blob: f4423b285587fa5fb381d40b2a2af09021159c37 [file] [log] [blame]
Rich Salz846e33c2016-05-17 14:18:30 -04001/*
Pauli9bb6f822017-02-02 09:56:47 +10002 * Copyright 1995-2017 The OpenSSL Project Authors. All Rights Reserved.
Rich Salzaa8f3d72017-06-15 10:16:46 -04003 * Copyright (c) 2002, Oracle and/or its affiliates. All rights reserved
Rich Salzc80149d2017-06-20 10:14:36 -04004 * Copyright 2005 Nokia. All rights reserved.
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00005 *
Rich Salz846e33c2016-05-17 14:18:30 -04006 * Licensed under the OpenSSL license (the "License"). You may not use
7 * this file except in compliance with the License. You can obtain a copy
8 * in the file LICENSE in the source distribution or at
9 * https://www.openssl.org/source/license.html
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +000010 */
Rich Salz846e33c2016-05-17 14:18:30 -040011
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +000012#include <stdio.h>
Bodo Möllerec577821999-04-23 22:13:45 +000013#include <openssl/objects.h>
Pauli677963e2017-08-18 13:52:46 +100014#include "internal/nelem.h"
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +000015#include "ssl_locl.h"
Ben Lauriedbad1692001-07-30 23:57:25 +000016#include <openssl/md5.h>
Rich Salz3c272082016-03-18 14:30:20 -040017#include <openssl/dh.h>
Matt Caswella3680c82015-03-31 13:57:46 +010018#include <openssl/rand.h>
Rich Salz5f8dd0f2017-08-03 16:21:01 -040019#include "internal/cryptlib.h"
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +000020
Dr. Stephen Hensonb6eb9822015-05-02 18:30:00 +010021#define SSL3_NUM_CIPHERS OSSL_NELEM(ssl3_ciphers)
Benjamin Kaduk650c6e42017-02-03 17:17:21 -060022#define SSL3_NUM_SCSVS OSSL_NELEM(ssl3_scsvs)
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +000023
Matt Caswell643a3582017-03-24 09:57:21 +000024/* TLSv1.3 downgrade protection sentinel values */
25const unsigned char tls11downgrade[] = {
26 0x44, 0x4f, 0x57, 0x4e, 0x47, 0x52, 0x44, 0x00
27};
28const unsigned char tls12downgrade[] = {
29 0x44, 0x4f, 0x57, 0x4e, 0x47, 0x52, 0x44, 0x01
30};
31
Rich Salz748f2542016-03-16 12:33:00 -040032/*
Rich Salzef288912016-08-18 08:56:42 -040033 * The list of available ciphers, mostly organized into the following
Rich Salz748f2542016-03-16 12:33:00 -040034 * groups:
35 * Always there
36 * EC
37 * PSK
38 * SRP (within that: RSA EC PSK)
Pauli9bb6f822017-02-02 09:56:47 +100039 * Cipher families: Chacha/poly, Camellia, Gost, IDEA, SEED
Rich Salz748f2542016-03-16 12:33:00 -040040 * Weak ciphers
41 */
Emilia Kaspera230b262016-08-05 19:03:17 +020042static SSL_CIPHER ssl3_ciphers[] = {
Matt Caswell0f113f32015-01-22 03:40:55 +000043 {
44 1,
45 SSL3_TXT_RSA_NULL_MD5,
Paul Yangbbb4ceb2017-06-30 03:06:19 +080046 SSL3_RFC_RSA_NULL_MD5,
Matt Caswell0f113f32015-01-22 03:40:55 +000047 SSL3_CK_RSA_NULL_MD5,
48 SSL_kRSA,
49 SSL_aRSA,
50 SSL_eNULL,
51 SSL_MD5,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +010052 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +010053 DTLS1_BAD_VER, DTLS1_2_VERSION,
Kurt Roeckx1510b5f2016-03-03 22:02:58 +010054 SSL_STRONG_NONE,
Matt Caswell0f113f32015-01-22 03:40:55 +000055 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
56 0,
57 0,
58 },
Matt Caswell0f113f32015-01-22 03:40:55 +000059 {
60 1,
61 SSL3_TXT_RSA_NULL_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +080062 SSL3_RFC_RSA_NULL_SHA,
Matt Caswell0f113f32015-01-22 03:40:55 +000063 SSL3_CK_RSA_NULL_SHA,
64 SSL_kRSA,
65 SSL_aRSA,
66 SSL_eNULL,
67 SSL_SHA1,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +010068 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +010069 DTLS1_BAD_VER, DTLS1_2_VERSION,
Kurt Roeckx1510b5f2016-03-03 22:02:58 +010070 SSL_STRONG_NONE | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +000071 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
72 0,
73 0,
74 },
Rich Salzd33726b2016-07-30 12:21:32 -040075#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
Matt Caswell0f113f32015-01-22 03:40:55 +000076 {
77 1,
78 SSL3_TXT_RSA_DES_192_CBC3_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +080079 SSL3_RFC_RSA_DES_192_CBC3_SHA,
Matt Caswell0f113f32015-01-22 03:40:55 +000080 SSL3_CK_RSA_DES_192_CBC3_SHA,
81 SSL_kRSA,
82 SSL_aRSA,
83 SSL_3DES,
84 SSL_SHA1,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +010085 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +010086 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salzef288912016-08-18 08:56:42 -040087 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +000088 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
89 112,
90 168,
91 },
Matt Caswell0f113f32015-01-22 03:40:55 +000092 {
93 1,
94 SSL3_TXT_DHE_DSS_DES_192_CBC3_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +080095 SSL3_RFC_DHE_DSS_DES_192_CBC3_SHA,
Matt Caswell0f113f32015-01-22 03:40:55 +000096 SSL3_CK_DHE_DSS_DES_192_CBC3_SHA,
97 SSL_kDHE,
98 SSL_aDSS,
99 SSL_3DES,
100 SSL_SHA1,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100101 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +0100102 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz4a8e9c22016-05-05 17:08:41 -0400103 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000104 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
105 112,
106 168,
107 },
Matt Caswell0f113f32015-01-22 03:40:55 +0000108 {
109 1,
110 SSL3_TXT_DHE_RSA_DES_192_CBC3_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800111 SSL3_RFC_DHE_RSA_DES_192_CBC3_SHA,
Matt Caswell0f113f32015-01-22 03:40:55 +0000112 SSL3_CK_DHE_RSA_DES_192_CBC3_SHA,
113 SSL_kDHE,
114 SSL_aRSA,
115 SSL_3DES,
116 SSL_SHA1,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100117 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +0100118 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salzef288912016-08-18 08:56:42 -0400119 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000120 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
121 112,
122 168,
123 },
Matt Caswell0f113f32015-01-22 03:40:55 +0000124 {
125 1,
126 SSL3_TXT_ADH_DES_192_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800127 SSL3_RFC_ADH_DES_192_CBC_SHA,
Matt Caswell0f113f32015-01-22 03:40:55 +0000128 SSL3_CK_ADH_DES_192_CBC_SHA,
129 SSL_kDHE,
130 SSL_aNULL,
131 SSL_3DES,
132 SSL_SHA1,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100133 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +0100134 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz4a8e9c22016-05-05 17:08:41 -0400135 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000136 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
137 112,
138 168,
139 },
Rich Salzd33726b2016-07-30 12:21:32 -0400140#endif
Matt Caswell0f113f32015-01-22 03:40:55 +0000141 {
142 1,
143 TLS1_TXT_RSA_WITH_AES_128_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800144 TLS1_RFC_RSA_WITH_AES_128_SHA,
Matt Caswell0f113f32015-01-22 03:40:55 +0000145 TLS1_CK_RSA_WITH_AES_128_SHA,
146 SSL_kRSA,
147 SSL_aRSA,
148 SSL_AES128,
149 SSL_SHA1,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100150 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +0100151 DTLS1_BAD_VER, DTLS1_2_VERSION,
Kurt Roeckx361a1192015-12-05 02:04:41 +0100152 SSL_HIGH | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000153 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
154 128,
155 128,
156 },
Matt Caswell0f113f32015-01-22 03:40:55 +0000157 {
158 1,
159 TLS1_TXT_DHE_DSS_WITH_AES_128_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800160 TLS1_RFC_DHE_DSS_WITH_AES_128_SHA,
Matt Caswell0f113f32015-01-22 03:40:55 +0000161 TLS1_CK_DHE_DSS_WITH_AES_128_SHA,
162 SSL_kDHE,
163 SSL_aDSS,
164 SSL_AES128,
165 SSL_SHA1,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100166 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +0100167 DTLS1_BAD_VER, DTLS1_2_VERSION,
Emilia Kaspera556f342016-03-03 19:50:03 +0100168 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000169 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
170 128,
171 128,
172 },
Matt Caswell0f113f32015-01-22 03:40:55 +0000173 {
174 1,
175 TLS1_TXT_DHE_RSA_WITH_AES_128_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800176 TLS1_RFC_DHE_RSA_WITH_AES_128_SHA,
Matt Caswell0f113f32015-01-22 03:40:55 +0000177 TLS1_CK_DHE_RSA_WITH_AES_128_SHA,
178 SSL_kDHE,
179 SSL_aRSA,
180 SSL_AES128,
181 SSL_SHA1,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100182 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +0100183 DTLS1_BAD_VER, DTLS1_2_VERSION,
Kurt Roeckx361a1192015-12-05 02:04:41 +0100184 SSL_HIGH | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000185 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
186 128,
187 128,
188 },
Matt Caswell0f113f32015-01-22 03:40:55 +0000189 {
190 1,
191 TLS1_TXT_ADH_WITH_AES_128_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800192 TLS1_RFC_ADH_WITH_AES_128_SHA,
Matt Caswell0f113f32015-01-22 03:40:55 +0000193 TLS1_CK_ADH_WITH_AES_128_SHA,
194 SSL_kDHE,
195 SSL_aNULL,
196 SSL_AES128,
197 SSL_SHA1,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100198 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +0100199 DTLS1_BAD_VER, DTLS1_2_VERSION,
Kurt Roeckx361a1192015-12-05 02:04:41 +0100200 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000201 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
202 128,
203 128,
204 },
Matt Caswell0f113f32015-01-22 03:40:55 +0000205 {
206 1,
207 TLS1_TXT_RSA_WITH_AES_256_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800208 TLS1_RFC_RSA_WITH_AES_256_SHA,
Matt Caswell0f113f32015-01-22 03:40:55 +0000209 TLS1_CK_RSA_WITH_AES_256_SHA,
210 SSL_kRSA,
211 SSL_aRSA,
212 SSL_AES256,
213 SSL_SHA1,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100214 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +0100215 DTLS1_BAD_VER, DTLS1_2_VERSION,
Kurt Roeckx361a1192015-12-05 02:04:41 +0100216 SSL_HIGH | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000217 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
218 256,
219 256,
220 },
Matt Caswell0f113f32015-01-22 03:40:55 +0000221 {
222 1,
223 TLS1_TXT_DHE_DSS_WITH_AES_256_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800224 TLS1_RFC_DHE_DSS_WITH_AES_256_SHA,
Matt Caswell0f113f32015-01-22 03:40:55 +0000225 TLS1_CK_DHE_DSS_WITH_AES_256_SHA,
226 SSL_kDHE,
227 SSL_aDSS,
228 SSL_AES256,
229 SSL_SHA1,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100230 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +0100231 DTLS1_BAD_VER, DTLS1_2_VERSION,
Emilia Kaspera556f342016-03-03 19:50:03 +0100232 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000233 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
234 256,
235 256,
236 },
Matt Caswell0f113f32015-01-22 03:40:55 +0000237 {
238 1,
239 TLS1_TXT_DHE_RSA_WITH_AES_256_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800240 TLS1_RFC_DHE_RSA_WITH_AES_256_SHA,
Matt Caswell0f113f32015-01-22 03:40:55 +0000241 TLS1_CK_DHE_RSA_WITH_AES_256_SHA,
242 SSL_kDHE,
243 SSL_aRSA,
244 SSL_AES256,
245 SSL_SHA1,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100246 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +0100247 DTLS1_BAD_VER, DTLS1_2_VERSION,
Kurt Roeckx361a1192015-12-05 02:04:41 +0100248 SSL_HIGH | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000249 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
250 256,
251 256,
252 },
Matt Caswell0f113f32015-01-22 03:40:55 +0000253 {
254 1,
255 TLS1_TXT_ADH_WITH_AES_256_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800256 TLS1_RFC_ADH_WITH_AES_256_SHA,
Matt Caswell0f113f32015-01-22 03:40:55 +0000257 TLS1_CK_ADH_WITH_AES_256_SHA,
258 SSL_kDHE,
259 SSL_aNULL,
260 SSL_AES256,
261 SSL_SHA1,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100262 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +0100263 DTLS1_BAD_VER, DTLS1_2_VERSION,
Kurt Roeckx361a1192015-12-05 02:04:41 +0100264 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000265 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
266 256,
267 256,
268 },
Matt Caswell0f113f32015-01-22 03:40:55 +0000269 {
270 1,
271 TLS1_TXT_RSA_WITH_NULL_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800272 TLS1_RFC_RSA_WITH_NULL_SHA256,
Matt Caswell0f113f32015-01-22 03:40:55 +0000273 TLS1_CK_RSA_WITH_NULL_SHA256,
274 SSL_kRSA,
275 SSL_aRSA,
276 SSL_eNULL,
277 SSL_SHA256,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100278 TLS1_2_VERSION, TLS1_2_VERSION,
279 DTLS1_2_VERSION, DTLS1_2_VERSION,
Kurt Roeckx1510b5f2016-03-03 22:02:58 +0100280 SSL_STRONG_NONE | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000281 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
282 0,
283 0,
284 },
Matt Caswell0f113f32015-01-22 03:40:55 +0000285 {
286 1,
287 TLS1_TXT_RSA_WITH_AES_128_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800288 TLS1_RFC_RSA_WITH_AES_128_SHA256,
Matt Caswell0f113f32015-01-22 03:40:55 +0000289 TLS1_CK_RSA_WITH_AES_128_SHA256,
290 SSL_kRSA,
291 SSL_aRSA,
292 SSL_AES128,
293 SSL_SHA256,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100294 TLS1_2_VERSION, TLS1_2_VERSION,
295 DTLS1_2_VERSION, DTLS1_2_VERSION,
Kurt Roeckx361a1192015-12-05 02:04:41 +0100296 SSL_HIGH | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000297 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
298 128,
299 128,
300 },
Matt Caswell0f113f32015-01-22 03:40:55 +0000301 {
302 1,
303 TLS1_TXT_RSA_WITH_AES_256_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800304 TLS1_RFC_RSA_WITH_AES_256_SHA256,
Matt Caswell0f113f32015-01-22 03:40:55 +0000305 TLS1_CK_RSA_WITH_AES_256_SHA256,
306 SSL_kRSA,
307 SSL_aRSA,
308 SSL_AES256,
309 SSL_SHA256,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100310 TLS1_2_VERSION, TLS1_2_VERSION,
311 DTLS1_2_VERSION, DTLS1_2_VERSION,
Kurt Roeckx361a1192015-12-05 02:04:41 +0100312 SSL_HIGH | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000313 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
314 256,
315 256,
316 },
Matt Caswell0f113f32015-01-22 03:40:55 +0000317 {
318 1,
319 TLS1_TXT_DHE_DSS_WITH_AES_128_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800320 TLS1_RFC_DHE_DSS_WITH_AES_128_SHA256,
Matt Caswell0f113f32015-01-22 03:40:55 +0000321 TLS1_CK_DHE_DSS_WITH_AES_128_SHA256,
322 SSL_kDHE,
323 SSL_aDSS,
324 SSL_AES128,
325 SSL_SHA256,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100326 TLS1_2_VERSION, TLS1_2_VERSION,
327 DTLS1_2_VERSION, DTLS1_2_VERSION,
Emilia Kaspera556f342016-03-03 19:50:03 +0100328 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000329 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
330 128,
331 128,
332 },
Matt Caswell0f113f32015-01-22 03:40:55 +0000333 {
334 1,
335 TLS1_TXT_DHE_RSA_WITH_AES_128_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800336 TLS1_RFC_DHE_RSA_WITH_AES_128_SHA256,
Matt Caswell0f113f32015-01-22 03:40:55 +0000337 TLS1_CK_DHE_RSA_WITH_AES_128_SHA256,
338 SSL_kDHE,
339 SSL_aRSA,
340 SSL_AES128,
341 SSL_SHA256,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100342 TLS1_2_VERSION, TLS1_2_VERSION,
343 DTLS1_2_VERSION, DTLS1_2_VERSION,
Kurt Roeckx361a1192015-12-05 02:04:41 +0100344 SSL_HIGH | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000345 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
346 128,
347 128,
348 },
Matt Caswell0f113f32015-01-22 03:40:55 +0000349 {
350 1,
351 TLS1_TXT_DHE_DSS_WITH_AES_256_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800352 TLS1_RFC_DHE_DSS_WITH_AES_256_SHA256,
Matt Caswell0f113f32015-01-22 03:40:55 +0000353 TLS1_CK_DHE_DSS_WITH_AES_256_SHA256,
354 SSL_kDHE,
355 SSL_aDSS,
356 SSL_AES256,
357 SSL_SHA256,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100358 TLS1_2_VERSION, TLS1_2_VERSION,
359 DTLS1_2_VERSION, DTLS1_2_VERSION,
Emilia Kaspera556f342016-03-03 19:50:03 +0100360 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000361 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
362 256,
363 256,
364 },
Matt Caswell0f113f32015-01-22 03:40:55 +0000365 {
366 1,
367 TLS1_TXT_DHE_RSA_WITH_AES_256_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800368 TLS1_RFC_DHE_RSA_WITH_AES_256_SHA256,
Matt Caswell0f113f32015-01-22 03:40:55 +0000369 TLS1_CK_DHE_RSA_WITH_AES_256_SHA256,
370 SSL_kDHE,
371 SSL_aRSA,
372 SSL_AES256,
373 SSL_SHA256,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100374 TLS1_2_VERSION, TLS1_2_VERSION,
375 DTLS1_2_VERSION, DTLS1_2_VERSION,
Kurt Roeckx361a1192015-12-05 02:04:41 +0100376 SSL_HIGH | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000377 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
378 256,
379 256,
380 },
Matt Caswell0f113f32015-01-22 03:40:55 +0000381 {
382 1,
383 TLS1_TXT_ADH_WITH_AES_128_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800384 TLS1_RFC_ADH_WITH_AES_128_SHA256,
Matt Caswell0f113f32015-01-22 03:40:55 +0000385 TLS1_CK_ADH_WITH_AES_128_SHA256,
386 SSL_kDHE,
387 SSL_aNULL,
388 SSL_AES128,
389 SSL_SHA256,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100390 TLS1_2_VERSION, TLS1_2_VERSION,
391 DTLS1_2_VERSION, DTLS1_2_VERSION,
Kurt Roeckx361a1192015-12-05 02:04:41 +0100392 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000393 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
394 128,
395 128,
396 },
Matt Caswell0f113f32015-01-22 03:40:55 +0000397 {
398 1,
399 TLS1_TXT_ADH_WITH_AES_256_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800400 TLS1_RFC_ADH_WITH_AES_256_SHA256,
Matt Caswell0f113f32015-01-22 03:40:55 +0000401 TLS1_CK_ADH_WITH_AES_256_SHA256,
402 SSL_kDHE,
403 SSL_aNULL,
404 SSL_AES256,
405 SSL_SHA256,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +0100406 TLS1_2_VERSION, TLS1_2_VERSION,
407 DTLS1_2_VERSION, DTLS1_2_VERSION,
Kurt Roeckx361a1192015-12-05 02:04:41 +0100408 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
Matt Caswell0f113f32015-01-22 03:40:55 +0000409 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
410 256,
411 256,
412 },
Rich Salz748f2542016-03-16 12:33:00 -0400413 {
414 1,
415 TLS1_TXT_RSA_WITH_AES_128_GCM_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800416 TLS1_RFC_RSA_WITH_AES_128_GCM_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -0400417 TLS1_CK_RSA_WITH_AES_128_GCM_SHA256,
418 SSL_kRSA,
419 SSL_aRSA,
420 SSL_AES128GCM,
421 SSL_AEAD,
422 TLS1_2_VERSION, TLS1_2_VERSION,
423 DTLS1_2_VERSION, DTLS1_2_VERSION,
424 SSL_HIGH | SSL_FIPS,
425 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
426 128,
427 128,
428 },
429 {
430 1,
431 TLS1_TXT_RSA_WITH_AES_256_GCM_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800432 TLS1_RFC_RSA_WITH_AES_256_GCM_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -0400433 TLS1_CK_RSA_WITH_AES_256_GCM_SHA384,
434 SSL_kRSA,
435 SSL_aRSA,
436 SSL_AES256GCM,
437 SSL_AEAD,
438 TLS1_2_VERSION, TLS1_2_VERSION,
439 DTLS1_2_VERSION, DTLS1_2_VERSION,
440 SSL_HIGH | SSL_FIPS,
441 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
442 256,
443 256,
444 },
445 {
446 1,
447 TLS1_TXT_DHE_RSA_WITH_AES_128_GCM_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800448 TLS1_RFC_DHE_RSA_WITH_AES_128_GCM_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -0400449 TLS1_CK_DHE_RSA_WITH_AES_128_GCM_SHA256,
450 SSL_kDHE,
451 SSL_aRSA,
452 SSL_AES128GCM,
453 SSL_AEAD,
454 TLS1_2_VERSION, TLS1_2_VERSION,
455 DTLS1_2_VERSION, DTLS1_2_VERSION,
456 SSL_HIGH | SSL_FIPS,
457 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
458 128,
459 128,
460 },
461 {
462 1,
463 TLS1_TXT_DHE_RSA_WITH_AES_256_GCM_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800464 TLS1_RFC_DHE_RSA_WITH_AES_256_GCM_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -0400465 TLS1_CK_DHE_RSA_WITH_AES_256_GCM_SHA384,
466 SSL_kDHE,
467 SSL_aRSA,
468 SSL_AES256GCM,
469 SSL_AEAD,
470 TLS1_2_VERSION, TLS1_2_VERSION,
471 DTLS1_2_VERSION, DTLS1_2_VERSION,
472 SSL_HIGH | SSL_FIPS,
473 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
474 256,
475 256,
476 },
477 {
478 1,
479 TLS1_TXT_DHE_DSS_WITH_AES_128_GCM_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800480 TLS1_RFC_DHE_DSS_WITH_AES_128_GCM_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -0400481 TLS1_CK_DHE_DSS_WITH_AES_128_GCM_SHA256,
482 SSL_kDHE,
483 SSL_aDSS,
484 SSL_AES128GCM,
485 SSL_AEAD,
486 TLS1_2_VERSION, TLS1_2_VERSION,
487 DTLS1_2_VERSION, DTLS1_2_VERSION,
488 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
489 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
490 128,
491 128,
492 },
493 {
494 1,
495 TLS1_TXT_DHE_DSS_WITH_AES_256_GCM_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800496 TLS1_RFC_DHE_DSS_WITH_AES_256_GCM_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -0400497 TLS1_CK_DHE_DSS_WITH_AES_256_GCM_SHA384,
498 SSL_kDHE,
499 SSL_aDSS,
500 SSL_AES256GCM,
501 SSL_AEAD,
502 TLS1_2_VERSION, TLS1_2_VERSION,
503 DTLS1_2_VERSION, DTLS1_2_VERSION,
504 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
505 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
506 256,
507 256,
508 },
509 {
510 1,
511 TLS1_TXT_ADH_WITH_AES_128_GCM_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800512 TLS1_RFC_ADH_WITH_AES_128_GCM_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -0400513 TLS1_CK_ADH_WITH_AES_128_GCM_SHA256,
514 SSL_kDHE,
515 SSL_aNULL,
516 SSL_AES128GCM,
517 SSL_AEAD,
518 TLS1_2_VERSION, TLS1_2_VERSION,
519 DTLS1_2_VERSION, DTLS1_2_VERSION,
520 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
521 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
522 128,
523 128,
524 },
525 {
526 1,
527 TLS1_TXT_ADH_WITH_AES_256_GCM_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800528 TLS1_RFC_ADH_WITH_AES_256_GCM_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -0400529 TLS1_CK_ADH_WITH_AES_256_GCM_SHA384,
530 SSL_kDHE,
531 SSL_aNULL,
532 SSL_AES256GCM,
533 SSL_AEAD,
534 TLS1_2_VERSION, TLS1_2_VERSION,
535 DTLS1_2_VERSION, DTLS1_2_VERSION,
536 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
537 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
538 256,
539 256,
540 },
541 {
542 1,
543 TLS1_TXT_RSA_WITH_AES_128_CCM,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800544 TLS1_RFC_RSA_WITH_AES_128_CCM,
Rich Salz748f2542016-03-16 12:33:00 -0400545 TLS1_CK_RSA_WITH_AES_128_CCM,
546 SSL_kRSA,
547 SSL_aRSA,
548 SSL_AES128CCM,
549 SSL_AEAD,
550 TLS1_2_VERSION, TLS1_2_VERSION,
551 DTLS1_2_VERSION, DTLS1_2_VERSION,
552 SSL_NOT_DEFAULT | SSL_HIGH,
553 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
554 128,
555 128,
556 },
557 {
558 1,
559 TLS1_TXT_RSA_WITH_AES_256_CCM,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800560 TLS1_RFC_RSA_WITH_AES_256_CCM,
Rich Salz748f2542016-03-16 12:33:00 -0400561 TLS1_CK_RSA_WITH_AES_256_CCM,
562 SSL_kRSA,
563 SSL_aRSA,
564 SSL_AES256CCM,
565 SSL_AEAD,
566 TLS1_2_VERSION, TLS1_2_VERSION,
567 DTLS1_2_VERSION, DTLS1_2_VERSION,
568 SSL_NOT_DEFAULT | SSL_HIGH,
569 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
570 256,
571 256,
572 },
573 {
574 1,
575 TLS1_TXT_DHE_RSA_WITH_AES_128_CCM,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800576 TLS1_RFC_DHE_RSA_WITH_AES_128_CCM,
Rich Salz748f2542016-03-16 12:33:00 -0400577 TLS1_CK_DHE_RSA_WITH_AES_128_CCM,
578 SSL_kDHE,
579 SSL_aRSA,
580 SSL_AES128CCM,
581 SSL_AEAD,
582 TLS1_2_VERSION, TLS1_2_VERSION,
583 DTLS1_2_VERSION, DTLS1_2_VERSION,
584 SSL_NOT_DEFAULT | SSL_HIGH,
585 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
586 128,
587 128,
588 },
589 {
590 1,
591 TLS1_TXT_DHE_RSA_WITH_AES_256_CCM,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800592 TLS1_RFC_DHE_RSA_WITH_AES_256_CCM,
Rich Salz748f2542016-03-16 12:33:00 -0400593 TLS1_CK_DHE_RSA_WITH_AES_256_CCM,
594 SSL_kDHE,
595 SSL_aRSA,
596 SSL_AES256CCM,
597 SSL_AEAD,
598 TLS1_2_VERSION, TLS1_2_VERSION,
599 DTLS1_2_VERSION, DTLS1_2_VERSION,
600 SSL_NOT_DEFAULT | SSL_HIGH,
601 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
602 256,
603 256,
604 },
605 {
606 1,
607 TLS1_TXT_RSA_WITH_AES_128_CCM_8,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800608 TLS1_RFC_RSA_WITH_AES_128_CCM_8,
Rich Salz748f2542016-03-16 12:33:00 -0400609 TLS1_CK_RSA_WITH_AES_128_CCM_8,
610 SSL_kRSA,
611 SSL_aRSA,
612 SSL_AES128CCM8,
613 SSL_AEAD,
614 TLS1_2_VERSION, TLS1_2_VERSION,
615 DTLS1_2_VERSION, DTLS1_2_VERSION,
616 SSL_NOT_DEFAULT | SSL_HIGH,
617 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
618 128,
619 128,
620 },
621 {
622 1,
623 TLS1_TXT_RSA_WITH_AES_256_CCM_8,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800624 TLS1_RFC_RSA_WITH_AES_256_CCM_8,
Rich Salz748f2542016-03-16 12:33:00 -0400625 TLS1_CK_RSA_WITH_AES_256_CCM_8,
626 SSL_kRSA,
627 SSL_aRSA,
628 SSL_AES256CCM8,
629 SSL_AEAD,
630 TLS1_2_VERSION, TLS1_2_VERSION,
631 DTLS1_2_VERSION, DTLS1_2_VERSION,
632 SSL_NOT_DEFAULT | SSL_HIGH,
633 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
634 256,
635 256,
636 },
637 {
638 1,
639 TLS1_TXT_DHE_RSA_WITH_AES_128_CCM_8,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800640 TLS1_RFC_DHE_RSA_WITH_AES_128_CCM_8,
Rich Salz748f2542016-03-16 12:33:00 -0400641 TLS1_CK_DHE_RSA_WITH_AES_128_CCM_8,
642 SSL_kDHE,
643 SSL_aRSA,
644 SSL_AES128CCM8,
645 SSL_AEAD,
646 TLS1_2_VERSION, TLS1_2_VERSION,
647 DTLS1_2_VERSION, DTLS1_2_VERSION,
648 SSL_NOT_DEFAULT | SSL_HIGH,
649 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
650 128,
651 128,
652 },
653 {
654 1,
655 TLS1_TXT_DHE_RSA_WITH_AES_256_CCM_8,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800656 TLS1_RFC_DHE_RSA_WITH_AES_256_CCM_8,
Rich Salz748f2542016-03-16 12:33:00 -0400657 TLS1_CK_DHE_RSA_WITH_AES_256_CCM_8,
658 SSL_kDHE,
659 SSL_aRSA,
660 SSL_AES256CCM8,
661 SSL_AEAD,
662 TLS1_2_VERSION, TLS1_2_VERSION,
663 DTLS1_2_VERSION, DTLS1_2_VERSION,
664 SSL_NOT_DEFAULT | SSL_HIGH,
665 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
666 256,
667 256,
668 },
669 {
670 1,
671 TLS1_TXT_PSK_WITH_AES_128_CCM,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800672 TLS1_RFC_PSK_WITH_AES_128_CCM,
Rich Salz748f2542016-03-16 12:33:00 -0400673 TLS1_CK_PSK_WITH_AES_128_CCM,
674 SSL_kPSK,
675 SSL_aPSK,
676 SSL_AES128CCM,
677 SSL_AEAD,
678 TLS1_2_VERSION, TLS1_2_VERSION,
679 DTLS1_2_VERSION, DTLS1_2_VERSION,
680 SSL_NOT_DEFAULT | SSL_HIGH,
681 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
682 128,
683 128,
684 },
685 {
686 1,
687 TLS1_TXT_PSK_WITH_AES_256_CCM,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800688 TLS1_RFC_PSK_WITH_AES_256_CCM,
Rich Salz748f2542016-03-16 12:33:00 -0400689 TLS1_CK_PSK_WITH_AES_256_CCM,
690 SSL_kPSK,
691 SSL_aPSK,
692 SSL_AES256CCM,
693 SSL_AEAD,
694 TLS1_2_VERSION, TLS1_2_VERSION,
695 DTLS1_2_VERSION, DTLS1_2_VERSION,
696 SSL_NOT_DEFAULT | SSL_HIGH,
697 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
698 256,
699 256,
700 },
701 {
702 1,
703 TLS1_TXT_DHE_PSK_WITH_AES_128_CCM,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800704 TLS1_RFC_DHE_PSK_WITH_AES_128_CCM,
Rich Salz748f2542016-03-16 12:33:00 -0400705 TLS1_CK_DHE_PSK_WITH_AES_128_CCM,
706 SSL_kDHEPSK,
707 SSL_aPSK,
708 SSL_AES128CCM,
709 SSL_AEAD,
710 TLS1_2_VERSION, TLS1_2_VERSION,
711 DTLS1_2_VERSION, DTLS1_2_VERSION,
712 SSL_NOT_DEFAULT | SSL_HIGH,
713 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
714 128,
715 128,
716 },
717 {
718 1,
719 TLS1_TXT_DHE_PSK_WITH_AES_256_CCM,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800720 TLS1_RFC_DHE_PSK_WITH_AES_256_CCM,
Rich Salz748f2542016-03-16 12:33:00 -0400721 TLS1_CK_DHE_PSK_WITH_AES_256_CCM,
722 SSL_kDHEPSK,
723 SSL_aPSK,
724 SSL_AES256CCM,
725 SSL_AEAD,
726 TLS1_2_VERSION, TLS1_2_VERSION,
727 DTLS1_2_VERSION, DTLS1_2_VERSION,
728 SSL_NOT_DEFAULT | SSL_HIGH,
729 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
730 256,
731 256,
732 },
733 {
734 1,
735 TLS1_TXT_PSK_WITH_AES_128_CCM_8,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800736 TLS1_RFC_PSK_WITH_AES_128_CCM_8,
Rich Salz748f2542016-03-16 12:33:00 -0400737 TLS1_CK_PSK_WITH_AES_128_CCM_8,
738 SSL_kPSK,
739 SSL_aPSK,
740 SSL_AES128CCM8,
741 SSL_AEAD,
742 TLS1_2_VERSION, TLS1_2_VERSION,
743 DTLS1_2_VERSION, DTLS1_2_VERSION,
744 SSL_NOT_DEFAULT | SSL_HIGH,
745 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
746 128,
747 128,
748 },
749 {
750 1,
751 TLS1_TXT_PSK_WITH_AES_256_CCM_8,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800752 TLS1_RFC_PSK_WITH_AES_256_CCM_8,
Rich Salz748f2542016-03-16 12:33:00 -0400753 TLS1_CK_PSK_WITH_AES_256_CCM_8,
754 SSL_kPSK,
755 SSL_aPSK,
756 SSL_AES256CCM8,
757 SSL_AEAD,
758 TLS1_2_VERSION, TLS1_2_VERSION,
759 DTLS1_2_VERSION, DTLS1_2_VERSION,
760 SSL_NOT_DEFAULT | SSL_HIGH,
761 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
762 256,
763 256,
764 },
765 {
766 1,
767 TLS1_TXT_DHE_PSK_WITH_AES_128_CCM_8,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800768 TLS1_RFC_DHE_PSK_WITH_AES_128_CCM_8,
Rich Salz748f2542016-03-16 12:33:00 -0400769 TLS1_CK_DHE_PSK_WITH_AES_128_CCM_8,
770 SSL_kDHEPSK,
771 SSL_aPSK,
772 SSL_AES128CCM8,
773 SSL_AEAD,
774 TLS1_2_VERSION, TLS1_2_VERSION,
775 DTLS1_2_VERSION, DTLS1_2_VERSION,
776 SSL_NOT_DEFAULT | SSL_HIGH,
777 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
778 128,
779 128,
780 },
781 {
782 1,
783 TLS1_TXT_DHE_PSK_WITH_AES_256_CCM_8,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800784 TLS1_RFC_DHE_PSK_WITH_AES_256_CCM_8,
Rich Salz748f2542016-03-16 12:33:00 -0400785 TLS1_CK_DHE_PSK_WITH_AES_256_CCM_8,
786 SSL_kDHEPSK,
787 SSL_aPSK,
788 SSL_AES256CCM8,
789 SSL_AEAD,
790 TLS1_2_VERSION, TLS1_2_VERSION,
791 DTLS1_2_VERSION, DTLS1_2_VERSION,
792 SSL_NOT_DEFAULT | SSL_HIGH,
793 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
794 256,
795 256,
796 },
797 {
798 1,
799 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CCM,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800800 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_CCM,
Rich Salz748f2542016-03-16 12:33:00 -0400801 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM,
802 SSL_kECDHE,
803 SSL_aECDSA,
804 SSL_AES128CCM,
805 SSL_AEAD,
806 TLS1_2_VERSION, TLS1_2_VERSION,
807 DTLS1_2_VERSION, DTLS1_2_VERSION,
808 SSL_NOT_DEFAULT | SSL_HIGH,
809 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
810 128,
811 128,
812 },
813 {
814 1,
815 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CCM,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800816 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_CCM,
Rich Salz748f2542016-03-16 12:33:00 -0400817 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM,
818 SSL_kECDHE,
819 SSL_aECDSA,
820 SSL_AES256CCM,
821 SSL_AEAD,
822 TLS1_2_VERSION, TLS1_2_VERSION,
823 DTLS1_2_VERSION, DTLS1_2_VERSION,
824 SSL_NOT_DEFAULT | SSL_HIGH,
825 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
826 256,
827 256,
828 },
829 {
830 1,
831 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CCM_8,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800832 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_CCM_8,
Rich Salz748f2542016-03-16 12:33:00 -0400833 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM_8,
834 SSL_kECDHE,
835 SSL_aECDSA,
836 SSL_AES128CCM8,
837 SSL_AEAD,
838 TLS1_2_VERSION, TLS1_2_VERSION,
839 DTLS1_2_VERSION, DTLS1_2_VERSION,
840 SSL_NOT_DEFAULT | SSL_HIGH,
841 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
842 128,
843 128,
844 },
845 {
846 1,
847 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CCM_8,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800848 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_CCM_8,
Rich Salz748f2542016-03-16 12:33:00 -0400849 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM_8,
850 SSL_kECDHE,
851 SSL_aECDSA,
852 SSL_AES256CCM8,
853 SSL_AEAD,
854 TLS1_2_VERSION, TLS1_2_VERSION,
855 DTLS1_2_VERSION, DTLS1_2_VERSION,
856 SSL_NOT_DEFAULT | SSL_HIGH,
857 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
858 256,
859 256,
860 },
Matt Caswell582a17d2016-10-21 17:39:33 +0100861 {
862 1,
863 TLS1_3_TXT_AES_128_GCM_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800864 TLS1_3_RFC_AES_128_GCM_SHA256,
Matt Caswell582a17d2016-10-21 17:39:33 +0100865 TLS1_3_CK_AES_128_GCM_SHA256,
Dr. Stephen Henson9c92ea42017-01-31 14:10:36 +0000866 0, 0,
Matt Caswell582a17d2016-10-21 17:39:33 +0100867 SSL_AES128GCM,
868 SSL_AEAD,
869 TLS1_3_VERSION, TLS1_3_VERSION,
Dr. Stephen Hensonf68521e2017-02-02 23:11:07 +0000870 SSL_kANY,
871 SSL_aANY,
872 SSL_HIGH,
873 SSL_HANDSHAKE_MAC_SHA256,
874 128,
875 128,
876 },
877 {
878 1,
879 TLS1_3_TXT_AES_256_GCM_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800880 TLS1_3_RFC_AES_256_GCM_SHA384,
Dr. Stephen Hensonf68521e2017-02-02 23:11:07 +0000881 TLS1_3_CK_AES_256_GCM_SHA384,
882 SSL_kANY,
883 SSL_aANY,
884 SSL_AES256GCM,
885 SSL_AEAD,
886 TLS1_3_VERSION, TLS1_3_VERSION,
Matt Caswell582a17d2016-10-21 17:39:33 +0100887 0, 0,
888 SSL_HIGH,
Dr. Stephen Hensonf68521e2017-02-02 23:11:07 +0000889 SSL_HANDSHAKE_MAC_SHA384,
890 256,
891 256,
892 },
893#if !defined(OPENSSL_NO_CHACHA) && !defined(OPENSSL_NO_POLY1305)
894 {
895 1,
896 TLS1_3_TXT_CHACHA20_POLY1305_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800897 TLS1_3_RFC_CHACHA20_POLY1305_SHA256,
Dr. Stephen Hensonf68521e2017-02-02 23:11:07 +0000898 TLS1_3_CK_CHACHA20_POLY1305_SHA256,
899 SSL_kANY,
900 SSL_aANY,
901 SSL_CHACHA20POLY1305,
902 SSL_AEAD,
903 TLS1_3_VERSION, TLS1_3_VERSION,
904 0, 0,
905 SSL_HIGH,
906 SSL_HANDSHAKE_MAC_SHA256,
907 256,
908 256,
909 },
910#endif
911 {
912 1,
913 TLS1_3_TXT_AES_128_CCM_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800914 TLS1_3_RFC_AES_128_CCM_SHA256,
Dr. Stephen Hensonf68521e2017-02-02 23:11:07 +0000915 TLS1_3_CK_AES_128_CCM_SHA256,
916 SSL_kANY,
917 SSL_aANY,
918 SSL_AES128CCM,
919 SSL_AEAD,
920 TLS1_3_VERSION, TLS1_3_VERSION,
921 0, 0,
922 SSL_NOT_DEFAULT | SSL_HIGH,
923 SSL_HANDSHAKE_MAC_SHA256,
924 128,
925 128,
926 },
927 {
928 1,
929 TLS1_3_TXT_AES_128_CCM_8_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800930 TLS1_3_RFC_AES_128_CCM_8_SHA256,
Dr. Stephen Hensonf68521e2017-02-02 23:11:07 +0000931 TLS1_3_CK_AES_128_CCM_8_SHA256,
932 SSL_kANY,
933 SSL_aANY,
934 SSL_AES128CCM8,
935 SSL_AEAD,
936 TLS1_3_VERSION, TLS1_3_VERSION,
937 0, 0,
938 SSL_NOT_DEFAULT | SSL_HIGH,
939 SSL_HANDSHAKE_MAC_SHA256,
Matt Caswell582a17d2016-10-21 17:39:33 +0100940 128,
941 128,
942 },
Dr. Stephen Henson7409d7a2011-04-29 22:56:51 +0000943
Rich Salz748f2542016-03-16 12:33:00 -0400944#ifndef OPENSSL_NO_EC
945 {
946 1,
947 TLS1_TXT_ECDHE_ECDSA_WITH_NULL_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800948 TLS1_RFC_ECDHE_ECDSA_WITH_NULL_SHA,
Rich Salz748f2542016-03-16 12:33:00 -0400949 TLS1_CK_ECDHE_ECDSA_WITH_NULL_SHA,
950 SSL_kECDHE,
951 SSL_aECDSA,
952 SSL_eNULL,
953 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -0400954 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +0100955 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -0400956 SSL_STRONG_NONE | SSL_FIPS,
957 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
958 0,
959 0,
960 },
Rich Salzd33726b2016-07-30 12:21:32 -0400961# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
Rich Salz748f2542016-03-16 12:33:00 -0400962 {
963 1,
964 TLS1_TXT_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800965 TLS1_RFC_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,
Rich Salz748f2542016-03-16 12:33:00 -0400966 TLS1_CK_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,
967 SSL_kECDHE,
968 SSL_aECDSA,
969 SSL_3DES,
970 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -0400971 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +0100972 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salzef288912016-08-18 08:56:42 -0400973 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
Rich Salz748f2542016-03-16 12:33:00 -0400974 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
975 112,
976 168,
977 },
Rich Salzd33726b2016-07-30 12:21:32 -0400978# endif
Rich Salz748f2542016-03-16 12:33:00 -0400979 {
980 1,
981 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800982 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -0400983 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
984 SSL_kECDHE,
985 SSL_aECDSA,
986 SSL_AES128,
987 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -0400988 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +0100989 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -0400990 SSL_HIGH | SSL_FIPS,
991 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
992 128,
993 128,
994 },
995 {
996 1,
997 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +0800998 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -0400999 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
1000 SSL_kECDHE,
1001 SSL_aECDSA,
1002 SSL_AES256,
1003 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -04001004 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001005 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001006 SSL_HIGH | SSL_FIPS,
1007 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1008 256,
1009 256,
1010 },
1011 {
1012 1,
1013 TLS1_TXT_ECDHE_RSA_WITH_NULL_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001014 TLS1_RFC_ECDHE_RSA_WITH_NULL_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001015 TLS1_CK_ECDHE_RSA_WITH_NULL_SHA,
1016 SSL_kECDHE,
1017 SSL_aRSA,
1018 SSL_eNULL,
1019 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -04001020 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001021 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001022 SSL_STRONG_NONE | SSL_FIPS,
1023 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1024 0,
1025 0,
1026 },
Rich Salzd33726b2016-07-30 12:21:32 -04001027# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
Rich Salz748f2542016-03-16 12:33:00 -04001028 {
1029 1,
1030 TLS1_TXT_ECDHE_RSA_WITH_DES_192_CBC3_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001031 TLS1_RFC_ECDHE_RSA_WITH_DES_192_CBC3_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001032 TLS1_CK_ECDHE_RSA_WITH_DES_192_CBC3_SHA,
1033 SSL_kECDHE,
1034 SSL_aRSA,
1035 SSL_3DES,
1036 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -04001037 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001038 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salzef288912016-08-18 08:56:42 -04001039 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
Rich Salz748f2542016-03-16 12:33:00 -04001040 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1041 112,
1042 168,
1043 },
Rich Salzd33726b2016-07-30 12:21:32 -04001044# endif
Rich Salz748f2542016-03-16 12:33:00 -04001045 {
1046 1,
1047 TLS1_TXT_ECDHE_RSA_WITH_AES_128_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001048 TLS1_RFC_ECDHE_RSA_WITH_AES_128_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001049 TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA,
1050 SSL_kECDHE,
1051 SSL_aRSA,
1052 SSL_AES128,
1053 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -04001054 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001055 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001056 SSL_HIGH | SSL_FIPS,
1057 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1058 128,
1059 128,
1060 },
1061 {
1062 1,
1063 TLS1_TXT_ECDHE_RSA_WITH_AES_256_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001064 TLS1_RFC_ECDHE_RSA_WITH_AES_256_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001065 TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA,
1066 SSL_kECDHE,
1067 SSL_aRSA,
1068 SSL_AES256,
1069 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -04001070 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001071 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001072 SSL_HIGH | SSL_FIPS,
1073 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1074 256,
1075 256,
1076 },
1077 {
1078 1,
1079 TLS1_TXT_ECDH_anon_WITH_NULL_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001080 TLS1_RFC_ECDH_anon_WITH_NULL_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001081 TLS1_CK_ECDH_anon_WITH_NULL_SHA,
1082 SSL_kECDHE,
1083 SSL_aNULL,
1084 SSL_eNULL,
1085 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -04001086 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001087 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001088 SSL_STRONG_NONE | SSL_FIPS,
1089 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1090 0,
1091 0,
1092 },
Rich Salzd33726b2016-07-30 12:21:32 -04001093# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
Rich Salz748f2542016-03-16 12:33:00 -04001094 {
1095 1,
1096 TLS1_TXT_ECDH_anon_WITH_DES_192_CBC3_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001097 TLS1_RFC_ECDH_anon_WITH_DES_192_CBC3_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001098 TLS1_CK_ECDH_anon_WITH_DES_192_CBC3_SHA,
1099 SSL_kECDHE,
1100 SSL_aNULL,
1101 SSL_3DES,
1102 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -04001103 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001104 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz4a8e9c22016-05-05 17:08:41 -04001105 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
Rich Salz748f2542016-03-16 12:33:00 -04001106 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1107 112,
1108 168,
1109 },
Rich Salzd33726b2016-07-30 12:21:32 -04001110# endif
Rich Salz748f2542016-03-16 12:33:00 -04001111 {
1112 1,
1113 TLS1_TXT_ECDH_anon_WITH_AES_128_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001114 TLS1_RFC_ECDH_anon_WITH_AES_128_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001115 TLS1_CK_ECDH_anon_WITH_AES_128_CBC_SHA,
1116 SSL_kECDHE,
1117 SSL_aNULL,
1118 SSL_AES128,
1119 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -04001120 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001121 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001122 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
1123 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1124 128,
1125 128,
1126 },
1127 {
1128 1,
1129 TLS1_TXT_ECDH_anon_WITH_AES_256_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001130 TLS1_RFC_ECDH_anon_WITH_AES_256_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001131 TLS1_CK_ECDH_anon_WITH_AES_256_CBC_SHA,
1132 SSL_kECDHE,
1133 SSL_aNULL,
1134 SSL_AES256,
1135 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -04001136 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001137 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001138 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
1139 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1140 256,
1141 256,
1142 },
1143 {
1144 1,
1145 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001146 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04001147 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_SHA256,
1148 SSL_kECDHE,
1149 SSL_aECDSA,
1150 SSL_AES128,
1151 SSL_SHA256,
1152 TLS1_2_VERSION, TLS1_2_VERSION,
1153 DTLS1_2_VERSION, DTLS1_2_VERSION,
1154 SSL_HIGH | SSL_FIPS,
1155 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1156 128,
1157 128,
1158 },
1159 {
1160 1,
1161 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001162 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04001163 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_SHA384,
1164 SSL_kECDHE,
1165 SSL_aECDSA,
1166 SSL_AES256,
1167 SSL_SHA384,
1168 TLS1_2_VERSION, TLS1_2_VERSION,
1169 DTLS1_2_VERSION, DTLS1_2_VERSION,
1170 SSL_HIGH | SSL_FIPS,
1171 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1172 256,
1173 256,
1174 },
1175 {
1176 1,
1177 TLS1_TXT_ECDHE_RSA_WITH_AES_128_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001178 TLS1_RFC_ECDHE_RSA_WITH_AES_128_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04001179 TLS1_CK_ECDHE_RSA_WITH_AES_128_SHA256,
1180 SSL_kECDHE,
1181 SSL_aRSA,
1182 SSL_AES128,
1183 SSL_SHA256,
1184 TLS1_2_VERSION, TLS1_2_VERSION,
1185 DTLS1_2_VERSION, DTLS1_2_VERSION,
1186 SSL_HIGH | SSL_FIPS,
1187 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1188 128,
1189 128,
1190 },
1191 {
1192 1,
1193 TLS1_TXT_ECDHE_RSA_WITH_AES_256_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001194 TLS1_RFC_ECDHE_RSA_WITH_AES_256_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04001195 TLS1_CK_ECDHE_RSA_WITH_AES_256_SHA384,
1196 SSL_kECDHE,
1197 SSL_aRSA,
1198 SSL_AES256,
1199 SSL_SHA384,
1200 TLS1_2_VERSION, TLS1_2_VERSION,
1201 DTLS1_2_VERSION, DTLS1_2_VERSION,
1202 SSL_HIGH | SSL_FIPS,
1203 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1204 256,
1205 256,
1206 },
1207 {
1208 1,
1209 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001210 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04001211 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
1212 SSL_kECDHE,
1213 SSL_aECDSA,
1214 SSL_AES128GCM,
1215 SSL_AEAD,
1216 TLS1_2_VERSION, TLS1_2_VERSION,
1217 DTLS1_2_VERSION, DTLS1_2_VERSION,
1218 SSL_HIGH | SSL_FIPS,
1219 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1220 128,
1221 128,
1222 },
1223 {
1224 1,
1225 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001226 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04001227 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
1228 SSL_kECDHE,
1229 SSL_aECDSA,
1230 SSL_AES256GCM,
1231 SSL_AEAD,
1232 TLS1_2_VERSION, TLS1_2_VERSION,
1233 DTLS1_2_VERSION, DTLS1_2_VERSION,
1234 SSL_HIGH | SSL_FIPS,
1235 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1236 256,
1237 256,
1238 },
1239 {
1240 1,
1241 TLS1_TXT_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001242 TLS1_RFC_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04001243 TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
1244 SSL_kECDHE,
1245 SSL_aRSA,
1246 SSL_AES128GCM,
1247 SSL_AEAD,
1248 TLS1_2_VERSION, TLS1_2_VERSION,
1249 DTLS1_2_VERSION, DTLS1_2_VERSION,
1250 SSL_HIGH | SSL_FIPS,
1251 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1252 128,
1253 128,
1254 },
1255 {
1256 1,
1257 TLS1_TXT_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001258 TLS1_RFC_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04001259 TLS1_CK_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
1260 SSL_kECDHE,
1261 SSL_aRSA,
1262 SSL_AES256GCM,
1263 SSL_AEAD,
1264 TLS1_2_VERSION, TLS1_2_VERSION,
1265 DTLS1_2_VERSION, DTLS1_2_VERSION,
1266 SSL_HIGH | SSL_FIPS,
1267 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1268 256,
1269 256,
1270 },
Emilia Kaspera230b262016-08-05 19:03:17 +02001271#endif /* OPENSSL_NO_EC */
Rich Salz748f2542016-03-16 12:33:00 -04001272
1273#ifndef OPENSSL_NO_PSK
1274 {
1275 1,
1276 TLS1_TXT_PSK_WITH_NULL_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001277 TLS1_RFC_PSK_WITH_NULL_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001278 TLS1_CK_PSK_WITH_NULL_SHA,
1279 SSL_kPSK,
1280 SSL_aPSK,
1281 SSL_eNULL,
1282 SSL_SHA1,
1283 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001284 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001285 SSL_STRONG_NONE | SSL_FIPS,
1286 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1287 0,
1288 0,
1289 },
1290 {
1291 1,
1292 TLS1_TXT_DHE_PSK_WITH_NULL_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001293 TLS1_RFC_DHE_PSK_WITH_NULL_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001294 TLS1_CK_DHE_PSK_WITH_NULL_SHA,
1295 SSL_kDHEPSK,
1296 SSL_aPSK,
1297 SSL_eNULL,
1298 SSL_SHA1,
1299 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001300 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001301 SSL_STRONG_NONE | SSL_FIPS,
1302 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1303 0,
1304 0,
1305 },
1306 {
1307 1,
1308 TLS1_TXT_RSA_PSK_WITH_NULL_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001309 TLS1_RFC_RSA_PSK_WITH_NULL_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001310 TLS1_CK_RSA_PSK_WITH_NULL_SHA,
1311 SSL_kRSAPSK,
1312 SSL_aRSA,
1313 SSL_eNULL,
1314 SSL_SHA1,
1315 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001316 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001317 SSL_STRONG_NONE | SSL_FIPS,
1318 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1319 0,
1320 0,
1321 },
Rich Salzd33726b2016-07-30 12:21:32 -04001322# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
Rich Salz748f2542016-03-16 12:33:00 -04001323 {
1324 1,
1325 TLS1_TXT_PSK_WITH_3DES_EDE_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001326 TLS1_RFC_PSK_WITH_3DES_EDE_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001327 TLS1_CK_PSK_WITH_3DES_EDE_CBC_SHA,
1328 SSL_kPSK,
1329 SSL_aPSK,
1330 SSL_3DES,
1331 SSL_SHA1,
1332 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001333 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salzef288912016-08-18 08:56:42 -04001334 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
Rich Salz748f2542016-03-16 12:33:00 -04001335 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1336 112,
1337 168,
1338 },
Rich Salzd33726b2016-07-30 12:21:32 -04001339# endif
Rich Salz748f2542016-03-16 12:33:00 -04001340 {
1341 1,
1342 TLS1_TXT_PSK_WITH_AES_128_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001343 TLS1_RFC_PSK_WITH_AES_128_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001344 TLS1_CK_PSK_WITH_AES_128_CBC_SHA,
1345 SSL_kPSK,
1346 SSL_aPSK,
1347 SSL_AES128,
1348 SSL_SHA1,
1349 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001350 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001351 SSL_HIGH | SSL_FIPS,
1352 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1353 128,
1354 128,
1355 },
1356 {
1357 1,
1358 TLS1_TXT_PSK_WITH_AES_256_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001359 TLS1_RFC_PSK_WITH_AES_256_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001360 TLS1_CK_PSK_WITH_AES_256_CBC_SHA,
1361 SSL_kPSK,
1362 SSL_aPSK,
1363 SSL_AES256,
1364 SSL_SHA1,
1365 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001366 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001367 SSL_HIGH | SSL_FIPS,
1368 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1369 256,
1370 256,
1371 },
Rich Salzd33726b2016-07-30 12:21:32 -04001372# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
Rich Salz748f2542016-03-16 12:33:00 -04001373 {
1374 1,
1375 TLS1_TXT_DHE_PSK_WITH_3DES_EDE_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001376 TLS1_RFC_DHE_PSK_WITH_3DES_EDE_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001377 TLS1_CK_DHE_PSK_WITH_3DES_EDE_CBC_SHA,
1378 SSL_kDHEPSK,
1379 SSL_aPSK,
1380 SSL_3DES,
1381 SSL_SHA1,
1382 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001383 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salzef288912016-08-18 08:56:42 -04001384 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
Rich Salz748f2542016-03-16 12:33:00 -04001385 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1386 112,
1387 168,
1388 },
Rich Salzd33726b2016-07-30 12:21:32 -04001389# endif
Rich Salz748f2542016-03-16 12:33:00 -04001390 {
1391 1,
1392 TLS1_TXT_DHE_PSK_WITH_AES_128_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001393 TLS1_RFC_DHE_PSK_WITH_AES_128_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001394 TLS1_CK_DHE_PSK_WITH_AES_128_CBC_SHA,
1395 SSL_kDHEPSK,
1396 SSL_aPSK,
1397 SSL_AES128,
1398 SSL_SHA1,
1399 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001400 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001401 SSL_HIGH | SSL_FIPS,
1402 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1403 128,
1404 128,
1405 },
1406 {
1407 1,
1408 TLS1_TXT_DHE_PSK_WITH_AES_256_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001409 TLS1_RFC_DHE_PSK_WITH_AES_256_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001410 TLS1_CK_DHE_PSK_WITH_AES_256_CBC_SHA,
1411 SSL_kDHEPSK,
1412 SSL_aPSK,
1413 SSL_AES256,
1414 SSL_SHA1,
1415 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001416 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001417 SSL_HIGH | SSL_FIPS,
1418 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1419 256,
1420 256,
1421 },
Rich Salzd33726b2016-07-30 12:21:32 -04001422# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
Rich Salz748f2542016-03-16 12:33:00 -04001423 {
1424 1,
1425 TLS1_TXT_RSA_PSK_WITH_3DES_EDE_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001426 TLS1_RFC_RSA_PSK_WITH_3DES_EDE_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001427 TLS1_CK_RSA_PSK_WITH_3DES_EDE_CBC_SHA,
1428 SSL_kRSAPSK,
1429 SSL_aRSA,
1430 SSL_3DES,
1431 SSL_SHA1,
1432 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001433 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salzef288912016-08-18 08:56:42 -04001434 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
Rich Salz748f2542016-03-16 12:33:00 -04001435 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1436 112,
1437 168,
1438 },
Rich Salzd33726b2016-07-30 12:21:32 -04001439# endif
Rich Salz748f2542016-03-16 12:33:00 -04001440 {
1441 1,
1442 TLS1_TXT_RSA_PSK_WITH_AES_128_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001443 TLS1_RFC_RSA_PSK_WITH_AES_128_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001444 TLS1_CK_RSA_PSK_WITH_AES_128_CBC_SHA,
1445 SSL_kRSAPSK,
1446 SSL_aRSA,
1447 SSL_AES128,
1448 SSL_SHA1,
1449 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001450 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001451 SSL_HIGH | SSL_FIPS,
1452 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1453 128,
1454 128,
1455 },
1456 {
1457 1,
1458 TLS1_TXT_RSA_PSK_WITH_AES_256_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001459 TLS1_RFC_RSA_PSK_WITH_AES_256_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001460 TLS1_CK_RSA_PSK_WITH_AES_256_CBC_SHA,
1461 SSL_kRSAPSK,
1462 SSL_aRSA,
1463 SSL_AES256,
1464 SSL_SHA1,
1465 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001466 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001467 SSL_HIGH | SSL_FIPS,
1468 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1469 256,
1470 256,
1471 },
1472 {
1473 1,
1474 TLS1_TXT_PSK_WITH_AES_128_GCM_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001475 TLS1_RFC_PSK_WITH_AES_128_GCM_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04001476 TLS1_CK_PSK_WITH_AES_128_GCM_SHA256,
1477 SSL_kPSK,
1478 SSL_aPSK,
1479 SSL_AES128GCM,
1480 SSL_AEAD,
1481 TLS1_2_VERSION, TLS1_2_VERSION,
1482 DTLS1_2_VERSION, DTLS1_2_VERSION,
1483 SSL_HIGH | SSL_FIPS,
1484 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1485 128,
1486 128,
1487 },
1488 {
1489 1,
1490 TLS1_TXT_PSK_WITH_AES_256_GCM_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001491 TLS1_RFC_PSK_WITH_AES_256_GCM_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04001492 TLS1_CK_PSK_WITH_AES_256_GCM_SHA384,
1493 SSL_kPSK,
1494 SSL_aPSK,
1495 SSL_AES256GCM,
1496 SSL_AEAD,
1497 TLS1_2_VERSION, TLS1_2_VERSION,
1498 DTLS1_2_VERSION, DTLS1_2_VERSION,
1499 SSL_HIGH | SSL_FIPS,
1500 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1501 256,
1502 256,
1503 },
1504 {
1505 1,
1506 TLS1_TXT_DHE_PSK_WITH_AES_128_GCM_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001507 TLS1_RFC_DHE_PSK_WITH_AES_128_GCM_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04001508 TLS1_CK_DHE_PSK_WITH_AES_128_GCM_SHA256,
1509 SSL_kDHEPSK,
1510 SSL_aPSK,
1511 SSL_AES128GCM,
1512 SSL_AEAD,
1513 TLS1_2_VERSION, TLS1_2_VERSION,
1514 DTLS1_2_VERSION, DTLS1_2_VERSION,
1515 SSL_HIGH | SSL_FIPS,
1516 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1517 128,
1518 128,
1519 },
1520 {
1521 1,
1522 TLS1_TXT_DHE_PSK_WITH_AES_256_GCM_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001523 TLS1_RFC_DHE_PSK_WITH_AES_256_GCM_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04001524 TLS1_CK_DHE_PSK_WITH_AES_256_GCM_SHA384,
1525 SSL_kDHEPSK,
1526 SSL_aPSK,
1527 SSL_AES256GCM,
1528 SSL_AEAD,
1529 TLS1_2_VERSION, TLS1_2_VERSION,
1530 DTLS1_2_VERSION, DTLS1_2_VERSION,
1531 SSL_HIGH | SSL_FIPS,
1532 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1533 256,
1534 256,
1535 },
1536 {
1537 1,
1538 TLS1_TXT_RSA_PSK_WITH_AES_128_GCM_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001539 TLS1_RFC_RSA_PSK_WITH_AES_128_GCM_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04001540 TLS1_CK_RSA_PSK_WITH_AES_128_GCM_SHA256,
1541 SSL_kRSAPSK,
1542 SSL_aRSA,
1543 SSL_AES128GCM,
1544 SSL_AEAD,
1545 TLS1_2_VERSION, TLS1_2_VERSION,
1546 DTLS1_2_VERSION, DTLS1_2_VERSION,
1547 SSL_HIGH | SSL_FIPS,
1548 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1549 128,
1550 128,
1551 },
1552 {
1553 1,
1554 TLS1_TXT_RSA_PSK_WITH_AES_256_GCM_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001555 TLS1_RFC_RSA_PSK_WITH_AES_256_GCM_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04001556 TLS1_CK_RSA_PSK_WITH_AES_256_GCM_SHA384,
1557 SSL_kRSAPSK,
1558 SSL_aRSA,
1559 SSL_AES256GCM,
1560 SSL_AEAD,
1561 TLS1_2_VERSION, TLS1_2_VERSION,
1562 DTLS1_2_VERSION, DTLS1_2_VERSION,
1563 SSL_HIGH | SSL_FIPS,
1564 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1565 256,
1566 256,
1567 },
1568 {
1569 1,
1570 TLS1_TXT_PSK_WITH_AES_128_CBC_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001571 TLS1_RFC_PSK_WITH_AES_128_CBC_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04001572 TLS1_CK_PSK_WITH_AES_128_CBC_SHA256,
1573 SSL_kPSK,
1574 SSL_aPSK,
1575 SSL_AES128,
1576 SSL_SHA256,
1577 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001578 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001579 SSL_HIGH | SSL_FIPS,
1580 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1581 128,
1582 128,
1583 },
1584 {
1585 1,
1586 TLS1_TXT_PSK_WITH_AES_256_CBC_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001587 TLS1_RFC_PSK_WITH_AES_256_CBC_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04001588 TLS1_CK_PSK_WITH_AES_256_CBC_SHA384,
1589 SSL_kPSK,
1590 SSL_aPSK,
1591 SSL_AES256,
1592 SSL_SHA384,
1593 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001594 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001595 SSL_HIGH | SSL_FIPS,
1596 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1597 256,
1598 256,
1599 },
1600 {
1601 1,
1602 TLS1_TXT_PSK_WITH_NULL_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001603 TLS1_RFC_PSK_WITH_NULL_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04001604 TLS1_CK_PSK_WITH_NULL_SHA256,
1605 SSL_kPSK,
1606 SSL_aPSK,
1607 SSL_eNULL,
1608 SSL_SHA256,
1609 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001610 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001611 SSL_STRONG_NONE | SSL_FIPS,
1612 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1613 0,
1614 0,
1615 },
1616 {
1617 1,
1618 TLS1_TXT_PSK_WITH_NULL_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001619 TLS1_RFC_PSK_WITH_NULL_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04001620 TLS1_CK_PSK_WITH_NULL_SHA384,
1621 SSL_kPSK,
1622 SSL_aPSK,
1623 SSL_eNULL,
1624 SSL_SHA384,
1625 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001626 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001627 SSL_STRONG_NONE | SSL_FIPS,
1628 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1629 0,
1630 0,
1631 },
1632 {
1633 1,
1634 TLS1_TXT_DHE_PSK_WITH_AES_128_CBC_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001635 TLS1_RFC_DHE_PSK_WITH_AES_128_CBC_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04001636 TLS1_CK_DHE_PSK_WITH_AES_128_CBC_SHA256,
1637 SSL_kDHEPSK,
1638 SSL_aPSK,
1639 SSL_AES128,
1640 SSL_SHA256,
1641 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001642 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001643 SSL_HIGH | SSL_FIPS,
1644 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1645 128,
1646 128,
1647 },
1648 {
1649 1,
1650 TLS1_TXT_DHE_PSK_WITH_AES_256_CBC_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001651 TLS1_RFC_DHE_PSK_WITH_AES_256_CBC_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04001652 TLS1_CK_DHE_PSK_WITH_AES_256_CBC_SHA384,
1653 SSL_kDHEPSK,
1654 SSL_aPSK,
1655 SSL_AES256,
1656 SSL_SHA384,
1657 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001658 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001659 SSL_HIGH | SSL_FIPS,
1660 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1661 256,
1662 256,
1663 },
1664 {
1665 1,
1666 TLS1_TXT_DHE_PSK_WITH_NULL_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001667 TLS1_RFC_DHE_PSK_WITH_NULL_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04001668 TLS1_CK_DHE_PSK_WITH_NULL_SHA256,
1669 SSL_kDHEPSK,
1670 SSL_aPSK,
1671 SSL_eNULL,
1672 SSL_SHA256,
1673 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001674 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001675 SSL_STRONG_NONE | SSL_FIPS,
1676 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1677 0,
1678 0,
1679 },
1680 {
1681 1,
1682 TLS1_TXT_DHE_PSK_WITH_NULL_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001683 TLS1_RFC_DHE_PSK_WITH_NULL_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04001684 TLS1_CK_DHE_PSK_WITH_NULL_SHA384,
1685 SSL_kDHEPSK,
1686 SSL_aPSK,
1687 SSL_eNULL,
1688 SSL_SHA384,
1689 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001690 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001691 SSL_STRONG_NONE | SSL_FIPS,
1692 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1693 0,
1694 0,
1695 },
1696 {
1697 1,
1698 TLS1_TXT_RSA_PSK_WITH_AES_128_CBC_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001699 TLS1_RFC_RSA_PSK_WITH_AES_128_CBC_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04001700 TLS1_CK_RSA_PSK_WITH_AES_128_CBC_SHA256,
1701 SSL_kRSAPSK,
1702 SSL_aRSA,
1703 SSL_AES128,
1704 SSL_SHA256,
1705 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001706 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001707 SSL_HIGH | SSL_FIPS,
1708 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1709 128,
1710 128,
1711 },
1712 {
1713 1,
1714 TLS1_TXT_RSA_PSK_WITH_AES_256_CBC_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001715 TLS1_RFC_RSA_PSK_WITH_AES_256_CBC_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04001716 TLS1_CK_RSA_PSK_WITH_AES_256_CBC_SHA384,
1717 SSL_kRSAPSK,
1718 SSL_aRSA,
1719 SSL_AES256,
1720 SSL_SHA384,
1721 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001722 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001723 SSL_HIGH | SSL_FIPS,
1724 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1725 256,
1726 256,
1727 },
1728 {
1729 1,
1730 TLS1_TXT_RSA_PSK_WITH_NULL_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001731 TLS1_RFC_RSA_PSK_WITH_NULL_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04001732 TLS1_CK_RSA_PSK_WITH_NULL_SHA256,
1733 SSL_kRSAPSK,
1734 SSL_aRSA,
1735 SSL_eNULL,
1736 SSL_SHA256,
1737 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001738 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001739 SSL_STRONG_NONE | SSL_FIPS,
1740 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1741 0,
1742 0,
1743 },
1744 {
1745 1,
1746 TLS1_TXT_RSA_PSK_WITH_NULL_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001747 TLS1_RFC_RSA_PSK_WITH_NULL_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04001748 TLS1_CK_RSA_PSK_WITH_NULL_SHA384,
1749 SSL_kRSAPSK,
1750 SSL_aRSA,
1751 SSL_eNULL,
1752 SSL_SHA384,
1753 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001754 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001755 SSL_STRONG_NONE | SSL_FIPS,
1756 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1757 0,
1758 0,
1759 },
1760# ifndef OPENSSL_NO_EC
Rich Salzd33726b2016-07-30 12:21:32 -04001761# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
Rich Salz748f2542016-03-16 12:33:00 -04001762 {
1763 1,
1764 TLS1_TXT_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001765 TLS1_RFC_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001766 TLS1_CK_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA,
1767 SSL_kECDHEPSK,
1768 SSL_aPSK,
1769 SSL_3DES,
1770 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -04001771 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001772 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salzef288912016-08-18 08:56:42 -04001773 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
Rich Salz748f2542016-03-16 12:33:00 -04001774 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1775 112,
1776 168,
1777 },
Rich Salzd33726b2016-07-30 12:21:32 -04001778# endif
Rich Salz748f2542016-03-16 12:33:00 -04001779 {
1780 1,
1781 TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001782 TLS1_RFC_ECDHE_PSK_WITH_AES_128_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001783 TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA,
1784 SSL_kECDHEPSK,
1785 SSL_aPSK,
1786 SSL_AES128,
1787 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -04001788 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001789 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001790 SSL_HIGH | SSL_FIPS,
1791 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1792 128,
1793 128,
1794 },
1795 {
1796 1,
1797 TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001798 TLS1_RFC_ECDHE_PSK_WITH_AES_256_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001799 TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA,
1800 SSL_kECDHEPSK,
1801 SSL_aPSK,
1802 SSL_AES256,
1803 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -04001804 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001805 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001806 SSL_HIGH | SSL_FIPS,
1807 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1808 256,
1809 256,
1810 },
1811 {
1812 1,
1813 TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001814 TLS1_RFC_ECDHE_PSK_WITH_AES_128_CBC_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04001815 TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA256,
1816 SSL_kECDHEPSK,
1817 SSL_aPSK,
1818 SSL_AES128,
1819 SSL_SHA256,
1820 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001821 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001822 SSL_HIGH | SSL_FIPS,
1823 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1824 128,
1825 128,
1826 },
1827 {
1828 1,
1829 TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001830 TLS1_RFC_ECDHE_PSK_WITH_AES_256_CBC_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04001831 TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA384,
1832 SSL_kECDHEPSK,
1833 SSL_aPSK,
1834 SSL_AES256,
1835 SSL_SHA384,
1836 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001837 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001838 SSL_HIGH | SSL_FIPS,
1839 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1840 256,
1841 256,
1842 },
1843 {
1844 1,
1845 TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001846 TLS1_RFC_ECDHE_PSK_WITH_NULL_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001847 TLS1_CK_ECDHE_PSK_WITH_NULL_SHA,
1848 SSL_kECDHEPSK,
1849 SSL_aPSK,
1850 SSL_eNULL,
1851 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -04001852 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001853 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001854 SSL_STRONG_NONE | SSL_FIPS,
1855 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1856 0,
1857 0,
1858 },
1859 {
1860 1,
1861 TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001862 TLS1_RFC_ECDHE_PSK_WITH_NULL_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04001863 TLS1_CK_ECDHE_PSK_WITH_NULL_SHA256,
1864 SSL_kECDHEPSK,
1865 SSL_aPSK,
1866 SSL_eNULL,
1867 SSL_SHA256,
1868 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001869 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001870 SSL_STRONG_NONE | SSL_FIPS,
1871 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1872 0,
1873 0,
1874 },
1875 {
1876 1,
1877 TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001878 TLS1_RFC_ECDHE_PSK_WITH_NULL_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04001879 TLS1_CK_ECDHE_PSK_WITH_NULL_SHA384,
1880 SSL_kECDHEPSK,
1881 SSL_aPSK,
1882 SSL_eNULL,
1883 SSL_SHA384,
1884 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001885 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001886 SSL_STRONG_NONE | SSL_FIPS,
1887 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1888 0,
1889 0,
1890 },
Emilia Kaspera230b262016-08-05 19:03:17 +02001891# endif /* OPENSSL_NO_EC */
1892#endif /* OPENSSL_NO_PSK */
Rich Salz748f2542016-03-16 12:33:00 -04001893
1894#ifndef OPENSSL_NO_SRP
Rich Salzd33726b2016-07-30 12:21:32 -04001895# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
Rich Salz748f2542016-03-16 12:33:00 -04001896 {
1897 1,
1898 TLS1_TXT_SRP_SHA_WITH_3DES_EDE_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001899 TLS1_RFC_SRP_SHA_WITH_3DES_EDE_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001900 TLS1_CK_SRP_SHA_WITH_3DES_EDE_CBC_SHA,
1901 SSL_kSRP,
1902 SSL_aSRP,
1903 SSL_3DES,
1904 SSL_SHA1,
1905 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001906 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salzef288912016-08-18 08:56:42 -04001907 SSL_NOT_DEFAULT | SSL_MEDIUM,
Rich Salz748f2542016-03-16 12:33:00 -04001908 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1909 112,
1910 168,
1911 },
1912 {
1913 1,
1914 TLS1_TXT_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001915 TLS1_RFC_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001916 TLS1_CK_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA,
1917 SSL_kSRP,
1918 SSL_aRSA,
1919 SSL_3DES,
1920 SSL_SHA1,
1921 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001922 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salzef288912016-08-18 08:56:42 -04001923 SSL_NOT_DEFAULT | SSL_MEDIUM,
Rich Salz748f2542016-03-16 12:33:00 -04001924 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1925 112,
1926 168,
1927 },
1928 {
1929 1,
1930 TLS1_TXT_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001931 TLS1_RFC_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001932 TLS1_CK_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA,
1933 SSL_kSRP,
1934 SSL_aDSS,
1935 SSL_3DES,
1936 SSL_SHA1,
1937 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001938 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz4a8e9c22016-05-05 17:08:41 -04001939 SSL_NOT_DEFAULT | SSL_MEDIUM,
Rich Salz748f2542016-03-16 12:33:00 -04001940 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1941 112,
1942 168,
1943 },
Rich Salzd33726b2016-07-30 12:21:32 -04001944# endif
Rich Salz748f2542016-03-16 12:33:00 -04001945 {
1946 1,
1947 TLS1_TXT_SRP_SHA_WITH_AES_128_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001948 TLS1_RFC_SRP_SHA_WITH_AES_128_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001949 TLS1_CK_SRP_SHA_WITH_AES_128_CBC_SHA,
1950 SSL_kSRP,
1951 SSL_aSRP,
1952 SSL_AES128,
1953 SSL_SHA1,
1954 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001955 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001956 SSL_HIGH,
1957 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1958 128,
1959 128,
1960 },
1961 {
1962 1,
1963 TLS1_TXT_SRP_SHA_RSA_WITH_AES_128_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001964 TLS1_RFC_SRP_SHA_RSA_WITH_AES_128_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001965 TLS1_CK_SRP_SHA_RSA_WITH_AES_128_CBC_SHA,
1966 SSL_kSRP,
1967 SSL_aRSA,
1968 SSL_AES128,
1969 SSL_SHA1,
1970 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001971 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001972 SSL_HIGH,
1973 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1974 128,
1975 128,
1976 },
1977 {
1978 1,
1979 TLS1_TXT_SRP_SHA_DSS_WITH_AES_128_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001980 TLS1_RFC_SRP_SHA_DSS_WITH_AES_128_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001981 TLS1_CK_SRP_SHA_DSS_WITH_AES_128_CBC_SHA,
1982 SSL_kSRP,
1983 SSL_aDSS,
1984 SSL_AES128,
1985 SSL_SHA1,
1986 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01001987 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04001988 SSL_NOT_DEFAULT | SSL_HIGH,
1989 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1990 128,
1991 128,
1992 },
1993 {
1994 1,
1995 TLS1_TXT_SRP_SHA_WITH_AES_256_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08001996 TLS1_RFC_SRP_SHA_WITH_AES_256_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04001997 TLS1_CK_SRP_SHA_WITH_AES_256_CBC_SHA,
1998 SSL_kSRP,
1999 SSL_aSRP,
2000 SSL_AES256,
2001 SSL_SHA1,
2002 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002003 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002004 SSL_HIGH,
2005 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2006 256,
2007 256,
2008 },
2009 {
2010 1,
2011 TLS1_TXT_SRP_SHA_RSA_WITH_AES_256_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002012 TLS1_RFC_SRP_SHA_RSA_WITH_AES_256_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04002013 TLS1_CK_SRP_SHA_RSA_WITH_AES_256_CBC_SHA,
2014 SSL_kSRP,
2015 SSL_aRSA,
2016 SSL_AES256,
2017 SSL_SHA1,
2018 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002019 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002020 SSL_HIGH,
2021 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2022 256,
2023 256,
2024 },
2025 {
2026 1,
2027 TLS1_TXT_SRP_SHA_DSS_WITH_AES_256_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002028 TLS1_RFC_SRP_SHA_DSS_WITH_AES_256_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04002029 TLS1_CK_SRP_SHA_DSS_WITH_AES_256_CBC_SHA,
2030 SSL_kSRP,
2031 SSL_aDSS,
2032 SSL_AES256,
2033 SSL_SHA1,
2034 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002035 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002036 SSL_NOT_DEFAULT | SSL_HIGH,
2037 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2038 256,
2039 256,
2040 },
Emilia Kaspera230b262016-08-05 19:03:17 +02002041#endif /* OPENSSL_NO_SRP */
Rich Salz748f2542016-03-16 12:33:00 -04002042
2043#if !defined(OPENSSL_NO_CHACHA) && !defined(OPENSSL_NO_POLY1305)
2044# ifndef OPENSSL_NO_RSA
2045 {
2046 1,
2047 TLS1_TXT_DHE_RSA_WITH_CHACHA20_POLY1305,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002048 TLS1_RFC_DHE_RSA_WITH_CHACHA20_POLY1305,
Rich Salz748f2542016-03-16 12:33:00 -04002049 TLS1_CK_DHE_RSA_WITH_CHACHA20_POLY1305,
2050 SSL_kDHE,
2051 SSL_aRSA,
2052 SSL_CHACHA20POLY1305,
2053 SSL_AEAD,
2054 TLS1_2_VERSION, TLS1_2_VERSION,
2055 DTLS1_2_VERSION, DTLS1_2_VERSION,
2056 SSL_HIGH,
2057 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2058 256,
2059 256,
2060 },
Emilia Kaspera230b262016-08-05 19:03:17 +02002061# endif /* OPENSSL_NO_RSA */
Rich Salz748f2542016-03-16 12:33:00 -04002062
2063# ifndef OPENSSL_NO_EC
2064 {
2065 1,
2066 TLS1_TXT_ECDHE_RSA_WITH_CHACHA20_POLY1305,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002067 TLS1_RFC_ECDHE_RSA_WITH_CHACHA20_POLY1305,
Rich Salz748f2542016-03-16 12:33:00 -04002068 TLS1_CK_ECDHE_RSA_WITH_CHACHA20_POLY1305,
2069 SSL_kECDHE,
2070 SSL_aRSA,
2071 SSL_CHACHA20POLY1305,
2072 SSL_AEAD,
2073 TLS1_2_VERSION, TLS1_2_VERSION,
2074 DTLS1_2_VERSION, DTLS1_2_VERSION,
2075 SSL_HIGH,
2076 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2077 256,
2078 256,
2079 },
2080 {
2081 1,
2082 TLS1_TXT_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002083 TLS1_RFC_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
Rich Salz748f2542016-03-16 12:33:00 -04002084 TLS1_CK_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
2085 SSL_kECDHE,
2086 SSL_aECDSA,
2087 SSL_CHACHA20POLY1305,
2088 SSL_AEAD,
2089 TLS1_2_VERSION, TLS1_2_VERSION,
2090 DTLS1_2_VERSION, DTLS1_2_VERSION,
2091 SSL_HIGH,
2092 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2093 256,
2094 256,
2095 },
Emilia Kaspera230b262016-08-05 19:03:17 +02002096# endif /* OPENSSL_NO_EC */
Rich Salz748f2542016-03-16 12:33:00 -04002097
2098# ifndef OPENSSL_NO_PSK
2099 {
2100 1,
2101 TLS1_TXT_PSK_WITH_CHACHA20_POLY1305,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002102 TLS1_RFC_PSK_WITH_CHACHA20_POLY1305,
Rich Salz748f2542016-03-16 12:33:00 -04002103 TLS1_CK_PSK_WITH_CHACHA20_POLY1305,
2104 SSL_kPSK,
2105 SSL_aPSK,
2106 SSL_CHACHA20POLY1305,
2107 SSL_AEAD,
2108 TLS1_2_VERSION, TLS1_2_VERSION,
2109 DTLS1_2_VERSION, DTLS1_2_VERSION,
2110 SSL_HIGH,
2111 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2112 256,
2113 256,
2114 },
2115 {
2116 1,
2117 TLS1_TXT_ECDHE_PSK_WITH_CHACHA20_POLY1305,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002118 TLS1_RFC_ECDHE_PSK_WITH_CHACHA20_POLY1305,
Rich Salz748f2542016-03-16 12:33:00 -04002119 TLS1_CK_ECDHE_PSK_WITH_CHACHA20_POLY1305,
2120 SSL_kECDHEPSK,
2121 SSL_aPSK,
2122 SSL_CHACHA20POLY1305,
2123 SSL_AEAD,
2124 TLS1_2_VERSION, TLS1_2_VERSION,
2125 DTLS1_2_VERSION, DTLS1_2_VERSION,
2126 SSL_HIGH,
2127 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2128 256,
2129 256,
2130 },
2131 {
2132 1,
2133 TLS1_TXT_DHE_PSK_WITH_CHACHA20_POLY1305,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002134 TLS1_RFC_DHE_PSK_WITH_CHACHA20_POLY1305,
Rich Salz748f2542016-03-16 12:33:00 -04002135 TLS1_CK_DHE_PSK_WITH_CHACHA20_POLY1305,
2136 SSL_kDHEPSK,
2137 SSL_aPSK,
2138 SSL_CHACHA20POLY1305,
2139 SSL_AEAD,
2140 TLS1_2_VERSION, TLS1_2_VERSION,
2141 DTLS1_2_VERSION, DTLS1_2_VERSION,
2142 SSL_HIGH,
2143 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2144 256,
2145 256,
2146 },
2147 {
2148 1,
2149 TLS1_TXT_RSA_PSK_WITH_CHACHA20_POLY1305,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002150 TLS1_RFC_RSA_PSK_WITH_CHACHA20_POLY1305,
Rich Salz748f2542016-03-16 12:33:00 -04002151 TLS1_CK_RSA_PSK_WITH_CHACHA20_POLY1305,
2152 SSL_kRSAPSK,
2153 SSL_aRSA,
2154 SSL_CHACHA20POLY1305,
2155 SSL_AEAD,
2156 TLS1_2_VERSION, TLS1_2_VERSION,
2157 DTLS1_2_VERSION, DTLS1_2_VERSION,
2158 SSL_HIGH,
2159 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2160 256,
2161 256,
2162 },
Emilia Kaspera230b262016-08-05 19:03:17 +02002163# endif /* OPENSSL_NO_PSK */
2164#endif /* !defined(OPENSSL_NO_CHACHA) &&
2165 * !defined(OPENSSL_NO_POLY1305) */
Rich Salz748f2542016-03-16 12:33:00 -04002166
2167#ifndef OPENSSL_NO_CAMELLIA
2168 {
2169 1,
2170 TLS1_TXT_RSA_WITH_CAMELLIA_128_CBC_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002171 TLS1_RFC_RSA_WITH_CAMELLIA_128_CBC_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04002172 TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2173 SSL_kRSA,
2174 SSL_aRSA,
2175 SSL_CAMELLIA128,
2176 SSL_SHA256,
2177 TLS1_2_VERSION, TLS1_2_VERSION,
2178 DTLS1_2_VERSION, DTLS1_2_VERSION,
2179 SSL_NOT_DEFAULT | SSL_HIGH,
2180 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2181 128,
2182 128,
2183 },
2184 {
2185 1,
2186 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002187 TLS1_RFC_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04002188 TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256,
2189 SSL_kEDH,
2190 SSL_aDSS,
2191 SSL_CAMELLIA128,
2192 SSL_SHA256,
2193 TLS1_2_VERSION, TLS1_2_VERSION,
2194 DTLS1_2_VERSION, DTLS1_2_VERSION,
2195 SSL_NOT_DEFAULT | SSL_HIGH,
2196 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2197 128,
2198 128,
2199 },
2200 {
2201 1,
2202 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002203 TLS1_RFC_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04002204 TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2205 SSL_kEDH,
2206 SSL_aRSA,
2207 SSL_CAMELLIA128,
2208 SSL_SHA256,
2209 TLS1_2_VERSION, TLS1_2_VERSION,
2210 DTLS1_2_VERSION, DTLS1_2_VERSION,
2211 SSL_NOT_DEFAULT | SSL_HIGH,
2212 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2213 128,
2214 128,
2215 },
2216 {
2217 1,
2218 TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002219 TLS1_RFC_ADH_WITH_CAMELLIA_128_CBC_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04002220 TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA256,
2221 SSL_kEDH,
2222 SSL_aNULL,
2223 SSL_CAMELLIA128,
2224 SSL_SHA256,
2225 TLS1_2_VERSION, TLS1_2_VERSION,
2226 DTLS1_2_VERSION, DTLS1_2_VERSION,
2227 SSL_NOT_DEFAULT | SSL_HIGH,
2228 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2229 128,
2230 128,
2231 },
2232 {
2233 1,
2234 TLS1_TXT_RSA_WITH_CAMELLIA_256_CBC_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002235 TLS1_RFC_RSA_WITH_CAMELLIA_256_CBC_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04002236 TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2237 SSL_kRSA,
2238 SSL_aRSA,
2239 SSL_CAMELLIA256,
2240 SSL_SHA256,
2241 TLS1_2_VERSION, TLS1_2_VERSION,
2242 DTLS1_2_VERSION, DTLS1_2_VERSION,
2243 SSL_NOT_DEFAULT | SSL_HIGH,
2244 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2245 256,
2246 256,
2247 },
2248 {
2249 1,
2250 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002251 TLS1_RFC_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04002252 TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256,
2253 SSL_kEDH,
2254 SSL_aDSS,
2255 SSL_CAMELLIA256,
2256 SSL_SHA256,
2257 TLS1_2_VERSION, TLS1_2_VERSION,
2258 DTLS1_2_VERSION, DTLS1_2_VERSION,
2259 SSL_NOT_DEFAULT | SSL_HIGH,
2260 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2261 256,
2262 256,
2263 },
2264 {
2265 1,
2266 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002267 TLS1_RFC_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04002268 TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2269 SSL_kEDH,
2270 SSL_aRSA,
2271 SSL_CAMELLIA256,
2272 SSL_SHA256,
2273 TLS1_2_VERSION, TLS1_2_VERSION,
2274 DTLS1_2_VERSION, DTLS1_2_VERSION,
2275 SSL_NOT_DEFAULT | SSL_HIGH,
2276 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2277 256,
2278 256,
2279 },
2280 {
2281 1,
2282 TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002283 TLS1_RFC_ADH_WITH_CAMELLIA_256_CBC_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04002284 TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA256,
2285 SSL_kEDH,
2286 SSL_aNULL,
2287 SSL_CAMELLIA256,
2288 SSL_SHA256,
2289 TLS1_2_VERSION, TLS1_2_VERSION,
2290 DTLS1_2_VERSION, DTLS1_2_VERSION,
2291 SSL_NOT_DEFAULT | SSL_HIGH,
2292 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2293 256,
2294 256,
2295 },
2296 {
2297 1,
2298 TLS1_TXT_RSA_WITH_CAMELLIA_256_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002299 TLS1_RFC_RSA_WITH_CAMELLIA_256_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04002300 TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA,
2301 SSL_kRSA,
2302 SSL_aRSA,
2303 SSL_CAMELLIA256,
2304 SSL_SHA1,
2305 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002306 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002307 SSL_NOT_DEFAULT | SSL_HIGH,
2308 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2309 256,
2310 256,
2311 },
2312 {
2313 1,
2314 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002315 TLS1_RFC_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04002316 TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,
2317 SSL_kDHE,
2318 SSL_aDSS,
2319 SSL_CAMELLIA256,
2320 SSL_SHA1,
2321 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002322 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002323 SSL_NOT_DEFAULT | SSL_HIGH,
2324 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2325 256,
2326 256,
2327 },
2328 {
2329 1,
2330 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002331 TLS1_RFC_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04002332 TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,
2333 SSL_kDHE,
2334 SSL_aRSA,
2335 SSL_CAMELLIA256,
2336 SSL_SHA1,
2337 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002338 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002339 SSL_NOT_DEFAULT | SSL_HIGH,
2340 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2341 256,
2342 256,
2343 },
2344 {
2345 1,
2346 TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002347 TLS1_RFC_ADH_WITH_CAMELLIA_256_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04002348 TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA,
2349 SSL_kDHE,
2350 SSL_aNULL,
2351 SSL_CAMELLIA256,
2352 SSL_SHA1,
2353 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002354 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002355 SSL_NOT_DEFAULT | SSL_HIGH,
2356 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2357 256,
2358 256,
2359 },
2360 {
2361 1,
2362 TLS1_TXT_RSA_WITH_CAMELLIA_128_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002363 TLS1_RFC_RSA_WITH_CAMELLIA_128_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04002364 TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA,
2365 SSL_kRSA,
2366 SSL_aRSA,
2367 SSL_CAMELLIA128,
2368 SSL_SHA1,
2369 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002370 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002371 SSL_NOT_DEFAULT | SSL_HIGH,
2372 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2373 128,
2374 128,
2375 },
2376 {
2377 1,
2378 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002379 TLS1_RFC_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04002380 TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,
2381 SSL_kDHE,
2382 SSL_aDSS,
2383 SSL_CAMELLIA128,
2384 SSL_SHA1,
2385 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002386 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002387 SSL_NOT_DEFAULT | SSL_HIGH,
2388 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2389 128,
2390 128,
2391 },
2392 {
2393 1,
2394 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002395 TLS1_RFC_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04002396 TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,
2397 SSL_kDHE,
2398 SSL_aRSA,
2399 SSL_CAMELLIA128,
2400 SSL_SHA1,
2401 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002402 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002403 SSL_NOT_DEFAULT | SSL_HIGH,
2404 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2405 128,
2406 128,
2407 },
2408 {
2409 1,
2410 TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002411 TLS1_RFC_ADH_WITH_CAMELLIA_128_CBC_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04002412 TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA,
2413 SSL_kDHE,
2414 SSL_aNULL,
2415 SSL_CAMELLIA128,
2416 SSL_SHA1,
2417 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002418 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002419 SSL_NOT_DEFAULT | SSL_HIGH,
2420 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2421 128,
2422 128,
2423 },
2424
2425# ifndef OPENSSL_NO_EC
2426 {
2427 1,
2428 TLS1_TXT_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002429 TLS1_RFC_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04002430 TLS1_CK_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,
2431 SSL_kECDHE,
2432 SSL_aECDSA,
2433 SSL_CAMELLIA128,
2434 SSL_SHA256,
2435 TLS1_2_VERSION, TLS1_2_VERSION,
2436 DTLS1_2_VERSION, DTLS1_2_VERSION,
2437 SSL_NOT_DEFAULT | SSL_HIGH,
2438 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2439 128,
Emilia Kaspera230b262016-08-05 19:03:17 +02002440 128,
2441 },
Rich Salz748f2542016-03-16 12:33:00 -04002442 {
2443 1,
2444 TLS1_TXT_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002445 TLS1_RFC_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04002446 TLS1_CK_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,
2447 SSL_kECDHE,
2448 SSL_aECDSA,
2449 SSL_CAMELLIA256,
2450 SSL_SHA384,
2451 TLS1_2_VERSION, TLS1_2_VERSION,
2452 DTLS1_2_VERSION, DTLS1_2_VERSION,
2453 SSL_NOT_DEFAULT | SSL_HIGH,
2454 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2455 256,
Emilia Kaspera230b262016-08-05 19:03:17 +02002456 256,
2457 },
Rich Salz748f2542016-03-16 12:33:00 -04002458 {
2459 1,
2460 TLS1_TXT_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002461 TLS1_RFC_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04002462 TLS1_CK_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2463 SSL_kECDHE,
2464 SSL_aRSA,
2465 SSL_CAMELLIA128,
2466 SSL_SHA256,
2467 TLS1_2_VERSION, TLS1_2_VERSION,
2468 DTLS1_2_VERSION, DTLS1_2_VERSION,
2469 SSL_NOT_DEFAULT | SSL_HIGH,
2470 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2471 128,
Emilia Kaspera230b262016-08-05 19:03:17 +02002472 128,
2473 },
Rich Salz748f2542016-03-16 12:33:00 -04002474 {
2475 1,
2476 TLS1_TXT_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002477 TLS1_RFC_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04002478 TLS1_CK_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384,
2479 SSL_kECDHE,
2480 SSL_aRSA,
2481 SSL_CAMELLIA256,
2482 SSL_SHA384,
2483 TLS1_2_VERSION, TLS1_2_VERSION,
2484 DTLS1_2_VERSION, DTLS1_2_VERSION,
2485 SSL_NOT_DEFAULT | SSL_HIGH,
2486 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2487 256,
Emilia Kaspera230b262016-08-05 19:03:17 +02002488 256,
2489 },
2490# endif /* OPENSSL_NO_EC */
Rich Salz748f2542016-03-16 12:33:00 -04002491
2492# ifndef OPENSSL_NO_PSK
2493 {
2494 1,
2495 TLS1_TXT_PSK_WITH_CAMELLIA_128_CBC_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002496 TLS1_RFC_PSK_WITH_CAMELLIA_128_CBC_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04002497 TLS1_CK_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2498 SSL_kPSK,
2499 SSL_aPSK,
2500 SSL_CAMELLIA128,
2501 SSL_SHA256,
2502 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002503 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002504 SSL_NOT_DEFAULT | SSL_HIGH,
2505 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2506 128,
Emilia Kaspera230b262016-08-05 19:03:17 +02002507 128,
2508 },
Rich Salz748f2542016-03-16 12:33:00 -04002509 {
2510 1,
2511 TLS1_TXT_PSK_WITH_CAMELLIA_256_CBC_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002512 TLS1_RFC_PSK_WITH_CAMELLIA_256_CBC_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04002513 TLS1_CK_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2514 SSL_kPSK,
2515 SSL_aPSK,
2516 SSL_CAMELLIA256,
2517 SSL_SHA384,
2518 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002519 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002520 SSL_NOT_DEFAULT | SSL_HIGH,
2521 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2522 256,
Emilia Kaspera230b262016-08-05 19:03:17 +02002523 256,
2524 },
Rich Salz748f2542016-03-16 12:33:00 -04002525 {
2526 1,
2527 TLS1_TXT_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002528 TLS1_RFC_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04002529 TLS1_CK_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2530 SSL_kDHEPSK,
2531 SSL_aPSK,
2532 SSL_CAMELLIA128,
2533 SSL_SHA256,
2534 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002535 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002536 SSL_NOT_DEFAULT | SSL_HIGH,
2537 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2538 128,
Emilia Kaspera230b262016-08-05 19:03:17 +02002539 128,
2540 },
Rich Salz748f2542016-03-16 12:33:00 -04002541 {
2542 1,
2543 TLS1_TXT_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002544 TLS1_RFC_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04002545 TLS1_CK_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2546 SSL_kDHEPSK,
2547 SSL_aPSK,
2548 SSL_CAMELLIA256,
2549 SSL_SHA384,
2550 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002551 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002552 SSL_NOT_DEFAULT | SSL_HIGH,
2553 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2554 256,
Emilia Kaspera230b262016-08-05 19:03:17 +02002555 256,
2556 },
Rich Salz748f2542016-03-16 12:33:00 -04002557 {
2558 1,
2559 TLS1_TXT_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002560 TLS1_RFC_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04002561 TLS1_CK_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2562 SSL_kRSAPSK,
2563 SSL_aRSA,
2564 SSL_CAMELLIA128,
2565 SSL_SHA256,
2566 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002567 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002568 SSL_NOT_DEFAULT | SSL_HIGH,
2569 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2570 128,
Emilia Kaspera230b262016-08-05 19:03:17 +02002571 128,
2572 },
Rich Salz748f2542016-03-16 12:33:00 -04002573 {
2574 1,
2575 TLS1_TXT_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002576 TLS1_RFC_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04002577 TLS1_CK_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2578 SSL_kRSAPSK,
2579 SSL_aRSA,
2580 SSL_CAMELLIA256,
2581 SSL_SHA384,
2582 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002583 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002584 SSL_NOT_DEFAULT | SSL_HIGH,
2585 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2586 256,
Emilia Kaspera230b262016-08-05 19:03:17 +02002587 256,
2588 },
Rich Salz748f2542016-03-16 12:33:00 -04002589 {
2590 1,
2591 TLS1_TXT_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002592 TLS1_RFC_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
Rich Salz748f2542016-03-16 12:33:00 -04002593 TLS1_CK_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2594 SSL_kECDHEPSK,
2595 SSL_aPSK,
2596 SSL_CAMELLIA128,
2597 SSL_SHA256,
2598 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002599 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002600 SSL_NOT_DEFAULT | SSL_HIGH,
2601 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2602 128,
Emilia Kaspera230b262016-08-05 19:03:17 +02002603 128,
2604 },
Rich Salz748f2542016-03-16 12:33:00 -04002605 {
2606 1,
2607 TLS1_TXT_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002608 TLS1_RFC_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
Rich Salz748f2542016-03-16 12:33:00 -04002609 TLS1_CK_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2610 SSL_kECDHEPSK,
2611 SSL_aPSK,
2612 SSL_CAMELLIA256,
2613 SSL_SHA384,
2614 TLS1_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002615 DTLS1_BAD_VER, DTLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002616 SSL_NOT_DEFAULT | SSL_HIGH,
2617 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2618 256,
Emilia Kaspera230b262016-08-05 19:03:17 +02002619 256,
2620 },
2621# endif /* OPENSSL_NO_PSK */
Rich Salz748f2542016-03-16 12:33:00 -04002622
Emilia Kaspera230b262016-08-05 19:03:17 +02002623#endif /* OPENSSL_NO_CAMELLIA */
Rich Salz748f2542016-03-16 12:33:00 -04002624
Pauli580731a2016-03-22 09:16:36 +10002625#ifndef OPENSSL_NO_GOST
Matt Caswell0f113f32015-01-22 03:40:55 +00002626 {
2627 1,
Matt Caswell0f113f32015-01-22 03:40:55 +00002628 "GOST2001-GOST89-GOST89",
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002629 "TLS_GOSTR341001_WITH_28147_CNT_IMIT",
Matt Caswell0f113f32015-01-22 03:40:55 +00002630 0x3000081,
2631 SSL_kGOST,
2632 SSL_aGOST01,
2633 SSL_eGOST2814789CNT,
2634 SSL_GOST89MAC,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +01002635 TLS1_VERSION, TLS1_2_VERSION,
Dmitry Belyavsky48c16012016-05-11 21:00:12 +01002636 0, 0,
Kurt Roeckx361a1192015-12-05 02:04:41 +01002637 SSL_HIGH,
Matt Caswell0f113f32015-01-22 03:40:55 +00002638 SSL_HANDSHAKE_MAC_GOST94 | TLS1_PRF_GOST94 | TLS1_STREAM_MAC,
2639 256,
Emilia Kaspera230b262016-08-05 19:03:17 +02002640 256,
2641 },
Matt Caswell0f113f32015-01-22 03:40:55 +00002642 {
2643 1,
2644 "GOST2001-NULL-GOST94",
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002645 "TLS_GOSTR341001_WITH_NULL_GOSTR3411",
Matt Caswell0f113f32015-01-22 03:40:55 +00002646 0x3000083,
2647 SSL_kGOST,
2648 SSL_aGOST01,
2649 SSL_eNULL,
2650 SSL_GOST94,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +01002651 TLS1_VERSION, TLS1_2_VERSION,
Dmitry Belyavsky48c16012016-05-11 21:00:12 +01002652 0, 0,
Kurt Roeckx1510b5f2016-03-03 22:02:58 +01002653 SSL_STRONG_NONE,
Matt Caswell0f113f32015-01-22 03:40:55 +00002654 SSL_HANDSHAKE_MAC_GOST94 | TLS1_PRF_GOST94,
2655 0,
Emilia Kaspera230b262016-08-05 19:03:17 +02002656 0,
2657 },
Matt Caswell0f113f32015-01-22 03:40:55 +00002658 {
2659 1,
Rich Salz748f2542016-03-16 12:33:00 -04002660 "GOST2012-GOST8912-GOST8912",
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002661 NULL,
Rich Salz748f2542016-03-16 12:33:00 -04002662 0x0300ff85,
2663 SSL_kGOST,
2664 SSL_aGOST12 | SSL_aGOST01,
2665 SSL_eGOST2814789CNT12,
2666 SSL_GOST89MAC12,
2667 TLS1_VERSION, TLS1_2_VERSION,
Dmitry Belyavsky48c16012016-05-11 21:00:12 +01002668 0, 0,
Rich Salz748f2542016-03-16 12:33:00 -04002669 SSL_HIGH,
2670 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC,
2671 256,
Emilia Kaspera230b262016-08-05 19:03:17 +02002672 256,
2673 },
Rich Salz748f2542016-03-16 12:33:00 -04002674 {
2675 1,
2676 "GOST2012-NULL-GOST12",
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002677 NULL,
Rich Salz748f2542016-03-16 12:33:00 -04002678 0x0300ff87,
2679 SSL_kGOST,
2680 SSL_aGOST12 | SSL_aGOST01,
2681 SSL_eNULL,
2682 SSL_GOST12_256,
2683 TLS1_VERSION, TLS1_2_VERSION,
Dmitry Belyavsky48c16012016-05-11 21:00:12 +01002684 0, 0,
Rich Salz748f2542016-03-16 12:33:00 -04002685 SSL_STRONG_NONE,
2686 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC,
2687 0,
Emilia Kaspera230b262016-08-05 19:03:17 +02002688 0,
2689 },
2690#endif /* OPENSSL_NO_GOST */
Rich Salz748f2542016-03-16 12:33:00 -04002691
2692#ifndef OPENSSL_NO_IDEA
2693 {
2694 1,
2695 SSL3_TXT_RSA_IDEA_128_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002696 SSL3_RFC_RSA_IDEA_128_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04002697 SSL3_CK_RSA_IDEA_128_SHA,
Matt Caswell0f113f32015-01-22 03:40:55 +00002698 SSL_kRSA,
2699 SSL_aRSA,
Rich Salz748f2542016-03-16 12:33:00 -04002700 SSL_IDEA,
Matt Caswell0f113f32015-01-22 03:40:55 +00002701 SSL_SHA1,
Rich Salz748f2542016-03-16 12:33:00 -04002702 SSL3_VERSION, TLS1_1_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002703 DTLS1_BAD_VER, DTLS1_VERSION,
Kurt Roeckx361a1192015-12-05 02:04:41 +01002704 SSL_NOT_DEFAULT | SSL_MEDIUM,
Matt Caswell0f113f32015-01-22 03:40:55 +00002705 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2706 128,
2707 128,
2708 },
Matt Caswell8b1a5af2016-03-03 15:40:51 +00002709#endif
Nils Larschddac1972006-03-10 23:06:27 +00002710
Bodo Möller96afc1c2007-04-23 23:48:59 +00002711#ifndef OPENSSL_NO_SEED
Matt Caswell0f113f32015-01-22 03:40:55 +00002712 {
2713 1,
2714 TLS1_TXT_RSA_WITH_SEED_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002715 TLS1_RFC_RSA_WITH_SEED_SHA,
Matt Caswell0f113f32015-01-22 03:40:55 +00002716 TLS1_CK_RSA_WITH_SEED_SHA,
2717 SSL_kRSA,
2718 SSL_aRSA,
2719 SSL_SEED,
2720 SSL_SHA1,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +01002721 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002722 DTLS1_BAD_VER, DTLS1_2_VERSION,
Emilia Kaspera556f342016-03-03 19:50:03 +01002723 SSL_NOT_DEFAULT | SSL_MEDIUM,
Matt Caswell0f113f32015-01-22 03:40:55 +00002724 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2725 128,
2726 128,
2727 },
Matt Caswell0f113f32015-01-22 03:40:55 +00002728 {
2729 1,
2730 TLS1_TXT_DHE_DSS_WITH_SEED_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002731 TLS1_RFC_DHE_DSS_WITH_SEED_SHA,
Matt Caswell0f113f32015-01-22 03:40:55 +00002732 TLS1_CK_DHE_DSS_WITH_SEED_SHA,
2733 SSL_kDHE,
2734 SSL_aDSS,
2735 SSL_SEED,
2736 SSL_SHA1,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +01002737 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002738 DTLS1_BAD_VER, DTLS1_2_VERSION,
Emilia Kaspera556f342016-03-03 19:50:03 +01002739 SSL_NOT_DEFAULT | SSL_MEDIUM,
Matt Caswell0f113f32015-01-22 03:40:55 +00002740 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2741 128,
2742 128,
2743 },
Matt Caswell0f113f32015-01-22 03:40:55 +00002744 {
2745 1,
2746 TLS1_TXT_DHE_RSA_WITH_SEED_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002747 TLS1_RFC_DHE_RSA_WITH_SEED_SHA,
Matt Caswell0f113f32015-01-22 03:40:55 +00002748 TLS1_CK_DHE_RSA_WITH_SEED_SHA,
2749 SSL_kDHE,
2750 SSL_aRSA,
2751 SSL_SEED,
2752 SSL_SHA1,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +01002753 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002754 DTLS1_BAD_VER, DTLS1_2_VERSION,
Emilia Kaspera556f342016-03-03 19:50:03 +01002755 SSL_NOT_DEFAULT | SSL_MEDIUM,
Matt Caswell0f113f32015-01-22 03:40:55 +00002756 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2757 128,
2758 128,
2759 },
Matt Caswell0f113f32015-01-22 03:40:55 +00002760 {
2761 1,
2762 TLS1_TXT_ADH_WITH_SEED_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002763 TLS1_RFC_ADH_WITH_SEED_SHA,
Matt Caswell0f113f32015-01-22 03:40:55 +00002764 TLS1_CK_ADH_WITH_SEED_SHA,
2765 SSL_kDHE,
2766 SSL_aNULL,
2767 SSL_SEED,
2768 SSL_SHA1,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +01002769 SSL3_VERSION, TLS1_2_VERSION,
David Woodhouse387cf212016-07-08 20:59:50 +01002770 DTLS1_BAD_VER, DTLS1_2_VERSION,
Kurt Roeckx361a1192015-12-05 02:04:41 +01002771 SSL_NOT_DEFAULT | SSL_MEDIUM,
Matt Caswell0f113f32015-01-22 03:40:55 +00002772 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2773 128,
2774 128,
2775 },
Emilia Kaspera230b262016-08-05 19:03:17 +02002776#endif /* OPENSSL_NO_SEED */
Bodo Möller96afc1c2007-04-23 23:48:59 +00002777
Matt Caswell8b1a5af2016-03-03 15:40:51 +00002778#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
Matt Caswell0f113f32015-01-22 03:40:55 +00002779 {
2780 1,
Rich Salz748f2542016-03-16 12:33:00 -04002781 SSL3_TXT_RSA_RC4_128_MD5,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002782 SSL3_RFC_RSA_RC4_128_MD5,
Rich Salz748f2542016-03-16 12:33:00 -04002783 SSL3_CK_RSA_RC4_128_MD5,
2784 SSL_kRSA,
2785 SSL_aRSA,
Matt Caswell0f113f32015-01-22 03:40:55 +00002786 SSL_RC4,
Rich Salz748f2542016-03-16 12:33:00 -04002787 SSL_MD5,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +01002788 SSL3_VERSION, TLS1_2_VERSION,
Kurt Roeckxca3895f2016-03-08 20:26:38 +01002789 0, 0,
Kurt Roeckx361a1192015-12-05 02:04:41 +01002790 SSL_NOT_DEFAULT | SSL_MEDIUM,
Matt Caswell0f113f32015-01-22 03:40:55 +00002791 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2792 128,
2793 128,
2794 },
Matt Caswell0f113f32015-01-22 03:40:55 +00002795 {
2796 1,
Rich Salz748f2542016-03-16 12:33:00 -04002797 SSL3_TXT_RSA_RC4_128_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002798 SSL3_RFC_RSA_RC4_128_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04002799 SSL3_CK_RSA_RC4_128_SHA,
2800 SSL_kRSA,
Matt Caswell0f113f32015-01-22 03:40:55 +00002801 SSL_aRSA,
2802 SSL_RC4,
2803 SSL_SHA1,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +01002804 SSL3_VERSION, TLS1_2_VERSION,
Kurt Roeckxca3895f2016-03-08 20:26:38 +01002805 0, 0,
Kurt Roeckx361a1192015-12-05 02:04:41 +01002806 SSL_NOT_DEFAULT | SSL_MEDIUM,
Matt Caswell0f113f32015-01-22 03:40:55 +00002807 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2808 128,
2809 128,
2810 },
Matt Caswell0f113f32015-01-22 03:40:55 +00002811 {
2812 1,
Rich Salz748f2542016-03-16 12:33:00 -04002813 SSL3_TXT_ADH_RC4_128_MD5,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002814 SSL3_RFC_ADH_RC4_128_MD5,
Rich Salz748f2542016-03-16 12:33:00 -04002815 SSL3_CK_ADH_RC4_128_MD5,
2816 SSL_kDHE,
Matt Caswell0f113f32015-01-22 03:40:55 +00002817 SSL_aNULL,
2818 SSL_RC4,
Rich Salz748f2542016-03-16 12:33:00 -04002819 SSL_MD5,
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +01002820 SSL3_VERSION, TLS1_2_VERSION,
Kurt Roeckxca3895f2016-03-08 20:26:38 +01002821 0, 0,
Kurt Roeckx361a1192015-12-05 02:04:41 +01002822 SSL_NOT_DEFAULT | SSL_MEDIUM,
Matt Caswell0f113f32015-01-22 03:40:55 +00002823 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2824 128,
2825 128,
2826 },
Bodo Möllerea262262002-08-09 08:56:08 +00002827
Rich Salz748f2542016-03-16 12:33:00 -04002828# ifndef OPENSSL_NO_EC
Dr. Stephen Hensonea6114c2015-06-28 17:05:47 +01002829 {
2830 1,
2831 TLS1_TXT_ECDHE_PSK_WITH_RC4_128_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002832 TLS1_RFC_ECDHE_PSK_WITH_RC4_128_SHA,
Dr. Stephen Hensonea6114c2015-06-28 17:05:47 +01002833 TLS1_CK_ECDHE_PSK_WITH_RC4_128_SHA,
2834 SSL_kECDHEPSK,
2835 SSL_aPSK,
2836 SSL_RC4,
2837 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -04002838 TLS1_VERSION, TLS1_2_VERSION,
Kurt Roeckxca3895f2016-03-08 20:26:38 +01002839 0, 0,
Kurt Roeckx361a1192015-12-05 02:04:41 +01002840 SSL_NOT_DEFAULT | SSL_MEDIUM,
Dr. Stephen Hensonea6114c2015-06-28 17:05:47 +01002841 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2842 128,
2843 128,
2844 },
Dr. Stephen Hensonea6114c2015-06-28 17:05:47 +01002845 {
2846 1,
Rich Salz748f2542016-03-16 12:33:00 -04002847 TLS1_TXT_ECDH_anon_WITH_RC4_128_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002848 TLS1_RFC_ECDH_anon_WITH_RC4_128_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04002849 TLS1_CK_ECDH_anon_WITH_RC4_128_SHA,
2850 SSL_kECDHE,
2851 SSL_aNULL,
2852 SSL_RC4,
Dr. Stephen Hensonea6114c2015-06-28 17:05:47 +01002853 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -04002854 TLS1_VERSION, TLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002855 0, 0,
2856 SSL_NOT_DEFAULT | SSL_MEDIUM,
Dr. Stephen Hensonea6114c2015-06-28 17:05:47 +01002857 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
Rich Salz748f2542016-03-16 12:33:00 -04002858 128,
2859 128,
Dr. Stephen Hensonea6114c2015-06-28 17:05:47 +01002860 },
Dr. Stephen Hensonea6114c2015-06-28 17:05:47 +01002861 {
2862 1,
Rich Salz748f2542016-03-16 12:33:00 -04002863 TLS1_TXT_ECDHE_ECDSA_WITH_RC4_128_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002864 TLS1_RFC_ECDHE_ECDSA_WITH_RC4_128_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04002865 TLS1_CK_ECDHE_ECDSA_WITH_RC4_128_SHA,
2866 SSL_kECDHE,
2867 SSL_aECDSA,
2868 SSL_RC4,
Dr. Stephen Hensonea6114c2015-06-28 17:05:47 +01002869 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -04002870 TLS1_VERSION, TLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002871 0, 0,
2872 SSL_NOT_DEFAULT | SSL_MEDIUM,
Dr. Stephen Hensonea6114c2015-06-28 17:05:47 +01002873 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2874 128,
2875 128,
2876 },
Dr. Stephen Hensonea6114c2015-06-28 17:05:47 +01002877 {
2878 1,
Rich Salz748f2542016-03-16 12:33:00 -04002879 TLS1_TXT_ECDHE_RSA_WITH_RC4_128_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002880 TLS1_RFC_ECDHE_RSA_WITH_RC4_128_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04002881 TLS1_CK_ECDHE_RSA_WITH_RC4_128_SHA,
2882 SSL_kECDHE,
2883 SSL_aRSA,
2884 SSL_RC4,
Dr. Stephen Hensonea6114c2015-06-28 17:05:47 +01002885 SSL_SHA1,
Todd Shortfe55c4a2017-04-11 09:02:05 -04002886 TLS1_VERSION, TLS1_2_VERSION,
Rich Salz748f2542016-03-16 12:33:00 -04002887 0, 0,
2888 SSL_NOT_DEFAULT | SSL_MEDIUM,
Dr. Stephen Hensonea6114c2015-06-28 17:05:47 +01002889 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2890 128,
2891 128,
2892 },
Emilia Kaspera230b262016-08-05 19:03:17 +02002893# endif /* OPENSSL_NO_EC */
Dr. Stephen Hensonea6114c2015-06-28 17:05:47 +01002894
Andy Polyakova76ba822015-12-09 21:47:00 +01002895# ifndef OPENSSL_NO_PSK
Andy Polyakova76ba822015-12-09 21:47:00 +01002896 {
2897 1,
Rich Salz748f2542016-03-16 12:33:00 -04002898 TLS1_TXT_PSK_WITH_RC4_128_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002899 TLS1_RFC_PSK_WITH_RC4_128_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04002900 TLS1_CK_PSK_WITH_RC4_128_SHA,
Andy Polyakova76ba822015-12-09 21:47:00 +01002901 SSL_kPSK,
2902 SSL_aPSK,
Rich Salz748f2542016-03-16 12:33:00 -04002903 SSL_RC4,
2904 SSL_SHA1,
2905 SSL3_VERSION, TLS1_2_VERSION,
2906 0, 0,
2907 SSL_NOT_DEFAULT | SSL_MEDIUM,
2908 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2909 128,
2910 128,
Andy Polyakova76ba822015-12-09 21:47:00 +01002911 },
Andy Polyakova76ba822015-12-09 21:47:00 +01002912 {
2913 1,
Rich Salz748f2542016-03-16 12:33:00 -04002914 TLS1_TXT_RSA_PSK_WITH_RC4_128_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002915 TLS1_RFC_RSA_PSK_WITH_RC4_128_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04002916 TLS1_CK_RSA_PSK_WITH_RC4_128_SHA,
Andy Polyakova76ba822015-12-09 21:47:00 +01002917 SSL_kRSAPSK,
2918 SSL_aRSA,
Rich Salz748f2542016-03-16 12:33:00 -04002919 SSL_RC4,
2920 SSL_SHA1,
2921 SSL3_VERSION, TLS1_2_VERSION,
2922 0, 0,
2923 SSL_NOT_DEFAULT | SSL_MEDIUM,
2924 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2925 128,
2926 128,
Andy Polyakova76ba822015-12-09 21:47:00 +01002927 },
Dmitry Belyavskye44380a2015-11-17 15:32:30 +00002928 {
2929 1,
Rich Salz748f2542016-03-16 12:33:00 -04002930 TLS1_TXT_DHE_PSK_WITH_RC4_128_SHA,
Paul Yangbbb4ceb2017-06-30 03:06:19 +08002931 TLS1_RFC_DHE_PSK_WITH_RC4_128_SHA,
Rich Salz748f2542016-03-16 12:33:00 -04002932 TLS1_CK_DHE_PSK_WITH_RC4_128_SHA,
2933 SSL_kDHEPSK,
2934 SSL_aPSK,
2935 SSL_RC4,
2936 SSL_SHA1,
2937 SSL3_VERSION, TLS1_2_VERSION,
2938 0, 0,
2939 SSL_NOT_DEFAULT | SSL_MEDIUM,
2940 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2941 128,
2942 128,
2943 },
Emilia Kaspera230b262016-08-05 19:03:17 +02002944# endif /* OPENSSL_NO_PSK */
Dmitry Belyavskye44380a2015-11-17 15:32:30 +00002945
Emilia Kaspera230b262016-08-05 19:03:17 +02002946#endif /* OPENSSL_NO_WEAK_SSL_CIPHERS */
Rich Salz748f2542016-03-16 12:33:00 -04002947
Jon Spillettbc326732017-08-22 09:56:13 +10002948#ifndef OPENSSL_NO_ARIA
2949 {
2950 1,
2951 TLS1_TXT_RSA_WITH_ARIA_128_GCM_SHA256,
2952 TLS1_RFC_RSA_WITH_ARIA_128_GCM_SHA256,
2953 TLS1_CK_RSA_WITH_ARIA_128_GCM_SHA256,
2954 SSL_kRSA,
2955 SSL_aRSA,
2956 SSL_ARIA128GCM,
2957 SSL_AEAD,
2958 TLS1_2_VERSION, TLS1_2_VERSION,
2959 DTLS1_2_VERSION, DTLS1_2_VERSION,
2960 SSL_NOT_DEFAULT | SSL_HIGH,
2961 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2962 128,
2963 128,
2964 },
2965 {
2966 1,
2967 TLS1_TXT_RSA_WITH_ARIA_256_GCM_SHA384,
2968 TLS1_RFC_RSA_WITH_ARIA_256_GCM_SHA384,
2969 TLS1_CK_RSA_WITH_ARIA_256_GCM_SHA384,
2970 SSL_kRSA,
2971 SSL_aRSA,
2972 SSL_ARIA256GCM,
2973 SSL_AEAD,
2974 TLS1_2_VERSION, TLS1_2_VERSION,
2975 DTLS1_2_VERSION, DTLS1_2_VERSION,
2976 SSL_NOT_DEFAULT | SSL_HIGH,
2977 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2978 256,
2979 256,
2980 },
2981 {
2982 1,
2983 TLS1_TXT_DHE_RSA_WITH_ARIA_128_GCM_SHA256,
2984 TLS1_RFC_DHE_RSA_WITH_ARIA_128_GCM_SHA256,
2985 TLS1_CK_DHE_RSA_WITH_ARIA_128_GCM_SHA256,
2986 SSL_kDHE,
2987 SSL_aRSA,
2988 SSL_ARIA128GCM,
2989 SSL_AEAD,
2990 TLS1_2_VERSION, TLS1_2_VERSION,
2991 DTLS1_2_VERSION, DTLS1_2_VERSION,
2992 SSL_NOT_DEFAULT | SSL_HIGH,
2993 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2994 128,
2995 128,
2996 },
2997 {
2998 1,
2999 TLS1_TXT_DHE_RSA_WITH_ARIA_256_GCM_SHA384,
3000 TLS1_RFC_DHE_RSA_WITH_ARIA_256_GCM_SHA384,
3001 TLS1_CK_DHE_RSA_WITH_ARIA_256_GCM_SHA384,
3002 SSL_kDHE,
3003 SSL_aRSA,
3004 SSL_ARIA256GCM,
3005 SSL_AEAD,
3006 TLS1_2_VERSION, TLS1_2_VERSION,
3007 DTLS1_2_VERSION, DTLS1_2_VERSION,
3008 SSL_NOT_DEFAULT | SSL_HIGH,
3009 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3010 256,
3011 256,
3012 },
3013 {
3014 1,
3015 TLS1_TXT_DHE_DSS_WITH_ARIA_128_GCM_SHA256,
3016 TLS1_RFC_DHE_DSS_WITH_ARIA_128_GCM_SHA256,
3017 TLS1_CK_DHE_DSS_WITH_ARIA_128_GCM_SHA256,
3018 SSL_kDHE,
3019 SSL_aDSS,
3020 SSL_ARIA128GCM,
3021 SSL_AEAD,
3022 TLS1_2_VERSION, TLS1_2_VERSION,
3023 DTLS1_2_VERSION, DTLS1_2_VERSION,
3024 SSL_NOT_DEFAULT | SSL_HIGH,
3025 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3026 128,
3027 128,
3028 },
3029 {
3030 1,
3031 TLS1_TXT_DHE_DSS_WITH_ARIA_256_GCM_SHA384,
3032 TLS1_RFC_DHE_DSS_WITH_ARIA_256_GCM_SHA384,
3033 TLS1_CK_DHE_DSS_WITH_ARIA_256_GCM_SHA384,
3034 SSL_kDHE,
3035 SSL_aDSS,
3036 SSL_ARIA256GCM,
3037 SSL_AEAD,
3038 TLS1_2_VERSION, TLS1_2_VERSION,
3039 DTLS1_2_VERSION, DTLS1_2_VERSION,
3040 SSL_NOT_DEFAULT | SSL_HIGH,
3041 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3042 256,
3043 256,
3044 },
3045 {
3046 1,
3047 TLS1_TXT_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256,
3048 TLS1_RFC_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256,
3049 TLS1_CK_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256,
3050 SSL_kECDHE,
3051 SSL_aECDSA,
3052 SSL_ARIA128GCM,
3053 SSL_AEAD,
3054 TLS1_2_VERSION, TLS1_2_VERSION,
3055 DTLS1_2_VERSION, DTLS1_2_VERSION,
3056 SSL_NOT_DEFAULT | SSL_HIGH,
3057 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3058 128,
3059 128,
3060 },
3061 {
3062 1,
3063 TLS1_TXT_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384,
3064 TLS1_RFC_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384,
3065 TLS1_CK_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384,
3066 SSL_kECDHE,
3067 SSL_aECDSA,
3068 SSL_ARIA256GCM,
3069 SSL_AEAD,
3070 TLS1_2_VERSION, TLS1_2_VERSION,
3071 DTLS1_2_VERSION, DTLS1_2_VERSION,
3072 SSL_NOT_DEFAULT | SSL_HIGH,
3073 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3074 256,
3075 256,
3076 },
3077
3078 {
3079 1,
3080 TLS1_TXT_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256,
3081 TLS1_RFC_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256,
3082 TLS1_CK_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256,
3083 SSL_kECDHE,
3084 SSL_aRSA,
3085 SSL_ARIA128GCM,
3086 SSL_AEAD,
3087 TLS1_2_VERSION, TLS1_2_VERSION,
3088 DTLS1_2_VERSION, DTLS1_2_VERSION,
3089 SSL_NOT_DEFAULT | SSL_HIGH,
3090 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3091 128,
3092 128,
3093 },
3094 {
3095 1,
3096 TLS1_TXT_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384,
3097 TLS1_RFC_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384,
3098 TLS1_CK_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384,
3099 SSL_kECDHE,
3100 SSL_aRSA,
3101 SSL_ARIA256GCM,
3102 SSL_AEAD,
3103 TLS1_2_VERSION, TLS1_2_VERSION,
3104 DTLS1_2_VERSION, DTLS1_2_VERSION,
3105 SSL_NOT_DEFAULT | SSL_HIGH,
3106 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3107 256,
3108 256,
3109 },
3110 {
3111 1,
3112 TLS1_TXT_PSK_WITH_ARIA_128_GCM_SHA256,
3113 TLS1_RFC_PSK_WITH_ARIA_128_GCM_SHA256,
3114 TLS1_CK_PSK_WITH_ARIA_128_GCM_SHA256,
3115 SSL_kPSK,
3116 SSL_aPSK,
3117 SSL_ARIA128GCM,
3118 SSL_AEAD,
3119 TLS1_2_VERSION, TLS1_2_VERSION,
3120 DTLS1_2_VERSION, DTLS1_2_VERSION,
3121 SSL_NOT_DEFAULT | SSL_HIGH,
3122 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3123 128,
3124 128,
3125 },
3126 {
3127 1,
3128 TLS1_TXT_PSK_WITH_ARIA_256_GCM_SHA384,
3129 TLS1_RFC_PSK_WITH_ARIA_256_GCM_SHA384,
3130 TLS1_CK_PSK_WITH_ARIA_256_GCM_SHA384,
3131 SSL_kPSK,
3132 SSL_aPSK,
3133 SSL_ARIA256GCM,
3134 SSL_AEAD,
3135 TLS1_2_VERSION, TLS1_2_VERSION,
3136 DTLS1_2_VERSION, DTLS1_2_VERSION,
3137 SSL_NOT_DEFAULT | SSL_HIGH,
3138 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3139 256,
3140 256,
3141 },
3142 {
3143 1,
3144 TLS1_TXT_DHE_PSK_WITH_ARIA_128_GCM_SHA256,
3145 TLS1_RFC_DHE_PSK_WITH_ARIA_128_GCM_SHA256,
3146 TLS1_CK_DHE_PSK_WITH_ARIA_128_GCM_SHA256,
3147 SSL_kDHEPSK,
3148 SSL_aPSK,
3149 SSL_ARIA128GCM,
3150 SSL_AEAD,
3151 TLS1_2_VERSION, TLS1_2_VERSION,
3152 DTLS1_2_VERSION, DTLS1_2_VERSION,
3153 SSL_NOT_DEFAULT | SSL_HIGH,
3154 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3155 128,
3156 128,
3157 },
3158 {
3159 1,
3160 TLS1_TXT_DHE_PSK_WITH_ARIA_256_GCM_SHA384,
3161 TLS1_RFC_DHE_PSK_WITH_ARIA_256_GCM_SHA384,
3162 TLS1_CK_DHE_PSK_WITH_ARIA_256_GCM_SHA384,
3163 SSL_kDHEPSK,
3164 SSL_aPSK,
3165 SSL_ARIA256GCM,
3166 SSL_AEAD,
3167 TLS1_2_VERSION, TLS1_2_VERSION,
3168 DTLS1_2_VERSION, DTLS1_2_VERSION,
3169 SSL_NOT_DEFAULT | SSL_HIGH,
3170 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3171 256,
3172 256,
3173 },
3174
3175 {
3176 1,
3177 TLS1_TXT_RSA_PSK_WITH_ARIA_128_GCM_SHA256,
3178 TLS1_RFC_RSA_PSK_WITH_ARIA_128_GCM_SHA256,
3179 TLS1_CK_RSA_PSK_WITH_ARIA_128_GCM_SHA256,
3180 SSL_kRSAPSK,
3181 SSL_aRSA,
3182 SSL_ARIA128GCM,
3183 SSL_AEAD,
3184 TLS1_2_VERSION, TLS1_2_VERSION,
3185 DTLS1_2_VERSION, DTLS1_2_VERSION,
3186 SSL_NOT_DEFAULT | SSL_HIGH,
3187 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3188 128,
3189 128,
3190 },
3191 {
3192 1,
3193 TLS1_TXT_RSA_PSK_WITH_ARIA_256_GCM_SHA384,
3194 TLS1_RFC_RSA_PSK_WITH_ARIA_256_GCM_SHA384,
3195 TLS1_CK_RSA_PSK_WITH_ARIA_256_GCM_SHA384,
3196 SSL_kRSAPSK,
3197 SSL_aRSA,
3198 SSL_ARIA256GCM,
3199 SSL_AEAD,
3200 TLS1_2_VERSION, TLS1_2_VERSION,
3201 DTLS1_2_VERSION, DTLS1_2_VERSION,
3202 SSL_NOT_DEFAULT | SSL_HIGH,
3203 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3204 256,
3205 256,
3206 },
3207#endif /* OPENSSL_NO_ARIA */
Matt Caswell0f113f32015-01-22 03:40:55 +00003208};
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00003209
Benjamin Kaduk650c6e42017-02-03 17:17:21 -06003210/*
3211 * The list of known Signalling Cipher-Suite Value "ciphers", non-valid
3212 * values stuffed into the ciphers field of the wire protocol for signalling
3213 * purposes.
3214 */
3215static SSL_CIPHER ssl3_scsvs[] = {
3216 {
3217 0,
3218 "TLS_EMPTY_RENEGOTIATION_INFO_SCSV",
Paul Yangbbb4ceb2017-06-30 03:06:19 +08003219 "TLS_EMPTY_RENEGOTIATION_INFO_SCSV",
Benjamin Kaduk650c6e42017-02-03 17:17:21 -06003220 SSL3_CK_SCSV,
3221 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
3222 },
3223 {
3224 0,
3225 "TLS_FALLBACK_SCSV",
Paul Yangbbb4ceb2017-06-30 03:06:19 +08003226 "TLS_FALLBACK_SCSV",
Benjamin Kaduk650c6e42017-02-03 17:17:21 -06003227 SSL3_CK_FALLBACK_SCSV,
3228 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
3229 },
3230};
3231
Rich Salz748f2542016-03-16 12:33:00 -04003232static int cipher_compare(const void *a, const void *b)
3233{
3234 const SSL_CIPHER *ap = (const SSL_CIPHER *)a;
3235 const SSL_CIPHER *bp = (const SSL_CIPHER *)b;
3236
Richard Levittea7ff5792017-07-08 22:13:24 +02003237 if (ap->id == bp->id)
3238 return 0;
3239 return ap->id < bp->id ? -1 : 1;
Rich Salz748f2542016-03-16 12:33:00 -04003240}
3241
3242void ssl_sort_cipher_list(void)
3243{
Benjamin Kaduk650c6e42017-02-03 17:17:21 -06003244 qsort(ssl3_ciphers, SSL3_NUM_CIPHERS, sizeof ssl3_ciphers[0],
Rich Salz748f2542016-03-16 12:33:00 -04003245 cipher_compare);
Benjamin Kaduk650c6e42017-02-03 17:17:21 -06003246 qsort(ssl3_scsvs, SSL3_NUM_SCSVS, sizeof ssl3_scsvs[0], cipher_compare);
Rich Salz748f2542016-03-16 12:33:00 -04003247}
3248
Matt Caswell0f113f32015-01-22 03:40:55 +00003249const SSL3_ENC_METHOD SSLv3_enc_data = {
3250 ssl3_enc,
3251 n_ssl3_mac,
3252 ssl3_setup_key_block,
3253 ssl3_generate_master_secret,
3254 ssl3_change_cipher_state,
3255 ssl3_final_finish_mac,
Matt Caswell0f113f32015-01-22 03:40:55 +00003256 SSL3_MD_CLIENT_FINISHED_CONST, 4,
3257 SSL3_MD_SERVER_FINISHED_CONST, 4,
3258 ssl3_alert_code,
3259 (int (*)(SSL *, unsigned char *, size_t, const char *,
3260 size_t, const unsigned char *, size_t,
3261 int use_context))ssl_undefined_function,
3262 0,
Matt Caswella29fa982016-09-29 22:40:15 +01003263 ssl3_set_handshake_header,
Matt Caswell2c7b4db2016-08-03 20:57:52 +01003264 tls_close_construct_packet,
Matt Caswell0f113f32015-01-22 03:40:55 +00003265 ssl3_handshake_write
3266};
Ralf S. Engelschall58964a41998-12-21 10:56:39 +00003267
Dr. Stephen Hensonf3b656b2005-08-05 23:56:11 +00003268long ssl3_default_timeout(void)
Matt Caswell0f113f32015-01-22 03:40:55 +00003269{
3270 /*
3271 * 2 hours, the 24 hours mentioned in the SSLv3 spec is way too long for
3272 * http, the cache would over fill
3273 */
3274 return (60 * 60 * 2);
3275}
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00003276
Ulf Möller6b691a51999-04-19 21:31:43 +00003277int ssl3_num_ciphers(void)
Matt Caswell0f113f32015-01-22 03:40:55 +00003278{
KaoruToda26a7d932017-10-17 23:04:09 +09003279 return SSL3_NUM_CIPHERS;
Matt Caswell0f113f32015-01-22 03:40:55 +00003280}
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00003281
Ben Lauriebabb3792008-10-12 14:32:47 +00003282const SSL_CIPHER *ssl3_get_cipher(unsigned int u)
Matt Caswell0f113f32015-01-22 03:40:55 +00003283{
3284 if (u < SSL3_NUM_CIPHERS)
KaoruToda26a7d932017-10-17 23:04:09 +09003285 return &(ssl3_ciphers[SSL3_NUM_CIPHERS - 1 - u]);
Matt Caswell0f113f32015-01-22 03:40:55 +00003286 else
KaoruToda26a7d932017-10-17 23:04:09 +09003287 return NULL;
Matt Caswell0f113f32015-01-22 03:40:55 +00003288}
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00003289
Matt Caswella29fa982016-09-29 22:40:15 +01003290int ssl3_set_handshake_header(SSL *s, WPACKET *pkt, int htype)
Matt Caswell2c7b4db2016-08-03 20:57:52 +01003291{
Matt Caswell4a01c592016-09-30 10:38:32 +01003292 /* No header in the event of a CCS */
3293 if (htype == SSL3_MT_CHANGE_CIPHER_SPEC)
3294 return 1;
3295
Matt Caswell2c7b4db2016-08-03 20:57:52 +01003296 /* Set the content type and 3 bytes for the message len */
Matt Caswell08029df2016-09-20 14:47:44 +01003297 if (!WPACKET_put_bytes_u8(pkt, htype)
Matt Caswellde451852016-09-09 00:13:41 +01003298 || !WPACKET_start_sub_packet_u24(pkt))
Matt Caswell2c7b4db2016-08-03 20:57:52 +01003299 return 0;
3300
3301 return 1;
3302}
3303
Dr. Stephen Henson173e72e2013-03-11 15:34:28 +00003304int ssl3_handshake_write(SSL *s)
Matt Caswell0f113f32015-01-22 03:40:55 +00003305{
3306 return ssl3_do_write(s, SSL3_RT_HANDSHAKE);
3307}
Dr. Stephen Henson173e72e2013-03-11 15:34:28 +00003308
Ulf Möller6b691a51999-04-19 21:31:43 +00003309int ssl3_new(SSL *s)
Matt Caswell0f113f32015-01-22 03:40:55 +00003310{
3311 SSL3_STATE *s3;
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00003312
Rich Salzb51bce92015-08-25 13:25:58 -04003313 if ((s3 = OPENSSL_zalloc(sizeof(*s3))) == NULL)
Matt Caswell0f113f32015-01-22 03:40:55 +00003314 goto err;
Matt Caswell0f113f32015-01-22 03:40:55 +00003315 s->s3 = s3;
Ben Laurie1e0784f2016-01-01 15:39:31 +00003316
Ben Laurieedc032b2011-03-12 17:01:19 +00003317#ifndef OPENSSL_NO_SRP
Viktor Dukhovni61986d32015-04-16 01:50:03 -04003318 if (!SSL_SRP_CTX_init(s))
Emilia Kaspera230b262016-08-05 19:03:17 +02003319 goto err;
Ben Laurieedc032b2011-03-12 17:01:19 +00003320#endif
Matt Caswellb77f3ed2017-05-22 12:33:42 +01003321
3322 if (!s->method->ssl_clear(s))
3323 return 0;
3324
Matt Caswella89325e2017-05-22 12:33:29 +01003325 return 1;
Matt Caswell0f113f32015-01-22 03:40:55 +00003326 err:
Matt Caswella89325e2017-05-22 12:33:29 +01003327 return 0;
Matt Caswell0f113f32015-01-22 03:40:55 +00003328}
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00003329
Ulf Möller6b691a51999-04-19 21:31:43 +00003330void ssl3_free(SSL *s)
Matt Caswell0f113f32015-01-22 03:40:55 +00003331{
Pascal Cuoqa60c1512015-11-23 00:13:15 +01003332 if (s == NULL || s->s3 == NULL)
Matt Caswell0f113f32015-01-22 03:40:55 +00003333 return;
Ben Lauriee03ddfa1999-01-07 19:15:59 +00003334
Matt Caswell0f113f32015-01-22 03:40:55 +00003335 ssl3_cleanup_key_block(s);
Dr. Stephen Henson8d92c1f2015-06-21 16:26:08 +01003336
Dr. Stephen Hensonfb79abe2015-12-17 01:07:46 +00003337#if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH)
Dr. Stephen Henson61dd9f72015-12-14 00:33:33 +00003338 EVP_PKEY_free(s->s3->peer_tmp);
3339 s->s3->peer_tmp = NULL;
Dr. Stephen Hensonb22d7112015-12-24 00:23:29 +00003340 EVP_PKEY_free(s->s3->tmp.pkey);
3341 s->s3->tmp.pkey = NULL;
Bodo Möllerea262262002-08-09 08:56:08 +00003342#endif
3343
Dr. Stephen Henson75c13e72017-02-23 22:12:28 +00003344 OPENSSL_free(s->s3->tmp.ctype);
Dr. Stephen Hensonfa7c2632017-03-13 15:00:36 +00003345 sk_X509_NAME_pop_free(s->s3->tmp.peer_ca_names, X509_NAME_free);
Dr. Stephen Henson76106e62015-05-12 17:17:37 +01003346 OPENSSL_free(s->s3->tmp.ciphers_raw);
3347 OPENSSL_clear_free(s->s3->tmp.pms, s->s3->tmp.pmslen);
3348 OPENSSL_free(s->s3->tmp.peer_sigalgs);
Dr. Stephen Henson85fb6fd2015-06-20 15:37:22 +01003349 ssl3_free_digest_list(s);
Rich Salz25aaa982015-05-01 14:37:16 -04003350 OPENSSL_free(s->s3->alpn_selected);
Todd Short817cd0d2016-03-05 08:47:55 -05003351 OPENSSL_free(s->s3->alpn_proposed);
Adam Langley6f017a82013-04-15 18:07:47 -04003352
Ben Laurieedc032b2011-03-12 17:01:19 +00003353#ifndef OPENSSL_NO_SRP
Matt Caswell0f113f32015-01-22 03:40:55 +00003354 SSL_SRP_CTX_free(s);
Ben Laurieedc032b2011-03-12 17:01:19 +00003355#endif
Rich Salzb4faea52015-05-01 23:10:31 -04003356 OPENSSL_clear_free(s->s3, sizeof(*s->s3));
Matt Caswell0f113f32015-01-22 03:40:55 +00003357 s->s3 = NULL;
3358}
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00003359
Matt Caswellb77f3ed2017-05-22 12:33:42 +01003360int ssl3_clear(SSL *s)
Matt Caswell0f113f32015-01-22 03:40:55 +00003361{
Matt Caswell0f113f32015-01-22 03:40:55 +00003362 ssl3_cleanup_key_block(s);
Dr. Stephen Henson75c13e72017-02-23 22:12:28 +00003363 OPENSSL_free(s->s3->tmp.ctype);
Dr. Stephen Hensonfa7c2632017-03-13 15:00:36 +00003364 sk_X509_NAME_pop_free(s->s3->tmp.peer_ca_names, X509_NAME_free);
Dr. Stephen Henson76106e62015-05-12 17:17:37 +01003365 OPENSSL_free(s->s3->tmp.ciphers_raw);
Dr. Stephen Henson76106e62015-05-12 17:17:37 +01003366 OPENSSL_clear_free(s->s3->tmp.pms, s->s3->tmp.pmslen);
Dr. Stephen Henson76106e62015-05-12 17:17:37 +01003367 OPENSSL_free(s->s3->tmp.peer_sigalgs);
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00003368
Dr. Stephen Hensonfb79abe2015-12-17 01:07:46 +00003369#if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH)
Dr. Stephen Hensonb22d7112015-12-24 00:23:29 +00003370 EVP_PKEY_free(s->s3->tmp.pkey);
Dr. Stephen Henson61dd9f72015-12-14 00:33:33 +00003371 EVP_PKEY_free(s->s3->peer_tmp);
Emilia Kaspera230b262016-08-05 19:03:17 +02003372#endif /* !OPENSSL_NO_EC */
Mark J. Cox413c4f41999-02-16 09:22:21 +00003373
Dr. Stephen Henson85fb6fd2015-06-20 15:37:22 +01003374 ssl3_free_digest_list(s);
Matt Caswelle481f9b2015-05-15 10:49:56 +01003375
Todd Short817cd0d2016-03-05 08:47:55 -05003376 OPENSSL_free(s->s3->alpn_selected);
3377 OPENSSL_free(s->s3->alpn_proposed);
Matt Caswelle481f9b2015-05-15 10:49:56 +01003378
Todd Short817cd0d2016-03-05 08:47:55 -05003379 /* NULL/zero-out everything in the s3 struct */
Rich Salzb4faea52015-05-01 23:10:31 -04003380 memset(s->s3, 0, sizeof(*s->s3));
Ralf S. Engelschalldfeab061998-12-21 11:00:56 +00003381
Matt Caswellb77f3ed2017-05-22 12:33:42 +01003382 if (!ssl_free_wbio_buffer(s))
3383 return 0;
Ralf S. Engelschalldfeab061998-12-21 11:00:56 +00003384
Matt Caswell0f113f32015-01-22 03:40:55 +00003385 s->version = SSL3_VERSION;
Ben Laurieee2ffc22010-07-28 10:06:55 +00003386
Matt Caswelle481f9b2015-05-15 10:49:56 +01003387#if !defined(OPENSSL_NO_NEXTPROTONEG)
Rich Salzaff8c122016-12-08 14:18:40 -05003388 OPENSSL_free(s->ext.npn);
3389 s->ext.npn = NULL;
3390 s->ext.npn_len = 0;
Ben Laurieee2ffc22010-07-28 10:06:55 +00003391#endif
Matt Caswellb77f3ed2017-05-22 12:33:42 +01003392
3393 return 1;
Matt Caswell0f113f32015-01-22 03:40:55 +00003394}
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00003395
Ben Laurieedc032b2011-03-12 17:01:19 +00003396#ifndef OPENSSL_NO_SRP
Matt Caswell0f113f32015-01-22 03:40:55 +00003397static char *srp_password_from_info_cb(SSL *s, void *arg)
3398{
Rich Salz7644a9a2015-12-16 16:12:24 -05003399 return OPENSSL_strdup(s->srp_ctx.info);
Matt Caswell0f113f32015-01-22 03:40:55 +00003400}
Ben Laurieedc032b2011-03-12 17:01:19 +00003401#endif
3402
Emilia Kaspera230b262016-08-05 19:03:17 +02003403static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len);
Dr. Stephen Henson9f27b1e2012-07-08 14:22:45 +00003404
Bodo Möllera661b652001-10-20 17:56:36 +00003405long ssl3_ctrl(SSL *s, int cmd, long larg, void *parg)
Matt Caswell0f113f32015-01-22 03:40:55 +00003406{
3407 int ret = 0;
Ralf S. Engelschall58964a41998-12-21 10:56:39 +00003408
Matt Caswell0f113f32015-01-22 03:40:55 +00003409 switch (cmd) {
Matt Caswell0f113f32015-01-22 03:40:55 +00003410 case SSL_CTRL_GET_CLIENT_CERT_REQUEST:
3411 break;
3412 case SSL_CTRL_GET_NUM_RENEGOTIATIONS:
3413 ret = s->s3->num_renegotiations;
3414 break;
3415 case SSL_CTRL_CLEAR_NUM_RENEGOTIATIONS:
3416 ret = s->s3->num_renegotiations;
3417 s->s3->num_renegotiations = 0;
3418 break;
3419 case SSL_CTRL_GET_TOTAL_RENEGOTIATIONS:
3420 ret = s->s3->total_renegotiations;
3421 break;
3422 case SSL_CTRL_GET_FLAGS:
3423 ret = (int)(s->s3->flags);
3424 break;
Richard Levittebc36ee62001-02-20 08:13:47 +00003425#ifndef OPENSSL_NO_DH
Matt Caswell0f113f32015-01-22 03:40:55 +00003426 case SSL_CTRL_SET_TMP_DH:
3427 {
3428 DH *dh = (DH *)parg;
Dr. Stephen Hensone2b420f2015-12-17 00:05:26 +00003429 EVP_PKEY *pkdh = NULL;
Matt Caswell0f113f32015-01-22 03:40:55 +00003430 if (dh == NULL) {
3431 SSLerr(SSL_F_SSL3_CTRL, ERR_R_PASSED_NULL_PARAMETER);
KaoruToda26a7d932017-10-17 23:04:09 +09003432 return ret;
Matt Caswell0f113f32015-01-22 03:40:55 +00003433 }
Dr. Stephen Hensone2b420f2015-12-17 00:05:26 +00003434 pkdh = ssl_dh_to_pkey(dh);
3435 if (pkdh == NULL) {
3436 SSLerr(SSL_F_SSL3_CTRL, ERR_R_MALLOC_FAILURE);
3437 return 0;
3438 }
Matt Caswell0f113f32015-01-22 03:40:55 +00003439 if (!ssl_security(s, SSL_SECOP_TMP_DH,
Dr. Stephen Hensone2b420f2015-12-17 00:05:26 +00003440 EVP_PKEY_security_bits(pkdh), 0, pkdh)) {
Matt Caswell0f113f32015-01-22 03:40:55 +00003441 SSLerr(SSL_F_SSL3_CTRL, SSL_R_DH_KEY_TOO_SMALL);
Dr. Stephen Hensone2b420f2015-12-17 00:05:26 +00003442 EVP_PKEY_free(pkdh);
3443 return ret;
Matt Caswell0f113f32015-01-22 03:40:55 +00003444 }
Dr. Stephen Hensone2b420f2015-12-17 00:05:26 +00003445 EVP_PKEY_free(s->cert->dh_tmp);
3446 s->cert->dh_tmp = pkdh;
Matt Caswell0f113f32015-01-22 03:40:55 +00003447 ret = 1;
3448 }
3449 break;
3450 case SSL_CTRL_SET_TMP_DH_CB:
3451 {
3452 SSLerr(SSL_F_SSL3_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
KaoruToda26a7d932017-10-17 23:04:09 +09003453 return ret;
Matt Caswell0f113f32015-01-22 03:40:55 +00003454 }
Matt Caswell0f113f32015-01-22 03:40:55 +00003455 case SSL_CTRL_SET_DH_AUTO:
3456 s->cert->dh_tmp_auto = larg;
3457 return 1;
Richard Levitted3442bc2000-02-20 23:43:02 +00003458#endif
Rich Salz10bf4fc2015-03-10 19:09:27 -04003459#ifndef OPENSSL_NO_EC
Matt Caswell0f113f32015-01-22 03:40:55 +00003460 case SSL_CTRL_SET_TMP_ECDH:
3461 {
Kurt Roeckx6977e8e2015-12-04 22:25:11 +01003462 const EC_GROUP *group = NULL;
3463 int nid;
Matt Caswell0f113f32015-01-22 03:40:55 +00003464
3465 if (parg == NULL) {
3466 SSLerr(SSL_F_SSL3_CTRL, ERR_R_PASSED_NULL_PARAMETER);
Kurt Roeckx6977e8e2015-12-04 22:25:11 +01003467 return 0;
Matt Caswell0f113f32015-01-22 03:40:55 +00003468 }
Kurt Roeckx6977e8e2015-12-04 22:25:11 +01003469 group = EC_KEY_get0_group((const EC_KEY *)parg);
3470 if (group == NULL) {
3471 SSLerr(SSL_F_SSL3_CTRL, EC_R_MISSING_PARAMETERS);
3472 return 0;
Matt Caswell0f113f32015-01-22 03:40:55 +00003473 }
Kurt Roeckx6977e8e2015-12-04 22:25:11 +01003474 nid = EC_GROUP_get_curve_name(group);
3475 if (nid == NID_undef)
3476 return 0;
Rich Salzaff8c122016-12-08 14:18:40 -05003477 return tls1_set_groups(&s->ext.supportedgroups,
3478 &s->ext.supportedgroups_len,
Kurt Roeckx6977e8e2015-12-04 22:25:11 +01003479 &nid, 1);
Matt Caswell0f113f32015-01-22 03:40:55 +00003480 }
3481 break;
Rich Salz10bf4fc2015-03-10 19:09:27 -04003482#endif /* !OPENSSL_NO_EC */
Matt Caswell0f113f32015-01-22 03:40:55 +00003483 case SSL_CTRL_SET_TLSEXT_HOSTNAME:
3484 if (larg == TLSEXT_NAMETYPE_host_name) {
Viktor Dukhovni0982eca2016-01-16 12:57:24 -05003485 size_t len;
3486
Rich Salzaff8c122016-12-08 14:18:40 -05003487 OPENSSL_free(s->ext.hostname);
3488 s->ext.hostname = NULL;
Bodo Möllered3883d2006-01-02 23:14:37 +00003489
Matt Caswell0f113f32015-01-22 03:40:55 +00003490 ret = 1;
3491 if (parg == NULL)
3492 break;
Viktor Dukhovni0982eca2016-01-16 12:57:24 -05003493 len = strlen((char *)parg);
3494 if (len == 0 || len > TLSEXT_MAXLEN_host_name) {
Matt Caswell0f113f32015-01-22 03:40:55 +00003495 SSLerr(SSL_F_SSL3_CTRL, SSL_R_SSL3_EXT_INVALID_SERVERNAME);
3496 return 0;
3497 }
Rich Salzaff8c122016-12-08 14:18:40 -05003498 if ((s->ext.hostname = OPENSSL_strdup((char *)parg)) == NULL) {
Matt Caswell0f113f32015-01-22 03:40:55 +00003499 SSLerr(SSL_F_SSL3_CTRL, ERR_R_INTERNAL_ERROR);
3500 return 0;
3501 }
3502 } else {
3503 SSLerr(SSL_F_SSL3_CTRL, SSL_R_SSL3_EXT_INVALID_SERVERNAME_TYPE);
3504 return 0;
3505 }
3506 break;
3507 case SSL_CTRL_SET_TLSEXT_DEBUG_ARG:
Rich Salzaff8c122016-12-08 14:18:40 -05003508 s->ext.debug_arg = parg;
Matt Caswell0f113f32015-01-22 03:40:55 +00003509 ret = 1;
3510 break;
Bodo Möller761772d2007-09-21 06:54:24 +00003511
Alessandro Ghedini4300aaf2016-05-11 00:48:49 +01003512 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE:
Rich Salzaff8c122016-12-08 14:18:40 -05003513 ret = s->ext.status_type;
Alessandro Ghedini4300aaf2016-05-11 00:48:49 +01003514 break;
3515
Matt Caswell0f113f32015-01-22 03:40:55 +00003516 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE:
Rich Salzaff8c122016-12-08 14:18:40 -05003517 s->ext.status_type = larg;
Matt Caswell0f113f32015-01-22 03:40:55 +00003518 ret = 1;
3519 break;
Dr. Stephen Henson67c8e7f2007-09-26 21:56:59 +00003520
Matt Caswell0f113f32015-01-22 03:40:55 +00003521 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS:
Rich Salzaff8c122016-12-08 14:18:40 -05003522 *(STACK_OF(X509_EXTENSION) **)parg = s->ext.ocsp.exts;
Matt Caswell0f113f32015-01-22 03:40:55 +00003523 ret = 1;
3524 break;
Dr. Stephen Henson67c8e7f2007-09-26 21:56:59 +00003525
Matt Caswell0f113f32015-01-22 03:40:55 +00003526 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS:
Rich Salzaff8c122016-12-08 14:18:40 -05003527 s->ext.ocsp.exts = parg;
Matt Caswell0f113f32015-01-22 03:40:55 +00003528 ret = 1;
3529 break;
Dr. Stephen Henson67c8e7f2007-09-26 21:56:59 +00003530
Matt Caswell0f113f32015-01-22 03:40:55 +00003531 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_IDS:
Rich Salzaff8c122016-12-08 14:18:40 -05003532 *(STACK_OF(OCSP_RESPID) **)parg = s->ext.ocsp.ids;
Matt Caswell0f113f32015-01-22 03:40:55 +00003533 ret = 1;
3534 break;
Dr. Stephen Henson67c8e7f2007-09-26 21:56:59 +00003535
Matt Caswell0f113f32015-01-22 03:40:55 +00003536 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_IDS:
Rich Salzaff8c122016-12-08 14:18:40 -05003537 s->ext.ocsp.ids = parg;
Matt Caswell0f113f32015-01-22 03:40:55 +00003538 ret = 1;
3539 break;
Dr. Stephen Henson67c8e7f2007-09-26 21:56:59 +00003540
Matt Caswell0f113f32015-01-22 03:40:55 +00003541 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP:
Rich Salzaff8c122016-12-08 14:18:40 -05003542 *(unsigned char **)parg = s->ext.ocsp.resp;
3543 if (s->ext.ocsp.resp_len == 0
3544 || s->ext.ocsp.resp_len > LONG_MAX)
Matt Caswell8b0e9342016-10-06 19:17:54 +01003545 return -1;
Rich Salzaff8c122016-12-08 14:18:40 -05003546 return (long)s->ext.ocsp.resp_len;
Dr. Stephen Henson67c8e7f2007-09-26 21:56:59 +00003547
Matt Caswell0f113f32015-01-22 03:40:55 +00003548 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP:
Rich Salzaff8c122016-12-08 14:18:40 -05003549 OPENSSL_free(s->ext.ocsp.resp);
3550 s->ext.ocsp.resp = parg;
3551 s->ext.ocsp.resp_len = larg;
Matt Caswell0f113f32015-01-22 03:40:55 +00003552 ret = 1;
3553 break;
Dr. Stephen Henson48175042011-12-31 22:59:57 +00003554
Richard Levitteb6127992016-11-15 14:53:33 +01003555#ifndef OPENSSL_NO_HEARTBEATS
3556 case SSL_CTRL_DTLS_EXT_SEND_HEARTBEAT:
3557 case SSL_CTRL_GET_DTLS_EXT_HEARTBEAT_PENDING:
3558 case SSL_CTRL_SET_DTLS_EXT_HEARTBEAT_NO_REQUESTS:
3559 break;
3560#endif
3561
Matt Caswell0f113f32015-01-22 03:40:55 +00003562 case SSL_CTRL_CHAIN:
3563 if (larg)
3564 return ssl_cert_set1_chain(s, NULL, (STACK_OF(X509) *)parg);
3565 else
3566 return ssl_cert_set0_chain(s, NULL, (STACK_OF(X509) *)parg);
Dr. Stephen Hensonf71c6e52012-01-31 14:00:10 +00003567
Matt Caswell0f113f32015-01-22 03:40:55 +00003568 case SSL_CTRL_CHAIN_CERT:
3569 if (larg)
3570 return ssl_cert_add1_chain_cert(s, NULL, (X509 *)parg);
3571 else
3572 return ssl_cert_add0_chain_cert(s, NULL, (X509 *)parg);
Rob Stradling7b6b2462013-11-11 18:04:24 +01003573
Matt Caswell0f113f32015-01-22 03:40:55 +00003574 case SSL_CTRL_GET_CHAIN_CERTS:
3575 *(STACK_OF(X509) **)parg = s->cert->key->chain;
3576 break;
Rob Stradling7b6b2462013-11-11 18:04:24 +01003577
Matt Caswell0f113f32015-01-22 03:40:55 +00003578 case SSL_CTRL_SELECT_CURRENT_CERT:
3579 return ssl_cert_select_current(s->cert, (X509 *)parg);
3580
3581 case SSL_CTRL_SET_CURRENT_CERT:
3582 if (larg == SSL_CERT_SET_SERVER) {
Matt Caswell0f113f32015-01-22 03:40:55 +00003583 const SSL_CIPHER *cipher;
3584 if (!s->server)
3585 return 0;
3586 cipher = s->s3->tmp.new_cipher;
Dr. Stephen Hensonf365a3e2017-02-13 16:32:06 +00003587 if (cipher == NULL)
Matt Caswell0f113f32015-01-22 03:40:55 +00003588 return 0;
3589 /*
3590 * No certificate for unauthenticated ciphersuites or using SRP
3591 * authentication
3592 */
3593 if (cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP))
3594 return 2;
Dr. Stephen Hensona497cf22017-02-14 00:35:26 +00003595 if (s->s3->tmp.cert == NULL)
Matt Caswell0f113f32015-01-22 03:40:55 +00003596 return 0;
Dr. Stephen Hensona497cf22017-02-14 00:35:26 +00003597 s->cert->key = s->s3->tmp.cert;
Matt Caswell0f113f32015-01-22 03:40:55 +00003598 return 1;
3599 }
3600 return ssl_cert_set_current(s->cert, larg);
Dr. Stephen Henson0f788192014-02-02 02:51:30 +00003601
Dr. Stephen Henson14536c82013-08-17 17:40:08 +01003602#ifndef OPENSSL_NO_EC
Matt Caswellde4d7642016-11-09 14:51:06 +00003603 case SSL_CTRL_GET_GROUPS:
Matt Caswell0f113f32015-01-22 03:40:55 +00003604 {
Dr. Stephen Henson9e84a422017-09-22 16:06:52 +01003605 uint16_t *clist;
Matt Caswell0f113f32015-01-22 03:40:55 +00003606 size_t clistlen;
Rich Salzaff8c122016-12-08 14:18:40 -05003607
Matt Caswell0f113f32015-01-22 03:40:55 +00003608 if (!s->session)
3609 return 0;
Rich Salzaff8c122016-12-08 14:18:40 -05003610 clist = s->session->ext.supportedgroups;
Dr. Stephen Henson9e84a422017-09-22 16:06:52 +01003611 clistlen = s->session->ext.supportedgroups_len;
Matt Caswell0f113f32015-01-22 03:40:55 +00003612 if (parg) {
3613 size_t i;
3614 int *cptr = parg;
Dr. Stephen Henson43b95d72017-09-23 00:15:34 +01003615
Matt Caswell0f113f32015-01-22 03:40:55 +00003616 for (i = 0; i < clistlen; i++) {
Dr. Stephen Henson43b95d72017-09-23 00:15:34 +01003617 const TLS_GROUP_INFO *cinf = tls1_group_id_lookup(clist[i]);
3618
3619 if (cinf != NULL)
3620 cptr[i] = cinf->nid;
Matt Caswell0f113f32015-01-22 03:40:55 +00003621 else
Dr. Stephen Henson9e84a422017-09-22 16:06:52 +01003622 cptr[i] = TLSEXT_nid_unknown | clist[i];
Matt Caswell0f113f32015-01-22 03:40:55 +00003623 }
3624 }
3625 return (int)clistlen;
3626 }
Dr. Stephen Hensone7f8ff42012-03-06 14:28:21 +00003627
Matt Caswellde4d7642016-11-09 14:51:06 +00003628 case SSL_CTRL_SET_GROUPS:
Rich Salzaff8c122016-12-08 14:18:40 -05003629 return tls1_set_groups(&s->ext.supportedgroups,
3630 &s->ext.supportedgroups_len, parg, larg);
Dr. Stephen Hensond0595f12012-03-28 15:05:04 +00003631
Matt Caswellde4d7642016-11-09 14:51:06 +00003632 case SSL_CTRL_SET_GROUPS_LIST:
Rich Salzaff8c122016-12-08 14:18:40 -05003633 return tls1_set_groups_list(&s->ext.supportedgroups,
3634 &s->ext.supportedgroups_len, parg);
Dr. Stephen Hensond0595f12012-03-28 15:05:04 +00003635
Matt Caswellde4d7642016-11-09 14:51:06 +00003636 case SSL_CTRL_GET_SHARED_GROUP:
Dr. Stephen Henson43b95d72017-09-23 00:15:34 +01003637 {
3638 uint16_t id = tls1_shared_group(s, larg);
Dr. Stephen Hensona4352632012-04-05 13:38:27 +00003639
Dr. Stephen Henson43b95d72017-09-23 00:15:34 +01003640 if (larg != -1) {
3641 const TLS_GROUP_INFO *ginf = tls1_group_id_lookup(id);
3642
3643 return ginf == NULL ? 0 : ginf->nid;
3644 }
3645 return id;
3646 }
Dr. Stephen Henson14536c82013-08-17 17:40:08 +01003647#endif
Matt Caswell0f113f32015-01-22 03:40:55 +00003648 case SSL_CTRL_SET_SIGALGS:
3649 return tls1_set_sigalgs(s->cert, parg, larg, 0);
Dr. Stephen Henson0f229cc2012-06-22 14:03:31 +00003650
Matt Caswell0f113f32015-01-22 03:40:55 +00003651 case SSL_CTRL_SET_SIGALGS_LIST:
3652 return tls1_set_sigalgs_list(s->cert, parg, 0);
Dr. Stephen Henson3dbc46d2012-07-03 12:51:14 +00003653
Matt Caswell0f113f32015-01-22 03:40:55 +00003654 case SSL_CTRL_SET_CLIENT_SIGALGS:
3655 return tls1_set_sigalgs(s->cert, parg, larg, 1);
Dr. Stephen Henson3dbc46d2012-07-03 12:51:14 +00003656
Matt Caswell0f113f32015-01-22 03:40:55 +00003657 case SSL_CTRL_SET_CLIENT_SIGALGS_LIST:
3658 return tls1_set_sigalgs_list(s->cert, parg, 1);
Dr. Stephen Henson0f229cc2012-06-22 14:03:31 +00003659
Matt Caswell0f113f32015-01-22 03:40:55 +00003660 case SSL_CTRL_GET_CLIENT_CERT_TYPES:
3661 {
3662 const unsigned char **pctype = parg;
3663 if (s->server || !s->s3->tmp.cert_req)
3664 return 0;
Matt Caswell0f113f32015-01-22 03:40:55 +00003665 if (pctype)
Dr. Stephen Henson75c13e72017-02-23 22:12:28 +00003666 *pctype = s->s3->tmp.ctype;
3667 return s->s3->tmp.ctype_len;
Matt Caswell0f113f32015-01-22 03:40:55 +00003668 }
Dr. Stephen Henson9f27b1e2012-07-08 14:22:45 +00003669
Matt Caswell0f113f32015-01-22 03:40:55 +00003670 case SSL_CTRL_SET_CLIENT_CERT_TYPES:
3671 if (!s->server)
3672 return 0;
3673 return ssl3_set_req_cert_type(s->cert, parg, larg);
Dr. Stephen Henson9f27b1e2012-07-08 14:22:45 +00003674
Matt Caswell0f113f32015-01-22 03:40:55 +00003675 case SSL_CTRL_BUILD_CERT_CHAIN:
3676 return ssl_build_cert_chain(s, NULL, larg);
Dr. Stephen Henson74ecfab2012-07-23 23:34:28 +00003677
Matt Caswell0f113f32015-01-22 03:40:55 +00003678 case SSL_CTRL_SET_VERIFY_CERT_STORE:
3679 return ssl_cert_set_cert_store(s->cert, parg, 0, larg);
Dr. Stephen Henson74ecfab2012-07-23 23:34:28 +00003680
Matt Caswell0f113f32015-01-22 03:40:55 +00003681 case SSL_CTRL_SET_CHAIN_CERT_STORE:
3682 return ssl_cert_set_cert_store(s->cert, parg, 1, larg);
Dr. Stephen Henson74ecfab2012-07-23 23:34:28 +00003683
Matt Caswell0f113f32015-01-22 03:40:55 +00003684 case SSL_CTRL_GET_PEER_SIGNATURE_NID:
Dr. Stephen Hensonf742cda2017-01-30 13:48:39 +00003685 if (s->s3->tmp.peer_sigalg == NULL)
Matt Caswell0f113f32015-01-22 03:40:55 +00003686 return 0;
Dr. Stephen Hensonf742cda2017-01-30 13:48:39 +00003687 *(int *)parg = s->s3->tmp.peer_sigalg->hash;
3688 return 1;
Dr. Stephen Henson319354e2012-09-07 12:53:42 +00003689
Matt Caswell0f113f32015-01-22 03:40:55 +00003690 case SSL_CTRL_GET_SERVER_TMP_KEY:
Dr. Stephen Hensonfb79abe2015-12-17 01:07:46 +00003691#if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_EC)
3692 if (s->server || s->session == NULL || s->s3->peer_tmp == NULL) {
Matt Caswell0f113f32015-01-22 03:40:55 +00003693 return 0;
Dr. Stephen Hensonfb79abe2015-12-17 01:07:46 +00003694 } else {
3695 EVP_PKEY_up_ref(s->s3->peer_tmp);
3696 *(EVP_PKEY **)parg = s->s3->peer_tmp;
3697 return 1;
Matt Caswell0f113f32015-01-22 03:40:55 +00003698 }
Dr. Stephen Hensonfb79abe2015-12-17 01:07:46 +00003699#else
3700 return 0;
3701#endif
Dr. Stephen Henson14536c82013-08-17 17:40:08 +01003702#ifndef OPENSSL_NO_EC
Matt Caswell0f113f32015-01-22 03:40:55 +00003703 case SSL_CTRL_GET_EC_POINT_FORMATS:
3704 {
3705 SSL_SESSION *sess = s->session;
3706 const unsigned char **pformat = parg;
Rich Salzaff8c122016-12-08 14:18:40 -05003707
3708 if (sess == NULL || sess->ext.ecpointformats == NULL)
Matt Caswell0f113f32015-01-22 03:40:55 +00003709 return 0;
Rich Salzaff8c122016-12-08 14:18:40 -05003710 *pformat = sess->ext.ecpointformats;
3711 return (int)sess->ext.ecpointformats_len;
Matt Caswell0f113f32015-01-22 03:40:55 +00003712 }
Dr. Stephen Henson14536c82013-08-17 17:40:08 +01003713#endif
Bodo Moellercf6da052014-10-15 04:03:28 +02003714
Matt Caswell0f113f32015-01-22 03:40:55 +00003715 default:
3716 break;
3717 }
KaoruToda26a7d932017-10-17 23:04:09 +09003718 return ret;
Matt Caswell0f113f32015-01-22 03:40:55 +00003719}
Richard Levittea9188d42000-01-18 09:30:51 +00003720
Matt Caswell0f113f32015-01-22 03:40:55 +00003721long ssl3_callback_ctrl(SSL *s, int cmd, void (*fp) (void))
3722{
3723 int ret = 0;
Richard Levitted3442bc2000-02-20 23:43:02 +00003724
Matt Caswell0f113f32015-01-22 03:40:55 +00003725 switch (cmd) {
Richard Levittebc36ee62001-02-20 08:13:47 +00003726#ifndef OPENSSL_NO_DH
Matt Caswell0f113f32015-01-22 03:40:55 +00003727 case SSL_CTRL_SET_TMP_DH_CB:
3728 {
3729 s->cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))fp;
3730 }
3731 break;
Ralf S. Engelschall15d21c21999-02-25 14:40:29 +00003732#endif
Matt Caswell0f113f32015-01-22 03:40:55 +00003733 case SSL_CTRL_SET_TLSEXT_DEBUG_CB:
Rich Salzaff8c122016-12-08 14:18:40 -05003734 s->ext.debug_cb = (void (*)(SSL *, int, int,
Rich Salz1ed327f2017-01-09 12:42:15 -05003735 const unsigned char *, int, void *))fp;
Matt Caswell0f113f32015-01-22 03:40:55 +00003736 break;
Matt Caswelle481f9b2015-05-15 10:49:56 +01003737
Matt Caswell0f113f32015-01-22 03:40:55 +00003738 case SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB:
3739 {
3740 s->not_resumable_session_cb = (int (*)(SSL *, int))fp;
3741 }
3742 break;
3743 default:
3744 break;
3745 }
KaoruToda26a7d932017-10-17 23:04:09 +09003746 return ret;
Matt Caswell0f113f32015-01-22 03:40:55 +00003747}
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00003748
Bodo Möllera661b652001-10-20 17:56:36 +00003749long ssl3_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg)
Matt Caswell0f113f32015-01-22 03:40:55 +00003750{
Matt Caswell0f113f32015-01-22 03:40:55 +00003751 switch (cmd) {
Richard Levittebc36ee62001-02-20 08:13:47 +00003752#ifndef OPENSSL_NO_DH
Matt Caswell0f113f32015-01-22 03:40:55 +00003753 case SSL_CTRL_SET_TMP_DH:
3754 {
Dr. Stephen Hensone2b420f2015-12-17 00:05:26 +00003755 DH *dh = (DH *)parg;
3756 EVP_PKEY *pkdh = NULL;
3757 if (dh == NULL) {
3758 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_PASSED_NULL_PARAMETER);
3759 return 0;
3760 }
3761 pkdh = ssl_dh_to_pkey(dh);
3762 if (pkdh == NULL) {
3763 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_MALLOC_FAILURE);
3764 return 0;
3765 }
Matt Caswell0f113f32015-01-22 03:40:55 +00003766 if (!ssl_ctx_security(ctx, SSL_SECOP_TMP_DH,
Dr. Stephen Hensone2b420f2015-12-17 00:05:26 +00003767 EVP_PKEY_security_bits(pkdh), 0, pkdh)) {
Matt Caswell0f113f32015-01-22 03:40:55 +00003768 SSLerr(SSL_F_SSL3_CTX_CTRL, SSL_R_DH_KEY_TOO_SMALL);
Dr. Stephen Hensone2b420f2015-12-17 00:05:26 +00003769 EVP_PKEY_free(pkdh);
3770 return 1;
Matt Caswell0f113f32015-01-22 03:40:55 +00003771 }
Dr. Stephen Hensone2b420f2015-12-17 00:05:26 +00003772 EVP_PKEY_free(ctx->cert->dh_tmp);
3773 ctx->cert->dh_tmp = pkdh;
Matt Caswell0f113f32015-01-22 03:40:55 +00003774 return 1;
3775 }
Matt Caswell0f113f32015-01-22 03:40:55 +00003776 case SSL_CTRL_SET_TMP_DH_CB:
3777 {
3778 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
KaoruToda26a7d932017-10-17 23:04:09 +09003779 return 0;
Matt Caswell0f113f32015-01-22 03:40:55 +00003780 }
Matt Caswell0f113f32015-01-22 03:40:55 +00003781 case SSL_CTRL_SET_DH_AUTO:
3782 ctx->cert->dh_tmp_auto = larg;
3783 return 1;
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00003784#endif
Rich Salz10bf4fc2015-03-10 19:09:27 -04003785#ifndef OPENSSL_NO_EC
Matt Caswell0f113f32015-01-22 03:40:55 +00003786 case SSL_CTRL_SET_TMP_ECDH:
3787 {
Kurt Roeckx6977e8e2015-12-04 22:25:11 +01003788 const EC_GROUP *group = NULL;
3789 int nid;
Bodo Möllerea262262002-08-09 08:56:08 +00003790
Matt Caswell0f113f32015-01-22 03:40:55 +00003791 if (parg == NULL) {
Kurt Roeckx6977e8e2015-12-04 22:25:11 +01003792 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_PASSED_NULL_PARAMETER);
Matt Caswell0f113f32015-01-22 03:40:55 +00003793 return 0;
3794 }
Kurt Roeckx6977e8e2015-12-04 22:25:11 +01003795 group = EC_KEY_get0_group((const EC_KEY *)parg);
3796 if (group == NULL) {
3797 SSLerr(SSL_F_SSL3_CTX_CTRL, EC_R_MISSING_PARAMETERS);
Matt Caswell0f113f32015-01-22 03:40:55 +00003798 return 0;
3799 }
Kurt Roeckx6977e8e2015-12-04 22:25:11 +01003800 nid = EC_GROUP_get_curve_name(group);
3801 if (nid == NID_undef)
3802 return 0;
Rich Salzaff8c122016-12-08 14:18:40 -05003803 return tls1_set_groups(&ctx->ext.supportedgroups,
3804 &ctx->ext.supportedgroups_len,
Kurt Roeckx6977e8e2015-12-04 22:25:11 +01003805 &nid, 1);
Matt Caswell0f113f32015-01-22 03:40:55 +00003806 }
Rich Salz10bf4fc2015-03-10 19:09:27 -04003807#endif /* !OPENSSL_NO_EC */
Matt Caswell0f113f32015-01-22 03:40:55 +00003808 case SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG:
Rich Salzaff8c122016-12-08 14:18:40 -05003809 ctx->ext.servername_arg = parg;
Matt Caswell0f113f32015-01-22 03:40:55 +00003810 break;
3811 case SSL_CTRL_SET_TLSEXT_TICKET_KEYS:
3812 case SSL_CTRL_GET_TLSEXT_TICKET_KEYS:
3813 {
3814 unsigned char *keys = parg;
Rich Salzaff8c122016-12-08 14:18:40 -05003815 long tick_keylen = (sizeof(ctx->ext.tick_key_name) +
3816 sizeof(ctx->ext.tick_hmac_key) +
3817 sizeof(ctx->ext.tick_aes_key));
Kurt Roeckxd1397232016-03-02 14:39:14 +01003818 if (keys == NULL)
Rich Salzaff8c122016-12-08 14:18:40 -05003819 return tick_keylen;
3820 if (larg != tick_keylen) {
Matt Caswell0f113f32015-01-22 03:40:55 +00003821 SSLerr(SSL_F_SSL3_CTX_CTRL, SSL_R_INVALID_TICKET_KEYS_LENGTH);
3822 return 0;
3823 }
3824 if (cmd == SSL_CTRL_SET_TLSEXT_TICKET_KEYS) {
Rich Salzaff8c122016-12-08 14:18:40 -05003825 memcpy(ctx->ext.tick_key_name, keys,
3826 sizeof(ctx->ext.tick_key_name));
3827 memcpy(ctx->ext.tick_hmac_key,
3828 keys + sizeof(ctx->ext.tick_key_name),
3829 sizeof(ctx->ext.tick_hmac_key));
3830 memcpy(ctx->ext.tick_aes_key,
3831 keys + sizeof(ctx->ext.tick_key_name) +
3832 sizeof(ctx->ext.tick_hmac_key),
3833 sizeof(ctx->ext.tick_aes_key));
Matt Caswell0f113f32015-01-22 03:40:55 +00003834 } else {
Rich Salzaff8c122016-12-08 14:18:40 -05003835 memcpy(keys, ctx->ext.tick_key_name,
3836 sizeof(ctx->ext.tick_key_name));
3837 memcpy(keys + sizeof(ctx->ext.tick_key_name),
3838 ctx->ext.tick_hmac_key,
3839 sizeof(ctx->ext.tick_hmac_key));
3840 memcpy(keys + sizeof(ctx->ext.tick_key_name) +
3841 sizeof(ctx->ext.tick_hmac_key),
3842 ctx->ext.tick_aes_key,
3843 sizeof(ctx->ext.tick_aes_key));
Matt Caswell0f113f32015-01-22 03:40:55 +00003844 }
3845 return 1;
3846 }
Bodo Möller761772d2007-09-21 06:54:24 +00003847
Matt Caswell30b96762016-06-07 15:14:14 +01003848 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE:
Rich Salzaff8c122016-12-08 14:18:40 -05003849 return ctx->ext.status_type;
Matt Caswell30b96762016-06-07 15:14:14 +01003850
jfigusba261f72014-12-02 15:44:49 -05003851 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE:
Rich Salzaff8c122016-12-08 14:18:40 -05003852 ctx->ext.status_type = larg;
jfigusba261f72014-12-02 15:44:49 -05003853 break;
3854
Matt Caswell0f113f32015-01-22 03:40:55 +00003855 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB_ARG:
Rich Salzaff8c122016-12-08 14:18:40 -05003856 ctx->ext.status_arg = parg;
Matt Caswell0f113f32015-01-22 03:40:55 +00003857 return 1;
Dr. Stephen Henson67c8e7f2007-09-26 21:56:59 +00003858
Remi Gacognefddfc0a2016-08-06 12:54:29 +02003859 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_CB_ARG:
Rich Salzaff8c122016-12-08 14:18:40 -05003860 *(void**)parg = ctx->ext.status_arg;
Remi Gacognefddfc0a2016-08-06 12:54:29 +02003861 break;
3862
3863 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_CB:
Rich Salzaff8c122016-12-08 14:18:40 -05003864 *(int (**)(SSL*, void*))parg = ctx->ext.status_cb;
Remi Gacognefddfc0a2016-08-06 12:54:29 +02003865 break;
3866
Matt Caswelle481f9b2015-05-15 10:49:56 +01003867#ifndef OPENSSL_NO_SRP
Matt Caswell0f113f32015-01-22 03:40:55 +00003868 case SSL_CTRL_SET_TLS_EXT_SRP_USERNAME:
3869 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
Rich Salzb548a1f2015-05-01 10:02:07 -04003870 OPENSSL_free(ctx->srp_ctx.login);
Matt Caswell0f113f32015-01-22 03:40:55 +00003871 ctx->srp_ctx.login = NULL;
3872 if (parg == NULL)
3873 break;
Emilia Kaspera230b262016-08-05 19:03:17 +02003874 if (strlen((const char *)parg) > 255 || strlen((const char *)parg) < 1) {
Matt Caswell0f113f32015-01-22 03:40:55 +00003875 SSLerr(SSL_F_SSL3_CTX_CTRL, SSL_R_INVALID_SRP_USERNAME);
3876 return 0;
3877 }
Rich Salz7644a9a2015-12-16 16:12:24 -05003878 if ((ctx->srp_ctx.login = OPENSSL_strdup((char *)parg)) == NULL) {
Matt Caswell0f113f32015-01-22 03:40:55 +00003879 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_INTERNAL_ERROR);
3880 return 0;
3881 }
3882 break;
3883 case SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD:
3884 ctx->srp_ctx.SRP_give_srp_client_pwd_callback =
3885 srp_password_from_info_cb;
Diego Santa Cruze655f542017-05-15 10:35:45 +02003886 if (ctx->srp_ctx.info != NULL)
3887 OPENSSL_free(ctx->srp_ctx.info);
3888 if ((ctx->srp_ctx.info = BUF_strdup((char *)parg)) == NULL) {
3889 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_INTERNAL_ERROR);
3890 return 0;
3891 }
Matt Caswell0f113f32015-01-22 03:40:55 +00003892 break;
3893 case SSL_CTRL_SET_SRP_ARG:
3894 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
3895 ctx->srp_ctx.SRP_cb_arg = parg;
3896 break;
Ben Laurieedc032b2011-03-12 17:01:19 +00003897
Matt Caswell0f113f32015-01-22 03:40:55 +00003898 case SSL_CTRL_SET_TLS_EXT_SRP_STRENGTH:
3899 ctx->srp_ctx.strength = larg;
3900 break;
Matt Caswelle481f9b2015-05-15 10:49:56 +01003901#endif
Dr. Stephen Hensond0595f12012-03-28 15:05:04 +00003902
Matt Caswelle481f9b2015-05-15 10:49:56 +01003903#ifndef OPENSSL_NO_EC
Matt Caswellde4d7642016-11-09 14:51:06 +00003904 case SSL_CTRL_SET_GROUPS:
Rich Salzaff8c122016-12-08 14:18:40 -05003905 return tls1_set_groups(&ctx->ext.supportedgroups,
3906 &ctx->ext.supportedgroups_len,
Matt Caswell0f113f32015-01-22 03:40:55 +00003907 parg, larg);
Dr. Stephen Hensond0595f12012-03-28 15:05:04 +00003908
Matt Caswellde4d7642016-11-09 14:51:06 +00003909 case SSL_CTRL_SET_GROUPS_LIST:
Rich Salzaff8c122016-12-08 14:18:40 -05003910 return tls1_set_groups_list(&ctx->ext.supportedgroups,
3911 &ctx->ext.supportedgroups_len,
Matt Caswell0f113f32015-01-22 03:40:55 +00003912 parg);
Matt Caswelle481f9b2015-05-15 10:49:56 +01003913#endif
Matt Caswell0f113f32015-01-22 03:40:55 +00003914 case SSL_CTRL_SET_SIGALGS:
3915 return tls1_set_sigalgs(ctx->cert, parg, larg, 0);
Dr. Stephen Henson0f229cc2012-06-22 14:03:31 +00003916
Matt Caswell0f113f32015-01-22 03:40:55 +00003917 case SSL_CTRL_SET_SIGALGS_LIST:
3918 return tls1_set_sigalgs_list(ctx->cert, parg, 0);
Dr. Stephen Henson3dbc46d2012-07-03 12:51:14 +00003919
Matt Caswell0f113f32015-01-22 03:40:55 +00003920 case SSL_CTRL_SET_CLIENT_SIGALGS:
3921 return tls1_set_sigalgs(ctx->cert, parg, larg, 1);
Dr. Stephen Henson3dbc46d2012-07-03 12:51:14 +00003922
Matt Caswell0f113f32015-01-22 03:40:55 +00003923 case SSL_CTRL_SET_CLIENT_SIGALGS_LIST:
3924 return tls1_set_sigalgs_list(ctx->cert, parg, 1);
Dr. Stephen Henson0f229cc2012-06-22 14:03:31 +00003925
Matt Caswell0f113f32015-01-22 03:40:55 +00003926 case SSL_CTRL_SET_CLIENT_CERT_TYPES:
3927 return ssl3_set_req_cert_type(ctx->cert, parg, larg);
Dr. Stephen Henson9f27b1e2012-07-08 14:22:45 +00003928
Matt Caswell0f113f32015-01-22 03:40:55 +00003929 case SSL_CTRL_BUILD_CERT_CHAIN:
3930 return ssl_build_cert_chain(NULL, ctx, larg);
Dr. Stephen Henson74ecfab2012-07-23 23:34:28 +00003931
Matt Caswell0f113f32015-01-22 03:40:55 +00003932 case SSL_CTRL_SET_VERIFY_CERT_STORE:
3933 return ssl_cert_set_cert_store(ctx->cert, parg, 0, larg);
Dr. Stephen Henson74ecfab2012-07-23 23:34:28 +00003934
Matt Caswell0f113f32015-01-22 03:40:55 +00003935 case SSL_CTRL_SET_CHAIN_CERT_STORE:
3936 return ssl_cert_set_cert_store(ctx->cert, parg, 1, larg);
Dr. Stephen Henson74ecfab2012-07-23 23:34:28 +00003937
Matt Caswell0f113f32015-01-22 03:40:55 +00003938 /* A Thawte special :-) */
3939 case SSL_CTRL_EXTRA_CHAIN_CERT:
3940 if (ctx->extra_certs == NULL) {
FdaSilvaYY3c82e432016-06-04 00:15:19 +02003941 if ((ctx->extra_certs = sk_X509_new_null()) == NULL) {
3942 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_MALLOC_FAILURE);
3943 return 0;
3944 }
Matt Caswell0f113f32015-01-22 03:40:55 +00003945 }
FdaSilvaYY3c82e432016-06-04 00:15:19 +02003946 if (!sk_X509_push(ctx->extra_certs, (X509 *)parg)) {
3947 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_MALLOC_FAILURE);
3948 return 0;
3949 }
Matt Caswell0f113f32015-01-22 03:40:55 +00003950 break;
Ralf S. Engelschalldfeab061998-12-21 11:00:56 +00003951
Matt Caswell0f113f32015-01-22 03:40:55 +00003952 case SSL_CTRL_GET_EXTRA_CHAIN_CERTS:
3953 if (ctx->extra_certs == NULL && larg == 0)
3954 *(STACK_OF(X509) **)parg = ctx->cert->key->chain;
3955 else
3956 *(STACK_OF(X509) **)parg = ctx->extra_certs;
3957 break;
Dr. Stephen Hensonf9b0b452011-12-22 15:14:32 +00003958
Matt Caswell0f113f32015-01-22 03:40:55 +00003959 case SSL_CTRL_CLEAR_EXTRA_CHAIN_CERTS:
Rich Salz222561f2015-04-30 17:33:59 -04003960 sk_X509_pop_free(ctx->extra_certs, X509_free);
3961 ctx->extra_certs = NULL;
Matt Caswell0f113f32015-01-22 03:40:55 +00003962 break;
Dr. Stephen Hensonf9b0b452011-12-22 15:14:32 +00003963
Matt Caswell0f113f32015-01-22 03:40:55 +00003964 case SSL_CTRL_CHAIN:
3965 if (larg)
3966 return ssl_cert_set1_chain(NULL, ctx, (STACK_OF(X509) *)parg);
3967 else
3968 return ssl_cert_set0_chain(NULL, ctx, (STACK_OF(X509) *)parg);
Dr. Stephen Hensonf71c6e52012-01-31 14:00:10 +00003969
Matt Caswell0f113f32015-01-22 03:40:55 +00003970 case SSL_CTRL_CHAIN_CERT:
3971 if (larg)
3972 return ssl_cert_add1_chain_cert(NULL, ctx, (X509 *)parg);
3973 else
3974 return ssl_cert_add0_chain_cert(NULL, ctx, (X509 *)parg);
Dr. Stephen Hensonf71c6e52012-01-31 14:00:10 +00003975
Matt Caswell0f113f32015-01-22 03:40:55 +00003976 case SSL_CTRL_GET_CHAIN_CERTS:
3977 *(STACK_OF(X509) **)parg = ctx->cert->key->chain;
3978 break;
Rob Stradling7b6b2462013-11-11 18:04:24 +01003979
Matt Caswell0f113f32015-01-22 03:40:55 +00003980 case SSL_CTRL_SELECT_CURRENT_CERT:
3981 return ssl_cert_select_current(ctx->cert, (X509 *)parg);
Rob Stradling7b6b2462013-11-11 18:04:24 +01003982
Matt Caswell0f113f32015-01-22 03:40:55 +00003983 case SSL_CTRL_SET_CURRENT_CERT:
3984 return ssl_cert_set_current(ctx->cert, larg);
Dr. Stephen Henson0f788192014-02-02 02:51:30 +00003985
Matt Caswell0f113f32015-01-22 03:40:55 +00003986 default:
KaoruToda26a7d932017-10-17 23:04:09 +09003987 return 0;
Matt Caswell0f113f32015-01-22 03:40:55 +00003988 }
KaoruToda208fb892017-10-09 20:05:58 +09003989 return 1;
Matt Caswell0f113f32015-01-22 03:40:55 +00003990}
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00003991
Matt Caswell0f113f32015-01-22 03:40:55 +00003992long ssl3_ctx_callback_ctrl(SSL_CTX *ctx, int cmd, void (*fp) (void))
3993{
Matt Caswell0f113f32015-01-22 03:40:55 +00003994 switch (cmd) {
Richard Levittebc36ee62001-02-20 08:13:47 +00003995#ifndef OPENSSL_NO_DH
Matt Caswell0f113f32015-01-22 03:40:55 +00003996 case SSL_CTRL_SET_TMP_DH_CB:
3997 {
Matt Caswell8ca8fc42015-12-11 22:18:00 +00003998 ctx->cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))fp;
Matt Caswell0f113f32015-01-22 03:40:55 +00003999 }
4000 break;
Richard Levitted3442bc2000-02-20 23:43:02 +00004001#endif
Matt Caswell0f113f32015-01-22 03:40:55 +00004002 case SSL_CTRL_SET_TLSEXT_SERVERNAME_CB:
Rich Salzaff8c122016-12-08 14:18:40 -05004003 ctx->ext.servername_cb = (int (*)(SSL *, int *, void *))fp;
Matt Caswell0f113f32015-01-22 03:40:55 +00004004 break;
Bodo Möller761772d2007-09-21 06:54:24 +00004005
Matt Caswell0f113f32015-01-22 03:40:55 +00004006 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB:
Rich Salzaff8c122016-12-08 14:18:40 -05004007 ctx->ext.status_cb = (int (*)(SSL *, void *))fp;
Matt Caswell0f113f32015-01-22 03:40:55 +00004008 break;
4009
4010 case SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB:
Rich Salzaff8c122016-12-08 14:18:40 -05004011 ctx->ext.ticket_key_cb = (int (*)(SSL *, unsigned char *,
Matt Caswell0f113f32015-01-22 03:40:55 +00004012 unsigned char *,
4013 EVP_CIPHER_CTX *,
4014 HMAC_CTX *, int))fp;
4015 break;
4016
Matt Caswelle481f9b2015-05-15 10:49:56 +01004017#ifndef OPENSSL_NO_SRP
Matt Caswell0f113f32015-01-22 03:40:55 +00004018 case SSL_CTRL_SET_SRP_VERIFY_PARAM_CB:
4019 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
4020 ctx->srp_ctx.SRP_verify_param_callback = (int (*)(SSL *, void *))fp;
4021 break;
4022 case SSL_CTRL_SET_TLS_EXT_SRP_USERNAME_CB:
4023 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
4024 ctx->srp_ctx.TLS_ext_srp_username_callback =
4025 (int (*)(SSL *, int *, void *))fp;
4026 break;
4027 case SSL_CTRL_SET_SRP_GIVE_CLIENT_PWD_CB:
4028 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
4029 ctx->srp_ctx.SRP_give_srp_client_pwd_callback =
4030 (char *(*)(SSL *, void *))fp;
4031 break;
Bodo Möller761772d2007-09-21 06:54:24 +00004032#endif
Matt Caswell0f113f32015-01-22 03:40:55 +00004033 case SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB:
4034 {
4035 ctx->not_resumable_session_cb = (int (*)(SSL *, int))fp;
4036 }
4037 break;
4038 default:
KaoruToda26a7d932017-10-17 23:04:09 +09004039 return 0;
Matt Caswell0f113f32015-01-22 03:40:55 +00004040 }
KaoruToda208fb892017-10-09 20:05:58 +09004041 return 1;
Matt Caswell0f113f32015-01-22 03:40:55 +00004042}
Bodo Möller761772d2007-09-21 06:54:24 +00004043
Matt Caswellec15acb2017-01-13 17:00:49 +00004044const SSL_CIPHER *ssl3_get_cipher_by_id(uint32_t id)
4045{
4046 SSL_CIPHER c;
Benjamin Kaduk650c6e42017-02-03 17:17:21 -06004047 const SSL_CIPHER *cp;
Matt Caswellec15acb2017-01-13 17:00:49 +00004048
4049 c.id = id;
Benjamin Kaduk650c6e42017-02-03 17:17:21 -06004050 cp = OBJ_bsearch_ssl_cipher_id(&c, ssl3_ciphers, SSL3_NUM_CIPHERS);
4051 if (cp != NULL)
4052 return cp;
4053 return OBJ_bsearch_ssl_cipher_id(&c, ssl3_scsvs, SSL3_NUM_SCSVS);
Matt Caswellec15acb2017-01-13 17:00:49 +00004054}
4055
Paul Yangbbb4ceb2017-06-30 03:06:19 +08004056const SSL_CIPHER *ssl3_get_cipher_by_std_name(const char *stdname)
4057{
4058 SSL_CIPHER *c = NULL;
4059 SSL_CIPHER *tbl = ssl3_ciphers;
4060 size_t i;
4061
Xiaoyin Liu3519bae2017-07-30 18:43:19 -04004062 /* this is not efficient, necessary to optimize this? */
Paul Yangbbb4ceb2017-06-30 03:06:19 +08004063 for (i = 0; i < SSL3_NUM_CIPHERS; i++, tbl++) {
4064 if (tbl->stdname == NULL)
4065 continue;
4066 if (strcmp(stdname, tbl->stdname) == 0) {
4067 c = tbl;
4068 break;
4069 }
4070 }
4071 if (c == NULL) {
4072 tbl = ssl3_scsvs;
4073 for (i = 0; i < SSL3_NUM_SCSVS; i++, tbl++) {
4074 if (strcmp(stdname, tbl->stdname) == 0) {
4075 c = tbl;
4076 break;
4077 }
4078 }
4079 }
4080 return c;
4081}
4082
Matt Caswell0f113f32015-01-22 03:40:55 +00004083/*
4084 * This function needs to check if the ciphers required are actually
4085 * available
4086 */
Ben Lauriebabb3792008-10-12 14:32:47 +00004087const SSL_CIPHER *ssl3_get_cipher_by_char(const unsigned char *p)
Matt Caswell0f113f32015-01-22 03:40:55 +00004088{
Matt Caswell1f5b44e2017-01-20 16:02:07 +00004089 return ssl3_get_cipher_by_id(SSL3_CK_CIPHERSUITE_FLAG
Matt Caswellec15acb2017-01-13 17:00:49 +00004090 | ((uint32_t)p[0] << 8L)
4091 | (uint32_t)p[1]);
Matt Caswell0f113f32015-01-22 03:40:55 +00004092}
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004093
Matt Caswellae2f7b32016-09-05 17:34:04 +01004094int ssl3_put_cipher_by_char(const SSL_CIPHER *c, WPACKET *pkt, size_t *len)
Matt Caswell2c7b4db2016-08-03 20:57:52 +01004095{
Matt Caswell34f72452017-01-27 11:58:04 +00004096 if ((c->id & 0xff000000) != SSL3_CK_CIPHERSUITE_FLAG) {
Matt Caswell2c7b4db2016-08-03 20:57:52 +01004097 *len = 0;
4098 return 1;
4099 }
4100
Matt Caswell08029df2016-09-20 14:47:44 +01004101 if (!WPACKET_put_bytes_u16(pkt, c->id & 0xffff))
Matt Caswell2c7b4db2016-08-03 20:57:52 +01004102 return 0;
4103
4104 *len = 2;
4105 return 1;
4106}
4107
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +01004108/*
4109 * ssl3_choose_cipher - choose a cipher from those offered by the client
4110 * @s: SSL connection
4111 * @clnt: ciphers offered by the client
4112 * @srvr: ciphers enabled on the server?
4113 *
4114 * Returns the selected cipher or NULL when no common ciphers.
4115 */
Dr. Stephen Henson4a640fb2015-12-23 00:47:28 +00004116const SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt,
Emilia Kaspera230b262016-08-05 19:03:17 +02004117 STACK_OF(SSL_CIPHER) *srvr)
Matt Caswell0f113f32015-01-22 03:40:55 +00004118{
Dr. Stephen Henson4a640fb2015-12-23 00:47:28 +00004119 const SSL_CIPHER *c, *ret = NULL;
Matt Caswell0f113f32015-01-22 03:40:55 +00004120 STACK_OF(SSL_CIPHER) *prio, *allow;
4121 int i, ii, ok;
Matt Caswell0de6d662017-06-06 17:19:32 +01004122 unsigned long alg_k = 0, alg_a = 0, mask_k = 0, mask_a = 0;
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004123
Matt Caswell0f113f32015-01-22 03:40:55 +00004124 /* Let's see which ciphers we can support */
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004125
Matt Caswell0f113f32015-01-22 03:40:55 +00004126 /*
4127 * Do not set the compare functions, because this may lead to a
4128 * reordering by "id". We want to keep the original ordering. We may pay
4129 * a price in performance during sk_SSL_CIPHER_find(), but would have to
4130 * pay with the price of sk_SSL_CIPHER_dup().
4131 */
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004132
Ben Laurief415fa31999-03-06 14:09:36 +00004133#ifdef CIPHER_DEBUG
Matt Caswell0f113f32015-01-22 03:40:55 +00004134 fprintf(stderr, "Server has %d from %p:\n", sk_SSL_CIPHER_num(srvr),
4135 (void *)srvr);
4136 for (i = 0; i < sk_SSL_CIPHER_num(srvr); ++i) {
4137 c = sk_SSL_CIPHER_value(srvr, i);
4138 fprintf(stderr, "%p:%s\n", (void *)c, c->name);
4139 }
4140 fprintf(stderr, "Client sent %d from %p:\n", sk_SSL_CIPHER_num(clnt),
4141 (void *)clnt);
4142 for (i = 0; i < sk_SSL_CIPHER_num(clnt); ++i) {
4143 c = sk_SSL_CIPHER_value(clnt, i);
4144 fprintf(stderr, "%p:%s\n", (void *)c, c->name);
4145 }
Ben Laurief415fa31999-03-06 14:09:36 +00004146#endif
4147
Matt Caswell0f113f32015-01-22 03:40:55 +00004148 if (s->options & SSL_OP_CIPHER_SERVER_PREFERENCE || tls1_suiteb(s)) {
4149 prio = srvr;
4150 allow = clnt;
4151 } else {
4152 prio = clnt;
4153 allow = srvr;
4154 }
Lutz Jänicke836f9962001-02-09 19:56:31 +00004155
Matt Caswell0de6d662017-06-06 17:19:32 +01004156 if (!SSL_IS_TLS13(s)) {
4157 tls1_set_cert_validity(s);
4158 ssl_set_masks(s);
4159 }
Dr. Stephen Hensond61ff832012-06-28 12:45:49 +00004160
Matt Caswell0f113f32015-01-22 03:40:55 +00004161 for (i = 0; i < sk_SSL_CIPHER_num(prio); i++) {
4162 c = sk_SSL_CIPHER_value(prio, i);
Ben Laurie60e31c31999-02-21 21:58:59 +00004163
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +01004164 /* Skip ciphers not supported by the protocol version */
4165 if (!SSL_IS_DTLS(s) &&
Emilia Kaspera230b262016-08-05 19:03:17 +02004166 ((s->version < c->min_tls) || (s->version > c->max_tls)))
Matt Caswell0f113f32015-01-22 03:40:55 +00004167 continue;
Kurt Roeckx3eb2aff2016-02-07 20:17:07 +01004168 if (SSL_IS_DTLS(s) &&
Emilia Kaspera230b262016-08-05 19:03:17 +02004169 (DTLS_VERSION_LT(s->version, c->min_dtls) ||
4170 DTLS_VERSION_GT(s->version, c->max_dtls)))
Dr. Stephen Henson2b573382015-11-13 14:37:24 +00004171 continue;
Matt Caswella055a882017-05-26 17:59:34 +01004172
Matt Caswell0de6d662017-06-06 17:19:32 +01004173 /*
4174 * Since TLS 1.3 ciphersuites can be used with any auth or
4175 * key exchange scheme skip tests.
4176 */
4177 if (!SSL_IS_TLS13(s)) {
Dr. Stephen Henson612ca802017-01-31 18:59:31 +00004178 mask_k = s->s3->tmp.mask_k;
4179 mask_a = s->s3->tmp.mask_a;
Ben Laurieedc032b2011-03-12 17:01:19 +00004180#ifndef OPENSSL_NO_SRP
Dr. Stephen Henson612ca802017-01-31 18:59:31 +00004181 if (s->srp_ctx.srp_Mask & SSL_kSRP) {
4182 mask_k |= SSL_kSRP;
4183 mask_a |= SSL_aSRP;
4184 }
Ben Laurieedc032b2011-03-12 17:01:19 +00004185#endif
Richard Levittef9b3bff2000-11-30 22:53:34 +00004186
Dr. Stephen Henson612ca802017-01-31 18:59:31 +00004187 alg_k = c->algorithm_mkey;
4188 alg_a = c->algorithm_auth;
Bodo Möller52b8dad2007-02-17 06:45:38 +00004189
Nils Larschddac1972006-03-10 23:06:27 +00004190#ifndef OPENSSL_NO_PSK
Dr. Stephen Henson612ca802017-01-31 18:59:31 +00004191 /* with PSK there must be server callback set */
4192 if ((alg_k & SSL_PSK) && s->psk_server_callback == NULL)
4193 continue;
Matt Caswell0f113f32015-01-22 03:40:55 +00004194#endif /* OPENSSL_NO_PSK */
Nils Larschddac1972006-03-10 23:06:27 +00004195
Dr. Stephen Henson612ca802017-01-31 18:59:31 +00004196 ok = (alg_k & mask_k) && (alg_a & mask_a);
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004197#ifdef CIPHER_DEBUG
Dr. Stephen Henson612ca802017-01-31 18:59:31 +00004198 fprintf(stderr, "%d:[%08lX:%08lX:%08lX:%08lX]%p:%s\n", ok, alg_k,
4199 alg_a, mask_k, mask_a, (void *)c, c->name);
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004200#endif
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004201
Emilia Kaspera230b262016-08-05 19:03:17 +02004202#ifndef OPENSSL_NO_EC
Dr. Stephen Henson612ca802017-01-31 18:59:31 +00004203 /*
4204 * if we are considering an ECC cipher suite that uses an ephemeral
4205 * EC key check it
4206 */
4207 if (alg_k & SSL_kECDHE)
4208 ok = ok && tls1_check_ec_tmp_key(s, c->id);
Emilia Kaspera230b262016-08-05 19:03:17 +02004209#endif /* OPENSSL_NO_EC */
Bodo Möllerf393b742006-03-30 02:35:09 +00004210
Dr. Stephen Henson612ca802017-01-31 18:59:31 +00004211 if (!ok)
4212 continue;
4213 }
Matt Caswell0f113f32015-01-22 03:40:55 +00004214 ii = sk_SSL_CIPHER_find(allow, c);
4215 if (ii >= 0) {
4216 /* Check security callback permits this cipher */
4217 if (!ssl_security(s, SSL_SECOP_CIPHER_SHARED,
Dr. Stephen Henson4a640fb2015-12-23 00:47:28 +00004218 c->strength_bits, 0, (void *)c))
Matt Caswell0f113f32015-01-22 03:40:55 +00004219 continue;
Matt Caswelle481f9b2015-05-15 10:49:56 +01004220#if !defined(OPENSSL_NO_EC)
Matt Caswell0f113f32015-01-22 03:40:55 +00004221 if ((alg_k & SSL_kECDHE) && (alg_a & SSL_aECDSA)
4222 && s->s3->is_probably_safari) {
4223 if (!ret)
4224 ret = sk_SSL_CIPHER_value(allow, ii);
4225 continue;
4226 }
Rob Stradlingd89cd382013-09-10 12:20:29 +01004227#endif
Matt Caswell0f113f32015-01-22 03:40:55 +00004228 ret = sk_SSL_CIPHER_value(allow, ii);
4229 break;
4230 }
4231 }
KaoruToda26a7d932017-10-17 23:04:09 +09004232 return ret;
Matt Caswell0f113f32015-01-22 03:40:55 +00004233}
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004234
Matt Caswell28ff8ef2016-09-29 14:25:52 +01004235int ssl3_get_req_cert_type(SSL *s, WPACKET *pkt)
Matt Caswell0f113f32015-01-22 03:40:55 +00004236{
Dr. Stephen Henson90d9e492015-11-05 16:14:17 +00004237 uint32_t alg_k, alg_a = 0;
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004238
Matt Caswell0f113f32015-01-22 03:40:55 +00004239 /* If we have custom certificate types set, use them */
Dr. Stephen Henson75c13e72017-02-23 22:12:28 +00004240 if (s->cert->ctype)
4241 return WPACKET_memcpy(pkt, s->cert->ctype, s->cert->ctype_len);
Matt Caswell0f113f32015-01-22 03:40:55 +00004242 /* Get mask of algorithms disabled by signature list */
4243 ssl_set_sig_mask(&alg_a, s, SSL_SECOP_SIGALG_MASK);
Dr. Stephen Henson9f27b1e2012-07-08 14:22:45 +00004244
Matt Caswell0f113f32015-01-22 03:40:55 +00004245 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004246
Dr. Stephen Hensoncaa97ef2009-05-28 18:11:29 +00004247#ifndef OPENSSL_NO_GOST
Matt Caswell28ff8ef2016-09-29 14:25:52 +01004248 if (s->version >= TLS1_VERSION && (alg_k & SSL_kGOST))
4249 return WPACKET_put_bytes_u8(pkt, TLS_CT_GOST01_SIGN)
4250 && WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_SIGN)
4251 && WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_512_SIGN);
Dr. Stephen Hensoncaa97ef2009-05-28 18:11:29 +00004252#endif
4253
Dr. Stephen Hensonbc71f912015-12-15 23:57:18 +00004254 if ((s->version == SSL3_VERSION) && (alg_k & SSL_kDHE)) {
Richard Levittebc36ee62001-02-20 08:13:47 +00004255#ifndef OPENSSL_NO_DH
Matt Caswell0f113f32015-01-22 03:40:55 +00004256# ifndef OPENSSL_NO_RSA
Matt Caswell28ff8ef2016-09-29 14:25:52 +01004257 if (!WPACKET_put_bytes_u8(pkt, SSL3_CT_RSA_EPHEMERAL_DH))
4258 return 0;
Matt Caswell0f113f32015-01-22 03:40:55 +00004259# endif
4260# ifndef OPENSSL_NO_DSA
Matt Caswell28ff8ef2016-09-29 14:25:52 +01004261 if (!WPACKET_put_bytes_u8(pkt, SSL3_CT_DSS_EPHEMERAL_DH))
4262 return 0;
Matt Caswell0f113f32015-01-22 03:40:55 +00004263# endif
Matt Caswell0f113f32015-01-22 03:40:55 +00004264#endif /* !OPENSSL_NO_DH */
Ben Laurie1e0784f2016-01-01 15:39:31 +00004265 }
Richard Levittebc36ee62001-02-20 08:13:47 +00004266#ifndef OPENSSL_NO_RSA
Matt Caswell28ff8ef2016-09-29 14:25:52 +01004267 if (!(alg_a & SSL_aRSA) && !WPACKET_put_bytes_u8(pkt, SSL3_CT_RSA_SIGN))
4268 return 0;
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004269#endif
Richard Levittebc36ee62001-02-20 08:13:47 +00004270#ifndef OPENSSL_NO_DSA
Matt Caswell28ff8ef2016-09-29 14:25:52 +01004271 if (!(alg_a & SSL_aDSS) && !WPACKET_put_bytes_u8(pkt, SSL3_CT_DSS_SIGN))
4272 return 0;
Ralf S. Engelschalldfeab061998-12-21 11:00:56 +00004273#endif
Rich Salz10bf4fc2015-03-10 19:09:27 -04004274#ifndef OPENSSL_NO_EC
Matt Caswell0f113f32015-01-22 03:40:55 +00004275 /*
Dr. Stephen Hensonc66ce5e2015-12-12 17:41:18 +00004276 * ECDSA certs can be used with RSA cipher suites too so we don't
Matt Caswell0f113f32015-01-22 03:40:55 +00004277 * need to check for SSL_kECDH or SSL_kECDHE
4278 */
Matt Caswell28ff8ef2016-09-29 14:25:52 +01004279 if (s->version >= TLS1_VERSION
4280 && !(alg_a & SSL_aECDSA)
4281 && !WPACKET_put_bytes_u8(pkt, TLS_CT_ECDSA_SIGN))
4282 return 0;
Matt Caswell0f113f32015-01-22 03:40:55 +00004283#endif
Matt Caswell28ff8ef2016-09-29 14:25:52 +01004284 return 1;
Matt Caswell0f113f32015-01-22 03:40:55 +00004285}
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004286
Dr. Stephen Henson9f27b1e2012-07-08 14:22:45 +00004287static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len)
Matt Caswell0f113f32015-01-22 03:40:55 +00004288{
Dr. Stephen Henson75c13e72017-02-23 22:12:28 +00004289 OPENSSL_free(c->ctype);
4290 c->ctype = NULL;
4291 c->ctype_len = 0;
4292 if (p == NULL || len == 0)
Matt Caswell0f113f32015-01-22 03:40:55 +00004293 return 1;
4294 if (len > 0xff)
4295 return 0;
Dr. Stephen Henson75c13e72017-02-23 22:12:28 +00004296 c->ctype = OPENSSL_memdup(p, len);
4297 if (c->ctype == NULL)
Matt Caswell0f113f32015-01-22 03:40:55 +00004298 return 0;
Dr. Stephen Henson75c13e72017-02-23 22:12:28 +00004299 c->ctype_len = len;
Matt Caswell0f113f32015-01-22 03:40:55 +00004300 return 1;
4301}
Dr. Stephen Henson9f27b1e2012-07-08 14:22:45 +00004302
Ulf Möller6b691a51999-04-19 21:31:43 +00004303int ssl3_shutdown(SSL *s)
Matt Caswell0f113f32015-01-22 03:40:55 +00004304{
4305 int ret;
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004306
Matt Caswell0f113f32015-01-22 03:40:55 +00004307 /*
4308 * Don't do anything much if we have not done the handshake or we don't
4309 * want to send messages :-)
4310 */
Matt Caswellc874def2015-10-05 10:41:13 +01004311 if (s->quiet_shutdown || SSL_in_before(s)) {
Matt Caswell0f113f32015-01-22 03:40:55 +00004312 s->shutdown = (SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN);
KaoruToda208fb892017-10-09 20:05:58 +09004313 return 1;
Matt Caswell0f113f32015-01-22 03:40:55 +00004314 }
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004315
Matt Caswell0f113f32015-01-22 03:40:55 +00004316 if (!(s->shutdown & SSL_SENT_SHUTDOWN)) {
4317 s->shutdown |= SSL_SENT_SHUTDOWN;
Matt Caswell0f113f32015-01-22 03:40:55 +00004318 ssl3_send_alert(s, SSL3_AL_WARNING, SSL_AD_CLOSE_NOTIFY);
Matt Caswell0f113f32015-01-22 03:40:55 +00004319 /*
4320 * our shutdown alert has been sent now, and if it still needs to be
4321 * written, s->s3->alert_dispatch will be true
4322 */
4323 if (s->s3->alert_dispatch)
KaoruToda26a7d932017-10-17 23:04:09 +09004324 return -1; /* return WANT_WRITE */
Matt Caswell0f113f32015-01-22 03:40:55 +00004325 } else if (s->s3->alert_dispatch) {
4326 /* resend it if not sent */
Matt Caswell0f113f32015-01-22 03:40:55 +00004327 ret = s->method->ssl_dispatch_alert(s);
4328 if (ret == -1) {
4329 /*
4330 * we only get to return -1 here the 2nd/Nth invocation, we must
FdaSilvaYY8483a002016-03-10 21:34:48 +01004331 * have already signalled return 0 upon a previous invocation,
Matt Caswell0f113f32015-01-22 03:40:55 +00004332 * return WANT_WRITE
4333 */
KaoruToda26a7d932017-10-17 23:04:09 +09004334 return ret;
Matt Caswell0f113f32015-01-22 03:40:55 +00004335 }
Matt Caswell0f113f32015-01-22 03:40:55 +00004336 } else if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN)) {
Matt Caswell54105dd2016-10-26 10:43:34 +01004337 size_t readbytes;
Matt Caswell0f113f32015-01-22 03:40:55 +00004338 /*
4339 * If we are waiting for a close from our peer, we are closed
4340 */
Matt Caswell54105dd2016-10-26 10:43:34 +01004341 s->method->ssl_read_bytes(s, 0, NULL, NULL, 0, 0, &readbytes);
Matt Caswell0f113f32015-01-22 03:40:55 +00004342 if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN)) {
Matt Caswelleda75752016-09-06 12:05:25 +01004343 return -1; /* return WANT_READ */
Matt Caswell0f113f32015-01-22 03:40:55 +00004344 }
4345 }
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004346
Matt Caswell0f113f32015-01-22 03:40:55 +00004347 if ((s->shutdown == (SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN)) &&
4348 !s->s3->alert_dispatch)
KaoruToda208fb892017-10-09 20:05:58 +09004349 return 1;
Matt Caswell0f113f32015-01-22 03:40:55 +00004350 else
KaoruToda26a7d932017-10-17 23:04:09 +09004351 return 0;
Matt Caswell0f113f32015-01-22 03:40:55 +00004352}
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004353
Matt Caswell7ee86272016-09-07 11:34:39 +01004354int ssl3_write(SSL *s, const void *buf, size_t len, size_t *written)
Matt Caswell0f113f32015-01-22 03:40:55 +00004355{
Matt Caswell0f113f32015-01-22 03:40:55 +00004356 clear_sys_error();
4357 if (s->s3->renegotiate)
Matt Caswellc7f47782017-01-10 23:02:28 +00004358 ssl3_renegotiate_check(s, 0);
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004359
Matt Caswell7ee86272016-09-07 11:34:39 +01004360 return s->method->ssl_write_bytes(s, SSL3_RT_APPLICATION_DATA, buf, len,
4361 written);
Matt Caswell0f113f32015-01-22 03:40:55 +00004362}
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004363
Matt Caswelleda75752016-09-06 12:05:25 +01004364static int ssl3_read_internal(SSL *s, void *buf, size_t len, int peek,
Matt Caswell54105dd2016-10-26 10:43:34 +01004365 size_t *readbytes)
Matt Caswell0f113f32015-01-22 03:40:55 +00004366{
4367 int ret;
Ralf S. Engelschall58964a41998-12-21 10:56:39 +00004368
Matt Caswell0f113f32015-01-22 03:40:55 +00004369 clear_sys_error();
4370 if (s->s3->renegotiate)
Matt Caswellc7f47782017-01-10 23:02:28 +00004371 ssl3_renegotiate_check(s, 0);
Matt Caswell0f113f32015-01-22 03:40:55 +00004372 s->s3->in_read_app_data = 1;
4373 ret =
Matt Caswell657da852015-05-11 09:35:41 +01004374 s->method->ssl_read_bytes(s, SSL3_RT_APPLICATION_DATA, NULL, buf, len,
Matt Caswell54105dd2016-10-26 10:43:34 +01004375 peek, readbytes);
Matt Caswell0f113f32015-01-22 03:40:55 +00004376 if ((ret == -1) && (s->s3->in_read_app_data == 2)) {
4377 /*
4378 * ssl3_read_bytes decided to call s->handshake_func, which called
4379 * ssl3_read_bytes to read handshake data. However, ssl3_read_bytes
4380 * actually found application data and thinks that application data
4381 * makes sense here; so disable handshake processing and try to read
4382 * application data again.
4383 */
Matt Caswell024f5432015-10-22 13:57:18 +01004384 ossl_statem_set_in_handshake(s, 1);
Matt Caswell0f113f32015-01-22 03:40:55 +00004385 ret =
Matt Caswell657da852015-05-11 09:35:41 +01004386 s->method->ssl_read_bytes(s, SSL3_RT_APPLICATION_DATA, NULL, buf,
Matt Caswell54105dd2016-10-26 10:43:34 +01004387 len, peek, readbytes);
Matt Caswell024f5432015-10-22 13:57:18 +01004388 ossl_statem_set_in_handshake(s, 0);
Matt Caswell0f113f32015-01-22 03:40:55 +00004389 } else
4390 s->s3->in_read_app_data = 0;
4391
Matt Caswelleda75752016-09-06 12:05:25 +01004392 return ret;
Matt Caswell0f113f32015-01-22 03:40:55 +00004393}
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004394
Matt Caswell54105dd2016-10-26 10:43:34 +01004395int ssl3_read(SSL *s, void *buf, size_t len, size_t *readbytes)
Matt Caswell0f113f32015-01-22 03:40:55 +00004396{
Matt Caswell54105dd2016-10-26 10:43:34 +01004397 return ssl3_read_internal(s, buf, len, 0, readbytes);
Matt Caswell0f113f32015-01-22 03:40:55 +00004398}
Bodo Möller5a4fbc62000-12-14 17:36:59 +00004399
Matt Caswell54105dd2016-10-26 10:43:34 +01004400int ssl3_peek(SSL *s, void *buf, size_t len, size_t *readbytes)
Matt Caswell0f113f32015-01-22 03:40:55 +00004401{
Matt Caswell54105dd2016-10-26 10:43:34 +01004402 return ssl3_read_internal(s, buf, len, 1, readbytes);
Matt Caswell0f113f32015-01-22 03:40:55 +00004403}
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004404
Ulf Möller6b691a51999-04-19 21:31:43 +00004405int ssl3_renegotiate(SSL *s)
Matt Caswell0f113f32015-01-22 03:40:55 +00004406{
4407 if (s->handshake_func == NULL)
KaoruToda208fb892017-10-09 20:05:58 +09004408 return 1;
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004409
Matt Caswell0f113f32015-01-22 03:40:55 +00004410 s->s3->renegotiate = 1;
KaoruToda208fb892017-10-09 20:05:58 +09004411 return 1;
Matt Caswell0f113f32015-01-22 03:40:55 +00004412}
Ralf S. Engelschalld02b48c1998-12-21 10:52:47 +00004413
Matt Caswellc7f47782017-01-10 23:02:28 +00004414/*
4415 * Check if we are waiting to do a renegotiation and if so whether now is a
4416 * good time to do it. If |initok| is true then we are being called from inside
4417 * the state machine so ignore the result of SSL_in_init(s). Otherwise we
4418 * should not do a renegotiation if SSL_in_init(s) is true. Returns 1 if we
4419 * should do a renegotiation now and sets up the state machine for it. Otherwise
4420 * returns 0.
4421 */
4422int ssl3_renegotiate_check(SSL *s, int initok)
Matt Caswell0f113f32015-01-22 03:40:55 +00004423{
4424 int ret = 0;
Ralf S. Engelschall58964a41998-12-21 10:56:39 +00004425
Matt Caswell0f113f32015-01-22 03:40:55 +00004426 if (s->s3->renegotiate) {
Matt Caswellf1619952015-02-02 12:18:03 +00004427 if (!RECORD_LAYER_read_pending(&s->rlayer)
4428 && !RECORD_LAYER_write_pending(&s->rlayer)
Matt Caswellc7f47782017-01-10 23:02:28 +00004429 && (initok || !SSL_in_init(s))) {
Matt Caswell0f113f32015-01-22 03:40:55 +00004430 /*
4431 * if we are the server, and we have sent a 'RENEGOTIATE'
Matt Caswell49ae7422015-09-08 09:13:50 +01004432 * message, we need to set the state machine into the renegotiate
4433 * state.
Matt Caswell0f113f32015-01-22 03:40:55 +00004434 */
Matt Caswellfe3a3292015-10-05 10:39:54 +01004435 ossl_statem_set_renegotiate(s);
Matt Caswell0f113f32015-01-22 03:40:55 +00004436 s->s3->renegotiate = 0;
4437 s->s3->num_renegotiations++;
4438 s->s3->total_renegotiations++;
4439 ret = 1;
4440 }
4441 }
Matt Caswellc7f47782017-01-10 23:02:28 +00004442 return ret;
Matt Caswell0f113f32015-01-22 03:40:55 +00004443}
4444
Ralf S. Engelschall58964a41998-12-21 10:56:39 +00004445/*
Matt Caswell0f113f32015-01-22 03:40:55 +00004446 * If we are using default SHA1+MD5 algorithms switch to new SHA256 PRF and
4447 * handshake macs if required.
Dr. Stephen Henson12053a82015-06-28 23:18:59 +01004448 *
4449 * If PSK and using SHA384 for TLS < 1.2 switch to default.
Dr. Stephen Henson7409d7a2011-04-29 22:56:51 +00004450 */
4451long ssl_get_algorithm2(SSL *s)
Matt Caswell0f113f32015-01-22 03:40:55 +00004452{
Dr. Stephen Henson52eede52016-07-19 16:03:10 +01004453 long alg2;
4454 if (s->s3 == NULL || s->s3->tmp.new_cipher == NULL)
4455 return -1;
4456 alg2 = s->s3->tmp.new_cipher->algorithm2;
Dr. Stephen Henson12053a82015-06-28 23:18:59 +01004457 if (s->method->ssl3_enc->enc_flags & SSL_ENC_FLAG_SHA256_PRF) {
4458 if (alg2 == (SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF))
4459 return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;
4460 } else if (s->s3->tmp.new_cipher->algorithm_mkey & SSL_PSK) {
4461 if (alg2 == (SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384))
4462 return SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF;
4463 }
Matt Caswell0f113f32015-01-22 03:40:55 +00004464 return alg2;
4465}
Matt Caswella3680c82015-03-31 13:57:46 +01004466
4467/*
4468 * Fill a ClientRandom or ServerRandom field of length len. Returns <= 0 on
4469 * failure, 1 on success.
4470 */
Matt Caswellf7f2a012017-03-22 08:52:54 +00004471int ssl_fill_hello_random(SSL *s, int server, unsigned char *result, size_t len,
4472 DOWNGRADE dgrd)
Matt Caswella3680c82015-03-31 13:57:46 +01004473{
Matt Caswellf7f2a012017-03-22 08:52:54 +00004474 int send_time = 0, ret;
Matt Caswella3680c82015-03-31 13:57:46 +01004475
4476 if (len < 4)
4477 return 0;
4478 if (server)
4479 send_time = (s->mode & SSL_MODE_SEND_SERVERHELLO_TIME) != 0;
4480 else
4481 send_time = (s->mode & SSL_MODE_SEND_CLIENTHELLO_TIME) != 0;
4482 if (send_time) {
4483 unsigned long Time = (unsigned long)time(NULL);
4484 unsigned char *p = result;
Rich Salzae3947d2017-08-03 10:24:03 -04004485
Matt Caswella3680c82015-03-31 13:57:46 +01004486 l2n(Time, p);
Rich Salzae3947d2017-08-03 10:24:03 -04004487 ret = ssl_randbytes(s, p, len - 4);
Matt Caswellf7f2a012017-03-22 08:52:54 +00004488 } else {
Rich Salzae3947d2017-08-03 10:24:03 -04004489 ret = ssl_randbytes(s, result, len);
Matt Caswellf7f2a012017-03-22 08:52:54 +00004490 }
4491#ifndef OPENSSL_NO_TLS13DOWNGRADE
4492 if (ret) {
Matt Caswellb77f3ed2017-05-22 12:33:42 +01004493 if (!ossl_assert(sizeof(tls11downgrade) < len)
4494 || !ossl_assert(sizeof(tls12downgrade) < len))
4495 return 0;
Matt Caswellf7f2a012017-03-22 08:52:54 +00004496 if (dgrd == DOWNGRADE_TO_1_2)
4497 memcpy(result + len - sizeof(tls12downgrade), tls12downgrade,
4498 sizeof(tls12downgrade));
4499 else if (dgrd == DOWNGRADE_TO_1_1)
4500 memcpy(result + len - sizeof(tls11downgrade), tls11downgrade,
4501 sizeof(tls11downgrade));
4502 }
4503#endif
4504 return ret;
Matt Caswella3680c82015-03-31 13:57:46 +01004505}
Dr. Stephen Henson57b272b2015-06-17 04:10:04 +01004506
4507int ssl_generate_master_secret(SSL *s, unsigned char *pms, size_t pmslen,
4508 int free_pms)
4509{
Dr. Stephen Henson8a0a12e2015-06-28 16:58:00 +01004510 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
Matt Caswell8c1a5342016-10-03 23:22:07 +01004511 int ret = 0;
4512
Dr. Stephen Henson8a0a12e2015-06-28 16:58:00 +01004513 if (alg_k & SSL_PSK) {
Matt Caswell0907d712016-07-06 09:55:31 +01004514#ifndef OPENSSL_NO_PSK
Dr. Stephen Henson8a0a12e2015-06-28 16:58:00 +01004515 unsigned char *pskpms, *t;
4516 size_t psklen = s->s3->tmp.psklen;
4517 size_t pskpmslen;
4518
4519 /* create PSK premaster_secret */
4520
4521 /* For plain PSK "other_secret" is psklen zeroes */
4522 if (alg_k & SSL_kPSK)
4523 pmslen = psklen;
4524
4525 pskpmslen = 4 + pmslen + psklen;
4526 pskpms = OPENSSL_malloc(pskpmslen);
Matt Caswell8c1a5342016-10-03 23:22:07 +01004527 if (pskpms == NULL)
Dr. Stephen Hensona7846652015-07-28 16:04:53 +01004528 goto err;
Dr. Stephen Henson8a0a12e2015-06-28 16:58:00 +01004529 t = pskpms;
4530 s2n(pmslen, t);
4531 if (alg_k & SSL_kPSK)
4532 memset(t, 0, pmslen);
4533 else
4534 memcpy(t, pms, pmslen);
4535 t += pmslen;
4536 s2n(psklen, t);
4537 memcpy(t, s->s3->tmp.psk, psklen);
4538
4539 OPENSSL_clear_free(s->s3->tmp.psk, psklen);
4540 s->s3->tmp.psk = NULL;
Matt Caswell8c1a5342016-10-03 23:22:07 +01004541 if (!s->method->ssl3_enc->generate_master_secret(s,
4542 s->session->master_key,pskpms, pskpmslen,
4543 &s->session->master_key_length))
4544 goto err;
Dr. Stephen Henson8a0a12e2015-06-28 16:58:00 +01004545 OPENSSL_clear_free(pskpms, pskpmslen);
Matt Caswell0907d712016-07-06 09:55:31 +01004546#else
4547 /* Should never happen */
Matt Caswell0907d712016-07-06 09:55:31 +01004548 goto err;
Dr. Stephen Henson8a0a12e2015-06-28 16:58:00 +01004549#endif
Matt Caswell0907d712016-07-06 09:55:31 +01004550 } else {
Matt Caswell8c1a5342016-10-03 23:22:07 +01004551 if (!s->method->ssl3_enc->generate_master_secret(s,
4552 s->session->master_key, pms, pmslen,
4553 &s->session->master_key_length))
4554 goto err;
Matt Caswell0907d712016-07-06 09:55:31 +01004555 }
4556
Matt Caswell8c1a5342016-10-03 23:22:07 +01004557 ret = 1;
Matt Caswell0907d712016-07-06 09:55:31 +01004558 err:
Dr. Stephen Henson8a0a12e2015-06-28 16:58:00 +01004559 if (pms) {
4560 if (free_pms)
4561 OPENSSL_clear_free(pms, pmslen);
4562 else
4563 OPENSSL_cleanse(pms, pmslen);
4564 }
Dr. Stephen Henson57b272b2015-06-17 04:10:04 +01004565 if (s->server == 0)
4566 s->s3->tmp.pms = NULL;
Matt Caswell8c1a5342016-10-03 23:22:07 +01004567 return ret;
Dr. Stephen Henson57b272b2015-06-17 04:10:04 +01004568}
Dr. Stephen Henson3f3504b2015-12-15 18:15:16 +00004569
Dr. Stephen Henson0a699a02016-08-15 14:07:33 +01004570/* Generate a private key from parameters */
4571EVP_PKEY *ssl_generate_pkey(EVP_PKEY *pm)
Dr. Stephen Henson3f3504b2015-12-15 18:15:16 +00004572{
4573 EVP_PKEY_CTX *pctx = NULL;
4574 EVP_PKEY *pkey = NULL;
Dr. Stephen Henson0a699a02016-08-15 14:07:33 +01004575
4576 if (pm == NULL)
4577 return NULL;
4578 pctx = EVP_PKEY_CTX_new(pm, NULL);
Dr. Stephen Henson3f3504b2015-12-15 18:15:16 +00004579 if (pctx == NULL)
4580 goto err;
4581 if (EVP_PKEY_keygen_init(pctx) <= 0)
4582 goto err;
Dr. Stephen Henson3f3504b2015-12-15 18:15:16 +00004583 if (EVP_PKEY_keygen(pctx, &pkey) <= 0) {
4584 EVP_PKEY_free(pkey);
4585 pkey = NULL;
4586 }
4587
4588 err:
4589 EVP_PKEY_CTX_free(pctx);
4590 return pkey;
4591}
Dr. Stephen Henson0a699a02016-08-15 14:07:33 +01004592#ifndef OPENSSL_NO_EC
Dr. Stephen Henson43b95d72017-09-23 00:15:34 +01004593/* Generate a private key from a group ID */
4594EVP_PKEY *ssl_generate_pkey_group(uint16_t id)
Dr. Stephen Henson0a699a02016-08-15 14:07:33 +01004595{
4596 EVP_PKEY_CTX *pctx = NULL;
4597 EVP_PKEY *pkey = NULL;
Dr. Stephen Henson43b95d72017-09-23 00:15:34 +01004598 const TLS_GROUP_INFO *ginf = tls1_group_id_lookup(id);
4599 uint16_t gtype;
Dr. Stephen Henson0a699a02016-08-15 14:07:33 +01004600
Dr. Stephen Henson43b95d72017-09-23 00:15:34 +01004601 if (ginf == NULL)
Dr. Stephen Henson0a699a02016-08-15 14:07:33 +01004602 goto err;
Dr. Stephen Henson43b95d72017-09-23 00:15:34 +01004603 gtype = ginf->flags & TLS_CURVE_TYPE;
4604 if (gtype == TLS_CURVE_CUSTOM)
4605 pctx = EVP_PKEY_CTX_new_id(ginf->nid, NULL);
4606 else
Dr. Stephen Henson0a699a02016-08-15 14:07:33 +01004607 pctx = EVP_PKEY_CTX_new_id(EVP_PKEY_EC, NULL);
Dr. Stephen Henson0a699a02016-08-15 14:07:33 +01004608 if (pctx == NULL)
4609 goto err;
4610 if (EVP_PKEY_keygen_init(pctx) <= 0)
4611 goto err;
Dr. Stephen Henson43b95d72017-09-23 00:15:34 +01004612 if (gtype != TLS_CURVE_CUSTOM
4613 && EVP_PKEY_CTX_set_ec_paramgen_curve_nid(pctx, ginf->nid) <= 0)
Dr. Stephen Henson0a699a02016-08-15 14:07:33 +01004614 goto err;
4615 if (EVP_PKEY_keygen(pctx, &pkey) <= 0) {
4616 EVP_PKEY_free(pkey);
4617 pkey = NULL;
4618 }
4619
Emilia Kaspera230b262016-08-05 19:03:17 +02004620 err:
Dr. Stephen Henson0a699a02016-08-15 14:07:33 +01004621 EVP_PKEY_CTX_free(pctx);
4622 return pkey;
4623}
Dr. Stephen Henson612f9d22017-09-23 02:40:30 +01004624
4625/*
4626 * Generate parameters from a group ID
4627 */
4628EVP_PKEY *ssl_generate_param_group(uint16_t id)
4629{
4630 EVP_PKEY_CTX *pctx = NULL;
4631 EVP_PKEY *pkey = NULL;
4632 const TLS_GROUP_INFO *ginf = tls1_group_id_lookup(id);
4633
4634 if (ginf == NULL)
4635 goto err;
4636
4637 if ((ginf->flags & TLS_CURVE_TYPE) == TLS_CURVE_CUSTOM) {
4638 pkey = EVP_PKEY_new();
4639 if (pkey != NULL && EVP_PKEY_set_type(pkey, ginf->nid))
4640 return pkey;
4641 EVP_PKEY_free(pkey);
4642 return NULL;
4643 }
4644
4645 pctx = EVP_PKEY_CTX_new_id(EVP_PKEY_EC, NULL);
4646 if (pctx == NULL)
4647 goto err;
4648 if (EVP_PKEY_paramgen_init(pctx) <= 0)
4649 goto err;
4650 if (EVP_PKEY_CTX_set_ec_paramgen_curve_nid(pctx, ginf->nid) <= 0)
4651 goto err;
4652 if (EVP_PKEY_paramgen(pctx, &pkey) <= 0) {
4653 EVP_PKEY_free(pkey);
4654 pkey = NULL;
4655 }
4656
4657 err:
4658 EVP_PKEY_CTX_free(pctx);
4659 return pkey;
4660}
Dr. Stephen Henson0a699a02016-08-15 14:07:33 +01004661#endif
Emilia Kaspera230b262016-08-05 19:03:17 +02004662
Matt Caswell92760c22016-11-09 14:06:12 +00004663/* Derive secrets for ECDH/DH */
4664int ssl_derive(SSL *s, EVP_PKEY *privkey, EVP_PKEY *pubkey, int gensecret)
Dr. Stephen Henson3f3504b2015-12-15 18:15:16 +00004665{
4666 int rv = 0;
4667 unsigned char *pms = NULL;
4668 size_t pmslen = 0;
4669 EVP_PKEY_CTX *pctx;
4670
4671 if (privkey == NULL || pubkey == NULL)
4672 return 0;
4673
4674 pctx = EVP_PKEY_CTX_new(privkey, NULL);
4675
4676 if (EVP_PKEY_derive_init(pctx) <= 0
4677 || EVP_PKEY_derive_set_peer(pctx, pubkey) <= 0
4678 || EVP_PKEY_derive(pctx, NULL, &pmslen) <= 0) {
4679 goto err;
4680 }
4681
4682 pms = OPENSSL_malloc(pmslen);
4683 if (pms == NULL)
4684 goto err;
4685
4686 if (EVP_PKEY_derive(pctx, pms, &pmslen) <= 0)
4687 goto err;
4688
Matt Caswell92760c22016-11-09 14:06:12 +00004689 if (gensecret) {
4690 if (SSL_IS_TLS13(s)) {
4691 /*
Matt Caswellec15acb2017-01-13 17:00:49 +00004692 * If we are resuming then we already generated the early secret
4693 * when we created the ClientHello, so don't recreate it.
Matt Caswell92760c22016-11-09 14:06:12 +00004694 */
Matt Caswellec15acb2017-01-13 17:00:49 +00004695 if (!s->hit)
4696 rv = tls13_generate_secret(s, ssl_handshake_md(s), NULL, NULL,
4697 0,
4698 (unsigned char *)&s->early_secret);
Matt Caswell02470862017-01-18 17:22:18 +00004699 else
4700 rv = 1;
4701
Matt Caswellec15acb2017-01-13 17:00:49 +00004702 rv = rv && tls13_generate_handshake_secret(s, pms, pmslen);
Matt Caswell92760c22016-11-09 14:06:12 +00004703 } else {
Matt Caswellc8ab3a42017-01-30 19:36:51 +00004704 rv = ssl_generate_master_secret(s, pms, pmslen, 0);
Matt Caswell92760c22016-11-09 14:06:12 +00004705 }
Dr. Stephen Henson3f3504b2015-12-15 18:15:16 +00004706 } else {
Matt Caswell0f1e51e2016-11-02 15:03:56 +00004707 /* Save premaster secret */
Dr. Stephen Henson3f3504b2015-12-15 18:15:16 +00004708 s->s3->tmp.pms = pms;
4709 s->s3->tmp.pmslen = pmslen;
4710 pms = NULL;
4711 rv = 1;
4712 }
4713
Emilia Kaspera230b262016-08-05 19:03:17 +02004714 err:
Dr. Stephen Henson3f3504b2015-12-15 18:15:16 +00004715 OPENSSL_clear_free(pms, pmslen);
4716 EVP_PKEY_CTX_free(pctx);
4717 return rv;
4718}
Dr. Stephen Henson6c4e6672015-12-18 15:58:28 +00004719
Ben Laurie1e0784f2016-01-01 15:39:31 +00004720#ifndef OPENSSL_NO_DH
Dr. Stephen Henson6c4e6672015-12-18 15:58:28 +00004721EVP_PKEY *ssl_dh_to_pkey(DH *dh)
4722{
4723 EVP_PKEY *ret;
4724 if (dh == NULL)
4725 return NULL;
4726 ret = EVP_PKEY_new();
4727 if (EVP_PKEY_set1_DH(ret, dh) <= 0) {
4728 EVP_PKEY_free(ret);
4729 return NULL;
4730 }
4731 return ret;
4732}
Ben Laurie1e0784f2016-01-01 15:39:31 +00004733#endif