/src/openssl/providers/common/capabilities.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright 2019-2025 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the "License"). You may not use |
5 | | * this file except in compliance with the License. You can obtain a copy |
6 | | * in the file LICENSE in the source distribution or at |
7 | | * https://www.openssl.org/source/license.html |
8 | | */ |
9 | | |
10 | | #include <assert.h> |
11 | | #include <string.h> |
12 | | #include <openssl/core_dispatch.h> |
13 | | #include <openssl/core_names.h> |
14 | | /* For TLS1_VERSION etc */ |
15 | | #include <openssl/prov_ssl.h> |
16 | | #include <openssl/params.h> |
17 | | #include "internal/nelem.h" |
18 | | #include "internal/tlsgroups.h" |
19 | | #include "prov/providercommon.h" |
20 | | #include "internal/e_os.h" |
21 | | #include "crypto/ml_kem.h" |
22 | | |
23 | | /* |
24 | | * If none of EC, DH OR ML-KEM are available then we have no TLS-GROUP |
25 | | * capabilities. |
26 | | */ |
27 | | #if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) || \ |
28 | | !defined(OPENSSL_NO_ML_KEM) |
29 | | typedef struct tls_group_constants_st { |
30 | | unsigned int group_id; /* Group ID */ |
31 | | unsigned int secbits; /* Bits of security */ |
32 | | int mintls; /* Minimum TLS version, -1 unsupported */ |
33 | | int maxtls; /* Maximum TLS version (or 0 for undefined) */ |
34 | | int mindtls; /* Minimum DTLS version, -1 unsupported */ |
35 | | int maxdtls; /* Maximum DTLS version (or 0 for undefined) */ |
36 | | int is_kem; /* Indicates utility as KEM */ |
37 | | } TLS_GROUP_CONSTANTS; |
38 | | |
39 | | /* |
40 | | * The indices of entries in this table must be independent of which TLS groups |
41 | | * we do or not support. It just lists basic facts about the groups, and is |
42 | | * used by (numeric slot number) reference in the "param_group_list" below. |
43 | | * Therefore, there must be no #ifdefs in this table, the index of each entry |
44 | | * must be independent of compile-time options. |
45 | | * |
46 | | * For the FFDHE groups, the security bit values are as given by |
47 | | * BN_security_bits(). For the ML-KEM hybrids these are the ML-KEM security |
48 | | * bits. |
49 | | */ |
50 | | static const TLS_GROUP_CONSTANTS group_list[] = { |
51 | | /* 0 */ { OSSL_TLS_GROUP_ID_sect163k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
52 | | /* 1 */ { OSSL_TLS_GROUP_ID_sect163r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
53 | | /* 2 */ { OSSL_TLS_GROUP_ID_sect163r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
54 | | /* 3 */ { OSSL_TLS_GROUP_ID_sect193r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
55 | | /* 4 */ { OSSL_TLS_GROUP_ID_sect193r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
56 | | /* 5 */ { OSSL_TLS_GROUP_ID_sect233k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
57 | | /* 6 */ { OSSL_TLS_GROUP_ID_sect233r1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
58 | | /* 7 */ { OSSL_TLS_GROUP_ID_sect239k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
59 | | /* 8 */ { OSSL_TLS_GROUP_ID_sect283k1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
60 | | /* 9 */ { OSSL_TLS_GROUP_ID_sect283r1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
61 | | /* 10 */ { OSSL_TLS_GROUP_ID_sect409k1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
62 | | /* 11 */ { OSSL_TLS_GROUP_ID_sect409r1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
63 | | /* 12 */ { OSSL_TLS_GROUP_ID_sect571k1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
64 | | /* 13 */ { OSSL_TLS_GROUP_ID_sect571r1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
65 | | /* 14 */ { OSSL_TLS_GROUP_ID_secp160k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
66 | | /* 15 */ { OSSL_TLS_GROUP_ID_secp160r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
67 | | /* 16 */ { OSSL_TLS_GROUP_ID_secp160r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
68 | | /* 17 */ { OSSL_TLS_GROUP_ID_secp192k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
69 | | /* 18 */ { OSSL_TLS_GROUP_ID_secp192r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
70 | | /* 19 */ { OSSL_TLS_GROUP_ID_secp224k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
71 | | /* 20 */ { OSSL_TLS_GROUP_ID_secp224r1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
72 | | /* 21 */ { OSSL_TLS_GROUP_ID_secp256k1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
73 | | /* 22 */ { OSSL_TLS_GROUP_ID_secp256r1, 128, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 }, |
74 | | /* 23 */ { OSSL_TLS_GROUP_ID_secp384r1, 192, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 }, |
75 | | /* 24 */ { OSSL_TLS_GROUP_ID_secp521r1, 256, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 }, |
76 | | /* 25 */ { OSSL_TLS_GROUP_ID_brainpoolP256r1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
77 | | /* 26 */ { OSSL_TLS_GROUP_ID_brainpoolP384r1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
78 | | /* 27 */ { OSSL_TLS_GROUP_ID_brainpoolP512r1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, |
79 | | /* 28 */ { OSSL_TLS_GROUP_ID_x25519, 128, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 }, |
80 | | /* 29 */ { OSSL_TLS_GROUP_ID_x448, 224, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 }, |
81 | | /* 30 */ { OSSL_TLS_GROUP_ID_brainpoolP256r1_tls13, 128, TLS1_3_VERSION, 0, -1, -1, 0 }, |
82 | | /* 31 */ { OSSL_TLS_GROUP_ID_brainpoolP384r1_tls13, 192, TLS1_3_VERSION, 0, -1, -1, 0 }, |
83 | | /* 32 */ { OSSL_TLS_GROUP_ID_brainpoolP512r1_tls13, 256, TLS1_3_VERSION, 0, -1, -1, 0 }, |
84 | | /* 33 */ { OSSL_TLS_GROUP_ID_ffdhe2048, 112, TLS1_3_VERSION, 0, -1, -1, 0 }, |
85 | | /* 34 */ { OSSL_TLS_GROUP_ID_ffdhe3072, 128, TLS1_3_VERSION, 0, -1, -1, 0 }, |
86 | | /* 35 */ { OSSL_TLS_GROUP_ID_ffdhe4096, 128, TLS1_3_VERSION, 0, -1, -1, 0 }, |
87 | | /* 36 */ { OSSL_TLS_GROUP_ID_ffdhe6144, 128, TLS1_3_VERSION, 0, -1, -1, 0 }, |
88 | | /* 37 */ { OSSL_TLS_GROUP_ID_ffdhe8192, 192, TLS1_3_VERSION, 0, -1, -1, 0 }, |
89 | | /* 38 */ { OSSL_TLS_GROUP_ID_mlkem512, ML_KEM_512_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 }, |
90 | | /* 39 */ { OSSL_TLS_GROUP_ID_mlkem768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 }, |
91 | | /* 40 */ { OSSL_TLS_GROUP_ID_mlkem1024, ML_KEM_1024_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 }, |
92 | | /* 41 */ { OSSL_TLS_GROUP_ID_X25519MLKEM768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 }, |
93 | | /* 42 */ { OSSL_TLS_GROUP_ID_SecP256r1MLKEM768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 }, |
94 | | /* 43 */ { OSSL_TLS_GROUP_ID_SecP384r1MLKEM1024, ML_KEM_1024_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 }, |
95 | | }; |
96 | | |
97 | | #define TLS_GROUP_ENTRY(tlsname, realname, algorithm, idx) \ |
98 | | { \ |
99 | | OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_NAME, \ |
100 | | tlsname, \ |
101 | | sizeof(tlsname)), \ |
102 | | OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_NAME_INTERNAL, \ |
103 | | realname, \ |
104 | | sizeof(realname)), \ |
105 | | OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_ALG, \ |
106 | | algorithm, \ |
107 | | sizeof(algorithm)), \ |
108 | | OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_GROUP_ID, \ |
109 | | (unsigned int *)&group_list[idx].group_id), \ |
110 | | OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_GROUP_SECURITY_BITS, \ |
111 | | (unsigned int *)&group_list[idx].secbits), \ |
112 | | OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MIN_TLS, \ |
113 | | (unsigned int *)&group_list[idx].mintls), \ |
114 | | OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MAX_TLS, \ |
115 | | (unsigned int *)&group_list[idx].maxtls), \ |
116 | | OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MIN_DTLS, \ |
117 | | (unsigned int *)&group_list[idx].mindtls), \ |
118 | | OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MAX_DTLS, \ |
119 | | (unsigned int *)&group_list[idx].maxdtls), \ |
120 | | OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_IS_KEM, \ |
121 | | (unsigned int *)&group_list[idx].is_kem), \ |
122 | | OSSL_PARAM_END \ |
123 | | } |
124 | | |
125 | | /*- |
126 | | * - The 4th field of each entry is an index into "group_list" above. |
127 | | * |
128 | | * - The 3rd field is the key management algorithm name. |
129 | | |
130 | | * - The 2nd field is the GROUP_NAME used with the provider, needed for |
131 | | * providers that implement a family of related algorithms, but required |
132 | | * non-null even when the provider implements just one. |
133 | | * |
134 | | * - The 1st field is the TLS group name used in SSL_CTX_set_group_list(), |
135 | | * aliases repeat everything but the first field. |
136 | | * |
137 | | * Curves 1..22 were deprecated in: |
138 | | * |
139 | | * https://www.rfc-editor.org/rfc/rfc8422.html |
140 | | * |
141 | | * leaving just: |
142 | | * |
143 | | * enum { |
144 | | * deprecated(1..22), |
145 | | * secp256r1 (23), secp384r1 (24), secp521r1 (25), |
146 | | * x25519(29), x448(30), |
147 | | * reserved (0xFE00..0xFEFF), |
148 | | * deprecated(0xFF01..0xFF02), |
149 | | * (0xFFFF) |
150 | | * } NamedCurve; |
151 | | * |
152 | | * and those added later (FFDHE, brainpool, ML-KEM) |
153 | | */ |
154 | | static const OSSL_PARAM param_group_list[][11] = { |
155 | | # ifndef OPENSSL_NO_EC |
156 | | # if !defined(OPENSSL_NO_ML_KEM) |
157 | | # if !defined(OPENSSL_NO_ECX) |
158 | | TLS_GROUP_ENTRY("X25519MLKEM768", "", "X25519MLKEM768", 41), |
159 | | # endif |
160 | | # endif |
161 | | # ifndef FIPS_MODULE |
162 | | TLS_GROUP_ENTRY("x25519", "X25519", "X25519", 28), |
163 | | TLS_GROUP_ENTRY("x448", "X448", "X448", 29), |
164 | | # endif |
165 | | TLS_GROUP_ENTRY("secp256r1", "prime256v1", "EC", 22), |
166 | | TLS_GROUP_ENTRY("P-256", "prime256v1", "EC", 22), /* Alias of above */ |
167 | | TLS_GROUP_ENTRY("secp384r1", "secp384r1", "EC", 23), |
168 | | TLS_GROUP_ENTRY("P-384", "secp384r1", "EC", 23), /* Alias of above */ |
169 | | TLS_GROUP_ENTRY("secp521r1", "secp521r1", "EC", 24), |
170 | | TLS_GROUP_ENTRY("P-521", "secp521r1", "EC", 24), /* Alias of above */ |
171 | | # endif /* OPENSSL_NO_EC */ |
172 | | # ifndef OPENSSL_NO_DH |
173 | | /* Security bit values for FFDHE groups are as per RFC 7919 */ |
174 | | TLS_GROUP_ENTRY("ffdhe2048", "ffdhe2048", "DH", 33), |
175 | | TLS_GROUP_ENTRY("ffdhe3072", "ffdhe3072", "DH", 34), |
176 | | # endif |
177 | | # if !defined(OPENSSL_NO_ML_KEM) |
178 | | /* https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8 */ |
179 | | TLS_GROUP_ENTRY("MLKEM512", "", "ML-KEM-512", 38), |
180 | | TLS_GROUP_ENTRY("MLKEM768", "", "ML-KEM-768", 39), |
181 | | TLS_GROUP_ENTRY("MLKEM1024", "", "ML-KEM-1024", 40), |
182 | | # endif |
183 | | # ifndef OPENSSL_NO_EC |
184 | | # ifndef FIPS_MODULE |
185 | | TLS_GROUP_ENTRY("brainpoolP256r1", "brainpoolP256r1", "EC", 25), |
186 | | TLS_GROUP_ENTRY("brainpoolP384r1", "brainpoolP384r1", "EC", 26), |
187 | | TLS_GROUP_ENTRY("brainpoolP512r1", "brainpoolP512r1", "EC", 27), |
188 | | TLS_GROUP_ENTRY("brainpoolP256r1tls13", "brainpoolP256r1", "EC", 30), |
189 | | TLS_GROUP_ENTRY("brainpoolP384r1tls13", "brainpoolP384r1", "EC", 31), |
190 | | TLS_GROUP_ENTRY("brainpoolP512r1tls13", "brainpoolP512r1", "EC", 32), |
191 | | # endif |
192 | | # ifndef OPENSSL_NO_ML_KEM |
193 | | TLS_GROUP_ENTRY("SecP256r1MLKEM768", "", "SecP256r1MLKEM768", 42), |
194 | | TLS_GROUP_ENTRY("SecP384r1MLKEM1024", "", "SecP384r1MLKEM1024", 43), |
195 | | # endif |
196 | | # endif |
197 | | # ifndef OPENSSL_NO_DH |
198 | | TLS_GROUP_ENTRY("ffdhe4096", "ffdhe4096", "DH", 35), |
199 | | TLS_GROUP_ENTRY("ffdhe6144", "ffdhe6144", "DH", 36), |
200 | | TLS_GROUP_ENTRY("ffdhe8192", "ffdhe8192", "DH", 37), |
201 | | # endif |
202 | | # ifndef OPENSSL_NO_TLS_DEPRECATED_EC |
203 | | # ifndef OPENSSL_NO_EC2M |
204 | | TLS_GROUP_ENTRY("sect163k1", "sect163k1", "EC", 0), |
205 | | TLS_GROUP_ENTRY("K-163", "sect163k1", "EC", 0), /* Alias of above */ |
206 | | # endif |
207 | | # ifndef FIPS_MODULE |
208 | | TLS_GROUP_ENTRY("sect163r1", "sect163r1", "EC", 1), |
209 | | # endif |
210 | | # ifndef OPENSSL_NO_EC2M |
211 | | TLS_GROUP_ENTRY("sect163r2", "sect163r2", "EC", 2), |
212 | | TLS_GROUP_ENTRY("B-163", "sect163r2", "EC", 2), /* Alias of above */ |
213 | | # endif |
214 | | # ifndef FIPS_MODULE |
215 | | TLS_GROUP_ENTRY("sect193r1", "sect193r1", "EC", 3), |
216 | | TLS_GROUP_ENTRY("sect193r2", "sect193r2", "EC", 4), |
217 | | # endif |
218 | | # ifndef OPENSSL_NO_EC2M |
219 | | TLS_GROUP_ENTRY("sect233k1", "sect233k1", "EC", 5), |
220 | | TLS_GROUP_ENTRY("K-233", "sect233k1", "EC", 5), /* Alias of above */ |
221 | | TLS_GROUP_ENTRY("sect233r1", "sect233r1", "EC", 6), |
222 | | TLS_GROUP_ENTRY("B-233", "sect233r1", "EC", 6), /* Alias of above */ |
223 | | # endif |
224 | | # ifndef FIPS_MODULE |
225 | | TLS_GROUP_ENTRY("sect239k1", "sect239k1", "EC", 7), |
226 | | # endif |
227 | | # ifndef OPENSSL_NO_EC2M |
228 | | TLS_GROUP_ENTRY("sect283k1", "sect283k1", "EC", 8), |
229 | | TLS_GROUP_ENTRY("K-283", "sect283k1", "EC", 8), /* Alias of above */ |
230 | | TLS_GROUP_ENTRY("sect283r1", "sect283r1", "EC", 9), |
231 | | TLS_GROUP_ENTRY("B-283", "sect283r1", "EC", 9), /* Alias of above */ |
232 | | TLS_GROUP_ENTRY("sect409k1", "sect409k1", "EC", 10), |
233 | | TLS_GROUP_ENTRY("K-409", "sect409k1", "EC", 10), /* Alias of above */ |
234 | | TLS_GROUP_ENTRY("sect409r1", "sect409r1", "EC", 11), |
235 | | TLS_GROUP_ENTRY("B-409", "sect409r1", "EC", 11), /* Alias of above */ |
236 | | TLS_GROUP_ENTRY("sect571k1", "sect571k1", "EC", 12), |
237 | | TLS_GROUP_ENTRY("K-571", "sect571k1", "EC", 12), /* Alias of above */ |
238 | | TLS_GROUP_ENTRY("sect571r1", "sect571r1", "EC", 13), |
239 | | TLS_GROUP_ENTRY("B-571", "sect571r1", "EC", 13), /* Alias of above */ |
240 | | # endif |
241 | | # ifndef FIPS_MODULE |
242 | | TLS_GROUP_ENTRY("secp160k1", "secp160k1", "EC", 14), |
243 | | TLS_GROUP_ENTRY("secp160r1", "secp160r1", "EC", 15), |
244 | | TLS_GROUP_ENTRY("secp160r2", "secp160r2", "EC", 16), |
245 | | TLS_GROUP_ENTRY("secp192k1", "secp192k1", "EC", 17), |
246 | | # endif |
247 | | TLS_GROUP_ENTRY("secp192r1", "prime192v1", "EC", 18), |
248 | | TLS_GROUP_ENTRY("P-192", "prime192v1", "EC", 18), /* Alias of above */ |
249 | | # ifndef FIPS_MODULE |
250 | | TLS_GROUP_ENTRY("secp224k1", "secp224k1", "EC", 19), |
251 | | # endif |
252 | | TLS_GROUP_ENTRY("secp224r1", "secp224r1", "EC", 20), |
253 | | TLS_GROUP_ENTRY("P-224", "secp224r1", "EC", 20), /* Alias of above */ |
254 | | # ifndef FIPS_MODULE |
255 | | TLS_GROUP_ENTRY("secp256k1", "secp256k1", "EC", 21), |
256 | | # endif |
257 | | # endif /* !defined(OPENSSL_NO_TLS_DEPRECATED_EC) */ |
258 | | }; |
259 | | #endif /* !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_ML_KEM) */ |
260 | | |
261 | | static int tls_group_capability(OSSL_CALLBACK *cb, void *arg) |
262 | 0 | { |
263 | 0 | #if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_ML_KEM) |
264 | 0 | size_t i; |
265 | |
|
266 | 0 | for (i = 0; i < OSSL_NELEM(param_group_list); i++) |
267 | 0 | if (!cb(param_group_list[i], arg)) |
268 | 0 | return 0; |
269 | 0 | #endif |
270 | | |
271 | 0 | return 1; |
272 | 0 | } |
273 | | |
274 | | /* --------------------------------------------------------------- */ |
275 | | |
276 | | #if !defined(OPENSSL_NO_ML_DSA) |
277 | | |
278 | | typedef struct tls_sigalg_constants_st { |
279 | | unsigned int code_point; |
280 | | unsigned int sec_bits; /* Bits of security */ |
281 | | int min_tls; /* Minimum TLS version, -1 unsupported */ |
282 | | int max_tls; /* Maximum TLS version (or 0 for undefined) */ |
283 | | int min_dtls; /* Minimum DTLS version, -1 unsupported */ |
284 | | int max_dtls; /* Maximum DTLS version (or 0 for undefined) */ |
285 | | } TLS_SIGALG_CONSTANTS; |
286 | | |
287 | | static const TLS_SIGALG_CONSTANTS sigalg_constants_list[3] = { |
288 | | { 0x0904, 128, TLS1_3_VERSION, 0, -1, -1 }, |
289 | | { 0x0905, 192, TLS1_3_VERSION, 0, -1, -1 }, |
290 | | { 0x0906, 256, TLS1_3_VERSION, 0, -1, -1 }, |
291 | | }; |
292 | | |
293 | | # define TLS_SIGALG_ENTRY(tlsname, algorithm, oid, idx) \ |
294 | | { \ |
295 | | OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_SIGALG_IANA_NAME, \ |
296 | | tlsname, sizeof(tlsname)), \ |
297 | | OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_SIGALG_NAME, \ |
298 | | algorithm, sizeof(algorithm)), \ |
299 | | OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_SIGALG_OID, \ |
300 | | oid, sizeof(oid)), \ |
301 | | OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_SIGALG_CODE_POINT, \ |
302 | | (unsigned int *)&sigalg_constants_list[idx].code_point),\ |
303 | | OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_SIGALG_SECURITY_BITS, \ |
304 | | (unsigned int *)&sigalg_constants_list[idx].sec_bits), \ |
305 | | OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MIN_TLS, \ |
306 | | (unsigned int *)&sigalg_constants_list[idx].min_tls), \ |
307 | | OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MAX_TLS, \ |
308 | | (unsigned int *)&sigalg_constants_list[idx].max_tls), \ |
309 | | OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MIN_DTLS, \ |
310 | | (unsigned int *)&sigalg_constants_list[idx].min_dtls), \ |
311 | | OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MAX_DTLS, \ |
312 | | (unsigned int *)&sigalg_constants_list[idx].max_dtls), \ |
313 | | OSSL_PARAM_END \ |
314 | | } |
315 | | |
316 | | static const OSSL_PARAM param_sigalg_list[][10] = { |
317 | | TLS_SIGALG_ENTRY("mldsa44", "ML-DSA-44", "2.16.840.1.101.3.4.3.17", 0), |
318 | | TLS_SIGALG_ENTRY("mldsa65", "ML-DSA-65", "2.16.840.1.101.3.4.3.18", 1), |
319 | | TLS_SIGALG_ENTRY("mldsa87", "ML-DSA-87", "2.16.840.1.101.3.4.3.19", 2), |
320 | | }; |
321 | | #endif /* OPENSSL_NO_ML_DSA */ |
322 | | |
323 | | static int tls_sigalg_capability(OSSL_CALLBACK *cb, void *arg) |
324 | 0 | { |
325 | 0 | #if !defined(OPENSSL_NO_ML_DSA) |
326 | 0 | size_t i; |
327 | |
|
328 | 0 | for (i = 0; i < OSSL_NELEM(param_sigalg_list); i++) |
329 | 0 | if (!cb(param_sigalg_list[i], arg)) |
330 | 0 | return 0; |
331 | 0 | #endif |
332 | 0 | return 1; |
333 | 0 | } |
334 | | |
335 | | int ossl_prov_get_capabilities(void *provctx, const char *capability, |
336 | | OSSL_CALLBACK *cb, void *arg) |
337 | 0 | { |
338 | 0 | if (OPENSSL_strcasecmp(capability, "TLS-GROUP") == 0) |
339 | 0 | return tls_group_capability(cb, arg); |
340 | 0 | if (OPENSSL_strcasecmp(capability, "TLS-SIGALG") == 0) |
341 | 0 | return tls_sigalg_capability(cb, arg); |
342 | | |
343 | | /* We don't support this capability */ |
344 | 0 | return 0; |
345 | 0 | } |