Home | History | Annotate | Download | only in ssl
      1 /*
      2  * Table enumerating all implemented cipher suites
      3  * Part of public API.
      4  *
      5  * This Source Code Form is subject to the terms of the Mozilla Public
      6  * License, v. 2.0. If a copy of the MPL was not distributed with this
      7  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
      8 
      9 #include "ssl.h"
     10 #include "sslproto.h"
     11 
     12 /*
     13  * The ordering of cipher suites in this table must match the ordering in
     14  * the cipherSuites table in ssl3con.c.
     15  *
     16  * If new ECC cipher suites are added, also update the ssl3CipherSuite arrays
     17  * in ssl3ecc.c.
     18  *
     19  * Finally, update the ssl_V3_SUITES_IMPLEMENTED macro in sslimpl.h.
     20  *
     21  * The ordering is as follows:
     22  *    * No-encryption cipher suites last
     23  *    * Export/weak/obsolete cipher suites before no-encryption cipher suites
     24  *    * Order by key exchange algorithm: ECDHE, then DHE, then ECDH, RSA.
     25  *    * Within key agreement sections, order by symmetric encryption algorithm:
     26  *      AES-128, then Camellia-128, then AES-256, then Camellia-256, then SEED,
     27  *      then FIPS-3DES, then 3DES, then RC4. AES is commonly accepted as a
     28  *      strong cipher internationally, and is often hardware-accelerated.
     29  *      Camellia also has wide international support across standards
     30  *      organizations. SEED is only recommended by the Korean government. 3DES
     31  *      only provides 112 bits of security. RC4 is now deprecated or forbidden
     32  *      by many standards organizations.
     33  *    * Within symmetric algorithm sections, order by message authentication
     34  *      algorithm: GCM, then HMAC-SHA1, then HMAC-SHA256, then HMAC-MD5.
     35  *    * Within message authentication algorithm sections, order by asymmetric
     36  *      signature algorithm: ECDSA, then RSA, then DSS.
     37  *
     38  * Exception: Because some servers ignore the high-order byte of the cipher
     39  * suite ID, we must be careful about adding cipher suites with IDs larger
     40  * than 0x00ff; see bug 946147. For these broken servers, the first six cipher
     41  * suites, with the MSB zeroed, look like:
     42  *      TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA { 0x00,0x14 }
     43  *      TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA { 0x00,0x13 }
     44  *      TLS_KRB5_EXPORT_WITH_RC4_40_MD5 { 0x00,0x2B }
     45  *      TLS_RSA_WITH_AES_128_CBC_SHA { 0x00,0x2F }
     46  *      TLS_RSA_WITH_3DES_EDE_CBC_SHA { 0x00,0x0A }
     47  *      TLS_RSA_WITH_DES_CBC_SHA { 0x00,0x09 }
     48  * The broken server only supports the fifth and sixth ones and will select
     49  * the fifth one.
     50  */
     51 const PRUint16 SSL_ImplementedCiphers[] = {
     52 #ifdef NSS_ENABLE_ECC
     53     TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
     54     TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
     55     TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
     56     TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
     57     /* TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA must appear before
     58      * TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA to work around bug 946147.
     59      */
     60     TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
     61     TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
     62     TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
     63     TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,
     64     TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
     65     TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
     66     TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,
     67     TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
     68     TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,
     69     TLS_ECDHE_RSA_WITH_RC4_128_SHA,
     70 #endif /* NSS_ENABLE_ECC */
     71 
     72     TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,
     73     TLS_DHE_RSA_WITH_AES_128_CBC_SHA,
     74     TLS_DHE_DSS_WITH_AES_128_CBC_SHA,
     75     TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,
     76     TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,
     77     TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,
     78     TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
     79     TLS_DHE_DSS_WITH_AES_256_CBC_SHA,
     80     TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,
     81     TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,
     82     TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,
     83     SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA,
     84     SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,
     85     TLS_DHE_DSS_WITH_RC4_128_SHA,
     86 
     87 #ifdef NSS_ENABLE_ECC
     88     TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
     89     TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,
     90     TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,
     91     TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,
     92     TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,
     93     TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,
     94     TLS_ECDH_ECDSA_WITH_RC4_128_SHA,
     95     TLS_ECDH_RSA_WITH_RC4_128_SHA,
     96 #endif /* NSS_ENABLE_ECC */
     97 
     98     TLS_RSA_WITH_AES_128_GCM_SHA256,
     99     TLS_RSA_WITH_AES_128_CBC_SHA,
    100     TLS_RSA_WITH_AES_128_CBC_SHA256,
    101     TLS_RSA_WITH_CAMELLIA_128_CBC_SHA,
    102     TLS_RSA_WITH_AES_256_CBC_SHA,
    103     TLS_RSA_WITH_AES_256_CBC_SHA256,
    104     TLS_RSA_WITH_CAMELLIA_256_CBC_SHA,
    105     TLS_RSA_WITH_SEED_CBC_SHA,
    106     SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA,
    107     SSL_RSA_WITH_3DES_EDE_CBC_SHA,
    108     SSL_RSA_WITH_RC4_128_SHA,
    109     SSL_RSA_WITH_RC4_128_MD5,
    110 
    111     /* 56-bit DES "domestic" cipher suites */
    112     SSL_DHE_RSA_WITH_DES_CBC_SHA,
    113     SSL_DHE_DSS_WITH_DES_CBC_SHA,
    114     SSL_RSA_FIPS_WITH_DES_CBC_SHA,
    115     SSL_RSA_WITH_DES_CBC_SHA,
    116 
    117     /* export ciphersuites with 1024-bit public key exchange keys */
    118     TLS_RSA_EXPORT1024_WITH_RC4_56_SHA,
    119     TLS_RSA_EXPORT1024_WITH_DES_CBC_SHA,
    120 
    121     /* export ciphersuites with 512-bit public key exchange keys */
    122     SSL_RSA_EXPORT_WITH_RC4_40_MD5,
    123     SSL_RSA_EXPORT_WITH_RC2_CBC_40_MD5,
    124 
    125     /* ciphersuites with no encryption */
    126 #ifdef NSS_ENABLE_ECC
    127     TLS_ECDHE_ECDSA_WITH_NULL_SHA,
    128     TLS_ECDHE_RSA_WITH_NULL_SHA,
    129     TLS_ECDH_RSA_WITH_NULL_SHA,
    130     TLS_ECDH_ECDSA_WITH_NULL_SHA,
    131 #endif /* NSS_ENABLE_ECC */
    132     SSL_RSA_WITH_NULL_SHA,
    133     TLS_RSA_WITH_NULL_SHA256,
    134     SSL_RSA_WITH_NULL_MD5,
    135 
    136     /* SSL2 cipher suites. */
    137     SSL_EN_RC4_128_WITH_MD5,
    138     SSL_EN_RC2_128_CBC_WITH_MD5,
    139     SSL_EN_DES_192_EDE3_CBC_WITH_MD5,  /* actually 112, not 192 */
    140     SSL_EN_DES_64_CBC_WITH_MD5,
    141     SSL_EN_RC4_128_EXPORT40_WITH_MD5,
    142     SSL_EN_RC2_128_CBC_EXPORT40_WITH_MD5,
    143 
    144     0
    145 
    146 };
    147 
    148 const PRUint16 SSL_NumImplementedCiphers =
    149     (sizeof SSL_ImplementedCiphers) / (sizeof SSL_ImplementedCiphers[0]) - 1;
    150 
    151 const PRUint16 *
    152 SSL_GetImplementedCiphers(void)
    153 {
    154     return SSL_ImplementedCiphers;
    155 }
    156 
    157 PRUint16
    158 SSL_GetNumImplementedCiphers(void)
    159 {
    160     return SSL_NumImplementedCiphers;
    161 }
    162