mirror of
				https://github.com/cuberite/polarssl.git
				synced 2025-11-04 04:32:24 -05:00 
			
		
		
		
	Remove per-version ciphersuite configuration API
This commit removes the API
```
    mbedtls_ssl_conf_ciphersuites_for_version()
```
which allows to configure lists of acceptable ciphersuites
for each supported version of SSL/TLS: SSL3, TLS 1.{0,1,2}.
With Mbed TLS 3.0, support for SSL3, TLS 1.0 and TLS 1.1
is dropped. Moreover, upcoming TLS 1.3 support has a different
notion of cipher suite and will require a different API.
This means that it's only for TLS 1.2 that we require
a ciphersuite configuration API, and
```
   mbedtls_ssl_conf_ciphersuites()
```
can be used for that. The version-specific ciphersuite
configuration API `mbedtls_ssl_conf_ciphersuites_for_version()`,
in turn, is no longer needed.
Signed-off-by: Hanno Becker <hanno.becker@arm.com>
Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
			
			
This commit is contained in:
		
							parent
							
								
									0c1a42a147
								
							
						
					
					
						commit
						d60b6c62d5
					
				@ -976,10 +976,8 @@ struct mbedtls_ssl_config
 | 
				
			|||||||
     * Pointers
 | 
					     * Pointers
 | 
				
			||||||
     */
 | 
					     */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    /** Allowed ciphersuites per version. To access list's elements, please use
 | 
					    /** Allowed ciphersuites for (D)TLS 1.2 (0-terminated)                  */
 | 
				
			||||||
     *  \c mbedtls_ssl_get_protocol_version_ciphersuites
 | 
					    const int *ciphersuite_list;
 | 
				
			||||||
     */
 | 
					 | 
				
			||||||
    const int *ciphersuite_list[3];
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
    /** Callback for printing debug output                                  */
 | 
					    /** Callback for printing debug output                                  */
 | 
				
			||||||
    void (*f_dbg)(void *, int, const char *, int, const char *);
 | 
					    void (*f_dbg)(void *, int, const char *, int, const char *);
 | 
				
			||||||
@ -2508,17 +2506,6 @@ const mbedtls_ssl_session *mbedtls_ssl_get_session_pointer( const mbedtls_ssl_co
 | 
				
			|||||||
void mbedtls_ssl_conf_ciphersuites( mbedtls_ssl_config *conf,
 | 
					void mbedtls_ssl_conf_ciphersuites( mbedtls_ssl_config *conf,
 | 
				
			||||||
                                   const int *ciphersuites );
 | 
					                                   const int *ciphersuites );
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * \brief               Get ciphersuite for given protocol's minor version.
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * \param conf          The SSL configuration.
 | 
					 | 
				
			||||||
 * \param prot_version  Protocol version. One of MBEDTLS_SSL_MINOR_VERSION_x macros.
 | 
					 | 
				
			||||||
 * \return              Ciphersuites pointer if successful.
 | 
					 | 
				
			||||||
 * \return              \c NULL if no ciphersuites where found.
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
const int *mbedtls_ssl_get_protocol_version_ciphersuites(
 | 
					 | 
				
			||||||
    const mbedtls_ssl_config *conf, int prot_version );
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
 | 
					#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
 | 
				
			||||||
#define MBEDTLS_SSL_UNEXPECTED_CID_IGNORE 0
 | 
					#define MBEDTLS_SSL_UNEXPECTED_CID_IGNORE 0
 | 
				
			||||||
#define MBEDTLS_SSL_UNEXPECTED_CID_FAIL   1
 | 
					#define MBEDTLS_SSL_UNEXPECTED_CID_FAIL   1
 | 
				
			||||||
@ -2558,27 +2545,6 @@ int mbedtls_ssl_conf_cid( mbedtls_ssl_config *conf, size_t len,
 | 
				
			|||||||
                          int ignore_other_cids );
 | 
					                          int ignore_other_cids );
 | 
				
			||||||
#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
 | 
					#endif /* MBEDTLS_SSL_DTLS_CONNECTION_ID */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/**
 | 
					 | 
				
			||||||
 * \brief               Set the list of allowed ciphersuites and the
 | 
					 | 
				
			||||||
 *                      preference order for a specific version of the protocol.
 | 
					 | 
				
			||||||
 *                      (Only useful on the server side)
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 *                      The ciphersuites array is not copied, and must remain
 | 
					 | 
				
			||||||
 *                      valid for the lifetime of the ssl_config.
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * \param conf          SSL configuration
 | 
					 | 
				
			||||||
 * \param ciphersuites  0-terminated list of allowed ciphersuites
 | 
					 | 
				
			||||||
 * \param major         Major version number (only MBEDTLS_SSL_MAJOR_VERSION_3
 | 
					 | 
				
			||||||
 *                      supported)
 | 
					 | 
				
			||||||
 * \param minor         Minor version number (only MBEDTLS_SSL_MINOR_VERSION_3
 | 
					 | 
				
			||||||
 *                      supported)
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * \note                With DTLS, use MBEDTLS_SSL_MINOR_VERSION_3 for DTLS 1.2
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
void mbedtls_ssl_conf_ciphersuites_for_version( mbedtls_ssl_config *conf,
 | 
					 | 
				
			||||||
                                       const int *ciphersuites,
 | 
					 | 
				
			||||||
                                       int major, int minor );
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#if defined(MBEDTLS_X509_CRT_PARSE_C)
 | 
					#if defined(MBEDTLS_X509_CRT_PARSE_C)
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * \brief          Set the X.509 security profile used for verification
 | 
					 * \brief          Set the X.509 security profile used for verification
 | 
				
			||||||
 | 
				
			|||||||
@ -1155,8 +1155,7 @@ static int ssl_write_client_hello( mbedtls_ssl_context *ssl )
 | 
				
			|||||||
    /*
 | 
					    /*
 | 
				
			||||||
     * Ciphersuite list
 | 
					     * Ciphersuite list
 | 
				
			||||||
     */
 | 
					     */
 | 
				
			||||||
    ciphersuites = mbedtls_ssl_get_protocol_version_ciphersuites( ssl->conf,
 | 
					    ciphersuites = ssl->conf->ciphersuite_list;
 | 
				
			||||||
                                                                ssl->minor_ver );
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
    /* Skip writing ciphersuite length for now */
 | 
					    /* Skip writing ciphersuite length for now */
 | 
				
			||||||
    n = 0;
 | 
					    n = 0;
 | 
				
			||||||
@ -2244,7 +2243,7 @@ static int ssl_parse_server_hello( mbedtls_ssl_context *ssl )
 | 
				
			|||||||
    i = 0;
 | 
					    i = 0;
 | 
				
			||||||
    while( 1 )
 | 
					    while( 1 )
 | 
				
			||||||
    {
 | 
					    {
 | 
				
			||||||
        if( mbedtls_ssl_get_protocol_version_ciphersuites( ssl->conf, ssl->minor_ver )[i] == 0 )
 | 
					        if( ssl->conf->ciphersuite_list[i] == 0 )
 | 
				
			||||||
        {
 | 
					        {
 | 
				
			||||||
            MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
 | 
					            MBEDTLS_SSL_DEBUG_MSG( 1, ( "bad server hello message" ) );
 | 
				
			||||||
            mbedtls_ssl_send_alert_message(
 | 
					            mbedtls_ssl_send_alert_message(
 | 
				
			||||||
@ -2254,7 +2253,7 @@ static int ssl_parse_server_hello( mbedtls_ssl_context *ssl )
 | 
				
			|||||||
            return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
 | 
					            return( MBEDTLS_ERR_SSL_BAD_HS_SERVER_HELLO );
 | 
				
			||||||
        }
 | 
					        }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
        if( mbedtls_ssl_get_protocol_version_ciphersuites( ssl->conf, ssl->minor_ver )[i++] ==
 | 
					        if( ssl->conf->ciphersuite_list[i++] ==
 | 
				
			||||||
            ssl->session_negotiate->ciphersuite )
 | 
					            ssl->session_negotiate->ciphersuite )
 | 
				
			||||||
        {
 | 
					        {
 | 
				
			||||||
            break;
 | 
					            break;
 | 
				
			||||||
 | 
				
			|||||||
@ -1870,7 +1870,7 @@ read_record_header:
 | 
				
			|||||||
     * and certificate from the SNI callback triggered by the SNI extension.)
 | 
					     * and certificate from the SNI callback triggered by the SNI extension.)
 | 
				
			||||||
     */
 | 
					     */
 | 
				
			||||||
    got_common_suite = 0;
 | 
					    got_common_suite = 0;
 | 
				
			||||||
    ciphersuites = mbedtls_ssl_get_protocol_version_ciphersuites( ssl->conf, ssl->minor_ver );
 | 
					    ciphersuites = ssl->conf->ciphersuite_list;
 | 
				
			||||||
    ciphersuite_info = NULL;
 | 
					    ciphersuite_info = NULL;
 | 
				
			||||||
#if defined(MBEDTLS_SSL_SRV_RESPECT_CLIENT_PREFERENCE)
 | 
					#if defined(MBEDTLS_SSL_SRV_RESPECT_CLIENT_PREFERENCE)
 | 
				
			||||||
    for( j = 0, p = buf + ciph_offset + 2; j < ciph_len; j += 2, p += 2 )
 | 
					    for( j = 0, p = buf + ciph_offset + 2; j < ciph_len; j += 2, p += 2 )
 | 
				
			||||||
 | 
				
			|||||||
@ -3514,73 +3514,10 @@ int mbedtls_ssl_set_session( mbedtls_ssl_context *ssl, const mbedtls_ssl_session
 | 
				
			|||||||
}
 | 
					}
 | 
				
			||||||
#endif /* MBEDTLS_SSL_CLI_C */
 | 
					#endif /* MBEDTLS_SSL_CLI_C */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int protocol_version_to_ciphersuites_list_index(int prot_version)
 | 
					 | 
				
			||||||
{
 | 
					 | 
				
			||||||
    switch(prot_version) {
 | 
					 | 
				
			||||||
        case MBEDTLS_SSL_MINOR_VERSION_1:
 | 
					 | 
				
			||||||
            return 0;
 | 
					 | 
				
			||||||
        case MBEDTLS_SSL_MINOR_VERSION_2:
 | 
					 | 
				
			||||||
            return 1;
 | 
					 | 
				
			||||||
        case MBEDTLS_SSL_MINOR_VERSION_3:
 | 
					 | 
				
			||||||
            return 2;
 | 
					 | 
				
			||||||
        default:
 | 
					 | 
				
			||||||
            return -1;
 | 
					 | 
				
			||||||
    };
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
static void set_protocol_version_ciphersuites( mbedtls_ssl_config *conf,
 | 
					 | 
				
			||||||
                                               int prot_version,
 | 
					 | 
				
			||||||
                                               const int* ciphersuites )
 | 
					 | 
				
			||||||
{
 | 
					 | 
				
			||||||
    int ciphersuite_list_index =
 | 
					 | 
				
			||||||
        protocol_version_to_ciphersuites_list_index(prot_version);
 | 
					 | 
				
			||||||
    if ( ciphersuite_list_index >= 0 &&
 | 
					 | 
				
			||||||
         (unsigned int)ciphersuite_list_index <
 | 
					 | 
				
			||||||
         sizeof(conf->ciphersuite_list)/sizeof(conf->ciphersuite_list[0]) )
 | 
					 | 
				
			||||||
    {
 | 
					 | 
				
			||||||
        conf->ciphersuite_list[ciphersuite_list_index] = ciphersuites;
 | 
					 | 
				
			||||||
    }
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
void mbedtls_ssl_conf_ciphersuites( mbedtls_ssl_config *conf,
 | 
					void mbedtls_ssl_conf_ciphersuites( mbedtls_ssl_config *conf,
 | 
				
			||||||
                                    const int *ciphersuites )
 | 
					                                    const int *ciphersuites )
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
    set_protocol_version_ciphersuites(conf, MBEDTLS_SSL_MINOR_VERSION_1,
 | 
					    conf->ciphersuite_list = ciphersuites;
 | 
				
			||||||
        ciphersuites);
 | 
					 | 
				
			||||||
    set_protocol_version_ciphersuites(conf, MBEDTLS_SSL_MINOR_VERSION_2,
 | 
					 | 
				
			||||||
        ciphersuites);
 | 
					 | 
				
			||||||
    set_protocol_version_ciphersuites(conf, MBEDTLS_SSL_MINOR_VERSION_3,
 | 
					 | 
				
			||||||
        ciphersuites);
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
const int *mbedtls_ssl_get_protocol_version_ciphersuites(
 | 
					 | 
				
			||||||
    const mbedtls_ssl_config *conf, int prot_version )
 | 
					 | 
				
			||||||
{
 | 
					 | 
				
			||||||
    int ciphersuite_list_index =
 | 
					 | 
				
			||||||
        protocol_version_to_ciphersuites_list_index(prot_version);
 | 
					 | 
				
			||||||
    if ( ciphersuite_list_index >= 0 &&
 | 
					 | 
				
			||||||
         (unsigned int)ciphersuite_list_index <
 | 
					 | 
				
			||||||
         sizeof(conf->ciphersuite_list)/sizeof(conf->ciphersuite_list[0]) )
 | 
					 | 
				
			||||||
    {
 | 
					 | 
				
			||||||
        return conf->ciphersuite_list[ciphersuite_list_index];
 | 
					 | 
				
			||||||
    }
 | 
					 | 
				
			||||||
    else
 | 
					 | 
				
			||||||
    {
 | 
					 | 
				
			||||||
        return NULL;
 | 
					 | 
				
			||||||
    }
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
void mbedtls_ssl_conf_ciphersuites_for_version( mbedtls_ssl_config *conf,
 | 
					 | 
				
			||||||
                                       const int *ciphersuites,
 | 
					 | 
				
			||||||
                                       int major, int minor )
 | 
					 | 
				
			||||||
{
 | 
					 | 
				
			||||||
    if( major != MBEDTLS_SSL_MAJOR_VERSION_3 )
 | 
					 | 
				
			||||||
        return;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    if( minor != MBEDTLS_SSL_MINOR_VERSION_3 )
 | 
					 | 
				
			||||||
        return;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    set_protocol_version_ciphersuites(conf, minor, ciphersuites);
 | 
					 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if defined(MBEDTLS_X509_CRT_PARSE_C)
 | 
					#if defined(MBEDTLS_X509_CRT_PARSE_C)
 | 
				
			||||||
@ -6278,12 +6215,7 @@ int mbedtls_ssl_config_defaults( mbedtls_ssl_config *conf,
 | 
				
			|||||||
            conf->max_major_ver = MBEDTLS_SSL_MAX_MAJOR_VERSION;
 | 
					            conf->max_major_ver = MBEDTLS_SSL_MAX_MAJOR_VERSION;
 | 
				
			||||||
            conf->max_minor_ver = MBEDTLS_SSL_MAX_MINOR_VERSION;
 | 
					            conf->max_minor_ver = MBEDTLS_SSL_MAX_MINOR_VERSION;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
            set_protocol_version_ciphersuites(conf, MBEDTLS_SSL_MINOR_VERSION_1,
 | 
					            conf->ciphersuite_list = ssl_preset_suiteb_ciphersuites;
 | 
				
			||||||
                                              ssl_preset_suiteb_ciphersuites);
 | 
					 | 
				
			||||||
            set_protocol_version_ciphersuites(conf, MBEDTLS_SSL_MINOR_VERSION_2,
 | 
					 | 
				
			||||||
                                              ssl_preset_suiteb_ciphersuites);
 | 
					 | 
				
			||||||
            set_protocol_version_ciphersuites(conf, MBEDTLS_SSL_MINOR_VERSION_3,
 | 
					 | 
				
			||||||
                                              ssl_preset_suiteb_ciphersuites);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if defined(MBEDTLS_X509_CRT_PARSE_C)
 | 
					#if defined(MBEDTLS_X509_CRT_PARSE_C)
 | 
				
			||||||
            conf->cert_profile = &mbedtls_x509_crt_profile_suiteb;
 | 
					            conf->cert_profile = &mbedtls_x509_crt_profile_suiteb;
 | 
				
			||||||
@ -6317,13 +6249,7 @@ int mbedtls_ssl_config_defaults( mbedtls_ssl_config *conf,
 | 
				
			|||||||
            if( transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM )
 | 
					            if( transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM )
 | 
				
			||||||
                conf->min_minor_ver = MBEDTLS_SSL_MINOR_VERSION_3;
 | 
					                conf->min_minor_ver = MBEDTLS_SSL_MINOR_VERSION_3;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
            const int* default_ciphersuites = mbedtls_ssl_list_ciphersuites();
 | 
					            conf->ciphersuite_list = mbedtls_ssl_list_ciphersuites();
 | 
				
			||||||
            set_protocol_version_ciphersuites(conf, MBEDTLS_SSL_MINOR_VERSION_1,
 | 
					 | 
				
			||||||
                                              default_ciphersuites);
 | 
					 | 
				
			||||||
            set_protocol_version_ciphersuites(conf, MBEDTLS_SSL_MINOR_VERSION_2,
 | 
					 | 
				
			||||||
                                              default_ciphersuites);
 | 
					 | 
				
			||||||
            set_protocol_version_ciphersuites(conf, MBEDTLS_SSL_MINOR_VERSION_3,
 | 
					 | 
				
			||||||
                                              default_ciphersuites);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if defined(MBEDTLS_X509_CRT_PARSE_C)
 | 
					#if defined(MBEDTLS_X509_CRT_PARSE_C)
 | 
				
			||||||
            conf->cert_profile = &mbedtls_x509_crt_profile_default;
 | 
					            conf->cert_profile = &mbedtls_x509_crt_profile_default;
 | 
				
			||||||
 | 
				
			|||||||
@ -93,7 +93,6 @@ int main( void )
 | 
				
			|||||||
#define DFL_ECJPAKE_PW          NULL
 | 
					#define DFL_ECJPAKE_PW          NULL
 | 
				
			||||||
#define DFL_PSK_LIST            NULL
 | 
					#define DFL_PSK_LIST            NULL
 | 
				
			||||||
#define DFL_FORCE_CIPHER        0
 | 
					#define DFL_FORCE_CIPHER        0
 | 
				
			||||||
#define DFL_VERSION_SUITES      NULL
 | 
					 | 
				
			||||||
#define DFL_RENEGOTIATION       MBEDTLS_SSL_RENEGOTIATION_DISABLED
 | 
					#define DFL_RENEGOTIATION       MBEDTLS_SSL_RENEGOTIATION_DISABLED
 | 
				
			||||||
#define DFL_ALLOW_LEGACY        -2
 | 
					#define DFL_ALLOW_LEGACY        -2
 | 
				
			||||||
#define DFL_RENEGOTIATE         0
 | 
					#define DFL_RENEGOTIATE         0
 | 
				
			||||||
@ -501,9 +500,6 @@ int main( void )
 | 
				
			|||||||
    "    force_version=%%s    default: \"\" (none)\n"       \
 | 
					    "    force_version=%%s    default: \"\" (none)\n"       \
 | 
				
			||||||
    "                        options: tls1_2, dtls1_2\n" \
 | 
					    "                        options: tls1_2, dtls1_2\n" \
 | 
				
			||||||
    "\n"                                                                \
 | 
					    "\n"                                                                \
 | 
				
			||||||
    "    version_suites=a,b,c        per-version ciphersuites\n"        \
 | 
					 | 
				
			||||||
    "                                in order from tls1 to tls1_2\n"    \
 | 
					 | 
				
			||||||
    "                                default: all enabled\n"            \
 | 
					 | 
				
			||||||
    "    force_ciphersuite=<name>    default: all enabled\n"            \
 | 
					    "    force_ciphersuite=<name>    default: all enabled\n"            \
 | 
				
			||||||
    "    query_config=<name>         return 0 if the specified\n"       \
 | 
					    "    query_config=<name>         return 0 if the specified\n"       \
 | 
				
			||||||
    "                                configuration macro is defined and 1\n"  \
 | 
					    "                                configuration macro is defined and 1\n"  \
 | 
				
			||||||
@ -565,7 +561,6 @@ struct options
 | 
				
			|||||||
    char *psk_list;             /* list of PSK id/key pairs for callback    */
 | 
					    char *psk_list;             /* list of PSK id/key pairs for callback    */
 | 
				
			||||||
    const char *ecjpake_pw;     /* the EC J-PAKE password                   */
 | 
					    const char *ecjpake_pw;     /* the EC J-PAKE password                   */
 | 
				
			||||||
    int force_ciphersuite[2];   /* protocol/ciphersuite to use, or all      */
 | 
					    int force_ciphersuite[2];   /* protocol/ciphersuite to use, or all      */
 | 
				
			||||||
    const char *version_suites; /* per-version ciphersuites                 */
 | 
					 | 
				
			||||||
    int renegotiation;          /* enable / disable renegotiation           */
 | 
					    int renegotiation;          /* enable / disable renegotiation           */
 | 
				
			||||||
    int allow_legacy;           /* allow legacy renegotiation               */
 | 
					    int allow_legacy;           /* allow legacy renegotiation               */
 | 
				
			||||||
    int renegotiate;            /* attempt renegotiation?                   */
 | 
					    int renegotiate;            /* attempt renegotiation?                   */
 | 
				
			||||||
@ -1253,7 +1248,6 @@ int main( int argc, char *argv[] )
 | 
				
			|||||||
{
 | 
					{
 | 
				
			||||||
    int ret = 0, len, written, frags, exchanges_left;
 | 
					    int ret = 0, len, written, frags, exchanges_left;
 | 
				
			||||||
    int query_config_ret = 0;
 | 
					    int query_config_ret = 0;
 | 
				
			||||||
    int version_suites[3][2];
 | 
					 | 
				
			||||||
    io_ctx_t io_ctx;
 | 
					    io_ctx_t io_ctx;
 | 
				
			||||||
    unsigned char* buf = 0;
 | 
					    unsigned char* buf = 0;
 | 
				
			||||||
#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
 | 
					#if defined(MBEDTLS_KEY_EXCHANGE_SOME_PSK_ENABLED)
 | 
				
			||||||
@ -1481,7 +1475,6 @@ int main( int argc, char *argv[] )
 | 
				
			|||||||
    opt.psk_list            = DFL_PSK_LIST;
 | 
					    opt.psk_list            = DFL_PSK_LIST;
 | 
				
			||||||
    opt.ecjpake_pw          = DFL_ECJPAKE_PW;
 | 
					    opt.ecjpake_pw          = DFL_ECJPAKE_PW;
 | 
				
			||||||
    opt.force_ciphersuite[0]= DFL_FORCE_CIPHER;
 | 
					    opt.force_ciphersuite[0]= DFL_FORCE_CIPHER;
 | 
				
			||||||
    opt.version_suites      = DFL_VERSION_SUITES;
 | 
					 | 
				
			||||||
    opt.renegotiation       = DFL_RENEGOTIATION;
 | 
					    opt.renegotiation       = DFL_RENEGOTIATION;
 | 
				
			||||||
    opt.allow_legacy        = DFL_ALLOW_LEGACY;
 | 
					    opt.allow_legacy        = DFL_ALLOW_LEGACY;
 | 
				
			||||||
    opt.renegotiate         = DFL_RENEGOTIATE;
 | 
					    opt.renegotiate         = DFL_RENEGOTIATE;
 | 
				
			||||||
@ -1669,8 +1662,6 @@ int main( int argc, char *argv[] )
 | 
				
			|||||||
        }
 | 
					        }
 | 
				
			||||||
        else if( strcmp( p, "curves" ) == 0 )
 | 
					        else if( strcmp( p, "curves" ) == 0 )
 | 
				
			||||||
            opt.curves = q;
 | 
					            opt.curves = q;
 | 
				
			||||||
        else if( strcmp( p, "version_suites" ) == 0 )
 | 
					 | 
				
			||||||
            opt.version_suites = q;
 | 
					 | 
				
			||||||
        else if( strcmp( p, "renegotiation" ) == 0 )
 | 
					        else if( strcmp( p, "renegotiation" ) == 0 )
 | 
				
			||||||
        {
 | 
					        {
 | 
				
			||||||
            opt.renegotiation = (atoi( q )) ?
 | 
					            opt.renegotiation = (atoi( q )) ?
 | 
				
			||||||
@ -2067,47 +2058,6 @@ int main( int argc, char *argv[] )
 | 
				
			|||||||
#endif /* MBEDTLS_USE_PSA_CRYPTO */
 | 
					#endif /* MBEDTLS_USE_PSA_CRYPTO */
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    if( opt.version_suites != NULL )
 | 
					 | 
				
			||||||
    {
 | 
					 | 
				
			||||||
        const char *name[3] = { 0 };
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
        /* Parse 4-element coma-separated list */
 | 
					 | 
				
			||||||
        for( i = 0, p = (char *) opt.version_suites;
 | 
					 | 
				
			||||||
             i < 3 && *p != '\0';
 | 
					 | 
				
			||||||
             i++ )
 | 
					 | 
				
			||||||
        {
 | 
					 | 
				
			||||||
            name[i] = p;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
            /* Terminate the current string and move on to next one */
 | 
					 | 
				
			||||||
            while( *p != ',' && *p != '\0' )
 | 
					 | 
				
			||||||
                p++;
 | 
					 | 
				
			||||||
            if( *p == ',' )
 | 
					 | 
				
			||||||
                *p++ = '\0';
 | 
					 | 
				
			||||||
        }
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
        if( i != 3 )
 | 
					 | 
				
			||||||
        {
 | 
					 | 
				
			||||||
            mbedtls_printf( "too few values for version_suites\n" );
 | 
					 | 
				
			||||||
            ret = 1;
 | 
					 | 
				
			||||||
            goto exit;
 | 
					 | 
				
			||||||
        }
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
        memset( version_suites, 0, sizeof( version_suites ) );
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
        /* Get the suites identifiers from their name */
 | 
					 | 
				
			||||||
        for( i = 0; i < 3; i++ )
 | 
					 | 
				
			||||||
        {
 | 
					 | 
				
			||||||
            version_suites[i][0] = mbedtls_ssl_get_ciphersuite_id( name[i] );
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
            if( version_suites[i][0] == 0 )
 | 
					 | 
				
			||||||
            {
 | 
					 | 
				
			||||||
                mbedtls_printf( "unknown ciphersuite: '%s'\n", name[i] );
 | 
					 | 
				
			||||||
                ret = 2;
 | 
					 | 
				
			||||||
                goto usage;
 | 
					 | 
				
			||||||
            }
 | 
					 | 
				
			||||||
        }
 | 
					 | 
				
			||||||
    }
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
 | 
					#if defined(MBEDTLS_SSL_DTLS_CONNECTION_ID)
 | 
				
			||||||
    if( mbedtls_test_unhexify( cid, sizeof( cid ),
 | 
					    if( mbedtls_test_unhexify( cid, sizeof( cid ),
 | 
				
			||||||
                               opt.cid_val, &cid_len ) != 0 )
 | 
					                               opt.cid_val, &cid_len ) != 0 )
 | 
				
			||||||
@ -2689,19 +2639,6 @@ int main( int argc, char *argv[] )
 | 
				
			|||||||
    if( opt.force_ciphersuite[0] != DFL_FORCE_CIPHER )
 | 
					    if( opt.force_ciphersuite[0] != DFL_FORCE_CIPHER )
 | 
				
			||||||
        mbedtls_ssl_conf_ciphersuites( &conf, opt.force_ciphersuite );
 | 
					        mbedtls_ssl_conf_ciphersuites( &conf, opt.force_ciphersuite );
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    if( opt.version_suites != NULL )
 | 
					 | 
				
			||||||
    {
 | 
					 | 
				
			||||||
        mbedtls_ssl_conf_ciphersuites_for_version( &conf, version_suites[0],
 | 
					 | 
				
			||||||
                                          MBEDTLS_SSL_MAJOR_VERSION_3,
 | 
					 | 
				
			||||||
                                          MBEDTLS_SSL_MINOR_VERSION_1 );
 | 
					 | 
				
			||||||
        mbedtls_ssl_conf_ciphersuites_for_version( &conf, version_suites[1],
 | 
					 | 
				
			||||||
                                          MBEDTLS_SSL_MAJOR_VERSION_3,
 | 
					 | 
				
			||||||
                                          MBEDTLS_SSL_MINOR_VERSION_2 );
 | 
					 | 
				
			||||||
        mbedtls_ssl_conf_ciphersuites_for_version( &conf, version_suites[2],
 | 
					 | 
				
			||||||
                                          MBEDTLS_SSL_MAJOR_VERSION_3,
 | 
					 | 
				
			||||||
                                          MBEDTLS_SSL_MINOR_VERSION_3 );
 | 
					 | 
				
			||||||
    }
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    if( opt.allow_legacy != DFL_ALLOW_LEGACY )
 | 
					    if( opt.allow_legacy != DFL_ALLOW_LEGACY )
 | 
				
			||||||
        mbedtls_ssl_conf_legacy_renegotiation( &conf, opt.allow_legacy );
 | 
					        mbedtls_ssl_conf_legacy_renegotiation( &conf, opt.allow_legacy );
 | 
				
			||||||
#if defined(MBEDTLS_SSL_RENEGOTIATION)
 | 
					#if defined(MBEDTLS_SSL_RENEGOTIATION)
 | 
				
			||||||
 | 
				
			|||||||
@ -5614,17 +5614,6 @@ run_test    "ECJPAKE: working, DTLS, nolog" \
 | 
				
			|||||||
             force_ciphersuite=TLS-ECJPAKE-WITH-AES-128-CCM-8" \
 | 
					             force_ciphersuite=TLS-ECJPAKE-WITH-AES-128-CCM-8" \
 | 
				
			||||||
            0
 | 
					            0
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# Tests for ciphersuites per version
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2
 | 
					 | 
				
			||||||
requires_config_enabled MBEDTLS_CAMELLIA_C
 | 
					 | 
				
			||||||
requires_config_enabled MBEDTLS_AES_C
 | 
					 | 
				
			||||||
run_test    "Per-version suites: TLS 1.2" \
 | 
					 | 
				
			||||||
            "$P_SRV version_suites=TLS-RSA-WITH-AES-256-CBC-SHA,TLS-RSA-WITH-AES-128-CBC-SHA,TLS-RSA-WITH-AES-128-GCM-SHA256" \
 | 
					 | 
				
			||||||
            "$P_CLI force_version=tls1_2" \
 | 
					 | 
				
			||||||
            0 \
 | 
					 | 
				
			||||||
            -c "Ciphersuite is TLS-RSA-WITH-AES-128-GCM-SHA256"
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
# Test for ClientHello without extensions
 | 
					# Test for ClientHello without extensions
 | 
				
			||||||
 | 
					
 | 
				
			||||||
requires_gnutls
 | 
					requires_gnutls
 | 
				
			||||||
 | 
				
			|||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user