blob: a7bf90434c161a1ccbe6db6de418df40f6866a2a [file] [log] [blame]
Paul Bakker68884e32013-01-07 18:20:04 +01001/**
2 * \file ssl_ciphersuites.h
3 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief SSL Ciphersuites for mbed TLS
Darryl Greena40a1012018-01-05 15:33:17 +00005 */
6/*
Manuel Pégourié-Gonnard6fb81872015-07-27 11:11:48 +02007 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02008 * SPDX-License-Identifier: Apache-2.0
9 *
10 * Licensed under the Apache License, Version 2.0 (the "License"); you may
11 * not use this file except in compliance with the License.
12 * You may obtain a copy of the License at
13 *
14 * http://www.apache.org/licenses/LICENSE-2.0
15 *
16 * Unless required by applicable law or agreed to in writing, software
17 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
18 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19 * See the License for the specific language governing permissions and
20 * limitations under the License.
Paul Bakker68884e32013-01-07 18:20:04 +010021 *
Manuel Pégourié-Gonnardfe446432015-03-06 13:17:10 +000022 * This file is part of mbed TLS (https://tls.mbed.org)
Paul Bakker68884e32013-01-07 18:20:04 +010023 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020024#ifndef MBEDTLS_SSL_CIPHERSUITES_H
25#define MBEDTLS_SSL_CIPHERSUITES_H
Paul Bakker68884e32013-01-07 18:20:04 +010026
Ron Eldor8b0cf2e2018-02-14 16:02:41 +020027#if !defined(MBEDTLS_CONFIG_FILE)
28#include "config.h"
29#else
30#include MBEDTLS_CONFIG_FILE
31#endif
32
Manuel Pégourié-Gonnard09edda82013-08-19 13:50:33 +020033#include "pk.h"
Paul Bakker68884e32013-01-07 18:20:04 +010034#include "cipher.h"
35#include "md.h"
Hanno Beckerb09132d2019-06-26 10:53:02 +010036#include "ssl.h"
Hanno Becker67fb16e2019-06-28 11:39:22 +010037#include <string.h>
Paul Bakker68884e32013-01-07 18:20:04 +010038
39#ifdef __cplusplus
40extern "C" {
41#endif
42
Paul Bakker41c83d32013-03-20 14:39:14 +010043/*
44 * Supported ciphersuites (Official IANA names)
45 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020046#define MBEDTLS_TLS_RSA_WITH_NULL_MD5 0x01 /**< Weak! */
47#define MBEDTLS_TLS_RSA_WITH_NULL_SHA 0x02 /**< Weak! */
Paul Bakker41c83d32013-03-20 14:39:14 +010048
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020049#define MBEDTLS_TLS_RSA_WITH_RC4_128_MD5 0x04
50#define MBEDTLS_TLS_RSA_WITH_RC4_128_SHA 0x05
51#define MBEDTLS_TLS_RSA_WITH_DES_CBC_SHA 0x09 /**< Weak! Not in TLS 1.2 */
Paul Bakker41c83d32013-03-20 14:39:14 +010052
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020053#define MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA 0x0A
Paul Bakker0c5fac22013-04-19 21:10:51 +020054
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020055#define MBEDTLS_TLS_DHE_RSA_WITH_DES_CBC_SHA 0x15 /**< Weak! Not in TLS 1.2 */
56#define MBEDTLS_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 0x16
Paul Bakker41c83d32013-03-20 14:39:14 +010057
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020058#define MBEDTLS_TLS_PSK_WITH_NULL_SHA 0x2C /**< Weak! */
59#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA 0x2D /**< Weak! */
60#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA 0x2E /**< Weak! */
61#define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA 0x2F
Paul Bakker0c5fac22013-04-19 21:10:51 +020062
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020063#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA 0x33
64#define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA 0x35
65#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA 0x39
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020066
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020067#define MBEDTLS_TLS_RSA_WITH_NULL_SHA256 0x3B /**< Weak! */
68#define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 0x3C /**< TLS 1.2 */
69#define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 0x3D /**< TLS 1.2 */
Paul Bakker41c83d32013-03-20 14:39:14 +010070
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020071#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 0x41
72#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 0x45
Paul Bakker0c5fac22013-04-19 21:10:51 +020073
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020074#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 0x67 /**< TLS 1.2 */
75#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 0x6B /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +020076
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020077#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 0x84
78#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 0x88
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020079
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020080#define MBEDTLS_TLS_PSK_WITH_RC4_128_SHA 0x8A
81#define MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA 0x8B
82#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA 0x8C
83#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA 0x8D
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020084
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020085#define MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA 0x8E
86#define MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA 0x8F
87#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA 0x90
88#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA 0x91
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020089
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020090#define MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA 0x92
91#define MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA 0x93
92#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA 0x94
93#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA 0x95
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020094
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020095#define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 0x9C /**< TLS 1.2 */
96#define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 0x9D /**< TLS 1.2 */
97#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 0x9E /**< TLS 1.2 */
98#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 0x9F /**< TLS 1.2 */
Paul Bakker41c83d32013-03-20 14:39:14 +010099
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200100#define MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256 0xA8 /**< TLS 1.2 */
101#define MBEDTLS_TLS_PSK_WITH_AES_256_GCM_SHA384 0xA9 /**< TLS 1.2 */
102#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_GCM_SHA256 0xAA /**< TLS 1.2 */
103#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_GCM_SHA384 0xAB /**< TLS 1.2 */
104#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256 0xAC /**< TLS 1.2 */
105#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384 0xAD /**< TLS 1.2 */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200106
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200107#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA256 0xAE
108#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA384 0xAF
109#define MBEDTLS_TLS_PSK_WITH_NULL_SHA256 0xB0 /**< Weak! */
110#define MBEDTLS_TLS_PSK_WITH_NULL_SHA384 0xB1 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200111
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200112#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256 0xB2
113#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384 0xB3
114#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA256 0xB4 /**< Weak! */
115#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA384 0xB5 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200116
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200117#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256 0xB6
118#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384 0xB7
119#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA256 0xB8 /**< Weak! */
120#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA384 0xB9 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200121
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200122#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xBA /**< TLS 1.2 */
123#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xBE /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200124
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200125#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC0 /**< TLS 1.2 */
126#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC4 /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200127
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200128#define MBEDTLS_TLS_ECDH_ECDSA_WITH_NULL_SHA 0xC001 /**< Weak! */
129#define MBEDTLS_TLS_ECDH_ECDSA_WITH_RC4_128_SHA 0xC002 /**< Not in SSL3! */
130#define MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA 0xC003 /**< Not in SSL3! */
131#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA 0xC004 /**< Not in SSL3! */
132#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA 0xC005 /**< Not in SSL3! */
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +0100133
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200134#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_NULL_SHA 0xC006 /**< Weak! */
135#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA 0xC007 /**< Not in SSL3! */
136#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA 0xC008 /**< Not in SSL3! */
137#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA 0xC009 /**< Not in SSL3! */
138#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA 0xC00A /**< Not in SSL3! */
Manuel Pégourié-Gonnard32ea60a2013-08-17 17:39:04 +0200139
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200140#define MBEDTLS_TLS_ECDH_RSA_WITH_NULL_SHA 0xC00B /**< Weak! */
141#define MBEDTLS_TLS_ECDH_RSA_WITH_RC4_128_SHA 0xC00C /**< Not in SSL3! */
142#define MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA 0xC00D /**< Not in SSL3! */
143#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA 0xC00E /**< Not in SSL3! */
144#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA 0xC00F /**< Not in SSL3! */
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +0100145
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200146#define MBEDTLS_TLS_ECDHE_RSA_WITH_NULL_SHA 0xC010 /**< Weak! */
147#define MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA 0xC011 /**< Not in SSL3! */
148#define MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 0xC012 /**< Not in SSL3! */
149#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 0xC013 /**< Not in SSL3! */
150#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 0xC014 /**< Not in SSL3! */
Paul Bakker41c83d32013-03-20 14:39:14 +0100151
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200152#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 0xC023 /**< TLS 1.2 */
153#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 0xC024 /**< TLS 1.2 */
154#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 0xC025 /**< TLS 1.2 */
155#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 0xC026 /**< TLS 1.2 */
156#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 0xC027 /**< TLS 1.2 */
157#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 0xC028 /**< TLS 1.2 */
158#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 0xC029 /**< TLS 1.2 */
159#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 0xC02A /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200160
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200161#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 0xC02B /**< TLS 1.2 */
162#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 0xC02C /**< TLS 1.2 */
163#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 0xC02D /**< TLS 1.2 */
164#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 0xC02E /**< TLS 1.2 */
165#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 0xC02F /**< TLS 1.2 */
166#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 0xC030 /**< TLS 1.2 */
167#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 0xC031 /**< TLS 1.2 */
168#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 0xC032 /**< TLS 1.2 */
Paul Bakkera54e4932013-03-20 15:31:54 +0100169
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200170#define MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA 0xC033 /**< Not in SSL3! */
171#define MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA 0xC034 /**< Not in SSL3! */
172#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA 0xC035 /**< Not in SSL3! */
173#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA 0xC036 /**< Not in SSL3! */
174#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 0xC037 /**< Not in SSL3! */
175#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384 0xC038 /**< Not in SSL3! */
176#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA 0xC039 /**< Weak! No SSL3! */
177#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA256 0xC03A /**< Weak! No SSL3! */
178#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA384 0xC03B /**< Weak! No SSL3! */
Manuel Pégourié-Gonnard225d6aa2013-10-11 19:07:56 +0200179
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +0100180#define MBEDTLS_TLS_RSA_WITH_ARIA_128_CBC_SHA256 0xC03C /**< TLS 1.2 */
181#define MBEDTLS_TLS_RSA_WITH_ARIA_256_CBC_SHA384 0xC03D /**< TLS 1.2 */
182#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256 0xC044 /**< TLS 1.2 */
183#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384 0xC045 /**< TLS 1.2 */
184#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256 0xC048 /**< TLS 1.2 */
185#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384 0xC049 /**< TLS 1.2 */
186#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256 0xC04A /**< TLS 1.2 */
187#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384 0xC04B /**< TLS 1.2 */
188#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256 0xC04C /**< TLS 1.2 */
189#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384 0xC04D /**< TLS 1.2 */
190#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256 0xC04E /**< TLS 1.2 */
191#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384 0xC04F /**< TLS 1.2 */
192#define MBEDTLS_TLS_RSA_WITH_ARIA_128_GCM_SHA256 0xC050 /**< TLS 1.2 */
193#define MBEDTLS_TLS_RSA_WITH_ARIA_256_GCM_SHA384 0xC051 /**< TLS 1.2 */
194#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 0xC052 /**< TLS 1.2 */
195#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 0xC053 /**< TLS 1.2 */
196#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 0xC05C /**< TLS 1.2 */
197#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 0xC05D /**< TLS 1.2 */
198#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256 0xC05E /**< TLS 1.2 */
199#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384 0xC05F /**< TLS 1.2 */
200#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 0xC060 /**< TLS 1.2 */
201#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 0xC061 /**< TLS 1.2 */
202#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256 0xC062 /**< TLS 1.2 */
203#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384 0xC063 /**< TLS 1.2 */
204#define MBEDTLS_TLS_PSK_WITH_ARIA_128_CBC_SHA256 0xC064 /**< TLS 1.2 */
205#define MBEDTLS_TLS_PSK_WITH_ARIA_256_CBC_SHA384 0xC065 /**< TLS 1.2 */
206#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC066 /**< TLS 1.2 */
207#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC067 /**< TLS 1.2 */
208#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256 0xC068 /**< TLS 1.2 */
209#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384 0xC069 /**< TLS 1.2 */
210#define MBEDTLS_TLS_PSK_WITH_ARIA_128_GCM_SHA256 0xC06A /**< TLS 1.2 */
211#define MBEDTLS_TLS_PSK_WITH_ARIA_256_GCM_SHA384 0xC06B /**< TLS 1.2 */
212#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256 0xC06C /**< TLS 1.2 */
213#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384 0xC06D /**< TLS 1.2 */
214#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256 0xC06E /**< TLS 1.2 */
215#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384 0xC06F /**< TLS 1.2 */
216#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC070 /**< TLS 1.2 */
217#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC071 /**< TLS 1.2 */
Markku-Juhani O. Saarinenc06e1012017-12-07 11:51:13 +0000218
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200219#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC072 /**< Not in SSL3! */
220#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC073 /**< Not in SSL3! */
221#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC074 /**< Not in SSL3! */
222#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC075 /**< Not in SSL3! */
223#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC076 /**< Not in SSL3! */
224#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC077 /**< Not in SSL3! */
225#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC078 /**< Not in SSL3! */
226#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC079 /**< Not in SSL3! */
Paul Bakker27714b12013-04-07 23:07:12 +0200227
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200228#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC07A /**< TLS 1.2 */
229#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC07B /**< TLS 1.2 */
230#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC07C /**< TLS 1.2 */
231#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC07D /**< TLS 1.2 */
232#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC086 /**< TLS 1.2 */
233#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC087 /**< TLS 1.2 */
234#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC088 /**< TLS 1.2 */
235#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC089 /**< TLS 1.2 */
236#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC08A /**< TLS 1.2 */
237#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC08B /**< TLS 1.2 */
238#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC08C /**< TLS 1.2 */
239#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC08D /**< TLS 1.2 */
Manuel Pégourié-Gonnard8d01eea2013-10-24 19:49:07 +0200240
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200241#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC08E /**< TLS 1.2 */
242#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC08F /**< TLS 1.2 */
243#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC090 /**< TLS 1.2 */
244#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC091 /**< TLS 1.2 */
245#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC092 /**< TLS 1.2 */
246#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC093 /**< TLS 1.2 */
Manuel Pégourié-Gonnard8d01eea2013-10-24 19:49:07 +0200247
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200248#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC094
249#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC095
250#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC096
251#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC097
252#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC098
253#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC099
254#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC09A /**< Not in SSL3! */
255#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC09B /**< Not in SSL3! */
Paul Bakker0f2f0bf2013-07-26 15:03:31 +0200256
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200257#define MBEDTLS_TLS_RSA_WITH_AES_128_CCM 0xC09C /**< TLS 1.2 */
258#define MBEDTLS_TLS_RSA_WITH_AES_256_CCM 0xC09D /**< TLS 1.2 */
259#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM 0xC09E /**< TLS 1.2 */
260#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM 0xC09F /**< TLS 1.2 */
261#define MBEDTLS_TLS_RSA_WITH_AES_128_CCM_8 0xC0A0 /**< TLS 1.2 */
262#define MBEDTLS_TLS_RSA_WITH_AES_256_CCM_8 0xC0A1 /**< TLS 1.2 */
263#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM_8 0xC0A2 /**< TLS 1.2 */
264#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM_8 0xC0A3 /**< TLS 1.2 */
265#define MBEDTLS_TLS_PSK_WITH_AES_128_CCM 0xC0A4 /**< TLS 1.2 */
266#define MBEDTLS_TLS_PSK_WITH_AES_256_CCM 0xC0A5 /**< TLS 1.2 */
267#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM 0xC0A6 /**< TLS 1.2 */
268#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM 0xC0A7 /**< TLS 1.2 */
269#define MBEDTLS_TLS_PSK_WITH_AES_128_CCM_8 0xC0A8 /**< TLS 1.2 */
270#define MBEDTLS_TLS_PSK_WITH_AES_256_CCM_8 0xC0A9 /**< TLS 1.2 */
271#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM_8 0xC0AA /**< TLS 1.2 */
272#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM_8 0xC0AB /**< TLS 1.2 */
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200273/* The last two are named with PSK_DHE in the RFC, which looks like a typo */
274
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200275#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM 0xC0AC /**< TLS 1.2 */
276#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM 0xC0AD /**< TLS 1.2 */
277#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 0xC0AE /**< TLS 1.2 */
278#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 0xC0AF /**< TLS 1.2 */
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200279
Manuel Pégourié-Gonnard538cb7b2015-09-15 18:03:28 +0200280#define MBEDTLS_TLS_ECJPAKE_WITH_AES_128_CCM_8 0xC0FF /**< experimental */
281
Manuel Pégourié-Gonnardce66d5e2018-06-14 11:11:15 +0200282/* RFC 7905 */
283#define MBEDTLS_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA8 /**< TLS 1.2 */
284#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA9 /**< TLS 1.2 */
285#define MBEDTLS_TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 0xCCAA /**< TLS 1.2 */
286#define MBEDTLS_TLS_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAB /**< TLS 1.2 */
287#define MBEDTLS_TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAC /**< TLS 1.2 */
288#define MBEDTLS_TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAD /**< TLS 1.2 */
289#define MBEDTLS_TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAE /**< TLS 1.2 */
290
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200291/* Reminder: update mbedtls_ssl_premaster_secret when adding a new key exchange.
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100292 * Reminder: update MBEDTLS_KEY_EXCHANGE__xxx below
Manuel Pégourié-Gonnardd9423232014-12-02 11:57:29 +0100293 */
Paul Bakker68884e32013-01-07 18:20:04 +0100294typedef enum {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200295 MBEDTLS_KEY_EXCHANGE_NONE = 0,
296 MBEDTLS_KEY_EXCHANGE_RSA,
297 MBEDTLS_KEY_EXCHANGE_DHE_RSA,
298 MBEDTLS_KEY_EXCHANGE_ECDHE_RSA,
299 MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA,
300 MBEDTLS_KEY_EXCHANGE_PSK,
301 MBEDTLS_KEY_EXCHANGE_DHE_PSK,
302 MBEDTLS_KEY_EXCHANGE_RSA_PSK,
303 MBEDTLS_KEY_EXCHANGE_ECDHE_PSK,
304 MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
305 MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
Manuel Pégourié-Gonnard557535d2015-09-15 17:53:32 +0200306 MBEDTLS_KEY_EXCHANGE_ECJPAKE,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200307} mbedtls_key_exchange_type_t;
Paul Bakker68884e32013-01-07 18:20:04 +0100308
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200309typedef struct mbedtls_ssl_ciphersuite_t mbedtls_ssl_ciphersuite_t;
Paul Bakker68884e32013-01-07 18:20:04 +0100310
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200311#define MBEDTLS_CIPHERSUITE_WEAK 0x01 /**< Weak ciphersuite flag */
312#define MBEDTLS_CIPHERSUITE_SHORT_TAG 0x02 /**< Short authentication tag,
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200313 eg for CCM_8 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200314#define MBEDTLS_CIPHERSUITE_NODTLS 0x04 /**< Can't be used with DTLS */
Paul Bakker68884e32013-01-07 18:20:04 +0100315
Hanno Beckerb09132d2019-06-26 10:53:02 +0100316/*
317 * Ciphersuite macro definitions
318 *
319 * This is highly incomplete and only contains those ciphersuites for
320 * which we need to be able to build the library with support for that
321 * ciphersuite only (currently MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8
322 * as an example).
323 */
324
325#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8()
326#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_ID MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8
327#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_NAME "TLS-ECDHE-ECDSA-WITH-AES-128-CCM-8"
328#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_CIPHER MBEDTLS_CIPHER_AES_128_CCM
329#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MAC MBEDTLS_MD_SHA256
330#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_KEY_EXCHANGE MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA
331#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MIN_MAJOR_VER MBEDTLS_SSL_MAJOR_VERSION_3
332#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MIN_MINOR_VER MBEDTLS_SSL_MINOR_VERSION_3
333#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MAX_MAJOR_VER MBEDTLS_SSL_MAJOR_VERSION_3
334#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MAX_MINOR_VER MBEDTLS_SSL_MINOR_VERSION_3
335#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_FLAGS MBEDTLS_CIPHERSUITE_SHORT_TAG
336
337/*
338 * Helper macros to extract fields from ciphersuites.
339 */
340
341#define MBEDTLS_SSL_SUITE_ID_T( SUITE ) SUITE ## _ID
342#define MBEDTLS_SSL_SUITE_NAME_T( SUITE ) SUITE ## _NAME
343#define MBEDTLS_SSL_SUITE_CIPHER_T( SUITE ) SUITE ## _CIPHER
344#define MBEDTLS_SSL_SUITE_MAC_T( SUITE ) SUITE ## _MAC
345#define MBEDTLS_SSL_SUITE_KEY_EXCHANGE_T( SUITE ) SUITE ## _KEY_EXCHANGE
346#define MBEDTLS_SSL_SUITE_MIN_MAJOR_VER_T( SUITE ) SUITE ## _MIN_MAJOR_VER
347#define MBEDTLS_SSL_SUITE_MIN_MINOR_VER_T( SUITE ) SUITE ## _MIN_MINOR_VER
348#define MBEDTLS_SSL_SUITE_MAX_MAJOR_VER_T( SUITE ) SUITE ## _MAX_MAJOR_VER
349#define MBEDTLS_SSL_SUITE_MAX_MINOR_VER_T( SUITE ) SUITE ## _MAX_MINOR_VER
350#define MBEDTLS_SSL_SUITE_FLAGS_T( SUITE ) SUITE ## _FLAGS
351
352/* Wrapper around MBEDTLS_SSL_SUITE_XXX_T() which makes sure that
353 * the argument is macro-expanded before concatenated with the
354 * field name. This allows to call these macros as
Hanno Becker73f4cb12019-06-27 13:51:07 +0100355 * MBEDTLS_SSL_SUITE_XXX( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ),
356 * where MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE expands to MBEDTLS_SSL_SUITE_XXX. */
Hanno Beckerb09132d2019-06-26 10:53:02 +0100357#define MBEDTLS_SSL_SUITE_ID( SUITE ) MBEDTLS_SSL_SUITE_ID_T( SUITE )
358#define MBEDTLS_SSL_SUITE_NAME( SUITE ) MBEDTLS_SSL_SUITE_NAME_T( SUITE )
359#define MBEDTLS_SSL_SUITE_CIPHER( SUITE ) MBEDTLS_SSL_SUITE_CIPHER_T( SUITE )
360#define MBEDTLS_SSL_SUITE_MAC( SUITE ) MBEDTLS_SSL_SUITE_MAC_T( SUITE )
361#define MBEDTLS_SSL_SUITE_KEY_EXCHANGE( SUITE ) MBEDTLS_SSL_SUITE_KEY_EXCHANGE_T( SUITE )
362#define MBEDTLS_SSL_SUITE_MIN_MAJOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MIN_MAJOR_VER_T( SUITE )
363#define MBEDTLS_SSL_SUITE_MIN_MINOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MIN_MINOR_VER_T( SUITE )
364#define MBEDTLS_SSL_SUITE_MAX_MAJOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MAX_MAJOR_VER_T( SUITE )
365#define MBEDTLS_SSL_SUITE_MAX_MINOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MAX_MINOR_VER_T( SUITE )
366#define MBEDTLS_SSL_SUITE_FLAGS( SUITE ) MBEDTLS_SSL_SUITE_FLAGS_T( SUITE )
367
Hanno Becker73f4cb12019-06-27 13:51:07 +0100368#if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE)
Paul Bakker68884e32013-01-07 18:20:04 +0100369/**
370 * \brief This structure is used for storing ciphersuite information
371 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200372struct mbedtls_ssl_ciphersuite_t
Paul Bakker68884e32013-01-07 18:20:04 +0100373{
374 int id;
375 const char * name;
376
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200377 mbedtls_cipher_type_t cipher;
378 mbedtls_md_type_t mac;
379 mbedtls_key_exchange_type_t key_exchange;
Paul Bakker68884e32013-01-07 18:20:04 +0100380
381 int min_major_ver;
382 int min_minor_ver;
383 int max_major_ver;
384 int max_minor_ver;
385
386 unsigned char flags;
387};
388
Hanno Becker473f98f2019-06-26 10:27:32 +0100389typedef mbedtls_ssl_ciphersuite_t const * mbedtls_ssl_ciphersuite_handle_t;
390#define MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE ( (mbedtls_ssl_ciphersuite_handle_t) NULL )
Paul Bakker68884e32013-01-07 18:20:04 +0100391
Hanno Beckerb09132d2019-06-26 10:53:02 +0100392/**
393 * \brief This macro builds an instance of ::mbedtls_ssl_ciphersuite_t
394 * from an \c MBEDTLS_SUITE_XXX identifier.
395 */
396#define MBEDTLS_SSL_SUITE_INFO( SUITE ) \
397 { MBEDTLS_SSL_SUITE_ID( SUITE ), \
398 MBEDTLS_SSL_SUITE_NAME( SUITE ), \
399 MBEDTLS_SSL_SUITE_CIPHER( SUITE ), \
400 MBEDTLS_SSL_SUITE_MAC( SUITE ), \
401 MBEDTLS_SSL_SUITE_KEY_EXCHANGE( SUITE ), \
402 MBEDTLS_SSL_SUITE_MIN_MAJOR_VER( SUITE ), \
403 MBEDTLS_SSL_SUITE_MIN_MINOR_VER( SUITE ), \
404 MBEDTLS_SSL_SUITE_MAX_MAJOR_VER( SUITE ), \
405 MBEDTLS_SSL_SUITE_MAX_MINOR_VER( SUITE ), \
406 MBEDTLS_SSL_SUITE_FLAGS( SUITE ) }
Hanno Becker5cce9362019-06-26 11:39:32 +0100407
Hanno Becker73f4cb12019-06-27 13:51:07 +0100408#else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker5cce9362019-06-26 11:39:32 +0100409
410typedef unsigned char mbedtls_ssl_ciphersuite_handle_t;
411#define MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE ( (mbedtls_ssl_ciphersuite_handle_t) 0 )
412#define MBEDTLS_SSL_CIPHERSUITE_UNIQUE_VALID_HANDLE ( (mbedtls_ssl_ciphersuite_handle_t) 1 )
413
Hanno Becker73f4cb12019-06-27 13:51:07 +0100414#endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker5cce9362019-06-26 11:39:32 +0100415
Hanno Becker67fb16e2019-06-28 11:39:22 +0100416#if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE)
417static inline int mbedtls_ssl_session_get_ciphersuite(
418 mbedtls_ssl_session const * session )
419{
420 return( session->ciphersuite );
421}
422#else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
423static inline int mbedtls_ssl_session_get_ciphersuite(
424 mbedtls_ssl_session const * session )
425{
426 ((void) session);
427 return( MBEDTLS_SSL_SUITE_ID( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
428}
429#endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
430
Hanno Becker473f98f2019-06-26 10:27:32 +0100431/*
432 * Getter functions for the extraction of ciphersuite attributes
433 * from a ciphersuite handle.
434 *
435 * These functions have the validity of the handle as a precondition!
436 * Their behaviour is undefined when MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE
437 * is passed.
438 */
Paul Bakker68884e32013-01-07 18:20:04 +0100439
Hanno Becker73f4cb12019-06-27 13:51:07 +0100440#if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE)
Hanno Becker473f98f2019-06-26 10:27:32 +0100441/*
442 * Implementation of getter functions when the ciphersuite handle
443 * is a pointer to the ciphersuite information structure.
444 *
445 * The precondition that the handle is valid means that
446 * we don't need to check that info != NULL.
447 */
448static inline int mbedtls_ssl_suite_get_id(
449 mbedtls_ssl_ciphersuite_handle_t const info )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100450{
Hanno Becker473f98f2019-06-26 10:27:32 +0100451 return( info->id );
452}
453static inline const char* mbedtls_ssl_suite_get_name(
454 mbedtls_ssl_ciphersuite_handle_t const info )
455{
456 return( info->name );
457}
458static inline mbedtls_cipher_type_t mbedtls_ssl_suite_get_cipher(
459 mbedtls_ssl_ciphersuite_handle_t const info )
460{
461 return( info->cipher );
462}
463static inline mbedtls_md_type_t mbedtls_ssl_suite_get_mac(
464 mbedtls_ssl_ciphersuite_handle_t const info )
465{
466 return( info->mac );
467}
468static inline mbedtls_key_exchange_type_t mbedtls_ssl_suite_get_key_exchange(
469 mbedtls_ssl_ciphersuite_handle_t const info )
470{
471 return( info->key_exchange );
472}
473static inline int mbedtls_ssl_suite_get_min_major_ver(
474 mbedtls_ssl_ciphersuite_handle_t const info )
475{
476 return( info->min_major_ver );
477}
478static inline int mbedtls_ssl_suite_get_min_minor_ver(
479 mbedtls_ssl_ciphersuite_handle_t const info )
480{
481 return( info->min_minor_ver );
482}
483static inline int mbedtls_ssl_suite_get_max_major_ver(
484 mbedtls_ssl_ciphersuite_handle_t const info )
485{
486 return( info->max_major_ver );
487}
488static inline int mbedtls_ssl_suite_get_max_minor_ver(
489 mbedtls_ssl_ciphersuite_handle_t const info )
490{
491 return( info->max_minor_ver );
492}
493static inline unsigned char mbedtls_ssl_suite_get_flags(
494 mbedtls_ssl_ciphersuite_handle_t const info )
495{
496 return( info->flags );
497}
Hanno Becker73f4cb12019-06-27 13:51:07 +0100498#else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker5cce9362019-06-26 11:39:32 +0100499/*
500 * Implementations of getter functions in the case of only
501 * a single possible ciphersuite. In this case, the handle
502 * is logically a boolean (either the invalid handle or the
503 * unique valid handle representing the single enabled
504 * ciphersuite), and the precondition that the handle is valid
505 * means that we can statically return the hardcoded attribute
506 * of the enabled ciphersuite.
507 */
508static inline int mbedtls_ssl_suite_get_id(
509 mbedtls_ssl_ciphersuite_handle_t const info )
510{
511 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100512 return( MBEDTLS_SSL_SUITE_ID( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100513}
514static inline const char* mbedtls_ssl_suite_get_name(
515 mbedtls_ssl_ciphersuite_handle_t const info )
516{
517 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100518 return( MBEDTLS_SSL_SUITE_NAME( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100519}
520static inline mbedtls_cipher_type_t mbedtls_ssl_suite_get_cipher(
521 mbedtls_ssl_ciphersuite_handle_t const info )
522{
523 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100524 return( MBEDTLS_SSL_SUITE_CIPHER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100525}
526static inline mbedtls_md_type_t mbedtls_ssl_suite_get_mac(
527 mbedtls_ssl_ciphersuite_handle_t const info )
528{
529 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100530 return( MBEDTLS_SSL_SUITE_MAC( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100531}
532static inline mbedtls_key_exchange_type_t mbedtls_ssl_suite_get_key_exchange(
533 mbedtls_ssl_ciphersuite_handle_t const info )
534{
535 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100536 return( MBEDTLS_SSL_SUITE_KEY_EXCHANGE( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100537}
538static inline int mbedtls_ssl_suite_get_min_major_ver(
539 mbedtls_ssl_ciphersuite_handle_t const info )
540{
541 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100542 return( MBEDTLS_SSL_SUITE_MIN_MAJOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100543}
544static inline int mbedtls_ssl_suite_get_min_minor_ver(
545 mbedtls_ssl_ciphersuite_handle_t const info )
546{
547 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100548 return( MBEDTLS_SSL_SUITE_MIN_MINOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100549}
550static inline int mbedtls_ssl_suite_get_max_major_ver(
551 mbedtls_ssl_ciphersuite_handle_t const info )
552{
553 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100554 return( MBEDTLS_SSL_SUITE_MAX_MAJOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100555}
556static inline int mbedtls_ssl_suite_get_max_minor_ver(
557 mbedtls_ssl_ciphersuite_handle_t const info )
558{
559 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100560 return( MBEDTLS_SSL_SUITE_MAX_MINOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100561}
562static inline unsigned char mbedtls_ssl_suite_get_flags(
563 mbedtls_ssl_ciphersuite_handle_t const info )
564{
565 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100566 return( MBEDTLS_SSL_SUITE_FLAGS( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100567}
Hanno Becker73f4cb12019-06-27 13:51:07 +0100568#endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker473f98f2019-06-26 10:27:32 +0100569
Hanno Becker67fb16e2019-06-28 11:39:22 +0100570const int *mbedtls_ssl_list_ciphersuites( void );
571
572/*
573 * Various small helper functions for ciphersuites.
574 *
575 * Like the getter functions, they assume that the provided ciphersuite
576 * handle is valid, and hence can be optimized in case there's only one
577 * ciphersuite enabled.
578 *
579 * To avoid code-duplication between inline and non-inline implementations
580 * of this, we define internal static inline versions of all functions first,
581 * and define wrappers around these either here or in ssl_ciphersuites.c,
582 * depending on whether MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE is defined.
583 */
584
585static inline int mbedtls_ssl_ciphersuite_has_pfs_internal(
Hanno Becker473f98f2019-06-26 10:27:32 +0100586 mbedtls_ssl_ciphersuite_handle_t info )
587{
588 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100589 {
590 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
591 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
592 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
593 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
594 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
595 case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
596 return( 1 );
597
598 default:
599 return( 0 );
600 }
601}
Hanno Becker1aa267c2017-04-28 17:08:27 +0100602
Hanno Becker67fb16e2019-06-28 11:39:22 +0100603static inline int mbedtls_ssl_ciphersuite_no_pfs_internal(
Hanno Becker473f98f2019-06-26 10:27:32 +0100604 mbedtls_ssl_ciphersuite_handle_t info )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100605{
Hanno Becker473f98f2019-06-26 10:27:32 +0100606 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100607 {
608 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
609 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
610 case MBEDTLS_KEY_EXCHANGE_RSA:
611 case MBEDTLS_KEY_EXCHANGE_PSK:
612 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
613 return( 1 );
614
615 default:
616 return( 0 );
617 }
618}
Hanno Becker1aa267c2017-04-28 17:08:27 +0100619
Hanno Becker67fb16e2019-06-28 11:39:22 +0100620static inline int mbedtls_ssl_ciphersuite_uses_ecdh_internal(
Hanno Becker473f98f2019-06-26 10:27:32 +0100621 mbedtls_ssl_ciphersuite_handle_t info )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100622{
Hanno Becker473f98f2019-06-26 10:27:32 +0100623 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100624 {
625 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
626 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
627 return( 1 );
628
629 default:
630 return( 0 );
631 }
632}
Hanno Becker1aa267c2017-04-28 17:08:27 +0100633
Hanno Becker67fb16e2019-06-28 11:39:22 +0100634static inline int mbedtls_ssl_ciphersuite_cert_req_allowed_internal(
Hanno Becker473f98f2019-06-26 10:27:32 +0100635 mbedtls_ssl_ciphersuite_handle_t info )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100636{
Hanno Becker473f98f2019-06-26 10:27:32 +0100637 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100638 {
639 case MBEDTLS_KEY_EXCHANGE_RSA:
640 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
641 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
642 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
643 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
644 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
645 return( 1 );
646
647 default:
648 return( 0 );
649 }
650}
651
Hanno Becker67fb16e2019-06-28 11:39:22 +0100652static inline int mbedtls_ssl_ciphersuite_uses_srv_cert_internal(
Hanno Becker473f98f2019-06-26 10:27:32 +0100653 mbedtls_ssl_ciphersuite_handle_t info )
Hanno Becker5097cba2019-02-05 13:36:46 +0000654{
Hanno Becker473f98f2019-06-26 10:27:32 +0100655 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
Hanno Becker5097cba2019-02-05 13:36:46 +0000656 {
657 case MBEDTLS_KEY_EXCHANGE_RSA:
658 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
659 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
660 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
661 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
662 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
663 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
664 return( 1 );
665
666 default:
667 return( 0 );
668 }
669}
670
Hanno Becker67fb16e2019-06-28 11:39:22 +0100671static inline int mbedtls_ssl_ciphersuite_uses_dhe_internal(
Hanno Becker473f98f2019-06-26 10:27:32 +0100672 mbedtls_ssl_ciphersuite_handle_t info )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100673{
Hanno Becker473f98f2019-06-26 10:27:32 +0100674 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100675 {
676 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
677 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
678 return( 1 );
679
680 default:
681 return( 0 );
682 }
683}
Hanno Becker1aa267c2017-04-28 17:08:27 +0100684
Hanno Becker67fb16e2019-06-28 11:39:22 +0100685static inline int mbedtls_ssl_ciphersuite_uses_ecdhe_internal(
Hanno Becker473f98f2019-06-26 10:27:32 +0100686 mbedtls_ssl_ciphersuite_handle_t info )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100687{
Hanno Becker473f98f2019-06-26 10:27:32 +0100688 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100689 {
690 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
691 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
692 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
693 return( 1 );
694
695 default:
696 return( 0 );
697 }
698}
Hanno Becker1aa267c2017-04-28 17:08:27 +0100699
Hanno Becker67fb16e2019-06-28 11:39:22 +0100700static inline int mbedtls_ssl_ciphersuite_uses_server_signature_internal(
Hanno Becker473f98f2019-06-26 10:27:32 +0100701 mbedtls_ssl_ciphersuite_handle_t info )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100702{
Hanno Becker473f98f2019-06-26 10:27:32 +0100703 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100704 {
705 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
706 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
707 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
708 return( 1 );
709
710 default:
711 return( 0 );
712 }
713}
Manuel Pégourié-Gonnard51451f82013-09-17 12:06:25 +0200714
Hanno Becker67fb16e2019-06-28 11:39:22 +0100715#if defined(MBEDTLS_PK_C)
716static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg_internal(
717 mbedtls_ssl_ciphersuite_handle_t info )
718{
719 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
720 {
721 case MBEDTLS_KEY_EXCHANGE_RSA:
722 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
723 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
724 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
725 return( MBEDTLS_PK_RSA );
726
727 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
728 return( MBEDTLS_PK_ECDSA );
729
730 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
731 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
732 return( MBEDTLS_PK_ECKEY );
733
734 default:
735 return( MBEDTLS_PK_NONE );
736 }
737}
738
739static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg_internal(
740 mbedtls_ssl_ciphersuite_handle_t info )
741{
742 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
743 {
744 case MBEDTLS_KEY_EXCHANGE_RSA:
745 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
746 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
747 return( MBEDTLS_PK_RSA );
748
749 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
750 return( MBEDTLS_PK_ECDSA );
751
752 default:
753 return( MBEDTLS_PK_NONE );
754 }
755}
756
757#endif /* MBEDTLS_PK_C */
758
759#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
760 defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
761static inline int mbedtls_ssl_ciphersuite_uses_ec_internal(
762 mbedtls_ssl_ciphersuite_handle_t info )
763{
764 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
765 {
766 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
767 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
768 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
769 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
770 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
771 case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
772 return( 1 );
773
774 default:
775 return( 0 );
776 }
777}
778#endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C || MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED*/
779
780#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
781static inline int mbedtls_ssl_ciphersuite_uses_psk_internal(
782 mbedtls_ssl_ciphersuite_handle_t info )
783{
784 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
785 {
786 case MBEDTLS_KEY_EXCHANGE_PSK:
787 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
788 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
789 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
790 return( 1 );
791
792 default:
793 return( 0 );
794 }
795}
796#endif /* MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */
797
798/*
799 * Wrappers around internal helper functions to be used by the rest of
800 * the library, either defined static inline here or in ssl_ciphersuites.c.
801 */
802
Hanno Becker73f4cb12019-06-27 13:51:07 +0100803#if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE)
Hanno Beckere02758c2019-06-26 15:31:31 +0100804
Hanno Becker67fb16e2019-06-28 11:39:22 +0100805mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_string(
806 const char *ciphersuite_name );
807mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_id(
808 int ciphersuite_id );
Hanno Becker473f98f2019-06-26 10:27:32 +0100809
Hanno Becker67fb16e2019-06-28 11:39:22 +0100810int mbedtls_ssl_ciphersuite_has_pfs( mbedtls_ssl_ciphersuite_handle_t info );
811int mbedtls_ssl_ciphersuite_no_pfs( mbedtls_ssl_ciphersuite_handle_t info );
812int mbedtls_ssl_ciphersuite_uses_ecdh( mbedtls_ssl_ciphersuite_handle_t info );
813int mbedtls_ssl_ciphersuite_cert_req_allowed(
814 mbedtls_ssl_ciphersuite_handle_t info );
815int mbedtls_ssl_ciphersuite_uses_srv_cert(
816 mbedtls_ssl_ciphersuite_handle_t info );
817int mbedtls_ssl_ciphersuite_uses_dhe( mbedtls_ssl_ciphersuite_handle_t info );
818int mbedtls_ssl_ciphersuite_uses_ecdhe( mbedtls_ssl_ciphersuite_handle_t info );
819int mbedtls_ssl_ciphersuite_uses_server_signature(
820 mbedtls_ssl_ciphersuite_handle_t info );
Hanno Becker473f98f2019-06-26 10:27:32 +0100821
822#if defined(MBEDTLS_PK_C)
Hanno Becker67fb16e2019-06-28 11:39:22 +0100823mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg(
824 mbedtls_ssl_ciphersuite_handle_t info );
825mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg(
826 mbedtls_ssl_ciphersuite_handle_t info );
827#endif /* MBEDTLS_PK_C */
Hanno Becker473f98f2019-06-26 10:27:32 +0100828
Hanno Becker67fb16e2019-06-28 11:39:22 +0100829#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
830 defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
Hanno Becker473f98f2019-06-26 10:27:32 +0100831int mbedtls_ssl_ciphersuite_uses_ec( mbedtls_ssl_ciphersuite_handle_t info );
Hanno Becker67fb16e2019-06-28 11:39:22 +0100832#endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C ||
833 MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED*/
834
835#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
Hanno Becker473f98f2019-06-26 10:27:32 +0100836int mbedtls_ssl_ciphersuite_uses_psk( mbedtls_ssl_ciphersuite_handle_t info );
Hanno Becker67fb16e2019-06-28 11:39:22 +0100837#endif /* MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */
838
839#else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
840
841static inline int mbedtls_ssl_ciphersuite_has_pfs(
842 mbedtls_ssl_ciphersuite_handle_t info )
843{
844 return( mbedtls_ssl_ciphersuite_has_pfs_internal( info ) );
845}
846
847static inline int mbedtls_ssl_ciphersuite_no_pfs(
848 mbedtls_ssl_ciphersuite_handle_t info )
849{
850 return( mbedtls_ssl_ciphersuite_no_pfs_internal( info ) );
851}
852
853static inline int mbedtls_ssl_ciphersuite_uses_ecdh(
854 mbedtls_ssl_ciphersuite_handle_t info )
855{
856 return( mbedtls_ssl_ciphersuite_uses_ecdh_internal( info ) );
857}
858
859static inline int mbedtls_ssl_ciphersuite_cert_req_allowed(
860 mbedtls_ssl_ciphersuite_handle_t info )
861{
862 return( mbedtls_ssl_ciphersuite_cert_req_allowed_internal( info ) );
863}
864
865static inline int mbedtls_ssl_ciphersuite_uses_srv_cert(
866 mbedtls_ssl_ciphersuite_handle_t info )
867{
868 return( mbedtls_ssl_ciphersuite_uses_srv_cert_internal( info ) );
869}
870
871static inline int mbedtls_ssl_ciphersuite_uses_dhe(
872 mbedtls_ssl_ciphersuite_handle_t info )
873{
874 return( mbedtls_ssl_ciphersuite_uses_dhe_internal( info ) );
875}
876
877static inline int mbedtls_ssl_ciphersuite_uses_ecdhe(
878 mbedtls_ssl_ciphersuite_handle_t info )
879{
880 return( mbedtls_ssl_ciphersuite_uses_ecdhe_internal( info ) );
881}
882
883static inline int mbedtls_ssl_ciphersuite_uses_server_signature(
884 mbedtls_ssl_ciphersuite_handle_t info )
885{
886 return( mbedtls_ssl_ciphersuite_uses_server_signature_internal( info ) );
887}
888
889#if defined(MBEDTLS_PK_C)
890static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg(
891 mbedtls_ssl_ciphersuite_handle_t info )
892{
893 return( mbedtls_ssl_get_ciphersuite_sig_pk_alg_internal( info ) );
894}
895
896static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg(
897 mbedtls_ssl_ciphersuite_handle_t info )
898{
899 return( mbedtls_ssl_get_ciphersuite_sig_alg_internal( info ) );
900}
901#endif /* MBEDTLS_PK_C */
902
903#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
904 defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
905static inline int mbedtls_ssl_ciphersuite_uses_ec(
906 mbedtls_ssl_ciphersuite_handle_t info )
907{
908 return( mbedtls_ssl_ciphersuite_uses_ec_internal( info ) );
909}
910#endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C ||
911 MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED*/
912
913#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
914static inline int mbedtls_ssl_ciphersuite_uses_psk(
915 mbedtls_ssl_ciphersuite_handle_t info )
916{
917 return( mbedtls_ssl_ciphersuite_uses_psk_internal( info ) );
918}
919#endif /* MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */
920
921static inline mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_id(
922 int ciphersuite )
923{
924 static const int single_suite_id =
925 MBEDTLS_SSL_SUITE_ID( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE );
926
927 if( ciphersuite == single_suite_id )
928 return( MBEDTLS_SSL_CIPHERSUITE_UNIQUE_VALID_HANDLE );
929
930 return( MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE );
931}
932
933static inline mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_string(
934 const char *ciphersuite_name )
935{
936 static const char * const single_suite_name =
937 MBEDTLS_SSL_SUITE_NAME( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE );
938
939 if( strcmp( ciphersuite_name, single_suite_name ) == 0 )
940 return( MBEDTLS_SSL_CIPHERSUITE_UNIQUE_VALID_HANDLE );
941
942 return( MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE );
943}
944
945#endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker473f98f2019-06-26 10:27:32 +0100946
Paul Bakker68884e32013-01-07 18:20:04 +0100947#ifdef __cplusplus
948}
949#endif
950
951#endif /* ssl_ciphersuites.h */