]> git.ipfire.org Git - thirdparty/openssl.git/blob - ssl/s3_lib.c
190f42cd0e01b2e850799991e5becadb28ebb53a
[thirdparty/openssl.git] / ssl / s3_lib.c
1 /*
2 * Copyright 1995-2022 The OpenSSL Project Authors. All Rights Reserved.
3 * Copyright (c) 2002, Oracle and/or its affiliates. All rights reserved
4 * Copyright 2005 Nokia. All rights reserved.
5 *
6 * Licensed under the Apache License 2.0 (the "License"). You may not use
7 * this file except in compliance with the License. You can obtain a copy
8 * in the file LICENSE in the source distribution or at
9 * https://www.openssl.org/source/license.html
10 */
11
12 #include <stdio.h>
13 #include <openssl/objects.h>
14 #include "internal/nelem.h"
15 #include "ssl_local.h"
16 #include <openssl/md5.h>
17 #include <openssl/dh.h>
18 #include <openssl/rand.h>
19 #include <openssl/trace.h>
20 #include <openssl/x509v3.h>
21 #include <openssl/core_names.h>
22 #include "internal/cryptlib.h"
23
24 #define TLS13_NUM_CIPHERS OSSL_NELEM(tls13_ciphers)
25 #define SSL3_NUM_CIPHERS OSSL_NELEM(ssl3_ciphers)
26 #define SSL3_NUM_SCSVS OSSL_NELEM(ssl3_scsvs)
27
28 /* TLSv1.3 downgrade protection sentinel values */
29 const unsigned char tls11downgrade[] = {
30 0x44, 0x4f, 0x57, 0x4e, 0x47, 0x52, 0x44, 0x00
31 };
32 const unsigned char tls12downgrade[] = {
33 0x44, 0x4f, 0x57, 0x4e, 0x47, 0x52, 0x44, 0x01
34 };
35
36 /* The list of available TLSv1.3 ciphers */
37 static SSL_CIPHER tls13_ciphers[] = {
38 {
39 1,
40 TLS1_3_RFC_AES_128_GCM_SHA256,
41 TLS1_3_RFC_AES_128_GCM_SHA256,
42 TLS1_3_CK_AES_128_GCM_SHA256,
43 SSL_kANY,
44 SSL_aANY,
45 SSL_AES128GCM,
46 SSL_AEAD,
47 TLS1_3_VERSION, TLS1_3_VERSION,
48 0, 0,
49 SSL_HIGH,
50 SSL_HANDSHAKE_MAC_SHA256,
51 128,
52 128,
53 }, {
54 1,
55 TLS1_3_RFC_AES_256_GCM_SHA384,
56 TLS1_3_RFC_AES_256_GCM_SHA384,
57 TLS1_3_CK_AES_256_GCM_SHA384,
58 SSL_kANY,
59 SSL_aANY,
60 SSL_AES256GCM,
61 SSL_AEAD,
62 TLS1_3_VERSION, TLS1_3_VERSION,
63 0, 0,
64 SSL_HIGH,
65 SSL_HANDSHAKE_MAC_SHA384,
66 256,
67 256,
68 },
69 {
70 1,
71 TLS1_3_RFC_CHACHA20_POLY1305_SHA256,
72 TLS1_3_RFC_CHACHA20_POLY1305_SHA256,
73 TLS1_3_CK_CHACHA20_POLY1305_SHA256,
74 SSL_kANY,
75 SSL_aANY,
76 SSL_CHACHA20POLY1305,
77 SSL_AEAD,
78 TLS1_3_VERSION, TLS1_3_VERSION,
79 0, 0,
80 SSL_HIGH,
81 SSL_HANDSHAKE_MAC_SHA256,
82 256,
83 256,
84 },
85 {
86 1,
87 TLS1_3_RFC_AES_128_CCM_SHA256,
88 TLS1_3_RFC_AES_128_CCM_SHA256,
89 TLS1_3_CK_AES_128_CCM_SHA256,
90 SSL_kANY,
91 SSL_aANY,
92 SSL_AES128CCM,
93 SSL_AEAD,
94 TLS1_3_VERSION, TLS1_3_VERSION,
95 0, 0,
96 SSL_NOT_DEFAULT | SSL_HIGH,
97 SSL_HANDSHAKE_MAC_SHA256,
98 128,
99 128,
100 }, {
101 1,
102 TLS1_3_RFC_AES_128_CCM_8_SHA256,
103 TLS1_3_RFC_AES_128_CCM_8_SHA256,
104 TLS1_3_CK_AES_128_CCM_8_SHA256,
105 SSL_kANY,
106 SSL_aANY,
107 SSL_AES128CCM8,
108 SSL_AEAD,
109 TLS1_3_VERSION, TLS1_3_VERSION,
110 0, 0,
111 SSL_NOT_DEFAULT | SSL_MEDIUM,
112 SSL_HANDSHAKE_MAC_SHA256,
113 64, /* CCM8 uses a short tag, so we have a low security strength */
114 128,
115 }
116 };
117
118 /*
119 * The list of available ciphers, mostly organized into the following
120 * groups:
121 * Always there
122 * EC
123 * PSK
124 * SRP (within that: RSA EC PSK)
125 * Cipher families: Chacha/poly, Camellia, Gost, IDEA, SEED
126 * Weak ciphers
127 */
128 static SSL_CIPHER ssl3_ciphers[] = {
129 {
130 1,
131 SSL3_TXT_RSA_NULL_MD5,
132 SSL3_RFC_RSA_NULL_MD5,
133 SSL3_CK_RSA_NULL_MD5,
134 SSL_kRSA,
135 SSL_aRSA,
136 SSL_eNULL,
137 SSL_MD5,
138 SSL3_VERSION, TLS1_2_VERSION,
139 DTLS1_BAD_VER, DTLS1_2_VERSION,
140 SSL_STRONG_NONE,
141 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
142 0,
143 0,
144 },
145 {
146 1,
147 SSL3_TXT_RSA_NULL_SHA,
148 SSL3_RFC_RSA_NULL_SHA,
149 SSL3_CK_RSA_NULL_SHA,
150 SSL_kRSA,
151 SSL_aRSA,
152 SSL_eNULL,
153 SSL_SHA1,
154 SSL3_VERSION, TLS1_2_VERSION,
155 DTLS1_BAD_VER, DTLS1_2_VERSION,
156 SSL_STRONG_NONE | SSL_FIPS,
157 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
158 0,
159 0,
160 },
161 #ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
162 {
163 1,
164 SSL3_TXT_RSA_DES_192_CBC3_SHA,
165 SSL3_RFC_RSA_DES_192_CBC3_SHA,
166 SSL3_CK_RSA_DES_192_CBC3_SHA,
167 SSL_kRSA,
168 SSL_aRSA,
169 SSL_3DES,
170 SSL_SHA1,
171 SSL3_VERSION, TLS1_2_VERSION,
172 DTLS1_BAD_VER, DTLS1_2_VERSION,
173 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
174 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
175 112,
176 168,
177 },
178 {
179 1,
180 SSL3_TXT_DHE_DSS_DES_192_CBC3_SHA,
181 SSL3_RFC_DHE_DSS_DES_192_CBC3_SHA,
182 SSL3_CK_DHE_DSS_DES_192_CBC3_SHA,
183 SSL_kDHE,
184 SSL_aDSS,
185 SSL_3DES,
186 SSL_SHA1,
187 SSL3_VERSION, TLS1_2_VERSION,
188 DTLS1_BAD_VER, DTLS1_2_VERSION,
189 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
190 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
191 112,
192 168,
193 },
194 {
195 1,
196 SSL3_TXT_DHE_RSA_DES_192_CBC3_SHA,
197 SSL3_RFC_DHE_RSA_DES_192_CBC3_SHA,
198 SSL3_CK_DHE_RSA_DES_192_CBC3_SHA,
199 SSL_kDHE,
200 SSL_aRSA,
201 SSL_3DES,
202 SSL_SHA1,
203 SSL3_VERSION, TLS1_2_VERSION,
204 DTLS1_BAD_VER, DTLS1_2_VERSION,
205 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
206 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
207 112,
208 168,
209 },
210 {
211 1,
212 SSL3_TXT_ADH_DES_192_CBC_SHA,
213 SSL3_RFC_ADH_DES_192_CBC_SHA,
214 SSL3_CK_ADH_DES_192_CBC_SHA,
215 SSL_kDHE,
216 SSL_aNULL,
217 SSL_3DES,
218 SSL_SHA1,
219 SSL3_VERSION, TLS1_2_VERSION,
220 DTLS1_BAD_VER, DTLS1_2_VERSION,
221 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
222 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
223 112,
224 168,
225 },
226 #endif
227 {
228 1,
229 TLS1_TXT_RSA_WITH_AES_128_SHA,
230 TLS1_RFC_RSA_WITH_AES_128_SHA,
231 TLS1_CK_RSA_WITH_AES_128_SHA,
232 SSL_kRSA,
233 SSL_aRSA,
234 SSL_AES128,
235 SSL_SHA1,
236 SSL3_VERSION, TLS1_2_VERSION,
237 DTLS1_BAD_VER, DTLS1_2_VERSION,
238 SSL_HIGH | SSL_FIPS,
239 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
240 128,
241 128,
242 },
243 {
244 1,
245 TLS1_TXT_DHE_DSS_WITH_AES_128_SHA,
246 TLS1_RFC_DHE_DSS_WITH_AES_128_SHA,
247 TLS1_CK_DHE_DSS_WITH_AES_128_SHA,
248 SSL_kDHE,
249 SSL_aDSS,
250 SSL_AES128,
251 SSL_SHA1,
252 SSL3_VERSION, TLS1_2_VERSION,
253 DTLS1_BAD_VER, DTLS1_2_VERSION,
254 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
255 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
256 128,
257 128,
258 },
259 {
260 1,
261 TLS1_TXT_DHE_RSA_WITH_AES_128_SHA,
262 TLS1_RFC_DHE_RSA_WITH_AES_128_SHA,
263 TLS1_CK_DHE_RSA_WITH_AES_128_SHA,
264 SSL_kDHE,
265 SSL_aRSA,
266 SSL_AES128,
267 SSL_SHA1,
268 SSL3_VERSION, TLS1_2_VERSION,
269 DTLS1_BAD_VER, DTLS1_2_VERSION,
270 SSL_HIGH | SSL_FIPS,
271 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
272 128,
273 128,
274 },
275 {
276 1,
277 TLS1_TXT_ADH_WITH_AES_128_SHA,
278 TLS1_RFC_ADH_WITH_AES_128_SHA,
279 TLS1_CK_ADH_WITH_AES_128_SHA,
280 SSL_kDHE,
281 SSL_aNULL,
282 SSL_AES128,
283 SSL_SHA1,
284 SSL3_VERSION, TLS1_2_VERSION,
285 DTLS1_BAD_VER, DTLS1_2_VERSION,
286 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
287 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
288 128,
289 128,
290 },
291 {
292 1,
293 TLS1_TXT_RSA_WITH_AES_256_SHA,
294 TLS1_RFC_RSA_WITH_AES_256_SHA,
295 TLS1_CK_RSA_WITH_AES_256_SHA,
296 SSL_kRSA,
297 SSL_aRSA,
298 SSL_AES256,
299 SSL_SHA1,
300 SSL3_VERSION, TLS1_2_VERSION,
301 DTLS1_BAD_VER, DTLS1_2_VERSION,
302 SSL_HIGH | SSL_FIPS,
303 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
304 256,
305 256,
306 },
307 {
308 1,
309 TLS1_TXT_DHE_DSS_WITH_AES_256_SHA,
310 TLS1_RFC_DHE_DSS_WITH_AES_256_SHA,
311 TLS1_CK_DHE_DSS_WITH_AES_256_SHA,
312 SSL_kDHE,
313 SSL_aDSS,
314 SSL_AES256,
315 SSL_SHA1,
316 SSL3_VERSION, TLS1_2_VERSION,
317 DTLS1_BAD_VER, DTLS1_2_VERSION,
318 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
319 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
320 256,
321 256,
322 },
323 {
324 1,
325 TLS1_TXT_DHE_RSA_WITH_AES_256_SHA,
326 TLS1_RFC_DHE_RSA_WITH_AES_256_SHA,
327 TLS1_CK_DHE_RSA_WITH_AES_256_SHA,
328 SSL_kDHE,
329 SSL_aRSA,
330 SSL_AES256,
331 SSL_SHA1,
332 SSL3_VERSION, TLS1_2_VERSION,
333 DTLS1_BAD_VER, DTLS1_2_VERSION,
334 SSL_HIGH | SSL_FIPS,
335 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
336 256,
337 256,
338 },
339 {
340 1,
341 TLS1_TXT_ADH_WITH_AES_256_SHA,
342 TLS1_RFC_ADH_WITH_AES_256_SHA,
343 TLS1_CK_ADH_WITH_AES_256_SHA,
344 SSL_kDHE,
345 SSL_aNULL,
346 SSL_AES256,
347 SSL_SHA1,
348 SSL3_VERSION, TLS1_2_VERSION,
349 DTLS1_BAD_VER, DTLS1_2_VERSION,
350 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
351 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
352 256,
353 256,
354 },
355 {
356 1,
357 TLS1_TXT_RSA_WITH_NULL_SHA256,
358 TLS1_RFC_RSA_WITH_NULL_SHA256,
359 TLS1_CK_RSA_WITH_NULL_SHA256,
360 SSL_kRSA,
361 SSL_aRSA,
362 SSL_eNULL,
363 SSL_SHA256,
364 TLS1_2_VERSION, TLS1_2_VERSION,
365 DTLS1_2_VERSION, DTLS1_2_VERSION,
366 SSL_STRONG_NONE | SSL_FIPS,
367 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
368 0,
369 0,
370 },
371 {
372 1,
373 TLS1_TXT_RSA_WITH_AES_128_SHA256,
374 TLS1_RFC_RSA_WITH_AES_128_SHA256,
375 TLS1_CK_RSA_WITH_AES_128_SHA256,
376 SSL_kRSA,
377 SSL_aRSA,
378 SSL_AES128,
379 SSL_SHA256,
380 TLS1_2_VERSION, TLS1_2_VERSION,
381 DTLS1_2_VERSION, DTLS1_2_VERSION,
382 SSL_HIGH | SSL_FIPS,
383 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
384 128,
385 128,
386 },
387 {
388 1,
389 TLS1_TXT_RSA_WITH_AES_256_SHA256,
390 TLS1_RFC_RSA_WITH_AES_256_SHA256,
391 TLS1_CK_RSA_WITH_AES_256_SHA256,
392 SSL_kRSA,
393 SSL_aRSA,
394 SSL_AES256,
395 SSL_SHA256,
396 TLS1_2_VERSION, TLS1_2_VERSION,
397 DTLS1_2_VERSION, DTLS1_2_VERSION,
398 SSL_HIGH | SSL_FIPS,
399 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
400 256,
401 256,
402 },
403 {
404 1,
405 TLS1_TXT_DHE_DSS_WITH_AES_128_SHA256,
406 TLS1_RFC_DHE_DSS_WITH_AES_128_SHA256,
407 TLS1_CK_DHE_DSS_WITH_AES_128_SHA256,
408 SSL_kDHE,
409 SSL_aDSS,
410 SSL_AES128,
411 SSL_SHA256,
412 TLS1_2_VERSION, TLS1_2_VERSION,
413 DTLS1_2_VERSION, DTLS1_2_VERSION,
414 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
415 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
416 128,
417 128,
418 },
419 {
420 1,
421 TLS1_TXT_DHE_RSA_WITH_AES_128_SHA256,
422 TLS1_RFC_DHE_RSA_WITH_AES_128_SHA256,
423 TLS1_CK_DHE_RSA_WITH_AES_128_SHA256,
424 SSL_kDHE,
425 SSL_aRSA,
426 SSL_AES128,
427 SSL_SHA256,
428 TLS1_2_VERSION, TLS1_2_VERSION,
429 DTLS1_2_VERSION, DTLS1_2_VERSION,
430 SSL_HIGH | SSL_FIPS,
431 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
432 128,
433 128,
434 },
435 {
436 1,
437 TLS1_TXT_DHE_DSS_WITH_AES_256_SHA256,
438 TLS1_RFC_DHE_DSS_WITH_AES_256_SHA256,
439 TLS1_CK_DHE_DSS_WITH_AES_256_SHA256,
440 SSL_kDHE,
441 SSL_aDSS,
442 SSL_AES256,
443 SSL_SHA256,
444 TLS1_2_VERSION, TLS1_2_VERSION,
445 DTLS1_2_VERSION, DTLS1_2_VERSION,
446 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
447 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
448 256,
449 256,
450 },
451 {
452 1,
453 TLS1_TXT_DHE_RSA_WITH_AES_256_SHA256,
454 TLS1_RFC_DHE_RSA_WITH_AES_256_SHA256,
455 TLS1_CK_DHE_RSA_WITH_AES_256_SHA256,
456 SSL_kDHE,
457 SSL_aRSA,
458 SSL_AES256,
459 SSL_SHA256,
460 TLS1_2_VERSION, TLS1_2_VERSION,
461 DTLS1_2_VERSION, DTLS1_2_VERSION,
462 SSL_HIGH | SSL_FIPS,
463 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
464 256,
465 256,
466 },
467 {
468 1,
469 TLS1_TXT_ADH_WITH_AES_128_SHA256,
470 TLS1_RFC_ADH_WITH_AES_128_SHA256,
471 TLS1_CK_ADH_WITH_AES_128_SHA256,
472 SSL_kDHE,
473 SSL_aNULL,
474 SSL_AES128,
475 SSL_SHA256,
476 TLS1_2_VERSION, TLS1_2_VERSION,
477 DTLS1_2_VERSION, DTLS1_2_VERSION,
478 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
479 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
480 128,
481 128,
482 },
483 {
484 1,
485 TLS1_TXT_ADH_WITH_AES_256_SHA256,
486 TLS1_RFC_ADH_WITH_AES_256_SHA256,
487 TLS1_CK_ADH_WITH_AES_256_SHA256,
488 SSL_kDHE,
489 SSL_aNULL,
490 SSL_AES256,
491 SSL_SHA256,
492 TLS1_2_VERSION, TLS1_2_VERSION,
493 DTLS1_2_VERSION, DTLS1_2_VERSION,
494 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
495 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
496 256,
497 256,
498 },
499 {
500 1,
501 TLS1_TXT_RSA_WITH_AES_128_GCM_SHA256,
502 TLS1_RFC_RSA_WITH_AES_128_GCM_SHA256,
503 TLS1_CK_RSA_WITH_AES_128_GCM_SHA256,
504 SSL_kRSA,
505 SSL_aRSA,
506 SSL_AES128GCM,
507 SSL_AEAD,
508 TLS1_2_VERSION, TLS1_2_VERSION,
509 DTLS1_2_VERSION, DTLS1_2_VERSION,
510 SSL_HIGH | SSL_FIPS,
511 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
512 128,
513 128,
514 },
515 {
516 1,
517 TLS1_TXT_RSA_WITH_AES_256_GCM_SHA384,
518 TLS1_RFC_RSA_WITH_AES_256_GCM_SHA384,
519 TLS1_CK_RSA_WITH_AES_256_GCM_SHA384,
520 SSL_kRSA,
521 SSL_aRSA,
522 SSL_AES256GCM,
523 SSL_AEAD,
524 TLS1_2_VERSION, TLS1_2_VERSION,
525 DTLS1_2_VERSION, DTLS1_2_VERSION,
526 SSL_HIGH | SSL_FIPS,
527 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
528 256,
529 256,
530 },
531 {
532 1,
533 TLS1_TXT_DHE_RSA_WITH_AES_128_GCM_SHA256,
534 TLS1_RFC_DHE_RSA_WITH_AES_128_GCM_SHA256,
535 TLS1_CK_DHE_RSA_WITH_AES_128_GCM_SHA256,
536 SSL_kDHE,
537 SSL_aRSA,
538 SSL_AES128GCM,
539 SSL_AEAD,
540 TLS1_2_VERSION, TLS1_2_VERSION,
541 DTLS1_2_VERSION, DTLS1_2_VERSION,
542 SSL_HIGH | SSL_FIPS,
543 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
544 128,
545 128,
546 },
547 {
548 1,
549 TLS1_TXT_DHE_RSA_WITH_AES_256_GCM_SHA384,
550 TLS1_RFC_DHE_RSA_WITH_AES_256_GCM_SHA384,
551 TLS1_CK_DHE_RSA_WITH_AES_256_GCM_SHA384,
552 SSL_kDHE,
553 SSL_aRSA,
554 SSL_AES256GCM,
555 SSL_AEAD,
556 TLS1_2_VERSION, TLS1_2_VERSION,
557 DTLS1_2_VERSION, DTLS1_2_VERSION,
558 SSL_HIGH | SSL_FIPS,
559 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
560 256,
561 256,
562 },
563 {
564 1,
565 TLS1_TXT_DHE_DSS_WITH_AES_128_GCM_SHA256,
566 TLS1_RFC_DHE_DSS_WITH_AES_128_GCM_SHA256,
567 TLS1_CK_DHE_DSS_WITH_AES_128_GCM_SHA256,
568 SSL_kDHE,
569 SSL_aDSS,
570 SSL_AES128GCM,
571 SSL_AEAD,
572 TLS1_2_VERSION, TLS1_2_VERSION,
573 DTLS1_2_VERSION, DTLS1_2_VERSION,
574 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
575 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
576 128,
577 128,
578 },
579 {
580 1,
581 TLS1_TXT_DHE_DSS_WITH_AES_256_GCM_SHA384,
582 TLS1_RFC_DHE_DSS_WITH_AES_256_GCM_SHA384,
583 TLS1_CK_DHE_DSS_WITH_AES_256_GCM_SHA384,
584 SSL_kDHE,
585 SSL_aDSS,
586 SSL_AES256GCM,
587 SSL_AEAD,
588 TLS1_2_VERSION, TLS1_2_VERSION,
589 DTLS1_2_VERSION, DTLS1_2_VERSION,
590 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
591 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
592 256,
593 256,
594 },
595 {
596 1,
597 TLS1_TXT_ADH_WITH_AES_128_GCM_SHA256,
598 TLS1_RFC_ADH_WITH_AES_128_GCM_SHA256,
599 TLS1_CK_ADH_WITH_AES_128_GCM_SHA256,
600 SSL_kDHE,
601 SSL_aNULL,
602 SSL_AES128GCM,
603 SSL_AEAD,
604 TLS1_2_VERSION, TLS1_2_VERSION,
605 DTLS1_2_VERSION, DTLS1_2_VERSION,
606 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
607 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
608 128,
609 128,
610 },
611 {
612 1,
613 TLS1_TXT_ADH_WITH_AES_256_GCM_SHA384,
614 TLS1_RFC_ADH_WITH_AES_256_GCM_SHA384,
615 TLS1_CK_ADH_WITH_AES_256_GCM_SHA384,
616 SSL_kDHE,
617 SSL_aNULL,
618 SSL_AES256GCM,
619 SSL_AEAD,
620 TLS1_2_VERSION, TLS1_2_VERSION,
621 DTLS1_2_VERSION, DTLS1_2_VERSION,
622 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
623 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
624 256,
625 256,
626 },
627 {
628 1,
629 TLS1_TXT_RSA_WITH_AES_128_CCM,
630 TLS1_RFC_RSA_WITH_AES_128_CCM,
631 TLS1_CK_RSA_WITH_AES_128_CCM,
632 SSL_kRSA,
633 SSL_aRSA,
634 SSL_AES128CCM,
635 SSL_AEAD,
636 TLS1_2_VERSION, TLS1_2_VERSION,
637 DTLS1_2_VERSION, DTLS1_2_VERSION,
638 SSL_NOT_DEFAULT | SSL_HIGH,
639 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
640 128,
641 128,
642 },
643 {
644 1,
645 TLS1_TXT_RSA_WITH_AES_256_CCM,
646 TLS1_RFC_RSA_WITH_AES_256_CCM,
647 TLS1_CK_RSA_WITH_AES_256_CCM,
648 SSL_kRSA,
649 SSL_aRSA,
650 SSL_AES256CCM,
651 SSL_AEAD,
652 TLS1_2_VERSION, TLS1_2_VERSION,
653 DTLS1_2_VERSION, DTLS1_2_VERSION,
654 SSL_NOT_DEFAULT | SSL_HIGH,
655 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
656 256,
657 256,
658 },
659 {
660 1,
661 TLS1_TXT_DHE_RSA_WITH_AES_128_CCM,
662 TLS1_RFC_DHE_RSA_WITH_AES_128_CCM,
663 TLS1_CK_DHE_RSA_WITH_AES_128_CCM,
664 SSL_kDHE,
665 SSL_aRSA,
666 SSL_AES128CCM,
667 SSL_AEAD,
668 TLS1_2_VERSION, TLS1_2_VERSION,
669 DTLS1_2_VERSION, DTLS1_2_VERSION,
670 SSL_NOT_DEFAULT | SSL_HIGH,
671 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
672 128,
673 128,
674 },
675 {
676 1,
677 TLS1_TXT_DHE_RSA_WITH_AES_256_CCM,
678 TLS1_RFC_DHE_RSA_WITH_AES_256_CCM,
679 TLS1_CK_DHE_RSA_WITH_AES_256_CCM,
680 SSL_kDHE,
681 SSL_aRSA,
682 SSL_AES256CCM,
683 SSL_AEAD,
684 TLS1_2_VERSION, TLS1_2_VERSION,
685 DTLS1_2_VERSION, DTLS1_2_VERSION,
686 SSL_NOT_DEFAULT | SSL_HIGH,
687 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
688 256,
689 256,
690 },
691 {
692 1,
693 TLS1_TXT_RSA_WITH_AES_128_CCM_8,
694 TLS1_RFC_RSA_WITH_AES_128_CCM_8,
695 TLS1_CK_RSA_WITH_AES_128_CCM_8,
696 SSL_kRSA,
697 SSL_aRSA,
698 SSL_AES128CCM8,
699 SSL_AEAD,
700 TLS1_2_VERSION, TLS1_2_VERSION,
701 DTLS1_2_VERSION, DTLS1_2_VERSION,
702 SSL_NOT_DEFAULT | SSL_MEDIUM,
703 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
704 64, /* CCM8 uses a short tag, so we have a low security strength */
705 128,
706 },
707 {
708 1,
709 TLS1_TXT_RSA_WITH_AES_256_CCM_8,
710 TLS1_RFC_RSA_WITH_AES_256_CCM_8,
711 TLS1_CK_RSA_WITH_AES_256_CCM_8,
712 SSL_kRSA,
713 SSL_aRSA,
714 SSL_AES256CCM8,
715 SSL_AEAD,
716 TLS1_2_VERSION, TLS1_2_VERSION,
717 DTLS1_2_VERSION, DTLS1_2_VERSION,
718 SSL_NOT_DEFAULT | SSL_MEDIUM,
719 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
720 64, /* CCM8 uses a short tag, so we have a low security strength */
721 256,
722 },
723 {
724 1,
725 TLS1_TXT_DHE_RSA_WITH_AES_128_CCM_8,
726 TLS1_RFC_DHE_RSA_WITH_AES_128_CCM_8,
727 TLS1_CK_DHE_RSA_WITH_AES_128_CCM_8,
728 SSL_kDHE,
729 SSL_aRSA,
730 SSL_AES128CCM8,
731 SSL_AEAD,
732 TLS1_2_VERSION, TLS1_2_VERSION,
733 DTLS1_2_VERSION, DTLS1_2_VERSION,
734 SSL_NOT_DEFAULT | SSL_MEDIUM,
735 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
736 64, /* CCM8 uses a short tag, so we have a low security strength */
737 128,
738 },
739 {
740 1,
741 TLS1_TXT_DHE_RSA_WITH_AES_256_CCM_8,
742 TLS1_RFC_DHE_RSA_WITH_AES_256_CCM_8,
743 TLS1_CK_DHE_RSA_WITH_AES_256_CCM_8,
744 SSL_kDHE,
745 SSL_aRSA,
746 SSL_AES256CCM8,
747 SSL_AEAD,
748 TLS1_2_VERSION, TLS1_2_VERSION,
749 DTLS1_2_VERSION, DTLS1_2_VERSION,
750 SSL_NOT_DEFAULT | SSL_MEDIUM,
751 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
752 64, /* CCM8 uses a short tag, so we have a low security strength */
753 256,
754 },
755 {
756 1,
757 TLS1_TXT_PSK_WITH_AES_128_CCM,
758 TLS1_RFC_PSK_WITH_AES_128_CCM,
759 TLS1_CK_PSK_WITH_AES_128_CCM,
760 SSL_kPSK,
761 SSL_aPSK,
762 SSL_AES128CCM,
763 SSL_AEAD,
764 TLS1_2_VERSION, TLS1_2_VERSION,
765 DTLS1_2_VERSION, DTLS1_2_VERSION,
766 SSL_NOT_DEFAULT | SSL_HIGH,
767 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
768 128,
769 128,
770 },
771 {
772 1,
773 TLS1_TXT_PSK_WITH_AES_256_CCM,
774 TLS1_RFC_PSK_WITH_AES_256_CCM,
775 TLS1_CK_PSK_WITH_AES_256_CCM,
776 SSL_kPSK,
777 SSL_aPSK,
778 SSL_AES256CCM,
779 SSL_AEAD,
780 TLS1_2_VERSION, TLS1_2_VERSION,
781 DTLS1_2_VERSION, DTLS1_2_VERSION,
782 SSL_NOT_DEFAULT | SSL_HIGH,
783 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
784 256,
785 256,
786 },
787 {
788 1,
789 TLS1_TXT_DHE_PSK_WITH_AES_128_CCM,
790 TLS1_RFC_DHE_PSK_WITH_AES_128_CCM,
791 TLS1_CK_DHE_PSK_WITH_AES_128_CCM,
792 SSL_kDHEPSK,
793 SSL_aPSK,
794 SSL_AES128CCM,
795 SSL_AEAD,
796 TLS1_2_VERSION, TLS1_2_VERSION,
797 DTLS1_2_VERSION, DTLS1_2_VERSION,
798 SSL_NOT_DEFAULT | SSL_HIGH,
799 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
800 128,
801 128,
802 },
803 {
804 1,
805 TLS1_TXT_DHE_PSK_WITH_AES_256_CCM,
806 TLS1_RFC_DHE_PSK_WITH_AES_256_CCM,
807 TLS1_CK_DHE_PSK_WITH_AES_256_CCM,
808 SSL_kDHEPSK,
809 SSL_aPSK,
810 SSL_AES256CCM,
811 SSL_AEAD,
812 TLS1_2_VERSION, TLS1_2_VERSION,
813 DTLS1_2_VERSION, DTLS1_2_VERSION,
814 SSL_NOT_DEFAULT | SSL_HIGH,
815 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
816 256,
817 256,
818 },
819 {
820 1,
821 TLS1_TXT_PSK_WITH_AES_128_CCM_8,
822 TLS1_RFC_PSK_WITH_AES_128_CCM_8,
823 TLS1_CK_PSK_WITH_AES_128_CCM_8,
824 SSL_kPSK,
825 SSL_aPSK,
826 SSL_AES128CCM8,
827 SSL_AEAD,
828 TLS1_2_VERSION, TLS1_2_VERSION,
829 DTLS1_2_VERSION, DTLS1_2_VERSION,
830 SSL_NOT_DEFAULT | SSL_MEDIUM,
831 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
832 64, /* CCM8 uses a short tag, so we have a low security strength */
833 128,
834 },
835 {
836 1,
837 TLS1_TXT_PSK_WITH_AES_256_CCM_8,
838 TLS1_RFC_PSK_WITH_AES_256_CCM_8,
839 TLS1_CK_PSK_WITH_AES_256_CCM_8,
840 SSL_kPSK,
841 SSL_aPSK,
842 SSL_AES256CCM8,
843 SSL_AEAD,
844 TLS1_2_VERSION, TLS1_2_VERSION,
845 DTLS1_2_VERSION, DTLS1_2_VERSION,
846 SSL_NOT_DEFAULT | SSL_MEDIUM,
847 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
848 64, /* CCM8 uses a short tag, so we have a low security strength */
849 256,
850 },
851 {
852 1,
853 TLS1_TXT_DHE_PSK_WITH_AES_128_CCM_8,
854 TLS1_RFC_DHE_PSK_WITH_AES_128_CCM_8,
855 TLS1_CK_DHE_PSK_WITH_AES_128_CCM_8,
856 SSL_kDHEPSK,
857 SSL_aPSK,
858 SSL_AES128CCM8,
859 SSL_AEAD,
860 TLS1_2_VERSION, TLS1_2_VERSION,
861 DTLS1_2_VERSION, DTLS1_2_VERSION,
862 SSL_NOT_DEFAULT | SSL_MEDIUM,
863 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
864 64, /* CCM8 uses a short tag, so we have a low security strength */
865 128,
866 },
867 {
868 1,
869 TLS1_TXT_DHE_PSK_WITH_AES_256_CCM_8,
870 TLS1_RFC_DHE_PSK_WITH_AES_256_CCM_8,
871 TLS1_CK_DHE_PSK_WITH_AES_256_CCM_8,
872 SSL_kDHEPSK,
873 SSL_aPSK,
874 SSL_AES256CCM8,
875 SSL_AEAD,
876 TLS1_2_VERSION, TLS1_2_VERSION,
877 DTLS1_2_VERSION, DTLS1_2_VERSION,
878 SSL_NOT_DEFAULT | SSL_MEDIUM,
879 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
880 64, /* CCM8 uses a short tag, so we have a low security strength */
881 256,
882 },
883 {
884 1,
885 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CCM,
886 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_CCM,
887 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM,
888 SSL_kECDHE,
889 SSL_aECDSA,
890 SSL_AES128CCM,
891 SSL_AEAD,
892 TLS1_2_VERSION, TLS1_2_VERSION,
893 DTLS1_2_VERSION, DTLS1_2_VERSION,
894 SSL_NOT_DEFAULT | SSL_HIGH,
895 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
896 128,
897 128,
898 },
899 {
900 1,
901 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CCM,
902 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_CCM,
903 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM,
904 SSL_kECDHE,
905 SSL_aECDSA,
906 SSL_AES256CCM,
907 SSL_AEAD,
908 TLS1_2_VERSION, TLS1_2_VERSION,
909 DTLS1_2_VERSION, DTLS1_2_VERSION,
910 SSL_NOT_DEFAULT | SSL_HIGH,
911 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
912 256,
913 256,
914 },
915 {
916 1,
917 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CCM_8,
918 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_CCM_8,
919 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM_8,
920 SSL_kECDHE,
921 SSL_aECDSA,
922 SSL_AES128CCM8,
923 SSL_AEAD,
924 TLS1_2_VERSION, TLS1_2_VERSION,
925 DTLS1_2_VERSION, DTLS1_2_VERSION,
926 SSL_NOT_DEFAULT | SSL_MEDIUM,
927 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
928 64, /* CCM8 uses a short tag, so we have a low security strength */
929 128,
930 },
931 {
932 1,
933 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CCM_8,
934 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_CCM_8,
935 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM_8,
936 SSL_kECDHE,
937 SSL_aECDSA,
938 SSL_AES256CCM8,
939 SSL_AEAD,
940 TLS1_2_VERSION, TLS1_2_VERSION,
941 DTLS1_2_VERSION, DTLS1_2_VERSION,
942 SSL_NOT_DEFAULT | SSL_MEDIUM,
943 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
944 64, /* CCM8 uses a short tag, so we have a low security strength */
945 256,
946 },
947 {
948 1,
949 TLS1_TXT_ECDHE_ECDSA_WITH_NULL_SHA,
950 TLS1_RFC_ECDHE_ECDSA_WITH_NULL_SHA,
951 TLS1_CK_ECDHE_ECDSA_WITH_NULL_SHA,
952 SSL_kECDHE,
953 SSL_aECDSA,
954 SSL_eNULL,
955 SSL_SHA1,
956 TLS1_VERSION, TLS1_2_VERSION,
957 DTLS1_BAD_VER, DTLS1_2_VERSION,
958 SSL_STRONG_NONE | SSL_FIPS,
959 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
960 0,
961 0,
962 },
963 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
964 {
965 1,
966 TLS1_TXT_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,
967 TLS1_RFC_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,
968 TLS1_CK_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,
969 SSL_kECDHE,
970 SSL_aECDSA,
971 SSL_3DES,
972 SSL_SHA1,
973 TLS1_VERSION, TLS1_2_VERSION,
974 DTLS1_BAD_VER, DTLS1_2_VERSION,
975 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
976 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
977 112,
978 168,
979 },
980 # endif
981 {
982 1,
983 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
984 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
985 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
986 SSL_kECDHE,
987 SSL_aECDSA,
988 SSL_AES128,
989 SSL_SHA1,
990 TLS1_VERSION, TLS1_2_VERSION,
991 DTLS1_BAD_VER, DTLS1_2_VERSION,
992 SSL_HIGH | SSL_FIPS,
993 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
994 128,
995 128,
996 },
997 {
998 1,
999 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
1000 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
1001 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
1002 SSL_kECDHE,
1003 SSL_aECDSA,
1004 SSL_AES256,
1005 SSL_SHA1,
1006 TLS1_VERSION, TLS1_2_VERSION,
1007 DTLS1_BAD_VER, DTLS1_2_VERSION,
1008 SSL_HIGH | SSL_FIPS,
1009 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1010 256,
1011 256,
1012 },
1013 {
1014 1,
1015 TLS1_TXT_ECDHE_RSA_WITH_NULL_SHA,
1016 TLS1_RFC_ECDHE_RSA_WITH_NULL_SHA,
1017 TLS1_CK_ECDHE_RSA_WITH_NULL_SHA,
1018 SSL_kECDHE,
1019 SSL_aRSA,
1020 SSL_eNULL,
1021 SSL_SHA1,
1022 TLS1_VERSION, TLS1_2_VERSION,
1023 DTLS1_BAD_VER, DTLS1_2_VERSION,
1024 SSL_STRONG_NONE | SSL_FIPS,
1025 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1026 0,
1027 0,
1028 },
1029 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1030 {
1031 1,
1032 TLS1_TXT_ECDHE_RSA_WITH_DES_192_CBC3_SHA,
1033 TLS1_RFC_ECDHE_RSA_WITH_DES_192_CBC3_SHA,
1034 TLS1_CK_ECDHE_RSA_WITH_DES_192_CBC3_SHA,
1035 SSL_kECDHE,
1036 SSL_aRSA,
1037 SSL_3DES,
1038 SSL_SHA1,
1039 TLS1_VERSION, TLS1_2_VERSION,
1040 DTLS1_BAD_VER, DTLS1_2_VERSION,
1041 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1042 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1043 112,
1044 168,
1045 },
1046 # endif
1047 {
1048 1,
1049 TLS1_TXT_ECDHE_RSA_WITH_AES_128_CBC_SHA,
1050 TLS1_RFC_ECDHE_RSA_WITH_AES_128_CBC_SHA,
1051 TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA,
1052 SSL_kECDHE,
1053 SSL_aRSA,
1054 SSL_AES128,
1055 SSL_SHA1,
1056 TLS1_VERSION, TLS1_2_VERSION,
1057 DTLS1_BAD_VER, DTLS1_2_VERSION,
1058 SSL_HIGH | SSL_FIPS,
1059 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1060 128,
1061 128,
1062 },
1063 {
1064 1,
1065 TLS1_TXT_ECDHE_RSA_WITH_AES_256_CBC_SHA,
1066 TLS1_RFC_ECDHE_RSA_WITH_AES_256_CBC_SHA,
1067 TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA,
1068 SSL_kECDHE,
1069 SSL_aRSA,
1070 SSL_AES256,
1071 SSL_SHA1,
1072 TLS1_VERSION, TLS1_2_VERSION,
1073 DTLS1_BAD_VER, DTLS1_2_VERSION,
1074 SSL_HIGH | SSL_FIPS,
1075 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1076 256,
1077 256,
1078 },
1079 {
1080 1,
1081 TLS1_TXT_ECDH_anon_WITH_NULL_SHA,
1082 TLS1_RFC_ECDH_anon_WITH_NULL_SHA,
1083 TLS1_CK_ECDH_anon_WITH_NULL_SHA,
1084 SSL_kECDHE,
1085 SSL_aNULL,
1086 SSL_eNULL,
1087 SSL_SHA1,
1088 TLS1_VERSION, TLS1_2_VERSION,
1089 DTLS1_BAD_VER, DTLS1_2_VERSION,
1090 SSL_STRONG_NONE | SSL_FIPS,
1091 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1092 0,
1093 0,
1094 },
1095 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1096 {
1097 1,
1098 TLS1_TXT_ECDH_anon_WITH_DES_192_CBC3_SHA,
1099 TLS1_RFC_ECDH_anon_WITH_DES_192_CBC3_SHA,
1100 TLS1_CK_ECDH_anon_WITH_DES_192_CBC3_SHA,
1101 SSL_kECDHE,
1102 SSL_aNULL,
1103 SSL_3DES,
1104 SSL_SHA1,
1105 TLS1_VERSION, TLS1_2_VERSION,
1106 DTLS1_BAD_VER, DTLS1_2_VERSION,
1107 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1108 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1109 112,
1110 168,
1111 },
1112 # endif
1113 {
1114 1,
1115 TLS1_TXT_ECDH_anon_WITH_AES_128_CBC_SHA,
1116 TLS1_RFC_ECDH_anon_WITH_AES_128_CBC_SHA,
1117 TLS1_CK_ECDH_anon_WITH_AES_128_CBC_SHA,
1118 SSL_kECDHE,
1119 SSL_aNULL,
1120 SSL_AES128,
1121 SSL_SHA1,
1122 TLS1_VERSION, TLS1_2_VERSION,
1123 DTLS1_BAD_VER, DTLS1_2_VERSION,
1124 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
1125 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1126 128,
1127 128,
1128 },
1129 {
1130 1,
1131 TLS1_TXT_ECDH_anon_WITH_AES_256_CBC_SHA,
1132 TLS1_RFC_ECDH_anon_WITH_AES_256_CBC_SHA,
1133 TLS1_CK_ECDH_anon_WITH_AES_256_CBC_SHA,
1134 SSL_kECDHE,
1135 SSL_aNULL,
1136 SSL_AES256,
1137 SSL_SHA1,
1138 TLS1_VERSION, TLS1_2_VERSION,
1139 DTLS1_BAD_VER, DTLS1_2_VERSION,
1140 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
1141 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1142 256,
1143 256,
1144 },
1145 {
1146 1,
1147 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_SHA256,
1148 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_SHA256,
1149 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_SHA256,
1150 SSL_kECDHE,
1151 SSL_aECDSA,
1152 SSL_AES128,
1153 SSL_SHA256,
1154 TLS1_2_VERSION, TLS1_2_VERSION,
1155 DTLS1_2_VERSION, DTLS1_2_VERSION,
1156 SSL_HIGH | SSL_FIPS,
1157 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1158 128,
1159 128,
1160 },
1161 {
1162 1,
1163 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_SHA384,
1164 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_SHA384,
1165 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_SHA384,
1166 SSL_kECDHE,
1167 SSL_aECDSA,
1168 SSL_AES256,
1169 SSL_SHA384,
1170 TLS1_2_VERSION, TLS1_2_VERSION,
1171 DTLS1_2_VERSION, DTLS1_2_VERSION,
1172 SSL_HIGH | SSL_FIPS,
1173 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1174 256,
1175 256,
1176 },
1177 {
1178 1,
1179 TLS1_TXT_ECDHE_RSA_WITH_AES_128_SHA256,
1180 TLS1_RFC_ECDHE_RSA_WITH_AES_128_SHA256,
1181 TLS1_CK_ECDHE_RSA_WITH_AES_128_SHA256,
1182 SSL_kECDHE,
1183 SSL_aRSA,
1184 SSL_AES128,
1185 SSL_SHA256,
1186 TLS1_2_VERSION, TLS1_2_VERSION,
1187 DTLS1_2_VERSION, DTLS1_2_VERSION,
1188 SSL_HIGH | SSL_FIPS,
1189 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1190 128,
1191 128,
1192 },
1193 {
1194 1,
1195 TLS1_TXT_ECDHE_RSA_WITH_AES_256_SHA384,
1196 TLS1_RFC_ECDHE_RSA_WITH_AES_256_SHA384,
1197 TLS1_CK_ECDHE_RSA_WITH_AES_256_SHA384,
1198 SSL_kECDHE,
1199 SSL_aRSA,
1200 SSL_AES256,
1201 SSL_SHA384,
1202 TLS1_2_VERSION, TLS1_2_VERSION,
1203 DTLS1_2_VERSION, DTLS1_2_VERSION,
1204 SSL_HIGH | SSL_FIPS,
1205 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1206 256,
1207 256,
1208 },
1209 {
1210 1,
1211 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
1212 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
1213 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
1214 SSL_kECDHE,
1215 SSL_aECDSA,
1216 SSL_AES128GCM,
1217 SSL_AEAD,
1218 TLS1_2_VERSION, TLS1_2_VERSION,
1219 DTLS1_2_VERSION, DTLS1_2_VERSION,
1220 SSL_HIGH | SSL_FIPS,
1221 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1222 128,
1223 128,
1224 },
1225 {
1226 1,
1227 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
1228 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
1229 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
1230 SSL_kECDHE,
1231 SSL_aECDSA,
1232 SSL_AES256GCM,
1233 SSL_AEAD,
1234 TLS1_2_VERSION, TLS1_2_VERSION,
1235 DTLS1_2_VERSION, DTLS1_2_VERSION,
1236 SSL_HIGH | SSL_FIPS,
1237 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1238 256,
1239 256,
1240 },
1241 {
1242 1,
1243 TLS1_TXT_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
1244 TLS1_RFC_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
1245 TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
1246 SSL_kECDHE,
1247 SSL_aRSA,
1248 SSL_AES128GCM,
1249 SSL_AEAD,
1250 TLS1_2_VERSION, TLS1_2_VERSION,
1251 DTLS1_2_VERSION, DTLS1_2_VERSION,
1252 SSL_HIGH | SSL_FIPS,
1253 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1254 128,
1255 128,
1256 },
1257 {
1258 1,
1259 TLS1_TXT_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
1260 TLS1_RFC_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
1261 TLS1_CK_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
1262 SSL_kECDHE,
1263 SSL_aRSA,
1264 SSL_AES256GCM,
1265 SSL_AEAD,
1266 TLS1_2_VERSION, TLS1_2_VERSION,
1267 DTLS1_2_VERSION, DTLS1_2_VERSION,
1268 SSL_HIGH | SSL_FIPS,
1269 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1270 256,
1271 256,
1272 },
1273 {
1274 1,
1275 TLS1_TXT_PSK_WITH_NULL_SHA,
1276 TLS1_RFC_PSK_WITH_NULL_SHA,
1277 TLS1_CK_PSK_WITH_NULL_SHA,
1278 SSL_kPSK,
1279 SSL_aPSK,
1280 SSL_eNULL,
1281 SSL_SHA1,
1282 SSL3_VERSION, TLS1_2_VERSION,
1283 DTLS1_BAD_VER, DTLS1_2_VERSION,
1284 SSL_STRONG_NONE | SSL_FIPS,
1285 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1286 0,
1287 0,
1288 },
1289 {
1290 1,
1291 TLS1_TXT_DHE_PSK_WITH_NULL_SHA,
1292 TLS1_RFC_DHE_PSK_WITH_NULL_SHA,
1293 TLS1_CK_DHE_PSK_WITH_NULL_SHA,
1294 SSL_kDHEPSK,
1295 SSL_aPSK,
1296 SSL_eNULL,
1297 SSL_SHA1,
1298 SSL3_VERSION, TLS1_2_VERSION,
1299 DTLS1_BAD_VER, DTLS1_2_VERSION,
1300 SSL_STRONG_NONE | SSL_FIPS,
1301 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1302 0,
1303 0,
1304 },
1305 {
1306 1,
1307 TLS1_TXT_RSA_PSK_WITH_NULL_SHA,
1308 TLS1_RFC_RSA_PSK_WITH_NULL_SHA,
1309 TLS1_CK_RSA_PSK_WITH_NULL_SHA,
1310 SSL_kRSAPSK,
1311 SSL_aRSA,
1312 SSL_eNULL,
1313 SSL_SHA1,
1314 SSL3_VERSION, TLS1_2_VERSION,
1315 DTLS1_BAD_VER, DTLS1_2_VERSION,
1316 SSL_STRONG_NONE | SSL_FIPS,
1317 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1318 0,
1319 0,
1320 },
1321 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1322 {
1323 1,
1324 TLS1_TXT_PSK_WITH_3DES_EDE_CBC_SHA,
1325 TLS1_RFC_PSK_WITH_3DES_EDE_CBC_SHA,
1326 TLS1_CK_PSK_WITH_3DES_EDE_CBC_SHA,
1327 SSL_kPSK,
1328 SSL_aPSK,
1329 SSL_3DES,
1330 SSL_SHA1,
1331 SSL3_VERSION, TLS1_2_VERSION,
1332 DTLS1_BAD_VER, DTLS1_2_VERSION,
1333 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1334 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1335 112,
1336 168,
1337 },
1338 # endif
1339 {
1340 1,
1341 TLS1_TXT_PSK_WITH_AES_128_CBC_SHA,
1342 TLS1_RFC_PSK_WITH_AES_128_CBC_SHA,
1343 TLS1_CK_PSK_WITH_AES_128_CBC_SHA,
1344 SSL_kPSK,
1345 SSL_aPSK,
1346 SSL_AES128,
1347 SSL_SHA1,
1348 SSL3_VERSION, TLS1_2_VERSION,
1349 DTLS1_BAD_VER, DTLS1_2_VERSION,
1350 SSL_HIGH | SSL_FIPS,
1351 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1352 128,
1353 128,
1354 },
1355 {
1356 1,
1357 TLS1_TXT_PSK_WITH_AES_256_CBC_SHA,
1358 TLS1_RFC_PSK_WITH_AES_256_CBC_SHA,
1359 TLS1_CK_PSK_WITH_AES_256_CBC_SHA,
1360 SSL_kPSK,
1361 SSL_aPSK,
1362 SSL_AES256,
1363 SSL_SHA1,
1364 SSL3_VERSION, TLS1_2_VERSION,
1365 DTLS1_BAD_VER, DTLS1_2_VERSION,
1366 SSL_HIGH | SSL_FIPS,
1367 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1368 256,
1369 256,
1370 },
1371 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1372 {
1373 1,
1374 TLS1_TXT_DHE_PSK_WITH_3DES_EDE_CBC_SHA,
1375 TLS1_RFC_DHE_PSK_WITH_3DES_EDE_CBC_SHA,
1376 TLS1_CK_DHE_PSK_WITH_3DES_EDE_CBC_SHA,
1377 SSL_kDHEPSK,
1378 SSL_aPSK,
1379 SSL_3DES,
1380 SSL_SHA1,
1381 SSL3_VERSION, TLS1_2_VERSION,
1382 DTLS1_BAD_VER, DTLS1_2_VERSION,
1383 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1384 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1385 112,
1386 168,
1387 },
1388 # endif
1389 {
1390 1,
1391 TLS1_TXT_DHE_PSK_WITH_AES_128_CBC_SHA,
1392 TLS1_RFC_DHE_PSK_WITH_AES_128_CBC_SHA,
1393 TLS1_CK_DHE_PSK_WITH_AES_128_CBC_SHA,
1394 SSL_kDHEPSK,
1395 SSL_aPSK,
1396 SSL_AES128,
1397 SSL_SHA1,
1398 SSL3_VERSION, TLS1_2_VERSION,
1399 DTLS1_BAD_VER, DTLS1_2_VERSION,
1400 SSL_HIGH | SSL_FIPS,
1401 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1402 128,
1403 128,
1404 },
1405 {
1406 1,
1407 TLS1_TXT_DHE_PSK_WITH_AES_256_CBC_SHA,
1408 TLS1_RFC_DHE_PSK_WITH_AES_256_CBC_SHA,
1409 TLS1_CK_DHE_PSK_WITH_AES_256_CBC_SHA,
1410 SSL_kDHEPSK,
1411 SSL_aPSK,
1412 SSL_AES256,
1413 SSL_SHA1,
1414 SSL3_VERSION, TLS1_2_VERSION,
1415 DTLS1_BAD_VER, DTLS1_2_VERSION,
1416 SSL_HIGH | SSL_FIPS,
1417 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1418 256,
1419 256,
1420 },
1421 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1422 {
1423 1,
1424 TLS1_TXT_RSA_PSK_WITH_3DES_EDE_CBC_SHA,
1425 TLS1_RFC_RSA_PSK_WITH_3DES_EDE_CBC_SHA,
1426 TLS1_CK_RSA_PSK_WITH_3DES_EDE_CBC_SHA,
1427 SSL_kRSAPSK,
1428 SSL_aRSA,
1429 SSL_3DES,
1430 SSL_SHA1,
1431 SSL3_VERSION, TLS1_2_VERSION,
1432 DTLS1_BAD_VER, DTLS1_2_VERSION,
1433 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1434 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1435 112,
1436 168,
1437 },
1438 # endif
1439 {
1440 1,
1441 TLS1_TXT_RSA_PSK_WITH_AES_128_CBC_SHA,
1442 TLS1_RFC_RSA_PSK_WITH_AES_128_CBC_SHA,
1443 TLS1_CK_RSA_PSK_WITH_AES_128_CBC_SHA,
1444 SSL_kRSAPSK,
1445 SSL_aRSA,
1446 SSL_AES128,
1447 SSL_SHA1,
1448 SSL3_VERSION, TLS1_2_VERSION,
1449 DTLS1_BAD_VER, DTLS1_2_VERSION,
1450 SSL_HIGH | SSL_FIPS,
1451 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1452 128,
1453 128,
1454 },
1455 {
1456 1,
1457 TLS1_TXT_RSA_PSK_WITH_AES_256_CBC_SHA,
1458 TLS1_RFC_RSA_PSK_WITH_AES_256_CBC_SHA,
1459 TLS1_CK_RSA_PSK_WITH_AES_256_CBC_SHA,
1460 SSL_kRSAPSK,
1461 SSL_aRSA,
1462 SSL_AES256,
1463 SSL_SHA1,
1464 SSL3_VERSION, TLS1_2_VERSION,
1465 DTLS1_BAD_VER, DTLS1_2_VERSION,
1466 SSL_HIGH | SSL_FIPS,
1467 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1468 256,
1469 256,
1470 },
1471 {
1472 1,
1473 TLS1_TXT_PSK_WITH_AES_128_GCM_SHA256,
1474 TLS1_RFC_PSK_WITH_AES_128_GCM_SHA256,
1475 TLS1_CK_PSK_WITH_AES_128_GCM_SHA256,
1476 SSL_kPSK,
1477 SSL_aPSK,
1478 SSL_AES128GCM,
1479 SSL_AEAD,
1480 TLS1_2_VERSION, TLS1_2_VERSION,
1481 DTLS1_2_VERSION, DTLS1_2_VERSION,
1482 SSL_HIGH | SSL_FIPS,
1483 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1484 128,
1485 128,
1486 },
1487 {
1488 1,
1489 TLS1_TXT_PSK_WITH_AES_256_GCM_SHA384,
1490 TLS1_RFC_PSK_WITH_AES_256_GCM_SHA384,
1491 TLS1_CK_PSK_WITH_AES_256_GCM_SHA384,
1492 SSL_kPSK,
1493 SSL_aPSK,
1494 SSL_AES256GCM,
1495 SSL_AEAD,
1496 TLS1_2_VERSION, TLS1_2_VERSION,
1497 DTLS1_2_VERSION, DTLS1_2_VERSION,
1498 SSL_HIGH | SSL_FIPS,
1499 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1500 256,
1501 256,
1502 },
1503 {
1504 1,
1505 TLS1_TXT_DHE_PSK_WITH_AES_128_GCM_SHA256,
1506 TLS1_RFC_DHE_PSK_WITH_AES_128_GCM_SHA256,
1507 TLS1_CK_DHE_PSK_WITH_AES_128_GCM_SHA256,
1508 SSL_kDHEPSK,
1509 SSL_aPSK,
1510 SSL_AES128GCM,
1511 SSL_AEAD,
1512 TLS1_2_VERSION, TLS1_2_VERSION,
1513 DTLS1_2_VERSION, DTLS1_2_VERSION,
1514 SSL_HIGH | SSL_FIPS,
1515 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1516 128,
1517 128,
1518 },
1519 {
1520 1,
1521 TLS1_TXT_DHE_PSK_WITH_AES_256_GCM_SHA384,
1522 TLS1_RFC_DHE_PSK_WITH_AES_256_GCM_SHA384,
1523 TLS1_CK_DHE_PSK_WITH_AES_256_GCM_SHA384,
1524 SSL_kDHEPSK,
1525 SSL_aPSK,
1526 SSL_AES256GCM,
1527 SSL_AEAD,
1528 TLS1_2_VERSION, TLS1_2_VERSION,
1529 DTLS1_2_VERSION, DTLS1_2_VERSION,
1530 SSL_HIGH | SSL_FIPS,
1531 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1532 256,
1533 256,
1534 },
1535 {
1536 1,
1537 TLS1_TXT_RSA_PSK_WITH_AES_128_GCM_SHA256,
1538 TLS1_RFC_RSA_PSK_WITH_AES_128_GCM_SHA256,
1539 TLS1_CK_RSA_PSK_WITH_AES_128_GCM_SHA256,
1540 SSL_kRSAPSK,
1541 SSL_aRSA,
1542 SSL_AES128GCM,
1543 SSL_AEAD,
1544 TLS1_2_VERSION, TLS1_2_VERSION,
1545 DTLS1_2_VERSION, DTLS1_2_VERSION,
1546 SSL_HIGH | SSL_FIPS,
1547 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1548 128,
1549 128,
1550 },
1551 {
1552 1,
1553 TLS1_TXT_RSA_PSK_WITH_AES_256_GCM_SHA384,
1554 TLS1_RFC_RSA_PSK_WITH_AES_256_GCM_SHA384,
1555 TLS1_CK_RSA_PSK_WITH_AES_256_GCM_SHA384,
1556 SSL_kRSAPSK,
1557 SSL_aRSA,
1558 SSL_AES256GCM,
1559 SSL_AEAD,
1560 TLS1_2_VERSION, TLS1_2_VERSION,
1561 DTLS1_2_VERSION, DTLS1_2_VERSION,
1562 SSL_HIGH | SSL_FIPS,
1563 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1564 256,
1565 256,
1566 },
1567 {
1568 1,
1569 TLS1_TXT_PSK_WITH_AES_128_CBC_SHA256,
1570 TLS1_RFC_PSK_WITH_AES_128_CBC_SHA256,
1571 TLS1_CK_PSK_WITH_AES_128_CBC_SHA256,
1572 SSL_kPSK,
1573 SSL_aPSK,
1574 SSL_AES128,
1575 SSL_SHA256,
1576 TLS1_VERSION, TLS1_2_VERSION,
1577 DTLS1_BAD_VER, DTLS1_2_VERSION,
1578 SSL_HIGH | SSL_FIPS,
1579 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1580 128,
1581 128,
1582 },
1583 {
1584 1,
1585 TLS1_TXT_PSK_WITH_AES_256_CBC_SHA384,
1586 TLS1_RFC_PSK_WITH_AES_256_CBC_SHA384,
1587 TLS1_CK_PSK_WITH_AES_256_CBC_SHA384,
1588 SSL_kPSK,
1589 SSL_aPSK,
1590 SSL_AES256,
1591 SSL_SHA384,
1592 TLS1_VERSION, TLS1_2_VERSION,
1593 DTLS1_BAD_VER, DTLS1_2_VERSION,
1594 SSL_HIGH | SSL_FIPS,
1595 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1596 256,
1597 256,
1598 },
1599 {
1600 1,
1601 TLS1_TXT_PSK_WITH_NULL_SHA256,
1602 TLS1_RFC_PSK_WITH_NULL_SHA256,
1603 TLS1_CK_PSK_WITH_NULL_SHA256,
1604 SSL_kPSK,
1605 SSL_aPSK,
1606 SSL_eNULL,
1607 SSL_SHA256,
1608 TLS1_VERSION, TLS1_2_VERSION,
1609 DTLS1_BAD_VER, DTLS1_2_VERSION,
1610 SSL_STRONG_NONE | SSL_FIPS,
1611 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1612 0,
1613 0,
1614 },
1615 {
1616 1,
1617 TLS1_TXT_PSK_WITH_NULL_SHA384,
1618 TLS1_RFC_PSK_WITH_NULL_SHA384,
1619 TLS1_CK_PSK_WITH_NULL_SHA384,
1620 SSL_kPSK,
1621 SSL_aPSK,
1622 SSL_eNULL,
1623 SSL_SHA384,
1624 TLS1_VERSION, TLS1_2_VERSION,
1625 DTLS1_BAD_VER, DTLS1_2_VERSION,
1626 SSL_STRONG_NONE | SSL_FIPS,
1627 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1628 0,
1629 0,
1630 },
1631 {
1632 1,
1633 TLS1_TXT_DHE_PSK_WITH_AES_128_CBC_SHA256,
1634 TLS1_RFC_DHE_PSK_WITH_AES_128_CBC_SHA256,
1635 TLS1_CK_DHE_PSK_WITH_AES_128_CBC_SHA256,
1636 SSL_kDHEPSK,
1637 SSL_aPSK,
1638 SSL_AES128,
1639 SSL_SHA256,
1640 TLS1_VERSION, TLS1_2_VERSION,
1641 DTLS1_BAD_VER, DTLS1_2_VERSION,
1642 SSL_HIGH | SSL_FIPS,
1643 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1644 128,
1645 128,
1646 },
1647 {
1648 1,
1649 TLS1_TXT_DHE_PSK_WITH_AES_256_CBC_SHA384,
1650 TLS1_RFC_DHE_PSK_WITH_AES_256_CBC_SHA384,
1651 TLS1_CK_DHE_PSK_WITH_AES_256_CBC_SHA384,
1652 SSL_kDHEPSK,
1653 SSL_aPSK,
1654 SSL_AES256,
1655 SSL_SHA384,
1656 TLS1_VERSION, TLS1_2_VERSION,
1657 DTLS1_BAD_VER, DTLS1_2_VERSION,
1658 SSL_HIGH | SSL_FIPS,
1659 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1660 256,
1661 256,
1662 },
1663 {
1664 1,
1665 TLS1_TXT_DHE_PSK_WITH_NULL_SHA256,
1666 TLS1_RFC_DHE_PSK_WITH_NULL_SHA256,
1667 TLS1_CK_DHE_PSK_WITH_NULL_SHA256,
1668 SSL_kDHEPSK,
1669 SSL_aPSK,
1670 SSL_eNULL,
1671 SSL_SHA256,
1672 TLS1_VERSION, TLS1_2_VERSION,
1673 DTLS1_BAD_VER, DTLS1_2_VERSION,
1674 SSL_STRONG_NONE | SSL_FIPS,
1675 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1676 0,
1677 0,
1678 },
1679 {
1680 1,
1681 TLS1_TXT_DHE_PSK_WITH_NULL_SHA384,
1682 TLS1_RFC_DHE_PSK_WITH_NULL_SHA384,
1683 TLS1_CK_DHE_PSK_WITH_NULL_SHA384,
1684 SSL_kDHEPSK,
1685 SSL_aPSK,
1686 SSL_eNULL,
1687 SSL_SHA384,
1688 TLS1_VERSION, TLS1_2_VERSION,
1689 DTLS1_BAD_VER, DTLS1_2_VERSION,
1690 SSL_STRONG_NONE | SSL_FIPS,
1691 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1692 0,
1693 0,
1694 },
1695 {
1696 1,
1697 TLS1_TXT_RSA_PSK_WITH_AES_128_CBC_SHA256,
1698 TLS1_RFC_RSA_PSK_WITH_AES_128_CBC_SHA256,
1699 TLS1_CK_RSA_PSK_WITH_AES_128_CBC_SHA256,
1700 SSL_kRSAPSK,
1701 SSL_aRSA,
1702 SSL_AES128,
1703 SSL_SHA256,
1704 TLS1_VERSION, TLS1_2_VERSION,
1705 DTLS1_BAD_VER, DTLS1_2_VERSION,
1706 SSL_HIGH | SSL_FIPS,
1707 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1708 128,
1709 128,
1710 },
1711 {
1712 1,
1713 TLS1_TXT_RSA_PSK_WITH_AES_256_CBC_SHA384,
1714 TLS1_RFC_RSA_PSK_WITH_AES_256_CBC_SHA384,
1715 TLS1_CK_RSA_PSK_WITH_AES_256_CBC_SHA384,
1716 SSL_kRSAPSK,
1717 SSL_aRSA,
1718 SSL_AES256,
1719 SSL_SHA384,
1720 TLS1_VERSION, TLS1_2_VERSION,
1721 DTLS1_BAD_VER, DTLS1_2_VERSION,
1722 SSL_HIGH | SSL_FIPS,
1723 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1724 256,
1725 256,
1726 },
1727 {
1728 1,
1729 TLS1_TXT_RSA_PSK_WITH_NULL_SHA256,
1730 TLS1_RFC_RSA_PSK_WITH_NULL_SHA256,
1731 TLS1_CK_RSA_PSK_WITH_NULL_SHA256,
1732 SSL_kRSAPSK,
1733 SSL_aRSA,
1734 SSL_eNULL,
1735 SSL_SHA256,
1736 TLS1_VERSION, TLS1_2_VERSION,
1737 DTLS1_BAD_VER, DTLS1_2_VERSION,
1738 SSL_STRONG_NONE | SSL_FIPS,
1739 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1740 0,
1741 0,
1742 },
1743 {
1744 1,
1745 TLS1_TXT_RSA_PSK_WITH_NULL_SHA384,
1746 TLS1_RFC_RSA_PSK_WITH_NULL_SHA384,
1747 TLS1_CK_RSA_PSK_WITH_NULL_SHA384,
1748 SSL_kRSAPSK,
1749 SSL_aRSA,
1750 SSL_eNULL,
1751 SSL_SHA384,
1752 TLS1_VERSION, TLS1_2_VERSION,
1753 DTLS1_BAD_VER, DTLS1_2_VERSION,
1754 SSL_STRONG_NONE | SSL_FIPS,
1755 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1756 0,
1757 0,
1758 },
1759 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1760 {
1761 1,
1762 TLS1_TXT_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA,
1763 TLS1_RFC_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA,
1764 TLS1_CK_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA,
1765 SSL_kECDHEPSK,
1766 SSL_aPSK,
1767 SSL_3DES,
1768 SSL_SHA1,
1769 TLS1_VERSION, TLS1_2_VERSION,
1770 DTLS1_BAD_VER, DTLS1_2_VERSION,
1771 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1772 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1773 112,
1774 168,
1775 },
1776 # endif
1777 {
1778 1,
1779 TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA,
1780 TLS1_RFC_ECDHE_PSK_WITH_AES_128_CBC_SHA,
1781 TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA,
1782 SSL_kECDHEPSK,
1783 SSL_aPSK,
1784 SSL_AES128,
1785 SSL_SHA1,
1786 TLS1_VERSION, TLS1_2_VERSION,
1787 DTLS1_BAD_VER, DTLS1_2_VERSION,
1788 SSL_HIGH | SSL_FIPS,
1789 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1790 128,
1791 128,
1792 },
1793 {
1794 1,
1795 TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA,
1796 TLS1_RFC_ECDHE_PSK_WITH_AES_256_CBC_SHA,
1797 TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA,
1798 SSL_kECDHEPSK,
1799 SSL_aPSK,
1800 SSL_AES256,
1801 SSL_SHA1,
1802 TLS1_VERSION, TLS1_2_VERSION,
1803 DTLS1_BAD_VER, DTLS1_2_VERSION,
1804 SSL_HIGH | SSL_FIPS,
1805 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1806 256,
1807 256,
1808 },
1809 {
1810 1,
1811 TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA256,
1812 TLS1_RFC_ECDHE_PSK_WITH_AES_128_CBC_SHA256,
1813 TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA256,
1814 SSL_kECDHEPSK,
1815 SSL_aPSK,
1816 SSL_AES128,
1817 SSL_SHA256,
1818 TLS1_VERSION, TLS1_2_VERSION,
1819 DTLS1_BAD_VER, DTLS1_2_VERSION,
1820 SSL_HIGH | SSL_FIPS,
1821 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1822 128,
1823 128,
1824 },
1825 {
1826 1,
1827 TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA384,
1828 TLS1_RFC_ECDHE_PSK_WITH_AES_256_CBC_SHA384,
1829 TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA384,
1830 SSL_kECDHEPSK,
1831 SSL_aPSK,
1832 SSL_AES256,
1833 SSL_SHA384,
1834 TLS1_VERSION, TLS1_2_VERSION,
1835 DTLS1_BAD_VER, DTLS1_2_VERSION,
1836 SSL_HIGH | SSL_FIPS,
1837 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1838 256,
1839 256,
1840 },
1841 {
1842 1,
1843 TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA,
1844 TLS1_RFC_ECDHE_PSK_WITH_NULL_SHA,
1845 TLS1_CK_ECDHE_PSK_WITH_NULL_SHA,
1846 SSL_kECDHEPSK,
1847 SSL_aPSK,
1848 SSL_eNULL,
1849 SSL_SHA1,
1850 TLS1_VERSION, TLS1_2_VERSION,
1851 DTLS1_BAD_VER, DTLS1_2_VERSION,
1852 SSL_STRONG_NONE | SSL_FIPS,
1853 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1854 0,
1855 0,
1856 },
1857 {
1858 1,
1859 TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA256,
1860 TLS1_RFC_ECDHE_PSK_WITH_NULL_SHA256,
1861 TLS1_CK_ECDHE_PSK_WITH_NULL_SHA256,
1862 SSL_kECDHEPSK,
1863 SSL_aPSK,
1864 SSL_eNULL,
1865 SSL_SHA256,
1866 TLS1_VERSION, TLS1_2_VERSION,
1867 DTLS1_BAD_VER, DTLS1_2_VERSION,
1868 SSL_STRONG_NONE | SSL_FIPS,
1869 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1870 0,
1871 0,
1872 },
1873 {
1874 1,
1875 TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA384,
1876 TLS1_RFC_ECDHE_PSK_WITH_NULL_SHA384,
1877 TLS1_CK_ECDHE_PSK_WITH_NULL_SHA384,
1878 SSL_kECDHEPSK,
1879 SSL_aPSK,
1880 SSL_eNULL,
1881 SSL_SHA384,
1882 TLS1_VERSION, TLS1_2_VERSION,
1883 DTLS1_BAD_VER, DTLS1_2_VERSION,
1884 SSL_STRONG_NONE | SSL_FIPS,
1885 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1886 0,
1887 0,
1888 },
1889
1890 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1891 {
1892 1,
1893 TLS1_TXT_SRP_SHA_WITH_3DES_EDE_CBC_SHA,
1894 TLS1_RFC_SRP_SHA_WITH_3DES_EDE_CBC_SHA,
1895 TLS1_CK_SRP_SHA_WITH_3DES_EDE_CBC_SHA,
1896 SSL_kSRP,
1897 SSL_aSRP,
1898 SSL_3DES,
1899 SSL_SHA1,
1900 SSL3_VERSION, TLS1_2_VERSION,
1901 DTLS1_BAD_VER, DTLS1_2_VERSION,
1902 SSL_NOT_DEFAULT | SSL_MEDIUM,
1903 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1904 112,
1905 168,
1906 },
1907 {
1908 1,
1909 TLS1_TXT_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA,
1910 TLS1_RFC_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA,
1911 TLS1_CK_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA,
1912 SSL_kSRP,
1913 SSL_aRSA,
1914 SSL_3DES,
1915 SSL_SHA1,
1916 SSL3_VERSION, TLS1_2_VERSION,
1917 DTLS1_BAD_VER, DTLS1_2_VERSION,
1918 SSL_NOT_DEFAULT | SSL_MEDIUM,
1919 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1920 112,
1921 168,
1922 },
1923 {
1924 1,
1925 TLS1_TXT_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA,
1926 TLS1_RFC_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA,
1927 TLS1_CK_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA,
1928 SSL_kSRP,
1929 SSL_aDSS,
1930 SSL_3DES,
1931 SSL_SHA1,
1932 SSL3_VERSION, TLS1_2_VERSION,
1933 DTLS1_BAD_VER, DTLS1_2_VERSION,
1934 SSL_NOT_DEFAULT | SSL_MEDIUM,
1935 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1936 112,
1937 168,
1938 },
1939 # endif
1940 {
1941 1,
1942 TLS1_TXT_SRP_SHA_WITH_AES_128_CBC_SHA,
1943 TLS1_RFC_SRP_SHA_WITH_AES_128_CBC_SHA,
1944 TLS1_CK_SRP_SHA_WITH_AES_128_CBC_SHA,
1945 SSL_kSRP,
1946 SSL_aSRP,
1947 SSL_AES128,
1948 SSL_SHA1,
1949 SSL3_VERSION, TLS1_2_VERSION,
1950 DTLS1_BAD_VER, DTLS1_2_VERSION,
1951 SSL_HIGH,
1952 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1953 128,
1954 128,
1955 },
1956 {
1957 1,
1958 TLS1_TXT_SRP_SHA_RSA_WITH_AES_128_CBC_SHA,
1959 TLS1_RFC_SRP_SHA_RSA_WITH_AES_128_CBC_SHA,
1960 TLS1_CK_SRP_SHA_RSA_WITH_AES_128_CBC_SHA,
1961 SSL_kSRP,
1962 SSL_aRSA,
1963 SSL_AES128,
1964 SSL_SHA1,
1965 SSL3_VERSION, TLS1_2_VERSION,
1966 DTLS1_BAD_VER, DTLS1_2_VERSION,
1967 SSL_HIGH,
1968 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1969 128,
1970 128,
1971 },
1972 {
1973 1,
1974 TLS1_TXT_SRP_SHA_DSS_WITH_AES_128_CBC_SHA,
1975 TLS1_RFC_SRP_SHA_DSS_WITH_AES_128_CBC_SHA,
1976 TLS1_CK_SRP_SHA_DSS_WITH_AES_128_CBC_SHA,
1977 SSL_kSRP,
1978 SSL_aDSS,
1979 SSL_AES128,
1980 SSL_SHA1,
1981 SSL3_VERSION, TLS1_2_VERSION,
1982 DTLS1_BAD_VER, DTLS1_2_VERSION,
1983 SSL_NOT_DEFAULT | SSL_HIGH,
1984 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1985 128,
1986 128,
1987 },
1988 {
1989 1,
1990 TLS1_TXT_SRP_SHA_WITH_AES_256_CBC_SHA,
1991 TLS1_RFC_SRP_SHA_WITH_AES_256_CBC_SHA,
1992 TLS1_CK_SRP_SHA_WITH_AES_256_CBC_SHA,
1993 SSL_kSRP,
1994 SSL_aSRP,
1995 SSL_AES256,
1996 SSL_SHA1,
1997 SSL3_VERSION, TLS1_2_VERSION,
1998 DTLS1_BAD_VER, DTLS1_2_VERSION,
1999 SSL_HIGH,
2000 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2001 256,
2002 256,
2003 },
2004 {
2005 1,
2006 TLS1_TXT_SRP_SHA_RSA_WITH_AES_256_CBC_SHA,
2007 TLS1_RFC_SRP_SHA_RSA_WITH_AES_256_CBC_SHA,
2008 TLS1_CK_SRP_SHA_RSA_WITH_AES_256_CBC_SHA,
2009 SSL_kSRP,
2010 SSL_aRSA,
2011 SSL_AES256,
2012 SSL_SHA1,
2013 SSL3_VERSION, TLS1_2_VERSION,
2014 DTLS1_BAD_VER, DTLS1_2_VERSION,
2015 SSL_HIGH,
2016 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2017 256,
2018 256,
2019 },
2020 {
2021 1,
2022 TLS1_TXT_SRP_SHA_DSS_WITH_AES_256_CBC_SHA,
2023 TLS1_RFC_SRP_SHA_DSS_WITH_AES_256_CBC_SHA,
2024 TLS1_CK_SRP_SHA_DSS_WITH_AES_256_CBC_SHA,
2025 SSL_kSRP,
2026 SSL_aDSS,
2027 SSL_AES256,
2028 SSL_SHA1,
2029 SSL3_VERSION, TLS1_2_VERSION,
2030 DTLS1_BAD_VER, DTLS1_2_VERSION,
2031 SSL_NOT_DEFAULT | SSL_HIGH,
2032 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2033 256,
2034 256,
2035 },
2036
2037 {
2038 1,
2039 TLS1_TXT_DHE_RSA_WITH_CHACHA20_POLY1305,
2040 TLS1_RFC_DHE_RSA_WITH_CHACHA20_POLY1305,
2041 TLS1_CK_DHE_RSA_WITH_CHACHA20_POLY1305,
2042 SSL_kDHE,
2043 SSL_aRSA,
2044 SSL_CHACHA20POLY1305,
2045 SSL_AEAD,
2046 TLS1_2_VERSION, TLS1_2_VERSION,
2047 DTLS1_2_VERSION, DTLS1_2_VERSION,
2048 SSL_HIGH,
2049 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2050 256,
2051 256,
2052 },
2053 {
2054 1,
2055 TLS1_TXT_ECDHE_RSA_WITH_CHACHA20_POLY1305,
2056 TLS1_RFC_ECDHE_RSA_WITH_CHACHA20_POLY1305,
2057 TLS1_CK_ECDHE_RSA_WITH_CHACHA20_POLY1305,
2058 SSL_kECDHE,
2059 SSL_aRSA,
2060 SSL_CHACHA20POLY1305,
2061 SSL_AEAD,
2062 TLS1_2_VERSION, TLS1_2_VERSION,
2063 DTLS1_2_VERSION, DTLS1_2_VERSION,
2064 SSL_HIGH,
2065 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2066 256,
2067 256,
2068 },
2069 {
2070 1,
2071 TLS1_TXT_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
2072 TLS1_RFC_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
2073 TLS1_CK_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
2074 SSL_kECDHE,
2075 SSL_aECDSA,
2076 SSL_CHACHA20POLY1305,
2077 SSL_AEAD,
2078 TLS1_2_VERSION, TLS1_2_VERSION,
2079 DTLS1_2_VERSION, DTLS1_2_VERSION,
2080 SSL_HIGH,
2081 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2082 256,
2083 256,
2084 },
2085 {
2086 1,
2087 TLS1_TXT_PSK_WITH_CHACHA20_POLY1305,
2088 TLS1_RFC_PSK_WITH_CHACHA20_POLY1305,
2089 TLS1_CK_PSK_WITH_CHACHA20_POLY1305,
2090 SSL_kPSK,
2091 SSL_aPSK,
2092 SSL_CHACHA20POLY1305,
2093 SSL_AEAD,
2094 TLS1_2_VERSION, TLS1_2_VERSION,
2095 DTLS1_2_VERSION, DTLS1_2_VERSION,
2096 SSL_HIGH,
2097 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2098 256,
2099 256,
2100 },
2101 {
2102 1,
2103 TLS1_TXT_ECDHE_PSK_WITH_CHACHA20_POLY1305,
2104 TLS1_RFC_ECDHE_PSK_WITH_CHACHA20_POLY1305,
2105 TLS1_CK_ECDHE_PSK_WITH_CHACHA20_POLY1305,
2106 SSL_kECDHEPSK,
2107 SSL_aPSK,
2108 SSL_CHACHA20POLY1305,
2109 SSL_AEAD,
2110 TLS1_2_VERSION, TLS1_2_VERSION,
2111 DTLS1_2_VERSION, DTLS1_2_VERSION,
2112 SSL_HIGH,
2113 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2114 256,
2115 256,
2116 },
2117 {
2118 1,
2119 TLS1_TXT_DHE_PSK_WITH_CHACHA20_POLY1305,
2120 TLS1_RFC_DHE_PSK_WITH_CHACHA20_POLY1305,
2121 TLS1_CK_DHE_PSK_WITH_CHACHA20_POLY1305,
2122 SSL_kDHEPSK,
2123 SSL_aPSK,
2124 SSL_CHACHA20POLY1305,
2125 SSL_AEAD,
2126 TLS1_2_VERSION, TLS1_2_VERSION,
2127 DTLS1_2_VERSION, DTLS1_2_VERSION,
2128 SSL_HIGH,
2129 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2130 256,
2131 256,
2132 },
2133 {
2134 1,
2135 TLS1_TXT_RSA_PSK_WITH_CHACHA20_POLY1305,
2136 TLS1_RFC_RSA_PSK_WITH_CHACHA20_POLY1305,
2137 TLS1_CK_RSA_PSK_WITH_CHACHA20_POLY1305,
2138 SSL_kRSAPSK,
2139 SSL_aRSA,
2140 SSL_CHACHA20POLY1305,
2141 SSL_AEAD,
2142 TLS1_2_VERSION, TLS1_2_VERSION,
2143 DTLS1_2_VERSION, DTLS1_2_VERSION,
2144 SSL_HIGH,
2145 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2146 256,
2147 256,
2148 },
2149
2150 {
2151 1,
2152 TLS1_TXT_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2153 TLS1_RFC_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2154 TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2155 SSL_kRSA,
2156 SSL_aRSA,
2157 SSL_CAMELLIA128,
2158 SSL_SHA256,
2159 TLS1_2_VERSION, TLS1_2_VERSION,
2160 DTLS1_2_VERSION, DTLS1_2_VERSION,
2161 SSL_NOT_DEFAULT | SSL_HIGH,
2162 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2163 128,
2164 128,
2165 },
2166 {
2167 1,
2168 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256,
2169 TLS1_RFC_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256,
2170 TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256,
2171 SSL_kDHE,
2172 SSL_aDSS,
2173 SSL_CAMELLIA128,
2174 SSL_SHA256,
2175 TLS1_2_VERSION, TLS1_2_VERSION,
2176 DTLS1_2_VERSION, DTLS1_2_VERSION,
2177 SSL_NOT_DEFAULT | SSL_HIGH,
2178 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2179 128,
2180 128,
2181 },
2182 {
2183 1,
2184 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2185 TLS1_RFC_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2186 TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2187 SSL_kDHE,
2188 SSL_aRSA,
2189 SSL_CAMELLIA128,
2190 SSL_SHA256,
2191 TLS1_2_VERSION, TLS1_2_VERSION,
2192 DTLS1_2_VERSION, DTLS1_2_VERSION,
2193 SSL_NOT_DEFAULT | SSL_HIGH,
2194 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2195 128,
2196 128,
2197 },
2198 {
2199 1,
2200 TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA256,
2201 TLS1_RFC_ADH_WITH_CAMELLIA_128_CBC_SHA256,
2202 TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA256,
2203 SSL_kDHE,
2204 SSL_aNULL,
2205 SSL_CAMELLIA128,
2206 SSL_SHA256,
2207 TLS1_2_VERSION, TLS1_2_VERSION,
2208 DTLS1_2_VERSION, DTLS1_2_VERSION,
2209 SSL_NOT_DEFAULT | SSL_HIGH,
2210 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2211 128,
2212 128,
2213 },
2214 {
2215 1,
2216 TLS1_TXT_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2217 TLS1_RFC_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2218 TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2219 SSL_kRSA,
2220 SSL_aRSA,
2221 SSL_CAMELLIA256,
2222 SSL_SHA256,
2223 TLS1_2_VERSION, TLS1_2_VERSION,
2224 DTLS1_2_VERSION, DTLS1_2_VERSION,
2225 SSL_NOT_DEFAULT | SSL_HIGH,
2226 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2227 256,
2228 256,
2229 },
2230 {
2231 1,
2232 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256,
2233 TLS1_RFC_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256,
2234 TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256,
2235 SSL_kDHE,
2236 SSL_aDSS,
2237 SSL_CAMELLIA256,
2238 SSL_SHA256,
2239 TLS1_2_VERSION, TLS1_2_VERSION,
2240 DTLS1_2_VERSION, DTLS1_2_VERSION,
2241 SSL_NOT_DEFAULT | SSL_HIGH,
2242 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2243 256,
2244 256,
2245 },
2246 {
2247 1,
2248 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2249 TLS1_RFC_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2250 TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2251 SSL_kDHE,
2252 SSL_aRSA,
2253 SSL_CAMELLIA256,
2254 SSL_SHA256,
2255 TLS1_2_VERSION, TLS1_2_VERSION,
2256 DTLS1_2_VERSION, DTLS1_2_VERSION,
2257 SSL_NOT_DEFAULT | SSL_HIGH,
2258 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2259 256,
2260 256,
2261 },
2262 {
2263 1,
2264 TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA256,
2265 TLS1_RFC_ADH_WITH_CAMELLIA_256_CBC_SHA256,
2266 TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA256,
2267 SSL_kDHE,
2268 SSL_aNULL,
2269 SSL_CAMELLIA256,
2270 SSL_SHA256,
2271 TLS1_2_VERSION, TLS1_2_VERSION,
2272 DTLS1_2_VERSION, DTLS1_2_VERSION,
2273 SSL_NOT_DEFAULT | SSL_HIGH,
2274 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2275 256,
2276 256,
2277 },
2278 {
2279 1,
2280 TLS1_TXT_RSA_WITH_CAMELLIA_256_CBC_SHA,
2281 TLS1_RFC_RSA_WITH_CAMELLIA_256_CBC_SHA,
2282 TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA,
2283 SSL_kRSA,
2284 SSL_aRSA,
2285 SSL_CAMELLIA256,
2286 SSL_SHA1,
2287 SSL3_VERSION, TLS1_2_VERSION,
2288 DTLS1_BAD_VER, DTLS1_2_VERSION,
2289 SSL_NOT_DEFAULT | SSL_HIGH,
2290 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2291 256,
2292 256,
2293 },
2294 {
2295 1,
2296 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,
2297 TLS1_RFC_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,
2298 TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,
2299 SSL_kDHE,
2300 SSL_aDSS,
2301 SSL_CAMELLIA256,
2302 SSL_SHA1,
2303 SSL3_VERSION, TLS1_2_VERSION,
2304 DTLS1_BAD_VER, DTLS1_2_VERSION,
2305 SSL_NOT_DEFAULT | SSL_HIGH,
2306 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2307 256,
2308 256,
2309 },
2310 {
2311 1,
2312 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,
2313 TLS1_RFC_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,
2314 TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,
2315 SSL_kDHE,
2316 SSL_aRSA,
2317 SSL_CAMELLIA256,
2318 SSL_SHA1,
2319 SSL3_VERSION, TLS1_2_VERSION,
2320 DTLS1_BAD_VER, DTLS1_2_VERSION,
2321 SSL_NOT_DEFAULT | SSL_HIGH,
2322 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2323 256,
2324 256,
2325 },
2326 {
2327 1,
2328 TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA,
2329 TLS1_RFC_ADH_WITH_CAMELLIA_256_CBC_SHA,
2330 TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA,
2331 SSL_kDHE,
2332 SSL_aNULL,
2333 SSL_CAMELLIA256,
2334 SSL_SHA1,
2335 SSL3_VERSION, TLS1_2_VERSION,
2336 DTLS1_BAD_VER, DTLS1_2_VERSION,
2337 SSL_NOT_DEFAULT | SSL_HIGH,
2338 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2339 256,
2340 256,
2341 },
2342 {
2343 1,
2344 TLS1_TXT_RSA_WITH_CAMELLIA_128_CBC_SHA,
2345 TLS1_RFC_RSA_WITH_CAMELLIA_128_CBC_SHA,
2346 TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA,
2347 SSL_kRSA,
2348 SSL_aRSA,
2349 SSL_CAMELLIA128,
2350 SSL_SHA1,
2351 SSL3_VERSION, TLS1_2_VERSION,
2352 DTLS1_BAD_VER, DTLS1_2_VERSION,
2353 SSL_NOT_DEFAULT | SSL_HIGH,
2354 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2355 128,
2356 128,
2357 },
2358 {
2359 1,
2360 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,
2361 TLS1_RFC_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,
2362 TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,
2363 SSL_kDHE,
2364 SSL_aDSS,
2365 SSL_CAMELLIA128,
2366 SSL_SHA1,
2367 SSL3_VERSION, TLS1_2_VERSION,
2368 DTLS1_BAD_VER, DTLS1_2_VERSION,
2369 SSL_NOT_DEFAULT | SSL_HIGH,
2370 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2371 128,
2372 128,
2373 },
2374 {
2375 1,
2376 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,
2377 TLS1_RFC_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,
2378 TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,
2379 SSL_kDHE,
2380 SSL_aRSA,
2381 SSL_CAMELLIA128,
2382 SSL_SHA1,
2383 SSL3_VERSION, TLS1_2_VERSION,
2384 DTLS1_BAD_VER, DTLS1_2_VERSION,
2385 SSL_NOT_DEFAULT | SSL_HIGH,
2386 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2387 128,
2388 128,
2389 },
2390 {
2391 1,
2392 TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA,
2393 TLS1_RFC_ADH_WITH_CAMELLIA_128_CBC_SHA,
2394 TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA,
2395 SSL_kDHE,
2396 SSL_aNULL,
2397 SSL_CAMELLIA128,
2398 SSL_SHA1,
2399 SSL3_VERSION, TLS1_2_VERSION,
2400 DTLS1_BAD_VER, DTLS1_2_VERSION,
2401 SSL_NOT_DEFAULT | SSL_HIGH,
2402 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2403 128,
2404 128,
2405 },
2406 {
2407 1,
2408 TLS1_TXT_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,
2409 TLS1_RFC_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,
2410 TLS1_CK_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,
2411 SSL_kECDHE,
2412 SSL_aECDSA,
2413 SSL_CAMELLIA128,
2414 SSL_SHA256,
2415 TLS1_2_VERSION, TLS1_2_VERSION,
2416 DTLS1_2_VERSION, DTLS1_2_VERSION,
2417 SSL_NOT_DEFAULT | SSL_HIGH,
2418 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2419 128,
2420 128,
2421 },
2422 {
2423 1,
2424 TLS1_TXT_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,
2425 TLS1_RFC_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,
2426 TLS1_CK_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,
2427 SSL_kECDHE,
2428 SSL_aECDSA,
2429 SSL_CAMELLIA256,
2430 SSL_SHA384,
2431 TLS1_2_VERSION, TLS1_2_VERSION,
2432 DTLS1_2_VERSION, DTLS1_2_VERSION,
2433 SSL_NOT_DEFAULT | SSL_HIGH,
2434 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2435 256,
2436 256,
2437 },
2438 {
2439 1,
2440 TLS1_TXT_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2441 TLS1_RFC_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2442 TLS1_CK_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2443 SSL_kECDHE,
2444 SSL_aRSA,
2445 SSL_CAMELLIA128,
2446 SSL_SHA256,
2447 TLS1_2_VERSION, TLS1_2_VERSION,
2448 DTLS1_2_VERSION, DTLS1_2_VERSION,
2449 SSL_NOT_DEFAULT | SSL_HIGH,
2450 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2451 128,
2452 128,
2453 },
2454 {
2455 1,
2456 TLS1_TXT_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384,
2457 TLS1_RFC_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384,
2458 TLS1_CK_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384,
2459 SSL_kECDHE,
2460 SSL_aRSA,
2461 SSL_CAMELLIA256,
2462 SSL_SHA384,
2463 TLS1_2_VERSION, TLS1_2_VERSION,
2464 DTLS1_2_VERSION, DTLS1_2_VERSION,
2465 SSL_NOT_DEFAULT | SSL_HIGH,
2466 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2467 256,
2468 256,
2469 },
2470 {
2471 1,
2472 TLS1_TXT_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2473 TLS1_RFC_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2474 TLS1_CK_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2475 SSL_kPSK,
2476 SSL_aPSK,
2477 SSL_CAMELLIA128,
2478 SSL_SHA256,
2479 TLS1_VERSION, TLS1_2_VERSION,
2480 DTLS1_BAD_VER, DTLS1_2_VERSION,
2481 SSL_NOT_DEFAULT | SSL_HIGH,
2482 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2483 128,
2484 128,
2485 },
2486 {
2487 1,
2488 TLS1_TXT_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2489 TLS1_RFC_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2490 TLS1_CK_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2491 SSL_kPSK,
2492 SSL_aPSK,
2493 SSL_CAMELLIA256,
2494 SSL_SHA384,
2495 TLS1_VERSION, TLS1_2_VERSION,
2496 DTLS1_BAD_VER, DTLS1_2_VERSION,
2497 SSL_NOT_DEFAULT | SSL_HIGH,
2498 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2499 256,
2500 256,
2501 },
2502 {
2503 1,
2504 TLS1_TXT_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2505 TLS1_RFC_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2506 TLS1_CK_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2507 SSL_kDHEPSK,
2508 SSL_aPSK,
2509 SSL_CAMELLIA128,
2510 SSL_SHA256,
2511 TLS1_VERSION, TLS1_2_VERSION,
2512 DTLS1_BAD_VER, DTLS1_2_VERSION,
2513 SSL_NOT_DEFAULT | SSL_HIGH,
2514 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2515 128,
2516 128,
2517 },
2518 {
2519 1,
2520 TLS1_TXT_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2521 TLS1_RFC_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2522 TLS1_CK_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2523 SSL_kDHEPSK,
2524 SSL_aPSK,
2525 SSL_CAMELLIA256,
2526 SSL_SHA384,
2527 TLS1_VERSION, TLS1_2_VERSION,
2528 DTLS1_BAD_VER, DTLS1_2_VERSION,
2529 SSL_NOT_DEFAULT | SSL_HIGH,
2530 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2531 256,
2532 256,
2533 },
2534 {
2535 1,
2536 TLS1_TXT_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2537 TLS1_RFC_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2538 TLS1_CK_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2539 SSL_kRSAPSK,
2540 SSL_aRSA,
2541 SSL_CAMELLIA128,
2542 SSL_SHA256,
2543 TLS1_VERSION, TLS1_2_VERSION,
2544 DTLS1_BAD_VER, DTLS1_2_VERSION,
2545 SSL_NOT_DEFAULT | SSL_HIGH,
2546 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2547 128,
2548 128,
2549 },
2550 {
2551 1,
2552 TLS1_TXT_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2553 TLS1_RFC_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2554 TLS1_CK_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2555 SSL_kRSAPSK,
2556 SSL_aRSA,
2557 SSL_CAMELLIA256,
2558 SSL_SHA384,
2559 TLS1_VERSION, TLS1_2_VERSION,
2560 DTLS1_BAD_VER, DTLS1_2_VERSION,
2561 SSL_NOT_DEFAULT | SSL_HIGH,
2562 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2563 256,
2564 256,
2565 },
2566 {
2567 1,
2568 TLS1_TXT_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2569 TLS1_RFC_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2570 TLS1_CK_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2571 SSL_kECDHEPSK,
2572 SSL_aPSK,
2573 SSL_CAMELLIA128,
2574 SSL_SHA256,
2575 TLS1_VERSION, TLS1_2_VERSION,
2576 DTLS1_BAD_VER, DTLS1_2_VERSION,
2577 SSL_NOT_DEFAULT | SSL_HIGH,
2578 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2579 128,
2580 128,
2581 },
2582 {
2583 1,
2584 TLS1_TXT_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2585 TLS1_RFC_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2586 TLS1_CK_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2587 SSL_kECDHEPSK,
2588 SSL_aPSK,
2589 SSL_CAMELLIA256,
2590 SSL_SHA384,
2591 TLS1_VERSION, TLS1_2_VERSION,
2592 DTLS1_BAD_VER, DTLS1_2_VERSION,
2593 SSL_NOT_DEFAULT | SSL_HIGH,
2594 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2595 256,
2596 256,
2597 },
2598
2599 #ifndef OPENSSL_NO_GOST
2600 {
2601 1,
2602 "GOST2001-GOST89-GOST89",
2603 "TLS_GOSTR341001_WITH_28147_CNT_IMIT",
2604 0x3000081,
2605 SSL_kGOST,
2606 SSL_aGOST01,
2607 SSL_eGOST2814789CNT,
2608 SSL_GOST89MAC,
2609 TLS1_VERSION, TLS1_2_VERSION,
2610 0, 0,
2611 SSL_HIGH,
2612 SSL_HANDSHAKE_MAC_GOST94 | TLS1_PRF_GOST94 | TLS1_STREAM_MAC,
2613 256,
2614 256,
2615 },
2616 {
2617 1,
2618 "GOST2001-NULL-GOST94",
2619 "TLS_GOSTR341001_WITH_NULL_GOSTR3411",
2620 0x3000083,
2621 SSL_kGOST,
2622 SSL_aGOST01,
2623 SSL_eNULL,
2624 SSL_GOST94,
2625 TLS1_VERSION, TLS1_2_VERSION,
2626 0, 0,
2627 SSL_STRONG_NONE,
2628 SSL_HANDSHAKE_MAC_GOST94 | TLS1_PRF_GOST94,
2629 0,
2630 0,
2631 },
2632 {
2633 1,
2634 "IANA-GOST2012-GOST8912-GOST8912",
2635 NULL,
2636 0x0300c102,
2637 SSL_kGOST,
2638 SSL_aGOST12 | SSL_aGOST01,
2639 SSL_eGOST2814789CNT12,
2640 SSL_GOST89MAC12,
2641 TLS1_VERSION, TLS1_2_VERSION,
2642 0, 0,
2643 SSL_HIGH,
2644 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC,
2645 256,
2646 256,
2647 },
2648 {
2649 1,
2650 "LEGACY-GOST2012-GOST8912-GOST8912",
2651 NULL,
2652 0x0300ff85,
2653 SSL_kGOST,
2654 SSL_aGOST12 | SSL_aGOST01,
2655 SSL_eGOST2814789CNT12,
2656 SSL_GOST89MAC12,
2657 TLS1_VERSION, TLS1_2_VERSION,
2658 0, 0,
2659 SSL_HIGH,
2660 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC,
2661 256,
2662 256,
2663 },
2664 {
2665 1,
2666 "GOST2012-NULL-GOST12",
2667 NULL,
2668 0x0300ff87,
2669 SSL_kGOST,
2670 SSL_aGOST12 | SSL_aGOST01,
2671 SSL_eNULL,
2672 SSL_GOST12_256,
2673 TLS1_VERSION, TLS1_2_VERSION,
2674 0, 0,
2675 SSL_STRONG_NONE,
2676 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC,
2677 0,
2678 0,
2679 },
2680 {
2681 1,
2682 "GOST2012-KUZNYECHIK-KUZNYECHIKOMAC",
2683 NULL,
2684 0x0300C100,
2685 SSL_kGOST18,
2686 SSL_aGOST12,
2687 SSL_KUZNYECHIK,
2688 SSL_KUZNYECHIKOMAC,
2689 TLS1_2_VERSION, TLS1_2_VERSION,
2690 0, 0,
2691 SSL_HIGH,
2692 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_TLSTREE,
2693 256,
2694 256,
2695 },
2696 {
2697 1,
2698 "GOST2012-MAGMA-MAGMAOMAC",
2699 NULL,
2700 0x0300C101,
2701 SSL_kGOST18,
2702 SSL_aGOST12,
2703 SSL_MAGMA,
2704 SSL_MAGMAOMAC,
2705 TLS1_2_VERSION, TLS1_2_VERSION,
2706 0, 0,
2707 SSL_HIGH,
2708 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_TLSTREE,
2709 256,
2710 256,
2711 },
2712 #endif /* OPENSSL_NO_GOST */
2713
2714 {
2715 1,
2716 SSL3_TXT_RSA_IDEA_128_SHA,
2717 SSL3_RFC_RSA_IDEA_128_SHA,
2718 SSL3_CK_RSA_IDEA_128_SHA,
2719 SSL_kRSA,
2720 SSL_aRSA,
2721 SSL_IDEA,
2722 SSL_SHA1,
2723 SSL3_VERSION, TLS1_1_VERSION,
2724 DTLS1_BAD_VER, DTLS1_VERSION,
2725 SSL_NOT_DEFAULT | SSL_MEDIUM,
2726 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2727 128,
2728 128,
2729 },
2730
2731 {
2732 1,
2733 TLS1_TXT_RSA_WITH_SEED_SHA,
2734 TLS1_RFC_RSA_WITH_SEED_SHA,
2735 TLS1_CK_RSA_WITH_SEED_SHA,
2736 SSL_kRSA,
2737 SSL_aRSA,
2738 SSL_SEED,
2739 SSL_SHA1,
2740 SSL3_VERSION, TLS1_2_VERSION,
2741 DTLS1_BAD_VER, DTLS1_2_VERSION,
2742 SSL_NOT_DEFAULT | SSL_MEDIUM,
2743 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2744 128,
2745 128,
2746 },
2747 {
2748 1,
2749 TLS1_TXT_DHE_DSS_WITH_SEED_SHA,
2750 TLS1_RFC_DHE_DSS_WITH_SEED_SHA,
2751 TLS1_CK_DHE_DSS_WITH_SEED_SHA,
2752 SSL_kDHE,
2753 SSL_aDSS,
2754 SSL_SEED,
2755 SSL_SHA1,
2756 SSL3_VERSION, TLS1_2_VERSION,
2757 DTLS1_BAD_VER, DTLS1_2_VERSION,
2758 SSL_NOT_DEFAULT | SSL_MEDIUM,
2759 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2760 128,
2761 128,
2762 },
2763 {
2764 1,
2765 TLS1_TXT_DHE_RSA_WITH_SEED_SHA,
2766 TLS1_RFC_DHE_RSA_WITH_SEED_SHA,
2767 TLS1_CK_DHE_RSA_WITH_SEED_SHA,
2768 SSL_kDHE,
2769 SSL_aRSA,
2770 SSL_SEED,
2771 SSL_SHA1,
2772 SSL3_VERSION, TLS1_2_VERSION,
2773 DTLS1_BAD_VER, DTLS1_2_VERSION,
2774 SSL_NOT_DEFAULT | SSL_MEDIUM,
2775 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2776 128,
2777 128,
2778 },
2779 {
2780 1,
2781 TLS1_TXT_ADH_WITH_SEED_SHA,
2782 TLS1_RFC_ADH_WITH_SEED_SHA,
2783 TLS1_CK_ADH_WITH_SEED_SHA,
2784 SSL_kDHE,
2785 SSL_aNULL,
2786 SSL_SEED,
2787 SSL_SHA1,
2788 SSL3_VERSION, TLS1_2_VERSION,
2789 DTLS1_BAD_VER, DTLS1_2_VERSION,
2790 SSL_NOT_DEFAULT | SSL_MEDIUM,
2791 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2792 128,
2793 128,
2794 },
2795
2796 #ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
2797 {
2798 1,
2799 SSL3_TXT_RSA_RC4_128_MD5,
2800 SSL3_RFC_RSA_RC4_128_MD5,
2801 SSL3_CK_RSA_RC4_128_MD5,
2802 SSL_kRSA,
2803 SSL_aRSA,
2804 SSL_RC4,
2805 SSL_MD5,
2806 SSL3_VERSION, TLS1_2_VERSION,
2807 0, 0,
2808 SSL_NOT_DEFAULT | SSL_MEDIUM,
2809 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2810 80,
2811 128,
2812 },
2813 {
2814 1,
2815 SSL3_TXT_RSA_RC4_128_SHA,
2816 SSL3_RFC_RSA_RC4_128_SHA,
2817 SSL3_CK_RSA_RC4_128_SHA,
2818 SSL_kRSA,
2819 SSL_aRSA,
2820 SSL_RC4,
2821 SSL_SHA1,
2822 SSL3_VERSION, TLS1_2_VERSION,
2823 0, 0,
2824 SSL_NOT_DEFAULT | SSL_MEDIUM,
2825 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2826 80,
2827 128,
2828 },
2829 {
2830 1,
2831 SSL3_TXT_ADH_RC4_128_MD5,
2832 SSL3_RFC_ADH_RC4_128_MD5,
2833 SSL3_CK_ADH_RC4_128_MD5,
2834 SSL_kDHE,
2835 SSL_aNULL,
2836 SSL_RC4,
2837 SSL_MD5,
2838 SSL3_VERSION, TLS1_2_VERSION,
2839 0, 0,
2840 SSL_NOT_DEFAULT | SSL_MEDIUM,
2841 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2842 80,
2843 128,
2844 },
2845 {
2846 1,
2847 TLS1_TXT_ECDHE_PSK_WITH_RC4_128_SHA,
2848 TLS1_RFC_ECDHE_PSK_WITH_RC4_128_SHA,
2849 TLS1_CK_ECDHE_PSK_WITH_RC4_128_SHA,
2850 SSL_kECDHEPSK,
2851 SSL_aPSK,
2852 SSL_RC4,
2853 SSL_SHA1,
2854 TLS1_VERSION, TLS1_2_VERSION,
2855 0, 0,
2856 SSL_NOT_DEFAULT | SSL_MEDIUM,
2857 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2858 80,
2859 128,
2860 },
2861 {
2862 1,
2863 TLS1_TXT_ECDH_anon_WITH_RC4_128_SHA,
2864 TLS1_RFC_ECDH_anon_WITH_RC4_128_SHA,
2865 TLS1_CK_ECDH_anon_WITH_RC4_128_SHA,
2866 SSL_kECDHE,
2867 SSL_aNULL,
2868 SSL_RC4,
2869 SSL_SHA1,
2870 TLS1_VERSION, TLS1_2_VERSION,
2871 0, 0,
2872 SSL_NOT_DEFAULT | SSL_MEDIUM,
2873 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2874 80,
2875 128,
2876 },
2877 {
2878 1,
2879 TLS1_TXT_ECDHE_ECDSA_WITH_RC4_128_SHA,
2880 TLS1_RFC_ECDHE_ECDSA_WITH_RC4_128_SHA,
2881 TLS1_CK_ECDHE_ECDSA_WITH_RC4_128_SHA,
2882 SSL_kECDHE,
2883 SSL_aECDSA,
2884 SSL_RC4,
2885 SSL_SHA1,
2886 TLS1_VERSION, TLS1_2_VERSION,
2887 0, 0,
2888 SSL_NOT_DEFAULT | SSL_MEDIUM,
2889 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2890 80,
2891 128,
2892 },
2893 {
2894 1,
2895 TLS1_TXT_ECDHE_RSA_WITH_RC4_128_SHA,
2896 TLS1_RFC_ECDHE_RSA_WITH_RC4_128_SHA,
2897 TLS1_CK_ECDHE_RSA_WITH_RC4_128_SHA,
2898 SSL_kECDHE,
2899 SSL_aRSA,
2900 SSL_RC4,
2901 SSL_SHA1,
2902 TLS1_VERSION, TLS1_2_VERSION,
2903 0, 0,
2904 SSL_NOT_DEFAULT | SSL_MEDIUM,
2905 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2906 80,
2907 128,
2908 },
2909 {
2910 1,
2911 TLS1_TXT_PSK_WITH_RC4_128_SHA,
2912 TLS1_RFC_PSK_WITH_RC4_128_SHA,
2913 TLS1_CK_PSK_WITH_RC4_128_SHA,
2914 SSL_kPSK,
2915 SSL_aPSK,
2916 SSL_RC4,
2917 SSL_SHA1,
2918 SSL3_VERSION, TLS1_2_VERSION,
2919 0, 0,
2920 SSL_NOT_DEFAULT | SSL_MEDIUM,
2921 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2922 80,
2923 128,
2924 },
2925 {
2926 1,
2927 TLS1_TXT_RSA_PSK_WITH_RC4_128_SHA,
2928 TLS1_RFC_RSA_PSK_WITH_RC4_128_SHA,
2929 TLS1_CK_RSA_PSK_WITH_RC4_128_SHA,
2930 SSL_kRSAPSK,
2931 SSL_aRSA,
2932 SSL_RC4,
2933 SSL_SHA1,
2934 SSL3_VERSION, TLS1_2_VERSION,
2935 0, 0,
2936 SSL_NOT_DEFAULT | SSL_MEDIUM,
2937 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2938 80,
2939 128,
2940 },
2941 {
2942 1,
2943 TLS1_TXT_DHE_PSK_WITH_RC4_128_SHA,
2944 TLS1_RFC_DHE_PSK_WITH_RC4_128_SHA,
2945 TLS1_CK_DHE_PSK_WITH_RC4_128_SHA,
2946 SSL_kDHEPSK,
2947 SSL_aPSK,
2948 SSL_RC4,
2949 SSL_SHA1,
2950 SSL3_VERSION, TLS1_2_VERSION,
2951 0, 0,
2952 SSL_NOT_DEFAULT | SSL_MEDIUM,
2953 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2954 80,
2955 128,
2956 },
2957 #endif /* OPENSSL_NO_WEAK_SSL_CIPHERS */
2958
2959 {
2960 1,
2961 TLS1_TXT_RSA_WITH_ARIA_128_GCM_SHA256,
2962 TLS1_RFC_RSA_WITH_ARIA_128_GCM_SHA256,
2963 TLS1_CK_RSA_WITH_ARIA_128_GCM_SHA256,
2964 SSL_kRSA,
2965 SSL_aRSA,
2966 SSL_ARIA128GCM,
2967 SSL_AEAD,
2968 TLS1_2_VERSION, TLS1_2_VERSION,
2969 DTLS1_2_VERSION, DTLS1_2_VERSION,
2970 SSL_NOT_DEFAULT | SSL_HIGH,
2971 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2972 128,
2973 128,
2974 },
2975 {
2976 1,
2977 TLS1_TXT_RSA_WITH_ARIA_256_GCM_SHA384,
2978 TLS1_RFC_RSA_WITH_ARIA_256_GCM_SHA384,
2979 TLS1_CK_RSA_WITH_ARIA_256_GCM_SHA384,
2980 SSL_kRSA,
2981 SSL_aRSA,
2982 SSL_ARIA256GCM,
2983 SSL_AEAD,
2984 TLS1_2_VERSION, TLS1_2_VERSION,
2985 DTLS1_2_VERSION, DTLS1_2_VERSION,
2986 SSL_NOT_DEFAULT | SSL_HIGH,
2987 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2988 256,
2989 256,
2990 },
2991 {
2992 1,
2993 TLS1_TXT_DHE_RSA_WITH_ARIA_128_GCM_SHA256,
2994 TLS1_RFC_DHE_RSA_WITH_ARIA_128_GCM_SHA256,
2995 TLS1_CK_DHE_RSA_WITH_ARIA_128_GCM_SHA256,
2996 SSL_kDHE,
2997 SSL_aRSA,
2998 SSL_ARIA128GCM,
2999 SSL_AEAD,
3000 TLS1_2_VERSION, TLS1_2_VERSION,
3001 DTLS1_2_VERSION, DTLS1_2_VERSION,
3002 SSL_NOT_DEFAULT | SSL_HIGH,
3003 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3004 128,
3005 128,
3006 },
3007 {
3008 1,
3009 TLS1_TXT_DHE_RSA_WITH_ARIA_256_GCM_SHA384,
3010 TLS1_RFC_DHE_RSA_WITH_ARIA_256_GCM_SHA384,
3011 TLS1_CK_DHE_RSA_WITH_ARIA_256_GCM_SHA384,
3012 SSL_kDHE,
3013 SSL_aRSA,
3014 SSL_ARIA256GCM,
3015 SSL_AEAD,
3016 TLS1_2_VERSION, TLS1_2_VERSION,
3017 DTLS1_2_VERSION, DTLS1_2_VERSION,
3018 SSL_NOT_DEFAULT | SSL_HIGH,
3019 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3020 256,
3021 256,
3022 },
3023 {
3024 1,
3025 TLS1_TXT_DHE_DSS_WITH_ARIA_128_GCM_SHA256,
3026 TLS1_RFC_DHE_DSS_WITH_ARIA_128_GCM_SHA256,
3027 TLS1_CK_DHE_DSS_WITH_ARIA_128_GCM_SHA256,
3028 SSL_kDHE,
3029 SSL_aDSS,
3030 SSL_ARIA128GCM,
3031 SSL_AEAD,
3032 TLS1_2_VERSION, TLS1_2_VERSION,
3033 DTLS1_2_VERSION, DTLS1_2_VERSION,
3034 SSL_NOT_DEFAULT | SSL_HIGH,
3035 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3036 128,
3037 128,
3038 },
3039 {
3040 1,
3041 TLS1_TXT_DHE_DSS_WITH_ARIA_256_GCM_SHA384,
3042 TLS1_RFC_DHE_DSS_WITH_ARIA_256_GCM_SHA384,
3043 TLS1_CK_DHE_DSS_WITH_ARIA_256_GCM_SHA384,
3044 SSL_kDHE,
3045 SSL_aDSS,
3046 SSL_ARIA256GCM,
3047 SSL_AEAD,
3048 TLS1_2_VERSION, TLS1_2_VERSION,
3049 DTLS1_2_VERSION, DTLS1_2_VERSION,
3050 SSL_NOT_DEFAULT | SSL_HIGH,
3051 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3052 256,
3053 256,
3054 },
3055 {
3056 1,
3057 TLS1_TXT_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256,
3058 TLS1_RFC_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256,
3059 TLS1_CK_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256,
3060 SSL_kECDHE,
3061 SSL_aECDSA,
3062 SSL_ARIA128GCM,
3063 SSL_AEAD,
3064 TLS1_2_VERSION, TLS1_2_VERSION,
3065 DTLS1_2_VERSION, DTLS1_2_VERSION,
3066 SSL_NOT_DEFAULT | SSL_HIGH,
3067 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3068 128,
3069 128,
3070 },
3071 {
3072 1,
3073 TLS1_TXT_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384,
3074 TLS1_RFC_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384,
3075 TLS1_CK_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384,
3076 SSL_kECDHE,
3077 SSL_aECDSA,
3078 SSL_ARIA256GCM,
3079 SSL_AEAD,
3080 TLS1_2_VERSION, TLS1_2_VERSION,
3081 DTLS1_2_VERSION, DTLS1_2_VERSION,
3082 SSL_NOT_DEFAULT | SSL_HIGH,
3083 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3084 256,
3085 256,
3086 },
3087 {
3088 1,
3089 TLS1_TXT_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256,
3090 TLS1_RFC_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256,
3091 TLS1_CK_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256,
3092 SSL_kECDHE,
3093 SSL_aRSA,
3094 SSL_ARIA128GCM,
3095 SSL_AEAD,
3096 TLS1_2_VERSION, TLS1_2_VERSION,
3097 DTLS1_2_VERSION, DTLS1_2_VERSION,
3098 SSL_NOT_DEFAULT | SSL_HIGH,
3099 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3100 128,
3101 128,
3102 },
3103 {
3104 1,
3105 TLS1_TXT_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384,
3106 TLS1_RFC_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384,
3107 TLS1_CK_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384,
3108 SSL_kECDHE,
3109 SSL_aRSA,
3110 SSL_ARIA256GCM,
3111 SSL_AEAD,
3112 TLS1_2_VERSION, TLS1_2_VERSION,
3113 DTLS1_2_VERSION, DTLS1_2_VERSION,
3114 SSL_NOT_DEFAULT | SSL_HIGH,
3115 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3116 256,
3117 256,
3118 },
3119 {
3120 1,
3121 TLS1_TXT_PSK_WITH_ARIA_128_GCM_SHA256,
3122 TLS1_RFC_PSK_WITH_ARIA_128_GCM_SHA256,
3123 TLS1_CK_PSK_WITH_ARIA_128_GCM_SHA256,
3124 SSL_kPSK,
3125 SSL_aPSK,
3126 SSL_ARIA128GCM,
3127 SSL_AEAD,
3128 TLS1_2_VERSION, TLS1_2_VERSION,
3129 DTLS1_2_VERSION, DTLS1_2_VERSION,
3130 SSL_NOT_DEFAULT | SSL_HIGH,
3131 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3132 128,
3133 128,
3134 },
3135 {
3136 1,
3137 TLS1_TXT_PSK_WITH_ARIA_256_GCM_SHA384,
3138 TLS1_RFC_PSK_WITH_ARIA_256_GCM_SHA384,
3139 TLS1_CK_PSK_WITH_ARIA_256_GCM_SHA384,
3140 SSL_kPSK,
3141 SSL_aPSK,
3142 SSL_ARIA256GCM,
3143 SSL_AEAD,
3144 TLS1_2_VERSION, TLS1_2_VERSION,
3145 DTLS1_2_VERSION, DTLS1_2_VERSION,
3146 SSL_NOT_DEFAULT | SSL_HIGH,
3147 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3148 256,
3149 256,
3150 },
3151 {
3152 1,
3153 TLS1_TXT_DHE_PSK_WITH_ARIA_128_GCM_SHA256,
3154 TLS1_RFC_DHE_PSK_WITH_ARIA_128_GCM_SHA256,
3155 TLS1_CK_DHE_PSK_WITH_ARIA_128_GCM_SHA256,
3156 SSL_kDHEPSK,
3157 SSL_aPSK,
3158 SSL_ARIA128GCM,
3159 SSL_AEAD,
3160 TLS1_2_VERSION, TLS1_2_VERSION,
3161 DTLS1_2_VERSION, DTLS1_2_VERSION,
3162 SSL_NOT_DEFAULT | SSL_HIGH,
3163 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3164 128,
3165 128,
3166 },
3167 {
3168 1,
3169 TLS1_TXT_DHE_PSK_WITH_ARIA_256_GCM_SHA384,
3170 TLS1_RFC_DHE_PSK_WITH_ARIA_256_GCM_SHA384,
3171 TLS1_CK_DHE_PSK_WITH_ARIA_256_GCM_SHA384,
3172 SSL_kDHEPSK,
3173 SSL_aPSK,
3174 SSL_ARIA256GCM,
3175 SSL_AEAD,
3176 TLS1_2_VERSION, TLS1_2_VERSION,
3177 DTLS1_2_VERSION, DTLS1_2_VERSION,
3178 SSL_NOT_DEFAULT | SSL_HIGH,
3179 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3180 256,
3181 256,
3182 },
3183 {
3184 1,
3185 TLS1_TXT_RSA_PSK_WITH_ARIA_128_GCM_SHA256,
3186 TLS1_RFC_RSA_PSK_WITH_ARIA_128_GCM_SHA256,
3187 TLS1_CK_RSA_PSK_WITH_ARIA_128_GCM_SHA256,
3188 SSL_kRSAPSK,
3189 SSL_aRSA,
3190 SSL_ARIA128GCM,
3191 SSL_AEAD,
3192 TLS1_2_VERSION, TLS1_2_VERSION,
3193 DTLS1_2_VERSION, DTLS1_2_VERSION,
3194 SSL_NOT_DEFAULT | SSL_HIGH,
3195 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3196 128,
3197 128,
3198 },
3199 {
3200 1,
3201 TLS1_TXT_RSA_PSK_WITH_ARIA_256_GCM_SHA384,
3202 TLS1_RFC_RSA_PSK_WITH_ARIA_256_GCM_SHA384,
3203 TLS1_CK_RSA_PSK_WITH_ARIA_256_GCM_SHA384,
3204 SSL_kRSAPSK,
3205 SSL_aRSA,
3206 SSL_ARIA256GCM,
3207 SSL_AEAD,
3208 TLS1_2_VERSION, TLS1_2_VERSION,
3209 DTLS1_2_VERSION, DTLS1_2_VERSION,
3210 SSL_NOT_DEFAULT | SSL_HIGH,
3211 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3212 256,
3213 256,
3214 },
3215 };
3216
3217 /*
3218 * The list of known Signalling Cipher-Suite Value "ciphers", non-valid
3219 * values stuffed into the ciphers field of the wire protocol for signalling
3220 * purposes.
3221 */
3222 static SSL_CIPHER ssl3_scsvs[] = {
3223 {
3224 0,
3225 "TLS_EMPTY_RENEGOTIATION_INFO_SCSV",
3226 "TLS_EMPTY_RENEGOTIATION_INFO_SCSV",
3227 SSL3_CK_SCSV,
3228 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
3229 },
3230 {
3231 0,
3232 "TLS_FALLBACK_SCSV",
3233 "TLS_FALLBACK_SCSV",
3234 SSL3_CK_FALLBACK_SCSV,
3235 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
3236 },
3237 };
3238
3239 static int cipher_compare(const void *a, const void *b)
3240 {
3241 const SSL_CIPHER *ap = (const SSL_CIPHER *)a;
3242 const SSL_CIPHER *bp = (const SSL_CIPHER *)b;
3243
3244 if (ap->id == bp->id)
3245 return 0;
3246 return ap->id < bp->id ? -1 : 1;
3247 }
3248
3249 void ssl_sort_cipher_list(void)
3250 {
3251 qsort(tls13_ciphers, TLS13_NUM_CIPHERS, sizeof(tls13_ciphers[0]),
3252 cipher_compare);
3253 qsort(ssl3_ciphers, SSL3_NUM_CIPHERS, sizeof(ssl3_ciphers[0]),
3254 cipher_compare);
3255 qsort(ssl3_scsvs, SSL3_NUM_SCSVS, sizeof(ssl3_scsvs[0]), cipher_compare);
3256 }
3257
3258 static int sslcon_undefined_function_1(SSL_CONNECTION *sc, unsigned char *r,
3259 size_t s, const char *t, size_t u,
3260 const unsigned char *v, size_t w, int x)
3261 {
3262 (void)r;
3263 (void)s;
3264 (void)t;
3265 (void)u;
3266 (void)v;
3267 (void)w;
3268 (void)x;
3269 return ssl_undefined_function(SSL_CONNECTION_GET_SSL(sc));
3270 }
3271
3272 const SSL3_ENC_METHOD SSLv3_enc_data = {
3273 ssl3_enc,
3274 n_ssl3_mac,
3275 ssl3_setup_key_block,
3276 ssl3_generate_master_secret,
3277 ssl3_change_cipher_state,
3278 ssl3_final_finish_mac,
3279 SSL3_MD_CLIENT_FINISHED_CONST, 4,
3280 SSL3_MD_SERVER_FINISHED_CONST, 4,
3281 ssl3_alert_code,
3282 sslcon_undefined_function_1,
3283 0,
3284 ssl3_set_handshake_header,
3285 tls_close_construct_packet,
3286 ssl3_handshake_write
3287 };
3288
3289 OSSL_TIME ssl3_default_timeout(void)
3290 {
3291 /*
3292 * 2 hours, the 24 hours mentioned in the SSLv3 spec is way too long for
3293 * http, the cache would over fill
3294 */
3295 return ossl_seconds2time(60 * 60 * 2);
3296 }
3297
3298 int ssl3_num_ciphers(void)
3299 {
3300 return SSL3_NUM_CIPHERS;
3301 }
3302
3303 const SSL_CIPHER *ssl3_get_cipher(unsigned int u)
3304 {
3305 if (u < SSL3_NUM_CIPHERS)
3306 return &(ssl3_ciphers[SSL3_NUM_CIPHERS - 1 - u]);
3307 else
3308 return NULL;
3309 }
3310
3311 int ssl3_set_handshake_header(SSL_CONNECTION *s, WPACKET *pkt, int htype)
3312 {
3313 /* No header in the event of a CCS */
3314 if (htype == SSL3_MT_CHANGE_CIPHER_SPEC)
3315 return 1;
3316
3317 /* Set the content type and 3 bytes for the message len */
3318 if (!WPACKET_put_bytes_u8(pkt, htype)
3319 || !WPACKET_start_sub_packet_u24(pkt))
3320 return 0;
3321
3322 return 1;
3323 }
3324
3325 int ssl3_handshake_write(SSL_CONNECTION *s)
3326 {
3327 return ssl3_do_write(s, SSL3_RT_HANDSHAKE);
3328 }
3329
3330 int ssl3_new(SSL *s)
3331 {
3332 #ifndef OPENSSL_NO_SRP
3333 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s);
3334
3335 if (sc == NULL)
3336 return 0;
3337
3338 if (!ssl_srp_ctx_init_intern(sc))
3339 return 0;
3340 #endif
3341
3342 if (!s->method->ssl_clear(s))
3343 return 0;
3344
3345 return 1;
3346 }
3347
3348 void ssl3_free(SSL *s)
3349 {
3350 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s);
3351
3352 if (sc == NULL)
3353 return;
3354
3355 ssl3_cleanup_key_block(sc);
3356
3357 EVP_PKEY_free(sc->s3.peer_tmp);
3358 sc->s3.peer_tmp = NULL;
3359 EVP_PKEY_free(sc->s3.tmp.pkey);
3360 sc->s3.tmp.pkey = NULL;
3361
3362 ssl_evp_cipher_free(sc->s3.tmp.new_sym_enc);
3363 ssl_evp_md_free(sc->s3.tmp.new_hash);
3364
3365 OPENSSL_free(sc->s3.tmp.ctype);
3366 sk_X509_NAME_pop_free(sc->s3.tmp.peer_ca_names, X509_NAME_free);
3367 OPENSSL_free(sc->s3.tmp.ciphers_raw);
3368 OPENSSL_clear_free(sc->s3.tmp.pms, sc->s3.tmp.pmslen);
3369 OPENSSL_free(sc->s3.tmp.peer_sigalgs);
3370 OPENSSL_free(sc->s3.tmp.peer_cert_sigalgs);
3371 ssl3_free_digest_list(sc);
3372 OPENSSL_free(sc->s3.alpn_selected);
3373 OPENSSL_free(sc->s3.alpn_proposed);
3374
3375 #ifndef OPENSSL_NO_SRP
3376 ssl_srp_ctx_free_intern(sc);
3377 #endif
3378 memset(&sc->s3, 0, sizeof(sc->s3));
3379 }
3380
3381 int ssl3_clear(SSL *s)
3382 {
3383 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s);
3384
3385 if (sc == NULL)
3386 return 0;
3387
3388 ssl3_cleanup_key_block(sc);
3389 OPENSSL_free(sc->s3.tmp.ctype);
3390 sk_X509_NAME_pop_free(sc->s3.tmp.peer_ca_names, X509_NAME_free);
3391 OPENSSL_free(sc->s3.tmp.ciphers_raw);
3392 OPENSSL_clear_free(sc->s3.tmp.pms, sc->s3.tmp.pmslen);
3393 OPENSSL_free(sc->s3.tmp.peer_sigalgs);
3394 OPENSSL_free(sc->s3.tmp.peer_cert_sigalgs);
3395
3396 EVP_PKEY_free(sc->s3.tmp.pkey);
3397 EVP_PKEY_free(sc->s3.peer_tmp);
3398
3399 ssl3_free_digest_list(sc);
3400
3401 OPENSSL_free(sc->s3.alpn_selected);
3402 OPENSSL_free(sc->s3.alpn_proposed);
3403
3404 /* NULL/zero-out everything in the s3 struct */
3405 memset(&sc->s3, 0, sizeof(sc->s3));
3406
3407 if (!ssl_free_wbio_buffer(sc))
3408 return 0;
3409
3410 sc->version = SSL3_VERSION;
3411
3412 #if !defined(OPENSSL_NO_NEXTPROTONEG)
3413 OPENSSL_free(sc->ext.npn);
3414 sc->ext.npn = NULL;
3415 sc->ext.npn_len = 0;
3416 #endif
3417
3418 return 1;
3419 }
3420
3421 #ifndef OPENSSL_NO_SRP
3422 static char *srp_password_from_info_cb(SSL *s, void *arg)
3423 {
3424 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s);
3425
3426 if (sc == NULL)
3427 return NULL;
3428
3429 return OPENSSL_strdup(sc->srp_ctx.info);
3430 }
3431 #endif
3432
3433 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len);
3434
3435 long ssl3_ctrl(SSL *s, int cmd, long larg, void *parg)
3436 {
3437 int ret = 0;
3438 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s);
3439
3440 if (sc == NULL)
3441 return ret;
3442
3443 switch (cmd) {
3444 case SSL_CTRL_GET_CLIENT_CERT_REQUEST:
3445 break;
3446 case SSL_CTRL_GET_NUM_RENEGOTIATIONS:
3447 ret = sc->s3.num_renegotiations;
3448 break;
3449 case SSL_CTRL_CLEAR_NUM_RENEGOTIATIONS:
3450 ret = sc->s3.num_renegotiations;
3451 sc->s3.num_renegotiations = 0;
3452 break;
3453 case SSL_CTRL_GET_TOTAL_RENEGOTIATIONS:
3454 ret = sc->s3.total_renegotiations;
3455 break;
3456 case SSL_CTRL_GET_FLAGS:
3457 ret = (int)(sc->s3.flags);
3458 break;
3459 #if !defined(OPENSSL_NO_DEPRECATED_3_0)
3460 case SSL_CTRL_SET_TMP_DH:
3461 {
3462 EVP_PKEY *pkdh = NULL;
3463 if (parg == NULL) {
3464 ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER);
3465 return 0;
3466 }
3467 pkdh = ssl_dh_to_pkey(parg);
3468 if (pkdh == NULL) {
3469 ERR_raise(ERR_LIB_SSL, ERR_R_DH_LIB);
3470 return 0;
3471 }
3472 if (!SSL_set0_tmp_dh_pkey(s, pkdh)) {
3473 EVP_PKEY_free(pkdh);
3474 return 0;
3475 }
3476 return 1;
3477 }
3478 break;
3479 case SSL_CTRL_SET_TMP_DH_CB:
3480 {
3481 ERR_raise(ERR_LIB_SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
3482 return ret;
3483 }
3484 #endif
3485 case SSL_CTRL_SET_DH_AUTO:
3486 sc->cert->dh_tmp_auto = larg;
3487 return 1;
3488 #if !defined(OPENSSL_NO_DEPRECATED_3_0)
3489 case SSL_CTRL_SET_TMP_ECDH:
3490 {
3491 if (parg == NULL) {
3492 ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER);
3493 return 0;
3494 }
3495 return ssl_set_tmp_ecdh_groups(&sc->ext.supportedgroups,
3496 &sc->ext.supportedgroups_len,
3497 parg);
3498 }
3499 #endif /* !OPENSSL_NO_DEPRECATED_3_0 */
3500 case SSL_CTRL_SET_TLSEXT_HOSTNAME:
3501 /*
3502 * This API is only used for a client to set what SNI it will request
3503 * from the server, but we currently allow it to be used on servers
3504 * as well, which is a programming error. Currently we just clear
3505 * the field in SSL_do_handshake() for server SSLs, but when we can
3506 * make ABI-breaking changes, we may want to make use of this API
3507 * an error on server SSLs.
3508 */
3509 if (larg == TLSEXT_NAMETYPE_host_name) {
3510 size_t len;
3511
3512 OPENSSL_free(sc->ext.hostname);
3513 sc->ext.hostname = NULL;
3514
3515 ret = 1;
3516 if (parg == NULL)
3517 break;
3518 len = strlen((char *)parg);
3519 if (len == 0 || len > TLSEXT_MAXLEN_host_name) {
3520 ERR_raise(ERR_LIB_SSL, SSL_R_SSL3_EXT_INVALID_SERVERNAME);
3521 return 0;
3522 }
3523 if ((sc->ext.hostname = OPENSSL_strdup((char *)parg)) == NULL) {
3524 ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR);
3525 return 0;
3526 }
3527 } else {
3528 ERR_raise(ERR_LIB_SSL, SSL_R_SSL3_EXT_INVALID_SERVERNAME_TYPE);
3529 return 0;
3530 }
3531 break;
3532 case SSL_CTRL_SET_TLSEXT_DEBUG_ARG:
3533 sc->ext.debug_arg = parg;
3534 ret = 1;
3535 break;
3536
3537 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE:
3538 ret = sc->ext.status_type;
3539 break;
3540
3541 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE:
3542 sc->ext.status_type = larg;
3543 ret = 1;
3544 break;
3545
3546 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS:
3547 *(STACK_OF(X509_EXTENSION) **)parg = sc->ext.ocsp.exts;
3548 ret = 1;
3549 break;
3550
3551 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS:
3552 sc->ext.ocsp.exts = parg;
3553 ret = 1;
3554 break;
3555
3556 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_IDS:
3557 *(STACK_OF(OCSP_RESPID) **)parg = sc->ext.ocsp.ids;
3558 ret = 1;
3559 break;
3560
3561 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_IDS:
3562 sc->ext.ocsp.ids = parg;
3563 ret = 1;
3564 break;
3565
3566 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP:
3567 *(unsigned char **)parg = sc->ext.ocsp.resp;
3568 if (sc->ext.ocsp.resp_len == 0
3569 || sc->ext.ocsp.resp_len > LONG_MAX)
3570 return -1;
3571 return (long)sc->ext.ocsp.resp_len;
3572
3573 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP:
3574 OPENSSL_free(sc->ext.ocsp.resp);
3575 sc->ext.ocsp.resp = parg;
3576 sc->ext.ocsp.resp_len = larg;
3577 ret = 1;
3578 break;
3579
3580 case SSL_CTRL_CHAIN:
3581 if (larg)
3582 return ssl_cert_set1_chain(sc, NULL, (STACK_OF(X509) *)parg);
3583 else
3584 return ssl_cert_set0_chain(sc, NULL, (STACK_OF(X509) *)parg);
3585
3586 case SSL_CTRL_CHAIN_CERT:
3587 if (larg)
3588 return ssl_cert_add1_chain_cert(sc, NULL, (X509 *)parg);
3589 else
3590 return ssl_cert_add0_chain_cert(sc, NULL, (X509 *)parg);
3591
3592 case SSL_CTRL_GET_CHAIN_CERTS:
3593 *(STACK_OF(X509) **)parg = sc->cert->key->chain;
3594 ret = 1;
3595 break;
3596
3597 case SSL_CTRL_SELECT_CURRENT_CERT:
3598 return ssl_cert_select_current(sc->cert, (X509 *)parg);
3599
3600 case SSL_CTRL_SET_CURRENT_CERT:
3601 if (larg == SSL_CERT_SET_SERVER) {
3602 const SSL_CIPHER *cipher;
3603 if (!sc->server)
3604 return 0;
3605 cipher = sc->s3.tmp.new_cipher;
3606 if (cipher == NULL)
3607 return 0;
3608 /*
3609 * No certificate for unauthenticated ciphersuites or using SRP
3610 * authentication
3611 */
3612 if (cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP))
3613 return 2;
3614 if (sc->s3.tmp.cert == NULL)
3615 return 0;
3616 sc->cert->key = sc->s3.tmp.cert;
3617 return 1;
3618 }
3619 return ssl_cert_set_current(sc->cert, larg);
3620
3621 case SSL_CTRL_GET_GROUPS:
3622 {
3623 uint16_t *clist;
3624 size_t clistlen;
3625
3626 if (!sc->session)
3627 return 0;
3628 clist = sc->ext.peer_supportedgroups;
3629 clistlen = sc->ext.peer_supportedgroups_len;
3630 if (parg) {
3631 size_t i;
3632 int *cptr = parg;
3633
3634 for (i = 0; i < clistlen; i++) {
3635 uint16_t cid = SSL_CONNECTION_IS_TLS13(sc)
3636 ? ssl_group_id_tls13_to_internal(clist[i])
3637 : clist[i];
3638 const TLS_GROUP_INFO *cinf
3639 = tls1_group_id_lookup(s->ctx, cid);
3640
3641 if (cinf != NULL)
3642 cptr[i] = tls1_group_id2nid(cinf->group_id, 1);
3643 else
3644 cptr[i] = TLSEXT_nid_unknown | clist[i];
3645 }
3646 }
3647 return (int)clistlen;
3648 }
3649
3650 case SSL_CTRL_SET_GROUPS:
3651 return tls1_set_groups(&sc->ext.supportedgroups,
3652 &sc->ext.supportedgroups_len, parg, larg);
3653
3654 case SSL_CTRL_SET_GROUPS_LIST:
3655 return tls1_set_groups_list(s->ctx, &sc->ext.supportedgroups,
3656 &sc->ext.supportedgroups_len, parg);
3657
3658 case SSL_CTRL_GET_SHARED_GROUP:
3659 {
3660 uint16_t id = tls1_shared_group(sc, larg);
3661
3662 if (larg != -1)
3663 return tls1_group_id2nid(id, 1);
3664 return id;
3665 }
3666 case SSL_CTRL_GET_NEGOTIATED_GROUP:
3667 {
3668 unsigned int id;
3669
3670 if (SSL_CONNECTION_IS_TLS13(sc) && sc->s3.did_kex)
3671 id = sc->s3.group_id;
3672 else
3673 id = sc->session->kex_group;
3674 ret = tls1_group_id2nid(id, 1);
3675 break;
3676 }
3677 case SSL_CTRL_SET_SIGALGS:
3678 return tls1_set_sigalgs(sc->cert, parg, larg, 0);
3679
3680 case SSL_CTRL_SET_SIGALGS_LIST:
3681 return tls1_set_sigalgs_list(sc->cert, parg, 0);
3682
3683 case SSL_CTRL_SET_CLIENT_SIGALGS:
3684 return tls1_set_sigalgs(sc->cert, parg, larg, 1);
3685
3686 case SSL_CTRL_SET_CLIENT_SIGALGS_LIST:
3687 return tls1_set_sigalgs_list(sc->cert, parg, 1);
3688
3689 case SSL_CTRL_GET_CLIENT_CERT_TYPES:
3690 {
3691 const unsigned char **pctype = parg;
3692 if (sc->server || !sc->s3.tmp.cert_req)
3693 return 0;
3694 if (pctype)
3695 *pctype = sc->s3.tmp.ctype;
3696 return sc->s3.tmp.ctype_len;
3697 }
3698
3699 case SSL_CTRL_SET_CLIENT_CERT_TYPES:
3700 if (!sc->server)
3701 return 0;
3702 return ssl3_set_req_cert_type(sc->cert, parg, larg);
3703
3704 case SSL_CTRL_BUILD_CERT_CHAIN:
3705 return ssl_build_cert_chain(sc, NULL, larg);
3706
3707 case SSL_CTRL_SET_VERIFY_CERT_STORE:
3708 return ssl_cert_set_cert_store(sc->cert, parg, 0, larg);
3709
3710 case SSL_CTRL_SET_CHAIN_CERT_STORE:
3711 return ssl_cert_set_cert_store(sc->cert, parg, 1, larg);
3712
3713 case SSL_CTRL_GET_VERIFY_CERT_STORE:
3714 return ssl_cert_get_cert_store(sc->cert, parg, 0);
3715
3716 case SSL_CTRL_GET_CHAIN_CERT_STORE:
3717 return ssl_cert_get_cert_store(sc->cert, parg, 1);
3718
3719 case SSL_CTRL_GET_PEER_SIGNATURE_NID:
3720 if (sc->s3.tmp.peer_sigalg == NULL)
3721 return 0;
3722 *(int *)parg = sc->s3.tmp.peer_sigalg->hash;
3723 return 1;
3724
3725 case SSL_CTRL_GET_SIGNATURE_NID:
3726 if (sc->s3.tmp.sigalg == NULL)
3727 return 0;
3728 *(int *)parg = sc->s3.tmp.sigalg->hash;
3729 return 1;
3730
3731 case SSL_CTRL_GET_PEER_TMP_KEY:
3732 if (sc->session == NULL || sc->s3.peer_tmp == NULL) {
3733 return 0;
3734 } else {
3735 EVP_PKEY_up_ref(sc->s3.peer_tmp);
3736 *(EVP_PKEY **)parg = sc->s3.peer_tmp;
3737 return 1;
3738 }
3739
3740 case SSL_CTRL_GET_TMP_KEY:
3741 if (sc->session == NULL || sc->s3.tmp.pkey == NULL) {
3742 return 0;
3743 } else {
3744 EVP_PKEY_up_ref(sc->s3.tmp.pkey);
3745 *(EVP_PKEY **)parg = sc->s3.tmp.pkey;
3746 return 1;
3747 }
3748
3749 case SSL_CTRL_GET_EC_POINT_FORMATS:
3750 {
3751 const unsigned char **pformat = parg;
3752
3753 if (sc->ext.peer_ecpointformats == NULL)
3754 return 0;
3755 *pformat = sc->ext.peer_ecpointformats;
3756 return (int)sc->ext.peer_ecpointformats_len;
3757 }
3758
3759 case SSL_CTRL_GET_IANA_GROUPS:
3760 {
3761 if (parg != NULL) {
3762 *(uint16_t **)parg = (uint16_t *)sc->ext.peer_supportedgroups;
3763 }
3764 return (int)sc->ext.peer_supportedgroups_len;
3765 }
3766
3767 default:
3768 break;
3769 }
3770 return ret;
3771 }
3772
3773 long ssl3_callback_ctrl(SSL *s, int cmd, void (*fp) (void))
3774 {
3775 int ret = 0;
3776 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL(s);
3777
3778 if (sc == NULL)
3779 return ret;
3780
3781 switch (cmd) {
3782 #if !defined(OPENSSL_NO_DEPRECATED_3_0)
3783 case SSL_CTRL_SET_TMP_DH_CB:
3784 sc->cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))fp;
3785 ret = 1;
3786 break;
3787 #endif
3788 case SSL_CTRL_SET_TLSEXT_DEBUG_CB:
3789 sc->ext.debug_cb = (void (*)(SSL *, int, int,
3790 const unsigned char *, int, void *))fp;
3791 ret = 1;
3792 break;
3793
3794 case SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB:
3795 sc->not_resumable_session_cb = (int (*)(SSL *, int))fp;
3796 ret = 1;
3797 break;
3798 default:
3799 break;
3800 }
3801 return ret;
3802 }
3803
3804 long ssl3_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg)
3805 {
3806 switch (cmd) {
3807 #if !defined(OPENSSL_NO_DEPRECATED_3_0)
3808 case SSL_CTRL_SET_TMP_DH:
3809 {
3810 EVP_PKEY *pkdh = NULL;
3811 if (parg == NULL) {
3812 ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER);
3813 return 0;
3814 }
3815 pkdh = ssl_dh_to_pkey(parg);
3816 if (pkdh == NULL) {
3817 ERR_raise(ERR_LIB_SSL, ERR_R_DH_LIB);
3818 return 0;
3819 }
3820 if (!SSL_CTX_set0_tmp_dh_pkey(ctx, pkdh)) {
3821 EVP_PKEY_free(pkdh);
3822 return 0;
3823 }
3824 return 1;
3825 }
3826 case SSL_CTRL_SET_TMP_DH_CB:
3827 {
3828 ERR_raise(ERR_LIB_SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
3829 return 0;
3830 }
3831 #endif
3832 case SSL_CTRL_SET_DH_AUTO:
3833 ctx->cert->dh_tmp_auto = larg;
3834 return 1;
3835 #if !defined(OPENSSL_NO_DEPRECATED_3_0)
3836 case SSL_CTRL_SET_TMP_ECDH:
3837 {
3838 if (parg == NULL) {
3839 ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER);
3840 return 0;
3841 }
3842 return ssl_set_tmp_ecdh_groups(&ctx->ext.supportedgroups,
3843 &ctx->ext.supportedgroups_len,
3844 parg);
3845 }
3846 #endif /* !OPENSSL_NO_DEPRECATED_3_0 */
3847 case SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG:
3848 ctx->ext.servername_arg = parg;
3849 break;
3850 case SSL_CTRL_SET_TLSEXT_TICKET_KEYS:
3851 case SSL_CTRL_GET_TLSEXT_TICKET_KEYS:
3852 {
3853 unsigned char *keys = parg;
3854 long tick_keylen = (sizeof(ctx->ext.tick_key_name) +
3855 sizeof(ctx->ext.secure->tick_hmac_key) +
3856 sizeof(ctx->ext.secure->tick_aes_key));
3857 if (keys == NULL)
3858 return tick_keylen;
3859 if (larg != tick_keylen) {
3860 ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_TICKET_KEYS_LENGTH);
3861 return 0;
3862 }
3863 if (cmd == SSL_CTRL_SET_TLSEXT_TICKET_KEYS) {
3864 memcpy(ctx->ext.tick_key_name, keys,
3865 sizeof(ctx->ext.tick_key_name));
3866 memcpy(ctx->ext.secure->tick_hmac_key,
3867 keys + sizeof(ctx->ext.tick_key_name),
3868 sizeof(ctx->ext.secure->tick_hmac_key));
3869 memcpy(ctx->ext.secure->tick_aes_key,
3870 keys + sizeof(ctx->ext.tick_key_name) +
3871 sizeof(ctx->ext.secure->tick_hmac_key),
3872 sizeof(ctx->ext.secure->tick_aes_key));
3873 } else {
3874 memcpy(keys, ctx->ext.tick_key_name,
3875 sizeof(ctx->ext.tick_key_name));
3876 memcpy(keys + sizeof(ctx->ext.tick_key_name),
3877 ctx->ext.secure->tick_hmac_key,
3878 sizeof(ctx->ext.secure->tick_hmac_key));
3879 memcpy(keys + sizeof(ctx->ext.tick_key_name) +
3880 sizeof(ctx->ext.secure->tick_hmac_key),
3881 ctx->ext.secure->tick_aes_key,
3882 sizeof(ctx->ext.secure->tick_aes_key));
3883 }
3884 return 1;
3885 }
3886
3887 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE:
3888 return ctx->ext.status_type;
3889
3890 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE:
3891 ctx->ext.status_type = larg;
3892 break;
3893
3894 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB_ARG:
3895 ctx->ext.status_arg = parg;
3896 return 1;
3897
3898 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_CB_ARG:
3899 *(void**)parg = ctx->ext.status_arg;
3900 break;
3901
3902 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_CB:
3903 *(int (**)(SSL*, void*))parg = ctx->ext.status_cb;
3904 break;
3905
3906 #ifndef OPENSSL_NO_SRP
3907 case SSL_CTRL_SET_TLS_EXT_SRP_USERNAME:
3908 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
3909 OPENSSL_free(ctx->srp_ctx.login);
3910 ctx->srp_ctx.login = NULL;
3911 if (parg == NULL)
3912 break;
3913 if (strlen((const char *)parg) > 255 || strlen((const char *)parg) < 1) {
3914 ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_SRP_USERNAME);
3915 return 0;
3916 }
3917 if ((ctx->srp_ctx.login = OPENSSL_strdup((char *)parg)) == NULL) {
3918 ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR);
3919 return 0;
3920 }
3921 break;
3922 case SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD:
3923 ctx->srp_ctx.SRP_give_srp_client_pwd_callback =
3924 srp_password_from_info_cb;
3925 if (ctx->srp_ctx.info != NULL)
3926 OPENSSL_free(ctx->srp_ctx.info);
3927 if ((ctx->srp_ctx.info = OPENSSL_strdup((char *)parg)) == NULL) {
3928 ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR);
3929 return 0;
3930 }
3931 break;
3932 case SSL_CTRL_SET_SRP_ARG:
3933 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
3934 ctx->srp_ctx.SRP_cb_arg = parg;
3935 break;
3936
3937 case SSL_CTRL_SET_TLS_EXT_SRP_STRENGTH:
3938 ctx->srp_ctx.strength = larg;
3939 break;
3940 #endif
3941
3942 case SSL_CTRL_SET_GROUPS:
3943 return tls1_set_groups(&ctx->ext.supportedgroups,
3944 &ctx->ext.supportedgroups_len,
3945 parg, larg);
3946
3947 case SSL_CTRL_SET_GROUPS_LIST:
3948 return tls1_set_groups_list(ctx, &ctx->ext.supportedgroups,
3949 &ctx->ext.supportedgroups_len,
3950 parg);
3951
3952 case SSL_CTRL_SET_SIGALGS:
3953 return tls1_set_sigalgs(ctx->cert, parg, larg, 0);
3954
3955 case SSL_CTRL_SET_SIGALGS_LIST:
3956 return tls1_set_sigalgs_list(ctx->cert, parg, 0);
3957
3958 case SSL_CTRL_SET_CLIENT_SIGALGS:
3959 return tls1_set_sigalgs(ctx->cert, parg, larg, 1);
3960
3961 case SSL_CTRL_SET_CLIENT_SIGALGS_LIST:
3962 return tls1_set_sigalgs_list(ctx->cert, parg, 1);
3963
3964 case SSL_CTRL_SET_CLIENT_CERT_TYPES:
3965 return ssl3_set_req_cert_type(ctx->cert, parg, larg);
3966
3967 case SSL_CTRL_BUILD_CERT_CHAIN:
3968 return ssl_build_cert_chain(NULL, ctx, larg);
3969
3970 case SSL_CTRL_SET_VERIFY_CERT_STORE:
3971 return ssl_cert_set_cert_store(ctx->cert, parg, 0, larg);
3972
3973 case SSL_CTRL_SET_CHAIN_CERT_STORE:
3974 return ssl_cert_set_cert_store(ctx->cert, parg, 1, larg);
3975
3976 case SSL_CTRL_GET_VERIFY_CERT_STORE:
3977 return ssl_cert_get_cert_store(ctx->cert, parg, 0);
3978
3979 case SSL_CTRL_GET_CHAIN_CERT_STORE:
3980 return ssl_cert_get_cert_store(ctx->cert, parg, 1);
3981
3982 /* A Thawte special :-) */
3983 case SSL_CTRL_EXTRA_CHAIN_CERT:
3984 if (ctx->extra_certs == NULL) {
3985 if ((ctx->extra_certs = sk_X509_new_null()) == NULL) {
3986 ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB);
3987 return 0;
3988 }
3989 }
3990 if (!sk_X509_push(ctx->extra_certs, (X509 *)parg)) {
3991 ERR_raise(ERR_LIB_SSL, ERR_R_CRYPTO_LIB);
3992 return 0;
3993 }
3994 break;
3995
3996 case SSL_CTRL_GET_EXTRA_CHAIN_CERTS:
3997 if (ctx->extra_certs == NULL && larg == 0)
3998 *(STACK_OF(X509) **)parg = ctx->cert->key->chain;
3999 else
4000 *(STACK_OF(X509) **)parg = ctx->extra_certs;
4001 break;
4002
4003 case SSL_CTRL_CLEAR_EXTRA_CHAIN_CERTS:
4004 OSSL_STACK_OF_X509_free(ctx->extra_certs);
4005 ctx->extra_certs = NULL;
4006 break;
4007
4008 case SSL_CTRL_CHAIN:
4009 if (larg)
4010 return ssl_cert_set1_chain(NULL, ctx, (STACK_OF(X509) *)parg);
4011 else
4012 return ssl_cert_set0_chain(NULL, ctx, (STACK_OF(X509) *)parg);
4013
4014 case SSL_CTRL_CHAIN_CERT:
4015 if (larg)
4016 return ssl_cert_add1_chain_cert(NULL, ctx, (X509 *)parg);
4017 else
4018 return ssl_cert_add0_chain_cert(NULL, ctx, (X509 *)parg);
4019
4020 case SSL_CTRL_GET_CHAIN_CERTS:
4021 *(STACK_OF(X509) **)parg = ctx->cert->key->chain;
4022 break;
4023
4024 case SSL_CTRL_SELECT_CURRENT_CERT:
4025 return ssl_cert_select_current(ctx->cert, (X509 *)parg);
4026
4027 case SSL_CTRL_SET_CURRENT_CERT:
4028 return ssl_cert_set_current(ctx->cert, larg);
4029
4030 default:
4031 return 0;
4032 }
4033 return 1;
4034 }
4035
4036 long ssl3_ctx_callback_ctrl(SSL_CTX *ctx, int cmd, void (*fp) (void))
4037 {
4038 switch (cmd) {
4039 #if !defined(OPENSSL_NO_DEPRECATED_3_0)
4040 case SSL_CTRL_SET_TMP_DH_CB:
4041 {
4042 ctx->cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))fp;
4043 }
4044 break;
4045 #endif
4046 case SSL_CTRL_SET_TLSEXT_SERVERNAME_CB:
4047 ctx->ext.servername_cb = (int (*)(SSL *, int *, void *))fp;
4048 break;
4049
4050 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB:
4051 ctx->ext.status_cb = (int (*)(SSL *, void *))fp;
4052 break;
4053
4054 # ifndef OPENSSL_NO_DEPRECATED_3_0
4055 case SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB:
4056 ctx->ext.ticket_key_cb = (int (*)(SSL *, unsigned char *,
4057 unsigned char *,
4058 EVP_CIPHER_CTX *,
4059 HMAC_CTX *, int))fp;
4060 break;
4061 #endif
4062
4063 #ifndef OPENSSL_NO_SRP
4064 case SSL_CTRL_SET_SRP_VERIFY_PARAM_CB:
4065 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
4066 ctx->srp_ctx.SRP_verify_param_callback = (int (*)(SSL *, void *))fp;
4067 break;
4068 case SSL_CTRL_SET_TLS_EXT_SRP_USERNAME_CB:
4069 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
4070 ctx->srp_ctx.TLS_ext_srp_username_callback =
4071 (int (*)(SSL *, int *, void *))fp;
4072 break;
4073 case SSL_CTRL_SET_SRP_GIVE_CLIENT_PWD_CB:
4074 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
4075 ctx->srp_ctx.SRP_give_srp_client_pwd_callback =
4076 (char *(*)(SSL *, void *))fp;
4077 break;
4078 #endif
4079 case SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB:
4080 {
4081 ctx->not_resumable_session_cb = (int (*)(SSL *, int))fp;
4082 }
4083 break;
4084 default:
4085 return 0;
4086 }
4087 return 1;
4088 }
4089
4090 int SSL_CTX_set_tlsext_ticket_key_evp_cb
4091 (SSL_CTX *ctx, int (*fp)(SSL *, unsigned char *, unsigned char *,
4092 EVP_CIPHER_CTX *, EVP_MAC_CTX *, int))
4093 {
4094 ctx->ext.ticket_key_evp_cb = fp;
4095 return 1;
4096 }
4097
4098 const SSL_CIPHER *ssl3_get_cipher_by_id(uint32_t id)
4099 {
4100 SSL_CIPHER c;
4101 const SSL_CIPHER *cp;
4102
4103 c.id = id;
4104 cp = OBJ_bsearch_ssl_cipher_id(&c, tls13_ciphers, TLS13_NUM_CIPHERS);
4105 if (cp != NULL)
4106 return cp;
4107 cp = OBJ_bsearch_ssl_cipher_id(&c, ssl3_ciphers, SSL3_NUM_CIPHERS);
4108 if (cp != NULL)
4109 return cp;
4110 return OBJ_bsearch_ssl_cipher_id(&c, ssl3_scsvs, SSL3_NUM_SCSVS);
4111 }
4112
4113 const SSL_CIPHER *ssl3_get_cipher_by_std_name(const char *stdname)
4114 {
4115 SSL_CIPHER *tbl;
4116 SSL_CIPHER *alltabs[] = {tls13_ciphers, ssl3_ciphers, ssl3_scsvs};
4117 size_t i, j, tblsize[] = {TLS13_NUM_CIPHERS, SSL3_NUM_CIPHERS,
4118 SSL3_NUM_SCSVS};
4119
4120 /* this is not efficient, necessary to optimize this? */
4121 for (j = 0; j < OSSL_NELEM(alltabs); j++) {
4122 for (i = 0, tbl = alltabs[j]; i < tblsize[j]; i++, tbl++) {
4123 if (tbl->stdname == NULL)
4124 continue;
4125 if (strcmp(stdname, tbl->stdname) == 0) {
4126 return tbl;
4127 }
4128 }
4129 }
4130 return NULL;
4131 }
4132
4133 /*
4134 * This function needs to check if the ciphers required are actually
4135 * available
4136 */
4137 const SSL_CIPHER *ssl3_get_cipher_by_char(const unsigned char *p)
4138 {
4139 return ssl3_get_cipher_by_id(SSL3_CK_CIPHERSUITE_FLAG
4140 | ((uint32_t)p[0] << 8L)
4141 | (uint32_t)p[1]);
4142 }
4143
4144 int ssl3_put_cipher_by_char(const SSL_CIPHER *c, WPACKET *pkt, size_t *len)
4145 {
4146 if ((c->id & 0xff000000) != SSL3_CK_CIPHERSUITE_FLAG) {
4147 *len = 0;
4148 return 1;
4149 }
4150
4151 if (!WPACKET_put_bytes_u16(pkt, c->id & 0xffff))
4152 return 0;
4153
4154 *len = 2;
4155 return 1;
4156 }
4157
4158 /*
4159 * ssl3_choose_cipher - choose a cipher from those offered by the client
4160 * @s: SSL connection
4161 * @clnt: ciphers offered by the client
4162 * @srvr: ciphers enabled on the server?
4163 *
4164 * Returns the selected cipher or NULL when no common ciphers.
4165 */
4166 const SSL_CIPHER *ssl3_choose_cipher(SSL_CONNECTION *s, STACK_OF(SSL_CIPHER) *clnt,
4167 STACK_OF(SSL_CIPHER) *srvr)
4168 {
4169 const SSL_CIPHER *c, *ret = NULL;
4170 STACK_OF(SSL_CIPHER) *prio, *allow;
4171 int i, ii, ok, prefer_sha256 = 0;
4172 unsigned long alg_k = 0, alg_a = 0, mask_k = 0, mask_a = 0;
4173 STACK_OF(SSL_CIPHER) *prio_chacha = NULL;
4174
4175 /* Let's see which ciphers we can support */
4176
4177 /*
4178 * Do not set the compare functions, because this may lead to a
4179 * reordering by "id". We want to keep the original ordering. We may pay
4180 * a price in performance during sk_SSL_CIPHER_find(), but would have to
4181 * pay with the price of sk_SSL_CIPHER_dup().
4182 */
4183
4184 OSSL_TRACE_BEGIN(TLS_CIPHER) {
4185 BIO_printf(trc_out, "Server has %d from %p:\n",
4186 sk_SSL_CIPHER_num(srvr), (void *)srvr);
4187 for (i = 0; i < sk_SSL_CIPHER_num(srvr); ++i) {
4188 c = sk_SSL_CIPHER_value(srvr, i);
4189 BIO_printf(trc_out, "%p:%s\n", (void *)c, c->name);
4190 }
4191 BIO_printf(trc_out, "Client sent %d from %p:\n",
4192 sk_SSL_CIPHER_num(clnt), (void *)clnt);
4193 for (i = 0; i < sk_SSL_CIPHER_num(clnt); ++i) {
4194 c = sk_SSL_CIPHER_value(clnt, i);
4195 BIO_printf(trc_out, "%p:%s\n", (void *)c, c->name);
4196 }
4197 } OSSL_TRACE_END(TLS_CIPHER);
4198
4199 /* SUITE-B takes precedence over server preference and ChaCha priortiy */
4200 if (tls1_suiteb(s)) {
4201 prio = srvr;
4202 allow = clnt;
4203 } else if (s->options & SSL_OP_CIPHER_SERVER_PREFERENCE) {
4204 prio = srvr;
4205 allow = clnt;
4206
4207 /* If ChaCha20 is at the top of the client preference list,
4208 and there are ChaCha20 ciphers in the server list, then
4209 temporarily prioritize all ChaCha20 ciphers in the servers list. */
4210 if (s->options & SSL_OP_PRIORITIZE_CHACHA && sk_SSL_CIPHER_num(clnt) > 0) {
4211 c = sk_SSL_CIPHER_value(clnt, 0);
4212 if (c->algorithm_enc == SSL_CHACHA20POLY1305) {
4213 /* ChaCha20 is client preferred, check server... */
4214 int num = sk_SSL_CIPHER_num(srvr);
4215 int found = 0;
4216 for (i = 0; i < num; i++) {
4217 c = sk_SSL_CIPHER_value(srvr, i);
4218 if (c->algorithm_enc == SSL_CHACHA20POLY1305) {
4219 found = 1;
4220 break;
4221 }
4222 }
4223 if (found) {
4224 prio_chacha = sk_SSL_CIPHER_new_reserve(NULL, num);
4225 /* if reserve fails, then there's likely a memory issue */
4226 if (prio_chacha != NULL) {
4227 /* Put all ChaCha20 at the top, starting with the one we just found */
4228 sk_SSL_CIPHER_push(prio_chacha, c);
4229 for (i++; i < num; i++) {
4230 c = sk_SSL_CIPHER_value(srvr, i);
4231 if (c->algorithm_enc == SSL_CHACHA20POLY1305)
4232 sk_SSL_CIPHER_push(prio_chacha, c);
4233 }
4234 /* Pull in the rest */
4235 for (i = 0; i < num; i++) {
4236 c = sk_SSL_CIPHER_value(srvr, i);
4237 if (c->algorithm_enc != SSL_CHACHA20POLY1305)
4238 sk_SSL_CIPHER_push(prio_chacha, c);
4239 }
4240 prio = prio_chacha;
4241 }
4242 }
4243 }
4244 }
4245 } else {
4246 prio = clnt;
4247 allow = srvr;
4248 }
4249
4250 if (SSL_CONNECTION_IS_TLS13(s)) {
4251 #ifndef OPENSSL_NO_PSK
4252 int j;
4253
4254 /*
4255 * If we allow "old" style PSK callbacks, and we have no certificate (so
4256 * we're not going to succeed without a PSK anyway), and we're in
4257 * TLSv1.3 then the default hash for a PSK is SHA-256 (as per the
4258 * TLSv1.3 spec). Therefore we should prioritise ciphersuites using
4259 * that.
4260 */
4261 if (s->psk_server_callback != NULL) {
4262 for (j = 0; j < SSL_PKEY_NUM && !ssl_has_cert(s, j); j++);
4263 if (j == SSL_PKEY_NUM) {
4264 /* There are no certificates */
4265 prefer_sha256 = 1;
4266 }
4267 }
4268 #endif
4269 } else {
4270 tls1_set_cert_validity(s);
4271 ssl_set_masks(s);
4272 }
4273
4274 for (i = 0; i < sk_SSL_CIPHER_num(prio); i++) {
4275 c = sk_SSL_CIPHER_value(prio, i);
4276
4277 /* Skip ciphers not supported by the protocol version */
4278 if (!SSL_CONNECTION_IS_DTLS(s) &&
4279 ((s->version < c->min_tls) || (s->version > c->max_tls)))
4280 continue;
4281 if (SSL_CONNECTION_IS_DTLS(s) &&
4282 (DTLS_VERSION_LT(s->version, c->min_dtls) ||
4283 DTLS_VERSION_GT(s->version, c->max_dtls)))
4284 continue;
4285
4286 /*
4287 * Since TLS 1.3 ciphersuites can be used with any auth or
4288 * key exchange scheme skip tests.
4289 */
4290 if (!SSL_CONNECTION_IS_TLS13(s)) {
4291 mask_k = s->s3.tmp.mask_k;
4292 mask_a = s->s3.tmp.mask_a;
4293 #ifndef OPENSSL_NO_SRP
4294 if (s->srp_ctx.srp_Mask & SSL_kSRP) {
4295 mask_k |= SSL_kSRP;
4296 mask_a |= SSL_aSRP;
4297 }
4298 #endif
4299
4300 alg_k = c->algorithm_mkey;
4301 alg_a = c->algorithm_auth;
4302
4303 #ifndef OPENSSL_NO_PSK
4304 /* with PSK there must be server callback set */
4305 if ((alg_k & SSL_PSK) && s->psk_server_callback == NULL)
4306 continue;
4307 #endif /* OPENSSL_NO_PSK */
4308
4309 ok = (alg_k & mask_k) && (alg_a & mask_a);
4310 OSSL_TRACE7(TLS_CIPHER,
4311 "%d:[%08lX:%08lX:%08lX:%08lX]%p:%s\n",
4312 ok, alg_k, alg_a, mask_k, mask_a, (void *)c, c->name);
4313
4314 /*
4315 * if we are considering an ECC cipher suite that uses an ephemeral
4316 * EC key check it
4317 */
4318 if (alg_k & SSL_kECDHE)
4319 ok = ok && tls1_check_ec_tmp_key(s, c->id);
4320
4321 if (!ok)
4322 continue;
4323 }
4324 ii = sk_SSL_CIPHER_find(allow, c);
4325 if (ii >= 0) {
4326 /* Check security callback permits this cipher */
4327 if (!ssl_security(s, SSL_SECOP_CIPHER_SHARED,
4328 c->strength_bits, 0, (void *)c))
4329 continue;
4330
4331 if ((alg_k & SSL_kECDHE) && (alg_a & SSL_aECDSA)
4332 && s->s3.is_probably_safari) {
4333 if (!ret)
4334 ret = sk_SSL_CIPHER_value(allow, ii);
4335 continue;
4336 }
4337
4338 if (prefer_sha256) {
4339 const SSL_CIPHER *tmp = sk_SSL_CIPHER_value(allow, ii);
4340 const EVP_MD *md = ssl_md(SSL_CONNECTION_GET_CTX(s),
4341 tmp->algorithm2);
4342
4343 if (md != NULL
4344 && EVP_MD_is_a(md, OSSL_DIGEST_NAME_SHA2_256)) {
4345 ret = tmp;
4346 break;
4347 }
4348 if (ret == NULL)
4349 ret = tmp;
4350 continue;
4351 }
4352 ret = sk_SSL_CIPHER_value(allow, ii);
4353 break;
4354 }
4355 }
4356
4357 sk_SSL_CIPHER_free(prio_chacha);
4358
4359 return ret;
4360 }
4361
4362 int ssl3_get_req_cert_type(SSL_CONNECTION *s, WPACKET *pkt)
4363 {
4364 uint32_t alg_k, alg_a = 0;
4365
4366 /* If we have custom certificate types set, use them */
4367 if (s->cert->ctype)
4368 return WPACKET_memcpy(pkt, s->cert->ctype, s->cert->ctype_len);
4369 /* Get mask of algorithms disabled by signature list */
4370 ssl_set_sig_mask(&alg_a, s, SSL_SECOP_SIGALG_MASK);
4371
4372 alg_k = s->s3.tmp.new_cipher->algorithm_mkey;
4373
4374 #ifndef OPENSSL_NO_GOST
4375 if (s->version >= TLS1_VERSION && (alg_k & SSL_kGOST))
4376 if (!WPACKET_put_bytes_u8(pkt, TLS_CT_GOST01_SIGN)
4377 || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_IANA_SIGN)
4378 || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_IANA_512_SIGN)
4379 || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_LEGACY_SIGN)
4380 || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_LEGACY_512_SIGN))
4381 return 0;
4382
4383 if (s->version >= TLS1_2_VERSION && (alg_k & SSL_kGOST18))
4384 if (!WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_IANA_SIGN)
4385 || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_IANA_512_SIGN))
4386 return 0;
4387 #endif
4388
4389 if ((s->version == SSL3_VERSION) && (alg_k & SSL_kDHE)) {
4390 if (!WPACKET_put_bytes_u8(pkt, SSL3_CT_RSA_EPHEMERAL_DH))
4391 return 0;
4392 if (!(alg_a & SSL_aDSS)
4393 && !WPACKET_put_bytes_u8(pkt, SSL3_CT_DSS_EPHEMERAL_DH))
4394 return 0;
4395 }
4396 if (!(alg_a & SSL_aRSA) && !WPACKET_put_bytes_u8(pkt, SSL3_CT_RSA_SIGN))
4397 return 0;
4398 if (!(alg_a & SSL_aDSS) && !WPACKET_put_bytes_u8(pkt, SSL3_CT_DSS_SIGN))
4399 return 0;
4400
4401 /*
4402 * ECDSA certs can be used with RSA cipher suites too so we don't
4403 * need to check for SSL_kECDH or SSL_kECDHE
4404 */
4405 if (s->version >= TLS1_VERSION
4406 && !(alg_a & SSL_aECDSA)
4407 && !WPACKET_put_bytes_u8(pkt, TLS_CT_ECDSA_SIGN))
4408 return 0;
4409
4410 return 1;
4411 }
4412
4413 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len)
4414 {
4415 OPENSSL_free(c->ctype);
4416 c->ctype = NULL;
4417 c->ctype_len = 0;
4418 if (p == NULL || len == 0)
4419 return 1;
4420 if (len > 0xff)
4421 return 0;
4422 c->ctype = OPENSSL_memdup(p, len);
4423 if (c->ctype == NULL)
4424 return 0;
4425 c->ctype_len = len;
4426 return 1;
4427 }
4428
4429 int ssl3_shutdown(SSL *s)
4430 {
4431 int ret;
4432 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s);
4433
4434 if (sc == NULL)
4435 return 0;
4436
4437 /*
4438 * Don't do anything much if we have not done the handshake or we don't
4439 * want to send messages :-)
4440 */
4441 if (sc->quiet_shutdown || SSL_in_before(s)) {
4442 sc->shutdown = (SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN);
4443 return 1;
4444 }
4445
4446 if (!(sc->shutdown & SSL_SENT_SHUTDOWN)) {
4447 sc->shutdown |= SSL_SENT_SHUTDOWN;
4448 ssl3_send_alert(sc, SSL3_AL_WARNING, SSL_AD_CLOSE_NOTIFY);
4449 /*
4450 * our shutdown alert has been sent now, and if it still needs to be
4451 * written, s->s3.alert_dispatch will be true
4452 */
4453 if (sc->s3.alert_dispatch)
4454 return -1; /* return WANT_WRITE */
4455 } else if (sc->s3.alert_dispatch) {
4456 /* resend it if not sent */
4457 ret = s->method->ssl_dispatch_alert(s);
4458 if (ret == -1) {
4459 /*
4460 * we only get to return -1 here the 2nd/Nth invocation, we must
4461 * have already signalled return 0 upon a previous invocation,
4462 * return WANT_WRITE
4463 */
4464 return ret;
4465 }
4466 } else if (!(sc->shutdown & SSL_RECEIVED_SHUTDOWN)) {
4467 size_t readbytes;
4468 /*
4469 * If we are waiting for a close from our peer, we are closed
4470 */
4471 s->method->ssl_read_bytes(s, 0, NULL, NULL, 0, 0, &readbytes);
4472 if (!(sc->shutdown & SSL_RECEIVED_SHUTDOWN)) {
4473 return -1; /* return WANT_READ */
4474 }
4475 }
4476
4477 if ((sc->shutdown == (SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN)) &&
4478 !sc->s3.alert_dispatch)
4479 return 1;
4480 else
4481 return 0;
4482 }
4483
4484 int ssl3_write(SSL *s, const void *buf, size_t len, size_t *written)
4485 {
4486 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s);
4487
4488 if (sc == NULL)
4489 return 0;
4490
4491 clear_sys_error();
4492 if (sc->s3.renegotiate)
4493 ssl3_renegotiate_check(s, 0);
4494
4495 return s->method->ssl_write_bytes(s, SSL3_RT_APPLICATION_DATA, buf, len,
4496 written);
4497 }
4498
4499 static int ssl3_read_internal(SSL *s, void *buf, size_t len, int peek,
4500 size_t *readbytes)
4501 {
4502 int ret;
4503 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s);
4504
4505 if (sc == NULL)
4506 return 0;
4507
4508 clear_sys_error();
4509 if (sc->s3.renegotiate)
4510 ssl3_renegotiate_check(s, 0);
4511 sc->s3.in_read_app_data = 1;
4512 ret =
4513 s->method->ssl_read_bytes(s, SSL3_RT_APPLICATION_DATA, NULL, buf, len,
4514 peek, readbytes);
4515 if ((ret == -1) && (sc->s3.in_read_app_data == 2)) {
4516 /*
4517 * ssl3_read_bytes decided to call s->handshake_func, which called
4518 * ssl3_read_bytes to read handshake data. However, ssl3_read_bytes
4519 * actually found application data and thinks that application data
4520 * makes sense here; so disable handshake processing and try to read
4521 * application data again.
4522 */
4523 ossl_statem_set_in_handshake(sc, 1);
4524 ret =
4525 s->method->ssl_read_bytes(s, SSL3_RT_APPLICATION_DATA, NULL, buf,
4526 len, peek, readbytes);
4527 ossl_statem_set_in_handshake(sc, 0);
4528 } else
4529 sc->s3.in_read_app_data = 0;
4530
4531 return ret;
4532 }
4533
4534 int ssl3_read(SSL *s, void *buf, size_t len, size_t *readbytes)
4535 {
4536 return ssl3_read_internal(s, buf, len, 0, readbytes);
4537 }
4538
4539 int ssl3_peek(SSL *s, void *buf, size_t len, size_t *readbytes)
4540 {
4541 return ssl3_read_internal(s, buf, len, 1, readbytes);
4542 }
4543
4544 int ssl3_renegotiate(SSL *s)
4545 {
4546 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s);
4547
4548 if (sc == NULL)
4549 return 0;
4550
4551 if (sc->handshake_func == NULL)
4552 return 1;
4553
4554 sc->s3.renegotiate = 1;
4555 return 1;
4556 }
4557
4558 /*
4559 * Check if we are waiting to do a renegotiation and if so whether now is a
4560 * good time to do it. If |initok| is true then we are being called from inside
4561 * the state machine so ignore the result of SSL_in_init(s). Otherwise we
4562 * should not do a renegotiation if SSL_in_init(s) is true. Returns 1 if we
4563 * should do a renegotiation now and sets up the state machine for it. Otherwise
4564 * returns 0.
4565 */
4566 int ssl3_renegotiate_check(SSL *s, int initok)
4567 {
4568 int ret = 0;
4569 SSL_CONNECTION *sc = SSL_CONNECTION_FROM_SSL_ONLY(s);
4570
4571 if (sc == NULL)
4572 return 0;
4573
4574 if (sc->s3.renegotiate) {
4575 if (!RECORD_LAYER_read_pending(&sc->rlayer)
4576 && !RECORD_LAYER_write_pending(&sc->rlayer)
4577 && (initok || !SSL_in_init(s))) {
4578 /*
4579 * if we are the server, and we have sent a 'RENEGOTIATE'
4580 * message, we need to set the state machine into the renegotiate
4581 * state.
4582 */
4583 ossl_statem_set_renegotiate(sc);
4584 sc->s3.renegotiate = 0;
4585 sc->s3.num_renegotiations++;
4586 sc->s3.total_renegotiations++;
4587 ret = 1;
4588 }
4589 }
4590 return ret;
4591 }
4592
4593 /*
4594 * If we are using default SHA1+MD5 algorithms switch to new SHA256 PRF and
4595 * handshake macs if required.
4596 *
4597 * If PSK and using SHA384 for TLS < 1.2 switch to default.
4598 */
4599 long ssl_get_algorithm2(SSL_CONNECTION *s)
4600 {
4601 long alg2;
4602 SSL *ssl = SSL_CONNECTION_GET_SSL(s);
4603
4604 if (s->s3.tmp.new_cipher == NULL)
4605 return -1;
4606 alg2 = s->s3.tmp.new_cipher->algorithm2;
4607 if (ssl->method->ssl3_enc->enc_flags & SSL_ENC_FLAG_SHA256_PRF) {
4608 if (alg2 == (SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF))
4609 return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;
4610 } else if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) {
4611 if (alg2 == (SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384))
4612 return SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF;
4613 }
4614 return alg2;
4615 }
4616
4617 /*
4618 * Fill a ClientRandom or ServerRandom field of length len. Returns <= 0 on
4619 * failure, 1 on success.
4620 */
4621 int ssl_fill_hello_random(SSL_CONNECTION *s, int server,
4622 unsigned char *result, size_t len,
4623 DOWNGRADE dgrd)
4624 {
4625 int send_time = 0, ret;
4626
4627 if (len < 4)
4628 return 0;
4629 if (server)
4630 send_time = (s->mode & SSL_MODE_SEND_SERVERHELLO_TIME) != 0;
4631 else
4632 send_time = (s->mode & SSL_MODE_SEND_CLIENTHELLO_TIME) != 0;
4633 if (send_time) {
4634 unsigned long Time = (unsigned long)time(NULL);
4635 unsigned char *p = result;
4636
4637 l2n(Time, p);
4638 ret = RAND_bytes_ex(SSL_CONNECTION_GET_CTX(s)->libctx, p, len - 4, 0);
4639 } else {
4640 ret = RAND_bytes_ex(SSL_CONNECTION_GET_CTX(s)->libctx, result, len, 0);
4641 }
4642
4643 if (ret > 0) {
4644 if (!ossl_assert(sizeof(tls11downgrade) < len)
4645 || !ossl_assert(sizeof(tls12downgrade) < len))
4646 return 0;
4647 if (dgrd == DOWNGRADE_TO_1_2)
4648 memcpy(result + len - sizeof(tls12downgrade), tls12downgrade,
4649 sizeof(tls12downgrade));
4650 else if (dgrd == DOWNGRADE_TO_1_1)
4651 memcpy(result + len - sizeof(tls11downgrade), tls11downgrade,
4652 sizeof(tls11downgrade));
4653 }
4654
4655 return ret;
4656 }
4657
4658 int ssl_generate_master_secret(SSL_CONNECTION *s, unsigned char *pms,
4659 size_t pmslen, int free_pms)
4660 {
4661 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey;
4662 int ret = 0;
4663 SSL *ssl = SSL_CONNECTION_GET_SSL(s);
4664
4665 if (alg_k & SSL_PSK) {
4666 #ifndef OPENSSL_NO_PSK
4667 unsigned char *pskpms, *t;
4668 size_t psklen = s->s3.tmp.psklen;
4669 size_t pskpmslen;
4670
4671 /* create PSK premaster_secret */
4672
4673 /* For plain PSK "other_secret" is psklen zeroes */
4674 if (alg_k & SSL_kPSK)
4675 pmslen = psklen;
4676
4677 pskpmslen = 4 + pmslen + psklen;
4678 pskpms = OPENSSL_malloc(pskpmslen);
4679 if (pskpms == NULL)
4680 goto err;
4681 t = pskpms;
4682 s2n(pmslen, t);
4683 if (alg_k & SSL_kPSK)
4684 memset(t, 0, pmslen);
4685 else
4686 memcpy(t, pms, pmslen);
4687 t += pmslen;
4688 s2n(psklen, t);
4689 memcpy(t, s->s3.tmp.psk, psklen);
4690
4691 OPENSSL_clear_free(s->s3.tmp.psk, psklen);
4692 s->s3.tmp.psk = NULL;
4693 s->s3.tmp.psklen = 0;
4694 if (!ssl->method->ssl3_enc->generate_master_secret(s,
4695 s->session->master_key, pskpms, pskpmslen,
4696 &s->session->master_key_length)) {
4697 OPENSSL_clear_free(pskpms, pskpmslen);
4698 /* SSLfatal() already called */
4699 goto err;
4700 }
4701 OPENSSL_clear_free(pskpms, pskpmslen);
4702 #else
4703 /* Should never happen */
4704 goto err;
4705 #endif
4706 } else {
4707 if (!ssl->method->ssl3_enc->generate_master_secret(s,
4708 s->session->master_key, pms, pmslen,
4709 &s->session->master_key_length)) {
4710 /* SSLfatal() already called */
4711 goto err;
4712 }
4713 }
4714
4715 ret = 1;
4716 err:
4717 if (pms) {
4718 if (free_pms)
4719 OPENSSL_clear_free(pms, pmslen);
4720 else
4721 OPENSSL_cleanse(pms, pmslen);
4722 }
4723 if (s->server == 0) {
4724 s->s3.tmp.pms = NULL;
4725 s->s3.tmp.pmslen = 0;
4726 }
4727 return ret;
4728 }
4729
4730 /* Generate a private key from parameters */
4731 EVP_PKEY *ssl_generate_pkey(SSL_CONNECTION *s, EVP_PKEY *pm)
4732 {
4733 EVP_PKEY_CTX *pctx = NULL;
4734 EVP_PKEY *pkey = NULL;
4735 SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);
4736
4737 if (pm == NULL)
4738 return NULL;
4739 pctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, pm, sctx->propq);
4740 if (pctx == NULL)
4741 goto err;
4742 if (EVP_PKEY_keygen_init(pctx) <= 0)
4743 goto err;
4744 if (EVP_PKEY_keygen(pctx, &pkey) <= 0) {
4745 EVP_PKEY_free(pkey);
4746 pkey = NULL;
4747 }
4748
4749 err:
4750 EVP_PKEY_CTX_free(pctx);
4751 return pkey;
4752 }
4753
4754 /* Generate a private key from a group ID */
4755 EVP_PKEY *ssl_generate_pkey_group(SSL_CONNECTION *s, uint16_t id)
4756 {
4757 SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);
4758 const TLS_GROUP_INFO *ginf = tls1_group_id_lookup(sctx, id);
4759 EVP_PKEY_CTX *pctx = NULL;
4760 EVP_PKEY *pkey = NULL;
4761
4762 if (ginf == NULL) {
4763 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4764 goto err;
4765 }
4766
4767 pctx = EVP_PKEY_CTX_new_from_name(sctx->libctx, ginf->algorithm,
4768 sctx->propq);
4769
4770 if (pctx == NULL) {
4771 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);
4772 goto err;
4773 }
4774 if (EVP_PKEY_keygen_init(pctx) <= 0) {
4775 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);
4776 goto err;
4777 }
4778 if (EVP_PKEY_CTX_set_group_name(pctx, ginf->realname) <= 0) {
4779 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);
4780 goto err;
4781 }
4782 if (EVP_PKEY_keygen(pctx, &pkey) <= 0) {
4783 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);
4784 EVP_PKEY_free(pkey);
4785 pkey = NULL;
4786 }
4787
4788 err:
4789 EVP_PKEY_CTX_free(pctx);
4790 return pkey;
4791 }
4792
4793 /*
4794 * Generate parameters from a group ID
4795 */
4796 EVP_PKEY *ssl_generate_param_group(SSL_CONNECTION *s, uint16_t id)
4797 {
4798 SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);
4799 EVP_PKEY_CTX *pctx = NULL;
4800 EVP_PKEY *pkey = NULL;
4801 const TLS_GROUP_INFO *ginf = tls1_group_id_lookup(sctx, id);
4802
4803 if (ginf == NULL)
4804 goto err;
4805
4806 pctx = EVP_PKEY_CTX_new_from_name(sctx->libctx, ginf->algorithm,
4807 sctx->propq);
4808
4809 if (pctx == NULL)
4810 goto err;
4811 if (EVP_PKEY_paramgen_init(pctx) <= 0)
4812 goto err;
4813 if (EVP_PKEY_CTX_set_group_name(pctx, ginf->realname) <= 0) {
4814 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);
4815 goto err;
4816 }
4817 if (EVP_PKEY_paramgen(pctx, &pkey) <= 0) {
4818 EVP_PKEY_free(pkey);
4819 pkey = NULL;
4820 }
4821
4822 err:
4823 EVP_PKEY_CTX_free(pctx);
4824 return pkey;
4825 }
4826
4827 /* Generate secrets from pms */
4828 int ssl_gensecret(SSL_CONNECTION *s, unsigned char *pms, size_t pmslen)
4829 {
4830 int rv = 0;
4831
4832 /* SSLfatal() called as appropriate in the below functions */
4833 if (SSL_CONNECTION_IS_TLS13(s)) {
4834 /*
4835 * If we are resuming then we already generated the early secret
4836 * when we created the ClientHello, so don't recreate it.
4837 */
4838 if (!s->hit)
4839 rv = tls13_generate_secret(s, ssl_handshake_md(s), NULL, NULL,
4840 0,
4841 (unsigned char *)&s->early_secret);
4842 else
4843 rv = 1;
4844
4845 rv = rv && tls13_generate_handshake_secret(s, pms, pmslen);
4846 } else {
4847 rv = ssl_generate_master_secret(s, pms, pmslen, 0);
4848 }
4849
4850 return rv;
4851 }
4852
4853 /* Derive secrets for ECDH/DH */
4854 int ssl_derive(SSL_CONNECTION *s, EVP_PKEY *privkey, EVP_PKEY *pubkey, int gensecret)
4855 {
4856 int rv = 0;
4857 unsigned char *pms = NULL;
4858 size_t pmslen = 0;
4859 EVP_PKEY_CTX *pctx;
4860 SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);
4861
4862 if (privkey == NULL || pubkey == NULL) {
4863 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4864 return 0;
4865 }
4866
4867 pctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, privkey, sctx->propq);
4868
4869 if (EVP_PKEY_derive_init(pctx) <= 0
4870 || EVP_PKEY_derive_set_peer(pctx, pubkey) <= 0
4871 || EVP_PKEY_derive(pctx, NULL, &pmslen) <= 0) {
4872 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4873 goto err;
4874 }
4875
4876 if (SSL_CONNECTION_IS_TLS13(s) && EVP_PKEY_is_a(privkey, "DH"))
4877 EVP_PKEY_CTX_set_dh_pad(pctx, 1);
4878
4879 pms = OPENSSL_malloc(pmslen);
4880 if (pms == NULL) {
4881 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB);
4882 goto err;
4883 }
4884
4885 if (EVP_PKEY_derive(pctx, pms, &pmslen) <= 0) {
4886 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4887 goto err;
4888 }
4889
4890 if (gensecret) {
4891 /* SSLfatal() called as appropriate in the below functions */
4892 rv = ssl_gensecret(s, pms, pmslen);
4893 } else {
4894 /* Save premaster secret */
4895 s->s3.tmp.pms = pms;
4896 s->s3.tmp.pmslen = pmslen;
4897 pms = NULL;
4898 rv = 1;
4899 }
4900
4901 err:
4902 OPENSSL_clear_free(pms, pmslen);
4903 EVP_PKEY_CTX_free(pctx);
4904 return rv;
4905 }
4906
4907 /* Decapsulate secrets for KEM */
4908 int ssl_decapsulate(SSL_CONNECTION *s, EVP_PKEY *privkey,
4909 const unsigned char *ct, size_t ctlen,
4910 int gensecret)
4911 {
4912 int rv = 0;
4913 unsigned char *pms = NULL;
4914 size_t pmslen = 0;
4915 EVP_PKEY_CTX *pctx;
4916 SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);
4917
4918 if (privkey == NULL) {
4919 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4920 return 0;
4921 }
4922
4923 pctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, privkey, sctx->propq);
4924
4925 if (EVP_PKEY_decapsulate_init(pctx, NULL) <= 0
4926 || EVP_PKEY_decapsulate(pctx, NULL, &pmslen, ct, ctlen) <= 0) {
4927 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4928 goto err;
4929 }
4930
4931 pms = OPENSSL_malloc(pmslen);
4932 if (pms == NULL) {
4933 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB);
4934 goto err;
4935 }
4936
4937 if (EVP_PKEY_decapsulate(pctx, pms, &pmslen, ct, ctlen) <= 0) {
4938 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4939 goto err;
4940 }
4941
4942 if (gensecret) {
4943 /* SSLfatal() called as appropriate in the below functions */
4944 rv = ssl_gensecret(s, pms, pmslen);
4945 } else {
4946 /* Save premaster secret */
4947 s->s3.tmp.pms = pms;
4948 s->s3.tmp.pmslen = pmslen;
4949 pms = NULL;
4950 rv = 1;
4951 }
4952
4953 err:
4954 OPENSSL_clear_free(pms, pmslen);
4955 EVP_PKEY_CTX_free(pctx);
4956 return rv;
4957 }
4958
4959 int ssl_encapsulate(SSL_CONNECTION *s, EVP_PKEY *pubkey,
4960 unsigned char **ctp, size_t *ctlenp,
4961 int gensecret)
4962 {
4963 int rv = 0;
4964 unsigned char *pms = NULL, *ct = NULL;
4965 size_t pmslen = 0, ctlen = 0;
4966 EVP_PKEY_CTX *pctx;
4967 SSL_CTX *sctx = SSL_CONNECTION_GET_CTX(s);
4968
4969 if (pubkey == NULL) {
4970 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4971 return 0;
4972 }
4973
4974 pctx = EVP_PKEY_CTX_new_from_pkey(sctx->libctx, pubkey, sctx->propq);
4975
4976 if (EVP_PKEY_encapsulate_init(pctx, NULL) <= 0
4977 || EVP_PKEY_encapsulate(pctx, NULL, &ctlen, NULL, &pmslen) <= 0
4978 || pmslen == 0 || ctlen == 0) {
4979 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4980 goto err;
4981 }
4982
4983 pms = OPENSSL_malloc(pmslen);
4984 ct = OPENSSL_malloc(ctlen);
4985 if (pms == NULL || ct == NULL) {
4986 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_CRYPTO_LIB);
4987 goto err;
4988 }
4989
4990 if (EVP_PKEY_encapsulate(pctx, ct, &ctlen, pms, &pmslen) <= 0) {
4991 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4992 goto err;
4993 }
4994
4995 if (gensecret) {
4996 /* SSLfatal() called as appropriate in the below functions */
4997 rv = ssl_gensecret(s, pms, pmslen);
4998 } else {
4999 /* Save premaster secret */
5000 s->s3.tmp.pms = pms;
5001 s->s3.tmp.pmslen = pmslen;
5002 pms = NULL;
5003 rv = 1;
5004 }
5005
5006 if (rv > 0) {
5007 /* Pass ownership of ct to caller */
5008 *ctp = ct;
5009 *ctlenp = ctlen;
5010 ct = NULL;
5011 }
5012
5013 err:
5014 OPENSSL_clear_free(pms, pmslen);
5015 OPENSSL_free(ct);
5016 EVP_PKEY_CTX_free(pctx);
5017 return rv;
5018 }
5019
5020 const char *SSL_group_to_name(SSL *s, int nid) {
5021 int group_id = 0;
5022 const TLS_GROUP_INFO *cinf = NULL;
5023
5024 /* first convert to real group id for internal and external IDs */
5025 if (nid & TLSEXT_nid_unknown)
5026 group_id = nid & 0xFFFF;
5027 else
5028 group_id = tls1_nid2group_id(nid);
5029
5030 /* then look up */
5031 cinf = tls1_group_id_lookup(s->ctx, group_id);
5032
5033 if (cinf != NULL)
5034 return cinf->tlsname;
5035 return NULL;
5036 }