diff options
| author | jsing <> | 2014-07-12 22:33:39 +0000 |
|---|---|---|
| committer | jsing <> | 2014-07-12 22:33:39 +0000 |
| commit | a5fd5047b3335510b9ae8ea0b02073c33c7a8f72 (patch) | |
| tree | ac193b1a184864cbde82877d05b433080052c5d1 | |
| parent | e0fe7621bce09dd6ba62ddb9889bc82d64e677f7 (diff) | |
| download | openbsd-a5fd5047b3335510b9ae8ea0b02073c33c7a8f72.tar.gz openbsd-a5fd5047b3335510b9ae8ea0b02073c33c7a8f72.tar.bz2 openbsd-a5fd5047b3335510b9ae8ea0b02073c33c7a8f72.zip | |
The correct name for EDH is DHE, likewise EECDH should be ECDHE.
Based on changes to OpenSSL trunk.
ok beck@ miod@
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libssl/d1_clnt.c | 6 | ||||
| -rw-r--r-- | src/lib/libssl/d1_srvr.c | 12 | ||||
| -rw-r--r-- | src/lib/libssl/s3_clnt.c | 12 | ||||
| -rw-r--r-- | src/lib/libssl/s3_lib.c | 134 | ||||
| -rw-r--r-- | src/lib/libssl/s3_srvr.c | 18 | ||||
| -rw-r--r-- | src/lib/libssl/src/ssl/d1_clnt.c | 6 | ||||
| -rw-r--r-- | src/lib/libssl/src/ssl/d1_srvr.c | 12 | ||||
| -rw-r--r-- | src/lib/libssl/src/ssl/s3_clnt.c | 12 | ||||
| -rw-r--r-- | src/lib/libssl/src/ssl/s3_lib.c | 134 | ||||
| -rw-r--r-- | src/lib/libssl/src/ssl/s3_srvr.c | 18 | ||||
| -rw-r--r-- | src/lib/libssl/src/ssl/ssl_ciph.c | 28 | ||||
| -rw-r--r-- | src/lib/libssl/src/ssl/ssl_lib.c | 10 | ||||
| -rw-r--r-- | src/lib/libssl/src/ssl/ssl_locl.h | 8 | ||||
| -rw-r--r-- | src/lib/libssl/src/ssl/t1_lib.c | 8 | ||||
| -rw-r--r-- | src/lib/libssl/ssl_ciph.c | 28 | ||||
| -rw-r--r-- | src/lib/libssl/ssl_lib.c | 10 | ||||
| -rw-r--r-- | src/lib/libssl/ssl_locl.h | 8 | ||||
| -rw-r--r-- | src/lib/libssl/t1_lib.c | 8 |
18 files changed, 236 insertions, 236 deletions
diff --git a/src/lib/libssl/d1_clnt.c b/src/lib/libssl/d1_clnt.c index 004fd6e04f..552667f6c1 100644 --- a/src/lib/libssl/d1_clnt.c +++ b/src/lib/libssl/d1_clnt.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: d1_clnt.c,v 1.30 2014/07/12 13:11:53 jsing Exp $ */ | 1 | /* $OpenBSD: d1_clnt.c,v 1.31 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * DTLS implementation written by Nagendra Modadugu | 3 | * DTLS implementation written by Nagendra Modadugu |
| 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. | 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. |
| @@ -984,7 +984,7 @@ dtls1_send_client_key_exchange(SSL *s) | |||
| 984 | s->session->master_key, | 984 | s->session->master_key, |
| 985 | tmp_buf, sizeof tmp_buf); | 985 | tmp_buf, sizeof tmp_buf); |
| 986 | OPENSSL_cleanse(tmp_buf, sizeof tmp_buf); | 986 | OPENSSL_cleanse(tmp_buf, sizeof tmp_buf); |
| 987 | } else if (alg_k & (SSL_kEDH|SSL_kDHr|SSL_kDHd)) { | 987 | } else if (alg_k & (SSL_kDHE|SSL_kDHr|SSL_kDHd)) { |
| 988 | DH *dh_srvr, *dh_clnt; | 988 | DH *dh_srvr, *dh_clnt; |
| 989 | 989 | ||
| 990 | if (s->session->sess_cert->peer_dh_tmp != NULL) | 990 | if (s->session->sess_cert->peer_dh_tmp != NULL) |
| @@ -1037,7 +1037,7 @@ dtls1_send_client_key_exchange(SSL *s) | |||
| 1037 | DH_free(dh_clnt); | 1037 | DH_free(dh_clnt); |
| 1038 | 1038 | ||
| 1039 | /* perhaps clean things up a bit EAY EAY EAY EAY*/ | 1039 | /* perhaps clean things up a bit EAY EAY EAY EAY*/ |
| 1040 | } else if (alg_k & (SSL_kEECDH|SSL_kECDHr|SSL_kECDHe)) { | 1040 | } else if (alg_k & (SSL_kECDHE|SSL_kECDHr|SSL_kECDHe)) { |
| 1041 | const EC_GROUP *srvr_group = NULL; | 1041 | const EC_GROUP *srvr_group = NULL; |
| 1042 | EC_KEY *tkey; | 1042 | EC_KEY *tkey; |
| 1043 | int ecdh_clnt_cert = 0; | 1043 | int ecdh_clnt_cert = 0; |
diff --git a/src/lib/libssl/d1_srvr.c b/src/lib/libssl/d1_srvr.c index a94b7ed61b..ecf4a198b1 100644 --- a/src/lib/libssl/d1_srvr.c +++ b/src/lib/libssl/d1_srvr.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: d1_srvr.c,v 1.32 2014/07/12 13:11:53 jsing Exp $ */ | 1 | /* $OpenBSD: d1_srvr.c,v 1.33 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * DTLS implementation written by Nagendra Modadugu | 3 | * DTLS implementation written by Nagendra Modadugu |
| 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. | 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. |
| @@ -464,8 +464,8 @@ dtls1_accept(SSL *s) | |||
| 464 | /* only send if a DH key exchange or | 464 | /* only send if a DH key exchange or |
| 465 | * RSA but we have a sign only certificate */ | 465 | * RSA but we have a sign only certificate */ |
| 466 | if (s->s3->tmp.use_rsa_tmp | 466 | if (s->s3->tmp.use_rsa_tmp |
| 467 | || (alg_k & (SSL_kEDH|SSL_kDHr|SSL_kDHd)) | 467 | || (alg_k & (SSL_kDHE|SSL_kDHr|SSL_kDHd)) |
| 468 | || (alg_k & SSL_kEECDH) | 468 | || (alg_k & SSL_kECDHE) |
| 469 | || ((alg_k & SSL_kRSA) | 469 | || ((alg_k & SSL_kRSA) |
| 470 | && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL | 470 | && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL |
| 471 | ) | 471 | ) |
| @@ -1052,7 +1052,7 @@ dtls1_send_server_key_exchange(SSL *s) | |||
| 1052 | r[1] = rsa->e; | 1052 | r[1] = rsa->e; |
| 1053 | s->s3->tmp.use_rsa_tmp = 1; | 1053 | s->s3->tmp.use_rsa_tmp = 1; |
| 1054 | } else | 1054 | } else |
| 1055 | if (type & SSL_kEDH) { | 1055 | if (type & SSL_kDHE) { |
| 1056 | dhp = cert->dh_tmp; | 1056 | dhp = cert->dh_tmp; |
| 1057 | if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL)) | 1057 | if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL)) |
| 1058 | dhp = s->cert->dh_tmp_cb(s, 0, 0); | 1058 | dhp = s->cert->dh_tmp_cb(s, 0, 0); |
| @@ -1094,7 +1094,7 @@ dtls1_send_server_key_exchange(SSL *s) | |||
| 1094 | r[1] = dh->g; | 1094 | r[1] = dh->g; |
| 1095 | r[2] = dh->pub_key; | 1095 | r[2] = dh->pub_key; |
| 1096 | } else | 1096 | } else |
| 1097 | if (type & SSL_kEECDH) { | 1097 | if (type & SSL_kECDHE) { |
| 1098 | const EC_GROUP *group; | 1098 | const EC_GROUP *group; |
| 1099 | 1099 | ||
| 1100 | ecdhp = cert->ecdh_tmp; | 1100 | ecdhp = cert->ecdh_tmp; |
| @@ -1232,7 +1232,7 @@ dtls1_send_server_key_exchange(SSL *s) | |||
| 1232 | p += nr[i]; | 1232 | p += nr[i]; |
| 1233 | } | 1233 | } |
| 1234 | 1234 | ||
| 1235 | if (type & SSL_kEECDH) { | 1235 | if (type & SSL_kECDHE) { |
| 1236 | /* XXX: For now, we only support named (not generic) curves. | 1236 | /* XXX: For now, we only support named (not generic) curves. |
| 1237 | * In this situation, the serverKeyExchange message has: | 1237 | * In this situation, the serverKeyExchange message has: |
| 1238 | * [1 byte CurveType], [2 byte CurveName] | 1238 | * [1 byte CurveType], [2 byte CurveName] |
diff --git a/src/lib/libssl/s3_clnt.c b/src/lib/libssl/s3_clnt.c index 252100f587..b55b2e62c6 100644 --- a/src/lib/libssl/s3_clnt.c +++ b/src/lib/libssl/s3_clnt.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s3_clnt.c,v 1.82 2014/07/12 22:17:59 jsg Exp $ */ | 1 | /* $OpenBSD: s3_clnt.c,v 1.83 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -1253,7 +1253,7 @@ ssl3_get_key_exchange(SSL *s) | |||
| 1253 | } | 1253 | } |
| 1254 | s->session->sess_cert->peer_rsa_tmp = rsa; | 1254 | s->session->sess_cert->peer_rsa_tmp = rsa; |
| 1255 | rsa = NULL; | 1255 | rsa = NULL; |
| 1256 | } else if (alg_k & SSL_kEDH) { | 1256 | } else if (alg_k & SSL_kDHE) { |
| 1257 | if ((dh = DH_new()) == NULL) { | 1257 | if ((dh = DH_new()) == NULL) { |
| 1258 | SSLerr(SSL_F_SSL3_GET_KEY_EXCHANGE, | 1258 | SSLerr(SSL_F_SSL3_GET_KEY_EXCHANGE, |
| 1259 | ERR_R_DH_LIB); | 1259 | ERR_R_DH_LIB); |
| @@ -1328,7 +1328,7 @@ ssl3_get_key_exchange(SSL *s) | |||
| 1328 | SSLerr(SSL_F_SSL3_GET_KEY_EXCHANGE, | 1328 | SSLerr(SSL_F_SSL3_GET_KEY_EXCHANGE, |
| 1329 | SSL_R_TRIED_TO_USE_UNSUPPORTED_CIPHER); | 1329 | SSL_R_TRIED_TO_USE_UNSUPPORTED_CIPHER); |
| 1330 | goto f_err; | 1330 | goto f_err; |
| 1331 | } else if (alg_k & SSL_kEECDH) { | 1331 | } else if (alg_k & SSL_kECDHE) { |
| 1332 | EC_GROUP *ngroup; | 1332 | EC_GROUP *ngroup; |
| 1333 | const EC_GROUP *group; | 1333 | const EC_GROUP *group; |
| 1334 | 1334 | ||
| @@ -1987,7 +1987,7 @@ ssl3_send_client_key_exchange(SSL *s) | |||
| 1987 | s->method->ssl3_enc->generate_master_secret( | 1987 | s->method->ssl3_enc->generate_master_secret( |
| 1988 | s, s->session->master_key, tmp_buf, sizeof tmp_buf); | 1988 | s, s->session->master_key, tmp_buf, sizeof tmp_buf); |
| 1989 | OPENSSL_cleanse(tmp_buf, sizeof tmp_buf); | 1989 | OPENSSL_cleanse(tmp_buf, sizeof tmp_buf); |
| 1990 | } else if (alg_k & (SSL_kEDH|SSL_kDHr|SSL_kDHd)) { | 1990 | } else if (alg_k & (SSL_kDHE|SSL_kDHr|SSL_kDHd)) { |
| 1991 | DH *dh_srvr, *dh_clnt; | 1991 | DH *dh_srvr, *dh_clnt; |
| 1992 | 1992 | ||
| 1993 | if (s->session->sess_cert == NULL) { | 1993 | if (s->session->sess_cert == NULL) { |
| @@ -2051,7 +2051,7 @@ ssl3_send_client_key_exchange(SSL *s) | |||
| 2051 | DH_free(dh_clnt); | 2051 | DH_free(dh_clnt); |
| 2052 | 2052 | ||
| 2053 | /* perhaps clean things up a bit EAY EAY EAY EAY*/ | 2053 | /* perhaps clean things up a bit EAY EAY EAY EAY*/ |
| 2054 | } else if (alg_k & (SSL_kEECDH|SSL_kECDHr|SSL_kECDHe)) { | 2054 | } else if (alg_k & (SSL_kECDHE|SSL_kECDHr|SSL_kECDHe)) { |
| 2055 | const EC_GROUP *srvr_group = NULL; | 2055 | const EC_GROUP *srvr_group = NULL; |
| 2056 | EC_KEY *tkey; | 2056 | EC_KEY *tkey; |
| 2057 | int ecdh_clnt_cert = 0; | 2057 | int ecdh_clnt_cert = 0; |
| @@ -2640,7 +2640,7 @@ ssl3_check_cert_and_algorithm(SSL *s) | |||
| 2640 | SSL_R_MISSING_RSA_ENCRYPTING_CERT); | 2640 | SSL_R_MISSING_RSA_ENCRYPTING_CERT); |
| 2641 | goto f_err; | 2641 | goto f_err; |
| 2642 | } | 2642 | } |
| 2643 | if ((alg_k & SSL_kEDH) && | 2643 | if ((alg_k & SSL_kDHE) && |
| 2644 | !(has_bits(i, EVP_PK_DH|EVP_PKT_EXCH) || (dh != NULL))) { | 2644 | !(has_bits(i, EVP_PK_DH|EVP_PKT_EXCH) || (dh != NULL))) { |
| 2645 | SSLerr(SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM, | 2645 | SSLerr(SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM, |
| 2646 | SSL_R_MISSING_DH_KEY); | 2646 | SSL_R_MISSING_DH_KEY); |
diff --git a/src/lib/libssl/s3_lib.c b/src/lib/libssl/s3_lib.c index f94e207fc4..decdda90a3 100644 --- a/src/lib/libssl/s3_lib.c +++ b/src/lib/libssl/s3_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s3_lib.c,v 1.69 2014/07/11 09:24:44 beck Exp $ */ | 1 | /* $OpenBSD: s3_lib.c,v 1.70 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -433,7 +433,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 433 | .valid = 0, /* Weakened 40-bit export cipher. */ | 433 | .valid = 0, /* Weakened 40-bit export cipher. */ |
| 434 | .name = SSL3_TXT_EDH_DSS_DES_40_CBC_SHA, | 434 | .name = SSL3_TXT_EDH_DSS_DES_40_CBC_SHA, |
| 435 | .id = SSL3_CK_EDH_DSS_DES_40_CBC_SHA, | 435 | .id = SSL3_CK_EDH_DSS_DES_40_CBC_SHA, |
| 436 | .algorithm_mkey = SSL_kEDH, | 436 | .algorithm_mkey = SSL_kDHE, |
| 437 | .algorithm_auth = SSL_aDSS, | 437 | .algorithm_auth = SSL_aDSS, |
| 438 | .algorithm_enc = SSL_DES, | 438 | .algorithm_enc = SSL_DES, |
| 439 | .algorithm_mac = SSL_SHA1, | 439 | .algorithm_mac = SSL_SHA1, |
| @@ -449,7 +449,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 449 | .valid = 1, | 449 | .valid = 1, |
| 450 | .name = SSL3_TXT_EDH_DSS_DES_64_CBC_SHA, | 450 | .name = SSL3_TXT_EDH_DSS_DES_64_CBC_SHA, |
| 451 | .id = SSL3_CK_EDH_DSS_DES_64_CBC_SHA, | 451 | .id = SSL3_CK_EDH_DSS_DES_64_CBC_SHA, |
| 452 | .algorithm_mkey = SSL_kEDH, | 452 | .algorithm_mkey = SSL_kDHE, |
| 453 | .algorithm_auth = SSL_aDSS, | 453 | .algorithm_auth = SSL_aDSS, |
| 454 | .algorithm_enc = SSL_DES, | 454 | .algorithm_enc = SSL_DES, |
| 455 | .algorithm_mac = SSL_SHA1, | 455 | .algorithm_mac = SSL_SHA1, |
| @@ -465,7 +465,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 465 | .valid = 1, | 465 | .valid = 1, |
| 466 | .name = SSL3_TXT_EDH_DSS_DES_192_CBC3_SHA, | 466 | .name = SSL3_TXT_EDH_DSS_DES_192_CBC3_SHA, |
| 467 | .id = SSL3_CK_EDH_DSS_DES_192_CBC3_SHA, | 467 | .id = SSL3_CK_EDH_DSS_DES_192_CBC3_SHA, |
| 468 | .algorithm_mkey = SSL_kEDH, | 468 | .algorithm_mkey = SSL_kDHE, |
| 469 | .algorithm_auth = SSL_aDSS, | 469 | .algorithm_auth = SSL_aDSS, |
| 470 | .algorithm_enc = SSL_3DES, | 470 | .algorithm_enc = SSL_3DES, |
| 471 | .algorithm_mac = SSL_SHA1, | 471 | .algorithm_mac = SSL_SHA1, |
| @@ -481,7 +481,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 481 | .valid = 0, /* Weakened 40-bit export cipher. */ | 481 | .valid = 0, /* Weakened 40-bit export cipher. */ |
| 482 | .name = SSL3_TXT_EDH_RSA_DES_40_CBC_SHA, | 482 | .name = SSL3_TXT_EDH_RSA_DES_40_CBC_SHA, |
| 483 | .id = SSL3_CK_EDH_RSA_DES_40_CBC_SHA, | 483 | .id = SSL3_CK_EDH_RSA_DES_40_CBC_SHA, |
| 484 | .algorithm_mkey = SSL_kEDH, | 484 | .algorithm_mkey = SSL_kDHE, |
| 485 | .algorithm_auth = SSL_aRSA, | 485 | .algorithm_auth = SSL_aRSA, |
| 486 | .algorithm_enc = SSL_DES, | 486 | .algorithm_enc = SSL_DES, |
| 487 | .algorithm_mac = SSL_SHA1, | 487 | .algorithm_mac = SSL_SHA1, |
| @@ -497,7 +497,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 497 | .valid = 1, | 497 | .valid = 1, |
| 498 | .name = SSL3_TXT_EDH_RSA_DES_64_CBC_SHA, | 498 | .name = SSL3_TXT_EDH_RSA_DES_64_CBC_SHA, |
| 499 | .id = SSL3_CK_EDH_RSA_DES_64_CBC_SHA, | 499 | .id = SSL3_CK_EDH_RSA_DES_64_CBC_SHA, |
| 500 | .algorithm_mkey = SSL_kEDH, | 500 | .algorithm_mkey = SSL_kDHE, |
| 501 | .algorithm_auth = SSL_aRSA, | 501 | .algorithm_auth = SSL_aRSA, |
| 502 | .algorithm_enc = SSL_DES, | 502 | .algorithm_enc = SSL_DES, |
| 503 | .algorithm_mac = SSL_SHA1, | 503 | .algorithm_mac = SSL_SHA1, |
| @@ -513,7 +513,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 513 | .valid = 1, | 513 | .valid = 1, |
| 514 | .name = SSL3_TXT_EDH_RSA_DES_192_CBC3_SHA, | 514 | .name = SSL3_TXT_EDH_RSA_DES_192_CBC3_SHA, |
| 515 | .id = SSL3_CK_EDH_RSA_DES_192_CBC3_SHA, | 515 | .id = SSL3_CK_EDH_RSA_DES_192_CBC3_SHA, |
| 516 | .algorithm_mkey = SSL_kEDH, | 516 | .algorithm_mkey = SSL_kDHE, |
| 517 | .algorithm_auth = SSL_aRSA, | 517 | .algorithm_auth = SSL_aRSA, |
| 518 | .algorithm_enc = SSL_3DES, | 518 | .algorithm_enc = SSL_3DES, |
| 519 | .algorithm_mac = SSL_SHA1, | 519 | .algorithm_mac = SSL_SHA1, |
| @@ -529,7 +529,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 529 | .valid = 0, /* Weakened 40-bit export cipher. */ | 529 | .valid = 0, /* Weakened 40-bit export cipher. */ |
| 530 | .name = SSL3_TXT_ADH_RC4_40_MD5, | 530 | .name = SSL3_TXT_ADH_RC4_40_MD5, |
| 531 | .id = SSL3_CK_ADH_RC4_40_MD5, | 531 | .id = SSL3_CK_ADH_RC4_40_MD5, |
| 532 | .algorithm_mkey = SSL_kEDH, | 532 | .algorithm_mkey = SSL_kDHE, |
| 533 | .algorithm_auth = SSL_aNULL, | 533 | .algorithm_auth = SSL_aNULL, |
| 534 | .algorithm_enc = SSL_RC4, | 534 | .algorithm_enc = SSL_RC4, |
| 535 | .algorithm_mac = SSL_MD5, | 535 | .algorithm_mac = SSL_MD5, |
| @@ -545,7 +545,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 545 | .valid = 1, | 545 | .valid = 1, |
| 546 | .name = SSL3_TXT_ADH_RC4_128_MD5, | 546 | .name = SSL3_TXT_ADH_RC4_128_MD5, |
| 547 | .id = SSL3_CK_ADH_RC4_128_MD5, | 547 | .id = SSL3_CK_ADH_RC4_128_MD5, |
| 548 | .algorithm_mkey = SSL_kEDH, | 548 | .algorithm_mkey = SSL_kDHE, |
| 549 | .algorithm_auth = SSL_aNULL, | 549 | .algorithm_auth = SSL_aNULL, |
| 550 | .algorithm_enc = SSL_RC4, | 550 | .algorithm_enc = SSL_RC4, |
| 551 | .algorithm_mac = SSL_MD5, | 551 | .algorithm_mac = SSL_MD5, |
| @@ -561,7 +561,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 561 | .valid = 0, /* Weakened 40-bit export cipher. */ | 561 | .valid = 0, /* Weakened 40-bit export cipher. */ |
| 562 | .name = SSL3_TXT_ADH_DES_40_CBC_SHA, | 562 | .name = SSL3_TXT_ADH_DES_40_CBC_SHA, |
| 563 | .id = SSL3_CK_ADH_DES_40_CBC_SHA, | 563 | .id = SSL3_CK_ADH_DES_40_CBC_SHA, |
| 564 | .algorithm_mkey = SSL_kEDH, | 564 | .algorithm_mkey = SSL_kDHE, |
| 565 | .algorithm_auth = SSL_aNULL, | 565 | .algorithm_auth = SSL_aNULL, |
| 566 | .algorithm_enc = SSL_DES, | 566 | .algorithm_enc = SSL_DES, |
| 567 | .algorithm_mac = SSL_SHA1, | 567 | .algorithm_mac = SSL_SHA1, |
| @@ -577,7 +577,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 577 | .valid = 1, | 577 | .valid = 1, |
| 578 | .name = SSL3_TXT_ADH_DES_64_CBC_SHA, | 578 | .name = SSL3_TXT_ADH_DES_64_CBC_SHA, |
| 579 | .id = SSL3_CK_ADH_DES_64_CBC_SHA, | 579 | .id = SSL3_CK_ADH_DES_64_CBC_SHA, |
| 580 | .algorithm_mkey = SSL_kEDH, | 580 | .algorithm_mkey = SSL_kDHE, |
| 581 | .algorithm_auth = SSL_aNULL, | 581 | .algorithm_auth = SSL_aNULL, |
| 582 | .algorithm_enc = SSL_DES, | 582 | .algorithm_enc = SSL_DES, |
| 583 | .algorithm_mac = SSL_SHA1, | 583 | .algorithm_mac = SSL_SHA1, |
| @@ -593,7 +593,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 593 | .valid = 1, | 593 | .valid = 1, |
| 594 | .name = SSL3_TXT_ADH_DES_192_CBC_SHA, | 594 | .name = SSL3_TXT_ADH_DES_192_CBC_SHA, |
| 595 | .id = SSL3_CK_ADH_DES_192_CBC_SHA, | 595 | .id = SSL3_CK_ADH_DES_192_CBC_SHA, |
| 596 | .algorithm_mkey = SSL_kEDH, | 596 | .algorithm_mkey = SSL_kDHE, |
| 597 | .algorithm_auth = SSL_aNULL, | 597 | .algorithm_auth = SSL_aNULL, |
| 598 | .algorithm_enc = SSL_3DES, | 598 | .algorithm_enc = SSL_3DES, |
| 599 | .algorithm_mac = SSL_SHA1, | 599 | .algorithm_mac = SSL_SHA1, |
| @@ -655,7 +655,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 655 | .valid = 1, | 655 | .valid = 1, |
| 656 | .name = TLS1_TXT_DHE_DSS_WITH_AES_128_SHA, | 656 | .name = TLS1_TXT_DHE_DSS_WITH_AES_128_SHA, |
| 657 | .id = TLS1_CK_DHE_DSS_WITH_AES_128_SHA, | 657 | .id = TLS1_CK_DHE_DSS_WITH_AES_128_SHA, |
| 658 | .algorithm_mkey = SSL_kEDH, | 658 | .algorithm_mkey = SSL_kDHE, |
| 659 | .algorithm_auth = SSL_aDSS, | 659 | .algorithm_auth = SSL_aDSS, |
| 660 | .algorithm_enc = SSL_AES128, | 660 | .algorithm_enc = SSL_AES128, |
| 661 | .algorithm_mac = SSL_SHA1, | 661 | .algorithm_mac = SSL_SHA1, |
| @@ -670,7 +670,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 670 | .valid = 1, | 670 | .valid = 1, |
| 671 | .name = TLS1_TXT_DHE_RSA_WITH_AES_128_SHA, | 671 | .name = TLS1_TXT_DHE_RSA_WITH_AES_128_SHA, |
| 672 | .id = TLS1_CK_DHE_RSA_WITH_AES_128_SHA, | 672 | .id = TLS1_CK_DHE_RSA_WITH_AES_128_SHA, |
| 673 | .algorithm_mkey = SSL_kEDH, | 673 | .algorithm_mkey = SSL_kDHE, |
| 674 | .algorithm_auth = SSL_aRSA, | 674 | .algorithm_auth = SSL_aRSA, |
| 675 | .algorithm_enc = SSL_AES128, | 675 | .algorithm_enc = SSL_AES128, |
| 676 | .algorithm_mac = SSL_SHA1, | 676 | .algorithm_mac = SSL_SHA1, |
| @@ -685,7 +685,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 685 | .valid = 1, | 685 | .valid = 1, |
| 686 | .name = TLS1_TXT_ADH_WITH_AES_128_SHA, | 686 | .name = TLS1_TXT_ADH_WITH_AES_128_SHA, |
| 687 | .id = TLS1_CK_ADH_WITH_AES_128_SHA, | 687 | .id = TLS1_CK_ADH_WITH_AES_128_SHA, |
| 688 | .algorithm_mkey = SSL_kEDH, | 688 | .algorithm_mkey = SSL_kDHE, |
| 689 | .algorithm_auth = SSL_aNULL, | 689 | .algorithm_auth = SSL_aNULL, |
| 690 | .algorithm_enc = SSL_AES128, | 690 | .algorithm_enc = SSL_AES128, |
| 691 | .algorithm_mac = SSL_SHA1, | 691 | .algorithm_mac = SSL_SHA1, |
| @@ -748,7 +748,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 748 | .valid = 1, | 748 | .valid = 1, |
| 749 | .name = TLS1_TXT_DHE_DSS_WITH_AES_256_SHA, | 749 | .name = TLS1_TXT_DHE_DSS_WITH_AES_256_SHA, |
| 750 | .id = TLS1_CK_DHE_DSS_WITH_AES_256_SHA, | 750 | .id = TLS1_CK_DHE_DSS_WITH_AES_256_SHA, |
| 751 | .algorithm_mkey = SSL_kEDH, | 751 | .algorithm_mkey = SSL_kDHE, |
| 752 | .algorithm_auth = SSL_aDSS, | 752 | .algorithm_auth = SSL_aDSS, |
| 753 | .algorithm_enc = SSL_AES256, | 753 | .algorithm_enc = SSL_AES256, |
| 754 | .algorithm_mac = SSL_SHA1, | 754 | .algorithm_mac = SSL_SHA1, |
| @@ -764,7 +764,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 764 | .valid = 1, | 764 | .valid = 1, |
| 765 | .name = TLS1_TXT_DHE_RSA_WITH_AES_256_SHA, | 765 | .name = TLS1_TXT_DHE_RSA_WITH_AES_256_SHA, |
| 766 | .id = TLS1_CK_DHE_RSA_WITH_AES_256_SHA, | 766 | .id = TLS1_CK_DHE_RSA_WITH_AES_256_SHA, |
| 767 | .algorithm_mkey = SSL_kEDH, | 767 | .algorithm_mkey = SSL_kDHE, |
| 768 | .algorithm_auth = SSL_aRSA, | 768 | .algorithm_auth = SSL_aRSA, |
| 769 | .algorithm_enc = SSL_AES256, | 769 | .algorithm_enc = SSL_AES256, |
| 770 | .algorithm_mac = SSL_SHA1, | 770 | .algorithm_mac = SSL_SHA1, |
| @@ -780,7 +780,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 780 | .valid = 1, | 780 | .valid = 1, |
| 781 | .name = TLS1_TXT_ADH_WITH_AES_256_SHA, | 781 | .name = TLS1_TXT_ADH_WITH_AES_256_SHA, |
| 782 | .id = TLS1_CK_ADH_WITH_AES_256_SHA, | 782 | .id = TLS1_CK_ADH_WITH_AES_256_SHA, |
| 783 | .algorithm_mkey = SSL_kEDH, | 783 | .algorithm_mkey = SSL_kDHE, |
| 784 | .algorithm_auth = SSL_aNULL, | 784 | .algorithm_auth = SSL_aNULL, |
| 785 | .algorithm_enc = SSL_AES256, | 785 | .algorithm_enc = SSL_AES256, |
| 786 | .algorithm_mac = SSL_SHA1, | 786 | .algorithm_mac = SSL_SHA1, |
| @@ -877,7 +877,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 877 | .valid = 1, | 877 | .valid = 1, |
| 878 | .name = TLS1_TXT_DHE_DSS_WITH_AES_128_SHA256, | 878 | .name = TLS1_TXT_DHE_DSS_WITH_AES_128_SHA256, |
| 879 | .id = TLS1_CK_DHE_DSS_WITH_AES_128_SHA256, | 879 | .id = TLS1_CK_DHE_DSS_WITH_AES_128_SHA256, |
| 880 | .algorithm_mkey = SSL_kEDH, | 880 | .algorithm_mkey = SSL_kDHE, |
| 881 | .algorithm_auth = SSL_aDSS, | 881 | .algorithm_auth = SSL_aDSS, |
| 882 | .algorithm_enc = SSL_AES128, | 882 | .algorithm_enc = SSL_AES128, |
| 883 | .algorithm_mac = SSL_SHA256, | 883 | .algorithm_mac = SSL_SHA256, |
| @@ -944,7 +944,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 944 | .valid = 1, | 944 | .valid = 1, |
| 945 | .name = TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, | 945 | .name = TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, |
| 946 | .id = TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, | 946 | .id = TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, |
| 947 | .algorithm_mkey = SSL_kEDH, | 947 | .algorithm_mkey = SSL_kDHE, |
| 948 | .algorithm_auth = SSL_aDSS, | 948 | .algorithm_auth = SSL_aDSS, |
| 949 | .algorithm_enc = SSL_CAMELLIA128, | 949 | .algorithm_enc = SSL_CAMELLIA128, |
| 950 | .algorithm_mac = SSL_SHA1, | 950 | .algorithm_mac = SSL_SHA1, |
| @@ -960,7 +960,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 960 | .valid = 1, | 960 | .valid = 1, |
| 961 | .name = TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, | 961 | .name = TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, |
| 962 | .id = TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, | 962 | .id = TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, |
| 963 | .algorithm_mkey = SSL_kEDH, | 963 | .algorithm_mkey = SSL_kDHE, |
| 964 | .algorithm_auth = SSL_aRSA, | 964 | .algorithm_auth = SSL_aRSA, |
| 965 | .algorithm_enc = SSL_CAMELLIA128, | 965 | .algorithm_enc = SSL_CAMELLIA128, |
| 966 | .algorithm_mac = SSL_SHA1, | 966 | .algorithm_mac = SSL_SHA1, |
| @@ -976,7 +976,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 976 | .valid = 1, | 976 | .valid = 1, |
| 977 | .name = TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA, | 977 | .name = TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA, |
| 978 | .id = TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA, | 978 | .id = TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA, |
| 979 | .algorithm_mkey = SSL_kEDH, | 979 | .algorithm_mkey = SSL_kDHE, |
| 980 | .algorithm_auth = SSL_aNULL, | 980 | .algorithm_auth = SSL_aNULL, |
| 981 | .algorithm_enc = SSL_CAMELLIA128, | 981 | .algorithm_enc = SSL_CAMELLIA128, |
| 982 | .algorithm_mac = SSL_SHA1, | 982 | .algorithm_mac = SSL_SHA1, |
| @@ -994,7 +994,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 994 | .valid = 1, | 994 | .valid = 1, |
| 995 | .name = TLS1_TXT_DHE_RSA_WITH_AES_128_SHA256, | 995 | .name = TLS1_TXT_DHE_RSA_WITH_AES_128_SHA256, |
| 996 | .id = TLS1_CK_DHE_RSA_WITH_AES_128_SHA256, | 996 | .id = TLS1_CK_DHE_RSA_WITH_AES_128_SHA256, |
| 997 | .algorithm_mkey = SSL_kEDH, | 997 | .algorithm_mkey = SSL_kDHE, |
| 998 | .algorithm_auth = SSL_aRSA, | 998 | .algorithm_auth = SSL_aRSA, |
| 999 | .algorithm_enc = SSL_AES128, | 999 | .algorithm_enc = SSL_AES128, |
| 1000 | .algorithm_mac = SSL_SHA256, | 1000 | .algorithm_mac = SSL_SHA256, |
| @@ -1042,7 +1042,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1042 | .valid = 1, | 1042 | .valid = 1, |
| 1043 | .name = TLS1_TXT_DHE_DSS_WITH_AES_256_SHA256, | 1043 | .name = TLS1_TXT_DHE_DSS_WITH_AES_256_SHA256, |
| 1044 | .id = TLS1_CK_DHE_DSS_WITH_AES_256_SHA256, | 1044 | .id = TLS1_CK_DHE_DSS_WITH_AES_256_SHA256, |
| 1045 | .algorithm_mkey = SSL_kEDH, | 1045 | .algorithm_mkey = SSL_kDHE, |
| 1046 | .algorithm_auth = SSL_aDSS, | 1046 | .algorithm_auth = SSL_aDSS, |
| 1047 | .algorithm_enc = SSL_AES256, | 1047 | .algorithm_enc = SSL_AES256, |
| 1048 | .algorithm_mac = SSL_SHA256, | 1048 | .algorithm_mac = SSL_SHA256, |
| @@ -1058,7 +1058,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1058 | .valid = 1, | 1058 | .valid = 1, |
| 1059 | .name = TLS1_TXT_DHE_RSA_WITH_AES_256_SHA256, | 1059 | .name = TLS1_TXT_DHE_RSA_WITH_AES_256_SHA256, |
| 1060 | .id = TLS1_CK_DHE_RSA_WITH_AES_256_SHA256, | 1060 | .id = TLS1_CK_DHE_RSA_WITH_AES_256_SHA256, |
| 1061 | .algorithm_mkey = SSL_kEDH, | 1061 | .algorithm_mkey = SSL_kDHE, |
| 1062 | .algorithm_auth = SSL_aRSA, | 1062 | .algorithm_auth = SSL_aRSA, |
| 1063 | .algorithm_enc = SSL_AES256, | 1063 | .algorithm_enc = SSL_AES256, |
| 1064 | .algorithm_mac = SSL_SHA256, | 1064 | .algorithm_mac = SSL_SHA256, |
| @@ -1074,7 +1074,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1074 | .valid = 1, | 1074 | .valid = 1, |
| 1075 | .name = TLS1_TXT_ADH_WITH_AES_128_SHA256, | 1075 | .name = TLS1_TXT_ADH_WITH_AES_128_SHA256, |
| 1076 | .id = TLS1_CK_ADH_WITH_AES_128_SHA256, | 1076 | .id = TLS1_CK_ADH_WITH_AES_128_SHA256, |
| 1077 | .algorithm_mkey = SSL_kEDH, | 1077 | .algorithm_mkey = SSL_kDHE, |
| 1078 | .algorithm_auth = SSL_aNULL, | 1078 | .algorithm_auth = SSL_aNULL, |
| 1079 | .algorithm_enc = SSL_AES128, | 1079 | .algorithm_enc = SSL_AES128, |
| 1080 | .algorithm_mac = SSL_SHA256, | 1080 | .algorithm_mac = SSL_SHA256, |
| @@ -1090,7 +1090,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1090 | .valid = 1, | 1090 | .valid = 1, |
| 1091 | .name = TLS1_TXT_ADH_WITH_AES_256_SHA256, | 1091 | .name = TLS1_TXT_ADH_WITH_AES_256_SHA256, |
| 1092 | .id = TLS1_CK_ADH_WITH_AES_256_SHA256, | 1092 | .id = TLS1_CK_ADH_WITH_AES_256_SHA256, |
| 1093 | .algorithm_mkey = SSL_kEDH, | 1093 | .algorithm_mkey = SSL_kDHE, |
| 1094 | .algorithm_auth = SSL_aNULL, | 1094 | .algorithm_auth = SSL_aNULL, |
| 1095 | .algorithm_enc = SSL_AES256, | 1095 | .algorithm_enc = SSL_AES256, |
| 1096 | .algorithm_mac = SSL_SHA256, | 1096 | .algorithm_mac = SSL_SHA256, |
| @@ -1218,7 +1218,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1218 | .valid = 1, | 1218 | .valid = 1, |
| 1219 | .name = TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, | 1219 | .name = TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, |
| 1220 | .id = TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, | 1220 | .id = TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, |
| 1221 | .algorithm_mkey = SSL_kEDH, | 1221 | .algorithm_mkey = SSL_kDHE, |
| 1222 | .algorithm_auth = SSL_aDSS, | 1222 | .algorithm_auth = SSL_aDSS, |
| 1223 | .algorithm_enc = SSL_CAMELLIA256, | 1223 | .algorithm_enc = SSL_CAMELLIA256, |
| 1224 | .algorithm_mac = SSL_SHA1, | 1224 | .algorithm_mac = SSL_SHA1, |
| @@ -1234,7 +1234,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1234 | .valid = 1, | 1234 | .valid = 1, |
| 1235 | .name = TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, | 1235 | .name = TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, |
| 1236 | .id = TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, | 1236 | .id = TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, |
| 1237 | .algorithm_mkey = SSL_kEDH, | 1237 | .algorithm_mkey = SSL_kDHE, |
| 1238 | .algorithm_auth = SSL_aRSA, | 1238 | .algorithm_auth = SSL_aRSA, |
| 1239 | .algorithm_enc = SSL_CAMELLIA256, | 1239 | .algorithm_enc = SSL_CAMELLIA256, |
| 1240 | .algorithm_mac = SSL_SHA1, | 1240 | .algorithm_mac = SSL_SHA1, |
| @@ -1250,7 +1250,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1250 | .valid = 1, | 1250 | .valid = 1, |
| 1251 | .name = TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA, | 1251 | .name = TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA, |
| 1252 | .id = TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA, | 1252 | .id = TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA, |
| 1253 | .algorithm_mkey = SSL_kEDH, | 1253 | .algorithm_mkey = SSL_kDHE, |
| 1254 | .algorithm_auth = SSL_aNULL, | 1254 | .algorithm_auth = SSL_aNULL, |
| 1255 | .algorithm_enc = SSL_CAMELLIA256, | 1255 | .algorithm_enc = SSL_CAMELLIA256, |
| 1256 | .algorithm_mac = SSL_SHA1, | 1256 | .algorithm_mac = SSL_SHA1, |
| @@ -1306,7 +1306,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1306 | .valid = 1, | 1306 | .valid = 1, |
| 1307 | .name = TLS1_TXT_DHE_RSA_WITH_AES_128_GCM_SHA256, | 1307 | .name = TLS1_TXT_DHE_RSA_WITH_AES_128_GCM_SHA256, |
| 1308 | .id = TLS1_CK_DHE_RSA_WITH_AES_128_GCM_SHA256, | 1308 | .id = TLS1_CK_DHE_RSA_WITH_AES_128_GCM_SHA256, |
| 1309 | .algorithm_mkey = SSL_kEDH, | 1309 | .algorithm_mkey = SSL_kDHE, |
| 1310 | .algorithm_auth = SSL_aRSA, | 1310 | .algorithm_auth = SSL_aRSA, |
| 1311 | .algorithm_enc = SSL_AES128GCM, | 1311 | .algorithm_enc = SSL_AES128GCM, |
| 1312 | .algorithm_mac = SSL_AEAD, | 1312 | .algorithm_mac = SSL_AEAD, |
| @@ -1324,7 +1324,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1324 | .valid = 1, | 1324 | .valid = 1, |
| 1325 | .name = TLS1_TXT_DHE_RSA_WITH_AES_256_GCM_SHA384, | 1325 | .name = TLS1_TXT_DHE_RSA_WITH_AES_256_GCM_SHA384, |
| 1326 | .id = TLS1_CK_DHE_RSA_WITH_AES_256_GCM_SHA384, | 1326 | .id = TLS1_CK_DHE_RSA_WITH_AES_256_GCM_SHA384, |
| 1327 | .algorithm_mkey = SSL_kEDH, | 1327 | .algorithm_mkey = SSL_kDHE, |
| 1328 | .algorithm_auth = SSL_aRSA, | 1328 | .algorithm_auth = SSL_aRSA, |
| 1329 | .algorithm_enc = SSL_AES256GCM, | 1329 | .algorithm_enc = SSL_AES256GCM, |
| 1330 | .algorithm_mac = SSL_AEAD, | 1330 | .algorithm_mac = SSL_AEAD, |
| @@ -1378,7 +1378,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1378 | .valid = 1, | 1378 | .valid = 1, |
| 1379 | .name = TLS1_TXT_DHE_DSS_WITH_AES_128_GCM_SHA256, | 1379 | .name = TLS1_TXT_DHE_DSS_WITH_AES_128_GCM_SHA256, |
| 1380 | .id = TLS1_CK_DHE_DSS_WITH_AES_128_GCM_SHA256, | 1380 | .id = TLS1_CK_DHE_DSS_WITH_AES_128_GCM_SHA256, |
| 1381 | .algorithm_mkey = SSL_kEDH, | 1381 | .algorithm_mkey = SSL_kDHE, |
| 1382 | .algorithm_auth = SSL_aDSS, | 1382 | .algorithm_auth = SSL_aDSS, |
| 1383 | .algorithm_enc = SSL_AES128GCM, | 1383 | .algorithm_enc = SSL_AES128GCM, |
| 1384 | .algorithm_mac = SSL_AEAD, | 1384 | .algorithm_mac = SSL_AEAD, |
| @@ -1396,7 +1396,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1396 | .valid = 1, | 1396 | .valid = 1, |
| 1397 | .name = TLS1_TXT_DHE_DSS_WITH_AES_256_GCM_SHA384, | 1397 | .name = TLS1_TXT_DHE_DSS_WITH_AES_256_GCM_SHA384, |
| 1398 | .id = TLS1_CK_DHE_DSS_WITH_AES_256_GCM_SHA384, | 1398 | .id = TLS1_CK_DHE_DSS_WITH_AES_256_GCM_SHA384, |
| 1399 | .algorithm_mkey = SSL_kEDH, | 1399 | .algorithm_mkey = SSL_kDHE, |
| 1400 | .algorithm_auth = SSL_aDSS, | 1400 | .algorithm_auth = SSL_aDSS, |
| 1401 | .algorithm_enc = SSL_AES256GCM, | 1401 | .algorithm_enc = SSL_AES256GCM, |
| 1402 | .algorithm_mac = SSL_AEAD, | 1402 | .algorithm_mac = SSL_AEAD, |
| @@ -1450,7 +1450,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1450 | .valid = 1, | 1450 | .valid = 1, |
| 1451 | .name = TLS1_TXT_ADH_WITH_AES_128_GCM_SHA256, | 1451 | .name = TLS1_TXT_ADH_WITH_AES_128_GCM_SHA256, |
| 1452 | .id = TLS1_CK_ADH_WITH_AES_128_GCM_SHA256, | 1452 | .id = TLS1_CK_ADH_WITH_AES_128_GCM_SHA256, |
| 1453 | .algorithm_mkey = SSL_kEDH, | 1453 | .algorithm_mkey = SSL_kDHE, |
| 1454 | .algorithm_auth = SSL_aNULL, | 1454 | .algorithm_auth = SSL_aNULL, |
| 1455 | .algorithm_enc = SSL_AES128GCM, | 1455 | .algorithm_enc = SSL_AES128GCM, |
| 1456 | .algorithm_mac = SSL_AEAD, | 1456 | .algorithm_mac = SSL_AEAD, |
| @@ -1468,7 +1468,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1468 | .valid = 1, | 1468 | .valid = 1, |
| 1469 | .name = TLS1_TXT_ADH_WITH_AES_256_GCM_SHA384, | 1469 | .name = TLS1_TXT_ADH_WITH_AES_256_GCM_SHA384, |
| 1470 | .id = TLS1_CK_ADH_WITH_AES_256_GCM_SHA384, | 1470 | .id = TLS1_CK_ADH_WITH_AES_256_GCM_SHA384, |
| 1471 | .algorithm_mkey = SSL_kEDH, | 1471 | .algorithm_mkey = SSL_kDHE, |
| 1472 | .algorithm_auth = SSL_aNULL, | 1472 | .algorithm_auth = SSL_aNULL, |
| 1473 | .algorithm_enc = SSL_AES256GCM, | 1473 | .algorithm_enc = SSL_AES256GCM, |
| 1474 | .algorithm_mac = SSL_AEAD, | 1474 | .algorithm_mac = SSL_AEAD, |
| @@ -1566,7 +1566,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1566 | .valid = 1, | 1566 | .valid = 1, |
| 1567 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_NULL_SHA, | 1567 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_NULL_SHA, |
| 1568 | .id = TLS1_CK_ECDHE_ECDSA_WITH_NULL_SHA, | 1568 | .id = TLS1_CK_ECDHE_ECDSA_WITH_NULL_SHA, |
| 1569 | .algorithm_mkey = SSL_kEECDH, | 1569 | .algorithm_mkey = SSL_kECDHE, |
| 1570 | .algorithm_auth = SSL_aECDSA, | 1570 | .algorithm_auth = SSL_aECDSA, |
| 1571 | .algorithm_enc = SSL_eNULL, | 1571 | .algorithm_enc = SSL_eNULL, |
| 1572 | .algorithm_mac = SSL_SHA1, | 1572 | .algorithm_mac = SSL_SHA1, |
| @@ -1582,7 +1582,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1582 | .valid = 1, | 1582 | .valid = 1, |
| 1583 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_RC4_128_SHA, | 1583 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_RC4_128_SHA, |
| 1584 | .id = TLS1_CK_ECDHE_ECDSA_WITH_RC4_128_SHA, | 1584 | .id = TLS1_CK_ECDHE_ECDSA_WITH_RC4_128_SHA, |
| 1585 | .algorithm_mkey = SSL_kEECDH, | 1585 | .algorithm_mkey = SSL_kECDHE, |
| 1586 | .algorithm_auth = SSL_aECDSA, | 1586 | .algorithm_auth = SSL_aECDSA, |
| 1587 | .algorithm_enc = SSL_RC4, | 1587 | .algorithm_enc = SSL_RC4, |
| 1588 | .algorithm_mac = SSL_SHA1, | 1588 | .algorithm_mac = SSL_SHA1, |
| @@ -1598,7 +1598,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1598 | .valid = 1, | 1598 | .valid = 1, |
| 1599 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA, | 1599 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA, |
| 1600 | .id = TLS1_CK_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA, | 1600 | .id = TLS1_CK_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA, |
| 1601 | .algorithm_mkey = SSL_kEECDH, | 1601 | .algorithm_mkey = SSL_kECDHE, |
| 1602 | .algorithm_auth = SSL_aECDSA, | 1602 | .algorithm_auth = SSL_aECDSA, |
| 1603 | .algorithm_enc = SSL_3DES, | 1603 | .algorithm_enc = SSL_3DES, |
| 1604 | .algorithm_mac = SSL_SHA1, | 1604 | .algorithm_mac = SSL_SHA1, |
| @@ -1614,7 +1614,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1614 | .valid = 1, | 1614 | .valid = 1, |
| 1615 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, | 1615 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, |
| 1616 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, | 1616 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, |
| 1617 | .algorithm_mkey = SSL_kEECDH, | 1617 | .algorithm_mkey = SSL_kECDHE, |
| 1618 | .algorithm_auth = SSL_aECDSA, | 1618 | .algorithm_auth = SSL_aECDSA, |
| 1619 | .algorithm_enc = SSL_AES128, | 1619 | .algorithm_enc = SSL_AES128, |
| 1620 | .algorithm_mac = SSL_SHA1, | 1620 | .algorithm_mac = SSL_SHA1, |
| @@ -1630,7 +1630,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1630 | .valid = 1, | 1630 | .valid = 1, |
| 1631 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, | 1631 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, |
| 1632 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, | 1632 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, |
| 1633 | .algorithm_mkey = SSL_kEECDH, | 1633 | .algorithm_mkey = SSL_kECDHE, |
| 1634 | .algorithm_auth = SSL_aECDSA, | 1634 | .algorithm_auth = SSL_aECDSA, |
| 1635 | .algorithm_enc = SSL_AES256, | 1635 | .algorithm_enc = SSL_AES256, |
| 1636 | .algorithm_mac = SSL_SHA1, | 1636 | .algorithm_mac = SSL_SHA1, |
| @@ -1726,7 +1726,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1726 | .valid = 1, | 1726 | .valid = 1, |
| 1727 | .name = TLS1_TXT_ECDHE_RSA_WITH_NULL_SHA, | 1727 | .name = TLS1_TXT_ECDHE_RSA_WITH_NULL_SHA, |
| 1728 | .id = TLS1_CK_ECDHE_RSA_WITH_NULL_SHA, | 1728 | .id = TLS1_CK_ECDHE_RSA_WITH_NULL_SHA, |
| 1729 | .algorithm_mkey = SSL_kEECDH, | 1729 | .algorithm_mkey = SSL_kECDHE, |
| 1730 | .algorithm_auth = SSL_aRSA, | 1730 | .algorithm_auth = SSL_aRSA, |
| 1731 | .algorithm_enc = SSL_eNULL, | 1731 | .algorithm_enc = SSL_eNULL, |
| 1732 | .algorithm_mac = SSL_SHA1, | 1732 | .algorithm_mac = SSL_SHA1, |
| @@ -1742,7 +1742,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1742 | .valid = 1, | 1742 | .valid = 1, |
| 1743 | .name = TLS1_TXT_ECDHE_RSA_WITH_RC4_128_SHA, | 1743 | .name = TLS1_TXT_ECDHE_RSA_WITH_RC4_128_SHA, |
| 1744 | .id = TLS1_CK_ECDHE_RSA_WITH_RC4_128_SHA, | 1744 | .id = TLS1_CK_ECDHE_RSA_WITH_RC4_128_SHA, |
| 1745 | .algorithm_mkey = SSL_kEECDH, | 1745 | .algorithm_mkey = SSL_kECDHE, |
| 1746 | .algorithm_auth = SSL_aRSA, | 1746 | .algorithm_auth = SSL_aRSA, |
| 1747 | .algorithm_enc = SSL_RC4, | 1747 | .algorithm_enc = SSL_RC4, |
| 1748 | .algorithm_mac = SSL_SHA1, | 1748 | .algorithm_mac = SSL_SHA1, |
| @@ -1758,7 +1758,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1758 | .valid = 1, | 1758 | .valid = 1, |
| 1759 | .name = TLS1_TXT_ECDHE_RSA_WITH_DES_192_CBC3_SHA, | 1759 | .name = TLS1_TXT_ECDHE_RSA_WITH_DES_192_CBC3_SHA, |
| 1760 | .id = TLS1_CK_ECDHE_RSA_WITH_DES_192_CBC3_SHA, | 1760 | .id = TLS1_CK_ECDHE_RSA_WITH_DES_192_CBC3_SHA, |
| 1761 | .algorithm_mkey = SSL_kEECDH, | 1761 | .algorithm_mkey = SSL_kECDHE, |
| 1762 | .algorithm_auth = SSL_aRSA, | 1762 | .algorithm_auth = SSL_aRSA, |
| 1763 | .algorithm_enc = SSL_3DES, | 1763 | .algorithm_enc = SSL_3DES, |
| 1764 | .algorithm_mac = SSL_SHA1, | 1764 | .algorithm_mac = SSL_SHA1, |
| @@ -1774,7 +1774,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1774 | .valid = 1, | 1774 | .valid = 1, |
| 1775 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_128_CBC_SHA, | 1775 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_128_CBC_SHA, |
| 1776 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA, | 1776 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA, |
| 1777 | .algorithm_mkey = SSL_kEECDH, | 1777 | .algorithm_mkey = SSL_kECDHE, |
| 1778 | .algorithm_auth = SSL_aRSA, | 1778 | .algorithm_auth = SSL_aRSA, |
| 1779 | .algorithm_enc = SSL_AES128, | 1779 | .algorithm_enc = SSL_AES128, |
| 1780 | .algorithm_mac = SSL_SHA1, | 1780 | .algorithm_mac = SSL_SHA1, |
| @@ -1790,7 +1790,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1790 | .valid = 1, | 1790 | .valid = 1, |
| 1791 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_256_CBC_SHA, | 1791 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_256_CBC_SHA, |
| 1792 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA, | 1792 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA, |
| 1793 | .algorithm_mkey = SSL_kEECDH, | 1793 | .algorithm_mkey = SSL_kECDHE, |
| 1794 | .algorithm_auth = SSL_aRSA, | 1794 | .algorithm_auth = SSL_aRSA, |
| 1795 | .algorithm_enc = SSL_AES256, | 1795 | .algorithm_enc = SSL_AES256, |
| 1796 | .algorithm_mac = SSL_SHA1, | 1796 | .algorithm_mac = SSL_SHA1, |
| @@ -1806,7 +1806,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1806 | .valid = 1, | 1806 | .valid = 1, |
| 1807 | .name = TLS1_TXT_ECDH_anon_WITH_NULL_SHA, | 1807 | .name = TLS1_TXT_ECDH_anon_WITH_NULL_SHA, |
| 1808 | .id = TLS1_CK_ECDH_anon_WITH_NULL_SHA, | 1808 | .id = TLS1_CK_ECDH_anon_WITH_NULL_SHA, |
| 1809 | .algorithm_mkey = SSL_kEECDH, | 1809 | .algorithm_mkey = SSL_kECDHE, |
| 1810 | .algorithm_auth = SSL_aNULL, | 1810 | .algorithm_auth = SSL_aNULL, |
| 1811 | .algorithm_enc = SSL_eNULL, | 1811 | .algorithm_enc = SSL_eNULL, |
| 1812 | .algorithm_mac = SSL_SHA1, | 1812 | .algorithm_mac = SSL_SHA1, |
| @@ -1822,7 +1822,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1822 | .valid = 1, | 1822 | .valid = 1, |
| 1823 | .name = TLS1_TXT_ECDH_anon_WITH_RC4_128_SHA, | 1823 | .name = TLS1_TXT_ECDH_anon_WITH_RC4_128_SHA, |
| 1824 | .id = TLS1_CK_ECDH_anon_WITH_RC4_128_SHA, | 1824 | .id = TLS1_CK_ECDH_anon_WITH_RC4_128_SHA, |
| 1825 | .algorithm_mkey = SSL_kEECDH, | 1825 | .algorithm_mkey = SSL_kECDHE, |
| 1826 | .algorithm_auth = SSL_aNULL, | 1826 | .algorithm_auth = SSL_aNULL, |
| 1827 | .algorithm_enc = SSL_RC4, | 1827 | .algorithm_enc = SSL_RC4, |
| 1828 | .algorithm_mac = SSL_SHA1, | 1828 | .algorithm_mac = SSL_SHA1, |
| @@ -1838,7 +1838,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1838 | .valid = 1, | 1838 | .valid = 1, |
| 1839 | .name = TLS1_TXT_ECDH_anon_WITH_DES_192_CBC3_SHA, | 1839 | .name = TLS1_TXT_ECDH_anon_WITH_DES_192_CBC3_SHA, |
| 1840 | .id = TLS1_CK_ECDH_anon_WITH_DES_192_CBC3_SHA, | 1840 | .id = TLS1_CK_ECDH_anon_WITH_DES_192_CBC3_SHA, |
| 1841 | .algorithm_mkey = SSL_kEECDH, | 1841 | .algorithm_mkey = SSL_kECDHE, |
| 1842 | .algorithm_auth = SSL_aNULL, | 1842 | .algorithm_auth = SSL_aNULL, |
| 1843 | .algorithm_enc = SSL_3DES, | 1843 | .algorithm_enc = SSL_3DES, |
| 1844 | .algorithm_mac = SSL_SHA1, | 1844 | .algorithm_mac = SSL_SHA1, |
| @@ -1854,7 +1854,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1854 | .valid = 1, | 1854 | .valid = 1, |
| 1855 | .name = TLS1_TXT_ECDH_anon_WITH_AES_128_CBC_SHA, | 1855 | .name = TLS1_TXT_ECDH_anon_WITH_AES_128_CBC_SHA, |
| 1856 | .id = TLS1_CK_ECDH_anon_WITH_AES_128_CBC_SHA, | 1856 | .id = TLS1_CK_ECDH_anon_WITH_AES_128_CBC_SHA, |
| 1857 | .algorithm_mkey = SSL_kEECDH, | 1857 | .algorithm_mkey = SSL_kECDHE, |
| 1858 | .algorithm_auth = SSL_aNULL, | 1858 | .algorithm_auth = SSL_aNULL, |
| 1859 | .algorithm_enc = SSL_AES128, | 1859 | .algorithm_enc = SSL_AES128, |
| 1860 | .algorithm_mac = SSL_SHA1, | 1860 | .algorithm_mac = SSL_SHA1, |
| @@ -1870,7 +1870,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1870 | .valid = 1, | 1870 | .valid = 1, |
| 1871 | .name = TLS1_TXT_ECDH_anon_WITH_AES_256_CBC_SHA, | 1871 | .name = TLS1_TXT_ECDH_anon_WITH_AES_256_CBC_SHA, |
| 1872 | .id = TLS1_CK_ECDH_anon_WITH_AES_256_CBC_SHA, | 1872 | .id = TLS1_CK_ECDH_anon_WITH_AES_256_CBC_SHA, |
| 1873 | .algorithm_mkey = SSL_kEECDH, | 1873 | .algorithm_mkey = SSL_kECDHE, |
| 1874 | .algorithm_auth = SSL_aNULL, | 1874 | .algorithm_auth = SSL_aNULL, |
| 1875 | .algorithm_enc = SSL_AES256, | 1875 | .algorithm_enc = SSL_AES256, |
| 1876 | .algorithm_mac = SSL_SHA1, | 1876 | .algorithm_mac = SSL_SHA1, |
| @@ -1889,7 +1889,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1889 | .valid = 1, | 1889 | .valid = 1, |
| 1890 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_SHA256, | 1890 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_SHA256, |
| 1891 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_128_SHA256, | 1891 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_128_SHA256, |
| 1892 | .algorithm_mkey = SSL_kEECDH, | 1892 | .algorithm_mkey = SSL_kECDHE, |
| 1893 | .algorithm_auth = SSL_aECDSA, | 1893 | .algorithm_auth = SSL_aECDSA, |
| 1894 | .algorithm_enc = SSL_AES128, | 1894 | .algorithm_enc = SSL_AES128, |
| 1895 | .algorithm_mac = SSL_SHA256, | 1895 | .algorithm_mac = SSL_SHA256, |
| @@ -1905,7 +1905,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1905 | .valid = 1, | 1905 | .valid = 1, |
| 1906 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_SHA384, | 1906 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_SHA384, |
| 1907 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_256_SHA384, | 1907 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_256_SHA384, |
| 1908 | .algorithm_mkey = SSL_kEECDH, | 1908 | .algorithm_mkey = SSL_kECDHE, |
| 1909 | .algorithm_auth = SSL_aECDSA, | 1909 | .algorithm_auth = SSL_aECDSA, |
| 1910 | .algorithm_enc = SSL_AES256, | 1910 | .algorithm_enc = SSL_AES256, |
| 1911 | .algorithm_mac = SSL_SHA384, | 1911 | .algorithm_mac = SSL_SHA384, |
| @@ -1953,7 +1953,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1953 | .valid = 1, | 1953 | .valid = 1, |
| 1954 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_128_SHA256, | 1954 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_128_SHA256, |
| 1955 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_128_SHA256, | 1955 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_128_SHA256, |
| 1956 | .algorithm_mkey = SSL_kEECDH, | 1956 | .algorithm_mkey = SSL_kECDHE, |
| 1957 | .algorithm_auth = SSL_aRSA, | 1957 | .algorithm_auth = SSL_aRSA, |
| 1958 | .algorithm_enc = SSL_AES128, | 1958 | .algorithm_enc = SSL_AES128, |
| 1959 | .algorithm_mac = SSL_SHA256, | 1959 | .algorithm_mac = SSL_SHA256, |
| @@ -1969,7 +1969,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1969 | .valid = 1, | 1969 | .valid = 1, |
| 1970 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_256_SHA384, | 1970 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_256_SHA384, |
| 1971 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_256_SHA384, | 1971 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_256_SHA384, |
| 1972 | .algorithm_mkey = SSL_kEECDH, | 1972 | .algorithm_mkey = SSL_kECDHE, |
| 1973 | .algorithm_auth = SSL_aRSA, | 1973 | .algorithm_auth = SSL_aRSA, |
| 1974 | .algorithm_enc = SSL_AES256, | 1974 | .algorithm_enc = SSL_AES256, |
| 1975 | .algorithm_mac = SSL_SHA384, | 1975 | .algorithm_mac = SSL_SHA384, |
| @@ -2019,7 +2019,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 2019 | .valid = 1, | 2019 | .valid = 1, |
| 2020 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, | 2020 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, |
| 2021 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, | 2021 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, |
| 2022 | .algorithm_mkey = SSL_kEECDH, | 2022 | .algorithm_mkey = SSL_kECDHE, |
| 2023 | .algorithm_auth = SSL_aECDSA, | 2023 | .algorithm_auth = SSL_aECDSA, |
| 2024 | .algorithm_enc = SSL_AES128GCM, | 2024 | .algorithm_enc = SSL_AES128GCM, |
| 2025 | .algorithm_mac = SSL_AEAD, | 2025 | .algorithm_mac = SSL_AEAD, |
| @@ -2037,7 +2037,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 2037 | .valid = 1, | 2037 | .valid = 1, |
| 2038 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, | 2038 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, |
| 2039 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, | 2039 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, |
| 2040 | .algorithm_mkey = SSL_kEECDH, | 2040 | .algorithm_mkey = SSL_kECDHE, |
| 2041 | .algorithm_auth = SSL_aECDSA, | 2041 | .algorithm_auth = SSL_aECDSA, |
| 2042 | .algorithm_enc = SSL_AES256GCM, | 2042 | .algorithm_enc = SSL_AES256GCM, |
| 2043 | .algorithm_mac = SSL_AEAD, | 2043 | .algorithm_mac = SSL_AEAD, |
| @@ -2091,7 +2091,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 2091 | .valid = 1, | 2091 | .valid = 1, |
| 2092 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_128_GCM_SHA256, | 2092 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_128_GCM_SHA256, |
| 2093 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256, | 2093 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256, |
| 2094 | .algorithm_mkey = SSL_kEECDH, | 2094 | .algorithm_mkey = SSL_kECDHE, |
| 2095 | .algorithm_auth = SSL_aRSA, | 2095 | .algorithm_auth = SSL_aRSA, |
| 2096 | .algorithm_enc = SSL_AES128GCM, | 2096 | .algorithm_enc = SSL_AES128GCM, |
| 2097 | .algorithm_mac = SSL_AEAD, | 2097 | .algorithm_mac = SSL_AEAD, |
| @@ -2109,7 +2109,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 2109 | .valid = 1, | 2109 | .valid = 1, |
| 2110 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_256_GCM_SHA384, | 2110 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_256_GCM_SHA384, |
| 2111 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_256_GCM_SHA384, | 2111 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_256_GCM_SHA384, |
| 2112 | .algorithm_mkey = SSL_kEECDH, | 2112 | .algorithm_mkey = SSL_kECDHE, |
| 2113 | .algorithm_auth = SSL_aRSA, | 2113 | .algorithm_auth = SSL_aRSA, |
| 2114 | .algorithm_enc = SSL_AES256GCM, | 2114 | .algorithm_enc = SSL_AES256GCM, |
| 2115 | .algorithm_mac = SSL_AEAD, | 2115 | .algorithm_mac = SSL_AEAD, |
| @@ -2224,7 +2224,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 2224 | .valid = 1, | 2224 | .valid = 1, |
| 2225 | .name = TLS1_TXT_ECDHE_RSA_WITH_CHACHA20_POLY1305, | 2225 | .name = TLS1_TXT_ECDHE_RSA_WITH_CHACHA20_POLY1305, |
| 2226 | .id = TLS1_CK_ECDHE_RSA_CHACHA20_POLY1305, | 2226 | .id = TLS1_CK_ECDHE_RSA_CHACHA20_POLY1305, |
| 2227 | .algorithm_mkey = SSL_kEECDH, | 2227 | .algorithm_mkey = SSL_kECDHE, |
| 2228 | .algorithm_auth = SSL_aRSA, | 2228 | .algorithm_auth = SSL_aRSA, |
| 2229 | .algorithm_enc = SSL_CHACHA20POLY1305, | 2229 | .algorithm_enc = SSL_CHACHA20POLY1305, |
| 2230 | .algorithm_mac = SSL_AEAD, | 2230 | .algorithm_mac = SSL_AEAD, |
| @@ -2240,7 +2240,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 2240 | .valid = 1, | 2240 | .valid = 1, |
| 2241 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_CHACHA20_POLY1305, | 2241 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_CHACHA20_POLY1305, |
| 2242 | .id = TLS1_CK_ECDHE_ECDSA_CHACHA20_POLY1305, | 2242 | .id = TLS1_CK_ECDHE_ECDSA_CHACHA20_POLY1305, |
| 2243 | .algorithm_mkey = SSL_kEECDH, | 2243 | .algorithm_mkey = SSL_kECDHE, |
| 2244 | .algorithm_auth = SSL_aECDSA, | 2244 | .algorithm_auth = SSL_aECDSA, |
| 2245 | .algorithm_enc = SSL_CHACHA20POLY1305, | 2245 | .algorithm_enc = SSL_CHACHA20POLY1305, |
| 2246 | .algorithm_mac = SSL_AEAD, | 2246 | .algorithm_mac = SSL_AEAD, |
| @@ -2256,7 +2256,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 2256 | .valid = 1, | 2256 | .valid = 1, |
| 2257 | .name = TLS1_TXT_DHE_RSA_WITH_CHACHA20_POLY1305, | 2257 | .name = TLS1_TXT_DHE_RSA_WITH_CHACHA20_POLY1305, |
| 2258 | .id = TLS1_CK_DHE_RSA_CHACHA20_POLY1305, | 2258 | .id = TLS1_CK_DHE_RSA_CHACHA20_POLY1305, |
| 2259 | .algorithm_mkey = SSL_kEDH, | 2259 | .algorithm_mkey = SSL_kDHE, |
| 2260 | .algorithm_auth = SSL_aRSA, | 2260 | .algorithm_auth = SSL_aRSA, |
| 2261 | .algorithm_enc = SSL_CHACHA20POLY1305, | 2261 | .algorithm_enc = SSL_CHACHA20POLY1305, |
| 2262 | .algorithm_mac = SSL_AEAD, | 2262 | .algorithm_mac = SSL_AEAD, |
| @@ -3069,7 +3069,7 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt, | |||
| 3069 | * if we are considering an ECC cipher suite that uses an | 3069 | * if we are considering an ECC cipher suite that uses an |
| 3070 | * ephemeral EC key | 3070 | * ephemeral EC key |
| 3071 | */ | 3071 | */ |
| 3072 | (alg_k & SSL_kEECDH) | 3072 | (alg_k & SSL_kECDHE) |
| 3073 | /* and we have an ephemeral EC key */ | 3073 | /* and we have an ephemeral EC key */ |
| 3074 | && (s->cert->ecdh_tmp != NULL) | 3074 | && (s->cert->ecdh_tmp != NULL) |
| 3075 | /* and the client specified an EllipticCurves extension */ | 3075 | /* and the client specified an EllipticCurves extension */ |
| @@ -3108,7 +3108,7 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt, | |||
| 3108 | continue; | 3108 | continue; |
| 3109 | ii = sk_SSL_CIPHER_find(allow, c); | 3109 | ii = sk_SSL_CIPHER_find(allow, c); |
| 3110 | if (ii >= 0) { | 3110 | if (ii >= 0) { |
| 3111 | if ((alg_k & SSL_kEECDH) && | 3111 | if ((alg_k & SSL_kECDHE) && |
| 3112 | (alg_a & SSL_aECDSA) && s->s3->is_probably_safari) { | 3112 | (alg_a & SSL_aECDSA) && s->s3->is_probably_safari) { |
| 3113 | if (!ret) | 3113 | if (!ret) |
| 3114 | ret = sk_SSL_CIPHER_value(allow, ii); | 3114 | ret = sk_SSL_CIPHER_value(allow, ii); |
| @@ -3139,12 +3139,12 @@ ssl3_get_req_cert_type(SSL *s, unsigned char *p) | |||
| 3139 | } | 3139 | } |
| 3140 | #endif | 3140 | #endif |
| 3141 | 3141 | ||
| 3142 | if (alg_k & (SSL_kDHr|SSL_kEDH)) { | 3142 | if (alg_k & (SSL_kDHr|SSL_kDHE)) { |
| 3143 | p[ret++] = SSL3_CT_RSA_FIXED_DH; | 3143 | p[ret++] = SSL3_CT_RSA_FIXED_DH; |
| 3144 | p[ret++] = SSL3_CT_DSS_FIXED_DH; | 3144 | p[ret++] = SSL3_CT_DSS_FIXED_DH; |
| 3145 | } | 3145 | } |
| 3146 | if ((s->version == SSL3_VERSION) && | 3146 | if ((s->version == SSL3_VERSION) && |
| 3147 | (alg_k & (SSL_kEDH|SSL_kDHd|SSL_kDHr))) { | 3147 | (alg_k & (SSL_kDHE|SSL_kDHd|SSL_kDHr))) { |
| 3148 | p[ret++] = SSL3_CT_RSA_EPHEMERAL_DH; | 3148 | p[ret++] = SSL3_CT_RSA_EPHEMERAL_DH; |
| 3149 | p[ret++] = SSL3_CT_DSS_EPHEMERAL_DH; | 3149 | p[ret++] = SSL3_CT_DSS_EPHEMERAL_DH; |
| 3150 | } | 3150 | } |
| @@ -3157,7 +3157,7 @@ ssl3_get_req_cert_type(SSL *s, unsigned char *p) | |||
| 3157 | 3157 | ||
| 3158 | /* | 3158 | /* |
| 3159 | * ECDSA certs can be used with RSA cipher suites as well | 3159 | * ECDSA certs can be used with RSA cipher suites as well |
| 3160 | * so we don't need to check for SSL_kECDH or SSL_kEECDH | 3160 | * so we don't need to check for SSL_kECDH or SSL_kECDHE |
| 3161 | */ | 3161 | */ |
| 3162 | if (s->version >= TLS1_VERSION) { | 3162 | if (s->version >= TLS1_VERSION) { |
| 3163 | p[ret++] = TLS_CT_ECDSA_SIGN; | 3163 | p[ret++] = TLS_CT_ECDSA_SIGN; |
diff --git a/src/lib/libssl/s3_srvr.c b/src/lib/libssl/s3_srvr.c index e0a7d78995..8d47a16b55 100644 --- a/src/lib/libssl/s3_srvr.c +++ b/src/lib/libssl/s3_srvr.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s3_srvr.c,v 1.77 2014/07/12 13:11:53 jsing Exp $ */ | 1 | /* $OpenBSD: s3_srvr.c,v 1.78 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -422,8 +422,8 @@ ssl3_accept(SSL *s) | |||
| 422 | * public key for key exchange. | 422 | * public key for key exchange. |
| 423 | */ | 423 | */ |
| 424 | if (s->s3->tmp.use_rsa_tmp || | 424 | if (s->s3->tmp.use_rsa_tmp || |
| 425 | (alg_k & (SSL_kDHr|SSL_kDHd|SSL_kEDH)) || | 425 | (alg_k & (SSL_kDHr|SSL_kDHd|SSL_kDHE)) || |
| 426 | (alg_k & SSL_kEECDH) || | 426 | (alg_k & SSL_kECDHE) || |
| 427 | ((alg_k & SSL_kRSA) && | 427 | ((alg_k & SSL_kRSA) && |
| 428 | (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == | 428 | (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == |
| 429 | NULL))) { | 429 | NULL))) { |
| @@ -1416,7 +1416,7 @@ ssl3_send_server_key_exchange(SSL *s) | |||
| 1416 | r[1] = rsa->e; | 1416 | r[1] = rsa->e; |
| 1417 | s->s3->tmp.use_rsa_tmp = 1; | 1417 | s->s3->tmp.use_rsa_tmp = 1; |
| 1418 | } else | 1418 | } else |
| 1419 | if (type & SSL_kEDH) { | 1419 | if (type & SSL_kDHE) { |
| 1420 | dhp = cert->dh_tmp; | 1420 | dhp = cert->dh_tmp; |
| 1421 | if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL)) | 1421 | if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL)) |
| 1422 | dhp = s->cert->dh_tmp_cb(s, 0, 0); | 1422 | dhp = s->cert->dh_tmp_cb(s, 0, 0); |
| @@ -1463,7 +1463,7 @@ ssl3_send_server_key_exchange(SSL *s) | |||
| 1463 | r[1] = dh->g; | 1463 | r[1] = dh->g; |
| 1464 | r[2] = dh->pub_key; | 1464 | r[2] = dh->pub_key; |
| 1465 | } else | 1465 | } else |
| 1466 | if (type & SSL_kEECDH) { | 1466 | if (type & SSL_kECDHE) { |
| 1467 | const EC_GROUP *group; | 1467 | const EC_GROUP *group; |
| 1468 | 1468 | ||
| 1469 | ecdhp = cert->ecdh_tmp; | 1469 | ecdhp = cert->ecdh_tmp; |
| @@ -1614,7 +1614,7 @@ ssl3_send_server_key_exchange(SSL *s) | |||
| 1614 | p += nr[i]; | 1614 | p += nr[i]; |
| 1615 | } | 1615 | } |
| 1616 | 1616 | ||
| 1617 | if (type & SSL_kEECDH) { | 1617 | if (type & SSL_kECDHE) { |
| 1618 | /* | 1618 | /* |
| 1619 | * XXX: For now, we only support named (not generic) | 1619 | * XXX: For now, we only support named (not generic) |
| 1620 | * curves. | 1620 | * curves. |
| @@ -1968,7 +1968,7 @@ ssl3_get_client_key_exchange(SSL *s) | |||
| 1968 | p, i); | 1968 | p, i); |
| 1969 | OPENSSL_cleanse(p, i); | 1969 | OPENSSL_cleanse(p, i); |
| 1970 | } else | 1970 | } else |
| 1971 | if (alg_k & (SSL_kEDH|SSL_kDHr|SSL_kDHd)) { | 1971 | if (alg_k & (SSL_kDHE|SSL_kDHr|SSL_kDHd)) { |
| 1972 | if (2 > n) | 1972 | if (2 > n) |
| 1973 | goto truncated; | 1973 | goto truncated; |
| 1974 | n2s(p, i); | 1974 | n2s(p, i); |
| @@ -2026,7 +2026,7 @@ ssl3_get_client_key_exchange(SSL *s) | |||
| 2026 | OPENSSL_cleanse(p, i); | 2026 | OPENSSL_cleanse(p, i); |
| 2027 | } else | 2027 | } else |
| 2028 | 2028 | ||
| 2029 | if (alg_k & (SSL_kEECDH|SSL_kECDHr|SSL_kECDHe)) { | 2029 | if (alg_k & (SSL_kECDHE|SSL_kECDHr|SSL_kECDHe)) { |
| 2030 | int ret = 1; | 2030 | int ret = 1; |
| 2031 | int field_size = 0; | 2031 | int field_size = 0; |
| 2032 | const EC_KEY *tkey; | 2032 | const EC_KEY *tkey; |
| @@ -2072,7 +2072,7 @@ ssl3_get_client_key_exchange(SSL *s) | |||
| 2072 | if (n == 0L) { | 2072 | if (n == 0L) { |
| 2073 | /* Client Publickey was in Client Certificate */ | 2073 | /* Client Publickey was in Client Certificate */ |
| 2074 | 2074 | ||
| 2075 | if (alg_k & SSL_kEECDH) { | 2075 | if (alg_k & SSL_kECDHE) { |
| 2076 | al = SSL_AD_HANDSHAKE_FAILURE; | 2076 | al = SSL_AD_HANDSHAKE_FAILURE; |
| 2077 | SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE, | 2077 | SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE, |
| 2078 | SSL_R_MISSING_TMP_ECDH_KEY); | 2078 | SSL_R_MISSING_TMP_ECDH_KEY); |
diff --git a/src/lib/libssl/src/ssl/d1_clnt.c b/src/lib/libssl/src/ssl/d1_clnt.c index 004fd6e04f..552667f6c1 100644 --- a/src/lib/libssl/src/ssl/d1_clnt.c +++ b/src/lib/libssl/src/ssl/d1_clnt.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: d1_clnt.c,v 1.30 2014/07/12 13:11:53 jsing Exp $ */ | 1 | /* $OpenBSD: d1_clnt.c,v 1.31 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * DTLS implementation written by Nagendra Modadugu | 3 | * DTLS implementation written by Nagendra Modadugu |
| 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. | 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. |
| @@ -984,7 +984,7 @@ dtls1_send_client_key_exchange(SSL *s) | |||
| 984 | s->session->master_key, | 984 | s->session->master_key, |
| 985 | tmp_buf, sizeof tmp_buf); | 985 | tmp_buf, sizeof tmp_buf); |
| 986 | OPENSSL_cleanse(tmp_buf, sizeof tmp_buf); | 986 | OPENSSL_cleanse(tmp_buf, sizeof tmp_buf); |
| 987 | } else if (alg_k & (SSL_kEDH|SSL_kDHr|SSL_kDHd)) { | 987 | } else if (alg_k & (SSL_kDHE|SSL_kDHr|SSL_kDHd)) { |
| 988 | DH *dh_srvr, *dh_clnt; | 988 | DH *dh_srvr, *dh_clnt; |
| 989 | 989 | ||
| 990 | if (s->session->sess_cert->peer_dh_tmp != NULL) | 990 | if (s->session->sess_cert->peer_dh_tmp != NULL) |
| @@ -1037,7 +1037,7 @@ dtls1_send_client_key_exchange(SSL *s) | |||
| 1037 | DH_free(dh_clnt); | 1037 | DH_free(dh_clnt); |
| 1038 | 1038 | ||
| 1039 | /* perhaps clean things up a bit EAY EAY EAY EAY*/ | 1039 | /* perhaps clean things up a bit EAY EAY EAY EAY*/ |
| 1040 | } else if (alg_k & (SSL_kEECDH|SSL_kECDHr|SSL_kECDHe)) { | 1040 | } else if (alg_k & (SSL_kECDHE|SSL_kECDHr|SSL_kECDHe)) { |
| 1041 | const EC_GROUP *srvr_group = NULL; | 1041 | const EC_GROUP *srvr_group = NULL; |
| 1042 | EC_KEY *tkey; | 1042 | EC_KEY *tkey; |
| 1043 | int ecdh_clnt_cert = 0; | 1043 | int ecdh_clnt_cert = 0; |
diff --git a/src/lib/libssl/src/ssl/d1_srvr.c b/src/lib/libssl/src/ssl/d1_srvr.c index a94b7ed61b..ecf4a198b1 100644 --- a/src/lib/libssl/src/ssl/d1_srvr.c +++ b/src/lib/libssl/src/ssl/d1_srvr.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: d1_srvr.c,v 1.32 2014/07/12 13:11:53 jsing Exp $ */ | 1 | /* $OpenBSD: d1_srvr.c,v 1.33 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * DTLS implementation written by Nagendra Modadugu | 3 | * DTLS implementation written by Nagendra Modadugu |
| 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. | 4 | * (nagendra@cs.stanford.edu) for the OpenSSL project 2005. |
| @@ -464,8 +464,8 @@ dtls1_accept(SSL *s) | |||
| 464 | /* only send if a DH key exchange or | 464 | /* only send if a DH key exchange or |
| 465 | * RSA but we have a sign only certificate */ | 465 | * RSA but we have a sign only certificate */ |
| 466 | if (s->s3->tmp.use_rsa_tmp | 466 | if (s->s3->tmp.use_rsa_tmp |
| 467 | || (alg_k & (SSL_kEDH|SSL_kDHr|SSL_kDHd)) | 467 | || (alg_k & (SSL_kDHE|SSL_kDHr|SSL_kDHd)) |
| 468 | || (alg_k & SSL_kEECDH) | 468 | || (alg_k & SSL_kECDHE) |
| 469 | || ((alg_k & SSL_kRSA) | 469 | || ((alg_k & SSL_kRSA) |
| 470 | && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL | 470 | && (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == NULL |
| 471 | ) | 471 | ) |
| @@ -1052,7 +1052,7 @@ dtls1_send_server_key_exchange(SSL *s) | |||
| 1052 | r[1] = rsa->e; | 1052 | r[1] = rsa->e; |
| 1053 | s->s3->tmp.use_rsa_tmp = 1; | 1053 | s->s3->tmp.use_rsa_tmp = 1; |
| 1054 | } else | 1054 | } else |
| 1055 | if (type & SSL_kEDH) { | 1055 | if (type & SSL_kDHE) { |
| 1056 | dhp = cert->dh_tmp; | 1056 | dhp = cert->dh_tmp; |
| 1057 | if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL)) | 1057 | if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL)) |
| 1058 | dhp = s->cert->dh_tmp_cb(s, 0, 0); | 1058 | dhp = s->cert->dh_tmp_cb(s, 0, 0); |
| @@ -1094,7 +1094,7 @@ dtls1_send_server_key_exchange(SSL *s) | |||
| 1094 | r[1] = dh->g; | 1094 | r[1] = dh->g; |
| 1095 | r[2] = dh->pub_key; | 1095 | r[2] = dh->pub_key; |
| 1096 | } else | 1096 | } else |
| 1097 | if (type & SSL_kEECDH) { | 1097 | if (type & SSL_kECDHE) { |
| 1098 | const EC_GROUP *group; | 1098 | const EC_GROUP *group; |
| 1099 | 1099 | ||
| 1100 | ecdhp = cert->ecdh_tmp; | 1100 | ecdhp = cert->ecdh_tmp; |
| @@ -1232,7 +1232,7 @@ dtls1_send_server_key_exchange(SSL *s) | |||
| 1232 | p += nr[i]; | 1232 | p += nr[i]; |
| 1233 | } | 1233 | } |
| 1234 | 1234 | ||
| 1235 | if (type & SSL_kEECDH) { | 1235 | if (type & SSL_kECDHE) { |
| 1236 | /* XXX: For now, we only support named (not generic) curves. | 1236 | /* XXX: For now, we only support named (not generic) curves. |
| 1237 | * In this situation, the serverKeyExchange message has: | 1237 | * In this situation, the serverKeyExchange message has: |
| 1238 | * [1 byte CurveType], [2 byte CurveName] | 1238 | * [1 byte CurveType], [2 byte CurveName] |
diff --git a/src/lib/libssl/src/ssl/s3_clnt.c b/src/lib/libssl/src/ssl/s3_clnt.c index 252100f587..b55b2e62c6 100644 --- a/src/lib/libssl/src/ssl/s3_clnt.c +++ b/src/lib/libssl/src/ssl/s3_clnt.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s3_clnt.c,v 1.82 2014/07/12 22:17:59 jsg Exp $ */ | 1 | /* $OpenBSD: s3_clnt.c,v 1.83 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -1253,7 +1253,7 @@ ssl3_get_key_exchange(SSL *s) | |||
| 1253 | } | 1253 | } |
| 1254 | s->session->sess_cert->peer_rsa_tmp = rsa; | 1254 | s->session->sess_cert->peer_rsa_tmp = rsa; |
| 1255 | rsa = NULL; | 1255 | rsa = NULL; |
| 1256 | } else if (alg_k & SSL_kEDH) { | 1256 | } else if (alg_k & SSL_kDHE) { |
| 1257 | if ((dh = DH_new()) == NULL) { | 1257 | if ((dh = DH_new()) == NULL) { |
| 1258 | SSLerr(SSL_F_SSL3_GET_KEY_EXCHANGE, | 1258 | SSLerr(SSL_F_SSL3_GET_KEY_EXCHANGE, |
| 1259 | ERR_R_DH_LIB); | 1259 | ERR_R_DH_LIB); |
| @@ -1328,7 +1328,7 @@ ssl3_get_key_exchange(SSL *s) | |||
| 1328 | SSLerr(SSL_F_SSL3_GET_KEY_EXCHANGE, | 1328 | SSLerr(SSL_F_SSL3_GET_KEY_EXCHANGE, |
| 1329 | SSL_R_TRIED_TO_USE_UNSUPPORTED_CIPHER); | 1329 | SSL_R_TRIED_TO_USE_UNSUPPORTED_CIPHER); |
| 1330 | goto f_err; | 1330 | goto f_err; |
| 1331 | } else if (alg_k & SSL_kEECDH) { | 1331 | } else if (alg_k & SSL_kECDHE) { |
| 1332 | EC_GROUP *ngroup; | 1332 | EC_GROUP *ngroup; |
| 1333 | const EC_GROUP *group; | 1333 | const EC_GROUP *group; |
| 1334 | 1334 | ||
| @@ -1987,7 +1987,7 @@ ssl3_send_client_key_exchange(SSL *s) | |||
| 1987 | s->method->ssl3_enc->generate_master_secret( | 1987 | s->method->ssl3_enc->generate_master_secret( |
| 1988 | s, s->session->master_key, tmp_buf, sizeof tmp_buf); | 1988 | s, s->session->master_key, tmp_buf, sizeof tmp_buf); |
| 1989 | OPENSSL_cleanse(tmp_buf, sizeof tmp_buf); | 1989 | OPENSSL_cleanse(tmp_buf, sizeof tmp_buf); |
| 1990 | } else if (alg_k & (SSL_kEDH|SSL_kDHr|SSL_kDHd)) { | 1990 | } else if (alg_k & (SSL_kDHE|SSL_kDHr|SSL_kDHd)) { |
| 1991 | DH *dh_srvr, *dh_clnt; | 1991 | DH *dh_srvr, *dh_clnt; |
| 1992 | 1992 | ||
| 1993 | if (s->session->sess_cert == NULL) { | 1993 | if (s->session->sess_cert == NULL) { |
| @@ -2051,7 +2051,7 @@ ssl3_send_client_key_exchange(SSL *s) | |||
| 2051 | DH_free(dh_clnt); | 2051 | DH_free(dh_clnt); |
| 2052 | 2052 | ||
| 2053 | /* perhaps clean things up a bit EAY EAY EAY EAY*/ | 2053 | /* perhaps clean things up a bit EAY EAY EAY EAY*/ |
| 2054 | } else if (alg_k & (SSL_kEECDH|SSL_kECDHr|SSL_kECDHe)) { | 2054 | } else if (alg_k & (SSL_kECDHE|SSL_kECDHr|SSL_kECDHe)) { |
| 2055 | const EC_GROUP *srvr_group = NULL; | 2055 | const EC_GROUP *srvr_group = NULL; |
| 2056 | EC_KEY *tkey; | 2056 | EC_KEY *tkey; |
| 2057 | int ecdh_clnt_cert = 0; | 2057 | int ecdh_clnt_cert = 0; |
| @@ -2640,7 +2640,7 @@ ssl3_check_cert_and_algorithm(SSL *s) | |||
| 2640 | SSL_R_MISSING_RSA_ENCRYPTING_CERT); | 2640 | SSL_R_MISSING_RSA_ENCRYPTING_CERT); |
| 2641 | goto f_err; | 2641 | goto f_err; |
| 2642 | } | 2642 | } |
| 2643 | if ((alg_k & SSL_kEDH) && | 2643 | if ((alg_k & SSL_kDHE) && |
| 2644 | !(has_bits(i, EVP_PK_DH|EVP_PKT_EXCH) || (dh != NULL))) { | 2644 | !(has_bits(i, EVP_PK_DH|EVP_PKT_EXCH) || (dh != NULL))) { |
| 2645 | SSLerr(SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM, | 2645 | SSLerr(SSL_F_SSL3_CHECK_CERT_AND_ALGORITHM, |
| 2646 | SSL_R_MISSING_DH_KEY); | 2646 | SSL_R_MISSING_DH_KEY); |
diff --git a/src/lib/libssl/src/ssl/s3_lib.c b/src/lib/libssl/src/ssl/s3_lib.c index f94e207fc4..decdda90a3 100644 --- a/src/lib/libssl/src/ssl/s3_lib.c +++ b/src/lib/libssl/src/ssl/s3_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s3_lib.c,v 1.69 2014/07/11 09:24:44 beck Exp $ */ | 1 | /* $OpenBSD: s3_lib.c,v 1.70 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -433,7 +433,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 433 | .valid = 0, /* Weakened 40-bit export cipher. */ | 433 | .valid = 0, /* Weakened 40-bit export cipher. */ |
| 434 | .name = SSL3_TXT_EDH_DSS_DES_40_CBC_SHA, | 434 | .name = SSL3_TXT_EDH_DSS_DES_40_CBC_SHA, |
| 435 | .id = SSL3_CK_EDH_DSS_DES_40_CBC_SHA, | 435 | .id = SSL3_CK_EDH_DSS_DES_40_CBC_SHA, |
| 436 | .algorithm_mkey = SSL_kEDH, | 436 | .algorithm_mkey = SSL_kDHE, |
| 437 | .algorithm_auth = SSL_aDSS, | 437 | .algorithm_auth = SSL_aDSS, |
| 438 | .algorithm_enc = SSL_DES, | 438 | .algorithm_enc = SSL_DES, |
| 439 | .algorithm_mac = SSL_SHA1, | 439 | .algorithm_mac = SSL_SHA1, |
| @@ -449,7 +449,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 449 | .valid = 1, | 449 | .valid = 1, |
| 450 | .name = SSL3_TXT_EDH_DSS_DES_64_CBC_SHA, | 450 | .name = SSL3_TXT_EDH_DSS_DES_64_CBC_SHA, |
| 451 | .id = SSL3_CK_EDH_DSS_DES_64_CBC_SHA, | 451 | .id = SSL3_CK_EDH_DSS_DES_64_CBC_SHA, |
| 452 | .algorithm_mkey = SSL_kEDH, | 452 | .algorithm_mkey = SSL_kDHE, |
| 453 | .algorithm_auth = SSL_aDSS, | 453 | .algorithm_auth = SSL_aDSS, |
| 454 | .algorithm_enc = SSL_DES, | 454 | .algorithm_enc = SSL_DES, |
| 455 | .algorithm_mac = SSL_SHA1, | 455 | .algorithm_mac = SSL_SHA1, |
| @@ -465,7 +465,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 465 | .valid = 1, | 465 | .valid = 1, |
| 466 | .name = SSL3_TXT_EDH_DSS_DES_192_CBC3_SHA, | 466 | .name = SSL3_TXT_EDH_DSS_DES_192_CBC3_SHA, |
| 467 | .id = SSL3_CK_EDH_DSS_DES_192_CBC3_SHA, | 467 | .id = SSL3_CK_EDH_DSS_DES_192_CBC3_SHA, |
| 468 | .algorithm_mkey = SSL_kEDH, | 468 | .algorithm_mkey = SSL_kDHE, |
| 469 | .algorithm_auth = SSL_aDSS, | 469 | .algorithm_auth = SSL_aDSS, |
| 470 | .algorithm_enc = SSL_3DES, | 470 | .algorithm_enc = SSL_3DES, |
| 471 | .algorithm_mac = SSL_SHA1, | 471 | .algorithm_mac = SSL_SHA1, |
| @@ -481,7 +481,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 481 | .valid = 0, /* Weakened 40-bit export cipher. */ | 481 | .valid = 0, /* Weakened 40-bit export cipher. */ |
| 482 | .name = SSL3_TXT_EDH_RSA_DES_40_CBC_SHA, | 482 | .name = SSL3_TXT_EDH_RSA_DES_40_CBC_SHA, |
| 483 | .id = SSL3_CK_EDH_RSA_DES_40_CBC_SHA, | 483 | .id = SSL3_CK_EDH_RSA_DES_40_CBC_SHA, |
| 484 | .algorithm_mkey = SSL_kEDH, | 484 | .algorithm_mkey = SSL_kDHE, |
| 485 | .algorithm_auth = SSL_aRSA, | 485 | .algorithm_auth = SSL_aRSA, |
| 486 | .algorithm_enc = SSL_DES, | 486 | .algorithm_enc = SSL_DES, |
| 487 | .algorithm_mac = SSL_SHA1, | 487 | .algorithm_mac = SSL_SHA1, |
| @@ -497,7 +497,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 497 | .valid = 1, | 497 | .valid = 1, |
| 498 | .name = SSL3_TXT_EDH_RSA_DES_64_CBC_SHA, | 498 | .name = SSL3_TXT_EDH_RSA_DES_64_CBC_SHA, |
| 499 | .id = SSL3_CK_EDH_RSA_DES_64_CBC_SHA, | 499 | .id = SSL3_CK_EDH_RSA_DES_64_CBC_SHA, |
| 500 | .algorithm_mkey = SSL_kEDH, | 500 | .algorithm_mkey = SSL_kDHE, |
| 501 | .algorithm_auth = SSL_aRSA, | 501 | .algorithm_auth = SSL_aRSA, |
| 502 | .algorithm_enc = SSL_DES, | 502 | .algorithm_enc = SSL_DES, |
| 503 | .algorithm_mac = SSL_SHA1, | 503 | .algorithm_mac = SSL_SHA1, |
| @@ -513,7 +513,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 513 | .valid = 1, | 513 | .valid = 1, |
| 514 | .name = SSL3_TXT_EDH_RSA_DES_192_CBC3_SHA, | 514 | .name = SSL3_TXT_EDH_RSA_DES_192_CBC3_SHA, |
| 515 | .id = SSL3_CK_EDH_RSA_DES_192_CBC3_SHA, | 515 | .id = SSL3_CK_EDH_RSA_DES_192_CBC3_SHA, |
| 516 | .algorithm_mkey = SSL_kEDH, | 516 | .algorithm_mkey = SSL_kDHE, |
| 517 | .algorithm_auth = SSL_aRSA, | 517 | .algorithm_auth = SSL_aRSA, |
| 518 | .algorithm_enc = SSL_3DES, | 518 | .algorithm_enc = SSL_3DES, |
| 519 | .algorithm_mac = SSL_SHA1, | 519 | .algorithm_mac = SSL_SHA1, |
| @@ -529,7 +529,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 529 | .valid = 0, /* Weakened 40-bit export cipher. */ | 529 | .valid = 0, /* Weakened 40-bit export cipher. */ |
| 530 | .name = SSL3_TXT_ADH_RC4_40_MD5, | 530 | .name = SSL3_TXT_ADH_RC4_40_MD5, |
| 531 | .id = SSL3_CK_ADH_RC4_40_MD5, | 531 | .id = SSL3_CK_ADH_RC4_40_MD5, |
| 532 | .algorithm_mkey = SSL_kEDH, | 532 | .algorithm_mkey = SSL_kDHE, |
| 533 | .algorithm_auth = SSL_aNULL, | 533 | .algorithm_auth = SSL_aNULL, |
| 534 | .algorithm_enc = SSL_RC4, | 534 | .algorithm_enc = SSL_RC4, |
| 535 | .algorithm_mac = SSL_MD5, | 535 | .algorithm_mac = SSL_MD5, |
| @@ -545,7 +545,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 545 | .valid = 1, | 545 | .valid = 1, |
| 546 | .name = SSL3_TXT_ADH_RC4_128_MD5, | 546 | .name = SSL3_TXT_ADH_RC4_128_MD5, |
| 547 | .id = SSL3_CK_ADH_RC4_128_MD5, | 547 | .id = SSL3_CK_ADH_RC4_128_MD5, |
| 548 | .algorithm_mkey = SSL_kEDH, | 548 | .algorithm_mkey = SSL_kDHE, |
| 549 | .algorithm_auth = SSL_aNULL, | 549 | .algorithm_auth = SSL_aNULL, |
| 550 | .algorithm_enc = SSL_RC4, | 550 | .algorithm_enc = SSL_RC4, |
| 551 | .algorithm_mac = SSL_MD5, | 551 | .algorithm_mac = SSL_MD5, |
| @@ -561,7 +561,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 561 | .valid = 0, /* Weakened 40-bit export cipher. */ | 561 | .valid = 0, /* Weakened 40-bit export cipher. */ |
| 562 | .name = SSL3_TXT_ADH_DES_40_CBC_SHA, | 562 | .name = SSL3_TXT_ADH_DES_40_CBC_SHA, |
| 563 | .id = SSL3_CK_ADH_DES_40_CBC_SHA, | 563 | .id = SSL3_CK_ADH_DES_40_CBC_SHA, |
| 564 | .algorithm_mkey = SSL_kEDH, | 564 | .algorithm_mkey = SSL_kDHE, |
| 565 | .algorithm_auth = SSL_aNULL, | 565 | .algorithm_auth = SSL_aNULL, |
| 566 | .algorithm_enc = SSL_DES, | 566 | .algorithm_enc = SSL_DES, |
| 567 | .algorithm_mac = SSL_SHA1, | 567 | .algorithm_mac = SSL_SHA1, |
| @@ -577,7 +577,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 577 | .valid = 1, | 577 | .valid = 1, |
| 578 | .name = SSL3_TXT_ADH_DES_64_CBC_SHA, | 578 | .name = SSL3_TXT_ADH_DES_64_CBC_SHA, |
| 579 | .id = SSL3_CK_ADH_DES_64_CBC_SHA, | 579 | .id = SSL3_CK_ADH_DES_64_CBC_SHA, |
| 580 | .algorithm_mkey = SSL_kEDH, | 580 | .algorithm_mkey = SSL_kDHE, |
| 581 | .algorithm_auth = SSL_aNULL, | 581 | .algorithm_auth = SSL_aNULL, |
| 582 | .algorithm_enc = SSL_DES, | 582 | .algorithm_enc = SSL_DES, |
| 583 | .algorithm_mac = SSL_SHA1, | 583 | .algorithm_mac = SSL_SHA1, |
| @@ -593,7 +593,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 593 | .valid = 1, | 593 | .valid = 1, |
| 594 | .name = SSL3_TXT_ADH_DES_192_CBC_SHA, | 594 | .name = SSL3_TXT_ADH_DES_192_CBC_SHA, |
| 595 | .id = SSL3_CK_ADH_DES_192_CBC_SHA, | 595 | .id = SSL3_CK_ADH_DES_192_CBC_SHA, |
| 596 | .algorithm_mkey = SSL_kEDH, | 596 | .algorithm_mkey = SSL_kDHE, |
| 597 | .algorithm_auth = SSL_aNULL, | 597 | .algorithm_auth = SSL_aNULL, |
| 598 | .algorithm_enc = SSL_3DES, | 598 | .algorithm_enc = SSL_3DES, |
| 599 | .algorithm_mac = SSL_SHA1, | 599 | .algorithm_mac = SSL_SHA1, |
| @@ -655,7 +655,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 655 | .valid = 1, | 655 | .valid = 1, |
| 656 | .name = TLS1_TXT_DHE_DSS_WITH_AES_128_SHA, | 656 | .name = TLS1_TXT_DHE_DSS_WITH_AES_128_SHA, |
| 657 | .id = TLS1_CK_DHE_DSS_WITH_AES_128_SHA, | 657 | .id = TLS1_CK_DHE_DSS_WITH_AES_128_SHA, |
| 658 | .algorithm_mkey = SSL_kEDH, | 658 | .algorithm_mkey = SSL_kDHE, |
| 659 | .algorithm_auth = SSL_aDSS, | 659 | .algorithm_auth = SSL_aDSS, |
| 660 | .algorithm_enc = SSL_AES128, | 660 | .algorithm_enc = SSL_AES128, |
| 661 | .algorithm_mac = SSL_SHA1, | 661 | .algorithm_mac = SSL_SHA1, |
| @@ -670,7 +670,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 670 | .valid = 1, | 670 | .valid = 1, |
| 671 | .name = TLS1_TXT_DHE_RSA_WITH_AES_128_SHA, | 671 | .name = TLS1_TXT_DHE_RSA_WITH_AES_128_SHA, |
| 672 | .id = TLS1_CK_DHE_RSA_WITH_AES_128_SHA, | 672 | .id = TLS1_CK_DHE_RSA_WITH_AES_128_SHA, |
| 673 | .algorithm_mkey = SSL_kEDH, | 673 | .algorithm_mkey = SSL_kDHE, |
| 674 | .algorithm_auth = SSL_aRSA, | 674 | .algorithm_auth = SSL_aRSA, |
| 675 | .algorithm_enc = SSL_AES128, | 675 | .algorithm_enc = SSL_AES128, |
| 676 | .algorithm_mac = SSL_SHA1, | 676 | .algorithm_mac = SSL_SHA1, |
| @@ -685,7 +685,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 685 | .valid = 1, | 685 | .valid = 1, |
| 686 | .name = TLS1_TXT_ADH_WITH_AES_128_SHA, | 686 | .name = TLS1_TXT_ADH_WITH_AES_128_SHA, |
| 687 | .id = TLS1_CK_ADH_WITH_AES_128_SHA, | 687 | .id = TLS1_CK_ADH_WITH_AES_128_SHA, |
| 688 | .algorithm_mkey = SSL_kEDH, | 688 | .algorithm_mkey = SSL_kDHE, |
| 689 | .algorithm_auth = SSL_aNULL, | 689 | .algorithm_auth = SSL_aNULL, |
| 690 | .algorithm_enc = SSL_AES128, | 690 | .algorithm_enc = SSL_AES128, |
| 691 | .algorithm_mac = SSL_SHA1, | 691 | .algorithm_mac = SSL_SHA1, |
| @@ -748,7 +748,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 748 | .valid = 1, | 748 | .valid = 1, |
| 749 | .name = TLS1_TXT_DHE_DSS_WITH_AES_256_SHA, | 749 | .name = TLS1_TXT_DHE_DSS_WITH_AES_256_SHA, |
| 750 | .id = TLS1_CK_DHE_DSS_WITH_AES_256_SHA, | 750 | .id = TLS1_CK_DHE_DSS_WITH_AES_256_SHA, |
| 751 | .algorithm_mkey = SSL_kEDH, | 751 | .algorithm_mkey = SSL_kDHE, |
| 752 | .algorithm_auth = SSL_aDSS, | 752 | .algorithm_auth = SSL_aDSS, |
| 753 | .algorithm_enc = SSL_AES256, | 753 | .algorithm_enc = SSL_AES256, |
| 754 | .algorithm_mac = SSL_SHA1, | 754 | .algorithm_mac = SSL_SHA1, |
| @@ -764,7 +764,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 764 | .valid = 1, | 764 | .valid = 1, |
| 765 | .name = TLS1_TXT_DHE_RSA_WITH_AES_256_SHA, | 765 | .name = TLS1_TXT_DHE_RSA_WITH_AES_256_SHA, |
| 766 | .id = TLS1_CK_DHE_RSA_WITH_AES_256_SHA, | 766 | .id = TLS1_CK_DHE_RSA_WITH_AES_256_SHA, |
| 767 | .algorithm_mkey = SSL_kEDH, | 767 | .algorithm_mkey = SSL_kDHE, |
| 768 | .algorithm_auth = SSL_aRSA, | 768 | .algorithm_auth = SSL_aRSA, |
| 769 | .algorithm_enc = SSL_AES256, | 769 | .algorithm_enc = SSL_AES256, |
| 770 | .algorithm_mac = SSL_SHA1, | 770 | .algorithm_mac = SSL_SHA1, |
| @@ -780,7 +780,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 780 | .valid = 1, | 780 | .valid = 1, |
| 781 | .name = TLS1_TXT_ADH_WITH_AES_256_SHA, | 781 | .name = TLS1_TXT_ADH_WITH_AES_256_SHA, |
| 782 | .id = TLS1_CK_ADH_WITH_AES_256_SHA, | 782 | .id = TLS1_CK_ADH_WITH_AES_256_SHA, |
| 783 | .algorithm_mkey = SSL_kEDH, | 783 | .algorithm_mkey = SSL_kDHE, |
| 784 | .algorithm_auth = SSL_aNULL, | 784 | .algorithm_auth = SSL_aNULL, |
| 785 | .algorithm_enc = SSL_AES256, | 785 | .algorithm_enc = SSL_AES256, |
| 786 | .algorithm_mac = SSL_SHA1, | 786 | .algorithm_mac = SSL_SHA1, |
| @@ -877,7 +877,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 877 | .valid = 1, | 877 | .valid = 1, |
| 878 | .name = TLS1_TXT_DHE_DSS_WITH_AES_128_SHA256, | 878 | .name = TLS1_TXT_DHE_DSS_WITH_AES_128_SHA256, |
| 879 | .id = TLS1_CK_DHE_DSS_WITH_AES_128_SHA256, | 879 | .id = TLS1_CK_DHE_DSS_WITH_AES_128_SHA256, |
| 880 | .algorithm_mkey = SSL_kEDH, | 880 | .algorithm_mkey = SSL_kDHE, |
| 881 | .algorithm_auth = SSL_aDSS, | 881 | .algorithm_auth = SSL_aDSS, |
| 882 | .algorithm_enc = SSL_AES128, | 882 | .algorithm_enc = SSL_AES128, |
| 883 | .algorithm_mac = SSL_SHA256, | 883 | .algorithm_mac = SSL_SHA256, |
| @@ -944,7 +944,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 944 | .valid = 1, | 944 | .valid = 1, |
| 945 | .name = TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, | 945 | .name = TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, |
| 946 | .id = TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, | 946 | .id = TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, |
| 947 | .algorithm_mkey = SSL_kEDH, | 947 | .algorithm_mkey = SSL_kDHE, |
| 948 | .algorithm_auth = SSL_aDSS, | 948 | .algorithm_auth = SSL_aDSS, |
| 949 | .algorithm_enc = SSL_CAMELLIA128, | 949 | .algorithm_enc = SSL_CAMELLIA128, |
| 950 | .algorithm_mac = SSL_SHA1, | 950 | .algorithm_mac = SSL_SHA1, |
| @@ -960,7 +960,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 960 | .valid = 1, | 960 | .valid = 1, |
| 961 | .name = TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, | 961 | .name = TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, |
| 962 | .id = TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, | 962 | .id = TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, |
| 963 | .algorithm_mkey = SSL_kEDH, | 963 | .algorithm_mkey = SSL_kDHE, |
| 964 | .algorithm_auth = SSL_aRSA, | 964 | .algorithm_auth = SSL_aRSA, |
| 965 | .algorithm_enc = SSL_CAMELLIA128, | 965 | .algorithm_enc = SSL_CAMELLIA128, |
| 966 | .algorithm_mac = SSL_SHA1, | 966 | .algorithm_mac = SSL_SHA1, |
| @@ -976,7 +976,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 976 | .valid = 1, | 976 | .valid = 1, |
| 977 | .name = TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA, | 977 | .name = TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA, |
| 978 | .id = TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA, | 978 | .id = TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA, |
| 979 | .algorithm_mkey = SSL_kEDH, | 979 | .algorithm_mkey = SSL_kDHE, |
| 980 | .algorithm_auth = SSL_aNULL, | 980 | .algorithm_auth = SSL_aNULL, |
| 981 | .algorithm_enc = SSL_CAMELLIA128, | 981 | .algorithm_enc = SSL_CAMELLIA128, |
| 982 | .algorithm_mac = SSL_SHA1, | 982 | .algorithm_mac = SSL_SHA1, |
| @@ -994,7 +994,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 994 | .valid = 1, | 994 | .valid = 1, |
| 995 | .name = TLS1_TXT_DHE_RSA_WITH_AES_128_SHA256, | 995 | .name = TLS1_TXT_DHE_RSA_WITH_AES_128_SHA256, |
| 996 | .id = TLS1_CK_DHE_RSA_WITH_AES_128_SHA256, | 996 | .id = TLS1_CK_DHE_RSA_WITH_AES_128_SHA256, |
| 997 | .algorithm_mkey = SSL_kEDH, | 997 | .algorithm_mkey = SSL_kDHE, |
| 998 | .algorithm_auth = SSL_aRSA, | 998 | .algorithm_auth = SSL_aRSA, |
| 999 | .algorithm_enc = SSL_AES128, | 999 | .algorithm_enc = SSL_AES128, |
| 1000 | .algorithm_mac = SSL_SHA256, | 1000 | .algorithm_mac = SSL_SHA256, |
| @@ -1042,7 +1042,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1042 | .valid = 1, | 1042 | .valid = 1, |
| 1043 | .name = TLS1_TXT_DHE_DSS_WITH_AES_256_SHA256, | 1043 | .name = TLS1_TXT_DHE_DSS_WITH_AES_256_SHA256, |
| 1044 | .id = TLS1_CK_DHE_DSS_WITH_AES_256_SHA256, | 1044 | .id = TLS1_CK_DHE_DSS_WITH_AES_256_SHA256, |
| 1045 | .algorithm_mkey = SSL_kEDH, | 1045 | .algorithm_mkey = SSL_kDHE, |
| 1046 | .algorithm_auth = SSL_aDSS, | 1046 | .algorithm_auth = SSL_aDSS, |
| 1047 | .algorithm_enc = SSL_AES256, | 1047 | .algorithm_enc = SSL_AES256, |
| 1048 | .algorithm_mac = SSL_SHA256, | 1048 | .algorithm_mac = SSL_SHA256, |
| @@ -1058,7 +1058,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1058 | .valid = 1, | 1058 | .valid = 1, |
| 1059 | .name = TLS1_TXT_DHE_RSA_WITH_AES_256_SHA256, | 1059 | .name = TLS1_TXT_DHE_RSA_WITH_AES_256_SHA256, |
| 1060 | .id = TLS1_CK_DHE_RSA_WITH_AES_256_SHA256, | 1060 | .id = TLS1_CK_DHE_RSA_WITH_AES_256_SHA256, |
| 1061 | .algorithm_mkey = SSL_kEDH, | 1061 | .algorithm_mkey = SSL_kDHE, |
| 1062 | .algorithm_auth = SSL_aRSA, | 1062 | .algorithm_auth = SSL_aRSA, |
| 1063 | .algorithm_enc = SSL_AES256, | 1063 | .algorithm_enc = SSL_AES256, |
| 1064 | .algorithm_mac = SSL_SHA256, | 1064 | .algorithm_mac = SSL_SHA256, |
| @@ -1074,7 +1074,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1074 | .valid = 1, | 1074 | .valid = 1, |
| 1075 | .name = TLS1_TXT_ADH_WITH_AES_128_SHA256, | 1075 | .name = TLS1_TXT_ADH_WITH_AES_128_SHA256, |
| 1076 | .id = TLS1_CK_ADH_WITH_AES_128_SHA256, | 1076 | .id = TLS1_CK_ADH_WITH_AES_128_SHA256, |
| 1077 | .algorithm_mkey = SSL_kEDH, | 1077 | .algorithm_mkey = SSL_kDHE, |
| 1078 | .algorithm_auth = SSL_aNULL, | 1078 | .algorithm_auth = SSL_aNULL, |
| 1079 | .algorithm_enc = SSL_AES128, | 1079 | .algorithm_enc = SSL_AES128, |
| 1080 | .algorithm_mac = SSL_SHA256, | 1080 | .algorithm_mac = SSL_SHA256, |
| @@ -1090,7 +1090,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1090 | .valid = 1, | 1090 | .valid = 1, |
| 1091 | .name = TLS1_TXT_ADH_WITH_AES_256_SHA256, | 1091 | .name = TLS1_TXT_ADH_WITH_AES_256_SHA256, |
| 1092 | .id = TLS1_CK_ADH_WITH_AES_256_SHA256, | 1092 | .id = TLS1_CK_ADH_WITH_AES_256_SHA256, |
| 1093 | .algorithm_mkey = SSL_kEDH, | 1093 | .algorithm_mkey = SSL_kDHE, |
| 1094 | .algorithm_auth = SSL_aNULL, | 1094 | .algorithm_auth = SSL_aNULL, |
| 1095 | .algorithm_enc = SSL_AES256, | 1095 | .algorithm_enc = SSL_AES256, |
| 1096 | .algorithm_mac = SSL_SHA256, | 1096 | .algorithm_mac = SSL_SHA256, |
| @@ -1218,7 +1218,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1218 | .valid = 1, | 1218 | .valid = 1, |
| 1219 | .name = TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, | 1219 | .name = TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, |
| 1220 | .id = TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, | 1220 | .id = TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, |
| 1221 | .algorithm_mkey = SSL_kEDH, | 1221 | .algorithm_mkey = SSL_kDHE, |
| 1222 | .algorithm_auth = SSL_aDSS, | 1222 | .algorithm_auth = SSL_aDSS, |
| 1223 | .algorithm_enc = SSL_CAMELLIA256, | 1223 | .algorithm_enc = SSL_CAMELLIA256, |
| 1224 | .algorithm_mac = SSL_SHA1, | 1224 | .algorithm_mac = SSL_SHA1, |
| @@ -1234,7 +1234,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1234 | .valid = 1, | 1234 | .valid = 1, |
| 1235 | .name = TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, | 1235 | .name = TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, |
| 1236 | .id = TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, | 1236 | .id = TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, |
| 1237 | .algorithm_mkey = SSL_kEDH, | 1237 | .algorithm_mkey = SSL_kDHE, |
| 1238 | .algorithm_auth = SSL_aRSA, | 1238 | .algorithm_auth = SSL_aRSA, |
| 1239 | .algorithm_enc = SSL_CAMELLIA256, | 1239 | .algorithm_enc = SSL_CAMELLIA256, |
| 1240 | .algorithm_mac = SSL_SHA1, | 1240 | .algorithm_mac = SSL_SHA1, |
| @@ -1250,7 +1250,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1250 | .valid = 1, | 1250 | .valid = 1, |
| 1251 | .name = TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA, | 1251 | .name = TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA, |
| 1252 | .id = TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA, | 1252 | .id = TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA, |
| 1253 | .algorithm_mkey = SSL_kEDH, | 1253 | .algorithm_mkey = SSL_kDHE, |
| 1254 | .algorithm_auth = SSL_aNULL, | 1254 | .algorithm_auth = SSL_aNULL, |
| 1255 | .algorithm_enc = SSL_CAMELLIA256, | 1255 | .algorithm_enc = SSL_CAMELLIA256, |
| 1256 | .algorithm_mac = SSL_SHA1, | 1256 | .algorithm_mac = SSL_SHA1, |
| @@ -1306,7 +1306,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1306 | .valid = 1, | 1306 | .valid = 1, |
| 1307 | .name = TLS1_TXT_DHE_RSA_WITH_AES_128_GCM_SHA256, | 1307 | .name = TLS1_TXT_DHE_RSA_WITH_AES_128_GCM_SHA256, |
| 1308 | .id = TLS1_CK_DHE_RSA_WITH_AES_128_GCM_SHA256, | 1308 | .id = TLS1_CK_DHE_RSA_WITH_AES_128_GCM_SHA256, |
| 1309 | .algorithm_mkey = SSL_kEDH, | 1309 | .algorithm_mkey = SSL_kDHE, |
| 1310 | .algorithm_auth = SSL_aRSA, | 1310 | .algorithm_auth = SSL_aRSA, |
| 1311 | .algorithm_enc = SSL_AES128GCM, | 1311 | .algorithm_enc = SSL_AES128GCM, |
| 1312 | .algorithm_mac = SSL_AEAD, | 1312 | .algorithm_mac = SSL_AEAD, |
| @@ -1324,7 +1324,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1324 | .valid = 1, | 1324 | .valid = 1, |
| 1325 | .name = TLS1_TXT_DHE_RSA_WITH_AES_256_GCM_SHA384, | 1325 | .name = TLS1_TXT_DHE_RSA_WITH_AES_256_GCM_SHA384, |
| 1326 | .id = TLS1_CK_DHE_RSA_WITH_AES_256_GCM_SHA384, | 1326 | .id = TLS1_CK_DHE_RSA_WITH_AES_256_GCM_SHA384, |
| 1327 | .algorithm_mkey = SSL_kEDH, | 1327 | .algorithm_mkey = SSL_kDHE, |
| 1328 | .algorithm_auth = SSL_aRSA, | 1328 | .algorithm_auth = SSL_aRSA, |
| 1329 | .algorithm_enc = SSL_AES256GCM, | 1329 | .algorithm_enc = SSL_AES256GCM, |
| 1330 | .algorithm_mac = SSL_AEAD, | 1330 | .algorithm_mac = SSL_AEAD, |
| @@ -1378,7 +1378,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1378 | .valid = 1, | 1378 | .valid = 1, |
| 1379 | .name = TLS1_TXT_DHE_DSS_WITH_AES_128_GCM_SHA256, | 1379 | .name = TLS1_TXT_DHE_DSS_WITH_AES_128_GCM_SHA256, |
| 1380 | .id = TLS1_CK_DHE_DSS_WITH_AES_128_GCM_SHA256, | 1380 | .id = TLS1_CK_DHE_DSS_WITH_AES_128_GCM_SHA256, |
| 1381 | .algorithm_mkey = SSL_kEDH, | 1381 | .algorithm_mkey = SSL_kDHE, |
| 1382 | .algorithm_auth = SSL_aDSS, | 1382 | .algorithm_auth = SSL_aDSS, |
| 1383 | .algorithm_enc = SSL_AES128GCM, | 1383 | .algorithm_enc = SSL_AES128GCM, |
| 1384 | .algorithm_mac = SSL_AEAD, | 1384 | .algorithm_mac = SSL_AEAD, |
| @@ -1396,7 +1396,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1396 | .valid = 1, | 1396 | .valid = 1, |
| 1397 | .name = TLS1_TXT_DHE_DSS_WITH_AES_256_GCM_SHA384, | 1397 | .name = TLS1_TXT_DHE_DSS_WITH_AES_256_GCM_SHA384, |
| 1398 | .id = TLS1_CK_DHE_DSS_WITH_AES_256_GCM_SHA384, | 1398 | .id = TLS1_CK_DHE_DSS_WITH_AES_256_GCM_SHA384, |
| 1399 | .algorithm_mkey = SSL_kEDH, | 1399 | .algorithm_mkey = SSL_kDHE, |
| 1400 | .algorithm_auth = SSL_aDSS, | 1400 | .algorithm_auth = SSL_aDSS, |
| 1401 | .algorithm_enc = SSL_AES256GCM, | 1401 | .algorithm_enc = SSL_AES256GCM, |
| 1402 | .algorithm_mac = SSL_AEAD, | 1402 | .algorithm_mac = SSL_AEAD, |
| @@ -1450,7 +1450,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1450 | .valid = 1, | 1450 | .valid = 1, |
| 1451 | .name = TLS1_TXT_ADH_WITH_AES_128_GCM_SHA256, | 1451 | .name = TLS1_TXT_ADH_WITH_AES_128_GCM_SHA256, |
| 1452 | .id = TLS1_CK_ADH_WITH_AES_128_GCM_SHA256, | 1452 | .id = TLS1_CK_ADH_WITH_AES_128_GCM_SHA256, |
| 1453 | .algorithm_mkey = SSL_kEDH, | 1453 | .algorithm_mkey = SSL_kDHE, |
| 1454 | .algorithm_auth = SSL_aNULL, | 1454 | .algorithm_auth = SSL_aNULL, |
| 1455 | .algorithm_enc = SSL_AES128GCM, | 1455 | .algorithm_enc = SSL_AES128GCM, |
| 1456 | .algorithm_mac = SSL_AEAD, | 1456 | .algorithm_mac = SSL_AEAD, |
| @@ -1468,7 +1468,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1468 | .valid = 1, | 1468 | .valid = 1, |
| 1469 | .name = TLS1_TXT_ADH_WITH_AES_256_GCM_SHA384, | 1469 | .name = TLS1_TXT_ADH_WITH_AES_256_GCM_SHA384, |
| 1470 | .id = TLS1_CK_ADH_WITH_AES_256_GCM_SHA384, | 1470 | .id = TLS1_CK_ADH_WITH_AES_256_GCM_SHA384, |
| 1471 | .algorithm_mkey = SSL_kEDH, | 1471 | .algorithm_mkey = SSL_kDHE, |
| 1472 | .algorithm_auth = SSL_aNULL, | 1472 | .algorithm_auth = SSL_aNULL, |
| 1473 | .algorithm_enc = SSL_AES256GCM, | 1473 | .algorithm_enc = SSL_AES256GCM, |
| 1474 | .algorithm_mac = SSL_AEAD, | 1474 | .algorithm_mac = SSL_AEAD, |
| @@ -1566,7 +1566,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1566 | .valid = 1, | 1566 | .valid = 1, |
| 1567 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_NULL_SHA, | 1567 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_NULL_SHA, |
| 1568 | .id = TLS1_CK_ECDHE_ECDSA_WITH_NULL_SHA, | 1568 | .id = TLS1_CK_ECDHE_ECDSA_WITH_NULL_SHA, |
| 1569 | .algorithm_mkey = SSL_kEECDH, | 1569 | .algorithm_mkey = SSL_kECDHE, |
| 1570 | .algorithm_auth = SSL_aECDSA, | 1570 | .algorithm_auth = SSL_aECDSA, |
| 1571 | .algorithm_enc = SSL_eNULL, | 1571 | .algorithm_enc = SSL_eNULL, |
| 1572 | .algorithm_mac = SSL_SHA1, | 1572 | .algorithm_mac = SSL_SHA1, |
| @@ -1582,7 +1582,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1582 | .valid = 1, | 1582 | .valid = 1, |
| 1583 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_RC4_128_SHA, | 1583 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_RC4_128_SHA, |
| 1584 | .id = TLS1_CK_ECDHE_ECDSA_WITH_RC4_128_SHA, | 1584 | .id = TLS1_CK_ECDHE_ECDSA_WITH_RC4_128_SHA, |
| 1585 | .algorithm_mkey = SSL_kEECDH, | 1585 | .algorithm_mkey = SSL_kECDHE, |
| 1586 | .algorithm_auth = SSL_aECDSA, | 1586 | .algorithm_auth = SSL_aECDSA, |
| 1587 | .algorithm_enc = SSL_RC4, | 1587 | .algorithm_enc = SSL_RC4, |
| 1588 | .algorithm_mac = SSL_SHA1, | 1588 | .algorithm_mac = SSL_SHA1, |
| @@ -1598,7 +1598,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1598 | .valid = 1, | 1598 | .valid = 1, |
| 1599 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA, | 1599 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA, |
| 1600 | .id = TLS1_CK_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA, | 1600 | .id = TLS1_CK_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA, |
| 1601 | .algorithm_mkey = SSL_kEECDH, | 1601 | .algorithm_mkey = SSL_kECDHE, |
| 1602 | .algorithm_auth = SSL_aECDSA, | 1602 | .algorithm_auth = SSL_aECDSA, |
| 1603 | .algorithm_enc = SSL_3DES, | 1603 | .algorithm_enc = SSL_3DES, |
| 1604 | .algorithm_mac = SSL_SHA1, | 1604 | .algorithm_mac = SSL_SHA1, |
| @@ -1614,7 +1614,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1614 | .valid = 1, | 1614 | .valid = 1, |
| 1615 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, | 1615 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, |
| 1616 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, | 1616 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, |
| 1617 | .algorithm_mkey = SSL_kEECDH, | 1617 | .algorithm_mkey = SSL_kECDHE, |
| 1618 | .algorithm_auth = SSL_aECDSA, | 1618 | .algorithm_auth = SSL_aECDSA, |
| 1619 | .algorithm_enc = SSL_AES128, | 1619 | .algorithm_enc = SSL_AES128, |
| 1620 | .algorithm_mac = SSL_SHA1, | 1620 | .algorithm_mac = SSL_SHA1, |
| @@ -1630,7 +1630,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1630 | .valid = 1, | 1630 | .valid = 1, |
| 1631 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, | 1631 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, |
| 1632 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, | 1632 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, |
| 1633 | .algorithm_mkey = SSL_kEECDH, | 1633 | .algorithm_mkey = SSL_kECDHE, |
| 1634 | .algorithm_auth = SSL_aECDSA, | 1634 | .algorithm_auth = SSL_aECDSA, |
| 1635 | .algorithm_enc = SSL_AES256, | 1635 | .algorithm_enc = SSL_AES256, |
| 1636 | .algorithm_mac = SSL_SHA1, | 1636 | .algorithm_mac = SSL_SHA1, |
| @@ -1726,7 +1726,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1726 | .valid = 1, | 1726 | .valid = 1, |
| 1727 | .name = TLS1_TXT_ECDHE_RSA_WITH_NULL_SHA, | 1727 | .name = TLS1_TXT_ECDHE_RSA_WITH_NULL_SHA, |
| 1728 | .id = TLS1_CK_ECDHE_RSA_WITH_NULL_SHA, | 1728 | .id = TLS1_CK_ECDHE_RSA_WITH_NULL_SHA, |
| 1729 | .algorithm_mkey = SSL_kEECDH, | 1729 | .algorithm_mkey = SSL_kECDHE, |
| 1730 | .algorithm_auth = SSL_aRSA, | 1730 | .algorithm_auth = SSL_aRSA, |
| 1731 | .algorithm_enc = SSL_eNULL, | 1731 | .algorithm_enc = SSL_eNULL, |
| 1732 | .algorithm_mac = SSL_SHA1, | 1732 | .algorithm_mac = SSL_SHA1, |
| @@ -1742,7 +1742,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1742 | .valid = 1, | 1742 | .valid = 1, |
| 1743 | .name = TLS1_TXT_ECDHE_RSA_WITH_RC4_128_SHA, | 1743 | .name = TLS1_TXT_ECDHE_RSA_WITH_RC4_128_SHA, |
| 1744 | .id = TLS1_CK_ECDHE_RSA_WITH_RC4_128_SHA, | 1744 | .id = TLS1_CK_ECDHE_RSA_WITH_RC4_128_SHA, |
| 1745 | .algorithm_mkey = SSL_kEECDH, | 1745 | .algorithm_mkey = SSL_kECDHE, |
| 1746 | .algorithm_auth = SSL_aRSA, | 1746 | .algorithm_auth = SSL_aRSA, |
| 1747 | .algorithm_enc = SSL_RC4, | 1747 | .algorithm_enc = SSL_RC4, |
| 1748 | .algorithm_mac = SSL_SHA1, | 1748 | .algorithm_mac = SSL_SHA1, |
| @@ -1758,7 +1758,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1758 | .valid = 1, | 1758 | .valid = 1, |
| 1759 | .name = TLS1_TXT_ECDHE_RSA_WITH_DES_192_CBC3_SHA, | 1759 | .name = TLS1_TXT_ECDHE_RSA_WITH_DES_192_CBC3_SHA, |
| 1760 | .id = TLS1_CK_ECDHE_RSA_WITH_DES_192_CBC3_SHA, | 1760 | .id = TLS1_CK_ECDHE_RSA_WITH_DES_192_CBC3_SHA, |
| 1761 | .algorithm_mkey = SSL_kEECDH, | 1761 | .algorithm_mkey = SSL_kECDHE, |
| 1762 | .algorithm_auth = SSL_aRSA, | 1762 | .algorithm_auth = SSL_aRSA, |
| 1763 | .algorithm_enc = SSL_3DES, | 1763 | .algorithm_enc = SSL_3DES, |
| 1764 | .algorithm_mac = SSL_SHA1, | 1764 | .algorithm_mac = SSL_SHA1, |
| @@ -1774,7 +1774,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1774 | .valid = 1, | 1774 | .valid = 1, |
| 1775 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_128_CBC_SHA, | 1775 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_128_CBC_SHA, |
| 1776 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA, | 1776 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA, |
| 1777 | .algorithm_mkey = SSL_kEECDH, | 1777 | .algorithm_mkey = SSL_kECDHE, |
| 1778 | .algorithm_auth = SSL_aRSA, | 1778 | .algorithm_auth = SSL_aRSA, |
| 1779 | .algorithm_enc = SSL_AES128, | 1779 | .algorithm_enc = SSL_AES128, |
| 1780 | .algorithm_mac = SSL_SHA1, | 1780 | .algorithm_mac = SSL_SHA1, |
| @@ -1790,7 +1790,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1790 | .valid = 1, | 1790 | .valid = 1, |
| 1791 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_256_CBC_SHA, | 1791 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_256_CBC_SHA, |
| 1792 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA, | 1792 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA, |
| 1793 | .algorithm_mkey = SSL_kEECDH, | 1793 | .algorithm_mkey = SSL_kECDHE, |
| 1794 | .algorithm_auth = SSL_aRSA, | 1794 | .algorithm_auth = SSL_aRSA, |
| 1795 | .algorithm_enc = SSL_AES256, | 1795 | .algorithm_enc = SSL_AES256, |
| 1796 | .algorithm_mac = SSL_SHA1, | 1796 | .algorithm_mac = SSL_SHA1, |
| @@ -1806,7 +1806,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1806 | .valid = 1, | 1806 | .valid = 1, |
| 1807 | .name = TLS1_TXT_ECDH_anon_WITH_NULL_SHA, | 1807 | .name = TLS1_TXT_ECDH_anon_WITH_NULL_SHA, |
| 1808 | .id = TLS1_CK_ECDH_anon_WITH_NULL_SHA, | 1808 | .id = TLS1_CK_ECDH_anon_WITH_NULL_SHA, |
| 1809 | .algorithm_mkey = SSL_kEECDH, | 1809 | .algorithm_mkey = SSL_kECDHE, |
| 1810 | .algorithm_auth = SSL_aNULL, | 1810 | .algorithm_auth = SSL_aNULL, |
| 1811 | .algorithm_enc = SSL_eNULL, | 1811 | .algorithm_enc = SSL_eNULL, |
| 1812 | .algorithm_mac = SSL_SHA1, | 1812 | .algorithm_mac = SSL_SHA1, |
| @@ -1822,7 +1822,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1822 | .valid = 1, | 1822 | .valid = 1, |
| 1823 | .name = TLS1_TXT_ECDH_anon_WITH_RC4_128_SHA, | 1823 | .name = TLS1_TXT_ECDH_anon_WITH_RC4_128_SHA, |
| 1824 | .id = TLS1_CK_ECDH_anon_WITH_RC4_128_SHA, | 1824 | .id = TLS1_CK_ECDH_anon_WITH_RC4_128_SHA, |
| 1825 | .algorithm_mkey = SSL_kEECDH, | 1825 | .algorithm_mkey = SSL_kECDHE, |
| 1826 | .algorithm_auth = SSL_aNULL, | 1826 | .algorithm_auth = SSL_aNULL, |
| 1827 | .algorithm_enc = SSL_RC4, | 1827 | .algorithm_enc = SSL_RC4, |
| 1828 | .algorithm_mac = SSL_SHA1, | 1828 | .algorithm_mac = SSL_SHA1, |
| @@ -1838,7 +1838,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1838 | .valid = 1, | 1838 | .valid = 1, |
| 1839 | .name = TLS1_TXT_ECDH_anon_WITH_DES_192_CBC3_SHA, | 1839 | .name = TLS1_TXT_ECDH_anon_WITH_DES_192_CBC3_SHA, |
| 1840 | .id = TLS1_CK_ECDH_anon_WITH_DES_192_CBC3_SHA, | 1840 | .id = TLS1_CK_ECDH_anon_WITH_DES_192_CBC3_SHA, |
| 1841 | .algorithm_mkey = SSL_kEECDH, | 1841 | .algorithm_mkey = SSL_kECDHE, |
| 1842 | .algorithm_auth = SSL_aNULL, | 1842 | .algorithm_auth = SSL_aNULL, |
| 1843 | .algorithm_enc = SSL_3DES, | 1843 | .algorithm_enc = SSL_3DES, |
| 1844 | .algorithm_mac = SSL_SHA1, | 1844 | .algorithm_mac = SSL_SHA1, |
| @@ -1854,7 +1854,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1854 | .valid = 1, | 1854 | .valid = 1, |
| 1855 | .name = TLS1_TXT_ECDH_anon_WITH_AES_128_CBC_SHA, | 1855 | .name = TLS1_TXT_ECDH_anon_WITH_AES_128_CBC_SHA, |
| 1856 | .id = TLS1_CK_ECDH_anon_WITH_AES_128_CBC_SHA, | 1856 | .id = TLS1_CK_ECDH_anon_WITH_AES_128_CBC_SHA, |
| 1857 | .algorithm_mkey = SSL_kEECDH, | 1857 | .algorithm_mkey = SSL_kECDHE, |
| 1858 | .algorithm_auth = SSL_aNULL, | 1858 | .algorithm_auth = SSL_aNULL, |
| 1859 | .algorithm_enc = SSL_AES128, | 1859 | .algorithm_enc = SSL_AES128, |
| 1860 | .algorithm_mac = SSL_SHA1, | 1860 | .algorithm_mac = SSL_SHA1, |
| @@ -1870,7 +1870,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1870 | .valid = 1, | 1870 | .valid = 1, |
| 1871 | .name = TLS1_TXT_ECDH_anon_WITH_AES_256_CBC_SHA, | 1871 | .name = TLS1_TXT_ECDH_anon_WITH_AES_256_CBC_SHA, |
| 1872 | .id = TLS1_CK_ECDH_anon_WITH_AES_256_CBC_SHA, | 1872 | .id = TLS1_CK_ECDH_anon_WITH_AES_256_CBC_SHA, |
| 1873 | .algorithm_mkey = SSL_kEECDH, | 1873 | .algorithm_mkey = SSL_kECDHE, |
| 1874 | .algorithm_auth = SSL_aNULL, | 1874 | .algorithm_auth = SSL_aNULL, |
| 1875 | .algorithm_enc = SSL_AES256, | 1875 | .algorithm_enc = SSL_AES256, |
| 1876 | .algorithm_mac = SSL_SHA1, | 1876 | .algorithm_mac = SSL_SHA1, |
| @@ -1889,7 +1889,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1889 | .valid = 1, | 1889 | .valid = 1, |
| 1890 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_SHA256, | 1890 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_SHA256, |
| 1891 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_128_SHA256, | 1891 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_128_SHA256, |
| 1892 | .algorithm_mkey = SSL_kEECDH, | 1892 | .algorithm_mkey = SSL_kECDHE, |
| 1893 | .algorithm_auth = SSL_aECDSA, | 1893 | .algorithm_auth = SSL_aECDSA, |
| 1894 | .algorithm_enc = SSL_AES128, | 1894 | .algorithm_enc = SSL_AES128, |
| 1895 | .algorithm_mac = SSL_SHA256, | 1895 | .algorithm_mac = SSL_SHA256, |
| @@ -1905,7 +1905,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1905 | .valid = 1, | 1905 | .valid = 1, |
| 1906 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_SHA384, | 1906 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_SHA384, |
| 1907 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_256_SHA384, | 1907 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_256_SHA384, |
| 1908 | .algorithm_mkey = SSL_kEECDH, | 1908 | .algorithm_mkey = SSL_kECDHE, |
| 1909 | .algorithm_auth = SSL_aECDSA, | 1909 | .algorithm_auth = SSL_aECDSA, |
| 1910 | .algorithm_enc = SSL_AES256, | 1910 | .algorithm_enc = SSL_AES256, |
| 1911 | .algorithm_mac = SSL_SHA384, | 1911 | .algorithm_mac = SSL_SHA384, |
| @@ -1953,7 +1953,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1953 | .valid = 1, | 1953 | .valid = 1, |
| 1954 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_128_SHA256, | 1954 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_128_SHA256, |
| 1955 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_128_SHA256, | 1955 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_128_SHA256, |
| 1956 | .algorithm_mkey = SSL_kEECDH, | 1956 | .algorithm_mkey = SSL_kECDHE, |
| 1957 | .algorithm_auth = SSL_aRSA, | 1957 | .algorithm_auth = SSL_aRSA, |
| 1958 | .algorithm_enc = SSL_AES128, | 1958 | .algorithm_enc = SSL_AES128, |
| 1959 | .algorithm_mac = SSL_SHA256, | 1959 | .algorithm_mac = SSL_SHA256, |
| @@ -1969,7 +1969,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 1969 | .valid = 1, | 1969 | .valid = 1, |
| 1970 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_256_SHA384, | 1970 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_256_SHA384, |
| 1971 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_256_SHA384, | 1971 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_256_SHA384, |
| 1972 | .algorithm_mkey = SSL_kEECDH, | 1972 | .algorithm_mkey = SSL_kECDHE, |
| 1973 | .algorithm_auth = SSL_aRSA, | 1973 | .algorithm_auth = SSL_aRSA, |
| 1974 | .algorithm_enc = SSL_AES256, | 1974 | .algorithm_enc = SSL_AES256, |
| 1975 | .algorithm_mac = SSL_SHA384, | 1975 | .algorithm_mac = SSL_SHA384, |
| @@ -2019,7 +2019,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 2019 | .valid = 1, | 2019 | .valid = 1, |
| 2020 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, | 2020 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, |
| 2021 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, | 2021 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, |
| 2022 | .algorithm_mkey = SSL_kEECDH, | 2022 | .algorithm_mkey = SSL_kECDHE, |
| 2023 | .algorithm_auth = SSL_aECDSA, | 2023 | .algorithm_auth = SSL_aECDSA, |
| 2024 | .algorithm_enc = SSL_AES128GCM, | 2024 | .algorithm_enc = SSL_AES128GCM, |
| 2025 | .algorithm_mac = SSL_AEAD, | 2025 | .algorithm_mac = SSL_AEAD, |
| @@ -2037,7 +2037,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 2037 | .valid = 1, | 2037 | .valid = 1, |
| 2038 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, | 2038 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, |
| 2039 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, | 2039 | .id = TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, |
| 2040 | .algorithm_mkey = SSL_kEECDH, | 2040 | .algorithm_mkey = SSL_kECDHE, |
| 2041 | .algorithm_auth = SSL_aECDSA, | 2041 | .algorithm_auth = SSL_aECDSA, |
| 2042 | .algorithm_enc = SSL_AES256GCM, | 2042 | .algorithm_enc = SSL_AES256GCM, |
| 2043 | .algorithm_mac = SSL_AEAD, | 2043 | .algorithm_mac = SSL_AEAD, |
| @@ -2091,7 +2091,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 2091 | .valid = 1, | 2091 | .valid = 1, |
| 2092 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_128_GCM_SHA256, | 2092 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_128_GCM_SHA256, |
| 2093 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256, | 2093 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256, |
| 2094 | .algorithm_mkey = SSL_kEECDH, | 2094 | .algorithm_mkey = SSL_kECDHE, |
| 2095 | .algorithm_auth = SSL_aRSA, | 2095 | .algorithm_auth = SSL_aRSA, |
| 2096 | .algorithm_enc = SSL_AES128GCM, | 2096 | .algorithm_enc = SSL_AES128GCM, |
| 2097 | .algorithm_mac = SSL_AEAD, | 2097 | .algorithm_mac = SSL_AEAD, |
| @@ -2109,7 +2109,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 2109 | .valid = 1, | 2109 | .valid = 1, |
| 2110 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_256_GCM_SHA384, | 2110 | .name = TLS1_TXT_ECDHE_RSA_WITH_AES_256_GCM_SHA384, |
| 2111 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_256_GCM_SHA384, | 2111 | .id = TLS1_CK_ECDHE_RSA_WITH_AES_256_GCM_SHA384, |
| 2112 | .algorithm_mkey = SSL_kEECDH, | 2112 | .algorithm_mkey = SSL_kECDHE, |
| 2113 | .algorithm_auth = SSL_aRSA, | 2113 | .algorithm_auth = SSL_aRSA, |
| 2114 | .algorithm_enc = SSL_AES256GCM, | 2114 | .algorithm_enc = SSL_AES256GCM, |
| 2115 | .algorithm_mac = SSL_AEAD, | 2115 | .algorithm_mac = SSL_AEAD, |
| @@ -2224,7 +2224,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 2224 | .valid = 1, | 2224 | .valid = 1, |
| 2225 | .name = TLS1_TXT_ECDHE_RSA_WITH_CHACHA20_POLY1305, | 2225 | .name = TLS1_TXT_ECDHE_RSA_WITH_CHACHA20_POLY1305, |
| 2226 | .id = TLS1_CK_ECDHE_RSA_CHACHA20_POLY1305, | 2226 | .id = TLS1_CK_ECDHE_RSA_CHACHA20_POLY1305, |
| 2227 | .algorithm_mkey = SSL_kEECDH, | 2227 | .algorithm_mkey = SSL_kECDHE, |
| 2228 | .algorithm_auth = SSL_aRSA, | 2228 | .algorithm_auth = SSL_aRSA, |
| 2229 | .algorithm_enc = SSL_CHACHA20POLY1305, | 2229 | .algorithm_enc = SSL_CHACHA20POLY1305, |
| 2230 | .algorithm_mac = SSL_AEAD, | 2230 | .algorithm_mac = SSL_AEAD, |
| @@ -2240,7 +2240,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 2240 | .valid = 1, | 2240 | .valid = 1, |
| 2241 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_CHACHA20_POLY1305, | 2241 | .name = TLS1_TXT_ECDHE_ECDSA_WITH_CHACHA20_POLY1305, |
| 2242 | .id = TLS1_CK_ECDHE_ECDSA_CHACHA20_POLY1305, | 2242 | .id = TLS1_CK_ECDHE_ECDSA_CHACHA20_POLY1305, |
| 2243 | .algorithm_mkey = SSL_kEECDH, | 2243 | .algorithm_mkey = SSL_kECDHE, |
| 2244 | .algorithm_auth = SSL_aECDSA, | 2244 | .algorithm_auth = SSL_aECDSA, |
| 2245 | .algorithm_enc = SSL_CHACHA20POLY1305, | 2245 | .algorithm_enc = SSL_CHACHA20POLY1305, |
| 2246 | .algorithm_mac = SSL_AEAD, | 2246 | .algorithm_mac = SSL_AEAD, |
| @@ -2256,7 +2256,7 @@ SSL_CIPHER ssl3_ciphers[] = { | |||
| 2256 | .valid = 1, | 2256 | .valid = 1, |
| 2257 | .name = TLS1_TXT_DHE_RSA_WITH_CHACHA20_POLY1305, | 2257 | .name = TLS1_TXT_DHE_RSA_WITH_CHACHA20_POLY1305, |
| 2258 | .id = TLS1_CK_DHE_RSA_CHACHA20_POLY1305, | 2258 | .id = TLS1_CK_DHE_RSA_CHACHA20_POLY1305, |
| 2259 | .algorithm_mkey = SSL_kEDH, | 2259 | .algorithm_mkey = SSL_kDHE, |
| 2260 | .algorithm_auth = SSL_aRSA, | 2260 | .algorithm_auth = SSL_aRSA, |
| 2261 | .algorithm_enc = SSL_CHACHA20POLY1305, | 2261 | .algorithm_enc = SSL_CHACHA20POLY1305, |
| 2262 | .algorithm_mac = SSL_AEAD, | 2262 | .algorithm_mac = SSL_AEAD, |
| @@ -3069,7 +3069,7 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt, | |||
| 3069 | * if we are considering an ECC cipher suite that uses an | 3069 | * if we are considering an ECC cipher suite that uses an |
| 3070 | * ephemeral EC key | 3070 | * ephemeral EC key |
| 3071 | */ | 3071 | */ |
| 3072 | (alg_k & SSL_kEECDH) | 3072 | (alg_k & SSL_kECDHE) |
| 3073 | /* and we have an ephemeral EC key */ | 3073 | /* and we have an ephemeral EC key */ |
| 3074 | && (s->cert->ecdh_tmp != NULL) | 3074 | && (s->cert->ecdh_tmp != NULL) |
| 3075 | /* and the client specified an EllipticCurves extension */ | 3075 | /* and the client specified an EllipticCurves extension */ |
| @@ -3108,7 +3108,7 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt, | |||
| 3108 | continue; | 3108 | continue; |
| 3109 | ii = sk_SSL_CIPHER_find(allow, c); | 3109 | ii = sk_SSL_CIPHER_find(allow, c); |
| 3110 | if (ii >= 0) { | 3110 | if (ii >= 0) { |
| 3111 | if ((alg_k & SSL_kEECDH) && | 3111 | if ((alg_k & SSL_kECDHE) && |
| 3112 | (alg_a & SSL_aECDSA) && s->s3->is_probably_safari) { | 3112 | (alg_a & SSL_aECDSA) && s->s3->is_probably_safari) { |
| 3113 | if (!ret) | 3113 | if (!ret) |
| 3114 | ret = sk_SSL_CIPHER_value(allow, ii); | 3114 | ret = sk_SSL_CIPHER_value(allow, ii); |
| @@ -3139,12 +3139,12 @@ ssl3_get_req_cert_type(SSL *s, unsigned char *p) | |||
| 3139 | } | 3139 | } |
| 3140 | #endif | 3140 | #endif |
| 3141 | 3141 | ||
| 3142 | if (alg_k & (SSL_kDHr|SSL_kEDH)) { | 3142 | if (alg_k & (SSL_kDHr|SSL_kDHE)) { |
| 3143 | p[ret++] = SSL3_CT_RSA_FIXED_DH; | 3143 | p[ret++] = SSL3_CT_RSA_FIXED_DH; |
| 3144 | p[ret++] = SSL3_CT_DSS_FIXED_DH; | 3144 | p[ret++] = SSL3_CT_DSS_FIXED_DH; |
| 3145 | } | 3145 | } |
| 3146 | if ((s->version == SSL3_VERSION) && | 3146 | if ((s->version == SSL3_VERSION) && |
| 3147 | (alg_k & (SSL_kEDH|SSL_kDHd|SSL_kDHr))) { | 3147 | (alg_k & (SSL_kDHE|SSL_kDHd|SSL_kDHr))) { |
| 3148 | p[ret++] = SSL3_CT_RSA_EPHEMERAL_DH; | 3148 | p[ret++] = SSL3_CT_RSA_EPHEMERAL_DH; |
| 3149 | p[ret++] = SSL3_CT_DSS_EPHEMERAL_DH; | 3149 | p[ret++] = SSL3_CT_DSS_EPHEMERAL_DH; |
| 3150 | } | 3150 | } |
| @@ -3157,7 +3157,7 @@ ssl3_get_req_cert_type(SSL *s, unsigned char *p) | |||
| 3157 | 3157 | ||
| 3158 | /* | 3158 | /* |
| 3159 | * ECDSA certs can be used with RSA cipher suites as well | 3159 | * ECDSA certs can be used with RSA cipher suites as well |
| 3160 | * so we don't need to check for SSL_kECDH or SSL_kEECDH | 3160 | * so we don't need to check for SSL_kECDH or SSL_kECDHE |
| 3161 | */ | 3161 | */ |
| 3162 | if (s->version >= TLS1_VERSION) { | 3162 | if (s->version >= TLS1_VERSION) { |
| 3163 | p[ret++] = TLS_CT_ECDSA_SIGN; | 3163 | p[ret++] = TLS_CT_ECDSA_SIGN; |
diff --git a/src/lib/libssl/src/ssl/s3_srvr.c b/src/lib/libssl/src/ssl/s3_srvr.c index e0a7d78995..8d47a16b55 100644 --- a/src/lib/libssl/src/ssl/s3_srvr.c +++ b/src/lib/libssl/src/ssl/s3_srvr.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s3_srvr.c,v 1.77 2014/07/12 13:11:53 jsing Exp $ */ | 1 | /* $OpenBSD: s3_srvr.c,v 1.78 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -422,8 +422,8 @@ ssl3_accept(SSL *s) | |||
| 422 | * public key for key exchange. | 422 | * public key for key exchange. |
| 423 | */ | 423 | */ |
| 424 | if (s->s3->tmp.use_rsa_tmp || | 424 | if (s->s3->tmp.use_rsa_tmp || |
| 425 | (alg_k & (SSL_kDHr|SSL_kDHd|SSL_kEDH)) || | 425 | (alg_k & (SSL_kDHr|SSL_kDHd|SSL_kDHE)) || |
| 426 | (alg_k & SSL_kEECDH) || | 426 | (alg_k & SSL_kECDHE) || |
| 427 | ((alg_k & SSL_kRSA) && | 427 | ((alg_k & SSL_kRSA) && |
| 428 | (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == | 428 | (s->cert->pkeys[SSL_PKEY_RSA_ENC].privatekey == |
| 429 | NULL))) { | 429 | NULL))) { |
| @@ -1416,7 +1416,7 @@ ssl3_send_server_key_exchange(SSL *s) | |||
| 1416 | r[1] = rsa->e; | 1416 | r[1] = rsa->e; |
| 1417 | s->s3->tmp.use_rsa_tmp = 1; | 1417 | s->s3->tmp.use_rsa_tmp = 1; |
| 1418 | } else | 1418 | } else |
| 1419 | if (type & SSL_kEDH) { | 1419 | if (type & SSL_kDHE) { |
| 1420 | dhp = cert->dh_tmp; | 1420 | dhp = cert->dh_tmp; |
| 1421 | if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL)) | 1421 | if ((dhp == NULL) && (s->cert->dh_tmp_cb != NULL)) |
| 1422 | dhp = s->cert->dh_tmp_cb(s, 0, 0); | 1422 | dhp = s->cert->dh_tmp_cb(s, 0, 0); |
| @@ -1463,7 +1463,7 @@ ssl3_send_server_key_exchange(SSL *s) | |||
| 1463 | r[1] = dh->g; | 1463 | r[1] = dh->g; |
| 1464 | r[2] = dh->pub_key; | 1464 | r[2] = dh->pub_key; |
| 1465 | } else | 1465 | } else |
| 1466 | if (type & SSL_kEECDH) { | 1466 | if (type & SSL_kECDHE) { |
| 1467 | const EC_GROUP *group; | 1467 | const EC_GROUP *group; |
| 1468 | 1468 | ||
| 1469 | ecdhp = cert->ecdh_tmp; | 1469 | ecdhp = cert->ecdh_tmp; |
| @@ -1614,7 +1614,7 @@ ssl3_send_server_key_exchange(SSL *s) | |||
| 1614 | p += nr[i]; | 1614 | p += nr[i]; |
| 1615 | } | 1615 | } |
| 1616 | 1616 | ||
| 1617 | if (type & SSL_kEECDH) { | 1617 | if (type & SSL_kECDHE) { |
| 1618 | /* | 1618 | /* |
| 1619 | * XXX: For now, we only support named (not generic) | 1619 | * XXX: For now, we only support named (not generic) |
| 1620 | * curves. | 1620 | * curves. |
| @@ -1968,7 +1968,7 @@ ssl3_get_client_key_exchange(SSL *s) | |||
| 1968 | p, i); | 1968 | p, i); |
| 1969 | OPENSSL_cleanse(p, i); | 1969 | OPENSSL_cleanse(p, i); |
| 1970 | } else | 1970 | } else |
| 1971 | if (alg_k & (SSL_kEDH|SSL_kDHr|SSL_kDHd)) { | 1971 | if (alg_k & (SSL_kDHE|SSL_kDHr|SSL_kDHd)) { |
| 1972 | if (2 > n) | 1972 | if (2 > n) |
| 1973 | goto truncated; | 1973 | goto truncated; |
| 1974 | n2s(p, i); | 1974 | n2s(p, i); |
| @@ -2026,7 +2026,7 @@ ssl3_get_client_key_exchange(SSL *s) | |||
| 2026 | OPENSSL_cleanse(p, i); | 2026 | OPENSSL_cleanse(p, i); |
| 2027 | } else | 2027 | } else |
| 2028 | 2028 | ||
| 2029 | if (alg_k & (SSL_kEECDH|SSL_kECDHr|SSL_kECDHe)) { | 2029 | if (alg_k & (SSL_kECDHE|SSL_kECDHr|SSL_kECDHe)) { |
| 2030 | int ret = 1; | 2030 | int ret = 1; |
| 2031 | int field_size = 0; | 2031 | int field_size = 0; |
| 2032 | const EC_KEY *tkey; | 2032 | const EC_KEY *tkey; |
| @@ -2072,7 +2072,7 @@ ssl3_get_client_key_exchange(SSL *s) | |||
| 2072 | if (n == 0L) { | 2072 | if (n == 0L) { |
| 2073 | /* Client Publickey was in Client Certificate */ | 2073 | /* Client Publickey was in Client Certificate */ |
| 2074 | 2074 | ||
| 2075 | if (alg_k & SSL_kEECDH) { | 2075 | if (alg_k & SSL_kECDHE) { |
| 2076 | al = SSL_AD_HANDSHAKE_FAILURE; | 2076 | al = SSL_AD_HANDSHAKE_FAILURE; |
| 2077 | SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE, | 2077 | SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE, |
| 2078 | SSL_R_MISSING_TMP_ECDH_KEY); | 2078 | SSL_R_MISSING_TMP_ECDH_KEY); |
diff --git a/src/lib/libssl/src/ssl/ssl_ciph.c b/src/lib/libssl/src/ssl/ssl_ciph.c index a2dec527ca..70c91bf600 100644 --- a/src/lib/libssl/src/ssl/ssl_ciph.c +++ b/src/lib/libssl/src/ssl/ssl_ciph.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_ciph.c,v 1.65 2014/07/12 13:11:53 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_ciph.c,v 1.66 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -233,7 +233,7 @@ static const SSL_CIPHER cipher_aliases[] = { | |||
| 233 | */ | 233 | */ |
| 234 | { | 234 | { |
| 235 | .name = SSL_TXT_CMPDEF, | 235 | .name = SSL_TXT_CMPDEF, |
| 236 | .algorithm_mkey = SSL_kEDH|SSL_kEECDH, | 236 | .algorithm_mkey = SSL_kDHE|SSL_kECDHE, |
| 237 | .algorithm_auth = SSL_aNULL, | 237 | .algorithm_auth = SSL_aNULL, |
| 238 | .algorithm_enc = ~SSL_eNULL, | 238 | .algorithm_enc = ~SSL_eNULL, |
| 239 | }, | 239 | }, |
| @@ -265,11 +265,11 @@ static const SSL_CIPHER cipher_aliases[] = { | |||
| 265 | }, | 265 | }, |
| 266 | { | 266 | { |
| 267 | .name = SSL_TXT_kEDH, | 267 | .name = SSL_TXT_kEDH, |
| 268 | .algorithm_mkey = SSL_kEDH, | 268 | .algorithm_mkey = SSL_kDHE, |
| 269 | }, | 269 | }, |
| 270 | { | 270 | { |
| 271 | .name = SSL_TXT_DH, | 271 | .name = SSL_TXT_DH, |
| 272 | .algorithm_mkey = SSL_kDHr|SSL_kDHd|SSL_kEDH, | 272 | .algorithm_mkey = SSL_kDHr|SSL_kDHd|SSL_kDHE, |
| 273 | }, | 273 | }, |
| 274 | 274 | ||
| 275 | { | 275 | { |
| @@ -286,11 +286,11 @@ static const SSL_CIPHER cipher_aliases[] = { | |||
| 286 | }, | 286 | }, |
| 287 | { | 287 | { |
| 288 | .name = SSL_TXT_kEECDH, | 288 | .name = SSL_TXT_kEECDH, |
| 289 | .algorithm_mkey = SSL_kEECDH, | 289 | .algorithm_mkey = SSL_kECDHE, |
| 290 | }, | 290 | }, |
| 291 | { | 291 | { |
| 292 | .name = SSL_TXT_ECDH, | 292 | .name = SSL_TXT_ECDH, |
| 293 | .algorithm_mkey = SSL_kECDHr|SSL_kECDHe|SSL_kEECDH, | 293 | .algorithm_mkey = SSL_kECDHr|SSL_kECDHe|SSL_kECDHE, |
| 294 | }, | 294 | }, |
| 295 | 295 | ||
| 296 | { | 296 | { |
| @@ -348,12 +348,12 @@ static const SSL_CIPHER cipher_aliases[] = { | |||
| 348 | /* aliases combining key exchange and server authentication */ | 348 | /* aliases combining key exchange and server authentication */ |
| 349 | { | 349 | { |
| 350 | .name = SSL_TXT_EDH, | 350 | .name = SSL_TXT_EDH, |
| 351 | .algorithm_mkey = SSL_kEDH, | 351 | .algorithm_mkey = SSL_kDHE, |
| 352 | .algorithm_auth = ~SSL_aNULL, | 352 | .algorithm_auth = ~SSL_aNULL, |
| 353 | }, | 353 | }, |
| 354 | { | 354 | { |
| 355 | .name = SSL_TXT_EECDH, | 355 | .name = SSL_TXT_EECDH, |
| 356 | .algorithm_mkey = SSL_kEECDH, | 356 | .algorithm_mkey = SSL_kECDHE, |
| 357 | .algorithm_auth = ~SSL_aNULL, | 357 | .algorithm_auth = ~SSL_aNULL, |
| 358 | }, | 358 | }, |
| 359 | { | 359 | { |
| @@ -367,12 +367,12 @@ static const SSL_CIPHER cipher_aliases[] = { | |||
| 367 | }, | 367 | }, |
| 368 | { | 368 | { |
| 369 | .name = SSL_TXT_ADH, | 369 | .name = SSL_TXT_ADH, |
| 370 | .algorithm_mkey = SSL_kEDH, | 370 | .algorithm_mkey = SSL_kDHE, |
| 371 | .algorithm_auth = SSL_aNULL, | 371 | .algorithm_auth = SSL_aNULL, |
| 372 | }, | 372 | }, |
| 373 | { | 373 | { |
| 374 | .name = SSL_TXT_AECDH, | 374 | .name = SSL_TXT_AECDH, |
| 375 | .algorithm_mkey = SSL_kEECDH, | 375 | .algorithm_mkey = SSL_kECDHE, |
| 376 | .algorithm_auth = SSL_aNULL, | 376 | .algorithm_auth = SSL_aNULL, |
| 377 | }, | 377 | }, |
| 378 | 378 | ||
| @@ -1451,8 +1451,8 @@ ssl_create_cipher_list(const SSL_METHOD *ssl_method, | |||
| 1451 | /* Now arrange all ciphers by preference: */ | 1451 | /* Now arrange all ciphers by preference: */ |
| 1452 | 1452 | ||
| 1453 | /* Everything else being equal, prefer ephemeral ECDH over other key exchange mechanisms */ | 1453 | /* Everything else being equal, prefer ephemeral ECDH over other key exchange mechanisms */ |
| 1454 | ssl_cipher_apply_rule(0, SSL_kEECDH, 0, 0, 0, 0, 0, CIPHER_ADD, -1, &head, &tail); | 1454 | ssl_cipher_apply_rule(0, SSL_kECDHE, 0, 0, 0, 0, 0, CIPHER_ADD, -1, &head, &tail); |
| 1455 | ssl_cipher_apply_rule(0, SSL_kEECDH, 0, 0, 0, 0, 0, CIPHER_DEL, -1, &head, &tail); | 1455 | ssl_cipher_apply_rule(0, SSL_kECDHE, 0, 0, 0, 0, 0, CIPHER_DEL, -1, &head, &tail); |
| 1456 | 1456 | ||
| 1457 | /* | 1457 | /* |
| 1458 | * CHACHA20 is fast and safe on all hardware and is thus our preferred | 1458 | * CHACHA20 is fast and safe on all hardware and is thus our preferred |
| @@ -1609,7 +1609,7 @@ SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) | |||
| 1609 | case SSL_kDHd: | 1609 | case SSL_kDHd: |
| 1610 | kx = "DH/DSS"; | 1610 | kx = "DH/DSS"; |
| 1611 | break; | 1611 | break; |
| 1612 | case SSL_kEDH: | 1612 | case SSL_kDHE: |
| 1613 | kx = "DH"; | 1613 | kx = "DH"; |
| 1614 | break; | 1614 | break; |
| 1615 | case SSL_kECDHr: | 1615 | case SSL_kECDHr: |
| @@ -1618,7 +1618,7 @@ SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) | |||
| 1618 | case SSL_kECDHe: | 1618 | case SSL_kECDHe: |
| 1619 | kx = "ECDH/ECDSA"; | 1619 | kx = "ECDH/ECDSA"; |
| 1620 | break; | 1620 | break; |
| 1621 | case SSL_kEECDH: | 1621 | case SSL_kECDHE: |
| 1622 | kx = "ECDH"; | 1622 | kx = "ECDH"; |
| 1623 | break; | 1623 | break; |
| 1624 | default: | 1624 | default: |
diff --git a/src/lib/libssl/src/ssl/ssl_lib.c b/src/lib/libssl/src/ssl/ssl_lib.c index b563071cda..6b62713bca 100644 --- a/src/lib/libssl/src/ssl/ssl_lib.c +++ b/src/lib/libssl/src/ssl/ssl_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_lib.c,v 1.77 2014/07/12 19:45:53 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_lib.c,v 1.78 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -1973,7 +1973,7 @@ ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher) | |||
| 1973 | mask_k|=SSL_kRSA; | 1973 | mask_k|=SSL_kRSA; |
| 1974 | 1974 | ||
| 1975 | if (dh_tmp) | 1975 | if (dh_tmp) |
| 1976 | mask_k|=SSL_kEDH; | 1976 | mask_k|=SSL_kDHE; |
| 1977 | 1977 | ||
| 1978 | if (dh_rsa) | 1978 | if (dh_rsa) |
| 1979 | mask_k|=SSL_kDHr; | 1979 | mask_k|=SSL_kDHr; |
| @@ -2022,7 +2022,7 @@ ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher) | |||
| 2022 | } | 2022 | } |
| 2023 | 2023 | ||
| 2024 | if (have_ecdh_tmp) { | 2024 | if (have_ecdh_tmp) { |
| 2025 | mask_k|=SSL_kEECDH; | 2025 | mask_k|=SSL_kECDHE; |
| 2026 | } | 2026 | } |
| 2027 | 2027 | ||
| 2028 | 2028 | ||
| @@ -2108,10 +2108,10 @@ ssl_get_server_send_pkey(const SSL *s) | |||
| 2108 | 2108 | ||
| 2109 | if (alg_k & (SSL_kECDHr|SSL_kECDHe)) { | 2109 | if (alg_k & (SSL_kECDHr|SSL_kECDHe)) { |
| 2110 | /* | 2110 | /* |
| 2111 | * We don't need to look at SSL_kEECDH | 2111 | * We don't need to look at SSL_kECDHE |
| 2112 | * since no certificate is needed for | 2112 | * since no certificate is needed for |
| 2113 | * anon ECDH and for authenticated | 2113 | * anon ECDH and for authenticated |
| 2114 | * EECDH, the check for the auth | 2114 | * ECDHE, the check for the auth |
| 2115 | * algorithm will set i correctly | 2115 | * algorithm will set i correctly |
| 2116 | * NOTE: For ECDH-RSA, we need an ECC | 2116 | * NOTE: For ECDH-RSA, we need an ECC |
| 2117 | * not an RSA cert but for EECDH-RSA | 2117 | * not an RSA cert but for EECDH-RSA |
diff --git a/src/lib/libssl/src/ssl/ssl_locl.h b/src/lib/libssl/src/ssl/ssl_locl.h index 22ba8d926e..34e6337856 100644 --- a/src/lib/libssl/src/ssl/ssl_locl.h +++ b/src/lib/libssl/src/ssl/ssl_locl.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_locl.h,v 1.61 2014/07/12 19:45:53 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_locl.h,v 1.62 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -256,10 +256,10 @@ | |||
| 256 | #define SSL_kRSA 0x00000001L /* RSA key exchange */ | 256 | #define SSL_kRSA 0x00000001L /* RSA key exchange */ |
| 257 | #define SSL_kDHr 0x00000002L /* DH cert, RSA CA cert */ /* no such ciphersuites supported! */ | 257 | #define SSL_kDHr 0x00000002L /* DH cert, RSA CA cert */ /* no such ciphersuites supported! */ |
| 258 | #define SSL_kDHd 0x00000004L /* DH cert, DSA CA cert */ /* no such ciphersuite supported! */ | 258 | #define SSL_kDHd 0x00000004L /* DH cert, DSA CA cert */ /* no such ciphersuite supported! */ |
| 259 | #define SSL_kEDH 0x00000008L /* tmp DH key no DH cert */ | 259 | #define SSL_kDHE 0x00000008L /* tmp DH key no DH cert */ |
| 260 | #define SSL_kECDHr 0x00000020L /* ECDH cert, RSA CA cert */ | 260 | #define SSL_kECDHr 0x00000020L /* ECDH cert, RSA CA cert */ |
| 261 | #define SSL_kECDHe 0x00000040L /* ECDH cert, ECDSA CA cert */ | 261 | #define SSL_kECDHe 0x00000040L /* ECDH cert, ECDSA CA cert */ |
| 262 | #define SSL_kEECDH 0x00000080L /* ephemeral ECDH */ | 262 | #define SSL_kECDHE 0x00000080L /* ephemeral ECDH */ |
| 263 | #define SSL_kGOST 0x00000200L /* GOST key exchange */ | 263 | #define SSL_kGOST 0x00000200L /* GOST key exchange */ |
| 264 | 264 | ||
| 265 | /* Bits for algorithm_auth (server authentication) */ | 265 | /* Bits for algorithm_auth (server authentication) */ |
| @@ -397,7 +397,7 @@ | |||
| 397 | /* SSL_kRSA <- RSA_ENC | (RSA_TMP & RSA_SIGN) | | 397 | /* SSL_kRSA <- RSA_ENC | (RSA_TMP & RSA_SIGN) | |
| 398 | * <- (EXPORT & (RSA_ENC | RSA_TMP) & RSA_SIGN) | 398 | * <- (EXPORT & (RSA_ENC | RSA_TMP) & RSA_SIGN) |
| 399 | * SSL_kDH <- DH_ENC & (RSA_ENC | RSA_SIGN | DSA_SIGN) | 399 | * SSL_kDH <- DH_ENC & (RSA_ENC | RSA_SIGN | DSA_SIGN) |
| 400 | * SSL_kEDH <- RSA_ENC | RSA_SIGN | DSA_SIGN | 400 | * SSL_kDHE <- RSA_ENC | RSA_SIGN | DSA_SIGN |
| 401 | * SSL_aRSA <- RSA_ENC | RSA_SIGN | 401 | * SSL_aRSA <- RSA_ENC | RSA_SIGN |
| 402 | * SSL_aDSS <- DSA_SIGN | 402 | * SSL_aDSS <- DSA_SIGN |
| 403 | */ | 403 | */ |
diff --git a/src/lib/libssl/src/ssl/t1_lib.c b/src/lib/libssl/src/ssl/t1_lib.c index 03af6e29ef..46b47a95b7 100644 --- a/src/lib/libssl/src/ssl/t1_lib.c +++ b/src/lib/libssl/src/ssl/t1_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: t1_lib.c,v 1.49 2014/07/09 11:10:51 bcook Exp $ */ | 1 | /* $OpenBSD: t1_lib.c,v 1.50 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -1477,7 +1477,7 @@ ssl_prepare_clienthello_tlsext(SSL *s) | |||
| 1477 | 1477 | ||
| 1478 | alg_k = c->algorithm_mkey; | 1478 | alg_k = c->algorithm_mkey; |
| 1479 | alg_a = c->algorithm_auth; | 1479 | alg_a = c->algorithm_auth; |
| 1480 | if ((alg_k & (SSL_kEECDH|SSL_kECDHr|SSL_kECDHe) || | 1480 | if ((alg_k & (SSL_kECDHE|SSL_kECDHr|SSL_kECDHe) || |
| 1481 | (alg_a & SSL_aECDSA))) { | 1481 | (alg_a & SSL_aECDSA))) { |
| 1482 | using_ecc = 1; | 1482 | using_ecc = 1; |
| 1483 | break; | 1483 | break; |
| @@ -1524,7 +1524,7 @@ ssl_prepare_serverhello_tlsext(SSL *s) | |||
| 1524 | 1524 | ||
| 1525 | unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; | 1525 | unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; |
| 1526 | unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth; | 1526 | unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth; |
| 1527 | int using_ecc = (alg_k & (SSL_kEECDH|SSL_kECDHr|SSL_kECDHe)) || (alg_a & SSL_aECDSA); | 1527 | int using_ecc = (alg_k & (SSL_kECDHE|SSL_kECDHr|SSL_kECDHe)) || (alg_a & SSL_aECDSA); |
| 1528 | using_ecc = using_ecc && (s->session->tlsext_ecpointformatlist != NULL); | 1528 | using_ecc = using_ecc && (s->session->tlsext_ecpointformatlist != NULL); |
| 1529 | 1529 | ||
| 1530 | if (using_ecc) { | 1530 | if (using_ecc) { |
| @@ -1650,7 +1650,7 @@ ssl_check_serverhello_tlsext(SSL *s) | |||
| 1650 | (s->tlsext_ecpointformatlist_length > 0) && | 1650 | (s->tlsext_ecpointformatlist_length > 0) && |
| 1651 | (s->session->tlsext_ecpointformatlist != NULL) && | 1651 | (s->session->tlsext_ecpointformatlist != NULL) && |
| 1652 | (s->session->tlsext_ecpointformatlist_length > 0) && | 1652 | (s->session->tlsext_ecpointformatlist_length > 0) && |
| 1653 | ((alg_k & (SSL_kEECDH|SSL_kECDHr|SSL_kECDHe)) || (alg_a & SSL_aECDSA))) { | 1653 | ((alg_k & (SSL_kECDHE|SSL_kECDHr|SSL_kECDHe)) || (alg_a & SSL_aECDSA))) { |
| 1654 | /* we are using an ECC cipher */ | 1654 | /* we are using an ECC cipher */ |
| 1655 | size_t i; | 1655 | size_t i; |
| 1656 | unsigned char *list; | 1656 | unsigned char *list; |
diff --git a/src/lib/libssl/ssl_ciph.c b/src/lib/libssl/ssl_ciph.c index a2dec527ca..70c91bf600 100644 --- a/src/lib/libssl/ssl_ciph.c +++ b/src/lib/libssl/ssl_ciph.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_ciph.c,v 1.65 2014/07/12 13:11:53 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_ciph.c,v 1.66 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -233,7 +233,7 @@ static const SSL_CIPHER cipher_aliases[] = { | |||
| 233 | */ | 233 | */ |
| 234 | { | 234 | { |
| 235 | .name = SSL_TXT_CMPDEF, | 235 | .name = SSL_TXT_CMPDEF, |
| 236 | .algorithm_mkey = SSL_kEDH|SSL_kEECDH, | 236 | .algorithm_mkey = SSL_kDHE|SSL_kECDHE, |
| 237 | .algorithm_auth = SSL_aNULL, | 237 | .algorithm_auth = SSL_aNULL, |
| 238 | .algorithm_enc = ~SSL_eNULL, | 238 | .algorithm_enc = ~SSL_eNULL, |
| 239 | }, | 239 | }, |
| @@ -265,11 +265,11 @@ static const SSL_CIPHER cipher_aliases[] = { | |||
| 265 | }, | 265 | }, |
| 266 | { | 266 | { |
| 267 | .name = SSL_TXT_kEDH, | 267 | .name = SSL_TXT_kEDH, |
| 268 | .algorithm_mkey = SSL_kEDH, | 268 | .algorithm_mkey = SSL_kDHE, |
| 269 | }, | 269 | }, |
| 270 | { | 270 | { |
| 271 | .name = SSL_TXT_DH, | 271 | .name = SSL_TXT_DH, |
| 272 | .algorithm_mkey = SSL_kDHr|SSL_kDHd|SSL_kEDH, | 272 | .algorithm_mkey = SSL_kDHr|SSL_kDHd|SSL_kDHE, |
| 273 | }, | 273 | }, |
| 274 | 274 | ||
| 275 | { | 275 | { |
| @@ -286,11 +286,11 @@ static const SSL_CIPHER cipher_aliases[] = { | |||
| 286 | }, | 286 | }, |
| 287 | { | 287 | { |
| 288 | .name = SSL_TXT_kEECDH, | 288 | .name = SSL_TXT_kEECDH, |
| 289 | .algorithm_mkey = SSL_kEECDH, | 289 | .algorithm_mkey = SSL_kECDHE, |
| 290 | }, | 290 | }, |
| 291 | { | 291 | { |
| 292 | .name = SSL_TXT_ECDH, | 292 | .name = SSL_TXT_ECDH, |
| 293 | .algorithm_mkey = SSL_kECDHr|SSL_kECDHe|SSL_kEECDH, | 293 | .algorithm_mkey = SSL_kECDHr|SSL_kECDHe|SSL_kECDHE, |
| 294 | }, | 294 | }, |
| 295 | 295 | ||
| 296 | { | 296 | { |
| @@ -348,12 +348,12 @@ static const SSL_CIPHER cipher_aliases[] = { | |||
| 348 | /* aliases combining key exchange and server authentication */ | 348 | /* aliases combining key exchange and server authentication */ |
| 349 | { | 349 | { |
| 350 | .name = SSL_TXT_EDH, | 350 | .name = SSL_TXT_EDH, |
| 351 | .algorithm_mkey = SSL_kEDH, | 351 | .algorithm_mkey = SSL_kDHE, |
| 352 | .algorithm_auth = ~SSL_aNULL, | 352 | .algorithm_auth = ~SSL_aNULL, |
| 353 | }, | 353 | }, |
| 354 | { | 354 | { |
| 355 | .name = SSL_TXT_EECDH, | 355 | .name = SSL_TXT_EECDH, |
| 356 | .algorithm_mkey = SSL_kEECDH, | 356 | .algorithm_mkey = SSL_kECDHE, |
| 357 | .algorithm_auth = ~SSL_aNULL, | 357 | .algorithm_auth = ~SSL_aNULL, |
| 358 | }, | 358 | }, |
| 359 | { | 359 | { |
| @@ -367,12 +367,12 @@ static const SSL_CIPHER cipher_aliases[] = { | |||
| 367 | }, | 367 | }, |
| 368 | { | 368 | { |
| 369 | .name = SSL_TXT_ADH, | 369 | .name = SSL_TXT_ADH, |
| 370 | .algorithm_mkey = SSL_kEDH, | 370 | .algorithm_mkey = SSL_kDHE, |
| 371 | .algorithm_auth = SSL_aNULL, | 371 | .algorithm_auth = SSL_aNULL, |
| 372 | }, | 372 | }, |
| 373 | { | 373 | { |
| 374 | .name = SSL_TXT_AECDH, | 374 | .name = SSL_TXT_AECDH, |
| 375 | .algorithm_mkey = SSL_kEECDH, | 375 | .algorithm_mkey = SSL_kECDHE, |
| 376 | .algorithm_auth = SSL_aNULL, | 376 | .algorithm_auth = SSL_aNULL, |
| 377 | }, | 377 | }, |
| 378 | 378 | ||
| @@ -1451,8 +1451,8 @@ ssl_create_cipher_list(const SSL_METHOD *ssl_method, | |||
| 1451 | /* Now arrange all ciphers by preference: */ | 1451 | /* Now arrange all ciphers by preference: */ |
| 1452 | 1452 | ||
| 1453 | /* Everything else being equal, prefer ephemeral ECDH over other key exchange mechanisms */ | 1453 | /* Everything else being equal, prefer ephemeral ECDH over other key exchange mechanisms */ |
| 1454 | ssl_cipher_apply_rule(0, SSL_kEECDH, 0, 0, 0, 0, 0, CIPHER_ADD, -1, &head, &tail); | 1454 | ssl_cipher_apply_rule(0, SSL_kECDHE, 0, 0, 0, 0, 0, CIPHER_ADD, -1, &head, &tail); |
| 1455 | ssl_cipher_apply_rule(0, SSL_kEECDH, 0, 0, 0, 0, 0, CIPHER_DEL, -1, &head, &tail); | 1455 | ssl_cipher_apply_rule(0, SSL_kECDHE, 0, 0, 0, 0, 0, CIPHER_DEL, -1, &head, &tail); |
| 1456 | 1456 | ||
| 1457 | /* | 1457 | /* |
| 1458 | * CHACHA20 is fast and safe on all hardware and is thus our preferred | 1458 | * CHACHA20 is fast and safe on all hardware and is thus our preferred |
| @@ -1609,7 +1609,7 @@ SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) | |||
| 1609 | case SSL_kDHd: | 1609 | case SSL_kDHd: |
| 1610 | kx = "DH/DSS"; | 1610 | kx = "DH/DSS"; |
| 1611 | break; | 1611 | break; |
| 1612 | case SSL_kEDH: | 1612 | case SSL_kDHE: |
| 1613 | kx = "DH"; | 1613 | kx = "DH"; |
| 1614 | break; | 1614 | break; |
| 1615 | case SSL_kECDHr: | 1615 | case SSL_kECDHr: |
| @@ -1618,7 +1618,7 @@ SSL_CIPHER_description(const SSL_CIPHER *cipher, char *buf, int len) | |||
| 1618 | case SSL_kECDHe: | 1618 | case SSL_kECDHe: |
| 1619 | kx = "ECDH/ECDSA"; | 1619 | kx = "ECDH/ECDSA"; |
| 1620 | break; | 1620 | break; |
| 1621 | case SSL_kEECDH: | 1621 | case SSL_kECDHE: |
| 1622 | kx = "ECDH"; | 1622 | kx = "ECDH"; |
| 1623 | break; | 1623 | break; |
| 1624 | default: | 1624 | default: |
diff --git a/src/lib/libssl/ssl_lib.c b/src/lib/libssl/ssl_lib.c index b563071cda..6b62713bca 100644 --- a/src/lib/libssl/ssl_lib.c +++ b/src/lib/libssl/ssl_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_lib.c,v 1.77 2014/07/12 19:45:53 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_lib.c,v 1.78 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -1973,7 +1973,7 @@ ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher) | |||
| 1973 | mask_k|=SSL_kRSA; | 1973 | mask_k|=SSL_kRSA; |
| 1974 | 1974 | ||
| 1975 | if (dh_tmp) | 1975 | if (dh_tmp) |
| 1976 | mask_k|=SSL_kEDH; | 1976 | mask_k|=SSL_kDHE; |
| 1977 | 1977 | ||
| 1978 | if (dh_rsa) | 1978 | if (dh_rsa) |
| 1979 | mask_k|=SSL_kDHr; | 1979 | mask_k|=SSL_kDHr; |
| @@ -2022,7 +2022,7 @@ ssl_set_cert_masks(CERT *c, const SSL_CIPHER *cipher) | |||
| 2022 | } | 2022 | } |
| 2023 | 2023 | ||
| 2024 | if (have_ecdh_tmp) { | 2024 | if (have_ecdh_tmp) { |
| 2025 | mask_k|=SSL_kEECDH; | 2025 | mask_k|=SSL_kECDHE; |
| 2026 | } | 2026 | } |
| 2027 | 2027 | ||
| 2028 | 2028 | ||
| @@ -2108,10 +2108,10 @@ ssl_get_server_send_pkey(const SSL *s) | |||
| 2108 | 2108 | ||
| 2109 | if (alg_k & (SSL_kECDHr|SSL_kECDHe)) { | 2109 | if (alg_k & (SSL_kECDHr|SSL_kECDHe)) { |
| 2110 | /* | 2110 | /* |
| 2111 | * We don't need to look at SSL_kEECDH | 2111 | * We don't need to look at SSL_kECDHE |
| 2112 | * since no certificate is needed for | 2112 | * since no certificate is needed for |
| 2113 | * anon ECDH and for authenticated | 2113 | * anon ECDH and for authenticated |
| 2114 | * EECDH, the check for the auth | 2114 | * ECDHE, the check for the auth |
| 2115 | * algorithm will set i correctly | 2115 | * algorithm will set i correctly |
| 2116 | * NOTE: For ECDH-RSA, we need an ECC | 2116 | * NOTE: For ECDH-RSA, we need an ECC |
| 2117 | * not an RSA cert but for EECDH-RSA | 2117 | * not an RSA cert but for EECDH-RSA |
diff --git a/src/lib/libssl/ssl_locl.h b/src/lib/libssl/ssl_locl.h index 22ba8d926e..34e6337856 100644 --- a/src/lib/libssl/ssl_locl.h +++ b/src/lib/libssl/ssl_locl.h | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: ssl_locl.h,v 1.61 2014/07/12 19:45:53 jsing Exp $ */ | 1 | /* $OpenBSD: ssl_locl.h,v 1.62 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -256,10 +256,10 @@ | |||
| 256 | #define SSL_kRSA 0x00000001L /* RSA key exchange */ | 256 | #define SSL_kRSA 0x00000001L /* RSA key exchange */ |
| 257 | #define SSL_kDHr 0x00000002L /* DH cert, RSA CA cert */ /* no such ciphersuites supported! */ | 257 | #define SSL_kDHr 0x00000002L /* DH cert, RSA CA cert */ /* no such ciphersuites supported! */ |
| 258 | #define SSL_kDHd 0x00000004L /* DH cert, DSA CA cert */ /* no such ciphersuite supported! */ | 258 | #define SSL_kDHd 0x00000004L /* DH cert, DSA CA cert */ /* no such ciphersuite supported! */ |
| 259 | #define SSL_kEDH 0x00000008L /* tmp DH key no DH cert */ | 259 | #define SSL_kDHE 0x00000008L /* tmp DH key no DH cert */ |
| 260 | #define SSL_kECDHr 0x00000020L /* ECDH cert, RSA CA cert */ | 260 | #define SSL_kECDHr 0x00000020L /* ECDH cert, RSA CA cert */ |
| 261 | #define SSL_kECDHe 0x00000040L /* ECDH cert, ECDSA CA cert */ | 261 | #define SSL_kECDHe 0x00000040L /* ECDH cert, ECDSA CA cert */ |
| 262 | #define SSL_kEECDH 0x00000080L /* ephemeral ECDH */ | 262 | #define SSL_kECDHE 0x00000080L /* ephemeral ECDH */ |
| 263 | #define SSL_kGOST 0x00000200L /* GOST key exchange */ | 263 | #define SSL_kGOST 0x00000200L /* GOST key exchange */ |
| 264 | 264 | ||
| 265 | /* Bits for algorithm_auth (server authentication) */ | 265 | /* Bits for algorithm_auth (server authentication) */ |
| @@ -397,7 +397,7 @@ | |||
| 397 | /* SSL_kRSA <- RSA_ENC | (RSA_TMP & RSA_SIGN) | | 397 | /* SSL_kRSA <- RSA_ENC | (RSA_TMP & RSA_SIGN) | |
| 398 | * <- (EXPORT & (RSA_ENC | RSA_TMP) & RSA_SIGN) | 398 | * <- (EXPORT & (RSA_ENC | RSA_TMP) & RSA_SIGN) |
| 399 | * SSL_kDH <- DH_ENC & (RSA_ENC | RSA_SIGN | DSA_SIGN) | 399 | * SSL_kDH <- DH_ENC & (RSA_ENC | RSA_SIGN | DSA_SIGN) |
| 400 | * SSL_kEDH <- RSA_ENC | RSA_SIGN | DSA_SIGN | 400 | * SSL_kDHE <- RSA_ENC | RSA_SIGN | DSA_SIGN |
| 401 | * SSL_aRSA <- RSA_ENC | RSA_SIGN | 401 | * SSL_aRSA <- RSA_ENC | RSA_SIGN |
| 402 | * SSL_aDSS <- DSA_SIGN | 402 | * SSL_aDSS <- DSA_SIGN |
| 403 | */ | 403 | */ |
diff --git a/src/lib/libssl/t1_lib.c b/src/lib/libssl/t1_lib.c index 03af6e29ef..46b47a95b7 100644 --- a/src/lib/libssl/t1_lib.c +++ b/src/lib/libssl/t1_lib.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: t1_lib.c,v 1.49 2014/07/09 11:10:51 bcook Exp $ */ | 1 | /* $OpenBSD: t1_lib.c,v 1.50 2014/07/12 22:33:39 jsing Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -1477,7 +1477,7 @@ ssl_prepare_clienthello_tlsext(SSL *s) | |||
| 1477 | 1477 | ||
| 1478 | alg_k = c->algorithm_mkey; | 1478 | alg_k = c->algorithm_mkey; |
| 1479 | alg_a = c->algorithm_auth; | 1479 | alg_a = c->algorithm_auth; |
| 1480 | if ((alg_k & (SSL_kEECDH|SSL_kECDHr|SSL_kECDHe) || | 1480 | if ((alg_k & (SSL_kECDHE|SSL_kECDHr|SSL_kECDHe) || |
| 1481 | (alg_a & SSL_aECDSA))) { | 1481 | (alg_a & SSL_aECDSA))) { |
| 1482 | using_ecc = 1; | 1482 | using_ecc = 1; |
| 1483 | break; | 1483 | break; |
| @@ -1524,7 +1524,7 @@ ssl_prepare_serverhello_tlsext(SSL *s) | |||
| 1524 | 1524 | ||
| 1525 | unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; | 1525 | unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey; |
| 1526 | unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth; | 1526 | unsigned long alg_a = s->s3->tmp.new_cipher->algorithm_auth; |
| 1527 | int using_ecc = (alg_k & (SSL_kEECDH|SSL_kECDHr|SSL_kECDHe)) || (alg_a & SSL_aECDSA); | 1527 | int using_ecc = (alg_k & (SSL_kECDHE|SSL_kECDHr|SSL_kECDHe)) || (alg_a & SSL_aECDSA); |
| 1528 | using_ecc = using_ecc && (s->session->tlsext_ecpointformatlist != NULL); | 1528 | using_ecc = using_ecc && (s->session->tlsext_ecpointformatlist != NULL); |
| 1529 | 1529 | ||
| 1530 | if (using_ecc) { | 1530 | if (using_ecc) { |
| @@ -1650,7 +1650,7 @@ ssl_check_serverhello_tlsext(SSL *s) | |||
| 1650 | (s->tlsext_ecpointformatlist_length > 0) && | 1650 | (s->tlsext_ecpointformatlist_length > 0) && |
| 1651 | (s->session->tlsext_ecpointformatlist != NULL) && | 1651 | (s->session->tlsext_ecpointformatlist != NULL) && |
| 1652 | (s->session->tlsext_ecpointformatlist_length > 0) && | 1652 | (s->session->tlsext_ecpointformatlist_length > 0) && |
| 1653 | ((alg_k & (SSL_kEECDH|SSL_kECDHr|SSL_kECDHe)) || (alg_a & SSL_aECDSA))) { | 1653 | ((alg_k & (SSL_kECDHE|SSL_kECDHr|SSL_kECDHe)) || (alg_a & SSL_aECDSA))) { |
| 1654 | /* we are using an ECC cipher */ | 1654 | /* we are using an ECC cipher */ |
| 1655 | size_t i; | 1655 | size_t i; |
| 1656 | unsigned char *list; | 1656 | unsigned char *list; |
