xref: /freebsd/crypto/openssl/providers/common/capabilities.c (revision e7be843b4a162e68651d3911f0357ed464915629)
1 /*
2  * Copyright 2019-2025 The OpenSSL Project Authors. All Rights Reserved.
3  *
4  * Licensed under the Apache License 2.0 (the "License").  You may not use
5  * this file except in compliance with the License.  You can obtain a copy
6  * in the file LICENSE in the source distribution or at
7  * https://www.openssl.org/source/license.html
8  */
9 
10 #include <assert.h>
11 #include <string.h>
12 #include <openssl/core_dispatch.h>
13 #include <openssl/core_names.h>
14 /* For TLS1_VERSION etc */
15 #include <openssl/prov_ssl.h>
16 #include <openssl/params.h>
17 #include "internal/nelem.h"
18 #include "internal/tlsgroups.h"
19 #include "prov/providercommon.h"
20 #include "internal/e_os.h"
21 #include "crypto/ml_kem.h"
22 
23 /*
24  * If none of EC, DH OR ML-KEM are available then we have no TLS-GROUP
25  * capabilities.
26  */
27 #if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) || \
28     !defined(OPENSSL_NO_ML_KEM)
29 typedef struct tls_group_constants_st {
30     unsigned int group_id;   /* Group ID */
31     unsigned int secbits;    /* Bits of security */
32     int mintls;              /* Minimum TLS version, -1 unsupported */
33     int maxtls;              /* Maximum TLS version (or 0 for undefined) */
34     int mindtls;             /* Minimum DTLS version, -1 unsupported */
35     int maxdtls;             /* Maximum DTLS version (or 0 for undefined) */
36     int is_kem;              /* Indicates utility as KEM */
37 } TLS_GROUP_CONSTANTS;
38 
39 /*
40  * The indices of entries in this table must be independent of which TLS groups
41  * we do or not support.  It just lists basic facts about the groups, and is
42  * used by (numeric slot number) reference in the "param_group_list" below.
43  * Therefore, there must be no #ifdefs in this table, the index of each entry
44  * must be independent of compile-time options.
45  *
46  * For the FFDHE groups, the security bit values are as given by
47  * BN_security_bits().  For the ML-KEM hybrids these are the ML-KEM security
48  * bits.
49  */
50 static const TLS_GROUP_CONSTANTS group_list[] = {
51     /*  0 */ { OSSL_TLS_GROUP_ID_sect163k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
52     /*  1 */ { OSSL_TLS_GROUP_ID_sect163r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
53     /*  2 */ { OSSL_TLS_GROUP_ID_sect163r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
54     /*  3 */ { OSSL_TLS_GROUP_ID_sect193r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
55     /*  4 */ { OSSL_TLS_GROUP_ID_sect193r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
56     /*  5 */ { OSSL_TLS_GROUP_ID_sect233k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
57     /*  6 */ { OSSL_TLS_GROUP_ID_sect233r1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
58     /*  7 */ { OSSL_TLS_GROUP_ID_sect239k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
59     /*  8 */ { OSSL_TLS_GROUP_ID_sect283k1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
60     /*  9 */ { OSSL_TLS_GROUP_ID_sect283r1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
61     /* 10 */ { OSSL_TLS_GROUP_ID_sect409k1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
62     /* 11 */ { OSSL_TLS_GROUP_ID_sect409r1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
63     /* 12 */ { OSSL_TLS_GROUP_ID_sect571k1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
64     /* 13 */ { OSSL_TLS_GROUP_ID_sect571r1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
65     /* 14 */ { OSSL_TLS_GROUP_ID_secp160k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
66     /* 15 */ { OSSL_TLS_GROUP_ID_secp160r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
67     /* 16 */ { OSSL_TLS_GROUP_ID_secp160r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
68     /* 17 */ { OSSL_TLS_GROUP_ID_secp192k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
69     /* 18 */ { OSSL_TLS_GROUP_ID_secp192r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
70     /* 19 */ { OSSL_TLS_GROUP_ID_secp224k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
71     /* 20 */ { OSSL_TLS_GROUP_ID_secp224r1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
72     /* 21 */ { OSSL_TLS_GROUP_ID_secp256k1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
73     /* 22 */ { OSSL_TLS_GROUP_ID_secp256r1, 128, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
74     /* 23 */ { OSSL_TLS_GROUP_ID_secp384r1, 192, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
75     /* 24 */ { OSSL_TLS_GROUP_ID_secp521r1, 256, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
76     /* 25 */ { OSSL_TLS_GROUP_ID_brainpoolP256r1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
77     /* 26 */ { OSSL_TLS_GROUP_ID_brainpoolP384r1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
78     /* 27 */ { OSSL_TLS_GROUP_ID_brainpoolP512r1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 },
79     /* 28 */ { OSSL_TLS_GROUP_ID_x25519, 128, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
80     /* 29 */ { OSSL_TLS_GROUP_ID_x448, 224, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 },
81     /* 30 */ { OSSL_TLS_GROUP_ID_brainpoolP256r1_tls13, 128, TLS1_3_VERSION, 0, -1, -1, 0 },
82     /* 31 */ { OSSL_TLS_GROUP_ID_brainpoolP384r1_tls13, 192, TLS1_3_VERSION, 0, -1, -1, 0 },
83     /* 32 */ { OSSL_TLS_GROUP_ID_brainpoolP512r1_tls13, 256, TLS1_3_VERSION, 0, -1, -1, 0 },
84     /* 33 */ { OSSL_TLS_GROUP_ID_ffdhe2048, 112, TLS1_3_VERSION, 0, -1, -1, 0 },
85     /* 34 */ { OSSL_TLS_GROUP_ID_ffdhe3072, 128, TLS1_3_VERSION, 0, -1, -1, 0 },
86     /* 35 */ { OSSL_TLS_GROUP_ID_ffdhe4096, 128, TLS1_3_VERSION, 0, -1, -1, 0 },
87     /* 36 */ { OSSL_TLS_GROUP_ID_ffdhe6144, 128, TLS1_3_VERSION, 0, -1, -1, 0 },
88     /* 37 */ { OSSL_TLS_GROUP_ID_ffdhe8192, 192, TLS1_3_VERSION, 0, -1, -1, 0 },
89     /* 38 */ { OSSL_TLS_GROUP_ID_mlkem512, ML_KEM_512_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
90     /* 39 */ { OSSL_TLS_GROUP_ID_mlkem768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
91     /* 40 */ { OSSL_TLS_GROUP_ID_mlkem1024, ML_KEM_1024_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
92     /* 41 */ { OSSL_TLS_GROUP_ID_X25519MLKEM768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
93     /* 42 */ { OSSL_TLS_GROUP_ID_SecP256r1MLKEM768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
94     /* 43 */ { OSSL_TLS_GROUP_ID_SecP384r1MLKEM1024, ML_KEM_1024_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 },
95 };
96 
97 #define TLS_GROUP_ENTRY(tlsname, realname, algorithm, idx) \
98     { \
99         OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_NAME, \
100                                tlsname, \
101                                sizeof(tlsname)), \
102         OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_NAME_INTERNAL, \
103                                realname, \
104                                sizeof(realname)), \
105         OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_ALG, \
106                                algorithm, \
107                                sizeof(algorithm)), \
108         OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_GROUP_ID, \
109                         (unsigned int *)&group_list[idx].group_id), \
110         OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_GROUP_SECURITY_BITS, \
111                         (unsigned int *)&group_list[idx].secbits), \
112         OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MIN_TLS, \
113                         (unsigned int *)&group_list[idx].mintls), \
114         OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MAX_TLS, \
115                         (unsigned int *)&group_list[idx].maxtls), \
116         OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MIN_DTLS, \
117                         (unsigned int *)&group_list[idx].mindtls), \
118         OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MAX_DTLS, \
119                         (unsigned int *)&group_list[idx].maxdtls), \
120         OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_IS_KEM, \
121                        (unsigned int *)&group_list[idx].is_kem), \
122         OSSL_PARAM_END \
123     }
124 
125 /*-
126  * - The 4th field of each entry is an index into "group_list" above.
127  *
128  * - The 3rd field is the key management algorithm name.
129 
130  * - The 2nd field is the GROUP_NAME used with the provider, needed for
131  *   providers that implement a family of related algorithms, but required
132  *   non-null even when the provider implements just one.
133  *
134  * - The 1st field is the TLS group name used in SSL_CTX_set_group_list(),
135  *   aliases repeat everything but the first field.
136  *
137  * Curves 1..22 were deprecated in:
138  *
139  *   https://www.rfc-editor.org/rfc/rfc8422.html
140  *
141  * leaving just:
142  *
143  *   enum {
144  *       deprecated(1..22),
145  *       secp256r1 (23), secp384r1 (24), secp521r1 (25),
146  *       x25519(29), x448(30),
147  *       reserved (0xFE00..0xFEFF),
148  *       deprecated(0xFF01..0xFF02),
149  *       (0xFFFF)
150  *   } NamedCurve;
151  *
152  * and those added later (FFDHE, brainpool, ML-KEM)
153  */
154 static const OSSL_PARAM param_group_list[][11] = {
155 # ifndef OPENSSL_NO_EC
156 #  if !defined(OPENSSL_NO_ML_KEM)
157 #   if !defined(OPENSSL_NO_ECX)
158     TLS_GROUP_ENTRY("X25519MLKEM768", "", "X25519MLKEM768", 41),
159 #   endif
160 #  endif
161 #  ifndef FIPS_MODULE
162     TLS_GROUP_ENTRY("x25519", "X25519", "X25519", 28),
163     TLS_GROUP_ENTRY("x448", "X448", "X448", 29),
164 #  endif
165     TLS_GROUP_ENTRY("secp256r1", "prime256v1", "EC", 22),
166     TLS_GROUP_ENTRY("P-256", "prime256v1", "EC", 22), /* Alias of above */
167     TLS_GROUP_ENTRY("secp384r1", "secp384r1", "EC", 23),
168     TLS_GROUP_ENTRY("P-384", "secp384r1", "EC", 23), /* Alias of above */
169     TLS_GROUP_ENTRY("secp521r1", "secp521r1", "EC", 24),
170     TLS_GROUP_ENTRY("P-521", "secp521r1", "EC", 24), /* Alias of above */
171 # endif /* OPENSSL_NO_EC */
172 # ifndef OPENSSL_NO_DH
173     /* Security bit values for FFDHE groups are as per RFC 7919 */
174     TLS_GROUP_ENTRY("ffdhe2048", "ffdhe2048", "DH", 33),
175     TLS_GROUP_ENTRY("ffdhe3072", "ffdhe3072", "DH", 34),
176 # endif
177 # if !defined(OPENSSL_NO_ML_KEM)
178     /* https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8 */
179     TLS_GROUP_ENTRY("MLKEM512", "", "ML-KEM-512", 38),
180     TLS_GROUP_ENTRY("MLKEM768", "", "ML-KEM-768", 39),
181     TLS_GROUP_ENTRY("MLKEM1024", "", "ML-KEM-1024", 40),
182 # endif
183 # ifndef OPENSSL_NO_EC
184 #  ifndef FIPS_MODULE
185     TLS_GROUP_ENTRY("brainpoolP256r1", "brainpoolP256r1", "EC", 25),
186     TLS_GROUP_ENTRY("brainpoolP384r1", "brainpoolP384r1", "EC", 26),
187     TLS_GROUP_ENTRY("brainpoolP512r1", "brainpoolP512r1", "EC", 27),
188     TLS_GROUP_ENTRY("brainpoolP256r1tls13", "brainpoolP256r1", "EC", 30),
189     TLS_GROUP_ENTRY("brainpoolP384r1tls13", "brainpoolP384r1", "EC", 31),
190     TLS_GROUP_ENTRY("brainpoolP512r1tls13", "brainpoolP512r1", "EC", 32),
191 #  endif
192 #  ifndef OPENSSL_NO_ML_KEM
193     TLS_GROUP_ENTRY("SecP256r1MLKEM768", "", "SecP256r1MLKEM768", 42),
194     TLS_GROUP_ENTRY("SecP384r1MLKEM1024", "", "SecP384r1MLKEM1024", 43),
195 #  endif
196 # endif
197 # ifndef OPENSSL_NO_DH
198     TLS_GROUP_ENTRY("ffdhe4096", "ffdhe4096", "DH", 35),
199     TLS_GROUP_ENTRY("ffdhe6144", "ffdhe6144", "DH", 36),
200     TLS_GROUP_ENTRY("ffdhe8192", "ffdhe8192", "DH", 37),
201 # endif
202 # ifndef OPENSSL_NO_TLS_DEPRECATED_EC
203 #  ifndef OPENSSL_NO_EC2M
204     TLS_GROUP_ENTRY("sect163k1", "sect163k1", "EC", 0),
205     TLS_GROUP_ENTRY("K-163", "sect163k1", "EC", 0), /* Alias of above */
206 #  endif
207 #  ifndef FIPS_MODULE
208     TLS_GROUP_ENTRY("sect163r1", "sect163r1", "EC", 1),
209 #  endif
210 #  ifndef OPENSSL_NO_EC2M
211     TLS_GROUP_ENTRY("sect163r2", "sect163r2", "EC", 2),
212     TLS_GROUP_ENTRY("B-163", "sect163r2", "EC", 2), /* Alias of above */
213 #  endif
214 #  ifndef FIPS_MODULE
215     TLS_GROUP_ENTRY("sect193r1", "sect193r1", "EC", 3),
216     TLS_GROUP_ENTRY("sect193r2", "sect193r2", "EC", 4),
217 #  endif
218 #  ifndef OPENSSL_NO_EC2M
219     TLS_GROUP_ENTRY("sect233k1", "sect233k1", "EC", 5),
220     TLS_GROUP_ENTRY("K-233", "sect233k1", "EC", 5), /* Alias of above */
221     TLS_GROUP_ENTRY("sect233r1", "sect233r1", "EC", 6),
222     TLS_GROUP_ENTRY("B-233", "sect233r1", "EC", 6), /* Alias of above */
223 #  endif
224 #  ifndef FIPS_MODULE
225     TLS_GROUP_ENTRY("sect239k1", "sect239k1", "EC", 7),
226 #  endif
227 #  ifndef OPENSSL_NO_EC2M
228     TLS_GROUP_ENTRY("sect283k1", "sect283k1", "EC", 8),
229     TLS_GROUP_ENTRY("K-283", "sect283k1", "EC", 8), /* Alias of above */
230     TLS_GROUP_ENTRY("sect283r1", "sect283r1", "EC", 9),
231     TLS_GROUP_ENTRY("B-283", "sect283r1", "EC", 9), /* Alias of above */
232     TLS_GROUP_ENTRY("sect409k1", "sect409k1", "EC", 10),
233     TLS_GROUP_ENTRY("K-409", "sect409k1", "EC", 10), /* Alias of above */
234     TLS_GROUP_ENTRY("sect409r1", "sect409r1", "EC", 11),
235     TLS_GROUP_ENTRY("B-409", "sect409r1", "EC", 11), /* Alias of above */
236     TLS_GROUP_ENTRY("sect571k1", "sect571k1", "EC", 12),
237     TLS_GROUP_ENTRY("K-571", "sect571k1", "EC", 12), /* Alias of above */
238     TLS_GROUP_ENTRY("sect571r1", "sect571r1", "EC", 13),
239     TLS_GROUP_ENTRY("B-571", "sect571r1", "EC", 13), /* Alias of above */
240 #  endif
241 #  ifndef FIPS_MODULE
242     TLS_GROUP_ENTRY("secp160k1", "secp160k1", "EC", 14),
243     TLS_GROUP_ENTRY("secp160r1", "secp160r1", "EC", 15),
244     TLS_GROUP_ENTRY("secp160r2", "secp160r2", "EC", 16),
245     TLS_GROUP_ENTRY("secp192k1", "secp192k1", "EC", 17),
246 #  endif
247     TLS_GROUP_ENTRY("secp192r1", "prime192v1", "EC", 18),
248     TLS_GROUP_ENTRY("P-192", "prime192v1", "EC", 18), /* Alias of above */
249 #  ifndef FIPS_MODULE
250     TLS_GROUP_ENTRY("secp224k1", "secp224k1", "EC", 19),
251 #  endif
252     TLS_GROUP_ENTRY("secp224r1", "secp224r1", "EC", 20),
253     TLS_GROUP_ENTRY("P-224", "secp224r1", "EC", 20), /* Alias of above */
254 #  ifndef FIPS_MODULE
255     TLS_GROUP_ENTRY("secp256k1", "secp256k1", "EC", 21),
256 #  endif
257 # endif /* !defined(OPENSSL_NO_TLS_DEPRECATED_EC) */
258 };
259 #endif /* !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_ML_KEM) */
260 
tls_group_capability(OSSL_CALLBACK * cb,void * arg)261 static int tls_group_capability(OSSL_CALLBACK *cb, void *arg)
262 {
263 #if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_ML_KEM)
264     size_t i;
265 
266     for (i = 0; i < OSSL_NELEM(param_group_list); i++)
267         if (!cb(param_group_list[i], arg))
268             return 0;
269 #endif
270 
271     return 1;
272 }
273 
274 /* --------------------------------------------------------------- */
275 
276 #if !defined(OPENSSL_NO_ML_DSA)
277 
278 typedef struct tls_sigalg_constants_st {
279     unsigned int code_point;
280     unsigned int sec_bits;    /* Bits of security */
281     int min_tls;              /* Minimum TLS version, -1 unsupported */
282     int max_tls;              /* Maximum TLS version (or 0 for undefined) */
283     int min_dtls;             /* Minimum DTLS version, -1 unsupported */
284     int max_dtls;             /* Maximum DTLS version (or 0 for undefined) */
285 } TLS_SIGALG_CONSTANTS;
286 
287 static const TLS_SIGALG_CONSTANTS sigalg_constants_list[3] = {
288     { 0x0904, 128, TLS1_3_VERSION, 0, -1, -1 },
289     { 0x0905, 192, TLS1_3_VERSION, 0, -1, -1 },
290     { 0x0906, 256, TLS1_3_VERSION, 0, -1, -1 },
291 };
292 
293 # define TLS_SIGALG_ENTRY(tlsname, algorithm, oid, idx)                         \
294     {                                                                           \
295         OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_SIGALG_IANA_NAME,            \
296                                tlsname, sizeof(tlsname)),                       \
297         OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_SIGALG_NAME,                 \
298                                algorithm, sizeof(algorithm)),                   \
299         OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_SIGALG_OID,                  \
300                                oid, sizeof(oid)),                               \
301         OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_SIGALG_CODE_POINT,                  \
302                         (unsigned int *)&sigalg_constants_list[idx].code_point),\
303         OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_SIGALG_SECURITY_BITS,               \
304                         (unsigned int *)&sigalg_constants_list[idx].sec_bits),  \
305         OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MIN_TLS,                      \
306                        (unsigned int *)&sigalg_constants_list[idx].min_tls),    \
307         OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MAX_TLS,                      \
308                        (unsigned int *)&sigalg_constants_list[idx].max_tls),    \
309         OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MIN_DTLS,                     \
310                        (unsigned int *)&sigalg_constants_list[idx].min_dtls),   \
311         OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MAX_DTLS,                     \
312                        (unsigned int *)&sigalg_constants_list[idx].max_dtls),   \
313         OSSL_PARAM_END                                                          \
314     }
315 
316 static const OSSL_PARAM param_sigalg_list[][10] = {
317     TLS_SIGALG_ENTRY("mldsa44", "ML-DSA-44", "2.16.840.1.101.3.4.3.17", 0),
318     TLS_SIGALG_ENTRY("mldsa65", "ML-DSA-65", "2.16.840.1.101.3.4.3.18", 1),
319     TLS_SIGALG_ENTRY("mldsa87", "ML-DSA-87", "2.16.840.1.101.3.4.3.19", 2),
320 };
321 #endif /* OPENSSL_NO_ML_DSA */
322 
tls_sigalg_capability(OSSL_CALLBACK * cb,void * arg)323 static int tls_sigalg_capability(OSSL_CALLBACK *cb, void *arg)
324 {
325 #if !defined(OPENSSL_NO_ML_DSA)
326     size_t i;
327 
328     for (i = 0; i < OSSL_NELEM(param_sigalg_list); i++)
329         if (!cb(param_sigalg_list[i], arg))
330             return 0;
331 #endif
332     return 1;
333 }
334 
ossl_prov_get_capabilities(void * provctx,const char * capability,OSSL_CALLBACK * cb,void * arg)335 int ossl_prov_get_capabilities(void *provctx, const char *capability,
336                                OSSL_CALLBACK *cb, void *arg)
337 {
338     if (OPENSSL_strcasecmp(capability, "TLS-GROUP") == 0)
339         return tls_group_capability(cb, arg);
340     if (OPENSSL_strcasecmp(capability, "TLS-SIGALG") == 0)
341         return tls_sigalg_capability(cb, arg);
342 
343     /* We don't support this capability */
344     return 0;
345 }
346