blob: 843a0e4d19d9ba1fd4d247227f3a0e2ea56bceaf [file] [log] [blame]
Paul Bakker68884e32013-01-07 18:20:04 +01001/**
2 * \file ssl_ciphersuites.h
3 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief SSL Ciphersuites for mbed TLS
Darryl Greena40a1012018-01-05 15:33:17 +00005 */
6/*
Bence Szépkúti1e148272020-08-07 13:07:28 +02007 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02008 * SPDX-License-Identifier: Apache-2.0
9 *
10 * Licensed under the Apache License, Version 2.0 (the "License"); you may
11 * not use this file except in compliance with the License.
12 * You may obtain a copy of the License at
13 *
14 * http://www.apache.org/licenses/LICENSE-2.0
15 *
16 * Unless required by applicable law or agreed to in writing, software
17 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
18 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19 * See the License for the specific language governing permissions and
20 * limitations under the License.
Paul Bakker68884e32013-01-07 18:20:04 +010021 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020022#ifndef MBEDTLS_SSL_CIPHERSUITES_H
23#define MBEDTLS_SSL_CIPHERSUITES_H
Mateusz Starzyk846f0212021-05-19 19:44:07 +020024#include "mbedtls/private_access.h"
Paul Bakker68884e32013-01-07 18:20:04 +010025
Bence Szépkútic662b362021-05-27 11:25:03 +020026#include "mbedtls/build_info.h"
Ron Eldor8b0cf2e2018-02-14 16:02:41 +020027
Jaeden Amero6609aef2019-07-04 20:01:14 +010028#include "mbedtls/pk.h"
29#include "mbedtls/cipher.h"
30#include "mbedtls/md.h"
Paul Bakker68884e32013-01-07 18:20:04 +010031
32#ifdef __cplusplus
33extern "C" {
34#endif
35
Paul Bakker41c83d32013-03-20 14:39:14 +010036/*
37 * Supported ciphersuites (Official IANA names)
38 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020039#define MBEDTLS_TLS_RSA_WITH_NULL_MD5 0x01 /**< Weak! */
40#define MBEDTLS_TLS_RSA_WITH_NULL_SHA 0x02 /**< Weak! */
Paul Bakker41c83d32013-03-20 14:39:14 +010041
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020042#define MBEDTLS_TLS_PSK_WITH_NULL_SHA 0x2C /**< Weak! */
43#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA 0x2D /**< Weak! */
44#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA 0x2E /**< Weak! */
45#define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA 0x2F
Paul Bakker0c5fac22013-04-19 21:10:51 +020046
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020047#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA 0x33
48#define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA 0x35
49#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA 0x39
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020050
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020051#define MBEDTLS_TLS_RSA_WITH_NULL_SHA256 0x3B /**< Weak! */
52#define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 0x3C /**< TLS 1.2 */
53#define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 0x3D /**< TLS 1.2 */
Paul Bakker41c83d32013-03-20 14:39:14 +010054
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020055#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 0x41
56#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 0x45
Paul Bakker0c5fac22013-04-19 21:10:51 +020057
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020058#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 0x67 /**< TLS 1.2 */
59#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 0x6B /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +020060
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020061#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 0x84
62#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 0x88
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020063
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020064#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA 0x8C
65#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA 0x8D
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020066
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020067#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA 0x90
68#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA 0x91
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020069
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020070#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA 0x94
71#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA 0x95
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020072
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020073#define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 0x9C /**< TLS 1.2 */
74#define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 0x9D /**< TLS 1.2 */
75#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 0x9E /**< TLS 1.2 */
76#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 0x9F /**< TLS 1.2 */
Paul Bakker41c83d32013-03-20 14:39:14 +010077
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020078#define MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256 0xA8 /**< TLS 1.2 */
79#define MBEDTLS_TLS_PSK_WITH_AES_256_GCM_SHA384 0xA9 /**< TLS 1.2 */
80#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_GCM_SHA256 0xAA /**< TLS 1.2 */
81#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_GCM_SHA384 0xAB /**< TLS 1.2 */
82#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256 0xAC /**< TLS 1.2 */
83#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384 0xAD /**< TLS 1.2 */
Paul Bakker40afb4b2013-04-19 22:03:30 +020084
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020085#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA256 0xAE
86#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA384 0xAF
87#define MBEDTLS_TLS_PSK_WITH_NULL_SHA256 0xB0 /**< Weak! */
88#define MBEDTLS_TLS_PSK_WITH_NULL_SHA384 0xB1 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +020089
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020090#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256 0xB2
91#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384 0xB3
92#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA256 0xB4 /**< Weak! */
93#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA384 0xB5 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +020094
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020095#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256 0xB6
96#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384 0xB7
97#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA256 0xB8 /**< Weak! */
98#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA384 0xB9 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +020099
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200100#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xBA /**< TLS 1.2 */
101#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xBE /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200102
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200103#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC0 /**< TLS 1.2 */
104#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC4 /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200105
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200106#define MBEDTLS_TLS_ECDH_ECDSA_WITH_NULL_SHA 0xC001 /**< Weak! */
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100107#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA 0xC004
108#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA 0xC005
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +0100109
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200110#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_NULL_SHA 0xC006 /**< Weak! */
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100111#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA 0xC009
112#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA 0xC00A
Manuel Pégourié-Gonnard32ea60a2013-08-17 17:39:04 +0200113
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200114#define MBEDTLS_TLS_ECDH_RSA_WITH_NULL_SHA 0xC00B /**< Weak! */
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100115#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA 0xC00E
116#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA 0xC00F
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +0100117
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200118#define MBEDTLS_TLS_ECDHE_RSA_WITH_NULL_SHA 0xC010 /**< Weak! */
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100119#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 0xC013
120#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 0xC014
Paul Bakker41c83d32013-03-20 14:39:14 +0100121
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200122#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 0xC023 /**< TLS 1.2 */
123#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 0xC024 /**< TLS 1.2 */
124#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 0xC025 /**< TLS 1.2 */
125#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 0xC026 /**< TLS 1.2 */
126#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 0xC027 /**< TLS 1.2 */
127#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 0xC028 /**< TLS 1.2 */
128#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 0xC029 /**< TLS 1.2 */
129#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 0xC02A /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200130
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200131#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 0xC02B /**< TLS 1.2 */
132#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 0xC02C /**< TLS 1.2 */
133#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 0xC02D /**< TLS 1.2 */
134#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 0xC02E /**< TLS 1.2 */
135#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 0xC02F /**< TLS 1.2 */
136#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 0xC030 /**< TLS 1.2 */
137#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 0xC031 /**< TLS 1.2 */
138#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 0xC032 /**< TLS 1.2 */
Paul Bakkera54e4932013-03-20 15:31:54 +0100139
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100140#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA 0xC035
141#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA 0xC036
142#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 0xC037
143#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384 0xC038
144#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA 0xC039
145#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA256 0xC03A
146#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA384 0xC03B
Manuel Pégourié-Gonnard225d6aa2013-10-11 19:07:56 +0200147
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +0100148#define MBEDTLS_TLS_RSA_WITH_ARIA_128_CBC_SHA256 0xC03C /**< TLS 1.2 */
149#define MBEDTLS_TLS_RSA_WITH_ARIA_256_CBC_SHA384 0xC03D /**< TLS 1.2 */
150#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256 0xC044 /**< TLS 1.2 */
151#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384 0xC045 /**< TLS 1.2 */
152#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256 0xC048 /**< TLS 1.2 */
153#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384 0xC049 /**< TLS 1.2 */
154#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256 0xC04A /**< TLS 1.2 */
155#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384 0xC04B /**< TLS 1.2 */
156#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256 0xC04C /**< TLS 1.2 */
157#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384 0xC04D /**< TLS 1.2 */
158#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256 0xC04E /**< TLS 1.2 */
159#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384 0xC04F /**< TLS 1.2 */
160#define MBEDTLS_TLS_RSA_WITH_ARIA_128_GCM_SHA256 0xC050 /**< TLS 1.2 */
161#define MBEDTLS_TLS_RSA_WITH_ARIA_256_GCM_SHA384 0xC051 /**< TLS 1.2 */
162#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 0xC052 /**< TLS 1.2 */
163#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 0xC053 /**< TLS 1.2 */
164#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 0xC05C /**< TLS 1.2 */
165#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 0xC05D /**< TLS 1.2 */
166#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256 0xC05E /**< TLS 1.2 */
167#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384 0xC05F /**< TLS 1.2 */
168#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 0xC060 /**< TLS 1.2 */
169#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 0xC061 /**< TLS 1.2 */
170#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256 0xC062 /**< TLS 1.2 */
171#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384 0xC063 /**< TLS 1.2 */
172#define MBEDTLS_TLS_PSK_WITH_ARIA_128_CBC_SHA256 0xC064 /**< TLS 1.2 */
173#define MBEDTLS_TLS_PSK_WITH_ARIA_256_CBC_SHA384 0xC065 /**< TLS 1.2 */
174#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC066 /**< TLS 1.2 */
175#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC067 /**< TLS 1.2 */
176#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256 0xC068 /**< TLS 1.2 */
177#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384 0xC069 /**< TLS 1.2 */
178#define MBEDTLS_TLS_PSK_WITH_ARIA_128_GCM_SHA256 0xC06A /**< TLS 1.2 */
179#define MBEDTLS_TLS_PSK_WITH_ARIA_256_GCM_SHA384 0xC06B /**< TLS 1.2 */
180#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256 0xC06C /**< TLS 1.2 */
181#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384 0xC06D /**< TLS 1.2 */
182#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256 0xC06E /**< TLS 1.2 */
183#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384 0xC06F /**< TLS 1.2 */
184#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC070 /**< TLS 1.2 */
185#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC071 /**< TLS 1.2 */
Markku-Juhani O. Saarinenc06e1012017-12-07 11:51:13 +0000186
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100187#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC072
188#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC073
189#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC074
190#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC075
191#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC076
192#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC077
193#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC078
194#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC079
Paul Bakker27714b12013-04-07 23:07:12 +0200195
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200196#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC07A /**< TLS 1.2 */
197#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC07B /**< TLS 1.2 */
198#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC07C /**< TLS 1.2 */
199#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC07D /**< TLS 1.2 */
200#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC086 /**< TLS 1.2 */
201#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC087 /**< TLS 1.2 */
202#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC088 /**< TLS 1.2 */
203#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC089 /**< TLS 1.2 */
204#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC08A /**< TLS 1.2 */
205#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC08B /**< TLS 1.2 */
206#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC08C /**< TLS 1.2 */
207#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC08D /**< TLS 1.2 */
Manuel Pégourié-Gonnard8d01eea2013-10-24 19:49:07 +0200208
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200209#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC08E /**< TLS 1.2 */
210#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC08F /**< TLS 1.2 */
211#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC090 /**< TLS 1.2 */
212#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC091 /**< TLS 1.2 */
213#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC092 /**< TLS 1.2 */
214#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC093 /**< TLS 1.2 */
Manuel Pégourié-Gonnard8d01eea2013-10-24 19:49:07 +0200215
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200216#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC094
217#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC095
218#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC096
219#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC097
220#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC098
221#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC099
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100222#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC09A
223#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC09B
Paul Bakker0f2f0bf2013-07-26 15:03:31 +0200224
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200225#define MBEDTLS_TLS_RSA_WITH_AES_128_CCM 0xC09C /**< TLS 1.2 */
226#define MBEDTLS_TLS_RSA_WITH_AES_256_CCM 0xC09D /**< TLS 1.2 */
227#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM 0xC09E /**< TLS 1.2 */
228#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM 0xC09F /**< TLS 1.2 */
229#define MBEDTLS_TLS_RSA_WITH_AES_128_CCM_8 0xC0A0 /**< TLS 1.2 */
230#define MBEDTLS_TLS_RSA_WITH_AES_256_CCM_8 0xC0A1 /**< TLS 1.2 */
231#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM_8 0xC0A2 /**< TLS 1.2 */
232#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM_8 0xC0A3 /**< TLS 1.2 */
233#define MBEDTLS_TLS_PSK_WITH_AES_128_CCM 0xC0A4 /**< TLS 1.2 */
234#define MBEDTLS_TLS_PSK_WITH_AES_256_CCM 0xC0A5 /**< TLS 1.2 */
235#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM 0xC0A6 /**< TLS 1.2 */
236#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM 0xC0A7 /**< TLS 1.2 */
237#define MBEDTLS_TLS_PSK_WITH_AES_128_CCM_8 0xC0A8 /**< TLS 1.2 */
238#define MBEDTLS_TLS_PSK_WITH_AES_256_CCM_8 0xC0A9 /**< TLS 1.2 */
239#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM_8 0xC0AA /**< TLS 1.2 */
240#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM_8 0xC0AB /**< TLS 1.2 */
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200241/* The last two are named with PSK_DHE in the RFC, which looks like a typo */
242
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200243#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM 0xC0AC /**< TLS 1.2 */
244#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM 0xC0AD /**< TLS 1.2 */
245#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 0xC0AE /**< TLS 1.2 */
246#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 0xC0AF /**< TLS 1.2 */
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200247
Manuel Pégourié-Gonnard538cb7b2015-09-15 18:03:28 +0200248#define MBEDTLS_TLS_ECJPAKE_WITH_AES_128_CCM_8 0xC0FF /**< experimental */
249
Manuel Pégourié-Gonnardce66d5e2018-06-14 11:11:15 +0200250/* RFC 7905 */
251#define MBEDTLS_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA8 /**< TLS 1.2 */
252#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA9 /**< TLS 1.2 */
253#define MBEDTLS_TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 0xCCAA /**< TLS 1.2 */
254#define MBEDTLS_TLS_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAB /**< TLS 1.2 */
255#define MBEDTLS_TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAC /**< TLS 1.2 */
256#define MBEDTLS_TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAD /**< TLS 1.2 */
257#define MBEDTLS_TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAE /**< TLS 1.2 */
258
Hanno Becker8ca26922021-07-23 19:24:23 +0100259/* RFC 8446, Appendix B.4 */
260#define MBEDTLS_TLS1_3_AES_128_GCM_SHA256 0x1301 /**< TLS 1.3 */
261#define MBEDTLS_TLS1_3_AES_256_GCM_SHA384 0x1302 /**< TLS 1.3 */
262#define MBEDTLS_TLS1_3_CHACHA20_POLY1305_SHA256 0x1303 /**< TLS 1.3 */
263#define MBEDTLS_TLS1_3_AES_128_CCM_SHA256 0x1304 /**< TLS 1.3 */
264#define MBEDTLS_TLS1_3_AES_128_CCM_8_SHA256 0x1305 /**< TLS 1.3 */
265
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200266/* Reminder: update mbedtls_ssl_premaster_secret when adding a new key exchange.
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100267 * Reminder: update MBEDTLS_KEY_EXCHANGE__xxx below
Manuel Pégourié-Gonnardd9423232014-12-02 11:57:29 +0100268 */
Paul Bakker68884e32013-01-07 18:20:04 +0100269typedef enum {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200270 MBEDTLS_KEY_EXCHANGE_NONE = 0,
271 MBEDTLS_KEY_EXCHANGE_RSA,
272 MBEDTLS_KEY_EXCHANGE_DHE_RSA,
273 MBEDTLS_KEY_EXCHANGE_ECDHE_RSA,
274 MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA,
275 MBEDTLS_KEY_EXCHANGE_PSK,
276 MBEDTLS_KEY_EXCHANGE_DHE_PSK,
277 MBEDTLS_KEY_EXCHANGE_RSA_PSK,
278 MBEDTLS_KEY_EXCHANGE_ECDHE_PSK,
279 MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
280 MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
Manuel Pégourié-Gonnard557535d2015-09-15 17:53:32 +0200281 MBEDTLS_KEY_EXCHANGE_ECJPAKE,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200282} mbedtls_key_exchange_type_t;
Paul Bakker68884e32013-01-07 18:20:04 +0100283
Manuel Pégourié-Gonnarde5f30722015-10-22 17:01:15 +0200284/* Key exchanges using a certificate */
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100285#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) || \
286 defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
287 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
288 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
289 defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED) || \
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100290 defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200291 defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100292#define MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED
Manuel Pégourié-Gonnardd9423232014-12-02 11:57:29 +0100293#endif
294
Valerio Setti2430a702023-07-13 17:22:51 +0200295#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
296 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED)
297#define MBEDTLS_KEY_EXCHANGE_WITH_ECDSA_ANY_ENABLED
298#endif
299
Ronald Crone68ab4f2022-10-05 12:46:29 +0200300#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) || \
301 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED)
302#define MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED
303#endif
304
Hanno Becker1aa267c2017-04-28 17:08:27 +0100305/* Key exchanges allowing client certificate requests */
306#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) || \
307 defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
308 defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
309 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
310 defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED) || \
Markku-Juhani O. Saarinenc06e1012017-12-07 11:51:13 +0000311 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100312#define MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100313#endif
314
Valerio Setti2430a702023-07-13 17:22:51 +0200315/* Helper to state that certificated based client authentication through ECDSA
316 * is supported in TLS 1.2 */
317#if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED) && \
318 defined(MBEDTLS_PK_CAN_ECDSA_SIGN) && defined(MBEDTLS_PK_CAN_ECDSA_VERIFY)
319#define MBEDTLS_KEY_EXCHANGE_ECDSA_CERT_REQ_ALLOWED_ENABLED
320#endif
321
Hanno Becker1aa267c2017-04-28 17:08:27 +0100322/* Key exchanges involving server signature in ServerKeyExchange */
323#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
324 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
325 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100326#define MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100327#endif
328
329/* Key exchanges using ECDH */
330#if defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
331 defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100332#define MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100333#endif
334
335/* Key exchanges that don't involve ephemeral keys */
336#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) || \
337 defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) || \
338 defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED) || \
Gilles Peskineeccd8882020-03-10 12:19:08 +0100339 defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED)
340#define MBEDTLS_KEY_EXCHANGE_SOME_NON_PFS_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100341#endif
342
343/* Key exchanges that involve ephemeral keys */
344#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
345 defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED) || \
346 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
347 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) || \
348 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
349 defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100350#define MBEDTLS_KEY_EXCHANGE_SOME_PFS_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100351#endif
352
Manuel Pégourié-Gonnarde5f30722015-10-22 17:01:15 +0200353/* Key exchanges using a PSK */
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100354#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) || \
355 defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED) || \
356 defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED) || \
357 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100358#define MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100359#endif
360
Hanno Becker1aa267c2017-04-28 17:08:27 +0100361/* Key exchanges using DHE */
362#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
363 defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100364#define MBEDTLS_KEY_EXCHANGE_SOME_DHE_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100365#endif
366
367/* Key exchanges using ECDHE */
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100368#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
369 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
370 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100371#define MBEDTLS_KEY_EXCHANGE_SOME_ECDHE_ENABLED
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100372#endif
373
Valerio Settied365e62023-07-07 15:02:27 +0200374/* TLS 1.2 key exchanges using ECDH or ECDHE*/
Valerio Setti00dc4062023-07-05 18:48:43 +0200375#if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED) || \
376 defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDHE_ENABLED)
377#define MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_1_2_ENABLED
378#endif
379
Valerio Setti0a0d0d52023-07-07 15:12:45 +0200380/* TLS 1.3 PSK key exchanges */
381#if defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_ENABLED) || \
382 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED)
383#define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_PSK_ENABLED
384#endif
385
386/* TLS 1.2 or 1.3 key exchanges with PSK */
387#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED) || \
388 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_PSK_ENABLED)
389#define MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED
390#endif
391
392/* TLS 1.3 ephemeral key exchanges */
393#if defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED) || \
394 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED)
395#define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_EPHEMERAL_ENABLED
396#endif
397
Valerio Settiea59c432023-07-25 11:14:03 +0200398/* TLS 1.3 key exchanges using ECDHE */
Valerio Settied365e62023-07-07 15:02:27 +0200399#if defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_EPHEMERAL_ENABLED) && \
400 defined(PSA_WANT_ALG_ECDH)
401#define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_ECDHE_ENABLED
402#endif
403
404/* TLS 1.2 or 1.3 key exchanges using ECDH or ECDHE */
Valerio Setti00dc4062023-07-05 18:48:43 +0200405#if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_1_2_ENABLED) || \
Valerio Settied365e62023-07-07 15:02:27 +0200406 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_ECDHE_ENABLED)
Valerio Settie87915b2023-07-06 12:47:43 +0200407#define MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_ANY_ENABLED
408#endif
409
Valerio Settied365e62023-07-07 15:02:27 +0200410/* TLS 1.2 XXDH key exchanges: ECDH or ECDHE or FFDH */
411#if (defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_1_2_ENABLED) || \
412 defined(MBEDTLS_KEY_EXCHANGE_SOME_DHE_ENABLED))
413#define MBEDTLS_KEY_EXCHANGE_SOME_XXDH_1_2_ENABLED
Valerio Setti00dc4062023-07-05 18:48:43 +0200414#endif
415
Valerio Setti9cd80112023-07-25 12:04:21 +0200416/* The handshake params structure has a set of fields called xxdh_psa which are used:
417 * - by TLS 1.2 with `USE_PSA` to do ECDH or ECDHE;
418 * - by TLS 1.3 to do ECDHE or FFDHE.
419 * The following macros can be used to guard their declaration and use.
420 */
421#if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_1_2_ENABLED) && \
422 defined(MBEDTLS_USE_PSA_CRYPTO)
423#define MBEDTLS_KEY_EXCHANGE_SOME_XXDH_PSA_1_2_ENABLED
424#endif
425#if defined(MBEDTLS_KEY_EXCHANGE_SOME_XXDH_PSA_1_2_ENABLED) || \
Valerio Setti3d237b52023-07-07 16:00:20 +0200426 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_EPHEMERAL_ENABLED)
Valerio Settiea59c432023-07-25 11:14:03 +0200427#define MBEDTLS_KEY_EXCHANGE_SOME_XXDH_PSA_ANY_ENABLED
Valerio Setti3d237b52023-07-07 16:00:20 +0200428#endif
429
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200430typedef struct mbedtls_ssl_ciphersuite_t mbedtls_ssl_ciphersuite_t;
Paul Bakker68884e32013-01-07 18:20:04 +0100431
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200432#define MBEDTLS_CIPHERSUITE_WEAK 0x01 /**< Weak ciphersuite flag */
433#define MBEDTLS_CIPHERSUITE_SHORT_TAG 0x02 /**< Short authentication tag,
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200434 eg for CCM_8 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200435#define MBEDTLS_CIPHERSUITE_NODTLS 0x04 /**< Can't be used with DTLS */
Paul Bakker68884e32013-01-07 18:20:04 +0100436
437/**
438 * \brief This structure is used for storing ciphersuite information
Glenn Strauss60bfe602022-03-14 19:04:24 -0400439 *
440 * \note members are defined using integral types instead of enums
441 * in order to pack structure and reduce memory usage by internal
442 * \c ciphersuite_definitions[]
Paul Bakker68884e32013-01-07 18:20:04 +0100443 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100444struct mbedtls_ssl_ciphersuite_t {
Mateusz Starzyk363eb292021-05-19 17:32:44 +0200445 int MBEDTLS_PRIVATE(id);
Gilles Peskine449bd832023-01-11 14:50:10 +0100446 const char *MBEDTLS_PRIVATE(name);
Paul Bakker68884e32013-01-07 18:20:04 +0100447
Glenn Strauss60bfe602022-03-14 19:04:24 -0400448 uint8_t MBEDTLS_PRIVATE(cipher); /* mbedtls_cipher_type_t */
449 uint8_t MBEDTLS_PRIVATE(mac); /* mbedtls_md_type_t */
450 uint8_t MBEDTLS_PRIVATE(key_exchange); /* mbedtls_key_exchange_type_t */
451 uint8_t MBEDTLS_PRIVATE(flags);
Paul Bakker68884e32013-01-07 18:20:04 +0100452
Glenn Strauss60bfe602022-03-14 19:04:24 -0400453 uint16_t MBEDTLS_PRIVATE(min_tls_version); /* mbedtls_ssl_protocol_version */
454 uint16_t MBEDTLS_PRIVATE(max_tls_version); /* mbedtls_ssl_protocol_version */
Paul Bakker68884e32013-01-07 18:20:04 +0100455};
456
Gilles Peskine449bd832023-01-11 14:50:10 +0100457const int *mbedtls_ssl_list_ciphersuites(void);
Paul Bakker68884e32013-01-07 18:20:04 +0100458
Gilles Peskine449bd832023-01-11 14:50:10 +0100459const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_string(const char *ciphersuite_name);
460const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_id(int ciphersuite_id);
Paul Bakker68884e32013-01-07 18:20:04 +0100461
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200462#if defined(MBEDTLS_PK_C)
Gilles Peskine449bd832023-01-11 14:50:10 +0100463mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg(const mbedtls_ssl_ciphersuite_t *info);
Neil Armstrong0c9c10a2022-05-12 14:15:06 +0200464#if defined(MBEDTLS_USE_PSA_CRYPTO)
Gilles Peskine449bd832023-01-11 14:50:10 +0100465psa_algorithm_t mbedtls_ssl_get_ciphersuite_sig_pk_psa_alg(const mbedtls_ssl_ciphersuite_t *info);
466psa_key_usage_t mbedtls_ssl_get_ciphersuite_sig_pk_psa_usage(const mbedtls_ssl_ciphersuite_t *info);
Neil Armstrong0c9c10a2022-05-12 14:15:06 +0200467#endif
Gilles Peskine449bd832023-01-11 14:50:10 +0100468mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg(const mbedtls_ssl_ciphersuite_t *info);
Manuel Pégourié-Gonnard1a483832013-09-20 12:29:15 +0200469#endif
Manuel Pégourié-Gonnard09edda82013-08-19 13:50:33 +0200470
Gilles Peskine449bd832023-01-11 14:50:10 +0100471int mbedtls_ssl_ciphersuite_uses_ec(const mbedtls_ssl_ciphersuite_t *info);
472int mbedtls_ssl_ciphersuite_uses_psk(const mbedtls_ssl_ciphersuite_t *info);
Hanno Becker1aa267c2017-04-28 17:08:27 +0100473
Gilles Peskine449bd832023-01-11 14:50:10 +0100474static inline const char *mbedtls_ssl_ciphersuite_get_name(const mbedtls_ssl_ciphersuite_t *info)
Glenn Strauss8f526902022-01-13 00:04:49 -0500475{
476 return info->MBEDTLS_PRIVATE(name);
477}
478
Gilles Peskine449bd832023-01-11 14:50:10 +0100479size_t mbedtls_ssl_ciphersuite_get_cipher_key_bitlen(const mbedtls_ssl_ciphersuite_t *info);
Glenn Strauss8f526902022-01-13 00:04:49 -0500480
Gilles Peskineeccd8882020-03-10 12:19:08 +0100481#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PFS_ENABLED)
Gilles Peskine449bd832023-01-11 14:50:10 +0100482static inline int mbedtls_ssl_ciphersuite_has_pfs(const mbedtls_ssl_ciphersuite_t *info)
Hanno Becker1aa267c2017-04-28 17:08:27 +0100483{
Gilles Peskine449bd832023-01-11 14:50:10 +0100484 switch (info->MBEDTLS_PRIVATE(key_exchange)) {
Hanno Becker1aa267c2017-04-28 17:08:27 +0100485 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
486 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
487 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
488 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
489 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
490 case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
Gilles Peskine449bd832023-01-11 14:50:10 +0100491 return 1;
Hanno Becker1aa267c2017-04-28 17:08:27 +0100492
493 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100494 return 0;
Hanno Becker1aa267c2017-04-28 17:08:27 +0100495 }
496}
Gilles Peskineeccd8882020-03-10 12:19:08 +0100497#endif /* MBEDTLS_KEY_EXCHANGE_SOME_PFS_ENABLED */
Hanno Becker1aa267c2017-04-28 17:08:27 +0100498
Gilles Peskineeccd8882020-03-10 12:19:08 +0100499#if defined(MBEDTLS_KEY_EXCHANGE_SOME_NON_PFS_ENABLED)
Gilles Peskine449bd832023-01-11 14:50:10 +0100500static inline int mbedtls_ssl_ciphersuite_no_pfs(const mbedtls_ssl_ciphersuite_t *info)
Hanno Becker1aa267c2017-04-28 17:08:27 +0100501{
Gilles Peskine449bd832023-01-11 14:50:10 +0100502 switch (info->MBEDTLS_PRIVATE(key_exchange)) {
Hanno Becker1aa267c2017-04-28 17:08:27 +0100503 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
504 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
505 case MBEDTLS_KEY_EXCHANGE_RSA:
506 case MBEDTLS_KEY_EXCHANGE_PSK:
507 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
Gilles Peskine449bd832023-01-11 14:50:10 +0100508 return 1;
Hanno Becker1aa267c2017-04-28 17:08:27 +0100509
510 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100511 return 0;
Hanno Becker1aa267c2017-04-28 17:08:27 +0100512 }
513}
Gilles Peskineeccd8882020-03-10 12:19:08 +0100514#endif /* MBEDTLS_KEY_EXCHANGE_SOME_NON_PFS_ENABLED */
Hanno Becker1aa267c2017-04-28 17:08:27 +0100515
Gilles Peskineeccd8882020-03-10 12:19:08 +0100516#if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED)
Gilles Peskine449bd832023-01-11 14:50:10 +0100517static inline int mbedtls_ssl_ciphersuite_uses_ecdh(const mbedtls_ssl_ciphersuite_t *info)
Hanno Becker1aa267c2017-04-28 17:08:27 +0100518{
Gilles Peskine449bd832023-01-11 14:50:10 +0100519 switch (info->MBEDTLS_PRIVATE(key_exchange)) {
Hanno Becker1aa267c2017-04-28 17:08:27 +0100520 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
521 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
Gilles Peskine449bd832023-01-11 14:50:10 +0100522 return 1;
Hanno Becker1aa267c2017-04-28 17:08:27 +0100523
524 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100525 return 0;
Hanno Becker1aa267c2017-04-28 17:08:27 +0100526 }
527}
Gilles Peskineeccd8882020-03-10 12:19:08 +0100528#endif /* MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED */
Hanno Becker1aa267c2017-04-28 17:08:27 +0100529
Gilles Peskine449bd832023-01-11 14:50:10 +0100530static inline int mbedtls_ssl_ciphersuite_cert_req_allowed(const mbedtls_ssl_ciphersuite_t *info)
Hanno Becker1aa267c2017-04-28 17:08:27 +0100531{
Gilles Peskine449bd832023-01-11 14:50:10 +0100532 switch (info->MBEDTLS_PRIVATE(key_exchange)) {
Hanno Becker1aa267c2017-04-28 17:08:27 +0100533 case MBEDTLS_KEY_EXCHANGE_RSA:
534 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
535 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
536 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
537 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
538 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
Gilles Peskine449bd832023-01-11 14:50:10 +0100539 return 1;
Hanno Becker1aa267c2017-04-28 17:08:27 +0100540
541 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100542 return 0;
Hanno Becker1aa267c2017-04-28 17:08:27 +0100543 }
544}
545
Gilles Peskine449bd832023-01-11 14:50:10 +0100546static inline int mbedtls_ssl_ciphersuite_uses_srv_cert(const mbedtls_ssl_ciphersuite_t *info)
Hanno Becker7177a882019-02-05 13:36:46 +0000547{
Gilles Peskine449bd832023-01-11 14:50:10 +0100548 switch (info->MBEDTLS_PRIVATE(key_exchange)) {
Hanno Becker7177a882019-02-05 13:36:46 +0000549 case MBEDTLS_KEY_EXCHANGE_RSA:
550 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
551 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
552 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
553 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
554 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
555 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
Gilles Peskine449bd832023-01-11 14:50:10 +0100556 return 1;
Hanno Becker7177a882019-02-05 13:36:46 +0000557
558 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100559 return 0;
Hanno Becker7177a882019-02-05 13:36:46 +0000560 }
561}
562
Gilles Peskineeccd8882020-03-10 12:19:08 +0100563#if defined(MBEDTLS_KEY_EXCHANGE_SOME_DHE_ENABLED)
Gilles Peskine449bd832023-01-11 14:50:10 +0100564static inline int mbedtls_ssl_ciphersuite_uses_dhe(const mbedtls_ssl_ciphersuite_t *info)
Hanno Becker1aa267c2017-04-28 17:08:27 +0100565{
Gilles Peskine449bd832023-01-11 14:50:10 +0100566 switch (info->MBEDTLS_PRIVATE(key_exchange)) {
Hanno Becker1aa267c2017-04-28 17:08:27 +0100567 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
568 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
Gilles Peskine449bd832023-01-11 14:50:10 +0100569 return 1;
Hanno Becker1aa267c2017-04-28 17:08:27 +0100570
571 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100572 return 0;
Hanno Becker1aa267c2017-04-28 17:08:27 +0100573 }
574}
Gilles Peskineeccd8882020-03-10 12:19:08 +0100575#endif /* MBEDTLS_KEY_EXCHANGE_SOME_DHE_ENABLED) */
Hanno Becker1aa267c2017-04-28 17:08:27 +0100576
Gilles Peskineeccd8882020-03-10 12:19:08 +0100577#if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDHE_ENABLED)
Gilles Peskine449bd832023-01-11 14:50:10 +0100578static inline int mbedtls_ssl_ciphersuite_uses_ecdhe(const mbedtls_ssl_ciphersuite_t *info)
Hanno Becker1aa267c2017-04-28 17:08:27 +0100579{
Gilles Peskine449bd832023-01-11 14:50:10 +0100580 switch (info->MBEDTLS_PRIVATE(key_exchange)) {
Hanno Becker1aa267c2017-04-28 17:08:27 +0100581 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
582 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
583 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
Gilles Peskine449bd832023-01-11 14:50:10 +0100584 return 1;
Hanno Becker1aa267c2017-04-28 17:08:27 +0100585
586 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100587 return 0;
Hanno Becker1aa267c2017-04-28 17:08:27 +0100588 }
589}
Gilles Peskineeccd8882020-03-10 12:19:08 +0100590#endif /* MBEDTLS_KEY_EXCHANGE_SOME_ECDHE_ENABLED) */
Hanno Becker1aa267c2017-04-28 17:08:27 +0100591
Gilles Peskineeccd8882020-03-10 12:19:08 +0100592#if defined(MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED)
Gilles Peskine449bd832023-01-11 14:50:10 +0100593static inline int mbedtls_ssl_ciphersuite_uses_server_signature(
594 const mbedtls_ssl_ciphersuite_t *info)
Hanno Becker1aa267c2017-04-28 17:08:27 +0100595{
Gilles Peskine449bd832023-01-11 14:50:10 +0100596 switch (info->MBEDTLS_PRIVATE(key_exchange)) {
Hanno Becker1aa267c2017-04-28 17:08:27 +0100597 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
598 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
599 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
Gilles Peskine449bd832023-01-11 14:50:10 +0100600 return 1;
Hanno Becker1aa267c2017-04-28 17:08:27 +0100601
602 default:
Gilles Peskine449bd832023-01-11 14:50:10 +0100603 return 0;
Hanno Becker1aa267c2017-04-28 17:08:27 +0100604 }
605}
Gilles Peskineeccd8882020-03-10 12:19:08 +0100606#endif /* MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED */
Manuel Pégourié-Gonnard51451f82013-09-17 12:06:25 +0200607
Paul Bakker68884e32013-01-07 18:20:04 +0100608#ifdef __cplusplus
609}
610#endif
611
612#endif /* ssl_ciphersuites.h */