Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
freebsd
GitHub Repository: freebsd/freebsd-src
Path: blob/main/crypto/openssl/providers/common/capabilities.c
48261 views
1
/*
2
* Copyright 2019-2025 The OpenSSL Project Authors. All Rights Reserved.
3
*
4
* Licensed under the Apache License 2.0 (the "License"). You may not use
5
* this file except in compliance with the License. You can obtain a copy
6
* in the file LICENSE in the source distribution or at
7
* https://www.openssl.org/source/license.html
8
*/
9
10
#include <assert.h>
11
#include <string.h>
12
#include <openssl/core_dispatch.h>
13
#include <openssl/core_names.h>
14
/* For TLS1_VERSION etc */
15
#include <openssl/prov_ssl.h>
16
#include <openssl/params.h>
17
#include "internal/nelem.h"
18
#include "internal/tlsgroups.h"
19
#include "prov/providercommon.h"
20
#include "internal/e_os.h"
21
#include "crypto/ml_kem.h"
22
23
/*
24
* If none of EC, DH OR ML-KEM are available then we have no TLS-GROUP
25
* capabilities.
26
*/
27
#if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) || \
28
!defined(OPENSSL_NO_ML_KEM)
29
typedef struct tls_group_constants_st {
30
unsigned int group_id; /* Group ID */
31
unsigned int secbits; /* Bits of security */
32
int mintls; /* Minimum TLS version, -1 unsupported */
33
int maxtls; /* Maximum TLS version (or 0 for undefined) */
34
int mindtls; /* Minimum DTLS version, -1 unsupported */
35
int maxdtls; /* Maximum DTLS version (or 0 for undefined) */
36
int is_kem; /* Indicates utility as KEM */
37
} TLS_GROUP_CONSTANTS;
38
39
/*
40
* The indices of entries in this table must be independent of which TLS groups
41
* we do or not support. It just lists basic facts about the groups, and is
42
* used by (numeric slot number) reference in the "param_group_list" below.
43
* Therefore, there must be no #ifdefs in this table, the index of each entry
44
* must be independent of compile-time options.
45
*
46
* For the FFDHE groups, the security bit values are as given by
47
* BN_security_bits(). For the ML-KEM hybrids these are the ML-KEM security
48
* bits.
49
*/
50
static const TLS_GROUP_CONSTANTS group_list[] = {
51
/* 0 */ { OSSL_TLS_GROUP_ID_sect163k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
52
/* 1 */ { OSSL_TLS_GROUP_ID_sect163r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
53
/* 2 */ { OSSL_TLS_GROUP_ID_sect163r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
54
/* 3 */ { OSSL_TLS_GROUP_ID_sect193r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
55
/* 4 */ { OSSL_TLS_GROUP_ID_sect193r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
56
/* 5 */ { OSSL_TLS_GROUP_ID_sect233k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
57
/* 6 */ { OSSL_TLS_GROUP_ID_sect233r1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
58
/* 7 */ { OSSL_TLS_GROUP_ID_sect239k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
59
/* 8 */ { OSSL_TLS_GROUP_ID_sect283k1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
60
/* 9 */ { OSSL_TLS_GROUP_ID_sect283r1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
61
/* 10 */ { OSSL_TLS_GROUP_ID_sect409k1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
62
/* 11 */ { OSSL_TLS_GROUP_ID_sect409r1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
63
/* 12 */ { OSSL_TLS_GROUP_ID_sect571k1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
64
/* 13 */ { OSSL_TLS_GROUP_ID_sect571r1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
65
/* 14 */ { OSSL_TLS_GROUP_ID_secp160k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
66
/* 15 */ { OSSL_TLS_GROUP_ID_secp160r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
67
/* 16 */ { OSSL_TLS_GROUP_ID_secp160r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
68
/* 17 */ { OSSL_TLS_GROUP_ID_secp192k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
69
/* 18 */ { OSSL_TLS_GROUP_ID_secp192r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
70
/* 19 */ { OSSL_TLS_GROUP_ID_secp224k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
71
/* 20 */ { OSSL_TLS_GROUP_ID_secp224r1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
72
/* 21 */ { OSSL_TLS_GROUP_ID_secp256k1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
73
/* 22 */ { OSSL_TLS_GROUP_ID_secp256r1, 128, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
74
/* 23 */ { OSSL_TLS_GROUP_ID_secp384r1, 192, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
75
/* 24 */ { OSSL_TLS_GROUP_ID_secp521r1, 256, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
76
/* 25 */ { OSSL_TLS_GROUP_ID_brainpoolP256r1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
77
/* 26 */ { OSSL_TLS_GROUP_ID_brainpoolP384r1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
78
/* 27 */ { OSSL_TLS_GROUP_ID_brainpoolP512r1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
79
/* 28 */ { OSSL_TLS_GROUP_ID_x25519, 128, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
80
/* 29 */ { OSSL_TLS_GROUP_ID_x448, 224, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
81
/* 30 */ { OSSL_TLS_GROUP_ID_brainpoolP256r1_tls13, 128, TLS1_3_VERSION, 0, -1, -1, 0 },
82
/* 31 */ { OSSL_TLS_GROUP_ID_brainpoolP384r1_tls13, 192, TLS1_3_VERSION, 0, -1, -1, 0 },
83
/* 32 */ { OSSL_TLS_GROUP_ID_brainpoolP512r1_tls13, 256, TLS1_3_VERSION, 0, -1, -1, 0 },
84
/* 33 */ { OSSL_TLS_GROUP_ID_ffdhe2048, 112, TLS1_3_VERSION, 0, -1, -1, 0 },
85
/* 34 */ { OSSL_TLS_GROUP_ID_ffdhe3072, 128, TLS1_3_VERSION, 0, -1, -1, 0 },
86
/* 35 */ { OSSL_TLS_GROUP_ID_ffdhe4096, 128, TLS1_3_VERSION, 0, -1, -1, 0 },
87
/* 36 */ { OSSL_TLS_GROUP_ID_ffdhe6144, 128, TLS1_3_VERSION, 0, -1, -1, 0 },
88
/* 37 */ { OSSL_TLS_GROUP_ID_ffdhe8192, 192, TLS1_3_VERSION, 0, -1, -1, 0 },
89
/* 38 */ { OSSL_TLS_GROUP_ID_mlkem512, ML_KEM_512_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
90
/* 39 */ { OSSL_TLS_GROUP_ID_mlkem768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
91
/* 40 */ { OSSL_TLS_GROUP_ID_mlkem1024, ML_KEM_1024_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
92
/* 41 */ { OSSL_TLS_GROUP_ID_X25519MLKEM768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
93
/* 42 */ { OSSL_TLS_GROUP_ID_SecP256r1MLKEM768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
94
/* 43 */ { OSSL_TLS_GROUP_ID_SecP384r1MLKEM1024, ML_KEM_1024_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
95
};
96
97
#define TLS_GROUP_ENTRY(tlsname, realname, algorithm, idx) \
98
{ \
99
OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_NAME, \
100
tlsname, \
101
sizeof(tlsname)), \
102
OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_NAME_INTERNAL, \
103
realname, \
104
sizeof(realname)), \
105
OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_ALG, \
106
algorithm, \
107
sizeof(algorithm)), \
108
OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_GROUP_ID, \
109
(unsigned int *)&group_list[idx].group_id), \
110
OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_GROUP_SECURITY_BITS, \
111
(unsigned int *)&group_list[idx].secbits), \
112
OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MIN_TLS, \
113
(unsigned int *)&group_list[idx].mintls), \
114
OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MAX_TLS, \
115
(unsigned int *)&group_list[idx].maxtls), \
116
OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MIN_DTLS, \
117
(unsigned int *)&group_list[idx].mindtls), \
118
OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MAX_DTLS, \
119
(unsigned int *)&group_list[idx].maxdtls), \
120
OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_IS_KEM, \
121
(unsigned int *)&group_list[idx].is_kem), \
122
OSSL_PARAM_END \
123
}
124
125
/*-
126
* - The 4th field of each entry is an index into "group_list" above.
127
*
128
* - The 3rd field is the key management algorithm name.
129
130
* - The 2nd field is the GROUP_NAME used with the provider, needed for
131
* providers that implement a family of related algorithms, but required
132
* non-null even when the provider implements just one.
133
*
134
* - The 1st field is the TLS group name used in SSL_CTX_set_group_list(),
135
* aliases repeat everything but the first field.
136
*
137
* Curves 1..22 were deprecated in:
138
*
139
* https://www.rfc-editor.org/rfc/rfc8422.html
140
*
141
* leaving just:
142
*
143
* enum {
144
* deprecated(1..22),
145
* secp256r1 (23), secp384r1 (24), secp521r1 (25),
146
* x25519(29), x448(30),
147
* reserved (0xFE00..0xFEFF),
148
* deprecated(0xFF01..0xFF02),
149
* (0xFFFF)
150
* } NamedCurve;
151
*
152
* and those added later (FFDHE, brainpool, ML-KEM)
153
*/
154
static const OSSL_PARAM param_group_list[][11] = {
155
# ifndef OPENSSL_NO_EC
156
# if !defined(OPENSSL_NO_ML_KEM)
157
# if !defined(OPENSSL_NO_ECX)
158
TLS_GROUP_ENTRY("X25519MLKEM768", "", "X25519MLKEM768", 41),
159
# endif
160
# endif
161
# ifndef FIPS_MODULE
162
TLS_GROUP_ENTRY("x25519", "X25519", "X25519", 28),
163
TLS_GROUP_ENTRY("x448", "X448", "X448", 29),
164
# endif
165
TLS_GROUP_ENTRY("secp256r1", "prime256v1", "EC", 22),
166
TLS_GROUP_ENTRY("P-256", "prime256v1", "EC", 22), /* Alias of above */
167
TLS_GROUP_ENTRY("secp384r1", "secp384r1", "EC", 23),
168
TLS_GROUP_ENTRY("P-384", "secp384r1", "EC", 23), /* Alias of above */
169
TLS_GROUP_ENTRY("secp521r1", "secp521r1", "EC", 24),
170
TLS_GROUP_ENTRY("P-521", "secp521r1", "EC", 24), /* Alias of above */
171
# endif /* OPENSSL_NO_EC */
172
# ifndef OPENSSL_NO_DH
173
/* Security bit values for FFDHE groups are as per RFC 7919 */
174
TLS_GROUP_ENTRY("ffdhe2048", "ffdhe2048", "DH", 33),
175
TLS_GROUP_ENTRY("ffdhe3072", "ffdhe3072", "DH", 34),
176
# endif
177
# if !defined(OPENSSL_NO_ML_KEM)
178
/* https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8 */
179
TLS_GROUP_ENTRY("MLKEM512", "", "ML-KEM-512", 38),
180
TLS_GROUP_ENTRY("MLKEM768", "", "ML-KEM-768", 39),
181
TLS_GROUP_ENTRY("MLKEM1024", "", "ML-KEM-1024", 40),
182
# endif
183
# ifndef OPENSSL_NO_EC
184
# ifndef FIPS_MODULE
185
TLS_GROUP_ENTRY("brainpoolP256r1", "brainpoolP256r1", "EC", 25),
186
TLS_GROUP_ENTRY("brainpoolP384r1", "brainpoolP384r1", "EC", 26),
187
TLS_GROUP_ENTRY("brainpoolP512r1", "brainpoolP512r1", "EC", 27),
188
TLS_GROUP_ENTRY("brainpoolP256r1tls13", "brainpoolP256r1", "EC", 30),
189
TLS_GROUP_ENTRY("brainpoolP384r1tls13", "brainpoolP384r1", "EC", 31),
190
TLS_GROUP_ENTRY("brainpoolP512r1tls13", "brainpoolP512r1", "EC", 32),
191
# endif
192
# ifndef OPENSSL_NO_ML_KEM
193
TLS_GROUP_ENTRY("SecP256r1MLKEM768", "", "SecP256r1MLKEM768", 42),
194
TLS_GROUP_ENTRY("SecP384r1MLKEM1024", "", "SecP384r1MLKEM1024", 43),
195
# endif
196
# endif
197
# ifndef OPENSSL_NO_DH
198
TLS_GROUP_ENTRY("ffdhe4096", "ffdhe4096", "DH", 35),
199
TLS_GROUP_ENTRY("ffdhe6144", "ffdhe6144", "DH", 36),
200
TLS_GROUP_ENTRY("ffdhe8192", "ffdhe8192", "DH", 37),
201
# endif
202
# ifndef OPENSSL_NO_TLS_DEPRECATED_EC
203
# ifndef OPENSSL_NO_EC2M
204
TLS_GROUP_ENTRY("sect163k1", "sect163k1", "EC", 0),
205
TLS_GROUP_ENTRY("K-163", "sect163k1", "EC", 0), /* Alias of above */
206
# endif
207
# ifndef FIPS_MODULE
208
TLS_GROUP_ENTRY("sect163r1", "sect163r1", "EC", 1),
209
# endif
210
# ifndef OPENSSL_NO_EC2M
211
TLS_GROUP_ENTRY("sect163r2", "sect163r2", "EC", 2),
212
TLS_GROUP_ENTRY("B-163", "sect163r2", "EC", 2), /* Alias of above */
213
# endif
214
# ifndef FIPS_MODULE
215
TLS_GROUP_ENTRY("sect193r1", "sect193r1", "EC", 3),
216
TLS_GROUP_ENTRY("sect193r2", "sect193r2", "EC", 4),
217
# endif
218
# ifndef OPENSSL_NO_EC2M
219
TLS_GROUP_ENTRY("sect233k1", "sect233k1", "EC", 5),
220
TLS_GROUP_ENTRY("K-233", "sect233k1", "EC", 5), /* Alias of above */
221
TLS_GROUP_ENTRY("sect233r1", "sect233r1", "EC", 6),
222
TLS_GROUP_ENTRY("B-233", "sect233r1", "EC", 6), /* Alias of above */
223
# endif
224
# ifndef FIPS_MODULE
225
TLS_GROUP_ENTRY("sect239k1", "sect239k1", "EC", 7),
226
# endif
227
# ifndef OPENSSL_NO_EC2M
228
TLS_GROUP_ENTRY("sect283k1", "sect283k1", "EC", 8),
229
TLS_GROUP_ENTRY("K-283", "sect283k1", "EC", 8), /* Alias of above */
230
TLS_GROUP_ENTRY("sect283r1", "sect283r1", "EC", 9),
231
TLS_GROUP_ENTRY("B-283", "sect283r1", "EC", 9), /* Alias of above */
232
TLS_GROUP_ENTRY("sect409k1", "sect409k1", "EC", 10),
233
TLS_GROUP_ENTRY("K-409", "sect409k1", "EC", 10), /* Alias of above */
234
TLS_GROUP_ENTRY("sect409r1", "sect409r1", "EC", 11),
235
TLS_GROUP_ENTRY("B-409", "sect409r1", "EC", 11), /* Alias of above */
236
TLS_GROUP_ENTRY("sect571k1", "sect571k1", "EC", 12),
237
TLS_GROUP_ENTRY("K-571", "sect571k1", "EC", 12), /* Alias of above */
238
TLS_GROUP_ENTRY("sect571r1", "sect571r1", "EC", 13),
239
TLS_GROUP_ENTRY("B-571", "sect571r1", "EC", 13), /* Alias of above */
240
# endif
241
# ifndef FIPS_MODULE
242
TLS_GROUP_ENTRY("secp160k1", "secp160k1", "EC", 14),
243
TLS_GROUP_ENTRY("secp160r1", "secp160r1", "EC", 15),
244
TLS_GROUP_ENTRY("secp160r2", "secp160r2", "EC", 16),
245
TLS_GROUP_ENTRY("secp192k1", "secp192k1", "EC", 17),
246
# endif
247
TLS_GROUP_ENTRY("secp192r1", "prime192v1", "EC", 18),
248
TLS_GROUP_ENTRY("P-192", "prime192v1", "EC", 18), /* Alias of above */
249
# ifndef FIPS_MODULE
250
TLS_GROUP_ENTRY("secp224k1", "secp224k1", "EC", 19),
251
# endif
252
TLS_GROUP_ENTRY("secp224r1", "secp224r1", "EC", 20),
253
TLS_GROUP_ENTRY("P-224", "secp224r1", "EC", 20), /* Alias of above */
254
# ifndef FIPS_MODULE
255
TLS_GROUP_ENTRY("secp256k1", "secp256k1", "EC", 21),
256
# endif
257
# endif /* !defined(OPENSSL_NO_TLS_DEPRECATED_EC) */
258
};
259
#endif /* !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_ML_KEM) */
260
261
static int tls_group_capability(OSSL_CALLBACK *cb, void *arg)
262
{
263
#if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_ML_KEM)
264
size_t i;
265
266
for (i = 0; i < OSSL_NELEM(param_group_list); i++)
267
if (!cb(param_group_list[i], arg))
268
return 0;
269
#endif
270
271
return 1;
272
}
273
274
/* --------------------------------------------------------------- */
275
276
#if !defined(OPENSSL_NO_ML_DSA)
277
278
typedef struct tls_sigalg_constants_st {
279
unsigned int code_point;
280
unsigned int sec_bits; /* Bits of security */
281
int min_tls; /* Minimum TLS version, -1 unsupported */
282
int max_tls; /* Maximum TLS version (or 0 for undefined) */
283
int min_dtls; /* Minimum DTLS version, -1 unsupported */
284
int max_dtls; /* Maximum DTLS version (or 0 for undefined) */
285
} TLS_SIGALG_CONSTANTS;
286
287
static const TLS_SIGALG_CONSTANTS sigalg_constants_list[3] = {
288
{ 0x0904, 128, TLS1_3_VERSION, 0, -1, -1 },
289
{ 0x0905, 192, TLS1_3_VERSION, 0, -1, -1 },
290
{ 0x0906, 256, TLS1_3_VERSION, 0, -1, -1 },
291
};
292
293
# define TLS_SIGALG_ENTRY(tlsname, algorithm, oid, idx) \
294
{ \
295
OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_SIGALG_IANA_NAME, \
296
tlsname, sizeof(tlsname)), \
297
OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_SIGALG_NAME, \
298
algorithm, sizeof(algorithm)), \
299
OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_SIGALG_OID, \
300
oid, sizeof(oid)), \
301
OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_SIGALG_CODE_POINT, \
302
(unsigned int *)&sigalg_constants_list[idx].code_point),\
303
OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_SIGALG_SECURITY_BITS, \
304
(unsigned int *)&sigalg_constants_list[idx].sec_bits), \
305
OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MIN_TLS, \
306
(unsigned int *)&sigalg_constants_list[idx].min_tls), \
307
OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MAX_TLS, \
308
(unsigned int *)&sigalg_constants_list[idx].max_tls), \
309
OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MIN_DTLS, \
310
(unsigned int *)&sigalg_constants_list[idx].min_dtls), \
311
OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MAX_DTLS, \
312
(unsigned int *)&sigalg_constants_list[idx].max_dtls), \
313
OSSL_PARAM_END \
314
}
315
316
static const OSSL_PARAM param_sigalg_list[][10] = {
317
TLS_SIGALG_ENTRY("mldsa44", "ML-DSA-44", "2.16.840.1.101.3.4.3.17", 0),
318
TLS_SIGALG_ENTRY("mldsa65", "ML-DSA-65", "2.16.840.1.101.3.4.3.18", 1),
319
TLS_SIGALG_ENTRY("mldsa87", "ML-DSA-87", "2.16.840.1.101.3.4.3.19", 2),
320
};
321
#endif /* OPENSSL_NO_ML_DSA */
322
323
static int tls_sigalg_capability(OSSL_CALLBACK *cb, void *arg)
324
{
325
#if !defined(OPENSSL_NO_ML_DSA)
326
size_t i;
327
328
for (i = 0; i < OSSL_NELEM(param_sigalg_list); i++)
329
if (!cb(param_sigalg_list[i], arg))
330
return 0;
331
#endif
332
return 1;
333
}
334
335
int ossl_prov_get_capabilities(void *provctx, const char *capability,
336
OSSL_CALLBACK *cb, void *arg)
337
{
338
if (OPENSSL_strcasecmp(capability, "TLS-GROUP") == 0)
339
return tls_group_capability(cb, arg);
340
if (OPENSSL_strcasecmp(capability, "TLS-SIGALG") == 0)
341
return tls_sigalg_capability(cb, arg);
342
343
/* We don't support this capability */
344
return 0;
345
}
346
347