1 /*
2 * Copyright 2019-2025 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10 #include <assert.h>
11 #include <string.h>
12 #include <openssl/core_dispatch.h>
13 #include <openssl/core_names.h>
14 /* For TLS1_VERSION etc */
15 #include <openssl/prov_ssl.h>
16 #include <openssl/params.h>
17 #include "internal/nelem.h"
18 #include "internal/tlsgroups.h"
19 #include "prov/providercommon.h"
20 #include "internal/e_os.h"
21 #include "crypto/ml_kem.h"
22
23 /*
24 * If none of EC, DH OR ML-KEM are available then we have no TLS-GROUP
25 * capabilities.
26 */
27 #if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_ML_KEM)
28 typedef struct tls_group_constants_st {
29 unsigned int group_id; /* Group ID */
30 unsigned int secbits; /* Bits of security */
31 int mintls; /* Minimum TLS version, -1 unsupported */
32 int maxtls; /* Maximum TLS version (or 0 for undefined) */
33 int mindtls; /* Minimum DTLS version, -1 unsupported */
34 int maxdtls; /* Maximum DTLS version (or 0 for undefined) */
35 int is_kem; /* Indicates utility as KEM */
36 } TLS_GROUP_CONSTANTS;
37
38 /*
39 * The indices of entries in this table must be independent of which TLS groups
40 * we do or not support. It just lists basic facts about the groups, and is
41 * used by (numeric slot number) reference in the "param_group_list" below.
42 * Therefore, there must be no #ifdefs in this table, the index of each entry
43 * must be independent of compile-time options.
44 *
45 * For the FFDHE groups, the security bit values are as given by
46 * BN_security_bits(). For the ML-KEM hybrids these are the ML-KEM security
47 * bits.
48 */
49 static const TLS_GROUP_CONSTANTS group_list[] = {
50 /* 0 */ { OSSL_TLS_GROUP_ID_sect163k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
51 /* 1 */ { OSSL_TLS_GROUP_ID_sect163r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
52 /* 2 */ { OSSL_TLS_GROUP_ID_sect163r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
53 /* 3 */ { OSSL_TLS_GROUP_ID_sect193r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
54 /* 4 */ { OSSL_TLS_GROUP_ID_sect193r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
55 /* 5 */ { OSSL_TLS_GROUP_ID_sect233k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
56 /* 6 */ { OSSL_TLS_GROUP_ID_sect233r1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
57 /* 7 */ { OSSL_TLS_GROUP_ID_sect239k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
58 /* 8 */ { OSSL_TLS_GROUP_ID_sect283k1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
59 /* 9 */ { OSSL_TLS_GROUP_ID_sect283r1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
60 /* 10 */ { OSSL_TLS_GROUP_ID_sect409k1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
61 /* 11 */ { OSSL_TLS_GROUP_ID_sect409r1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
62 /* 12 */ { OSSL_TLS_GROUP_ID_sect571k1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
63 /* 13 */ { OSSL_TLS_GROUP_ID_sect571r1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
64 /* 14 */ { OSSL_TLS_GROUP_ID_secp160k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
65 /* 15 */ { OSSL_TLS_GROUP_ID_secp160r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
66 /* 16 */ { OSSL_TLS_GROUP_ID_secp160r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
67 /* 17 */ { OSSL_TLS_GROUP_ID_secp192k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
68 /* 18 */ { OSSL_TLS_GROUP_ID_secp192r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
69 /* 19 */ { OSSL_TLS_GROUP_ID_secp224k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
70 /* 20 */ { OSSL_TLS_GROUP_ID_secp224r1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
71 /* 21 */ { OSSL_TLS_GROUP_ID_secp256k1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
72 /* 22 */ { OSSL_TLS_GROUP_ID_secp256r1, 128, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
73 /* 23 */ { OSSL_TLS_GROUP_ID_secp384r1, 192, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
74 /* 24 */ { OSSL_TLS_GROUP_ID_secp521r1, 256, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
75 /* 25 */ { OSSL_TLS_GROUP_ID_brainpoolP256r1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
76 /* 26 */ { OSSL_TLS_GROUP_ID_brainpoolP384r1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
77 /* 27 */ { OSSL_TLS_GROUP_ID_brainpoolP512r1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
78 /* 28 */ { OSSL_TLS_GROUP_ID_x25519, 128, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
79 /* 29 */ { OSSL_TLS_GROUP_ID_x448, 224, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
80 /* 30 */ { OSSL_TLS_GROUP_ID_brainpoolP256r1_tls13, 128, TLS1_3_VERSION, 0, -1, -1, 0 },
81 /* 31 */ { OSSL_TLS_GROUP_ID_brainpoolP384r1_tls13, 192, TLS1_3_VERSION, 0, -1, -1, 0 },
82 /* 32 */ { OSSL_TLS_GROUP_ID_brainpoolP512r1_tls13, 256, TLS1_3_VERSION, 0, -1, -1, 0 },
83 /* 33 */ { OSSL_TLS_GROUP_ID_ffdhe2048, 112, TLS1_3_VERSION, 0, -1, -1, 0 },
84 /* 34 */ { OSSL_TLS_GROUP_ID_ffdhe3072, 128, TLS1_3_VERSION, 0, -1, -1, 0 },
85 /* 35 */ { OSSL_TLS_GROUP_ID_ffdhe4096, 128, TLS1_3_VERSION, 0, -1, -1, 0 },
86 /* 36 */ { OSSL_TLS_GROUP_ID_ffdhe6144, 128, TLS1_3_VERSION, 0, -1, -1, 0 },
87 /* 37 */ { OSSL_TLS_GROUP_ID_ffdhe8192, 192, TLS1_3_VERSION, 0, -1, -1, 0 },
88 /* 38 */ { OSSL_TLS_GROUP_ID_mlkem512, ML_KEM_512_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
89 /* 39 */ { OSSL_TLS_GROUP_ID_mlkem768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
90 /* 40 */ { OSSL_TLS_GROUP_ID_mlkem1024, ML_KEM_1024_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
91 /* 41 */ { OSSL_TLS_GROUP_ID_X25519MLKEM768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
92 /* 42 */ { OSSL_TLS_GROUP_ID_SecP256r1MLKEM768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
93 /* 43 */ { OSSL_TLS_GROUP_ID_SecP384r1MLKEM1024, ML_KEM_1024_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
94 };
95
96 #define TLS_GROUP_ENTRY(tlsname, realname, algorithm, idx) \
97 { \
98 OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_NAME, \
99 tlsname, \
100 sizeof(tlsname)), \
101 OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_NAME_INTERNAL, \
102 realname, \
103 sizeof(realname)), \
104 OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_ALG, \
105 algorithm, \
106 sizeof(algorithm)), \
107 OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_GROUP_ID, \
108 (unsigned int *)&group_list[idx].group_id), \
109 OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_GROUP_SECURITY_BITS, \
110 (unsigned int *)&group_list[idx].secbits), \
111 OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MIN_TLS, \
112 (unsigned int *)&group_list[idx].mintls), \
113 OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MAX_TLS, \
114 (unsigned int *)&group_list[idx].maxtls), \
115 OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MIN_DTLS, \
116 (unsigned int *)&group_list[idx].mindtls), \
117 OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MAX_DTLS, \
118 (unsigned int *)&group_list[idx].maxdtls), \
119 OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_IS_KEM, \
120 (unsigned int *)&group_list[idx].is_kem), \
121 OSSL_PARAM_END \
122 }
123
124 /*-
125 * - The 4th field of each entry is an index into "group_list" above.
126 *
127 * - The 3rd field is the key management algorithm name.
128
129 * - The 2nd field is the GROUP_NAME used with the provider, needed for
130 * providers that implement a family of related algorithms, but required
131 * non-null even when the provider implements just one.
132 *
133 * - The 1st field is the TLS group name used in SSL_CTX_set_group_list(),
134 * aliases repeat everything but the first field.
135 *
136 * Curves 1..22 were deprecated in:
137 *
138 * https://www.rfc-editor.org/rfc/rfc8422.html
139 *
140 * leaving just:
141 *
142 * enum {
143 * deprecated(1..22),
144 * secp256r1 (23), secp384r1 (24), secp521r1 (25),
145 * x25519(29), x448(30),
146 * reserved (0xFE00..0xFEFF),
147 * deprecated(0xFF01..0xFF02),
148 * (0xFFFF)
149 * } NamedCurve;
150 *
151 * and those added later (FFDHE, brainpool, ML-KEM)
152 */
153 static const OSSL_PARAM param_group_list[][11] = {
154 #ifndef OPENSSL_NO_EC
155 #if !defined(OPENSSL_NO_ML_KEM)
156 #if !defined(OPENSSL_NO_ECX)
157 TLS_GROUP_ENTRY("X25519MLKEM768", "", "X25519MLKEM768", 41),
158 #endif
159 #endif
160 #ifndef FIPS_MODULE
161 TLS_GROUP_ENTRY("x25519", "X25519", "X25519", 28),
162 TLS_GROUP_ENTRY("x448", "X448", "X448", 29),
163 #endif
164 TLS_GROUP_ENTRY("secp256r1", "prime256v1", "EC", 22),
165 TLS_GROUP_ENTRY("P-256", "prime256v1", "EC", 22), /* Alias of above */
166 TLS_GROUP_ENTRY("secp384r1", "secp384r1", "EC", 23),
167 TLS_GROUP_ENTRY("P-384", "secp384r1", "EC", 23), /* Alias of above */
168 TLS_GROUP_ENTRY("secp521r1", "secp521r1", "EC", 24),
169 TLS_GROUP_ENTRY("P-521", "secp521r1", "EC", 24), /* Alias of above */
170 #endif /* OPENSSL_NO_EC */
171 #ifndef OPENSSL_NO_DH
172 /* Security bit values for FFDHE groups are as per RFC 7919 */
173 TLS_GROUP_ENTRY("ffdhe2048", "ffdhe2048", "DH", 33),
174 TLS_GROUP_ENTRY("ffdhe3072", "ffdhe3072", "DH", 34),
175 #endif
176 #if !defined(OPENSSL_NO_ML_KEM)
177 /* https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8 */
178 TLS_GROUP_ENTRY("MLKEM512", "", "ML-KEM-512", 38),
179 TLS_GROUP_ENTRY("MLKEM768", "", "ML-KEM-768", 39),
180 TLS_GROUP_ENTRY("MLKEM1024", "", "ML-KEM-1024", 40),
181 #endif
182 #ifndef OPENSSL_NO_EC
183 #ifndef FIPS_MODULE
184 TLS_GROUP_ENTRY("brainpoolP256r1", "brainpoolP256r1", "EC", 25),
185 TLS_GROUP_ENTRY("brainpoolP384r1", "brainpoolP384r1", "EC", 26),
186 TLS_GROUP_ENTRY("brainpoolP512r1", "brainpoolP512r1", "EC", 27),
187 TLS_GROUP_ENTRY("brainpoolP256r1tls13", "brainpoolP256r1", "EC", 30),
188 TLS_GROUP_ENTRY("brainpoolP384r1tls13", "brainpoolP384r1", "EC", 31),
189 TLS_GROUP_ENTRY("brainpoolP512r1tls13", "brainpoolP512r1", "EC", 32),
190 #endif
191 #ifndef OPENSSL_NO_ML_KEM
192 TLS_GROUP_ENTRY("SecP256r1MLKEM768", "", "SecP256r1MLKEM768", 42),
193 TLS_GROUP_ENTRY("SecP384r1MLKEM1024", "", "SecP384r1MLKEM1024", 43),
194 #endif
195 #endif
196 #ifndef OPENSSL_NO_DH
197 TLS_GROUP_ENTRY("ffdhe4096", "ffdhe4096", "DH", 35),
198 TLS_GROUP_ENTRY("ffdhe6144", "ffdhe6144", "DH", 36),
199 TLS_GROUP_ENTRY("ffdhe8192", "ffdhe8192", "DH", 37),
200 #endif
201 #ifndef OPENSSL_NO_TLS_DEPRECATED_EC
202 #ifndef OPENSSL_NO_EC2M
203 TLS_GROUP_ENTRY("sect163k1", "sect163k1", "EC", 0),
204 TLS_GROUP_ENTRY("K-163", "sect163k1", "EC", 0), /* Alias of above */
205 #endif
206 #ifndef FIPS_MODULE
207 TLS_GROUP_ENTRY("sect163r1", "sect163r1", "EC", 1),
208 #endif
209 #ifndef OPENSSL_NO_EC2M
210 TLS_GROUP_ENTRY("sect163r2", "sect163r2", "EC", 2),
211 TLS_GROUP_ENTRY("B-163", "sect163r2", "EC", 2), /* Alias of above */
212 #endif
213 #ifndef FIPS_MODULE
214 TLS_GROUP_ENTRY("sect193r1", "sect193r1", "EC", 3),
215 TLS_GROUP_ENTRY("sect193r2", "sect193r2", "EC", 4),
216 #endif
217 #ifndef OPENSSL_NO_EC2M
218 TLS_GROUP_ENTRY("sect233k1", "sect233k1", "EC", 5),
219 TLS_GROUP_ENTRY("K-233", "sect233k1", "EC", 5), /* Alias of above */
220 TLS_GROUP_ENTRY("sect233r1", "sect233r1", "EC", 6),
221 TLS_GROUP_ENTRY("B-233", "sect233r1", "EC", 6), /* Alias of above */
222 #endif
223 #ifndef FIPS_MODULE
224 TLS_GROUP_ENTRY("sect239k1", "sect239k1", "EC", 7),
225 #endif
226 #ifndef OPENSSL_NO_EC2M
227 TLS_GROUP_ENTRY("sect283k1", "sect283k1", "EC", 8),
228 TLS_GROUP_ENTRY("K-283", "sect283k1", "EC", 8), /* Alias of above */
229 TLS_GROUP_ENTRY("sect283r1", "sect283r1", "EC", 9),
230 TLS_GROUP_ENTRY("B-283", "sect283r1", "EC", 9), /* Alias of above */
231 TLS_GROUP_ENTRY("sect409k1", "sect409k1", "EC", 10),
232 TLS_GROUP_ENTRY("K-409", "sect409k1", "EC", 10), /* Alias of above */
233 TLS_GROUP_ENTRY("sect409r1", "sect409r1", "EC", 11),
234 TLS_GROUP_ENTRY("B-409", "sect409r1", "EC", 11), /* Alias of above */
235 TLS_GROUP_ENTRY("sect571k1", "sect571k1", "EC", 12),
236 TLS_GROUP_ENTRY("K-571", "sect571k1", "EC", 12), /* Alias of above */
237 TLS_GROUP_ENTRY("sect571r1", "sect571r1", "EC", 13),
238 TLS_GROUP_ENTRY("B-571", "sect571r1", "EC", 13), /* Alias of above */
239 #endif
240 #ifndef FIPS_MODULE
241 TLS_GROUP_ENTRY("secp160k1", "secp160k1", "EC", 14),
242 TLS_GROUP_ENTRY("secp160r1", "secp160r1", "EC", 15),
243 TLS_GROUP_ENTRY("secp160r2", "secp160r2", "EC", 16),
244 TLS_GROUP_ENTRY("secp192k1", "secp192k1", "EC", 17),
245 #endif
246 TLS_GROUP_ENTRY("secp192r1", "prime192v1", "EC", 18),
247 TLS_GROUP_ENTRY("P-192", "prime192v1", "EC", 18), /* Alias of above */
248 #ifndef FIPS_MODULE
249 TLS_GROUP_ENTRY("secp224k1", "secp224k1", "EC", 19),
250 #endif
251 TLS_GROUP_ENTRY("secp224r1", "secp224r1", "EC", 20),
252 TLS_GROUP_ENTRY("P-224", "secp224r1", "EC", 20), /* Alias of above */
253 #ifndef FIPS_MODULE
254 TLS_GROUP_ENTRY("secp256k1", "secp256k1", "EC", 21),
255 #endif
256 #endif /* !defined(OPENSSL_NO_TLS_DEPRECATED_EC) */
257 };
258 #endif /* !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_ML_KEM) */
259
tls_group_capability(OSSL_CALLBACK * cb,void * arg)260 static int tls_group_capability(OSSL_CALLBACK *cb, void *arg)
261 {
262 #if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_ML_KEM)
263 size_t i;
264
265 for (i = 0; i < OSSL_NELEM(param_group_list); i++)
266 if (!cb(param_group_list[i], arg))
267 return 0;
268 #endif
269
270 return 1;
271 }
272
273 /* --------------------------------------------------------------- */
274
275 #if !defined(OPENSSL_NO_ML_DSA)
276
277 typedef struct tls_sigalg_constants_st {
278 unsigned int code_point;
279 unsigned int sec_bits; /* Bits of security */
280 int min_tls; /* Minimum TLS version, -1 unsupported */
281 int max_tls; /* Maximum TLS version (or 0 for undefined) */
282 int min_dtls; /* Minimum DTLS version, -1 unsupported */
283 int max_dtls; /* Maximum DTLS version (or 0 for undefined) */
284 } TLS_SIGALG_CONSTANTS;
285
286 static const TLS_SIGALG_CONSTANTS sigalg_constants_list[3] = {
287 { 0x0904, 128, TLS1_3_VERSION, 0, -1, -1 },
288 { 0x0905, 192, TLS1_3_VERSION, 0, -1, -1 },
289 { 0x0906, 256, TLS1_3_VERSION, 0, -1, -1 },
290 };
291
292 #define TLS_SIGALG_ENTRY(tlsname, algorithm, oid, idx) \
293 { \
294 OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_SIGALG_IANA_NAME, \
295 tlsname, sizeof(tlsname)), \
296 OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_SIGALG_NAME, \
297 algorithm, sizeof(algorithm)), \
298 OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_SIGALG_OID, \
299 oid, sizeof(oid)), \
300 OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_SIGALG_CODE_POINT, \
301 (unsigned int *)&sigalg_constants_list[idx].code_point), \
302 OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_SIGALG_SECURITY_BITS, \
303 (unsigned int *)&sigalg_constants_list[idx].sec_bits), \
304 OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MIN_TLS, \
305 (unsigned int *)&sigalg_constants_list[idx].min_tls), \
306 OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MAX_TLS, \
307 (unsigned int *)&sigalg_constants_list[idx].max_tls), \
308 OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MIN_DTLS, \
309 (unsigned int *)&sigalg_constants_list[idx].min_dtls), \
310 OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MAX_DTLS, \
311 (unsigned int *)&sigalg_constants_list[idx].max_dtls), \
312 OSSL_PARAM_END \
313 }
314
315 static const OSSL_PARAM param_sigalg_list[][10] = {
316 TLS_SIGALG_ENTRY("mldsa44", "ML-DSA-44", "2.16.840.1.101.3.4.3.17", 0),
317 TLS_SIGALG_ENTRY("mldsa65", "ML-DSA-65", "2.16.840.1.101.3.4.3.18", 1),
318 TLS_SIGALG_ENTRY("mldsa87", "ML-DSA-87", "2.16.840.1.101.3.4.3.19", 2),
319 };
320 #endif /* OPENSSL_NO_ML_DSA */
321
tls_sigalg_capability(OSSL_CALLBACK * cb,void * arg)322 static int tls_sigalg_capability(OSSL_CALLBACK *cb, void *arg)
323 {
324 #if !defined(OPENSSL_NO_ML_DSA)
325 size_t i;
326
327 for (i = 0; i < OSSL_NELEM(param_sigalg_list); i++)
328 if (!cb(param_sigalg_list[i], arg))
329 return 0;
330 #endif
331 return 1;
332 }
333
ossl_prov_get_capabilities(void * provctx,const char * capability,OSSL_CALLBACK * cb,void * arg)334 int ossl_prov_get_capabilities(void *provctx, const char *capability,
335 OSSL_CALLBACK *cb, void *arg)
336 {
337 if (OPENSSL_strcasecmp(capability, "TLS-GROUP") == 0)
338 return tls_group_capability(cb, arg);
339 if (OPENSSL_strcasecmp(capability, "TLS-SIGALG") == 0)
340 return tls_sigalg_capability(cb, arg);
341
342 /* We don't support this capability */
343 return 0;
344 }
345