summaryrefslogtreecommitdiff
path: root/Userland/Libraries/LibTLS/CipherSuite.h
diff options
context:
space:
mode:
authorstelar7 <dudedbz@gmail.com>2023-04-14 00:22:24 +0200
committerSam Atkins <atkinssj@gmail.com>2023-04-14 12:32:04 +0100
commite8945f15f4e8c929bff38799a168f00c3e3b1d0a (patch)
tree2028a22d18b3f0f751a6324a0e0168aefe42ba5e /Userland/Libraries/LibTLS/CipherSuite.h
parentda8edece295ab9bc762f3aecf2f874cb7ba72857 (diff)
downloadserenity-e8945f15f4e8c929bff38799a168f00c3e3b1d0a.zip
LibTLS: Move CipherSuite to Extensions.h
Also add missing values from the IANA registry
Diffstat (limited to 'Userland/Libraries/LibTLS/CipherSuite.h')
-rw-r--r--Userland/Libraries/LibTLS/CipherSuite.h84
1 files changed, 0 insertions, 84 deletions
diff --git a/Userland/Libraries/LibTLS/CipherSuite.h b/Userland/Libraries/LibTLS/CipherSuite.h
index ee60b9f69f..8f446b5811 100644
--- a/Userland/Libraries/LibTLS/CipherSuite.h
+++ b/Userland/Libraries/LibTLS/CipherSuite.h
@@ -11,90 +11,6 @@
namespace TLS {
-enum class CipherSuite {
- Invalid = 0,
-
- // Weak cipher suites, but we support them
-
- // RFC 5246 - Original TLS v1.2 ciphers
- RSA_WITH_AES_128_CBC_SHA = 0x002F,
- RSA_WITH_AES_256_CBC_SHA = 0x0035,
- RSA_WITH_AES_128_CBC_SHA256 = 0x003C,
- RSA_WITH_AES_256_CBC_SHA256 = 0x003D,
-
- // RFC 5288 - DH, DHE and RSA for AES-GCM
- RSA_WITH_AES_128_GCM_SHA256 = 0x009C,
- RSA_WITH_AES_256_GCM_SHA384 = 0x009D,
-
- // Secure cipher suites, but not recommended
-
- // RFC 5288 - DH, DHE and RSA for AES-GCM
- DHE_RSA_WITH_AES_128_GCM_SHA256 = 0x009E,
- DHE_RSA_WITH_AES_256_GCM_SHA384 = 0x009F,
-
- // RFC 5289 - ECDHE for AES-GCM
- ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0xC02F,
- ECDHE_RSA_WITH_AES_256_GCM_SHA384 = 0xC030,
-
- // All recommended cipher suites (according to https://ciphersuite.info/cs/)
-
- // RFC 5288 - DH, DHE and RSA for AES-GCM
- DHE_DSS_WITH_AES_128_GCM_SHA256 = 0x00A2,
- DHE_DSS_WITH_AES_256_GCM_SHA384 = 0x00A3,
-
- // RFC 5289 - ECDHE for AES-GCM
- ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0xC02B,
- ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 = 0xC02C,
-
- // RFC 5487 - Pre-shared keys
- DHE_PSK_WITH_AES_128_GCM_SHA256 = 0x00AA,
- DHE_PSK_WITH_AES_256_GCM_SHA384 = 0x00AB,
-
- // RFC 6209 - ARIA suites
- DHE_DSS_WITH_ARIA_128_GCM_SHA256 = 0xC056,
- DHE_DSS_WITH_ARIA_256_GCM_SHA384 = 0xC057,
- ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 = 0xC05C,
- ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 = 0xC05D,
- DHE_PSK_WITH_ARIA_128_GCM_SHA256 = 0xC06C,
- DHE_PSK_WITH_ARIA_256_GCM_SHA384 = 0xC06D,
-
- // RFC 6367 - Camellia Cipher Suites
- DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256 = 0xC080,
- DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384 = 0xC081,
- ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256 = 0xC086,
- ECDHE_ECDSA_WITH_CAMELLIA_256_GCM_SHA384 = 0xC087,
- DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256 = 0xC090,
- DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384 = 0xC091,
-
- // RFC 6655 - DHE, PSK and RSA with AES-CCM
- DHE_PSK_WITH_AES_128_CCM = 0xC0A6,
- DHE_PSK_WITH_AES_256_CCM = 0xC0A7,
-
- // RFC 7251 - ECDHE with AES-CCM
- ECDHE_ECDSA_WITH_AES_128_CCM = 0xC0AC,
- ECDHE_ECDSA_WITH_AES_256_CCM = 0xC0AD,
- ECDHE_ECDSA_WITH_AES_128_CCM_8 = 0xC0AE,
- ECDHE_ECDSA_WITH_AES_256_CCM_8 = 0xC0AF,
-
- // RFC 7905 - ChaCha20-Poly1305 Cipher Suites
- ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 = 0xCCA9,
- ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256 = 0xCCAC,
- DHE_PSK_WITH_CHACHA20_POLY1305 = 0xCCAD,
-
- // RFC 8442 - ECDHE_PSK with AES-GCM and AES-CCM
- ECDHE_PSK_WITH_AES_128_GCM_SHA256 = 0xD001,
- ECDHE_PSK_WITH_AES_256_GCM_SHA384 = 0xD002,
- ECDHE_PSK_WITH_AES_128_CCM_8_SHA256 = 0xD003,
- ECDHE_PSK_WITH_AES_128_CCM_SHA256 = 0xD005,
-
- // RFC 8446 - TLS v1.3
- AES_128_GCM_SHA256 = 0x1301,
- AES_256_GCM_SHA384 = 0x1302,
- CHACHA20_POLY1305_SHA256 = 0x1303,
- AES_128_CCM_SHA256 = 0x1304,
- AES_128_CCM_8_SHA256 = 0x1305,
-};
-
// Defined in RFC 5246 section 7.4.1.4.1
struct SignatureAndHashAlgorithm {
HashAlgorithm hash;