blob: f0f817c4772a7f4d166f1df55227ade5a56bdd98 [file] [log] [blame]
Paul Bakker68884e32013-01-07 18:20:04 +01001/**
2 * \file ssl_ciphersuites.h
3 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief SSL Ciphersuites for mbed TLS
Darryl Greena40a1012018-01-05 15:33:17 +00005 */
6/*
Manuel Pégourié-Gonnard6fb81872015-07-27 11:11:48 +02007 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02008 * SPDX-License-Identifier: Apache-2.0
9 *
10 * Licensed under the Apache License, Version 2.0 (the "License"); you may
11 * not use this file except in compliance with the License.
12 * You may obtain a copy of the License at
13 *
14 * http://www.apache.org/licenses/LICENSE-2.0
15 *
16 * Unless required by applicable law or agreed to in writing, software
17 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
18 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19 * See the License for the specific language governing permissions and
20 * limitations under the License.
Paul Bakker68884e32013-01-07 18:20:04 +010021 *
Manuel Pégourié-Gonnardfe446432015-03-06 13:17:10 +000022 * This file is part of mbed TLS (https://tls.mbed.org)
Paul Bakker68884e32013-01-07 18:20:04 +010023 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020024#ifndef MBEDTLS_SSL_CIPHERSUITES_H
25#define MBEDTLS_SSL_CIPHERSUITES_H
Paul Bakker68884e32013-01-07 18:20:04 +010026
Ron Eldor8b0cf2e2018-02-14 16:02:41 +020027#if !defined(MBEDTLS_CONFIG_FILE)
28#include "config.h"
29#else
30#include MBEDTLS_CONFIG_FILE
31#endif
32
Manuel Pégourié-Gonnard09edda82013-08-19 13:50:33 +020033#include "pk.h"
Paul Bakker68884e32013-01-07 18:20:04 +010034#include "cipher.h"
35#include "md.h"
Hanno Beckerb09132d2019-06-26 10:53:02 +010036#include "ssl.h"
Hanno Becker67fb16e2019-06-28 11:39:22 +010037#include <string.h>
Paul Bakker68884e32013-01-07 18:20:04 +010038
39#ifdef __cplusplus
40extern "C" {
41#endif
42
Paul Bakker41c83d32013-03-20 14:39:14 +010043/*
44 * Supported ciphersuites (Official IANA names)
45 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020046#define MBEDTLS_TLS_RSA_WITH_NULL_MD5 0x01 /**< Weak! */
47#define MBEDTLS_TLS_RSA_WITH_NULL_SHA 0x02 /**< Weak! */
Paul Bakker41c83d32013-03-20 14:39:14 +010048
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020049#define MBEDTLS_TLS_RSA_WITH_RC4_128_MD5 0x04
50#define MBEDTLS_TLS_RSA_WITH_RC4_128_SHA 0x05
51#define MBEDTLS_TLS_RSA_WITH_DES_CBC_SHA 0x09 /**< Weak! Not in TLS 1.2 */
Paul Bakker41c83d32013-03-20 14:39:14 +010052
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020053#define MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA 0x0A
Paul Bakker0c5fac22013-04-19 21:10:51 +020054
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020055#define MBEDTLS_TLS_DHE_RSA_WITH_DES_CBC_SHA 0x15 /**< Weak! Not in TLS 1.2 */
56#define MBEDTLS_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 0x16
Paul Bakker41c83d32013-03-20 14:39:14 +010057
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020058#define MBEDTLS_TLS_PSK_WITH_NULL_SHA 0x2C /**< Weak! */
59#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA 0x2D /**< Weak! */
60#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA 0x2E /**< Weak! */
61#define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA 0x2F
Paul Bakker0c5fac22013-04-19 21:10:51 +020062
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020063#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA 0x33
64#define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA 0x35
65#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA 0x39
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020066
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020067#define MBEDTLS_TLS_RSA_WITH_NULL_SHA256 0x3B /**< Weak! */
68#define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 0x3C /**< TLS 1.2 */
69#define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 0x3D /**< TLS 1.2 */
Paul Bakker41c83d32013-03-20 14:39:14 +010070
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020071#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 0x41
72#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 0x45
Paul Bakker0c5fac22013-04-19 21:10:51 +020073
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020074#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 0x67 /**< TLS 1.2 */
75#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 0x6B /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +020076
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020077#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 0x84
78#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 0x88
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020079
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020080#define MBEDTLS_TLS_PSK_WITH_RC4_128_SHA 0x8A
81#define MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA 0x8B
82#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA 0x8C
83#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA 0x8D
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020084
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020085#define MBEDTLS_TLS_DHE_PSK_WITH_RC4_128_SHA 0x8E
86#define MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA 0x8F
87#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA 0x90
88#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA 0x91
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020089
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020090#define MBEDTLS_TLS_RSA_PSK_WITH_RC4_128_SHA 0x92
91#define MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA 0x93
92#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA 0x94
93#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA 0x95
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020094
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020095#define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 0x9C /**< TLS 1.2 */
96#define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 0x9D /**< TLS 1.2 */
97#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 0x9E /**< TLS 1.2 */
98#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 0x9F /**< TLS 1.2 */
Paul Bakker41c83d32013-03-20 14:39:14 +010099
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200100#define MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256 0xA8 /**< TLS 1.2 */
101#define MBEDTLS_TLS_PSK_WITH_AES_256_GCM_SHA384 0xA9 /**< TLS 1.2 */
102#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_GCM_SHA256 0xAA /**< TLS 1.2 */
103#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_GCM_SHA384 0xAB /**< TLS 1.2 */
104#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256 0xAC /**< TLS 1.2 */
105#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384 0xAD /**< TLS 1.2 */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200106
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200107#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA256 0xAE
108#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA384 0xAF
109#define MBEDTLS_TLS_PSK_WITH_NULL_SHA256 0xB0 /**< Weak! */
110#define MBEDTLS_TLS_PSK_WITH_NULL_SHA384 0xB1 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200111
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200112#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256 0xB2
113#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384 0xB3
114#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA256 0xB4 /**< Weak! */
115#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA384 0xB5 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200116
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200117#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256 0xB6
118#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384 0xB7
119#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA256 0xB8 /**< Weak! */
120#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA384 0xB9 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200121
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200122#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xBA /**< TLS 1.2 */
123#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xBE /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200124
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200125#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC0 /**< TLS 1.2 */
126#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC4 /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200127
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200128#define MBEDTLS_TLS_ECDH_ECDSA_WITH_NULL_SHA 0xC001 /**< Weak! */
129#define MBEDTLS_TLS_ECDH_ECDSA_WITH_RC4_128_SHA 0xC002 /**< Not in SSL3! */
130#define MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA 0xC003 /**< Not in SSL3! */
131#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA 0xC004 /**< Not in SSL3! */
132#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA 0xC005 /**< Not in SSL3! */
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +0100133
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200134#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_NULL_SHA 0xC006 /**< Weak! */
135#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_RC4_128_SHA 0xC007 /**< Not in SSL3! */
136#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA 0xC008 /**< Not in SSL3! */
137#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA 0xC009 /**< Not in SSL3! */
138#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA 0xC00A /**< Not in SSL3! */
Manuel Pégourié-Gonnard32ea60a2013-08-17 17:39:04 +0200139
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200140#define MBEDTLS_TLS_ECDH_RSA_WITH_NULL_SHA 0xC00B /**< Weak! */
141#define MBEDTLS_TLS_ECDH_RSA_WITH_RC4_128_SHA 0xC00C /**< Not in SSL3! */
142#define MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA 0xC00D /**< Not in SSL3! */
143#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA 0xC00E /**< Not in SSL3! */
144#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA 0xC00F /**< Not in SSL3! */
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +0100145
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200146#define MBEDTLS_TLS_ECDHE_RSA_WITH_NULL_SHA 0xC010 /**< Weak! */
147#define MBEDTLS_TLS_ECDHE_RSA_WITH_RC4_128_SHA 0xC011 /**< Not in SSL3! */
148#define MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 0xC012 /**< Not in SSL3! */
149#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 0xC013 /**< Not in SSL3! */
150#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 0xC014 /**< Not in SSL3! */
Paul Bakker41c83d32013-03-20 14:39:14 +0100151
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200152#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 0xC023 /**< TLS 1.2 */
153#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 0xC024 /**< TLS 1.2 */
154#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 0xC025 /**< TLS 1.2 */
155#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 0xC026 /**< TLS 1.2 */
156#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 0xC027 /**< TLS 1.2 */
157#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 0xC028 /**< TLS 1.2 */
158#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 0xC029 /**< TLS 1.2 */
159#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 0xC02A /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200160
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200161#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 0xC02B /**< TLS 1.2 */
162#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 0xC02C /**< TLS 1.2 */
163#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 0xC02D /**< TLS 1.2 */
164#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 0xC02E /**< TLS 1.2 */
165#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 0xC02F /**< TLS 1.2 */
166#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 0xC030 /**< TLS 1.2 */
167#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 0xC031 /**< TLS 1.2 */
168#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 0xC032 /**< TLS 1.2 */
Paul Bakkera54e4932013-03-20 15:31:54 +0100169
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200170#define MBEDTLS_TLS_ECDHE_PSK_WITH_RC4_128_SHA 0xC033 /**< Not in SSL3! */
171#define MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA 0xC034 /**< Not in SSL3! */
172#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA 0xC035 /**< Not in SSL3! */
173#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA 0xC036 /**< Not in SSL3! */
174#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 0xC037 /**< Not in SSL3! */
175#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384 0xC038 /**< Not in SSL3! */
176#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA 0xC039 /**< Weak! No SSL3! */
177#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA256 0xC03A /**< Weak! No SSL3! */
178#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA384 0xC03B /**< Weak! No SSL3! */
Manuel Pégourié-Gonnard225d6aa2013-10-11 19:07:56 +0200179
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +0100180#define MBEDTLS_TLS_RSA_WITH_ARIA_128_CBC_SHA256 0xC03C /**< TLS 1.2 */
181#define MBEDTLS_TLS_RSA_WITH_ARIA_256_CBC_SHA384 0xC03D /**< TLS 1.2 */
182#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256 0xC044 /**< TLS 1.2 */
183#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384 0xC045 /**< TLS 1.2 */
184#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256 0xC048 /**< TLS 1.2 */
185#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384 0xC049 /**< TLS 1.2 */
186#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256 0xC04A /**< TLS 1.2 */
187#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384 0xC04B /**< TLS 1.2 */
188#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256 0xC04C /**< TLS 1.2 */
189#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384 0xC04D /**< TLS 1.2 */
190#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256 0xC04E /**< TLS 1.2 */
191#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384 0xC04F /**< TLS 1.2 */
192#define MBEDTLS_TLS_RSA_WITH_ARIA_128_GCM_SHA256 0xC050 /**< TLS 1.2 */
193#define MBEDTLS_TLS_RSA_WITH_ARIA_256_GCM_SHA384 0xC051 /**< TLS 1.2 */
194#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 0xC052 /**< TLS 1.2 */
195#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 0xC053 /**< TLS 1.2 */
196#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 0xC05C /**< TLS 1.2 */
197#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 0xC05D /**< TLS 1.2 */
198#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256 0xC05E /**< TLS 1.2 */
199#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384 0xC05F /**< TLS 1.2 */
200#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 0xC060 /**< TLS 1.2 */
201#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 0xC061 /**< TLS 1.2 */
202#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256 0xC062 /**< TLS 1.2 */
203#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384 0xC063 /**< TLS 1.2 */
204#define MBEDTLS_TLS_PSK_WITH_ARIA_128_CBC_SHA256 0xC064 /**< TLS 1.2 */
205#define MBEDTLS_TLS_PSK_WITH_ARIA_256_CBC_SHA384 0xC065 /**< TLS 1.2 */
206#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC066 /**< TLS 1.2 */
207#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC067 /**< TLS 1.2 */
208#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256 0xC068 /**< TLS 1.2 */
209#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384 0xC069 /**< TLS 1.2 */
210#define MBEDTLS_TLS_PSK_WITH_ARIA_128_GCM_SHA256 0xC06A /**< TLS 1.2 */
211#define MBEDTLS_TLS_PSK_WITH_ARIA_256_GCM_SHA384 0xC06B /**< TLS 1.2 */
212#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256 0xC06C /**< TLS 1.2 */
213#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384 0xC06D /**< TLS 1.2 */
214#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256 0xC06E /**< TLS 1.2 */
215#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384 0xC06F /**< TLS 1.2 */
216#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC070 /**< TLS 1.2 */
217#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC071 /**< TLS 1.2 */
Markku-Juhani O. Saarinenc06e1012017-12-07 11:51:13 +0000218
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200219#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC072 /**< Not in SSL3! */
220#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC073 /**< Not in SSL3! */
221#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC074 /**< Not in SSL3! */
222#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC075 /**< Not in SSL3! */
223#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC076 /**< Not in SSL3! */
224#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC077 /**< Not in SSL3! */
225#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC078 /**< Not in SSL3! */
226#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC079 /**< Not in SSL3! */
Paul Bakker27714b12013-04-07 23:07:12 +0200227
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200228#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC07A /**< TLS 1.2 */
229#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC07B /**< TLS 1.2 */
230#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC07C /**< TLS 1.2 */
231#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC07D /**< TLS 1.2 */
232#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC086 /**< TLS 1.2 */
233#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC087 /**< TLS 1.2 */
234#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC088 /**< TLS 1.2 */
235#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC089 /**< TLS 1.2 */
236#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC08A /**< TLS 1.2 */
237#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC08B /**< TLS 1.2 */
238#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC08C /**< TLS 1.2 */
239#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC08D /**< TLS 1.2 */
Manuel Pégourié-Gonnard8d01eea2013-10-24 19:49:07 +0200240
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200241#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC08E /**< TLS 1.2 */
242#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC08F /**< TLS 1.2 */
243#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC090 /**< TLS 1.2 */
244#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC091 /**< TLS 1.2 */
245#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC092 /**< TLS 1.2 */
246#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC093 /**< TLS 1.2 */
Manuel Pégourié-Gonnard8d01eea2013-10-24 19:49:07 +0200247
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200248#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC094
249#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC095
250#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC096
251#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC097
252#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC098
253#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC099
254#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC09A /**< Not in SSL3! */
255#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC09B /**< Not in SSL3! */
Paul Bakker0f2f0bf2013-07-26 15:03:31 +0200256
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200257#define MBEDTLS_TLS_RSA_WITH_AES_128_CCM 0xC09C /**< TLS 1.2 */
258#define MBEDTLS_TLS_RSA_WITH_AES_256_CCM 0xC09D /**< TLS 1.2 */
259#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM 0xC09E /**< TLS 1.2 */
260#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM 0xC09F /**< TLS 1.2 */
261#define MBEDTLS_TLS_RSA_WITH_AES_128_CCM_8 0xC0A0 /**< TLS 1.2 */
262#define MBEDTLS_TLS_RSA_WITH_AES_256_CCM_8 0xC0A1 /**< TLS 1.2 */
263#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM_8 0xC0A2 /**< TLS 1.2 */
264#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM_8 0xC0A3 /**< TLS 1.2 */
265#define MBEDTLS_TLS_PSK_WITH_AES_128_CCM 0xC0A4 /**< TLS 1.2 */
266#define MBEDTLS_TLS_PSK_WITH_AES_256_CCM 0xC0A5 /**< TLS 1.2 */
267#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM 0xC0A6 /**< TLS 1.2 */
268#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM 0xC0A7 /**< TLS 1.2 */
269#define MBEDTLS_TLS_PSK_WITH_AES_128_CCM_8 0xC0A8 /**< TLS 1.2 */
270#define MBEDTLS_TLS_PSK_WITH_AES_256_CCM_8 0xC0A9 /**< TLS 1.2 */
271#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM_8 0xC0AA /**< TLS 1.2 */
272#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM_8 0xC0AB /**< TLS 1.2 */
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200273/* The last two are named with PSK_DHE in the RFC, which looks like a typo */
274
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200275#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM 0xC0AC /**< TLS 1.2 */
276#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM 0xC0AD /**< TLS 1.2 */
277#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 0xC0AE /**< TLS 1.2 */
278#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 0xC0AF /**< TLS 1.2 */
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200279
Manuel Pégourié-Gonnard538cb7b2015-09-15 18:03:28 +0200280#define MBEDTLS_TLS_ECJPAKE_WITH_AES_128_CCM_8 0xC0FF /**< experimental */
281
Manuel Pégourié-Gonnardce66d5e2018-06-14 11:11:15 +0200282/* RFC 7905 */
283#define MBEDTLS_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA8 /**< TLS 1.2 */
284#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA9 /**< TLS 1.2 */
285#define MBEDTLS_TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 0xCCAA /**< TLS 1.2 */
286#define MBEDTLS_TLS_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAB /**< TLS 1.2 */
287#define MBEDTLS_TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAC /**< TLS 1.2 */
288#define MBEDTLS_TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAD /**< TLS 1.2 */
289#define MBEDTLS_TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAE /**< TLS 1.2 */
290
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200291/* Reminder: update mbedtls_ssl_premaster_secret when adding a new key exchange.
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100292 * Reminder: update MBEDTLS_KEY_EXCHANGE__xxx below
Manuel Pégourié-Gonnardd9423232014-12-02 11:57:29 +0100293 */
Paul Bakker68884e32013-01-07 18:20:04 +0100294typedef enum {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200295 MBEDTLS_KEY_EXCHANGE_NONE = 0,
296 MBEDTLS_KEY_EXCHANGE_RSA,
297 MBEDTLS_KEY_EXCHANGE_DHE_RSA,
298 MBEDTLS_KEY_EXCHANGE_ECDHE_RSA,
299 MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA,
300 MBEDTLS_KEY_EXCHANGE_PSK,
301 MBEDTLS_KEY_EXCHANGE_DHE_PSK,
302 MBEDTLS_KEY_EXCHANGE_RSA_PSK,
303 MBEDTLS_KEY_EXCHANGE_ECDHE_PSK,
304 MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
305 MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
Manuel Pégourié-Gonnard557535d2015-09-15 17:53:32 +0200306 MBEDTLS_KEY_EXCHANGE_ECJPAKE,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200307} mbedtls_key_exchange_type_t;
Paul Bakker68884e32013-01-07 18:20:04 +0100308
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200309typedef struct mbedtls_ssl_ciphersuite_t mbedtls_ssl_ciphersuite_t;
Paul Bakker68884e32013-01-07 18:20:04 +0100310
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200311#define MBEDTLS_CIPHERSUITE_WEAK 0x01 /**< Weak ciphersuite flag */
312#define MBEDTLS_CIPHERSUITE_SHORT_TAG 0x02 /**< Short authentication tag,
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200313 eg for CCM_8 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200314#define MBEDTLS_CIPHERSUITE_NODTLS 0x04 /**< Can't be used with DTLS */
Paul Bakker68884e32013-01-07 18:20:04 +0100315
Hanno Beckerb09132d2019-06-26 10:53:02 +0100316/*
317 * Ciphersuite macro definitions
318 *
319 * This is highly incomplete and only contains those ciphersuites for
320 * which we need to be able to build the library with support for that
321 * ciphersuite only (currently MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8
322 * as an example).
323 */
324
Hanno Beckerb09132d2019-06-26 10:53:02 +0100325#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_ID MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8
326#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_NAME "TLS-ECDHE-ECDSA-WITH-AES-128-CCM-8"
327#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_CIPHER MBEDTLS_CIPHER_AES_128_CCM
328#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MAC MBEDTLS_MD_SHA256
329#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_KEY_EXCHANGE MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA
330#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MIN_MAJOR_VER MBEDTLS_SSL_MAJOR_VERSION_3
331#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MIN_MINOR_VER MBEDTLS_SSL_MINOR_VERSION_3
332#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MAX_MAJOR_VER MBEDTLS_SSL_MAJOR_VERSION_3
333#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_MAX_MINOR_VER MBEDTLS_SSL_MINOR_VERSION_3
334#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8_FLAGS MBEDTLS_CIPHERSUITE_SHORT_TAG
335
Hanno Becker9e720e02019-07-08 11:24:36 +0100336/* This is just to make check-names.sh happy -- don't uncomment. */
337//#define MBEDTLS_SUITE_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8
338
Hanno Beckerb09132d2019-06-26 10:53:02 +0100339/*
340 * Helper macros to extract fields from ciphersuites.
341 */
342
343#define MBEDTLS_SSL_SUITE_ID_T( SUITE ) SUITE ## _ID
344#define MBEDTLS_SSL_SUITE_NAME_T( SUITE ) SUITE ## _NAME
345#define MBEDTLS_SSL_SUITE_CIPHER_T( SUITE ) SUITE ## _CIPHER
346#define MBEDTLS_SSL_SUITE_MAC_T( SUITE ) SUITE ## _MAC
347#define MBEDTLS_SSL_SUITE_KEY_EXCHANGE_T( SUITE ) SUITE ## _KEY_EXCHANGE
348#define MBEDTLS_SSL_SUITE_MIN_MAJOR_VER_T( SUITE ) SUITE ## _MIN_MAJOR_VER
349#define MBEDTLS_SSL_SUITE_MIN_MINOR_VER_T( SUITE ) SUITE ## _MIN_MINOR_VER
350#define MBEDTLS_SSL_SUITE_MAX_MAJOR_VER_T( SUITE ) SUITE ## _MAX_MAJOR_VER
351#define MBEDTLS_SSL_SUITE_MAX_MINOR_VER_T( SUITE ) SUITE ## _MAX_MINOR_VER
352#define MBEDTLS_SSL_SUITE_FLAGS_T( SUITE ) SUITE ## _FLAGS
353
354/* Wrapper around MBEDTLS_SSL_SUITE_XXX_T() which makes sure that
355 * the argument is macro-expanded before concatenated with the
356 * field name. This allows to call these macros as
Hanno Becker73f4cb12019-06-27 13:51:07 +0100357 * MBEDTLS_SSL_SUITE_XXX( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ),
358 * where MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE expands to MBEDTLS_SSL_SUITE_XXX. */
Hanno Beckerb09132d2019-06-26 10:53:02 +0100359#define MBEDTLS_SSL_SUITE_ID( SUITE ) MBEDTLS_SSL_SUITE_ID_T( SUITE )
360#define MBEDTLS_SSL_SUITE_NAME( SUITE ) MBEDTLS_SSL_SUITE_NAME_T( SUITE )
361#define MBEDTLS_SSL_SUITE_CIPHER( SUITE ) MBEDTLS_SSL_SUITE_CIPHER_T( SUITE )
362#define MBEDTLS_SSL_SUITE_MAC( SUITE ) MBEDTLS_SSL_SUITE_MAC_T( SUITE )
363#define MBEDTLS_SSL_SUITE_KEY_EXCHANGE( SUITE ) MBEDTLS_SSL_SUITE_KEY_EXCHANGE_T( SUITE )
364#define MBEDTLS_SSL_SUITE_MIN_MAJOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MIN_MAJOR_VER_T( SUITE )
365#define MBEDTLS_SSL_SUITE_MIN_MINOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MIN_MINOR_VER_T( SUITE )
366#define MBEDTLS_SSL_SUITE_MAX_MAJOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MAX_MAJOR_VER_T( SUITE )
367#define MBEDTLS_SSL_SUITE_MAX_MINOR_VER( SUITE ) MBEDTLS_SSL_SUITE_MAX_MINOR_VER_T( SUITE )
368#define MBEDTLS_SSL_SUITE_FLAGS( SUITE ) MBEDTLS_SSL_SUITE_FLAGS_T( SUITE )
369
Hanno Becker73f4cb12019-06-27 13:51:07 +0100370#if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE)
Paul Bakker68884e32013-01-07 18:20:04 +0100371/**
372 * \brief This structure is used for storing ciphersuite information
373 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200374struct mbedtls_ssl_ciphersuite_t
Paul Bakker68884e32013-01-07 18:20:04 +0100375{
376 int id;
377 const char * name;
378
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200379 mbedtls_cipher_type_t cipher;
380 mbedtls_md_type_t mac;
381 mbedtls_key_exchange_type_t key_exchange;
Paul Bakker68884e32013-01-07 18:20:04 +0100382
383 int min_major_ver;
384 int min_minor_ver;
385 int max_major_ver;
386 int max_minor_ver;
387
388 unsigned char flags;
389};
390
Hanno Becker473f98f2019-06-26 10:27:32 +0100391typedef mbedtls_ssl_ciphersuite_t const * mbedtls_ssl_ciphersuite_handle_t;
392#define MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE ( (mbedtls_ssl_ciphersuite_handle_t) NULL )
Paul Bakker68884e32013-01-07 18:20:04 +0100393
Hanno Beckerb09132d2019-06-26 10:53:02 +0100394/**
395 * \brief This macro builds an instance of ::mbedtls_ssl_ciphersuite_t
396 * from an \c MBEDTLS_SUITE_XXX identifier.
397 */
398#define MBEDTLS_SSL_SUITE_INFO( SUITE ) \
399 { MBEDTLS_SSL_SUITE_ID( SUITE ), \
400 MBEDTLS_SSL_SUITE_NAME( SUITE ), \
401 MBEDTLS_SSL_SUITE_CIPHER( SUITE ), \
402 MBEDTLS_SSL_SUITE_MAC( SUITE ), \
403 MBEDTLS_SSL_SUITE_KEY_EXCHANGE( SUITE ), \
404 MBEDTLS_SSL_SUITE_MIN_MAJOR_VER( SUITE ), \
405 MBEDTLS_SSL_SUITE_MIN_MINOR_VER( SUITE ), \
406 MBEDTLS_SSL_SUITE_MAX_MAJOR_VER( SUITE ), \
407 MBEDTLS_SSL_SUITE_MAX_MINOR_VER( SUITE ), \
408 MBEDTLS_SSL_SUITE_FLAGS( SUITE ) }
Hanno Becker5cce9362019-06-26 11:39:32 +0100409
Hanno Becker73f4cb12019-06-27 13:51:07 +0100410#else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker5cce9362019-06-26 11:39:32 +0100411
412typedef unsigned char mbedtls_ssl_ciphersuite_handle_t;
413#define MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE ( (mbedtls_ssl_ciphersuite_handle_t) 0 )
414#define MBEDTLS_SSL_CIPHERSUITE_UNIQUE_VALID_HANDLE ( (mbedtls_ssl_ciphersuite_handle_t) 1 )
415
Hanno Becker73f4cb12019-06-27 13:51:07 +0100416#endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker5cce9362019-06-26 11:39:32 +0100417
Hanno Becker67fb16e2019-06-28 11:39:22 +0100418#if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE)
419static inline int mbedtls_ssl_session_get_ciphersuite(
420 mbedtls_ssl_session const * session )
421{
422 return( session->ciphersuite );
423}
424#else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
425static inline int mbedtls_ssl_session_get_ciphersuite(
426 mbedtls_ssl_session const * session )
427{
428 ((void) session);
429 return( MBEDTLS_SSL_SUITE_ID( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
430}
431#endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
432
Hanno Becker473f98f2019-06-26 10:27:32 +0100433/*
434 * Getter functions for the extraction of ciphersuite attributes
435 * from a ciphersuite handle.
436 *
Hanno Becker870bcd32019-07-02 17:24:12 +0100437 * Warning: These functions have the validity of the handle as a precondition!
Hanno Becker473f98f2019-06-26 10:27:32 +0100438 * Their behaviour is undefined when MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE
439 * is passed.
440 */
Paul Bakker68884e32013-01-07 18:20:04 +0100441
Hanno Becker73f4cb12019-06-27 13:51:07 +0100442#if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE)
Hanno Becker473f98f2019-06-26 10:27:32 +0100443/*
444 * Implementation of getter functions when the ciphersuite handle
445 * is a pointer to the ciphersuite information structure.
446 *
447 * The precondition that the handle is valid means that
448 * we don't need to check that info != NULL.
449 */
450static inline int mbedtls_ssl_suite_get_id(
451 mbedtls_ssl_ciphersuite_handle_t const info )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100452{
Hanno Becker473f98f2019-06-26 10:27:32 +0100453 return( info->id );
454}
455static inline const char* mbedtls_ssl_suite_get_name(
456 mbedtls_ssl_ciphersuite_handle_t const info )
457{
458 return( info->name );
459}
460static inline mbedtls_cipher_type_t mbedtls_ssl_suite_get_cipher(
461 mbedtls_ssl_ciphersuite_handle_t const info )
462{
463 return( info->cipher );
464}
465static inline mbedtls_md_type_t mbedtls_ssl_suite_get_mac(
466 mbedtls_ssl_ciphersuite_handle_t const info )
467{
468 return( info->mac );
469}
470static inline mbedtls_key_exchange_type_t mbedtls_ssl_suite_get_key_exchange(
471 mbedtls_ssl_ciphersuite_handle_t const info )
472{
473 return( info->key_exchange );
474}
475static inline int mbedtls_ssl_suite_get_min_major_ver(
476 mbedtls_ssl_ciphersuite_handle_t const info )
477{
478 return( info->min_major_ver );
479}
480static inline int mbedtls_ssl_suite_get_min_minor_ver(
481 mbedtls_ssl_ciphersuite_handle_t const info )
482{
483 return( info->min_minor_ver );
484}
485static inline int mbedtls_ssl_suite_get_max_major_ver(
486 mbedtls_ssl_ciphersuite_handle_t const info )
487{
488 return( info->max_major_ver );
489}
490static inline int mbedtls_ssl_suite_get_max_minor_ver(
491 mbedtls_ssl_ciphersuite_handle_t const info )
492{
493 return( info->max_minor_ver );
494}
495static inline unsigned char mbedtls_ssl_suite_get_flags(
496 mbedtls_ssl_ciphersuite_handle_t const info )
497{
498 return( info->flags );
499}
Hanno Becker73f4cb12019-06-27 13:51:07 +0100500#else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker5cce9362019-06-26 11:39:32 +0100501/*
Hanno Beckerd89e8cb2019-06-28 13:09:41 +0100502 * Implementations of getter functions in the case of only a single possible
503 * ciphersuite. In this case, the handle is logically a boolean (either the
504 * invalid handle or the unique valid handle representing the single enabled
505 * ciphersuite), and the precondition that the handle is valid means that we
506 * can statically return the hardcoded attribute of the enabled ciphersuite.
Hanno Becker5cce9362019-06-26 11:39:32 +0100507 */
508static inline int mbedtls_ssl_suite_get_id(
509 mbedtls_ssl_ciphersuite_handle_t const info )
510{
511 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100512 return( MBEDTLS_SSL_SUITE_ID( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100513}
514static inline const char* mbedtls_ssl_suite_get_name(
515 mbedtls_ssl_ciphersuite_handle_t const info )
516{
517 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100518 return( MBEDTLS_SSL_SUITE_NAME( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100519}
520static inline mbedtls_cipher_type_t mbedtls_ssl_suite_get_cipher(
521 mbedtls_ssl_ciphersuite_handle_t const info )
522{
523 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100524 return( MBEDTLS_SSL_SUITE_CIPHER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100525}
526static inline mbedtls_md_type_t mbedtls_ssl_suite_get_mac(
527 mbedtls_ssl_ciphersuite_handle_t const info )
528{
529 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100530 return( MBEDTLS_SSL_SUITE_MAC( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100531}
532static inline mbedtls_key_exchange_type_t mbedtls_ssl_suite_get_key_exchange(
533 mbedtls_ssl_ciphersuite_handle_t const info )
534{
535 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100536 return( MBEDTLS_SSL_SUITE_KEY_EXCHANGE( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100537}
538static inline int mbedtls_ssl_suite_get_min_major_ver(
539 mbedtls_ssl_ciphersuite_handle_t const info )
540{
541 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100542 return( MBEDTLS_SSL_SUITE_MIN_MAJOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100543}
544static inline int mbedtls_ssl_suite_get_min_minor_ver(
545 mbedtls_ssl_ciphersuite_handle_t const info )
546{
547 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100548 return( MBEDTLS_SSL_SUITE_MIN_MINOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100549}
550static inline int mbedtls_ssl_suite_get_max_major_ver(
551 mbedtls_ssl_ciphersuite_handle_t const info )
552{
553 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100554 return( MBEDTLS_SSL_SUITE_MAX_MAJOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100555}
556static inline int mbedtls_ssl_suite_get_max_minor_ver(
557 mbedtls_ssl_ciphersuite_handle_t const info )
558{
559 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100560 return( MBEDTLS_SSL_SUITE_MAX_MINOR_VER( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100561}
562static inline unsigned char mbedtls_ssl_suite_get_flags(
563 mbedtls_ssl_ciphersuite_handle_t const info )
564{
565 ((void) info);
Hanno Becker73f4cb12019-06-27 13:51:07 +0100566 return( MBEDTLS_SSL_SUITE_FLAGS( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE ) );
Hanno Becker5cce9362019-06-26 11:39:32 +0100567}
Hanno Becker73f4cb12019-06-27 13:51:07 +0100568#endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker473f98f2019-06-26 10:27:32 +0100569
Hanno Becker67fb16e2019-06-28 11:39:22 +0100570const int *mbedtls_ssl_list_ciphersuites( void );
571
572/*
573 * Various small helper functions for ciphersuites.
574 *
575 * Like the getter functions, they assume that the provided ciphersuite
576 * handle is valid, and hence can be optimized in case there's only one
577 * ciphersuite enabled.
578 *
579 * To avoid code-duplication between inline and non-inline implementations
580 * of this, we define internal static inline versions of all functions first,
581 * and define wrappers around these either here or in ssl_ciphersuites.c,
582 * depending on whether MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE is defined.
583 */
584
Hanno Becker67fb16e2019-06-28 11:39:22 +0100585#if defined(MBEDTLS_PK_C)
586static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg_internal(
587 mbedtls_ssl_ciphersuite_handle_t info )
588{
589 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
590 {
591 case MBEDTLS_KEY_EXCHANGE_RSA:
592 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
593 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
594 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
595 return( MBEDTLS_PK_RSA );
596
597 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
598 return( MBEDTLS_PK_ECDSA );
599
600 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
601 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
602 return( MBEDTLS_PK_ECKEY );
603
604 default:
605 return( MBEDTLS_PK_NONE );
606 }
607}
608
609static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg_internal(
610 mbedtls_ssl_ciphersuite_handle_t info )
611{
612 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
613 {
614 case MBEDTLS_KEY_EXCHANGE_RSA:
615 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
616 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
617 return( MBEDTLS_PK_RSA );
618
619 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
620 return( MBEDTLS_PK_ECDSA );
621
622 default:
623 return( MBEDTLS_PK_NONE );
624 }
625}
626
627#endif /* MBEDTLS_PK_C */
628
Hanno Becker88889c62019-08-23 12:01:45 +0100629#if defined(MBEDTLS_USE_TINYCRYPT) || \
630 defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
Hanno Becker67fb16e2019-06-28 11:39:22 +0100631 defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
632static inline int mbedtls_ssl_ciphersuite_uses_ec_internal(
633 mbedtls_ssl_ciphersuite_handle_t info )
634{
635 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
636 {
637 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
638 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
639 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
640 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
641 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
642 case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
643 return( 1 );
644
645 default:
646 return( 0 );
647 }
648}
Hanno Becker88889c62019-08-23 12:01:45 +0100649#endif /* MBEDTLS_USE_TINYCRYPT ||
650 MBEDTLS_ECDH_C ||
651 MBEDTLS_ECDSA_C ||
652 MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
Hanno Becker67fb16e2019-06-28 11:39:22 +0100653
654#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
655static inline int mbedtls_ssl_ciphersuite_uses_psk_internal(
656 mbedtls_ssl_ciphersuite_handle_t info )
657{
658 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
659 {
660 case MBEDTLS_KEY_EXCHANGE_PSK:
661 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
662 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
663 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
664 return( 1 );
665
666 default:
667 return( 0 );
668 }
669}
670#endif /* MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */
671
672/*
673 * Wrappers around internal helper functions to be used by the rest of
674 * the library, either defined static inline here or in ssl_ciphersuites.c.
675 */
676
Hanno Becker73f4cb12019-06-27 13:51:07 +0100677#if !defined(MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE)
Hanno Beckere02758c2019-06-26 15:31:31 +0100678
Hanno Becker67fb16e2019-06-28 11:39:22 +0100679mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_string(
680 const char *ciphersuite_name );
681mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_id(
682 int ciphersuite_id );
Hanno Becker473f98f2019-06-26 10:27:32 +0100683
Hanno Becker473f98f2019-06-26 10:27:32 +0100684#if defined(MBEDTLS_PK_C)
Hanno Becker67fb16e2019-06-28 11:39:22 +0100685mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg(
686 mbedtls_ssl_ciphersuite_handle_t info );
687mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg(
688 mbedtls_ssl_ciphersuite_handle_t info );
689#endif /* MBEDTLS_PK_C */
Hanno Becker473f98f2019-06-26 10:27:32 +0100690
Hanno Becker88889c62019-08-23 12:01:45 +0100691#if defined(MBEDTLS_USE_TINYCRYPT) || \
692 defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
Hanno Becker67fb16e2019-06-28 11:39:22 +0100693 defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
Hanno Becker473f98f2019-06-26 10:27:32 +0100694int mbedtls_ssl_ciphersuite_uses_ec( mbedtls_ssl_ciphersuite_handle_t info );
Hanno Becker88889c62019-08-23 12:01:45 +0100695#endif /* MBEDTLS_USE_TINYCRYPT ||
696 MBEDTLS_ECDH_C ||
697 MBEDTLS_ECDSA_C ||
698 MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
Hanno Becker67fb16e2019-06-28 11:39:22 +0100699
700#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
Hanno Becker473f98f2019-06-26 10:27:32 +0100701int mbedtls_ssl_ciphersuite_uses_psk( mbedtls_ssl_ciphersuite_handle_t info );
Hanno Becker67fb16e2019-06-28 11:39:22 +0100702#endif /* MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */
703
704#else /* !MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
705
Hanno Becker67fb16e2019-06-28 11:39:22 +0100706#if defined(MBEDTLS_PK_C)
707static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg(
708 mbedtls_ssl_ciphersuite_handle_t info )
709{
710 return( mbedtls_ssl_get_ciphersuite_sig_pk_alg_internal( info ) );
711}
712
713static inline mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg(
714 mbedtls_ssl_ciphersuite_handle_t info )
715{
716 return( mbedtls_ssl_get_ciphersuite_sig_alg_internal( info ) );
717}
718#endif /* MBEDTLS_PK_C */
719
Hanno Becker88889c62019-08-23 12:01:45 +0100720#if defined(MBEDTLS_USE_TINYCRYPT) || \
721 defined(MBEDTLS_ECDH_C) || defined(MBEDTLS_ECDSA_C) || \
Hanno Becker67fb16e2019-06-28 11:39:22 +0100722 defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
723static inline int mbedtls_ssl_ciphersuite_uses_ec(
724 mbedtls_ssl_ciphersuite_handle_t info )
725{
726 return( mbedtls_ssl_ciphersuite_uses_ec_internal( info ) );
727}
Hanno Becker88889c62019-08-23 12:01:45 +0100728#endif /* MBEDTLS_USE_TINYCRYPT ||
729 MBEDTLS_ECDH_C ||
730 MBEDTLS_ECDSA_C ||
731 MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED */
Hanno Becker67fb16e2019-06-28 11:39:22 +0100732
733#if defined(MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED)
734static inline int mbedtls_ssl_ciphersuite_uses_psk(
735 mbedtls_ssl_ciphersuite_handle_t info )
736{
737 return( mbedtls_ssl_ciphersuite_uses_psk_internal( info ) );
738}
739#endif /* MBEDTLS_KEY_EXCHANGE__SOME__PSK_ENABLED */
740
741static inline mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_id(
742 int ciphersuite )
743{
744 static const int single_suite_id =
745 MBEDTLS_SSL_SUITE_ID( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE );
746
747 if( ciphersuite == single_suite_id )
748 return( MBEDTLS_SSL_CIPHERSUITE_UNIQUE_VALID_HANDLE );
749
750 return( MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE );
751}
752
753static inline mbedtls_ssl_ciphersuite_handle_t mbedtls_ssl_ciphersuite_from_string(
754 const char *ciphersuite_name )
755{
756 static const char * const single_suite_name =
757 MBEDTLS_SSL_SUITE_NAME( MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE );
758
759 if( strcmp( ciphersuite_name, single_suite_name ) == 0 )
760 return( MBEDTLS_SSL_CIPHERSUITE_UNIQUE_VALID_HANDLE );
761
762 return( MBEDTLS_SSL_CIPHERSUITE_INVALID_HANDLE );
763}
764
765#endif /* MBEDTLS_SSL_CONF_SINGLE_CIPHERSUITE */
Hanno Becker473f98f2019-06-26 10:27:32 +0100766
Hanno Becker779d79d2019-07-03 13:37:21 +0100767static inline int mbedtls_ssl_ciphersuite_has_pfs(
768 mbedtls_ssl_ciphersuite_handle_t info )
769{
770 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
771 {
772 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
773 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
774 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
775 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
776 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
777 case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
778 return( 1 );
779
780 default:
781 return( 0 );
782 }
783}
784
785static inline int mbedtls_ssl_ciphersuite_no_pfs(
786 mbedtls_ssl_ciphersuite_handle_t info )
787{
788 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
789 {
790 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
791 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
792 case MBEDTLS_KEY_EXCHANGE_RSA:
793 case MBEDTLS_KEY_EXCHANGE_PSK:
794 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
795 return( 1 );
796
797 default:
798 return( 0 );
799 }
800}
801
802
803static inline int mbedtls_ssl_ciphersuite_uses_ecdh(
804 mbedtls_ssl_ciphersuite_handle_t info )
805{
806 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
807 {
808 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
809 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
810 return( 1 );
811
812 default:
813 return( 0 );
814 }
815}
816
817static inline int mbedtls_ssl_ciphersuite_cert_req_allowed(
818 mbedtls_ssl_ciphersuite_handle_t info )
819{
820 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
821 {
822 case MBEDTLS_KEY_EXCHANGE_RSA:
823 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
824 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
825 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
826 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
827 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
828 return( 1 );
829
830 default:
831 return( 0 );
832 }
833}
834
835static inline int mbedtls_ssl_ciphersuite_uses_srv_cert(
836 mbedtls_ssl_ciphersuite_handle_t info )
837{
838 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
839 {
840 case MBEDTLS_KEY_EXCHANGE_RSA:
841 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
842 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
843 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
844 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
845 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
846 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
847 return( 1 );
848
849 default:
850 return( 0 );
851 }
852}
853
854static inline int mbedtls_ssl_ciphersuite_uses_dhe(
855 mbedtls_ssl_ciphersuite_handle_t info )
856{
857 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
858 {
859 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
860 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
861 return( 1 );
862
863 default:
864 return( 0 );
865 }
866}
867
868static inline int mbedtls_ssl_ciphersuite_uses_ecdhe(
869 mbedtls_ssl_ciphersuite_handle_t info )
870{
871 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
872 {
873 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
874 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
875 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
876 return( 1 );
877
878 default:
879 return( 0 );
880 }
881}
882
883static inline int mbedtls_ssl_ciphersuite_uses_server_signature(
884 mbedtls_ssl_ciphersuite_handle_t info )
885{
886 switch( mbedtls_ssl_suite_get_key_exchange( info ) )
887 {
888 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
889 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
890 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
891 return( 1 );
892
893 default:
894 return( 0 );
895 }
896}
897
Paul Bakker68884e32013-01-07 18:20:04 +0100898#ifdef __cplusplus
899}
900#endif
901
902#endif /* ssl_ciphersuites.h */