2 * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved.
3 * Copyright (c) 2002, Oracle and/or its affiliates. All rights reserved
4 * Copyright 2005 Nokia. All rights reserved.
6 * Licensed under the Apache License 2.0 (the "License"). You may not use
7 * this file except in compliance with the License. You can obtain a copy
8 * in the file LICENSE in the source distribution or at
9 * https://www.openssl.org/source/license.html
13 #include <openssl/objects.h>
14 #include "internal/nelem.h"
15 #include "ssl_local.h"
16 #include <openssl/md5.h>
17 #include <openssl/dh.h>
18 #include <openssl/rand.h>
19 #include <openssl/trace.h>
20 #include <openssl/x509v3.h>
21 #include <openssl/core_names.h>
22 #include "internal/cryptlib.h"
24 #define TLS13_NUM_CIPHERS OSSL_NELEM(tls13_ciphers)
25 #define SSL3_NUM_CIPHERS OSSL_NELEM(ssl3_ciphers)
26 #define SSL3_NUM_SCSVS OSSL_NELEM(ssl3_scsvs)
28 /* TLSv1.3 downgrade protection sentinel values */
29 const unsigned char tls11downgrade[] = {
30 0x44, 0x4f, 0x57, 0x4e, 0x47, 0x52, 0x44, 0x00
32 const unsigned char tls12downgrade[] = {
33 0x44, 0x4f, 0x57, 0x4e, 0x47, 0x52, 0x44, 0x01
36 /* The list of available TLSv1.3 ciphers */
37 static SSL_CIPHER tls13_ciphers[] = {
40 TLS1_3_RFC_AES_128_GCM_SHA256,
41 TLS1_3_RFC_AES_128_GCM_SHA256,
42 TLS1_3_CK_AES_128_GCM_SHA256,
47 TLS1_3_VERSION, TLS1_3_VERSION,
50 SSL_HANDSHAKE_MAC_SHA256,
55 TLS1_3_RFC_AES_256_GCM_SHA384,
56 TLS1_3_RFC_AES_256_GCM_SHA384,
57 TLS1_3_CK_AES_256_GCM_SHA384,
62 TLS1_3_VERSION, TLS1_3_VERSION,
65 SSL_HANDSHAKE_MAC_SHA384,
69 #if !defined(OPENSSL_NO_CHACHA) && !defined(OPENSSL_NO_POLY1305)
72 TLS1_3_RFC_CHACHA20_POLY1305_SHA256,
73 TLS1_3_RFC_CHACHA20_POLY1305_SHA256,
74 TLS1_3_CK_CHACHA20_POLY1305_SHA256,
79 TLS1_3_VERSION, TLS1_3_VERSION,
82 SSL_HANDSHAKE_MAC_SHA256,
89 TLS1_3_RFC_AES_128_CCM_SHA256,
90 TLS1_3_RFC_AES_128_CCM_SHA256,
91 TLS1_3_CK_AES_128_CCM_SHA256,
96 TLS1_3_VERSION, TLS1_3_VERSION,
98 SSL_NOT_DEFAULT | SSL_HIGH,
99 SSL_HANDSHAKE_MAC_SHA256,
104 TLS1_3_RFC_AES_128_CCM_8_SHA256,
105 TLS1_3_RFC_AES_128_CCM_8_SHA256,
106 TLS1_3_CK_AES_128_CCM_8_SHA256,
111 TLS1_3_VERSION, TLS1_3_VERSION,
113 SSL_NOT_DEFAULT | SSL_HIGH,
114 SSL_HANDSHAKE_MAC_SHA256,
121 * The list of available ciphers, mostly organized into the following
126 * SRP (within that: RSA EC PSK)
127 * Cipher families: Chacha/poly, Camellia, Gost, IDEA, SEED
130 static SSL_CIPHER ssl3_ciphers[] = {
133 SSL3_TXT_RSA_NULL_MD5,
134 SSL3_RFC_RSA_NULL_MD5,
135 SSL3_CK_RSA_NULL_MD5,
140 SSL3_VERSION, TLS1_2_VERSION,
141 DTLS1_BAD_VER, DTLS1_2_VERSION,
143 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
149 SSL3_TXT_RSA_NULL_SHA,
150 SSL3_RFC_RSA_NULL_SHA,
151 SSL3_CK_RSA_NULL_SHA,
156 SSL3_VERSION, TLS1_2_VERSION,
157 DTLS1_BAD_VER, DTLS1_2_VERSION,
158 SSL_STRONG_NONE | SSL_FIPS,
159 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
163 #ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
166 SSL3_TXT_RSA_DES_192_CBC3_SHA,
167 SSL3_RFC_RSA_DES_192_CBC3_SHA,
168 SSL3_CK_RSA_DES_192_CBC3_SHA,
173 SSL3_VERSION, TLS1_2_VERSION,
174 DTLS1_BAD_VER, DTLS1_2_VERSION,
175 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
176 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
182 SSL3_TXT_DHE_DSS_DES_192_CBC3_SHA,
183 SSL3_RFC_DHE_DSS_DES_192_CBC3_SHA,
184 SSL3_CK_DHE_DSS_DES_192_CBC3_SHA,
189 SSL3_VERSION, TLS1_2_VERSION,
190 DTLS1_BAD_VER, DTLS1_2_VERSION,
191 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
192 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
198 SSL3_TXT_DHE_RSA_DES_192_CBC3_SHA,
199 SSL3_RFC_DHE_RSA_DES_192_CBC3_SHA,
200 SSL3_CK_DHE_RSA_DES_192_CBC3_SHA,
205 SSL3_VERSION, TLS1_2_VERSION,
206 DTLS1_BAD_VER, DTLS1_2_VERSION,
207 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
208 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
214 SSL3_TXT_ADH_DES_192_CBC_SHA,
215 SSL3_RFC_ADH_DES_192_CBC_SHA,
216 SSL3_CK_ADH_DES_192_CBC_SHA,
221 SSL3_VERSION, TLS1_2_VERSION,
222 DTLS1_BAD_VER, DTLS1_2_VERSION,
223 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
224 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
231 TLS1_TXT_RSA_WITH_AES_128_SHA,
232 TLS1_RFC_RSA_WITH_AES_128_SHA,
233 TLS1_CK_RSA_WITH_AES_128_SHA,
238 SSL3_VERSION, TLS1_2_VERSION,
239 DTLS1_BAD_VER, DTLS1_2_VERSION,
241 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
247 TLS1_TXT_DHE_DSS_WITH_AES_128_SHA,
248 TLS1_RFC_DHE_DSS_WITH_AES_128_SHA,
249 TLS1_CK_DHE_DSS_WITH_AES_128_SHA,
254 SSL3_VERSION, TLS1_2_VERSION,
255 DTLS1_BAD_VER, DTLS1_2_VERSION,
256 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
257 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
263 TLS1_TXT_DHE_RSA_WITH_AES_128_SHA,
264 TLS1_RFC_DHE_RSA_WITH_AES_128_SHA,
265 TLS1_CK_DHE_RSA_WITH_AES_128_SHA,
270 SSL3_VERSION, TLS1_2_VERSION,
271 DTLS1_BAD_VER, DTLS1_2_VERSION,
273 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
279 TLS1_TXT_ADH_WITH_AES_128_SHA,
280 TLS1_RFC_ADH_WITH_AES_128_SHA,
281 TLS1_CK_ADH_WITH_AES_128_SHA,
286 SSL3_VERSION, TLS1_2_VERSION,
287 DTLS1_BAD_VER, DTLS1_2_VERSION,
288 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
289 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
295 TLS1_TXT_RSA_WITH_AES_256_SHA,
296 TLS1_RFC_RSA_WITH_AES_256_SHA,
297 TLS1_CK_RSA_WITH_AES_256_SHA,
302 SSL3_VERSION, TLS1_2_VERSION,
303 DTLS1_BAD_VER, DTLS1_2_VERSION,
305 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
311 TLS1_TXT_DHE_DSS_WITH_AES_256_SHA,
312 TLS1_RFC_DHE_DSS_WITH_AES_256_SHA,
313 TLS1_CK_DHE_DSS_WITH_AES_256_SHA,
318 SSL3_VERSION, TLS1_2_VERSION,
319 DTLS1_BAD_VER, DTLS1_2_VERSION,
320 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
321 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
327 TLS1_TXT_DHE_RSA_WITH_AES_256_SHA,
328 TLS1_RFC_DHE_RSA_WITH_AES_256_SHA,
329 TLS1_CK_DHE_RSA_WITH_AES_256_SHA,
334 SSL3_VERSION, TLS1_2_VERSION,
335 DTLS1_BAD_VER, DTLS1_2_VERSION,
337 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
343 TLS1_TXT_ADH_WITH_AES_256_SHA,
344 TLS1_RFC_ADH_WITH_AES_256_SHA,
345 TLS1_CK_ADH_WITH_AES_256_SHA,
350 SSL3_VERSION, TLS1_2_VERSION,
351 DTLS1_BAD_VER, DTLS1_2_VERSION,
352 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
353 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
359 TLS1_TXT_RSA_WITH_NULL_SHA256,
360 TLS1_RFC_RSA_WITH_NULL_SHA256,
361 TLS1_CK_RSA_WITH_NULL_SHA256,
366 TLS1_2_VERSION, TLS1_2_VERSION,
367 DTLS1_2_VERSION, DTLS1_2_VERSION,
368 SSL_STRONG_NONE | SSL_FIPS,
369 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
375 TLS1_TXT_RSA_WITH_AES_128_SHA256,
376 TLS1_RFC_RSA_WITH_AES_128_SHA256,
377 TLS1_CK_RSA_WITH_AES_128_SHA256,
382 TLS1_2_VERSION, TLS1_2_VERSION,
383 DTLS1_2_VERSION, DTLS1_2_VERSION,
385 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
391 TLS1_TXT_RSA_WITH_AES_256_SHA256,
392 TLS1_RFC_RSA_WITH_AES_256_SHA256,
393 TLS1_CK_RSA_WITH_AES_256_SHA256,
398 TLS1_2_VERSION, TLS1_2_VERSION,
399 DTLS1_2_VERSION, DTLS1_2_VERSION,
401 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
407 TLS1_TXT_DHE_DSS_WITH_AES_128_SHA256,
408 TLS1_RFC_DHE_DSS_WITH_AES_128_SHA256,
409 TLS1_CK_DHE_DSS_WITH_AES_128_SHA256,
414 TLS1_2_VERSION, TLS1_2_VERSION,
415 DTLS1_2_VERSION, DTLS1_2_VERSION,
416 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
417 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
423 TLS1_TXT_DHE_RSA_WITH_AES_128_SHA256,
424 TLS1_RFC_DHE_RSA_WITH_AES_128_SHA256,
425 TLS1_CK_DHE_RSA_WITH_AES_128_SHA256,
430 TLS1_2_VERSION, TLS1_2_VERSION,
431 DTLS1_2_VERSION, DTLS1_2_VERSION,
433 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
439 TLS1_TXT_DHE_DSS_WITH_AES_256_SHA256,
440 TLS1_RFC_DHE_DSS_WITH_AES_256_SHA256,
441 TLS1_CK_DHE_DSS_WITH_AES_256_SHA256,
446 TLS1_2_VERSION, TLS1_2_VERSION,
447 DTLS1_2_VERSION, DTLS1_2_VERSION,
448 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
449 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
455 TLS1_TXT_DHE_RSA_WITH_AES_256_SHA256,
456 TLS1_RFC_DHE_RSA_WITH_AES_256_SHA256,
457 TLS1_CK_DHE_RSA_WITH_AES_256_SHA256,
462 TLS1_2_VERSION, TLS1_2_VERSION,
463 DTLS1_2_VERSION, DTLS1_2_VERSION,
465 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
471 TLS1_TXT_ADH_WITH_AES_128_SHA256,
472 TLS1_RFC_ADH_WITH_AES_128_SHA256,
473 TLS1_CK_ADH_WITH_AES_128_SHA256,
478 TLS1_2_VERSION, TLS1_2_VERSION,
479 DTLS1_2_VERSION, DTLS1_2_VERSION,
480 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
481 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
487 TLS1_TXT_ADH_WITH_AES_256_SHA256,
488 TLS1_RFC_ADH_WITH_AES_256_SHA256,
489 TLS1_CK_ADH_WITH_AES_256_SHA256,
494 TLS1_2_VERSION, TLS1_2_VERSION,
495 DTLS1_2_VERSION, DTLS1_2_VERSION,
496 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
497 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
503 TLS1_TXT_RSA_WITH_AES_128_GCM_SHA256,
504 TLS1_RFC_RSA_WITH_AES_128_GCM_SHA256,
505 TLS1_CK_RSA_WITH_AES_128_GCM_SHA256,
510 TLS1_2_VERSION, TLS1_2_VERSION,
511 DTLS1_2_VERSION, DTLS1_2_VERSION,
513 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
519 TLS1_TXT_RSA_WITH_AES_256_GCM_SHA384,
520 TLS1_RFC_RSA_WITH_AES_256_GCM_SHA384,
521 TLS1_CK_RSA_WITH_AES_256_GCM_SHA384,
526 TLS1_2_VERSION, TLS1_2_VERSION,
527 DTLS1_2_VERSION, DTLS1_2_VERSION,
529 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
535 TLS1_TXT_DHE_RSA_WITH_AES_128_GCM_SHA256,
536 TLS1_RFC_DHE_RSA_WITH_AES_128_GCM_SHA256,
537 TLS1_CK_DHE_RSA_WITH_AES_128_GCM_SHA256,
542 TLS1_2_VERSION, TLS1_2_VERSION,
543 DTLS1_2_VERSION, DTLS1_2_VERSION,
545 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
551 TLS1_TXT_DHE_RSA_WITH_AES_256_GCM_SHA384,
552 TLS1_RFC_DHE_RSA_WITH_AES_256_GCM_SHA384,
553 TLS1_CK_DHE_RSA_WITH_AES_256_GCM_SHA384,
558 TLS1_2_VERSION, TLS1_2_VERSION,
559 DTLS1_2_VERSION, DTLS1_2_VERSION,
561 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
567 TLS1_TXT_DHE_DSS_WITH_AES_128_GCM_SHA256,
568 TLS1_RFC_DHE_DSS_WITH_AES_128_GCM_SHA256,
569 TLS1_CK_DHE_DSS_WITH_AES_128_GCM_SHA256,
574 TLS1_2_VERSION, TLS1_2_VERSION,
575 DTLS1_2_VERSION, DTLS1_2_VERSION,
576 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
577 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
583 TLS1_TXT_DHE_DSS_WITH_AES_256_GCM_SHA384,
584 TLS1_RFC_DHE_DSS_WITH_AES_256_GCM_SHA384,
585 TLS1_CK_DHE_DSS_WITH_AES_256_GCM_SHA384,
590 TLS1_2_VERSION, TLS1_2_VERSION,
591 DTLS1_2_VERSION, DTLS1_2_VERSION,
592 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
593 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
599 TLS1_TXT_ADH_WITH_AES_128_GCM_SHA256,
600 TLS1_RFC_ADH_WITH_AES_128_GCM_SHA256,
601 TLS1_CK_ADH_WITH_AES_128_GCM_SHA256,
606 TLS1_2_VERSION, TLS1_2_VERSION,
607 DTLS1_2_VERSION, DTLS1_2_VERSION,
608 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
609 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
615 TLS1_TXT_ADH_WITH_AES_256_GCM_SHA384,
616 TLS1_RFC_ADH_WITH_AES_256_GCM_SHA384,
617 TLS1_CK_ADH_WITH_AES_256_GCM_SHA384,
622 TLS1_2_VERSION, TLS1_2_VERSION,
623 DTLS1_2_VERSION, DTLS1_2_VERSION,
624 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
625 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
631 TLS1_TXT_RSA_WITH_AES_128_CCM,
632 TLS1_RFC_RSA_WITH_AES_128_CCM,
633 TLS1_CK_RSA_WITH_AES_128_CCM,
638 TLS1_2_VERSION, TLS1_2_VERSION,
639 DTLS1_2_VERSION, DTLS1_2_VERSION,
640 SSL_NOT_DEFAULT | SSL_HIGH,
641 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
647 TLS1_TXT_RSA_WITH_AES_256_CCM,
648 TLS1_RFC_RSA_WITH_AES_256_CCM,
649 TLS1_CK_RSA_WITH_AES_256_CCM,
654 TLS1_2_VERSION, TLS1_2_VERSION,
655 DTLS1_2_VERSION, DTLS1_2_VERSION,
656 SSL_NOT_DEFAULT | SSL_HIGH,
657 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
663 TLS1_TXT_DHE_RSA_WITH_AES_128_CCM,
664 TLS1_RFC_DHE_RSA_WITH_AES_128_CCM,
665 TLS1_CK_DHE_RSA_WITH_AES_128_CCM,
670 TLS1_2_VERSION, TLS1_2_VERSION,
671 DTLS1_2_VERSION, DTLS1_2_VERSION,
672 SSL_NOT_DEFAULT | SSL_HIGH,
673 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
679 TLS1_TXT_DHE_RSA_WITH_AES_256_CCM,
680 TLS1_RFC_DHE_RSA_WITH_AES_256_CCM,
681 TLS1_CK_DHE_RSA_WITH_AES_256_CCM,
686 TLS1_2_VERSION, TLS1_2_VERSION,
687 DTLS1_2_VERSION, DTLS1_2_VERSION,
688 SSL_NOT_DEFAULT | SSL_HIGH,
689 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
695 TLS1_TXT_RSA_WITH_AES_128_CCM_8,
696 TLS1_RFC_RSA_WITH_AES_128_CCM_8,
697 TLS1_CK_RSA_WITH_AES_128_CCM_8,
702 TLS1_2_VERSION, TLS1_2_VERSION,
703 DTLS1_2_VERSION, DTLS1_2_VERSION,
704 SSL_NOT_DEFAULT | SSL_HIGH,
705 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
711 TLS1_TXT_RSA_WITH_AES_256_CCM_8,
712 TLS1_RFC_RSA_WITH_AES_256_CCM_8,
713 TLS1_CK_RSA_WITH_AES_256_CCM_8,
718 TLS1_2_VERSION, TLS1_2_VERSION,
719 DTLS1_2_VERSION, DTLS1_2_VERSION,
720 SSL_NOT_DEFAULT | SSL_HIGH,
721 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
727 TLS1_TXT_DHE_RSA_WITH_AES_128_CCM_8,
728 TLS1_RFC_DHE_RSA_WITH_AES_128_CCM_8,
729 TLS1_CK_DHE_RSA_WITH_AES_128_CCM_8,
734 TLS1_2_VERSION, TLS1_2_VERSION,
735 DTLS1_2_VERSION, DTLS1_2_VERSION,
736 SSL_NOT_DEFAULT | SSL_HIGH,
737 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
743 TLS1_TXT_DHE_RSA_WITH_AES_256_CCM_8,
744 TLS1_RFC_DHE_RSA_WITH_AES_256_CCM_8,
745 TLS1_CK_DHE_RSA_WITH_AES_256_CCM_8,
750 TLS1_2_VERSION, TLS1_2_VERSION,
751 DTLS1_2_VERSION, DTLS1_2_VERSION,
752 SSL_NOT_DEFAULT | SSL_HIGH,
753 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
759 TLS1_TXT_PSK_WITH_AES_128_CCM,
760 TLS1_RFC_PSK_WITH_AES_128_CCM,
761 TLS1_CK_PSK_WITH_AES_128_CCM,
766 TLS1_2_VERSION, TLS1_2_VERSION,
767 DTLS1_2_VERSION, DTLS1_2_VERSION,
768 SSL_NOT_DEFAULT | SSL_HIGH,
769 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
775 TLS1_TXT_PSK_WITH_AES_256_CCM,
776 TLS1_RFC_PSK_WITH_AES_256_CCM,
777 TLS1_CK_PSK_WITH_AES_256_CCM,
782 TLS1_2_VERSION, TLS1_2_VERSION,
783 DTLS1_2_VERSION, DTLS1_2_VERSION,
784 SSL_NOT_DEFAULT | SSL_HIGH,
785 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
791 TLS1_TXT_DHE_PSK_WITH_AES_128_CCM,
792 TLS1_RFC_DHE_PSK_WITH_AES_128_CCM,
793 TLS1_CK_DHE_PSK_WITH_AES_128_CCM,
798 TLS1_2_VERSION, TLS1_2_VERSION,
799 DTLS1_2_VERSION, DTLS1_2_VERSION,
800 SSL_NOT_DEFAULT | SSL_HIGH,
801 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
807 TLS1_TXT_DHE_PSK_WITH_AES_256_CCM,
808 TLS1_RFC_DHE_PSK_WITH_AES_256_CCM,
809 TLS1_CK_DHE_PSK_WITH_AES_256_CCM,
814 TLS1_2_VERSION, TLS1_2_VERSION,
815 DTLS1_2_VERSION, DTLS1_2_VERSION,
816 SSL_NOT_DEFAULT | SSL_HIGH,
817 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
823 TLS1_TXT_PSK_WITH_AES_128_CCM_8,
824 TLS1_RFC_PSK_WITH_AES_128_CCM_8,
825 TLS1_CK_PSK_WITH_AES_128_CCM_8,
830 TLS1_2_VERSION, TLS1_2_VERSION,
831 DTLS1_2_VERSION, DTLS1_2_VERSION,
832 SSL_NOT_DEFAULT | SSL_HIGH,
833 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
839 TLS1_TXT_PSK_WITH_AES_256_CCM_8,
840 TLS1_RFC_PSK_WITH_AES_256_CCM_8,
841 TLS1_CK_PSK_WITH_AES_256_CCM_8,
846 TLS1_2_VERSION, TLS1_2_VERSION,
847 DTLS1_2_VERSION, DTLS1_2_VERSION,
848 SSL_NOT_DEFAULT | SSL_HIGH,
849 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
855 TLS1_TXT_DHE_PSK_WITH_AES_128_CCM_8,
856 TLS1_RFC_DHE_PSK_WITH_AES_128_CCM_8,
857 TLS1_CK_DHE_PSK_WITH_AES_128_CCM_8,
862 TLS1_2_VERSION, TLS1_2_VERSION,
863 DTLS1_2_VERSION, DTLS1_2_VERSION,
864 SSL_NOT_DEFAULT | SSL_HIGH,
865 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
871 TLS1_TXT_DHE_PSK_WITH_AES_256_CCM_8,
872 TLS1_RFC_DHE_PSK_WITH_AES_256_CCM_8,
873 TLS1_CK_DHE_PSK_WITH_AES_256_CCM_8,
878 TLS1_2_VERSION, TLS1_2_VERSION,
879 DTLS1_2_VERSION, DTLS1_2_VERSION,
880 SSL_NOT_DEFAULT | SSL_HIGH,
881 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
887 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CCM,
888 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_CCM,
889 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM,
894 TLS1_2_VERSION, TLS1_2_VERSION,
895 DTLS1_2_VERSION, DTLS1_2_VERSION,
896 SSL_NOT_DEFAULT | SSL_HIGH,
897 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
903 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CCM,
904 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_CCM,
905 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM,
910 TLS1_2_VERSION, TLS1_2_VERSION,
911 DTLS1_2_VERSION, DTLS1_2_VERSION,
912 SSL_NOT_DEFAULT | SSL_HIGH,
913 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
919 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CCM_8,
920 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_CCM_8,
921 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM_8,
926 TLS1_2_VERSION, TLS1_2_VERSION,
927 DTLS1_2_VERSION, DTLS1_2_VERSION,
928 SSL_NOT_DEFAULT | SSL_HIGH,
929 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
935 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CCM_8,
936 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_CCM_8,
937 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM_8,
942 TLS1_2_VERSION, TLS1_2_VERSION,
943 DTLS1_2_VERSION, DTLS1_2_VERSION,
944 SSL_NOT_DEFAULT | SSL_HIGH,
945 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
951 TLS1_TXT_ECDHE_ECDSA_WITH_NULL_SHA,
952 TLS1_RFC_ECDHE_ECDSA_WITH_NULL_SHA,
953 TLS1_CK_ECDHE_ECDSA_WITH_NULL_SHA,
958 TLS1_VERSION, TLS1_2_VERSION,
959 DTLS1_BAD_VER, DTLS1_2_VERSION,
960 SSL_STRONG_NONE | SSL_FIPS,
961 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
965 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
968 TLS1_TXT_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,
969 TLS1_RFC_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,
970 TLS1_CK_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,
975 TLS1_VERSION, TLS1_2_VERSION,
976 DTLS1_BAD_VER, DTLS1_2_VERSION,
977 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
978 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
985 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
986 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
987 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
992 TLS1_VERSION, TLS1_2_VERSION,
993 DTLS1_BAD_VER, DTLS1_2_VERSION,
995 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1001 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
1002 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
1003 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
1008 TLS1_VERSION, TLS1_2_VERSION,
1009 DTLS1_BAD_VER, DTLS1_2_VERSION,
1010 SSL_HIGH | SSL_FIPS,
1011 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1017 TLS1_TXT_ECDHE_RSA_WITH_NULL_SHA,
1018 TLS1_RFC_ECDHE_RSA_WITH_NULL_SHA,
1019 TLS1_CK_ECDHE_RSA_WITH_NULL_SHA,
1024 TLS1_VERSION, TLS1_2_VERSION,
1025 DTLS1_BAD_VER, DTLS1_2_VERSION,
1026 SSL_STRONG_NONE | SSL_FIPS,
1027 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1031 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1034 TLS1_TXT_ECDHE_RSA_WITH_DES_192_CBC3_SHA,
1035 TLS1_RFC_ECDHE_RSA_WITH_DES_192_CBC3_SHA,
1036 TLS1_CK_ECDHE_RSA_WITH_DES_192_CBC3_SHA,
1041 TLS1_VERSION, TLS1_2_VERSION,
1042 DTLS1_BAD_VER, DTLS1_2_VERSION,
1043 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1044 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1051 TLS1_TXT_ECDHE_RSA_WITH_AES_128_CBC_SHA,
1052 TLS1_RFC_ECDHE_RSA_WITH_AES_128_CBC_SHA,
1053 TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA,
1058 TLS1_VERSION, TLS1_2_VERSION,
1059 DTLS1_BAD_VER, DTLS1_2_VERSION,
1060 SSL_HIGH | SSL_FIPS,
1061 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1067 TLS1_TXT_ECDHE_RSA_WITH_AES_256_CBC_SHA,
1068 TLS1_RFC_ECDHE_RSA_WITH_AES_256_CBC_SHA,
1069 TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA,
1074 TLS1_VERSION, TLS1_2_VERSION,
1075 DTLS1_BAD_VER, DTLS1_2_VERSION,
1076 SSL_HIGH | SSL_FIPS,
1077 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1083 TLS1_TXT_ECDH_anon_WITH_NULL_SHA,
1084 TLS1_RFC_ECDH_anon_WITH_NULL_SHA,
1085 TLS1_CK_ECDH_anon_WITH_NULL_SHA,
1090 TLS1_VERSION, TLS1_2_VERSION,
1091 DTLS1_BAD_VER, DTLS1_2_VERSION,
1092 SSL_STRONG_NONE | SSL_FIPS,
1093 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1097 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1100 TLS1_TXT_ECDH_anon_WITH_DES_192_CBC3_SHA,
1101 TLS1_RFC_ECDH_anon_WITH_DES_192_CBC3_SHA,
1102 TLS1_CK_ECDH_anon_WITH_DES_192_CBC3_SHA,
1107 TLS1_VERSION, TLS1_2_VERSION,
1108 DTLS1_BAD_VER, DTLS1_2_VERSION,
1109 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1110 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1117 TLS1_TXT_ECDH_anon_WITH_AES_128_CBC_SHA,
1118 TLS1_RFC_ECDH_anon_WITH_AES_128_CBC_SHA,
1119 TLS1_CK_ECDH_anon_WITH_AES_128_CBC_SHA,
1124 TLS1_VERSION, TLS1_2_VERSION,
1125 DTLS1_BAD_VER, DTLS1_2_VERSION,
1126 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
1127 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1133 TLS1_TXT_ECDH_anon_WITH_AES_256_CBC_SHA,
1134 TLS1_RFC_ECDH_anon_WITH_AES_256_CBC_SHA,
1135 TLS1_CK_ECDH_anon_WITH_AES_256_CBC_SHA,
1140 TLS1_VERSION, TLS1_2_VERSION,
1141 DTLS1_BAD_VER, DTLS1_2_VERSION,
1142 SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,
1143 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1149 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_SHA256,
1150 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_SHA256,
1151 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_SHA256,
1156 TLS1_2_VERSION, TLS1_2_VERSION,
1157 DTLS1_2_VERSION, DTLS1_2_VERSION,
1158 SSL_HIGH | SSL_FIPS,
1159 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1165 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_SHA384,
1166 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_SHA384,
1167 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_SHA384,
1172 TLS1_2_VERSION, TLS1_2_VERSION,
1173 DTLS1_2_VERSION, DTLS1_2_VERSION,
1174 SSL_HIGH | SSL_FIPS,
1175 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1181 TLS1_TXT_ECDHE_RSA_WITH_AES_128_SHA256,
1182 TLS1_RFC_ECDHE_RSA_WITH_AES_128_SHA256,
1183 TLS1_CK_ECDHE_RSA_WITH_AES_128_SHA256,
1188 TLS1_2_VERSION, TLS1_2_VERSION,
1189 DTLS1_2_VERSION, DTLS1_2_VERSION,
1190 SSL_HIGH | SSL_FIPS,
1191 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1197 TLS1_TXT_ECDHE_RSA_WITH_AES_256_SHA384,
1198 TLS1_RFC_ECDHE_RSA_WITH_AES_256_SHA384,
1199 TLS1_CK_ECDHE_RSA_WITH_AES_256_SHA384,
1204 TLS1_2_VERSION, TLS1_2_VERSION,
1205 DTLS1_2_VERSION, DTLS1_2_VERSION,
1206 SSL_HIGH | SSL_FIPS,
1207 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1213 TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
1214 TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
1215 TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
1220 TLS1_2_VERSION, TLS1_2_VERSION,
1221 DTLS1_2_VERSION, DTLS1_2_VERSION,
1222 SSL_HIGH | SSL_FIPS,
1223 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1229 TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
1230 TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
1231 TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
1236 TLS1_2_VERSION, TLS1_2_VERSION,
1237 DTLS1_2_VERSION, DTLS1_2_VERSION,
1238 SSL_HIGH | SSL_FIPS,
1239 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1245 TLS1_TXT_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
1246 TLS1_RFC_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
1247 TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
1252 TLS1_2_VERSION, TLS1_2_VERSION,
1253 DTLS1_2_VERSION, DTLS1_2_VERSION,
1254 SSL_HIGH | SSL_FIPS,
1255 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1261 TLS1_TXT_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
1262 TLS1_RFC_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
1263 TLS1_CK_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
1268 TLS1_2_VERSION, TLS1_2_VERSION,
1269 DTLS1_2_VERSION, DTLS1_2_VERSION,
1270 SSL_HIGH | SSL_FIPS,
1271 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1277 TLS1_TXT_PSK_WITH_NULL_SHA,
1278 TLS1_RFC_PSK_WITH_NULL_SHA,
1279 TLS1_CK_PSK_WITH_NULL_SHA,
1284 SSL3_VERSION, TLS1_2_VERSION,
1285 DTLS1_BAD_VER, DTLS1_2_VERSION,
1286 SSL_STRONG_NONE | SSL_FIPS,
1287 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1293 TLS1_TXT_DHE_PSK_WITH_NULL_SHA,
1294 TLS1_RFC_DHE_PSK_WITH_NULL_SHA,
1295 TLS1_CK_DHE_PSK_WITH_NULL_SHA,
1300 SSL3_VERSION, TLS1_2_VERSION,
1301 DTLS1_BAD_VER, DTLS1_2_VERSION,
1302 SSL_STRONG_NONE | SSL_FIPS,
1303 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1309 TLS1_TXT_RSA_PSK_WITH_NULL_SHA,
1310 TLS1_RFC_RSA_PSK_WITH_NULL_SHA,
1311 TLS1_CK_RSA_PSK_WITH_NULL_SHA,
1316 SSL3_VERSION, TLS1_2_VERSION,
1317 DTLS1_BAD_VER, DTLS1_2_VERSION,
1318 SSL_STRONG_NONE | SSL_FIPS,
1319 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1323 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1326 TLS1_TXT_PSK_WITH_3DES_EDE_CBC_SHA,
1327 TLS1_RFC_PSK_WITH_3DES_EDE_CBC_SHA,
1328 TLS1_CK_PSK_WITH_3DES_EDE_CBC_SHA,
1333 SSL3_VERSION, TLS1_2_VERSION,
1334 DTLS1_BAD_VER, DTLS1_2_VERSION,
1335 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1336 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1343 TLS1_TXT_PSK_WITH_AES_128_CBC_SHA,
1344 TLS1_RFC_PSK_WITH_AES_128_CBC_SHA,
1345 TLS1_CK_PSK_WITH_AES_128_CBC_SHA,
1350 SSL3_VERSION, TLS1_2_VERSION,
1351 DTLS1_BAD_VER, DTLS1_2_VERSION,
1352 SSL_HIGH | SSL_FIPS,
1353 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1359 TLS1_TXT_PSK_WITH_AES_256_CBC_SHA,
1360 TLS1_RFC_PSK_WITH_AES_256_CBC_SHA,
1361 TLS1_CK_PSK_WITH_AES_256_CBC_SHA,
1366 SSL3_VERSION, TLS1_2_VERSION,
1367 DTLS1_BAD_VER, DTLS1_2_VERSION,
1368 SSL_HIGH | SSL_FIPS,
1369 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1373 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1376 TLS1_TXT_DHE_PSK_WITH_3DES_EDE_CBC_SHA,
1377 TLS1_RFC_DHE_PSK_WITH_3DES_EDE_CBC_SHA,
1378 TLS1_CK_DHE_PSK_WITH_3DES_EDE_CBC_SHA,
1383 SSL3_VERSION, TLS1_2_VERSION,
1384 DTLS1_BAD_VER, DTLS1_2_VERSION,
1385 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1386 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1393 TLS1_TXT_DHE_PSK_WITH_AES_128_CBC_SHA,
1394 TLS1_RFC_DHE_PSK_WITH_AES_128_CBC_SHA,
1395 TLS1_CK_DHE_PSK_WITH_AES_128_CBC_SHA,
1400 SSL3_VERSION, TLS1_2_VERSION,
1401 DTLS1_BAD_VER, DTLS1_2_VERSION,
1402 SSL_HIGH | SSL_FIPS,
1403 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1409 TLS1_TXT_DHE_PSK_WITH_AES_256_CBC_SHA,
1410 TLS1_RFC_DHE_PSK_WITH_AES_256_CBC_SHA,
1411 TLS1_CK_DHE_PSK_WITH_AES_256_CBC_SHA,
1416 SSL3_VERSION, TLS1_2_VERSION,
1417 DTLS1_BAD_VER, DTLS1_2_VERSION,
1418 SSL_HIGH | SSL_FIPS,
1419 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1423 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1426 TLS1_TXT_RSA_PSK_WITH_3DES_EDE_CBC_SHA,
1427 TLS1_RFC_RSA_PSK_WITH_3DES_EDE_CBC_SHA,
1428 TLS1_CK_RSA_PSK_WITH_3DES_EDE_CBC_SHA,
1433 SSL3_VERSION, TLS1_2_VERSION,
1434 DTLS1_BAD_VER, DTLS1_2_VERSION,
1435 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1436 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1443 TLS1_TXT_RSA_PSK_WITH_AES_128_CBC_SHA,
1444 TLS1_RFC_RSA_PSK_WITH_AES_128_CBC_SHA,
1445 TLS1_CK_RSA_PSK_WITH_AES_128_CBC_SHA,
1450 SSL3_VERSION, TLS1_2_VERSION,
1451 DTLS1_BAD_VER, DTLS1_2_VERSION,
1452 SSL_HIGH | SSL_FIPS,
1453 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1459 TLS1_TXT_RSA_PSK_WITH_AES_256_CBC_SHA,
1460 TLS1_RFC_RSA_PSK_WITH_AES_256_CBC_SHA,
1461 TLS1_CK_RSA_PSK_WITH_AES_256_CBC_SHA,
1466 SSL3_VERSION, TLS1_2_VERSION,
1467 DTLS1_BAD_VER, DTLS1_2_VERSION,
1468 SSL_HIGH | SSL_FIPS,
1469 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1475 TLS1_TXT_PSK_WITH_AES_128_GCM_SHA256,
1476 TLS1_RFC_PSK_WITH_AES_128_GCM_SHA256,
1477 TLS1_CK_PSK_WITH_AES_128_GCM_SHA256,
1482 TLS1_2_VERSION, TLS1_2_VERSION,
1483 DTLS1_2_VERSION, DTLS1_2_VERSION,
1484 SSL_HIGH | SSL_FIPS,
1485 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1491 TLS1_TXT_PSK_WITH_AES_256_GCM_SHA384,
1492 TLS1_RFC_PSK_WITH_AES_256_GCM_SHA384,
1493 TLS1_CK_PSK_WITH_AES_256_GCM_SHA384,
1498 TLS1_2_VERSION, TLS1_2_VERSION,
1499 DTLS1_2_VERSION, DTLS1_2_VERSION,
1500 SSL_HIGH | SSL_FIPS,
1501 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1507 TLS1_TXT_DHE_PSK_WITH_AES_128_GCM_SHA256,
1508 TLS1_RFC_DHE_PSK_WITH_AES_128_GCM_SHA256,
1509 TLS1_CK_DHE_PSK_WITH_AES_128_GCM_SHA256,
1514 TLS1_2_VERSION, TLS1_2_VERSION,
1515 DTLS1_2_VERSION, DTLS1_2_VERSION,
1516 SSL_HIGH | SSL_FIPS,
1517 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1523 TLS1_TXT_DHE_PSK_WITH_AES_256_GCM_SHA384,
1524 TLS1_RFC_DHE_PSK_WITH_AES_256_GCM_SHA384,
1525 TLS1_CK_DHE_PSK_WITH_AES_256_GCM_SHA384,
1530 TLS1_2_VERSION, TLS1_2_VERSION,
1531 DTLS1_2_VERSION, DTLS1_2_VERSION,
1532 SSL_HIGH | SSL_FIPS,
1533 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1539 TLS1_TXT_RSA_PSK_WITH_AES_128_GCM_SHA256,
1540 TLS1_RFC_RSA_PSK_WITH_AES_128_GCM_SHA256,
1541 TLS1_CK_RSA_PSK_WITH_AES_128_GCM_SHA256,
1546 TLS1_2_VERSION, TLS1_2_VERSION,
1547 DTLS1_2_VERSION, DTLS1_2_VERSION,
1548 SSL_HIGH | SSL_FIPS,
1549 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
1555 TLS1_TXT_RSA_PSK_WITH_AES_256_GCM_SHA384,
1556 TLS1_RFC_RSA_PSK_WITH_AES_256_GCM_SHA384,
1557 TLS1_CK_RSA_PSK_WITH_AES_256_GCM_SHA384,
1562 TLS1_2_VERSION, TLS1_2_VERSION,
1563 DTLS1_2_VERSION, DTLS1_2_VERSION,
1564 SSL_HIGH | SSL_FIPS,
1565 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1571 TLS1_TXT_PSK_WITH_AES_128_CBC_SHA256,
1572 TLS1_RFC_PSK_WITH_AES_128_CBC_SHA256,
1573 TLS1_CK_PSK_WITH_AES_128_CBC_SHA256,
1578 TLS1_VERSION, TLS1_2_VERSION,
1579 DTLS1_BAD_VER, DTLS1_2_VERSION,
1580 SSL_HIGH | SSL_FIPS,
1581 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1587 TLS1_TXT_PSK_WITH_AES_256_CBC_SHA384,
1588 TLS1_RFC_PSK_WITH_AES_256_CBC_SHA384,
1589 TLS1_CK_PSK_WITH_AES_256_CBC_SHA384,
1594 TLS1_VERSION, TLS1_2_VERSION,
1595 DTLS1_BAD_VER, DTLS1_2_VERSION,
1596 SSL_HIGH | SSL_FIPS,
1597 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1603 TLS1_TXT_PSK_WITH_NULL_SHA256,
1604 TLS1_RFC_PSK_WITH_NULL_SHA256,
1605 TLS1_CK_PSK_WITH_NULL_SHA256,
1610 TLS1_VERSION, TLS1_2_VERSION,
1611 DTLS1_BAD_VER, DTLS1_2_VERSION,
1612 SSL_STRONG_NONE | SSL_FIPS,
1613 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1619 TLS1_TXT_PSK_WITH_NULL_SHA384,
1620 TLS1_RFC_PSK_WITH_NULL_SHA384,
1621 TLS1_CK_PSK_WITH_NULL_SHA384,
1626 TLS1_VERSION, TLS1_2_VERSION,
1627 DTLS1_BAD_VER, DTLS1_2_VERSION,
1628 SSL_STRONG_NONE | SSL_FIPS,
1629 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1635 TLS1_TXT_DHE_PSK_WITH_AES_128_CBC_SHA256,
1636 TLS1_RFC_DHE_PSK_WITH_AES_128_CBC_SHA256,
1637 TLS1_CK_DHE_PSK_WITH_AES_128_CBC_SHA256,
1642 TLS1_VERSION, TLS1_2_VERSION,
1643 DTLS1_BAD_VER, DTLS1_2_VERSION,
1644 SSL_HIGH | SSL_FIPS,
1645 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1651 TLS1_TXT_DHE_PSK_WITH_AES_256_CBC_SHA384,
1652 TLS1_RFC_DHE_PSK_WITH_AES_256_CBC_SHA384,
1653 TLS1_CK_DHE_PSK_WITH_AES_256_CBC_SHA384,
1658 TLS1_VERSION, TLS1_2_VERSION,
1659 DTLS1_BAD_VER, DTLS1_2_VERSION,
1660 SSL_HIGH | SSL_FIPS,
1661 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1667 TLS1_TXT_DHE_PSK_WITH_NULL_SHA256,
1668 TLS1_RFC_DHE_PSK_WITH_NULL_SHA256,
1669 TLS1_CK_DHE_PSK_WITH_NULL_SHA256,
1674 TLS1_VERSION, TLS1_2_VERSION,
1675 DTLS1_BAD_VER, DTLS1_2_VERSION,
1676 SSL_STRONG_NONE | SSL_FIPS,
1677 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1683 TLS1_TXT_DHE_PSK_WITH_NULL_SHA384,
1684 TLS1_RFC_DHE_PSK_WITH_NULL_SHA384,
1685 TLS1_CK_DHE_PSK_WITH_NULL_SHA384,
1690 TLS1_VERSION, TLS1_2_VERSION,
1691 DTLS1_BAD_VER, DTLS1_2_VERSION,
1692 SSL_STRONG_NONE | SSL_FIPS,
1693 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1699 TLS1_TXT_RSA_PSK_WITH_AES_128_CBC_SHA256,
1700 TLS1_RFC_RSA_PSK_WITH_AES_128_CBC_SHA256,
1701 TLS1_CK_RSA_PSK_WITH_AES_128_CBC_SHA256,
1706 TLS1_VERSION, TLS1_2_VERSION,
1707 DTLS1_BAD_VER, DTLS1_2_VERSION,
1708 SSL_HIGH | SSL_FIPS,
1709 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1715 TLS1_TXT_RSA_PSK_WITH_AES_256_CBC_SHA384,
1716 TLS1_RFC_RSA_PSK_WITH_AES_256_CBC_SHA384,
1717 TLS1_CK_RSA_PSK_WITH_AES_256_CBC_SHA384,
1722 TLS1_VERSION, TLS1_2_VERSION,
1723 DTLS1_BAD_VER, DTLS1_2_VERSION,
1724 SSL_HIGH | SSL_FIPS,
1725 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1731 TLS1_TXT_RSA_PSK_WITH_NULL_SHA256,
1732 TLS1_RFC_RSA_PSK_WITH_NULL_SHA256,
1733 TLS1_CK_RSA_PSK_WITH_NULL_SHA256,
1738 TLS1_VERSION, TLS1_2_VERSION,
1739 DTLS1_BAD_VER, DTLS1_2_VERSION,
1740 SSL_STRONG_NONE | SSL_FIPS,
1741 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1747 TLS1_TXT_RSA_PSK_WITH_NULL_SHA384,
1748 TLS1_RFC_RSA_PSK_WITH_NULL_SHA384,
1749 TLS1_CK_RSA_PSK_WITH_NULL_SHA384,
1754 TLS1_VERSION, TLS1_2_VERSION,
1755 DTLS1_BAD_VER, DTLS1_2_VERSION,
1756 SSL_STRONG_NONE | SSL_FIPS,
1757 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1761 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1764 TLS1_TXT_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA,
1765 TLS1_RFC_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA,
1766 TLS1_CK_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA,
1771 TLS1_VERSION, TLS1_2_VERSION,
1772 DTLS1_BAD_VER, DTLS1_2_VERSION,
1773 SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,
1774 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1781 TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA,
1782 TLS1_RFC_ECDHE_PSK_WITH_AES_128_CBC_SHA,
1783 TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA,
1788 TLS1_VERSION, TLS1_2_VERSION,
1789 DTLS1_BAD_VER, DTLS1_2_VERSION,
1790 SSL_HIGH | SSL_FIPS,
1791 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1797 TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA,
1798 TLS1_RFC_ECDHE_PSK_WITH_AES_256_CBC_SHA,
1799 TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA,
1804 TLS1_VERSION, TLS1_2_VERSION,
1805 DTLS1_BAD_VER, DTLS1_2_VERSION,
1806 SSL_HIGH | SSL_FIPS,
1807 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1813 TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA256,
1814 TLS1_RFC_ECDHE_PSK_WITH_AES_128_CBC_SHA256,
1815 TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA256,
1820 TLS1_VERSION, TLS1_2_VERSION,
1821 DTLS1_BAD_VER, DTLS1_2_VERSION,
1822 SSL_HIGH | SSL_FIPS,
1823 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1829 TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA384,
1830 TLS1_RFC_ECDHE_PSK_WITH_AES_256_CBC_SHA384,
1831 TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA384,
1836 TLS1_VERSION, TLS1_2_VERSION,
1837 DTLS1_BAD_VER, DTLS1_2_VERSION,
1838 SSL_HIGH | SSL_FIPS,
1839 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1845 TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA,
1846 TLS1_RFC_ECDHE_PSK_WITH_NULL_SHA,
1847 TLS1_CK_ECDHE_PSK_WITH_NULL_SHA,
1852 TLS1_VERSION, TLS1_2_VERSION,
1853 DTLS1_BAD_VER, DTLS1_2_VERSION,
1854 SSL_STRONG_NONE | SSL_FIPS,
1855 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1861 TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA256,
1862 TLS1_RFC_ECDHE_PSK_WITH_NULL_SHA256,
1863 TLS1_CK_ECDHE_PSK_WITH_NULL_SHA256,
1868 TLS1_VERSION, TLS1_2_VERSION,
1869 DTLS1_BAD_VER, DTLS1_2_VERSION,
1870 SSL_STRONG_NONE | SSL_FIPS,
1871 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1877 TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA384,
1878 TLS1_RFC_ECDHE_PSK_WITH_NULL_SHA384,
1879 TLS1_CK_ECDHE_PSK_WITH_NULL_SHA384,
1884 TLS1_VERSION, TLS1_2_VERSION,
1885 DTLS1_BAD_VER, DTLS1_2_VERSION,
1886 SSL_STRONG_NONE | SSL_FIPS,
1887 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
1892 # ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
1895 TLS1_TXT_SRP_SHA_WITH_3DES_EDE_CBC_SHA,
1896 TLS1_RFC_SRP_SHA_WITH_3DES_EDE_CBC_SHA,
1897 TLS1_CK_SRP_SHA_WITH_3DES_EDE_CBC_SHA,
1902 SSL3_VERSION, TLS1_2_VERSION,
1903 DTLS1_BAD_VER, DTLS1_2_VERSION,
1904 SSL_NOT_DEFAULT | SSL_MEDIUM,
1905 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1911 TLS1_TXT_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA,
1912 TLS1_RFC_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA,
1913 TLS1_CK_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA,
1918 SSL3_VERSION, TLS1_2_VERSION,
1919 DTLS1_BAD_VER, DTLS1_2_VERSION,
1920 SSL_NOT_DEFAULT | SSL_MEDIUM,
1921 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1927 TLS1_TXT_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA,
1928 TLS1_RFC_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA,
1929 TLS1_CK_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA,
1934 SSL3_VERSION, TLS1_2_VERSION,
1935 DTLS1_BAD_VER, DTLS1_2_VERSION,
1936 SSL_NOT_DEFAULT | SSL_MEDIUM,
1937 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1944 TLS1_TXT_SRP_SHA_WITH_AES_128_CBC_SHA,
1945 TLS1_RFC_SRP_SHA_WITH_AES_128_CBC_SHA,
1946 TLS1_CK_SRP_SHA_WITH_AES_128_CBC_SHA,
1951 SSL3_VERSION, TLS1_2_VERSION,
1952 DTLS1_BAD_VER, DTLS1_2_VERSION,
1954 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1960 TLS1_TXT_SRP_SHA_RSA_WITH_AES_128_CBC_SHA,
1961 TLS1_RFC_SRP_SHA_RSA_WITH_AES_128_CBC_SHA,
1962 TLS1_CK_SRP_SHA_RSA_WITH_AES_128_CBC_SHA,
1967 SSL3_VERSION, TLS1_2_VERSION,
1968 DTLS1_BAD_VER, DTLS1_2_VERSION,
1970 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1976 TLS1_TXT_SRP_SHA_DSS_WITH_AES_128_CBC_SHA,
1977 TLS1_RFC_SRP_SHA_DSS_WITH_AES_128_CBC_SHA,
1978 TLS1_CK_SRP_SHA_DSS_WITH_AES_128_CBC_SHA,
1983 SSL3_VERSION, TLS1_2_VERSION,
1984 DTLS1_BAD_VER, DTLS1_2_VERSION,
1985 SSL_NOT_DEFAULT | SSL_HIGH,
1986 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
1992 TLS1_TXT_SRP_SHA_WITH_AES_256_CBC_SHA,
1993 TLS1_RFC_SRP_SHA_WITH_AES_256_CBC_SHA,
1994 TLS1_CK_SRP_SHA_WITH_AES_256_CBC_SHA,
1999 SSL3_VERSION, TLS1_2_VERSION,
2000 DTLS1_BAD_VER, DTLS1_2_VERSION,
2002 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2008 TLS1_TXT_SRP_SHA_RSA_WITH_AES_256_CBC_SHA,
2009 TLS1_RFC_SRP_SHA_RSA_WITH_AES_256_CBC_SHA,
2010 TLS1_CK_SRP_SHA_RSA_WITH_AES_256_CBC_SHA,
2015 SSL3_VERSION, TLS1_2_VERSION,
2016 DTLS1_BAD_VER, DTLS1_2_VERSION,
2018 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2024 TLS1_TXT_SRP_SHA_DSS_WITH_AES_256_CBC_SHA,
2025 TLS1_RFC_SRP_SHA_DSS_WITH_AES_256_CBC_SHA,
2026 TLS1_CK_SRP_SHA_DSS_WITH_AES_256_CBC_SHA,
2031 SSL3_VERSION, TLS1_2_VERSION,
2032 DTLS1_BAD_VER, DTLS1_2_VERSION,
2033 SSL_NOT_DEFAULT | SSL_HIGH,
2034 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2039 #if !defined(OPENSSL_NO_CHACHA) && !defined(OPENSSL_NO_POLY1305)
2042 TLS1_TXT_DHE_RSA_WITH_CHACHA20_POLY1305,
2043 TLS1_RFC_DHE_RSA_WITH_CHACHA20_POLY1305,
2044 TLS1_CK_DHE_RSA_WITH_CHACHA20_POLY1305,
2047 SSL_CHACHA20POLY1305,
2049 TLS1_2_VERSION, TLS1_2_VERSION,
2050 DTLS1_2_VERSION, DTLS1_2_VERSION,
2052 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2058 TLS1_TXT_ECDHE_RSA_WITH_CHACHA20_POLY1305,
2059 TLS1_RFC_ECDHE_RSA_WITH_CHACHA20_POLY1305,
2060 TLS1_CK_ECDHE_RSA_WITH_CHACHA20_POLY1305,
2063 SSL_CHACHA20POLY1305,
2065 TLS1_2_VERSION, TLS1_2_VERSION,
2066 DTLS1_2_VERSION, DTLS1_2_VERSION,
2068 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2074 TLS1_TXT_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
2075 TLS1_RFC_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
2076 TLS1_CK_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
2079 SSL_CHACHA20POLY1305,
2081 TLS1_2_VERSION, TLS1_2_VERSION,
2082 DTLS1_2_VERSION, DTLS1_2_VERSION,
2084 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2090 TLS1_TXT_PSK_WITH_CHACHA20_POLY1305,
2091 TLS1_RFC_PSK_WITH_CHACHA20_POLY1305,
2092 TLS1_CK_PSK_WITH_CHACHA20_POLY1305,
2095 SSL_CHACHA20POLY1305,
2097 TLS1_2_VERSION, TLS1_2_VERSION,
2098 DTLS1_2_VERSION, DTLS1_2_VERSION,
2100 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2106 TLS1_TXT_ECDHE_PSK_WITH_CHACHA20_POLY1305,
2107 TLS1_RFC_ECDHE_PSK_WITH_CHACHA20_POLY1305,
2108 TLS1_CK_ECDHE_PSK_WITH_CHACHA20_POLY1305,
2111 SSL_CHACHA20POLY1305,
2113 TLS1_2_VERSION, TLS1_2_VERSION,
2114 DTLS1_2_VERSION, DTLS1_2_VERSION,
2116 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2122 TLS1_TXT_DHE_PSK_WITH_CHACHA20_POLY1305,
2123 TLS1_RFC_DHE_PSK_WITH_CHACHA20_POLY1305,
2124 TLS1_CK_DHE_PSK_WITH_CHACHA20_POLY1305,
2127 SSL_CHACHA20POLY1305,
2129 TLS1_2_VERSION, TLS1_2_VERSION,
2130 DTLS1_2_VERSION, DTLS1_2_VERSION,
2132 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2138 TLS1_TXT_RSA_PSK_WITH_CHACHA20_POLY1305,
2139 TLS1_RFC_RSA_PSK_WITH_CHACHA20_POLY1305,
2140 TLS1_CK_RSA_PSK_WITH_CHACHA20_POLY1305,
2143 SSL_CHACHA20POLY1305,
2145 TLS1_2_VERSION, TLS1_2_VERSION,
2146 DTLS1_2_VERSION, DTLS1_2_VERSION,
2148 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2152 #endif /* !defined(OPENSSL_NO_CHACHA) &&
2153 * !defined(OPENSSL_NO_POLY1305) */
2155 #ifndef OPENSSL_NO_CAMELLIA
2158 TLS1_TXT_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2159 TLS1_RFC_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2160 TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2165 TLS1_2_VERSION, TLS1_2_VERSION,
2166 DTLS1_2_VERSION, DTLS1_2_VERSION,
2167 SSL_NOT_DEFAULT | SSL_HIGH,
2168 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2174 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256,
2175 TLS1_RFC_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256,
2176 TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256,
2181 TLS1_2_VERSION, TLS1_2_VERSION,
2182 DTLS1_2_VERSION, DTLS1_2_VERSION,
2183 SSL_NOT_DEFAULT | SSL_HIGH,
2184 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2190 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2191 TLS1_RFC_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2192 TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2197 TLS1_2_VERSION, TLS1_2_VERSION,
2198 DTLS1_2_VERSION, DTLS1_2_VERSION,
2199 SSL_NOT_DEFAULT | SSL_HIGH,
2200 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2206 TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA256,
2207 TLS1_RFC_ADH_WITH_CAMELLIA_128_CBC_SHA256,
2208 TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA256,
2213 TLS1_2_VERSION, TLS1_2_VERSION,
2214 DTLS1_2_VERSION, DTLS1_2_VERSION,
2215 SSL_NOT_DEFAULT | SSL_HIGH,
2216 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2222 TLS1_TXT_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2223 TLS1_RFC_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2224 TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2229 TLS1_2_VERSION, TLS1_2_VERSION,
2230 DTLS1_2_VERSION, DTLS1_2_VERSION,
2231 SSL_NOT_DEFAULT | SSL_HIGH,
2232 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2238 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256,
2239 TLS1_RFC_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256,
2240 TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256,
2245 TLS1_2_VERSION, TLS1_2_VERSION,
2246 DTLS1_2_VERSION, DTLS1_2_VERSION,
2247 SSL_NOT_DEFAULT | SSL_HIGH,
2248 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2254 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2255 TLS1_RFC_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2256 TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256,
2261 TLS1_2_VERSION, TLS1_2_VERSION,
2262 DTLS1_2_VERSION, DTLS1_2_VERSION,
2263 SSL_NOT_DEFAULT | SSL_HIGH,
2264 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2270 TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA256,
2271 TLS1_RFC_ADH_WITH_CAMELLIA_256_CBC_SHA256,
2272 TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA256,
2277 TLS1_2_VERSION, TLS1_2_VERSION,
2278 DTLS1_2_VERSION, DTLS1_2_VERSION,
2279 SSL_NOT_DEFAULT | SSL_HIGH,
2280 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2286 TLS1_TXT_RSA_WITH_CAMELLIA_256_CBC_SHA,
2287 TLS1_RFC_RSA_WITH_CAMELLIA_256_CBC_SHA,
2288 TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA,
2293 SSL3_VERSION, TLS1_2_VERSION,
2294 DTLS1_BAD_VER, DTLS1_2_VERSION,
2295 SSL_NOT_DEFAULT | SSL_HIGH,
2296 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2302 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,
2303 TLS1_RFC_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,
2304 TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,
2309 SSL3_VERSION, TLS1_2_VERSION,
2310 DTLS1_BAD_VER, DTLS1_2_VERSION,
2311 SSL_NOT_DEFAULT | SSL_HIGH,
2312 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2318 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,
2319 TLS1_RFC_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,
2320 TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,
2325 SSL3_VERSION, TLS1_2_VERSION,
2326 DTLS1_BAD_VER, DTLS1_2_VERSION,
2327 SSL_NOT_DEFAULT | SSL_HIGH,
2328 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2334 TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA,
2335 TLS1_RFC_ADH_WITH_CAMELLIA_256_CBC_SHA,
2336 TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA,
2341 SSL3_VERSION, TLS1_2_VERSION,
2342 DTLS1_BAD_VER, DTLS1_2_VERSION,
2343 SSL_NOT_DEFAULT | SSL_HIGH,
2344 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2350 TLS1_TXT_RSA_WITH_CAMELLIA_128_CBC_SHA,
2351 TLS1_RFC_RSA_WITH_CAMELLIA_128_CBC_SHA,
2352 TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA,
2357 SSL3_VERSION, TLS1_2_VERSION,
2358 DTLS1_BAD_VER, DTLS1_2_VERSION,
2359 SSL_NOT_DEFAULT | SSL_HIGH,
2360 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2366 TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,
2367 TLS1_RFC_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,
2368 TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,
2373 SSL3_VERSION, TLS1_2_VERSION,
2374 DTLS1_BAD_VER, DTLS1_2_VERSION,
2375 SSL_NOT_DEFAULT | SSL_HIGH,
2376 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2382 TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,
2383 TLS1_RFC_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,
2384 TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,
2389 SSL3_VERSION, TLS1_2_VERSION,
2390 DTLS1_BAD_VER, DTLS1_2_VERSION,
2391 SSL_NOT_DEFAULT | SSL_HIGH,
2392 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2398 TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA,
2399 TLS1_RFC_ADH_WITH_CAMELLIA_128_CBC_SHA,
2400 TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA,
2405 SSL3_VERSION, TLS1_2_VERSION,
2406 DTLS1_BAD_VER, DTLS1_2_VERSION,
2407 SSL_NOT_DEFAULT | SSL_HIGH,
2408 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2414 TLS1_TXT_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,
2415 TLS1_RFC_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,
2416 TLS1_CK_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,
2421 TLS1_2_VERSION, TLS1_2_VERSION,
2422 DTLS1_2_VERSION, DTLS1_2_VERSION,
2423 SSL_NOT_DEFAULT | SSL_HIGH,
2424 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2430 TLS1_TXT_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,
2431 TLS1_RFC_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,
2432 TLS1_CK_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,
2437 TLS1_2_VERSION, TLS1_2_VERSION,
2438 DTLS1_2_VERSION, DTLS1_2_VERSION,
2439 SSL_NOT_DEFAULT | SSL_HIGH,
2440 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2446 TLS1_TXT_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2447 TLS1_RFC_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2448 TLS1_CK_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,
2453 TLS1_2_VERSION, TLS1_2_VERSION,
2454 DTLS1_2_VERSION, DTLS1_2_VERSION,
2455 SSL_NOT_DEFAULT | SSL_HIGH,
2456 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2462 TLS1_TXT_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384,
2463 TLS1_RFC_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384,
2464 TLS1_CK_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384,
2469 TLS1_2_VERSION, TLS1_2_VERSION,
2470 DTLS1_2_VERSION, DTLS1_2_VERSION,
2471 SSL_NOT_DEFAULT | SSL_HIGH,
2472 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2478 TLS1_TXT_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2479 TLS1_RFC_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2480 TLS1_CK_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2485 TLS1_VERSION, TLS1_2_VERSION,
2486 DTLS1_BAD_VER, DTLS1_2_VERSION,
2487 SSL_NOT_DEFAULT | SSL_HIGH,
2488 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2494 TLS1_TXT_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2495 TLS1_RFC_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2496 TLS1_CK_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2501 TLS1_VERSION, TLS1_2_VERSION,
2502 DTLS1_BAD_VER, DTLS1_2_VERSION,
2503 SSL_NOT_DEFAULT | SSL_HIGH,
2504 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2510 TLS1_TXT_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2511 TLS1_RFC_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2512 TLS1_CK_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2517 TLS1_VERSION, TLS1_2_VERSION,
2518 DTLS1_BAD_VER, DTLS1_2_VERSION,
2519 SSL_NOT_DEFAULT | SSL_HIGH,
2520 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2526 TLS1_TXT_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2527 TLS1_RFC_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2528 TLS1_CK_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2533 TLS1_VERSION, TLS1_2_VERSION,
2534 DTLS1_BAD_VER, DTLS1_2_VERSION,
2535 SSL_NOT_DEFAULT | SSL_HIGH,
2536 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2542 TLS1_TXT_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2543 TLS1_RFC_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2544 TLS1_CK_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2549 TLS1_VERSION, TLS1_2_VERSION,
2550 DTLS1_BAD_VER, DTLS1_2_VERSION,
2551 SSL_NOT_DEFAULT | SSL_HIGH,
2552 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2558 TLS1_TXT_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2559 TLS1_RFC_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2560 TLS1_CK_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2565 TLS1_VERSION, TLS1_2_VERSION,
2566 DTLS1_BAD_VER, DTLS1_2_VERSION,
2567 SSL_NOT_DEFAULT | SSL_HIGH,
2568 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2574 TLS1_TXT_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2575 TLS1_RFC_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2576 TLS1_CK_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,
2581 TLS1_VERSION, TLS1_2_VERSION,
2582 DTLS1_BAD_VER, DTLS1_2_VERSION,
2583 SSL_NOT_DEFAULT | SSL_HIGH,
2584 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2590 TLS1_TXT_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2591 TLS1_RFC_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2592 TLS1_CK_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,
2597 TLS1_VERSION, TLS1_2_VERSION,
2598 DTLS1_BAD_VER, DTLS1_2_VERSION,
2599 SSL_NOT_DEFAULT | SSL_HIGH,
2600 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
2604 #endif /* OPENSSL_NO_CAMELLIA */
2606 #ifndef OPENSSL_NO_GOST
2609 "GOST2001-GOST89-GOST89",
2610 "TLS_GOSTR341001_WITH_28147_CNT_IMIT",
2614 SSL_eGOST2814789CNT,
2616 TLS1_VERSION, TLS1_2_VERSION,
2619 SSL_HANDSHAKE_MAC_GOST94 | TLS1_PRF_GOST94 | TLS1_STREAM_MAC,
2625 "GOST2001-NULL-GOST94",
2626 "TLS_GOSTR341001_WITH_NULL_GOSTR3411",
2632 TLS1_VERSION, TLS1_2_VERSION,
2635 SSL_HANDSHAKE_MAC_GOST94 | TLS1_PRF_GOST94,
2641 "IANA-GOST2012-GOST8912-GOST8912",
2645 SSL_aGOST12 | SSL_aGOST01,
2646 SSL_eGOST2814789CNT12,
2648 TLS1_VERSION, TLS1_2_VERSION,
2651 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC,
2657 "LEGACY-GOST2012-GOST8912-GOST8912",
2661 SSL_aGOST12 | SSL_aGOST01,
2662 SSL_eGOST2814789CNT12,
2664 TLS1_VERSION, TLS1_2_VERSION,
2667 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC,
2673 "GOST2012-NULL-GOST12",
2677 SSL_aGOST12 | SSL_aGOST01,
2680 TLS1_VERSION, TLS1_2_VERSION,
2683 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC,
2689 "GOST2012-KUZNYECHIK-KUZNYECHIKOMAC",
2696 TLS1_2_VERSION, TLS1_2_VERSION,
2699 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_TLSTREE,
2705 "GOST2012-MAGMA-MAGMAOMAC",
2712 TLS1_2_VERSION, TLS1_2_VERSION,
2715 SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_TLSTREE,
2719 #endif /* OPENSSL_NO_GOST */
2721 #ifndef OPENSSL_NO_IDEA
2724 SSL3_TXT_RSA_IDEA_128_SHA,
2725 SSL3_RFC_RSA_IDEA_128_SHA,
2726 SSL3_CK_RSA_IDEA_128_SHA,
2731 SSL3_VERSION, TLS1_1_VERSION,
2732 DTLS1_BAD_VER, DTLS1_VERSION,
2733 SSL_NOT_DEFAULT | SSL_MEDIUM,
2734 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2740 #ifndef OPENSSL_NO_SEED
2743 TLS1_TXT_RSA_WITH_SEED_SHA,
2744 TLS1_RFC_RSA_WITH_SEED_SHA,
2745 TLS1_CK_RSA_WITH_SEED_SHA,
2750 SSL3_VERSION, TLS1_2_VERSION,
2751 DTLS1_BAD_VER, DTLS1_2_VERSION,
2752 SSL_NOT_DEFAULT | SSL_MEDIUM,
2753 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2759 TLS1_TXT_DHE_DSS_WITH_SEED_SHA,
2760 TLS1_RFC_DHE_DSS_WITH_SEED_SHA,
2761 TLS1_CK_DHE_DSS_WITH_SEED_SHA,
2766 SSL3_VERSION, TLS1_2_VERSION,
2767 DTLS1_BAD_VER, DTLS1_2_VERSION,
2768 SSL_NOT_DEFAULT | SSL_MEDIUM,
2769 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2775 TLS1_TXT_DHE_RSA_WITH_SEED_SHA,
2776 TLS1_RFC_DHE_RSA_WITH_SEED_SHA,
2777 TLS1_CK_DHE_RSA_WITH_SEED_SHA,
2782 SSL3_VERSION, TLS1_2_VERSION,
2783 DTLS1_BAD_VER, DTLS1_2_VERSION,
2784 SSL_NOT_DEFAULT | SSL_MEDIUM,
2785 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2791 TLS1_TXT_ADH_WITH_SEED_SHA,
2792 TLS1_RFC_ADH_WITH_SEED_SHA,
2793 TLS1_CK_ADH_WITH_SEED_SHA,
2798 SSL3_VERSION, TLS1_2_VERSION,
2799 DTLS1_BAD_VER, DTLS1_2_VERSION,
2800 SSL_NOT_DEFAULT | SSL_MEDIUM,
2801 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2805 #endif /* OPENSSL_NO_SEED */
2807 #ifndef OPENSSL_NO_WEAK_SSL_CIPHERS
2810 SSL3_TXT_RSA_RC4_128_MD5,
2811 SSL3_RFC_RSA_RC4_128_MD5,
2812 SSL3_CK_RSA_RC4_128_MD5,
2817 SSL3_VERSION, TLS1_2_VERSION,
2819 SSL_NOT_DEFAULT | SSL_MEDIUM,
2820 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2826 SSL3_TXT_RSA_RC4_128_SHA,
2827 SSL3_RFC_RSA_RC4_128_SHA,
2828 SSL3_CK_RSA_RC4_128_SHA,
2833 SSL3_VERSION, TLS1_2_VERSION,
2835 SSL_NOT_DEFAULT | SSL_MEDIUM,
2836 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2842 SSL3_TXT_ADH_RC4_128_MD5,
2843 SSL3_RFC_ADH_RC4_128_MD5,
2844 SSL3_CK_ADH_RC4_128_MD5,
2849 SSL3_VERSION, TLS1_2_VERSION,
2851 SSL_NOT_DEFAULT | SSL_MEDIUM,
2852 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2858 TLS1_TXT_ECDHE_PSK_WITH_RC4_128_SHA,
2859 TLS1_RFC_ECDHE_PSK_WITH_RC4_128_SHA,
2860 TLS1_CK_ECDHE_PSK_WITH_RC4_128_SHA,
2865 TLS1_VERSION, TLS1_2_VERSION,
2867 SSL_NOT_DEFAULT | SSL_MEDIUM,
2868 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2874 TLS1_TXT_ECDH_anon_WITH_RC4_128_SHA,
2875 TLS1_RFC_ECDH_anon_WITH_RC4_128_SHA,
2876 TLS1_CK_ECDH_anon_WITH_RC4_128_SHA,
2881 TLS1_VERSION, TLS1_2_VERSION,
2883 SSL_NOT_DEFAULT | SSL_MEDIUM,
2884 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2890 TLS1_TXT_ECDHE_ECDSA_WITH_RC4_128_SHA,
2891 TLS1_RFC_ECDHE_ECDSA_WITH_RC4_128_SHA,
2892 TLS1_CK_ECDHE_ECDSA_WITH_RC4_128_SHA,
2897 TLS1_VERSION, TLS1_2_VERSION,
2899 SSL_NOT_DEFAULT | SSL_MEDIUM,
2900 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2906 TLS1_TXT_ECDHE_RSA_WITH_RC4_128_SHA,
2907 TLS1_RFC_ECDHE_RSA_WITH_RC4_128_SHA,
2908 TLS1_CK_ECDHE_RSA_WITH_RC4_128_SHA,
2913 TLS1_VERSION, TLS1_2_VERSION,
2915 SSL_NOT_DEFAULT | SSL_MEDIUM,
2916 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2922 TLS1_TXT_PSK_WITH_RC4_128_SHA,
2923 TLS1_RFC_PSK_WITH_RC4_128_SHA,
2924 TLS1_CK_PSK_WITH_RC4_128_SHA,
2929 SSL3_VERSION, TLS1_2_VERSION,
2931 SSL_NOT_DEFAULT | SSL_MEDIUM,
2932 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2938 TLS1_TXT_RSA_PSK_WITH_RC4_128_SHA,
2939 TLS1_RFC_RSA_PSK_WITH_RC4_128_SHA,
2940 TLS1_CK_RSA_PSK_WITH_RC4_128_SHA,
2945 SSL3_VERSION, TLS1_2_VERSION,
2947 SSL_NOT_DEFAULT | SSL_MEDIUM,
2948 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2954 TLS1_TXT_DHE_PSK_WITH_RC4_128_SHA,
2955 TLS1_RFC_DHE_PSK_WITH_RC4_128_SHA,
2956 TLS1_CK_DHE_PSK_WITH_RC4_128_SHA,
2961 SSL3_VERSION, TLS1_2_VERSION,
2963 SSL_NOT_DEFAULT | SSL_MEDIUM,
2964 SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,
2968 #endif /* OPENSSL_NO_WEAK_SSL_CIPHERS */
2970 #ifndef OPENSSL_NO_ARIA
2973 TLS1_TXT_RSA_WITH_ARIA_128_GCM_SHA256,
2974 TLS1_RFC_RSA_WITH_ARIA_128_GCM_SHA256,
2975 TLS1_CK_RSA_WITH_ARIA_128_GCM_SHA256,
2980 TLS1_2_VERSION, TLS1_2_VERSION,
2981 DTLS1_2_VERSION, DTLS1_2_VERSION,
2982 SSL_NOT_DEFAULT | SSL_HIGH,
2983 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
2989 TLS1_TXT_RSA_WITH_ARIA_256_GCM_SHA384,
2990 TLS1_RFC_RSA_WITH_ARIA_256_GCM_SHA384,
2991 TLS1_CK_RSA_WITH_ARIA_256_GCM_SHA384,
2996 TLS1_2_VERSION, TLS1_2_VERSION,
2997 DTLS1_2_VERSION, DTLS1_2_VERSION,
2998 SSL_NOT_DEFAULT | SSL_HIGH,
2999 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3005 TLS1_TXT_DHE_RSA_WITH_ARIA_128_GCM_SHA256,
3006 TLS1_RFC_DHE_RSA_WITH_ARIA_128_GCM_SHA256,
3007 TLS1_CK_DHE_RSA_WITH_ARIA_128_GCM_SHA256,
3012 TLS1_2_VERSION, TLS1_2_VERSION,
3013 DTLS1_2_VERSION, DTLS1_2_VERSION,
3014 SSL_NOT_DEFAULT | SSL_HIGH,
3015 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3021 TLS1_TXT_DHE_RSA_WITH_ARIA_256_GCM_SHA384,
3022 TLS1_RFC_DHE_RSA_WITH_ARIA_256_GCM_SHA384,
3023 TLS1_CK_DHE_RSA_WITH_ARIA_256_GCM_SHA384,
3028 TLS1_2_VERSION, TLS1_2_VERSION,
3029 DTLS1_2_VERSION, DTLS1_2_VERSION,
3030 SSL_NOT_DEFAULT | SSL_HIGH,
3031 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3037 TLS1_TXT_DHE_DSS_WITH_ARIA_128_GCM_SHA256,
3038 TLS1_RFC_DHE_DSS_WITH_ARIA_128_GCM_SHA256,
3039 TLS1_CK_DHE_DSS_WITH_ARIA_128_GCM_SHA256,
3044 TLS1_2_VERSION, TLS1_2_VERSION,
3045 DTLS1_2_VERSION, DTLS1_2_VERSION,
3046 SSL_NOT_DEFAULT | SSL_HIGH,
3047 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3053 TLS1_TXT_DHE_DSS_WITH_ARIA_256_GCM_SHA384,
3054 TLS1_RFC_DHE_DSS_WITH_ARIA_256_GCM_SHA384,
3055 TLS1_CK_DHE_DSS_WITH_ARIA_256_GCM_SHA384,
3060 TLS1_2_VERSION, TLS1_2_VERSION,
3061 DTLS1_2_VERSION, DTLS1_2_VERSION,
3062 SSL_NOT_DEFAULT | SSL_HIGH,
3063 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3069 TLS1_TXT_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256,
3070 TLS1_RFC_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256,
3071 TLS1_CK_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256,
3076 TLS1_2_VERSION, TLS1_2_VERSION,
3077 DTLS1_2_VERSION, DTLS1_2_VERSION,
3078 SSL_NOT_DEFAULT | SSL_HIGH,
3079 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3085 TLS1_TXT_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384,
3086 TLS1_RFC_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384,
3087 TLS1_CK_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384,
3092 TLS1_2_VERSION, TLS1_2_VERSION,
3093 DTLS1_2_VERSION, DTLS1_2_VERSION,
3094 SSL_NOT_DEFAULT | SSL_HIGH,
3095 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3101 TLS1_TXT_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256,
3102 TLS1_RFC_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256,
3103 TLS1_CK_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256,
3108 TLS1_2_VERSION, TLS1_2_VERSION,
3109 DTLS1_2_VERSION, DTLS1_2_VERSION,
3110 SSL_NOT_DEFAULT | SSL_HIGH,
3111 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3117 TLS1_TXT_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384,
3118 TLS1_RFC_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384,
3119 TLS1_CK_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384,
3124 TLS1_2_VERSION, TLS1_2_VERSION,
3125 DTLS1_2_VERSION, DTLS1_2_VERSION,
3126 SSL_NOT_DEFAULT | SSL_HIGH,
3127 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3133 TLS1_TXT_PSK_WITH_ARIA_128_GCM_SHA256,
3134 TLS1_RFC_PSK_WITH_ARIA_128_GCM_SHA256,
3135 TLS1_CK_PSK_WITH_ARIA_128_GCM_SHA256,
3140 TLS1_2_VERSION, TLS1_2_VERSION,
3141 DTLS1_2_VERSION, DTLS1_2_VERSION,
3142 SSL_NOT_DEFAULT | SSL_HIGH,
3143 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3149 TLS1_TXT_PSK_WITH_ARIA_256_GCM_SHA384,
3150 TLS1_RFC_PSK_WITH_ARIA_256_GCM_SHA384,
3151 TLS1_CK_PSK_WITH_ARIA_256_GCM_SHA384,
3156 TLS1_2_VERSION, TLS1_2_VERSION,
3157 DTLS1_2_VERSION, DTLS1_2_VERSION,
3158 SSL_NOT_DEFAULT | SSL_HIGH,
3159 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3165 TLS1_TXT_DHE_PSK_WITH_ARIA_128_GCM_SHA256,
3166 TLS1_RFC_DHE_PSK_WITH_ARIA_128_GCM_SHA256,
3167 TLS1_CK_DHE_PSK_WITH_ARIA_128_GCM_SHA256,
3172 TLS1_2_VERSION, TLS1_2_VERSION,
3173 DTLS1_2_VERSION, DTLS1_2_VERSION,
3174 SSL_NOT_DEFAULT | SSL_HIGH,
3175 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3181 TLS1_TXT_DHE_PSK_WITH_ARIA_256_GCM_SHA384,
3182 TLS1_RFC_DHE_PSK_WITH_ARIA_256_GCM_SHA384,
3183 TLS1_CK_DHE_PSK_WITH_ARIA_256_GCM_SHA384,
3188 TLS1_2_VERSION, TLS1_2_VERSION,
3189 DTLS1_2_VERSION, DTLS1_2_VERSION,
3190 SSL_NOT_DEFAULT | SSL_HIGH,
3191 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3197 TLS1_TXT_RSA_PSK_WITH_ARIA_128_GCM_SHA256,
3198 TLS1_RFC_RSA_PSK_WITH_ARIA_128_GCM_SHA256,
3199 TLS1_CK_RSA_PSK_WITH_ARIA_128_GCM_SHA256,
3204 TLS1_2_VERSION, TLS1_2_VERSION,
3205 DTLS1_2_VERSION, DTLS1_2_VERSION,
3206 SSL_NOT_DEFAULT | SSL_HIGH,
3207 SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,
3213 TLS1_TXT_RSA_PSK_WITH_ARIA_256_GCM_SHA384,
3214 TLS1_RFC_RSA_PSK_WITH_ARIA_256_GCM_SHA384,
3215 TLS1_CK_RSA_PSK_WITH_ARIA_256_GCM_SHA384,
3220 TLS1_2_VERSION, TLS1_2_VERSION,
3221 DTLS1_2_VERSION, DTLS1_2_VERSION,
3222 SSL_NOT_DEFAULT | SSL_HIGH,
3223 SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,
3227 #endif /* OPENSSL_NO_ARIA */
3231 * The list of known Signalling Cipher-Suite Value "ciphers", non-valid
3232 * values stuffed into the ciphers field of the wire protocol for signalling
3235 static SSL_CIPHER ssl3_scsvs[] = {
3238 "TLS_EMPTY_RENEGOTIATION_INFO_SCSV",
3239 "TLS_EMPTY_RENEGOTIATION_INFO_SCSV",
3241 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
3245 "TLS_FALLBACK_SCSV",
3246 "TLS_FALLBACK_SCSV",
3247 SSL3_CK_FALLBACK_SCSV,
3248 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
3252 static int cipher_compare(const void *a, const void *b)
3254 const SSL_CIPHER *ap = (const SSL_CIPHER *)a;
3255 const SSL_CIPHER *bp = (const SSL_CIPHER *)b;
3257 if (ap->id == bp->id)
3259 return ap->id < bp->id ? -1 : 1;
3262 void ssl_sort_cipher_list(void)
3264 qsort(tls13_ciphers, TLS13_NUM_CIPHERS, sizeof(tls13_ciphers[0]),
3266 qsort(ssl3_ciphers, SSL3_NUM_CIPHERS, sizeof(ssl3_ciphers[0]),
3268 qsort(ssl3_scsvs, SSL3_NUM_SCSVS, sizeof(ssl3_scsvs[0]), cipher_compare);
3271 static int ssl_undefined_function_1(SSL *ssl, unsigned char *r, size_t s,
3272 const char * t, size_t u,
3273 const unsigned char * v, size_t w, int x)
3282 return ssl_undefined_function(ssl);
3285 const SSL3_ENC_METHOD SSLv3_enc_data = {
3288 ssl3_setup_key_block,
3289 ssl3_generate_master_secret,
3290 ssl3_change_cipher_state,
3291 ssl3_final_finish_mac,
3292 SSL3_MD_CLIENT_FINISHED_CONST, 4,
3293 SSL3_MD_SERVER_FINISHED_CONST, 4,
3295 ssl_undefined_function_1,
3297 ssl3_set_handshake_header,
3298 tls_close_construct_packet,
3299 ssl3_handshake_write
3302 long ssl3_default_timeout(void)
3305 * 2 hours, the 24 hours mentioned in the SSLv3 spec is way too long for
3306 * http, the cache would over fill
3308 return (60 * 60 * 2);
3311 int ssl3_num_ciphers(void)
3313 return SSL3_NUM_CIPHERS;
3316 const SSL_CIPHER *ssl3_get_cipher(unsigned int u)
3318 if (u < SSL3_NUM_CIPHERS)
3319 return &(ssl3_ciphers[SSL3_NUM_CIPHERS - 1 - u]);
3324 int ssl3_set_handshake_header(SSL *s, WPACKET *pkt, int htype)
3326 /* No header in the event of a CCS */
3327 if (htype == SSL3_MT_CHANGE_CIPHER_SPEC)
3330 /* Set the content type and 3 bytes for the message len */
3331 if (!WPACKET_put_bytes_u8(pkt, htype)
3332 || !WPACKET_start_sub_packet_u24(pkt))
3338 int ssl3_handshake_write(SSL *s)
3340 return ssl3_do_write(s, SSL3_RT_HANDSHAKE);
3343 int ssl3_new(SSL *s)
3345 #ifndef OPENSSL_NO_SRP
3346 if (!SSL_SRP_CTX_init(s))
3350 if (!s->method->ssl_clear(s))
3356 void ssl3_free(SSL *s)
3361 ssl3_cleanup_key_block(s);
3363 EVP_PKEY_free(s->s3.peer_tmp);
3364 s->s3.peer_tmp = NULL;
3365 EVP_PKEY_free(s->s3.tmp.pkey);
3366 s->s3.tmp.pkey = NULL;
3368 ssl_evp_cipher_free(s->s3.tmp.new_sym_enc);
3369 ssl_evp_md_free(s->s3.tmp.new_hash);
3371 OPENSSL_free(s->s3.tmp.ctype);
3372 sk_X509_NAME_pop_free(s->s3.tmp.peer_ca_names, X509_NAME_free);
3373 OPENSSL_free(s->s3.tmp.ciphers_raw);
3374 OPENSSL_clear_free(s->s3.tmp.pms, s->s3.tmp.pmslen);
3375 OPENSSL_free(s->s3.tmp.peer_sigalgs);
3376 OPENSSL_free(s->s3.tmp.peer_cert_sigalgs);
3377 ssl3_free_digest_list(s);
3378 OPENSSL_free(s->s3.alpn_selected);
3379 OPENSSL_free(s->s3.alpn_proposed);
3381 #ifndef OPENSSL_NO_SRP
3382 SSL_SRP_CTX_free(s);
3384 memset(&s->s3, 0, sizeof(s->s3));
3387 int ssl3_clear(SSL *s)
3389 ssl3_cleanup_key_block(s);
3390 OPENSSL_free(s->s3.tmp.ctype);
3391 sk_X509_NAME_pop_free(s->s3.tmp.peer_ca_names, X509_NAME_free);
3392 OPENSSL_free(s->s3.tmp.ciphers_raw);
3393 OPENSSL_clear_free(s->s3.tmp.pms, s->s3.tmp.pmslen);
3394 OPENSSL_free(s->s3.tmp.peer_sigalgs);
3395 OPENSSL_free(s->s3.tmp.peer_cert_sigalgs);
3397 EVP_PKEY_free(s->s3.tmp.pkey);
3398 EVP_PKEY_free(s->s3.peer_tmp);
3400 ssl3_free_digest_list(s);
3402 OPENSSL_free(s->s3.alpn_selected);
3403 OPENSSL_free(s->s3.alpn_proposed);
3405 /* NULL/zero-out everything in the s3 struct */
3406 memset(&s->s3, 0, sizeof(s->s3));
3408 if (!ssl_free_wbio_buffer(s))
3411 s->version = SSL3_VERSION;
3413 #if !defined(OPENSSL_NO_NEXTPROTONEG)
3414 OPENSSL_free(s->ext.npn);
3422 #ifndef OPENSSL_NO_SRP
3423 static char *srp_password_from_info_cb(SSL *s, void *arg)
3425 return OPENSSL_strdup(s->srp_ctx.info);
3429 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len);
3431 long ssl3_ctrl(SSL *s, int cmd, long larg, void *parg)
3436 case SSL_CTRL_GET_CLIENT_CERT_REQUEST:
3438 case SSL_CTRL_GET_NUM_RENEGOTIATIONS:
3439 ret = s->s3.num_renegotiations;
3441 case SSL_CTRL_CLEAR_NUM_RENEGOTIATIONS:
3442 ret = s->s3.num_renegotiations;
3443 s->s3.num_renegotiations = 0;
3445 case SSL_CTRL_GET_TOTAL_RENEGOTIATIONS:
3446 ret = s->s3.total_renegotiations;
3448 case SSL_CTRL_GET_FLAGS:
3449 ret = (int)(s->s3.flags);
3451 #if !defined(OPENSSL_NO_DEPRECATED_3_0)
3452 case SSL_CTRL_SET_TMP_DH:
3454 EVP_PKEY *pkdh = NULL;
3456 ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER);
3459 pkdh = ssl_dh_to_pkey(parg);
3461 ERR_raise(ERR_LIB_SSL, ERR_R_MALLOC_FAILURE);
3464 return SSL_set0_tmp_dh_pkey(s, pkdh);
3467 case SSL_CTRL_SET_TMP_DH_CB:
3469 ERR_raise(ERR_LIB_SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
3473 case SSL_CTRL_SET_DH_AUTO:
3474 s->cert->dh_tmp_auto = larg;
3476 #if !defined(OPENSSL_NO_DEPRECATED_3_0)
3477 case SSL_CTRL_SET_TMP_ECDH:
3480 ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER);
3483 return ssl_set_tmp_ecdh_groups(&s->ext.supportedgroups,
3484 &s->ext.supportedgroups_len,
3488 case SSL_CTRL_SET_TLSEXT_HOSTNAME:
3490 * This API is only used for a client to set what SNI it will request
3491 * from the server, but we currently allow it to be used on servers
3492 * as well, which is a programming error. Currently we just clear
3493 * the field in SSL_do_handshake() for server SSLs, but when we can
3494 * make ABI-breaking changes, we may want to make use of this API
3495 * an error on server SSLs.
3497 if (larg == TLSEXT_NAMETYPE_host_name) {
3500 OPENSSL_free(s->ext.hostname);
3501 s->ext.hostname = NULL;
3506 len = strlen((char *)parg);
3507 if (len == 0 || len > TLSEXT_MAXLEN_host_name) {
3508 ERR_raise(ERR_LIB_SSL, SSL_R_SSL3_EXT_INVALID_SERVERNAME);
3511 if ((s->ext.hostname = OPENSSL_strdup((char *)parg)) == NULL) {
3512 ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR);
3516 ERR_raise(ERR_LIB_SSL, SSL_R_SSL3_EXT_INVALID_SERVERNAME_TYPE);
3520 case SSL_CTRL_SET_TLSEXT_DEBUG_ARG:
3521 s->ext.debug_arg = parg;
3525 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE:
3526 ret = s->ext.status_type;
3529 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE:
3530 s->ext.status_type = larg;
3534 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS:
3535 *(STACK_OF(X509_EXTENSION) **)parg = s->ext.ocsp.exts;
3539 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS:
3540 s->ext.ocsp.exts = parg;
3544 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_IDS:
3545 *(STACK_OF(OCSP_RESPID) **)parg = s->ext.ocsp.ids;
3549 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_IDS:
3550 s->ext.ocsp.ids = parg;
3554 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP:
3555 *(unsigned char **)parg = s->ext.ocsp.resp;
3556 if (s->ext.ocsp.resp_len == 0
3557 || s->ext.ocsp.resp_len > LONG_MAX)
3559 return (long)s->ext.ocsp.resp_len;
3561 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP:
3562 OPENSSL_free(s->ext.ocsp.resp);
3563 s->ext.ocsp.resp = parg;
3564 s->ext.ocsp.resp_len = larg;
3568 case SSL_CTRL_CHAIN:
3570 return ssl_cert_set1_chain(s, NULL, (STACK_OF(X509) *)parg);
3572 return ssl_cert_set0_chain(s, NULL, (STACK_OF(X509) *)parg);
3574 case SSL_CTRL_CHAIN_CERT:
3576 return ssl_cert_add1_chain_cert(s, NULL, (X509 *)parg);
3578 return ssl_cert_add0_chain_cert(s, NULL, (X509 *)parg);
3580 case SSL_CTRL_GET_CHAIN_CERTS:
3581 *(STACK_OF(X509) **)parg = s->cert->key->chain;
3585 case SSL_CTRL_SELECT_CURRENT_CERT:
3586 return ssl_cert_select_current(s->cert, (X509 *)parg);
3588 case SSL_CTRL_SET_CURRENT_CERT:
3589 if (larg == SSL_CERT_SET_SERVER) {
3590 const SSL_CIPHER *cipher;
3593 cipher = s->s3.tmp.new_cipher;
3597 * No certificate for unauthenticated ciphersuites or using SRP
3600 if (cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP))
3602 if (s->s3.tmp.cert == NULL)
3604 s->cert->key = s->s3.tmp.cert;
3607 return ssl_cert_set_current(s->cert, larg);
3609 case SSL_CTRL_GET_GROUPS:
3616 clist = s->ext.peer_supportedgroups;
3617 clistlen = s->ext.peer_supportedgroups_len;
3622 for (i = 0; i < clistlen; i++) {
3623 const TLS_GROUP_INFO *cinf
3624 = tls1_group_id_lookup(s->ctx, clist[i]);
3627 cptr[i] = tls1_group_id2nid(cinf->group_id, 1);
3629 cptr[i] = TLSEXT_nid_unknown | clist[i];
3632 return (int)clistlen;
3635 case SSL_CTRL_SET_GROUPS:
3636 return tls1_set_groups(&s->ext.supportedgroups,
3637 &s->ext.supportedgroups_len, parg, larg);
3639 case SSL_CTRL_SET_GROUPS_LIST:
3640 return tls1_set_groups_list(s->ctx, &s->ext.supportedgroups,
3641 &s->ext.supportedgroups_len, parg);
3643 case SSL_CTRL_GET_SHARED_GROUP:
3645 uint16_t id = tls1_shared_group(s, larg);
3648 return tls1_group_id2nid(id, 1);
3651 case SSL_CTRL_GET_NEGOTIATED_GROUP:
3652 ret = tls1_group_id2nid(s->s3.group_id, 1);
3655 case SSL_CTRL_SET_SIGALGS:
3656 return tls1_set_sigalgs(s->cert, parg, larg, 0);
3658 case SSL_CTRL_SET_SIGALGS_LIST:
3659 return tls1_set_sigalgs_list(s->cert, parg, 0);
3661 case SSL_CTRL_SET_CLIENT_SIGALGS:
3662 return tls1_set_sigalgs(s->cert, parg, larg, 1);
3664 case SSL_CTRL_SET_CLIENT_SIGALGS_LIST:
3665 return tls1_set_sigalgs_list(s->cert, parg, 1);
3667 case SSL_CTRL_GET_CLIENT_CERT_TYPES:
3669 const unsigned char **pctype = parg;
3670 if (s->server || !s->s3.tmp.cert_req)
3673 *pctype = s->s3.tmp.ctype;
3674 return s->s3.tmp.ctype_len;
3677 case SSL_CTRL_SET_CLIENT_CERT_TYPES:
3680 return ssl3_set_req_cert_type(s->cert, parg, larg);
3682 case SSL_CTRL_BUILD_CERT_CHAIN:
3683 return ssl_build_cert_chain(s, NULL, larg);
3685 case SSL_CTRL_SET_VERIFY_CERT_STORE:
3686 return ssl_cert_set_cert_store(s->cert, parg, 0, larg);
3688 case SSL_CTRL_SET_CHAIN_CERT_STORE:
3689 return ssl_cert_set_cert_store(s->cert, parg, 1, larg);
3691 case SSL_CTRL_GET_PEER_SIGNATURE_NID:
3692 if (s->s3.tmp.peer_sigalg == NULL)
3694 *(int *)parg = s->s3.tmp.peer_sigalg->hash;
3697 case SSL_CTRL_GET_SIGNATURE_NID:
3698 if (s->s3.tmp.sigalg == NULL)
3700 *(int *)parg = s->s3.tmp.sigalg->hash;
3703 case SSL_CTRL_GET_PEER_TMP_KEY:
3704 if (s->session == NULL || s->s3.peer_tmp == NULL) {
3707 EVP_PKEY_up_ref(s->s3.peer_tmp);
3708 *(EVP_PKEY **)parg = s->s3.peer_tmp;
3712 case SSL_CTRL_GET_TMP_KEY:
3713 if (s->session == NULL || s->s3.tmp.pkey == NULL) {
3716 EVP_PKEY_up_ref(s->s3.tmp.pkey);
3717 *(EVP_PKEY **)parg = s->s3.tmp.pkey;
3721 #ifndef OPENSSL_NO_EC
3722 case SSL_CTRL_GET_EC_POINT_FORMATS:
3724 const unsigned char **pformat = parg;
3726 if (s->ext.peer_ecpointformats == NULL)
3728 *pformat = s->ext.peer_ecpointformats;
3729 return (int)s->ext.peer_ecpointformats_len;
3739 long ssl3_callback_ctrl(SSL *s, int cmd, void (*fp) (void))
3744 #if !defined(OPENSSL_NO_DEPRECATED_3_0)
3745 case SSL_CTRL_SET_TMP_DH_CB:
3746 s->cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))fp;
3750 case SSL_CTRL_SET_TLSEXT_DEBUG_CB:
3751 s->ext.debug_cb = (void (*)(SSL *, int, int,
3752 const unsigned char *, int, void *))fp;
3756 case SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB:
3757 s->not_resumable_session_cb = (int (*)(SSL *, int))fp;
3766 long ssl3_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg)
3769 #if !defined(OPENSSL_NO_DEPRECATED_3_0)
3770 case SSL_CTRL_SET_TMP_DH:
3772 EVP_PKEY *pkdh = NULL;
3774 ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER);
3777 pkdh = ssl_dh_to_pkey(parg);
3779 ERR_raise(ERR_LIB_SSL, ERR_R_MALLOC_FAILURE);
3782 return SSL_CTX_set0_tmp_dh_pkey(ctx, pkdh);
3784 case SSL_CTRL_SET_TMP_DH_CB:
3786 ERR_raise(ERR_LIB_SSL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
3790 case SSL_CTRL_SET_DH_AUTO:
3791 ctx->cert->dh_tmp_auto = larg;
3793 #if !defined(OPENSSL_NO_DEPRECATED_3_0)
3794 case SSL_CTRL_SET_TMP_ECDH:
3797 ERR_raise(ERR_LIB_SSL, ERR_R_PASSED_NULL_PARAMETER);
3800 return ssl_set_tmp_ecdh_groups(&ctx->ext.supportedgroups,
3801 &ctx->ext.supportedgroups_len,
3805 case SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG:
3806 ctx->ext.servername_arg = parg;
3808 case SSL_CTRL_SET_TLSEXT_TICKET_KEYS:
3809 case SSL_CTRL_GET_TLSEXT_TICKET_KEYS:
3811 unsigned char *keys = parg;
3812 long tick_keylen = (sizeof(ctx->ext.tick_key_name) +
3813 sizeof(ctx->ext.secure->tick_hmac_key) +
3814 sizeof(ctx->ext.secure->tick_aes_key));
3817 if (larg != tick_keylen) {
3818 ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_TICKET_KEYS_LENGTH);
3821 if (cmd == SSL_CTRL_SET_TLSEXT_TICKET_KEYS) {
3822 memcpy(ctx->ext.tick_key_name, keys,
3823 sizeof(ctx->ext.tick_key_name));
3824 memcpy(ctx->ext.secure->tick_hmac_key,
3825 keys + sizeof(ctx->ext.tick_key_name),
3826 sizeof(ctx->ext.secure->tick_hmac_key));
3827 memcpy(ctx->ext.secure->tick_aes_key,
3828 keys + sizeof(ctx->ext.tick_key_name) +
3829 sizeof(ctx->ext.secure->tick_hmac_key),
3830 sizeof(ctx->ext.secure->tick_aes_key));
3832 memcpy(keys, ctx->ext.tick_key_name,
3833 sizeof(ctx->ext.tick_key_name));
3834 memcpy(keys + sizeof(ctx->ext.tick_key_name),
3835 ctx->ext.secure->tick_hmac_key,
3836 sizeof(ctx->ext.secure->tick_hmac_key));
3837 memcpy(keys + sizeof(ctx->ext.tick_key_name) +
3838 sizeof(ctx->ext.secure->tick_hmac_key),
3839 ctx->ext.secure->tick_aes_key,
3840 sizeof(ctx->ext.secure->tick_aes_key));
3845 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE:
3846 return ctx->ext.status_type;
3848 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE:
3849 ctx->ext.status_type = larg;
3852 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB_ARG:
3853 ctx->ext.status_arg = parg;
3856 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_CB_ARG:
3857 *(void**)parg = ctx->ext.status_arg;
3860 case SSL_CTRL_GET_TLSEXT_STATUS_REQ_CB:
3861 *(int (**)(SSL*, void*))parg = ctx->ext.status_cb;
3864 #ifndef OPENSSL_NO_SRP
3865 case SSL_CTRL_SET_TLS_EXT_SRP_USERNAME:
3866 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
3867 OPENSSL_free(ctx->srp_ctx.login);
3868 ctx->srp_ctx.login = NULL;
3871 if (strlen((const char *)parg) > 255 || strlen((const char *)parg) < 1) {
3872 ERR_raise(ERR_LIB_SSL, SSL_R_INVALID_SRP_USERNAME);
3875 if ((ctx->srp_ctx.login = OPENSSL_strdup((char *)parg)) == NULL) {
3876 ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR);
3880 case SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD:
3881 ctx->srp_ctx.SRP_give_srp_client_pwd_callback =
3882 srp_password_from_info_cb;
3883 if (ctx->srp_ctx.info != NULL)
3884 OPENSSL_free(ctx->srp_ctx.info);
3885 if ((ctx->srp_ctx.info = OPENSSL_strdup((char *)parg)) == NULL) {
3886 ERR_raise(ERR_LIB_SSL, ERR_R_INTERNAL_ERROR);
3890 case SSL_CTRL_SET_SRP_ARG:
3891 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
3892 ctx->srp_ctx.SRP_cb_arg = parg;
3895 case SSL_CTRL_SET_TLS_EXT_SRP_STRENGTH:
3896 ctx->srp_ctx.strength = larg;
3900 case SSL_CTRL_SET_GROUPS:
3901 return tls1_set_groups(&ctx->ext.supportedgroups,
3902 &ctx->ext.supportedgroups_len,
3905 case SSL_CTRL_SET_GROUPS_LIST:
3906 return tls1_set_groups_list(ctx, &ctx->ext.supportedgroups,
3907 &ctx->ext.supportedgroups_len,
3910 case SSL_CTRL_SET_SIGALGS:
3911 return tls1_set_sigalgs(ctx->cert, parg, larg, 0);
3913 case SSL_CTRL_SET_SIGALGS_LIST:
3914 return tls1_set_sigalgs_list(ctx->cert, parg, 0);
3916 case SSL_CTRL_SET_CLIENT_SIGALGS:
3917 return tls1_set_sigalgs(ctx->cert, parg, larg, 1);
3919 case SSL_CTRL_SET_CLIENT_SIGALGS_LIST:
3920 return tls1_set_sigalgs_list(ctx->cert, parg, 1);
3922 case SSL_CTRL_SET_CLIENT_CERT_TYPES:
3923 return ssl3_set_req_cert_type(ctx->cert, parg, larg);
3925 case SSL_CTRL_BUILD_CERT_CHAIN:
3926 return ssl_build_cert_chain(NULL, ctx, larg);
3928 case SSL_CTRL_SET_VERIFY_CERT_STORE:
3929 return ssl_cert_set_cert_store(ctx->cert, parg, 0, larg);
3931 case SSL_CTRL_SET_CHAIN_CERT_STORE:
3932 return ssl_cert_set_cert_store(ctx->cert, parg, 1, larg);
3934 /* A Thawte special :-) */
3935 case SSL_CTRL_EXTRA_CHAIN_CERT:
3936 if (ctx->extra_certs == NULL) {
3937 if ((ctx->extra_certs = sk_X509_new_null()) == NULL) {
3938 ERR_raise(ERR_LIB_SSL, ERR_R_MALLOC_FAILURE);
3942 if (!sk_X509_push(ctx->extra_certs, (X509 *)parg)) {
3943 ERR_raise(ERR_LIB_SSL, ERR_R_MALLOC_FAILURE);
3948 case SSL_CTRL_GET_EXTRA_CHAIN_CERTS:
3949 if (ctx->extra_certs == NULL && larg == 0)
3950 *(STACK_OF(X509) **)parg = ctx->cert->key->chain;
3952 *(STACK_OF(X509) **)parg = ctx->extra_certs;
3955 case SSL_CTRL_CLEAR_EXTRA_CHAIN_CERTS:
3956 sk_X509_pop_free(ctx->extra_certs, X509_free);
3957 ctx->extra_certs = NULL;
3960 case SSL_CTRL_CHAIN:
3962 return ssl_cert_set1_chain(NULL, ctx, (STACK_OF(X509) *)parg);
3964 return ssl_cert_set0_chain(NULL, ctx, (STACK_OF(X509) *)parg);
3966 case SSL_CTRL_CHAIN_CERT:
3968 return ssl_cert_add1_chain_cert(NULL, ctx, (X509 *)parg);
3970 return ssl_cert_add0_chain_cert(NULL, ctx, (X509 *)parg);
3972 case SSL_CTRL_GET_CHAIN_CERTS:
3973 *(STACK_OF(X509) **)parg = ctx->cert->key->chain;
3976 case SSL_CTRL_SELECT_CURRENT_CERT:
3977 return ssl_cert_select_current(ctx->cert, (X509 *)parg);
3979 case SSL_CTRL_SET_CURRENT_CERT:
3980 return ssl_cert_set_current(ctx->cert, larg);
3988 long ssl3_ctx_callback_ctrl(SSL_CTX *ctx, int cmd, void (*fp) (void))
3991 #if !defined(OPENSSL_NO_DEPRECATED_3_0)
3992 case SSL_CTRL_SET_TMP_DH_CB:
3994 ctx->cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))fp;
3998 case SSL_CTRL_SET_TLSEXT_SERVERNAME_CB:
3999 ctx->ext.servername_cb = (int (*)(SSL *, int *, void *))fp;
4002 case SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB:
4003 ctx->ext.status_cb = (int (*)(SSL *, void *))fp;
4006 # ifndef OPENSSL_NO_DEPRECATED_3_0
4007 case SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB:
4008 ctx->ext.ticket_key_cb = (int (*)(SSL *, unsigned char *,
4011 HMAC_CTX *, int))fp;
4015 #ifndef OPENSSL_NO_SRP
4016 case SSL_CTRL_SET_SRP_VERIFY_PARAM_CB:
4017 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
4018 ctx->srp_ctx.SRP_verify_param_callback = (int (*)(SSL *, void *))fp;
4020 case SSL_CTRL_SET_TLS_EXT_SRP_USERNAME_CB:
4021 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
4022 ctx->srp_ctx.TLS_ext_srp_username_callback =
4023 (int (*)(SSL *, int *, void *))fp;
4025 case SSL_CTRL_SET_SRP_GIVE_CLIENT_PWD_CB:
4026 ctx->srp_ctx.srp_Mask |= SSL_kSRP;
4027 ctx->srp_ctx.SRP_give_srp_client_pwd_callback =
4028 (char *(*)(SSL *, void *))fp;
4031 case SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB:
4033 ctx->not_resumable_session_cb = (int (*)(SSL *, int))fp;
4042 int SSL_CTX_set_tlsext_ticket_key_evp_cb
4043 (SSL_CTX *ctx, int (*fp)(SSL *, unsigned char *, unsigned char *,
4044 EVP_CIPHER_CTX *, EVP_MAC_CTX *, int))
4046 ctx->ext.ticket_key_evp_cb = fp;
4050 const SSL_CIPHER *ssl3_get_cipher_by_id(uint32_t id)
4053 const SSL_CIPHER *cp;
4056 cp = OBJ_bsearch_ssl_cipher_id(&c, tls13_ciphers, TLS13_NUM_CIPHERS);
4059 cp = OBJ_bsearch_ssl_cipher_id(&c, ssl3_ciphers, SSL3_NUM_CIPHERS);
4062 return OBJ_bsearch_ssl_cipher_id(&c, ssl3_scsvs, SSL3_NUM_SCSVS);
4065 const SSL_CIPHER *ssl3_get_cipher_by_std_name(const char *stdname)
4068 SSL_CIPHER *alltabs[] = {tls13_ciphers, ssl3_ciphers, ssl3_scsvs};
4069 size_t i, j, tblsize[] = {TLS13_NUM_CIPHERS, SSL3_NUM_CIPHERS,
4072 /* this is not efficient, necessary to optimize this? */
4073 for (j = 0; j < OSSL_NELEM(alltabs); j++) {
4074 for (i = 0, tbl = alltabs[j]; i < tblsize[j]; i++, tbl++) {
4075 if (tbl->stdname == NULL)
4077 if (strcmp(stdname, tbl->stdname) == 0) {
4086 * This function needs to check if the ciphers required are actually
4089 const SSL_CIPHER *ssl3_get_cipher_by_char(const unsigned char *p)
4091 return ssl3_get_cipher_by_id(SSL3_CK_CIPHERSUITE_FLAG
4092 | ((uint32_t)p[0] << 8L)
4096 int ssl3_put_cipher_by_char(const SSL_CIPHER *c, WPACKET *pkt, size_t *len)
4098 if ((c->id & 0xff000000) != SSL3_CK_CIPHERSUITE_FLAG) {
4103 if (!WPACKET_put_bytes_u16(pkt, c->id & 0xffff))
4111 * ssl3_choose_cipher - choose a cipher from those offered by the client
4112 * @s: SSL connection
4113 * @clnt: ciphers offered by the client
4114 * @srvr: ciphers enabled on the server?
4116 * Returns the selected cipher or NULL when no common ciphers.
4118 const SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt,
4119 STACK_OF(SSL_CIPHER) *srvr)
4121 const SSL_CIPHER *c, *ret = NULL;
4122 STACK_OF(SSL_CIPHER) *prio, *allow;
4123 int i, ii, ok, prefer_sha256 = 0;
4124 unsigned long alg_k = 0, alg_a = 0, mask_k = 0, mask_a = 0;
4125 #ifndef OPENSSL_NO_CHACHA
4126 STACK_OF(SSL_CIPHER) *prio_chacha = NULL;
4129 /* Let's see which ciphers we can support */
4132 * Do not set the compare functions, because this may lead to a
4133 * reordering by "id". We want to keep the original ordering. We may pay
4134 * a price in performance during sk_SSL_CIPHER_find(), but would have to
4135 * pay with the price of sk_SSL_CIPHER_dup().
4138 OSSL_TRACE_BEGIN(TLS_CIPHER) {
4139 BIO_printf(trc_out, "Server has %d from %p:\n",
4140 sk_SSL_CIPHER_num(srvr), (void *)srvr);
4141 for (i = 0; i < sk_SSL_CIPHER_num(srvr); ++i) {
4142 c = sk_SSL_CIPHER_value(srvr, i);
4143 BIO_printf(trc_out, "%p:%s\n", (void *)c, c->name);
4145 BIO_printf(trc_out, "Client sent %d from %p:\n",
4146 sk_SSL_CIPHER_num(clnt), (void *)clnt);
4147 for (i = 0; i < sk_SSL_CIPHER_num(clnt); ++i) {
4148 c = sk_SSL_CIPHER_value(clnt, i);
4149 BIO_printf(trc_out, "%p:%s\n", (void *)c, c->name);
4151 } OSSL_TRACE_END(TLS_CIPHER);
4153 /* SUITE-B takes precedence over server preference and ChaCha priortiy */
4154 if (tls1_suiteb(s)) {
4157 } else if (s->options & SSL_OP_CIPHER_SERVER_PREFERENCE) {
4160 #ifndef OPENSSL_NO_CHACHA
4161 /* If ChaCha20 is at the top of the client preference list,
4162 and there are ChaCha20 ciphers in the server list, then
4163 temporarily prioritize all ChaCha20 ciphers in the servers list. */
4164 if (s->options & SSL_OP_PRIORITIZE_CHACHA && sk_SSL_CIPHER_num(clnt) > 0) {
4165 c = sk_SSL_CIPHER_value(clnt, 0);
4166 if (c->algorithm_enc == SSL_CHACHA20POLY1305) {
4167 /* ChaCha20 is client preferred, check server... */
4168 int num = sk_SSL_CIPHER_num(srvr);
4170 for (i = 0; i < num; i++) {
4171 c = sk_SSL_CIPHER_value(srvr, i);
4172 if (c->algorithm_enc == SSL_CHACHA20POLY1305) {
4178 prio_chacha = sk_SSL_CIPHER_new_reserve(NULL, num);
4179 /* if reserve fails, then there's likely a memory issue */
4180 if (prio_chacha != NULL) {
4181 /* Put all ChaCha20 at the top, starting with the one we just found */
4182 sk_SSL_CIPHER_push(prio_chacha, c);
4183 for (i++; i < num; i++) {
4184 c = sk_SSL_CIPHER_value(srvr, i);
4185 if (c->algorithm_enc == SSL_CHACHA20POLY1305)
4186 sk_SSL_CIPHER_push(prio_chacha, c);
4188 /* Pull in the rest */
4189 for (i = 0; i < num; i++) {
4190 c = sk_SSL_CIPHER_value(srvr, i);
4191 if (c->algorithm_enc != SSL_CHACHA20POLY1305)
4192 sk_SSL_CIPHER_push(prio_chacha, c);
4205 if (SSL_IS_TLS13(s)) {
4206 #ifndef OPENSSL_NO_PSK
4210 * If we allow "old" style PSK callbacks, and we have no certificate (so
4211 * we're not going to succeed without a PSK anyway), and we're in
4212 * TLSv1.3 then the default hash for a PSK is SHA-256 (as per the
4213 * TLSv1.3 spec). Therefore we should prioritise ciphersuites using
4216 if (s->psk_server_callback != NULL) {
4217 for (j = 0; j < SSL_PKEY_NUM && !ssl_has_cert(s, j); j++);
4218 if (j == SSL_PKEY_NUM) {
4219 /* There are no certificates */
4225 tls1_set_cert_validity(s);
4229 for (i = 0; i < sk_SSL_CIPHER_num(prio); i++) {
4230 c = sk_SSL_CIPHER_value(prio, i);
4232 /* Skip ciphers not supported by the protocol version */
4233 if (!SSL_IS_DTLS(s) &&
4234 ((s->version < c->min_tls) || (s->version > c->max_tls)))
4236 if (SSL_IS_DTLS(s) &&
4237 (DTLS_VERSION_LT(s->version, c->min_dtls) ||
4238 DTLS_VERSION_GT(s->version, c->max_dtls)))
4242 * Since TLS 1.3 ciphersuites can be used with any auth or
4243 * key exchange scheme skip tests.
4245 if (!SSL_IS_TLS13(s)) {
4246 mask_k = s->s3.tmp.mask_k;
4247 mask_a = s->s3.tmp.mask_a;
4248 #ifndef OPENSSL_NO_SRP
4249 if (s->srp_ctx.srp_Mask & SSL_kSRP) {
4255 alg_k = c->algorithm_mkey;
4256 alg_a = c->algorithm_auth;
4258 #ifndef OPENSSL_NO_PSK
4259 /* with PSK there must be server callback set */
4260 if ((alg_k & SSL_PSK) && s->psk_server_callback == NULL)
4262 #endif /* OPENSSL_NO_PSK */
4264 ok = (alg_k & mask_k) && (alg_a & mask_a);
4265 OSSL_TRACE7(TLS_CIPHER,
4266 "%d:[%08lX:%08lX:%08lX:%08lX]%p:%s\n",
4267 ok, alg_k, alg_a, mask_k, mask_a, (void *)c, c->name);
4269 #ifndef OPENSSL_NO_EC
4271 * if we are considering an ECC cipher suite that uses an ephemeral
4274 if (alg_k & SSL_kECDHE)
4275 ok = ok && tls1_check_ec_tmp_key(s, c->id);
4276 #endif /* OPENSSL_NO_EC */
4281 ii = sk_SSL_CIPHER_find(allow, c);
4283 /* Check security callback permits this cipher */
4284 if (!ssl_security(s, SSL_SECOP_CIPHER_SHARED,
4285 c->strength_bits, 0, (void *)c))
4287 #if !defined(OPENSSL_NO_EC)
4288 if ((alg_k & SSL_kECDHE) && (alg_a & SSL_aECDSA)
4289 && s->s3.is_probably_safari) {
4291 ret = sk_SSL_CIPHER_value(allow, ii);
4295 if (prefer_sha256) {
4296 const SSL_CIPHER *tmp = sk_SSL_CIPHER_value(allow, ii);
4299 * TODO: When there are no more legacy digests we can just use
4300 * OSSL_DIGEST_NAME_SHA2_256 instead of calling OBJ_nid2sn
4302 if (EVP_MD_is_a(ssl_md(s->ctx, tmp->algorithm2),
4303 OBJ_nid2sn(NID_sha256))) {
4311 ret = sk_SSL_CIPHER_value(allow, ii);
4315 #ifndef OPENSSL_NO_CHACHA
4316 sk_SSL_CIPHER_free(prio_chacha);
4321 int ssl3_get_req_cert_type(SSL *s, WPACKET *pkt)
4323 uint32_t alg_k, alg_a = 0;
4325 /* If we have custom certificate types set, use them */
4327 return WPACKET_memcpy(pkt, s->cert->ctype, s->cert->ctype_len);
4328 /* Get mask of algorithms disabled by signature list */
4329 ssl_set_sig_mask(&alg_a, s, SSL_SECOP_SIGALG_MASK);
4331 alg_k = s->s3.tmp.new_cipher->algorithm_mkey;
4333 #ifndef OPENSSL_NO_GOST
4334 if (s->version >= TLS1_VERSION && (alg_k & SSL_kGOST))
4335 if (!WPACKET_put_bytes_u8(pkt, TLS_CT_GOST01_SIGN)
4336 || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_IANA_SIGN)
4337 || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_IANA_512_SIGN)
4338 || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_LEGACY_SIGN)
4339 || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_LEGACY_512_SIGN))
4342 if (s->version >= TLS1_2_VERSION && (alg_k & SSL_kGOST18))
4343 if (!WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_IANA_SIGN)
4344 || !WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_IANA_512_SIGN))
4348 if ((s->version == SSL3_VERSION) && (alg_k & SSL_kDHE)) {
4349 if (!WPACKET_put_bytes_u8(pkt, SSL3_CT_RSA_EPHEMERAL_DH))
4351 if (!(alg_a & SSL_aDSS)
4352 && !WPACKET_put_bytes_u8(pkt, SSL3_CT_DSS_EPHEMERAL_DH))
4355 if (!(alg_a & SSL_aRSA) && !WPACKET_put_bytes_u8(pkt, SSL3_CT_RSA_SIGN))
4357 if (!(alg_a & SSL_aDSS) && !WPACKET_put_bytes_u8(pkt, SSL3_CT_DSS_SIGN))
4361 * ECDSA certs can be used with RSA cipher suites too so we don't
4362 * need to check for SSL_kECDH or SSL_kECDHE
4364 if (s->version >= TLS1_VERSION
4365 && !(alg_a & SSL_aECDSA)
4366 && !WPACKET_put_bytes_u8(pkt, TLS_CT_ECDSA_SIGN))
4372 static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len)
4374 OPENSSL_free(c->ctype);
4377 if (p == NULL || len == 0)
4381 c->ctype = OPENSSL_memdup(p, len);
4382 if (c->ctype == NULL)
4388 int ssl3_shutdown(SSL *s)
4393 * Don't do anything much if we have not done the handshake or we don't
4394 * want to send messages :-)
4396 if (s->quiet_shutdown || SSL_in_before(s)) {
4397 s->shutdown = (SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN);
4401 if (!(s->shutdown & SSL_SENT_SHUTDOWN)) {
4402 s->shutdown |= SSL_SENT_SHUTDOWN;
4403 ssl3_send_alert(s, SSL3_AL_WARNING, SSL_AD_CLOSE_NOTIFY);
4405 * our shutdown alert has been sent now, and if it still needs to be
4406 * written, s->s3.alert_dispatch will be true
4408 if (s->s3.alert_dispatch)
4409 return -1; /* return WANT_WRITE */
4410 } else if (s->s3.alert_dispatch) {
4411 /* resend it if not sent */
4412 ret = s->method->ssl_dispatch_alert(s);
4415 * we only get to return -1 here the 2nd/Nth invocation, we must
4416 * have already signalled return 0 upon a previous invocation,
4421 } else if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN)) {
4424 * If we are waiting for a close from our peer, we are closed
4426 s->method->ssl_read_bytes(s, 0, NULL, NULL, 0, 0, &readbytes);
4427 if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN)) {
4428 return -1; /* return WANT_READ */
4432 if ((s->shutdown == (SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN)) &&
4433 !s->s3.alert_dispatch)
4439 int ssl3_write(SSL *s, const void *buf, size_t len, size_t *written)
4442 if (s->s3.renegotiate)
4443 ssl3_renegotiate_check(s, 0);
4445 return s->method->ssl_write_bytes(s, SSL3_RT_APPLICATION_DATA, buf, len,
4449 static int ssl3_read_internal(SSL *s, void *buf, size_t len, int peek,
4455 if (s->s3.renegotiate)
4456 ssl3_renegotiate_check(s, 0);
4457 s->s3.in_read_app_data = 1;
4459 s->method->ssl_read_bytes(s, SSL3_RT_APPLICATION_DATA, NULL, buf, len,
4461 if ((ret == -1) && (s->s3.in_read_app_data == 2)) {
4463 * ssl3_read_bytes decided to call s->handshake_func, which called
4464 * ssl3_read_bytes to read handshake data. However, ssl3_read_bytes
4465 * actually found application data and thinks that application data
4466 * makes sense here; so disable handshake processing and try to read
4467 * application data again.
4469 ossl_statem_set_in_handshake(s, 1);
4471 s->method->ssl_read_bytes(s, SSL3_RT_APPLICATION_DATA, NULL, buf,
4472 len, peek, readbytes);
4473 ossl_statem_set_in_handshake(s, 0);
4475 s->s3.in_read_app_data = 0;
4480 int ssl3_read(SSL *s, void *buf, size_t len, size_t *readbytes)
4482 return ssl3_read_internal(s, buf, len, 0, readbytes);
4485 int ssl3_peek(SSL *s, void *buf, size_t len, size_t *readbytes)
4487 return ssl3_read_internal(s, buf, len, 1, readbytes);
4490 int ssl3_renegotiate(SSL *s)
4492 if (s->handshake_func == NULL)
4495 s->s3.renegotiate = 1;
4500 * Check if we are waiting to do a renegotiation and if so whether now is a
4501 * good time to do it. If |initok| is true then we are being called from inside
4502 * the state machine so ignore the result of SSL_in_init(s). Otherwise we
4503 * should not do a renegotiation if SSL_in_init(s) is true. Returns 1 if we
4504 * should do a renegotiation now and sets up the state machine for it. Otherwise
4507 int ssl3_renegotiate_check(SSL *s, int initok)
4511 if (s->s3.renegotiate) {
4512 if (!RECORD_LAYER_read_pending(&s->rlayer)
4513 && !RECORD_LAYER_write_pending(&s->rlayer)
4514 && (initok || !SSL_in_init(s))) {
4516 * if we are the server, and we have sent a 'RENEGOTIATE'
4517 * message, we need to set the state machine into the renegotiate
4520 ossl_statem_set_renegotiate(s);
4521 s->s3.renegotiate = 0;
4522 s->s3.num_renegotiations++;
4523 s->s3.total_renegotiations++;
4531 * If we are using default SHA1+MD5 algorithms switch to new SHA256 PRF and
4532 * handshake macs if required.
4534 * If PSK and using SHA384 for TLS < 1.2 switch to default.
4536 long ssl_get_algorithm2(SSL *s)
4539 if (s->s3.tmp.new_cipher == NULL)
4541 alg2 = s->s3.tmp.new_cipher->algorithm2;
4542 if (s->method->ssl3_enc->enc_flags & SSL_ENC_FLAG_SHA256_PRF) {
4543 if (alg2 == (SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF))
4544 return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;
4545 } else if (s->s3.tmp.new_cipher->algorithm_mkey & SSL_PSK) {
4546 if (alg2 == (SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384))
4547 return SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF;
4553 * Fill a ClientRandom or ServerRandom field of length len. Returns <= 0 on
4554 * failure, 1 on success.
4556 int ssl_fill_hello_random(SSL *s, int server, unsigned char *result, size_t len,
4559 int send_time = 0, ret;
4564 send_time = (s->mode & SSL_MODE_SEND_SERVERHELLO_TIME) != 0;
4566 send_time = (s->mode & SSL_MODE_SEND_CLIENTHELLO_TIME) != 0;
4568 unsigned long Time = (unsigned long)time(NULL);
4569 unsigned char *p = result;
4572 ret = RAND_bytes_ex(s->ctx->libctx, p, len - 4);
4574 ret = RAND_bytes_ex(s->ctx->libctx, result, len);
4578 if (!ossl_assert(sizeof(tls11downgrade) < len)
4579 || !ossl_assert(sizeof(tls12downgrade) < len))
4581 if (dgrd == DOWNGRADE_TO_1_2)
4582 memcpy(result + len - sizeof(tls12downgrade), tls12downgrade,
4583 sizeof(tls12downgrade));
4584 else if (dgrd == DOWNGRADE_TO_1_1)
4585 memcpy(result + len - sizeof(tls11downgrade), tls11downgrade,
4586 sizeof(tls11downgrade));
4592 int ssl_generate_master_secret(SSL *s, unsigned char *pms, size_t pmslen,
4595 unsigned long alg_k = s->s3.tmp.new_cipher->algorithm_mkey;
4598 if (alg_k & SSL_PSK) {
4599 #ifndef OPENSSL_NO_PSK
4600 unsigned char *pskpms, *t;
4601 size_t psklen = s->s3.tmp.psklen;
4604 /* create PSK premaster_secret */
4606 /* For plain PSK "other_secret" is psklen zeroes */
4607 if (alg_k & SSL_kPSK)
4610 pskpmslen = 4 + pmslen + psklen;
4611 pskpms = OPENSSL_malloc(pskpmslen);
4616 if (alg_k & SSL_kPSK)
4617 memset(t, 0, pmslen);
4619 memcpy(t, pms, pmslen);
4622 memcpy(t, s->s3.tmp.psk, psklen);
4624 OPENSSL_clear_free(s->s3.tmp.psk, psklen);
4625 s->s3.tmp.psk = NULL;
4626 if (!s->method->ssl3_enc->generate_master_secret(s,
4627 s->session->master_key, pskpms, pskpmslen,
4628 &s->session->master_key_length)) {
4629 OPENSSL_clear_free(pskpms, pskpmslen);
4630 /* SSLfatal() already called */
4633 OPENSSL_clear_free(pskpms, pskpmslen);
4635 /* Should never happen */
4639 if (!s->method->ssl3_enc->generate_master_secret(s,
4640 s->session->master_key, pms, pmslen,
4641 &s->session->master_key_length)) {
4642 /* SSLfatal() already called */
4651 OPENSSL_clear_free(pms, pmslen);
4653 OPENSSL_cleanse(pms, pmslen);
4656 s->s3.tmp.pms = NULL;
4660 /* Generate a private key from parameters */
4661 EVP_PKEY *ssl_generate_pkey(SSL *s, EVP_PKEY *pm)
4663 EVP_PKEY_CTX *pctx = NULL;
4664 EVP_PKEY *pkey = NULL;
4668 pctx = EVP_PKEY_CTX_new_from_pkey(s->ctx->libctx, pm, s->ctx->propq);
4671 if (EVP_PKEY_keygen_init(pctx) <= 0)
4673 if (EVP_PKEY_keygen(pctx, &pkey) <= 0) {
4674 EVP_PKEY_free(pkey);
4679 EVP_PKEY_CTX_free(pctx);
4683 /* Generate a private key from a group ID */
4684 EVP_PKEY *ssl_generate_pkey_group(SSL *s, uint16_t id)
4686 const TLS_GROUP_INFO *ginf = tls1_group_id_lookup(s->ctx, id);
4687 EVP_PKEY_CTX *pctx = NULL;
4688 EVP_PKEY *pkey = NULL;
4691 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4695 pctx = EVP_PKEY_CTX_new_from_name(s->ctx->libctx, ginf->algorithm,
4699 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_MALLOC_FAILURE);
4702 if (EVP_PKEY_keygen_init(pctx) <= 0) {
4703 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);
4706 if (!EVP_PKEY_CTX_set_group_name(pctx, ginf->realname)) {
4707 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);
4710 if (EVP_PKEY_keygen(pctx, &pkey) <= 0) {
4711 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);
4712 EVP_PKEY_free(pkey);
4717 EVP_PKEY_CTX_free(pctx);
4722 * Generate parameters from a group ID
4724 EVP_PKEY *ssl_generate_param_group(SSL *s, uint16_t id)
4726 EVP_PKEY_CTX *pctx = NULL;
4727 EVP_PKEY *pkey = NULL;
4728 const TLS_GROUP_INFO *ginf = tls1_group_id_lookup(s->ctx, id);
4733 pctx = EVP_PKEY_CTX_new_from_name(s->ctx->libctx, ginf->algorithm,
4738 if (EVP_PKEY_paramgen_init(pctx) <= 0)
4740 if (!EVP_PKEY_CTX_set_group_name(pctx, ginf->realname)) {
4741 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_EVP_LIB);
4744 if (EVP_PKEY_paramgen(pctx, &pkey) <= 0) {
4745 EVP_PKEY_free(pkey);
4750 EVP_PKEY_CTX_free(pctx);
4754 /* Generate secrets from pms */
4755 int ssl_gensecret(SSL *s, unsigned char *pms, size_t pmslen)
4759 /* SSLfatal() called as appropriate in the below functions */
4760 if (SSL_IS_TLS13(s)) {
4762 * If we are resuming then we already generated the early secret
4763 * when we created the ClientHello, so don't recreate it.
4766 rv = tls13_generate_secret(s, ssl_handshake_md(s), NULL, NULL,
4768 (unsigned char *)&s->early_secret);
4772 rv = rv && tls13_generate_handshake_secret(s, pms, pmslen);
4774 rv = ssl_generate_master_secret(s, pms, pmslen, 0);
4780 /* Derive secrets for ECDH/DH */
4781 int ssl_derive(SSL *s, EVP_PKEY *privkey, EVP_PKEY *pubkey, int gensecret)
4784 unsigned char *pms = NULL;
4788 if (privkey == NULL || pubkey == NULL) {
4789 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4793 pctx = EVP_PKEY_CTX_new_from_pkey(s->ctx->libctx, privkey, s->ctx->propq);
4795 if (EVP_PKEY_derive_init(pctx) <= 0
4796 || EVP_PKEY_derive_set_peer(pctx, pubkey) <= 0
4797 || EVP_PKEY_derive(pctx, NULL, &pmslen) <= 0) {
4798 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4802 if (SSL_IS_TLS13(s) && EVP_PKEY_is_a(privkey, "DH"))
4803 EVP_PKEY_CTX_set_dh_pad(pctx, 1);
4805 pms = OPENSSL_malloc(pmslen);
4807 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_MALLOC_FAILURE);
4811 if (EVP_PKEY_derive(pctx, pms, &pmslen) <= 0) {
4812 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4817 /* SSLfatal() called as appropriate in the below functions */
4818 rv = ssl_gensecret(s, pms, pmslen);
4820 /* Save premaster secret */
4821 s->s3.tmp.pms = pms;
4822 s->s3.tmp.pmslen = pmslen;
4828 OPENSSL_clear_free(pms, pmslen);
4829 EVP_PKEY_CTX_free(pctx);
4833 /* Decapsulate secrets for KEM */
4834 int ssl_decapsulate(SSL *s, EVP_PKEY *privkey,
4835 const unsigned char *ct, size_t ctlen,
4839 unsigned char *pms = NULL;
4843 if (privkey == NULL) {
4844 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4848 pctx = EVP_PKEY_CTX_new_from_pkey(s->ctx->libctx, privkey, s->ctx->propq);
4850 if (EVP_PKEY_decapsulate_init(pctx) <= 0
4851 || EVP_PKEY_decapsulate(pctx, NULL, &pmslen, ct, ctlen) <= 0) {
4852 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4856 pms = OPENSSL_malloc(pmslen);
4858 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_MALLOC_FAILURE);
4862 if (EVP_PKEY_decapsulate(pctx, pms, &pmslen, ct, ctlen) <= 0) {
4863 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4868 /* SSLfatal() called as appropriate in the below functions */
4869 rv = ssl_gensecret(s, pms, pmslen);
4871 /* Save premaster secret */
4872 s->s3.tmp.pms = pms;
4873 s->s3.tmp.pmslen = pmslen;
4879 OPENSSL_clear_free(pms, pmslen);
4880 EVP_PKEY_CTX_free(pctx);
4884 int ssl_encapsulate(SSL *s, EVP_PKEY *pubkey,
4885 unsigned char **ctp, size_t *ctlenp,
4889 unsigned char *pms = NULL, *ct = NULL;
4890 size_t pmslen = 0, ctlen = 0;
4893 if (pubkey == NULL) {
4894 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4898 pctx = EVP_PKEY_CTX_new_from_pkey(s->ctx->libctx, pubkey, s->ctx->propq);
4900 if (EVP_PKEY_encapsulate_init(pctx) <= 0
4901 || EVP_PKEY_encapsulate(pctx, NULL, &ctlen, NULL, &pmslen) <= 0
4902 || pmslen == 0 || ctlen == 0) {
4903 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4907 pms = OPENSSL_malloc(pmslen);
4908 ct = OPENSSL_malloc(ctlen);
4909 if (pms == NULL || ct == NULL) {
4910 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_MALLOC_FAILURE);
4914 if (EVP_PKEY_encapsulate(pctx, ct, &ctlen, pms, &pmslen) <= 0) {
4915 SSLfatal(s, SSL_AD_INTERNAL_ERROR, ERR_R_INTERNAL_ERROR);
4920 /* SSLfatal() called as appropriate in the below functions */
4921 rv = ssl_gensecret(s, pms, pmslen);
4923 /* Save premaster secret */
4924 s->s3.tmp.pms = pms;
4925 s->s3.tmp.pmslen = pmslen;
4931 /* Pass ownership of ct to caller */
4938 OPENSSL_clear_free(pms, pmslen);
4940 EVP_PKEY_CTX_free(pctx);
4944 const char *SSL_group_to_name(SSL *s, int nid) {
4946 const TLS_GROUP_INFO *cinf = NULL;
4948 /* first convert to real group id for internal and external IDs */
4949 if (nid & TLSEXT_nid_unknown)
4950 group_id = nid & 0xFFFF;
4952 group_id = tls1_nid2group_id(nid);
4955 cinf = tls1_group_id_lookup(s->ctx, group_id);
4958 return cinf->tlsname;