blob: 54491d719321d69bb71bc36e90ad3fe13d6b5b33 [file] [log] [blame]
Paul Bakker68884e32013-01-07 18:20:04 +01001/**
2 * \file ssl_ciphersuites.h
3 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief SSL Ciphersuites for mbed TLS
Darryl Greena40a1012018-01-05 15:33:17 +00005 */
6/*
Manuel Pégourié-Gonnard6fb81872015-07-27 11:11:48 +02007 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02008 * SPDX-License-Identifier: Apache-2.0
9 *
10 * Licensed under the Apache License, Version 2.0 (the "License"); you may
11 * not use this file except in compliance with the License.
12 * You may obtain a copy of the License at
13 *
14 * http://www.apache.org/licenses/LICENSE-2.0
15 *
16 * Unless required by applicable law or agreed to in writing, software
17 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
18 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19 * See the License for the specific language governing permissions and
20 * limitations under the License.
Paul Bakker68884e32013-01-07 18:20:04 +010021 *
Manuel Pégourié-Gonnardfe446432015-03-06 13:17:10 +000022 * This file is part of mbed TLS (https://tls.mbed.org)
Paul Bakker68884e32013-01-07 18:20:04 +010023 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020024#ifndef MBEDTLS_SSL_CIPHERSUITES_H
25#define MBEDTLS_SSL_CIPHERSUITES_H
Paul Bakker68884e32013-01-07 18:20:04 +010026
Ron Eldor8b0cf2e2018-02-14 16:02:41 +020027#if !defined(MBEDTLS_CONFIG_FILE)
28#include "config.h"
29#else
30#include MBEDTLS_CONFIG_FILE
31#endif
32
Manuel Pégourié-Gonnard09edda82013-08-19 13:50:33 +020033#include "pk.h"
Paul Bakker68884e32013-01-07 18:20:04 +010034#include "cipher.h"
35#include "md.h"
Hanno Beckerb09132d2019-06-26 10:53:02 +010036#include "ssl.h"
Hanno Becker67fb16e2019-06-28 11:39:22 +010037#include <string.h>
Paul Bakker68884e32013-01-07 18:20:04 +010038
39#ifdef __cplusplus
40extern "C" {
41#endif
42
Paul Bakker41c83d32013-03-20 14:39:14 +010043/*
44 * Supported ciphersuites (Official IANA names)
45 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020046#define MBEDTLS_TLS_RSA_WITH_NULL_MD5 0x01 /**< Weak! */
47#define MBEDTLS_TLS_RSA_WITH_NULL_SHA 0x02 /**< Weak! */
Paul Bakker41c83d32013-03-20 14:39:14 +010048
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020049#define MBEDTLS_TLS_RSA_WITH_RC4_128_MD5 0x04
50#define MBEDTLS_TLS_RSA_WITH_RC4_128_SHA 0x05
51#define MBEDTLS_TLS_RSA_WITH_DES_CBC_SHA 0x09 /**< Weak! Not in TLS 1.2 */
Paul Bakker41c83d32013-03-20 14:39:14 +010052
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020053#define MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA 0x0A
Paul Bakker0c5fac22013-04-19 21:10:51 +020054
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020055#define MBEDTLS_TLS_DHE_RSA_WITH_DES_CBC_SHA 0x15 /**< Weak! Not in TLS 1.2 */
56#define MBEDTLS_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 0x16
Paul Bakker41c83d32013-03-20 14:39:14 +010057
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020058#define MBEDTLS_TLS_PSK_WITH_NULL_SHA 0x2C /**< Weak! */
59#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA 0x2D /**< Weak! */
60#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA 0x2E /**< Weak! */
61#define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA 0x2F
Paul Bakker0c5fac22013-04-19 21:10:51 +020062
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020063#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA 0x33
64#define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA 0x35
65#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA 0x39
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020066
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020067#define MBEDTLS_TLS_RSA_WITH_NULL_SHA256 0x3B /**< Weak! */
68#define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 0x3C /**< TLS 1.2 */
69#define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 0x3D /**< TLS 1.2 */
Paul Bakker41c83d32013-03-20 14:39:14 +010070
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020071#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 0x41
72#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 0x45
Paul Bakker0c5fac22013-04-19 21:10:51 +020073
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020074#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 0x67 /**< TLS 1.2 */
75#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 0x6B /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +020076
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020077#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 0x84
78#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 0x88
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020079
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020080#define MBEDTLS_TLS_PSK_WITH_RC4_128_SHA 0x8A
81#define MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA 0x8B
82#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA 0x8C
83#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA 0x8D
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020084
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020085#define MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA 0x8E
86#define MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA 0x8F
87#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA 0x90
88#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA 0x91
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020089
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020090#define MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA 0x92
91#define MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA 0x93
92#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA 0x94
93#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA 0x95
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020094
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020095#define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 0x9C /**< TLS 1.2 */
96#define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 0x9D /**< TLS 1.2 */
97#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 0x9E /**< TLS 1.2 */
98#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 0x9F /**< TLS 1.2 */
Paul Bakker41c83d32013-03-20 14:39:14 +010099
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200100#define MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256 0xA8 /**< TLS 1.2 */
101#define MBEDTLS_TLS_PSK_WITH_AES_256_GCM_SHA384 0xA9 /**< TLS 1.2 */
102#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_GCM_SHA256 0xAA /**< TLS 1.2 */
103#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_GCM_SHA384 0xAB /**< TLS 1.2 */
104#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256 0xAC /**< TLS 1.2 */
105#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384 0xAD /**< TLS 1.2 */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200106
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200107#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA256 0xAE
108#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA384 0xAF
109#define MBEDTLS_TLS_PSK_WITH_NULL_SHA256 0xB0 /**< Weak! */
110#define MBEDTLS_TLS_PSK_WITH_NULL_SHA384 0xB1 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200111
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200112#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256 0xB2
113#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384 0xB3
114#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA256 0xB4 /**< Weak! */
115#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA384 0xB5 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200116
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200117#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256 0xB6
118#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384 0xB7
119#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA256 0xB8 /**< Weak! */
120#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA384 0xB9 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200121
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200122#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xBA /**< TLS 1.2 */
123#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xBE /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200124
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200125#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC0 /**< TLS 1.2 */
126#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC4 /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200127
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200128#define MBEDTLS_TLS_ECDH_ECDSA_WITH_NULL_SHA 0xC001 /**< Weak! */
129#define MBEDTLS_TLS_ECDH_ECDSA_WITH_RC4_128_SHA 0xC002 /**< Not in SSL3! */
130#define MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA 0xC003 /**< Not in SSL3! */
131#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA 0xC004 /**< Not in SSL3! */
132#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA 0xC005 /**< Not in SSL3! */
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +0100133
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200134#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_NULL_SHA 0xC006 /**< Weak! */
135#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA 0xC007 /**< Not in SSL3! */
136#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA 0xC008 /**< Not in SSL3! */
137#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA 0xC009 /**< Not in SSL3! */
138#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA 0xC00A /**< Not in SSL3! */
Manuel Pégourié-Gonnard32ea60a2013-08-17 17:39:04 +0200139
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200140#define MBEDTLS_TLS_ECDH_RSA_WITH_NULL_SHA 0xC00B /**< Weak! */
141#define MBEDTLS_TLS_ECDH_RSA_WITH_RC4_128_SHA 0xC00C /**< Not in SSL3! */
142#define MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA 0xC00D /**< Not in SSL3! */
143#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA 0xC00E /**< Not in SSL3! */
144#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA 0xC00F /**< Not in SSL3! */
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +0100145
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200146#define MBEDTLS_TLS_ECDHE_RSA_WITH_NULL_SHA 0xC010 /**< Weak! */
147#define MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA 0xC011 /**< Not in SSL3! */
148#define MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 0xC012 /**< Not in SSL3! */
149#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 0xC013 /**< Not in SSL3! */
150#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 0xC014 /**< Not in SSL3! */
Paul Bakker41c83d32013-03-20 14:39:14 +0100151
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200152#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 0xC023 /**< TLS 1.2 */
153#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 0xC024 /**< TLS 1.2 */
154#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 0xC025 /**< TLS 1.2 */
155#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 0xC026 /**< TLS 1.2 */
156#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 0xC027 /**< TLS 1.2 */
157#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 0xC028 /**< TLS 1.2 */
158#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 0xC029 /**< TLS 1.2 */
159#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 0xC02A /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200160
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200161#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 0xC02B /**< TLS 1.2 */
162#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 0xC02C /**< TLS 1.2 */
163#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 0xC02D /**< TLS 1.2 */
164#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 0xC02E /**< TLS 1.2 */
165#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 0xC02F /**< TLS 1.2 */
166#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 0xC030 /**< TLS 1.2 */
167#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 0xC031 /**< TLS 1.2 */
168#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 0xC032 /**< TLS 1.2 */
Paul Bakkera54e4932013-03-20 15:31:54 +0100169
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200170#define MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA 0xC033 /**< Not in SSL3! */
171#define MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA 0xC034 /**< Not in SSL3! */
172#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA 0xC035 /**< Not in SSL3! */
173#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA 0xC036 /**< Not in SSL3! */
174#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 0xC037 /**< Not in SSL3! */
175#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384 0xC038 /**< Not in SSL3! */
176#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA 0xC039 /**< Weak! No SSL3! */
177#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA256 0xC03A /**< Weak! No SSL3! */
178#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA384 0xC03B /**< Weak! No SSL3! */
Manuel Pégourié-Gonnard225d6aa2013-10-11 19:07:56 +0200179
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +0100180#define MBEDTLS_TLS_RSA_WITH_ARIA_128_CBC_SHA256 0xC03C /**< TLS 1.2 */
181#define MBEDTLS_TLS_RSA_WITH_ARIA_256_CBC_SHA384 0xC03D /**< TLS 1.2 */
182#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256 0xC044 /**< TLS 1.2 */
183#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384 0xC045 /**< TLS 1.2 */
184#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256 0xC048 /**< TLS 1.2 */
185#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384 0xC049 /**< TLS 1.2 */
186#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256 0xC04A /**< TLS 1.2 */
187#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384 0xC04B /**< TLS 1.2 */
188#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256 0xC04C /**< TLS 1.2 */
189#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384 0xC04D /**< TLS 1.2 */
190#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256 0xC04E /**< TLS 1.2 */
191#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384 0xC04F /**< TLS 1.2 */
192#define MBEDTLS_TLS_RSA_WITH_ARIA_128_GCM_SHA256 0xC050 /**< TLS 1.2 */
193#define MBEDTLS_TLS_RSA_WITH_ARIA_256_GCM_SHA384 0xC051 /**< TLS 1.2 */
194#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 0xC052 /**< TLS 1.2 */
195#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 0xC053 /**< TLS 1.2 */
196#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 0xC05C /**< TLS 1.2 */
197#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 0xC05D /**< TLS 1.2 */
198#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256 0xC05E /**< TLS 1.2 */
199#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384 0xC05F /**< TLS 1.2 */
200#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 0xC060 /**< TLS 1.2 */
201#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 0xC061 /**< TLS 1.2 */
202#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256 0xC062 /**< TLS 1.2 */
203#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384 0xC063 /**< TLS 1.2 */
204#define MBEDTLS_TLS_PSK_WITH_ARIA_128_CBC_SHA256 0xC064 /**< TLS 1.2 */
205#define MBEDTLS_TLS_PSK_WITH_ARIA_256_CBC_SHA384 0xC065 /**< TLS 1.2 */
206#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC066 /**< TLS 1.2 */
207#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC067 /**< TLS 1.2 */
208#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256 0xC068 /**< TLS 1.2 */
209#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384 0xC069 /**< TLS 1.2 */
210#define MBEDTLS_TLS_PSK_WITH_ARIA_128_GCM_SHA256 0xC06A /**< TLS 1.2 */
211#define MBEDTLS_TLS_PSK_WITH_ARIA_256_GCM_SHA384 0xC06B /**< TLS 1.2 */
212#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256 0xC06C /**< TLS 1.2 */
213#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384 0xC06D /**< TLS 1.2 */
214#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256 0xC06E /**< TLS 1.2 */
215#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384 0xC06F /**< TLS 1.2 */
216#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC070 /**< TLS 1.2 */
217#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC071 /**< TLS 1.2 */
Markku-Juhani O. Saarinenc06e1012017-12-07 11:51:13 +0000218
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200219#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC072 /**< Not in SSL3! */
220#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC073 /**< Not in SSL3! */
221#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC074 /**< Not in SSL3! */
222#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC075 /**< Not in SSL3! */
223#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC076 /**< Not in SSL3! */
224#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC077 /**< Not in SSL3! */
225#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC078 /**< Not in SSL3! */
226#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC079 /**< Not in SSL3! */
Paul Bakker27714b12013-04-07 23:07:12 +0200227
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200228#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC07A /**< TLS 1.2 */
229#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC07B /**< TLS 1.2 */
230#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC07C /**< TLS 1.2 */
231#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC07D /**< TLS 1.2 */
232#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC086 /**< TLS 1.2 */
233#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC087 /**< TLS 1.2 */
234#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC088 /**< TLS 1.2 */
235#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC089 /**< TLS 1.2 */
236#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC08A /**< TLS 1.2 */
237#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC08B /**< TLS 1.2 */
238#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC08C /**< TLS 1.2 */
239#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC08D /**< TLS 1.2 */
Manuel Pégourié-Gonnard8d01eea2013-10-24 19:49:07 +0200240
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200241#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC08E /**< TLS 1.2 */
242#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC08F /**< TLS 1.2 */
243#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC090 /**< TLS 1.2 */
244#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC091 /**< TLS 1.2 */
245#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC092 /**< TLS 1.2 */
246#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC093 /**< TLS 1.2 */
Manuel Pégourié-Gonnard8d01eea2013-10-24 19:49:07 +0200247
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200248#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC094
249#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC095
250#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC096
251#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC097
252#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC098
253#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC099
254#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC09A /**< Not in SSL3! */
255#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC09B /**< Not in SSL3! */
Paul Bakker0f2f0bf2013-07-26 15:03:31 +0200256
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200257#define MBEDTLS_TLS_RSA_WITH_AES_128_CCM 0xC09C /**< TLS 1.2 */
258#define MBEDTLS_TLS_RSA_WITH_AES_256_CCM 0xC09D /**< TLS 1.2 */
259#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM 0xC09E /**< TLS 1.2 */
260#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM 0xC09F /**< TLS 1.2 */
261#define MBEDTLS_TLS_RSA_WITH_AES_128_CCM_8 0xC0A0 /**< TLS 1.2 */
262#define MBEDTLS_TLS_RSA_WITH_AES_256_CCM_8 0xC0A1 /**< TLS 1.2 */
263#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM_8 0xC0A2 /**< TLS 1.2 */
264#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM_8 0xC0A3 /**< TLS 1.2 */
265#define MBEDTLS_TLS_PSK_WITH_AES_128_CCM 0xC0A4 /**< TLS 1.2 */
266#define MBEDTLS_TLS_PSK_WITH_AES_256_CCM 0xC0A5 /**< TLS 1.2 */
267#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM 0xC0A6 /**< TLS 1.2 */
268#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM 0xC0A7 /**< TLS 1.2 */
269#define MBEDTLS_TLS_PSK_WITH_AES_128_CCM_8 0xC0A8 /**< TLS 1.2 */
270#define MBEDTLS_TLS_PSK_WITH_AES_256_CCM_8 0xC0A9 /**< TLS 1.2 */
271#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM_8 0xC0AA /**< TLS 1.2 */
272#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM_8 0xC0AB /**< TLS 1.2 */
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200273/* The last two are named with PSK_DHE in the RFC, which looks like a typo */
274
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200275#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM 0xC0AC /**< TLS 1.2 */
276#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM 0xC0AD /**< TLS 1.2 */
277#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 0xC0AE /**< TLS 1.2 */
278#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 0xC0AF /**< TLS 1.2 */
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200279
Manuel Pégourié-Gonnard538cb7b2015-09-15 18:03:28 +0200280#define MBEDTLS_TLS_ECJPAKE_WITH_AES_128_CCM_8 0xC0FF /**< experimental */
281
Manuel Pégourié-Gonnardce66d5e2018-06-14 11:11:15 +0200282/* RFC 7905 */
283#define MBEDTLS_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA8 /**< TLS 1.2 */
284#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA9 /**< TLS 1.2 */
285#define MBEDTLS_TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 0xCCAA /**< TLS 1.2 */
286#define MBEDTLS_TLS_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAB /**< TLS 1.2 */
287#define MBEDTLS_TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAC /**< TLS 1.2 */
288#define MBEDTLS_TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAD /**< TLS 1.2 */
289#define MBEDTLS_TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAE /**< TLS 1.2 */
290
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200291/* Reminder: update mbedtls_ssl_premaster_secret when adding a new key exchange.
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100292 * Reminder: update MBEDTLS_KEY_EXCHANGE__xxx below
Manuel Pégourié-Gonnardd9423232014-12-02 11:57:29 +0100293 */
Paul Bakker68884e32013-01-07 18:20:04 +0100294typedef enum {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200295 MBEDTLS_KEY_EXCHANGE_NONE = 0,
296 MBEDTLS_KEY_EXCHANGE_RSA,
297 MBEDTLS_KEY_EXCHANGE_DHE_RSA,
298 MBEDTLS_KEY_EXCHANGE_ECDHE_RSA,
299 MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA,
300 MBEDTLS_KEY_EXCHANGE_PSK,
301 MBEDTLS_KEY_EXCHANGE_DHE_PSK,
302 MBEDTLS_KEY_EXCHANGE_RSA_PSK,
303 MBEDTLS_KEY_EXCHANGE_ECDHE_PSK,
304 MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
305 MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
Manuel Pégourié-Gonnard557535d2015-09-15 17:53:32 +0200306 MBEDTLS_KEY_EXCHANGE_ECJPAKE,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200307} mbedtls_key_exchange_type_t;
Paul Bakker68884e32013-01-07 18:20:04 +0100308
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200309typedef struct mbedtls_ssl_ciphersuite_t mbedtls_ssl_ciphersuite_t;
Paul Bakker68884e32013-01-07 18:20:04 +0100310
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200311#define MBEDTLS_CIPHERSUITE_WEAK 0x01 /**< Weak ciphersuite flag */
312#define MBEDTLS_CIPHERSUITE_SHORT_TAG 0x02 /**< Short authentication tag,
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200313 eg for CCM_8 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200314#define MBEDTLS_CIPHERSUITE_NODTLS 0x04 /**< Can't be used with DTLS */
Paul Bakker68884e32013-01-07 18:20:04 +0100315
Hanno Beckerb09132d2019-06-26 10:53:02 +0100316/*
317 * Ciphersuite macro definitions
318 *
319 * This is highly incomplete and only contains those ciphersuites for
320 * which we need to be able to build the library with support for that
321 * ciphersuite only (currently MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8
322 * as an example).
323 */
324
325#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8()
326#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_ID MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8
327#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_NAME "TLS-ECDHE-ECDSA-WITH-AES-128-CCM-8"
328#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_CIPHER MBEDTLS_CIPHER_AES_128_CCM
329#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MAC MBEDTLS_MD_SHA256
330#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_KEY_EXCHANGE MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA
331#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MIN_MAJOR_VER MBEDTLS_SSL_MAJOR_VERSION_3
332#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MIN_MINOR_VER MBEDTLS_SSL_MINOR_VERSION_3
333#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MAX_MAJOR_VER MBEDTLS_SSL_MAJOR_VERSION_3
334#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MAX_MINOR_VER MBEDTLS_SSL_MINOR_VERSION_3
335#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_FLAGS MBEDTLS_CIPHERSUITE_SHORT_TAG
336
337/*
338 * Helper macros to extract fields from ciphersuites.
339 */
340
341#define MBEDTLS_SSL_SUITE_ID_T( SUITE ) SUITE ## _ID
342#define MBEDTLS_SSL_SUITE_NAME_T( SUITE ) SUITE ## _NAME
343#define MBEDTLS_SSL_SUITE_CIPHER_T( SUITE ) SUITE ## _CIPHER
344#define MBEDTLS_SSL_SUITE_MAC_T( SUITE ) SUITE ## _MAC
345#define MBEDTLS_SSL_SUITE_KEY_EXCHANGE_T( SUITE ) SUITE ## _KEY_EXCHANGE
346#define MBEDTLS_SSL_SUITE_MIN_MAJOR_VER_T( SUITE ) SUITE ## _MIN_MAJOR_VER
347#define MBEDTLS_SSL_SUITE_MIN_MINOR_VER_T( SUITE ) SUITE ## _MIN_MINOR_VER
348#define MBEDTLS_SSL_SUITE_MAX_MAJOR_VER_T( SUITE ) SUITE ## _MAX_MAJOR_VER
349#define MBEDTLS_SSL_SUITE_MAX_MINOR_VER_T( SUITE ) SUITE ## _MAX_MINOR_VER
350#define MBEDTLS_SSL_SUITE_FLAGS_T( SUITE ) SUITE ## _FLAGS
351
352/* Wrapper around MBEDTLS_SSL_SUITE_XXX_T() which makes sure that
353 * the argument is macro-expanded before concatenated with the
354 * field name. This allows to call these macros as
Hanno Becker73f4cb12019-06-27 13:51:07 +0100355 * MBEDTLS_SSL_SUITE_XXX( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ),
356 * where MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE expands to MBEDTLS_SSL_SUITE_XXX. */
Hanno Beckerb09132d2019-06-26 10:53:02 +0100357#define MBEDTLS_SSL_SUITE_ID( SUITE ) MBEDTLS_SSL_SUITE_ID_T( SUITE )
358#define MBEDTLS_SSL_SUITE_NAME( SUITE ) MBEDTLS_SSL_SUITE_NAME_T( SUITE )
359#define MBEDTLS_SSL_SUITE_CIPHER( SUITE ) MBEDTLS_SSL_SUITE_CIPHER_T( SUITE )
360#define MBEDTLS_SSL_SUITE_MAC( SUITE ) MBEDTLS_SSL_SUITE_MAC_T( SUITE )
361#define MBEDTLS_SSL_SUITE_KEY_EXCHANGE( SUITE ) MBEDTLS_SSL_SUITE_KEY_EXCHANGE_T( SUITE )
362#define MBEDTLS_SSL_SUITE_MIN_MAJOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MIN_MAJOR_VER_T( SUITE )
363#define MBEDTLS_SSL_SUITE_MIN_MINOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MIN_MINOR_VER_T( SUITE )
364#define MBEDTLS_SSL_SUITE_MAX_MAJOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MAX_MAJOR_VER_T( SUITE )
365#define MBEDTLS_SSL_SUITE_MAX_MINOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MAX_MINOR_VER_T( SUITE )
366#define MBEDTLS_SSL_SUITE_FLAGS( SUITE ) MBEDTLS_SSL_SUITE_FLAGS_T( SUITE )
367
Hanno Becker73f4cb12019-06-27 13:51:07 +0100368#if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE)
Paul Bakker68884e32013-01-07 18:20:04 +0100369/**
370 * \brief This structure is used for storing ciphersuite information
371 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200372struct mbedtls_ssl_ciphersuite_t
Paul Bakker68884e32013-01-07 18:20:04 +0100373{
374 int id;
375 const char * name;
376
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200377 mbedtls_cipher_type_t cipher;
378 mbedtls_md_type_t mac;
379 mbedtls_key_exchange_type_t key_exchange;
Paul Bakker68884e32013-01-07 18:20:04 +0100380
381 int min_major_ver;
382 int min_minor_ver;
383 int max_major_ver;
384 int max_minor_ver;
385
386 unsigned char flags;
387};
388
Hanno Becker473f98f2019-06-26 10:27:32 +0100389typedef mbedtls_ssl_ciphersuite_t const * mbedtls_ssl_ciphersuite_handle_t;
390#define MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE ( (mbedtls_ssl_ciphersuite_handle_t) NULL )
Paul Bakker68884e32013-01-07 18:20:04 +0100391
Hanno Beckerb09132d2019-06-26 10:53:02 +0100392/**
393 * \brief This macro builds an instance of ::mbedtls_ssl_ciphersuite_t
394 * from an \c MBEDTLS_SUITE_XXX identifier.
395 */
396#define MBEDTLS_SSL_SUITE_INFO( SUITE ) \
397 { MBEDTLS_SSL_SUITE_ID( SUITE ), \
398 MBEDTLS_SSL_SUITE_NAME( SUITE ), \
399 MBEDTLS_SSL_SUITE_CIPHER( SUITE ), \
400 MBEDTLS_SSL_SUITE_MAC( SUITE ), \
401 MBEDTLS_SSL_SUITE_KEY_EXCHANGE( SUITE ), \
402 MBEDTLS_SSL_SUITE_MIN_MAJOR_VER( SUITE ), \
403 MBEDTLS_SSL_SUITE_MIN_MINOR_VER( SUITE ), \
404 MBEDTLS_SSL_SUITE_MAX_MAJOR_VER( SUITE ), \
405 MBEDTLS_SSL_SUITE_MAX_MINOR_VER( SUITE ), \
406 MBEDTLS_SSL_SUITE_FLAGS( SUITE ) }
Hanno Becker5cce9362019-06-26 11:39:32 +0100407
Hanno Becker73f4cb12019-06-27 13:51:07 +0100408#else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker5cce9362019-06-26 11:39:32 +0100409
410typedef unsigned char mbedtls_ssl_ciphersuite_handle_t;
411#define MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE ( (mbedtls_ssl_ciphersuite_handle_t) 0 )
412#define MBEDTLS_SSL_CIPHERSUITE_UNIQUE_VALID_HANDLE ( (mbedtls_ssl_ciphersuite_handle_t) 1 )
413
Hanno Becker73f4cb12019-06-27 13:51:07 +0100414#endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker5cce9362019-06-26 11:39:32 +0100415
Hanno Becker67fb16e2019-06-28 11:39:22 +0100416#if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE)
417static inline int mbedtls_ssl_session_get_ciphersuite(
418 mbedtls_ssl_session const * session )
419{
420 return( session->ciphersuite );
421}
422#else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
423static inline int mbedtls_ssl_session_get_ciphersuite(
424 mbedtls_ssl_session const * session )
425{
426 ((void) session);
427 return( MBEDTLS_SSL_SUITE_ID( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
428}
429#endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
430
Hanno Becker473f98f2019-06-26 10:27:32 +0100431/*
432 * Getter functions for the extraction of ciphersuite attributes
433 * from a ciphersuite handle.
434 *
435 * These functions have the validity of the handle as a precondition!
436 * Their behaviour is undefined when MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE
437 * is passed.
438 */
Paul Bakker68884e32013-01-07 18:20:04 +0100439
Hanno Becker73f4cb12019-06-27 13:51:07 +0100440#if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE)
Hanno Becker473f98f2019-06-26 10:27:32 +0100441/*
442 * Implementation of getter functions when the ciphersuite handle
443 * is a pointer to the ciphersuite information structure.
444 *
445 * The precondition that the handle is valid means that
446 * we don't need to check that info != NULL.
447 */
448static inline int mbedtls_ssl_suite_get_id(
449 mbedtls_ssl_ciphersuite_handle_t const info )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100450{
Hanno Becker473f98f2019-06-26 10:27:32 +0100451 return( info->id );
452}
453static inline const char* mbedtls_ssl_suite_get_name(
454 mbedtls_ssl_ciphersuite_handle_t const info )
455{
456 return( info->name );
457}
458static inline mbedtls_cipher_type_t mbedtls_ssl_suite_get_cipher(
459 mbedtls_ssl_ciphersuite_handle_t const info )
460{
461 return( info->cipher );
462}
463static inline mbedtls_md_type_t mbedtls_ssl_suite_get_mac(
464 mbedtls_ssl_ciphersuite_handle_t const info )
465{
466 return( info->mac );
467}
468static inline mbedtls_key_exchange_type_t mbedtls_ssl_suite_get_key_exchange(
469 mbedtls_ssl_ciphersuite_handle_t const info )
470{
471 return( info->key_exchange );
472}
473static inline int mbedtls_ssl_suite_get_min_major_ver(
474 mbedtls_ssl_ciphersuite_handle_t const info )
475{
476 return( info->min_major_ver );
477}
478static inline int mbedtls_ssl_suite_get_min_minor_ver(
479 mbedtls_ssl_ciphersuite_handle_t const info )
480{
481 return( info->min_minor_ver );
482}
483static inline int mbedtls_ssl_suite_get_max_major_ver(
484 mbedtls_ssl_ciphersuite_handle_t const info )
485{
486 return( info->max_major_ver );
487}
488static inline int mbedtls_ssl_suite_get_max_minor_ver(
489 mbedtls_ssl_ciphersuite_handle_t const info )
490{
491 return( info->max_minor_ver );
492}
493static inline unsigned char mbedtls_ssl_suite_get_flags(
494 mbedtls_ssl_ciphersuite_handle_t const info )
495{
496 return( info->flags );
497}
Hanno Becker73f4cb12019-06-27 13:51:07 +0100498#else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker5cce9362019-06-26 11:39:32 +0100499/*
Hanno Beckerd89e8cb2019-06-28 13:09:41 +0100500 * Implementations of getter functions in the case of only a single possible
501 * ciphersuite. In this case, the handle is logically a boolean (either the
502 * invalid handle or the unique valid handle representing the single enabled
503 * ciphersuite), and the precondition that the handle is valid means that we
504 * can statically return the hardcoded attribute of the enabled ciphersuite.
Hanno Becker5cce9362019-06-26 11:39:32 +0100505 */
506static inline int mbedtls_ssl_suite_get_id(
507 mbedtls_ssl_ciphersuite_handle_t const info )
508{
509 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100510 return( MBEDTLS_SSL_SUITE_ID( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100511}
512static inline const char* mbedtls_ssl_suite_get_name(
513 mbedtls_ssl_ciphersuite_handle_t const info )
514{
515 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100516 return( MBEDTLS_SSL_SUITE_NAME( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100517}
518static inline mbedtls_cipher_type_t mbedtls_ssl_suite_get_cipher(
519 mbedtls_ssl_ciphersuite_handle_t const info )
520{
521 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100522 return( MBEDTLS_SSL_SUITE_CIPHER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100523}
524static inline mbedtls_md_type_t mbedtls_ssl_suite_get_mac(
525 mbedtls_ssl_ciphersuite_handle_t const info )
526{
527 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100528 return( MBEDTLS_SSL_SUITE_MAC( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100529}
530static inline mbedtls_key_exchange_type_t mbedtls_ssl_suite_get_key_exchange(
531 mbedtls_ssl_ciphersuite_handle_t const info )
532{
533 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100534 return( MBEDTLS_SSL_SUITE_KEY_EXCHANGE( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100535}
536static inline int mbedtls_ssl_suite_get_min_major_ver(
537 mbedtls_ssl_ciphersuite_handle_t const info )
538{
539 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100540 return( MBEDTLS_SSL_SUITE_MIN_MAJOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100541}
542static inline int mbedtls_ssl_suite_get_min_minor_ver(
543 mbedtls_ssl_ciphersuite_handle_t const info )
544{
545 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100546 return( MBEDTLS_SSL_SUITE_MIN_MINOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100547}
548static inline int mbedtls_ssl_suite_get_max_major_ver(
549 mbedtls_ssl_ciphersuite_handle_t const info )
550{
551 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100552 return( MBEDTLS_SSL_SUITE_MAX_MAJOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100553}
554static inline int mbedtls_ssl_suite_get_max_minor_ver(
555 mbedtls_ssl_ciphersuite_handle_t const info )
556{
557 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100558 return( MBEDTLS_SSL_SUITE_MAX_MINOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100559}
560static inline unsigned char mbedtls_ssl_suite_get_flags(
561 mbedtls_ssl_ciphersuite_handle_t const info )
562{
563 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100564 return( MBEDTLS_SSL_SUITE_FLAGS( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100565}
Hanno Becker73f4cb12019-06-27 13:51:07 +0100566#endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker473f98f2019-06-26 10:27:32 +0100567
Hanno Becker67fb16e2019-06-28 11:39:22 +0100568const int *mbedtls_ssl_list_ciphersuites( void );
569
570/*
571 * Various small helper functions for ciphersuites.
572 *
573 * Like the getter functions, they assume that the provided ciphersuite
574 * handle is valid, and hence can be optimized in case there's only one
575 * ciphersuite enabled.
576 *
577 * To avoid code-duplication between inline and non-inline implementations
578 * of this, we define internal static inline versions of all functions first,
579 * and define wrappers around these either here or in ssl_ciphersuites.c,
580 * depending on whether MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE is defined.
581 */
582
583static inline int mbedtls_ssl_ciphersuite_has_pfs_internal(
Hanno Becker473f98f2019-06-26 10:27:32 +0100584 mbedtls_ssl_ciphersuite_handle_t info )
585{
586 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100587 {
588 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
589 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
590 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
591 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
592 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
593 case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
594 return( 1 );
595
596 default:
597 return( 0 );
598 }
599}
Hanno Becker1aa267c2017-04-28 17:08:27 +0100600
Hanno Becker67fb16e2019-06-28 11:39:22 +0100601static inline int mbedtls_ssl_ciphersuite_no_pfs_internal(
Hanno Becker473f98f2019-06-26 10:27:32 +0100602 mbedtls_ssl_ciphersuite_handle_t info )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100603{
Hanno Becker473f98f2019-06-26 10:27:32 +0100604 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100605 {
606 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
607 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
608 case MBEDTLS_KEY_EXCHANGE_RSA:
609 case MBEDTLS_KEY_EXCHANGE_PSK:
610 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
611 return( 1 );
612
613 default:
614 return( 0 );
615 }
616}
Hanno Becker1aa267c2017-04-28 17:08:27 +0100617
Hanno Becker67fb16e2019-06-28 11:39:22 +0100618static inline int mbedtls_ssl_ciphersuite_uses_ecdh_internal(
Hanno Becker473f98f2019-06-26 10:27:32 +0100619 mbedtls_ssl_ciphersuite_handle_t info )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100620{
Hanno Becker473f98f2019-06-26 10:27:32 +0100621 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100622 {
623 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
624 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
625 return( 1 );
626
627 default:
628 return( 0 );
629 }
630}
Hanno Becker1aa267c2017-04-28 17:08:27 +0100631
Hanno Becker67fb16e2019-06-28 11:39:22 +0100632static inline int mbedtls_ssl_ciphersuite_cert_req_allowed_internal(
Hanno Becker473f98f2019-06-26 10:27:32 +0100633 mbedtls_ssl_ciphersuite_handle_t info )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100634{
Hanno Becker473f98f2019-06-26 10:27:32 +0100635 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100636 {
637 case MBEDTLS_KEY_EXCHANGE_RSA:
638 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
639 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
640 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
641 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
642 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
643 return( 1 );
644
645 default:
646 return( 0 );
647 }
648}
649
Hanno Becker67fb16e2019-06-28 11:39:22 +0100650static inline int mbedtls_ssl_ciphersuite_uses_srv_cert_internal(
Hanno Becker473f98f2019-06-26 10:27:32 +0100651 mbedtls_ssl_ciphersuite_handle_t info )
Hanno Becker5097cba2019-02-05 13:36:46 +0000652{
Hanno Becker473f98f2019-06-26 10:27:32 +0100653 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
Hanno Becker5097cba2019-02-05 13:36:46 +0000654 {
655 case MBEDTLS_KEY_EXCHANGE_RSA:
656 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
657 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
658 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
659 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
660 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
661 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
662 return( 1 );
663
664 default:
665 return( 0 );
666 }
667}
668
Hanno Becker67fb16e2019-06-28 11:39:22 +0100669static inline int mbedtls_ssl_ciphersuite_uses_dhe_internal(
Hanno Becker473f98f2019-06-26 10:27:32 +0100670 mbedtls_ssl_ciphersuite_handle_t info )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100671{
Hanno Becker473f98f2019-06-26 10:27:32 +0100672 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100673 {
674 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
675 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
676 return( 1 );
677
678 default:
679 return( 0 );
680 }
681}
Hanno Becker1aa267c2017-04-28 17:08:27 +0100682
Hanno Becker67fb16e2019-06-28 11:39:22 +0100683static inline int mbedtls_ssl_ciphersuite_uses_ecdhe_internal(
Hanno Becker473f98f2019-06-26 10:27:32 +0100684 mbedtls_ssl_ciphersuite_handle_t info )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100685{
Hanno Becker473f98f2019-06-26 10:27:32 +0100686 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100687 {
688 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
689 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
690 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
691 return( 1 );
692
693 default:
694 return( 0 );
695 }
696}
Hanno Becker1aa267c2017-04-28 17:08:27 +0100697
Hanno Becker67fb16e2019-06-28 11:39:22 +0100698static inline int mbedtls_ssl_ciphersuite_uses_server_signature_internal(
Hanno Becker473f98f2019-06-26 10:27:32 +0100699 mbedtls_ssl_ciphersuite_handle_t info )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100700{
Hanno Becker473f98f2019-06-26 10:27:32 +0100701 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100702 {
703 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
704 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
705 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
706 return( 1 );
707
708 default:
709 return( 0 );
710 }
711}
Manuel Pégourié-Gonnard51451f82013-09-17 12:06:25 +0200712
Hanno Becker67fb16e2019-06-28 11:39:22 +0100713#if defined(MBEDTLS_PK_C)
714static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg_internal(
715 mbedtls_ssl_ciphersuite_handle_t info )
716{
717 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
718 {
719 case MBEDTLS_KEY_EXCHANGE_RSA:
720 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
721 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
722 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
723 return( MBEDTLS_PK_RSA );
724
725 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
726 return( MBEDTLS_PK_ECDSA );
727
728 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
729 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
730 return( MBEDTLS_PK_ECKEY );
731
732 default:
733 return( MBEDTLS_PK_NONE );
734 }
735}
736
737static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg_internal(
738 mbedtls_ssl_ciphersuite_handle_t info )
739{
740 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
741 {
742 case MBEDTLS_KEY_EXCHANGE_RSA:
743 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
744 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
745 return( MBEDTLS_PK_RSA );
746
747 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
748 return( MBEDTLS_PK_ECDSA );
749
750 default:
751 return( MBEDTLS_PK_NONE );
752 }
753}
754
755#endif /* MBEDTLS_PK_C */
756
757#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
758 defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
759static inline int mbedtls_ssl_ciphersuite_uses_ec_internal(
760 mbedtls_ssl_ciphersuite_handle_t info )
761{
762 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
763 {
764 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
765 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
766 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
767 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
768 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
769 case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
770 return( 1 );
771
772 default:
773 return( 0 );
774 }
775}
776#endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C || MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED*/
777
778#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
779static inline int mbedtls_ssl_ciphersuite_uses_psk_internal(
780 mbedtls_ssl_ciphersuite_handle_t info )
781{
782 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
783 {
784 case MBEDTLS_KEY_EXCHANGE_PSK:
785 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
786 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
787 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
788 return( 1 );
789
790 default:
791 return( 0 );
792 }
793}
794#endif /* MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */
795
796/*
797 * Wrappers around internal helper functions to be used by the rest of
798 * the library, either defined static inline here or in ssl_ciphersuites.c.
799 */
800
Hanno Becker73f4cb12019-06-27 13:51:07 +0100801#if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE)
Hanno Beckere02758c2019-06-26 15:31:31 +0100802
Hanno Becker67fb16e2019-06-28 11:39:22 +0100803mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_string(
804 const char *ciphersuite_name );
805mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_id(
806 int ciphersuite_id );
Hanno Becker473f98f2019-06-26 10:27:32 +0100807
Hanno Becker67fb16e2019-06-28 11:39:22 +0100808int mbedtls_ssl_ciphersuite_has_pfs( mbedtls_ssl_ciphersuite_handle_t info );
809int mbedtls_ssl_ciphersuite_no_pfs( mbedtls_ssl_ciphersuite_handle_t info );
810int mbedtls_ssl_ciphersuite_uses_ecdh( mbedtls_ssl_ciphersuite_handle_t info );
811int mbedtls_ssl_ciphersuite_cert_req_allowed(
812 mbedtls_ssl_ciphersuite_handle_t info );
813int mbedtls_ssl_ciphersuite_uses_srv_cert(
814 mbedtls_ssl_ciphersuite_handle_t info );
815int mbedtls_ssl_ciphersuite_uses_dhe( mbedtls_ssl_ciphersuite_handle_t info );
816int mbedtls_ssl_ciphersuite_uses_ecdhe( mbedtls_ssl_ciphersuite_handle_t info );
817int mbedtls_ssl_ciphersuite_uses_server_signature(
818 mbedtls_ssl_ciphersuite_handle_t info );
Hanno Becker473f98f2019-06-26 10:27:32 +0100819
820#if defined(MBEDTLS_PK_C)
Hanno Becker67fb16e2019-06-28 11:39:22 +0100821mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg(
822 mbedtls_ssl_ciphersuite_handle_t info );
823mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg(
824 mbedtls_ssl_ciphersuite_handle_t info );
825#endif /* MBEDTLS_PK_C */
Hanno Becker473f98f2019-06-26 10:27:32 +0100826
Hanno Becker67fb16e2019-06-28 11:39:22 +0100827#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
828 defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
Hanno Becker473f98f2019-06-26 10:27:32 +0100829int mbedtls_ssl_ciphersuite_uses_ec( mbedtls_ssl_ciphersuite_handle_t info );
Hanno Becker67fb16e2019-06-28 11:39:22 +0100830#endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C ||
831 MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED*/
832
833#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
Hanno Becker473f98f2019-06-26 10:27:32 +0100834int mbedtls_ssl_ciphersuite_uses_psk( mbedtls_ssl_ciphersuite_handle_t info );
Hanno Becker67fb16e2019-06-28 11:39:22 +0100835#endif /* MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */
836
837#else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
838
839static inline int mbedtls_ssl_ciphersuite_has_pfs(
840 mbedtls_ssl_ciphersuite_handle_t info )
841{
842 return( mbedtls_ssl_ciphersuite_has_pfs_internal( info ) );
843}
844
845static inline int mbedtls_ssl_ciphersuite_no_pfs(
846 mbedtls_ssl_ciphersuite_handle_t info )
847{
848 return( mbedtls_ssl_ciphersuite_no_pfs_internal( info ) );
849}
850
851static inline int mbedtls_ssl_ciphersuite_uses_ecdh(
852 mbedtls_ssl_ciphersuite_handle_t info )
853{
854 return( mbedtls_ssl_ciphersuite_uses_ecdh_internal( info ) );
855}
856
857static inline int mbedtls_ssl_ciphersuite_cert_req_allowed(
858 mbedtls_ssl_ciphersuite_handle_t info )
859{
860 return( mbedtls_ssl_ciphersuite_cert_req_allowed_internal( info ) );
861}
862
863static inline int mbedtls_ssl_ciphersuite_uses_srv_cert(
864 mbedtls_ssl_ciphersuite_handle_t info )
865{
866 return( mbedtls_ssl_ciphersuite_uses_srv_cert_internal( info ) );
867}
868
869static inline int mbedtls_ssl_ciphersuite_uses_dhe(
870 mbedtls_ssl_ciphersuite_handle_t info )
871{
872 return( mbedtls_ssl_ciphersuite_uses_dhe_internal( info ) );
873}
874
875static inline int mbedtls_ssl_ciphersuite_uses_ecdhe(
876 mbedtls_ssl_ciphersuite_handle_t info )
877{
878 return( mbedtls_ssl_ciphersuite_uses_ecdhe_internal( info ) );
879}
880
881static inline int mbedtls_ssl_ciphersuite_uses_server_signature(
882 mbedtls_ssl_ciphersuite_handle_t info )
883{
884 return( mbedtls_ssl_ciphersuite_uses_server_signature_internal( info ) );
885}
886
887#if defined(MBEDTLS_PK_C)
888static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg(
889 mbedtls_ssl_ciphersuite_handle_t info )
890{
891 return( mbedtls_ssl_get_ciphersuite_sig_pk_alg_internal( info ) );
892}
893
894static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg(
895 mbedtls_ssl_ciphersuite_handle_t info )
896{
897 return( mbedtls_ssl_get_ciphersuite_sig_alg_internal( info ) );
898}
899#endif /* MBEDTLS_PK_C */
900
901#if defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
902 defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
903static inline int mbedtls_ssl_ciphersuite_uses_ec(
904 mbedtls_ssl_ciphersuite_handle_t info )
905{
906 return( mbedtls_ssl_ciphersuite_uses_ec_internal( info ) );
907}
908#endif /* MBEDTLS_ECDH_C || MBEDTLS_ECDSA_C ||
909 MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED*/
910
911#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
912static inline int mbedtls_ssl_ciphersuite_uses_psk(
913 mbedtls_ssl_ciphersuite_handle_t info )
914{
915 return( mbedtls_ssl_ciphersuite_uses_psk_internal( info ) );
916}
917#endif /* MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */
918
919static inline mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_id(
920 int ciphersuite )
921{
922 static const int single_suite_id =
923 MBEDTLS_SSL_SUITE_ID( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE );
924
925 if( ciphersuite == single_suite_id )
926 return( MBEDTLS_SSL_CIPHERSUITE_UNIQUE_VALID_HANDLE );
927
928 return( MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE );
929}
930
931static inline mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_string(
932 const char *ciphersuite_name )
933{
934 static const char * const single_suite_name =
935 MBEDTLS_SSL_SUITE_NAME( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE );
936
937 if( strcmp( ciphersuite_name, single_suite_name ) == 0 )
938 return( MBEDTLS_SSL_CIPHERSUITE_UNIQUE_VALID_HANDLE );
939
940 return( MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE );
941}
942
943#endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker473f98f2019-06-26 10:27:32 +0100944
Paul Bakker68884e32013-01-07 18:20:04 +0100945#ifdef __cplusplus
946}
947#endif
948
949#endif /* ssl_ciphersuites.h */