1 /* 2 * Copyright 2019-2025 The OpenSSL Project Authors. All Rights Reserved. 3 * 4 * Licensed under the Apache License 2.0 (the "License"). You may not use 5 * this file except in compliance with the License. You can obtain a copy 6 * in the file LICENSE in the source distribution or at 7 * https://www.openssl.org/source/license.html 8 */ 9 10 #include <assert.h> 11 #include <string.h> 12 #include <openssl/core_dispatch.h> 13 #include <openssl/core_names.h> 14 /* For TLS1_VERSION etc */ 15 #include <openssl/prov_ssl.h> 16 #include <openssl/params.h> 17 #include "internal/nelem.h" 18 #include "internal/tlsgroups.h" 19 #include "prov/providercommon.h" 20 #include "internal/e_os.h" 21 #include "crypto/ml_kem.h" 22 23 /* 24 * If none of EC, DH OR ML-KEM are available then we have no TLS-GROUP 25 * capabilities. 26 */ 27 #if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) || \ 28 !defined(OPENSSL_NO_ML_KEM) 29 typedef struct tls_group_constants_st { 30 unsigned int group_id; /* Group ID */ 31 unsigned int secbits; /* Bits of security */ 32 int mintls; /* Minimum TLS version, -1 unsupported */ 33 int maxtls; /* Maximum TLS version (or 0 for undefined) */ 34 int mindtls; /* Minimum DTLS version, -1 unsupported */ 35 int maxdtls; /* Maximum DTLS version (or 0 for undefined) */ 36 int is_kem; /* Indicates utility as KEM */ 37 } TLS_GROUP_CONSTANTS; 38 39 /* 40 * The indices of entries in this table must be independent of which TLS groups 41 * we do or not support. It just lists basic facts about the groups, and is 42 * used by (numeric slot number) reference in the "param_group_list" below. 43 * Therefore, there must be no #ifdefs in this table, the index of each entry 44 * must be independent of compile-time options. 45 * 46 * For the FFDHE groups, the security bit values are as given by 47 * BN_security_bits(). For the ML-KEM hybrids these are the ML-KEM security 48 * bits. 49 */ 50 static const TLS_GROUP_CONSTANTS group_list[] = { 51 /* 0 */ { OSSL_TLS_GROUP_ID_sect163k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 52 /* 1 */ { OSSL_TLS_GROUP_ID_sect163r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 53 /* 2 */ { OSSL_TLS_GROUP_ID_sect163r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 54 /* 3 */ { OSSL_TLS_GROUP_ID_sect193r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 55 /* 4 */ { OSSL_TLS_GROUP_ID_sect193r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 56 /* 5 */ { OSSL_TLS_GROUP_ID_sect233k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 57 /* 6 */ { OSSL_TLS_GROUP_ID_sect233r1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 58 /* 7 */ { OSSL_TLS_GROUP_ID_sect239k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 59 /* 8 */ { OSSL_TLS_GROUP_ID_sect283k1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 60 /* 9 */ { OSSL_TLS_GROUP_ID_sect283r1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 61 /* 10 */ { OSSL_TLS_GROUP_ID_sect409k1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 62 /* 11 */ { OSSL_TLS_GROUP_ID_sect409r1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 63 /* 12 */ { OSSL_TLS_GROUP_ID_sect571k1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 64 /* 13 */ { OSSL_TLS_GROUP_ID_sect571r1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 65 /* 14 */ { OSSL_TLS_GROUP_ID_secp160k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 66 /* 15 */ { OSSL_TLS_GROUP_ID_secp160r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 67 /* 16 */ { OSSL_TLS_GROUP_ID_secp160r2, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 68 /* 17 */ { OSSL_TLS_GROUP_ID_secp192k1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 69 /* 18 */ { OSSL_TLS_GROUP_ID_secp192r1, 80, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 70 /* 19 */ { OSSL_TLS_GROUP_ID_secp224k1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 71 /* 20 */ { OSSL_TLS_GROUP_ID_secp224r1, 112, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 72 /* 21 */ { OSSL_TLS_GROUP_ID_secp256k1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 73 /* 22 */ { OSSL_TLS_GROUP_ID_secp256r1, 128, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 }, 74 /* 23 */ { OSSL_TLS_GROUP_ID_secp384r1, 192, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 }, 75 /* 24 */ { OSSL_TLS_GROUP_ID_secp521r1, 256, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 }, 76 /* 25 */ { OSSL_TLS_GROUP_ID_brainpoolP256r1, 128, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 77 /* 26 */ { OSSL_TLS_GROUP_ID_brainpoolP384r1, 192, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 78 /* 27 */ { OSSL_TLS_GROUP_ID_brainpoolP512r1, 256, TLS1_VERSION, TLS1_2_VERSION, DTLS1_VERSION, DTLS1_2_VERSION, 0 }, 79 /* 28 */ { OSSL_TLS_GROUP_ID_x25519, 128, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 }, 80 /* 29 */ { OSSL_TLS_GROUP_ID_x448, 224, TLS1_VERSION, 0, DTLS1_VERSION, 0, 0 }, 81 /* 30 */ { OSSL_TLS_GROUP_ID_brainpoolP256r1_tls13, 128, TLS1_3_VERSION, 0, -1, -1, 0 }, 82 /* 31 */ { OSSL_TLS_GROUP_ID_brainpoolP384r1_tls13, 192, TLS1_3_VERSION, 0, -1, -1, 0 }, 83 /* 32 */ { OSSL_TLS_GROUP_ID_brainpoolP512r1_tls13, 256, TLS1_3_VERSION, 0, -1, -1, 0 }, 84 /* 33 */ { OSSL_TLS_GROUP_ID_ffdhe2048, 112, TLS1_3_VERSION, 0, -1, -1, 0 }, 85 /* 34 */ { OSSL_TLS_GROUP_ID_ffdhe3072, 128, TLS1_3_VERSION, 0, -1, -1, 0 }, 86 /* 35 */ { OSSL_TLS_GROUP_ID_ffdhe4096, 128, TLS1_3_VERSION, 0, -1, -1, 0 }, 87 /* 36 */ { OSSL_TLS_GROUP_ID_ffdhe6144, 128, TLS1_3_VERSION, 0, -1, -1, 0 }, 88 /* 37 */ { OSSL_TLS_GROUP_ID_ffdhe8192, 192, TLS1_3_VERSION, 0, -1, -1, 0 }, 89 /* 38 */ { OSSL_TLS_GROUP_ID_mlkem512, ML_KEM_512_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 }, 90 /* 39 */ { OSSL_TLS_GROUP_ID_mlkem768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 }, 91 /* 40 */ { OSSL_TLS_GROUP_ID_mlkem1024, ML_KEM_1024_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 }, 92 /* 41 */ { OSSL_TLS_GROUP_ID_X25519MLKEM768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 }, 93 /* 42 */ { OSSL_TLS_GROUP_ID_SecP256r1MLKEM768, ML_KEM_768_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 }, 94 /* 43 */ { OSSL_TLS_GROUP_ID_SecP384r1MLKEM1024, ML_KEM_1024_SECBITS, TLS1_3_VERSION, 0, -1, -1, 1 }, 95 }; 96 97 #define TLS_GROUP_ENTRY(tlsname, realname, algorithm, idx) \ 98 { \ 99 OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_NAME, \ 100 tlsname, \ 101 sizeof(tlsname)), \ 102 OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_NAME_INTERNAL, \ 103 realname, \ 104 sizeof(realname)), \ 105 OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_GROUP_ALG, \ 106 algorithm, \ 107 sizeof(algorithm)), \ 108 OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_GROUP_ID, \ 109 (unsigned int *)&group_list[idx].group_id), \ 110 OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_GROUP_SECURITY_BITS, \ 111 (unsigned int *)&group_list[idx].secbits), \ 112 OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MIN_TLS, \ 113 (unsigned int *)&group_list[idx].mintls), \ 114 OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MAX_TLS, \ 115 (unsigned int *)&group_list[idx].maxtls), \ 116 OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MIN_DTLS, \ 117 (unsigned int *)&group_list[idx].mindtls), \ 118 OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MAX_DTLS, \ 119 (unsigned int *)&group_list[idx].maxdtls), \ 120 OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_IS_KEM, \ 121 (unsigned int *)&group_list[idx].is_kem), \ 122 OSSL_PARAM_END \ 123 } 124 125 /*- 126 * - The 4th field of each entry is an index into "group_list" above. 127 * 128 * - The 3rd field is the key management algorithm name. 129 130 * - The 2nd field is the GROUP_NAME used with the provider, needed for 131 * providers that implement a family of related algorithms, but required 132 * non-null even when the provider implements just one. 133 * 134 * - The 1st field is the TLS group name used in SSL_CTX_set_group_list(), 135 * aliases repeat everything but the first field. 136 * 137 * Curves 1..22 were deprecated in: 138 * 139 * https://www.rfc-editor.org/rfc/rfc8422.html 140 * 141 * leaving just: 142 * 143 * enum { 144 * deprecated(1..22), 145 * secp256r1 (23), secp384r1 (24), secp521r1 (25), 146 * x25519(29), x448(30), 147 * reserved (0xFE00..0xFEFF), 148 * deprecated(0xFF01..0xFF02), 149 * (0xFFFF) 150 * } NamedCurve; 151 * 152 * and those added later (FFDHE, brainpool, ML-KEM) 153 */ 154 static const OSSL_PARAM param_group_list[][11] = { 155 # ifndef OPENSSL_NO_EC 156 # if !defined(OPENSSL_NO_ML_KEM) 157 # if !defined(OPENSSL_NO_ECX) 158 TLS_GROUP_ENTRY("X25519MLKEM768", "", "X25519MLKEM768", 41), 159 # endif 160 # endif 161 # ifndef FIPS_MODULE 162 TLS_GROUP_ENTRY("x25519", "X25519", "X25519", 28), 163 TLS_GROUP_ENTRY("x448", "X448", "X448", 29), 164 # endif 165 TLS_GROUP_ENTRY("secp256r1", "prime256v1", "EC", 22), 166 TLS_GROUP_ENTRY("P-256", "prime256v1", "EC", 22), /* Alias of above */ 167 TLS_GROUP_ENTRY("secp384r1", "secp384r1", "EC", 23), 168 TLS_GROUP_ENTRY("P-384", "secp384r1", "EC", 23), /* Alias of above */ 169 TLS_GROUP_ENTRY("secp521r1", "secp521r1", "EC", 24), 170 TLS_GROUP_ENTRY("P-521", "secp521r1", "EC", 24), /* Alias of above */ 171 # endif /* OPENSSL_NO_EC */ 172 # ifndef OPENSSL_NO_DH 173 /* Security bit values for FFDHE groups are as per RFC 7919 */ 174 TLS_GROUP_ENTRY("ffdhe2048", "ffdhe2048", "DH", 33), 175 TLS_GROUP_ENTRY("ffdhe3072", "ffdhe3072", "DH", 34), 176 # endif 177 # if !defined(OPENSSL_NO_ML_KEM) 178 /* https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8 */ 179 TLS_GROUP_ENTRY("MLKEM512", "", "ML-KEM-512", 38), 180 TLS_GROUP_ENTRY("MLKEM768", "", "ML-KEM-768", 39), 181 TLS_GROUP_ENTRY("MLKEM1024", "", "ML-KEM-1024", 40), 182 # endif 183 # ifndef OPENSSL_NO_EC 184 # ifndef FIPS_MODULE 185 TLS_GROUP_ENTRY("brainpoolP256r1", "brainpoolP256r1", "EC", 25), 186 TLS_GROUP_ENTRY("brainpoolP384r1", "brainpoolP384r1", "EC", 26), 187 TLS_GROUP_ENTRY("brainpoolP512r1", "brainpoolP512r1", "EC", 27), 188 TLS_GROUP_ENTRY("brainpoolP256r1tls13", "brainpoolP256r1", "EC", 30), 189 TLS_GROUP_ENTRY("brainpoolP384r1tls13", "brainpoolP384r1", "EC", 31), 190 TLS_GROUP_ENTRY("brainpoolP512r1tls13", "brainpoolP512r1", "EC", 32), 191 # endif 192 # ifndef OPENSSL_NO_ML_KEM 193 TLS_GROUP_ENTRY("SecP256r1MLKEM768", "", "SecP256r1MLKEM768", 42), 194 TLS_GROUP_ENTRY("SecP384r1MLKEM1024", "", "SecP384r1MLKEM1024", 43), 195 # endif 196 # endif 197 # ifndef OPENSSL_NO_DH 198 TLS_GROUP_ENTRY("ffdhe4096", "ffdhe4096", "DH", 35), 199 TLS_GROUP_ENTRY("ffdhe6144", "ffdhe6144", "DH", 36), 200 TLS_GROUP_ENTRY("ffdhe8192", "ffdhe8192", "DH", 37), 201 # endif 202 # ifndef OPENSSL_NO_TLS_DEPRECATED_EC 203 # ifndef OPENSSL_NO_EC2M 204 TLS_GROUP_ENTRY("sect163k1", "sect163k1", "EC", 0), 205 TLS_GROUP_ENTRY("K-163", "sect163k1", "EC", 0), /* Alias of above */ 206 # endif 207 # ifndef FIPS_MODULE 208 TLS_GROUP_ENTRY("sect163r1", "sect163r1", "EC", 1), 209 # endif 210 # ifndef OPENSSL_NO_EC2M 211 TLS_GROUP_ENTRY("sect163r2", "sect163r2", "EC", 2), 212 TLS_GROUP_ENTRY("B-163", "sect163r2", "EC", 2), /* Alias of above */ 213 # endif 214 # ifndef FIPS_MODULE 215 TLS_GROUP_ENTRY("sect193r1", "sect193r1", "EC", 3), 216 TLS_GROUP_ENTRY("sect193r2", "sect193r2", "EC", 4), 217 # endif 218 # ifndef OPENSSL_NO_EC2M 219 TLS_GROUP_ENTRY("sect233k1", "sect233k1", "EC", 5), 220 TLS_GROUP_ENTRY("K-233", "sect233k1", "EC", 5), /* Alias of above */ 221 TLS_GROUP_ENTRY("sect233r1", "sect233r1", "EC", 6), 222 TLS_GROUP_ENTRY("B-233", "sect233r1", "EC", 6), /* Alias of above */ 223 # endif 224 # ifndef FIPS_MODULE 225 TLS_GROUP_ENTRY("sect239k1", "sect239k1", "EC", 7), 226 # endif 227 # ifndef OPENSSL_NO_EC2M 228 TLS_GROUP_ENTRY("sect283k1", "sect283k1", "EC", 8), 229 TLS_GROUP_ENTRY("K-283", "sect283k1", "EC", 8), /* Alias of above */ 230 TLS_GROUP_ENTRY("sect283r1", "sect283r1", "EC", 9), 231 TLS_GROUP_ENTRY("B-283", "sect283r1", "EC", 9), /* Alias of above */ 232 TLS_GROUP_ENTRY("sect409k1", "sect409k1", "EC", 10), 233 TLS_GROUP_ENTRY("K-409", "sect409k1", "EC", 10), /* Alias of above */ 234 TLS_GROUP_ENTRY("sect409r1", "sect409r1", "EC", 11), 235 TLS_GROUP_ENTRY("B-409", "sect409r1", "EC", 11), /* Alias of above */ 236 TLS_GROUP_ENTRY("sect571k1", "sect571k1", "EC", 12), 237 TLS_GROUP_ENTRY("K-571", "sect571k1", "EC", 12), /* Alias of above */ 238 TLS_GROUP_ENTRY("sect571r1", "sect571r1", "EC", 13), 239 TLS_GROUP_ENTRY("B-571", "sect571r1", "EC", 13), /* Alias of above */ 240 # endif 241 # ifndef FIPS_MODULE 242 TLS_GROUP_ENTRY("secp160k1", "secp160k1", "EC", 14), 243 TLS_GROUP_ENTRY("secp160r1", "secp160r1", "EC", 15), 244 TLS_GROUP_ENTRY("secp160r2", "secp160r2", "EC", 16), 245 TLS_GROUP_ENTRY("secp192k1", "secp192k1", "EC", 17), 246 # endif 247 TLS_GROUP_ENTRY("secp192r1", "prime192v1", "EC", 18), 248 TLS_GROUP_ENTRY("P-192", "prime192v1", "EC", 18), /* Alias of above */ 249 # ifndef FIPS_MODULE 250 TLS_GROUP_ENTRY("secp224k1", "secp224k1", "EC", 19), 251 # endif 252 TLS_GROUP_ENTRY("secp224r1", "secp224r1", "EC", 20), 253 TLS_GROUP_ENTRY("P-224", "secp224r1", "EC", 20), /* Alias of above */ 254 # ifndef FIPS_MODULE 255 TLS_GROUP_ENTRY("secp256k1", "secp256k1", "EC", 21), 256 # endif 257 # endif /* !defined(OPENSSL_NO_TLS_DEPRECATED_EC) */ 258 }; 259 #endif /* !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_ML_KEM) */ 260 261 static int tls_group_capability(OSSL_CALLBACK *cb, void *arg) 262 { 263 #if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_ML_KEM) 264 size_t i; 265 266 for (i = 0; i < OSSL_NELEM(param_group_list); i++) 267 if (!cb(param_group_list[i], arg)) 268 return 0; 269 #endif 270 271 return 1; 272 } 273 274 /* --------------------------------------------------------------- */ 275 276 #if !defined(OPENSSL_NO_ML_DSA) 277 278 typedef struct tls_sigalg_constants_st { 279 unsigned int code_point; 280 unsigned int sec_bits; /* Bits of security */ 281 int min_tls; /* Minimum TLS version, -1 unsupported */ 282 int max_tls; /* Maximum TLS version (or 0 for undefined) */ 283 int min_dtls; /* Minimum DTLS version, -1 unsupported */ 284 int max_dtls; /* Maximum DTLS version (or 0 for undefined) */ 285 } TLS_SIGALG_CONSTANTS; 286 287 static const TLS_SIGALG_CONSTANTS sigalg_constants_list[3] = { 288 { 0x0904, 128, TLS1_3_VERSION, 0, -1, -1 }, 289 { 0x0905, 192, TLS1_3_VERSION, 0, -1, -1 }, 290 { 0x0906, 256, TLS1_3_VERSION, 0, -1, -1 }, 291 }; 292 293 # define TLS_SIGALG_ENTRY(tlsname, algorithm, oid, idx) \ 294 { \ 295 OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_SIGALG_IANA_NAME, \ 296 tlsname, sizeof(tlsname)), \ 297 OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_SIGALG_NAME, \ 298 algorithm, sizeof(algorithm)), \ 299 OSSL_PARAM_utf8_string(OSSL_CAPABILITY_TLS_SIGALG_OID, \ 300 oid, sizeof(oid)), \ 301 OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_SIGALG_CODE_POINT, \ 302 (unsigned int *)&sigalg_constants_list[idx].code_point),\ 303 OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_SIGALG_SECURITY_BITS, \ 304 (unsigned int *)&sigalg_constants_list[idx].sec_bits), \ 305 OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MIN_TLS, \ 306 (unsigned int *)&sigalg_constants_list[idx].min_tls), \ 307 OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MAX_TLS, \ 308 (unsigned int *)&sigalg_constants_list[idx].max_tls), \ 309 OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MIN_DTLS, \ 310 (unsigned int *)&sigalg_constants_list[idx].min_dtls), \ 311 OSSL_PARAM_int(OSSL_CAPABILITY_TLS_SIGALG_MAX_DTLS, \ 312 (unsigned int *)&sigalg_constants_list[idx].max_dtls), \ 313 OSSL_PARAM_END \ 314 } 315 316 static const OSSL_PARAM param_sigalg_list[][10] = { 317 TLS_SIGALG_ENTRY("mldsa44", "ML-DSA-44", "2.16.840.1.101.3.4.3.17", 0), 318 TLS_SIGALG_ENTRY("mldsa65", "ML-DSA-65", "2.16.840.1.101.3.4.3.18", 1), 319 TLS_SIGALG_ENTRY("mldsa87", "ML-DSA-87", "2.16.840.1.101.3.4.3.19", 2), 320 }; 321 #endif /* OPENSSL_NO_ML_DSA */ 322 323 static int tls_sigalg_capability(OSSL_CALLBACK *cb, void *arg) 324 { 325 #if !defined(OPENSSL_NO_ML_DSA) 326 size_t i; 327 328 for (i = 0; i < OSSL_NELEM(param_sigalg_list); i++) 329 if (!cb(param_sigalg_list[i], arg)) 330 return 0; 331 #endif 332 return 1; 333 } 334 335 int ossl_prov_get_capabilities(void *provctx, const char *capability, 336 OSSL_CALLBACK *cb, void *arg) 337 { 338 if (OPENSSL_strcasecmp(capability, "TLS-GROUP") == 0) 339 return tls_group_capability(cb, arg); 340 if (OPENSSL_strcasecmp(capability, "TLS-SIGALG") == 0) 341 return tls_sigalg_capability(cb, arg); 342 343 /* We don't support this capability */ 344 return 0; 345 } 346