fix cipher list order
[openssl.git] / ssl / s3_lib.c
1 /* ssl/s3_lib.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  * 
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  * 
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  * 
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from 
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  * 
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  * 
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 /* ====================================================================
59  * Copyright (c) 1998-2002 The OpenSSL Project.  All rights reserved.
60  *
61  * Redistribution and use in source and binary forms, with or without
62  * modification, are permitted provided that the following conditions
63  * are met:
64  *
65  * 1. Redistributions of source code must retain the above copyright
66  *    notice, this list of conditions and the following disclaimer. 
67  *
68  * 2. Redistributions in binary form must reproduce the above copyright
69  *    notice, this list of conditions and the following disclaimer in
70  *    the documentation and/or other materials provided with the
71  *    distribution.
72  *
73  * 3. All advertising materials mentioning features or use of this
74  *    software must display the following acknowledgment:
75  *    "This product includes software developed by the OpenSSL Project
76  *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
77  *
78  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
79  *    endorse or promote products derived from this software without
80  *    prior written permission. For written permission, please contact
81  *    openssl-core@openssl.org.
82  *
83  * 5. Products derived from this software may not be called "OpenSSL"
84  *    nor may "OpenSSL" appear in their names without prior written
85  *    permission of the OpenSSL Project.
86  *
87  * 6. Redistributions of any form whatsoever must retain the following
88  *    acknowledgment:
89  *    "This product includes software developed by the OpenSSL Project
90  *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
91  *
92  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
93  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
94  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
95  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
96  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
97  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
98  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
99  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
100  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
101  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
102  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
103  * OF THE POSSIBILITY OF SUCH DAMAGE.
104  * ====================================================================
105  *
106  * This product includes cryptographic software written by Eric Young
107  * (eay@cryptsoft.com).  This product includes software written by Tim
108  * Hudson (tjh@cryptsoft.com).
109  *
110  */
111 /* ====================================================================
112  * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
113  *
114  * Portions of the attached software ("Contribution") are developed by 
115  * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
116  *
117  * The Contribution is licensed pursuant to the OpenSSL open source
118  * license provided above.
119  *
120  * ECC cipher suite support in OpenSSL originally written by
121  * Vipul Gupta and Sumit Gupta of Sun Microsystems Laboratories.
122  *
123  */
124
125 #include <stdio.h>
126 #include <openssl/objects.h>
127 #include "ssl_locl.h"
128 #include "kssl_lcl.h"
129 #include <openssl/md5.h>
130 #ifndef OPENSSL_NO_DH
131 #include <openssl/dh.h>
132 #endif
133 #include <openssl/pq_compat.h>
134
135 const char *ssl3_version_str="SSLv3" OPENSSL_VERSION_PTEXT;
136
137 #define SSL3_NUM_CIPHERS        (sizeof(ssl3_ciphers)/sizeof(SSL_CIPHER))
138
139 /* list of available SSLv3 ciphers (sorted by id) */
140 OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]={
141 /* The RSA ciphers */
142 /* Cipher 01 */
143         {
144         1,
145         SSL3_TXT_RSA_NULL_MD5,
146         SSL3_CK_RSA_NULL_MD5,
147         SSL_kRSA|SSL_aRSA|SSL_eNULL |SSL_MD5|SSL_SSLV3,
148         SSL_NOT_EXP|SSL_STRONG_NONE,
149         0,
150         0,
151         0,
152         SSL_ALL_CIPHERS,
153         SSL_ALL_STRENGTHS,
154         },
155 /* Cipher 02 */
156         {
157         1,
158         SSL3_TXT_RSA_NULL_SHA,
159         SSL3_CK_RSA_NULL_SHA,
160         SSL_kRSA|SSL_aRSA|SSL_eNULL |SSL_SHA1|SSL_SSLV3,
161         SSL_NOT_EXP|SSL_STRONG_NONE,
162         0,
163         0,
164         0,
165         SSL_ALL_CIPHERS,
166         SSL_ALL_STRENGTHS,
167         },
168 /* Cipher 03 */
169         {
170         1,
171         SSL3_TXT_RSA_RC4_40_MD5,
172         SSL3_CK_RSA_RC4_40_MD5,
173         SSL_kRSA|SSL_aRSA|SSL_RC4  |SSL_MD5 |SSL_SSLV3,
174         SSL_EXPORT|SSL_EXP40,
175         0,
176         40,
177         128,
178         SSL_ALL_CIPHERS,
179         SSL_ALL_STRENGTHS,
180         },
181 /* Cipher 04 */
182         {
183         1,
184         SSL3_TXT_RSA_RC4_128_MD5,
185         SSL3_CK_RSA_RC4_128_MD5,
186         SSL_kRSA|SSL_aRSA|SSL_RC4  |SSL_MD5|SSL_SSLV3,
187         SSL_NOT_EXP|SSL_MEDIUM,
188         0,
189         128,
190         128,
191         SSL_ALL_CIPHERS,
192         SSL_ALL_STRENGTHS,
193         },
194 /* Cipher 05 */
195         {
196         1,
197         SSL3_TXT_RSA_RC4_128_SHA,
198         SSL3_CK_RSA_RC4_128_SHA,
199         SSL_kRSA|SSL_aRSA|SSL_RC4  |SSL_SHA1|SSL_SSLV3,
200         SSL_NOT_EXP|SSL_MEDIUM,
201         0,
202         128,
203         128,
204         SSL_ALL_CIPHERS,
205         SSL_ALL_STRENGTHS,
206         },
207 /* Cipher 06 */
208         {
209         1,
210         SSL3_TXT_RSA_RC2_40_MD5,
211         SSL3_CK_RSA_RC2_40_MD5,
212         SSL_kRSA|SSL_aRSA|SSL_RC2  |SSL_MD5 |SSL_SSLV3,
213         SSL_EXPORT|SSL_EXP40,
214         0,
215         40,
216         128,
217         SSL_ALL_CIPHERS,
218         SSL_ALL_STRENGTHS,
219         },
220 /* Cipher 07 */
221 #ifndef OPENSSL_NO_IDEA
222         {
223         1,
224         SSL3_TXT_RSA_IDEA_128_SHA,
225         SSL3_CK_RSA_IDEA_128_SHA,
226         SSL_kRSA|SSL_aRSA|SSL_IDEA |SSL_SHA1|SSL_SSLV3,
227         SSL_NOT_EXP|SSL_MEDIUM,
228         0,
229         128,
230         128,
231         SSL_ALL_CIPHERS,
232         SSL_ALL_STRENGTHS,
233         },
234 #endif
235 /* Cipher 08 */
236         {
237         1,
238         SSL3_TXT_RSA_DES_40_CBC_SHA,
239         SSL3_CK_RSA_DES_40_CBC_SHA,
240         SSL_kRSA|SSL_aRSA|SSL_DES|SSL_SHA1|SSL_SSLV3,
241         SSL_EXPORT|SSL_EXP40,
242         0,
243         40,
244         56,
245         SSL_ALL_CIPHERS,
246         SSL_ALL_STRENGTHS,
247         },
248 /* Cipher 09 */
249         {
250         1,
251         SSL3_TXT_RSA_DES_64_CBC_SHA,
252         SSL3_CK_RSA_DES_64_CBC_SHA,
253         SSL_kRSA|SSL_aRSA|SSL_DES  |SSL_SHA1|SSL_SSLV3,
254         SSL_NOT_EXP|SSL_LOW,
255         0,
256         56,
257         56,
258         SSL_ALL_CIPHERS,
259         SSL_ALL_STRENGTHS,
260         },
261 /* Cipher 0A */
262         {
263         1,
264         SSL3_TXT_RSA_DES_192_CBC3_SHA,
265         SSL3_CK_RSA_DES_192_CBC3_SHA,
266         SSL_kRSA|SSL_aRSA|SSL_3DES |SSL_SHA1|SSL_SSLV3,
267         SSL_NOT_EXP|SSL_HIGH,
268         0,
269         168,
270         168,
271         SSL_ALL_CIPHERS,
272         SSL_ALL_STRENGTHS,
273         },
274 /* The DH ciphers */
275 /* Cipher 0B */
276         {
277         0,
278         SSL3_TXT_DH_DSS_DES_40_CBC_SHA,
279         SSL3_CK_DH_DSS_DES_40_CBC_SHA,
280         SSL_kDHd |SSL_aDH|SSL_DES|SSL_SHA1|SSL_SSLV3,
281         SSL_EXPORT|SSL_EXP40,
282         0,
283         40,
284         56,
285         SSL_ALL_CIPHERS,
286         SSL_ALL_STRENGTHS,
287         },
288 /* Cipher 0C */
289         {
290         0,
291         SSL3_TXT_DH_DSS_DES_64_CBC_SHA,
292         SSL3_CK_DH_DSS_DES_64_CBC_SHA,
293         SSL_kDHd |SSL_aDH|SSL_DES  |SSL_SHA1|SSL_SSLV3,
294         SSL_NOT_EXP|SSL_LOW,
295         0,
296         56,
297         56,
298         SSL_ALL_CIPHERS,
299         SSL_ALL_STRENGTHS,
300         },
301 /* Cipher 0D */
302         {
303         0,
304         SSL3_TXT_DH_DSS_DES_192_CBC3_SHA,
305         SSL3_CK_DH_DSS_DES_192_CBC3_SHA,
306         SSL_kDHd |SSL_aDH|SSL_3DES |SSL_SHA1|SSL_SSLV3,
307         SSL_NOT_EXP|SSL_HIGH,
308         0,
309         168,
310         168,
311         SSL_ALL_CIPHERS,
312         SSL_ALL_STRENGTHS,
313         },
314 /* Cipher 0E */
315         {
316         0,
317         SSL3_TXT_DH_RSA_DES_40_CBC_SHA,
318         SSL3_CK_DH_RSA_DES_40_CBC_SHA,
319         SSL_kDHr |SSL_aDH|SSL_DES|SSL_SHA1|SSL_SSLV3,
320         SSL_EXPORT|SSL_EXP40,
321         0,
322         40,
323         56,
324         SSL_ALL_CIPHERS,
325         SSL_ALL_STRENGTHS,
326         },
327 /* Cipher 0F */
328         {
329         0,
330         SSL3_TXT_DH_RSA_DES_64_CBC_SHA,
331         SSL3_CK_DH_RSA_DES_64_CBC_SHA,
332         SSL_kDHr |SSL_aDH|SSL_DES  |SSL_SHA1|SSL_SSLV3,
333         SSL_NOT_EXP|SSL_LOW,
334         0,
335         56,
336         56,
337         SSL_ALL_CIPHERS,
338         SSL_ALL_STRENGTHS,
339         },
340 /* Cipher 10 */
341         {
342         0,
343         SSL3_TXT_DH_RSA_DES_192_CBC3_SHA,
344         SSL3_CK_DH_RSA_DES_192_CBC3_SHA,
345         SSL_kDHr |SSL_aDH|SSL_3DES |SSL_SHA1|SSL_SSLV3,
346         SSL_NOT_EXP|SSL_HIGH,
347         0,
348         168,
349         168,
350         SSL_ALL_CIPHERS,
351         SSL_ALL_STRENGTHS,
352         },
353
354 /* The Ephemeral DH ciphers */
355 /* Cipher 11 */
356         {
357         1,
358         SSL3_TXT_EDH_DSS_DES_40_CBC_SHA,
359         SSL3_CK_EDH_DSS_DES_40_CBC_SHA,
360         SSL_kEDH|SSL_aDSS|SSL_DES|SSL_SHA1|SSL_SSLV3,
361         SSL_EXPORT|SSL_EXP40,
362         0,
363         40,
364         56,
365         SSL_ALL_CIPHERS,
366         SSL_ALL_STRENGTHS,
367         },
368 /* Cipher 12 */
369         {
370         1,
371         SSL3_TXT_EDH_DSS_DES_64_CBC_SHA,
372         SSL3_CK_EDH_DSS_DES_64_CBC_SHA,
373         SSL_kEDH|SSL_aDSS|SSL_DES  |SSL_SHA1|SSL_SSLV3,
374         SSL_NOT_EXP|SSL_LOW,
375         0,
376         56,
377         56,
378         SSL_ALL_CIPHERS,
379         SSL_ALL_STRENGTHS,
380         },
381 /* Cipher 13 */
382         {
383         1,
384         SSL3_TXT_EDH_DSS_DES_192_CBC3_SHA,
385         SSL3_CK_EDH_DSS_DES_192_CBC3_SHA,
386         SSL_kEDH|SSL_aDSS|SSL_3DES |SSL_SHA1|SSL_SSLV3,
387         SSL_NOT_EXP|SSL_HIGH,
388         0,
389         168,
390         168,
391         SSL_ALL_CIPHERS,
392         SSL_ALL_STRENGTHS,
393         },
394 /* Cipher 14 */
395         {
396         1,
397         SSL3_TXT_EDH_RSA_DES_40_CBC_SHA,
398         SSL3_CK_EDH_RSA_DES_40_CBC_SHA,
399         SSL_kEDH|SSL_aRSA|SSL_DES|SSL_SHA1|SSL_SSLV3,
400         SSL_EXPORT|SSL_EXP40,
401         0,
402         40,
403         56,
404         SSL_ALL_CIPHERS,
405         SSL_ALL_STRENGTHS,
406         },
407 /* Cipher 15 */
408         {
409         1,
410         SSL3_TXT_EDH_RSA_DES_64_CBC_SHA,
411         SSL3_CK_EDH_RSA_DES_64_CBC_SHA,
412         SSL_kEDH|SSL_aRSA|SSL_DES  |SSL_SHA1|SSL_SSLV3,
413         SSL_NOT_EXP|SSL_LOW,
414         0,
415         56,
416         56,
417         SSL_ALL_CIPHERS,
418         SSL_ALL_STRENGTHS,
419         },
420 /* Cipher 16 */
421         {
422         1,
423         SSL3_TXT_EDH_RSA_DES_192_CBC3_SHA,
424         SSL3_CK_EDH_RSA_DES_192_CBC3_SHA,
425         SSL_kEDH|SSL_aRSA|SSL_3DES |SSL_SHA1|SSL_SSLV3,
426         SSL_NOT_EXP|SSL_HIGH,
427         0,
428         168,
429         168,
430         SSL_ALL_CIPHERS,
431         SSL_ALL_STRENGTHS,
432         },
433 /* Cipher 17 */
434         {
435         1,
436         SSL3_TXT_ADH_RC4_40_MD5,
437         SSL3_CK_ADH_RC4_40_MD5,
438         SSL_kEDH |SSL_aNULL|SSL_RC4  |SSL_MD5 |SSL_SSLV3,
439         SSL_EXPORT|SSL_EXP40,
440         0,
441         40,
442         128,
443         SSL_ALL_CIPHERS,
444         SSL_ALL_STRENGTHS,
445         },
446 /* Cipher 18 */
447         {
448         1,
449         SSL3_TXT_ADH_RC4_128_MD5,
450         SSL3_CK_ADH_RC4_128_MD5,
451         SSL_kEDH |SSL_aNULL|SSL_RC4  |SSL_MD5 |SSL_SSLV3,
452         SSL_NOT_EXP|SSL_MEDIUM,
453         0,
454         128,
455         128,
456         SSL_ALL_CIPHERS,
457         SSL_ALL_STRENGTHS,
458         },
459 /* Cipher 19 */
460         {
461         1,
462         SSL3_TXT_ADH_DES_40_CBC_SHA,
463         SSL3_CK_ADH_DES_40_CBC_SHA,
464         SSL_kEDH |SSL_aNULL|SSL_DES|SSL_SHA1|SSL_SSLV3,
465         SSL_EXPORT|SSL_EXP40,
466         0,
467         40,
468         128,
469         SSL_ALL_CIPHERS,
470         SSL_ALL_STRENGTHS,
471         },
472 /* Cipher 1A */
473         {
474         1,
475         SSL3_TXT_ADH_DES_64_CBC_SHA,
476         SSL3_CK_ADH_DES_64_CBC_SHA,
477         SSL_kEDH |SSL_aNULL|SSL_DES  |SSL_SHA1|SSL_SSLV3,
478         SSL_NOT_EXP|SSL_LOW,
479         0,
480         56,
481         56,
482         SSL_ALL_CIPHERS,
483         SSL_ALL_STRENGTHS,
484         },
485 /* Cipher 1B */
486         {
487         1,
488         SSL3_TXT_ADH_DES_192_CBC_SHA,
489         SSL3_CK_ADH_DES_192_CBC_SHA,
490         SSL_kEDH |SSL_aNULL|SSL_3DES |SSL_SHA1|SSL_SSLV3,
491         SSL_NOT_EXP|SSL_HIGH,
492         0,
493         168,
494         168,
495         SSL_ALL_CIPHERS,
496         SSL_ALL_STRENGTHS,
497         },
498
499 /* Fortezza */
500 /* Cipher 1C */
501         {
502         0,
503         SSL3_TXT_FZA_DMS_NULL_SHA,
504         SSL3_CK_FZA_DMS_NULL_SHA,
505         SSL_kFZA|SSL_aFZA |SSL_eNULL |SSL_SHA1|SSL_SSLV3,
506         SSL_NOT_EXP|SSL_STRONG_NONE,
507         0,
508         0,
509         0,
510         SSL_ALL_CIPHERS,
511         SSL_ALL_STRENGTHS,
512         },
513
514 /* Cipher 1D */
515         {
516         0,
517         SSL3_TXT_FZA_DMS_FZA_SHA,
518         SSL3_CK_FZA_DMS_FZA_SHA,
519         SSL_kFZA|SSL_aFZA |SSL_eFZA |SSL_SHA1|SSL_SSLV3,
520         SSL_NOT_EXP|SSL_STRONG_NONE,
521         0,
522         0,
523         0,
524         SSL_ALL_CIPHERS,
525         SSL_ALL_STRENGTHS,
526         },
527
528 #if 0
529 /* Cipher 1E */
530         {
531         0,
532         SSL3_TXT_FZA_DMS_RC4_SHA,
533         SSL3_CK_FZA_DMS_RC4_SHA,
534         SSL_kFZA|SSL_aFZA |SSL_RC4  |SSL_SHA1|SSL_SSLV3,
535         SSL_NOT_EXP|SSL_MEDIUM,
536         0,
537         128,
538         128,
539         SSL_ALL_CIPHERS,
540         SSL_ALL_STRENGTHS,
541         },
542 #endif
543
544 #ifndef OPENSSL_NO_KRB5
545 /* The Kerberos ciphers
546 ** 20000107 VRS: And the first shall be last,
547 ** in hopes of avoiding the lynx ssl renegotiation problem.
548 */
549 /* Cipher 1E VRS */
550         {
551         1,
552         SSL3_TXT_KRB5_DES_64_CBC_SHA,
553         SSL3_CK_KRB5_DES_64_CBC_SHA,
554         SSL_kKRB5|SSL_aKRB5|  SSL_DES|SSL_SHA1   |SSL_SSLV3,
555         SSL_NOT_EXP|SSL_LOW,
556         0,
557         56,
558         56,
559         SSL_ALL_CIPHERS,
560         SSL_ALL_STRENGTHS,
561         },
562
563 /* Cipher 1F VRS */
564         {
565         1,
566         SSL3_TXT_KRB5_DES_192_CBC3_SHA,
567         SSL3_CK_KRB5_DES_192_CBC3_SHA,
568         SSL_kKRB5|SSL_aKRB5|  SSL_3DES|SSL_SHA1  |SSL_SSLV3,
569         SSL_NOT_EXP|SSL_HIGH,
570         0,
571         112,
572         168,
573         SSL_ALL_CIPHERS,
574         SSL_ALL_STRENGTHS,
575         },
576
577 /* Cipher 20 VRS */
578         {
579         1,
580         SSL3_TXT_KRB5_RC4_128_SHA,
581         SSL3_CK_KRB5_RC4_128_SHA,
582         SSL_kKRB5|SSL_aKRB5|  SSL_RC4|SSL_SHA1  |SSL_SSLV3,
583         SSL_NOT_EXP|SSL_MEDIUM,
584         0,
585         128,
586         128,
587         SSL_ALL_CIPHERS,
588         SSL_ALL_STRENGTHS,
589         },
590
591 /* Cipher 21 VRS */
592         {
593         1,
594         SSL3_TXT_KRB5_IDEA_128_CBC_SHA,
595         SSL3_CK_KRB5_IDEA_128_CBC_SHA,
596         SSL_kKRB5|SSL_aKRB5|  SSL_IDEA|SSL_SHA1  |SSL_SSLV3,
597         SSL_NOT_EXP|SSL_MEDIUM,
598         0,
599         128,
600         128,
601         SSL_ALL_CIPHERS,
602         SSL_ALL_STRENGTHS,
603         },
604
605 /* Cipher 22 VRS */
606         {
607         1,
608         SSL3_TXT_KRB5_DES_64_CBC_MD5,
609         SSL3_CK_KRB5_DES_64_CBC_MD5,
610         SSL_kKRB5|SSL_aKRB5|  SSL_DES|SSL_MD5    |SSL_SSLV3,
611         SSL_NOT_EXP|SSL_LOW,
612         0,
613         56,
614         56,
615         SSL_ALL_CIPHERS,
616         SSL_ALL_STRENGTHS,
617         },
618
619 /* Cipher 23 VRS */
620         {
621         1,
622         SSL3_TXT_KRB5_DES_192_CBC3_MD5,
623         SSL3_CK_KRB5_DES_192_CBC3_MD5,
624         SSL_kKRB5|SSL_aKRB5|  SSL_3DES|SSL_MD5   |SSL_SSLV3,
625         SSL_NOT_EXP|SSL_HIGH,
626         0,
627         112,
628         168,
629         SSL_ALL_CIPHERS,
630         SSL_ALL_STRENGTHS,
631         },
632
633 /* Cipher 24 VRS */
634         {
635         1,
636         SSL3_TXT_KRB5_RC4_128_MD5,
637         SSL3_CK_KRB5_RC4_128_MD5,
638         SSL_kKRB5|SSL_aKRB5|  SSL_RC4|SSL_MD5  |SSL_SSLV3,
639         SSL_NOT_EXP|SSL_MEDIUM,
640         0,
641         128,
642         128,
643         SSL_ALL_CIPHERS,
644         SSL_ALL_STRENGTHS,
645         },
646
647 /* Cipher 25 VRS */
648         {
649         1,
650         SSL3_TXT_KRB5_IDEA_128_CBC_MD5,
651         SSL3_CK_KRB5_IDEA_128_CBC_MD5,
652         SSL_kKRB5|SSL_aKRB5|  SSL_IDEA|SSL_MD5  |SSL_SSLV3,
653         SSL_NOT_EXP|SSL_MEDIUM,
654         0,
655         128,
656         128,
657         SSL_ALL_CIPHERS,
658         SSL_ALL_STRENGTHS,
659         },
660
661 /* Cipher 26 VRS */
662         {
663         1,
664         SSL3_TXT_KRB5_DES_40_CBC_SHA,
665         SSL3_CK_KRB5_DES_40_CBC_SHA,
666         SSL_kKRB5|SSL_aKRB5|  SSL_DES|SSL_SHA1   |SSL_SSLV3,
667         SSL_EXPORT|SSL_EXP40,
668         0,
669         40,
670         56,
671         SSL_ALL_CIPHERS,
672         SSL_ALL_STRENGTHS,
673         },
674
675 /* Cipher 27 VRS */
676         {
677         1,
678         SSL3_TXT_KRB5_RC2_40_CBC_SHA,
679         SSL3_CK_KRB5_RC2_40_CBC_SHA,
680         SSL_kKRB5|SSL_aKRB5|  SSL_RC2|SSL_SHA1   |SSL_SSLV3,
681         SSL_EXPORT|SSL_EXP40,
682         0,
683         40,
684         128,
685         SSL_ALL_CIPHERS,
686         SSL_ALL_STRENGTHS,
687         },
688
689 /* Cipher 28 VRS */
690         {
691         1,
692         SSL3_TXT_KRB5_RC4_40_SHA,
693         SSL3_CK_KRB5_RC4_40_SHA,
694         SSL_kKRB5|SSL_aKRB5|  SSL_RC4|SSL_SHA1   |SSL_SSLV3,
695         SSL_EXPORT|SSL_EXP40,
696         0,
697         128,
698         128,
699         SSL_ALL_CIPHERS,
700         SSL_ALL_STRENGTHS,
701         },
702
703 /* Cipher 29 VRS */
704         {
705         1,
706         SSL3_TXT_KRB5_DES_40_CBC_MD5,
707         SSL3_CK_KRB5_DES_40_CBC_MD5,
708         SSL_kKRB5|SSL_aKRB5|  SSL_DES|SSL_MD5    |SSL_SSLV3,
709         SSL_EXPORT|SSL_EXP40,
710         0,
711         40,
712         56,
713         SSL_ALL_CIPHERS,
714         SSL_ALL_STRENGTHS,
715         },
716
717 /* Cipher 2A VRS */
718         {
719         1,
720         SSL3_TXT_KRB5_RC2_40_CBC_MD5,
721         SSL3_CK_KRB5_RC2_40_CBC_MD5,
722         SSL_kKRB5|SSL_aKRB5|  SSL_RC2|SSL_MD5    |SSL_SSLV3,
723         SSL_EXPORT|SSL_EXP40,
724         0,
725         40,
726         128,
727         SSL_ALL_CIPHERS,
728         SSL_ALL_STRENGTHS,
729         },
730
731 /* Cipher 2B VRS */
732         {
733         1,
734         SSL3_TXT_KRB5_RC4_40_MD5,
735         SSL3_CK_KRB5_RC4_40_MD5,
736         SSL_kKRB5|SSL_aKRB5|  SSL_RC4|SSL_MD5    |SSL_SSLV3,
737         SSL_EXPORT|SSL_EXP40,
738         0,
739         128,
740         128,
741         SSL_ALL_CIPHERS,
742         SSL_ALL_STRENGTHS,
743         },
744 #endif  /* OPENSSL_NO_KRB5 */
745 /* New AES ciphersuites */
746
747 /* Cipher 2F */
748         {
749         1,
750         TLS1_TXT_RSA_WITH_AES_128_SHA,
751         TLS1_CK_RSA_WITH_AES_128_SHA,
752         SSL_kRSA|SSL_aRSA|SSL_AES|SSL_SHA |SSL_TLSV1,
753         SSL_NOT_EXP|SSL_HIGH,
754         0,
755         128,
756         128,
757         SSL_ALL_CIPHERS,
758         SSL_ALL_STRENGTHS,
759         },
760 /* Cipher 30 */
761         {
762         0,
763         TLS1_TXT_DH_DSS_WITH_AES_128_SHA,
764         TLS1_CK_DH_DSS_WITH_AES_128_SHA,
765         SSL_kDHd|SSL_aDH|SSL_AES|SSL_SHA|SSL_TLSV1,
766         SSL_NOT_EXP|SSL_HIGH,
767         0,
768         128,
769         128,
770         SSL_ALL_CIPHERS,
771         SSL_ALL_STRENGTHS,
772         },
773 /* Cipher 31 */
774         {
775         0,
776         TLS1_TXT_DH_RSA_WITH_AES_128_SHA,
777         TLS1_CK_DH_RSA_WITH_AES_128_SHA,
778         SSL_kDHr|SSL_aDH|SSL_AES|SSL_SHA|SSL_TLSV1,
779         SSL_NOT_EXP|SSL_HIGH,
780         0,
781         128,
782         128,
783         SSL_ALL_CIPHERS,
784         SSL_ALL_STRENGTHS,
785         },
786 /* Cipher 32 */
787         {
788         1,
789         TLS1_TXT_DHE_DSS_WITH_AES_128_SHA,
790         TLS1_CK_DHE_DSS_WITH_AES_128_SHA,
791         SSL_kEDH|SSL_aDSS|SSL_AES|SSL_SHA|SSL_TLSV1,
792         SSL_NOT_EXP|SSL_HIGH,
793         0,
794         128,
795         128,
796         SSL_ALL_CIPHERS,
797         SSL_ALL_STRENGTHS,
798         },
799 /* Cipher 33 */
800         {
801         1,
802         TLS1_TXT_DHE_RSA_WITH_AES_128_SHA,
803         TLS1_CK_DHE_RSA_WITH_AES_128_SHA,
804         SSL_kEDH|SSL_aRSA|SSL_AES|SSL_SHA|SSL_TLSV1,
805         SSL_NOT_EXP|SSL_HIGH,
806         0,
807         128,
808         128,
809         SSL_ALL_CIPHERS,
810         SSL_ALL_STRENGTHS,
811         },
812 /* Cipher 34 */
813         {
814         1,
815         TLS1_TXT_ADH_WITH_AES_128_SHA,
816         TLS1_CK_ADH_WITH_AES_128_SHA,
817         SSL_kEDH|SSL_aNULL|SSL_AES|SSL_SHA|SSL_TLSV1,
818         SSL_NOT_EXP|SSL_HIGH,
819         0,
820         128,
821         128,
822         SSL_ALL_CIPHERS,
823         SSL_ALL_STRENGTHS,
824         },
825
826 /* Cipher 35 */
827         {
828         1,
829         TLS1_TXT_RSA_WITH_AES_256_SHA,
830         TLS1_CK_RSA_WITH_AES_256_SHA,
831         SSL_kRSA|SSL_aRSA|SSL_AES|SSL_SHA |SSL_TLSV1,
832         SSL_NOT_EXP|SSL_HIGH,
833         0,
834         256,
835         256,
836         SSL_ALL_CIPHERS,
837         SSL_ALL_STRENGTHS,
838         },
839 /* Cipher 36 */
840         {
841         0,
842         TLS1_TXT_DH_DSS_WITH_AES_256_SHA,
843         TLS1_CK_DH_DSS_WITH_AES_256_SHA,
844         SSL_kDHd|SSL_aDH|SSL_AES|SSL_SHA|SSL_TLSV1,
845         SSL_NOT_EXP|SSL_HIGH,
846         0,
847         256,
848         256,
849         SSL_ALL_CIPHERS,
850         SSL_ALL_STRENGTHS,
851         },
852 /* Cipher 37 */
853         {
854         0,
855         TLS1_TXT_DH_RSA_WITH_AES_256_SHA,
856         TLS1_CK_DH_RSA_WITH_AES_256_SHA,
857         SSL_kDHr|SSL_aDH|SSL_AES|SSL_SHA|SSL_TLSV1,
858         SSL_NOT_EXP|SSL_HIGH,
859         0,
860         256,
861         256,
862         SSL_ALL_CIPHERS,
863         SSL_ALL_STRENGTHS,
864         },
865 /* Cipher 38 */
866         {
867         1,
868         TLS1_TXT_DHE_DSS_WITH_AES_256_SHA,
869         TLS1_CK_DHE_DSS_WITH_AES_256_SHA,
870         SSL_kEDH|SSL_aDSS|SSL_AES|SSL_SHA|SSL_TLSV1,
871         SSL_NOT_EXP|SSL_HIGH,
872         0,
873         256,
874         256,
875         SSL_ALL_CIPHERS,
876         SSL_ALL_STRENGTHS,
877         },
878 /* Cipher 39 */
879         {
880         1,
881         TLS1_TXT_DHE_RSA_WITH_AES_256_SHA,
882         TLS1_CK_DHE_RSA_WITH_AES_256_SHA,
883         SSL_kEDH|SSL_aRSA|SSL_AES|SSL_SHA|SSL_TLSV1,
884         SSL_NOT_EXP|SSL_HIGH,
885         0,
886         256,
887         256,
888         SSL_ALL_CIPHERS,
889         SSL_ALL_STRENGTHS,
890         },
891         /* Cipher 3A */
892         {
893         1,
894         TLS1_TXT_ADH_WITH_AES_256_SHA,
895         TLS1_CK_ADH_WITH_AES_256_SHA,
896         SSL_kEDH|SSL_aNULL|SSL_AES|SSL_SHA|SSL_TLSV1,
897         SSL_NOT_EXP|SSL_HIGH,
898         0,
899         256,
900         256,
901         SSL_ALL_CIPHERS,
902         SSL_ALL_STRENGTHS,
903         },
904
905 #if TLS1_ALLOW_EXPERIMENTAL_CIPHERSUITES
906         /* New TLS Export CipherSuites */
907         /* Cipher 60 */
908             {
909             1,
910             TLS1_TXT_RSA_EXPORT1024_WITH_RC4_56_MD5,
911             TLS1_CK_RSA_EXPORT1024_WITH_RC4_56_MD5,
912             SSL_kRSA|SSL_aRSA|SSL_RC4|SSL_MD5|SSL_TLSV1,
913             SSL_EXPORT|SSL_EXP56,
914             0,
915             56,
916             128,
917             SSL_ALL_CIPHERS,
918             SSL_ALL_STRENGTHS,
919             },
920         /* Cipher 61 */
921             {
922             1,
923             TLS1_TXT_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5,
924             TLS1_CK_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5,
925             SSL_kRSA|SSL_aRSA|SSL_RC2|SSL_MD5|SSL_TLSV1,
926             SSL_EXPORT|SSL_EXP56,
927             0,
928             56,
929             128,
930             SSL_ALL_CIPHERS,
931             SSL_ALL_STRENGTHS,
932             },
933         /* Cipher 62 */
934             {
935             1,
936             TLS1_TXT_RSA_EXPORT1024_WITH_DES_CBC_SHA,
937             TLS1_CK_RSA_EXPORT1024_WITH_DES_CBC_SHA,
938             SSL_kRSA|SSL_aRSA|SSL_DES|SSL_SHA|SSL_TLSV1,
939             SSL_EXPORT|SSL_EXP56,
940             0,
941             56,
942             56,
943             SSL_ALL_CIPHERS,
944             SSL_ALL_STRENGTHS,
945             },
946         /* Cipher 63 */
947             {
948             1,
949             TLS1_TXT_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA,
950             TLS1_CK_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA,
951             SSL_kEDH|SSL_aDSS|SSL_DES|SSL_SHA|SSL_TLSV1,
952             SSL_EXPORT|SSL_EXP56,
953             0,
954             56,
955             56,
956             SSL_ALL_CIPHERS,
957             SSL_ALL_STRENGTHS,
958             },
959         /* Cipher 64 */
960             {
961             1,
962             TLS1_TXT_RSA_EXPORT1024_WITH_RC4_56_SHA,
963             TLS1_CK_RSA_EXPORT1024_WITH_RC4_56_SHA,
964             SSL_kRSA|SSL_aRSA|SSL_RC4|SSL_SHA|SSL_TLSV1,
965             SSL_EXPORT|SSL_EXP56,
966             0,
967             56,
968             128,
969             SSL_ALL_CIPHERS,
970             SSL_ALL_STRENGTHS,
971             },
972         /* Cipher 65 */
973             {
974             1,
975             TLS1_TXT_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA,
976             TLS1_CK_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA,
977             SSL_kEDH|SSL_aDSS|SSL_RC4|SSL_SHA|SSL_TLSV1,
978             SSL_EXPORT|SSL_EXP56,
979             0,
980             56,
981             128,
982             SSL_ALL_CIPHERS,
983             SSL_ALL_STRENGTHS,
984             },
985         /* Cipher 66 */
986             {
987             1,
988             TLS1_TXT_DHE_DSS_WITH_RC4_128_SHA,
989             TLS1_CK_DHE_DSS_WITH_RC4_128_SHA,
990             SSL_kEDH|SSL_aDSS|SSL_RC4|SSL_SHA|SSL_TLSV1,
991             SSL_NOT_EXP|SSL_MEDIUM,
992             0,
993             128,
994             128,
995             SSL_ALL_CIPHERS,
996             SSL_ALL_STRENGTHS
997             },
998 #endif
999 #ifndef OPENSSL_NO_ECDH
1000         /* Cipher C001 */
1001             {
1002             1,
1003             TLS1_TXT_ECDH_ECDSA_WITH_NULL_SHA,
1004             TLS1_CK_ECDH_ECDSA_WITH_NULL_SHA,
1005             SSL_kECDH|SSL_aECDSA|SSL_eNULL|SSL_SHA|SSL_TLSV1,
1006             SSL_NOT_EXP,
1007             0,
1008             0,
1009             0,
1010             SSL_ALL_CIPHERS,
1011             SSL_ALL_STRENGTHS,
1012             },
1013
1014         /* Cipher C002 */
1015             {
1016             1,
1017             TLS1_TXT_ECDH_ECDSA_WITH_RC4_128_SHA,
1018             TLS1_CK_ECDH_ECDSA_WITH_RC4_128_SHA,
1019             SSL_kECDH|SSL_aECDSA|SSL_RC4|SSL_SHA|SSL_TLSV1,
1020             SSL_NOT_EXP,
1021             0,
1022             128,
1023             128,
1024             SSL_ALL_CIPHERS,
1025             SSL_ALL_STRENGTHS,
1026             },
1027
1028         /* Cipher C003 */
1029             {
1030             1,
1031             TLS1_TXT_ECDH_ECDSA_WITH_DES_192_CBC3_SHA,
1032             TLS1_CK_ECDH_ECDSA_WITH_DES_192_CBC3_SHA,
1033             SSL_kECDH|SSL_aECDSA|SSL_3DES|SSL_SHA|SSL_TLSV1,
1034             SSL_NOT_EXP|SSL_HIGH,
1035             0,
1036             168,
1037             168,
1038             SSL_ALL_CIPHERS,
1039             SSL_ALL_STRENGTHS,
1040             },
1041
1042         /* Cipher C004 */
1043             {
1044             1,
1045             TLS1_TXT_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
1046             TLS1_CK_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
1047             SSL_kECDH|SSL_aECDSA|SSL_AES|SSL_SHA|SSL_TLSV1,
1048             SSL_NOT_EXP|SSL_HIGH,
1049             0,
1050             128,
1051             128,
1052             SSL_ALL_CIPHERS,
1053             SSL_ALL_STRENGTHS,
1054             },
1055
1056         /* Cipher C005 */
1057             {
1058             1,
1059             TLS1_TXT_ECDH_ECDSA_WITH_AES_256_CBC_SHA,
1060             TLS1_CK_ECDH_ECDSA_WITH_AES_256_CBC_SHA,
1061             SSL_kECDH|SSL_aECDSA|SSL_AES|SSL_SHA|SSL_TLSV1,
1062             SSL_NOT_EXP|SSL_HIGH,
1063             0,
1064             256,
1065             256,
1066             SSL_ALL_CIPHERS,
1067             SSL_ALL_STRENGTHS,
1068             },
1069
1070         /* Cipher C006 */
1071             {
1072             1,
1073             TLS1_TXT_ECDHE_ECDSA_WITH_NULL_SHA,
1074             TLS1_CK_ECDHE_ECDSA_WITH_NULL_SHA,
1075             SSL_kECDHE|SSL_aECDSA|SSL_eNULL|SSL_SHA|SSL_TLSV1,
1076             SSL_NOT_EXP,
1077             0,
1078             0,
1079             0,
1080             SSL_ALL_CIPHERS,
1081             SSL_ALL_STRENGTHS,
1082             },
1083
1084         /* Cipher C007 */
1085             {
1086             1,
1087             TLS1_TXT_ECDHE_ECDSA_WITH_RC4_128_SHA,
1088             TLS1_CK_ECDHE_ECDSA_WITH_RC4_128_SHA,
1089             SSL_kECDHE|SSL_aECDSA|SSL_RC4|SSL_SHA|SSL_TLSV1,
1090             SSL_NOT_EXP,
1091             0,
1092             128,
1093             128,
1094             SSL_ALL_CIPHERS,
1095             SSL_ALL_STRENGTHS,
1096             },
1097
1098         /* Cipher C008 */
1099             {
1100             1,
1101             TLS1_TXT_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,
1102             TLS1_CK_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,
1103             SSL_kECDHE|SSL_aECDSA|SSL_3DES|SSL_SHA|SSL_TLSV1,
1104             SSL_NOT_EXP|SSL_HIGH,
1105             0,
1106             168,
1107             168,
1108             SSL_ALL_CIPHERS,
1109             SSL_ALL_STRENGTHS,
1110             },
1111
1112         /* Cipher C009 */
1113             {
1114             1,
1115             TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
1116             TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
1117             SSL_kECDHE|SSL_aECDSA|SSL_AES|SSL_SHA|SSL_TLSV1,
1118             SSL_NOT_EXP|SSL_HIGH,
1119             0,
1120             128,
1121             128,
1122             SSL_ALL_CIPHERS,
1123             SSL_ALL_STRENGTHS,
1124             },
1125
1126         /* Cipher C00A */
1127             {
1128             1,
1129             TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
1130             TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
1131             SSL_kECDHE|SSL_aECDSA|SSL_AES|SSL_SHA|SSL_TLSV1,
1132             SSL_NOT_EXP|SSL_HIGH,
1133             0,
1134             256,
1135             256,
1136             SSL_ALL_CIPHERS,
1137             SSL_ALL_STRENGTHS,
1138             },
1139
1140         /* Cipher C00B */
1141             {
1142             1,
1143             TLS1_TXT_ECDH_RSA_WITH_NULL_SHA,
1144             TLS1_CK_ECDH_RSA_WITH_NULL_SHA,
1145             SSL_kECDH|SSL_aRSA|SSL_eNULL|SSL_SHA|SSL_TLSV1,
1146             SSL_NOT_EXP,
1147             0,
1148             0,
1149             0,
1150             SSL_ALL_CIPHERS,
1151             SSL_ALL_STRENGTHS,
1152             },
1153
1154         /* Cipher C00C */
1155             {
1156             1,
1157             TLS1_TXT_ECDH_RSA_WITH_RC4_128_SHA,
1158             TLS1_CK_ECDH_RSA_WITH_RC4_128_SHA,
1159             SSL_kECDH|SSL_aRSA|SSL_RC4|SSL_SHA|SSL_TLSV1,
1160             SSL_NOT_EXP,
1161             0,
1162             128,
1163             128,
1164             SSL_ALL_CIPHERS,
1165             SSL_ALL_STRENGTHS,
1166             },
1167
1168         /* Cipher C00D */
1169             {
1170             1,
1171             TLS1_TXT_ECDH_RSA_WITH_DES_192_CBC3_SHA,
1172             TLS1_CK_ECDH_RSA_WITH_DES_192_CBC3_SHA,
1173             SSL_kECDH|SSL_aRSA|SSL_3DES|SSL_SHA|SSL_TLSV1,
1174             SSL_NOT_EXP|SSL_HIGH,
1175             0,
1176             168,
1177             168,
1178             SSL_ALL_CIPHERS,
1179             SSL_ALL_STRENGTHS,
1180             },
1181
1182         /* Cipher C00E */
1183             {
1184             1,
1185             TLS1_TXT_ECDH_RSA_WITH_AES_128_CBC_SHA,
1186             TLS1_CK_ECDH_RSA_WITH_AES_128_CBC_SHA,
1187             SSL_kECDH|SSL_aRSA|SSL_AES|SSL_SHA|SSL_TLSV1,
1188             SSL_NOT_EXP|SSL_HIGH,
1189             0,
1190             128,
1191             128,
1192             SSL_ALL_CIPHERS,
1193             SSL_ALL_STRENGTHS,
1194             },
1195
1196         /* Cipher C00F */
1197             {
1198             1,
1199             TLS1_TXT_ECDH_RSA_WITH_AES_256_CBC_SHA,
1200             TLS1_CK_ECDH_RSA_WITH_AES_256_CBC_SHA,
1201             SSL_kECDH|SSL_aRSA|SSL_AES|SSL_SHA|SSL_TLSV1,
1202             SSL_NOT_EXP|SSL_HIGH,
1203             0,
1204             256,
1205             256,
1206             SSL_ALL_CIPHERS,
1207             SSL_ALL_STRENGTHS,
1208             },
1209
1210         /* Cipher C010 */
1211             {
1212             1,
1213             TLS1_TXT_ECDHE_RSA_WITH_NULL_SHA,
1214             TLS1_CK_ECDHE_RSA_WITH_NULL_SHA,
1215             SSL_kECDHE|SSL_aRSA|SSL_eNULL|SSL_SHA|SSL_TLSV1,
1216             SSL_NOT_EXP,
1217             0,
1218             0,
1219             0,
1220             SSL_ALL_CIPHERS,
1221             SSL_ALL_STRENGTHS,
1222             },
1223
1224         /* Cipher C011 */
1225             {
1226             1,
1227             TLS1_TXT_ECDHE_RSA_WITH_RC4_128_SHA,
1228             TLS1_CK_ECDHE_RSA_WITH_RC4_128_SHA,
1229             SSL_kECDHE|SSL_aRSA|SSL_RC4|SSL_SHA|SSL_TLSV1,
1230             SSL_NOT_EXP,
1231             0,
1232             128,
1233             128,
1234             SSL_ALL_CIPHERS,
1235             SSL_ALL_STRENGTHS,
1236             },
1237
1238         /* Cipher C012 */
1239             {
1240             1,
1241             TLS1_TXT_ECDHE_RSA_WITH_DES_192_CBC3_SHA,
1242             TLS1_CK_ECDHE_RSA_WITH_DES_192_CBC3_SHA,
1243             SSL_kECDHE|SSL_aRSA|SSL_3DES|SSL_SHA|SSL_TLSV1,
1244             SSL_NOT_EXP|SSL_HIGH,
1245             0,
1246             168,
1247             168,
1248             SSL_ALL_CIPHERS,
1249             SSL_ALL_STRENGTHS,
1250             },
1251
1252         /* Cipher C013 */
1253             {
1254             1,
1255             TLS1_TXT_ECDHE_RSA_WITH_AES_128_CBC_SHA,
1256             TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA,
1257             SSL_kECDHE|SSL_aRSA|SSL_AES|SSL_SHA|SSL_TLSV1,
1258             SSL_NOT_EXP|SSL_HIGH,
1259             0,
1260             128,
1261             128,
1262             SSL_ALL_CIPHERS,
1263             SSL_ALL_STRENGTHS,
1264             },
1265
1266         /* Cipher C014 */
1267             {
1268             1,
1269             TLS1_TXT_ECDHE_RSA_WITH_AES_256_CBC_SHA,
1270             TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA,
1271             SSL_kECDHE|SSL_aRSA|SSL_AES|SSL_SHA|SSL_TLSV1,
1272             SSL_NOT_EXP|SSL_HIGH,
1273             0,
1274             256,
1275             256,
1276             SSL_ALL_CIPHERS,
1277             SSL_ALL_STRENGTHS,
1278             },
1279
1280         /* Cipher C015 */
1281             {
1282             1,
1283             TLS1_TXT_ECDH_anon_WITH_NULL_SHA,
1284             TLS1_CK_ECDH_anon_WITH_NULL_SHA,
1285             SSL_kECDHE|SSL_aNULL|SSL_eNULL|SSL_SHA|SSL_TLSV1,
1286             SSL_NOT_EXP,
1287             0,
1288             0,
1289             0,
1290             SSL_ALL_CIPHERS,
1291             SSL_ALL_STRENGTHS,
1292             },
1293
1294         /* Cipher C016 */
1295             {
1296             1,
1297             TLS1_TXT_ECDH_anon_WITH_RC4_128_SHA,
1298             TLS1_CK_ECDH_anon_WITH_RC4_128_SHA,
1299             SSL_kECDHE|SSL_aNULL|SSL_RC4|SSL_SHA|SSL_TLSV1,
1300             SSL_NOT_EXP,
1301             0,
1302             128,
1303             128,
1304             SSL_ALL_CIPHERS,
1305             SSL_ALL_STRENGTHS,
1306             },
1307
1308         /* Cipher C017 */
1309             {
1310             1,
1311             TLS1_TXT_ECDH_anon_WITH_DES_192_CBC3_SHA,
1312             TLS1_CK_ECDH_anon_WITH_DES_192_CBC3_SHA,
1313             SSL_kECDHE|SSL_aNULL|SSL_3DES|SSL_SHA|SSL_TLSV1,
1314             SSL_NOT_EXP|SSL_HIGH,
1315             0,
1316             168,
1317             168,
1318             SSL_ALL_CIPHERS,
1319             SSL_ALL_STRENGTHS,
1320             },
1321
1322         /* Cipher C018 */
1323             {
1324             1,
1325             TLS1_TXT_ECDH_anon_WITH_AES_128_CBC_SHA,
1326             TLS1_CK_ECDH_anon_WITH_AES_128_CBC_SHA,
1327             SSL_kECDHE|SSL_aNULL|SSL_AES|SSL_SHA|SSL_TLSV1,
1328             SSL_NOT_EXP|SSL_HIGH,
1329             0,
1330             128,
1331             128,
1332             SSL_ALL_CIPHERS,
1333             SSL_ALL_STRENGTHS,
1334             },
1335
1336         /* Cipher C019 */
1337             {
1338             1,
1339             TLS1_TXT_ECDH_anon_WITH_AES_256_CBC_SHA,
1340             TLS1_CK_ECDH_anon_WITH_AES_256_CBC_SHA,
1341             SSL_kECDHE|SSL_aNULL|SSL_AES|SSL_SHA|SSL_TLSV1,
1342             SSL_NOT_EXP|SSL_HIGH,
1343             0,
1344             256,
1345             256,
1346             SSL_ALL_CIPHERS,
1347             SSL_ALL_STRENGTHS,
1348             },
1349 #endif  /* OPENSSL_NO_ECDH */
1350
1351 /* end of list */
1352         };
1353
1354 SSL3_ENC_METHOD SSLv3_enc_data={
1355         ssl3_enc,
1356         ssl3_mac,
1357         ssl3_setup_key_block,
1358         ssl3_generate_master_secret,
1359         ssl3_change_cipher_state,
1360         ssl3_final_finish_mac,
1361         MD5_DIGEST_LENGTH+SHA_DIGEST_LENGTH,
1362         ssl3_cert_verify_mac,
1363         SSL3_MD_CLIENT_FINISHED_CONST,4,
1364         SSL3_MD_SERVER_FINISHED_CONST,4,
1365         ssl3_alert_code,
1366         };
1367
1368 long ssl3_default_timeout(void)
1369         {
1370         /* 2 hours, the 24 hours mentioned in the SSLv3 spec
1371          * is way too long for http, the cache would over fill */
1372         return(60*60*2);
1373         }
1374
1375 IMPLEMENT_ssl3_meth_func(sslv3_base_method,
1376                         ssl_undefined_function,
1377                         ssl_undefined_function,
1378                         ssl_bad_method)
1379
1380 int ssl3_num_ciphers(void)
1381         {
1382         return(SSL3_NUM_CIPHERS);
1383         }
1384
1385 SSL_CIPHER *ssl3_get_cipher(unsigned int u)
1386         {
1387         if (u < SSL3_NUM_CIPHERS)
1388                 return(&(ssl3_ciphers[SSL3_NUM_CIPHERS-1-u]));
1389         else
1390                 return(NULL);
1391         }
1392
1393 int ssl3_pending(const SSL *s)
1394         {
1395         if (s->rstate == SSL_ST_READ_BODY)
1396                 return 0;
1397         
1398         return (s->s3->rrec.type == SSL3_RT_APPLICATION_DATA) ? s->s3->rrec.length : 0;
1399         }
1400
1401 int ssl3_new(SSL *s)
1402         {
1403         SSL3_STATE *s3;
1404
1405         if ((s3=OPENSSL_malloc(sizeof *s3)) == NULL) goto err;
1406         memset(s3,0,sizeof *s3);
1407         EVP_MD_CTX_init(&s3->finish_dgst1);
1408         EVP_MD_CTX_init(&s3->finish_dgst2);
1409         pq_64bit_init(&(s3->rrec.seq_num));
1410         pq_64bit_init(&(s3->wrec.seq_num));
1411
1412         s->s3=s3;
1413
1414         s->method->ssl_clear(s);
1415         return(1);
1416 err:
1417         return(0);
1418         }
1419
1420 void ssl3_free(SSL *s)
1421         {
1422         if(s == NULL)
1423             return;
1424
1425         ssl3_cleanup_key_block(s);
1426         if (s->s3->rbuf.buf != NULL)
1427                 OPENSSL_free(s->s3->rbuf.buf);
1428         if (s->s3->wbuf.buf != NULL)
1429                 OPENSSL_free(s->s3->wbuf.buf);
1430         if (s->s3->rrec.comp != NULL)
1431                 OPENSSL_free(s->s3->rrec.comp);
1432 #ifndef OPENSSL_NO_DH
1433         if (s->s3->tmp.dh != NULL)
1434                 DH_free(s->s3->tmp.dh);
1435 #endif
1436 #ifndef OPENSSL_NO_ECDH
1437         if (s->s3->tmp.ecdh != NULL)
1438                 EC_KEY_free(s->s3->tmp.ecdh);
1439 #endif
1440
1441         if (s->s3->tmp.ca_names != NULL)
1442                 sk_X509_NAME_pop_free(s->s3->tmp.ca_names,X509_NAME_free);
1443         EVP_MD_CTX_cleanup(&s->s3->finish_dgst1);
1444         EVP_MD_CTX_cleanup(&s->s3->finish_dgst2);
1445         pq_64bit_free(&(s->s3->rrec.seq_num));
1446         pq_64bit_free(&(s->s3->wrec.seq_num));
1447
1448         OPENSSL_cleanse(s->s3,sizeof *s->s3);
1449         OPENSSL_free(s->s3);
1450         s->s3=NULL;
1451         }
1452
1453 void ssl3_clear(SSL *s)
1454         {
1455         unsigned char *rp,*wp;
1456         size_t rlen, wlen;
1457
1458         ssl3_cleanup_key_block(s);
1459         if (s->s3->tmp.ca_names != NULL)
1460                 sk_X509_NAME_pop_free(s->s3->tmp.ca_names,X509_NAME_free);
1461
1462         if (s->s3->rrec.comp != NULL)
1463                 {
1464                 OPENSSL_free(s->s3->rrec.comp);
1465                 s->s3->rrec.comp=NULL;
1466                 }
1467 #ifndef OPENSSL_NO_DH
1468         if (s->s3->tmp.dh != NULL)
1469                 DH_free(s->s3->tmp.dh);
1470 #endif
1471 #ifndef OPENSSL_NO_ECDH
1472         if (s->s3->tmp.ecdh != NULL)
1473                 EC_KEY_free(s->s3->tmp.ecdh);
1474 #endif
1475
1476         rp = s->s3->rbuf.buf;
1477         wp = s->s3->wbuf.buf;
1478         rlen = s->s3->rbuf.len;
1479         wlen = s->s3->wbuf.len;
1480
1481         EVP_MD_CTX_cleanup(&s->s3->finish_dgst1);
1482         EVP_MD_CTX_cleanup(&s->s3->finish_dgst2);
1483
1484         memset(s->s3,0,sizeof *s->s3);
1485         s->s3->rbuf.buf = rp;
1486         s->s3->wbuf.buf = wp;
1487         s->s3->rbuf.len = rlen;
1488         s->s3->wbuf.len = wlen;
1489
1490         ssl_free_wbio_buffer(s);
1491
1492         s->packet_length=0;
1493         s->s3->renegotiate=0;
1494         s->s3->total_renegotiations=0;
1495         s->s3->num_renegotiations=0;
1496         s->s3->in_read_app_data=0;
1497         s->version=SSL3_VERSION;
1498         }
1499
1500 long ssl3_ctrl(SSL *s, int cmd, long larg, void *parg)
1501         {
1502         int ret=0;
1503
1504 #if !defined(OPENSSL_NO_DSA) || !defined(OPENSSL_NO_RSA)
1505         if (
1506 #ifndef OPENSSL_NO_RSA
1507             cmd == SSL_CTRL_SET_TMP_RSA ||
1508             cmd == SSL_CTRL_SET_TMP_RSA_CB ||
1509 #endif
1510 #ifndef OPENSSL_NO_DSA
1511             cmd == SSL_CTRL_SET_TMP_DH ||
1512             cmd == SSL_CTRL_SET_TMP_DH_CB ||
1513 #endif
1514                 0)
1515                 {
1516                 if (!ssl_cert_inst(&s->cert))
1517                         {
1518                         SSLerr(SSL_F_SSL3_CTRL, ERR_R_MALLOC_FAILURE);
1519                         return(0);
1520                         }
1521                 }
1522 #endif
1523
1524         switch (cmd)
1525                 {
1526         case SSL_CTRL_GET_SESSION_REUSED:
1527                 ret=s->hit;
1528                 break;
1529         case SSL_CTRL_GET_CLIENT_CERT_REQUEST:
1530                 break;
1531         case SSL_CTRL_GET_NUM_RENEGOTIATIONS:
1532                 ret=s->s3->num_renegotiations;
1533                 break;
1534         case SSL_CTRL_CLEAR_NUM_RENEGOTIATIONS:
1535                 ret=s->s3->num_renegotiations;
1536                 s->s3->num_renegotiations=0;
1537                 break;
1538         case SSL_CTRL_GET_TOTAL_RENEGOTIATIONS:
1539                 ret=s->s3->total_renegotiations;
1540                 break;
1541         case SSL_CTRL_GET_FLAGS:
1542                 ret=(int)(s->s3->flags);
1543                 break;
1544 #ifndef OPENSSL_NO_RSA
1545         case SSL_CTRL_NEED_TMP_RSA:
1546                 if ((s->cert != NULL) && (s->cert->rsa_tmp == NULL) &&
1547                     ((s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) ||
1548                      (EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512/8))))
1549                         ret = 1;
1550                 break;
1551         case SSL_CTRL_SET_TMP_RSA:
1552                 {
1553                         RSA *rsa = (RSA *)parg;
1554                         if (rsa == NULL)
1555                                 {
1556                                 SSLerr(SSL_F_SSL3_CTRL, ERR_R_PASSED_NULL_PARAMETER);
1557                                 return(ret);
1558                                 }
1559                         if ((rsa = RSAPrivateKey_dup(rsa)) == NULL)
1560                                 {
1561                                 SSLerr(SSL_F_SSL3_CTRL, ERR_R_RSA_LIB);
1562                                 return(ret);
1563                                 }
1564                         if (s->cert->rsa_tmp != NULL)
1565                                 RSA_free(s->cert->rsa_tmp);
1566                         s->cert->rsa_tmp = rsa;
1567                         ret = 1;
1568                 }
1569                 break;
1570         case SSL_CTRL_SET_TMP_RSA_CB:
1571                 {
1572                 SSLerr(SSL_F_SSL3_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
1573                 return(ret);
1574                 }
1575                 break;
1576 #endif
1577 #ifndef OPENSSL_NO_DH
1578         case SSL_CTRL_SET_TMP_DH:
1579                 {
1580                         DH *dh = (DH *)parg;
1581                         if (dh == NULL)
1582                                 {
1583                                 SSLerr(SSL_F_SSL3_CTRL, ERR_R_PASSED_NULL_PARAMETER);
1584                                 return(ret);
1585                                 }
1586                         if ((dh = DHparams_dup(dh)) == NULL)
1587                                 {
1588                                 SSLerr(SSL_F_SSL3_CTRL, ERR_R_DH_LIB);
1589                                 return(ret);
1590                                 }
1591                         if (!(s->options & SSL_OP_SINGLE_DH_USE))
1592                                 {
1593                                 if (!DH_generate_key(dh))
1594                                         {
1595                                         DH_free(dh);
1596                                         SSLerr(SSL_F_SSL3_CTRL, ERR_R_DH_LIB);
1597                                         return(ret);
1598                                         }
1599                                 }
1600                         if (s->cert->dh_tmp != NULL)
1601                                 DH_free(s->cert->dh_tmp);
1602                         s->cert->dh_tmp = dh;
1603                         ret = 1;
1604                 }
1605                 break;
1606         case SSL_CTRL_SET_TMP_DH_CB:
1607                 {
1608                 SSLerr(SSL_F_SSL3_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
1609                 return(ret);
1610                 }
1611                 break;
1612 #endif
1613 #ifndef OPENSSL_NO_ECDH
1614         case SSL_CTRL_SET_TMP_ECDH:
1615                 {
1616                 EC_KEY *ecdh = NULL;
1617                         
1618                 if (parg == NULL)
1619                         {
1620                         SSLerr(SSL_F_SSL3_CTRL, ERR_R_PASSED_NULL_PARAMETER);
1621                         return(ret);
1622                         }
1623                 if (!EC_KEY_up_ref((EC_KEY *)parg))
1624                         {
1625                         SSLerr(SSL_F_SSL3_CTRL,ERR_R_ECDH_LIB);
1626                         return(ret);
1627                         }
1628                 ecdh = (EC_KEY *)parg;
1629                 if (!(s->options & SSL_OP_SINGLE_ECDH_USE))
1630                         {
1631                         if (!EC_KEY_generate_key(ecdh))
1632                                 {
1633                                 EC_KEY_free(ecdh);
1634                                 SSLerr(SSL_F_SSL3_CTRL,ERR_R_ECDH_LIB);
1635                                 return(ret);
1636                                 }
1637                         }
1638                 if (s->cert->ecdh_tmp != NULL)
1639                         EC_KEY_free(s->cert->ecdh_tmp);
1640                 s->cert->ecdh_tmp = ecdh;
1641                 ret = 1;
1642                 }
1643                 break;
1644         case SSL_CTRL_SET_TMP_ECDH_CB:
1645                 {
1646                 SSLerr(SSL_F_SSL3_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
1647                 return(ret);
1648                 }
1649                 break;
1650 #endif /* !OPENSSL_NO_ECDH */
1651         default:
1652                 break;
1653                 }
1654         return(ret);
1655         }
1656
1657 long ssl3_callback_ctrl(SSL *s, int cmd, void (*fp)(void))
1658         {
1659         int ret=0;
1660
1661 #if !defined(OPENSSL_NO_DSA) || !defined(OPENSSL_NO_RSA)
1662         if (
1663 #ifndef OPENSSL_NO_RSA
1664             cmd == SSL_CTRL_SET_TMP_RSA_CB ||
1665 #endif
1666 #ifndef OPENSSL_NO_DSA
1667             cmd == SSL_CTRL_SET_TMP_DH_CB ||
1668 #endif
1669                 0)
1670                 {
1671                 if (!ssl_cert_inst(&s->cert))
1672                         {
1673                         SSLerr(SSL_F_SSL3_CALLBACK_CTRL, ERR_R_MALLOC_FAILURE);
1674                         return(0);
1675                         }
1676                 }
1677 #endif
1678
1679         switch (cmd)
1680                 {
1681 #ifndef OPENSSL_NO_RSA
1682         case SSL_CTRL_SET_TMP_RSA_CB:
1683                 {
1684                 s->cert->rsa_tmp_cb = (RSA *(*)(SSL *, int, int))fp;
1685                 }
1686                 break;
1687 #endif
1688 #ifndef OPENSSL_NO_DH
1689         case SSL_CTRL_SET_TMP_DH_CB:
1690                 {
1691                 s->cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))fp;
1692                 }
1693                 break;
1694 #endif
1695 #ifndef OPENSSL_NO_ECDH
1696         case SSL_CTRL_SET_TMP_ECDH_CB:
1697                 {
1698                 s->cert->ecdh_tmp_cb = (EC_KEY *(*)(SSL *, int, int))fp;
1699                 }
1700                 break;
1701 #endif
1702         default:
1703                 break;
1704                 }
1705         return(ret);
1706         }
1707
1708 long ssl3_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg)
1709         {
1710         CERT *cert;
1711
1712         cert=ctx->cert;
1713
1714         switch (cmd)
1715                 {
1716 #ifndef OPENSSL_NO_RSA
1717         case SSL_CTRL_NEED_TMP_RSA:
1718                 if (    (cert->rsa_tmp == NULL) &&
1719                         ((cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) ||
1720                          (EVP_PKEY_size(cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512/8)))
1721                         )
1722                         return(1);
1723                 else
1724                         return(0);
1725                 /* break; */
1726         case SSL_CTRL_SET_TMP_RSA:
1727                 {
1728                 RSA *rsa;
1729                 int i;
1730
1731                 rsa=(RSA *)parg;
1732                 i=1;
1733                 if (rsa == NULL)
1734                         i=0;
1735                 else
1736                         {
1737                         if ((rsa=RSAPrivateKey_dup(rsa)) == NULL)
1738                                 i=0;
1739                         }
1740                 if (!i)
1741                         {
1742                         SSLerr(SSL_F_SSL3_CTX_CTRL,ERR_R_RSA_LIB);
1743                         return(0);
1744                         }
1745                 else
1746                         {
1747                         if (cert->rsa_tmp != NULL)
1748                                 RSA_free(cert->rsa_tmp);
1749                         cert->rsa_tmp=rsa;
1750                         return(1);
1751                         }
1752                 }
1753                 /* break; */
1754         case SSL_CTRL_SET_TMP_RSA_CB:
1755                 {
1756                 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
1757                 return(0);
1758                 }
1759                 break;
1760 #endif
1761 #ifndef OPENSSL_NO_DH
1762         case SSL_CTRL_SET_TMP_DH:
1763                 {
1764                 DH *new=NULL,*dh;
1765
1766                 dh=(DH *)parg;
1767                 if ((new=DHparams_dup(dh)) == NULL)
1768                         {
1769                         SSLerr(SSL_F_SSL3_CTX_CTRL,ERR_R_DH_LIB);
1770                         return 0;
1771                         }
1772                 if (!(ctx->options & SSL_OP_SINGLE_DH_USE))
1773                         {
1774                         if (!DH_generate_key(new))
1775                                 {
1776                                 SSLerr(SSL_F_SSL3_CTX_CTRL,ERR_R_DH_LIB);
1777                                 DH_free(new);
1778                                 return 0;
1779                                 }
1780                         }
1781                 if (cert->dh_tmp != NULL)
1782                         DH_free(cert->dh_tmp);
1783                 cert->dh_tmp=new;
1784                 return 1;
1785                 }
1786                 /*break; */
1787         case SSL_CTRL_SET_TMP_DH_CB:
1788                 {
1789                 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
1790                 return(0);
1791                 }
1792                 break;
1793 #endif
1794 #ifndef OPENSSL_NO_ECDH
1795         case SSL_CTRL_SET_TMP_ECDH:
1796                 {
1797                 EC_KEY *ecdh = NULL;
1798                         
1799                 if (parg == NULL)
1800                         {
1801                         SSLerr(SSL_F_SSL3_CTX_CTRL,ERR_R_ECDH_LIB);
1802                         return 0;
1803                         }
1804                 ecdh = EC_KEY_dup((EC_KEY *)parg);
1805                 if (ecdh == NULL)
1806                         {
1807                         SSLerr(SSL_F_SSL3_CTX_CTRL,ERR_R_EC_LIB);
1808                         return 0;
1809                         }
1810                 if (!(ctx->options & SSL_OP_SINGLE_ECDH_USE))
1811                         {
1812                         if (!EC_KEY_generate_key(ecdh))
1813                                 {
1814                                 EC_KEY_free(ecdh);
1815                                 SSLerr(SSL_F_SSL3_CTX_CTRL,ERR_R_ECDH_LIB);
1816                                 return 0;
1817                                 }
1818                         }
1819
1820                 if (cert->ecdh_tmp != NULL)
1821                         {
1822                         EC_KEY_free(cert->ecdh_tmp);
1823                         }
1824                 cert->ecdh_tmp = ecdh;
1825                 return 1;
1826                 }
1827                 /* break; */
1828         case SSL_CTRL_SET_TMP_ECDH_CB:
1829                 {
1830                 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
1831                 return(0);
1832                 }
1833                 break;
1834 #endif /* !OPENSSL_NO_ECDH */
1835         /* A Thawte special :-) */
1836         case SSL_CTRL_EXTRA_CHAIN_CERT:
1837                 if (ctx->extra_certs == NULL)
1838                         {
1839                         if ((ctx->extra_certs=sk_X509_new_null()) == NULL)
1840                                 return(0);
1841                         }
1842                 sk_X509_push(ctx->extra_certs,(X509 *)parg);
1843                 break;
1844
1845         default:
1846                 return(0);
1847                 }
1848         return(1);
1849         }
1850
1851 long ssl3_ctx_callback_ctrl(SSL_CTX *ctx, int cmd, void (*fp)(void))
1852         {
1853         CERT *cert;
1854
1855         cert=ctx->cert;
1856
1857         switch (cmd)
1858                 {
1859 #ifndef OPENSSL_NO_RSA
1860         case SSL_CTRL_SET_TMP_RSA_CB:
1861                 {
1862                 cert->rsa_tmp_cb = (RSA *(*)(SSL *, int, int))fp;
1863                 }
1864                 break;
1865 #endif
1866 #ifndef OPENSSL_NO_DH
1867         case SSL_CTRL_SET_TMP_DH_CB:
1868                 {
1869                 cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))fp;
1870                 }
1871                 break;
1872 #endif
1873 #ifndef OPENSSL_NO_ECDH
1874         case SSL_CTRL_SET_TMP_ECDH_CB:
1875                 {
1876                 cert->ecdh_tmp_cb = (EC_KEY *(*)(SSL *, int, int))fp;
1877                 }
1878                 break;
1879 #endif
1880         default:
1881                 return(0);
1882                 }
1883         return(1);
1884         }
1885
1886 /* This function needs to check if the ciphers required are actually
1887  * available */
1888 SSL_CIPHER *ssl3_get_cipher_by_char(const unsigned char *p)
1889         {
1890         SSL_CIPHER c,*cp;
1891         unsigned long id;
1892
1893         id=0x03000000L|((unsigned long)p[0]<<8L)|(unsigned long)p[1];
1894         c.id=id;
1895         cp = (SSL_CIPHER *)OBJ_bsearch((char *)&c,
1896                 (char *)ssl3_ciphers,
1897                 SSL3_NUM_CIPHERS,sizeof(SSL_CIPHER),
1898                 FP_ICC ssl_cipher_id_cmp);
1899         if (cp == NULL || cp->valid == 0)
1900                 return NULL;
1901         else
1902                 return cp;
1903         }
1904
1905 int ssl3_put_cipher_by_char(const SSL_CIPHER *c, unsigned char *p)
1906         {
1907         long l;
1908
1909         if (p != NULL)
1910                 {
1911                 l=c->id;
1912                 if ((l & 0xff000000) != 0x03000000) return(0);
1913                 p[0]=((unsigned char)(l>> 8L))&0xFF;
1914                 p[1]=((unsigned char)(l     ))&0xFF;
1915                 }
1916         return(2);
1917         }
1918
1919 SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt,
1920              STACK_OF(SSL_CIPHER) *srvr)
1921         {
1922         SSL_CIPHER *c,*ret=NULL;
1923         STACK_OF(SSL_CIPHER) *prio, *allow;
1924         int i,j,ok;
1925         CERT *cert;
1926         unsigned long alg,mask,emask;
1927
1928         /* Let's see which ciphers we can support */
1929         cert=s->cert;
1930
1931 #if 0
1932         /* Do not set the compare functions, because this may lead to a
1933          * reordering by "id". We want to keep the original ordering.
1934          * We may pay a price in performance during sk_SSL_CIPHER_find(),
1935          * but would have to pay with the price of sk_SSL_CIPHER_dup().
1936          */
1937         sk_SSL_CIPHER_set_cmp_func(srvr, ssl_cipher_ptr_id_cmp);
1938         sk_SSL_CIPHER_set_cmp_func(clnt, ssl_cipher_ptr_id_cmp);
1939 #endif
1940
1941 #ifdef CIPHER_DEBUG
1942         printf("Server has %d from %p:\n", sk_SSL_CIPHER_num(srvr), srvr);
1943         for(i=0 ; i < sk_SSL_CIPHER_num(srvr) ; ++i)
1944             {
1945             c=sk_SSL_CIPHER_value(srvr,i);
1946             printf("%p:%s\n",c,c->name);
1947             }
1948         printf("Client sent %d from %p:\n", sk_SSL_CIPHER_num(clnt), clnt);
1949         for(i=0 ; i < sk_SSL_CIPHER_num(clnt) ; ++i)
1950             {
1951             c=sk_SSL_CIPHER_value(clnt,i);
1952             printf("%p:%s\n",c,c->name);
1953             }
1954 #endif
1955
1956         if (s->options & SSL_OP_CIPHER_SERVER_PREFERENCE)
1957             {
1958             prio = srvr;
1959             allow = clnt;
1960             }
1961         else
1962             {
1963             prio = clnt;
1964             allow = srvr;
1965             }
1966
1967         for (i=0; i<sk_SSL_CIPHER_num(prio); i++)
1968                 {
1969                 c=sk_SSL_CIPHER_value(prio,i);
1970
1971                 ssl_set_cert_masks(cert,c);
1972                 mask=cert->mask;
1973                 emask=cert->export_mask;
1974                         
1975 #ifdef KSSL_DEBUG
1976                 printf("ssl3_choose_cipher %d alg= %lx\n", i,c->algorithms);
1977 #endif    /* KSSL_DEBUG */
1978
1979                 alg=c->algorithms&(SSL_MKEY_MASK|SSL_AUTH_MASK);
1980 #ifndef OPENSSL_NO_KRB5
1981                 if (alg & SSL_KRB5) 
1982                         {
1983                         if ( !kssl_keytab_is_available(s->kssl_ctx) )
1984                             continue;
1985                         }
1986 #endif /* OPENSSL_NO_KRB5 */
1987                 if (SSL_C_IS_EXPORT(c))
1988                         {
1989                         ok=((alg & emask) == alg)?1:0;
1990 #ifdef CIPHER_DEBUG
1991                         printf("%d:[%08lX:%08lX]%p:%s (export)\n",ok,alg,emask,
1992                                c,c->name);
1993 #endif
1994                         }
1995                 else
1996                         {
1997                         ok=((alg & mask) == alg)?1:0;
1998 #ifdef CIPHER_DEBUG
1999                         printf("%d:[%08lX:%08lX]%p:%s\n",ok,alg,mask,c,
2000                                c->name);
2001 #endif
2002                         }
2003
2004                 if (!ok) continue;
2005                 j=sk_SSL_CIPHER_find(allow,c);
2006                 if (j >= 0)
2007                         {
2008                         ret=sk_SSL_CIPHER_value(allow,j);
2009                         break;
2010                         }
2011                 }
2012         return(ret);
2013         }
2014
2015 int ssl3_get_req_cert_type(SSL *s, unsigned char *p)
2016         {
2017         int ret=0;
2018         unsigned long alg;
2019
2020         alg=s->s3->tmp.new_cipher->algorithms;
2021
2022 #ifndef OPENSSL_NO_DH
2023         if (alg & (SSL_kDHr|SSL_kEDH))
2024                 {
2025 #  ifndef OPENSSL_NO_RSA
2026                 p[ret++]=SSL3_CT_RSA_FIXED_DH;
2027 #  endif
2028 #  ifndef OPENSSL_NO_DSA
2029                 p[ret++]=SSL3_CT_DSS_FIXED_DH;
2030 #  endif
2031                 }
2032         if ((s->version == SSL3_VERSION) &&
2033                 (alg & (SSL_kEDH|SSL_kDHd|SSL_kDHr)))
2034                 {
2035 #  ifndef OPENSSL_NO_RSA
2036                 p[ret++]=SSL3_CT_RSA_EPHEMERAL_DH;
2037 #  endif
2038 #  ifndef OPENSSL_NO_DSA
2039                 p[ret++]=SSL3_CT_DSS_EPHEMERAL_DH;
2040 #  endif
2041                 }
2042 #endif /* !OPENSSL_NO_DH */
2043 #ifndef OPENSSL_NO_RSA
2044         p[ret++]=SSL3_CT_RSA_SIGN;
2045 #endif
2046 #ifndef OPENSSL_NO_DSA
2047         p[ret++]=SSL3_CT_DSS_SIGN;
2048 #endif
2049 #ifndef OPENSSL_NO_ECDH
2050         /* We should ask for fixed ECDH certificates only
2051          * for SSL_kECDH (and not SSL_kECDHE)
2052          */
2053         if ((alg & SSL_kECDH) && (s->version >= TLS1_VERSION))
2054                 {
2055                 p[ret++]=TLS_CT_RSA_FIXED_ECDH;
2056                 p[ret++]=TLS_CT_ECDSA_FIXED_ECDH;
2057                 }
2058 #endif
2059
2060 #ifndef OPENSSL_NO_ECDSA
2061         /* ECDSA certs can be used with RSA cipher suites as well 
2062          * so we don't need to check for SSL_kECDH or SSL_kECDHE
2063          */
2064         if (s->version >= TLS1_VERSION)
2065                 {
2066                 p[ret++]=TLS_CT_ECDSA_SIGN;
2067                 }
2068 #endif  
2069         return(ret);
2070         }
2071
2072 int ssl3_shutdown(SSL *s)
2073         {
2074
2075         /* Don't do anything much if we have not done the handshake or
2076          * we don't want to send messages :-) */
2077         if ((s->quiet_shutdown) || (s->state == SSL_ST_BEFORE))
2078                 {
2079                 s->shutdown=(SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN);
2080                 return(1);
2081                 }
2082
2083         if (!(s->shutdown & SSL_SENT_SHUTDOWN))
2084                 {
2085                 s->shutdown|=SSL_SENT_SHUTDOWN;
2086 #if 1
2087                 ssl3_send_alert(s,SSL3_AL_WARNING,SSL_AD_CLOSE_NOTIFY);
2088 #endif
2089                 /* our shutdown alert has been sent now, and if it still needs
2090                  * to be written, s->s3->alert_dispatch will be true */
2091                 }
2092         else if (s->s3->alert_dispatch)
2093                 {
2094                 /* resend it if not sent */
2095 #if 1
2096                 s->method->ssl_dispatch_alert(s);
2097 #endif
2098                 }
2099         else if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN))
2100                 {
2101                 /* If we are waiting for a close from our peer, we are closed */
2102                 s->method->ssl_read_bytes(s,0,NULL,0,0);
2103                 }
2104
2105         if ((s->shutdown == (SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN)) &&
2106                 !s->s3->alert_dispatch)
2107                 return(1);
2108         else
2109                 return(0);
2110         }
2111
2112 int ssl3_write(SSL *s, const void *buf, int len)
2113         {
2114         int ret,n;
2115
2116 #if 0
2117         if (s->shutdown & SSL_SEND_SHUTDOWN)
2118                 {
2119                 s->rwstate=SSL_NOTHING;
2120                 return(0);
2121                 }
2122 #endif
2123         clear_sys_error();
2124         if (s->s3->renegotiate) ssl3_renegotiate_check(s);
2125
2126         /* This is an experimental flag that sends the
2127          * last handshake message in the same packet as the first
2128          * use data - used to see if it helps the TCP protocol during
2129          * session-id reuse */
2130         /* The second test is because the buffer may have been removed */
2131         if ((s->s3->flags & SSL3_FLAGS_POP_BUFFER) && (s->wbio == s->bbio))
2132                 {
2133                 /* First time through, we write into the buffer */
2134                 if (s->s3->delay_buf_pop_ret == 0)
2135                         {
2136                         ret=ssl3_write_bytes(s,SSL3_RT_APPLICATION_DATA,
2137                                              buf,len);
2138                         if (ret <= 0) return(ret);
2139
2140                         s->s3->delay_buf_pop_ret=ret;
2141                         }
2142
2143                 s->rwstate=SSL_WRITING;
2144                 n=BIO_flush(s->wbio);
2145                 if (n <= 0) return(n);
2146                 s->rwstate=SSL_NOTHING;
2147
2148                 /* We have flushed the buffer, so remove it */
2149                 ssl_free_wbio_buffer(s);
2150                 s->s3->flags&= ~SSL3_FLAGS_POP_BUFFER;
2151
2152                 ret=s->s3->delay_buf_pop_ret;
2153                 s->s3->delay_buf_pop_ret=0;
2154                 }
2155         else
2156                 {
2157                 ret=s->method->ssl_write_bytes(s,SSL3_RT_APPLICATION_DATA,
2158                         buf,len);
2159                 if (ret <= 0) return(ret);
2160                 }
2161
2162         return(ret);
2163         }
2164
2165 static int ssl3_read_internal(SSL *s, void *buf, int len, int peek)
2166         {
2167         int ret;
2168         
2169         clear_sys_error();
2170         if (s->s3->renegotiate) ssl3_renegotiate_check(s);
2171         s->s3->in_read_app_data=1;
2172         ret=s->method->ssl_read_bytes(s,SSL3_RT_APPLICATION_DATA,buf,len,peek);
2173         if ((ret == -1) && (s->s3->in_read_app_data == 2))
2174                 {
2175                 /* ssl3_read_bytes decided to call s->handshake_func, which
2176                  * called ssl3_read_bytes to read handshake data.
2177                  * However, ssl3_read_bytes actually found application data
2178                  * and thinks that application data makes sense here; so disable
2179                  * handshake processing and try to read application data again. */
2180                 s->in_handshake++;
2181                 ret=s->method->ssl_read_bytes(s,SSL3_RT_APPLICATION_DATA,buf,len,peek);
2182                 s->in_handshake--;
2183                 }
2184         else
2185                 s->s3->in_read_app_data=0;
2186
2187         return(ret);
2188         }
2189
2190 int ssl3_read(SSL *s, void *buf, int len)
2191         {
2192         return ssl3_read_internal(s, buf, len, 0);
2193         }
2194
2195 int ssl3_peek(SSL *s, void *buf, int len)
2196         {
2197         return ssl3_read_internal(s, buf, len, 1);
2198         }
2199
2200 int ssl3_renegotiate(SSL *s)
2201         {
2202         if (s->handshake_func == NULL)
2203                 return(1);
2204
2205         if (s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS)
2206                 return(0);
2207
2208         s->s3->renegotiate=1;
2209         return(1);
2210         }
2211
2212 int ssl3_renegotiate_check(SSL *s)
2213         {
2214         int ret=0;
2215
2216         if (s->s3->renegotiate)
2217                 {
2218                 if (    (s->s3->rbuf.left == 0) &&
2219                         (s->s3->wbuf.left == 0) &&
2220                         !SSL_in_init(s))
2221                         {
2222 /*
2223 if we are the server, and we have sent a 'RENEGOTIATE' message, we
2224 need to go to SSL_ST_ACCEPT.
2225 */
2226                         /* SSL_ST_ACCEPT */
2227                         s->state=SSL_ST_RENEGOTIATE;
2228                         s->s3->renegotiate=0;
2229                         s->s3->num_renegotiations++;
2230                         s->s3->total_renegotiations++;
2231                         ret=1;
2232                         }
2233                 }
2234         return(ret);
2235         }
2236