OLD | NEW |
| (Empty) |
1 /* | |
2 * Table enumerating all implemented cipher suites | |
3 * Part of public API. | |
4 * | |
5 * This Source Code Form is subject to the terms of the Mozilla Public | |
6 * License, v. 2.0. If a copy of the MPL was not distributed with this | |
7 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | |
8 | |
9 #include "ssl.h" | |
10 #include "sslproto.h" | |
11 | |
12 /* | |
13 * The ordering of cipher suites in this table must match the ordering in | |
14 * the cipherSuites table in ssl3con.c. | |
15 * | |
16 * If new ECC cipher suites are added, also update the ssl3CipherSuite arrays | |
17 * in ssl3ecc.c. | |
18 * | |
19 * Finally, update the ssl_V3_SUITES_IMPLEMENTED macro in sslimpl.h. | |
20 * | |
21 * The ordering is as follows: | |
22 * * No-encryption cipher suites last | |
23 * * Export/weak/obsolete cipher suites before no-encryption cipher suites | |
24 * * Order by key exchange algorithm: ECDHE, then DHE, then ECDH, RSA. | |
25 * * Within key agreement sections, order by symmetric encryption algorithm: | |
26 * AES-128, then Camellia-128, then AES-256, then Camellia-256, then SEED, | |
27 * then FIPS-3DES, then 3DES, then RC4. AES is commonly accepted as a | |
28 * strong cipher internationally, and is often hardware-accelerated. | |
29 * Camellia also has wide international support across standards | |
30 * organizations. SEED is only recommended by the Korean government. 3DES | |
31 * only provides 112 bits of security. RC4 is now deprecated or forbidden | |
32 * by many standards organizations. | |
33 * * Within symmetric algorithm sections, order by message authentication | |
34 * algorithm: GCM, then HMAC-SHA1, then HMAC-SHA256, then HMAC-MD5. | |
35 * * Within message authentication algorithm sections, order by asymmetric | |
36 * signature algorithm: ECDSA, then RSA, then DSS. | |
37 * | |
38 * Exception: Because some servers ignore the high-order byte of the cipher | |
39 * suite ID, we must be careful about adding cipher suites with IDs larger | |
40 * than 0x00ff; see bug 946147. For these broken servers, the first six cipher | |
41 * suites, with the MSB zeroed, look like: | |
42 * TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA { 0x00,0x14 } | |
43 * TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA { 0x00,0x13 } | |
44 * TLS_KRB5_EXPORT_WITH_RC4_40_MD5 { 0x00,0x2B } | |
45 * TLS_RSA_WITH_AES_128_CBC_SHA { 0x00,0x2F } | |
46 * TLS_RSA_WITH_3DES_EDE_CBC_SHA { 0x00,0x0A } | |
47 * TLS_RSA_WITH_DES_CBC_SHA { 0x00,0x09 } | |
48 * The broken server only supports the fifth and sixth ones and will select | |
49 * the fifth one. | |
50 */ | |
51 const PRUint16 SSL_ImplementedCiphers[] = { | |
52 #ifdef NSS_ENABLE_ECC | |
53 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305, | |
54 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305, | |
55 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, | |
56 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, | |
57 /* TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA must appear before | |
58 * TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA to work around bug 946147. | |
59 */ | |
60 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, | |
61 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, | |
62 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, | |
63 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, | |
64 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, | |
65 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, | |
66 TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, | |
67 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, | |
68 TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, | |
69 TLS_ECDHE_RSA_WITH_RC4_128_SHA, | |
70 #endif /* NSS_ENABLE_ECC */ | |
71 | |
72 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, | |
73 TLS_DHE_RSA_WITH_AES_128_CBC_SHA, | |
74 TLS_DHE_DSS_WITH_AES_128_CBC_SHA, | |
75 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, | |
76 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA, | |
77 TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA, | |
78 TLS_DHE_RSA_WITH_AES_256_CBC_SHA, | |
79 TLS_DHE_DSS_WITH_AES_256_CBC_SHA, | |
80 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, | |
81 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA, | |
82 TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA, | |
83 SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, | |
84 SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, | |
85 TLS_DHE_DSS_WITH_RC4_128_SHA, | |
86 | |
87 #ifdef NSS_ENABLE_ECC | |
88 TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, | |
89 TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, | |
90 TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, | |
91 TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, | |
92 TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, | |
93 TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, | |
94 TLS_ECDH_ECDSA_WITH_RC4_128_SHA, | |
95 TLS_ECDH_RSA_WITH_RC4_128_SHA, | |
96 #endif /* NSS_ENABLE_ECC */ | |
97 | |
98 TLS_RSA_WITH_AES_128_GCM_SHA256, | |
99 TLS_RSA_WITH_AES_128_CBC_SHA, | |
100 TLS_RSA_WITH_AES_128_CBC_SHA256, | |
101 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA, | |
102 TLS_RSA_WITH_AES_256_CBC_SHA, | |
103 TLS_RSA_WITH_AES_256_CBC_SHA256, | |
104 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA, | |
105 TLS_RSA_WITH_SEED_CBC_SHA, | |
106 SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA, | |
107 SSL_RSA_WITH_3DES_EDE_CBC_SHA, | |
108 SSL_RSA_WITH_RC4_128_SHA, | |
109 SSL_RSA_WITH_RC4_128_MD5, | |
110 | |
111 /* 56-bit DES "domestic" cipher suites */ | |
112 SSL_DHE_RSA_WITH_DES_CBC_SHA, | |
113 SSL_DHE_DSS_WITH_DES_CBC_SHA, | |
114 SSL_RSA_FIPS_WITH_DES_CBC_SHA, | |
115 SSL_RSA_WITH_DES_CBC_SHA, | |
116 | |
117 /* export ciphersuites with 1024-bit public key exchange keys */ | |
118 TLS_RSA_EXPORT1024_WITH_RC4_56_SHA, | |
119 TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA, | |
120 | |
121 /* export ciphersuites with 512-bit public key exchange keys */ | |
122 SSL_RSA_EXPORT_WITH_RC4_40_MD5, | |
123 SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5, | |
124 | |
125 /* ciphersuites with no encryption */ | |
126 #ifdef NSS_ENABLE_ECC | |
127 TLS_ECDHE_ECDSA_WITH_NULL_SHA, | |
128 TLS_ECDHE_RSA_WITH_NULL_SHA, | |
129 TLS_ECDH_RSA_WITH_NULL_SHA, | |
130 TLS_ECDH_ECDSA_WITH_NULL_SHA, | |
131 #endif /* NSS_ENABLE_ECC */ | |
132 SSL_RSA_WITH_NULL_SHA, | |
133 TLS_RSA_WITH_NULL_SHA256, | |
134 SSL_RSA_WITH_NULL_MD5, | |
135 | |
136 /* SSL2 cipher suites. */ | |
137 SSL_EN_RC4_128_WITH_MD5, | |
138 SSL_EN_RC2_128_CBC_WITH_MD5, | |
139 SSL_EN_DES_192_EDE3_CBC_WITH_MD5, /* actually 112, not 192 */ | |
140 SSL_EN_DES_64_CBC_WITH_MD5, | |
141 SSL_EN_RC4_128_EXPORT40_WITH_MD5, | |
142 SSL_EN_RC2_128_CBC_EXPORT40_WITH_MD5, | |
143 | |
144 0 | |
145 | |
146 }; | |
147 | |
148 const PRUint16 SSL_NumImplementedCiphers = | |
149 (sizeof SSL_ImplementedCiphers) / (sizeof SSL_ImplementedCiphers[0]) - 1; | |
150 | |
151 const PRUint16 * | |
152 SSL_GetImplementedCiphers(void) | |
153 { | |
154 return SSL_ImplementedCiphers; | |
155 } | |
156 | |
157 PRUint16 | |
158 SSL_GetNumImplementedCiphers(void) | |
159 { | |
160 return SSL_NumImplementedCiphers; | |
161 } | |
OLD | NEW |