mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2026-05-20 01:14:46 +02:00
89491c7e36
Add support for X25519 and X448 based hybrid PQC + ECC key exchange groups. Furthermore, two new combinations with SECP curves are added to match OQS combinations. This also incorporates the changed order of X25519 and X448 based combinations to place the PQC material before the ECDH material. This is motivated by the necessity to always have material of a FIPS approved algorithm first. Also, codepoints are updated to reflect the latest draft standards for pure ML-KEM and some of the hybrids. With these changes and based on the recent additions to both enable ML-KEM final and draft versions simultaneously, a WolfSSL TLS server is now compatible with all recent browsers that support either the draft version of ML-KEM (Chromium based browsers and Firefox < version 132; only when the draft version is enabled in the build) or the final version already (Firefox > version 132). In the process of extending support, some code and logic cleanup happened. Furthermore, some memory leaks within the hybrid code path have been fixed. Signed-off-by: Tobias Frauenschläger <tobias.frauenschlaeger@oth-regensburg.de>
150 lines
3.1 KiB
Plaintext
150 lines
3.1 KiB
Plaintext
# server TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc P256_ML_KEM_512
|
|
|
|
# client TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc P256_ML_KEM_512
|
|
|
|
# server TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc P384_ML_KEM_768
|
|
|
|
# client TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc P384_ML_KEM_768
|
|
|
|
# server TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc P256_ML_KEM_768
|
|
|
|
# client TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc P256_ML_KEM_768
|
|
|
|
# server TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc P521_ML_KEM_1024
|
|
|
|
# client TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc P521_ML_KEM_1024
|
|
|
|
# server TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc P384_ML_KEM_1024
|
|
|
|
# client TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc P384_ML_KEM_1024
|
|
|
|
# server TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc X25519_ML_KEM_512
|
|
|
|
# client TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc X25519_ML_KEM_512
|
|
|
|
# server TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc X25519_ML_KEM_768
|
|
|
|
# client TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc X25519_ML_KEM_768
|
|
|
|
# server TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc X448_ML_KEM_768
|
|
|
|
# client TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc X448_ML_KEM_768
|
|
|
|
# server TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc P256_KYBER_LEVEL1
|
|
|
|
# client TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc P256_KYBER_LEVEL1
|
|
|
|
# server TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc P384_KYBER_LEVEL3
|
|
|
|
# client TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc P384_KYBER_LEVEL3
|
|
|
|
# server TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc P256_KYBER_LEVEL3
|
|
|
|
# client TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc P256_KYBER_LEVEL3
|
|
|
|
# server TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc P521_KYBER_LEVEL5
|
|
|
|
# client TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc P521_KYBER_LEVEL5
|
|
|
|
# server TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc X25519_KYBER_LEVEL1
|
|
|
|
# client TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc X25519_KYBER_LEVEL1
|
|
|
|
# server TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc X25519_KYBER_LEVEL3
|
|
|
|
# client TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc X25519_KYBER_LEVEL3
|
|
|
|
# server TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc X448_KYBER_LEVEL3
|
|
|
|
# client TLSv1.3 with post-quantum hybrid group
|
|
-v 4
|
|
-l TLS13-AES256-GCM-SHA384
|
|
--pqc X448_KYBER_LEVEL3
|