blob: 00a1aaec9867cb45d6179fd5c9f8ad019e75d66a [file] [log] [blame]
Paul Bakker68884e32013-01-07 18:20:04 +01001/**
2 * \file ssl_ciphersuites.h
3 *
Manuel Pégourié-Gonnardb4fe3cb2015-01-22 16:11:05 +00004 * \brief SSL Ciphersuites for mbed TLS
Darryl Greena40a1012018-01-05 15:33:17 +00005 */
6/*
Bence Szépkúti1e148272020-08-07 13:07:28 +02007 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02008 * SPDX-License-Identifier: Apache-2.0
9 *
10 * Licensed under the Apache License, Version 2.0 (the "License"); you may
11 * not use this file except in compliance with the License.
12 * You may obtain a copy of the License at
13 *
14 * http://www.apache.org/licenses/LICENSE-2.0
15 *
16 * Unless required by applicable law or agreed to in writing, software
17 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
18 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19 * See the License for the specific language governing permissions and
20 * limitations under the License.
Paul Bakker68884e32013-01-07 18:20:04 +010021 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020022#ifndef MBEDTLS_SSL_CIPHERSUITES_H
23#define MBEDTLS_SSL_CIPHERSUITES_H
Mateusz Starzyk846f0212021-05-19 19:44:07 +020024#include "mbedtls/private_access.h"
Paul Bakker68884e32013-01-07 18:20:04 +010025
Ron Eldor8b0cf2e2018-02-14 16:02:41 +020026#if !defined(MBEDTLS_CONFIG_FILE)
Jaeden Amero6609aef2019-07-04 20:01:14 +010027#include "mbedtls/config.h"
Ron Eldor8b0cf2e2018-02-14 16:02:41 +020028#else
29#include MBEDTLS_CONFIG_FILE
30#endif
31
Jaeden Amero6609aef2019-07-04 20:01:14 +010032#include "mbedtls/pk.h"
33#include "mbedtls/cipher.h"
34#include "mbedtls/md.h"
Paul Bakker68884e32013-01-07 18:20:04 +010035
36#ifdef __cplusplus
37extern "C" {
38#endif
39
Paul Bakker41c83d32013-03-20 14:39:14 +010040/*
41 * Supported ciphersuites (Official IANA names)
42 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020043#define MBEDTLS_TLS_RSA_WITH_NULL_MD5 0x01 /**< Weak! */
44#define MBEDTLS_TLS_RSA_WITH_NULL_SHA 0x02 /**< Weak! */
Paul Bakker41c83d32013-03-20 14:39:14 +010045
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020046#define MBEDTLS_TLS_RSA_WITH_3DES_EDE_CBC_SHA 0x0A
Paul Bakker0c5fac22013-04-19 21:10:51 +020047
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020048#define MBEDTLS_TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA 0x16
Paul Bakker41c83d32013-03-20 14:39:14 +010049
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020050#define MBEDTLS_TLS_PSK_WITH_NULL_SHA 0x2C /**< Weak! */
51#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA 0x2D /**< Weak! */
52#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA 0x2E /**< Weak! */
53#define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA 0x2F
Paul Bakker0c5fac22013-04-19 21:10:51 +020054
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020055#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA 0x33
56#define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA 0x35
57#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA 0x39
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020058
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020059#define MBEDTLS_TLS_RSA_WITH_NULL_SHA256 0x3B /**< Weak! */
60#define MBEDTLS_TLS_RSA_WITH_AES_128_CBC_SHA256 0x3C /**< TLS 1.2 */
61#define MBEDTLS_TLS_RSA_WITH_AES_256_CBC_SHA256 0x3D /**< TLS 1.2 */
Paul Bakker41c83d32013-03-20 14:39:14 +010062
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020063#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA 0x41
64#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA 0x45
Paul Bakker0c5fac22013-04-19 21:10:51 +020065
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020066#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 0x67 /**< TLS 1.2 */
67#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 0x6B /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +020068
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020069#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA 0x84
70#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA 0x88
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020071
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020072#define MBEDTLS_TLS_PSK_WITH_3DES_EDE_CBC_SHA 0x8B
73#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA 0x8C
74#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA 0x8D
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020075
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020076#define MBEDTLS_TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA 0x8F
77#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA 0x90
78#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA 0x91
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020079
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020080#define MBEDTLS_TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA 0x93
81#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA 0x94
82#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA 0x95
Paul Bakkerd4a56ec2013-04-16 18:05:29 +020083
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020084#define MBEDTLS_TLS_RSA_WITH_AES_128_GCM_SHA256 0x9C /**< TLS 1.2 */
85#define MBEDTLS_TLS_RSA_WITH_AES_256_GCM_SHA384 0x9D /**< TLS 1.2 */
86#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 0x9E /**< TLS 1.2 */
87#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 0x9F /**< TLS 1.2 */
Paul Bakker41c83d32013-03-20 14:39:14 +010088
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020089#define MBEDTLS_TLS_PSK_WITH_AES_128_GCM_SHA256 0xA8 /**< TLS 1.2 */
90#define MBEDTLS_TLS_PSK_WITH_AES_256_GCM_SHA384 0xA9 /**< TLS 1.2 */
91#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_GCM_SHA256 0xAA /**< TLS 1.2 */
92#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_GCM_SHA384 0xAB /**< TLS 1.2 */
93#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_GCM_SHA256 0xAC /**< TLS 1.2 */
94#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_GCM_SHA384 0xAD /**< TLS 1.2 */
Paul Bakker40afb4b2013-04-19 22:03:30 +020095
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020096#define MBEDTLS_TLS_PSK_WITH_AES_128_CBC_SHA256 0xAE
97#define MBEDTLS_TLS_PSK_WITH_AES_256_CBC_SHA384 0xAF
98#define MBEDTLS_TLS_PSK_WITH_NULL_SHA256 0xB0 /**< Weak! */
99#define MBEDTLS_TLS_PSK_WITH_NULL_SHA384 0xB1 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200100
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200101#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CBC_SHA256 0xB2
102#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CBC_SHA384 0xB3
103#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA256 0xB4 /**< Weak! */
104#define MBEDTLS_TLS_DHE_PSK_WITH_NULL_SHA384 0xB5 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200105
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200106#define MBEDTLS_TLS_RSA_PSK_WITH_AES_128_CBC_SHA256 0xB6
107#define MBEDTLS_TLS_RSA_PSK_WITH_AES_256_CBC_SHA384 0xB7
108#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA256 0xB8 /**< Weak! */
109#define MBEDTLS_TLS_RSA_PSK_WITH_NULL_SHA384 0xB9 /**< Weak! */
Paul Bakker40afb4b2013-04-19 22:03:30 +0200110
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200111#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xBA /**< TLS 1.2 */
112#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xBE /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200113
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200114#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC0 /**< TLS 1.2 */
115#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 0xC4 /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200116
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200117#define MBEDTLS_TLS_ECDH_ECDSA_WITH_NULL_SHA 0xC001 /**< Weak! */
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100118#define MBEDTLS_TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA 0xC003
119#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA 0xC004
120#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA 0xC005
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +0100121
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200122#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_NULL_SHA 0xC006 /**< Weak! */
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100123#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA 0xC008
124#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA 0xC009
125#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA 0xC00A
Manuel Pégourié-Gonnard32ea60a2013-08-17 17:39:04 +0200126
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200127#define MBEDTLS_TLS_ECDH_RSA_WITH_NULL_SHA 0xC00B /**< Weak! */
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100128#define MBEDTLS_TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA 0xC00D
129#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA 0xC00E
130#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA 0xC00F
Manuel Pégourié-Gonnard25781b22013-12-11 16:17:10 +0100131
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200132#define MBEDTLS_TLS_ECDHE_RSA_WITH_NULL_SHA 0xC010 /**< Weak! */
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100133#define MBEDTLS_TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA 0xC012
134#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 0xC013
135#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 0xC014
Paul Bakker41c83d32013-03-20 14:39:14 +0100136
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200137#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 0xC023 /**< TLS 1.2 */
138#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 0xC024 /**< TLS 1.2 */
139#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 0xC025 /**< TLS 1.2 */
140#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 0xC026 /**< TLS 1.2 */
141#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 0xC027 /**< TLS 1.2 */
142#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 0xC028 /**< TLS 1.2 */
143#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 0xC029 /**< TLS 1.2 */
144#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 0xC02A /**< TLS 1.2 */
Paul Bakker0c5fac22013-04-19 21:10:51 +0200145
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200146#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 0xC02B /**< TLS 1.2 */
147#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 0xC02C /**< TLS 1.2 */
148#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 0xC02D /**< TLS 1.2 */
149#define MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 0xC02E /**< TLS 1.2 */
150#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 0xC02F /**< TLS 1.2 */
151#define MBEDTLS_TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 0xC030 /**< TLS 1.2 */
152#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 0xC031 /**< TLS 1.2 */
153#define MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 0xC032 /**< TLS 1.2 */
Paul Bakkera54e4932013-03-20 15:31:54 +0100154
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100155#define MBEDTLS_TLS_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA 0xC034
156#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA 0xC035
157#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA 0xC036
158#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA256 0xC037
159#define MBEDTLS_TLS_ECDHE_PSK_WITH_AES_256_CBC_SHA384 0xC038
160#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA 0xC039
161#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA256 0xC03A
162#define MBEDTLS_TLS_ECDHE_PSK_WITH_NULL_SHA384 0xC03B
Manuel Pégourié-Gonnard225d6aa2013-10-11 19:07:56 +0200163
Manuel Pégourié-Gonnard4231e7f2018-02-28 10:54:31 +0100164#define MBEDTLS_TLS_RSA_WITH_ARIA_128_CBC_SHA256 0xC03C /**< TLS 1.2 */
165#define MBEDTLS_TLS_RSA_WITH_ARIA_256_CBC_SHA384 0xC03D /**< TLS 1.2 */
166#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256 0xC044 /**< TLS 1.2 */
167#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384 0xC045 /**< TLS 1.2 */
168#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_CBC_SHA256 0xC048 /**< TLS 1.2 */
169#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_CBC_SHA384 0xC049 /**< TLS 1.2 */
170#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256 0xC04A /**< TLS 1.2 */
171#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384 0xC04B /**< TLS 1.2 */
172#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_CBC_SHA256 0xC04C /**< TLS 1.2 */
173#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_CBC_SHA384 0xC04D /**< TLS 1.2 */
174#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256 0xC04E /**< TLS 1.2 */
175#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384 0xC04F /**< TLS 1.2 */
176#define MBEDTLS_TLS_RSA_WITH_ARIA_128_GCM_SHA256 0xC050 /**< TLS 1.2 */
177#define MBEDTLS_TLS_RSA_WITH_ARIA_256_GCM_SHA384 0xC051 /**< TLS 1.2 */
178#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 0xC052 /**< TLS 1.2 */
179#define MBEDTLS_TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 0xC053 /**< TLS 1.2 */
180#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 0xC05C /**< TLS 1.2 */
181#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 0xC05D /**< TLS 1.2 */
182#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256 0xC05E /**< TLS 1.2 */
183#define MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384 0xC05F /**< TLS 1.2 */
184#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 0xC060 /**< TLS 1.2 */
185#define MBEDTLS_TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 0xC061 /**< TLS 1.2 */
186#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256 0xC062 /**< TLS 1.2 */
187#define MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384 0xC063 /**< TLS 1.2 */
188#define MBEDTLS_TLS_PSK_WITH_ARIA_128_CBC_SHA256 0xC064 /**< TLS 1.2 */
189#define MBEDTLS_TLS_PSK_WITH_ARIA_256_CBC_SHA384 0xC065 /**< TLS 1.2 */
190#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC066 /**< TLS 1.2 */
191#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC067 /**< TLS 1.2 */
192#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256 0xC068 /**< TLS 1.2 */
193#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384 0xC069 /**< TLS 1.2 */
194#define MBEDTLS_TLS_PSK_WITH_ARIA_128_GCM_SHA256 0xC06A /**< TLS 1.2 */
195#define MBEDTLS_TLS_PSK_WITH_ARIA_256_GCM_SHA384 0xC06B /**< TLS 1.2 */
196#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256 0xC06C /**< TLS 1.2 */
197#define MBEDTLS_TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384 0xC06D /**< TLS 1.2 */
198#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256 0xC06E /**< TLS 1.2 */
199#define MBEDTLS_TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384 0xC06F /**< TLS 1.2 */
200#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_128_CBC_SHA256 0xC070 /**< TLS 1.2 */
201#define MBEDTLS_TLS_ECDHE_PSK_WITH_ARIA_256_CBC_SHA384 0xC071 /**< TLS 1.2 */
Markku-Juhani O. Saarinenc06e1012017-12-07 11:51:13 +0000202
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100203#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC072
204#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC073
205#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 0xC074
206#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 0xC075
207#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC076
208#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC077
209#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256 0xC078
210#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384 0xC079
Paul Bakker27714b12013-04-07 23:07:12 +0200211
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200212#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC07A /**< TLS 1.2 */
213#define MBEDTLS_TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC07B /**< TLS 1.2 */
214#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC07C /**< TLS 1.2 */
215#define MBEDTLS_TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC07D /**< TLS 1.2 */
216#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC086 /**< TLS 1.2 */
217#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC087 /**< TLS 1.2 */
218#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 0xC088 /**< TLS 1.2 */
219#define MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 0xC089 /**< TLS 1.2 */
220#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC08A /**< TLS 1.2 */
221#define MBEDTLS_TLS_ECDHE_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC08B /**< TLS 1.2 */
222#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256 0xC08C /**< TLS 1.2 */
223#define MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384 0xC08D /**< TLS 1.2 */
Manuel Pégourié-Gonnard8d01eea2013-10-24 19:49:07 +0200224
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200225#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC08E /**< TLS 1.2 */
226#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC08F /**< TLS 1.2 */
227#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC090 /**< TLS 1.2 */
228#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC091 /**< TLS 1.2 */
229#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256 0xC092 /**< TLS 1.2 */
230#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384 0xC093 /**< TLS 1.2 */
Manuel Pégourié-Gonnard8d01eea2013-10-24 19:49:07 +0200231
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200232#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC094
233#define MBEDTLS_TLS_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC095
234#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC096
235#define MBEDTLS_TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC097
236#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC098
237#define MBEDTLS_TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC099
Mateusz Starzyk06b07fb2021-02-18 13:55:21 +0100238#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256 0xC09A
239#define MBEDTLS_TLS_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384 0xC09B
Paul Bakker0f2f0bf2013-07-26 15:03:31 +0200240
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200241#define MBEDTLS_TLS_RSA_WITH_AES_128_CCM 0xC09C /**< TLS 1.2 */
242#define MBEDTLS_TLS_RSA_WITH_AES_256_CCM 0xC09D /**< TLS 1.2 */
243#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM 0xC09E /**< TLS 1.2 */
244#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM 0xC09F /**< TLS 1.2 */
245#define MBEDTLS_TLS_RSA_WITH_AES_128_CCM_8 0xC0A0 /**< TLS 1.2 */
246#define MBEDTLS_TLS_RSA_WITH_AES_256_CCM_8 0xC0A1 /**< TLS 1.2 */
247#define MBEDTLS_TLS_DHE_RSA_WITH_AES_128_CCM_8 0xC0A2 /**< TLS 1.2 */
248#define MBEDTLS_TLS_DHE_RSA_WITH_AES_256_CCM_8 0xC0A3 /**< TLS 1.2 */
249#define MBEDTLS_TLS_PSK_WITH_AES_128_CCM 0xC0A4 /**< TLS 1.2 */
250#define MBEDTLS_TLS_PSK_WITH_AES_256_CCM 0xC0A5 /**< TLS 1.2 */
251#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM 0xC0A6 /**< TLS 1.2 */
252#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM 0xC0A7 /**< TLS 1.2 */
253#define MBEDTLS_TLS_PSK_WITH_AES_128_CCM_8 0xC0A8 /**< TLS 1.2 */
254#define MBEDTLS_TLS_PSK_WITH_AES_256_CCM_8 0xC0A9 /**< TLS 1.2 */
255#define MBEDTLS_TLS_DHE_PSK_WITH_AES_128_CCM_8 0xC0AA /**< TLS 1.2 */
256#define MBEDTLS_TLS_DHE_PSK_WITH_AES_256_CCM_8 0xC0AB /**< TLS 1.2 */
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200257/* The last two are named with PSK_DHE in the RFC, which looks like a typo */
258
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200259#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM 0xC0AC /**< TLS 1.2 */
260#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM 0xC0AD /**< TLS 1.2 */
261#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 0xC0AE /**< TLS 1.2 */
262#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 0xC0AF /**< TLS 1.2 */
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200263
Manuel Pégourié-Gonnard538cb7b2015-09-15 18:03:28 +0200264#define MBEDTLS_TLS_ECJPAKE_WITH_AES_128_CCM_8 0xC0FF /**< experimental */
265
Manuel Pégourié-Gonnardce66d5e2018-06-14 11:11:15 +0200266/* RFC 7905 */
267#define MBEDTLS_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA8 /**< TLS 1.2 */
268#define MBEDTLS_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 0xCCA9 /**< TLS 1.2 */
269#define MBEDTLS_TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 0xCCAA /**< TLS 1.2 */
270#define MBEDTLS_TLS_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAB /**< TLS 1.2 */
271#define MBEDTLS_TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAC /**< TLS 1.2 */
272#define MBEDTLS_TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAD /**< TLS 1.2 */
273#define MBEDTLS_TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256 0xCCAE /**< TLS 1.2 */
274
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200275/* Reminder: update mbedtls_ssl_premaster_secret when adding a new key exchange.
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100276 * Reminder: update MBEDTLS_KEY_EXCHANGE__xxx below
Manuel Pégourié-Gonnardd9423232014-12-02 11:57:29 +0100277 */
Paul Bakker68884e32013-01-07 18:20:04 +0100278typedef enum {
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200279 MBEDTLS_KEY_EXCHANGE_NONE = 0,
280 MBEDTLS_KEY_EXCHANGE_RSA,
281 MBEDTLS_KEY_EXCHANGE_DHE_RSA,
282 MBEDTLS_KEY_EXCHANGE_ECDHE_RSA,
283 MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA,
284 MBEDTLS_KEY_EXCHANGE_PSK,
285 MBEDTLS_KEY_EXCHANGE_DHE_PSK,
286 MBEDTLS_KEY_EXCHANGE_RSA_PSK,
287 MBEDTLS_KEY_EXCHANGE_ECDHE_PSK,
288 MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
289 MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
Manuel Pégourié-Gonnard557535d2015-09-15 17:53:32 +0200290 MBEDTLS_KEY_EXCHANGE_ECJPAKE,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200291} mbedtls_key_exchange_type_t;
Paul Bakker68884e32013-01-07 18:20:04 +0100292
Manuel Pégourié-Gonnarde5f30722015-10-22 17:01:15 +0200293/* Key exchanges using a certificate */
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100294#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) || \
295 defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
296 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
297 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
298 defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED) || \
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100299 defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200300 defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100301#define MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED
Manuel Pégourié-Gonnardd9423232014-12-02 11:57:29 +0100302#endif
303
Hanno Becker1aa267c2017-04-28 17:08:27 +0100304/* Key exchanges allowing client certificate requests */
305#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) || \
306 defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
307 defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
308 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
309 defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED) || \
Markku-Juhani O. Saarinenc06e1012017-12-07 11:51:13 +0000310 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100311#define MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100312#endif
313
314/* Key exchanges involving server signature in ServerKeyExchange */
315#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
316 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
317 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100318#define MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100319#endif
320
321/* Key exchanges using ECDH */
322#if defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
323 defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100324#define MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100325#endif
326
327/* Key exchanges that don't involve ephemeral keys */
328#if defined(MBEDTLS_KEY_EXCHANGE_RSA_ENABLED) || \
329 defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) || \
330 defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED) || \
Gilles Peskineeccd8882020-03-10 12:19:08 +0100331 defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED)
332#define MBEDTLS_KEY_EXCHANGE_SOME_NON_PFS_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100333#endif
334
335/* Key exchanges that involve ephemeral keys */
336#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
337 defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED) || \
338 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
339 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) || \
340 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
341 defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100342#define MBEDTLS_KEY_EXCHANGE_SOME_PFS_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100343#endif
344
Manuel Pégourié-Gonnarde5f30722015-10-22 17:01:15 +0200345/* Key exchanges using a PSK */
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100346#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) || \
347 defined(MBEDTLS_KEY_EXCHANGE_RSA_PSK_ENABLED) || \
348 defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED) || \
349 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100350#define MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100351#endif
352
Hanno Becker1aa267c2017-04-28 17:08:27 +0100353/* Key exchanges using DHE */
354#if defined(MBEDTLS_KEY_EXCHANGE_DHE_RSA_ENABLED) || \
355 defined(MBEDTLS_KEY_EXCHANGE_DHE_PSK_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100356#define MBEDTLS_KEY_EXCHANGE_SOME_DHE_ENABLED
Hanno Becker1aa267c2017-04-28 17:08:27 +0100357#endif
358
359/* Key exchanges using ECDHE */
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100360#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
361 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
362 defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
Gilles Peskineeccd8882020-03-10 12:19:08 +0100363#define MBEDTLS_KEY_EXCHANGE_SOME_ECDHE_ENABLED
Manuel Pégourié-Gonnardadeb7d82015-10-09 14:44:47 +0100364#endif
365
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200366typedef struct mbedtls_ssl_ciphersuite_t mbedtls_ssl_ciphersuite_t;
Paul Bakker68884e32013-01-07 18:20:04 +0100367
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200368#define MBEDTLS_CIPHERSUITE_WEAK 0x01 /**< Weak ciphersuite flag */
369#define MBEDTLS_CIPHERSUITE_SHORT_TAG 0x02 /**< Short authentication tag,
Manuel Pégourié-Gonnard6768da92014-05-14 12:26:51 +0200370 eg for CCM_8 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200371#define MBEDTLS_CIPHERSUITE_NODTLS 0x04 /**< Can't be used with DTLS */
Paul Bakker68884e32013-01-07 18:20:04 +0100372
373/**
374 * \brief This structure is used for storing ciphersuite information
375 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200376struct mbedtls_ssl_ciphersuite_t
Paul Bakker68884e32013-01-07 18:20:04 +0100377{
Mateusz Starzyk363eb292021-05-19 17:32:44 +0200378 int MBEDTLS_PRIVATE(id);
379 const char * MBEDTLS_PRIVATE(name);
Paul Bakker68884e32013-01-07 18:20:04 +0100380
Mateusz Starzyk363eb292021-05-19 17:32:44 +0200381 mbedtls_cipher_type_t MBEDTLS_PRIVATE(cipher);
382 mbedtls_md_type_t MBEDTLS_PRIVATE(mac);
383 mbedtls_key_exchange_type_t MBEDTLS_PRIVATE(key_exchange);
Paul Bakker68884e32013-01-07 18:20:04 +0100384
Mateusz Starzyk363eb292021-05-19 17:32:44 +0200385 int MBEDTLS_PRIVATE(min_major_ver);
386 int MBEDTLS_PRIVATE(min_minor_ver);
387 int MBEDTLS_PRIVATE(max_major_ver);
388 int MBEDTLS_PRIVATE(max_minor_ver);
Paul Bakker68884e32013-01-07 18:20:04 +0100389
Mateusz Starzyk363eb292021-05-19 17:32:44 +0200390 unsigned char MBEDTLS_PRIVATE(flags);
Paul Bakker68884e32013-01-07 18:20:04 +0100391};
392
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200393const int *mbedtls_ssl_list_ciphersuites( void );
Paul Bakker68884e32013-01-07 18:20:04 +0100394
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200395const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_string( const char *ciphersuite_name );
396const mbedtls_ssl_ciphersuite_t *mbedtls_ssl_ciphersuite_from_id( int ciphersuite_id );
Paul Bakker68884e32013-01-07 18:20:04 +0100397
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200398#if defined(MBEDTLS_PK_C)
399mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg( const mbedtls_ssl_ciphersuite_t *info );
Hanno Becker7e5437a2017-04-28 17:15:26 +0100400mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg( const mbedtls_ssl_ciphersuite_t *info );
Manuel Pégourié-Gonnard1a483832013-09-20 12:29:15 +0200401#endif
Manuel Pégourié-Gonnard09edda82013-08-19 13:50:33 +0200402
Hanno Beckerd300a572017-06-20 14:31:29 +0100403int mbedtls_ssl_ciphersuite_uses_ec( const mbedtls_ssl_ciphersuite_t *info );
404int mbedtls_ssl_ciphersuite_uses_psk( const mbedtls_ssl_ciphersuite_t *info );
Hanno Becker1aa267c2017-04-28 17:08:27 +0100405
Gilles Peskineeccd8882020-03-10 12:19:08 +0100406#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PFS_ENABLED)
Hanno Becker1aa267c2017-04-28 17:08:27 +0100407static inline int mbedtls_ssl_ciphersuite_has_pfs( const mbedtls_ssl_ciphersuite_t *info )
408{
Mateusz Starzyk846f0212021-05-19 19:44:07 +0200409 switch( info->MBEDTLS_PRIVATE(key_exchange) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100410 {
411 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
412 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
413 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
414 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
415 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
416 case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
417 return( 1 );
418
419 default:
420 return( 0 );
421 }
422}
Gilles Peskineeccd8882020-03-10 12:19:08 +0100423#endif /* MBEDTLS_KEY_EXCHANGE_SOME_PFS_ENABLED */
Hanno Becker1aa267c2017-04-28 17:08:27 +0100424
Gilles Peskineeccd8882020-03-10 12:19:08 +0100425#if defined(MBEDTLS_KEY_EXCHANGE_SOME_NON_PFS_ENABLED)
Hanno Becker1aa267c2017-04-28 17:08:27 +0100426static inline int mbedtls_ssl_ciphersuite_no_pfs( const mbedtls_ssl_ciphersuite_t *info )
427{
Mateusz Starzyk846f0212021-05-19 19:44:07 +0200428 switch( info->MBEDTLS_PRIVATE(key_exchange) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100429 {
430 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
431 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
432 case MBEDTLS_KEY_EXCHANGE_RSA:
433 case MBEDTLS_KEY_EXCHANGE_PSK:
434 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
435 return( 1 );
436
437 default:
438 return( 0 );
439 }
440}
Gilles Peskineeccd8882020-03-10 12:19:08 +0100441#endif /* MBEDTLS_KEY_EXCHANGE_SOME_NON_PFS_ENABLED */
Hanno Becker1aa267c2017-04-28 17:08:27 +0100442
Gilles Peskineeccd8882020-03-10 12:19:08 +0100443#if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED)
Hanno Becker1aa267c2017-04-28 17:08:27 +0100444static inline int mbedtls_ssl_ciphersuite_uses_ecdh( const mbedtls_ssl_ciphersuite_t *info )
445{
Mateusz Starzyk846f0212021-05-19 19:44:07 +0200446 switch( info->MBEDTLS_PRIVATE(key_exchange) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100447 {
448 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
449 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
450 return( 1 );
451
452 default:
453 return( 0 );
454 }
455}
Gilles Peskineeccd8882020-03-10 12:19:08 +0100456#endif /* MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED */
Hanno Becker1aa267c2017-04-28 17:08:27 +0100457
Hanno Becker1aa267c2017-04-28 17:08:27 +0100458static inline int mbedtls_ssl_ciphersuite_cert_req_allowed( const mbedtls_ssl_ciphersuite_t *info )
459{
Mateusz Starzyk846f0212021-05-19 19:44:07 +0200460 switch( info->MBEDTLS_PRIVATE(key_exchange) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100461 {
462 case MBEDTLS_KEY_EXCHANGE_RSA:
463 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
464 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
465 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
466 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
467 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
468 return( 1 );
469
470 default:
471 return( 0 );
472 }
473}
474
Hanno Becker7177a882019-02-05 13:36:46 +0000475static inline int mbedtls_ssl_ciphersuite_uses_srv_cert( const mbedtls_ssl_ciphersuite_t *info )
476{
Mateusz Starzyk846f0212021-05-19 19:44:07 +0200477 switch( info->MBEDTLS_PRIVATE(key_exchange) )
Hanno Becker7177a882019-02-05 13:36:46 +0000478 {
479 case MBEDTLS_KEY_EXCHANGE_RSA:
480 case MBEDTLS_KEY_EXCHANGE_RSA_PSK:
481 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
482 case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
483 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
484 case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
485 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
486 return( 1 );
487
488 default:
489 return( 0 );
490 }
491}
492
Gilles Peskineeccd8882020-03-10 12:19:08 +0100493#if defined(MBEDTLS_KEY_EXCHANGE_SOME_DHE_ENABLED)
Hanno Becker1aa267c2017-04-28 17:08:27 +0100494static inline int mbedtls_ssl_ciphersuite_uses_dhe( const mbedtls_ssl_ciphersuite_t *info )
495{
Mateusz Starzyk846f0212021-05-19 19:44:07 +0200496 switch( info->MBEDTLS_PRIVATE(key_exchange) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100497 {
498 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
499 case MBEDTLS_KEY_EXCHANGE_DHE_PSK:
500 return( 1 );
501
502 default:
503 return( 0 );
504 }
505}
Gilles Peskineeccd8882020-03-10 12:19:08 +0100506#endif /* MBEDTLS_KEY_EXCHANGE_SOME_DHE_ENABLED) */
Hanno Becker1aa267c2017-04-28 17:08:27 +0100507
Gilles Peskineeccd8882020-03-10 12:19:08 +0100508#if defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDHE_ENABLED)
Hanno Becker1aa267c2017-04-28 17:08:27 +0100509static inline int mbedtls_ssl_ciphersuite_uses_ecdhe( const mbedtls_ssl_ciphersuite_t *info )
510{
Mateusz Starzyk846f0212021-05-19 19:44:07 +0200511 switch( info->MBEDTLS_PRIVATE(key_exchange) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100512 {
513 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
514 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
515 case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
516 return( 1 );
517
518 default:
519 return( 0 );
520 }
521}
Gilles Peskineeccd8882020-03-10 12:19:08 +0100522#endif /* MBEDTLS_KEY_EXCHANGE_SOME_ECDHE_ENABLED) */
Hanno Becker1aa267c2017-04-28 17:08:27 +0100523
Gilles Peskineeccd8882020-03-10 12:19:08 +0100524#if defined(MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED)
Hanno Becker1aa267c2017-04-28 17:08:27 +0100525static inline int mbedtls_ssl_ciphersuite_uses_server_signature( const mbedtls_ssl_ciphersuite_t *info )
526{
Mateusz Starzyk846f0212021-05-19 19:44:07 +0200527 switch( info->MBEDTLS_PRIVATE(key_exchange) )
Hanno Becker1aa267c2017-04-28 17:08:27 +0100528 {
529 case MBEDTLS_KEY_EXCHANGE_DHE_RSA:
530 case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
531 case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
532 return( 1 );
533
534 default:
535 return( 0 );
536 }
537}
Gilles Peskineeccd8882020-03-10 12:19:08 +0100538#endif /* MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED */
Manuel Pégourié-Gonnard51451f82013-09-17 12:06:25 +0200539
Paul Bakker68884e32013-01-07 18:20:04 +0100540#ifdef __cplusplus
541}
542#endif
543
544#endif /* ssl_ciphersuites.h */