]> git.ipfire.org Git - thirdparty/openssl.git/blame_incremental - ssl/s3_lib.c
Remove some redundant code
[thirdparty/openssl.git] / ssl / s3_lib.c
... / ...
CommitLineData
1/*
2 * Copyright 1995-2022 The OpenSSL Project Authors. All Rights Reserved.
3 * Copyright (c) 2002, Oracle and/or its affiliates. All rights reserved
4 * Copyright 2005 Nokia. All rights reserved.
5 *
6 * Licensed under the Apache License 2.0 (the "License"). You may not use
7 * this file except in compliance with the License. You can obtain a copy
8 * in the file LICENSE in the source distribution or at
9 * https://www.openssl.org/source/license.html
10 */
11
12#include <stdio.h>
13#include <openssl/objects.h>
14#include "internal/nelem.h"
15#include "ssl_local.h"
16#include <openssl/md5.h>
17#include <openssl/dh.h>
18#include <openssl/rand.h>
19#include <openssl/trace.h>
20#include <openssl/x509v3.h>
21#include <openssl/core_names.h>
22#include "internal/cryptlib.h"
23
24#define TLS13_NUM_CIPHERS OSSL_NELEM(tls13_ciphers)
25#define SSL3_NUM_CIPHERS OSSL_NELEM(ssl3_ciphers)
26#define SSL3_NUM_SCSVS OSSL_NELEM(ssl3_scsvs)
27
28/* TLSv1.3 downgrade protection sentinel values */
29const unsigned char tls11downgrade[] = {
30 0x44, 0x4f, 0x57, 0x4e, 0x47, 0x52, 0x44, 0x00
31};
32const unsigned char tls12downgrade[] = {
33 0x44, 0x4f, 0x57, 0x4e, 0x47, 0x52, 0x44, 0x01
34};
35
36/* The list of available TLSv1.3 ciphers */
37static SSL_CIPHER tls13_ciphers[] = {
38 {
39 1,
40 TLS1_3_RFC_AES_128_GCM_SHA256,
41 TLS1_3_RFC_AES_128_GCM_SHA256,
42 TLS1_3_CK_AES_128_GCM_SHA256,
43 SSL_kANY,
44 SSL_aANY,
45 SSL_AES128GCM,
46 SSL_AEAD,
47 TLS1_3_VERSION, TLS1_3_VERSION,
48 0, 0,
49 SSL_HIGH,
50 SSL_HANDSHAKE_MAC_SHA256,
51 128,
52 128,
53 }, {
54 1,
55 TLS1_3_RFC_AES_256_GCM_SHA384,
56 TLS1_3_RFC_AES_256_GCM_SHA384,
57 TLS1_3_CK_AES_256_GCM_SHA384,
58 SSL_kANY,
59 SSL_aANY,
60 SSL_AES256GCM,
61 SSL_AEAD,
62 TLS1_3_VERSION, TLS1_3_VERSION,
63 0, 0,
64 SSL_HIGH,
65 SSL_HANDSHAKE_MAC_SHA384,
66 256,
67 256,
68 },
69 {
70 1,
71 TLS1_3_RFC_CHACHA20_POLY1305_SHA256,
72 TLS1_3_RFC_CHACHA20_POLY1305_SHA256,
73 TLS1_3_CK_CHACHA20_POLY1305_SHA256,
74 SSL_kANY,
75 SSL_aANY,
76 SSL_CHACHA20POLY1305,
77 SSL_AEAD,
78 TLS1_3_VERSION, TLS1_3_VERSION,
79 0, 0,
80 SSL_HIGH,
81 SSL_HANDSHAKE_MAC_SHA256,
82 256,
83 256,
84 },
85 {
86 1,
87 TLS1_3_RFC_AES_128_CCM_SHA256,
88 TLS1_3_RFC_AES_128_CCM_SHA256,
89 TLS1_3_CK_AES_128_CCM_SHA256,
90 SSL_kANY,
91 SSL_aANY,
92 SSL_AES128CCM,
93 SSL_AEAD,
94 TLS1_3_VERSION, TLS1_3_VERSION,
95 0, 0,
96 SSL_NOT_DEFAULT | SSL_HIGH,
97 SSL_HANDSHAKE_MAC_SHA256,
98 128,
99 128,
100 }, {
101 1,
102 TLS1_3_RFC_AES_128_CCM_8_SHA256,
103 TLS1_3_RFC_AES_128_CCM_8_SHA256,
104 TLS1_3_CK_AES_128_CCM_8_SHA256,
105 SSL_kANY,
106 SSL_aANY,
107 SSL_AES128CCM8,
108 SSL_AEAD,
109 TLS1_3_VERSION, TLS1_3_VERSION,
110 0, 0,
111 SSL_NOT_DEFAULT | SSL_MEDIUM,
112 SSL_HANDSHAKE_MAC_SHA256,
113 64, /* CCM8 uses a short tag, so we have a low security strength */
114 128,
115 }
116};
117
118/*
119 * The list of available ciphers, mostly organized into the following
120 * groups:
121 * Always there
122 * EC
123 * PSK
124 * SRP (within that: RSA EC PSK)
125 * Cipher families: Chacha/poly, Camellia, Gost, IDEA, SEED
126 * Weak ciphers
127 */
128static SSL_CIPHER ssl3_ciphers[] = {
129 {
130 1,
131 SSL3_TXT_RSA_NULL_MD5,
132 SSL3_RFC_RSA_NULL_MD5,
133 SSL3_CK_RSA_NULL_MD5,
134 SSL_kRSA,
135 SSL_aRSA,
136 SSL_eNULL,
137 SSL_MD5,
138 SSL3_VERSION, TLS1_2_VERSION,
139 DTLS1_BAD_VER, DTLS1_2_VERSION,
140 SSL_STRONG_NONE,
141 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
142 0,
143 0,
144 },
145 {
146 1,
147 SSL3_TXT_RSA_NULL_SHA,
148 SSL3_RFC_RSA_NULL_SHA,
149 SSL3_CK_RSA_NULL_SHA,
150 SSL_kRSA,
151 SSL_aRSA,
152 SSL_eNULL,
153 SSL_SHA1,
154 SSL3_VERSION, TLS1_2_VERSION,
155 DTLS1_BAD_VER, DTLS1_2_VERSION,
156 SSL_STRONG_NONE | SSL_FIPS,
157 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
158 0,
159 0,
160 },
161#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
162 {
163 1,
164 SSL3_TXT_RSA_DES_192_CBC3_SHA,
165 SSL3_RFC_RSA_DES_192_CBC3_SHA,
166 SSL3_CK_RSA_DES_192_CBC3_SHA,
167 SSL_kRSA,
168 SSL_aRSA,
169 SSL_3DES,
170 SSL_SHA1,
171 SSL3_VERSION, TLS1_2_VERSION,
172 DTLS1_BAD_VER, DTLS1_2_VERSION,
173 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
174 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
175 112,
176 168,
177 },
178 {
179 1,
180 SSL3_TXT_DHE_DSS_DES_192_CBC3_SHA,
181 SSL3_RFC_DHE_DSS_DES_192_CBC3_SHA,
182 SSL3_CK_DHE_DSS_DES_192_CBC3_SHA,
183 SSL_kDHE,
184 SSL_aDSS,
185 SSL_3DES,
186 SSL_SHA1,
187 SSL3_VERSION, TLS1_2_VERSION,
188 DTLS1_BAD_VER, DTLS1_2_VERSION,
189 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
190 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
191 112,
192 168,
193 },
194 {
195 1,
196 SSL3_TXT_DHE_RSA_DES_192_CBC3_SHA,
197 SSL3_RFC_DHE_RSA_DES_192_CBC3_SHA,
198 SSL3_CK_DHE_RSA_DES_192_CBC3_SHA,
199 SSL_kDHE,
200 SSL_aRSA,
201 SSL_3DES,
202 SSL_SHA1,
203 SSL3_VERSION, TLS1_2_VERSION,
204 DTLS1_BAD_VER, DTLS1_2_VERSION,
205 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
206 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
207 112,
208 168,
209 },
210 {
211 1,
212 SSL3_TXT_ADH_DES_192_CBC_SHA,
213 SSL3_RFC_ADH_DES_192_CBC_SHA,
214 SSL3_CK_ADH_DES_192_CBC_SHA,
215 SSL_kDHE,
216 SSL_aNULL,
217 SSL_3DES,
218 SSL_SHA1,
219 SSL3_VERSION, TLS1_2_VERSION,
220 DTLS1_BAD_VER, DTLS1_2_VERSION,
221 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
222 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
223 112,
224 168,
225 },
226#endif
227 {
228 1,
229 TLS1_TXT_RSA_WITH_AES_128_SHA,
230 TLS1_RFC_RSA_WITH_AES_128_SHA,
231 TLS1_CK_RSA_WITH_AES_128_SHA,
232 SSL_kRSA,
233 SSL_aRSA,
234 SSL_AES128,
235 SSL_SHA1,
236 SSL3_VERSION, TLS1_2_VERSION,
237 DTLS1_BAD_VER, DTLS1_2_VERSION,
238 SSL_HIGH | SSL_FIPS,
239 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
240 128,
241 128,
242 },
243 {
244 1,
245 TLS1_TXT_DHE_DSS_WITH_AES_128_SHA,
246 TLS1_RFC_DHE_DSS_WITH_AES_128_SHA,
247 TLS1_CK_DHE_DSS_WITH_AES_128_SHA,
248 SSL_kDHE,
249 SSL_aDSS,
250 SSL_AES128,
251 SSL_SHA1,
252 SSL3_VERSION, TLS1_2_VERSION,
253 DTLS1_BAD_VER, DTLS1_2_VERSION,
254 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
255 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
256 128,
257 128,
258 },
259 {
260 1,
261 TLS1_TXT_DHE_RSA_WITH_AES_128_SHA,
262 TLS1_RFC_DHE_RSA_WITH_AES_128_SHA,
263 TLS1_CK_DHE_RSA_WITH_AES_128_SHA,
264 SSL_kDHE,
265 SSL_aRSA,
266 SSL_AES128,
267 SSL_SHA1,
268 SSL3_VERSION, TLS1_2_VERSION,
269 DTLS1_BAD_VER, DTLS1_2_VERSION,
270 SSL_HIGH | SSL_FIPS,
271 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
272 128,
273 128,
274 },
275 {
276 1,
277 TLS1_TXT_ADH_WITH_AES_128_SHA,
278 TLS1_RFC_ADH_WITH_AES_128_SHA,
279 TLS1_CK_ADH_WITH_AES_128_SHA,
280 SSL_kDHE,
281 SSL_aNULL,
282 SSL_AES128,
283 SSL_SHA1,
284 SSL3_VERSION, TLS1_2_VERSION,
285 DTLS1_BAD_VER, DTLS1_2_VERSION,
286 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
287 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
288 128,
289 128,
290 },
291 {
292 1,
293 TLS1_TXT_RSA_WITH_AES_256_SHA,
294 TLS1_RFC_RSA_WITH_AES_256_SHA,
295 TLS1_CK_RSA_WITH_AES_256_SHA,
296 SSL_kRSA,
297 SSL_aRSA,
298 SSL_AES256,
299 SSL_SHA1,
300 SSL3_VERSION, TLS1_2_VERSION,
301 DTLS1_BAD_VER, DTLS1_2_VERSION,
302 SSL_HIGH | SSL_FIPS,
303 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
304 256,
305 256,
306 },
307 {
308 1,
309 TLS1_TXT_DHE_DSS_WITH_AES_256_SHA,
310 TLS1_RFC_DHE_DSS_WITH_AES_256_SHA,
311 TLS1_CK_DHE_DSS_WITH_AES_256_SHA,
312 SSL_kDHE,
313 SSL_aDSS,
314 SSL_AES256,
315 SSL_SHA1,
316 SSL3_VERSION, TLS1_2_VERSION,
317 DTLS1_BAD_VER, DTLS1_2_VERSION,
318 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
319 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
320 256,
321 256,
322 },
323 {
324 1,
325 TLS1_TXT_DHE_RSA_WITH_AES_256_SHA,
326 TLS1_RFC_DHE_RSA_WITH_AES_256_SHA,
327 TLS1_CK_DHE_RSA_WITH_AES_256_SHA,
328 SSL_kDHE,
329 SSL_aRSA,
330 SSL_AES256,
331 SSL_SHA1,
332 SSL3_VERSION, TLS1_2_VERSION,
333 DTLS1_BAD_VER, DTLS1_2_VERSION,
334 SSL_HIGH | SSL_FIPS,
335 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
336 256,
337 256,
338 },
339 {
340 1,
341 TLS1_TXT_ADH_WITH_AES_256_SHA,
342 TLS1_RFC_ADH_WITH_AES_256_SHA,
343 TLS1_CK_ADH_WITH_AES_256_SHA,
344 SSL_kDHE,
345 SSL_aNULL,
346 SSL_AES256,
347 SSL_SHA1,
348 SSL3_VERSION, TLS1_2_VERSION,
349 DTLS1_BAD_VER, DTLS1_2_VERSION,
350 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
351 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
352 256,
353 256,
354 },
355 {
356 1,
357 TLS1_TXT_RSA_WITH_NULL_SHA256,
358 TLS1_RFC_RSA_WITH_NULL_SHA256,
359 TLS1_CK_RSA_WITH_NULL_SHA256,
360 SSL_kRSA,
361 SSL_aRSA,
362 SSL_eNULL,
363 SSL_SHA256,
364 TLS1_2_VERSION, TLS1_2_VERSION,
365 DTLS1_2_VERSION, DTLS1_2_VERSION,
366 SSL_STRONG_NONE | SSL_FIPS,
367 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
368 0,
369 0,
370 },
371 {
372 1,
373 TLS1_TXT_RSA_WITH_AES_128_SHA256,
374 TLS1_RFC_RSA_WITH_AES_128_SHA256,
375 TLS1_CK_RSA_WITH_AES_128_SHA256,
376 SSL_kRSA,
377 SSL_aRSA,
378 SSL_AES128,
379 SSL_SHA256,
380 TLS1_2_VERSION, TLS1_2_VERSION,
381 DTLS1_2_VERSION, DTLS1_2_VERSION,
382 SSL_HIGH | SSL_FIPS,
383 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
384 128,
385 128,
386 },
387 {
388 1,
389 TLS1_TXT_RSA_WITH_AES_256_SHA256,
390 TLS1_RFC_RSA_WITH_AES_256_SHA256,
391 TLS1_CK_RSA_WITH_AES_256_SHA256,
392 SSL_kRSA,
393 SSL_aRSA,
394 SSL_AES256,
395 SSL_SHA256,
396 TLS1_2_VERSION, TLS1_2_VERSION,
397 DTLS1_2_VERSION, DTLS1_2_VERSION,
398 SSL_HIGH | SSL_FIPS,
399 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
400 256,
401 256,
402 },
403 {
404 1,
405 TLS1_TXT_DHE_DSS_WITH_AES_128_SHA256,
406 TLS1_RFC_DHE_DSS_WITH_AES_128_SHA256,
407 TLS1_CK_DHE_DSS_WITH_AES_128_SHA256,
408 SSL_kDHE,
409 SSL_aDSS,
410 SSL_AES128,
411 SSL_SHA256,
412 TLS1_2_VERSION, TLS1_2_VERSION,
413 DTLS1_2_VERSION, DTLS1_2_VERSION,
414 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
415 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
416 128,
417 128,
418 },
419 {
420 1,
421 TLS1_TXT_DHE_RSA_WITH_AES_128_SHA256,
422 TLS1_RFC_DHE_RSA_WITH_AES_128_SHA256,
423 TLS1_CK_DHE_RSA_WITH_AES_128_SHA256,
424 SSL_kDHE,
425 SSL_aRSA,
426 SSL_AES128,
427 SSL_SHA256,
428 TLS1_2_VERSION, TLS1_2_VERSION,
429 DTLS1_2_VERSION, DTLS1_2_VERSION,
430 SSL_HIGH | SSL_FIPS,
431 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
432 128,
433 128,
434 },
435 {
436 1,
437 TLS1_TXT_DHE_DSS_WITH_AES_256_SHA256,
438 TLS1_RFC_DHE_DSS_WITH_AES_256_SHA256,
439 TLS1_CK_DHE_DSS_WITH_AES_256_SHA256,
440 SSL_kDHE,
441 SSL_aDSS,
442 SSL_AES256,
443 SSL_SHA256,
444 TLS1_2_VERSION, TLS1_2_VERSION,
445 DTLS1_2_VERSION, DTLS1_2_VERSION,
446 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
447 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
448 256,
449 256,
450 },
451 {
452 1,
453 TLS1_TXT_DHE_RSA_WITH_AES_256_SHA256,
454 TLS1_RFC_DHE_RSA_WITH_AES_256_SHA256,
455 TLS1_CK_DHE_RSA_WITH_AES_256_SHA256,
456 SSL_kDHE,
457 SSL_aRSA,
458 SSL_AES256,
459 SSL_SHA256,
460 TLS1_2_VERSION, TLS1_2_VERSION,
461 DTLS1_2_VERSION, DTLS1_2_VERSION,
462 SSL_HIGH | SSL_FIPS,
463 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
464 256,
465 256,
466 },
467 {
468 1,
469 TLS1_TXT_ADH_WITH_AES_128_SHA256,
470 TLS1_RFC_ADH_WITH_AES_128_SHA256,
471 TLS1_CK_ADH_WITH_AES_128_SHA256,
472 SSL_kDHE,
473 SSL_aNULL,
474 SSL_AES128,
475 SSL_SHA256,
476 TLS1_2_VERSION, TLS1_2_VERSION,
477 DTLS1_2_VERSION, DTLS1_2_VERSION,
478 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
479 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
480 128,
481 128,
482 },
483 {
484 1,
485 TLS1_TXT_ADH_WITH_AES_256_SHA256,
486 TLS1_RFC_ADH_WITH_AES_256_SHA256,
487 TLS1_CK_ADH_WITH_AES_256_SHA256,
488 SSL_kDHE,
489 SSL_aNULL,
490 SSL_AES256,
491 SSL_SHA256,
492 TLS1_2_VERSION, TLS1_2_VERSION,
493 DTLS1_2_VERSION, DTLS1_2_VERSION,
494 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
495 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
496 256,
497 256,
498 },
499 {
500 1,
501 TLS1_TXT_RSA_WITH_AES_128_GCM_SHA256,
502 TLS1_RFC_RSA_WITH_AES_128_GCM_SHA256,
503 TLS1_CK_RSA_WITH_AES_128_GCM_SHA256,
504 SSL_kRSA,
505 SSL_aRSA,
506 SSL_AES128GCM,
507 SSL_AEAD,
508 TLS1_2_VERSION, TLS1_2_VERSION,
509 DTLS1_2_VERSION, DTLS1_2_VERSION,
510 SSL_HIGH | SSL_FIPS,
511 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
512 128,
513 128,
514 },
515 {
516 1,
517 TLS1_TXT_RSA_WITH_AES_256_GCM_SHA384,
518 TLS1_RFC_RSA_WITH_AES_256_GCM_SHA384,
519 TLS1_CK_RSA_WITH_AES_256_GCM_SHA384,
520 SSL_kRSA,
521 SSL_aRSA,
522 SSL_AES256GCM,
523 SSL_AEAD,
524 TLS1_2_VERSION, TLS1_2_VERSION,
525 DTLS1_2_VERSION, DTLS1_2_VERSION,
526 SSL_HIGH | SSL_FIPS,
527 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
528 256,
529 256,
530 },
531 {
532 1,
533 TLS1_TXT_DHE_RSA_WITH_AES_128_GCM_SHA256,
534 TLS1_RFC_DHE_RSA_WITH_AES_128_GCM_SHA256,
535 TLS1_CK_DHE_RSA_WITH_AES_128_GCM_SHA256,
536 SSL_kDHE,
537 SSL_aRSA,
538 SSL_AES128GCM,
539 SSL_AEAD,
540 TLS1_2_VERSION, TLS1_2_VERSION,
541 DTLS1_2_VERSION, DTLS1_2_VERSION,
542 SSL_HIGH | SSL_FIPS,
543 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
544 128,
545 128,
546 },
547 {
548 1,
549 TLS1_TXT_DHE_RSA_WITH_AES_256_GCM_SHA384,
550 TLS1_RFC_DHE_RSA_WITH_AES_256_GCM_SHA384,
551 TLS1_CK_DHE_RSA_WITH_AES_256_GCM_SHA384,
552 SSL_kDHE,
553 SSL_aRSA,
554 SSL_AES256GCM,
555 SSL_AEAD,
556 TLS1_2_VERSION, TLS1_2_VERSION,
557 DTLS1_2_VERSION, DTLS1_2_VERSION,
558 SSL_HIGH | SSL_FIPS,
559 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
560 256,
561 256,
562 },
563 {
564 1,
565 TLS1_TXT_DHE_DSS_WITH_AES_128_GCM_SHA256,
566 TLS1_RFC_DHE_DSS_WITH_AES_128_GCM_SHA256,
567 TLS1_CK_DHE_DSS_WITH_AES_128_GCM_SHA256,
568 SSL_kDHE,
569 SSL_aDSS,
570 SSL_AES128GCM,
571 SSL_AEAD,
572 TLS1_2_VERSION, TLS1_2_VERSION,
573 DTLS1_2_VERSION, DTLS1_2_VERSION,
574 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
575 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
576 128,
577 128,
578 },
579 {
580 1,
581 TLS1_TXT_DHE_DSS_WITH_AES_256_GCM_SHA384,
582 TLS1_RFC_DHE_DSS_WITH_AES_256_GCM_SHA384,
583 TLS1_CK_DHE_DSS_WITH_AES_256_GCM_SHA384,
584 SSL_kDHE,
585 SSL_aDSS,
586 SSL_AES256GCM,
587 SSL_AEAD,
588 TLS1_2_VERSION, TLS1_2_VERSION,
589 DTLS1_2_VERSION, DTLS1_2_VERSION,
590 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
591 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
592 256,
593 256,
594 },
595 {
596 1,
597 TLS1_TXT_ADH_WITH_AES_128_GCM_SHA256,
598 TLS1_RFC_ADH_WITH_AES_128_GCM_SHA256,
599 TLS1_CK_ADH_WITH_AES_128_GCM_SHA256,
600 SSL_kDHE,
601 SSL_aNULL,
602 SSL_AES128GCM,
603 SSL_AEAD,
604 TLS1_2_VERSION, TLS1_2_VERSION,
605 DTLS1_2_VERSION, DTLS1_2_VERSION,
606 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
607 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
608 128,
609 128,
610 },
611 {
612 1,
613 TLS1_TXT_ADH_WITH_AES_256_GCM_SHA384,
614 TLS1_RFC_ADH_WITH_AES_256_GCM_SHA384,
615 TLS1_CK_ADH_WITH_AES_256_GCM_SHA384,
616 SSL_kDHE,
617 SSL_aNULL,
618 SSL_AES256GCM,
619 SSL_AEAD,
620 TLS1_2_VERSION, TLS1_2_VERSION,
621 DTLS1_2_VERSION, DTLS1_2_VERSION,
622 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
623 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
624 256,
625 256,
626 },
627 {
628 1,
629 TLS1_TXT_RSA_WITH_AES_128_CCM,
630 TLS1_RFC_RSA_WITH_AES_128_CCM,
631 TLS1_CK_RSA_WITH_AES_128_CCM,
632 SSL_kRSA,
633 SSL_aRSA,
634 SSL_AES128CCM,
635 SSL_AEAD,
636 TLS1_2_VERSION, TLS1_2_VERSION,
637 DTLS1_2_VERSION, DTLS1_2_VERSION,
638 SSL_NOT_DEFAULT | SSL_HIGH,
639 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
640 128,
641 128,
642 },
643 {
644 1,
645 TLS1_TXT_RSA_WITH_AES_256_CCM,
646 TLS1_RFC_RSA_WITH_AES_256_CCM,
647 TLS1_CK_RSA_WITH_AES_256_CCM,
648 SSL_kRSA,
649 SSL_aRSA,
650 SSL_AES256CCM,
651 SSL_AEAD,
652 TLS1_2_VERSION, TLS1_2_VERSION,
653 DTLS1_2_VERSION, DTLS1_2_VERSION,
654 SSL_NOT_DEFAULT | SSL_HIGH,
655 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
656 256,
657 256,
658 },
659 {
660 1,
661 TLS1_TXT_DHE_RSA_WITH_AES_128_CCM,
662 TLS1_RFC_DHE_RSA_WITH_AES_128_CCM,
663 TLS1_CK_DHE_RSA_WITH_AES_128_CCM,
664 SSL_kDHE,
665 SSL_aRSA,
666 SSL_AES128CCM,
667 SSL_AEAD,
668 TLS1_2_VERSION, TLS1_2_VERSION,
669 DTLS1_2_VERSION, DTLS1_2_VERSION,
670 SSL_NOT_DEFAULT | SSL_HIGH,
671 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
672 128,
673 128,
674 },
675 {
676 1,
677 TLS1_TXT_DHE_RSA_WITH_AES_256_CCM,
678 TLS1_RFC_DHE_RSA_WITH_AES_256_CCM,
679 TLS1_CK_DHE_RSA_WITH_AES_256_CCM,
680 SSL_kDHE,
681 SSL_aRSA,
682 SSL_AES256CCM,
683 SSL_AEAD,
684 TLS1_2_VERSION, TLS1_2_VERSION,
685 DTLS1_2_VERSION, DTLS1_2_VERSION,
686 SSL_NOT_DEFAULT | SSL_HIGH,
687 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
688 256,
689 256,
690 },
691 {
692 1,
693 TLS1_TXT_RSA_WITH_AES_128_CCM_8,
694 TLS1_RFC_RSA_WITH_AES_128_CCM_8,
695 TLS1_CK_RSA_WITH_AES_128_CCM_8,
696 SSL_kRSA,
697 SSL_aRSA,
698 SSL_AES128CCM8,
699 SSL_AEAD,
700 TLS1_2_VERSION, TLS1_2_VERSION,
701 DTLS1_2_VERSION, DTLS1_2_VERSION,
702 SSL_NOT_DEFAULT | SSL_MEDIUM,
703 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
704 64, /* CCM8 uses a short tag, so we have a low security strength */
705 128,
706 },
707 {
708 1,
709 TLS1_TXT_RSA_WITH_AES_256_CCM_8,
710 TLS1_RFC_RSA_WITH_AES_256_CCM_8,
711 TLS1_CK_RSA_WITH_AES_256_CCM_8,
712 SSL_kRSA,
713 SSL_aRSA,
714 SSL_AES256CCM8,
715 SSL_AEAD,
716 TLS1_2_VERSION, TLS1_2_VERSION,
717 DTLS1_2_VERSION, DTLS1_2_VERSION,
718 SSL_NOT_DEFAULT | SSL_MEDIUM,
719 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
720 64, /* CCM8 uses a short tag, so we have a low security strength */
721 256,
722 },
723 {
724 1,
725 TLS1_TXT_DHE_RSA_WITH_AES_128_CCM_8,
726 TLS1_RFC_DHE_RSA_WITH_AES_128_CCM_8,
727 TLS1_CK_DHE_RSA_WITH_AES_128_CCM_8,
728 SSL_kDHE,
729 SSL_aRSA,
730 SSL_AES128CCM8,
731 SSL_AEAD,
732 TLS1_2_VERSION, TLS1_2_VERSION,
733 DTLS1_2_VERSION, DTLS1_2_VERSION,
734 SSL_NOT_DEFAULT | SSL_MEDIUM,
735 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
736 64, /* CCM8 uses a short tag, so we have a low security strength */
737 128,
738 },
739 {
740 1,
741 TLS1_TXT_DHE_RSA_WITH_AES_256_CCM_8,
742 TLS1_RFC_DHE_RSA_WITH_AES_256_CCM_8,
743 TLS1_CK_DHE_RSA_WITH_AES_256_CCM_8,
744 SSL_kDHE,
745 SSL_aRSA,
746 SSL_AES256CCM8,
747 SSL_AEAD,
748 TLS1_2_VERSION, TLS1_2_VERSION,
749 DTLS1_2_VERSION, DTLS1_2_VERSION,
750 SSL_NOT_DEFAULT | SSL_MEDIUM,
751 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
752 64, /* CCM8 uses a short tag, so we have a low security strength */
753 256,
754 },
755 {
756 1,
757 TLS1_TXT_PSK_WITH_AES_128_CCM,
758 TLS1_RFC_PSK_WITH_AES_128_CCM,
759 TLS1_CK_PSK_WITH_AES_128_CCM,
760 SSL_kPSK,
761 SSL_aPSK,
762 SSL_AES128CCM,
763 SSL_AEAD,
764 TLS1_2_VERSION, TLS1_2_VERSION,
765 DTLS1_2_VERSION, DTLS1_2_VERSION,
766 SSL_NOT_DEFAULT | SSL_HIGH,
767 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
768 128,
769 128,
770 },
771 {
772 1,
773 TLS1_TXT_PSK_WITH_AES_256_CCM,
774 TLS1_RFC_PSK_WITH_AES_256_CCM,
775 TLS1_CK_PSK_WITH_AES_256_CCM,
776 SSL_kPSK,
777 SSL_aPSK,
778 SSL_AES256CCM,
779 SSL_AEAD,
780 TLS1_2_VERSION, TLS1_2_VERSION,
781 DTLS1_2_VERSION, DTLS1_2_VERSION,
782 SSL_NOT_DEFAULT | SSL_HIGH,
783 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
784 256,
785 256,
786 },
787 {
788 1,
789 TLS1_TXT_DHE_PSK_WITH_AES_128_CCM,
790 TLS1_RFC_DHE_PSK_WITH_AES_128_CCM,
791 TLS1_CK_DHE_PSK_WITH_AES_128_CCM,
792 SSL_kDHEPSK,
793 SSL_aPSK,
794 SSL_AES128CCM,
795 SSL_AEAD,
796 TLS1_2_VERSION, TLS1_2_VERSION,
797 DTLS1_2_VERSION, DTLS1_2_VERSION,
798 SSL_NOT_DEFAULT | SSL_HIGH,
799 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
800 128,
801 128,
802 },
803 {
804 1,
805 TLS1_TXT_DHE_PSK_WITH_AES_256_CCM,
806 TLS1_RFC_DHE_PSK_WITH_AES_256_CCM,
807 TLS1_CK_DHE_PSK_WITH_AES_256_CCM,
808 SSL_kDHEPSK,
809 SSL_aPSK,
810 SSL_AES256CCM,
811 SSL_AEAD,
812 TLS1_2_VERSION, TLS1_2_VERSION,
813 DTLS1_2_VERSION, DTLS1_2_VERSION,
814 SSL_NOT_DEFAULT | SSL_HIGH,
815 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
816 256,
817 256,
818 },
819 {
820 1,
821 TLS1_TXT_PSK_WITH_AES_128_CCM_8,
822 TLS1_RFC_PSK_WITH_AES_128_CCM_8,
823 TLS1_CK_PSK_WITH_AES_128_CCM_8,
824 SSL_kPSK,
825 SSL_aPSK,
826 SSL_AES128CCM8,
827 SSL_AEAD,
828 TLS1_2_VERSION, TLS1_2_VERSION,
829 DTLS1_2_VERSION, DTLS1_2_VERSION,
830 SSL_NOT_DEFAULT | SSL_MEDIUM,
831 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
832 64, /* CCM8 uses a short tag, so we have a low security strength */
833 128,
834 },
835 {
836 1,
837 TLS1_TXT_PSK_WITH_AES_256_CCM_8,
838 TLS1_RFC_PSK_WITH_AES_256_CCM_8,
839 TLS1_CK_PSK_WITH_AES_256_CCM_8,
840 SSL_kPSK,
841 SSL_aPSK,
842 SSL_AES256CCM8,
843 SSL_AEAD,
844 TLS1_2_VERSION, TLS1_2_VERSION,
845 DTLS1_2_VERSION, DTLS1_2_VERSION,
846 SSL_NOT_DEFAULT | SSL_MEDIUM,
847 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
848 64, /* CCM8 uses a short tag, so we have a low security strength */
849 256,
850 },
851 {
852 1,
853 TLS1_TXT_DHE_PSK_WITH_AES_128_CCM_8,
854 TLS1_RFC_DHE_PSK_WITH_AES_128_CCM_8,
855 TLS1_CK_DHE_PSK_WITH_AES_128_CCM_8,
856 SSL_kDHEPSK,
857 SSL_aPSK,
858 SSL_AES128CCM8,
859 SSL_AEAD,
860 TLS1_2_VERSION, TLS1_2_VERSION,
861 DTLS1_2_VERSION, DTLS1_2_VERSION,
862 SSL_NOT_DEFAULT | SSL_MEDIUM,
863 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
864 64, /* CCM8 uses a short tag, so we have a low security strength */
865 128,
866 },
867 {
868 1,
869 TLS1_TXT_DHE_PSK_WITH_AES_256_CCM_8,
870 TLS1_RFC_DHE_PSK_WITH_AES_256_CCM_8,
871 TLS1_CK_DHE_PSK_WITH_AES_256_CCM_8,
872 SSL_kDHEPSK,
873 SSL_aPSK,
874 SSL_AES256CCM8,
875 SSL_AEAD,
876 TLS1_2_VERSION, TLS1_2_VERSION,
877 DTLS1_2_VERSION, DTLS1_2_VERSION,
878 SSL_NOT_DEFAULT | SSL_MEDIUM,
879 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
880 64, /* CCM8 uses a short tag, so we have a low security strength */
881 256,
882 },
883 {
884 1,
885 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CCM,
886 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_CCM,
887 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM,
888 SSL_kECDHE,
889 SSL_aECDSA,
890 SSL_AES128CCM,
891 SSL_AEAD,
892 TLS1_2_VERSION, TLS1_2_VERSION,
893 DTLS1_2_VERSION, DTLS1_2_VERSION,
894 SSL_NOT_DEFAULT | SSL_HIGH,
895 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
896 128,
897 128,
898 },
899 {
900 1,
901 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CCM,
902 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_CCM,
903 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM,
904 SSL_kECDHE,
905 SSL_aECDSA,
906 SSL_AES256CCM,
907 SSL_AEAD,
908 TLS1_2_VERSION, TLS1_2_VERSION,
909 DTLS1_2_VERSION, DTLS1_2_VERSION,
910 SSL_NOT_DEFAULT | SSL_HIGH,
911 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
912 256,
913 256,
914 },
915 {
916 1,
917 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CCM_8,
918 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_CCM_8,
919 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM_8,
920 SSL_kECDHE,
921 SSL_aECDSA,
922 SSL_AES128CCM8,
923 SSL_AEAD,
924 TLS1_2_VERSION, TLS1_2_VERSION,
925 DTLS1_2_VERSION, DTLS1_2_VERSION,
926 SSL_NOT_DEFAULT | SSL_MEDIUM,
927 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
928 64, /* CCM8 uses a short tag, so we have a low security strength */
929 128,
930 },
931 {
932 1,
933 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CCM_8,
934 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_CCM_8,
935 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM_8,
936 SSL_kECDHE,
937 SSL_aECDSA,
938 SSL_AES256CCM8,
939 SSL_AEAD,
940 TLS1_2_VERSION, TLS1_2_VERSION,
941 DTLS1_2_VERSION, DTLS1_2_VERSION,
942 SSL_NOT_DEFAULT | SSL_MEDIUM,
943 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
944 64, /* CCM8 uses a short tag, so we have a low security strength */
945 256,
946 },
947 {
948 1,
949 TLS1_TXT_ECDHE_ECDSA_WITH_NULL_SHA,
950 TLS1_RFC_ECDHE_ECDSA_WITH_NULL_SHA,
951 TLS1_CK_ECDHE_ECDSA_WITH_NULL_SHA,
952 SSL_kECDHE,
953 SSL_aECDSA,
954 SSL_eNULL,
955 SSL_SHA1,
956 TLS1_VERSION, TLS1_2_VERSION,
957 DTLS1_BAD_VER, DTLS1_2_VERSION,
958 SSL_STRONG_NONE | SSL_FIPS,
959 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
960 0,
961 0,
962 },
963# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
964 {
965 1,
966 TLS1_TXT_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,
967 TLS1_RFC_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,
968 TLS1_CK_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,
969 SSL_kECDHE,
970 SSL_aECDSA,
971 SSL_3DES,
972 SSL_SHA1,
973 TLS1_VERSION, TLS1_2_VERSION,
974 DTLS1_BAD_VER, DTLS1_2_VERSION,
975 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
976 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
977 112,
978 168,
979 },
980# endif
981 {
982 1,
983 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
984 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
985 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
986 SSL_kECDHE,
987 SSL_aECDSA,
988 SSL_AES128,
989 SSL_SHA1,
990 TLS1_VERSION, TLS1_2_VERSION,
991 DTLS1_BAD_VER, DTLS1_2_VERSION,
992 SSL_HIGH | SSL_FIPS,
993 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
994 128,
995 128,
996 },
997 {
998 1,
999 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
1000 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
1001 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
1002 SSL_kECDHE,
1003 SSL_aECDSA,
1004 SSL_AES256,
1005 SSL_SHA1,
1006 TLS1_VERSION, TLS1_2_VERSION,
1007 DTLS1_BAD_VER, DTLS1_2_VERSION,
1008 SSL_HIGH | SSL_FIPS,
1009 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1010 256,
1011 256,
1012 },
1013 {
1014 1,
1015 TLS1_TXT_ECDHE_RSA_WITH_NULL_SHA,
1016 TLS1_RFC_ECDHE_RSA_WITH_NULL_SHA,
1017 TLS1_CK_ECDHE_RSA_WITH_NULL_SHA,
1018 SSL_kECDHE,
1019 SSL_aRSA,
1020 SSL_eNULL,
1021 SSL_SHA1,
1022 TLS1_VERSION, TLS1_2_VERSION,
1023 DTLS1_BAD_VER, DTLS1_2_VERSION,
1024 SSL_STRONG_NONE | SSL_FIPS,
1025 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1026 0,
1027 0,
1028 },
1029# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1030 {
1031 1,
1032 TLS1_TXT_ECDHE_RSA_WITH_DES_192_CBC3_SHA,
1033 TLS1_RFC_ECDHE_RSA_WITH_DES_192_CBC3_SHA,
1034 TLS1_CK_ECDHE_RSA_WITH_DES_192_CBC3_SHA,
1035 SSL_kECDHE,
1036 SSL_aRSA,
1037 SSL_3DES,
1038 SSL_SHA1,
1039 TLS1_VERSION, TLS1_2_VERSION,
1040 DTLS1_BAD_VER, DTLS1_2_VERSION,
1041 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1042 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1043 112,
1044 168,
1045 },
1046# endif
1047 {
1048 1,
1049 TLS1_TXT_ECDHE_RSA_WITH_AES_128_CBC_SHA,
1050 TLS1_RFC_ECDHE_RSA_WITH_AES_128_CBC_SHA,
1051 TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA,
1052 SSL_kECDHE,
1053 SSL_aRSA,
1054 SSL_AES128,
1055 SSL_SHA1,
1056 TLS1_VERSION, TLS1_2_VERSION,
1057 DTLS1_BAD_VER, DTLS1_2_VERSION,
1058 SSL_HIGH | SSL_FIPS,
1059 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1060 128,
1061 128,
1062 },
1063 {
1064 1,
1065 TLS1_TXT_ECDHE_RSA_WITH_AES_256_CBC_SHA,
1066 TLS1_RFC_ECDHE_RSA_WITH_AES_256_CBC_SHA,
1067 TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA,
1068 SSL_kECDHE,
1069 SSL_aRSA,
1070 SSL_AES256,
1071 SSL_SHA1,
1072 TLS1_VERSION, TLS1_2_VERSION,
1073 DTLS1_BAD_VER, DTLS1_2_VERSION,
1074 SSL_HIGH | SSL_FIPS,
1075 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1076 256,
1077 256,
1078 },
1079 {
1080 1,
1081 TLS1_TXT_ECDH_anon_WITH_NULL_SHA,
1082 TLS1_RFC_ECDH_anon_WITH_NULL_SHA,
1083 TLS1_CK_ECDH_anon_WITH_NULL_SHA,
1084 SSL_kECDHE,
1085 SSL_aNULL,
1086 SSL_eNULL,
1087 SSL_SHA1,
1088 TLS1_VERSION, TLS1_2_VERSION,
1089 DTLS1_BAD_VER, DTLS1_2_VERSION,
1090 SSL_STRONG_NONE | SSL_FIPS,
1091 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1092 0,
1093 0,
1094 },
1095# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1096 {
1097 1,
1098 TLS1_TXT_ECDH_anon_WITH_DES_192_CBC3_SHA,
1099 TLS1_RFC_ECDH_anon_WITH_DES_192_CBC3_SHA,
1100 TLS1_CK_ECDH_anon_WITH_DES_192_CBC3_SHA,
1101 SSL_kECDHE,
1102 SSL_aNULL,
1103 SSL_3DES,
1104 SSL_SHA1,
1105 TLS1_VERSION, TLS1_2_VERSION,
1106 DTLS1_BAD_VER, DTLS1_2_VERSION,
1107 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1108 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1109 112,
1110 168,
1111 },
1112# endif
1113 {
1114 1,
1115 TLS1_TXT_ECDH_anon_WITH_AES_128_CBC_SHA,
1116 TLS1_RFC_ECDH_anon_WITH_AES_128_CBC_SHA,
1117 TLS1_CK_ECDH_anon_WITH_AES_128_CBC_SHA,
1118 SSL_kECDHE,
1119 SSL_aNULL,
1120 SSL_AES128,
1121 SSL_SHA1,
1122 TLS1_VERSION, TLS1_2_VERSION,
1123 DTLS1_BAD_VER, DTLS1_2_VERSION,
1124 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
1125 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1126 128,
1127 128,
1128 },
1129 {
1130 1,
1131 TLS1_TXT_ECDH_anon_WITH_AES_256_CBC_SHA,
1132 TLS1_RFC_ECDH_anon_WITH_AES_256_CBC_SHA,
1133 TLS1_CK_ECDH_anon_WITH_AES_256_CBC_SHA,
1134 SSL_kECDHE,
1135 SSL_aNULL,
1136 SSL_AES256,
1137 SSL_SHA1,
1138 TLS1_VERSION, TLS1_2_VERSION,
1139 DTLS1_BAD_VER, DTLS1_2_VERSION,
1140 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
1141 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1142 256,
1143 256,
1144 },
1145 {
1146 1,
1147 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_SHA256,
1148 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_SHA256,
1149 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_SHA256,
1150 SSL_kECDHE,
1151 SSL_aECDSA,
1152 SSL_AES128,
1153 SSL_SHA256,
1154 TLS1_2_VERSION, TLS1_2_VERSION,
1155 DTLS1_2_VERSION, DTLS1_2_VERSION,
1156 SSL_HIGH | SSL_FIPS,
1157 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1158 128,
1159 128,
1160 },
1161 {
1162 1,
1163 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_SHA384,
1164 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_SHA384,
1165 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_SHA384,
1166 SSL_kECDHE,
1167 SSL_aECDSA,
1168 SSL_AES256,
1169 SSL_SHA384,
1170 TLS1_2_VERSION, TLS1_2_VERSION,
1171 DTLS1_2_VERSION, DTLS1_2_VERSION,
1172 SSL_HIGH | SSL_FIPS,
1173 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1174 256,
1175 256,
1176 },
1177 {
1178 1,
1179 TLS1_TXT_ECDHE_RSA_WITH_AES_128_SHA256,
1180 TLS1_RFC_ECDHE_RSA_WITH_AES_128_SHA256,
1181 TLS1_CK_ECDHE_RSA_WITH_AES_128_SHA256,
1182 SSL_kECDHE,
1183 SSL_aRSA,
1184 SSL_AES128,
1185 SSL_SHA256,
1186 TLS1_2_VERSION, TLS1_2_VERSION,
1187 DTLS1_2_VERSION, DTLS1_2_VERSION,
1188 SSL_HIGH | SSL_FIPS,
1189 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1190 128,
1191 128,
1192 },
1193 {
1194 1,
1195 TLS1_TXT_ECDHE_RSA_WITH_AES_256_SHA384,
1196 TLS1_RFC_ECDHE_RSA_WITH_AES_256_SHA384,
1197 TLS1_CK_ECDHE_RSA_WITH_AES_256_SHA384,
1198 SSL_kECDHE,
1199 SSL_aRSA,
1200 SSL_AES256,
1201 SSL_SHA384,
1202 TLS1_2_VERSION, TLS1_2_VERSION,
1203 DTLS1_2_VERSION, DTLS1_2_VERSION,
1204 SSL_HIGH | SSL_FIPS,
1205 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1206 256,
1207 256,
1208 },
1209 {
1210 1,
1211 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
1212 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
1213 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
1214 SSL_kECDHE,
1215 SSL_aECDSA,
1216 SSL_AES128GCM,
1217 SSL_AEAD,
1218 TLS1_2_VERSION, TLS1_2_VERSION,
1219 DTLS1_2_VERSION, DTLS1_2_VERSION,
1220 SSL_HIGH | SSL_FIPS,
1221 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1222 128,
1223 128,
1224 },
1225 {
1226 1,
1227 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
1228 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
1229 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
1230 SSL_kECDHE,
1231 SSL_aECDSA,
1232 SSL_AES256GCM,
1233 SSL_AEAD,
1234 TLS1_2_VERSION, TLS1_2_VERSION,
1235 DTLS1_2_VERSION, DTLS1_2_VERSION,
1236 SSL_HIGH | SSL_FIPS,
1237 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1238 256,
1239 256,
1240 },
1241 {
1242 1,
1243 TLS1_TXT_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
1244 TLS1_RFC_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
1245 TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
1246 SSL_kECDHE,
1247 SSL_aRSA,
1248 SSL_AES128GCM,
1249 SSL_AEAD,
1250 TLS1_2_VERSION, TLS1_2_VERSION,
1251 DTLS1_2_VERSION, DTLS1_2_VERSION,
1252 SSL_HIGH | SSL_FIPS,
1253 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1254 128,
1255 128,
1256 },
1257 {
1258 1,
1259 TLS1_TXT_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
1260 TLS1_RFC_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
1261 TLS1_CK_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
1262 SSL_kECDHE,
1263 SSL_aRSA,
1264 SSL_AES256GCM,
1265 SSL_AEAD,
1266 TLS1_2_VERSION, TLS1_2_VERSION,
1267 DTLS1_2_VERSION, DTLS1_2_VERSION,
1268 SSL_HIGH | SSL_FIPS,
1269 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1270 256,
1271 256,
1272 },
1273 {
1274 1,
1275 TLS1_TXT_PSK_WITH_NULL_SHA,
1276 TLS1_RFC_PSK_WITH_NULL_SHA,
1277 TLS1_CK_PSK_WITH_NULL_SHA,
1278 SSL_kPSK,
1279 SSL_aPSK,
1280 SSL_eNULL,
1281 SSL_SHA1,
1282 SSL3_VERSION, TLS1_2_VERSION,
1283 DTLS1_BAD_VER, DTLS1_2_VERSION,
1284 SSL_STRONG_NONE | SSL_FIPS,
1285 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1286 0,
1287 0,
1288 },
1289 {
1290 1,
1291 TLS1_TXT_DHE_PSK_WITH_NULL_SHA,
1292 TLS1_RFC_DHE_PSK_WITH_NULL_SHA,
1293 TLS1_CK_DHE_PSK_WITH_NULL_SHA,
1294 SSL_kDHEPSK,
1295 SSL_aPSK,
1296 SSL_eNULL,
1297 SSL_SHA1,
1298 SSL3_VERSION, TLS1_2_VERSION,
1299 DTLS1_BAD_VER, DTLS1_2_VERSION,
1300 SSL_STRONG_NONE | SSL_FIPS,
1301 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1302 0,
1303 0,
1304 },
1305 {
1306 1,
1307 TLS1_TXT_RSA_PSK_WITH_NULL_SHA,
1308 TLS1_RFC_RSA_PSK_WITH_NULL_SHA,
1309 TLS1_CK_RSA_PSK_WITH_NULL_SHA,
1310 SSL_kRSAPSK,
1311 SSL_aRSA,
1312 SSL_eNULL,
1313 SSL_SHA1,
1314 SSL3_VERSION, TLS1_2_VERSION,
1315 DTLS1_BAD_VER, DTLS1_2_VERSION,
1316 SSL_STRONG_NONE | SSL_FIPS,
1317 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1318 0,
1319 0,
1320 },
1321# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1322 {
1323 1,
1324 TLS1_TXT_PSK_WITH_3DES_EDE_CBC_SHA,
1325 TLS1_RFC_PSK_WITH_3DES_EDE_CBC_SHA,
1326 TLS1_CK_PSK_WITH_3DES_EDE_CBC_SHA,
1327 SSL_kPSK,
1328 SSL_aPSK,
1329 SSL_3DES,
1330 SSL_SHA1,
1331 SSL3_VERSION, TLS1_2_VERSION,
1332 DTLS1_BAD_VER, DTLS1_2_VERSION,
1333 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1334 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1335 112,
1336 168,
1337 },
1338# endif
1339 {
1340 1,
1341 TLS1_TXT_PSK_WITH_AES_128_CBC_SHA,
1342 TLS1_RFC_PSK_WITH_AES_128_CBC_SHA,
1343 TLS1_CK_PSK_WITH_AES_128_CBC_SHA,
1344 SSL_kPSK,
1345 SSL_aPSK,
1346 SSL_AES128,
1347 SSL_SHA1,
1348 SSL3_VERSION, TLS1_2_VERSION,
1349 DTLS1_BAD_VER, DTLS1_2_VERSION,
1350 SSL_HIGH | SSL_FIPS,
1351 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1352 128,
1353 128,
1354 },
1355 {
1356 1,
1357 TLS1_TXT_PSK_WITH_AES_256_CBC_SHA,
1358 TLS1_RFC_PSK_WITH_AES_256_CBC_SHA,
1359 TLS1_CK_PSK_WITH_AES_256_CBC_SHA,
1360 SSL_kPSK,
1361 SSL_aPSK,
1362 SSL_AES256,
1363 SSL_SHA1,
1364 SSL3_VERSION, TLS1_2_VERSION,
1365 DTLS1_BAD_VER, DTLS1_2_VERSION,
1366 SSL_HIGH | SSL_FIPS,
1367 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1368 256,
1369 256,
1370 },
1371# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1372 {
1373 1,
1374 TLS1_TXT_DHE_PSK_WITH_3DES_EDE_CBC_SHA,
1375 TLS1_RFC_DHE_PSK_WITH_3DES_EDE_CBC_SHA,
1376 TLS1_CK_DHE_PSK_WITH_3DES_EDE_CBC_SHA,
1377 SSL_kDHEPSK,
1378 SSL_aPSK,
1379 SSL_3DES,
1380 SSL_SHA1,
1381 SSL3_VERSION, TLS1_2_VERSION,
1382 DTLS1_BAD_VER, DTLS1_2_VERSION,
1383 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1384 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1385 112,
1386 168,
1387 },
1388# endif
1389 {
1390 1,
1391 TLS1_TXT_DHE_PSK_WITH_AES_128_CBC_SHA,
1392 TLS1_RFC_DHE_PSK_WITH_AES_128_CBC_SHA,
1393 TLS1_CK_DHE_PSK_WITH_AES_128_CBC_SHA,
1394 SSL_kDHEPSK,
1395 SSL_aPSK,
1396 SSL_AES128,
1397 SSL_SHA1,
1398 SSL3_VERSION, TLS1_2_VERSION,
1399 DTLS1_BAD_VER, DTLS1_2_VERSION,
1400 SSL_HIGH | SSL_FIPS,
1401 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1402 128,
1403 128,
1404 },
1405 {
1406 1,
1407 TLS1_TXT_DHE_PSK_WITH_AES_256_CBC_SHA,
1408 TLS1_RFC_DHE_PSK_WITH_AES_256_CBC_SHA,
1409 TLS1_CK_DHE_PSK_WITH_AES_256_CBC_SHA,
1410 SSL_kDHEPSK,
1411 SSL_aPSK,
1412 SSL_AES256,
1413 SSL_SHA1,
1414 SSL3_VERSION, TLS1_2_VERSION,
1415 DTLS1_BAD_VER, DTLS1_2_VERSION,
1416 SSL_HIGH | SSL_FIPS,
1417 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1418 256,
1419 256,
1420 },
1421# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1422 {
1423 1,
1424 TLS1_TXT_RSA_PSK_WITH_3DES_EDE_CBC_SHA,
1425 TLS1_RFC_RSA_PSK_WITH_3DES_EDE_CBC_SHA,
1426 TLS1_CK_RSA_PSK_WITH_3DES_EDE_CBC_SHA,
1427 SSL_kRSAPSK,
1428 SSL_aRSA,
1429 SSL_3DES,
1430 SSL_SHA1,
1431 SSL3_VERSION, TLS1_2_VERSION,
1432 DTLS1_BAD_VER, DTLS1_2_VERSION,
1433 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1434 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1435 112,
1436 168,
1437 },
1438# endif
1439 {
1440 1,
1441 TLS1_TXT_RSA_PSK_WITH_AES_128_CBC_SHA,
1442 TLS1_RFC_RSA_PSK_WITH_AES_128_CBC_SHA,
1443 TLS1_CK_RSA_PSK_WITH_AES_128_CBC_SHA,
1444 SSL_kRSAPSK,
1445 SSL_aRSA,
1446 SSL_AES128,
1447 SSL_SHA1,
1448 SSL3_VERSION, TLS1_2_VERSION,
1449 DTLS1_BAD_VER, DTLS1_2_VERSION,
1450 SSL_HIGH | SSL_FIPS,
1451 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1452 128,
1453 128,
1454 },
1455 {
1456 1,
1457 TLS1_TXT_RSA_PSK_WITH_AES_256_CBC_SHA,
1458 TLS1_RFC_RSA_PSK_WITH_AES_256_CBC_SHA,
1459 TLS1_CK_RSA_PSK_WITH_AES_256_CBC_SHA,
1460 SSL_kRSAPSK,
1461 SSL_aRSA,
1462 SSL_AES256,
1463 SSL_SHA1,
1464 SSL3_VERSION, TLS1_2_VERSION,
1465 DTLS1_BAD_VER, DTLS1_2_VERSION,
1466 SSL_HIGH | SSL_FIPS,
1467 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1468 256,
1469 256,
1470 },
1471 {
1472 1,
1473 TLS1_TXT_PSK_WITH_AES_128_GCM_SHA256,
1474 TLS1_RFC_PSK_WITH_AES_128_GCM_SHA256,
1475 TLS1_CK_PSK_WITH_AES_128_GCM_SHA256,
1476 SSL_kPSK,
1477 SSL_aPSK,
1478 SSL_AES128GCM,
1479 SSL_AEAD,
1480 TLS1_2_VERSION, TLS1_2_VERSION,
1481 DTLS1_2_VERSION, DTLS1_2_VERSION,
1482 SSL_HIGH | SSL_FIPS,
1483 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1484 128,
1485 128,
1486 },
1487 {
1488 1,
1489 TLS1_TXT_PSK_WITH_AES_256_GCM_SHA384,
1490 TLS1_RFC_PSK_WITH_AES_256_GCM_SHA384,
1491 TLS1_CK_PSK_WITH_AES_256_GCM_SHA384,
1492 SSL_kPSK,
1493 SSL_aPSK,
1494 SSL_AES256GCM,
1495 SSL_AEAD,
1496 TLS1_2_VERSION, TLS1_2_VERSION,
1497 DTLS1_2_VERSION, DTLS1_2_VERSION,
1498 SSL_HIGH | SSL_FIPS,
1499 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1500 256,
1501 256,
1502 },
1503 {
1504 1,
1505 TLS1_TXT_DHE_PSK_WITH_AES_128_GCM_SHA256,
1506 TLS1_RFC_DHE_PSK_WITH_AES_128_GCM_SHA256,
1507 TLS1_CK_DHE_PSK_WITH_AES_128_GCM_SHA256,
1508 SSL_kDHEPSK,
1509 SSL_aPSK,
1510 SSL_AES128GCM,
1511 SSL_AEAD,
1512 TLS1_2_VERSION, TLS1_2_VERSION,
1513 DTLS1_2_VERSION, DTLS1_2_VERSION,
1514 SSL_HIGH | SSL_FIPS,
1515 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1516 128,
1517 128,
1518 },
1519 {
1520 1,
1521 TLS1_TXT_DHE_PSK_WITH_AES_256_GCM_SHA384,
1522 TLS1_RFC_DHE_PSK_WITH_AES_256_GCM_SHA384,
1523 TLS1_CK_DHE_PSK_WITH_AES_256_GCM_SHA384,
1524 SSL_kDHEPSK,
1525 SSL_aPSK,
1526 SSL_AES256GCM,
1527 SSL_AEAD,
1528 TLS1_2_VERSION, TLS1_2_VERSION,
1529 DTLS1_2_VERSION, DTLS1_2_VERSION,
1530 SSL_HIGH | SSL_FIPS,
1531 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1532 256,
1533 256,
1534 },
1535 {
1536 1,
1537 TLS1_TXT_RSA_PSK_WITH_AES_128_GCM_SHA256,
1538 TLS1_RFC_RSA_PSK_WITH_AES_128_GCM_SHA256,
1539 TLS1_CK_RSA_PSK_WITH_AES_128_GCM_SHA256,
1540 SSL_kRSAPSK,
1541 SSL_aRSA,
1542 SSL_AES128GCM,
1543 SSL_AEAD,
1544 TLS1_2_VERSION, TLS1_2_VERSION,
1545 DTLS1_2_VERSION, DTLS1_2_VERSION,
1546 SSL_HIGH | SSL_FIPS,
1547 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1548 128,
1549 128,
1550 },
1551 {
1552 1,
1553 TLS1_TXT_RSA_PSK_WITH_AES_256_GCM_SHA384,
1554 TLS1_RFC_RSA_PSK_WITH_AES_256_GCM_SHA384,
1555 TLS1_CK_RSA_PSK_WITH_AES_256_GCM_SHA384,
1556 SSL_kRSAPSK,
1557 SSL_aRSA,
1558 SSL_AES256GCM,
1559 SSL_AEAD,
1560 TLS1_2_VERSION, TLS1_2_VERSION,
1561 DTLS1_2_VERSION, DTLS1_2_VERSION,
1562 SSL_HIGH | SSL_FIPS,
1563 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1564 256,
1565 256,
1566 },
1567 {
1568 1,
1569 TLS1_TXT_PSK_WITH_AES_128_CBC_SHA256,
1570 TLS1_RFC_PSK_WITH_AES_128_CBC_SHA256,
1571 TLS1_CK_PSK_WITH_AES_128_CBC_SHA256,
1572 SSL_kPSK,
1573 SSL_aPSK,
1574 SSL_AES128,
1575 SSL_SHA256,
1576 TLS1_VERSION, TLS1_2_VERSION,
1577 DTLS1_BAD_VER, DTLS1_2_VERSION,
1578 SSL_HIGH | SSL_FIPS,
1579 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1580 128,
1581 128,
1582 },
1583 {
1584 1,
1585 TLS1_TXT_PSK_WITH_AES_256_CBC_SHA384,
1586 TLS1_RFC_PSK_WITH_AES_256_CBC_SHA384,
1587 TLS1_CK_PSK_WITH_AES_256_CBC_SHA384,
1588 SSL_kPSK,
1589 SSL_aPSK,
1590 SSL_AES256,
1591 SSL_SHA384,
1592 TLS1_VERSION, TLS1_2_VERSION,
1593 DTLS1_BAD_VER, DTLS1_2_VERSION,
1594 SSL_HIGH | SSL_FIPS,
1595 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1596 256,
1597 256,
1598 },
1599 {
1600 1,
1601 TLS1_TXT_PSK_WITH_NULL_SHA256,
1602 TLS1_RFC_PSK_WITH_NULL_SHA256,
1603 TLS1_CK_PSK_WITH_NULL_SHA256,
1604 SSL_kPSK,
1605 SSL_aPSK,
1606 SSL_eNULL,
1607 SSL_SHA256,
1608 TLS1_VERSION, TLS1_2_VERSION,
1609 DTLS1_BAD_VER, DTLS1_2_VERSION,
1610 SSL_STRONG_NONE | SSL_FIPS,
1611 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1612 0,
1613 0,
1614 },
1615 {
1616 1,
1617 TLS1_TXT_PSK_WITH_NULL_SHA384,
1618 TLS1_RFC_PSK_WITH_NULL_SHA384,
1619 TLS1_CK_PSK_WITH_NULL_SHA384,
1620 SSL_kPSK,
1621 SSL_aPSK,
1622 SSL_eNULL,
1623 SSL_SHA384,
1624 TLS1_VERSION, TLS1_2_VERSION,
1625 DTLS1_BAD_VER, DTLS1_2_VERSION,
1626 SSL_STRONG_NONE | SSL_FIPS,
1627 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1628 0,
1629 0,
1630 },
1631 {
1632 1,
1633 TLS1_TXT_DHE_PSK_WITH_AES_128_CBC_SHA256,
1634 TLS1_RFC_DHE_PSK_WITH_AES_128_CBC_SHA256,
1635 TLS1_CK_DHE_PSK_WITH_AES_128_CBC_SHA256,
1636 SSL_kDHEPSK,
1637 SSL_aPSK,
1638 SSL_AES128,
1639 SSL_SHA256,
1640 TLS1_VERSION, TLS1_2_VERSION,
1641 DTLS1_BAD_VER, DTLS1_2_VERSION,
1642 SSL_HIGH | SSL_FIPS,
1643 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1644 128,
1645 128,
1646 },
1647 {
1648 1,
1649 TLS1_TXT_DHE_PSK_WITH_AES_256_CBC_SHA384,
1650 TLS1_RFC_DHE_PSK_WITH_AES_256_CBC_SHA384,
1651 TLS1_CK_DHE_PSK_WITH_AES_256_CBC_SHA384,
1652 SSL_kDHEPSK,
1653 SSL_aPSK,
1654 SSL_AES256,
1655 SSL_SHA384,
1656 TLS1_VERSION, TLS1_2_VERSION,
1657 DTLS1_BAD_VER, DTLS1_2_VERSION,
1658 SSL_HIGH | SSL_FIPS,
1659 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1660 256,
1661 256,
1662 },
1663 {
1664 1,
1665 TLS1_TXT_DHE_PSK_WITH_NULL_SHA256,
1666 TLS1_RFC_DHE_PSK_WITH_NULL_SHA256,
1667 TLS1_CK_DHE_PSK_WITH_NULL_SHA256,
1668 SSL_kDHEPSK,
1669 SSL_aPSK,
1670 SSL_eNULL,
1671 SSL_SHA256,
1672 TLS1_VERSION, TLS1_2_VERSION,
1673 DTLS1_BAD_VER, DTLS1_2_VERSION,
1674 SSL_STRONG_NONE | SSL_FIPS,
1675 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1676 0,
1677 0,
1678 },
1679 {
1680 1,
1681 TLS1_TXT_DHE_PSK_WITH_NULL_SHA384,
1682 TLS1_RFC_DHE_PSK_WITH_NULL_SHA384,
1683 TLS1_CK_DHE_PSK_WITH_NULL_SHA384,
1684 SSL_kDHEPSK,
1685 SSL_aPSK,
1686 SSL_eNULL,
1687 SSL_SHA384,
1688 TLS1_VERSION, TLS1_2_VERSION,
1689 DTLS1_BAD_VER, DTLS1_2_VERSION,
1690 SSL_STRONG_NONE | SSL_FIPS,
1691 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1692 0,
1693 0,
1694 },
1695 {
1696 1,
1697 TLS1_TXT_RSA_PSK_WITH_AES_128_CBC_SHA256,
1698 TLS1_RFC_RSA_PSK_WITH_AES_128_CBC_SHA256,
1699 TLS1_CK_RSA_PSK_WITH_AES_128_CBC_SHA256,
1700 SSL_kRSAPSK,
1701 SSL_aRSA,
1702 SSL_AES128,
1703 SSL_SHA256,
1704 TLS1_VERSION, TLS1_2_VERSION,
1705 DTLS1_BAD_VER, DTLS1_2_VERSION,
1706 SSL_HIGH | SSL_FIPS,
1707 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1708 128,
1709 128,
1710 },
1711 {
1712 1,
1713 TLS1_TXT_RSA_PSK_WITH_AES_256_CBC_SHA384,
1714 TLS1_RFC_RSA_PSK_WITH_AES_256_CBC_SHA384,
1715 TLS1_CK_RSA_PSK_WITH_AES_256_CBC_SHA384,
1716 SSL_kRSAPSK,
1717 SSL_aRSA,
1718 SSL_AES256,
1719 SSL_SHA384,
1720 TLS1_VERSION, TLS1_2_VERSION,
1721 DTLS1_BAD_VER, DTLS1_2_VERSION,
1722 SSL_HIGH | SSL_FIPS,
1723 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1724 256,
1725 256,
1726 },
1727 {
1728 1,
1729 TLS1_TXT_RSA_PSK_WITH_NULL_SHA256,
1730 TLS1_RFC_RSA_PSK_WITH_NULL_SHA256,
1731 TLS1_CK_RSA_PSK_WITH_NULL_SHA256,
1732 SSL_kRSAPSK,
1733 SSL_aRSA,
1734 SSL_eNULL,
1735 SSL_SHA256,
1736 TLS1_VERSION, TLS1_2_VERSION,
1737 DTLS1_BAD_VER, DTLS1_2_VERSION,
1738 SSL_STRONG_NONE | SSL_FIPS,
1739 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1740 0,
1741 0,
1742 },
1743 {
1744 1,
1745 TLS1_TXT_RSA_PSK_WITH_NULL_SHA384,
1746 TLS1_RFC_RSA_PSK_WITH_NULL_SHA384,
1747 TLS1_CK_RSA_PSK_WITH_NULL_SHA384,
1748 SSL_kRSAPSK,
1749 SSL_aRSA,
1750 SSL_eNULL,
1751 SSL_SHA384,
1752 TLS1_VERSION, TLS1_2_VERSION,
1753 DTLS1_BAD_VER, DTLS1_2_VERSION,
1754 SSL_STRONG_NONE | SSL_FIPS,
1755 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1756 0,
1757 0,
1758 },
1759# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1760 {
1761 1,
1762 TLS1_TXT_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA,
1763 TLS1_RFC_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA,
1764 TLS1_CK_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA,
1765 SSL_kECDHEPSK,
1766 SSL_aPSK,
1767 SSL_3DES,
1768 SSL_SHA1,
1769 TLS1_VERSION, TLS1_2_VERSION,
1770 DTLS1_BAD_VER, DTLS1_2_VERSION,
1771 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1772 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1773 112,
1774 168,
1775 },
1776# endif
1777 {
1778 1,
1779 TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA,
1780 TLS1_RFC_ECDHE_PSK_WITH_AES_128_CBC_SHA,
1781 TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA,
1782 SSL_kECDHEPSK,
1783 SSL_aPSK,
1784 SSL_AES128,
1785 SSL_SHA1,
1786 TLS1_VERSION, TLS1_2_VERSION,
1787 DTLS1_BAD_VER, DTLS1_2_VERSION,
1788 SSL_HIGH | SSL_FIPS,
1789 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1790 128,
1791 128,
1792 },
1793 {
1794 1,
1795 TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA,
1796 TLS1_RFC_ECDHE_PSK_WITH_AES_256_CBC_SHA,
1797 TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA,
1798 SSL_kECDHEPSK,
1799 SSL_aPSK,
1800 SSL_AES256,
1801 SSL_SHA1,
1802 TLS1_VERSION, TLS1_2_VERSION,
1803 DTLS1_BAD_VER, DTLS1_2_VERSION,
1804 SSL_HIGH | SSL_FIPS,
1805 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1806 256,
1807 256,
1808 },
1809 {
1810 1,
1811 TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA256,
1812 TLS1_RFC_ECDHE_PSK_WITH_AES_128_CBC_SHA256,
1813 TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA256,
1814 SSL_kECDHEPSK,
1815 SSL_aPSK,
1816 SSL_AES128,
1817 SSL_SHA256,
1818 TLS1_VERSION, TLS1_2_VERSION,
1819 DTLS1_BAD_VER, DTLS1_2_VERSION,
1820 SSL_HIGH | SSL_FIPS,
1821 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1822 128,
1823 128,
1824 },
1825 {
1826 1,
1827 TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA384,
1828 TLS1_RFC_ECDHE_PSK_WITH_AES_256_CBC_SHA384,
1829 TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA384,
1830 SSL_kECDHEPSK,
1831 SSL_aPSK,
1832 SSL_AES256,
1833 SSL_SHA384,
1834 TLS1_VERSION, TLS1_2_VERSION,
1835 DTLS1_BAD_VER, DTLS1_2_VERSION,
1836 SSL_HIGH | SSL_FIPS,
1837 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1838 256,
1839 256,
1840 },
1841 {
1842 1,
1843 TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA,
1844 TLS1_RFC_ECDHE_PSK_WITH_NULL_SHA,
1845 TLS1_CK_ECDHE_PSK_WITH_NULL_SHA,
1846 SSL_kECDHEPSK,
1847 SSL_aPSK,
1848 SSL_eNULL,
1849 SSL_SHA1,
1850 TLS1_VERSION, TLS1_2_VERSION,
1851 DTLS1_BAD_VER, DTLS1_2_VERSION,
1852 SSL_STRONG_NONE | SSL_FIPS,
1853 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1854 0,
1855 0,
1856 },
1857 {
1858 1,
1859 TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA256,
1860 TLS1_RFC_ECDHE_PSK_WITH_NULL_SHA256,
1861 TLS1_CK_ECDHE_PSK_WITH_NULL_SHA256,
1862 SSL_kECDHEPSK,
1863 SSL_aPSK,
1864 SSL_eNULL,
1865 SSL_SHA256,
1866 TLS1_VERSION, TLS1_2_VERSION,
1867 DTLS1_BAD_VER, DTLS1_2_VERSION,
1868 SSL_STRONG_NONE | SSL_FIPS,
1869 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1870 0,
1871 0,
1872 },
1873 {
1874 1,
1875 TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA384,
1876 TLS1_RFC_ECDHE_PSK_WITH_NULL_SHA384,
1877 TLS1_CK_ECDHE_PSK_WITH_NULL_SHA384,
1878 SSL_kECDHEPSK,
1879 SSL_aPSK,
1880 SSL_eNULL,
1881 SSL_SHA384,
1882 TLS1_VERSION, TLS1_2_VERSION,
1883 DTLS1_BAD_VER, DTLS1_2_VERSION,
1884 SSL_STRONG_NONE | SSL_FIPS,
1885 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1886 0,
1887 0,
1888 },
1889
1890# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1891 {
1892 1,
1893 TLS1_TXT_SRP_SHA_WITH_3DES_EDE_CBC_SHA,
1894 TLS1_RFC_SRP_SHA_WITH_3DES_EDE_CBC_SHA,
1895 TLS1_CK_SRP_SHA_WITH_3DES_EDE_CBC_SHA,
1896 SSL_kSRP,
1897 SSL_aSRP,
1898 SSL_3DES,
1899 SSL_SHA1,
1900 SSL3_VERSION, TLS1_2_VERSION,
1901 DTLS1_BAD_VER, DTLS1_2_VERSION,
1902 SSL_NOT_DEFAULT | SSL_MEDIUM,
1903 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1904 112,
1905 168,
1906 },
1907 {
1908 1,
1909 TLS1_TXT_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA,
1910 TLS1_RFC_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA,
1911 TLS1_CK_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA,
1912 SSL_kSRP,
1913 SSL_aRSA,
1914 SSL_3DES,
1915 SSL_SHA1,
1916 SSL3_VERSION, TLS1_2_VERSION,
1917 DTLS1_BAD_VER, DTLS1_2_VERSION,
1918 SSL_NOT_DEFAULT | SSL_MEDIUM,
1919 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1920 112,
1921 168,
1922 },
1923 {
1924 1,
1925 TLS1_TXT_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA,
1926 TLS1_RFC_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA,
1927 TLS1_CK_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA,
1928 SSL_kSRP,
1929 SSL_aDSS,
1930 SSL_3DES,
1931 SSL_SHA1,
1932 SSL3_VERSION, TLS1_2_VERSION,
1933 DTLS1_BAD_VER, DTLS1_2_VERSION,
1934 SSL_NOT_DEFAULT | SSL_MEDIUM,
1935 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1936 112,
1937 168,
1938 },
1939# endif
1940 {
1941 1,
1942 TLS1_TXT_SRP_SHA_WITH_AES_128_CBC_SHA,
1943 TLS1_RFC_SRP_SHA_WITH_AES_128_CBC_SHA,
1944 TLS1_CK_SRP_SHA_WITH_AES_128_CBC_SHA,
1945 SSL_kSRP,
1946 SSL_aSRP,
1947 SSL_AES128,
1948 SSL_SHA1,
1949 SSL3_VERSION, TLS1_2_VERSION,
1950 DTLS1_BAD_VER, DTLS1_2_VERSION,
1951 SSL_HIGH,
1952 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1953 128,
1954 128,
1955 },
1956 {
1957 1,
1958 TLS1_TXT_SRP_SHA_RSA_WITH_AES_128_CBC_SHA,
1959 TLS1_RFC_SRP_SHA_RSA_WITH_AES_128_CBC_SHA,
1960 TLS1_CK_SRP_SHA_RSA_WITH_AES_128_CBC_SHA,
1961 SSL_kSRP,
1962 SSL_aRSA,
1963 SSL_AES128,
1964 SSL_SHA1,
1965 SSL3_VERSION, TLS1_2_VERSION,
1966 DTLS1_BAD_VER, DTLS1_2_VERSION,
1967 SSL_HIGH,
1968 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1969 128,
1970 128,
1971 },
1972 {
1973 1,
1974 TLS1_TXT_SRP_SHA_DSS_WITH_AES_128_CBC_SHA,
1975 TLS1_RFC_SRP_SHA_DSS_WITH_AES_128_CBC_SHA,
1976 TLS1_CK_SRP_SHA_DSS_WITH_AES_128_CBC_SHA,
1977 SSL_kSRP,
1978 SSL_aDSS,
1979 SSL_AES128,
1980 SSL_SHA1,
1981 SSL3_VERSION, TLS1_2_VERSION,
1982 DTLS1_BAD_VER, DTLS1_2_VERSION,
1983 SSL_NOT_DEFAULT | SSL_HIGH,
1984 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1985 128,
1986 128,
1987 },
1988 {
1989 1,
1990 TLS1_TXT_SRP_SHA_WITH_AES_256_CBC_SHA,
1991 TLS1_RFC_SRP_SHA_WITH_AES_256_CBC_SHA,
1992 TLS1_CK_SRP_SHA_WITH_AES_256_CBC_SHA,
1993 SSL_kSRP,
1994 SSL_aSRP,
1995 SSL_AES256,
1996 SSL_SHA1,
1997 SSL3_VERSION, TLS1_2_VERSION,
1998 DTLS1_BAD_VER, DTLS1_2_VERSION,
1999 SSL_HIGH,
2000 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2001 256,
2002 256,
2003 },
2004 {
2005 1,
2006 TLS1_TXT_SRP_SHA_RSA_WITH_AES_256_CBC_SHA,
2007 TLS1_RFC_SRP_SHA_RSA_WITH_AES_256_CBC_SHA,
2008 TLS1_CK_SRP_SHA_RSA_WITH_AES_256_CBC_SHA,
2009 SSL_kSRP,
2010 SSL_aRSA,
2011 SSL_AES256,
2012 SSL_SHA1,
2013 SSL3_VERSION, TLS1_2_VERSION,
2014 DTLS1_BAD_VER, DTLS1_2_VERSION,
2015 SSL_HIGH,
2016 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2017 256,
2018 256,
2019 },
2020 {
2021 1,
2022 TLS1_TXT_SRP_SHA_DSS_WITH_AES_256_CBC_SHA,
2023 TLS1_RFC_SRP_SHA_DSS_WITH_AES_256_CBC_SHA,
2024 TLS1_CK_SRP_SHA_DSS_WITH_AES_256_CBC_SHA,
2025 SSL_kSRP,
2026 SSL_aDSS,
2027 SSL_AES256,
2028 SSL_SHA1,
2029 SSL3_VERSION, TLS1_2_VERSION,
2030 DTLS1_BAD_VER, DTLS1_2_VERSION,
2031 SSL_NOT_DEFAULT | SSL_HIGH,
2032 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2033 256,
2034 256,
2035 },
2036
2037 {
2038 1,
2039 TLS1_TXT_DHE_RSA_WITH_CHACHA20_POLY1305,
2040 TLS1_RFC_DHE_RSA_WITH_CHACHA20_POLY1305,
2041 TLS1_CK_DHE_RSA_WITH_CHACHA20_POLY1305,
2042 SSL_kDHE,
2043 SSL_aRSA,
2044 SSL_CHACHA20POLY1305,
2045 SSL_AEAD,
2046 TLS1_2_VERSION, TLS1_2_VERSION,
2047 DTLS1_2_VERSION, DTLS1_2_VERSION,
2048 SSL_HIGH,
2049 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2050 256,
2051 256,
2052 },
2053 {
2054 1,
2055 TLS1_TXT_ECDHE_RSA_WITH_CHACHA20_POLY1305,
2056 TLS1_RFC_ECDHE_RSA_WITH_CHACHA20_POLY1305,
2057 TLS1_CK_ECDHE_RSA_WITH_CHACHA20_POLY1305,
2058 SSL_kECDHE,
2059 SSL_aRSA,
2060 SSL_CHACHA20POLY1305,
2061 SSL_AEAD,
2062 TLS1_2_VERSION, TLS1_2_VERSION,
2063 DTLS1_2_VERSION, DTLS1_2_VERSION,
2064 SSL_HIGH,
2065 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2066 256,
2067 256,
2068 },
2069 {
2070 1,
2071 TLS1_TXT_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
2072 TLS1_RFC_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
2073 TLS1_CK_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
2074 SSL_kECDHE,
2075 SSL_aECDSA,
2076 SSL_CHACHA20POLY1305,
2077 SSL_AEAD,
2078 TLS1_2_VERSION, TLS1_2_VERSION,
2079 DTLS1_2_VERSION, DTLS1_2_VERSION,
2080 SSL_HIGH,
2081 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2082 256,
2083 256,
2084 },
2085 {
2086 1,
2087 TLS1_TXT_PSK_WITH_CHACHA20_POLY1305,
2088 TLS1_RFC_PSK_WITH_CHACHA20_POLY1305,
2089 TLS1_CK_PSK_WITH_CHACHA20_POLY1305,
2090 SSL_kPSK,
2091 SSL_aPSK,
2092 SSL_CHACHA20POLY1305,
2093 SSL_AEAD,
2094 TLS1_2_VERSION, TLS1_2_VERSION,
2095 DTLS1_2_VERSION, DTLS1_2_VERSION,
2096 SSL_HIGH,
2097 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2098 256,
2099 256,
2100 },
2101 {
2102 1,
2103 TLS1_TXT_ECDHE_PSK_WITH_CHACHA20_POLY1305,
2104 TLS1_RFC_ECDHE_PSK_WITH_CHACHA20_POLY1305,
2105 TLS1_CK_ECDHE_PSK_WITH_CHACHA20_POLY1305,
2106 SSL_kECDHEPSK,
2107 SSL_aPSK,
2108 SSL_CHACHA20POLY1305,
2109 SSL_AEAD,
2110 TLS1_2_VERSION, TLS1_2_VERSION,
2111 DTLS1_2_VERSION, DTLS1_2_VERSION,
2112 SSL_HIGH,
2113 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2114 256,
2115 256,
2116 },
2117 {
2118 1,
2119 TLS1_TXT_DHE_PSK_WITH_CHACHA20_POLY1305,
2120 TLS1_RFC_DHE_PSK_WITH_CHACHA20_POLY1305,
2121 TLS1_CK_DHE_PSK_WITH_CHACHA20_POLY1305,
2122 SSL_kDHEPSK,
2123 SSL_aPSK,
2124 SSL_CHACHA20POLY1305,
2125 SSL_AEAD,
2126 TLS1_2_VERSION, TLS1_2_VERSION,
2127 DTLS1_2_VERSION, DTLS1_2_VERSION,
2128 SSL_HIGH,
2129 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2130 256,
2131 256,
2132 },
2133 {
2134 1,
2135 TLS1_TXT_RSA_PSK_WITH_CHACHA20_POLY1305,
2136 TLS1_RFC_RSA_PSK_WITH_CHACHA20_POLY1305,
2137 TLS1_CK_RSA_PSK_WITH_CHACHA20_POLY1305,
2138 SSL_kRSAPSK,
2139 SSL_aRSA,
2140 SSL_CHACHA20POLY1305,
2141 SSL_AEAD,
2142 TLS1_2_VERSION, TLS1_2_VERSION,
2143 DTLS1_2_VERSION, DTLS1_2_VERSION,
2144 SSL_HIGH,
2145 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2146 256,
2147 256,
2148 },
2149
2150 {
2151 1,
2152 TLS1_TXT_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2153 TLS1_RFC_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2154 TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2155 SSL_kRSA,
2156 SSL_aRSA,
2157 SSL_CAMELLIA128,
2158 SSL_SHA256,
2159 TLS1_2_VERSION, TLS1_2_VERSION,
2160 DTLS1_2_VERSION, DTLS1_2_VERSION,
2161 SSL_NOT_DEFAULT | SSL_HIGH,
2162 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2163 128,
2164 128,
2165 },
2166 {
2167 1,
2168 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256,
2169 TLS1_RFC_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256,
2170 TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256,
2171 SSL_kDHE,
2172 SSL_aDSS,
2173 SSL_CAMELLIA128,
2174 SSL_SHA256,
2175 TLS1_2_VERSION, TLS1_2_VERSION,
2176 DTLS1_2_VERSION, DTLS1_2_VERSION,
2177 SSL_NOT_DEFAULT | SSL_HIGH,
2178 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2179 128,
2180 128,
2181 },
2182 {
2183 1,
2184 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2185 TLS1_RFC_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2186 TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2187 SSL_kDHE,
2188 SSL_aRSA,
2189 SSL_CAMELLIA128,
2190 SSL_SHA256,
2191 TLS1_2_VERSION, TLS1_2_VERSION,
2192 DTLS1_2_VERSION, DTLS1_2_VERSION,
2193 SSL_NOT_DEFAULT | SSL_HIGH,
2194 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2195 128,
2196 128,
2197 },
2198 {
2199 1,
2200 TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA256,
2201 TLS1_RFC_ADH_WITH_CAMELLIA_128_CBC_SHA256,
2202 TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA256,
2203 SSL_kDHE,
2204 SSL_aNULL,
2205 SSL_CAMELLIA128,
2206 SSL_SHA256,
2207 TLS1_2_VERSION, TLS1_2_VERSION,
2208 DTLS1_2_VERSION, DTLS1_2_VERSION,
2209 SSL_NOT_DEFAULT | SSL_HIGH,
2210 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2211 128,
2212 128,
2213 },
2214 {
2215 1,
2216 TLS1_TXT_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2217 TLS1_RFC_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2218 TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2219 SSL_kRSA,
2220 SSL_aRSA,
2221 SSL_CAMELLIA256,
2222 SSL_SHA256,
2223 TLS1_2_VERSION, TLS1_2_VERSION,
2224 DTLS1_2_VERSION, DTLS1_2_VERSION,
2225 SSL_NOT_DEFAULT | SSL_HIGH,
2226 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2227 256,
2228 256,
2229 },
2230 {
2231 1,
2232 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256,
2233 TLS1_RFC_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256,
2234 TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256,
2235 SSL_kDHE,
2236 SSL_aDSS,
2237 SSL_CAMELLIA256,
2238 SSL_SHA256,
2239 TLS1_2_VERSION, TLS1_2_VERSION,
2240 DTLS1_2_VERSION, DTLS1_2_VERSION,
2241 SSL_NOT_DEFAULT | SSL_HIGH,
2242 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2243 256,
2244 256,
2245 },
2246 {
2247 1,
2248 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2249 TLS1_RFC_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2250 TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2251 SSL_kDHE,
2252 SSL_aRSA,
2253 SSL_CAMELLIA256,
2254 SSL_SHA256,
2255 TLS1_2_VERSION, TLS1_2_VERSION,
2256 DTLS1_2_VERSION, DTLS1_2_VERSION,
2257 SSL_NOT_DEFAULT | SSL_HIGH,
2258 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2259 256,
2260 256,
2261 },
2262 {
2263 1,
2264 TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA256,
2265 TLS1_RFC_ADH_WITH_CAMELLIA_256_CBC_SHA256,
2266 TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA256,
2267 SSL_kDHE,
2268 SSL_aNULL,
2269 SSL_CAMELLIA256,
2270 SSL_SHA256,
2271 TLS1_2_VERSION, TLS1_2_VERSION,
2272 DTLS1_2_VERSION, DTLS1_2_VERSION,
2273 SSL_NOT_DEFAULT | SSL_HIGH,
2274 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2275 256,
2276 256,
2277 },
2278 {
2279 1,
2280 TLS1_TXT_RSA_WITH_CAMELLIA_256_CBC_SHA,
2281 TLS1_RFC_RSA_WITH_CAMELLIA_256_CBC_SHA,
2282 TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA,
2283 SSL_kRSA,
2284 SSL_aRSA,
2285 SSL_CAMELLIA256,
2286 SSL_SHA1,
2287 SSL3_VERSION, TLS1_2_VERSION,
2288 DTLS1_BAD_VER, DTLS1_2_VERSION,
2289 SSL_NOT_DEFAULT | SSL_HIGH,
2290 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2291 256,
2292 256,
2293 },
2294 {
2295 1,
2296 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,
2297 TLS1_RFC_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,
2298 TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,
2299 SSL_kDHE,
2300 SSL_aDSS,
2301 SSL_CAMELLIA256,
2302 SSL_SHA1,
2303 SSL3_VERSION, TLS1_2_VERSION,
2304 DTLS1_BAD_VER, DTLS1_2_VERSION,
2305 SSL_NOT_DEFAULT | SSL_HIGH,
2306 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2307 256,
2308 256,
2309 },
2310 {
2311 1,
2312 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,
2313 TLS1_RFC_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,
2314 TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,
2315 SSL_kDHE,
2316 SSL_aRSA,
2317 SSL_CAMELLIA256,
2318 SSL_SHA1,
2319 SSL3_VERSION, TLS1_2_VERSION,
2320 DTLS1_BAD_VER, DTLS1_2_VERSION,
2321 SSL_NOT_DEFAULT | SSL_HIGH,
2322 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2323 256,
2324 256,
2325 },
2326 {
2327 1,
2328 TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA,
2329 TLS1_RFC_ADH_WITH_CAMELLIA_256_CBC_SHA,
2330 TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA,
2331 SSL_kDHE,
2332 SSL_aNULL,
2333 SSL_CAMELLIA256,
2334 SSL_SHA1,
2335 SSL3_VERSION, TLS1_2_VERSION,
2336 DTLS1_BAD_VER, DTLS1_2_VERSION,
2337 SSL_NOT_DEFAULT | SSL_HIGH,
2338 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2339 256,
2340 256,
2341 },
2342 {
2343 1,
2344 TLS1_TXT_RSA_WITH_CAMELLIA_128_CBC_SHA,
2345 TLS1_RFC_RSA_WITH_CAMELLIA_128_CBC_SHA,
2346 TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA,
2347 SSL_kRSA,
2348 SSL_aRSA,
2349 SSL_CAMELLIA128,
2350 SSL_SHA1,
2351 SSL3_VERSION, TLS1_2_VERSION,
2352 DTLS1_BAD_VER, DTLS1_2_VERSION,
2353 SSL_NOT_DEFAULT | SSL_HIGH,
2354 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2355 128,
2356 128,
2357 },
2358 {
2359 1,
2360 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,
2361 TLS1_RFC_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,
2362 TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,
2363 SSL_kDHE,
2364 SSL_aDSS,
2365 SSL_CAMELLIA128,
2366 SSL_SHA1,
2367 SSL3_VERSION, TLS1_2_VERSION,
2368 DTLS1_BAD_VER, DTLS1_2_VERSION,
2369 SSL_NOT_DEFAULT | SSL_HIGH,
2370 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2371 128,
2372 128,
2373 },
2374 {
2375 1,
2376 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,
2377 TLS1_RFC_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,
2378 TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,
2379 SSL_kDHE,
2380 SSL_aRSA,
2381 SSL_CAMELLIA128,
2382 SSL_SHA1,
2383 SSL3_VERSION, TLS1_2_VERSION,
2384 DTLS1_BAD_VER, DTLS1_2_VERSION,
2385 SSL_NOT_DEFAULT | SSL_HIGH,
2386 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2387 128,
2388 128,
2389 },
2390 {
2391 1,
2392 TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA,
2393 TLS1_RFC_ADH_WITH_CAMELLIA_128_CBC_SHA,
2394 TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA,
2395 SSL_kDHE,
2396 SSL_aNULL,
2397 SSL_CAMELLIA128,
2398 SSL_SHA1,
2399 SSL3_VERSION, TLS1_2_VERSION,
2400 DTLS1_BAD_VER, DTLS1_2_VERSION,
2401 SSL_NOT_DEFAULT | SSL_HIGH,
2402 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2403 128,
2404 128,
2405 },
2406 {
2407 1,
2408 TLS1_TXT_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,
2409 TLS1_RFC_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,
2410 TLS1_CK_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,
2411 SSL_kECDHE,
2412 SSL_aECDSA,
2413 SSL_CAMELLIA128,
2414 SSL_SHA256,
2415 TLS1_2_VERSION, TLS1_2_VERSION,
2416 DTLS1_2_VERSION, DTLS1_2_VERSION,
2417 SSL_NOT_DEFAULT | SSL_HIGH,
2418 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2419 128,
2420 128,
2421 },
2422 {
2423 1,
2424 TLS1_TXT_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,
2425 TLS1_RFC_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,
2426 TLS1_CK_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,
2427 SSL_kECDHE,
2428 SSL_aECDSA,
2429 SSL_CAMELLIA256,
2430 SSL_SHA384,
2431 TLS1_2_VERSION, TLS1_2_VERSION,
2432 DTLS1_2_VERSION, DTLS1_2_VERSION,
2433 SSL_NOT_DEFAULT | SSL_HIGH,
2434 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2435 256,
2436 256,
2437 },
2438 {
2439 1,
2440 TLS1_TXT_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2441 TLS1_RFC_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2442 TLS1_CK_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2443 SSL_kECDHE,
2444 SSL_aRSA,
2445 SSL_CAMELLIA128,
2446 SSL_SHA256,
2447 TLS1_2_VERSION, TLS1_2_VERSION,
2448 DTLS1_2_VERSION, DTLS1_2_VERSION,
2449 SSL_NOT_DEFAULT | SSL_HIGH,
2450 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2451 128,
2452 128,
2453 },
2454 {
2455 1,
2456 TLS1_TXT_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384,
2457 TLS1_RFC_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384,
2458 TLS1_CK_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384,
2459 SSL_kECDHE,
2460 SSL_aRSA,
2461 SSL_CAMELLIA256,
2462 SSL_SHA384,
2463 TLS1_2_VERSION, TLS1_2_VERSION,
2464 DTLS1_2_VERSION, DTLS1_2_VERSION,
2465 SSL_NOT_DEFAULT | SSL_HIGH,
2466 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2467 256,
2468 256,
2469 },
2470 {
2471 1,
2472 TLS1_TXT_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2473 TLS1_RFC_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2474 TLS1_CK_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2475 SSL_kPSK,
2476 SSL_aPSK,
2477 SSL_CAMELLIA128,
2478 SSL_SHA256,
2479 TLS1_VERSION, TLS1_2_VERSION,
2480 DTLS1_BAD_VER, DTLS1_2_VERSION,
2481 SSL_NOT_DEFAULT | SSL_HIGH,
2482 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2483 128,
2484 128,
2485 },
2486 {
2487 1,
2488 TLS1_TXT_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2489 TLS1_RFC_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2490 TLS1_CK_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2491 SSL_kPSK,
2492 SSL_aPSK,
2493 SSL_CAMELLIA256,
2494 SSL_SHA384,
2495 TLS1_VERSION, TLS1_2_VERSION,
2496 DTLS1_BAD_VER, DTLS1_2_VERSION,
2497 SSL_NOT_DEFAULT | SSL_HIGH,
2498 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2499 256,
2500 256,
2501 },
2502 {
2503 1,
2504 TLS1_TXT_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2505 TLS1_RFC_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2506 TLS1_CK_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2507 SSL_kDHEPSK,
2508 SSL_aPSK,
2509 SSL_CAMELLIA128,
2510 SSL_SHA256,
2511 TLS1_VERSION, TLS1_2_VERSION,
2512 DTLS1_BAD_VER, DTLS1_2_VERSION,
2513 SSL_NOT_DEFAULT | SSL_HIGH,
2514 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2515 128,
2516 128,
2517 },
2518 {
2519 1,
2520 TLS1_TXT_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2521 TLS1_RFC_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2522 TLS1_CK_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2523 SSL_kDHEPSK,
2524 SSL_aPSK,
2525 SSL_CAMELLIA256,
2526 SSL_SHA384,
2527 TLS1_VERSION, TLS1_2_VERSION,
2528 DTLS1_BAD_VER, DTLS1_2_VERSION,
2529 SSL_NOT_DEFAULT | SSL_HIGH,
2530 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2531 256,
2532 256,
2533 },
2534 {
2535 1,
2536 TLS1_TXT_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2537 TLS1_RFC_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2538 TLS1_CK_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2539 SSL_kRSAPSK,
2540 SSL_aRSA,
2541 SSL_CAMELLIA128,
2542 SSL_SHA256,
2543 TLS1_VERSION, TLS1_2_VERSION,
2544 DTLS1_BAD_VER, DTLS1_2_VERSION,
2545 SSL_NOT_DEFAULT | SSL_HIGH,
2546 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2547 128,
2548 128,
2549 },
2550 {
2551 1,
2552 TLS1_TXT_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2553 TLS1_RFC_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2554 TLS1_CK_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2555 SSL_kRSAPSK,
2556 SSL_aRSA,
2557 SSL_CAMELLIA256,
2558 SSL_SHA384,
2559 TLS1_VERSION, TLS1_2_VERSION,
2560 DTLS1_BAD_VER, DTLS1_2_VERSION,
2561 SSL_NOT_DEFAULT | SSL_HIGH,
2562 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2563 256,
2564 256,
2565 },
2566 {
2567 1,
2568 TLS1_TXT_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2569 TLS1_RFC_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2570 TLS1_CK_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2571 SSL_kECDHEPSK,
2572 SSL_aPSK,
2573 SSL_CAMELLIA128,
2574 SSL_SHA256,
2575 TLS1_VERSION, TLS1_2_VERSION,
2576 DTLS1_BAD_VER, DTLS1_2_VERSION,
2577 SSL_NOT_DEFAULT | SSL_HIGH,
2578 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2579 128,
2580 128,
2581 },
2582 {
2583 1,
2584 TLS1_TXT_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2585 TLS1_RFC_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2586 TLS1_CK_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2587 SSL_kECDHEPSK,
2588 SSL_aPSK,
2589 SSL_CAMELLIA256,
2590 SSL_SHA384,
2591 TLS1_VERSION, TLS1_2_VERSION,
2592 DTLS1_BAD_VER, DTLS1_2_VERSION,
2593 SSL_NOT_DEFAULT | SSL_HIGH,
2594 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2595 256,
2596 256,
2597 },
2598
2599#ifndef OPENSSL_NO_GOST
2600 {
2601 1,
2602 "GOST2001-GOST89-GOST89",
2603 "TLS_GOSTR341001_WITH_28147_CNT_IMIT",
2604 0x3000081,
2605 SSL_kGOST,
2606 SSL_aGOST01,
2607 SSL_eGOST2814789CNT,
2608 SSL_GOST89MAC,
2609 TLS1_VERSION, TLS1_2_VERSION,
2610 0, 0,
2611 SSL_HIGH,
2612 SSL_HANDSHAKE_MAC_GOST94 | TLS1_PRF_GOST94 | TLS1_STREAM_MAC,
2613 256,
2614 256,
2615 },
2616 {
2617 1,
2618 "GOST2001-NULL-GOST94",
2619 "TLS_GOSTR341001_WITH_NULL_GOSTR3411",
2620 0x3000083,
2621 SSL_kGOST,
2622 SSL_aGOST01,
2623 SSL_eNULL,
2624 SSL_GOST94,
2625 TLS1_VERSION, TLS1_2_VERSION,
2626 0, 0,
2627 SSL_STRONG_NONE,
2628 SSL_HANDSHAKE_MAC_GOST94 | TLS1_PRF_GOST94,
2629 0,
2630 0,
2631 },
2632 {
2633 1,
2634 "IANA-GOST2012-GOST8912-GOST8912",
2635 NULL,
2636 0x0300c102,
2637 SSL_kGOST,
2638 SSL_aGOST12 | SSL_aGOST01,
2639 SSL_eGOST2814789CNT12,
2640 SSL_GOST89MAC12,
2641 TLS1_VERSION, TLS1_2_VERSION,
2642 0, 0,
2643 SSL_HIGH,
2644 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC,
2645 256,
2646 256,
2647 },
2648 {
2649 1,
2650 "LEGACY-GOST2012-GOST8912-GOST8912",
2651 NULL,
2652 0x0300ff85,
2653 SSL_kGOST,
2654 SSL_aGOST12 | SSL_aGOST01,
2655 SSL_eGOST2814789CNT12,
2656 SSL_GOST89MAC12,
2657 TLS1_VERSION, TLS1_2_VERSION,
2658 0, 0,
2659 SSL_HIGH,
2660 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC,
2661 256,
2662 256,
2663 },
2664 {
2665 1,
2666 "GOST2012-NULL-GOST12",
2667 NULL,
2668 0x0300ff87,
2669 SSL_kGOST,
2670 SSL_aGOST12 | SSL_aGOST01,
2671 SSL_eNULL,
2672 SSL_GOST12_256,
2673 TLS1_VERSION, TLS1_2_VERSION,
2674 0, 0,
2675 SSL_STRONG_NONE,
2676 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC,
2677 0,
2678 0,
2679 },
2680 {
2681 1,
2682 "GOST2012-KUZNYECHIK-KUZNYECHIKOMAC",
2683 NULL,
2684 0x0300C100,
2685 SSL_kGOST18,
2686 SSL_aGOST12,
2687 SSL_KUZNYECHIK,
2688 SSL_KUZNYECHIKOMAC,
2689 TLS1_2_VERSION, TLS1_2_VERSION,
2690 0, 0,
2691 SSL_HIGH,
2692 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_TLSTREE,
2693 256,
2694 256,
2695 },
2696 {
2697 1,
2698 "GOST2012-MAGMA-MAGMAOMAC",
2699 NULL,
2700 0x0300C101,
2701 SSL_kGOST18,
2702 SSL_aGOST12,
2703 SSL_MAGMA,
2704 SSL_MAGMAOMAC,
2705 TLS1_2_VERSION, TLS1_2_VERSION,
2706 0, 0,
2707 SSL_HIGH,
2708 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_TLSTREE,
2709 256,
2710 256,
2711 },
2712#endif /* OPENSSL_NO_GOST */
2713
2714 {
2715 1,
2716 SSL3_TXT_RSA_IDEA_128_SHA,
2717 SSL3_RFC_RSA_IDEA_128_SHA,
2718 SSL3_CK_RSA_IDEA_128_SHA,
2719 SSL_kRSA,
2720 SSL_aRSA,
2721 SSL_IDEA,
2722 SSL_SHA1,
2723 SSL3_VERSION, TLS1_1_VERSION,
2724 DTLS1_BAD_VER, DTLS1_VERSION,
2725 SSL_NOT_DEFAULT | SSL_MEDIUM,
2726 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2727 128,
2728 128,
2729 },
2730
2731 {
2732 1,
2733 TLS1_TXT_RSA_WITH_SEED_SHA,
2734 TLS1_RFC_RSA_WITH_SEED_SHA,
2735 TLS1_CK_RSA_WITH_SEED_SHA,
2736 SSL_kRSA,
2737 SSL_aRSA,
2738 SSL_SEED,
2739 SSL_SHA1,
2740 SSL3_VERSION, TLS1_2_VERSION,
2741 DTLS1_BAD_VER, DTLS1_2_VERSION,
2742 SSL_NOT_DEFAULT | SSL_MEDIUM,
2743 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2744 128,
2745 128,
2746 },
2747 {
2748 1,
2749 TLS1_TXT_DHE_DSS_WITH_SEED_SHA,
2750 TLS1_RFC_DHE_DSS_WITH_SEED_SHA,
2751 TLS1_CK_DHE_DSS_WITH_SEED_SHA,
2752 SSL_kDHE,
2753 SSL_aDSS,
2754 SSL_SEED,
2755 SSL_SHA1,
2756 SSL3_VERSION, TLS1_2_VERSION,
2757 DTLS1_BAD_VER, DTLS1_2_VERSION,
2758 SSL_NOT_DEFAULT | SSL_MEDIUM,
2759 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2760 128,
2761 128,
2762 },
2763 {
2764 1,
2765 TLS1_TXT_DHE_RSA_WITH_SEED_SHA,
2766 TLS1_RFC_DHE_RSA_WITH_SEED_SHA,
2767 TLS1_CK_DHE_RSA_WITH_SEED_SHA,
2768 SSL_kDHE,
2769 SSL_aRSA,
2770 SSL_SEED,
2771 SSL_SHA1,
2772 SSL3_VERSION, TLS1_2_VERSION,
2773 DTLS1_BAD_VER, DTLS1_2_VERSION,
2774 SSL_NOT_DEFAULT | SSL_MEDIUM,
2775 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2776 128,
2777 128,
2778 },
2779 {
2780 1,
2781 TLS1_TXT_ADH_WITH_SEED_SHA,
2782 TLS1_RFC_ADH_WITH_SEED_SHA,
2783 TLS1_CK_ADH_WITH_SEED_SHA,
2784 SSL_kDHE,
2785 SSL_aNULL,
2786 SSL_SEED,
2787 SSL_SHA1,
2788 SSL3_VERSION, TLS1_2_VERSION,
2789 DTLS1_BAD_VER, DTLS1_2_VERSION,
2790 SSL_NOT_DEFAULT | SSL_MEDIUM,
2791 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2792 128,
2793 128,
2794 },
2795
2796#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
2797 {
2798 1,
2799 SSL3_TXT_RSA_RC4_128_MD5,
2800 SSL3_RFC_RSA_RC4_128_MD5,
2801 SSL3_CK_RSA_RC4_128_MD5,
2802 SSL_kRSA,
2803 SSL_aRSA,
2804 SSL_RC4,
2805 SSL_MD5,
2806 SSL3_VERSION, TLS1_2_VERSION,
2807 0, 0,
2808 SSL_NOT_DEFAULT | SSL_MEDIUM,
2809 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2810 80,
2811 128,
2812 },
2813 {
2814 1,
2815 SSL3_TXT_RSA_RC4_128_SHA,
2816 SSL3_RFC_RSA_RC4_128_SHA,
2817 SSL3_CK_RSA_RC4_128_SHA,
2818 SSL_kRSA,
2819 SSL_aRSA,
2820 SSL_RC4,
2821 SSL_SHA1,
2822 SSL3_VERSION, TLS1_2_VERSION,
2823 0, 0,
2824 SSL_NOT_DEFAULT | SSL_MEDIUM,
2825 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2826 80,
2827 128,
2828 },
2829 {
2830 1,
2831 SSL3_TXT_ADH_RC4_128_MD5,
2832 SSL3_RFC_ADH_RC4_128_MD5,
2833 SSL3_CK_ADH_RC4_128_MD5,
2834 SSL_kDHE,
2835 SSL_aNULL,
2836 SSL_RC4,
2837 SSL_MD5,
2838 SSL3_VERSION, TLS1_2_VERSION,
2839 0, 0,
2840 SSL_NOT_DEFAULT | SSL_MEDIUM,
2841 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2842 80,
2843 128,
2844 },
2845 {
2846 1,
2847 TLS1_TXT_ECDHE_PSK_WITH_RC4_128_SHA,
2848 TLS1_RFC_ECDHE_PSK_WITH_RC4_128_SHA,
2849 TLS1_CK_ECDHE_PSK_WITH_RC4_128_SHA,
2850 SSL_kECDHEPSK,
2851 SSL_aPSK,
2852 SSL_RC4,
2853 SSL_SHA1,
2854 TLS1_VERSION, TLS1_2_VERSION,
2855 0, 0,
2856 SSL_NOT_DEFAULT | SSL_MEDIUM,
2857 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2858 80,
2859 128,
2860 },
2861 {
2862 1,
2863 TLS1_TXT_ECDH_anon_WITH_RC4_128_SHA,
2864 TLS1_RFC_ECDH_anon_WITH_RC4_128_SHA,
2865 TLS1_CK_ECDH_anon_WITH_RC4_128_SHA,
2866 SSL_kECDHE,
2867 SSL_aNULL,
2868 SSL_RC4,
2869 SSL_SHA1,
2870 TLS1_VERSION, TLS1_2_VERSION,
2871 0, 0,
2872 SSL_NOT_DEFAULT | SSL_MEDIUM,
2873 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2874 80,
2875 128,
2876 },
2877 {
2878 1,
2879 TLS1_TXT_ECDHE_ECDSA_WITH_RC4_128_SHA,
2880 TLS1_RFC_ECDHE_ECDSA_WITH_RC4_128_SHA,
2881 TLS1_CK_ECDHE_ECDSA_WITH_RC4_128_SHA,
2882 SSL_kECDHE,
2883 SSL_aECDSA,
2884 SSL_RC4,
2885 SSL_SHA1,
2886 TLS1_VERSION, TLS1_2_VERSION,
2887 0, 0,
2888 SSL_NOT_DEFAULT | SSL_MEDIUM,
2889 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2890 80,
2891 128,
2892 },
2893 {
2894 1,
2895 TLS1_TXT_ECDHE_RSA_WITH_RC4_128_SHA,
2896 TLS1_RFC_ECDHE_RSA_WITH_RC4_128_SHA,
2897 TLS1_CK_ECDHE_RSA_WITH_RC4_128_SHA,
2898 SSL_kECDHE,
2899 SSL_aRSA,
2900 SSL_RC4,
2901 SSL_SHA1,
2902 TLS1_VERSION, TLS1_2_VERSION,
2903 0, 0,
2904 SSL_NOT_DEFAULT | SSL_MEDIUM,
2905 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2906 80,
2907 128,
2908 },
2909 {
2910 1,
2911 TLS1_TXT_PSK_WITH_RC4_128_SHA,
2912 TLS1_RFC_PSK_WITH_RC4_128_SHA,
2913 TLS1_CK_PSK_WITH_RC4_128_SHA,
2914 SSL_kPSK,
2915 SSL_aPSK,
2916 SSL_RC4,
2917 SSL_SHA1,
2918 SSL3_VERSION, TLS1_2_VERSION,
2919 0, 0,
2920 SSL_NOT_DEFAULT | SSL_MEDIUM,
2921 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2922 80,
2923 128,
2924 },
2925 {
2926 1,
2927 TLS1_TXT_RSA_PSK_WITH_RC4_128_SHA,
2928 TLS1_RFC_RSA_PSK_WITH_RC4_128_SHA,
2929 TLS1_CK_RSA_PSK_WITH_RC4_128_SHA,
2930 SSL_kRSAPSK,
2931 SSL_aRSA,
2932 SSL_RC4,
2933 SSL_SHA1,
2934 SSL3_VERSION, TLS1_2_VERSION,
2935 0, 0,
2936 SSL_NOT_DEFAULT | SSL_MEDIUM,
2937 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2938 80,
2939 128,
2940 },
2941 {
2942 1,
2943 TLS1_TXT_DHE_PSK_WITH_RC4_128_SHA,
2944 TLS1_RFC_DHE_PSK_WITH_RC4_128_SHA,
2945 TLS1_CK_DHE_PSK_WITH_RC4_128_SHA,
2946 SSL_kDHEPSK,
2947 SSL_aPSK,
2948 SSL_RC4,
2949 SSL_SHA1,
2950 SSL3_VERSION, TLS1_2_VERSION,
2951 0, 0,
2952 SSL_NOT_DEFAULT | SSL_MEDIUM,
2953 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2954 80,
2955 128,
2956 },
2957#endif /* OPENSSL_NO_WEAK_SSL_CIPHERS */
2958
2959 {
2960 1,
2961 TLS1_TXT_RSA_WITH_ARIA_128_GCM_SHA256,
2962 TLS1_RFC_RSA_WITH_ARIA_128_GCM_SHA256,
2963 TLS1_CK_RSA_WITH_ARIA_128_GCM_SHA256,
2964 SSL_kRSA,
2965 SSL_aRSA,
2966 SSL_ARIA128GCM,
2967 SSL_AEAD,
2968 TLS1_2_VERSION, TLS1_2_VERSION,
2969 DTLS1_2_VERSION, DTLS1_2_VERSION,
2970 SSL_NOT_DEFAULT | SSL_HIGH,
2971 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2972 128,
2973 128,
2974 },
2975 {
2976 1,
2977 TLS1_TXT_RSA_WITH_ARIA_256_GCM_SHA384,
2978 TLS1_RFC_RSA_WITH_ARIA_256_GCM_SHA384,
2979 TLS1_CK_RSA_WITH_ARIA_256_GCM_SHA384,
2980 SSL_kRSA,
2981 SSL_aRSA,
2982 SSL_ARIA256GCM,
2983 SSL_AEAD,
2984 TLS1_2_VERSION, TLS1_2_VERSION,
2985 DTLS1_2_VERSION, DTLS1_2_VERSION,
2986 SSL_NOT_DEFAULT | SSL_HIGH,
2987 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2988 256,
2989 256,
2990 },
2991 {
2992 1,
2993 TLS1_TXT_DHE_RSA_WITH_ARIA_128_GCM_SHA256,
2994 TLS1_RFC_DHE_RSA_WITH_ARIA_128_GCM_SHA256,
2995 TLS1_CK_DHE_RSA_WITH_ARIA_128_GCM_SHA256,
2996 SSL_kDHE,
2997 SSL_aRSA,
2998 SSL_ARIA128GCM,
2999 SSL_AEAD,
3000 TLS1_2_VERSION, TLS1_2_VERSION,
3001 DTLS1_2_VERSION, DTLS1_2_VERSION,
3002 SSL_NOT_DEFAULT | SSL_HIGH,
3003 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3004 128,
3005 128,
3006 },
3007 {
3008 1,
3009 TLS1_TXT_DHE_RSA_WITH_ARIA_256_GCM_SHA384,
3010 TLS1_RFC_DHE_RSA_WITH_ARIA_256_GCM_SHA384,
3011 TLS1_CK_DHE_RSA_WITH_ARIA_256_GCM_SHA384,
3012 SSL_kDHE,
3013 SSL_aRSA,
3014 SSL_ARIA256GCM,
3015 SSL_AEAD,
3016 TLS1_2_VERSION, TLS1_2_VERSION,
3017 DTLS1_2_VERSION, DTLS1_2_VERSION,
3018 SSL_NOT_DEFAULT | SSL_HIGH,
3019 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3020 256,
3021 256,
3022 },
3023 {
3024 1,
3025 TLS1_TXT_DHE_DSS_WITH_ARIA_128_GCM_SHA256,
3026 TLS1_RFC_DHE_DSS_WITH_ARIA_128_GCM_SHA256,
3027 TLS1_CK_DHE_DSS_WITH_ARIA_128_GCM_SHA256,
3028 SSL_kDHE,
3029 SSL_aDSS,
3030 SSL_ARIA128GCM,
3031 SSL_AEAD,
3032 TLS1_2_VERSION, TLS1_2_VERSION,
3033 DTLS1_2_VERSION, DTLS1_2_VERSION,
3034 SSL_NOT_DEFAULT | SSL_HIGH,
3035 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3036 128,
3037 128,
3038 },
3039 {
3040 1,
3041 TLS1_TXT_DHE_DSS_WITH_ARIA_256_GCM_SHA384,
3042 TLS1_RFC_DHE_DSS_WITH_ARIA_256_GCM_SHA384,
3043 TLS1_CK_DHE_DSS_WITH_ARIA_256_GCM_SHA384,
3044 SSL_kDHE,
3045 SSL_aDSS,
3046 SSL_ARIA256GCM,
3047 SSL_AEAD,
3048 TLS1_2_VERSION, TLS1_2_VERSION,
3049 DTLS1_2_VERSION, DTLS1_2_VERSION,
3050 SSL_NOT_DEFAULT | SSL_HIGH,
3051 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3052 256,
3053 256,
3054 },
3055 {
3056 1,
3057 TLS1_TXT_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256,
3058 TLS1_RFC_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256,
3059 TLS1_CK_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256,
3060 SSL_kECDHE,
3061 SSL_aECDSA,
3062 SSL_ARIA128GCM,
3063 SSL_AEAD,
3064 TLS1_2_VERSION, TLS1_2_VERSION,
3065 DTLS1_2_VERSION, DTLS1_2_VERSION,
3066 SSL_NOT_DEFAULT | SSL_HIGH,
3067 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3068 128,
3069 128,
3070 },
3071 {
3072 1,
3073 TLS1_TXT_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384,
3074 TLS1_RFC_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384,
3075 TLS1_CK_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384,
3076 SSL_kECDHE,
3077 SSL_aECDSA,
3078 SSL_ARIA256GCM,
3079 SSL_AEAD,
3080 TLS1_2_VERSION, TLS1_2_VERSION,
3081 DTLS1_2_VERSION, DTLS1_2_VERSION,
3082 SSL_NOT_DEFAULT | SSL_HIGH,
3083 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3084 256,
3085 256,
3086 },
3087 {
3088 1,
3089 TLS1_TXT_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256,
3090 TLS1_RFC_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256,
3091 TLS1_CK_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256,
3092 SSL_kECDHE,
3093 SSL_aRSA,
3094 SSL_ARIA128GCM,
3095 SSL_AEAD,
3096 TLS1_2_VERSION, TLS1_2_VERSION,
3097 DTLS1_2_VERSION, DTLS1_2_VERSION,
3098 SSL_NOT_DEFAULT | SSL_HIGH,
3099 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3100 128,
3101 128,
3102 },
3103 {
3104 1,
3105 TLS1_TXT_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384,
3106 TLS1_RFC_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384,
3107 TLS1_CK_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384,
3108 SSL_kECDHE,
3109 SSL_aRSA,
3110 SSL_ARIA256GCM,
3111 SSL_AEAD,
3112 TLS1_2_VERSION, TLS1_2_VERSION,
3113 DTLS1_2_VERSION, DTLS1_2_VERSION,
3114 SSL_NOT_DEFAULT | SSL_HIGH,
3115 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3116 256,
3117 256,
3118 },
3119 {
3120 1,
3121 TLS1_TXT_PSK_WITH_ARIA_128_GCM_SHA256,
3122 TLS1_RFC_PSK_WITH_ARIA_128_GCM_SHA256,
3123 TLS1_CK_PSK_WITH_ARIA_128_GCM_SHA256,
3124 SSL_kPSK,
3125 SSL_aPSK,
3126 SSL_ARIA128GCM,
3127 SSL_AEAD,
3128 TLS1_2_VERSION, TLS1_2_VERSION,
3129 DTLS1_2_VERSION, DTLS1_2_VERSION,
3130 SSL_NOT_DEFAULT | SSL_HIGH,
3131 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3132 128,
3133 128,
3134 },
3135 {
3136 1,
3137 TLS1_TXT_PSK_WITH_ARIA_256_GCM_SHA384,
3138 TLS1_RFC_PSK_WITH_ARIA_256_GCM_SHA384,
3139 TLS1_CK_PSK_WITH_ARIA_256_GCM_SHA384,
3140 SSL_kPSK,
3141 SSL_aPSK,
3142 SSL_ARIA256GCM,
3143 SSL_AEAD,
3144 TLS1_2_VERSION, TLS1_2_VERSION,
3145 DTLS1_2_VERSION, DTLS1_2_VERSION,
3146 SSL_NOT_DEFAULT | SSL_HIGH,
3147 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3148 256,
3149 256,
3150 },
3151 {
3152 1,
3153 TLS1_TXT_DHE_PSK_WITH_ARIA_128_GCM_SHA256,
3154 TLS1_RFC_DHE_PSK_WITH_ARIA_128_GCM_SHA256,
3155 TLS1_CK_DHE_PSK_WITH_ARIA_128_GCM_SHA256,
3156 SSL_kDHEPSK,
3157 SSL_aPSK,
3158 SSL_ARIA128GCM,
3159 SSL_AEAD,
3160 TLS1_2_VERSION, TLS1_2_VERSION,
3161 DTLS1_2_VERSION, DTLS1_2_VERSION,
3162 SSL_NOT_DEFAULT | SSL_HIGH,
3163 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3164 128,
3165 128,
3166 },
3167 {
3168 1,
3169 TLS1_TXT_DHE_PSK_WITH_ARIA_256_GCM_SHA384,
3170 TLS1_RFC_DHE_PSK_WITH_ARIA_256_GCM_SHA384,
3171 TLS1_CK_DHE_PSK_WITH_ARIA_256_GCM_SHA384,
3172 SSL_kDHEPSK,
3173 SSL_aPSK,
3174 SSL_ARIA256GCM,
3175 SSL_AEAD,
3176 TLS1_2_VERSION, TLS1_2_VERSION,
3177 DTLS1_2_VERSION, DTLS1_2_VERSION,
3178 SSL_NOT_DEFAULT | SSL_HIGH,
3179 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3180 256,
3181 256,
3182 },
3183 {
3184 1,
3185 TLS1_TXT_RSA_PSK_WITH_ARIA_128_GCM_SHA256,
3186 TLS1_RFC_RSA_PSK_WITH_ARIA_128_GCM_SHA256,
3187 TLS1_CK_RSA_PSK_WITH_ARIA_128_GCM_SHA256,
3188 SSL_kRSAPSK,
3189 SSL_aRSA,
3190 SSL_ARIA128GCM,
3191 SSL_AEAD,
3192 TLS1_2_VERSION, TLS1_2_VERSION,
3193 DTLS1_2_VERSION, DTLS1_2_VERSION,
3194 SSL_NOT_DEFAULT | SSL_HIGH,
3195 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3196 128,
3197 128,
3198 },
3199 {
3200 1,
3201 TLS1_TXT_RSA_PSK_WITH_ARIA_256_GCM_SHA384,
3202 TLS1_RFC_RSA_PSK_WITH_ARIA_256_GCM_SHA384,
3203 TLS1_CK_RSA_PSK_WITH_ARIA_256_GCM_SHA384,
3204 SSL_kRSAPSK,
3205 SSL_aRSA,
3206 SSL_ARIA256GCM,
3207 SSL_AEAD,
3208 TLS1_2_VERSION, TLS1_2_VERSION,
3209 DTLS1_2_VERSION, DTLS1_2_VERSION,
3210 SSL_NOT_DEFAULT | SSL_HIGH,
3211 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3212 256,
3213 256,
3214 },
3215};
3216
3217/*
3218 * The list of known Signalling Cipher-Suite Value "ciphers", non-valid
3219 * values stuffed into the ciphers field of the wire protocol for signalling
3220 * purposes.
3221 */
3222static SSL_CIPHER ssl3_scsvs[] = {
3223 {
3224 0,
3225 "TLS_EMPTY_RENEGOTIATION_INFO_SCSV",
3226 "TLS_EMPTY_RENEGOTIATION_INFO_SCSV",
3227 SSL3_CK_SCSV,
3228 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
3229 },
3230 {
3231 0,
3232 "TLS_FALLBACK_SCSV",
3233 "TLS_FALLBACK_SCSV",
3234 SSL3_CK_FALLBACK_SCSV,
3235 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
3236 },
3237};
3238
3239static int cipher_compare(const void *a, const void *b)
3240{
3241 const SSL_CIPHER *ap = (const SSL_CIPHER *)a;
3242 const SSL_CIPHER *bp = (const SSL_CIPHER *)b;
3243
3244 if (ap->id == bp->id)
3245 return 0;
3246 return ap->id < bp->id ? -1 : 1;
3247}
3248
3249void ssl_sort_cipher_list(void)
3250{
3251 qsort(tls13_ciphers, TLS13_NUM_CIPHERS, sizeof(tls13_ciphers[0]),
3252 cipher_compare);
3253 qsort(ssl3_ciphers, SSL3_NUM_CIPHERS, sizeof(ssl3_ciphers[0]),
3254 cipher_compare);
3255 qsort(ssl3_scsvs, SSL3_NUM_SCSVS, sizeof(ssl3_scsvs[0]), cipher_compare);
3256}
3257
3258static int sslcon_undefined_function_1(SSL_CONNECTION *sc, unsigned char *r,
3259 size_t s, const char *t, size_t u,
3260 const unsigned char *v, size_t w, int x)
3261{
3262 (void)r;
3263 (void)s;
3264 (void)t;
3265 (void)u;
3266 (void)v;
3267 (void)w;
3268 (void)x;
3269 return ssl_undefined_function(SSL_CONNECTION_GET_SSL(sc));
3270}
3271
3272const SSL3_ENC_METHOD SSLv3_enc_data = {
3273 ssl3_setup_key_block,
3274 ssl3_generate_master_secret,
3275 ssl3_change_cipher_state,
3276 ssl3_final_finish_mac,
3277 SSL3_MD_CLIENT_FINISHED_CONST, 4,
3278 SSL3_MD_SERVER_FINISHED_CONST, 4,
3279 ssl3_alert_code,
3280 sslcon_undefined_function_1,
3281 0,
3282 ssl3_set_handshake_header,
3283 tls_close_construct_packet,
3284 ssl3_handshake_write
3285};
3286
3287OSSL_TIME ssl3_default_timeout(void)
3288{
3289 /*
3290 * 2 hours, the 24 hours mentioned in the SSLv3 spec is way too long for
3291 * http, the cache would over fill
3292 */
3293 return ossl_seconds2time(60 * 60 * 2);
3294}
3295
3296int ssl3_num_ciphers(void)
3297{
3298 return SSL3_NUM_CIPHERS;
3299}
3300
3301const SSL_CIPHER *ssl3_get_cipher(unsigned int u)
3302{
3303 if (u < SSL3_NUM_CIPHERS)
3304 return &(ssl3_ciphers[SSL3_NUM_CIPHERS - 1 - u]);
3305 else
3306 return NULL;
3307}
3308
3309int ssl3_set_handshake_header(SSL_CONNECTION *s, WPACKET *pkt, int htype)
3310{
3311 /* No header in the event of a CCS */
3312 if (htype == SSL3_MT_CHANGE_CIPHER_SPEC)
3313 return 1;
3314
3315 /* Set the content type and 3 bytes for the message len */
3316 if (!WPACKET_put_bytes_u8(pkt, htype)
3317 || !WPACKET_start_sub_packet_u24(pkt))
3318 return 0;
3319
3320 return 1;
3321}
3322
3323int ssl3_handshake_write(SSL_CONNECTION *s)
3324{
3325 return ssl3_do_write(s, SSL3_RT_HANDSHAKE);
3326}
3327
3328int ssl3_new(SSL *s)
3329{
3330#ifndef OPENSSL_NO_SRP
3331 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s);
3332
3333 if (sc == NULL)
3334 return 0;
3335
3336 if (!ssl_srp_ctx_init_intern(sc))
3337 return 0;
3338#endif
3339
3340 if (!s->method->ssl_clear(s))
3341 return 0;
3342
3343 return 1;
3344}
3345
3346void ssl3_free(SSL *s)
3347{
3348 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s);
3349
3350 if (sc == NULL)
3351 return;
3352
3353 ssl3_cleanup_key_block(sc);
3354
3355 EVP_PKEY_free(sc->s3.peer_tmp);
3356 sc->s3.peer_tmp = NULL;
3357 EVP_PKEY_free(sc->s3.tmp.pkey);
3358 sc->s3.tmp.pkey = NULL;
3359
3360 ssl_evp_cipher_free(sc->s3.tmp.new_sym_enc);
3361 ssl_evp_md_free(sc->s3.tmp.new_hash);
3362
3363 OPENSSL_free(sc->s3.tmp.ctype);
3364 sk_X509_NAME_pop_free(sc->s3.tmp.peer_ca_names, X509_NAME_free);
3365 OPENSSL_free(sc->s3.tmp.ciphers_raw);
3366 OPENSSL_clear_free(sc->s3.tmp.pms, sc->s3.tmp.pmslen);
3367 OPENSSL_free(sc->s3.tmp.peer_sigalgs);
3368 OPENSSL_free(sc->s3.tmp.peer_cert_sigalgs);
3369 ssl3_free_digest_list(sc);
3370 OPENSSL_free(sc->s3.alpn_selected);
3371 OPENSSL_free(sc->s3.alpn_proposed);
3372
3373#ifndef OPENSSL_NO_SRP
3374 ssl_srp_ctx_free_intern(sc);
3375#endif
3376 memset(&sc->s3, 0, sizeof(sc->s3));
3377}
3378
3379int ssl3_clear(SSL *s)
3380{
3381 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s);
3382
3383 if (sc == NULL)
3384 return 0;
3385
3386 ssl3_cleanup_key_block(sc);
3387 OPENSSL_free(sc->s3.tmp.ctype);
3388 sk_X509_NAME_pop_free(sc->s3.tmp.peer_ca_names, X509_NAME_free);
3389 OPENSSL_free(sc->s3.tmp.ciphers_raw);
3390 OPENSSL_clear_free(sc->s3.tmp.pms, sc->s3.tmp.pmslen);
3391 OPENSSL_free(sc->s3.tmp.peer_sigalgs);
3392 OPENSSL_free(sc->s3.tmp.peer_cert_sigalgs);
3393
3394 EVP_PKEY_free(sc->s3.tmp.pkey);
3395 EVP_PKEY_free(sc->s3.peer_tmp);
3396
3397 ssl3_free_digest_list(sc);
3398
3399 OPENSSL_free(sc->s3.alpn_selected);
3400 OPENSSL_free(sc->s3.alpn_proposed);
3401
3402 /* NULL/zero-out everything in the s3 struct */
3403 memset(&sc->s3, 0, sizeof(sc->s3));
3404
3405 if (!ssl_free_wbio_buffer(sc))
3406 return 0;
3407
3408 sc->version = SSL3_VERSION;
3409
3410#if !defined(OPENSSL_NO_NEXTPROTONEG)
3411 OPENSSL_free(sc->ext.npn);
3412 sc->ext.npn = NULL;
3413 sc->ext.npn_len = 0;
3414#endif
3415
3416 return 1;
3417}
3418
3419#ifndef OPENSSL_NO_SRP
3420static char *srp_password_from_info_cb(SSL *s, void *arg)
3421{
3422 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s);
3423
3424 if (sc == NULL)
3425 return NULL;
3426
3427 return OPENSSL_strdup(sc->srp_ctx.info);
3428}
3429#endif
3430
3431static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len);
3432
3433long ssl3_ctrl(SSL *s, int cmd, long larg, void *parg)
3434{
3435 int ret = 0;
3436 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s);
3437
3438 if (sc == NULL)
3439 return ret;
3440
3441 switch (cmd) {
3442 case SSL_CTRL_GET_CLIENT_CERT_REQUEST:
3443 break;
3444 case SSL_CTRL_GET_NUM_RENEGOTIATIONS:
3445 ret = sc->s3.num_renegotiations;
3446 break;
3447 case SSL_CTRL_CLEAR_NUM_RENEGOTIATIONS:
3448 ret = sc->s3.num_renegotiations;
3449 sc->s3.num_renegotiations = 0;
3450 break;
3451 case SSL_CTRL_GET_TOTAL_RENEGOTIATIONS:
3452 ret = sc->s3.total_renegotiations;
3453 break;
3454 case SSL_CTRL_GET_FLAGS:
3455 ret = (int)(sc->s3.flags);
3456 break;
3457#if !defined(OPENSSL_NO_DEPRECATED_3_0)
3458 case SSL_CTRL_SET_TMP_DH:
3459 {
3460 EVP_PKEY *pkdh = NULL;
3461 if (parg == NULL) {
3462 ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER);
3463 return 0;
3464 }
3465 pkdh = ssl_dh_to_pkey(parg);
3466 if (pkdh == NULL) {
3467 ERR_raise(ERR_LIB_SSL, ERR_R_DH_LIB);
3468 return 0;
3469 }
3470 if (!SSL_set0_tmp_dh_pkey(s, pkdh)) {
3471 EVP_PKEY_free(pkdh);
3472 return 0;
3473 }
3474 return 1;
3475 }
3476 break;
3477 case SSL_CTRL_SET_TMP_DH_CB:
3478 {
3479 ERR_raise(ERR_LIB_SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
3480 return ret;
3481 }
3482#endif
3483 case SSL_CTRL_SET_DH_AUTO:
3484 sc->cert->dh_tmp_auto = larg;
3485 return 1;
3486#if !defined(OPENSSL_NO_DEPRECATED_3_0)
3487 case SSL_CTRL_SET_TMP_ECDH:
3488 {
3489 if (parg == NULL) {
3490 ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER);
3491 return 0;
3492 }
3493 return ssl_set_tmp_ecdh_groups(&sc->ext.supportedgroups,
3494 &sc->ext.supportedgroups_len,
3495 parg);
3496 }
3497#endif /* !OPENSSL_NO_DEPRECATED_3_0 */
3498 case SSL_CTRL_SET_TLSEXT_HOSTNAME:
3499 /*
3500 * This API is only used for a client to set what SNI it will request
3501 * from the server, but we currently allow it to be used on servers
3502 * as well, which is a programming error. Currently we just clear
3503 * the field in SSL_do_handshake() for server SSLs, but when we can
3504 * make ABI-breaking changes, we may want to make use of this API
3505 * an error on server SSLs.
3506 */
3507 if (larg == TLSEXT_NAMETYPE_host_name) {
3508 size_t len;
3509
3510 OPENSSL_free(sc->ext.hostname);
3511 sc->ext.hostname = NULL;
3512
3513 ret = 1;
3514 if (parg == NULL)
3515 break;
3516 len = strlen((char *)parg);
3517 if (len == 0 || len > TLSEXT_MAXLEN_host_name) {
3518 ERR_raise(ERR_LIB_SSL, SSL_R_SSL3_EXT_INVALID_SERVERNAME);
3519 return 0;
3520 }
3521 if ((sc->ext.hostname = OPENSSL_strdup((char *)parg)) == NULL) {
3522 ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR);
3523 return 0;
3524 }
3525 } else {
3526 ERR_raise(ERR_LIB_SSL, SSL_R_SSL3_EXT_INVALID_SERVERNAME_TYPE);
3527 return 0;
3528 }
3529 break;
3530 case SSL_CTRL_SET_TLSEXT_DEBUG_ARG:
3531 sc->ext.debug_arg = parg;
3532 ret = 1;
3533 break;
3534
3535 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE:
3536 ret = sc->ext.status_type;
3537 break;
3538
3539 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE:
3540 sc->ext.status_type = larg;
3541 ret = 1;
3542 break;
3543
3544 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS:
3545 *(STACK_OF(X509_EXTENSION) **)parg = sc->ext.ocsp.exts;
3546 ret = 1;
3547 break;
3548
3549 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS:
3550 sc->ext.ocsp.exts = parg;
3551 ret = 1;
3552 break;
3553
3554 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_IDS:
3555 *(STACK_OF(OCSP_RESPID) **)parg = sc->ext.ocsp.ids;
3556 ret = 1;
3557 break;
3558
3559 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_IDS:
3560 sc->ext.ocsp.ids = parg;
3561 ret = 1;
3562 break;
3563
3564 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP:
3565 *(unsigned char **)parg = sc->ext.ocsp.resp;
3566 if (sc->ext.ocsp.resp_len == 0
3567 || sc->ext.ocsp.resp_len > LONG_MAX)
3568 return -1;
3569 return (long)sc->ext.ocsp.resp_len;
3570
3571 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP:
3572 OPENSSL_free(sc->ext.ocsp.resp);
3573 sc->ext.ocsp.resp = parg;
3574 sc->ext.ocsp.resp_len = larg;
3575 ret = 1;
3576 break;
3577
3578 case SSL_CTRL_CHAIN:
3579 if (larg)
3580 return ssl_cert_set1_chain(sc, NULL, (STACK_OF(X509) *)parg);
3581 else
3582 return ssl_cert_set0_chain(sc, NULL, (STACK_OF(X509) *)parg);
3583
3584 case SSL_CTRL_CHAIN_CERT:
3585 if (larg)
3586 return ssl_cert_add1_chain_cert(sc, NULL, (X509 *)parg);
3587 else
3588 return ssl_cert_add0_chain_cert(sc, NULL, (X509 *)parg);
3589
3590 case SSL_CTRL_GET_CHAIN_CERTS:
3591 *(STACK_OF(X509) **)parg = sc->cert->key->chain;
3592 ret = 1;
3593 break;
3594
3595 case SSL_CTRL_SELECT_CURRENT_CERT:
3596 return ssl_cert_select_current(sc->cert, (X509 *)parg);
3597
3598 case SSL_CTRL_SET_CURRENT_CERT:
3599 if (larg == SSL_CERT_SET_SERVER) {
3600 const SSL_CIPHER *cipher;
3601 if (!sc->server)
3602 return 0;
3603 cipher = sc->s3.tmp.new_cipher;
3604 if (cipher == NULL)
3605 return 0;
3606 /*
3607 * No certificate for unauthenticated ciphersuites or using SRP
3608 * authentication
3609 */
3610 if (cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP))
3611 return 2;
3612 if (sc->s3.tmp.cert == NULL)
3613 return 0;
3614 sc->cert->key = sc->s3.tmp.cert;
3615 return 1;
3616 }
3617 return ssl_cert_set_current(sc->cert, larg);
3618
3619 case SSL_CTRL_GET_GROUPS:
3620 {
3621 uint16_t *clist;
3622 size_t clistlen;
3623
3624 if (!sc->session)
3625 return 0;
3626 clist = sc->ext.peer_supportedgroups;
3627 clistlen = sc->ext.peer_supportedgroups_len;
3628 if (parg) {
3629 size_t i;
3630 int *cptr = parg;
3631
3632 for (i = 0; i < clistlen; i++) {
3633 const TLS_GROUP_INFO *cinf
3634 = tls1_group_id_lookup(s->ctx, clist[i]);
3635
3636 if (cinf != NULL)
3637 cptr[i] = tls1_group_id2nid(cinf->group_id, 1);
3638 else
3639 cptr[i] = TLSEXT_nid_unknown | clist[i];
3640 }
3641 }
3642 return (int)clistlen;
3643 }
3644
3645 case SSL_CTRL_SET_GROUPS:
3646 return tls1_set_groups(&sc->ext.supportedgroups,
3647 &sc->ext.supportedgroups_len, parg, larg);
3648
3649 case SSL_CTRL_SET_GROUPS_LIST:
3650 return tls1_set_groups_list(s->ctx, &sc->ext.supportedgroups,
3651 &sc->ext.supportedgroups_len, parg);
3652
3653 case SSL_CTRL_GET_SHARED_GROUP:
3654 {
3655 uint16_t id = tls1_shared_group(sc, larg);
3656
3657 if (larg != -1)
3658 return tls1_group_id2nid(id, 1);
3659 return id;
3660 }
3661 case SSL_CTRL_GET_NEGOTIATED_GROUP:
3662 {
3663 unsigned int id;
3664
3665 if (SSL_CONNECTION_IS_TLS13(sc) && sc->s3.did_kex)
3666 id = sc->s3.group_id;
3667 else
3668 id = sc->session->kex_group;
3669 ret = tls1_group_id2nid(id, 1);
3670 break;
3671 }
3672 case SSL_CTRL_SET_SIGALGS:
3673 return tls1_set_sigalgs(sc->cert, parg, larg, 0);
3674
3675 case SSL_CTRL_SET_SIGALGS_LIST:
3676 return tls1_set_sigalgs_list(sc->cert, parg, 0);
3677
3678 case SSL_CTRL_SET_CLIENT_SIGALGS:
3679 return tls1_set_sigalgs(sc->cert, parg, larg, 1);
3680
3681 case SSL_CTRL_SET_CLIENT_SIGALGS_LIST:
3682 return tls1_set_sigalgs_list(sc->cert, parg, 1);
3683
3684 case SSL_CTRL_GET_CLIENT_CERT_TYPES:
3685 {
3686 const unsigned char **pctype = parg;
3687 if (sc->server || !sc->s3.tmp.cert_req)
3688 return 0;
3689 if (pctype)
3690 *pctype = sc->s3.tmp.ctype;
3691 return sc->s3.tmp.ctype_len;
3692 }
3693
3694 case SSL_CTRL_SET_CLIENT_CERT_TYPES:
3695 if (!sc->server)
3696 return 0;
3697 return ssl3_set_req_cert_type(sc->cert, parg, larg);
3698
3699 case SSL_CTRL_BUILD_CERT_CHAIN:
3700 return ssl_build_cert_chain(sc, NULL, larg);
3701
3702 case SSL_CTRL_SET_VERIFY_CERT_STORE:
3703 return ssl_cert_set_cert_store(sc->cert, parg, 0, larg);
3704
3705 case SSL_CTRL_SET_CHAIN_CERT_STORE:
3706 return ssl_cert_set_cert_store(sc->cert, parg, 1, larg);
3707
3708 case SSL_CTRL_GET_VERIFY_CERT_STORE:
3709 return ssl_cert_get_cert_store(sc->cert, parg, 0);
3710
3711 case SSL_CTRL_GET_CHAIN_CERT_STORE:
3712 return ssl_cert_get_cert_store(sc->cert, parg, 1);
3713
3714 case SSL_CTRL_GET_PEER_SIGNATURE_NID:
3715 if (sc->s3.tmp.peer_sigalg == NULL)
3716 return 0;
3717 *(int *)parg = sc->s3.tmp.peer_sigalg->hash;
3718 return 1;
3719
3720 case SSL_CTRL_GET_SIGNATURE_NID:
3721 if (sc->s3.tmp.sigalg == NULL)
3722 return 0;
3723 *(int *)parg = sc->s3.tmp.sigalg->hash;
3724 return 1;
3725
3726 case SSL_CTRL_GET_PEER_TMP_KEY:
3727 if (sc->session == NULL || sc->s3.peer_tmp == NULL) {
3728 return 0;
3729 } else {
3730 EVP_PKEY_up_ref(sc->s3.peer_tmp);
3731 *(EVP_PKEY **)parg = sc->s3.peer_tmp;
3732 return 1;
3733 }
3734
3735 case SSL_CTRL_GET_TMP_KEY:
3736 if (sc->session == NULL || sc->s3.tmp.pkey == NULL) {
3737 return 0;
3738 } else {
3739 EVP_PKEY_up_ref(sc->s3.tmp.pkey);
3740 *(EVP_PKEY **)parg = sc->s3.tmp.pkey;
3741 return 1;
3742 }
3743
3744 case SSL_CTRL_GET_EC_POINT_FORMATS:
3745 {
3746 const unsigned char **pformat = parg;
3747
3748 if (sc->ext.peer_ecpointformats == NULL)
3749 return 0;
3750 *pformat = sc->ext.peer_ecpointformats;
3751 return (int)sc->ext.peer_ecpointformats_len;
3752 }
3753
3754 case SSL_CTRL_GET_IANA_GROUPS:
3755 {
3756 if (parg != NULL) {
3757 *(uint16_t **)parg = (uint16_t *)sc->ext.peer_supportedgroups;
3758 }
3759 return (int)sc->ext.peer_supportedgroups_len;
3760 }
3761
3762 default:
3763 break;
3764 }
3765 return ret;
3766}
3767
3768long ssl3_callback_ctrl(SSL *s, int cmd, void (*fp) (void))
3769{
3770 int ret = 0;
3771 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s);
3772
3773 if (sc == NULL)
3774 return ret;
3775
3776 switch (cmd) {
3777#if !defined(OPENSSL_NO_DEPRECATED_3_0)
3778 case SSL_CTRL_SET_TMP_DH_CB:
3779 sc->cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))fp;
3780 ret = 1;
3781 break;
3782#endif
3783 case SSL_CTRL_SET_TLSEXT_DEBUG_CB:
3784 sc->ext.debug_cb = (void (*)(SSL *, int, int,
3785 const unsigned char *, int, void *))fp;
3786 ret = 1;
3787 break;
3788
3789 case SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB:
3790 sc->not_resumable_session_cb = (int (*)(SSL *, int))fp;
3791 ret = 1;
3792 break;
3793 default:
3794 break;
3795 }
3796 return ret;
3797}
3798
3799long ssl3_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg)
3800{
3801 switch (cmd) {
3802#if !defined(OPENSSL_NO_DEPRECATED_3_0)
3803 case SSL_CTRL_SET_TMP_DH:
3804 {
3805 EVP_PKEY *pkdh = NULL;
3806 if (parg == NULL) {
3807 ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER);
3808 return 0;
3809 }
3810 pkdh = ssl_dh_to_pkey(parg);
3811 if (pkdh == NULL) {
3812 ERR_raise(ERR_LIB_SSL, ERR_R_DH_LIB);
3813 return 0;
3814 }
3815 if (!SSL_CTX_set0_tmp_dh_pkey(ctx, pkdh)) {
3816 EVP_PKEY_free(pkdh);
3817 return 0;
3818 }
3819 return 1;
3820 }
3821 case SSL_CTRL_SET_TMP_DH_CB:
3822 {
3823 ERR_raise(ERR_LIB_SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
3824 return 0;
3825 }
3826#endif
3827 case SSL_CTRL_SET_DH_AUTO:
3828 ctx->cert->dh_tmp_auto = larg;
3829 return 1;
3830#if !defined(OPENSSL_NO_DEPRECATED_3_0)
3831 case SSL_CTRL_SET_TMP_ECDH:
3832 {
3833 if (parg == NULL) {
3834 ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER);
3835 return 0;
3836 }
3837 return ssl_set_tmp_ecdh_groups(&ctx->ext.supportedgroups,
3838 &ctx->ext.supportedgroups_len,
3839 parg);
3840 }
3841#endif /* !OPENSSL_NO_DEPRECATED_3_0 */
3842 case SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG:
3843 ctx->ext.servername_arg = parg;
3844 break;
3845 case SSL_CTRL_SET_TLSEXT_TICKET_KEYS:
3846 case SSL_CTRL_GET_TLSEXT_TICKET_KEYS:
3847 {
3848 unsigned char *keys = parg;
3849 long tick_keylen = (sizeof(ctx->ext.tick_key_name) +
3850 sizeof(ctx->ext.secure->tick_hmac_key) +
3851 sizeof(ctx->ext.secure->tick_aes_key));
3852 if (keys == NULL)
3853 return tick_keylen;
3854 if (larg != tick_keylen) {
3855 ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_TICKET_KEYS_LENGTH);
3856 return 0;
3857 }
3858 if (cmd == SSL_CTRL_SET_TLSEXT_TICKET_KEYS) {
3859 memcpy(ctx->ext.tick_key_name, keys,
3860 sizeof(ctx->ext.tick_key_name));
3861 memcpy(ctx->ext.secure->tick_hmac_key,
3862 keys + sizeof(ctx->ext.tick_key_name),
3863 sizeof(ctx->ext.secure->tick_hmac_key));
3864 memcpy(ctx->ext.secure->tick_aes_key,
3865 keys + sizeof(ctx->ext.tick_key_name) +
3866 sizeof(ctx->ext.secure->tick_hmac_key),
3867 sizeof(ctx->ext.secure->tick_aes_key));
3868 } else {
3869 memcpy(keys, ctx->ext.tick_key_name,
3870 sizeof(ctx->ext.tick_key_name));
3871 memcpy(keys + sizeof(ctx->ext.tick_key_name),
3872 ctx->ext.secure->tick_hmac_key,
3873 sizeof(ctx->ext.secure->tick_hmac_key));
3874 memcpy(keys + sizeof(ctx->ext.tick_key_name) +
3875 sizeof(ctx->ext.secure->tick_hmac_key),
3876 ctx->ext.secure->tick_aes_key,
3877 sizeof(ctx->ext.secure->tick_aes_key));
3878 }
3879 return 1;
3880 }
3881
3882 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE:
3883 return ctx->ext.status_type;
3884
3885 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE:
3886 ctx->ext.status_type = larg;
3887 break;
3888
3889 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB_ARG:
3890 ctx->ext.status_arg = parg;
3891 return 1;
3892
3893 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_CB_ARG:
3894 *(void**)parg = ctx->ext.status_arg;
3895 break;
3896
3897 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_CB:
3898 *(int (**)(SSL*, void*))parg = ctx->ext.status_cb;
3899 break;
3900
3901#ifndef OPENSSL_NO_SRP
3902 case SSL_CTRL_SET_TLS_EXT_SRP_USERNAME:
3903 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
3904 OPENSSL_free(ctx->srp_ctx.login);
3905 ctx->srp_ctx.login = NULL;
3906 if (parg == NULL)
3907 break;
3908 if (strlen((const char *)parg) > 255 || strlen((const char *)parg) < 1) {
3909 ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_SRP_USERNAME);
3910 return 0;
3911 }
3912 if ((ctx->srp_ctx.login = OPENSSL_strdup((char *)parg)) == NULL) {
3913 ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR);
3914 return 0;
3915 }
3916 break;
3917 case SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD:
3918 ctx->srp_ctx.SRP_give_srp_client_pwd_callback =
3919 srp_password_from_info_cb;
3920 if (ctx->srp_ctx.info != NULL)
3921 OPENSSL_free(ctx->srp_ctx.info);
3922 if ((ctx->srp_ctx.info = OPENSSL_strdup((char *)parg)) == NULL) {
3923 ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR);
3924 return 0;
3925 }
3926 break;
3927 case SSL_CTRL_SET_SRP_ARG:
3928 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
3929 ctx->srp_ctx.SRP_cb_arg = parg;
3930 break;
3931
3932 case SSL_CTRL_SET_TLS_EXT_SRP_STRENGTH:
3933 ctx->srp_ctx.strength = larg;
3934 break;
3935#endif
3936
3937 case SSL_CTRL_SET_GROUPS:
3938 return tls1_set_groups(&ctx->ext.supportedgroups,
3939 &ctx->ext.supportedgroups_len,
3940 parg, larg);
3941
3942 case SSL_CTRL_SET_GROUPS_LIST:
3943 return tls1_set_groups_list(ctx, &ctx->ext.supportedgroups,
3944 &ctx->ext.supportedgroups_len,
3945 parg);
3946
3947 case SSL_CTRL_SET_SIGALGS:
3948 return tls1_set_sigalgs(ctx->cert, parg, larg, 0);
3949
3950 case SSL_CTRL_SET_SIGALGS_LIST:
3951 return tls1_set_sigalgs_list(ctx->cert, parg, 0);
3952
3953 case SSL_CTRL_SET_CLIENT_SIGALGS:
3954 return tls1_set_sigalgs(ctx->cert, parg, larg, 1);
3955
3956 case SSL_CTRL_SET_CLIENT_SIGALGS_LIST:
3957 return tls1_set_sigalgs_list(ctx->cert, parg, 1);
3958
3959 case SSL_CTRL_SET_CLIENT_CERT_TYPES:
3960 return ssl3_set_req_cert_type(ctx->cert, parg, larg);
3961
3962 case SSL_CTRL_BUILD_CERT_CHAIN:
3963 return ssl_build_cert_chain(NULL, ctx, larg);
3964
3965 case SSL_CTRL_SET_VERIFY_CERT_STORE:
3966 return ssl_cert_set_cert_store(ctx->cert, parg, 0, larg);
3967
3968 case SSL_CTRL_SET_CHAIN_CERT_STORE:
3969 return ssl_cert_set_cert_store(ctx->cert, parg, 1, larg);
3970
3971 case SSL_CTRL_GET_VERIFY_CERT_STORE:
3972 return ssl_cert_get_cert_store(ctx->cert, parg, 0);
3973
3974 case SSL_CTRL_GET_CHAIN_CERT_STORE:
3975 return ssl_cert_get_cert_store(ctx->cert, parg, 1);
3976
3977 /* A Thawte special :-) */
3978 case SSL_CTRL_EXTRA_CHAIN_CERT:
3979 if (ctx->extra_certs == NULL) {
3980 if ((ctx->extra_certs = sk_X509_new_null()) == NULL) {
3981 ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB);
3982 return 0;
3983 }
3984 }
3985 if (!sk_X509_push(ctx->extra_certs, (X509 *)parg)) {
3986 ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB);
3987 return 0;
3988 }
3989 break;
3990
3991 case SSL_CTRL_GET_EXTRA_CHAIN_CERTS:
3992 if (ctx->extra_certs == NULL && larg == 0)
3993 *(STACK_OF(X509) **)parg = ctx->cert->key->chain;
3994 else
3995 *(STACK_OF(X509) **)parg = ctx->extra_certs;
3996 break;
3997
3998 case SSL_CTRL_CLEAR_EXTRA_CHAIN_CERTS:
3999 OSSL_STACK_OF_X509_free(ctx->extra_certs);
4000 ctx->extra_certs = NULL;
4001 break;
4002
4003 case SSL_CTRL_CHAIN:
4004 if (larg)
4005 return ssl_cert_set1_chain(NULL, ctx, (STACK_OF(X509) *)parg);
4006 else
4007 return ssl_cert_set0_chain(NULL, ctx, (STACK_OF(X509) *)parg);
4008
4009 case SSL_CTRL_CHAIN_CERT:
4010 if (larg)
4011 return ssl_cert_add1_chain_cert(NULL, ctx, (X509 *)parg);
4012 else
4013 return ssl_cert_add0_chain_cert(NULL, ctx, (X509 *)parg);
4014
4015 case SSL_CTRL_GET_CHAIN_CERTS:
4016 *(STACK_OF(X509) **)parg = ctx->cert->key->chain;
4017 break;
4018
4019 case SSL_CTRL_SELECT_CURRENT_CERT:
4020 return ssl_cert_select_current(ctx->cert, (X509 *)parg);
4021
4022 case SSL_CTRL_SET_CURRENT_CERT:
4023 return ssl_cert_set_current(ctx->cert, larg);
4024
4025 default:
4026 return 0;
4027 }
4028 return 1;
4029}
4030
4031long ssl3_ctx_callback_ctrl(SSL_CTX *ctx, int cmd, void (*fp) (void))
4032{
4033 switch (cmd) {
4034#if !defined(OPENSSL_NO_DEPRECATED_3_0)
4035 case SSL_CTRL_SET_TMP_DH_CB:
4036 {
4037 ctx->cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))fp;
4038 }
4039 break;
4040#endif
4041 case SSL_CTRL_SET_TLSEXT_SERVERNAME_CB:
4042 ctx->ext.servername_cb = (int (*)(SSL *, int *, void *))fp;
4043 break;
4044
4045 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB:
4046 ctx->ext.status_cb = (int (*)(SSL *, void *))fp;
4047 break;
4048
4049# ifndef OPENSSL_NO_DEPRECATED_3_0
4050 case SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB:
4051 ctx->ext.ticket_key_cb = (int (*)(SSL *, unsigned char *,
4052 unsigned char *,
4053 EVP_CIPHER_CTX *,
4054 HMAC_CTX *, int))fp;
4055 break;
4056#endif
4057
4058#ifndef OPENSSL_NO_SRP
4059 case SSL_CTRL_SET_SRP_VERIFY_PARAM_CB:
4060 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
4061 ctx->srp_ctx.SRP_verify_param_callback = (int (*)(SSL *, void *))fp;
4062 break;
4063 case SSL_CTRL_SET_TLS_EXT_SRP_USERNAME_CB:
4064 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
4065 ctx->srp_ctx.TLS_ext_srp_username_callback =
4066 (int (*)(SSL *, int *, void *))fp;
4067 break;
4068 case SSL_CTRL_SET_SRP_GIVE_CLIENT_PWD_CB:
4069 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
4070 ctx->srp_ctx.SRP_give_srp_client_pwd_callback =
4071 (char *(*)(SSL *, void *))fp;
4072 break;
4073#endif
4074 case SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB:
4075 {
4076 ctx->not_resumable_session_cb = (int (*)(SSL *, int))fp;
4077 }
4078 break;
4079 default:
4080 return 0;
4081 }
4082 return 1;
4083}
4084
4085int SSL_CTX_set_tlsext_ticket_key_evp_cb
4086 (SSL_CTX *ctx, int (*fp)(SSL *, unsigned char *, unsigned char *,
4087 EVP_CIPHER_CTX *, EVP_MAC_CTX *, int))
4088{
4089 ctx->ext.ticket_key_evp_cb = fp;
4090 return 1;
4091}
4092
4093const SSL_CIPHER *ssl3_get_cipher_by_id(uint32_t id)
4094{
4095 SSL_CIPHER c;
4096 const SSL_CIPHER *cp;
4097
4098 c.id = id;
4099 cp = OBJ_bsearch_ssl_cipher_id(&c, tls13_ciphers, TLS13_NUM_CIPHERS);
4100 if (cp != NULL)
4101 return cp;
4102 cp = OBJ_bsearch_ssl_cipher_id(&c, ssl3_ciphers, SSL3_NUM_CIPHERS);
4103 if (cp != NULL)
4104 return cp;
4105 return OBJ_bsearch_ssl_cipher_id(&c, ssl3_scsvs, SSL3_NUM_SCSVS);
4106}
4107
4108const SSL_CIPHER *ssl3_get_cipher_by_std_name(const char *stdname)
4109{
4110 SSL_CIPHER *tbl;
4111 SSL_CIPHER *alltabs[] = {tls13_ciphers, ssl3_ciphers, ssl3_scsvs};
4112 size_t i, j, tblsize[] = {TLS13_NUM_CIPHERS, SSL3_NUM_CIPHERS,
4113 SSL3_NUM_SCSVS};
4114
4115 /* this is not efficient, necessary to optimize this? */
4116 for (j = 0; j < OSSL_NELEM(alltabs); j++) {
4117 for (i = 0, tbl = alltabs[j]; i < tblsize[j]; i++, tbl++) {
4118 if (tbl->stdname == NULL)
4119 continue;
4120 if (strcmp(stdname, tbl->stdname) == 0) {
4121 return tbl;
4122 }
4123 }
4124 }
4125 return NULL;
4126}
4127
4128/*
4129 * This function needs to check if the ciphers required are actually
4130 * available
4131 */
4132const SSL_CIPHER *ssl3_get_cipher_by_char(const unsigned char *p)
4133{
4134 return ssl3_get_cipher_by_id(SSL3_CK_CIPHERSUITE_FLAG
4135 | ((uint32_t)p[0] << 8L)
4136 | (uint32_t)p[1]);
4137}
4138
4139int ssl3_put_cipher_by_char(const SSL_CIPHER *c, WPACKET *pkt, size_t *len)
4140{
4141 if ((c->id & 0xff000000) != SSL3_CK_CIPHERSUITE_FLAG) {
4142 *len = 0;
4143 return 1;
4144 }
4145
4146 if (!WPACKET_put_bytes_u16(pkt, c->id & 0xffff))
4147 return 0;
4148
4149 *len = 2;
4150 return 1;
4151}
4152
4153/*
4154 * ssl3_choose_cipher - choose a cipher from those offered by the client
4155 * @s: SSL connection
4156 * @clnt: ciphers offered by the client
4157 * @srvr: ciphers enabled on the server?
4158 *
4159 * Returns the selected cipher or NULL when no common ciphers.
4160 */
4161const SSL_CIPHER *ssl3_choose_cipher(SSL_CONNECTION *s, STACK_OF(SSL_CIPHER) *clnt,
4162 STACK_OF(SSL_CIPHER) *srvr)
4163{
4164 const SSL_CIPHER *c, *ret = NULL;
4165 STACK_OF(SSL_CIPHER) *prio, *allow;
4166 int i, ii, ok, prefer_sha256 = 0;
4167 unsigned long alg_k = 0, alg_a = 0, mask_k = 0, mask_a = 0;
4168 STACK_OF(SSL_CIPHER) *prio_chacha = NULL;
4169
4170 /* Let's see which ciphers we can support */
4171
4172 /*
4173 * Do not set the compare functions, because this may lead to a
4174 * reordering by "id". We want to keep the original ordering. We may pay
4175 * a price in performance during sk_SSL_CIPHER_find(), but would have to
4176 * pay with the price of sk_SSL_CIPHER_dup().
4177 */
4178
4179 OSSL_TRACE_BEGIN(TLS_CIPHER) {
4180 BIO_printf(trc_out, "Server has %d from %p:\n",
4181 sk_SSL_CIPHER_num(srvr), (void *)srvr);
4182 for (i = 0; i < sk_SSL_CIPHER_num(srvr); ++i) {
4183 c = sk_SSL_CIPHER_value(srvr, i);
4184 BIO_printf(trc_out, "%p:%s\n", (void *)c, c->name);
4185 }
4186 BIO_printf(trc_out, "Client sent %d from %p:\n",
4187 sk_SSL_CIPHER_num(clnt), (void *)clnt);
4188 for (i = 0; i < sk_SSL_CIPHER_num(clnt); ++i) {
4189 c = sk_SSL_CIPHER_value(clnt, i);
4190 BIO_printf(trc_out, "%p:%s\n", (void *)c, c->name);
4191 }
4192 } OSSL_TRACE_END(TLS_CIPHER);
4193
4194 /* SUITE-B takes precedence over server preference and ChaCha priortiy */
4195 if (tls1_suiteb(s)) {
4196 prio = srvr;
4197 allow = clnt;
4198 } else if (s->options & SSL_OP_CIPHER_SERVER_PREFERENCE) {
4199 prio = srvr;
4200 allow = clnt;
4201
4202 /* If ChaCha20 is at the top of the client preference list,
4203 and there are ChaCha20 ciphers in the server list, then
4204 temporarily prioritize all ChaCha20 ciphers in the servers list. */
4205 if (s->options & SSL_OP_PRIORITIZE_CHACHA && sk_SSL_CIPHER_num(clnt) > 0) {
4206 c = sk_SSL_CIPHER_value(clnt, 0);
4207 if (c->algorithm_enc == SSL_CHACHA20POLY1305) {
4208 /* ChaCha20 is client preferred, check server... */
4209 int num = sk_SSL_CIPHER_num(srvr);
4210 int found = 0;
4211 for (i = 0; i < num; i++) {
4212 c = sk_SSL_CIPHER_value(srvr, i);
4213 if (c->algorithm_enc == SSL_CHACHA20POLY1305) {
4214 found = 1;
4215 break;
4216 }
4217 }
4218 if (found) {
4219 prio_chacha = sk_SSL_CIPHER_new_reserve(NULL, num);
4220 /* if reserve fails, then there's likely a memory issue */
4221 if (prio_chacha != NULL) {
4222 /* Put all ChaCha20 at the top, starting with the one we just found */
4223 sk_SSL_CIPHER_push(prio_chacha, c);
4224 for (i++; i < num; i++) {
4225 c = sk_SSL_CIPHER_value(srvr, i);
4226 if (c->algorithm_enc == SSL_CHACHA20POLY1305)
4227 sk_SSL_CIPHER_push(prio_chacha, c);
4228 }
4229 /* Pull in the rest */
4230 for (i = 0; i < num; i++) {
4231 c = sk_SSL_CIPHER_value(srvr, i);
4232 if (c->algorithm_enc != SSL_CHACHA20POLY1305)
4233 sk_SSL_CIPHER_push(prio_chacha, c);
4234 }
4235 prio = prio_chacha;
4236 }
4237 }
4238 }
4239 }
4240 } else {
4241 prio = clnt;
4242 allow = srvr;
4243 }
4244
4245 if (SSL_CONNECTION_IS_TLS13(s)) {
4246#ifndef OPENSSL_NO_PSK
4247 int j;
4248
4249 /*
4250 * If we allow "old" style PSK callbacks, and we have no certificate (so
4251 * we're not going to succeed without a PSK anyway), and we're in
4252 * TLSv1.3 then the default hash for a PSK is SHA-256 (as per the
4253 * TLSv1.3 spec). Therefore we should prioritise ciphersuites using
4254 * that.
4255 */
4256 if (s->psk_server_callback != NULL) {
4257 for (j = 0; j < SSL_PKEY_NUM && !ssl_has_cert(s, j); j++);
4258 if (j == SSL_PKEY_NUM) {
4259 /* There are no certificates */
4260 prefer_sha256 = 1;
4261 }
4262 }
4263#endif
4264 } else {
4265 tls1_set_cert_validity(s);
4266 ssl_set_masks(s);
4267 }
4268
4269 for (i = 0; i < sk_SSL_CIPHER_num(prio); i++) {
4270 c = sk_SSL_CIPHER_value(prio, i);
4271
4272 /* Skip ciphers not supported by the protocol version */
4273 if (!SSL_CONNECTION_IS_DTLS(s) &&
4274 ((s->version < c->min_tls) || (s->version > c->max_tls)))
4275 continue;
4276 if (SSL_CONNECTION_IS_DTLS(s) &&
4277 (DTLS_VERSION_LT(s->version, c->min_dtls) ||
4278 DTLS_VERSION_GT(s->version, c->max_dtls)))
4279 continue;
4280
4281 /*
4282 * Since TLS 1.3 ciphersuites can be used with any auth or
4283 * key exchange scheme skip tests.
4284 */
4285 if (!SSL_CONNECTION_IS_TLS13(s)) {
4286 mask_k = s->s3.tmp.mask_k;
4287 mask_a = s->s3.tmp.mask_a;
4288#ifndef OPENSSL_NO_SRP
4289 if (s->srp_ctx.srp_Mask & SSL_kSRP) {
4290 mask_k |= SSL_kSRP;
4291 mask_a |= SSL_aSRP;
4292 }
4293#endif
4294
4295 alg_k = c->algorithm_mkey;
4296 alg_a = c->algorithm_auth;
4297
4298#ifndef OPENSSL_NO_PSK
4299 /* with PSK there must be server callback set */
4300 if ((alg_k & SSL_PSK) && s->psk_server_callback == NULL)
4301 continue;
4302#endif /* OPENSSL_NO_PSK */
4303
4304 ok = (alg_k & mask_k) && (alg_a & mask_a);
4305 OSSL_TRACE7(TLS_CIPHER,
4306 "%d:[%08lX:%08lX:%08lX:%08lX]%p:%s\n",
4307 ok, alg_k, alg_a, mask_k, mask_a, (void *)c, c->name);
4308
4309 /*
4310 * if we are considering an ECC cipher suite that uses an ephemeral
4311 * EC key check it
4312 */
4313 if (alg_k & SSL_kECDHE)
4314 ok = ok && tls1_check_ec_tmp_key(s, c->id);
4315
4316 if (!ok)
4317 continue;
4318 }
4319 ii = sk_SSL_CIPHER_find(allow, c);
4320 if (ii >= 0) {
4321 /* Check security callback permits this cipher */
4322 if (!ssl_security(s, SSL_SECOP_CIPHER_SHARED,
4323 c->strength_bits, 0, (void *)c))
4324 continue;
4325
4326 if ((alg_k & SSL_kECDHE) && (alg_a & SSL_aECDSA)
4327 && s->s3.is_probably_safari) {
4328 if (!ret)
4329 ret = sk_SSL_CIPHER_value(allow, ii);
4330 continue;
4331 }
4332
4333 if (prefer_sha256) {
4334 const SSL_CIPHER *tmp = sk_SSL_CIPHER_value(allow, ii);
4335 const EVP_MD *md = ssl_md(SSL_CONNECTION_GET_CTX(s),
4336 tmp->algorithm2);
4337
4338 if (md != NULL
4339 && EVP_MD_is_a(md, OSSL_DIGEST_NAME_SHA2_256)) {
4340 ret = tmp;
4341 break;
4342 }
4343 if (ret == NULL)
4344 ret = tmp;
4345 continue;
4346 }
4347 ret = sk_SSL_CIPHER_value(allow, ii);
4348 break;
4349 }
4350 }
4351
4352 sk_SSL_CIPHER_free(prio_chacha);
4353
4354 return ret;
4355}
4356
4357int ssl3_get_req_cert_type(SSL_CONNECTION *s, WPACKET *pkt)
4358{
4359 uint32_t alg_k, alg_a = 0;
4360
4361 /* If we have custom certificate types set, use them */
4362 if (s->cert->ctype)
4363 return WPACKET_memcpy(pkt, s->cert->ctype, s->cert->ctype_len);
4364 /* Get mask of algorithms disabled by signature list */
4365 ssl_set_sig_mask(&alg_a, s, SSL_SECOP_SIGALG_MASK);
4366
4367 alg_k = s->s3.tmp.new_cipher->algorithm_mkey;
4368
4369#ifndef OPENSSL_NO_GOST
4370 if (s->version >= TLS1_VERSION && (alg_k & SSL_kGOST))
4371 if (!WPACKET_put_bytes_u8(pkt, TLS_CT_GOST01_SIGN)
4372 || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_IANA_SIGN)
4373 || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_IANA_512_SIGN)
4374 || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_LEGACY_SIGN)
4375 || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_LEGACY_512_SIGN))
4376 return 0;
4377
4378 if (s->version >= TLS1_2_VERSION && (alg_k & SSL_kGOST18))
4379 if (!WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_IANA_SIGN)
4380 || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_IANA_512_SIGN))
4381 return 0;
4382#endif
4383
4384 if ((s->version == SSL3_VERSION) && (alg_k & SSL_kDHE)) {
4385 if (!WPACKET_put_bytes_u8(pkt, SSL3_CT_RSA_EPHEMERAL_DH))
4386 return 0;
4387 if (!(alg_a & SSL_aDSS)
4388 && !WPACKET_put_bytes_u8(pkt, SSL3_CT_DSS_EPHEMERAL_DH))
4389 return 0;
4390 }
4391 if (!(alg_a & SSL_aRSA) && !WPACKET_put_bytes_u8(pkt, SSL3_CT_RSA_SIGN))
4392 return 0;
4393 if (!(alg_a & SSL_aDSS) && !WPACKET_put_bytes_u8(pkt, SSL3_CT_DSS_SIGN))
4394 return 0;
4395
4396 /*
4397 * ECDSA certs can be used with RSA cipher suites too so we don't
4398 * need to check for SSL_kECDH or SSL_kECDHE
4399 */
4400 if (s->version >= TLS1_VERSION
4401 && !(alg_a & SSL_aECDSA)
4402 && !WPACKET_put_bytes_u8(pkt, TLS_CT_ECDSA_SIGN))
4403 return 0;
4404
4405 return 1;
4406}
4407
4408static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len)
4409{
4410 OPENSSL_free(c->ctype);
4411 c->ctype = NULL;
4412 c->ctype_len = 0;
4413 if (p == NULL || len == 0)
4414 return 1;
4415 if (len > 0xff)
4416 return 0;
4417 c->ctype = OPENSSL_memdup(p, len);
4418 if (c->ctype == NULL)
4419 return 0;
4420 c->ctype_len = len;
4421 return 1;
4422}
4423
4424int ssl3_shutdown(SSL *s)
4425{
4426 int ret;
4427 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s);
4428
4429 if (sc == NULL)
4430 return 0;
4431
4432 /*
4433 * Don't do anything much if we have not done the handshake or we don't
4434 * want to send messages :-)
4435 */
4436 if (sc->quiet_shutdown || SSL_in_before(s)) {
4437 sc->shutdown = (SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN);
4438 return 1;
4439 }
4440
4441 if (!(sc->shutdown & SSL_SENT_SHUTDOWN)) {
4442 sc->shutdown |= SSL_SENT_SHUTDOWN;
4443 ssl3_send_alert(sc, SSL3_AL_WARNING, SSL_AD_CLOSE_NOTIFY);
4444 /*
4445 * our shutdown alert has been sent now, and if it still needs to be
4446 * written, s->s3.alert_dispatch will be true
4447 */
4448 if (sc->s3.alert_dispatch)
4449 return -1; /* return WANT_WRITE */
4450 } else if (sc->s3.alert_dispatch) {
4451 /* resend it if not sent */
4452 ret = s->method->ssl_dispatch_alert(s);
4453 if (ret == -1) {
4454 /*
4455 * we only get to return -1 here the 2nd/Nth invocation, we must
4456 * have already signalled return 0 upon a previous invocation,
4457 * return WANT_WRITE
4458 */
4459 return ret;
4460 }
4461 } else if (!(sc->shutdown & SSL_RECEIVED_SHUTDOWN)) {
4462 size_t readbytes;
4463 /*
4464 * If we are waiting for a close from our peer, we are closed
4465 */
4466 s->method->ssl_read_bytes(s, 0, NULL, NULL, 0, 0, &readbytes);
4467 if (!(sc->shutdown & SSL_RECEIVED_SHUTDOWN)) {
4468 return -1; /* return WANT_READ */
4469 }
4470 }
4471
4472 if ((sc->shutdown == (SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN)) &&
4473 !sc->s3.alert_dispatch)
4474 return 1;
4475 else
4476 return 0;
4477}
4478
4479int ssl3_write(SSL *s, const void *buf, size_t len, size_t *written)
4480{
4481 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s);
4482
4483 if (sc == NULL)
4484 return 0;
4485
4486 clear_sys_error();
4487 if (sc->s3.renegotiate)
4488 ssl3_renegotiate_check(s, 0);
4489
4490 return s->method->ssl_write_bytes(s, SSL3_RT_APPLICATION_DATA, buf, len,
4491 written);
4492}
4493
4494static int ssl3_read_internal(SSL *s, void *buf, size_t len, int peek,
4495 size_t *readbytes)
4496{
4497 int ret;
4498 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s);
4499
4500 if (sc == NULL)
4501 return 0;
4502
4503 clear_sys_error();
4504 if (sc->s3.renegotiate)
4505 ssl3_renegotiate_check(s, 0);
4506 sc->s3.in_read_app_data = 1;
4507 ret =
4508 s->method->ssl_read_bytes(s, SSL3_RT_APPLICATION_DATA, NULL, buf, len,
4509 peek, readbytes);
4510 if ((ret == -1) && (sc->s3.in_read_app_data == 2)) {
4511 /*
4512 * ssl3_read_bytes decided to call s->handshake_func, which called
4513 * ssl3_read_bytes to read handshake data. However, ssl3_read_bytes
4514 * actually found application data and thinks that application data
4515 * makes sense here; so disable handshake processing and try to read
4516 * application data again.
4517 */
4518 ossl_statem_set_in_handshake(sc, 1);
4519 ret =
4520 s->method->ssl_read_bytes(s, SSL3_RT_APPLICATION_DATA, NULL, buf,
4521 len, peek, readbytes);
4522 ossl_statem_set_in_handshake(sc, 0);
4523 } else
4524 sc->s3.in_read_app_data = 0;
4525
4526 return ret;
4527}
4528
4529int ssl3_read(SSL *s, void *buf, size_t len, size_t *readbytes)
4530{
4531 return ssl3_read_internal(s, buf, len, 0, readbytes);
4532}
4533
4534int ssl3_peek(SSL *s, void *buf, size_t len, size_t *readbytes)
4535{
4536 return ssl3_read_internal(s, buf, len, 1, readbytes);
4537}
4538
4539int ssl3_renegotiate(SSL *s)
4540{
4541 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s);
4542
4543 if (sc == NULL)
4544 return 0;
4545
4546 if (sc->handshake_func == NULL)
4547 return 1;
4548
4549 sc->s3.renegotiate = 1;
4550 return 1;
4551}
4552
4553/*
4554 * Check if we are waiting to do a renegotiation and if so whether now is a
4555 * good time to do it. If |initok| is true then we are being called from inside
4556 * the state machine so ignore the result of SSL_in_init(s). Otherwise we
4557 * should not do a renegotiation if SSL_in_init(s) is true. Returns 1 if we
4558 * should do a renegotiation now and sets up the state machine for it. Otherwise
4559 * returns 0.
4560 */
4561int ssl3_renegotiate_check(SSL *s, int initok)
4562{
4563 int ret = 0;
4564 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s);
4565
4566 if (sc == NULL)
4567 return 0;
4568
4569 if (sc->s3.renegotiate) {
4570 if (!RECORD_LAYER_read_pending(&sc->rlayer)
4571 && !RECORD_LAYER_write_pending(&sc->rlayer)
4572 && (initok || !SSL_in_init(s))) {
4573 /*
4574 * if we are the server, and we have sent a 'RENEGOTIATE'
4575 * message, we need to set the state machine into the renegotiate
4576 * state.
4577 */
4578 ossl_statem_set_renegotiate(sc);
4579 sc->s3.renegotiate = 0;
4580 sc->s3.num_renegotiations++;
4581 sc->s3.total_renegotiations++;
4582 ret = 1;
4583 }
4584 }
4585 return ret;
4586}
4587
4588/*
4589 * If we are using default SHA1+MD5 algorithms switch to new SHA256 PRF and
4590 * handshake macs if required.
4591 *
4592 * If PSK and using SHA384 for TLS < 1.2 switch to default.
4593 */
4594long ssl_get_algorithm2(SSL_CONNECTION *s)
4595{
4596 long alg2;
4597 SSL *ssl = SSL_CONNECTION_GET_SSL(s);
4598
4599 if (s->s3.tmp.new_cipher == NULL)
4600 return -1;
4601 alg2 = s->s3.tmp.new_cipher->algorithm2;
4602 if (ssl->method->ssl3_enc->enc_flags & SSL_ENC_FLAG_SHA256_PRF) {
4603 if (alg2 == (SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF))
4604 return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;
4605 } else if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) {
4606 if (alg2 == (SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384))
4607 return SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF;
4608 }
4609 return alg2;
4610}
4611
4612/*
4613 * Fill a ClientRandom or ServerRandom field of length len. Returns <= 0 on
4614 * failure, 1 on success.
4615 */
4616int ssl_fill_hello_random(SSL_CONNECTION *s, int server,
4617 unsigned char *result, size_t len,
4618 DOWNGRADE dgrd)
4619{
4620 int send_time = 0, ret;
4621
4622 if (len < 4)
4623 return 0;
4624 if (server)
4625 send_time = (s->mode & SSL_MODE_SEND_SERVERHELLO_TIME) != 0;
4626 else
4627 send_time = (s->mode & SSL_MODE_SEND_CLIENTHELLO_TIME) != 0;
4628 if (send_time) {
4629 unsigned long Time = (unsigned long)time(NULL);
4630 unsigned char *p = result;
4631
4632 l2n(Time, p);
4633 ret = RAND_bytes_ex(SSL_CONNECTION_GET_CTX(s)->libctx, p, len - 4, 0);
4634 } else {
4635 ret = RAND_bytes_ex(SSL_CONNECTION_GET_CTX(s)->libctx, result, len, 0);
4636 }
4637
4638 if (ret > 0) {
4639 if (!ossl_assert(sizeof(tls11downgrade) < len)
4640 || !ossl_assert(sizeof(tls12downgrade) < len))
4641 return 0;
4642 if (dgrd == DOWNGRADE_TO_1_2)
4643 memcpy(result + len - sizeof(tls12downgrade), tls12downgrade,
4644 sizeof(tls12downgrade));
4645 else if (dgrd == DOWNGRADE_TO_1_1)
4646 memcpy(result + len - sizeof(tls11downgrade), tls11downgrade,
4647 sizeof(tls11downgrade));
4648 }
4649
4650 return ret;
4651}
4652
4653int ssl_generate_master_secret(SSL_CONNECTION *s, unsigned char *pms,
4654 size_t pmslen, int free_pms)
4655{
4656 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey;
4657 int ret = 0;
4658 SSL *ssl = SSL_CONNECTION_GET_SSL(s);
4659
4660 if (alg_k & SSL_PSK) {
4661#ifndef OPENSSL_NO_PSK
4662 unsigned char *pskpms, *t;
4663 size_t psklen = s->s3.tmp.psklen;
4664 size_t pskpmslen;
4665
4666 /* create PSK premaster_secret */
4667
4668 /* For plain PSK "other_secret" is psklen zeroes */
4669 if (alg_k & SSL_kPSK)
4670 pmslen = psklen;
4671
4672 pskpmslen = 4 + pmslen + psklen;
4673 pskpms = OPENSSL_malloc(pskpmslen);
4674 if (pskpms == NULL)
4675 goto err;
4676 t = pskpms;
4677 s2n(pmslen, t);
4678 if (alg_k & SSL_kPSK)
4679 memset(t, 0, pmslen);
4680 else
4681 memcpy(t, pms, pmslen);
4682 t += pmslen;
4683 s2n(psklen, t);
4684 memcpy(t, s->s3.tmp.psk, psklen);
4685
4686 OPENSSL_clear_free(s->s3.tmp.psk, psklen);
4687 s->s3.tmp.psk = NULL;
4688 s->s3.tmp.psklen = 0;
4689 if (!ssl->method->ssl3_enc->generate_master_secret(s,
4690 s->session->master_key, pskpms, pskpmslen,
4691 &s->session->master_key_length)) {
4692 OPENSSL_clear_free(pskpms, pskpmslen);
4693 /* SSLfatal() already called */
4694 goto err;
4695 }
4696 OPENSSL_clear_free(pskpms, pskpmslen);
4697#else
4698 /* Should never happen */
4699 goto err;
4700#endif
4701 } else {
4702 if (!ssl->method->ssl3_enc->generate_master_secret(s,
4703 s->session->master_key, pms, pmslen,
4704 &s->session->master_key_length)) {
4705 /* SSLfatal() already called */
4706 goto err;
4707 }
4708 }
4709
4710 ret = 1;
4711 err:
4712 if (pms) {
4713 if (free_pms)
4714 OPENSSL_clear_free(pms, pmslen);
4715 else
4716 OPENSSL_cleanse(pms, pmslen);
4717 }
4718 if (s->server == 0) {
4719 s->s3.tmp.pms = NULL;
4720 s->s3.tmp.pmslen = 0;
4721 }
4722 return ret;
4723}
4724
4725/* Generate a private key from parameters */
4726EVP_PKEY *ssl_generate_pkey(SSL_CONNECTION *s, EVP_PKEY *pm)
4727{
4728 EVP_PKEY_CTX *pctx = NULL;
4729 EVP_PKEY *pkey = NULL;
4730 SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);
4731
4732 if (pm == NULL)
4733 return NULL;
4734 pctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, pm, sctx->propq);
4735 if (pctx == NULL)
4736 goto err;
4737 if (EVP_PKEY_keygen_init(pctx) <= 0)
4738 goto err;
4739 if (EVP_PKEY_keygen(pctx, &pkey) <= 0) {
4740 EVP_PKEY_free(pkey);
4741 pkey = NULL;
4742 }
4743
4744 err:
4745 EVP_PKEY_CTX_free(pctx);
4746 return pkey;
4747}
4748
4749/* Generate a private key from a group ID */
4750EVP_PKEY *ssl_generate_pkey_group(SSL_CONNECTION *s, uint16_t id)
4751{
4752 SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);
4753 const TLS_GROUP_INFO *ginf = tls1_group_id_lookup(sctx, id);
4754 EVP_PKEY_CTX *pctx = NULL;
4755 EVP_PKEY *pkey = NULL;
4756
4757 if (ginf == NULL) {
4758 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4759 goto err;
4760 }
4761
4762 pctx = EVP_PKEY_CTX_new_from_name(sctx->libctx, ginf->algorithm,
4763 sctx->propq);
4764
4765 if (pctx == NULL) {
4766 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);
4767 goto err;
4768 }
4769 if (EVP_PKEY_keygen_init(pctx) <= 0) {
4770 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);
4771 goto err;
4772 }
4773 if (EVP_PKEY_CTX_set_group_name(pctx, ginf->realname) <= 0) {
4774 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);
4775 goto err;
4776 }
4777 if (EVP_PKEY_keygen(pctx, &pkey) <= 0) {
4778 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);
4779 EVP_PKEY_free(pkey);
4780 pkey = NULL;
4781 }
4782
4783 err:
4784 EVP_PKEY_CTX_free(pctx);
4785 return pkey;
4786}
4787
4788/*
4789 * Generate parameters from a group ID
4790 */
4791EVP_PKEY *ssl_generate_param_group(SSL_CONNECTION *s, uint16_t id)
4792{
4793 SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);
4794 EVP_PKEY_CTX *pctx = NULL;
4795 EVP_PKEY *pkey = NULL;
4796 const TLS_GROUP_INFO *ginf = tls1_group_id_lookup(sctx, id);
4797
4798 if (ginf == NULL)
4799 goto err;
4800
4801 pctx = EVP_PKEY_CTX_new_from_name(sctx->libctx, ginf->algorithm,
4802 sctx->propq);
4803
4804 if (pctx == NULL)
4805 goto err;
4806 if (EVP_PKEY_paramgen_init(pctx) <= 0)
4807 goto err;
4808 if (EVP_PKEY_CTX_set_group_name(pctx, ginf->realname) <= 0) {
4809 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);
4810 goto err;
4811 }
4812 if (EVP_PKEY_paramgen(pctx, &pkey) <= 0) {
4813 EVP_PKEY_free(pkey);
4814 pkey = NULL;
4815 }
4816
4817 err:
4818 EVP_PKEY_CTX_free(pctx);
4819 return pkey;
4820}
4821
4822/* Generate secrets from pms */
4823int ssl_gensecret(SSL_CONNECTION *s, unsigned char *pms, size_t pmslen)
4824{
4825 int rv = 0;
4826
4827 /* SSLfatal() called as appropriate in the below functions */
4828 if (SSL_CONNECTION_IS_TLS13(s)) {
4829 /*
4830 * If we are resuming then we already generated the early secret
4831 * when we created the ClientHello, so don't recreate it.
4832 */
4833 if (!s->hit)
4834 rv = tls13_generate_secret(s, ssl_handshake_md(s), NULL, NULL,
4835 0,
4836 (unsigned char *)&s->early_secret);
4837 else
4838 rv = 1;
4839
4840 rv = rv && tls13_generate_handshake_secret(s, pms, pmslen);
4841 } else {
4842 rv = ssl_generate_master_secret(s, pms, pmslen, 0);
4843 }
4844
4845 return rv;
4846}
4847
4848/* Derive secrets for ECDH/DH */
4849int ssl_derive(SSL_CONNECTION *s, EVP_PKEY *privkey, EVP_PKEY *pubkey, int gensecret)
4850{
4851 int rv = 0;
4852 unsigned char *pms = NULL;
4853 size_t pmslen = 0;
4854 EVP_PKEY_CTX *pctx;
4855 SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);
4856
4857 if (privkey == NULL || pubkey == NULL) {
4858 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4859 return 0;
4860 }
4861
4862 pctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, privkey, sctx->propq);
4863
4864 if (EVP_PKEY_derive_init(pctx) <= 0
4865 || EVP_PKEY_derive_set_peer(pctx, pubkey) <= 0
4866 || EVP_PKEY_derive(pctx, NULL, &pmslen) <= 0) {
4867 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4868 goto err;
4869 }
4870
4871 if (SSL_CONNECTION_IS_TLS13(s) && EVP_PKEY_is_a(privkey, "DH"))
4872 EVP_PKEY_CTX_set_dh_pad(pctx, 1);
4873
4874 pms = OPENSSL_malloc(pmslen);
4875 if (pms == NULL) {
4876 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB);
4877 goto err;
4878 }
4879
4880 if (EVP_PKEY_derive(pctx, pms, &pmslen) <= 0) {
4881 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4882 goto err;
4883 }
4884
4885 if (gensecret) {
4886 /* SSLfatal() called as appropriate in the below functions */
4887 rv = ssl_gensecret(s, pms, pmslen);
4888 } else {
4889 /* Save premaster secret */
4890 s->s3.tmp.pms = pms;
4891 s->s3.tmp.pmslen = pmslen;
4892 pms = NULL;
4893 rv = 1;
4894 }
4895
4896 err:
4897 OPENSSL_clear_free(pms, pmslen);
4898 EVP_PKEY_CTX_free(pctx);
4899 return rv;
4900}
4901
4902/* Decapsulate secrets for KEM */
4903int ssl_decapsulate(SSL_CONNECTION *s, EVP_PKEY *privkey,
4904 const unsigned char *ct, size_t ctlen,
4905 int gensecret)
4906{
4907 int rv = 0;
4908 unsigned char *pms = NULL;
4909 size_t pmslen = 0;
4910 EVP_PKEY_CTX *pctx;
4911 SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);
4912
4913 if (privkey == NULL) {
4914 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4915 return 0;
4916 }
4917
4918 pctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, privkey, sctx->propq);
4919
4920 if (EVP_PKEY_decapsulate_init(pctx, NULL) <= 0
4921 || EVP_PKEY_decapsulate(pctx, NULL, &pmslen, ct, ctlen) <= 0) {
4922 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4923 goto err;
4924 }
4925
4926 pms = OPENSSL_malloc(pmslen);
4927 if (pms == NULL) {
4928 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB);
4929 goto err;
4930 }
4931
4932 if (EVP_PKEY_decapsulate(pctx, pms, &pmslen, ct, ctlen) <= 0) {
4933 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4934 goto err;
4935 }
4936
4937 if (gensecret) {
4938 /* SSLfatal() called as appropriate in the below functions */
4939 rv = ssl_gensecret(s, pms, pmslen);
4940 } else {
4941 /* Save premaster secret */
4942 s->s3.tmp.pms = pms;
4943 s->s3.tmp.pmslen = pmslen;
4944 pms = NULL;
4945 rv = 1;
4946 }
4947
4948 err:
4949 OPENSSL_clear_free(pms, pmslen);
4950 EVP_PKEY_CTX_free(pctx);
4951 return rv;
4952}
4953
4954int ssl_encapsulate(SSL_CONNECTION *s, EVP_PKEY *pubkey,
4955 unsigned char **ctp, size_t *ctlenp,
4956 int gensecret)
4957{
4958 int rv = 0;
4959 unsigned char *pms = NULL, *ct = NULL;
4960 size_t pmslen = 0, ctlen = 0;
4961 EVP_PKEY_CTX *pctx;
4962 SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);
4963
4964 if (pubkey == NULL) {
4965 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4966 return 0;
4967 }
4968
4969 pctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, pubkey, sctx->propq);
4970
4971 if (EVP_PKEY_encapsulate_init(pctx, NULL) <= 0
4972 || EVP_PKEY_encapsulate(pctx, NULL, &ctlen, NULL, &pmslen) <= 0
4973 || pmslen == 0 || ctlen == 0) {
4974 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4975 goto err;
4976 }
4977
4978 pms = OPENSSL_malloc(pmslen);
4979 ct = OPENSSL_malloc(ctlen);
4980 if (pms == NULL || ct == NULL) {
4981 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB);
4982 goto err;
4983 }
4984
4985 if (EVP_PKEY_encapsulate(pctx, ct, &ctlen, pms, &pmslen) <= 0) {
4986 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4987 goto err;
4988 }
4989
4990 if (gensecret) {
4991 /* SSLfatal() called as appropriate in the below functions */
4992 rv = ssl_gensecret(s, pms, pmslen);
4993 } else {
4994 /* Save premaster secret */
4995 s->s3.tmp.pms = pms;
4996 s->s3.tmp.pmslen = pmslen;
4997 pms = NULL;
4998 rv = 1;
4999 }
5000
5001 if (rv > 0) {
5002 /* Pass ownership of ct to caller */
5003 *ctp = ct;
5004 *ctlenp = ctlen;
5005 ct = NULL;
5006 }
5007
5008 err:
5009 OPENSSL_clear_free(pms, pmslen);
5010 OPENSSL_free(ct);
5011 EVP_PKEY_CTX_free(pctx);
5012 return rv;
5013}
5014
5015const char *SSL_group_to_name(SSL *s, int nid) {
5016 int group_id = 0;
5017 const TLS_GROUP_INFO *cinf = NULL;
5018
5019 /* first convert to real group id for internal and external IDs */
5020 if (nid & TLSEXT_nid_unknown)
5021 group_id = nid & 0xFFFF;
5022 else
5023 group_id = tls1_nid2group_id(nid);
5024
5025 /* then look up */
5026 cinf = tls1_group_id_lookup(s->ctx, group_id);
5027
5028 if (cinf != NULL)
5029 return cinf->tlsname;
5030 return NULL;
5031}