diff options
author | Michael Brown <mcb30@ipxe.org> | 2022-11-09 14:04:43 +0000 |
---|---|---|
committer | Michael Brown <mcb30@ipxe.org> | 2022-11-09 14:49:42 +0000 |
commit | 7256a6eb24720adfd30c0307a415e51e9a402059 (patch) | |
tree | b6ef488a22970b854c3312724b3c690e0c0bff9e /src/include/i82365.h | |
parent | 51ecc054906eb0b1738c9d5541c7c4dfc15ec5fe (diff) | |
download | ipxe-7256a6eb24720adfd30c0307a415e51e9a402059.tar.gz |
[tls] Allow handshake digest algorithm to be specified by cipher suite
All existing cipher suites use SHA-256 as the TLSv1.2 and above
handshake digest algorithm (even when using SHA-1 as the MAC digest
algorithm). Some GCM cipher suites use SHA-384 as the handshake
digest algorithm.
Allow the cipher suite to specify the handshake (and PRF) digest
algorithm to be used for TLSv1.2 and above.
This requires some restructuring to allow for the fact that the
ClientHello message must be included within the handshake digest, even
though the relevant digest algorithm is not yet known at the point
that the ClientHello is sent. Fortunately, the ClientHello may be
reproduced verbatim at the point of receiving the ServerHello, so we
rely on reconstructing (rather than storing) this message.
Signed-off-by: Michael Brown <mcb30@ipxe.org>
Diffstat (limited to 'src/include/i82365.h')
0 files changed, 0 insertions, 0 deletions