| Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 1 | /** | 
|  | 2 | * \file ssl_ciphersuites.h | 
|  | 3 | * | 
| Manuel Pégourié-Gonnard | b4fe3cb | 2015-01-22 16:11:05 +0000 | [diff] [blame] | 4 | * \brief SSL Ciphersuites for mbed TLS | 
| Darryl Green | a40a101 | 2018-01-05 15:33:17 +0000 | [diff] [blame] | 5 | */ | 
|  | 6 | /* | 
| Manuel Pégourié-Gonnard | 6fb8187 | 2015-07-27 11:11:48 +0200 | [diff] [blame] | 7 | *  Copyright (C) 2006-2015, ARM Limited, All Rights Reserved | 
| Manuel Pégourié-Gonnard | 37ff140 | 2015-09-04 14:21:07 +0200 | [diff] [blame] | 8 | *  SPDX-License-Identifier: Apache-2.0 | 
|  | 9 | * | 
|  | 10 | *  Licensed under the Apache License, Version 2.0 (the "License"); you may | 
|  | 11 | *  not use this file except in compliance with the License. | 
|  | 12 | *  You may obtain a copy of the License at | 
|  | 13 | * | 
|  | 14 | *  http://www.apache.org/licenses/LICENSE-2.0 | 
|  | 15 | * | 
|  | 16 | *  Unless required by applicable law or agreed to in writing, software | 
|  | 17 | *  distributed under the License is distributed on an "AS IS" BASIS, WITHOUT | 
|  | 18 | *  WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | 19 | *  See the License for the specific language governing permissions and | 
|  | 20 | *  limitations under the License. | 
| Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 21 | * | 
| Manuel Pégourié-Gonnard | fe44643 | 2015-03-06 13:17:10 +0000 | [diff] [blame] | 22 | *  This file is part of mbed TLS (https://tls.mbed.org) | 
| Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 23 | */ | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 24 | #ifndef MBEDTLS_SSL_CIPHERSUITES_H | 
|  | 25 | #define MBEDTLS_SSL_CIPHERSUITES_H | 
| Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 26 |  | 
| Ron Eldor | 8b0cf2e | 2018-02-14 16:02:41 +0200 | [diff] [blame] | 27 | #if !defined(MBEDTLS_CONFIG_FILE) | 
|  | 28 | #include "config.h" | 
|  | 29 | #else | 
|  | 30 | #include MBEDTLS_CONFIG_FILE | 
|  | 31 | #endif | 
|  | 32 |  | 
| Manuel Pégourié-Gonnard | 09edda8 | 2013-08-19 13:50:33 +0200 | [diff] [blame] | 33 | #include "pk.h" | 
| Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 34 | #include "cipher.h" | 
|  | 35 | #include "md.h" | 
| Hanno Becker | b09132d | 2019-06-26 10:53:02 +0100 | [diff] [blame] | 36 | #include "ssl.h" | 
| Hanno Becker | 67fb16e | 2019-06-28 11:39:22 +0100 | [diff] [blame] | 37 | #include <string.h> | 
| Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 38 |  | 
|  | 39 | #ifdef __cplusplus | 
|  | 40 | extern "C" { | 
|  | 41 | #endif | 
|  | 42 |  | 
| Paul Bakker | 41c83d3 | 2013-03-20 14:39:14 +0100 | [diff] [blame] | 43 | /* | 
|  | 44 | * Supported ciphersuites (Official IANA names) | 
|  | 45 | */ | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 46 | #define MBEDTLS_TLS_RSA_WITH_NULL_MD5                    0x01   /**< Weak! */ | 
|  | 47 | #define MBEDTLS_TLS_RSA_WITH_NULL_SHA                    0x02   /**< Weak! */ | 
| Paul Bakker | 41c83d3 | 2013-03-20 14:39:14 +0100 | [diff] [blame] | 48 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 49 | #define MBEDTLS_TLS_RSA_WITH_RC4_128_MD5                 0x04 | 
|  | 50 | #define MBEDTLS_TLS_RSA_WITH_RC4_128_SHA                 0x05 | 
|  | 51 | #define MBEDTLS_TLS_RSA_WITH_DES_CBC_SHA                 0x09   /**< Weak! Not in TLS 1.2 */ | 
| Paul Bakker | 41c83d3 | 2013-03-20 14:39:14 +0100 | [diff] [blame] | 52 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 53 | #define MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA            0x0A | 
| Paul Bakker | 0c5fac2 | 2013-04-19 21:10:51 +0200 | [diff] [blame] | 54 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 55 | #define MBEDTLS_TLS_DHE_RSA_WITH_DES_CBC_SHA             0x15   /**< Weak! Not in TLS 1.2 */ | 
|  | 56 | #define MBEDTLS_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA        0x16 | 
| Paul Bakker | 41c83d3 | 2013-03-20 14:39:14 +0100 | [diff] [blame] | 57 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 58 | #define MBEDTLS_TLS_PSK_WITH_NULL_SHA                    0x2C   /**< Weak! */ | 
|  | 59 | #define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA                0x2D   /**< Weak! */ | 
|  | 60 | #define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA                0x2E   /**< Weak! */ | 
|  | 61 | #define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA             0x2F | 
| Paul Bakker | 0c5fac2 | 2013-04-19 21:10:51 +0200 | [diff] [blame] | 62 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 63 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA         0x33 | 
|  | 64 | #define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA             0x35 | 
|  | 65 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA         0x39 | 
| Paul Bakker | d4a56ec | 2013-04-16 18:05:29 +0200 | [diff] [blame] | 66 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 67 | #define MBEDTLS_TLS_RSA_WITH_NULL_SHA256                 0x3B   /**< Weak! */ | 
|  | 68 | #define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256          0x3C   /**< TLS 1.2 */ | 
|  | 69 | #define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256          0x3D   /**< TLS 1.2 */ | 
| Paul Bakker | 41c83d3 | 2013-03-20 14:39:14 +0100 | [diff] [blame] | 70 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 71 | #define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA        0x41 | 
|  | 72 | #define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA    0x45 | 
| Paul Bakker | 0c5fac2 | 2013-04-19 21:10:51 +0200 | [diff] [blame] | 73 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 74 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256      0x67   /**< TLS 1.2 */ | 
|  | 75 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256      0x6B   /**< TLS 1.2 */ | 
| Paul Bakker | 0c5fac2 | 2013-04-19 21:10:51 +0200 | [diff] [blame] | 76 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 77 | #define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA        0x84 | 
|  | 78 | #define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA    0x88 | 
| Paul Bakker | d4a56ec | 2013-04-16 18:05:29 +0200 | [diff] [blame] | 79 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 80 | #define MBEDTLS_TLS_PSK_WITH_RC4_128_SHA                 0x8A | 
|  | 81 | #define MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA            0x8B | 
|  | 82 | #define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA             0x8C | 
|  | 83 | #define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA             0x8D | 
| Paul Bakker | d4a56ec | 2013-04-16 18:05:29 +0200 | [diff] [blame] | 84 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 85 | #define MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA             0x8E | 
|  | 86 | #define MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA        0x8F | 
|  | 87 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA         0x90 | 
|  | 88 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA         0x91 | 
| Paul Bakker | d4a56ec | 2013-04-16 18:05:29 +0200 | [diff] [blame] | 89 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 90 | #define MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA             0x92 | 
|  | 91 | #define MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA        0x93 | 
|  | 92 | #define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA         0x94 | 
|  | 93 | #define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA         0x95 | 
| Paul Bakker | d4a56ec | 2013-04-16 18:05:29 +0200 | [diff] [blame] | 94 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 95 | #define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256          0x9C   /**< TLS 1.2 */ | 
|  | 96 | #define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384          0x9D   /**< TLS 1.2 */ | 
|  | 97 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256      0x9E   /**< TLS 1.2 */ | 
|  | 98 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384      0x9F   /**< TLS 1.2 */ | 
| Paul Bakker | 41c83d3 | 2013-03-20 14:39:14 +0100 | [diff] [blame] | 99 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 100 | #define MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256          0xA8   /**< TLS 1.2 */ | 
|  | 101 | #define MBEDTLS_TLS_PSK_WITH_AES_256_GCM_SHA384          0xA9   /**< TLS 1.2 */ | 
|  | 102 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_GCM_SHA256      0xAA   /**< TLS 1.2 */ | 
|  | 103 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_GCM_SHA384      0xAB   /**< TLS 1.2 */ | 
|  | 104 | #define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256      0xAC   /**< TLS 1.2 */ | 
|  | 105 | #define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384      0xAD   /**< TLS 1.2 */ | 
| Paul Bakker | 40afb4b | 2013-04-19 22:03:30 +0200 | [diff] [blame] | 106 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 107 | #define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA256          0xAE | 
|  | 108 | #define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA384          0xAF | 
|  | 109 | #define MBEDTLS_TLS_PSK_WITH_NULL_SHA256                 0xB0   /**< Weak! */ | 
|  | 110 | #define MBEDTLS_TLS_PSK_WITH_NULL_SHA384                 0xB1   /**< Weak! */ | 
| Paul Bakker | 40afb4b | 2013-04-19 22:03:30 +0200 | [diff] [blame] | 111 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 112 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256      0xB2 | 
|  | 113 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384      0xB3 | 
|  | 114 | #define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA256             0xB4   /**< Weak! */ | 
|  | 115 | #define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA384             0xB5   /**< Weak! */ | 
| Paul Bakker | 40afb4b | 2013-04-19 22:03:30 +0200 | [diff] [blame] | 116 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 117 | #define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256      0xB6 | 
|  | 118 | #define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384      0xB7 | 
|  | 119 | #define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA256             0xB8   /**< Weak! */ | 
|  | 120 | #define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA384             0xB9   /**< Weak! */ | 
| Paul Bakker | 40afb4b | 2013-04-19 22:03:30 +0200 | [diff] [blame] | 121 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 122 | #define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256     0xBA   /**< TLS 1.2 */ | 
|  | 123 | #define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xBE   /**< TLS 1.2 */ | 
| Paul Bakker | 0c5fac2 | 2013-04-19 21:10:51 +0200 | [diff] [blame] | 124 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 125 | #define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256     0xC0   /**< TLS 1.2 */ | 
|  | 126 | #define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC4   /**< TLS 1.2 */ | 
| Paul Bakker | 0c5fac2 | 2013-04-19 21:10:51 +0200 | [diff] [blame] | 127 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 128 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_NULL_SHA             0xC001 /**< Weak! */ | 
|  | 129 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_RC4_128_SHA          0xC002 /**< Not in SSL3! */ | 
|  | 130 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA     0xC003 /**< Not in SSL3! */ | 
|  | 131 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA      0xC004 /**< Not in SSL3! */ | 
|  | 132 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA      0xC005 /**< Not in SSL3! */ | 
| Manuel Pégourié-Gonnard | 25781b2 | 2013-12-11 16:17:10 +0100 | [diff] [blame] | 133 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 134 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_NULL_SHA            0xC006 /**< Weak! */ | 
|  | 135 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA         0xC007 /**< Not in SSL3! */ | 
|  | 136 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA    0xC008 /**< Not in SSL3! */ | 
|  | 137 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA     0xC009 /**< Not in SSL3! */ | 
|  | 138 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA     0xC00A /**< Not in SSL3! */ | 
| Manuel Pégourié-Gonnard | 32ea60a | 2013-08-17 17:39:04 +0200 | [diff] [blame] | 139 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 140 | #define MBEDTLS_TLS_ECDH_RSA_WITH_NULL_SHA               0xC00B /**< Weak! */ | 
|  | 141 | #define MBEDTLS_TLS_ECDH_RSA_WITH_RC4_128_SHA            0xC00C /**< Not in SSL3! */ | 
|  | 142 | #define MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA       0xC00D /**< Not in SSL3! */ | 
|  | 143 | #define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA        0xC00E /**< Not in SSL3! */ | 
|  | 144 | #define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA        0xC00F /**< Not in SSL3! */ | 
| Manuel Pégourié-Gonnard | 25781b2 | 2013-12-11 16:17:10 +0100 | [diff] [blame] | 145 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 146 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_NULL_SHA              0xC010 /**< Weak! */ | 
|  | 147 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA           0xC011 /**< Not in SSL3! */ | 
|  | 148 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA      0xC012 /**< Not in SSL3! */ | 
|  | 149 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA       0xC013 /**< Not in SSL3! */ | 
|  | 150 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA       0xC014 /**< Not in SSL3! */ | 
| Paul Bakker | 41c83d3 | 2013-03-20 14:39:14 +0100 | [diff] [blame] | 151 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 152 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256  0xC023 /**< TLS 1.2 */ | 
|  | 153 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384  0xC024 /**< TLS 1.2 */ | 
|  | 154 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256   0xC025 /**< TLS 1.2 */ | 
|  | 155 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384   0xC026 /**< TLS 1.2 */ | 
|  | 156 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256    0xC027 /**< TLS 1.2 */ | 
|  | 157 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384    0xC028 /**< TLS 1.2 */ | 
|  | 158 | #define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256     0xC029 /**< TLS 1.2 */ | 
|  | 159 | #define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384     0xC02A /**< TLS 1.2 */ | 
| Paul Bakker | 0c5fac2 | 2013-04-19 21:10:51 +0200 | [diff] [blame] | 160 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 161 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256  0xC02B /**< TLS 1.2 */ | 
|  | 162 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384  0xC02C /**< TLS 1.2 */ | 
|  | 163 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256   0xC02D /**< TLS 1.2 */ | 
|  | 164 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384   0xC02E /**< TLS 1.2 */ | 
|  | 165 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256    0xC02F /**< TLS 1.2 */ | 
|  | 166 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384    0xC030 /**< TLS 1.2 */ | 
|  | 167 | #define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256     0xC031 /**< TLS 1.2 */ | 
|  | 168 | #define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384     0xC032 /**< TLS 1.2 */ | 
| Paul Bakker | a54e493 | 2013-03-20 15:31:54 +0100 | [diff] [blame] | 169 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 170 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA           0xC033 /**< Not in SSL3! */ | 
|  | 171 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA      0xC034 /**< Not in SSL3! */ | 
|  | 172 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA       0xC035 /**< Not in SSL3! */ | 
|  | 173 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA       0xC036 /**< Not in SSL3! */ | 
|  | 174 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256    0xC037 /**< Not in SSL3! */ | 
|  | 175 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384    0xC038 /**< Not in SSL3! */ | 
|  | 176 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA              0xC039 /**< Weak! No SSL3! */ | 
|  | 177 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA256           0xC03A /**< Weak! No SSL3! */ | 
|  | 178 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA384           0xC03B /**< Weak! No SSL3! */ | 
| Manuel Pégourié-Gonnard | 225d6aa | 2013-10-11 19:07:56 +0200 | [diff] [blame] | 179 |  | 
| Manuel Pégourié-Gonnard | 4231e7f | 2018-02-28 10:54:31 +0100 | [diff] [blame] | 180 | #define MBEDTLS_TLS_RSA_WITH_ARIA_128_CBC_SHA256         0xC03C /**< TLS 1.2 */ | 
|  | 181 | #define MBEDTLS_TLS_RSA_WITH_ARIA_256_CBC_SHA384         0xC03D /**< TLS 1.2 */ | 
|  | 182 | #define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256     0xC044 /**< TLS 1.2 */ | 
|  | 183 | #define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384     0xC045 /**< TLS 1.2 */ | 
|  | 184 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256 0xC048 /**< TLS 1.2 */ | 
|  | 185 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384 0xC049 /**< TLS 1.2 */ | 
|  | 186 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256  0xC04A /**< TLS 1.2 */ | 
|  | 187 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384  0xC04B /**< TLS 1.2 */ | 
|  | 188 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256   0xC04C /**< TLS 1.2 */ | 
|  | 189 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384   0xC04D /**< TLS 1.2 */ | 
|  | 190 | #define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256    0xC04E /**< TLS 1.2 */ | 
|  | 191 | #define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384    0xC04F /**< TLS 1.2 */ | 
|  | 192 | #define MBEDTLS_TLS_RSA_WITH_ARIA_128_GCM_SHA256         0xC050 /**< TLS 1.2 */ | 
|  | 193 | #define MBEDTLS_TLS_RSA_WITH_ARIA_256_GCM_SHA384         0xC051 /**< TLS 1.2 */ | 
|  | 194 | #define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256     0xC052 /**< TLS 1.2 */ | 
|  | 195 | #define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384     0xC053 /**< TLS 1.2 */ | 
|  | 196 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 0xC05C /**< TLS 1.2 */ | 
|  | 197 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 0xC05D /**< TLS 1.2 */ | 
|  | 198 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256  0xC05E /**< TLS 1.2 */ | 
|  | 199 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384  0xC05F /**< TLS 1.2 */ | 
|  | 200 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256   0xC060 /**< TLS 1.2 */ | 
|  | 201 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384   0xC061 /**< TLS 1.2 */ | 
|  | 202 | #define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256    0xC062 /**< TLS 1.2 */ | 
|  | 203 | #define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384    0xC063 /**< TLS 1.2 */ | 
|  | 204 | #define MBEDTLS_TLS_PSK_WITH_ARIA_128_CBC_SHA256         0xC064 /**< TLS 1.2 */ | 
|  | 205 | #define MBEDTLS_TLS_PSK_WITH_ARIA_256_CBC_SHA384         0xC065 /**< TLS 1.2 */ | 
|  | 206 | #define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256     0xC066 /**< TLS 1.2 */ | 
|  | 207 | #define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384     0xC067 /**< TLS 1.2 */ | 
|  | 208 | #define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256     0xC068 /**< TLS 1.2 */ | 
|  | 209 | #define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384     0xC069 /**< TLS 1.2 */ | 
|  | 210 | #define MBEDTLS_TLS_PSK_WITH_ARIA_128_GCM_SHA256         0xC06A /**< TLS 1.2 */ | 
|  | 211 | #define MBEDTLS_TLS_PSK_WITH_ARIA_256_GCM_SHA384         0xC06B /**< TLS 1.2 */ | 
|  | 212 | #define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256     0xC06C /**< TLS 1.2 */ | 
|  | 213 | #define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384     0xC06D /**< TLS 1.2 */ | 
|  | 214 | #define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256     0xC06E /**< TLS 1.2 */ | 
|  | 215 | #define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384     0xC06F /**< TLS 1.2 */ | 
|  | 216 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256   0xC070 /**< TLS 1.2 */ | 
|  | 217 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384   0xC071 /**< TLS 1.2 */ | 
| Markku-Juhani O. Saarinen | c06e101 | 2017-12-07 11:51:13 +0000 | [diff] [blame] | 218 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 219 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC072 /**< Not in SSL3! */ | 
|  | 220 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC073 /**< Not in SSL3! */ | 
|  | 221 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256  0xC074 /**< Not in SSL3! */ | 
|  | 222 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384  0xC075 /**< Not in SSL3! */ | 
|  | 223 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256   0xC076 /**< Not in SSL3! */ | 
|  | 224 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384   0xC077 /**< Not in SSL3! */ | 
|  | 225 | #define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256    0xC078 /**< Not in SSL3! */ | 
|  | 226 | #define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384    0xC079 /**< Not in SSL3! */ | 
| Paul Bakker | 27714b1 | 2013-04-07 23:07:12 +0200 | [diff] [blame] | 227 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 228 | #define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256         0xC07A /**< TLS 1.2 */ | 
|  | 229 | #define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384         0xC07B /**< TLS 1.2 */ | 
|  | 230 | #define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256     0xC07C /**< TLS 1.2 */ | 
|  | 231 | #define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384     0xC07D /**< TLS 1.2 */ | 
|  | 232 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC086 /**< TLS 1.2 */ | 
|  | 233 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC087 /**< TLS 1.2 */ | 
|  | 234 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256  0xC088 /**< TLS 1.2 */ | 
|  | 235 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384  0xC089 /**< TLS 1.2 */ | 
|  | 236 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256   0xC08A /**< TLS 1.2 */ | 
|  | 237 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384   0xC08B /**< TLS 1.2 */ | 
|  | 238 | #define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256    0xC08C /**< TLS 1.2 */ | 
|  | 239 | #define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384    0xC08D /**< TLS 1.2 */ | 
| Manuel Pégourié-Gonnard | 8d01eea | 2013-10-24 19:49:07 +0200 | [diff] [blame] | 240 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 241 | #define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256       0xC08E /**< TLS 1.2 */ | 
|  | 242 | #define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384       0xC08F /**< TLS 1.2 */ | 
|  | 243 | #define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256   0xC090 /**< TLS 1.2 */ | 
|  | 244 | #define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384   0xC091 /**< TLS 1.2 */ | 
|  | 245 | #define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256   0xC092 /**< TLS 1.2 */ | 
|  | 246 | #define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384   0xC093 /**< TLS 1.2 */ | 
| Manuel Pégourié-Gonnard | 8d01eea | 2013-10-24 19:49:07 +0200 | [diff] [blame] | 247 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 248 | #define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256       0xC094 | 
|  | 249 | #define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384       0xC095 | 
|  | 250 | #define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256   0xC096 | 
|  | 251 | #define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384   0xC097 | 
|  | 252 | #define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256   0xC098 | 
|  | 253 | #define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384   0xC099 | 
|  | 254 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC09A /**< Not in SSL3! */ | 
|  | 255 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC09B /**< Not in SSL3! */ | 
| Paul Bakker | 0f2f0bf | 2013-07-26 15:03:31 +0200 | [diff] [blame] | 256 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 257 | #define MBEDTLS_TLS_RSA_WITH_AES_128_CCM                0xC09C  /**< TLS 1.2 */ | 
|  | 258 | #define MBEDTLS_TLS_RSA_WITH_AES_256_CCM                0xC09D  /**< TLS 1.2 */ | 
|  | 259 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM            0xC09E  /**< TLS 1.2 */ | 
|  | 260 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM            0xC09F  /**< TLS 1.2 */ | 
|  | 261 | #define MBEDTLS_TLS_RSA_WITH_AES_128_CCM_8              0xC0A0  /**< TLS 1.2 */ | 
|  | 262 | #define MBEDTLS_TLS_RSA_WITH_AES_256_CCM_8              0xC0A1  /**< TLS 1.2 */ | 
|  | 263 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM_8          0xC0A2  /**< TLS 1.2 */ | 
|  | 264 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM_8          0xC0A3  /**< TLS 1.2 */ | 
|  | 265 | #define MBEDTLS_TLS_PSK_WITH_AES_128_CCM                0xC0A4  /**< TLS 1.2 */ | 
|  | 266 | #define MBEDTLS_TLS_PSK_WITH_AES_256_CCM                0xC0A5  /**< TLS 1.2 */ | 
|  | 267 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM            0xC0A6  /**< TLS 1.2 */ | 
|  | 268 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM            0xC0A7  /**< TLS 1.2 */ | 
|  | 269 | #define MBEDTLS_TLS_PSK_WITH_AES_128_CCM_8              0xC0A8  /**< TLS 1.2 */ | 
|  | 270 | #define MBEDTLS_TLS_PSK_WITH_AES_256_CCM_8              0xC0A9  /**< TLS 1.2 */ | 
|  | 271 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM_8          0xC0AA  /**< TLS 1.2 */ | 
|  | 272 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM_8          0xC0AB  /**< TLS 1.2 */ | 
| Manuel Pégourié-Gonnard | 6768da9 | 2014-05-14 12:26:51 +0200 | [diff] [blame] | 273 | /* The last two are named with PSK_DHE in the RFC, which looks like a typo */ | 
|  | 274 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 275 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM        0xC0AC  /**< TLS 1.2 */ | 
|  | 276 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM        0xC0AD  /**< TLS 1.2 */ | 
|  | 277 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8      0xC0AE  /**< TLS 1.2 */ | 
|  | 278 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8      0xC0AF  /**< TLS 1.2 */ | 
| Manuel Pégourié-Gonnard | 6768da9 | 2014-05-14 12:26:51 +0200 | [diff] [blame] | 279 |  | 
| Manuel Pégourié-Gonnard | 538cb7b | 2015-09-15 18:03:28 +0200 | [diff] [blame] | 280 | #define MBEDTLS_TLS_ECJPAKE_WITH_AES_128_CCM_8          0xC0FF  /**< experimental */ | 
|  | 281 |  | 
| Manuel Pégourié-Gonnard | ce66d5e | 2018-06-14 11:11:15 +0200 | [diff] [blame] | 282 | /* RFC 7905 */ | 
|  | 283 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256   0xCCA8 /**< TLS 1.2 */ | 
|  | 284 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA9 /**< TLS 1.2 */ | 
|  | 285 | #define MBEDTLS_TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256     0xCCAA /**< TLS 1.2 */ | 
|  | 286 | #define MBEDTLS_TLS_PSK_WITH_CHACHA20_POLY1305_SHA256         0xCCAB /**< TLS 1.2 */ | 
|  | 287 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256   0xCCAC /**< TLS 1.2 */ | 
|  | 288 | #define MBEDTLS_TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256     0xCCAD /**< TLS 1.2 */ | 
|  | 289 | #define MBEDTLS_TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256     0xCCAE /**< TLS 1.2 */ | 
|  | 290 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 291 | /* Reminder: update mbedtls_ssl_premaster_secret when adding a new key exchange. | 
| Manuel Pégourié-Gonnard | adeb7d8 | 2015-10-09 14:44:47 +0100 | [diff] [blame] | 292 | * Reminder: update MBEDTLS_KEY_EXCHANGE__xxx below | 
| Manuel Pégourié-Gonnard | d942323 | 2014-12-02 11:57:29 +0100 | [diff] [blame] | 293 | */ | 
| Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 294 | typedef enum { | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 295 | MBEDTLS_KEY_EXCHANGE_NONE = 0, | 
|  | 296 | MBEDTLS_KEY_EXCHANGE_RSA, | 
|  | 297 | MBEDTLS_KEY_EXCHANGE_DHE_RSA, | 
|  | 298 | MBEDTLS_KEY_EXCHANGE_ECDHE_RSA, | 
|  | 299 | MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA, | 
|  | 300 | MBEDTLS_KEY_EXCHANGE_PSK, | 
|  | 301 | MBEDTLS_KEY_EXCHANGE_DHE_PSK, | 
|  | 302 | MBEDTLS_KEY_EXCHANGE_RSA_PSK, | 
|  | 303 | MBEDTLS_KEY_EXCHANGE_ECDHE_PSK, | 
|  | 304 | MBEDTLS_KEY_EXCHANGE_ECDH_RSA, | 
|  | 305 | MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA, | 
| Manuel Pégourié-Gonnard | 557535d | 2015-09-15 17:53:32 +0200 | [diff] [blame] | 306 | MBEDTLS_KEY_EXCHANGE_ECJPAKE, | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 307 | } mbedtls_key_exchange_type_t; | 
| Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 308 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 309 | typedef struct mbedtls_ssl_ciphersuite_t mbedtls_ssl_ciphersuite_t; | 
| Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 310 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 311 | #define MBEDTLS_CIPHERSUITE_WEAK       0x01    /**< Weak ciphersuite flag  */ | 
|  | 312 | #define MBEDTLS_CIPHERSUITE_SHORT_TAG  0x02    /**< Short authentication tag, | 
| Manuel Pégourié-Gonnard | 6768da9 | 2014-05-14 12:26:51 +0200 | [diff] [blame] | 313 | eg for CCM_8 */ | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 314 | #define MBEDTLS_CIPHERSUITE_NODTLS     0x04    /**< Can't be used with DTLS */ | 
| Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 315 |  | 
| Hanno Becker | b09132d | 2019-06-26 10:53:02 +0100 | [diff] [blame] | 316 | /* | 
|  | 317 | * Ciphersuite macro definitions | 
|  | 318 | * | 
|  | 319 | * This is highly incomplete and only contains those ciphersuites for | 
|  | 320 | * which we need to be able to build the library with support for that | 
|  | 321 | * ciphersuite only (currently MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 | 
|  | 322 | * as an example). | 
|  | 323 | */ | 
|  | 324 |  | 
| Hanno Becker | b09132d | 2019-06-26 10:53:02 +0100 | [diff] [blame] | 325 | #define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_ID              MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 | 
|  | 326 | #define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_NAME            "TLS-ECDHE-ECDSA-WITH-AES-128-CCM-8" | 
|  | 327 | #define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_CIPHER          MBEDTLS_CIPHER_AES_128_CCM | 
|  | 328 | #define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MAC             MBEDTLS_MD_SHA256 | 
|  | 329 | #define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_KEY_EXCHANGE    MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA | 
|  | 330 | #define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MIN_MAJOR_VER   MBEDTLS_SSL_MAJOR_VERSION_3 | 
|  | 331 | #define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MIN_MINOR_VER   MBEDTLS_SSL_MINOR_VERSION_3 | 
|  | 332 | #define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MAX_MAJOR_VER   MBEDTLS_SSL_MAJOR_VERSION_3 | 
|  | 333 | #define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MAX_MINOR_VER   MBEDTLS_SSL_MINOR_VERSION_3 | 
|  | 334 | #define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_FLAGS           MBEDTLS_CIPHERSUITE_SHORT_TAG | 
|  | 335 |  | 
| Hanno Becker | 9e720e0 | 2019-07-08 11:24:36 +0100 | [diff] [blame] | 336 | /* This is just to make check-names.sh happy -- don't uncomment. */ | 
|  | 337 | //#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 | 
|  | 338 |  | 
| Hanno Becker | b09132d | 2019-06-26 10:53:02 +0100 | [diff] [blame] | 339 | /* | 
|  | 340 | * Helper macros to extract fields from ciphersuites. | 
|  | 341 | */ | 
|  | 342 |  | 
|  | 343 | #define MBEDTLS_SSL_SUITE_ID_T(            SUITE ) SUITE ## _ID | 
|  | 344 | #define MBEDTLS_SSL_SUITE_NAME_T(          SUITE ) SUITE ## _NAME | 
|  | 345 | #define MBEDTLS_SSL_SUITE_CIPHER_T(        SUITE ) SUITE ## _CIPHER | 
|  | 346 | #define MBEDTLS_SSL_SUITE_MAC_T(           SUITE ) SUITE ## _MAC | 
|  | 347 | #define MBEDTLS_SSL_SUITE_KEY_EXCHANGE_T(  SUITE ) SUITE ## _KEY_EXCHANGE | 
|  | 348 | #define MBEDTLS_SSL_SUITE_MIN_MAJOR_VER_T( SUITE ) SUITE ## _MIN_MAJOR_VER | 
|  | 349 | #define MBEDTLS_SSL_SUITE_MIN_MINOR_VER_T( SUITE ) SUITE ## _MIN_MINOR_VER | 
|  | 350 | #define MBEDTLS_SSL_SUITE_MAX_MAJOR_VER_T( SUITE ) SUITE ## _MAX_MAJOR_VER | 
|  | 351 | #define MBEDTLS_SSL_SUITE_MAX_MINOR_VER_T( SUITE ) SUITE ## _MAX_MINOR_VER | 
|  | 352 | #define MBEDTLS_SSL_SUITE_FLAGS_T(         SUITE ) SUITE ## _FLAGS | 
|  | 353 |  | 
|  | 354 | /* Wrapper around MBEDTLS_SSL_SUITE_XXX_T() which makes sure that | 
|  | 355 | * the argument is macro-expanded before concatenated with the | 
|  | 356 | * field name. This allows to call these macros as | 
| Hanno Becker | 73f4cb1 | 2019-06-27 13:51:07 +0100 | [diff] [blame] | 357 | *    MBEDTLS_SSL_SUITE_XXX( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ), | 
|  | 358 | * where MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE expands to MBEDTLS_SSL_SUITE_XXX. */ | 
| Hanno Becker | b09132d | 2019-06-26 10:53:02 +0100 | [diff] [blame] | 359 | #define MBEDTLS_SSL_SUITE_ID(            SUITE ) MBEDTLS_SSL_SUITE_ID_T(            SUITE ) | 
|  | 360 | #define MBEDTLS_SSL_SUITE_NAME(          SUITE ) MBEDTLS_SSL_SUITE_NAME_T(          SUITE ) | 
|  | 361 | #define MBEDTLS_SSL_SUITE_CIPHER(        SUITE ) MBEDTLS_SSL_SUITE_CIPHER_T(        SUITE ) | 
|  | 362 | #define MBEDTLS_SSL_SUITE_MAC(           SUITE ) MBEDTLS_SSL_SUITE_MAC_T(           SUITE ) | 
|  | 363 | #define MBEDTLS_SSL_SUITE_KEY_EXCHANGE(  SUITE ) MBEDTLS_SSL_SUITE_KEY_EXCHANGE_T(  SUITE ) | 
|  | 364 | #define MBEDTLS_SSL_SUITE_MIN_MAJOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MIN_MAJOR_VER_T( SUITE ) | 
|  | 365 | #define MBEDTLS_SSL_SUITE_MIN_MINOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MIN_MINOR_VER_T( SUITE ) | 
|  | 366 | #define MBEDTLS_SSL_SUITE_MAX_MAJOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MAX_MAJOR_VER_T( SUITE ) | 
|  | 367 | #define MBEDTLS_SSL_SUITE_MAX_MINOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MAX_MINOR_VER_T( SUITE ) | 
|  | 368 | #define MBEDTLS_SSL_SUITE_FLAGS(         SUITE ) MBEDTLS_SSL_SUITE_FLAGS_T(         SUITE ) | 
|  | 369 |  | 
| Hanno Becker | 73f4cb1 | 2019-06-27 13:51:07 +0100 | [diff] [blame] | 370 | #if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE) | 
| Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 371 | /** | 
|  | 372 | * \brief   This structure is used for storing ciphersuite information | 
|  | 373 | */ | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 374 | struct mbedtls_ssl_ciphersuite_t | 
| Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 375 | { | 
|  | 376 | int id; | 
|  | 377 | const char * name; | 
|  | 378 |  | 
| Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 379 | mbedtls_cipher_type_t cipher; | 
|  | 380 | mbedtls_md_type_t mac; | 
|  | 381 | mbedtls_key_exchange_type_t key_exchange; | 
| Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 382 |  | 
|  | 383 | int min_major_ver; | 
|  | 384 | int min_minor_ver; | 
|  | 385 | int max_major_ver; | 
|  | 386 | int max_minor_ver; | 
|  | 387 |  | 
|  | 388 | unsigned char flags; | 
|  | 389 | }; | 
|  | 390 |  | 
| Hanno Becker | 473f98f | 2019-06-26 10:27:32 +0100 | [diff] [blame] | 391 | typedef mbedtls_ssl_ciphersuite_t const * mbedtls_ssl_ciphersuite_handle_t; | 
|  | 392 | #define MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE ( (mbedtls_ssl_ciphersuite_handle_t) NULL ) | 
| Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 393 |  | 
| Hanno Becker | b09132d | 2019-06-26 10:53:02 +0100 | [diff] [blame] | 394 | /** | 
|  | 395 | * \brief   This macro builds an instance of ::mbedtls_ssl_ciphersuite_t | 
|  | 396 | *          from an \c MBEDTLS_SUITE_XXX identifier. | 
|  | 397 | */ | 
|  | 398 | #define MBEDTLS_SSL_SUITE_INFO( SUITE )           \ | 
|  | 399 | { MBEDTLS_SSL_SUITE_ID( SUITE ),              \ | 
|  | 400 | MBEDTLS_SSL_SUITE_NAME( SUITE ),            \ | 
|  | 401 | MBEDTLS_SSL_SUITE_CIPHER( SUITE ),          \ | 
|  | 402 | MBEDTLS_SSL_SUITE_MAC( SUITE ),             \ | 
|  | 403 | MBEDTLS_SSL_SUITE_KEY_EXCHANGE(  SUITE ),   \ | 
|  | 404 | MBEDTLS_SSL_SUITE_MIN_MAJOR_VER( SUITE ),   \ | 
|  | 405 | MBEDTLS_SSL_SUITE_MIN_MINOR_VER( SUITE ),   \ | 
|  | 406 | MBEDTLS_SSL_SUITE_MAX_MAJOR_VER( SUITE ),   \ | 
|  | 407 | MBEDTLS_SSL_SUITE_MAX_MINOR_VER( SUITE ),   \ | 
|  | 408 | MBEDTLS_SSL_SUITE_FLAGS( SUITE ) } | 
| Hanno Becker | 5cce936 | 2019-06-26 11:39:32 +0100 | [diff] [blame] | 409 |  | 
| Hanno Becker | 73f4cb1 | 2019-06-27 13:51:07 +0100 | [diff] [blame] | 410 | #else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */ | 
| Hanno Becker | 5cce936 | 2019-06-26 11:39:32 +0100 | [diff] [blame] | 411 |  | 
|  | 412 | typedef unsigned char mbedtls_ssl_ciphersuite_handle_t; | 
|  | 413 | #define MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE      ( (mbedtls_ssl_ciphersuite_handle_t) 0 ) | 
|  | 414 | #define MBEDTLS_SSL_CIPHERSUITE_UNIQUE_VALID_HANDLE ( (mbedtls_ssl_ciphersuite_handle_t) 1 ) | 
|  | 415 |  | 
| Hanno Becker | 73f4cb1 | 2019-06-27 13:51:07 +0100 | [diff] [blame] | 416 | #endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */ | 
| Hanno Becker | 5cce936 | 2019-06-26 11:39:32 +0100 | [diff] [blame] | 417 |  | 
| Hanno Becker | 67fb16e | 2019-06-28 11:39:22 +0100 | [diff] [blame] | 418 | #if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE) | 
|  | 419 | static inline int mbedtls_ssl_session_get_ciphersuite( | 
|  | 420 | mbedtls_ssl_session const * session ) | 
|  | 421 | { | 
|  | 422 | return( session->ciphersuite ); | 
|  | 423 | } | 
|  | 424 | #else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */ | 
|  | 425 | static inline int mbedtls_ssl_session_get_ciphersuite( | 
|  | 426 | mbedtls_ssl_session const * session ) | 
|  | 427 | { | 
|  | 428 | ((void) session); | 
|  | 429 | return( MBEDTLS_SSL_SUITE_ID( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) ); | 
|  | 430 | } | 
|  | 431 | #endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */ | 
|  | 432 |  | 
| Hanno Becker | 473f98f | 2019-06-26 10:27:32 +0100 | [diff] [blame] | 433 | /* | 
|  | 434 | * Getter functions for the extraction of ciphersuite attributes | 
|  | 435 | * from a ciphersuite handle. | 
|  | 436 | * | 
| Hanno Becker | 870bcd3 | 2019-07-02 17:24:12 +0100 | [diff] [blame] | 437 | * Warning: These functions have the validity of the handle as a precondition! | 
| Hanno Becker | 473f98f | 2019-06-26 10:27:32 +0100 | [diff] [blame] | 438 | * Their behaviour is undefined when MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE | 
|  | 439 | * is passed. | 
|  | 440 | */ | 
| Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 441 |  | 
| Hanno Becker | 73f4cb1 | 2019-06-27 13:51:07 +0100 | [diff] [blame] | 442 | #if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE) | 
| Hanno Becker | 473f98f | 2019-06-26 10:27:32 +0100 | [diff] [blame] | 443 | /* | 
|  | 444 | * Implementation of getter functions when the ciphersuite handle | 
|  | 445 | * is a pointer to the ciphersuite information structure. | 
|  | 446 | * | 
|  | 447 | * The precondition that the handle is valid means that | 
|  | 448 | * we don't need to check that info != NULL. | 
|  | 449 | */ | 
|  | 450 | static inline int mbedtls_ssl_suite_get_id( | 
|  | 451 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
| Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 452 | { | 
| Hanno Becker | 473f98f | 2019-06-26 10:27:32 +0100 | [diff] [blame] | 453 | return( info->id ); | 
|  | 454 | } | 
|  | 455 | static inline const char* mbedtls_ssl_suite_get_name( | 
|  | 456 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 457 | { | 
|  | 458 | return( info->name ); | 
|  | 459 | } | 
|  | 460 | static inline mbedtls_cipher_type_t mbedtls_ssl_suite_get_cipher( | 
|  | 461 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 462 | { | 
|  | 463 | return( info->cipher ); | 
|  | 464 | } | 
|  | 465 | static inline mbedtls_md_type_t mbedtls_ssl_suite_get_mac( | 
|  | 466 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 467 | { | 
|  | 468 | return( info->mac ); | 
|  | 469 | } | 
|  | 470 | static inline mbedtls_key_exchange_type_t mbedtls_ssl_suite_get_key_exchange( | 
|  | 471 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 472 | { | 
|  | 473 | return( info->key_exchange ); | 
|  | 474 | } | 
|  | 475 | static inline int mbedtls_ssl_suite_get_min_major_ver( | 
|  | 476 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 477 | { | 
|  | 478 | return( info->min_major_ver ); | 
|  | 479 | } | 
|  | 480 | static inline int mbedtls_ssl_suite_get_min_minor_ver( | 
|  | 481 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 482 | { | 
|  | 483 | return( info->min_minor_ver ); | 
|  | 484 | } | 
|  | 485 | static inline int mbedtls_ssl_suite_get_max_major_ver( | 
|  | 486 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 487 | { | 
|  | 488 | return( info->max_major_ver ); | 
|  | 489 | } | 
|  | 490 | static inline int mbedtls_ssl_suite_get_max_minor_ver( | 
|  | 491 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 492 | { | 
|  | 493 | return( info->max_minor_ver ); | 
|  | 494 | } | 
|  | 495 | static inline unsigned char mbedtls_ssl_suite_get_flags( | 
|  | 496 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 497 | { | 
|  | 498 | return( info->flags ); | 
|  | 499 | } | 
| Hanno Becker | 73f4cb1 | 2019-06-27 13:51:07 +0100 | [diff] [blame] | 500 | #else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */ | 
| Hanno Becker | 5cce936 | 2019-06-26 11:39:32 +0100 | [diff] [blame] | 501 | /* | 
| Hanno Becker | d89e8cb | 2019-06-28 13:09:41 +0100 | [diff] [blame] | 502 | * Implementations of getter functions in the case of only a single possible | 
|  | 503 | * ciphersuite. In this case, the handle is logically a boolean (either the | 
|  | 504 | * invalid handle or the unique valid handle representing the single enabled | 
|  | 505 | * ciphersuite), and the precondition that the handle is valid means that we | 
|  | 506 | * can statically return the hardcoded attribute of the enabled ciphersuite. | 
| Hanno Becker | 5cce936 | 2019-06-26 11:39:32 +0100 | [diff] [blame] | 507 | */ | 
|  | 508 | static inline int mbedtls_ssl_suite_get_id( | 
|  | 509 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 510 | { | 
|  | 511 | ((void) info); | 
| Hanno Becker | 73f4cb1 | 2019-06-27 13:51:07 +0100 | [diff] [blame] | 512 | return( MBEDTLS_SSL_SUITE_ID( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) ); | 
| Hanno Becker | 5cce936 | 2019-06-26 11:39:32 +0100 | [diff] [blame] | 513 | } | 
|  | 514 | static inline const char* mbedtls_ssl_suite_get_name( | 
|  | 515 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 516 | { | 
|  | 517 | ((void) info); | 
| Hanno Becker | 73f4cb1 | 2019-06-27 13:51:07 +0100 | [diff] [blame] | 518 | return( MBEDTLS_SSL_SUITE_NAME( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) ); | 
| Hanno Becker | 5cce936 | 2019-06-26 11:39:32 +0100 | [diff] [blame] | 519 | } | 
|  | 520 | static inline mbedtls_cipher_type_t mbedtls_ssl_suite_get_cipher( | 
|  | 521 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 522 | { | 
|  | 523 | ((void) info); | 
| Hanno Becker | 73f4cb1 | 2019-06-27 13:51:07 +0100 | [diff] [blame] | 524 | return( MBEDTLS_SSL_SUITE_CIPHER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) ); | 
| Hanno Becker | 5cce936 | 2019-06-26 11:39:32 +0100 | [diff] [blame] | 525 | } | 
|  | 526 | static inline mbedtls_md_type_t mbedtls_ssl_suite_get_mac( | 
|  | 527 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 528 | { | 
|  | 529 | ((void) info); | 
| Hanno Becker | 73f4cb1 | 2019-06-27 13:51:07 +0100 | [diff] [blame] | 530 | return( MBEDTLS_SSL_SUITE_MAC( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) ); | 
| Hanno Becker | 5cce936 | 2019-06-26 11:39:32 +0100 | [diff] [blame] | 531 | } | 
|  | 532 | static inline mbedtls_key_exchange_type_t mbedtls_ssl_suite_get_key_exchange( | 
|  | 533 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 534 | { | 
|  | 535 | ((void) info); | 
| Hanno Becker | 73f4cb1 | 2019-06-27 13:51:07 +0100 | [diff] [blame] | 536 | return( MBEDTLS_SSL_SUITE_KEY_EXCHANGE( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) ); | 
| Hanno Becker | 5cce936 | 2019-06-26 11:39:32 +0100 | [diff] [blame] | 537 | } | 
|  | 538 | static inline int mbedtls_ssl_suite_get_min_major_ver( | 
|  | 539 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 540 | { | 
|  | 541 | ((void) info); | 
| Hanno Becker | 73f4cb1 | 2019-06-27 13:51:07 +0100 | [diff] [blame] | 542 | return( MBEDTLS_SSL_SUITE_MIN_MAJOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) ); | 
| Hanno Becker | 5cce936 | 2019-06-26 11:39:32 +0100 | [diff] [blame] | 543 | } | 
|  | 544 | static inline int mbedtls_ssl_suite_get_min_minor_ver( | 
|  | 545 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 546 | { | 
|  | 547 | ((void) info); | 
| Hanno Becker | 73f4cb1 | 2019-06-27 13:51:07 +0100 | [diff] [blame] | 548 | return( MBEDTLS_SSL_SUITE_MIN_MINOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) ); | 
| Hanno Becker | 5cce936 | 2019-06-26 11:39:32 +0100 | [diff] [blame] | 549 | } | 
|  | 550 | static inline int mbedtls_ssl_suite_get_max_major_ver( | 
|  | 551 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 552 | { | 
|  | 553 | ((void) info); | 
| Hanno Becker | 73f4cb1 | 2019-06-27 13:51:07 +0100 | [diff] [blame] | 554 | return( MBEDTLS_SSL_SUITE_MAX_MAJOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) ); | 
| Hanno Becker | 5cce936 | 2019-06-26 11:39:32 +0100 | [diff] [blame] | 555 | } | 
|  | 556 | static inline int mbedtls_ssl_suite_get_max_minor_ver( | 
|  | 557 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 558 | { | 
|  | 559 | ((void) info); | 
| Hanno Becker | 73f4cb1 | 2019-06-27 13:51:07 +0100 | [diff] [blame] | 560 | return( MBEDTLS_SSL_SUITE_MAX_MINOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) ); | 
| Hanno Becker | 5cce936 | 2019-06-26 11:39:32 +0100 | [diff] [blame] | 561 | } | 
|  | 562 | static inline unsigned char mbedtls_ssl_suite_get_flags( | 
|  | 563 | mbedtls_ssl_ciphersuite_handle_t const info ) | 
|  | 564 | { | 
|  | 565 | ((void) info); | 
| Hanno Becker | 73f4cb1 | 2019-06-27 13:51:07 +0100 | [diff] [blame] | 566 | return( MBEDTLS_SSL_SUITE_FLAGS( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) ); | 
| Hanno Becker | 5cce936 | 2019-06-26 11:39:32 +0100 | [diff] [blame] | 567 | } | 
| Hanno Becker | 73f4cb1 | 2019-06-27 13:51:07 +0100 | [diff] [blame] | 568 | #endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */ | 
| Hanno Becker | 473f98f | 2019-06-26 10:27:32 +0100 | [diff] [blame] | 569 |  | 
| Hanno Becker | 67fb16e | 2019-06-28 11:39:22 +0100 | [diff] [blame] | 570 | const int *mbedtls_ssl_list_ciphersuites( void ); | 
|  | 571 |  | 
|  | 572 | /* | 
|  | 573 | * Various small helper functions for ciphersuites. | 
|  | 574 | * | 
|  | 575 | * Like the getter functions, they assume that the provided ciphersuite | 
|  | 576 | * handle is valid, and hence can be optimized in case there's only one | 
|  | 577 | * ciphersuite enabled. | 
|  | 578 | * | 
|  | 579 | * To avoid code-duplication between inline and non-inline implementations | 
|  | 580 | * of this, we define internal static inline versions of all functions first, | 
|  | 581 | * and define wrappers around these either here or in ssl_ciphersuites.c, | 
|  | 582 | * depending on whether MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE is defined. | 
|  | 583 | */ | 
|  | 584 |  | 
| Hanno Becker | 67fb16e | 2019-06-28 11:39:22 +0100 | [diff] [blame] | 585 | #if defined(MBEDTLS_PK_C) | 
|  | 586 | static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg_internal( | 
|  | 587 | mbedtls_ssl_ciphersuite_handle_t info ) | 
|  | 588 | { | 
|  | 589 | switch( mbedtls_ssl_suite_get_key_exchange( info ) ) | 
|  | 590 | { | 
|  | 591 | case MBEDTLS_KEY_EXCHANGE_RSA: | 
|  | 592 | case MBEDTLS_KEY_EXCHANGE_DHE_RSA: | 
|  | 593 | case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA: | 
|  | 594 | case MBEDTLS_KEY_EXCHANGE_RSA_PSK: | 
|  | 595 | return( MBEDTLS_PK_RSA ); | 
|  | 596 |  | 
|  | 597 | case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA: | 
|  | 598 | return( MBEDTLS_PK_ECDSA ); | 
|  | 599 |  | 
|  | 600 | case MBEDTLS_KEY_EXCHANGE_ECDH_RSA: | 
|  | 601 | case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA: | 
|  | 602 | return( MBEDTLS_PK_ECKEY ); | 
|  | 603 |  | 
|  | 604 | default: | 
|  | 605 | return( MBEDTLS_PK_NONE ); | 
|  | 606 | } | 
|  | 607 | } | 
|  | 608 |  | 
|  | 609 | static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg_internal( | 
|  | 610 | mbedtls_ssl_ciphersuite_handle_t info ) | 
|  | 611 | { | 
|  | 612 | switch( mbedtls_ssl_suite_get_key_exchange( info ) ) | 
|  | 613 | { | 
|  | 614 | case MBEDTLS_KEY_EXCHANGE_RSA: | 
|  | 615 | case MBEDTLS_KEY_EXCHANGE_DHE_RSA: | 
|  | 616 | case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA: | 
|  | 617 | return( MBEDTLS_PK_RSA ); | 
|  | 618 |  | 
|  | 619 | case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA: | 
|  | 620 | return( MBEDTLS_PK_ECDSA ); | 
|  | 621 |  | 
|  | 622 | default: | 
|  | 623 | return( MBEDTLS_PK_NONE ); | 
|  | 624 | } | 
|  | 625 | } | 
|  | 626 |  | 
|  | 627 | #endif /* MBEDTLS_PK_C */ | 
|  | 628 |  | 
|  | 629 | #if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \ | 
|  | 630 | defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) | 
|  | 631 | static inline int mbedtls_ssl_ciphersuite_uses_ec_internal( | 
|  | 632 | mbedtls_ssl_ciphersuite_handle_t info ) | 
|  | 633 | { | 
|  | 634 | switch( mbedtls_ssl_suite_get_key_exchange( info ) ) | 
|  | 635 | { | 
|  | 636 | case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA: | 
|  | 637 | case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA: | 
|  | 638 | case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK: | 
|  | 639 | case MBEDTLS_KEY_EXCHANGE_ECDH_RSA: | 
|  | 640 | case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA: | 
|  | 641 | case MBEDTLS_KEY_EXCHANGE_ECJPAKE: | 
|  | 642 | return( 1 ); | 
|  | 643 |  | 
|  | 644 | default: | 
|  | 645 | return( 0 ); | 
|  | 646 | } | 
|  | 647 | } | 
| Hanno Becker | 9b3ec12 | 2019-07-02 17:23:41 +0100 | [diff] [blame] | 648 | #endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C || MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */ | 
| Hanno Becker | 67fb16e | 2019-06-28 11:39:22 +0100 | [diff] [blame] | 649 |  | 
|  | 650 | #if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED) | 
|  | 651 | static inline int mbedtls_ssl_ciphersuite_uses_psk_internal( | 
|  | 652 | mbedtls_ssl_ciphersuite_handle_t info ) | 
|  | 653 | { | 
|  | 654 | switch( mbedtls_ssl_suite_get_key_exchange( info ) ) | 
|  | 655 | { | 
|  | 656 | case MBEDTLS_KEY_EXCHANGE_PSK: | 
|  | 657 | case MBEDTLS_KEY_EXCHANGE_RSA_PSK: | 
|  | 658 | case MBEDTLS_KEY_EXCHANGE_DHE_PSK: | 
|  | 659 | case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK: | 
|  | 660 | return( 1 ); | 
|  | 661 |  | 
|  | 662 | default: | 
|  | 663 | return( 0 ); | 
|  | 664 | } | 
|  | 665 | } | 
|  | 666 | #endif /* MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */ | 
|  | 667 |  | 
|  | 668 | /* | 
|  | 669 | * Wrappers around internal helper functions to be used by the rest of | 
|  | 670 | * the library, either defined static inline here or in ssl_ciphersuites.c. | 
|  | 671 | */ | 
|  | 672 |  | 
| Hanno Becker | 73f4cb1 | 2019-06-27 13:51:07 +0100 | [diff] [blame] | 673 | #if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE) | 
| Hanno Becker | e02758c | 2019-06-26 15:31:31 +0100 | [diff] [blame] | 674 |  | 
| Hanno Becker | 67fb16e | 2019-06-28 11:39:22 +0100 | [diff] [blame] | 675 | mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_string( | 
|  | 676 | const char *ciphersuite_name ); | 
|  | 677 | mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_id( | 
|  | 678 | int ciphersuite_id ); | 
| Hanno Becker | 473f98f | 2019-06-26 10:27:32 +0100 | [diff] [blame] | 679 |  | 
| Hanno Becker | 473f98f | 2019-06-26 10:27:32 +0100 | [diff] [blame] | 680 | #if defined(MBEDTLS_PK_C) | 
| Hanno Becker | 67fb16e | 2019-06-28 11:39:22 +0100 | [diff] [blame] | 681 | mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg( | 
|  | 682 | mbedtls_ssl_ciphersuite_handle_t info ); | 
|  | 683 | mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg( | 
|  | 684 | mbedtls_ssl_ciphersuite_handle_t info ); | 
|  | 685 | #endif /* MBEDTLS_PK_C */ | 
| Hanno Becker | 473f98f | 2019-06-26 10:27:32 +0100 | [diff] [blame] | 686 |  | 
| Hanno Becker | 67fb16e | 2019-06-28 11:39:22 +0100 | [diff] [blame] | 687 | #if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \ | 
|  | 688 | defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) | 
| Hanno Becker | 473f98f | 2019-06-26 10:27:32 +0100 | [diff] [blame] | 689 | int mbedtls_ssl_ciphersuite_uses_ec( mbedtls_ssl_ciphersuite_handle_t info ); | 
| Hanno Becker | 67fb16e | 2019-06-28 11:39:22 +0100 | [diff] [blame] | 690 | #endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C || | 
|  | 691 | MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED*/ | 
|  | 692 |  | 
|  | 693 | #if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED) | 
| Hanno Becker | 473f98f | 2019-06-26 10:27:32 +0100 | [diff] [blame] | 694 | int mbedtls_ssl_ciphersuite_uses_psk( mbedtls_ssl_ciphersuite_handle_t info ); | 
| Hanno Becker | 67fb16e | 2019-06-28 11:39:22 +0100 | [diff] [blame] | 695 | #endif /* MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */ | 
|  | 696 |  | 
|  | 697 | #else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */ | 
|  | 698 |  | 
| Hanno Becker | 67fb16e | 2019-06-28 11:39:22 +0100 | [diff] [blame] | 699 | #if defined(MBEDTLS_PK_C) | 
|  | 700 | static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg( | 
|  | 701 | mbedtls_ssl_ciphersuite_handle_t info ) | 
|  | 702 | { | 
|  | 703 | return( mbedtls_ssl_get_ciphersuite_sig_pk_alg_internal( info ) ); | 
|  | 704 | } | 
|  | 705 |  | 
|  | 706 | static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg( | 
|  | 707 | mbedtls_ssl_ciphersuite_handle_t info ) | 
|  | 708 | { | 
|  | 709 | return( mbedtls_ssl_get_ciphersuite_sig_alg_internal( info ) ); | 
|  | 710 | } | 
|  | 711 | #endif /* MBEDTLS_PK_C */ | 
|  | 712 |  | 
|  | 713 | #if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \ | 
|  | 714 | defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) | 
|  | 715 | static inline int mbedtls_ssl_ciphersuite_uses_ec( | 
|  | 716 | mbedtls_ssl_ciphersuite_handle_t info ) | 
|  | 717 | { | 
|  | 718 | return( mbedtls_ssl_ciphersuite_uses_ec_internal( info ) ); | 
|  | 719 | } | 
|  | 720 | #endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C || | 
|  | 721 | MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED*/ | 
|  | 722 |  | 
|  | 723 | #if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED) | 
|  | 724 | static inline int mbedtls_ssl_ciphersuite_uses_psk( | 
|  | 725 | mbedtls_ssl_ciphersuite_handle_t info ) | 
|  | 726 | { | 
|  | 727 | return( mbedtls_ssl_ciphersuite_uses_psk_internal( info ) ); | 
|  | 728 | } | 
|  | 729 | #endif /* MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */ | 
|  | 730 |  | 
|  | 731 | static inline mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_id( | 
|  | 732 | int ciphersuite ) | 
|  | 733 | { | 
|  | 734 | static const int single_suite_id = | 
|  | 735 | MBEDTLS_SSL_SUITE_ID( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ); | 
|  | 736 |  | 
|  | 737 | if( ciphersuite == single_suite_id ) | 
|  | 738 | return( MBEDTLS_SSL_CIPHERSUITE_UNIQUE_VALID_HANDLE ); | 
|  | 739 |  | 
|  | 740 | return( MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE ); | 
|  | 741 | } | 
|  | 742 |  | 
|  | 743 | static inline mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_string( | 
|  | 744 | const char *ciphersuite_name ) | 
|  | 745 | { | 
|  | 746 | static const char * const single_suite_name = | 
|  | 747 | MBEDTLS_SSL_SUITE_NAME( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ); | 
|  | 748 |  | 
|  | 749 | if( strcmp( ciphersuite_name, single_suite_name ) == 0 ) | 
|  | 750 | return( MBEDTLS_SSL_CIPHERSUITE_UNIQUE_VALID_HANDLE ); | 
|  | 751 |  | 
|  | 752 | return( MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE ); | 
|  | 753 | } | 
|  | 754 |  | 
|  | 755 | #endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */ | 
| Hanno Becker | 473f98f | 2019-06-26 10:27:32 +0100 | [diff] [blame] | 756 |  | 
| Hanno Becker | 779d79d | 2019-07-03 13:37:21 +0100 | [diff] [blame] | 757 | static inline int mbedtls_ssl_ciphersuite_has_pfs( | 
|  | 758 | mbedtls_ssl_ciphersuite_handle_t info ) | 
|  | 759 | { | 
|  | 760 | switch( mbedtls_ssl_suite_get_key_exchange( info ) ) | 
|  | 761 | { | 
|  | 762 | case MBEDTLS_KEY_EXCHANGE_DHE_RSA: | 
|  | 763 | case MBEDTLS_KEY_EXCHANGE_DHE_PSK: | 
|  | 764 | case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA: | 
|  | 765 | case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK: | 
|  | 766 | case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA: | 
|  | 767 | case MBEDTLS_KEY_EXCHANGE_ECJPAKE: | 
|  | 768 | return( 1 ); | 
|  | 769 |  | 
|  | 770 | default: | 
|  | 771 | return( 0 ); | 
|  | 772 | } | 
|  | 773 | } | 
|  | 774 |  | 
|  | 775 | static inline int mbedtls_ssl_ciphersuite_no_pfs( | 
|  | 776 | mbedtls_ssl_ciphersuite_handle_t info ) | 
|  | 777 | { | 
|  | 778 | switch( mbedtls_ssl_suite_get_key_exchange( info ) ) | 
|  | 779 | { | 
|  | 780 | case MBEDTLS_KEY_EXCHANGE_ECDH_RSA: | 
|  | 781 | case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA: | 
|  | 782 | case MBEDTLS_KEY_EXCHANGE_RSA: | 
|  | 783 | case MBEDTLS_KEY_EXCHANGE_PSK: | 
|  | 784 | case MBEDTLS_KEY_EXCHANGE_RSA_PSK: | 
|  | 785 | return( 1 ); | 
|  | 786 |  | 
|  | 787 | default: | 
|  | 788 | return( 0 ); | 
|  | 789 | } | 
|  | 790 | } | 
|  | 791 |  | 
|  | 792 |  | 
|  | 793 | static inline int mbedtls_ssl_ciphersuite_uses_ecdh( | 
|  | 794 | mbedtls_ssl_ciphersuite_handle_t info ) | 
|  | 795 | { | 
|  | 796 | switch( mbedtls_ssl_suite_get_key_exchange( info ) ) | 
|  | 797 | { | 
|  | 798 | case MBEDTLS_KEY_EXCHANGE_ECDH_RSA: | 
|  | 799 | case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA: | 
|  | 800 | return( 1 ); | 
|  | 801 |  | 
|  | 802 | default: | 
|  | 803 | return( 0 ); | 
|  | 804 | } | 
|  | 805 | } | 
|  | 806 |  | 
|  | 807 | static inline int mbedtls_ssl_ciphersuite_cert_req_allowed( | 
|  | 808 | mbedtls_ssl_ciphersuite_handle_t info ) | 
|  | 809 | { | 
|  | 810 | switch( mbedtls_ssl_suite_get_key_exchange( info ) ) | 
|  | 811 | { | 
|  | 812 | case MBEDTLS_KEY_EXCHANGE_RSA: | 
|  | 813 | case MBEDTLS_KEY_EXCHANGE_DHE_RSA: | 
|  | 814 | case MBEDTLS_KEY_EXCHANGE_ECDH_RSA: | 
|  | 815 | case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA: | 
|  | 816 | case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA: | 
|  | 817 | case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA: | 
|  | 818 | return( 1 ); | 
|  | 819 |  | 
|  | 820 | default: | 
|  | 821 | return( 0 ); | 
|  | 822 | } | 
|  | 823 | } | 
|  | 824 |  | 
|  | 825 | static inline int mbedtls_ssl_ciphersuite_uses_srv_cert( | 
|  | 826 | mbedtls_ssl_ciphersuite_handle_t info ) | 
|  | 827 | { | 
|  | 828 | switch( mbedtls_ssl_suite_get_key_exchange( info ) ) | 
|  | 829 | { | 
|  | 830 | case MBEDTLS_KEY_EXCHANGE_RSA: | 
|  | 831 | case MBEDTLS_KEY_EXCHANGE_RSA_PSK: | 
|  | 832 | case MBEDTLS_KEY_EXCHANGE_DHE_RSA: | 
|  | 833 | case MBEDTLS_KEY_EXCHANGE_ECDH_RSA: | 
|  | 834 | case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA: | 
|  | 835 | case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA: | 
|  | 836 | case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA: | 
|  | 837 | return( 1 ); | 
|  | 838 |  | 
|  | 839 | default: | 
|  | 840 | return( 0 ); | 
|  | 841 | } | 
|  | 842 | } | 
|  | 843 |  | 
|  | 844 | static inline int mbedtls_ssl_ciphersuite_uses_dhe( | 
|  | 845 | mbedtls_ssl_ciphersuite_handle_t info ) | 
|  | 846 | { | 
|  | 847 | switch( mbedtls_ssl_suite_get_key_exchange( info ) ) | 
|  | 848 | { | 
|  | 849 | case MBEDTLS_KEY_EXCHANGE_DHE_RSA: | 
|  | 850 | case MBEDTLS_KEY_EXCHANGE_DHE_PSK: | 
|  | 851 | return( 1 ); | 
|  | 852 |  | 
|  | 853 | default: | 
|  | 854 | return( 0 ); | 
|  | 855 | } | 
|  | 856 | } | 
|  | 857 |  | 
|  | 858 | static inline int mbedtls_ssl_ciphersuite_uses_ecdhe( | 
|  | 859 | mbedtls_ssl_ciphersuite_handle_t info ) | 
|  | 860 | { | 
|  | 861 | switch( mbedtls_ssl_suite_get_key_exchange( info ) ) | 
|  | 862 | { | 
|  | 863 | case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA: | 
|  | 864 | case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA: | 
|  | 865 | case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK: | 
|  | 866 | return( 1 ); | 
|  | 867 |  | 
|  | 868 | default: | 
|  | 869 | return( 0 ); | 
|  | 870 | } | 
|  | 871 | } | 
|  | 872 |  | 
|  | 873 | static inline int mbedtls_ssl_ciphersuite_uses_server_signature( | 
|  | 874 | mbedtls_ssl_ciphersuite_handle_t info ) | 
|  | 875 | { | 
|  | 876 | switch( mbedtls_ssl_suite_get_key_exchange( info ) ) | 
|  | 877 | { | 
|  | 878 | case MBEDTLS_KEY_EXCHANGE_DHE_RSA: | 
|  | 879 | case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA: | 
|  | 880 | case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA: | 
|  | 881 | return( 1 ); | 
|  | 882 |  | 
|  | 883 | default: | 
|  | 884 | return( 0 ); | 
|  | 885 | } | 
|  | 886 | } | 
|  | 887 |  | 
| Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 888 | #ifdef __cplusplus | 
|  | 889 | } | 
|  | 890 | #endif | 
|  | 891 |  | 
|  | 892 | #endif /* ssl_ciphersuites.h */ |