blob: 925f2808e42a04c73474b838181ced09693b3988 [file] [log] [blame]
Paul Bakker68884e32013-01-07 18:20:04 +01001/**
2 * \file ssl_ciphersuites.h
3 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief SSL Ciphersuites for mbed TLS
Darryl Greena40a1012018-01-05 15:33:17 +00005 */
6/*
Manuel Pégourié-Gonnard6fb81872015-07-27 11:11:48 +02007 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02008 * SPDX-License-Identifier: Apache-2.0
9 *
10 * Licensed under the Apache License, Version 2.0 (the "License"); you may
11 * not use this file except in compliance with the License.
12 * You may obtain a copy of the License at
13 *
14 * http://www.apache.org/licenses/LICENSE-2.0
15 *
16 * Unless required by applicable law or agreed to in writing, software
17 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
18 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19 * See the License for the specific language governing permissions and
20 * limitations under the License.
Paul Bakker68884e32013-01-07 18:20:04 +010021 *
Manuel Pégourié-Gonnardfe446432015-03-06 13:17:10 +000022 * This file is part of mbed TLS (https://tls.mbed.org)
Paul Bakker68884e32013-01-07 18:20:04 +010023 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020024#ifndef MBEDTLS_SSL_CIPHERSUITES_H
25#define MBEDTLS_SSL_CIPHERSUITES_H
Paul Bakker68884e32013-01-07 18:20:04 +010026
Ron Eldor8b0cf2e2018-02-14 16:02:41 +020027#if !defined(MBEDTLS_CONFIG_FILE)
28#include "config.h"
29#else
30#include MBEDTLS_CONFIG_FILE
31#endif
32
Manuel Pégourié-Gonnard09edda82013-08-19 13:50:33 +020033#include "pk.h"
Paul Bakker68884e32013-01-07 18:20:04 +010034#include "cipher.h"
35#include "md.h"
Hanno Beckerb09132d2019-06-26 10:53:02 +010036#include "ssl.h"
Hanno Becker67fb16e2019-06-28 11:39:22 +010037#include <string.h>
Paul Bakker68884e32013-01-07 18:20:04 +010038
39#ifdef __cplusplus
40extern "C" {
41#endif
42
Paul Bakker41c83d32013-03-20 14:39:14 +010043/*
44 * Supported ciphersuites (Official IANA names)
45 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020046#define MBEDTLS_TLS_RSA_WITH_NULL_MD5 0x01 /**< Weak! */
47#define MBEDTLS_TLS_RSA_WITH_NULL_SHA 0x02 /**< Weak! */
Paul Bakker41c83d32013-03-20 14:39:14 +010048
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020049#define MBEDTLS_TLS_RSA_WITH_RC4_128_MD5 0x04
50#define MBEDTLS_TLS_RSA_WITH_RC4_128_SHA 0x05
51#define MBEDTLS_TLS_RSA_WITH_DES_CBC_SHA 0x09 /**< Weak! Not in TLS 1.2 */
Paul Bakker41c83d32013-03-20 14:39:14 +010052
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020053#define MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA 0x0A
Paul Bakker0c5fac22013-04-19 21:10:51 +020054
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020055#define MBEDTLS_TLS_DHE_RSA_WITH_DES_CBC_SHA 0x15 /**< Weak! Not in TLS 1.2 */
56#define MBEDTLS_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 0x16
Paul Bakker41c83d32013-03-20 14:39:14 +010057
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020058#define MBEDTLS_TLS_PSK_WITH_NULL_SHA 0x2C /**< Weak! */
59#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA 0x2D /**< Weak! */
60#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA 0x2E /**< Weak! */
61#define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA 0x2F
Paul Bakker0c5fac22013-04-19 21:10:51 +020062
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020063#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA 0x33
64#define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA 0x35
65#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA 0x39
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020066
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020067#define MBEDTLS_TLS_RSA_WITH_NULL_SHA256 0x3B /**< Weak! */
68#define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 0x3C /**< TLS 1.2 */
69#define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 0x3D /**< TLS 1.2 */
Paul Bakker41c83d32013-03-20 14:39:14 +010070
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020071#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 0x41
72#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 0x45
Paul Bakker0c5fac22013-04-19 21:10:51 +020073
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020074#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 0x67 /**< TLS 1.2 */
75#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 0x6B /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +020076
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020077#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 0x84
78#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 0x88
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020079
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020080#define MBEDTLS_TLS_PSK_WITH_RC4_128_SHA 0x8A
81#define MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA 0x8B
82#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA 0x8C
83#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA 0x8D
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020084
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020085#define MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA 0x8E
86#define MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA 0x8F
87#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA 0x90
88#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA 0x91
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020089
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020090#define MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA 0x92
91#define MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA 0x93
92#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA 0x94
93#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA 0x95
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020094
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020095#define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 0x9C /**< TLS 1.2 */
96#define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 0x9D /**< TLS 1.2 */
97#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 0x9E /**< TLS 1.2 */
98#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 0x9F /**< TLS 1.2 */
Paul Bakker41c83d32013-03-20 14:39:14 +010099
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200100#define MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256 0xA8 /**< TLS 1.2 */
101#define MBEDTLS_TLS_PSK_WITH_AES_256_GCM_SHA384 0xA9 /**< TLS 1.2 */
102#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_GCM_SHA256 0xAA /**< TLS 1.2 */
103#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_GCM_SHA384 0xAB /**< TLS 1.2 */
104#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256 0xAC /**< TLS 1.2 */
105#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384 0xAD /**< TLS 1.2 */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200106
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200107#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA256 0xAE
108#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA384 0xAF
109#define MBEDTLS_TLS_PSK_WITH_NULL_SHA256 0xB0 /**< Weak! */
110#define MBEDTLS_TLS_PSK_WITH_NULL_SHA384 0xB1 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200111
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200112#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256 0xB2
113#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384 0xB3
114#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA256 0xB4 /**< Weak! */
115#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA384 0xB5 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200116
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200117#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256 0xB6
118#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384 0xB7
119#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA256 0xB8 /**< Weak! */
120#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA384 0xB9 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200121
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200122#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xBA /**< TLS 1.2 */
123#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xBE /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200124
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200125#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC0 /**< TLS 1.2 */
126#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC4 /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200127
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200128#define MBEDTLS_TLS_ECDH_ECDSA_WITH_NULL_SHA 0xC001 /**< Weak! */
129#define MBEDTLS_TLS_ECDH_ECDSA_WITH_RC4_128_SHA 0xC002 /**< Not in SSL3! */
130#define MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA 0xC003 /**< Not in SSL3! */
131#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA 0xC004 /**< Not in SSL3! */
132#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA 0xC005 /**< Not in SSL3! */
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +0100133
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200134#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_NULL_SHA 0xC006 /**< Weak! */
135#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA 0xC007 /**< Not in SSL3! */
136#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA 0xC008 /**< Not in SSL3! */
137#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA 0xC009 /**< Not in SSL3! */
138#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA 0xC00A /**< Not in SSL3! */
Manuel Pégourié-Gonnard32ea60a2013-08-17 17:39:04 +0200139
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200140#define MBEDTLS_TLS_ECDH_RSA_WITH_NULL_SHA 0xC00B /**< Weak! */
141#define MBEDTLS_TLS_ECDH_RSA_WITH_RC4_128_SHA 0xC00C /**< Not in SSL3! */
142#define MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA 0xC00D /**< Not in SSL3! */
143#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA 0xC00E /**< Not in SSL3! */
144#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA 0xC00F /**< Not in SSL3! */
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +0100145
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200146#define MBEDTLS_TLS_ECDHE_RSA_WITH_NULL_SHA 0xC010 /**< Weak! */
147#define MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA 0xC011 /**< Not in SSL3! */
148#define MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 0xC012 /**< Not in SSL3! */
149#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 0xC013 /**< Not in SSL3! */
150#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 0xC014 /**< Not in SSL3! */
Paul Bakker41c83d32013-03-20 14:39:14 +0100151
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200152#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 0xC023 /**< TLS 1.2 */
153#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 0xC024 /**< TLS 1.2 */
154#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 0xC025 /**< TLS 1.2 */
155#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 0xC026 /**< TLS 1.2 */
156#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 0xC027 /**< TLS 1.2 */
157#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 0xC028 /**< TLS 1.2 */
158#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 0xC029 /**< TLS 1.2 */
159#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 0xC02A /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200160
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200161#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 0xC02B /**< TLS 1.2 */
162#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 0xC02C /**< TLS 1.2 */
163#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 0xC02D /**< TLS 1.2 */
164#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 0xC02E /**< TLS 1.2 */
165#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 0xC02F /**< TLS 1.2 */
166#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 0xC030 /**< TLS 1.2 */
167#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 0xC031 /**< TLS 1.2 */
168#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 0xC032 /**< TLS 1.2 */
Paul Bakkera54e4932013-03-20 15:31:54 +0100169
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200170#define MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA 0xC033 /**< Not in SSL3! */
171#define MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA 0xC034 /**< Not in SSL3! */
172#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA 0xC035 /**< Not in SSL3! */
173#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA 0xC036 /**< Not in SSL3! */
174#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 0xC037 /**< Not in SSL3! */
175#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384 0xC038 /**< Not in SSL3! */
176#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA 0xC039 /**< Weak! No SSL3! */
177#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA256 0xC03A /**< Weak! No SSL3! */
178#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA384 0xC03B /**< Weak! No SSL3! */
Manuel Pégourié-Gonnard225d6aa2013-10-11 19:07:56 +0200179
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +0100180#define MBEDTLS_TLS_RSA_WITH_ARIA_128_CBC_SHA256 0xC03C /**< TLS 1.2 */
181#define MBEDTLS_TLS_RSA_WITH_ARIA_256_CBC_SHA384 0xC03D /**< TLS 1.2 */
182#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256 0xC044 /**< TLS 1.2 */
183#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384 0xC045 /**< TLS 1.2 */
184#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256 0xC048 /**< TLS 1.2 */
185#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384 0xC049 /**< TLS 1.2 */
186#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256 0xC04A /**< TLS 1.2 */
187#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384 0xC04B /**< TLS 1.2 */
188#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256 0xC04C /**< TLS 1.2 */
189#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384 0xC04D /**< TLS 1.2 */
190#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256 0xC04E /**< TLS 1.2 */
191#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384 0xC04F /**< TLS 1.2 */
192#define MBEDTLS_TLS_RSA_WITH_ARIA_128_GCM_SHA256 0xC050 /**< TLS 1.2 */
193#define MBEDTLS_TLS_RSA_WITH_ARIA_256_GCM_SHA384 0xC051 /**< TLS 1.2 */
194#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 0xC052 /**< TLS 1.2 */
195#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 0xC053 /**< TLS 1.2 */
196#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 0xC05C /**< TLS 1.2 */
197#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 0xC05D /**< TLS 1.2 */
198#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256 0xC05E /**< TLS 1.2 */
199#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384 0xC05F /**< TLS 1.2 */
200#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 0xC060 /**< TLS 1.2 */
201#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 0xC061 /**< TLS 1.2 */
202#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256 0xC062 /**< TLS 1.2 */
203#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384 0xC063 /**< TLS 1.2 */
204#define MBEDTLS_TLS_PSK_WITH_ARIA_128_CBC_SHA256 0xC064 /**< TLS 1.2 */
205#define MBEDTLS_TLS_PSK_WITH_ARIA_256_CBC_SHA384 0xC065 /**< TLS 1.2 */
206#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC066 /**< TLS 1.2 */
207#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC067 /**< TLS 1.2 */
208#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256 0xC068 /**< TLS 1.2 */
209#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384 0xC069 /**< TLS 1.2 */
210#define MBEDTLS_TLS_PSK_WITH_ARIA_128_GCM_SHA256 0xC06A /**< TLS 1.2 */
211#define MBEDTLS_TLS_PSK_WITH_ARIA_256_GCM_SHA384 0xC06B /**< TLS 1.2 */
212#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256 0xC06C /**< TLS 1.2 */
213#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384 0xC06D /**< TLS 1.2 */
214#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256 0xC06E /**< TLS 1.2 */
215#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384 0xC06F /**< TLS 1.2 */
216#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC070 /**< TLS 1.2 */
217#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC071 /**< TLS 1.2 */
Markku-Juhani O. Saarinenc06e1012017-12-07 11:51:13 +0000218
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200219#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC072 /**< Not in SSL3! */
220#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC073 /**< Not in SSL3! */
221#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC074 /**< Not in SSL3! */
222#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC075 /**< Not in SSL3! */
223#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC076 /**< Not in SSL3! */
224#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC077 /**< Not in SSL3! */
225#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC078 /**< Not in SSL3! */
226#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC079 /**< Not in SSL3! */
Paul Bakker27714b12013-04-07 23:07:12 +0200227
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200228#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC07A /**< TLS 1.2 */
229#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC07B /**< TLS 1.2 */
230#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC07C /**< TLS 1.2 */
231#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC07D /**< TLS 1.2 */
232#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC086 /**< TLS 1.2 */
233#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC087 /**< TLS 1.2 */
234#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC088 /**< TLS 1.2 */
235#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC089 /**< TLS 1.2 */
236#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC08A /**< TLS 1.2 */
237#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC08B /**< TLS 1.2 */
238#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC08C /**< TLS 1.2 */
239#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC08D /**< TLS 1.2 */
Manuel Pégourié-Gonnard8d01eea2013-10-24 19:49:07 +0200240
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200241#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC08E /**< TLS 1.2 */
242#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC08F /**< TLS 1.2 */
243#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC090 /**< TLS 1.2 */
244#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC091 /**< TLS 1.2 */
245#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC092 /**< TLS 1.2 */
246#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC093 /**< TLS 1.2 */
Manuel Pégourié-Gonnard8d01eea2013-10-24 19:49:07 +0200247
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200248#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC094
249#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC095
250#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC096
251#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC097
252#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC098
253#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC099
254#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC09A /**< Not in SSL3! */
255#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC09B /**< Not in SSL3! */
Paul Bakker0f2f0bf2013-07-26 15:03:31 +0200256
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200257#define MBEDTLS_TLS_RSA_WITH_AES_128_CCM 0xC09C /**< TLS 1.2 */
258#define MBEDTLS_TLS_RSA_WITH_AES_256_CCM 0xC09D /**< TLS 1.2 */
259#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM 0xC09E /**< TLS 1.2 */
260#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM 0xC09F /**< TLS 1.2 */
261#define MBEDTLS_TLS_RSA_WITH_AES_128_CCM_8 0xC0A0 /**< TLS 1.2 */
262#define MBEDTLS_TLS_RSA_WITH_AES_256_CCM_8 0xC0A1 /**< TLS 1.2 */
263#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM_8 0xC0A2 /**< TLS 1.2 */
264#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM_8 0xC0A3 /**< TLS 1.2 */
265#define MBEDTLS_TLS_PSK_WITH_AES_128_CCM 0xC0A4 /**< TLS 1.2 */
266#define MBEDTLS_TLS_PSK_WITH_AES_256_CCM 0xC0A5 /**< TLS 1.2 */
267#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM 0xC0A6 /**< TLS 1.2 */
268#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM 0xC0A7 /**< TLS 1.2 */
269#define MBEDTLS_TLS_PSK_WITH_AES_128_CCM_8 0xC0A8 /**< TLS 1.2 */
270#define MBEDTLS_TLS_PSK_WITH_AES_256_CCM_8 0xC0A9 /**< TLS 1.2 */
271#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM_8 0xC0AA /**< TLS 1.2 */
272#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM_8 0xC0AB /**< TLS 1.2 */
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200273/* The last two are named with PSK_DHE in the RFC, which looks like a typo */
274
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200275#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM 0xC0AC /**< TLS 1.2 */
276#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM 0xC0AD /**< TLS 1.2 */
277#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 0xC0AE /**< TLS 1.2 */
278#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 0xC0AF /**< TLS 1.2 */
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200279
Manuel Pégourié-Gonnard538cb7b2015-09-15 18:03:28 +0200280#define MBEDTLS_TLS_ECJPAKE_WITH_AES_128_CCM_8 0xC0FF /**< experimental */
281
Manuel Pégourié-Gonnardce66d5e2018-06-14 11:11:15 +0200282/* RFC 7905 */
283#define MBEDTLS_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA8 /**< TLS 1.2 */
284#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA9 /**< TLS 1.2 */
285#define MBEDTLS_TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 0xCCAA /**< TLS 1.2 */
286#define MBEDTLS_TLS_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAB /**< TLS 1.2 */
287#define MBEDTLS_TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAC /**< TLS 1.2 */
288#define MBEDTLS_TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAD /**< TLS 1.2 */
289#define MBEDTLS_TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAE /**< TLS 1.2 */
290
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200291/* Reminder: update mbedtls_ssl_premaster_secret when adding a new key exchange.
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100292 * Reminder: update MBEDTLS_KEY_EXCHANGE__xxx below
Manuel Pégourié-Gonnardd9423232014-12-02 11:57:29 +0100293 */
Paul Bakker68884e32013-01-07 18:20:04 +0100294typedef enum {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200295 MBEDTLS_KEY_EXCHANGE_NONE = 0,
296 MBEDTLS_KEY_EXCHANGE_RSA,
297 MBEDTLS_KEY_EXCHANGE_DHE_RSA,
298 MBEDTLS_KEY_EXCHANGE_ECDHE_RSA,
299 MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA,
300 MBEDTLS_KEY_EXCHANGE_PSK,
301 MBEDTLS_KEY_EXCHANGE_DHE_PSK,
302 MBEDTLS_KEY_EXCHANGE_RSA_PSK,
303 MBEDTLS_KEY_EXCHANGE_ECDHE_PSK,
304 MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
305 MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
Manuel Pégourié-Gonnard557535d2015-09-15 17:53:32 +0200306 MBEDTLS_KEY_EXCHANGE_ECJPAKE,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200307} mbedtls_key_exchange_type_t;
Paul Bakker68884e32013-01-07 18:20:04 +0100308
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200309typedef struct mbedtls_ssl_ciphersuite_t mbedtls_ssl_ciphersuite_t;
Paul Bakker68884e32013-01-07 18:20:04 +0100310
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200311#define MBEDTLS_CIPHERSUITE_WEAK 0x01 /**< Weak ciphersuite flag */
312#define MBEDTLS_CIPHERSUITE_SHORT_TAG 0x02 /**< Short authentication tag,
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200313 eg for CCM_8 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200314#define MBEDTLS_CIPHERSUITE_NODTLS 0x04 /**< Can't be used with DTLS */
Paul Bakker68884e32013-01-07 18:20:04 +0100315
Hanno Beckerb09132d2019-06-26 10:53:02 +0100316/*
317 * Ciphersuite macro definitions
318 *
319 * This is highly incomplete and only contains those ciphersuites for
320 * which we need to be able to build the library with support for that
321 * ciphersuite only (currently MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8
322 * as an example).
323 */
324
Hanno Beckerb09132d2019-06-26 10:53:02 +0100325#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_ID MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8
326#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_NAME "TLS-ECDHE-ECDSA-WITH-AES-128-CCM-8"
327#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_CIPHER MBEDTLS_CIPHER_AES_128_CCM
328#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MAC MBEDTLS_MD_SHA256
329#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_KEY_EXCHANGE MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA
330#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MIN_MAJOR_VER MBEDTLS_SSL_MAJOR_VERSION_3
331#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MIN_MINOR_VER MBEDTLS_SSL_MINOR_VERSION_3
332#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MAX_MAJOR_VER MBEDTLS_SSL_MAJOR_VERSION_3
333#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MAX_MINOR_VER MBEDTLS_SSL_MINOR_VERSION_3
334#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_FLAGS MBEDTLS_CIPHERSUITE_SHORT_TAG
335
Hanno Becker9e720e02019-07-08 11:24:36 +0100336/* This is just to make check-names.sh happy -- don't uncomment. */
337//#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8
338
Hanno Beckerb09132d2019-06-26 10:53:02 +0100339/*
340 * Helper macros to extract fields from ciphersuites.
341 */
342
343#define MBEDTLS_SSL_SUITE_ID_T( SUITE ) SUITE ## _ID
344#define MBEDTLS_SSL_SUITE_NAME_T( SUITE ) SUITE ## _NAME
345#define MBEDTLS_SSL_SUITE_CIPHER_T( SUITE ) SUITE ## _CIPHER
346#define MBEDTLS_SSL_SUITE_MAC_T( SUITE ) SUITE ## _MAC
347#define MBEDTLS_SSL_SUITE_KEY_EXCHANGE_T( SUITE ) SUITE ## _KEY_EXCHANGE
348#define MBEDTLS_SSL_SUITE_MIN_MAJOR_VER_T( SUITE ) SUITE ## _MIN_MAJOR_VER
349#define MBEDTLS_SSL_SUITE_MIN_MINOR_VER_T( SUITE ) SUITE ## _MIN_MINOR_VER
350#define MBEDTLS_SSL_SUITE_MAX_MAJOR_VER_T( SUITE ) SUITE ## _MAX_MAJOR_VER
351#define MBEDTLS_SSL_SUITE_MAX_MINOR_VER_T( SUITE ) SUITE ## _MAX_MINOR_VER
352#define MBEDTLS_SSL_SUITE_FLAGS_T( SUITE ) SUITE ## _FLAGS
353
354/* Wrapper around MBEDTLS_SSL_SUITE_XXX_T() which makes sure that
355 * the argument is macro-expanded before concatenated with the
356 * field name. This allows to call these macros as
Hanno Becker73f4cb12019-06-27 13:51:07 +0100357 * MBEDTLS_SSL_SUITE_XXX( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ),
358 * where MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE expands to MBEDTLS_SSL_SUITE_XXX. */
Hanno Beckerb09132d2019-06-26 10:53:02 +0100359#define MBEDTLS_SSL_SUITE_ID( SUITE ) MBEDTLS_SSL_SUITE_ID_T( SUITE )
360#define MBEDTLS_SSL_SUITE_NAME( SUITE ) MBEDTLS_SSL_SUITE_NAME_T( SUITE )
361#define MBEDTLS_SSL_SUITE_CIPHER( SUITE ) MBEDTLS_SSL_SUITE_CIPHER_T( SUITE )
362#define MBEDTLS_SSL_SUITE_MAC( SUITE ) MBEDTLS_SSL_SUITE_MAC_T( SUITE )
363#define MBEDTLS_SSL_SUITE_KEY_EXCHANGE( SUITE ) MBEDTLS_SSL_SUITE_KEY_EXCHANGE_T( SUITE )
364#define MBEDTLS_SSL_SUITE_MIN_MAJOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MIN_MAJOR_VER_T( SUITE )
365#define MBEDTLS_SSL_SUITE_MIN_MINOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MIN_MINOR_VER_T( SUITE )
366#define MBEDTLS_SSL_SUITE_MAX_MAJOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MAX_MAJOR_VER_T( SUITE )
367#define MBEDTLS_SSL_SUITE_MAX_MINOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MAX_MINOR_VER_T( SUITE )
368#define MBEDTLS_SSL_SUITE_FLAGS( SUITE ) MBEDTLS_SSL_SUITE_FLAGS_T( SUITE )
369
Hanno Becker73f4cb12019-06-27 13:51:07 +0100370#if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE)
Paul Bakker68884e32013-01-07 18:20:04 +0100371/**
372 * \brief This structure is used for storing ciphersuite information
373 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200374struct mbedtls_ssl_ciphersuite_t
Paul Bakker68884e32013-01-07 18:20:04 +0100375{
376 int id;
377 const char * name;
378
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200379 mbedtls_cipher_type_t cipher;
380 mbedtls_md_type_t mac;
381 mbedtls_key_exchange_type_t key_exchange;
Paul Bakker68884e32013-01-07 18:20:04 +0100382
383 int min_major_ver;
384 int min_minor_ver;
385 int max_major_ver;
386 int max_minor_ver;
387
388 unsigned char flags;
389};
390
Hanno Becker473f98f2019-06-26 10:27:32 +0100391typedef mbedtls_ssl_ciphersuite_t const * mbedtls_ssl_ciphersuite_handle_t;
392#define MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE ( (mbedtls_ssl_ciphersuite_handle_t) NULL )
Paul Bakker68884e32013-01-07 18:20:04 +0100393
Hanno Beckerb09132d2019-06-26 10:53:02 +0100394/**
395 * \brief This macro builds an instance of ::mbedtls_ssl_ciphersuite_t
396 * from an \c MBEDTLS_SUITE_XXX identifier.
397 */
398#define MBEDTLS_SSL_SUITE_INFO( SUITE ) \
399 { MBEDTLS_SSL_SUITE_ID( SUITE ), \
400 MBEDTLS_SSL_SUITE_NAME( SUITE ), \
401 MBEDTLS_SSL_SUITE_CIPHER( SUITE ), \
402 MBEDTLS_SSL_SUITE_MAC( SUITE ), \
403 MBEDTLS_SSL_SUITE_KEY_EXCHANGE( SUITE ), \
404 MBEDTLS_SSL_SUITE_MIN_MAJOR_VER( SUITE ), \
405 MBEDTLS_SSL_SUITE_MIN_MINOR_VER( SUITE ), \
406 MBEDTLS_SSL_SUITE_MAX_MAJOR_VER( SUITE ), \
407 MBEDTLS_SSL_SUITE_MAX_MINOR_VER( SUITE ), \
408 MBEDTLS_SSL_SUITE_FLAGS( SUITE ) }
Hanno Becker5cce9362019-06-26 11:39:32 +0100409
Hanno Becker73f4cb12019-06-27 13:51:07 +0100410#else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker5cce9362019-06-26 11:39:32 +0100411
412typedef unsigned char mbedtls_ssl_ciphersuite_handle_t;
413#define MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE ( (mbedtls_ssl_ciphersuite_handle_t) 0 )
414#define MBEDTLS_SSL_CIPHERSUITE_UNIQUE_VALID_HANDLE ( (mbedtls_ssl_ciphersuite_handle_t) 1 )
415
Hanno Becker73f4cb12019-06-27 13:51:07 +0100416#endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker5cce9362019-06-26 11:39:32 +0100417
Hanno Becker67fb16e2019-06-28 11:39:22 +0100418#if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE)
419static inline int mbedtls_ssl_session_get_ciphersuite(
420 mbedtls_ssl_session const * session )
421{
422 return( session->ciphersuite );
423}
424#else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
425static inline int mbedtls_ssl_session_get_ciphersuite(
426 mbedtls_ssl_session const * session )
427{
428 ((void) session);
429 return( MBEDTLS_SSL_SUITE_ID( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
430}
431#endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
432
Hanno Becker473f98f2019-06-26 10:27:32 +0100433/*
434 * Getter functions for the extraction of ciphersuite attributes
435 * from a ciphersuite handle.
436 *
Hanno Becker870bcd32019-07-02 17:24:12 +0100437 * Warning: These functions have the validity of the handle as a precondition!
Hanno Becker473f98f2019-06-26 10:27:32 +0100438 * Their behaviour is undefined when MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE
439 * is passed.
440 */
Paul Bakker68884e32013-01-07 18:20:04 +0100441
Hanno Becker73f4cb12019-06-27 13:51:07 +0100442#if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE)
Hanno Becker473f98f2019-06-26 10:27:32 +0100443/*
444 * Implementation of getter functions when the ciphersuite handle
445 * is a pointer to the ciphersuite information structure.
446 *
447 * The precondition that the handle is valid means that
448 * we don't need to check that info != NULL.
449 */
450static inline int mbedtls_ssl_suite_get_id(
451 mbedtls_ssl_ciphersuite_handle_t const info )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100452{
Hanno Becker473f98f2019-06-26 10:27:32 +0100453 return( info->id );
454}
455static inline const char* mbedtls_ssl_suite_get_name(
456 mbedtls_ssl_ciphersuite_handle_t const info )
457{
458 return( info->name );
459}
460static inline mbedtls_cipher_type_t mbedtls_ssl_suite_get_cipher(
461 mbedtls_ssl_ciphersuite_handle_t const info )
462{
463 return( info->cipher );
464}
465static inline mbedtls_md_type_t mbedtls_ssl_suite_get_mac(
466 mbedtls_ssl_ciphersuite_handle_t const info )
467{
468 return( info->mac );
469}
470static inline mbedtls_key_exchange_type_t mbedtls_ssl_suite_get_key_exchange(
471 mbedtls_ssl_ciphersuite_handle_t const info )
472{
473 return( info->key_exchange );
474}
475static inline int mbedtls_ssl_suite_get_min_major_ver(
476 mbedtls_ssl_ciphersuite_handle_t const info )
477{
478 return( info->min_major_ver );
479}
480static inline int mbedtls_ssl_suite_get_min_minor_ver(
481 mbedtls_ssl_ciphersuite_handle_t const info )
482{
483 return( info->min_minor_ver );
484}
485static inline int mbedtls_ssl_suite_get_max_major_ver(
486 mbedtls_ssl_ciphersuite_handle_t const info )
487{
488 return( info->max_major_ver );
489}
490static inline int mbedtls_ssl_suite_get_max_minor_ver(
491 mbedtls_ssl_ciphersuite_handle_t const info )
492{
493 return( info->max_minor_ver );
494}
495static inline unsigned char mbedtls_ssl_suite_get_flags(
496 mbedtls_ssl_ciphersuite_handle_t const info )
497{
498 return( info->flags );
499}
Hanno Becker73f4cb12019-06-27 13:51:07 +0100500#else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker5cce9362019-06-26 11:39:32 +0100501/*
Hanno Beckerd89e8cb2019-06-28 13:09:41 +0100502 * Implementations of getter functions in the case of only a single possible
503 * ciphersuite. In this case, the handle is logically a boolean (either the
504 * invalid handle or the unique valid handle representing the single enabled
505 * ciphersuite), and the precondition that the handle is valid means that we
506 * can statically return the hardcoded attribute of the enabled ciphersuite.
Hanno Becker5cce9362019-06-26 11:39:32 +0100507 */
508static inline int mbedtls_ssl_suite_get_id(
509 mbedtls_ssl_ciphersuite_handle_t const info )
510{
511 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100512 return( MBEDTLS_SSL_SUITE_ID( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100513}
514static inline const char* mbedtls_ssl_suite_get_name(
515 mbedtls_ssl_ciphersuite_handle_t const info )
516{
517 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100518 return( MBEDTLS_SSL_SUITE_NAME( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100519}
520static inline mbedtls_cipher_type_t mbedtls_ssl_suite_get_cipher(
521 mbedtls_ssl_ciphersuite_handle_t const info )
522{
523 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100524 return( MBEDTLS_SSL_SUITE_CIPHER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100525}
526static inline mbedtls_md_type_t mbedtls_ssl_suite_get_mac(
527 mbedtls_ssl_ciphersuite_handle_t const info )
528{
529 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100530 return( MBEDTLS_SSL_SUITE_MAC( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100531}
532static inline mbedtls_key_exchange_type_t mbedtls_ssl_suite_get_key_exchange(
533 mbedtls_ssl_ciphersuite_handle_t const info )
534{
535 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100536 return( MBEDTLS_SSL_SUITE_KEY_EXCHANGE( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100537}
538static inline int mbedtls_ssl_suite_get_min_major_ver(
539 mbedtls_ssl_ciphersuite_handle_t const info )
540{
541 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100542 return( MBEDTLS_SSL_SUITE_MIN_MAJOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100543}
544static inline int mbedtls_ssl_suite_get_min_minor_ver(
545 mbedtls_ssl_ciphersuite_handle_t const info )
546{
547 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100548 return( MBEDTLS_SSL_SUITE_MIN_MINOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100549}
550static inline int mbedtls_ssl_suite_get_max_major_ver(
551 mbedtls_ssl_ciphersuite_handle_t const info )
552{
553 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100554 return( MBEDTLS_SSL_SUITE_MAX_MAJOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100555}
556static inline int mbedtls_ssl_suite_get_max_minor_ver(
557 mbedtls_ssl_ciphersuite_handle_t const info )
558{
559 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100560 return( MBEDTLS_SSL_SUITE_MAX_MINOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100561}
562static inline unsigned char mbedtls_ssl_suite_get_flags(
563 mbedtls_ssl_ciphersuite_handle_t const info )
564{
565 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100566 return( MBEDTLS_SSL_SUITE_FLAGS( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100567}
Hanno Becker73f4cb12019-06-27 13:51:07 +0100568#endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker473f98f2019-06-26 10:27:32 +0100569
Hanno Becker67fb16e2019-06-28 11:39:22 +0100570const int *mbedtls_ssl_list_ciphersuites( void );
571
572/*
573 * Various small helper functions for ciphersuites.
574 *
575 * Like the getter functions, they assume that the provided ciphersuite
576 * handle is valid, and hence can be optimized in case there's only one
577 * ciphersuite enabled.
578 *
579 * To avoid code-duplication between inline and non-inline implementations
580 * of this, we define internal static inline versions of all functions first,
581 * and define wrappers around these either here or in ssl_ciphersuites.c,
582 * depending on whether MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE is defined.
583 */
584
Hanno Becker67fb16e2019-06-28 11:39:22 +0100585#if defined(MBEDTLS_PK_C)
586static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg_internal(
587 mbedtls_ssl_ciphersuite_handle_t info )
588{
589 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
590 {
591 case MBEDTLS_KEY_EXCHANGE_RSA:
592 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
593 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
594 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
595 return( MBEDTLS_PK_RSA );
596
597 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
598 return( MBEDTLS_PK_ECDSA );
599
600 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
601 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
602 return( MBEDTLS_PK_ECKEY );
603
604 default:
605 return( MBEDTLS_PK_NONE );
606 }
607}
608
609static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg_internal(
610 mbedtls_ssl_ciphersuite_handle_t info )
611{
612 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
613 {
614 case MBEDTLS_KEY_EXCHANGE_RSA:
615 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
616 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
617 return( MBEDTLS_PK_RSA );
618
619 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
620 return( MBEDTLS_PK_ECDSA );
621
622 default:
623 return( MBEDTLS_PK_NONE );
624 }
625}
626
627#endif /* MBEDTLS_PK_C */
628
629#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
630 defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
631static inline int mbedtls_ssl_ciphersuite_uses_ec_internal(
632 mbedtls_ssl_ciphersuite_handle_t info )
633{
634 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
635 {
636 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
637 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
638 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
639 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
640 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
641 case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
642 return( 1 );
643
644 default:
645 return( 0 );
646 }
647}
Hanno Becker9b3ec122019-07-02 17:23:41 +0100648#endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C || MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
Hanno Becker67fb16e2019-06-28 11:39:22 +0100649
650#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
651static inline int mbedtls_ssl_ciphersuite_uses_psk_internal(
652 mbedtls_ssl_ciphersuite_handle_t info )
653{
654 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
655 {
656 case MBEDTLS_KEY_EXCHANGE_PSK:
657 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
658 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
659 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
660 return( 1 );
661
662 default:
663 return( 0 );
664 }
665}
666#endif /* MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */
667
668/*
669 * Wrappers around internal helper functions to be used by the rest of
670 * the library, either defined static inline here or in ssl_ciphersuites.c.
671 */
672
Hanno Becker73f4cb12019-06-27 13:51:07 +0100673#if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE)
Hanno Beckere02758c2019-06-26 15:31:31 +0100674
Hanno Becker67fb16e2019-06-28 11:39:22 +0100675mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_string(
676 const char *ciphersuite_name );
677mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_id(
678 int ciphersuite_id );
Hanno Becker473f98f2019-06-26 10:27:32 +0100679
Hanno Becker473f98f2019-06-26 10:27:32 +0100680#if defined(MBEDTLS_PK_C)
Hanno Becker67fb16e2019-06-28 11:39:22 +0100681mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg(
682 mbedtls_ssl_ciphersuite_handle_t info );
683mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg(
684 mbedtls_ssl_ciphersuite_handle_t info );
685#endif /* MBEDTLS_PK_C */
Hanno Becker473f98f2019-06-26 10:27:32 +0100686
Hanno Becker67fb16e2019-06-28 11:39:22 +0100687#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
688 defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
Hanno Becker473f98f2019-06-26 10:27:32 +0100689int mbedtls_ssl_ciphersuite_uses_ec( mbedtls_ssl_ciphersuite_handle_t info );
Hanno Becker67fb16e2019-06-28 11:39:22 +0100690#endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C ||
691 MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED*/
692
693#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
Hanno Becker473f98f2019-06-26 10:27:32 +0100694int mbedtls_ssl_ciphersuite_uses_psk( mbedtls_ssl_ciphersuite_handle_t info );
Hanno Becker67fb16e2019-06-28 11:39:22 +0100695#endif /* MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */
696
697#else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
698
Hanno Becker67fb16e2019-06-28 11:39:22 +0100699#if defined(MBEDTLS_PK_C)
700static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg(
701 mbedtls_ssl_ciphersuite_handle_t info )
702{
703 return( mbedtls_ssl_get_ciphersuite_sig_pk_alg_internal( info ) );
704}
705
706static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg(
707 mbedtls_ssl_ciphersuite_handle_t info )
708{
709 return( mbedtls_ssl_get_ciphersuite_sig_alg_internal( info ) );
710}
711#endif /* MBEDTLS_PK_C */
712
713#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
714 defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
715static inline int mbedtls_ssl_ciphersuite_uses_ec(
716 mbedtls_ssl_ciphersuite_handle_t info )
717{
718 return( mbedtls_ssl_ciphersuite_uses_ec_internal( info ) );
719}
720#endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C ||
721 MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED*/
722
723#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
724static inline int mbedtls_ssl_ciphersuite_uses_psk(
725 mbedtls_ssl_ciphersuite_handle_t info )
726{
727 return( mbedtls_ssl_ciphersuite_uses_psk_internal( info ) );
728}
729#endif /* MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */
730
731static inline mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_id(
732 int ciphersuite )
733{
734 static const int single_suite_id =
735 MBEDTLS_SSL_SUITE_ID( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE );
736
737 if( ciphersuite == single_suite_id )
738 return( MBEDTLS_SSL_CIPHERSUITE_UNIQUE_VALID_HANDLE );
739
740 return( MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE );
741}
742
743static inline mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_string(
744 const char *ciphersuite_name )
745{
746 static const char * const single_suite_name =
747 MBEDTLS_SSL_SUITE_NAME( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE );
748
749 if( strcmp( ciphersuite_name, single_suite_name ) == 0 )
750 return( MBEDTLS_SSL_CIPHERSUITE_UNIQUE_VALID_HANDLE );
751
752 return( MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE );
753}
754
755#endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker473f98f2019-06-26 10:27:32 +0100756
Hanno Becker779d79d2019-07-03 13:37:21 +0100757static inline int mbedtls_ssl_ciphersuite_has_pfs(
758 mbedtls_ssl_ciphersuite_handle_t info )
759{
760 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
761 {
762 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
763 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
764 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
765 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
766 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
767 case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
768 return( 1 );
769
770 default:
771 return( 0 );
772 }
773}
774
775static inline int mbedtls_ssl_ciphersuite_no_pfs(
776 mbedtls_ssl_ciphersuite_handle_t info )
777{
778 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
779 {
780 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
781 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
782 case MBEDTLS_KEY_EXCHANGE_RSA:
783 case MBEDTLS_KEY_EXCHANGE_PSK:
784 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
785 return( 1 );
786
787 default:
788 return( 0 );
789 }
790}
791
792
793static inline int mbedtls_ssl_ciphersuite_uses_ecdh(
794 mbedtls_ssl_ciphersuite_handle_t info )
795{
796 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
797 {
798 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
799 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
800 return( 1 );
801
802 default:
803 return( 0 );
804 }
805}
806
807static inline int mbedtls_ssl_ciphersuite_cert_req_allowed(
808 mbedtls_ssl_ciphersuite_handle_t info )
809{
810 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
811 {
812 case MBEDTLS_KEY_EXCHANGE_RSA:
813 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
814 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
815 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
816 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
817 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
818 return( 1 );
819
820 default:
821 return( 0 );
822 }
823}
824
825static inline int mbedtls_ssl_ciphersuite_uses_srv_cert(
826 mbedtls_ssl_ciphersuite_handle_t info )
827{
828 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
829 {
830 case MBEDTLS_KEY_EXCHANGE_RSA:
831 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
832 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
833 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
834 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
835 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
836 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
837 return( 1 );
838
839 default:
840 return( 0 );
841 }
842}
843
844static inline int mbedtls_ssl_ciphersuite_uses_dhe(
845 mbedtls_ssl_ciphersuite_handle_t info )
846{
847 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
848 {
849 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
850 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
851 return( 1 );
852
853 default:
854 return( 0 );
855 }
856}
857
858static inline int mbedtls_ssl_ciphersuite_uses_ecdhe(
859 mbedtls_ssl_ciphersuite_handle_t info )
860{
861 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
862 {
863 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
864 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
865 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
866 return( 1 );
867
868 default:
869 return( 0 );
870 }
871}
872
873static inline int mbedtls_ssl_ciphersuite_uses_server_signature(
874 mbedtls_ssl_ciphersuite_handle_t info )
875{
876 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
877 {
878 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
879 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
880 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
881 return( 1 );
882
883 default:
884 return( 0 );
885 }
886}
887
Paul Bakker68884e32013-01-07 18:20:04 +0100888#ifdef __cplusplus
889}
890#endif
891
892#endif /* ssl_ciphersuites.h */