** + * \brief           This function associates a GCM context with a + *                  cipher algorithm and a key. + * + * \param ctx       The GCM context to initialize. + * \param cipher    The 128-bit block cipher to use. + * \param key       The encryption key. + * \param keybits   The key size in bits. Valid options are: + *                  <ul><li>128 bits</li> + *                  <li>192 bits</li> + *                  <li>256 bits</li></ul> + * + * \return          \c 0 on success, or a cipher specific error code. + */ +int mbedtls_gcm_setkey( mbedtls_gcm_context *ctx, +                        mbedtls_cipher_id_t cipher, +                        const unsigned char *key, +                        unsigned int keybits ); + +/** + * \brief           This function performs GCM encryption or decryption of a buffer. + * + * \note For encryption, the output buffer can be the same as the input buffer. + *       For decryption, the output buffer cannot be the same as input buffer. + *       If the buffers overlap, the output buffer must trail at least 8 Bytes + *       behind the input buffer. + * + * \param ctx       The GCM context to use for encryption or decryption. + * \param mode      The operation to perform: #MBEDTLS_GCM_ENCRYPT or + *                  #MBEDTLS_GCM_DECRYPT. + * \param length    The length of the input data. This must be a multiple of 16 except in the last call before mbedtls_gcm_finish(). + * \param iv        The initialization vector. + * \param iv_len    The length of the IV. + * \param add       The buffer holding the additional data. + * \param add_len   The length of the additional data. + * \param input     The buffer holding the input data. + * \param output    The buffer for holding the output data. + * \param tag_len   The length of the tag to generate. + * \param tag       The buffer for holding the tag. + * + * \return         \c 0 on success. + */ +int mbedtls_gcm_crypt_and_tag( mbedtls_gcm_context *ctx, +                       int mode, +                       size_t length, +                       const unsigned char *iv, +                       size_t iv_len, +                       const unsigned char *add, +                       size_t add_len, +                       const unsigned char *input, +                       unsigned char *output, +                       size_t tag_len, +                       unsigned char *tag ); + +/** + * \brief           This function performs a GCM authenticated decryption of a + *                  buffer. + * + * \note For decryption, the output buffer cannot be the same as input buffer. + *       If the buffers overlap, the output buffer must trail at least 8 Bytes + *       behind the input buffer. + * + * \param ctx       The GCM context. + * \param length    The length of the input data. This must be a multiple of 16 except in the last call before mbedtls_gcm_finish(). + * \param iv        The initialization vector. + * \param iv_len    The length of the IV. + * \param add       The buffer holding the additional data. + * \param add_len   The length of the additional data. + * \param tag       The buffer holding the tag. + * \param tag_len   The length of the tag. + * \param input     The buffer holding the input data. + * \param output    The buffer for holding the output data. + * + * \return         0 if successful and authenticated, or + *                 #MBEDTLS_ERR_GCM_AUTH_FAILED if tag does not match. + */ +int mbedtls_gcm_auth_decrypt( mbedtls_gcm_context *ctx, +                      size_t length, +                      const unsigned char *iv, +                      size_t iv_len, +                      const unsigned char *add, +                      size_t add_len, +                      const unsigned char *tag, +                      size_t tag_len, +                      const unsigned char *input, +                      unsigned char *output ); + +/** + * \brief           This function starts a GCM encryption or decryption + *                  operation. + * + * \param ctx       The GCM context. + * \param mode      The operation to perform: #MBEDTLS_GCM_ENCRYPT or + *                  #MBEDTLS_GCM_DECRYPT. + * \param iv        The initialization vector. + * \param iv_len    The length of the IV. + * \param add       The buffer holding the additional data, or NULL if \p add_len is 0. + * \param add_len   The length of the additional data. If 0, \p  add is NULL. + * + * \return         \c 0 on success. + */ +int mbedtls_gcm_starts( mbedtls_gcm_context *ctx, +                int mode, +                const unsigned char *iv, +                size_t iv_len, +                const unsigned char *add, +                size_t add_len ); + +/** + * \brief           This function feeds an input buffer into an ongoing GCM + *                  encryption or decryption operation. + * + *    `             The function expects input to be a multiple of 16 + *                  Bytes. Only the last call before calling + *                  mbedtls_gcm_finish() can be less than 16 Bytes. + * + * \note For decryption, the output buffer cannot be the same as input buffer. + *       If the buffers overlap, the output buffer must trail at least 8 Bytes + *       behind the input buffer. + * + * \param ctx       The GCM context. + * \param length    The length of the input data. This must be a multiple of 16 except in the last call before mbedtls_gcm_finish(). + * \param input     The buffer holding the input data. + * \param output    The buffer for holding the output data. + * + * \return         \c 0 on success, or #MBEDTLS_ERR_GCM_BAD_INPUT on failure. + */ +int mbedtls_gcm_update( mbedtls_gcm_context *ctx, +                size_t length, +                const unsigned char *input, +                unsigned char *output ); + +/** + * \brief           This function finishes the GCM operation and generates + *                  the authentication tag. + * + *                  It wraps up the GCM stream, and generates the + *                  tag. The tag can have a maximum length of 16 Bytes. + * + * \param ctx       The GCM context. + * \param tag       The buffer for holding the tag. + * \param tag_len   The length of the tag to generate. Must be at least four. + * + * \return          \c 0 on success, or #MBEDTLS_ERR_GCM_BAD_INPUT on failure. + */ +int mbedtls_gcm_finish( mbedtls_gcm_context *ctx, +                unsigned char *tag, +                size_t tag_len ); + +/** + * \brief           This function clears a GCM context and the underlying + *                  cipher sub-context. + * + * \param ctx       The GCM context to clear. + */ +void mbedtls_gcm_free( mbedtls_gcm_context *ctx ); + +#ifdef __cplusplus +} +#endif + +#else  /* !MBEDTLS_GCM_ALT */ +#include "gcm_alt.h" +#endif /* !MBEDTLS_GCM_ALT */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          The GCM checkup routine. + * + * \return         \c 0 on success, or \c 1 on failure. + */ +int mbedtls_gcm_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + + +#endif /* gcm.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/havege.h b/thirdparty/mbedtls/include/mbedtls/havege.h new file mode 100644 index 0000000000..d4cb3ed38d --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/havege.h @@ -0,0 +1,75 @@ +/** + * \file havege.h + * + * \brief HAVEGE: HArdware Volatile Entropy Gathering and Expansion + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_HAVEGE_H +#define MBEDTLS_HAVEGE_H + +#include <stddef.h> + +#define MBEDTLS_HAVEGE_COLLECT_SIZE 1024 + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          HAVEGE state structure + */ +typedef struct +{ +    int PT1, PT2, offset[2]; +    int pool[MBEDTLS_HAVEGE_COLLECT_SIZE]; +    int WALK[8192]; +} +mbedtls_havege_state; + +/** + * \brief          HAVEGE initialization + * + * \param hs       HAVEGE state to be initialized + */ +void mbedtls_havege_init( mbedtls_havege_state *hs ); + +/** + * \brief          Clear HAVEGE state + * + * \param hs       HAVEGE state to be cleared + */ +void mbedtls_havege_free( mbedtls_havege_state *hs ); + +/** + * \brief          HAVEGE rand function + * + * \param p_rng    A HAVEGE state + * \param output   Buffer to fill + * \param len      Length of buffer + * + * \return         0 + */ +int mbedtls_havege_random( void *p_rng, unsigned char *output, size_t len ); + +#ifdef __cplusplus +} +#endif + +#endif /* havege.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/hmac_drbg.h b/thirdparty/mbedtls/include/mbedtls/hmac_drbg.h new file mode 100644 index 0000000000..e0821cf788 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/hmac_drbg.h @@ -0,0 +1,300 @@ +/** + * \file hmac_drbg.h + * + * \brief HMAC_DRBG (NIST SP 800-90A) + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_HMAC_DRBG_H +#define MBEDTLS_HMAC_DRBG_H + +#include "md.h" + +#if defined(MBEDTLS_THREADING_C) +#include "mbedtls/threading.h" +#endif + +/* + * Error codes + */ +#define MBEDTLS_ERR_HMAC_DRBG_REQUEST_TOO_BIG              -0x0003  /**< Too many random requested in single call. */ +#define MBEDTLS_ERR_HMAC_DRBG_INPUT_TOO_BIG                -0x0005  /**< Input too large (Entropy + additional). */ +#define MBEDTLS_ERR_HMAC_DRBG_FILE_IO_ERROR                -0x0007  /**< Read/write error in file. */ +#define MBEDTLS_ERR_HMAC_DRBG_ENTROPY_SOURCE_FAILED        -0x0009  /**< The entropy source failed. */ + +/** + * \name SECTION: Module settings + * + * The configuration options you can set for this module are in this section. + * Either change them in config.h or define them on the compiler command line. + * \{ + */ + +#if !defined(MBEDTLS_HMAC_DRBG_RESEED_INTERVAL) +#define MBEDTLS_HMAC_DRBG_RESEED_INTERVAL   10000   /**< Interval before reseed is performed by default */ +#endif + +#if !defined(MBEDTLS_HMAC_DRBG_MAX_INPUT) +#define MBEDTLS_HMAC_DRBG_MAX_INPUT         256     /**< Maximum number of additional input bytes */ +#endif + +#if !defined(MBEDTLS_HMAC_DRBG_MAX_REQUEST) +#define MBEDTLS_HMAC_DRBG_MAX_REQUEST       1024    /**< Maximum number of requested bytes per call */ +#endif + +#if !defined(MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT) +#define MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT    384     /**< Maximum size of (re)seed buffer */ +#endif + +/* \} name SECTION: Module settings */ + +#define MBEDTLS_HMAC_DRBG_PR_OFF   0   /**< No prediction resistance       */ +#define MBEDTLS_HMAC_DRBG_PR_ON    1   /**< Prediction resistance enabled  */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * HMAC_DRBG context. + */ +typedef struct +{ +    /* Working state: the key K is not stored explicitely, +     * but is implied by the HMAC context */ +    mbedtls_md_context_t md_ctx;                    /*!< HMAC context (inc. K)  */ +    unsigned char V[MBEDTLS_MD_MAX_SIZE];  /*!< V in the spec          */ +    int reseed_counter;                     /*!< reseed counter         */ + +    /* Administrative state */ +    size_t entropy_len;         /*!< entropy bytes grabbed on each (re)seed */ +    int prediction_resistance;  /*!< enable prediction resistance (Automatic +                                     reseed before every random generation) */ +    int reseed_interval;        /*!< reseed interval   */ + +    /* Callbacks */ +    int (*f_entropy)(void *, unsigned char *, size_t); /*!< entropy function */ +    void *p_entropy;            /*!< context for the entropy function        */ + +#if defined(MBEDTLS_THREADING_C) +    mbedtls_threading_mutex_t mutex; +#endif +} mbedtls_hmac_drbg_context; + +/** + * \brief               HMAC_DRBG context initialization + *                      Makes the context ready for mbedtls_hmac_drbg_seed(), + *                      mbedtls_hmac_drbg_seed_buf() or + *                      mbedtls_hmac_drbg_free(). + * + * \param ctx           HMAC_DRBG context to be initialized + */ +void mbedtls_hmac_drbg_init( mbedtls_hmac_drbg_context *ctx ); + +/** + * \brief               HMAC_DRBG initial seeding + *                      Seed and setup entropy source for future reseeds. + * + * \param ctx           HMAC_DRBG context to be seeded + * \param md_info       MD algorithm to use for HMAC_DRBG + * \param f_entropy     Entropy callback (p_entropy, buffer to fill, buffer + *                      length) + * \param p_entropy     Entropy context + * \param custom        Personalization data (Device specific identifiers) + *                      (Can be NULL) + * \param len           Length of personalization data + * + * \note                The "security strength" as defined by NIST is set to: + *                      128 bits if md_alg is SHA-1, + *                      192 bits if md_alg is SHA-224, + *                      256 bits if md_alg is SHA-256 or higher. + *                      Note that SHA-256 is just as efficient as SHA-224. + * + * \return              0 if successful, or + *                      MBEDTLS_ERR_MD_BAD_INPUT_DATA, or + *                      MBEDTLS_ERR_MD_ALLOC_FAILED, or + *                      MBEDTLS_ERR_HMAC_DRBG_ENTROPY_SOURCE_FAILED. + */ +int mbedtls_hmac_drbg_seed( mbedtls_hmac_drbg_context *ctx, +                    const mbedtls_md_info_t * md_info, +                    int (*f_entropy)(void *, unsigned char *, size_t), +                    void *p_entropy, +                    const unsigned char *custom, +                    size_t len ); + +/** + * \brief               Initilisation of simpified HMAC_DRBG (never reseeds). + *                      (For use with deterministic ECDSA.) + * + * \param ctx           HMAC_DRBG context to be initialised + * \param md_info       MD algorithm to use for HMAC_DRBG + * \param data          Concatenation of entropy string and additional data + * \param data_len      Length of data in bytes + * + * \return              0 if successful, or + *                      MBEDTLS_ERR_MD_BAD_INPUT_DATA, or + *                      MBEDTLS_ERR_MD_ALLOC_FAILED. + */ +int mbedtls_hmac_drbg_seed_buf( mbedtls_hmac_drbg_context *ctx, +                        const mbedtls_md_info_t * md_info, +                        const unsigned char *data, size_t data_len ); + +/** + * \brief               Enable / disable prediction resistance (Default: Off) + * + * Note: If enabled, entropy is used for ctx->entropy_len before each call! + *       Only use this if you have ample supply of good entropy! + * + * \param ctx           HMAC_DRBG context + * \param resistance    MBEDTLS_HMAC_DRBG_PR_ON or MBEDTLS_HMAC_DRBG_PR_OFF + */ +void mbedtls_hmac_drbg_set_prediction_resistance( mbedtls_hmac_drbg_context *ctx, +                                          int resistance ); + +/** + * \brief               Set the amount of entropy grabbed on each reseed + *                      (Default: given by the security strength, which + *                      depends on the hash used, see \c mbedtls_hmac_drbg_init() ) + * + * \param ctx           HMAC_DRBG context + * \param len           Amount of entropy to grab, in bytes + */ +void mbedtls_hmac_drbg_set_entropy_len( mbedtls_hmac_drbg_context *ctx, +                                size_t len ); + +/** + * \brief               Set the reseed interval + *                      (Default: MBEDTLS_HMAC_DRBG_RESEED_INTERVAL) + * + * \param ctx           HMAC_DRBG context + * \param interval      Reseed interval + */ +void mbedtls_hmac_drbg_set_reseed_interval( mbedtls_hmac_drbg_context *ctx, +                                    int interval ); + +/** + * \brief               HMAC_DRBG update state + * + * \param ctx           HMAC_DRBG context + * \param additional    Additional data to update state with, or NULL + * \param add_len       Length of additional data, or 0 + * + * \note                Additional data is optional, pass NULL and 0 as second + *                      third argument if no additional data is being used. + */ +void mbedtls_hmac_drbg_update( mbedtls_hmac_drbg_context *ctx, +                       const unsigned char *additional, size_t add_len ); + +/** + * \brief               HMAC_DRBG reseeding (extracts data from entropy source) + * + * \param ctx           HMAC_DRBG context + * \param additional    Additional data to add to state (Can be NULL) + * \param len           Length of additional data + * + * \return              0 if successful, or + *                      MBEDTLS_ERR_HMAC_DRBG_ENTROPY_SOURCE_FAILED + */ +int mbedtls_hmac_drbg_reseed( mbedtls_hmac_drbg_context *ctx, +                      const unsigned char *additional, size_t len ); + +/** + * \brief               HMAC_DRBG generate random with additional update input + * + * Note: Automatically reseeds if reseed_counter is reached or PR is enabled. + * + * \param p_rng         HMAC_DRBG context + * \param output        Buffer to fill + * \param output_len    Length of the buffer + * \param additional    Additional data to update with (can be NULL) + * \param add_len       Length of additional data (can be 0) + * + * \return              0 if successful, or + *                      MBEDTLS_ERR_HMAC_DRBG_ENTROPY_SOURCE_FAILED, or + *                      MBEDTLS_ERR_HMAC_DRBG_REQUEST_TOO_BIG, or + *                      MBEDTLS_ERR_HMAC_DRBG_INPUT_TOO_BIG. + */ +int mbedtls_hmac_drbg_random_with_add( void *p_rng, +                               unsigned char *output, size_t output_len, +                               const unsigned char *additional, +                               size_t add_len ); + +/** + * \brief               HMAC_DRBG generate random + * + * Note: Automatically reseeds if reseed_counter is reached or PR is enabled. + * + * \param p_rng         HMAC_DRBG context + * \param output        Buffer to fill + * \param out_len       Length of the buffer + * + * \return              0 if successful, or + *                      MBEDTLS_ERR_HMAC_DRBG_ENTROPY_SOURCE_FAILED, or + *                      MBEDTLS_ERR_HMAC_DRBG_REQUEST_TOO_BIG + */ +int mbedtls_hmac_drbg_random( void *p_rng, unsigned char *output, size_t out_len ); + +/** + * \brief               Free an HMAC_DRBG context + * + * \param ctx           HMAC_DRBG context to free. + */ +void mbedtls_hmac_drbg_free( mbedtls_hmac_drbg_context *ctx ); + +#if defined(MBEDTLS_FS_IO) +/** + * \brief               Write a seed file + * + * \param ctx           HMAC_DRBG context + * \param path          Name of the file + * + * \return              0 if successful, 1 on file error, or + *                      MBEDTLS_ERR_HMAC_DRBG_ENTROPY_SOURCE_FAILED + */ +int mbedtls_hmac_drbg_write_seed_file( mbedtls_hmac_drbg_context *ctx, const char *path ); + +/** + * \brief               Read and update a seed file. Seed is added to this + *                      instance + * + * \param ctx           HMAC_DRBG context + * \param path          Name of the file + * + * \return              0 if successful, 1 on file error, + *                      MBEDTLS_ERR_HMAC_DRBG_ENTROPY_SOURCE_FAILED or + *                      MBEDTLS_ERR_HMAC_DRBG_INPUT_TOO_BIG + */ +int mbedtls_hmac_drbg_update_seed_file( mbedtls_hmac_drbg_context *ctx, const char *path ); +#endif /* MBEDTLS_FS_IO */ + + +#if defined(MBEDTLS_SELF_TEST) +/** + * \brief               Checkup routine + * + * \return              0 if successful, or 1 if the test failed + */ +int mbedtls_hmac_drbg_self_test( int verbose ); +#endif + +#ifdef __cplusplus +} +#endif + +#endif /* hmac_drbg.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/md.h b/thirdparty/mbedtls/include/mbedtls/md.h new file mode 100644 index 0000000000..06538c3827 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/md.h @@ -0,0 +1,453 @@ + /** + * \file md.h + * + * \brief The generic message-digest wrapper. + * + * \author Adriaan de Jong <dejong@fox-it.com> + */ +/* + *  Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of Mbed TLS (https://tls.mbed.org) + */ + +#ifndef MBEDTLS_MD_H +#define MBEDTLS_MD_H + +#include <stddef.h> + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#define MBEDTLS_ERR_MD_FEATURE_UNAVAILABLE                -0x5080  /**< The selected feature is not available. */ +#define MBEDTLS_ERR_MD_BAD_INPUT_DATA                     -0x5100  /**< Bad input parameters to function. */ +#define MBEDTLS_ERR_MD_ALLOC_FAILED                       -0x5180  /**< Failed to allocate memory. */ +#define MBEDTLS_ERR_MD_FILE_IO_ERROR                      -0x5200  /**< Opening or reading of file failed. */ +#define MBEDTLS_ERR_MD_HW_ACCEL_FAILED                    -0x5280  /**< MD hardware accelerator failed. */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief     Enumeration of supported message digests + * + * \warning   MD2, MD4, MD5 and SHA-1 are considered weak message digests and + *            their use constitutes a security risk. We recommend considering + *            stronger message digests instead. + * + */ +typedef enum { +    MBEDTLS_MD_NONE=0, +    MBEDTLS_MD_MD2, +    MBEDTLS_MD_MD4, +    MBEDTLS_MD_MD5, +    MBEDTLS_MD_SHA1, +    MBEDTLS_MD_SHA224, +    MBEDTLS_MD_SHA256, +    MBEDTLS_MD_SHA384, +    MBEDTLS_MD_SHA512, +    MBEDTLS_MD_RIPEMD160, +} mbedtls_md_type_t; + +#if defined(MBEDTLS_SHA512_C) +#define MBEDTLS_MD_MAX_SIZE         64  /* longest known is SHA512 */ +#else +#define MBEDTLS_MD_MAX_SIZE         32  /* longest known is SHA256 or less */ +#endif + +/** + * Opaque struct defined in md_internal.h. + */ +typedef struct mbedtls_md_info_t mbedtls_md_info_t; + +/** + * The generic message-digest context. + */ +typedef struct { +    /** Information about the associated message digest. */ +    const mbedtls_md_info_t *md_info; + +    /** The digest-specific context. */ +    void *md_ctx; + +    /** The HMAC part of the context. */ +    void *hmac_ctx; +} mbedtls_md_context_t; + +/** + * \brief           This function returns the list of digests supported by the + *                  generic digest module. + * + * \return          A statically allocated array of digests. Each element + *                  in the returned list is an integer belonging to the + *                  message-digest enumeration #mbedtls_md_type_t. + *                  The last entry is 0. + */ +const int *mbedtls_md_list( void ); + +/** + * \brief           This function returns the message-digest information + *                  associated with the given digest name. + * + * \param md_name   The name of the digest to search for. + * + * \return          The message-digest information associated with \p md_name, + *                  or NULL if not found. + */ +const mbedtls_md_info_t *mbedtls_md_info_from_string( const char *md_name ); + +/** + * \brief           This function returns the message-digest information + *                  associated with the given digest type. + * + * \param md_type   The type of digest to search for. + * + * \return          The message-digest information associated with \p md_type, + *                  or NULL if not found. + */ +const mbedtls_md_info_t *mbedtls_md_info_from_type( mbedtls_md_type_t md_type ); + +/** + * \brief           This function initializes a message-digest context without + *                  binding it to a particular message-digest algorithm. + * + *                  This function should always be called first. It prepares the + *                  context for mbedtls_md_setup() for binding it to a + *                  message-digest algorithm. + */ +void mbedtls_md_init( mbedtls_md_context_t *ctx ); + +/** + * \brief           This function clears the internal structure of \p ctx and + *                  frees any embedded internal structure, but does not free + *                  \p ctx itself. + * + *                  If you have called mbedtls_md_setup() on \p ctx, you must + *                  call mbedtls_md_free() when you are no longer using the + *                  context. + *                  Calling this function if you have previously + *                  called mbedtls_md_init() and nothing else is optional. + *                  You must not call this function if you have not called + *                  mbedtls_md_init(). + */ +void mbedtls_md_free( mbedtls_md_context_t *ctx ); + +#if ! defined(MBEDTLS_DEPRECATED_REMOVED) +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED    __attribute__((deprecated)) +#else +#define MBEDTLS_DEPRECATED +#endif +/** + * \brief           This function selects the message digest algorithm to use, + *                  and allocates internal structures. + * + *                  It should be called after mbedtls_md_init() or mbedtls_md_free(). + *                  Makes it necessary to call mbedtls_md_free() later. + * + * \deprecated      Superseded by mbedtls_md_setup() in 2.0.0 + * + * \param ctx       The context to set up. + * \param md_info   The information structure of the message-digest algorithm + *                  to use. + * + * \returns         \c 0 on success, + *                  #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter failure, + *                  #MBEDTLS_ERR_MD_ALLOC_FAILED memory allocation failure. + */ +int mbedtls_md_init_ctx( mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info ) MBEDTLS_DEPRECATED; +#undef MBEDTLS_DEPRECATED +#endif /* MBEDTLS_DEPRECATED_REMOVED */ + +/** + * \brief           This function selects the message digest algorithm to use, + *                  and allocates internal structures. + * + *                  It should be called after mbedtls_md_init() or + *                  mbedtls_md_free(). Makes it necessary to call + *                  mbedtls_md_free() later. + * + * \param ctx       The context to set up. + * \param md_info   The information structure of the message-digest algorithm + *                  to use. + * \param hmac      <ul><li>0: HMAC is not used. Saves some memory.</li> + *                  <li>non-zero: HMAC is used with this context.</li></ul> + * + * \returns         \c 0 on success, + *                  #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter failure, or + *                  #MBEDTLS_ERR_MD_ALLOC_FAILED on memory allocation failure. + */ +int mbedtls_md_setup( mbedtls_md_context_t *ctx, const mbedtls_md_info_t *md_info, int hmac ); + +/** + * \brief           This function clones the state of an message-digest + *                  context. + * + * \note            You must call mbedtls_md_setup() on \c dst before calling + *                  this function. + * + * \note            The two contexts must have the same type, + *                  for example, both are SHA-256. + * + * \warning         This function clones the message-digest state, not the + *                  HMAC state. + * + * \param dst       The destination context. + * \param src       The context to be cloned. + * + * \return          \c 0 on success, + *                  #MBEDTLS_ERR_MD_BAD_INPUT_DATA on parameter failure. + */ +int mbedtls_md_clone( mbedtls_md_context_t *dst, +                      const mbedtls_md_context_t *src ); + +/** + * \brief           This function extracts the message-digest size from the + *                  message-digest information structure. + * + * \param md_info   The information structure of the message-digest algorithm + *                  to use. + * + * \return          The size of the message-digest output in Bytes. + */ +unsigned char mbedtls_md_get_size( const mbedtls_md_info_t *md_info ); + +/** + * \brief           This function extracts the message-digest type from the + *                  message-digest information structure. + * + * \param md_info   The information structure of the message-digest algorithm + *                  to use. + * + * \return          The type of the message digest. + */ +mbedtls_md_type_t mbedtls_md_get_type( const mbedtls_md_info_t *md_info ); + +/** + * \brief           This function extracts the message-digest name from the + *                  message-digest information structure. + * + * \param md_info   The information structure of the message-digest algorithm + *                  to use. + * + * \return          The name of the message digest. + */ +const char *mbedtls_md_get_name( const mbedtls_md_info_t *md_info ); + +/** + * \brief           This function starts a message-digest computation. + * + *                  You must call this function after setting up the context + *                  with mbedtls_md_setup(), and before passing data with + *                  mbedtls_md_update(). + * + * \param ctx       The generic message-digest context. + * + * \returns         \c 0 on success, #MBEDTLS_ERR_MD_BAD_INPUT_DATA if + *                  parameter verification fails. + */ +int mbedtls_md_starts( mbedtls_md_context_t *ctx ); + +/** + * \brief           This function feeds an input buffer into an ongoing + *                  message-digest computation. + * + *                  You must call mbedtls_md_starts() before calling this + *                  function. You may call this function multiple times. + *                  Afterwards, call mbedtls_md_finish(). + * + * \param ctx       The generic message-digest context. + * \param input     The buffer holding the input data. + * \param ilen      The length of the input data. + * + * \returns         \c 0 on success, #MBEDTLS_ERR_MD_BAD_INPUT_DATA if + *                  parameter verification fails. + */ +int mbedtls_md_update( mbedtls_md_context_t *ctx, const unsigned char *input, size_t ilen ); + +/** + * \brief           This function finishes the digest operation, + *                  and writes the result to the output buffer. + * + *                  Call this function after a call to mbedtls_md_starts(), + *                  followed by any number of calls to mbedtls_md_update(). + *                  Afterwards, you may either clear the context with + *                  mbedtls_md_free(), or call mbedtls_md_starts() to reuse + *                  the context for another digest operation with the same + *                  algorithm. + * + * \param ctx       The generic message-digest context. + * \param output    The buffer for the generic message-digest checksum result. + * + * \returns         \c 0 on success, or #MBEDTLS_ERR_MD_BAD_INPUT_DATA if + *                  parameter verification fails. + */ +int mbedtls_md_finish( mbedtls_md_context_t *ctx, unsigned char *output ); + +/** + * \brief          This function calculates the message-digest of a buffer, + *                 with respect to a configurable message-digest algorithm + *                 in a single call. + * + *                 The result is calculated as + *                 Output = message_digest(input buffer). + * + * \param md_info  The information structure of the message-digest algorithm + *                 to use. + * \param input    The buffer holding the data. + * \param ilen     The length of the input data. + * \param output   The generic message-digest checksum result. + * + * \returns        \c 0 on success, or #MBEDTLS_ERR_MD_BAD_INPUT_DATA if + *                 parameter verification fails. + */ +int mbedtls_md( const mbedtls_md_info_t *md_info, const unsigned char *input, size_t ilen, +        unsigned char *output ); + +#if defined(MBEDTLS_FS_IO) +/** + * \brief          This function calculates the message-digest checksum + *                 result of the contents of the provided file. + * + *                 The result is calculated as + *                 Output = message_digest(file contents). + * + * \param md_info  The information structure of the message-digest algorithm + *                 to use. + * \param path     The input file name. + * \param output   The generic message-digest checksum result. + * + * \return         \c 0 on success, + *                 #MBEDTLS_ERR_MD_FILE_IO_ERROR if file input failed, or + *                 #MBEDTLS_ERR_MD_BAD_INPUT_DATA if \p md_info was NULL. + */ +int mbedtls_md_file( const mbedtls_md_info_t *md_info, const char *path, +                     unsigned char *output ); +#endif /* MBEDTLS_FS_IO */ + +/** + * \brief           This function sets the HMAC key and prepares to + *                  authenticate a new message. + * + *                  Call this function after mbedtls_md_setup(), to use + *                  the MD context for an HMAC calculation, then call + *                  mbedtls_md_hmac_update() to provide the input data, and + *                  mbedtls_md_hmac_finish() to get the HMAC value. + * + * \param ctx       The message digest context containing an embedded HMAC + *                  context. + * \param key       The HMAC secret key. + * \param keylen    The length of the HMAC key in Bytes. + * + * \returns         \c 0 on success, or #MBEDTLS_ERR_MD_BAD_INPUT_DATA if + *                  parameter verification fails. + */ +int mbedtls_md_hmac_starts( mbedtls_md_context_t *ctx, const unsigned char *key, +                    size_t keylen ); + +/** + * \brief           This function feeds an input buffer into an ongoing HMAC + *                  computation. + * + *                  Call mbedtls_md_hmac_starts() or mbedtls_md_hmac_reset() + *                  before calling this function. + *                  You may call this function multiple times to pass the + *                  input piecewise. + *                  Afterwards, call mbedtls_md_hmac_finish(). + * + * \param ctx       The message digest context containing an embedded HMAC + *                  context. + * \param input     The buffer holding the input data. + * \param ilen      The length of the input data. + * + * \returns         \c 0 on success, or #MBEDTLS_ERR_MD_BAD_INPUT_DATA if + *                  parameter verification fails. + */ +int mbedtls_md_hmac_update( mbedtls_md_context_t *ctx, const unsigned char *input, +                    size_t ilen ); + +/** + * \brief           This function finishes the HMAC operation, and writes + *                  the result to the output buffer. + * + *                  Call this function after mbedtls_md_hmac_starts() and + *                  mbedtls_md_hmac_update() to get the HMAC value. Afterwards + *                  you may either call mbedtls_md_free() to clear the context, + *                  or call mbedtls_md_hmac_reset() to reuse the context with + *                  the same HMAC key. + * + * \param ctx       The message digest context containing an embedded HMAC + *                  context. + * \param output    The generic HMAC checksum result. + * + * \returns         \c 0 on success, or #MBEDTLS_ERR_MD_BAD_INPUT_DATA if + *                  parameter verification fails. + */ +int mbedtls_md_hmac_finish( mbedtls_md_context_t *ctx, unsigned char *output); + +/** + * \brief           This function prepares to authenticate a new message with + *                  the same key as the previous HMAC operation. + * + *                  You may call this function after mbedtls_md_hmac_finish(). + *                  Afterwards call mbedtls_md_hmac_update() to pass the new + *                  input. + * + * \param ctx       The message digest context containing an embedded HMAC + *                  context. + * + * \returns         \c 0 on success, or #MBEDTLS_ERR_MD_BAD_INPUT_DATA if + *                  parameter verification fails. + */ +int mbedtls_md_hmac_reset( mbedtls_md_context_t *ctx ); + +/** + * \brief          This function calculates the full generic HMAC + *                 on the input buffer with the provided key. + * + *                 The function allocates the context, performs the + *                 calculation, and frees the context. + * + *                 The HMAC result is calculated as + *                 output = generic HMAC(hmac key, input buffer). + * + * \param md_info  The information structure of the message-digest algorithm + *                 to use. + * \param key      The HMAC secret key. + * \param keylen   The length of the HMAC secret key in Bytes. + * \param input    The buffer holding the input data. + * \param ilen     The length of the input data. + * \param output   The generic HMAC result. + * + * \returns        \c 0 on success, or #MBEDTLS_ERR_MD_BAD_INPUT_DATA if + *                 parameter verification fails. + */ +int mbedtls_md_hmac( const mbedtls_md_info_t *md_info, const unsigned char *key, size_t keylen, +                const unsigned char *input, size_t ilen, +                unsigned char *output ); + +/* Internal use */ +int mbedtls_md_process( mbedtls_md_context_t *ctx, const unsigned char *data ); + +#ifdef __cplusplus +} +#endif + +#endif /* MBEDTLS_MD_H */ diff --git a/thirdparty/mbedtls/include/mbedtls/md2.h b/thirdparty/mbedtls/include/mbedtls/md2.h new file mode 100644 index 0000000000..2ff3f171a3 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/md2.h @@ -0,0 +1,333 @@ +/** + * \file md2.h + * + * \brief MD2 message digest algorithm (hash function) + * + * \warning MD2 is considered a weak message digest and its use constitutes a + *          security risk. We recommend considering stronger message digests + *          instead. + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + * + */ +#ifndef MBEDTLS_MD2_H +#define MBEDTLS_MD2_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> + +#define MBEDTLS_ERR_MD2_HW_ACCEL_FAILED                   -0x002B  /**< MD2 hardware accelerator failed */ + +#if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \ +    !defined(inline) && !defined(__cplusplus) +#define inline __inline +#endif + +#if !defined(MBEDTLS_MD2_ALT) +// Regular implementation +// + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          MD2 context structure + * + * \warning        MD2 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +typedef struct +{ +    unsigned char cksum[16];    /*!< checksum of the data block */ +    unsigned char state[48];    /*!< intermediate digest state  */ +    unsigned char buffer[16];   /*!< data block being processed */ +    size_t left;                /*!< amount of data in buffer   */ +} +mbedtls_md2_context; + +/** + * \brief          Initialize MD2 context + * + * \param ctx      MD2 context to be initialized + * + * \warning        MD2 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +void mbedtls_md2_init( mbedtls_md2_context *ctx ); + +/** + * \brief          Clear MD2 context + * + * \param ctx      MD2 context to be cleared + * + * \warning        MD2 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +void mbedtls_md2_free( mbedtls_md2_context *ctx ); + +/** + * \brief          Clone (the state of) an MD2 context + * + * \param dst      The destination context + * \param src      The context to be cloned + * + * \warning        MD2 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +void mbedtls_md2_clone( mbedtls_md2_context *dst, +                        const mbedtls_md2_context *src ); + +/** + * \brief          MD2 context setup + * + * \param ctx      context to be initialized + * + * \return         0 if successful + * + * \warning        MD2 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_md2_starts_ret( mbedtls_md2_context *ctx ); + +/** + * \brief          MD2 process buffer + * + * \param ctx      MD2 context + * \param input    buffer holding the data + * \param ilen     length of the input data + * + * \return         0 if successful + * + * \warning        MD2 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_md2_update_ret( mbedtls_md2_context *ctx, +                            const unsigned char *input, +                            size_t ilen ); + +/** + * \brief          MD2 final digest + * + * \param ctx      MD2 context + * \param output   MD2 checksum result + * + * \return         0 if successful + * + * \warning        MD2 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_md2_finish_ret( mbedtls_md2_context *ctx, +                            unsigned char output[16] ); + +/** + * \brief          MD2 process data block (internal use only) + * + * \param ctx      MD2 context + * + * \return         0 if successful + * + * \warning        MD2 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_internal_md2_process( mbedtls_md2_context *ctx ); + +#if !defined(MBEDTLS_DEPRECATED_REMOVED) +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED      __attribute__((deprecated)) +#else +#define MBEDTLS_DEPRECATED +#endif +/** + * \brief          MD2 context setup + * + * \deprecated     Superseded by mbedtls_md2_starts_ret() in 2.7.0 + * + * \param ctx      context to be initialized + * + * \warning        MD2 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_md2_starts( +                                                    mbedtls_md2_context *ctx ) +{ +    mbedtls_md2_starts_ret( ctx ); +} + +/** + * \brief          MD2 process buffer + * + * \deprecated     Superseded by mbedtls_md2_update_ret() in 2.7.0 + * + * \param ctx      MD2 context + * \param input    buffer holding the data + * \param ilen     length of the input data + * + * \warning        MD2 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_md2_update( +                                                mbedtls_md2_context *ctx, +                                                const unsigned char *input, +                                                size_t ilen ) +{ +    mbedtls_md2_update_ret( ctx, input, ilen ); +} + +/** + * \brief          MD2 final digest + * + * \deprecated     Superseded by mbedtls_md2_finish_ret() in 2.7.0 + * + * \param ctx      MD2 context + * \param output   MD2 checksum result + * + * \warning        MD2 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_md2_finish( +                                                    mbedtls_md2_context *ctx, +                                                    unsigned char output[16] ) +{ +    mbedtls_md2_finish_ret( ctx, output ); +} + +/** + * \brief          MD2 process data block (internal use only) + * + * \deprecated     Superseded by mbedtls_internal_md2_process() in 2.7.0 + * + * \param ctx      MD2 context + * + * \warning        MD2 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_md2_process( +                                                    mbedtls_md2_context *ctx ) +{ +    mbedtls_internal_md2_process( ctx ); +} + +#undef MBEDTLS_DEPRECATED +#endif /* !MBEDTLS_DEPRECATED_REMOVED */ + +#ifdef __cplusplus +} +#endif + +#else  /* MBEDTLS_MD2_ALT */ +#include "md2_alt.h" +#endif /* MBEDTLS_MD2_ALT */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          Output = MD2( input buffer ) + * + * \param input    buffer holding the data + * \param ilen     length of the input data + * \param output   MD2 checksum result + * + * \warning        MD2 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_md2_ret( const unsigned char *input, +                     size_t ilen, +                     unsigned char output[16] ); + +#if !defined(MBEDTLS_DEPRECATED_REMOVED) +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED      __attribute__((deprecated)) +#else +#define MBEDTLS_DEPRECATED +#endif +/** + * \brief          Output = MD2( input buffer ) + * + * \deprecated     Superseded by mbedtls_md2_ret() in 2.7.0 + * + * \param input    buffer holding the data + * \param ilen     length of the input data + * \param output   MD2 checksum result + * + * \warning        MD2 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_md2( const unsigned char *input, +                                                   size_t ilen, +                                                   unsigned char output[16] ) +{ +    mbedtls_md2_ret( input, ilen, output ); +} + +#undef MBEDTLS_DEPRECATED +#endif /* !MBEDTLS_DEPRECATED_REMOVED */ + +/** + * \brief          Checkup routine + * + * \return         0 if successful, or 1 if the test failed + * + * \warning        MD2 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_md2_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + +#endif /* mbedtls_md2.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/md4.h b/thirdparty/mbedtls/include/mbedtls/md4.h new file mode 100644 index 0000000000..a2ab57f078 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/md4.h @@ -0,0 +1,338 @@ +/** + * \file md4.h + * + * \brief MD4 message digest algorithm (hash function) + * + * \warning MD4 is considered a weak message digest and its use constitutes a + *          security risk. We recommend considering stronger message digests + *          instead. + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + * + */ +#ifndef MBEDTLS_MD4_H +#define MBEDTLS_MD4_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> +#include <stdint.h> + +#define MBEDTLS_ERR_MD4_HW_ACCEL_FAILED                   -0x002D  /**< MD4 hardware accelerator failed */ + +#if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \ +    !defined(inline) && !defined(__cplusplus) +#define inline __inline +#endif + +#if !defined(MBEDTLS_MD4_ALT) +// Regular implementation +// + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          MD4 context structure + * + * \warning        MD4 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +typedef struct +{ +    uint32_t total[2];          /*!< number of bytes processed  */ +    uint32_t state[4];          /*!< intermediate digest state  */ +    unsigned char buffer[64];   /*!< data block being processed */ +} +mbedtls_md4_context; + +/** + * \brief          Initialize MD4 context + * + * \param ctx      MD4 context to be initialized + * + * \warning        MD4 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +void mbedtls_md4_init( mbedtls_md4_context *ctx ); + +/** + * \brief          Clear MD4 context + * + * \param ctx      MD4 context to be cleared + * + * \warning        MD4 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +void mbedtls_md4_free( mbedtls_md4_context *ctx ); + +/** + * \brief          Clone (the state of) an MD4 context + * + * \param dst      The destination context + * \param src      The context to be cloned + * + * \warning        MD4 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +void mbedtls_md4_clone( mbedtls_md4_context *dst, +                        const mbedtls_md4_context *src ); + +/** + * \brief          MD4 context setup + * + * \param ctx      context to be initialized + * + * \return         0 if successful + * + * \warning        MD4 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + */ +int mbedtls_md4_starts_ret( mbedtls_md4_context *ctx ); + +/** + * \brief          MD4 process buffer + * + * \param ctx      MD4 context + * \param input    buffer holding the data + * \param ilen     length of the input data + * + * \return         0 if successful + * + * \warning        MD4 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_md4_update_ret( mbedtls_md4_context *ctx, +                            const unsigned char *input, +                            size_t ilen ); + +/** + * \brief          MD4 final digest + * + * \param ctx      MD4 context + * \param output   MD4 checksum result + * + * \return         0 if successful + * + * \warning        MD4 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_md4_finish_ret( mbedtls_md4_context *ctx, +                            unsigned char output[16] ); + +/** + * \brief          MD4 process data block (internal use only) + * + * \param ctx      MD4 context + * \param data     buffer holding one block of data + * + * \return         0 if successful + * + * \warning        MD4 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_internal_md4_process( mbedtls_md4_context *ctx, +                                  const unsigned char data[64] ); + +#if !defined(MBEDTLS_DEPRECATED_REMOVED) +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED      __attribute__((deprecated)) +#else +#define MBEDTLS_DEPRECATED +#endif +/** + * \brief          MD4 context setup + * + * \deprecated     Superseded by mbedtls_md4_starts_ret() in 2.7.0 + * + * \param ctx      context to be initialized + * + * \warning        MD4 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_md4_starts( +                                                    mbedtls_md4_context *ctx ) +{ +    mbedtls_md4_starts_ret( ctx ); +} + +/** + * \brief          MD4 process buffer + * + * \deprecated     Superseded by mbedtls_md4_update_ret() in 2.7.0 + * + * \param ctx      MD4 context + * \param input    buffer holding the data + * \param ilen     length of the input data + * + * \warning        MD4 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_md4_update( +                                                    mbedtls_md4_context *ctx, +                                                    const unsigned char *input, +                                                    size_t ilen ) +{ +    mbedtls_md4_update_ret( ctx, input, ilen ); +} + +/** + * \brief          MD4 final digest + * + * \deprecated     Superseded by mbedtls_md4_finish_ret() in 2.7.0 + * + * \param ctx      MD4 context + * \param output   MD4 checksum result + * + * \warning        MD4 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_md4_finish( +                                                    mbedtls_md4_context *ctx, +                                                    unsigned char output[16] ) +{ +    mbedtls_md4_finish_ret( ctx, output ); +} + +/** + * \brief          MD4 process data block (internal use only) + * + * \deprecated     Superseded by mbedtls_internal_md4_process() in 2.7.0 + * + * \param ctx      MD4 context + * \param data     buffer holding one block of data + * + * \warning        MD4 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_md4_process( +                                                mbedtls_md4_context *ctx, +                                                const unsigned char data[64] ) +{ +    mbedtls_internal_md4_process( ctx, data ); +} + +#undef MBEDTLS_DEPRECATED +#endif /* !MBEDTLS_DEPRECATED_REMOVED */ + +#ifdef __cplusplus +} +#endif + +#else  /* MBEDTLS_MD4_ALT */ +#include "md4_alt.h" +#endif /* MBEDTLS_MD4_ALT */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          Output = MD4( input buffer ) + * + * \param input    buffer holding the data + * \param ilen     length of the input data + * \param output   MD4 checksum result + * + * \return         0 if successful + * + * \warning        MD4 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_md4_ret( const unsigned char *input, +                     size_t ilen, +                     unsigned char output[16] ); + +#if !defined(MBEDTLS_DEPRECATED_REMOVED) +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED      __attribute__((deprecated)) +#else +#define MBEDTLS_DEPRECATED +#endif +/** + * \brief          Output = MD4( input buffer ) + * + * \deprecated     Superseded by mbedtls_md4_ret() in 2.7.0 + * + * \param input    buffer holding the data + * \param ilen     length of the input data + * \param output   MD4 checksum result + * + * \warning        MD4 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_md4( const unsigned char *input, +                                                   size_t ilen, +                                                   unsigned char output[16] ) +{ +    mbedtls_md4_ret( input, ilen, output ); +} + +#undef MBEDTLS_DEPRECATED +#endif /* !MBEDTLS_DEPRECATED_REMOVED */ + +/** + * \brief          Checkup routine + * + * \return         0 if successful, or 1 if the test failed + * + * \warning        MD4 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_md4_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + +#endif /* mbedtls_md4.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/md5.h b/thirdparty/mbedtls/include/mbedtls/md5.h new file mode 100644 index 0000000000..d49391f811 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/md5.h @@ -0,0 +1,338 @@ +/** + * \file md5.h + * + * \brief MD5 message digest algorithm (hash function) + * + * \warning   MD5 is considered a weak message digest and its use constitutes a + *            security risk. We recommend considering stronger message + *            digests instead. + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_MD5_H +#define MBEDTLS_MD5_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> +#include <stdint.h> + +#define MBEDTLS_ERR_MD5_HW_ACCEL_FAILED                   -0x002F  /**< MD5 hardware accelerator failed */ + +#if !defined(MBEDTLS_MD5_ALT) +// Regular implementation +// + +#if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \ +    !defined(inline) && !defined(__cplusplus) +#define inline __inline +#endif + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          MD5 context structure + * + * \warning        MD5 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +typedef struct +{ +    uint32_t total[2];          /*!< number of bytes processed  */ +    uint32_t state[4];          /*!< intermediate digest state  */ +    unsigned char buffer[64];   /*!< data block being processed */ +} +mbedtls_md5_context; + +/** + * \brief          Initialize MD5 context + * + * \param ctx      MD5 context to be initialized + * + * \warning        MD5 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +void mbedtls_md5_init( mbedtls_md5_context *ctx ); + +/** + * \brief          Clear MD5 context + * + * \param ctx      MD5 context to be cleared + * + * \warning        MD5 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +void mbedtls_md5_free( mbedtls_md5_context *ctx ); + +/** + * \brief          Clone (the state of) an MD5 context + * + * \param dst      The destination context + * \param src      The context to be cloned + * + * \warning        MD5 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +void mbedtls_md5_clone( mbedtls_md5_context *dst, +                        const mbedtls_md5_context *src ); + +/** + * \brief          MD5 context setup + * + * \param ctx      context to be initialized + * + * \return         0 if successful + * + * \warning        MD5 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_md5_starts_ret( mbedtls_md5_context *ctx ); + +/** + * \brief          MD5 process buffer + * + * \param ctx      MD5 context + * \param input    buffer holding the data + * \param ilen     length of the input data + * + * \return         0 if successful + * + * \warning        MD5 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_md5_update_ret( mbedtls_md5_context *ctx, +                            const unsigned char *input, +                            size_t ilen ); + +/** + * \brief          MD5 final digest + * + * \param ctx      MD5 context + * \param output   MD5 checksum result + * + * \return         0 if successful + * + * \warning        MD5 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_md5_finish_ret( mbedtls_md5_context *ctx, +                            unsigned char output[16] ); + +/** + * \brief          MD5 process data block (internal use only) + * + * \param ctx      MD5 context + * \param data     buffer holding one block of data + * + * \return         0 if successful + * + * \warning        MD5 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_internal_md5_process( mbedtls_md5_context *ctx, +                                  const unsigned char data[64] ); + +#if !defined(MBEDTLS_DEPRECATED_REMOVED) +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED      __attribute__((deprecated)) +#else +#define MBEDTLS_DEPRECATED +#endif +/** + * \brief          MD5 context setup + * + * \deprecated     Superseded by mbedtls_md5_starts_ret() in 2.7.0 + * + * \param ctx      context to be initialized + * + * \warning        MD5 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_md5_starts( +                                                    mbedtls_md5_context *ctx ) +{ +    mbedtls_md5_starts_ret( ctx ); +} + +/** + * \brief          MD5 process buffer + * + * \deprecated     Superseded by mbedtls_md5_update_ret() in 2.7.0 + * + * \param ctx      MD5 context + * \param input    buffer holding the data + * \param ilen     length of the input data + * + * \warning        MD5 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_md5_update( +                                                    mbedtls_md5_context *ctx, +                                                    const unsigned char *input, +                                                    size_t ilen ) +{ +    mbedtls_md5_update_ret( ctx, input, ilen ); +} + +/** + * \brief          MD5 final digest + * + * \deprecated     Superseded by mbedtls_md5_finish_ret() in 2.7.0 + * + * \param ctx      MD5 context + * \param output   MD5 checksum result + * + * \warning        MD5 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_md5_finish( +                                                    mbedtls_md5_context *ctx, +                                                    unsigned char output[16] ) +{ +    mbedtls_md5_finish_ret( ctx, output ); +} + +/** + * \brief          MD5 process data block (internal use only) + * + * \deprecated     Superseded by mbedtls_internal_md5_process() in 2.7.0 + * + * \param ctx      MD5 context + * \param data     buffer holding one block of data + * + * \warning        MD5 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_md5_process( +                                                mbedtls_md5_context *ctx, +                                                const unsigned char data[64] ) +{ +    mbedtls_internal_md5_process( ctx, data ); +} + +#undef MBEDTLS_DEPRECATED +#endif /* !MBEDTLS_DEPRECATED_REMOVED */ + +#ifdef __cplusplus +} +#endif + +#else  /* MBEDTLS_MD5_ALT */ +#include "md5_alt.h" +#endif /* MBEDTLS_MD5_ALT */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          Output = MD5( input buffer ) + * + * \param input    buffer holding the data + * \param ilen     length of the input data + * \param output   MD5 checksum result + * + * \return         0 if successful + * + * \warning        MD5 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_md5_ret( const unsigned char *input, +                     size_t ilen, +                     unsigned char output[16] ); + +#if !defined(MBEDTLS_DEPRECATED_REMOVED) +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED      __attribute__((deprecated)) +#else +#define MBEDTLS_DEPRECATED +#endif +/** + * \brief          Output = MD5( input buffer ) + * + * \deprecated     Superseded by mbedtls_md5_ret() in 2.7.0 + * + * \param input    buffer holding the data + * \param ilen     length of the input data + * \param output   MD5 checksum result + * + * \warning        MD5 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_md5( const unsigned char *input, +                                                   size_t ilen, +                                                   unsigned char output[16] ) +{ +    mbedtls_md5_ret( input, ilen, output ); +} + +#undef MBEDTLS_DEPRECATED +#endif /* !MBEDTLS_DEPRECATED_REMOVED */ + +/** + * \brief          Checkup routine + * + * \return         0 if successful, or 1 if the test failed + * + * \warning        MD5 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_md5_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + +#endif /* mbedtls_md5.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/md_internal.h b/thirdparty/mbedtls/include/mbedtls/md_internal.h new file mode 100644 index 0000000000..04de482918 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/md_internal.h @@ -0,0 +1,115 @@ +/** + * \file md_internal.h + * + * \brief Message digest wrappers. + * + * \warning This in an internal header. Do not include directly. + * + * \author Adriaan de Jong <dejong@fox-it.com> + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_MD_WRAP_H +#define MBEDTLS_MD_WRAP_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include "md.h" + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * Message digest information. + * Allows message digest functions to be called in a generic way. + */ +struct mbedtls_md_info_t +{ +    /** Digest identifier */ +    mbedtls_md_type_t type; + +    /** Name of the message digest */ +    const char * name; + +    /** Output length of the digest function in bytes */ +    int size; + +    /** Block length of the digest function in bytes */ +    int block_size; + +    /** Digest initialisation function */ +    int (*starts_func)( void *ctx ); + +    /** Digest update function */ +    int (*update_func)( void *ctx, const unsigned char *input, size_t ilen ); + +    /** Digest finalisation function */ +    int (*finish_func)( void *ctx, unsigned char *output ); + +    /** Generic digest function */ +    int (*digest_func)( const unsigned char *input, size_t ilen, +                        unsigned char *output ); + +    /** Allocate a new context */ +    void * (*ctx_alloc_func)( void ); + +    /** Free the given context */ +    void (*ctx_free_func)( void *ctx ); + +    /** Clone state from a context */ +    void (*clone_func)( void *dst, const void *src ); + +    /** Internal use only */ +    int (*process_func)( void *ctx, const unsigned char *input ); +}; + +#if defined(MBEDTLS_MD2_C) +extern const mbedtls_md_info_t mbedtls_md2_info; +#endif +#if defined(MBEDTLS_MD4_C) +extern const mbedtls_md_info_t mbedtls_md4_info; +#endif +#if defined(MBEDTLS_MD5_C) +extern const mbedtls_md_info_t mbedtls_md5_info; +#endif +#if defined(MBEDTLS_RIPEMD160_C) +extern const mbedtls_md_info_t mbedtls_ripemd160_info; +#endif +#if defined(MBEDTLS_SHA1_C) +extern const mbedtls_md_info_t mbedtls_sha1_info; +#endif +#if defined(MBEDTLS_SHA256_C) +extern const mbedtls_md_info_t mbedtls_sha224_info; +extern const mbedtls_md_info_t mbedtls_sha256_info; +#endif +#if defined(MBEDTLS_SHA512_C) +extern const mbedtls_md_info_t mbedtls_sha384_info; +extern const mbedtls_md_info_t mbedtls_sha512_info; +#endif + +#ifdef __cplusplus +} +#endif + +#endif /* MBEDTLS_MD_WRAP_H */ diff --git a/thirdparty/mbedtls/include/mbedtls/memory_buffer_alloc.h b/thirdparty/mbedtls/include/mbedtls/memory_buffer_alloc.h new file mode 100644 index 0000000000..705f9a6369 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/memory_buffer_alloc.h @@ -0,0 +1,151 @@ +/** + * \file memory_buffer_alloc.h + * + * \brief Buffer-based memory allocator + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_MEMORY_BUFFER_ALLOC_H +#define MBEDTLS_MEMORY_BUFFER_ALLOC_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> + +/** + * \name SECTION: Module settings + * + * The configuration options you can set for this module are in this section. + * Either change them in config.h or define them on the compiler command line. + * \{ + */ + +#if !defined(MBEDTLS_MEMORY_ALIGN_MULTIPLE) +#define MBEDTLS_MEMORY_ALIGN_MULTIPLE       4 /**< Align on multiples of this value */ +#endif + +/* \} name SECTION: Module settings */ + +#define MBEDTLS_MEMORY_VERIFY_NONE         0 +#define MBEDTLS_MEMORY_VERIFY_ALLOC        (1 << 0) +#define MBEDTLS_MEMORY_VERIFY_FREE         (1 << 1) +#define MBEDTLS_MEMORY_VERIFY_ALWAYS       (MBEDTLS_MEMORY_VERIFY_ALLOC | MBEDTLS_MEMORY_VERIFY_FREE) + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief   Initialize use of stack-based memory allocator. + *          The stack-based allocator does memory management inside the + *          presented buffer and does not call calloc() and free(). + *          It sets the global mbedtls_calloc() and mbedtls_free() pointers + *          to its own functions. + *          (Provided mbedtls_calloc() and mbedtls_free() are thread-safe if + *           MBEDTLS_THREADING_C is defined) + * + * \note    This code is not optimized and provides a straight-forward + *          implementation of a stack-based memory allocator. + * + * \param buf   buffer to use as heap + * \param len   size of the buffer + */ +void mbedtls_memory_buffer_alloc_init( unsigned char *buf, size_t len ); + +/** + * \brief   Free the mutex for thread-safety and clear remaining memory + */ +void mbedtls_memory_buffer_alloc_free( void ); + +/** + * \brief   Determine when the allocator should automatically verify the state + *          of the entire chain of headers / meta-data. + *          (Default: MBEDTLS_MEMORY_VERIFY_NONE) + * + * \param verify    One of MBEDTLS_MEMORY_VERIFY_NONE, MBEDTLS_MEMORY_VERIFY_ALLOC, + *                  MBEDTLS_MEMORY_VERIFY_FREE or MBEDTLS_MEMORY_VERIFY_ALWAYS + */ +void mbedtls_memory_buffer_set_verify( int verify ); + +#if defined(MBEDTLS_MEMORY_DEBUG) +/** + * \brief   Print out the status of the allocated memory (primarily for use + *          after a program should have de-allocated all memory) + *          Prints out a list of 'still allocated' blocks and their stack + *          trace if MBEDTLS_MEMORY_BACKTRACE is defined. + */ +void mbedtls_memory_buffer_alloc_status( void ); + +/** + * \brief   Get the peak heap usage so far + * + * \param max_used      Peak number of bytes in use or committed. This + *                      includes bytes in allocated blocks too small to split + *                      into smaller blocks but larger than the requested size. + * \param max_blocks    Peak number of blocks in use, including free and used + */ +void mbedtls_memory_buffer_alloc_max_get( size_t *max_used, size_t *max_blocks ); + +/** + * \brief   Reset peak statistics + */ +void mbedtls_memory_buffer_alloc_max_reset( void ); + +/** + * \brief   Get the current heap usage + * + * \param cur_used      Current number of bytes in use or committed. This + *                      includes bytes in allocated blocks too small to split + *                      into smaller blocks but larger than the requested size. + * \param cur_blocks    Current number of blocks in use, including free and used + */ +void mbedtls_memory_buffer_alloc_cur_get( size_t *cur_used, size_t *cur_blocks ); +#endif /* MBEDTLS_MEMORY_DEBUG */ + +/** + * \brief   Verifies that all headers in the memory buffer are correct + *          and contain sane values. Helps debug buffer-overflow errors. + * + *          Prints out first failure if MBEDTLS_MEMORY_DEBUG is defined. + *          Prints out full header information if MBEDTLS_MEMORY_DEBUG + *          is defined. (Includes stack trace information for each block if + *          MBEDTLS_MEMORY_BACKTRACE is defined as well). + * + * \return             0 if verified, 1 otherwise + */ +int mbedtls_memory_buffer_alloc_verify( void ); + +#if defined(MBEDTLS_SELF_TEST) +/** + * \brief          Checkup routine + * + * \return         0 if successful, or 1 if a test failed + */ +int mbedtls_memory_buffer_alloc_self_test( int verbose ); +#endif + +#ifdef __cplusplus +} +#endif + +#endif /* memory_buffer_alloc.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/net.h b/thirdparty/mbedtls/include/mbedtls/net.h new file mode 100644 index 0000000000..28ae8217c0 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/net.h @@ -0,0 +1,32 @@ +/** + * \file net.h + * + * \brief Deprecated header file that includes mbedtls/net_sockets.h + * + * \deprecated Superseded by mbedtls/net_sockets.h + */ +/* + *  Copyright (C) 2006-2016, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ + +#if !defined(MBEDTLS_DEPRECATED_REMOVED) +#include "mbedtls/net_sockets.h" +#if defined(MBEDTLS_DEPRECATED_WARNING) +#warning "Deprecated header file: Superseded by mbedtls/net_sockets.h" +#endif /* MBEDTLS_DEPRECATED_WARNING */ +#endif /* !MBEDTLS_DEPRECATED_REMOVED */ diff --git a/thirdparty/mbedtls/include/mbedtls/net_sockets.h b/thirdparty/mbedtls/include/mbedtls/net_sockets.h new file mode 100644 index 0000000000..54e612cc5e --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/net_sockets.h @@ -0,0 +1,226 @@ +/** + * \file net_sockets.h + * + * \brief Network communication functions + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_NET_SOCKETS_H +#define MBEDTLS_NET_SOCKETS_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include "ssl.h" + +#include <stddef.h> +#include <stdint.h> + +#define MBEDTLS_ERR_NET_SOCKET_FAILED                     -0x0042  /**< Failed to open a socket. */ +#define MBEDTLS_ERR_NET_CONNECT_FAILED                    -0x0044  /**< The connection to the given server / port failed. */ +#define MBEDTLS_ERR_NET_BIND_FAILED                       -0x0046  /**< Binding of the socket failed. */ +#define MBEDTLS_ERR_NET_LISTEN_FAILED                     -0x0048  /**< Could not listen on the socket. */ +#define MBEDTLS_ERR_NET_ACCEPT_FAILED                     -0x004A  /**< Could not accept the incoming connection. */ +#define MBEDTLS_ERR_NET_RECV_FAILED                       -0x004C  /**< Reading information from the socket failed. */ +#define MBEDTLS_ERR_NET_SEND_FAILED                       -0x004E  /**< Sending information through the socket failed. */ +#define MBEDTLS_ERR_NET_CONN_RESET                        -0x0050  /**< Connection was reset by peer. */ +#define MBEDTLS_ERR_NET_UNKNOWN_HOST                      -0x0052  /**< Failed to get an IP address for the given hostname. */ +#define MBEDTLS_ERR_NET_BUFFER_TOO_SMALL                  -0x0043  /**< Buffer is too small to hold the data. */ +#define MBEDTLS_ERR_NET_INVALID_CONTEXT                   -0x0045  /**< The context is invalid, eg because it was free()ed. */ + +#define MBEDTLS_NET_LISTEN_BACKLOG         10 /**< The backlog that listen() should use. */ + +#define MBEDTLS_NET_PROTO_TCP 0 /**< The TCP transport protocol */ +#define MBEDTLS_NET_PROTO_UDP 1 /**< The UDP transport protocol */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * Wrapper type for sockets. + * + * Currently backed by just a file descriptor, but might be more in the future + * (eg two file descriptors for combined IPv4 + IPv6 support, or additional + * structures for hand-made UDP demultiplexing). + */ +typedef struct +{ +    int fd;             /**< The underlying file descriptor                 */ +} +mbedtls_net_context; + +/** + * \brief          Initialize a context + *                 Just makes the context ready to be used or freed safely. + * + * \param ctx      Context to initialize + */ +void mbedtls_net_init( mbedtls_net_context *ctx ); + +/** + * \brief          Initiate a connection with host:port in the given protocol + * + * \param ctx      Socket to use + * \param host     Host to connect to + * \param port     Port to connect to + * \param proto    Protocol: MBEDTLS_NET_PROTO_TCP or MBEDTLS_NET_PROTO_UDP + * + * \return         0 if successful, or one of: + *                      MBEDTLS_ERR_NET_SOCKET_FAILED, + *                      MBEDTLS_ERR_NET_UNKNOWN_HOST, + *                      MBEDTLS_ERR_NET_CONNECT_FAILED + * + * \note           Sets the socket in connected mode even with UDP. + */ +int mbedtls_net_connect( mbedtls_net_context *ctx, const char *host, const char *port, int proto ); + +/** + * \brief          Create a receiving socket on bind_ip:port in the chosen + *                 protocol. If bind_ip == NULL, all interfaces are bound. + * + * \param ctx      Socket to use + * \param bind_ip  IP to bind to, can be NULL + * \param port     Port number to use + * \param proto    Protocol: MBEDTLS_NET_PROTO_TCP or MBEDTLS_NET_PROTO_UDP + * + * \return         0 if successful, or one of: + *                      MBEDTLS_ERR_NET_SOCKET_FAILED, + *                      MBEDTLS_ERR_NET_BIND_FAILED, + *                      MBEDTLS_ERR_NET_LISTEN_FAILED + * + * \note           Regardless of the protocol, opens the sockets and binds it. + *                 In addition, make the socket listening if protocol is TCP. + */ +int mbedtls_net_bind( mbedtls_net_context *ctx, const char *bind_ip, const char *port, int proto ); + +/** + * \brief           Accept a connection from a remote client + * + * \param bind_ctx  Relevant socket + * \param client_ctx Will contain the connected client socket + * \param client_ip Will contain the client IP address + * \param buf_size  Size of the client_ip buffer + * \param ip_len    Will receive the size of the client IP written + * + * \return          0 if successful, or + *                  MBEDTLS_ERR_NET_ACCEPT_FAILED, or + *                  MBEDTLS_ERR_NET_BUFFER_TOO_SMALL if buf_size is too small, + *                  MBEDTLS_ERR_SSL_WANT_READ if bind_fd was set to + *                  non-blocking and accept() would block. + */ +int mbedtls_net_accept( mbedtls_net_context *bind_ctx, +                        mbedtls_net_context *client_ctx, +                        void *client_ip, size_t buf_size, size_t *ip_len ); + +/** + * \brief          Set the socket blocking + * + * \param ctx      Socket to set + * + * \return         0 if successful, or a non-zero error code + */ +int mbedtls_net_set_block( mbedtls_net_context *ctx ); + +/** + * \brief          Set the socket non-blocking + * + * \param ctx      Socket to set + * + * \return         0 if successful, or a non-zero error code + */ +int mbedtls_net_set_nonblock( mbedtls_net_context *ctx ); + +/** + * \brief          Portable usleep helper + * + * \param usec     Amount of microseconds to sleep + * + * \note           Real amount of time slept will not be less than + *                 select()'s timeout granularity (typically, 10ms). + */ +void mbedtls_net_usleep( unsigned long usec ); + +/** + * \brief          Read at most 'len' characters. If no error occurs, + *                 the actual amount read is returned. + * + * \param ctx      Socket + * \param buf      The buffer to write to + * \param len      Maximum length of the buffer + * + * \return         the number of bytes received, + *                 or a non-zero error code; with a non-blocking socket, + *                 MBEDTLS_ERR_SSL_WANT_READ indicates read() would block. + */ +int mbedtls_net_recv( void *ctx, unsigned char *buf, size_t len ); + +/** + * \brief          Write at most 'len' characters. If no error occurs, + *                 the actual amount read is returned. + * + * \param ctx      Socket + * \param buf      The buffer to read from + * \param len      The length of the buffer + * + * \return         the number of bytes sent, + *                 or a non-zero error code; with a non-blocking socket, + *                 MBEDTLS_ERR_SSL_WANT_WRITE indicates write() would block. + */ +int mbedtls_net_send( void *ctx, const unsigned char *buf, size_t len ); + +/** + * \brief          Read at most 'len' characters, blocking for at most + *                 'timeout' seconds. If no error occurs, the actual amount + *                 read is returned. + * + * \param ctx      Socket + * \param buf      The buffer to write to + * \param len      Maximum length of the buffer + * \param timeout  Maximum number of milliseconds to wait for data + *                 0 means no timeout (wait forever) + * + * \return         the number of bytes received, + *                 or a non-zero error code: + *                 MBEDTLS_ERR_SSL_TIMEOUT if the operation timed out, + *                 MBEDTLS_ERR_SSL_WANT_READ if interrupted by a signal. + * + * \note           This function will block (until data becomes available or + *                 timeout is reached) even if the socket is set to + *                 non-blocking. Handling timeouts with non-blocking reads + *                 requires a different strategy. + */ +int mbedtls_net_recv_timeout( void *ctx, unsigned char *buf, size_t len, +                      uint32_t timeout ); + +/** + * \brief          Gracefully shutdown the connection and free associated data + * + * \param ctx      The context to free + */ +void mbedtls_net_free( mbedtls_net_context *ctx ); + +#ifdef __cplusplus +} +#endif + +#endif /* net_sockets.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/oid.h b/thirdparty/mbedtls/include/mbedtls/oid.h new file mode 100644 index 0000000000..bf2ef5ece4 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/oid.h @@ -0,0 +1,571 @@ +/** + * \file oid.h + * + * \brief Object Identifier (OID) database + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_OID_H +#define MBEDTLS_OID_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include "asn1.h" +#include "pk.h" + +#include <stddef.h> + +#if defined(MBEDTLS_CIPHER_C) +#include "cipher.h" +#endif + +#if defined(MBEDTLS_MD_C) +#include "md.h" +#endif + +#if defined(MBEDTLS_X509_USE_C) || defined(MBEDTLS_X509_CREATE_C) +#include "x509.h" +#endif + +#define MBEDTLS_ERR_OID_NOT_FOUND                         -0x002E  /**< OID is not found. */ +#define MBEDTLS_ERR_OID_BUF_TOO_SMALL                     -0x000B  /**< output buffer is too small */ + +/* + * Top level OID tuples + */ +#define MBEDTLS_OID_ISO_MEMBER_BODIES           "\x2a"          /* {iso(1) member-body(2)} */ +#define MBEDTLS_OID_ISO_IDENTIFIED_ORG          "\x2b"          /* {iso(1) identified-organization(3)} */ +#define MBEDTLS_OID_ISO_CCITT_DS                "\x55"          /* {joint-iso-ccitt(2) ds(5)} */ +#define MBEDTLS_OID_ISO_ITU_COUNTRY             "\x60"          /* {joint-iso-itu-t(2) country(16)} */ + +/* + * ISO Member bodies OID parts + */ +#define MBEDTLS_OID_COUNTRY_US                  "\x86\x48"      /* {us(840)} */ +#define MBEDTLS_OID_ORG_RSA_DATA_SECURITY       "\x86\xf7\x0d"  /* {rsadsi(113549)} */ +#define MBEDTLS_OID_RSA_COMPANY                 MBEDTLS_OID_ISO_MEMBER_BODIES MBEDTLS_OID_COUNTRY_US \ +                                        MBEDTLS_OID_ORG_RSA_DATA_SECURITY /* {iso(1) member-body(2) us(840) rsadsi(113549)} */ +#define MBEDTLS_OID_ORG_ANSI_X9_62              "\xce\x3d" /* ansi-X9-62(10045) */ +#define MBEDTLS_OID_ANSI_X9_62                  MBEDTLS_OID_ISO_MEMBER_BODIES MBEDTLS_OID_COUNTRY_US \ +                                        MBEDTLS_OID_ORG_ANSI_X9_62 + +/* + * ISO Identified organization OID parts + */ +#define MBEDTLS_OID_ORG_DOD                     "\x06"          /* {dod(6)} */ +#define MBEDTLS_OID_ORG_OIW                     "\x0e" +#define MBEDTLS_OID_OIW_SECSIG                  MBEDTLS_OID_ORG_OIW "\x03" +#define MBEDTLS_OID_OIW_SECSIG_ALG              MBEDTLS_OID_OIW_SECSIG "\x02" +#define MBEDTLS_OID_OIW_SECSIG_SHA1             MBEDTLS_OID_OIW_SECSIG_ALG "\x1a" +#define MBEDTLS_OID_ORG_CERTICOM                "\x81\x04"  /* certicom(132) */ +#define MBEDTLS_OID_CERTICOM                    MBEDTLS_OID_ISO_IDENTIFIED_ORG MBEDTLS_OID_ORG_CERTICOM +#define MBEDTLS_OID_ORG_TELETRUST               "\x24" /* teletrust(36) */ +#define MBEDTLS_OID_TELETRUST                   MBEDTLS_OID_ISO_IDENTIFIED_ORG MBEDTLS_OID_ORG_TELETRUST + +/* + * ISO ITU OID parts + */ +#define MBEDTLS_OID_ORGANIZATION                "\x01"          /* {organization(1)} */ +#define MBEDTLS_OID_ISO_ITU_US_ORG              MBEDTLS_OID_ISO_ITU_COUNTRY MBEDTLS_OID_COUNTRY_US MBEDTLS_OID_ORGANIZATION /* {joint-iso-itu-t(2) country(16) us(840) organization(1)} */ + +#define MBEDTLS_OID_ORG_GOV                     "\x65"          /* {gov(101)} */ +#define MBEDTLS_OID_GOV                         MBEDTLS_OID_ISO_ITU_US_ORG MBEDTLS_OID_ORG_GOV /* {joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101)} */ + +#define MBEDTLS_OID_ORG_NETSCAPE                "\x86\xF8\x42"  /* {netscape(113730)} */ +#define MBEDTLS_OID_NETSCAPE                    MBEDTLS_OID_ISO_ITU_US_ORG MBEDTLS_OID_ORG_NETSCAPE /* Netscape OID {joint-iso-itu-t(2) country(16) us(840) organization(1) netscape(113730)} */ + +/* ISO arc for standard certificate and CRL extensions */ +#define MBEDTLS_OID_ID_CE                       MBEDTLS_OID_ISO_CCITT_DS "\x1D" /**< id-ce OBJECT IDENTIFIER  ::=  {joint-iso-ccitt(2) ds(5) 29} */ + +/** + * Private Internet Extensions + * { iso(1) identified-organization(3) dod(6) internet(1) + *                      security(5) mechanisms(5) pkix(7) } + */ +#define MBEDTLS_OID_PKIX                        MBEDTLS_OID_ISO_IDENTIFIED_ORG MBEDTLS_OID_ORG_DOD "\x01\x05\x05\x07" + +/* + * Arc for standard naming attributes + */ +#define MBEDTLS_OID_AT                          MBEDTLS_OID_ISO_CCITT_DS "\x04" /**< id-at OBJECT IDENTIFIER ::= {joint-iso-ccitt(2) ds(5) 4} */ +#define MBEDTLS_OID_AT_CN                       MBEDTLS_OID_AT "\x03" /**< id-at-commonName AttributeType:= {id-at 3} */ +#define MBEDTLS_OID_AT_SUR_NAME                 MBEDTLS_OID_AT "\x04" /**< id-at-surName AttributeType:= {id-at 4} */ +#define MBEDTLS_OID_AT_SERIAL_NUMBER            MBEDTLS_OID_AT "\x05" /**< id-at-serialNumber AttributeType:= {id-at 5} */ +#define MBEDTLS_OID_AT_COUNTRY                  MBEDTLS_OID_AT "\x06" /**< id-at-countryName AttributeType:= {id-at 6} */ +#define MBEDTLS_OID_AT_LOCALITY                 MBEDTLS_OID_AT "\x07" /**< id-at-locality AttributeType:= {id-at 7} */ +#define MBEDTLS_OID_AT_STATE                    MBEDTLS_OID_AT "\x08" /**< id-at-state AttributeType:= {id-at 8} */ +#define MBEDTLS_OID_AT_ORGANIZATION             MBEDTLS_OID_AT "\x0A" /**< id-at-organizationName AttributeType:= {id-at 10} */ +#define MBEDTLS_OID_AT_ORG_UNIT                 MBEDTLS_OID_AT "\x0B" /**< id-at-organizationalUnitName AttributeType:= {id-at 11} */ +#define MBEDTLS_OID_AT_TITLE                    MBEDTLS_OID_AT "\x0C" /**< id-at-title AttributeType:= {id-at 12} */ +#define MBEDTLS_OID_AT_POSTAL_ADDRESS           MBEDTLS_OID_AT "\x10" /**< id-at-postalAddress AttributeType:= {id-at 16} */ +#define MBEDTLS_OID_AT_POSTAL_CODE              MBEDTLS_OID_AT "\x11" /**< id-at-postalCode AttributeType:= {id-at 17} */ +#define MBEDTLS_OID_AT_GIVEN_NAME               MBEDTLS_OID_AT "\x2A" /**< id-at-givenName AttributeType:= {id-at 42} */ +#define MBEDTLS_OID_AT_INITIALS                 MBEDTLS_OID_AT "\x2B" /**< id-at-initials AttributeType:= {id-at 43} */ +#define MBEDTLS_OID_AT_GENERATION_QUALIFIER     MBEDTLS_OID_AT "\x2C" /**< id-at-generationQualifier AttributeType:= {id-at 44} */ +#define MBEDTLS_OID_AT_UNIQUE_IDENTIFIER        MBEDTLS_OID_AT "\x2D" /**< id-at-uniqueIdentifier AttributType:= {id-at 45} */ +#define MBEDTLS_OID_AT_DN_QUALIFIER             MBEDTLS_OID_AT "\x2E" /**< id-at-dnQualifier AttributeType:= {id-at 46} */ +#define MBEDTLS_OID_AT_PSEUDONYM                MBEDTLS_OID_AT "\x41" /**< id-at-pseudonym AttributeType:= {id-at 65} */ + +#define MBEDTLS_OID_DOMAIN_COMPONENT            "\x09\x92\x26\x89\x93\xF2\x2C\x64\x01\x19" /** id-domainComponent AttributeType:= {itu-t(0) data(9) pss(2342) ucl(19200300) pilot(100) pilotAttributeType(1) domainComponent(25)} */ + +/* + * OIDs for standard certificate extensions + */ +#define MBEDTLS_OID_AUTHORITY_KEY_IDENTIFIER    MBEDTLS_OID_ID_CE "\x23" /**< id-ce-authorityKeyIdentifier OBJECT IDENTIFIER ::=  { id-ce 35 } */ +#define MBEDTLS_OID_SUBJECT_KEY_IDENTIFIER      MBEDTLS_OID_ID_CE "\x0E" /**< id-ce-subjectKeyIdentifier OBJECT IDENTIFIER ::=  { id-ce 14 } */ +#define MBEDTLS_OID_KEY_USAGE                   MBEDTLS_OID_ID_CE "\x0F" /**< id-ce-keyUsage OBJECT IDENTIFIER ::=  { id-ce 15 } */ +#define MBEDTLS_OID_CERTIFICATE_POLICIES        MBEDTLS_OID_ID_CE "\x20" /**< id-ce-certificatePolicies OBJECT IDENTIFIER ::=  { id-ce 32 } */ +#define MBEDTLS_OID_POLICY_MAPPINGS             MBEDTLS_OID_ID_CE "\x21" /**< id-ce-policyMappings OBJECT IDENTIFIER ::=  { id-ce 33 } */ +#define MBEDTLS_OID_SUBJECT_ALT_NAME            MBEDTLS_OID_ID_CE "\x11" /**< id-ce-subjectAltName OBJECT IDENTIFIER ::=  { id-ce 17 } */ +#define MBEDTLS_OID_ISSUER_ALT_NAME             MBEDTLS_OID_ID_CE "\x12" /**< id-ce-issuerAltName OBJECT IDENTIFIER ::=  { id-ce 18 } */ +#define MBEDTLS_OID_SUBJECT_DIRECTORY_ATTRS     MBEDTLS_OID_ID_CE "\x09" /**< id-ce-subjectDirectoryAttributes OBJECT IDENTIFIER ::=  { id-ce 9 } */ +#define MBEDTLS_OID_BASIC_CONSTRAINTS           MBEDTLS_OID_ID_CE "\x13" /**< id-ce-basicConstraints OBJECT IDENTIFIER ::=  { id-ce 19 } */ +#define MBEDTLS_OID_NAME_CONSTRAINTS            MBEDTLS_OID_ID_CE "\x1E" /**< id-ce-nameConstraints OBJECT IDENTIFIER ::=  { id-ce 30 } */ +#define MBEDTLS_OID_POLICY_CONSTRAINTS          MBEDTLS_OID_ID_CE "\x24" /**< id-ce-policyConstraints OBJECT IDENTIFIER ::=  { id-ce 36 } */ +#define MBEDTLS_OID_EXTENDED_KEY_USAGE          MBEDTLS_OID_ID_CE "\x25" /**< id-ce-extKeyUsage OBJECT IDENTIFIER ::= { id-ce 37 } */ +#define MBEDTLS_OID_CRL_DISTRIBUTION_POINTS     MBEDTLS_OID_ID_CE "\x1F" /**< id-ce-cRLDistributionPoints OBJECT IDENTIFIER ::=  { id-ce 31 } */ +#define MBEDTLS_OID_INIHIBIT_ANYPOLICY          MBEDTLS_OID_ID_CE "\x36" /**< id-ce-inhibitAnyPolicy OBJECT IDENTIFIER ::=  { id-ce 54 } */ +#define MBEDTLS_OID_FRESHEST_CRL                MBEDTLS_OID_ID_CE "\x2E" /**< id-ce-freshestCRL OBJECT IDENTIFIER ::=  { id-ce 46 } */ + +/* + * Netscape certificate extensions + */ +#define MBEDTLS_OID_NS_CERT                 MBEDTLS_OID_NETSCAPE "\x01" +#define MBEDTLS_OID_NS_CERT_TYPE            MBEDTLS_OID_NS_CERT  "\x01" +#define MBEDTLS_OID_NS_BASE_URL             MBEDTLS_OID_NS_CERT  "\x02" +#define MBEDTLS_OID_NS_REVOCATION_URL       MBEDTLS_OID_NS_CERT  "\x03" +#define MBEDTLS_OID_NS_CA_REVOCATION_URL    MBEDTLS_OID_NS_CERT  "\x04" +#define MBEDTLS_OID_NS_RENEWAL_URL          MBEDTLS_OID_NS_CERT  "\x07" +#define MBEDTLS_OID_NS_CA_POLICY_URL        MBEDTLS_OID_NS_CERT  "\x08" +#define MBEDTLS_OID_NS_SSL_SERVER_NAME      MBEDTLS_OID_NS_CERT  "\x0C" +#define MBEDTLS_OID_NS_COMMENT              MBEDTLS_OID_NS_CERT  "\x0D" +#define MBEDTLS_OID_NS_DATA_TYPE            MBEDTLS_OID_NETSCAPE "\x02" +#define MBEDTLS_OID_NS_CERT_SEQUENCE        MBEDTLS_OID_NS_DATA_TYPE "\x05" + +/* + * OIDs for CRL extensions + */ +#define MBEDTLS_OID_PRIVATE_KEY_USAGE_PERIOD    MBEDTLS_OID_ID_CE "\x10" +#define MBEDTLS_OID_CRL_NUMBER                  MBEDTLS_OID_ID_CE "\x14" /**< id-ce-cRLNumber OBJECT IDENTIFIER ::= { id-ce 20 } */ + +/* + * X.509 v3 Extended key usage OIDs + */ +#define MBEDTLS_OID_ANY_EXTENDED_KEY_USAGE      MBEDTLS_OID_EXTENDED_KEY_USAGE "\x00" /**< anyExtendedKeyUsage OBJECT IDENTIFIER ::= { id-ce-extKeyUsage 0 } */ + +#define MBEDTLS_OID_KP                          MBEDTLS_OID_PKIX "\x03" /**< id-kp OBJECT IDENTIFIER ::= { id-pkix 3 } */ +#define MBEDTLS_OID_SERVER_AUTH                 MBEDTLS_OID_KP "\x01" /**< id-kp-serverAuth OBJECT IDENTIFIER ::= { id-kp 1 } */ +#define MBEDTLS_OID_CLIENT_AUTH                 MBEDTLS_OID_KP "\x02" /**< id-kp-clientAuth OBJECT IDENTIFIER ::= { id-kp 2 } */ +#define MBEDTLS_OID_CODE_SIGNING                MBEDTLS_OID_KP "\x03" /**< id-kp-codeSigning OBJECT IDENTIFIER ::= { id-kp 3 } */ +#define MBEDTLS_OID_EMAIL_PROTECTION            MBEDTLS_OID_KP "\x04" /**< id-kp-emailProtection OBJECT IDENTIFIER ::= { id-kp 4 } */ +#define MBEDTLS_OID_TIME_STAMPING               MBEDTLS_OID_KP "\x08" /**< id-kp-timeStamping OBJECT IDENTIFIER ::= { id-kp 8 } */ +#define MBEDTLS_OID_OCSP_SIGNING                MBEDTLS_OID_KP "\x09" /**< id-kp-OCSPSigning OBJECT IDENTIFIER ::= { id-kp 9 } */ + +/* + * PKCS definition OIDs + */ + +#define MBEDTLS_OID_PKCS                MBEDTLS_OID_RSA_COMPANY "\x01" /**< pkcs OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) 1 } */ +#define MBEDTLS_OID_PKCS1               MBEDTLS_OID_PKCS "\x01" /**< pkcs-1 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 1 } */ +#define MBEDTLS_OID_PKCS5               MBEDTLS_OID_PKCS "\x05" /**< pkcs-5 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 5 } */ +#define MBEDTLS_OID_PKCS9               MBEDTLS_OID_PKCS "\x09" /**< pkcs-9 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 9 } */ +#define MBEDTLS_OID_PKCS12              MBEDTLS_OID_PKCS "\x0c" /**< pkcs-12 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) 12 } */ + +/* + * PKCS#1 OIDs + */ +#define MBEDTLS_OID_PKCS1_RSA           MBEDTLS_OID_PKCS1 "\x01" /**< rsaEncryption OBJECT IDENTIFIER ::= { pkcs-1 1 } */ +#define MBEDTLS_OID_PKCS1_MD2           MBEDTLS_OID_PKCS1 "\x02" /**< md2WithRSAEncryption ::= { pkcs-1 2 } */ +#define MBEDTLS_OID_PKCS1_MD4           MBEDTLS_OID_PKCS1 "\x03" /**< md4WithRSAEncryption ::= { pkcs-1 3 } */ +#define MBEDTLS_OID_PKCS1_MD5           MBEDTLS_OID_PKCS1 "\x04" /**< md5WithRSAEncryption ::= { pkcs-1 4 } */ +#define MBEDTLS_OID_PKCS1_SHA1          MBEDTLS_OID_PKCS1 "\x05" /**< sha1WithRSAEncryption ::= { pkcs-1 5 } */ +#define MBEDTLS_OID_PKCS1_SHA224        MBEDTLS_OID_PKCS1 "\x0e" /**< sha224WithRSAEncryption ::= { pkcs-1 14 } */ +#define MBEDTLS_OID_PKCS1_SHA256        MBEDTLS_OID_PKCS1 "\x0b" /**< sha256WithRSAEncryption ::= { pkcs-1 11 } */ +#define MBEDTLS_OID_PKCS1_SHA384        MBEDTLS_OID_PKCS1 "\x0c" /**< sha384WithRSAEncryption ::= { pkcs-1 12 } */ +#define MBEDTLS_OID_PKCS1_SHA512        MBEDTLS_OID_PKCS1 "\x0d" /**< sha512WithRSAEncryption ::= { pkcs-1 13 } */ + +#define MBEDTLS_OID_RSA_SHA_OBS         "\x2B\x0E\x03\x02\x1D" + +#define MBEDTLS_OID_PKCS9_EMAIL         MBEDTLS_OID_PKCS9 "\x01" /**< emailAddress AttributeType ::= { pkcs-9 1 } */ + +/* RFC 4055 */ +#define MBEDTLS_OID_RSASSA_PSS          MBEDTLS_OID_PKCS1 "\x0a" /**< id-RSASSA-PSS ::= { pkcs-1 10 } */ +#define MBEDTLS_OID_MGF1                MBEDTLS_OID_PKCS1 "\x08" /**< id-mgf1 ::= { pkcs-1 8 } */ + +/* + * Digest algorithms + */ +#define MBEDTLS_OID_DIGEST_ALG_MD2              MBEDTLS_OID_RSA_COMPANY "\x02\x02" /**< id-mbedtls_md2 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 2 } */ +#define MBEDTLS_OID_DIGEST_ALG_MD4              MBEDTLS_OID_RSA_COMPANY "\x02\x04" /**< id-mbedtls_md4 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 4 } */ +#define MBEDTLS_OID_DIGEST_ALG_MD5              MBEDTLS_OID_RSA_COMPANY "\x02\x05" /**< id-mbedtls_md5 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 5 } */ +#define MBEDTLS_OID_DIGEST_ALG_SHA1             MBEDTLS_OID_ISO_IDENTIFIED_ORG MBEDTLS_OID_OIW_SECSIG_SHA1 /**< id-mbedtls_sha1 OBJECT IDENTIFIER ::= { iso(1) identified-organization(3) oiw(14) secsig(3) algorithms(2) 26 } */ +#define MBEDTLS_OID_DIGEST_ALG_SHA224           MBEDTLS_OID_GOV "\x03\x04\x02\x04" /**< id-sha224 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 4 } */ +#define MBEDTLS_OID_DIGEST_ALG_SHA256           MBEDTLS_OID_GOV "\x03\x04\x02\x01" /**< id-mbedtls_sha256 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 1 } */ + +#define MBEDTLS_OID_DIGEST_ALG_SHA384           MBEDTLS_OID_GOV "\x03\x04\x02\x02" /**< id-sha384 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 2 } */ + +#define MBEDTLS_OID_DIGEST_ALG_SHA512           MBEDTLS_OID_GOV "\x03\x04\x02\x03" /**< id-mbedtls_sha512 OBJECT IDENTIFIER ::= { joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 3 } */ + +#define MBEDTLS_OID_HMAC_SHA1                   MBEDTLS_OID_RSA_COMPANY "\x02\x07" /**< id-hmacWithSHA1 OBJECT IDENTIFIER ::= { iso(1) member-body(2) us(840) rsadsi(113549) digestAlgorithm(2) 7 } */ + +/* + * Encryption algorithms + */ +#define MBEDTLS_OID_DES_CBC                     MBEDTLS_OID_ISO_IDENTIFIED_ORG MBEDTLS_OID_OIW_SECSIG_ALG "\x07" /**< desCBC OBJECT IDENTIFIER ::= { iso(1) identified-organization(3) oiw(14) secsig(3) algorithms(2) 7 } */ +#define MBEDTLS_OID_DES_EDE3_CBC                MBEDTLS_OID_RSA_COMPANY "\x03\x07" /**< des-ede3-cbc OBJECT IDENTIFIER ::= { iso(1) member-body(2) -- us(840) rsadsi(113549) encryptionAlgorithm(3) 7 } */ + +/* + * PKCS#5 OIDs + */ +#define MBEDTLS_OID_PKCS5_PBKDF2                MBEDTLS_OID_PKCS5 "\x0c" /**< id-PBKDF2 OBJECT IDENTIFIER ::= {pkcs-5 12} */ +#define MBEDTLS_OID_PKCS5_PBES2                 MBEDTLS_OID_PKCS5 "\x0d" /**< id-PBES2 OBJECT IDENTIFIER ::= {pkcs-5 13} */ +#define MBEDTLS_OID_PKCS5_PBMAC1                MBEDTLS_OID_PKCS5 "\x0e" /**< id-PBMAC1 OBJECT IDENTIFIER ::= {pkcs-5 14} */ + +/* + * PKCS#5 PBES1 algorithms + */ +#define MBEDTLS_OID_PKCS5_PBE_MD2_DES_CBC       MBEDTLS_OID_PKCS5 "\x01" /**< pbeWithMD2AndDES-CBC OBJECT IDENTIFIER ::= {pkcs-5 1} */ +#define MBEDTLS_OID_PKCS5_PBE_MD2_RC2_CBC       MBEDTLS_OID_PKCS5 "\x04" /**< pbeWithMD2AndRC2-CBC OBJECT IDENTIFIER ::= {pkcs-5 4} */ +#define MBEDTLS_OID_PKCS5_PBE_MD5_DES_CBC       MBEDTLS_OID_PKCS5 "\x03" /**< pbeWithMD5AndDES-CBC OBJECT IDENTIFIER ::= {pkcs-5 3} */ +#define MBEDTLS_OID_PKCS5_PBE_MD5_RC2_CBC       MBEDTLS_OID_PKCS5 "\x06" /**< pbeWithMD5AndRC2-CBC OBJECT IDENTIFIER ::= {pkcs-5 6} */ +#define MBEDTLS_OID_PKCS5_PBE_SHA1_DES_CBC      MBEDTLS_OID_PKCS5 "\x0a" /**< pbeWithSHA1AndDES-CBC OBJECT IDENTIFIER ::= {pkcs-5 10} */ +#define MBEDTLS_OID_PKCS5_PBE_SHA1_RC2_CBC      MBEDTLS_OID_PKCS5 "\x0b" /**< pbeWithSHA1AndRC2-CBC OBJECT IDENTIFIER ::= {pkcs-5 11} */ + +/* + * PKCS#8 OIDs + */ +#define MBEDTLS_OID_PKCS9_CSR_EXT_REQ           MBEDTLS_OID_PKCS9 "\x0e" /**< extensionRequest OBJECT IDENTIFIER ::= {pkcs-9 14} */ + +/* + * PKCS#12 PBE OIDs + */ +#define MBEDTLS_OID_PKCS12_PBE                      MBEDTLS_OID_PKCS12 "\x01" /**< pkcs-12PbeIds OBJECT IDENTIFIER ::= {pkcs-12 1} */ + +#define MBEDTLS_OID_PKCS12_PBE_SHA1_RC4_128         MBEDTLS_OID_PKCS12_PBE "\x01" /**< pbeWithSHAAnd128BitRC4 OBJECT IDENTIFIER ::= {pkcs-12PbeIds 1} */ +#define MBEDTLS_OID_PKCS12_PBE_SHA1_RC4_40          MBEDTLS_OID_PKCS12_PBE "\x02" /**< pbeWithSHAAnd40BitRC4 OBJECT IDENTIFIER ::= {pkcs-12PbeIds 2} */ +#define MBEDTLS_OID_PKCS12_PBE_SHA1_DES3_EDE_CBC    MBEDTLS_OID_PKCS12_PBE "\x03" /**< pbeWithSHAAnd3-KeyTripleDES-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 3} */ +#define MBEDTLS_OID_PKCS12_PBE_SHA1_DES2_EDE_CBC    MBEDTLS_OID_PKCS12_PBE "\x04" /**< pbeWithSHAAnd2-KeyTripleDES-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 4} */ +#define MBEDTLS_OID_PKCS12_PBE_SHA1_RC2_128_CBC     MBEDTLS_OID_PKCS12_PBE "\x05" /**< pbeWithSHAAnd128BitRC2-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 5} */ +#define MBEDTLS_OID_PKCS12_PBE_SHA1_RC2_40_CBC      MBEDTLS_OID_PKCS12_PBE "\x06" /**< pbeWithSHAAnd40BitRC2-CBC OBJECT IDENTIFIER ::= {pkcs-12PbeIds 6} */ + +/* + * EC key algorithms from RFC 5480 + */ + +/* id-ecPublicKey OBJECT IDENTIFIER ::= { + *       iso(1) member-body(2) us(840) ansi-X9-62(10045) keyType(2) 1 } */ +#define MBEDTLS_OID_EC_ALG_UNRESTRICTED         MBEDTLS_OID_ANSI_X9_62 "\x02\01" + +/*   id-ecDH OBJECT IDENTIFIER ::= { + *     iso(1) identified-organization(3) certicom(132) + *     schemes(1) ecdh(12) } */ +#define MBEDTLS_OID_EC_ALG_ECDH                 MBEDTLS_OID_CERTICOM "\x01\x0c" + +/* + * ECParameters namedCurve identifiers, from RFC 5480, RFC 5639, and SEC2 + */ + +/* secp192r1 OBJECT IDENTIFIER ::= { + *   iso(1) member-body(2) us(840) ansi-X9-62(10045) curves(3) prime(1) 1 } */ +#define MBEDTLS_OID_EC_GRP_SECP192R1        MBEDTLS_OID_ANSI_X9_62 "\x03\x01\x01" + +/* secp224r1 OBJECT IDENTIFIER ::= { + *   iso(1) identified-organization(3) certicom(132) curve(0) 33 } */ +#define MBEDTLS_OID_EC_GRP_SECP224R1        MBEDTLS_OID_CERTICOM "\x00\x21" + +/* secp256r1 OBJECT IDENTIFIER ::= { + *   iso(1) member-body(2) us(840) ansi-X9-62(10045) curves(3) prime(1) 7 } */ +#define MBEDTLS_OID_EC_GRP_SECP256R1        MBEDTLS_OID_ANSI_X9_62 "\x03\x01\x07" + +/* secp384r1 OBJECT IDENTIFIER ::= { + *   iso(1) identified-organization(3) certicom(132) curve(0) 34 } */ +#define MBEDTLS_OID_EC_GRP_SECP384R1        MBEDTLS_OID_CERTICOM "\x00\x22" + +/* secp521r1 OBJECT IDENTIFIER ::= { + *   iso(1) identified-organization(3) certicom(132) curve(0) 35 } */ +#define MBEDTLS_OID_EC_GRP_SECP521R1        MBEDTLS_OID_CERTICOM "\x00\x23" + +/* secp192k1 OBJECT IDENTIFIER ::= { + *   iso(1) identified-organization(3) certicom(132) curve(0) 31 } */ +#define MBEDTLS_OID_EC_GRP_SECP192K1        MBEDTLS_OID_CERTICOM "\x00\x1f" + +/* secp224k1 OBJECT IDENTIFIER ::= { + *   iso(1) identified-organization(3) certicom(132) curve(0) 32 } */ +#define MBEDTLS_OID_EC_GRP_SECP224K1        MBEDTLS_OID_CERTICOM "\x00\x20" + +/* secp256k1 OBJECT IDENTIFIER ::= { + *   iso(1) identified-organization(3) certicom(132) curve(0) 10 } */ +#define MBEDTLS_OID_EC_GRP_SECP256K1        MBEDTLS_OID_CERTICOM "\x00\x0a" + +/* RFC 5639 4.1 + * ecStdCurvesAndGeneration OBJECT IDENTIFIER::= {iso(1) + * identified-organization(3) teletrust(36) algorithm(3) signature- + * algorithm(3) ecSign(2) 8} + * ellipticCurve OBJECT IDENTIFIER ::= {ecStdCurvesAndGeneration 1} + * versionOne OBJECT IDENTIFIER ::= {ellipticCurve 1} */ +#define MBEDTLS_OID_EC_BRAINPOOL_V1         MBEDTLS_OID_TELETRUST "\x03\x03\x02\x08\x01\x01" + +/* brainpoolP256r1 OBJECT IDENTIFIER ::= {versionOne 7} */ +#define MBEDTLS_OID_EC_GRP_BP256R1          MBEDTLS_OID_EC_BRAINPOOL_V1 "\x07" + +/* brainpoolP384r1 OBJECT IDENTIFIER ::= {versionOne 11} */ +#define MBEDTLS_OID_EC_GRP_BP384R1          MBEDTLS_OID_EC_BRAINPOOL_V1 "\x0B" + +/* brainpoolP512r1 OBJECT IDENTIFIER ::= {versionOne 13} */ +#define MBEDTLS_OID_EC_GRP_BP512R1          MBEDTLS_OID_EC_BRAINPOOL_V1 "\x0D" + +/* + * SEC1 C.1 + * + * prime-field OBJECT IDENTIFIER ::= { id-fieldType 1 } + * id-fieldType OBJECT IDENTIFIER ::= { ansi-X9-62 fieldType(1)} + */ +#define MBEDTLS_OID_ANSI_X9_62_FIELD_TYPE   MBEDTLS_OID_ANSI_X9_62 "\x01" +#define MBEDTLS_OID_ANSI_X9_62_PRIME_FIELD  MBEDTLS_OID_ANSI_X9_62_FIELD_TYPE "\x01" + +/* + * ECDSA signature identifiers, from RFC 5480 + */ +#define MBEDTLS_OID_ANSI_X9_62_SIG          MBEDTLS_OID_ANSI_X9_62 "\x04" /* signatures(4) */ +#define MBEDTLS_OID_ANSI_X9_62_SIG_SHA2     MBEDTLS_OID_ANSI_X9_62_SIG "\x03" /* ecdsa-with-SHA2(3) */ + +/* ecdsa-with-SHA1 OBJECT IDENTIFIER ::= { + *   iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4) 1 } */ +#define MBEDTLS_OID_ECDSA_SHA1              MBEDTLS_OID_ANSI_X9_62_SIG "\x01" + +/* ecdsa-with-SHA224 OBJECT IDENTIFIER ::= { + *   iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4) + *   ecdsa-with-SHA2(3) 1 } */ +#define MBEDTLS_OID_ECDSA_SHA224            MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x01" + +/* ecdsa-with-SHA256 OBJECT IDENTIFIER ::= { + *   iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4) + *   ecdsa-with-SHA2(3) 2 } */ +#define MBEDTLS_OID_ECDSA_SHA256            MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x02" + +/* ecdsa-with-SHA384 OBJECT IDENTIFIER ::= { + *   iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4) + *   ecdsa-with-SHA2(3) 3 } */ +#define MBEDTLS_OID_ECDSA_SHA384            MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x03" + +/* ecdsa-with-SHA512 OBJECT IDENTIFIER ::= { + *   iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4) + *   ecdsa-with-SHA2(3) 4 } */ +#define MBEDTLS_OID_ECDSA_SHA512            MBEDTLS_OID_ANSI_X9_62_SIG_SHA2 "\x04" + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief Base OID descriptor structure + */ +typedef struct { +    const char *asn1;               /*!< OID ASN.1 representation       */ +    size_t asn1_len;                /*!< length of asn1                 */ +    const char *name;               /*!< official name (e.g. from RFC)  */ +    const char *description;        /*!< human friendly description     */ +} mbedtls_oid_descriptor_t; + +/** + * \brief           Translate an ASN.1 OID into its numeric representation + *                  (e.g. "\x2A\x86\x48\x86\xF7\x0D" into "1.2.840.113549") + * + * \param buf       buffer to put representation in + * \param size      size of the buffer + * \param oid       OID to translate + * + * \return          Length of the string written (excluding final NULL) or + *                  MBEDTLS_ERR_OID_BUF_TOO_SMALL in case of error + */ +int mbedtls_oid_get_numeric_string( char *buf, size_t size, const mbedtls_asn1_buf *oid ); + +#if defined(MBEDTLS_X509_USE_C) || defined(MBEDTLS_X509_CREATE_C) +/** + * \brief          Translate an X.509 extension OID into local values + * + * \param oid      OID to use + * \param ext_type place to store the extension type + * + * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND + */ +int mbedtls_oid_get_x509_ext_type( const mbedtls_asn1_buf *oid, int *ext_type ); +#endif + +/** + * \brief          Translate an X.509 attribute type OID into the short name + *                 (e.g. the OID for an X520 Common Name into "CN") + * + * \param oid      OID to use + * \param short_name    place to store the string pointer + * + * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND + */ +int mbedtls_oid_get_attr_short_name( const mbedtls_asn1_buf *oid, const char **short_name ); + +/** + * \brief          Translate PublicKeyAlgorithm OID into pk_type + * + * \param oid      OID to use + * \param pk_alg   place to store public key algorithm + * + * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND + */ +int mbedtls_oid_get_pk_alg( const mbedtls_asn1_buf *oid, mbedtls_pk_type_t *pk_alg ); + +/** + * \brief          Translate pk_type into PublicKeyAlgorithm OID + * + * \param pk_alg   Public key type to look for + * \param oid      place to store ASN.1 OID string pointer + * \param olen     length of the OID + * + * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND + */ +int mbedtls_oid_get_oid_by_pk_alg( mbedtls_pk_type_t pk_alg, +                           const char **oid, size_t *olen ); + +#if defined(MBEDTLS_ECP_C) +/** + * \brief          Translate NamedCurve OID into an EC group identifier + * + * \param oid      OID to use + * \param grp_id   place to store group id + * + * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND + */ +int mbedtls_oid_get_ec_grp( const mbedtls_asn1_buf *oid, mbedtls_ecp_group_id *grp_id ); + +/** + * \brief          Translate EC group identifier into NamedCurve OID + * + * \param grp_id   EC group identifier + * \param oid      place to store ASN.1 OID string pointer + * \param olen     length of the OID + * + * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND + */ +int mbedtls_oid_get_oid_by_ec_grp( mbedtls_ecp_group_id grp_id, +                           const char **oid, size_t *olen ); +#endif /* MBEDTLS_ECP_C */ + +#if defined(MBEDTLS_MD_C) +/** + * \brief          Translate SignatureAlgorithm OID into md_type and pk_type + * + * \param oid      OID to use + * \param md_alg   place to store message digest algorithm + * \param pk_alg   place to store public key algorithm + * + * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND + */ +int mbedtls_oid_get_sig_alg( const mbedtls_asn1_buf *oid, +                     mbedtls_md_type_t *md_alg, mbedtls_pk_type_t *pk_alg ); + +/** + * \brief          Translate SignatureAlgorithm OID into description + * + * \param oid      OID to use + * \param desc     place to store string pointer + * + * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND + */ +int mbedtls_oid_get_sig_alg_desc( const mbedtls_asn1_buf *oid, const char **desc ); + +/** + * \brief          Translate md_type and pk_type into SignatureAlgorithm OID + * + * \param md_alg   message digest algorithm + * \param pk_alg   public key algorithm + * \param oid      place to store ASN.1 OID string pointer + * \param olen     length of the OID + * + * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND + */ +int mbedtls_oid_get_oid_by_sig_alg( mbedtls_pk_type_t pk_alg, mbedtls_md_type_t md_alg, +                            const char **oid, size_t *olen ); + +/** + * \brief          Translate hash algorithm OID into md_type + * + * \param oid      OID to use + * \param md_alg   place to store message digest algorithm + * + * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND + */ +int mbedtls_oid_get_md_alg( const mbedtls_asn1_buf *oid, mbedtls_md_type_t *md_alg ); +#endif /* MBEDTLS_MD_C */ + +/** + * \brief          Translate Extended Key Usage OID into description + * + * \param oid      OID to use + * \param desc     place to store string pointer + * + * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND + */ +int mbedtls_oid_get_extended_key_usage( const mbedtls_asn1_buf *oid, const char **desc ); + +/** + * \brief          Translate md_type into hash algorithm OID + * + * \param md_alg   message digest algorithm + * \param oid      place to store ASN.1 OID string pointer + * \param olen     length of the OID + * + * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND + */ +int mbedtls_oid_get_oid_by_md( mbedtls_md_type_t md_alg, const char **oid, size_t *olen ); + +#if defined(MBEDTLS_CIPHER_C) +/** + * \brief          Translate encryption algorithm OID into cipher_type + * + * \param oid           OID to use + * \param cipher_alg    place to store cipher algorithm + * + * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND + */ +int mbedtls_oid_get_cipher_alg( const mbedtls_asn1_buf *oid, mbedtls_cipher_type_t *cipher_alg ); +#endif /* MBEDTLS_CIPHER_C */ + +#if defined(MBEDTLS_PKCS12_C) +/** + * \brief          Translate PKCS#12 PBE algorithm OID into md_type and + *                 cipher_type + * + * \param oid           OID to use + * \param md_alg        place to store message digest algorithm + * \param cipher_alg    place to store cipher algorithm + * + * \return         0 if successful, or MBEDTLS_ERR_OID_NOT_FOUND + */ +int mbedtls_oid_get_pkcs12_pbe_alg( const mbedtls_asn1_buf *oid, mbedtls_md_type_t *md_alg, +                            mbedtls_cipher_type_t *cipher_alg ); +#endif /* MBEDTLS_PKCS12_C */ + +#ifdef __cplusplus +} +#endif + +#endif /* oid.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/padlock.h b/thirdparty/mbedtls/include/mbedtls/padlock.h new file mode 100644 index 0000000000..677936ebf8 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/padlock.h @@ -0,0 +1,108 @@ +/** + * \file padlock.h + * + * \brief VIA PadLock ACE for HW encryption/decryption supported by some + *        processors + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_PADLOCK_H +#define MBEDTLS_PADLOCK_H + +#include "aes.h" + +#define MBEDTLS_ERR_PADLOCK_DATA_MISALIGNED               -0x0030  /**< Input data should be aligned. */ + +#if defined(__has_feature) +#if __has_feature(address_sanitizer) +#define MBEDTLS_HAVE_ASAN +#endif +#endif + +/* Some versions of ASan result in errors about not enough registers */ +#if defined(MBEDTLS_HAVE_ASM) && defined(__GNUC__) && defined(__i386__) && \ +    !defined(MBEDTLS_HAVE_ASAN) + +#ifndef MBEDTLS_HAVE_X86 +#define MBEDTLS_HAVE_X86 +#endif + +#include <stdint.h> + +#define MBEDTLS_PADLOCK_RNG 0x000C +#define MBEDTLS_PADLOCK_ACE 0x00C0 +#define MBEDTLS_PADLOCK_PHE 0x0C00 +#define MBEDTLS_PADLOCK_PMM 0x3000 + +#define MBEDTLS_PADLOCK_ALIGN16(x) (uint32_t *) (16 + ((int32_t) x & ~15)) + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          PadLock detection routine + * + * \param feature  The feature to detect + * + * \return         1 if CPU has support for the feature, 0 otherwise + */ +int mbedtls_padlock_has_support( int feature ); + +/** + * \brief          PadLock AES-ECB block en(de)cryption + * + * \param ctx      AES context + * \param mode     MBEDTLS_AES_ENCRYPT or MBEDTLS_AES_DECRYPT + * \param input    16-byte input block + * \param output   16-byte output block + * + * \return         0 if success, 1 if operation failed + */ +int mbedtls_padlock_xcryptecb( mbedtls_aes_context *ctx, +                       int mode, +                       const unsigned char input[16], +                       unsigned char output[16] ); + +/** + * \brief          PadLock AES-CBC buffer en(de)cryption + * + * \param ctx      AES context + * \param mode     MBEDTLS_AES_ENCRYPT or MBEDTLS_AES_DECRYPT + * \param length   length of the input data + * \param iv       initialization vector (updated after use) + * \param input    buffer holding the input data + * \param output   buffer holding the output data + * + * \return         0 if success, 1 if operation failed + */ +int mbedtls_padlock_xcryptcbc( mbedtls_aes_context *ctx, +                       int mode, +                       size_t length, +                       unsigned char iv[16], +                       const unsigned char *input, +                       unsigned char *output ); + +#ifdef __cplusplus +} +#endif + +#endif /* HAVE_X86  */ + +#endif /* padlock.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/pem.h b/thirdparty/mbedtls/include/mbedtls/pem.h new file mode 100644 index 0000000000..2cf4c0a709 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/pem.h @@ -0,0 +1,130 @@ +/** + * \file pem.h + * + * \brief Privacy Enhanced Mail (PEM) decoding + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_PEM_H +#define MBEDTLS_PEM_H + +#include <stddef.h> + +/** + * \name PEM Error codes + * These error codes are returned in case of errors reading the + * PEM data. + * \{ + */ +#define MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT          -0x1080  /**< No PEM header or footer found. */ +#define MBEDTLS_ERR_PEM_INVALID_DATA                      -0x1100  /**< PEM string is not as expected. */ +#define MBEDTLS_ERR_PEM_ALLOC_FAILED                      -0x1180  /**< Failed to allocate memory. */ +#define MBEDTLS_ERR_PEM_INVALID_ENC_IV                    -0x1200  /**< RSA IV is not in hex-format. */ +#define MBEDTLS_ERR_PEM_UNKNOWN_ENC_ALG                   -0x1280  /**< Unsupported key encryption algorithm. */ +#define MBEDTLS_ERR_PEM_PASSWORD_REQUIRED                 -0x1300  /**< Private key password can't be empty. */ +#define MBEDTLS_ERR_PEM_PASSWORD_MISMATCH                 -0x1380  /**< Given private key password does not allow for correct decryption. */ +#define MBEDTLS_ERR_PEM_FEATURE_UNAVAILABLE               -0x1400  /**< Unavailable feature, e.g. hashing/encryption combination. */ +#define MBEDTLS_ERR_PEM_BAD_INPUT_DATA                    -0x1480  /**< Bad input parameters to function. */ +/* \} name */ + +#ifdef __cplusplus +extern "C" { +#endif + +#if defined(MBEDTLS_PEM_PARSE_C) +/** + * \brief       PEM context structure + */ +typedef struct +{ +    unsigned char *buf;     /*!< buffer for decoded data             */ +    size_t buflen;          /*!< length of the buffer                */ +    unsigned char *info;    /*!< buffer for extra header information */ +} +mbedtls_pem_context; + +/** + * \brief       PEM context setup + * + * \param ctx   context to be initialized + */ +void mbedtls_pem_init( mbedtls_pem_context *ctx ); + +/** + * \brief       Read a buffer for PEM information and store the resulting + *              data into the specified context buffers. + * + * \param ctx       context to use + * \param header    header string to seek and expect + * \param footer    footer string to seek and expect + * \param data      source data to look in (must be nul-terminated) + * \param pwd       password for decryption (can be NULL) + * \param pwdlen    length of password + * \param use_len   destination for total length used (set after header is + *                  correctly read, so unless you get + *                  MBEDTLS_ERR_PEM_BAD_INPUT_DATA or + *                  MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT, use_len is + *                  the length to skip) + * + * \note            Attempts to check password correctness by verifying if + *                  the decrypted text starts with an ASN.1 sequence of + *                  appropriate length + * + * \return          0 on success, or a specific PEM error code + */ +int mbedtls_pem_read_buffer( mbedtls_pem_context *ctx, const char *header, const char *footer, +                     const unsigned char *data, +                     const unsigned char *pwd, +                     size_t pwdlen, size_t *use_len ); + +/** + * \brief       PEM context memory freeing + * + * \param ctx   context to be freed + */ +void mbedtls_pem_free( mbedtls_pem_context *ctx ); +#endif /* MBEDTLS_PEM_PARSE_C */ + +#if defined(MBEDTLS_PEM_WRITE_C) +/** + * \brief           Write a buffer of PEM information from a DER encoded + *                  buffer. + * + * \param header    header string to write + * \param footer    footer string to write + * \param der_data  DER data to write + * \param der_len   length of the DER data + * \param buf       buffer to write to + * \param buf_len   length of output buffer + * \param olen      total length written / required (if buf_len is not enough) + * + * \return          0 on success, or a specific PEM or BASE64 error code. On + *                  MBEDTLS_ERR_BASE64_BUFFER_TOO_SMALL olen is the required + *                  size. + */ +int mbedtls_pem_write_buffer( const char *header, const char *footer, +                      const unsigned char *der_data, size_t der_len, +                      unsigned char *buf, size_t buf_len, size_t *olen ); +#endif /* MBEDTLS_PEM_WRITE_C */ + +#ifdef __cplusplus +} +#endif + +#endif /* pem.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/pk.h b/thirdparty/mbedtls/include/mbedtls/pk.h new file mode 100644 index 0000000000..1059bdaa5b --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/pk.h @@ -0,0 +1,618 @@ +/** + * \file pk.h + * + * \brief Public Key abstraction layer + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ + +#ifndef MBEDTLS_PK_H +#define MBEDTLS_PK_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include "md.h" + +#if defined(MBEDTLS_RSA_C) +#include "rsa.h" +#endif + +#if defined(MBEDTLS_ECP_C) +#include "ecp.h" +#endif + +#if defined(MBEDTLS_ECDSA_C) +#include "ecdsa.h" +#endif + +#if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \ +    !defined(inline) && !defined(__cplusplus) +#define inline __inline +#endif + +#define MBEDTLS_ERR_PK_ALLOC_FAILED        -0x3F80  /**< Memory allocation failed. */ +#define MBEDTLS_ERR_PK_TYPE_MISMATCH       -0x3F00  /**< Type mismatch, eg attempt to encrypt with an ECDSA key */ +#define MBEDTLS_ERR_PK_BAD_INPUT_DATA      -0x3E80  /**< Bad input parameters to function. */ +#define MBEDTLS_ERR_PK_FILE_IO_ERROR       -0x3E00  /**< Read/write of file failed. */ +#define MBEDTLS_ERR_PK_KEY_INVALID_VERSION -0x3D80  /**< Unsupported key version */ +#define MBEDTLS_ERR_PK_KEY_INVALID_FORMAT  -0x3D00  /**< Invalid key tag or value. */ +#define MBEDTLS_ERR_PK_UNKNOWN_PK_ALG      -0x3C80  /**< Key algorithm is unsupported (only RSA and EC are supported). */ +#define MBEDTLS_ERR_PK_PASSWORD_REQUIRED   -0x3C00  /**< Private key password can't be empty. */ +#define MBEDTLS_ERR_PK_PASSWORD_MISMATCH   -0x3B80  /**< Given private key password does not allow for correct decryption. */ +#define MBEDTLS_ERR_PK_INVALID_PUBKEY      -0x3B00  /**< The pubkey tag or value is invalid (only RSA and EC are supported). */ +#define MBEDTLS_ERR_PK_INVALID_ALG         -0x3A80  /**< The algorithm tag or value is invalid. */ +#define MBEDTLS_ERR_PK_UNKNOWN_NAMED_CURVE -0x3A00  /**< Elliptic curve is unsupported (only NIST curves are supported). */ +#define MBEDTLS_ERR_PK_FEATURE_UNAVAILABLE -0x3980  /**< Unavailable feature, e.g. RSA disabled for RSA key. */ +#define MBEDTLS_ERR_PK_SIG_LEN_MISMATCH    -0x3900  /**< The signature is valid but its length is less than expected. */ +#define MBEDTLS_ERR_PK_HW_ACCEL_FAILED     -0x3880  /**< PK hardware accelerator failed. */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          Public key types + */ +typedef enum { +    MBEDTLS_PK_NONE=0, +    MBEDTLS_PK_RSA, +    MBEDTLS_PK_ECKEY, +    MBEDTLS_PK_ECKEY_DH, +    MBEDTLS_PK_ECDSA, +    MBEDTLS_PK_RSA_ALT, +    MBEDTLS_PK_RSASSA_PSS, +} mbedtls_pk_type_t; + +/** + * \brief           Options for RSASSA-PSS signature verification. + *                  See \c mbedtls_rsa_rsassa_pss_verify_ext() + */ +typedef struct +{ +    mbedtls_md_type_t mgf1_hash_id; +    int expected_salt_len; + +} mbedtls_pk_rsassa_pss_options; + +/** + * \brief           Types for interfacing with the debug module + */ +typedef enum +{ +    MBEDTLS_PK_DEBUG_NONE = 0, +    MBEDTLS_PK_DEBUG_MPI, +    MBEDTLS_PK_DEBUG_ECP, +} mbedtls_pk_debug_type; + +/** + * \brief           Item to send to the debug module + */ +typedef struct +{ +    mbedtls_pk_debug_type type; +    const char *name; +    void *value; +} mbedtls_pk_debug_item; + +/** Maximum number of item send for debugging, plus 1 */ +#define MBEDTLS_PK_DEBUG_MAX_ITEMS 3 + +/** + * \brief           Public key information and operations + */ +typedef struct mbedtls_pk_info_t mbedtls_pk_info_t; + +/** + * \brief           Public key container + */ +typedef struct +{ +    const mbedtls_pk_info_t *   pk_info; /**< Public key informations        */ +    void *                      pk_ctx;  /**< Underlying public key context  */ +} mbedtls_pk_context; + +#if defined(MBEDTLS_RSA_C) +/** + * Quick access to an RSA context inside a PK context. + * + * \warning You must make sure the PK context actually holds an RSA context + * before using this function! + */ +static inline mbedtls_rsa_context *mbedtls_pk_rsa( const mbedtls_pk_context pk ) +{ +    return( (mbedtls_rsa_context *) (pk).pk_ctx ); +} +#endif /* MBEDTLS_RSA_C */ + +#if defined(MBEDTLS_ECP_C) +/** + * Quick access to an EC context inside a PK context. + * + * \warning You must make sure the PK context actually holds an EC context + * before using this function! + */ +static inline mbedtls_ecp_keypair *mbedtls_pk_ec( const mbedtls_pk_context pk ) +{ +    return( (mbedtls_ecp_keypair *) (pk).pk_ctx ); +} +#endif /* MBEDTLS_ECP_C */ + +#if defined(MBEDTLS_PK_RSA_ALT_SUPPORT) +/** + * \brief           Types for RSA-alt abstraction + */ +typedef int (*mbedtls_pk_rsa_alt_decrypt_func)( void *ctx, int mode, size_t *olen, +                    const unsigned char *input, unsigned char *output, +                    size_t output_max_len ); +typedef int (*mbedtls_pk_rsa_alt_sign_func)( void *ctx, +                    int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, +                    int mode, mbedtls_md_type_t md_alg, unsigned int hashlen, +                    const unsigned char *hash, unsigned char *sig ); +typedef size_t (*mbedtls_pk_rsa_alt_key_len_func)( void *ctx ); +#endif /* MBEDTLS_PK_RSA_ALT_SUPPORT */ + +/** + * \brief           Return information associated with the given PK type + * + * \param pk_type   PK type to search for. + * + * \return          The PK info associated with the type or NULL if not found. + */ +const mbedtls_pk_info_t *mbedtls_pk_info_from_type( mbedtls_pk_type_t pk_type ); + +/** + * \brief           Initialize a mbedtls_pk_context (as NONE) + */ +void mbedtls_pk_init( mbedtls_pk_context *ctx ); + +/** + * \brief           Free a mbedtls_pk_context + */ +void mbedtls_pk_free( mbedtls_pk_context *ctx ); + +/** + * \brief           Initialize a PK context with the information given + *                  and allocates the type-specific PK subcontext. + * + * \param ctx       Context to initialize. Must be empty (type NONE). + * \param info      Information to use + * + * \return          0 on success, + *                  MBEDTLS_ERR_PK_BAD_INPUT_DATA on invalid input, + *                  MBEDTLS_ERR_PK_ALLOC_FAILED on allocation failure. + * + * \note            For contexts holding an RSA-alt key, use + *                  \c mbedtls_pk_setup_rsa_alt() instead. + */ +int mbedtls_pk_setup( mbedtls_pk_context *ctx, const mbedtls_pk_info_t *info ); + +#if defined(MBEDTLS_PK_RSA_ALT_SUPPORT) +/** + * \brief           Initialize an RSA-alt context + * + * \param ctx       Context to initialize. Must be empty (type NONE). + * \param key       RSA key pointer + * \param decrypt_func  Decryption function + * \param sign_func     Signing function + * \param key_len_func  Function returning key length in bytes + * + * \return          0 on success, or MBEDTLS_ERR_PK_BAD_INPUT_DATA if the + *                  context wasn't already initialized as RSA_ALT. + * + * \note            This function replaces \c mbedtls_pk_setup() for RSA-alt. + */ +int mbedtls_pk_setup_rsa_alt( mbedtls_pk_context *ctx, void * key, +                         mbedtls_pk_rsa_alt_decrypt_func decrypt_func, +                         mbedtls_pk_rsa_alt_sign_func sign_func, +                         mbedtls_pk_rsa_alt_key_len_func key_len_func ); +#endif /* MBEDTLS_PK_RSA_ALT_SUPPORT */ + +/** + * \brief           Get the size in bits of the underlying key + * + * \param ctx       Context to use + * + * \return          Key size in bits, or 0 on error + */ +size_t mbedtls_pk_get_bitlen( const mbedtls_pk_context *ctx ); + +/** + * \brief           Get the length in bytes of the underlying key + * \param ctx       Context to use + * + * \return          Key length in bytes, or 0 on error + */ +static inline size_t mbedtls_pk_get_len( const mbedtls_pk_context *ctx ) +{ +    return( ( mbedtls_pk_get_bitlen( ctx ) + 7 ) / 8 ); +} + +/** + * \brief           Tell if a context can do the operation given by type + * + * \param ctx       Context to test + * \param type      Target type + * + * \return          0 if context can't do the operations, + *                  1 otherwise. + */ +int mbedtls_pk_can_do( const mbedtls_pk_context *ctx, mbedtls_pk_type_t type ); + +/** + * \brief           Verify signature (including padding if relevant). + * + * \param ctx       PK context to use + * \param md_alg    Hash algorithm used (see notes) + * \param hash      Hash of the message to sign + * \param hash_len  Hash length or 0 (see notes) + * \param sig       Signature to verify + * \param sig_len   Signature length + * + * \return          0 on success (signature is valid), + *                  MBEDTLS_ERR_PK_SIG_LEN_MISMATCH if the signature is + *                  valid but its actual length is less than sig_len, + *                  or a specific error code. + * + * \note            For RSA keys, the default padding type is PKCS#1 v1.5. + *                  Use \c mbedtls_pk_verify_ext( MBEDTLS_PK_RSASSA_PSS, ... ) + *                  to verify RSASSA_PSS signatures. + * + * \note            If hash_len is 0, then the length associated with md_alg + *                  is used instead, or an error returned if it is invalid. + * + * \note            md_alg may be MBEDTLS_MD_NONE, only if hash_len != 0 + */ +int mbedtls_pk_verify( mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, +               const unsigned char *hash, size_t hash_len, +               const unsigned char *sig, size_t sig_len ); + +/** + * \brief           Verify signature, with options. + *                  (Includes verification of the padding depending on type.) + * + * \param type      Signature type (inc. possible padding type) to verify + * \param options   Pointer to type-specific options, or NULL + * \param ctx       PK context to use + * \param md_alg    Hash algorithm used (see notes) + * \param hash      Hash of the message to sign + * \param hash_len  Hash length or 0 (see notes) + * \param sig       Signature to verify + * \param sig_len   Signature length + * + * \return          0 on success (signature is valid), + *                  MBEDTLS_ERR_PK_TYPE_MISMATCH if the PK context can't be + *                  used for this type of signatures, + *                  MBEDTLS_ERR_PK_SIG_LEN_MISMATCH if the signature is + *                  valid but its actual length is less than sig_len, + *                  or a specific error code. + * + * \note            If hash_len is 0, then the length associated with md_alg + *                  is used instead, or an error returned if it is invalid. + * + * \note            md_alg may be MBEDTLS_MD_NONE, only if hash_len != 0 + * + * \note            If type is MBEDTLS_PK_RSASSA_PSS, then options must point + *                  to a mbedtls_pk_rsassa_pss_options structure, + *                  otherwise it must be NULL. + */ +int mbedtls_pk_verify_ext( mbedtls_pk_type_t type, const void *options, +                   mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, +                   const unsigned char *hash, size_t hash_len, +                   const unsigned char *sig, size_t sig_len ); + +/** + * \brief           Make signature, including padding if relevant. + * + * \param ctx       PK context to use - must hold a private key + * \param md_alg    Hash algorithm used (see notes) + * \param hash      Hash of the message to sign + * \param hash_len  Hash length or 0 (see notes) + * \param sig       Place to write the signature + * \param sig_len   Number of bytes written + * \param f_rng     RNG function + * \param p_rng     RNG parameter + * + * \return          0 on success, or a specific error code. + * + * \note            For RSA keys, the default padding type is PKCS#1 v1.5. + *                  There is no interface in the PK module to make RSASSA-PSS + *                  signatures yet. + * + * \note            If hash_len is 0, then the length associated with md_alg + *                  is used instead, or an error returned if it is invalid. + * + * \note            For RSA, md_alg may be MBEDTLS_MD_NONE if hash_len != 0. + *                  For ECDSA, md_alg may never be MBEDTLS_MD_NONE. + */ +int mbedtls_pk_sign( mbedtls_pk_context *ctx, mbedtls_md_type_t md_alg, +             const unsigned char *hash, size_t hash_len, +             unsigned char *sig, size_t *sig_len, +             int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ); + +/** + * \brief           Decrypt message (including padding if relevant). + * + * \param ctx       PK context to use - must hold a private key + * \param input     Input to decrypt + * \param ilen      Input size + * \param output    Decrypted output + * \param olen      Decrypted message length + * \param osize     Size of the output buffer + * \param f_rng     RNG function + * \param p_rng     RNG parameter + * + * \note            For RSA keys, the default padding type is PKCS#1 v1.5. + * + * \return          0 on success, or a specific error code. + */ +int mbedtls_pk_decrypt( mbedtls_pk_context *ctx, +                const unsigned char *input, size_t ilen, +                unsigned char *output, size_t *olen, size_t osize, +                int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ); + +/** + * \brief           Encrypt message (including padding if relevant). + * + * \param ctx       PK context to use + * \param input     Message to encrypt + * \param ilen      Message size + * \param output    Encrypted output + * \param olen      Encrypted output length + * \param osize     Size of the output buffer + * \param f_rng     RNG function + * \param p_rng     RNG parameter + * + * \note            For RSA keys, the default padding type is PKCS#1 v1.5. + * + * \return          0 on success, or a specific error code. + */ +int mbedtls_pk_encrypt( mbedtls_pk_context *ctx, +                const unsigned char *input, size_t ilen, +                unsigned char *output, size_t *olen, size_t osize, +                int (*f_rng)(void *, unsigned char *, size_t), void *p_rng ); + +/** + * \brief           Check if a public-private pair of keys matches. + * + * \param pub       Context holding a public key. + * \param prv       Context holding a private (and public) key. + * + * \return          0 on success or MBEDTLS_ERR_PK_BAD_INPUT_DATA + */ +int mbedtls_pk_check_pair( const mbedtls_pk_context *pub, const mbedtls_pk_context *prv ); + +/** + * \brief           Export debug information + * + * \param ctx       Context to use + * \param items     Place to write debug items + * + * \return          0 on success or MBEDTLS_ERR_PK_BAD_INPUT_DATA + */ +int mbedtls_pk_debug( const mbedtls_pk_context *ctx, mbedtls_pk_debug_item *items ); + +/** + * \brief           Access the type name + * + * \param ctx       Context to use + * + * \return          Type name on success, or "invalid PK" + */ +const char * mbedtls_pk_get_name( const mbedtls_pk_context *ctx ); + +/** + * \brief           Get the key type + * + * \param ctx       Context to use + * + * \return          Type on success, or MBEDTLS_PK_NONE + */ +mbedtls_pk_type_t mbedtls_pk_get_type( const mbedtls_pk_context *ctx ); + +#if defined(MBEDTLS_PK_PARSE_C) +/** \ingroup pk_module */ +/** + * \brief           Parse a private key in PEM or DER format + * + * \param ctx       key to be initialized + * \param key       input buffer + * \param keylen    size of the buffer + *                  (including the terminating null byte for PEM data) + * \param pwd       password for decryption (optional) + * \param pwdlen    size of the password + * + * \note            On entry, ctx must be empty, either freshly initialised + *                  with mbedtls_pk_init() or reset with mbedtls_pk_free(). If you need a + *                  specific key type, check the result with mbedtls_pk_can_do(). + * + * \note            The key is also checked for correctness. + * + * \return          0 if successful, or a specific PK or PEM error code + */ +int mbedtls_pk_parse_key( mbedtls_pk_context *ctx, +                  const unsigned char *key, size_t keylen, +                  const unsigned char *pwd, size_t pwdlen ); + +/** \ingroup pk_module */ +/** + * \brief           Parse a public key in PEM or DER format + * + * \param ctx       key to be initialized + * \param key       input buffer + * \param keylen    size of the buffer + *                  (including the terminating null byte for PEM data) + * + * \note            On entry, ctx must be empty, either freshly initialised + *                  with mbedtls_pk_init() or reset with mbedtls_pk_free(). If you need a + *                  specific key type, check the result with mbedtls_pk_can_do(). + * + * \note            The key is also checked for correctness. + * + * \return          0 if successful, or a specific PK or PEM error code + */ +int mbedtls_pk_parse_public_key( mbedtls_pk_context *ctx, +                         const unsigned char *key, size_t keylen ); + +#if defined(MBEDTLS_FS_IO) +/** \ingroup pk_module */ +/** + * \brief           Load and parse a private key + * + * \param ctx       key to be initialized + * \param path      filename to read the private key from + * \param password  password to decrypt the file (can be NULL) + * + * \note            On entry, ctx must be empty, either freshly initialised + *                  with mbedtls_pk_init() or reset with mbedtls_pk_free(). If you need a + *                  specific key type, check the result with mbedtls_pk_can_do(). + * + * \note            The key is also checked for correctness. + * + * \return          0 if successful, or a specific PK or PEM error code + */ +int mbedtls_pk_parse_keyfile( mbedtls_pk_context *ctx, +                      const char *path, const char *password ); + +/** \ingroup pk_module */ +/** + * \brief           Load and parse a public key + * + * \param ctx       key to be initialized + * \param path      filename to read the public key from + * + * \note            On entry, ctx must be empty, either freshly initialised + *                  with mbedtls_pk_init() or reset with mbedtls_pk_free(). If + *                  you need a specific key type, check the result with + *                  mbedtls_pk_can_do(). + * + * \note            The key is also checked for correctness. + * + * \return          0 if successful, or a specific PK or PEM error code + */ +int mbedtls_pk_parse_public_keyfile( mbedtls_pk_context *ctx, const char *path ); +#endif /* MBEDTLS_FS_IO */ +#endif /* MBEDTLS_PK_PARSE_C */ + +#if defined(MBEDTLS_PK_WRITE_C) +/** + * \brief           Write a private key to a PKCS#1 or SEC1 DER structure + *                  Note: data is written at the end of the buffer! Use the + *                        return value to determine where you should start + *                        using the buffer + * + * \param ctx       private to write away + * \param buf       buffer to write to + * \param size      size of the buffer + * + * \return          length of data written if successful, or a specific + *                  error code + */ +int mbedtls_pk_write_key_der( mbedtls_pk_context *ctx, unsigned char *buf, size_t size ); + +/** + * \brief           Write a public key to a SubjectPublicKeyInfo DER structure + *                  Note: data is written at the end of the buffer! Use the + *                        return value to determine where you should start + *                        using the buffer + * + * \param ctx       public key to write away + * \param buf       buffer to write to + * \param size      size of the buffer + * + * \return          length of data written if successful, or a specific + *                  error code + */ +int mbedtls_pk_write_pubkey_der( mbedtls_pk_context *ctx, unsigned char *buf, size_t size ); + +#if defined(MBEDTLS_PEM_WRITE_C) +/** + * \brief           Write a public key to a PEM string + * + * \param ctx       public key to write away + * \param buf       buffer to write to + * \param size      size of the buffer + * + * \return          0 if successful, or a specific error code + */ +int mbedtls_pk_write_pubkey_pem( mbedtls_pk_context *ctx, unsigned char *buf, size_t size ); + +/** + * \brief           Write a private key to a PKCS#1 or SEC1 PEM string + * + * \param ctx       private to write away + * \param buf       buffer to write to + * \param size      size of the buffer + * + * \return          0 if successful, or a specific error code + */ +int mbedtls_pk_write_key_pem( mbedtls_pk_context *ctx, unsigned char *buf, size_t size ); +#endif /* MBEDTLS_PEM_WRITE_C */ +#endif /* MBEDTLS_PK_WRITE_C */ + +/* + * WARNING: Low-level functions. You probably do not want to use these unless + *          you are certain you do ;) + */ + +#if defined(MBEDTLS_PK_PARSE_C) +/** + * \brief           Parse a SubjectPublicKeyInfo DER structure + * + * \param p         the position in the ASN.1 data + * \param end       end of the buffer + * \param pk        the key to fill + * + * \return          0 if successful, or a specific PK error code + */ +int mbedtls_pk_parse_subpubkey( unsigned char **p, const unsigned char *end, +                        mbedtls_pk_context *pk ); +#endif /* MBEDTLS_PK_PARSE_C */ + +#if defined(MBEDTLS_PK_WRITE_C) +/** + * \brief           Write a subjectPublicKey to ASN.1 data + *                  Note: function works backwards in data buffer + * + * \param p         reference to current position pointer + * \param start     start of the buffer (for bounds-checking) + * \param key       public key to write away + * + * \return          the length written or a negative error code + */ +int mbedtls_pk_write_pubkey( unsigned char **p, unsigned char *start, +                     const mbedtls_pk_context *key ); +#endif /* MBEDTLS_PK_WRITE_C */ + +/* + * Internal module functions. You probably do not want to use these unless you + * know you do. + */ +#if defined(MBEDTLS_FS_IO) +int mbedtls_pk_load_file( const char *path, unsigned char **buf, size_t *n ); +#endif + +#ifdef __cplusplus +} +#endif + +#endif /* MBEDTLS_PK_H */ diff --git a/thirdparty/mbedtls/include/mbedtls/pk_internal.h b/thirdparty/mbedtls/include/mbedtls/pk_internal.h new file mode 100644 index 0000000000..3dae0fc5b2 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/pk_internal.h @@ -0,0 +1,115 @@ +/** + * \file pk_internal.h + * + * \brief Public Key abstraction layer: wrapper functions + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ + +#ifndef MBEDTLS_PK_WRAP_H +#define MBEDTLS_PK_WRAP_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include "pk.h" + +struct mbedtls_pk_info_t +{ +    /** Public key type */ +    mbedtls_pk_type_t type; + +    /** Type name */ +    const char *name; + +    /** Get key size in bits */ +    size_t (*get_bitlen)( const void * ); + +    /** Tell if the context implements this type (e.g. ECKEY can do ECDSA) */ +    int (*can_do)( mbedtls_pk_type_t type ); + +    /** Verify signature */ +    int (*verify_func)( void *ctx, mbedtls_md_type_t md_alg, +                        const unsigned char *hash, size_t hash_len, +                        const unsigned char *sig, size_t sig_len ); + +    /** Make signature */ +    int (*sign_func)( void *ctx, mbedtls_md_type_t md_alg, +                      const unsigned char *hash, size_t hash_len, +                      unsigned char *sig, size_t *sig_len, +                      int (*f_rng)(void *, unsigned char *, size_t), +                      void *p_rng ); + +    /** Decrypt message */ +    int (*decrypt_func)( void *ctx, const unsigned char *input, size_t ilen, +                         unsigned char *output, size_t *olen, size_t osize, +                         int (*f_rng)(void *, unsigned char *, size_t), +                         void *p_rng ); + +    /** Encrypt message */ +    int (*encrypt_func)( void *ctx, const unsigned char *input, size_t ilen, +                         unsigned char *output, size_t *olen, size_t osize, +                         int (*f_rng)(void *, unsigned char *, size_t), +                         void *p_rng ); + +    /** Check public-private key pair */ +    int (*check_pair_func)( const void *pub, const void *prv ); + +    /** Allocate a new context */ +    void * (*ctx_alloc_func)( void ); + +    /** Free the given context */ +    void (*ctx_free_func)( void *ctx ); + +    /** Interface with the debug module */ +    void (*debug_func)( const void *ctx, mbedtls_pk_debug_item *items ); + +}; +#if defined(MBEDTLS_PK_RSA_ALT_SUPPORT) +/* Container for RSA-alt */ +typedef struct +{ +    void *key; +    mbedtls_pk_rsa_alt_decrypt_func decrypt_func; +    mbedtls_pk_rsa_alt_sign_func sign_func; +    mbedtls_pk_rsa_alt_key_len_func key_len_func; +} mbedtls_rsa_alt_context; +#endif + +#if defined(MBEDTLS_RSA_C) +extern const mbedtls_pk_info_t mbedtls_rsa_info; +#endif + +#if defined(MBEDTLS_ECP_C) +extern const mbedtls_pk_info_t mbedtls_eckey_info; +extern const mbedtls_pk_info_t mbedtls_eckeydh_info; +#endif + +#if defined(MBEDTLS_ECDSA_C) +extern const mbedtls_pk_info_t mbedtls_ecdsa_info; +#endif + +#if defined(MBEDTLS_PK_RSA_ALT_SUPPORT) +extern const mbedtls_pk_info_t mbedtls_rsa_alt_info; +#endif + +#endif /* MBEDTLS_PK_WRAP_H */ diff --git a/thirdparty/mbedtls/include/mbedtls/pkcs11.h b/thirdparty/mbedtls/include/mbedtls/pkcs11.h new file mode 100644 index 0000000000..bf65c55a79 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/pkcs11.h @@ -0,0 +1,174 @@ +/** + * \file pkcs11.h + * + * \brief Wrapper for PKCS#11 library libpkcs11-helper + * + * \author Adriaan de Jong <dejong@fox-it.com> + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_PKCS11_H +#define MBEDTLS_PKCS11_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#if defined(MBEDTLS_PKCS11_C) + +#include "x509_crt.h" + +#include <pkcs11-helper-1.0/pkcs11h-certificate.h> + +#if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \ +    !defined(inline) && !defined(__cplusplus) +#define inline __inline +#endif + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * Context for PKCS #11 private keys. + */ +typedef struct { +        pkcs11h_certificate_t pkcs11h_cert; +        int len; +} mbedtls_pkcs11_context; + +/** + * Initialize a mbedtls_pkcs11_context. + * (Just making memory references valid.) + */ +void mbedtls_pkcs11_init( mbedtls_pkcs11_context *ctx ); + +/** + * Fill in a mbed TLS certificate, based on the given PKCS11 helper certificate. + * + * \param cert          X.509 certificate to fill + * \param pkcs11h_cert  PKCS #11 helper certificate + * + * \return              0 on success. + */ +int mbedtls_pkcs11_x509_cert_bind( mbedtls_x509_crt *cert, pkcs11h_certificate_t pkcs11h_cert ); + +/** + * Set up a mbedtls_pkcs11_context storing the given certificate. Note that the + * mbedtls_pkcs11_context will take over control of the certificate, freeing it when + * done. + * + * \param priv_key      Private key structure to fill. + * \param pkcs11_cert   PKCS #11 helper certificate + * + * \return              0 on success + */ +int mbedtls_pkcs11_priv_key_bind( mbedtls_pkcs11_context *priv_key, +        pkcs11h_certificate_t pkcs11_cert ); + +/** + * Free the contents of the given private key context. Note that the structure + * itself is not freed. + * + * \param priv_key      Private key structure to cleanup + */ +void mbedtls_pkcs11_priv_key_free( mbedtls_pkcs11_context *priv_key ); + +/** + * \brief          Do an RSA private key decrypt, then remove the message + *                 padding + * + * \param ctx      PKCS #11 context + * \param mode     must be MBEDTLS_RSA_PRIVATE, for compatibility with rsa.c's signature + * \param input    buffer holding the encrypted data + * \param output   buffer that will hold the plaintext + * \param olen     will contain the plaintext length + * \param output_max_len    maximum length of the output buffer + * + * \return         0 if successful, or an MBEDTLS_ERR_RSA_XXX error code + * + * \note           The output buffer must be as large as the size + *                 of ctx->N (eg. 128 bytes if RSA-1024 is used) otherwise + *                 an error is thrown. + */ +int mbedtls_pkcs11_decrypt( mbedtls_pkcs11_context *ctx, +                       int mode, size_t *olen, +                       const unsigned char *input, +                       unsigned char *output, +                       size_t output_max_len ); + +/** + * \brief          Do a private RSA to sign a message digest + * + * \param ctx      PKCS #11 context + * \param mode     must be MBEDTLS_RSA_PRIVATE, for compatibility with rsa.c's signature + * \param md_alg   a MBEDTLS_MD_XXX (use MBEDTLS_MD_NONE for signing raw data) + * \param hashlen  message digest length (for MBEDTLS_MD_NONE only) + * \param hash     buffer holding the message digest + * \param sig      buffer that will hold the ciphertext + * + * \return         0 if the signing operation was successful, + *                 or an MBEDTLS_ERR_RSA_XXX error code + * + * \note           The "sig" buffer must be as large as the size + *                 of ctx->N (eg. 128 bytes if RSA-1024 is used). + */ +int mbedtls_pkcs11_sign( mbedtls_pkcs11_context *ctx, +                    int mode, +                    mbedtls_md_type_t md_alg, +                    unsigned int hashlen, +                    const unsigned char *hash, +                    unsigned char *sig ); + +/** + * SSL/TLS wrappers for PKCS#11 functions + */ +static inline int mbedtls_ssl_pkcs11_decrypt( void *ctx, int mode, size_t *olen, +                        const unsigned char *input, unsigned char *output, +                        size_t output_max_len ) +{ +    return mbedtls_pkcs11_decrypt( (mbedtls_pkcs11_context *) ctx, mode, olen, input, output, +                           output_max_len ); +} + +static inline int mbedtls_ssl_pkcs11_sign( void *ctx, +                     int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, +                     int mode, mbedtls_md_type_t md_alg, unsigned int hashlen, +                     const unsigned char *hash, unsigned char *sig ) +{ +    ((void) f_rng); +    ((void) p_rng); +    return mbedtls_pkcs11_sign( (mbedtls_pkcs11_context *) ctx, mode, md_alg, +                        hashlen, hash, sig ); +} + +static inline size_t mbedtls_ssl_pkcs11_key_len( void *ctx ) +{ +    return ( (mbedtls_pkcs11_context *) ctx )->len; +} + +#ifdef __cplusplus +} +#endif + +#endif /* MBEDTLS_PKCS11_C */ + +#endif /* MBEDTLS_PKCS11_H */ diff --git a/thirdparty/mbedtls/include/mbedtls/pkcs12.h b/thirdparty/mbedtls/include/mbedtls/pkcs12.h new file mode 100644 index 0000000000..a621ef5b15 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/pkcs12.h @@ -0,0 +1,120 @@ +/** + * \file pkcs12.h + * + * \brief PKCS#12 Personal Information Exchange Syntax + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_PKCS12_H +#define MBEDTLS_PKCS12_H + +#include "md.h" +#include "cipher.h" +#include "asn1.h" + +#include <stddef.h> + +#define MBEDTLS_ERR_PKCS12_BAD_INPUT_DATA                 -0x1F80  /**< Bad input parameters to function. */ +#define MBEDTLS_ERR_PKCS12_FEATURE_UNAVAILABLE            -0x1F00  /**< Feature not available, e.g. unsupported encryption scheme. */ +#define MBEDTLS_ERR_PKCS12_PBE_INVALID_FORMAT             -0x1E80  /**< PBE ASN.1 data not as expected. */ +#define MBEDTLS_ERR_PKCS12_PASSWORD_MISMATCH              -0x1E00  /**< Given private key password does not allow for correct decryption. */ + +#define MBEDTLS_PKCS12_DERIVE_KEY       1   /**< encryption/decryption key */ +#define MBEDTLS_PKCS12_DERIVE_IV        2   /**< initialization vector     */ +#define MBEDTLS_PKCS12_DERIVE_MAC_KEY   3   /**< integrity / MAC key       */ + +#define MBEDTLS_PKCS12_PBE_DECRYPT      0 +#define MBEDTLS_PKCS12_PBE_ENCRYPT      1 + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief            PKCS12 Password Based function (encryption / decryption) + *                   for pbeWithSHAAnd128BitRC4 + * + * \param pbe_params an ASN1 buffer containing the pkcs-12PbeParams structure + * \param mode       either MBEDTLS_PKCS12_PBE_ENCRYPT or MBEDTLS_PKCS12_PBE_DECRYPT + * \param pwd        the password used (may be NULL if no password is used) + * \param pwdlen     length of the password (may be 0) + * \param input      the input data + * \param len        data length + * \param output     the output buffer + * + * \return           0 if successful, or a MBEDTLS_ERR_XXX code + */ +int mbedtls_pkcs12_pbe_sha1_rc4_128( mbedtls_asn1_buf *pbe_params, int mode, +                             const unsigned char *pwd,  size_t pwdlen, +                             const unsigned char *input, size_t len, +                             unsigned char *output ); + +/** + * \brief            PKCS12 Password Based function (encryption / decryption) + *                   for cipher-based and mbedtls_md-based PBE's + * + * \param pbe_params an ASN1 buffer containing the pkcs-12PbeParams structure + * \param mode       either MBEDTLS_PKCS12_PBE_ENCRYPT or MBEDTLS_PKCS12_PBE_DECRYPT + * \param cipher_type the cipher used + * \param md_type     the mbedtls_md used + * \param pwd        the password used (may be NULL if no password is used) + * \param pwdlen     length of the password (may be 0) + * \param input      the input data + * \param len        data length + * \param output     the output buffer + * + * \return           0 if successful, or a MBEDTLS_ERR_XXX code + */ +int mbedtls_pkcs12_pbe( mbedtls_asn1_buf *pbe_params, int mode, +                mbedtls_cipher_type_t cipher_type, mbedtls_md_type_t md_type, +                const unsigned char *pwd,  size_t pwdlen, +                const unsigned char *input, size_t len, +                unsigned char *output ); + +/** + * \brief            The PKCS#12 derivation function uses a password and a salt + *                   to produce pseudo-random bits for a particular "purpose". + * + *                   Depending on the given id, this function can produce an + *                   encryption/decryption key, an nitialization vector or an + *                   integrity key. + * + * \param data       buffer to store the derived data in + * \param datalen    length to fill + * \param pwd        password to use (may be NULL if no password is used) + * \param pwdlen     length of the password (may be 0) + * \param salt       salt buffer to use + * \param saltlen    length of the salt + * \param mbedtls_md         mbedtls_md type to use during the derivation + * \param id         id that describes the purpose (can be MBEDTLS_PKCS12_DERIVE_KEY, + *                   MBEDTLS_PKCS12_DERIVE_IV or MBEDTLS_PKCS12_DERIVE_MAC_KEY) + * \param iterations number of iterations + * + * \return          0 if successful, or a MD, BIGNUM type error. + */ +int mbedtls_pkcs12_derivation( unsigned char *data, size_t datalen, +                       const unsigned char *pwd, size_t pwdlen, +                       const unsigned char *salt, size_t saltlen, +                       mbedtls_md_type_t mbedtls_md, int id, int iterations ); + +#ifdef __cplusplus +} +#endif + +#endif /* pkcs12.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/pkcs5.h b/thirdparty/mbedtls/include/mbedtls/pkcs5.h new file mode 100644 index 0000000000..9a3c9fddcc --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/pkcs5.h @@ -0,0 +1,95 @@ +/** + * \file pkcs5.h + * + * \brief PKCS#5 functions + * + * \author Mathias Olsson <mathias@kompetensum.com> + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_PKCS5_H +#define MBEDTLS_PKCS5_H + +#include "asn1.h" +#include "md.h" + +#include <stddef.h> +#include <stdint.h> + +#define MBEDTLS_ERR_PKCS5_BAD_INPUT_DATA                  -0x2f80  /**< Bad input parameters to function. */ +#define MBEDTLS_ERR_PKCS5_INVALID_FORMAT                  -0x2f00  /**< Unexpected ASN.1 data. */ +#define MBEDTLS_ERR_PKCS5_FEATURE_UNAVAILABLE             -0x2e80  /**< Requested encryption or digest alg not available. */ +#define MBEDTLS_ERR_PKCS5_PASSWORD_MISMATCH               -0x2e00  /**< Given private key password does not allow for correct decryption. */ + +#define MBEDTLS_PKCS5_DECRYPT      0 +#define MBEDTLS_PKCS5_ENCRYPT      1 + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          PKCS#5 PBES2 function + * + * \param pbe_params the ASN.1 algorithm parameters + * \param mode       either MBEDTLS_PKCS5_DECRYPT or MBEDTLS_PKCS5_ENCRYPT + * \param pwd        password to use when generating key + * \param pwdlen     length of password + * \param data       data to process + * \param datalen    length of data + * \param output     output buffer + * + * \returns        0 on success, or a MBEDTLS_ERR_XXX code if verification fails. + */ +int mbedtls_pkcs5_pbes2( const mbedtls_asn1_buf *pbe_params, int mode, +                 const unsigned char *pwd,  size_t pwdlen, +                 const unsigned char *data, size_t datalen, +                 unsigned char *output ); + +/** + * \brief          PKCS#5 PBKDF2 using HMAC + * + * \param ctx      Generic HMAC context + * \param password Password to use when generating key + * \param plen     Length of password + * \param salt     Salt to use when generating key + * \param slen     Length of salt + * \param iteration_count       Iteration count + * \param key_length            Length of generated key in bytes + * \param output   Generated key. Must be at least as big as key_length + * + * \returns        0 on success, or a MBEDTLS_ERR_XXX code if verification fails. + */ +int mbedtls_pkcs5_pbkdf2_hmac( mbedtls_md_context_t *ctx, const unsigned char *password, +                       size_t plen, const unsigned char *salt, size_t slen, +                       unsigned int iteration_count, +                       uint32_t key_length, unsigned char *output ); + +/** + * \brief          Checkup routine + * + * \return         0 if successful, or 1 if the test failed + */ +int mbedtls_pkcs5_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + +#endif /* pkcs5.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/platform.h b/thirdparty/mbedtls/include/mbedtls/platform.h new file mode 100644 index 0000000000..ed10775848 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/platform.h @@ -0,0 +1,348 @@ +/** + * \file platform.h + * + * \brief The Mbed TLS platform abstraction layer. + */ +/* + *  Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of Mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_PLATFORM_H +#define MBEDTLS_PLATFORM_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#if defined(MBEDTLS_HAVE_TIME) +#include "mbedtls/platform_time.h" +#endif + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \name SECTION: Module settings + * + * The configuration options you can set for this module are in this section. + * Either change them in config.h or define them on the compiler command line. + * \{ + */ + +#if !defined(MBEDTLS_PLATFORM_NO_STD_FUNCTIONS) +#include <stdio.h> +#include <stdlib.h> +#include <time.h> +#if !defined(MBEDTLS_PLATFORM_STD_SNPRINTF) +#if defined(_WIN32) +#define MBEDTLS_PLATFORM_STD_SNPRINTF   mbedtls_platform_win32_snprintf /**< The default \c snprintf function to use.  */ +#else +#define MBEDTLS_PLATFORM_STD_SNPRINTF   snprintf /**< The default \c snprintf function to use.  */ +#endif +#endif +#if !defined(MBEDTLS_PLATFORM_STD_PRINTF) +#define MBEDTLS_PLATFORM_STD_PRINTF   printf /**< The default \c printf function to use. */ +#endif +#if !defined(MBEDTLS_PLATFORM_STD_FPRINTF) +#define MBEDTLS_PLATFORM_STD_FPRINTF fprintf /**< The default \c fprintf function to use. */ +#endif +#if !defined(MBEDTLS_PLATFORM_STD_CALLOC) +#define MBEDTLS_PLATFORM_STD_CALLOC   calloc /**< The default \c calloc function to use. */ +#endif +#if !defined(MBEDTLS_PLATFORM_STD_FREE) +#define MBEDTLS_PLATFORM_STD_FREE       free /**< The default \c free function to use. */ +#endif +#if !defined(MBEDTLS_PLATFORM_STD_EXIT) +#define MBEDTLS_PLATFORM_STD_EXIT      exit /**< The default \c exit function to use. */ +#endif +#if !defined(MBEDTLS_PLATFORM_STD_TIME) +#define MBEDTLS_PLATFORM_STD_TIME       time    /**< The default \c time function to use. */ +#endif +#if !defined(MBEDTLS_PLATFORM_STD_EXIT_SUCCESS) +#define MBEDTLS_PLATFORM_STD_EXIT_SUCCESS  EXIT_SUCCESS /**< The default exit value to use. */ +#endif +#if !defined(MBEDTLS_PLATFORM_STD_EXIT_FAILURE) +#define MBEDTLS_PLATFORM_STD_EXIT_FAILURE  EXIT_FAILURE /**< The default exit value to use. */ +#endif +#if defined(MBEDTLS_FS_IO) +#if !defined(MBEDTLS_PLATFORM_STD_NV_SEED_READ) +#define MBEDTLS_PLATFORM_STD_NV_SEED_READ   mbedtls_platform_std_nv_seed_read +#endif +#if !defined(MBEDTLS_PLATFORM_STD_NV_SEED_WRITE) +#define MBEDTLS_PLATFORM_STD_NV_SEED_WRITE  mbedtls_platform_std_nv_seed_write +#endif +#if !defined(MBEDTLS_PLATFORM_STD_NV_SEED_FILE) +#define MBEDTLS_PLATFORM_STD_NV_SEED_FILE   "seedfile" +#endif +#endif /* MBEDTLS_FS_IO */ +#else /* MBEDTLS_PLATFORM_NO_STD_FUNCTIONS */ +#if defined(MBEDTLS_PLATFORM_STD_MEM_HDR) +#include MBEDTLS_PLATFORM_STD_MEM_HDR +#endif +#endif /* MBEDTLS_PLATFORM_NO_STD_FUNCTIONS */ + + +/* \} name SECTION: Module settings */ + +/* + * The function pointers for calloc and free + */ +#if defined(MBEDTLS_PLATFORM_MEMORY) +#if defined(MBEDTLS_PLATFORM_FREE_MACRO) && \ +    defined(MBEDTLS_PLATFORM_CALLOC_MACRO) +#define mbedtls_free       MBEDTLS_PLATFORM_FREE_MACRO +#define mbedtls_calloc     MBEDTLS_PLATFORM_CALLOC_MACRO +#else +/* For size_t */ +#include <stddef.h> +extern void * (*mbedtls_calloc)( size_t n, size_t size ); +extern void (*mbedtls_free)( void *ptr ); + +/** + * \brief   This function allows configuring custom memory-management functions. + * + * \param calloc_func   The \c calloc function implementation. + * \param free_func     The \c free function implementation. + * + * \return              \c 0. + */ +int mbedtls_platform_set_calloc_free( void * (*calloc_func)( size_t, size_t ), +                              void (*free_func)( void * ) ); +#endif /* MBEDTLS_PLATFORM_FREE_MACRO && MBEDTLS_PLATFORM_CALLOC_MACRO */ +#else /* !MBEDTLS_PLATFORM_MEMORY */ +#define mbedtls_free       free +#define mbedtls_calloc     calloc +#endif /* MBEDTLS_PLATFORM_MEMORY && !MBEDTLS_PLATFORM_{FREE,CALLOC}_MACRO */ + +/* + * The function pointers for fprintf + */ +#if defined(MBEDTLS_PLATFORM_FPRINTF_ALT) +/* We need FILE * */ +#include <stdio.h> +extern int (*mbedtls_fprintf)( FILE *stream, const char *format, ... ); + +/** + * \brief   This function allows configuring a custom \p fprintf function pointer. + * + * \param fprintf_func   The \c fprintf function implementation. + * + * \return               \c 0. + */ +int mbedtls_platform_set_fprintf( int (*fprintf_func)( FILE *stream, const char *, +                                               ... ) ); +#else +#if defined(MBEDTLS_PLATFORM_FPRINTF_MACRO) +#define mbedtls_fprintf    MBEDTLS_PLATFORM_FPRINTF_MACRO +#else +#define mbedtls_fprintf    fprintf +#endif /* MBEDTLS_PLATFORM_FPRINTF_MACRO */ +#endif /* MBEDTLS_PLATFORM_FPRINTF_ALT */ + +/* + * The function pointers for printf + */ +#if defined(MBEDTLS_PLATFORM_PRINTF_ALT) +extern int (*mbedtls_printf)( const char *format, ... ); + +/** + * \brief    This function allows configuring a custom \c printf function + *           pointer. + * + * \param printf_func   The \c printf function implementation. + * + * \return              \c 0 on success. + */ +int mbedtls_platform_set_printf( int (*printf_func)( const char *, ... ) ); +#else /* !MBEDTLS_PLATFORM_PRINTF_ALT */ +#if defined(MBEDTLS_PLATFORM_PRINTF_MACRO) +#define mbedtls_printf     MBEDTLS_PLATFORM_PRINTF_MACRO +#else +#define mbedtls_printf     printf +#endif /* MBEDTLS_PLATFORM_PRINTF_MACRO */ +#endif /* MBEDTLS_PLATFORM_PRINTF_ALT */ + +/* + * The function pointers for snprintf + * + * The snprintf implementation should conform to C99: + * - it *must* always correctly zero-terminate the buffer + *   (except when n == 0, then it must leave the buffer untouched) + * - however it is acceptable to return -1 instead of the required length when + *   the destination buffer is too short. + */ +#if defined(_WIN32) +/* For Windows (inc. MSYS2), we provide our own fixed implementation */ +int mbedtls_platform_win32_snprintf( char *s, size_t n, const char *fmt, ... ); +#endif + +#if defined(MBEDTLS_PLATFORM_SNPRINTF_ALT) +extern int (*mbedtls_snprintf)( char * s, size_t n, const char * format, ... ); + +/** + * \brief   This function allows configuring a custom \c snprintf function + *          pointer. + * + * \param snprintf_func   The \c snprintf function implementation. + * + * \return    \c 0 on success. + */ +int mbedtls_platform_set_snprintf( int (*snprintf_func)( char * s, size_t n, +                                                 const char * format, ... ) ); +#else /* MBEDTLS_PLATFORM_SNPRINTF_ALT */ +#if defined(MBEDTLS_PLATFORM_SNPRINTF_MACRO) +#define mbedtls_snprintf   MBEDTLS_PLATFORM_SNPRINTF_MACRO +#else +#define mbedtls_snprintf   snprintf +#endif /* MBEDTLS_PLATFORM_SNPRINTF_MACRO */ +#endif /* MBEDTLS_PLATFORM_SNPRINTF_ALT */ + +/* + * The function pointers for exit + */ +#if defined(MBEDTLS_PLATFORM_EXIT_ALT) +extern void (*mbedtls_exit)( int status ); + +/** + * \brief   This function allows configuring a custom \c exit function + *          pointer. + * + * \param exit_func   The \c exit function implementation. + * + * \return  \c 0 on success. + */ +int mbedtls_platform_set_exit( void (*exit_func)( int status ) ); +#else +#if defined(MBEDTLS_PLATFORM_EXIT_MACRO) +#define mbedtls_exit   MBEDTLS_PLATFORM_EXIT_MACRO +#else +#define mbedtls_exit   exit +#endif /* MBEDTLS_PLATFORM_EXIT_MACRO */ +#endif /* MBEDTLS_PLATFORM_EXIT_ALT */ + +/* + * The default exit values + */ +#if defined(MBEDTLS_PLATFORM_STD_EXIT_SUCCESS) +#define MBEDTLS_EXIT_SUCCESS MBEDTLS_PLATFORM_STD_EXIT_SUCCESS +#else +#define MBEDTLS_EXIT_SUCCESS 0 +#endif +#if defined(MBEDTLS_PLATFORM_STD_EXIT_FAILURE) +#define MBEDTLS_EXIT_FAILURE MBEDTLS_PLATFORM_STD_EXIT_FAILURE +#else +#define MBEDTLS_EXIT_FAILURE 1 +#endif + +/* + * The function pointers for reading from and writing a seed file to + * Non-Volatile storage (NV) in a platform-independent way + * + * Only enabled when the NV seed entropy source is enabled + */ +#if defined(MBEDTLS_ENTROPY_NV_SEED) +#if !defined(MBEDTLS_PLATFORM_NO_STD_FUNCTIONS) && defined(MBEDTLS_FS_IO) +/* Internal standard platform definitions */ +int mbedtls_platform_std_nv_seed_read( unsigned char *buf, size_t buf_len ); +int mbedtls_platform_std_nv_seed_write( unsigned char *buf, size_t buf_len ); +#endif + +#if defined(MBEDTLS_PLATFORM_NV_SEED_ALT) +extern int (*mbedtls_nv_seed_read)( unsigned char *buf, size_t buf_len ); +extern int (*mbedtls_nv_seed_write)( unsigned char *buf, size_t buf_len ); + +/** + * \brief   This function allows configuring custom seed file writing and + *          reading functions. + * + * \param   nv_seed_read_func   The seed reading function implementation. + * \param   nv_seed_write_func  The seed writing function implementation. + * + * \return  \c 0 on success. + */ +int mbedtls_platform_set_nv_seed( +            int (*nv_seed_read_func)( unsigned char *buf, size_t buf_len ), +            int (*nv_seed_write_func)( unsigned char *buf, size_t buf_len ) +            ); +#else +#if defined(MBEDTLS_PLATFORM_NV_SEED_READ_MACRO) && \ +    defined(MBEDTLS_PLATFORM_NV_SEED_WRITE_MACRO) +#define mbedtls_nv_seed_read    MBEDTLS_PLATFORM_NV_SEED_READ_MACRO +#define mbedtls_nv_seed_write   MBEDTLS_PLATFORM_NV_SEED_WRITE_MACRO +#else +#define mbedtls_nv_seed_read    mbedtls_platform_std_nv_seed_read +#define mbedtls_nv_seed_write   mbedtls_platform_std_nv_seed_write +#endif +#endif /* MBEDTLS_PLATFORM_NV_SEED_ALT */ +#endif /* MBEDTLS_ENTROPY_NV_SEED */ + +#if !defined(MBEDTLS_PLATFORM_SETUP_TEARDOWN_ALT) + +/** + * \brief   The platform context structure. + * + * \note    This structure may be used to assist platform-specific + *          setup or teardown operations. + */ +typedef struct { +    char dummy; /**< Placeholder member, as empty structs are not portable. */ +} +mbedtls_platform_context; + +#else +#include "platform_alt.h" +#endif /* !MBEDTLS_PLATFORM_SETUP_TEARDOWN_ALT */ + +/** + * \brief   This function performs any platform initialization operations. + * + * \param   ctx     The Mbed TLS context. + * + * \return  \c 0 on success. + * + * \note    This function is intended to allow platform-specific initialization, + *          and should be called before any other library functions. Its + *          implementation is platform-specific, and unless + *          platform-specific code is provided, it does nothing. + * + *          Its use and whether it is necessary to call it is dependent on the + *          platform. + */ +int mbedtls_platform_setup( mbedtls_platform_context *ctx ); +/** + * \brief   This function performs any platform teardown operations. + * + * \param   ctx     The Mbed TLS context. + * + * \note    This function should be called after every other Mbed TLS module + *          has been correctly freed using the appropriate free function. + *          Its implementation is platform-specific, and unless + *          platform-specific code is provided, it does nothing. + * + *          Its use and whether it is necessary to call it is dependent on the + *          platform. + */ +void mbedtls_platform_teardown( mbedtls_platform_context *ctx ); + +#ifdef __cplusplus +} +#endif + +#endif /* platform.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/platform_time.h b/thirdparty/mbedtls/include/mbedtls/platform_time.h new file mode 100644 index 0000000000..2ed36f56c9 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/platform_time.h @@ -0,0 +1,82 @@ +/** + * \file platform_time.h + * + * \brief mbed TLS Platform time abstraction + */ +/* + *  Copyright (C) 2006-2016, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_PLATFORM_TIME_H +#define MBEDTLS_PLATFORM_TIME_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \name SECTION: Module settings + * + * The configuration options you can set for this module are in this section. + * Either change them in config.h or define them on the compiler command line. + * \{ + */ + +/* + * The time_t datatype + */ +#if defined(MBEDTLS_PLATFORM_TIME_TYPE_MACRO) +typedef MBEDTLS_PLATFORM_TIME_TYPE_MACRO mbedtls_time_t; +#else +/* For time_t */ +#include <time.h> +typedef time_t mbedtls_time_t; +#endif /* MBEDTLS_PLATFORM_TIME_TYPE_MACRO */ + +/* + * The function pointers for time + */ +#if defined(MBEDTLS_PLATFORM_TIME_ALT) +extern mbedtls_time_t (*mbedtls_time)( mbedtls_time_t* time ); + +/** + * \brief   Set your own time function pointer + * + * \param   time_func   the time function implementation + * + * \return              0 + */ +int mbedtls_platform_set_time( mbedtls_time_t (*time_func)( mbedtls_time_t* time ) ); +#else +#if defined(MBEDTLS_PLATFORM_TIME_MACRO) +#define mbedtls_time    MBEDTLS_PLATFORM_TIME_MACRO +#else +#define mbedtls_time   time +#endif /* MBEDTLS_PLATFORM_TIME_MACRO */ +#endif /* MBEDTLS_PLATFORM_TIME_ALT */ + +#ifdef __cplusplus +} +#endif + +#endif /* platform_time.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/ripemd160.h b/thirdparty/mbedtls/include/mbedtls/ripemd160.h new file mode 100644 index 0000000000..c21868b185 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/ripemd160.h @@ -0,0 +1,260 @@ +/** + * \file ripemd160.h + * + * \brief RIPE MD-160 message digest + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_RIPEMD160_H +#define MBEDTLS_RIPEMD160_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> +#include <stdint.h> + +#define MBEDTLS_ERR_RIPEMD160_HW_ACCEL_FAILED             -0x0031  /**< RIPEMD160 hardware accelerator failed */ + +#if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \ +    !defined(inline) && !defined(__cplusplus) +#define inline __inline +#endif + +#if !defined(MBEDTLS_RIPEMD160_ALT) +// Regular implementation +// + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          RIPEMD-160 context structure + */ +typedef struct +{ +    uint32_t total[2];          /*!< number of bytes processed  */ +    uint32_t state[5];          /*!< intermediate digest state  */ +    unsigned char buffer[64];   /*!< data block being processed */ +} +mbedtls_ripemd160_context; + +/** + * \brief          Initialize RIPEMD-160 context + * + * \param ctx      RIPEMD-160 context to be initialized + */ +void mbedtls_ripemd160_init( mbedtls_ripemd160_context *ctx ); + +/** + * \brief          Clear RIPEMD-160 context + * + * \param ctx      RIPEMD-160 context to be cleared + */ +void mbedtls_ripemd160_free( mbedtls_ripemd160_context *ctx ); + +/** + * \brief          Clone (the state of) an RIPEMD-160 context + * + * \param dst      The destination context + * \param src      The context to be cloned + */ +void mbedtls_ripemd160_clone( mbedtls_ripemd160_context *dst, +                        const mbedtls_ripemd160_context *src ); + +/** + * \brief          RIPEMD-160 context setup + * + * \param ctx      context to be initialized + * + * \return         0 if successful + */ +int mbedtls_ripemd160_starts_ret( mbedtls_ripemd160_context *ctx ); + +/** + * \brief          RIPEMD-160 process buffer + * + * \param ctx      RIPEMD-160 context + * \param input    buffer holding the data + * \param ilen     length of the input data + * + * \return         0 if successful + */ +int mbedtls_ripemd160_update_ret( mbedtls_ripemd160_context *ctx, +                                  const unsigned char *input, +                                  size_t ilen ); + +/** + * \brief          RIPEMD-160 final digest + * + * \param ctx      RIPEMD-160 context + * \param output   RIPEMD-160 checksum result + * + * \return         0 if successful + */ +int mbedtls_ripemd160_finish_ret( mbedtls_ripemd160_context *ctx, +                                  unsigned char output[20] ); + +/** + * \brief          RIPEMD-160 process data block (internal use only) + * + * \param ctx      RIPEMD-160 context + * \param data     buffer holding one block of data + * + * \return         0 if successful + */ +int mbedtls_internal_ripemd160_process( mbedtls_ripemd160_context *ctx, +                                        const unsigned char data[64] ); + +#if !defined(MBEDTLS_DEPRECATED_REMOVED) +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED      __attribute__((deprecated)) +#else +#define MBEDTLS_DEPRECATED +#endif +/** + * \brief          RIPEMD-160 context setup + * + * \deprecated     Superseded by mbedtls_ripemd160_starts_ret() in 2.7.0 + * + * \param ctx      context to be initialized + */ +MBEDTLS_DEPRECATED static inline void mbedtls_ripemd160_starts( +                                            mbedtls_ripemd160_context *ctx ) +{ +    mbedtls_ripemd160_starts_ret( ctx ); +} + +/** + * \brief          RIPEMD-160 process buffer + * + * \deprecated     Superseded by mbedtls_ripemd160_update_ret() in 2.7.0 + * + * \param ctx      RIPEMD-160 context + * \param input    buffer holding the data + * \param ilen     length of the input data + */ +MBEDTLS_DEPRECATED static inline void mbedtls_ripemd160_update( +                                                mbedtls_ripemd160_context *ctx, +                                                const unsigned char *input, +                                                size_t ilen ) +{ +    mbedtls_ripemd160_update_ret( ctx, input, ilen ); +} + +/** + * \brief          RIPEMD-160 final digest + * + * \deprecated     Superseded by mbedtls_ripemd160_finish_ret() in 2.7.0 + * + * \param ctx      RIPEMD-160 context + * \param output   RIPEMD-160 checksum result + */ +MBEDTLS_DEPRECATED static inline void mbedtls_ripemd160_finish( +                                                mbedtls_ripemd160_context *ctx, +                                                unsigned char output[20] ) +{ +    mbedtls_ripemd160_finish_ret( ctx, output ); +} + +/** + * \brief          RIPEMD-160 process data block (internal use only) + * + * \deprecated     Superseded by mbedtls_internal_ripemd160_process() in 2.7.0 + * + * \param ctx      RIPEMD-160 context + * \param data     buffer holding one block of data + */ +MBEDTLS_DEPRECATED static inline void mbedtls_ripemd160_process( +                                            mbedtls_ripemd160_context *ctx, +                                            const unsigned char data[64] ) +{ +    mbedtls_internal_ripemd160_process( ctx, data ); +} + +#undef MBEDTLS_DEPRECATED +#endif /* !MBEDTLS_DEPRECATED_REMOVED */ + +#ifdef __cplusplus +} +#endif + +#else  /* MBEDTLS_RIPEMD160_ALT */ +#include "ripemd160_alt.h" +#endif /* MBEDTLS_RIPEMD160_ALT */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          Output = RIPEMD-160( input buffer ) + * + * \param input    buffer holding the data + * \param ilen     length of the input data + * \param output   RIPEMD-160 checksum result + * + * \return         0 if successful + */ +int mbedtls_ripemd160_ret( const unsigned char *input, +                           size_t ilen, +                           unsigned char output[20] ); + +#if !defined(MBEDTLS_DEPRECATED_REMOVED) +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED      __attribute__((deprecated)) +#else +#define MBEDTLS_DEPRECATED +#endif +/** + * \brief          Output = RIPEMD-160( input buffer ) + * + * \deprecated     Superseded by mbedtls_ripemd160_ret() in 2.7.0 + * + * \param input    buffer holding the data + * \param ilen     length of the input data + * \param output   RIPEMD-160 checksum result + */ +MBEDTLS_DEPRECATED static inline void mbedtls_ripemd160( +                                                    const unsigned char *input, +                                                    size_t ilen, +                                                    unsigned char output[20] ) +{ +    mbedtls_ripemd160_ret( input, ilen, output ); +} + +#undef MBEDTLS_DEPRECATED +#endif /* !MBEDTLS_DEPRECATED_REMOVED */ + +/** + * \brief          Checkup routine + * + * \return         0 if successful, or 1 if the test failed + */ +int mbedtls_ripemd160_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + +#endif /* mbedtls_ripemd160.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/rsa.h b/thirdparty/mbedtls/include/mbedtls/rsa.h new file mode 100644 index 0000000000..fb2f77f94f --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/rsa.h @@ -0,0 +1,1126 @@ +/** + * \file rsa.h + * + * \brief The RSA public-key cryptosystem. + * + * For more information, see <em>Public-Key Cryptography Standards (PKCS) + * #1 v1.5: RSA Encryption</em> and <em>Public-Key Cryptography Standards + * (PKCS) #1 v2.1: RSA Cryptography Specifications</em>. + * + */ +/* + *  Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of Mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_RSA_H +#define MBEDTLS_RSA_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include "bignum.h" +#include "md.h" + +#if defined(MBEDTLS_THREADING_C) +#include "threading.h" +#endif + +/* + * RSA Error codes + */ +#define MBEDTLS_ERR_RSA_BAD_INPUT_DATA                    -0x4080  /**< Bad input parameters to function. */ +#define MBEDTLS_ERR_RSA_INVALID_PADDING                   -0x4100  /**< Input data contains invalid padding and is rejected. */ +#define MBEDTLS_ERR_RSA_KEY_GEN_FAILED                    -0x4180  /**< Something failed during generation of a key. */ +#define MBEDTLS_ERR_RSA_KEY_CHECK_FAILED                  -0x4200  /**< Key failed to pass the validity check of the library. */ +#define MBEDTLS_ERR_RSA_PUBLIC_FAILED                     -0x4280  /**< The public key operation failed. */ +#define MBEDTLS_ERR_RSA_PRIVATE_FAILED                    -0x4300  /**< The private key operation failed. */ +#define MBEDTLS_ERR_RSA_VERIFY_FAILED                     -0x4380  /**< The PKCS#1 verification failed. */ +#define MBEDTLS_ERR_RSA_OUTPUT_TOO_LARGE                  -0x4400  /**< The output buffer for decryption is not large enough. */ +#define MBEDTLS_ERR_RSA_RNG_FAILED                        -0x4480  /**< The random generator failed to generate non-zeros. */ +#define MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION             -0x4500  /**< The implementation does not offer the requested operation, for example, because of security violations or lack of functionality. */ +#define MBEDTLS_ERR_RSA_HW_ACCEL_FAILED                   -0x4580  /**< RSA hardware accelerator failed. */ + +/* + * RSA constants + */ +#define MBEDTLS_RSA_PUBLIC      0 /**< Request private key operation. */ +#define MBEDTLS_RSA_PRIVATE     1 /**< Request public key operation. */ + +#define MBEDTLS_RSA_PKCS_V15    0 /**< Use PKCS-1 v1.5 encoding. */ +#define MBEDTLS_RSA_PKCS_V21    1 /**< Use PKCS-1 v2.1 encoding. */ + +#define MBEDTLS_RSA_SIGN        1 /**< Identifier for RSA signature operations. */ +#define MBEDTLS_RSA_CRYPT       2 /**< Identifier for RSA encryption and decryption operations. */ + +#define MBEDTLS_RSA_SALT_LEN_ANY    -1 + +/* + * The above constants may be used even if the RSA module is compile out, + * eg for alternative (PKCS#11) RSA implemenations in the PK layers. + */ + +#if !defined(MBEDTLS_RSA_ALT) +// Regular implementation +// + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief   The RSA context structure. + * + * \note    Direct manipulation of the members of this structure + *          is deprecated. All manipulation should instead be done through + *          the public interface functions. + */ +typedef struct +{ +    int ver;                    /*!<  Always 0.*/ +    size_t len;                 /*!<  The size of \p N in Bytes. */ + +    mbedtls_mpi N;                      /*!<  The public modulus. */ +    mbedtls_mpi E;                      /*!<  The public exponent. */ + +    mbedtls_mpi D;                      /*!<  The private exponent. */ +    mbedtls_mpi P;                      /*!<  The first prime factor. */ +    mbedtls_mpi Q;                      /*!<  The second prime factor. */ + +    mbedtls_mpi DP;                     /*!<  \p D % (P - 1)       */ +    mbedtls_mpi DQ;                     /*!<  \p D % (Q - 1)       */ +    mbedtls_mpi QP;                     /*!<  1 / (Q % P)       */ + +    mbedtls_mpi RN;                     /*!<  cached R^2 mod \p N  */ + +    mbedtls_mpi RP;                     /*!<  cached R^2 mod \p P  */ +    mbedtls_mpi RQ;                     /*!<  cached R^2 mod \p Q  */ + +    mbedtls_mpi Vi;                     /*!<  The cached blinding value. */ +    mbedtls_mpi Vf;                     /*!<  The cached un-blinding value. */ + +    int padding;                /*!< Selects padding mode: +                                     #MBEDTLS_RSA_PKCS_V15 for 1.5 padding and +                                     #MBEDTLS_RSA_PKCS_V21 for OAEP or PSS. */ +    int hash_id;                /*!< Hash identifier of mbedtls_md_type_t type, +                                     as specified in md.h for use in the MGF +                                     mask generating function used in the +                                     EME-OAEP and EMSA-PSS encodings. */ +#if defined(MBEDTLS_THREADING_C) +    mbedtls_threading_mutex_t mutex;    /*!<  Thread-safety mutex. */ +#endif +} +mbedtls_rsa_context; + +/** + * \brief          This function initializes an RSA context. + * + * \note           Set padding to #MBEDTLS_RSA_PKCS_V21 for the RSAES-OAEP + *                 encryption scheme and the RSASSA-PSS signature scheme. + * + * \param ctx      The RSA context to initialize. + * \param padding  Selects padding mode: #MBEDTLS_RSA_PKCS_V15 or + *                 #MBEDTLS_RSA_PKCS_V21. + * \param hash_id  The hash identifier of #mbedtls_md_type_t type, if + *                 \p padding is #MBEDTLS_RSA_PKCS_V21. + * + * \note           The \p hash_id parameter is ignored when using + *                 #MBEDTLS_RSA_PKCS_V15 padding. + * + * \note           The choice of padding mode is strictly enforced for private key + *                 operations, since there might be security concerns in + *                 mixing padding modes. For public key operations it is + *                 a default value, which can be overriden by calling specific + *                 \c rsa_rsaes_xxx or \c rsa_rsassa_xxx functions. + * + * \note           The hash selected in \p hash_id is always used for OEAP + *                 encryption. For PSS signatures, it is always used for + *                 making signatures, but can be overriden for verifying them. + *                 If set to #MBEDTLS_MD_NONE, it is always overriden. + */ +void mbedtls_rsa_init( mbedtls_rsa_context *ctx, +                       int padding, +                       int hash_id); + +/** + * \brief          This function imports a set of core parameters into an + *                 RSA context. + * + * \param ctx      The initialized RSA context to store the parameters in. + * \param N        The RSA modulus, or NULL. + * \param P        The first prime factor of \p N, or NULL. + * \param Q        The second prime factor of \p N, or NULL. + * \param D        The private exponent, or NULL. + * \param E        The public exponent, or NULL. + * + * \note           This function can be called multiple times for successive + *                 imports, if the parameters are not simultaneously present. + * + *                 Any sequence of calls to this function should be followed + *                 by a call to mbedtls_rsa_complete(), which checks and + *                 completes the provided information to a ready-for-use + *                 public or private RSA key. + * + * \note           See mbedtls_rsa_complete() for more information on which + *                 parameters are necessary to set up a private or public + *                 RSA key. + * + * \note           The imported parameters are copied and need not be preserved + *                 for the lifetime of the RSA context being set up. + * + * \return         \c 0 on success, or a non-zero error code on failure. + */ +int mbedtls_rsa_import( mbedtls_rsa_context *ctx, +                        const mbedtls_mpi *N, +                        const mbedtls_mpi *P, const mbedtls_mpi *Q, +                        const mbedtls_mpi *D, const mbedtls_mpi *E ); + +/** + * \brief          This function imports core RSA parameters, in raw big-endian + *                 binary format, into an RSA context. + * + * \param ctx      The initialized RSA context to store the parameters in. + * \param N        The RSA modulus, or NULL. + * \param N_len    The Byte length of \p N, ignored if \p N == NULL. + * \param P        The first prime factor of \p N, or NULL. + * \param P_len    The Byte length of \p P, ignored if \p P == NULL. + * \param Q        The second prime factor of \p N, or NULL. + * \param Q_len    The Byte length of \p Q, ignored if \p Q == NULL. + * \param D        The private exponent, or NULL. + * \param D_len    The Byte length of \p D, ignored if \p D == NULL. + * \param E        The public exponent, or NULL. + * \param E_len    The Byte length of \p E, ignored if \p E == NULL. + * + * \note           This function can be called multiple times for successive + *                 imports, if the parameters are not simultaneously present. + * + *                 Any sequence of calls to this function should be followed + *                 by a call to mbedtls_rsa_complete(), which checks and + *                 completes the provided information to a ready-for-use + *                 public or private RSA key. + * + * \note           See mbedtls_rsa_complete() for more information on which + *                 parameters are necessary to set up a private or public + *                 RSA key. + * + * \note           The imported parameters are copied and need not be preserved + *                 for the lifetime of the RSA context being set up. + * + * \return         \c 0 on success, or a non-zero error code on failure. + */ +int mbedtls_rsa_import_raw( mbedtls_rsa_context *ctx, +                            unsigned char const *N, size_t N_len, +                            unsigned char const *P, size_t P_len, +                            unsigned char const *Q, size_t Q_len, +                            unsigned char const *D, size_t D_len, +                            unsigned char const *E, size_t E_len ); + +/** + * \brief          This function completes an RSA context from + *                 a set of imported core parameters. + * + *                 To setup an RSA public key, precisely \p N and \p E + *                 must have been imported. + * + *                 To setup an RSA private key, sufficient information must + *                 be present for the other parameters to be derivable. + * + *                 The default implementation supports the following: + *                 <ul><li>Derive \p P, \p Q from \p N, \p D, \p E.</li> + *                 <li>Derive \p N, \p D from \p P, \p Q, \p E.</li></ul> + *                 Alternative implementations need not support these. + * + *                 If this function runs successfully, it guarantees that + *                 the RSA context can be used for RSA operations without + *                 the risk of failure or crash. + * + * \param ctx      The initialized RSA context holding imported parameters. + * + * \return         \c 0 on success, or #MBEDTLS_ERR_RSA_BAD_INPUT_DATA if the + *                 attempted derivations failed. + * + * \warning        This function need not perform consistency checks + *                 for the imported parameters. In particular, parameters that + *                 are not needed by the implementation might be silently + *                 discarded and left unchecked. To check the consistency + *                 of the key material, see mbedtls_rsa_check_privkey(). + * + */ +int mbedtls_rsa_complete( mbedtls_rsa_context *ctx ); + +/** + * \brief          This function exports the core parameters of an RSA key. + * + *                 If this function runs successfully, the non-NULL buffers + *                 pointed to by \p N, \p P, \p Q, \p D, and \p E are fully + *                 written, with additional unused space filled leading by + *                 zero Bytes. + * + *                 Possible reasons for returning + *                 #MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION:<ul> + *                 <li>An alternative RSA implementation is in use, which + *                 stores the key externally, and either cannot or should + *                 not export it into RAM.</li> + *                 <li>A SW or HW implementation might not support a certain + *                 deduction. For example, \p P, \p Q from \p N, \p D, + *                 and \p E if the former are not part of the + *                 implementation.</li></ul> + * + *                 If the function fails due to an unsupported operation, + *                 the RSA context stays intact and remains usable. + * + * \param ctx      The initialized RSA context. + * \param N        The MPI to hold the RSA modulus, or NULL. + * \param P        The MPI to hold the first prime factor of \p N, or NULL. + * \param Q        The MPI to hold the second prime factor of \p N, or NULL. + * \param D        The MPI to hold the private exponent, or NULL. + * \param E        The MPI to hold the public exponent, or NULL. + * + * \return         \c 0 on success, + *                 #MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION if exporting the + *                 requested parameters cannot be done due to missing + *                 functionality or because of security policies, + *                 or a non-zero return code on any other failure. + * + */ +int mbedtls_rsa_export( const mbedtls_rsa_context *ctx, +                        mbedtls_mpi *N, mbedtls_mpi *P, mbedtls_mpi *Q, +                        mbedtls_mpi *D, mbedtls_mpi *E ); + +/** + * \brief          This function exports core parameters of an RSA key + *                 in raw big-endian binary format. + * + *                 If this function runs successfully, the non-NULL buffers + *                 pointed to by \p N, \p P, \p Q, \p D, and \p E are fully + *                 written, with additional unused space filled leading by + *                 zero Bytes. + * + *                 Possible reasons for returning + *                 #MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION:<ul> + *                 <li>An alternative RSA implementation is in use, which + *                 stores the key externally, and either cannot or should + *                 not export it into RAM.</li> + *                 <li>A SW or HW implementation might not support a certain + *                 deduction. For example, \p P, \p Q from \p N, \p D, + *                 and \p E if the former are not part of the + *                 implementation.</li></ul> + *                 If the function fails due to an unsupported operation, + *                 the RSA context stays intact and remains usable. + * + * \param ctx      The initialized RSA context. + * \param N        The Byte array to store the RSA modulus, or NULL. + * \param N_len    The size of the buffer for the modulus. + * \param P        The Byte array to hold the first prime factor of \p N, or + *                 NULL. + * \param P_len    The size of the buffer for the first prime factor. + * \param Q        The Byte array to hold the second prime factor of \p N, or +                   NULL. + * \param Q_len    The size of the buffer for the second prime factor. + * \param D        The Byte array to hold the private exponent, or NULL. + * \param D_len    The size of the buffer for the private exponent. + * \param E        The Byte array to hold the public exponent, or NULL. + * \param E_len    The size of the buffer for the public exponent. + * + * \note           The length fields are ignored if the corresponding + *                 buffer pointers are NULL. + * + * \return         \c 0 on success, + *                 #MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION if exporting the + *                 requested parameters cannot be done due to missing + *                 functionality or because of security policies, + *                 or a non-zero return code on any other failure. + */ +int mbedtls_rsa_export_raw( const mbedtls_rsa_context *ctx, +                            unsigned char *N, size_t N_len, +                            unsigned char *P, size_t P_len, +                            unsigned char *Q, size_t Q_len, +                            unsigned char *D, size_t D_len, +                            unsigned char *E, size_t E_len ); + +/** + * \brief          This function exports CRT parameters of a private RSA key. + * + * \param ctx      The initialized RSA context. + * \param DP       The MPI to hold D modulo P-1, or NULL. + * \param DQ       The MPI to hold D modulo Q-1, or NULL. + * \param QP       The MPI to hold modular inverse of Q modulo P, or NULL. + * + * \return         \c 0 on success, non-zero error code otherwise. + * + * \note           Alternative RSA implementations not using CRT-parameters + *                 internally can implement this function based on + *                 mbedtls_rsa_deduce_opt(). + * + */ +int mbedtls_rsa_export_crt( const mbedtls_rsa_context *ctx, +                            mbedtls_mpi *DP, mbedtls_mpi *DQ, mbedtls_mpi *QP ); + +/** + * \brief          This function sets padding for an already initialized RSA + *                 context. See mbedtls_rsa_init() for details. + * + * \param ctx      The RSA context to be set. + * \param padding  Selects padding mode: #MBEDTLS_RSA_PKCS_V15 or + *                 #MBEDTLS_RSA_PKCS_V21. + * \param hash_id  The #MBEDTLS_RSA_PKCS_V21 hash identifier. + */ +void mbedtls_rsa_set_padding( mbedtls_rsa_context *ctx, int padding, +                              int hash_id); + +/** + * \brief          This function retrieves the length of RSA modulus in Bytes. + * + * \param ctx      The initialized RSA context. + * + * \return         The length of the RSA modulus in Bytes. + * + */ +size_t mbedtls_rsa_get_len( const mbedtls_rsa_context *ctx ); + +/** + * \brief          This function generates an RSA keypair. + * + * \param ctx      The RSA context used to hold the key. + * \param f_rng    The RNG function. + * \param p_rng    The RNG parameter. + * \param nbits    The size of the public key in bits. + * \param exponent The public exponent. For example, 65537. + * + * \note           mbedtls_rsa_init() must be called before this function, + *                 to set up the RSA context. + * + * \return         \c 0 on success, or an \c MBEDTLS_ERR_RSA_XXX error code +                   on failure. + */ +int mbedtls_rsa_gen_key( mbedtls_rsa_context *ctx, +                         int (*f_rng)(void *, unsigned char *, size_t), +                         void *p_rng, +                         unsigned int nbits, int exponent ); + +/** + * \brief          This function checks if a context contains at least an RSA + *                 public key. + * + *                 If the function runs successfully, it is guaranteed that + *                 enough information is present to perform an RSA public key + *                 operation using mbedtls_rsa_public(). + * + * \param ctx      The RSA context to check. + * + * \return         \c 0 on success, or an \c MBEDTLS_ERR_RSA_XXX error code + *                 on failure. + * + */ +int mbedtls_rsa_check_pubkey( const mbedtls_rsa_context *ctx ); + +/** + * \brief      This function checks if a context contains an RSA private key + *             and perform basic consistency checks. + * + * \param ctx  The RSA context to check. + * + * \return     \c 0 on success, or an \c MBEDTLS_ERR_RSA_XXX error code on + *             failure. + * + * \note       The consistency checks performed by this function not only + *             ensure that mbedtls_rsa_private() can be called successfully + *             on the given context, but that the various parameters are + *             mutually consistent with high probability, in the sense that + *             mbedtls_rsa_public() and mbedtls_rsa_private() are inverses. + * + * \warning    This function should catch accidental misconfigurations + *             like swapping of parameters, but it cannot establish full + *             trust in neither the quality nor the consistency of the key + *             material that was used to setup the given RSA context: + *             <ul><li>Consistency: Imported parameters that are irrelevant + *             for the implementation might be silently dropped. If dropped, + *             the current function does not have access to them, + *             and therefore cannot check them. See mbedtls_rsa_complete(). + *             If you want to check the consistency of the entire + *             content of an PKCS1-encoded RSA private key, for example, you + *             should use mbedtls_rsa_validate_params() before setting + *             up the RSA context. + *             Additionally, if the implementation performs empirical checks, + *             these checks substantiate but do not guarantee consistency.</li> + *             <li>Quality: This function is not expected to perform + *             extended quality assessments like checking that the prime + *             factors are safe. Additionally, it is the responsibility of the + *             user to ensure the trustworthiness of the source of his RSA + *             parameters, which goes beyond what is effectively checkable + *             by the library.</li></ul> + */ +int mbedtls_rsa_check_privkey( const mbedtls_rsa_context *ctx ); + +/** + * \brief          This function checks a public-private RSA key pair. + * + *                 It checks each of the contexts, and makes sure they match. + * + * \param pub      The RSA context holding the public key. + * \param prv      The RSA context holding the private key. + * + * \return         \c 0 on success, or an \c MBEDTLS_ERR_RSA_XXX error code + *                 on failure. + */ +int mbedtls_rsa_check_pub_priv( const mbedtls_rsa_context *pub, +                                const mbedtls_rsa_context *prv ); + +/** + * \brief          This function performs an RSA public key operation. + * + * \param ctx      The RSA context. + * \param input    The input buffer. + * \param output   The output buffer. + * + * \return         \c 0 on success, or an \c MBEDTLS_ERR_RSA_XXX error code + *                 on failure. + * + * \note           This function does not handle message padding. + * + * \note           Make sure to set \p input[0] = 0 or ensure that + *                 input is smaller than \p N. + * + * \note           The input and output buffers must be large + *                 enough. For example, 128 Bytes if RSA-1024 is used. + */ +int mbedtls_rsa_public( mbedtls_rsa_context *ctx, +                const unsigned char *input, +                unsigned char *output ); + +/** + * \brief          This function performs an RSA private key operation. + * + * \param ctx      The RSA context. + * \param f_rng    The RNG function. Needed for blinding. + * \param p_rng    The RNG parameter. + * \param input    The input buffer. + * \param output   The output buffer. + * + * \return         \c 0 on success, or an \c MBEDTLS_ERR_RSA_XXX error code + *                 on failure. + * + * \note           The input and output buffers must be large + *                 enough. For example, 128 Bytes if RSA-1024 is used. + */ +int mbedtls_rsa_private( mbedtls_rsa_context *ctx, +                 int (*f_rng)(void *, unsigned char *, size_t), +                 void *p_rng, +                 const unsigned char *input, +                 unsigned char *output ); + +/** + * \brief          This function adds the message padding, then performs an RSA + *                 operation. + * + *                 It is the generic wrapper for performing a PKCS#1 encryption + *                 operation using the \p mode from the context. + * + * + * \param ctx      The RSA context. + * \param f_rng    The RNG function. Needed for padding, PKCS#1 v2.1 + *                 encoding, and #MBEDTLS_RSA_PRIVATE. + * \param p_rng    The RNG parameter. + * \param mode     #MBEDTLS_RSA_PUBLIC or #MBEDTLS_RSA_PRIVATE. + * \param ilen     The length of the plaintext. + * \param input    The buffer holding the data to encrypt. + * \param output   The buffer used to hold the ciphertext. + * + * \deprecated     It is deprecated and discouraged to call this function + *                 in #MBEDTLS_RSA_PRIVATE mode. Future versions of the library + *                 are likely to remove the \p mode argument and have it + *                 implicitly set to #MBEDTLS_RSA_PUBLIC. + * + * \note           Alternative implementations of RSA need not support + *                 mode being set to #MBEDTLS_RSA_PRIVATE and might instead + *                 return #MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION. + * + * \return         \c 0 on success, or an \c MBEDTLS_ERR_RSA_XXX error code + *                 on failure. + * + * \note           The input and output buffers must be as large as the size + *                 of \p ctx->N. For example, 128 Bytes if RSA-1024 is used. + */ +int mbedtls_rsa_pkcs1_encrypt( mbedtls_rsa_context *ctx, +                       int (*f_rng)(void *, unsigned char *, size_t), +                       void *p_rng, +                       int mode, size_t ilen, +                       const unsigned char *input, +                       unsigned char *output ); + +/** + * \brief          This function performs a PKCS#1 v1.5 encryption operation + *                 (RSAES-PKCS1-v1_5-ENCRYPT). + * + * \param ctx      The RSA context. + * \param f_rng    The RNG function. Needed for padding and + *                 #MBEDTLS_RSA_PRIVATE. + * \param p_rng    The RNG parameter. + * \param mode     #MBEDTLS_RSA_PUBLIC or #MBEDTLS_RSA_PRIVATE. + * \param ilen     The length of the plaintext. + * \param input    The buffer holding the data to encrypt. + * \param output   The buffer used to hold the ciphertext. + * + * \deprecated     It is deprecated and discouraged to call this function + *                 in #MBEDTLS_RSA_PRIVATE mode. Future versions of the library + *                 are likely to remove the \p mode argument and have it + *                 implicitly set to #MBEDTLS_RSA_PUBLIC. + * + * \note           Alternative implementations of RSA need not support + *                 mode being set to #MBEDTLS_RSA_PRIVATE and might instead + *                 return #MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION. + * + * \return         \c 0 on success, or an \c MBEDTLS_ERR_RSA_XXX error code + *                 on failure. + * + * \note           The output buffer must be as large as the size + *                 of \p ctx->N. For example, 128 Bytes if RSA-1024 is used. + */ +int mbedtls_rsa_rsaes_pkcs1_v15_encrypt( mbedtls_rsa_context *ctx, +                                 int (*f_rng)(void *, unsigned char *, size_t), +                                 void *p_rng, +                                 int mode, size_t ilen, +                                 const unsigned char *input, +                                 unsigned char *output ); + +/** + * \brief            This function performs a PKCS#1 v2.1 OAEP encryption + *                   operation (RSAES-OAEP-ENCRYPT). + * + * \param ctx        The RSA context. + * \param f_rng      The RNG function. Needed for padding and PKCS#1 v2.1 + *                   encoding and #MBEDTLS_RSA_PRIVATE. + * \param p_rng      The RNG parameter. + * \param mode       #MBEDTLS_RSA_PUBLIC or #MBEDTLS_RSA_PRIVATE. + * \param label      The buffer holding the custom label to use. + * \param label_len  The length of the label. + * \param ilen       The length of the plaintext. + * \param input      The buffer holding the data to encrypt. + * \param output     The buffer used to hold the ciphertext. + * + * \deprecated     It is deprecated and discouraged to call this function + *                 in #MBEDTLS_RSA_PRIVATE mode. Future versions of the library + *                 are likely to remove the \p mode argument and have it + *                 implicitly set to #MBEDTLS_RSA_PUBLIC. + * + * \note           Alternative implementations of RSA need not support + *                 mode being set to #MBEDTLS_RSA_PRIVATE and might instead + *                 return #MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION. + * + * \return         \c 0 on success, or an \c MBEDTLS_ERR_RSA_XXX error code + *                 on failure. + * + * \note           The output buffer must be as large as the size + *                 of ctx->N. For example, 128 Bytes if RSA-1024 is used. + */ +int mbedtls_rsa_rsaes_oaep_encrypt( mbedtls_rsa_context *ctx, +                            int (*f_rng)(void *, unsigned char *, size_t), +                            void *p_rng, +                            int mode, +                            const unsigned char *label, size_t label_len, +                            size_t ilen, +                            const unsigned char *input, +                            unsigned char *output ); + +/** + * \brief          This function performs an RSA operation, then removes the + *                 message padding. + * + *                 It is the generic wrapper for performing a PKCS#1 decryption + *                 operation using the \p mode from the context. + * + * \param ctx      The RSA context. + * \param f_rng    The RNG function. Only needed for #MBEDTLS_RSA_PRIVATE. + * \param p_rng    The RNG parameter. + * \param mode     #MBEDTLS_RSA_PUBLIC or #MBEDTLS_RSA_PRIVATE. + * \param olen     The length of the plaintext. + * \param input    The buffer holding the encrypted data. + * \param output   The buffer used to hold the plaintext. + * \param output_max_len    The maximum length of the output buffer. + * + * \deprecated     It is deprecated and discouraged to call this function + *                 in #MBEDTLS_RSA_PUBLIC mode. Future versions of the library + *                 are likely to remove the \p mode argument and have it + *                 implicitly set to #MBEDTLS_RSA_PRIVATE. + * + * \note           Alternative implementations of RSA need not support + *                 mode being set to #MBEDTLS_RSA_PUBLIC and might instead + *                 return #MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION. + * + * \return         \c 0 on success, or an \c MBEDTLS_ERR_RSA_XXX error code + *                 on failure. + * + * \note           The output buffer length \c output_max_len should be + *                 as large as the size \p ctx->len of \p ctx->N (for example, + *                 128 Bytes if RSA-1024 is used) to be able to hold an + *                 arbitrary decrypted message. If it is not large enough to + *                 hold the decryption of the particular ciphertext provided, + *                 the function returns \c MBEDTLS_ERR_RSA_OUTPUT_TOO_LARGE. + * + * \note           The input buffer must be as large as the size + *                 of \p ctx->N. For example, 128 Bytes if RSA-1024 is used. + */ +int mbedtls_rsa_pkcs1_decrypt( mbedtls_rsa_context *ctx, +                       int (*f_rng)(void *, unsigned char *, size_t), +                       void *p_rng, +                       int mode, size_t *olen, +                       const unsigned char *input, +                       unsigned char *output, +                       size_t output_max_len ); + +/** + * \brief          This function performs a PKCS#1 v1.5 decryption + *                 operation (RSAES-PKCS1-v1_5-DECRYPT). + * + * \param ctx      The RSA context. + * \param f_rng    The RNG function. Only needed for #MBEDTLS_RSA_PRIVATE. + * \param p_rng    The RNG parameter. + * \param mode     #MBEDTLS_RSA_PUBLIC or #MBEDTLS_RSA_PRIVATE. + * \param olen     The length of the plaintext. + * \param input    The buffer holding the encrypted data. + * \param output   The buffer to hold the plaintext. + * \param output_max_len    The maximum length of the output buffer. + * + * \deprecated     It is deprecated and discouraged to call this function + *                 in #MBEDTLS_RSA_PUBLIC mode. Future versions of the library + *                 are likely to remove the \p mode argument and have it + *                 implicitly set to #MBEDTLS_RSA_PRIVATE. + * + * \note           Alternative implementations of RSA need not support + *                 mode being set to #MBEDTLS_RSA_PUBLIC and might instead + *                 return #MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION. + * + * \return         \c 0 on success, or an \c MBEDTLS_ERR_RSA_XXX error code + *                 on failure. + * + * \note           The output buffer length \c output_max_len should be + *                 as large as the size \p ctx->len of \p ctx->N, for example, + *                 128 Bytes if RSA-1024 is used, to be able to hold an + *                 arbitrary decrypted message. If it is not large enough to + *                 hold the decryption of the particular ciphertext provided, + *                 the function returns #MBEDTLS_ERR_RSA_OUTPUT_TOO_LARGE. + * + * \note           The input buffer must be as large as the size + *                 of \p ctx->N. For example, 128 Bytes if RSA-1024 is used. + */ +int mbedtls_rsa_rsaes_pkcs1_v15_decrypt( mbedtls_rsa_context *ctx, +                                 int (*f_rng)(void *, unsigned char *, size_t), +                                 void *p_rng, +                                 int mode, size_t *olen, +                                 const unsigned char *input, +                                 unsigned char *output, +                                 size_t output_max_len ); + +/** + * \brief          This function performs a PKCS#1 v2.1 OAEP decryption + *                 operation (RSAES-OAEP-DECRYPT). + * + * \param ctx        The RSA context. + * \param f_rng      The RNG function. Only needed for #MBEDTLS_RSA_PRIVATE. + * \param p_rng      The RNG parameter. + * \param mode       #MBEDTLS_RSA_PUBLIC or #MBEDTLS_RSA_PRIVATE. + * \param label      The buffer holding the custom label to use. + * \param label_len  The length of the label. + * \param olen       The length of the plaintext. + * \param input      The buffer holding the encrypted data. + * \param output     The buffer to hold the plaintext. + * \param output_max_len    The maximum length of the output buffer. + * + * \deprecated     It is deprecated and discouraged to call this function + *                 in #MBEDTLS_RSA_PUBLIC mode. Future versions of the library + *                 are likely to remove the \p mode argument and have it + *                 implicitly set to #MBEDTLS_RSA_PRIVATE. + * + * \note           Alternative implementations of RSA need not support + *                 mode being set to #MBEDTLS_RSA_PUBLIC and might instead + *                 return #MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION. + * + * \return         \c 0 on success, or an \c MBEDTLS_ERR_RSA_XXX error code + *                 on failure. + * + * \note           The output buffer length \c output_max_len should be + *                 as large as the size \p ctx->len of \p ctx->N, for + *                 example, 128 Bytes if RSA-1024 is used, to be able to + *                 hold an arbitrary decrypted message. If it is not + *                 large enough to hold the decryption of the particular + *                 ciphertext provided, the function returns + *                 #MBEDTLS_ERR_RSA_OUTPUT_TOO_LARGE. + * + * \note           The input buffer must be as large as the size + *                 of \p ctx->N. For example, 128 Bytes if RSA-1024 is used. + */ +int mbedtls_rsa_rsaes_oaep_decrypt( mbedtls_rsa_context *ctx, +                            int (*f_rng)(void *, unsigned char *, size_t), +                            void *p_rng, +                            int mode, +                            const unsigned char *label, size_t label_len, +                            size_t *olen, +                            const unsigned char *input, +                            unsigned char *output, +                            size_t output_max_len ); + +/** + * \brief          This function performs a private RSA operation to sign + *                 a message digest using PKCS#1. + * + *                 It is the generic wrapper for performing a PKCS#1 + *                 signature using the \p mode from the context. + * + * \param ctx      The RSA context. + * \param f_rng    The RNG function. Needed for PKCS#1 v2.1 encoding and for + *                 #MBEDTLS_RSA_PRIVATE. + * \param p_rng    The RNG parameter. + * \param mode     #MBEDTLS_RSA_PUBLIC or #MBEDTLS_RSA_PRIVATE. + * \param md_alg   The message-digest algorithm used to hash the original data. + *                 Use #MBEDTLS_MD_NONE for signing raw data. + * \param hashlen  The length of the message digest. Only used if \p md_alg is #MBEDTLS_MD_NONE. + * \param hash     The buffer holding the message digest. + * \param sig      The buffer to hold the ciphertext. + * + * \deprecated     It is deprecated and discouraged to call this function + *                 in #MBEDTLS_RSA_PUBLIC mode. Future versions of the library + *                 are likely to remove the \p mode argument and have it + *                 implicitly set to #MBEDTLS_RSA_PRIVATE. + * + * \note           Alternative implementations of RSA need not support + *                 mode being set to #MBEDTLS_RSA_PUBLIC and might instead + *                 return #MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION. + * + * \return         \c 0 if the signing operation was successful, + *                 or an \c MBEDTLS_ERR_RSA_XXX error code on failure. + * + * \note           The \p sig buffer must be as large as the size + *                 of \p ctx->N. For example, 128 Bytes if RSA-1024 is used. + * + * \note           For PKCS#1 v2.1 encoding, see comments on + *                 mbedtls_rsa_rsassa_pss_sign() for details on + *                 \p md_alg and \p hash_id. + */ +int mbedtls_rsa_pkcs1_sign( mbedtls_rsa_context *ctx, +                    int (*f_rng)(void *, unsigned char *, size_t), +                    void *p_rng, +                    int mode, +                    mbedtls_md_type_t md_alg, +                    unsigned int hashlen, +                    const unsigned char *hash, +                    unsigned char *sig ); + +/** + * \brief          This function performs a PKCS#1 v1.5 signature + *                 operation (RSASSA-PKCS1-v1_5-SIGN). + * + * \param ctx      The RSA context. + * \param f_rng    The RNG function. Only needed for #MBEDTLS_RSA_PRIVATE. + * \param p_rng    The RNG parameter. + * \param mode     #MBEDTLS_RSA_PUBLIC or #MBEDTLS_RSA_PRIVATE. + * \param md_alg   The message-digest algorithm used to hash the original data. + *                 Use #MBEDTLS_MD_NONE for signing raw data. + * \param hashlen  The length of the message digest. Only used if \p md_alg is #MBEDTLS_MD_NONE. + * \param hash     The buffer holding the message digest. + * \param sig      The buffer to hold the ciphertext. + * + * \deprecated     It is deprecated and discouraged to call this function + *                 in #MBEDTLS_RSA_PUBLIC mode. Future versions of the library + *                 are likely to remove the \p mode argument and have it + *                 implicitly set to #MBEDTLS_RSA_PRIVATE. + * + * \note           Alternative implementations of RSA need not support + *                 mode being set to #MBEDTLS_RSA_PUBLIC and might instead + *                 return #MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION. + * + * \return         \c 0 if the signing operation was successful, + *                 or an \c MBEDTLS_ERR_RSA_XXX error code + *                 on failure. + * + * \note           The \p sig buffer must be as large as the size + *                 of \p ctx->N. For example, 128 Bytes if RSA-1024 is used. + */ +int mbedtls_rsa_rsassa_pkcs1_v15_sign( mbedtls_rsa_context *ctx, +                               int (*f_rng)(void *, unsigned char *, size_t), +                               void *p_rng, +                               int mode, +                               mbedtls_md_type_t md_alg, +                               unsigned int hashlen, +                               const unsigned char *hash, +                               unsigned char *sig ); + +/** + * \brief          This function performs a PKCS#1 v2.1 PSS signature + *                 operation (RSASSA-PSS-SIGN). + * + * \param ctx      The RSA context. + * \param f_rng    The RNG function. Needed for PKCS#1 v2.1 encoding and for + *                 #MBEDTLS_RSA_PRIVATE. + * \param p_rng    The RNG parameter. + * \param mode     #MBEDTLS_RSA_PUBLIC or #MBEDTLS_RSA_PRIVATE. + * \param md_alg   The message-digest algorithm used to hash the original data. + *                 Use #MBEDTLS_MD_NONE for signing raw data. + * \param hashlen  The length of the message digest. Only used if \p md_alg is #MBEDTLS_MD_NONE. + * \param hash     The buffer holding the message digest. + * \param sig      The buffer to hold the ciphertext. + * + * \deprecated     It is deprecated and discouraged to call this function + *                 in #MBEDTLS_RSA_PUBLIC mode. Future versions of the library + *                 are likely to remove the \p mode argument and have it + *                 implicitly set to #MBEDTLS_RSA_PRIVATE. + * + * \note           Alternative implementations of RSA need not support + *                 mode being set to #MBEDTLS_RSA_PUBLIC and might instead + *                 return #MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION. + * + * \return         \c 0 if the signing operation was successful, + *                 or an \c MBEDTLS_ERR_RSA_XXX error code + *                 on failure. + * + * \note           The \p sig buffer must be as large as the size + *                 of \p ctx->N. For example, 128 Bytes if RSA-1024 is used. + * + * \note           The \p hash_id in the RSA context is the one used for the + *                 encoding. \p md_alg in the function call is the type of hash + *                 that is encoded. According to <em>RFC-3447: Public-Key + *                 Cryptography Standards (PKCS) #1 v2.1: RSA Cryptography + *                 Specifications</em> it is advised to keep both hashes the + *                 same. + */ +int mbedtls_rsa_rsassa_pss_sign( mbedtls_rsa_context *ctx, +                         int (*f_rng)(void *, unsigned char *, size_t), +                         void *p_rng, +                         int mode, +                         mbedtls_md_type_t md_alg, +                         unsigned int hashlen, +                         const unsigned char *hash, +                         unsigned char *sig ); + +/** + * \brief          This function performs a public RSA operation and checks + *                 the message digest. + * + *                 This is the generic wrapper for performing a PKCS#1 + *                 verification using the mode from the context. + * + * \param ctx      The RSA public key context. + * \param f_rng    The RNG function. Only needed for #MBEDTLS_RSA_PRIVATE. + * \param p_rng    The RNG parameter. + * \param mode     #MBEDTLS_RSA_PUBLIC or #MBEDTLS_RSA_PRIVATE. + * \param md_alg   The message-digest algorithm used to hash the original data. + *                 Use #MBEDTLS_MD_NONE for signing raw data. + * \param hashlen  The length of the message digest. Only used if \p md_alg is #MBEDTLS_MD_NONE. + * \param hash     The buffer holding the message digest. + * \param sig      The buffer holding the ciphertext. + * + * \deprecated     It is deprecated and discouraged to call this function + *                 in #MBEDTLS_RSA_PRIVATE mode. Future versions of the library + *                 are likely to remove the \p mode argument and have it + *                 set to #MBEDTLS_RSA_PUBLIC. + * + * \note           Alternative implementations of RSA need not support + *                 mode being set to #MBEDTLS_RSA_PRIVATE and might instead + *                 return #MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION. + * + * \return         \c 0 if the verify operation was successful, + *                 or an \c MBEDTLS_ERR_RSA_XXX error code + *                 on failure. + * + * \note           The \p sig buffer must be as large as the size + *                 of \p ctx->N. For example, 128 Bytes if RSA-1024 is used. + * + * \note           For PKCS#1 v2.1 encoding, see comments on + *                 mbedtls_rsa_rsassa_pss_verify() about \p md_alg and + *                 \p hash_id. + */ +int mbedtls_rsa_pkcs1_verify( mbedtls_rsa_context *ctx, +                      int (*f_rng)(void *, unsigned char *, size_t), +                      void *p_rng, +                      int mode, +                      mbedtls_md_type_t md_alg, +                      unsigned int hashlen, +                      const unsigned char *hash, +                      const unsigned char *sig ); + +/** + * \brief          This function performs a PKCS#1 v1.5 verification + *                 operation (RSASSA-PKCS1-v1_5-VERIFY). + * + * \param ctx      The RSA public key context. + * \param f_rng    The RNG function. Only needed for #MBEDTLS_RSA_PRIVATE. + * \param p_rng    The RNG parameter. + * \param mode     #MBEDTLS_RSA_PUBLIC or #MBEDTLS_RSA_PRIVATE. + * \param md_alg   The message-digest algorithm used to hash the original data. + *                 Use #MBEDTLS_MD_NONE for signing raw data. + * \param hashlen  The length of the message digest. Only used if \p md_alg is #MBEDTLS_MD_NONE. + * \param hash     The buffer holding the message digest. + * \param sig      The buffer holding the ciphertext. + * + * \deprecated     It is deprecated and discouraged to call this function + *                 in #MBEDTLS_RSA_PRIVATE mode. Future versions of the library + *                 are likely to remove the \p mode argument and have it + *                 set to #MBEDTLS_RSA_PUBLIC. + * + * \note           Alternative implementations of RSA need not support + *                 mode being set to #MBEDTLS_RSA_PRIVATE and might instead + *                 return #MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION. + * + * \return         \c 0 if the verify operation was successful, + *                 or an \c MBEDTLS_ERR_RSA_XXX error code + *                 on failure. + * + * \note           The \p sig buffer must be as large as the size + *                 of \p ctx->N. For example, 128 Bytes if RSA-1024 is used. + */ +int mbedtls_rsa_rsassa_pkcs1_v15_verify( mbedtls_rsa_context *ctx, +                                 int (*f_rng)(void *, unsigned char *, size_t), +                                 void *p_rng, +                                 int mode, +                                 mbedtls_md_type_t md_alg, +                                 unsigned int hashlen, +                                 const unsigned char *hash, +                                 const unsigned char *sig ); + +/** + * \brief          This function performs a PKCS#1 v2.1 PSS verification + *                 operation (RSASSA-PSS-VERIFY). + * + *                 The hash function for the MGF mask generating function + *                 is that specified in the RSA context. + * + * \param ctx      The RSA public key context. + * \param f_rng    The RNG function. Only needed for #MBEDTLS_RSA_PRIVATE. + * \param p_rng    The RNG parameter. + * \param mode     #MBEDTLS_RSA_PUBLIC or #MBEDTLS_RSA_PRIVATE. + * \param md_alg   The message-digest algorithm used to hash the original data. + *                 Use #MBEDTLS_MD_NONE for signing raw data. + * \param hashlen  The length of the message digest. Only used if \p md_alg is #MBEDTLS_MD_NONE. + * \param hash     The buffer holding the message digest. + * \param sig      The buffer holding the ciphertext. + * + * \deprecated     It is deprecated and discouraged to call this function + *                 in #MBEDTLS_RSA_PRIVATE mode. Future versions of the library + *                 are likely to remove the \p mode argument and have it + *                 implicitly set to #MBEDTLS_RSA_PUBLIC. + * + * \note           Alternative implementations of RSA need not support + *                 mode being set to #MBEDTLS_RSA_PRIVATE and might instead + *                 return #MBEDTLS_ERR_RSA_UNSUPPORTED_OPERATION. + * + * \return         \c 0 if the verify operation was successful, + *                 or an \c MBEDTLS_ERR_RSA_XXX error code + *                 on failure. + * + * \note           The \p sig buffer must be as large as the size + *                 of \p ctx->N. For example, 128 Bytes if RSA-1024 is used. + * + * \note           The \p hash_id in the RSA context is the one used for the + *                 verification. \p md_alg in the function call is the type of + *                 hash that is verified. According to <em>RFC-3447: Public-Key + *                 Cryptography Standards (PKCS) #1 v2.1: RSA Cryptography + *                 Specifications</em> it is advised to keep both hashes the + *                 same. If \p hash_id in the RSA context is unset, + *                 the \p md_alg from the function call is used. + */ +int mbedtls_rsa_rsassa_pss_verify( mbedtls_rsa_context *ctx, +                           int (*f_rng)(void *, unsigned char *, size_t), +                           void *p_rng, +                           int mode, +                           mbedtls_md_type_t md_alg, +                           unsigned int hashlen, +                           const unsigned char *hash, +                           const unsigned char *sig ); + +/** + * \brief          This function performs a PKCS#1 v2.1 PSS verification + *                 operation (RSASSA-PSS-VERIFY). + * + *                 The hash function for the MGF mask generating function + *                 is that specified in \p mgf1_hash_id. + * + * \param ctx      The RSA public key context. + * \param f_rng    The RNG function. Only needed for #MBEDTLS_RSA_PRIVATE. + * \param p_rng    The RNG parameter. + * \param mode     #MBEDTLS_RSA_PUBLIC or #MBEDTLS_RSA_PRIVATE. + * \param md_alg   The message-digest algorithm used to hash the original data. + *                 Use #MBEDTLS_MD_NONE for signing raw data. + * \param hashlen  The length of the message digest. Only used if \p md_alg is #MBEDTLS_MD_NONE. + * \param hash     The buffer holding the message digest. + * \param mgf1_hash_id The message digest used for mask generation. + * \param expected_salt_len The length of the salt used in padding. Use + *                 #MBEDTLS_RSA_SALT_LEN_ANY to accept any salt length. + * \param sig      The buffer holding the ciphertext. + * + * \return         \c 0 if the verify operation was successful, + *                 or an \c MBEDTLS_ERR_RSA_XXX error code + *                 on failure. + * + * \note           The \p sig buffer must be as large as the size + *                 of \p ctx->N. For example, 128 Bytes if RSA-1024 is used. + * + * \note           The \p hash_id in the RSA context is ignored. + */ +int mbedtls_rsa_rsassa_pss_verify_ext( mbedtls_rsa_context *ctx, +                               int (*f_rng)(void *, unsigned char *, size_t), +                               void *p_rng, +                               int mode, +                               mbedtls_md_type_t md_alg, +                               unsigned int hashlen, +                               const unsigned char *hash, +                               mbedtls_md_type_t mgf1_hash_id, +                               int expected_salt_len, +                               const unsigned char *sig ); + +/** + * \brief          This function copies the components of an RSA context. + * + * \param dst      The destination context. + * \param src      The source context. + * + * \return         \c 0 on success, + *                 #MBEDTLS_ERR_MPI_ALLOC_FAILED on memory allocation failure. + */ +int mbedtls_rsa_copy( mbedtls_rsa_context *dst, const mbedtls_rsa_context *src ); + +/** + * \brief          This function frees the components of an RSA key. + * + * \param ctx      The RSA Context to free. + */ +void mbedtls_rsa_free( mbedtls_rsa_context *ctx ); + +#ifdef __cplusplus +} +#endif + +#else  /* MBEDTLS_RSA_ALT */ +#include "rsa_alt.h" +#endif /* MBEDTLS_RSA_ALT */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          The RSA checkup routine. + * + * \return         \c 0 on success, or \c 1 on failure. + */ +int mbedtls_rsa_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + +#endif /* rsa.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/rsa_internal.h b/thirdparty/mbedtls/include/mbedtls/rsa_internal.h new file mode 100644 index 0000000000..bcb3c9401d --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/rsa_internal.h @@ -0,0 +1,216 @@ +/** + * \file rsa_internal.h + * + * \brief Context-independent RSA helper functions + */ +/* + *  Copyright (C) 2006-2017, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + * + * + *  This file declares some RSA-related helper functions useful when + *  implementing the RSA interface. They are public and provided in a + *  separate compilation unit in order to make it easy for designers of + *  alternative RSA implementations to use them in their code, as it is + *  conceived that the functionality they provide will be necessary + *  for most complete implementations. + * + *  End-users of Mbed TLS not intending to re-implement the RSA functionality + *  are not expected to get into the need of making use of these functions directly, + *  but instead should be able to use the functions declared in rsa.h. + * + *  There are two classes of helper functions: + *  (1) Parameter-generating helpers. These are: + *      - mbedtls_rsa_deduce_primes + *      - mbedtls_rsa_deduce_private_exponent + *      - mbedtls_rsa_deduce_crt + *       Each of these functions takes a set of core RSA parameters + *       and generates some other, or CRT related parameters. + *  (2) Parameter-checking helpers. These are: + *      - mbedtls_rsa_validate_params + *      - mbedtls_rsa_validate_crt + *      They take a set of core or CRT related RSA parameters + *      and check their validity. + * + */ + +#ifndef MBEDTLS_RSA_INTERNAL_H +#define MBEDTLS_RSA_INTERNAL_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include "bignum.h" + +#ifdef __cplusplus +extern "C" { +#endif + + +/** + * \brief          Compute RSA prime moduli P, Q from public modulus N=PQ + *                 and a pair of private and public key. + * + * \note           This is a 'static' helper function not operating on + *                 an RSA context. Alternative implementations need not + *                 overwrite it. + * + * \param N        RSA modulus N = PQ, with P, Q to be found + * \param E        RSA public exponent + * \param D        RSA private exponent + * \param P        Pointer to MPI holding first prime factor of N on success + * \param Q        Pointer to MPI holding second prime factor of N on success + * + * \return + *                 - 0 if successful. In this case, P and Q constitute a + *                   factorization of N. + *                 - A non-zero error code otherwise. + * + * \note           It is neither checked that P, Q are prime nor that + *                 D, E are modular inverses wrt. P-1 and Q-1. For that, + *                 use the helper function \c mbedtls_rsa_validate_params. + * + */ +int mbedtls_rsa_deduce_primes( mbedtls_mpi const *N, mbedtls_mpi const *E, +                               mbedtls_mpi const *D, +                               mbedtls_mpi *P, mbedtls_mpi *Q ); + +/** + * \brief          Compute RSA private exponent from + *                 prime moduli and public key. + * + * \note           This is a 'static' helper function not operating on + *                 an RSA context. Alternative implementations need not + *                 overwrite it. + * + * \param P        First prime factor of RSA modulus + * \param Q        Second prime factor of RSA modulus + * \param E        RSA public exponent + * \param D        Pointer to MPI holding the private exponent on success. + * + * \return + *                 - 0 if successful. In this case, D is set to a simultaneous + *                   modular inverse of E modulo both P-1 and Q-1. + *                 - A non-zero error code otherwise. + * + * \note           This function does not check whether P and Q are primes. + * + */ +int mbedtls_rsa_deduce_private_exponent( mbedtls_mpi const *P, +                                         mbedtls_mpi const *Q, +                                         mbedtls_mpi const *E, +                                         mbedtls_mpi *D ); + + +/** + * \brief          Generate RSA-CRT parameters + * + * \note           This is a 'static' helper function not operating on + *                 an RSA context. Alternative implementations need not + *                 overwrite it. + * + * \param P        First prime factor of N + * \param Q        Second prime factor of N + * \param D        RSA private exponent + * \param DP       Output variable for D modulo P-1 + * \param DQ       Output variable for D modulo Q-1 + * \param QP       Output variable for the modular inverse of Q modulo P. + * + * \return         0 on success, non-zero error code otherwise. + * + * \note           This function does not check whether P, Q are + *                 prime and whether D is a valid private exponent. + * + */ +int mbedtls_rsa_deduce_crt( const mbedtls_mpi *P, const mbedtls_mpi *Q, +                            const mbedtls_mpi *D, mbedtls_mpi *DP, +                            mbedtls_mpi *DQ, mbedtls_mpi *QP ); + + +/** + * \brief          Check validity of core RSA parameters + * + * \note           This is a 'static' helper function not operating on + *                 an RSA context. Alternative implementations need not + *                 overwrite it. + * + * \param N        RSA modulus N = PQ + * \param P        First prime factor of N + * \param Q        Second prime factor of N + * \param D        RSA private exponent + * \param E        RSA public exponent + * \param f_rng    PRNG to be used for primality check, or NULL + * \param p_rng    PRNG context for f_rng, or NULL + * + * \return + *                 - 0 if the following conditions are satisfied + *                   if all relevant parameters are provided: + *                    - P prime if f_rng != NULL (%) + *                    - Q prime if f_rng != NULL (%) + *                    - 1 < N = P * Q + *                    - 1 < D, E < N + *                    - D and E are modular inverses modulo P-1 and Q-1 + *                   (%) This is only done if MBEDTLS_GENPRIME is defined. + *                 - A non-zero error code otherwise. + * + * \note           The function can be used with a restricted set of arguments + *                 to perform specific checks only. E.g., calling it with + *                 (-,P,-,-,-) and a PRNG amounts to a primality check for P. + */ +int mbedtls_rsa_validate_params( const mbedtls_mpi *N, const mbedtls_mpi *P, +                                 const mbedtls_mpi *Q, const mbedtls_mpi *D, +                                 const mbedtls_mpi *E, +                                 int (*f_rng)(void *, unsigned char *, size_t), +                                 void *p_rng ); + +/** + * \brief          Check validity of RSA CRT parameters + * + * \note           This is a 'static' helper function not operating on + *                 an RSA context. Alternative implementations need not + *                 overwrite it. + * + * \param P        First prime factor of RSA modulus + * \param Q        Second prime factor of RSA modulus + * \param D        RSA private exponent + * \param DP       MPI to check for D modulo P-1 + * \param DQ       MPI to check for D modulo P-1 + * \param QP       MPI to check for the modular inverse of Q modulo P. + * + * \return + *                 - 0 if the following conditions are satisfied: + *                    - D = DP mod P-1 if P, D, DP != NULL + *                    - Q = DQ mod P-1 if P, D, DQ != NULL + *                    - QP = Q^-1 mod P if P, Q, QP != NULL + *                 - \c MBEDTLS_ERR_RSA_KEY_CHECK_FAILED if check failed, + *                   potentially including \c MBEDTLS_ERR_MPI_XXX if some + *                   MPI calculations failed. + *                 - \c MBEDTLS_ERR_RSA_BAD_INPUT_DATA if insufficient + *                   data was provided to check DP, DQ or QP. + * + * \note           The function can be used with a restricted set of arguments + *                 to perform specific checks only. E.g., calling it with the + *                 parameters (P, -, D, DP, -, -) will check DP = D mod P-1. + */ +int mbedtls_rsa_validate_crt( const mbedtls_mpi *P,  const mbedtls_mpi *Q, +                              const mbedtls_mpi *D,  const mbedtls_mpi *DP, +                              const mbedtls_mpi *DQ, const mbedtls_mpi *QP ); + +#endif /* rsa_internal.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/sha1.h b/thirdparty/mbedtls/include/mbedtls/sha1.h new file mode 100644 index 0000000000..e4f8650216 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/sha1.h @@ -0,0 +1,346 @@ +/** + * \file sha1.h + * + * \brief The SHA-1 cryptographic hash function. + * + * \warning   SHA-1 is considered a weak message digest and its use constitutes + *            a security risk. We recommend considering stronger message + *            digests instead. + */ +/* + *  Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of Mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_SHA1_H +#define MBEDTLS_SHA1_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> +#include <stdint.h> + +#define MBEDTLS_ERR_SHA1_HW_ACCEL_FAILED                  -0x0035  /**< SHA-1 hardware accelerator failed */ + +#if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \ +    !defined(inline) && !defined(__cplusplus) +#define inline __inline +#endif + +#if !defined(MBEDTLS_SHA1_ALT) +// Regular implementation +// + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          The SHA-1 context structure. + * + * \warning        SHA-1 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +typedef struct +{ +    uint32_t total[2];          /*!< The number of Bytes processed.  */ +    uint32_t state[5];          /*!< The intermediate digest state.  */ +    unsigned char buffer[64];   /*!< The data block being processed. */ +} +mbedtls_sha1_context; + +/** + * \brief          This function initializes a SHA-1 context. + * + * \param ctx      The SHA-1 context to initialize. + * + * \warning        SHA-1 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +void mbedtls_sha1_init( mbedtls_sha1_context *ctx ); + +/** + * \brief          This function clears a SHA-1 context. + * + * \param ctx      The SHA-1 context to clear. + * + * \warning        SHA-1 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +void mbedtls_sha1_free( mbedtls_sha1_context *ctx ); + +/** + * \brief          This function clones the state of a SHA-1 context. + * + * \param dst      The destination context. + * \param src      The context to clone. + * + * \warning        SHA-1 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +void mbedtls_sha1_clone( mbedtls_sha1_context *dst, +                         const mbedtls_sha1_context *src ); + +/** + * \brief          This function starts a SHA-1 checksum calculation. + * + * \param ctx      The context to initialize. + * + * \return         \c 0 if successful + * + * \warning        SHA-1 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_sha1_starts_ret( mbedtls_sha1_context *ctx ); + +/** + * \brief          This function feeds an input buffer into an ongoing SHA-1 + *                 checksum calculation. + * + * \param ctx      The SHA-1 context. + * \param input    The buffer holding the input data. + * \param ilen     The length of the input data. + * + * \return         \c 0 if successful + * + * \warning        SHA-1 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_sha1_update_ret( mbedtls_sha1_context *ctx, +                             const unsigned char *input, +                             size_t ilen ); + +/** + * \brief          This function finishes the SHA-1 operation, and writes + *                 the result to the output buffer. + * + * \param ctx      The SHA-1 context. + * \param output   The SHA-1 checksum result. + * + * \return         \c 0 if successful + * + * \warning        SHA-1 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_sha1_finish_ret( mbedtls_sha1_context *ctx, +                             unsigned char output[20] ); + +/** + * \brief          SHA-1 process data block (internal use only) + * + * \param ctx      SHA-1 context + * \param data     The data block being processed. + * + * \return         \c 0 if successful + * + * \warning        SHA-1 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_internal_sha1_process( mbedtls_sha1_context *ctx, +                                   const unsigned char data[64] ); + +#if !defined(MBEDTLS_DEPRECATED_REMOVED) +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED      __attribute__((deprecated)) +#else +#define MBEDTLS_DEPRECATED +#endif +/** + * \brief          SHA-1 context setup + * + * \deprecated     Superseded by mbedtls_sha1_starts_ret() in 2.7.0 + * + * \param ctx      The SHA-1 context to be initialized. + * + * \warning        SHA-1 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_sha1_starts( +                                                mbedtls_sha1_context *ctx ) +{ +    mbedtls_sha1_starts_ret( ctx ); +} + +/** + * \brief          SHA-1 process buffer + * + * \deprecated     Superseded by mbedtls_sha1_update_ret() in 2.7.0 + * + * \param ctx      The SHA-1 context. + * \param input    The buffer holding the input data. + * \param ilen     The length of the input data. + * + * \warning        SHA-1 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_sha1_update( +                                                mbedtls_sha1_context *ctx, +                                                const unsigned char *input, +                                                size_t ilen ) +{ +    mbedtls_sha1_update_ret( ctx, input, ilen ); +} + +/** + * \brief          SHA-1 final digest + * + * \deprecated     Superseded by mbedtls_sha1_finish_ret() in 2.7.0 + * + * \param ctx      The SHA-1 context. + * \param output   The SHA-1 checksum result. + * + * \warning        SHA-1 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_sha1_finish( +                                                mbedtls_sha1_context *ctx, +                                                unsigned char output[20] ) +{ +    mbedtls_sha1_finish_ret( ctx, output ); +} + +/** + * \brief          SHA-1 process data block (internal use only) + * + * \deprecated     Superseded by mbedtls_internal_sha1_process() in 2.7.0 + * + * \param ctx      The SHA-1 context. + * \param data     The data block being processed. + * + * \warning        SHA-1 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_sha1_process( +                                                mbedtls_sha1_context *ctx, +                                                const unsigned char data[64] ) +{ +    mbedtls_internal_sha1_process( ctx, data ); +} + +#undef MBEDTLS_DEPRECATED +#endif /* !MBEDTLS_DEPRECATED_REMOVED */ + +#ifdef __cplusplus +} +#endif + +#else  /* MBEDTLS_SHA1_ALT */ +#include "sha1_alt.h" +#endif /* MBEDTLS_SHA1_ALT */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          This function calculates the SHA-1 checksum of a buffer. + * + *                 The function allocates the context, performs the + *                 calculation, and frees the context. + * + *                 The SHA-1 result is calculated as + *                 output = SHA-1(input buffer). + * + * \param input    The buffer holding the input data. + * \param ilen     The length of the input data. + * \param output   The SHA-1 checksum result. + * + * \return         \c 0 if successful + * + * \warning        SHA-1 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_sha1_ret( const unsigned char *input, +                      size_t ilen, +                      unsigned char output[20] ); + +#if !defined(MBEDTLS_DEPRECATED_REMOVED) +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED      __attribute__((deprecated)) +#else +#define MBEDTLS_DEPRECATED +#endif +/** + * \brief          Output = SHA-1( input buffer ) + * + * \deprecated     Superseded by mbedtls_sha1_ret() in 2.7.0 + * + * \param input    The buffer holding the input data. + * \param ilen     The length of the input data. + * \param output   The SHA-1 checksum result. + * + * \warning        SHA-1 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +MBEDTLS_DEPRECATED static inline void mbedtls_sha1( const unsigned char *input, +                                                    size_t ilen, +                                                    unsigned char output[20] ) +{ +    mbedtls_sha1_ret( input, ilen, output ); +} + +#undef MBEDTLS_DEPRECATED +#endif /* !MBEDTLS_DEPRECATED_REMOVED */ + +/** + * \brief          The SHA-1 checkup routine. + * + * \return         \c 0 on success, or \c 1 on failure. + * + * \warning        SHA-1 is considered a weak message digest and its use + *                 constitutes a security risk. We recommend considering + *                 stronger message digests instead. + * + */ +int mbedtls_sha1_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + +#endif /* mbedtls_sha1.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/sha256.h b/thirdparty/mbedtls/include/mbedtls/sha256.h new file mode 100644 index 0000000000..a2b6e11644 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/sha256.h @@ -0,0 +1,302 @@ +/** + * \file sha256.h + * + * \brief The SHA-224 and SHA-256 cryptographic hash function. + */ +/* + *  Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of Mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_SHA256_H +#define MBEDTLS_SHA256_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> +#include <stdint.h> + +#define MBEDTLS_ERR_SHA256_HW_ACCEL_FAILED                -0x0037  /**< SHA-256 hardware accelerator failed */ + +#if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \ +    !defined(inline) && !defined(__cplusplus) +#define inline __inline +#endif +#if !defined(MBEDTLS_SHA256_ALT) +// Regular implementation +// + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          The SHA-256 context structure. + * + *                 The structure is used both for SHA-256 and for SHA-224 + *                 checksum calculations. The choice between these two is + *                 made in the call to mbedtls_sha256_starts_ret(). + */ +typedef struct +{ +    uint32_t total[2];          /*!< The number of Bytes processed.  */ +    uint32_t state[8];          /*!< The intermediate digest state.  */ +    unsigned char buffer[64];   /*!< The data block being processed. */ +    int is224;                  /*!< Determines which function to use. +                                     <ul><li>0: Use SHA-256.</li> +                                     <li>1: Use SHA-224.</li></ul> */ +} +mbedtls_sha256_context; + +/** + * \brief          This function initializes a SHA-256 context. + * + * \param ctx      The SHA-256 context to initialize. + */ +void mbedtls_sha256_init( mbedtls_sha256_context *ctx ); + +/** + * \brief          This function clears a SHA-256 context. + * + * \param ctx      The SHA-256 context to clear. + */ +void mbedtls_sha256_free( mbedtls_sha256_context *ctx ); + +/** + * \brief          This function clones the state of a SHA-256 context. + * + * \param dst      The destination context. + * \param src      The context to clone. + */ +void mbedtls_sha256_clone( mbedtls_sha256_context *dst, +                           const mbedtls_sha256_context *src ); + +/** + * \brief          This function starts a SHA-224 or SHA-256 checksum + *                 calculation. + * + * \param ctx      The context to initialize. + * \param is224    Determines which function to use. + *                 <ul><li>0: Use SHA-256.</li> + *                 <li>1: Use SHA-224.</li></ul> + * + * \return         \c 0 on success. + */ +int mbedtls_sha256_starts_ret( mbedtls_sha256_context *ctx, int is224 ); + +/** + * \brief          This function feeds an input buffer into an ongoing + *                 SHA-256 checksum calculation. + * + * \param ctx      SHA-256 context + * \param input    buffer holding the data + * \param ilen     length of the input data + * + * \return         \c 0 on success. + */ +int mbedtls_sha256_update_ret( mbedtls_sha256_context *ctx, +                               const unsigned char *input, +                               size_t ilen ); + +/** + * \brief          This function finishes the SHA-256 operation, and writes + *                 the result to the output buffer. + * + * \param ctx      The SHA-256 context. + * \param output   The SHA-224 or SHA-256 checksum result. + * + * \return         \c 0 on success. + */ +int mbedtls_sha256_finish_ret( mbedtls_sha256_context *ctx, +                               unsigned char output[32] ); + +/** + * \brief          This function processes a single data block within + *                 the ongoing SHA-256 computation. This function is for + *                 internal use only. + * + * \param ctx      The SHA-256 context. + * \param data     The buffer holding one block of data. + * + * \return         \c 0 on success. + */ +int mbedtls_internal_sha256_process( mbedtls_sha256_context *ctx, +                                     const unsigned char data[64] ); + +#if !defined(MBEDTLS_DEPRECATED_REMOVED) +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED      __attribute__((deprecated)) +#else +#define MBEDTLS_DEPRECATED +#endif +/** + * \brief          This function starts a SHA-256 checksum calculation. + * + * \deprecated     Superseded by mbedtls_sha256_starts_ret() in 2.7.0. + * + * \param ctx      The SHA-256 context to initialize. + * \param is224    Determines which function to use. + *                 <ul><li>0: Use SHA-256.</li> + *                 <li>1: Use SHA-224.</li></ul> + */ +MBEDTLS_DEPRECATED static inline void mbedtls_sha256_starts( +                                                mbedtls_sha256_context *ctx, +                                                int is224 ) +{ +    mbedtls_sha256_starts_ret( ctx, is224 ); +} + +/** + * \brief          This function feeds an input buffer into an ongoing + *                 SHA-256 checksum calculation. + * + * \deprecated     Superseded by mbedtls_sha256_update_ret() in 2.7.0. + * + * \param ctx      The SHA-256 context to initialize. + * \param input    The buffer holding the data. + * \param ilen     The length of the input data. + */ +MBEDTLS_DEPRECATED static inline void mbedtls_sha256_update( +                                                mbedtls_sha256_context *ctx, +                                                const unsigned char *input, +                                                size_t ilen ) +{ +    mbedtls_sha256_update_ret( ctx, input, ilen ); +} + +/** + * \brief          This function finishes the SHA-256 operation, and writes + *                 the result to the output buffer. + * + * \deprecated     Superseded by mbedtls_sha256_finish_ret() in 2.7.0. + * + * \param ctx      The SHA-256 context. + * \param output   The SHA-224or SHA-256 checksum result. + */ +MBEDTLS_DEPRECATED static inline void mbedtls_sha256_finish( +                                                mbedtls_sha256_context *ctx, +                                                unsigned char output[32] ) +{ +    mbedtls_sha256_finish_ret( ctx, output ); +} + +/** + * \brief          This function processes a single data block within + *                 the ongoing SHA-256 computation. This function is for + *                 internal use only. + * + * \deprecated     Superseded by mbedtls_internal_sha256_process() in 2.7.0. + * + * \param ctx      The SHA-256 context. + * \param data     The buffer holding one block of data. + */ +MBEDTLS_DEPRECATED static inline void mbedtls_sha256_process( +                                                mbedtls_sha256_context *ctx, +                                                const unsigned char data[64] ) +{ +    mbedtls_internal_sha256_process( ctx, data ); +} + +#undef MBEDTLS_DEPRECATED +#endif /* !MBEDTLS_DEPRECATED_REMOVED */ +#ifdef __cplusplus +} +#endif + +#else  /* MBEDTLS_SHA256_ALT */ +#include "sha256_alt.h" +#endif /* MBEDTLS_SHA256_ALT */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          This function calculates the SHA-224 or SHA-256 + *                 checksum of a buffer. + * + *                 The function allocates the context, performs the + *                 calculation, and frees the context. + * + *                 The SHA-256 result is calculated as + *                 output = SHA-256(input buffer). + * + * \param input    The buffer holding the input data. + * \param ilen     The length of the input data. + * \param output   The SHA-224 or SHA-256 checksum result. + * \param is224    Determines which function to use. + *                 <ul><li>0: Use SHA-256.</li> + *                 <li>1: Use SHA-224.</li></ul> + */ +int mbedtls_sha256_ret( const unsigned char *input, +                        size_t ilen, +                        unsigned char output[32], +                        int is224 ); + +#if !defined(MBEDTLS_DEPRECATED_REMOVED) +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED      __attribute__((deprecated)) +#else +#define MBEDTLS_DEPRECATED +#endif + +/** + * \brief          This function calculates the SHA-224 or SHA-256 checksum + *                 of a buffer. + * + *                 The function allocates the context, performs the + *                 calculation, and frees the context. + * + *                 The SHA-256 result is calculated as + *                 output = SHA-256(input buffer). + * + * \deprecated     Superseded by mbedtls_sha256_ret() in 2.7.0. + * + * \param input    The buffer holding the data. + * \param ilen     The length of the input data. + * \param output   The SHA-224 or SHA-256 checksum result. + * \param is224    Determines which function to use. + *                 <ul><li>0: Use SHA-256.</li> + *                 <li>1: Use SHA-224.</li></ul> + */ +MBEDTLS_DEPRECATED static inline void mbedtls_sha256( +                                                    const unsigned char *input, +                                                    size_t ilen, +                                                    unsigned char output[32], +                                                    int is224 ) +{ +    mbedtls_sha256_ret( input, ilen, output, is224 ); +} + +#undef MBEDTLS_DEPRECATED +#endif /* !MBEDTLS_DEPRECATED_REMOVED */ + +/** + * \brief          The SHA-224 and SHA-256 checkup routine. + * + * \return         \c 0 on success, or \c 1 on failure. + */ +int mbedtls_sha256_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + +#endif /* mbedtls_sha256.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/sha512.h b/thirdparty/mbedtls/include/mbedtls/sha512.h new file mode 100644 index 0000000000..52ae204d44 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/sha512.h @@ -0,0 +1,303 @@ +/** + * \file sha512.h + * + * \brief The SHA-384 and SHA-512 cryptographic hash function. + */ +/* + *  Copyright (C) 2006-2018, Arm Limited (or its affiliates), All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of Mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_SHA512_H +#define MBEDTLS_SHA512_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> +#include <stdint.h> + +#define MBEDTLS_ERR_SHA512_HW_ACCEL_FAILED                -0x0039  /**< SHA-512 hardware accelerator failed */ + +#if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \ +    !defined(inline) && !defined(__cplusplus) +#define inline __inline +#endif +#if !defined(MBEDTLS_SHA512_ALT) +// Regular implementation +// + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          The SHA-512 context structure. + * + *                 The structure is used both for SHA-384 and for SHA-512 + *                 checksum calculations. The choice between these two is + *                 made in the call to mbedtls_sha512_starts_ret(). + */ +typedef struct +{ +    uint64_t total[2];          /*!< The number of Bytes processed. */ +    uint64_t state[8];          /*!< The intermediate digest state. */ +    unsigned char buffer[128];  /*!< The data block being processed. */ +    int is384;                  /*!< Determines which function to use. +                                 *   <ul><li>0: Use SHA-512.</li> +                                 *   <li>1: Use SHA-384.</li></ul> */ +} +mbedtls_sha512_context; + +/** + * \brief          This function initializes a SHA-512 context. + * + * \param ctx      The SHA-512 context to initialize. + */ +void mbedtls_sha512_init( mbedtls_sha512_context *ctx ); + +/** + * \brief          This function clears a SHA-512 context. + * + * \param ctx      The SHA-512 context to clear. + */ +void mbedtls_sha512_free( mbedtls_sha512_context *ctx ); + +/** + * \brief          This function clones the state of a SHA-512 context. + * + * \param dst      The destination context. + * \param src      The context to clone. + */ +void mbedtls_sha512_clone( mbedtls_sha512_context *dst, +                           const mbedtls_sha512_context *src ); + +/** + * \brief          This function starts a SHA-384 or SHA-512 checksum + *                 calculation. + * + * \param ctx      The SHA-512 context to initialize. + * \param is384    Determines which function to use. + *                 <ul><li>0: Use SHA-512.</li> + *                 <li>1: Use SHA-384.</li></ul> + * + * \return         \c 0 on success. + */ +int mbedtls_sha512_starts_ret( mbedtls_sha512_context *ctx, int is384 ); + +/** + * \brief          This function feeds an input buffer into an ongoing + *                 SHA-512 checksum calculation. + * + * \param ctx      The SHA-512 context. + * \param input    The buffer holding the input data. + * \param ilen     The length of the input data. + * + * \return         \c 0 on success. + */ +int mbedtls_sha512_update_ret( mbedtls_sha512_context *ctx, +                    const unsigned char *input, +                    size_t ilen ); + +/** + * \brief          This function finishes the SHA-512 operation, and writes + *                 the result to the output buffer. This function is for + *                 internal use only. + * + * \param ctx      The SHA-512 context. + * \param output   The SHA-384 or SHA-512 checksum result. + * + * \return         \c 0 on success. + */ +int mbedtls_sha512_finish_ret( mbedtls_sha512_context *ctx, +                               unsigned char output[64] ); + +/** + * \brief          This function processes a single data block within + *                 the ongoing SHA-512 computation. + * + * \param ctx      The SHA-512 context. + * \param data     The buffer holding one block of data. + * + * \return         \c 0 on success. + */ +int mbedtls_internal_sha512_process( mbedtls_sha512_context *ctx, +                                     const unsigned char data[128] ); +#if !defined(MBEDTLS_DEPRECATED_REMOVED) +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED      __attribute__((deprecated)) +#else +#define MBEDTLS_DEPRECATED +#endif +/** + * \brief          This function starts a SHA-384 or SHA-512 checksum + *                 calculation. + * + * \deprecated     Superseded by mbedtls_sha512_starts_ret() in 2.7.0 + * + * \param ctx      The SHA-512 context to initialize. + * \param is384    Determines which function to use. + *                 <ul><li>0: Use SHA-512.</li> + *                 <li>1: Use SHA-384.</li></ul> + */ +MBEDTLS_DEPRECATED static inline void mbedtls_sha512_starts( +                                                mbedtls_sha512_context *ctx, +                                                int is384 ) +{ +    mbedtls_sha512_starts_ret( ctx, is384 ); +} + +/** + * \brief          This function feeds an input buffer into an ongoing + *                 SHA-512 checksum calculation. + * + * \deprecated     Superseded by mbedtls_sha512_update_ret() in 2.7.0 + * + * \param ctx      The SHA-512 context. + * \param input    The buffer holding the data. + * \param ilen     The length of the input data. + */ +MBEDTLS_DEPRECATED static inline void mbedtls_sha512_update( +                                                mbedtls_sha512_context *ctx, +                                                const unsigned char *input, +                                                size_t ilen ) +{ +    mbedtls_sha512_update_ret( ctx, input, ilen ); +} + +/** + * \brief          This function finishes the SHA-512 operation, and writes + *                 the result to the output buffer. + * + * \deprecated     Superseded by mbedtls_sha512_finish_ret() in 2.7.0 + * + * \param ctx      The SHA-512 context. + * \param output   The SHA-384 or SHA-512 checksum result. + */ +MBEDTLS_DEPRECATED static inline void mbedtls_sha512_finish( +                                                mbedtls_sha512_context *ctx, +                                                unsigned char output[64] ) +{ +    mbedtls_sha512_finish_ret( ctx, output ); +} + +/** + * \brief          This function processes a single data block within + *                 the ongoing SHA-512 computation. This function is for + *                 internal use only. + * + * \deprecated     Superseded by mbedtls_internal_sha512_process() in 2.7.0 + * + * \param ctx      The SHA-512 context. + * \param data     The buffer holding one block of data. + */ +MBEDTLS_DEPRECATED static inline void mbedtls_sha512_process( +                                            mbedtls_sha512_context *ctx, +                                            const unsigned char data[128] ) +{ +    mbedtls_internal_sha512_process( ctx, data ); +} + +#undef MBEDTLS_DEPRECATED +#endif /* !MBEDTLS_DEPRECATED_REMOVED */ + +#ifdef __cplusplus +} +#endif + +#else  /* MBEDTLS_SHA512_ALT */ +#include "sha512_alt.h" +#endif /* MBEDTLS_SHA512_ALT */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          This function calculates the SHA-512 or SHA-384 + *                 checksum of a buffer. + * + *                 The function allocates the context, performs the + *                 calculation, and frees the context. + * + *                 The SHA-512 result is calculated as + *                 output = SHA-512(input buffer). + * + * \param input    The buffer holding the input data. + * \param ilen     The length of the input data. + * \param output   The SHA-384 or SHA-512 checksum result. + * \param is384    Determines which function to use. + *                 <ul><li>0: Use SHA-512.</li> + *                 <li>1: Use SHA-384.</li></ul> + * + * \return         \c 0 on success. + */ +int mbedtls_sha512_ret( const unsigned char *input, +                        size_t ilen, +                        unsigned char output[64], +                        int is384 ); + +#if !defined(MBEDTLS_DEPRECATED_REMOVED) +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED      __attribute__((deprecated)) +#else +#define MBEDTLS_DEPRECATED +#endif +/** + * \brief          This function calculates the SHA-512 or SHA-384 + *                 checksum of a buffer. + * + *                 The function allocates the context, performs the + *                 calculation, and frees the context. + * + *                 The SHA-512 result is calculated as + *                 output = SHA-512(input buffer). + * + * \deprecated     Superseded by mbedtls_sha512_ret() in 2.7.0 + * + * \param input    The buffer holding the data. + * \param ilen     The length of the input data. + * \param output   The SHA-384 or SHA-512 checksum result. + * \param is384    Determines which function to use. + *                 <ul><li>0: Use SHA-512.</li> + *                 <li>1: Use SHA-384.</li></ul> + */ +MBEDTLS_DEPRECATED static inline void mbedtls_sha512( +                                                    const unsigned char *input, +                                                    size_t ilen, +                                                    unsigned char output[64], +                                                    int is384 ) +{ +    mbedtls_sha512_ret( input, ilen, output, is384 ); +} + +#undef MBEDTLS_DEPRECATED +#endif /* !MBEDTLS_DEPRECATED_REMOVED */ + /** + * \brief          The SHA-384 or SHA-512 checkup routine. + * + * \return         \c 0 on success, or \c 1 on failure. + */ +int mbedtls_sha512_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + +#endif /* mbedtls_sha512.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/ssl.h b/thirdparty/mbedtls/include/mbedtls/ssl.h new file mode 100644 index 0000000000..51e843ae24 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/ssl.h @@ -0,0 +1,2623 @@ +/** + * \file ssl.h + * + * \brief SSL/TLS functions. + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_SSL_H +#define MBEDTLS_SSL_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include "bignum.h" +#include "ecp.h" + +#include "ssl_ciphersuites.h" + +#if defined(MBEDTLS_X509_CRT_PARSE_C) +#include "x509_crt.h" +#include "x509_crl.h" +#endif + +#if defined(MBEDTLS_DHM_C) +#include "dhm.h" +#endif + +#if defined(MBEDTLS_ECDH_C) +#include "ecdh.h" +#endif + +#if defined(MBEDTLS_ZLIB_SUPPORT) +#include "zlib.h" +#endif + +#if defined(MBEDTLS_HAVE_TIME) +#include "mbedtls/platform_time.h" +#endif + +/* + * SSL Error codes + */ +#define MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE               -0x7080  /**< The requested feature is not available. */ +#define MBEDTLS_ERR_SSL_BAD_INPUT_DATA                    -0x7100  /**< Bad input parameters to function. */ +#define MBEDTLS_ERR_SSL_INVALID_MAC                       -0x7180  /**< Verification of the message MAC failed. */ +#define MBEDTLS_ERR_SSL_INVALID_RECORD                    -0x7200  /**< An invalid SSL record was received. */ +#define MBEDTLS_ERR_SSL_CONN_EOF                          -0x7280  /**< The connection indicated an EOF. */ +#define MBEDTLS_ERR_SSL_UNKNOWN_CIPHER                    -0x7300  /**< An unknown cipher was received. */ +#define MBEDTLS_ERR_SSL_NO_CIPHER_CHOSEN                  -0x7380  /**< The server has no ciphersuites in common with the client. */ +#define MBEDTLS_ERR_SSL_NO_RNG                            -0x7400  /**< No RNG was provided to the SSL module. */ +#define MBEDTLS_ERR_SSL_NO_CLIENT_CERTIFICATE             -0x7480  /**< No client certification received from the client, but required by the authentication mode. */ +#define MBEDTLS_ERR_SSL_CERTIFICATE_TOO_LARGE             -0x7500  /**< Our own certificate(s) is/are too large to send in an SSL message. */ +#define MBEDTLS_ERR_SSL_CERTIFICATE_REQUIRED              -0x7580  /**< The own certificate is not set, but needed by the server. */ +#define MBEDTLS_ERR_SSL_PRIVATE_KEY_REQUIRED              -0x7600  /**< The own private key or pre-shared key is not set, but needed. */ +#define MBEDTLS_ERR_SSL_CA_CHAIN_REQUIRED                 -0x7680  /**< No CA Chain is set, but required to operate. */ +#define MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE                -0x7700  /**< An unexpected message was received from our peer. */ +#define MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE               -0x7780  /**< A fatal alert message was received from our peer. */ +#define MBEDTLS_ERR_SSL_PEER_VERIFY_FAILED                -0x7800  /**< Verification of our peer failed. */ +#define MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY                 -0x7880  /**< The peer notified us that the connection is going to be closed. */ +#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_HELLO               -0x7900  /**< Processing of the ClientHello handshake message failed. */ +#define MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO               -0x7980  /**< Processing of the ServerHello handshake message failed. */ +#define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE                -0x7A00  /**< Processing of the Certificate handshake message failed. */ +#define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_REQUEST        -0x7A80  /**< Processing of the CertificateRequest handshake message failed. */ +#define MBEDTLS_ERR_SSL_BAD_HS_SERVER_KEY_EXCHANGE        -0x7B00  /**< Processing of the ServerKeyExchange handshake message failed. */ +#define MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO_DONE          -0x7B80  /**< Processing of the ServerHelloDone handshake message failed. */ +#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE        -0x7C00  /**< Processing of the ClientKeyExchange handshake message failed. */ +#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_RP     -0x7C80  /**< Processing of the ClientKeyExchange handshake message failed in DHM / ECDH Read Public. */ +#define MBEDTLS_ERR_SSL_BAD_HS_CLIENT_KEY_EXCHANGE_CS     -0x7D00  /**< Processing of the ClientKeyExchange handshake message failed in DHM / ECDH Calculate Secret. */ +#define MBEDTLS_ERR_SSL_BAD_HS_CERTIFICATE_VERIFY         -0x7D80  /**< Processing of the CertificateVerify handshake message failed. */ +#define MBEDTLS_ERR_SSL_BAD_HS_CHANGE_CIPHER_SPEC         -0x7E00  /**< Processing of the ChangeCipherSpec handshake message failed. */ +#define MBEDTLS_ERR_SSL_BAD_HS_FINISHED                   -0x7E80  /**< Processing of the Finished handshake message failed. */ +#define MBEDTLS_ERR_SSL_ALLOC_FAILED                      -0x7F00  /**< Memory allocation failed */ +#define MBEDTLS_ERR_SSL_HW_ACCEL_FAILED                   -0x7F80  /**< Hardware acceleration function returned with error */ +#define MBEDTLS_ERR_SSL_HW_ACCEL_FALLTHROUGH              -0x6F80  /**< Hardware acceleration function skipped / left alone data */ +#define MBEDTLS_ERR_SSL_COMPRESSION_FAILED                -0x6F00  /**< Processing of the compression / decompression failed */ +#define MBEDTLS_ERR_SSL_BAD_HS_PROTOCOL_VERSION           -0x6E80  /**< Handshake protocol not within min/max boundaries */ +#define MBEDTLS_ERR_SSL_BAD_HS_NEW_SESSION_TICKET         -0x6E00  /**< Processing of the NewSessionTicket handshake message failed. */ +#define MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED            -0x6D80  /**< Session ticket has expired. */ +#define MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH                  -0x6D00  /**< Public key type mismatch (eg, asked for RSA key exchange and presented EC key) */ +#define MBEDTLS_ERR_SSL_UNKNOWN_IDENTITY                  -0x6C80  /**< Unknown identity received (eg, PSK identity) */ +#define MBEDTLS_ERR_SSL_INTERNAL_ERROR                    -0x6C00  /**< Internal error (eg, unexpected failure in lower-level module) */ +#define MBEDTLS_ERR_SSL_COUNTER_WRAPPING                  -0x6B80  /**< A counter would wrap (eg, too many messages exchanged). */ +#define MBEDTLS_ERR_SSL_WAITING_SERVER_HELLO_RENEGO       -0x6B00  /**< Unexpected message at ServerHello in renegotiation. */ +#define MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED             -0x6A80  /**< DTLS client must retry for hello verification */ +#define MBEDTLS_ERR_SSL_BUFFER_TOO_SMALL                  -0x6A00  /**< A buffer is too small to receive or write a message */ +#define MBEDTLS_ERR_SSL_NO_USABLE_CIPHERSUITE             -0x6980  /**< None of the common ciphersuites is usable (eg, no suitable certificate, see debug messages). */ +#define MBEDTLS_ERR_SSL_WANT_READ                         -0x6900  /**< Connection requires a read call. */ +#define MBEDTLS_ERR_SSL_WANT_WRITE                        -0x6880  /**< Connection requires a write call. */ +#define MBEDTLS_ERR_SSL_TIMEOUT                           -0x6800  /**< The operation timed out. */ +#define MBEDTLS_ERR_SSL_CLIENT_RECONNECT                  -0x6780  /**< The client initiated a reconnect from the same port. */ +#define MBEDTLS_ERR_SSL_UNEXPECTED_RECORD                 -0x6700  /**< Record header looks valid but is not expected. */ +#define MBEDTLS_ERR_SSL_NON_FATAL                         -0x6680  /**< The alert message received indicates a non-fatal error. */ +#define MBEDTLS_ERR_SSL_INVALID_VERIFY_HASH               -0x6600  /**< Couldn't set the hash for verifying CertificateVerify */ + +/* + * Various constants + */ +#define MBEDTLS_SSL_MAJOR_VERSION_3             3 +#define MBEDTLS_SSL_MINOR_VERSION_0             0   /*!< SSL v3.0 */ +#define MBEDTLS_SSL_MINOR_VERSION_1             1   /*!< TLS v1.0 */ +#define MBEDTLS_SSL_MINOR_VERSION_2             2   /*!< TLS v1.1 */ +#define MBEDTLS_SSL_MINOR_VERSION_3             3   /*!< TLS v1.2 */ + +#define MBEDTLS_SSL_TRANSPORT_STREAM            0   /*!< TLS      */ +#define MBEDTLS_SSL_TRANSPORT_DATAGRAM          1   /*!< DTLS     */ + +#define MBEDTLS_SSL_MAX_HOST_NAME_LEN           255 /*!< Maximum host name defined in RFC 1035 */ + +/* RFC 6066 section 4, see also mfl_code_to_length in ssl_tls.c + * NONE must be zero so that memset()ing structure to zero works */ +#define MBEDTLS_SSL_MAX_FRAG_LEN_NONE           0   /*!< don't use this extension   */ +#define MBEDTLS_SSL_MAX_FRAG_LEN_512            1   /*!< MaxFragmentLength 2^9      */ +#define MBEDTLS_SSL_MAX_FRAG_LEN_1024           2   /*!< MaxFragmentLength 2^10     */ +#define MBEDTLS_SSL_MAX_FRAG_LEN_2048           3   /*!< MaxFragmentLength 2^11     */ +#define MBEDTLS_SSL_MAX_FRAG_LEN_4096           4   /*!< MaxFragmentLength 2^12     */ +#define MBEDTLS_SSL_MAX_FRAG_LEN_INVALID        5   /*!< first invalid value        */ + +#define MBEDTLS_SSL_IS_CLIENT                   0 +#define MBEDTLS_SSL_IS_SERVER                   1 + +#define MBEDTLS_SSL_IS_NOT_FALLBACK             0 +#define MBEDTLS_SSL_IS_FALLBACK                 1 + +#define MBEDTLS_SSL_EXTENDED_MS_DISABLED        0 +#define MBEDTLS_SSL_EXTENDED_MS_ENABLED         1 + +#define MBEDTLS_SSL_ETM_DISABLED                0 +#define MBEDTLS_SSL_ETM_ENABLED                 1 + +#define MBEDTLS_SSL_COMPRESS_NULL               0 +#define MBEDTLS_SSL_COMPRESS_DEFLATE            1 + +#define MBEDTLS_SSL_VERIFY_NONE                 0 +#define MBEDTLS_SSL_VERIFY_OPTIONAL             1 +#define MBEDTLS_SSL_VERIFY_REQUIRED             2 +#define MBEDTLS_SSL_VERIFY_UNSET                3 /* Used only for sni_authmode */ + +#define MBEDTLS_SSL_LEGACY_RENEGOTIATION        0 +#define MBEDTLS_SSL_SECURE_RENEGOTIATION        1 + +#define MBEDTLS_SSL_RENEGOTIATION_DISABLED      0 +#define MBEDTLS_SSL_RENEGOTIATION_ENABLED       1 + +#define MBEDTLS_SSL_ANTI_REPLAY_DISABLED        0 +#define MBEDTLS_SSL_ANTI_REPLAY_ENABLED         1 + +#define MBEDTLS_SSL_RENEGOTIATION_NOT_ENFORCED  -1 +#define MBEDTLS_SSL_RENEGO_MAX_RECORDS_DEFAULT  16 + +#define MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION     0 +#define MBEDTLS_SSL_LEGACY_ALLOW_RENEGOTIATION  1 +#define MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE      2 + +#define MBEDTLS_SSL_TRUNC_HMAC_DISABLED         0 +#define MBEDTLS_SSL_TRUNC_HMAC_ENABLED          1 +#define MBEDTLS_SSL_TRUNCATED_HMAC_LEN          10  /* 80 bits, rfc 6066 section 7 */ + +#define MBEDTLS_SSL_SESSION_TICKETS_DISABLED     0 +#define MBEDTLS_SSL_SESSION_TICKETS_ENABLED      1 + +#define MBEDTLS_SSL_CBC_RECORD_SPLITTING_DISABLED    0 +#define MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED     1 + +#define MBEDTLS_SSL_ARC4_ENABLED                0 +#define MBEDTLS_SSL_ARC4_DISABLED               1 + +#define MBEDTLS_SSL_PRESET_DEFAULT              0 +#define MBEDTLS_SSL_PRESET_SUITEB               2 + +#define MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED       1 +#define MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED      0 + +/* + * Default range for DTLS retransmission timer value, in milliseconds. + * RFC 6347 4.2.4.1 says from 1 second to 60 seconds. + */ +#define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MIN    1000 +#define MBEDTLS_SSL_DTLS_TIMEOUT_DFL_MAX   60000 + +/** + * \name SECTION: Module settings + * + * The configuration options you can set for this module are in this section. + * Either change them in config.h or define them on the compiler command line. + * \{ + */ + +#if !defined(MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME) +#define MBEDTLS_SSL_DEFAULT_TICKET_LIFETIME     86400 /**< Lifetime of session tickets (if enabled) */ +#endif + +/* + * Maxium fragment length in bytes, + * determines the size of each of the two internal I/O buffers. + * + * Note: the RFC defines the default size of SSL / TLS messages. If you + * change the value here, other clients / servers may not be able to + * communicate with you anymore. Only change this value if you control + * both sides of the connection and have it reduced at both sides, or + * if you're using the Max Fragment Length extension and you know all your + * peers are using it too! + */ +#if !defined(MBEDTLS_SSL_MAX_CONTENT_LEN) +#define MBEDTLS_SSL_MAX_CONTENT_LEN         16384   /**< Size of the input / output buffer */ +#endif + +/* \} name SECTION: Module settings */ + +/* + * Length of the verify data for secure renegotiation + */ +#if defined(MBEDTLS_SSL_PROTO_SSL3) +#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 36 +#else +#define MBEDTLS_SSL_VERIFY_DATA_MAX_LEN 12 +#endif + +/* + * Signaling ciphersuite values (SCSV) + */ +#define MBEDTLS_SSL_EMPTY_RENEGOTIATION_INFO    0xFF   /**< renegotiation info ext */ +#define MBEDTLS_SSL_FALLBACK_SCSV_VALUE         0x5600 /**< RFC 7507 section 2 */ + +/* + * Supported Signature and Hash algorithms (For TLS 1.2) + * RFC 5246 section 7.4.1.4.1 + */ +#define MBEDTLS_SSL_HASH_NONE                0 +#define MBEDTLS_SSL_HASH_MD5                 1 +#define MBEDTLS_SSL_HASH_SHA1                2 +#define MBEDTLS_SSL_HASH_SHA224              3 +#define MBEDTLS_SSL_HASH_SHA256              4 +#define MBEDTLS_SSL_HASH_SHA384              5 +#define MBEDTLS_SSL_HASH_SHA512              6 + +#define MBEDTLS_SSL_SIG_ANON                 0 +#define MBEDTLS_SSL_SIG_RSA                  1 +#define MBEDTLS_SSL_SIG_ECDSA                3 + +/* + * Client Certificate Types + * RFC 5246 section 7.4.4 plus RFC 4492 section 5.5 + */ +#define MBEDTLS_SSL_CERT_TYPE_RSA_SIGN       1 +#define MBEDTLS_SSL_CERT_TYPE_ECDSA_SIGN    64 + +/* + * Message, alert and handshake types + */ +#define MBEDTLS_SSL_MSG_CHANGE_CIPHER_SPEC     20 +#define MBEDTLS_SSL_MSG_ALERT                  21 +#define MBEDTLS_SSL_MSG_HANDSHAKE              22 +#define MBEDTLS_SSL_MSG_APPLICATION_DATA       23 + +#define MBEDTLS_SSL_ALERT_LEVEL_WARNING         1 +#define MBEDTLS_SSL_ALERT_LEVEL_FATAL           2 + +#define MBEDTLS_SSL_ALERT_MSG_CLOSE_NOTIFY           0  /* 0x00 */ +#define MBEDTLS_SSL_ALERT_MSG_UNEXPECTED_MESSAGE    10  /* 0x0A */ +#define MBEDTLS_SSL_ALERT_MSG_BAD_RECORD_MAC        20  /* 0x14 */ +#define MBEDTLS_SSL_ALERT_MSG_DECRYPTION_FAILED     21  /* 0x15 */ +#define MBEDTLS_SSL_ALERT_MSG_RECORD_OVERFLOW       22  /* 0x16 */ +#define MBEDTLS_SSL_ALERT_MSG_DECOMPRESSION_FAILURE 30  /* 0x1E */ +#define MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE     40  /* 0x28 */ +#define MBEDTLS_SSL_ALERT_MSG_NO_CERT               41  /* 0x29 */ +#define MBEDTLS_SSL_ALERT_MSG_BAD_CERT              42  /* 0x2A */ +#define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_CERT      43  /* 0x2B */ +#define MBEDTLS_SSL_ALERT_MSG_CERT_REVOKED          44  /* 0x2C */ +#define MBEDTLS_SSL_ALERT_MSG_CERT_EXPIRED          45  /* 0x2D */ +#define MBEDTLS_SSL_ALERT_MSG_CERT_UNKNOWN          46  /* 0x2E */ +#define MBEDTLS_SSL_ALERT_MSG_ILLEGAL_PARAMETER     47  /* 0x2F */ +#define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_CA            48  /* 0x30 */ +#define MBEDTLS_SSL_ALERT_MSG_ACCESS_DENIED         49  /* 0x31 */ +#define MBEDTLS_SSL_ALERT_MSG_DECODE_ERROR          50  /* 0x32 */ +#define MBEDTLS_SSL_ALERT_MSG_DECRYPT_ERROR         51  /* 0x33 */ +#define MBEDTLS_SSL_ALERT_MSG_EXPORT_RESTRICTION    60  /* 0x3C */ +#define MBEDTLS_SSL_ALERT_MSG_PROTOCOL_VERSION      70  /* 0x46 */ +#define MBEDTLS_SSL_ALERT_MSG_INSUFFICIENT_SECURITY 71  /* 0x47 */ +#define MBEDTLS_SSL_ALERT_MSG_INTERNAL_ERROR        80  /* 0x50 */ +#define MBEDTLS_SSL_ALERT_MSG_INAPROPRIATE_FALLBACK 86  /* 0x56 */ +#define MBEDTLS_SSL_ALERT_MSG_USER_CANCELED         90  /* 0x5A */ +#define MBEDTLS_SSL_ALERT_MSG_NO_RENEGOTIATION     100  /* 0x64 */ +#define MBEDTLS_SSL_ALERT_MSG_UNSUPPORTED_EXT      110  /* 0x6E */ +#define MBEDTLS_SSL_ALERT_MSG_UNRECOGNIZED_NAME    112  /* 0x70 */ +#define MBEDTLS_SSL_ALERT_MSG_UNKNOWN_PSK_IDENTITY 115  /* 0x73 */ +#define MBEDTLS_SSL_ALERT_MSG_NO_APPLICATION_PROTOCOL 120 /* 0x78 */ + +#define MBEDTLS_SSL_HS_HELLO_REQUEST            0 +#define MBEDTLS_SSL_HS_CLIENT_HELLO             1 +#define MBEDTLS_SSL_HS_SERVER_HELLO             2 +#define MBEDTLS_SSL_HS_HELLO_VERIFY_REQUEST     3 +#define MBEDTLS_SSL_HS_NEW_SESSION_TICKET       4 +#define MBEDTLS_SSL_HS_CERTIFICATE             11 +#define MBEDTLS_SSL_HS_SERVER_KEY_EXCHANGE     12 +#define MBEDTLS_SSL_HS_CERTIFICATE_REQUEST     13 +#define MBEDTLS_SSL_HS_SERVER_HELLO_DONE       14 +#define MBEDTLS_SSL_HS_CERTIFICATE_VERIFY      15 +#define MBEDTLS_SSL_HS_CLIENT_KEY_EXCHANGE     16 +#define MBEDTLS_SSL_HS_FINISHED                20 + +/* + * TLS extensions + */ +#define MBEDTLS_TLS_EXT_SERVERNAME                   0 +#define MBEDTLS_TLS_EXT_SERVERNAME_HOSTNAME          0 + +#define MBEDTLS_TLS_EXT_MAX_FRAGMENT_LENGTH          1 + +#define MBEDTLS_TLS_EXT_TRUNCATED_HMAC               4 + +#define MBEDTLS_TLS_EXT_SUPPORTED_ELLIPTIC_CURVES   10 +#define MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS     11 + +#define MBEDTLS_TLS_EXT_SIG_ALG                     13 + +#define MBEDTLS_TLS_EXT_ALPN                        16 + +#define MBEDTLS_TLS_EXT_ENCRYPT_THEN_MAC            22 /* 0x16 */ +#define MBEDTLS_TLS_EXT_EXTENDED_MASTER_SECRET  0x0017 /* 23 */ + +#define MBEDTLS_TLS_EXT_SESSION_TICKET              35 + +#define MBEDTLS_TLS_EXT_ECJPAKE_KKPP               256 /* experimental */ + +#define MBEDTLS_TLS_EXT_RENEGOTIATION_INFO      0xFF01 + +/* + * Size defines + */ +#if !defined(MBEDTLS_PSK_MAX_LEN) +#define MBEDTLS_PSK_MAX_LEN            32 /* 256 bits */ +#endif + +/* Dummy type used only for its size */ +union mbedtls_ssl_premaster_secret +{ +#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) +    unsigned char _pms_rsa[48];                         /* RFC 5246 8.1.1 */ +#endif +#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) +    unsigned char _pms_dhm[MBEDTLS_MPI_MAX_SIZE];      /* RFC 5246 8.1.2 */ +#endif +#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED)    || \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)  || \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED)     || \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED) +    unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES];    /* RFC 4492 5.10 */ +#endif +#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) +    unsigned char _pms_psk[4 + 2 * MBEDTLS_PSK_MAX_LEN];       /* RFC 4279 2 */ +#endif +#if defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED) +    unsigned char _pms_dhe_psk[4 + MBEDTLS_MPI_MAX_SIZE +                                 + MBEDTLS_PSK_MAX_LEN];       /* RFC 4279 3 */ +#endif +#if defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED) +    unsigned char _pms_rsa_psk[52 + MBEDTLS_PSK_MAX_LEN];      /* RFC 4279 4 */ +#endif +#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) +    unsigned char _pms_ecdhe_psk[4 + MBEDTLS_ECP_MAX_BYTES +                                   + MBEDTLS_PSK_MAX_LEN];     /* RFC 5489 2 */ +#endif +#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) +    unsigned char _pms_ecjpake[32];     /* Thread spec: SHA-256 output */ +#endif +}; + +#define MBEDTLS_PREMASTER_SIZE     sizeof( union mbedtls_ssl_premaster_secret ) + +#ifdef __cplusplus +extern "C" { +#endif + +/* + * SSL state machine + */ +typedef enum +{ +    MBEDTLS_SSL_HELLO_REQUEST, +    MBEDTLS_SSL_CLIENT_HELLO, +    MBEDTLS_SSL_SERVER_HELLO, +    MBEDTLS_SSL_SERVER_CERTIFICATE, +    MBEDTLS_SSL_SERVER_KEY_EXCHANGE, +    MBEDTLS_SSL_CERTIFICATE_REQUEST, +    MBEDTLS_SSL_SERVER_HELLO_DONE, +    MBEDTLS_SSL_CLIENT_CERTIFICATE, +    MBEDTLS_SSL_CLIENT_KEY_EXCHANGE, +    MBEDTLS_SSL_CERTIFICATE_VERIFY, +    MBEDTLS_SSL_CLIENT_CHANGE_CIPHER_SPEC, +    MBEDTLS_SSL_CLIENT_FINISHED, +    MBEDTLS_SSL_SERVER_CHANGE_CIPHER_SPEC, +    MBEDTLS_SSL_SERVER_FINISHED, +    MBEDTLS_SSL_FLUSH_BUFFERS, +    MBEDTLS_SSL_HANDSHAKE_WRAPUP, +    MBEDTLS_SSL_HANDSHAKE_OVER, +    MBEDTLS_SSL_SERVER_NEW_SESSION_TICKET, +    MBEDTLS_SSL_SERVER_HELLO_VERIFY_REQUEST_SENT, +} +mbedtls_ssl_states; + +/** + * \brief          Callback type: send data on the network. + * + * \note           That callback may be either blocking or non-blocking. + * + * \param ctx      Context for the send callback (typically a file descriptor) + * \param buf      Buffer holding the data to send + * \param len      Length of the data to send + * + * \return         The callback must return the number of bytes sent if any, + *                 or a non-zero error code. + *                 If performing non-blocking I/O, \c MBEDTLS_ERR_SSL_WANT_WRITE + *                 must be returned when the operation would block. + * + * \note           The callback is allowed to send fewer bytes than requested. + *                 It must always return the number of bytes actually sent. + */ +typedef int mbedtls_ssl_send_t( void *ctx, +                                const unsigned char *buf, +                                size_t len ); + +/** + * \brief          Callback type: receive data from the network. + * + * \note           That callback may be either blocking or non-blocking. + * + * \param ctx      Context for the receive callback (typically a file + *                 descriptor) + * \param buf      Buffer to write the received data to + * \param len      Length of the receive buffer + * + * \return         The callback must return the number of bytes received, + *                 or a non-zero error code. + *                 If performing non-blocking I/O, \c MBEDTLS_ERR_SSL_WANT_READ + *                 must be returned when the operation would block. + * + * \note           The callback may receive fewer bytes than the length of the + *                 buffer. It must always return the number of bytes actually + *                 received and written to the buffer. + */ +typedef int mbedtls_ssl_recv_t( void *ctx, +                                unsigned char *buf, +                                size_t len ); + +/** + * \brief          Callback type: receive data from the network, with timeout + * + * \note           That callback must block until data is received, or the + *                 timeout delay expires, or the operation is interrupted by a + *                 signal. + * + * \param ctx      Context for the receive callback (typically a file descriptor) + * \param buf      Buffer to write the received data to + * \param len      Length of the receive buffer + * \param timeout  Maximum nomber of millisecondes to wait for data + *                 0 means no timeout (potentially waiting forever) + * + * \return         The callback must return the number of bytes received, + *                 or a non-zero error code: + *                 \c MBEDTLS_ERR_SSL_TIMEOUT if the operation timed out, + *                 \c MBEDTLS_ERR_SSL_WANT_READ if interrupted by a signal. + * + * \note           The callback may receive fewer bytes than the length of the + *                 buffer. It must always return the number of bytes actually + *                 received and written to the buffer. + */ +typedef int mbedtls_ssl_recv_timeout_t( void *ctx, +                                        unsigned char *buf, +                                        size_t len, +                                        uint32_t timeout ); +/** + * \brief          Callback type: set a pair of timers/delays to watch + * + * \param ctx      Context pointer + * \param int_ms   Intermediate delay in milliseconds + * \param fin_ms   Final delay in milliseconds + *                 0 cancels the current timer. + * + * \note           This callback must at least store the necessary information + *                 for the associated \c mbedtls_ssl_get_timer_t callback to + *                 return correct information. + * + * \note           If using a event-driven style of programming, an event must + *                 be generated when the final delay is passed. The event must + *                 cause a call to \c mbedtls_ssl_handshake() with the proper + *                 SSL context to be scheduled. Care must be taken to ensure + *                 that at most one such call happens at a time. + * + * \note           Only one timer at a time must be running. Calling this + *                 function while a timer is running must cancel it. Cancelled + *                 timers must not generate any event. + */ +typedef void mbedtls_ssl_set_timer_t( void * ctx, +                                      uint32_t int_ms, +                                      uint32_t fin_ms ); + +/** + * \brief          Callback type: get status of timers/delays + * + * \param ctx      Context pointer + * + * \return         This callback must return: + *                 -1 if cancelled (fin_ms == 0), + *                  0 if none of the delays have passed, + *                  1 if only the intermediate delay has passed, + *                  2 if the final delay has passed. + */ +typedef int mbedtls_ssl_get_timer_t( void * ctx ); + + +/* Defined below */ +typedef struct mbedtls_ssl_session mbedtls_ssl_session; +typedef struct mbedtls_ssl_context mbedtls_ssl_context; +typedef struct mbedtls_ssl_config  mbedtls_ssl_config; + +/* Defined in ssl_internal.h */ +typedef struct mbedtls_ssl_transform mbedtls_ssl_transform; +typedef struct mbedtls_ssl_handshake_params mbedtls_ssl_handshake_params; +typedef struct mbedtls_ssl_sig_hash_set_t mbedtls_ssl_sig_hash_set_t; +#if defined(MBEDTLS_X509_CRT_PARSE_C) +typedef struct mbedtls_ssl_key_cert mbedtls_ssl_key_cert; +#endif +#if defined(MBEDTLS_SSL_PROTO_DTLS) +typedef struct mbedtls_ssl_flight_item mbedtls_ssl_flight_item; +#endif + +/* + * This structure is used for storing current session data. + */ +struct mbedtls_ssl_session +{ +#if defined(MBEDTLS_HAVE_TIME) +    mbedtls_time_t start;       /*!< starting time      */ +#endif +    int ciphersuite;            /*!< chosen ciphersuite */ +    int compression;            /*!< chosen compression */ +    size_t id_len;              /*!< session id length  */ +    unsigned char id[32];       /*!< session identifier */ +    unsigned char master[48];   /*!< the master secret  */ + +#if defined(MBEDTLS_X509_CRT_PARSE_C) +    mbedtls_x509_crt *peer_cert;        /*!< peer X.509 cert chain */ +#endif /* MBEDTLS_X509_CRT_PARSE_C */ +    uint32_t verify_result;          /*!<  verification result     */ + +#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C) +    unsigned char *ticket;      /*!< RFC 5077 session ticket */ +    size_t ticket_len;          /*!< session ticket length   */ +    uint32_t ticket_lifetime;   /*!< ticket lifetime hint    */ +#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_CLI_C */ + +#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH) +    unsigned char mfl_code;     /*!< MaxFragmentLength negotiated by peer */ +#endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */ + +#if defined(MBEDTLS_SSL_TRUNCATED_HMAC) +    int trunc_hmac;             /*!< flag for truncated hmac activation   */ +#endif /* MBEDTLS_SSL_TRUNCATED_HMAC */ + +#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC) +    int encrypt_then_mac;       /*!< flag for EtM activation                */ +#endif +}; + +/** + * SSL/TLS configuration to be shared between mbedtls_ssl_context structures. + */ +struct mbedtls_ssl_config +{ +    /* Group items by size (largest first) to minimize padding overhead */ + +    /* +     * Pointers +     */ + +    const int *ciphersuite_list[4]; /*!< allowed ciphersuites per version   */ + +    /** Callback for printing debug output                                  */ +    void (*f_dbg)(void *, int, const char *, int, const char *); +    void *p_dbg;                    /*!< context for the debug function     */ + +    /** Callback for getting (pseudo-)random numbers                        */ +    int  (*f_rng)(void *, unsigned char *, size_t); +    void *p_rng;                    /*!< context for the RNG function       */ + +    /** Callback to retrieve a session from the cache                       */ +    int (*f_get_cache)(void *, mbedtls_ssl_session *); +    /** Callback to store a session into the cache                          */ +    int (*f_set_cache)(void *, const mbedtls_ssl_session *); +    void *p_cache;                  /*!< context for cache callbacks        */ + +#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION) +    /** Callback for setting cert according to SNI extension                */ +    int (*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, size_t); +    void *p_sni;                    /*!< context for SNI callback           */ +#endif + +#if defined(MBEDTLS_X509_CRT_PARSE_C) +    /** Callback to customize X.509 certificate chain verification          */ +    int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *); +    void *p_vrfy;                   /*!< context for X.509 verify calllback */ +#endif + +#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED) +    /** Callback to retrieve PSK key from identity                          */ +    int (*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, size_t); +    void *p_psk;                    /*!< context for PSK callback           */ +#endif + +#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C) +    /** Callback to create & write a cookie for ClientHello veirifcation    */ +    int (*f_cookie_write)( void *, unsigned char **, unsigned char *, +                           const unsigned char *, size_t ); +    /** Callback to verify validity of a ClientHello cookie                 */ +    int (*f_cookie_check)( void *, const unsigned char *, size_t, +                           const unsigned char *, size_t ); +    void *p_cookie;                 /*!< context for the cookie callbacks   */ +#endif + +#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C) +    /** Callback to create & write a session ticket                         */ +    int (*f_ticket_write)( void *, const mbedtls_ssl_session *, +            unsigned char *, const unsigned char *, size_t *, uint32_t * ); +    /** Callback to parse a session ticket into a session structure         */ +    int (*f_ticket_parse)( void *, mbedtls_ssl_session *, unsigned char *, size_t); +    void *p_ticket;                 /*!< context for the ticket callbacks   */ +#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */ + +#if defined(MBEDTLS_SSL_EXPORT_KEYS) +    /** Callback to export key block and master secret                      */ +    int (*f_export_keys)( void *, const unsigned char *, +            const unsigned char *, size_t, size_t, size_t ); +    void *p_export_keys;            /*!< context for key export callback    */ +#endif + +#if defined(MBEDTLS_X509_CRT_PARSE_C) +    const mbedtls_x509_crt_profile *cert_profile; /*!< verification profile */ +    mbedtls_ssl_key_cert *key_cert; /*!< own certificate/key pair(s)        */ +    mbedtls_x509_crt *ca_chain;     /*!< trusted CAs                        */ +    mbedtls_x509_crl *ca_crl;       /*!< trusted CAs CRLs                   */ +#endif /* MBEDTLS_X509_CRT_PARSE_C */ + +#if defined(MBEDTLS_KEY_EXCHANGE__WITH_CERT__ENABLED) +    const int *sig_hashes;          /*!< allowed signature hashes           */ +#endif + +#if defined(MBEDTLS_ECP_C) +    const mbedtls_ecp_group_id *curve_list; /*!< allowed curves             */ +#endif + +#if defined(MBEDTLS_DHM_C) +    mbedtls_mpi dhm_P;              /*!< prime modulus for DHM              */ +    mbedtls_mpi dhm_G;              /*!< generator for DHM                  */ +#endif + +#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED) +    unsigned char *psk;             /*!< pre-shared key                     */ +    size_t         psk_len;         /*!< length of the pre-shared key       */ +    unsigned char *psk_identity;    /*!< identity for PSK negotiation       */ +    size_t         psk_identity_len;/*!< length of identity                 */ +#endif + +#if defined(MBEDTLS_SSL_ALPN) +    const char **alpn_list;         /*!< ordered list of protocols          */ +#endif + +    /* +     * Numerical settings (int then char) +     */ + +    uint32_t read_timeout;          /*!< timeout for mbedtls_ssl_read (ms)  */ + +#if defined(MBEDTLS_SSL_PROTO_DTLS) +    uint32_t hs_timeout_min;        /*!< initial value of the handshake +                                         retransmission timeout (ms)        */ +    uint32_t hs_timeout_max;        /*!< maximum value of the handshake +                                         retransmission timeout (ms)        */ +#endif + +#if defined(MBEDTLS_SSL_RENEGOTIATION) +    int renego_max_records;         /*!< grace period for renegotiation     */ +    unsigned char renego_period[8]; /*!< value of the record counters +                                         that triggers renegotiation        */ +#endif + +#if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT) +    unsigned int badmac_limit;      /*!< limit of records with a bad MAC    */ +#endif + +#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C) +    unsigned int dhm_min_bitlen;    /*!< min. bit length of the DHM prime   */ +#endif + +    unsigned char max_major_ver;    /*!< max. major version used            */ +    unsigned char max_minor_ver;    /*!< max. minor version used            */ +    unsigned char min_major_ver;    /*!< min. major version used            */ +    unsigned char min_minor_ver;    /*!< min. minor version used            */ + +    /* +     * Flags (bitfields) +     */ + +    unsigned int endpoint : 1;      /*!< 0: client, 1: server               */ +    unsigned int transport : 1;     /*!< stream (TLS) or datagram (DTLS)    */ +    unsigned int authmode : 2;      /*!< MBEDTLS_SSL_VERIFY_XXX             */ +    /* needed even with renego disabled for LEGACY_BREAK_HANDSHAKE          */ +    unsigned int allow_legacy_renegotiation : 2 ; /*!< MBEDTLS_LEGACY_XXX   */ +#if defined(MBEDTLS_ARC4_C) +    unsigned int arc4_disabled : 1; /*!< blacklist RC4 ciphersuites?        */ +#endif +#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH) +    unsigned int mfl_code : 3;      /*!< desired fragment length            */ +#endif +#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC) +    unsigned int encrypt_then_mac : 1 ; /*!< negotiate encrypt-then-mac?    */ +#endif +#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET) +    unsigned int extended_ms : 1;   /*!< negotiate extended master secret?  */ +#endif +#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY) +    unsigned int anti_replay : 1;   /*!< detect and prevent replay?         */ +#endif +#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING) +    unsigned int cbc_record_splitting : 1;  /*!< do cbc record splitting    */ +#endif +#if defined(MBEDTLS_SSL_RENEGOTIATION) +    unsigned int disable_renegotiation : 1; /*!< disable renegotiation?     */ +#endif +#if defined(MBEDTLS_SSL_TRUNCATED_HMAC) +    unsigned int trunc_hmac : 1;    /*!< negotiate truncated hmac?          */ +#endif +#if defined(MBEDTLS_SSL_SESSION_TICKETS) +    unsigned int session_tickets : 1;   /*!< use session tickets?           */ +#endif +#if defined(MBEDTLS_SSL_FALLBACK_SCSV) && defined(MBEDTLS_SSL_CLI_C) +    unsigned int fallback : 1;      /*!< is this a fallback?                */ +#endif +#if defined(MBEDTLS_SSL_SRV_C) +    unsigned int cert_req_ca_list : 1;  /*!< enable sending CA list in +                                          Certificate Request messages?     */ +#endif +}; + + +struct mbedtls_ssl_context +{ +    const mbedtls_ssl_config *conf; /*!< configuration information          */ + +    /* +     * Miscellaneous +     */ +    int state;                  /*!< SSL handshake: current state     */ +#if defined(MBEDTLS_SSL_RENEGOTIATION) +    int renego_status;          /*!< Initial, in progress, pending?   */ +    int renego_records_seen;    /*!< Records since renego request, or with DTLS, +                                  number of retransmissions of request if +                                  renego_max_records is < 0           */ +#endif + +    int major_ver;              /*!< equal to  MBEDTLS_SSL_MAJOR_VERSION_3    */ +    int minor_ver;              /*!< either 0 (SSL3) or 1 (TLS1.0)    */ + +#if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT) +    unsigned badmac_seen;       /*!< records with a bad MAC received    */ +#endif + +    mbedtls_ssl_send_t *f_send; /*!< Callback for network send */ +    mbedtls_ssl_recv_t *f_recv; /*!< Callback for network receive */ +    mbedtls_ssl_recv_timeout_t *f_recv_timeout; +                                /*!< Callback for network receive with timeout */ + +    void *p_bio;                /*!< context for I/O operations   */ + +    /* +     * Session layer +     */ +    mbedtls_ssl_session *session_in;            /*!<  current session data (in)   */ +    mbedtls_ssl_session *session_out;           /*!<  current session data (out)  */ +    mbedtls_ssl_session *session;               /*!<  negotiated session data     */ +    mbedtls_ssl_session *session_negotiate;     /*!<  session data in negotiation */ + +    mbedtls_ssl_handshake_params *handshake;    /*!<  params required only during +                                              the handshake process        */ + +    /* +     * Record layer transformations +     */ +    mbedtls_ssl_transform *transform_in;        /*!<  current transform params (in)   */ +    mbedtls_ssl_transform *transform_out;       /*!<  current transform params (in)   */ +    mbedtls_ssl_transform *transform;           /*!<  negotiated transform params     */ +    mbedtls_ssl_transform *transform_negotiate; /*!<  transform params in negotiation */ + +    /* +     * Timers +     */ +    void *p_timer;              /*!< context for the timer callbacks */ + +    mbedtls_ssl_set_timer_t *f_set_timer;       /*!< set timer callback */ +    mbedtls_ssl_get_timer_t *f_get_timer;       /*!< get timer callback */ + +    /* +     * Record layer (incoming data) +     */ +    unsigned char *in_buf;      /*!< input buffer                     */ +    unsigned char *in_ctr;      /*!< 64-bit incoming message counter +                                     TLS: maintained by us +                                     DTLS: read from peer             */ +    unsigned char *in_hdr;      /*!< start of record header           */ +    unsigned char *in_len;      /*!< two-bytes message length field   */ +    unsigned char *in_iv;       /*!< ivlen-byte IV                    */ +    unsigned char *in_msg;      /*!< message contents (in_iv+ivlen)   */ +    unsigned char *in_offt;     /*!< read offset in application data  */ + +    int in_msgtype;             /*!< record header: message type      */ +    size_t in_msglen;           /*!< record header: message length    */ +    size_t in_left;             /*!< amount of data read so far       */ +#if defined(MBEDTLS_SSL_PROTO_DTLS) +    uint16_t in_epoch;          /*!< DTLS epoch for incoming records  */ +    size_t next_record_offset;  /*!< offset of the next record in datagram +                                     (equal to in_left if none)       */ +#endif +#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY) +    uint64_t in_window_top;     /*!< last validated record seq_num    */ +    uint64_t in_window;         /*!< bitmask for replay detection     */ +#endif + +    size_t in_hslen;            /*!< current handshake message length, +                                     including the handshake header   */ +    int nb_zero;                /*!< # of 0-length encrypted messages */ + +    int keep_current_message;   /*!< drop or reuse current message +                                     on next call to record layer? */ + +    /* +     * Record layer (outgoing data) +     */ +    unsigned char *out_buf;     /*!< output buffer                    */ +    unsigned char *out_ctr;     /*!< 64-bit outgoing message counter  */ +    unsigned char *out_hdr;     /*!< start of record header           */ +    unsigned char *out_len;     /*!< two-bytes message length field   */ +    unsigned char *out_iv;      /*!< ivlen-byte IV                    */ +    unsigned char *out_msg;     /*!< message contents (out_iv+ivlen)  */ + +    int out_msgtype;            /*!< record header: message type      */ +    size_t out_msglen;          /*!< record header: message length    */ +    size_t out_left;            /*!< amount of data not yet written   */ + +#if defined(MBEDTLS_ZLIB_SUPPORT) +    unsigned char *compress_buf;        /*!<  zlib data buffer        */ +#endif +#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING) +    signed char split_done;     /*!< current record already splitted? */ +#endif + +    /* +     * PKI layer +     */ +    int client_auth;                    /*!<  flag for client auth.   */ + +    /* +     * User settings +     */ +#if defined(MBEDTLS_X509_CRT_PARSE_C) +    char *hostname;             /*!< expected peer CN for verification +                                     (and SNI if available)                 */ +#endif + +#if defined(MBEDTLS_SSL_ALPN) +    const char *alpn_chosen;    /*!<  negotiated protocol                   */ +#endif + +    /* +     * Information for DTLS hello verify +     */ +#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C) +    unsigned char  *cli_id;         /*!<  transport-level ID of the client  */ +    size_t          cli_id_len;     /*!<  length of cli_id                  */ +#endif + +    /* +     * Secure renegotiation +     */ +    /* needed to know when to send extension on server */ +    int secure_renegotiation;           /*!<  does peer support legacy or +                                              secure renegotiation           */ +#if defined(MBEDTLS_SSL_RENEGOTIATION) +    size_t verify_data_len;             /*!<  length of verify data stored   */ +    char own_verify_data[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN]; /*!<  previous handshake verify data */ +    char peer_verify_data[MBEDTLS_SSL_VERIFY_DATA_MAX_LEN]; /*!<  previous handshake verify data */ +#endif +}; + +#if defined(MBEDTLS_SSL_HW_RECORD_ACCEL) + +#define MBEDTLS_SSL_CHANNEL_OUTBOUND    0 +#define MBEDTLS_SSL_CHANNEL_INBOUND     1 + +extern int (*mbedtls_ssl_hw_record_init)(mbedtls_ssl_context *ssl, +                const unsigned char *key_enc, const unsigned char *key_dec, +                size_t keylen, +                const unsigned char *iv_enc,  const unsigned char *iv_dec, +                size_t ivlen, +                const unsigned char *mac_enc, const unsigned char *mac_dec, +                size_t maclen); +extern int (*mbedtls_ssl_hw_record_activate)(mbedtls_ssl_context *ssl, int direction); +extern int (*mbedtls_ssl_hw_record_reset)(mbedtls_ssl_context *ssl); +extern int (*mbedtls_ssl_hw_record_write)(mbedtls_ssl_context *ssl); +extern int (*mbedtls_ssl_hw_record_read)(mbedtls_ssl_context *ssl); +extern int (*mbedtls_ssl_hw_record_finish)(mbedtls_ssl_context *ssl); +#endif /* MBEDTLS_SSL_HW_RECORD_ACCEL */ + +/** + * \brief Returns the list of ciphersuites supported by the SSL/TLS module. + * + * \return              a statically allocated array of ciphersuites, the last + *                      entry is 0. + */ +const int *mbedtls_ssl_list_ciphersuites( void ); + +/** + * \brief               Return the name of the ciphersuite associated with the + *                      given ID + * + * \param ciphersuite_id SSL ciphersuite ID + * + * \return              a string containing the ciphersuite name + */ +const char *mbedtls_ssl_get_ciphersuite_name( const int ciphersuite_id ); + +/** + * \brief               Return the ID of the ciphersuite associated with the + *                      given name + * + * \param ciphersuite_name SSL ciphersuite name + * + * \return              the ID with the ciphersuite or 0 if not found + */ +int mbedtls_ssl_get_ciphersuite_id( const char *ciphersuite_name ); + +/** + * \brief          Initialize an SSL context + *                 Just makes the context ready for mbedtls_ssl_setup() or + *                 mbedtls_ssl_free() + * + * \param ssl      SSL context + */ +void mbedtls_ssl_init( mbedtls_ssl_context *ssl ); + +/** + * \brief          Set up an SSL context for use + * + * \note           No copy of the configuration context is made, it can be + *                 shared by many mbedtls_ssl_context structures. + * + * \warning        Modifying the conf structure after it has been used in this + *                 function is unsupported! + * + * \param ssl      SSL context + * \param conf     SSL configuration to use + * + * \return         0 if successful, or MBEDTLS_ERR_SSL_ALLOC_FAILED if + *                 memory allocation failed + */ +int mbedtls_ssl_setup( mbedtls_ssl_context *ssl, +                       const mbedtls_ssl_config *conf ); + +/** + * \brief          Reset an already initialized SSL context for re-use + *                 while retaining application-set variables, function + *                 pointers and data. + * + * \param ssl      SSL context + * \return         0 if successful, or MBEDTLS_ERR_SSL_ALLOC_FAILED, +                   MBEDTLS_ERR_SSL_HW_ACCEL_FAILED or + *                 MBEDTLS_ERR_SSL_COMPRESSION_FAILED + */ +int mbedtls_ssl_session_reset( mbedtls_ssl_context *ssl ); + +/** + * \brief          Set the current endpoint type + * + * \param conf     SSL configuration + * \param endpoint must be MBEDTLS_SSL_IS_CLIENT or MBEDTLS_SSL_IS_SERVER + */ +void mbedtls_ssl_conf_endpoint( mbedtls_ssl_config *conf, int endpoint ); + +/** + * \brief           Set the transport type (TLS or DTLS). + *                  Default: TLS + * + * \note            For DTLS, you must either provide a recv callback that + *                  doesn't block, or one that handles timeouts, see + *                  \c mbedtls_ssl_set_bio(). You also need to provide timer + *                  callbacks with \c mbedtls_ssl_set_timer_cb(). + * + * \param conf      SSL configuration + * \param transport transport type: + *                  MBEDTLS_SSL_TRANSPORT_STREAM for TLS, + *                  MBEDTLS_SSL_TRANSPORT_DATAGRAM for DTLS. + */ +void mbedtls_ssl_conf_transport( mbedtls_ssl_config *conf, int transport ); + +/** + * \brief          Set the certificate verification mode + *                 Default: NONE on server, REQUIRED on client + * + * \param conf     SSL configuration + * \param authmode can be: + * + *  MBEDTLS_SSL_VERIFY_NONE:      peer certificate is not checked + *                        (default on server) + *                        (insecure on client) + * + *  MBEDTLS_SSL_VERIFY_OPTIONAL:  peer certificate is checked, however the + *                        handshake continues even if verification failed; + *                        mbedtls_ssl_get_verify_result() can be called after the + *                        handshake is complete. + * + *  MBEDTLS_SSL_VERIFY_REQUIRED:  peer *must* present a valid certificate, + *                        handshake is aborted if verification failed. + *                        (default on client) + * + * \note On client, MBEDTLS_SSL_VERIFY_REQUIRED is the recommended mode. + * With MBEDTLS_SSL_VERIFY_OPTIONAL, the user needs to call mbedtls_ssl_get_verify_result() at + * the right time(s), which may not be obvious, while REQUIRED always perform + * the verification as soon as possible. For example, REQUIRED was protecting + * against the "triple handshake" attack even before it was found. + */ +void mbedtls_ssl_conf_authmode( mbedtls_ssl_config *conf, int authmode ); + +#if defined(MBEDTLS_X509_CRT_PARSE_C) +/** + * \brief          Set the verification callback (Optional). + * + *                 If set, the verify callback is called for each + *                 certificate in the chain. For implementation + *                 information, please see \c mbedtls_x509_crt_verify() + * + * \param conf     SSL configuration + * \param f_vrfy   verification function + * \param p_vrfy   verification parameter + */ +void mbedtls_ssl_conf_verify( mbedtls_ssl_config *conf, +                     int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), +                     void *p_vrfy ); +#endif /* MBEDTLS_X509_CRT_PARSE_C */ + +/** + * \brief          Set the random number generator callback + * + * \param conf     SSL configuration + * \param f_rng    RNG function + * \param p_rng    RNG parameter + */ +void mbedtls_ssl_conf_rng( mbedtls_ssl_config *conf, +                  int (*f_rng)(void *, unsigned char *, size_t), +                  void *p_rng ); + +/** + * \brief          Set the debug callback + * + *                 The callback has the following argument: + *                 void *           opaque context for the callback + *                 int              debug level + *                 const char *     file name + *                 int              line number + *                 const char *     message + * + * \param conf     SSL configuration + * \param f_dbg    debug function + * \param p_dbg    debug parameter + */ +void mbedtls_ssl_conf_dbg( mbedtls_ssl_config *conf, +                  void (*f_dbg)(void *, int, const char *, int, const char *), +                  void  *p_dbg ); + +/** + * \brief          Set the underlying BIO callbacks for write, read and + *                 read-with-timeout. + * + * \param ssl      SSL context + * \param p_bio    parameter (context) shared by BIO callbacks + * \param f_send   write callback + * \param f_recv   read callback + * \param f_recv_timeout blocking read callback with timeout. + * + * \note           One of f_recv or f_recv_timeout can be NULL, in which case + *                 the other is used. If both are non-NULL, f_recv_timeout is + *                 used and f_recv is ignored (as if it were NULL). + * + * \note           The two most common use cases are: + *                 - non-blocking I/O, f_recv != NULL, f_recv_timeout == NULL + *                 - blocking I/O, f_recv == NULL, f_recv_timout != NULL + * + * \note           For DTLS, you need to provide either a non-NULL + *                 f_recv_timeout callback, or a f_recv that doesn't block. + * + * \note           See the documentations of \c mbedtls_ssl_sent_t, + *                 \c mbedtls_ssl_recv_t and \c mbedtls_ssl_recv_timeout_t for + *                 the conventions those callbacks must follow. + * + * \note           On some platforms, net_sockets.c provides + *                 \c mbedtls_net_send(), \c mbedtls_net_recv() and + *                 \c mbedtls_net_recv_timeout() that are suitable to be used + *                 here. + */ +void mbedtls_ssl_set_bio( mbedtls_ssl_context *ssl, +                          void *p_bio, +                          mbedtls_ssl_send_t *f_send, +                          mbedtls_ssl_recv_t *f_recv, +                          mbedtls_ssl_recv_timeout_t *f_recv_timeout ); + +/** + * \brief          Set the timeout period for mbedtls_ssl_read() + *                 (Default: no timeout.) + * + * \param conf     SSL configuration context + * \param timeout  Timeout value in milliseconds. + *                 Use 0 for no timeout (default). + * + * \note           With blocking I/O, this will only work if a non-NULL + *                 \c f_recv_timeout was set with \c mbedtls_ssl_set_bio(). + *                 With non-blocking I/O, this will only work if timer + *                 callbacks were set with \c mbedtls_ssl_set_timer_cb(). + * + * \note           With non-blocking I/O, you may also skip this function + *                 altogether and handle timeouts at the application layer. + */ +void mbedtls_ssl_conf_read_timeout( mbedtls_ssl_config *conf, uint32_t timeout ); + +/** + * \brief          Set the timer callbacks (Mandatory for DTLS.) + * + * \param ssl      SSL context + * \param p_timer  parameter (context) shared by timer callbacks + * \param f_set_timer   set timer callback + * \param f_get_timer   get timer callback. Must return: + * + * \note           See the documentation of \c mbedtls_ssl_set_timer_t and + *                 \c mbedtls_ssl_get_timer_t for the conventions this pair of + *                 callbacks must follow. + * + * \note           On some platforms, timing.c provides + *                 \c mbedtls_timing_set_delay() and + *                 \c mbedtls_timing_get_delay() that are suitable for using + *                 here, except if using an event-driven style. + * + * \note           See also the "DTLS tutorial" article in our knowledge base. + *                 https://tls.mbed.org/kb/how-to/dtls-tutorial + */ +void mbedtls_ssl_set_timer_cb( mbedtls_ssl_context *ssl, +                               void *p_timer, +                               mbedtls_ssl_set_timer_t *f_set_timer, +                               mbedtls_ssl_get_timer_t *f_get_timer ); + +/** + * \brief           Callback type: generate and write session ticket + * + * \note            This describes what a callback implementation should do. + *                  This callback should generate an encrypted and + *                  authenticated ticket for the session and write it to the + *                  output buffer. Here, ticket means the opaque ticket part + *                  of the NewSessionTicket structure of RFC 5077. + * + * \param p_ticket  Context for the callback + * \param session   SSL session to be written in the ticket + * \param start     Start of the output buffer + * \param end       End of the output buffer + * \param tlen      On exit, holds the length written + * \param lifetime  On exit, holds the lifetime of the ticket in seconds + * + * \return          0 if successful, or + *                  a specific MBEDTLS_ERR_XXX code. + */ +typedef int mbedtls_ssl_ticket_write_t( void *p_ticket, +                                        const mbedtls_ssl_session *session, +                                        unsigned char *start, +                                        const unsigned char *end, +                                        size_t *tlen, +                                        uint32_t *lifetime ); + +#if defined(MBEDTLS_SSL_EXPORT_KEYS) +/** + * \brief           Callback type: Export key block and master secret + * + * \note            This is required for certain uses of TLS, e.g. EAP-TLS + *                  (RFC 5216) and Thread. The key pointers are ephemeral and + *                  therefore must not be stored. The master secret and keys + *                  should not be used directly except as an input to a key + *                  derivation function. + * + * \param p_expkey  Context for the callback + * \param ms        Pointer to master secret (fixed length: 48 bytes) + * \param kb        Pointer to key block, see RFC 5246 section 6.3 + *                  (variable length: 2 * maclen + 2 * keylen + 2 * ivlen). + * \param maclen    MAC length + * \param keylen    Key length + * \param ivlen     IV length + * + * \return          0 if successful, or + *                  a specific MBEDTLS_ERR_XXX code. + */ +typedef int mbedtls_ssl_export_keys_t( void *p_expkey, +                                const unsigned char *ms, +                                const unsigned char *kb, +                                size_t maclen, +                                size_t keylen, +                                size_t ivlen ); +#endif /* MBEDTLS_SSL_EXPORT_KEYS */ + +/** + * \brief           Callback type: parse and load session ticket + * + * \note            This describes what a callback implementation should do. + *                  This callback should parse a session ticket as generated + *                  by the corresponding mbedtls_ssl_ticket_write_t function, + *                  and, if the ticket is authentic and valid, load the + *                  session. + * + * \note            The implementation is allowed to modify the first len + *                  bytes of the input buffer, eg to use it as a temporary + *                  area for the decrypted ticket contents. + * + * \param p_ticket  Context for the callback + * \param session   SSL session to be loaded + * \param buf       Start of the buffer containing the ticket + * \param len       Length of the ticket. + * + * \return          0 if successful, or + *                  MBEDTLS_ERR_SSL_INVALID_MAC if not authentic, or + *                  MBEDTLS_ERR_SSL_SESSION_TICKET_EXPIRED if expired, or + *                  any other non-zero code for other failures. + */ +typedef int mbedtls_ssl_ticket_parse_t( void *p_ticket, +                                        mbedtls_ssl_session *session, +                                        unsigned char *buf, +                                        size_t len ); + +#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_SRV_C) +/** + * \brief           Configure SSL session ticket callbacks (server only). + *                  (Default: none.) + * + * \note            On server, session tickets are enabled by providing + *                  non-NULL callbacks. + * + * \note            On client, use \c mbedtls_ssl_conf_session_tickets(). + * + * \param conf      SSL configuration context + * \param f_ticket_write    Callback for writing a ticket + * \param f_ticket_parse    Callback for parsing a ticket + * \param p_ticket          Context shared by the two callbacks + */ +void mbedtls_ssl_conf_session_tickets_cb( mbedtls_ssl_config *conf, +        mbedtls_ssl_ticket_write_t *f_ticket_write, +        mbedtls_ssl_ticket_parse_t *f_ticket_parse, +        void *p_ticket ); +#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_SRV_C */ + +#if defined(MBEDTLS_SSL_EXPORT_KEYS) +/** + * \brief           Configure key export callback. + *                  (Default: none.) + * + * \note            See \c mbedtls_ssl_export_keys_t. + * + * \param conf      SSL configuration context + * \param f_export_keys     Callback for exporting keys + * \param p_export_keys     Context for the callback + */ +void mbedtls_ssl_conf_export_keys_cb( mbedtls_ssl_config *conf, +        mbedtls_ssl_export_keys_t *f_export_keys, +        void *p_export_keys ); +#endif /* MBEDTLS_SSL_EXPORT_KEYS */ + +/** + * \brief          Callback type: generate a cookie + * + * \param ctx      Context for the callback + * \param p        Buffer to write to, + *                 must be updated to point right after the cookie + * \param end      Pointer to one past the end of the output buffer + * \param info     Client ID info that was passed to + *                 \c mbedtls_ssl_set_client_transport_id() + * \param ilen     Length of info in bytes + * + * \return         The callback must return 0 on success, + *                 or a negative error code. + */ +typedef int mbedtls_ssl_cookie_write_t( void *ctx, +                                unsigned char **p, unsigned char *end, +                                const unsigned char *info, size_t ilen ); + +/** + * \brief          Callback type: verify a cookie + * + * \param ctx      Context for the callback + * \param cookie   Cookie to verify + * \param clen     Length of cookie + * \param info     Client ID info that was passed to + *                 \c mbedtls_ssl_set_client_transport_id() + * \param ilen     Length of info in bytes + * + * \return         The callback must return 0 if cookie is valid, + *                 or a negative error code. + */ +typedef int mbedtls_ssl_cookie_check_t( void *ctx, +                                const unsigned char *cookie, size_t clen, +                                const unsigned char *info, size_t ilen ); + +#if defined(MBEDTLS_SSL_DTLS_HELLO_VERIFY) && defined(MBEDTLS_SSL_SRV_C) +/** + * \brief           Register callbacks for DTLS cookies + *                  (Server only. DTLS only.) + * + *                  Default: dummy callbacks that fail, in order to force you to + *                  register working callbacks (and initialize their context). + * + *                  To disable HelloVerifyRequest, register NULL callbacks. + * + * \warning         Disabling hello verification allows your server to be used + *                  for amplification in DoS attacks against other hosts. + *                  Only disable if you known this can't happen in your + *                  particular environment. + * + * \note            See comments on \c mbedtls_ssl_handshake() about handling + *                  the MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED that is expected + *                  on the first handshake attempt when this is enabled. + * + * \note            This is also necessary to handle client reconnection from + *                  the same port as described in RFC 6347 section 4.2.8 (only + *                  the variant with cookies is supported currently). See + *                  comments on \c mbedtls_ssl_read() for details. + * + * \param conf              SSL configuration + * \param f_cookie_write    Cookie write callback + * \param f_cookie_check    Cookie check callback + * \param p_cookie          Context for both callbacks + */ +void mbedtls_ssl_conf_dtls_cookies( mbedtls_ssl_config *conf, +                           mbedtls_ssl_cookie_write_t *f_cookie_write, +                           mbedtls_ssl_cookie_check_t *f_cookie_check, +                           void *p_cookie ); + +/** + * \brief          Set client's transport-level identification info. + *                 (Server only. DTLS only.) + * + *                 This is usually the IP address (and port), but could be + *                 anything identify the client depending on the underlying + *                 network stack. Used for HelloVerifyRequest with DTLS. + *                 This is *not* used to route the actual packets. + * + * \param ssl      SSL context + * \param info     Transport-level info identifying the client (eg IP + port) + * \param ilen     Length of info in bytes + * + * \note           An internal copy is made, so the info buffer can be reused. + * + * \return         0 on success, + *                 MBEDTLS_ERR_SSL_BAD_INPUT_DATA if used on client, + *                 MBEDTLS_ERR_SSL_ALLOC_FAILED if out of memory. + */ +int mbedtls_ssl_set_client_transport_id( mbedtls_ssl_context *ssl, +                                 const unsigned char *info, +                                 size_t ilen ); + +#endif /* MBEDTLS_SSL_DTLS_HELLO_VERIFY && MBEDTLS_SSL_SRV_C */ + +#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY) +/** + * \brief          Enable or disable anti-replay protection for DTLS. + *                 (DTLS only, no effect on TLS.) + *                 Default: enabled. + * + * \param conf     SSL configuration + * \param mode     MBEDTLS_SSL_ANTI_REPLAY_ENABLED or MBEDTLS_SSL_ANTI_REPLAY_DISABLED. + * + * \warning        Disabling this is a security risk unless the application + *                 protocol handles duplicated packets in a safe way. You + *                 should not disable this without careful consideration. + *                 However, if your application already detects duplicated + *                 packets and needs information about them to adjust its + *                 transmission strategy, then you'll want to disable this. + */ +void mbedtls_ssl_conf_dtls_anti_replay( mbedtls_ssl_config *conf, char mode ); +#endif /* MBEDTLS_SSL_DTLS_ANTI_REPLAY */ + +#if defined(MBEDTLS_SSL_DTLS_BADMAC_LIMIT) +/** + * \brief          Set a limit on the number of records with a bad MAC + *                 before terminating the connection. + *                 (DTLS only, no effect on TLS.) + *                 Default: 0 (disabled). + * + * \param conf     SSL configuration + * \param limit    Limit, or 0 to disable. + * + * \note           If the limit is N, then the connection is terminated when + *                 the Nth non-authentic record is seen. + * + * \note           Records with an invalid header are not counted, only the + *                 ones going through the authentication-decryption phase. + * + * \note           This is a security trade-off related to the fact that it's + *                 often relatively easy for an active attacker ot inject UDP + *                 datagrams. On one hand, setting a low limit here makes it + *                 easier for such an attacker to forcibly terminated a + *                 connection. On the other hand, a high limit or no limit + *                 might make us waste resources checking authentication on + *                 many bogus packets. + */ +void mbedtls_ssl_conf_dtls_badmac_limit( mbedtls_ssl_config *conf, unsigned limit ); +#endif /* MBEDTLS_SSL_DTLS_BADMAC_LIMIT */ + +#if defined(MBEDTLS_SSL_PROTO_DTLS) +/** + * \brief          Set retransmit timeout values for the DTLS handshake. + *                 (DTLS only, no effect on TLS.) + * + * \param conf     SSL configuration + * \param min      Initial timeout value in milliseconds. + *                 Default: 1000 (1 second). + * \param max      Maximum timeout value in milliseconds. + *                 Default: 60000 (60 seconds). + * + * \note           Default values are from RFC 6347 section 4.2.4.1. + * + * \note           The 'min' value should typically be slightly above the + *                 expected round-trip time to your peer, plus whatever time + *                 it takes for the peer to process the message. For example, + *                 if your RTT is about 600ms and you peer needs up to 1s to + *                 do the cryptographic operations in the handshake, then you + *                 should set 'min' slightly above 1600. Lower values of 'min' + *                 might cause spurious resends which waste network resources, + *                 while larger value of 'min' will increase overall latency + *                 on unreliable network links. + * + * \note           The more unreliable your network connection is, the larger + *                 your max / min ratio needs to be in order to achieve + *                 reliable handshakes. + * + * \note           Messages are retransmitted up to log2(ceil(max/min)) times. + *                 For example, if min = 1s and max = 5s, the retransmit plan + *                 goes: send ... 1s -> resend ... 2s -> resend ... 4s -> + *                 resend ... 5s -> give up and return a timeout error. + */ +void mbedtls_ssl_conf_handshake_timeout( mbedtls_ssl_config *conf, uint32_t min, uint32_t max ); +#endif /* MBEDTLS_SSL_PROTO_DTLS */ + +#if defined(MBEDTLS_SSL_SRV_C) +/** + * \brief          Set the session cache callbacks (server-side only) + *                 If not set, no session resuming is done (except if session + *                 tickets are enabled too). + * + *                 The session cache has the responsibility to check for stale + *                 entries based on timeout. See RFC 5246 for recommendations. + * + *                 Warning: session.peer_cert is cleared by the SSL/TLS layer on + *                 connection shutdown, so do not cache the pointer! Either set + *                 it to NULL or make a full copy of the certificate. + * + *                 The get callback is called once during the initial handshake + *                 to enable session resuming. The get function has the + *                 following parameters: (void *parameter, mbedtls_ssl_session *session) + *                 If a valid entry is found, it should fill the master of + *                 the session object with the cached values and return 0, + *                 return 1 otherwise. Optionally peer_cert can be set as well + *                 if it is properly present in cache entry. + * + *                 The set callback is called once during the initial handshake + *                 to enable session resuming after the entire handshake has + *                 been finished. The set function has the following parameters: + *                 (void *parameter, const mbedtls_ssl_session *session). The function + *                 should create a cache entry for future retrieval based on + *                 the data in the session structure and should keep in mind + *                 that the mbedtls_ssl_session object presented (and all its referenced + *                 data) is cleared by the SSL/TLS layer when the connection is + *                 terminated. It is recommended to add metadata to determine if + *                 an entry is still valid in the future. Return 0 if + *                 successfully cached, return 1 otherwise. + * + * \param conf           SSL configuration + * \param p_cache        parmater (context) for both callbacks + * \param f_get_cache    session get callback + * \param f_set_cache    session set callback + */ +void mbedtls_ssl_conf_session_cache( mbedtls_ssl_config *conf, +        void *p_cache, +        int (*f_get_cache)(void *, mbedtls_ssl_session *), +        int (*f_set_cache)(void *, const mbedtls_ssl_session *) ); +#endif /* MBEDTLS_SSL_SRV_C */ + +#if defined(MBEDTLS_SSL_CLI_C) +/** + * \brief          Request resumption of session (client-side only) + *                 Session data is copied from presented session structure. + * + * \param ssl      SSL context + * \param session  session context + * + * \return         0 if successful, + *                 MBEDTLS_ERR_SSL_ALLOC_FAILED if memory allocation failed, + *                 MBEDTLS_ERR_SSL_BAD_INPUT_DATA if used server-side or + *                 arguments are otherwise invalid + * + * \sa             mbedtls_ssl_get_session() + */ +int mbedtls_ssl_set_session( mbedtls_ssl_context *ssl, const mbedtls_ssl_session *session ); +#endif /* MBEDTLS_SSL_CLI_C */ + +/** + * \brief               Set the list of allowed ciphersuites and the preference + *                      order. First in the list has the highest preference. + *                      (Overrides all version-specific lists) + * + *                      The ciphersuites array is not copied, and must remain + *                      valid for the lifetime of the ssl_config. + * + *                      Note: The server uses its own preferences + *                      over the preference of the client unless + *                      MBEDTLS_SSL_SRV_RESPECT_CLIENT_PREFERENCE is defined! + * + * \param conf          SSL configuration + * \param ciphersuites  0-terminated list of allowed ciphersuites + */ +void mbedtls_ssl_conf_ciphersuites( mbedtls_ssl_config *conf, +                                   const int *ciphersuites ); + +/** + * \brief               Set the list of allowed ciphersuites and the + *                      preference order for a specific version of the protocol. + *                      (Only useful on the server side) + * + *                      The ciphersuites array is not copied, and must remain + *                      valid for the lifetime of the ssl_config. + * + * \param conf          SSL configuration + * \param ciphersuites  0-terminated list of allowed ciphersuites + * \param major         Major version number (only MBEDTLS_SSL_MAJOR_VERSION_3 + *                      supported) + * \param minor         Minor version number (MBEDTLS_SSL_MINOR_VERSION_0, + *                      MBEDTLS_SSL_MINOR_VERSION_1 and MBEDTLS_SSL_MINOR_VERSION_2, + *                      MBEDTLS_SSL_MINOR_VERSION_3 supported) + * + * \note                With DTLS, use MBEDTLS_SSL_MINOR_VERSION_2 for DTLS 1.0 + *                      and MBEDTLS_SSL_MINOR_VERSION_3 for DTLS 1.2 + */ +void mbedtls_ssl_conf_ciphersuites_for_version( mbedtls_ssl_config *conf, +                                       const int *ciphersuites, +                                       int major, int minor ); + +#if defined(MBEDTLS_X509_CRT_PARSE_C) +/** + * \brief          Set the X.509 security profile used for verification + * + * \note           The restrictions are enforced for all certificates in the + *                 chain. However, signatures in the handshake are not covered + *                 by this setting but by \b mbedtls_ssl_conf_sig_hashes(). + * + * \param conf     SSL configuration + * \param profile  Profile to use + */ +void mbedtls_ssl_conf_cert_profile( mbedtls_ssl_config *conf, +                                    const mbedtls_x509_crt_profile *profile ); + +/** + * \brief          Set the data required to verify peer certificate + * + * \param conf     SSL configuration + * \param ca_chain trusted CA chain (meaning all fully trusted top-level CAs) + * \param ca_crl   trusted CA CRLs + */ +void mbedtls_ssl_conf_ca_chain( mbedtls_ssl_config *conf, +                               mbedtls_x509_crt *ca_chain, +                               mbedtls_x509_crl *ca_crl ); + +/** + * \brief          Set own certificate chain and private key + * + * \note           own_cert should contain in order from the bottom up your + *                 certificate chain. The top certificate (self-signed) + *                 can be omitted. + * + * \note           On server, this function can be called multiple times to + *                 provision more than one cert/key pair (eg one ECDSA, one + *                 RSA with SHA-256, one RSA with SHA-1). An adequate + *                 certificate will be selected according to the client's + *                 advertised capabilities. In case mutliple certificates are + *                 adequate, preference is given to the one set by the first + *                 call to this function, then second, etc. + * + * \note           On client, only the first call has any effect. That is, + *                 only one client certificate can be provisioned. The + *                 server's preferences in its CertficateRequest message will + *                 be ignored and our only cert will be sent regardless of + *                 whether it matches those preferences - the server can then + *                 decide what it wants to do with it. + * + * \param conf     SSL configuration + * \param own_cert own public certificate chain + * \param pk_key   own private key + * + * \return         0 on success or MBEDTLS_ERR_SSL_ALLOC_FAILED + */ +int mbedtls_ssl_conf_own_cert( mbedtls_ssl_config *conf, +                              mbedtls_x509_crt *own_cert, +                              mbedtls_pk_context *pk_key ); +#endif /* MBEDTLS_X509_CRT_PARSE_C */ + +#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED) +/** + * \brief          Set the Pre Shared Key (PSK) and the expected identity name + * + * \note           This is mainly useful for clients. Servers will usually + *                 want to use \c mbedtls_ssl_conf_psk_cb() instead. + * + * \note           Currently clients can only register one pre-shared key. + *                 In other words, the servers' identity hint is ignored. + *                 Support for setting multiple PSKs on clients and selecting + *                 one based on the identity hint is not a planned feature but + *                 feedback is welcomed. + * + * \param conf     SSL configuration + * \param psk      pointer to the pre-shared key + * \param psk_len  pre-shared key length + * \param psk_identity      pointer to the pre-shared key identity + * \param psk_identity_len  identity key length + * + * \return         0 if successful or MBEDTLS_ERR_SSL_ALLOC_FAILED + */ +int mbedtls_ssl_conf_psk( mbedtls_ssl_config *conf, +                const unsigned char *psk, size_t psk_len, +                const unsigned char *psk_identity, size_t psk_identity_len ); + + +/** + * \brief          Set the Pre Shared Key (PSK) for the current handshake + * + * \note           This should only be called inside the PSK callback, + *                 ie the function passed to \c mbedtls_ssl_conf_psk_cb(). + * + * \param ssl      SSL context + * \param psk      pointer to the pre-shared key + * \param psk_len  pre-shared key length + * + * \return         0 if successful or MBEDTLS_ERR_SSL_ALLOC_FAILED + */ +int mbedtls_ssl_set_hs_psk( mbedtls_ssl_context *ssl, +                            const unsigned char *psk, size_t psk_len ); + +/** + * \brief          Set the PSK callback (server-side only). + * + *                 If set, the PSK callback is called for each + *                 handshake where a PSK ciphersuite was negotiated. + *                 The caller provides the identity received and wants to + *                 receive the actual PSK data and length. + * + *                 The callback has the following parameters: (void *parameter, + *                 mbedtls_ssl_context *ssl, const unsigned char *psk_identity, + *                 size_t identity_len) + *                 If a valid PSK identity is found, the callback should use + *                 \c mbedtls_ssl_set_hs_psk() on the ssl context to set the + *                 correct PSK and return 0. + *                 Any other return value will result in a denied PSK identity. + * + * \note           If you set a PSK callback using this function, then you + *                 don't need to set a PSK key and identity using + *                 \c mbedtls_ssl_conf_psk(). + * + * \param conf     SSL configuration + * \param f_psk    PSK identity function + * \param p_psk    PSK identity parameter + */ +void mbedtls_ssl_conf_psk_cb( mbedtls_ssl_config *conf, +                     int (*f_psk)(void *, mbedtls_ssl_context *, const unsigned char *, +                                  size_t), +                     void *p_psk ); +#endif /* MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */ + +#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_SRV_C) + +#if !defined(MBEDTLS_DEPRECATED_REMOVED) + +#if defined(MBEDTLS_DEPRECATED_WARNING) +#define MBEDTLS_DEPRECATED    __attribute__((deprecated)) +#else +#define MBEDTLS_DEPRECATED +#endif + +/** + * \brief          Set the Diffie-Hellman public P and G values, + *                 read as hexadecimal strings (server-side only) + *                 (Default values: MBEDTLS_DHM_RFC3526_MODP_2048_[PG]) + * + * \param conf     SSL configuration + * \param dhm_P    Diffie-Hellman-Merkle modulus + * \param dhm_G    Diffie-Hellman-Merkle generator + * + * \deprecated     Superseded by \c mbedtls_ssl_conf_dh_param_bin. + * + * \return         0 if successful + */ +MBEDTLS_DEPRECATED int mbedtls_ssl_conf_dh_param( mbedtls_ssl_config *conf, +                                                  const char *dhm_P, +                                                  const char *dhm_G ); + +#endif /* MBEDTLS_DEPRECATED_REMOVED */ + +/** + * \brief          Set the Diffie-Hellman public P and G values + *                 from big-endian binary presentations. + *                 (Default values: MBEDTLS_DHM_RFC3526_MODP_2048_[PG]_BIN) + * + * \param conf     SSL configuration + * \param dhm_P    Diffie-Hellman-Merkle modulus in big-endian binary form + * \param P_len    Length of DHM modulus + * \param dhm_G    Diffie-Hellman-Merkle generator in big-endian binary form + * \param G_len    Length of DHM generator + * + * \return         0 if successful + */ +int mbedtls_ssl_conf_dh_param_bin( mbedtls_ssl_config *conf, +                                   const unsigned char *dhm_P, size_t P_len, +                                   const unsigned char *dhm_G,  size_t G_len ); + +/** + * \brief          Set the Diffie-Hellman public P and G values, + *                 read from existing context (server-side only) + * + * \param conf     SSL configuration + * \param dhm_ctx  Diffie-Hellman-Merkle context + * + * \return         0 if successful + */ +int mbedtls_ssl_conf_dh_param_ctx( mbedtls_ssl_config *conf, mbedtls_dhm_context *dhm_ctx ); +#endif /* MBEDTLS_DHM_C && defined(MBEDTLS_SSL_SRV_C) */ + +#if defined(MBEDTLS_DHM_C) && defined(MBEDTLS_SSL_CLI_C) +/** + * \brief          Set the minimum length for Diffie-Hellman parameters. + *                 (Client-side only.) + *                 (Default: 1024 bits.) + * + * \param conf     SSL configuration + * \param bitlen   Minimum bit length of the DHM prime + */ +void mbedtls_ssl_conf_dhm_min_bitlen( mbedtls_ssl_config *conf, +                                      unsigned int bitlen ); +#endif /* MBEDTLS_DHM_C && MBEDTLS_SSL_CLI_C */ + +#if defined(MBEDTLS_ECP_C) +/** + * \brief          Set the allowed curves in order of preference. + *                 (Default: all defined curves.) + * + *                 On server: this only affects selection of the ECDHE curve; + *                 the curves used for ECDH and ECDSA are determined by the + *                 list of available certificates instead. + * + *                 On client: this affects the list of curves offered for any + *                 use. The server can override our preference order. + * + *                 Both sides: limits the set of curves accepted for use in + *                 ECDHE and in the peer's end-entity certificate. + * + * \note           This has no influence on which curves are allowed inside the + *                 certificate chains, see \c mbedtls_ssl_conf_cert_profile() + *                 for that. For the end-entity certificate however, the key + *                 will be accepted only if it is allowed both by this list + *                 and by the cert profile. + * + * \note           This list should be ordered by decreasing preference + *                 (preferred curve first). + * + * \param conf     SSL configuration + * \param curves   Ordered list of allowed curves, + *                 terminated by MBEDTLS_ECP_DP_NONE. + */ +void mbedtls_ssl_conf_curves( mbedtls_ssl_config *conf, +                              const mbedtls_ecp_group_id *curves ); +#endif /* MBEDTLS_ECP_C */ + +#if defined(MBEDTLS_KEY_EXCHANGE__WITH_CERT__ENABLED) +/** + * \brief          Set the allowed hashes for signatures during the handshake. + *                 (Default: all available hashes except MD5.) + * + * \note           This only affects which hashes are offered and can be used + *                 for signatures during the handshake. Hashes for message + *                 authentication and the TLS PRF are controlled by the + *                 ciphersuite, see \c mbedtls_ssl_conf_ciphersuites(). Hashes + *                 used for certificate signature are controlled by the + *                 verification profile, see \c mbedtls_ssl_conf_cert_profile(). + * + * \note           This list should be ordered by decreasing preference + *                 (preferred hash first). + * + * \param conf     SSL configuration + * \param hashes   Ordered list of allowed signature hashes, + *                 terminated by \c MBEDTLS_MD_NONE. + */ +void mbedtls_ssl_conf_sig_hashes( mbedtls_ssl_config *conf, +                                  const int *hashes ); +#endif /* MBEDTLS_KEY_EXCHANGE__WITH_CERT__ENABLED */ + +#if defined(MBEDTLS_X509_CRT_PARSE_C) +/** + * \brief          Set or reset the hostname to check against the received  + *                 server certificate. It sets the ServerName TLS extension,  + *                 too, if that extension is enabled. (client-side only) + * + * \param ssl      SSL context + * \param hostname the server hostname, may be NULL to clear hostname +  + * \note           Maximum hostname length MBEDTLS_SSL_MAX_HOST_NAME_LEN. + * + * \return         0 if successful, MBEDTLS_ERR_SSL_ALLOC_FAILED on  + *                 allocation failure, MBEDTLS_ERR_SSL_BAD_INPUT_DATA on  + *                 too long input hostname. + * + *                 Hostname set to the one provided on success (cleared + *                 when NULL). On allocation failure hostname is cleared.  + *                 On too long input failure, old hostname is unchanged. + */ +int mbedtls_ssl_set_hostname( mbedtls_ssl_context *ssl, const char *hostname ); +#endif /* MBEDTLS_X509_CRT_PARSE_C */ + +#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION) +/** + * \brief          Set own certificate and key for the current handshake + * + * \note           Same as \c mbedtls_ssl_conf_own_cert() but for use within + *                 the SNI callback. + * + * \param ssl      SSL context + * \param own_cert own public certificate chain + * \param pk_key   own private key + * + * \return         0 on success or MBEDTLS_ERR_SSL_ALLOC_FAILED + */ +int mbedtls_ssl_set_hs_own_cert( mbedtls_ssl_context *ssl, +                                 mbedtls_x509_crt *own_cert, +                                 mbedtls_pk_context *pk_key ); + +/** + * \brief          Set the data required to verify peer certificate for the + *                 current handshake + * + * \note           Same as \c mbedtls_ssl_conf_ca_chain() but for use within + *                 the SNI callback. + * + * \param ssl      SSL context + * \param ca_chain trusted CA chain (meaning all fully trusted top-level CAs) + * \param ca_crl   trusted CA CRLs + */ +void mbedtls_ssl_set_hs_ca_chain( mbedtls_ssl_context *ssl, +                                  mbedtls_x509_crt *ca_chain, +                                  mbedtls_x509_crl *ca_crl ); + +/** + * \brief          Set authmode for the current handshake. + * + * \note           Same as \c mbedtls_ssl_conf_authmode() but for use within + *                 the SNI callback. + * + * \param ssl      SSL context + * \param authmode MBEDTLS_SSL_VERIFY_NONE, MBEDTLS_SSL_VERIFY_OPTIONAL or + *                 MBEDTLS_SSL_VERIFY_REQUIRED + */ +void mbedtls_ssl_set_hs_authmode( mbedtls_ssl_context *ssl, +                                  int authmode ); + +/** + * \brief          Set server side ServerName TLS extension callback + *                 (optional, server-side only). + * + *                 If set, the ServerName callback is called whenever the + *                 server receives a ServerName TLS extension from the client + *                 during a handshake. The ServerName callback has the + *                 following parameters: (void *parameter, mbedtls_ssl_context *ssl, + *                 const unsigned char *hostname, size_t len). If a suitable + *                 certificate is found, the callback must set the + *                 certificate(s) and key(s) to use with \c + *                 mbedtls_ssl_set_hs_own_cert() (can be called repeatedly), + *                 and may optionally adjust the CA and associated CRL with \c + *                 mbedtls_ssl_set_hs_ca_chain() as well as the client + *                 authentication mode with \c mbedtls_ssl_set_hs_authmode(), + *                 then must return 0. If no matching name is found, the + *                 callback must either set a default cert, or + *                 return non-zero to abort the handshake at this point. + * + * \param conf     SSL configuration + * \param f_sni    verification function + * \param p_sni    verification parameter + */ +void mbedtls_ssl_conf_sni( mbedtls_ssl_config *conf, +                  int (*f_sni)(void *, mbedtls_ssl_context *, const unsigned char *, +                               size_t), +                  void *p_sni ); +#endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION */ + +#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) +/** + * \brief          Set the EC J-PAKE password for current handshake. + * + * \note           An internal copy is made, and destroyed as soon as the + *                 handshake is completed, or when the SSL context is reset or + *                 freed. + * + * \note           The SSL context needs to be already set up. The right place + *                 to call this function is between \c mbedtls_ssl_setup() or + *                 \c mbedtls_ssl_reset() and \c mbedtls_ssl_handshake(). + * + * \param ssl      SSL context + * \param pw       EC J-PAKE password (pre-shared secret) + * \param pw_len   length of pw in bytes + * + * \return         0 on success, or a negative error code. + */ +int mbedtls_ssl_set_hs_ecjpake_password( mbedtls_ssl_context *ssl, +                                         const unsigned char *pw, +                                         size_t pw_len ); +#endif /*MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */ + +#if defined(MBEDTLS_SSL_ALPN) +/** + * \brief          Set the supported Application Layer Protocols. + * + * \param conf     SSL configuration + * \param protos   Pointer to a NULL-terminated list of supported protocols, + *                 in decreasing preference order. The pointer to the list is + *                 recorded by the library for later reference as required, so + *                 the lifetime of the table must be atleast as long as the + *                 lifetime of the SSL configuration structure. + * + * \return         0 on success, or MBEDTLS_ERR_SSL_BAD_INPUT_DATA. + */ +int mbedtls_ssl_conf_alpn_protocols( mbedtls_ssl_config *conf, const char **protos ); + +/** + * \brief          Get the name of the negotiated Application Layer Protocol. + *                 This function should be called after the handshake is + *                 completed. + * + * \param ssl      SSL context + * + * \return         Protcol name, or NULL if no protocol was negotiated. + */ +const char *mbedtls_ssl_get_alpn_protocol( const mbedtls_ssl_context *ssl ); +#endif /* MBEDTLS_SSL_ALPN */ + +/** + * \brief          Set the maximum supported version sent from the client side + *                 and/or accepted at the server side + *                 (Default: MBEDTLS_SSL_MAX_MAJOR_VERSION, MBEDTLS_SSL_MAX_MINOR_VERSION) + * + * \note           This ignores ciphersuites from higher versions. + * + * \note           With DTLS, use MBEDTLS_SSL_MINOR_VERSION_2 for DTLS 1.0 and + *                 MBEDTLS_SSL_MINOR_VERSION_3 for DTLS 1.2 + * + * \param conf     SSL configuration + * \param major    Major version number (only MBEDTLS_SSL_MAJOR_VERSION_3 supported) + * \param minor    Minor version number (MBEDTLS_SSL_MINOR_VERSION_0, + *                 MBEDTLS_SSL_MINOR_VERSION_1 and MBEDTLS_SSL_MINOR_VERSION_2, + *                 MBEDTLS_SSL_MINOR_VERSION_3 supported) + */ +void mbedtls_ssl_conf_max_version( mbedtls_ssl_config *conf, int major, int minor ); + +/** + * \brief          Set the minimum accepted SSL/TLS protocol version + *                 (Default: TLS 1.0) + * + * \note           Input outside of the SSL_MAX_XXXXX_VERSION and + *                 SSL_MIN_XXXXX_VERSION range is ignored. + * + * \note           MBEDTLS_SSL_MINOR_VERSION_0 (SSL v3) should be avoided. + * + * \note           With DTLS, use MBEDTLS_SSL_MINOR_VERSION_2 for DTLS 1.0 and + *                 MBEDTLS_SSL_MINOR_VERSION_3 for DTLS 1.2 + * + * \param conf     SSL configuration + * \param major    Major version number (only MBEDTLS_SSL_MAJOR_VERSION_3 supported) + * \param minor    Minor version number (MBEDTLS_SSL_MINOR_VERSION_0, + *                 MBEDTLS_SSL_MINOR_VERSION_1 and MBEDTLS_SSL_MINOR_VERSION_2, + *                 MBEDTLS_SSL_MINOR_VERSION_3 supported) + */ +void mbedtls_ssl_conf_min_version( mbedtls_ssl_config *conf, int major, int minor ); + +#if defined(MBEDTLS_SSL_FALLBACK_SCSV) && defined(MBEDTLS_SSL_CLI_C) +/** + * \brief          Set the fallback flag (client-side only). + *                 (Default: MBEDTLS_SSL_IS_NOT_FALLBACK). + * + * \note           Set to MBEDTLS_SSL_IS_FALLBACK when preparing a fallback + *                 connection, that is a connection with max_version set to a + *                 lower value than the value you're willing to use. Such + *                 fallback connections are not recommended but are sometimes + *                 necessary to interoperate with buggy (version-intolerant) + *                 servers. + * + * \warning        You should NOT set this to MBEDTLS_SSL_IS_FALLBACK for + *                 non-fallback connections! This would appear to work for a + *                 while, then cause failures when the server is upgraded to + *                 support a newer TLS version. + * + * \param conf     SSL configuration + * \param fallback MBEDTLS_SSL_IS_NOT_FALLBACK or MBEDTLS_SSL_IS_FALLBACK + */ +void mbedtls_ssl_conf_fallback( mbedtls_ssl_config *conf, char fallback ); +#endif /* MBEDTLS_SSL_FALLBACK_SCSV && MBEDTLS_SSL_CLI_C */ + +#if defined(MBEDTLS_SSL_ENCRYPT_THEN_MAC) +/** + * \brief           Enable or disable Encrypt-then-MAC + *                  (Default: MBEDTLS_SSL_ETM_ENABLED) + * + * \note            This should always be enabled, it is a security + *                  improvement, and should not cause any interoperability + *                  issue (used only if the peer supports it too). + * + * \param conf      SSL configuration + * \param etm       MBEDTLS_SSL_ETM_ENABLED or MBEDTLS_SSL_ETM_DISABLED + */ +void mbedtls_ssl_conf_encrypt_then_mac( mbedtls_ssl_config *conf, char etm ); +#endif /* MBEDTLS_SSL_ENCRYPT_THEN_MAC */ + +#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET) +/** + * \brief           Enable or disable Extended Master Secret negotiation. + *                  (Default: MBEDTLS_SSL_EXTENDED_MS_ENABLED) + * + * \note            This should always be enabled, it is a security fix to the + *                  protocol, and should not cause any interoperability issue + *                  (used only if the peer supports it too). + * + * \param conf      SSL configuration + * \param ems       MBEDTLS_SSL_EXTENDED_MS_ENABLED or MBEDTLS_SSL_EXTENDED_MS_DISABLED + */ +void mbedtls_ssl_conf_extended_master_secret( mbedtls_ssl_config *conf, char ems ); +#endif /* MBEDTLS_SSL_EXTENDED_MASTER_SECRET */ + +#if defined(MBEDTLS_ARC4_C) +/** + * \brief          Disable or enable support for RC4 + *                 (Default: MBEDTLS_SSL_ARC4_DISABLED) + * + * \warning        Use of RC4 in DTLS/TLS has been prohibited by RFC 7465 + *                 for security reasons. Use at your own risk. + * + * \note           This function is deprecated and will likely be removed in + *                 a future version of the library. + *                 RC4 is disabled by default at compile time and needs to be + *                 actively enabled for use with legacy systems. + * + * \param conf     SSL configuration + * \param arc4     MBEDTLS_SSL_ARC4_ENABLED or MBEDTLS_SSL_ARC4_DISABLED + */ +void mbedtls_ssl_conf_arc4_support( mbedtls_ssl_config *conf, char arc4 ); +#endif /* MBEDTLS_ARC4_C */ + +#if defined(MBEDTLS_SSL_SRV_C) +/** + * \brief          Whether to send a list of acceptable CAs in + *                 CertificateRequest messages. + *                 (Default: do send) + * + * \param conf     SSL configuration + * \param cert_req_ca_list   MBEDTLS_SSL_CERT_REQ_CA_LIST_ENABLED or + *                          MBEDTLS_SSL_CERT_REQ_CA_LIST_DISABLED + */ +void mbedtls_ssl_conf_cert_req_ca_list( mbedtls_ssl_config *conf, +                                          char cert_req_ca_list ); +#endif /* MBEDTLS_SSL_SRV_C */ + +#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH) +/** + * \brief          Set the maximum fragment length to emit and/or negotiate + *                 (Default: MBEDTLS_SSL_MAX_CONTENT_LEN, usually 2^14 bytes) + *                 (Server: set maximum fragment length to emit, + *                 usually negotiated by the client during handshake + *                 (Client: set maximum fragment length to emit *and* + *                 negotiate with the server during handshake) + * + * \param conf     SSL configuration + * \param mfl_code Code for maximum fragment length (allowed values: + *                 MBEDTLS_SSL_MAX_FRAG_LEN_512,  MBEDTLS_SSL_MAX_FRAG_LEN_1024, + *                 MBEDTLS_SSL_MAX_FRAG_LEN_2048, MBEDTLS_SSL_MAX_FRAG_LEN_4096) + * + * \return         0 if successful or MBEDTLS_ERR_SSL_BAD_INPUT_DATA + */ +int mbedtls_ssl_conf_max_frag_len( mbedtls_ssl_config *conf, unsigned char mfl_code ); +#endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */ + +#if defined(MBEDTLS_SSL_TRUNCATED_HMAC) +/** + * \brief          Activate negotiation of truncated HMAC + *                 (Default: MBEDTLS_SSL_TRUNC_HMAC_DISABLED) + * + * \param conf     SSL configuration + * \param truncate Enable or disable (MBEDTLS_SSL_TRUNC_HMAC_ENABLED or + *                                    MBEDTLS_SSL_TRUNC_HMAC_DISABLED) + */ +void mbedtls_ssl_conf_truncated_hmac( mbedtls_ssl_config *conf, int truncate ); +#endif /* MBEDTLS_SSL_TRUNCATED_HMAC */ + +#if defined(MBEDTLS_SSL_CBC_RECORD_SPLITTING) +/** + * \brief          Enable / Disable 1/n-1 record splitting + *                 (Default: MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED) + * + * \note           Only affects SSLv3 and TLS 1.0, not higher versions. + *                 Does not affect non-CBC ciphersuites in any version. + * + * \param conf     SSL configuration + * \param split    MBEDTLS_SSL_CBC_RECORD_SPLITTING_ENABLED or + *                 MBEDTLS_SSL_CBC_RECORD_SPLITTING_DISABLED + */ +void mbedtls_ssl_conf_cbc_record_splitting( mbedtls_ssl_config *conf, char split ); +#endif /* MBEDTLS_SSL_CBC_RECORD_SPLITTING */ + +#if defined(MBEDTLS_SSL_SESSION_TICKETS) && defined(MBEDTLS_SSL_CLI_C) +/** + * \brief          Enable / Disable session tickets (client only). + *                 (Default: MBEDTLS_SSL_SESSION_TICKETS_ENABLED.) + * + * \note           On server, use \c mbedtls_ssl_conf_session_tickets_cb(). + * + * \param conf     SSL configuration + * \param use_tickets   Enable or disable (MBEDTLS_SSL_SESSION_TICKETS_ENABLED or + *                                         MBEDTLS_SSL_SESSION_TICKETS_DISABLED) + */ +void mbedtls_ssl_conf_session_tickets( mbedtls_ssl_config *conf, int use_tickets ); +#endif /* MBEDTLS_SSL_SESSION_TICKETS && MBEDTLS_SSL_CLI_C */ + +#if defined(MBEDTLS_SSL_RENEGOTIATION) +/** + * \brief          Enable / Disable renegotiation support for connection when + *                 initiated by peer + *                 (Default: MBEDTLS_SSL_RENEGOTIATION_DISABLED) + * + * \warning        It is recommended to always disable renegotation unless you + *                 know you need it and you know what you're doing. In the + *                 past, there have been several issues associated with + *                 renegotiation or a poor understanding of its properties. + * + * \note           Server-side, enabling renegotiation also makes the server + *                 susceptible to a resource DoS by a malicious client. + * + * \param conf    SSL configuration + * \param renegotiation     Enable or disable (MBEDTLS_SSL_RENEGOTIATION_ENABLED or + *                                             MBEDTLS_SSL_RENEGOTIATION_DISABLED) + */ +void mbedtls_ssl_conf_renegotiation( mbedtls_ssl_config *conf, int renegotiation ); +#endif /* MBEDTLS_SSL_RENEGOTIATION */ + +/** + * \brief          Prevent or allow legacy renegotiation. + *                 (Default: MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION) + * + *                 MBEDTLS_SSL_LEGACY_NO_RENEGOTIATION allows connections to + *                 be established even if the peer does not support + *                 secure renegotiation, but does not allow renegotiation + *                 to take place if not secure. + *                 (Interoperable and secure option) + * + *                 MBEDTLS_SSL_LEGACY_ALLOW_RENEGOTIATION allows renegotiations + *                 with non-upgraded peers. Allowing legacy renegotiation + *                 makes the connection vulnerable to specific man in the + *                 middle attacks. (See RFC 5746) + *                 (Most interoperable and least secure option) + * + *                 MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE breaks off connections + *                 if peer does not support secure renegotiation. Results + *                 in interoperability issues with non-upgraded peers + *                 that do not support renegotiation altogether. + *                 (Most secure option, interoperability issues) + * + * \param conf     SSL configuration + * \param allow_legacy  Prevent or allow (SSL_NO_LEGACY_RENEGOTIATION, + *                                        SSL_ALLOW_LEGACY_RENEGOTIATION or + *                                        MBEDTLS_SSL_LEGACY_BREAK_HANDSHAKE) + */ +void mbedtls_ssl_conf_legacy_renegotiation( mbedtls_ssl_config *conf, int allow_legacy ); + +#if defined(MBEDTLS_SSL_RENEGOTIATION) +/** + * \brief          Enforce renegotiation requests. + *                 (Default: enforced, max_records = 16) + * + *                 When we request a renegotiation, the peer can comply or + *                 ignore the request. This function allows us to decide + *                 whether to enforce our renegotiation requests by closing + *                 the connection if the peer doesn't comply. + * + *                 However, records could already be in transit from the peer + *                 when the request is emitted. In order to increase + *                 reliability, we can accept a number of records before the + *                 expected handshake records. + * + *                 The optimal value is highly dependent on the specific usage + *                 scenario. + * + * \note           With DTLS and server-initiated renegotiation, the + *                 HelloRequest is retransmited every time mbedtls_ssl_read() times + *                 out or receives Application Data, until: + *                 - max_records records have beens seen, if it is >= 0, or + *                 - the number of retransmits that would happen during an + *                 actual handshake has been reached. + *                 Please remember the request might be lost a few times + *                 if you consider setting max_records to a really low value. + * + * \warning        On client, the grace period can only happen during + *                 mbedtls_ssl_read(), as opposed to mbedtls_ssl_write() and mbedtls_ssl_renegotiate() + *                 which always behave as if max_record was 0. The reason is, + *                 if we receive application data from the server, we need a + *                 place to write it, which only happens during mbedtls_ssl_read(). + * + * \param conf     SSL configuration + * \param max_records Use MBEDTLS_SSL_RENEGOTIATION_NOT_ENFORCED if you don't want to + *                 enforce renegotiation, or a non-negative value to enforce + *                 it but allow for a grace period of max_records records. + */ +void mbedtls_ssl_conf_renegotiation_enforced( mbedtls_ssl_config *conf, int max_records ); + +/** + * \brief          Set record counter threshold for periodic renegotiation. + *                 (Default: 2^48 - 1) + * + *                 Renegotiation is automatically triggered when a record + *                 counter (outgoing or ingoing) crosses the defined + *                 threshold. The default value is meant to prevent the + *                 connection from being closed when the counter is about to + *                 reached its maximal value (it is not allowed to wrap). + * + *                 Lower values can be used to enforce policies such as "keys + *                 must be refreshed every N packets with cipher X". + * + *                 The renegotiation period can be disabled by setting + *                 conf->disable_renegotiation to + *                 MBEDTLS_SSL_RENEGOTIATION_DISABLED. + * + * \note           When the configured transport is + *                 MBEDTLS_SSL_TRANSPORT_DATAGRAM the maximum renegotiation + *                 period is 2^48 - 1, and for MBEDTLS_SSL_TRANSPORT_STREAM, + *                 the maximum renegotiation period is 2^64 - 1. + * + * \param conf     SSL configuration + * \param period   The threshold value: a big-endian 64-bit number. + */ +void mbedtls_ssl_conf_renegotiation_period( mbedtls_ssl_config *conf, +                                   const unsigned char period[8] ); +#endif /* MBEDTLS_SSL_RENEGOTIATION */ + +/** + * \brief          Return the number of data bytes available to read + * + * \param ssl      SSL context + * + * \return         how many bytes are available in the read buffer + */ +size_t mbedtls_ssl_get_bytes_avail( const mbedtls_ssl_context *ssl ); + +/** + * \brief          Return the result of the certificate verification + * + * \param ssl      SSL context + * + * \return         0 if successful, + *                 -1 if result is not available (eg because the handshake was + *                 aborted too early), or + *                 a combination of BADCERT_xxx and BADCRL_xxx flags, see + *                 x509.h + */ +uint32_t mbedtls_ssl_get_verify_result( const mbedtls_ssl_context *ssl ); + +/** + * \brief          Return the name of the current ciphersuite + * + * \param ssl      SSL context + * + * \return         a string containing the ciphersuite name + */ +const char *mbedtls_ssl_get_ciphersuite( const mbedtls_ssl_context *ssl ); + +/** + * \brief          Return the current SSL version (SSLv3/TLSv1/etc) + * + * \param ssl      SSL context + * + * \return         a string containing the SSL version + */ +const char *mbedtls_ssl_get_version( const mbedtls_ssl_context *ssl ); + +/** + * \brief          Return the (maximum) number of bytes added by the record + *                 layer: header + encryption/MAC overhead (inc. padding) + * + * \param ssl      SSL context + * + * \return         Current maximum record expansion in bytes, or + *                 MBEDTLS_ERR_SSL_FEATURE_UNAVAILABLE if compression is + *                 enabled, which makes expansion much less predictable + */ +int mbedtls_ssl_get_record_expansion( const mbedtls_ssl_context *ssl ); + +#if defined(MBEDTLS_SSL_MAX_FRAGMENT_LENGTH) +/** + * \brief          Return the maximum fragment length (payload, in bytes). + *                 This is the value negotiated with peer if any, + *                 or the locally configured value. + * + * \note           With DTLS, \c mbedtls_ssl_write() will return an error if + *                 called with a larger length value. + *                 With TLS, \c mbedtls_ssl_write() will fragment the input if + *                 necessary and return the number of bytes written; it is up + *                 to the caller to call \c mbedtls_ssl_write() again in + *                 order to send the remaining bytes if any. + * + * \param ssl      SSL context + * + * \return         Current maximum fragment length. + */ +size_t mbedtls_ssl_get_max_frag_len( const mbedtls_ssl_context *ssl ); +#endif /* MBEDTLS_SSL_MAX_FRAGMENT_LENGTH */ + +#if defined(MBEDTLS_X509_CRT_PARSE_C) +/** + * \brief          Return the peer certificate from the current connection + * + *                 Note: Can be NULL in case no certificate was sent during + *                 the handshake. Different calls for the same connection can + *                 return the same or different pointers for the same + *                 certificate and even a different certificate altogether. + *                 The peer cert CAN change in a single connection if + *                 renegotiation is performed. + * + * \param ssl      SSL context + * + * \return         the current peer certificate + */ +const mbedtls_x509_crt *mbedtls_ssl_get_peer_cert( const mbedtls_ssl_context *ssl ); +#endif /* MBEDTLS_X509_CRT_PARSE_C */ + +#if defined(MBEDTLS_SSL_CLI_C) +/** + * \brief          Save session in order to resume it later (client-side only) + *                 Session data is copied to presented session structure. + * + * \warning        Currently, peer certificate is lost in the operation. + * + * \param ssl      SSL context + * \param session  session context + * + * \return         0 if successful, + *                 MBEDTLS_ERR_SSL_ALLOC_FAILED if memory allocation failed, + *                 MBEDTLS_ERR_SSL_BAD_INPUT_DATA if used server-side or + *                 arguments are otherwise invalid + * + * \sa             mbedtls_ssl_set_session() + */ +int mbedtls_ssl_get_session( const mbedtls_ssl_context *ssl, mbedtls_ssl_session *session ); +#endif /* MBEDTLS_SSL_CLI_C */ + +/** + * \brief          Perform the SSL handshake + * + * \param ssl      SSL context + * + * \return         0 if successful, or + *                 MBEDTLS_ERR_SSL_WANT_READ or MBEDTLS_ERR_SSL_WANT_WRITE, or + *                 MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED (see below), or + *                 a specific SSL error code. + * + * \note           If this function returns something other than 0 or + *                 MBEDTLS_ERR_SSL_WANT_READ/WRITE, then the ssl context + *                 becomes unusable, and you should either free it or call + *                 \c mbedtls_ssl_session_reset() on it before re-using it for + *                 a new connection; the current connection must be closed. + * + * \note           If DTLS is in use, then you may choose to handle + *                 MBEDTLS_ERR_SSL_HELLO_VERIFY_REQUIRED specially for logging + *                 purposes, as it is an expected return value rather than an + *                 actual error, but you still need to reset/free the context. + */ +int mbedtls_ssl_handshake( mbedtls_ssl_context *ssl ); + +/** + * \brief          Perform a single step of the SSL handshake + * + * \note           The state of the context (ssl->state) will be at + *                 the next state after execution of this function. Do not + *                 call this function if state is MBEDTLS_SSL_HANDSHAKE_OVER. + * + * \note           If this function returns something other than 0 or + *                 MBEDTLS_ERR_SSL_WANT_READ/WRITE, then the ssl context + *                 becomes unusable, and you should either free it or call + *                 \c mbedtls_ssl_session_reset() on it before re-using it for + *                 a new connection; the current connection must be closed. + * + * \param ssl      SSL context + * + * \return         0 if successful, or + *                 MBEDTLS_ERR_SSL_WANT_READ or MBEDTLS_ERR_SSL_WANT_WRITE, or + *                 a specific SSL error code. + */ +int mbedtls_ssl_handshake_step( mbedtls_ssl_context *ssl ); + +#if defined(MBEDTLS_SSL_RENEGOTIATION) +/** + * \brief          Initiate an SSL renegotiation on the running connection. + *                 Client: perform the renegotiation right now. + *                 Server: request renegotiation, which will be performed + *                 during the next call to mbedtls_ssl_read() if honored by + *                 client. + * + * \param ssl      SSL context + * + * \return         0 if successful, or any mbedtls_ssl_handshake() return + *                 value. + * + * \note           If this function returns something other than 0 or + *                 MBEDTLS_ERR_SSL_WANT_READ/WRITE, then the ssl context + *                 becomes unusable, and you should either free it or call + *                 \c mbedtls_ssl_session_reset() on it before re-using it for + *                 a new connection; the current connection must be closed. + */ +int mbedtls_ssl_renegotiate( mbedtls_ssl_context *ssl ); +#endif /* MBEDTLS_SSL_RENEGOTIATION */ + +/** + * \brief          Read at most 'len' application data bytes + * + * \param ssl      SSL context + * \param buf      buffer that will hold the data + * \param len      maximum number of bytes to read + * + * \return         the number of bytes read, or + *                 0 for EOF, or + *                 MBEDTLS_ERR_SSL_WANT_READ or MBEDTLS_ERR_SSL_WANT_WRITE, or + *                 MBEDTLS_ERR_SSL_CLIENT_RECONNECT (see below), or + *                 another negative error code. + * + * \note           If this function returns something other than a positive + *                 value or MBEDTLS_ERR_SSL_WANT_READ/WRITE or + *                 MBEDTLS_ERR_SSL_CLIENT_RECONNECT, then the ssl context + *                 becomes unusable, and you should either free it or call + *                 \c mbedtls_ssl_session_reset() on it before re-using it for + *                 a new connection; the current connection must be closed. + * + * \note           When this function return MBEDTLS_ERR_SSL_CLIENT_RECONNECT + *                 (which can only happen server-side), it means that a client + *                 is initiating a new connection using the same source port. + *                 You can either treat that as a connection close and wait + *                 for the client to resend a ClientHello, or directly + *                 continue with \c mbedtls_ssl_handshake() with the same + *                 context (as it has beeen reset internally). Either way, you + *                 should make sure this is seen by the application as a new + *                 connection: application state, if any, should be reset, and + *                 most importantly the identity of the client must be checked + *                 again. WARNING: not validating the identity of the client + *                 again, or not transmitting the new identity to the + *                 application layer, would allow authentication bypass! + */ +int mbedtls_ssl_read( mbedtls_ssl_context *ssl, unsigned char *buf, size_t len ); + +/** + * \brief          Try to write exactly 'len' application data bytes + * + * \warning        This function will do partial writes in some cases. If the + *                 return value is non-negative but less than length, the + *                 function must be called again with updated arguments: + *                 buf + ret, len - ret (if ret is the return value) until + *                 it returns a value equal to the last 'len' argument. + * + * \param ssl      SSL context + * \param buf      buffer holding the data + * \param len      how many bytes must be written + * + * \return         the number of bytes actually written (may be less than len), + *                 or MBEDTLS_ERR_SSL_WANT_WRITE or MBEDTLS_ERR_SSL_WANT_READ, + *                 or another negative error code. + * + * \note           If this function returns something other than a positive + *                 value or MBEDTLS_ERR_SSL_WANT_READ/WRITE, the ssl context + *                 becomes unusable, and you should either free it or call + *                 \c mbedtls_ssl_session_reset() on it before re-using it for + *                 a new connection; the current connection must be closed. + * + * \note           When this function returns MBEDTLS_ERR_SSL_WANT_WRITE/READ, + *                 it must be called later with the *same* arguments, + *                 until it returns a positive value. + * + * \note           If the requested length is greater than the maximum + *                 fragment length (either the built-in limit or the one set + *                 or negotiated with the peer), then: + *                 - with TLS, less bytes than requested are written. + *                 - with DTLS, MBEDTLS_ERR_SSL_BAD_INPUT_DATA is returned. + *                 \c mbedtls_ssl_get_max_frag_len() may be used to query the + *                 active maximum fragment length. + */ +int mbedtls_ssl_write( mbedtls_ssl_context *ssl, const unsigned char *buf, size_t len ); + +/** + * \brief           Send an alert message + * + * \param ssl       SSL context + * \param level     The alert level of the message + *                  (MBEDTLS_SSL_ALERT_LEVEL_WARNING or MBEDTLS_SSL_ALERT_LEVEL_FATAL) + * \param message   The alert message (SSL_ALERT_MSG_*) + * + * \return          0 if successful, or a specific SSL error code. + * + * \note           If this function returns something other than 0 or + *                 MBEDTLS_ERR_SSL_WANT_READ/WRITE, then the ssl context + *                 becomes unusable, and you should either free it or call + *                 \c mbedtls_ssl_session_reset() on it before re-using it for + *                 a new connection; the current connection must be closed. + */ +int mbedtls_ssl_send_alert_message( mbedtls_ssl_context *ssl, +                            unsigned char level, +                            unsigned char message ); +/** + * \brief          Notify the peer that the connection is being closed + * + * \param ssl      SSL context + * + * \return          0 if successful, or a specific SSL error code. + * + * \note           If this function returns something other than 0 or + *                 MBEDTLS_ERR_SSL_WANT_READ/WRITE, then the ssl context + *                 becomes unusable, and you should either free it or call + *                 \c mbedtls_ssl_session_reset() on it before re-using it for + *                 a new connection; the current connection must be closed. + */ +int mbedtls_ssl_close_notify( mbedtls_ssl_context *ssl ); + +/** + * \brief          Free referenced items in an SSL context and clear memory + * + * \param ssl      SSL context + */ +void mbedtls_ssl_free( mbedtls_ssl_context *ssl ); + +/** + * \brief          Initialize an SSL configuration context + *                 Just makes the context ready for + *                 mbedtls_ssl_config_defaults() or mbedtls_ssl_config_free(). + * + * \note           You need to call mbedtls_ssl_config_defaults() unless you + *                 manually set all of the relevent fields yourself. + * + * \param conf     SSL configuration context + */ +void mbedtls_ssl_config_init( mbedtls_ssl_config *conf ); + +/** + * \brief          Load reasonnable default SSL configuration values. + *                 (You need to call mbedtls_ssl_config_init() first.) + * + * \param conf     SSL configuration context + * \param endpoint MBEDTLS_SSL_IS_CLIENT or MBEDTLS_SSL_IS_SERVER + * \param transport MBEDTLS_SSL_TRANSPORT_STREAM for TLS, or + *                  MBEDTLS_SSL_TRANSPORT_DATAGRAM for DTLS + * \param preset   a MBEDTLS_SSL_PRESET_XXX value + * + * \note           See \c mbedtls_ssl_conf_transport() for notes on DTLS. + * + * \return         0 if successful, or + *                 MBEDTLS_ERR_XXX_ALLOC_FAILED on memory allocation error. + */ +int mbedtls_ssl_config_defaults( mbedtls_ssl_config *conf, +                                 int endpoint, int transport, int preset ); + +/** + * \brief          Free an SSL configuration context + * + * \param conf     SSL configuration context + */ +void mbedtls_ssl_config_free( mbedtls_ssl_config *conf ); + +/** + * \brief          Initialize SSL session structure + * + * \param session  SSL session + */ +void mbedtls_ssl_session_init( mbedtls_ssl_session *session ); + +/** + * \brief          Free referenced items in an SSL session including the + *                 peer certificate and clear memory + * + * \param session  SSL session + */ +void mbedtls_ssl_session_free( mbedtls_ssl_session *session ); + +#ifdef __cplusplus +} +#endif + +#endif /* ssl.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/ssl_cache.h b/thirdparty/mbedtls/include/mbedtls/ssl_cache.h new file mode 100644 index 0000000000..ec081e6d24 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/ssl_cache.h @@ -0,0 +1,144 @@ +/** + * \file ssl_cache.h + * + * \brief SSL session cache implementation + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_SSL_CACHE_H +#define MBEDTLS_SSL_CACHE_H + +#include "ssl.h" + +#if defined(MBEDTLS_THREADING_C) +#include "threading.h" +#endif + +/** + * \name SECTION: Module settings + * + * The configuration options you can set for this module are in this section. + * Either change them in config.h or define them on the compiler command line. + * \{ + */ + +#if !defined(MBEDTLS_SSL_CACHE_DEFAULT_TIMEOUT) +#define MBEDTLS_SSL_CACHE_DEFAULT_TIMEOUT       86400   /*!< 1 day  */ +#endif + +#if !defined(MBEDTLS_SSL_CACHE_DEFAULT_MAX_ENTRIES) +#define MBEDTLS_SSL_CACHE_DEFAULT_MAX_ENTRIES      50   /*!< Maximum entries in cache */ +#endif + +/* \} name SECTION: Module settings */ + +#ifdef __cplusplus +extern "C" { +#endif + +typedef struct mbedtls_ssl_cache_context mbedtls_ssl_cache_context; +typedef struct mbedtls_ssl_cache_entry mbedtls_ssl_cache_entry; + +/** + * \brief   This structure is used for storing cache entries + */ +struct mbedtls_ssl_cache_entry +{ +#if defined(MBEDTLS_HAVE_TIME) +    mbedtls_time_t timestamp;           /*!< entry timestamp    */ +#endif +    mbedtls_ssl_session session;        /*!< entry session      */ +#if defined(MBEDTLS_X509_CRT_PARSE_C) +    mbedtls_x509_buf peer_cert;         /*!< entry peer_cert    */ +#endif +    mbedtls_ssl_cache_entry *next;      /*!< chain pointer      */ +}; + +/** + * \brief Cache context + */ +struct mbedtls_ssl_cache_context +{ +    mbedtls_ssl_cache_entry *chain;     /*!< start of the chain     */ +    int timeout;                /*!< cache entry timeout    */ +    int max_entries;            /*!< maximum entries        */ +#if defined(MBEDTLS_THREADING_C) +    mbedtls_threading_mutex_t mutex;    /*!< mutex                  */ +#endif +}; + +/** + * \brief          Initialize an SSL cache context + * + * \param cache    SSL cache context + */ +void mbedtls_ssl_cache_init( mbedtls_ssl_cache_context *cache ); + +/** + * \brief          Cache get callback implementation + *                 (Thread-safe if MBEDTLS_THREADING_C is enabled) + * + * \param data     SSL cache context + * \param session  session to retrieve entry for + */ +int mbedtls_ssl_cache_get( void *data, mbedtls_ssl_session *session ); + +/** + * \brief          Cache set callback implementation + *                 (Thread-safe if MBEDTLS_THREADING_C is enabled) + * + * \param data     SSL cache context + * \param session  session to store entry for + */ +int mbedtls_ssl_cache_set( void *data, const mbedtls_ssl_session *session ); + +#if defined(MBEDTLS_HAVE_TIME) +/** + * \brief          Set the cache timeout + *                 (Default: MBEDTLS_SSL_CACHE_DEFAULT_TIMEOUT (1 day)) + * + *                 A timeout of 0 indicates no timeout. + * + * \param cache    SSL cache context + * \param timeout  cache entry timeout in seconds + */ +void mbedtls_ssl_cache_set_timeout( mbedtls_ssl_cache_context *cache, int timeout ); +#endif /* MBEDTLS_HAVE_TIME */ + +/** + * \brief          Set the maximum number of cache entries + *                 (Default: MBEDTLS_SSL_CACHE_DEFAULT_MAX_ENTRIES (50)) + * + * \param cache    SSL cache context + * \param max      cache entry maximum + */ +void mbedtls_ssl_cache_set_max_entries( mbedtls_ssl_cache_context *cache, int max ); + +/** + * \brief          Free referenced items in a cache context and clear memory + * + * \param cache    SSL cache context + */ +void mbedtls_ssl_cache_free( mbedtls_ssl_cache_context *cache ); + +#ifdef __cplusplus +} +#endif + +#endif /* ssl_cache.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/ssl_ciphersuites.h b/thirdparty/mbedtls/include/mbedtls/ssl_ciphersuites.h new file mode 100644 index 0000000000..545468a510 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/ssl_ciphersuites.h @@ -0,0 +1,486 @@ +/** + * \file ssl_ciphersuites.h + * + * \brief SSL Ciphersuites for mbed TLS + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_SSL_CIPHERSUITES_H +#define MBEDTLS_SSL_CIPHERSUITES_H + +#include "pk.h" +#include "cipher.h" +#include "md.h" + +#ifdef __cplusplus +extern "C" { +#endif + +/* + * Supported ciphersuites (Official IANA names) + */ +#define MBEDTLS_TLS_RSA_WITH_NULL_MD5                    0x01   /**< Weak! */ +#define MBEDTLS_TLS_RSA_WITH_NULL_SHA                    0x02   /**< Weak! */ + +#define MBEDTLS_TLS_RSA_WITH_RC4_128_MD5                 0x04 +#define MBEDTLS_TLS_RSA_WITH_RC4_128_SHA                 0x05 +#define MBEDTLS_TLS_RSA_WITH_DES_CBC_SHA                 0x09   /**< Weak! Not in TLS 1.2 */ + +#define MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA            0x0A + +#define MBEDTLS_TLS_DHE_RSA_WITH_DES_CBC_SHA             0x15   /**< Weak! Not in TLS 1.2 */ +#define MBEDTLS_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA        0x16 + +#define MBEDTLS_TLS_PSK_WITH_NULL_SHA                    0x2C   /**< Weak! */ +#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA                0x2D   /**< Weak! */ +#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA                0x2E   /**< Weak! */ +#define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA             0x2F + +#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA         0x33 +#define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA             0x35 +#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA         0x39 + +#define MBEDTLS_TLS_RSA_WITH_NULL_SHA256                 0x3B   /**< Weak! */ +#define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256          0x3C   /**< TLS 1.2 */ +#define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256          0x3D   /**< TLS 1.2 */ + +#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA        0x41 +#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA    0x45 + +#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256      0x67   /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256      0x6B   /**< TLS 1.2 */ + +#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA        0x84 +#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA    0x88 + +#define MBEDTLS_TLS_PSK_WITH_RC4_128_SHA                 0x8A +#define MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA            0x8B +#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA             0x8C +#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA             0x8D + +#define MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA             0x8E +#define MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA        0x8F +#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA         0x90 +#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA         0x91 + +#define MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA             0x92 +#define MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA        0x93 +#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA         0x94 +#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA         0x95 + +#define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256          0x9C   /**< TLS 1.2 */ +#define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384          0x9D   /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256      0x9E   /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384      0x9F   /**< TLS 1.2 */ + +#define MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256          0xA8   /**< TLS 1.2 */ +#define MBEDTLS_TLS_PSK_WITH_AES_256_GCM_SHA384          0xA9   /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_GCM_SHA256      0xAA   /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_GCM_SHA384      0xAB   /**< TLS 1.2 */ +#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256      0xAC   /**< TLS 1.2 */ +#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384      0xAD   /**< TLS 1.2 */ + +#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA256          0xAE +#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA384          0xAF +#define MBEDTLS_TLS_PSK_WITH_NULL_SHA256                 0xB0   /**< Weak! */ +#define MBEDTLS_TLS_PSK_WITH_NULL_SHA384                 0xB1   /**< Weak! */ + +#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256      0xB2 +#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384      0xB3 +#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA256             0xB4   /**< Weak! */ +#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA384             0xB5   /**< Weak! */ + +#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256      0xB6 +#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384      0xB7 +#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA256             0xB8   /**< Weak! */ +#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA384             0xB9   /**< Weak! */ + +#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256     0xBA   /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xBE   /**< TLS 1.2 */ + +#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256     0xC0   /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC4   /**< TLS 1.2 */ + +#define MBEDTLS_TLS_ECDH_ECDSA_WITH_NULL_SHA             0xC001 /**< Weak! */ +#define MBEDTLS_TLS_ECDH_ECDSA_WITH_RC4_128_SHA          0xC002 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA     0xC003 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA      0xC004 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA      0xC005 /**< Not in SSL3! */ + +#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_NULL_SHA            0xC006 /**< Weak! */ +#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA         0xC007 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA    0xC008 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA     0xC009 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA     0xC00A /**< Not in SSL3! */ + +#define MBEDTLS_TLS_ECDH_RSA_WITH_NULL_SHA               0xC00B /**< Weak! */ +#define MBEDTLS_TLS_ECDH_RSA_WITH_RC4_128_SHA            0xC00C /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA       0xC00D /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA        0xC00E /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA        0xC00F /**< Not in SSL3! */ + +#define MBEDTLS_TLS_ECDHE_RSA_WITH_NULL_SHA              0xC010 /**< Weak! */ +#define MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA           0xC011 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA      0xC012 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA       0xC013 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA       0xC014 /**< Not in SSL3! */ + +#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256  0xC023 /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384  0xC024 /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256   0xC025 /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384   0xC026 /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256    0xC027 /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384    0xC028 /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256     0xC029 /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384     0xC02A /**< TLS 1.2 */ + +#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256  0xC02B /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384  0xC02C /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256   0xC02D /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384   0xC02E /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256    0xC02F /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384    0xC030 /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256     0xC031 /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384     0xC032 /**< TLS 1.2 */ + +#define MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA           0xC033 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA      0xC034 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA       0xC035 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA       0xC036 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256    0xC037 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384    0xC038 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA              0xC039 /**< Weak! No SSL3! */ +#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA256           0xC03A /**< Weak! No SSL3! */ +#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA384           0xC03B /**< Weak! No SSL3! */ + +#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC072 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC073 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256  0xC074 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384  0xC075 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256   0xC076 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384   0xC077 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256    0xC078 /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384    0xC079 /**< Not in SSL3! */ + +#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256         0xC07A /**< TLS 1.2 */ +#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384         0xC07B /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256     0xC07C /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384     0xC07D /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC086 /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC087 /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256  0xC088 /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384  0xC089 /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256   0xC08A /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384   0xC08B /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256    0xC08C /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384    0xC08D /**< TLS 1.2 */ + +#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256       0xC08E /**< TLS 1.2 */ +#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384       0xC08F /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256   0xC090 /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384   0xC091 /**< TLS 1.2 */ +#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256   0xC092 /**< TLS 1.2 */ +#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384   0xC093 /**< TLS 1.2 */ + +#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256       0xC094 +#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384       0xC095 +#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256   0xC096 +#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384   0xC097 +#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256   0xC098 +#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384   0xC099 +#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC09A /**< Not in SSL3! */ +#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC09B /**< Not in SSL3! */ + +#define MBEDTLS_TLS_RSA_WITH_AES_128_CCM                0xC09C  /**< TLS 1.2 */ +#define MBEDTLS_TLS_RSA_WITH_AES_256_CCM                0xC09D  /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM            0xC09E  /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM            0xC09F  /**< TLS 1.2 */ +#define MBEDTLS_TLS_RSA_WITH_AES_128_CCM_8              0xC0A0  /**< TLS 1.2 */ +#define MBEDTLS_TLS_RSA_WITH_AES_256_CCM_8              0xC0A1  /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM_8          0xC0A2  /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM_8          0xC0A3  /**< TLS 1.2 */ +#define MBEDTLS_TLS_PSK_WITH_AES_128_CCM                0xC0A4  /**< TLS 1.2 */ +#define MBEDTLS_TLS_PSK_WITH_AES_256_CCM                0xC0A5  /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM            0xC0A6  /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM            0xC0A7  /**< TLS 1.2 */ +#define MBEDTLS_TLS_PSK_WITH_AES_128_CCM_8              0xC0A8  /**< TLS 1.2 */ +#define MBEDTLS_TLS_PSK_WITH_AES_256_CCM_8              0xC0A9  /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM_8          0xC0AA  /**< TLS 1.2 */ +#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM_8          0xC0AB  /**< TLS 1.2 */ +/* The last two are named with PSK_DHE in the RFC, which looks like a typo */ + +#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM        0xC0AC  /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM        0xC0AD  /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8      0xC0AE  /**< TLS 1.2 */ +#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8      0xC0AF  /**< TLS 1.2 */ + +#define MBEDTLS_TLS_ECJPAKE_WITH_AES_128_CCM_8          0xC0FF  /**< experimental */ + +/* Reminder: update mbedtls_ssl_premaster_secret when adding a new key exchange. + * Reminder: update MBEDTLS_KEY_EXCHANGE__xxx below + */ +typedef enum { +    MBEDTLS_KEY_EXCHANGE_NONE = 0, +    MBEDTLS_KEY_EXCHANGE_RSA, +    MBEDTLS_KEY_EXCHANGE_DHE_RSA, +    MBEDTLS_KEY_EXCHANGE_ECDHE_RSA, +    MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA, +    MBEDTLS_KEY_EXCHANGE_PSK, +    MBEDTLS_KEY_EXCHANGE_DHE_PSK, +    MBEDTLS_KEY_EXCHANGE_RSA_PSK, +    MBEDTLS_KEY_EXCHANGE_ECDHE_PSK, +    MBEDTLS_KEY_EXCHANGE_ECDH_RSA, +    MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA, +    MBEDTLS_KEY_EXCHANGE_ECJPAKE, +} mbedtls_key_exchange_type_t; + +/* Key exchanges using a certificate */ +#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)           || \ +    defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)       || \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED)     || \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)   || \ +    defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)       || \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED)      || \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED) +#define MBEDTLS_KEY_EXCHANGE__WITH_CERT__ENABLED +#endif + +/* Key exchanges allowing client certificate requests */ +#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)           ||       \ +    defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)       ||       \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED)      ||       \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED)     ||       \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)    ||       \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)  +#define MBEDTLS_KEY_EXCHANGE__CERT_REQ_ALLOWED__ENABLED +#endif + +/* Key exchanges involving server signature in ServerKeyExchange */ +#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)       || \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED)     || \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) +#define MBEDTLS_KEY_EXCHANGE__WITH_SERVER_SIGNATURE__ENABLED +#endif + +/* Key exchanges using ECDH */ +#if defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED)      || \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED) +#define MBEDTLS_KEY_EXCHANGE__SOME__ECDH_ENABLED +#endif + +/* Key exchanges that don't involve ephemeral keys */ +#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED)           || \ +    defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)           || \ +    defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)       || \ +    defined(MBEDTLS_KEY_EXCHANGE__SOME__ECDH_ENABLED) +#define MBEDTLS_KEY_EXCHANGE__SOME_NON_PFS__ENABLED +#endif + +/* Key exchanges that involve ephemeral keys */ +#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)       || \ +    defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)       || \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED)     || \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)     || \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)   || \ +    defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) +#define MBEDTLS_KEY_EXCHANGE__SOME_PFS__ENABLED +#endif + +/* Key exchanges using a PSK */ +#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)           || \ +    defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED)       || \ +    defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)       || \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) +#define MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED +#endif + +/* Key exchanges using DHE */ +#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED)       || \ +    defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED) +#define MBEDTLS_KEY_EXCHANGE__SOME__DHE_ENABLED +#endif + +/* Key exchanges using ECDHE */ +#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED)     || \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)   || \ +    defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) +#define MBEDTLS_KEY_EXCHANGE__SOME__ECDHE_ENABLED +#endif + +typedef struct mbedtls_ssl_ciphersuite_t mbedtls_ssl_ciphersuite_t; + +#define MBEDTLS_CIPHERSUITE_WEAK       0x01    /**< Weak ciphersuite flag  */ +#define MBEDTLS_CIPHERSUITE_SHORT_TAG  0x02    /**< Short authentication tag, +                                                     eg for CCM_8 */ +#define MBEDTLS_CIPHERSUITE_NODTLS     0x04    /**< Can't be used with DTLS */ + +/** + * \brief   This structure is used for storing ciphersuite information + */ +struct mbedtls_ssl_ciphersuite_t +{ +    int id; +    const char * name; + +    mbedtls_cipher_type_t cipher; +    mbedtls_md_type_t mac; +    mbedtls_key_exchange_type_t key_exchange; + +    int min_major_ver; +    int min_minor_ver; +    int max_major_ver; +    int max_minor_ver; + +    unsigned char flags; +}; + +const int *mbedtls_ssl_list_ciphersuites( void ); + +const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_string( const char *ciphersuite_name ); +const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_id( int ciphersuite_id ); + +#if defined(MBEDTLS_PK_C) +mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg( const mbedtls_ssl_ciphersuite_t *info ); +mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg( const mbedtls_ssl_ciphersuite_t *info ); +#endif + +int mbedtls_ssl_ciphersuite_uses_ec( const mbedtls_ssl_ciphersuite_t *info ); +int mbedtls_ssl_ciphersuite_uses_psk( const mbedtls_ssl_ciphersuite_t *info ); + +#if defined(MBEDTLS_KEY_EXCHANGE__SOME_PFS__ENABLED) +static inline int mbedtls_ssl_ciphersuite_has_pfs( const mbedtls_ssl_ciphersuite_t *info ) +{ +    switch( info->key_exchange ) +    { +        case MBEDTLS_KEY_EXCHANGE_DHE_RSA: +        case MBEDTLS_KEY_EXCHANGE_DHE_PSK: +        case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA: +        case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK: +        case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA: +        case MBEDTLS_KEY_EXCHANGE_ECJPAKE: +            return( 1 ); + +        default: +            return( 0 ); +    } +} +#endif /* MBEDTLS_KEY_EXCHANGE__SOME_PFS__ENABLED */ + +#if defined(MBEDTLS_KEY_EXCHANGE__SOME_NON_PFS__ENABLED) +static inline int mbedtls_ssl_ciphersuite_no_pfs( const mbedtls_ssl_ciphersuite_t *info ) +{ +    switch( info->key_exchange ) +    { +        case MBEDTLS_KEY_EXCHANGE_ECDH_RSA: +        case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA: +        case MBEDTLS_KEY_EXCHANGE_RSA: +        case MBEDTLS_KEY_EXCHANGE_PSK: +        case MBEDTLS_KEY_EXCHANGE_RSA_PSK: +            return( 1 ); + +        default: +            return( 0 ); +    } +} +#endif /* MBEDTLS_KEY_EXCHANGE__SOME_NON_PFS__ENABLED */ + +#if defined(MBEDTLS_KEY_EXCHANGE__SOME__ECDH_ENABLED) +static inline int mbedtls_ssl_ciphersuite_uses_ecdh( const mbedtls_ssl_ciphersuite_t *info ) +{ +    switch( info->key_exchange ) +    { +        case MBEDTLS_KEY_EXCHANGE_ECDH_RSA: +        case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA: +            return( 1 ); + +        default: +            return( 0 ); +    } +} +#endif /* MBEDTLS_KEY_EXCHANGE__SOME__ECDH_ENABLED */ + +static inline int mbedtls_ssl_ciphersuite_cert_req_allowed( const mbedtls_ssl_ciphersuite_t *info ) +{ +    switch( info->key_exchange ) +    { +        case MBEDTLS_KEY_EXCHANGE_RSA: +        case MBEDTLS_KEY_EXCHANGE_DHE_RSA: +        case MBEDTLS_KEY_EXCHANGE_ECDH_RSA: +        case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA: +        case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA: +        case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA: +            return( 1 ); + +        default: +            return( 0 ); +    } +} + +#if defined(MBEDTLS_KEY_EXCHANGE__SOME__DHE_ENABLED) +static inline int mbedtls_ssl_ciphersuite_uses_dhe( const mbedtls_ssl_ciphersuite_t *info ) +{ +    switch( info->key_exchange ) +    { +        case MBEDTLS_KEY_EXCHANGE_DHE_RSA: +        case MBEDTLS_KEY_EXCHANGE_DHE_PSK: +            return( 1 ); + +        default: +            return( 0 ); +    } +} +#endif /* MBEDTLS_KEY_EXCHANGE__SOME__DHE_ENABLED) */ + +#if defined(MBEDTLS_KEY_EXCHANGE__SOME__ECDHE_ENABLED) +static inline int mbedtls_ssl_ciphersuite_uses_ecdhe( const mbedtls_ssl_ciphersuite_t *info ) +{ +    switch( info->key_exchange ) +    { +        case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA: +        case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA: +        case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK: +            return( 1 ); + +        default: +            return( 0 ); +    } +} +#endif /* MBEDTLS_KEY_EXCHANGE__SOME__ECDHE_ENABLED) */ + +#if defined(MBEDTLS_KEY_EXCHANGE__WITH_SERVER_SIGNATURE__ENABLED) +static inline int mbedtls_ssl_ciphersuite_uses_server_signature( const mbedtls_ssl_ciphersuite_t *info ) +{ +    switch( info->key_exchange ) +    { +        case MBEDTLS_KEY_EXCHANGE_DHE_RSA: +        case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA: +        case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA: +            return( 1 ); + +        default: +            return( 0 ); +    } +} +#endif /* MBEDTLS_KEY_EXCHANGE__WITH_SERVER_SIGNATURE__ENABLED */ + +#ifdef __cplusplus +} +#endif + +#endif /* ssl_ciphersuites.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/ssl_cookie.h b/thirdparty/mbedtls/include/mbedtls/ssl_cookie.h new file mode 100644 index 0000000000..80b65bbbb9 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/ssl_cookie.h @@ -0,0 +1,109 @@ +/** + * \file ssl_cookie.h + * + * \brief DTLS cookie callbacks implementation + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_SSL_COOKIE_H +#define MBEDTLS_SSL_COOKIE_H + +#include "ssl.h" + +#if defined(MBEDTLS_THREADING_C) +#include "threading.h" +#endif + +/** + * \name SECTION: Module settings + * + * The configuration options you can set for this module are in this section. + * Either change them in config.h or define them on the compiler command line. + * \{ + */ +#ifndef MBEDTLS_SSL_COOKIE_TIMEOUT +#define MBEDTLS_SSL_COOKIE_TIMEOUT     60 /**< Default expiration delay of DTLS cookies, in seconds if HAVE_TIME, or in number of cookies issued */ +#endif + +/* \} name SECTION: Module settings */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          Context for the default cookie functions. + */ +typedef struct +{ +    mbedtls_md_context_t    hmac_ctx;   /*!< context for the HMAC portion   */ +#if !defined(MBEDTLS_HAVE_TIME) +    unsigned long   serial;     /*!< serial number for expiration   */ +#endif +    unsigned long   timeout;    /*!< timeout delay, in seconds if HAVE_TIME, +                                     or in number of tickets issued */ + +#if defined(MBEDTLS_THREADING_C) +    mbedtls_threading_mutex_t mutex; +#endif +} mbedtls_ssl_cookie_ctx; + +/** + * \brief          Initialize cookie context + */ +void mbedtls_ssl_cookie_init( mbedtls_ssl_cookie_ctx *ctx ); + +/** + * \brief          Setup cookie context (generate keys) + */ +int mbedtls_ssl_cookie_setup( mbedtls_ssl_cookie_ctx *ctx, +                      int (*f_rng)(void *, unsigned char *, size_t), +                      void *p_rng ); + +/** + * \brief          Set expiration delay for cookies + *                 (Default MBEDTLS_SSL_COOKIE_TIMEOUT) + * + * \param ctx      Cookie contex + * \param delay    Delay, in seconds if HAVE_TIME, or in number of cookies + *                 issued in the meantime. + *                 0 to disable expiration (NOT recommended) + */ +void mbedtls_ssl_cookie_set_timeout( mbedtls_ssl_cookie_ctx *ctx, unsigned long delay ); + +/** + * \brief          Free cookie context + */ +void mbedtls_ssl_cookie_free( mbedtls_ssl_cookie_ctx *ctx ); + +/** + * \brief          Generate cookie, see \c mbedtls_ssl_cookie_write_t + */ +mbedtls_ssl_cookie_write_t mbedtls_ssl_cookie_write; + +/** + * \brief          Verify cookie, see \c mbedtls_ssl_cookie_write_t + */ +mbedtls_ssl_cookie_check_t mbedtls_ssl_cookie_check; + +#ifdef __cplusplus +} +#endif + +#endif /* ssl_cookie.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/ssl_internal.h b/thirdparty/mbedtls/include/mbedtls/ssl_internal.h new file mode 100644 index 0000000000..9f583a8777 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/ssl_internal.h @@ -0,0 +1,656 @@ +/** + * \file ssl_internal.h + * + * \brief Internal functions shared by the SSL modules + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_SSL_INTERNAL_H +#define MBEDTLS_SSL_INTERNAL_H + +#include "ssl.h" +#include "cipher.h" + +#if defined(MBEDTLS_MD5_C) +#include "md5.h" +#endif + +#if defined(MBEDTLS_SHA1_C) +#include "sha1.h" +#endif + +#if defined(MBEDTLS_SHA256_C) +#include "sha256.h" +#endif + +#if defined(MBEDTLS_SHA512_C) +#include "sha512.h" +#endif + +#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) +#include "ecjpake.h" +#endif + +#if ( defined(__ARMCC_VERSION) || defined(_MSC_VER) ) && \ +    !defined(inline) && !defined(__cplusplus) +#define inline __inline +#endif + +/* Determine minimum supported version */ +#define MBEDTLS_SSL_MIN_MAJOR_VERSION           MBEDTLS_SSL_MAJOR_VERSION_3 + +#if defined(MBEDTLS_SSL_PROTO_SSL3) +#define MBEDTLS_SSL_MIN_MINOR_VERSION           MBEDTLS_SSL_MINOR_VERSION_0 +#else +#if defined(MBEDTLS_SSL_PROTO_TLS1) +#define MBEDTLS_SSL_MIN_MINOR_VERSION           MBEDTLS_SSL_MINOR_VERSION_1 +#else +#if defined(MBEDTLS_SSL_PROTO_TLS1_1) +#define MBEDTLS_SSL_MIN_MINOR_VERSION           MBEDTLS_SSL_MINOR_VERSION_2 +#else +#if defined(MBEDTLS_SSL_PROTO_TLS1_2) +#define MBEDTLS_SSL_MIN_MINOR_VERSION           MBEDTLS_SSL_MINOR_VERSION_3 +#endif /* MBEDTLS_SSL_PROTO_TLS1_2 */ +#endif /* MBEDTLS_SSL_PROTO_TLS1_1 */ +#endif /* MBEDTLS_SSL_PROTO_TLS1   */ +#endif /* MBEDTLS_SSL_PROTO_SSL3   */ + +/* Determine maximum supported version */ +#define MBEDTLS_SSL_MAX_MAJOR_VERSION           MBEDTLS_SSL_MAJOR_VERSION_3 + +#if defined(MBEDTLS_SSL_PROTO_TLS1_2) +#define MBEDTLS_SSL_MAX_MINOR_VERSION           MBEDTLS_SSL_MINOR_VERSION_3 +#else +#if defined(MBEDTLS_SSL_PROTO_TLS1_1) +#define MBEDTLS_SSL_MAX_MINOR_VERSION           MBEDTLS_SSL_MINOR_VERSION_2 +#else +#if defined(MBEDTLS_SSL_PROTO_TLS1) +#define MBEDTLS_SSL_MAX_MINOR_VERSION           MBEDTLS_SSL_MINOR_VERSION_1 +#else +#if defined(MBEDTLS_SSL_PROTO_SSL3) +#define MBEDTLS_SSL_MAX_MINOR_VERSION           MBEDTLS_SSL_MINOR_VERSION_0 +#endif /* MBEDTLS_SSL_PROTO_SSL3   */ +#endif /* MBEDTLS_SSL_PROTO_TLS1   */ +#endif /* MBEDTLS_SSL_PROTO_TLS1_1 */ +#endif /* MBEDTLS_SSL_PROTO_TLS1_2 */ + +#define MBEDTLS_SSL_INITIAL_HANDSHAKE           0 +#define MBEDTLS_SSL_RENEGOTIATION_IN_PROGRESS   1   /* In progress */ +#define MBEDTLS_SSL_RENEGOTIATION_DONE          2   /* Done or aborted */ +#define MBEDTLS_SSL_RENEGOTIATION_PENDING       3   /* Requested (server only) */ + +/* + * DTLS retransmission states, see RFC 6347 4.2.4 + * + * The SENDING state is merged in PREPARING for initial sends, + * but is distinct for resends. + * + * Note: initial state is wrong for server, but is not used anyway. + */ +#define MBEDTLS_SSL_RETRANS_PREPARING       0 +#define MBEDTLS_SSL_RETRANS_SENDING         1 +#define MBEDTLS_SSL_RETRANS_WAITING         2 +#define MBEDTLS_SSL_RETRANS_FINISHED        3 + +/* + * Allow extra bytes for record, authentication and encryption overhead: + * counter (8) + header (5) + IV(16) + MAC (16-48) + padding (0-256) + * and allow for a maximum of 1024 of compression expansion if + * enabled. + */ +#if defined(MBEDTLS_ZLIB_SUPPORT) +#define MBEDTLS_SSL_COMPRESSION_ADD          1024 +#else +#define MBEDTLS_SSL_COMPRESSION_ADD             0 +#endif + +#if defined(MBEDTLS_ARC4_C) || defined(MBEDTLS_CIPHER_MODE_CBC) +/* Ciphersuites using HMAC */ +#if defined(MBEDTLS_SHA512_C) +#define MBEDTLS_SSL_MAC_ADD                 48  /* SHA-384 used for HMAC */ +#elif defined(MBEDTLS_SHA256_C) +#define MBEDTLS_SSL_MAC_ADD                 32  /* SHA-256 used for HMAC */ +#else +#define MBEDTLS_SSL_MAC_ADD                 20  /* SHA-1   used for HMAC */ +#endif +#else +/* AEAD ciphersuites: GCM and CCM use a 128 bits tag */ +#define MBEDTLS_SSL_MAC_ADD                 16 +#endif + +#if defined(MBEDTLS_CIPHER_MODE_CBC) +#define MBEDTLS_SSL_PADDING_ADD            256 +#else +#define MBEDTLS_SSL_PADDING_ADD              0 +#endif + +#define MBEDTLS_SSL_PAYLOAD_LEN ( MBEDTLS_SSL_MAX_CONTENT_LEN    \ +                        + MBEDTLS_SSL_COMPRESSION_ADD            \ +                        + MBEDTLS_MAX_IV_LENGTH                  \ +                        + MBEDTLS_SSL_MAC_ADD                    \ +                        + MBEDTLS_SSL_PADDING_ADD                \ +                        ) + +/* + * Check that we obey the standard's message size bounds + */ + +#if MBEDTLS_SSL_MAX_CONTENT_LEN > 16384 +#error Bad configuration - record content too large. +#endif + +#if MBEDTLS_SSL_PAYLOAD_LEN > 16384 + 2048 +#error Bad configuration - protected record payload too large. +#endif + +/* Note: Even though the TLS record header is only 5 bytes +   long, we're internally using 8 bytes to store the +   implicit sequence number. */ +#define MBEDTLS_SSL_HEADER_LEN 13 + +#define MBEDTLS_SSL_BUFFER_LEN  \ +    ( ( MBEDTLS_SSL_HEADER_LEN ) + ( MBEDTLS_SSL_PAYLOAD_LEN ) ) + +/* + * TLS extension flags (for extensions with outgoing ServerHello content + * that need it (e.g. for RENEGOTIATION_INFO the server already knows because + * of state of the renegotiation flag, so no indicator is required) + */ +#define MBEDTLS_TLS_EXT_SUPPORTED_POINT_FORMATS_PRESENT (1 << 0) +#define MBEDTLS_TLS_EXT_ECJPAKE_KKPP_OK                 (1 << 1) + +#ifdef __cplusplus +extern "C" { +#endif + +#if defined(MBEDTLS_SSL_PROTO_TLS1_2) && \ +    defined(MBEDTLS_KEY_EXCHANGE__WITH_CERT__ENABLED) +/* + * Abstraction for a grid of allowed signature-hash-algorithm pairs. + */ +struct mbedtls_ssl_sig_hash_set_t +{ +    /* At the moment, we only need to remember a single suitable +     * hash algorithm per signature algorithm. As long as that's +     * the case - and we don't need a general lookup function - +     * we can implement the sig-hash-set as a map from signatures +     * to hash algorithms. */ +    mbedtls_md_type_t rsa; +    mbedtls_md_type_t ecdsa; +}; +#endif /* MBEDTLS_SSL_PROTO_TLS1_2 && +          MBEDTLS_KEY_EXCHANGE__WITH_CERT__ENABLED */ + +/* + * This structure contains the parameters only needed during handshake. + */ +struct mbedtls_ssl_handshake_params +{ +    /* +     * Handshake specific crypto variables +     */ + +#if defined(MBEDTLS_SSL_PROTO_TLS1_2) && \ +    defined(MBEDTLS_KEY_EXCHANGE__WITH_CERT__ENABLED) +    mbedtls_ssl_sig_hash_set_t hash_algs;             /*!<  Set of suitable sig-hash pairs */ +#endif +#if defined(MBEDTLS_DHM_C) +    mbedtls_dhm_context dhm_ctx;                /*!<  DHM key exchange        */ +#endif +#if defined(MBEDTLS_ECDH_C) +    mbedtls_ecdh_context ecdh_ctx;              /*!<  ECDH key exchange       */ +#endif +#if defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) +    mbedtls_ecjpake_context ecjpake_ctx;        /*!< EC J-PAKE key exchange */ +#if defined(MBEDTLS_SSL_CLI_C) +    unsigned char *ecjpake_cache;               /*!< Cache for ClientHello ext */ +    size_t ecjpake_cache_len;                   /*!< Length of cached data */ +#endif +#endif /* MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */ +#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \ +    defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) +    const mbedtls_ecp_curve_info **curves;      /*!<  Supported elliptic curves */ +#endif +#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED) +    unsigned char *psk;                 /*!<  PSK from the callback         */ +    size_t psk_len;                     /*!<  Length of PSK from callback   */ +#endif +#if defined(MBEDTLS_X509_CRT_PARSE_C) +    mbedtls_ssl_key_cert *key_cert;     /*!< chosen key/cert pair (server)  */ +#if defined(MBEDTLS_SSL_SERVER_NAME_INDICATION) +    int sni_authmode;                   /*!< authmode from SNI callback     */ +    mbedtls_ssl_key_cert *sni_key_cert; /*!< key/cert list from SNI         */ +    mbedtls_x509_crt *sni_ca_chain;     /*!< trusted CAs from SNI callback  */ +    mbedtls_x509_crl *sni_ca_crl;       /*!< trusted CAs CRLs from SNI      */ +#endif /* MBEDTLS_SSL_SERVER_NAME_INDICATION */ +#endif /* MBEDTLS_X509_CRT_PARSE_C */ +#if defined(MBEDTLS_SSL_PROTO_DTLS) +    unsigned int out_msg_seq;           /*!<  Outgoing handshake sequence number */ +    unsigned int in_msg_seq;            /*!<  Incoming handshake sequence number */ + +    unsigned char *verify_cookie;       /*!<  Cli: HelloVerifyRequest cookie +                                              Srv: unused                    */ +    unsigned char verify_cookie_len;    /*!<  Cli: cookie length +                                              Srv: flag for sending a cookie */ + +    unsigned char *hs_msg;              /*!<  Reassembled handshake message  */ + +    uint32_t retransmit_timeout;        /*!<  Current value of timeout       */ +    unsigned char retransmit_state;     /*!<  Retransmission state           */ +    mbedtls_ssl_flight_item *flight;            /*!<  Current outgoing flight        */ +    mbedtls_ssl_flight_item *cur_msg;           /*!<  Current message in flight      */ +    unsigned int in_flight_start_seq;   /*!<  Minimum message sequence in the +                                              flight being received          */ +    mbedtls_ssl_transform *alt_transform_out;   /*!<  Alternative transform for +                                              resending messages             */ +    unsigned char alt_out_ctr[8];       /*!<  Alternative record epoch/counter +                                              for resending messages         */ +#endif /* MBEDTLS_SSL_PROTO_DTLS */ + +    /* +     * Checksum contexts +     */ +#if defined(MBEDTLS_SSL_PROTO_SSL3) || defined(MBEDTLS_SSL_PROTO_TLS1) || \ +    defined(MBEDTLS_SSL_PROTO_TLS1_1) +       mbedtls_md5_context fin_md5; +      mbedtls_sha1_context fin_sha1; +#endif +#if defined(MBEDTLS_SSL_PROTO_TLS1_2) +#if defined(MBEDTLS_SHA256_C) +    mbedtls_sha256_context fin_sha256; +#endif +#if defined(MBEDTLS_SHA512_C) +    mbedtls_sha512_context fin_sha512; +#endif +#endif /* MBEDTLS_SSL_PROTO_TLS1_2 */ + +    void (*update_checksum)(mbedtls_ssl_context *, const unsigned char *, size_t); +    void (*calc_verify)(mbedtls_ssl_context *, unsigned char *); +    void (*calc_finished)(mbedtls_ssl_context *, unsigned char *, int); +    int  (*tls_prf)(const unsigned char *, size_t, const char *, +                    const unsigned char *, size_t, +                    unsigned char *, size_t); + +    size_t pmslen;                      /*!<  premaster length        */ + +    unsigned char randbytes[64];        /*!<  random bytes            */ +    unsigned char premaster[MBEDTLS_PREMASTER_SIZE]; +                                        /*!<  premaster secret        */ + +    int resume;                         /*!<  session resume indicator*/ +    int max_major_ver;                  /*!< max. major version client*/ +    int max_minor_ver;                  /*!< max. minor version client*/ +    int cli_exts;                       /*!< client extension presence*/ + +#if defined(MBEDTLS_SSL_SESSION_TICKETS) +    int new_session_ticket;             /*!< use NewSessionTicket?    */ +#endif /* MBEDTLS_SSL_SESSION_TICKETS */ +#if defined(MBEDTLS_SSL_EXTENDED_MASTER_SECRET) +    int extended_ms;                    /*!< use Extended Master Secret? */ +#endif +}; + +/* + * This structure contains a full set of runtime transform parameters + * either in negotiation or active. + */ +struct mbedtls_ssl_transform +{ +    /* +     * Session specific crypto layer +     */ +    const mbedtls_ssl_ciphersuite_t *ciphersuite_info; +                                        /*!<  Chosen cipersuite_info  */ +    unsigned int keylen;                /*!<  symmetric key length (bytes)  */ +    size_t minlen;                      /*!<  min. ciphertext length  */ +    size_t ivlen;                       /*!<  IV length               */ +    size_t fixed_ivlen;                 /*!<  Fixed part of IV (AEAD) */ +    size_t maclen;                      /*!<  MAC length              */ + +    unsigned char iv_enc[16];           /*!<  IV (encryption)         */ +    unsigned char iv_dec[16];           /*!<  IV (decryption)         */ + +#if defined(MBEDTLS_SSL_PROTO_SSL3) +    /* Needed only for SSL v3.0 secret */ +    unsigned char mac_enc[20];          /*!<  SSL v3.0 secret (enc)   */ +    unsigned char mac_dec[20];          /*!<  SSL v3.0 secret (dec)   */ +#endif /* MBEDTLS_SSL_PROTO_SSL3 */ + +    mbedtls_md_context_t md_ctx_enc;            /*!<  MAC (encryption)        */ +    mbedtls_md_context_t md_ctx_dec;            /*!<  MAC (decryption)        */ + +    mbedtls_cipher_context_t cipher_ctx_enc;    /*!<  encryption context      */ +    mbedtls_cipher_context_t cipher_ctx_dec;    /*!<  decryption context      */ + +    /* +     * Session specific compression layer +     */ +#if defined(MBEDTLS_ZLIB_SUPPORT) +    z_stream ctx_deflate;               /*!<  compression context     */ +    z_stream ctx_inflate;               /*!<  decompression context   */ +#endif +}; + +#if defined(MBEDTLS_X509_CRT_PARSE_C) +/* + * List of certificate + private key pairs + */ +struct mbedtls_ssl_key_cert +{ +    mbedtls_x509_crt *cert;                 /*!< cert                       */ +    mbedtls_pk_context *key;                /*!< private key                */ +    mbedtls_ssl_key_cert *next;             /*!< next key/cert pair         */ +}; +#endif /* MBEDTLS_X509_CRT_PARSE_C */ + +#if defined(MBEDTLS_SSL_PROTO_DTLS) +/* + * List of handshake messages kept around for resending + */ +struct mbedtls_ssl_flight_item +{ +    unsigned char *p;       /*!< message, including handshake headers   */ +    size_t len;             /*!< length of p                            */ +    unsigned char type;     /*!< type of the message: handshake or CCS  */ +    mbedtls_ssl_flight_item *next;  /*!< next handshake message(s)              */ +}; +#endif /* MBEDTLS_SSL_PROTO_DTLS */ + +#if defined(MBEDTLS_SSL_PROTO_TLS1_2) && \ +    defined(MBEDTLS_KEY_EXCHANGE__WITH_CERT__ENABLED) + +/* Find an entry in a signature-hash set matching a given hash algorithm. */ +mbedtls_md_type_t mbedtls_ssl_sig_hash_set_find( mbedtls_ssl_sig_hash_set_t *set, +                                                 mbedtls_pk_type_t sig_alg ); +/* Add a signature-hash-pair to a signature-hash set */ +void mbedtls_ssl_sig_hash_set_add( mbedtls_ssl_sig_hash_set_t *set, +                                   mbedtls_pk_type_t sig_alg, +                                   mbedtls_md_type_t md_alg ); +/* Allow exactly one hash algorithm for each signature. */ +void mbedtls_ssl_sig_hash_set_const_hash( mbedtls_ssl_sig_hash_set_t *set, +                                          mbedtls_md_type_t md_alg ); + +/* Setup an empty signature-hash set */ +static inline void mbedtls_ssl_sig_hash_set_init( mbedtls_ssl_sig_hash_set_t *set ) +{ +    mbedtls_ssl_sig_hash_set_const_hash( set, MBEDTLS_MD_NONE ); +} + +#endif /* MBEDTLS_SSL_PROTO_TLS1_2) && +          MBEDTLS_KEY_EXCHANGE__WITH_CERT__ENABLED */ + +/** + * \brief           Free referenced items in an SSL transform context and clear + *                  memory + * + * \param transform SSL transform context + */ +void mbedtls_ssl_transform_free( mbedtls_ssl_transform *transform ); + +/** + * \brief           Free referenced items in an SSL handshake context and clear + *                  memory + * + * \param handshake SSL handshake context + */ +void mbedtls_ssl_handshake_free( mbedtls_ssl_handshake_params *handshake ); + +int mbedtls_ssl_handshake_client_step( mbedtls_ssl_context *ssl ); +int mbedtls_ssl_handshake_server_step( mbedtls_ssl_context *ssl ); +void mbedtls_ssl_handshake_wrapup( mbedtls_ssl_context *ssl ); + +int mbedtls_ssl_send_fatal_handshake_failure( mbedtls_ssl_context *ssl ); + +void mbedtls_ssl_reset_checksum( mbedtls_ssl_context *ssl ); +int mbedtls_ssl_derive_keys( mbedtls_ssl_context *ssl ); + +int mbedtls_ssl_read_record_layer( mbedtls_ssl_context *ssl ); +int mbedtls_ssl_handle_message_type( mbedtls_ssl_context *ssl ); +int mbedtls_ssl_prepare_handshake_record( mbedtls_ssl_context *ssl ); +void mbedtls_ssl_update_handshake_status( mbedtls_ssl_context *ssl ); + +/** + * \brief       Update record layer + * + *              This function roughly separates the implementation + *              of the logic of (D)TLS from the implementation + *              of the secure transport. + * + * \param  ssl  SSL context to use + * + * \return      0 or non-zero error code. + * + * \note        A clarification on what is called 'record layer' here + *              is in order, as many sensible definitions are possible: + * + *              The record layer takes as input an untrusted underlying + *              transport (stream or datagram) and transforms it into + *              a serially multiplexed, secure transport, which + *              conceptually provides the following: + * + *              (1) Three datagram based, content-agnostic transports + *                  for handshake, alert and CCS messages. + *              (2) One stream- or datagram-based transport + *                  for application data. + *              (3) Functionality for changing the underlying transform + *                  securing the contents. + * + *              The interface to this functionality is given as follows: + * + *              a Updating + *                [Currently implemented by mbedtls_ssl_read_record] + * + *                Check if and on which of the four 'ports' data is pending: + *                Nothing, a controlling datagram of type (1), or application + *                data (2). In any case data is present, internal buffers + *                provide access to the data for the user to process it. + *                Consumption of type (1) datagrams is done automatically + *                on the next update, invalidating that the internal buffers + *                for previous datagrams, while consumption of application + *                data (2) is user-controlled. + * + *              b Reading of application data + *                [Currently manual adaption of ssl->in_offt pointer] + * + *                As mentioned in the last paragraph, consumption of data + *                is different from the automatic consumption of control + *                datagrams (1) because application data is treated as a stream. + * + *              c Tracking availability of application data + *                [Currently manually through decreasing ssl->in_msglen] + * + *                For efficiency and to retain datagram semantics for + *                application data in case of DTLS, the record layer + *                provides functionality for checking how much application + *                data is still available in the internal buffer. + * + *              d Changing the transformation securing the communication. + * + *              Given an opaque implementation of the record layer in the + *              above sense, it should be possible to implement the logic + *              of (D)TLS on top of it without the need to know anything + *              about the record layer's internals. This is done e.g. + *              in all the handshake handling functions, and in the + *              application data reading function mbedtls_ssl_read. + * + * \note        The above tries to give a conceptual picture of the + *              record layer, but the current implementation deviates + *              from it in some places. For example, our implementation of + *              the update functionality through mbedtls_ssl_read_record + *              discards datagrams depending on the current state, which + *              wouldn't fall under the record layer's responsibility + *              following the above definition. + * + */ +int mbedtls_ssl_read_record( mbedtls_ssl_context *ssl ); +int mbedtls_ssl_fetch_input( mbedtls_ssl_context *ssl, size_t nb_want ); + +int mbedtls_ssl_write_record( mbedtls_ssl_context *ssl ); +int mbedtls_ssl_flush_output( mbedtls_ssl_context *ssl ); + +int mbedtls_ssl_parse_certificate( mbedtls_ssl_context *ssl ); +int mbedtls_ssl_write_certificate( mbedtls_ssl_context *ssl ); + +int mbedtls_ssl_parse_change_cipher_spec( mbedtls_ssl_context *ssl ); +int mbedtls_ssl_write_change_cipher_spec( mbedtls_ssl_context *ssl ); + +int mbedtls_ssl_parse_finished( mbedtls_ssl_context *ssl ); +int mbedtls_ssl_write_finished( mbedtls_ssl_context *ssl ); + +void mbedtls_ssl_optimize_checksum( mbedtls_ssl_context *ssl, +                            const mbedtls_ssl_ciphersuite_t *ciphersuite_info ); + +#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED) +int mbedtls_ssl_psk_derive_premaster( mbedtls_ssl_context *ssl, mbedtls_key_exchange_type_t key_ex ); +#endif + +#if defined(MBEDTLS_PK_C) +unsigned char mbedtls_ssl_sig_from_pk( mbedtls_pk_context *pk ); +unsigned char mbedtls_ssl_sig_from_pk_alg( mbedtls_pk_type_t type ); +mbedtls_pk_type_t mbedtls_ssl_pk_alg_from_sig( unsigned char sig ); +#endif + +mbedtls_md_type_t mbedtls_ssl_md_alg_from_hash( unsigned char hash ); +unsigned char mbedtls_ssl_hash_from_md_alg( int md ); +int mbedtls_ssl_set_calc_verify_md( mbedtls_ssl_context *ssl, int md ); + +#if defined(MBEDTLS_ECP_C) +int mbedtls_ssl_check_curve( const mbedtls_ssl_context *ssl, mbedtls_ecp_group_id grp_id ); +#endif + +#if defined(MBEDTLS_KEY_EXCHANGE__WITH_CERT__ENABLED) +int mbedtls_ssl_check_sig_hash( const mbedtls_ssl_context *ssl, +                                mbedtls_md_type_t md ); +#endif + +#if defined(MBEDTLS_X509_CRT_PARSE_C) +static inline mbedtls_pk_context *mbedtls_ssl_own_key( mbedtls_ssl_context *ssl ) +{ +    mbedtls_ssl_key_cert *key_cert; + +    if( ssl->handshake != NULL && ssl->handshake->key_cert != NULL ) +        key_cert = ssl->handshake->key_cert; +    else +        key_cert = ssl->conf->key_cert; + +    return( key_cert == NULL ? NULL : key_cert->key ); +} + +static inline mbedtls_x509_crt *mbedtls_ssl_own_cert( mbedtls_ssl_context *ssl ) +{ +    mbedtls_ssl_key_cert *key_cert; + +    if( ssl->handshake != NULL && ssl->handshake->key_cert != NULL ) +        key_cert = ssl->handshake->key_cert; +    else +        key_cert = ssl->conf->key_cert; + +    return( key_cert == NULL ? NULL : key_cert->cert ); +} + +/* + * Check usage of a certificate wrt extensions: + * keyUsage, extendedKeyUsage (later), and nSCertType (later). + * + * Warning: cert_endpoint is the endpoint of the cert (ie, of our peer when we + * check a cert we received from them)! + * + * Return 0 if everything is OK, -1 if not. + */ +int mbedtls_ssl_check_cert_usage( const mbedtls_x509_crt *cert, +                          const mbedtls_ssl_ciphersuite_t *ciphersuite, +                          int cert_endpoint, +                          uint32_t *flags ); +#endif /* MBEDTLS_X509_CRT_PARSE_C */ + +void mbedtls_ssl_write_version( int major, int minor, int transport, +                        unsigned char ver[2] ); +void mbedtls_ssl_read_version( int *major, int *minor, int transport, +                       const unsigned char ver[2] ); + +static inline size_t mbedtls_ssl_hdr_len( const mbedtls_ssl_context *ssl ) +{ +#if defined(MBEDTLS_SSL_PROTO_DTLS) +    if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM ) +        return( 13 ); +#else +    ((void) ssl); +#endif +    return( 5 ); +} + +static inline size_t mbedtls_ssl_hs_hdr_len( const mbedtls_ssl_context *ssl ) +{ +#if defined(MBEDTLS_SSL_PROTO_DTLS) +    if( ssl->conf->transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM ) +        return( 12 ); +#else +    ((void) ssl); +#endif +    return( 4 ); +} + +#if defined(MBEDTLS_SSL_PROTO_DTLS) +void mbedtls_ssl_send_flight_completed( mbedtls_ssl_context *ssl ); +void mbedtls_ssl_recv_flight_completed( mbedtls_ssl_context *ssl ); +int mbedtls_ssl_resend( mbedtls_ssl_context *ssl ); +#endif + +/* Visible for testing purposes only */ +#if defined(MBEDTLS_SSL_DTLS_ANTI_REPLAY) +int mbedtls_ssl_dtls_replay_check( mbedtls_ssl_context *ssl ); +void mbedtls_ssl_dtls_replay_update( mbedtls_ssl_context *ssl ); +#endif + +/* constant-time buffer comparison */ +static inline int mbedtls_ssl_safer_memcmp( const void *a, const void *b, size_t n ) +{ +    size_t i; +    volatile const unsigned char *A = (volatile const unsigned char *) a; +    volatile const unsigned char *B = (volatile const unsigned char *) b; +    volatile unsigned char diff = 0; + +    for( i = 0; i < n; i++ ) +        diff |= A[i] ^ B[i]; + +    return( diff ); +} + +#if defined(MBEDTLS_SSL_PROTO_SSL3) || defined(MBEDTLS_SSL_PROTO_TLS1) || \ +    defined(MBEDTLS_SSL_PROTO_TLS1_1) +int mbedtls_ssl_get_key_exchange_md_ssl_tls( mbedtls_ssl_context *ssl, +                                        unsigned char *output, +                                        unsigned char *data, size_t data_len ); +#endif /* MBEDTLS_SSL_PROTO_SSL3 || MBEDTLS_SSL_PROTO_TLS1 || \ +          MBEDTLS_SSL_PROTO_TLS1_1 */ + +#if defined(MBEDTLS_SSL_PROTO_TLS1) || defined(MBEDTLS_SSL_PROTO_TLS1_1) || \ +    defined(MBEDTLS_SSL_PROTO_TLS1_2) +int mbedtls_ssl_get_key_exchange_md_tls1_2( mbedtls_ssl_context *ssl, +                                        unsigned char *output, +                                        unsigned char *data, size_t data_len, +                                        mbedtls_md_type_t md_alg ); +#endif /* MBEDTLS_SSL_PROTO_TLS1 || MBEDTLS_SSL_PROTO_TLS1_1 || \ +          MBEDTLS_SSL_PROTO_TLS1_2 */ + +#ifdef __cplusplus +} +#endif + +#endif /* ssl_internal.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/ssl_ticket.h b/thirdparty/mbedtls/include/mbedtls/ssl_ticket.h new file mode 100644 index 0000000000..93ad46ac9c --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/ssl_ticket.h @@ -0,0 +1,136 @@ +/** + * \file ssl_ticket.h + * + * \brief TLS server ticket callbacks implementation + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_SSL_TICKET_H +#define MBEDTLS_SSL_TICKET_H + +/* + * This implementation of the session ticket callbacks includes key + * management, rotating the keys periodically in order to preserve forward + * secrecy, when MBEDTLS_HAVE_TIME is defined. + */ + +#include "ssl.h" +#include "cipher.h" + +#if defined(MBEDTLS_THREADING_C) +#include "threading.h" +#endif + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief   Information for session ticket protection + */ +typedef struct +{ +    unsigned char name[4];          /*!< random key identifier              */ +    uint32_t generation_time;       /*!< key generation timestamp (seconds) */ +    mbedtls_cipher_context_t ctx;   /*!< context for auth enc/decryption    */ +} +mbedtls_ssl_ticket_key; + +/** + * \brief   Context for session ticket handling functions + */ +typedef struct +{ +    mbedtls_ssl_ticket_key keys[2]; /*!< ticket protection keys             */ +    unsigned char active;           /*!< index of the currently active key  */ + +    uint32_t ticket_lifetime;       /*!< lifetime of tickets in seconds     */ + +    /** Callback for getting (pseudo-)random numbers                        */ +    int  (*f_rng)(void *, unsigned char *, size_t); +    void *p_rng;                    /*!< context for the RNG function       */ + +#if defined(MBEDTLS_THREADING_C) +    mbedtls_threading_mutex_t mutex; +#endif +} +mbedtls_ssl_ticket_context; + +/** + * \brief           Initialize a ticket context. + *                  (Just make it ready for mbedtls_ssl_ticket_setup() + *                  or mbedtls_ssl_ticket_free().) + * + * \param ctx       Context to be initialized + */ +void mbedtls_ssl_ticket_init( mbedtls_ssl_ticket_context *ctx ); + +/** + * \brief           Prepare context to be actually used + * + * \param ctx       Context to be set up + * \param f_rng     RNG callback function + * \param p_rng     RNG callback context + * \param cipher    AEAD cipher to use for ticket protection. + *                  Recommended value: MBEDTLS_CIPHER_AES_256_GCM. + * \param lifetime  Tickets lifetime in seconds + *                  Recommended value: 86400 (one day). + * + * \note            It is highly recommended to select a cipher that is at + *                  least as strong as the the strongest ciphersuite + *                  supported. Usually that means a 256-bit key. + * + * \note            The lifetime of the keys is twice the lifetime of tickets. + *                  It is recommended to pick a reasonnable lifetime so as not + *                  to negate the benefits of forward secrecy. + * + * \return          0 if successful, + *                  or a specific MBEDTLS_ERR_XXX error code + */ +int mbedtls_ssl_ticket_setup( mbedtls_ssl_ticket_context *ctx, +    int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, +    mbedtls_cipher_type_t cipher, +    uint32_t lifetime ); + +/** + * \brief           Implementation of the ticket write callback + * + * \note            See \c mbedlts_ssl_ticket_write_t for description + */ +mbedtls_ssl_ticket_write_t mbedtls_ssl_ticket_write; + +/** + * \brief           Implementation of the ticket parse callback + * + * \note            See \c mbedlts_ssl_ticket_parse_t for description + */ +mbedtls_ssl_ticket_parse_t mbedtls_ssl_ticket_parse; + +/** + * \brief           Free a context's content and zeroize it. + * + * \param ctx       Context to be cleaned up + */ +void mbedtls_ssl_ticket_free( mbedtls_ssl_ticket_context *ctx ); + +#ifdef __cplusplus +} +#endif + +#endif /* ssl_ticket.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/threading.h b/thirdparty/mbedtls/include/mbedtls/threading.h new file mode 100644 index 0000000000..58e6db2f3a --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/threading.h @@ -0,0 +1,107 @@ +/** + * \file threading.h + * + * \brief Threading abstraction layer + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_THREADING_H +#define MBEDTLS_THREADING_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stdlib.h> + +#ifdef __cplusplus +extern "C" { +#endif + +#define MBEDTLS_ERR_THREADING_FEATURE_UNAVAILABLE         -0x001A  /**< The selected feature is not available. */ +#define MBEDTLS_ERR_THREADING_BAD_INPUT_DATA              -0x001C  /**< Bad input parameters to function. */ +#define MBEDTLS_ERR_THREADING_MUTEX_ERROR                 -0x001E  /**< Locking / unlocking / free failed with error code. */ + +#if defined(MBEDTLS_THREADING_PTHREAD) +#include <pthread.h> +typedef struct +{ +    pthread_mutex_t mutex; +    char is_valid; +} mbedtls_threading_mutex_t; +#endif + +#if defined(MBEDTLS_THREADING_ALT) +/* You should define the mbedtls_threading_mutex_t type in your header */ +#include "threading_alt.h" + +/** + * \brief           Set your alternate threading implementation function + *                  pointers and initialize global mutexes. If used, this + *                  function must be called once in the main thread before any + *                  other mbed TLS function is called, and + *                  mbedtls_threading_free_alt() must be called once in the main + *                  thread after all other mbed TLS functions. + * + * \note            mutex_init() and mutex_free() don't return a status code. + *                  If mutex_init() fails, it should leave its argument (the + *                  mutex) in a state such that mutex_lock() will fail when + *                  called with this argument. + * + * \param mutex_init    the init function implementation + * \param mutex_free    the free function implementation + * \param mutex_lock    the lock function implementation + * \param mutex_unlock  the unlock function implementation + */ +void mbedtls_threading_set_alt( void (*mutex_init)( mbedtls_threading_mutex_t * ), +                       void (*mutex_free)( mbedtls_threading_mutex_t * ), +                       int (*mutex_lock)( mbedtls_threading_mutex_t * ), +                       int (*mutex_unlock)( mbedtls_threading_mutex_t * ) ); + +/** + * \brief               Free global mutexes. + */ +void mbedtls_threading_free_alt( void ); +#endif /* MBEDTLS_THREADING_ALT */ + +#if defined(MBEDTLS_THREADING_C) +/* + * The function pointers for mutex_init, mutex_free, mutex_ and mutex_unlock + * + * All these functions are expected to work or the result will be undefined. + */ +extern void (*mbedtls_mutex_init)( mbedtls_threading_mutex_t *mutex ); +extern void (*mbedtls_mutex_free)( mbedtls_threading_mutex_t *mutex ); +extern int (*mbedtls_mutex_lock)( mbedtls_threading_mutex_t *mutex ); +extern int (*mbedtls_mutex_unlock)( mbedtls_threading_mutex_t *mutex ); + +/* + * Global mutexes + */ +extern mbedtls_threading_mutex_t mbedtls_threading_readdir_mutex; +extern mbedtls_threading_mutex_t mbedtls_threading_gmtime_mutex; +#endif /* MBEDTLS_THREADING_C */ + +#ifdef __cplusplus +} +#endif + +#endif /* threading.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/timing.h b/thirdparty/mbedtls/include/mbedtls/timing.h new file mode 100644 index 0000000000..2c497bf4eb --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/timing.h @@ -0,0 +1,161 @@ +/** + * \file timing.h + * + * \brief Portable interface to timeouts and to the CPU cycle counter + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_TIMING_H +#define MBEDTLS_TIMING_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#if !defined(MBEDTLS_TIMING_ALT) +// Regular implementation +// + +#include <stdint.h> + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          timer structure + */ +struct mbedtls_timing_hr_time +{ +    unsigned char opaque[32]; +}; + +/** + * \brief          Context for mbedtls_timing_set/get_delay() + */ +typedef struct +{ +    struct mbedtls_timing_hr_time   timer; +    uint32_t                        int_ms; +    uint32_t                        fin_ms; +} mbedtls_timing_delay_context; + +extern volatile int mbedtls_timing_alarmed; + +/** + * \brief          Return the CPU cycle counter value + * + * \warning        This is only a best effort! Do not rely on this! + *                 In particular, it is known to be unreliable on virtual + *                 machines. + * + * \note           This value starts at an unspecified origin and + *                 may wrap around. + */ +unsigned long mbedtls_timing_hardclock( void ); + +/** + * \brief          Return the elapsed time in milliseconds + * + * \param val      points to a timer structure + * \param reset    If 0, query the elapsed time. Otherwise (re)start the timer. + * + * \return         Elapsed time since the previous reset in ms. When + *                 restarting, this is always 0. + * + * \note           To initialize a timer, call this function with reset=1. + * + *                 Determining the elapsed time and resetting the timer is not + *                 atomic on all platforms, so after the sequence + *                 `{ get_timer(1); ...; time1 = get_timer(1); ...; time2 = + *                 get_timer(0) }` the value time1+time2 is only approximately + *                 the delay since the first reset. + */ +unsigned long mbedtls_timing_get_timer( struct mbedtls_timing_hr_time *val, int reset ); + +/** + * \brief          Setup an alarm clock + * + * \param seconds  delay before the "mbedtls_timing_alarmed" flag is set + *                 (must be >=0) + * + * \warning        Only one alarm at a time  is supported. In a threaded + *                 context, this means one for the whole process, not one per + *                 thread. + */ +void mbedtls_set_alarm( int seconds ); + +/** + * \brief          Set a pair of delays to watch + *                 (See \c mbedtls_timing_get_delay().) + * + * \param data     Pointer to timing data. + *                 Must point to a valid \c mbedtls_timing_delay_context struct. + * \param int_ms   First (intermediate) delay in milliseconds. + *                 The effect if int_ms > fin_ms is unspecified. + * \param fin_ms   Second (final) delay in milliseconds. + *                 Pass 0 to cancel the current delay. + * + * \note           To set a single delay, either use \c mbedtls_timing_set_timer + *                 directly or use this function with int_ms == fin_ms. + */ +void mbedtls_timing_set_delay( void *data, uint32_t int_ms, uint32_t fin_ms ); + +/** + * \brief          Get the status of delays + *                 (Memory helper: number of delays passed.) + * + * \param data     Pointer to timing data + *                 Must point to a valid \c mbedtls_timing_delay_context struct. + * + * \return         -1 if cancelled (fin_ms = 0), + *                  0 if none of the delays are passed, + *                  1 if only the intermediate delay is passed, + *                  2 if the final delay is passed. + */ +int mbedtls_timing_get_delay( void *data ); + +#ifdef __cplusplus +} +#endif + +#else  /* MBEDTLS_TIMING_ALT */ +#include "timing_alt.h" +#endif /* MBEDTLS_TIMING_ALT */ + +#ifdef __cplusplus +extern "C" { +#endif + +#if defined(MBEDTLS_SELF_TEST) +/** + * \brief          Checkup routine + * + * \return         0 if successful, or 1 if a test failed + */ +int mbedtls_timing_self_test( int verbose ); +#endif + +#ifdef __cplusplus +} +#endif + +#endif /* timing.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/version.h b/thirdparty/mbedtls/include/mbedtls/version.h new file mode 100644 index 0000000000..961be59c35 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/version.h @@ -0,0 +1,112 @@ +/** + * \file version.h + * + * \brief Run-time version information + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +/* + * This set of compile-time defines and run-time variables can be used to + * determine the version number of the mbed TLS library used. + */ +#ifndef MBEDTLS_VERSION_H +#define MBEDTLS_VERSION_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +/** + * The version number x.y.z is split into three parts. + * Major, Minor, Patchlevel + */ +#define MBEDTLS_VERSION_MAJOR  2 +#define MBEDTLS_VERSION_MINOR  7 +#define MBEDTLS_VERSION_PATCH  0 + +/** + * The single version number has the following structure: + *    MMNNPP00 + *    Major version | Minor version | Patch version + */ +#define MBEDTLS_VERSION_NUMBER         0x02070000 +#define MBEDTLS_VERSION_STRING         "2.7.0" +#define MBEDTLS_VERSION_STRING_FULL    "mbed TLS 2.7.0" + +#if defined(MBEDTLS_VERSION_C) + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * Get the version number. + * + * \return          The constructed version number in the format + *                  MMNNPP00 (Major, Minor, Patch). + */ +unsigned int mbedtls_version_get_number( void ); + +/** + * Get the version string ("x.y.z"). + * + * \param string    The string that will receive the value. + *                  (Should be at least 9 bytes in size) + */ +void mbedtls_version_get_string( char *string ); + +/** + * Get the full version string ("mbed TLS x.y.z"). + * + * \param string    The string that will receive the value. The mbed TLS version + *                  string will use 18 bytes AT MOST including a terminating + *                  null byte. + *                  (So the buffer should be at least 18 bytes to receive this + *                  version string). + */ +void mbedtls_version_get_string_full( char *string ); + +/** + * \brief           Check if support for a feature was compiled into this + *                  mbed TLS binary. This allows you to see at runtime if the + *                  library was for instance compiled with or without + *                  Multi-threading support. + * + * \note            only checks against defines in the sections "System + *                  support", "mbed TLS modules" and "mbed TLS feature + *                  support" in config.h + * + * \param feature   The string for the define to check (e.g. "MBEDTLS_AES_C") + * + * \return          0 if the feature is present, + *                  -1 if the feature is not present and + *                  -2 if support for feature checking as a whole was not + *                  compiled in. + */ +int mbedtls_version_check_feature( const char *feature ); + +#ifdef __cplusplus +} +#endif + +#endif /* MBEDTLS_VERSION_C */ + +#endif /* version.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/x509.h b/thirdparty/mbedtls/include/mbedtls/x509.h new file mode 100644 index 0000000000..d6db9c6e37 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/x509.h @@ -0,0 +1,333 @@ +/** + * \file x509.h + * + * \brief X.509 generic defines and structures + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_X509_H +#define MBEDTLS_X509_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include "asn1.h" +#include "pk.h" + +#if defined(MBEDTLS_RSA_C) +#include "rsa.h" +#endif + +/** + * \addtogroup x509_module + * \{ + */ + +#if !defined(MBEDTLS_X509_MAX_INTERMEDIATE_CA) +/** + * Maximum number of intermediate CAs in a verification chain. + * That is, maximum length of the chain, excluding the end-entity certificate + * and the trusted root certificate. + * + * Set this to a low value to prevent an adversary from making you waste + * resources verifying an overlong certificate chain. + */ +#define MBEDTLS_X509_MAX_INTERMEDIATE_CA   8 +#endif + +/** + * \name X509 Error codes + * \{ + */ +#define MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE              -0x2080  /**< Unavailable feature, e.g. RSA hashing/encryption combination. */ +#define MBEDTLS_ERR_X509_UNKNOWN_OID                      -0x2100  /**< Requested OID is unknown. */ +#define MBEDTLS_ERR_X509_INVALID_FORMAT                   -0x2180  /**< The CRT/CRL/CSR format is invalid, e.g. different type expected. */ +#define MBEDTLS_ERR_X509_INVALID_VERSION                  -0x2200  /**< The CRT/CRL/CSR version element is invalid. */ +#define MBEDTLS_ERR_X509_INVALID_SERIAL                   -0x2280  /**< The serial tag or value is invalid. */ +#define MBEDTLS_ERR_X509_INVALID_ALG                      -0x2300  /**< The algorithm tag or value is invalid. */ +#define MBEDTLS_ERR_X509_INVALID_NAME                     -0x2380  /**< The name tag or value is invalid. */ +#define MBEDTLS_ERR_X509_INVALID_DATE                     -0x2400  /**< The date tag or value is invalid. */ +#define MBEDTLS_ERR_X509_INVALID_SIGNATURE                -0x2480  /**< The signature tag or value invalid. */ +#define MBEDTLS_ERR_X509_INVALID_EXTENSIONS               -0x2500  /**< The extension tag or value is invalid. */ +#define MBEDTLS_ERR_X509_UNKNOWN_VERSION                  -0x2580  /**< CRT/CRL/CSR has an unsupported version number. */ +#define MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG                  -0x2600  /**< Signature algorithm (oid) is unsupported. */ +#define MBEDTLS_ERR_X509_SIG_MISMATCH                     -0x2680  /**< Signature algorithms do not match. (see \c ::mbedtls_x509_crt sig_oid) */ +#define MBEDTLS_ERR_X509_CERT_VERIFY_FAILED               -0x2700  /**< Certificate verification failed, e.g. CRL, CA or signature check failed. */ +#define MBEDTLS_ERR_X509_CERT_UNKNOWN_FORMAT              -0x2780  /**< Format not recognized as DER or PEM. */ +#define MBEDTLS_ERR_X509_BAD_INPUT_DATA                   -0x2800  /**< Input invalid. */ +#define MBEDTLS_ERR_X509_ALLOC_FAILED                     -0x2880  /**< Allocation of memory failed. */ +#define MBEDTLS_ERR_X509_FILE_IO_ERROR                    -0x2900  /**< Read/write of file failed. */ +#define MBEDTLS_ERR_X509_BUFFER_TOO_SMALL                 -0x2980  /**< Destination buffer is too small. */ +#define MBEDTLS_ERR_X509_FATAL_ERROR                      -0x3000  /**< A fatal error occured, eg the chain is too long or the vrfy callback failed. */ +/* \} name */ + +/** + * \name X509 Verify codes + * \{ + */ +/* Reminder: update x509_crt_verify_strings[] in library/x509_crt.c */ +#define MBEDTLS_X509_BADCERT_EXPIRED             0x01  /**< The certificate validity has expired. */ +#define MBEDTLS_X509_BADCERT_REVOKED             0x02  /**< The certificate has been revoked (is on a CRL). */ +#define MBEDTLS_X509_BADCERT_CN_MISMATCH         0x04  /**< The certificate Common Name (CN) does not match with the expected CN. */ +#define MBEDTLS_X509_BADCERT_NOT_TRUSTED         0x08  /**< The certificate is not correctly signed by the trusted CA. */ +#define MBEDTLS_X509_BADCRL_NOT_TRUSTED          0x10  /**< The CRL is not correctly signed by the trusted CA. */ +#define MBEDTLS_X509_BADCRL_EXPIRED              0x20  /**< The CRL is expired. */ +#define MBEDTLS_X509_BADCERT_MISSING             0x40  /**< Certificate was missing. */ +#define MBEDTLS_X509_BADCERT_SKIP_VERIFY         0x80  /**< Certificate verification was skipped. */ +#define MBEDTLS_X509_BADCERT_OTHER             0x0100  /**< Other reason (can be used by verify callback) */ +#define MBEDTLS_X509_BADCERT_FUTURE            0x0200  /**< The certificate validity starts in the future. */ +#define MBEDTLS_X509_BADCRL_FUTURE             0x0400  /**< The CRL is from the future */ +#define MBEDTLS_X509_BADCERT_KEY_USAGE         0x0800  /**< Usage does not match the keyUsage extension. */ +#define MBEDTLS_X509_BADCERT_EXT_KEY_USAGE     0x1000  /**< Usage does not match the extendedKeyUsage extension. */ +#define MBEDTLS_X509_BADCERT_NS_CERT_TYPE      0x2000  /**< Usage does not match the nsCertType extension. */ +#define MBEDTLS_X509_BADCERT_BAD_MD            0x4000  /**< The certificate is signed with an unacceptable hash. */ +#define MBEDTLS_X509_BADCERT_BAD_PK            0x8000  /**< The certificate is signed with an unacceptable PK alg (eg RSA vs ECDSA). */ +#define MBEDTLS_X509_BADCERT_BAD_KEY         0x010000  /**< The certificate is signed with an unacceptable key (eg bad curve, RSA too short). */ +#define MBEDTLS_X509_BADCRL_BAD_MD           0x020000  /**< The CRL is signed with an unacceptable hash. */ +#define MBEDTLS_X509_BADCRL_BAD_PK           0x040000  /**< The CRL is signed with an unacceptable PK alg (eg RSA vs ECDSA). */ +#define MBEDTLS_X509_BADCRL_BAD_KEY          0x080000  /**< The CRL is signed with an unacceptable key (eg bad curve, RSA too short). */ + +/* \} name */ +/* \} addtogroup x509_module */ + +/* + * X.509 v3 Key Usage Extension flags + * Reminder: update x509_info_key_usage() when adding new flags. + */ +#define MBEDTLS_X509_KU_DIGITAL_SIGNATURE            (0x80)  /* bit 0 */ +#define MBEDTLS_X509_KU_NON_REPUDIATION              (0x40)  /* bit 1 */ +#define MBEDTLS_X509_KU_KEY_ENCIPHERMENT             (0x20)  /* bit 2 */ +#define MBEDTLS_X509_KU_DATA_ENCIPHERMENT            (0x10)  /* bit 3 */ +#define MBEDTLS_X509_KU_KEY_AGREEMENT                (0x08)  /* bit 4 */ +#define MBEDTLS_X509_KU_KEY_CERT_SIGN                (0x04)  /* bit 5 */ +#define MBEDTLS_X509_KU_CRL_SIGN                     (0x02)  /* bit 6 */ +#define MBEDTLS_X509_KU_ENCIPHER_ONLY                (0x01)  /* bit 7 */ +#define MBEDTLS_X509_KU_DECIPHER_ONLY              (0x8000)  /* bit 8 */ + +/* + * Netscape certificate types + * (http://www.mozilla.org/projects/security/pki/nss/tech-notes/tn3.html) + */ + +#define MBEDTLS_X509_NS_CERT_TYPE_SSL_CLIENT         (0x80)  /* bit 0 */ +#define MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER         (0x40)  /* bit 1 */ +#define MBEDTLS_X509_NS_CERT_TYPE_EMAIL              (0x20)  /* bit 2 */ +#define MBEDTLS_X509_NS_CERT_TYPE_OBJECT_SIGNING     (0x10)  /* bit 3 */ +#define MBEDTLS_X509_NS_CERT_TYPE_RESERVED           (0x08)  /* bit 4 */ +#define MBEDTLS_X509_NS_CERT_TYPE_SSL_CA             (0x04)  /* bit 5 */ +#define MBEDTLS_X509_NS_CERT_TYPE_EMAIL_CA           (0x02)  /* bit 6 */ +#define MBEDTLS_X509_NS_CERT_TYPE_OBJECT_SIGNING_CA  (0x01)  /* bit 7 */ + +/* + * X.509 extension types + * + * Comments refer to the status for using certificates. Status can be + * different for writing certificates or reading CRLs or CSRs. + */ +#define MBEDTLS_X509_EXT_AUTHORITY_KEY_IDENTIFIER    (1 << 0) +#define MBEDTLS_X509_EXT_SUBJECT_KEY_IDENTIFIER      (1 << 1) +#define MBEDTLS_X509_EXT_KEY_USAGE                   (1 << 2) +#define MBEDTLS_X509_EXT_CERTIFICATE_POLICIES        (1 << 3) +#define MBEDTLS_X509_EXT_POLICY_MAPPINGS             (1 << 4) +#define MBEDTLS_X509_EXT_SUBJECT_ALT_NAME            (1 << 5)    /* Supported (DNS) */ +#define MBEDTLS_X509_EXT_ISSUER_ALT_NAME             (1 << 6) +#define MBEDTLS_X509_EXT_SUBJECT_DIRECTORY_ATTRS     (1 << 7) +#define MBEDTLS_X509_EXT_BASIC_CONSTRAINTS           (1 << 8)    /* Supported */ +#define MBEDTLS_X509_EXT_NAME_CONSTRAINTS            (1 << 9) +#define MBEDTLS_X509_EXT_POLICY_CONSTRAINTS          (1 << 10) +#define MBEDTLS_X509_EXT_EXTENDED_KEY_USAGE          (1 << 11) +#define MBEDTLS_X509_EXT_CRL_DISTRIBUTION_POINTS     (1 << 12) +#define MBEDTLS_X509_EXT_INIHIBIT_ANYPOLICY          (1 << 13) +#define MBEDTLS_X509_EXT_FRESHEST_CRL                (1 << 14) + +#define MBEDTLS_X509_EXT_NS_CERT_TYPE                (1 << 16) + +/* + * Storage format identifiers + * Recognized formats: PEM and DER + */ +#define MBEDTLS_X509_FORMAT_DER                 1 +#define MBEDTLS_X509_FORMAT_PEM                 2 + +#define MBEDTLS_X509_MAX_DN_NAME_SIZE         256 /**< Maximum value size of a DN entry */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \addtogroup x509_module + * \{ */ + +/** + * \name Structures for parsing X.509 certificates, CRLs and CSRs + * \{ + */ + +/** + * Type-length-value structure that allows for ASN1 using DER. + */ +typedef mbedtls_asn1_buf mbedtls_x509_buf; + +/** + * Container for ASN1 bit strings. + */ +typedef mbedtls_asn1_bitstring mbedtls_x509_bitstring; + +/** + * Container for ASN1 named information objects. + * It allows for Relative Distinguished Names (e.g. cn=localhost,ou=code,etc.). + */ +typedef mbedtls_asn1_named_data mbedtls_x509_name; + +/** + * Container for a sequence of ASN.1 items + */ +typedef mbedtls_asn1_sequence mbedtls_x509_sequence; + +/** Container for date and time (precision in seconds). */ +typedef struct mbedtls_x509_time +{ +    int year, mon, day;         /**< Date. */ +    int hour, min, sec;         /**< Time. */ +} +mbedtls_x509_time; + +/** \} name Structures for parsing X.509 certificates, CRLs and CSRs */ +/** \} addtogroup x509_module */ + +/** + * \brief          Store the certificate DN in printable form into buf; + *                 no more than size characters will be written. + * + * \param buf      Buffer to write to + * \param size     Maximum size of buffer + * \param dn       The X509 name to represent + * + * \return         The length of the string written (not including the + *                 terminated nul byte), or a negative error code. + */ +int mbedtls_x509_dn_gets( char *buf, size_t size, const mbedtls_x509_name *dn ); + +/** + * \brief          Store the certificate serial in printable form into buf; + *                 no more than size characters will be written. + * + * \param buf      Buffer to write to + * \param size     Maximum size of buffer + * \param serial   The X509 serial to represent + * + * \return         The length of the string written (not including the + *                 terminated nul byte), or a negative error code. + */ +int mbedtls_x509_serial_gets( char *buf, size_t size, const mbedtls_x509_buf *serial ); + +/** + * \brief          Check a given mbedtls_x509_time against the system time + *                 and tell if it's in the past. + * + * \note           Intended usage is "if( is_past( valid_to ) ) ERROR". + *                 Hence the return value of 1 if on internal errors. + * + * \param to       mbedtls_x509_time to check + * + * \return         1 if the given time is in the past or an error occured, + *                 0 otherwise. + */ +int mbedtls_x509_time_is_past( const mbedtls_x509_time *to ); + +/** + * \brief          Check a given mbedtls_x509_time against the system time + *                 and tell if it's in the future. + * + * \note           Intended usage is "if( is_future( valid_from ) ) ERROR". + *                 Hence the return value of 1 if on internal errors. + * + * \param from     mbedtls_x509_time to check + * + * \return         1 if the given time is in the future or an error occured, + *                 0 otherwise. + */ +int mbedtls_x509_time_is_future( const mbedtls_x509_time *from ); + +/** + * \brief          Checkup routine + * + * \return         0 if successful, or 1 if the test failed + */ +int mbedtls_x509_self_test( int verbose ); + +/* + * Internal module functions. You probably do not want to use these unless you + * know you do. + */ +int mbedtls_x509_get_name( unsigned char **p, const unsigned char *end, +                   mbedtls_x509_name *cur ); +int mbedtls_x509_get_alg_null( unsigned char **p, const unsigned char *end, +                       mbedtls_x509_buf *alg ); +int mbedtls_x509_get_alg( unsigned char **p, const unsigned char *end, +                  mbedtls_x509_buf *alg, mbedtls_x509_buf *params ); +#if defined(MBEDTLS_X509_RSASSA_PSS_SUPPORT) +int mbedtls_x509_get_rsassa_pss_params( const mbedtls_x509_buf *params, +                                mbedtls_md_type_t *md_alg, mbedtls_md_type_t *mgf_md, +                                int *salt_len ); +#endif +int mbedtls_x509_get_sig( unsigned char **p, const unsigned char *end, mbedtls_x509_buf *sig ); +int mbedtls_x509_get_sig_alg( const mbedtls_x509_buf *sig_oid, const mbedtls_x509_buf *sig_params, +                      mbedtls_md_type_t *md_alg, mbedtls_pk_type_t *pk_alg, +                      void **sig_opts ); +int mbedtls_x509_get_time( unsigned char **p, const unsigned char *end, +                   mbedtls_x509_time *t ); +int mbedtls_x509_get_serial( unsigned char **p, const unsigned char *end, +                     mbedtls_x509_buf *serial ); +int mbedtls_x509_get_ext( unsigned char **p, const unsigned char *end, +                  mbedtls_x509_buf *ext, int tag ); +int mbedtls_x509_sig_alg_gets( char *buf, size_t size, const mbedtls_x509_buf *sig_oid, +                       mbedtls_pk_type_t pk_alg, mbedtls_md_type_t md_alg, +                       const void *sig_opts ); +int mbedtls_x509_key_size_helper( char *buf, size_t buf_size, const char *name ); +int mbedtls_x509_string_to_names( mbedtls_asn1_named_data **head, const char *name ); +int mbedtls_x509_set_extension( mbedtls_asn1_named_data **head, const char *oid, size_t oid_len, +                        int critical, const unsigned char *val, +                        size_t val_len ); +int mbedtls_x509_write_extensions( unsigned char **p, unsigned char *start, +                           mbedtls_asn1_named_data *first ); +int mbedtls_x509_write_names( unsigned char **p, unsigned char *start, +                      mbedtls_asn1_named_data *first ); +int mbedtls_x509_write_sig( unsigned char **p, unsigned char *start, +                    const char *oid, size_t oid_len, +                    unsigned char *sig, size_t size ); + +#define MBEDTLS_X509_SAFE_SNPRINTF                          \ +    do {                                                    \ +        if( ret < 0 || (size_t) ret >= n )                  \ +            return( MBEDTLS_ERR_X509_BUFFER_TOO_SMALL );    \ +                                                            \ +        n -= (size_t) ret;                                  \ +        p += (size_t) ret;                                  \ +    } while( 0 ) + +#ifdef __cplusplus +} +#endif + +#endif /* x509.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/x509_crl.h b/thirdparty/mbedtls/include/mbedtls/x509_crl.h new file mode 100644 index 0000000000..08a4283a67 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/x509_crl.h @@ -0,0 +1,174 @@ +/** + * \file x509_crl.h + * + * \brief X.509 certificate revocation list parsing + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_X509_CRL_H +#define MBEDTLS_X509_CRL_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include "x509.h" + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \addtogroup x509_module + * \{ */ + +/** + * \name Structures and functions for parsing CRLs + * \{ + */ + +/** + * Certificate revocation list entry. + * Contains the CA-specific serial numbers and revocation dates. + */ +typedef struct mbedtls_x509_crl_entry +{ +    mbedtls_x509_buf raw; + +    mbedtls_x509_buf serial; + +    mbedtls_x509_time revocation_date; + +    mbedtls_x509_buf entry_ext; + +    struct mbedtls_x509_crl_entry *next; +} +mbedtls_x509_crl_entry; + +/** + * Certificate revocation list structure. + * Every CRL may have multiple entries. + */ +typedef struct mbedtls_x509_crl +{ +    mbedtls_x509_buf raw;           /**< The raw certificate data (DER). */ +    mbedtls_x509_buf tbs;           /**< The raw certificate body (DER). The part that is To Be Signed. */ + +    int version;            /**< CRL version (1=v1, 2=v2) */ +    mbedtls_x509_buf sig_oid;       /**< CRL signature type identifier */ + +    mbedtls_x509_buf issuer_raw;    /**< The raw issuer data (DER). */ + +    mbedtls_x509_name issuer;       /**< The parsed issuer data (named information object). */ + +    mbedtls_x509_time this_update; +    mbedtls_x509_time next_update; + +    mbedtls_x509_crl_entry entry;   /**< The CRL entries containing the certificate revocation times for this CA. */ + +    mbedtls_x509_buf crl_ext; + +    mbedtls_x509_buf sig_oid2; +    mbedtls_x509_buf sig; +    mbedtls_md_type_t sig_md;           /**< Internal representation of the MD algorithm of the signature algorithm, e.g. MBEDTLS_MD_SHA256 */ +    mbedtls_pk_type_t sig_pk;           /**< Internal representation of the Public Key algorithm of the signature algorithm, e.g. MBEDTLS_PK_RSA */ +    void *sig_opts;             /**< Signature options to be passed to mbedtls_pk_verify_ext(), e.g. for RSASSA-PSS */ + +    struct mbedtls_x509_crl *next; +} +mbedtls_x509_crl; + +/** + * \brief          Parse a DER-encoded CRL and append it to the chained list + * + * \param chain    points to the start of the chain + * \param buf      buffer holding the CRL data in DER format + * \param buflen   size of the buffer + *                 (including the terminating null byte for PEM data) + * + * \return         0 if successful, or a specific X509 or PEM error code + */ +int mbedtls_x509_crl_parse_der( mbedtls_x509_crl *chain, +                        const unsigned char *buf, size_t buflen ); +/** + * \brief          Parse one or more CRLs and append them to the chained list + * + * \note           Mutliple CRLs are accepted only if using PEM format + * + * \param chain    points to the start of the chain + * \param buf      buffer holding the CRL data in PEM or DER format + * \param buflen   size of the buffer + *                 (including the terminating null byte for PEM data) + * + * \return         0 if successful, or a specific X509 or PEM error code + */ +int mbedtls_x509_crl_parse( mbedtls_x509_crl *chain, const unsigned char *buf, size_t buflen ); + +#if defined(MBEDTLS_FS_IO) +/** + * \brief          Load one or more CRLs and append them to the chained list + * + * \note           Mutliple CRLs are accepted only if using PEM format + * + * \param chain    points to the start of the chain + * \param path     filename to read the CRLs from (in PEM or DER encoding) + * + * \return         0 if successful, or a specific X509 or PEM error code + */ +int mbedtls_x509_crl_parse_file( mbedtls_x509_crl *chain, const char *path ); +#endif /* MBEDTLS_FS_IO */ + +/** + * \brief          Returns an informational string about the CRL. + * + * \param buf      Buffer to write to + * \param size     Maximum size of buffer + * \param prefix   A line prefix + * \param crl      The X509 CRL to represent + * + * \return         The length of the string written (not including the + *                 terminated nul byte), or a negative error code. + */ +int mbedtls_x509_crl_info( char *buf, size_t size, const char *prefix, +                   const mbedtls_x509_crl *crl ); + +/** + * \brief          Initialize a CRL (chain) + * + * \param crl      CRL chain to initialize + */ +void mbedtls_x509_crl_init( mbedtls_x509_crl *crl ); + +/** + * \brief          Unallocate all CRL data + * + * \param crl      CRL chain to free + */ +void mbedtls_x509_crl_free( mbedtls_x509_crl *crl ); + +/* \} name */ +/* \} addtogroup x509_module */ + +#ifdef __cplusplus +} +#endif + +#endif /* mbedtls_x509_crl.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/x509_crt.h b/thirdparty/mbedtls/include/mbedtls/x509_crt.h new file mode 100644 index 0000000000..2dbb7ec964 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/x509_crt.h @@ -0,0 +1,663 @@ +/** + * \file x509_crt.h + * + * \brief X.509 certificate parsing and writing + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_X509_CRT_H +#define MBEDTLS_X509_CRT_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include "x509.h" +#include "x509_crl.h" + +/** + * \addtogroup x509_module + * \{ + */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \name Structures and functions for parsing and writing X.509 certificates + * \{ + */ + +/** + * Container for an X.509 certificate. The certificate may be chained. + */ +typedef struct mbedtls_x509_crt +{ +    mbedtls_x509_buf raw;               /**< The raw certificate data (DER). */ +    mbedtls_x509_buf tbs;               /**< The raw certificate body (DER). The part that is To Be Signed. */ + +    int version;                /**< The X.509 version. (1=v1, 2=v2, 3=v3) */ +    mbedtls_x509_buf serial;            /**< Unique id for certificate issued by a specific CA. */ +    mbedtls_x509_buf sig_oid;           /**< Signature algorithm, e.g. sha1RSA */ + +    mbedtls_x509_buf issuer_raw;        /**< The raw issuer data (DER). Used for quick comparison. */ +    mbedtls_x509_buf subject_raw;       /**< The raw subject data (DER). Used for quick comparison. */ + +    mbedtls_x509_name issuer;           /**< The parsed issuer data (named information object). */ +    mbedtls_x509_name subject;          /**< The parsed subject data (named information object). */ + +    mbedtls_x509_time valid_from;       /**< Start time of certificate validity. */ +    mbedtls_x509_time valid_to;         /**< End time of certificate validity. */ + +    mbedtls_pk_context pk;              /**< Container for the public key context. */ + +    mbedtls_x509_buf issuer_id;         /**< Optional X.509 v2/v3 issuer unique identifier. */ +    mbedtls_x509_buf subject_id;        /**< Optional X.509 v2/v3 subject unique identifier. */ +    mbedtls_x509_buf v3_ext;            /**< Optional X.509 v3 extensions.  */ +    mbedtls_x509_sequence subject_alt_names;    /**< Optional list of Subject Alternative Names (Only dNSName supported). */ + +    int ext_types;              /**< Bit string containing detected and parsed extensions */ +    int ca_istrue;              /**< Optional Basic Constraint extension value: 1 if this certificate belongs to a CA, 0 otherwise. */ +    int max_pathlen;            /**< Optional Basic Constraint extension value: The maximum path length to the root certificate. Path length is 1 higher than RFC 5280 'meaning', so 1+ */ + +    unsigned int key_usage;     /**< Optional key usage extension value: See the values in x509.h */ + +    mbedtls_x509_sequence ext_key_usage; /**< Optional list of extended key usage OIDs. */ + +    unsigned char ns_cert_type; /**< Optional Netscape certificate type extension value: See the values in x509.h */ + +    mbedtls_x509_buf sig;               /**< Signature: hash of the tbs part signed with the private key. */ +    mbedtls_md_type_t sig_md;           /**< Internal representation of the MD algorithm of the signature algorithm, e.g. MBEDTLS_MD_SHA256 */ +    mbedtls_pk_type_t sig_pk;           /**< Internal representation of the Public Key algorithm of the signature algorithm, e.g. MBEDTLS_PK_RSA */ +    void *sig_opts;             /**< Signature options to be passed to mbedtls_pk_verify_ext(), e.g. for RSASSA-PSS */ + +    struct mbedtls_x509_crt *next;     /**< Next certificate in the CA-chain. */ +} +mbedtls_x509_crt; + +/** + * Build flag from an algorithm/curve identifier (pk, md, ecp) + * Since 0 is always XXX_NONE, ignore it. + */ +#define MBEDTLS_X509_ID_FLAG( id )   ( 1 << ( id - 1 ) ) + +/** + * Security profile for certificate verification. + * + * All lists are bitfields, built by ORing flags from MBEDTLS_X509_ID_FLAG(). + */ +typedef struct +{ +    uint32_t allowed_mds;       /**< MDs for signatures         */ +    uint32_t allowed_pks;       /**< PK algs for signatures     */ +    uint32_t allowed_curves;    /**< Elliptic curves for ECDSA  */ +    uint32_t rsa_min_bitlen;    /**< Minimum size for RSA keys  */ +} +mbedtls_x509_crt_profile; + +#define MBEDTLS_X509_CRT_VERSION_1              0 +#define MBEDTLS_X509_CRT_VERSION_2              1 +#define MBEDTLS_X509_CRT_VERSION_3              2 + +#define MBEDTLS_X509_RFC5280_MAX_SERIAL_LEN 32 +#define MBEDTLS_X509_RFC5280_UTC_TIME_LEN   15 + +#if !defined( MBEDTLS_X509_MAX_FILE_PATH_LEN ) +#define MBEDTLS_X509_MAX_FILE_PATH_LEN 512 +#endif + +/** + * Container for writing a certificate (CRT) + */ +typedef struct mbedtls_x509write_cert +{ +    int version; +    mbedtls_mpi serial; +    mbedtls_pk_context *subject_key; +    mbedtls_pk_context *issuer_key; +    mbedtls_asn1_named_data *subject; +    mbedtls_asn1_named_data *issuer; +    mbedtls_md_type_t md_alg; +    char not_before[MBEDTLS_X509_RFC5280_UTC_TIME_LEN + 1]; +    char not_after[MBEDTLS_X509_RFC5280_UTC_TIME_LEN + 1]; +    mbedtls_asn1_named_data *extensions; +} +mbedtls_x509write_cert; + +#if defined(MBEDTLS_X509_CRT_PARSE_C) +/** + * Default security profile. Should provide a good balance between security + * and compatibility with current deployments. + */ +extern const mbedtls_x509_crt_profile mbedtls_x509_crt_profile_default; + +/** + * Expected next default profile. Recommended for new deployments. + * Currently targets a 128-bit security level, except for RSA-2048. + */ +extern const mbedtls_x509_crt_profile mbedtls_x509_crt_profile_next; + +/** + * NSA Suite B profile. + */ +extern const mbedtls_x509_crt_profile mbedtls_x509_crt_profile_suiteb; + +/** + * \brief          Parse a single DER formatted certificate and add it + *                 to the chained list. + * + * \param chain    points to the start of the chain + * \param buf      buffer holding the certificate DER data + * \param buflen   size of the buffer + * + * \return         0 if successful, or a specific X509 or PEM error code + */ +int mbedtls_x509_crt_parse_der( mbedtls_x509_crt *chain, const unsigned char *buf, +                        size_t buflen ); + +/** + * \brief          Parse one or more certificates and add them + *                 to the chained list. Parses permissively. If some + *                 certificates can be parsed, the result is the number + *                 of failed certificates it encountered. If none complete + *                 correctly, the first error is returned. + * + * \param chain    points to the start of the chain + * \param buf      buffer holding the certificate data in PEM or DER format + * \param buflen   size of the buffer + *                 (including the terminating null byte for PEM data) + * + * \return         0 if all certificates parsed successfully, a positive number + *                 if partly successful or a specific X509 or PEM error code + */ +int mbedtls_x509_crt_parse( mbedtls_x509_crt *chain, const unsigned char *buf, size_t buflen ); + +#if defined(MBEDTLS_FS_IO) +/** + * \brief          Load one or more certificates and add them + *                 to the chained list. Parses permissively. If some + *                 certificates can be parsed, the result is the number + *                 of failed certificates it encountered. If none complete + *                 correctly, the first error is returned. + * + * \param chain    points to the start of the chain + * \param path     filename to read the certificates from + * + * \return         0 if all certificates parsed successfully, a positive number + *                 if partly successful or a specific X509 or PEM error code + */ +int mbedtls_x509_crt_parse_file( mbedtls_x509_crt *chain, const char *path ); + +/** + * \brief          Load one or more certificate files from a path and add them + *                 to the chained list. Parses permissively. If some + *                 certificates can be parsed, the result is the number + *                 of failed certificates it encountered. If none complete + *                 correctly, the first error is returned. + * + * \param chain    points to the start of the chain + * \param path     directory / folder to read the certificate files from + * + * \return         0 if all certificates parsed successfully, a positive number + *                 if partly successful or a specific X509 or PEM error code + */ +int mbedtls_x509_crt_parse_path( mbedtls_x509_crt *chain, const char *path ); +#endif /* MBEDTLS_FS_IO */ + +/** + * \brief          Returns an informational string about the + *                 certificate. + * + * \param buf      Buffer to write to + * \param size     Maximum size of buffer + * \param prefix   A line prefix + * \param crt      The X509 certificate to represent + * + * \return         The length of the string written (not including the + *                 terminated nul byte), or a negative error code. + */ +int mbedtls_x509_crt_info( char *buf, size_t size, const char *prefix, +                   const mbedtls_x509_crt *crt ); + +/** + * \brief          Returns an informational string about the + *                 verification status of a certificate. + * + * \param buf      Buffer to write to + * \param size     Maximum size of buffer + * \param prefix   A line prefix + * \param flags    Verification flags created by mbedtls_x509_crt_verify() + * + * \return         The length of the string written (not including the + *                 terminated nul byte), or a negative error code. + */ +int mbedtls_x509_crt_verify_info( char *buf, size_t size, const char *prefix, +                          uint32_t flags ); + +/** + * \brief          Verify the certificate signature + * + *                 The verify callback is a user-supplied callback that + *                 can clear / modify / add flags for a certificate. If set, + *                 the verification callback is called for each + *                 certificate in the chain (from the trust-ca down to the + *                 presented crt). The parameters for the callback are: + *                 (void *parameter, mbedtls_x509_crt *crt, int certificate_depth, + *                 int *flags). With the flags representing current flags for + *                 that specific certificate and the certificate depth from + *                 the bottom (Peer cert depth = 0). + * + *                 All flags left after returning from the callback + *                 are also returned to the application. The function should + *                 return 0 for anything (including invalid certificates) + *                 other than fatal error, as a non-zero return code + *                 immediately aborts the verification process. For fatal + *                 errors, a specific error code should be used (different + *                 from MBEDTLS_ERR_X509_CERT_VERIFY_FAILED which should not + *                 be returned at this point), or MBEDTLS_ERR_X509_FATAL_ERROR + *                 can be used if no better code is available. + * + * \note           In case verification failed, the results can be displayed + *                 using \c mbedtls_x509_crt_verify_info() + * + * \note           Same as \c mbedtls_x509_crt_verify_with_profile() with the + *                 default security profile. + * + * \note           It is your responsibility to provide up-to-date CRLs for + *                 all trusted CAs. If no CRL is provided for the CA that was + *                 used to sign the certificate, CRL verification is skipped + *                 silently, that is *without* setting any flag. + * + * \param crt      a certificate (chain) to be verified + * \param trust_ca the list of trusted CAs + * \param ca_crl   the list of CRLs for trusted CAs (see note above) + * \param cn       expected Common Name (can be set to + *                 NULL if the CN must not be verified) + * \param flags    result of the verification + * \param f_vrfy   verification function + * \param p_vrfy   verification parameter + * + * \return         0 (and flags set to 0) if the chain was verified and valid, + *                 MBEDTLS_ERR_X509_CERT_VERIFY_FAILED if the chain was verified + *                 but found to be invalid, in which case *flags will have one + *                 or more MBEDTLS_X509_BADCERT_XXX or MBEDTLS_X509_BADCRL_XXX + *                 flags set, or another error (and flags set to 0xffffffff) + *                 in case of a fatal error encountered during the + *                 verification process. + */ +int mbedtls_x509_crt_verify( mbedtls_x509_crt *crt, +                     mbedtls_x509_crt *trust_ca, +                     mbedtls_x509_crl *ca_crl, +                     const char *cn, uint32_t *flags, +                     int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), +                     void *p_vrfy ); + +/** + * \brief          Verify the certificate signature according to profile + * + * \note           Same as \c mbedtls_x509_crt_verify(), but with explicit + *                 security profile. + * + * \note           The restrictions on keys (RSA minimum size, allowed curves + *                 for ECDSA) apply to all certificates: trusted root, + *                 intermediate CAs if any, and end entity certificate. + * + * \param crt      a certificate (chain) to be verified + * \param trust_ca the list of trusted CAs + * \param ca_crl   the list of CRLs for trusted CAs + * \param profile  security profile for verification + * \param cn       expected Common Name (can be set to + *                 NULL if the CN must not be verified) + * \param flags    result of the verification + * \param f_vrfy   verification function + * \param p_vrfy   verification parameter + * + * \return         0 if successful or MBEDTLS_ERR_X509_CERT_VERIFY_FAILED + *                 in which case *flags will have one or more + *                 MBEDTLS_X509_BADCERT_XXX or MBEDTLS_X509_BADCRL_XXX flags + *                 set, + *                 or another error in case of a fatal error encountered + *                 during the verification process. + */ +int mbedtls_x509_crt_verify_with_profile( mbedtls_x509_crt *crt, +                     mbedtls_x509_crt *trust_ca, +                     mbedtls_x509_crl *ca_crl, +                     const mbedtls_x509_crt_profile *profile, +                     const char *cn, uint32_t *flags, +                     int (*f_vrfy)(void *, mbedtls_x509_crt *, int, uint32_t *), +                     void *p_vrfy ); + +#if defined(MBEDTLS_X509_CHECK_KEY_USAGE) +/** + * \brief          Check usage of certificate against keyUsage extension. + * + * \param crt      Leaf certificate used. + * \param usage    Intended usage(s) (eg MBEDTLS_X509_KU_KEY_ENCIPHERMENT + *                 before using the certificate to perform an RSA key + *                 exchange). + * + * \note           Except for decipherOnly and encipherOnly, a bit set in the + *                 usage argument means this bit MUST be set in the + *                 certificate. For decipherOnly and encipherOnly, it means + *                 that bit MAY be set. + * + * \return         0 is these uses of the certificate are allowed, + *                 MBEDTLS_ERR_X509_BAD_INPUT_DATA if the keyUsage extension + *                 is present but does not match the usage argument. + * + * \note           You should only call this function on leaf certificates, on + *                 (intermediate) CAs the keyUsage extension is automatically + *                 checked by \c mbedtls_x509_crt_verify(). + */ +int mbedtls_x509_crt_check_key_usage( const mbedtls_x509_crt *crt, +                                      unsigned int usage ); +#endif /* MBEDTLS_X509_CHECK_KEY_USAGE) */ + +#if defined(MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE) +/** + * \brief           Check usage of certificate against extendedKeyUsage. + * + * \param crt       Leaf certificate used. + * \param usage_oid Intended usage (eg MBEDTLS_OID_SERVER_AUTH or + *                  MBEDTLS_OID_CLIENT_AUTH). + * \param usage_len Length of usage_oid (eg given by MBEDTLS_OID_SIZE()). + * + * \return          0 if this use of the certificate is allowed, + *                  MBEDTLS_ERR_X509_BAD_INPUT_DATA if not. + * + * \note            Usually only makes sense on leaf certificates. + */ +int mbedtls_x509_crt_check_extended_key_usage( const mbedtls_x509_crt *crt, +                                               const char *usage_oid, +                                               size_t usage_len ); +#endif /* MBEDTLS_X509_CHECK_EXTENDED_KEY_USAGE */ + +#if defined(MBEDTLS_X509_CRL_PARSE_C) +/** + * \brief          Verify the certificate revocation status + * + * \param crt      a certificate to be verified + * \param crl      the CRL to verify against + * + * \return         1 if the certificate is revoked, 0 otherwise + * + */ +int mbedtls_x509_crt_is_revoked( const mbedtls_x509_crt *crt, const mbedtls_x509_crl *crl ); +#endif /* MBEDTLS_X509_CRL_PARSE_C */ + +/** + * \brief          Initialize a certificate (chain) + * + * \param crt      Certificate chain to initialize + */ +void mbedtls_x509_crt_init( mbedtls_x509_crt *crt ); + +/** + * \brief          Unallocate all certificate data + * + * \param crt      Certificate chain to free + */ +void mbedtls_x509_crt_free( mbedtls_x509_crt *crt ); +#endif /* MBEDTLS_X509_CRT_PARSE_C */ + +/* \} name */ +/* \} addtogroup x509_module */ + +#if defined(MBEDTLS_X509_CRT_WRITE_C) +/** + * \brief           Initialize a CRT writing context + * + * \param ctx       CRT context to initialize + */ +void mbedtls_x509write_crt_init( mbedtls_x509write_cert *ctx ); + +/** + * \brief           Set the verion for a Certificate + *                  Default: MBEDTLS_X509_CRT_VERSION_3 + * + * \param ctx       CRT context to use + * \param version   version to set (MBEDTLS_X509_CRT_VERSION_1, MBEDTLS_X509_CRT_VERSION_2 or + *                                  MBEDTLS_X509_CRT_VERSION_3) + */ +void mbedtls_x509write_crt_set_version( mbedtls_x509write_cert *ctx, int version ); + +/** + * \brief           Set the serial number for a Certificate. + * + * \param ctx       CRT context to use + * \param serial    serial number to set + * + * \return          0 if successful + */ +int mbedtls_x509write_crt_set_serial( mbedtls_x509write_cert *ctx, const mbedtls_mpi *serial ); + +/** + * \brief           Set the validity period for a Certificate + *                  Timestamps should be in string format for UTC timezone + *                  i.e. "YYYYMMDDhhmmss" + *                  e.g. "20131231235959" for December 31st 2013 + *                       at 23:59:59 + * + * \param ctx       CRT context to use + * \param not_before    not_before timestamp + * \param not_after     not_after timestamp + * + * \return          0 if timestamp was parsed successfully, or + *                  a specific error code + */ +int mbedtls_x509write_crt_set_validity( mbedtls_x509write_cert *ctx, const char *not_before, +                                const char *not_after ); + +/** + * \brief           Set the issuer name for a Certificate + *                  Issuer names should contain a comma-separated list + *                  of OID types and values: + *                  e.g. "C=UK,O=ARM,CN=mbed TLS CA" + * + * \param ctx           CRT context to use + * \param issuer_name   issuer name to set + * + * \return          0 if issuer name was parsed successfully, or + *                  a specific error code + */ +int mbedtls_x509write_crt_set_issuer_name( mbedtls_x509write_cert *ctx, +                                   const char *issuer_name ); + +/** + * \brief           Set the subject name for a Certificate + *                  Subject names should contain a comma-separated list + *                  of OID types and values: + *                  e.g. "C=UK,O=ARM,CN=mbed TLS Server 1" + * + * \param ctx           CRT context to use + * \param subject_name  subject name to set + * + * \return          0 if subject name was parsed successfully, or + *                  a specific error code + */ +int mbedtls_x509write_crt_set_subject_name( mbedtls_x509write_cert *ctx, +                                    const char *subject_name ); + +/** + * \brief           Set the subject public key for the certificate + * + * \param ctx       CRT context to use + * \param key       public key to include + */ +void mbedtls_x509write_crt_set_subject_key( mbedtls_x509write_cert *ctx, mbedtls_pk_context *key ); + +/** + * \brief           Set the issuer key used for signing the certificate + * + * \param ctx       CRT context to use + * \param key       private key to sign with + */ +void mbedtls_x509write_crt_set_issuer_key( mbedtls_x509write_cert *ctx, mbedtls_pk_context *key ); + +/** + * \brief           Set the MD algorithm to use for the signature + *                  (e.g. MBEDTLS_MD_SHA1) + * + * \param ctx       CRT context to use + * \param md_alg    MD algorithm to use + */ +void mbedtls_x509write_crt_set_md_alg( mbedtls_x509write_cert *ctx, mbedtls_md_type_t md_alg ); + +/** + * \brief           Generic function to add to or replace an extension in the + *                  CRT + * + * \param ctx       CRT context to use + * \param oid       OID of the extension + * \param oid_len   length of the OID + * \param critical  if the extension is critical (per the RFC's definition) + * \param val       value of the extension OCTET STRING + * \param val_len   length of the value data + * + * \return          0 if successful, or a MBEDTLS_ERR_X509_ALLOC_FAILED + */ +int mbedtls_x509write_crt_set_extension( mbedtls_x509write_cert *ctx, +                                 const char *oid, size_t oid_len, +                                 int critical, +                                 const unsigned char *val, size_t val_len ); + +/** + * \brief           Set the basicConstraints extension for a CRT + * + * \param ctx       CRT context to use + * \param is_ca     is this a CA certificate + * \param max_pathlen   maximum length of certificate chains below this + *                      certificate (only for CA certificates, -1 is + *                      inlimited) + * + * \return          0 if successful, or a MBEDTLS_ERR_X509_ALLOC_FAILED + */ +int mbedtls_x509write_crt_set_basic_constraints( mbedtls_x509write_cert *ctx, +                                         int is_ca, int max_pathlen ); + +#if defined(MBEDTLS_SHA1_C) +/** + * \brief           Set the subjectKeyIdentifier extension for a CRT + *                  Requires that mbedtls_x509write_crt_set_subject_key() has been + *                  called before + * + * \param ctx       CRT context to use + * + * \return          0 if successful, or a MBEDTLS_ERR_X509_ALLOC_FAILED + */ +int mbedtls_x509write_crt_set_subject_key_identifier( mbedtls_x509write_cert *ctx ); + +/** + * \brief           Set the authorityKeyIdentifier extension for a CRT + *                  Requires that mbedtls_x509write_crt_set_issuer_key() has been + *                  called before + * + * \param ctx       CRT context to use + * + * \return          0 if successful, or a MBEDTLS_ERR_X509_ALLOC_FAILED + */ +int mbedtls_x509write_crt_set_authority_key_identifier( mbedtls_x509write_cert *ctx ); +#endif /* MBEDTLS_SHA1_C */ + +/** + * \brief           Set the Key Usage Extension flags + *                  (e.g. MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_KEY_CERT_SIGN) + * + * \param ctx       CRT context to use + * \param key_usage key usage flags to set + * + * \return          0 if successful, or MBEDTLS_ERR_X509_ALLOC_FAILED + */ +int mbedtls_x509write_crt_set_key_usage( mbedtls_x509write_cert *ctx, +                                         unsigned int key_usage ); + +/** + * \brief           Set the Netscape Cert Type flags + *                  (e.g. MBEDTLS_X509_NS_CERT_TYPE_SSL_CLIENT | MBEDTLS_X509_NS_CERT_TYPE_EMAIL) + * + * \param ctx           CRT context to use + * \param ns_cert_type  Netscape Cert Type flags to set + * + * \return          0 if successful, or MBEDTLS_ERR_X509_ALLOC_FAILED + */ +int mbedtls_x509write_crt_set_ns_cert_type( mbedtls_x509write_cert *ctx, +                                    unsigned char ns_cert_type ); + +/** + * \brief           Free the contents of a CRT write context + * + * \param ctx       CRT context to free + */ +void mbedtls_x509write_crt_free( mbedtls_x509write_cert *ctx ); + +/** + * \brief           Write a built up certificate to a X509 DER structure + *                  Note: data is written at the end of the buffer! Use the + *                        return value to determine where you should start + *                        using the buffer + * + * \param ctx       certificate to write away + * \param buf       buffer to write to + * \param size      size of the buffer + * \param f_rng     RNG function (for signature, see note) + * \param p_rng     RNG parameter + * + * \return          length of data written if successful, or a specific + *                  error code + * + * \note            f_rng may be NULL if RSA is used for signature and the + *                  signature is made offline (otherwise f_rng is desirable + *                  for countermeasures against timing attacks). + *                  ECDSA signatures always require a non-NULL f_rng. + */ +int mbedtls_x509write_crt_der( mbedtls_x509write_cert *ctx, unsigned char *buf, size_t size, +                       int (*f_rng)(void *, unsigned char *, size_t), +                       void *p_rng ); + +#if defined(MBEDTLS_PEM_WRITE_C) +/** + * \brief           Write a built up certificate to a X509 PEM string + * + * \param ctx       certificate to write away + * \param buf       buffer to write to + * \param size      size of the buffer + * \param f_rng     RNG function (for signature, see note) + * \param p_rng     RNG parameter + * + * \return          0 if successful, or a specific error code + * + * \note            f_rng may be NULL if RSA is used for signature and the + *                  signature is made offline (otherwise f_rng is desirable + *                  for countermeasures against timing attacks). + *                  ECDSA signatures always require a non-NULL f_rng. + */ +int mbedtls_x509write_crt_pem( mbedtls_x509write_cert *ctx, unsigned char *buf, size_t size, +                       int (*f_rng)(void *, unsigned char *, size_t), +                       void *p_rng ); +#endif /* MBEDTLS_PEM_WRITE_C */ +#endif /* MBEDTLS_X509_CRT_WRITE_C */ + +#ifdef __cplusplus +} +#endif + +#endif /* mbedtls_x509_crt.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/x509_csr.h b/thirdparty/mbedtls/include/mbedtls/x509_csr.h new file mode 100644 index 0000000000..0c6ccad78d --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/x509_csr.h @@ -0,0 +1,299 @@ +/** + * \file x509_csr.h + * + * \brief X.509 certificate signing request parsing and writing + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_X509_CSR_H +#define MBEDTLS_X509_CSR_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include "x509.h" + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \addtogroup x509_module + * \{ */ + +/** + * \name Structures and functions for X.509 Certificate Signing Requests (CSR) + * \{ + */ + +/** + * Certificate Signing Request (CSR) structure. + */ +typedef struct mbedtls_x509_csr +{ +    mbedtls_x509_buf raw;           /**< The raw CSR data (DER). */ +    mbedtls_x509_buf cri;           /**< The raw CertificateRequestInfo body (DER). */ + +    int version;            /**< CSR version (1=v1). */ + +    mbedtls_x509_buf  subject_raw;  /**< The raw subject data (DER). */ +    mbedtls_x509_name subject;      /**< The parsed subject data (named information object). */ + +    mbedtls_pk_context pk;          /**< Container for the public key context. */ + +    mbedtls_x509_buf sig_oid; +    mbedtls_x509_buf sig; +    mbedtls_md_type_t sig_md;       /**< Internal representation of the MD algorithm of the signature algorithm, e.g. MBEDTLS_MD_SHA256 */ +    mbedtls_pk_type_t sig_pk;       /**< Internal representation of the Public Key algorithm of the signature algorithm, e.g. MBEDTLS_PK_RSA */ +    void *sig_opts;         /**< Signature options to be passed to mbedtls_pk_verify_ext(), e.g. for RSASSA-PSS */ +} +mbedtls_x509_csr; + +/** + * Container for writing a CSR + */ +typedef struct mbedtls_x509write_csr +{ +    mbedtls_pk_context *key; +    mbedtls_asn1_named_data *subject; +    mbedtls_md_type_t md_alg; +    mbedtls_asn1_named_data *extensions; +} +mbedtls_x509write_csr; + +#if defined(MBEDTLS_X509_CSR_PARSE_C) +/** + * \brief          Load a Certificate Signing Request (CSR) in DER format + * + * \note           CSR attributes (if any) are currently silently ignored. + * + * \param csr      CSR context to fill + * \param buf      buffer holding the CRL data + * \param buflen   size of the buffer + * + * \return         0 if successful, or a specific X509 error code + */ +int mbedtls_x509_csr_parse_der( mbedtls_x509_csr *csr, +                        const unsigned char *buf, size_t buflen ); + +/** + * \brief          Load a Certificate Signing Request (CSR), DER or PEM format + * + * \note           See notes for \c mbedtls_x509_csr_parse_der() + * + * \param csr      CSR context to fill + * \param buf      buffer holding the CRL data + * \param buflen   size of the buffer + *                 (including the terminating null byte for PEM data) + * + * \return         0 if successful, or a specific X509 or PEM error code + */ +int mbedtls_x509_csr_parse( mbedtls_x509_csr *csr, const unsigned char *buf, size_t buflen ); + +#if defined(MBEDTLS_FS_IO) +/** + * \brief          Load a Certificate Signing Request (CSR) + * + * \note           See notes for \c mbedtls_x509_csr_parse() + * + * \param csr      CSR context to fill + * \param path     filename to read the CSR from + * + * \return         0 if successful, or a specific X509 or PEM error code + */ +int mbedtls_x509_csr_parse_file( mbedtls_x509_csr *csr, const char *path ); +#endif /* MBEDTLS_FS_IO */ + +/** + * \brief          Returns an informational string about the + *                 CSR. + * + * \param buf      Buffer to write to + * \param size     Maximum size of buffer + * \param prefix   A line prefix + * \param csr      The X509 CSR to represent + * + * \return         The length of the string written (not including the + *                 terminated nul byte), or a negative error code. + */ +int mbedtls_x509_csr_info( char *buf, size_t size, const char *prefix, +                   const mbedtls_x509_csr *csr ); + +/** + * \brief          Initialize a CSR + * + * \param csr      CSR to initialize + */ +void mbedtls_x509_csr_init( mbedtls_x509_csr *csr ); + +/** + * \brief          Unallocate all CSR data + * + * \param csr      CSR to free + */ +void mbedtls_x509_csr_free( mbedtls_x509_csr *csr ); +#endif /* MBEDTLS_X509_CSR_PARSE_C */ + +/* \} name */ +/* \} addtogroup x509_module */ + +#if defined(MBEDTLS_X509_CSR_WRITE_C) +/** + * \brief           Initialize a CSR context + * + * \param ctx       CSR context to initialize + */ +void mbedtls_x509write_csr_init( mbedtls_x509write_csr *ctx ); + +/** + * \brief           Set the subject name for a CSR + *                  Subject names should contain a comma-separated list + *                  of OID types and values: + *                  e.g. "C=UK,O=ARM,CN=mbed TLS Server 1" + * + * \param ctx           CSR context to use + * \param subject_name  subject name to set + * + * \return          0 if subject name was parsed successfully, or + *                  a specific error code + */ +int mbedtls_x509write_csr_set_subject_name( mbedtls_x509write_csr *ctx, +                                    const char *subject_name ); + +/** + * \brief           Set the key for a CSR (public key will be included, + *                  private key used to sign the CSR when writing it) + * + * \param ctx       CSR context to use + * \param key       Asymetric key to include + */ +void mbedtls_x509write_csr_set_key( mbedtls_x509write_csr *ctx, mbedtls_pk_context *key ); + +/** + * \brief           Set the MD algorithm to use for the signature + *                  (e.g. MBEDTLS_MD_SHA1) + * + * \param ctx       CSR context to use + * \param md_alg    MD algorithm to use + */ +void mbedtls_x509write_csr_set_md_alg( mbedtls_x509write_csr *ctx, mbedtls_md_type_t md_alg ); + +/** + * \brief           Set the Key Usage Extension flags + *                  (e.g. MBEDTLS_X509_KU_DIGITAL_SIGNATURE | MBEDTLS_X509_KU_KEY_CERT_SIGN) + * + * \param ctx       CSR context to use + * \param key_usage key usage flags to set + * + * \return          0 if successful, or MBEDTLS_ERR_X509_ALLOC_FAILED + */ +int mbedtls_x509write_csr_set_key_usage( mbedtls_x509write_csr *ctx, unsigned char key_usage ); + +/** + * \brief           Set the Netscape Cert Type flags + *                  (e.g. MBEDTLS_X509_NS_CERT_TYPE_SSL_CLIENT | MBEDTLS_X509_NS_CERT_TYPE_EMAIL) + * + * \param ctx           CSR context to use + * \param ns_cert_type  Netscape Cert Type flags to set + * + * \return          0 if successful, or MBEDTLS_ERR_X509_ALLOC_FAILED + */ +int mbedtls_x509write_csr_set_ns_cert_type( mbedtls_x509write_csr *ctx, +                                    unsigned char ns_cert_type ); + +/** + * \brief           Generic function to add to or replace an extension in the + *                  CSR + * + * \param ctx       CSR context to use + * \param oid       OID of the extension + * \param oid_len   length of the OID + * \param val       value of the extension OCTET STRING + * \param val_len   length of the value data + * + * \return          0 if successful, or a MBEDTLS_ERR_X509_ALLOC_FAILED + */ +int mbedtls_x509write_csr_set_extension( mbedtls_x509write_csr *ctx, +                                 const char *oid, size_t oid_len, +                                 const unsigned char *val, size_t val_len ); + +/** + * \brief           Free the contents of a CSR context + * + * \param ctx       CSR context to free + */ +void mbedtls_x509write_csr_free( mbedtls_x509write_csr *ctx ); + +/** + * \brief           Write a CSR (Certificate Signing Request) to a + *                  DER structure + *                  Note: data is written at the end of the buffer! Use the + *                        return value to determine where you should start + *                        using the buffer + * + * \param ctx       CSR to write away + * \param buf       buffer to write to + * \param size      size of the buffer + * \param f_rng     RNG function (for signature, see note) + * \param p_rng     RNG parameter + * + * \return          length of data written if successful, or a specific + *                  error code + * + * \note            f_rng may be NULL if RSA is used for signature and the + *                  signature is made offline (otherwise f_rng is desirable + *                  for countermeasures against timing attacks). + *                  ECDSA signatures always require a non-NULL f_rng. + */ +int mbedtls_x509write_csr_der( mbedtls_x509write_csr *ctx, unsigned char *buf, size_t size, +                       int (*f_rng)(void *, unsigned char *, size_t), +                       void *p_rng ); + +#if defined(MBEDTLS_PEM_WRITE_C) +/** + * \brief           Write a CSR (Certificate Signing Request) to a + *                  PEM string + * + * \param ctx       CSR to write away + * \param buf       buffer to write to + * \param size      size of the buffer + * \param f_rng     RNG function (for signature, see note) + * \param p_rng     RNG parameter + * + * \return          0 if successful, or a specific error code + * + * \note            f_rng may be NULL if RSA is used for signature and the + *                  signature is made offline (otherwise f_rng is desirable + *                  for countermeasures against timing attacks). + *                  ECDSA signatures always require a non-NULL f_rng. + */ +int mbedtls_x509write_csr_pem( mbedtls_x509write_csr *ctx, unsigned char *buf, size_t size, +                       int (*f_rng)(void *, unsigned char *, size_t), +                       void *p_rng ); +#endif /* MBEDTLS_PEM_WRITE_C */ +#endif /* MBEDTLS_X509_CSR_WRITE_C */ + +#ifdef __cplusplus +} +#endif + +#endif /* mbedtls_x509_csr.h */ diff --git a/thirdparty/mbedtls/include/mbedtls/xtea.h b/thirdparty/mbedtls/include/mbedtls/xtea.h new file mode 100644 index 0000000000..34ccee3c22 --- /dev/null +++ b/thirdparty/mbedtls/include/mbedtls/xtea.h @@ -0,0 +1,141 @@ +/** + * \file xtea.h + * + * \brief XTEA block cipher (32-bit) + */ +/* + *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved + *  SPDX-License-Identifier: Apache-2.0 + * + *  Licensed under the Apache License, Version 2.0 (the "License"); you may + *  not use this file except in compliance with the License. + *  You may obtain a copy of the License at + * + *  http://www.apache.org/licenses/LICENSE-2.0 + * + *  Unless required by applicable law or agreed to in writing, software + *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + *  See the License for the specific language governing permissions and + *  limitations under the License. + * + *  This file is part of mbed TLS (https://tls.mbed.org) + */ +#ifndef MBEDTLS_XTEA_H +#define MBEDTLS_XTEA_H + +#if !defined(MBEDTLS_CONFIG_FILE) +#include "config.h" +#else +#include MBEDTLS_CONFIG_FILE +#endif + +#include <stddef.h> +#include <stdint.h> + +#define MBEDTLS_XTEA_ENCRYPT     1 +#define MBEDTLS_XTEA_DECRYPT     0 + +#define MBEDTLS_ERR_XTEA_INVALID_INPUT_LENGTH             -0x0028  /**< The data input has an invalid length. */ +#define MBEDTLS_ERR_XTEA_HW_ACCEL_FAILED                  -0x0029  /**< XTEA hardware accelerator failed. */ + +#if !defined(MBEDTLS_XTEA_ALT) +// Regular implementation +// + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          XTEA context structure + */ +typedef struct +{ +    uint32_t k[4];       /*!< key */ +} +mbedtls_xtea_context; + +/** + * \brief          Initialize XTEA context + * + * \param ctx      XTEA context to be initialized + */ +void mbedtls_xtea_init( mbedtls_xtea_context *ctx ); + +/** + * \brief          Clear XTEA context + * + * \param ctx      XTEA context to be cleared + */ +void mbedtls_xtea_free( mbedtls_xtea_context *ctx ); + +/** + * \brief          XTEA key schedule + * + * \param ctx      XTEA context to be initialized + * \param key      the secret key + */ +void mbedtls_xtea_setup( mbedtls_xtea_context *ctx, const unsigned char key[16] ); + +/** + * \brief          XTEA cipher function + * + * \param ctx      XTEA context + * \param mode     MBEDTLS_XTEA_ENCRYPT or MBEDTLS_XTEA_DECRYPT + * \param input    8-byte input block + * \param output   8-byte output block + * + * \return         0 if successful + */ +int mbedtls_xtea_crypt_ecb( mbedtls_xtea_context *ctx, +                    int mode, +                    const unsigned char input[8], +                    unsigned char output[8] ); + +#if defined(MBEDTLS_CIPHER_MODE_CBC) +/** + * \brief          XTEA CBC cipher function + * + * \param ctx      XTEA context + * \param mode     MBEDTLS_XTEA_ENCRYPT or MBEDTLS_XTEA_DECRYPT + * \param length   the length of input, multiple of 8 + * \param iv       initialization vector for CBC mode + * \param input    input block + * \param output   output block + * + * \return         0 if successful, + *                 MBEDTLS_ERR_XTEA_INVALID_INPUT_LENGTH if the length % 8 != 0 + */ +int mbedtls_xtea_crypt_cbc( mbedtls_xtea_context *ctx, +                    int mode, +                    size_t length, +                    unsigned char iv[8], +                    const unsigned char *input, +                    unsigned char *output); +#endif /* MBEDTLS_CIPHER_MODE_CBC */ + +#ifdef __cplusplus +} +#endif + +#else  /* MBEDTLS_XTEA_ALT */ +#include "xtea_alt.h" +#endif /* MBEDTLS_XTEA_ALT */ + +#ifdef __cplusplus +extern "C" { +#endif + +/** + * \brief          Checkup routine + * + * \return         0 if successful, or 1 if the test failed + */ +int mbedtls_xtea_self_test( int verbose ); + +#ifdef __cplusplus +} +#endif + +#endif /* xtea.h */  |