update TLS-ECC code
[oweals/openssl.git] / ssl / s3_lib.c
1 /* ssl/s3_lib.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  * 
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  * 
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  * 
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from 
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  * 
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  * 
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 /* ====================================================================
59  * Copyright (c) 1998-2002 The OpenSSL Project.  All rights reserved.
60  *
61  * Redistribution and use in source and binary forms, with or without
62  * modification, are permitted provided that the following conditions
63  * are met:
64  *
65  * 1. Redistributions of source code must retain the above copyright
66  *    notice, this list of conditions and the following disclaimer. 
67  *
68  * 2. Redistributions in binary form must reproduce the above copyright
69  *    notice, this list of conditions and the following disclaimer in
70  *    the documentation and/or other materials provided with the
71  *    distribution.
72  *
73  * 3. All advertising materials mentioning features or use of this
74  *    software must display the following acknowledgment:
75  *    "This product includes software developed by the OpenSSL Project
76  *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
77  *
78  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
79  *    endorse or promote products derived from this software without
80  *    prior written permission. For written permission, please contact
81  *    openssl-core@openssl.org.
82  *
83  * 5. Products derived from this software may not be called "OpenSSL"
84  *    nor may "OpenSSL" appear in their names without prior written
85  *    permission of the OpenSSL Project.
86  *
87  * 6. Redistributions of any form whatsoever must retain the following
88  *    acknowledgment:
89  *    "This product includes software developed by the OpenSSL Project
90  *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
91  *
92  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
93  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
94  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
95  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
96  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
97  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
98  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
99  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
100  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
101  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
102  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
103  * OF THE POSSIBILITY OF SUCH DAMAGE.
104  * ====================================================================
105  *
106  * This product includes cryptographic software written by Eric Young
107  * (eay@cryptsoft.com).  This product includes software written by Tim
108  * Hudson (tjh@cryptsoft.com).
109  *
110  */
111 /* ====================================================================
112  * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
113  *
114  * Portions of the attached software ("Contribution") are developed by 
115  * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
116  *
117  * The Contribution is licensed pursuant to the OpenSSL open source
118  * license provided above.
119  *
120  * ECC cipher suite support in OpenSSL originally written by
121  * Vipul Gupta and Sumit Gupta of Sun Microsystems Laboratories.
122  *
123  */
124
125 #include <stdio.h>
126 #include <openssl/objects.h>
127 #include "ssl_locl.h"
128 #include "kssl_lcl.h"
129 #include <openssl/md5.h>
130 #ifndef OPENSSL_NO_DH
131 #include <openssl/dh.h>
132 #endif
133 #include <openssl/pq_compat.h>
134
135 const char *ssl3_version_str="SSLv3" OPENSSL_VERSION_PTEXT;
136
137 #define SSL3_NUM_CIPHERS        (sizeof(ssl3_ciphers)/sizeof(SSL_CIPHER))
138
139 /* list of available SSLv3 ciphers (sorted by id) */
140 OPENSSL_GLOBAL SSL_CIPHER ssl3_ciphers[]={
141 /* The RSA ciphers */
142 /* Cipher 01 */
143         {
144         1,
145         SSL3_TXT_RSA_NULL_MD5,
146         SSL3_CK_RSA_NULL_MD5,
147         SSL_kRSA|SSL_aRSA|SSL_eNULL |SSL_MD5|SSL_SSLV3,
148         SSL_NOT_EXP|SSL_STRONG_NONE,
149         0,
150         0,
151         0,
152         SSL_ALL_CIPHERS,
153         SSL_ALL_STRENGTHS,
154         },
155 /* Cipher 02 */
156         {
157         1,
158         SSL3_TXT_RSA_NULL_SHA,
159         SSL3_CK_RSA_NULL_SHA,
160         SSL_kRSA|SSL_aRSA|SSL_eNULL |SSL_SHA1|SSL_SSLV3,
161         SSL_NOT_EXP|SSL_STRONG_NONE,
162         0,
163         0,
164         0,
165         SSL_ALL_CIPHERS,
166         SSL_ALL_STRENGTHS,
167         },
168 /* Cipher 03 */
169         {
170         1,
171         SSL3_TXT_RSA_RC4_40_MD5,
172         SSL3_CK_RSA_RC4_40_MD5,
173         SSL_kRSA|SSL_aRSA|SSL_RC4  |SSL_MD5 |SSL_SSLV3,
174         SSL_EXPORT|SSL_EXP40,
175         0,
176         40,
177         128,
178         SSL_ALL_CIPHERS,
179         SSL_ALL_STRENGTHS,
180         },
181 /* Cipher 04 */
182         {
183         1,
184         SSL3_TXT_RSA_RC4_128_MD5,
185         SSL3_CK_RSA_RC4_128_MD5,
186         SSL_kRSA|SSL_aRSA|SSL_RC4  |SSL_MD5|SSL_SSLV3,
187         SSL_NOT_EXP|SSL_MEDIUM,
188         0,
189         128,
190         128,
191         SSL_ALL_CIPHERS,
192         SSL_ALL_STRENGTHS,
193         },
194 /* Cipher 05 */
195         {
196         1,
197         SSL3_TXT_RSA_RC4_128_SHA,
198         SSL3_CK_RSA_RC4_128_SHA,
199         SSL_kRSA|SSL_aRSA|SSL_RC4  |SSL_SHA1|SSL_SSLV3,
200         SSL_NOT_EXP|SSL_MEDIUM,
201         0,
202         128,
203         128,
204         SSL_ALL_CIPHERS,
205         SSL_ALL_STRENGTHS,
206         },
207 /* Cipher 06 */
208         {
209         1,
210         SSL3_TXT_RSA_RC2_40_MD5,
211         SSL3_CK_RSA_RC2_40_MD5,
212         SSL_kRSA|SSL_aRSA|SSL_RC2  |SSL_MD5 |SSL_SSLV3,
213         SSL_EXPORT|SSL_EXP40,
214         0,
215         40,
216         128,
217         SSL_ALL_CIPHERS,
218         SSL_ALL_STRENGTHS,
219         },
220 /* Cipher 07 */
221 #ifndef OPENSSL_NO_IDEA
222         {
223         1,
224         SSL3_TXT_RSA_IDEA_128_SHA,
225         SSL3_CK_RSA_IDEA_128_SHA,
226         SSL_kRSA|SSL_aRSA|SSL_IDEA |SSL_SHA1|SSL_SSLV3,
227         SSL_NOT_EXP|SSL_MEDIUM,
228         0,
229         128,
230         128,
231         SSL_ALL_CIPHERS,
232         SSL_ALL_STRENGTHS,
233         },
234 #endif
235 /* Cipher 08 */
236         {
237         1,
238         SSL3_TXT_RSA_DES_40_CBC_SHA,
239         SSL3_CK_RSA_DES_40_CBC_SHA,
240         SSL_kRSA|SSL_aRSA|SSL_DES|SSL_SHA1|SSL_SSLV3,
241         SSL_EXPORT|SSL_EXP40,
242         0,
243         40,
244         56,
245         SSL_ALL_CIPHERS,
246         SSL_ALL_STRENGTHS,
247         },
248 /* Cipher 09 */
249         {
250         1,
251         SSL3_TXT_RSA_DES_64_CBC_SHA,
252         SSL3_CK_RSA_DES_64_CBC_SHA,
253         SSL_kRSA|SSL_aRSA|SSL_DES  |SSL_SHA1|SSL_SSLV3,
254         SSL_NOT_EXP|SSL_LOW,
255         0,
256         56,
257         56,
258         SSL_ALL_CIPHERS,
259         SSL_ALL_STRENGTHS,
260         },
261 /* Cipher 0A */
262         {
263         1,
264         SSL3_TXT_RSA_DES_192_CBC3_SHA,
265         SSL3_CK_RSA_DES_192_CBC3_SHA,
266         SSL_kRSA|SSL_aRSA|SSL_3DES |SSL_SHA1|SSL_SSLV3,
267         SSL_NOT_EXP|SSL_HIGH,
268         0,
269         168,
270         168,
271         SSL_ALL_CIPHERS,
272         SSL_ALL_STRENGTHS,
273         },
274 /* The DH ciphers */
275 /* Cipher 0B */
276         {
277         0,
278         SSL3_TXT_DH_DSS_DES_40_CBC_SHA,
279         SSL3_CK_DH_DSS_DES_40_CBC_SHA,
280         SSL_kDHd |SSL_aDH|SSL_DES|SSL_SHA1|SSL_SSLV3,
281         SSL_EXPORT|SSL_EXP40,
282         0,
283         40,
284         56,
285         SSL_ALL_CIPHERS,
286         SSL_ALL_STRENGTHS,
287         },
288 /* Cipher 0C */
289         {
290         0,
291         SSL3_TXT_DH_DSS_DES_64_CBC_SHA,
292         SSL3_CK_DH_DSS_DES_64_CBC_SHA,
293         SSL_kDHd |SSL_aDH|SSL_DES  |SSL_SHA1|SSL_SSLV3,
294         SSL_NOT_EXP|SSL_LOW,
295         0,
296         56,
297         56,
298         SSL_ALL_CIPHERS,
299         SSL_ALL_STRENGTHS,
300         },
301 /* Cipher 0D */
302         {
303         0,
304         SSL3_TXT_DH_DSS_DES_192_CBC3_SHA,
305         SSL3_CK_DH_DSS_DES_192_CBC3_SHA,
306         SSL_kDHd |SSL_aDH|SSL_3DES |SSL_SHA1|SSL_SSLV3,
307         SSL_NOT_EXP|SSL_HIGH,
308         0,
309         168,
310         168,
311         SSL_ALL_CIPHERS,
312         SSL_ALL_STRENGTHS,
313         },
314 /* Cipher 0E */
315         {
316         0,
317         SSL3_TXT_DH_RSA_DES_40_CBC_SHA,
318         SSL3_CK_DH_RSA_DES_40_CBC_SHA,
319         SSL_kDHr |SSL_aDH|SSL_DES|SSL_SHA1|SSL_SSLV3,
320         SSL_EXPORT|SSL_EXP40,
321         0,
322         40,
323         56,
324         SSL_ALL_CIPHERS,
325         SSL_ALL_STRENGTHS,
326         },
327 /* Cipher 0F */
328         {
329         0,
330         SSL3_TXT_DH_RSA_DES_64_CBC_SHA,
331         SSL3_CK_DH_RSA_DES_64_CBC_SHA,
332         SSL_kDHr |SSL_aDH|SSL_DES  |SSL_SHA1|SSL_SSLV3,
333         SSL_NOT_EXP|SSL_LOW,
334         0,
335         56,
336         56,
337         SSL_ALL_CIPHERS,
338         SSL_ALL_STRENGTHS,
339         },
340 /* Cipher 10 */
341         {
342         0,
343         SSL3_TXT_DH_RSA_DES_192_CBC3_SHA,
344         SSL3_CK_DH_RSA_DES_192_CBC3_SHA,
345         SSL_kDHr |SSL_aDH|SSL_3DES |SSL_SHA1|SSL_SSLV3,
346         SSL_NOT_EXP|SSL_HIGH,
347         0,
348         168,
349         168,
350         SSL_ALL_CIPHERS,
351         SSL_ALL_STRENGTHS,
352         },
353
354 /* The Ephemeral DH ciphers */
355 /* Cipher 11 */
356         {
357         1,
358         SSL3_TXT_EDH_DSS_DES_40_CBC_SHA,
359         SSL3_CK_EDH_DSS_DES_40_CBC_SHA,
360         SSL_kEDH|SSL_aDSS|SSL_DES|SSL_SHA1|SSL_SSLV3,
361         SSL_EXPORT|SSL_EXP40,
362         0,
363         40,
364         56,
365         SSL_ALL_CIPHERS,
366         SSL_ALL_STRENGTHS,
367         },
368 /* Cipher 12 */
369         {
370         1,
371         SSL3_TXT_EDH_DSS_DES_64_CBC_SHA,
372         SSL3_CK_EDH_DSS_DES_64_CBC_SHA,
373         SSL_kEDH|SSL_aDSS|SSL_DES  |SSL_SHA1|SSL_SSLV3,
374         SSL_NOT_EXP|SSL_LOW,
375         0,
376         56,
377         56,
378         SSL_ALL_CIPHERS,
379         SSL_ALL_STRENGTHS,
380         },
381 /* Cipher 13 */
382         {
383         1,
384         SSL3_TXT_EDH_DSS_DES_192_CBC3_SHA,
385         SSL3_CK_EDH_DSS_DES_192_CBC3_SHA,
386         SSL_kEDH|SSL_aDSS|SSL_3DES |SSL_SHA1|SSL_SSLV3,
387         SSL_NOT_EXP|SSL_HIGH,
388         0,
389         168,
390         168,
391         SSL_ALL_CIPHERS,
392         SSL_ALL_STRENGTHS,
393         },
394 /* Cipher 14 */
395         {
396         1,
397         SSL3_TXT_EDH_RSA_DES_40_CBC_SHA,
398         SSL3_CK_EDH_RSA_DES_40_CBC_SHA,
399         SSL_kEDH|SSL_aRSA|SSL_DES|SSL_SHA1|SSL_SSLV3,
400         SSL_EXPORT|SSL_EXP40,
401         0,
402         40,
403         56,
404         SSL_ALL_CIPHERS,
405         SSL_ALL_STRENGTHS,
406         },
407 /* Cipher 15 */
408         {
409         1,
410         SSL3_TXT_EDH_RSA_DES_64_CBC_SHA,
411         SSL3_CK_EDH_RSA_DES_64_CBC_SHA,
412         SSL_kEDH|SSL_aRSA|SSL_DES  |SSL_SHA1|SSL_SSLV3,
413         SSL_NOT_EXP|SSL_LOW,
414         0,
415         56,
416         56,
417         SSL_ALL_CIPHERS,
418         SSL_ALL_STRENGTHS,
419         },
420 /* Cipher 16 */
421         {
422         1,
423         SSL3_TXT_EDH_RSA_DES_192_CBC3_SHA,
424         SSL3_CK_EDH_RSA_DES_192_CBC3_SHA,
425         SSL_kEDH|SSL_aRSA|SSL_3DES |SSL_SHA1|SSL_SSLV3,
426         SSL_NOT_EXP|SSL_HIGH,
427         0,
428         168,
429         168,
430         SSL_ALL_CIPHERS,
431         SSL_ALL_STRENGTHS,
432         },
433 /* Cipher 17 */
434         {
435         1,
436         SSL3_TXT_ADH_RC4_40_MD5,
437         SSL3_CK_ADH_RC4_40_MD5,
438         SSL_kEDH |SSL_aNULL|SSL_RC4  |SSL_MD5 |SSL_SSLV3,
439         SSL_EXPORT|SSL_EXP40,
440         0,
441         40,
442         128,
443         SSL_ALL_CIPHERS,
444         SSL_ALL_STRENGTHS,
445         },
446 /* Cipher 18 */
447         {
448         1,
449         SSL3_TXT_ADH_RC4_128_MD5,
450         SSL3_CK_ADH_RC4_128_MD5,
451         SSL_kEDH |SSL_aNULL|SSL_RC4  |SSL_MD5 |SSL_SSLV3,
452         SSL_NOT_EXP|SSL_MEDIUM,
453         0,
454         128,
455         128,
456         SSL_ALL_CIPHERS,
457         SSL_ALL_STRENGTHS,
458         },
459 /* Cipher 19 */
460         {
461         1,
462         SSL3_TXT_ADH_DES_40_CBC_SHA,
463         SSL3_CK_ADH_DES_40_CBC_SHA,
464         SSL_kEDH |SSL_aNULL|SSL_DES|SSL_SHA1|SSL_SSLV3,
465         SSL_EXPORT|SSL_EXP40,
466         0,
467         40,
468         128,
469         SSL_ALL_CIPHERS,
470         SSL_ALL_STRENGTHS,
471         },
472 /* Cipher 1A */
473         {
474         1,
475         SSL3_TXT_ADH_DES_64_CBC_SHA,
476         SSL3_CK_ADH_DES_64_CBC_SHA,
477         SSL_kEDH |SSL_aNULL|SSL_DES  |SSL_SHA1|SSL_SSLV3,
478         SSL_NOT_EXP|SSL_LOW,
479         0,
480         56,
481         56,
482         SSL_ALL_CIPHERS,
483         SSL_ALL_STRENGTHS,
484         },
485 /* Cipher 1B */
486         {
487         1,
488         SSL3_TXT_ADH_DES_192_CBC_SHA,
489         SSL3_CK_ADH_DES_192_CBC_SHA,
490         SSL_kEDH |SSL_aNULL|SSL_3DES |SSL_SHA1|SSL_SSLV3,
491         SSL_NOT_EXP|SSL_HIGH,
492         0,
493         168,
494         168,
495         SSL_ALL_CIPHERS,
496         SSL_ALL_STRENGTHS,
497         },
498
499 /* Fortezza */
500 /* Cipher 1C */
501         {
502         0,
503         SSL3_TXT_FZA_DMS_NULL_SHA,
504         SSL3_CK_FZA_DMS_NULL_SHA,
505         SSL_kFZA|SSL_aFZA |SSL_eNULL |SSL_SHA1|SSL_SSLV3,
506         SSL_NOT_EXP|SSL_STRONG_NONE,
507         0,
508         0,
509         0,
510         SSL_ALL_CIPHERS,
511         SSL_ALL_STRENGTHS,
512         },
513
514 /* Cipher 1D */
515         {
516         0,
517         SSL3_TXT_FZA_DMS_FZA_SHA,
518         SSL3_CK_FZA_DMS_FZA_SHA,
519         SSL_kFZA|SSL_aFZA |SSL_eFZA |SSL_SHA1|SSL_SSLV3,
520         SSL_NOT_EXP|SSL_STRONG_NONE,
521         0,
522         0,
523         0,
524         SSL_ALL_CIPHERS,
525         SSL_ALL_STRENGTHS,
526         },
527
528 #if 0
529 /* Cipher 1E */
530         {
531         0,
532         SSL3_TXT_FZA_DMS_RC4_SHA,
533         SSL3_CK_FZA_DMS_RC4_SHA,
534         SSL_kFZA|SSL_aFZA |SSL_RC4  |SSL_SHA1|SSL_SSLV3,
535         SSL_NOT_EXP|SSL_MEDIUM,
536         0,
537         128,
538         128,
539         SSL_ALL_CIPHERS,
540         SSL_ALL_STRENGTHS,
541         },
542 #endif
543
544 #ifndef OPENSSL_NO_KRB5
545 /* The Kerberos ciphers
546 ** 20000107 VRS: And the first shall be last,
547 ** in hopes of avoiding the lynx ssl renegotiation problem.
548 */
549 /* Cipher 1E VRS */
550         {
551         1,
552         SSL3_TXT_KRB5_DES_64_CBC_SHA,
553         SSL3_CK_KRB5_DES_64_CBC_SHA,
554         SSL_kKRB5|SSL_aKRB5|  SSL_DES|SSL_SHA1   |SSL_SSLV3,
555         SSL_NOT_EXP|SSL_LOW,
556         0,
557         56,
558         56,
559         SSL_ALL_CIPHERS,
560         SSL_ALL_STRENGTHS,
561         },
562
563 /* Cipher 1F VRS */
564         {
565         1,
566         SSL3_TXT_KRB5_DES_192_CBC3_SHA,
567         SSL3_CK_KRB5_DES_192_CBC3_SHA,
568         SSL_kKRB5|SSL_aKRB5|  SSL_3DES|SSL_SHA1  |SSL_SSLV3,
569         SSL_NOT_EXP|SSL_HIGH,
570         0,
571         112,
572         168,
573         SSL_ALL_CIPHERS,
574         SSL_ALL_STRENGTHS,
575         },
576
577 /* Cipher 20 VRS */
578         {
579         1,
580         SSL3_TXT_KRB5_RC4_128_SHA,
581         SSL3_CK_KRB5_RC4_128_SHA,
582         SSL_kKRB5|SSL_aKRB5|  SSL_RC4|SSL_SHA1  |SSL_SSLV3,
583         SSL_NOT_EXP|SSL_MEDIUM,
584         0,
585         128,
586         128,
587         SSL_ALL_CIPHERS,
588         SSL_ALL_STRENGTHS,
589         },
590
591 /* Cipher 21 VRS */
592         {
593         1,
594         SSL3_TXT_KRB5_IDEA_128_CBC_SHA,
595         SSL3_CK_KRB5_IDEA_128_CBC_SHA,
596         SSL_kKRB5|SSL_aKRB5|  SSL_IDEA|SSL_SHA1  |SSL_SSLV3,
597         SSL_NOT_EXP|SSL_MEDIUM,
598         0,
599         128,
600         128,
601         SSL_ALL_CIPHERS,
602         SSL_ALL_STRENGTHS,
603         },
604
605 /* Cipher 22 VRS */
606         {
607         1,
608         SSL3_TXT_KRB5_DES_64_CBC_MD5,
609         SSL3_CK_KRB5_DES_64_CBC_MD5,
610         SSL_kKRB5|SSL_aKRB5|  SSL_DES|SSL_MD5    |SSL_SSLV3,
611         SSL_NOT_EXP|SSL_LOW,
612         0,
613         56,
614         56,
615         SSL_ALL_CIPHERS,
616         SSL_ALL_STRENGTHS,
617         },
618
619 /* Cipher 23 VRS */
620         {
621         1,
622         SSL3_TXT_KRB5_DES_192_CBC3_MD5,
623         SSL3_CK_KRB5_DES_192_CBC3_MD5,
624         SSL_kKRB5|SSL_aKRB5|  SSL_3DES|SSL_MD5   |SSL_SSLV3,
625         SSL_NOT_EXP|SSL_HIGH,
626         0,
627         112,
628         168,
629         SSL_ALL_CIPHERS,
630         SSL_ALL_STRENGTHS,
631         },
632
633 /* Cipher 24 VRS */
634         {
635         1,
636         SSL3_TXT_KRB5_RC4_128_MD5,
637         SSL3_CK_KRB5_RC4_128_MD5,
638         SSL_kKRB5|SSL_aKRB5|  SSL_RC4|SSL_MD5  |SSL_SSLV3,
639         SSL_NOT_EXP|SSL_MEDIUM,
640         0,
641         128,
642         128,
643         SSL_ALL_CIPHERS,
644         SSL_ALL_STRENGTHS,
645         },
646
647 /* Cipher 25 VRS */
648         {
649         1,
650         SSL3_TXT_KRB5_IDEA_128_CBC_MD5,
651         SSL3_CK_KRB5_IDEA_128_CBC_MD5,
652         SSL_kKRB5|SSL_aKRB5|  SSL_IDEA|SSL_MD5  |SSL_SSLV3,
653         SSL_NOT_EXP|SSL_MEDIUM,
654         0,
655         128,
656         128,
657         SSL_ALL_CIPHERS,
658         SSL_ALL_STRENGTHS,
659         },
660
661 /* Cipher 26 VRS */
662         {
663         1,
664         SSL3_TXT_KRB5_DES_40_CBC_SHA,
665         SSL3_CK_KRB5_DES_40_CBC_SHA,
666         SSL_kKRB5|SSL_aKRB5|  SSL_DES|SSL_SHA1   |SSL_SSLV3,
667         SSL_EXPORT|SSL_EXP40,
668         0,
669         40,
670         56,
671         SSL_ALL_CIPHERS,
672         SSL_ALL_STRENGTHS,
673         },
674
675 /* Cipher 27 VRS */
676         {
677         1,
678         SSL3_TXT_KRB5_RC2_40_CBC_SHA,
679         SSL3_CK_KRB5_RC2_40_CBC_SHA,
680         SSL_kKRB5|SSL_aKRB5|  SSL_RC2|SSL_SHA1   |SSL_SSLV3,
681         SSL_EXPORT|SSL_EXP40,
682         0,
683         40,
684         128,
685         SSL_ALL_CIPHERS,
686         SSL_ALL_STRENGTHS,
687         },
688
689 /* Cipher 28 VRS */
690         {
691         1,
692         SSL3_TXT_KRB5_RC4_40_SHA,
693         SSL3_CK_KRB5_RC4_40_SHA,
694         SSL_kKRB5|SSL_aKRB5|  SSL_RC4|SSL_SHA1   |SSL_SSLV3,
695         SSL_EXPORT|SSL_EXP40,
696         0,
697         128,
698         128,
699         SSL_ALL_CIPHERS,
700         SSL_ALL_STRENGTHS,
701         },
702
703 /* Cipher 29 VRS */
704         {
705         1,
706         SSL3_TXT_KRB5_DES_40_CBC_MD5,
707         SSL3_CK_KRB5_DES_40_CBC_MD5,
708         SSL_kKRB5|SSL_aKRB5|  SSL_DES|SSL_MD5    |SSL_SSLV3,
709         SSL_EXPORT|SSL_EXP40,
710         0,
711         40,
712         56,
713         SSL_ALL_CIPHERS,
714         SSL_ALL_STRENGTHS,
715         },
716
717 /* Cipher 2A VRS */
718         {
719         1,
720         SSL3_TXT_KRB5_RC2_40_CBC_MD5,
721         SSL3_CK_KRB5_RC2_40_CBC_MD5,
722         SSL_kKRB5|SSL_aKRB5|  SSL_RC2|SSL_MD5    |SSL_SSLV3,
723         SSL_EXPORT|SSL_EXP40,
724         0,
725         40,
726         128,
727         SSL_ALL_CIPHERS,
728         SSL_ALL_STRENGTHS,
729         },
730
731 /* Cipher 2B VRS */
732         {
733         1,
734         SSL3_TXT_KRB5_RC4_40_MD5,
735         SSL3_CK_KRB5_RC4_40_MD5,
736         SSL_kKRB5|SSL_aKRB5|  SSL_RC4|SSL_MD5    |SSL_SSLV3,
737         SSL_EXPORT|SSL_EXP40,
738         0,
739         128,
740         128,
741         SSL_ALL_CIPHERS,
742         SSL_ALL_STRENGTHS,
743         },
744 #endif  /* OPENSSL_NO_KRB5 */
745 /* New AES ciphersuites */
746
747 /* Cipher 2F */
748         {
749         1,
750         TLS1_TXT_RSA_WITH_AES_128_SHA,
751         TLS1_CK_RSA_WITH_AES_128_SHA,
752         SSL_kRSA|SSL_aRSA|SSL_AES|SSL_SHA |SSL_TLSV1,
753         SSL_NOT_EXP|SSL_HIGH,
754         0,
755         128,
756         128,
757         SSL_ALL_CIPHERS,
758         SSL_ALL_STRENGTHS,
759         },
760 /* Cipher 30 */
761         {
762         0,
763         TLS1_TXT_DH_DSS_WITH_AES_128_SHA,
764         TLS1_CK_DH_DSS_WITH_AES_128_SHA,
765         SSL_kDHd|SSL_aDH|SSL_AES|SSL_SHA|SSL_TLSV1,
766         SSL_NOT_EXP|SSL_HIGH,
767         0,
768         128,
769         128,
770         SSL_ALL_CIPHERS,
771         SSL_ALL_STRENGTHS,
772         },
773 /* Cipher 31 */
774         {
775         0,
776         TLS1_TXT_DH_RSA_WITH_AES_128_SHA,
777         TLS1_CK_DH_RSA_WITH_AES_128_SHA,
778         SSL_kDHr|SSL_aDH|SSL_AES|SSL_SHA|SSL_TLSV1,
779         SSL_NOT_EXP|SSL_HIGH,
780         0,
781         128,
782         128,
783         SSL_ALL_CIPHERS,
784         SSL_ALL_STRENGTHS,
785         },
786 /* Cipher 32 */
787         {
788         1,
789         TLS1_TXT_DHE_DSS_WITH_AES_128_SHA,
790         TLS1_CK_DHE_DSS_WITH_AES_128_SHA,
791         SSL_kEDH|SSL_aDSS|SSL_AES|SSL_SHA|SSL_TLSV1,
792         SSL_NOT_EXP|SSL_HIGH,
793         0,
794         128,
795         128,
796         SSL_ALL_CIPHERS,
797         SSL_ALL_STRENGTHS,
798         },
799 /* Cipher 33 */
800         {
801         1,
802         TLS1_TXT_DHE_RSA_WITH_AES_128_SHA,
803         TLS1_CK_DHE_RSA_WITH_AES_128_SHA,
804         SSL_kEDH|SSL_aRSA|SSL_AES|SSL_SHA|SSL_TLSV1,
805         SSL_NOT_EXP|SSL_HIGH,
806         0,
807         128,
808         128,
809         SSL_ALL_CIPHERS,
810         SSL_ALL_STRENGTHS,
811         },
812 /* Cipher 34 */
813         {
814         1,
815         TLS1_TXT_ADH_WITH_AES_128_SHA,
816         TLS1_CK_ADH_WITH_AES_128_SHA,
817         SSL_kEDH|SSL_aNULL|SSL_AES|SSL_SHA|SSL_TLSV1,
818         SSL_NOT_EXP|SSL_HIGH,
819         0,
820         128,
821         128,
822         SSL_ALL_CIPHERS,
823         SSL_ALL_STRENGTHS,
824         },
825
826 /* Cipher 35 */
827         {
828         1,
829         TLS1_TXT_RSA_WITH_AES_256_SHA,
830         TLS1_CK_RSA_WITH_AES_256_SHA,
831         SSL_kRSA|SSL_aRSA|SSL_AES|SSL_SHA |SSL_TLSV1,
832         SSL_NOT_EXP|SSL_HIGH,
833         0,
834         256,
835         256,
836         SSL_ALL_CIPHERS,
837         SSL_ALL_STRENGTHS,
838         },
839 /* Cipher 36 */
840         {
841         0,
842         TLS1_TXT_DH_DSS_WITH_AES_256_SHA,
843         TLS1_CK_DH_DSS_WITH_AES_256_SHA,
844         SSL_kDHd|SSL_aDH|SSL_AES|SSL_SHA|SSL_TLSV1,
845         SSL_NOT_EXP|SSL_HIGH,
846         0,
847         256,
848         256,
849         SSL_ALL_CIPHERS,
850         SSL_ALL_STRENGTHS,
851         },
852 /* Cipher 37 */
853         {
854         0,
855         TLS1_TXT_DH_RSA_WITH_AES_256_SHA,
856         TLS1_CK_DH_RSA_WITH_AES_256_SHA,
857         SSL_kDHr|SSL_aDH|SSL_AES|SSL_SHA|SSL_TLSV1,
858         SSL_NOT_EXP|SSL_HIGH,
859         0,
860         256,
861         256,
862         SSL_ALL_CIPHERS,
863         SSL_ALL_STRENGTHS,
864         },
865 /* Cipher 38 */
866         {
867         1,
868         TLS1_TXT_DHE_DSS_WITH_AES_256_SHA,
869         TLS1_CK_DHE_DSS_WITH_AES_256_SHA,
870         SSL_kEDH|SSL_aDSS|SSL_AES|SSL_SHA|SSL_TLSV1,
871         SSL_NOT_EXP|SSL_HIGH,
872         0,
873         256,
874         256,
875         SSL_ALL_CIPHERS,
876         SSL_ALL_STRENGTHS,
877         },
878 /* Cipher 39 */
879         {
880         1,
881         TLS1_TXT_DHE_RSA_WITH_AES_256_SHA,
882         TLS1_CK_DHE_RSA_WITH_AES_256_SHA,
883         SSL_kEDH|SSL_aRSA|SSL_AES|SSL_SHA|SSL_TLSV1,
884         SSL_NOT_EXP|SSL_HIGH,
885         0,
886         256,
887         256,
888         SSL_ALL_CIPHERS,
889         SSL_ALL_STRENGTHS,
890         },
891         /* Cipher 3A */
892         {
893         1,
894         TLS1_TXT_ADH_WITH_AES_256_SHA,
895         TLS1_CK_ADH_WITH_AES_256_SHA,
896         SSL_kEDH|SSL_aNULL|SSL_AES|SSL_SHA|SSL_TLSV1,
897         SSL_NOT_EXP|SSL_HIGH,
898         0,
899         256,
900         256,
901         SSL_ALL_CIPHERS,
902         SSL_ALL_STRENGTHS,
903         },
904
905 #ifndef OPENSSL_NO_ECDH
906         /* Cipher C001 */
907             {
908             1,
909             TLS1_TXT_ECDH_ECDSA_WITH_NULL_SHA,
910             TLS1_CK_ECDH_ECDSA_WITH_NULL_SHA,
911             SSL_kECDH|SSL_aECDSA|SSL_eNULL|SSL_SHA|SSL_TLSV1,
912             SSL_NOT_EXP,
913             0,
914             0,
915             0,
916             SSL_ALL_CIPHERS,
917             SSL_ALL_STRENGTHS,
918             },
919
920         /* Cipher C002 */
921             {
922             1,
923             TLS1_TXT_ECDH_ECDSA_WITH_RC4_128_SHA,
924             TLS1_CK_ECDH_ECDSA_WITH_RC4_128_SHA,
925             SSL_kECDH|SSL_aECDSA|SSL_RC4|SSL_SHA|SSL_TLSV1,
926             SSL_NOT_EXP,
927             0,
928             128,
929             128,
930             SSL_ALL_CIPHERS,
931             SSL_ALL_STRENGTHS,
932             },
933
934         /* Cipher C003 */
935             {
936             1,
937             TLS1_TXT_ECDH_ECDSA_WITH_DES_192_CBC3_SHA,
938             TLS1_CK_ECDH_ECDSA_WITH_DES_192_CBC3_SHA,
939             SSL_kECDH|SSL_aECDSA|SSL_3DES|SSL_SHA|SSL_TLSV1,
940             SSL_NOT_EXP|SSL_HIGH,
941             0,
942             168,
943             168,
944             SSL_ALL_CIPHERS,
945             SSL_ALL_STRENGTHS,
946             },
947
948         /* Cipher C004 */
949             {
950             1,
951             TLS1_TXT_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
952             TLS1_CK_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
953             SSL_kECDH|SSL_aECDSA|SSL_AES|SSL_SHA|SSL_TLSV1,
954             SSL_NOT_EXP|SSL_HIGH,
955             0,
956             128,
957             128,
958             SSL_ALL_CIPHERS,
959             SSL_ALL_STRENGTHS,
960             },
961
962         /* Cipher C005 */
963             {
964             1,
965             TLS1_TXT_ECDH_ECDSA_WITH_AES_256_CBC_SHA,
966             TLS1_CK_ECDH_ECDSA_WITH_AES_256_CBC_SHA,
967             SSL_kECDH|SSL_aECDSA|SSL_AES|SSL_SHA|SSL_TLSV1,
968             SSL_NOT_EXP|SSL_HIGH,
969             0,
970             256,
971             256,
972             SSL_ALL_CIPHERS,
973             SSL_ALL_STRENGTHS,
974             },
975
976         /* Cipher C006 */
977             {
978             1,
979             TLS1_TXT_ECDHE_ECDSA_WITH_NULL_SHA,
980             TLS1_CK_ECDHE_ECDSA_WITH_NULL_SHA,
981             SSL_kECDHE|SSL_aECDSA|SSL_eNULL|SSL_SHA|SSL_TLSV1,
982             SSL_NOT_EXP,
983             0,
984             0,
985             0,
986             SSL_ALL_CIPHERS,
987             SSL_ALL_STRENGTHS,
988             },
989
990         /* Cipher C007 */
991             {
992             1,
993             TLS1_TXT_ECDHE_ECDSA_WITH_RC4_128_SHA,
994             TLS1_CK_ECDHE_ECDSA_WITH_RC4_128_SHA,
995             SSL_kECDHE|SSL_aECDSA|SSL_RC4|SSL_SHA|SSL_TLSV1,
996             SSL_NOT_EXP,
997             0,
998             128,
999             128,
1000             SSL_ALL_CIPHERS,
1001             SSL_ALL_STRENGTHS,
1002             },
1003
1004         /* Cipher C008 */
1005             {
1006             1,
1007             TLS1_TXT_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,
1008             TLS1_CK_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,
1009             SSL_kECDHE|SSL_aECDSA|SSL_3DES|SSL_SHA|SSL_TLSV1,
1010             SSL_NOT_EXP|SSL_HIGH,
1011             0,
1012             168,
1013             168,
1014             SSL_ALL_CIPHERS,
1015             SSL_ALL_STRENGTHS,
1016             },
1017
1018         /* Cipher C009 */
1019             {
1020             1,
1021             TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
1022             TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
1023             SSL_kECDHE|SSL_aECDSA|SSL_AES|SSL_SHA|SSL_TLSV1,
1024             SSL_NOT_EXP|SSL_HIGH,
1025             0,
1026             128,
1027             128,
1028             SSL_ALL_CIPHERS,
1029             SSL_ALL_STRENGTHS,
1030             },
1031
1032         /* Cipher C00A */
1033             {
1034             1,
1035             TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
1036             TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
1037             SSL_kECDHE|SSL_aECDSA|SSL_AES|SSL_SHA|SSL_TLSV1,
1038             SSL_NOT_EXP|SSL_HIGH,
1039             0,
1040             256,
1041             256,
1042             SSL_ALL_CIPHERS,
1043             SSL_ALL_STRENGTHS,
1044             },
1045
1046         /* Cipher C00B */
1047             {
1048             1,
1049             TLS1_TXT_ECDH_RSA_WITH_NULL_SHA,
1050             TLS1_CK_ECDH_RSA_WITH_NULL_SHA,
1051             SSL_kECDH|SSL_aRSA|SSL_eNULL|SSL_SHA|SSL_TLSV1,
1052             SSL_NOT_EXP,
1053             0,
1054             0,
1055             0,
1056             SSL_ALL_CIPHERS,
1057             SSL_ALL_STRENGTHS,
1058             },
1059
1060         /* Cipher C00C */
1061             {
1062             1,
1063             TLS1_TXT_ECDH_RSA_WITH_RC4_128_SHA,
1064             TLS1_CK_ECDH_RSA_WITH_RC4_128_SHA,
1065             SSL_kECDH|SSL_aRSA|SSL_RC4|SSL_SHA|SSL_TLSV1,
1066             SSL_NOT_EXP,
1067             0,
1068             128,
1069             128,
1070             SSL_ALL_CIPHERS,
1071             SSL_ALL_STRENGTHS,
1072             },
1073
1074         /* Cipher C00D */
1075             {
1076             1,
1077             TLS1_TXT_ECDH_RSA_WITH_DES_192_CBC3_SHA,
1078             TLS1_CK_ECDH_RSA_WITH_DES_192_CBC3_SHA,
1079             SSL_kECDH|SSL_aRSA|SSL_3DES|SSL_SHA|SSL_TLSV1,
1080             SSL_NOT_EXP|SSL_HIGH,
1081             0,
1082             168,
1083             168,
1084             SSL_ALL_CIPHERS,
1085             SSL_ALL_STRENGTHS,
1086             },
1087
1088         /* Cipher C00E */
1089             {
1090             1,
1091             TLS1_TXT_ECDH_RSA_WITH_AES_128_CBC_SHA,
1092             TLS1_CK_ECDH_RSA_WITH_AES_128_CBC_SHA,
1093             SSL_kECDH|SSL_aRSA|SSL_AES|SSL_SHA|SSL_TLSV1,
1094             SSL_NOT_EXP|SSL_HIGH,
1095             0,
1096             128,
1097             128,
1098             SSL_ALL_CIPHERS,
1099             SSL_ALL_STRENGTHS,
1100             },
1101
1102         /* Cipher C00F */
1103             {
1104             1,
1105             TLS1_TXT_ECDH_RSA_WITH_AES_256_CBC_SHA,
1106             TLS1_CK_ECDH_RSA_WITH_AES_256_CBC_SHA,
1107             SSL_kECDH|SSL_aRSA|SSL_AES|SSL_SHA|SSL_TLSV1,
1108             SSL_NOT_EXP|SSL_HIGH,
1109             0,
1110             256,
1111             256,
1112             SSL_ALL_CIPHERS,
1113             SSL_ALL_STRENGTHS,
1114             },
1115
1116         /* Cipher C010 */
1117             {
1118             1,
1119             TLS1_TXT_ECDHE_RSA_WITH_NULL_SHA,
1120             TLS1_CK_ECDHE_RSA_WITH_NULL_SHA,
1121             SSL_kECDHE|SSL_aRSA|SSL_eNULL|SSL_SHA|SSL_TLSV1,
1122             SSL_NOT_EXP,
1123             0,
1124             0,
1125             0,
1126             SSL_ALL_CIPHERS,
1127             SSL_ALL_STRENGTHS,
1128             },
1129
1130         /* Cipher C011 */
1131             {
1132             1,
1133             TLS1_TXT_ECDHE_RSA_WITH_RC4_128_SHA,
1134             TLS1_CK_ECDHE_RSA_WITH_RC4_128_SHA,
1135             SSL_kECDHE|SSL_aRSA|SSL_RC4|SSL_SHA|SSL_TLSV1,
1136             SSL_NOT_EXP,
1137             0,
1138             128,
1139             128,
1140             SSL_ALL_CIPHERS,
1141             SSL_ALL_STRENGTHS,
1142             },
1143
1144         /* Cipher C012 */
1145             {
1146             1,
1147             TLS1_TXT_ECDHE_RSA_WITH_DES_192_CBC3_SHA,
1148             TLS1_CK_ECDHE_RSA_WITH_DES_192_CBC3_SHA,
1149             SSL_kECDHE|SSL_aRSA|SSL_3DES|SSL_SHA|SSL_TLSV1,
1150             SSL_NOT_EXP|SSL_HIGH,
1151             0,
1152             168,
1153             168,
1154             SSL_ALL_CIPHERS,
1155             SSL_ALL_STRENGTHS,
1156             },
1157
1158         /* Cipher C013 */
1159             {
1160             1,
1161             TLS1_TXT_ECDHE_RSA_WITH_AES_128_CBC_SHA,
1162             TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA,
1163             SSL_kECDHE|SSL_aRSA|SSL_AES|SSL_SHA|SSL_TLSV1,
1164             SSL_NOT_EXP|SSL_HIGH,
1165             0,
1166             128,
1167             128,
1168             SSL_ALL_CIPHERS,
1169             SSL_ALL_STRENGTHS,
1170             },
1171
1172         /* Cipher C014 */
1173             {
1174             1,
1175             TLS1_TXT_ECDHE_RSA_WITH_AES_256_CBC_SHA,
1176             TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA,
1177             SSL_kECDHE|SSL_aRSA|SSL_AES|SSL_SHA|SSL_TLSV1,
1178             SSL_NOT_EXP|SSL_HIGH,
1179             0,
1180             256,
1181             256,
1182             SSL_ALL_CIPHERS,
1183             SSL_ALL_STRENGTHS,
1184             },
1185
1186         /* Cipher C015 */
1187             {
1188             1,
1189             TLS1_TXT_ECDH_anon_WITH_NULL_SHA,
1190             TLS1_CK_ECDH_anon_WITH_NULL_SHA,
1191             SSL_kECDHE|SSL_aNULL|SSL_eNULL|SSL_SHA|SSL_TLSV1,
1192             SSL_NOT_EXP,
1193             0,
1194             0,
1195             0,
1196             SSL_ALL_CIPHERS,
1197             SSL_ALL_STRENGTHS,
1198             },
1199
1200         /* Cipher C016 */
1201             {
1202             1,
1203             TLS1_TXT_ECDH_anon_WITH_RC4_128_SHA,
1204             TLS1_CK_ECDH_anon_WITH_RC4_128_SHA,
1205             SSL_kECDHE|SSL_aNULL|SSL_RC4|SSL_SHA|SSL_TLSV1,
1206             SSL_NOT_EXP,
1207             0,
1208             128,
1209             128,
1210             SSL_ALL_CIPHERS,
1211             SSL_ALL_STRENGTHS,
1212             },
1213
1214         /* Cipher C017 */
1215             {
1216             1,
1217             TLS1_TXT_ECDH_anon_WITH_DES_192_CBC3_SHA,
1218             TLS1_CK_ECDH_anon_WITH_DES_192_CBC3_SHA,
1219             SSL_kECDHE|SSL_aNULL|SSL_3DES|SSL_SHA|SSL_TLSV1,
1220             SSL_NOT_EXP|SSL_HIGH,
1221             0,
1222             168,
1223             168,
1224             SSL_ALL_CIPHERS,
1225             SSL_ALL_STRENGTHS,
1226             },
1227
1228         /* Cipher C018 */
1229             {
1230             1,
1231             TLS1_TXT_ECDH_anon_WITH_AES_128_CBC_SHA,
1232             TLS1_CK_ECDH_anon_WITH_AES_128_CBC_SHA,
1233             SSL_kECDHE|SSL_aNULL|SSL_AES|SSL_SHA|SSL_TLSV1,
1234             SSL_NOT_EXP|SSL_HIGH,
1235             0,
1236             128,
1237             128,
1238             SSL_ALL_CIPHERS,
1239             SSL_ALL_STRENGTHS,
1240             },
1241
1242         /* Cipher C019 */
1243             {
1244             1,
1245             TLS1_TXT_ECDH_anon_WITH_AES_256_CBC_SHA,
1246             TLS1_CK_ECDH_anon_WITH_AES_256_CBC_SHA,
1247             SSL_kECDHE|SSL_aNULL|SSL_AES|SSL_SHA|SSL_TLSV1,
1248             SSL_NOT_EXP|SSL_HIGH,
1249             0,
1250             256,
1251             256,
1252             SSL_ALL_CIPHERS,
1253             SSL_ALL_STRENGTHS,
1254             },
1255 #endif  /* OPENSSL_NO_ECDH */
1256
1257 #if TLS1_ALLOW_EXPERIMENTAL_CIPHERSUITES
1258         /* New TLS Export CipherSuites */
1259         /* Cipher 60 */
1260             {
1261             1,
1262             TLS1_TXT_RSA_EXPORT1024_WITH_RC4_56_MD5,
1263             TLS1_CK_RSA_EXPORT1024_WITH_RC4_56_MD5,
1264             SSL_kRSA|SSL_aRSA|SSL_RC4|SSL_MD5|SSL_TLSV1,
1265             SSL_EXPORT|SSL_EXP56,
1266             0,
1267             56,
1268             128,
1269             SSL_ALL_CIPHERS,
1270             SSL_ALL_STRENGTHS,
1271             },
1272         /* Cipher 61 */
1273             {
1274             1,
1275             TLS1_TXT_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5,
1276             TLS1_CK_RSA_EXPORT1024_WITH_RC2_CBC_56_MD5,
1277             SSL_kRSA|SSL_aRSA|SSL_RC2|SSL_MD5|SSL_TLSV1,
1278             SSL_EXPORT|SSL_EXP56,
1279             0,
1280             56,
1281             128,
1282             SSL_ALL_CIPHERS,
1283             SSL_ALL_STRENGTHS,
1284             },
1285         /* Cipher 62 */
1286             {
1287             1,
1288             TLS1_TXT_RSA_EXPORT1024_WITH_DES_CBC_SHA,
1289             TLS1_CK_RSA_EXPORT1024_WITH_DES_CBC_SHA,
1290             SSL_kRSA|SSL_aRSA|SSL_DES|SSL_SHA|SSL_TLSV1,
1291             SSL_EXPORT|SSL_EXP56,
1292             0,
1293             56,
1294             56,
1295             SSL_ALL_CIPHERS,
1296             SSL_ALL_STRENGTHS,
1297             },
1298         /* Cipher 63 */
1299             {
1300             1,
1301             TLS1_TXT_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA,
1302             TLS1_CK_DHE_DSS_EXPORT1024_WITH_DES_CBC_SHA,
1303             SSL_kEDH|SSL_aDSS|SSL_DES|SSL_SHA|SSL_TLSV1,
1304             SSL_EXPORT|SSL_EXP56,
1305             0,
1306             56,
1307             56,
1308             SSL_ALL_CIPHERS,
1309             SSL_ALL_STRENGTHS,
1310             },
1311         /* Cipher 64 */
1312             {
1313             1,
1314             TLS1_TXT_RSA_EXPORT1024_WITH_RC4_56_SHA,
1315             TLS1_CK_RSA_EXPORT1024_WITH_RC4_56_SHA,
1316             SSL_kRSA|SSL_aRSA|SSL_RC4|SSL_SHA|SSL_TLSV1,
1317             SSL_EXPORT|SSL_EXP56,
1318             0,
1319             56,
1320             128,
1321             SSL_ALL_CIPHERS,
1322             SSL_ALL_STRENGTHS,
1323             },
1324         /* Cipher 65 */
1325             {
1326             1,
1327             TLS1_TXT_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA,
1328             TLS1_CK_DHE_DSS_EXPORT1024_WITH_RC4_56_SHA,
1329             SSL_kEDH|SSL_aDSS|SSL_RC4|SSL_SHA|SSL_TLSV1,
1330             SSL_EXPORT|SSL_EXP56,
1331             0,
1332             56,
1333             128,
1334             SSL_ALL_CIPHERS,
1335             SSL_ALL_STRENGTHS,
1336             },
1337         /* Cipher 66 */
1338             {
1339             1,
1340             TLS1_TXT_DHE_DSS_WITH_RC4_128_SHA,
1341             TLS1_CK_DHE_DSS_WITH_RC4_128_SHA,
1342             SSL_kEDH|SSL_aDSS|SSL_RC4|SSL_SHA|SSL_TLSV1,
1343             SSL_NOT_EXP|SSL_MEDIUM,
1344             0,
1345             128,
1346             128,
1347             SSL_ALL_CIPHERS,
1348             SSL_ALL_STRENGTHS
1349             },
1350 #endif
1351
1352 /* end of list */
1353         };
1354
1355 SSL3_ENC_METHOD SSLv3_enc_data={
1356         ssl3_enc,
1357         ssl3_mac,
1358         ssl3_setup_key_block,
1359         ssl3_generate_master_secret,
1360         ssl3_change_cipher_state,
1361         ssl3_final_finish_mac,
1362         MD5_DIGEST_LENGTH+SHA_DIGEST_LENGTH,
1363         ssl3_cert_verify_mac,
1364         SSL3_MD_CLIENT_FINISHED_CONST,4,
1365         SSL3_MD_SERVER_FINISHED_CONST,4,
1366         ssl3_alert_code,
1367         };
1368
1369 long ssl3_default_timeout(void)
1370         {
1371         /* 2 hours, the 24 hours mentioned in the SSLv3 spec
1372          * is way too long for http, the cache would over fill */
1373         return(60*60*2);
1374         }
1375
1376 IMPLEMENT_ssl3_meth_func(sslv3_base_method,
1377                         ssl_undefined_function,
1378                         ssl_undefined_function,
1379                         ssl_bad_method)
1380
1381 int ssl3_num_ciphers(void)
1382         {
1383         return(SSL3_NUM_CIPHERS);
1384         }
1385
1386 SSL_CIPHER *ssl3_get_cipher(unsigned int u)
1387         {
1388         if (u < SSL3_NUM_CIPHERS)
1389                 return(&(ssl3_ciphers[SSL3_NUM_CIPHERS-1-u]));
1390         else
1391                 return(NULL);
1392         }
1393
1394 int ssl3_pending(const SSL *s)
1395         {
1396         if (s->rstate == SSL_ST_READ_BODY)
1397                 return 0;
1398         
1399         return (s->s3->rrec.type == SSL3_RT_APPLICATION_DATA) ? s->s3->rrec.length : 0;
1400         }
1401
1402 int ssl3_new(SSL *s)
1403         {
1404         SSL3_STATE *s3;
1405
1406         if ((s3=OPENSSL_malloc(sizeof *s3)) == NULL) goto err;
1407         memset(s3,0,sizeof *s3);
1408         EVP_MD_CTX_init(&s3->finish_dgst1);
1409         EVP_MD_CTX_init(&s3->finish_dgst2);
1410         pq_64bit_init(&(s3->rrec.seq_num));
1411         pq_64bit_init(&(s3->wrec.seq_num));
1412
1413         s->s3=s3;
1414
1415         s->method->ssl_clear(s);
1416         return(1);
1417 err:
1418         return(0);
1419         }
1420
1421 void ssl3_free(SSL *s)
1422         {
1423         if(s == NULL)
1424             return;
1425
1426         ssl3_cleanup_key_block(s);
1427         if (s->s3->rbuf.buf != NULL)
1428                 OPENSSL_free(s->s3->rbuf.buf);
1429         if (s->s3->wbuf.buf != NULL)
1430                 OPENSSL_free(s->s3->wbuf.buf);
1431         if (s->s3->rrec.comp != NULL)
1432                 OPENSSL_free(s->s3->rrec.comp);
1433 #ifndef OPENSSL_NO_DH
1434         if (s->s3->tmp.dh != NULL)
1435                 DH_free(s->s3->tmp.dh);
1436 #endif
1437 #ifndef OPENSSL_NO_ECDH
1438         if (s->s3->tmp.ecdh != NULL)
1439                 EC_KEY_free(s->s3->tmp.ecdh);
1440 #endif
1441
1442         if (s->s3->tmp.ca_names != NULL)
1443                 sk_X509_NAME_pop_free(s->s3->tmp.ca_names,X509_NAME_free);
1444         EVP_MD_CTX_cleanup(&s->s3->finish_dgst1);
1445         EVP_MD_CTX_cleanup(&s->s3->finish_dgst2);
1446         pq_64bit_free(&(s->s3->rrec.seq_num));
1447         pq_64bit_free(&(s->s3->wrec.seq_num));
1448
1449         OPENSSL_cleanse(s->s3,sizeof *s->s3);
1450         OPENSSL_free(s->s3);
1451         s->s3=NULL;
1452         }
1453
1454 void ssl3_clear(SSL *s)
1455         {
1456         unsigned char *rp,*wp;
1457         size_t rlen, wlen;
1458
1459         ssl3_cleanup_key_block(s);
1460         if (s->s3->tmp.ca_names != NULL)
1461                 sk_X509_NAME_pop_free(s->s3->tmp.ca_names,X509_NAME_free);
1462
1463         if (s->s3->rrec.comp != NULL)
1464                 {
1465                 OPENSSL_free(s->s3->rrec.comp);
1466                 s->s3->rrec.comp=NULL;
1467                 }
1468 #ifndef OPENSSL_NO_DH
1469         if (s->s3->tmp.dh != NULL)
1470                 DH_free(s->s3->tmp.dh);
1471 #endif
1472 #ifndef OPENSSL_NO_ECDH
1473         if (s->s3->tmp.ecdh != NULL)
1474                 EC_KEY_free(s->s3->tmp.ecdh);
1475 #endif
1476
1477         rp = s->s3->rbuf.buf;
1478         wp = s->s3->wbuf.buf;
1479         rlen = s->s3->rbuf.len;
1480         wlen = s->s3->wbuf.len;
1481
1482         EVP_MD_CTX_cleanup(&s->s3->finish_dgst1);
1483         EVP_MD_CTX_cleanup(&s->s3->finish_dgst2);
1484
1485         memset(s->s3,0,sizeof *s->s3);
1486         s->s3->rbuf.buf = rp;
1487         s->s3->wbuf.buf = wp;
1488         s->s3->rbuf.len = rlen;
1489         s->s3->wbuf.len = wlen;
1490
1491         ssl_free_wbio_buffer(s);
1492
1493         s->packet_length=0;
1494         s->s3->renegotiate=0;
1495         s->s3->total_renegotiations=0;
1496         s->s3->num_renegotiations=0;
1497         s->s3->in_read_app_data=0;
1498         s->version=SSL3_VERSION;
1499         }
1500
1501 long ssl3_ctrl(SSL *s, int cmd, long larg, void *parg)
1502         {
1503         int ret=0;
1504
1505 #if !defined(OPENSSL_NO_DSA) || !defined(OPENSSL_NO_RSA)
1506         if (
1507 #ifndef OPENSSL_NO_RSA
1508             cmd == SSL_CTRL_SET_TMP_RSA ||
1509             cmd == SSL_CTRL_SET_TMP_RSA_CB ||
1510 #endif
1511 #ifndef OPENSSL_NO_DSA
1512             cmd == SSL_CTRL_SET_TMP_DH ||
1513             cmd == SSL_CTRL_SET_TMP_DH_CB ||
1514 #endif
1515                 0)
1516                 {
1517                 if (!ssl_cert_inst(&s->cert))
1518                         {
1519                         SSLerr(SSL_F_SSL3_CTRL, ERR_R_MALLOC_FAILURE);
1520                         return(0);
1521                         }
1522                 }
1523 #endif
1524
1525         switch (cmd)
1526                 {
1527         case SSL_CTRL_GET_SESSION_REUSED:
1528                 ret=s->hit;
1529                 break;
1530         case SSL_CTRL_GET_CLIENT_CERT_REQUEST:
1531                 break;
1532         case SSL_CTRL_GET_NUM_RENEGOTIATIONS:
1533                 ret=s->s3->num_renegotiations;
1534                 break;
1535         case SSL_CTRL_CLEAR_NUM_RENEGOTIATIONS:
1536                 ret=s->s3->num_renegotiations;
1537                 s->s3->num_renegotiations=0;
1538                 break;
1539         case SSL_CTRL_GET_TOTAL_RENEGOTIATIONS:
1540                 ret=s->s3->total_renegotiations;
1541                 break;
1542         case SSL_CTRL_GET_FLAGS:
1543                 ret=(int)(s->s3->flags);
1544                 break;
1545 #ifndef OPENSSL_NO_RSA
1546         case SSL_CTRL_NEED_TMP_RSA:
1547                 if ((s->cert != NULL) && (s->cert->rsa_tmp == NULL) &&
1548                     ((s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) ||
1549                      (EVP_PKEY_size(s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512/8))))
1550                         ret = 1;
1551                 break;
1552         case SSL_CTRL_SET_TMP_RSA:
1553                 {
1554                         RSA *rsa = (RSA *)parg;
1555                         if (rsa == NULL)
1556                                 {
1557                                 SSLerr(SSL_F_SSL3_CTRL, ERR_R_PASSED_NULL_PARAMETER);
1558                                 return(ret);
1559                                 }
1560                         if ((rsa = RSAPrivateKey_dup(rsa)) == NULL)
1561                                 {
1562                                 SSLerr(SSL_F_SSL3_CTRL, ERR_R_RSA_LIB);
1563                                 return(ret);
1564                                 }
1565                         if (s->cert->rsa_tmp != NULL)
1566                                 RSA_free(s->cert->rsa_tmp);
1567                         s->cert->rsa_tmp = rsa;
1568                         ret = 1;
1569                 }
1570                 break;
1571         case SSL_CTRL_SET_TMP_RSA_CB:
1572                 {
1573                 SSLerr(SSL_F_SSL3_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
1574                 return(ret);
1575                 }
1576                 break;
1577 #endif
1578 #ifndef OPENSSL_NO_DH
1579         case SSL_CTRL_SET_TMP_DH:
1580                 {
1581                         DH *dh = (DH *)parg;
1582                         if (dh == NULL)
1583                                 {
1584                                 SSLerr(SSL_F_SSL3_CTRL, ERR_R_PASSED_NULL_PARAMETER);
1585                                 return(ret);
1586                                 }
1587                         if ((dh = DHparams_dup(dh)) == NULL)
1588                                 {
1589                                 SSLerr(SSL_F_SSL3_CTRL, ERR_R_DH_LIB);
1590                                 return(ret);
1591                                 }
1592                         if (!(s->options & SSL_OP_SINGLE_DH_USE))
1593                                 {
1594                                 if (!DH_generate_key(dh))
1595                                         {
1596                                         DH_free(dh);
1597                                         SSLerr(SSL_F_SSL3_CTRL, ERR_R_DH_LIB);
1598                                         return(ret);
1599                                         }
1600                                 }
1601                         if (s->cert->dh_tmp != NULL)
1602                                 DH_free(s->cert->dh_tmp);
1603                         s->cert->dh_tmp = dh;
1604                         ret = 1;
1605                 }
1606                 break;
1607         case SSL_CTRL_SET_TMP_DH_CB:
1608                 {
1609                 SSLerr(SSL_F_SSL3_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
1610                 return(ret);
1611                 }
1612                 break;
1613 #endif
1614 #ifndef OPENSSL_NO_ECDH
1615         case SSL_CTRL_SET_TMP_ECDH:
1616                 {
1617                 EC_KEY *ecdh = NULL;
1618                         
1619                 if (parg == NULL)
1620                         {
1621                         SSLerr(SSL_F_SSL3_CTRL, ERR_R_PASSED_NULL_PARAMETER);
1622                         return(ret);
1623                         }
1624                 if (!EC_KEY_up_ref((EC_KEY *)parg))
1625                         {
1626                         SSLerr(SSL_F_SSL3_CTRL,ERR_R_ECDH_LIB);
1627                         return(ret);
1628                         }
1629                 ecdh = (EC_KEY *)parg;
1630                 if (!(s->options & SSL_OP_SINGLE_ECDH_USE))
1631                         {
1632                         if (!EC_KEY_generate_key(ecdh))
1633                                 {
1634                                 EC_KEY_free(ecdh);
1635                                 SSLerr(SSL_F_SSL3_CTRL,ERR_R_ECDH_LIB);
1636                                 return(ret);
1637                                 }
1638                         }
1639                 if (s->cert->ecdh_tmp != NULL)
1640                         EC_KEY_free(s->cert->ecdh_tmp);
1641                 s->cert->ecdh_tmp = ecdh;
1642                 ret = 1;
1643                 }
1644                 break;
1645         case SSL_CTRL_SET_TMP_ECDH_CB:
1646                 {
1647                 SSLerr(SSL_F_SSL3_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
1648                 return(ret);
1649                 }
1650                 break;
1651 #endif /* !OPENSSL_NO_ECDH */
1652         default:
1653                 break;
1654                 }
1655         return(ret);
1656         }
1657
1658 long ssl3_callback_ctrl(SSL *s, int cmd, void (*fp)(void))
1659         {
1660         int ret=0;
1661
1662 #if !defined(OPENSSL_NO_DSA) || !defined(OPENSSL_NO_RSA)
1663         if (
1664 #ifndef OPENSSL_NO_RSA
1665             cmd == SSL_CTRL_SET_TMP_RSA_CB ||
1666 #endif
1667 #ifndef OPENSSL_NO_DSA
1668             cmd == SSL_CTRL_SET_TMP_DH_CB ||
1669 #endif
1670                 0)
1671                 {
1672                 if (!ssl_cert_inst(&s->cert))
1673                         {
1674                         SSLerr(SSL_F_SSL3_CALLBACK_CTRL, ERR_R_MALLOC_FAILURE);
1675                         return(0);
1676                         }
1677                 }
1678 #endif
1679
1680         switch (cmd)
1681                 {
1682 #ifndef OPENSSL_NO_RSA
1683         case SSL_CTRL_SET_TMP_RSA_CB:
1684                 {
1685                 s->cert->rsa_tmp_cb = (RSA *(*)(SSL *, int, int))fp;
1686                 }
1687                 break;
1688 #endif
1689 #ifndef OPENSSL_NO_DH
1690         case SSL_CTRL_SET_TMP_DH_CB:
1691                 {
1692                 s->cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))fp;
1693                 }
1694                 break;
1695 #endif
1696 #ifndef OPENSSL_NO_ECDH
1697         case SSL_CTRL_SET_TMP_ECDH_CB:
1698                 {
1699                 s->cert->ecdh_tmp_cb = (EC_KEY *(*)(SSL *, int, int))fp;
1700                 }
1701                 break;
1702 #endif
1703         default:
1704                 break;
1705                 }
1706         return(ret);
1707         }
1708
1709 long ssl3_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg)
1710         {
1711         CERT *cert;
1712
1713         cert=ctx->cert;
1714
1715         switch (cmd)
1716                 {
1717 #ifndef OPENSSL_NO_RSA
1718         case SSL_CTRL_NEED_TMP_RSA:
1719                 if (    (cert->rsa_tmp == NULL) &&
1720                         ((cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL) ||
1721                          (EVP_PKEY_size(cert->pkeys[SSL_PKEY_RSA_ENC].privatekey) > (512/8)))
1722                         )
1723                         return(1);
1724                 else
1725                         return(0);
1726                 /* break; */
1727         case SSL_CTRL_SET_TMP_RSA:
1728                 {
1729                 RSA *rsa;
1730                 int i;
1731
1732                 rsa=(RSA *)parg;
1733                 i=1;
1734                 if (rsa == NULL)
1735                         i=0;
1736                 else
1737                         {
1738                         if ((rsa=RSAPrivateKey_dup(rsa)) == NULL)
1739                                 i=0;
1740                         }
1741                 if (!i)
1742                         {
1743                         SSLerr(SSL_F_SSL3_CTX_CTRL,ERR_R_RSA_LIB);
1744                         return(0);
1745                         }
1746                 else
1747                         {
1748                         if (cert->rsa_tmp != NULL)
1749                                 RSA_free(cert->rsa_tmp);
1750                         cert->rsa_tmp=rsa;
1751                         return(1);
1752                         }
1753                 }
1754                 /* break; */
1755         case SSL_CTRL_SET_TMP_RSA_CB:
1756                 {
1757                 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
1758                 return(0);
1759                 }
1760                 break;
1761 #endif
1762 #ifndef OPENSSL_NO_DH
1763         case SSL_CTRL_SET_TMP_DH:
1764                 {
1765                 DH *new=NULL,*dh;
1766
1767                 dh=(DH *)parg;
1768                 if ((new=DHparams_dup(dh)) == NULL)
1769                         {
1770                         SSLerr(SSL_F_SSL3_CTX_CTRL,ERR_R_DH_LIB);
1771                         return 0;
1772                         }
1773                 if (!(ctx->options & SSL_OP_SINGLE_DH_USE))
1774                         {
1775                         if (!DH_generate_key(new))
1776                                 {
1777                                 SSLerr(SSL_F_SSL3_CTX_CTRL,ERR_R_DH_LIB);
1778                                 DH_free(new);
1779                                 return 0;
1780                                 }
1781                         }
1782                 if (cert->dh_tmp != NULL)
1783                         DH_free(cert->dh_tmp);
1784                 cert->dh_tmp=new;
1785                 return 1;
1786                 }
1787                 /*break; */
1788         case SSL_CTRL_SET_TMP_DH_CB:
1789                 {
1790                 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
1791                 return(0);
1792                 }
1793                 break;
1794 #endif
1795 #ifndef OPENSSL_NO_ECDH
1796         case SSL_CTRL_SET_TMP_ECDH:
1797                 {
1798                 EC_KEY *ecdh = NULL;
1799                         
1800                 if (parg == NULL)
1801                         {
1802                         SSLerr(SSL_F_SSL3_CTX_CTRL,ERR_R_ECDH_LIB);
1803                         return 0;
1804                         }
1805                 ecdh = EC_KEY_dup((EC_KEY *)parg);
1806                 if (ecdh == NULL)
1807                         {
1808                         SSLerr(SSL_F_SSL3_CTX_CTRL,ERR_R_EC_LIB);
1809                         return 0;
1810                         }
1811                 if (!(ctx->options & SSL_OP_SINGLE_ECDH_USE))
1812                         {
1813                         if (!EC_KEY_generate_key(ecdh))
1814                                 {
1815                                 EC_KEY_free(ecdh);
1816                                 SSLerr(SSL_F_SSL3_CTX_CTRL,ERR_R_ECDH_LIB);
1817                                 return 0;
1818                                 }
1819                         }
1820
1821                 if (cert->ecdh_tmp != NULL)
1822                         {
1823                         EC_KEY_free(cert->ecdh_tmp);
1824                         }
1825                 cert->ecdh_tmp = ecdh;
1826                 return 1;
1827                 }
1828                 /* break; */
1829         case SSL_CTRL_SET_TMP_ECDH_CB:
1830                 {
1831                 SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);
1832                 return(0);
1833                 }
1834                 break;
1835 #endif /* !OPENSSL_NO_ECDH */
1836         /* A Thawte special :-) */
1837         case SSL_CTRL_EXTRA_CHAIN_CERT:
1838                 if (ctx->extra_certs == NULL)
1839                         {
1840                         if ((ctx->extra_certs=sk_X509_new_null()) == NULL)
1841                                 return(0);
1842                         }
1843                 sk_X509_push(ctx->extra_certs,(X509 *)parg);
1844                 break;
1845
1846         default:
1847                 return(0);
1848                 }
1849         return(1);
1850         }
1851
1852 long ssl3_ctx_callback_ctrl(SSL_CTX *ctx, int cmd, void (*fp)(void))
1853         {
1854         CERT *cert;
1855
1856         cert=ctx->cert;
1857
1858         switch (cmd)
1859                 {
1860 #ifndef OPENSSL_NO_RSA
1861         case SSL_CTRL_SET_TMP_RSA_CB:
1862                 {
1863                 cert->rsa_tmp_cb = (RSA *(*)(SSL *, int, int))fp;
1864                 }
1865                 break;
1866 #endif
1867 #ifndef OPENSSL_NO_DH
1868         case SSL_CTRL_SET_TMP_DH_CB:
1869                 {
1870                 cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))fp;
1871                 }
1872                 break;
1873 #endif
1874 #ifndef OPENSSL_NO_ECDH
1875         case SSL_CTRL_SET_TMP_ECDH_CB:
1876                 {
1877                 cert->ecdh_tmp_cb = (EC_KEY *(*)(SSL *, int, int))fp;
1878                 }
1879                 break;
1880 #endif
1881         default:
1882                 return(0);
1883                 }
1884         return(1);
1885         }
1886
1887 /* This function needs to check if the ciphers required are actually
1888  * available */
1889 SSL_CIPHER *ssl3_get_cipher_by_char(const unsigned char *p)
1890         {
1891         SSL_CIPHER c,*cp;
1892         unsigned long id;
1893
1894         id=0x03000000L|((unsigned long)p[0]<<8L)|(unsigned long)p[1];
1895         c.id=id;
1896         cp = (SSL_CIPHER *)OBJ_bsearch((char *)&c,
1897                 (char *)ssl3_ciphers,
1898                 SSL3_NUM_CIPHERS,sizeof(SSL_CIPHER),
1899                 FP_ICC ssl_cipher_id_cmp);
1900         if (cp == NULL || cp->valid == 0)
1901                 return NULL;
1902         else
1903                 return cp;
1904         }
1905
1906 int ssl3_put_cipher_by_char(const SSL_CIPHER *c, unsigned char *p)
1907         {
1908         long l;
1909
1910         if (p != NULL)
1911                 {
1912                 l=c->id;
1913                 if ((l & 0xff000000) != 0x03000000) return(0);
1914                 p[0]=((unsigned char)(l>> 8L))&0xFF;
1915                 p[1]=((unsigned char)(l     ))&0xFF;
1916                 }
1917         return(2);
1918         }
1919
1920 SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt,
1921              STACK_OF(SSL_CIPHER) *srvr)
1922         {
1923         SSL_CIPHER *c,*ret=NULL;
1924         STACK_OF(SSL_CIPHER) *prio, *allow;
1925         int i,j,ok;
1926         CERT *cert;
1927         unsigned long alg,mask,emask;
1928
1929         /* Let's see which ciphers we can support */
1930         cert=s->cert;
1931
1932 #if 0
1933         /* Do not set the compare functions, because this may lead to a
1934          * reordering by "id". We want to keep the original ordering.
1935          * We may pay a price in performance during sk_SSL_CIPHER_find(),
1936          * but would have to pay with the price of sk_SSL_CIPHER_dup().
1937          */
1938         sk_SSL_CIPHER_set_cmp_func(srvr, ssl_cipher_ptr_id_cmp);
1939         sk_SSL_CIPHER_set_cmp_func(clnt, ssl_cipher_ptr_id_cmp);
1940 #endif
1941
1942 #ifdef CIPHER_DEBUG
1943         printf("Server has %d from %p:\n", sk_SSL_CIPHER_num(srvr), srvr);
1944         for(i=0 ; i < sk_SSL_CIPHER_num(srvr) ; ++i)
1945             {
1946             c=sk_SSL_CIPHER_value(srvr,i);
1947             printf("%p:%s\n",c,c->name);
1948             }
1949         printf("Client sent %d from %p:\n", sk_SSL_CIPHER_num(clnt), clnt);
1950         for(i=0 ; i < sk_SSL_CIPHER_num(clnt) ; ++i)
1951             {
1952             c=sk_SSL_CIPHER_value(clnt,i);
1953             printf("%p:%s\n",c,c->name);
1954             }
1955 #endif
1956
1957         if (s->options & SSL_OP_CIPHER_SERVER_PREFERENCE)
1958             {
1959             prio = srvr;
1960             allow = clnt;
1961             }
1962         else
1963             {
1964             prio = clnt;
1965             allow = srvr;
1966             }
1967
1968         for (i=0; i<sk_SSL_CIPHER_num(prio); i++)
1969                 {
1970                 c=sk_SSL_CIPHER_value(prio,i);
1971
1972                 ssl_set_cert_masks(cert,c);
1973                 mask=cert->mask;
1974                 emask=cert->export_mask;
1975                         
1976 #ifdef KSSL_DEBUG
1977                 printf("ssl3_choose_cipher %d alg= %lx\n", i,c->algorithms);
1978 #endif    /* KSSL_DEBUG */
1979
1980                 alg=c->algorithms&(SSL_MKEY_MASK|SSL_AUTH_MASK);
1981 #ifndef OPENSSL_NO_KRB5
1982                 if (alg & SSL_KRB5) 
1983                         {
1984                         if ( !kssl_keytab_is_available(s->kssl_ctx) )
1985                             continue;
1986                         }
1987 #endif /* OPENSSL_NO_KRB5 */
1988                 if (SSL_C_IS_EXPORT(c))
1989                         {
1990                         ok=((alg & emask) == alg)?1:0;
1991 #ifdef CIPHER_DEBUG
1992                         printf("%d:[%08lX:%08lX]%p:%s (export)\n",ok,alg,emask,
1993                                c,c->name);
1994 #endif
1995                         }
1996                 else
1997                         {
1998                         ok=((alg & mask) == alg)?1:0;
1999 #ifdef CIPHER_DEBUG
2000                         printf("%d:[%08lX:%08lX]%p:%s\n",ok,alg,mask,c,
2001                                c->name);
2002 #endif
2003                         }
2004
2005                 if (!ok) continue;
2006                 j=sk_SSL_CIPHER_find(allow,c);
2007                 if (j >= 0)
2008                         {
2009                         ret=sk_SSL_CIPHER_value(allow,j);
2010                         break;
2011                         }
2012                 }
2013         return(ret);
2014         }
2015
2016 int ssl3_get_req_cert_type(SSL *s, unsigned char *p)
2017         {
2018         int ret=0;
2019         unsigned long alg;
2020
2021         alg=s->s3->tmp.new_cipher->algorithms;
2022
2023 #ifndef OPENSSL_NO_DH
2024         if (alg & (SSL_kDHr|SSL_kEDH))
2025                 {
2026 #  ifndef OPENSSL_NO_RSA
2027                 p[ret++]=SSL3_CT_RSA_FIXED_DH;
2028 #  endif
2029 #  ifndef OPENSSL_NO_DSA
2030                 p[ret++]=SSL3_CT_DSS_FIXED_DH;
2031 #  endif
2032                 }
2033         if ((s->version == SSL3_VERSION) &&
2034                 (alg & (SSL_kEDH|SSL_kDHd|SSL_kDHr)))
2035                 {
2036 #  ifndef OPENSSL_NO_RSA
2037                 p[ret++]=SSL3_CT_RSA_EPHEMERAL_DH;
2038 #  endif
2039 #  ifndef OPENSSL_NO_DSA
2040                 p[ret++]=SSL3_CT_DSS_EPHEMERAL_DH;
2041 #  endif
2042                 }
2043 #endif /* !OPENSSL_NO_DH */
2044 #ifndef OPENSSL_NO_RSA
2045         p[ret++]=SSL3_CT_RSA_SIGN;
2046 #endif
2047 #ifndef OPENSSL_NO_DSA
2048         p[ret++]=SSL3_CT_DSS_SIGN;
2049 #endif
2050 #ifndef OPENSSL_NO_ECDH
2051         /* We should ask for fixed ECDH certificates only
2052          * for SSL_kECDH (and not SSL_kECDHE)
2053          */
2054         if ((alg & SSL_kECDH) && (s->version >= TLS1_VERSION))
2055                 {
2056                 p[ret++]=TLS_CT_RSA_FIXED_ECDH;
2057                 p[ret++]=TLS_CT_ECDSA_FIXED_ECDH;
2058                 }
2059 #endif
2060
2061 #ifndef OPENSSL_NO_ECDSA
2062         /* ECDSA certs can be used with RSA cipher suites as well 
2063          * so we don't need to check for SSL_kECDH or SSL_kECDHE
2064          */
2065         if (s->version >= TLS1_VERSION)
2066                 {
2067                 p[ret++]=TLS_CT_ECDSA_SIGN;
2068                 }
2069 #endif  
2070         return(ret);
2071         }
2072
2073 int ssl3_shutdown(SSL *s)
2074         {
2075
2076         /* Don't do anything much if we have not done the handshake or
2077          * we don't want to send messages :-) */
2078         if ((s->quiet_shutdown) || (s->state == SSL_ST_BEFORE))
2079                 {
2080                 s->shutdown=(SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN);
2081                 return(1);
2082                 }
2083
2084         if (!(s->shutdown & SSL_SENT_SHUTDOWN))
2085                 {
2086                 s->shutdown|=SSL_SENT_SHUTDOWN;
2087 #if 1
2088                 ssl3_send_alert(s,SSL3_AL_WARNING,SSL_AD_CLOSE_NOTIFY);
2089 #endif
2090                 /* our shutdown alert has been sent now, and if it still needs
2091                  * to be written, s->s3->alert_dispatch will be true */
2092                 }
2093         else if (s->s3->alert_dispatch)
2094                 {
2095                 /* resend it if not sent */
2096 #if 1
2097                 s->method->ssl_dispatch_alert(s);
2098 #endif
2099                 }
2100         else if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN))
2101                 {
2102                 /* If we are waiting for a close from our peer, we are closed */
2103                 s->method->ssl_read_bytes(s,0,NULL,0,0);
2104                 }
2105
2106         if ((s->shutdown == (SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN)) &&
2107                 !s->s3->alert_dispatch)
2108                 return(1);
2109         else
2110                 return(0);
2111         }
2112
2113 int ssl3_write(SSL *s, const void *buf, int len)
2114         {
2115         int ret,n;
2116
2117 #if 0
2118         if (s->shutdown & SSL_SEND_SHUTDOWN)
2119                 {
2120                 s->rwstate=SSL_NOTHING;
2121                 return(0);
2122                 }
2123 #endif
2124         clear_sys_error();
2125         if (s->s3->renegotiate) ssl3_renegotiate_check(s);
2126
2127         /* This is an experimental flag that sends the
2128          * last handshake message in the same packet as the first
2129          * use data - used to see if it helps the TCP protocol during
2130          * session-id reuse */
2131         /* The second test is because the buffer may have been removed */
2132         if ((s->s3->flags & SSL3_FLAGS_POP_BUFFER) && (s->wbio == s->bbio))
2133                 {
2134                 /* First time through, we write into the buffer */
2135                 if (s->s3->delay_buf_pop_ret == 0)
2136                         {
2137                         ret=ssl3_write_bytes(s,SSL3_RT_APPLICATION_DATA,
2138                                              buf,len);
2139                         if (ret <= 0) return(ret);
2140
2141                         s->s3->delay_buf_pop_ret=ret;
2142                         }
2143
2144                 s->rwstate=SSL_WRITING;
2145                 n=BIO_flush(s->wbio);
2146                 if (n <= 0) return(n);
2147                 s->rwstate=SSL_NOTHING;
2148
2149                 /* We have flushed the buffer, so remove it */
2150                 ssl_free_wbio_buffer(s);
2151                 s->s3->flags&= ~SSL3_FLAGS_POP_BUFFER;
2152
2153                 ret=s->s3->delay_buf_pop_ret;
2154                 s->s3->delay_buf_pop_ret=0;
2155                 }
2156         else
2157                 {
2158                 ret=s->method->ssl_write_bytes(s,SSL3_RT_APPLICATION_DATA,
2159                         buf,len);
2160                 if (ret <= 0) return(ret);
2161                 }
2162
2163         return(ret);
2164         }
2165
2166 static int ssl3_read_internal(SSL *s, void *buf, int len, int peek)
2167         {
2168         int ret;
2169         
2170         clear_sys_error();
2171         if (s->s3->renegotiate) ssl3_renegotiate_check(s);
2172         s->s3->in_read_app_data=1;
2173         ret=s->method->ssl_read_bytes(s,SSL3_RT_APPLICATION_DATA,buf,len,peek);
2174         if ((ret == -1) && (s->s3->in_read_app_data == 2))
2175                 {
2176                 /* ssl3_read_bytes decided to call s->handshake_func, which
2177                  * called ssl3_read_bytes to read handshake data.
2178                  * However, ssl3_read_bytes actually found application data
2179                  * and thinks that application data makes sense here; so disable
2180                  * handshake processing and try to read application data again. */
2181                 s->in_handshake++;
2182                 ret=s->method->ssl_read_bytes(s,SSL3_RT_APPLICATION_DATA,buf,len,peek);
2183                 s->in_handshake--;
2184                 }
2185         else
2186                 s->s3->in_read_app_data=0;
2187
2188         return(ret);
2189         }
2190
2191 int ssl3_read(SSL *s, void *buf, int len)
2192         {
2193         return ssl3_read_internal(s, buf, len, 0);
2194         }
2195
2196 int ssl3_peek(SSL *s, void *buf, int len)
2197         {
2198         return ssl3_read_internal(s, buf, len, 1);
2199         }
2200
2201 int ssl3_renegotiate(SSL *s)
2202         {
2203         if (s->handshake_func == NULL)
2204                 return(1);
2205
2206         if (s->s3->flags & SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS)
2207                 return(0);
2208
2209         s->s3->renegotiate=1;
2210         return(1);
2211         }
2212
2213 int ssl3_renegotiate_check(SSL *s)
2214         {
2215         int ret=0;
2216
2217         if (s->s3->renegotiate)
2218                 {
2219                 if (    (s->s3->rbuf.left == 0) &&
2220                         (s->s3->wbuf.left == 0) &&
2221                         !SSL_in_init(s))
2222                         {
2223 /*
2224 if we are the server, and we have sent a 'RENEGOTIATE' message, we
2225 need to go to SSL_ST_ACCEPT.
2226 */
2227                         /* SSL_ST_ACCEPT */
2228                         s->state=SSL_ST_RENEGOTIATE;
2229                         s->s3->renegotiate=0;
2230                         s->s3->num_renegotiations++;
2231                         s->s3->total_renegotiations++;
2232                         ret=1;
2233                         }
2234                 }
2235         return(ret);
2236         }
2237