Botan 3.6.1
Crypto and TLS for C&
tls_algos.cpp
Go to the documentation of this file.
1/*
2* (C) 2017 Jack Lloyd
3*
4* Botan is released under the Simplified BSD License (see license.txt)
5*/
6
7#include <botan/tls_algos.h>
8
9#include <botan/ec_group.h>
10#include <botan/exceptn.h>
11#include <botan/internal/fmt.h>
12
13namespace Botan::TLS {
14
15std::string kdf_algo_to_string(KDF_Algo algo) {
16 switch(algo) {
17 case KDF_Algo::SHA_1:
18 return "SHA-1";
20 return "SHA-256";
22 return "SHA-384";
23 }
24
25 throw Invalid_State("kdf_algo_to_string unknown enum value");
26}
27
28std::string kex_method_to_string(Kex_Algo method) {
29 switch(method) {
31 return "RSA";
32 case Kex_Algo::DH:
33 return "DH";
34 case Kex_Algo::ECDH:
35 return "ECDH";
36 case Kex_Algo::PSK:
37 return "PSK";
39 return "ECDHE_PSK";
41 return "DHE_PSK";
42 case Kex_Algo::KEM:
43 return "KEM";
45 return "KEM_PSK";
47 return "HYBRID";
49 return "HYBRID_PSK";
51 return "UNDEFINED";
52 }
53
54 throw Invalid_State("kex_method_to_string unknown enum value");
55}
56
57Kex_Algo kex_method_from_string(std::string_view str) {
58 if(str == "RSA") {
60 }
61
62 if(str == "DH") {
63 return Kex_Algo::DH;
64 }
65
66 if(str == "ECDH") {
67 return Kex_Algo::ECDH;
68 }
69
70 if(str == "PSK") {
71 return Kex_Algo::PSK;
72 }
73
74 if(str == "ECDHE_PSK") {
76 }
77
78 if(str == "DHE_PSK") {
79 return Kex_Algo::DHE_PSK;
80 }
81
82 if(str == "KEM") {
83 return Kex_Algo::KEM;
84 }
85
86 if(str == "KEM_PSK") {
87 return Kex_Algo::KEM_PSK;
88 }
89
90 if(str == "HYBRID") {
91 return Kex_Algo::HYBRID;
92 }
93
94 if(str == "HYBRID_PSK") {
96 }
97
98 if(str == "UNDEFINED") {
100 }
101
102 throw Invalid_Argument(fmt("Unknown kex method '{}'", str));
103}
104
106 switch(method) {
107 case Auth_Method::RSA:
108 return "RSA";
110 return "ECDSA";
112 return "IMPLICIT";
114 return "UNDEFINED";
115 }
116
117 throw Invalid_State("auth_method_to_string unknown enum value");
118}
119
121 if(str == "RSA") {
122 return Auth_Method::RSA;
123 }
124 if(str == "ECDSA") {
125 return Auth_Method::ECDSA;
126 }
127 if(str == "IMPLICIT") {
129 }
130 if(str == "UNDEFINED") {
132 }
133
134 throw Invalid_Argument(fmt("Unknown TLS signature method '{}'", str));
135}
136
137std::optional<Group_Params> Group_Params::from_string(std::string_view group_name) {
138 if(group_name == "secp256r1") {
139 return Group_Params::SECP256R1;
140 }
141 if(group_name == "secp384r1") {
142 return Group_Params::SECP384R1;
143 }
144 if(group_name == "secp521r1") {
145 return Group_Params::SECP521R1;
146 }
147 if(group_name == "brainpool256r1") {
148 return Group_Params::BRAINPOOL256R1;
149 }
150 if(group_name == "brainpool384r1") {
151 return Group_Params::BRAINPOOL384R1;
152 }
153 if(group_name == "brainpool512r1") {
154 return Group_Params::BRAINPOOL512R1;
155 }
156 if(group_name == "x25519") {
157 return Group_Params::X25519;
158 }
159 if(group_name == "x448") {
160 return Group_Params::X448;
161 }
162
163 if(group_name == "ffdhe/ietf/2048") {
164 return Group_Params::FFDHE_2048;
165 }
166 if(group_name == "ffdhe/ietf/3072") {
167 return Group_Params::FFDHE_3072;
168 }
169 if(group_name == "ffdhe/ietf/4096") {
170 return Group_Params::FFDHE_4096;
171 }
172 if(group_name == "ffdhe/ietf/6144") {
173 return Group_Params::FFDHE_6144;
174 }
175 if(group_name == "ffdhe/ietf/8192") {
176 return Group_Params::FFDHE_8192;
177 }
178
179 if(group_name == "Kyber-512-r3") {
180 return Group_Params::KYBER_512_R3_OQS;
181 }
182 if(group_name == "Kyber-768-r3") {
183 return Group_Params::KYBER_768_R3_OQS;
184 }
185 if(group_name == "Kyber-1024-r3") {
186 return Group_Params::KYBER_1024_R3_OQS;
187 }
188
189 if(group_name == "eFrodoKEM-640-SHAKE") {
190 return Group_Params::eFRODOKEM_640_SHAKE_OQS;
191 }
192 if(group_name == "eFrodoKEM-976-SHAKE") {
193 return Group_Params::eFRODOKEM_976_SHAKE_OQS;
194 }
195 if(group_name == "eFrodoKEM-1344-SHAKE") {
196 return Group_Params::eFRODOKEM_1344_SHAKE_OQS;
197 }
198 if(group_name == "eFrodoKEM-640-AES") {
199 return Group_Params::eFRODOKEM_640_AES_OQS;
200 }
201 if(group_name == "eFrodoKEM-976-AES") {
202 return Group_Params::eFRODOKEM_976_AES_OQS;
203 }
204 if(group_name == "eFrodoKEM-1344-AES") {
205 return Group_Params::eFRODOKEM_1344_AES_OQS;
206 }
207
208 if(group_name == "x25519/Kyber-512-r3/cloudflare") {
209 return Group_Params::HYBRID_X25519_KYBER_512_R3_CLOUDFLARE;
210 }
211 if(group_name == "x25519/Kyber-512-r3") {
212 return Group_Params::HYBRID_X25519_KYBER_512_R3_OQS;
213 }
214 if(group_name == "x25519/Kyber-768-r3") {
215 return Group_Params::HYBRID_X25519_KYBER_768_R3_OQS;
216 }
217
218 if(group_name == "x25519/ML-KEM-768") {
219 return Group_Params::HYBRID_X25519_ML_KEM_768;
220 }
221 if(group_name == "secp256r1/ML-KEM-768") {
222 return Group_Params::HYBRID_SECP256R1_ML_KEM_768;
223 }
224
225 if(group_name == "x448/Kyber-768-r3") {
226 return Group_Params::HYBRID_X448_KYBER_768_R3_OQS;
227 }
228 if(group_name == "x25519/eFrodoKEM-640-SHAKE") {
229 return Group_Params::HYBRID_X25519_eFRODOKEM_640_SHAKE_OQS;
230 }
231 if(group_name == "x25519/eFrodoKEM-640-AES") {
232 return Group_Params::HYBRID_X25519_eFRODOKEM_640_AES_OQS;
233 }
234 if(group_name == "x448/eFrodoKEM-976-SHAKE") {
235 return Group_Params::HYBRID_X448_eFRODOKEM_976_SHAKE_OQS;
236 }
237 if(group_name == "x448/eFrodoKEM-976-AES") {
238 return Group_Params::HYBRID_X448_eFRODOKEM_976_AES_OQS;
239 }
240
241 if(group_name == "secp256r1/Kyber-512-r3") {
242 return Group_Params::HYBRID_SECP256R1_KYBER_512_R3_OQS;
243 }
244 if(group_name == "secp256r1/Kyber-768-r3") {
245 return Group_Params::HYBRID_SECP256R1_KYBER_768_R3_OQS;
246 }
247 if(group_name == "secp256r1/eFrodoKEM-640-SHAKE") {
248 return Group_Params::HYBRID_SECP256R1_eFRODOKEM_640_SHAKE_OQS;
249 }
250 if(group_name == "secp256r1/eFrodoKEM-640-AES") {
251 return Group_Params::HYBRID_SECP256R1_eFRODOKEM_640_AES_OQS;
252 }
253
254 if(group_name == "secp384r1/Kyber-768-r3") {
255 return Group_Params::HYBRID_SECP384R1_KYBER_768_R3_OQS;
256 }
257 if(group_name == "secp384r1/eFrodoKEM-976-SHAKE") {
258 return Group_Params::HYBRID_SECP384R1_eFRODOKEM_976_SHAKE_OQS;
259 }
260 if(group_name == "secp384r1/eFrodoKEM-976-AES") {
261 return Group_Params::HYBRID_SECP384R1_eFRODOKEM_976_AES_OQS;
262 }
263
264 if(group_name == "secp521r1/Kyber-1024-r3") {
265 return Group_Params::HYBRID_SECP521R1_KYBER_1024_R3_OQS;
266 }
267 if(group_name == "secp521r1/eFrodoKEM-1344-SHAKE") {
268 return Group_Params::HYBRID_SECP521R1_eFRODOKEM_1344_SHAKE_OQS;
269 }
270 if(group_name == "secp521r1/eFrodoKEM-1344-AES") {
271 return Group_Params::HYBRID_SECP521R1_eFRODOKEM_1344_AES_OQS;
272 }
273
274 return std::nullopt;
275}
276
277std::optional<std::string> Group_Params::to_string() const {
278 switch(m_code) {
279 case Group_Params::SECP256R1:
280 return "secp256r1";
281 case Group_Params::SECP384R1:
282 return "secp384r1";
283 case Group_Params::SECP521R1:
284 return "secp521r1";
285 case Group_Params::BRAINPOOL256R1:
286 return "brainpool256r1";
287 case Group_Params::BRAINPOOL384R1:
288 return "brainpool384r1";
289 case Group_Params::BRAINPOOL512R1:
290 return "brainpool512r1";
291 case Group_Params::X25519:
292 return "x25519";
293 case Group_Params::X448:
294 return "x448";
295
296 case Group_Params::FFDHE_2048:
297 return "ffdhe/ietf/2048";
298 case Group_Params::FFDHE_3072:
299 return "ffdhe/ietf/3072";
300 case Group_Params::FFDHE_4096:
301 return "ffdhe/ietf/4096";
302 case Group_Params::FFDHE_6144:
303 return "ffdhe/ietf/6144";
304 case Group_Params::FFDHE_8192:
305 return "ffdhe/ietf/8192";
306
307 case Group_Params::KYBER_512_R3_OQS:
308 return "Kyber-512-r3";
309 case Group_Params::KYBER_768_R3_OQS:
310 return "Kyber-768-r3";
311 case Group_Params::KYBER_1024_R3_OQS:
312 return "Kyber-1024-r3";
313
314 case Group_Params::eFRODOKEM_640_SHAKE_OQS:
315 return "eFrodoKEM-640-SHAKE";
316 case Group_Params::eFRODOKEM_976_SHAKE_OQS:
317 return "eFrodoKEM-976-SHAKE";
318 case Group_Params::eFRODOKEM_1344_SHAKE_OQS:
319 return "eFrodoKEM-1344-SHAKE";
320 case Group_Params::eFRODOKEM_640_AES_OQS:
321 return "eFrodoKEM-640-AES";
322 case Group_Params::eFRODOKEM_976_AES_OQS:
323 return "eFrodoKEM-976-AES";
324 case Group_Params::eFRODOKEM_1344_AES_OQS:
325 return "eFrodoKEM-1344-AES";
326
327 case Group_Params::HYBRID_X25519_eFRODOKEM_640_SHAKE_OQS:
328 return "x25519/eFrodoKEM-640-SHAKE";
329 case Group_Params::HYBRID_X25519_eFRODOKEM_640_AES_OQS:
330 return "x25519/eFrodoKEM-640-AES";
331 case Group_Params::HYBRID_X448_eFRODOKEM_976_SHAKE_OQS:
332 return "x448/eFrodoKEM-976-SHAKE";
333 case Group_Params::HYBRID_X448_eFRODOKEM_976_AES_OQS:
334 return "x448/eFrodoKEM-976-AES";
335 case Group_Params::HYBRID_SECP256R1_eFRODOKEM_640_SHAKE_OQS:
336 return "secp256r1/eFrodoKEM-640-SHAKE";
337 case Group_Params::HYBRID_SECP256R1_eFRODOKEM_640_AES_OQS:
338 return "secp256r1/eFrodoKEM-640-AES";
339 case Group_Params::HYBRID_SECP384R1_eFRODOKEM_976_SHAKE_OQS:
340 return "secp384r1/eFrodoKEM-976-SHAKE";
341 case Group_Params::HYBRID_SECP384R1_eFRODOKEM_976_AES_OQS:
342 return "secp384r1/eFrodoKEM-976-AES";
343 case Group_Params::HYBRID_SECP521R1_eFRODOKEM_1344_SHAKE_OQS:
344 return "secp521r1/eFrodoKEM-1344-SHAKE";
345 case Group_Params::HYBRID_SECP521R1_eFRODOKEM_1344_AES_OQS:
346 return "secp521r1/eFrodoKEM-1344-AES";
347
348 case Group_Params::HYBRID_X25519_KYBER_512_R3_CLOUDFLARE:
349 return "x25519/Kyber-512-r3/cloudflare";
350
351 case Group_Params::HYBRID_X25519_KYBER_512_R3_OQS:
352 return "x25519/Kyber-512-r3";
353 case Group_Params::HYBRID_X25519_KYBER_768_R3_OQS:
354 return "x25519/Kyber-768-r3";
355
356 case Group_Params::HYBRID_X25519_ML_KEM_768:
357 return "x25519/ML-KEM-768";
358 case Group_Params::HYBRID_SECP256R1_ML_KEM_768:
359 return "secp256r1/ML-KEM-768";
360
361 case Group_Params::HYBRID_X448_KYBER_768_R3_OQS:
362 return "x448/Kyber-768-r3";
363
364 case Group_Params::HYBRID_SECP256R1_KYBER_512_R3_OQS:
365 return "secp256r1/Kyber-512-r3";
366 case Group_Params::HYBRID_SECP256R1_KYBER_768_R3_OQS:
367 return "secp256r1/Kyber-768-r3";
368 case Group_Params::HYBRID_SECP384R1_KYBER_768_R3_OQS:
369 return "secp384r1/Kyber-768-r3";
370 case Group_Params::HYBRID_SECP521R1_KYBER_1024_R3_OQS:
371 return "secp521r1/Kyber-1024-r3";
372
373 default:
374 return std::nullopt;
375 }
376}
377
378} // namespace Botan::TLS
std::optional< std::string > to_string() const
static std::optional< Group_Params > from_string(std::string_view group_name)
Kex_Algo kex_method_from_string(std::string_view str)
Definition tls_algos.cpp:57
Auth_Method auth_method_from_string(std::string_view str)
std::string kdf_algo_to_string(KDF_Algo algo)
Definition tls_algos.cpp:15
std::string kex_method_to_string(Kex_Algo method)
Definition tls_algos.cpp:28
std::string auth_method_to_string(Auth_Method method)
std::string fmt(std::string_view format, const T &... args)
Definition fmt.h:53