2 * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
10 /* ====================================================================
11 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
13 * Portions of the attached software ("Contribution") are developed by
14 * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
16 * The Contribution is licensed pursuant to the OpenSSL open source
17 * license provided above.
19 * ECC cipher suite support in OpenSSL originally written by
20 * Vipul Gupta and Sumit Gupta of Sun Microsystems Laboratories.
23 /* ====================================================================
24 * Copyright 2005 Nokia. All rights reserved.
26 * The portions of the attached software ("Contribution") is developed by
27 * Nokia Corporation and is licensed pursuant to the OpenSSL open source
30 * The Contribution, originally written by Mika Kousa and Pasi Eronen of
31 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
32 * support (see RFC 4279) to OpenSSL.
34 * No patent licenses or other rights except those expressly stated in
35 * the OpenSSL open source license shall be deemed granted or received
36 * expressly, by implication, estoppel, or otherwise.
38 * No assurances are provided by Nokia that the Contribution does not
39 * infringe the patent or other intellectual property rights of any third
40 * party or that the license provides you with all the necessary rights
41 * to make use of the Contribution.
43 * THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN
44 * ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA
45 * SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY
46 * OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR
51 #include <openssl/objects.h>
53 #include <openssl/md5.h>
54 #include <openssl/dh.h>
55 #include <openssl/rand.h>
57 #define SSL3_NUM_CIPHERS OSSL_NELEM(ssl3_ciphers)
60 * The list of available ciphers, mostly organized into the following
65 * SRP (within that: RSA EC PSK)
66 * Cipher families: Chacha/poly, Camellila, Gost, IDEA, SEED
69 static SSL_CIPHER ssl3_ciphers[] = {
72 SSL3_TXT_RSA_NULL_MD5,
78 SSL3_VERSION, TLS1_2_VERSION,
79 DTLS1_BAD_VER, DTLS1_2_VERSION,
81 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
87 SSL3_TXT_RSA_NULL_SHA,
93 SSL3_VERSION, TLS1_2_VERSION,
94 DTLS1_BAD_VER, DTLS1_2_VERSION,
95 SSL_STRONG_NONE | SSL_FIPS,
96 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
100 #ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
103 SSL3_TXT_RSA_DES_192_CBC3_SHA,
104 SSL3_CK_RSA_DES_192_CBC3_SHA,
109 SSL3_VERSION, TLS1_2_VERSION,
110 DTLS1_BAD_VER, DTLS1_2_VERSION,
111 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
112 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
118 SSL3_TXT_DHE_DSS_DES_192_CBC3_SHA,
119 SSL3_CK_DHE_DSS_DES_192_CBC3_SHA,
124 SSL3_VERSION, TLS1_2_VERSION,
125 DTLS1_BAD_VER, DTLS1_2_VERSION,
126 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
127 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
133 SSL3_TXT_DHE_RSA_DES_192_CBC3_SHA,
134 SSL3_CK_DHE_RSA_DES_192_CBC3_SHA,
139 SSL3_VERSION, TLS1_2_VERSION,
140 DTLS1_BAD_VER, DTLS1_2_VERSION,
141 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
142 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
148 SSL3_TXT_ADH_DES_192_CBC_SHA,
149 SSL3_CK_ADH_DES_192_CBC_SHA,
154 SSL3_VERSION, TLS1_2_VERSION,
155 DTLS1_BAD_VER, DTLS1_2_VERSION,
156 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
157 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
164 TLS1_TXT_RSA_WITH_AES_128_SHA,
165 TLS1_CK_RSA_WITH_AES_128_SHA,
170 SSL3_VERSION, TLS1_2_VERSION,
171 DTLS1_BAD_VER, DTLS1_2_VERSION,
173 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
179 TLS1_TXT_DHE_DSS_WITH_AES_128_SHA,
180 TLS1_CK_DHE_DSS_WITH_AES_128_SHA,
185 SSL3_VERSION, TLS1_2_VERSION,
186 DTLS1_BAD_VER, DTLS1_2_VERSION,
187 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
188 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
194 TLS1_TXT_DHE_RSA_WITH_AES_128_SHA,
195 TLS1_CK_DHE_RSA_WITH_AES_128_SHA,
200 SSL3_VERSION, TLS1_2_VERSION,
201 DTLS1_BAD_VER, DTLS1_2_VERSION,
203 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
209 TLS1_TXT_ADH_WITH_AES_128_SHA,
210 TLS1_CK_ADH_WITH_AES_128_SHA,
215 SSL3_VERSION, TLS1_2_VERSION,
216 DTLS1_BAD_VER, DTLS1_2_VERSION,
217 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
218 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
224 TLS1_TXT_RSA_WITH_AES_256_SHA,
225 TLS1_CK_RSA_WITH_AES_256_SHA,
230 SSL3_VERSION, TLS1_2_VERSION,
231 DTLS1_BAD_VER, DTLS1_2_VERSION,
233 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
239 TLS1_TXT_DHE_DSS_WITH_AES_256_SHA,
240 TLS1_CK_DHE_DSS_WITH_AES_256_SHA,
245 SSL3_VERSION, TLS1_2_VERSION,
246 DTLS1_BAD_VER, DTLS1_2_VERSION,
247 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
248 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
254 TLS1_TXT_DHE_RSA_WITH_AES_256_SHA,
255 TLS1_CK_DHE_RSA_WITH_AES_256_SHA,
260 SSL3_VERSION, TLS1_2_VERSION,
261 DTLS1_BAD_VER, DTLS1_2_VERSION,
263 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
269 TLS1_TXT_ADH_WITH_AES_256_SHA,
270 TLS1_CK_ADH_WITH_AES_256_SHA,
275 SSL3_VERSION, TLS1_2_VERSION,
276 DTLS1_BAD_VER, DTLS1_2_VERSION,
277 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
278 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
284 TLS1_TXT_RSA_WITH_NULL_SHA256,
285 TLS1_CK_RSA_WITH_NULL_SHA256,
290 TLS1_2_VERSION, TLS1_2_VERSION,
291 DTLS1_2_VERSION, DTLS1_2_VERSION,
292 SSL_STRONG_NONE | SSL_FIPS,
293 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
299 TLS1_TXT_RSA_WITH_AES_128_SHA256,
300 TLS1_CK_RSA_WITH_AES_128_SHA256,
305 TLS1_2_VERSION, TLS1_2_VERSION,
306 DTLS1_2_VERSION, DTLS1_2_VERSION,
308 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
314 TLS1_TXT_RSA_WITH_AES_256_SHA256,
315 TLS1_CK_RSA_WITH_AES_256_SHA256,
320 TLS1_2_VERSION, TLS1_2_VERSION,
321 DTLS1_2_VERSION, DTLS1_2_VERSION,
323 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
329 TLS1_TXT_DHE_DSS_WITH_AES_128_SHA256,
330 TLS1_CK_DHE_DSS_WITH_AES_128_SHA256,
335 TLS1_2_VERSION, TLS1_2_VERSION,
336 DTLS1_2_VERSION, DTLS1_2_VERSION,
337 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
338 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
344 TLS1_TXT_DHE_RSA_WITH_AES_128_SHA256,
345 TLS1_CK_DHE_RSA_WITH_AES_128_SHA256,
350 TLS1_2_VERSION, TLS1_2_VERSION,
351 DTLS1_2_VERSION, DTLS1_2_VERSION,
353 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
359 TLS1_TXT_DHE_DSS_WITH_AES_256_SHA256,
360 TLS1_CK_DHE_DSS_WITH_AES_256_SHA256,
365 TLS1_2_VERSION, TLS1_2_VERSION,
366 DTLS1_2_VERSION, DTLS1_2_VERSION,
367 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
368 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
374 TLS1_TXT_DHE_RSA_WITH_AES_256_SHA256,
375 TLS1_CK_DHE_RSA_WITH_AES_256_SHA256,
380 TLS1_2_VERSION, TLS1_2_VERSION,
381 DTLS1_2_VERSION, DTLS1_2_VERSION,
383 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
389 TLS1_TXT_ADH_WITH_AES_128_SHA256,
390 TLS1_CK_ADH_WITH_AES_128_SHA256,
395 TLS1_2_VERSION, TLS1_2_VERSION,
396 DTLS1_2_VERSION, DTLS1_2_VERSION,
397 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
398 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
404 TLS1_TXT_ADH_WITH_AES_256_SHA256,
405 TLS1_CK_ADH_WITH_AES_256_SHA256,
410 TLS1_2_VERSION, TLS1_2_VERSION,
411 DTLS1_2_VERSION, DTLS1_2_VERSION,
412 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
413 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
419 TLS1_TXT_RSA_WITH_AES_128_GCM_SHA256,
420 TLS1_CK_RSA_WITH_AES_128_GCM_SHA256,
425 TLS1_2_VERSION, TLS1_2_VERSION,
426 DTLS1_2_VERSION, DTLS1_2_VERSION,
428 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
434 TLS1_TXT_RSA_WITH_AES_256_GCM_SHA384,
435 TLS1_CK_RSA_WITH_AES_256_GCM_SHA384,
440 TLS1_2_VERSION, TLS1_2_VERSION,
441 DTLS1_2_VERSION, DTLS1_2_VERSION,
443 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
449 TLS1_TXT_DHE_RSA_WITH_AES_128_GCM_SHA256,
450 TLS1_CK_DHE_RSA_WITH_AES_128_GCM_SHA256,
455 TLS1_2_VERSION, TLS1_2_VERSION,
456 DTLS1_2_VERSION, DTLS1_2_VERSION,
458 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
464 TLS1_TXT_DHE_RSA_WITH_AES_256_GCM_SHA384,
465 TLS1_CK_DHE_RSA_WITH_AES_256_GCM_SHA384,
470 TLS1_2_VERSION, TLS1_2_VERSION,
471 DTLS1_2_VERSION, DTLS1_2_VERSION,
473 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
479 TLS1_TXT_DHE_DSS_WITH_AES_128_GCM_SHA256,
480 TLS1_CK_DHE_DSS_WITH_AES_128_GCM_SHA256,
485 TLS1_2_VERSION, TLS1_2_VERSION,
486 DTLS1_2_VERSION, DTLS1_2_VERSION,
487 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
488 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
494 TLS1_TXT_DHE_DSS_WITH_AES_256_GCM_SHA384,
495 TLS1_CK_DHE_DSS_WITH_AES_256_GCM_SHA384,
500 TLS1_2_VERSION, TLS1_2_VERSION,
501 DTLS1_2_VERSION, DTLS1_2_VERSION,
502 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
503 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
509 TLS1_TXT_ADH_WITH_AES_128_GCM_SHA256,
510 TLS1_CK_ADH_WITH_AES_128_GCM_SHA256,
515 TLS1_2_VERSION, TLS1_2_VERSION,
516 DTLS1_2_VERSION, DTLS1_2_VERSION,
517 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
518 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
524 TLS1_TXT_ADH_WITH_AES_256_GCM_SHA384,
525 TLS1_CK_ADH_WITH_AES_256_GCM_SHA384,
530 TLS1_2_VERSION, TLS1_2_VERSION,
531 DTLS1_2_VERSION, DTLS1_2_VERSION,
532 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
533 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
539 TLS1_TXT_RSA_WITH_AES_128_CCM,
540 TLS1_CK_RSA_WITH_AES_128_CCM,
545 TLS1_2_VERSION, TLS1_2_VERSION,
546 DTLS1_2_VERSION, DTLS1_2_VERSION,
547 SSL_NOT_DEFAULT | SSL_HIGH,
548 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
554 TLS1_TXT_RSA_WITH_AES_256_CCM,
555 TLS1_CK_RSA_WITH_AES_256_CCM,
560 TLS1_2_VERSION, TLS1_2_VERSION,
561 DTLS1_2_VERSION, DTLS1_2_VERSION,
562 SSL_NOT_DEFAULT | SSL_HIGH,
563 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
569 TLS1_TXT_DHE_RSA_WITH_AES_128_CCM,
570 TLS1_CK_DHE_RSA_WITH_AES_128_CCM,
575 TLS1_2_VERSION, TLS1_2_VERSION,
576 DTLS1_2_VERSION, DTLS1_2_VERSION,
577 SSL_NOT_DEFAULT | SSL_HIGH,
578 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
584 TLS1_TXT_DHE_RSA_WITH_AES_256_CCM,
585 TLS1_CK_DHE_RSA_WITH_AES_256_CCM,
590 TLS1_2_VERSION, TLS1_2_VERSION,
591 DTLS1_2_VERSION, DTLS1_2_VERSION,
592 SSL_NOT_DEFAULT | SSL_HIGH,
593 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
599 TLS1_TXT_RSA_WITH_AES_128_CCM_8,
600 TLS1_CK_RSA_WITH_AES_128_CCM_8,
605 TLS1_2_VERSION, TLS1_2_VERSION,
606 DTLS1_2_VERSION, DTLS1_2_VERSION,
607 SSL_NOT_DEFAULT | SSL_HIGH,
608 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
614 TLS1_TXT_RSA_WITH_AES_256_CCM_8,
615 TLS1_CK_RSA_WITH_AES_256_CCM_8,
620 TLS1_2_VERSION, TLS1_2_VERSION,
621 DTLS1_2_VERSION, DTLS1_2_VERSION,
622 SSL_NOT_DEFAULT | SSL_HIGH,
623 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
629 TLS1_TXT_DHE_RSA_WITH_AES_128_CCM_8,
630 TLS1_CK_DHE_RSA_WITH_AES_128_CCM_8,
635 TLS1_2_VERSION, TLS1_2_VERSION,
636 DTLS1_2_VERSION, DTLS1_2_VERSION,
637 SSL_NOT_DEFAULT | SSL_HIGH,
638 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
644 TLS1_TXT_DHE_RSA_WITH_AES_256_CCM_8,
645 TLS1_CK_DHE_RSA_WITH_AES_256_CCM_8,
650 TLS1_2_VERSION, TLS1_2_VERSION,
651 DTLS1_2_VERSION, DTLS1_2_VERSION,
652 SSL_NOT_DEFAULT | SSL_HIGH,
653 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
659 TLS1_TXT_PSK_WITH_AES_128_CCM,
660 TLS1_CK_PSK_WITH_AES_128_CCM,
665 TLS1_2_VERSION, TLS1_2_VERSION,
666 DTLS1_2_VERSION, DTLS1_2_VERSION,
667 SSL_NOT_DEFAULT | SSL_HIGH,
668 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
674 TLS1_TXT_PSK_WITH_AES_256_CCM,
675 TLS1_CK_PSK_WITH_AES_256_CCM,
680 TLS1_2_VERSION, TLS1_2_VERSION,
681 DTLS1_2_VERSION, DTLS1_2_VERSION,
682 SSL_NOT_DEFAULT | SSL_HIGH,
683 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
689 TLS1_TXT_DHE_PSK_WITH_AES_128_CCM,
690 TLS1_CK_DHE_PSK_WITH_AES_128_CCM,
695 TLS1_2_VERSION, TLS1_2_VERSION,
696 DTLS1_2_VERSION, DTLS1_2_VERSION,
697 SSL_NOT_DEFAULT | SSL_HIGH,
698 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
704 TLS1_TXT_DHE_PSK_WITH_AES_256_CCM,
705 TLS1_CK_DHE_PSK_WITH_AES_256_CCM,
710 TLS1_2_VERSION, TLS1_2_VERSION,
711 DTLS1_2_VERSION, DTLS1_2_VERSION,
712 SSL_NOT_DEFAULT | SSL_HIGH,
713 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
719 TLS1_TXT_PSK_WITH_AES_128_CCM_8,
720 TLS1_CK_PSK_WITH_AES_128_CCM_8,
725 TLS1_2_VERSION, TLS1_2_VERSION,
726 DTLS1_2_VERSION, DTLS1_2_VERSION,
727 SSL_NOT_DEFAULT | SSL_HIGH,
728 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
734 TLS1_TXT_PSK_WITH_AES_256_CCM_8,
735 TLS1_CK_PSK_WITH_AES_256_CCM_8,
740 TLS1_2_VERSION, TLS1_2_VERSION,
741 DTLS1_2_VERSION, DTLS1_2_VERSION,
742 SSL_NOT_DEFAULT | SSL_HIGH,
743 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
749 TLS1_TXT_DHE_PSK_WITH_AES_128_CCM_8,
750 TLS1_CK_DHE_PSK_WITH_AES_128_CCM_8,
755 TLS1_2_VERSION, TLS1_2_VERSION,
756 DTLS1_2_VERSION, DTLS1_2_VERSION,
757 SSL_NOT_DEFAULT | SSL_HIGH,
758 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
764 TLS1_TXT_DHE_PSK_WITH_AES_256_CCM_8,
765 TLS1_CK_DHE_PSK_WITH_AES_256_CCM_8,
770 TLS1_2_VERSION, TLS1_2_VERSION,
771 DTLS1_2_VERSION, DTLS1_2_VERSION,
772 SSL_NOT_DEFAULT | SSL_HIGH,
773 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
779 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CCM,
780 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM,
785 TLS1_2_VERSION, TLS1_2_VERSION,
786 DTLS1_2_VERSION, DTLS1_2_VERSION,
787 SSL_NOT_DEFAULT | SSL_HIGH,
788 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
794 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CCM,
795 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM,
800 TLS1_2_VERSION, TLS1_2_VERSION,
801 DTLS1_2_VERSION, DTLS1_2_VERSION,
802 SSL_NOT_DEFAULT | SSL_HIGH,
803 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
809 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CCM_8,
810 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM_8,
815 TLS1_2_VERSION, TLS1_2_VERSION,
816 DTLS1_2_VERSION, DTLS1_2_VERSION,
817 SSL_NOT_DEFAULT | SSL_HIGH,
818 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
824 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CCM_8,
825 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM_8,
830 TLS1_2_VERSION, TLS1_2_VERSION,
831 DTLS1_2_VERSION, DTLS1_2_VERSION,
832 SSL_NOT_DEFAULT | SSL_HIGH,
833 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
839 TLS1_3_TXT_AES_128_GCM_SHA256,
840 TLS1_3_CK_AES_128_GCM_SHA256,
844 TLS1_3_VERSION, TLS1_3_VERSION,
847 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
852 #ifndef OPENSSL_NO_EC
855 TLS1_TXT_ECDHE_ECDSA_WITH_NULL_SHA,
856 TLS1_CK_ECDHE_ECDSA_WITH_NULL_SHA,
861 SSL3_VERSION, TLS1_2_VERSION,
862 DTLS1_BAD_VER, DTLS1_2_VERSION,
863 SSL_STRONG_NONE | SSL_FIPS,
864 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
868 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
871 TLS1_TXT_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,
872 TLS1_CK_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,
877 SSL3_VERSION, TLS1_2_VERSION,
878 DTLS1_BAD_VER, DTLS1_2_VERSION,
879 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
880 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
887 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
888 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
893 SSL3_VERSION, TLS1_2_VERSION,
894 DTLS1_BAD_VER, DTLS1_2_VERSION,
896 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
902 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
903 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
908 SSL3_VERSION, TLS1_2_VERSION,
909 DTLS1_BAD_VER, DTLS1_2_VERSION,
911 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
917 TLS1_TXT_ECDHE_RSA_WITH_NULL_SHA,
918 TLS1_CK_ECDHE_RSA_WITH_NULL_SHA,
923 SSL3_VERSION, TLS1_2_VERSION,
924 DTLS1_BAD_VER, DTLS1_2_VERSION,
925 SSL_STRONG_NONE | SSL_FIPS,
926 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
930 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
933 TLS1_TXT_ECDHE_RSA_WITH_DES_192_CBC3_SHA,
934 TLS1_CK_ECDHE_RSA_WITH_DES_192_CBC3_SHA,
939 SSL3_VERSION, TLS1_2_VERSION,
940 DTLS1_BAD_VER, DTLS1_2_VERSION,
941 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
942 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
949 TLS1_TXT_ECDHE_RSA_WITH_AES_128_CBC_SHA,
950 TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA,
955 SSL3_VERSION, TLS1_2_VERSION,
956 DTLS1_BAD_VER, DTLS1_2_VERSION,
958 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
964 TLS1_TXT_ECDHE_RSA_WITH_AES_256_CBC_SHA,
965 TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA,
970 SSL3_VERSION, TLS1_2_VERSION,
971 DTLS1_BAD_VER, DTLS1_2_VERSION,
973 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
979 TLS1_TXT_ECDH_anon_WITH_NULL_SHA,
980 TLS1_CK_ECDH_anon_WITH_NULL_SHA,
985 SSL3_VERSION, TLS1_2_VERSION,
986 DTLS1_BAD_VER, DTLS1_2_VERSION,
987 SSL_STRONG_NONE | SSL_FIPS,
988 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
992 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
995 TLS1_TXT_ECDH_anon_WITH_DES_192_CBC3_SHA,
996 TLS1_CK_ECDH_anon_WITH_DES_192_CBC3_SHA,
1001 SSL3_VERSION, TLS1_2_VERSION,
1002 DTLS1_BAD_VER, DTLS1_2_VERSION,
1003 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1004 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1011 TLS1_TXT_ECDH_anon_WITH_AES_128_CBC_SHA,
1012 TLS1_CK_ECDH_anon_WITH_AES_128_CBC_SHA,
1017 SSL3_VERSION, TLS1_2_VERSION,
1018 DTLS1_BAD_VER, DTLS1_2_VERSION,
1019 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
1020 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1026 TLS1_TXT_ECDH_anon_WITH_AES_256_CBC_SHA,
1027 TLS1_CK_ECDH_anon_WITH_AES_256_CBC_SHA,
1032 SSL3_VERSION, TLS1_2_VERSION,
1033 DTLS1_BAD_VER, DTLS1_2_VERSION,
1034 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
1035 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1041 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_SHA256,
1042 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_SHA256,
1047 TLS1_2_VERSION, TLS1_2_VERSION,
1048 DTLS1_2_VERSION, DTLS1_2_VERSION,
1049 SSL_HIGH | SSL_FIPS,
1050 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1056 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_SHA384,
1057 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_SHA384,
1062 TLS1_2_VERSION, TLS1_2_VERSION,
1063 DTLS1_2_VERSION, DTLS1_2_VERSION,
1064 SSL_HIGH | SSL_FIPS,
1065 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1071 TLS1_TXT_ECDHE_RSA_WITH_AES_128_SHA256,
1072 TLS1_CK_ECDHE_RSA_WITH_AES_128_SHA256,
1077 TLS1_2_VERSION, TLS1_2_VERSION,
1078 DTLS1_2_VERSION, DTLS1_2_VERSION,
1079 SSL_HIGH | SSL_FIPS,
1080 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1086 TLS1_TXT_ECDHE_RSA_WITH_AES_256_SHA384,
1087 TLS1_CK_ECDHE_RSA_WITH_AES_256_SHA384,
1092 TLS1_2_VERSION, TLS1_2_VERSION,
1093 DTLS1_2_VERSION, DTLS1_2_VERSION,
1094 SSL_HIGH | SSL_FIPS,
1095 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1101 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
1102 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
1107 TLS1_2_VERSION, TLS1_2_VERSION,
1108 DTLS1_2_VERSION, DTLS1_2_VERSION,
1109 SSL_HIGH | SSL_FIPS,
1110 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1116 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
1117 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
1122 TLS1_2_VERSION, TLS1_2_VERSION,
1123 DTLS1_2_VERSION, DTLS1_2_VERSION,
1124 SSL_HIGH | SSL_FIPS,
1125 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1131 TLS1_TXT_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
1132 TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
1137 TLS1_2_VERSION, TLS1_2_VERSION,
1138 DTLS1_2_VERSION, DTLS1_2_VERSION,
1139 SSL_HIGH | SSL_FIPS,
1140 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1146 TLS1_TXT_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
1147 TLS1_CK_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
1152 TLS1_2_VERSION, TLS1_2_VERSION,
1153 DTLS1_2_VERSION, DTLS1_2_VERSION,
1154 SSL_HIGH | SSL_FIPS,
1155 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1159 #endif /* OPENSSL_NO_EC */
1161 #ifndef OPENSSL_NO_PSK
1164 TLS1_TXT_PSK_WITH_NULL_SHA,
1165 TLS1_CK_PSK_WITH_NULL_SHA,
1170 SSL3_VERSION, TLS1_2_VERSION,
1171 DTLS1_BAD_VER, DTLS1_2_VERSION,
1172 SSL_STRONG_NONE | SSL_FIPS,
1173 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1179 TLS1_TXT_DHE_PSK_WITH_NULL_SHA,
1180 TLS1_CK_DHE_PSK_WITH_NULL_SHA,
1185 SSL3_VERSION, TLS1_2_VERSION,
1186 DTLS1_BAD_VER, DTLS1_2_VERSION,
1187 SSL_STRONG_NONE | SSL_FIPS,
1188 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1194 TLS1_TXT_RSA_PSK_WITH_NULL_SHA,
1195 TLS1_CK_RSA_PSK_WITH_NULL_SHA,
1200 SSL3_VERSION, TLS1_2_VERSION,
1201 DTLS1_BAD_VER, DTLS1_2_VERSION,
1202 SSL_STRONG_NONE | SSL_FIPS,
1203 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1207 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1210 TLS1_TXT_PSK_WITH_3DES_EDE_CBC_SHA,
1211 TLS1_CK_PSK_WITH_3DES_EDE_CBC_SHA,
1216 SSL3_VERSION, TLS1_2_VERSION,
1217 DTLS1_BAD_VER, DTLS1_2_VERSION,
1218 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1219 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1226 TLS1_TXT_PSK_WITH_AES_128_CBC_SHA,
1227 TLS1_CK_PSK_WITH_AES_128_CBC_SHA,
1232 SSL3_VERSION, TLS1_2_VERSION,
1233 DTLS1_BAD_VER, DTLS1_2_VERSION,
1234 SSL_HIGH | SSL_FIPS,
1235 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1241 TLS1_TXT_PSK_WITH_AES_256_CBC_SHA,
1242 TLS1_CK_PSK_WITH_AES_256_CBC_SHA,
1247 SSL3_VERSION, TLS1_2_VERSION,
1248 DTLS1_BAD_VER, DTLS1_2_VERSION,
1249 SSL_HIGH | SSL_FIPS,
1250 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1254 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1257 TLS1_TXT_DHE_PSK_WITH_3DES_EDE_CBC_SHA,
1258 TLS1_CK_DHE_PSK_WITH_3DES_EDE_CBC_SHA,
1263 SSL3_VERSION, TLS1_2_VERSION,
1264 DTLS1_BAD_VER, DTLS1_2_VERSION,
1265 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1266 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1273 TLS1_TXT_DHE_PSK_WITH_AES_128_CBC_SHA,
1274 TLS1_CK_DHE_PSK_WITH_AES_128_CBC_SHA,
1279 SSL3_VERSION, TLS1_2_VERSION,
1280 DTLS1_BAD_VER, DTLS1_2_VERSION,
1281 SSL_HIGH | SSL_FIPS,
1282 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1288 TLS1_TXT_DHE_PSK_WITH_AES_256_CBC_SHA,
1289 TLS1_CK_DHE_PSK_WITH_AES_256_CBC_SHA,
1294 SSL3_VERSION, TLS1_2_VERSION,
1295 DTLS1_BAD_VER, DTLS1_2_VERSION,
1296 SSL_HIGH | SSL_FIPS,
1297 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1301 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1304 TLS1_TXT_RSA_PSK_WITH_3DES_EDE_CBC_SHA,
1305 TLS1_CK_RSA_PSK_WITH_3DES_EDE_CBC_SHA,
1310 SSL3_VERSION, TLS1_2_VERSION,
1311 DTLS1_BAD_VER, DTLS1_2_VERSION,
1312 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1313 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1320 TLS1_TXT_RSA_PSK_WITH_AES_128_CBC_SHA,
1321 TLS1_CK_RSA_PSK_WITH_AES_128_CBC_SHA,
1326 SSL3_VERSION, TLS1_2_VERSION,
1327 DTLS1_BAD_VER, DTLS1_2_VERSION,
1328 SSL_HIGH | SSL_FIPS,
1329 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1335 TLS1_TXT_RSA_PSK_WITH_AES_256_CBC_SHA,
1336 TLS1_CK_RSA_PSK_WITH_AES_256_CBC_SHA,
1341 SSL3_VERSION, TLS1_2_VERSION,
1342 DTLS1_BAD_VER, DTLS1_2_VERSION,
1343 SSL_HIGH | SSL_FIPS,
1344 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1350 TLS1_TXT_PSK_WITH_AES_128_GCM_SHA256,
1351 TLS1_CK_PSK_WITH_AES_128_GCM_SHA256,
1356 TLS1_2_VERSION, TLS1_2_VERSION,
1357 DTLS1_2_VERSION, DTLS1_2_VERSION,
1358 SSL_HIGH | SSL_FIPS,
1359 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1365 TLS1_TXT_PSK_WITH_AES_256_GCM_SHA384,
1366 TLS1_CK_PSK_WITH_AES_256_GCM_SHA384,
1371 TLS1_2_VERSION, TLS1_2_VERSION,
1372 DTLS1_2_VERSION, DTLS1_2_VERSION,
1373 SSL_HIGH | SSL_FIPS,
1374 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1380 TLS1_TXT_DHE_PSK_WITH_AES_128_GCM_SHA256,
1381 TLS1_CK_DHE_PSK_WITH_AES_128_GCM_SHA256,
1386 TLS1_2_VERSION, TLS1_2_VERSION,
1387 DTLS1_2_VERSION, DTLS1_2_VERSION,
1388 SSL_HIGH | SSL_FIPS,
1389 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1395 TLS1_TXT_DHE_PSK_WITH_AES_256_GCM_SHA384,
1396 TLS1_CK_DHE_PSK_WITH_AES_256_GCM_SHA384,
1401 TLS1_2_VERSION, TLS1_2_VERSION,
1402 DTLS1_2_VERSION, DTLS1_2_VERSION,
1403 SSL_HIGH | SSL_FIPS,
1404 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1410 TLS1_TXT_RSA_PSK_WITH_AES_128_GCM_SHA256,
1411 TLS1_CK_RSA_PSK_WITH_AES_128_GCM_SHA256,
1416 TLS1_2_VERSION, TLS1_2_VERSION,
1417 DTLS1_2_VERSION, DTLS1_2_VERSION,
1418 SSL_HIGH | SSL_FIPS,
1419 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1425 TLS1_TXT_RSA_PSK_WITH_AES_256_GCM_SHA384,
1426 TLS1_CK_RSA_PSK_WITH_AES_256_GCM_SHA384,
1431 TLS1_2_VERSION, TLS1_2_VERSION,
1432 DTLS1_2_VERSION, DTLS1_2_VERSION,
1433 SSL_HIGH | SSL_FIPS,
1434 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1440 TLS1_TXT_PSK_WITH_AES_128_CBC_SHA256,
1441 TLS1_CK_PSK_WITH_AES_128_CBC_SHA256,
1446 TLS1_VERSION, TLS1_2_VERSION,
1447 DTLS1_BAD_VER, DTLS1_2_VERSION,
1448 SSL_HIGH | SSL_FIPS,
1449 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1455 TLS1_TXT_PSK_WITH_AES_256_CBC_SHA384,
1456 TLS1_CK_PSK_WITH_AES_256_CBC_SHA384,
1461 TLS1_VERSION, TLS1_2_VERSION,
1462 DTLS1_BAD_VER, DTLS1_2_VERSION,
1463 SSL_HIGH | SSL_FIPS,
1464 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1470 TLS1_TXT_PSK_WITH_NULL_SHA256,
1471 TLS1_CK_PSK_WITH_NULL_SHA256,
1476 TLS1_VERSION, TLS1_2_VERSION,
1477 DTLS1_BAD_VER, DTLS1_2_VERSION,
1478 SSL_STRONG_NONE | SSL_FIPS,
1479 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1485 TLS1_TXT_PSK_WITH_NULL_SHA384,
1486 TLS1_CK_PSK_WITH_NULL_SHA384,
1491 TLS1_VERSION, TLS1_2_VERSION,
1492 DTLS1_BAD_VER, DTLS1_2_VERSION,
1493 SSL_STRONG_NONE | SSL_FIPS,
1494 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1500 TLS1_TXT_DHE_PSK_WITH_AES_128_CBC_SHA256,
1501 TLS1_CK_DHE_PSK_WITH_AES_128_CBC_SHA256,
1506 TLS1_VERSION, TLS1_2_VERSION,
1507 DTLS1_BAD_VER, DTLS1_2_VERSION,
1508 SSL_HIGH | SSL_FIPS,
1509 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1515 TLS1_TXT_DHE_PSK_WITH_AES_256_CBC_SHA384,
1516 TLS1_CK_DHE_PSK_WITH_AES_256_CBC_SHA384,
1521 TLS1_VERSION, TLS1_2_VERSION,
1522 DTLS1_BAD_VER, DTLS1_2_VERSION,
1523 SSL_HIGH | SSL_FIPS,
1524 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1530 TLS1_TXT_DHE_PSK_WITH_NULL_SHA256,
1531 TLS1_CK_DHE_PSK_WITH_NULL_SHA256,
1536 TLS1_VERSION, TLS1_2_VERSION,
1537 DTLS1_BAD_VER, DTLS1_2_VERSION,
1538 SSL_STRONG_NONE | SSL_FIPS,
1539 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1545 TLS1_TXT_DHE_PSK_WITH_NULL_SHA384,
1546 TLS1_CK_DHE_PSK_WITH_NULL_SHA384,
1551 TLS1_VERSION, TLS1_2_VERSION,
1552 DTLS1_BAD_VER, DTLS1_2_VERSION,
1553 SSL_STRONG_NONE | SSL_FIPS,
1554 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1560 TLS1_TXT_RSA_PSK_WITH_AES_128_CBC_SHA256,
1561 TLS1_CK_RSA_PSK_WITH_AES_128_CBC_SHA256,
1566 TLS1_VERSION, TLS1_2_VERSION,
1567 DTLS1_BAD_VER, DTLS1_2_VERSION,
1568 SSL_HIGH | SSL_FIPS,
1569 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1575 TLS1_TXT_RSA_PSK_WITH_AES_256_CBC_SHA384,
1576 TLS1_CK_RSA_PSK_WITH_AES_256_CBC_SHA384,
1581 TLS1_VERSION, TLS1_2_VERSION,
1582 DTLS1_BAD_VER, DTLS1_2_VERSION,
1583 SSL_HIGH | SSL_FIPS,
1584 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1590 TLS1_TXT_RSA_PSK_WITH_NULL_SHA256,
1591 TLS1_CK_RSA_PSK_WITH_NULL_SHA256,
1596 TLS1_VERSION, TLS1_2_VERSION,
1597 DTLS1_BAD_VER, DTLS1_2_VERSION,
1598 SSL_STRONG_NONE | SSL_FIPS,
1599 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1605 TLS1_TXT_RSA_PSK_WITH_NULL_SHA384,
1606 TLS1_CK_RSA_PSK_WITH_NULL_SHA384,
1611 TLS1_VERSION, TLS1_2_VERSION,
1612 DTLS1_BAD_VER, DTLS1_2_VERSION,
1613 SSL_STRONG_NONE | SSL_FIPS,
1614 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1618 # ifndef OPENSSL_NO_EC
1619 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1622 TLS1_TXT_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA,
1623 TLS1_CK_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA,
1628 SSL3_VERSION, TLS1_2_VERSION,
1629 DTLS1_BAD_VER, DTLS1_2_VERSION,
1630 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1631 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1638 TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA,
1639 TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA,
1644 SSL3_VERSION, TLS1_2_VERSION,
1645 DTLS1_BAD_VER, DTLS1_2_VERSION,
1646 SSL_HIGH | SSL_FIPS,
1647 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1653 TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA,
1654 TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA,
1659 SSL3_VERSION, TLS1_2_VERSION,
1660 DTLS1_BAD_VER, DTLS1_2_VERSION,
1661 SSL_HIGH | SSL_FIPS,
1662 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1668 TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA256,
1669 TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA256,
1674 TLS1_VERSION, TLS1_2_VERSION,
1675 DTLS1_BAD_VER, DTLS1_2_VERSION,
1676 SSL_HIGH | SSL_FIPS,
1677 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1683 TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA384,
1684 TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA384,
1689 TLS1_VERSION, TLS1_2_VERSION,
1690 DTLS1_BAD_VER, DTLS1_2_VERSION,
1691 SSL_HIGH | SSL_FIPS,
1692 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1698 TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA,
1699 TLS1_CK_ECDHE_PSK_WITH_NULL_SHA,
1704 SSL3_VERSION, TLS1_2_VERSION,
1705 DTLS1_BAD_VER, DTLS1_2_VERSION,
1706 SSL_STRONG_NONE | SSL_FIPS,
1707 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1713 TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA256,
1714 TLS1_CK_ECDHE_PSK_WITH_NULL_SHA256,
1719 TLS1_VERSION, TLS1_2_VERSION,
1720 DTLS1_BAD_VER, DTLS1_2_VERSION,
1721 SSL_STRONG_NONE | SSL_FIPS,
1722 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1728 TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA384,
1729 TLS1_CK_ECDHE_PSK_WITH_NULL_SHA384,
1734 TLS1_VERSION, TLS1_2_VERSION,
1735 DTLS1_BAD_VER, DTLS1_2_VERSION,
1736 SSL_STRONG_NONE | SSL_FIPS,
1737 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1741 # endif /* OPENSSL_NO_EC */
1742 #endif /* OPENSSL_NO_PSK */
1744 #ifndef OPENSSL_NO_SRP
1745 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1748 TLS1_TXT_SRP_SHA_WITH_3DES_EDE_CBC_SHA,
1749 TLS1_CK_SRP_SHA_WITH_3DES_EDE_CBC_SHA,
1754 SSL3_VERSION, TLS1_2_VERSION,
1755 DTLS1_BAD_VER, DTLS1_2_VERSION,
1756 SSL_NOT_DEFAULT | SSL_MEDIUM,
1757 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1763 TLS1_TXT_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA,
1764 TLS1_CK_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA,
1769 SSL3_VERSION, TLS1_2_VERSION,
1770 DTLS1_BAD_VER, DTLS1_2_VERSION,
1771 SSL_NOT_DEFAULT | SSL_MEDIUM,
1772 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1778 TLS1_TXT_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA,
1779 TLS1_CK_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA,
1784 SSL3_VERSION, TLS1_2_VERSION,
1785 DTLS1_BAD_VER, DTLS1_2_VERSION,
1786 SSL_NOT_DEFAULT | SSL_MEDIUM,
1787 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1794 TLS1_TXT_SRP_SHA_WITH_AES_128_CBC_SHA,
1795 TLS1_CK_SRP_SHA_WITH_AES_128_CBC_SHA,
1800 SSL3_VERSION, TLS1_2_VERSION,
1801 DTLS1_BAD_VER, DTLS1_2_VERSION,
1803 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1809 TLS1_TXT_SRP_SHA_RSA_WITH_AES_128_CBC_SHA,
1810 TLS1_CK_SRP_SHA_RSA_WITH_AES_128_CBC_SHA,
1815 SSL3_VERSION, TLS1_2_VERSION,
1816 DTLS1_BAD_VER, DTLS1_2_VERSION,
1818 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1824 TLS1_TXT_SRP_SHA_DSS_WITH_AES_128_CBC_SHA,
1825 TLS1_CK_SRP_SHA_DSS_WITH_AES_128_CBC_SHA,
1830 SSL3_VERSION, TLS1_2_VERSION,
1831 DTLS1_BAD_VER, DTLS1_2_VERSION,
1832 SSL_NOT_DEFAULT | SSL_HIGH,
1833 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1839 TLS1_TXT_SRP_SHA_WITH_AES_256_CBC_SHA,
1840 TLS1_CK_SRP_SHA_WITH_AES_256_CBC_SHA,
1845 SSL3_VERSION, TLS1_2_VERSION,
1846 DTLS1_BAD_VER, DTLS1_2_VERSION,
1848 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1854 TLS1_TXT_SRP_SHA_RSA_WITH_AES_256_CBC_SHA,
1855 TLS1_CK_SRP_SHA_RSA_WITH_AES_256_CBC_SHA,
1860 SSL3_VERSION, TLS1_2_VERSION,
1861 DTLS1_BAD_VER, DTLS1_2_VERSION,
1863 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1869 TLS1_TXT_SRP_SHA_DSS_WITH_AES_256_CBC_SHA,
1870 TLS1_CK_SRP_SHA_DSS_WITH_AES_256_CBC_SHA,
1875 SSL3_VERSION, TLS1_2_VERSION,
1876 DTLS1_BAD_VER, DTLS1_2_VERSION,
1877 SSL_NOT_DEFAULT | SSL_HIGH,
1878 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1882 #endif /* OPENSSL_NO_SRP */
1884 #if !defined(OPENSSL_NO_CHACHA) && !defined(OPENSSL_NO_POLY1305)
1885 # ifndef OPENSSL_NO_RSA
1888 TLS1_TXT_DHE_RSA_WITH_CHACHA20_POLY1305,
1889 TLS1_CK_DHE_RSA_WITH_CHACHA20_POLY1305,
1892 SSL_CHACHA20POLY1305,
1894 TLS1_2_VERSION, TLS1_2_VERSION,
1895 DTLS1_2_VERSION, DTLS1_2_VERSION,
1897 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1901 # endif /* OPENSSL_NO_RSA */
1903 # ifndef OPENSSL_NO_EC
1906 TLS1_TXT_ECDHE_RSA_WITH_CHACHA20_POLY1305,
1907 TLS1_CK_ECDHE_RSA_WITH_CHACHA20_POLY1305,
1910 SSL_CHACHA20POLY1305,
1912 TLS1_2_VERSION, TLS1_2_VERSION,
1913 DTLS1_2_VERSION, DTLS1_2_VERSION,
1915 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1921 TLS1_TXT_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
1922 TLS1_CK_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
1925 SSL_CHACHA20POLY1305,
1927 TLS1_2_VERSION, TLS1_2_VERSION,
1928 DTLS1_2_VERSION, DTLS1_2_VERSION,
1930 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1934 # endif /* OPENSSL_NO_EC */
1936 # ifndef OPENSSL_NO_PSK
1939 TLS1_TXT_PSK_WITH_CHACHA20_POLY1305,
1940 TLS1_CK_PSK_WITH_CHACHA20_POLY1305,
1943 SSL_CHACHA20POLY1305,
1945 TLS1_2_VERSION, TLS1_2_VERSION,
1946 DTLS1_2_VERSION, DTLS1_2_VERSION,
1948 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1954 TLS1_TXT_ECDHE_PSK_WITH_CHACHA20_POLY1305,
1955 TLS1_CK_ECDHE_PSK_WITH_CHACHA20_POLY1305,
1958 SSL_CHACHA20POLY1305,
1960 TLS1_2_VERSION, TLS1_2_VERSION,
1961 DTLS1_2_VERSION, DTLS1_2_VERSION,
1963 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1969 TLS1_TXT_DHE_PSK_WITH_CHACHA20_POLY1305,
1970 TLS1_CK_DHE_PSK_WITH_CHACHA20_POLY1305,
1973 SSL_CHACHA20POLY1305,
1975 TLS1_2_VERSION, TLS1_2_VERSION,
1976 DTLS1_2_VERSION, DTLS1_2_VERSION,
1978 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1984 TLS1_TXT_RSA_PSK_WITH_CHACHA20_POLY1305,
1985 TLS1_CK_RSA_PSK_WITH_CHACHA20_POLY1305,
1988 SSL_CHACHA20POLY1305,
1990 TLS1_2_VERSION, TLS1_2_VERSION,
1991 DTLS1_2_VERSION, DTLS1_2_VERSION,
1993 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1997 # endif /* OPENSSL_NO_PSK */
1998 #endif /* !defined(OPENSSL_NO_CHACHA) &&
1999 * !defined(OPENSSL_NO_POLY1305) */
2001 #ifndef OPENSSL_NO_CAMELLIA
2004 TLS1_TXT_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2005 TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2010 TLS1_2_VERSION, TLS1_2_VERSION,
2011 DTLS1_2_VERSION, DTLS1_2_VERSION,
2012 SSL_NOT_DEFAULT | SSL_HIGH,
2013 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2019 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256,
2020 TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256,
2025 TLS1_2_VERSION, TLS1_2_VERSION,
2026 DTLS1_2_VERSION, DTLS1_2_VERSION,
2027 SSL_NOT_DEFAULT | SSL_HIGH,
2028 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2034 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2035 TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2040 TLS1_2_VERSION, TLS1_2_VERSION,
2041 DTLS1_2_VERSION, DTLS1_2_VERSION,
2042 SSL_NOT_DEFAULT | SSL_HIGH,
2043 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2049 TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA256,
2050 TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA256,
2055 TLS1_2_VERSION, TLS1_2_VERSION,
2056 DTLS1_2_VERSION, DTLS1_2_VERSION,
2057 SSL_NOT_DEFAULT | SSL_HIGH,
2058 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2064 TLS1_TXT_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2065 TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2070 TLS1_2_VERSION, TLS1_2_VERSION,
2071 DTLS1_2_VERSION, DTLS1_2_VERSION,
2072 SSL_NOT_DEFAULT | SSL_HIGH,
2073 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2079 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256,
2080 TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256,
2085 TLS1_2_VERSION, TLS1_2_VERSION,
2086 DTLS1_2_VERSION, DTLS1_2_VERSION,
2087 SSL_NOT_DEFAULT | SSL_HIGH,
2088 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2094 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2095 TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2100 TLS1_2_VERSION, TLS1_2_VERSION,
2101 DTLS1_2_VERSION, DTLS1_2_VERSION,
2102 SSL_NOT_DEFAULT | SSL_HIGH,
2103 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2109 TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA256,
2110 TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA256,
2115 TLS1_2_VERSION, TLS1_2_VERSION,
2116 DTLS1_2_VERSION, DTLS1_2_VERSION,
2117 SSL_NOT_DEFAULT | SSL_HIGH,
2118 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2124 TLS1_TXT_RSA_WITH_CAMELLIA_256_CBC_SHA,
2125 TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA,
2130 SSL3_VERSION, TLS1_2_VERSION,
2131 DTLS1_BAD_VER, DTLS1_2_VERSION,
2132 SSL_NOT_DEFAULT | SSL_HIGH,
2133 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2139 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,
2140 TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,
2145 SSL3_VERSION, TLS1_2_VERSION,
2146 DTLS1_BAD_VER, DTLS1_2_VERSION,
2147 SSL_NOT_DEFAULT | SSL_HIGH,
2148 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2154 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,
2155 TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,
2160 SSL3_VERSION, TLS1_2_VERSION,
2161 DTLS1_BAD_VER, DTLS1_2_VERSION,
2162 SSL_NOT_DEFAULT | SSL_HIGH,
2163 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2169 TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA,
2170 TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA,
2175 SSL3_VERSION, TLS1_2_VERSION,
2176 DTLS1_BAD_VER, DTLS1_2_VERSION,
2177 SSL_NOT_DEFAULT | SSL_HIGH,
2178 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2184 TLS1_TXT_RSA_WITH_CAMELLIA_128_CBC_SHA,
2185 TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA,
2190 SSL3_VERSION, TLS1_2_VERSION,
2191 DTLS1_BAD_VER, DTLS1_2_VERSION,
2192 SSL_NOT_DEFAULT | SSL_HIGH,
2193 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2199 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,
2200 TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,
2205 SSL3_VERSION, TLS1_2_VERSION,
2206 DTLS1_BAD_VER, DTLS1_2_VERSION,
2207 SSL_NOT_DEFAULT | SSL_HIGH,
2208 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2214 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,
2215 TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,
2220 SSL3_VERSION, TLS1_2_VERSION,
2221 DTLS1_BAD_VER, DTLS1_2_VERSION,
2222 SSL_NOT_DEFAULT | SSL_HIGH,
2223 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2229 TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA,
2230 TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA,
2235 SSL3_VERSION, TLS1_2_VERSION,
2236 DTLS1_BAD_VER, DTLS1_2_VERSION,
2237 SSL_NOT_DEFAULT | SSL_HIGH,
2238 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2243 # ifndef OPENSSL_NO_EC
2246 TLS1_TXT_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,
2247 TLS1_CK_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,
2252 TLS1_2_VERSION, TLS1_2_VERSION,
2253 DTLS1_2_VERSION, DTLS1_2_VERSION,
2254 SSL_NOT_DEFAULT | SSL_HIGH,
2255 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2261 TLS1_TXT_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,
2262 TLS1_CK_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,
2267 TLS1_2_VERSION, TLS1_2_VERSION,
2268 DTLS1_2_VERSION, DTLS1_2_VERSION,
2269 SSL_NOT_DEFAULT | SSL_HIGH,
2270 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2276 TLS1_TXT_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2277 TLS1_CK_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2282 TLS1_2_VERSION, TLS1_2_VERSION,
2283 DTLS1_2_VERSION, DTLS1_2_VERSION,
2284 SSL_NOT_DEFAULT | SSL_HIGH,
2285 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2291 TLS1_TXT_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384,
2292 TLS1_CK_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384,
2297 TLS1_2_VERSION, TLS1_2_VERSION,
2298 DTLS1_2_VERSION, DTLS1_2_VERSION,
2299 SSL_NOT_DEFAULT | SSL_HIGH,
2300 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2304 # endif /* OPENSSL_NO_EC */
2306 # ifndef OPENSSL_NO_PSK
2309 TLS1_TXT_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2310 TLS1_CK_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2315 TLS1_VERSION, TLS1_2_VERSION,
2316 DTLS1_BAD_VER, DTLS1_2_VERSION,
2317 SSL_NOT_DEFAULT | SSL_HIGH,
2318 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2324 TLS1_TXT_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2325 TLS1_CK_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2330 TLS1_VERSION, TLS1_2_VERSION,
2331 DTLS1_BAD_VER, DTLS1_2_VERSION,
2332 SSL_NOT_DEFAULT | SSL_HIGH,
2333 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2339 TLS1_TXT_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2340 TLS1_CK_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2345 TLS1_VERSION, TLS1_2_VERSION,
2346 DTLS1_BAD_VER, DTLS1_2_VERSION,
2347 SSL_NOT_DEFAULT | SSL_HIGH,
2348 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2354 TLS1_TXT_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2355 TLS1_CK_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2360 TLS1_VERSION, TLS1_2_VERSION,
2361 DTLS1_BAD_VER, DTLS1_2_VERSION,
2362 SSL_NOT_DEFAULT | SSL_HIGH,
2363 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2369 TLS1_TXT_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2370 TLS1_CK_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2375 TLS1_VERSION, TLS1_2_VERSION,
2376 DTLS1_BAD_VER, DTLS1_2_VERSION,
2377 SSL_NOT_DEFAULT | SSL_HIGH,
2378 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2384 TLS1_TXT_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2385 TLS1_CK_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2390 TLS1_VERSION, TLS1_2_VERSION,
2391 DTLS1_BAD_VER, DTLS1_2_VERSION,
2392 SSL_NOT_DEFAULT | SSL_HIGH,
2393 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2399 TLS1_TXT_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2400 TLS1_CK_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2405 TLS1_VERSION, TLS1_2_VERSION,
2406 DTLS1_BAD_VER, DTLS1_2_VERSION,
2407 SSL_NOT_DEFAULT | SSL_HIGH,
2408 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2414 TLS1_TXT_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2415 TLS1_CK_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2420 TLS1_VERSION, TLS1_2_VERSION,
2421 DTLS1_BAD_VER, DTLS1_2_VERSION,
2422 SSL_NOT_DEFAULT | SSL_HIGH,
2423 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2427 # endif /* OPENSSL_NO_PSK */
2429 #endif /* OPENSSL_NO_CAMELLIA */
2431 #ifndef OPENSSL_NO_GOST
2434 "GOST2001-GOST89-GOST89",
2438 SSL_eGOST2814789CNT,
2440 TLS1_VERSION, TLS1_2_VERSION,
2443 SSL_HANDSHAKE_MAC_GOST94 | TLS1_PRF_GOST94 | TLS1_STREAM_MAC,
2449 "GOST2001-NULL-GOST94",
2455 TLS1_VERSION, TLS1_2_VERSION,
2458 SSL_HANDSHAKE_MAC_GOST94 | TLS1_PRF_GOST94,
2464 "GOST2012-GOST8912-GOST8912",
2467 SSL_aGOST12 | SSL_aGOST01,
2468 SSL_eGOST2814789CNT12,
2470 TLS1_VERSION, TLS1_2_VERSION,
2473 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC,
2479 "GOST2012-NULL-GOST12",
2482 SSL_aGOST12 | SSL_aGOST01,
2485 TLS1_VERSION, TLS1_2_VERSION,
2488 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC,
2492 #endif /* OPENSSL_NO_GOST */
2494 #ifndef OPENSSL_NO_IDEA
2497 SSL3_TXT_RSA_IDEA_128_SHA,
2498 SSL3_CK_RSA_IDEA_128_SHA,
2503 SSL3_VERSION, TLS1_1_VERSION,
2504 DTLS1_BAD_VER, DTLS1_VERSION,
2505 SSL_NOT_DEFAULT | SSL_MEDIUM,
2506 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2512 #ifndef OPENSSL_NO_SEED
2515 TLS1_TXT_RSA_WITH_SEED_SHA,
2516 TLS1_CK_RSA_WITH_SEED_SHA,
2521 SSL3_VERSION, TLS1_2_VERSION,
2522 DTLS1_BAD_VER, DTLS1_2_VERSION,
2523 SSL_NOT_DEFAULT | SSL_MEDIUM,
2524 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2530 TLS1_TXT_DHE_DSS_WITH_SEED_SHA,
2531 TLS1_CK_DHE_DSS_WITH_SEED_SHA,
2536 SSL3_VERSION, TLS1_2_VERSION,
2537 DTLS1_BAD_VER, DTLS1_2_VERSION,
2538 SSL_NOT_DEFAULT | SSL_MEDIUM,
2539 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2545 TLS1_TXT_DHE_RSA_WITH_SEED_SHA,
2546 TLS1_CK_DHE_RSA_WITH_SEED_SHA,
2551 SSL3_VERSION, TLS1_2_VERSION,
2552 DTLS1_BAD_VER, DTLS1_2_VERSION,
2553 SSL_NOT_DEFAULT | SSL_MEDIUM,
2554 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2560 TLS1_TXT_ADH_WITH_SEED_SHA,
2561 TLS1_CK_ADH_WITH_SEED_SHA,
2566 SSL3_VERSION, TLS1_2_VERSION,
2567 DTLS1_BAD_VER, DTLS1_2_VERSION,
2568 SSL_NOT_DEFAULT | SSL_MEDIUM,
2569 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2573 #endif /* OPENSSL_NO_SEED */
2575 #ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
2578 SSL3_TXT_RSA_RC4_128_MD5,
2579 SSL3_CK_RSA_RC4_128_MD5,
2584 SSL3_VERSION, TLS1_2_VERSION,
2586 SSL_NOT_DEFAULT | SSL_MEDIUM,
2587 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2593 SSL3_TXT_RSA_RC4_128_SHA,
2594 SSL3_CK_RSA_RC4_128_SHA,
2599 SSL3_VERSION, TLS1_2_VERSION,
2601 SSL_NOT_DEFAULT | SSL_MEDIUM,
2602 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2608 SSL3_TXT_ADH_RC4_128_MD5,
2609 SSL3_CK_ADH_RC4_128_MD5,
2614 SSL3_VERSION, TLS1_2_VERSION,
2616 SSL_NOT_DEFAULT | SSL_MEDIUM,
2617 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2622 # ifndef OPENSSL_NO_EC
2625 TLS1_TXT_ECDHE_PSK_WITH_RC4_128_SHA,
2626 TLS1_CK_ECDHE_PSK_WITH_RC4_128_SHA,
2631 SSL3_VERSION, TLS1_2_VERSION,
2633 SSL_NOT_DEFAULT | SSL_MEDIUM,
2634 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2640 TLS1_TXT_ECDH_anon_WITH_RC4_128_SHA,
2641 TLS1_CK_ECDH_anon_WITH_RC4_128_SHA,
2646 SSL3_VERSION, TLS1_2_VERSION,
2648 SSL_NOT_DEFAULT | SSL_MEDIUM,
2649 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2655 TLS1_TXT_ECDHE_ECDSA_WITH_RC4_128_SHA,
2656 TLS1_CK_ECDHE_ECDSA_WITH_RC4_128_SHA,
2661 SSL3_VERSION, TLS1_2_VERSION,
2663 SSL_NOT_DEFAULT | SSL_MEDIUM,
2664 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2670 TLS1_TXT_ECDHE_RSA_WITH_RC4_128_SHA,
2671 TLS1_CK_ECDHE_RSA_WITH_RC4_128_SHA,
2676 SSL3_VERSION, TLS1_2_VERSION,
2678 SSL_NOT_DEFAULT | SSL_MEDIUM,
2679 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2683 # endif /* OPENSSL_NO_EC */
2685 # ifndef OPENSSL_NO_PSK
2688 TLS1_TXT_PSK_WITH_RC4_128_SHA,
2689 TLS1_CK_PSK_WITH_RC4_128_SHA,
2694 SSL3_VERSION, TLS1_2_VERSION,
2696 SSL_NOT_DEFAULT | SSL_MEDIUM,
2697 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2703 TLS1_TXT_RSA_PSK_WITH_RC4_128_SHA,
2704 TLS1_CK_RSA_PSK_WITH_RC4_128_SHA,
2709 SSL3_VERSION, TLS1_2_VERSION,
2711 SSL_NOT_DEFAULT | SSL_MEDIUM,
2712 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2718 TLS1_TXT_DHE_PSK_WITH_RC4_128_SHA,
2719 TLS1_CK_DHE_PSK_WITH_RC4_128_SHA,
2724 SSL3_VERSION, TLS1_2_VERSION,
2726 SSL_NOT_DEFAULT | SSL_MEDIUM,
2727 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2731 # endif /* OPENSSL_NO_PSK */
2733 #endif /* OPENSSL_NO_WEAK_SSL_CIPHERS */
2737 static int cipher_compare(const void *a, const void *b)
2739 const SSL_CIPHER *ap = (const SSL_CIPHER *)a;
2740 const SSL_CIPHER *bp = (const SSL_CIPHER *)b;
2742 return ap->id - bp->id;
2745 void ssl_sort_cipher_list(void)
2747 qsort(ssl3_ciphers, OSSL_NELEM(ssl3_ciphers), sizeof ssl3_ciphers[0],
2751 const SSL3_ENC_METHOD SSLv3_enc_data = {
2754 ssl3_setup_key_block,
2755 ssl3_generate_master_secret,
2756 ssl3_change_cipher_state,
2757 ssl3_final_finish_mac,
2758 SSL3_MD_CLIENT_FINISHED_CONST, 4,
2759 SSL3_MD_SERVER_FINISHED_CONST, 4,
2761 (int (*)(SSL *, unsigned char *, size_t, const char *,
2762 size_t, const unsigned char *, size_t,
2763 int use_context))ssl_undefined_function,
2765 ssl3_set_handshake_header,
2766 tls_close_construct_packet,
2767 ssl3_handshake_write
2770 long ssl3_default_timeout(void)
2773 * 2 hours, the 24 hours mentioned in the SSLv3 spec is way too long for
2774 * http, the cache would over fill
2776 return (60 * 60 * 2);
2779 int ssl3_num_ciphers(void)
2781 return (SSL3_NUM_CIPHERS);
2784 const SSL_CIPHER *ssl3_get_cipher(unsigned int u)
2786 if (u < SSL3_NUM_CIPHERS)
2787 return (&(ssl3_ciphers[SSL3_NUM_CIPHERS - 1 - u]));
2792 int ssl3_set_handshake_header(SSL *s, WPACKET *pkt, int htype)
2794 /* No header in the event of a CCS */
2795 if (htype == SSL3_MT_CHANGE_CIPHER_SPEC)
2798 /* Set the content type and 3 bytes for the message len */
2799 if (!WPACKET_put_bytes_u8(pkt, htype)
2800 || !WPACKET_start_sub_packet_u24(pkt))
2806 int ssl3_handshake_write(SSL *s)
2808 return ssl3_do_write(s, SSL3_RT_HANDSHAKE);
2811 int ssl3_new(SSL *s)
2815 if ((s3 = OPENSSL_zalloc(sizeof(*s3))) == NULL)
2819 #ifndef OPENSSL_NO_SRP
2820 if (!SSL_SRP_CTX_init(s))
2823 s->method->ssl_clear(s);
2829 void ssl3_free(SSL *s)
2831 if (s == NULL || s->s3 == NULL)
2834 ssl3_cleanup_key_block(s);
2836 #if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH)
2837 EVP_PKEY_free(s->s3->peer_tmp);
2838 s->s3->peer_tmp = NULL;
2839 EVP_PKEY_free(s->s3->tmp.pkey);
2840 s->s3->tmp.pkey = NULL;
2843 sk_X509_NAME_pop_free(s->s3->tmp.ca_names, X509_NAME_free);
2844 OPENSSL_free(s->s3->tmp.ciphers_raw);
2845 OPENSSL_clear_free(s->s3->tmp.pms, s->s3->tmp.pmslen);
2846 OPENSSL_free(s->s3->tmp.peer_sigalgs);
2847 ssl3_free_digest_list(s);
2848 OPENSSL_free(s->s3->alpn_selected);
2849 OPENSSL_free(s->s3->alpn_proposed);
2851 #ifndef OPENSSL_NO_SRP
2852 SSL_SRP_CTX_free(s);
2854 OPENSSL_clear_free(s->s3, sizeof(*s->s3));
2858 void ssl3_clear(SSL *s)
2860 ssl3_cleanup_key_block(s);
2861 sk_X509_NAME_pop_free(s->s3->tmp.ca_names, X509_NAME_free);
2862 OPENSSL_free(s->s3->tmp.ciphers_raw);
2863 OPENSSL_clear_free(s->s3->tmp.pms, s->s3->tmp.pmslen);
2864 OPENSSL_free(s->s3->tmp.peer_sigalgs);
2866 #if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH)
2867 EVP_PKEY_free(s->s3->tmp.pkey);
2868 EVP_PKEY_free(s->s3->peer_tmp);
2869 #endif /* !OPENSSL_NO_EC */
2871 ssl3_free_digest_list(s);
2873 OPENSSL_free(s->s3->alpn_selected);
2874 OPENSSL_free(s->s3->alpn_proposed);
2876 /* NULL/zero-out everything in the s3 struct */
2877 memset(s->s3, 0, sizeof(*s->s3));
2879 ssl_free_wbio_buffer(s);
2881 s->version = SSL3_VERSION;
2883 #if !defined(OPENSSL_NO_NEXTPROTONEG)
2884 OPENSSL_free(s->ext.npn);
2890 #ifndef OPENSSL_NO_SRP
2891 static char *srp_password_from_info_cb(SSL *s, void *arg)
2893 return OPENSSL_strdup(s->srp_ctx.info);
2897 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len);
2899 long ssl3_ctrl(SSL *s, int cmd, long larg, void *parg)
2904 case SSL_CTRL_GET_CLIENT_CERT_REQUEST:
2906 case SSL_CTRL_GET_NUM_RENEGOTIATIONS:
2907 ret = s->s3->num_renegotiations;
2909 case SSL_CTRL_CLEAR_NUM_RENEGOTIATIONS:
2910 ret = s->s3->num_renegotiations;
2911 s->s3->num_renegotiations = 0;
2913 case SSL_CTRL_GET_TOTAL_RENEGOTIATIONS:
2914 ret = s->s3->total_renegotiations;
2916 case SSL_CTRL_GET_FLAGS:
2917 ret = (int)(s->s3->flags);
2919 #ifndef OPENSSL_NO_DH
2920 case SSL_CTRL_SET_TMP_DH:
2922 DH *dh = (DH *)parg;
2923 EVP_PKEY *pkdh = NULL;
2925 SSLerr(SSL_F_SSL3_CTRL, ERR_R_PASSED_NULL_PARAMETER);
2928 pkdh = ssl_dh_to_pkey(dh);
2930 SSLerr(SSL_F_SSL3_CTRL, ERR_R_MALLOC_FAILURE);
2933 if (!ssl_security(s, SSL_SECOP_TMP_DH,
2934 EVP_PKEY_security_bits(pkdh), 0, pkdh)) {
2935 SSLerr(SSL_F_SSL3_CTRL, SSL_R_DH_KEY_TOO_SMALL);
2936 EVP_PKEY_free(pkdh);
2939 EVP_PKEY_free(s->cert->dh_tmp);
2940 s->cert->dh_tmp = pkdh;
2944 case SSL_CTRL_SET_TMP_DH_CB:
2946 SSLerr(SSL_F_SSL3_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
2949 case SSL_CTRL_SET_DH_AUTO:
2950 s->cert->dh_tmp_auto = larg;
2953 #ifndef OPENSSL_NO_EC
2954 case SSL_CTRL_SET_TMP_ECDH:
2956 const EC_GROUP *group = NULL;
2960 SSLerr(SSL_F_SSL3_CTRL, ERR_R_PASSED_NULL_PARAMETER);
2963 group = EC_KEY_get0_group((const EC_KEY *)parg);
2964 if (group == NULL) {
2965 SSLerr(SSL_F_SSL3_CTRL, EC_R_MISSING_PARAMETERS);
2968 nid = EC_GROUP_get_curve_name(group);
2969 if (nid == NID_undef)
2971 return tls1_set_groups(&s->ext.supportedgroups,
2972 &s->ext.supportedgroups_len,
2976 #endif /* !OPENSSL_NO_EC */
2977 case SSL_CTRL_SET_TLSEXT_HOSTNAME:
2978 if (larg == TLSEXT_NAMETYPE_host_name) {
2981 OPENSSL_free(s->ext.hostname);
2982 s->ext.hostname = NULL;
2987 len = strlen((char *)parg);
2988 if (len == 0 || len > TLSEXT_MAXLEN_host_name) {
2989 SSLerr(SSL_F_SSL3_CTRL, SSL_R_SSL3_EXT_INVALID_SERVERNAME);
2992 if ((s->ext.hostname = OPENSSL_strdup((char *)parg)) == NULL) {
2993 SSLerr(SSL_F_SSL3_CTRL, ERR_R_INTERNAL_ERROR);
2997 SSLerr(SSL_F_SSL3_CTRL, SSL_R_SSL3_EXT_INVALID_SERVERNAME_TYPE);
3001 case SSL_CTRL_SET_TLSEXT_DEBUG_ARG:
3002 s->ext.debug_arg = parg;
3006 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE:
3007 ret = s->ext.status_type;
3010 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE:
3011 s->ext.status_type = larg;
3015 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS:
3016 *(STACK_OF(X509_EXTENSION) **)parg = s->ext.ocsp.exts;
3020 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS:
3021 s->ext.ocsp.exts = parg;
3025 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_IDS:
3026 *(STACK_OF(OCSP_RESPID) **)parg = s->ext.ocsp.ids;
3030 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_IDS:
3031 s->ext.ocsp.ids = parg;
3035 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP:
3036 *(unsigned char **)parg = s->ext.ocsp.resp;
3037 if (s->ext.ocsp.resp_len == 0
3038 || s->ext.ocsp.resp_len > LONG_MAX)
3040 return (long)s->ext.ocsp.resp_len;
3042 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP:
3043 OPENSSL_free(s->ext.ocsp.resp);
3044 s->ext.ocsp.resp = parg;
3045 s->ext.ocsp.resp_len = larg;
3049 #ifndef OPENSSL_NO_HEARTBEATS
3050 case SSL_CTRL_DTLS_EXT_SEND_HEARTBEAT:
3051 case SSL_CTRL_GET_DTLS_EXT_HEARTBEAT_PENDING:
3052 case SSL_CTRL_SET_DTLS_EXT_HEARTBEAT_NO_REQUESTS:
3056 case SSL_CTRL_CHAIN:
3058 return ssl_cert_set1_chain(s, NULL, (STACK_OF(X509) *)parg);
3060 return ssl_cert_set0_chain(s, NULL, (STACK_OF(X509) *)parg);
3062 case SSL_CTRL_CHAIN_CERT:
3064 return ssl_cert_add1_chain_cert(s, NULL, (X509 *)parg);
3066 return ssl_cert_add0_chain_cert(s, NULL, (X509 *)parg);
3068 case SSL_CTRL_GET_CHAIN_CERTS:
3069 *(STACK_OF(X509) **)parg = s->cert->key->chain;
3072 case SSL_CTRL_SELECT_CURRENT_CERT:
3073 return ssl_cert_select_current(s->cert, (X509 *)parg);
3075 case SSL_CTRL_SET_CURRENT_CERT:
3076 if (larg == SSL_CERT_SET_SERVER) {
3078 const SSL_CIPHER *cipher;
3081 cipher = s->s3->tmp.new_cipher;
3085 * No certificate for unauthenticated ciphersuites or using SRP
3088 if (cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP))
3090 cpk = ssl_get_server_send_pkey(s);
3096 return ssl_cert_set_current(s->cert, larg);
3098 #ifndef OPENSSL_NO_EC
3099 case SSL_CTRL_GET_GROUPS:
3101 unsigned char *clist;
3106 clist = s->session->ext.supportedgroups;
3107 clistlen = s->session->ext.supportedgroups_len / 2;
3111 unsigned int cid, nid;
3112 for (i = 0; i < clistlen; i++) {
3114 /* TODO(TLS1.3): Handle DH groups here */
3115 nid = tls1_ec_curve_id2nid(cid, NULL);
3119 cptr[i] = TLSEXT_nid_unknown | cid;
3122 return (int)clistlen;
3125 case SSL_CTRL_SET_GROUPS:
3126 return tls1_set_groups(&s->ext.supportedgroups,
3127 &s->ext.supportedgroups_len, parg, larg);
3129 case SSL_CTRL_SET_GROUPS_LIST:
3130 return tls1_set_groups_list(&s->ext.supportedgroups,
3131 &s->ext.supportedgroups_len, parg);
3133 case SSL_CTRL_GET_SHARED_GROUP:
3134 return tls1_shared_group(s, larg);
3137 case SSL_CTRL_SET_SIGALGS:
3138 return tls1_set_sigalgs(s->cert, parg, larg, 0);
3140 case SSL_CTRL_SET_SIGALGS_LIST:
3141 return tls1_set_sigalgs_list(s->cert, parg, 0);
3143 case SSL_CTRL_SET_CLIENT_SIGALGS:
3144 return tls1_set_sigalgs(s->cert, parg, larg, 1);
3146 case SSL_CTRL_SET_CLIENT_SIGALGS_LIST:
3147 return tls1_set_sigalgs_list(s->cert, parg, 1);
3149 case SSL_CTRL_GET_CLIENT_CERT_TYPES:
3151 const unsigned char **pctype = parg;
3152 if (s->server || !s->s3->tmp.cert_req)
3154 if (s->cert->ctypes) {
3156 *pctype = s->cert->ctypes;
3157 return (int)s->cert->ctype_num;
3160 *pctype = (unsigned char *)s->s3->tmp.ctype;
3161 return s->s3->tmp.ctype_num;
3164 case SSL_CTRL_SET_CLIENT_CERT_TYPES:
3167 return ssl3_set_req_cert_type(s->cert, parg, larg);
3169 case SSL_CTRL_BUILD_CERT_CHAIN:
3170 return ssl_build_cert_chain(s, NULL, larg);
3172 case SSL_CTRL_SET_VERIFY_CERT_STORE:
3173 return ssl_cert_set_cert_store(s->cert, parg, 0, larg);
3175 case SSL_CTRL_SET_CHAIN_CERT_STORE:
3176 return ssl_cert_set_cert_store(s->cert, parg, 1, larg);
3178 case SSL_CTRL_GET_PEER_SIGNATURE_NID:
3179 if (s->s3->tmp.peer_sigalg == NULL)
3181 *(int *)parg = s->s3->tmp.peer_sigalg->hash;
3184 case SSL_CTRL_GET_SERVER_TMP_KEY:
3185 #if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_EC)
3186 if (s->server || s->session == NULL || s->s3->peer_tmp == NULL) {
3189 EVP_PKEY_up_ref(s->s3->peer_tmp);
3190 *(EVP_PKEY **)parg = s->s3->peer_tmp;
3196 #ifndef OPENSSL_NO_EC
3197 case SSL_CTRL_GET_EC_POINT_FORMATS:
3199 SSL_SESSION *sess = s->session;
3200 const unsigned char **pformat = parg;
3202 if (sess == NULL || sess->ext.ecpointformats == NULL)
3204 *pformat = sess->ext.ecpointformats;
3205 return (int)sess->ext.ecpointformats_len;
3215 long ssl3_callback_ctrl(SSL *s, int cmd, void (*fp) (void))
3220 #ifndef OPENSSL_NO_DH
3221 case SSL_CTRL_SET_TMP_DH_CB:
3223 s->cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))fp;
3227 case SSL_CTRL_SET_TLSEXT_DEBUG_CB:
3228 s->ext.debug_cb = (void (*)(SSL *, int, int,
3229 const unsigned char *, int, void *))fp;
3232 case SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB:
3234 s->not_resumable_session_cb = (int (*)(SSL *, int))fp;
3243 long ssl3_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg)
3246 #ifndef OPENSSL_NO_DH
3247 case SSL_CTRL_SET_TMP_DH:
3249 DH *dh = (DH *)parg;
3250 EVP_PKEY *pkdh = NULL;
3252 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_PASSED_NULL_PARAMETER);
3255 pkdh = ssl_dh_to_pkey(dh);
3257 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_MALLOC_FAILURE);
3260 if (!ssl_ctx_security(ctx, SSL_SECOP_TMP_DH,
3261 EVP_PKEY_security_bits(pkdh), 0, pkdh)) {
3262 SSLerr(SSL_F_SSL3_CTX_CTRL, SSL_R_DH_KEY_TOO_SMALL);
3263 EVP_PKEY_free(pkdh);
3266 EVP_PKEY_free(ctx->cert->dh_tmp);
3267 ctx->cert->dh_tmp = pkdh;
3273 case SSL_CTRL_SET_TMP_DH_CB:
3275 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
3278 case SSL_CTRL_SET_DH_AUTO:
3279 ctx->cert->dh_tmp_auto = larg;
3282 #ifndef OPENSSL_NO_EC
3283 case SSL_CTRL_SET_TMP_ECDH:
3285 const EC_GROUP *group = NULL;
3289 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_PASSED_NULL_PARAMETER);
3292 group = EC_KEY_get0_group((const EC_KEY *)parg);
3293 if (group == NULL) {
3294 SSLerr(SSL_F_SSL3_CTX_CTRL, EC_R_MISSING_PARAMETERS);
3297 nid = EC_GROUP_get_curve_name(group);
3298 if (nid == NID_undef)
3300 return tls1_set_groups(&ctx->ext.supportedgroups,
3301 &ctx->ext.supportedgroups_len,
3305 #endif /* !OPENSSL_NO_EC */
3306 case SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG:
3307 ctx->ext.servername_arg = parg;
3309 case SSL_CTRL_SET_TLSEXT_TICKET_KEYS:
3310 case SSL_CTRL_GET_TLSEXT_TICKET_KEYS:
3312 unsigned char *keys = parg;
3313 long tick_keylen = (sizeof(ctx->ext.tick_key_name) +
3314 sizeof(ctx->ext.tick_hmac_key) +
3315 sizeof(ctx->ext.tick_aes_key));
3318 if (larg != tick_keylen) {
3319 SSLerr(SSL_F_SSL3_CTX_CTRL, SSL_R_INVALID_TICKET_KEYS_LENGTH);
3322 if (cmd == SSL_CTRL_SET_TLSEXT_TICKET_KEYS) {
3323 memcpy(ctx->ext.tick_key_name, keys,
3324 sizeof(ctx->ext.tick_key_name));
3325 memcpy(ctx->ext.tick_hmac_key,
3326 keys + sizeof(ctx->ext.tick_key_name),
3327 sizeof(ctx->ext.tick_hmac_key));
3328 memcpy(ctx->ext.tick_aes_key,
3329 keys + sizeof(ctx->ext.tick_key_name) +
3330 sizeof(ctx->ext.tick_hmac_key),
3331 sizeof(ctx->ext.tick_aes_key));
3333 memcpy(keys, ctx->ext.tick_key_name,
3334 sizeof(ctx->ext.tick_key_name));
3335 memcpy(keys + sizeof(ctx->ext.tick_key_name),
3336 ctx->ext.tick_hmac_key,
3337 sizeof(ctx->ext.tick_hmac_key));
3338 memcpy(keys + sizeof(ctx->ext.tick_key_name) +
3339 sizeof(ctx->ext.tick_hmac_key),
3340 ctx->ext.tick_aes_key,
3341 sizeof(ctx->ext.tick_aes_key));
3346 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE:
3347 return ctx->ext.status_type;
3349 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE:
3350 ctx->ext.status_type = larg;
3353 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB_ARG:
3354 ctx->ext.status_arg = parg;
3357 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_CB_ARG:
3358 *(void**)parg = ctx->ext.status_arg;
3361 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_CB:
3362 *(int (**)(SSL*, void*))parg = ctx->ext.status_cb;
3365 #ifndef OPENSSL_NO_SRP
3366 case SSL_CTRL_SET_TLS_EXT_SRP_USERNAME:
3367 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
3368 OPENSSL_free(ctx->srp_ctx.login);
3369 ctx->srp_ctx.login = NULL;
3372 if (strlen((const char *)parg) > 255 || strlen((const char *)parg) < 1) {
3373 SSLerr(SSL_F_SSL3_CTX_CTRL, SSL_R_INVALID_SRP_USERNAME);
3376 if ((ctx->srp_ctx.login = OPENSSL_strdup((char *)parg)) == NULL) {
3377 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_INTERNAL_ERROR);
3381 case SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD:
3382 ctx->srp_ctx.SRP_give_srp_client_pwd_callback =
3383 srp_password_from_info_cb;
3384 ctx->srp_ctx.info = parg;
3386 case SSL_CTRL_SET_SRP_ARG:
3387 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
3388 ctx->srp_ctx.SRP_cb_arg = parg;
3391 case SSL_CTRL_SET_TLS_EXT_SRP_STRENGTH:
3392 ctx->srp_ctx.strength = larg;
3396 #ifndef OPENSSL_NO_EC
3397 case SSL_CTRL_SET_GROUPS:
3398 return tls1_set_groups(&ctx->ext.supportedgroups,
3399 &ctx->ext.supportedgroups_len,
3402 case SSL_CTRL_SET_GROUPS_LIST:
3403 return tls1_set_groups_list(&ctx->ext.supportedgroups,
3404 &ctx->ext.supportedgroups_len,
3407 case SSL_CTRL_SET_SIGALGS:
3408 return tls1_set_sigalgs(ctx->cert, parg, larg, 0);
3410 case SSL_CTRL_SET_SIGALGS_LIST:
3411 return tls1_set_sigalgs_list(ctx->cert, parg, 0);
3413 case SSL_CTRL_SET_CLIENT_SIGALGS:
3414 return tls1_set_sigalgs(ctx->cert, parg, larg, 1);
3416 case SSL_CTRL_SET_CLIENT_SIGALGS_LIST:
3417 return tls1_set_sigalgs_list(ctx->cert, parg, 1);
3419 case SSL_CTRL_SET_CLIENT_CERT_TYPES:
3420 return ssl3_set_req_cert_type(ctx->cert, parg, larg);
3422 case SSL_CTRL_BUILD_CERT_CHAIN:
3423 return ssl_build_cert_chain(NULL, ctx, larg);
3425 case SSL_CTRL_SET_VERIFY_CERT_STORE:
3426 return ssl_cert_set_cert_store(ctx->cert, parg, 0, larg);
3428 case SSL_CTRL_SET_CHAIN_CERT_STORE:
3429 return ssl_cert_set_cert_store(ctx->cert, parg, 1, larg);
3431 /* A Thawte special :-) */
3432 case SSL_CTRL_EXTRA_CHAIN_CERT:
3433 if (ctx->extra_certs == NULL) {
3434 if ((ctx->extra_certs = sk_X509_new_null()) == NULL) {
3435 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_MALLOC_FAILURE);
3439 if (!sk_X509_push(ctx->extra_certs, (X509 *)parg)) {
3440 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_MALLOC_FAILURE);
3445 case SSL_CTRL_GET_EXTRA_CHAIN_CERTS:
3446 if (ctx->extra_certs == NULL && larg == 0)
3447 *(STACK_OF(X509) **)parg = ctx->cert->key->chain;
3449 *(STACK_OF(X509) **)parg = ctx->extra_certs;
3452 case SSL_CTRL_CLEAR_EXTRA_CHAIN_CERTS:
3453 sk_X509_pop_free(ctx->extra_certs, X509_free);
3454 ctx->extra_certs = NULL;
3457 case SSL_CTRL_CHAIN:
3459 return ssl_cert_set1_chain(NULL, ctx, (STACK_OF(X509) *)parg);
3461 return ssl_cert_set0_chain(NULL, ctx, (STACK_OF(X509) *)parg);
3463 case SSL_CTRL_CHAIN_CERT:
3465 return ssl_cert_add1_chain_cert(NULL, ctx, (X509 *)parg);
3467 return ssl_cert_add0_chain_cert(NULL, ctx, (X509 *)parg);
3469 case SSL_CTRL_GET_CHAIN_CERTS:
3470 *(STACK_OF(X509) **)parg = ctx->cert->key->chain;
3473 case SSL_CTRL_SELECT_CURRENT_CERT:
3474 return ssl_cert_select_current(ctx->cert, (X509 *)parg);
3476 case SSL_CTRL_SET_CURRENT_CERT:
3477 return ssl_cert_set_current(ctx->cert, larg);
3485 long ssl3_ctx_callback_ctrl(SSL_CTX *ctx, int cmd, void (*fp) (void))
3488 #ifndef OPENSSL_NO_DH
3489 case SSL_CTRL_SET_TMP_DH_CB:
3491 ctx->cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))fp;
3495 case SSL_CTRL_SET_TLSEXT_SERVERNAME_CB:
3496 ctx->ext.servername_cb = (int (*)(SSL *, int *, void *))fp;
3499 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB:
3500 ctx->ext.status_cb = (int (*)(SSL *, void *))fp;
3503 case SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB:
3504 ctx->ext.ticket_key_cb = (int (*)(SSL *, unsigned char *,
3507 HMAC_CTX *, int))fp;
3510 #ifndef OPENSSL_NO_SRP
3511 case SSL_CTRL_SET_SRP_VERIFY_PARAM_CB:
3512 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
3513 ctx->srp_ctx.SRP_verify_param_callback = (int (*)(SSL *, void *))fp;
3515 case SSL_CTRL_SET_TLS_EXT_SRP_USERNAME_CB:
3516 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
3517 ctx->srp_ctx.TLS_ext_srp_username_callback =
3518 (int (*)(SSL *, int *, void *))fp;
3520 case SSL_CTRL_SET_SRP_GIVE_CLIENT_PWD_CB:
3521 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
3522 ctx->srp_ctx.SRP_give_srp_client_pwd_callback =
3523 (char *(*)(SSL *, void *))fp;
3526 case SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB:
3528 ctx->not_resumable_session_cb = (int (*)(SSL *, int))fp;
3537 const SSL_CIPHER *ssl3_get_cipher_by_id(uint32_t id)
3542 return OBJ_bsearch_ssl_cipher_id(&c, ssl3_ciphers, SSL3_NUM_CIPHERS);
3546 * This function needs to check if the ciphers required are actually
3549 const SSL_CIPHER *ssl3_get_cipher_by_char(const unsigned char *p)
3551 return ssl3_get_cipher_by_id(SSL3_CK_CIPHERSUITE_FLAG
3552 | ((uint32_t)p[0] << 8L)
3556 int ssl3_put_cipher_by_char(const SSL_CIPHER *c, WPACKET *pkt, size_t *len)
3558 if ((c->id & 0xff000000) != SSL3_CK_CIPHERSUITE_FLAG) {
3563 if (!WPACKET_put_bytes_u16(pkt, c->id & 0xffff))
3571 * ssl3_choose_cipher - choose a cipher from those offered by the client
3572 * @s: SSL connection
3573 * @clnt: ciphers offered by the client
3574 * @srvr: ciphers enabled on the server?
3576 * Returns the selected cipher or NULL when no common ciphers.
3578 const SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt,
3579 STACK_OF(SSL_CIPHER) *srvr)
3581 const SSL_CIPHER *c, *ret = NULL;
3582 STACK_OF(SSL_CIPHER) *prio, *allow;
3584 unsigned long alg_k, alg_a, mask_k, mask_a;
3586 /* Let's see which ciphers we can support */
3590 * Do not set the compare functions, because this may lead to a
3591 * reordering by "id". We want to keep the original ordering. We may pay
3592 * a price in performance during sk_SSL_CIPHER_find(), but would have to
3593 * pay with the price of sk_SSL_CIPHER_dup().
3595 sk_SSL_CIPHER_set_cmp_func(srvr, ssl_cipher_ptr_id_cmp);
3596 sk_SSL_CIPHER_set_cmp_func(clnt, ssl_cipher_ptr_id_cmp);
3600 fprintf(stderr, "Server has %d from %p:\n", sk_SSL_CIPHER_num(srvr),
3602 for (i = 0; i < sk_SSL_CIPHER_num(srvr); ++i) {
3603 c = sk_SSL_CIPHER_value(srvr, i);
3604 fprintf(stderr, "%p:%s\n", (void *)c, c->name);
3606 fprintf(stderr, "Client sent %d from %p:\n", sk_SSL_CIPHER_num(clnt),
3608 for (i = 0; i < sk_SSL_CIPHER_num(clnt); ++i) {
3609 c = sk_SSL_CIPHER_value(clnt, i);
3610 fprintf(stderr, "%p:%s\n", (void *)c, c->name);
3614 if (s->options & SSL_OP_CIPHER_SERVER_PREFERENCE || tls1_suiteb(s)) {
3622 tls1_set_cert_validity(s);
3625 for (i = 0; i < sk_SSL_CIPHER_num(prio); i++) {
3626 c = sk_SSL_CIPHER_value(prio, i);
3628 /* Skip ciphers not supported by the protocol version */
3629 if (!SSL_IS_DTLS(s) &&
3630 ((s->version < c->min_tls) || (s->version > c->max_tls)))
3632 if (SSL_IS_DTLS(s) &&
3633 (DTLS_VERSION_LT(s->version, c->min_dtls) ||
3634 DTLS_VERSION_GT(s->version, c->max_dtls)))
3637 * Since TLS 1.3 ciphersuites can be used with any auth or
3638 * key exchange scheme skip tests.
3640 if (!SSL_IS_TLS13(s)) {
3641 mask_k = s->s3->tmp.mask_k;
3642 mask_a = s->s3->tmp.mask_a;
3643 #ifndef OPENSSL_NO_SRP
3644 if (s->srp_ctx.srp_Mask & SSL_kSRP) {
3650 alg_k = c->algorithm_mkey;
3651 alg_a = c->algorithm_auth;
3653 #ifndef OPENSSL_NO_PSK
3654 /* with PSK there must be server callback set */
3655 if ((alg_k & SSL_PSK) && s->psk_server_callback == NULL)
3657 #endif /* OPENSSL_NO_PSK */
3659 ok = (alg_k & mask_k) && (alg_a & mask_a);
3661 fprintf(stderr, "%d:[%08lX:%08lX:%08lX:%08lX]%p:%s\n", ok, alg_k,
3662 alg_a, mask_k, mask_a, (void *)c, c->name);
3665 #ifndef OPENSSL_NO_EC
3667 * if we are considering an ECC cipher suite that uses an ephemeral
3670 if (alg_k & SSL_kECDHE)
3671 ok = ok && tls1_check_ec_tmp_key(s, c->id);
3672 #endif /* OPENSSL_NO_EC */
3677 ii = sk_SSL_CIPHER_find(allow, c);
3679 /* Check security callback permits this cipher */
3680 if (!ssl_security(s, SSL_SECOP_CIPHER_SHARED,
3681 c->strength_bits, 0, (void *)c))
3683 #if !defined(OPENSSL_NO_EC)
3684 if ((alg_k & SSL_kECDHE) && (alg_a & SSL_aECDSA)
3685 && s->s3->is_probably_safari) {
3687 ret = sk_SSL_CIPHER_value(allow, ii);
3691 ret = sk_SSL_CIPHER_value(allow, ii);
3698 int ssl3_get_req_cert_type(SSL *s, WPACKET *pkt)
3700 uint32_t alg_k, alg_a = 0;
3702 /* If we have custom certificate types set, use them */
3703 if (s->cert->ctypes) {
3704 return WPACKET_memcpy(pkt, s->cert->ctypes, s->cert->ctype_num);
3706 /* Get mask of algorithms disabled by signature list */
3707 ssl_set_sig_mask(&alg_a, s, SSL_SECOP_SIGALG_MASK);
3709 alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
3711 #ifndef OPENSSL_NO_GOST
3712 if (s->version >= TLS1_VERSION && (alg_k & SSL_kGOST))
3713 return WPACKET_put_bytes_u8(pkt, TLS_CT_GOST01_SIGN)
3714 && WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_SIGN)
3715 && WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_512_SIGN);
3718 if ((s->version == SSL3_VERSION) && (alg_k & SSL_kDHE)) {
3719 #ifndef OPENSSL_NO_DH
3720 # ifndef OPENSSL_NO_RSA
3721 if (!WPACKET_put_bytes_u8(pkt, SSL3_CT_RSA_EPHEMERAL_DH))
3724 # ifndef OPENSSL_NO_DSA
3725 if (!WPACKET_put_bytes_u8(pkt, SSL3_CT_DSS_EPHEMERAL_DH))
3728 #endif /* !OPENSSL_NO_DH */
3730 #ifndef OPENSSL_NO_RSA
3731 if (!(alg_a & SSL_aRSA) && !WPACKET_put_bytes_u8(pkt, SSL3_CT_RSA_SIGN))
3734 #ifndef OPENSSL_NO_DSA
3735 if (!(alg_a & SSL_aDSS) && !WPACKET_put_bytes_u8(pkt, SSL3_CT_DSS_SIGN))
3738 #ifndef OPENSSL_NO_EC
3740 * ECDSA certs can be used with RSA cipher suites too so we don't
3741 * need to check for SSL_kECDH or SSL_kECDHE
3743 if (s->version >= TLS1_VERSION
3744 && !(alg_a & SSL_aECDSA)
3745 && !WPACKET_put_bytes_u8(pkt, TLS_CT_ECDSA_SIGN))
3751 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len)
3753 OPENSSL_free(c->ctypes);
3759 c->ctypes = OPENSSL_malloc(len);
3760 if (c->ctypes == NULL)
3762 memcpy(c->ctypes, p, len);
3767 int ssl3_shutdown(SSL *s)
3772 * Don't do anything much if we have not done the handshake or we don't
3773 * want to send messages :-)
3775 if (s->quiet_shutdown || SSL_in_before(s)) {
3776 s->shutdown = (SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN);
3780 if (!(s->shutdown & SSL_SENT_SHUTDOWN)) {
3781 s->shutdown |= SSL_SENT_SHUTDOWN;
3782 ssl3_send_alert(s, SSL3_AL_WARNING, SSL_AD_CLOSE_NOTIFY);
3784 * our shutdown alert has been sent now, and if it still needs to be
3785 * written, s->s3->alert_dispatch will be true
3787 if (s->s3->alert_dispatch)
3788 return (-1); /* return WANT_WRITE */
3789 } else if (s->s3->alert_dispatch) {
3790 /* resend it if not sent */
3791 ret = s->method->ssl_dispatch_alert(s);
3794 * we only get to return -1 here the 2nd/Nth invocation, we must
3795 * have already signalled return 0 upon a previous invocation,
3800 } else if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN)) {
3803 * If we are waiting for a close from our peer, we are closed
3805 s->method->ssl_read_bytes(s, 0, NULL, NULL, 0, 0, &readbytes);
3806 if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN)) {
3807 return -1; /* return WANT_READ */
3811 if ((s->shutdown == (SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN)) &&
3812 !s->s3->alert_dispatch)
3818 int ssl3_write(SSL *s, const void *buf, size_t len, size_t *written)
3821 if (s->s3->renegotiate)
3822 ssl3_renegotiate_check(s, 0);
3824 return s->method->ssl_write_bytes(s, SSL3_RT_APPLICATION_DATA, buf, len,
3828 static int ssl3_read_internal(SSL *s, void *buf, size_t len, int peek,
3834 if (s->s3->renegotiate)
3835 ssl3_renegotiate_check(s, 0);
3836 s->s3->in_read_app_data = 1;
3838 s->method->ssl_read_bytes(s, SSL3_RT_APPLICATION_DATA, NULL, buf, len,
3840 if ((ret == -1) && (s->s3->in_read_app_data == 2)) {
3842 * ssl3_read_bytes decided to call s->handshake_func, which called
3843 * ssl3_read_bytes to read handshake data. However, ssl3_read_bytes
3844 * actually found application data and thinks that application data
3845 * makes sense here; so disable handshake processing and try to read
3846 * application data again.
3848 ossl_statem_set_in_handshake(s, 1);
3850 s->method->ssl_read_bytes(s, SSL3_RT_APPLICATION_DATA, NULL, buf,
3851 len, peek, readbytes);
3852 ossl_statem_set_in_handshake(s, 0);
3854 s->s3->in_read_app_data = 0;
3859 int ssl3_read(SSL *s, void *buf, size_t len, size_t *readbytes)
3861 return ssl3_read_internal(s, buf, len, 0, readbytes);
3864 int ssl3_peek(SSL *s, void *buf, size_t len, size_t *readbytes)
3866 return ssl3_read_internal(s, buf, len, 1, readbytes);
3869 int ssl3_renegotiate(SSL *s)
3871 if (s->handshake_func == NULL)
3874 s->s3->renegotiate = 1;
3879 * Check if we are waiting to do a renegotiation and if so whether now is a
3880 * good time to do it. If |initok| is true then we are being called from inside
3881 * the state machine so ignore the result of SSL_in_init(s). Otherwise we
3882 * should not do a renegotiation if SSL_in_init(s) is true. Returns 1 if we
3883 * should do a renegotiation now and sets up the state machine for it. Otherwise
3886 int ssl3_renegotiate_check(SSL *s, int initok)
3890 if (s->s3->renegotiate) {
3891 if (!RECORD_LAYER_read_pending(&s->rlayer)
3892 && !RECORD_LAYER_write_pending(&s->rlayer)
3893 && (initok || !SSL_in_init(s))) {
3895 * if we are the server, and we have sent a 'RENEGOTIATE'
3896 * message, we need to set the state machine into the renegotiate
3899 ossl_statem_set_renegotiate(s);
3900 s->s3->renegotiate = 0;
3901 s->s3->num_renegotiations++;
3902 s->s3->total_renegotiations++;
3910 * If we are using default SHA1+MD5 algorithms switch to new SHA256 PRF and
3911 * handshake macs if required.
3913 * If PSK and using SHA384 for TLS < 1.2 switch to default.
3915 long ssl_get_algorithm2(SSL *s)
3918 if (s->s3 == NULL || s->s3->tmp.new_cipher == NULL)
3920 alg2 = s->s3->tmp.new_cipher->algorithm2;
3921 if (s->method->ssl3_enc->enc_flags & SSL_ENC_FLAG_SHA256_PRF) {
3922 if (alg2 == (SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF))
3923 return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;
3924 } else if (s->s3->tmp.new_cipher->algorithm_mkey & SSL_PSK) {
3925 if (alg2 == (SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384))
3926 return SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF;
3932 * Fill a ClientRandom or ServerRandom field of length len. Returns <= 0 on
3933 * failure, 1 on success.
3935 int ssl_fill_hello_random(SSL *s, int server, unsigned char *result, size_t len)
3942 send_time = (s->mode & SSL_MODE_SEND_SERVERHELLO_TIME) != 0;
3944 send_time = (s->mode & SSL_MODE_SEND_CLIENTHELLO_TIME) != 0;
3946 unsigned long Time = (unsigned long)time(NULL);
3947 unsigned char *p = result;
3949 /* TODO(size_t): Convert this */
3950 return RAND_bytes(p, (int)(len - 4));
3952 return RAND_bytes(result, (int)len);
3955 int ssl_generate_master_secret(SSL *s, unsigned char *pms, size_t pmslen,
3958 unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
3961 if (alg_k & SSL_PSK) {
3962 #ifndef OPENSSL_NO_PSK
3963 unsigned char *pskpms, *t;
3964 size_t psklen = s->s3->tmp.psklen;
3967 /* create PSK premaster_secret */
3969 /* For plain PSK "other_secret" is psklen zeroes */
3970 if (alg_k & SSL_kPSK)
3973 pskpmslen = 4 + pmslen + psklen;
3974 pskpms = OPENSSL_malloc(pskpmslen);
3979 if (alg_k & SSL_kPSK)
3980 memset(t, 0, pmslen);
3982 memcpy(t, pms, pmslen);
3985 memcpy(t, s->s3->tmp.psk, psklen);
3987 OPENSSL_clear_free(s->s3->tmp.psk, psklen);
3988 s->s3->tmp.psk = NULL;
3989 if (!s->method->ssl3_enc->generate_master_secret(s,
3990 s->session->master_key,pskpms, pskpmslen,
3991 &s->session->master_key_length))
3993 OPENSSL_clear_free(pskpms, pskpmslen);
3995 /* Should never happen */
3999 if (!s->method->ssl3_enc->generate_master_secret(s,
4000 s->session->master_key, pms, pmslen,
4001 &s->session->master_key_length))
4009 OPENSSL_clear_free(pms, pmslen);
4011 OPENSSL_cleanse(pms, pmslen);
4014 s->s3->tmp.pms = NULL;
4018 /* Generate a private key from parameters */
4019 EVP_PKEY *ssl_generate_pkey(EVP_PKEY *pm)
4021 EVP_PKEY_CTX *pctx = NULL;
4022 EVP_PKEY *pkey = NULL;
4026 pctx = EVP_PKEY_CTX_new(pm, NULL);
4029 if (EVP_PKEY_keygen_init(pctx) <= 0)
4031 if (EVP_PKEY_keygen(pctx, &pkey) <= 0) {
4032 EVP_PKEY_free(pkey);
4037 EVP_PKEY_CTX_free(pctx);
4040 #ifndef OPENSSL_NO_EC
4041 /* Generate a private key a curve ID */
4042 EVP_PKEY *ssl_generate_pkey_curve(int id)
4044 EVP_PKEY_CTX *pctx = NULL;
4045 EVP_PKEY *pkey = NULL;
4046 unsigned int curve_flags;
4047 int nid = tls1_ec_curve_id2nid(id, &curve_flags);
4051 if ((curve_flags & TLS_CURVE_TYPE) == TLS_CURVE_CUSTOM) {
4052 pctx = EVP_PKEY_CTX_new_id(nid, NULL);
4055 pctx = EVP_PKEY_CTX_new_id(EVP_PKEY_EC, NULL);
4059 if (EVP_PKEY_keygen_init(pctx) <= 0)
4061 if (nid != 0 && EVP_PKEY_CTX_set_ec_paramgen_curve_nid(pctx, nid) <= 0)
4063 if (EVP_PKEY_keygen(pctx, &pkey) <= 0) {
4064 EVP_PKEY_free(pkey);
4069 EVP_PKEY_CTX_free(pctx);
4074 /* Derive secrets for ECDH/DH */
4075 int ssl_derive(SSL *s, EVP_PKEY *privkey, EVP_PKEY *pubkey, int gensecret)
4078 unsigned char *pms = NULL;
4082 if (privkey == NULL || pubkey == NULL)
4085 pctx = EVP_PKEY_CTX_new(privkey, NULL);
4087 if (EVP_PKEY_derive_init(pctx) <= 0
4088 || EVP_PKEY_derive_set_peer(pctx, pubkey) <= 0
4089 || EVP_PKEY_derive(pctx, NULL, &pmslen) <= 0) {
4093 pms = OPENSSL_malloc(pmslen);
4097 if (EVP_PKEY_derive(pctx, pms, &pmslen) <= 0)
4101 if (SSL_IS_TLS13(s)) {
4103 * If we are resuming then we already generated the early secret
4104 * when we created the ClientHello, so don't recreate it.
4107 rv = tls13_generate_secret(s, ssl_handshake_md(s), NULL, NULL,
4109 (unsigned char *)&s->early_secret);
4113 rv = rv && tls13_generate_handshake_secret(s, pms, pmslen);
4115 rv = ssl_generate_master_secret(s, pms, pmslen, 0);
4118 /* Save premaster secret */
4119 s->s3->tmp.pms = pms;
4120 s->s3->tmp.pmslen = pmslen;
4126 OPENSSL_clear_free(pms, pmslen);
4127 EVP_PKEY_CTX_free(pctx);
4131 #ifndef OPENSSL_NO_DH
4132 EVP_PKEY *ssl_dh_to_pkey(DH *dh)
4137 ret = EVP_PKEY_new();
4138 if (EVP_PKEY_set1_DH(ret, dh) <= 0) {