Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 /*
2 * Table enumerating all implemented cipher suites
3 * Part of public API.
4 *
5 * This Source Code Form is subject to the terms of the Mozilla Public
6 * License, v. 2.0. If a copy of the MPL was not distributed with this
7 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
9 #include "ssl.h"
10 #include "sslproto.h"
12 /*
13 * The ordering of cipher suites in this table must match the ordering in
14 * the cipherSuites table in ssl3con.c.
15 *
16 * If new ECC cipher suites are added, also update the ssl3CipherSuite arrays
17 * in ssl3ecc.c.
18 *
19 * Finally, update the ssl_V3_SUITES_IMPLEMENTED macro in sslimpl.h.
20 *
21 * The ordering is as follows:
22 * * No-encryption cipher suites last
23 * * Export/weak/obsolete cipher suites before no-encryption cipher suites
24 * * Order by key exchange algorithm: ECDHE, then DHE, then ECDH, RSA.
25 * * Within key agreement sections, order by symmetric encryption algorithm:
26 * AES-128, then Camellia-128, then AES-256, then Camellia-256, then SEED,
27 * then FIPS-3DES, then 3DES, then RC4. AES is commonly accepted as a
28 * strong cipher internationally, and is often hardware-accelerated.
29 * Camellia also has wide international support across standards
30 * organizations. SEED is only recommended by the Korean government. 3DES
31 * only provides 112 bits of security. RC4 is now deprecated or forbidden
32 * by many standards organizations.
33 * * Within symmetric algorithm sections, order by message authentication
34 * algorithm: GCM, then HMAC-SHA1, then HMAC-SHA256, then HMAC-MD5.
35 * * Within message authentication algorithm sections, order by asymmetric
36 * signature algorithm: ECDSA, then RSA, then DSS.
37 *
38 * Exception: Because some servers ignore the high-order byte of the cipher
39 * suite ID, we must be careful about adding cipher suites with IDs larger
40 * than 0x00ff; see bug 946147. For these broken servers, the first four cipher
41 * suites, with the MSB zeroed, look like:
42 * TLS_KRB5_EXPORT_WITH_RC4_40_MD5 { 0x00,0x2B }
43 * TLS_RSA_WITH_AES_128_CBC_SHA { 0x00,0x2F }
44 * TLS_RSA_WITH_3DES_EDE_CBC_SHA { 0x00,0x0A }
45 * TLS_RSA_WITH_DES_CBC_SHA { 0x00,0x09 }
46 * The broken server only supports the third and fourth ones and will select
47 * the third one.
48 */
49 const PRUint16 SSL_ImplementedCiphers[] = {
50 #ifndef NSS_DISABLE_ECC
51 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
52 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
53 /* TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA must appear before
54 * TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA to work around bug 946147.
55 */
56 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
57 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
58 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
59 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,
60 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
61 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
62 TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,
63 TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
64 TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,
65 TLS_ECDHE_RSA_WITH_RC4_128_SHA,
66 #endif /* NSS_DISABLE_ECC */
68 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,
69 TLS_DHE_RSA_WITH_AES_128_CBC_SHA,
70 TLS_DHE_DSS_WITH_AES_128_CBC_SHA,
71 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,
72 TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,
73 TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,
74 TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
75 TLS_DHE_DSS_WITH_AES_256_CBC_SHA,
76 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,
77 TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,
78 TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,
79 TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA,
80 TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA,
81 TLS_DHE_DSS_WITH_RC4_128_SHA,
83 #ifndef NSS_DISABLE_ECC
84 TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
85 TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,
86 TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,
87 TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,
88 TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,
89 TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,
90 TLS_ECDH_ECDSA_WITH_RC4_128_SHA,
91 TLS_ECDH_RSA_WITH_RC4_128_SHA,
92 #endif /* NSS_DISABLE_ECC */
94 TLS_RSA_WITH_AES_128_GCM_SHA256,
95 TLS_RSA_WITH_AES_128_CBC_SHA,
96 TLS_RSA_WITH_AES_128_CBC_SHA256,
97 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA,
98 TLS_RSA_WITH_AES_256_CBC_SHA,
99 TLS_RSA_WITH_AES_256_CBC_SHA256,
100 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA,
101 TLS_RSA_WITH_SEED_CBC_SHA,
102 SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA,
103 TLS_RSA_WITH_3DES_EDE_CBC_SHA,
104 TLS_RSA_WITH_RC4_128_SHA,
105 TLS_RSA_WITH_RC4_128_MD5,
107 /* 56-bit DES "domestic" cipher suites */
108 TLS_DHE_RSA_WITH_DES_CBC_SHA,
109 TLS_DHE_DSS_WITH_DES_CBC_SHA,
110 SSL_RSA_FIPS_WITH_DES_CBC_SHA,
111 TLS_RSA_WITH_DES_CBC_SHA,
113 /* export ciphersuites with 1024-bit public key exchange keys */
114 TLS_RSA_EXPORT1024_WITH_RC4_56_SHA,
115 TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA,
117 /* export ciphersuites with 512-bit public key exchange keys */
118 TLS_RSA_EXPORT_WITH_RC4_40_MD5,
119 TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5,
121 /* ciphersuites with no encryption */
122 #ifndef NSS_DISABLE_ECC
123 TLS_ECDHE_ECDSA_WITH_NULL_SHA,
124 TLS_ECDHE_RSA_WITH_NULL_SHA,
125 TLS_ECDH_RSA_WITH_NULL_SHA,
126 TLS_ECDH_ECDSA_WITH_NULL_SHA,
127 #endif /* NSS_DISABLE_ECC */
128 TLS_RSA_WITH_NULL_SHA,
129 TLS_RSA_WITH_NULL_SHA256,
130 TLS_RSA_WITH_NULL_MD5,
132 /* SSL2 cipher suites. */
133 SSL_EN_RC4_128_WITH_MD5,
134 SSL_EN_RC2_128_CBC_WITH_MD5,
135 SSL_EN_DES_192_EDE3_CBC_WITH_MD5, /* actually 112, not 192 */
136 SSL_EN_DES_64_CBC_WITH_MD5,
137 SSL_EN_RC4_128_EXPORT40_WITH_MD5,
138 SSL_EN_RC2_128_CBC_EXPORT40_WITH_MD5,
140 0
142 };
144 const PRUint16 SSL_NumImplementedCiphers =
145 (sizeof SSL_ImplementedCiphers) / (sizeof SSL_ImplementedCiphers[0]) - 1;
147 const PRUint16 *
148 SSL_GetImplementedCiphers(void)
149 {
150 return SSL_ImplementedCiphers;
151 }
153 PRUint16
154 SSL_GetNumImplementedCiphers(void)
155 {
156 return SSL_NumImplementedCiphers;
157 }