mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2026-03-20 11:11:08 +01:00
Remove support for static ECDH cipher suites
Signed-off-by: Ben Taylor <ben.taylor@linaro.org>
This commit is contained in:
@@ -118,8 +118,6 @@ Support description
|
|||||||
| MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED | n/a |
|
| MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED | n/a |
|
||||||
| MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED | n/a |
|
| MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED | n/a |
|
||||||
| MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED | n/a |
|
| MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED | n/a |
|
||||||
| MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED | n/a |
|
|
||||||
| MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED | n/a |
|
|
||||||
| MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED | n/a |
|
| MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED | n/a |
|
||||||
| | |
|
| | |
|
||||||
| MBEDTLS_PSA_CRYPTO_C | no (1) |
|
| MBEDTLS_PSA_CRYPTO_C | no (1) |
|
||||||
|
|||||||
@@ -392,8 +392,6 @@ PSA_WANT_\* macros as in current `crypto_config.h`.
|
|||||||
#define MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
||||||
#define MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
|
||||||
#define MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
||||||
#define MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
|
|
||||||
#define MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
|
|
||||||
//#define MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
|
//#define MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
|
||||||
#define MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
|
||||||
#define MBEDTLS_KEY_EXCHANGE_RSA_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_RSA_ENABLED
|
||||||
|
|||||||
@@ -273,54 +273,6 @@
|
|||||||
*/
|
*/
|
||||||
#define MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
||||||
|
|
||||||
/**
|
|
||||||
* \def MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
|
|
||||||
*
|
|
||||||
* Enable the ECDH-ECDSA based ciphersuite modes in SSL / TLS.
|
|
||||||
*
|
|
||||||
* Requires: MBEDTLS_ECDH_C or PSA_WANT_ALG_ECDH
|
|
||||||
* MBEDTLS_ECDSA_C or PSA_WANT_ALG_ECDSA
|
|
||||||
* MBEDTLS_X509_CRT_PARSE_C
|
|
||||||
*
|
|
||||||
* This enables the following ciphersuites (if other requisites are
|
|
||||||
* enabled as well):
|
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
|
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
|
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
|
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
|
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
|
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
|
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256
|
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384
|
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256
|
|
||||||
* MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384
|
|
||||||
*/
|
|
||||||
#define MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
|
|
||||||
|
|
||||||
/**
|
|
||||||
* \def MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
|
|
||||||
*
|
|
||||||
* Enable the ECDH-RSA based ciphersuite modes in SSL / TLS.
|
|
||||||
*
|
|
||||||
* Requires: MBEDTLS_ECDH_C or PSA_WANT_ALG_ECDH
|
|
||||||
* MBEDTLS_RSA_C
|
|
||||||
* MBEDTLS_X509_CRT_PARSE_C
|
|
||||||
*
|
|
||||||
* This enables the following ciphersuites (if other requisites are
|
|
||||||
* enabled as well):
|
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
|
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
|
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
|
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
|
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
|
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
|
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256
|
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384
|
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256
|
|
||||||
* MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384
|
|
||||||
*/
|
|
||||||
#define MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* \def MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
|
* \def MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
|
||||||
*
|
*
|
||||||
|
|||||||
@@ -64,8 +64,6 @@
|
|||||||
#undef MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
#undef MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
||||||
#undef MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
|
#undef MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
|
||||||
#undef MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
|
#undef MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
|
||||||
#undef MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
|
|
||||||
#undef MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
|
|
||||||
#undef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
|
#undef MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|||||||
@@ -659,9 +659,7 @@
|
|||||||
union mbedtls_ssl_premaster_secret {
|
union mbedtls_ssl_premaster_secret {
|
||||||
unsigned char dummy; /* Make the union non-empty even with SSL disabled */
|
unsigned char dummy; /* Make the union non-empty even with SSL disabled */
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
|
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
|
|
||||||
unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]; /* RFC 4492 5.10 */
|
unsigned char _pms_ecdh[MBEDTLS_ECP_MAX_BYTES]; /* RFC 4492 5.10 */
|
||||||
#endif
|
#endif
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
|
||||||
|
|||||||
@@ -163,16 +163,12 @@ typedef enum {
|
|||||||
MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA,
|
MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA,
|
||||||
MBEDTLS_KEY_EXCHANGE_PSK,
|
MBEDTLS_KEY_EXCHANGE_PSK,
|
||||||
MBEDTLS_KEY_EXCHANGE_ECDHE_PSK,
|
MBEDTLS_KEY_EXCHANGE_ECDHE_PSK,
|
||||||
MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
|
|
||||||
MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
|
|
||||||
MBEDTLS_KEY_EXCHANGE_ECJPAKE,
|
MBEDTLS_KEY_EXCHANGE_ECJPAKE,
|
||||||
} mbedtls_key_exchange_type_t;
|
} mbedtls_key_exchange_type_t;
|
||||||
|
|
||||||
/* Key exchanges using a certificate */
|
/* Key exchanges using a certificate */
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
|
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
|
|
||||||
#define MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_WITH_CERT_ENABLED
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@@ -220,12 +216,6 @@ typedef enum {
|
|||||||
#define MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED
|
#define MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
/* Key exchanges using ECDH */
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
|
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
|
|
||||||
#define MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/* Key exchanges that don't involve ephemeral keys */
|
/* Key exchanges that don't involve ephemeral keys */
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) || \
|
#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) || \
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED)
|
defined(MBEDTLS_KEY_EXCHANGE_SOME_ECDH_ENABLED)
|
||||||
|
|||||||
@@ -55,19 +55,6 @@
|
|||||||
#endif /* not all curves accelerated */
|
#endif /* not all curves accelerated */
|
||||||
#endif /* some curve accelerated */
|
#endif /* some curve accelerated */
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED) && \
|
|
||||||
( !defined(MBEDTLS_CAN_ECDH) || \
|
|
||||||
!defined(PSA_HAVE_ALG_ECDSA_SIGN) || \
|
|
||||||
!defined(MBEDTLS_X509_CRT_PARSE_C) )
|
|
||||||
#error "MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED defined, but not all prerequisites"
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) && \
|
|
||||||
( !defined(MBEDTLS_CAN_ECDH) || !defined(PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_BASIC) || \
|
|
||||||
!defined(MBEDTLS_X509_CRT_PARSE_C) )
|
|
||||||
#error "MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED defined, but not all prerequisites"
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) && \
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) && \
|
||||||
!defined(MBEDTLS_CAN_ECDH)
|
!defined(MBEDTLS_CAN_ECDH)
|
||||||
#error "MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED defined, but not all prerequisites"
|
#error "MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED defined, but not all prerequisites"
|
||||||
@@ -150,8 +137,6 @@
|
|||||||
#if defined(MBEDTLS_SSL_PROTO_TLS1_2) && \
|
#if defined(MBEDTLS_SSL_PROTO_TLS1_2) && \
|
||||||
!(defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
!(defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
|
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED) || \
|
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) || \
|
defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED) || \
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) || \
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED) || \
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) )
|
defined(MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED) )
|
||||||
|
|||||||
@@ -467,186 +467,6 @@ static const mbedtls_ssl_ciphersuite_t ciphersuite_definitions[] =
|
|||||||
#endif /* MBEDTLS_CIPHER_NULL_CIPHER */
|
#endif /* MBEDTLS_CIPHER_NULL_CIPHER */
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED */
|
#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED */
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED)
|
|
||||||
#if defined(PSA_WANT_KEY_TYPE_AES)
|
|
||||||
#if defined(PSA_WANT_ALG_SHA_1)
|
|
||||||
#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
|
|
||||||
{ MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, "TLS-ECDH-RSA-WITH-AES-128-CBC-SHA",
|
|
||||||
MBEDTLS_CIPHER_AES_128_CBC, MBEDTLS_MD_SHA1, MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
{ MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, "TLS-ECDH-RSA-WITH-AES-256-CBC-SHA",
|
|
||||||
MBEDTLS_CIPHER_AES_256_CBC, MBEDTLS_MD_SHA1, MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
|
|
||||||
#endif /* PSA_WANT_ALG_SHA_1 */
|
|
||||||
#if defined(PSA_WANT_ALG_SHA_256)
|
|
||||||
#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
|
|
||||||
{ MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, "TLS-ECDH-RSA-WITH-AES-128-CBC-SHA256",
|
|
||||||
MBEDTLS_CIPHER_AES_128_CBC, MBEDTLS_MD_SHA256, MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
|
|
||||||
#if defined(PSA_WANT_ALG_GCM)
|
|
||||||
{ MBEDTLS_TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, "TLS-ECDH-RSA-WITH-AES-128-GCM-SHA256",
|
|
||||||
MBEDTLS_CIPHER_AES_128_GCM, MBEDTLS_MD_SHA256, MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_GCM */
|
|
||||||
#endif /* PSA_WANT_ALG_SHA_256 */
|
|
||||||
#if defined(PSA_WANT_ALG_SHA_384)
|
|
||||||
#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
|
|
||||||
{ MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, "TLS-ECDH-RSA-WITH-AES-256-CBC-SHA384",
|
|
||||||
MBEDTLS_CIPHER_AES_256_CBC, MBEDTLS_MD_SHA384, MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
|
|
||||||
#if defined(PSA_WANT_ALG_GCM)
|
|
||||||
{ MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, "TLS-ECDH-RSA-WITH-AES-256-GCM-SHA384",
|
|
||||||
MBEDTLS_CIPHER_AES_256_GCM, MBEDTLS_MD_SHA384, MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_GCM */
|
|
||||||
#endif /* PSA_WANT_ALG_SHA_384 */
|
|
||||||
#endif /* PSA_WANT_KEY_TYPE_AES */
|
|
||||||
|
|
||||||
#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
|
|
||||||
#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
|
|
||||||
#if defined(PSA_WANT_ALG_SHA_256)
|
|
||||||
{ MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256,
|
|
||||||
"TLS-ECDH-RSA-WITH-CAMELLIA-128-CBC-SHA256",
|
|
||||||
MBEDTLS_CIPHER_CAMELLIA_128_CBC, MBEDTLS_MD_SHA256, MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_SHA_256 */
|
|
||||||
#if defined(PSA_WANT_ALG_SHA_384)
|
|
||||||
{ MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384,
|
|
||||||
"TLS-ECDH-RSA-WITH-CAMELLIA-256-CBC-SHA384",
|
|
||||||
MBEDTLS_CIPHER_CAMELLIA_256_CBC, MBEDTLS_MD_SHA384, MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_SHA_384 */
|
|
||||||
#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
|
|
||||||
|
|
||||||
#if defined(PSA_WANT_ALG_GCM)
|
|
||||||
#if defined(PSA_WANT_ALG_SHA_256)
|
|
||||||
{ MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256,
|
|
||||||
"TLS-ECDH-RSA-WITH-CAMELLIA-128-GCM-SHA256",
|
|
||||||
MBEDTLS_CIPHER_CAMELLIA_128_GCM, MBEDTLS_MD_SHA256, MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_SHA_256 */
|
|
||||||
#if defined(PSA_WANT_ALG_SHA_384)
|
|
||||||
{ MBEDTLS_TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384,
|
|
||||||
"TLS-ECDH-RSA-WITH-CAMELLIA-256-GCM-SHA384",
|
|
||||||
MBEDTLS_CIPHER_CAMELLIA_256_GCM, MBEDTLS_MD_SHA384, MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_SHA_384 */
|
|
||||||
#endif /* PSA_WANT_ALG_GCM */
|
|
||||||
#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_CIPHER_NULL_CIPHER)
|
|
||||||
#if defined(PSA_WANT_ALG_SHA_1)
|
|
||||||
{ MBEDTLS_TLS_ECDH_RSA_WITH_NULL_SHA, "TLS-ECDH-RSA-WITH-NULL-SHA",
|
|
||||||
MBEDTLS_CIPHER_NULL, MBEDTLS_MD_SHA1, MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
|
|
||||||
MBEDTLS_CIPHERSUITE_WEAK,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_SHA_1 */
|
|
||||||
#endif /* MBEDTLS_CIPHER_NULL_CIPHER */
|
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
|
|
||||||
#if defined(PSA_WANT_KEY_TYPE_AES)
|
|
||||||
#if defined(PSA_WANT_ALG_SHA_1)
|
|
||||||
#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
|
|
||||||
{ MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, "TLS-ECDH-ECDSA-WITH-AES-128-CBC-SHA",
|
|
||||||
MBEDTLS_CIPHER_AES_128_CBC, MBEDTLS_MD_SHA1, MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
{ MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, "TLS-ECDH-ECDSA-WITH-AES-256-CBC-SHA",
|
|
||||||
MBEDTLS_CIPHER_AES_256_CBC, MBEDTLS_MD_SHA1, MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
|
|
||||||
#endif /* PSA_WANT_ALG_SHA_1 */
|
|
||||||
#if defined(PSA_WANT_ALG_SHA_256)
|
|
||||||
#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
|
|
||||||
{ MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, "TLS-ECDH-ECDSA-WITH-AES-128-CBC-SHA256",
|
|
||||||
MBEDTLS_CIPHER_AES_128_CBC, MBEDTLS_MD_SHA256, MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
|
|
||||||
#if defined(PSA_WANT_ALG_GCM)
|
|
||||||
{ MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, "TLS-ECDH-ECDSA-WITH-AES-128-GCM-SHA256",
|
|
||||||
MBEDTLS_CIPHER_AES_128_GCM, MBEDTLS_MD_SHA256, MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_GCM */
|
|
||||||
#endif /* PSA_WANT_ALG_SHA_256 */
|
|
||||||
#if defined(PSA_WANT_ALG_SHA_384)
|
|
||||||
#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
|
|
||||||
{ MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, "TLS-ECDH-ECDSA-WITH-AES-256-CBC-SHA384",
|
|
||||||
MBEDTLS_CIPHER_AES_256_CBC, MBEDTLS_MD_SHA384, MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
|
|
||||||
#if defined(PSA_WANT_ALG_GCM)
|
|
||||||
{ MBEDTLS_TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, "TLS-ECDH-ECDSA-WITH-AES-256-GCM-SHA384",
|
|
||||||
MBEDTLS_CIPHER_AES_256_GCM, MBEDTLS_MD_SHA384, MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_GCM */
|
|
||||||
#endif /* PSA_WANT_ALG_SHA_384 */
|
|
||||||
#endif /* PSA_WANT_KEY_TYPE_AES */
|
|
||||||
|
|
||||||
#if defined(PSA_WANT_KEY_TYPE_CAMELLIA)
|
|
||||||
#if defined(PSA_WANT_ALG_CBC_NO_PADDING)
|
|
||||||
#if defined(PSA_WANT_ALG_SHA_256)
|
|
||||||
{ MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,
|
|
||||||
"TLS-ECDH-ECDSA-WITH-CAMELLIA-128-CBC-SHA256",
|
|
||||||
MBEDTLS_CIPHER_CAMELLIA_128_CBC, MBEDTLS_MD_SHA256, MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_SHA_256 */
|
|
||||||
#if defined(PSA_WANT_ALG_SHA_384)
|
|
||||||
{ MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,
|
|
||||||
"TLS-ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384",
|
|
||||||
MBEDTLS_CIPHER_CAMELLIA_256_CBC, MBEDTLS_MD_SHA384, MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_SHA_384 */
|
|
||||||
#endif /* PSA_WANT_ALG_CBC_NO_PADDING */
|
|
||||||
|
|
||||||
#if defined(PSA_WANT_ALG_GCM)
|
|
||||||
#if defined(PSA_WANT_ALG_SHA_256)
|
|
||||||
{ MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256,
|
|
||||||
"TLS-ECDH-ECDSA-WITH-CAMELLIA-128-GCM-SHA256",
|
|
||||||
MBEDTLS_CIPHER_CAMELLIA_128_GCM, MBEDTLS_MD_SHA256, MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_SHA_256 */
|
|
||||||
#if defined(PSA_WANT_ALG_SHA_384)
|
|
||||||
{ MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384,
|
|
||||||
"TLS-ECDH-ECDSA-WITH-CAMELLIA-256-GCM-SHA384",
|
|
||||||
MBEDTLS_CIPHER_CAMELLIA_256_GCM, MBEDTLS_MD_SHA384, MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_SHA_384 */
|
|
||||||
#endif /* PSA_WANT_ALG_GCM */
|
|
||||||
#endif /* PSA_WANT_KEY_TYPE_CAMELLIA */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_CIPHER_NULL_CIPHER)
|
|
||||||
#if defined(PSA_WANT_ALG_SHA_1)
|
|
||||||
{ MBEDTLS_TLS_ECDH_ECDSA_WITH_NULL_SHA, "TLS-ECDH-ECDSA-WITH-NULL-SHA",
|
|
||||||
MBEDTLS_CIPHER_NULL, MBEDTLS_MD_SHA1, MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
|
|
||||||
MBEDTLS_CIPHERSUITE_WEAK,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif /* PSA_WANT_ALG_SHA_1 */
|
|
||||||
#endif /* MBEDTLS_CIPHER_NULL_CIPHER */
|
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
|
||||||
#if defined(PSA_WANT_KEY_TYPE_AES)
|
#if defined(PSA_WANT_KEY_TYPE_AES)
|
||||||
#if defined(PSA_WANT_ALG_GCM)
|
#if defined(PSA_WANT_ALG_GCM)
|
||||||
@@ -898,41 +718,6 @@ static const mbedtls_ssl_ciphersuite_t ciphersuite_definitions[] =
|
|||||||
|
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_PSK_ENABLED */
|
#endif /* MBEDTLS_KEY_EXCHANGE_PSK_ENABLED */
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED)
|
|
||||||
|
|
||||||
#if (defined(PSA_WANT_ALG_GCM) && defined(PSA_WANT_ALG_SHA_384))
|
|
||||||
{ MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384,
|
|
||||||
"TLS-ECDH-RSA-WITH-ARIA-256-GCM-SHA384",
|
|
||||||
MBEDTLS_CIPHER_ARIA_256_GCM, MBEDTLS_MD_SHA384, MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif
|
|
||||||
#if (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
|
|
||||||
defined(PSA_WANT_ALG_SHA_384))
|
|
||||||
{ MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384,
|
|
||||||
"TLS-ECDH-RSA-WITH-ARIA-256-CBC-SHA384",
|
|
||||||
MBEDTLS_CIPHER_ARIA_256_CBC, MBEDTLS_MD_SHA384, MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif
|
|
||||||
#if (defined(PSA_WANT_ALG_GCM) && defined(PSA_WANT_ALG_SHA_256))
|
|
||||||
{ MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256,
|
|
||||||
"TLS-ECDH-RSA-WITH-ARIA-128-GCM-SHA256",
|
|
||||||
MBEDTLS_CIPHER_ARIA_128_GCM, MBEDTLS_MD_SHA256, MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif
|
|
||||||
#if (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
|
|
||||||
defined(PSA_WANT_ALG_SHA_256))
|
|
||||||
{ MBEDTLS_TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256,
|
|
||||||
"TLS-ECDH-RSA-WITH-ARIA-128-CBC-SHA256",
|
|
||||||
MBEDTLS_CIPHER_ARIA_128_CBC, MBEDTLS_MD_SHA256, MBEDTLS_KEY_EXCHANGE_ECDH_RSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED)
|
||||||
|
|
||||||
#if (defined(PSA_WANT_ALG_GCM) && defined(PSA_WANT_ALG_SHA_384))
|
#if (defined(PSA_WANT_ALG_GCM) && defined(PSA_WANT_ALG_SHA_384))
|
||||||
@@ -1024,41 +809,6 @@ static const mbedtls_ssl_ciphersuite_t ciphersuite_definitions[] =
|
|||||||
|
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED */
|
#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED */
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
|
|
||||||
|
|
||||||
#if (defined(PSA_WANT_ALG_GCM) && defined(PSA_WANT_ALG_SHA_384))
|
|
||||||
{ MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384,
|
|
||||||
"TLS-ECDH-ECDSA-WITH-ARIA-256-GCM-SHA384",
|
|
||||||
MBEDTLS_CIPHER_ARIA_256_GCM, MBEDTLS_MD_SHA384, MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif
|
|
||||||
#if (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
|
|
||||||
defined(PSA_WANT_ALG_SHA_384))
|
|
||||||
{ MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384,
|
|
||||||
"TLS-ECDH-ECDSA-WITH-ARIA-256-CBC-SHA384",
|
|
||||||
MBEDTLS_CIPHER_ARIA_256_CBC, MBEDTLS_MD_SHA384, MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif
|
|
||||||
#if (defined(PSA_WANT_ALG_GCM) && defined(PSA_WANT_ALG_SHA_256))
|
|
||||||
{ MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256,
|
|
||||||
"TLS-ECDH-ECDSA-WITH-ARIA-128-GCM-SHA256",
|
|
||||||
MBEDTLS_CIPHER_ARIA_128_GCM, MBEDTLS_MD_SHA256, MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif
|
|
||||||
#if (defined(PSA_WANT_ALG_CBC_NO_PADDING) && \
|
|
||||||
defined(PSA_WANT_ALG_SHA_256))
|
|
||||||
{ MBEDTLS_TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256,
|
|
||||||
"TLS-ECDH-ECDSA-WITH-ARIA-128-CBC-SHA256",
|
|
||||||
MBEDTLS_CIPHER_ARIA_128_CBC, MBEDTLS_MD_SHA256, MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA,
|
|
||||||
0,
|
|
||||||
MBEDTLS_SSL_VERSION_TLS1_2, MBEDTLS_SSL_VERSION_TLS1_2 },
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED */
|
|
||||||
|
|
||||||
#endif /* PSA_WANT_KEY_TYPE_ARIA */
|
#endif /* PSA_WANT_KEY_TYPE_ARIA */
|
||||||
|
|
||||||
|
|
||||||
@@ -1203,10 +953,6 @@ mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg(const mbedtls_ssl_ciphe
|
|||||||
case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
|
case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
|
||||||
return MBEDTLS_PK_ECDSA;
|
return MBEDTLS_PK_ECDSA;
|
||||||
|
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
|
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
|
|
||||||
return MBEDTLS_PK_ECKEY;
|
|
||||||
|
|
||||||
default:
|
default:
|
||||||
return MBEDTLS_PK_NONE;
|
return MBEDTLS_PK_NONE;
|
||||||
}
|
}
|
||||||
@@ -1222,10 +968,6 @@ psa_algorithm_t mbedtls_ssl_get_ciphersuite_sig_pk_psa_alg(const mbedtls_ssl_cip
|
|||||||
case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
|
case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
|
||||||
return PSA_ALG_ECDSA(mbedtls_md_psa_alg_from_type((mbedtls_md_type_t) info->mac));
|
return PSA_ALG_ECDSA(mbedtls_md_psa_alg_from_type((mbedtls_md_type_t) info->mac));
|
||||||
|
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
|
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
|
|
||||||
return PSA_ALG_ECDH;
|
|
||||||
|
|
||||||
default:
|
default:
|
||||||
return PSA_ALG_NONE;
|
return PSA_ALG_NONE;
|
||||||
}
|
}
|
||||||
@@ -1238,10 +980,6 @@ psa_key_usage_t mbedtls_ssl_get_ciphersuite_sig_pk_psa_usage(const mbedtls_ssl_c
|
|||||||
case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
|
case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
|
||||||
return PSA_KEY_USAGE_SIGN_HASH;
|
return PSA_KEY_USAGE_SIGN_HASH;
|
||||||
|
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
|
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
|
|
||||||
return PSA_KEY_USAGE_DERIVE;
|
|
||||||
|
|
||||||
default:
|
default:
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
@@ -1272,8 +1010,6 @@ int mbedtls_ssl_ciphersuite_uses_ec(const mbedtls_ssl_ciphersuite_t *info)
|
|||||||
case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
|
case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
|
case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
|
case MBEDTLS_KEY_EXCHANGE_ECDHE_PSK:
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
|
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
|
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
|
case MBEDTLS_KEY_EXCHANGE_ECJPAKE:
|
||||||
return 1;
|
return 1;
|
||||||
|
|
||||||
|
|||||||
@@ -45,8 +45,6 @@ static inline int mbedtls_ssl_ciphersuite_has_pfs(const mbedtls_ssl_ciphersuite_
|
|||||||
static inline int mbedtls_ssl_ciphersuite_no_pfs(const mbedtls_ssl_ciphersuite_t *info)
|
static inline int mbedtls_ssl_ciphersuite_no_pfs(const mbedtls_ssl_ciphersuite_t *info)
|
||||||
{
|
{
|
||||||
switch (info->MBEDTLS_PRIVATE(key_exchange)) {
|
switch (info->MBEDTLS_PRIVATE(key_exchange)) {
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
|
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
|
|
||||||
case MBEDTLS_KEY_EXCHANGE_PSK:
|
case MBEDTLS_KEY_EXCHANGE_PSK:
|
||||||
return 1;
|
return 1;
|
||||||
|
|
||||||
@@ -60,9 +58,7 @@ static inline int mbedtls_ssl_ciphersuite_no_pfs(const mbedtls_ssl_ciphersuite_t
|
|||||||
static inline int mbedtls_ssl_ciphersuite_uses_ecdh(const mbedtls_ssl_ciphersuite_t *info)
|
static inline int mbedtls_ssl_ciphersuite_uses_ecdh(const mbedtls_ssl_ciphersuite_t *info)
|
||||||
{
|
{
|
||||||
switch (info->MBEDTLS_PRIVATE(key_exchange)) {
|
switch (info->MBEDTLS_PRIVATE(key_exchange)) {
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
|
return 1;
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
|
|
||||||
return 1;
|
|
||||||
|
|
||||||
default:
|
default:
|
||||||
return 0;
|
return 0;
|
||||||
@@ -73,9 +69,7 @@ static inline int mbedtls_ssl_ciphersuite_uses_ecdh(const mbedtls_ssl_ciphersuit
|
|||||||
static inline int mbedtls_ssl_ciphersuite_cert_req_allowed(const mbedtls_ssl_ciphersuite_t *info)
|
static inline int mbedtls_ssl_ciphersuite_cert_req_allowed(const mbedtls_ssl_ciphersuite_t *info)
|
||||||
{
|
{
|
||||||
switch (info->MBEDTLS_PRIVATE(key_exchange)) {
|
switch (info->MBEDTLS_PRIVATE(key_exchange)) {
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
|
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
|
case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
|
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
|
case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
|
||||||
return 1;
|
return 1;
|
||||||
|
|
||||||
@@ -87,9 +81,7 @@ static inline int mbedtls_ssl_ciphersuite_cert_req_allowed(const mbedtls_ssl_cip
|
|||||||
static inline int mbedtls_ssl_ciphersuite_uses_srv_cert(const mbedtls_ssl_ciphersuite_t *info)
|
static inline int mbedtls_ssl_ciphersuite_uses_srv_cert(const mbedtls_ssl_ciphersuite_t *info)
|
||||||
{
|
{
|
||||||
switch (info->MBEDTLS_PRIVATE(key_exchange)) {
|
switch (info->MBEDTLS_PRIVATE(key_exchange)) {
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
|
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
|
case MBEDTLS_KEY_EXCHANGE_ECDHE_RSA:
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
|
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
|
case MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA:
|
||||||
return 1;
|
return 1;
|
||||||
|
|
||||||
|
|||||||
@@ -8623,11 +8623,6 @@ int mbedtls_ssl_check_cert_usage(const mbedtls_x509_crt *cert,
|
|||||||
usage = MBEDTLS_X509_KU_DIGITAL_SIGNATURE;
|
usage = MBEDTLS_X509_KU_DIGITAL_SIGNATURE;
|
||||||
break;
|
break;
|
||||||
|
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDH_RSA:
|
|
||||||
case MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA:
|
|
||||||
usage = MBEDTLS_X509_KU_KEY_AGREEMENT;
|
|
||||||
break;
|
|
||||||
|
|
||||||
/* Don't use default: we want warnings when adding new values */
|
/* Don't use default: we want warnings when adding new values */
|
||||||
case MBEDTLS_KEY_EXCHANGE_NONE:
|
case MBEDTLS_KEY_EXCHANGE_NONE:
|
||||||
case MBEDTLS_KEY_EXCHANGE_PSK:
|
case MBEDTLS_KEY_EXCHANGE_PSK:
|
||||||
|
|||||||
@@ -1732,71 +1732,6 @@ static int ssl_parse_server_psk_hint(mbedtls_ssl_context *ssl,
|
|||||||
}
|
}
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
|
#endif /* MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED */
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
|
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
|
|
||||||
MBEDTLS_CHECK_RETURN_CRITICAL
|
|
||||||
static int ssl_get_ecdh_params_from_cert(mbedtls_ssl_context *ssl)
|
|
||||||
{
|
|
||||||
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
||||||
mbedtls_pk_context *peer_pk;
|
|
||||||
|
|
||||||
#if !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
|
|
||||||
peer_pk = &ssl->handshake->peer_pubkey;
|
|
||||||
#else /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
|
|
||||||
if (ssl->session_negotiate->peer_cert == NULL) {
|
|
||||||
/* Should never happen */
|
|
||||||
MBEDTLS_SSL_DEBUG_MSG(1, ("should never happen"));
|
|
||||||
return MBEDTLS_ERR_SSL_INTERNAL_ERROR;
|
|
||||||
}
|
|
||||||
peer_pk = &ssl->session_negotiate->peer_cert->pk;
|
|
||||||
#endif /* MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
|
|
||||||
|
|
||||||
/* This is a public key, so it can't be opaque, so can_do() is a good
|
|
||||||
* enough check to ensure pk_ec() is safe to use below. */
|
|
||||||
if (!mbedtls_pk_can_do(peer_pk, MBEDTLS_PK_ECKEY)) {
|
|
||||||
MBEDTLS_SSL_DEBUG_MSG(1, ("server key not ECDH capable"));
|
|
||||||
return MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH;
|
|
||||||
}
|
|
||||||
|
|
||||||
uint16_t tls_id = 0;
|
|
||||||
psa_key_type_t key_type = PSA_KEY_TYPE_NONE;
|
|
||||||
mbedtls_ecp_group_id grp_id = mbedtls_pk_get_ec_group_id(peer_pk);
|
|
||||||
|
|
||||||
if (mbedtls_ssl_check_curve(ssl, grp_id) != 0) {
|
|
||||||
MBEDTLS_SSL_DEBUG_MSG(1, ("bad server certificate (ECDH curve)"));
|
|
||||||
return MBEDTLS_ERR_SSL_BAD_CERTIFICATE;
|
|
||||||
}
|
|
||||||
|
|
||||||
tls_id = mbedtls_ssl_get_tls_id_from_ecp_group_id(grp_id);
|
|
||||||
if (tls_id == 0) {
|
|
||||||
MBEDTLS_SSL_DEBUG_MSG(1, ("ECC group %u not supported",
|
|
||||||
grp_id));
|
|
||||||
return MBEDTLS_ERR_SSL_ILLEGAL_PARAMETER;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* If the above conversion to TLS ID was fine, then also this one will be,
|
|
||||||
so there is no need to check the return value here */
|
|
||||||
mbedtls_ssl_get_psa_curve_info_from_tls_id(tls_id, &key_type,
|
|
||||||
&ssl->handshake->xxdh_psa_bits);
|
|
||||||
|
|
||||||
ssl->handshake->xxdh_psa_type = key_type;
|
|
||||||
|
|
||||||
/* Store peer's public key in psa format. */
|
|
||||||
memcpy(ssl->handshake->xxdh_psa_peerkey, peer_pk->pub_raw, peer_pk->pub_raw_len);
|
|
||||||
ssl->handshake->xxdh_psa_peerkey_len = peer_pk->pub_raw_len;
|
|
||||||
ret = 0;
|
|
||||||
#if !defined(MBEDTLS_SSL_KEEP_PEER_CERTIFICATE)
|
|
||||||
/* We don't need the peer's public key anymore. Free it,
|
|
||||||
* so that more RAM is available for upcoming expensive
|
|
||||||
* operations like ECDHE. */
|
|
||||||
mbedtls_pk_free(peer_pk);
|
|
||||||
#endif /* !MBEDTLS_SSL_KEEP_PEER_CERTIFICATE */
|
|
||||||
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) ||
|
|
||||||
MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED */
|
|
||||||
|
|
||||||
MBEDTLS_CHECK_RETURN_CRITICAL
|
MBEDTLS_CHECK_RETURN_CRITICAL
|
||||||
static int ssl_parse_server_key_exchange(mbedtls_ssl_context *ssl)
|
static int ssl_parse_server_key_exchange(mbedtls_ssl_context *ssl)
|
||||||
{
|
{
|
||||||
@@ -1807,28 +1742,6 @@ static int ssl_parse_server_key_exchange(mbedtls_ssl_context *ssl)
|
|||||||
|
|
||||||
MBEDTLS_SSL_DEBUG_MSG(2, ("=> parse server key exchange"));
|
MBEDTLS_SSL_DEBUG_MSG(2, ("=> parse server key exchange"));
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
|
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
|
|
||||||
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDH_RSA ||
|
|
||||||
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA) {
|
|
||||||
if ((ret = ssl_get_ecdh_params_from_cert(ssl)) != 0) {
|
|
||||||
MBEDTLS_SSL_DEBUG_RET(1, "ssl_get_ecdh_params_from_cert", ret);
|
|
||||||
mbedtls_ssl_send_alert_message(
|
|
||||||
ssl,
|
|
||||||
MBEDTLS_SSL_ALERT_LEVEL_FATAL,
|
|
||||||
MBEDTLS_SSL_ALERT_MSG_HANDSHAKE_FAILURE);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
MBEDTLS_SSL_DEBUG_MSG(2, ("<= skip parse server key exchange"));
|
|
||||||
mbedtls_ssl_handshake_increment_state(ssl);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
((void) p);
|
|
||||||
((void) end);
|
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED ||
|
|
||||||
MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
#if defined(MBEDTLS_SSL_ECP_RESTARTABLE_ENABLED)
|
||||||
if (ssl->handshake->ecrs_enabled &&
|
if (ssl->handshake->ecrs_enabled &&
|
||||||
ssl->handshake->ecrs_state == ssl_ecrs_ske_start_processing) {
|
ssl->handshake->ecrs_state == ssl_ecrs_ske_start_processing) {
|
||||||
@@ -2380,13 +2293,9 @@ static int ssl_write_client_key_exchange(mbedtls_ssl_context *ssl)
|
|||||||
MBEDTLS_SSL_DEBUG_MSG(2, ("=> write client key exchange"));
|
MBEDTLS_SSL_DEBUG_MSG(2, ("=> write client key exchange"));
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
|
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
|
|
||||||
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_RSA ||
|
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_RSA ||
|
||||||
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA ||
|
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA) {
|
||||||
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDH_RSA ||
|
|
||||||
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA) {
|
|
||||||
psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
|
psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
|
||||||
psa_status_t destruction_status = PSA_ERROR_CORRUPTION_DETECTED;
|
psa_status_t destruction_status = PSA_ERROR_CORRUPTION_DETECTED;
|
||||||
psa_key_attributes_t key_attributes;
|
psa_key_attributes_t key_attributes;
|
||||||
@@ -2460,9 +2369,7 @@ static int ssl_write_client_key_exchange(mbedtls_ssl_context *ssl)
|
|||||||
}
|
}
|
||||||
} else
|
} else
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
|
#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
|
||||||
MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED ||
|
MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED */
|
||||||
MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED ||
|
|
||||||
MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED */
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED)
|
||||||
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK) {
|
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_PSK) {
|
||||||
psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
|
psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
|
||||||
|
|||||||
@@ -2513,100 +2513,6 @@ static int ssl_write_certificate_request(mbedtls_ssl_context *ssl)
|
|||||||
}
|
}
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
|
#endif /* MBEDTLS_KEY_EXCHANGE_CERT_REQ_ALLOWED_ENABLED */
|
||||||
|
|
||||||
#if (defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
|
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED))
|
|
||||||
MBEDTLS_CHECK_RETURN_CRITICAL
|
|
||||||
static int ssl_get_ecdh_params_from_cert(mbedtls_ssl_context *ssl)
|
|
||||||
{
|
|
||||||
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
|
||||||
psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED;
|
|
||||||
mbedtls_pk_context *pk;
|
|
||||||
mbedtls_pk_type_t pk_type;
|
|
||||||
psa_key_attributes_t key_attributes = PSA_KEY_ATTRIBUTES_INIT;
|
|
||||||
unsigned char buf[PSA_KEY_EXPORT_ECC_KEY_PAIR_MAX_SIZE(PSA_VENDOR_ECC_MAX_CURVE_BITS)];
|
|
||||||
size_t key_len;
|
|
||||||
|
|
||||||
pk = mbedtls_ssl_own_key(ssl);
|
|
||||||
|
|
||||||
if (pk == NULL) {
|
|
||||||
return MBEDTLS_ERR_ECP_BAD_INPUT_DATA;
|
|
||||||
}
|
|
||||||
|
|
||||||
pk_type = mbedtls_pk_get_type(pk);
|
|
||||||
|
|
||||||
switch (pk_type) {
|
|
||||||
case MBEDTLS_PK_OPAQUE:
|
|
||||||
case MBEDTLS_PK_ECKEY:
|
|
||||||
case MBEDTLS_PK_ECKEY_DH:
|
|
||||||
case MBEDTLS_PK_ECDSA:
|
|
||||||
if (!mbedtls_pk_can_do(pk, MBEDTLS_PK_ECKEY)) {
|
|
||||||
return MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Get the attributes of the key previously parsed by PK module in
|
|
||||||
* order to extract its type and length (in bits). */
|
|
||||||
status = psa_get_key_attributes(pk->priv_id, &key_attributes);
|
|
||||||
if (status != PSA_SUCCESS) {
|
|
||||||
ret = PSA_TO_MBEDTLS_ERR(status);
|
|
||||||
goto exit;
|
|
||||||
}
|
|
||||||
ssl->handshake->xxdh_psa_type = psa_get_key_type(&key_attributes);
|
|
||||||
ssl->handshake->xxdh_psa_bits = psa_get_key_bits(&key_attributes);
|
|
||||||
|
|
||||||
if (pk_type != MBEDTLS_PK_OPAQUE) {
|
|
||||||
/* PK_ECKEY[_DH] and PK_ECDSA instead as parsed from the PK
|
|
||||||
* module and only have ECDSA capabilities. Since we need
|
|
||||||
* them for ECDH later, we export and then re-import them with
|
|
||||||
* proper flags and algorithm. Of course We also set key's type
|
|
||||||
* and bits that we just got above. */
|
|
||||||
key_attributes = psa_key_attributes_init();
|
|
||||||
psa_set_key_usage_flags(&key_attributes, PSA_KEY_USAGE_DERIVE);
|
|
||||||
psa_set_key_algorithm(&key_attributes, PSA_ALG_ECDH);
|
|
||||||
psa_set_key_type(&key_attributes,
|
|
||||||
PSA_KEY_TYPE_ECC_KEY_PAIR(ssl->handshake->xxdh_psa_type));
|
|
||||||
psa_set_key_bits(&key_attributes, ssl->handshake->xxdh_psa_bits);
|
|
||||||
|
|
||||||
status = psa_export_key(pk->priv_id, buf, sizeof(buf), &key_len);
|
|
||||||
if (status != PSA_SUCCESS) {
|
|
||||||
ret = PSA_TO_MBEDTLS_ERR(status);
|
|
||||||
goto exit;
|
|
||||||
}
|
|
||||||
status = psa_import_key(&key_attributes, buf, key_len,
|
|
||||||
&ssl->handshake->xxdh_psa_privkey);
|
|
||||||
if (status != PSA_SUCCESS) {
|
|
||||||
ret = PSA_TO_MBEDTLS_ERR(status);
|
|
||||||
goto exit;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Set this key as owned by the TLS library: it will be its duty
|
|
||||||
* to clear it exit. */
|
|
||||||
ssl->handshake->xxdh_psa_privkey_is_external = 0;
|
|
||||||
|
|
||||||
ret = 0;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Opaque key is created by the user (externally from Mbed TLS)
|
|
||||||
* so we assume it already has the right algorithm and flags
|
|
||||||
* set. Just copy its ID as reference. */
|
|
||||||
ssl->handshake->xxdh_psa_privkey = pk->priv_id;
|
|
||||||
ssl->handshake->xxdh_psa_privkey_is_external = 1;
|
|
||||||
ret = 0;
|
|
||||||
break;
|
|
||||||
|
|
||||||
default:
|
|
||||||
ret = MBEDTLS_ERR_SSL_PK_TYPE_MISMATCH;
|
|
||||||
}
|
|
||||||
|
|
||||||
exit:
|
|
||||||
psa_reset_key_attributes(&key_attributes);
|
|
||||||
mbedtls_platform_zeroize(buf, sizeof(buf));
|
|
||||||
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) ||
|
|
||||||
MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED */
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED) && \
|
#if defined(MBEDTLS_KEY_EXCHANGE_WITH_SERVER_SIGNATURE_ENABLED) && \
|
||||||
defined(MBEDTLS_SSL_ASYNC_PRIVATE)
|
defined(MBEDTLS_SSL_ASYNC_PRIVATE)
|
||||||
MBEDTLS_CHECK_RETURN_CRITICAL
|
MBEDTLS_CHECK_RETURN_CRITICAL
|
||||||
@@ -3210,13 +3116,9 @@ static int ssl_parse_client_key_exchange(mbedtls_ssl_context *ssl)
|
|||||||
}
|
}
|
||||||
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
#if defined(MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED) || \
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED) || \
|
defined(MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED)
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED) || \
|
|
||||||
defined(MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED)
|
|
||||||
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_RSA ||
|
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_RSA ||
|
||||||
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA ||
|
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA) {
|
||||||
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDH_RSA ||
|
|
||||||
ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA) {
|
|
||||||
size_t data_len = (size_t) (*p++);
|
size_t data_len = (size_t) (*p++);
|
||||||
size_t buf_len = (size_t) (end - p);
|
size_t buf_len = (size_t) (end - p);
|
||||||
psa_status_t status = PSA_ERROR_GENERIC_ERROR;
|
psa_status_t status = PSA_ERROR_GENERIC_ERROR;
|
||||||
@@ -3279,9 +3181,7 @@ static int ssl_parse_client_key_exchange(mbedtls_ssl_context *ssl)
|
|||||||
handshake->xxdh_psa_privkey = MBEDTLS_SVC_KEY_ID_INIT;
|
handshake->xxdh_psa_privkey = MBEDTLS_SVC_KEY_ID_INIT;
|
||||||
} else
|
} else
|
||||||
#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
|
#endif /* MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED ||
|
||||||
MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED ||
|
MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED */
|
||||||
MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED ||
|
|
||||||
MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED */
|
|
||||||
#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
|
#if defined(MBEDTLS_KEY_EXCHANGE_PSK_ENABLED)
|
||||||
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK) {
|
if (ciphersuite_info->key_exchange == MBEDTLS_KEY_EXCHANGE_PSK) {
|
||||||
if ((ret = ssl_parse_client_psk_identity(ssl, &p, end)) != 0) {
|
if ((ret = ssl_parse_client_psk_identity(ssl, &p, end)) != 0) {
|
||||||
|
|||||||
@@ -437,7 +437,6 @@ component_test_everest_curve25519_only () {
|
|||||||
scripts/config.py unset PSA_WANT_ALG_DETERMINISTIC_ECDSA
|
scripts/config.py unset PSA_WANT_ALG_DETERMINISTIC_ECDSA
|
||||||
scripts/config.py unset PSA_WANT_ALG_ECDSA
|
scripts/config.py unset PSA_WANT_ALG_ECDSA
|
||||||
scripts/config.py set PSA_WANT_ALG_ECDH
|
scripts/config.py set PSA_WANT_ALG_ECDH
|
||||||
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
|
|
||||||
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
||||||
scripts/config.py unset MBEDTLS_ECJPAKE_C
|
scripts/config.py unset MBEDTLS_ECJPAKE_C
|
||||||
scripts/config.py unset PSA_WANT_ALG_JPAKE
|
scripts/config.py unset PSA_WANT_ALG_JPAKE
|
||||||
@@ -574,7 +573,6 @@ component_test_psa_crypto_config_accel_ecdsa () {
|
|||||||
|
|
||||||
# Disable things that depend on it
|
# Disable things that depend on it
|
||||||
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
||||||
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
|
|
||||||
|
|
||||||
# Build
|
# Build
|
||||||
# -----
|
# -----
|
||||||
@@ -615,8 +613,6 @@ component_test_psa_crypto_config_accel_ecdh () {
|
|||||||
scripts/config.py unset MBEDTLS_ECDH_C
|
scripts/config.py unset MBEDTLS_ECDH_C
|
||||||
|
|
||||||
# Disable things that depend on it
|
# Disable things that depend on it
|
||||||
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
|
|
||||||
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
|
|
||||||
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED
|
||||||
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
||||||
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
|
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED
|
||||||
@@ -1147,7 +1143,6 @@ config_psa_crypto_config_accel_ecc_ffdh_no_bignum () {
|
|||||||
scripts/config.py unset MBEDTLS_X509_RSASSA_PSS_SUPPORT
|
scripts/config.py unset MBEDTLS_X509_RSASSA_PSS_SUPPORT
|
||||||
# Also disable key exchanges that depend on RSA
|
# Also disable key exchanges that depend on RSA
|
||||||
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
||||||
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
|
|
||||||
|
|
||||||
if [ "$test_target" = "ECC" ]; then
|
if [ "$test_target" = "ECC" ]; then
|
||||||
# When testing ECC only, we disable FFDH support, both from builtin and
|
# When testing ECC only, we disable FFDH support, both from builtin and
|
||||||
@@ -1496,7 +1491,8 @@ component_test_new_psa_want_key_pair_symbol () {
|
|||||||
scripts/config.py crypto
|
scripts/config.py crypto
|
||||||
|
|
||||||
# Remove RSA support and its dependencies
|
# Remove RSA support and its dependencies
|
||||||
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED
|
scripts/config.py unset MBEDTLS_PKCS1_V15
|
||||||
|
scripts/config.py unset MBEDTLS_PKCS1_V21
|
||||||
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
scripts/config.py unset MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED
|
||||||
scripts/config.py unset MBEDTLS_X509_RSASSA_PSS_SUPPORT
|
scripts/config.py unset MBEDTLS_X509_RSASSA_PSS_SUPPORT
|
||||||
|
|
||||||
|
|||||||
@@ -280,7 +280,6 @@ REVERSE_DEPENDENCIES = {
|
|||||||
|
|
||||||
'PSA_WANT_ALG_ECDSA': ['PSA_WANT_ALG_DETERMINISTIC_ECDSA',
|
'PSA_WANT_ALG_ECDSA': ['PSA_WANT_ALG_DETERMINISTIC_ECDSA',
|
||||||
'MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED',
|
'MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED',
|
||||||
'MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED',
|
|
||||||
'MBEDTLS_ECDSA_C'],
|
'MBEDTLS_ECDSA_C'],
|
||||||
'PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC': [
|
'PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_BASIC': [
|
||||||
'PSA_WANT_ALG_ECDSA',
|
'PSA_WANT_ALG_ECDSA',
|
||||||
@@ -294,7 +293,6 @@ REVERSE_DEPENDENCIES = {
|
|||||||
'MBEDTLS_ECP_RESTARTABLE',
|
'MBEDTLS_ECP_RESTARTABLE',
|
||||||
'MBEDTLS_PK_PARSE_EC_EXTENDED',
|
'MBEDTLS_PK_PARSE_EC_EXTENDED',
|
||||||
'MBEDTLS_PK_PARSE_EC_COMPRESSED',
|
'MBEDTLS_PK_PARSE_EC_COMPRESSED',
|
||||||
'MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED',
|
|
||||||
'MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED',
|
'MBEDTLS_KEY_EXCHANGE_ECDHE_PSK_ENABLED',
|
||||||
'MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED',
|
'MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED',
|
||||||
'MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED',
|
'MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED',
|
||||||
@@ -313,7 +311,7 @@ REVERSE_DEPENDENCIES = {
|
|||||||
'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT',
|
'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_IMPORT',
|
||||||
'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT',
|
'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_EXPORT',
|
||||||
'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE',
|
'PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_GENERATE',
|
||||||
'MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED'],
|
'MBEDTLS_RSA_C'],
|
||||||
|
|
||||||
'PSA_WANT_ALG_SHA_224': ['MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED',
|
'PSA_WANT_ALG_SHA_224': ['MBEDTLS_KEY_EXCHANGE_ECJPAKE_ENABLED',
|
||||||
'MBEDTLS_SHA256_USE_ARMV8_A_CRYPTO_IF_PRESENT',
|
'MBEDTLS_SHA256_USE_ARMV8_A_CRYPTO_IF_PRESENT',
|
||||||
|
|||||||
@@ -312,12 +312,9 @@ requires_any_configs_disabled() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
TLS1_2_KEY_EXCHANGES_WITH_CERT="MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED \
|
TLS1_2_KEY_EXCHANGES_WITH_CERT="MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED \
|
||||||
MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED \
|
MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED"
|
||||||
MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED \
|
|
||||||
MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED"
|
|
||||||
|
|
||||||
TLS1_2_KEY_EXCHANGES_WITH_ECDSA_CERT="MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED \
|
TLS1_2_KEY_EXCHANGES_WITH_ECDSA_CERT="MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED"
|
||||||
MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED"
|
|
||||||
|
|
||||||
TLS1_2_KEY_EXCHANGES_WITH_CERT_WO_ECDH="MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED \
|
TLS1_2_KEY_EXCHANGES_WITH_CERT_WO_ECDH="MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED \
|
||||||
MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED"
|
MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED"
|
||||||
|
|||||||
@@ -380,10 +380,6 @@ Handshake, ECDHE-ECDSA-WITH-AES-256-CCM
|
|||||||
depends_on:PSA_WANT_KEY_TYPE_AES:PSA_WANT_ALG_CCM:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED:!MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
|
depends_on:PSA_WANT_KEY_TYPE_AES:PSA_WANT_ALG_CCM:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED:!MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
|
||||||
handshake_cipher:"TLS-ECDHE-ECDSA-WITH-AES-256-CCM":MBEDTLS_PK_ECDSA:0
|
handshake_cipher:"TLS-ECDHE-ECDSA-WITH-AES-256-CCM":MBEDTLS_PK_ECDSA:0
|
||||||
|
|
||||||
Handshake, ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384
|
|
||||||
depends_on:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_CAMELLIA:PSA_WANT_ALG_CBC_NO_PADDING:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
|
|
||||||
handshake_cipher:"TLS-ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384":MBEDTLS_PK_ECDSA:0
|
|
||||||
|
|
||||||
Handshake, PSK-WITH-AES-128-CBC-SHA
|
Handshake, PSK-WITH-AES-128-CBC-SHA
|
||||||
depends_on:PSA_WANT_KEY_TYPE_AES:PSA_WANT_ALG_CBC_NO_PADDING:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:PSA_WANT_ALG_SHA_1:MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
|
depends_on:PSA_WANT_KEY_TYPE_AES:PSA_WANT_ALG_CBC_NO_PADDING:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:PSA_WANT_ALG_SHA_1:MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
|
||||||
handshake_psk_cipher:"TLS-PSK-WITH-AES-128-CBC-SHA":MBEDTLS_PK_RSA:"abc123":0
|
handshake_psk_cipher:"TLS-PSK-WITH-AES-128-CBC-SHA":MBEDTLS_PK_RSA:"abc123":0
|
||||||
@@ -408,10 +404,6 @@ DTLS Handshake, ECDHE-ECDSA-WITH-AES-256-CCM
|
|||||||
depends_on:PSA_WANT_KEY_TYPE_AES:PSA_WANT_ALG_CCM:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_SSL_PROTO_DTLS:MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED:!MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
|
depends_on:PSA_WANT_KEY_TYPE_AES:PSA_WANT_ALG_CCM:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_SSL_PROTO_DTLS:MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED:!MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
|
||||||
handshake_cipher:"TLS-ECDHE-ECDSA-WITH-AES-256-CCM":MBEDTLS_PK_ECDSA:1
|
handshake_cipher:"TLS-ECDHE-ECDSA-WITH-AES-256-CCM":MBEDTLS_PK_ECDSA:1
|
||||||
|
|
||||||
DTLS Handshake, ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384
|
|
||||||
depends_on:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_CAMELLIA:PSA_WANT_ALG_CBC_NO_PADDING:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_SSL_PROTO_DTLS:MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
|
|
||||||
handshake_cipher:"TLS-ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384":MBEDTLS_PK_ECDSA:1
|
|
||||||
|
|
||||||
DTLS Handshake, PSK-WITH-AES-128-CBC-SHA
|
DTLS Handshake, PSK-WITH-AES-128-CBC-SHA
|
||||||
depends_on:PSA_WANT_KEY_TYPE_AES:PSA_WANT_ALG_CBC_NO_PADDING:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_SSL_PROTO_DTLS:PSA_WANT_ALG_SHA_1:MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
|
depends_on:PSA_WANT_KEY_TYPE_AES:PSA_WANT_ALG_CBC_NO_PADDING:MBEDTLS_RSA_C:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_SSL_PROTO_DTLS:PSA_WANT_ALG_SHA_1:MBEDTLS_KEY_EXCHANGE_PSK_ENABLED
|
||||||
handshake_psk_cipher:"TLS-PSK-WITH-AES-128-CBC-SHA":MBEDTLS_PK_RSA:"abc123":1
|
handshake_psk_cipher:"TLS-PSK-WITH-AES-128-CBC-SHA":MBEDTLS_PK_RSA:"abc123":1
|
||||||
@@ -479,42 +471,6 @@ Handshake, select ECDHE-ECDSA-WITH-AES-256-CCM, opaque, bad usage
|
|||||||
depends_on:PSA_WANT_ALG_SHA_256:PSA_WANT_KEY_TYPE_AES:PSA_WANT_ALG_CCM:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED:!MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
|
depends_on:PSA_WANT_ALG_SHA_256:PSA_WANT_KEY_TYPE_AES:PSA_WANT_ALG_CCM:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED:!MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
|
||||||
handshake_ciphersuite_select:"TLS-ECDHE-ECDSA-WITH-AES-256-CCM":MBEDTLS_PK_ECDSA:"":PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_ALG_NONE:PSA_KEY_USAGE_DERIVE:MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE:0
|
handshake_ciphersuite_select:"TLS-ECDHE-ECDSA-WITH-AES-256-CCM":MBEDTLS_PK_ECDSA:"":PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_ALG_NONE:PSA_KEY_USAGE_DERIVE:MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE:0
|
||||||
|
|
||||||
Handshake, select ECDH-RSA-WITH-AES-256-CBC-SHA384, non-opaque
|
|
||||||
depends_on:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_AES:PSA_WANT_ALG_CBC_NO_PADDING:MBEDTLS_RSA_C:PSA_HAVE_ALG_ECDSA_VERIFY:PSA_HAVE_ALG_ECDSA_SIGN:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED:!MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
|
|
||||||
handshake_ciphersuite_select:"TLS-ECDH-RSA-WITH-AES-256-CBC-SHA384":MBEDTLS_PK_ECDSA:"":PSA_ALG_NONE:PSA_ALG_NONE:0:0:MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
|
|
||||||
|
|
||||||
Handshake, select ECDH-RSA-WITH-AES-256-CBC-SHA384, opaque
|
|
||||||
depends_on:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_AES:PSA_WANT_ALG_CBC_NO_PADDING:MBEDTLS_RSA_C:PSA_HAVE_ALG_ECDSA_VERIFY:PSA_HAVE_ALG_ECDSA_SIGN:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED:!MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
|
|
||||||
handshake_ciphersuite_select:"TLS-ECDH-RSA-WITH-AES-256-CBC-SHA384":MBEDTLS_PK_ECDSA:"":PSA_ALG_ECDH:PSA_ALG_NONE:PSA_KEY_USAGE_DERIVE:0:MBEDTLS_TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
|
|
||||||
|
|
||||||
Handshake, select ECDH-RSA-WITH-AES-256-CBC-SHA384, opaque, bad alg
|
|
||||||
depends_on:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_AES:PSA_WANT_ALG_CBC_NO_PADDING:MBEDTLS_RSA_C:PSA_HAVE_ALG_ECDSA_VERIFY:PSA_HAVE_ALG_ECDSA_SIGN:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED:!MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
|
|
||||||
handshake_ciphersuite_select:"TLS-ECDH-RSA-WITH-AES-256-CBC-SHA384":MBEDTLS_PK_ECDSA:"":PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_ALG_NONE:PSA_KEY_USAGE_DERIVE:MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE:0
|
|
||||||
|
|
||||||
Handshake, select ECDH-RSA-WITH-AES-256-CBC-SHA384, opaque, bad usage
|
|
||||||
depends_on:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_AES:PSA_WANT_ALG_CBC_NO_PADDING:MBEDTLS_RSA_C:PSA_HAVE_ALG_ECDSA_VERIFY:PSA_HAVE_ALG_ECDSA_SIGN:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_KEY_EXCHANGE_ECDH_RSA_ENABLED:!MBEDTLS_AES_ONLY_128_BIT_KEY_LENGTH
|
|
||||||
handshake_ciphersuite_select:"TLS-ECDH-RSA-WITH-AES-256-CBC-SHA384":MBEDTLS_PK_ECDSA:"":PSA_ALG_ECDH:PSA_ALG_NONE:PSA_KEY_USAGE_DECRYPT:MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE:0
|
|
||||||
|
|
||||||
Handshake, select ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384, non-opaque
|
|
||||||
depends_on:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_CAMELLIA:PSA_WANT_ALG_CBC_NO_PADDING:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
|
|
||||||
handshake_ciphersuite_select:"TLS-ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384":MBEDTLS_PK_ECDSA:"":PSA_ALG_NONE:PSA_ALG_NONE:0:0:MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384
|
|
||||||
|
|
||||||
Handshake, select ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384, opaque, PSA_ALG_ANY_HASH
|
|
||||||
depends_on:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_CAMELLIA:PSA_WANT_ALG_CBC_NO_PADDING:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED:MBEDTLS_PSA_CRYPTO_C
|
|
||||||
handshake_ciphersuite_select:"TLS-ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384":MBEDTLS_PK_ECDSA:"":PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_ALG_ECDH:PSA_KEY_USAGE_SIGN_HASH|PSA_KEY_USAGE_DERIVE:0:MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384
|
|
||||||
|
|
||||||
Handshake, select ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384, opaque, PSA_ALG_SHA_384
|
|
||||||
depends_on:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_CAMELLIA:PSA_WANT_ALG_CBC_NO_PADDING:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED:MBEDTLS_PSA_CRYPTO_C
|
|
||||||
handshake_ciphersuite_select:"TLS-ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384":MBEDTLS_PK_ECDSA:"":PSA_ALG_ECDSA(PSA_ALG_SHA_384):PSA_ALG_ECDH:PSA_KEY_USAGE_SIGN_HASH|PSA_KEY_USAGE_DERIVE:0:MBEDTLS_TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384
|
|
||||||
|
|
||||||
Handshake, select ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384, opaque, missing alg
|
|
||||||
depends_on:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_CAMELLIA:PSA_WANT_ALG_CBC_NO_PADDING:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
|
|
||||||
handshake_ciphersuite_select:"TLS-ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384":MBEDTLS_PK_ECDSA:"":PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_ALG_NONE:PSA_KEY_USAGE_SIGN_HASH|PSA_KEY_USAGE_DERIVE:MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE:0
|
|
||||||
|
|
||||||
Handshake, select ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384, opaque, missing usage
|
|
||||||
depends_on:PSA_WANT_ALG_SHA_384:PSA_WANT_KEY_TYPE_CAMELLIA:PSA_WANT_ALG_CBC_NO_PADDING:PSA_WANT_ECC_SECP_R1_256:PSA_WANT_ECC_SECP_R1_384:MBEDTLS_KEY_EXCHANGE_ECDH_ECDSA_ENABLED
|
|
||||||
handshake_ciphersuite_select:"TLS-ECDH-ECDSA-WITH-CAMELLIA-256-CBC-SHA384":MBEDTLS_PK_ECDSA:"":PSA_ALG_ECDSA(PSA_ALG_ANY_HASH):PSA_ALG_ECDH:PSA_KEY_USAGE_SIGN_HASH:MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE:0
|
|
||||||
|
|
||||||
Sending app data via TLS, MFL=512 without fragmentation
|
Sending app data via TLS, MFL=512 without fragmentation
|
||||||
depends_on:MBEDTLS_SSL_MAX_FRAGMENT_LENGTH
|
depends_on:MBEDTLS_SSL_MAX_FRAGMENT_LENGTH
|
||||||
app_data_tls:MBEDTLS_SSL_MAX_FRAG_LEN_512:400:512:1:1
|
app_data_tls:MBEDTLS_SSL_MAX_FRAG_LEN_512:400:512:1:1
|
||||||
|
|||||||
Reference in New Issue
Block a user