Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 1 | /** |
| 2 | * \file ssl_ciphersuites.h |
| 3 | * |
Manuel Pégourié-Gonnard | b4fe3cb | 2015-01-22 16:11:05 +0000 | [diff] [blame] | 4 | * \brief SSL Ciphersuites for mbed TLS |
Darryl Green | a40a101 | 2018-01-05 15:33:17 +0000 | [diff] [blame] | 5 | */ |
| 6 | /* |
Bence Szépkúti | 1e14827 | 2020-08-07 13:07:28 +0200 | [diff] [blame] | 7 | * Copyright The Mbed TLS Contributors |
Manuel Pégourié-Gonnard | 37ff140 | 2015-09-04 14:21:07 +0200 | [diff] [blame] | 8 | * SPDX-License-Identifier: Apache-2.0 |
| 9 | * |
| 10 | * Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 11 | * not use this file except in compliance with the License. |
| 12 | * You may obtain a copy of the License at |
| 13 | * |
| 14 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 15 | * |
| 16 | * Unless required by applicable law or agreed to in writing, software |
| 17 | * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 18 | * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 19 | * See the License for the specific language governing permissions and |
| 20 | * limitations under the License. |
Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 21 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 22 | #ifndef MBEDTLS_SSL_CIPHERSUITES_H |
| 23 | #define MBEDTLS_SSL_CIPHERSUITES_H |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 24 | #include "mbedtls/private_access.h" |
Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 25 | |
Bence Szépkúti | c662b36 | 2021-05-27 11:25:03 +0200 | [diff] [blame] | 26 | #include "mbedtls/build_info.h" |
Ron Eldor | 8b0cf2e | 2018-02-14 16:02:41 +0200 | [diff] [blame] | 27 | |
Jaeden Amero | 6609aef | 2019-07-04 20:01:14 +0100 | [diff] [blame] | 28 | #include "mbedtls/pk.h" |
| 29 | #include "mbedtls/cipher.h" |
| 30 | #include "mbedtls/md.h" |
Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 31 | |
| 32 | #ifdef __cplusplus |
| 33 | extern "C" { |
| 34 | #endif |
| 35 | |
Paul Bakker | 41c83d3 | 2013-03-20 14:39:14 +0100 | [diff] [blame] | 36 | /* |
| 37 | * Supported ciphersuites (Official IANA names) |
| 38 | */ |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 39 | /** Weak! */ |
| 40 | #define MBEDTLS_TLS_RSA_WITH_NULL_MD5 0x01 |
| 41 | /** Weak! */ |
| 42 | #define MBEDTLS_TLS_RSA_WITH_NULL_SHA 0x02 |
Paul Bakker | 41c83d3 | 2013-03-20 14:39:14 +0100 | [diff] [blame] | 43 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 44 | /** Weak! */ |
| 45 | #define MBEDTLS_TLS_PSK_WITH_NULL_SHA 0x2C |
| 46 | /** Weak! */ |
| 47 | #define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA 0x2D |
| 48 | /** Weak! */ |
| 49 | #define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA 0x2E |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 50 | #define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA 0x2F |
Paul Bakker | 0c5fac2 | 2013-04-19 21:10:51 +0200 | [diff] [blame] | 51 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 52 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA 0x33 |
| 53 | #define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA 0x35 |
| 54 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA 0x39 |
Paul Bakker | d4a56ec | 2013-04-16 18:05:29 +0200 | [diff] [blame] | 55 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 56 | /** Weak! */ |
| 57 | #define MBEDTLS_TLS_RSA_WITH_NULL_SHA256 0x3B |
| 58 | /** TLS 1.2 */ |
| 59 | #define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 0x3C |
| 60 | /** TLS 1.2 */ |
| 61 | #define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 0x3D |
Paul Bakker | 41c83d3 | 2013-03-20 14:39:14 +0100 | [diff] [blame] | 62 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 63 | #define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 0x41 |
| 64 | #define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 0x45 |
Paul Bakker | 0c5fac2 | 2013-04-19 21:10:51 +0200 | [diff] [blame] | 65 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 66 | /** TLS 1.2 */ |
| 67 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 0x67 |
| 68 | /** TLS 1.2 */ |
| 69 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 0x6B |
Paul Bakker | 0c5fac2 | 2013-04-19 21:10:51 +0200 | [diff] [blame] | 70 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 71 | #define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 0x84 |
| 72 | #define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 0x88 |
Paul Bakker | d4a56ec | 2013-04-16 18:05:29 +0200 | [diff] [blame] | 73 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 74 | #define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA 0x8C |
| 75 | #define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA 0x8D |
Paul Bakker | d4a56ec | 2013-04-16 18:05:29 +0200 | [diff] [blame] | 76 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 77 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA 0x90 |
| 78 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA 0x91 |
Paul Bakker | d4a56ec | 2013-04-16 18:05:29 +0200 | [diff] [blame] | 79 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 80 | #define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA 0x94 |
| 81 | #define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA 0x95 |
Paul Bakker | d4a56ec | 2013-04-16 18:05:29 +0200 | [diff] [blame] | 82 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 83 | /** TLS 1.2 */ |
| 84 | #define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 0x9C |
| 85 | /** TLS 1.2 */ |
| 86 | #define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 0x9D |
| 87 | /** TLS 1.2 */ |
| 88 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 0x9E |
| 89 | /** TLS 1.2 */ |
| 90 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 0x9F |
Paul Bakker | 41c83d3 | 2013-03-20 14:39:14 +0100 | [diff] [blame] | 91 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 92 | /** TLS 1.2 */ |
| 93 | #define MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256 0xA8 |
| 94 | /** TLS 1.2 */ |
| 95 | #define MBEDTLS_TLS_PSK_WITH_AES_256_GCM_SHA384 0xA9 |
| 96 | /** TLS 1.2 */ |
| 97 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_GCM_SHA256 0xAA |
| 98 | /** TLS 1.2 */ |
| 99 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_GCM_SHA384 0xAB |
| 100 | /** TLS 1.2 */ |
| 101 | #define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256 0xAC |
| 102 | /** TLS 1.2 */ |
| 103 | #define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384 0xAD |
Paul Bakker | 40afb4b | 2013-04-19 22:03:30 +0200 | [diff] [blame] | 104 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 105 | #define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA256 0xAE |
| 106 | #define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA384 0xAF |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 107 | /** Weak! */ |
| 108 | #define MBEDTLS_TLS_PSK_WITH_NULL_SHA256 0xB0 |
| 109 | /** Weak! */ |
| 110 | #define MBEDTLS_TLS_PSK_WITH_NULL_SHA384 0xB1 |
Paul Bakker | 40afb4b | 2013-04-19 22:03:30 +0200 | [diff] [blame] | 111 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 112 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256 0xB2 |
| 113 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384 0xB3 |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 114 | /** Weak! */ |
| 115 | #define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA256 0xB4 |
| 116 | /** Weak! */ |
| 117 | #define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA384 0xB5 |
Paul Bakker | 40afb4b | 2013-04-19 22:03:30 +0200 | [diff] [blame] | 118 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 119 | #define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256 0xB6 |
| 120 | #define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384 0xB7 |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 121 | /** Weak! */ |
| 122 | #define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA256 0xB8 |
| 123 | /** Weak! */ |
| 124 | #define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA384 0xB9 |
Paul Bakker | 40afb4b | 2013-04-19 22:03:30 +0200 | [diff] [blame] | 125 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 126 | /** TLS 1.2 */ |
| 127 | #define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xBA |
| 128 | /** TLS 1.2 */ |
| 129 | #define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xBE |
Paul Bakker | 0c5fac2 | 2013-04-19 21:10:51 +0200 | [diff] [blame] | 130 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 131 | /** TLS 1.2 */ |
| 132 | #define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC0 |
| 133 | /** TLS 1.2 */ |
| 134 | #define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC4 |
Paul Bakker | 0c5fac2 | 2013-04-19 21:10:51 +0200 | [diff] [blame] | 135 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 136 | /** Weak! */ |
| 137 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_NULL_SHA 0xC001 |
Mateusz Starzyk | 06b07fb | 2021-02-18 13:55:21 +0100 | [diff] [blame] | 138 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA 0xC004 |
| 139 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA 0xC005 |
Manuel Pégourié-Gonnard | 25781b2 | 2013-12-11 16:17:10 +0100 | [diff] [blame] | 140 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 141 | /** Weak! */ |
| 142 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_NULL_SHA 0xC006 |
Mateusz Starzyk | 06b07fb | 2021-02-18 13:55:21 +0100 | [diff] [blame] | 143 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA 0xC009 |
| 144 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA 0xC00A |
Manuel Pégourié-Gonnard | 32ea60a | 2013-08-17 17:39:04 +0200 | [diff] [blame] | 145 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 146 | /** Weak! */ |
| 147 | #define MBEDTLS_TLS_ECDH_RSA_WITH_NULL_SHA 0xC00B |
Mateusz Starzyk | 06b07fb | 2021-02-18 13:55:21 +0100 | [diff] [blame] | 148 | #define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA 0xC00E |
| 149 | #define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA 0xC00F |
Manuel Pégourié-Gonnard | 25781b2 | 2013-12-11 16:17:10 +0100 | [diff] [blame] | 150 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 151 | /** Weak! */ |
| 152 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_NULL_SHA 0xC010 |
Mateusz Starzyk | 06b07fb | 2021-02-18 13:55:21 +0100 | [diff] [blame] | 153 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 0xC013 |
| 154 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 0xC014 |
Paul Bakker | 41c83d3 | 2013-03-20 14:39:14 +0100 | [diff] [blame] | 155 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 156 | /** TLS 1.2 */ |
| 157 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 0xC023 |
| 158 | /** TLS 1.2 */ |
| 159 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 0xC024 |
| 160 | /** TLS 1.2 */ |
| 161 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 0xC025 |
| 162 | /** TLS 1.2 */ |
| 163 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 0xC026 |
| 164 | /** TLS 1.2 */ |
| 165 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 0xC027 |
| 166 | /** TLS 1.2 */ |
| 167 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 0xC028 |
| 168 | /** TLS 1.2 */ |
| 169 | #define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 0xC029 |
| 170 | /** TLS 1.2 */ |
| 171 | #define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 0xC02A |
Paul Bakker | 0c5fac2 | 2013-04-19 21:10:51 +0200 | [diff] [blame] | 172 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 173 | /** TLS 1.2 */ |
| 174 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 0xC02B |
| 175 | /** TLS 1.2 */ |
| 176 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 0xC02C |
| 177 | /** TLS 1.2 */ |
| 178 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 0xC02D |
| 179 | /** TLS 1.2 */ |
| 180 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 0xC02E |
| 181 | /** TLS 1.2 */ |
| 182 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 0xC02F |
| 183 | /** TLS 1.2 */ |
| 184 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 0xC030 |
| 185 | /** TLS 1.2 */ |
| 186 | #define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 0xC031 |
| 187 | /** TLS 1.2 */ |
| 188 | #define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 0xC032 |
Paul Bakker | a54e493 | 2013-03-20 15:31:54 +0100 | [diff] [blame] | 189 | |
Mateusz Starzyk | 06b07fb | 2021-02-18 13:55:21 +0100 | [diff] [blame] | 190 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA 0xC035 |
| 191 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA 0xC036 |
| 192 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 0xC037 |
| 193 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384 0xC038 |
| 194 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA 0xC039 |
| 195 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA256 0xC03A |
| 196 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA384 0xC03B |
Manuel Pégourié-Gonnard | 225d6aa | 2013-10-11 19:07:56 +0200 | [diff] [blame] | 197 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 198 | /** TLS 1.2 */ |
| 199 | #define MBEDTLS_TLS_RSA_WITH_ARIA_128_CBC_SHA256 0xC03C |
| 200 | /** TLS 1.2 */ |
| 201 | #define MBEDTLS_TLS_RSA_WITH_ARIA_256_CBC_SHA384 0xC03D |
| 202 | /** TLS 1.2 */ |
| 203 | #define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256 0xC044 |
| 204 | /** TLS 1.2 */ |
| 205 | #define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384 0xC045 |
| 206 | /** TLS 1.2 */ |
| 207 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256 0xC048 |
| 208 | /** TLS 1.2 */ |
| 209 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384 0xC049 |
| 210 | /** TLS 1.2 */ |
| 211 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256 0xC04A |
| 212 | /** TLS 1.2 */ |
| 213 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384 0xC04B |
| 214 | /** TLS 1.2 */ |
| 215 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256 0xC04C |
| 216 | /** TLS 1.2 */ |
| 217 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384 0xC04D |
| 218 | /** TLS 1.2 */ |
| 219 | #define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256 0xC04E |
| 220 | /** TLS 1.2 */ |
| 221 | #define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384 0xC04F |
| 222 | /** TLS 1.2 */ |
| 223 | #define MBEDTLS_TLS_RSA_WITH_ARIA_128_GCM_SHA256 0xC050 |
| 224 | /** TLS 1.2 */ |
| 225 | #define MBEDTLS_TLS_RSA_WITH_ARIA_256_GCM_SHA384 0xC051 |
| 226 | /** TLS 1.2 */ |
| 227 | #define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 0xC052 |
| 228 | /** TLS 1.2 */ |
| 229 | #define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 0xC053 |
| 230 | /** TLS 1.2 */ |
| 231 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 0xC05C |
| 232 | /** TLS 1.2 */ |
| 233 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 0xC05D |
| 234 | /** TLS 1.2 */ |
| 235 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256 0xC05E |
| 236 | /** TLS 1.2 */ |
| 237 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384 0xC05F |
| 238 | /** TLS 1.2 */ |
| 239 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 0xC060 |
| 240 | /** TLS 1.2 */ |
| 241 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 0xC061 |
| 242 | /** TLS 1.2 */ |
| 243 | #define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256 0xC062 |
| 244 | /** TLS 1.2 */ |
| 245 | #define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384 0xC063 |
| 246 | /** TLS 1.2 */ |
| 247 | #define MBEDTLS_TLS_PSK_WITH_ARIA_128_CBC_SHA256 0xC064 |
| 248 | /** TLS 1.2 */ |
| 249 | #define MBEDTLS_TLS_PSK_WITH_ARIA_256_CBC_SHA384 0xC065 |
| 250 | /** TLS 1.2 */ |
| 251 | #define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC066 |
| 252 | /** TLS 1.2 */ |
| 253 | #define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC067 |
| 254 | /** TLS 1.2 */ |
| 255 | #define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256 0xC068 |
| 256 | /** TLS 1.2 */ |
| 257 | #define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384 0xC069 |
| 258 | /** TLS 1.2 */ |
| 259 | #define MBEDTLS_TLS_PSK_WITH_ARIA_128_GCM_SHA256 0xC06A |
| 260 | /** TLS 1.2 */ |
| 261 | #define MBEDTLS_TLS_PSK_WITH_ARIA_256_GCM_SHA384 0xC06B |
| 262 | /** TLS 1.2 */ |
| 263 | #define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256 0xC06C |
| 264 | /** TLS 1.2 */ |
| 265 | #define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384 0xC06D |
| 266 | /** TLS 1.2 */ |
| 267 | #define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256 0xC06E |
| 268 | /** TLS 1.2 */ |
| 269 | #define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384 0xC06F |
| 270 | /** TLS 1.2 */ |
| 271 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC070 |
| 272 | /** TLS 1.2 */ |
| 273 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC071 |
Markku-Juhani O. Saarinen | c06e101 | 2017-12-07 11:51:13 +0000 | [diff] [blame] | 274 | |
Mateusz Starzyk | 06b07fb | 2021-02-18 13:55:21 +0100 | [diff] [blame] | 275 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC072 |
| 276 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC073 |
| 277 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC074 |
| 278 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC075 |
| 279 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC076 |
| 280 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC077 |
| 281 | #define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC078 |
| 282 | #define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC079 |
Paul Bakker | 27714b1 | 2013-04-07 23:07:12 +0200 | [diff] [blame] | 283 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 284 | /** TLS 1.2 */ |
| 285 | #define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC07A |
| 286 | /** TLS 1.2 */ |
| 287 | #define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC07B |
| 288 | /** TLS 1.2 */ |
| 289 | #define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC07C |
| 290 | /** TLS 1.2 */ |
| 291 | #define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC07D |
| 292 | /** TLS 1.2 */ |
| 293 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC086 |
| 294 | /** TLS 1.2 */ |
| 295 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC087 |
| 296 | /** TLS 1.2 */ |
| 297 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC088 |
| 298 | /** TLS 1.2 */ |
| 299 | #define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC089 |
| 300 | /** TLS 1.2 */ |
| 301 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC08A |
| 302 | /** TLS 1.2 */ |
| 303 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC08B |
| 304 | /** TLS 1.2 */ |
| 305 | #define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC08C |
| 306 | /** TLS 1.2 */ |
| 307 | #define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC08D |
Manuel Pégourié-Gonnard | 8d01eea | 2013-10-24 19:49:07 +0200 | [diff] [blame] | 308 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 309 | /** TLS 1.2 */ |
| 310 | #define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC08E |
| 311 | /** TLS 1.2 */ |
| 312 | #define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC08F |
| 313 | /** TLS 1.2 */ |
| 314 | #define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC090 |
| 315 | /** TLS 1.2 */ |
| 316 | #define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC091 |
| 317 | /** TLS 1.2 */ |
| 318 | #define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC092 |
| 319 | /** TLS 1.2 */ |
| 320 | #define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC093 |
Manuel Pégourié-Gonnard | 8d01eea | 2013-10-24 19:49:07 +0200 | [diff] [blame] | 321 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 322 | #define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC094 |
| 323 | #define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC095 |
| 324 | #define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC096 |
| 325 | #define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC097 |
| 326 | #define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC098 |
| 327 | #define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC099 |
Mateusz Starzyk | 06b07fb | 2021-02-18 13:55:21 +0100 | [diff] [blame] | 328 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC09A |
| 329 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC09B |
Paul Bakker | 0f2f0bf | 2013-07-26 15:03:31 +0200 | [diff] [blame] | 330 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 331 | /** TLS 1.2 */ |
| 332 | #define MBEDTLS_TLS_RSA_WITH_AES_128_CCM 0xC09C |
| 333 | /** TLS 1.2 */ |
| 334 | #define MBEDTLS_TLS_RSA_WITH_AES_256_CCM 0xC09D |
| 335 | /** TLS 1.2 */ |
| 336 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM 0xC09E |
| 337 | /** TLS 1.2 */ |
| 338 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM 0xC09F |
| 339 | /** TLS 1.2 */ |
| 340 | #define MBEDTLS_TLS_RSA_WITH_AES_128_CCM_8 0xC0A0 |
| 341 | /** TLS 1.2 */ |
| 342 | #define MBEDTLS_TLS_RSA_WITH_AES_256_CCM_8 0xC0A1 |
| 343 | /** TLS 1.2 */ |
| 344 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM_8 0xC0A2 |
| 345 | /** TLS 1.2 */ |
| 346 | #define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM_8 0xC0A3 |
| 347 | /** TLS 1.2 */ |
| 348 | #define MBEDTLS_TLS_PSK_WITH_AES_128_CCM 0xC0A4 |
| 349 | /** TLS 1.2 */ |
| 350 | #define MBEDTLS_TLS_PSK_WITH_AES_256_CCM 0xC0A5 |
| 351 | /** TLS 1.2 */ |
| 352 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM 0xC0A6 |
| 353 | /** TLS 1.2 */ |
| 354 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM 0xC0A7 |
| 355 | /** TLS 1.2 */ |
| 356 | #define MBEDTLS_TLS_PSK_WITH_AES_128_CCM_8 0xC0A8 |
| 357 | /** TLS 1.2 */ |
| 358 | #define MBEDTLS_TLS_PSK_WITH_AES_256_CCM_8 0xC0A9 |
| 359 | /** TLS 1.2 */ |
| 360 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM_8 0xC0AA |
| 361 | /** TLS 1.2 */ |
| 362 | #define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM_8 0xC0AB |
Manuel Pégourié-Gonnard | 6768da9 | 2014-05-14 12:26:51 +0200 | [diff] [blame] | 363 | /* The last two are named with PSK_DHE in the RFC, which looks like a typo */ |
| 364 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 365 | /** TLS 1.2 */ |
| 366 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM 0xC0AC |
| 367 | /** TLS 1.2 */ |
| 368 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM 0xC0AD |
| 369 | /** TLS 1.2 */ |
| 370 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 0xC0AE |
| 371 | /** TLS 1.2 */ |
| 372 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 0xC0AF |
Manuel Pégourié-Gonnard | 6768da9 | 2014-05-14 12:26:51 +0200 | [diff] [blame] | 373 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 374 | /** experimental */ |
| 375 | #define MBEDTLS_TLS_ECJPAKE_WITH_AES_128_CCM_8 0xC0FF |
Manuel Pégourié-Gonnard | 538cb7b | 2015-09-15 18:03:28 +0200 | [diff] [blame] | 376 | |
Manuel Pégourié-Gonnard | ce66d5e | 2018-06-14 11:11:15 +0200 | [diff] [blame] | 377 | /* RFC 7905 */ |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 378 | /** TLS 1.2 */ |
| 379 | #define MBEDTLS_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA8 |
| 380 | /** TLS 1.2 */ |
| 381 | #define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA9 |
| 382 | /** TLS 1.2 */ |
| 383 | #define MBEDTLS_TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 0xCCAA |
| 384 | /** TLS 1.2 */ |
| 385 | #define MBEDTLS_TLS_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAB |
| 386 | /** TLS 1.2 */ |
| 387 | #define MBEDTLS_TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAC |
| 388 | /** TLS 1.2 */ |
| 389 | #define MBEDTLS_TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAD |
| 390 | /** TLS 1.2 */ |
| 391 | #define MBEDTLS_TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAE |
Manuel Pégourié-Gonnard | ce66d5e | 2018-06-14 11:11:15 +0200 | [diff] [blame] | 392 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 393 | /* Reminder: update mbedtls_ssl_premaster_secret when adding a new key exchange. |
Manuel Pégourié-Gonnard | adeb7d8 | 2015-10-09 14:44:47 +0100 | [diff] [blame] | 394 | * Reminder: update MBEDTLS_KEY_EXCHANGE__xxx below |
Manuel Pégourié-Gonnard | d942323 | 2014-12-02 11:57:29 +0100 | [diff] [blame] | 395 | */ |
Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 396 | typedef enum { |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 397 | MBEDTLS_KEY_EXCHANGE_NONE = 0, |
| 398 | MBEDTLS_KEY_EXCHANGE_RSA, |
| 399 | MBEDTLS_KEY_EXCHANGE_DHE_RSA, |
| 400 | MBEDTLS_KEY_EXCHANGE_ECDHE_RSA, |
| 401 | MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA, |
| 402 | MBEDTLS_KEY_EXCHANGE_PSK, |
| 403 | MBEDTLS_KEY_EXCHANGE_DHE_PSK, |
| 404 | MBEDTLS_KEY_EXCHANGE_RSA_PSK, |
| 405 | MBEDTLS_KEY_EXCHANGE_ECDHE_PSK, |
| 406 | MBEDTLS_KEY_EXCHANGE_ECDH_RSA, |
| 407 | MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA, |
Manuel Pégourié-Gonnard | 557535d | 2015-09-15 17:53:32 +0200 | [diff] [blame] | 408 | MBEDTLS_KEY_EXCHANGE_ECJPAKE, |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 409 | } mbedtls_key_exchange_type_t; |
Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 410 | |
Manuel Pégourié-Gonnard | e5f3072 | 2015-10-22 17:01:15 +0200 | [diff] [blame] | 411 | /* Key exchanges using a certificate */ |
Manuel Pégourié-Gonnard | adeb7d8 | 2015-10-09 14:44:47 +0100 | [diff] [blame] | 412 | #if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) || \ |
| 413 | defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \ |
| 414 | defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \ |
| 415 | defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \ |
| 416 | defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED) || \ |
Manuel Pégourié-Gonnard | adeb7d8 | 2015-10-09 14:44:47 +0100 | [diff] [blame] | 417 | defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 418 | defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED) |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 419 | #define MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED |
Manuel Pégourié-Gonnard | d942323 | 2014-12-02 11:57:29 +0100 | [diff] [blame] | 420 | #endif |
| 421 | |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 422 | /* Key exchanges allowing client certificate requests */ |
| 423 | #if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) || \ |
| 424 | defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \ |
| 425 | defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \ |
| 426 | defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \ |
| 427 | defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED) || \ |
Markku-Juhani O. Saarinen | c06e101 | 2017-12-07 11:51:13 +0000 | [diff] [blame] | 428 | defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 429 | #define MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 430 | #endif |
| 431 | |
| 432 | /* Key exchanges involving server signature in ServerKeyExchange */ |
| 433 | #if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \ |
| 434 | defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \ |
| 435 | defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 436 | #define MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 437 | #endif |
| 438 | |
| 439 | /* Key exchanges using ECDH */ |
| 440 | #if defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \ |
| 441 | defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED) |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 442 | #define MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 443 | #endif |
| 444 | |
| 445 | /* Key exchanges that don't involve ephemeral keys */ |
| 446 | #if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) || \ |
| 447 | defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) || \ |
| 448 | defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED) || \ |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 449 | defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED) |
| 450 | #define MBEDTLS_KEY_EXCHANGE_SOME_NON_PFS_ENABLED |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 451 | #endif |
| 452 | |
| 453 | /* Key exchanges that involve ephemeral keys */ |
| 454 | #if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \ |
| 455 | defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED) || \ |
| 456 | defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \ |
| 457 | defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) || \ |
| 458 | defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \ |
| 459 | defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 460 | #define MBEDTLS_KEY_EXCHANGE_SOME_PFS_ENABLED |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 461 | #endif |
| 462 | |
Manuel Pégourié-Gonnard | e5f3072 | 2015-10-22 17:01:15 +0200 | [diff] [blame] | 463 | /* Key exchanges using a PSK */ |
Manuel Pégourié-Gonnard | adeb7d8 | 2015-10-09 14:44:47 +0100 | [diff] [blame] | 464 | #if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) || \ |
| 465 | defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED) || \ |
| 466 | defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED) || \ |
| 467 | defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 468 | #define MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED |
Manuel Pégourié-Gonnard | adeb7d8 | 2015-10-09 14:44:47 +0100 | [diff] [blame] | 469 | #endif |
| 470 | |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 471 | /* Key exchanges using DHE */ |
| 472 | #if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \ |
| 473 | defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED) |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 474 | #define MBEDTLS_KEY_EXCHANGE_SOME_DHE_ENABLED |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 475 | #endif |
| 476 | |
| 477 | /* Key exchanges using ECDHE */ |
Manuel Pégourié-Gonnard | adeb7d8 | 2015-10-09 14:44:47 +0100 | [diff] [blame] | 478 | #if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \ |
| 479 | defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \ |
| 480 | defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 481 | #define MBEDTLS_KEY_EXCHANGE_SOME_ECDHE_ENABLED |
Manuel Pégourié-Gonnard | adeb7d8 | 2015-10-09 14:44:47 +0100 | [diff] [blame] | 482 | #endif |
| 483 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 484 | typedef struct mbedtls_ssl_ciphersuite_t mbedtls_ssl_ciphersuite_t; |
Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 485 | |
Mateusz Starzyk | 16fec33 | 2021-07-22 16:43:35 +0200 | [diff] [blame^] | 486 | /** Weak ciphersuite flag */ |
| 487 | #define MBEDTLS_CIPHERSUITE_WEAK 0x01 |
| 488 | /** Short authentication tag, eg for CCM_8 */ |
| 489 | #define MBEDTLS_CIPHERSUITE_SHORT_TAG 0x02 |
| 490 | /** Can't be used with DTLS */ |
| 491 | #define MBEDTLS_CIPHERSUITE_NODTLS 0x04 |
Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 492 | |
| 493 | /** |
| 494 | * \brief This structure is used for storing ciphersuite information |
| 495 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 496 | struct mbedtls_ssl_ciphersuite_t |
Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 497 | { |
Mateusz Starzyk | 363eb29 | 2021-05-19 17:32:44 +0200 | [diff] [blame] | 498 | int MBEDTLS_PRIVATE(id); |
| 499 | const char * MBEDTLS_PRIVATE(name); |
Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 500 | |
Mateusz Starzyk | 363eb29 | 2021-05-19 17:32:44 +0200 | [diff] [blame] | 501 | mbedtls_cipher_type_t MBEDTLS_PRIVATE(cipher); |
| 502 | mbedtls_md_type_t MBEDTLS_PRIVATE(mac); |
| 503 | mbedtls_key_exchange_type_t MBEDTLS_PRIVATE(key_exchange); |
Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 504 | |
Mateusz Starzyk | 363eb29 | 2021-05-19 17:32:44 +0200 | [diff] [blame] | 505 | int MBEDTLS_PRIVATE(min_major_ver); |
| 506 | int MBEDTLS_PRIVATE(min_minor_ver); |
| 507 | int MBEDTLS_PRIVATE(max_major_ver); |
| 508 | int MBEDTLS_PRIVATE(max_minor_ver); |
Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 509 | |
Mateusz Starzyk | 363eb29 | 2021-05-19 17:32:44 +0200 | [diff] [blame] | 510 | unsigned char MBEDTLS_PRIVATE(flags); |
Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 511 | }; |
| 512 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 513 | const int *mbedtls_ssl_list_ciphersuites( void ); |
Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 514 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 515 | const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_string( const char *ciphersuite_name ); |
| 516 | const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_id( int ciphersuite_id ); |
Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 517 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 518 | #if defined(MBEDTLS_PK_C) |
| 519 | mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg( const mbedtls_ssl_ciphersuite_t *info ); |
Hanno Becker | 7e5437a | 2017-04-28 17:15:26 +0100 | [diff] [blame] | 520 | mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg( const mbedtls_ssl_ciphersuite_t *info ); |
Manuel Pégourié-Gonnard | 1a48383 | 2013-09-20 12:29:15 +0200 | [diff] [blame] | 521 | #endif |
Manuel Pégourié-Gonnard | 09edda8 | 2013-08-19 13:50:33 +0200 | [diff] [blame] | 522 | |
Hanno Becker | d300a57 | 2017-06-20 14:31:29 +0100 | [diff] [blame] | 523 | int mbedtls_ssl_ciphersuite_uses_ec( const mbedtls_ssl_ciphersuite_t *info ); |
| 524 | int mbedtls_ssl_ciphersuite_uses_psk( const mbedtls_ssl_ciphersuite_t *info ); |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 525 | |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 526 | #if defined(MBEDTLS_KEY_EXCHANGE_SOME_PFS_ENABLED) |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 527 | static inline int mbedtls_ssl_ciphersuite_has_pfs( const mbedtls_ssl_ciphersuite_t *info ) |
| 528 | { |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 529 | switch( info->MBEDTLS_PRIVATE(key_exchange) ) |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 530 | { |
| 531 | case MBEDTLS_KEY_EXCHANGE_DHE_RSA: |
| 532 | case MBEDTLS_KEY_EXCHANGE_DHE_PSK: |
| 533 | case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA: |
| 534 | case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK: |
| 535 | case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA: |
| 536 | case MBEDTLS_KEY_EXCHANGE_ECJPAKE: |
Mateusz Starzyk | e36f5b1 | 2021-07-22 16:43:35 +0200 | [diff] [blame] | 537 | return 1 ; |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 538 | |
| 539 | default: |
Mateusz Starzyk | e36f5b1 | 2021-07-22 16:43:35 +0200 | [diff] [blame] | 540 | return 0 ; |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 541 | } |
| 542 | } |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 543 | #endif /* MBEDTLS_KEY_EXCHANGE_SOME_PFS_ENABLED */ |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 544 | |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 545 | #if defined(MBEDTLS_KEY_EXCHANGE_SOME_NON_PFS_ENABLED) |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 546 | static inline int mbedtls_ssl_ciphersuite_no_pfs( const mbedtls_ssl_ciphersuite_t *info ) |
| 547 | { |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 548 | switch( info->MBEDTLS_PRIVATE(key_exchange) ) |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 549 | { |
| 550 | case MBEDTLS_KEY_EXCHANGE_ECDH_RSA: |
| 551 | case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA: |
| 552 | case MBEDTLS_KEY_EXCHANGE_RSA: |
| 553 | case MBEDTLS_KEY_EXCHANGE_PSK: |
| 554 | case MBEDTLS_KEY_EXCHANGE_RSA_PSK: |
Mateusz Starzyk | e36f5b1 | 2021-07-22 16:43:35 +0200 | [diff] [blame] | 555 | return 1 ; |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 556 | |
| 557 | default: |
Mateusz Starzyk | e36f5b1 | 2021-07-22 16:43:35 +0200 | [diff] [blame] | 558 | return 0 ; |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 559 | } |
| 560 | } |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 561 | #endif /* MBEDTLS_KEY_EXCHANGE_SOME_NON_PFS_ENABLED */ |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 562 | |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 563 | #if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED) |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 564 | static inline int mbedtls_ssl_ciphersuite_uses_ecdh( const mbedtls_ssl_ciphersuite_t *info ) |
| 565 | { |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 566 | switch( info->MBEDTLS_PRIVATE(key_exchange) ) |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 567 | { |
| 568 | case MBEDTLS_KEY_EXCHANGE_ECDH_RSA: |
| 569 | case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA: |
Mateusz Starzyk | e36f5b1 | 2021-07-22 16:43:35 +0200 | [diff] [blame] | 570 | return 1 ; |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 571 | |
| 572 | default: |
Mateusz Starzyk | e36f5b1 | 2021-07-22 16:43:35 +0200 | [diff] [blame] | 573 | return 0 ; |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 574 | } |
| 575 | } |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 576 | #endif /* MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED */ |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 577 | |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 578 | static inline int mbedtls_ssl_ciphersuite_cert_req_allowed( const mbedtls_ssl_ciphersuite_t *info ) |
| 579 | { |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 580 | switch( info->MBEDTLS_PRIVATE(key_exchange) ) |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 581 | { |
| 582 | case MBEDTLS_KEY_EXCHANGE_RSA: |
| 583 | case MBEDTLS_KEY_EXCHANGE_DHE_RSA: |
| 584 | case MBEDTLS_KEY_EXCHANGE_ECDH_RSA: |
| 585 | case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA: |
| 586 | case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA: |
| 587 | case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA: |
Mateusz Starzyk | e36f5b1 | 2021-07-22 16:43:35 +0200 | [diff] [blame] | 588 | return 1 ; |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 589 | |
| 590 | default: |
Mateusz Starzyk | e36f5b1 | 2021-07-22 16:43:35 +0200 | [diff] [blame] | 591 | return 0 ; |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 592 | } |
| 593 | } |
| 594 | |
Hanno Becker | 7177a88 | 2019-02-05 13:36:46 +0000 | [diff] [blame] | 595 | static inline int mbedtls_ssl_ciphersuite_uses_srv_cert( const mbedtls_ssl_ciphersuite_t *info ) |
| 596 | { |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 597 | switch( info->MBEDTLS_PRIVATE(key_exchange) ) |
Hanno Becker | 7177a88 | 2019-02-05 13:36:46 +0000 | [diff] [blame] | 598 | { |
| 599 | case MBEDTLS_KEY_EXCHANGE_RSA: |
| 600 | case MBEDTLS_KEY_EXCHANGE_RSA_PSK: |
| 601 | case MBEDTLS_KEY_EXCHANGE_DHE_RSA: |
| 602 | case MBEDTLS_KEY_EXCHANGE_ECDH_RSA: |
| 603 | case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA: |
| 604 | case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA: |
| 605 | case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA: |
Mateusz Starzyk | e36f5b1 | 2021-07-22 16:43:35 +0200 | [diff] [blame] | 606 | return 1 ; |
Hanno Becker | 7177a88 | 2019-02-05 13:36:46 +0000 | [diff] [blame] | 607 | |
| 608 | default: |
Mateusz Starzyk | e36f5b1 | 2021-07-22 16:43:35 +0200 | [diff] [blame] | 609 | return 0 ; |
Hanno Becker | 7177a88 | 2019-02-05 13:36:46 +0000 | [diff] [blame] | 610 | } |
| 611 | } |
| 612 | |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 613 | #if defined(MBEDTLS_KEY_EXCHANGE_SOME_DHE_ENABLED) |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 614 | static inline int mbedtls_ssl_ciphersuite_uses_dhe( const mbedtls_ssl_ciphersuite_t *info ) |
| 615 | { |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 616 | switch( info->MBEDTLS_PRIVATE(key_exchange) ) |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 617 | { |
| 618 | case MBEDTLS_KEY_EXCHANGE_DHE_RSA: |
| 619 | case MBEDTLS_KEY_EXCHANGE_DHE_PSK: |
Mateusz Starzyk | e36f5b1 | 2021-07-22 16:43:35 +0200 | [diff] [blame] | 620 | return 1 ; |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 621 | |
| 622 | default: |
Mateusz Starzyk | e36f5b1 | 2021-07-22 16:43:35 +0200 | [diff] [blame] | 623 | return 0 ; |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 624 | } |
| 625 | } |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 626 | #endif /* MBEDTLS_KEY_EXCHANGE_SOME_DHE_ENABLED) */ |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 627 | |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 628 | #if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDHE_ENABLED) |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 629 | static inline int mbedtls_ssl_ciphersuite_uses_ecdhe( const mbedtls_ssl_ciphersuite_t *info ) |
| 630 | { |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 631 | switch( info->MBEDTLS_PRIVATE(key_exchange) ) |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 632 | { |
| 633 | case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA: |
| 634 | case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA: |
| 635 | case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK: |
Mateusz Starzyk | e36f5b1 | 2021-07-22 16:43:35 +0200 | [diff] [blame] | 636 | return 1 ; |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 637 | |
| 638 | default: |
Mateusz Starzyk | e36f5b1 | 2021-07-22 16:43:35 +0200 | [diff] [blame] | 639 | return 0 ; |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 640 | } |
| 641 | } |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 642 | #endif /* MBEDTLS_KEY_EXCHANGE_SOME_ECDHE_ENABLED) */ |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 643 | |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 644 | #if defined(MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED) |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 645 | static inline int mbedtls_ssl_ciphersuite_uses_server_signature( const mbedtls_ssl_ciphersuite_t *info ) |
| 646 | { |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 647 | switch( info->MBEDTLS_PRIVATE(key_exchange) ) |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 648 | { |
| 649 | case MBEDTLS_KEY_EXCHANGE_DHE_RSA: |
| 650 | case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA: |
| 651 | case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA: |
Mateusz Starzyk | e36f5b1 | 2021-07-22 16:43:35 +0200 | [diff] [blame] | 652 | return 1 ; |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 653 | |
| 654 | default: |
Mateusz Starzyk | e36f5b1 | 2021-07-22 16:43:35 +0200 | [diff] [blame] | 655 | return 0 ; |
Hanno Becker | 1aa267c | 2017-04-28 17:08:27 +0100 | [diff] [blame] | 656 | } |
| 657 | } |
Gilles Peskine | eccd888 | 2020-03-10 12:19:08 +0100 | [diff] [blame] | 658 | #endif /* MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED */ |
Manuel Pégourié-Gonnard | 51451f8 | 2013-09-17 12:06:25 +0200 | [diff] [blame] | 659 | |
Paul Bakker | 68884e3 | 2013-01-07 18:20:04 +0100 | [diff] [blame] | 660 | #ifdef __cplusplus |
| 661 | } |
| 662 | #endif |
| 663 | |
| 664 | #endif /* ssl_ciphersuites.h */ |