Skip to content

Commit c1a74f5

Browse files
committed
Define OSSL_CAPABILITY_TLS_GROUP_IS_KEM
Note that with this commit the optional parameter is introduced, but libssl still ignores it. Reviewed-by: Matt Caswell <[email protected]> (Merged from #13018)
1 parent ecff43e commit c1a74f5

File tree

5 files changed

+51
-9
lines changed

5 files changed

+51
-9
lines changed

doc/man7/provider-base.pod

+34-7
Original file line numberDiff line numberDiff line change
@@ -364,15 +364,17 @@ Applications can query the capabilities to discover those services.
364364

365365
The "TLS-GROUP" capability can be queried by libssl to discover the list of
366366
TLS groups that a provider can support. Each group supported can be used for
367-
key exchange during a TLS handshake. TLS clients can advertise the list of
368-
TLS groups they support in the supported_groups extension, and TLS servers can
369-
select a group from the offered list that they also support. In this way a
370-
provider can add to the list of groups that libssl already supports with
371-
additional ones.
367+
I<key exchange> (KEX) or I<key encapsulation method> (KEM) during a TLS
368+
handshake.
369+
TLS clients can advertise the list of TLS groups they support in the
370+
supported_groups extension, and TLS servers can select a group from the offered
371+
list that they also support. In this way a provider can add to the list of
372+
groups that libssl already supports with additional ones.
372373

373374
Each TLS group that a provider supports should be described via the callback
374375
passed in through the provider_get_capabilities function. Each group should have
375-
the following details supplied (all are mandatory):
376+
the following details supplied (all are mandatory, except
377+
B<OSSL_CAPABILITY_TLS_GROUP_IS_KEM>):
376378

377379
=over 4
378380

@@ -393,7 +395,9 @@ The TLS group id value as given in the IANA TLS Supported Groups registry.
393395
=item "tls-group-alg" (B<OSSL_CAPABILITY_TLS_GROUP_ALG>) <utf8 string>
394396

395397
The name of a Key Management algorithm that the provider offers and that should
396-
be used with this group. Keys created should be able to support key exchange.
398+
be used with this group. Keys created should be able to support I<key exchange>
399+
or I<key encapsulation method> (KEM), as implied by the optional
400+
B<OSSL_CAPABILITY_TLS_GROUP_IS_KEM> flag.
397401
The algorithm must support key and parameter generation as well as the
398402
key/parameter generation parameter, B<OSSL_PKEY_PARAM_GROUP_NAME>. The group
399403
name given via "tls-group-name-internal" above will be passed via
@@ -405,6 +409,29 @@ The number of bits of security offered by keys in this group. The number of bits
405409
should be comparable with the ones given in table 2 and 3 of the NIST SP800-57
406410
document.
407411

412+
=item "tls-group-is-kem" (B<OSSL_CAPABILITY_TLS_GROUP_IS_KEM>) <unsigned integer>
413+
414+
Boolean flag to describe if the group should be used in I<key exchange> (KEX)
415+
mode (0, default) or in I<key encapsulation method> (KEM) mode (1).
416+
417+
This parameter is optional: if not specified, KEX mode is assumed as the default
418+
mode for the group.
419+
420+
In KEX mode, in a typical Diffie-Hellman fashion, both sides execute I<keygen>
421+
then I<derive> against the peer public key. To operate in KEX mode, the group
422+
implementation must support the provider functions as described in
423+
L<provider-keyexch(7)>.
424+
425+
In KEM mode, the client executes I<keygen> and sends its public key, the server
426+
executes I<encapsulate> using the client's public key and sends back the
427+
resulting I<ciphertext>, finally the client executes I<decapsulate> to retrieve
428+
the same I<shared secret> generated by the server's I<encapsulate>. To operate
429+
in KEM mode, the group implementation must support the provider functions as
430+
described in L<provider-kem(7)>.
431+
432+
Both in KEX and KEM mode, the resulting I<shared secret> is then used according
433+
to the protocol specification.
434+
408435
=item "tls-min-tls" (B<OSSL_CAPABILITY_TLS_GROUP_MIN_TLS>) <integer>
409436

410437
=item "tls-max-tls" (B<OSSL_CAPABILITY_TLS_GROUP_MAX_TLS>) <integer>

include/openssl/core_names.h

+1
Original file line numberDiff line numberDiff line change
@@ -492,6 +492,7 @@ extern "C" {
492492
#define OSSL_CAPABILITY_TLS_GROUP_ID "tls-group-id"
493493
#define OSSL_CAPABILITY_TLS_GROUP_ALG "tls-group-alg"
494494
#define OSSL_CAPABILITY_TLS_GROUP_SECURITY_BITS "tls-group-sec-bits"
495+
#define OSSL_CAPABILITY_TLS_GROUP_IS_KEM "tls-group-is-kem"
495496
#define OSSL_CAPABILITY_TLS_GROUP_MIN_TLS "tls-min-tls"
496497
#define OSSL_CAPABILITY_TLS_GROUP_MAX_TLS "tls-max-tls"
497498
#define OSSL_CAPABILITY_TLS_GROUP_MIN_DTLS "tls-min-dtls"

ssl/ssl_local.h

+1
Original file line numberDiff line numberDiff line change
@@ -818,6 +818,7 @@ typedef struct tls_group_info_st {
818818
int maxtls; /* Maximum TLS version (or 0 for undefined) */
819819
int mindtls; /* Minimum DTLS version, -1 unsupported */
820820
int maxdtls; /* Maximum DTLS version (or 0 for undefined) */
821+
char is_kem; /* Mode for this Group: 0 is KEX, 1 is KEM */
821822
} TLS_GROUP_INFO;
822823

823824
/* flags values */

ssl/t1_lib.c

+8
Original file line numberDiff line numberDiff line change
@@ -249,6 +249,7 @@ static int add_provider_groups(const OSSL_PARAM params[], void *data)
249249
TLS_GROUP_INFO *ginf = NULL;
250250
EVP_KEYMGMT *keymgmt;
251251
unsigned int gid;
252+
unsigned int is_kem = 0;
252253
int ret = 0;
253254

254255
if (ctx->group_list_max_len == ctx->group_list_len) {
@@ -321,6 +322,13 @@ static int add_provider_groups(const OSSL_PARAM params[], void *data)
321322
goto err;
322323
}
323324

325+
p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_GROUP_IS_KEM);
326+
if (p != NULL && (!OSSL_PARAM_get_uint(p, &is_kem) || is_kem > 1)) {
327+
SSLerr(0, ERR_R_PASSED_INVALID_ARGUMENT);
328+
goto err;
329+
}
330+
ginf->is_kem = 1 & is_kem;
331+
324332
p = OSSL_PARAM_locate_const(params, OSSL_CAPABILITY_TLS_GROUP_MIN_TLS);
325333
if (p == NULL || !OSSL_PARAM_get_int(p, &ginf->mintls)) {
326334
SSLerr(0, ERR_R_PASSED_INVALID_ARGUMENT);

test/tls-provider.c

+7-2
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ struct tls_group_st {
4949
unsigned int maxtls;
5050
unsigned int mindtls;
5151
unsigned int maxdtls;
52+
unsigned int is_kem; /* boolean */
5253
};
5354

5455
#define XORGROUP_NAME "xorgroup"
@@ -59,7 +60,8 @@ static struct tls_group_st xor_group = {
5960
TLS1_3_VERSION, /* mintls */
6061
0, /* maxtls */
6162
-1, /* mindtls */
62-
-1 /* maxdtls */
63+
-1, /* maxdtls */
64+
0 /* is_kem */
6365
};
6466

6567
#define XORKEMGROUP_NAME "xorkemgroup"
@@ -70,7 +72,8 @@ static struct tls_group_st xor_kemgroup = {
7072
TLS1_3_VERSION, /* mintls */
7173
0, /* maxtls */
7274
-1, /* mindtls */
73-
-1 /* maxdtls */
75+
-1, /* maxdtls */
76+
1 /* is_kem */
7477
};
7578

7679
#define ALGORITHM "XOR"
@@ -90,6 +93,7 @@ static const OSSL_PARAM xor_group_params[] = {
9093
OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MAX_TLS, &xor_group.maxtls),
9194
OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MIN_DTLS, &xor_group.mindtls),
9295
OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MAX_DTLS, &xor_group.maxdtls),
96+
OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_GROUP_IS_KEM, &xor_group.is_kem),
9397
OSSL_PARAM_END
9498
};
9599

@@ -108,6 +112,7 @@ static const OSSL_PARAM xor_kemgroup_params[] = {
108112
OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MAX_TLS, &xor_kemgroup.maxtls),
109113
OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MIN_DTLS, &xor_kemgroup.mindtls),
110114
OSSL_PARAM_int(OSSL_CAPABILITY_TLS_GROUP_MAX_DTLS, &xor_kemgroup.maxdtls),
115+
OSSL_PARAM_uint(OSSL_CAPABILITY_TLS_GROUP_IS_KEM, &xor_kemgroup.is_kem),
111116
OSSL_PARAM_END
112117
};
113118

0 commit comments

Comments
 (0)