2015-10-21 05:03:22 +02:00
|
|
|
/*
|
|
|
|
* Table enumerating all implemented cipher suites
|
|
|
|
* Part of public API.
|
|
|
|
*
|
2018-05-04 16:08:28 +02:00
|
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2015-10-21 05:03:22 +02:00
|
|
|
|
|
|
|
#include "ssl.h"
|
|
|
|
#include "sslproto.h"
|
|
|
|
|
|
|
|
/*
|
2018-05-04 16:08:28 +02:00
|
|
|
* The ordering of cipher suites in this table must match the ordering in
|
|
|
|
* the cipherSuites table in ssl3con.c.
|
|
|
|
*
|
|
|
|
* If new ECC cipher suites are added, also update the ssl3CipherSuite arrays
|
|
|
|
* in ssl3ecc.c.
|
|
|
|
*
|
|
|
|
* Finally, update the ssl_V3_SUITES_IMPLEMENTED macro in sslimpl.h.
|
2015-10-21 05:03:22 +02:00
|
|
|
*
|
2018-05-04 16:08:28 +02:00
|
|
|
* The ordering is as follows:
|
|
|
|
* * No-encryption cipher suites last
|
|
|
|
* * Export/weak/obsolete cipher suites before no-encryption cipher suites
|
|
|
|
* * Order by key exchange algorithm: ECDHE, then DHE, then ECDH, RSA.
|
|
|
|
* * Within key agreement sections, order by symmetric encryption algorithm:
|
|
|
|
* AES-128, then Camellia-128, then AES-256, then Camellia-256, then SEED,
|
|
|
|
* then FIPS-3DES, then 3DES, then RC4. AES is commonly accepted as a
|
|
|
|
* strong cipher internationally, and is often hardware-accelerated.
|
|
|
|
* Camellia also has wide international support across standards
|
|
|
|
* organizations. SEED is only recommended by the Korean government. 3DES
|
|
|
|
* only provides 112 bits of security. RC4 is now deprecated or forbidden
|
|
|
|
* by many standards organizations.
|
|
|
|
* * Within symmetric algorithm sections, order by message authentication
|
|
|
|
* algorithm: GCM, then HMAC-SHA1, then HMAC-SHA256, then HMAC-MD5.
|
|
|
|
* * Within message authentication algorithm sections, order by asymmetric
|
|
|
|
* signature algorithm: ECDSA, then RSA, then DSS.
|
|
|
|
*
|
|
|
|
* Exception: Because some servers ignore the high-order byte of the cipher
|
|
|
|
* suite ID, we must be careful about adding cipher suites with IDs larger
|
|
|
|
* than 0x00ff; see bug 946147. For these broken servers, the first four cipher
|
|
|
|
* suites, with the MSB zeroed, look like:
|
|
|
|
* TLS_KRB5_EXPORT_WITH_RC4_40_MD5 { 0x00,0x2B }
|
|
|
|
* TLS_RSA_WITH_AES_128_CBC_SHA { 0x00,0x2F }
|
|
|
|
* TLS_RSA_WITH_3DES_EDE_CBC_SHA { 0x00,0x0A }
|
|
|
|
* TLS_RSA_WITH_DES_CBC_SHA { 0x00,0x09 }
|
|
|
|
* The broken server only supports the third and fourth ones and will select
|
|
|
|
* the third one.
|
2015-10-21 05:03:22 +02:00
|
|
|
*/
|
|
|
|
const PRUint16 SSL_ImplementedCiphers[] = {
|
cherry-picked mozilla NSS upstream changes (to rev f7a4c771997e, which is on par with 3.16.1 but without windows rand() changes):
9934c8faef29, 3c3b381c4865, 5a67f6beee9a, 1b1eb6d77728, a8b668fd72f7, bug962760, bug743700, bug857304, bug972653, bug972450, bug971358, bug903885, bug977073, bug976111, bug949939, bug947653, bug947572, bug903885, bug979106, bug966596, bug979004, bug979752, bug980848, bug938369, bug981170, bug668130, bug974693, bug975056, bug979132, bug370717, bug979070, bug985070, bug900067, bug977673, bug519255, bug989558, bug557299, bug987263, bug369802, a751a5146718, bug992343, bug952572, bug979703, bug994883, bug994869, bug993489, bug984608, bug977869, bug667371, bug672828, bug793347, bug977869
2018-07-10 17:07:31 +02:00
|
|
|
#ifndef NSS_DISABLE_ECC
|
2018-05-04 16:08:28 +02:00
|
|
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
|
|
|
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
2018-08-18 18:30:36 +02:00
|
|
|
TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_GCM_SHA256,
|
|
|
|
TLS_ECDHE_RSA_WITH_CAMELLIA_128_GCM_SHA256,
|
2018-05-04 16:08:28 +02:00
|
|
|
/* TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA must appear before
|
|
|
|
* TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA to work around bug 946147.
|
|
|
|
*/
|
2015-10-21 05:03:22 +02:00
|
|
|
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
|
2018-05-04 16:08:28 +02:00
|
|
|
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
|
|
|
|
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
|
|
|
|
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,
|
|
|
|
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
|
2015-10-21 05:03:22 +02:00
|
|
|
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
|
2018-05-04 16:08:28 +02:00
|
|
|
TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,
|
|
|
|
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
|
2015-10-21 05:03:22 +02:00
|
|
|
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,
|
|
|
|
TLS_ECDHE_RSA_WITH_RC4_128_SHA,
|
cherry-picked mozilla NSS upstream changes (to rev f7a4c771997e, which is on par with 3.16.1 but without windows rand() changes):
9934c8faef29, 3c3b381c4865, 5a67f6beee9a, 1b1eb6d77728, a8b668fd72f7, bug962760, bug743700, bug857304, bug972653, bug972450, bug971358, bug903885, bug977073, bug976111, bug949939, bug947653, bug947572, bug903885, bug979106, bug966596, bug979004, bug979752, bug980848, bug938369, bug981170, bug668130, bug974693, bug975056, bug979132, bug370717, bug979070, bug985070, bug900067, bug977673, bug519255, bug989558, bug557299, bug987263, bug369802, a751a5146718, bug992343, bug952572, bug979703, bug994883, bug994869, bug993489, bug984608, bug977869, bug667371, bug672828, bug793347, bug977869
2018-07-10 17:07:31 +02:00
|
|
|
#endif /* NSS_DISABLE_ECC */
|
2018-05-04 16:08:28 +02:00
|
|
|
|
|
|
|
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,
|
cherry-picked mozilla NSS upstream changes (to rev bad5fd065fa1, which is on par with 3.20):
bug1001332, 56b691c003ad, bug1086145, bug1054069, bug1155922, bug991783, bug1125025, bug1162521, bug1162644, bug1132941, bug1164364, bug1166205, bug1166163, bug1166515, bug1138554, bug1167046, bug1167043, bug1169451, bug1172128, bug1170322, bug102794, bug1128184, bug557830, bug1174648, bug1180244, bug1177784, bug1173413, bug1169174, bug1084669, bug951455, bug1183395, bug1177430, bug1183827, bug1160139, bug1154106, bug1142209, bug1185033, bug1193467, bug1182667(with sha512 changes backed out, which breaks VC6 compilation), bug1158489, bug337796
2018-07-12 15:44:51 +02:00
|
|
|
TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,
|
2018-05-04 16:08:28 +02:00
|
|
|
TLS_DHE_RSA_WITH_AES_128_CBC_SHA,
|
|
|
|
TLS_DHE_DSS_WITH_AES_128_CBC_SHA,
|
|
|
|
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,
|
cherry-picked mozilla NSS upstream changes (to rev bad5fd065fa1, which is on par with 3.20):
bug1001332, 56b691c003ad, bug1086145, bug1054069, bug1155922, bug991783, bug1125025, bug1162521, bug1162644, bug1132941, bug1164364, bug1166205, bug1166163, bug1166515, bug1138554, bug1167046, bug1167043, bug1169451, bug1172128, bug1170322, bug102794, bug1128184, bug557830, bug1174648, bug1180244, bug1177784, bug1173413, bug1169174, bug1084669, bug951455, bug1183395, bug1177430, bug1183827, bug1160139, bug1154106, bug1142209, bug1185033, bug1193467, bug1182667(with sha512 changes backed out, which breaks VC6 compilation), bug1158489, bug337796
2018-07-12 15:44:51 +02:00
|
|
|
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,
|
2015-10-21 05:03:22 +02:00
|
|
|
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,
|
|
|
|
TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,
|
2018-05-04 16:08:28 +02:00
|
|
|
TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
|
|
|
|
TLS_DHE_DSS_WITH_AES_256_CBC_SHA,
|
|
|
|
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,
|
cherry-picked mozilla NSS upstream changes (to rev bad5fd065fa1, which is on par with 3.20):
bug1001332, 56b691c003ad, bug1086145, bug1054069, bug1155922, bug991783, bug1125025, bug1162521, bug1162644, bug1132941, bug1164364, bug1166205, bug1166163, bug1166515, bug1138554, bug1167046, bug1167043, bug1169451, bug1172128, bug1170322, bug102794, bug1128184, bug557830, bug1174648, bug1180244, bug1177784, bug1173413, bug1169174, bug1084669, bug951455, bug1183395, bug1177430, bug1183827, bug1160139, bug1154106, bug1142209, bug1185033, bug1193467, bug1182667(with sha512 changes backed out, which breaks VC6 compilation), bug1158489, bug337796
2018-07-12 15:44:51 +02:00
|
|
|
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256,
|
2018-05-04 16:08:28 +02:00
|
|
|
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,
|
|
|
|
TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,
|
cherry-picked mozilla NSS upstream changes (to rev f7a4c771997e, which is on par with 3.16.1 but without windows rand() changes):
9934c8faef29, 3c3b381c4865, 5a67f6beee9a, 1b1eb6d77728, a8b668fd72f7, bug962760, bug743700, bug857304, bug972653, bug972450, bug971358, bug903885, bug977073, bug976111, bug949939, bug947653, bug947572, bug903885, bug979106, bug966596, bug979004, bug979752, bug980848, bug938369, bug981170, bug668130, bug974693, bug975056, bug979132, bug370717, bug979070, bug985070, bug900067, bug977673, bug519255, bug989558, bug557299, bug987263, bug369802, a751a5146718, bug992343, bug952572, bug979703, bug994883, bug994869, bug993489, bug984608, bug977869, bug667371, bug672828, bug793347, bug977869
2018-07-10 17:07:31 +02:00
|
|
|
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA,
|
|
|
|
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA,
|
2015-10-21 05:03:22 +02:00
|
|
|
TLS_DHE_DSS_WITH_RC4_128_SHA,
|
2018-05-04 16:08:28 +02:00
|
|
|
|
cherry-picked mozilla NSS upstream changes (to rev f7a4c771997e, which is on par with 3.16.1 but without windows rand() changes):
9934c8faef29, 3c3b381c4865, 5a67f6beee9a, 1b1eb6d77728, a8b668fd72f7, bug962760, bug743700, bug857304, bug972653, bug972450, bug971358, bug903885, bug977073, bug976111, bug949939, bug947653, bug947572, bug903885, bug979106, bug966596, bug979004, bug979752, bug980848, bug938369, bug981170, bug668130, bug974693, bug975056, bug979132, bug370717, bug979070, bug985070, bug900067, bug977673, bug519255, bug989558, bug557299, bug987263, bug369802, a751a5146718, bug992343, bug952572, bug979703, bug994883, bug994869, bug993489, bug984608, bug977869, bug667371, bug672828, bug793347, bug977869
2018-07-10 17:07:31 +02:00
|
|
|
#ifndef NSS_DISABLE_ECC
|
2018-05-04 16:08:28 +02:00
|
|
|
TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
|
2015-10-21 05:03:22 +02:00
|
|
|
TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,
|
2018-05-04 16:08:28 +02:00
|
|
|
TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,
|
|
|
|
TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,
|
|
|
|
TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,
|
|
|
|
TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,
|
2015-10-21 05:03:22 +02:00
|
|
|
TLS_ECDH_ECDSA_WITH_RC4_128_SHA,
|
2018-05-04 16:08:28 +02:00
|
|
|
TLS_ECDH_RSA_WITH_RC4_128_SHA,
|
cherry-picked mozilla NSS upstream changes (to rev f7a4c771997e, which is on par with 3.16.1 but without windows rand() changes):
9934c8faef29, 3c3b381c4865, 5a67f6beee9a, 1b1eb6d77728, a8b668fd72f7, bug962760, bug743700, bug857304, bug972653, bug972450, bug971358, bug903885, bug977073, bug976111, bug949939, bug947653, bug947572, bug903885, bug979106, bug966596, bug979004, bug979752, bug980848, bug938369, bug981170, bug668130, bug974693, bug975056, bug979132, bug370717, bug979070, bug985070, bug900067, bug977673, bug519255, bug989558, bug557299, bug987263, bug369802, a751a5146718, bug992343, bug952572, bug979703, bug994883, bug994869, bug993489, bug984608, bug977869, bug667371, bug672828, bug793347, bug977869
2018-07-10 17:07:31 +02:00
|
|
|
#endif /* NSS_DISABLE_ECC */
|
2015-10-21 05:03:22 +02:00
|
|
|
|
2018-05-04 16:08:28 +02:00
|
|
|
TLS_RSA_WITH_AES_128_GCM_SHA256,
|
|
|
|
TLS_RSA_WITH_AES_128_CBC_SHA,
|
|
|
|
TLS_RSA_WITH_AES_128_CBC_SHA256,
|
|
|
|
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA,
|
|
|
|
TLS_RSA_WITH_AES_256_CBC_SHA,
|
|
|
|
TLS_RSA_WITH_AES_256_CBC_SHA256,
|
|
|
|
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA,
|
|
|
|
TLS_RSA_WITH_SEED_CBC_SHA,
|
2015-10-21 05:03:22 +02:00
|
|
|
SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA,
|
cherry-picked mozilla NSS upstream changes (to rev f7a4c771997e, which is on par with 3.16.1 but without windows rand() changes):
9934c8faef29, 3c3b381c4865, 5a67f6beee9a, 1b1eb6d77728, a8b668fd72f7, bug962760, bug743700, bug857304, bug972653, bug972450, bug971358, bug903885, bug977073, bug976111, bug949939, bug947653, bug947572, bug903885, bug979106, bug966596, bug979004, bug979752, bug980848, bug938369, bug981170, bug668130, bug974693, bug975056, bug979132, bug370717, bug979070, bug985070, bug900067, bug977673, bug519255, bug989558, bug557299, bug987263, bug369802, a751a5146718, bug992343, bug952572, bug979703, bug994883, bug994869, bug993489, bug984608, bug977869, bug667371, bug672828, bug793347, bug977869
2018-07-10 17:07:31 +02:00
|
|
|
TLS_RSA_WITH_3DES_EDE_CBC_SHA,
|
|
|
|
TLS_RSA_WITH_RC4_128_SHA,
|
|
|
|
TLS_RSA_WITH_RC4_128_MD5,
|
2015-10-21 05:03:22 +02:00
|
|
|
|
|
|
|
/* 56-bit DES "domestic" cipher suites */
|
cherry-picked mozilla NSS upstream changes (to rev f7a4c771997e, which is on par with 3.16.1 but without windows rand() changes):
9934c8faef29, 3c3b381c4865, 5a67f6beee9a, 1b1eb6d77728, a8b668fd72f7, bug962760, bug743700, bug857304, bug972653, bug972450, bug971358, bug903885, bug977073, bug976111, bug949939, bug947653, bug947572, bug903885, bug979106, bug966596, bug979004, bug979752, bug980848, bug938369, bug981170, bug668130, bug974693, bug975056, bug979132, bug370717, bug979070, bug985070, bug900067, bug977673, bug519255, bug989558, bug557299, bug987263, bug369802, a751a5146718, bug992343, bug952572, bug979703, bug994883, bug994869, bug993489, bug984608, bug977869, bug667371, bug672828, bug793347, bug977869
2018-07-10 17:07:31 +02:00
|
|
|
TLS_DHE_RSA_WITH_DES_CBC_SHA,
|
|
|
|
TLS_DHE_DSS_WITH_DES_CBC_SHA,
|
2015-10-21 05:03:22 +02:00
|
|
|
SSL_RSA_FIPS_WITH_DES_CBC_SHA,
|
cherry-picked mozilla NSS upstream changes (to rev f7a4c771997e, which is on par with 3.16.1 but without windows rand() changes):
9934c8faef29, 3c3b381c4865, 5a67f6beee9a, 1b1eb6d77728, a8b668fd72f7, bug962760, bug743700, bug857304, bug972653, bug972450, bug971358, bug903885, bug977073, bug976111, bug949939, bug947653, bug947572, bug903885, bug979106, bug966596, bug979004, bug979752, bug980848, bug938369, bug981170, bug668130, bug974693, bug975056, bug979132, bug370717, bug979070, bug985070, bug900067, bug977673, bug519255, bug989558, bug557299, bug987263, bug369802, a751a5146718, bug992343, bug952572, bug979703, bug994883, bug994869, bug993489, bug984608, bug977869, bug667371, bug672828, bug793347, bug977869
2018-07-10 17:07:31 +02:00
|
|
|
TLS_RSA_WITH_DES_CBC_SHA,
|
2015-10-21 05:03:22 +02:00
|
|
|
|
|
|
|
/* export ciphersuites with 1024-bit public key exchange keys */
|
|
|
|
TLS_RSA_EXPORT1024_WITH_RC4_56_SHA,
|
|
|
|
TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA,
|
|
|
|
|
|
|
|
/* export ciphersuites with 512-bit public key exchange keys */
|
cherry-picked mozilla NSS upstream changes (to rev f7a4c771997e, which is on par with 3.16.1 but without windows rand() changes):
9934c8faef29, 3c3b381c4865, 5a67f6beee9a, 1b1eb6d77728, a8b668fd72f7, bug962760, bug743700, bug857304, bug972653, bug972450, bug971358, bug903885, bug977073, bug976111, bug949939, bug947653, bug947572, bug903885, bug979106, bug966596, bug979004, bug979752, bug980848, bug938369, bug981170, bug668130, bug974693, bug975056, bug979132, bug370717, bug979070, bug985070, bug900067, bug977673, bug519255, bug989558, bug557299, bug987263, bug369802, a751a5146718, bug992343, bug952572, bug979703, bug994883, bug994869, bug993489, bug984608, bug977869, bug667371, bug672828, bug793347, bug977869
2018-07-10 17:07:31 +02:00
|
|
|
TLS_RSA_EXPORT_WITH_RC4_40_MD5,
|
|
|
|
TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5,
|
2015-10-21 05:03:22 +02:00
|
|
|
|
|
|
|
/* ciphersuites with no encryption */
|
cherry-picked mozilla NSS upstream changes (to rev f7a4c771997e, which is on par with 3.16.1 but without windows rand() changes):
9934c8faef29, 3c3b381c4865, 5a67f6beee9a, 1b1eb6d77728, a8b668fd72f7, bug962760, bug743700, bug857304, bug972653, bug972450, bug971358, bug903885, bug977073, bug976111, bug949939, bug947653, bug947572, bug903885, bug979106, bug966596, bug979004, bug979752, bug980848, bug938369, bug981170, bug668130, bug974693, bug975056, bug979132, bug370717, bug979070, bug985070, bug900067, bug977673, bug519255, bug989558, bug557299, bug987263, bug369802, a751a5146718, bug992343, bug952572, bug979703, bug994883, bug994869, bug993489, bug984608, bug977869, bug667371, bug672828, bug793347, bug977869
2018-07-10 17:07:31 +02:00
|
|
|
#ifndef NSS_DISABLE_ECC
|
2015-10-21 05:03:22 +02:00
|
|
|
TLS_ECDHE_ECDSA_WITH_NULL_SHA,
|
|
|
|
TLS_ECDHE_RSA_WITH_NULL_SHA,
|
|
|
|
TLS_ECDH_RSA_WITH_NULL_SHA,
|
|
|
|
TLS_ECDH_ECDSA_WITH_NULL_SHA,
|
cherry-picked mozilla NSS upstream changes (to rev f7a4c771997e, which is on par with 3.16.1 but without windows rand() changes):
9934c8faef29, 3c3b381c4865, 5a67f6beee9a, 1b1eb6d77728, a8b668fd72f7, bug962760, bug743700, bug857304, bug972653, bug972450, bug971358, bug903885, bug977073, bug976111, bug949939, bug947653, bug947572, bug903885, bug979106, bug966596, bug979004, bug979752, bug980848, bug938369, bug981170, bug668130, bug974693, bug975056, bug979132, bug370717, bug979070, bug985070, bug900067, bug977673, bug519255, bug989558, bug557299, bug987263, bug369802, a751a5146718, bug992343, bug952572, bug979703, bug994883, bug994869, bug993489, bug984608, bug977869, bug667371, bug672828, bug793347, bug977869
2018-07-10 17:07:31 +02:00
|
|
|
#endif /* NSS_DISABLE_ECC */
|
|
|
|
TLS_RSA_WITH_NULL_SHA,
|
2018-05-04 16:08:28 +02:00
|
|
|
TLS_RSA_WITH_NULL_SHA256,
|
cherry-picked mozilla NSS upstream changes (to rev f7a4c771997e, which is on par with 3.16.1 but without windows rand() changes):
9934c8faef29, 3c3b381c4865, 5a67f6beee9a, 1b1eb6d77728, a8b668fd72f7, bug962760, bug743700, bug857304, bug972653, bug972450, bug971358, bug903885, bug977073, bug976111, bug949939, bug947653, bug947572, bug903885, bug979106, bug966596, bug979004, bug979752, bug980848, bug938369, bug981170, bug668130, bug974693, bug975056, bug979132, bug370717, bug979070, bug985070, bug900067, bug977673, bug519255, bug989558, bug557299, bug987263, bug369802, a751a5146718, bug992343, bug952572, bug979703, bug994883, bug994869, bug993489, bug984608, bug977869, bug667371, bug672828, bug793347, bug977869
2018-07-10 17:07:31 +02:00
|
|
|
TLS_RSA_WITH_NULL_MD5,
|
2015-10-21 05:03:22 +02:00
|
|
|
|
|
|
|
/* SSL2 cipher suites. */
|
|
|
|
SSL_EN_RC4_128_WITH_MD5,
|
|
|
|
SSL_EN_RC2_128_CBC_WITH_MD5,
|
|
|
|
SSL_EN_DES_192_EDE3_CBC_WITH_MD5, /* actually 112, not 192 */
|
|
|
|
SSL_EN_DES_64_CBC_WITH_MD5,
|
|
|
|
SSL_EN_RC4_128_EXPORT40_WITH_MD5,
|
|
|
|
SSL_EN_RC2_128_CBC_EXPORT40_WITH_MD5,
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
const PRUint16 SSL_NumImplementedCiphers =
|
|
|
|
(sizeof SSL_ImplementedCiphers) / (sizeof SSL_ImplementedCiphers[0]) - 1;
|
|
|
|
|
2018-05-04 16:08:28 +02:00
|
|
|
const PRUint16 *
|
|
|
|
SSL_GetImplementedCiphers(void)
|
|
|
|
{
|
|
|
|
return SSL_ImplementedCiphers;
|
|
|
|
}
|
|
|
|
|
|
|
|
PRUint16
|
|
|
|
SSL_GetNumImplementedCiphers(void)
|
|
|
|
{
|
|
|
|
return SSL_NumImplementedCiphers;
|
|
|
|
}
|