| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693469446954696469746984699470047014702470347044705470647074708470947104711471247134714471547164717471847194720472147224723472447254726472747284729473047314732473347344735473647374738473947404741474247434744474547464747474847494750475147524753475447554756475747584759476047614762476347644765476647674768476947704771477247734774477547764777477847794780478147824783478447854786478747884789479047914792479347944795479647974798479948004801480248034804480548064807480848094810481148124813481448154816481748184819482048214822482348244825482648274828482948304831483248334834483548364837483848394840484148424843484448454846484748484849485048514852485348544855485648574858 | /* * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. * Copyright (c) 2002, Oracle and/or its affiliates. All rights reserved * Copyright 2005 Nokia. All rights reserved. * * Licensed under the OpenSSL license (the "License").  You may not use * this file except in compliance with the License.  You can obtain a copy * in the file LICENSE in the source distribution or at * https://www.openssl.org/source/license.html */#include <stdio.h>#include <openssl/objects.h>#include "internal/nelem.h"#include "ssl_local.h"#include <openssl/md5.h>#include <openssl/dh.h>#include <openssl/rand.h>#include "internal/cryptlib.h"#define TLS13_NUM_CIPHERS       OSSL_NELEM(tls13_ciphers)#define SSL3_NUM_CIPHERS        OSSL_NELEM(ssl3_ciphers)#define SSL3_NUM_SCSVS          OSSL_NELEM(ssl3_scsvs)/* TLSv1.3 downgrade protection sentinel values */const unsigned char tls11downgrade[] = {    0x44, 0x4f, 0x57, 0x4e, 0x47, 0x52, 0x44, 0x00};const unsigned char tls12downgrade[] = {    0x44, 0x4f, 0x57, 0x4e, 0x47, 0x52, 0x44, 0x01};/* The list of available TLSv1.3 ciphers */static SSL_CIPHER tls13_ciphers[] = {    {        1,        TLS1_3_RFC_AES_128_GCM_SHA256,        TLS1_3_RFC_AES_128_GCM_SHA256,        TLS1_3_CK_AES_128_GCM_SHA256,        SSL_kANY,        SSL_aANY,        SSL_AES128GCM,        SSL_AEAD,        TLS1_3_VERSION, TLS1_3_VERSION,        0, 0,        SSL_HIGH,        SSL_HANDSHAKE_MAC_SHA256,        128,        128,    }, {        1,        TLS1_3_RFC_AES_256_GCM_SHA384,        TLS1_3_RFC_AES_256_GCM_SHA384,        TLS1_3_CK_AES_256_GCM_SHA384,        SSL_kANY,        SSL_aANY,        SSL_AES256GCM,        SSL_AEAD,        TLS1_3_VERSION, TLS1_3_VERSION,        0, 0,        SSL_HIGH,        SSL_HANDSHAKE_MAC_SHA384,        256,        256,    },#if !defined(OPENSSL_NO_CHACHA) && !defined(OPENSSL_NO_POLY1305)    {        1,        TLS1_3_RFC_CHACHA20_POLY1305_SHA256,        TLS1_3_RFC_CHACHA20_POLY1305_SHA256,        TLS1_3_CK_CHACHA20_POLY1305_SHA256,        SSL_kANY,        SSL_aANY,        SSL_CHACHA20POLY1305,        SSL_AEAD,        TLS1_3_VERSION, TLS1_3_VERSION,        0, 0,        SSL_HIGH,        SSL_HANDSHAKE_MAC_SHA256,        256,        256,    },#endif    {        1,        TLS1_3_RFC_AES_128_CCM_SHA256,        TLS1_3_RFC_AES_128_CCM_SHA256,        TLS1_3_CK_AES_128_CCM_SHA256,        SSL_kANY,        SSL_aANY,        SSL_AES128CCM,        SSL_AEAD,        TLS1_3_VERSION, TLS1_3_VERSION,        0, 0,        SSL_NOT_DEFAULT | SSL_HIGH,        SSL_HANDSHAKE_MAC_SHA256,        128,        128,    }, {        1,        TLS1_3_RFC_AES_128_CCM_8_SHA256,        TLS1_3_RFC_AES_128_CCM_8_SHA256,        TLS1_3_CK_AES_128_CCM_8_SHA256,        SSL_kANY,        SSL_aANY,        SSL_AES128CCM8,        SSL_AEAD,        TLS1_3_VERSION, TLS1_3_VERSION,        0, 0,        SSL_NOT_DEFAULT | SSL_HIGH,        SSL_HANDSHAKE_MAC_SHA256,        128,        128,    }};/* * The list of available ciphers, mostly organized into the following * groups: *      Always there *      EC *      PSK *      SRP (within that: RSA EC PSK) *      Cipher families: Chacha/poly, Camellia, Gost, IDEA, SEED *      Weak ciphers */static SSL_CIPHER ssl3_ciphers[] = {    {     1,     SSL3_TXT_RSA_NULL_MD5,     SSL3_RFC_RSA_NULL_MD5,     SSL3_CK_RSA_NULL_MD5,     SSL_kRSA,     SSL_aRSA,     SSL_eNULL,     SSL_MD5,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_STRONG_NONE,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     0,     0,     },    {     1,     SSL3_TXT_RSA_NULL_SHA,     SSL3_RFC_RSA_NULL_SHA,     SSL3_CK_RSA_NULL_SHA,     SSL_kRSA,     SSL_aRSA,     SSL_eNULL,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_STRONG_NONE | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     0,     0,     },#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS    {     1,     SSL3_TXT_RSA_DES_192_CBC3_SHA,     SSL3_RFC_RSA_DES_192_CBC3_SHA,     SSL3_CK_RSA_DES_192_CBC3_SHA,     SSL_kRSA,     SSL_aRSA,     SSL_3DES,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     112,     168,     },    {     1,     SSL3_TXT_DHE_DSS_DES_192_CBC3_SHA,     SSL3_RFC_DHE_DSS_DES_192_CBC3_SHA,     SSL3_CK_DHE_DSS_DES_192_CBC3_SHA,     SSL_kDHE,     SSL_aDSS,     SSL_3DES,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     112,     168,     },    {     1,     SSL3_TXT_DHE_RSA_DES_192_CBC3_SHA,     SSL3_RFC_DHE_RSA_DES_192_CBC3_SHA,     SSL3_CK_DHE_RSA_DES_192_CBC3_SHA,     SSL_kDHE,     SSL_aRSA,     SSL_3DES,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     112,     168,     },    {     1,     SSL3_TXT_ADH_DES_192_CBC_SHA,     SSL3_RFC_ADH_DES_192_CBC_SHA,     SSL3_CK_ADH_DES_192_CBC_SHA,     SSL_kDHE,     SSL_aNULL,     SSL_3DES,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     112,     168,     },#endif    {     1,     TLS1_TXT_RSA_WITH_AES_128_SHA,     TLS1_RFC_RSA_WITH_AES_128_SHA,     TLS1_CK_RSA_WITH_AES_128_SHA,     SSL_kRSA,     SSL_aRSA,     SSL_AES128,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_DHE_DSS_WITH_AES_128_SHA,     TLS1_RFC_DHE_DSS_WITH_AES_128_SHA,     TLS1_CK_DHE_DSS_WITH_AES_128_SHA,     SSL_kDHE,     SSL_aDSS,     SSL_AES128,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_DHE_RSA_WITH_AES_128_SHA,     TLS1_RFC_DHE_RSA_WITH_AES_128_SHA,     TLS1_CK_DHE_RSA_WITH_AES_128_SHA,     SSL_kDHE,     SSL_aRSA,     SSL_AES128,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_ADH_WITH_AES_128_SHA,     TLS1_RFC_ADH_WITH_AES_128_SHA,     TLS1_CK_ADH_WITH_AES_128_SHA,     SSL_kDHE,     SSL_aNULL,     SSL_AES128,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_RSA_WITH_AES_256_SHA,     TLS1_RFC_RSA_WITH_AES_256_SHA,     TLS1_CK_RSA_WITH_AES_256_SHA,     SSL_kRSA,     SSL_aRSA,     SSL_AES256,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_DHE_DSS_WITH_AES_256_SHA,     TLS1_RFC_DHE_DSS_WITH_AES_256_SHA,     TLS1_CK_DHE_DSS_WITH_AES_256_SHA,     SSL_kDHE,     SSL_aDSS,     SSL_AES256,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_DHE_RSA_WITH_AES_256_SHA,     TLS1_RFC_DHE_RSA_WITH_AES_256_SHA,     TLS1_CK_DHE_RSA_WITH_AES_256_SHA,     SSL_kDHE,     SSL_aRSA,     SSL_AES256,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_ADH_WITH_AES_256_SHA,     TLS1_RFC_ADH_WITH_AES_256_SHA,     TLS1_CK_ADH_WITH_AES_256_SHA,     SSL_kDHE,     SSL_aNULL,     SSL_AES256,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_RSA_WITH_NULL_SHA256,     TLS1_RFC_RSA_WITH_NULL_SHA256,     TLS1_CK_RSA_WITH_NULL_SHA256,     SSL_kRSA,     SSL_aRSA,     SSL_eNULL,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_STRONG_NONE | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     0,     0,     },    {     1,     TLS1_TXT_RSA_WITH_AES_128_SHA256,     TLS1_RFC_RSA_WITH_AES_128_SHA256,     TLS1_CK_RSA_WITH_AES_128_SHA256,     SSL_kRSA,     SSL_aRSA,     SSL_AES128,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_RSA_WITH_AES_256_SHA256,     TLS1_RFC_RSA_WITH_AES_256_SHA256,     TLS1_CK_RSA_WITH_AES_256_SHA256,     SSL_kRSA,     SSL_aRSA,     SSL_AES256,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_DHE_DSS_WITH_AES_128_SHA256,     TLS1_RFC_DHE_DSS_WITH_AES_128_SHA256,     TLS1_CK_DHE_DSS_WITH_AES_128_SHA256,     SSL_kDHE,     SSL_aDSS,     SSL_AES128,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_DHE_RSA_WITH_AES_128_SHA256,     TLS1_RFC_DHE_RSA_WITH_AES_128_SHA256,     TLS1_CK_DHE_RSA_WITH_AES_128_SHA256,     SSL_kDHE,     SSL_aRSA,     SSL_AES128,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_DHE_DSS_WITH_AES_256_SHA256,     TLS1_RFC_DHE_DSS_WITH_AES_256_SHA256,     TLS1_CK_DHE_DSS_WITH_AES_256_SHA256,     SSL_kDHE,     SSL_aDSS,     SSL_AES256,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_DHE_RSA_WITH_AES_256_SHA256,     TLS1_RFC_DHE_RSA_WITH_AES_256_SHA256,     TLS1_CK_DHE_RSA_WITH_AES_256_SHA256,     SSL_kDHE,     SSL_aRSA,     SSL_AES256,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_ADH_WITH_AES_128_SHA256,     TLS1_RFC_ADH_WITH_AES_128_SHA256,     TLS1_CK_ADH_WITH_AES_128_SHA256,     SSL_kDHE,     SSL_aNULL,     SSL_AES128,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_ADH_WITH_AES_256_SHA256,     TLS1_RFC_ADH_WITH_AES_256_SHA256,     TLS1_CK_ADH_WITH_AES_256_SHA256,     SSL_kDHE,     SSL_aNULL,     SSL_AES256,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_RSA_WITH_AES_128_GCM_SHA256,     TLS1_RFC_RSA_WITH_AES_128_GCM_SHA256,     TLS1_CK_RSA_WITH_AES_128_GCM_SHA256,     SSL_kRSA,     SSL_aRSA,     SSL_AES128GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_RSA_WITH_AES_256_GCM_SHA384,     TLS1_RFC_RSA_WITH_AES_256_GCM_SHA384,     TLS1_CK_RSA_WITH_AES_256_GCM_SHA384,     SSL_kRSA,     SSL_aRSA,     SSL_AES256GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_DHE_RSA_WITH_AES_128_GCM_SHA256,     TLS1_RFC_DHE_RSA_WITH_AES_128_GCM_SHA256,     TLS1_CK_DHE_RSA_WITH_AES_128_GCM_SHA256,     SSL_kDHE,     SSL_aRSA,     SSL_AES128GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_DHE_RSA_WITH_AES_256_GCM_SHA384,     TLS1_RFC_DHE_RSA_WITH_AES_256_GCM_SHA384,     TLS1_CK_DHE_RSA_WITH_AES_256_GCM_SHA384,     SSL_kDHE,     SSL_aRSA,     SSL_AES256GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_DHE_DSS_WITH_AES_128_GCM_SHA256,     TLS1_RFC_DHE_DSS_WITH_AES_128_GCM_SHA256,     TLS1_CK_DHE_DSS_WITH_AES_128_GCM_SHA256,     SSL_kDHE,     SSL_aDSS,     SSL_AES128GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_DHE_DSS_WITH_AES_256_GCM_SHA384,     TLS1_RFC_DHE_DSS_WITH_AES_256_GCM_SHA384,     TLS1_CK_DHE_DSS_WITH_AES_256_GCM_SHA384,     SSL_kDHE,     SSL_aDSS,     SSL_AES256GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_ADH_WITH_AES_128_GCM_SHA256,     TLS1_RFC_ADH_WITH_AES_128_GCM_SHA256,     TLS1_CK_ADH_WITH_AES_128_GCM_SHA256,     SSL_kDHE,     SSL_aNULL,     SSL_AES128GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_ADH_WITH_AES_256_GCM_SHA384,     TLS1_RFC_ADH_WITH_AES_256_GCM_SHA384,     TLS1_CK_ADH_WITH_AES_256_GCM_SHA384,     SSL_kDHE,     SSL_aNULL,     SSL_AES256GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_RSA_WITH_AES_128_CCM,     TLS1_RFC_RSA_WITH_AES_128_CCM,     TLS1_CK_RSA_WITH_AES_128_CCM,     SSL_kRSA,     SSL_aRSA,     SSL_AES128CCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_RSA_WITH_AES_256_CCM,     TLS1_RFC_RSA_WITH_AES_256_CCM,     TLS1_CK_RSA_WITH_AES_256_CCM,     SSL_kRSA,     SSL_aRSA,     SSL_AES256CCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_DHE_RSA_WITH_AES_128_CCM,     TLS1_RFC_DHE_RSA_WITH_AES_128_CCM,     TLS1_CK_DHE_RSA_WITH_AES_128_CCM,     SSL_kDHE,     SSL_aRSA,     SSL_AES128CCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_DHE_RSA_WITH_AES_256_CCM,     TLS1_RFC_DHE_RSA_WITH_AES_256_CCM,     TLS1_CK_DHE_RSA_WITH_AES_256_CCM,     SSL_kDHE,     SSL_aRSA,     SSL_AES256CCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_RSA_WITH_AES_128_CCM_8,     TLS1_RFC_RSA_WITH_AES_128_CCM_8,     TLS1_CK_RSA_WITH_AES_128_CCM_8,     SSL_kRSA,     SSL_aRSA,     SSL_AES128CCM8,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_RSA_WITH_AES_256_CCM_8,     TLS1_RFC_RSA_WITH_AES_256_CCM_8,     TLS1_CK_RSA_WITH_AES_256_CCM_8,     SSL_kRSA,     SSL_aRSA,     SSL_AES256CCM8,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_DHE_RSA_WITH_AES_128_CCM_8,     TLS1_RFC_DHE_RSA_WITH_AES_128_CCM_8,     TLS1_CK_DHE_RSA_WITH_AES_128_CCM_8,     SSL_kDHE,     SSL_aRSA,     SSL_AES128CCM8,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_DHE_RSA_WITH_AES_256_CCM_8,     TLS1_RFC_DHE_RSA_WITH_AES_256_CCM_8,     TLS1_CK_DHE_RSA_WITH_AES_256_CCM_8,     SSL_kDHE,     SSL_aRSA,     SSL_AES256CCM8,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_PSK_WITH_AES_128_CCM,     TLS1_RFC_PSK_WITH_AES_128_CCM,     TLS1_CK_PSK_WITH_AES_128_CCM,     SSL_kPSK,     SSL_aPSK,     SSL_AES128CCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_PSK_WITH_AES_256_CCM,     TLS1_RFC_PSK_WITH_AES_256_CCM,     TLS1_CK_PSK_WITH_AES_256_CCM,     SSL_kPSK,     SSL_aPSK,     SSL_AES256CCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_DHE_PSK_WITH_AES_128_CCM,     TLS1_RFC_DHE_PSK_WITH_AES_128_CCM,     TLS1_CK_DHE_PSK_WITH_AES_128_CCM,     SSL_kDHEPSK,     SSL_aPSK,     SSL_AES128CCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_DHE_PSK_WITH_AES_256_CCM,     TLS1_RFC_DHE_PSK_WITH_AES_256_CCM,     TLS1_CK_DHE_PSK_WITH_AES_256_CCM,     SSL_kDHEPSK,     SSL_aPSK,     SSL_AES256CCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_PSK_WITH_AES_128_CCM_8,     TLS1_RFC_PSK_WITH_AES_128_CCM_8,     TLS1_CK_PSK_WITH_AES_128_CCM_8,     SSL_kPSK,     SSL_aPSK,     SSL_AES128CCM8,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_PSK_WITH_AES_256_CCM_8,     TLS1_RFC_PSK_WITH_AES_256_CCM_8,     TLS1_CK_PSK_WITH_AES_256_CCM_8,     SSL_kPSK,     SSL_aPSK,     SSL_AES256CCM8,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_DHE_PSK_WITH_AES_128_CCM_8,     TLS1_RFC_DHE_PSK_WITH_AES_128_CCM_8,     TLS1_CK_DHE_PSK_WITH_AES_128_CCM_8,     SSL_kDHEPSK,     SSL_aPSK,     SSL_AES128CCM8,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_DHE_PSK_WITH_AES_256_CCM_8,     TLS1_RFC_DHE_PSK_WITH_AES_256_CCM_8,     TLS1_CK_DHE_PSK_WITH_AES_256_CCM_8,     SSL_kDHEPSK,     SSL_aPSK,     SSL_AES256CCM8,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CCM,     TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_CCM,     TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM,     SSL_kECDHE,     SSL_aECDSA,     SSL_AES128CCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CCM,     TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_CCM,     TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM,     SSL_kECDHE,     SSL_aECDSA,     SSL_AES256CCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CCM_8,     TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_CCM_8,     TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CCM_8,     SSL_kECDHE,     SSL_aECDSA,     SSL_AES128CCM8,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CCM_8,     TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_CCM_8,     TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CCM_8,     SSL_kECDHE,     SSL_aECDSA,     SSL_AES256CCM8,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_ECDHE_ECDSA_WITH_NULL_SHA,     TLS1_RFC_ECDHE_ECDSA_WITH_NULL_SHA,     TLS1_CK_ECDHE_ECDSA_WITH_NULL_SHA,     SSL_kECDHE,     SSL_aECDSA,     SSL_eNULL,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_STRONG_NONE | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     0,     0,     },# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS    {     1,     TLS1_TXT_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,     TLS1_RFC_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,     TLS1_CK_ECDHE_ECDSA_WITH_DES_192_CBC3_SHA,     SSL_kECDHE,     SSL_aECDSA,     SSL_3DES,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     112,     168,     },# endif    {     1,     TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,     TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,     TLS1_CK_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,     SSL_kECDHE,     SSL_aECDSA,     SSL_AES128,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,     TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,     TLS1_CK_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,     SSL_kECDHE,     SSL_aECDSA,     SSL_AES256,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_ECDHE_RSA_WITH_NULL_SHA,     TLS1_RFC_ECDHE_RSA_WITH_NULL_SHA,     TLS1_CK_ECDHE_RSA_WITH_NULL_SHA,     SSL_kECDHE,     SSL_aRSA,     SSL_eNULL,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_STRONG_NONE | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     0,     0,     },# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS    {     1,     TLS1_TXT_ECDHE_RSA_WITH_DES_192_CBC3_SHA,     TLS1_RFC_ECDHE_RSA_WITH_DES_192_CBC3_SHA,     TLS1_CK_ECDHE_RSA_WITH_DES_192_CBC3_SHA,     SSL_kECDHE,     SSL_aRSA,     SSL_3DES,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     112,     168,     },# endif    {     1,     TLS1_TXT_ECDHE_RSA_WITH_AES_128_CBC_SHA,     TLS1_RFC_ECDHE_RSA_WITH_AES_128_CBC_SHA,     TLS1_CK_ECDHE_RSA_WITH_AES_128_CBC_SHA,     SSL_kECDHE,     SSL_aRSA,     SSL_AES128,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_RSA_WITH_AES_256_CBC_SHA,     TLS1_RFC_ECDHE_RSA_WITH_AES_256_CBC_SHA,     TLS1_CK_ECDHE_RSA_WITH_AES_256_CBC_SHA,     SSL_kECDHE,     SSL_aRSA,     SSL_AES256,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_ECDH_anon_WITH_NULL_SHA,     TLS1_RFC_ECDH_anon_WITH_NULL_SHA,     TLS1_CK_ECDH_anon_WITH_NULL_SHA,     SSL_kECDHE,     SSL_aNULL,     SSL_eNULL,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_STRONG_NONE | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     0,     0,     },# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS    {     1,     TLS1_TXT_ECDH_anon_WITH_DES_192_CBC3_SHA,     TLS1_RFC_ECDH_anon_WITH_DES_192_CBC3_SHA,     TLS1_CK_ECDH_anon_WITH_DES_192_CBC3_SHA,     SSL_kECDHE,     SSL_aNULL,     SSL_3DES,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     112,     168,     },# endif    {     1,     TLS1_TXT_ECDH_anon_WITH_AES_128_CBC_SHA,     TLS1_RFC_ECDH_anon_WITH_AES_128_CBC_SHA,     TLS1_CK_ECDH_anon_WITH_AES_128_CBC_SHA,     SSL_kECDHE,     SSL_aNULL,     SSL_AES128,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_ECDH_anon_WITH_AES_256_CBC_SHA,     TLS1_RFC_ECDH_anon_WITH_AES_256_CBC_SHA,     TLS1_CK_ECDH_anon_WITH_AES_256_CBC_SHA,     SSL_kECDHE,     SSL_aNULL,     SSL_AES256,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_SHA256,     TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_SHA256,     TLS1_CK_ECDHE_ECDSA_WITH_AES_128_SHA256,     SSL_kECDHE,     SSL_aECDSA,     SSL_AES128,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_SHA384,     TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_SHA384,     TLS1_CK_ECDHE_ECDSA_WITH_AES_256_SHA384,     SSL_kECDHE,     SSL_aECDSA,     SSL_AES256,     SSL_SHA384,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_ECDHE_RSA_WITH_AES_128_SHA256,     TLS1_RFC_ECDHE_RSA_WITH_AES_128_SHA256,     TLS1_CK_ECDHE_RSA_WITH_AES_128_SHA256,     SSL_kECDHE,     SSL_aRSA,     SSL_AES128,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_RSA_WITH_AES_256_SHA384,     TLS1_RFC_ECDHE_RSA_WITH_AES_256_SHA384,     TLS1_CK_ECDHE_RSA_WITH_AES_256_SHA384,     SSL_kECDHE,     SSL_aRSA,     SSL_AES256,     SSL_SHA384,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,     TLS1_RFC_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,     TLS1_CK_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,     SSL_kECDHE,     SSL_aECDSA,     SSL_AES128GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,     TLS1_RFC_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,     TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,     SSL_kECDHE,     SSL_aECDSA,     SSL_AES256GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_ECDHE_RSA_WITH_AES_128_GCM_SHA256,     TLS1_RFC_ECDHE_RSA_WITH_AES_128_GCM_SHA256,     TLS1_CK_ECDHE_RSA_WITH_AES_128_GCM_SHA256,     SSL_kECDHE,     SSL_aRSA,     SSL_AES128GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_RSA_WITH_AES_256_GCM_SHA384,     TLS1_RFC_ECDHE_RSA_WITH_AES_256_GCM_SHA384,     TLS1_CK_ECDHE_RSA_WITH_AES_256_GCM_SHA384,     SSL_kECDHE,     SSL_aRSA,     SSL_AES256GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_PSK_WITH_NULL_SHA,     TLS1_RFC_PSK_WITH_NULL_SHA,     TLS1_CK_PSK_WITH_NULL_SHA,     SSL_kPSK,     SSL_aPSK,     SSL_eNULL,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_STRONG_NONE | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     0,     0,     },    {     1,     TLS1_TXT_DHE_PSK_WITH_NULL_SHA,     TLS1_RFC_DHE_PSK_WITH_NULL_SHA,     TLS1_CK_DHE_PSK_WITH_NULL_SHA,     SSL_kDHEPSK,     SSL_aPSK,     SSL_eNULL,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_STRONG_NONE | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     0,     0,     },    {     1,     TLS1_TXT_RSA_PSK_WITH_NULL_SHA,     TLS1_RFC_RSA_PSK_WITH_NULL_SHA,     TLS1_CK_RSA_PSK_WITH_NULL_SHA,     SSL_kRSAPSK,     SSL_aRSA,     SSL_eNULL,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_STRONG_NONE | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     0,     0,     },# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS    {     1,     TLS1_TXT_PSK_WITH_3DES_EDE_CBC_SHA,     TLS1_RFC_PSK_WITH_3DES_EDE_CBC_SHA,     TLS1_CK_PSK_WITH_3DES_EDE_CBC_SHA,     SSL_kPSK,     SSL_aPSK,     SSL_3DES,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     112,     168,     },# endif    {     1,     TLS1_TXT_PSK_WITH_AES_128_CBC_SHA,     TLS1_RFC_PSK_WITH_AES_128_CBC_SHA,     TLS1_CK_PSK_WITH_AES_128_CBC_SHA,     SSL_kPSK,     SSL_aPSK,     SSL_AES128,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_PSK_WITH_AES_256_CBC_SHA,     TLS1_RFC_PSK_WITH_AES_256_CBC_SHA,     TLS1_CK_PSK_WITH_AES_256_CBC_SHA,     SSL_kPSK,     SSL_aPSK,     SSL_AES256,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS    {     1,     TLS1_TXT_DHE_PSK_WITH_3DES_EDE_CBC_SHA,     TLS1_RFC_DHE_PSK_WITH_3DES_EDE_CBC_SHA,     TLS1_CK_DHE_PSK_WITH_3DES_EDE_CBC_SHA,     SSL_kDHEPSK,     SSL_aPSK,     SSL_3DES,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     112,     168,     },# endif    {     1,     TLS1_TXT_DHE_PSK_WITH_AES_128_CBC_SHA,     TLS1_RFC_DHE_PSK_WITH_AES_128_CBC_SHA,     TLS1_CK_DHE_PSK_WITH_AES_128_CBC_SHA,     SSL_kDHEPSK,     SSL_aPSK,     SSL_AES128,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_DHE_PSK_WITH_AES_256_CBC_SHA,     TLS1_RFC_DHE_PSK_WITH_AES_256_CBC_SHA,     TLS1_CK_DHE_PSK_WITH_AES_256_CBC_SHA,     SSL_kDHEPSK,     SSL_aPSK,     SSL_AES256,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS    {     1,     TLS1_TXT_RSA_PSK_WITH_3DES_EDE_CBC_SHA,     TLS1_RFC_RSA_PSK_WITH_3DES_EDE_CBC_SHA,     TLS1_CK_RSA_PSK_WITH_3DES_EDE_CBC_SHA,     SSL_kRSAPSK,     SSL_aRSA,     SSL_3DES,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     112,     168,     },# endif    {     1,     TLS1_TXT_RSA_PSK_WITH_AES_128_CBC_SHA,     TLS1_RFC_RSA_PSK_WITH_AES_128_CBC_SHA,     TLS1_CK_RSA_PSK_WITH_AES_128_CBC_SHA,     SSL_kRSAPSK,     SSL_aRSA,     SSL_AES128,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_RSA_PSK_WITH_AES_256_CBC_SHA,     TLS1_RFC_RSA_PSK_WITH_AES_256_CBC_SHA,     TLS1_CK_RSA_PSK_WITH_AES_256_CBC_SHA,     SSL_kRSAPSK,     SSL_aRSA,     SSL_AES256,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_PSK_WITH_AES_128_GCM_SHA256,     TLS1_RFC_PSK_WITH_AES_128_GCM_SHA256,     TLS1_CK_PSK_WITH_AES_128_GCM_SHA256,     SSL_kPSK,     SSL_aPSK,     SSL_AES128GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_PSK_WITH_AES_256_GCM_SHA384,     TLS1_RFC_PSK_WITH_AES_256_GCM_SHA384,     TLS1_CK_PSK_WITH_AES_256_GCM_SHA384,     SSL_kPSK,     SSL_aPSK,     SSL_AES256GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_DHE_PSK_WITH_AES_128_GCM_SHA256,     TLS1_RFC_DHE_PSK_WITH_AES_128_GCM_SHA256,     TLS1_CK_DHE_PSK_WITH_AES_128_GCM_SHA256,     SSL_kDHEPSK,     SSL_aPSK,     SSL_AES128GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_DHE_PSK_WITH_AES_256_GCM_SHA384,     TLS1_RFC_DHE_PSK_WITH_AES_256_GCM_SHA384,     TLS1_CK_DHE_PSK_WITH_AES_256_GCM_SHA384,     SSL_kDHEPSK,     SSL_aPSK,     SSL_AES256GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_RSA_PSK_WITH_AES_128_GCM_SHA256,     TLS1_RFC_RSA_PSK_WITH_AES_128_GCM_SHA256,     TLS1_CK_RSA_PSK_WITH_AES_128_GCM_SHA256,     SSL_kRSAPSK,     SSL_aRSA,     SSL_AES128GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_RSA_PSK_WITH_AES_256_GCM_SHA384,     TLS1_RFC_RSA_PSK_WITH_AES_256_GCM_SHA384,     TLS1_CK_RSA_PSK_WITH_AES_256_GCM_SHA384,     SSL_kRSAPSK,     SSL_aRSA,     SSL_AES256GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_PSK_WITH_AES_128_CBC_SHA256,     TLS1_RFC_PSK_WITH_AES_128_CBC_SHA256,     TLS1_CK_PSK_WITH_AES_128_CBC_SHA256,     SSL_kPSK,     SSL_aPSK,     SSL_AES128,     SSL_SHA256,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_PSK_WITH_AES_256_CBC_SHA384,     TLS1_RFC_PSK_WITH_AES_256_CBC_SHA384,     TLS1_CK_PSK_WITH_AES_256_CBC_SHA384,     SSL_kPSK,     SSL_aPSK,     SSL_AES256,     SSL_SHA384,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_PSK_WITH_NULL_SHA256,     TLS1_RFC_PSK_WITH_NULL_SHA256,     TLS1_CK_PSK_WITH_NULL_SHA256,     SSL_kPSK,     SSL_aPSK,     SSL_eNULL,     SSL_SHA256,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_STRONG_NONE | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     0,     0,     },    {     1,     TLS1_TXT_PSK_WITH_NULL_SHA384,     TLS1_RFC_PSK_WITH_NULL_SHA384,     TLS1_CK_PSK_WITH_NULL_SHA384,     SSL_kPSK,     SSL_aPSK,     SSL_eNULL,     SSL_SHA384,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_STRONG_NONE | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     0,     0,     },    {     1,     TLS1_TXT_DHE_PSK_WITH_AES_128_CBC_SHA256,     TLS1_RFC_DHE_PSK_WITH_AES_128_CBC_SHA256,     TLS1_CK_DHE_PSK_WITH_AES_128_CBC_SHA256,     SSL_kDHEPSK,     SSL_aPSK,     SSL_AES128,     SSL_SHA256,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_DHE_PSK_WITH_AES_256_CBC_SHA384,     TLS1_RFC_DHE_PSK_WITH_AES_256_CBC_SHA384,     TLS1_CK_DHE_PSK_WITH_AES_256_CBC_SHA384,     SSL_kDHEPSK,     SSL_aPSK,     SSL_AES256,     SSL_SHA384,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_DHE_PSK_WITH_NULL_SHA256,     TLS1_RFC_DHE_PSK_WITH_NULL_SHA256,     TLS1_CK_DHE_PSK_WITH_NULL_SHA256,     SSL_kDHEPSK,     SSL_aPSK,     SSL_eNULL,     SSL_SHA256,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_STRONG_NONE | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     0,     0,     },    {     1,     TLS1_TXT_DHE_PSK_WITH_NULL_SHA384,     TLS1_RFC_DHE_PSK_WITH_NULL_SHA384,     TLS1_CK_DHE_PSK_WITH_NULL_SHA384,     SSL_kDHEPSK,     SSL_aPSK,     SSL_eNULL,     SSL_SHA384,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_STRONG_NONE | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     0,     0,     },    {     1,     TLS1_TXT_RSA_PSK_WITH_AES_128_CBC_SHA256,     TLS1_RFC_RSA_PSK_WITH_AES_128_CBC_SHA256,     TLS1_CK_RSA_PSK_WITH_AES_128_CBC_SHA256,     SSL_kRSAPSK,     SSL_aRSA,     SSL_AES128,     SSL_SHA256,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_RSA_PSK_WITH_AES_256_CBC_SHA384,     TLS1_RFC_RSA_PSK_WITH_AES_256_CBC_SHA384,     TLS1_CK_RSA_PSK_WITH_AES_256_CBC_SHA384,     SSL_kRSAPSK,     SSL_aRSA,     SSL_AES256,     SSL_SHA384,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_RSA_PSK_WITH_NULL_SHA256,     TLS1_RFC_RSA_PSK_WITH_NULL_SHA256,     TLS1_CK_RSA_PSK_WITH_NULL_SHA256,     SSL_kRSAPSK,     SSL_aRSA,     SSL_eNULL,     SSL_SHA256,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_STRONG_NONE | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     0,     0,     },    {     1,     TLS1_TXT_RSA_PSK_WITH_NULL_SHA384,     TLS1_RFC_RSA_PSK_WITH_NULL_SHA384,     TLS1_CK_RSA_PSK_WITH_NULL_SHA384,     SSL_kRSAPSK,     SSL_aRSA,     SSL_eNULL,     SSL_SHA384,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_STRONG_NONE | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     0,     0,     },#  ifndef OPENSSL_NO_WEAK_SSL_CIPHERS    {     1,     TLS1_TXT_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA,     TLS1_RFC_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA,     TLS1_CK_ECDHE_PSK_WITH_3DES_EDE_CBC_SHA,     SSL_kECDHEPSK,     SSL_aPSK,     SSL_3DES,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     112,     168,     },#  endif    {     1,     TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA,     TLS1_RFC_ECDHE_PSK_WITH_AES_128_CBC_SHA,     TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA,     SSL_kECDHEPSK,     SSL_aPSK,     SSL_AES128,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA,     TLS1_RFC_ECDHE_PSK_WITH_AES_256_CBC_SHA,     TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA,     SSL_kECDHEPSK,     SSL_aPSK,     SSL_AES256,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA256,     TLS1_RFC_ECDHE_PSK_WITH_AES_128_CBC_SHA256,     TLS1_CK_ECDHE_PSK_WITH_AES_128_CBC_SHA256,     SSL_kECDHEPSK,     SSL_aPSK,     SSL_AES128,     SSL_SHA256,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA384,     TLS1_RFC_ECDHE_PSK_WITH_AES_256_CBC_SHA384,     TLS1_CK_ECDHE_PSK_WITH_AES_256_CBC_SHA384,     SSL_kECDHEPSK,     SSL_aPSK,     SSL_AES256,     SSL_SHA384,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA,     TLS1_RFC_ECDHE_PSK_WITH_NULL_SHA,     TLS1_CK_ECDHE_PSK_WITH_NULL_SHA,     SSL_kECDHEPSK,     SSL_aPSK,     SSL_eNULL,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_STRONG_NONE | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     0,     0,     },    {     1,     TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA256,     TLS1_RFC_ECDHE_PSK_WITH_NULL_SHA256,     TLS1_CK_ECDHE_PSK_WITH_NULL_SHA256,     SSL_kECDHEPSK,     SSL_aPSK,     SSL_eNULL,     SSL_SHA256,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_STRONG_NONE | SSL_FIPS,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     0,     0,     },    {     1,     TLS1_TXT_ECDHE_PSK_WITH_NULL_SHA384,     TLS1_RFC_ECDHE_PSK_WITH_NULL_SHA384,     TLS1_CK_ECDHE_PSK_WITH_NULL_SHA384,     SSL_kECDHEPSK,     SSL_aPSK,     SSL_eNULL,     SSL_SHA384,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_STRONG_NONE | SSL_FIPS,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     0,     0,     },# ifndef OPENSSL_NO_WEAK_SSL_CIPHERS    {     1,     TLS1_TXT_SRP_SHA_WITH_3DES_EDE_CBC_SHA,     TLS1_RFC_SRP_SHA_WITH_3DES_EDE_CBC_SHA,     TLS1_CK_SRP_SHA_WITH_3DES_EDE_CBC_SHA,     SSL_kSRP,     SSL_aSRP,     SSL_3DES,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     112,     168,     },    {     1,     TLS1_TXT_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA,     TLS1_RFC_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA,     TLS1_CK_SRP_SHA_RSA_WITH_3DES_EDE_CBC_SHA,     SSL_kSRP,     SSL_aRSA,     SSL_3DES,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     112,     168,     },    {     1,     TLS1_TXT_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA,     TLS1_RFC_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA,     TLS1_CK_SRP_SHA_DSS_WITH_3DES_EDE_CBC_SHA,     SSL_kSRP,     SSL_aDSS,     SSL_3DES,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     112,     168,     },# endif    {     1,     TLS1_TXT_SRP_SHA_WITH_AES_128_CBC_SHA,     TLS1_RFC_SRP_SHA_WITH_AES_128_CBC_SHA,     TLS1_CK_SRP_SHA_WITH_AES_128_CBC_SHA,     SSL_kSRP,     SSL_aSRP,     SSL_AES128,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_SRP_SHA_RSA_WITH_AES_128_CBC_SHA,     TLS1_RFC_SRP_SHA_RSA_WITH_AES_128_CBC_SHA,     TLS1_CK_SRP_SHA_RSA_WITH_AES_128_CBC_SHA,     SSL_kSRP,     SSL_aRSA,     SSL_AES128,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_SRP_SHA_DSS_WITH_AES_128_CBC_SHA,     TLS1_RFC_SRP_SHA_DSS_WITH_AES_128_CBC_SHA,     TLS1_CK_SRP_SHA_DSS_WITH_AES_128_CBC_SHA,     SSL_kSRP,     SSL_aDSS,     SSL_AES128,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_SRP_SHA_WITH_AES_256_CBC_SHA,     TLS1_RFC_SRP_SHA_WITH_AES_256_CBC_SHA,     TLS1_CK_SRP_SHA_WITH_AES_256_CBC_SHA,     SSL_kSRP,     SSL_aSRP,     SSL_AES256,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_SRP_SHA_RSA_WITH_AES_256_CBC_SHA,     TLS1_RFC_SRP_SHA_RSA_WITH_AES_256_CBC_SHA,     TLS1_CK_SRP_SHA_RSA_WITH_AES_256_CBC_SHA,     SSL_kSRP,     SSL_aRSA,     SSL_AES256,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_HIGH,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_SRP_SHA_DSS_WITH_AES_256_CBC_SHA,     TLS1_RFC_SRP_SHA_DSS_WITH_AES_256_CBC_SHA,     TLS1_CK_SRP_SHA_DSS_WITH_AES_256_CBC_SHA,     SSL_kSRP,     SSL_aDSS,     SSL_AES256,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },#if !defined(OPENSSL_NO_CHACHA) && !defined(OPENSSL_NO_POLY1305)    {     1,     TLS1_TXT_DHE_RSA_WITH_CHACHA20_POLY1305,     TLS1_RFC_DHE_RSA_WITH_CHACHA20_POLY1305,     TLS1_CK_DHE_RSA_WITH_CHACHA20_POLY1305,     SSL_kDHE,     SSL_aRSA,     SSL_CHACHA20POLY1305,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_ECDHE_RSA_WITH_CHACHA20_POLY1305,     TLS1_RFC_ECDHE_RSA_WITH_CHACHA20_POLY1305,     TLS1_CK_ECDHE_RSA_WITH_CHACHA20_POLY1305,     SSL_kECDHE,     SSL_aRSA,     SSL_CHACHA20POLY1305,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,     TLS1_RFC_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,     TLS1_CK_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,     SSL_kECDHE,     SSL_aECDSA,     SSL_CHACHA20POLY1305,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_PSK_WITH_CHACHA20_POLY1305,     TLS1_RFC_PSK_WITH_CHACHA20_POLY1305,     TLS1_CK_PSK_WITH_CHACHA20_POLY1305,     SSL_kPSK,     SSL_aPSK,     SSL_CHACHA20POLY1305,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_ECDHE_PSK_WITH_CHACHA20_POLY1305,     TLS1_RFC_ECDHE_PSK_WITH_CHACHA20_POLY1305,     TLS1_CK_ECDHE_PSK_WITH_CHACHA20_POLY1305,     SSL_kECDHEPSK,     SSL_aPSK,     SSL_CHACHA20POLY1305,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_DHE_PSK_WITH_CHACHA20_POLY1305,     TLS1_RFC_DHE_PSK_WITH_CHACHA20_POLY1305,     TLS1_CK_DHE_PSK_WITH_CHACHA20_POLY1305,     SSL_kDHEPSK,     SSL_aPSK,     SSL_CHACHA20POLY1305,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_RSA_PSK_WITH_CHACHA20_POLY1305,     TLS1_RFC_RSA_PSK_WITH_CHACHA20_POLY1305,     TLS1_CK_RSA_PSK_WITH_CHACHA20_POLY1305,     SSL_kRSAPSK,     SSL_aRSA,     SSL_CHACHA20POLY1305,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },#endif                          /* !defined(OPENSSL_NO_CHACHA) &&                                 * !defined(OPENSSL_NO_POLY1305) */#ifndef OPENSSL_NO_CAMELLIA    {     1,     TLS1_TXT_RSA_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_RFC_RSA_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA256,     SSL_kRSA,     SSL_aRSA,     SSL_CAMELLIA128,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_RFC_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256,     SSL_kEDH,     SSL_aDSS,     SSL_CAMELLIA128,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_RFC_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,     SSL_kEDH,     SSL_aRSA,     SSL_CAMELLIA128,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_RFC_ADH_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA256,     SSL_kEDH,     SSL_aNULL,     SSL_CAMELLIA128,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_RSA_WITH_CAMELLIA_256_CBC_SHA256,     TLS1_RFC_RSA_WITH_CAMELLIA_256_CBC_SHA256,     TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA256,     SSL_kRSA,     SSL_aRSA,     SSL_CAMELLIA256,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256,     TLS1_RFC_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256,     TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256,     SSL_kEDH,     SSL_aDSS,     SSL_CAMELLIA256,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256,     TLS1_RFC_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256,     TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256,     SSL_kEDH,     SSL_aRSA,     SSL_CAMELLIA256,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA256,     TLS1_RFC_ADH_WITH_CAMELLIA_256_CBC_SHA256,     TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA256,     SSL_kEDH,     SSL_aNULL,     SSL_CAMELLIA256,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     256,     256,     },    {     1,     TLS1_TXT_RSA_WITH_CAMELLIA_256_CBC_SHA,     TLS1_RFC_RSA_WITH_CAMELLIA_256_CBC_SHA,     TLS1_CK_RSA_WITH_CAMELLIA_256_CBC_SHA,     SSL_kRSA,     SSL_aRSA,     SSL_CAMELLIA256,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,     TLS1_RFC_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,     TLS1_CK_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA,     SSL_kDHE,     SSL_aDSS,     SSL_CAMELLIA256,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,     TLS1_RFC_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,     TLS1_CK_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA,     SSL_kDHE,     SSL_aRSA,     SSL_CAMELLIA256,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_ADH_WITH_CAMELLIA_256_CBC_SHA,     TLS1_RFC_ADH_WITH_CAMELLIA_256_CBC_SHA,     TLS1_CK_ADH_WITH_CAMELLIA_256_CBC_SHA,     SSL_kDHE,     SSL_aNULL,     SSL_CAMELLIA256,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     256,     256,     },    {     1,     TLS1_TXT_RSA_WITH_CAMELLIA_128_CBC_SHA,     TLS1_RFC_RSA_WITH_CAMELLIA_128_CBC_SHA,     TLS1_CK_RSA_WITH_CAMELLIA_128_CBC_SHA,     SSL_kRSA,     SSL_aRSA,     SSL_CAMELLIA128,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,     TLS1_RFC_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,     TLS1_CK_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA,     SSL_kDHE,     SSL_aDSS,     SSL_CAMELLIA128,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,     TLS1_RFC_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,     TLS1_CK_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA,     SSL_kDHE,     SSL_aRSA,     SSL_CAMELLIA128,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_ADH_WITH_CAMELLIA_128_CBC_SHA,     TLS1_RFC_ADH_WITH_CAMELLIA_128_CBC_SHA,     TLS1_CK_ADH_WITH_CAMELLIA_128_CBC_SHA,     SSL_kDHE,     SSL_aNULL,     SSL_CAMELLIA128,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_RFC_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_CK_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256,     SSL_kECDHE,     SSL_aECDSA,     SSL_CAMELLIA128,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,     TLS1_RFC_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,     TLS1_CK_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384,     SSL_kECDHE,     SSL_aECDSA,     SSL_CAMELLIA256,     SSL_SHA384,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_RFC_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_CK_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256,     SSL_kECDHE,     SSL_aRSA,     SSL_CAMELLIA128,     SSL_SHA256,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384,     TLS1_RFC_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384,     TLS1_CK_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384,     SSL_kECDHE,     SSL_aRSA,     SSL_CAMELLIA256,     SSL_SHA384,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_PSK_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_RFC_PSK_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_CK_PSK_WITH_CAMELLIA_128_CBC_SHA256,     SSL_kPSK,     SSL_aPSK,     SSL_CAMELLIA128,     SSL_SHA256,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_PSK_WITH_CAMELLIA_256_CBC_SHA384,     TLS1_RFC_PSK_WITH_CAMELLIA_256_CBC_SHA384,     TLS1_CK_PSK_WITH_CAMELLIA_256_CBC_SHA384,     SSL_kPSK,     SSL_aPSK,     SSL_CAMELLIA256,     SSL_SHA384,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_RFC_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_CK_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,     SSL_kDHEPSK,     SSL_aPSK,     SSL_CAMELLIA128,     SSL_SHA256,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,     TLS1_RFC_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,     TLS1_CK_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,     SSL_kDHEPSK,     SSL_aPSK,     SSL_CAMELLIA256,     SSL_SHA384,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_RFC_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_CK_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256,     SSL_kRSAPSK,     SSL_aRSA,     SSL_CAMELLIA128,     SSL_SHA256,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384,     TLS1_RFC_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384,     TLS1_CK_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384,     SSL_kRSAPSK,     SSL_aRSA,     SSL_CAMELLIA256,     SSL_SHA384,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_RFC_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,     TLS1_CK_ECDHE_PSK_WITH_CAMELLIA_128_CBC_SHA256,     SSL_kECDHEPSK,     SSL_aPSK,     SSL_CAMELLIA128,     SSL_SHA256,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,     TLS1_RFC_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,     TLS1_CK_ECDHE_PSK_WITH_CAMELLIA_256_CBC_SHA384,     SSL_kECDHEPSK,     SSL_aPSK,     SSL_CAMELLIA256,     SSL_SHA384,     TLS1_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },#endif                          /* OPENSSL_NO_CAMELLIA */#ifndef OPENSSL_NO_GOST    {     1,     "GOST2001-GOST89-GOST89",     "TLS_GOSTR341001_WITH_28147_CNT_IMIT",     0x3000081,     SSL_kGOST,     SSL_aGOST01,     SSL_eGOST2814789CNT,     SSL_GOST89MAC,     TLS1_VERSION, TLS1_2_VERSION,     0, 0,     SSL_HIGH,     SSL_HANDSHAKE_MAC_GOST94 | TLS1_PRF_GOST94 | TLS1_STREAM_MAC,     256,     256,     },    {     1,     "GOST2001-NULL-GOST94",     "TLS_GOSTR341001_WITH_NULL_GOSTR3411",     0x3000083,     SSL_kGOST,     SSL_aGOST01,     SSL_eNULL,     SSL_GOST94,     TLS1_VERSION, TLS1_2_VERSION,     0, 0,     SSL_STRONG_NONE,     SSL_HANDSHAKE_MAC_GOST94 | TLS1_PRF_GOST94,     0,     0,     },    {     1,     "GOST2012-GOST8912-GOST8912",     NULL,     0x0300ff85,     SSL_kGOST,     SSL_aGOST12 | SSL_aGOST01,     SSL_eGOST2814789CNT12,     SSL_GOST89MAC12,     TLS1_VERSION, TLS1_2_VERSION,     0, 0,     SSL_HIGH,     SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC,     256,     256,     },    {     1,     "GOST2012-NULL-GOST12",     NULL,     0x0300ff87,     SSL_kGOST,     SSL_aGOST12 | SSL_aGOST01,     SSL_eNULL,     SSL_GOST12_256,     TLS1_VERSION, TLS1_2_VERSION,     0, 0,     SSL_STRONG_NONE,     SSL_HANDSHAKE_MAC_GOST12_256 | TLS1_PRF_GOST12_256 | TLS1_STREAM_MAC,     0,     0,     },#endif                          /* OPENSSL_NO_GOST */#ifndef OPENSSL_NO_IDEA    {     1,     SSL3_TXT_RSA_IDEA_128_SHA,     SSL3_RFC_RSA_IDEA_128_SHA,     SSL3_CK_RSA_IDEA_128_SHA,     SSL_kRSA,     SSL_aRSA,     SSL_IDEA,     SSL_SHA1,     SSL3_VERSION, TLS1_1_VERSION,     DTLS1_BAD_VER, DTLS1_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },#endif#ifndef OPENSSL_NO_SEED    {     1,     TLS1_TXT_RSA_WITH_SEED_SHA,     TLS1_RFC_RSA_WITH_SEED_SHA,     TLS1_CK_RSA_WITH_SEED_SHA,     SSL_kRSA,     SSL_aRSA,     SSL_SEED,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_DHE_DSS_WITH_SEED_SHA,     TLS1_RFC_DHE_DSS_WITH_SEED_SHA,     TLS1_CK_DHE_DSS_WITH_SEED_SHA,     SSL_kDHE,     SSL_aDSS,     SSL_SEED,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_DHE_RSA_WITH_SEED_SHA,     TLS1_RFC_DHE_RSA_WITH_SEED_SHA,     TLS1_CK_DHE_RSA_WITH_SEED_SHA,     SSL_kDHE,     SSL_aRSA,     SSL_SEED,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_ADH_WITH_SEED_SHA,     TLS1_RFC_ADH_WITH_SEED_SHA,     TLS1_CK_ADH_WITH_SEED_SHA,     SSL_kDHE,     SSL_aNULL,     SSL_SEED,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     DTLS1_BAD_VER, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_MEDIUM,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },#endif                          /* OPENSSL_NO_SEED */#ifndef OPENSSL_NO_WEAK_SSL_CIPHERS    {     1,     SSL3_TXT_RSA_RC4_128_MD5,     SSL3_RFC_RSA_RC4_128_MD5,     SSL3_CK_RSA_RC4_128_MD5,     SSL_kRSA,     SSL_aRSA,     SSL_RC4,     SSL_MD5,     SSL3_VERSION, TLS1_2_VERSION,     0, 0,     SSL_NOT_DEFAULT | SSL_MEDIUM,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     SSL3_TXT_RSA_RC4_128_SHA,     SSL3_RFC_RSA_RC4_128_SHA,     SSL3_CK_RSA_RC4_128_SHA,     SSL_kRSA,     SSL_aRSA,     SSL_RC4,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     0, 0,     SSL_NOT_DEFAULT | SSL_MEDIUM,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     SSL3_TXT_ADH_RC4_128_MD5,     SSL3_RFC_ADH_RC4_128_MD5,     SSL3_CK_ADH_RC4_128_MD5,     SSL_kDHE,     SSL_aNULL,     SSL_RC4,     SSL_MD5,     SSL3_VERSION, TLS1_2_VERSION,     0, 0,     SSL_NOT_DEFAULT | SSL_MEDIUM,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_PSK_WITH_RC4_128_SHA,     TLS1_RFC_ECDHE_PSK_WITH_RC4_128_SHA,     TLS1_CK_ECDHE_PSK_WITH_RC4_128_SHA,     SSL_kECDHEPSK,     SSL_aPSK,     SSL_RC4,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     0, 0,     SSL_NOT_DEFAULT | SSL_MEDIUM,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_ECDH_anon_WITH_RC4_128_SHA,     TLS1_RFC_ECDH_anon_WITH_RC4_128_SHA,     TLS1_CK_ECDH_anon_WITH_RC4_128_SHA,     SSL_kECDHE,     SSL_aNULL,     SSL_RC4,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     0, 0,     SSL_NOT_DEFAULT | SSL_MEDIUM,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_ECDSA_WITH_RC4_128_SHA,     TLS1_RFC_ECDHE_ECDSA_WITH_RC4_128_SHA,     TLS1_CK_ECDHE_ECDSA_WITH_RC4_128_SHA,     SSL_kECDHE,     SSL_aECDSA,     SSL_RC4,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     0, 0,     SSL_NOT_DEFAULT | SSL_MEDIUM,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_RSA_WITH_RC4_128_SHA,     TLS1_RFC_ECDHE_RSA_WITH_RC4_128_SHA,     TLS1_CK_ECDHE_RSA_WITH_RC4_128_SHA,     SSL_kECDHE,     SSL_aRSA,     SSL_RC4,     SSL_SHA1,     TLS1_VERSION, TLS1_2_VERSION,     0, 0,     SSL_NOT_DEFAULT | SSL_MEDIUM,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_PSK_WITH_RC4_128_SHA,     TLS1_RFC_PSK_WITH_RC4_128_SHA,     TLS1_CK_PSK_WITH_RC4_128_SHA,     SSL_kPSK,     SSL_aPSK,     SSL_RC4,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     0, 0,     SSL_NOT_DEFAULT | SSL_MEDIUM,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_RSA_PSK_WITH_RC4_128_SHA,     TLS1_RFC_RSA_PSK_WITH_RC4_128_SHA,     TLS1_CK_RSA_PSK_WITH_RC4_128_SHA,     SSL_kRSAPSK,     SSL_aRSA,     SSL_RC4,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     0, 0,     SSL_NOT_DEFAULT | SSL_MEDIUM,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },    {     1,     TLS1_TXT_DHE_PSK_WITH_RC4_128_SHA,     TLS1_RFC_DHE_PSK_WITH_RC4_128_SHA,     TLS1_CK_DHE_PSK_WITH_RC4_128_SHA,     SSL_kDHEPSK,     SSL_aPSK,     SSL_RC4,     SSL_SHA1,     SSL3_VERSION, TLS1_2_VERSION,     0, 0,     SSL_NOT_DEFAULT | SSL_MEDIUM,     SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF,     128,     128,     },#endif                          /* OPENSSL_NO_WEAK_SSL_CIPHERS */#ifndef OPENSSL_NO_ARIA    {     1,     TLS1_TXT_RSA_WITH_ARIA_128_GCM_SHA256,     TLS1_RFC_RSA_WITH_ARIA_128_GCM_SHA256,     TLS1_CK_RSA_WITH_ARIA_128_GCM_SHA256,     SSL_kRSA,     SSL_aRSA,     SSL_ARIA128GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_RSA_WITH_ARIA_256_GCM_SHA384,     TLS1_RFC_RSA_WITH_ARIA_256_GCM_SHA384,     TLS1_CK_RSA_WITH_ARIA_256_GCM_SHA384,     SSL_kRSA,     SSL_aRSA,     SSL_ARIA256GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_DHE_RSA_WITH_ARIA_128_GCM_SHA256,     TLS1_RFC_DHE_RSA_WITH_ARIA_128_GCM_SHA256,     TLS1_CK_DHE_RSA_WITH_ARIA_128_GCM_SHA256,     SSL_kDHE,     SSL_aRSA,     SSL_ARIA128GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_DHE_RSA_WITH_ARIA_256_GCM_SHA384,     TLS1_RFC_DHE_RSA_WITH_ARIA_256_GCM_SHA384,     TLS1_CK_DHE_RSA_WITH_ARIA_256_GCM_SHA384,     SSL_kDHE,     SSL_aRSA,     SSL_ARIA256GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_DHE_DSS_WITH_ARIA_128_GCM_SHA256,     TLS1_RFC_DHE_DSS_WITH_ARIA_128_GCM_SHA256,     TLS1_CK_DHE_DSS_WITH_ARIA_128_GCM_SHA256,     SSL_kDHE,     SSL_aDSS,     SSL_ARIA128GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_DHE_DSS_WITH_ARIA_256_GCM_SHA384,     TLS1_RFC_DHE_DSS_WITH_ARIA_256_GCM_SHA384,     TLS1_CK_DHE_DSS_WITH_ARIA_256_GCM_SHA384,     SSL_kDHE,     SSL_aDSS,     SSL_ARIA256GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256,     TLS1_RFC_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256,     TLS1_CK_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256,     SSL_kECDHE,     SSL_aECDSA,     SSL_ARIA128GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384,     TLS1_RFC_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384,     TLS1_CK_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384,     SSL_kECDHE,     SSL_aECDSA,     SSL_ARIA256GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256,     TLS1_RFC_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256,     TLS1_CK_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256,     SSL_kECDHE,     SSL_aRSA,     SSL_ARIA128GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384,     TLS1_RFC_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384,     TLS1_CK_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384,     SSL_kECDHE,     SSL_aRSA,     SSL_ARIA256GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_PSK_WITH_ARIA_128_GCM_SHA256,     TLS1_RFC_PSK_WITH_ARIA_128_GCM_SHA256,     TLS1_CK_PSK_WITH_ARIA_128_GCM_SHA256,     SSL_kPSK,     SSL_aPSK,     SSL_ARIA128GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_PSK_WITH_ARIA_256_GCM_SHA384,     TLS1_RFC_PSK_WITH_ARIA_256_GCM_SHA384,     TLS1_CK_PSK_WITH_ARIA_256_GCM_SHA384,     SSL_kPSK,     SSL_aPSK,     SSL_ARIA256GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_DHE_PSK_WITH_ARIA_128_GCM_SHA256,     TLS1_RFC_DHE_PSK_WITH_ARIA_128_GCM_SHA256,     TLS1_CK_DHE_PSK_WITH_ARIA_128_GCM_SHA256,     SSL_kDHEPSK,     SSL_aPSK,     SSL_ARIA128GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_DHE_PSK_WITH_ARIA_256_GCM_SHA384,     TLS1_RFC_DHE_PSK_WITH_ARIA_256_GCM_SHA384,     TLS1_CK_DHE_PSK_WITH_ARIA_256_GCM_SHA384,     SSL_kDHEPSK,     SSL_aPSK,     SSL_ARIA256GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },    {     1,     TLS1_TXT_RSA_PSK_WITH_ARIA_128_GCM_SHA256,     TLS1_RFC_RSA_PSK_WITH_ARIA_128_GCM_SHA256,     TLS1_CK_RSA_PSK_WITH_ARIA_128_GCM_SHA256,     SSL_kRSAPSK,     SSL_aRSA,     SSL_ARIA128GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256,     128,     128,     },    {     1,     TLS1_TXT_RSA_PSK_WITH_ARIA_256_GCM_SHA384,     TLS1_RFC_RSA_PSK_WITH_ARIA_256_GCM_SHA384,     TLS1_CK_RSA_PSK_WITH_ARIA_256_GCM_SHA384,     SSL_kRSAPSK,     SSL_aRSA,     SSL_ARIA256GCM,     SSL_AEAD,     TLS1_2_VERSION, TLS1_2_VERSION,     DTLS1_2_VERSION, DTLS1_2_VERSION,     SSL_NOT_DEFAULT | SSL_HIGH,     SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384,     256,     256,     },#endif /* OPENSSL_NO_ARIA */};/* * The list of known Signalling Cipher-Suite Value "ciphers", non-valid * values stuffed into the ciphers field of the wire protocol for signalling * purposes. */static SSL_CIPHER ssl3_scsvs[] = {    {     0,     "TLS_EMPTY_RENEGOTIATION_INFO_SCSV",     "TLS_EMPTY_RENEGOTIATION_INFO_SCSV",     SSL3_CK_SCSV,     0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,    },    {     0,     "TLS_FALLBACK_SCSV",     "TLS_FALLBACK_SCSV",     SSL3_CK_FALLBACK_SCSV,     0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,    },};static int cipher_compare(const void *a, const void *b){    const SSL_CIPHER *ap = (const SSL_CIPHER *)a;    const SSL_CIPHER *bp = (const SSL_CIPHER *)b;    if (ap->id == bp->id)        return 0;    return ap->id < bp->id ? -1 : 1;}void ssl_sort_cipher_list(void){    qsort(tls13_ciphers, TLS13_NUM_CIPHERS, sizeof(tls13_ciphers[0]),          cipher_compare);    qsort(ssl3_ciphers, SSL3_NUM_CIPHERS, sizeof(ssl3_ciphers[0]),          cipher_compare);    qsort(ssl3_scsvs, SSL3_NUM_SCSVS, sizeof(ssl3_scsvs[0]), cipher_compare);}static int ssl_undefined_function_1(SSL *ssl, unsigned char *r, size_t s,                                    const char * t, size_t u,                                    const unsigned char * v, size_t w, int x){    (void)r;    (void)s;    (void)t;    (void)u;    (void)v;    (void)w;    (void)x;    return ssl_undefined_function(ssl);}const SSL3_ENC_METHOD SSLv3_enc_data = {    ssl3_enc,    n_ssl3_mac,    ssl3_setup_key_block,    ssl3_generate_master_secret,    ssl3_change_cipher_state,    ssl3_final_finish_mac,    SSL3_MD_CLIENT_FINISHED_CONST, 4,    SSL3_MD_SERVER_FINISHED_CONST, 4,    ssl3_alert_code,    ssl_undefined_function_1,    0,    ssl3_set_handshake_header,    tls_close_construct_packet,    ssl3_handshake_write};long ssl3_default_timeout(void){    /*     * 2 hours, the 24 hours mentioned in the SSLv3 spec is way too long for     * http, the cache would over fill     */    return (60 * 60 * 2);}int ssl3_num_ciphers(void){    return SSL3_NUM_CIPHERS;}const SSL_CIPHER *ssl3_get_cipher(unsigned int u){    if (u < SSL3_NUM_CIPHERS)        return &(ssl3_ciphers[SSL3_NUM_CIPHERS - 1 - u]);    else        return NULL;}int ssl3_set_handshake_header(SSL *s, WPACKET *pkt, int htype){    /* No header in the event of a CCS */    if (htype == SSL3_MT_CHANGE_CIPHER_SPEC)        return 1;    /* Set the content type and 3 bytes for the message len */    if (!WPACKET_put_bytes_u8(pkt, htype)            || !WPACKET_start_sub_packet_u24(pkt))        return 0;    return 1;}int ssl3_handshake_write(SSL *s){    return ssl3_do_write(s, SSL3_RT_HANDSHAKE);}int ssl3_new(SSL *s){    SSL3_STATE *s3;    if ((s3 = OPENSSL_zalloc(sizeof(*s3))) == NULL)        goto err;    s->s3 = s3;#ifndef OPENSSL_NO_SRP    if (!SSL_SRP_CTX_init(s))        goto err;#endif    if (!s->method->ssl_clear(s))        return 0;    return 1; err:    return 0;}void ssl3_free(SSL *s){    if (s == NULL || s->s3 == NULL)        return;    ssl3_cleanup_key_block(s);#if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH)    EVP_PKEY_free(s->s3->peer_tmp);    s->s3->peer_tmp = NULL;    EVP_PKEY_free(s->s3->tmp.pkey);    s->s3->tmp.pkey = NULL;#endif    OPENSSL_free(s->s3->tmp.ctype);    sk_X509_NAME_pop_free(s->s3->tmp.peer_ca_names, X509_NAME_free);    OPENSSL_free(s->s3->tmp.ciphers_raw);    OPENSSL_clear_free(s->s3->tmp.pms, s->s3->tmp.pmslen);    OPENSSL_free(s->s3->tmp.peer_sigalgs);    OPENSSL_free(s->s3->tmp.peer_cert_sigalgs);    ssl3_free_digest_list(s);    OPENSSL_free(s->s3->alpn_selected);    OPENSSL_free(s->s3->alpn_proposed);#ifndef OPENSSL_NO_SRP    SSL_SRP_CTX_free(s);#endif    OPENSSL_clear_free(s->s3, sizeof(*s->s3));    s->s3 = NULL;}int ssl3_clear(SSL *s){    ssl3_cleanup_key_block(s);    OPENSSL_free(s->s3->tmp.ctype);    sk_X509_NAME_pop_free(s->s3->tmp.peer_ca_names, X509_NAME_free);    OPENSSL_free(s->s3->tmp.ciphers_raw);    OPENSSL_clear_free(s->s3->tmp.pms, s->s3->tmp.pmslen);    OPENSSL_free(s->s3->tmp.peer_sigalgs);    OPENSSL_free(s->s3->tmp.peer_cert_sigalgs);#if !defined(OPENSSL_NO_EC) || !defined(OPENSSL_NO_DH)    EVP_PKEY_free(s->s3->tmp.pkey);    EVP_PKEY_free(s->s3->peer_tmp);#endif                          /* !OPENSSL_NO_EC */    ssl3_free_digest_list(s);    OPENSSL_free(s->s3->alpn_selected);    OPENSSL_free(s->s3->alpn_proposed);    /* NULL/zero-out everything in the s3 struct */    memset(s->s3, 0, sizeof(*s->s3));    if (!ssl_free_wbio_buffer(s))        return 0;    s->version = SSL3_VERSION;#if !defined(OPENSSL_NO_NEXTPROTONEG)    OPENSSL_free(s->ext.npn);    s->ext.npn = NULL;    s->ext.npn_len = 0;#endif    return 1;}#ifndef OPENSSL_NO_SRPstatic char *srp_password_from_info_cb(SSL *s, void *arg){    return OPENSSL_strdup(s->srp_ctx.info);}#endifstatic int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len);long ssl3_ctrl(SSL *s, int cmd, long larg, void *parg){    int ret = 0;    switch (cmd) {    case SSL_CTRL_GET_CLIENT_CERT_REQUEST:        break;    case SSL_CTRL_GET_NUM_RENEGOTIATIONS:        ret = s->s3->num_renegotiations;        break;    case SSL_CTRL_CLEAR_NUM_RENEGOTIATIONS:        ret = s->s3->num_renegotiations;        s->s3->num_renegotiations = 0;        break;    case SSL_CTRL_GET_TOTAL_RENEGOTIATIONS:        ret = s->s3->total_renegotiations;        break;    case SSL_CTRL_GET_FLAGS:        ret = (int)(s->s3->flags);        break;#ifndef OPENSSL_NO_DH    case SSL_CTRL_SET_TMP_DH:        {            DH *dh = (DH *)parg;            EVP_PKEY *pkdh = NULL;            if (dh == NULL) {                SSLerr(SSL_F_SSL3_CTRL, ERR_R_PASSED_NULL_PARAMETER);                return ret;            }            pkdh = ssl_dh_to_pkey(dh);            if (pkdh == NULL) {                SSLerr(SSL_F_SSL3_CTRL, ERR_R_MALLOC_FAILURE);                return 0;            }            if (!ssl_security(s, SSL_SECOP_TMP_DH,                              EVP_PKEY_security_bits(pkdh), 0, pkdh)) {                SSLerr(SSL_F_SSL3_CTRL, SSL_R_DH_KEY_TOO_SMALL);                EVP_PKEY_free(pkdh);                return ret;            }            EVP_PKEY_free(s->cert->dh_tmp);            s->cert->dh_tmp = pkdh;            ret = 1;        }        break;    case SSL_CTRL_SET_TMP_DH_CB:        {            SSLerr(SSL_F_SSL3_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);            return ret;        }    case SSL_CTRL_SET_DH_AUTO:        s->cert->dh_tmp_auto = larg;        return 1;#endif#ifndef OPENSSL_NO_EC    case SSL_CTRL_SET_TMP_ECDH:        {            const EC_GROUP *group = NULL;            int nid;            if (parg == NULL) {                SSLerr(SSL_F_SSL3_CTRL, ERR_R_PASSED_NULL_PARAMETER);                return 0;            }            group = EC_KEY_get0_group((const EC_KEY *)parg);            if (group == NULL) {                SSLerr(SSL_F_SSL3_CTRL, EC_R_MISSING_PARAMETERS);                return 0;            }            nid = EC_GROUP_get_curve_name(group);            if (nid == NID_undef)                return 0;            return tls1_set_groups(&s->ext.supportedgroups,                                   &s->ext.supportedgroups_len,                                   &nid, 1);        }        break;#endif                          /* !OPENSSL_NO_EC */    case SSL_CTRL_SET_TLSEXT_HOSTNAME:        /*         * TODO(OpenSSL1.2)         * This API is only used for a client to set what SNI it will request         * from the server, but we currently allow it to be used on servers         * as well, which is a programming error.  Currently we just clear         * the field in SSL_do_handshake() for server SSLs, but when we can         * make ABI-breaking changes, we may want to make use of this API         * an error on server SSLs.         */        if (larg == TLSEXT_NAMETYPE_host_name) {            size_t len;            OPENSSL_free(s->ext.hostname);            s->ext.hostname = NULL;            ret = 1;            if (parg == NULL)                break;            len = strlen((char *)parg);            if (len == 0 || len > TLSEXT_MAXLEN_host_name) {                SSLerr(SSL_F_SSL3_CTRL, SSL_R_SSL3_EXT_INVALID_SERVERNAME);                return 0;            }            if ((s->ext.hostname = OPENSSL_strdup((char *)parg)) == NULL) {                SSLerr(SSL_F_SSL3_CTRL, ERR_R_INTERNAL_ERROR);                return 0;            }        } else {            SSLerr(SSL_F_SSL3_CTRL, SSL_R_SSL3_EXT_INVALID_SERVERNAME_TYPE);            return 0;        }        break;    case SSL_CTRL_SET_TLSEXT_DEBUG_ARG:        s->ext.debug_arg = parg;        ret = 1;        break;    case SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE:        ret = s->ext.status_type;        break;    case SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE:        s->ext.status_type = larg;        ret = 1;        break;    case SSL_CTRL_GET_TLSEXT_STATUS_REQ_EXTS:        *(STACK_OF(X509_EXTENSION) **)parg = s->ext.ocsp.exts;        ret = 1;        break;    case SSL_CTRL_SET_TLSEXT_STATUS_REQ_EXTS:        s->ext.ocsp.exts = parg;        ret = 1;        break;    case SSL_CTRL_GET_TLSEXT_STATUS_REQ_IDS:        *(STACK_OF(OCSP_RESPID) **)parg = s->ext.ocsp.ids;        ret = 1;        break;    case SSL_CTRL_SET_TLSEXT_STATUS_REQ_IDS:        s->ext.ocsp.ids = parg;        ret = 1;        break;    case SSL_CTRL_GET_TLSEXT_STATUS_REQ_OCSP_RESP:        *(unsigned char **)parg = s->ext.ocsp.resp;        if (s->ext.ocsp.resp_len == 0                || s->ext.ocsp.resp_len > LONG_MAX)            return -1;        return (long)s->ext.ocsp.resp_len;    case SSL_CTRL_SET_TLSEXT_STATUS_REQ_OCSP_RESP:        OPENSSL_free(s->ext.ocsp.resp);        s->ext.ocsp.resp = parg;        s->ext.ocsp.resp_len = larg;        ret = 1;        break;#ifndef OPENSSL_NO_HEARTBEATS    case SSL_CTRL_DTLS_EXT_SEND_HEARTBEAT:    case SSL_CTRL_GET_DTLS_EXT_HEARTBEAT_PENDING:    case SSL_CTRL_SET_DTLS_EXT_HEARTBEAT_NO_REQUESTS:        break;#endif    case SSL_CTRL_CHAIN:        if (larg)            return ssl_cert_set1_chain(s, NULL, (STACK_OF(X509) *)parg);        else            return ssl_cert_set0_chain(s, NULL, (STACK_OF(X509) *)parg);    case SSL_CTRL_CHAIN_CERT:        if (larg)            return ssl_cert_add1_chain_cert(s, NULL, (X509 *)parg);        else            return ssl_cert_add0_chain_cert(s, NULL, (X509 *)parg);    case SSL_CTRL_GET_CHAIN_CERTS:        *(STACK_OF(X509) **)parg = s->cert->key->chain;        ret = 1;        break;    case SSL_CTRL_SELECT_CURRENT_CERT:        return ssl_cert_select_current(s->cert, (X509 *)parg);    case SSL_CTRL_SET_CURRENT_CERT:        if (larg == SSL_CERT_SET_SERVER) {            const SSL_CIPHER *cipher;            if (!s->server)                return 0;            cipher = s->s3->tmp.new_cipher;            if (cipher == NULL)                return 0;            /*             * No certificate for unauthenticated ciphersuites or using SRP             * authentication             */            if (cipher->algorithm_auth & (SSL_aNULL | SSL_aSRP))                return 2;            if (s->s3->tmp.cert == NULL)                return 0;            s->cert->key = s->s3->tmp.cert;            return 1;        }        return ssl_cert_set_current(s->cert, larg);#ifndef OPENSSL_NO_EC    case SSL_CTRL_GET_GROUPS:        {            uint16_t *clist;            size_t clistlen;            if (!s->session)                return 0;            clist = s->ext.peer_supportedgroups;            clistlen = s->ext.peer_supportedgroups_len;            if (parg) {                size_t i;                int *cptr = parg;                for (i = 0; i < clistlen; i++) {                    const TLS_GROUP_INFO *cinf = tls1_group_id_lookup(clist[i]);                    if (cinf != NULL)                        cptr[i] = cinf->nid;                    else                        cptr[i] = TLSEXT_nid_unknown | clist[i];                }            }            return (int)clistlen;        }    case SSL_CTRL_SET_GROUPS:        return tls1_set_groups(&s->ext.supportedgroups,                               &s->ext.supportedgroups_len, parg, larg);    case SSL_CTRL_SET_GROUPS_LIST:        return tls1_set_groups_list(&s->ext.supportedgroups,                                    &s->ext.supportedgroups_len, parg);    case SSL_CTRL_GET_SHARED_GROUP:        {            uint16_t id = tls1_shared_group(s, larg);            if (larg != -1) {                const TLS_GROUP_INFO *ginf = tls1_group_id_lookup(id);                return ginf == NULL ? 0 : ginf->nid;            }            return id;        }#endif    case SSL_CTRL_SET_SIGALGS:        return tls1_set_sigalgs(s->cert, parg, larg, 0);    case SSL_CTRL_SET_SIGALGS_LIST:        return tls1_set_sigalgs_list(s->cert, parg, 0);    case SSL_CTRL_SET_CLIENT_SIGALGS:        return tls1_set_sigalgs(s->cert, parg, larg, 1);    case SSL_CTRL_SET_CLIENT_SIGALGS_LIST:        return tls1_set_sigalgs_list(s->cert, parg, 1);    case SSL_CTRL_GET_CLIENT_CERT_TYPES:        {            const unsigned char **pctype = parg;            if (s->server || !s->s3->tmp.cert_req)                return 0;            if (pctype)                *pctype = s->s3->tmp.ctype;            return s->s3->tmp.ctype_len;        }    case SSL_CTRL_SET_CLIENT_CERT_TYPES:        if (!s->server)            return 0;        return ssl3_set_req_cert_type(s->cert, parg, larg);    case SSL_CTRL_BUILD_CERT_CHAIN:        return ssl_build_cert_chain(s, NULL, larg);    case SSL_CTRL_SET_VERIFY_CERT_STORE:        return ssl_cert_set_cert_store(s->cert, parg, 0, larg);    case SSL_CTRL_SET_CHAIN_CERT_STORE:        return ssl_cert_set_cert_store(s->cert, parg, 1, larg);    case SSL_CTRL_GET_PEER_SIGNATURE_NID:        if (s->s3->tmp.peer_sigalg == NULL)            return 0;        *(int *)parg = s->s3->tmp.peer_sigalg->hash;        return 1;    case SSL_CTRL_GET_SIGNATURE_NID:        if (s->s3->tmp.sigalg == NULL)            return 0;        *(int *)parg = s->s3->tmp.sigalg->hash;        return 1;    case SSL_CTRL_GET_PEER_TMP_KEY:#if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_EC)        if (s->session == NULL || s->s3->peer_tmp == NULL) {            return 0;        } else {            EVP_PKEY_up_ref(s->s3->peer_tmp);            *(EVP_PKEY **)parg = s->s3->peer_tmp;            return 1;        }#else        return 0;#endif    case SSL_CTRL_GET_TMP_KEY:#if !defined(OPENSSL_NO_DH) || !defined(OPENSSL_NO_EC)        if (s->session == NULL || s->s3->tmp.pkey == NULL) {            return 0;        } else {            EVP_PKEY_up_ref(s->s3->tmp.pkey);            *(EVP_PKEY **)parg = s->s3->tmp.pkey;            return 1;        }#else        return 0;#endif#ifndef OPENSSL_NO_EC    case SSL_CTRL_GET_EC_POINT_FORMATS:        {            const unsigned char **pformat = parg;            if (s->ext.peer_ecpointformats == NULL)                return 0;            *pformat = s->ext.peer_ecpointformats;            return (int)s->ext.peer_ecpointformats_len;        }#endif    default:        break;    }    return ret;}long ssl3_callback_ctrl(SSL *s, int cmd, void (*fp) (void)){    int ret = 0;    switch (cmd) {#ifndef OPENSSL_NO_DH    case SSL_CTRL_SET_TMP_DH_CB:        {            s->cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))fp;        }        break;#endif    case SSL_CTRL_SET_TLSEXT_DEBUG_CB:        s->ext.debug_cb = (void (*)(SSL *, int, int,                                    const unsigned char *, int, void *))fp;        break;    case SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB:        {            s->not_resumable_session_cb = (int (*)(SSL *, int))fp;        }        break;    default:        break;    }    return ret;}long ssl3_ctx_ctrl(SSL_CTX *ctx, int cmd, long larg, void *parg){    switch (cmd) {#ifndef OPENSSL_NO_DH    case SSL_CTRL_SET_TMP_DH:        {            DH *dh = (DH *)parg;            EVP_PKEY *pkdh = NULL;            if (dh == NULL) {                SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_PASSED_NULL_PARAMETER);                return 0;            }            pkdh = ssl_dh_to_pkey(dh);            if (pkdh == NULL) {                SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_MALLOC_FAILURE);                return 0;            }            if (!ssl_ctx_security(ctx, SSL_SECOP_TMP_DH,                                  EVP_PKEY_security_bits(pkdh), 0, pkdh)) {                SSLerr(SSL_F_SSL3_CTX_CTRL, SSL_R_DH_KEY_TOO_SMALL);                EVP_PKEY_free(pkdh);                return 0;            }            EVP_PKEY_free(ctx->cert->dh_tmp);            ctx->cert->dh_tmp = pkdh;            return 1;        }    case SSL_CTRL_SET_TMP_DH_CB:        {            SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_SHOULD_NOT_HAVE_BEEN_CALLED);            return 0;        }    case SSL_CTRL_SET_DH_AUTO:        ctx->cert->dh_tmp_auto = larg;        return 1;#endif#ifndef OPENSSL_NO_EC    case SSL_CTRL_SET_TMP_ECDH:        {            const EC_GROUP *group = NULL;            int nid;            if (parg == NULL) {                SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_PASSED_NULL_PARAMETER);                return 0;            }            group = EC_KEY_get0_group((const EC_KEY *)parg);            if (group == NULL) {                SSLerr(SSL_F_SSL3_CTX_CTRL, EC_R_MISSING_PARAMETERS);                return 0;            }            nid = EC_GROUP_get_curve_name(group);            if (nid == NID_undef)                return 0;            return tls1_set_groups(&ctx->ext.supportedgroups,                                   &ctx->ext.supportedgroups_len,                                   &nid, 1);        }#endif                          /* !OPENSSL_NO_EC */    case SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG:        ctx->ext.servername_arg = parg;        break;    case SSL_CTRL_SET_TLSEXT_TICKET_KEYS:    case SSL_CTRL_GET_TLSEXT_TICKET_KEYS:        {            unsigned char *keys = parg;            long tick_keylen = (sizeof(ctx->ext.tick_key_name) +                                sizeof(ctx->ext.secure->tick_hmac_key) +                                sizeof(ctx->ext.secure->tick_aes_key));            if (keys == NULL)                return tick_keylen;            if (larg != tick_keylen) {                SSLerr(SSL_F_SSL3_CTX_CTRL, SSL_R_INVALID_TICKET_KEYS_LENGTH);                return 0;            }            if (cmd == SSL_CTRL_SET_TLSEXT_TICKET_KEYS) {                memcpy(ctx->ext.tick_key_name, keys,                       sizeof(ctx->ext.tick_key_name));                memcpy(ctx->ext.secure->tick_hmac_key,                       keys + sizeof(ctx->ext.tick_key_name),                       sizeof(ctx->ext.secure->tick_hmac_key));                memcpy(ctx->ext.secure->tick_aes_key,                       keys + sizeof(ctx->ext.tick_key_name) +                       sizeof(ctx->ext.secure->tick_hmac_key),                       sizeof(ctx->ext.secure->tick_aes_key));            } else {                memcpy(keys, ctx->ext.tick_key_name,                       sizeof(ctx->ext.tick_key_name));                memcpy(keys + sizeof(ctx->ext.tick_key_name),                       ctx->ext.secure->tick_hmac_key,                       sizeof(ctx->ext.secure->tick_hmac_key));                memcpy(keys + sizeof(ctx->ext.tick_key_name) +                       sizeof(ctx->ext.secure->tick_hmac_key),                       ctx->ext.secure->tick_aes_key,                       sizeof(ctx->ext.secure->tick_aes_key));            }            return 1;        }    case SSL_CTRL_GET_TLSEXT_STATUS_REQ_TYPE:        return ctx->ext.status_type;    case SSL_CTRL_SET_TLSEXT_STATUS_REQ_TYPE:        ctx->ext.status_type = larg;        break;    case SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB_ARG:        ctx->ext.status_arg = parg;        return 1;    case SSL_CTRL_GET_TLSEXT_STATUS_REQ_CB_ARG:        *(void**)parg = ctx->ext.status_arg;        break;    case SSL_CTRL_GET_TLSEXT_STATUS_REQ_CB:        *(int (**)(SSL*, void*))parg = ctx->ext.status_cb;        break;#ifndef OPENSSL_NO_SRP    case SSL_CTRL_SET_TLS_EXT_SRP_USERNAME:        ctx->srp_ctx.srp_Mask |= SSL_kSRP;        OPENSSL_free(ctx->srp_ctx.login);        ctx->srp_ctx.login = NULL;        if (parg == NULL)            break;        if (strlen((const char *)parg) > 255 || strlen((const char *)parg) < 1) {            SSLerr(SSL_F_SSL3_CTX_CTRL, SSL_R_INVALID_SRP_USERNAME);            return 0;        }        if ((ctx->srp_ctx.login = OPENSSL_strdup((char *)parg)) == NULL) {            SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_INTERNAL_ERROR);            return 0;        }        break;    case SSL_CTRL_SET_TLS_EXT_SRP_PASSWORD:        ctx->srp_ctx.SRP_give_srp_client_pwd_callback =            srp_password_from_info_cb;        if (ctx->srp_ctx.info != NULL)            OPENSSL_free(ctx->srp_ctx.info);        if ((ctx->srp_ctx.info = BUF_strdup((char *)parg)) == NULL) {            SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_INTERNAL_ERROR);            return 0;        }        break;    case SSL_CTRL_SET_SRP_ARG:        ctx->srp_ctx.srp_Mask |= SSL_kSRP;        ctx->srp_ctx.SRP_cb_arg = parg;        break;    case SSL_CTRL_SET_TLS_EXT_SRP_STRENGTH:        ctx->srp_ctx.strength = larg;        break;#endif#ifndef OPENSSL_NO_EC    case SSL_CTRL_SET_GROUPS:        return tls1_set_groups(&ctx->ext.supportedgroups,                               &ctx->ext.supportedgroups_len,                               parg, larg);    case SSL_CTRL_SET_GROUPS_LIST:        return tls1_set_groups_list(&ctx->ext.supportedgroups,                                    &ctx->ext.supportedgroups_len,                                    parg);#endif    case SSL_CTRL_SET_SIGALGS:        return tls1_set_sigalgs(ctx->cert, parg, larg, 0);    case SSL_CTRL_SET_SIGALGS_LIST:        return tls1_set_sigalgs_list(ctx->cert, parg, 0);    case SSL_CTRL_SET_CLIENT_SIGALGS:        return tls1_set_sigalgs(ctx->cert, parg, larg, 1);    case SSL_CTRL_SET_CLIENT_SIGALGS_LIST:        return tls1_set_sigalgs_list(ctx->cert, parg, 1);    case SSL_CTRL_SET_CLIENT_CERT_TYPES:        return ssl3_set_req_cert_type(ctx->cert, parg, larg);    case SSL_CTRL_BUILD_CERT_CHAIN:        return ssl_build_cert_chain(NULL, ctx, larg);    case SSL_CTRL_SET_VERIFY_CERT_STORE:        return ssl_cert_set_cert_store(ctx->cert, parg, 0, larg);    case SSL_CTRL_SET_CHAIN_CERT_STORE:        return ssl_cert_set_cert_store(ctx->cert, parg, 1, larg);        /* A Thawte special :-) */    case SSL_CTRL_EXTRA_CHAIN_CERT:        if (ctx->extra_certs == NULL) {            if ((ctx->extra_certs = sk_X509_new_null()) == NULL) {                SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_MALLOC_FAILURE);                return 0;            }        }        if (!sk_X509_push(ctx->extra_certs, (X509 *)parg)) {            SSLerr(SSL_F_SSL3_CTX_CTRL, ERR_R_MALLOC_FAILURE);            return 0;        }        break;    case SSL_CTRL_GET_EXTRA_CHAIN_CERTS:        if (ctx->extra_certs == NULL && larg == 0)            *(STACK_OF(X509) **)parg = ctx->cert->key->chain;        else            *(STACK_OF(X509) **)parg = ctx->extra_certs;        break;    case SSL_CTRL_CLEAR_EXTRA_CHAIN_CERTS:        sk_X509_pop_free(ctx->extra_certs, X509_free);        ctx->extra_certs = NULL;        break;    case SSL_CTRL_CHAIN:        if (larg)            return ssl_cert_set1_chain(NULL, ctx, (STACK_OF(X509) *)parg);        else            return ssl_cert_set0_chain(NULL, ctx, (STACK_OF(X509) *)parg);    case SSL_CTRL_CHAIN_CERT:        if (larg)            return ssl_cert_add1_chain_cert(NULL, ctx, (X509 *)parg);        else            return ssl_cert_add0_chain_cert(NULL, ctx, (X509 *)parg);    case SSL_CTRL_GET_CHAIN_CERTS:        *(STACK_OF(X509) **)parg = ctx->cert->key->chain;        break;    case SSL_CTRL_SELECT_CURRENT_CERT:        return ssl_cert_select_current(ctx->cert, (X509 *)parg);    case SSL_CTRL_SET_CURRENT_CERT:        return ssl_cert_set_current(ctx->cert, larg);    default:        return 0;    }    return 1;}long ssl3_ctx_callback_ctrl(SSL_CTX *ctx, int cmd, void (*fp) (void)){    switch (cmd) {#ifndef OPENSSL_NO_DH    case SSL_CTRL_SET_TMP_DH_CB:        {            ctx->cert->dh_tmp_cb = (DH *(*)(SSL *, int, int))fp;        }        break;#endif    case SSL_CTRL_SET_TLSEXT_SERVERNAME_CB:        ctx->ext.servername_cb = (int (*)(SSL *, int *, void *))fp;        break;    case SSL_CTRL_SET_TLSEXT_STATUS_REQ_CB:        ctx->ext.status_cb = (int (*)(SSL *, void *))fp;        break;    case SSL_CTRL_SET_TLSEXT_TICKET_KEY_CB:        ctx->ext.ticket_key_cb = (int (*)(SSL *, unsigned char *,                                             unsigned char *,                                             EVP_CIPHER_CTX *,                                             HMAC_CTX *, int))fp;        break;#ifndef OPENSSL_NO_SRP    case SSL_CTRL_SET_SRP_VERIFY_PARAM_CB:        ctx->srp_ctx.srp_Mask |= SSL_kSRP;        ctx->srp_ctx.SRP_verify_param_callback = (int (*)(SSL *, void *))fp;        break;    case SSL_CTRL_SET_TLS_EXT_SRP_USERNAME_CB:        ctx->srp_ctx.srp_Mask |= SSL_kSRP;        ctx->srp_ctx.TLS_ext_srp_username_callback =            (int (*)(SSL *, int *, void *))fp;        break;    case SSL_CTRL_SET_SRP_GIVE_CLIENT_PWD_CB:        ctx->srp_ctx.srp_Mask |= SSL_kSRP;        ctx->srp_ctx.SRP_give_srp_client_pwd_callback =            (char *(*)(SSL *, void *))fp;        break;#endif    case SSL_CTRL_SET_NOT_RESUMABLE_SESS_CB:        {            ctx->not_resumable_session_cb = (int (*)(SSL *, int))fp;        }        break;    default:        return 0;    }    return 1;}const SSL_CIPHER *ssl3_get_cipher_by_id(uint32_t id){    SSL_CIPHER c;    const SSL_CIPHER *cp;    c.id = id;    cp = OBJ_bsearch_ssl_cipher_id(&c, tls13_ciphers, TLS13_NUM_CIPHERS);    if (cp != NULL)        return cp;    cp = OBJ_bsearch_ssl_cipher_id(&c, ssl3_ciphers, SSL3_NUM_CIPHERS);    if (cp != NULL)        return cp;    return OBJ_bsearch_ssl_cipher_id(&c, ssl3_scsvs, SSL3_NUM_SCSVS);}const SSL_CIPHER *ssl3_get_cipher_by_std_name(const char *stdname){    SSL_CIPHER *tbl;    SSL_CIPHER *alltabs[] = {tls13_ciphers, ssl3_ciphers, ssl3_scsvs};    size_t i, j, tblsize[] = {TLS13_NUM_CIPHERS, SSL3_NUM_CIPHERS,                              SSL3_NUM_SCSVS};    /* this is not efficient, necessary to optimize this? */    for (j = 0; j < OSSL_NELEM(alltabs); j++) {        for (i = 0, tbl = alltabs[j]; i < tblsize[j]; i++, tbl++) {            if (tbl->stdname == NULL)                continue;            if (strcmp(stdname, tbl->stdname) == 0) {                return tbl;            }        }    }    return NULL;}/* * This function needs to check if the ciphers required are actually * available */const SSL_CIPHER *ssl3_get_cipher_by_char(const unsigned char *p){    return ssl3_get_cipher_by_id(SSL3_CK_CIPHERSUITE_FLAG                                 | ((uint32_t)p[0] << 8L)                                 | (uint32_t)p[1]);}int ssl3_put_cipher_by_char(const SSL_CIPHER *c, WPACKET *pkt, size_t *len){    if ((c->id & 0xff000000) != SSL3_CK_CIPHERSUITE_FLAG) {        *len = 0;        return 1;    }    if (!WPACKET_put_bytes_u16(pkt, c->id & 0xffff))        return 0;    *len = 2;    return 1;}/* * ssl3_choose_cipher - choose a cipher from those offered by the client * @s: SSL connection * @clnt: ciphers offered by the client * @srvr: ciphers enabled on the server? * * Returns the selected cipher or NULL when no common ciphers. */const SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt,                                     STACK_OF(SSL_CIPHER) *srvr){    const SSL_CIPHER *c, *ret = NULL;    STACK_OF(SSL_CIPHER) *prio, *allow;    int i, ii, ok, prefer_sha256 = 0;    unsigned long alg_k = 0, alg_a = 0, mask_k = 0, mask_a = 0;    const EVP_MD *mdsha256 = EVP_sha256();#ifndef OPENSSL_NO_CHACHA    STACK_OF(SSL_CIPHER) *prio_chacha = NULL;#endif    /* Let's see which ciphers we can support */    /*     * Do not set the compare functions, because this may lead to a     * reordering by "id". We want to keep the original ordering. We may pay     * a price in performance during sk_SSL_CIPHER_find(), but would have to     * pay with the price of sk_SSL_CIPHER_dup().     */#ifdef CIPHER_DEBUG    fprintf(stderr, "Server has %d from %p:\n", sk_SSL_CIPHER_num(srvr),            (void *)srvr);    for (i = 0; i < sk_SSL_CIPHER_num(srvr); ++i) {        c = sk_SSL_CIPHER_value(srvr, i);        fprintf(stderr, "%p:%s\n", (void *)c, c->name);    }    fprintf(stderr, "Client sent %d from %p:\n", sk_SSL_CIPHER_num(clnt),            (void *)clnt);    for (i = 0; i < sk_SSL_CIPHER_num(clnt); ++i) {        c = sk_SSL_CIPHER_value(clnt, i);        fprintf(stderr, "%p:%s\n", (void *)c, c->name);    }#endif    /* SUITE-B takes precedence over server preference and ChaCha priortiy */    if (tls1_suiteb(s)) {        prio = srvr;        allow = clnt;    } else if (s->options & SSL_OP_CIPHER_SERVER_PREFERENCE) {        prio = srvr;        allow = clnt;#ifndef OPENSSL_NO_CHACHA        /* If ChaCha20 is at the top of the client preference list,           and there are ChaCha20 ciphers in the server list, then           temporarily prioritize all ChaCha20 ciphers in the servers list. */        if (s->options & SSL_OP_PRIORITIZE_CHACHA && sk_SSL_CIPHER_num(clnt) > 0) {            c = sk_SSL_CIPHER_value(clnt, 0);            if (c->algorithm_enc == SSL_CHACHA20POLY1305) {                /* ChaCha20 is client preferred, check server... */                int num = sk_SSL_CIPHER_num(srvr);                int found = 0;                for (i = 0; i < num; i++) {                    c = sk_SSL_CIPHER_value(srvr, i);                    if (c->algorithm_enc == SSL_CHACHA20POLY1305) {                        found = 1;                        break;                    }                }                if (found) {                    prio_chacha = sk_SSL_CIPHER_new_reserve(NULL, num);                    /* if reserve fails, then there's likely a memory issue */                    if (prio_chacha != NULL) {                        /* Put all ChaCha20 at the top, starting with the one we just found */                        sk_SSL_CIPHER_push(prio_chacha, c);                        for (i++; i < num; i++) {                            c = sk_SSL_CIPHER_value(srvr, i);                            if (c->algorithm_enc == SSL_CHACHA20POLY1305)                                sk_SSL_CIPHER_push(prio_chacha, c);                        }                        /* Pull in the rest */                        for (i = 0; i < num; i++) {                            c = sk_SSL_CIPHER_value(srvr, i);                            if (c->algorithm_enc != SSL_CHACHA20POLY1305)                                sk_SSL_CIPHER_push(prio_chacha, c);                        }                        prio = prio_chacha;                    }                }            }        }# endif    } else {        prio = clnt;        allow = srvr;    }    if (SSL_IS_TLS13(s)) {#ifndef OPENSSL_NO_PSK        int j;        /*         * If we allow "old" style PSK callbacks, and we have no certificate (so         * we're not going to succeed without a PSK anyway), and we're in         * TLSv1.3 then the default hash for a PSK is SHA-256 (as per the         * TLSv1.3 spec). Therefore we should prioritise ciphersuites using         * that.         */        if (s->psk_server_callback != NULL) {            for (j = 0; j < SSL_PKEY_NUM && !ssl_has_cert(s, j); j++);            if (j == SSL_PKEY_NUM) {                /* There are no certificates */                prefer_sha256 = 1;            }        }#endif    } else {        tls1_set_cert_validity(s);        ssl_set_masks(s);    }    for (i = 0; i < sk_SSL_CIPHER_num(prio); i++) {        c = sk_SSL_CIPHER_value(prio, i);        /* Skip ciphers not supported by the protocol version */        if (!SSL_IS_DTLS(s) &&            ((s->version < c->min_tls) || (s->version > c->max_tls)))            continue;        if (SSL_IS_DTLS(s) &&            (DTLS_VERSION_LT(s->version, c->min_dtls) ||             DTLS_VERSION_GT(s->version, c->max_dtls)))            continue;        /*         * Since TLS 1.3 ciphersuites can be used with any auth or         * key exchange scheme skip tests.         */        if (!SSL_IS_TLS13(s)) {            mask_k = s->s3->tmp.mask_k;            mask_a = s->s3->tmp.mask_a;#ifndef OPENSSL_NO_SRP            if (s->srp_ctx.srp_Mask & SSL_kSRP) {                mask_k |= SSL_kSRP;                mask_a |= SSL_aSRP;            }#endif            alg_k = c->algorithm_mkey;            alg_a = c->algorithm_auth;#ifndef OPENSSL_NO_PSK            /* with PSK there must be server callback set */            if ((alg_k & SSL_PSK) && s->psk_server_callback == NULL)                continue;#endif                          /* OPENSSL_NO_PSK */            ok = (alg_k & mask_k) && (alg_a & mask_a);#ifdef CIPHER_DEBUG            fprintf(stderr, "%d:[%08lX:%08lX:%08lX:%08lX]%p:%s\n", ok, alg_k,                    alg_a, mask_k, mask_a, (void *)c, c->name);#endif#ifndef OPENSSL_NO_EC            /*             * if we are considering an ECC cipher suite that uses an ephemeral             * EC key check it             */            if (alg_k & SSL_kECDHE)                ok = ok && tls1_check_ec_tmp_key(s, c->id);#endif                          /* OPENSSL_NO_EC */            if (!ok)                continue;        }        ii = sk_SSL_CIPHER_find(allow, c);        if (ii >= 0) {            /* Check security callback permits this cipher */            if (!ssl_security(s, SSL_SECOP_CIPHER_SHARED,                              c->strength_bits, 0, (void *)c))                continue;#if !defined(OPENSSL_NO_EC)            if ((alg_k & SSL_kECDHE) && (alg_a & SSL_aECDSA)                && s->s3->is_probably_safari) {                if (!ret)                    ret = sk_SSL_CIPHER_value(allow, ii);                continue;            }#endif            if (prefer_sha256) {                const SSL_CIPHER *tmp = sk_SSL_CIPHER_value(allow, ii);                if (ssl_md(tmp->algorithm2) == mdsha256) {                    ret = tmp;                    break;                }                if (ret == NULL)                    ret = tmp;                continue;            }            ret = sk_SSL_CIPHER_value(allow, ii);            break;        }    }#ifndef OPENSSL_NO_CHACHA    sk_SSL_CIPHER_free(prio_chacha);#endif    return ret;}int ssl3_get_req_cert_type(SSL *s, WPACKET *pkt){    uint32_t alg_k, alg_a = 0;    /* If we have custom certificate types set, use them */    if (s->cert->ctype)        return WPACKET_memcpy(pkt, s->cert->ctype, s->cert->ctype_len);    /* Get mask of algorithms disabled by signature list */    ssl_set_sig_mask(&alg_a, s, SSL_SECOP_SIGALG_MASK);    alg_k = s->s3->tmp.new_cipher->algorithm_mkey;#ifndef OPENSSL_NO_GOST    if (s->version >= TLS1_VERSION && (alg_k & SSL_kGOST))            return WPACKET_put_bytes_u8(pkt, TLS_CT_GOST01_SIGN)                    && WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_SIGN)                    && WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_512_SIGN);#endif    if ((s->version == SSL3_VERSION) && (alg_k & SSL_kDHE)) {#ifndef OPENSSL_NO_DH# ifndef OPENSSL_NO_RSA        if (!WPACKET_put_bytes_u8(pkt, SSL3_CT_RSA_EPHEMERAL_DH))            return 0;# endif# ifndef OPENSSL_NO_DSA        if (!WPACKET_put_bytes_u8(pkt, SSL3_CT_DSS_EPHEMERAL_DH))            return 0;# endif#endif                          /* !OPENSSL_NO_DH */    }#ifndef OPENSSL_NO_RSA    if (!(alg_a & SSL_aRSA) && !WPACKET_put_bytes_u8(pkt, SSL3_CT_RSA_SIGN))        return 0;#endif#ifndef OPENSSL_NO_DSA    if (!(alg_a & SSL_aDSS) && !WPACKET_put_bytes_u8(pkt, SSL3_CT_DSS_SIGN))        return 0;#endif#ifndef OPENSSL_NO_EC    /*     * ECDSA certs can be used with RSA cipher suites too so we don't     * need to check for SSL_kECDH or SSL_kECDHE     */    if (s->version >= TLS1_VERSION            && !(alg_a & SSL_aECDSA)            && !WPACKET_put_bytes_u8(pkt, TLS_CT_ECDSA_SIGN))        return 0;#endif    return 1;}static int ssl3_set_req_cert_type(CERT *c, const unsigned char *p, size_t len){    OPENSSL_free(c->ctype);    c->ctype = NULL;    c->ctype_len = 0;    if (p == NULL || len == 0)        return 1;    if (len > 0xff)        return 0;    c->ctype = OPENSSL_memdup(p, len);    if (c->ctype == NULL)        return 0;    c->ctype_len = len;    return 1;}int ssl3_shutdown(SSL *s){    int ret;    /*     * Don't do anything much if we have not done the handshake or we don't     * want to send messages :-)     */    if (s->quiet_shutdown || SSL_in_before(s)) {        s->shutdown = (SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN);        return 1;    }    if (!(s->shutdown & SSL_SENT_SHUTDOWN)) {        s->shutdown |= SSL_SENT_SHUTDOWN;        ssl3_send_alert(s, SSL3_AL_WARNING, SSL_AD_CLOSE_NOTIFY);        /*         * our shutdown alert has been sent now, and if it still needs to be         * written, s->s3->alert_dispatch will be true         */        if (s->s3->alert_dispatch)            return -1;        /* return WANT_WRITE */    } else if (s->s3->alert_dispatch) {        /* resend it if not sent */        ret = s->method->ssl_dispatch_alert(s);        if (ret == -1) {            /*             * we only get to return -1 here the 2nd/Nth invocation, we must             * have already signalled return 0 upon a previous invocation,             * return WANT_WRITE             */            return ret;        }    } else if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN)) {        size_t readbytes;        /*         * If we are waiting for a close from our peer, we are closed         */        s->method->ssl_read_bytes(s, 0, NULL, NULL, 0, 0, &readbytes);        if (!(s->shutdown & SSL_RECEIVED_SHUTDOWN)) {            return -1;        /* return WANT_READ */        }    }    if ((s->shutdown == (SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN)) &&        !s->s3->alert_dispatch)        return 1;    else        return 0;}int ssl3_write(SSL *s, const void *buf, size_t len, size_t *written){    clear_sys_error();    if (s->s3->renegotiate)        ssl3_renegotiate_check(s, 0);    return s->method->ssl_write_bytes(s, SSL3_RT_APPLICATION_DATA, buf, len,                                      written);}static int ssl3_read_internal(SSL *s, void *buf, size_t len, int peek,                              size_t *readbytes){    int ret;    clear_sys_error();    if (s->s3->renegotiate)        ssl3_renegotiate_check(s, 0);    s->s3->in_read_app_data = 1;    ret =        s->method->ssl_read_bytes(s, SSL3_RT_APPLICATION_DATA, NULL, buf, len,                                  peek, readbytes);    if ((ret == -1) && (s->s3->in_read_app_data == 2)) {        /*         * ssl3_read_bytes decided to call s->handshake_func, which called         * ssl3_read_bytes to read handshake data. However, ssl3_read_bytes         * actually found application data and thinks that application data         * makes sense here; so disable handshake processing and try to read         * application data again.         */        ossl_statem_set_in_handshake(s, 1);        ret =            s->method->ssl_read_bytes(s, SSL3_RT_APPLICATION_DATA, NULL, buf,                                      len, peek, readbytes);        ossl_statem_set_in_handshake(s, 0);    } else        s->s3->in_read_app_data = 0;    return ret;}int ssl3_read(SSL *s, void *buf, size_t len, size_t *readbytes){    return ssl3_read_internal(s, buf, len, 0, readbytes);}int ssl3_peek(SSL *s, void *buf, size_t len, size_t *readbytes){    return ssl3_read_internal(s, buf, len, 1, readbytes);}int ssl3_renegotiate(SSL *s){    if (s->handshake_func == NULL)        return 1;    s->s3->renegotiate = 1;    return 1;}/* * Check if we are waiting to do a renegotiation and if so whether now is a * good time to do it. If |initok| is true then we are being called from inside * the state machine so ignore the result of SSL_in_init(s). Otherwise we * should not do a renegotiation if SSL_in_init(s) is true. Returns 1 if we * should do a renegotiation now and sets up the state machine for it. Otherwise * returns 0. */int ssl3_renegotiate_check(SSL *s, int initok){    int ret = 0;    if (s->s3->renegotiate) {        if (!RECORD_LAYER_read_pending(&s->rlayer)            && !RECORD_LAYER_write_pending(&s->rlayer)            && (initok || !SSL_in_init(s))) {            /*             * if we are the server, and we have sent a 'RENEGOTIATE'             * message, we need to set the state machine into the renegotiate             * state.             */            ossl_statem_set_renegotiate(s);            s->s3->renegotiate = 0;            s->s3->num_renegotiations++;            s->s3->total_renegotiations++;            ret = 1;        }    }    return ret;}/* * If we are using default SHA1+MD5 algorithms switch to new SHA256 PRF and * handshake macs if required. * * If PSK and using SHA384 for TLS < 1.2 switch to default. */long ssl_get_algorithm2(SSL *s){    long alg2;    if (s->s3 == NULL || s->s3->tmp.new_cipher == NULL)        return -1;    alg2 = s->s3->tmp.new_cipher->algorithm2;    if (s->method->ssl3_enc->enc_flags & SSL_ENC_FLAG_SHA256_PRF) {        if (alg2 == (SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF))            return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;    } else if (s->s3->tmp.new_cipher->algorithm_mkey & SSL_PSK) {        if (alg2 == (SSL_HANDSHAKE_MAC_SHA384 | TLS1_PRF_SHA384))            return SSL_HANDSHAKE_MAC_DEFAULT | TLS1_PRF;    }    return alg2;}/* * Fill a ClientRandom or ServerRandom field of length len. Returns <= 0 on * failure, 1 on success. */int ssl_fill_hello_random(SSL *s, int server, unsigned char *result, size_t len,                          DOWNGRADE dgrd){    int send_time = 0, ret;    if (len < 4)        return 0;    if (server)        send_time = (s->mode & SSL_MODE_SEND_SERVERHELLO_TIME) != 0;    else        send_time = (s->mode & SSL_MODE_SEND_CLIENTHELLO_TIME) != 0;    if (send_time) {        unsigned long Time = (unsigned long)time(NULL);        unsigned char *p = result;        l2n(Time, p);        ret = RAND_bytes(p, len - 4);    } else {        ret = RAND_bytes(result, len);    }    if (ret > 0) {        if (!ossl_assert(sizeof(tls11downgrade) < len)                || !ossl_assert(sizeof(tls12downgrade) < len))             return 0;        if (dgrd == DOWNGRADE_TO_1_2)            memcpy(result + len - sizeof(tls12downgrade), tls12downgrade,                   sizeof(tls12downgrade));        else if (dgrd == DOWNGRADE_TO_1_1)            memcpy(result + len - sizeof(tls11downgrade), tls11downgrade,                   sizeof(tls11downgrade));    }    return ret;}int ssl_generate_master_secret(SSL *s, unsigned char *pms, size_t pmslen,                               int free_pms){    unsigned long alg_k = s->s3->tmp.new_cipher->algorithm_mkey;    int ret = 0;    if (alg_k & SSL_PSK) {#ifndef OPENSSL_NO_PSK        unsigned char *pskpms, *t;        size_t psklen = s->s3->tmp.psklen;        size_t pskpmslen;        /* create PSK premaster_secret */        /* For plain PSK "other_secret" is psklen zeroes */        if (alg_k & SSL_kPSK)            pmslen = psklen;        pskpmslen = 4 + pmslen + psklen;        pskpms = OPENSSL_malloc(pskpmslen);        if (pskpms == NULL)            goto err;        t = pskpms;        s2n(pmslen, t);        if (alg_k & SSL_kPSK)            memset(t, 0, pmslen);        else            memcpy(t, pms, pmslen);        t += pmslen;        s2n(psklen, t);        memcpy(t, s->s3->tmp.psk, psklen);        OPENSSL_clear_free(s->s3->tmp.psk, psklen);        s->s3->tmp.psk = NULL;        s->s3->tmp.psklen = 0;        if (!s->method->ssl3_enc->generate_master_secret(s,                    s->session->master_key, pskpms, pskpmslen,                    &s->session->master_key_length)) {            OPENSSL_clear_free(pskpms, pskpmslen);            /* SSLfatal() already called */            goto err;        }        OPENSSL_clear_free(pskpms, pskpmslen);#else        /* Should never happen */        goto err;#endif    } else {        if (!s->method->ssl3_enc->generate_master_secret(s,                s->session->master_key, pms, pmslen,                &s->session->master_key_length)) {            /* SSLfatal() already called */            goto err;        }    }    ret = 1; err:    if (pms) {        if (free_pms)            OPENSSL_clear_free(pms, pmslen);        else            OPENSSL_cleanse(pms, pmslen);    }    if (s->server == 0) {        s->s3->tmp.pms = NULL;        s->s3->tmp.pmslen = 0;    }    return ret;}/* Generate a private key from parameters */EVP_PKEY *ssl_generate_pkey(EVP_PKEY *pm){    EVP_PKEY_CTX *pctx = NULL;    EVP_PKEY *pkey = NULL;    if (pm == NULL)        return NULL;    pctx = EVP_PKEY_CTX_new(pm, NULL);    if (pctx == NULL)        goto err;    if (EVP_PKEY_keygen_init(pctx) <= 0)        goto err;    if (EVP_PKEY_keygen(pctx, &pkey) <= 0) {        EVP_PKEY_free(pkey);        pkey = NULL;    }    err:    EVP_PKEY_CTX_free(pctx);    return pkey;}#ifndef OPENSSL_NO_EC/* Generate a private key from a group ID */EVP_PKEY *ssl_generate_pkey_group(SSL *s, uint16_t id){    EVP_PKEY_CTX *pctx = NULL;    EVP_PKEY *pkey = NULL;    const TLS_GROUP_INFO *ginf = tls1_group_id_lookup(id);    uint16_t gtype;    if (ginf == NULL) {        SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_SSL_GENERATE_PKEY_GROUP,                 ERR_R_INTERNAL_ERROR);        goto err;    }    gtype = ginf->flags & TLS_CURVE_TYPE;    if (gtype == TLS_CURVE_CUSTOM)        pctx = EVP_PKEY_CTX_new_id(ginf->nid, NULL);    else        pctx = EVP_PKEY_CTX_new_id(EVP_PKEY_EC, NULL);    if (pctx == NULL) {        SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_SSL_GENERATE_PKEY_GROUP,                 ERR_R_MALLOC_FAILURE);        goto err;    }    if (EVP_PKEY_keygen_init(pctx) <= 0) {        SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_SSL_GENERATE_PKEY_GROUP,                 ERR_R_EVP_LIB);        goto err;    }    if (gtype != TLS_CURVE_CUSTOM            && EVP_PKEY_CTX_set_ec_paramgen_curve_nid(pctx, ginf->nid) <= 0) {        SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_SSL_GENERATE_PKEY_GROUP,                 ERR_R_EVP_LIB);        goto err;    }    if (EVP_PKEY_keygen(pctx, &pkey) <= 0) {        SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_SSL_GENERATE_PKEY_GROUP,                 ERR_R_EVP_LIB);        EVP_PKEY_free(pkey);        pkey = NULL;    } err:    EVP_PKEY_CTX_free(pctx);    return pkey;}/* * Generate parameters from a group ID */EVP_PKEY *ssl_generate_param_group(uint16_t id){    EVP_PKEY_CTX *pctx = NULL;    EVP_PKEY *pkey = NULL;    const TLS_GROUP_INFO *ginf = tls1_group_id_lookup(id);    if (ginf == NULL)        goto err;    if ((ginf->flags & TLS_CURVE_TYPE) == TLS_CURVE_CUSTOM) {        pkey = EVP_PKEY_new();        if (pkey != NULL && EVP_PKEY_set_type(pkey, ginf->nid))            return pkey;        EVP_PKEY_free(pkey);        return NULL;    }    pctx = EVP_PKEY_CTX_new_id(EVP_PKEY_EC, NULL);    if (pctx == NULL)        goto err;    if (EVP_PKEY_paramgen_init(pctx) <= 0)        goto err;    if (EVP_PKEY_CTX_set_ec_paramgen_curve_nid(pctx, ginf->nid) <= 0)        goto err;    if (EVP_PKEY_paramgen(pctx, &pkey) <= 0) {        EVP_PKEY_free(pkey);        pkey = NULL;    } err:    EVP_PKEY_CTX_free(pctx);    return pkey;}#endif/* Derive secrets for ECDH/DH */int ssl_derive(SSL *s, EVP_PKEY *privkey, EVP_PKEY *pubkey, int gensecret){    int rv = 0;    unsigned char *pms = NULL;    size_t pmslen = 0;    EVP_PKEY_CTX *pctx;    if (privkey == NULL || pubkey == NULL) {        SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_SSL_DERIVE,                 ERR_R_INTERNAL_ERROR);        return 0;    }    pctx = EVP_PKEY_CTX_new(privkey, NULL);    if (EVP_PKEY_derive_init(pctx) <= 0        || EVP_PKEY_derive_set_peer(pctx, pubkey) <= 0        || EVP_PKEY_derive(pctx, NULL, &pmslen) <= 0) {        SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_SSL_DERIVE,                 ERR_R_INTERNAL_ERROR);        goto err;    }    pms = OPENSSL_malloc(pmslen);    if (pms == NULL) {        SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_SSL_DERIVE,                 ERR_R_MALLOC_FAILURE);        goto err;    }    if (EVP_PKEY_derive(pctx, pms, &pmslen) <= 0) {        SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_SSL_DERIVE,                 ERR_R_INTERNAL_ERROR);        goto err;    }    if (gensecret) {        /* SSLfatal() called as appropriate in the below functions */        if (SSL_IS_TLS13(s)) {            /*             * If we are resuming then we already generated the early secret             * when we created the ClientHello, so don't recreate it.             */            if (!s->hit)                rv = tls13_generate_secret(s, ssl_handshake_md(s), NULL, NULL,                                           0,                                           (unsigned char *)&s->early_secret);            else                rv = 1;            rv = rv && tls13_generate_handshake_secret(s, pms, pmslen);        } else {            rv = ssl_generate_master_secret(s, pms, pmslen, 0);        }    } else {        /* Save premaster secret */        s->s3->tmp.pms = pms;        s->s3->tmp.pmslen = pmslen;        pms = NULL;        rv = 1;    } err:    OPENSSL_clear_free(pms, pmslen);    EVP_PKEY_CTX_free(pctx);    return rv;}#ifndef OPENSSL_NO_DHEVP_PKEY *ssl_dh_to_pkey(DH *dh){    EVP_PKEY *ret;    if (dh == NULL)        return NULL;    ret = EVP_PKEY_new();    if (EVP_PKEY_set1_DH(ret, dh) <= 0) {        EVP_PKEY_free(ret);        return NULL;    }    return ret;}#endif
 |