Skip to content

Commit dc609b0

Browse files
committed
doc: write the list of supperted cipher suites in TCM
1 parent 267d665 commit dc609b0

File tree

1 file changed

+47
-40
lines changed

1 file changed

+47
-40
lines changed

doc/tooling/tcm/tcm_configuration_reference.rst

Lines changed: 47 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -656,49 +656,56 @@ The ``http`` group defines parameters of HTTP connections between |tcm| and clie
656656

657657
Enabled TLS cipher suites. The supported ciphers are:
658658

659+
- TLS 1.0 - 1.2 cipher suites:
660+
- TLS_RSA_WITH_RC4_128_SHA
661+
- TLS_RSA_WITH_3DES_EDE_CBC_SHA
662+
- TLS_RSA_WITH_AES_128_CBC_SHA
663+
- TLS_RSA_WITH_AES_256_CBC_SHA
664+
- TLS_RSA_WITH_AES_128_CBC_SHA256
665+
- TLS_RSA_WITH_AES_128_GCM_SHA256
666+
- TLS_RSA_WITH_AES_256_GCM_SHA384
667+
- TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
668+
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
669+
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
670+
- TLS_ECDHE_RSA_WITH_RC4_128_SHA
671+
- TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
672+
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
673+
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
674+
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
675+
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
676+
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
677+
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
678+
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
679+
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
680+
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
681+
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
682+
683+
- TLS 1.3 cipher suites:
684+
- TLS_AES_128_GCM_SHA256
685+
- TLS_AES_256_GCM_SHA384
686+
- TLS_CHACHA20_POLY1305_SHA256
687+
- TLS_FALLBACK_SCSV isn't a standard cipher suite but an indicator that the client is doing version fallback
688+
- TLS_FALLBACK_SCSV uint16 = 0x5600
689+
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 = TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
690+
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305 = TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA25
691+
692+
For detailed information on ciphers, refer to the Golang `tls.TLS_* <https://pkg.go.dev/crypto/tls#pkg-constants>`__ constants.
693+
694+
The example below shows how to configure cipher suites:
695+
659696
.. code-block:: yaml
660697
661-
const (
662-
// TLS 1.0 - 1.2 cipher suites.
663-
TLS_RSA_WITH_RC4_128_SHA uint16 = 0x0005
664-
TLS_RSA_WITH_3DES_EDE_CBC_SHA uint16 = 0x000a
665-
TLS_RSA_WITH_AES_128_CBC_SHA uint16 = 0x002f
666-
TLS_RSA_WITH_AES_256_CBC_SHA uint16 = 0x0035
667-
TLS_RSA_WITH_AES_128_CBC_SHA256 uint16 = 0x003c
668-
TLS_RSA_WITH_AES_128_GCM_SHA256 uint16 = 0x009c
669-
TLS_RSA_WITH_AES_256_GCM_SHA384 uint16 = 0x009d
670-
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA uint16 = 0xc007
671-
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA uint16 = 0xc009
672-
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA uint16 = 0xc00a
673-
TLS_ECDHE_RSA_WITH_RC4_128_SHA uint16 = 0xc011
674-
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA uint16 = 0xc012
675-
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA uint16 = 0xc013
676-
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA uint16 = 0xc014
677-
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 uint16 = 0xc023
678-
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 uint16 = 0xc027
679-
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 uint16 = 0xc02f
680-
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 uint16 = 0xc02b
681-
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 uint16 = 0xc030
682-
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 uint16 = 0xc02c
683-
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 uint16 = 0xcca8
684-
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 uint16 = 0xcca9
685-
686-
// TLS 1.3 cipher suites.
687-
TLS_AES_128_GCM_SHA256 uint16 = 0x1301
688-
TLS_AES_256_GCM_SHA384 uint16 = 0x1302
689-
TLS_CHACHA20_POLY1305_SHA256 uint16 = 0x1303
690-
691-
// TLS_FALLBACK_SCSV isn't a standard cipher suite but an indicator
692-
// that the client is doing version fallback. See RFC 7507.
693-
TLS_FALLBACK_SCSV uint16 = 0x5600
694-
695-
// Legacy names for the corresponding cipher suites with the correct _SHA256
696-
// suffix, retained for backward compatibility.
697-
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 = TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
698-
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305 = TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
699-
)
698+
http:
699+
cipher-suites:
700+
- TLS_AES_256_GCM_SHA384
701+
- TLS_AES_128_GCM_SHA256
702+
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
703+
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
704+
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
705+
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
706+
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
707+
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
700708
701-
For detailed information on ciphers, refer to the Golang `tls.TLS_* <https://pkg.go.dev/crypto/tls#pkg-constants>`__ constants.
702709
703710
|
704711
| Type: []uint16

0 commit comments

Comments
 (0)