blob: 01865b6c4e9a9f726a8995c5e8507b9633e0a134 [file] [log] [blame]
Paul Bakker68884e32013-01-07 18:20:04 +01001/**
2 * \file ssl_ciphersuites.h
3 *
Gilles Peskinee820c0a2023-08-03 17:45:20 +02004 * \brief SSL Ciphersuites for Mbed TLS
Darryl Greena40a1012018-01-05 15:33:17 +00005 */
6/*
Bence Szépkúti1e148272020-08-07 13:07:28 +02007 * Copyright The Mbed TLS Contributors
Dave Rodgman16799db2023-11-02 19:47:20 +00008 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
Paul Bakker68884e32013-01-07 18:20:04 +01009 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020010#ifndef MBEDTLS_SSL_CIPHERSUITES_H
11#define MBEDTLS_SSL_CIPHERSUITES_H
Mateusz Starzyk846f0212021-05-19 19:44:07 +020012#include "mbedtls/private_access.h"
Paul Bakker68884e32013-01-07 18:20:04 +010013
Bence Szépkútic662b362021-05-27 11:25:03 +020014#include "mbedtls/build_info.h"
Ron Eldor8b0cf2e2018-02-14 16:02:41 +020015
Jaeden Amero6609aef2019-07-04 20:01:14 +010016#include "mbedtls/pk.h"
17#include "mbedtls/cipher.h"
18#include "mbedtls/md.h"
Paul Bakker68884e32013-01-07 18:20:04 +010019
20#ifdef __cplusplus
21extern "C" {
22#endif
23
Paul Bakker41c83d32013-03-20 14:39:14 +010024/*
25 * Supported ciphersuites (Official IANA names)
26 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020027#define MBEDTLS_TLS_RSA_WITH_NULL_MD5 0x01 /**< Weak! */
28#define MBEDTLS_TLS_RSA_WITH_NULL_SHA 0x02 /**< Weak! */
Paul Bakker41c83d32013-03-20 14:39:14 +010029
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020030#define MBEDTLS_TLS_PSK_WITH_NULL_SHA 0x2C /**< Weak! */
31#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA 0x2D /**< Weak! */
32#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA 0x2E /**< Weak! */
33#define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA 0x2F
Paul Bakker0c5fac22013-04-19 21:10:51 +020034
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020035#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA 0x33
36#define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA 0x35
37#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA 0x39
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020038
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020039#define MBEDTLS_TLS_RSA_WITH_NULL_SHA256 0x3B /**< Weak! */
40#define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 0x3C /**< TLS 1.2 */
41#define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 0x3D /**< TLS 1.2 */
Paul Bakker41c83d32013-03-20 14:39:14 +010042
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020043#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 0x41
44#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 0x45
Paul Bakker0c5fac22013-04-19 21:10:51 +020045
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020046#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 0x67 /**< TLS 1.2 */
47#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 0x6B /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +020048
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020049#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 0x84
50#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 0x88
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020051
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020052#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA 0x8C
53#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA 0x8D
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020054
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020055#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA 0x90
56#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA 0x91
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020057
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020058#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA 0x94
59#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA 0x95
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020060
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020061#define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 0x9C /**< TLS 1.2 */
62#define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 0x9D /**< TLS 1.2 */
63#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 0x9E /**< TLS 1.2 */
64#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 0x9F /**< TLS 1.2 */
Paul Bakker41c83d32013-03-20 14:39:14 +010065
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020066#define MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256 0xA8 /**< TLS 1.2 */
67#define MBEDTLS_TLS_PSK_WITH_AES_256_GCM_SHA384 0xA9 /**< TLS 1.2 */
68#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_GCM_SHA256 0xAA /**< TLS 1.2 */
69#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_GCM_SHA384 0xAB /**< TLS 1.2 */
70#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256 0xAC /**< TLS 1.2 */
71#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384 0xAD /**< TLS 1.2 */
Paul Bakker40afb4b2013-04-19 22:03:30 +020072
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020073#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA256 0xAE
74#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA384 0xAF
75#define MBEDTLS_TLS_PSK_WITH_NULL_SHA256 0xB0 /**< Weak! */
76#define MBEDTLS_TLS_PSK_WITH_NULL_SHA384 0xB1 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +020077
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020078#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256 0xB2
79#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384 0xB3
80#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA256 0xB4 /**< Weak! */
81#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA384 0xB5 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +020082
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020083#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256 0xB6
84#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384 0xB7
85#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA256 0xB8 /**< Weak! */
86#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA384 0xB9 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +020087
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020088#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xBA /**< TLS 1.2 */
89#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xBE /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +020090
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020091#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC0 /**< TLS 1.2 */
92#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC4 /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +020093
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020094#define MBEDTLS_TLS_ECDH_ECDSA_WITH_NULL_SHA 0xC001 /**< Weak! */
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +010095#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA 0xC004
96#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA 0xC005
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +010097
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020098#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_NULL_SHA 0xC006 /**< Weak! */
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +010099#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA 0xC009
100#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA 0xC00A
Manuel Pégourié-Gonnard32ea60a2013-08-17 17:39:04 +0200101
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200102#define MBEDTLS_TLS_ECDH_RSA_WITH_NULL_SHA 0xC00B /**< Weak! */
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100103#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA 0xC00E
104#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA 0xC00F
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +0100105
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200106#define MBEDTLS_TLS_ECDHE_RSA_WITH_NULL_SHA 0xC010 /**< Weak! */
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100107#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 0xC013
108#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 0xC014
Paul Bakker41c83d32013-03-20 14:39:14 +0100109
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200110#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 0xC023 /**< TLS 1.2 */
111#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 0xC024 /**< TLS 1.2 */
112#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 0xC025 /**< TLS 1.2 */
113#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 0xC026 /**< TLS 1.2 */
114#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 0xC027 /**< TLS 1.2 */
115#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 0xC028 /**< TLS 1.2 */
116#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 0xC029 /**< TLS 1.2 */
117#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 0xC02A /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200118
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200119#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 0xC02B /**< TLS 1.2 */
120#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 0xC02C /**< TLS 1.2 */
121#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 0xC02D /**< TLS 1.2 */
122#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 0xC02E /**< TLS 1.2 */
123#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 0xC02F /**< TLS 1.2 */
124#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 0xC030 /**< TLS 1.2 */
125#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 0xC031 /**< TLS 1.2 */
126#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 0xC032 /**< TLS 1.2 */
Paul Bakkera54e4932013-03-20 15:31:54 +0100127
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100128#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA 0xC035
129#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA 0xC036
130#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 0xC037
131#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384 0xC038
132#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA 0xC039
133#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA256 0xC03A
134#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA384 0xC03B
Manuel Pégourié-Gonnard225d6aa2013-10-11 19:07:56 +0200135
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +0100136#define MBEDTLS_TLS_RSA_WITH_ARIA_128_CBC_SHA256 0xC03C /**< TLS 1.2 */
137#define MBEDTLS_TLS_RSA_WITH_ARIA_256_CBC_SHA384 0xC03D /**< TLS 1.2 */
138#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256 0xC044 /**< TLS 1.2 */
139#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384 0xC045 /**< TLS 1.2 */
140#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256 0xC048 /**< TLS 1.2 */
141#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384 0xC049 /**< TLS 1.2 */
142#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256 0xC04A /**< TLS 1.2 */
143#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384 0xC04B /**< TLS 1.2 */
144#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256 0xC04C /**< TLS 1.2 */
145#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384 0xC04D /**< TLS 1.2 */
146#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256 0xC04E /**< TLS 1.2 */
147#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384 0xC04F /**< TLS 1.2 */
148#define MBEDTLS_TLS_RSA_WITH_ARIA_128_GCM_SHA256 0xC050 /**< TLS 1.2 */
149#define MBEDTLS_TLS_RSA_WITH_ARIA_256_GCM_SHA384 0xC051 /**< TLS 1.2 */
150#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 0xC052 /**< TLS 1.2 */
151#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 0xC053 /**< TLS 1.2 */
152#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 0xC05C /**< TLS 1.2 */
153#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 0xC05D /**< TLS 1.2 */
154#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256 0xC05E /**< TLS 1.2 */
155#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384 0xC05F /**< TLS 1.2 */
156#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 0xC060 /**< TLS 1.2 */
157#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 0xC061 /**< TLS 1.2 */
158#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256 0xC062 /**< TLS 1.2 */
159#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384 0xC063 /**< TLS 1.2 */
160#define MBEDTLS_TLS_PSK_WITH_ARIA_128_CBC_SHA256 0xC064 /**< TLS 1.2 */
161#define MBEDTLS_TLS_PSK_WITH_ARIA_256_CBC_SHA384 0xC065 /**< TLS 1.2 */
162#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC066 /**< TLS 1.2 */
163#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC067 /**< TLS 1.2 */
164#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256 0xC068 /**< TLS 1.2 */
165#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384 0xC069 /**< TLS 1.2 */
166#define MBEDTLS_TLS_PSK_WITH_ARIA_128_GCM_SHA256 0xC06A /**< TLS 1.2 */
167#define MBEDTLS_TLS_PSK_WITH_ARIA_256_GCM_SHA384 0xC06B /**< TLS 1.2 */
168#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256 0xC06C /**< TLS 1.2 */
169#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384 0xC06D /**< TLS 1.2 */
170#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256 0xC06E /**< TLS 1.2 */
171#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384 0xC06F /**< TLS 1.2 */
172#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC070 /**< TLS 1.2 */
173#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC071 /**< TLS 1.2 */
Markku-Juhani O. Saarinenc06e1012017-12-07 11:51:13 +0000174
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100175#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC072
176#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC073
177#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC074
178#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC075
179#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC076
180#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC077
181#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC078
182#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC079
Paul Bakker27714b12013-04-07 23:07:12 +0200183
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200184#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC07A /**< TLS 1.2 */
185#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC07B /**< TLS 1.2 */
186#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC07C /**< TLS 1.2 */
187#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC07D /**< TLS 1.2 */
188#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC086 /**< TLS 1.2 */
189#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC087 /**< TLS 1.2 */
190#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC088 /**< TLS 1.2 */
191#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC089 /**< TLS 1.2 */
192#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC08A /**< TLS 1.2 */
193#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC08B /**< TLS 1.2 */
194#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC08C /**< TLS 1.2 */
195#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC08D /**< TLS 1.2 */
Manuel Pégourié-Gonnard8d01eea2013-10-24 19:49:07 +0200196
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200197#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC08E /**< TLS 1.2 */
198#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC08F /**< TLS 1.2 */
199#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC090 /**< TLS 1.2 */
200#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC091 /**< TLS 1.2 */
201#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC092 /**< TLS 1.2 */
202#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC093 /**< TLS 1.2 */
Manuel Pégourié-Gonnard8d01eea2013-10-24 19:49:07 +0200203
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200204#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC094
205#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC095
206#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC096
207#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC097
208#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC098
209#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC099
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100210#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC09A
211#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC09B
Paul Bakker0f2f0bf2013-07-26 15:03:31 +0200212
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200213#define MBEDTLS_TLS_RSA_WITH_AES_128_CCM 0xC09C /**< TLS 1.2 */
214#define MBEDTLS_TLS_RSA_WITH_AES_256_CCM 0xC09D /**< TLS 1.2 */
215#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM 0xC09E /**< TLS 1.2 */
216#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM 0xC09F /**< TLS 1.2 */
217#define MBEDTLS_TLS_RSA_WITH_AES_128_CCM_8 0xC0A0 /**< TLS 1.2 */
218#define MBEDTLS_TLS_RSA_WITH_AES_256_CCM_8 0xC0A1 /**< TLS 1.2 */
219#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM_8 0xC0A2 /**< TLS 1.2 */
220#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM_8 0xC0A3 /**< TLS 1.2 */
221#define MBEDTLS_TLS_PSK_WITH_AES_128_CCM 0xC0A4 /**< TLS 1.2 */
222#define MBEDTLS_TLS_PSK_WITH_AES_256_CCM 0xC0A5 /**< TLS 1.2 */
223#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM 0xC0A6 /**< TLS 1.2 */
224#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM 0xC0A7 /**< TLS 1.2 */
225#define MBEDTLS_TLS_PSK_WITH_AES_128_CCM_8 0xC0A8 /**< TLS 1.2 */
226#define MBEDTLS_TLS_PSK_WITH_AES_256_CCM_8 0xC0A9 /**< TLS 1.2 */
227#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM_8 0xC0AA /**< TLS 1.2 */
228#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM_8 0xC0AB /**< TLS 1.2 */
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200229/* The last two are named with PSK_DHE in the RFC, which looks like a typo */
230
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200231#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM 0xC0AC /**< TLS 1.2 */
232#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM 0xC0AD /**< TLS 1.2 */
233#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 0xC0AE /**< TLS 1.2 */
234#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 0xC0AF /**< TLS 1.2 */
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200235
Manuel Pégourié-Gonnard538cb7b2015-09-15 18:03:28 +0200236#define MBEDTLS_TLS_ECJPAKE_WITH_AES_128_CCM_8 0xC0FF /**< experimental */
237
Manuel Pégourié-Gonnardce66d5e2018-06-14 11:11:15 +0200238/* RFC 7905 */
239#define MBEDTLS_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA8 /**< TLS 1.2 */
240#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA9 /**< TLS 1.2 */
241#define MBEDTLS_TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 0xCCAA /**< TLS 1.2 */
242#define MBEDTLS_TLS_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAB /**< TLS 1.2 */
243#define MBEDTLS_TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAC /**< TLS 1.2 */
244#define MBEDTLS_TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAD /**< TLS 1.2 */
245#define MBEDTLS_TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAE /**< TLS 1.2 */
246
Hanno Becker8ca26922021-07-23 19:24:23 +0100247/* RFC 8446, Appendix B.4 */
248#define MBEDTLS_TLS1_3_AES_128_GCM_SHA256 0x1301 /**< TLS 1.3 */
249#define MBEDTLS_TLS1_3_AES_256_GCM_SHA384 0x1302 /**< TLS 1.3 */
250#define MBEDTLS_TLS1_3_CHACHA20_POLY1305_SHA256 0x1303 /**< TLS 1.3 */
251#define MBEDTLS_TLS1_3_AES_128_CCM_SHA256 0x1304 /**< TLS 1.3 */
252#define MBEDTLS_TLS1_3_AES_128_CCM_8_SHA256 0x1305 /**< TLS 1.3 */
253
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200254/* Reminder: update mbedtls_ssl_premaster_secret when adding a new key exchange.
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100255 * Reminder: update MBEDTLS_KEY_EXCHANGE__xxx below
Manuel Pégourié-Gonnardd9423232014-12-02 11:57:29 +0100256 */
Paul Bakker68884e32013-01-07 18:20:04 +0100257typedef enum {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200258 MBEDTLS_KEY_EXCHANGE_NONE = 0,
259 MBEDTLS_KEY_EXCHANGE_RSA,
260 MBEDTLS_KEY_EXCHANGE_DHE_RSA,
261 MBEDTLS_KEY_EXCHANGE_ECDHE_RSA,
262 MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA,
263 MBEDTLS_KEY_EXCHANGE_PSK,
264 MBEDTLS_KEY_EXCHANGE_DHE_PSK,
265 MBEDTLS_KEY_EXCHANGE_RSA_PSK,
266 MBEDTLS_KEY_EXCHANGE_ECDHE_PSK,
267 MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
268 MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
Manuel Pégourié-Gonnard557535d2015-09-15 17:53:32 +0200269 MBEDTLS_KEY_EXCHANGE_ECJPAKE,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200270} mbedtls_key_exchange_type_t;
Paul Bakker68884e32013-01-07 18:20:04 +0100271
Manuel Pégourié-Gonnarde5f30722015-10-22 17:01:15 +0200272/* Key exchanges using a certificate */
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100273#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) || \
274 defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
275 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
276 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
277 defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED) || \
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100278 defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200279 defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100280#define MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED
Manuel Pégourié-Gonnardd9423232014-12-02 11:57:29 +0100281#endif
282
Valerio Settic8ccc8f2023-08-02 20:00:13 +0200283/* Key exchanges in either TLS 1.2 or 1.3 which are using an ECDSA
284 * signature */
Valerio Setti2430a702023-07-13 17:22:51 +0200285#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
286 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED)
287#define MBEDTLS_KEY_EXCHANGE_WITH_ECDSA_ANY_ENABLED
288#endif
289
Ronald Crone68ab4f2022-10-05 12:46:29 +0200290#if defined(MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED) || \
291 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED)
292#define MBEDTLS_SSL_HANDSHAKE_WITH_CERT_ENABLED
293#endif
294
Manuel Pégourié-Gonnard97bb7262023-09-18 11:28:32 +0200295/* Key exchanges allowing client certificate requests.
296 *
297 * Note: that's almost the same as MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED
298 * above, except RSA-PSK uses a server certificate but no client cert.
299 *
300 * Note: this difference is specific to TLS 1.2, as with TLS 1.3, things are
301 * more symmetrical: client certs and server certs are either both allowed
302 * (Ephemeral mode) or both disallowed (PSK and PKS-Ephemeral modes).
303 */
Hanno Becker1aa267c2017-04-28 17:08:27 +0100304#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) || \
305 defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
Hanno Becker1aa267c2017-04-28 17:08:27 +0100306 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
Manuel Pégourié-Gonnard97bb7262023-09-18 11:28:32 +0200307 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
Hanno Becker1aa267c2017-04-28 17:08:27 +0100308 defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED) || \
Manuel Pégourié-Gonnard97bb7262023-09-18 11:28:32 +0200309 defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100310#define MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100311#endif
312
Valerio Setti568799f2023-08-18 16:27:00 +0200313/* Helper to state that certificate-based client authentication through ECDSA
Valerio Setti2430a702023-07-13 17:22:51 +0200314 * is supported in TLS 1.2 */
315#if defined(MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED) && \
316 defined(MBEDTLS_PK_CAN_ECDSA_SIGN) && defined(MBEDTLS_PK_CAN_ECDSA_VERIFY)
317#define MBEDTLS_KEY_EXCHANGE_ECDSA_CERT_REQ_ALLOWED_ENABLED
318#endif
319
Valerio Settic8ccc8f2023-08-02 20:00:13 +0200320/* ECDSA required for certificates in either TLS 1.2 or 1.3 */
321#if defined(MBEDTLS_KEY_EXCHANGE_ECDSA_CERT_REQ_ALLOWED_ENABLED) || \
322 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED)
323#define MBEDTLS_KEY_EXCHANGE_ECDSA_CERT_REQ_ANY_ALLOWED_ENABLED
324#endif
325
Hanno Becker1aa267c2017-04-28 17:08:27 +0100326/* Key exchanges involving server signature in ServerKeyExchange */
327#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
328 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
329 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100330#define MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100331#endif
332
333/* Key exchanges using ECDH */
334#if defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
335 defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100336#define MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100337#endif
338
339/* Key exchanges that don't involve ephemeral keys */
340#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) || \
341 defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) || \
342 defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED) || \
Gilles Peskineeccd8882020-03-10 12:19:08 +0100343 defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED)
344#define MBEDTLS_KEY_EXCHANGE_SOME_NON_PFS_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100345#endif
346
347/* Key exchanges that involve ephemeral keys */
348#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
349 defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED) || \
350 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
351 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) || \
352 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
353 defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100354#define MBEDTLS_KEY_EXCHANGE_SOME_PFS_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100355#endif
356
Manuel Pégourié-Gonnarde5f30722015-10-22 17:01:15 +0200357/* Key exchanges using a PSK */
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100358#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) || \
359 defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED) || \
360 defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED) || \
361 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100362#define MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100363#endif
364
Hanno Becker1aa267c2017-04-28 17:08:27 +0100365/* Key exchanges using DHE */
366#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
367 defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100368#define MBEDTLS_KEY_EXCHANGE_SOME_DHE_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100369#endif
370
371/* Key exchanges using ECDHE */
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100372#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
373 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
374 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100375#define MBEDTLS_KEY_EXCHANGE_SOME_ECDHE_ENABLED
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100376#endif
377
Valerio Settied365e62023-07-07 15:02:27 +0200378/* TLS 1.2 key exchanges using ECDH or ECDHE*/
Valerio Setti00dc4062023-07-05 18:48:43 +0200379#if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED) || \
380 defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDHE_ENABLED)
381#define MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_1_2_ENABLED
382#endif
383
Valerio Setti0a0d0d52023-07-07 15:12:45 +0200384/* TLS 1.3 PSK key exchanges */
385#if defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_ENABLED) || \
386 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED)
387#define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_PSK_ENABLED
388#endif
389
390/* TLS 1.2 or 1.3 key exchanges with PSK */
391#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED) || \
392 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_PSK_ENABLED)
393#define MBEDTLS_SSL_HANDSHAKE_WITH_PSK_ENABLED
394#endif
395
396/* TLS 1.3 ephemeral key exchanges */
397#if defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED) || \
398 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED)
399#define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_EPHEMERAL_ENABLED
400#endif
401
Valerio Settiea59c432023-07-25 11:14:03 +0200402/* TLS 1.3 key exchanges using ECDHE */
Valerio Settied365e62023-07-07 15:02:27 +0200403#if defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_EPHEMERAL_ENABLED) && \
404 defined(PSA_WANT_ALG_ECDH)
405#define MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_ECDHE_ENABLED
406#endif
407
408/* TLS 1.2 or 1.3 key exchanges using ECDH or ECDHE */
Valerio Setti00dc4062023-07-05 18:48:43 +0200409#if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_1_2_ENABLED) || \
Valerio Settied365e62023-07-07 15:02:27 +0200410 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_ECDHE_ENABLED)
Valerio Settie87915b2023-07-06 12:47:43 +0200411#define MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_ANY_ENABLED
412#endif
413
Valerio Settied365e62023-07-07 15:02:27 +0200414/* TLS 1.2 XXDH key exchanges: ECDH or ECDHE or FFDH */
415#if (defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_1_2_ENABLED) || \
416 defined(MBEDTLS_KEY_EXCHANGE_SOME_DHE_ENABLED))
417#define MBEDTLS_KEY_EXCHANGE_SOME_XXDH_1_2_ENABLED
Valerio Setti00dc4062023-07-05 18:48:43 +0200418#endif
419
Valerio Setti9cd80112023-07-25 12:04:21 +0200420/* The handshake params structure has a set of fields called xxdh_psa which are used:
421 * - by TLS 1.2 with `USE_PSA` to do ECDH or ECDHE;
422 * - by TLS 1.3 to do ECDHE or FFDHE.
423 * The following macros can be used to guard their declaration and use.
424 */
425#if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_OR_ECDHE_1_2_ENABLED) && \
426 defined(MBEDTLS_USE_PSA_CRYPTO)
427#define MBEDTLS_KEY_EXCHANGE_SOME_XXDH_PSA_1_2_ENABLED
428#endif
429#if defined(MBEDTLS_KEY_EXCHANGE_SOME_XXDH_PSA_1_2_ENABLED) || \
Valerio Setti3d237b52023-07-07 16:00:20 +0200430 defined(MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_SOME_EPHEMERAL_ENABLED)
Valerio Settiea59c432023-07-25 11:14:03 +0200431#define MBEDTLS_KEY_EXCHANGE_SOME_XXDH_PSA_ANY_ENABLED
Valerio Setti3d237b52023-07-07 16:00:20 +0200432#endif
433
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200434typedef struct mbedtls_ssl_ciphersuite_t mbedtls_ssl_ciphersuite_t;
Paul Bakker68884e32013-01-07 18:20:04 +0100435
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200436#define MBEDTLS_CIPHERSUITE_WEAK 0x01 /**< Weak ciphersuite flag */
437#define MBEDTLS_CIPHERSUITE_SHORT_TAG 0x02 /**< Short authentication tag,
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200438 eg for CCM_8 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200439#define MBEDTLS_CIPHERSUITE_NODTLS 0x04 /**< Can't be used with DTLS */
Paul Bakker68884e32013-01-07 18:20:04 +0100440
441/**
442 * \brief This structure is used for storing ciphersuite information
Glenn Strauss60bfe602022-03-14 19:04:24 -0400443 *
444 * \note members are defined using integral types instead of enums
445 * in order to pack structure and reduce memory usage by internal
446 * \c ciphersuite_definitions[]
Paul Bakker68884e32013-01-07 18:20:04 +0100447 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100448struct mbedtls_ssl_ciphersuite_t {
Mateusz Starzyk363eb292021-05-19 17:32:44 +0200449 int MBEDTLS_PRIVATE(id);
Gilles Peskine449bd832023-01-11 14:50:10 +0100450 const char *MBEDTLS_PRIVATE(name);
Paul Bakker68884e32013-01-07 18:20:04 +0100451
Glenn Strauss60bfe602022-03-14 19:04:24 -0400452 uint8_t MBEDTLS_PRIVATE(cipher); /* mbedtls_cipher_type_t */
453 uint8_t MBEDTLS_PRIVATE(mac); /* mbedtls_md_type_t */
454 uint8_t MBEDTLS_PRIVATE(key_exchange); /* mbedtls_key_exchange_type_t */
455 uint8_t MBEDTLS_PRIVATE(flags);
Paul Bakker68884e32013-01-07 18:20:04 +0100456
Glenn Strauss60bfe602022-03-14 19:04:24 -0400457 uint16_t MBEDTLS_PRIVATE(min_tls_version); /* mbedtls_ssl_protocol_version */
458 uint16_t MBEDTLS_PRIVATE(max_tls_version); /* mbedtls_ssl_protocol_version */
Paul Bakker68884e32013-01-07 18:20:04 +0100459};
460
Gilles Peskine449bd832023-01-11 14:50:10 +0100461const int *mbedtls_ssl_list_ciphersuites(void);
Paul Bakker68884e32013-01-07 18:20:04 +0100462
Gilles Peskine449bd832023-01-11 14:50:10 +0100463const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_string(const char *ciphersuite_name);
464const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_id(int ciphersuite_id);
Paul Bakker68884e32013-01-07 18:20:04 +0100465
Gilles Peskine449bd832023-01-11 14:50:10 +0100466static inline const char *mbedtls_ssl_ciphersuite_get_name(const mbedtls_ssl_ciphersuite_t *info)
Glenn Strauss8f526902022-01-13 00:04:49 -0500467{
468 return info->MBEDTLS_PRIVATE(name);
469}
470
Minos Galanakis358b4482024-03-04 02:19:31 +0000471static inline const int mbedtls_ssl_ciphersuite_get_id(const mbedtls_ssl_ciphersuite_t *info)
472{
473 return info->MBEDTLS_PRIVATE(id);
474}
475
Gilles Peskine449bd832023-01-11 14:50:10 +0100476size_t mbedtls_ssl_ciphersuite_get_cipher_key_bitlen(const mbedtls_ssl_ciphersuite_t *info);
Glenn Strauss8f526902022-01-13 00:04:49 -0500477
Paul Bakker68884e32013-01-07 18:20:04 +0100478#ifdef __cplusplus
479}
480#endif
481
482#endif /* ssl_ciphersuites.h */