Coverage Report

Created: 2026-02-22 06:11

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/providers/common/capabilities.c
Line
Count
Source
1
/*
2
 * Copyright 2019-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
#include <assert.h>
11
#include <string.h>
12
#include <openssl/core_dispatch.h>
13
#include <openssl/core_names.h>
14
/* For TLS1_VERSION etc */
15
#include <openssl/prov_ssl.h>
16
#include <openssl/params.h>
17
#include "internal/nelem.h"
18
#include "internal/tlsgroups.h"
19
#include "internal/tlssigalgs.h"
20
#include "prov/providercommon.h"
21
#include "internal/e_os.h"
22
#include "crypto/ml_kem.h"
23
24
/*
25
 * If none of EC, DH OR ML-KEM are available then we have no TLS-GROUP
26
 * capabilities.
27
 */
28
#if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_ML_KEM)
29
typedef struct tls_group_constants_st {
30
    unsigned int group_id; /* Group ID */
31
    unsigned int secbits; /* Bits of security */
32
    int mintls; /* Minimum TLS version, -1 unsupported */
33
    int maxtls; /* Maximum TLS version (or 0 for undefined) */
34
    int mindtls; /* Minimum DTLS version, -1 unsupported */
35
    int maxdtls; /* Maximum DTLS version (or 0 for undefined) */
36
    int is_kem; /* Indicates utility as KEM */
37
} TLS_GROUP_CONSTANTS;
38
39
/*
40
 * The indices of entries in this table must be independent of which TLS groups
41
 * we do or not support.  It just lists basic facts about the groups, and is
42
 * used by (numeric slot number) reference in the "param_group_list" below.
43
 * Therefore, there must be no #ifdefs in this table, the index of each entry
44
 * must be independent of compile-time options.
45
 *
46
 * For the FFDHE groups, the security bit values are as given by
47
 * BN_security_bits().  For the ML-KEM hybrids these are the ML-KEM security
48
 * bits.
49
 */
50
static const TLS_GROUP_CONSTANTS group_list[] = {
51
    /*  0 */ { OSSL_TLS_GROUP_ID_sect163k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
52
    /*  1 */ { OSSL_TLS_GROUP_ID_sect163r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
53
    /*  2 */ { OSSL_TLS_GROUP_ID_sect163r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
54
    /*  3 */ { OSSL_TLS_GROUP_ID_sect193r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
55
    /*  4 */ { OSSL_TLS_GROUP_ID_sect193r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
56
    /*  5 */ { OSSL_TLS_GROUP_ID_sect233k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
57
    /*  6 */ { OSSL_TLS_GROUP_ID_sect233r1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
58
    /*  7 */ { OSSL_TLS_GROUP_ID_sect239k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
59
    /*  8 */ { OSSL_TLS_GROUP_ID_sect283k1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
60
    /*  9 */ { OSSL_TLS_GROUP_ID_sect283r1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
61
    /* 10 */ { OSSL_TLS_GROUP_ID_sect409k1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
62
    /* 11 */ { OSSL_TLS_GROUP_ID_sect409r1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
63
    /* 12 */ { OSSL_TLS_GROUP_ID_sect571k1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
64
    /* 13 */ { OSSL_TLS_GROUP_ID_sect571r1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
65
    /* 14 */ { OSSL_TLS_GROUP_ID_secp160k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
66
    /* 15 */ { OSSL_TLS_GROUP_ID_secp160r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
67
    /* 16 */ { OSSL_TLS_GROUP_ID_secp160r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
68
    /* 17 */ { OSSL_TLS_GROUP_ID_secp192k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
69
    /* 18 */ { OSSL_TLS_GROUP_ID_secp192r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
70
    /* 19 */ { OSSL_TLS_GROUP_ID_secp224k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
71
    /* 20 */ { OSSL_TLS_GROUP_ID_secp224r1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
72
    /* 21 */ { OSSL_TLS_GROUP_ID_secp256k1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
73
    /* 22 */ { OSSL_TLS_GROUP_ID_secp256r1, 128, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
74
    /* 23 */ { OSSL_TLS_GROUP_ID_secp384r1, 192, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
75
    /* 24 */ { OSSL_TLS_GROUP_ID_secp521r1, 256, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
76
    /* 25 */ { OSSL_TLS_GROUP_ID_brainpoolP256r1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
77
    /* 26 */ { OSSL_TLS_GROUP_ID_brainpoolP384r1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
78
    /* 27 */ { OSSL_TLS_GROUP_ID_brainpoolP512r1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
79
    /* 28 */ { OSSL_TLS_GROUP_ID_x25519, 128, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
80
    /* 29 */ { OSSL_TLS_GROUP_ID_x448, 224, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
81
    /* 30 */ { OSSL_TLS_GROUP_ID_brainpoolP256r1_tls13, 128, TLS1_3_VERSION, 0, -1, -1, 0 },
82
    /* 31 */ { OSSL_TLS_GROUP_ID_brainpoolP384r1_tls13, 192, TLS1_3_VERSION, 0, -1, -1, 0 },
83
    /* 32 */ { OSSL_TLS_GROUP_ID_brainpoolP512r1_tls13, 256, TLS1_3_VERSION, 0, -1, -1, 0 },
84
    /* 33 */ { OSSL_TLS_GROUP_ID_ffdhe2048, 112, TLS1_3_VERSION, 0, -1, -1, 0 },
85
    /* 34 */ { OSSL_TLS_GROUP_ID_ffdhe3072, 128, TLS1_3_VERSION, 0, -1, -1, 0 },
86
    /* 35 */ { OSSL_TLS_GROUP_ID_ffdhe4096, 128, TLS1_3_VERSION, 0, -1, -1, 0 },
87
    /* 36 */ { OSSL_TLS_GROUP_ID_ffdhe6144, 128, TLS1_3_VERSION, 0, -1, -1, 0 },
88
    /* 37 */ { OSSL_TLS_GROUP_ID_ffdhe8192, 192, TLS1_3_VERSION, 0, -1, -1, 0 },
89
    /* 38 */ { OSSL_TLS_GROUP_ID_mlkem512, ML_KEM_512_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
90
    /* 39 */ { OSSL_TLS_GROUP_ID_mlkem768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
91
    /* 40 */ { OSSL_TLS_GROUP_ID_mlkem1024, ML_KEM_1024_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
92
    /* 41 */ { OSSL_TLS_GROUP_ID_X25519MLKEM768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
93
    /* 42 */ { OSSL_TLS_GROUP_ID_SecP256r1MLKEM768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
94
    /* 43 */ { OSSL_TLS_GROUP_ID_SecP384r1MLKEM1024, ML_KEM_1024_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
95
    /* 44 */ { OSSL_TLS_GROUP_ID_curveSM2, 128, TLS1_3_VERSION, 0, -1, -1, 0 },
96
    /* 45 */ { OSSL_TLS_GROUP_ID_curveSM2MLKEM768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
97
};
98
99
#define TLS_GROUP_ENTRY(tlsname, realname, algorithm, idx)              \
100
    {                                                                   \
101
        OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_NAME,          \
102
            tlsname,                                                    \
103
            sizeof(tlsname)),                                           \
104
        OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_NAME_INTERNAL, \
105
            realname,                                                   \
106
            sizeof(realname)),                                          \
107
        OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_ALG,           \
108
            algorithm,                                                  \
109
            sizeof(algorithm)),                                         \
110
        OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_GROUP_ID,                   \
111
            (unsigned int *)&group_list[idx].group_id),                 \
112
        OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_GROUP_SECURITY_BITS,        \
113
            (unsigned int *)&group_list[idx].secbits),                  \
114
        OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MIN_TLS,               \
115
            (unsigned int *)&group_list[idx].mintls),                   \
116
        OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MAX_TLS,               \
117
            (unsigned int *)&group_list[idx].maxtls),                   \
118
        OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MIN_DTLS,              \
119
            (unsigned int *)&group_list[idx].mindtls),                  \
120
        OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MAX_DTLS,              \
121
            (unsigned int *)&group_list[idx].maxdtls),                  \
122
        OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_IS_KEM,                \
123
            (unsigned int *)&group_list[idx].is_kem),                   \
124
        OSSL_PARAM_END                                                  \
125
    }
126
127
/*-
128
 * - The 4th field of each entry is an index into "group_list" above.
129
 *
130
 * - The 3rd field is the key management algorithm name.
131
132
 * - The 2nd field is the GROUP_NAME used with the provider, needed for
133
 *   providers that implement a family of related algorithms, but required
134
 *   non-null even when the provider implements just one.
135
 *
136
 * - The 1st field is the TLS group name used in SSL_CTX_set_group_list(),
137
 *   aliases repeat everything but the first field.
138
 *
139
 * Curves 1..22 were deprecated in:
140
 *
141
 *   https://www.rfc-editor.org/rfc/rfc8422.html
142
 *
143
 * leaving just:
144
 *
145
 *   enum {
146
 *       deprecated(1..22),
147
 *       secp256r1 (23), secp384r1 (24), secp521r1 (25),
148
 *       x25519(29), x448(30),
149
 *       reserved (0xFE00..0xFEFF),
150
 *       deprecated(0xFF01..0xFF02),
151
 *       (0xFFFF)
152
 *   } NamedCurve;
153
 *
154
 * and those added later (FFDHE, brainpool, ML-KEM)
155
 */
156
static const OSSL_PARAM param_group_list[][11] = {
157
#ifndef OPENSSL_NO_EC
158
#if !defined(OPENSSL_NO_ML_KEM)
159
#if !defined(OPENSSL_NO_ECX)
160
    TLS_GROUP_ENTRY("X25519MLKEM768", "", "X25519MLKEM768", 41),
161
#endif
162
#endif
163
#ifndef FIPS_MODULE
164
    TLS_GROUP_ENTRY("x25519", "X25519", "X25519", 28),
165
    TLS_GROUP_ENTRY("x448", "X448", "X448", 29),
166
#endif
167
    TLS_GROUP_ENTRY("secp256r1", "prime256v1", "EC", 22),
168
    TLS_GROUP_ENTRY("P-256", "prime256v1", "EC", 22), /* Alias of above */
169
    TLS_GROUP_ENTRY("secp384r1", "secp384r1", "EC", 23),
170
    TLS_GROUP_ENTRY("P-384", "secp384r1", "EC", 23), /* Alias of above */
171
    TLS_GROUP_ENTRY("secp521r1", "secp521r1", "EC", 24),
172
    TLS_GROUP_ENTRY("P-521", "secp521r1", "EC", 24), /* Alias of above */
173
#endif /* OPENSSL_NO_EC */
174
#ifndef OPENSSL_NO_DH
175
    /* Security bit values for FFDHE groups are as per RFC 7919 */
176
    TLS_GROUP_ENTRY("ffdhe2048", "ffdhe2048", "DH", 33),
177
    TLS_GROUP_ENTRY("ffdhe3072", "ffdhe3072", "DH", 34),
178
#endif
179
#if !defined(OPENSSL_NO_ML_KEM)
180
    /* https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8 */
181
    TLS_GROUP_ENTRY("MLKEM512", "", "ML-KEM-512", 38),
182
    TLS_GROUP_ENTRY("MLKEM768", "", "ML-KEM-768", 39),
183
    TLS_GROUP_ENTRY("MLKEM1024", "", "ML-KEM-1024", 40),
184
#endif
185
#ifndef OPENSSL_NO_EC
186
#ifndef FIPS_MODULE
187
    TLS_GROUP_ENTRY("brainpoolP256r1", "brainpoolP256r1", "EC", 25),
188
    TLS_GROUP_ENTRY("brainpoolP384r1", "brainpoolP384r1", "EC", 26),
189
    TLS_GROUP_ENTRY("brainpoolP512r1", "brainpoolP512r1", "EC", 27),
190
    TLS_GROUP_ENTRY("brainpoolP256r1tls13", "brainpoolP256r1", "EC", 30),
191
    TLS_GROUP_ENTRY("brainpoolP384r1tls13", "brainpoolP384r1", "EC", 31),
192
    TLS_GROUP_ENTRY("brainpoolP512r1tls13", "brainpoolP512r1", "EC", 32),
193
#ifndef OPENSSL_NO_SM2
194
    TLS_GROUP_ENTRY("curveSM2", "SM2", "curveSM2", 44),
195
#if !defined(OPENSSL_NO_ML_KEM)
196
    TLS_GROUP_ENTRY("curveSM2MLKEM768", "", "curveSM2MLKEM768", 45),
197
#endif
198
#endif
199
#endif
200
#ifndef OPENSSL_NO_ML_KEM
201
    TLS_GROUP_ENTRY("SecP256r1MLKEM768", "", "SecP256r1MLKEM768", 42),
202
    TLS_GROUP_ENTRY("SecP384r1MLKEM1024", "", "SecP384r1MLKEM1024", 43),
203
#endif
204
#endif
205
#ifndef OPENSSL_NO_DH
206
    TLS_GROUP_ENTRY("ffdhe4096", "ffdhe4096", "DH", 35),
207
    TLS_GROUP_ENTRY("ffdhe6144", "ffdhe6144", "DH", 36),
208
    TLS_GROUP_ENTRY("ffdhe8192", "ffdhe8192", "DH", 37),
209
#endif
210
#ifndef OPENSSL_NO_TLS_DEPRECATED_EC
211
#ifndef OPENSSL_NO_EC2M
212
    TLS_GROUP_ENTRY("sect163k1", "sect163k1", "EC", 0),
213
    TLS_GROUP_ENTRY("K-163", "sect163k1", "EC", 0), /* Alias of above */
214
#endif
215
#ifndef FIPS_MODULE
216
    TLS_GROUP_ENTRY("sect163r1", "sect163r1", "EC", 1),
217
#endif
218
#ifndef OPENSSL_NO_EC2M
219
    TLS_GROUP_ENTRY("sect163r2", "sect163r2", "EC", 2),
220
    TLS_GROUP_ENTRY("B-163", "sect163r2", "EC", 2), /* Alias of above */
221
#endif
222
#ifndef FIPS_MODULE
223
    TLS_GROUP_ENTRY("sect193r1", "sect193r1", "EC", 3),
224
    TLS_GROUP_ENTRY("sect193r2", "sect193r2", "EC", 4),
225
#endif
226
#ifndef OPENSSL_NO_EC2M
227
    TLS_GROUP_ENTRY("sect233k1", "sect233k1", "EC", 5),
228
    TLS_GROUP_ENTRY("K-233", "sect233k1", "EC", 5), /* Alias of above */
229
    TLS_GROUP_ENTRY("sect233r1", "sect233r1", "EC", 6),
230
    TLS_GROUP_ENTRY("B-233", "sect233r1", "EC", 6), /* Alias of above */
231
#endif
232
#ifndef FIPS_MODULE
233
    TLS_GROUP_ENTRY("sect239k1", "sect239k1", "EC", 7),
234
#endif
235
#ifndef OPENSSL_NO_EC2M
236
    TLS_GROUP_ENTRY("sect283k1", "sect283k1", "EC", 8),
237
    TLS_GROUP_ENTRY("K-283", "sect283k1", "EC", 8), /* Alias of above */
238
    TLS_GROUP_ENTRY("sect283r1", "sect283r1", "EC", 9),
239
    TLS_GROUP_ENTRY("B-283", "sect283r1", "EC", 9), /* Alias of above */
240
    TLS_GROUP_ENTRY("sect409k1", "sect409k1", "EC", 10),
241
    TLS_GROUP_ENTRY("K-409", "sect409k1", "EC", 10), /* Alias of above */
242
    TLS_GROUP_ENTRY("sect409r1", "sect409r1", "EC", 11),
243
    TLS_GROUP_ENTRY("B-409", "sect409r1", "EC", 11), /* Alias of above */
244
    TLS_GROUP_ENTRY("sect571k1", "sect571k1", "EC", 12),
245
    TLS_GROUP_ENTRY("K-571", "sect571k1", "EC", 12), /* Alias of above */
246
    TLS_GROUP_ENTRY("sect571r1", "sect571r1", "EC", 13),
247
    TLS_GROUP_ENTRY("B-571", "sect571r1", "EC", 13), /* Alias of above */
248
#endif
249
#ifndef FIPS_MODULE
250
    TLS_GROUP_ENTRY("secp160k1", "secp160k1", "EC", 14),
251
    TLS_GROUP_ENTRY("secp160r1", "secp160r1", "EC", 15),
252
    TLS_GROUP_ENTRY("secp160r2", "secp160r2", "EC", 16),
253
    TLS_GROUP_ENTRY("secp192k1", "secp192k1", "EC", 17),
254
#endif
255
    TLS_GROUP_ENTRY("secp192r1", "prime192v1", "EC", 18),
256
    TLS_GROUP_ENTRY("P-192", "prime192v1", "EC", 18), /* Alias of above */
257
#ifndef FIPS_MODULE
258
    TLS_GROUP_ENTRY("secp224k1", "secp224k1", "EC", 19),
259
#endif
260
    TLS_GROUP_ENTRY("secp224r1", "secp224r1", "EC", 20),
261
    TLS_GROUP_ENTRY("P-224", "secp224r1", "EC", 20), /* Alias of above */
262
#ifndef FIPS_MODULE
263
    TLS_GROUP_ENTRY("secp256k1", "secp256k1", "EC", 21),
264
#endif
265
#endif /* !defined(OPENSSL_NO_TLS_DEPRECATED_EC) */
266
};
267
#endif /* !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_ML_KEM) */
268
269
static int tls_group_capability(OSSL_CALLBACK *cb, void *arg)
270
0
{
271
0
#if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_ML_KEM)
272
0
    size_t i;
273
274
0
    for (i = 0; i < OSSL_NELEM(param_group_list); i++)
275
0
        if (!cb(param_group_list[i], arg))
276
0
            return 0;
277
0
#endif
278
279
0
    return 1;
280
0
}
281
282
/* --------------------------------------------------------------- */
283
284
#if !defined(OPENSSL_NO_ML_DSA) \
285
    || (!defined(FIPS_MODULE) && !defined(OPENSSL_NO_SM2) && !defined(OPENSSL_NO_SM3))
286
287
typedef struct tls_sigalg_constants_st {
288
    unsigned int code_point;
289
    unsigned int sec_bits; /* Bits of security */
290
    int min_tls; /* Minimum TLS version, -1 unsupported */
291
    int max_tls; /* Maximum TLS version (or 0 for undefined) */
292
    int min_dtls; /* Minimum DTLS version, -1 unsupported */
293
    int max_dtls; /* Maximum DTLS version (or 0 for undefined) */
294
} TLS_SIGALG_CONSTANTS;
295
296
static const TLS_SIGALG_CONSTANTS sigalg_constants_list[] = {
297
    { TLSEXT_SIGALG_mldsa44, 128, TLS1_3_VERSION, 0, -1, -1 },
298
    { TLSEXT_SIGALG_mldsa65, 192, TLS1_3_VERSION, 0, -1, -1 },
299
    { TLSEXT_SIGALG_mldsa87, 256, TLS1_3_VERSION, 0, -1, -1 },
300
    { TLSEXT_SIGALG_sm2sig_sm3, 128, TLS1_3_VERSION, 0, -1, -1 },
301
};
302
303
#define TLS_SIGALG_ENTRY(tlsname, algorithm, oid, idx)               \
304
    {                                                                \
305
        OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_SIGALG_IANA_NAME, \
306
            tlsname, sizeof(tlsname)),                               \
307
        OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_SIGALG_NAME,      \
308
            algorithm, sizeof(algorithm)),                           \
309
        OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_SIGALG_OID,       \
310
            oid, sizeof(oid)),                                       \
311
        OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_SIGALG_CODE_POINT,       \
312
            (unsigned int *)&sigalg_constants_list[idx].code_point), \
313
        OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_SIGALG_SECURITY_BITS,    \
314
            (unsigned int *)&sigalg_constants_list[idx].sec_bits),   \
315
        OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MIN_TLS,           \
316
            (unsigned int *)&sigalg_constants_list[idx].min_tls),    \
317
        OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MAX_TLS,           \
318
            (unsigned int *)&sigalg_constants_list[idx].max_tls),    \
319
        OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MIN_DTLS,          \
320
            (unsigned int *)&sigalg_constants_list[idx].min_dtls),   \
321
        OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MAX_DTLS,          \
322
            (unsigned int *)&sigalg_constants_list[idx].max_dtls),   \
323
        OSSL_PARAM_END                                               \
324
    }
325
326
static const OSSL_PARAM param_sigalg_list[][10] = {
327
#ifndef OPENSSL_NO_ML_DSA
328
    TLS_SIGALG_ENTRY("mldsa44", "ML-DSA-44", "2.16.840.1.101.3.4.3.17", 0),
329
    TLS_SIGALG_ENTRY("mldsa65", "ML-DSA-65", "2.16.840.1.101.3.4.3.18", 1),
330
    TLS_SIGALG_ENTRY("mldsa87", "ML-DSA-87", "2.16.840.1.101.3.4.3.19", 2),
331
#endif
332
#if !defined(FIPS_MODULE) && !defined(OPENSSL_NO_SM2) && !defined(OPENSSL_NO_SM3)
333
    TLS_SIGALG_ENTRY("sm2sig_sm3", "SM2", "1.2.156.10197.1 501", 3),
334
#endif
335
};
336
#endif
337
338
static int tls_sigalg_capability(OSSL_CALLBACK *cb, void *arg)
339
0
{
340
0
#if defined(TLS_SIGALG_ENTRY)
341
0
    size_t i;
342
343
0
    for (i = 0; i < OSSL_NELEM(param_sigalg_list); i++)
344
0
        if (!cb(param_sigalg_list[i], arg))
345
0
            return 0;
346
0
#endif
347
0
    return 1;
348
0
}
349
350
int ossl_prov_get_capabilities(void *provctx, const char *capability,
351
    OSSL_CALLBACK *cb, void *arg)
352
0
{
353
0
    if (OPENSSL_strcasecmp(capability, "TLS-GROUP") == 0)
354
0
        return tls_group_capability(cb, arg);
355
0
    if (OPENSSL_strcasecmp(capability, "TLS-SIGALG") == 0)
356
0
        return tls_sigalg_capability(cb, arg);
357
358
    /* We don't support this capability */
359
0
    return 0;
360
0
}