blob: 5ef0786eb5985801edbec8fa4994a62aa18865f1 [file] [log] [blame]
Paul Bakker68884e32013-01-07 18:20:04 +01001/**
2 * \file ssl_ciphersuites.h
3 *
Gilles Peskinee820c0a2023-08-03 17:45:20 +02004 * \brief SSL Ciphersuites for Mbed TLS
Darryl Greena40a1012018-01-05 15:33:17 +00005 */
6/*
Bence Szépkúti1e148272020-08-07 13:07:28 +02007 * Copyright The Mbed TLS Contributors
Dave Rodgman16799db2023-11-02 19:47:20 +00008 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
Paul Bakker68884e32013-01-07 18:20:04 +01009 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020010#ifndef MBEDTLS_SSL_CIPHERSUITES_H
11#define MBEDTLS_SSL_CIPHERSUITES_H
Mateusz Starzyk846f0212021-05-19 19:44:07 +020012#include "mbedtls/private_access.h"
Paul Bakker68884e32013-01-07 18:20:04 +010013
Bence Szépkútic662b362021-05-27 11:25:03 +020014#include "mbedtls/build_info.h"
Ron Eldor8b0cf2e2018-02-14 16:02:41 +020015
Jaeden Amero6609aef2019-07-04 20:01:14 +010016#include "mbedtls/pk.h"
Anton Matkinbc487252025-06-16 13:37:03 +020017#include "mbedtls/private/cipher.h"
Jaeden Amero6609aef2019-07-04 20:01:14 +010018#include "mbedtls/md.h"
Paul Bakker68884e32013-01-07 18:20:04 +010019
20#ifdef __cplusplus
21extern "C" {
22#endif
23
Paul Bakker41c83d32013-03-20 14:39:14 +010024/*
25 * Supported ciphersuites (Official IANA names)
26 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020027#define MBEDTLS_TLS_PSK_WITH_NULL_SHA 0x2C /**< Weak! */
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020028
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020029#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA 0x8C
30#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA 0x8D
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020031
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020032#define MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256 0xA8 /**< TLS 1.2 */
33#define MBEDTLS_TLS_PSK_WITH_AES_256_GCM_SHA384 0xA9 /**< TLS 1.2 */
Paul Bakker40afb4b2013-04-19 22:03:30 +020034
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020035#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA256 0xAE
36#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA384 0xAF
37#define MBEDTLS_TLS_PSK_WITH_NULL_SHA256 0xB0 /**< Weak! */
38#define MBEDTLS_TLS_PSK_WITH_NULL_SHA384 0xB1 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +020039
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020040#define MBEDTLS_TLS_ECDH_ECDSA_WITH_NULL_SHA 0xC001 /**< Weak! */
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +010041
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020042#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_NULL_SHA 0xC006 /**< Weak! */
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +010043#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA 0xC009
44#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA 0xC00A
Manuel Pégourié-Gonnard32ea60a2013-08-17 17:39:04 +020045
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020046#define MBEDTLS_TLS_ECDHE_RSA_WITH_NULL_SHA 0xC010 /**< Weak! */
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +010047#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 0xC013
48#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 0xC014
Paul Bakker41c83d32013-03-20 14:39:14 +010049
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020050#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 0xC023 /**< TLS 1.2 */
51#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 0xC024 /**< TLS 1.2 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020052#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 0xC026 /**< TLS 1.2 */
53#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 0xC027 /**< TLS 1.2 */
54#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 0xC028 /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +020055
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020056#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 0xC02B /**< TLS 1.2 */
57#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 0xC02C /**< TLS 1.2 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020058#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 0xC02F /**< TLS 1.2 */
59#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 0xC030 /**< TLS 1.2 */
Paul Bakkera54e4932013-03-20 15:31:54 +010060
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +010061#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA 0xC035
62#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA 0xC036
63#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 0xC037
64#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384 0xC038
65#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA 0xC039
66#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA256 0xC03A
67#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA384 0xC03B
Manuel Pégourié-Gonnard225d6aa2013-10-11 19:07:56 +020068
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +010069#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256 0xC048 /**< TLS 1.2 */
70#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384 0xC049 /**< TLS 1.2 */
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +010071#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256 0xC04C /**< TLS 1.2 */
72#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384 0xC04D /**< TLS 1.2 */
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +010073#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 0xC05C /**< TLS 1.2 */
74#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 0xC05D /**< TLS 1.2 */
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +010075#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 0xC060 /**< TLS 1.2 */
76#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 0xC061 /**< TLS 1.2 */
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +010077#define MBEDTLS_TLS_PSK_WITH_ARIA_128_CBC_SHA256 0xC064 /**< TLS 1.2 */
78#define MBEDTLS_TLS_PSK_WITH_ARIA_256_CBC_SHA384 0xC065 /**< TLS 1.2 */
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +010079#define MBEDTLS_TLS_PSK_WITH_ARIA_128_GCM_SHA256 0xC06A /**< TLS 1.2 */
80#define MBEDTLS_TLS_PSK_WITH_ARIA_256_GCM_SHA384 0xC06B /**< TLS 1.2 */
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +010081#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC070 /**< TLS 1.2 */
82#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC071 /**< TLS 1.2 */
Markku-Juhani O. Saarinenc06e1012017-12-07 11:51:13 +000083
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +010084#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC072
85#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC073
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +010086#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC076
87#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC077
Paul Bakker27714b12013-04-07 23:07:12 +020088
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020089#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC086 /**< TLS 1.2 */
90#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC087 /**< TLS 1.2 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020091#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC08A /**< TLS 1.2 */
92#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC08B /**< TLS 1.2 */
Manuel Pégourié-Gonnard8d01eea2013-10-24 19:49:07 +020093
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020094#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC08E /**< TLS 1.2 */
95#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC08F /**< TLS 1.2 */
Manuel Pégourié-Gonnard8d01eea2013-10-24 19:49:07 +020096
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020097#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC094
98#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC095
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +010099#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC09A
100#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC09B
Paul Bakker0f2f0bf2013-07-26 15:03:31 +0200101
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200102#define MBEDTLS_TLS_PSK_WITH_AES_128_CCM 0xC0A4 /**< TLS 1.2 */
103#define MBEDTLS_TLS_PSK_WITH_AES_256_CCM 0xC0A5 /**< TLS 1.2 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200104#define MBEDTLS_TLS_PSK_WITH_AES_128_CCM_8 0xC0A8 /**< TLS 1.2 */
105#define MBEDTLS_TLS_PSK_WITH_AES_256_CCM_8 0xC0A9 /**< TLS 1.2 */
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200106/* The last two are named with PSK_DHE in the RFC, which looks like a typo */
107
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200108#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM 0xC0AC /**< TLS 1.2 */
109#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM 0xC0AD /**< TLS 1.2 */
110#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 0xC0AE /**< TLS 1.2 */
111#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 0xC0AF /**< TLS 1.2 */
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200112
Manuel Pégourié-Gonnard538cb7b2015-09-15 18:03:28 +0200113#define MBEDTLS_TLS_ECJPAKE_WITH_AES_128_CCM_8 0xC0FF /**< experimental */
114
Manuel Pégourié-Gonnardce66d5e2018-06-14 11:11:15 +0200115/* RFC 7905 */
116#define MBEDTLS_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA8 /**< TLS 1.2 */
117#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA9 /**< TLS 1.2 */
Manuel Pégourié-Gonnardce66d5e2018-06-14 11:11:15 +0200118#define MBEDTLS_TLS_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAB /**< TLS 1.2 */
119#define MBEDTLS_TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAC /**< TLS 1.2 */
Manuel Pégourié-Gonnardce66d5e2018-06-14 11:11:15 +0200120
Hanno Becker8ca26922021-07-23 19:24:23 +0100121/* RFC 8446, Appendix B.4 */
122#define MBEDTLS_TLS1_3_AES_128_GCM_SHA256 0x1301 /**< TLS 1.3 */
123#define MBEDTLS_TLS1_3_AES_256_GCM_SHA384 0x1302 /**< TLS 1.3 */
124#define MBEDTLS_TLS1_3_CHACHA20_POLY1305_SHA256 0x1303 /**< TLS 1.3 */
125#define MBEDTLS_TLS1_3_AES_128_CCM_SHA256 0x1304 /**< TLS 1.3 */
126#define MBEDTLS_TLS1_3_AES_128_CCM_8_SHA256 0x1305 /**< TLS 1.3 */
127
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200128/* Reminder: update mbedtls_ssl_premaster_secret when adding a new key exchange.
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100129 * Reminder: update MBEDTLS_KEY_EXCHANGE__xxx below
Manuel Pégourié-Gonnardd9423232014-12-02 11:57:29 +0100130 */
Paul Bakker68884e32013-01-07 18:20:04 +0100131typedef enum {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200132 MBEDTLS_KEY_EXCHANGE_NONE = 0,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200133 MBEDTLS_KEY_EXCHANGE_ECDHE_RSA,
134 MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA,
135 MBEDTLS_KEY_EXCHANGE_PSK,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200136 MBEDTLS_KEY_EXCHANGE_ECDHE_PSK,
Manuel Pégourié-Gonnard557535d2015-09-15 17:53:32 +0200137 MBEDTLS_KEY_EXCHANGE_ECJPAKE,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200138} mbedtls_key_exchange_type_t;
Paul Bakker68884e32013-01-07 18:20:04 +0100139
Manuel Pégourié-Gonnarde5f30722015-10-22 17:01:15 +0200140/* Key exchanges using a certificate */
Gabor Mezeie1e27302025-02-26 18:06:05 +0100141#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
Ben Taylor15f1d7f2025-07-10 09:41:09 +0100142 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100143#define MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED
Manuel Pégourié-Gonnardd9423232014-12-02 11:57:29 +0100144#endif
145
Valerio Settic8ccc8f2023-08-02 20:00:13 +0200146/* Key exchanges in either TLS 1.2 or 1.3 which are using an ECDSA
147 * signature */
Valerio Setti2430a702023-07-13 17:22:51 +0200148#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
149 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED)
150#define MBEDTLS_KEY_EXCHANGE_WITH_ECDSA_ANY_ENABLED
151#endif
152
Ronald Crone68ab4f2022-10-05 12:46:29 +0200153#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) || \
154 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED)
155#define MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED
156#endif
157
Manuel Pégourié-Gonnard97bb7262023-09-18 11:28:32 +0200158/* Key exchanges allowing client certificate requests.
159 *
Gilles Peskine0068fce2024-09-20 18:39:29 +0200160 * This is now the same as MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED,
161 * and the two macros could be unified.
162 * Until Mbed TLS 3.x, the two sets were different because
163 * MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED covers
164 * MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED plus RSA-PSK.
165 * But RSA-PSK was removed in Mbed TLS 4.0.
Manuel Pégourié-Gonnard97bb7262023-09-18 11:28:32 +0200166 */
Gilles Peskine0068fce2024-09-20 18:39:29 +0200167#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100168#define MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100169#endif
170
Valerio Setti568799f2023-08-18 16:27:00 +0200171/* Helper to state that certificate-based client authentication through ECDSA
Valerio Setti2430a702023-07-13 17:22:51 +0200172 * is supported in TLS 1.2 */
173#if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED) && \
Elena Uziunaitebed21b52024-08-27 11:56:25 +0100174 defined(PSA_HAVE_ALG_ECDSA_SIGN) && defined(PSA_HAVE_ALG_ECDSA_VERIFY)
Valerio Setti2430a702023-07-13 17:22:51 +0200175#define MBEDTLS_KEY_EXCHANGE_ECDSA_CERT_REQ_ALLOWED_ENABLED
176#endif
177
Valerio Settic8ccc8f2023-08-02 20:00:13 +0200178/* ECDSA required for certificates in either TLS 1.2 or 1.3 */
179#if defined(MBEDTLS_KEY_EXCHANGE_ECDSA_CERT_REQ_ALLOWED_ENABLED) || \
180 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED)
181#define MBEDTLS_KEY_EXCHANGE_ECDSA_CERT_REQ_ANY_ALLOWED_ENABLED
182#endif
183
Hanno Becker1aa267c2017-04-28 17:08:27 +0100184/* Key exchanges involving server signature in ServerKeyExchange */
Valerio Settib8621b62025-01-22 11:42:34 +0100185#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
Hanno Becker1aa267c2017-04-28 17:08:27 +0100186 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100187#define MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100188#endif
189
Hanno Becker1aa267c2017-04-28 17:08:27 +0100190/* Key exchanges that don't involve ephemeral keys */
Ben Taylor558766d2025-07-11 08:37:22 +0100191#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100192#define MBEDTLS_KEY_EXCHANGE_SOME_NON_PFS_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100193#endif
194
195/* Key exchanges that involve ephemeral keys */
Valerio Settib8621b62025-01-22 11:42:34 +0100196#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
Hanno Becker1aa267c2017-04-28 17:08:27 +0100197 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) || \
198 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
199 defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100200#define MBEDTLS_KEY_EXCHANGE_SOME_PFS_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100201#endif
202
Manuel Pégourié-Gonnarde5f30722015-10-22 17:01:15 +0200203/* Key exchanges using a PSK */
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100204#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) || \
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100205 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100206#define MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100207#endif
208
Hanno Becker1aa267c2017-04-28 17:08:27 +0100209/* Key exchanges using ECDHE */
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100210#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
211 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
212 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100213#define MBEDTLS_KEY_EXCHANGE_SOME_ECDHE_ENABLED
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100214#endif
215
Valerio Settied365e62023-07-07 15:02:27 +0200216/* TLS 1.2 key exchanges using ECDH or ECDHE*/
Ben Taylor558766d2025-07-11 08:37:22 +0100217#if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDHE_ENABLED)
Valerio Setti00dc4062023-07-05 18:48:43 +0200218#define MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_1_2_ENABLED
219#endif
220
Valerio Setti0a0d0d52023-07-07 15:12:45 +0200221/* TLS 1.3 PSK key exchanges */
222#if defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_ENABLED) || \
223 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED)
224#define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_PSK_ENABLED
225#endif
226
227/* TLS 1.2 or 1.3 key exchanges with PSK */
228#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED) || \
229 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_PSK_ENABLED)
230#define MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED
231#endif
232
233/* TLS 1.3 ephemeral key exchanges */
234#if defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED) || \
235 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED)
236#define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_EPHEMERAL_ENABLED
237#endif
238
Valerio Settiea59c432023-07-25 11:14:03 +0200239/* TLS 1.3 key exchanges using ECDHE */
Valerio Settied365e62023-07-07 15:02:27 +0200240#if defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_EPHEMERAL_ENABLED) && \
241 defined(PSA_WANT_ALG_ECDH)
242#define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_ECDHE_ENABLED
243#endif
244
245/* TLS 1.2 or 1.3 key exchanges using ECDH or ECDHE */
Valerio Setti00dc4062023-07-05 18:48:43 +0200246#if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_1_2_ENABLED) || \
Valerio Settied365e62023-07-07 15:02:27 +0200247 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_ECDHE_ENABLED)
Valerio Settie87915b2023-07-06 12:47:43 +0200248#define MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_ANY_ENABLED
249#endif
250
Valerio Setti9cd80112023-07-25 12:04:21 +0200251/* The handshake params structure has a set of fields called xxdh_psa which are used:
Janos Follath130ece02024-11-19 16:16:36 +0000252 * - by TLS 1.2 to do ECDH or ECDHE;
Valerio Setti9cd80112023-07-25 12:04:21 +0200253 * - by TLS 1.3 to do ECDHE or FFDHE.
254 * The following macros can be used to guard their declaration and use.
255 */
Manuel Pégourié-Gonnard87381612025-01-22 12:55:54 +0100256#if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_1_2_ENABLED)
Valerio Setti9cd80112023-07-25 12:04:21 +0200257#define MBEDTLS_KEY_EXCHANGE_SOME_XXDH_PSA_1_2_ENABLED
258#endif
259#if defined(MBEDTLS_KEY_EXCHANGE_SOME_XXDH_PSA_1_2_ENABLED) || \
Valerio Setti3d237b52023-07-07 16:00:20 +0200260 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_EPHEMERAL_ENABLED)
Valerio Settiea59c432023-07-25 11:14:03 +0200261#define MBEDTLS_KEY_EXCHANGE_SOME_XXDH_PSA_ANY_ENABLED
Valerio Setti3d237b52023-07-07 16:00:20 +0200262#endif
263
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200264typedef struct mbedtls_ssl_ciphersuite_t mbedtls_ssl_ciphersuite_t;
Paul Bakker68884e32013-01-07 18:20:04 +0100265
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200266#define MBEDTLS_CIPHERSUITE_WEAK 0x01 /**< Weak ciphersuite flag */
267#define MBEDTLS_CIPHERSUITE_SHORT_TAG 0x02 /**< Short authentication tag,
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200268 eg for CCM_8 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200269#define MBEDTLS_CIPHERSUITE_NODTLS 0x04 /**< Can't be used with DTLS */
Paul Bakker68884e32013-01-07 18:20:04 +0100270
271/**
272 * \brief This structure is used for storing ciphersuite information
Glenn Strauss60bfe602022-03-14 19:04:24 -0400273 *
274 * \note members are defined using integral types instead of enums
275 * in order to pack structure and reduce memory usage by internal
276 * \c ciphersuite_definitions[]
Paul Bakker68884e32013-01-07 18:20:04 +0100277 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100278struct mbedtls_ssl_ciphersuite_t {
Mateusz Starzyk363eb292021-05-19 17:32:44 +0200279 int MBEDTLS_PRIVATE(id);
Gilles Peskine449bd832023-01-11 14:50:10 +0100280 const char *MBEDTLS_PRIVATE(name);
Paul Bakker68884e32013-01-07 18:20:04 +0100281
Glenn Strauss60bfe602022-03-14 19:04:24 -0400282 uint8_t MBEDTLS_PRIVATE(cipher); /* mbedtls_cipher_type_t */
283 uint8_t MBEDTLS_PRIVATE(mac); /* mbedtls_md_type_t */
284 uint8_t MBEDTLS_PRIVATE(key_exchange); /* mbedtls_key_exchange_type_t */
285 uint8_t MBEDTLS_PRIVATE(flags);
Paul Bakker68884e32013-01-07 18:20:04 +0100286
Glenn Strauss60bfe602022-03-14 19:04:24 -0400287 uint16_t MBEDTLS_PRIVATE(min_tls_version); /* mbedtls_ssl_protocol_version */
288 uint16_t MBEDTLS_PRIVATE(max_tls_version); /* mbedtls_ssl_protocol_version */
Paul Bakker68884e32013-01-07 18:20:04 +0100289};
290
Gilles Peskine449bd832023-01-11 14:50:10 +0100291const int *mbedtls_ssl_list_ciphersuites(void);
Paul Bakker68884e32013-01-07 18:20:04 +0100292
Gilles Peskine449bd832023-01-11 14:50:10 +0100293const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_string(const char *ciphersuite_name);
294const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_id(int ciphersuite_id);
Paul Bakker68884e32013-01-07 18:20:04 +0100295
Gilles Peskine449bd832023-01-11 14:50:10 +0100296static inline const char *mbedtls_ssl_ciphersuite_get_name(const mbedtls_ssl_ciphersuite_t *info)
Glenn Strauss8f526902022-01-13 00:04:49 -0500297{
298 return info->MBEDTLS_PRIVATE(name);
299}
300
Minos Galanakis40d47082024-03-04 15:24:51 +0000301static inline int mbedtls_ssl_ciphersuite_get_id(const mbedtls_ssl_ciphersuite_t *info)
Minos Galanakis358b4482024-03-04 02:19:31 +0000302{
303 return info->MBEDTLS_PRIVATE(id);
304}
305
Gilles Peskine449bd832023-01-11 14:50:10 +0100306size_t mbedtls_ssl_ciphersuite_get_cipher_key_bitlen(const mbedtls_ssl_ciphersuite_t *info);
Glenn Strauss8f526902022-01-13 00:04:49 -0500307
Paul Bakker68884e32013-01-07 18:20:04 +0100308#ifdef __cplusplus
309}
310#endif
311
312#endif /* ssl_ciphersuites.h */