Revision control
Copy as Markdown
Other Tools
#!/usr/bin/env python3
"""
Used to generate lib/tls/tls_suite_info.cpp from IANA params
(C) 2011, 2012, 2013, 2014, 2015, 2016, 2017 Jack Lloyd
(C) 2021 Elektrobit Automotive GmbH
Botan is released under the Simplified BSD License (see license.txt)
"""
import sys
import re
import datetime
import hashlib
import optparse
def to_ciphersuite_info(code, name):
sig_and_kex = ''
cipher_and_mac = ''
with_substr = '_WITH_'
if with_substr in name:
# TLS 1.2 or earlier cipher suites
(sig_and_kex,cipher_and_mac) = name.split(with_substr)
else:
# TLS 1.3 cipher suites, no sig_and_kex
cipher_and_mac = name
if sig_and_kex == '':
# UNDEFINED means that the information is not coded in the cipher suite
sig_algo = 'UNDEFINED'
kex_algo = 'UNDEFINED'
elif sig_and_kex == 'RSA':
sig_algo = 'IMPLICIT'
kex_algo = 'RSA'
elif 'PSK' in sig_and_kex:
sig_algo = 'IMPLICIT'
kex_algo = sig_and_kex
elif 'SRP' in sig_and_kex:
srp_info = sig_and_kex.split('_')
if len(srp_info) == 2: # 'SRP_' + hash
kex_algo = sig_and_kex
sig_algo = 'IMPLICIT'
else:
kex_algo = '_'.join(srp_info[0:-1])
sig_algo = srp_info[-1]
else:
(kex_algo, sig_algo) = sig_and_kex.split('_')
cipher_and_mac = cipher_and_mac.split('_')
mac_algo = cipher_and_mac[-1]
cipher = cipher_and_mac[:-1]
if mac_algo == '8' and cipher[-1] == 'CCM':
cipher = cipher[:-1]
mac_algo = 'CCM_8'
elif cipher[-2] == 'CCM' and cipher[-1] == '8':
cipher = cipher[:-1]
mac_algo = 'CCM_8'
if mac_algo == 'CCM':
cipher += ['CCM']
mac_algo = 'SHA256'
elif mac_algo == 'CCM_8':
cipher += ['CCM(8)']
mac_algo = 'SHA256'
cipher_info = {
'CHACHA20': ('ChaCha',32),
'IDEA': ('IDEA',16),
'DES': ('DES',8),
'3DES': ('3DES',24),
'CAMELLIA': ('Camellia',None),
'AES': ('AES',None),
'SEED': ('SEED',16),
'ARIA': ('ARIA',None),
}
tls_to_botan_names = {
'UNDEFINED': 'UNDEFINED',
'IMPLICIT': 'IMPLICIT',
'anon': 'ANONYMOUS',
'MD5': 'MD5',
'SHA': 'SHA-1',
'SHA256': 'SHA-256',
'SHA384': 'SHA-384',
'SHA512': 'SHA-512',
'CHACHA': 'ChaCha',
'3DES': 'TripleDES',
'DSS': 'DSA',
'ECDSA': 'ECDSA',
'RSA': 'RSA',
'SRP_SHA': 'SRP_SHA',
'DHE': 'DH',
'DH': 'DH',
'ECDHE': 'ECDH',
'ECDH': 'ECDH',
'': '',
'PSK': 'PSK',
'DHE_PSK': 'DHE_PSK',
'PSK_DHE': 'DHE_PSK',
'ECDHE_PSK': 'ECDHE_PSK',
}
mac_keylen = {
'MD5': 16,
'SHA-1': 20,
'SHA-256': 32,
'SHA-384': 48,
'SHA-512': 64,
}
mac_algo = tls_to_botan_names[mac_algo]
sig_algo = tls_to_botan_names[sig_algo]
kex_algo = tls_to_botan_names[kex_algo]
if kex_algo == 'RSA':
kex_algo = 'STATIC_RSA'
if sig_algo in ['DSA']:
return None
if kex_algo in ['SRP_SHA', 'DHE_PSK']:
return None
(cipher_algo, cipher_keylen) = cipher_info[cipher[0]]
if cipher_keylen is None:
cipher_keylen = int(cipher[1]) / 8
if cipher_algo in ['AES', 'Camellia', 'ARIA']:
cipher_algo += '-%d' % (cipher_keylen*8)
mode = ''
if cipher[0] == 'CHACHA20' and cipher[1] == 'POLY1305':
return (name, code, sig_algo, kex_algo, "ChaCha20Poly1305", cipher_keylen, "AEAD", 0, mac_algo, 'AEAD_XOR_12')
mode = cipher[-1]
if mode not in ['CBC', 'GCM', 'CCM(8)', 'CCM', 'OCB']:
print("#warning Unknown mode '%s' for ciphersuite %s (0x%d)" % (' '.join(cipher), name, code))
if mode != 'CBC':
if mode == 'OCB':
cipher_algo += '/OCB(12)'
else:
cipher_algo += '/' + mode
if mode == 'CBC':
return (name, code, sig_algo, kex_algo, cipher_algo, cipher_keylen, mac_algo, mac_keylen[mac_algo], mac_algo, 'CBC_MODE')
elif mode == 'OCB':
return (name, code, sig_algo, kex_algo, cipher_algo, cipher_keylen, "AEAD", 0, mac_algo, 'AEAD_XOR_12')
else:
return (name, code, sig_algo, kex_algo, cipher_algo, cipher_keylen, "AEAD", 0, mac_algo, 'AEAD_IMPLICIT_4')
def open_input(args):
if len(args) == 1:
try:
return open('tls-parameters.txt')
except OSError:
pass
import urllib.request, urllib.error, urllib.parse
return urllib.request.urlopen(iana_url)
else:
return open(args[1])
"""
Handle command line options
"""
def process_command_line(args):
parser = optparse.OptionParser()
parser.add_option('--with-ocb', action='store_true', default=True,
help='enable OCB AEAD suites')
parser.add_option('--without-ocb', action='store_false', dest='with_ocb',
help='disable OCB AEAD suites')
parser.add_option('--with-aria-cbc', action='store_true', default=False,
help='enable ARIA CBC suites')
parser.add_option('--without-aria-cbc', action='store_false', dest='with_aria_cbc',
help='disable ARIA CBC suites')
parser.add_option('--save-download', action='store_true', default=False,
help='save downloaded tls-parameters.txt to cwd')
parser.add_option('--output', '-o',
help='file to write output to (default %default)',
default='src/lib/tls/tls_suite_info.cpp')
return parser.parse_args(args)
def main(args = None):
if args is None:
args = sys.argv
weak_crypto = ['EXPORT', 'RC2', 'IDEA', 'RC4', '_DES_', 'WITH_NULL', 'GOST', '_anon_']
static_dh = ['ECDH_ECDSA', 'ECDH_RSA', 'DH_DSS', 'DH_RSA'] # not supported
removed_algos = ['SEED', 'CAMELLIA_128_CBC', 'CAMELLIA_256_CBC']
protocol_goop = ['SCSV', 'KRB5']
maybe_someday = ['RSA_PSK', 'ECCPWD', 'AEGIS']
macciphersuites = ['SHA256_SHA256', 'SHA384_SHA384']
shang_mi = ['SM4_GCM_SM3', 'SM4_CCM_SM3'] # RFC8998
not_supported = weak_crypto + static_dh + protocol_goop + maybe_someday + removed_algos + macciphersuites + shang_mi
(options, args) = process_command_line(args)
if not options.with_aria_cbc:
not_supported += ['ARIA_128_CBC', 'ARIA_256_CBC']
ciphersuite_re = re.compile(' +0x([0-9a-fA-F][0-9a-fA-F]),0x([0-9a-fA-F][0-9a-fA-F]) + TLS_([A-Za-z_0-9]+) ')
suites = {}
contents = ''
for line in open_input(args):
if not isinstance(line, str):
line = line.decode('utf8')
contents += line
match = ciphersuite_re.match(line)
if match:
code = match.group(1) + match.group(2)
name = match.group(3)
should_use = True
for ns in not_supported:
if ns in name:
should_use = False
if should_use:# and name.find('_WITH_') > 0:
info = to_ciphersuite_info(code, name)
if info is not None:
suites[code] = info
sha256 = hashlib.sha256()
sha256.update(contents.encode('utf8'))
contents_hash = sha256.hexdigest()
if options.save_download:
out = open('tls-parameters.txt', 'w')
out.write(contents)
out.close()
def define_custom_ciphersuite(name, code):
info = to_ciphersuite_info(code, name)
if info is not None:
suites[code] = info
if options.with_ocb:
# OCB ciphersuites draft-zauner-tls-aes-ocb-04
define_custom_ciphersuite('ECDHE_RSA_WITH_AES_256_OCB_SHA256', 'FFC3')
define_custom_ciphersuite('ECDHE_ECDSA_WITH_AES_256_OCB_SHA256', 'FFC5')
define_custom_ciphersuite('PSK_WITH_AES_256_OCB_SHA256', 'FFC7')
define_custom_ciphersuite('ECDHE_PSK_WITH_AES_256_OCB_SHA256', 'FFCB')
suite_info = ''
def header():
return """/*
* TLS cipher suite information
*
* This file was automatically generated by %s on %s
* using the IANA assignments (tls-parameters.txt sha256 %s)
*
* Botan is released under the Simplified BSD License (see license.txt)
*/
""" % (sys.argv[0], datetime.date.today().strftime("%Y-%m-%d"), contents_hash)
suite_info += header()
suite_info += """#include <botan/tls_ciphersuite.h>
namespace Botan::TLS {
//static
const std::vector<Ciphersuite>& Ciphersuite::all_known_ciphersuites() {
// clang-format off
// Note that this list of ciphersuites is ordered by id!
static const std::vector<Ciphersuite> g_ciphersuite_list = {
"""
for code in sorted(suites.keys()):
info = suites[code]
assert len(info) == 10
suite_expr = 'Ciphersuite(0x%s, "%s", Auth_Method::%s, Kex_Algo::%s, "%s", %d, "%s", %d, KDF_Algo::%s, Nonce_Format::%s)' % (
code, info[0], info[2], info[3], info[4], info[5], info[6], info[7], info[8].replace('-','_'), info[9])
suite_info += " " + suite_expr + ",\n"
suite_info += """ };
// clang-format on
return g_ciphersuite_list;
}
} // namespace Botan::TLS
"""
if options.output == '-':
print(suite_info)
else:
out = open(options.output, 'w')
out.write(suite_info)
out.close()
return 0
if __name__ == '__main__':
sys.exit(main())